This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
session:01 [2018/06/18 19:11] Razvan Deaconescu [05. Tutorial - Network: netstat and netcat] |
session:01 [2020/07/19 12:49] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | = 0x01. Exploration Tools | + | ====== 0x01. Exploration Tools ====== |
- | == Slides | + | ===== Resources ===== |
[[https:// | [[https:// | ||
- | [[https:// | + | /*[[https:// |
- | == Tutorials | + | / |
+ | |||
+ | [[https:// | ||
+ | |||
+ | |||
+ | / | ||
+ | |||
+ | ===== Tutorials | ||
When faced with a binary with no source or parts of the source missing you can infer some of its functionalities based upon some basic reconnaisance techniques using various tools. | When faced with a binary with no source or parts of the source missing you can infer some of its functionalities based upon some basic reconnaisance techniques using various tools. | ||
- | === 01. Tutorial - Poor man's technique: strings | + | ==== 01. Tutorial - Poor man's technique: strings |
The simplest recon technique is to dump the ASCII (or Unicode) text from a binary. It doesn' | The simplest recon technique is to dump the ASCII (or Unicode) text from a binary. It doesn' | ||
Line 62: | Line 69: | ||
</ | </ | ||
- | === 02. Tutorial - Execution tracing (ltrace and strace) | + | ==== 02. Tutorial - Execution tracing (ltrace and strace) |
[[http:// | [[http:// | ||
Line 115: | Line 122: | ||
</ | </ | ||
- | The '' | + | The '' |
- | === 03. Tutorial - Symbols: nm | + | ==== 03. Tutorial - Symbols: nm ==== |
Symbols are basically tags/ | Symbols are basically tags/ | ||
Line 245: | Line 252: | ||
Dealing with stripped binaries (or worse, statically linked binaries that have been stripped) is harder but can still be done. We'll see how in a future lab. | Dealing with stripped binaries (or worse, statically linked binaries that have been stripped) is harder but can still be done. We'll see how in a future lab. | ||
- | === 04. Tutorial - Library dependencies | + | ==== 04. Tutorial - Library dependencies |
Most programs you will see make use of existing functionality. You don't want to always reimplement string functions or file functions. Therefore, most programs use dynamic libraries. These shared objects, as they are called alternatively, | Most programs you will see make use of existing functionality. You don't want to always reimplement string functions or file functions. Therefore, most programs use dynamic libraries. These shared objects, as they are called alternatively, | ||
Line 363: | Line 370: | ||
As you can see, functions like '' | As you can see, functions like '' | ||
- | ==== Library Wrapper Task | + | === Library Wrapper Task === |
You've previously solved '' | You've previously solved '' | ||
Line 380: | Line 387: | ||
</ | </ | ||
- | === 05. Tutorial - Network: netstat and netcat | + | ==== 05. Tutorial - Network: netstat and netcat |
Services running on remote machines offer a gateway to those particular machines. Whether it's improper handling of the data received from clients, or a flaw in the protocol used between server and clients, certain privileges can be obtained if care is not taken. We'll explore some tools and approaches to analyzing remote services. To follow along, use the server and client programs in the crackme5 folder of the {{: | Services running on remote machines offer a gateway to those particular machines. Whether it's improper handling of the data received from clients, or a flaw in the protocol used between server and clients, certain privileges can be obtained if care is not taken. We'll explore some tools and approaches to analyzing remote services. To follow along, use the server and client programs in the crackme5 folder of the {{: | ||
Line 444: | Line 451: | ||
We can see what the server and client are exchanging at an application level by capturing the traffic with the [[http:// | We can see what the server and client are exchanging at an application level by capturing the traffic with the [[http:// | ||
- | < | + | < |
