This is an old revision of the document!
This exercise requires basic OS and networking knowledge, understanding of Denial of Service (DoS) and buffer overflows. It also requires coding skills. It can be done in introductory and advanced security classes.
Before the exercise you need to perform the following steps:
/share/education/CTF2_USC/ctf2.ns
. The obtained topology is described in the following picture. Swap in as many experiments as you have teams. Give to the groups easily related names, e.g., “cctf-team1” since managing multiple copies of experiment and multiple teams could easily get confusing.
$ ./setexpgroups.sh ProjName expgroups mysql
where mysql
is the configuration of the bank service offered by the server, whereas expgroups
is a text file which specifies, by means of its two lines, the names of the experiments and the associated group names. An example the expgroups
file is shown down here.
exp1 exp2 exp1-attack-group exp1-defense-group exp2-attack-group exp2-defense-group
This step will ensure that during exercise team members cannot log into machines controlled by the opposing team and spy on them.
cd ciao