Over the Wire - Wargames - Bandit

Introduction Details about the challenges may be found at https://overthewire.org/wargames/bandit/. The game is played over SSH over port 2220 so firewalls may need to be adjusted to allow outbound traffic to connect to the game. The game has 34 levels. The levels are chained, so that to get to the next level you need to complete/finish/beat the previous level. WARNING: These are my own notes and contain actual flags. Bandit Level 0 Level Goal The goal of this level is for you to log into the game using SSH.

Read More →

UQ Cyber Squad 0x01 Intro to Linux, Machines, and Networking

Introduction Found the UQ Cyber Squad site at https://cybersquad.uqcloud.net/index.html. Signed up for their CTF on https://ctf.uqcloud.net/ 0x01 Introduction to Linux This was identical to the QUT Whitehats Week 2 for challenges 1 through to 8. The writeup was already done at https://kush.com.fj/blog/posts/2020-02-28_qut_wh_wk2/. No place like index.html - 10pts There’s no clues or hints for this but it was pretty obvious. Navigated to https://cybersquad.uqcloud.net/index.html Manually reviewed the page source and searched for flag Found flag on line #30 of the source Submitted: flag{w0ah_n1c3_f1nd} Machines The machines challenges were named machines because they provided virtual machines for a traditional boot-to-root.

Read More →

QUT Whitehats CTF Week_3

Week_3 WARNING: Like all my CTF notes, this contains spoilers. 3x01 - 10pts https://crypto.qutwhitehats.club/ch1 For simplicity sake, to be able to easily attempt this weeks challenges, please navigate to: https://www.katacoda.com/0xollie/scenarios/0x01 sign up/sign in and click onto the terminal. INPUT: apt install httpie -y wait approx 1 minute for it to install. obtain ciphertext by running the following command: http get https://crypto.qutwhitehats.club/ch1 To input an answer run the following command: http post https://crypto.

Read More →

QUT Whitehats CTF Week_2

Week_2 I spent a good 10 minutes trying to figure out the challenges before reaching for help. Eventually was told that the challenge location was “on the end of our slide deck is a link to katacode, thats where Olliver is doing his Challenges https://www.katacoda.com/0xollie/scenarios/0x01" Signed up for Katacoda and nativated to the URL. WARNING: Like all my CTF notes, this contains spoilers. Challenge 1 - Normal files - 10pts These are just regular files flag syntax: flag{insert_flag_here}

Read More →

QUT Whitehats CTF Week_1

Week_1 WARNING: Like all my CTF notes, this contains spoilers. How_2_Flag - 0 pts For our CTF challenges this year we will be using the format: flag-{example_flag} Please note that all flags are case-sensitive! Submitted: flag-{example_flag} Community - 5 pts Have you joined our discord server yet? https://discord.gg/kRbcVnP Joined discordapp Clicked on Add a server Used the URL in the challenge Checked #flag channel Submitted: flag-{welcome_1337_haxor} Stay_Informed - 10 pts Our website - https://qutwhitehats.

Read More →

AWSN Cadet CTF

Introduction I was fortunate enough at attend an Australian Women in Security Networ (AWSN) session. Following the session there was a beginner level capture the flag (CTF) hosted off http://149.28.182.32:8000. These are my notes from the CTF. Additional things to note are, firstly, that for the Web challenges, challenge 4 is called flag5, and challenge 5 references flag4. Secondly, the submission for the Cryptography password challenge expects the flag in the format flag{flag_value}.

Read More →

GPG Better than Zip Encryption

Is GPG/OpenPGP really Better than Zip ? I attended a local conference yesterday (2019-03-29) and during one of the talks a senior analyst from one of the world’s first CERT said that the preference was to use GPG for symmetric key encryption of files to transfer confidential information to their clients over zip. The reason presented was that zip did not provide the desired level of confidentiality and integrity. This comment got me thinking as I had thought that zip used AES for encryption, so now I am awake at 0100hrs in the morning and curious to understand the encryption used in zip.

Read More →

Pen Test Assessment

Penetration Test Assessment A penetration test assessment was a requirement of a short cource on Penetration Testing from the Charles Sturt University. As part of the assessment, students were provided an ova image of a virtual machine. The virtual machine was to be the target of a penetration test, and students were expected to obtain flags for submission. A walkthrough of the assessment is presented here. For the benefit of other students, the names and values of the flags have been redacted, and replaced with the string REDACTED

Read More →

Metasploitable2 Walkthrough

For this walk-though I use the Metasploit framework to attempt to perform a penetration testing exercise on Metasploitable 2. I employ the following penetration testing phases: reconnaisance, threat modelling and vulnerability identification, and exploitation. Since this is a mock exercise, I leave out the pre-engagement, post-exploitation and risk analysis, and reporting phases. Set-up This metasploitable walk-through is performed in a virtual lab environment. Two virtual machines (VMs) are used. The first is a Kali VM and the second is the Metasploitable2 VM.

Read More →

Cross compile libpcap for Arm

This has been tested on Ubuntu 16.04.1 Desktop (64-bit), and assumes that arm-linux-gnuabi-gcc has already been installed, e.g. sudo apt-get install -y gcc-arm-linux-gnueabi Download the latest libpcap source tar ball from [http://www.tcpdump.org/#latest-releases], e.g. libpcap-1.8.1.tar.gz tar zxvf libpcap-1.8.1.tar.gz apt-get install flex bison byacc export CC = arm-linux-gnueabi-gcc ./configure –host=arm-linux –with-pcap=linux make Once the library has been compiled, it may be linked to other code, using the -L gcc flag and the location of the library.

Read More →