what i do?

Am an Information Risk Consultant and Penetration Tester, i specialize mostly in penetrating secure networks/computer systems where i simulate an organized professional attack against your organization, where after that a detailed report with weakness and exploited vectors are summarized. This will help you gain control over your infrastructures security and maximize your protection.

Sunday, February 19, 2012

hackbattle proofnon00b part 1, let the games begin

On the morning of 10th, Feb i.e. midnight 0000hrs, 4 participants, Kelly, Bright, Brian and Alex, got a text message below;
HACKBATTLE,  Miss Jennifer Kimari is suspected to help Drug Lords in laundering money. As far as we know she is Kenyan, she uses a server to store that data. She has a lot of birds interest which gives her unrestricted access to Caribbean border. We need full evidence and information about next shipment. Please use all tools u can gain access to, to get us that information for her arrest by 14th next week. Good luck.
By the next morning i had already received called from several guys wondering why they dint recieve the info about the battle, though they hadnt registered. I also was asked why i dint give out the IP, but this was the scenario as of the pre-hackbattle.

Several people wondered what they will need to do to finish the game, but amazingly as i started to tweet with clues, several rogue IPs started to show at the Hackbattle Infrastructure. Most of them were shooting in the dark, since they were just scanning the web pages for more information.

Now the first thing a hacker would have done is to either keenly Google with specific dorks to find Jenn or use Maltego as below:

I will be posting on part 2, for the continuation as soon as possible, keep tuned.

./Chucks

No comments: