Jump to content
Krisler12™

[intern0t hacking challenge]HaXx.Me #04 - Pentesting the Obscure

Recommended Posts

Posted
Dear members and guests of InterN0T,

The last three HaXx.Me #01 #02 and #03 wargames were a success and therefore

it is time for HaXx.Me #04! We've given you time to recover from the last challenge

which included strange DNS queries, Custom Web Apps, Custom vHost requests

and much more! This time, we guarantee it will be even more mind blowing!

Not only will the challenge contain Web Applications as per usual, but it will

also include insanity on a high level in form of pentesting ways, some of you

may never have encountered nor tried before.

Of course you may have heard of it, but one thing is theory, another is real life.

The target will be announced here in this thread, on twitter and IRC, while the complete

objectives will only be released here. There are a few rules (common sense) which has

to be followed as well, these are mentioned below.

The challenge is "Capture The Flag" styled, as in completing the objective(s) first.

Winners

The contest is not over yet.. (the first five winners are announced here)

Other participants who completed the contest:

The contest is not over yet..

Documentation

The contest is not over yet..

Rules

- It is forbidden to intentionally cause DoS conditions.

- It is strictly forbidden to try and break out of the Xen instance.

- Attacking other servers on the same host or network is strictly forbidden.

- You may only attack the IP and domain announced here.

- Avoid altering the target to deny other contest participants access.

- You may attack any service hosted on the target.

- You may use any tool necessary to hack the target as long as you don't break the rules above.

- Avoid automated vulnerability scanners. They won't help you and it may cause the server to become slow.

- You are allowed to use NMAP, otherwise you won't be able to do this challenge. (Don't use the -A flag / switch.)

Hints

- There's a lot more to it, than just Web Application Security.

- Check out twitter from time to time, hints may be revealed occasionally.

- Read blogs and threads on InterN0T about Web Application Security.

- Having completed the last 3 challenges or at least knowing how, is a plus.

Contact

- In case the server is down, contact Hestas or Rorok and inform them about this.

- You can also send a PM to me or use our Contact Us form.

Timeline

The challenge starts Friday the 26th November 2010 - 18:00 GMT+1 (12:00pm EST)

The challenge ends roughly around Friday the 3rd December 2010.

Submissions

In order for us to see how you managed to "crack" the server, we'd like you

to provide some brief documentation. The layout overall doesn't matter but

One could look at the HSIYF documentation others made, to get an idea how

such a thing could look like. Alternatively check out the previous documentations

from the last challenges!

Challenge

The target server may be restored from a backup each ~24 hours.

HaXx.Me #04 Target

Target: [Closed]

Primary Objectives:

Gain access to and read the contents of the "Winning-Key.txt" file in the root directory.

Don't forget to have fun while you're doing this!

If you fail, don't believe you're not good enough. Try Harder as the people

from Offensive Security tend to say, or simply give up and wait for the full

documentation which usually includes a video from InterN0T.

Best regards,

MaXe

Timeline

The challenge starts Friday the 26th November 2010 - 18:00 GMT+1 (12:00pm EST)

The challenge ends roughly around Friday the 3rd December 2010.

HaXx.Me #04 - Pentesting the Obscure - InterN0T - Underground Security Training

Cei de pe intern0t se afla la a 4-a competitie de acest gen (rezolvarile celor 3 de pana acum le gasiti pe forumul lor). Participarea este gratuita, inscreierea pe forum de asemnea.

Haideti sa vedem asa care e mai bun ca asa oricine poate face un xss amarat sau sa faca un sqli la un site de doi bani gasit intamplator ! ORICINE poate asta !

Daca va credeti hackeri adevarati sau vreti sa demonstrati asta atunci nu va ramane decat sa participati la aceasta competitie si numele vostru va fi facut public pe acel site la finalizarea competitiei.

Ce e mai greu: sa spargi un site la gasit la nimereala sau sa cauti o vulnerabilitate intr-un site dinainte stabilit ca tinta ? Va las pe voi sa decideti.

Nu fac nici un fel de reclama acestui forum si nu va obliga nimeni sa va faceti cont acolo. Puteti participa si fara sa va faceti cont insa problema e ca nu veti putea dovedi in nici un fel ca ati reusit sa spargeti situl respectiv, ptr. ca numai in acest fel idul/numele vostru va fi pus la "winners".

Aveti timp o saptamana (pana pe 3 decembrie) sa va dovediti abilitatile deci nu se poate sa spuneti ca nu ati vazut/nu ati auzit.

Bafta !

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...