Code Monkey home page Code Monkey logo

offensive_technologies_ctf's People

Contributors

c19h2602 avatar francolmenar avatar frapava98 avatar raluca-b avatar

Watchers

 avatar

offensive_technologies_ctf's Issues

Milestone 3 - Blue

Extend your monitoring software so you can automatically get statistics on number of packets and bytes sent to the server in TCP data, TCP SYN, UDP and ICMP and Total categories so you can diagnose various DDoS attacks. Make sure the software monitors the correct interface.

Milestone 1 - Blue

Develop monitoring at the server that will let you automatically check the content of HTTP requests you are getting and who is sending them.

Fix SlowLoris attack - Blue team

SlowLoris attack => keeps the server's resource pool busy by slowly submitting requests with headers and never finishing.

Script needs to be improved => maybe add multithreading ?? Possible defense: reqtimeout module

Milestone 4 - Blue

Extend your monitoring software so you can detect number of packets and bytes sent to the server by each client IP. Make sure the software monitors the correct interface.

Milestone 5 - Blue Team

Learn how you would write rules for iptables to filter traffic with some characteristics, e.g., by protocol, sender IP, length, TCP flags, etc.

You may need to write those rules manually during the exercise but make sure you have tried to write them while preparing for the exercise and that they work correctly.

You can check correctness by generating attack traffic with some signature (e.g., packet length, sender IP, protocol, etc.), writing a rule to filter it and checking that that traffic is dropped.

You can check for drops in two ways. First, you could run your monitoring software on the interface leading to the server. Second, you could use an option with iptables that lets you see counts of times a rule was matched.

It may be advisable to try both methods for measuring correctness as the first measures what goes to the server and the second shows you that the rule was activated by attack traffic

Implement Authentication

To check it, verify that it's not possible to deposit and withdraw from any user by specifying a random password.

Extend the DB monitoring

It checks the correctness of the data stored at the DB.

It is optional but I think it would be useful.

Fix GoldenEye - Blue Team

GoldenEye => keeps the server's connections alive by using HTTP Keep Alive + No Cache as attack vector. Possible defense:

use hash limit in ip tables
use snort rules to block Keep-Alive and No Cache

Join setup scripts for the server

Integrate setup/server_iptables_setup.sh, setup/setup.sh and server/set_up_server.sh into the same script.

Add flags options to be able to define if all the scripts are going to be run or just some of them.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.