Re: [Dailydave] DARPA CGC Recap

2017-08-17 Thread Dave Aitel
I just want a list of which vulnerabilities were exploited by which engines
and in what round + all the vulnerabilities in source (which is in the repo
I think). :)

In a way, having them be able to SEE people throw vulnerabilities at each
other corrupts the data a bit I think, because you no longer no what they
FOUND and what they SAW, if that makes sense?
-dave


On Thu, Aug 17, 2017 at 3:20 PM Jordan Wiens  wrote:

> Happy to answer any questions if there are any. (As best as I can remember
> anyway--been a while since we first recorded it and even longer since most
> of the analysis)
>
> One of my favorite moments we found what looked like true back-and-forth
> interaction between two of the CRS's. To be clear, we don't know at all
> /why/ they behaved the way they did since they were black boxes from our
> perspective. Even some of the teams I've talked to after the competition
> have no idea why their systems did what they did -- whether because lack of
> logging, or because the system architecture made introspection into which
> component initiated which actions difficult.
>
> These two systems had multiple rounds of back-and-forth behavior where:
>
> 1) a stack based BO was exploited against a service, and the payload
> obfuscated the address of the flag page data it was stealing bytes from
> (reading from the flag page was one mechanism for scoring).
>
> 2) a patch was submitted in the minimum time possible from the team being
> scored upon that generically protected the binary by remapping the stack as
> non-executable (and did a few other changes as well--they were all part of
> the standard toolkit this team applied to some binaries)
>
> 3) the attacking team re-formulated their payload to use ROP gadgets,
> successfully evading the NX stack protection, but now exposing the "flag
> page" address they were reading data from in cleartext on the wire
>
> 4) the defending team deployed a network filter that fairly naively (but
> effectively it turns out) blocked the first several bytes of the address of
> the flag page, stopping the exploit.
>
> And all it happened in less time than it would take even very good human
> exploiters to land bug in the first place (at least when forced to work
> with unfamiliar tools and a stressful environment). We actually have
> reasonably good data on that from last year's Infiltrate NOPCert challenge.
>
> On Wed, Aug 9, 2017 at 6:36 PM, Kristian Erik Hermansen <
> kristian.herman...@gmail.com> wrote:
>
>> A 2+ hour video recap released with interesting visuals and technical
>> analysis:
>>
>> Watch "Cyber Grand Challenge: The Analysis" on YouTube
>>
>> https://youtu.be/SYYZjTx92KU
>>
>> ___
>> Dailydave mailing list
>> Dailydave@lists.immunityinc.com
>> https://lists.immunityinc.com/mailman/listinfo/dailydave
>>
>>
> ___
> Dailydave mailing list
> Dailydave@lists.immunityinc.com
> https://lists.immunityinc.com/mailman/listinfo/dailydave
>
___
Dailydave mailing list
Dailydave@lists.immunityinc.com
https://lists.immunityinc.com/mailman/listinfo/dailydave


Re: [Dailydave] DARPA CGC Recap

2017-08-17 Thread Jordan Wiens
Happy to answer any questions if there are any. (As best as I can remember
anyway--been a while since we first recorded it and even longer since most
of the analysis)

One of my favorite moments we found what looked like true back-and-forth
interaction between two of the CRS's. To be clear, we don't know at all
/why/ they behaved the way they did since they were black boxes from our
perspective. Even some of the teams I've talked to after the competition
have no idea why their systems did what they did -- whether because lack of
logging, or because the system architecture made introspection into which
component initiated which actions difficult.

These two systems had multiple rounds of back-and-forth behavior where:

1) a stack based BO was exploited against a service, and the payload
obfuscated the address of the flag page data it was stealing bytes from
(reading from the flag page was one mechanism for scoring).

2) a patch was submitted in the minimum time possible from the team being
scored upon that generically protected the binary by remapping the stack as
non-executable (and did a few other changes as well--they were all part of
the standard toolkit this team applied to some binaries)

3) the attacking team re-formulated their payload to use ROP gadgets,
successfully evading the NX stack protection, but now exposing the "flag
page" address they were reading data from in cleartext on the wire

4) the defending team deployed a network filter that fairly naively (but
effectively it turns out) blocked the first several bytes of the address of
the flag page, stopping the exploit.

