Offense
There were 10 Offense challenges with one having two sub-challenges, for a total of 11 flags to find with 1800 points possible.
This section was kind of painful. I couldn't quite make it without some hints and some nudges from the cohort. Still, I was able to finish, which I'm pretty happy about!
O1 - Find your Targets
Prerequisites: Complete the tutorial.
Phishing is the leading infection vector, so as a red-teamer, how would you go about phishing the casino? Find what you need to phish someone at the casino and there should be a flag nearby!
Given:
Link Casino homepage
O2 - Build a Credential Harvester
Prerequisites: Complete the tutorial.
After you have something to phish, how do you leverage that to get access into an organization? Credential harvesters are great for this and the best ones look like the real thing. Fortunately there are tools, like HTTrack, that help us quickly and easily clone websites. The flag is received once you successfully clone the casino homepage and enter the credentials "admin" and "password" there.
O3 - Constructing your Phish
Prerequisites: Complete the tutorial.
Awesome. Now you have a credential harvester and an email to send it to. Now you just need to craft a convincing phish to get your target to click on it! How do you do that? By leveraging real emails sent to your target to craft a fake one! We've gotten ahold of an MFA onboarding email from the company, can you create a fake QR code to send to your target? Once you have submitted the correct QR code, you'll get the flag!
Given:
MFA onboarding email

a URL to validate the QR code
O4 - Use your Captured Creds
Prerequisites: Complete O1, O2, and O3.
Your victim has clicked on the link and you've gotten their credentials! Now what? Why use those credentials to get into the casino! You've logged into the victim's email, who happens to be on the security team, so now you need to dig around their email. What useful information can you find? Looks like you could find the name of their Endpoint Detection and Response (EDR) tool! The name of the EDR is the flag.
O5 - Take Over an EDR Account
Prerequisites: Complete O4.
Now that you know the name of the EDR that the casino is using, can you leverage that to further your access into their network? Many companies are now using Multi-Factor Authentication (MFA) to provide additional defenses against unauthorized access. After reviewing your victim's email, it looks like the casino is using their own (insecure) MFA generating app, which you've gotten access to the source code. Can you figure out how to get the One Time Password (OTP) to reset the victim's password? You get 10000 attempts. :)



O6 - Find a Way In
Prerequisites: Complete O3.
Now that you have credentials and the OTP, where can you use them? Scan the casino's server to determine what services are running on it and if any are vulnerable.
Given:
URL and port
O7 - Bypass the EDR
Prerequisites: Complete O5.
Great! You've gotten access to a host in the casino's network, great job! Now, you'll want to establish persistence - aka a way of keeping yourself in the network. One way of doing so is to install some remote control software, such as AnyDesk, but the EDR is doing it's job and keeping you from installing it. How can you bypass the EDR and install the remote control software? You've got some friends in low places who you've paid to get access to a EDR bypass program. However, you need to get that program on the host as well... Once you are able to download AnyDesk to the casino's server, you'll get the flag!
Given:
Simulated URL for AnyDesk
Simulated URL for EDR Killer
A link to a simulated bash shell
O8 - Performing an Exfil of a Filesystem
Prerequisites: Complete O6.
Reviewing the emails of your victim, you've noticed that there was a backup of a server uploaded to a secure fileshare. Sounds like $$$. How can you access it? You've gotten access to the password vault service running as a start, can you finish this and get the flag inside the backup zip?
Given:
Victim's emails (which shows the username and URL for the backup)
nc <url> <port>
ValuVault documentation (made only for this CTF, screenshot below)



O9.1 - Escalate your Privileges
Prerequisites: Complete O6.
Now you have access to a host on the casino's network, but you only have limited privileges on that device. You can only run certain applications and all the really helpful applications need administrator privileges. How can you elevate your privileges to get this party started? An easy way is to use a file that has the permissions you need and have it execute your command for you!
Using the NARSH (Not A Real Shell) emulator, find a file with world writable permissions that executes as root.
O9.2 - Escalate your Privileges
Prerequisites: Complete O9.1.
You've got a file that will allow you to run commands with escalated privileges. You've already ran the following command, the flag is the next command you need to run in order to successfully elevate your privileges.
cp /bin/bash /tmp && chmod +s /tmp/bash
O10 - Sell your Access
Prerequisites: Complete O8.
Last Offense challenge! You're doing great, just one more step! You've gotten access and established persistence to the casino's network. Now you need to create a post on the dark web that will advertise your wares. Once you have created an effective advertisement, the flag will appear.
Offense Completed!
Last updated