iTnews

Aussie exploit challenges for noob to leet

By Darren Pauli, SC Magazine on Dec 14, 2011 5:53PM
Aussie exploit challenges for noob to leet

Learn to beat Linux non-executable memory, ASLR, and stack smashing protection.

Linux security boffin Andrew Griffiths has launched series of educational hacking challenges that hone skills in privilege escalation, vulnerability analysis, exploit development, debugging and reverse engineering.

Griffiths is a veteran designer of capture the flag competitions: he ran the recent comp at Melbourne’s Ruxcon event, and popular OverTheWire Linux exploit challenges Vortex, Drifter and Blacksun.

He said the free exploit-exercises virtual machine challenges were developed bit by bit over the last few months.

The Nebula virtual machine was run at Ruxcon and designed to suit a wide infosec pallete.

“There were a variety of challenges available for people, from basic Linux commands, world readable files, shell tricks, scripting language vulnerabilities, password cracking, reconstructing a tcpdump packet capture, and basic reverse engineering / experimenting with program input / output,” Griffiths said.

Protostar, the second machine, had 19 levels and was a “very basic” introduction to memory corruption in Linux.

Griffiths said it covered stack and heap overflows, format string vulnerabilities, and basic program analysis and modification of program execution without modern protection mechanisms like non-executable memory or Address Space Layout Randomisation (ASLR).

But the recently added virtual machine dubbed Fusion stepped up the game. Through 28 levels it examined the player’s ability to exploit and bypass modern Linux protection mechanisms including non-executable memory, ASLR, position independent executables, stack smashing protection, and heap allocator improvements.

Those who succeeded would have a better understanding of exploit prevention, cryptographic weaknesses and heap implementations.

Blacksun, part of OvertheWire formerly known as PullThePlug, was also designed for advanced exploitation against hardened hosts and environments. Those challenges were being moved to a new site and only Vortex was yet playable in a beta form.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:
aslr bypass exploits linux ruxcon security virtualisation vulnerabilities

Partner Content

Beat the DDoS blackmails in 2021
Partner Content Beat the DDoS blackmails in 2021
Why companies fail at picking cloud modernisation partners
Partner Content Why companies fail at picking cloud modernisation partners
Shut the door on ransomware
Partner Content Shut the door on ransomware
MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
Partner Content MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics

Sponsored Whitepapers

Five questions to ask before you upgrade to a SIEM solution
Five questions to ask before you upgrade to a SIEM solution
Effectively addressing advanced threats
Effectively addressing advanced threats
The risky business of open source
The risky business of open source
Ensure your e-signatures are legally binding
Ensure your e-signatures are legally binding
Mitigating open source risk in your organisation
Mitigating open source risk in your organisation

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
  • Beat the DDoS blackmailers in 2021
By Darren Pauli, SC Magazine
Dec 14 2011
5:53PM
0 Comments

Related Articles

  • Geolocation threats rise following demonstration of router hacking that can pinpoint a person's home
  • NSA, FBI expose Russian intelligence hacking tool
  • Boothole GRUB2 bug breaks Secure Boot on Linux and Windows
  • NSA warns 'Sandworm' hackers targeting email servers
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Telstra blasts plan to 'set aside' mobile spectrum for Optus and TPG, but not it

Telstra blasts plan to 'set aside' mobile spectrum for Optus and TPG, but not it

Trump pardons former Google self-driving car engineer

Trump pardons former Google self-driving car engineer

Australia Post is building a digital twin of its delivery network

Australia Post is building a digital twin of its delivery network

Defence switches on initial SAP ERP system capability

Defence switches on initial SAP ERP system capability

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.