Warning

 

Close

Confirm Action

Are you sure you wish to do this?

Confirm Cancel
BCM
User Panel

Site Notices
Arrow Left Previous Page
Page / 2
Posted: 10/18/2004 9:04:13 PM EDT
Lets see whatchya got
Hack test
Link Posted: 10/18/2004 9:12:11 PM EDT
[#1]

Quoted:
Lets see whatchya got
Hack test



I think this is to much geek for this place.. try offering at http://www.slashdot.org

Link Posted: 10/18/2004 9:14:05 PM EDT
[#2]
Link Posted: 10/18/2004 9:14:40 PM EDT
[#3]
Link Posted: 10/18/2004 9:23:07 PM EDT
[#4]

Quoted:
Hmmmm, yes, everyone identify themselves as a hacker.





Ummm...Its a game. The entire point of it is to get to hack your way to the last level.

Introduction

On this website you have the opportunity to improve your knowledge about internet security LEGALLY. For instance simple JavaScript is unsuitable for protecting your homepage against unauthorized access.
ISATCIS will clarify it within a learning process which is based on tactical over- coming of 16 security levels where the inserted security bugs should be applied.
Link Posted: 10/18/2004 9:26:39 PM EDT
[#5]

Quoted:

Quoted:
Lets see whatchya got
Hack test



I think this is to much geek for this place.. try offering at http://www.slashdot.org




I know, its just for my own satisfaction. Its funny to watch people make fun of the name 007, and yet stare at that website for hours on end trying to figure out Level 1.
Link Posted: 10/18/2004 9:28:01 PM EDT
[#6]
This class deals with parsing and interpreter state (the user's namespace); it does not deal with input buffering or prompting or input file naming (the filename is always passed in explicitly). The optional locals argument specifies the dictionary in which code will be executed; it defaults to a newly created dictionary with key '__name__' set to '__console__' and key '__doc__' set to None.

How about something challenging?

Link Posted: 10/18/2004 9:31:45 PM EDT
[#7]

Quoted:
This class deals with parsing and interpreter state (the user's namespace); it does not deal with input buffering or prompting or input file naming (the filename is always passed in explicitly). The optional locals argument specifies the dictionary in which code will be executed; it defaults to a newly created dictionary with key '__name__' set to '__console__' and key '__doc__' set to None.

How about something challenging?




and this is when I realise my geek is weak.
Link Posted: 10/18/2004 9:31:47 PM EDT
[#8]
Guess my real IP address, 20 bucks if you get it right.
Link Posted: 10/18/2004 9:35:31 PM EDT
[#9]
127.25.69.4?

255.255.255.255?

0.0.0.0?

10.10.10.10?

699.548.1156.3365?

wait... you using the fancy ip7

:::::000:00:00:000:1

this ain't no place for 'puter tawk.

I feel a ban coming on.
Link Posted: 10/18/2004 9:42:06 PM EDT
[#10]
That was a hijack wasn't it? Apologies to the OP.
And no, you didn't guess right.
Link Posted: 10/18/2004 9:46:19 PM EDT
[#11]

Quoted:
That was a hijack wasn't it? Apologies to the OP.
And no, you didn't guess right.



For $150, I'll post satellite imagery of your neighborhood.  
Link Posted: 10/18/2004 9:48:18 PM EDT
[#12]
I'll pass....red v blue type competitions are much more fun and you learn a hell of a lot more.

Setting up true honeypots can also be entertaining
Link Posted: 10/18/2004 9:48:28 PM EDT
[#13]

Quoted:
Lets see whatchya got
Hack test



Wait until you get your next credit card statement, my hackfu is strong!  
Link Posted: 10/18/2004 9:51:10 PM EDT
[#14]
I got through level one. I don't care enough to learn how to do the rest though. It doesn't seem that difficult though since Level 16 has been done over 11000 times.
tony

Edit: Got through level 2 also. I don't even know where to start with 3 though.
Link Posted: 10/18/2004 9:53:07 PM EDT
[#15]
Well most of us are hackers here well when drinking !

Do you hack when not smoking or drinking?