And all it happened in less time than it would take even very good human
exploiters to land bug in the first place (at least when forced to work
with unfamiliar tools and a stressful environment). We actually have
reasonably good data on that from last year's Infiltrate NOPCert challenge.

On Wed, Aug 9, 2017 at 6:36 PM, Kristian Erik Hermansen <
kristian.herman...@gmail.com> wrote:

> A 2+ hour video recap released with interesting visuals and technical
> analysis:
>
> Watch "Cyber Grand Challenge: The Analysis" on YouTube
>
> https://youtu.be/SYYZjTx92KU
>
> ___
> Dailydave mailing list
> Dailydave@lists.immunityinc.com
> https://lists.immunityinc.com/mailman/listinfo/dailydave
>
>
___
Dailydave mailing list
Dailydave@lists.immunityinc.com
https://lists.immunityinc.com/mailman/listinfo/dailydave


Re: [Dailydave] DARPA CGC Recap

2017-08-10 Thread Kristian Erik Hermansen
A 2+ hour video recap released with interesting visuals and technical
analysis:

Watch "Cyber Grand Challenge: The Analysis" on YouTube

https://youtu.be/SYYZjTx92KU
___
Dailydave mailing list
Dailydave@lists.immunityinc.com
https://lists.immunityinc.com/mailman/listinfo/dailydave


Re: [Dailydave] DARPA CGC Recap

2017-05-02 Thread Tyler Nighswander
Looks like a nice dump was just released that makes some of the CGC finals
info a little more friendly to look at: http://www.lungetech.com/cgc-corpus/
Doesn't answer all the questions I'm sure people have, but looks like a
great start

On Apr 24, 2017 10:54 AM, "David Manouchehri" 
wrote:

Thanks Chris!

I'll pull up my old notes and put them on GitHub this weekend as a starting
point.

Ryan Hileman's usercorn is a great way to lower the entry bar for getting
CGC ELFs running. https://github.com/lunixbochs/usercorn (I know this isn't
news to any of you in the conversation, it's for the mail list lurkers.)

Related topic: Is anyone willing to mirror about ~1 TB of CTF PCAPs for
long term archival? Give me a ping if you can or if you know someone who
might be able to.

On Apr 20, 2017 20:47, "Chris Eagle"  wrote:

> As far as I know there is no official document that describes the layout
> of that file. I can probably cobble together something unofficial.
>
> On 4/20/2017 3:40 PM, David Manouchehri wrote:
> > Chris: Is there any official notes on the directory/file structure of
> cfe-submissions.tgz?
>

___
Dailydave mailing list
Dailydave@lists.immunityinc.com
https://lists.immunityinc.com/mailman/listinfo/dailydave
___
Dailydave mailing list
Dailydave@lists.immunityinc.com
https://lists.immunityinc.com/mailman/listinfo/dailydave


Re: [Dailydave] DARPA CGC Recap

2017-04-24 Thread David Manouchehri
Thanks Chris!

I'll pull up my old notes and put them on GitHub this weekend as a starting
point.

Ryan Hileman's usercorn is a great way to lower the entry bar for getting
CGC ELFs running. https://github.com/lunixbochs/usercorn (I know this isn't
news to any of you in the conversation, it's for the mail list lurkers.)

Related topic: Is anyone willing to mirror about ~1 TB of CTF PCAPs for
long term archival? Give me a ping if you can or if you know someone who
might be able to.

On Apr 20, 2017 20:47, "Chris Eagle"  wrote:

> As far as I know there is no official document that describes the layout
> of that file. I can probably cobble together something unofficial.
>
> On 4/20/2017 3:40 PM, David Manouchehri wrote:
> > Chris: Is there any official notes on the directory/file structure of
> cfe-submissions.tgz?
>
___
Dailydave mailing list
Dailydave@lists.immunityinc.com
https://lists.immunityinc.com/mailman/listinfo/dailydave


Re: [Dailydave] DARPA CGC Recap

2017-04-21 Thread Chris Eagle
As far as I know there is no official document that describes the layout of 
that file. I can probably cobble together something unofficial.

