From 68f91ee1e4bc9f2ea55006985cb0e7ec3490f330 Mon Sep 17 00:00:00 2001 From: JD Date: Thu, 27 Apr 2023 16:30:27 +0100 Subject: [PATCH] Add couchdb CTF Scenario --- scenarios/ctf/erlang_explosion.xml | 105 +++++++++++++++++++++++++++++ 1 file changed, 105 insertions(+) create mode 100644 scenarios/ctf/erlang_explosion.xml diff --git a/scenarios/ctf/erlang_explosion.xml b/scenarios/ctf/erlang_explosion.xml new file mode 100644 index 000000000..0e4975248 --- /dev/null +++ b/scenarios/ctf/erlang_explosion.xml @@ -0,0 +1,105 @@ + + + + + Erlang Explosion + James Davis + + A vulnerable service utilises erlang that has a fatal flaw. + Exploit the server and get root access. + + + ctf + attack-ctf + intermediate + + + server-side misconfiguration and vulnerable components + Vulnerable defaults + + + EXPLOITATION + EXPLOITATION FRAMEWORKS + + + CVEs and CWEs + + + PENETRATION TESTING - SOFTWARE TOOLS + PENETRATION TESTING - ACTIVE PENETRATION + + + + access control + Elevated privileges + Vulnerabilities and attacks on access control misconfigurations + + + Access controls and operating systems + Linux security model + Attacks against SUID + + + + + server + + + + + + + + + + + + + + + + + + + + IP_addresses + + + + + + attack_vm + + + + + 172.16.0.2 + + 172.16.0.3 + + + + + + {"username":"root","password":"toor","super_user":"","strings_to_leak":[],"leaked_filenames":[]} + + + false + + + + + + + + + + + IP_addresses + + + + + \ No newline at end of file