Capture The Flag BugCon 09

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

Capture The Flag!

By Alex Hernández aka alt3kx

Date: 13.08.009
Copyright (c) SybSecurity Research Labs 2009
Cyber Infrastructure

• Network Users: 192.168.1.X


• Mask: 255.255.255.0
• GW: 192.168.1.254
• DNS: Not Necessary
Targets ?
192.168.1.10

• Stage One 1: Bypass my Ass!


• Instructions: pwn3d the server (deface
index.htm)
• OS: Windows 2003 Server (Enterprise Edition)
• IP: 192.168.1.10
• WebApp: Microsoft IIS 6.0
• Clue: Think clearly and obvious ways...
• Value: 5 Points
192.168.1.11

• Stage Two 2: The d00rs are open...


• Instructions: pwn3d the server (deface
index.html)
• OS: Windows 2003 Server (Enterprise Edition)
• IP: 192.168.1.11
• WebApp: Sun ONE Web Server 6.1 (win32)
• Clue: Two exclusive ports follow the clues...
• Value: 4 Points
192.168.1.12

• Stage Three 3: Looking local job...


• Instructions: pwn3d the server (deface
index.php)
• OS: Windows 2003 Server (Enterprise Edition)
• IP: 192.168.1.12
• WebApp: Apache/2.0.55 PHP 5.1.1 (win32)
• Clue: Gifnoc! Gifnoc! Dptth.Gifnoc once again
dude...
• Value: 3 Points
192.168.1.13

• Stage Four 4: The Big Lamme...


• Instructions: pwn3d the server (deface
index.htm)
• OS: Windows 2000 Server SP4
• IP: 192.168.1.13
• WebApp: Microsoft IIS 5.0
• Clue: Nah! very easy...
• Value: 1 Point
Where?
Lab: Capture The Flag
Prizes?
First Prize: Books and T-shirts
Second Prize: Souvenirs BugCon (Sponsors)
Third Prize: Souvenirs BugCon (Sponsors)
Let’s go hax0rs…

You might also like