OpenInfreno An Open Source RootWars Platform Dennis W. “LittleW0lf” Mattison

Slides:



Advertisements
Similar presentations
The Web Wizards Guide to Freeware/Shareware Chapter Six Open Source Software.
Advertisements

Current methods for negotiating firewalls for the Condor ® system Bruce Beckles (University of Cambridge Computing Service) Se-Chang Son (University of.
SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Adding scalability to legacy PHP web applications Overview Mario A. Valdez-Ramirez.
Welcome Windows SharePoint Service 3.0. Craig Carpenter MCSE, MCT Director, Combined Knowledge.
Introduction to InfoSec – Recitation 6 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Raw Sockets CS-480b Dick Steflik Raw Sockets Raw Sockets let you program at just above the network (IP) layer You could program at the IP level using.
The OWASP Foundation AppSec DC Learning by Breaking A New Project for Insecure Web Apps Chuck Willis Technical Director MANDIANT
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Akamai OS War Stories Bruce Maggs Gratuitous Quote of the Day Well you’re not hardcore (No you’re not hardcore) Unless you live hardcore (Unless.
Chapter 3.1 Teams and Processes. 2 Programming Teams In the 1980s programmers developed the whole game (and did the art and sounds too!) Now programmers.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
1 Security and Software Engineering Steven M. Bellovin AT&T Labs – Research
How the Internet Works Jon Crowcroft,
Software Development Unit 6.
U-Mail System Design Specification Joseph Woo, Chris Hacking, Alex Benson, Elliott Conant, Alex Meng, Michael Ratanapintha April 28,
ITK Lecture 12: Open Source & Cross Platform Software Development Methods in Image Analysis CMU Robotics Institute U. Pitt Bioengineering 2630 Spring.
P OTENTIAL OCR S OFTWARE FOR N UTRITION F ACTS L ABELS Dennis Given.
 Advantages  Easy to learn  Graphical Advantages  Help and Support  Widely used  Software compatibility  Customisable  Customisable Hardware 
GIT is for people who like SVN September 18 th 2012 Vladimir Kerkez and BK.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Build a CMS Website. The topics this chapter covers are: What is CMS ? What you can do with CMS The benefits and disadvantages of using a content management.
Firewalls, Perimeter Protection, and VPNs - SANS © SSH Operation The Swiss Army Knife of encryption tools…
TUNDRA The Ultimate Netflow Data Realtime Analysis Jeffrey Papen Yahoo! Inc.
OpenSSH: A Telnet Replacement Presented by Aaron Grothe Heimdall Linux, Inc.
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
1000 Hackers in a Box Problems with modern security scanners.
Standardised validation of ACORD messages Rob Campbell July 2007.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Copyright ®xSpring Pte Ltd, All rights reserved Versions DateVersionDescriptionAuthor May First version. Modified from Enterprise edition.NBL.
Introduction CSE 1310 – Introduction to Computers and Programming Vassilis Athitsos University of Texas at Arlington 1.
1 Welcome to CS 362 Applied Software Engineering What happens after (and during) design? Testing, debugging, maintaining programs Lessons for software.
Introduction CSE 1310 – Introduction to Computers and Programming Vassilis Athitsos University of Texas at Arlington 1.
Modification of Pktfilter tool 10/9/2015Pktfilter modification - Brad Baker1 Brad Baker CS591 Spring 2007 Term project.
System Development Life Cycle. The Cycle When creating software, hardware, or any kind of product you will go through several stages, we define these.
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Support for Vista Unity 5.0(1)
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Copyright (c) Cem Kaner. 1 Software Testing 1 CSE 3411 SWE 5411 Assignment #1 Replicate and Edit Bugs.
Introduction to Version Control SE-2030 Dr. Rob Hasker 1 Based on material at and slides written.
23-Oct-15 Abstract Data Types. 2 Data types A data type is characterized by: a set of values a data representation, which is common to all these values,
Chapter 3 Software. Learning Objectives Upon successful completion of this chapter, you will be able to: Define the term software Describe the two primary.
MENU Implications of Securing Router Infrastructure NANOG 31 May 24, 2004 Ryan McDowell
SSH Operation The Swiss Army Knife of encryption tools…
Packet Capture and Analysis: An Introduction to Wireshark 1.
BMTRY 789 Lecture 11: Debugging Readings – Chapter 10 (3 rd Ed) from “The Little SAS Book” Lab Problems – None Homework Due – None Final Project Presentations.
XP New Perspectives on Microsoft Access 2002 Tutorial 1 1 Microsoft Access 2007.
In the Labs… X-Bot 2003 by Overtech Technologies.
1 Sponsor Claim Process  Click on the Sponsor Claims menu in order to process claims.  The submenu will display: Sponsor Claims will display the most.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Dean Anderson Polk County, Oregon GIS in Action 2014 Modifying Open Source Software (A Case Study)
Thoughts on KeySec John Viega
M1G Introduction to Programming 2 3. Creating Classes: Room and Item.
Introduction CSE 1310 – Introduction to Computers and Programming Vassilis Athitsos University of Texas at Arlington 1.
11 Computers, C#, XNA, and You Session 1.1. Session Overview  Find out what computers are all about ...and what makes a great programmer  Discover.
Version Control and SVN ECE 297. Why Do We Need Version Control?
SPI NIGHTLIES Alex Hodgkins. SPI nightlies  Build and test various software projects each night  Provide a nightlies summary page that displays all.
Role Of Network IDS in Network Perimeter Defense.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Difference between External and Internal Server Monitoring.
Monitoring Dynamic IOC Installations Using the alive Record Dohn Arms Beamline Controls & Data Acquisition Group Advanced Photon Source.
What is Copyright?.
Introduction to Information Security
Introduction to Networking
Firewalls.
Genius Webinar series, August 2013
X in [Integration, Delivery, Deployment]
WebDriver on Windows 10 Greg
Vendor Software Lessons From Consulting Vendor Software.
Presentation transcript:

