I was thinking in terms of an Apartment (APT) :-)
I am not a hacker, and I don't think I ever will be one, so no reason to fear my box. I just wanted to get to feel the thrill of someone breaking into it.
APT is new hacking Methodology designed to bypass filters, proxies and
FW to internal network infiltration. APT stands for Advanced
Persistent Threat.
--
./Chucks
On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
> Chucks,
>
> What is an APT? :-)
>
> I have nothing sinister running on the computer. It's just a workstation
> running FreeBSD, which I use as pre-deployment App testing platform.
>
> Well, if you insist on it being formatted (after the hackers are done with
> it) then let me see if I can duplicate the disk first before giving I bring
> it.
>
>
> On Wed, Apr 13, 2011 at 18:44, Gichuki John Chuksjonia <chuksjonia@gmail.com
>> wrote:
>
>> The workstations, are welcome, we can meet morrow after 4pm @ihub if
>> possible, but one issue, it will have to be formated, since you may have
>> an
>> APT running, and i wouldn't know.
>>
>> About the diagram, it will be released on 30th to the public, since we
>> don't want pre-hacking attempts until the infrastructure is fully set.
>>
>> Thankx,
>>
>> ./Chucks
>>
>> On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
>> > On Wed, Apr 13, 2011 at 10:51, Gichuki John Chuksjonia <
>> chuksjonia@gmail.com
>> >> wrote:
>> >
>> >> Hi Kictanet members, Skunkworks, and Security members, kindly when
>> >> replying, do not reply to all, but to your respective mailist, unless
>> >> your are registered to all.
>> >>
>> >> Now, the dates for the belated Hackbattle2010 have been set, as from
>> 25th
>> >> to 29th of April and 30th will be the presentation dates. We will
>> >> have hackbattle 2011 at the end of the year.
>> >>
>> >> The scenario will be two servers Natted to an FW on public IPs, and two
>> >> workstations behind the DMZ. The registered guys will have to hack
>> >> their way into the network, and collected files, they will be asked
>> >> with
>> >> the right MD5 checksums. The first collector of all checksums,
>> >> from both servers and one workstation, will be the winner of the
>> contest.
>> >>
>> >>
>> > Chuks,
>> >
>> > This is very interesting.
>> >
>> > Could you please attach a network diagram of the scenario?
>> >
>> > Can I bring along my workstation to be put as one of those in the DMZ?
>> >
>> >
>> > --
>> > Best regards,
>> > Odhiambo WASHINGTON,
>> > Nairobi,KE
>> > +254733744121/+254722743223
>> > _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
>> > Damn!!
>> >
>>
>>
>> --
>> --
>> Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P
>> I.T Security Analyst and Penetration Tester
>> jgichuki at inbox d0t com
>>
>> {FORUM}http://lists.my.co.ke/pipermail/security/
>> http://chuksjonia.blogspot.com/
>> _______________________________________________
>> Skunkworks mailing list
>> Skunkworks@lists.my.co.ke
>> http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks
>> ------------
>> Skunkworks Rules
>> http://my.co.ke/phpbb/viewtopic.php?f=24&t=94
>> ------------
>> Other services @ http://my.co.ke
>>
>
>
>
> --
> Best regards,
> Odhiambo WASHINGTON,
> Nairobi,KE
> +254733744121/+254722743223
> _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
> Damn!!
>
--
Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P
I.T Security Analyst and Penetration Tester
jgichuki at inbox d0t com
{FORUM}http://lists.my.co.ke/pipermail/security/
http://chuksjonia.blogspot.com/