Penetration Testing Overview¶
This penetration testing aims to show how SGX protects the runtime confidentiality of applications while sufferring privileged malware memory attacks.
CCZoo penetration test provides two types test cases: unauthorized access and data theft.
Unauthorized access is to gain server privileges through unauthorized access, such as implanting privileged backdoors and obtaining privileged shells.
Data theft is to verify the memory confidentiality of SGX runtime, memory attacks will be performed on high-value data applications through privileged applications or shells to steal their runtime memory data.
Test Cases Overview¶
When a hacker accesses Redis without password protection running as root, hacker’s ssh public key can be written into the target server
/root/.ssh/authotrized_keysfile, and then the target server can be directly logged in through hacker’s Private key.
Please refer to redis/index.html for detail.
This application is generating keys in memory and implemented based on the Intel SGX SDK.
It will use the same source code to compile SGX applications and non-SGX applications, and perform memory attacks on them to verify the confidentiality of SGX runtime memory.
Please refer to key_generator/index.html for detail.