Bob
Link Posted: 10/18/2004 9:56:50 PM EDT
[#16]
got passed level 1, spent a minute trying to get passed level 2 then got bored. Don't you have a link to a shoot 'em up game? they are usually fun
Link Posted: 10/18/2004 9:58:56 PM EDT
[#17]

Quoted:
Lets see whatchya got
Hack test



I got past level one (my first thought was to look at the source - the hint confirmed it for me ) ...any hints on level two? I am not a "hacker" as you can see, but it has always interested me. I like the idea of doing it (and not getting in trouble) like this page does.

Any good links to newbie friendly tutorials on how to figure this stuff out?
Link Posted: 10/18/2004 10:02:45 PM EDT
[#18]
All electronics things can be controlled without conventional hacking.



MT
Link Posted: 10/18/2004 10:03:03 PM EDT
[#19]
Level 2 is in the source code as well. Just look around for something titled M1=

I can't find level 3. I know the code =d1 but I can't find where it is defined. I think some of the harder levels need HAX0R tools.
Link Posted: 10/18/2004 10:08:45 PM EDT
[#20]
got to level 10 after about 15 min. then i got bored with it. i think ive run into similar things before. i prefer buffer overflows, social engineering, and the like. i do this for a semi living

javascript is not a security model!

-foxxz
Link Posted: 10/18/2004 10:10:05 PM EDT
[#21]

Quoted:
got to level 10 after about 15 min. then i got bored with it. i think ive run into similar things before. i prefer buffer overflows, social engineering, and the like. i do this for a semi living

javascript is not a security model!

-foxxz



Care to post a walkthrough?
Link Posted: 10/18/2004 10:17:00 PM EDT
[#22]
SPOILER!!!
level 1 passwd is "easy"
level 2 passwd is "JavaScript"
level 3 passwd is "#235711"
level 4 passwd is "CODEZ"
level 5 passwd is "1234"
level 6 passwd is "badscript"
level 7 passwd is "commander"
level 8 passwd is "login"
level 9 passwd is "hannover"
level 10 passwd is "24*45*32+56-54/842*5623+4567"

then i got bored. i did a quick backtrace. if these dont work ill try to correct my errors. alot of this is looking at the source code, downloading the files without rendering them in a browser. and knowing a programming language. doesnt have to be java.


-foxxz
Link Posted: 10/19/2004 1:14:31 AM EDT
[#23]
Ok, I understand how you got the first 3, by scrutinizing the source code, but I have zero h@xx0r skillz and dont know how to do the rest.   It has been a few years since I programmed, and that was little things in C.  Hell, I dont even know how to reverse engineer stuff to get the code, and I have the tip-top programming suite before all that .NET shit came out, Visual Studio 6.0 Enterprise edition.


How exactly does one learn how to hack?  If the answer is in violation of the CoC, please tell me so I dont attempt to violate it again.
Link Posted: 10/19/2004 2:11:42 AM EDT
[#24]

Quoted:

Quoted:
Lets see whatchya got
Hack test



I got past level one (my first thought was to look at the source - the hint confirmed it for me ) ...any hints on level two? I am not a "hacker" as you can see, but it has always interested me. I like the idea of doing it (and not getting in trouble) like this page does.

Any good links to newbie friendly tutorials on how to figure this stuff out?



The first few levels you just look at the code, the next few you have to start downloading the files and such, one level has a link to the next level. I cant remember all of them, I actually hadnt seen the page in about a year but it surfaced in another forum.
Link Posted: 10/19/2004 2:17:16 AM EDT
[#25]
Heres something of a walk through for those really interested. Its a bit of a read, but there are some answers in there.
Link Posted: 10/19/2004 7:17:46 AM EDT
[#26]
I got up to Level 14 without much trouble, and I'm 99% sure I can do level 14, but it'll have to wait until I have more free time. Honestly, it's too complicated to reasonably do it by hand on paper - I'll probably have to write some sort of program to do Level 14.

Some of the things they expect you to do are a little out there - decompile a java class, understand how HTTP works, etc.  The one that will stump a lot of people is the one where the script file, when you put the address into your browser comes back without any code in it at all. There are a few ways to get around it, but packet capture was the way I did.

The first few levels are pretty easy to most anyone that's done a fair amount of web coding, but the upper level ones start to get a little bit more involved. And while I'm not an expert, I am working on my Master's in IT (I have a BS IT already), so I feel somewhat qualified to comment on the "difficulty" of this stuff.
Link Posted: 10/19/2004 7:58:25 AM EDT
[#27]
My name is Stanley Jobson and I hacked into the CIA while getting a blowjob and under the pressure of having a gun to my head. Am I good or what?
Link Posted: 10/19/2004 8:05:20 AM EDT
[#28]
I am
Link Posted: 10/19/2004 8:47:34 AM EDT
[#29]
Please don't call this crap hacking

This is script kiddie baby stuff
Link Posted: 10/19/2004 11:14:07 AM EDT
[#30]

This is script kiddie baby stuff


+1

-foxxz
Link Posted: 10/19/2004 12:36:00 PM EDT
[#31]
Well then care to show me what isnt?  I've always been interested in this stuff but have never been able to find info on it...
Link Posted: 10/19/2004 12:49:12 PM EDT
[#32]
To a certain extent, all "hacking" is script kiddie stuff, once people start using exploits to gain access. I mean, it really does not take a genius to even write your own code to gain access to or DoS a particular computer system if that system is, say, running unpatched software for which exploits have already been identified.

Sadly enough, network "hacking" (gaining access to a remote machine or DoS) does not require a whole lot of brains to break into - most security holes are a result of poor administration or system design, and not really be attributed to the "skill" of the individual trying to break in or shut it down. A well locked down and current system, however, will keep 99% of people out, with the caveat that one cannot secure a system against an unknown method of attack or unidentified flaws in the system.  As a result, you can never have 100% security, but the 0.1% of "hackers" that are going to be able to find a new hole in a secured system are going to be the real deal.

Of course, if we want to talk about malware, i.e. virii, trojans, worms, and the like, then we can start talking about genius. That's where the authors are going to have a chance to shine. Getting in to a system is much more a factor of incompetence of the admins/programmers than capabilities of the so-called hacker.
Link Posted: 10/19/2004 1:29:56 PM EDT
[#33]
Got to level 11 and I don't have time for much more.  I thought it ended at 10 for some reason!  
Link Posted: 10/19/2004 1:38:48 PM EDT
[#34]
ok ill be the first to say "i dont get it". I didnt even have to look at it that long either.
yes im lame and a poser my kung fu is weak.

how the hell is a newb supposed to figure this shit out i dont even know what source code is
Link Posted: 10/19/2004 1:42:08 PM EDT
[#35]

Quoted:

Quoted:
That was a hijack wasn't it? Apologies to the OP.
And no, you didn't guess right.



For $150, I'll post satellite imagery of your neighborhood.  



Me too....

terraserver.msn.com.....but I'll do it for $75
Link Posted: 10/19/2004 1:59:53 PM EDT
[#36]

Quoted:
Guess my real IP address, 20 bucks if you get it right.



127.0.0.1

Now give me 20$


Please don't call this crap hacking

This is script kiddie baby stuff



I agree, this isnt hacking.

P.S. Hacking is not a bad thing, its Cracking (actually destroying things thats bad). Hacking isnt destroying data like most think it is.
Link Posted: 10/19/2004 5:58:57 PM EDT
[#37]

Quoted:
127.0.0.1

Now give me 20$



Nice try. No cigar.

Link Posted: 10/19/2004 6:02:05 PM EDT
[#38]
All you need is a good combo dialer and your in. Simplest thing in the world.
Link Posted: 10/19/2004 6:26:05 PM EDT
[#39]

Quoted:

Quoted:
127.0.0.1

Now give me 20$



Nice try. No cigar.




... Your IP HAS to be 127.0.0.1 otherwise you cant communicate with your own computer. Its called your local host and it IS your IP.
Link Posted: 10/19/2004 6:27:22 PM EDT
[#40]
go ahead and ping it or Traceroute it. it is your ip.
Link Posted: 10/19/2004 6:29:05 PM EDT
[#41]

Quoted:
... Your IP HAS to be 127.0.0.1 otherwise you cant communicate with your own computer. Its called your local host and it IS your IP.

go ahead and ping it or Traceroute it. it is your ip.



For what it's worth, it is possible to run your computer without a loopback device.

So try not to sound so smarmy
Link Posted: 10/19/2004 6:31:39 PM EDT
[#42]
Loopbacks don't count, and they don't have to be 127.0.0.1

I do have a Swisher Sweet if you'd like to chew on that for awhile...
Link Posted: 10/19/2004 6:32:32 PM EDT
[#43]
NERDS!!!!!!
Link Posted: 10/19/2004 6:43:12 PM EDT
[#44]

Quoted:

For what it's worth, it is possible to run your computer without a loopback device.

So try not to sound so smarmy



My guess is he is running windows since he didnt know about localhost, so there for he has 127.0.0.1 which every windows computer has. Also what IP stack can run without a loopback?


Loopbacks don't count, and they don't have to be 127.0.0.1


well word the question better

I really need that 20$ being poor in college sucks

(P.S. localhost has to be 127.0.0.1 since it is the dedicated IP from the IEEE standered and anything else could interfere with normal communications, clusters not withstanding)
Link Posted: 10/19/2004 7:03:32 PM EDT
[#45]

Quoted:
Loopbacks don't count, and they don't have to be 198.239.145.233

I do have a Swisher Sweet if you'd like to chew on that for awhile...



http://techmall.dis.wa.gov/borders/images/bandistechmall2.jpg

Railgun....
Link Posted: 10/19/2004 7:17:28 PM EDT
[#46]

Quoted:
My guess is he is running windows since he didnt know about localhost, so there for he has 127.0.0.1 which every windows computer has. Also what IP stack can run without a loopback?


Loopbacks don't count, and they don't have to be 127.0.0.1


well word the question better

I really need that 20$ being poor in college sucks

(P.S. localhost has to be 127.0.0.1 since it is the dedicated IP from the IEEE standered and anything else could interfere with normal communications, clusters not withstanding)



Actually, XP supports 127.0.0.2 as well. Most everyone has a loopback, it's how you can talk to yourself, eg. how applications can open sockets with themselves or other apps on the same local system. It should have been obvious that wasn't the IP I was looking for in my little challenge.
Someone already figured out the IP of my proxy, so he gets a cigar. The IP of my modem remains undiscovered though.
Link Posted: 10/19/2004 7:23:00 PM EDT
[#47]

Quoted:

Quoted:
My guess is he is running windows since he didnt know about localhost, so there for he has 127.0.0.1 which every windows computer has. Also what IP stack can run without a loopback?


Loopbacks don't count, and they don't have to be 198.239.145.233


well word the question better

I really need that 20$ being poor in college sucks

(P.S. localhost has to be 127.0.0.1 since it is the dedicated IP from the IEEE standered and anything else could interfere with normal communications, clusters not withstanding)



Actually, XP supports 127.0.0.2 as well. Most everyone has a loopback, it's how you can talk to yourself, eg. how applications can open sockets with themselves or other apps on the same local system. It should have been obvious that wasn't the IP I was looking for in my little challenge.
Someone already figured out the IP of my proxy, so he gets a cigar. The IP of my modem remains undiscovered though.



Railgun....


Link Posted: 10/19/2004 7:38:10 PM EDT
[#48]

Quoted:

Quoted:
Loopbacks don't count, and they don't have to be 198.239.145.233



Railgun....





Well, I'm insulted that you'd imply my computer belongs to the State of Washington
Link Posted: 10/19/2004 7:40:08 PM EDT
[#49]

Quoted:
Heres something of a walk through for those really interested. Its a bit of a read, but there are some answers in there.



Thanks
Link Posted: 10/19/2004 7:43:46 PM EDT
[#50]

Quoted:

Quoted:

Quoted:
Loopbacks don't count, and they don't have to be 198.239.145.233



Railgun....





Well, I'm insulted that you'd imply my computer belongs to the State of Washington



This sort of stuff is on any good firewall, just because that IP is indeed .gov doesn't mean I will penetrate the system. Why?

This isn't something wise to do in this day and age.

But I can.

Railgun....
Arrow Left Previous Page
Page / 2
Close Join Our Mail List to Stay Up To Date! Win a FREE Membership!

Sign up for the ARFCOM weekly newsletter and be entered to win a free ARFCOM membership. One new winner* is announced every week!

You will receive an email every Friday morning featuring the latest chatter from the hottest topics, breaking news surrounding legislation, as well as exclusive deals only available to ARFCOM email subscribers.


By signing up you agree to our User Agreement. *Must have a registered ARFCOM account to win.
Top Top