IP Address: 202.88.234.250
Read the full story here
Have fun
Rewards: No cash but applaused
Linux Server Break-in Challenge, Security Penetration skill needed
|
|
Mar 9 2005, 03:38 PM, updated 21y ago
Show posts by this member only | Post
#1
|
|
Elite
577 posts Joined: Dec 2004 From: Inside the CPU core stack register SP |
The Linux Server Break-in challenge. You will have a server available on the Internet 96 hours without interruption starting from 9 March 2005 2 AM IST. However, the server's life on the Net is in your hands.
IP Address: 202.88.234.250 Read the full story here Have fun Rewards: No cash but applaused |
|
|
|
|
|
Mar 9 2005, 03:42 PM
Show posts by this member only | Post
#2
|
![]() ![]() ![]() ![]()
Senior Member
663 posts Joined: Nov 2004 From: Puchong, Selangor, Malaysia. |
Oh, interesting.
|
|
|
Mar 9 2005, 03:49 PM
Show posts by this member only | Post
#3
|
|
Elite
577 posts Joined: Dec 2004 From: Inside the CPU core stack register SP |
QUOTE(YapChinHoong @ Mar 9 2005, 03:42 PM) Spead the news to ur friends, don't be late.. About time used all the Linux penetration tools and brute force attack that server. It my top priority now.. Share ur attack note here please... such as what Linux penetration tools used...for ur attack. This post has been edited by debiankl: Mar 9 2005, 03:55 PM |
|
|
Mar 9 2005, 04:00 PM
Show posts by this member only | Post
#4
|
|
Moderator
6,181 posts Joined: Oct 2004 |
server in india...
No firewall at all.. This post has been edited by kons: Mar 9 2005, 04:05 PM |
|
|
Mar 9 2005, 04:04 PM
Show posts by this member only | Post
#5
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,027 posts Joined: Oct 2004 |
look like a interesting challenge, i just hope that the server have not been taken down before i get home from work
|
|
|
Mar 9 2005, 04:21 PM
Show posts by this member only | Post
#6
|
|
Elite
577 posts Joined: Dec 2004 From: Inside the CPU core stack register SP |
Here are the details of owner's IP contact and details.. maybe social engineering method of getting root password.. used voice-Ip call cheaper..
Country: INDIA ARIN says that this IP belongs to APNIC; I'm looking it up there. Using 0 day old cached answer (or, you can get fresh results). Hiding E-mail address (you can get results with the E-mail address). % [whois.apnic.net node-1] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html inetnum: 202.88.224.0 - 202.88.239.255 netname: ASIANET descr: Asianet is a ISP providing access through Cable. country: IN admin-c: PS104-AP tech-c: PS104-AP mnt-by: APNIC-HM mnt-lower: MAINT-IN-ASIANET changed: **********@apnic.net 20020710 status: ALLOCATED PORTABLE source: APNIC person: Praveen Shrikhande address: Karimpanal Arcade, 3rd Floor address: East Fort address: Thiruvananthapuram - 695023 address: Kerala, India country: IN phone: +91-471-575353 fax-no: +91-471-575454 e-mail: *******@asianetindia.com nic-hdl: PS104-AP mnt-by: MAINT-NEW changed: ********@asianetindia.com 20020704 source: APNIC This post has been edited by debiankl: Mar 9 2005, 04:30 PM |
|
|
|
|
|
Mar 9 2005, 04:21 PM
Show posts by this member only | Post
#7
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,027 posts Joined: Oct 2004 |
running nmap, wait for several minutes already still no result.
|
|
|
Mar 9 2005, 04:22 PM
Show posts by this member only | Post
#8
|
|
Elite
577 posts Joined: Dec 2004 From: Inside the CPU core stack register SP |
|
|
|
Mar 9 2005, 04:29 PM
Show posts by this member only | Post
#9
|
![]() ![]()
Junior Member
288 posts Joined: Jan 2003 |
ping time upto 2733ms
not interested |
|
|
Mar 9 2005, 04:32 PM
|
|
Moderator
6,181 posts Joined: Oct 2004 |
|
|
|
Mar 9 2005, 04:32 PM
|
|
Elite
577 posts Joined: Dec 2004 From: Inside the CPU core stack register SP |
|
|
|
Mar 9 2005, 04:35 PM
|
|
Elite
577 posts Joined: Dec 2004 From: Inside the CPU core stack register SP |
|
|
|
Mar 9 2005, 04:37 PM
|
|
Moderator
6,181 posts Joined: Oct 2004 |
I'm using remote shell account..
