Advertisement
Guest User

Untitled

a guest
Dec 5th, 2013
486
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 12.65 KB | None | 0 0
  1. THE GAME
  2. ——————
  3.  
  4. Your goal is to be the best country in the world, building up and unleashing a nuclear arsenal!
  5.  
  6. WOULD YOU LIKE TO PLAY A GAME?
  7. ./yes_but_how_does_it_work
  8.  
  9.  
  10. Your Machine
  11. ——————
  12.  
  13. You will be given non-root access to a virtualized server. On this server, there will be a number of services running.
  14.  
  15. Your job is to keep the services up, detect attacks against the services, patch your services, and develop exploits to be used against other teams’ services.
  16.  
  17. When patching your service, you must keep the original functionality. If any of the scripts that simulate a user using the service is unable to fully exercise your service, then the service is considered non-functional.
  18.  
  19. You will gain Resources (to progress in the game) by keeping your services up and detecting attacks. You will gain Credits to spend on bonuses by developing exploits.
  20.  
  21. To detect attacks, you will be able to use tcpdump on your machine’s interface. There will be a publicly-accessible web interface where you can specify if a netflow in the last round was an attack and you will instantly see the results of your detection (i.e., if the attack was correctly detected or if the detection represents a false positive).
  22.  
  23. A netflow is identified by (source_ip, source_port, dest_ip, dest_port, timestamp). The timestamp that you see in the web interface will be when our side created the TCP connection. The timestamp you see from your vulnerable machine may differ slightly.
  24.  
  25.  
  26. The Levels
  27. —————
  28.  
  29. There are four levels in the game. Everyone starts out on the first level, with zero Resources. At each level you generate a specific Resource, and once you generate enough Resources you will be promoted to the next level.
  30.  
  31. You will only attack and be attacked by teams at your level.
  32.  
  33. Your team’s ranking will be based on what level your team is in and how many Resources you’ve collected in your current level (that is, Resources collected in previous levels don't matter).
  34. Teams in level 4 will be ranked above teams in level 3, and so on.
  35.  
  36.  
  37.  
  38. Collecting Resources
  39. —————————
  40.  
  41. Here’s what a sample level looks like (specifics like color and so on could change):
  42. http://i.imgur.com/82Cubvx.png
  43.  
  44. Red states are active, Blue states are inactive, and the smaller light blue nodes are services that are associated with each state.
  45.  
  46. In the example, “Mine Uranium” is the active state. Service dexware is active, because it is associated with “Mine Uranium.”
  47.  
  48. We will only generate traffic against active services. This traffic will consist of “benign” traffic and “attack” traffic. Part of your job is to decide which is which.
  49.  
  50. Each change of the level is called a “tick.” The tick will change (almost) every 3 minutes.
  51.  
  52. So, how do you create Resources?
  53.  
  54. Resources are allocated every “round.” A round is a complete traversal of the level, with the XMAS state being the last state.
  55.  
  56. The XMAS state is special, it will last for 1 minute, and there will be no traffic. This will give you time to identify attack traffic in the previous states.
  57.  
  58. So, there will be a round every 10 minutes, as every level has 3 states and 1 XMAS state. After the XMAS state, a round is complete and Resources are awarded to each team.
  59.  
  60.  
  61. Calculating Resources
  62. ——————————
  63.  
  64. Every round you will be awarded Resources for how well you performed in that round.
  65.  
  66. The maximum Resources you can receive in a round is 500. The lowest is 0 (but you’re not going to be that team).
  67.  
  68. 300 of the 500 Resources are rewarded for having the active services up.
  69.  
  70. So for N active services on the round, if you had Nup of those services up and functional, you will receive 300 * (Nup / N) Resources.
  71.  
  72. The remaining 200 of 500 resources are awarded based on how many attacks you detected. A successful undetected attack is an attack that:
  73. 1) correctly captures your flag
  74. 2) has not been marked as an attack (more precisely, NONE of the associated netflows have been marked).
  75.  
  76. You will also lose Resources for each incorrectly marked benign netflow.
  77.  
  78. So for Na number of successful attacks, Nd number of attacks you detected, and Nw number of incorrectly marked netflows, you will receive 200 * ((Nd - Nw) / Na) resources. Of course, if there are no attacks, you will receive 200 Resources.
