Skip to content

Commit

Permalink
Merge pull request #35 from superfr0/superfr0-stupid-update-1
Browse files Browse the repository at this point in the history
Just some tiny fixes
  • Loading branch information
ZeroChaos- authored Apr 22, 2024
2 parents aafa24f + da1f3f6 commit 6864006
Showing 1 changed file with 5 additions and 5 deletions.
10 changes: 5 additions & 5 deletions pages/RF-CTF-WIFI-Challenges.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,16 +11,16 @@ All challenges that are virtual will be available in person. Like in all past y

## virtual

Log in to your existing account or create a new one on our scoreboard: https://scoreboard.rfhackers.com/?wtf=login; once you are logged in, click the heading with your user name (https://scoreboard.rfhackers.com/?pita). Follow the directions to provision a new vm (below modifying user settings, above the user scoreboard). Click on the rather small button labeled "provision".
Log in to your existing account or create a new one on our scoreboard: https://scoreboard.rfhackers.com; once you are logged in, click the heading with your user name (https://scoreboard.rfhackers.com/user). Follow the directions to provision a new vm (below modifying user settings, above the user scoreboard). Click on the link to the left "Start My VM".


The page will change and indicate "VM Instance provisioning..." and will auto refresh back to the user page. The SSH keys will be provisioned now and you must download them to your machine. Follow the directions on the user page just below the SSH Private Key.
The page will change and indicate "VM Instance provisioning..." and will auto refresh back to the user page. The SSH keys will be provisioned now and you must download them to your machine by clicking on the link "this is the link to download the private key". Follow the directions on the user page just below the SSH Private Key. From here you can SSH into your environment of choice.


The virtual environment takes several minutes to complete, please be patient. Refresh the page every once in a while to see if it has completed.


Once provisioning is complete, you will see a block of infomation which tells you how to connect to the virtual environment using ssh or your web browser.
Once provisioning is complete, you will see a block of infomation which tells you how to connect to the virtual environment using SSH or your web browser.


There will also be two new buttons below the connection table.
Expand All @@ -32,12 +32,12 @@ There will also be two new buttons below the connection table.
## =SSH Access=


The game environment can be accessed over ssh or http. If you prefer ssh, here are some helpful tips:
The game environment can be accessed over ssh or http. If you prefer SSH, here are some helpful tips:

* The basic access example on the website will get you connected: ssh -i RFCTF_Key root@<your_randomly_assigned_hostname>.contestant.rfhackers.com -p 2201


* Additional ssh flags can be used to enhance the experience. For example, X11 forwarding can be enabled by adding "-X". Some users may need to bypass X11 security restrictions and use "-Y" instead, depending on the setup on your machine. Note: this only works if you are running a local X11 server, typically that means just linux users. Forwarding X11 means you can run a graphical program in the virtual environment and the display will be pushed back to your local machine through the ssh tunnel for you to interact with. This can be used, for example, with wireshark.
* Additional SSH flags can be used to enhance the experience. For example, X11 forwarding can be enabled by adding "-X". Some users may need to bypass X11 security restrictions and use "-Y" instead, depending on the setup on your machine. Note: this only works if you are running a local X11 server, typically that means just linux users. Forwarding X11 means you can run a graphical program in the virtual environment and the display will be pushed back to your local machine through the ssh tunnel for you to interact with. This can be used, for example, with wireshark.


* Instead of forwarding all X11 traffic (or in addition), you can forward specific ports from the local host to the remote host. Adding "-L 2501:localhost:2501" will forward port 2501 on your machine, through the ssh tunnel and connect it to port 2501 on the virtual wifi environment. This example can be used to connect your local web browser to an instance of kismet running in the virtual wifi environment. Simply add the -L 2501:localhost:2501 to your ssh invocation and then you can direct your local browser to "localhost:2501" and it will connect through the ssh tunnel to the remote machine's port 2501, where you are presumably running kismet.
Expand Down

0 comments on commit 6864006

Please sign in to comment.