-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathpasswordCTF.html
More file actions
116 lines (94 loc) · 7.44 KB
/
passwordCTF.html
File metadata and controls
116 lines (94 loc) · 7.44 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
<!-- saved from url=(0080)http://mountrouidoux.people.cofc.edu/CyberPaths/intrusiondetectionsystem_v2.html -->
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>CTF Password Lab</title>
<link rel="stylesheet" style="text/css" href="./css/skeleton.css" media="screen">
<link rel="stylesheet" style="text/css" href="./css/skeleton.css" media="print">
<script src="js/jquery.js"></script>
<script src="js/main.js"></script>
</head>
<body>
<div class="container">
<div id="header">
<div id="header_info">
<center><h1 id="logo_cyber">Cyberpaths</h1></center>
</div>
</div>
<div id="site_body">
<div id="actual_content">
<center><div id="main_title"><h5>- CTF Password Lab -</h5></div></center><br><br>
<div class="title_bg"><h3>Lab Goals</h3></div><hr>
<div class="subcontent">
<ol class="instructions">
<li> Apply different decryption techniques.</li>
<li> Understand encryption concepts such as symmetric key encryption.</li>
<li> Use pivot machines and learn what these are.</li>
</ol>
</div>
<!--div class="title_bg"><h3>Useful Material</h3></div>
<div class="subcontent">
<ol class="instructions">
<li> Khan Academy <a href='https://www.khanacademy.org/computing/computer-science/cryptography' target=_blank>Journey to Cryptography</a>.</li>
<li> Rumkin Cipher <a href='http://rumkin.com/tools/cipher/' target=_blank>Tools</a>.</li>
</ol>
</div-->
<br><div class="title_bg"><h3>Quick introduction to CTFs and Passwords</h3></div><hr>
<div class="subcontent">
<ol class="instructions">
Capture The Flag (CTF) is a common cyber security competition format where participants have
to find a secret or vulnerability or error (flag) that is hidden in a file, website, log, etc. CTFs
questions are asking for short answers, often single word. This exercise simulates a CTF
experience. Although you are only competing with yourself, this will be a “detective” style
exercise to reveal the secrets of four users, Alice, Bob, Carol, and David. Alice is not security
conscious at all! She saves passwords unsafely. Bob is a little more security aware; he still saves
passwords unsafely, but not plainly as Alice. Carol is pretty aware of security, her passwords are
saved in a safe manner, however they can be cracked because Carol puts convenience to
memorize a password above all! Finally, David is very security aware. He saves his passwords
securely and they are hard to guess!
</ol>
</div>
<br><div class='title_bg'><h3>Prerequisites</h3></div><hr>
<div class='subcontent'>
<ol class='instructions'>
<li>Basic cryptography: Khan academy has a great class on cryptography and these ciphers that can be found <a href='https://www.khanacademy.org/computing/computer-science/cryptography' target=_blank> here </a></li>
<li>Passwords and how these should be stored: You can find a lot of <a href='https://www.lifewire.com/strong-password-examples-2483118' target=_blank>examples</a> about building strong passwords. We also recommend that you try to measure some of your password strength by using this <a href='https://howsecureismypassword.net/' target=_blank>tool.</a></li>
<li>Hashing: Here is an interesting <a href='https://www.khanacademy.org/economics-finance-domain/core-finance/money-and-banking/bitcoin/v/bitcoin-cryptographic-hash-function' target=_blank>video</a> from khan academy on hash functions.</li>
<li><a href='https://youtu.be/8ZtInClXe1Q' target=_blank>How not to store a password</a></li>
<li><a href='https://youtu.be/7U-RbOKanYs' target=_blank>Password cracking</a></li>
<li>Some tools that will be useful in this lab:</li>
<ul>
<li> <a href='http://rumkin.com/tools/cipher/' target=_blank>Rumkin</a> Cipher Tools</li>
<li> <a href='https://crackstation.net/' target=_blank>CrackStation</a> Hash Cracker</li>
</ul>
</ol>
</div>
<br><div class="title_bg"><h3>Part 1: Setting up the topology</h3></div><hr>
<div class="subcontent">
<ol class="instructions">
<li>Use the provided <a href='https://github.com/mundruid/CyberPaths/blob/master/RSpecs/passwd_ctf_Rspec.txt' target=_blank> RSpec</a></li>
<li>(ON ALL MACHINES)Run the following commands:
<ul>
<li>Wait some time to allow background installations to finish once nodes are set up.</li>
<li>The terminal window should halt after running the script. Just close it and open another terminal for each node.</li> </ul>
<pre><code>sudo python /local/setup.py </code></pre>
</ol>
</div>
<div class="title_bg"><h3>Part 2: The Mission: Snoop around</h3></div><hr>
<div class="subcontent">
<ol class="instructions">
<b>Your mission is to find Alice’s, Bob’s, Carol’s, and David’s password.</b><br><br>
<li>First you will use a pivot machine with the password <pre><code>su pivot <br>Password: …</code></pre>We assume that the pivot machine has already been compromised either with social engineering or with a password cracking tool, such as hydra.</li>
<li>What is a pivot machine? It is usually a machine in a target network that may not be an important asset but it is used to “pivot” to other machines that may store important data or are assets for different reasons, i.e., run an important service etc.</li>
<li> Look around in the files on the pivot machine. Alice's file is somewhere and it has her password!</li>
<li> After you find Alice's password, login to Alice's machine using the command: <pre><code>ssh alice@alice</code></pre></li>
<li> Look around in Alice's machine. She has saved Bob's password somewhere. After you find it, try to crack it. Think about what kind of encryption scheme Bob may be using for his password. You can use one of the recommended sites in the sources to break Bob's password.</li>
<li> After you crack Bob's password, login to Bob's machine using the command: <pre><code>ssh bob@bob</code></pre></li>
<li> Look around bob's directories. You may need to dig a bit more into Bob's directories to find Carol's password file. After you find it, try to crack it. Keep in mind that Carol is a secure user, so she may have saved her file securely using a one-way hash function. You can use one of the recommended sites in the sources to break Carol's password.</li>
<li> After you crack Carol's password, login to Carol's machine using the command: <pre><code>ssh carol@carol</code></pre></li>
<li> Look around Carol's directories. You may need to dig deeply to find David's password file. After you find it, try to break it. Keep in mind that David is a secure user, so he may have sent his file securely and saved using a one-way hash function.You can use one of the recommended sites in the sources to break David’s password.</li>
<li> You may not be able to break David’s password, unless you use a tool such as <a href='https://github.com/vanhauser-thc/thc-hydra' target=_blank>hydra</a> or <a href='https://github.com/magnumripper/JohnTheRipper' target=_blank>john</a> the ripper. You can find out more about these tools in the attached sources.
</ol>
</div>
</div>
</div>
</div>
</body></html>