Showdown @ noon.

by on Jun.21, 2018, under Hosting, Linux, Programming, Server, Ultimate Edition

I had potentially 1,500 friends on Facebook attempt to hack our server 24 hours ago.

I did say I would do this.

HACKERS CHALLENGE!!!

Hackers, your target is http://keyserver.ueserver.space

That is a bad man to toss myself to the wolves. I built the server, take it down. I do not mean render it offline. I want you to if possible drop to the desktop and create a “README” file on that servers desktop. Enter your name if you like fame or point of contact. If by chance someone else has “been there done that”, please suck in the hackers code and add your name to the list.

I am not looking for destruction. I want to see where I am at.

The world will thank you for your efforts.

TheeMahn,

Thus far, they have failed. I thought I would introduce another 130,000+ registered users to the mix. I did say I would eventually give a hackers challenge. This is your moment. I will make you famous, or is it infamous? I will keep jacking in more users until I see a security breech. In the end only makes a more secure Operating System for the end users. If you get in my hat is off to you and the end user also thanks you.

This is called a white hat hacker. Let’s get the geek stuff out of the way:

theemahn@JackHammer:~$ nmap 192.168.1.20

Starting Nmap 7.60 ( https://nmap.org ) at 2018-06-20 23:59 EDT
Nmap scan report for 192.168.1.20
Host is up (0.0020s latency).
Not shown: 990 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
2049/tcp open nfs
8080/tcp open http-proxy

Nmap done: 1 IP address (1 host up) scanned in 0.09 seconds
theemahn@JackHammer:~$ nmap keyserver.ueserver.space

Starting Nmap 7.60 ( https://nmap.org ) at 2018-06-21 00:00 EDT
Nmap scan report for keyserver.ueserver.space (174.105.105.121)
Host is up (0.0058s latency).
rDNS record for 174.105.105.121: cpe-174-105-105-121.columbus.res.rr.com
Not shown: 989 closed ports
PORT STATE SERVICE
21/tcp open ftp
80/tcp open http
255/tcp filtered unknown
256/tcp filtered fw1-secureremote
264/tcp filtered bgmp
311/tcp filtered asip-webadmin
443/tcp open https
548/tcp open afp
631/tcp open ipp
8200/tcp open trivnet1
20005/tcp open btx

Nmap done: 1 IP address (1 host up) scanned in 1.32 seconds
theemahn@JackHammer:~$

O.K. I covered internal and external ports. We are building a Linux based Server Operating System. First, I see we have FTP (File Transfer Protocol) service running, do we break in there? TLS (Transport Security Layer) is in place, feel free. Oh, port 80 a webserver, I also notice down the list we have 443 https, WTF 8080 http-proxy hmm. I want the easiest way in. I see a bunch of filtering? I am not going to hold your hand. Nasty server BTW.

Good luck. The hackers challenge has begun. Will I loose? I know for a fact there are better. I will only jack it up one more time. If it is not breeched, I will write it off as a secure system & move forward.

I will further help you in understanding what we are playing with, just a newer version.

TheeMahn,


Leave a Reply

You must be logged in to post a comment.

Back to top ↑