This project is a small information security challenge. The goal is to exploit whatever is on the machine to become root. The only rule is not to bruteforce password.
We're given a vulnerable ISO on which several program are running. Using known vulnerabilities and reverse engineering we can access ressources that aren't meant to be and make our way through different services.
| Writeup | Ressources | Exploits |
|---|---|---|
| 1 | nmap | dirb | sshd configuration | file | ftp | Hopper | gdb | Bitwise operations | turtle | md5sum | EIP register | ESP register | ASLR | Endianness | Webshell upload | Buffer overflow | ret2libc attack |
| 2 | syslinux | file | init | Init override in recovery mode |
| 3 | mount | casper | squashfs files | unsquashfs | Dig through squashfs file |
| 4 | Shell-storm | NOP instruction | Shellcode injection | NOPSlide |
| 5 | httpd | ExploitDB | suEXEC information disclosure |
| 6 | ExploitDB | Race condition | Dirty cow |
Made in collaboration with @thervieu.