600ms.. choose your location wisely |
|
|
|
|
|
Mar 9 2005, 04:45 PM
|
|
Elite
577 posts Joined: Dec 2004 From: Inside the CPU core stack register SP |
Telnet to port 25 and 80 seem to be responding but it could be a honeypot system installed.
This post has been edited by debiankl: Mar 9 2005, 04:46 PM |
|
|
Mar 9 2005, 04:45 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,027 posts Joined: Oct 2004 |
|
|
|
Mar 9 2005, 04:49 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,027 posts Joined: Oct 2004 |
|
|
|
Mar 9 2005, 04:52 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,027 posts Joined: Oct 2004 |
look like it is a debian server
|
|
|
Mar 9 2005, 04:53 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,027 posts Joined: Oct 2004 |
it use exim for email
|
|
|
Mar 9 2005, 05:05 PM
|
![]() ![]() ![]() ![]()
Senior Member
663 posts Joined: Nov 2004 From: Puchong, Selangor, Malaysia. |
I'm really a noob on this. Only knows about routers and switches, no knowledge on NIXes servers.
|
|
|
Mar 9 2005, 05:05 PM
|
|
Elite
577 posts Joined: Dec 2004 From: Inside the CPU core stack register SP |
|
|
|
Mar 9 2005, 05:07 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,027 posts Joined: Oct 2004 |
nmap -sF 202.88.234.250
Starting nmap V. 3.00 ( www.insecure.org/nmap/ ) All 1601 scanned ports on (202.88.234.250) are: closed Nmap run completed -- 1 IP address (1 host up) scanned in 3 seconds nmap -sA 202.88.234.250 Starting nmap V. 3.00 ( www.insecure.org/nmap/ ) All 1601 scanned ports on (202.88.234.250) are: UNfiltered Nmap run completed -- 1 IP address (1 host up) scanned in 3 seconds |
|
|
Mar 9 2005, 05:10 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,027 posts Joined: Oct 2004 |
|
|
|
Mar 9 2005, 05:20 PM
|
![]() ![]()
Junior Member
187 posts Joined: Jan 2003 From: 2>/dev/null |
QUOTE(robertngo @ Mar 9 2005, 04:49 PM) Starting nmap 3.50 ( http://www.insecure.org/nmap/ ) at 2005-03-09 17:10 ESTHost 202.88.234.250 appears to be up ... good. Initiating SYN Stealth Scan against 202.88.234.250 at 17:10 Adding open port 5432/tcp Adding open port 111/tcp Adding open port 25/tcp Adding open port 37/tcp Adding open port 9/tcp Adding open port 80/tcp Adding open port 13/tcp adjust_timeout: packet supposedly had rtt of 11000145 microseconds. Ignoring time. Adding open port 22/tcp Adding open port 19/tcp Adding open port 7/tcp The SYN Stealth Scan took 491 seconds to scan 1659 ports. Interesting ports on 202.88.234.250: (The 1636 ports scanned but not shown below are in state: closed) PORT STATE SERVICE 7/tcp open echo 9/tcp open discard 13/tcp open daytime 19/tcp open chargen 22/tcp open ssh 25/tcp open smtp 37/tcp open time 80/tcp open http 111/tcp open rpcbind 135/tcp filtered msrpc 137/tcp filtered netbios-ns 138/tcp filtered netbios-dgm 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 593/tcp filtered http-rpc-epmap 1080/tcp filtered socks 1214/tcp filtered fasttrack 3128/tcp filtered squid-http 4444/tcp filtered krb524 4480/tcp filtered proxy-plus 5432/tcp open postgres 6588/tcp filtered analogx 17300/tcp filtered kuang2 Nmap run completed -- 1 IP address (1 host up) scanned in 497.618 seconds Telnet to port 25 seems responding and tcouldnt be honeypot system since the site claime no honeypot installed. |
|
|
Mar 9 2005, 05:30 PM
|
|
VIP
1,923 posts Joined: Jan 2003 From: NL/MY |
Here's a little something useful for you:
CODE nServer:\x20Apache/1\.3\.31\x20\(Debian\x20GNU/Linux\) Running: Linux 2.4.X|2.5.X OS details: Linux 2.4.0 - 2.5.20 TCP ISN Seq. Numbers: 2C003CBC 2C0FDB69 2C91AA25 2C88DBAD *cough cough* 1.3.31 get_tag overflow *cough* |
|
|
Mar 9 2005, 08:02 PM
|
![]() ![]()
Junior Member
207 posts Joined: Feb 2005 From: the holy cave |
no honeyport
|
|
|
Mar 9 2005, 08:12 PM
|
![]() ![]()
Junior Member
207 posts Joined: Feb 2005 From: the holy cave |
