Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie

Security Challenge

  • 04-02-2011 11:20PM
    #1
    Closed Accounts Posts: 2,267 ✭✭✭


    As a follow on from the old thread from a couple of years ago: http://www.boards.ie/vbulletin/showthread.php?t=2055316682

    I have created a new security challenge.

    I have no idea how long I will leave this up and running as its in a VM on my machine. If its not been used over then next few days, it will be took down.


    Aim:
    • Find weaknesses and flaws in the website design.
    • Find a a way to enter your name on the hall of fame based on these weaknesses and flaws

    Rules:
    • Try not leave traces of your actions that may give away hints to others.
    • As this server is hosted on a home ADSL linee, it has a very slow uplink. 8mb downlink, 512kb uplink (about 60-64kB/s), that's about 60-64kB/s upload/serve data at to users, so do not abuse/dos the server. Doing so will slow it down and ruin the fun for everyone.
    • Do not hammer the web-server, there is no need to run port/vulnerability scanners or web brute forcers against the server.
    • If you think brute forcing is needed in this challenge, find something that you can brute force against locally on your own machines so you don't DoS the server.
    • Any abusing the challenge will result in it been took offline.



    Is anyone interested in this?

    If so, go to: damo.dyndns.info


    Enjoy.


«1

Comments

  • Moderators, Music Moderators Posts: 6,525 Mod ✭✭✭✭dregin


    And.... done :)

    Much thanks for that, defo forced me to go looking for little bits and pieces I hadn't bothered with before.

    Would much appreciate similar challenges in the future :)


  • Closed Accounts Posts: 2,267 ✭✭✭h57xiucj2z946q


    Congratulations, well done.


  • Closed Accounts Posts: 5,082 ✭✭✭Pygmalion


    Also done.
    Spent far too long before I realised what I was missing (won't say any more, but I assume you know what I'm talking about) :P.


  • Closed Accounts Posts: 2,267 ✭✭✭h57xiucj2z946q


    Pygmalion wrote: »
    Also done.
    Spent far too long before I realised what I was missing (won't say any more, but I assume you know what I'm talking about) :P.

    Fair play, did you like it?


  • Closed Accounts Posts: 5,082 ✭✭✭Pygmalion


    Fair play, did you like it?

    Indeed, would be interested in more of these.


  • Advertisement
  • Closed Accounts Posts: 2,267 ✭✭✭h57xiucj2z946q


    Disabled ssh as people were trying to brute it and seemed to be leading people on the wrong path.


  • Closed Accounts Posts: 20,759 ✭✭✭✭dlofnep


    done :) good challenge, cheers!


  • Closed Accounts Posts: 2,267 ✭✭✭h57xiucj2z946q


    dlofnep wrote: »
    done :) good challenge, cheers!

    good man!


  • Closed Accounts Posts: 2,267 ✭✭✭h57xiucj2z946q


    Just an update, some people seem to be going in the right direction, just not but not thinking why their approach isn't working for them, or not fully reading the apache/php error messages as to why their approach may not be working.

    Do people feel its too hard?


  • Registered Users, Registered Users 2 Posts: 162 ✭✭lithiumoxide


    It's tough alright, but probably just because I don't have much of a background in computers! It's forcing me to learn a few things and I'm getting some decent guidance on various topics from others. Think I'm near the end, would like to see more of these. Thanks! :)


  • Advertisement
  • Closed Accounts Posts: 2,267 ✭✭✭h57xiucj2z946q


    It's tough alright, but probably just because I don't have much of a background in computers! It's forcing me to learn a few things and I'm getting some decent guidance on various topics from others. Think I'm near the end, would like to see more of these. Thanks! :)

    If that's you at the server at the minute, your on the right track :-)


  • Closed Accounts Posts: 20,759 ✭✭✭✭dlofnep


    Yes - The error messages are key in identifying the fault. Also, an understanding of the varying levels of authentication and how they are managed helps alot.


  • Closed Accounts Posts: 2,267 ✭✭✭h57xiucj2z946q


    How is everyone getting on?

    Seems to be a nice bit of activity on the server this evening.


  • Closed Accounts Posts: 20,759 ✭✭✭✭dlofnep


    I'm going back over it again to see what else is viewable ;)


  • Closed Accounts Posts: 2,267 ✭✭✭h57xiucj2z946q


    Cool. there might be some other stuff viewable alight. Not deliberately however hehe. I didn't put much effort into hard'ning the system.


  • Registered Users, Registered Users 2 Posts: 162 ✭✭lithiumoxide


    Not bad. Don't want to say too much, but I reckon this (last??) step will take some time!


  • Closed Accounts Posts: 2,267 ✭✭✭h57xiucj2z946q


    Not bad. Don't want to say too much, but I reckon this (last??) step will take some time!


    consider a rule of thumb, always try the quicker approach first to save yourself possible time.


  • Registered Users, Registered Users 2 Posts: 162 ✭✭lithiumoxide


    Success!

    Great challenge, highlighted lots of security issues, and a very good learning experience. Would love to see more!

