Skip to content

Commit 78d8239

Browse files
committed
Update POM file with new version: 1.4.5
1 parent d513f47 commit 78d8239

12 files changed

+15
-15
lines changed

.github/scripts/docker-create-and-push.sh

+3-3
Original file line numberDiff line numberDiff line change
@@ -87,9 +87,9 @@ git restore src/main/resources/.bash_history
8787
echo "committing changes and new pom file with version ${tag}"
8888
git commit -am "Update POM file with new version: ${tag}"
8989
git push
90-
#echo "tagging version"
91-
#git tag -a $tag -m "${message}"
92-
#git push --tags
90+
echo "tagging version"
91+
git tag -a $tag -m "${message}"
92+
git push --tags
9393

9494
echo "Don't forget to update experiment-bed"
9595
echo "git checkout experiment-bed && git merge master --no-edit"

Dockerfile.web

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
FROM jeroenwillemsen/wrongsecrets:challenge20test2-no-vault
1+
FROM jeroenwillemsen/wrongsecrets:1.4.5-no-vault
22

3-
ARG argBasedVersion="1.4.4"
3+
ARG argBasedVersion="1.4.5"
44
ARG CANARY_URLS="http://canarytokens.com/terms/about/s7cfbdakys13246ewd8ivuvku/post.jsp,http://canarytokens.com/terms/about/y0all60b627gzp19ahqh7rl6j/post.jsp"
55
ENV APP_VERSION=$argBasedVersion
66
ENV K8S_ENV=Heroku(Docker)

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ For the basic docker exercises you currently require:
2525
You can install it by doing:
2626

2727
```bash
28-
docker run -p 8080:8080 jeroenwillemsen/wrongsecrets:1.4.4-no-vault
28+
docker run -p 8080:8080 jeroenwillemsen/wrongsecrets:1.4.5-no-vault
2929
```
3030

3131
Now you can try to find the secrets by means of solving the challenge offered at:

aws/k8s/secret-challenge-vault-deployment.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ spec:
3737
volumeAttributes:
3838
secretProviderClass: "wrongsecrets-aws-secretsmanager"
3939
containers:
40-
- image: jeroenwillemsen/wrongsecrets:1.4.4-k8s-vault
40+
- image: jeroenwillemsen/wrongsecrets:1.4.5-k8s-vault
4141
imagePullPolicy: IfNotPresent
4242
ports:
4343
- containerPort: 8080

azure/k8s/secret-challenge-vault-deployment.yml.tpl

+1-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ spec:
3535
volumeAttributes:
3636
secretProviderClass: "azure-wrongsecrets-vault"
3737
containers:
38-
- image: jeroenwillemsen/wrongsecrets:1.4.4-k8s-vault
38+
- image: jeroenwillemsen/wrongsecrets:1.4.5-k8s-vault
3939
imagePullPolicy: IfNotPresent
4040
ports:
4141
- containerPort: 8080

gcp/k8s/secret-challenge-vault-deployment.yml.tpl

+1-1
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ spec:
3737
volumeAttributes:
3838
secretProviderClass: "wrongsecrets-gcp-secretsmanager"
3939
containers:
40-
- image: jeroenwillemsen/wrongsecrets:1.4.4-k8s-vault
40+
- image: jeroenwillemsen/wrongsecrets:1.4.5-k8s-vault
4141
imagePullPolicy: IfNotPresent
4242
ports:
4343
- containerPort: 8080

k8s/secret-challenge-deployment.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ spec:
2828
runAsGroup: 2000
2929
fsGroup: 2000
3030
containers:
31-
- image: jeroenwillemsen/wrongsecrets:1.4.4-no-vault
31+
- image: jeroenwillemsen/wrongsecrets:1.4.5-no-vault
3232
imagePullPolicy: IfNotPresent
3333
ports:
3434
- containerPort: 8080

k8s/secret-challenge-vault-deployment.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ spec:
3030
runAsNonRoot: true
3131
serviceAccountName: vault
3232
containers:
33-
- image: jeroenwillemsen/wrongsecrets:1.4.4-k8s-vault
33+
- image: jeroenwillemsen/wrongsecrets:1.4.5-k8s-vault
3434
imagePullPolicy: IfNotPresent
3535
ports:
3636
- containerPort: 8080

pom.xml

+1-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
</parent>
1010
<groupId>org.owasp</groupId>
1111
<artifactId>wrongsecrets</artifactId>
12-
<version>challenge20test2-SNAPSHOT</version>
12+
<version>1.4.5-SNAPSHOT</version>
1313
<name>OWASP WrongSecrets</name>
1414
<description>Examples with how to not use secrets</description>
1515
<url>https://owasp.org/www-project-wrongsecrets/</url>

src/main/resources/explanations/challenge19.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
=== Obfuscating part 1 the C binary
1+
=== Obfuscating in binaries part 1: the C binary
22

33
We need to put a secret in a mobile app! Nobody will notice the secret in our compiled code!
44
This is a misbelief we have often encountered when presenting on mobile security topics.

src/main/resources/explanations/challenge20.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
=== Obfuscating part 2: the C++ binary
1+
=== Obfuscating in binaries part 2: the C++ binary
22

33
Similar like hiding secrets in an application written in C, you end up in a similar situation with C++. Can you find the secret in our binary?
44

src/main/resources/explanations/challenge20_hint.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ You can solve this challenge using the following steps:
99
- Allow the Ghidra to analyze the application.
1010
- Search for the secret: Go to `Functions` on the left-hand side, select `__Z6secretv()` . Now on the screen on the right-hand side you can see the secret. This is a string in C++, wrapped in another class (`SecretContainer`).
1111
- Search for the same secret, which is "hidden" as a char array: Go to `Functions` on the left-hand side, select `__Z7secret2v()`. On the right hand side, you see the function: now click on the return result of the function at `__ZZ7secret2vE6harder` . Now you can see the result in the Listing view.
12-
12+
- Alternatively: when you have analyzed the application with Ghirda: do a search for strings in all blocks and see if you can spot the secret ;-).
1313
1414
2. Find the secrets with https://www.radare.org[radare2].
1515
- Install https://www.radare.org[radare2] with either `brew install radare2` on Mac or follow these steps: `git clone https://github.com/radareorg/radare2; cd radare2 ; sys/install.sh`

0 commit comments

Comments
 (0)