Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

Root Challenge for EM


DeafCode's Avatar
root@Alpha.Oddities
0 0

ok i got my windows box of all things to work so i suppose the challenge is on. I won't participate(obvious) but the only thing you need is this:

71.36.3.206

it's set up DMZ so you should have no problems connecting but if you do just tell me and I'll try to fix it.

ANY TYPE OF ATTACK IS WELCOME––Enjoy

*note: don't destroy the files. Have fun.


ghost's Avatar
0 0

nvm, seems to work now…


DeafCode's Avatar
root@Alpha.Oddities
0 0

My internet is fucking up but it's now so try real quick


ghost's Avatar
0 0

DeafCode wrote: ok i got my windows box of all things to work so i suppose the challenge is on. I won't participate(obvious) but the only thing you need is this:

71.36.3.206

it's set up DMZ so you should have no problems connecting but if you do just tell me and I'll try to fix it.

ANY TYPE OF ATTACK IS WELCOME––Enjoy

*note: don't destroy the files. Have fun.

Sounds like it should be fun playing with. Though by any attack – you really mean any attack other then a DOS… cause that kinda ruins the fun for others :)


ghost's Avatar
0 0

Nmap is taking an age…. but apparently its getting there, so we shall see…


DeafCode's Avatar
root@Alpha.Oddities
0 0

stdio wrote: [quote]DeafCode wrote: ok i got my windows box of all things to work so i suppose the challenge is on. I won't participate(obvious) but the only thing you need is this:

71.36.3.206

it's set up DMZ so you should have no problems connecting but if you do just tell me and I'll try to fix it.

ANY TYPE OF ATTACK IS WELCOME––Enjoy

*note: don't destroy the files. Have fun.

Sounds like it should be fun playing with. Though by any attack – you really mean any attack other then a DOS… cause that kinda ruins the fun for others :)[/quote]

By "ANY ATTACK" i mean anything you can thing up. If you can code something to work with another service to brute it, do so.

EDIT: When i first read DOS i thought you meant MS-DOS. But yeah if denial of service is your way, then do it.


DeafCode's Avatar
root@Alpha.Oddities
0 0

I'll be getting back on later so if you get in send me pm


clone4's Avatar
Perl-6 Wisdom Seeker
0 0

brb, shame only thing I could do now would be run metasploit and then bla bla bla…skiddy exploiting..bla bla bla :) Is it gonna be pernament though ?


DeafCode's Avatar
root@Alpha.Oddities
0 0

I'm not sure. It might be like B24 where you have to contact the host


DeafCode's Avatar
root@Alpha.Oddities
0 0

stdio has informed me that my servers aren't accepting incoming connections and are showing up as filtered on a nmap scan so the competition is down for the moment. if you still wish to try the target will still be connected.


ghost's Avatar
0 0

nmap -sW -p 21,23,25 71.36.3.206

Starting Nmap 4.68 ( http://nmap.org ) at 2008-08-16 20:04 Central Standard Time Interesting ports on 71-36-3-206.chyn.qwest.net (71.36.3.206): PORT STATE SERVICE 21/tcp open ftp 23/tcp open telnet 25/tcp open smtp

Nmap done: 1 IP address (1 host up) scanned in 0.156 seconds

Yeah Sorry I had to leave the computer, at work.. I did find the ports as open, but telnet refusing connections.

However, you can connect via ftp/smtp. I dont know why telnet is refusing connections. Though I dont think you have an ftp server running at the moment as when you connect its closed by the remote host instantaneously. Perhaps putting a service on there to exploit.

Im not the worlds greatest with rooting by anymeans, so I wouldnt know how to bypass the telnet filtering. Perhaps others can though.


shadowls's Avatar
You Like this!
90 0

well i don't know anything about rooting. if someone can let me know where to start so i can look into it that would be great.


ghost's Avatar
0 0

Just a general good place to start aside from the post "rooting" in another thread would be the offsec 101 class (hint you can get it from demonoid, though its shitty sound) that runs you through basic concepts and backtrack familiarity


ghost's Avatar
0 0

Couldn't access a single service, Nmap (Zenmap) came up with this:

Starting Nmap 4.11 ( http://www.insecure.org/nmap ) at 2008-08-17 16:00 Veuropa, normaltid DNS resolution of 1 IPs took 0.27s. Initiating SYN Stealth Scan against 71-36-3-206.chyn.qwest.net (71.36.3.206) [1680 ports] at 16:00 SYN Stealth Scan Timing: About 16.79% done; ETC: 16:03 (0:02:30 remaining) The SYN Stealth Scan took 174.77s to scan 1680 total ports. Warning: OS detection will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port Host 71-36-3-206.chyn.qwest.net (71.36.3.206) appears to be up … good. All 1680 scanned ports on 71-36-3-206.chyn.qwest.net (71.36.3.206) are filtered Too many fingerprints match this host to give specific OS details TCP/IP fingerprint: SInfo(V=4.11%P=i686-pc-windows-windows%D=8/17%Tm=48A82FC7%O=-1%C=-1) T5(Resp=N) T6(Resp=N) T7(Resp=N) PU(Resp=N)

Nmap finished: 1 IP address (1 host up) scanned in 194.640 seconds Raw packets sent: 3384 (150.888KB) | Rcvd: 0 (0B)

I used this command: nmap -T Aggressive -A -P0 -v 71.36.3.206

Tell me, did i do anything wrong or is the services really down?


ghost's Avatar
0 0

@root op the scan you did was only a syn scan (surprised you didn't find port 25 open).

http://nmap.org/book/man-port-scanning-techniques.html

some return other ports open, My guess is the router firewall is preventing that particular scan. Though try netcat to the smtp server and you should be able to get through, though i havent been able to do much with it.


ghost's Avatar
0 0

Oh, right. I'm not used to Nmap since i don't hack alot now, so thanks for the advice and help!:)


ghost's Avatar
0 0

Quote from nmap manpages Inexperienced users and script kiddies, on the other hand, try to solve every problem with the default SYN scan.

Pawned by a static HTML file, ouch that hurt alot :xx:


ghost's Avatar
0 0

Dont worry root_op, I always kick off a hack with a syn scan. We are all skids!