-
June 13th, 2002, 04:35 PM
#1
Wargame Server now running
hey,
I have a spare server so i thought i would turn it into a wargame server. So you can all have ago trying to hack it or **** it up if you want. I have left quite a few ports open so you can all try and get a remote access
if you want to try and ge ROOT LOCALY there is a account:
use telnet or ssh
USER: guest
PASS: guest
The server is wargame.mine.nu
wargame.mine.nu is running Redhat Linux 7.2 (Enigma) Kernel 2.4.7-10 on a i586
Apache/1.3.23 mod_ssl/2.8.7 OpenSSL/0.9.6b PHP/4.1.2 mod_perl/1.26 on Linux
NMAP output
# nmap (V. 2.54BETA34) scan initiated Thu Jun 13 16:09:26 2002 as: nmap -sS -P0 -O -v -v -oN file wargame.mine.nu
Interesting ports on wargame.mine.nu (127.0.0.1):
(The 1546 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
80/tcp open http
111/tcp open sunrpc
113/tcp open auth
199/tcp open smux
443/tcp open https
3306/tcp open mysql
6000/tcp open X11
Remote operating system guess: Linux Kernel 2.4.0 - 2.4.18 (X86)
OS Fingerprint:
TSeq(Class=RI%gcd=1%SI=3D060E%IPID=Z%TS=100HZ)
T1(Resp=Y%DF=Y%W=7FFF%ACK=S++%Flags=AS%Ops=MNNTNW)
T2(Resp=N)
T3(Resp=Y%DF=Y%W=7FFF%ACK=S++%Flags=AS%Ops=MNNTNW)
T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
PU(Resp=Y%DF=N%TOS=C0%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E)
Uptime 0.011 days (since Thu Jun 13 15:53:29 2002)
TCP Sequence Prediction: Class=random positive increments
Difficulty=3999246 (Good luck!)
TCP ISN Seq. Numbers: 3BC8E6FE 3BA53224 3B32044C 3BFBBCDE 3BA2E3B6 3BC8AE1F
IPID Sequence Generation: All zeros
# Nmap run completed at Thu Jun 13 16:09:32 2002 -- 1 IP address (1 host up) scanned in 6 seconds
-
June 13th, 2002, 04:44 PM
#2
Sorry to be distrustful. But, we have had people pose as having their own wargame servers before to attempt to trick us into breaking into another persons server or show them how so they could use our work to advance in a wargame. So can you provide us with some information on this. Such as:
1. Who are you.
2. A real email contact.
3. A webpage posting the details.
4. Details of your involvment.
5. Some proof this is for real.
6. Some proof that this is your server.
Point being. This shows up as an AOL server. Hmmmmmmm?
Search results for: 172.134.106.223
America Online, Inc. (NETBLK-AOL-172BLK)
12100 Sunrise Valley Drive
Reston, VA 20191
US
Netname: AOL-172BLK
Netblock: 172.128.0.0 - 172.191.255.255
Maintainer: AOL
Coordinator:
America Online, Inc. (AOL-NOC-ARIN) domains@AOL.NET
703-265-4670
Domain System inverse mapping provided by:
DAHA-01.NS.AOL.COM 152.163.159.233
DAHA-02.NS.AOL.COM 205.188.157.233
ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Record last updated on 28-Mar-2001.
Database last updated on 12-Jun-2002 20:00:26 EDT.
The COOKIE TUX lives!!!!
Windows NT crashed,I am the Blue Screen of Death.
No one hears your screams.
-
June 13th, 2002, 04:50 PM
#3
Ravage382 has succeeded in getting root and added his name to the html
-
June 13th, 2002, 04:51 PM
#4
Originally posted here by chris_james
Ravage382 has succeeded in getting root and added it name to the html
Ok. So what? This still shows us no proof.................
Hmmm? You have an AOL email in your profile and you also offered shell accounts on AOL. Here:
http://www.antionline.com/showthread...737#post511737
SO whats the deal? Since when did AOL start letting their users offer these services?
The COOKIE TUX lives!!!!
Windows NT crashed,I am the Blue Screen of Death.
No one hears your screams.
-
June 13th, 2002, 04:54 PM
#5
login to the server as user guest pass guest then and you will se me there
-
June 13th, 2002, 04:56 PM
#6
A newbie w/2 of his 3 posts in reference to asking us to attack a server... Hmmmmmmm
Good work {p2p} - glad I'm not the only one who is suspicious... Especially after some investigation.
-
June 13th, 2002, 04:58 PM
#7
Member
Apocalypse gave a list of things to prove the validity of the server. Why not just provide it so everyone knows this is legit (or not).
[glowpurple]I\'d tell you about my paranoia but I think someone else is listening.[/glowpurple]
-
June 13th, 2002, 05:04 PM
#8
To answer the questions
My name is chris james
my emails adds are chrisj21@email.com or ct3ch@aol.com
the webpage is wargame.mine.nu
I am the owner of the server it is in my house with my four other servers.
-
June 13th, 2002, 05:06 PM
#9
:::Sniffs::: Do I smell FreeAgent? :::Sniffs:::
"Never give in-never, never, never, in nothing great or small, large or petty, never give in to convictions of honor and good sense. Never yield to force; never yield to the apparently overwhelming might of the enemy!" - Winston Churchill
-
June 13th, 2002, 05:17 PM
#10
Originally posted here by chris_james
To answer the questions
My name is chris james
my emails adds are chrisj21@email.com or ct3ch@aol.com
the webpage is wargame.mine.nu
I am the owner of the server it is in my house with my four other servers.
Still no proof. Anyone can get an AOL email or an Email.com email addy. You URL still resolves to AOL, and you're not listed as the domain admin or registuar at any point. In your house? Is it not against AOL's TOS to run a server, let alone four. Still sounds suspicious.
The COOKIE TUX lives!!!!
Windows NT crashed,I am the Blue Screen of Death.
No one hears your screams.
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|