Dailydave mailing list archives
Re: CGC Wrapup Video
From: Jordan Wiens <jordan () psifertex com>
Date: Thu, 17 Aug 2017 15:19:00 -0400
For what it's worth, the CTF-as-esport dream takes more work than I have time these days unfortunately. I'm still convinced it will happen, just not sure who will do it. That said, visualizations like this are going to be key to pulling it off. A really nice interface to the raw data is available from Lunge: http://www.lungetech.com/cgc-corpus/ The modified Qemu and API to produce execution traces for visualization (along with yet another web interface to pick through the raw data which is what we used during the live event to try to make sense of the chaos) from Rusty and I is online at: https://github.com/Vector35/trace-api And most importantly, the software to visualize the traces is open sourced here: https://github.com/voidALPHA/cgc_viz Generating trace-files that are capable of visualization isn't hard. At their simplest form you just need an instruction pointer trace over an execution. Adding on disassembly, register contents, data flow, and memory read/writes makes for a much more useful visualization, but there's a pretty surprising amount of value just in instruction pointer "shapes". Bonus related links: Raw data: https://github.com/lungetech/cgc-corpus https://github.com/lungetech/cgc-cfe-submission-corpus https://github.com/lungetech/cgc-cqe-submission-corpus Trail of Bits is maintaining a patched version of the binaries and build configurations (https://github.com/trailofbits/cb-multios/) with the goal of being able to be built across lots of platforms. In many ways, one of the best legacies of CGC is the very convenient and large sample corpus with included exploits, patches, and functionality polls On Thu, Aug 17, 2017 at 11:51 AM, dave aitel <dave () immunityinc com> wrote:
So I wanted to type up some notes on the CGC Wrapup <https://www.youtube.com/watch?v=SYYZjTx92KU> video, which was excellent. I mean, a part of what you want to do, while you watch it, is strip out all the parts of the thing that are about "playing the game". I know Jordan loves CTFs as some sort of e-sport and also there's a whole community who for whatever reason plays CTFs instead of playing corewars on helpless Chinese networks like of yore, but that stuff is 100% distraction when it comes to the CGC. As you can see, the tiny red lines on the right are supposed to be some combination of "could hack and could secure a service". I can't find anywhere something that has a simple spreadsheet of which samples <http://www.lungetech.com/cgc-corpus/challenges/NRFIN_00080/> (and even which vulns in which samples) were able to be attacked by which teams. So much of the game was weighted towards performance characteristics that it's hard to determine the information you really need from the scores, although the video goes over some anecdotal examples where RUBEUS and MECHAPHISH were able to attack particular historically interesting programs. It's telling that Mayhem won despite being basically off for half the contest. ;) Does anyone have better data on this? -dave P.S. Holy cow the visualizations on program execution are next gen! Worth a close watch just to see them. _______________________________________________ Dailydave mailing list Dailydave () lists immunityinc com https://lists.immunityinc.com/mailman/listinfo/dailydave
_______________________________________________ Dailydave mailing list Dailydave () lists immunityinc com https://lists.immunityinc.com/mailman/listinfo/dailydave
Current thread:
- CGC Wrapup Video dave aitel (Aug 17)
- Re: CGC Wrapup Video Jordan Wiens (Aug 17)
- Re: CGC Wrapup Video Tyler Nighswander (Aug 17)
- Re: CGC Wrapup Video Chris Eagle (Aug 17)
- Re: CGC Wrapup Video dave aitel (Aug 17)
- Re: CGC Wrapup Video Jordan Wiens (Aug 18)
- Re: CGC Wrapup Video Dave Aitel (Aug 18)
- Re: CGC Wrapup Video Dave Aitel (Aug 18)
- Re: CGC Wrapup Video dave aitel (Aug 17)