This assignment has two parts. It is due by 3/1 at 11:59 PM. To submit your homework, please post your responses as either a public note or as a link to your publicly available writeup on Piazza.
There will be a late penalty of 5% off per day late!
Note: Please see: https://piazza.com/class/jct62c5eidm481?cid=170 if you are trying this homework within the campus network.
Mark has now implemented some of the precautions described in your previous assignment, such as:
- Closed port 1337
- Changed his password
- Upgraded his firewall, IDS and IPS
- Increased his password size
With all these upgrades, Mark boasts that his company's security posture is now more stronger than ever and that his site is totally impenetrable. In fact, Mark recently told us that he is constantly logging into the Briong "hidden" admin panel to check if his site has been compromised, and so far, he claims that it hasn't.
Your task is to show Mark that he still has work to do! Use Metasploit with CVE-2014-0160 to attack Mark's new website at briong.com, find Mark's password, locate the flag and (try to) crack the easter egg!
Note: Once you have found the username, password, and flag (or have cracked the easter egg), you have completed the challenge. No need to look for a hidden admin panel to the Briong server.
Let us know if you are having trouble connecting to the class Metasploit console.
Mark has decided to offer a new service to his customers that allows for them to detect if their servers are up or down at any given time.
In fact, Mark claims that his new solution is inherently secure because it uses the Linux ping
command to do the uptime checking instead of using a web-based OSINT solution.
However, there are rumors that Mark's new service is vulnerable to a Command Injection attack. Can you prove to Mark that his new uptime system isn't as secure as he claims? If you can, go and get the flag!
main server: nc briong.com 45
backup server: nc irc.csec.umiacs.umd.edu 45
For full credit, write up (step-by-step) how you got the flag and what Mark should do to protect from this vulnerability.
You will earn full credit for answering these questions:
- The right flag
- Showing what input you used to obtain the flag.
- Describing your thought process.
- Any suggested precautions Mark could implement to prevent this vulnerability (hint: can you find the script that Mark uses to check if a customer's server is up?)
All two parts should be written in the same blog post, clearly separated. Part 1 and 2 can be answered in bullet form or full, grammatical sentences.
Part 1 is worth 50 points, part 2 is worth 50.
Look through the slides from lecture 4 and 5 for guidance. Let us know if you have any questions.
Good luck!