Start writting subject, as a manpage
This commit is contained in:
parent
ee6fbe3e74
commit
5fd2795871
|
@ -0,0 +1 @@
|
|||
adlin.6.gz
|
|
@ -0,0 +1,11 @@
|
|||
MANPAGES=adlin.6.gz
|
||||
|
||||
all: ${MANPAGES}
|
||||
|
||||
.md.gz:
|
||||
pandoc -i $< -s -t man | gzip > $@
|
||||
|
||||
clean::
|
||||
rm ${MANPAGES}
|
||||
|
||||
.SUFFIXES: .md .gz
|
|
@ -0,0 +1,113 @@
|
|||
---
|
||||
title: ADLIN
|
||||
section: 6
|
||||
header: ADvanced LINux administration
|
||||
footer: EPITA SRS 2019
|
||||
author: Écrit par Pierre-Olivier *nemunaire* Mercier <**nemunaire+adlin@nemunai.re**>
|
||||
date: 2018-02-21
|
||||
hyphenate: true
|
||||
pandoc-version: true
|
||||
...
|
||||
|
||||
# NOM
|
||||
|
||||
ADLIN - Travaux pratiques d'ADministration système LINux avancée
|
||||
|
||||
|
||||
# SYNOPSIS
|
||||
|
||||
Au sein d’une salle machine hostile, vous devez vous infiltrer au sein d'un
|
||||
système et réussir à en reprendre le contrôle, alors qu’il n’y a plus
|
||||
d’infrastructure réseau, ni de système d’automatisation à votre disposition.
|
||||
|
||||
|
||||
# DESCRIPTION
|
||||
|
||||
## STAGE -1
|
||||
|
||||
Authentification
|
||||
|
||||
|
||||
## STAGE 0
|
||||
|
||||
Outrepasser la phase de connexion et devenir **root** sur le système.
|
||||
|
||||
|
||||
## STAGE 1
|
||||
|
||||
**adlin token1 | curl -d @- https://172.23.0.1/challenge1**
|
||||
|
||||
Voir aussi: **modprobe**(8), **fbi**(1), **ip**(8), **ip-link**(8), **ip-address**(8)
|
||||
|
||||
|
||||
## STAGE 2
|
||||
|
||||
**adlin token2 | curl -d @- https://172.23.200.1/challenge2**
|
||||
|
||||
Voir aussi: **ip-route**(8), **crontab**(1)
|
||||
|
||||
|
||||
## STAGE 3 (bonus)
|
||||
|
||||
**cat token3 | curl -d @- https://172.23.200.1/challenge3**
|
||||
|
||||
Voir aussi: **mount**(8)
|
||||
|
||||
|
||||
## STAGE 4
|
||||
|
||||
**token4 | curl -d @- https://172.23.200.1/challenge4**
|
||||
|
||||
Voir aussi: **ntpd**(1)
|
||||
|
||||
|
||||
## STAGE 4
|
||||
|
||||
**dig** *token4* **| curl -d @- https://172.23.200.1/challenge4**
|
||||
|
||||
Voir aussi: **resolv.conf**(5), **dig**(1)
|
||||
|
||||
|
||||
## STAGE 5
|
||||
|
||||
**adlin toke5 | curl -d @- https://adlin.nemunai.re/challenge5**
|
||||
|
||||
Voir aussi: **ip-link**(8), **udhcpc**(1), **traceroute**(8), **tcpdump**(1), **sysctl**(8)
|
||||
|
||||
|
||||
## STAGE 6
|
||||
|
||||
**mail** [*OPTIONS*] **adlin@nemunai.re**
|
||||
|
||||
Voir aussi: **dig**(1), **mail**(1)
|
||||
|
||||
|
||||
## STAGE 7
|
||||
|
||||
**cat ~/.ssh/***id_ssh* **| curl -d @- https://adlin.nemunai.re/sshkey**
|
||||
|
||||
Voir aussi: **ssh-keygen**(1)
|
||||
|
||||
|
||||
## STAGE 8
|
||||
|
||||
**ssh -p** *23000* **root@adlin.nemunai.re**
|
||||
|
||||
|
||||
# VOIR AUSSI
|
||||
|
||||
* <http://www.opsschool.org/> - Ops School Curriculum
|
||||
* <https://github.com/kahun/awesome-sysadmin> - A curated list of amazingly awesome open source sysadmin resources
|
||||
* <https://dvdhrm.wordpress.com/> - Ponyhof - Dysfunctional Programming
|
||||
* The Practice of System and Network Administration - T. Limoncelli, C. Hogan, S. Chalup
|
||||
* Programmation système en C sous Linux - Christophe Blaess – Eyrolles
|
||||
|
||||
|
||||
# HISTORIQUE
|
||||
|
||||
2018 - Première édition du cours à destination des SRS 2019.
|
||||
|
||||
|
||||
# CONFORMITÉ
|
||||
|
||||
Certifié non conforme.
|
Reference in New Issue