Welcome Guest ( Log In | Register )

Outline · [ Standard ] · Linear+

 Linux Server Break-in Challenge, Security Penetration skill needed

views
     
robertngo
post Mar 9 2005, 05:07 PM

Look at all my stars!!
*******
Senior Member
4,027 posts

Joined: Oct 2004


nmap -sF 202.88.234.250

Starting nmap V. 3.00 ( www.insecure.org/nmap/ )
All 1601 scanned ports on (202.88.234.250) are: closed

Nmap run completed -- 1 IP address (1 host up) scanned in 3 seconds

nmap -sA 202.88.234.250

Starting nmap V. 3.00 ( www.insecure.org/nmap/ )
All 1601 scanned ports on (202.88.234.250) are: UNfiltered

Nmap run completed -- 1 IP address (1 host up) scanned in 3 seconds

robertngo
post Mar 9 2005, 05:10 PM

Look at all my stars!!
*******
Senior Member
4,027 posts

Joined: Oct 2004


QUOTE(debiankl @ Mar 9 2005, 05:05 PM)
Try telnet port 22

Confirmed Debian Sarge
*
i am trying to use nmap -O to scan for the os but the result is not coming up, debian seen to be the best bet.
screwed
post Mar 9 2005, 05:20 PM

Getting Started
**
Junior Member
187 posts

Joined: Jan 2003
From: 2>/dev/null


QUOTE(robertngo @ Mar 9 2005, 04:49 PM)
the webpage clam that there is no honeypot

anyone have the nmap result already?
*
Starting nmap 3.50 ( http://www.insecure.org/nmap/ ) at 2005-03-09 17:10 EST
Host 202.88.234.250 appears to be up ... good.
Initiating SYN Stealth Scan against 202.88.234.250 at 17:10
Adding open port 5432/tcp
Adding open port 111/tcp
Adding open port 25/tcp
Adding open port 37/tcp
Adding open port 9/tcp
Adding open port 80/tcp
Adding open port 13/tcp
adjust_timeout: packet supposedly had rtt of 11000145 microseconds. Ignoring time.
Adding open port 22/tcp
Adding open port 19/tcp
Adding open port 7/tcp
The SYN Stealth Scan took 491 seconds to scan 1659 ports.
Interesting ports on 202.88.234.250:
(The 1636 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
7/tcp open echo
9/tcp open discard
13/tcp open daytime
19/tcp open chargen
22/tcp open ssh
25/tcp open smtp
37/tcp open time
80/tcp open http
111/tcp open rpcbind
135/tcp filtered msrpc
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
1080/tcp filtered socks
1214/tcp filtered fasttrack
3128/tcp filtered squid-http
4444/tcp filtered krb524
4480/tcp filtered proxy-plus
5432/tcp open postgres
6588/tcp filtered analogx
17300/tcp filtered kuang2
Nmap run completed -- 1 IP address (1 host up) scanned in 497.618 seconds

Telnet to port 25 seems responding and tcouldnt be honeypot system since the site claime no honeypot installed.
biatch0
post Mar 9 2005, 05:30 PM

Tem Que Valer
Group Icon
VIP
1,923 posts

Joined: Jan 2003
From: NL/MY



Here's a little something useful for you:

CODE
nServer:\x20Apache/1\.3\.31\x20\(Debian\x20GNU/Linux\)
Running: Linux 2.4.X|2.5.X
OS details: Linux 2.4.0 - 2.5.20
TCP ISN Seq. Numbers: 2C003CBC 2C0FDB69 2C91AA25 2C88DBAD


*cough cough* 1.3.31 get_tag overflow *cough*
xanda
post Mar 9 2005, 08:02 PM

Getting Started
**
Junior Member
207 posts

Joined: Feb 2005
From: the holy cave


no honeyport
xanda
post Mar 9 2005, 08:12 PM

Getting Started
**
Junior Member
207 posts

Joined: Feb 2005
From: the holy cave


Starting nmap 3.50 ( http://www.insecure.org/nmap/ ) at 2005-03-09 20:18 EST
Host 202.88.234.250 appears to be up ... good.
Initiating SYN Stealth Scan against 202.88.234.250 at 17:10
Adding open port 5432/tcp
Adding open port 111/tcp
Adding open port 25/tcp
Adding open port 37/tcp
Adding open port 9/tcp
Adding open port 80/tcp
Adding open port 13/tcp
adjust_timeout: packet supposedly had rtt of 11000145 microseconds. Ignoring time.
Adding open port 22/tcp
Adding open port 19/tcp
Adding open port 7/tcp
The SYN Stealth Scan took 491 seconds to scan 1659 ports.
Interesting ports on 202.88.234.250:
(The 1636 ports scanned but not shown below are in state: closed)
PORT STATE SERVICE
7/tcp open echo
9/tcp open discard
13/tcp open daytime
19/tcp open chargen
22/tcp open ssh
25/tcp open smtp
37/tcp open time
80/tcp open http
111/tcp open rpcbind
135/tcp filtered msrpc
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
1080/tcp filtered socks
1214/tcp filtered fasttrack
3128/tcp filtered squid-http
4444/tcp filtered krb524
4480/tcp filtered proxy-plus
5432/tcp open postgres
6588/tcp filtered analogx
17300/tcp filtered kuang2
Nmap run completed -- 1 IP address (1 host up) scanned in 481.179 seconds


Huargh!!~ really make me sleepy

This post has been edited by xanda: Mar 9 2005, 08:17 PM
rootlinux
post Mar 9 2005, 11:49 PM

Enthusiast
*****
Senior Member
898 posts

Joined: Jan 2003
From: ph/sbj/slgr
Here is my ping results: -

C:\>ping 202.88.234.50

Pinging 202.88.234.50 with 32 bytes of data:

Reply from 202.88.234.50: bytes=32 time=140ms TTL=49
Reply from 202.88.234.50: bytes=32 time=130ms TTL=49
Reply from 202.88.234.50: bytes=32 time=120ms TTL=49
Reply from 202.88.234.50: bytes=32 time=120ms TTL=49

Ping statistics for 202.88.234.50:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 120ms, Maximum = 140ms, Average = 127ms

kons
post Mar 10 2005, 12:35 AM

Конс
Group Icon
Moderator
6,181 posts

Joined: Oct 2004



Has it been broken into?
The ping suddenly become so fast..
How's everyone doing?
eddie_lim
post Mar 10 2005, 09:29 AM

You Never Walk Alone
Group Icon
Elite
4,026 posts

Joined: Jan 2003
From: In the deepest part of your heart !




Trying 202.88.234.250...
Connected to 202.88.234.250 (202.88.234.250).
Escape character is '^]'.
220 challenge ESMTP Exim 4.34 Thu, 10 Mar 2005 12:23:53 +0530
ver 4.34.. hmm.....
jojoG
post Mar 10 2005, 02:22 PM

Getting Started
**
Junior Member
166 posts

Joined: Nov 2004


how many of u here are hackers???
malaysia so geng ah... so many hackers.... i also wan to be!!
jojoG
post Mar 10 2005, 02:37 PM

Getting Started
**
Junior Member
166 posts

Joined: Nov 2004


guys dunno if this is helping but it is apache server
http://202.88.234.250/
kons
post Mar 11 2005, 08:32 AM

Конс
Group Icon
Moderator
6,181 posts

Joined: Oct 2004



Guess nobody is interested in it since there's no prize for it.
Well, furthermore, more than 48 hours has passed, why the shell account username and password is not being released yet?
robertngo
post Mar 11 2005, 01:28 PM

Look at all my stars!!
*******
Senior Member
4,027 posts

Joined: Oct 2004


the shell account have been released

TSdebiankl
post Mar 11 2005, 03:56 PM

On my way
Group Icon
Elite
577 posts

Joined: Dec 2004
From: Inside the CPU core stack register SP


Good! It shows that sys admin hv done a great job of hardening the kernel and update the OSS with latest patchs.


robertngo
post Mar 11 2005, 04:03 PM

Look at all my stars!!
*******
Senior Member
4,027 posts

Joined: Oct 2004


can any logging to the system? the connection is so slow
TSdebiankl
post Mar 11 2005, 11:51 PM

On my way
Group Icon
Elite
577 posts

Joined: Dec 2004
From: Inside the CPU core stack register SP


Since remote exploited has been unsuccessful, a users shell account was provided and they allow hackers to have another penetration test on local exploited.

And I hv trouble loggin in too....

 

Change to:
| Lo-Fi Version
0.0179sec    0.89    5 queries    GZIP Disabled
Time is now: 25th December 2025 - 12:43 AM