Jump to content

Chris Gerling

Active Members
  • Posts

    213
  • Joined

  • Last visited

Everything posted by Chris Gerling

  1. All, I know some of you have probably heard about this little project from the grapevine in the last couple of weeks, and have seen my postings on my blog about it from the front page of this site. I figure it's about time to let the cat out of the bag and actually get the thing out on the table. There are three main parts to the project (I love making everything fit into a list of 3.. *grin*): 1.) A server to be made available for "rootthisbox" type competition. Users attempt to gain root on the machine through exploiting vulnerabilities on it. The intention is to make it very hard for the script kiddie types to be successful, or to ensure that even if they are, there is a component such as answering a critical thinking question which anyone savvy in network security would know. 2.) A server to be made available for "capture the flag" competition. This server will only be available during the competitions scheduled and organized by staff. There will be goals and reports to be submitted by teams participating. 3.) Logistics and support behind the scenes, and auditing of activity on the servers. This is an opportunity to analyze and share information about what is going on during these events to help people better understand network security concepts, primarily defense. I will have a mailing list setup by tomorrow and already have some email addresses of those who wish to be involved. There will be plenty more information in the coming weeks. For now, anyone interested in assisting with this project, feel free. I will be updating the project page on my site tomorrow as well.
  2. Is this it? seems like it to me: http://freedoom.sourceforge.net/
  3. Mine came in the rockbox package I downloaded, so I didn't have to do anything else but install rockbox with the full install. I'll do some searches and get back to ya though.
  4. Are you talking about centralops.net ? It's the only thing I can think of. I don't remember specifically showing off a subdomain scanner though.
  5. Interesting. Your front page post is a little weird though :)
  6. Did you see the one I did of you guys the other day? http://forums.hak5.org/index.php/topic,541...1.html#msg83581 Yeah we all saw it right after we did the live show at the ECL. I almost fell over laughing, awesome work man!
  7. digip: It's my face MS Paint'd onto some weird guy.. lol. We have a dude at work who does nothing but paste peoples' faces onto weird pictures all day long.
  8. Time for an update: My name is Chris, aka dualism, aka Hak5Chris Favourite game: Mass Effect at the moment. System Shock 2 is great though. ;) Favourite OS: Windows for games, Linux for everything else. Favourite console: Xbox 360 Nationality: US Accent: Western New Yorkers don't have one eh? Sex: Male Age: 24 Race: German/Scottish/Irish/andalotofeverythingelse Height: 6'3'' Status: Not single. Build: Worse than 6 months ago. (even worse now) Favourite band: Dire Straits Favourite book: Without Remorse Favourite author: Brian Jacques Favourite movie: Run Lola Run/Kiss Kiss Bang Bang Favourite director: I never pay attention to them. Favourite TV Show: The Office Favourite actor: Robert Downey Jr. Favourite actress: Scarlett Johansson Favourite Pinup: Milla Jovovich Favourite Comedian: George Carlin Other hobbies: Drinking, BBQing, Soccer, Beach, Hacking, Having ADD with technology, Reading, Guitar, Cooking, Gaming. Car: 2008 Toyota Highlander Sport Occupation: Security Expert. IDS/IPS/everything else.
  9. BackTrack 3: http://backtrack.offensive-security.com/index.php/Main_Page It's glorious.
  10. http://wiki.hak5.org/w/images/3/38/Dualism.JPG[/img]
  11. Thanks.. that's weird, my buddy Karl is a part of that Dojo project ironically. I'll hit him up :)
  12. You're attempting to do DNS tunneling. We talk about it a bit in one of the live shows, originally it was TomB who gave me the idea. There are some good guides linked in one of the threads talking about it on here, and I think the show notes too for that particular episode (7 or 8 maybe?). I haven't tinkered with it in awhile, but essentially you need to have access to a server running DNS where you nave full access to edit the A/CNAME/etc on it, or use Dynamic DNS and do the same.
  13. Yes this is just a small piece. Does it look malicious? Or is it just a bookmarking function?
  14. I have a good grasp on reading most code, just curious if anyone feels like breaking down exactly what this is doing? ction.getSelectedElement()||dojo.html.selection.getParentElement(); while(node){ if(dojo.html.selection.isTag(node,arguments).length>0){ return node; } node=node.parentNode; } return null; },isTag:function(node,tags){ if(node&&node.tagName){ for(var i=0;i<tags.length;i++){ if(node.tagName.toLowerCase()==String(tags[i]).toLowerCase()){ return String(tags[i]).toLowerCase(); } } } return ""; },selectElement:function(_25b){ var _25c=dojo.global(); var _25d=dojo.doc(); _25b=dojo.byId(_25b); if(_25d.selection&&dojo.body().createTextRange){ try{ var _25e=dojo.body().createControlRange(); _25e.addElement(_25b); _25e.select(); } catch(e){ dojo.html.selection.selectElementChildren(_25b); } }else{ if(_25c["getSelection"]){ var _25f=_25c.getSelection(); if(_25f["removeAllRanges"]){ var _25e=_25d.createRange(); _25e.selectNode(_25b); _25f.removeAllRanges(); _25f.addRange(_25e); } } } },selectElementChildren:function(_260){ var _261=dojo.global(); var _262=dojo.doc(); _260=dojo.byId(_260); if(_262.selection&&dojo.body().createTextRange){ var _263=dojo.body().createTextRange(); _263.moveToElementText(_260); _263.select(); }else{ if(_261["getSelection"]){ var _264=_261.getSelection(); if(_264["setBaseAndExtent"]){ _264.setBaseAndExtent(_260,0,_260,_260.innerText.length-1); }else{ if(_264["selectAllChildren"]){ _264.selectAllChildren(_260); } } } } },getBookmark:
  15. Has anyone installed a linux distribution on Apple Xserve hardware? The EFI is really killing me as I don't know how to get the installation going on that. My boss wants CentOS but I'd be willing to install any distribution that works on the hardware. Thanks!
  16. Anyone want to volunteer to enter all these configurations into a spreadsheet and figure out what the most common things are? Would be neat to have it in a database format to compare and pull statistics from.
  17. The VM thing is good, what we have is a little more future proof as it's completely hardware based and as far as we currently know there are no circumvention vectors for it.
  18. We actually have a Win 2003 server install with a whole bunch of the same antivirus software running on it that virustotal has, inhouse. We have some scripts setup to where you can upload malicious files and the server scans it and outputs the identification result. There are some things in place which reset the machine back to a known-to-be-clean baseline after each scan.
  19. I was just telling Darren about this last night. I think for the next live show i'm going to go over it, and maybe talk about how you'd go about building your own.
  20. This is who I was mistaken for :)
  21. I am curious whether anyone here has done this, has one, or has any input as to how to go about setting up either a small physical, or virtual network for testing all sorts of things, such as executing malicious attachments in a virtual machine and capturing the packets with wireshark/snort, or maybe using hping2 to toss some packets at a snort sensor and logging what happens, etc. There aren't a lot of limitations here really, we have all sorts of hardware laying around, and I believe a VMware ESX license too (the only issue with ESX is I am told it is VERY HARD to transfer files FROM the virtual machine on an ESX server TO something else without simply jacking a laptop into it. The goal there would be the method least likely to contaminate anything outside of the test network. Again this test network needs to be as isolated as possible while still allowing us to pull things off of it from time to time. Any ideas? Thanks!
×
×
  • Create New...