Compare commits

...

4 Commits

Author SHA1 Message Date
nprimo 0830838bfe docs(cybersecurity): add SHA1 for the newly added VM 2 weeks ago
nprimo 21fbea830d docs(cybersecurity): clarify that the extra VM provided are for Apple Silicon compatibility 2 weeks ago
nprimo 782f2c7dd6 docs(hole-in-bin): add UTM VM to the subject 2 weeks ago
nprimo 3baf13de6e docs(local): update subject adding utm VM link 2 weeks ago
  1. 7
      subjects/cybersecurity/hole-in-bin/README.md
  2. 16
      subjects/cybersecurity/hole-in-bin/audit/README.md
  3. 13
      subjects/cybersecurity/local/README.md
  4. 12
      subjects/cybersecurity/local/audit/README.md

7
subjects/cybersecurity/hole-in-bin/README.md

@ -1,4 +1,4 @@
# Hole-In-Bin
## Hole-In-Bin
<center>
<img src="./pictures/meme.png?raw=true" style = "width: 600px !important; height: 737px !important;"/>
@ -10,9 +10,10 @@ This exercise is designed to test your skills and understanding of binary exploi
### Setup
1. Download the virtual machine image [hole-in-bin.ova](https://assets.01-edu.org/cybersecurity/hole-in-bin/hole-in-bin.ova). This image contains all the binaries you will need to exploit.
1. Download the virtual machine image [hole-in-bin.ova](https://assets.01-edu.org/cybersecurity/hole-in-bin/hole-in-bin.ova). For machine running with Apple Silicon CPU or ARM architecture (e.g. M1, M2 ...) use the following [hole-in-bin.utm.zip](https://assets.01-edu.org/cybersecurity/hole-in-bin/hole-in-bin.utm.zip). This image contains all the binaries you will need to exploit.
SHA1: 7db09b7a8fdfe25c286561dfa7ca5b50718bd60c
SHA1 for `hole-in-bin.ova`: 7db09b7a8fdfe25c286561dfa7ca5b50718bd60c
SHA1 for `hole-in-bin.utm.zip`: fc93533b2054d10d03b09d53c223e57bf7ac7b62
2. Load the virtual machine image into your virtualization software of choice (e.g., VirtualBox, VMWare).

16
subjects/cybersecurity/hole-in-bin/audit/README.md

@ -7,11 +7,21 @@
###### Are all the required files present?
##### Setup the virtual machine:
##### Set up the virtual machine:
1. Download the virtual machine image [hole-in-bin.ova](https://assets.01-edu.org/cybersecurity/hole-in-bin/hole-in-bin.ova). This image contains all the binaries you will need for the audit.
1. Download the virtual machine image [hole-in-bin.ova](https://assets.01-edu.org/cybersecurity/hole-in-bin/hole-in-bin.ova).
For machine using Apple Silicon or equivalent get [hole-in-bin.utm.zip](https://assets.01-edu.org/cybersecurity/hole-in-bin/hole-in-bin.utm.zip).
This image contains all the binaries you will need for the audit.
SHA1: 7db09b7a8fdfe25c286561dfa7ca5b50718bd60c
SHA1 for `hole-in-bin.ova`: 7db09b7a8fdfe25c286561dfa7ca5b50718bd60c
SHA1 for `hole-in-bin.utm.zip`: fc93533b2054d10d03b09d53c223e57bf7ac7b62
> If it's already downloaded in the student machine, please check the SHA1 running the following command
```console
$ sha1sum <filename>
<SHA1>
```
2. Load the virtual machine image into your virtualization software of choice (e.g., VirtualBox, VMWare).

13
subjects/cybersecurity/local/README.md

@ -1,4 +1,4 @@
# Local
## Local
### Guideline
@ -7,14 +7,15 @@ You have to install it locally in VirtualBox And then found a way to go inside i
There will be no visible IP address, you must find a way to get it.
You have to become root and get the flag.
- [01-Local1.ova](https://assets.01-edu.org/cybersecurity/local/01-Local.ova)
- SHA1: f3422f3364fd38e8183740f8f57fa951d3f6e0bf
- [01-Local1.ova](https://assets.01-edu.org/cybersecurity/local/01-Local.ova). For machine running with Apple Silicon CPU or ARM architecture (e.g. M1, M2 ...) use the following [01-Local1.utm.zip](https://assets.01-edu.org/cybersecurity/local/01-Local1.utm.zip)
SHA1 for `01-Local1.ova`: f3422f3364fd38e8183740f8f57fa951d3f6e0bf
SHA1 for `01-Local1.utm.zip`: d4a40ca50044778ddc01a57ac16382e4140000e0
- The modification in GRUB or in the VM to get the root access is forbidden!
### Advice
https://en.wikipedia.org/wiki/Privilege_escalation
Read about [privilege escalation](https://en.wikipedia.org/wiki/Privilege_escalation).
### Submission and audit
@ -22,8 +23,8 @@ https://en.wikipedia.org/wiki/Privilege_escalation
Files that must be inside your repository:
- a README.md file, Which explains all the steps you went through in order to reach root access.
- A README.md file, Which explains all the steps you went through in order to reach root access.
Don’t hesitate to double check the names of your folders and files to ensure they are correct!
Don’t hesitate to double-check the names of your folders and files to ensure they are correct!
> ⚠ These methods and tools are for educational purposes only, so that you have a better understanding of how to protect against similar vulnerabilities. You must ensure that you do not attempt any exploit-type activity without the explicit permission of the owner of the machine, system or application. Failure to obtain permission risks breaking the law.

12
subjects/cybersecurity/local/audit/README.md

@ -12,17 +12,19 @@ Files that must be inside your repository:
###### Is the student able to explain clearly what Privilege Escalation means?
##### Install 01-Local1.ova in VirtualBox
##### Set up the virtual machine
Get [01-Local1.ova](https://assets.01-edu.org/cybersecurity/local/01-Local.ova)
Get [01-Local1.ova](https://assets.01-edu.org/cybersecurity/local/01-Local.ova).
For machine using Apple Silicon or equivalent get [01-Local1.utm.zip](https://assets.01-edu.org/cybersecurity/local/01-Local1.utm.zip).
The SHA1 is: f3422f3364fd38e8183740f8f57fa951d3f6e0bf
SHA1 for `01-Local1.ova`: f3422f3364fd38e8183740f8f57fa951d3f6e0bf
SHA1 for `01-Local1.utm.zip`: d4a40ca50044778ddc01a57ac16382e4140000e0
> If it's already downloaded in the student machine, please check the SHA1 running the following command
```console
$ sha1sum 01-Local1.ova
f3422f3364fd38e8183740f8f57fa951d3f6e0bf 01-Local1.ova
$ sha1sum <filename>
<SHA1>
```
###### Is the SHA1 the expected one?

Loading…
Cancel
Save