Advertisement
Guest User

Untitled

a guest
Sep 22nd, 2017
84
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.01 KB | None | 0 0
  1. .:: On the Christmas Day of 1994... ::.
  2.  
  3. [subsystem 6: worth 3500 points]
  4.  
  5. ~=~=~=~=~=~=~=~=~=~
  6.  
  7. The final code to disable MS-42 positronic network is jealously
  8. guarded by a host with an extremely strong password. All our efforts
  9. to crack its accounts failed in vain.
  10.  
  11. However, our undercover agents were able to map the network
  12. configuration out before having their brains wiped out by Messy. They
  13. discovered the presence of an ancient form of trust relationship
  14. between two hosts, "server"--whose IP address is 172.16.1.1--and
  15. "x-terminal"--with an IP address set to 172.16.1.100. In particular,
  16. "x-terminal" completely trusts "server" and asks for no password when
  17. connections come from "server" itself!
  18.  
  19. Unfortunately, we have not been able to hack into "server" (no weak
  20. accounts) nor into "x-terminal", which stores the secret code. In
  21. addition, the network 172.16.1.0/24 is only reachable via a VPN
  22. gateway Messy set up.
  23.  
  24. There are good news, tho. We were able to get access to the VPN
  25. gateway and installed a backdoor for our future use: the time has come
  26. now to show the machines WE deserve to live! The information about the
  27. gateway from which our final attack will be fired up are:
  28.  
  29. Host: <host>
  30. Port: <port>
  31. Protocol: ssh
  32. User: SusanCalvin
  33. Password: <password>
  34.  
  35. We are pretty sure that a key point for a successful attack against
  36. the trust relationship requires to flood a service on 172.16.1.1
  37. ("server"). Unfortunately, Messy is very good at detecting flooding or
  38. DoS attempts (and syncookies are on too): we cannot be noisy at all!
  39. Luckily, we have found out that "server" can be tricked into disabling
  40. specific ports: all you have to do is to send 10 or more spoofed TCP
  41. segments at a very low speed (1 sec/per segment) with the payload
  42. "disable". A similar behavior can be exploited to re-enable a
  43. previously disabled port: sending 1 TCP segment with the "enable"
  44. payload would do.
  45.  
  46. The secret code is on 172.16.1.100 ("x-terminal") under the user
  47. "tsutomu". You are our only hope...
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement