Dec. 15: new wargame started!

Questions? Stuck? post here....
MariaLara
suck-o-fied!
suck-o-fied!
Posts: 99
Joined: 27 Feb 2008, 17:00
16
Contact:

Post by MariaLara »

ty :twisted:

oh and sorry I ssh your host at first.

don't ask. :lol:
The only true wisdom is in knowing you know nothing.

User avatar
DNR
Digital Mercenary
Digital Mercenary
Posts: 6114
Joined: 24 Feb 2006, 17:00
18
Location: Michigan USA
Contact:

Post by DNR »

Whoa! good job maria *thumb*

DNR
-
He gives wisdom to the wise and knowledge to the discerning. He reveals deep and hidden things; he knows what lies in Darkness, and Light dwells with him.

User avatar
bad_brain
Site Owner
Site Owner
Posts: 11636
Joined: 06 Apr 2005, 16:00
19
Location: In your eye floaters.
Contact:

Post by bad_brain »

I will give info about the flaws and how MariaLara got in tomorrow, if my customers give me a little break I will see if I can set up a new wargame before the server is taken offline by the provider... :)

User avatar
maboroshi
Dr. Mab
Dr. Mab
Posts: 1624
Joined: 28 Aug 2005, 16:00
18

Wargames Continuation

Post by maboroshi »

Hey all was just thinking...

I am wondering if everyone is interested in having a dedicated wargames box here. Was thinking I could keep that server going as my donation to suck-o and we could get some people to aid in setting up different games.

the server is only like 15 dollars per month or 10 or something like that

If people are interested and we can get some dedicated people familiar with Linux to assist in setting up different games So bb isn't stuck doing it :-P

And there is enough interest

I would be more than happy to do this

Let me know

AND WELL DONE TO BSD :-)

User avatar
bad_brain
Site Owner
Site Owner
Posts: 11636
Joined: 06 Apr 2005, 16:00
19
Location: In your eye floaters.
Contact:

Post by bad_brain »

hm, I think it would be more fair if people donate for a wargame box, and always when we have enough we rent a server for a month....I mean it's much more easy for 15 people to donate 1 buck than for you to pay 15 bucks.... :wink: we should discuss this further in an extra thread.

User avatar
Nerdz
The Architect
The Architect
Posts: 1127
Joined: 15 Jun 2005, 16:00
18
Location: #db_error in: select usr.location from sucko_member where usr.id=63;
Contact:

Post by Nerdz »

Congratulation Maria!:D At least something you succeed in... BECAUSE I FU*KING PWN YOU :)
Give a man a fish, you feed him for one day.
Learn a man to fish, you feed him for life.

User avatar
Lyecdevf
cyber Idi Amin
cyber Idi Amin
Posts: 1222
Joined: 16 Mar 2006, 17:00
18
Location: In between life and death.
Contact:

Post by Lyecdevf »

Nerdz wrote:BECAUSE I FU*KING PWN YOU :)
I do not know what you have between each other but all I have to say is MariaLara u are 1337. :D
We will either find a way, or make one.
- Hannibal

User avatar
ph0bYx
Staff Member
Staff Member
Posts: 2039
Joined: 22 Sep 2008, 16:00
15
Contact:

Post by ph0bYx »

Congrats MLara, well done.
Now can you or someone else post a report, please? :)

User avatar
bad_brain
Site Owner
Site Owner
Posts: 11636
Joined: 06 Apr 2005, 16:00
19
Location: In your eye floaters.
Contact:

Post by bad_brain »

ok, here are the flaws the server had:

- the phpnuke installation was an unpatched old version (7.5), remote file inclusions would have been possible (most likely XSS and SQL injections too), for such issues checking sites like http://www.securityfocus.com is the key.

- Phpmyadmin was installed in its default place (http://sitename.com/phpmyadmin), but no password was set for mysql. this flaw is not even rare, because when installing mysql no password is set by default. MariaLara found this flaw too, she logged in with 1=1-- as username and no password (it would also have been possible to login as user "root" with no password, this is the default).

- the last flaw was a nasty one, the scenario was: "maybe I am not the first one trying to compromise the server, what if someone was successful already?" so I placed a Perl script in the root directory which opened a backdoor. so it was possible to spawn a shell by connecting to port 520 UDP, the best tool for connecting to such backdoors is netcat.
netcat is originally for Unix/Linux, but a Windows port is also available.
MariaLara found this backdoor and used netcat to connect, she created even a new user, and finally she used it to leave the BSDGurl_was_here message....this all is a clear evidence that she had 100% root permissions and the server was completely under her control.


all of the flaws were realistic, and there are more than enough servers in the wild that could be rooted in those ways.
without an IDS the backdoor was the most stealth way, because UDP is a non-connective protocol (no 3-way handshake as with TCP, this was the "server will never welcome you with a handshake" hint btw), and so no log entries are made in daemon.log or auth.log
the other 2 flaws would leave entries in the apache access log, but using a good proxy would make the entries pointless.
if an IDS is running, the backdoor connection would have been noticed, also the RFI attempts, so the most stealth way in this case would have been through Phpmyadmin.

so, things to remember are:
- check for known flaws of running service or platforms like Phpnuke, Wordpress, etc.
- if the server admin is good port scans are noticed anyway, don't matter if you scan 10 ports or all of them....so IF you run a scan make sure you will get all possible info with 1 scan, this will most likely be judged as automated script scan or onetime skiddie attempt, 10 small scans in opposite look much more suspicious.


I am not sure yet if I will have time to set up a new wargame before the server is taken offline by the host on the end of the month, my sister arrived today so it's family time....I will keep you up to date and post instantly here then... :wink:

MariaLara
suck-o-fied!
suck-o-fied!
Posts: 99
Joined: 27 Feb 2008, 17:00
16
Contact:

Post by MariaLara »

Nerdz wrote:Congratulation Maria!:D At least something you succeed in... BECAUSE I FU*KING PWN YOU :)
LMFAO I know you did. I was so pissed.
I could give you a list of excuses but I won't as I talked so much trash I deserved getting my ass handed to me.
:lol:

Anyways to everyone in here Nerdz totally beat my ass in SSBB. Every game. I don't think I even came close to winning one. hahahahahaha
*sigh*

It was great though. Let me practice when I am feeling better and then we will see.
The only true wisdom is in knowing you know nothing.

User avatar
maboroshi
Dr. Mab
Dr. Mab
Posts: 1624
Joined: 28 Aug 2005, 16:00
18

Last Time

Post by maboroshi »

Last time I trust a hacker to secure one of my servers I KILL YOU bb

Joke

:-P :-) :-D

pseudo_opcode
cyber messiah
cyber messiah
Posts: 1201
Joined: 30 Apr 2006, 16:00
17
Location: 127.0.0.1

Post by pseudo_opcode »

err i was late again... i already made a "pwnd by pseudo" page after i found the phpnuke vuln..... but damn job.... i had other work to do.. when i resumed.. it was already rooted by BSD

i never thought about phpmyadmin(silly me, but correct me if i m wrong, isnt the default authentication method http?), anyway i assumed there would be no mysql pass so i tried to connect directly to 3306, but since default config file binds the server to localhost, so again i couldnt connect directly to server... :P

anyway i m sad i missed this one :( but i m very happy to see the only active lady on suck-o to root it.. congrats BSD!

Mab: Man when you host the next wargame server, please let me know, i'll contribute 50% of fees, as an admin of suck-o thats the least i could do,
i think we should spice wargames up some more, play in teams,(like the older ones) and give points on hourly bases, the team who wins at the end of the week will get the prize(whatever it is), i already have the old scripts i wrote for hourly point calculation.

AFTER ALL THIS IS THE SHIT WE LIVE FOR! :twisted:

we can also place some google ads or something on the servers so that server itself can pay for the hosting fee. lol just a thought.

and probably we can add an additional holes,so we could enjoy smashing the stack, and yeah probably some hashed passwords to crack, based on knowledge gained by social engineering..(from sources like imaginary site news archives, profile of current sysadmin).. you know that is the shit we got to do in real life...

[ok back to work]

User avatar
Still_Learning
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 1040
Joined: 11 Jun 2008, 16:00
15
Location: Trigger City

Post by Still_Learning »

I could help setup sites to hack on the box

not too familiar with linux though :oops:
Gone

User avatar
JuggaloMushroom
Fame ! Where are the chicks?!
Fame ! Where are the chicks?!
Posts: 252
Joined: 18 Jul 2006, 16:00
17
Contact:

Post by JuggaloMushroom »

bad_brain wrote:ok, here are the flaws the server had:

- the phpnuke installation was an unpatched old version (7.5), remote file inclusions would have been possible (most likely XSS and SQL injections too), for such issues checking sites like http://www.securityfocus.com is the key.

- Phpmyadmin was installed in its default place (http://sitename.com/phpmyadmin), but no password was set for mysql. this flaw is not even rare, because when installing mysql no password is set by default. MariaLara found this flaw too, she logged in with 1=1-- as username and no password (it would also have been possible to login as user "root" with no password, this is the default).

- the last flaw was a nasty one, the scenario was: "maybe I am not the first one trying to compromise the server, what if someone was successful already?" so I placed a Perl script in the root directory which opened a backdoor. so it was possible to spawn a shell by connecting to port 520 UDP, the best tool for connecting to such backdoors is netcat.
netcat is originally for Unix/Linux, but a Windows port is also available.
MariaLara found this backdoor and used netcat to connect, she created even a new user, and finally she used it to leave the BSDGurl_was_here message....this all is a clear evidence that she had 100% root permissions and the server was completely under her control.


all of the flaws were realistic, and there are more than enough servers in the wild that could be rooted in those ways.
without an IDS the backdoor was the most stealth way, because UDP is a non-connective protocol (no 3-way handshake as with TCP, this was the "server will never welcome you with a handshake" hint btw), and so no log entries are made in daemon.log or auth.log
the other 2 flaws would leave entries in the apache access log, but using a good proxy would make the entries pointless.
if an IDS is running, the backdoor connection would have been noticed, also the RFI attempts, so the most stealth way in this case would have been through Phpmyadmin.

so, things to remember are:
- check for known flaws of running service or platforms like Phpnuke, Wordpress, etc.
- if the server admin is good port scans are noticed anyway, don't matter if you scan 10 ports or all of them....so IF you run a scan make sure you will get all possible info with 1 scan, this will most likely be judged as automated script scan or onetime skiddie attempt, 10 small scans in opposite look much more suspicious.


I am not sure yet if I will have time to set up a new wargame before the server is taken offline by the host on the end of the month, my sister arrived today so it's family time....I will keep you up to date and post instantly here then... :wink:
Damn I came real close, I didn't know that no password was the default though, so I kept putting 1=1'or'1'='1. hmm...I tried doing some stuff with netcat as well, I wasn't sure what else I would've done other than connect...too bad I gave up after like 10 attempts

Post Reply