diff --git a/scenarios/ctf/feeling_blu.xml b/scenarios/ctf/feeling_blu.xml index 91f135042..1f1887ee2 100644 --- a/scenarios/ctf/feeling_blu.xml +++ b/scenarios/ctf/feeling_blu.xml @@ -174,8 +174,9 @@ password - Username + Creds: organisation + password diff --git a/scenarios/ctf/feeling_blu_brute.xml b/scenarios/ctf/feeling_blu_brute.xml new file mode 100644 index 000000000..91f135042 --- /dev/null +++ b/scenarios/ctf/feeling_blu_brute.xml @@ -0,0 +1,227 @@ + + + + + Feeling Blu + Z. Cliffe Schreuders + Hack the web_server from kali. + + + ctf + attack-ctf + pwn-ctf + medium + + + + authentication + passwords and alternatives + + + user authentication + BRUTEFORCE + + + server-side misconfiguration and vulnerable components + FILE UPLOAD VULNERABILITY + + + EXPLOITATION + EXPLOITATION FRAMEWORKS + + + CVEs and CWEs + + + PENETRATION TESTING - SOFTWARE TOOLS + PENETRATION TESTING - ACTIVE PENETRATION + + + + + access control + Elevated privileges + Vulnerabilities and attacks on access control misconfigurations + + + Access controls and operating systems + Linux security model + Attacks against SUDO + + + + kill chains + + + cyber kill chain + + + + + symmetric encryption and authentication + + + BRUTEFORCE + + + + + attack_vm + + + + + + 172.16.0.2 + + 172.16.0.3 + + + + + {"username":"kali","password":"kali","super_user":"true","strings_to_leak":[],"leaked_filenames":[]} + + + + + + {"username":"kali","password":"kali","super_user":"true","strings_to_leak":[],"leaked_filenames":[]} + + + false + + + + + + + + + IP_addresses + + + + + + + + spoiler_admin_pass + + + + + + web_server + + + + + + lib/resources/structured_content/organisations/json_organisations + + + + + + + + + wordlist + + + 6 + + + + + + + + + + + organisation + + + password + + + false + + + flag + + + + + + + + + + + + + + organisation + + + organisation + + + password + + + Username + organisation + + + + + + + + + + + + + + + + + + organisation + + + + + Congratulations you have cracked our protected zip file. Here is a flag for your troubles. + + + + + + whatsmyname.zip + + + /root + + + + + + + IP_addresses + + + + + spoiler_admin_pass + + + + + diff --git a/scenarios/labs/introducing_attacks/8_vulnerability_analysis.xml b/scenarios/labs/introducing_attacks/8_vulnerability_analysis.xml index 29e4c3336..e62b52b3f 100644 --- a/scenarios/labs/introducing_attacks/8_vulnerability_analysis.xml +++ b/scenarios/labs/introducing_attacks/8_vulnerability_analysis.xml @@ -41,15 +41,6 @@ Throughout this lab, you will learn how to use Nmap and its Nmap scripting engin 172.16.0.3 - - - - - - - flag - - @@ -60,7 +51,7 @@ Throughout this lab, you will learn how to use Nmap and its Nmap scripting engin - + IP_addresses @@ -68,6 +59,15 @@ Throughout this lab, you will learn how to use Nmap and its Nmap scripting engin + + + + + + + flag + +