Skip to content

gnubufferoverflows/cand-docker

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

36 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

how do i dock

First, you need to install Podman with your preferred package manager. This should theoretically work with Docker as well, though I did not test it.

$ podman build -t cand https://github.com/gnubufferoverflows/cand-docker.git
$ podman run -t -a stdin -a stdout -a stderr cand

The process will take a while. You may want to prepare a bottle of gin during this time to get yourself properly inebriated and in the hacking mood.

When prompted for the password, enter the highly secure password password. The challenges can be found in the home directory of /home/labs. Enjoy!

ASLR

Disable ASLR on the container, must run on your host system. For Linux systems: sudo echo 0 | sudo tee /proc/sys/kernel/randomize_va_space

ASLR options:

  • 0: Disable
  • 1: Shared libraries, stack, mmap(), VDSO and heap
  • 2: Full ASLR

Manage your Container

Find container ID: podman ps -a

Stop container (saving progress): podman stop containerid

Get TTY back after stopping: podman start -a containerid

Please note: I did not test all of the challenges, so please report any issues.

Also please note: This is meant to be a container for single user use. It's not meant for a classroom. I don't intend on making a multi-user version.

For Cheaters

If you have given up, the solutions can be found in /root. To get root, you need to do su - admin using the very secure password, then you may run sudo.

Cyber Attacks and Defense

This repository serves as a comprehensive archive of educational content, meticulously curated to facilitate the progressive journey of aspiring cybersecurity enthusiasts into the realm of contemporary cyber-attacks.

It encompasses an array of resources, including but not limited to:

  1. Presentation slides offering theoretical knowledge and strategic insights.
  2. Direct links to instructional videos for auditory and visual learning.
  3. Practical instances, demonstrated through codes and binaries, to provide a hands-on experience.
  4. Detailed solutions and explanations to reinforce understanding and self-assessment.

These materials are strategically structured around multiple pwnable examples, each serving as a learning module, to ensure a seamless transition from theoretical aspects to real-world hacking scenarios. This approach aims to empower novice hackers with the acumen and proficiency required to navigate, understand, and innovate in the ever-evolving landscape of cybersecurity threats and defenses.

Running binary files

The binary files here are tested running on the following Linux distributions:

  1. Ubuntu 16.04 LTS
  2. Ubuntu 18.04 LTS (Bionic Beaver; go BEAVS, go OSUSEC!)
  3. Ubuntu 20.04 LTS
  4. Ubuntu 22.04 LTS

License

This repository operates under dual licensing terms, delineated as follows:

  1. Student Associations: Entities recognized as student clubs --- defined herein as organizations presided over by a board of directors composed entirely of students --- are authorized to utilize all materials contained within this repository, subject to the terms stipulated by the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) License.

  2. Non-Student Entities: All other organizations, inclusive of non-profit establishments such as universities, research centers, institutions, and national laboratories, are likewise bound by the conditions of the CC BY-NC-ND 4.0 License, with the enforcement of an additional mandatory provision:

Mandatory Donation Clause

For every individual member accessing the repository's materials under the auspices of the organization, a compulsory donation of $100 (USD) per person is required. This donation is to be directed to the nearest student-run security club (qualified by a governance structure consisting solely of students) as an unrestricted gift, imposed without subsequent conditions or encumbrances.

To exemplify, should Oregon State University elect to incorporate materials from this repository for instructional purposes within a class of 100 attendees, a donation amounting to $10,000 (USD) is mandated, payable to the proximate student-operated security association, identified in this instance as OSUSEC.

This arrangement seeks to foster a supportive ecosystem for burgeoning cybersecurity education programs while ensuring adherence to fair usage and the promotion of educational initiatives.

For an exhaustive understanding and legal interpretation of the licensing terms, concerned parties are directed to consult the full text, available in the LICENSE.md file accompanying this repository.

Parties are advised to review these terms thoroughly to ascertain compliance with all stipulated conditions and restrictions, thereby preempting any inadvertent contravention of the licensing agreement.

Exception to the Mandatory Donation Clause

An exemption to the stipulated mandatory donation requirement may be granted under the specific authorization of the repository's principal contributor, Dr. Yeongjin Jang. Parties interested in seeking concessions concerning this clause, such as a reduction in the prescribed donation amount, are advised to initiate a formal request by reaching out to Dr. Jang directly through electronic correspondence at [email protected].

Such communications will be subject to his discretion, and any adjustments to the licensing terms will be considered on a case-by-case basis.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages

  • C 56.3%
  • Python 33.0%
  • Makefile 7.3%
  • Assembly 2.4%
  • Other 1.0%