Add <hint> links to generator and encoder challenge modules including schema change to include <hint> tags.

Added exif_metadata scenario.
This commit is contained in:
thomashaw
2017-05-02 14:42:03 +01:00
parent 815a5915e6
commit bacd0b5f78
12 changed files with 56 additions and 8 deletions

View File

@@ -35,6 +35,7 @@
<xs:element name="reference" type="xs:string" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="software_name" type="xs:string" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="software_license" type="xs:string" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="hint" type="xs:string" minOccurs="0" maxOccurs="1"/>
<!--I/O: an encoder writes it's output to one fact, and reads from one or more-->
<xs:element name="read_fact" type="xs:string" minOccurs="1" maxOccurs="unbounded"/>

View File

@@ -35,6 +35,7 @@
<xs:element name="reference" type="xs:string" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="software_name" type="xs:string" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="software_license" type="xs:string" minOccurs="0" maxOccurs="unbounded"/>
<xs:element name="hint" type="xs:string" minOccurs="0" maxOccurs="1"/>
<!--I/O: a generator writes it's output to one fact & can also take inputs-->
<xs:element name="read_fact" type="xs:string" minOccurs="0" maxOccurs="unbounded"/>

View File

@@ -17,6 +17,10 @@
<platform>linux</platform>
<platform>windows</platform>
<hint>Encoded with a rotation cipher based on the ASCII value. Uses the 94 printable ascii characters.
Decoding tools are available online e.g. http://www.dcode.fr/rot-cipher
</hint>
<read_fact>strings_to_encode</read_fact>
<read_fact>shift_key</read_fact>

View File

@@ -16,6 +16,10 @@
<platform>linux</platform>
<platform>windows</platform>
<hint>Encoded with a rotation/shift cipher using a random key. Watch: https://www.youtube.com/watch?v=o6TPx1Co_wg
Decoding tools are available online e.g. http://www.dcode.fr/rot-cipher
</hint>
<read_fact>strings_to_encode</read_fact>
<read_fact>shift_key</read_fact>

View File

@@ -16,6 +16,10 @@
<reference>https://gist.github.com/mikedamage/105081</reference>
<hint>Morse code decoders are available online e.g. https://morsecode.scphillips.com/translator.html
Morse code has a single representation for parenthesis, the SecGen flag format uses curly braces. Replace them!
</hint>
<read_fact>strings_to_encode</read_fact>
<default_input into="strings_to_encode">

View File

@@ -23,6 +23,10 @@
<reference>http://www.cs.mtu.edu/~shene/NSF-4/Tutorial/VIG/Vig-Base.html</reference>
<reference>http://rosettacode.org/wiki/Vigen%C3%A8re_cipher#Ruby</reference>
<hint>Learn about Vigenere ciphers here: https://www.youtube.com/watch?v=zNO4PTlg62k
Decoding tools are available online e.g. http://www.dcode.fr/vigenere-cipher
</hint>
<read_fact>strings_to_encode</read_fact>
<read_fact>encryption_key</read_fact>

View File

@@ -17,7 +17,7 @@
<platform>linux</platform>
<platform>windows</platform>
<!--<hint>Take both binary strings and perform a bitwise XOR on them.</hint>-->
<hint>Take both binary strings and perform a bitwise XOR on them. - https://www.youtube.com/watch?v=YtghBxoBxpA</hint>
<read_fact>string_to_mask</read_fact>
<default_input into="string_to_mask">

View File

@@ -1,7 +1,7 @@
<?xml version="1.0"?>
<generator xmlns="http://www.github/cliffe/SecGen/generator"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/generator">
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/generator">
<name>Encoded Diff Challenge</name>
<author>Thomas Shaw</author>
<module_license>MIT</module_license>
@@ -14,6 +14,8 @@
<platform>linux</platform>
<hint>Sort the sets of strings, check if there are any differences in content and decode the hex.</hint>
<read_fact>random_data</read_fact>
<read_fact>strings_to_leak</read_fact>

View File

@@ -3,10 +3,10 @@
<generator xmlns="http://www.github/cliffe/SecGen/generator"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/generator">
<name>Exif</name>
<name>Image ith Modified EXIF Metadata</name>
<author>Thomas Shaw</author>
<module_license>MIT</module_license>
<description>TODO</description>
<description>Modifies an image's EXIF metadata to leak a string.</description>
<type>modified_exif</type>
<type>image_generator</type>
@@ -15,6 +15,10 @@
<platform>linux</platform>
<platform>windows</platform>
<hint>Use a tool to extract the metadata e.g. exiftool (http://www.sno.phy.queensu.ca/~phil/exiftool/) or
http://exifdata.com/
</hint>
<read_fact>base64_image</read_fact>
<read_fact>strings_to_leak</read_fact>
<read_fact>exif_field</read_fact>

View File

@@ -3,7 +3,7 @@
<generator xmlns="http://www.github/cliffe/SecGen/generator"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/generator">
<name>Hidden Data in Image File Challenge</name>
<name>Hidden Data in Image File</name>
<author>Thomas Shaw</author>
<module_license>MIT</module_license>
<description>Makes use of a random image, encodes a string_to_leak (flag) then inserts the data to decode into the end
@@ -17,7 +17,7 @@
<platform>linux</platform>
<platform>windows</platform>
<!--<hint>Look at the file's raw hex. Example tools: hexedit/hexeditor </hint>-->
<hint>Inspect the file's raw hex. Look at end for something to decode. Example tools: hexedit/hexeditor</hint>
<read_fact>base64_image</read_fact>
<read_fact>strings_to_leak</read_fact>

View File

@@ -15,12 +15,15 @@
<platform>linux</platform>
<platform>windows</platform>
<reference>https://github.com/whomwah/rqrcode</reference>
<hint>Use a QR reader mobile app or online decoder e.g. http://blog.qr4.nl/Online-QR-Code_decoder.aspx</hint>
<read_fact>strings_to_leak</read_fact>
<default_input into="strings_to_leak">
<generator type="flag_generator"/>
</default_input>
<!--<reference>https://github.com/whomwah/rqrcode</reference>-->
<output_type>base64_encoded_image</output_type>

View File

@@ -0,0 +1,21 @@
<?xml version="1.0"?>
<scenario xmlns="http://www.github/cliffe/SecGen/scenario"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/scenario">
<system>
<system_name>example_server</system_name>
<base platform="linux"/>
<!-- Generator which outputs an image with modified exif metadata code containing a flag. -->
<vulnerability read_fact="images_to_leak">
<input into="images_to_leak">
<generator type="modified_exif"/>
</input>
</vulnerability>
<network type="private_network" range="dhcp"/>
</system>
</scenario>