Bypassing Security: Cracking a VM's Update Mechanism for Easy Flags

A student discovered that update files (*.gpg) in a security course's virtual machine contained tokens for submitting assignments. Analyzing the update program `installUpdate`, they found it used GPG decryption relying on `/root/.vmPassphrase` and `/root/.gnupg`. By mounting the VM's disk, the student obtained these files, decrypted the updates, extracted the tokens, and completed the assignments early. The updates contained Java code generating AES-encrypted tokens. The author notes this attack depended on full access to the VM's disk and suggests using remote VMs as an improvement. Despite the early completion, the author stresses the importance of the learning process and completing the coursework.
Read more