This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
session:01 [2020/06/22 16:50] Rareş-Mihail VISALOM (67101) [Resources] |
session:01 [2020/07/19 12:49] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | = 0x01. Exploration Tools | + | ====== 0x01. Exploration Tools ====== |
- | == Resources | + | ===== Resources |
[[https:// | [[https:// | ||
Line 7: | Line 7: | ||
/ | / | ||
- | [[https:// | + | /*[[https:// |
+ | [[https:// | ||
/ | / | ||
- | == Tutorials | + | ===== Tutorials |
When faced with a binary with no source or parts of the source missing you can infer some of its functionalities based upon some basic reconnaisance techniques using various tools. | When faced with a binary with no source or parts of the source missing you can infer some of its functionalities based upon some basic reconnaisance techniques using various tools. | ||
- | === 01. Tutorial - Poor man's technique: strings | + | ==== 01. Tutorial - Poor man's technique: strings |
The simplest recon technique is to dump the ASCII (or Unicode) text from a binary. It doesn' | The simplest recon technique is to dump the ASCII (or Unicode) text from a binary. It doesn' | ||
Line 68: | Line 69: | ||
</ | </ | ||
- | === 02. Tutorial - Execution tracing (ltrace and strace) | + | ==== 02. Tutorial - Execution tracing (ltrace and strace) |
[[http:// | [[http:// | ||
Line 123: | Line 124: | ||
The '' | The '' | ||
- | === 03. Tutorial - Symbols: nm | + | ==== 03. Tutorial - Symbols: nm ==== |
Symbols are basically tags/ | Symbols are basically tags/ | ||
Line 251: | Line 252: | ||
Dealing with stripped binaries (or worse, statically linked binaries that have been stripped) is harder but can still be done. We'll see how in a future lab. | Dealing with stripped binaries (or worse, statically linked binaries that have been stripped) is harder but can still be done. We'll see how in a future lab. | ||
- | === 04. Tutorial - Library dependencies | + | ==== 04. Tutorial - Library dependencies |
Most programs you will see make use of existing functionality. You don't want to always reimplement string functions or file functions. Therefore, most programs use dynamic libraries. These shared objects, as they are called alternatively, | Most programs you will see make use of existing functionality. You don't want to always reimplement string functions or file functions. Therefore, most programs use dynamic libraries. These shared objects, as they are called alternatively, | ||
Line 369: | Line 370: | ||
As you can see, functions like '' | As you can see, functions like '' | ||
- | ==== Library Wrapper Task | + | === Library Wrapper Task === |
You've previously solved '' | You've previously solved '' | ||
Line 386: | Line 387: | ||
</ | </ | ||
- | === 05. Tutorial - Network: netstat and netcat | + | ==== 05. Tutorial - Network: netstat and netcat |
Services running on remote machines offer a gateway to those particular machines. Whether it's improper handling of the data received from clients, or a flaw in the protocol used between server and clients, certain privileges can be obtained if care is not taken. We'll explore some tools and approaches to analyzing remote services. To follow along, use the server and client programs in the crackme5 folder of the {{: | Services running on remote machines offer a gateway to those particular machines. Whether it's improper handling of the data received from clients, or a flaw in the protocol used between server and clients, certain privileges can be obtained if care is not taken. We'll explore some tools and approaches to analyzing remote services. To follow along, use the server and client programs in the crackme5 folder of the {{: | ||
Line 477: | Line 478: | ||
</ | </ | ||
- | ==== Doing It in Python | + | === Doing It in Python |
You can create a sever and a client in Python only. We can use the '' | You can create a sever and a client in Python only. We can use the '' | ||
Line 508: | Line 509: | ||
</ | </ | ||
- | ==== Doing It Only with netcat | + | === Doing It Only with netcat |
We can still simulate a network connection using '' | We can still simulate a network connection using '' | ||
Line 555: | Line 556: | ||
</ | </ | ||
- | === 06. Tutorial - Open files | + | ==== 06. Tutorial - Open files ==== |
Let's remember how files and programs relate in Linux. | Let's remember how files and programs relate in Linux. | ||
Line 642: | Line 643: | ||
- | === Misc | + | ==== Misc ==== |
There are other sources of information available about running processes if you prefer to do things by hand such as: | There are other sources of information available about running processes if you prefer to do things by hand such as: | ||
Line 652: | Line 653: | ||
* ''/ | * ''/ | ||
- | == Challenges | + | ===== Challenges |
- | === 07. Challenge - Perfect Answer | + | ==== 07. Challenge - Perfect Answer |
For this task use the '' | For this task use the '' | ||
Line 660: | Line 661: | ||
Can you find the flag? | Can you find the flag? | ||
- | === 08. Challenge - Lots of strings | + | ==== 08. Challenge - Lots of strings |
Use the '' | Use the '' | ||
Line 669: | Line 670: | ||
Hint: use the tools presented in the tutorials. | Hint: use the tools presented in the tutorials. | ||
</ | </ | ||
- | === 09. Challenge - Sleepy cats | + | ==== 09. Challenge - Sleepy cats ==== |
For this task use the '' | For this task use the '' | ||
Line 681: | Line 682: | ||
</ | </ | ||
- | === 10. Challenge - Hidden | + | ==== 10. Challenge - Hidden |
For this challenge use the '' | For this challenge use the '' | ||
Line 691: | Line 692: | ||
</ | </ | ||
- | === 11. Challenge - Detective | + | ==== 11. Challenge - Detective |
This challenge runs remotely at '' | This challenge runs remotely at '' | ||
Line 703: | Line 704: | ||
</ | </ | ||
- | ==== Bonus: Get the Second Flag | + | === Bonus: Get the Second Flag === |
You can actually exploit the remote '' | You can actually exploit the remote '' | ||
Line 713: | Line 714: | ||
</ | </ | ||
</ | </ | ||
- | === Extra | + | ==== Extra ==== |
If you want some more, have a go at the bonus task included in the task archive. It is a simplified CTF task that you should be able to solve using the information learned in this lab. | If you want some more, have a go at the bonus task included in the task archive. It is a simplified CTF task that you should be able to solve using the information learned in this lab. | ||
Line 720: | Line 721: | ||
</ | </ | ||
- | === Further pwning | + | ==== Further pwning |
[[http:// | [[http:// | ||