Hey guys. I have a server that is owned by me and can confirm through servint that it is owned by me. I would like to do a penetration test and of course to allow you to upload files on the server and kind of trash it to the point where it is always restarting and running out of memory etc etc. This is going to be mainly script kiddie stuff, however will be able to get you hired on with me for some other jobs that are invovlving network security evaluations. Here is the server info Cpanel and WHM running on CentOS hostname level1.ixkt.net IP addresses 64..131.81.30 64.131.81.31 64.131.81.32 64.131.81.30 SSH Port is on 3734 -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.centos.org/pipermail/centos/attachments/20091016/42772520/attachment-0002.html>
On Fri, Oct 16, 2009 at 10:39 PM, DTS-Corp (Knowledgebase) <mlists_subs at dts-int.com> wrote:> Hey guys. > > I have a server that is owned by me and can confirm through servint that it > is owned by me. > > I would like to do a penetration test and of course to allow you to upload > files on the server and kind of trash it to the point where it is always > restarting and running out of memory etc etc. > > This is going to be mainly script kiddie stuff, however will be able to get > you hired on with me for some other jobs that are invovlving network > security evaluations. > > Here is the server info > Cpanel and WHM running on CentOS > > hostname level1.ixkt.net > IP addresses 64..131.81.30 > 64.131.81.31 > 64.131.81.32 > 64.131.81.30 > > SSH Port is on 3734 >A word of advice to both sender and readers.. do not follow up on this. 1) Penetration tests to have some value must show what was done and what was not done. They must show what steps were taken to reach zero. And then they must be evaluated to see if those steps could have been mitigated. A call for all hackers does not usually get that. 2) Network penetrations need to be done to make sure that you do not violate your SLA with your network provider or cause problems with other customers on that network. It also may violate various laws and statutes of where the co-location is at. 3) While "To catch a thief" is a nice movie.. you are probably not going to run into a Cary Grant type. It is more like you are going to down to a seedy bar in the docks and yelling out "Hey I need someone to rob my house to see if the security system I bought works, and I have a bunch of money on me to pay you." 4) It has become a common ploy to get people to attack another person's network by registering that they 'own' the space etc. Everyone from Russian gangs to local police use it at one point or another. Professional security people who aren't looking to spend time in prison will make sure that there is a legitimate contract in place and that the client is aware of the various risks involved. -- Stephen J Smoogen. Ah, but a man's reach should exceed his grasp. Or what's a heaven for? -- Robert Browning
Hello, I recommend you use Nessus from Tenable Network Security to scan these hosts and your internal network. Nessus is top of the line in vulnerability scanning. Best regards, Bazy On Sat, Oct 17, 2009 at 7:39 AM, DTS-Corp (Knowledgebase) <mlists_subs at dts-int.com> wrote:> Hey guys. > > I have a server that is owned by me and can confirm through servint that it > is owned by me. > > I would like to do a penetration test and of course to allow you to upload > files on the server and kind of trash it to the point where it is always > restarting and running out of memory etc etc. > > This is going to be mainly script kiddie stuff, however will be able to get > you hired on with me for some other jobs that are invovlving network > security evaluations. > > Here is the server info > Cpanel and WHM running on CentOS > > hostname level1.ixkt.net > IP addresses 64..131.81.30 > 64.131.81.31 > 64.131.81.32 > 64.131.81.30 > > SSH Port is on 3734 > > _______________________________________________ > CentOS mailing list > CentOS at centos.org > http://lists.centos.org/mailman/listinfo/centos > >
I want to learn to hack what do I need to do in order to start.> Date: Sun, 18 Oct 2009 01:24:16 +0300 > From: bazy84 at gmail.com > To: centos at centos.org > Subject: Re: [CentOS] Calling all Hackers > > Hello, > > I recommend you use Nessus from Tenable Network Security to scan these > hosts and your internal network. Nessus is top of the line in > vulnerability scanning. > > Best regards, > Bazy > > On Sat, Oct 17, 2009 at 7:39 AM, DTS-Corp (Knowledgebase) > <mlists_subs at dts-int.com> wrote: > > Hey guys. > > > > I have a server that is owned by me and can confirm through servint that it > > is owned by me. > > > > I would like to do a penetration test and of course to allow you to upload > > files on the server and kind of trash it to the point where it is always > > restarting and running out of memory etc etc. > > > > This is going to be mainly script kiddie stuff, however will be able to get > > you hired on with me for some other jobs that are invovlving network > > security evaluations. > > > > Here is the server info > > Cpanel and WHM running on CentOS > > > > hostname level1.ixkt.net > > IP addresses 64..131.81.30 > > 64.131.81.31 > > 64.131.81.32 > > 64.131.81.30 > > > > SSH Port is on 3734 > > > > _______________________________________________ > > CentOS mailing list > > CentOS at centos.org > > http://lists.centos.org/mailman/listinfo/centos > > > > > _______________________________________________ > CentOS mailing list > CentOS at centos.org > http://lists.centos.org/mailman/listinfo/centos_________________________________________________________________ Hotmail: Trusted email with powerful SPAM protection. http://clk.atdmt.com/GBL/go/177141665/direct/01/ -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.centos.org/pipermail/centos/attachments/20091017/804e3b0a/attachment-0002.html>
If you want to learn how to crack into a system, set up your network with at least two machines, one being the target. -- War is a failure of the imagination. --William Blake On 10/17/2009 06:49 PM Stan Reader wrote:> I want to learn to hack what do I need to do in order to start. > >> Date: Sun, 18 Oct 2009 01:24:16 +0300 >> From: bazy84 at gmail.com >> To: centos at centos.org >> Subject: Re: [CentOS] Calling all Hackers >> >> Hello, >> >> I recommend you use Nessus from Tenable Network Security to scan these >> hosts and your internal network. Nessus is top of the line in >> vulnerability scanning. >> >> Best regards, >> Bazy >> >> On Sat, Oct 17, 2009 at 7:39 AM, DTS-Corp (Knowledgebase) >> <mlists_subs at dts-int.com> wrote: >> > Hey guys. >> > >> > I have a server that is owned by me and can confirm through servint > that it >> > is owned by me. >> > >> > I would like to do a penetration test and of course to allow you to > upload >> > files on the server and kind of trash it to the point where it is always >> > restarting and running out of memory etc etc. >> > >> > This is going to be mainly script kiddie stuff, however will be able > to get >> > you hired on with me for some other jobs that are invovlving network >> > security evaluations. >> > >> > Here is the server info >> > Cpanel and WHM running on CentOS >> > >> > hostname level1.ixkt.net >> > IP addresses 64..131.81.30 >> > 64.131.81.31 >> > 64.131.81.32 >> > 64.131.81.30 >> > >> > SSH Port is on 3734 >> > >> > _______________________________________________ >> > CentOS mailing list >> > CentOS at centos.org >> > http://lists.centos.org/mailman/listinfo/centos >> > >> > >> _______________________________________________ >> CentOS mailing list >> CentOS at centos.org >> http://lists.centos.org/mailman/listinfo/centos > > ------------------------------------------------------------------------ > Hotmail: Trusted email with powerful SPAM protection. Sign up now. > <http://clk.atdmt.com/GBL/go/177141665/direct/01/> > > > ------------------------------------------------------------------------ > > _______________________________________________ > CentOS mailing list > CentOS at centos.org > http://lists.centos.org/mailman/listinfo/centos