
Hi Kictanet members, Skunkworks, and Security members, kindly when replying, do not reply to all, but to your respective mailist, unless your are registered to all. Now, the dates for the belated Hackbattle2010 have been set, as from 25th to 29th of April and 30th will be the presentation dates. We will have hackbattle 2011 at the end of the year. The scenario will be two servers Natted to an FW on public IPs, and two workstations behind the DMZ. The registered guys will have to hack their way into the network, and collected files, they will be asked with the right MD5 checksums. The first collector of all checksums, from both servers and one workstation, will be the winner of the contest. To register, send email to hackbattle.ke@gmail.com, with your name, the hacker handle that you will want to use. and the IP range. The contest is hosted by ihub, so all sponsors will be needed to contact Bernard Owuor Adongo <bernard at mlab d0t co d0t ke>, and also me with jgichuki at inbox d0t com. For those who had already asked about the sponsorship, i will be sending you the information later in the day. Rules: 1. Any techi involved with the infrastructure set up will be disqualified for the contest 2. Every registered techi will be needed to have a full report of his actions 3. Any changes of the file to mess up with the checksum, will be considered as a disqualification. 4. Any tyme of DOS will have your IPs blocked 5. Teamwork is allowed, but remember you will have to share the prizes 6. Winners will have to show how they hacked on 30th, in ihub just before the Ubuntu party. 7. The registration will only be allowed from EAC members. 8. Trying to social engineer moderators will be considered as a cool 9. How to win, hack the infrastructure the fastest Yours, ./Chucks -- -- Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P I.T Security Analyst and Penetration Tester jgichuki at inbox d0t com {FORUM}http://lists.my.co.ke/pipermail/security/ http://chuksjonia.blogspot.com/

On Wed, Apr 13, 2011 at 10:51, Gichuki John Chuksjonia <chuksjonia@gmail.com
wrote:
Hi Kictanet members, Skunkworks, and Security members, kindly when replying, do not reply to all, but to your respective mailist, unless your are registered to all.
Now, the dates for the belated Hackbattle2010 have been set, as from 25th to 29th of April and 30th will be the presentation dates. We will have hackbattle 2011 at the end of the year.
The scenario will be two servers Natted to an FW on public IPs, and two workstations behind the DMZ. The registered guys will have to hack their way into the network, and collected files, they will be asked with the right MD5 checksums. The first collector of all checksums, from both servers and one workstation, will be the winner of the contest.
Chuks, This is very interesting. Could you please attach a network diagram of the scenario? Can I bring along my workstation to be put as one of those in the DMZ? -- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!

The workstations, are welcome, we can meet morrow after 4pm @ihub if possible, but one issue, it will have to be formated, since you may have an APT running, and i wouldn't know. About the diagram, it will be released on 30th to the public, since we don't want pre-hacking attempts until the infrastructure is fully set. Thankx, ./Chucks On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
On Wed, Apr 13, 2011 at 10:51, Gichuki John Chuksjonia <chuksjonia@gmail.com
wrote:
Hi Kictanet members, Skunkworks, and Security members, kindly when replying, do not reply to all, but to your respective mailist, unless your are registered to all.
Now, the dates for the belated Hackbattle2010 have been set, as from 25th to 29th of April and 30th will be the presentation dates. We will have hackbattle 2011 at the end of the year.
The scenario will be two servers Natted to an FW on public IPs, and two workstations behind the DMZ. The registered guys will have to hack their way into the network, and collected files, they will be asked with the right MD5 checksums. The first collector of all checksums, from both servers and one workstation, will be the winner of the contest.
Chuks,
This is very interesting.
Could you please attach a network diagram of the scenario?
Can I bring along my workstation to be put as one of those in the DMZ?
-- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!
-- -- Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P I.T Security Analyst and Penetration Tester jgichuki at inbox d0t com {FORUM}http://lists.my.co.ke/pipermail/security/ http://chuksjonia.blogspot.com/

