This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
session:01 [2019/07/13 15:21] Radu-Nicolae NICOLAU (78289) |
session:01 [2020/07/19 12:49] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | = 0x01. Exploration Tools | + | ====== 0x01. Exploration Tools ====== |
- | == Resources | + | ===== Resources |
[[https:// | [[https:// | ||
- | [[https:// | + | /*[[https:// |
- | [[https:// | + | /*[[https:// |
- | == Tutorials | + | [[https:// |
+ | |||
+ | |||
+ | / | ||
+ | |||
+ | ===== Tutorials | ||
When faced with a binary with no source or parts of the source missing you can infer some of its functionalities based upon some basic reconnaisance techniques using various tools. | When faced with a binary with no source or parts of the source missing you can infer some of its functionalities based upon some basic reconnaisance techniques using various tools. | ||
- | === 01. Tutorial - Poor man's technique: strings | + | ==== 01. Tutorial - Poor man's technique: strings |
The simplest recon technique is to dump the ASCII (or Unicode) text from a binary. It doesn' | The simplest recon technique is to dump the ASCII (or Unicode) text from a binary. It doesn' | ||
Line 64: | Line 69: | ||
</ | </ | ||
- | === 02. Tutorial - Execution tracing (ltrace and strace) | + | ==== 02. Tutorial - Execution tracing (ltrace and strace) |
[[http:// | [[http:// | ||
Line 119: | Line 124: | ||
The '' | The '' | ||
- | === 03. Tutorial - Symbols: nm | + | ==== 03. Tutorial - Symbols: nm ==== |
Symbols are basically tags/ | Symbols are basically tags/ | ||
Line 247: | Line 252: | ||
Dealing with stripped binaries (or worse, statically linked binaries that have been stripped) is harder but can still be done. We'll see how in a future lab. | Dealing with stripped binaries (or worse, statically linked binaries that have been stripped) is harder but can still be done. We'll see how in a future lab. | ||
- | === 04. Tutorial - Library dependencies | + | ==== 04. Tutorial - Library dependencies |
Most programs you will see make use of existing functionality. You don't want to always reimplement string functions or file functions. Therefore, most programs use dynamic libraries. These shared objects, as they are called alternatively, | Most programs you will see make use of existing functionality. You don't want to always reimplement string functions or file functions. Therefore, most programs use dynamic libraries. These shared objects, as they are called alternatively, | ||
Line 365: | Line 370: | ||
As you can see, functions like '' | As you can see, functions like '' | ||
- | ==== Library Wrapper Task | + | === Library Wrapper Task === |
You've previously solved '' | You've previously solved '' | ||
Line 382: | Line 387: | ||
</ | </ | ||
- | === 05. Tutorial - Network: netstat and netcat | + | ==== 05. Tutorial - Network: netstat and netcat |
Services running on remote machines offer a gateway to those particular machines. Whether it's improper handling of the data received from clients, or a flaw in the protocol used between server and clients, certain privileges can be obtained if care is not taken. We'll explore some tools and approaches to analyzing remote services. To follow along, use the server and client programs in the crackme5 folder of the {{: | Services running on remote machines offer a gateway to those particular machines. Whether it's improper handling of the data received from clients, or a flaw in the protocol used between server and clients, certain privileges can be obtained if care is not taken. We'll explore some tools and approaches to analyzing remote services. To follow along, use the server and client programs in the crackme5 folder of the {{: | ||
Line 473: | Line 478: | ||
</ | </ | ||
- | ==== Doing It in Python | + | === Doing It in Python |
You can create a sever and a client in Python only. We can use the '' | You can create a sever and a client in Python only. We can use the '' | ||
Line 504: | Line 509: | ||
</ | </ | ||
- | ==== Doing It Only with netcat | + | === Doing It Only with netcat |
We can still simulate a network connection using '' | We can still simulate a network connection using '' | ||
Line 551: | Line 556: | ||
</ | </ | ||
- | === 06. Tutorial - Open files | + | ==== 06. Tutorial - Open files ==== |
Let's remember how files and programs relate in Linux. | Let's remember how files and programs relate in Linux. | ||
Line 638: | Line 643: | ||
- | === Misc | + | ==== Misc ==== |
There are other sources of information available about running processes if you prefer to do things by hand such as: | There are other sources of information available about running processes if you prefer to do things by hand such as: | ||
Line 648: | Line 653: | ||
* ''/ | * ''/ | ||
- | == Challenges | + | ===== Challenges |
- | === 07. Challenge - Perfect Answer | + | ==== 07. Challenge - Perfect Answer |
For this task use the '' | For this task use the '' | ||
Line 656: | Line 661: | ||
Can you find the flag? | Can you find the flag? | ||
- | === 08. Challenge - Lots of strings | + | ==== 08. Challenge - Lots of strings |
Use the '' | Use the '' | ||
Line 665: | Line 670: | ||
Hint: use the tools presented in the tutorials. | Hint: use the tools presented in the tutorials. | ||
</ | </ | ||
- | === 09. Challenge - Sleepy cats | + | ==== 09. Challenge - Sleepy cats ==== |
For this task use the '' | For this task use the '' | ||
Line 677: | Line 682: | ||
</ | </ | ||
- | === 10. Challenge - Hidden | + | ==== 10. Challenge - Hidden |
For this challenge use the '' | For this challenge use the '' | ||
Line 687: | Line 692: | ||
</ | </ | ||
- | === 11. Challenge - Detective | + | ==== 11. Challenge - Detective |
This challenge runs remotely at '' | This challenge runs remotely at '' | ||
Line 699: | Line 704: | ||
</ | </ | ||
- | ==== Bonus: Get the Second Flag | + | === Bonus: Get the Second Flag === |
You can actually exploit the remote '' | You can actually exploit the remote '' | ||
Line 709: | Line 714: | ||
</ | </ | ||
</ | </ | ||
- | === Extra | + | ==== Extra ==== |
If you want some more, have a go at the bonus task included in the task archive. It is a simplified CTF task that you should be able to solve using the information learned in this lab. | If you want some more, have a go at the bonus task included in the task archive. It is a simplified CTF task that you should be able to solve using the information learned in this lab. | ||
Line 716: | Line 721: | ||
</ | </ | ||
- | === Further pwning | + | ==== Further pwning |
[[http:// | [[http:// | ||