I was thinking in terms of an Apartment (APT) :-)

I am not a hacker, and I don't think I ever will be one, so no reason to fear my box. I just wanted to get to feel the thrill of someone breaking into it.

On Wed, Apr 13, 2011 at 19:06, Gichuki John Chuksjonia <chuksjonia@gmail.com> wrote:
APT is new hacking Methodology designed to bypass filters, proxies and
FW to internal network infiltration. APT stands for Advanced
Persistent Threat.

./Chucks

On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
> Chucks,
>
> What is an APT? :-)
>
> I have nothing sinister running on the computer. It's just a workstation
> running FreeBSD, which I use as pre-deployment App testing platform.
>
> Well, if you insist on it being formatted (after the hackers are done with
> it) then let me see if I can duplicate the disk first before giving I bring
> it.
>
>
> On Wed, Apr 13, 2011 at 18:44, Gichuki John Chuksjonia <chuksjonia@gmail.com
>> wrote:
>
>> The workstations, are welcome, we can meet morrow after 4pm @ihub if
>> possible, but one issue, it will have to be formated, since you may have
>> an
>> APT running, and i wouldn't know.
>>
>> About the diagram, it will be released on 30th to the public, since we
>> don't want pre-hacking attempts until the infrastructure is fully set.
>>
>> Thankx,
>>
>> ./Chucks
>>
>> On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
>> > On Wed, Apr 13, 2011 at 10:51, Gichuki John Chuksjonia <
>> chuksjonia@gmail.com
>> >> wrote:
>> >
>> >> Hi Kictanet members, Skunkworks, and Security members, kindly when
>> >> replying, do not reply to all, but to your respective mailist, unless
>> >> your are registered to all.
>> >>
>> >> Now, the dates for the belated Hackbattle2010 have been set, as from
>> 25th
>> >> to 29th of April and 30th will be the presentation dates. We will
>> >> have hackbattle 2011 at the end of the year.
>> >>
>> >> The scenario will be two servers Natted to an FW on public IPs, and two
>> >> workstations behind the DMZ. The registered guys will have to hack
>> >> their way into the network, and collected files, they will be asked
>> >> with
>> >> the right MD5 checksums. The first collector of all checksums,
>> >> from both servers and one workstation, will be the winner of the
>> contest.
>> >>
>> >>
>> > Chuks,
>> >
>> > This is very interesting.
>> >
>> > Could you please attach a network diagram of the scenario?
>> >
>> > Can I bring along my workstation to be put as one of those in the DMZ?
>> >
>> >
>> > --
>> > Best regards,
>> > Odhiambo WASHINGTON,
>> > Nairobi,KE
>> > +254733744121/+254722743223
>> > _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
>> > Damn!!
>> >
>>
>>
>> --
>> --
>> Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P
>> I.T Security Analyst and Penetration Tester
>> jgichuki at inbox d0t com
>>
>> {FORUM}http://lists.my.co.ke/pipermail/security/
>> http://chuksjonia.blogspot.com/
>> _______________________________________________
>> Skunkworks mailing list
>> Skunkworks@lists.my.co.ke
>> http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks
>> ------------
>> Skunkworks Rules
>> http://my.co.ke/phpbb/viewtopic.php?f=24&t=94
>> ------------
>> Other services @ http://my.co.ke
>>
>
>
>
> --
> Best regards,
> Odhiambo WASHINGTON,
> Nairobi,KE
> +254733744121/+254722743223
> _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
> Damn!!
>


--
--
Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P
I.T Security Analyst and Penetration Tester
jgichuki at inbox d0t com

{FORUM}http://lists.my.co.ke/pipermail/security/
http://chuksjonia.blogspot.com/



--
Best regards,
Odhiambo WASHINGTON,
Nairobi,KE
+254733744121/+254722743223
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
Damn!!