AppArmorJail1

日付

Validations

0 Compromissions 0%

Note  Notation

6 votes

Description

Attention : this CTF-ATD is linked to the challenge "AppArmor Jail - Introduction"

When connecting to the administrator’s server, a restricted shell via an AppArmor policy prevents you from reading the flag even though you are the owner...

Find a way to read the flag at any cost and override the AppArmor policy in place which is configured as follows:

#include <tunables/global>

profile docker_chall01 flags=(attach_disconnected,mediate_deleted) {
   #include <abstractions/base>
   network,
   capability,
   file,
   umount,
   signal (send,receive),
   deny mount,

   deny /sys/[^f]*/** wklx,
   deny /sys/f[^s]*/** wklx,
   deny /sys/fs/[^c]*/** wklx,
   deny /sys/fs/c[^g]*/** wklx,
   deny /sys/fs/cg[^r]*/** wklx,
   deny /sys/firmware/** rwklx,
   deny /sys/kernel/security/** rwklx,

   deny @{PROC}/* w,   # deny write for all files directly in /proc (not in a subdir)
   # deny write to files not in /proc/<number>/** or /proc/sys/**
   deny @{PROC}/{[^1-9],[^1-9][^0-9],[^1-9s][^0-9y][^0-9s],[^1-9][^0-9][^0-9][^0-9]*}/** w,
   deny @{PROC}/sys/[^k]** w,  # deny /proc/sys except /proc/sys/k* (effectively /proc/sys/kernel)
   deny @{PROC}/sys/kernel/{?,??,[^s][^h][^m]**} w,  # deny everything except shm* in /proc/sys/kernel/
   deny @{PROC}/sysrq-trigger rwklx,
   deny @{PROC}/kcore rwklx,

   /home/app-script-ch27/bash px -> bashprof1,
 
}
profile bashprof1 flags=(attach_disconnected,mediate_deleted) {
   #include <abstractions/base>
   #include <abstractions/bash>
   
   network,
   capability,
   deny mount,
   umount,
   signal (send,receive),

   deny /sys/[^f]*/** wklx,
   deny /sys/f[^s]*/** wklx,
   deny /sys/fs/[^c]*/** wklx,
   deny /sys/fs/c[^g]*/** wklx,
   deny /sys/fs/cg[^r]*/** wklx,
   deny /sys/firmware/** rwklx,
   deny /sys/kernel/security/** rwklx,

   deny @{PROC}/* w,   # deny write for all files directly in /proc (not in a subdir)
   # deny write to files not in /proc/<number>/** or /proc/sys/**
   deny @{PROC}/{[^1-9],[^1-9][^0-9],[^1-9s][^0-9y][^0-9s],[^1-9][^0-9][^0-9][^0-9]*}/** w,
   deny @{PROC}/sys/[^k]** w,  # deny /proc/sys except /proc/sys/k* (effectively /proc/sys/kernel)
   deny @{PROC}/sys/kernel/{?,??,[^s][^h][^m]**} w,  # deny everything except shm* in /proc/sys/kernel/
   deny @{PROC}/sysrq-trigger rwklx,
   deny @{PROC}/kcore rwklx,

   / r,
   /** mrwlk,
   /bin/** ix,
   /usr/bin/** ix,
   /lib/x86_64-linux-gnu/ld-*.so mrUx,
   deny /home/app-script-ch27/flag.txt r,
}
  • Start the CTF-ATD "AppArmorJail1"
  • Connect via SSH to the machine on port 22222 (app-script-ch27:app-script-ch27)
  • The challenge validation password is in the /home/app-script-ch27/flag.txt file
  • The validation password of the CTF ATD is in the file /passwd

Démarrer le CTF all the day

Temps de compromission

4 heures

Système d'exploitation

 linux

démarrer cet environnement virtuel

 176 Environnements Virtuels

Résultats お名前 Validations Difficulté  Difficulté 著者 Note  Notation
pas_valide Metasploitable 2 40% 8571
pas_valide Basic pentesting 1 32% 4644
pas_valide LAMP security CTF5 25% 3875
pas_valide Docker - I am groot 51% 3006 Ech0
pas_valide LAMP security CTF4 35% 2712
pas_valide SSH Agent Hijacking 26% 2357 mayfly
pas_valide SSRF Box 18% 1757 sambecks
pas_valide Metasploitable 12% 1721
pas_valide Mr. Robot 1 21% 1636
pas_valide End Droid 35% 1245
pas_valide Imagick 22% 1036 sambecks
pas_valide SamBox v2 13% 978 sambecks
pas_valide Kioptrix level 2 25% 971
pas_valide Docker - Sys-Admin’s Docker 41% 936 Ech0
pas_valide LAMP security CTF7 39% 889
pas_valide VulnVoIP 17% 851
pas_valide SamBox v1 7% 723 sambecks
pas_valide Docker - Talk through me 42% 631 Ech0
pas_valide Well-Known 11% 620 sm0k
pas_valide Django unchained 22% 610 TiWim
pas_valide LAMP security CTF6 18% 603
pas_valide Windows - Group Policy Preferences Passwords 25% 582
pas_valide Kioptrix level 3 33% 575
pas_valide Shared Objects Hijacking 13% 557 das
pas_valide BreakingRootme2020 15% 512 Laluka
pas_valide Windows XP pro 01 5% 494 g0uZ
pas_valide Awky 8% 494 sbrk
pas_valide Kioptrix level 4 35% 462
pas_valide Rootkit Cold Case 16% 462 franb
pas_valide Windows - KerbeRoast 19% 444
pas_valide Websocket - 0 protection 6% 436 Worty
pas_valide Bluebox - Microsoft Pentest 4% 418
pas_valide Windows - ASRepRoast 35% 402
pas_valide pWnOS 32% 400
pas_valide Hackademic RTB1 19% 364
pas_valide DC-1 15% 343
pas_valide SamBox v3 5% 333 sambecks
pas_valide Exploit KB Vulnerable Web App 12% 306
pas_valide Bluebox 2 - Pentest 3% 306 sambecks
pas_valide Holynix v1 24% 292
pas_valide SAP Pentest 7% 292 iggy
pas_valide LAMP security CTF8 14% 291
pas_valide /dev/random : Pipe 5% 236
pas_valide A bittersweet shellfony 12% 233 mayfly
pas_valide LordoftheRoot 25% 230
pas_valide Hopital Bozobe 8% 228 sambecks
pas_valide Acid: Server 12% 218
pas_valide FristiLeaks 1.3 29% 215
pas_valide SkyTower 24% 213
pas_valide Ubuntu 8.04 weak 5% 206 g0uZ