38 lines
1.9 KiB
Plaintext
38 lines
1.9 KiB
Plaintext
Last login: Thu Feb 1 14:51:05 2024 from 89.212.81.147
|
|
_ _ _ _____ _ _ _ _ ___ _ _
|
|
| | | | | |/ ____| | (_) | | | | |__ \| || |
|
|
| | ___ ___| | _____ __| | (___ | |__ _ ___| | __| |___ ) | || |_
|
|
| | / _ \ / __| |/ / _ \/ _` |\___ \| '_ \| |/ _ \ |/ _` / __| / /|__ _|
|
|
| |___| (_) | (__| < __/ (_| |____) | | | | | __/ | (_| \__ \/ /_ | |
|
|
|______\___/ \___|_|\_\___|\__,_|_____/|_| |_|_|\___|_|\__,_|___/____| |_|
|
|
|
|
Welcome to the very vulnerable VM, somewhat similar what we can expect at Locked
|
|
Shields.
|
|
|
|
There are few tasks for you:
|
|
- protect the VM preserving the following services in running (and secure)
|
|
state:
|
|
- web server
|
|
- ssh server: all users (including root) should be allowed to login
|
|
- dns server
|
|
- identify as many vulnerabilities in the VM as possible
|
|
- all passwords are set to `Admin1Admin1`. You are encouraged to change them.
|
|
- write down the vulnerabilities with short explanation what this vulnerability
|
|
can cause
|
|
- write ansible playbook (preferred) or a bash script, which will mitigate the
|
|
vulnerabilities and will still serve the web, ssh and dns services
|
|
- share the "documentation" with description of identified vulnerabilities and
|
|
code to lockedshields@ssrd.io. Github links preferred.
|
|
|
|
Some notes:
|
|
- the VM will be forcefully shutdown so make changes permanent
|
|
- root user should be allowed to login from 138.68.128.150 with the following ssh
|
|
keys:
|
|
- ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIC55vv1HAHwUOxZ+Zn4IcswclUkLEP2eA0tJG3BwE0pO
|
|
- ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINKOliO5L0TA84lclwmsdu+Wcm/r3LDQH9G2jICZ3ECC
|
|
- defense (and documentation, either through code or description) is more
|
|
important than finding vulnerabilities
|
|
- you do not need to go into details explaining vulnerabilities
|
|
- we will share the planted vulnerabilities afterwards
|
|
|