    Thank you, and thanks to those who gave me some gentle direction :D


  • Closed Accounts Posts: 2,267 ✭✭✭h57xiucj2z946q


    Success!

    Great challenge, highlighted lots of security issues, and a very good learning experience. Would love to see more!

    Thank you, and thanks to those who gave me some gentle direction :D

    Fair play.


  • Registered Users, Registered Users 2 Posts: 1,311 ✭✭✭Procasinator


    Hmm, I seem to be getting stuck:
    My first instinct would have been to brute force the .htpasswd file for the moderator password (retrieved by path traversal), but it's taking a long time. Am I on a wild goose chase?


  • Advertisement
  • Closed Accounts Posts: 2,267 ✭✭✭h57xiucj2z946q


    Hmm, I seem to be getting stuck:
    My first instinct would have been to brute force the .htpasswd file for the moderator password (retrieved by path traversal), but it's taking a long time. Am I on a wild goose chase?

    refer to post 18. best of luck.


  • Closed Accounts Posts: 20,759 ✭✭✭✭dlofnep


    Hmm, I seem to be getting stuck:
    My first instinct would have been to brute force the .htpasswd file for the moderator password (retrieved by path traversal), but it's taking a long time. Am I on a wild goose chase?

    No, you're not on a wild goose chase. You're just not using the right method
    to crack it. A wordlist would be quicker.


  • Registered Users, Registered Users 2 Posts: 1,311 ✭✭✭Procasinator


    dlofnep wrote: »
    No, you're not on a wild goose chase. You're just not using the right method
    to crack it. A wordlist would be quicker.
    Yeah, I had a feeling I needed a better wordlist for JtR.

    Done.


  • Closed Accounts Posts: 2,267 ✭✭✭h57xiucj2z946q


    I don't believe it is fair to choose a complicated password for such challenges where the user cannot use public rainbow tables online, or find hash collisions for a given password due to salting and must brute force. Anyone can leave a brute forcer running for days. The main challenge is getting something to crack. And in the case of sec challenges, that is 90% of the task done. A challenge isn't fun if you have to leave your machine on for weeks to crack the pass after you already know your more of less finished. To be honest I seen a lot of people getting the hash, but seemed to have given up on the challenge after that. Possibly because they thought it would take forever to break.


  • Closed Accounts Posts: 2,267 ✭✭✭h57xiucj2z946q



    Done.


    Well done Procasinator :-)


  • Registered Users, Registered Users 2 Posts: 36 chuckleberryfin


    Nice challenge, thanks.
    (nemo)


  • Registered Users, Registered Users 2 Posts: 9,962 ✭✭✭trout


    Looks like a good bit of interest in this one ... I've set aside a couple of hours this evening to have a bash.

    I haven't done any donkey work yet, but I'm thinking that the likes of
    Backtrack
    or similar will be a good starting point.

    I'll post back this evening if I make any progress


  • Registered Users, Registered Users 2 Posts: 9,962 ✭✭✭trout


    I skipped lunch and gave it bash ... nice :)

    Any more ?


  • Closed Accounts Posts: 2,267 ✭✭✭h57xiucj2z946q


    trout wrote: »
    I skipped lunch and gave it bash ... nice :)

    Any more ?


    Im trying to come up with ideas.

    These ideas must also follow..

    1. A type of challenge where many people can participate and not interfere with each other. e.g NOT a once only hack where the system has to be reset or the challenge config reset after someone was successful or a hack that messes up the challenge for other people.

    2. A challenge that doesn't leave foot prints of previous users that gives the challenge away. e.g. Imagine people in this challenge could read the /var/log/apache2/access.log, they would have had an easier time! (by the way, many tried!)

    3. A challenge that is not prone to abuse from people. Even though the rules were clearly stated, some people insisted on running vulnerability scanners which more or less brute force all known exploits against the server. Some ran Nessus, some ran a Nikto which tries almost every webserver attack one after another, and many tried to brute force a login for ssh over the internet! This will hog my bandwidth for other people who genuinely want to do the challenge. I have your IP's you's feckers!

    Port scans with the likes of nmap are ok. They are pretty lightweight. Sometimes you need to identify the services on a server. My default router config can pick up less advanced port scanners anyway.

    4. A challenge that doesn't compromise my home network, since the VM has internet access, and is able to accept incoming connections, it is able to view home network. I haven't found a way to sandbox the VM while maintaining incoming connections or allowing outgoing connections. While I feel most people here would only be interested in the challenge, it only takes one or two people to spoil the fun for everyone.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 1,311 ✭✭✭Procasinator


    4. A challenge that doesn't compromise my home network, since the VM has internet access, and is able to accept incoming connections, it is able to view home network. I haven't found a way to sandbox the Vm while maintaining incoming connections or allowing outgoing connections. While I feel most people here would only be interested i the challenge, it only takes one or two people to spoil the fun for everyone.


    You could probably do that at the router, if were happy for that machine not too see the rest of the network. Unless you have more than one adapter, where you could then just lock down for the adapter the VM is using.

    Of course, depends on your configuration.

    I might (no promises :P) develop a quick challenge that satisfies your 4 points, if you are willing to host it?


Advertisement