The entire final involves just one desktop system, accessible via the iink in the description for 261’s RTB Final challenge. All portions of the final are either on that machine or attached to it (reachable via a web browser or a ssh client, as noted below). All portions of the final are to be performed from the command line (i.e., in a terminal window on the desk machine). The wifi porti

Last updated: 1 Dec 2021
Discussion?
The entire final involves just one desktop system, accessible via the iink in the description for 261’s RTB Final challenge. All portions of the final are either on that machine or attached to it (reachable via a web browser or a ssh client, as noted below). All portions of the final are to be performed from the command line (i.e., in a terminal window on the desk machine).
The wifi portions of the lab involve the WLAN interface attached to your desktop. If you become stuck, please review the worksheet for Lab 12. To minimize confusion, the wireless network SSIDs have been renamed but have retained the “open”, “wep”, and “wpa” parts.
The crypto portion of the lab involves a file (crypto.aes), which is located in the /root/Desktop/Labs folder. If you become stuck, please review the worksheet for Lab 13.
Finally, the distcc portion of the lab uses the new version of Metasploit. Use care when performing the set up (section below). The target is in the 192.168.10.x IP range. You’ll need to:
• find the target
• exploit the target to acquire access
• find the “valuable” file
• determine various credentials
• use those credentials to access the target (using SSH)
• find the flag
If you become stuck, please review the worksheet for Lab 4.
In most cases (but not on the distcc target), root’s password is toor.
As always, if any part of the architecture is not working, contact joatd via the TC4 Discord server.
IMPORTANT: If you need a dictionary, the rockyou.txt file is located in /tmp/wordlists.
261-1.1 Open wifi?
1) Join the open wi-fi network.
2) Find the hidden machine.
3) Find the port listening on the hidden machine.
4) Use lynx or Firefox to connect to the port listening on the hidden machine to acquire the flag. Hint: not the SSH port. Hint: the file’s name is flag.txt so you must point a browser at the IP, port and filename.
261-1.2 WEP wifi?
1) Crack the WEP-protected wifi network and join it.
2) Find the hidden machine.
3) Find the port listening on the hidden machine.
4) Use lynx or Firefox to connect to the port listening on the hidden machine to acquire the flag. Again, not the SSH port. Hint: see hint for open network.
Note: For the WEP challenge, the student machines are in the .100 to .200 range. .253 is part of the lab (don’t try to connect to it). The target machine will use an IP address other than those.
261-1.3 WPA2 wifi?
1) Brute force the WPA2-protected wifi network (wpa-net) and join it.
2) Find the hidden machine.
3) Find the port listening on the hidden machine.
4) Use lynx or firefox to connect to the port listening on the hidden machine to acquire the flag. Again, not the SSH port. Hint: same as above.
261-2 Decrypt this file?
1) To acquire the flag, decrypt the file “crypto.aes” which can be found on your desk machine’s desktop.
261-3 Distcc and John?
1) Perform the following for setup.
1a) As root, run -/etc/init.d/postgresql restart-
1b) As root, run -apt-get install -y john-
1c) As root, run -cp /root/Desktop/Labs/password.lst /usr/share/john/-
1d) As root, run -su – msf-
1e) As msf, run -msfdb init-
1f) As msf, run -sudo msfconsole-
If/when it asks for a password for the msf account, the password is -msf-.
The above is required because the new version of metasploit is being used and it is designed to not run from the root account.
2) Find the hidden machine on the network. The target will be located somwhere in the 192.168.10.100 to .200 range. It will NOT be one of the following:
– 192.168.10.1 – this is an interface on your GUI desktop
– 192.168.21.x – this is one of the wifi networks
– 192.168.22.x – this is one of the wifi networks
– 192.168.23.x – this is one of the wifi networks
– 192.168.24.x – this is one of the wifi networks
3) Gain access to the machine detected above (not via SSH).
4) Acquire the “interesting file” from a user’s home directory. Note: it will likely download into the /home/msf folder.
5) Crack the authentication using that “interesting file”.
6) Use the credentials to connect to the target machine (via SSH) and su to root.
7) Acquire the flag from root’s home directory.
As always, if something doesn’t appear to be working correctly (i.e., something is broken), contact joatd via Discord DM.
Troubleshooting?
1) The newer version of Metasploit, in our environment, doesn’t intercept Ctrl-z properly. Instead, it backgrounds the entire MSF process instead (i.e., returns you to the msf@desk prompt).
You can bring the MSF process back by running: fg
2) Once you’ve found the “valuable” file, make note of its full path.
3) Then run “exit” a few times, until you see the “meterpreter ” prompt.
4) Then run your download command. Example (adjust to suit your needs):
download /home/distcc/WhateverTheFilenameIS
This will download the file to whatever folder you were in when you started msfconsole.
5) You can then exit msfconsole altogether and process your newly downloaded file.

The post The entire final involves just one desktop system, accessible via the iink in the description for 261’s RTB Final challenge. All portions of the final are either on that machine or attached to it (reachable via a web browser or a ssh client, as noted below). All portions of the final are to be performed from the command line (i.e., in a terminal window on the desk machine). The wifi porti appeared first on My Academic Papers.

Reference no: EM132069492

WhatsApp
Hello! Need help with your assignments? We are here

GRAB 25% OFF YOUR ORDERS TODAY

X