You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

60 lines
2.2 KiB

#### General
##### Check the Repo content:
- A `README.md` file, Which explains all the steps to bypass all exercises.
- All used tools and scripts.
###### Are all the required files present?
##### Set up the virtual machine:
1. Download the virtual machine image [hole-in-bin.ova](https://assets.01-edu.org/cybersecurity/hole-in-bin/hole-in-bin.ova).
For machine using Apple Silicon or equivalent get [hole-in-bin.utm.zip](https://assets.01-edu.org/cybersecurity/hole-in-bin/hole-in-bin.utm.zip).
This image contains all the binaries you will need for the audit.
SHA1 for `hole-in-bin.ova`: 7db09b7a8fdfe25c286561dfa7ca5b50718bd60c
SHA1 for `hole-in-bin.utm.zip`: fc93533b2054d10d03b09d53c223e57bf7ac7b62
> If it's already downloaded in the student machine, please check the SHA1 running the following command
```console
$ sha1sum <filename>
<SHA1>
```
2. Load the virtual machine image into your virtualization software of choice (e.g., VirtualBox, VMWare).
3. Login using the provided credentials (username: user, password: user).
##### Ask the student to disassemble and explain the binaries:
> Using a decompiler is forbidden, use a disassembler instead of it!
- The compiler is used to convert high-level programming language code into machine language code.
- The assembler converts assembly-level language code into machine language code.
###### Was the student capable to disassemble the binaries?
###### Was the student capable to explain the functionality of all the binaries?
###### Has the student shown the ability to understand and analyze binary structures and operations?
###### Did the student showcase an understanding of reverse engineering concepts?
##### Ask the student to exploit the binaries:
> It's forbidden to use external scripts!
###### Have all binaries been exploited successfully?
###### Did the student demonstrate an understanding of various binary exploitation techniques?
##### Check the student Documentation:
###### Is the documentation clear and complete, including well-structured explanations and thorough descriptions?
###### Did the student explain their thought process and approach to each challenge?
###### Have the student’s notes clearly described the tools and techniques used during the exercise?