OpenInfreno An Open Source RootWars Platform Dennis W. “LittleW0lf” Mattison

Talk Contents ● OpenInfreno Background and Design Goals ● Toorcon RootWars 2003 ● Toorcon RootWars 2004 ● The Future ● Open Source

OpenInfreno Background and Design Goals ● What is OpenInfreno? – A Toolkit for RootWars style games ● Why OpenInfreno? – All other models proprietary... RootFU, etc. – Open game design under BSD/GPL Licenses ● Why Open Source? – Allows programmers from many walks of life – Allows me to work from home!

OpenInfreno Background and Design Goals ● Background – Originally a “proprietary” program developed for Toorcon RootWars 2003, but “opened” afterward – Version 2.0 used at Toorcon RootWars ● Design Goals – Modular design, everything revolving around a database. – Simple but secure ● We have a long way to go here!

Toorcon RootWars 2003 ● Written by two people: LittleW0lf and Insane. – John C. Hummel wrote the “scoreboard” ● Proprietary code, SAIC sponsored ● Most of code written in PHP, rest was written using Shell-scripting – Non-proprietary version of this system is available at openinfreno.sf.net as version – code only available via the BSD License.

Toorcon RootWars 2003 ● Backend used modified OpenSSH Daemon on TCP/3128 – Keys were compared using OpenSSL – Traffic penalty generated using ALTQ-PF on Firewall – PHP code was broken into three parts: ● Scorebot – Workhorse, responsible for accessing the SSH daemon and checking for services ● Display-Manager – Gives the points for the roots ● Traffic Manager – Generates penalty points for traffic usage

Toorcon RootWars 2003 ● Software performed relatively well, minor bugs: – Some of the “score” fields weren't displayed correctly, despite the fact that the engine properly counted them – No working Windows TM functionality (boo-hoo) – SNMP didn't work as advertised – Several of the targets (Cisco, You Own It...) could not be modified to work with the code because OpenSSH wasn't entirely portable – Other really minor issues that nobody even caught until after game was finished

Toorcon RootWars 2003 ● Lessons Learned – Code worked well, with minor issues – Realtime scoring is an absolute necessity! – Giving teams an idea about how the system works and the system scores the teams is really important. – Having the server do all the work caused too much complexity which caused its own problems. An agent version of the engine will probably work better because the server isn't doing everything. – The code must be opened!

Toorcon RootWars 2004 ● Written by LittleW0lf as OpenInfreno 2.0 ● Completely Open-Source, GPL and BSD Licensed, and available on openinfreno.sf.net ● Agent based – Agent sends traffic out from target to server using ICMP ECHO-REPLY messages – Agent-server collects the messages, verifies that they are valid packets, and records the results

Toorcon RootWars 2004 ● Code is written in both C and PHP – Agent and agent-server are in C – Scorebot, display-manager, and traffic manager are still written in PHP, but scorebot is now just a middle-man ● So, how did it work out?

Toorcon RootWars 2004 ● Lessons Learned – OpenSSL ● Poor Documentation ● Code examples of what we wanted to do were non- existant ● 3 rd Party Books are buggy – Linux to BSD Porting ● No standard base-class: u_int32_t vs uint32_t – Windows Agents ● Code needs some serious work, compiles correctly, but doesn't send icmp messages

The Future ● Next year, plan is to build score-server and images to be installed on the team's own hardware – Teams become the attackers and defenders – Unfortunately, this is the same thing that Ghetto Hackers do, (we don't want to step on their toes, or make Rootwars like Toorcon Rootfu.) However, we know why Ghetto went to this model (it is far easier on the developer and implementer)

The Future ● Need developers... ● Taking agent to the next level – OOB & Subversion – Covert channels – Smarter agents ● Clean-up of code ● Documentation, Documentation, Documentation

Isn't Releasing the Code Dangerous? ● We've fought with this for a while: – Releasing the code could allow for cheating – Releasing the code could allow for attacking of the score system – Releasing the code could allow others to take over RootWars and force us out – Releasing the code could just allow folks to create endless forks in the code...which won't help us much

Isn't Releasing the Code Dangerous? ● Is it really dangerous? – Openinfreno code was up on cvs.sf.net – Benefits of open source far outweigh potential risks – If someone can take over our job, doing it for free, and can do a better job, they are free to do so – Code forks are a risk, but keeping the code proprietary doesn't prevent code forks either

Joining the OpenInfreno Team ● Developers – Development is being done on sourceforge at the moment – Developers are welcome to join...however, folks interested in playing should not join, but can submit code changes to us ● Implementers – Folks interested in running rootwars like games using our code are welcome to do so...please let us know how it works for you, and how we can change it for the better