  79.  
  80. So, for the math types, here’s the whole formula:
  81. Total_Score_Of_The_Round = max(0, 300 * (Nup / N) + 200 * ((Nd - Nw) / Na))
  82.  
  83. Let’s look at an example.
  84.  
  85. For one round of the example level above there are two services involved (dexware and mathconsole),
  86. which are active each in two states. In total, there are 4 instances of a service being up and "attackable" in a round.
  87.  
  88. Let’s say that, out of the 4 service instances, you had 2 services up. And, during the round there were 2 successful attacks, and you correctly marked one netflow as an attack, but you also incorrectly marked two benign netflows as an attack.
  89.  
  90. How many Resources would you receive in this round? Go ahead, I’ll wait.
  91.  
  92. 50
  93.  
  94. N = 4, Nup = 2, Na = 2, Nd = 1, Nw = 2
  95.  
  96. (300 * (2 / 4)) + (200 * ((1 - 2) / 2) = 150 + -100 = 50
  97.  
  98. Now let’s say that you do better. Out of the 4 active services, you had 4 services up. And, during the round there were 4 successful attacks, and you correctly marked four netflows as an attack, but you also incorrectly marked one benign netflow as an attack.
  99.  
  100. N = 4, Nup = 4, Na = 4, Nd = 4, Nw = 1
  101.  
  102. (300 * (4 / 4)) + (200 * ((4 - 1) / 4) = 300 + 150 = 450
  103.  
  104.  
  105. Promotion
  106. —————
  107.  
  108. To be promoted to the next level, you must generate enough Resources at the current level.
  109.  
  110. Here is our current idea of the limits for each level (subject to change before and possibly during the competition):
  111.  
  112. L1: 6,000 resources
  113. L2: 4,500 resources
  114. L3: 3,000 resources
  115.  
  116. Therefore, you must generate 6,000 resources to be promoted from level 1 to level 2, and once there you must generate 4,500 of level 2’s resources to be promoted to level 3. And so on.
  117.  
  118. If you are the first team to be promoted to a level, you will not start generating Resources, which means that there will be no traffic to any of your services. Use this time to develop elite exploits. Once another team is promoted, you will both start generating Resources.
  119.  
  120.  
  121. Services, Exploits, and flag_id. Oh My.
  122. ——————————————————
  123.  
  124. In the CTFs of old, each service had a single flag.
  125.  
  126. Our services have multiple flags, and these flags are part of the service. A flag could be user passwords, the status of the user, or nuclear launch codes, depending on the service.
  127.  
  128. Don’t steal all the flags; you’re supposed to be stealthy.
  129.  
  130. Your exploit should only steal a specific flag. But how will your exploit know which flag to capture?
  131.  
  132. In comes the concept of a flag_id. A flag_id identifies the specific flag to capture and is service dependent. For instance, if the flag are user passwords, the flag_id could be the specific username. If the flag is the status of the user, the flag_id could be the specific user_id. If the flag is the nuclear launch codes, the flag_id could be the specific nuclear site.
  133.  
  134. Imagine the following database table for a fake service:
  135.  
  136. | user_name | user_password | status |
  137. | adam | 9cb4afde731e9eadcda4506ef7c65fa2 | ICTFFTW |
  138. | test | 098f6bcd4621d373cade4e832627b4f6 | FLG47M9glVIWW3AG |
  139. | l33t | 11119102f1634c7967cc1b58947295d8 | FLGmBSlIkZoWSy2p |
  140. | vigna | 9cb4afde731e9eadcda4506ef7c65fa2 | FLG4V2tHkaodSy2p |
  141.  
  142. The flag_id for this service is the user_name. The flags are clearly the status.
  143.  
  144. If your exploit is given “l33t” it will be expected to return “FLGmBSlIkZoWSy2p” (of course by exploiting the service).
  145. If your exploit is given “vigna” it will be expected to return “FLG4V2tHkaodSy2p”
  146.  
  147. Unlike those poor souls who competed in the 2012 iCTF, you will not have to guess what the flag_id is for a service. The web interface will clearly state, for each service, a description of the flag_id.
  148.  
  149. So, your exploit will accept, as a parameter, the ip and port to exploit, and the flag_id to capture the specific flag. Your exploit will return only that flag.
  150.  
