Security Bootcamp Prep
posted in security on • by Wouter Van SchandevijlThe next iteration of the itenium Security Bootcamp is at the Michigan Technology Conference 2024. Its vulnerable applications will be running for the duration of the conference: exploit the vulnerabilities (hack!?) and submit captured flags in the Portal website.
Here is how those that will participate can prepare themselves.
If the term SQL Injection
does not ring a bell, you may want to start by reading up on
that and other vulnerabilities such as: XSS, CSRF, OWASP, …
Super Tips:
Statements in this blog that have a 😉 emoji, ignore at your own peril 😉
API Key
GUARD YOUR API KEY WITH YOUR LIFE
Your API key is how the game keeps track of your progress.
The API key is required to login and to submit captured flags (=score points).
You should have received yours by email.
If you do not have an API key, contact one of the game admins.
Teams
Divide & Conquer
It’s possible to play in a team!
Start Playing
At the start of the conference we will communicatie how to:
- Connect to our network
- The URL of the Portal
Once you’ve reached the Portal, you can login with your API key which will generate a JWT token used for authentication.
Setting The Stage
BREAKING NEWS: All MITechCon sessions STOLEN, mere days before the conference start!
It is assumed that Alexander Cipher from ACME Coding Con is behind
the theft of the priceless mitechcon-2024-sessions.zip
(probably because they
had insufficient material of their own).
But don’t panic just yet, there is hope still: our hacker liaison discovered ACME Coding Con has scheduled a major portal migration on thursday 21 March. We managed to secure migration API keys, which will enable us to infiltrate their portal and, with some clever hacking, retrieve our beloved zip.
Your Tools
Hardware
Bring your own ethernet cable and make sure your laptop has an ethernet port!
You do not want to perform a brute force attack on wifi, trust us.
Software
Hardcore
You are a seasoned hacker or really want to dive into this.
Kali linux is an open-source, Debian-based Linux distribution geared towards security tasks, such as Penetration Testing and Security Research.
Metasploit is the world’s most used penetration testing framework.
You can install this on Windows!
Docker
There is a Docker image for pretty much all the tools you’ll need.
Already install Docker for Windows and download the Docker images at home!
docker pull instrumentisto/nmap
docker pull paoloo/sqlmap
docker pull vanhauser/hydra
docker pull adminer
docker pull mongoclient/mongoclient
docker pull rediscommander/redis-commander
docker pull jrottenberg/ffmpeg
Manual Install
- Postman: fabricating requests is necessary for certain hacks!
- Database tools: Compass (mongo), HeidiSQL (mysql), AnotherRedisDesktopManager (redis)
- Hacking tools: nmap, Hydra, sqlmap, ffmpeg
Tools
See “ALSO IN THIS SERIES” for our specific blog posts on using nmap, hydra and sqlmap.
Chrome Dev Tools
Open Dev Tools with F12.
The following tabs will be interesting for the bootcamp:
- Application > “Local Storage”
- token: Your JWT token
- user: Your details
- Network
- Many hacks are performed by doing a Http request.
- The flag is typically in the Response of such request!
- Interesting options
- Fetch/XHR: this is what we’re interested in
- Preserve log: do not purge the list when the page is refreshed
- Interesting request details
- Headers > Request Url: to see query string arguments
- Payload: the body sent with the request
- Response: the reply from the server
- Console
- Interesting logs or errors may show up here
You could also monitor network traffic with a tool like Fiddler or Wireshark
The Game
The Portal
If you are unsure how to get started
- Explore The Portal website
- Make sure to update your settings after logging in 😉
- Visit the “Hacks Overview” page from the portal for extra tips
- Run an
nmap
scan on the server the Portal is served from to discover more
In-Game Blogs
As part of the Security Bootcamp, two (vulnerable) Wordpress blogs are spinned up, visit them from the Portal for more useful information:
The Hacker’s Toolkit Blog contains posts on hacking tools and general info on JWT, Capturing Flags and more
The Security Audit Blog contains clues for the treasure hunts.
The Flags
Just performing a certain hack does not score points, you have to locate the flag that is revealed by the hack.
Make sure to check the response body after you have performed a hack 😉
The following case-sensitive regex will match a flag:
[A-Z]{2,5}-[a-zA-Z0-9. -]{4,50}
Other things that score points:
- The API key of another player not in your team
- The JWT token of another player not in your team
Check the blog post in the The Hacker’s Toolkit Blog ingame for more info!
The Vault
The Vault is where Alexander Cipher has hidden our precious zip.
It is the end game and will open on friday 22 March at 11AM.
But you can continue playing until friday 22 March at 5PM, when the winners
will be announced.
Many of the flags found in the game are somehow encrypted with simple ciphers.
Attempt to open the Vault by entering all your decrypted flags as passphrase and score Vault multipliers.
Beware, incorrectly decrypted flags will cost points!
Check the blog post in the The Hacker’s Toolkit Blog ingame for more info!