Assignment 2 is due 3/1/17 on or before 11:59:59pm MST.
For the next homework assignment, you will be hacking on a Linux server. The goal of this assignment is to familiarize yourself with accessing a Linux environment via SSH, along with developing skills on command line interaction and wargames.
First, register for a wechall account. You will need to submit your wechall username so that we can track your progress on the levels. After registering, you will need to link OverTheWire.org to your wechall account by doing the following:
- Click “Account” on the top of wechall.net
- Clink on the “Linked Sites” button
- On the “Select a site” dropdown, select “OverTheWire.org”
- Then click the “Link Site” button
Now, OverTheWire.org should show up in your list of linked sites, and we will be able to track your progress on Bandit from your user profile.
Then, the goal is to reach level 20 on the overthewire.org Bandit challenges.
Before you start, be sure to read how to register your bandit progress with wechall and do so. This way, your bandit progress will be captured on wechall, which we will use to grade your progress.
Also, keep track in your README how you solved each level.
Note that Bandit is an open system, and the goal of this assignment is to practice and develop your own skills, so be honorable and do not read walkthroughs.
You will need to submit a README. Your README file should contain your name, ASU ID, wechall username, and a description of how your broke each level.
A hot new start-up has created a new web service to allow companies to securely execute trusted code.
They’re using part of their huge A-series investment to help them evaluate their new web service.
Word on the street is that they’re using a new-fangled encryption
The start-up has created a file called
secret.txt in the working
directory. If you can read the contents of this file, then you have
successfully broken the service.
The link to the start-up will be distributed on the course mailing list.
You will need to submit the secret, files that you used to break the service, and a README. Your README file must contain your name, ASU ID, and a precise description of how you broke the system.
Being able to read assembly code is incredibly important to analyzing binary code for vulnerabilities.
Your challenge is to figure out the correct password that this binary re_check_passwd expects.
Use your knowledge of assembly, and tools such as
readelf, and others.
You will need to submit the password, any files that you used to crack the password, and a README. Your README file must contain your name, ASU ID, and a precise description of how you cracked the password.
Please don’t forget your password.