  151. Your exploit will either be a single Python script or a .tgz bundle.
  152.  
  153. So that you can test your exploits, your vulnerable machine will have a script that will run exploits exactly as we will run them. You’ll only be able to run the exploits against yourself.
  154.  
  155. Specific exploit interface details and examples will be released Thursday.
  156.  
  157.  
  158. Submitting Exploits
  159. —————————
  160.  
  161. You will submit your exploit for a specific service through the web interface. Only your latest exploit for each service will be run. This information will also be shown on the web interface.
  162.  
  163. We will test your exploit to make sure that it can successfully capture the flag from an unpatched service. You will get automatic feedback from this process that will be shown in the web interface.
  164.  
  165. Any team caught messing with or trying to evade the testing service and automated feedback will be banned from the competition. Exploit each other, not us.
  166.  
  167. Your exploit should steal the flag. DOSing the teams’ service is also grounds for banning. Play fair, win fair, write dirty exploits.
  168.  
  169.  
  170. Running Exploits
  171. ———————
  172.  
  173. Each tick ZDI (aka us) will run at most one exploit against each active service for each team. Eligible exploits are ones that have passed the exploit submission process (see previous section), and are from teams in your level.
  174.  
  175. The specific exploit to run against a particular team’s service will be randomly chosen between all eligible exploits from teams in that level.
  176.  
  177. Every time one of your team’s exploit script successfully captures the correct flag for the service, AND DOES SO UNDETECTED by that team, you receive one Credit.
  178.  
  179. For example, if you are the first team to submit an exploit for service mathconsole, when mathconsole is active, your exploit will be run against all the teams in your level (except for you). This means that if none of the teams detect your exploit and everyone has their service up, you will get at most N Credits, where N is the number of teams.
  180.  
  181. However, once another team submits an exploit for the service, the most credits you can get is N/2, and so on.
  182.  
  183. You will know from the scoreboard who has submitted an exploit for what service.
  184.  
  185.  
  186. Spending Credits
  187. ———————
  188.  
  189. You worked hard to write those stealthy exploits, and we want to reward you for it.
  190.  
  191. Welcome to the auction house.
  192.  
  193. Here, you can spend your hard earned Credits on bonuses to help your team. Or hurt your competitors.
  194.  
  195. Each auction starts at the beginning of a tick, and ends 30 seconds before the end of the tick.
  196.  
  197. During the action, you can place a bid on one of the bonuses. Each bonus will have a different minimum bid. You cannot revoke a bid, and you cannot place more bids than you have credits.
  198.  
  199. Each bonus item can only be won by a limited number of teams, specifically the teams that bid the most.
  200.  
  201. You will not know what the bids are for the current auction, but you will know the winning bids for the previous auctions.
  202.  
  203. If you successfully win the bid, you will receive the bonus and your credits are deducted. If you loose a bid, you get back your credits.
  204.  
  205. What are these bonuses, you ask?
  206.  
  207. 1. Protection for the next tick. If you win this bonus, you will not be attacked during the next tick.
  208.  
  209. 2. Mute a team’s exploits. If you win this bonus, we will NOT run exploits from a given team for the next tick. You tell us which team when you make the bid.
  210.  
  211. 3. Show attack netflow. If you win this bonus, we will tell you one netflow id of an attack in the current tick (the current tick that you’re placing a bidding). It’s your job to identify this netflow as an attack.
  212.  
  213. 4. Purchase our exploits. If you win this bonus, we will give you a ZDI verified exploit for a service of your choice. It’s your job to submit it as your own, make tweaks as necessary, and so on. You will only be able to buy this bonus once.
  214.  
  215. Oh yeah, one more thing: you’ll be able to set a message that will be shown to everyone if you win a bonus. We’re a university, so keep it clean.
  216.  
  217.  
  218. Important Note
  219. —————————
  220.  
  221. We reserve the right to change the parameters of the game. But at least we’ll update you when we do.
  222.  
  223. Please ask if you have any questions, but understand that we are working on getting the game up and running and stable and scalable. If you think you can answer another team’s question, please do so.
  224.  
  225.  
  226.  
  227. _______________________________________________
  228. ctf-participants mailing list
  229. ctf-participants@lists.cs.ucsb.edu
  230. https://lists.cs.ucsb.edu/mailman/listinfo/ctf-participants
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement