This shows you the differences between two versions of the page.
| 
    isc:labs:01 [2024/10/06 18:51] alexandru.mircea98  | 
    
    isc:labs:01 [2025/10/06 13:11] (current) florin.stancu [Useful Tools]  | 
    ||
|---|---|---|---|
| Line 7: | Line 7: | ||
| * Introduction to Python scripting | * Introduction to Python scripting | ||
| * Introduction to basic security-related tools | * Introduction to basic security-related tools | ||
| + |  | ||
| + | ===== Useful Tools ===== | ||
| + | * man | ||
| + | * find | ||
| + | * base64 | ||
| + | * hexedit | ||
| + | * Binwalk | ||
| + | * john, zip2john | ||
| + | * xxd | ||
| + | * gzip, bzip2, tar | ||
| + | * [[https://gchq.github.io/CyberChef/|CyberChef]] | ||
| ===== Preparation ===== | ===== Preparation ===== | ||
| - | You may use the UPB's [[https://cloud.grid.pub.ro|OpenStack cloud to instantiate a Virtual Machine]] to be used for this lab! | + | You may use the UPB's OpenStack cloud to spawn a Virtual Machine to be used for this lab! | 
| - | [[:isc:info:virtualmachine|Read these instructions if you wanna know how!]]. | + | [[:isc:info:virtualmachine|Read this guide]]. | 
| - | + | ||
| - | + | ||
| - | <hidden> | + | |
| - | - Log in with your LDAP credentials | + | |
| - | - Create a RSA key pair on //fep.grid.pub.ro// (ssh LDAP-USERNAME@fep.grid.pub.ro; ssh-keygen -t rsa -b 4096 -C "your_email@example.com") | + | |
| - | - Make sure you have the public key configured on openstack in Project -> Compute -> Key Pairs | + | |
| - | * Passphrase authentication will be disabled on the SSH server | + | |
| - | * The key that you provide will be automatically registered in //.ssh/authorized_keys// | + | |
| - | - Create a new Instance with the following parameters: | + | |
| - | * Flavor: m1.small | + | |
| - | * Instance Boot Source: Boot from image | + | |
| - | * Source (Image): ISC 2022 | + | |
| - | * Network: vlan9 | + | |
| - | * Key Pair: the one you just added | + | |
| - | * **NOTE:** if you have //only one// key pair configured, it will be chosen by default; otherwise, make sure you don't skip this step | + | |
| - | - From the fep console (ssh) login into the newly created VM (ssh student@VM-IP) | + | |
| - | + | ||
| - | </hidden> | + | |
| {{page>:isc:rec&nofooter&noeditbutton}} | {{page>:isc:rec&nofooter&noeditbutton}} | ||
| Line 75: | Line 68: | ||
| * **Hint:** hexdump, man | * **Hint:** hexdump, man | ||
| + | ==== 09 [bonus]. Web Fuzzer ==== | ||
| + | * Start this task by opening a specific docker container on your VM: <code bash> | ||
| + | docker run -d -p 8080:80 ghcr.io/cs-pub-ro/isc-lab-intro-web | ||
| + | </code> | ||
| + | * You can now access a webserver on local port 8080 (try it with ''curl localhost:8080''). Your task is to retrieve the hidden flag by trying all web paths inside the given wordlist (write your own fuzzer in Python, check the lab archive for resources!). | ||
| + | * //Hint//: use the [[https://requests.readthedocs.io/en/latest/|Python requests]] library to issue web requests! Check their HTTP status code to know when you successfully found an existing web file ;) | ||
| ===== Feedback ===== | ===== Feedback ===== | ||
| {{page>:isc:lab-feedback&nofooter&noeditbutton}} | {{page>:isc:lab-feedback&nofooter&noeditbutton}} | ||
| + | |||