-
Notifications
You must be signed in to change notification settings - Fork 116
write defensive challenges #69
Comments
but that would be difficult to evaluate, unless peer review is an option.. but then again peer review works well only in strong peer groups. (it's like a prisoner's dilemma game .. you have 2 equilibria here) |
we could start with very simple challenges, like
|
Or we can create an interpreter to parse javascript/ruby/whatever language and get the output. While it's practically possible, it may do much more harm to someone, since the result might be valid, but the means (the way the solution is written) are trashy. Memory leaks, new holes, etc. might appear in the "correct" code. As @subhayanRM, this requires peer review |
Can we add codes which are vulnerable to Buffer Overflow and let fixing it be a challenge?! |
How would you test for buffer overflow without executing the code? On 17.12.2014 18:35, Nishaanth Gunasekaran wrote:
|
We could probably add a vulnerable file and ssh it. Access the file. Fix it and upload it again. We can have an option to download the file or better ssh and access the file. |
@gameFace22 It doesn't resolve the issue of checking for the correctness of the answer... |
Oh,yes! |
We need a sandbox for that, something where you are able to execute code On 17.12.2014 20:29, Nishaanth Gunasekaran wrote:
|
Great! I will go search for more defensive challenges. |
for sqli challenges in js |
I believe we have a much better solution for this now using docker ;). We already have a sample PHP challenge (dealing with XSS in the branch a0xnirudh/docker) which is intentionally vulnerable and users should fix the code and submit back to interface which then tells you if you have done a correct fix or not. Since we are actually executing code, chances of false positives are much low. Do test when any of you has some time and let me know. I will be adding more challenges and support to other web languages (only PHP support now) like Nodejs, ROR etc in the near future. Thanks ! |
@a0xnirudh is right, we finally haz sandbox 💯 challenge looks cool on a first glance, I'll check it when i'm back behind a computer |
@northdpole We can put vulnerable code for Owasp Top 10 like Injection (Header, SQLi, etc) , XSS, LFI, RFI, CSRF, etc. |
@RahulPratapSingh Yes, I will working on the same this summer ! @northdpole I think we can close this issue now ? |
All of our challenges are in the mentality of "here's the application break it", it would be nice to have challenges where the student is given a piece of broken code and they are required to fix it
The text was updated successfully, but these errors were encountered: