Teams
Divide & Conquer
It’s possible to play in a team!
Start Playing
At the start of the conference we will communicate how to:
- Connect to our network
- The URL of the Portal
Once you’ve reached the Portal, you can login with your API key which will generate a JWT token used for authentication.
Setting The Stage
BREAKING NEWS: All MITechCon sessions STOLEN, mere days before the conference start!
It is assumed that Alexander Cipher from ACME Coding Con is behind the theft of the priceless mitechcon-2024-sessions.zip (probably because they had insufficient material of their own).
But don’t panic just yet, there is hope still: our hacker liaison discovered ACME Coding Con has scheduled a major portal migration on thursday 21 March. We managed to secure migration API keys, which will enable us to infiltrate their portal and, with some clever hacking, retrieve our beloved zip.
Hardware
Bring your own ethernet cable and make sure your laptop has an ethernet port!
You do not want to perform a brute force attack on wifi, trust us.
Software
Hardcore
You are a seasoned hacker or really want to dive into this.
Kali linux is an open-source, Debian-based Linux distribution geared towards security tasks, such as Penetration Testing and Security Research.
Metasploit is the world’s most used penetration testing framework.
You can install this on Windows!
Docker
There is a Docker image for pretty much all the tools you’ll need.
Already install Docker for Windows and download the Docker images at home!
docker pull instrumentisto/nmap
docker pull paoloo/sqlmap
docker pull vanhauser/hydra
docker pull adminer
docker pull mongoclient/mongoclient
docker pull rediscommander/redis-commander
docker pull jrottenberg/ffmpeg
Manual Install
See “ALSO IN THIS SERIES” for our specific blog posts on using nmap, hydra and sqlmap.
Open Dev Tools with F12.
The following tabs will be interesting for the bootcamp:
- Application > “Local Storage”
- token: Your JWT token
- user: Your details
- Network
- Many hacks are performed by doing a Http request.
- The flag is typically in the Response of such request!
- Interesting options
- Fetch/XHR: this is what we’re interested in
- Preserve log: do not purge the list when the page is refreshed
- Interesting request details
- Headers > Request Url: to see query string arguments
- Payload: the body sent with the request
- Response: the reply from the server
- Console
- Interesting logs or errors may show up here
You could also monitor network traffic with a tool like Fiddler or Wireshark
The Game
The Portal
If you are unsure how to get started
- Explore The Portal website
- Make sure to update your settings after logging in 😉
- Visit the “Hacks Overview” page from the portal for extra tips
- Run an
nmap scan on the server the Portal is served from to discover more
In-Game Blogs
As part of the Security Bootcamp, two (vulnerable) WordPress blogs are spun up, visit them from the Portal for more useful information:
The Hacker’s Toolkit Blog contains posts on hacking tools and general info on JWT, Capturing Flags and more
The Security Audit Blog contains clues for the treasure hunts.
The Flags
Just performing a certain hack does not score points, you have to locate the flag that is revealed by the hack.
Make sure to check the response body after you have performed a hack 😉
The following case-sensitive regex will match a flag:
[A-Z]{2,5}-[a-zA-Z0-9. -]{4,50}
Other things that score points:
- The API key of another player not in your team
- The JWT token of another player not in your team
Check the blog post in The Hacker’s Toolkit Blog in-game for more info!
The Vault
The Vault is where Alexander Cipher has hidden our precious zip. It is the end game and will open on friday 22 March at 11AM.
But you can continue playing until friday 22 March at 5PM, when the winners will be announced.
Many of the flags found in the game are somehow encrypted with simple ciphers.
Attempt to open the Vault by entering all your decrypted flags as passphrase and score Vault multipliers.
Beware, incorrectly decrypted flags will cost points!
Check the blog post in The Hacker’s Toolkit Blog in-game for more info!