Microsoft /asks/ "Crack this machine" 683
zealot writes "Apparently Microsoft wants people to try breaking the security on this site, which is running Win2k w/ IIS. There are some "rules" of engagement. " Basically, because it's not behind a firewall, it doesn't count to throw huge numbers of packets at it, but there are multiple users accounts-change stuff, look for hidden messages, or "get something you shouldn't have".
Re:I cant believe this (Score:1)
Every place that I've worked which runs NT uses it for more than just web hosting, it's also an FTP, mail, DNS, file server, and serveral other services as well.
In this case they're not testing the OS as it would be used in the real world. Many places can't afford the licenseing and software to split the services up on several machines.
This is not a Linux rules, MS sucks thing. I use both in my job, as well as Windows and MACs. All have their place. I'd like to know how W2K is going to standup in the real world. I don't care how many people are trying to break in at once or how many hits the server is getting, it shouldn't need a reboot, especially because the "logs are full". That should be true of any server OS. Perhaps that's just poor sys admining though, since a good admin would be setup to have those logs trimmed automatically before they got too large.
Personally I think it's just a PR thing for MS. Take a box and lock it down as tight as possible, to the point of being unusable in the real world, and see if somebody can break in. If nobody does they can say W2K is secure. If somebody does get in, they can blame it on a bug in IIS, not on W2K itself.
Re:What's this crap? Rob - limit the comment size. (Score:1)
Funny... we're still here...
The pathetic thing about all this is how clear it's becoming that NT+IIS, even in the most _relentlessly_ protected environments with a firewall cutting off everything but http, will still crash and burn in a matter of hours at the whims of teenaged script kiddies. Most of the damage wasn't done by the heavy guys. It's all the teens going, "Okay- I'll ask it for the page 'GHIGBDBWDBFJHJHWIGHFKJHbkjbKJGBihsdgifijfhfijhji
There is no joy in Redmond. Nobody won the contest according to their rules... but they surely expected a server _that_ shielded to stay _up_. And it just isn't.
Moral of the story? Don't bother trying to break MS stuff with cleverness. Just swamp it and it'll fall over...
Re:Anti-Microsoft for no good reason? (Score:1)
Are you on crack or something? Last time I checked, Mozilla was under an opensource licence.
Re:Smart move for Microsoft Excuse Me??!! (Score:1)
3:22pm - Network connections down due to router failure, possibly related to thunderstorms
and power failures in the area
2:59pm - Network connections intermittently up
12:40pm - Network connections down due to router failure
11:02am - Services restarted
10:47am - Some services failed after reboot
10:45am - Reboot because the System log was full
10:30am - Network connections down due to router failure
I uh... wouldn't post these kinds of statistics for MY server.
6:16am up 101 days, 17:50, 29 users, load average: 0.00, 0.00, 0.00
I did the installation and set up 32 days earlier than that.. but someone kicked the power plugs out.
Gee.. no re-boots... no problems.. nada... *shrug*
I cant believe this (Score:1)
All the time you moan aout microsoft opening stuff up to the community and here it is asking for your help and knowledge. Its a small step but it's still a start.
The router stuff is a bit suspicious.
Restarting the machine 'cause the log is full could be valid. If they are using the log to generate the "status" page they would need to clear it and then change it's settings so they didnt have to do it again.
Lighten up and quit the boring, tired and annoying bash/gloat stuff. As usual you continue
to shoot yourselves in the foot with these witless
remarks.
You all claim to be in this game for the good of the wider community - well doing this helps people
who (for whatever reason) are going to use win2k.
Do as you would be done by.
Status: UP? (Score:1)
No explanation (Score:1)
Average Win2kTest Uptime (Score:1)
This does not even count the router failings due to poor star and astral body alignments.
Kspett
Trick? (Score:1)
it must have been hacked (Score:1)
Re:It's back, but still no telnet. (Score:1)
Genius, have you thought that maybe none of these are open. Thats U-DP.
Re:Smart move for Microsoft (Score:1)
HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Content-Location: http://windows2000test.com/Default.htm
Date: Wed, 04 Aug 1999 05:14:37 GMT
Content-Type: text/html
Accept-Ranges: bytes
Last-Modified: Wed, 04 Aug 1999 01:58:16 GMT
ETag: "e0711dd11cdebe1:a4a"
Content-Length: 7103
Slashdot Slashdotted? (Score:1)
I invite everyone to #windows200test on EFNet (nt) (Score:1)
Re:Average Win2kTest Uptime (Score:1)
Also with all the blunders with this project and this being their best of the crop why is their stock not going down. I have been hearing a lot of press about this. Do investors take this into account or just say since it is m$ they know what they are doing. I know nothing of stocks really but if your newest and best producted was tested in the 'real' world and broke ever 14 something hours I wouldn't want to invest in it.
Well spank the cow and call me Francis! (Score:1)
Re:Down again :-) (Score:1)
Re:software firewalling?? (Score:1)
It's not as comprehensive as a "true" firewall; not all the bits in the headers are available for filtering, but the standard stuff (IP addresses, protocols, UDP/TCP ports, etc) is trapable...
Apparentlyt they haven't figgured it out yet... (Score:1)
10:45am - Reboot because the System log was full
Why did they have to reboot for that? Why do they have to reboot for anything!?!
Re:Smart move for Microsoft Excuse Me??!! (Score:1)
That also doesn't count the Icecast server (4/128kbit streams),
the active ftp site I run. Not to mention all the
folks connected to the other services I host like:
4 Mucks. 1 Mud. 1 XSW server and the quakeI
server for my lan.
I'd say that's not bad at all for a little p-100 (586)
Try running half that with M$... *sheesh*
Re:It's worse than that, it's dead Jim (Score:1)
---
"'Is not a quine' is not a quine" is a quine.
Re:javascript errors? (Score:1)
Okay kids, it's real simple, and it makes your life much easier-- us old geezers from back in the Netscape 2.x days when Java was even more broken than now have had our browsers like this for quite awhile:
Click Edit.
Click Preferences.
Click Advanced.
Turn off Java.
Turn off JavaScript.
Problem solved. Also fixes the annoying pop-ups on pr0n sites and geocities.
Now quit whining and CRACK THIS SITE!!!!
Re:Javascript Dies in Netscape (Score:1)
(Compuserve/AOL UK claims over 2 million users IIRC, Freeserve over 1 million, so it is getting harder to ignore the rest of the world and pretend the web is US only)
And (according to the comp.fonts FAQ) in the US
"scalable fonts are copyrightable" (though as in all law, this isn't necessarily absolute) True Type fonts are scalable fonts (last time I checked), but bitmapped fonts aren't (so you can use System!)
The FAQ can be seen at http://www.nwalsh.com/comp.fonts/FAQ/cf_13.htm#SE
Of course the font *name* may be a trademark (and quite often is) and as such may only be used with permission (and so couldn't be applied to someone else's font even if it looked identical), but the whole area of trademarks is a different can of worms!
The Magician
Re:Hmmm... (Score:1)
Context Reading 101 (Score:1)
No, the note does not say there is a specific "magic bullet".
Read this again, children....
"For this testing, we are intentionally not putting these machines behind a firewall. This means that you could slow these machines down by tossing millions of random packets at them if you have enough bandwidth on your end. If that happens, we will simply start filtering traffic. Instead, find the interesting "magic bullet" that will bring the machine down."
In other words "DoS attacks don't count. Perform a real security hack, not some little script kiddy prank"
Re:Anti-Microsoft for no good reason? (Score:1)
And since I feel that Linux and open source coding is the way to go because it is better and viable, then I feel I have no business supporting the wrong solution.
Microsoft is only using YOUR brain and your most dear ability (uncompensated honest help) so that they can turn around and market/ sell it on that shoddy system.
Re:No explanation (Score:1)
That problem could conceivably have been responsible for the failed user log in messages. Though I would find it astonishing that anything worked if the logon service was hosed.
On the other hand, on such a clean box, why would services fail during startup?
Re:Nonsense. (Score:1)
The contest isn't as valuable to the community as it would be if w2k was open source, but it is nevertheless valuable. Yes, by attempting to crack the site, you are helping Microsoft, but you're also helping to produce a more secure operating system. Like it or not, w2k is going to be snapped up by millions of companies, and I for one would be much happier if all those millions of companies had a secure operating system instead of the bug ridden piece of bloatware they have right now.
One of the major criticisms against Microsoft is that they don't learn from their mistakes - as I remember someone saying once, you'd think that they would figure out that the scrollbar doesn't have to snap back to the top of the screen just because you've moved your mouse a certain distance from it - but they are actively saying here "hey, we want you to show us how we're doing things wrong".
By cracking the site, you are giving back to the community by providing the community with a more secure operating system, albeit one you have to pay for. Marketing departments are going to take advantage of the situation either way, but hey, that's what marketing departments do.
Just my 2Kc.
--
Down Times (Score:1)
I just checked out the "status" page at the site and they are blaming downtimes on router failure, networking problems and thunder.
I want to know what the hell router they use that is SO affected by thunder. I live on the Oregon coast and our Cisco router has never even blinked, and we get some nasty storms around here.
I one would think they'd take more care on a test machine. Do you think they just plugged everything into a outlet with no UPS or surge even?
Odd if you ask me.
(from the website)
8/3/99 Events
3:22pm - Network connections down due to router failure, possibly related to thunderstorms and power failures in the area
2:59pm - Network connections intermittently up
12:40pm - Network connections down due to router failure
11:02am - Services restarted
10:47am - Some services failed after reboot
10:45am - Reboot because the System log was full
10:30am - Network connections down due to router failure
Re:That dosn't make any sense... (Score:1)
Re:A dreadful way .. Another reason (Score:1)
After all, a large number of cracks are done through trojan horses. If you have a system who's users are given only the job "Make sure nobody breaks in", you're simply not going to be able to slip a trojan into it. They'll be alert and deleting any and all executable files without running them.
Put this in an office though where the people basically only know how to run their specific software and the email program and a whole world of opportunities open up. If it can stay secure under those conditions (say with lots of appropriate warning messages, auto-scanning incoming files, etc.) then you only have the problems that Mr. Spafford outlines.
Kwil
Re:Slashdot Slashdotted? Busted (Score:1)
I've got 174 comments showing. If you click on the item, you get the real count.
This can be a force for good... (Score:1)
Javascript Dies in Netscape (Score:2)
=(
Anyone else experience this?
Chief Archer
Netscape (Score:1)
heh (Score:1)
later,
ian
Real security for 2000 and beyond? (Score:1)
//Pauly
Machine messed up already? (Score:1)
*or incompetent Microsoft employees
I feel ashamed (Score:1)
The Intel BEAST to run IIS (Score:1)
Check out the Status link in the site:
----
8/3/99 Events
3:22pm - Network connections down due to router failure, possibly related to thunderstorms and power failures in the area
2:59pm - Network connections intermittently up
12:40pm - Network connections down due to router failure
11:02am - Services restarted
10:47am - Some services failed after reboot
10:45am - Reboot because the System log was full
10:30am - Network connections down due to router failure
----
Heh. Power failure?! Router problems? Are they SURE?
Re:I feel ashamed (Score:1)
"Windows RuLZ! LInUx SuCKS!"
Re: HTTP must have been running (Score:1)
Log in Response, or actual web page. Both came back.
It was just really really confused. Probably a big cache problem. Some sent a request with a password, bad password. send back reply. keep sending reply back until server realizes it is not the right one, cache new one... now someone sends a password...
m$ comments about javascript problem (Score:3)
[windows2000test.com]
message board
We have disabled the abilty of the Netscape browser to view our page for specific reasons. Please do not flame the messege board with comments pertaning to the inabilty to view the page in Netscape. Any comments relating to this should be directed at the Webmaster in charge of this page: jsmith@microsoft.com
A dreadful way to "prove" security (Score:3)
Gene Spafford (co-author of the O'Reilly book on security, many seminal papers on Computer security, and minder of such tools as Tripwire - the man knows what he's talking about) had this to say some years ago on security challenges:
http://www.netsys.com/fire walls/firewalls-9511/0743.html [netsys.com]
He lists so many good reasons (eight) to distrust this sort of challenge that it is difficult to summarise the message here. Best to click and read it yourself.
The point goes for every package where the author tries to "prove" security in this way - be it Sidewinder, Qmail or Microsoft. In many cases, the only result is to damage security by giving miscreants some "free time" to try and crack the system, for free, without fear of punishment.
Tiger teams have their place in a properly designed, properly managed security audit. Using unpaid tiger teams as the principal means is useless and dangerous. Will Microsoft move to assure its customers that this is simply a small part of a large, thorough security audit?
Dave--
I'm surrounded by hypocrites. (Score:3)
Do you get paid to find and report holes in Linux? Huh? Unless you work for a company that sells their own distribution and therefore it's your actual job, then no, the majority of you don't. So just what is the source of this stuck-up, arrogant, anti-Microsoft attitude? So what if Netscape won't read the page? I'd think that would be Netscape's fault, but no, you insist that the blame is to be placed on Microsoft. My Microsoft web browser doesn't choke on Javascript. Netscape's browser does. Netscape is the obvious problem here.
The open-source community has been calling for Microsoft to do something like this for a long time now. Microsoft is begging for you guys to show them what you're talking about when you say "Windoze sux". If Windows sucks so much, it shouldn't be any trouble to knock out that IIS box, should it? Huh? Then why are you wasting time complaining? Get over there and kill that sucker! And while you're at it, if you want an even easier challenge, you're more than welcome to try and kill my own Windows 2000 beta 3 web server. I haven't optimized it for security, because I don't see any need to. It's on a tiny pipe, and it'd probably be a snap to wipe that sucker out. Go for it! Go kill http://wonko.com/ [wonko.com] and then let me know [mailto] about it! Tell me how lame my system was and how easy it was for you to crack it. Go on! I dare you. :)
--
Wonko the Sane
LinuxPPC asked crack this machine! (Score:4)
It's running apache only. If no one gets in for awhile, we will start adding services( sendmail is first)
(You might have to wait for DNS to update in an hour - the IP is 169.207.154.108
Hilites from the hacked page source (Score:2)
It's just too funny!
Re:Javascript Dies in Netscape (Score:2)
Re:They're asking the Internet to debug for them ! (Score:2)
Step into reality (Score:2)
For instance:
1)why should anyone want to help micro$oft audit the security of win2k? wait till we can get a copy of it, then we'll start looking for security holes.
2)why should anyone want to help micro$oft audit the security of win2k? wait till we can get a copy of it, then we'll start looking for security holes.
3)Maybe the crackers should avoid the site, or break it and NEVER tell Microsoft how they did it. We certainly do not want to help improve products of particular company.
What is it with you guys? You constantly complain about how unsecure Windows is and how much better Linux is. Then Microsoft gives you a chance to show them some of these security problems that Windows has and you say "Wait, don't help Microsoft then they might have a better product!!" Are you afraid that by showing them some of their security holes that Windows 2000 might actually, heaven forbid, be a good product and make Linux work keep its edge?
From most of the posts I read it seemed that people were afraid that they might actually help Microsoft release of good product and I don't understand how you can see the release of a more secure and better product as a bad thing regardless of who makes it.
Rich
What is it supposed to do? (Score:2)
Are there any ports open besides port 80?
And why does queso identify it as a Cisco/HP/Baystack switch?
It says it's running IIS 5.0, now that I'll believe.
"Rules of Engagement"?? WTF? (Score:2)
0) You don't do anything unexpected.
1) You don't use a valid account to get in.
2) You only use ports 19, 24, 88 and 666.
3) You only use Microsoft products to do it.
4) You don't tell anyone.
5) You tell us (see rule #4)
Are they kidding?? The first thing a hacker/cracker would do is something unorthodox. Where do they get off thinking that you can test the security of a system by imposing rules of engagement.
That's what you get when you let your lawyers dictate procedure to your techies.
Javascript error "Windows is not defined" (!) (Score:2)
Re:Anti-Microsoft for no good reason? (Score:4)
They're just grandstanding and posturing, trying to prove that Windows 2000 is secure. Its win-win for them -- free high-level security testing (which unlike Beta testing, is something that is generally VERY expensive to contract out for), if it gets cracked, then they get an early warning and time to fix the problem, and if they don't their marketroids will have that nugged to get their paid-off "independant" columnists to write about.
All while people are wasting time to save Microsoft money developing a product that they're going to charge exorbanant licensing fees for.
Seems kind of stupid for anyone to waste their time on it. Get your own copy of Windows 2000, crack THAT, and post THAT exploit all over the net. That puts Microsoft in their place, and doesn't help them screw people over even more.
Re:Javascript Dies in Netscape (Score:3)
It seems that netscape is trying to execute this function before loading the DIV, while IE (and Mozilla) has either loaded it already or scanned the file to find that object.
As for what is correct in this situation, it would have to depend on when the "onload" function should be called -- before the page is fully loaded or after. IMHO, I'd probably have to say that IE and Mozilla are probably doing it right (no error vs. error).
I don't know why there is a spacing problem in Netscape (but I wouldn't be too surprised if it's intentional). Anybody know if Netscape or IE is interpreting the HTML "wrong" (please don't define "right" as what netscape does -- define it as you'd expect a browser to behave)?
Re:m$ comments about javascript problem (Score:2)
Sounds more like high specific gravity to me...
Why this is BS (Score:3)
xm@GeekMafia.dynip.com [http://GeekMafia.dynip.com/]
Oops (Score:3)
Re:Smart move for Microsoft (Score:2)
But Microsoft doesn't believe in choice, oh wait, yes they do, "Workstation or Server edition?"
A Stronger W2K means that MS will be in a stronger position to push their "Windows Everywhere" agenda
*sigh8 EXPLANATION: Login Failure (Score:2)
You didn't take anything down.
Re:Real security for 2000 and beyond? (Score:3)
Re:What an ugly site (Score:2)
Why would they? This is MS, to them there is only one browser. When they released IE for Unix, they proclaimed, "Finally, a graphical alternative to lynx!"
Re:Illegal? (Score:2)
In the same way, this sort of B&E by permission is legit. This has been done by private "tiger teams" numerous times, in the private biz and the military. Microsoft has simply given B&E permission (to that one site) to the world, using the entier net.population as one honkin' huge tiger team.
Re:Anti-Microsoft 'cause no reason to support 'em (Score:2)
To a certain extent, the participation of the Opensource community is driven by intangibles, and that force hasn't been able to be successfully co-opted by any corporation yet. Look at some examples:
- Netscape fails to engage thousands of kernel hackers in redevolping their browser
- Redhat starts becoming a "brick and mortar" business, and the linux community starts to diss them and fight for disto agnosticism
- For every major corporate announcement of plans for a Linux port, there's an effort underway to develop a free replacement.
I don't think that many hackers are really interested in helping Micros~1 make better products -- since we don't use 'em, we don't promote 'em, and we stand to gain *NOTHING* by improving IIS 5.0 or Windows2001 - A Wasted Disk Space Odyssey.
There's no portable code being release for peer review. There's no public API. There's nothing of interest for the linux hacker other than saying, "look, I hacked another Windows box!"
Thoughts from a grey-hat (Score:3)
If any of the attacks succeed, they have a trace of the crack, and can build better security for the final release of NT2000. This is good, because I'll have those pieces of shit installed all over my networks soon enough.
They also get to harvest IP addresses of everyone stupid enough to try even looking at this machine. Even a simple traceroute will give them a source IP address. Toss them all into a big database at a later date, couple it in with some other data about the attack type, and wait to use it later to track crackers. Offline analysis is a powerful tool, couple it with automated lookups and a simple knowledge based system, and you could populate a DB with some dangerous data.
For the paranoid, perhaps there has been a nasty break-in by some sophisticated infocriminals (love that new word, see HNN), and the FBI are also sitting in the room with their own analyzers, waiting for someone to try a similar attack. Assuming the crackers are just some misguided wanna-be scripties, this could help the FBI to back track to them. The cracking contest is just a combination of marketing fiasco and FBI clue gathering mission. The FBI are probably not even looking for anything they could use in court, just some leads to track down.
Given the lack of any other services on the machine, and the simplicity of the web pages (no DB or useful cgi-bin), and the quickly hacked together javascript errors, I would say this is mostly a marketing exersize. No matter what the outcome, they can spin it into some hype and a FUD campaign.
the AC
Conspiracy Theory... (Score:3)
1) They are tricking us into hosing a Linux box,
2) They have ported IIS to Linux and are testing that configuration, or
3) The scans are coming back incorrect.
I hope for the sake of the Linux comunity that it is (3) rather than the first 2. Man, think of the bad press for Linux!
IP addy (Score:2)
The interesting point that everyone keeps reitterating is that the site has been constantly down all day. I keep wondering what spin MS is going to put on this. They put out this box to be cracked, which cant even stay online. They use a non real world example by not running any services. The sad part is due to all the lame posts, they will attribute this to the opensource community in some way and attempt to make us look bad. And all this when I was just remarking that Bill Gates has done something good for once by donating some of his fortune to a really good charitable cause. *sigh*
Smart move for Microsoft (Score:4)
- Nothing breaks it, and this becomes a marketing high-point for Microsoft - It gets broken, and Microsoft engineers now have solid data (vice anecdotal) as to where the problems are. Especially if this was compiled with the debug option switched on.
Christopher A. Bohn
Wow! This server is BULLETPROOF! (Score:2)
We're witnessing the ultimate in internet security! Not only is it impossible to hack/crack/smack this box, but they've tightened things up sooooo much that I can't even ping it! Heck, I can't even resolve the name to an IP address.
My next challenge is for all you
What an ugly site (Score:2)
----
Re:m$ comments about javascript problem (Score:3)
Top Ten Specific Reasons Why Only MSIE Users Can View Microsoft Cracking Challenge
10. If you're doing lame browser detection, MSIE is fewer letters to type than Netscape, Mozilla, or even Opera.
9. Similarly, "JScript" is shorter than "JavaScript".
8. AOL^H^H^HMicrosoft is the Internet.
7. We left our copy of FrontPage at the default settings. But don't worry, it will all be fixed in FrontPage 2005.
6. We fear the mighty /. effect, and those fanatics wouldn't be caught dead using Exploder.
5. VisualBasic is more powerful and efficient than C++.* Likewise, Internet Explorer has that comforting familiar Microsoft Windows interface, so you don't have to learn that arcane, complicated Netscape setup.
4. You can't crack our powerful enterprise-level Microsoft(tm) Windows(tm) server if you can't read the rules we made up, nanny nanny boo boo.
3. We're weenies. We couldn't write "Hello world" in HTML, let alone use scripting languages.
2. 3l337 hAx0r d0oDz swear by MSIE.**
And the number one reason why only MSIE users are permitted to view the Microsoft cracking challenge is... drumroll, please...
1. Somehow the demo site was interfered with. Give me another chance, your honor.
*Editor's note: Microsoft actually says this on another page.
**Editor's note: swear at, more likely.
Refresh hack (Score:2)
With all the people hammering the server though, I'm surprised nobody tried a meta refresh before my redhat.com and freebsd.org tests. :P
Re:Javascript Dies in Netscape (Score:2)
Why Hackers might be kvetching... (Score:4)
Some people yelp, "Screw Microsoft, let em do their own dirty work."
Others tut tut, "This is just like Open Source! This is a step in the right direction."
What to do!?! Is Microsoft challenging us to stick by our Morals? Or are we being "used" by a corporate entity. Even worse, are the logs of this attempt at hackign the system going to represent evidence?
#1. If you can't avoid a simple tcp/ip packet sniffer from tracking you down, then you are unlikely to be the ones the FBI cares about.
#2. If you believe that this is closer to open source than before, try a breath deep too. Oxygen is good. Yes.. It burns stuff... Anyone can torture test any product they buy. There is nothing open source about that. The issue of Open Source is that modifications we as hackers might make after finding bugs, are owned by the community, as is the original software to some extent. The notion that this method of security analysis is any different than normal practice of Microsoft is laughable. The question is HOW the software is being tested, not WHO is testing it.
#3. I will note that it is rare for a Linux machine to HAVE to be advertised to be crashed. That is because if you want to test out a security flaw you can create your own test machine with no cost. Thats the joy of OPEN SOURCE. You can truly know what you are getting, try it before spending money, and even fix problems yourself rather than having to wait for a company to respond to your bug report.
#4. I still have doubts that this product ever will exist. The fact is that if no one hacks the software, then Microsoft can claim their non-released software that probably will not be really implemented before some serious bug fixing, is secure within the context of 1999's security issues and protocols. With new services being added regularly and custom software being thrown into the mix, this is relatively vapor ware benchmarking...
Whatever,
dlg
Contest? (Score:3)
I haven't read the "rules", but I wonder if everyone will follow them.
A ploy to get crackers to use IE4-5!!! (Score:2)
Re:What an ugly site (Score:2)
Re:Smart move for Microsoft (Score:2)
Outcome 1 - nothing breaks it. THis would be a bad thing. Arrogance and "we're unstoppable" would be their attitude.
Outcome 2 - we break it. they fix it. This would be a GOOD THING. The more secure a system is, the better. It doesn't conflict with our goal of Total World Domincation....it just gives people a viable choice.
You forgot Outcome 3 though - we break it. they deny it for 6 months and then release a Service Pack that fixes the problem that "doesn't exist". This seems the most likely to me.
Nonsense. (Score:3)
Exactly how is this "challenge" intriguing? Cracking contests are a dime-a-dozen these days, which is interesting because they demonstrate almost nothing about security. (See this essay [counterpane.com] to undestand why.) If you believe that the nature of the open-source community is to fall for tricks like that then you have drastically underestimated this community. Most of the audience here doesn't get paid to find and report security holes in Linux or NT. However, if you find a security hole in Linux the result of your work will be made available to you and everyone in the Linux community at no charge through the efforts of volunteers like Torvalds and Cox. If you make the same effort for NT on the other hand, Gates is sure to offer you the opportunity to pay for the improvement whenever Win2K manages to surface without seeing it's own shadow.
I'm not sure what you mean when you say, "The open-source community has been calling for Microsoft to do something like this for a long time now." As far as I can tell, no one has asked for Microsoft to offer us an opportunity to allow us to support their development and marketing efforts without compensation. Sorry, but now that the opportunity is here, I'm still not impressed. It probably would be easy to knock down the Win2K test server (I can't seem to get through to it so perhaps someone already did), and yours as well -- but I don't much care. I use Linux because it is the most stable and effective operating system that meets my computing needs, not as a protest against some other system. I choose to direct my attention to constructive activities -- attacking a system that isn't even in production without source code or specifications doesn't qualify.
Don't bother (Score:2)
Re:It is already borked. (Score:2)
2 staff/admins per mainframe
3 staff/admins per NT server + good technical support contract
Yes but those 3 staff are much cheaper since NT is so easy that anyone can admin it.***
*** Not my own view, but it seems to be a prevalant view among some PHBs. MS themselves seem guilty of pushing this notion in some form.
Re:Smart move for Microsoft (Score:2)
Re:Thoughts - Pebkac Networks (Score:2)
Seems to be a class C block of IP addresses from right in the middle of the Class B that M$ uses. Claims to be an ISP, but they have just one static web page on their server.
the AC
Re:Real security for 2000 and beyond? (Score:2)
And what does the Cracker get out of it? (Score:2)
1) Noone breaks in. Claim the most secure 0S in the world.
2) People break in, MS fixes the bugs, downplays the seurity risk, and makes money off of a better product.
What do the crackers get?
1) They don't break in, Nothing.
2) If they break in, Nothing.
Humm... What a deal.
Who is going to waste thier time trying to get into a system they have no idea whats behind? Where are the security holes? I would hope MS has fixed all the Known problems. And until they release thier software, it will be hard to see what new is broken.
Quack
Microsoft (Score:3)
Do GPFs count as "hidden messages"?
The goal is to see how a properly secured machine will stand up to attack. These machines are configured to prevent known attacks.
With a cookie-cutter operating system like Windows, you'd think they'd make the default configuration as resistant as possible to known attacks.
Re:Step into reality (Score:2)
But then does it really matter what company I work for? The point is that as a programmer you should work to help people release good code, not avoid helping someone just because you don't like their previous products.
That is only narrow minded and immature.
Rich
Stock install secure damnit! Crack in: win machine (Score:2)
So here is an additional challange:
Be the first to change
Goodluck!
Re: (Score:2)
It's waaayyyy down. (Score:2)
Has ANYBODY been able to get into ANYTHING at ANY time other than http ports? Some guy said everyone had download access to some msdca directory or something, but I haven't heard of anybody else getting in. If no ports are open then whats the point?
Anti-Microsoft for no good reason? (Score:5)
If you don't want to help Microsoft out, that's one thing, but you can't deny that this is better for the hoards of people who will be running this thing.
Re:Why this is BS (Score:2)
Of course, what you say is true for any product, whether it's Linux/Apache or Windows 2000. Holes are going to be found that no one bothered to think of before. Linux servers were exploit city about a year ago, despite all the open sourcey stuff.
For example, a serious IIS 4.0 exploit (in 'Remote Data Services') was just found a few weeks ago. This is after the product being out for more than a year.
Also, I'm sure L0pht and others have Windows2000 betas. You can buy it mailorder, if MS hasn't sent it to your company.
--
Need Specs (Score:2)
Howabout releasing some specs as to what hardware this machine is on, and what security settings they are using.
We're not even certain they haven't made unfair modifications to their code (say randomly changing usernames and passwords if someone brute hacks them). Is this a realistic level of security which can be maintained by the average sysadmin, or will you need to hire half the NT 5.0 development team.
Say someone does crack this system. Or everyone fails? Then what? Are we going to recieve detailed data on what people tried and succeeded/failed? If not we have no assurances that Microsoft will even attempt to fix any security holes they find.
Essentially Microsoft has created a marketing gimick, nothing more.
Doug
The Fallacy of Cracking Contests (Score:3)
The Fallacy of Cracking Contests [counterpane.com]
--
It's dead as a door nail (Score:2)
Re:Javascript Dies in Netscape (Score:3)
Comparison with Apple Contest (Score:2)
When the contest ended, Mac advocates took it up and sponsored their own contest. This ran for some time and again wasn't claimed; more bragging rights. Then, they ran another contest and upped the prize...this time, someone was able to break in using a security hole in a webserver plugin (that linked to a database--to their credit, they had set up the server to do something real, not just serve static pages). The prize was claimed, the hole was fixed, and then the contest started up again...and was quickly hacked via yet another plugin bug, as I recall.
After this, there were no more contests, and you didn't hear people touting the security so much anymore.
The moral of this story is that if someone claims their prize, Microsoft will lose more than they gain. It fixes one security hole, but there will always be others. And, their webserver got cracked--no bragging rights, and embarrassing no matter how they spin it.
The life of www.windows2000test.com (Score:2)
www.windows2000test.com led a short life, but one full of activity. It is this action that we should remember, how pleasantly he served those static web pages, and the cute manner in which he [beep]ed out naughty words, like compe[beep]ion. We should remember how he went missing for a while, and then came back, opening up to us with several ports. We should focus on these positive things, not that somebody stuck a knife in those ports and twisted it with 30 minutes, but on how trustingly www.windows2000test.com invited us in.
I know that many of you will find his passing difficult to cope with, and I only wish I could do more to ease your grief.
Re:Smart move for Microsoft (Score:5)
- Real Crackers aren't going to spend their time trying to get caught on a high-profile site.
- Script kiddies don't have any scripts for the "new" OS yet.
- It's new - so of COURSE it's going to take time to find the vulnerabilities. You think "one stunt, and that's it" is going to fix all their problems? You're more naive than I thought.
- Past record. How long does Microsoft take to acknowledge, let alone fix, the problems they find? W2K *will* have bugs. All major programs have bugs. The question is - will they efficiently and quickly inform their customers, and provide comprehensive support to them - like the 4-color glossies they distribute say?
- Many vulnerabilities are discovered at the console - and by looking at the source. It could be wide open, but you'd never know that from a remote perspective. Breaking into a system you've never seen or used remotely has about as much of a chance of success as me getting away with being called Rob Malda in this post.
That's just what I can think of off the top of my head. Use your imagination. And most importantly: dismiss yet another one of Microsoft's tricks to get you to do their bidding. Clever Microsoft, but I thought you'd have learned by now that the 'net dispels FUD faster than a speeding salesman.
--
The site will remain uncrackable... (Score:2)
Let me paste the text from my initial scans.
The following is a traceroute from my hosts to windows2000.com as if I _would_ leave in my
peers
8 199.ATM7-0.XR1.SEA1.ALTER.NET (146.188.200.101) 143.469 ms * 252.588 ms
9 195.ATM4-0.GW3.SEA1.ALTER.NET (146.188.201.25) 148.365 ms 149.046 ms 149.636 ms
10 157.130.177.154 (157.130.177.154) 148.690 ms 150.032 ms 248.992 ms
11 207.46.190.82 (207.46.190.82) 148.777 ms 149.989 ms 149.094 ms
12 iuscb11ixc7501-a0-00-1.cp.msft.net (207.46.129.7) 216.968 ms * 256.297 ms
13 * iusd27nt5c7201-a2-0-1.cp.msft.net (207.46.168.68) 144.507 ms *
14 207.46.175.250 (207.46.175.250) 148.849 ms * 163.483 ms
15 * * *
16 * * *
17 * * *
18 * * *
19 * * *
20 * * *
21 * * *
22 * * *
23 * * *
24 * * *
25 * * *
26 * * *
27 * * *
28 * * *
29 * * *
30 * * *
Right there in black and white...line 14 returns no udp/tcp info. All ack's on echo replies are being denied.
This means that Microsoft is implicitly denying tcp packets. I thought this host was wide open. Hmm let me try something else.
Next pasting-------------------------------------
This is a simple scan from saint formerly satan
against www.windows2000test.com (207.46.171.196)
[root@nessus saint-1.4]#
Security Administrator's Integrated Network Tool
Portions copyright (C) 1998 World Wide Digital Security, Inc.
Portions copyright (C) 1995 by Satan Developers.
SAINT is starting up...
*** xxxxx.xxx.adelphia.net can't find 207.46.171.196: Server failed
bin/udp_scan: are we talking to a dead host or network?
Usage: ostype.saint target
Obviously Targeted info has been redirected....
The machine just before this win2000 box is definately the router for that subnet.
Pasted Text--------------------------------------
[skippy@nessus skippy]$ telnet 207.46.175.250
Trying 207.46.175.250...
Connected to 207.46.175.250.
Escape character is '^]'.
Copyright (C) 1998 Extreme Networks
WINISP EXTREME!
By John Hollowell
And
The WINISP Team!
TAKE THE HIT FOR THE TEAM!
login: anonymous
password:
login:
Simple telnets and ftps to the box are rejected. Services not running or being discrarded at the firewall.
I am scanning various TCP ports for activity.
Using nmap to discover destination services...
I find that the following information is very _interesting_ to say the least.
I think that other
"Apocalypse now..."
Pasted text----------------------------------
[root@nessus src]# nmap -sT -P0 -o
Starting nmap V. 2.12 by Fyodor (fyodor@dhp.com, www.insecure.org/nmap/)
Initiating TCP connect() scan against (207.46.171.196)
Adding TCP port 56 (state Firewalled).
Adding TCP port 794 (state Firewalled).
Adding TCP port 362 (state Firewalled).
Adding TCP port 719 (state Firewalled).
Adding TCP port 1495 (state Firewalled).
Adding TCP port 310 (state Firewalled).
Adding TCP port 409 (state Firewalled).
Adding TCP port 415 (state Firewalled).
Adding TCP port 1509 (state Firewalled).
Adding TCP port 1019 (state Firewalled).
Adding TCP port 254 (state Firewalled).
Adding TCP port 2023 (state Firewalled).
Adding TCP port 2043 (state Firewalled).
Adding TCP port 7005 (state Firewalled).
Adding TCP port 1015 (state Firewalled).
Adding TCP port 1545 (state Firewalled).
Adding TCP port 5530 (state Firewalled).
Adding TCP port 1513 (state Firewalled).
Adding TCP port 5191 (state Firewalled).
Adding TCP port 126 (state Firewalled).
Adding TCP port 116 (state Firewalled).
Adding TCP port 1666 (state Firewalled).
Adding TCP port 909 (state Firewalled).
Adding TCP port 135 (state Firewalled).
Adding TCP port 222 (state Firewalled).
Adding TCP port 549 (state Firewalled).
Adding TCP port 394 (state Firewalled).
Adding TCP port 184 (state Firewalled).
Adding TCP port 502 (state Firewalled).
Adding TCP port 140 (state Firewalled).
Adding TCP port 1473 (state Firewalled).
Adding TCP port 678 (state Firewalled).
Adding TCP port 844 (state Firewalled).
Adding TCP port 1550 (state Firewalled).
Adding TCP port 874 (state Firewalled).
Adding TCP port 572 (state Firewalled).
Adding TCP port 825 (state Firewalled).
Adding TCP port 605 (state Firewalled).
Adding TCP port 1528 (state Firewalled).
Adding TCP port 1397 (state Firewalled).
Adding TCP port 157 (state Firewalled).
Adding TCP port 735 (state Firewalled).
Adding TCP port 920 (state Firewalled).
Adding TCP port 295 (state Firewalled).
Adding TCP port 23 (state Firewalled).
Adding TCP port 165 (state Firewalled).
Adding TCP port 541 (state Firewalled).
Adding TCP port 104 (state Firewalled).
Adding TCP port 490 (state Firewalled).
Adding TCP port 393 (state Firewalled).
Adding TCP port 61 (state Firewalled).
Adding TCP port 2064 (state Firewalled).
Adding TCP port 73 (state Firewalled).
Adding TCP port 7326 (state Firewalled).
Adding TCP port 424 (state Firewalled).
Adding TCP port 5190 (state Firewalled).
Adding TCP port 967 (state Firewalled).
Adding TCP port 1026 (state Firewalled).
Adding TCP port 118 (state Firewalled).
Adding TCP port 229 (state Firewalled).
Adding TCP port 1669 (state Firewalled).
Adding TCP port 49 (state Firewalled).
Adding TCP port 927 (state Firewalled).
Adding TCP port 998 (state Firewalled).
Adding TCP port 1542 (state Firewalled).
Adding TCP port 609 (state Firewalled).
Adding TCP port 834 (state Firewalled).
Adding TCP port 10082 (state Firewalled).
Adding TCP port 478 (state Firewalled).
Adding TCP port 904 (state Firewalled).
Adding TCP port 1482 (state Firewalled).
Adding TCP port 237 (state Firewalled).
Adding TCP port 912 (state Firewalled).
Adding TCP port 2401 (state Firewalled).
Adding TCP port 403 (state Firewalled).
Adding TCP port 1241 (state Firewalled).
Adding TCP port 367 (state Firewalled).
Adding TCP port 3086 (state Firewalled).
Adding TCP port 805 (state Firewalled).
Adding TCP port 303 (state Firewalled).
Adding TCP port 766 (state Firewalled).
Adding TCP port 944 (state Firewalled).
Adding TCP port 169 (state Firewalled).
Adding TCP port 1399 (state Firewalled).
Adding TCP port 1987 (state Firewalled).
Adding TCP port 6148 (state Firewalled).
Adding TCP port 1178 (state Firewalled).
Adding TCP port 901 (state Firewalled).
Adding TCP port 654 (state Firewalled).
Adding TCP port 469 (state Firewalled).
Adding TCP port 9535 (state Firewalled).
Adding TCP port 668 (state Firewalled).
Adding TCP port 1421 (state Firewalled).
Adding TCP port 75 (state Firewalled).
Adding TCP port 5300 (state Firewalled).
Adding TCP port 706 (state Firewalled).
Adding TCP port 78 (state Firewalled).
Adding TCP port 338 (state Firewalled).
Adding TCP port 813 (state Firewalled).
Adding TCP port 1009 (state Firewalled).
Adding TCP port 625 (state Firewalled).
Adding TCP port 7 (state Firewalled).
Adding TCP port 1505 (state Firewalled).
Adding TCP port 1490 (state Firewalled).
Adding TCP port 506 (state Firewalled).
Adding TCP port 1470 (state Firewalled).
Adding TCP port 1499 (state Firewalled).
And the list goes on...
# Log of: nmap -sT -P0 -o
Interesting ports on (207.46.171.196):
(Not showing ports in state: filtered)
Port State Protocol Service
None because they all _HAVE_ definately been firewalled off.
Should I scan behind the firewall?
Now this is a question of morals and ethics...
Right Bill?
What the fsck I think I am in the mood for a little challenge...
Heh, heh, heh...oops!
They must have active firewall admins at the console...All acks to my source address are being denied now. I could come from different hosts until I finally get through but I think I'll just leave it alone. As everyone can see from the info above I have used no scripts to attempt to crack the workstation. I was merely just accepting the invitation to look and try.
Thanks Hemos, TACO, Cowboy and the gang...
Any comments or suggestions can be sent to
attempted by portslider at
mercenary_4_hire@hotmail.com
I will try to answer as many as I can.
Sorry in advance but I do not provide hacking/cracking information to anyone. So don't ask.