Starting nmap 3.50 ( http://www.insecure.org/nmap/ ) at 2005-03-09 20:18 EST
Host 202.88.234.250 appears to be up ... good. Initiating SYN Stealth Scan against 202.88.234.250 at 17:10 Adding open port 5432/tcp Adding open port 111/tcp Adding open port 25/tcp Adding open port 37/tcp Adding open port 9/tcp Adding open port 80/tcp Adding open port 13/tcp adjust_timeout: packet supposedly had rtt of 11000145 microseconds. Ignoring time. Adding open port 22/tcp Adding open port 19/tcp Adding open port 7/tcp The SYN Stealth Scan took 491 seconds to scan 1659 ports. Interesting ports on 202.88.234.250: (The 1636 ports scanned but not shown below are in state: closed) PORT STATE SERVICE 7/tcp open echo 9/tcp open discard 13/tcp open daytime 19/tcp open chargen 22/tcp open ssh 25/tcp open smtp 37/tcp open time 80/tcp open http 111/tcp open rpcbind 135/tcp filtered msrpc 137/tcp filtered netbios-ns 138/tcp filtered netbios-dgm 139/tcp filtered netbios-ssn 445/tcp filtered microsoft-ds 593/tcp filtered http-rpc-epmap 1080/tcp filtered socks 1214/tcp filtered fasttrack 3128/tcp filtered squid-http 4444/tcp filtered krb524 4480/tcp filtered proxy-plus 5432/tcp open postgres 6588/tcp filtered analogx 17300/tcp filtered kuang2 Nmap run completed -- 1 IP address (1 host up) scanned in 481.179 seconds Huargh!!~ really make me sleepy This post has been edited by xanda: Mar 9 2005, 08:17 PM |
|
|
Mar 9 2005, 11:49 PM
|
![]() ![]() ![]() ![]() ![]()
Senior Member
898 posts Joined: Jan 2003 From: ph/sbj/slgr |
Here is my ping results: -
C:\>ping 202.88.234.50 Pinging 202.88.234.50 with 32 bytes of data: Reply from 202.88.234.50: bytes=32 time=140ms TTL=49 Reply from 202.88.234.50: bytes=32 time=130ms TTL=49 Reply from 202.88.234.50: bytes=32 time=120ms TTL=49 Reply from 202.88.234.50: bytes=32 time=120ms TTL=49 Ping statistics for 202.88.234.50: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 120ms, Maximum = 140ms, Average = 127ms |
|
|
Mar 10 2005, 12:35 AM
|
|
Moderator
6,181 posts Joined: Oct 2004 |
Has it been broken into?
The ping suddenly become so fast.. How's everyone doing? |
|
|
Mar 10 2005, 09:29 AM
|
|
Elite
4,026 posts Joined: Jan 2003 From: In the deepest part of your heart ! |
Trying 202.88.234.250...
Connected to 202.88.234.250 (202.88.234.250). Escape character is '^]'. 220 challenge ESMTP Exim 4.34 Thu, 10 Mar 2005 12:23:53 +0530 ver 4.34.. hmm..... |
|
|
Mar 10 2005, 02:22 PM
|
![]() ![]()
Junior Member
166 posts Joined: Nov 2004 |
how many of u here are hackers???
malaysia so geng ah... so many hackers.... i also wan to be!! |
|
|
Mar 10 2005, 02:37 PM
|
![]() ![]()
Junior Member
166 posts Joined: Nov 2004 |
|
|
|
Mar 11 2005, 08:32 AM
|
|
Moderator
6,181 posts Joined: Oct 2004 |
Guess nobody is interested in it since there's no prize for it.
Well, furthermore, more than 48 hours has passed, why the shell account username and password is not being released yet? |
|
|
Mar 11 2005, 01:28 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,027 posts Joined: Oct 2004 |
the shell account have been released
|
|
|
Mar 11 2005, 03:56 PM
|
|
Elite
577 posts Joined: Dec 2004 From: Inside the CPU core stack register SP |
Good! It shows that sys admin hv done a great job of hardening the kernel and update the OSS with latest patchs.
|
|
|
Mar 11 2005, 04:03 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,027 posts Joined: Oct 2004 |
can any logging to the system? the connection is so slow
|
|
|
Mar 11 2005, 11:51 PM
|
|
Elite
577 posts Joined: Dec 2004 From: Inside the CPU core stack register SP |
Since remote exploited has been unsuccessful, a users shell account was provided and they allow hackers to have another penetration test on local exploited.
And I hv trouble loggin in too.... |
| Change to: | 0.0186sec
0.53
5 queries
GZIP Disabled
Time is now: 24th December 2025 - 08:54 PM |