That Should Do It.
#23
Race, what is your small teams name? If we're going to be up against each other it'd be nice to know i actually know who's on another team.
also what are your plans on how to go about it? Me and 3 others all will be using an identical loophole in specific programs to make things easier and quicker.
what are your plans?
kevin.
also what are your plans on how to go about it? Me and 3 others all will be using an identical loophole in specific programs to make things easier and quicker.
what are your plans?
kevin.
#24
Originally Posted by Race_87RX7' date='Jul 4 2003, 11:36 AM
not enough companies are taking this seriously......me and a small group have five sites alrdy targeted out (not here guys no worries : ) )
kevin.
#25
were not trying to win it, we jus like to participate in these things. We dont rlly have a plan we all kinda do our own thing. I wrote a program that just scans and pokes at random ip's and logs any holes or potential easy access points it may find. I'm going to run it saturday morning and jus let it go till i get home sunday and see if anything stands out to me.
The five targets they (and i somewhat) wanted to get are:
www.dragoness.org (personal thing for me)
www.google.com (i dunno why matt wants to harm google...)
www.apple.com
www.aol.com (haha so great)
www.nextel.com (one of my buddies has an issue with billing and them)
The five targets they (and i somewhat) wanted to get are:
www.dragoness.org (personal thing for me)
www.google.com (i dunno why matt wants to harm google...)
www.apple.com
www.aol.com (haha so great)
www.nextel.com (one of my buddies has an issue with billing and them)
#27
Well we should be all set, but who knows, only time will tell. I will run the backups tomorrow night. One way or the other we will prolly be indirectly effected, our network is shared with thousands of other systems.
#30
aol.com won't get any points, as it's been defaced previously but about 90% of people will be attacking it just for the amount of credit it will get you.
nextel.com weak point is in it's public text messaging system, they basically open a door to their server when one is sent out. I'll let the hint end there.
google.com has not so many weaknesses, altho the googlebot is a potential weak link it is difficult to "time" it's activities.
Me and my friends will be opening the challenge by taking down each site on the gamespy.com network (the "planet" sites such as 3dactionplanet etc). Those servers are so vulnerable it's hilarious.
After that it's a bunch of attacks that seem random but most backbone structure of the sites are similar. We're focusing on everything non-windows so as to gain as many points as possible. but if it comes down to needing only a couple sites we have plenty of sites running on Windows that we could use 1 out of thousands of loopholes to deface.
also i would never try to find out nopistons.com's vulnerabilities without phins permissions, i used to have a program we created that when run on a computer would detail loopholes and possible access/entry points that i used to run on the computers i'd use to make sure my info was safe, i could dig it u and let phins test himself.
you guys would be surprised at all the "modern" websites running ancient software versions and such, it's why i laugh when everyone is like "the new internet age" etc. Half the servers are running on early-to-mid 90's software. And the ones that are smart enough to use current software generally dont understand the software and **** up and leave a giant entry point.
kevin.
nextel.com weak point is in it's public text messaging system, they basically open a door to their server when one is sent out. I'll let the hint end there.
google.com has not so many weaknesses, altho the googlebot is a potential weak link it is difficult to "time" it's activities.
Me and my friends will be opening the challenge by taking down each site on the gamespy.com network (the "planet" sites such as 3dactionplanet etc). Those servers are so vulnerable it's hilarious.
After that it's a bunch of attacks that seem random but most backbone structure of the sites are similar. We're focusing on everything non-windows so as to gain as many points as possible. but if it comes down to needing only a couple sites we have plenty of sites running on Windows that we could use 1 out of thousands of loopholes to deface.
also i would never try to find out nopistons.com's vulnerabilities without phins permissions, i used to have a program we created that when run on a computer would detail loopholes and possible access/entry points that i used to run on the computers i'd use to make sure my info was safe, i could dig it u and let phins test himself.
you guys would be surprised at all the "modern" websites running ancient software versions and such, it's why i laugh when everyone is like "the new internet age" etc. Half the servers are running on early-to-mid 90's software. And the ones that are smart enough to use current software generally dont understand the software and **** up and leave a giant entry point.
kevin.