On 4/20/2017 3:40 PM, David Manouchehri wrote:
> Chris: Is there any official notes on the directory/file structure of 
> cfe-submissions.tgz?
___
Dailydave mailing list
Dailydave@lists.immunityinc.com
https://lists.immunityinc.com/mailman/listinfo/dailydave


Re: [Dailydave] DARPA CGC Recap

2017-04-21 Thread David Manouchehri
Step 0.5: Figure out how to sanely sort and parse several thousand weird
CGC binaries.

e.g. CGC_Extended_Application.pdf is appended to the challenge binaries.
https://github.com/CyberGrandChallenge/cb-testing/blob/master/cgc-cb.mk#L194-L197

Chris: Is there any official notes on the directory/file structure
of cfe-submissions.tgz?

On Thu, Apr 20, 2017 at 3:51 PM, Dave Aitel  wrote:

> Ok, so the questions I have are still unanswered I think, possibly because
> it's a lot of work. But I think they're important.
>
> 1. Was there any REAL difference between the competitors? Everyone is all
> "oooh, ahh" about mayhem. But are there bugs or bugclasses it can find that
> open source shellphish or the ToB work cannot? I.E. Is the final score
> essentially noise for the thing we actually care about?
> 2. Is adding the SMT solver to the fuzzer 10% better or ... 1%? Would we
> be better just special casing certain things into the fuzzer?
> 3. What bugs could nobody find? Why?
>
> -dave
>
>
> On Tue, Apr 18, 2017 at 9:35 AM Chris Eagle  wrote:
>
>> If you want to be able to do all of the performance measurements then yes
>> that code is missing. If you want to study the successful PoVs then that
>> code is not required. Most of them can be replayed on the publicly
>> available VMs. However some of them depend on the specific CPUID values
>> returned by the CFE hardware which you might need to emulate somehow. Even
>> if all the code used to run the final event was released, the CPUID issue
>> would continue to be a problem unless you are able to return the same CPUID
>> values that the competitors saw during CFE.
>>
>> On 4/11/2017 10:38 AM, Ryan Stortz wrote:
>> > Notably missing are:
>> > * The kernel they ran the final event on
>> > * The code they used to measure scores
>> >
>> > This prevents a lot of analysis.
>> >
>> ___
>> Dailydave mailing list
>> Dailydave@lists.immunityinc.com
>> https://lists.immunityinc.com/mailman/listinfo/dailydave
>>
>
> ___
> Dailydave mailing list
> Dailydave@lists.immunityinc.com
> https://lists.immunityinc.com/mailman/listinfo/dailydave
>
>
___
Dailydave mailing list
Dailydave@lists.immunityinc.com
https://lists.immunityinc.com/mailman/listinfo/dailydave


Re: [Dailydave] DARPA CGC Recap

2017-04-20 Thread Dave Aitel
Ok, so the questions I have are still unanswered I think, possibly because
it's a lot of work. But I think they're important.

1. Was there any REAL difference between the competitors? Everyone is all
"oooh, ahh" about mayhem. But are there bugs or bugclasses it can find that
open source shellphish or the ToB work cannot? I.E. Is the final score
essentially noise for the thing we actually care about?
2. Is adding the SMT solver to the fuzzer 10% better or ... 1%? Would we be
better just special casing certain things into the fuzzer?
3. What bugs could nobody find? Why?

-dave


On Tue, Apr 18, 2017 at 9:35 AM Chris Eagle  wrote:

> If you want to be able to do all of the performance measurements then yes
> that code is missing. If you want to study the successful PoVs then that
> code is not required. Most of them can be replayed on the publicly
> available VMs. However some of them depend on the specific CPUID values
> returned by the CFE hardware which you might need to emulate somehow. Even
> if all the code used to run the final event was released, the CPUID issue
> would continue to be a problem unless you are able to return the same CPUID
> values that the competitors saw during CFE.
>
> On 4/11/2017 10:38 AM, Ryan Stortz wrote:
> > Notably missing are:
> > * The kernel they ran the final event on
> > * The code they used to measure scores
> >
> > This prevents a lot of analysis.
> >
> ___
> Dailydave mailing list
> Dailydave@lists.immunityinc.com
> https://lists.immunityinc.com/mailman/listinfo/dailydave
>
___
Dailydave mailing list
Dailydave@lists.immunityinc.com
https://lists.immunityinc.com/mailman/listinfo/dailydave


Re: [Dailydave] DARPA CGC Recap

2017-04-18 Thread Ryan Stortz
Notably missing are:
* The kernel they ran the final event on
* The code they used to measure scores

This prevents a lot of analysis.