Chucks, What is an APT? :-) I have nothing sinister running on the computer. It's just a workstation running FreeBSD, which I use as pre-deployment App testing platform. Well, if you insist on it being formatted (after the hackers are done with it) then let me see if I can duplicate the disk first before giving I bring it. On Wed, Apr 13, 2011 at 18:44, Gichuki John Chuksjonia <chuksjonia@gmail.com
wrote:
The workstations, are welcome, we can meet morrow after 4pm @ihub if possible, but one issue, it will have to be formated, since you may have an APT running, and i wouldn't know.
About the diagram, it will be released on 30th to the public, since we don't want pre-hacking attempts until the infrastructure is fully set.
Thankx,
./Chucks
On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
On Wed, Apr 13, 2011 at 10:51, Gichuki John Chuksjonia < chuksjonia@gmail.com
wrote:
Hi Kictanet members, Skunkworks, and Security members, kindly when replying, do not reply to all, but to your respective mailist, unless your are registered to all.
Now, the dates for the belated Hackbattle2010 have been set, as from 25th to 29th of April and 30th will be the presentation dates. We will have hackbattle 2011 at the end of the year.
The scenario will be two servers Natted to an FW on public IPs, and two workstations behind the DMZ. The registered guys will have to hack their way into the network, and collected files, they will be asked with the right MD5 checksums. The first collector of all checksums, from both servers and one workstation, will be the winner of the contest.
Chuks,
This is very interesting.
Could you please attach a network diagram of the scenario?
Can I bring along my workstation to be put as one of those in the DMZ?
-- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!
-- -- Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P I.T Security Analyst and Penetration Tester jgichuki at inbox d0t com
{FORUM}http://lists.my.co.ke/pipermail/security/ http://chuksjonia.blogspot.com/ _______________________________________________ Skunkworks mailing list Skunkworks@lists.my.co.ke http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks ------------ Skunkworks Rules http://my.co.ke/phpbb/viewtopic.php?f=24&t=94 ------------ Other services @ http://my.co.ke
-- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!

APT is new hacking Methodology designed to bypass filters, proxies and FW to internal network infiltration. APT stands for Advanced Persistent Threat. ./Chucks On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
Chucks,
What is an APT? :-)
I have nothing sinister running on the computer. It's just a workstation running FreeBSD, which I use as pre-deployment App testing platform.
Well, if you insist on it being formatted (after the hackers are done with it) then let me see if I can duplicate the disk first before giving I bring it.
On Wed, Apr 13, 2011 at 18:44, Gichuki John Chuksjonia <chuksjonia@gmail.com
wrote:
The workstations, are welcome, we can meet morrow after 4pm @ihub if possible, but one issue, it will have to be formated, since you may have an APT running, and i wouldn't know.
About the diagram, it will be released on 30th to the public, since we don't want pre-hacking attempts until the infrastructure is fully set.
Thankx,
./Chucks
On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
On Wed, Apr 13, 2011 at 10:51, Gichuki John Chuksjonia < chuksjonia@gmail.com
wrote:
Hi Kictanet members, Skunkworks, and Security members, kindly when replying, do not reply to all, but to your respective mailist, unless your are registered to all.
Now, the dates for the belated Hackbattle2010 have been set, as from 25th to 29th of April and 30th will be the presentation dates. We will have hackbattle 2011 at the end of the year.
The scenario will be two servers Natted to an FW on public IPs, and two workstations behind the DMZ. The registered guys will have to hack their way into the network, and collected files, they will be asked with the right MD5 checksums. The first collector of all checksums, from both servers and one workstation, will be the winner of the contest.
Chuks,
This is very interesting.
Could you please attach a network diagram of the scenario?
Can I bring along my workstation to be put as one of those in the DMZ?
-- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!
-- -- Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P I.T Security Analyst and Penetration Tester jgichuki at inbox d0t com
{FORUM}http://lists.my.co.ke/pipermail/security/ http://chuksjonia.blogspot.com/ _______________________________________________ Skunkworks mailing list Skunkworks@lists.my.co.ke http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks ------------ Skunkworks Rules http://my.co.ke/phpbb/viewtopic.php?f=24&t=94 ------------ Other services @ http://my.co.ke
-- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!
-- -- Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P I.T Security Analyst and Penetration Tester jgichuki at inbox d0t com {FORUM}http://lists.my.co.ke/pipermail/security/ http://chuksjonia.blogspot.com/

I was thinking in terms of an Apartment (APT) :-) I am not a hacker, and I don't think I ever will be one, so no reason to fear my box. I just wanted to get to feel the thrill of someone breaking into it. On Wed, Apr 13, 2011 at 19:06, Gichuki John Chuksjonia <chuksjonia@gmail.com
wrote:
APT is new hacking Methodology designed to bypass filters, proxies and FW to internal network infiltration. APT stands for Advanced Persistent Threat.
./Chucks
On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
Chucks,
What is an APT? :-)
I have nothing sinister running on the computer. It's just a workstation running FreeBSD, which I use as pre-deployment App testing platform.
Well, if you insist on it being formatted (after the hackers are done with it) then let me see if I can duplicate the disk first before giving I bring it.
On Wed, Apr 13, 2011 at 18:44, Gichuki John Chuksjonia < chuksjonia@gmail.com
wrote:
The workstations, are welcome, we can meet morrow after 4pm @ihub if possible, but one issue, it will have to be formated, since you may have an APT running, and i wouldn't know.
About the diagram, it will be released on 30th to the public, since we don't want pre-hacking attempts until the infrastructure is fully set.
Thankx,
./Chucks
On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
On Wed, Apr 13, 2011 at 10:51, Gichuki John Chuksjonia < chuksjonia@gmail.com
wrote:
Hi Kictanet members, Skunkworks, and Security members, kindly when replying, do not reply to all, but to your respective mailist, unless your are registered to all.
Now, the dates for the belated Hackbattle2010 have been set, as from 25th to 29th of April and 30th will be the presentation dates. We will have hackbattle 2011 at the end of the year.
The scenario will be two servers Natted to an FW on public IPs, and two workstations behind the DMZ. The registered guys will have to hack their way into the network, and collected files, they will be asked with the right MD5 checksums. The first collector of all checksums, from both servers and one workstation, will be the winner of the contest.
Chuks,
This is very interesting.
Could you please attach a network diagram of the scenario?
Can I bring along my workstation to be put as one of those in the DMZ?
-- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!
-- -- Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P I.T Security Analyst and Penetration Tester jgichuki at inbox d0t com
{FORUM}http://lists.my.co.ke/pipermail/security/ http://chuksjonia.blogspot.com/ _______________________________________________ Skunkworks mailing list Skunkworks@lists.my.co.ke http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks ------------ Skunkworks Rules http://my.co.ke/phpbb/viewtopic.php?f=24&t=94 ------------ Other services @ http://my.co.ke
-- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!
-- -- Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P I.T Security Analyst and Penetration Tester jgichuki at inbox d0t com
{FORUM}http://lists.my.co.ke/pipermail/security/ http://chuksjonia.blogspot.com/
-- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!

hehehe, We are still looking for good servers/workstations, if you can offer one, will be all good. Thanx On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
I was thinking in terms of an Apartment (APT) :-)
I am not a hacker, and I don't think I ever will be one, so no reason to fear my box. I just wanted to get to feel the thrill of someone breaking into it.
On Wed, Apr 13, 2011 at 19:06, Gichuki John Chuksjonia <chuksjonia@gmail.com
wrote:
APT is new hacking Methodology designed to bypass filters, proxies and FW to internal network infiltration. APT stands for Advanced Persistent Threat.
./Chucks
On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
Chucks,
What is an APT? :-)
I have nothing sinister running on the computer. It's just a workstation running FreeBSD, which I use as pre-deployment App testing platform.
Well, if you insist on it being formatted (after the hackers are done with it) then let me see if I can duplicate the disk first before giving I bring it.
On Wed, Apr 13, 2011 at 18:44, Gichuki John Chuksjonia < chuksjonia@gmail.com
wrote:
The workstations, are welcome, we can meet morrow after 4pm @ihub if possible, but one issue, it will have to be formated, since you may have an APT running, and i wouldn't know.
About the diagram, it will be released on 30th to the public, since we don't want pre-hacking attempts until the infrastructure is fully set.
Thankx,
./Chucks
On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
On Wed, Apr 13, 2011 at 10:51, Gichuki John Chuksjonia < chuksjonia@gmail.com
wrote:
Hi Kictanet members, Skunkworks, and Security members, kindly when replying, do not reply to all, but to your respective mailist, unless your are registered to all.
Now, the dates for the belated Hackbattle2010 have been set, as from 25th to 29th of April and 30th will be the presentation dates. We will have hackbattle 2011 at the end of the year.
The scenario will be two servers Natted to an FW on public IPs, and two workstations behind the DMZ. The registered guys will have to hack their way into the network, and collected files, they will be asked with the right MD5 checksums. The first collector of all checksums, from both servers and one workstation, will be the winner of the contest.
Chuks,
This is very interesting.
Could you please attach a network diagram of the scenario?
Can I bring along my workstation to be put as one of those in the DMZ?
-- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!
-- -- Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P I.T Security Analyst and Penetration Tester jgichuki at inbox d0t com
{FORUM}http://lists.my.co.ke/pipermail/security/ http://chuksjonia.blogspot.com/ _______________________________________________ Skunkworks mailing list Skunkworks@lists.my.co.ke http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks ------------ Skunkworks Rules http://my.co.ke/phpbb/viewtopic.php?f=24&t=94 ------------ Other services @ http://my.co.ke
-- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!
-- -- Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P I.T Security Analyst and Penetration Tester jgichuki at inbox d0t com
{FORUM}http://lists.my.co.ke/pipermail/security/ http://chuksjonia.blogspot.com/
-- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!
-- -- Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P I.T Security Analyst and Penetration Tester jgichuki at inbox d0t com {FORUM}http://lists.my.co.ke/pipermail/security/ http://chuksjonia.blogspot.com/

