None got root yet!
We are leaving the target up available at http://24.251.219.96:8088
It's still open for encroachment through the weekend!
HackFest results:
http://plug.phoenix.az.us/comment/edit/126
Kudos to:
PAVLOS KAIRIS TOOK the first SSH FLAG as nobody
RW who followed by getting mysql
On Saturday 13 December 2008 09:40:55 Dazed_75 wrote:
> On Thu, Dec 11, 2008 at 3:40 PM, Jerry Davis wrote:
> > blank disc put in.
> > /usr/bin/cdrecord is symlinked to wodim
> > it was not suid'd (as root), so I did that, and
> > ran the command you suggested,
> > here is the output, all looks fi
http://plug.phoenix.az.us/node/651#comment-126
There's a Web server & Drupal setup with instructions on 5.126.117.197
IRC Freenode = pluglabs JOIN US
Hamachi instructions:Here are the commands you need to do on a Backtrack LiveCD
to use Hamachi:
modprobe tun
tuncfg
hamachi-init
hama
IRC Freenode = pluglabs JOIN US
hamachi networks =
network | password
obnosis | obnosis
sisonbo | sisonbo
hamachi target = spider.obnosis.com 5.126.117.197 - on obnosis network
There's a Drupal running there to post in or exploit.
All ports and services on this system are fair game.
When a
I am getting synflooding from 222.187.220.163.
SO I might be a minute late.
Obnosis.com BlackBerry Message
-Original Message-
From: Lisa Kachold
Date: Sat, 13 Dec 2008 01:50:52
To: ;
;
Subject: December Linux Security HackFest - Hack 2 Learn Saturday December
13 Noon-->3PM
On Thu, Dec 11, 2008 at 3:40 PM, Jerry Davis wrote:
> blank disc put in.
> /usr/bin/cdrecord is symlinked to wodim
> it was not suid'd (as root), so I did that, and
> ran the command you suggested,
> here is the output, all looks fine to me, so I will try to write.
>
> je...@frodo:~$ cdrecord -prc