On Tue, Apr 11, 2017 at 2:33 AM, Chris Eagle  wrote:

> I don't speak for DARPA.
>
> FWIW, various CGC final event data is available here:
>
> http://repo.cybergrandchallenge.com/cfe/
>
> In particular, the score_data.json files contained in the round specific
> tar files in cfe-submissions.tgz allow you to see which teams fielded
> successful PoVs in each round.
>
> Video of the dev team's CGC related Shmoocon panel is here:
> http://bit.ly/2p1LGcb
>
> Some summary stats:
>
> There were 82 challenge sets fielded during CFE.
> Vulnerabilities were proven in 20 of them.
> Unintended vulnerabilities were found in at least 5 of those 20.
> The majority of flaws found were stack overflows.
> In my opinion, there was only one legitimate, successful heap corruption
> PoV. Keep in mind that all of the challenges used custom heap
> implementations that the competitors had not seen before the final event.
>
> A browsable archive of CGC data will be available soon.
>
> Many papers are in various stages of publication by competitor teams and
> DARPA's CGC team. These should shed a lot of light on what took place
> during the final event.
>
> Regards,
>
> Chris
>
> On 4/3/2017 9:56 PM, Dan Guido wrote:
> > Hey DailyDave,
> >
> > I wanted to share a keynote I delivered recently on the Cyber Grand
> > Challenge and the broader advancements made in the field of automated
> > bug finding as of late. Dave was asking on Twitter if anyone had
> > released a detailed teardown of the CGC final event and I think my
> > presentation is the closest thing to it. It's pretty light, and might
> > be fun to watch on your way to Infiltrate.
> >
> > https://blog.trailofbits.com/2017/02/16/the-smart-fuzzer-revolution/
> >
> > Of course, DARPA has not released the raw data from the final event
> > yet so it's impossible to produce the analysis that I know Dave is
> > looking for. Maybe soon?
> >
> > Have fun at Infiltrate everyone. I'll see you there!
> >
> > -Dan
> >
> > Our original conversation on Twitter:
> > https://twitter.com/dguido/status/841705081988870145
> > ___
> > Dailydave mailing list
> > Dailydave@lists.immunityinc.com
> > https://lists.immunityinc.com/mailman/listinfo/dailydave
> >
> ___
> Dailydave mailing list
> Dailydave@lists.immunityinc.com
> https://lists.immunityinc.com/mailman/listinfo/dailydave
>
___
Dailydave mailing list
Dailydave@lists.immunityinc.com
https://lists.immunityinc.com/mailman/listinfo/dailydave


Re: [Dailydave] DARPA CGC Recap

2017-04-18 Thread Chris Eagle
If you want to be able to do all of the performance measurements then yes that 
code is missing. If you want to study the successful PoVs then that code is not 
required. Most of them can be replayed on the publicly available VMs. However 
some of them depend on the specific CPUID values returned by the CFE hardware 
which you might need to emulate somehow. Even if all the code used to run the 
final event was released, the CPUID issue would continue to be a problem unless 
you are able to return the same CPUID values that the competitors saw during 
CFE.

On 4/11/2017 10:38 AM, Ryan Stortz wrote:
> Notably missing are:
> * The kernel they ran the final event on
> * The code they used to measure scores
> 
> This prevents a lot of analysis.
> 
___
Dailydave mailing list
Dailydave@lists.immunityinc.com
https://lists.immunityinc.com/mailman/listinfo/dailydave


Re: [Dailydave] DARPA CGC Recap

2017-04-18 Thread Julio Auto
Thought I would add that Phrack has published a really nice paper by
Shellphish (one of the teams in the finals, finished 3rd place) on CGC and
their CRS (Cyber Reasoning System):
http://phrack.org/papers/cyber_grand_shellphish.html

That's the best technical write up, to my knowledge, of the inner workings
of a top-notch CRS.

Julio Auto

On Tue, Apr 11, 2017 at 9:25 AM Chris Eagle  wrote:

> I don't speak for DARPA.
>
> FWIW, various CGC final event data is available here:
>
> http://repo.cybergrandchallenge.com/cfe/
>
> In particular, the score_data.json files contained in the round specific
> tar files in cfe-submissions.tgz allow you to see which teams fielded
> successful PoVs in each round.
>
> Video of the dev team's CGC related Shmoocon panel is here:
> http://bit.ly/2p1LGcb
>
> Some summary stats:
>
> There were 82 challenge sets fielded during CFE.
> Vulnerabilities were proven in 20 of them.
> Unintended vulnerabilities were found in at least 5 of those 20.
> The majority of flaws found were stack overflows.
> In my opinion, there was only one legitimate, successful heap corruption
> PoV. Keep in mind that all of the challenges used custom heap
> implementations that the competitors had not seen before the final event.
>
> A browsable archive of CGC data will be available soon.
>
> Many papers are in various stages of publication by competitor teams and
> DARPA's CGC team. These should shed a lot of light on what took place
> during the final event.
>
> Regards,
>
> Chris
>
> On 4/3/2017 9:56 PM, Dan Guido wrote:
> > Hey DailyDave,
> >
> > I wanted to share a keynote I delivered recently on the Cyber Grand
> > Challenge and the broader advancements made in the field of automated
> > bug finding as of late. Dave was asking on Twitter if anyone had
> > released a detailed teardown of the CGC final event and I think my
> > presentation is the closest thing to it. It's pretty light, and might
> > be fun to watch on your way to Infiltrate.
> >
> > https://blog.trailofbits.com/2017/02/16/the-smart-fuzzer-revolution/
> >
> > Of course, DARPA has not released the raw data from the final event
> > yet so it's impossible to produce the analysis that I know Dave is
> > looking for. Maybe soon?
> >
> > Have fun at Infiltrate everyone. I'll see you there!
> >
> > -Dan
> >
> > Our original conversation on Twitter:
> > https://twitter.com/dguido/status/841705081988870145
> > ___
> > Dailydave mailing list
> > Dailydave@lists.immunityinc.com
> > https://lists.immunityinc.com/mailman/listinfo/dailydave
> >
> ___
> Dailydave mailing list
> Dailydave@lists.immunityinc.com
> https://lists.immunityinc.com/mailman/listinfo/dailydave
>
___
Dailydave mailing list
Dailydave@lists.immunityinc.com
https://lists.immunityinc.com/mailman/listinfo/dailydave


Re: [Dailydave] DARPA CGC Recap

2017-04-11 Thread Chris Eagle
I don't speak for DARPA.

FWIW, various CGC final event data is available here:

http://repo.cybergrandchallenge.com/cfe/

In particular, the score_data.json files contained in the round specific tar 
files in cfe-submissions.tgz allow you to see which teams fielded successful 
PoVs in each round.

Video of the dev team's CGC related Shmoocon panel is here: 
http://bit.ly/2p1LGcb

Some summary stats:

There were 82 challenge sets fielded during CFE.
Vulnerabilities were proven in 20 of them.
Unintended vulnerabilities were found in at least 5 of those 20.
The majority of flaws found were stack overflows.
In my opinion, there was only one legitimate, successful heap corruption PoV. 
Keep in mind that all of the challenges used custom heap implementations that 
the competitors had not seen before the final event.

A browsable archive of CGC data will be available soon.

Many papers are in various stages of publication by competitor teams and 
DARPA's CGC team. These should shed a lot of light on what took place during 
the final event.

Regards,

Chris

On 4/3/2017 9:56 PM, Dan Guido wrote:
> Hey DailyDave,
> 
> I wanted to share a keynote I delivered recently on the Cyber Grand
> Challenge and the broader advancements made in the field of automated
> bug finding as of late. Dave was asking on Twitter if anyone had
> released a detailed teardown of the CGC final event and I think my
> presentation is the closest thing to it. It's pretty light, and might
> be fun to watch on your way to Infiltrate.
> 
> https://blog.trailofbits.com/2017/02/16/the-smart-fuzzer-revolution/
> 
> Of course, DARPA has not released the raw data from the final event
> yet so it's impossible to produce the analysis that I know Dave is
> looking for. Maybe soon?
> 
> Have fun at Infiltrate everyone. I'll see you there!
> 
> -Dan
> 
> Our original conversation on Twitter:
> https://twitter.com/dguido/status/841705081988870145
> ___
> Dailydave mailing list
> Dailydave@lists.immunityinc.com
> https://lists.immunityinc.com/mailman/listinfo/dailydave
> 
___
Dailydave mailing list
Dailydave@lists.immunityinc.com
https://lists.immunityinc.com/mailman/listinfo/dailydave