Commit 8bce4d4

bryfry <bryon.fryer@gmail.com>
2020-10-04 01:41:04
more scenario updates
1 parent 2ae1a8c
docker/files/bchd/flag.txt
@@ -0,0 +1,1 @@
+{BOO:59797335-6254-40bd-813b-e3f655f702c3}
docker-compose.yml
@@ -1,12 +1,6 @@
 version: '3.2'
 
 networks:
-  bchd:
-    driver: bridge
-    ipam:
-      driver: default
-      config: 
-        - subnet: 201.200.200.0/24
   internet:
     driver: bridge
     ipam:
questions.md
@@ -1,4 +0,0 @@
-# Questions
-
-- Can you launch containers in a large network with actually ranomly assigned IPs?
-  The default behavior is to give the ips out sequentually, I want random :(
README.md
@@ -36,65 +36,6 @@ prepared to effectively train on Sun.
 
 [Form Link](https://forms.microsoft.com/Pages/ResponsePage.aspx?id=s_usIb4yFUeQJR4vAVy76UEnk2chioJPhEwjXFMOazdUOFYzSExKU1VYVlcxVzdXTFNRMTdBMzdDWC4u)
 
-## Networks
-
-### Original PCTE network
-| Name                 | First Interface | Second Interface |
-|----------------------|-----------------|------------------|
-| redirector           | 200.200.200.101 |                  |
-| yachtzee-edge-router | 172.16.0.1      | 200.200.200.1    |
-| yachtzee-firewall    | 172.16.0.2      | 172.16.0.5       |
-| yachtzee-core-router | 172.16.0.6      | 172.16.2.1       |
-| yachtzee-server-1    | 172.16.2.100    | 10.10.10.44      | 
-| yachtzee-server-2    | 10.10.10.55     | 192.168.200.66   |
-| yachtzee-server-3    | 192.168.200.89  |                  |
-
-### Supporting software
+## Supporting software
 sudo apt install docker.io docker-compose
 
