Skip to content
Snippets Groups Projects
Commit b304fcc9 authored by Jakub Čegan's avatar Jakub Čegan
Browse files

New info level and small updates.

parent f55e69e8
No related branches found
No related tags found
No related merge requests found
{
"title" : "KYPO Cyber Range Training Demo Content",
"description" : null,
"title" : "KYPO Cyber Range Training Platform - Demo Content",
"description" : "The demo contains all types of levels to demonstrate the training capabilities of the KYPO Cyber Range Platform.",
"prerequisities" : [ ],
"outcomes" : [ ],
"state" : "UNRELEASED",
......@@ -11,7 +11,7 @@
"level_type" : "INFO_LEVEL",
"order" : 0,
"estimated_duration" : 0,
"content" : "The purpose of this demo is to showcase and test capabilities of the kypo project. It consists of this info level, two game levels, test and assesment."
"content" : "# Demo Summary\n\nThe demo contains all types of levels to demonstrate the training capabilities of the KYPO Cyber Range Platform.\n\n| Level | Level Name | Level Type |\n|:------:|------| ------ |\n| 1. | Info | Info |\n| 2. | Connecting Via Telnet | Game |\n| 3. | Privilege Escalation | Game |\n| 4. | Test Example | Assessment |\n| 5. | Assessment Example | Assessment |\n\n## Info\n\nThe level contains this information page.\n\n## Connecting Via Telnet\n\nThe level provides information on how to connect to a sandbox. In general, there are two possible approaches. The first approach is to use the platform'a GUI to connect to the machine via Spice console. The second approach is to connect through SSH with a generated config file and keys. \n\nThis level's small challenge is to connect to the server machine without a password and discover the secret flag.\n\n## Privilege Escalation\n\nThis demo's bigger challenge is to gain root privileges and read a flag available only to a root user. Enjoy! \n\n## Test Example\n\nThe level contains a simple example of a test. Tests can be used, for example, for additional testing of students for grading purposes.\n\n## Assessment Example\n\nThe level contains a simple example of a test. For example, the tests can be used to verify the learning outcomes or for collecting feedback.\n"
}, {
"title" : "Connecting Via Telnet",
"max_score" : 100,
......@@ -19,7 +19,7 @@
"order" : 1,
"estimated_duration" : 15,
"flag" : "Top_Secret_Flag",
"content" : "Your task is to connect to the server and get the flag. You know that there is a **`telnet`** service running on the server and that **`alice`** has a weak password. The flag is in alices home directory. There is a list of common passwords placed in your home directory for your convenience.\n\nBelow are two options how to connect to the client from which you can connect to the server.\n\n## GUI access\n1. In the topology overview, click the button in the top-right corner of the graph, then **`Expand All`**, **`client`** and **`Generate console URL`**. After a few moments, **`Open link`** next to the **`Generate console URL`** should appear.\n\n2. Login using username **`kypo`** and password **`kypo`**.\n\n3. You may want to run **`/bin/bash`** to get a friendlier shell.\n\n## SSH from local machine\n1. Use the **`Get SSH Access`** button to download **`ssh-access.zip`**.\n\n2. Extract the **`ssh-access.zip`** file to your **`~/.ssh/`** directory.\n\n ```shell\n $ unzip ssh-access.zip -d ~/.ssh/\n ```\n\n You will get following files:\n \n ```shell\n ~/.ssh/pool-id-<pool_ID>-sandbox-id-<sbx_ID>-user-config - The SSH configuration file.\n ~/.ssh/pool-id-<pool_ID>-sandbox-id-<sbx_ID>-user-source.sh - The configuration script.\n ~/.ssh/pool-id-<pool_ID>-sandbox-id-<sbx_ID>-user-key - The sandbox user SSH private key.\n ~/.ssh/pool-id-<pool_ID>-sandbox-id-<sbx_ID>-user-key.pub - The sandbox user SSH public key.\n ```\n\n3. Execute the extracted source script in the current shell using the **`source`** command with the path to the KYPO proxy SSH private key. The source script that will set the **`ssh`** command and the **KYPO proxy SSH private key**, which is available to instance operator.\n\n ```shell\n $ source ~/.ssh/pool-id-<pool_ID>-sandbox-id-<sbx_ID>-user-source.sh PATH_TO_KYPO_PROXY_PRIVATE_KEY\n ```\n\n4. Connect to the client to **`kypo`** user. \n\n ```shell\n $ ssh kypo@client\n ```",
"content" : "Your task is to connect to the server and get the flag. You know that there is a **`telnet`** service running on the server and that **`alice`** has a weak password. The flag is in alices home directory. There is a list of common passwords placed in your home directory for your convenience.\n\nBelow are two options how to connect to the client from which you can connect to the server.\n\n## GUI access\n1. In the topology overview, click the button in the top-right corner of the graph, then **`Expand All`**, **`client`** and **`Generate console URL`**. After a few moments, **`Open link`** next to the **`Generate console URL`** should appear.\n\n2. Login using username **`kypo`** and password **`kypo`**.\n\n3. You may want to run **`/bin/bash`** to get a friendlier shell.\n\n## SSH from local machine\n1. Use the **`Get SSH Access`** button to download **`ssh-access.zip`**.\n\n2. Extract the **`ssh-access.zip`** file to your **`~/.ssh/`** directory.\n\n `$ unzip ssh-access.zip -d ~/.ssh/`\n\n You will get following files after extracting **`ssh-access.zip`** file\n\n * The configuration script: `~/.ssh/pool-id-<pool_ID>-sandbox-id-<sbx_ID>-user-source.sh` \n * The SSH configuration file: `~/.ssh/pool-id-<pool_ID>-sandbox-id-<sbx_ID>-user-config`\n * The sandbox user SSH private key: `~/.ssh/pool-id-<pool_ID>-sandbox-id-<sbx_ID>-user-key`\n * The sandbox user SSH public key: `~/.ssh/pool-id-<pool_ID>-sandbox-id-<sbx_ID>-user-key.pub`\n\n3. Execute the extracted source script in the current shell using the **`source`** command with the path to the KYPO proxy SSH private key. The source script that will set the **`ssh`** command and the **KYPO proxy SSH private key**, which is available to instance operator.\n\n `$ source ~/.ssh/pool-id-<pool_ID>-sandbox-id-<sbx_ID>-user-source.sh PATH_TO_KYPO_PROXY_PRIVATE_KEY`\n\n4. Connect to the client to **`kypo`** user. \n\n `$ ssh kypo@client`",
"solution" : "1. Look for open ports using the command **`nmap server`**. You can see **ssh** running on port **22** and some other service running on port **2323**. This has to be the **telnet** service.\n\n2. You know that **alice** has a weak password so you can try a dictionary attack. A list of common passwords is ready in your home directory. One of possible tools to make a password attack is **hydra**. A command to find the password is **`hydra -l alice -P passlist.txt telnet://server:2323`**. This will reveal alices password **bacon**.\n\n3. Now you can connect to the server by using **`telnet server 2323`**, entering username **`alice`** and her password **`bacon`**.\n\n4. To read the flag you can use **`cat flag.txt`**. Use the flag to get to the next level.\n",
"solution_penalized" : true,
"hints" : [ {
......@@ -73,7 +73,7 @@
"instructions" : "A simple test.",
"assessment_type" : "TEST"
}, {
"title" : "Assesment Example",
"title" : "Assessment Example",
"max_score" : 0,
"level_type" : "ASSESSMENT_LEVEL",
"order" : 4,
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment