Commit 8bce4d4
Changed files (6)
docker/files/bchd/flag.txt
@@ -0,0 +1,1 @@
+{BOO:59797335-6254-40bd-813b-e3f655f702c3}
docker-compose.yml
@@ -1,12 +1,6 @@
version: '3.2'
networks:
- bchd:
- driver: bridge
- ipam:
- driver: default
- config:
- - subnet: 201.200.200.0/24
internet:
driver: bridge
ipam:
questions.md
@@ -1,4 +0,0 @@
-# Questions
-
-- Can you launch containers in a large network with actually ranomly assigned IPs?
- The default behavior is to give the ips out sequentually, I want random :(
README.md
@@ -36,65 +36,6 @@ prepared to effectively train on Sun.
[Form Link](https://forms.microsoft.com/Pages/ResponsePage.aspx?id=s_usIb4yFUeQJR4vAVy76UEnk2chioJPhEwjXFMOazdUOFYzSExKU1VYVlcxVzdXTFNRMTdBMzdDWC4u)
-## Networks
-
-### Original PCTE network
-| Name | First Interface | Second Interface |
-|----------------------|-----------------|------------------|
-| redirector | 200.200.200.101 | |
-| yachtzee-edge-router | 172.16.0.1 | 200.200.200.1 |
-| yachtzee-firewall | 172.16.0.2 | 172.16.0.5 |
-| yachtzee-core-router | 172.16.0.6 | 172.16.2.1 |
-| yachtzee-server-1 | 172.16.2.100 | 10.10.10.44 |
-| yachtzee-server-2 | 10.10.10.55 | 192.168.200.66 |
-| yachtzee-server-3 | 192.168.200.89 | |
-
-### Supporting software
+## Supporting software
sudo apt install docker.io docker-compose
-### New Networks
-| Name | Subnet/Mask | Spooky Level |
-|---------------------------|------------------|--------------|
-| Home base | 201.200.200.0/24 | Not Spooky |
-| Trick-or-Treat (Internet) | 200.200.200.0/24 | Spoopy |
-| Halloween Party | 172.16.2.0/24 | P Spoopy |
-| Back Yard Cemetary | 10.10.10.0/24 | Spooky |
-| Crypt | 192.168.200.0/24 | 2Spooky |
-
-### New hosts
-| Name | First Interface | Second Interface |
-|--------------------------|-----------------|------------------|
-| beachheads | 200.200.200.X | |
-| redirectors | 200.X.X.X | |
-| yachtzee-router-firewall | 172.16.2.1 | 200.200.200.1 |
-| yachtzee-server-1 | 172.16.2.100 | 10.10.10.44 |
-| yachtzee-server-2 | 10.10.10.55 | 192.168.200.66 |
-| yachtzee-server-3 | 192.168.200.89 | |
-
-
-# scenario
-beachhead:
- - gotty, 200.200.200.X
- - throwaway BOO flag
- - zombiemap binary in home dir (zmap)
- - some file based puzzle to get IP of the party's (must be through redirectors)
-
-redirectors:
- - port scan required to find the service, known password
-
-router-firewall:
- - no shell, only port forward via key
- - proxychains nmap syn scan for next
-
-server-1:
- - is getting connected to by a random connection / random port
- - port foward back to nc to get details of next and flag
- - gateway ports
-
-server-2:
- - ssh user + key
- - is getting connected to by a ssh client (you know the public key and user)
-
-server-3:
- - ssh user + key
-
scenario.md
@@ -0,0 +1,75 @@
+## Networks/Hosts
+
+### New Networks
+| Name | Subnet/Mask | Spooky Level |
+|---------------------------|------------------|--------------|
+| Trick-or-Treat (Internet) | 200.200.200.0/24 | Spoopy |
+| Halloween Party | 172.16.2.0/24 | P Spoopy |
+| Back Yard Cemetary | 10.10.10.0/24 | Spooky |
+| Crypt | 192.168.200.0/24 | 2Spooky |
+
+### New hosts
+| Name | First Interface | Second Interface |
+|--------------------------|-----------------|------------------|
+| beachheads&redirectors | 200.200.200.X | |
+| yachtzee-router-firewall | 172.16.2.1 | 200.200.200.1 |
+| yachtzee-server-1 | 172.16.2.100 | 10.10.10.44 |
+| yachtzee-server-2 | 10.10.10.55 | 192.168.200.66 |
+| yachtzee-server-3 | 192.168.200.89 | |
+
+## Scenario
+beachhead:
+ - gotty, 200.200.200.X, assigned per user/team
+ - throwaway BOO flag in ~/flag.txt
+ {BOO:59797335-6254-40bd-813b-e3f655f702c3}
+ - some file based puzzle to get IP of the party's (must be through redirectors)
+
+redirectors:
+ - port scan required to find the service, known password
+ - ~/flag.txt
+ {BOO:91596f7d-88f1-454f-82ba-3d61c48b2e73}
+ - /tmp/flag.txt
+ {BOO:668084b2-c340-46c3-b8d4-945db6e7cc0b}
+
+router-firewall:
+ - no shell, only port forward via key
+ - /bin/nope shell
+ {BOO:4636fdbb-adc1-48f1-8b3e-d8657dea2ba0}
+ - proxychains nmap syn scan for next
+
+server-1:
+ - MOTD
+ {BOO:dc22e9db-9225-4082-b7ed-78f08784fd54}
+ - /etc/flag.d/flag.txt
+ {BOO:8e75a07e-48ad-4b5a-b5a9-9795141f3942}
+ - gateway ports = true
+ comment on /etc/ssh/sshd_config
+ {BOO:e9d5e38d-8179-4e06-93ca-d5cce06c2099}
+ - getting periodically connected to on port 1031
+ - port foward back to nc to get details of next and flag
+ {BOO:96239742-a253-40e8-bbb0-fba44b230cee}
+
+server-2:
+ - access: found username and key
+ - MOTD
+ {BOO:72d0e731-b6ef-4e43-843a-5dc57068ae6e}
+ - note-to-self.txt
+ contains public key of user and flag
+ {BOO:56010379-ba1d-4f09-8f69-3e93860d6191}
+ - getting connected to by a ssh client
+ upon successful connection runs printf command user+key+flag
+ {BOO:20b2523a-1f11-46e8-beed-d40bba98aab0}
+
+server-3:
+ - access: found username and key
+ - MOTD
+ {BOO:6132ef35-172c-45aa-b950-a8b50035ed6c}
+ - Final flag
+ flag.txt
+ {BOO:88c905ce-f09c-4d34-a2ea-25976016e91f}
+
+
+
+#### flag generateor
+>>> import uuid
+>>> for _ in range(1,49): print("{"+f"BOO:{str(uuid.uuid4())}"+"}")
timeline.md
@@ -0,0 +1,26 @@
+
+## Timeline
+
+#### 0700 arrive in channel
+
+ Get people:
+ - Into CTFd
+ - Assigned a bchd
+ - Aware of schedule
+
+#### 0900 Kickoff video calls
+
+ - Talk about schedule
+ - Talk about access to bchds and assignments
+ - Talk about shared hosting and being nice to the VPS
+ - Brief slides
+
+#### 1100 First Demo Session
+
+#### 1200 Demo Session
+
+#### 1300 Demo Session
+
+#### 1400 Demo Session
+
+#### 1500 Last Demo Session