Advertisement
msmouse

CTF201710

Nov 11th, 2017
148
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.32 KB | None | 0 0
  1. curl https://pastebin.com/raw/5MJJ5gr8 | base64 -d | tar xzv
  2.  
  3. 201710CTF
  4.  
  5. Hello All,
  6. I’ve been discussing setting up some hacking games for quite some time now. I’ve finally done it.
  7.  
  8. Latest Versions: https://sites.google.com/siliconpirates.net/ctf201710/home
  9. https://pastebin.com/zfkYAd3X
  10.  
  11.  
  12. Connection
  13. There’s two ways of connecting, ssh and OpenVPN
  14.  
  15. SSH
  16.  
  17. ssh to ctfusers@76.182.82.206 you should have received a guest.ssh-id file with these instructions. (You can connect to this via 10.1.33.4 from inside the protected network, if that helps any).
  18. OpenVPN
  19. You also should have received a remoteclient directory, included in a ctfserver.ovpn file which defines everything to create the vpn client, with the keys and certificates in the folder with it.
  20. Outbound to the internet, including DNS, may (should) not work, so if you have an option to set it as “Not default route” or “limited to VPN resources”, I would strongly advise it.
  21.  
  22. The VPN subnet is 10.1.33.0/16, and pushes routes to this. If you use those subnets in your own network, be extra careful.
  23.  
  24. The remote VPN server is running on 76.182.82.206 port tcp/443
  25.  
  26. Safety
  27. So… this net is a playground for ethical hacking where you can experiment doing things. While no one should ever target another user, accidents do occur. Protect your own computer… or better yet, fire up a virtual machine and VPN from it for added security.
  28.  
  29. Targets:
  30. PLEASE limit your attacks to systems on the 10.1.33.64/26 subnet (minus 10.1.33.65, the router). That’s 10.1.33.66-10.1.33.126.
  31.  
  32. PwnLab: init
  33. IP:
  34. Info: https://www.vulnhub.com/entry/pwnlab-init,158/
  35. Complete: get /root/flag.txt
  36. Skill level: low
  37.  
  38.  
  39. Wallaby's Nightmare (v1.0.2)
  40. IP:
  41. Info: https://www.vulnhub.com/?q=nightmare&sort=date-des&type=vm
  42. Complete it? I dunno how
  43. Skill level: beginner-intermediate
  44.  
  45.  
  46. 64base
  47. IP:
  48. Info: https://3mrgnc3.ninja/2016/12/64base/
  49. Complete it? There are 6 flags to collect. Each in the format of flag1{ZXhhbXBsZSBmbGFnCg==} Beat the Empire and steal the plans for the Death Star before its too late.
  50. Skill level: BEGINNER - INTERMEDIATE
  51.  
  52. Unnamed
  53. IP:
  54. Info: someone deployed a box without configuring it! Just figure out the default username and password...
  55. Complete it? Get root.
  56. Skill level: pretty darned easy.
  57.  
  58. 6day labs
  59. IP:
  60. Info: https://www.vulnhub.com/?q=6day&sort=date-des&type=vm
  61. Execute /flag to complete
  62. Skill level: unrated
  63.  
  64.  
  65.  
  66.  
  67.  
  68. Remarks
  69. Which one to do first? They are all independent so it shouldn’t matter.
  70. Really, I’ve only done one of these so far, the 6daylabs system, I’ll be doing the rest with you.
  71.  
  72. My advice, especially for first timers, is: do your best, and when you get stuck, talk it over. At conferences, this is always done in teams… and even with occasional spying on other teams or hints from the ref.
  73.  
  74. If you are really stuck, these should all have walkthroughs. I always try to do it without using them, but sometimes I’m just NOT that good. Read through the walkthrough JUST enough to get moving again.
  75.  
  76. If you somehow accidentally damage one of these (i.e. “Hmmm… the web server went away”) please let me know ASAP. I can redeploy these pretty quick.
  77.  
  78. I may add more as I get the chance & inspiration.
  79.  
  80. I’ll be on freenode in the channel #defcon919
  81.  
  82.  
  83.  
  84. #2017CTF
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement