Vulnerability Development mailing list archives

Re: Kill the DOG and win 100 000 DM


From: James Cox <james () IMAJES CO UK>
Date: Mon, 6 Nov 2000 21:52:32 -0000

hi :)

I just tried getting through, and although it took a LONG time it
eventually loaded the webpage.  I was actually in the act of >emailing
them
to ask which server they want us to take down lol (since they have 3
(main,
hacking-contest.com, and >193.102.208.43).

i tried alot , but the connection always failed. even telnetting to port
80
didnt work. i have 2 (legal) shells very very close to the system, so i
think you have to catch a lucky moment to get the / page. <joke> i could
mirror the site if anyone send me an apropriate .tgz hehe </joke>

It seems as if the box is pretty ok right now. I have seen the two pages
hosted there - no more info than hacking-contest.com...

port 25 and 23 ( try root/toor maybe it works haha ) work like a charm.

Hmm, I am not sure if I see what I should:

SunOS 5.7

login: nobody
Password: (nobody)
Login incorrect

login: root
Password: (toor)
Login incorrect

I can keep going like this - it doesn't kick me off :)

only thing i could do was checking their relaying rules (relaying denied)
and looking for some user accs:

550 www... User unknown
250 nobody... Recipient ok
250 root... Recipient ok
550 ftp... User unknown
250 nobody4... Recipient ok
250 uucp... Recipient ok
[...]
550 admin... User unknown
550 administrator... User unknown
550 gast... User unknown
550 guest... User unknown
550 toor... User unknown
550 argus... User unknown
550 argusadmin... User unknown
[...]
550 bla... User unknown
550 blabla... User unknown

I wonder if there is anymore info from that..

so i just sit and wait for some login info ...

Yup, don't we all. :)

James Cox
re.vulns () imajes co uk


Current thread: