User Tools

Site Tools


cctf_preliminary_experiment

This is an old revision of the document!


One-On-One Capture The Flag Contest - User Guide

                        _______
                       | ___  o|
                       |[_-_]_ |
    ______________     |[_____]|
   |.------------.|    |[_____]|
   ||$ rm -rf /  ||    |[====o]|
   ||            ||    |[_.--_]|
   ||            ||    |[_____]|
   ||            ||    |      :|
   ||____________||    |      :|

.==.|“” …… |.==.| :| |::| '-..-' |::|| :| || ()-.|||:| `““`_………….._\”“` /::::::::::::::\`;'-.-. `\ /::=========.:.-::“\ \ \–\ \ \`”””“”“”“”“”“”“”“`/ \ \) \ jgs `”“”“”“”“”“”“”“”“` '========' ===== Before the Contest ===== - The Team leader sends an email to silvio[dot]biagioni[at]unitn[dot]it] with object “CCTF Team”, including the members of the Team in the CC list of the email. - An email will be sent to the Team's leader containing DETERLab username and a link to set the password. - The enrollment deadline is the (DD)-th of MONTH at HH:MM. The Rounds' dates are: * Warm-up Questionnaire: DDst of MONTH * Training Phase: (DD+3)-(DD+13)th of MONTH * One-On-One Attack Phase: (DD+15)-(DD+16)th of MONTH ===== Training Phase (on your device) ===== - Download Kali Linux (Attack Clone) and TestREx (Target Clone) images. - Run the images on QEMU (TODO: ADD QEMU NETWORK CONFIGURATIONS TO THE FOLLOWING COMMANDS): <code>% qemu-system-x86_64 -drive file=KALI-RLG,format=raw -m 2048 -enable-kvm</code><code>% qemu-system-x86_64 -drive file=Ubuntu1604-STD,format=raw -m 2048 -enable-kvm -redir tcp:2222::22</code> - Perform your attacks against the target machine from your own browser, or out of the Kali Linux's command line, as many time you want. Restore the target containers, if needed, through the following commands: <code> $ sudo python run.py –manual nodegoatubuntu-node-mongo –port 8888 </code> <code>$ sudo python run.py –manual wordpress3.2ubuntu-apache-mysql –port 80 </code> - Write a brief report about the attack(s) that you are going to carry out during the One-On-One Attack Phase. ===== One-On-One Attack Phase (on DETERLab) ===== - The Team leader receives the experiment ID and the list of Qualified and Physical names of the client machines. Follows an example (in which the experiment ID is exp1) of the information that will be received: <file>———- tbreport.log ——– Experiment: ExperCCTF1/exp1 State: active Virtual Node Info: ID Type OS Qualified Name ————— ———— ————— ——————– client1 pc KALI-RLG client1.exp1.ExperCCTF1.isi.deterlab.net server pc Ubuntu1604-STD server.exp1.ExperCCTF1.isi.deterlab.net Physical Node Mapping: ID Type OS Physical ————— ———— ————— ———— client1 pc3000 KALI-RLG pc134 server pc3060 Ubuntu1604-STD pc184 </file> - To access your experimental nodes, you'll need to SSH into users.deterlab.net using your DETERLab username and password. Once you log in to users, you'll need to SSH again to your actual experimental nodes. The network topology and the commands to access from the username unitn9ab to a client in the given example are described in the following picture. ADD IMAGE WITH TWO NODES - Attack the target as reported at the end of the Training Phase, making sure to use the correct Qualified Name (in the example, server.exp1.ExperCCTF1.isi.deterlab.net'').

Additional Material

cctf_preliminary_experiment.1503664970.txt.gz · Last modified: 2021/01/29 10:58 (external edit)