The exam for the Network Security lecture is approaching and by oberhearing a conversation with Matthias and his teaching assistant Yasmina, you learned that the exam is on a private web server in the DISCO network which is only accessible via a secret URL. Since you are the infamous hacker H4X0R, you managed to trick Matthias into revealing his password for an SSH server in his lab by using evil social engineering techniques. Unfortunately, Matthias does not use this password for his personal computer, which is the actual target since the secret URL for the exam is only stored in Matthias' browser. The only things you know is that the web server and Matthias personal computer are in the same local network as the compromised SSH server and that Matthias is a control freak and is checking the exam for updates on a very regular basis.
Since you are too lazy to study properly for the exam, you are desperately trying to get the exam from the web server. Therefore, the first steps of this hack challenge are:
- Break into the private DISCO network using the stolen password.
- Find Matthias' personal computer.
- Eavesdrop on Matthias' communication with the web server.
- Steal the secret URL and download the exam.
After you managed to steal the exam, you figured out that the webserver's configuration is really bad and allows certain denial of service attacks. Since you are an evil master mind and like to troll people, you decide to launch a denial of service attack to prevent Matthias from checking the exam. The final step of this hack challenge is:
- Launch a denial of service attack on the web server and prevent Matthias from checking the exam for at least 1 minute (will be detected by our IDS). You can check if it works by simply trying to access the webserver yourself (with your browser).
If you encounter any problems or if you get stuck, first check the Network Security slides and try using Google. Only if you really tried solving the problem yourself without success, ask Yasmina. She can give you hints or (if necessary) meet with you and assist you in solving the challenge.
To provide you a starting point, here is a list of linux commands and tools installed on the compromised server:
- ifconfig: network configuration
- hping3: send (almost) arbitrary TCP/IP packets to network hosts
- ettercap: multipurpose sniffer/content filter for man in the middle attacks
- slowhttptest: HTTP Denial Of Service attacks simulator
- nmap: Network exploration tool and security / port scanner
- arp: manage ARP cache
- tshark: command-line version of Wireshark (supports filtered output, e.g. tshark "not port 22" for filtering SSH traffic generated by you)
If you want to know how these tools work, enter "man COMMAND" or use Google. There is plenty of good documentation around! Also "COMMAND --help" usually gives you a good overview of the respective tool.