My workstation is an HP with Core 2 Duo, 2.80GHz, 8GB RAM. Runs FreeBSD. I also have a Dell Studio Hybrid 140g with Core 2 Duo, 2.1 GHz, 4GB RAM. Runs Win 7 Pro 64-bit. I can offer one or both for the session, no problem, but I don't want them formatted. I am assuming the session is just 1 day, so I can get back my babies immediately after. If that is a deal, let me know. We can discuss. On Wed, Apr 13, 2011 at 19:13, Gichuki John Chuksjonia <chuksjonia@gmail.com
wrote:
hehehe, We are still looking for good servers/workstations, if you can offer one, will be all good.
Thanx
On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
I was thinking in terms of an Apartment (APT) :-)
I am not a hacker, and I don't think I ever will be one, so no reason to fear my box. I just wanted to get to feel the thrill of someone breaking into it.
On Wed, Apr 13, 2011 at 19:06, Gichuki John Chuksjonia < chuksjonia@gmail.com
wrote:
APT is new hacking Methodology designed to bypass filters, proxies and FW to internal network infiltration. APT stands for Advanced Persistent Threat.
./Chucks
On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
Chucks,
What is an APT? :-)
I have nothing sinister running on the computer. It's just a workstation running FreeBSD, which I use as pre-deployment App testing platform.
Well, if you insist on it being formatted (after the hackers are done with it) then let me see if I can duplicate the disk first before giving I bring it.
On Wed, Apr 13, 2011 at 18:44, Gichuki John Chuksjonia < chuksjonia@gmail.com
wrote:
The workstations, are welcome, we can meet morrow after 4pm @ihub if possible, but one issue, it will have to be formated, since you may have an APT running, and i wouldn't know.
About the diagram, it will be released on 30th to the public, since we don't want pre-hacking attempts until the infrastructure is fully set.
Thankx,
./Chucks
On 4/13/11, Odhiambo Washington <odhiambo@gmail.com> wrote:
On Wed, Apr 13, 2011 at 10:51, Gichuki John Chuksjonia < chuksjonia@gmail.com > wrote:
> Hi Kictanet members, Skunkworks, and Security members, kindly when > replying, do not reply to all, but to your respective mailist, > unless > your are registered to all. > > Now, the dates for the belated Hackbattle2010 have been set, as from 25th > to 29th of April and 30th will be the presentation dates. We will > have hackbattle 2011 at the end of the year. > > The scenario will be two servers Natted to an FW on public IPs, and two > workstations behind the DMZ. The registered guys will have to hack > their way into the network, and collected files, they will be asked > with > the right MD5 checksums. The first collector of all checksums, > from both servers and one workstation, will be the winner of the contest. > > Chuks,
This is very interesting.
Could you please attach a network diagram of the scenario?
Can I bring along my workstation to be put as one of those in the DMZ?
-- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!
-- -- Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P I.T Security Analyst and Penetration Tester jgichuki at inbox d0t com
{FORUM}http://lists.my.co.ke/pipermail/security/ http://chuksjonia.blogspot.com/ _______________________________________________ Skunkworks mailing list Skunkworks@lists.my.co.ke http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks ------------ Skunkworks Rules http://my.co.ke/phpbb/viewtopic.php?f=24&t=94 ------------ Other services @ http://my.co.ke
-- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!
-- -- Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P I.T Security Analyst and Penetration Tester jgichuki at inbox d0t com
{FORUM}http://lists.my.co.ke/pipermail/security/ http://chuksjonia.blogspot.com/
-- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!
-- -- Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P I.T Security Analyst and Penetration Tester jgichuki at inbox d0t com
{FORUM}http://lists.my.co.ke/pipermail/security/ http://chuksjonia.blogspot.com/ _______________________________________________ Skunkworks mailing list Skunkworks@lists.my.co.ke http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks ------------ Skunkworks Rules http://my.co.ke/phpbb/viewtopic.php?f=24&t=94 ------------ Other services @ http://my.co.ke
-- Best regards, Odhiambo WASHINGTON, Nairobi,KE +254733744121/+254722743223 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Damn!!
participants (2)
-
Gichuki John Chuksjonia
-
Odhiambo Washington