User Tools

Site Tools


project:warzone:start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Last revisionBoth sides next revision
project:warzone [2016/04/21 11:44] – [Recommended readings] kxtproject:warzone:start [2016/11/25 07:05] – ↷ Page moved and renamed from project:warzone to project:warzone:start ruza
Line 1: Line 1:
 +====== WarZone ======
 +{{template>infobox|
 +name=warzone|
 +image=hacker_inside.png?186|
 +sw=|
 +hw=na|
 +founder=root|
 +interested=[[user:biiter]]\\ [[user:tomsuch]]\\ [[user:ruza]]\\ [[user:mrkva]]|
 +status=online}}
  
 +===== Goals of the Project =====
 +
 +  * hakc teh pla.net
 +  * improve our háčking skills
 +  * phun for members of our hackerspace and members of other hackerspaces, also for visitors of our space
 +
 +===== Wargames (team) =====
 +
 +"Capture the Flag (CTF) is a computer security wargame. Each team is given a machine (or small network) to defend on an isolated network. Teams are scored on both their success in defending their assigned machine and on their success in attacking other team's machines. Depending on the nature of the particular CTF game, teams may either be attempting to take an opponent's flag from their machine or teams may be attempting to plant their own flag on their opponent's machine." -- Wikipedia http://en.wikipedia.org/wiki/Capture_the_flag#Computer_security
 +
 +==== Vulnerable servers ====
 +
 +  * http://www.reddit.com/r/netsec/comments/xiowh/defcon_20_ctf_unmodified_freebsd_game_vm_from/
 +  * http://blog.pushebx.com/2011/03/penetration-testing-iso.html
 +
 +==== References ====
 +
 +  * https://ctftime.org/ctfs/
 +  * https://www.defcon.org/html/links/dc-ctf-history.html
 +
 +===== Available challenges =====
 +
 +==== BRMCTF ====
 +
 +{{:project:reverse-engineering.jpg?nolink&100  }}
 +
 +IP [[http://192.168.66.4/|192.168.66.4]] (internal DNS name ctf.war) runs server with CTF challenge (capture the flag). Everybody should start at level00. Your task is to get the password to the higher level (level01, etc.). More information in /home/level00/README
 +
 +**Please, do not publish solutions to the levels! Keep it to yourself and let others enjoy competition same as you've did.**
 +
 +Currently CTF has 8 functional levels. More info on [[http://192.168.66.4|http://192.168.66.4]] or [[http://ctf.war/|http://ctf.war/]] (within LAN)
 +
 +<note>**ssh level00@nat.brmlab.cz -p 2000 -v**\\ password: **brmlab**\\ \\ https://nat.brmlab.cz/warzone</note>
 +
 +==== OBSTACLE10g ====
 +
 +{{:project:obstacle_hlf_2x.gif?nolink&100 |}}
 +
 +IP **192.168.66.8** runs server with Oracle database. Can you hack it?
 +
 +==== DVWA ====
 +
 +{{:project:dvwa_grey.png?nolink&100 |}}
 +
 +IP 192.168.66.7 has Damn Vulnerable Web App ([[http://www.dvwa.co.uk/|DVWA]]) installed and configured. 
 +Use login 'admin' with password 'password'. After logging in, read the [[http://192.168.66.7/instructions.php|instructions]]
 +
 +<note>
 +[[http://192.168.66.7/]]
 +
 +user: admin\\ 
 +pass: password
 +</note>
 +
 +==== WebGoat ====
 +
 +{{:project:webgoat_logo-294x300.jpg?nolink&100 |}}
 +
 +Other service available is at [[http://192.168.66.7:8080/WebGoat|http://192.168.66.7:8080/WebGoat]] which has OWASP WebGoat Project ([[https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project/|WebGoat]]) installed and configured.
 +
 +<note>
 +[[http://192.168.66.7:8080/WebGoat]]
 +</note>
 +
 +===== Recommended readings =====
 +
 +  * http://en.wikipedia.org/wiki/Hacking:_The_Art_of_Exploitation
 +  * http://www.abclinuxu.cz/clanky/recenze/ucebnice-jazyka-c
 +  * [[http://www.amazon.com/dp/0764544683|The Shellcoder's Handbook: Discovering and Exploiting Security Holes]]
 +  * [[http://www.phrack.com/issues.html?issue=49&id=14#article|Smashing The Stack For Fun And Profit]]
 +  * [[http://pentest.cryptocity.net/files/exploitation/stsi2010.pdf|Smashing the stack in 2010]]
 +  * [[http://phrack.com/issues.html?issue=57&id=9#article|Once upon a free()]]
 +  * [[http://www.win.tue.nl/~aeb/linux/hh/hh.html|Hackers Hut]]
 +  * https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
 +  * http://www.cert.org/secure-coding/scstandards.html
 +  * http://samate.nist.gov/SRD/testsuite.php
 +  * http://cseweb.ucsd.edu/~hovav/talks/blackhat08.html
 +  * http://www.orkspace.net/secdocs/index.php
 +  * http://www.fefe.de/c++/c%2b%2b-talk.pdf
 +  * http://mixter.void.ru/papers.html
 +  * http://www.tenouk.com/Bufferoverflowc/
 +  * http://www.drdobbs.com/security/anatomy-of-a-stack-smashing-attack-and-h/240001832
 +  * http://fresh2refresh.com/cprogramming/
 +===== References =====
 +
 +  * [[http://syscalls.kernelgrok.com/|Linux syscall reference]]
 +  * [[http://ref.x86asm.net/|X86 Opcode and Instruction Reference]]
 +  * [[http://www.nasm.us/doc/|The Netwide Assembler: NASM]]
 +  * [[http://www.intel.com/products/processor/manuals/|Intel® 64 and IA-32 Architectures Software Developer's Manuals]]
 +  * [[http://www.acm.uiuc.edu/webmonkeys/book/c_guide/|The C Library Reference Guide]]
 +  * [[http://samate.nist.gov/SRD/testsuite.php|NIST SAMATE Reference Dataset]]
 +
 +===== Similar public projects =====
 +
 +  * http://smashthestack.org/
 +  * http://exploit-exercises.com/
 +  * https://www.vulnhub.com/
 +  * http://www.overthewire.org/
 +  * http://hax.tor.hu/
 +  * [[https://kyberia.sk/id/6901670|wargames - riddles - challenges (kyberia.sk)]]
 +===== SetUp =====
 +
 +[[members:brmlan#warzone_challenge|Internal setup info]] (only for brmlab members)
project/warzone/start.txt · Last modified: 2016/11/27 05:42 by ruza