Giter Site home page Giter Site logo

c4t-but-s4d / s4dfarm Goto Github PK

View Code? Open in Web Editor NEW
65.0 8.0 13.0 4.66 MB

Attack & Defense CTF Farm based on DestructiveFarm

License: Other

Python 65.04% Shell 0.42% JavaScript 7.75% HTML 1.05% Dockerfile 1.33% Vue 19.45% SCSS 0.35% Makefile 0.29% Go 4.33%
ctf attack-defense attack-defense-ctf ctf-tools python

s4dfarm's Introduction

S4DFarm

This is a fork of DestructiveFarm, rewritten by the C4T BuT S4D team over the years.

Running:

  • Change the ./server/app/config.py file to your liking (don't forget to change the SERVER_PASSWORD).
  • Change external_redis password in docker-compose.yml (of you're planning to use it).
  • docker compose up --build -d
  • GLHF

Some screenshots:

flags

teams

s4dfarm's People

Contributors

borzunov avatar falamous avatar jnovikov avatar passkeyra avatar pomo-mondreganto avatar renbou avatar slava-sh avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

s4dfarm's Issues

Authorization header uses non constant time password comparison.

Authorization passwords are checked like: if auth != config['SERVER_PASSWORD']
https://github.com/C4T-BuT-S4D/S4DFarm/blob/master/server/app/auth.py#L16

An attacker could potential recover the password faster then guessing. A guessed password that has the first byte correct takes longer to check then a password that has the first byte wrong. Once the first byte is found, one can find the next byte and so on.

https://sqreen.github.io/DevelopersSecurityBestPractices/timing-attack/python

The attacker would need a lot of requests, as there can be quite some jitter and noise in the network, so it's not a very realistic attack, but might be feasable with enough samples.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.