Side Events
FoxPick -- Lockpicking Village -- April 27th 10:00 am -- 5:00 pm
Wireless Shoothouse -- April 27th 12:00 pm -- 7:00 pm
The GreenHat Solutions (GHS) Shoothouse for Wireless is an 802.11 (WiFi) Capture The Flag event. Unlike many CTF's, the Shoothouse provides an opportunity to conduct wireless penetration testing against various targets. While capturing the keys to access the wireless network will award points, the challenge doesn't end there. Competitors will have the option to find additional flags; these flags will either require accessing the router user interface, the client devices, or the traffic between clients. Contestants will have the chance to train on or hone their skills with a vast arsenal of tools, and techniques to include:
Hashcat, JtR, Crunch, Cewl, most tools in the aircrack suite, hydra, medusa, mdk-3, pyrit, coWPAtty, nmap, wireshark, macchanger, Metasploit, ettercap
CC Badge Building -- April 27th 10:00 am -- 5:00 pm
Badge building guide and information can be found here
Bug Bounty -- April 27th 10:00 am -- 5:00 pm TBA
Capture The Flag -- April 27th 10:00 am -- April 28th 12:00 pm
Class ~ April 26th 1:00 pm
Professionally Evil Container Hackery
Cory Sabol -- Security Consultant at Secure Ideas, LLC
Description:
In this workshop we'll be learning how to do some container hacking! The course assumes that students are somewhat familiar with how to use Docker or other container tooling. We'll touch on several techniques that can be used when you encounter container tech on a penetration test. We'll also be using a tool written by the author called Harpoon to carry out some of the recon and attacks. In addition to Harpoon we'll also be using a customized version of SamuraiWTF; be on the lookout for a notification of when these labs are ready.
Tentative Course Schedule
- Introduction
- Container basics; terminology, basic docker commands
- Reconnaissance
- Looking for docker socket
- Surveying existing images
- Viewing host processes from inside a container
- Priviledge escalation using conatiners and container services
- Elevate low-priv user in Docker group to root
- Mount the host filesystem to backdoor the host root
- Exploration of CVE-2019-5736
- Attacking Kubernetes
- Pivoting to compromise cluster services
- Access to port 10250