-### New Networks
-| Name                      | Subnet/Mask      | Spooky Level |
-|---------------------------|------------------|--------------|
-| Home base                 | 201.200.200.0/24 | Not Spooky   |
-| Trick-or-Treat (Internet) | 200.200.200.0/24 | Spoopy       |
-| Halloween Party           | 172.16.2.0/24    | P Spoopy     |
-| Back Yard Cemetary        | 10.10.10.0/24    | Spooky       |
-| Crypt                     | 192.168.200.0/24 | 2Spooky      |
-
-### New hosts
-| Name                     | First Interface | Second Interface |
-|--------------------------|-----------------|------------------|
-| beachheads               | 200.200.200.X   |                  |
-| redirectors              | 200.X.X.X       |                  |
-| yachtzee-router-firewall | 172.16.2.1      | 200.200.200.1    |
-| yachtzee-server-1        | 172.16.2.100    | 10.10.10.44      | 
-| yachtzee-server-2        | 10.10.10.55     | 192.168.200.66   |
-| yachtzee-server-3        | 192.168.200.89  |                  |
-
-
-# scenario
-beachhead:
- - gotty, 200.200.200.X
- - throwaway BOO flag
- - zombiemap binary in home dir (zmap)
- - some file based puzzle to get IP of the party's (must be through redirectors)
-
-redirectors:
- - port scan required to find the service, known password
-
-router-firewall:
- - no shell, only port forward via key
- - proxychains nmap syn scan for next 
-
-server-1:
- - is getting connected to by a random connection / random port
- - port foward back to nc to get details of next and flag
- - gateway ports
-
-server-2:
- - ssh user + key
- - is getting connected to by a ssh client (you know the public key and user)
-
-server-3:
- - ssh user + key
-
scenario.md
@@ -0,0 +1,75 @@
+## Networks/Hosts
+
+### New Networks
+| Name                      | Subnet/Mask      | Spooky Level |
+|---------------------------|------------------|--------------|
+| Trick-or-Treat (Internet) | 200.200.200.0/24 | Spoopy       |
+| Halloween Party           | 172.16.2.0/24    | P Spoopy     |
+| Back Yard Cemetary        | 10.10.10.0/24    | Spooky       |
+| Crypt                     | 192.168.200.0/24 | 2Spooky      |
+
+### New hosts
+| Name                     | First Interface | Second Interface |
+|--------------------------|-----------------|------------------|
+| beachheads&redirectors   | 200.200.200.X   |                  |
+| yachtzee-router-firewall | 172.16.2.1      | 200.200.200.1    |
+| yachtzee-server-1        | 172.16.2.100    | 10.10.10.44      | 
+| yachtzee-server-2        | 10.10.10.55     | 192.168.200.66   |
+| yachtzee-server-3        | 192.168.200.89  |                  |
+
+## Scenario
+beachhead:
+ - gotty, 200.200.200.X, assigned per user/team
+ - throwaway BOO flag in ~/flag.txt 
+   {BOO:59797335-6254-40bd-813b-e3f655f702c3}
+ - some file based puzzle to get IP of the party's (must be through redirectors)
+
+redirectors:
+ - port scan required to find the service, known password
+ - ~/flag.txt
+   {BOO:91596f7d-88f1-454f-82ba-3d61c48b2e73}
+ - /tmp/flag.txt
+   {BOO:668084b2-c340-46c3-b8d4-945db6e7cc0b}
+
+router-firewall:
+ - no shell, only port forward via key
+ - /bin/nope shell
+   {BOO:4636fdbb-adc1-48f1-8b3e-d8657dea2ba0}
+ - proxychains nmap syn scan for next 
+
+server-1:
+ - MOTD
+   {BOO:dc22e9db-9225-4082-b7ed-78f08784fd54}
+ - /etc/flag.d/flag.txt
+   {BOO:8e75a07e-48ad-4b5a-b5a9-9795141f3942}
+ - gateway ports = true
+   comment on /etc/ssh/sshd_config
+   {BOO:e9d5e38d-8179-4e06-93ca-d5cce06c2099}
+ - getting periodically connected to on port 1031
+ - port foward back to nc to get details of next and flag
+   {BOO:96239742-a253-40e8-bbb0-fba44b230cee}
+
+server-2:
+ - access: found username and key
+ - MOTD
+   {BOO:72d0e731-b6ef-4e43-843a-5dc57068ae6e}
+ - note-to-self.txt
+   contains public key of user and flag
+   {BOO:56010379-ba1d-4f09-8f69-3e93860d6191}
+ - getting connected to by a ssh client
+   upon successful connection runs printf command user+key+flag
+   {BOO:20b2523a-1f11-46e8-beed-d40bba98aab0}
+
+server-3:
+ - access: found username and key
+ - MOTD
+   {BOO:6132ef35-172c-45aa-b950-a8b50035ed6c}
+ - Final flag
+   flag.txt
+   {BOO:88c905ce-f09c-4d34-a2ea-25976016e91f}
+
+
+
+#### flag generateor
+>>> import uuid
+>>> for _ in range(1,49): print("{"+f"BOO:{str(uuid.uuid4())}"+"}")
timeline.md
@@ -0,0 +1,26 @@
+
+## Timeline
+
+#### 0700 arrive in channel
+
+  Get people:
+  - Into CTFd
+  - Assigned a bchd
+  - Aware of schedule
+
+#### 0900 Kickoff video calls
+
+  - Talk about schedule
+  - Talk about access to bchds and assignments
+  - Talk about shared hosting and being nice to the VPS
+  - Brief slides
+
+#### 1100 First Demo Session
+
+#### 1200 Demo Session
+ 
+#### 1300 Demo Session
+
+#### 1400 Demo Session
+ 
+#### 1500 Last  Demo Session