mirror of https://github.com/01-edu/public.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
nprimo
0830838bfe
|
7 months ago | |
---|---|---|
.. | ||
README.md | 7 months ago |
README.md
General
Check the Repo content:
- A
README.md
file, Which explains all the steps to bypass all exercises. - All used tools and scripts.
Are all the required files present?
Set up the virtual machine:
- Download the virtual machine image hole-in-bin.ova. For machine using Apple Silicon or equivalent get hole-in-bin.utm.zip. This image contains all the binaries you will need for the audit.
SHA1 for hole-in-bin.ova
: 7db09b7a8fdfe25c286561dfa7ca5b50718bd60c
SHA1 for hole-in-bin.utm.zip
: fc93533b2054d10d03b09d53c223e57bf7ac7b62
If it's already downloaded in the student machine, please check the SHA1 running the following command
$ sha1sum <filename>
<SHA1>
-
Load the virtual machine image into your virtualization software of choice (e.g., VirtualBox, VMWare).
-
Login using the provided credentials (username: user, password: user).
Ask the student to disassemble and explain the binaries:
Using a decompiler is forbidden, use a disassembler instead of it!
- The compiler is used to convert high-level programming language code into machine language code.
- The assembler converts assembly-level language code into machine language code.
Was the student capable to disassemble the binaries?
Was the student capable to explain the functionality of all the binaries?
Has the student shown the ability to understand and analyze binary structures and operations?
Did the student showcase an understanding of reverse engineering concepts?
Ask the student to exploit the binaries:
It's forbidden to use external scripts!