# tcpdump -i any -w crackme5.pcap 'port 31337' | # tcpdump -i any -w crackme5.pcap 'port 31337' | ||
tcpdump: listening on any, link-type LINUX_SLL (Linux cooked), capture size 65535 bytes | tcpdump: listening on any, link-type LINUX_SLL (Linux cooked), capture size 65535 bytes | ||
Line 461: | Line 468: | ||
</ | </ | ||
- | < | + | < |
# netcat localhost 31337 | # netcat localhost 31337 | ||
Welcome to the awesome server. | Welcome to the awesome server. | ||
Line 471: | Line 478: | ||
</ | </ | ||
- | ==== Doing It in Python | + | === Doing It in Python |
You can create a sever and a client in Python only. We can use the '' | You can create a sever and a client in Python only. We can use the '' | ||
Line 502: | Line 509: | ||
</ | </ | ||
- | ==== Doing It Only with netcat | + | === Doing It Only with netcat |
We can still simulate a network connection using '' | We can still simulate a network connection using '' | ||
Line 512: | Line 519: | ||
Now run the client and send messages by writing them to standard input: | Now run the client and send messages by writing them to standard input: | ||
- | </code> | + | < |
$ nc localhost 4444 | $ nc localhost 4444 | ||
aaaaa | aaaaa | ||
bbbbb | bbbbb | ||
- | < | + | </code> |
Messages you write to the client and up in the server. | Messages you write to the client and up in the server. | ||
Line 549: | Line 556: | ||
</ | </ | ||
- | === 06. Tutorial - Open files | + | ==== 06. Tutorial - Open files ==== |
Let's remember how files and programs relate in Linux. | Let's remember how files and programs relate in Linux. | ||
Line 636: | Line 643: | ||
- | === Misc | + | ==== Misc ==== |
There are other sources of information available about running processes if you prefer to do things by hand such as: | There are other sources of information available about running processes if you prefer to do things by hand such as: | ||
Line 646: | Line 653: | ||
* ''/ | * ''/ | ||
- | == Challenges | + | ===== Challenges |
- | === 07. Challenge - Perfect Answer | + | ==== 07. Challenge - Perfect Answer |
For this task use the '' | For this task use the '' | ||
Line 654: | Line 661: | ||
Can you find the flag? | Can you find the flag? | ||
- | === 08. Challenge - Lots of strings | + | ==== 08. Challenge - Lots of strings |
Use the '' | Use the '' | ||
Line 663: | Line 670: | ||
Hint: use the tools presented in the tutorials. | Hint: use the tools presented in the tutorials. | ||
</ | </ | ||
- | === 09. Challenge - Sleepy cats | + | ==== 09. Challenge - Sleepy cats ==== |
For this task use the '' | For this task use the '' | ||
Line 672: | Line 679: | ||
<note tip> | <note tip> | ||
- | To edit a binary, you can use [[http://vim.wikia.com/ | + | To edit a binary, you can use [[https://vim.fandom.com/ |
</ | </ | ||
- | === 10. Challenge - Hidden | + | ==== 10. Challenge - Hidden |
- | For this task use the '' | + | For this challenge |
Can you find the hidden flag? | Can you find the hidden flag? | ||
+ | <note tip> | ||
+ | You could use '' | ||
+ | </ | ||
- | === Extra | + | ==== 11. Challenge - Detective ==== |
+ | |||
+ | This challenge runs remotely at '' | ||
+ | |||
+ | Investigate the '' | ||
+ | |||
+ | You can start from the '' | ||
+ | |||
+ | < | ||
+ | There is a bonus to this challenge and you will be able to find another flag. See that below. | ||
+ | </ | ||
+ | |||
+ | === Bonus: Get the Second Flag === | ||
+ | |||
+ | You can actually exploit the remote '' | ||
+ | |||
+ | <note tip> | ||
+ | You need to keep the connection going. Use the construction: | ||
+ | < | ||
+ | cat / | ||
+ | </ | ||
+ | </ | ||
+ | ==== Extra ==== | ||
If you want some more, have a go at the bonus task included in the task archive. It is a simplified CTF task that you should be able to solve using the information learned in this lab. | If you want some more, have a go at the bonus task included in the task archive. It is a simplified CTF task that you should be able to solve using the information learned in this lab. | ||
Line 688: | Line 720: | ||
Hint: This executable needs elevated permissions (run with '' | Hint: This executable needs elevated permissions (run with '' | ||
</ | </ | ||
+ | |||
+ | ==== Further pwning ==== | ||
+ | |||
+ | [[http:// | ||
+ |