Hey guys.
I have a server that is owned by me and can confirm through servint that it is owned by me.
I would like to do a penetration test and of course to allow you to upload files on the server and kind of trash it to the point where it is always restarting and running out of memory etc etc.
This is going to be mainly script kiddie stuff, however will be able to get you hired on with me for some other jobs that are invovlving network security evaluations.
Here is the server info Cpanel and WHM running on CentOS
hostname level1.ixkt.net IP addresses 64..131.81.30 64.131.81.31 64.131.81.32 64.131.81.30
SSH Port is on 3734
On Fri, Oct 16, 2009 at 10:39 PM, DTS-Corp (Knowledgebase) mlists_subs@dts-int.com wrote:
Hey guys.
I have a server that is owned by me and can confirm through servint that it is owned by me.
I would like to do a penetration test and of course to allow you to upload files on the server and kind of trash it to the point where it is always restarting and running out of memory etc etc.
This is going to be mainly script kiddie stuff, however will be able to get you hired on with me for some other jobs that are invovlving network security evaluations.
Here is the server info Cpanel and WHM running on CentOS
hostname level1.ixkt.net IP addresses 64..131.81.30 64.131.81.31 64.131.81.32 64.131.81.30
SSH Port is on 3734
A word of advice to both sender and readers.. do not follow up on this.
1) Penetration tests to have some value must show what was done and what was not done. They must show what steps were taken to reach zero. And then they must be evaluated to see if those steps could have been mitigated. A call for all hackers does not usually get that.
2) Network penetrations need to be done to make sure that you do not violate your SLA with your network provider or cause problems with other customers on that network. It also may violate various laws and statutes of where the co-location is at.
3) While "To catch a thief" is a nice movie.. you are probably not going to run into a Cary Grant type. It is more like you are going to down to a seedy bar in the docks and yelling out "Hey I need someone to rob my house to see if the security system I bought works, and I have a bunch of money on me to pay you."
4) It has become a common ploy to get people to attack another person's network by registering that they 'own' the space etc. Everyone from Russian gangs to local police use it at one point or another. Professional security people who aren't looking to spend time in prison will make sure that there is a legitimate contract in place and that the client is aware of the various risks involved.
Hello,
I recommend you use Nessus from Tenable Network Security to scan these hosts and your internal network. Nessus is top of the line in vulnerability scanning.
Best regards, Bazy
On Sat, Oct 17, 2009 at 7:39 AM, DTS-Corp (Knowledgebase) mlists_subs@dts-int.com wrote:
Hey guys.
I have a server that is owned by me and can confirm through servint that it is owned by me.
I would like to do a penetration test and of course to allow you to upload files on the server and kind of trash it to the point where it is always restarting and running out of memory etc etc.
This is going to be mainly script kiddie stuff, however will be able to get you hired on with me for some other jobs that are invovlving network security evaluations.
Here is the server info Cpanel and WHM running on CentOS
hostname level1.ixkt.net IP addresses 64..131.81.30 64.131.81.31 64.131.81.32 64.131.81.30
SSH Port is on 3734
CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
I want to learn to hack what do I need to do in order to start.
Date: Sun, 18 Oct 2009 01:24:16 +0300 From: bazy84@gmail.com To: centos@centos.org Subject: Re: [CentOS] Calling all Hackers
Hello,
I recommend you use Nessus from Tenable Network Security to scan these hosts and your internal network. Nessus is top of the line in vulnerability scanning.
Best regards, Bazy
On Sat, Oct 17, 2009 at 7:39 AM, DTS-Corp (Knowledgebase) mlists_subs@dts-int.com wrote:
Hey guys.
I have a server that is owned by me and can confirm through servint that it is owned by me.
I would like to do a penetration test and of course to allow you to upload files on the server and kind of trash it to the point where it is always restarting and running out of memory etc etc.
This is going to be mainly script kiddie stuff, however will be able to get you hired on with me for some other jobs that are invovlving network security evaluations.
Here is the server info Cpanel and WHM running on CentOS
hostname level1.ixkt.net IP addresses 64..131.81.30 64.131.81.31 64.131.81.32 64.131.81.30
SSH Port is on 3734
CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
_________________________________________________________________ Hotmail: Trusted email with powerful SPAM protection. http://clk.atdmt.com/GBL/go/177141665/direct/01/
If you want to learn how to crack into a system, set up your network with at least two machines, one being the target.
I want to learn to hack what do I need to do in order to start.
If you want to learn how to crack into a system, set up your network with at least two machines, one being the target.
After that go download and burn the latest version of BackTrack Linux,
http://www.remote-exploit.org/backtrack.html
and use it to boot the other machine. Then decide what exactly you want to do with it, look for some tutorials/instructions/HOWTOs on the net, and start experimenting by trying to crack your target machine. Learn as you go by reading the logs on both machines and all other info available on the net. Google is your friend. :-)
HTH, :-) Marko
Marko Vojinovic wrote:
and use it to boot the other machine. Then decide what exactly you want to do with it, look for some tutorials/instructions/HOWTOs on the net, and start experimenting by trying to crack your target machine. Learn as you go by reading the logs on both machines and all other info available on the net. Google is your friend. :-)
Especially http://google.com/linux :-)
I want to learn to hack what do I need to do in order to start.
Umm, watch:
Hackers: http://www.imdb.com/title/tt0113243/
Takedown: http://www.imdb.com/title/tt0159784/
Isn't that how we all learned?
On Mon, Oct 19, 2009 at 2:19 PM, ML mailinglists@mailnewsrss.com wrote:
I want to learn to hack what do I need to do in order to start.
Umm, watch:
Hackers: http://www.imdb.com/title/tt0113243/
Takedown: http://www.imdb.com/title/tt0159784/
Isn't that how we all learned?
You're forgetting:
Sneakers: http://www.imdb.com/title/tt0105435/
One of my favorites.
-Ross
You're forgetting:
Sneakers: http://www.imdb.com/title/tt0105435/
One of my favorites.
+1
On 19.10.2009 6:26, Ross Walker wrote:
On Mon, Oct 19, 2009 at 2:19 PM, MLmailinglists@mailnewsrss.com wrote:
I want to learn to hack what do I need to do in order to start.
Umm, watch:
Hackers: http://www.imdb.com/title/tt0113243/
Takedown: http://www.imdb.com/title/tt0159784/
Isn't that how we all learned?
You're forgetting:
Sneakers: http://www.imdb.com/title/tt0105435/
One of my favorites.
-Ross _______________________________________________ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
And one more,
Wargames: http://www.imdb.com/title/tt0086567/
Bgrds, Finnzi
2009/10/19 Finnur Örn Guðmundsson finnzi@finnzi.com:
On 19.10.2009 6:26, Ross Walker wrote:
On Mon, Oct 19, 2009 at 2:19 PM, MLmailinglists@mailnewsrss.com wrote:
I want to learn to hack what do I need to do in order to start.
Umm, watch:
Hackers: http://www.imdb.com/title/tt0113243/
Takedown: http://www.imdb.com/title/tt0159784/
Isn't that how we all learned?
You're forgetting:
Sneakers: http://www.imdb.com/title/tt0105435/
One of my favorites.
And one more,
Wargames: http://www.imdb.com/title/tt0086567/
But of course!
How could we forget the one that started it all!
-Ross
On Mon, 2009-10-19 at 11:19 -0700, ML wrote:
I want to learn to hack what do I need to do in order to start.
Umm, watch:
Hackers: http://www.imdb.com/title/tt0113243/
Takedown: http://www.imdb.com/title/tt0159784/
Isn't that how we all learned?
You left off Freedom Downtime:
http://www.imdb.com/title/tt0309614/
--Chris
Okay,
Well, alot of education out there by watching movies, however noone ever brought up the most complex driven sub-culture of geeks and nerds worldwide.
THE MATRIX (muhahahahah)
But of course, after sending out my request about the whole server / security thing, someone did manage to break into it very easily.
guess where there is an operating system there is a security risk, waiting to be exploited.
On Mon, Oct 19, 2009 at 9:36 PM, Chris Boyd cboyd@gizmopartners.com wrote:
On Mon, 2009-10-19 at 11:19 -0700, ML wrote:
I want to learn to hack what do I need to do in order to start.
Umm, watch:
Hackers: http://www.imdb.com/title/tt0113243/
Takedown: http://www.imdb.com/title/tt0159784/
Isn't that how we all learned?
You left off Freedom Downtime:
http://www.imdb.com/title/tt0309614/
--Chris
CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Please take this elsewhere. We do not care about compromised cpanel rubbish. Nothing to do with Centos because it is NOT Centos.
Well, alot of education out there by watching movies, however noone ever brought up the most complex driven sub-culture of geeks and nerds worldwide.
THE MATRIX (muhahahahah)
Well, all trinity really did was run nmap, big deal!!!!
he he
-Jason