October 26, 2009 at 8:37 pm #4367anderson007Participant
Introduction The purpose of a war game server is to allow you to practice hacker tricks, without actually damaging anyone or breaking the law. With this technique, gaps in security can be discovered and the necessary precautions taken. The war games server is being developed further by us. If anyone would like to offer us some support or give us some ideas, we are to be found under the following mail address: firstname.lastname@example.org Please write white papers. White papers are documents, in which all the steps are mentioned, you needed to reach one of the targets.
No outgoing activity will be allowed from any box within our war games suite. We do not want anyone launching attacks from our platforms. We are not liable for any activities going on upon the server, as we do not have control over it. With this, we will aid the authorities if anything unlawful does occur.
Do not tamper with log files or the logging features in place. We will not tolerate any form of nukes, floods or DoS Attacks. We do not want to find any unethical or immoral actions being performed upon our servers. The war games are here for you and your peers to have fun, learn and expand your knowledge of “hacking” legally. Please do not turn this into something illegal.
If you do get root PLEASE DO NOT pull an . rm -rf /. or any form of file removal that you have not created. Please remember the servers are here for all of us to learn from.
If a gap in security is found, please do NOT try to remove it: other people also want to try out this security gap. More important: Make a white paper with the information on how to deal with it, and send it to us: email@example.com
If root-rights should be reached, please do not make any alterations in the system configuration (bug fixes, etc).
Don’t give any hints to other users, how to reach the targets. Everyone should reach them himself! This means: No topics about exploits in the forum!
Bruteforce access shh via usernames and place name in level1 file in filesystem
Access file system find encrypted file and un-encrypt, place name inside file
Access ftp via user names and place name in level1 file file system
Access file system file encrypted un-encrypt and place name inside file
Access file system media file, read steganography and add to message
Access send mail and send email to user
Access email and send phishing email to user
Access email and send root kit email to user looking like
Port tunnel through port 80 and gain ssh access through firewall
Access mysql through user names
Access data on tables and place in mysql data file on file system
Change Data in mysql database
Operating System: RedHat 4
Applications: Apache, Sendmail and mySQL
November 10, 2009 at 4:46 am #27629timmedinParticipant
Trying to browse to http://www.thewargames.com or thewargames.com results in a godaddy parking page.
The registration is hidden by domains by proxy.
The svr4.thewargames.com points to a dynamic cox IP. I can’t find any additional info on the IP.
I’m thinking this is someone trying to get a friends box pwnd.
November 10, 2009 at 2:04 pm #27630slimjim100Participant
Well if this post sounds like someone trying to get another IP hacked for them just e-mail @cox.net">firstname.lastname@example.org and tell them there is a residential customer hosting a server and send them the IP address. The TOS for home cable modem service states you are not allowed to host servers from residential accounts and 99% of business account are given a static IP.
My 2 cents,
- You must be logged in to reply to this topic.