From adb0c6fa86e051352dcaa3effa1684cfd7191b33 Mon Sep 17 00:00:00 2001 From: Jason Zeller Date: Wed, 13 Mar 2019 18:07:48 -0500 Subject: [PATCH] Create example scenarios for pcap and zip. --- Gemfile | 1 + Gemfile.lock | 4 ++ .../unix/ctf/pcap_file/secgen_metadata.xml | 4 +- .../unix/ctf/zip_file/secgen_metadata.xml | 4 +- .../ctf_module_examples/pcap_file.xml | 43 ++++++++++++++++ .../ctf_module_examples/zip_file.xml | 50 +++++++++++++++++++ 6 files changed, 104 insertions(+), 2 deletions(-) create mode 100644 scenarios/examples/vulnerability_examples/ctf_module_examples/pcap_file.xml create mode 100644 scenarios/examples/vulnerability_examples/ctf_module_examples/zip_file.xml diff --git a/Gemfile b/Gemfile index bc9ba0183..df606e27e 100644 --- a/Gemfile +++ b/Gemfile @@ -33,6 +33,7 @@ gem 'ruby-graphviz' gem 'rsa' gem 'gpgmeh' gem 'digest-sha3', :git => "http://github.com/izetex/digest-sha3-ruby" +gem 'packetfu' #development only gems go here group :test, :development do diff --git a/Gemfile.lock b/Gemfile.lock index 214c26f37..1d2fd36da 100644 --- a/Gemfile.lock +++ b/Gemfile.lock @@ -91,6 +91,9 @@ GEM nori (2.6.0) ovirt-engine-sdk (4.2.4) json (>= 1, < 3) + packetfu (1.1.11) + pcaprub (~> 0.12) + pcaprub (0.12.4) pg (1.1.3) process_helper (0.1.2) puppet (6.0.0) @@ -162,6 +165,7 @@ DEPENDENCIES nokogiri nori ovirt-engine-sdk + packetfu pg process_helper programr! diff --git a/modules/vulnerabilities/unix/ctf/pcap_file/secgen_metadata.xml b/modules/vulnerabilities/unix/ctf/pcap_file/secgen_metadata.xml index c4b9243d1..1ea1a9e5a 100644 --- a/modules/vulnerabilities/unix/ctf/pcap_file/secgen_metadata.xml +++ b/modules/vulnerabilities/unix/ctf/pcap_file/secgen_metadata.xml @@ -6,7 +6,9 @@ pcap file Jason Zeller MIT - Release a pcap file with a flag generated somewhere. + Release a pcap file with a flag, into storage_directory. + Can specify an account file is owned by or defaults to root. + pcap system diff --git a/modules/vulnerabilities/unix/ctf/zip_file/secgen_metadata.xml b/modules/vulnerabilities/unix/ctf/zip_file/secgen_metadata.xml index 19aecc24b..aab093d2b 100644 --- a/modules/vulnerabilities/unix/ctf/zip_file/secgen_metadata.xml +++ b/modules/vulnerabilities/unix/ctf/zip_file/secgen_metadata.xml @@ -6,7 +6,9 @@ Zip File Jason Zeller MIT - Release a zip file with a flag. Password optional. + Release a zip file with a flag. Password optional. + Can specify an account file is owned by or defaults to root. + zip_file system diff --git a/scenarios/examples/vulnerability_examples/ctf_module_examples/pcap_file.xml b/scenarios/examples/vulnerability_examples/ctf_module_examples/pcap_file.xml new file mode 100644 index 000000000..a37752f67 --- /dev/null +++ b/scenarios/examples/vulnerability_examples/ctf_module_examples/pcap_file.xml @@ -0,0 +1,43 @@ + + + + + pcap_file Example + Jason Zeller + + + This scenario demonstrates leaking a pcap file with a flag embedded and cleartext. + + + ctf + easy + + + server + + + + + + + + + + ******SECRET*******From now on, make sure that all network traffic is properly encrypted.******SECRET****** + + + + + + capture.pcap + + + /var/log + + + + + + diff --git a/scenarios/examples/vulnerability_examples/ctf_module_examples/zip_file.xml b/scenarios/examples/vulnerability_examples/ctf_module_examples/zip_file.xml new file mode 100644 index 000000000..6447b17dd --- /dev/null +++ b/scenarios/examples/vulnerability_examples/ctf_module_examples/zip_file.xml @@ -0,0 +1,50 @@ + + + + + zip_file Example + Jason Zeller + + + This scenario demonstrates leaking a zip file with a flag embedded and zip can be password protected. + + + ctf + easy + + + server + + + + + + + + + + jtrpassword.lst + + + + + + + Congratulations you have cracked our protected zip file. We wish there was more information here but we are just not that smart. Here is a flag for your troubles. + + + + + + protected.zip + + + /var/log + + + + + +