Add Java CLI reverse-engineering challenges and bundle JAR variants#2523
Add Java CLI reverse-engineering challenges and bundle JAR variants#2523Copilot wants to merge 4 commits into
Conversation
Agent-Logs-Url: https://github.com/OWASP/wrongsecrets/sessions/f2ea090d-47bb-4e0a-ad4c-179c568545a8 Co-authored-by: commjoen <1457214+commjoen@users.noreply.github.com>
Agent-Logs-Url: https://github.com/OWASP/wrongsecrets/sessions/f2ea090d-47bb-4e0a-ad4c-179c568545a8 Co-authored-by: commjoen <1457214+commjoen@users.noreply.github.com>
Agent-Logs-Url: https://github.com/OWASP/wrongsecrets/sessions/f2ea090d-47bb-4e0a-ad4c-179c568545a8 Co-authored-by: commjoen <1457214+commjoen@users.noreply.github.com>
| You can solve it by: | ||
|
|
||
| 1. Decompiling the classes and following the code that reconstructs the secret. | ||
| 2. Looking for encoded byte arrays, reflection, and helper methods that decode data at runtime. |
There was a problem hiding this comment.
@copilot can you be more explicit in the steps here please? what does the user exactly need to do?
There was a problem hiding this comment.
Updated with explicit step-by-step instructions for decompiling, inspecting bytecode, and running the JAR locally in 928795e.
Agent-Logs-Url: https://github.com/OWASP/wrongsecrets/sessions/ffd37450-0343-442a-abee-851241cb0eff Co-authored-by: commjoen <1457214+commjoen@users.noreply.github.com>
|
🌐 GitHub Pages Preview Ready! Your static preview is now available at: 📄 What's included:
For full functionality testing: Use the Docker preview instead. 🔄 Auto-updates: This preview will be updated automatically when you push new commits to this PR. Static preview with Thymeleaf generation by GitHub Actions |
|
🔨 Preview Build Complete! Your changes have been built and pushed to GitHub Container Registry. 🐳 Docker Image: 📦 Download & Test Locally:
# Download the artifact, extract it, then:
docker load < wrongsecrets-preview.tar
docker run -p 8080:8080 -p 8090:8090 wrongsecrets-preview🚀 Alternative - Pull from Registry: docker pull ghcr.io/owasp/wrongsecrets/wrongsecrets-pr:pr-2523-6714add
docker run -p 8080:8080 -p 8090:8090 ghcr.io/owasp/wrongsecrets/wrongsecrets-pr:pr-2523-6714addThen visit: http://localhost:8080 📝 Changes in this PR: Visual diff screenshots will be available shortly... Preview built by GitHub Actions |
|
📸 Visual Diff Ready! Screenshots comparing your changes with the main branch are available: 📁 Download Visual Diff Artifacts 🖼️ Included screenshots:
🔍 How to review:
💡 Tip: Use an image comparison tool or open both images in separate browser tabs to spot differences easily. Visual diff generated by GitHub Actions • PR #2523 |
This adds WrongSecrets challenges based on the new Java CLIs introduced in
OWASP/wrongsecrets-binaries#130. It covers both the plain and obfuscated Java variants and includes the relevant bundled artifacts, including CTF builds.New challenges
Challenge65for the plain Java CLI JARChallenge66for the obfuscated Java CLI JARwrong-secrets-configuration.yamlwith matching explanation, hint, and reason contentJava JAR execution support
BinaryExecutionHelperto execute runnable JARs viajava -jarspoil()resolves the embedded secret from the packaged CLI rather than duplicating logic in application codeBundled Java artifacts
src/main/resources/executables/wrongsecrets-java.jarwrongsecrets-java-obfuscated.jarwrongsecrets-java-ctf.jarwrongsecrets-java-obfuscated-ctf.jar.gitignoreso these tracked JARs can live alongside the existing executable assetsChallenge docs and tests
Example of the new execution path: