Skip to content

SoftSec-KAIST/GitCTF

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

42 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Git-based CTF

Git-based CTF is a novel attack-and-defense CTF platform that can be easily hosted as an in-course activity proposed in our paper at USENIX ASE. This repository contains scripts for automating Git-based CTF. To see how to configure and play Git-based CTF, see the followings.

If you want to see the version covered in our paper at USENIX ASE, please refer to ase branch.

Setup

Requirement

  1. Instructors should modify the config.json file to start with.

  2. Students need to obtain the config.json file prepared by the instructors in Step 1.

  3. Each team should prepare for a PGP public & private key pair in their own machine. The teams' public keys should be distributed before the game begins.

  4. Each student should install GPG and Docker on their own machine in order to play CTF.

For Students

Git-based CTF consists of three major steps: preparation, injection, and exercise. We provide a set of tools that help students play the CTF for each step.

1. Preparation Step

In this step, you need to prepare a network service running in a Docker container. The final outcome of this step is a Git repository that contains a Dockerfile as well as source code for the service program. We provide several useful tools and scripts that help create such a service container.

  • We provide a template Dockerfile, which can be used to prepare a service application.

  • You can check whether a service repository is valid or not by running:

    ./gitctf.py verify service --team [TEAMNAME] --branch [BRANCH]

    The above command checks whether the BRANCH branch of the repository follows the Git-based CTF convention.

2. Injection Step

You should inject vulnerabilities into the service application prepared in the previous step. You should also provide a working exploit for each injected vulnerability as a proof. An exploit in Git-based CTF is a program running in a Docker container, and it should follow a specific format, e.g., it should be properly encrypted and signed. We provide several tools and scripts that help creating and verifying injected vulnerabilities and exploits.

  • You should write an exploit program/script using the template Dockerfile we provided.

  • You can verify your exploit against a service of a specific version (i.e., specific branch). Assume that you have a local copy of a target service at SRVDIR, and your exploit at EXPDIR. You can then run the following command to test whether your exploit works within a SEC seconds against the BRANCH branch version of the service:

    ./gitctf.py verify exploit --exploit [EXPDIR] --service-dir [SRVDIR] --branch [BRANCH] --timeout [SEC]

    Also, if you add the --encrypt option, you can encrypt the exploit when it gets verified. You should upload (i.e. commit and push) this encrypted exploit, which will be named as exploit_bugN.zip.pgp in the root directory of each branch. Here, bugN is the corresponding branch name.

  • After uploading all the exploits, you can verify your submitted exploits against each branch of your service, with the following command.

    ./gitctf.py verify injection --team [TEAMNAME]

3. Exercise Step

In this step, you finally play the actual CTF game. To attack other opponents, you should create an issue that contains an encrypted attack described in the previous step.

  • To prepare for an attack, you should create a zip file that has a directory containing an exploit Dockerfile as well as an exploit script/program. You then sign and encrypt the zipped directory, and submit it as an issue in the target team's repository. Assuming that you have a local copy of a target service at SRVDIR, and your exploit at EXPDIR, the following command will perform these steps automatically.

    ./gitctf.py submit --exploit [EXPDIR] --service-dir [SRVDIR] --target [TEAMNAME]
  • You can see issues in your own repository to check whether you are attacked by other opponents. Since each issue is encrypted with your own key, you can download the attack and replay it in your own local machine. Especially, you may want to analyze how an unintended vulnerability is exploited. To verify unintended exploit, you can use gitctf.py verify exploit command described above.

  • You can also check your score with our tool. Assuming that the scoreboard repository URL is properly given by config.json file, you can invoke the following command to see the current score.

    ./gitctf.py score

    Note that the points you see from the above command may slightly differ from the actual points computed at the instructor's machine, because this command relies on the system time to compute the unintended points. Also, This command automatically populates an HTML file score.html that shows a graph representing score over time for each team or person.

For Instructors

There should be a machine that is dedicated to evaluating the attacks in Git-based CTF. The machine needs to be time-synchronized with an NTP server.

  • Create the repository of scoreboard. You can check out an example scoreboard.

  • Click the Watch button in each team's service repository.

  • After the injection phase, you need to create a config.json file, which describes the basic settings for a CTF.

  • After the injection phase, you need to fill the commit hash of N-th injected bug of each team, with the following command.

    ./gitctf.py hash
  • During the exercise phase, the machine should run the following command assuming that you have a proper set-up for the ssh-agent and the gpg-agent, because this command will invoke a series of ssh and gpg commands, and such commands require a user to enter a passphrase.

    ./gitctf.py eval --token API_TOKEN

    This command will run in an infinite loop, automatically fetch issues from the repositories, and update the scoreboard. This process will be killed when CTF is finished.

Configuration

This file contains critical information for managing Git-based CTF. This script must be created by an instructor, and distributed to students before a CTF begins. You can check out an example configuration file

The config.json file requires the following fields:
  1. player: Your GitHub ID.
  2. player_team: Your team name.
  3. score_board: The URL for the scoreboard repository.
  4. repo_owner: The name of the owner of the CTF repositories.
  5. intended_pts: Points for exploiting an intended vulnerability.
  6. unintended_pts: Points for exploiting an unintended vulnerability.
  7. round_frequency: How often will our system change the round? (in sec.)
  8. start_time: When does the exercise phase start? You should put a string in the ISO8601 format, e.g., you can use date -Iseconds.
  9. end_time: When does this CTF finish? You should put a string in the ISO8601 format.
  10. exploit_timeout: Timeout for exploit. (in sec.)
    1. exercise_phase: Timeout when verify exploit in exercise phase.
    2. injection_phase: Timeout when verify exploit in injection phase.
  11. teams: Participating teams' information.
    1. repo_name: The URL for each team's service repository.
    2. pub_key_id: The public key ID of the team.
    3. bugN: The commit hash of the N-th injected bug of this team.
  12. individual: Participating individuals' information. Each field is separated by participants' GitHub IDs.
    1. pub_key_id: The public key ID of the individual.
    2. team: Which team does this individual belong to?

Authors

This research project has been conducted by SoftSec Lab at KAIST.

Citing Git-based CTF

To cite our paper:

@INPROCEEDINGS{wi:usenixase:2018,
    author = {SeongIl Wi and Jaeseung Choi and Sang Kil Cha},
    title = {Git-based {CTF}: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competition},
    booktitle = {2018 {USENIX} Workshop on Advances in Security Education ({ASE} 18)},
    year = {2018}
}

License

This project is licensed under the Apache License

Acknowledgement

We thank GitHub for providing unlimited free plan for organizing classes. We also thank HyungSeok Han and anonymous reviewers for their constructive feedback. This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT)