Skip to content

Commit

Permalink
Merge branch 'master' into issue-1016-90-days
Browse files Browse the repository at this point in the history
  • Loading branch information
commjoen authored Oct 25, 2023
2 parents 5234b26 + f30d22c commit 22feeac
Show file tree
Hide file tree
Showing 19 changed files with 391 additions and 333 deletions.
2 changes: 1 addition & 1 deletion .github/scripts/.bash_history
Original file line number Diff line number Diff line change
Expand Up @@ -347,7 +347,7 @@ rm -rf jdk-18_linux-x64_bin.deb
git rebase -i main
git rebase -i master
git stash
export tempPassword="/gkPXTAINoobxAK2RDxI3uL8rEh5y1gSd2ARHGysnss="
export tempPassword="eMKkXGoGTaMstiFONhqJmdICbOhyDy2OGBJIVGJhFgw="
mvn run tempPassword
k6
npx k6
Expand Down
2 changes: 1 addition & 1 deletion .github/scripts/docker-create.sh
Original file line number Diff line number Diff line change
Expand Up @@ -290,7 +290,7 @@ build_update_pom() {
mv temp4.txt ../../src/main/resources/templates/about.html
rm tem*.txt
echo "Building and updating pom.xml file so we can use it in our docker"
cd ../.. && ./mvnw clean && ./mvnw --batch-mode release:update-versions -DdevelopmentVersion=${tag}-SNAPSHOT && ./mvnw install -DskipTests
cd ../.. && ./mvnw clean && ./mvnw --batch-mode release:update-versions -DdevelopmentVersion=${tag}-SNAPSHOT && ./mvnw spotless:apply && ./mvnw install -DskipTests
cd .github/scripts
docker buildx create --name mybuilder
docker buildx use mybuilder
Expand Down
3 changes: 3 additions & 0 deletions .github/workflows/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,9 @@ jobs:
fetch-depth: 0
- name: Install node
uses: actions/setup-node@v4
with:
node-version: 20
cache: "npm"
- name: Set up JDK 21
uses: actions/setup-java@v3
with:
Expand Down
4 changes: 2 additions & 2 deletions Dockerfile.web
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
FROM jeroenwillemsen/wrongsecrets:1.7.0-no-vault
ARG argBasedVersion="1.7.0RC4-no-vault"
FROM jeroenwillemsen/wrongsecrets:1.7.1-no-vault
ARG argBasedVersion="1.7.1-no-vault"
ARG CANARY_URLS="http://canarytokens.com/terms/about/s7cfbdakys13246ewd8ivuvku/post.jsp,http://canarytokens.com/terms/about/y0all60b627gzp19ahqh7rl6j/post.jsp"
ARG CTF_ENABLED=false
ARG HINTS_ENABLED=true
Expand Down
88 changes: 50 additions & 38 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@

Welcome to the OWASP WrongSecrets game! The game is packed with real life examples of how to _not_ store secrets in your software. Each of these examples is captured in a challenge, which you need to solve using various tools and techniques. Solving these challenges will help you recognize common mistakes & can help you to reflect on your own secrets management strategy.

Can you solve all the 38 challenges?
Can you solve all the 41 challenges?

Try some of them on [our Heroku demo environment](https://wrongsecrets.herokuapp.com/) or on our [Okteto demo environment (might need to awake again)](https://wrongsecrets-commjoen.cloud.okteto.net/).

Expand Down Expand Up @@ -72,7 +72,7 @@ Copyright (c) 2020-2023 Jeroen Willemsen and WrongSecrets contributors.

## Basic docker exercises

_Can be used for challenges 1-4, 8, 12-32, 34, 35-38_
_Can be used for challenges 1-4, 8, 12-32, 34, 35-41_

For the basic docker exercises you currently require:

Expand Down Expand Up @@ -118,6 +118,9 @@ Now you can try to find the secrets by means of solving the challenge offered at
- [localhost:8080/challenge/36](http://localhost:8080/challenge/36)
- [localhost:8080/challenge/37](http://localhost:8080/challenge/37)
- [localhost:8080/challenge/38](http://localhost:8080/challenge/38)
- [localhost:8080/challenge/39](http://localhost:8080/challenge/39)
- [localhost:8080/challenge/40](http://localhost:8080/challenge/40)
- [localhost:8080/challenge/41](http://localhost:8080/challenge/41)

Note that these challenges are still very basic, and so are their explanations. Feel free to file a PR to make them look
better ;-).
Expand All @@ -142,7 +145,7 @@ If you want to host WrongSecrets on Railway, you can do so by deploying [this on

## Basic K8s exercise

_Can be used for challenges 1-6, 8, 12-38_
_Can be used for challenges 1-6, 8, 12-41_

### Minikube based

Expand Down Expand Up @@ -199,7 +202,7 @@ Don't want to go over the hassle of setting up K8S yourself? visit [https://wron

## Vault exercises with minikube

_Can be used for challenges 1-8, 12-38_
_Can be used for challenges 1-8, 12-41_
Make sure you have the following installed:

- minikube with docker (or comment out line 8 and work at your own k8s setup),
Expand All @@ -217,7 +220,7 @@ This is because if you run the start script again it will replace the secret in

## Cloud Challenges

_Can be used for challenges 1-38_
_Can be used for challenges 1-41_

**READ THIS**: Given that the exercises below contain IAM privilege escalation exercises,
never run this on an account which is related to your production environment or can influence your account-over-arching
Expand Down Expand Up @@ -265,47 +268,56 @@ You can enable Swagger documentation and the Swagger UI by overriding the `SPRIN

Leaders:

- [Ben de Haan @bendehaan](https://github.com/bendehaan)
- [Jeroen Willemsen @commjoen](https://github.com/commjoen)
- [Ben de Haan @bendehaan](https://www.github.com/bendehaan)
- [Jeroen Willemsen @commjoen](https://www.github.com/commjoen)

Top contributors:

- [Joss Sparkes @remakingeden](https://github.com/remakingeden)
- [Nanne Baars @nbaars](https://github.com/nbaars)
- [Puneeth Y @puneeth072003](https://github.com/puneeth072003)
- [Marcin Nowak @drnow4u](https://github.com/drnow4u)
- [Divyanshu Dev @Novice-expert](https://github.com/Novice-expert)
- [Tibor Hercz @tiborhercz](https://github.com/tiborhercz)
- [Rodolfo Cabral Neves @roddas](https://github.com/roddas)
- [Chris Elbring Jr. @neatzsche](https://github.com/neatzsche)
- [Mike Woudenberg @mikewoudenberg](https://github.com/mikewoudenberg)
- [Filip Chyla @fchyla](https://github.com/fchyla)
- [Dmitry Litosh @Dlitosh](https://github.com/Dlitosh)
- [Josh Grossman @tghosth](https://github.com/tghosth)
- [Turjo Chowdhury @turjoc120](https://github.com/turjoc120)
- [Spyros @northdpole](https://github.com/northdpole)
- [Ruben Kruiver @RubenAtBinx](https://github.com/RubenAtBinx)
- [Shlomo Zalman Heigh @szh](https://github.com/szh)
- [Nicolas Humblot @nhumblot](https://github.com/nhumblot)
- [Madhu Akula @madhuakula](https://github.com/madhuakula)
- [Finn @f3rn0s](https://github.com/f3rn0s)
- [Alex Bender @alex-bender](https://github.com/alex-bender)
- [Rick M @kingthorin](https://github.com/kingthorin)
- [Jannik Hollenbach @J12934](https://www.github.com/J12934)
- [Puneeth Y @puneeth072003](https://www.github.com/puneeth072003)
- [Joss Sparkes @RemakingEden](https://www.github.com/RemakingEden)

Contributors:

- [Nanne Baars @nbaars](https://www.github.com/nbaars)
- [Marcin Nowak @drnow4u](https://www.github.com/drnow4u)
- [Rodolfo Cabral Neves @roddas](https://www.github.com/roddas)
- [Osama Magdy @osamamagdy](https://www.github.com/osamamagdy)
- [Divyanshu Dev @Novice-expert](https://www.github.com/Novice-expert)
- [Tibor Hercz @tiborhercz](https://www.github.com/tiborhercz)
- [Chris Elbring Jr. @neatzsche](https://www.github.com/neatzsche)
- [Diamond Rivero @diamant3](https://www.github.com/diamant3)
- [Adarsh A @adarsh-a-tw](https://www.github.com/adarsh-a-tw)
- [Filip Chyla @fchyla](https://www.github.com/fchyla)
- [Dmitry Litosh @Dlitosh](https://www.github.com/Dlitosh)
- [Turjo Chowdhury @turjoc120](https://www.github.com/turjoc120)
- [Josh Grossman @tghosth](https://www.github.com/tghosth)
- [alphasec @alphasecio](https://www.github.com/alphasecio)
- [Madhu Akula @madhuakula](https://www.github.com/madhuakula)
- [Mike Woudenberg @mikewoudenberg](https://www.github.com/mikewoudenberg)
- [Spyros @northdpole](https://www.github.com/northdpole)
- [RubenAtBinx @RubenAtBinx](https://www.github.com/RubenAtBinx)
- [Vineeth Jagadeesh @djvinnie](https://www.github.com/djvinnie)
- [Alex Bender @alex-bender](https://www.github.com/alex-bender)
- [Nicolas Humblot @nhumblot](https://www.github.com/nhumblot)
- [Rick M @kingthorin](https://www.github.com/kingthorin)
- [Shlomo Zalman Heigh @szh](https://www.github.com/szh)
- [Fern @f3rn0s](https://www.github.com/f3rn0s)

Testers:

- [Dave van Stein @davevs](https://github.com/davevs)
- [Marcin Nowak @MarcinNowak-codes](https://github.com/drnow4u)
- [Marc Chang Sing Pang @mchangsp](https://github.com/mchangsp)
- [Vineeth Jagadeesh @djvinnie](https://github.com/djvinnie)
- [Dave van Stein @davevs](https://www.github.com/davevs)
- [Marcin Nowak @drnow4u](https://www.github.com/drnow4u)
- [Marc Chang Sing Pang @mchangsp](https://www.github.com/mchangsp)
- [Vineeth Jagadeesh @djvinnie](https://www.github.com/djvinnie)

Special mentions for helping out:
Special thanks:

- [Madhu Akula @madhuakula](https://github.com/madhuakula)
- [Björn Kimminich @bkimminich](https://github.com/bkimminich)
- [Dan Gora @devsecops](https://github.com/devsecops)
- [Xiaolu Dai @saragluna](https://github.com/saragluna)
- [Jonathan Giles @jonathanGiles](https://github.com/JonathanGiles)
- [Madhu Akula @madhuakula @madhuakula](https://www.github.com/madhuakula)
- [Björn Kimminich @bkimminich](https://www.github.com/bkimminich)
- [Dan Gora @devsecops](https://www.github.com/devsecops)
- [Xiaolu Dai @saragluna](https://www.github.com/saragluna)
- [Jonathan Giles @jonathanGiles](https://www.github.com/jonathanGiles)

### Sponsorships

Expand Down
2 changes: 1 addition & 1 deletion aws/k8s/secret-challenge-vault-deployment.yml
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ spec:
volumeAttributes:
secretProviderClass: "wrongsecrets-aws-secretsmanager"
containers:
- image: jeroenwillemsen/wrongsecrets:1.7.0-k8s-vault
- image: jeroenwillemsen/wrongsecrets:1.7.1-k8s-vault
imagePullPolicy: IfNotPresent
name: secret-challenge
securityContext:
Expand Down
2 changes: 1 addition & 1 deletion azure/k8s/secret-challenge-vault-deployment.yml.tpl
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ spec:
volumeAttributes:
secretProviderClass: "azure-wrongsecrets-vault"
containers:
- image: jeroenwillemsen/wrongsecrets:1.7.0-k8s-vault
- image: jeroenwillemsen/wrongsecrets:1.7.1-k8s-vault
imagePullPolicy: IfNotPresent
name: secret-challenge
securityContext:
Expand Down
2 changes: 1 addition & 1 deletion fly.toml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ app = "wrongsecrets"
primary_region = "ams"

[build]
image = "docker.io/jeroenwillemsen/wrongsecrets:1.7.0-no-vault"
image = "docker.io/jeroenwillemsen/wrongsecrets:1.7.1-no-vault"

[env]
K8S_ENV = "Fly(Docker)"
Expand Down
2 changes: 1 addition & 1 deletion gcp/k8s/secret-challenge-vault-deployment.yml.tpl
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ spec:
volumeAttributes:
secretProviderClass: "wrongsecrets-gcp-secretsmanager"
containers:
- image: jeroenwillemsen/wrongsecrets:1.7.0-k8s-vault
- image: jeroenwillemsen/wrongsecrets:1.7.1-k8s-vault
imagePullPolicy: IfNotPresent
name: secret-challenge
ports:
Expand Down
2 changes: 1 addition & 1 deletion k8s/secret-challenge-deployment.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ spec:
runAsGroup: 2000
fsGroup: 2000
containers:
- image: jeroenwillemsen/wrongsecrets:1.7.0-no-vault
- image: jeroenwillemsen/wrongsecrets:1.7.1-no-vault
imagePullPolicy: IfNotPresent
name: secret-challenge
ports:
Expand Down
2 changes: 1 addition & 1 deletion k8s/secret-challenge-vault-deployment.yml
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ spec:
runAsNonRoot: true
serviceAccountName: vault
containers:
- image: jeroenwillemsen/wrongsecrets:1.7.0-k8s-vault
- image: jeroenwillemsen/wrongsecrets:1.7.1-k8s-vault
imagePullPolicy: IfNotPresent
name: secret-challenge
securityContext:
Expand Down
2 changes: 1 addition & 1 deletion okteto/k8s/secret-challenge-ctf-deployment.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ spec:
runAsGroup: 2000
fsGroup: 2000
containers:
- image: jeroenwillemsen/wrongsecrets:1.7.0-no-vault
- image: jeroenwillemsen/wrongsecrets:1.7.1-no-vault
name: secret-challenge-ctf
imagePullPolicy: IfNotPresent
securityContext:
Expand Down
2 changes: 1 addition & 1 deletion okteto/k8s/secret-challenge-deployment.yml
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ spec:
runAsGroup: 2000
fsGroup: 2000
containers:
- image: jeroenwillemsen/wrongsecrets:1.7.0-no-vault
- image: jeroenwillemsen/wrongsecrets:1.7.1-no-vault
name: secret-challenge
imagePullPolicy: IfNotPresent
securityContext:
Expand Down
2 changes: 1 addition & 1 deletion pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -431,7 +431,7 @@
</goals>
<phase>generate-resources</phase>
<configuration>
<nodeVersion>v20.6.0</nodeVersion>
<nodeVersion>v20.9.0</nodeVersion>
<!-- download node from https://nodejs.org/dist/ -->
<workingDirectory>js</workingDirectory>
</configuration>
Expand Down
Loading

0 comments on commit 22feeac

Please sign in to comment.