Pazia – Acer National Hacking Competition 2 akan segera diselenggarakan
di sepuluh kota Indonesia dengan hadiah utama Notebook Acer Ferrari 1005, piala bergilir PANHAC, voucher training dan ujian bersertifikasi FORTINET, untuk pemenang kedua Acer LCD Monitor 17″ dan pemenang ketiga Samsung MFP Laser Printer SCX-4521.
Untuk disetiap kota, akan ada satu pemenang dengan hadiah Notebook Acer Aspire 5052.
elain kompetisi di sepuluh kota, juga diselenggarakan kompetisi PANHAC2 Online yang diselenggarakan sebelum kompetisi di kota yang bersangkutan berjalan, pukul 14.30 – 15.00 WIB pada jadwal PANHAC2.
Kompetisi PANHAC2 Online dapat diikuti dengan cuma-cuma, tetapi berhadiah Acer LCD monitor 19”, Samsung Laser Printer ML-2010 dan Samsung Laser Printer ML-1610.
Seperti tahun lalu, PANHAC2 juga menggelar pertandingan untuk merebut file yang disimpan di dalam server lokal.
Selain PANHAC2 offline dan online, PANHAC2 ini juga menyelenggarakan Kompetisi Penulisan Artikel Hacking dan Teknologi Informasi untuk para
wartawan, editor dan penulis lepas yang juga berhadiah satu Notebook Acer Aspire 5052.
Untuk informasi lebih lengkap silahkan buka link ini
Rif…gw nih. btw, gw mo tau donk pemenang lomba PANHAC kemaren… trus ceritain dsini. kan gw gak tau…jauh brooo..gw tunggu. chayoo Rif
@dabors26 : dah gw share tuh di postingan PANHAc@Bandung 🙂 search aja di blog ini ya kalo bingung 🙂
aku mendapatkan ini di server PANHAC bali.. 99.99.250.2 yg berhasil aku scanning FULL n attack dg metasploit berkali2 tp gak menang (hehehe…keciann dech looee)
OS by NMAP:Fedora core 1
submission (587/tcp)
Port is open
Plugin ID : 11219
An SMTP server is running on this port
Here is its banner :
220 darkstar.example.net ESMTP Sendmail 8.12.8/8.12.8
Tue, 17 Jul 2007 15:10:06 +0700
Plugin ID : 10330
Synopsis :
An SMTP server is listening on the remote port.
Description :
The remote host is running a mail (SMTP) server on this port.
Since SMTP servers are the targets of spammers, it is recommended you
disable it if you do not use it.
Solution:
Disable this service if you do not use it, or filter incoming traffic
to this port.
Risk Factor :
None
Plugin output :
Remote SMTP server banner :
220 darkstar.example.net ESMTP Sendmail 8.12.8/8.12.8
Tue, 17 Jul 2007 15:10:06 +0700
Plugin ID : 10263
For some reason, we could not send the 42.zip file to this MTA
BID : 3027
Plugin ID : 11036
printer (515/tcp)
LPRng seems to be running.
This daemon has a flaw (until version 3.6.24 at least) that would
let anyone to remotely execute arbitrary commands on the server.
Nessus could not remotely determine with certainty that the
version of LPRng this machine is running is vulnerable or not.
Solution Make sure that you are running version 3.6.25 or newer
and filter incoming connections to TCP port 515.
Risk Factor : High
CVE : CVE-2000-0917
BID : 1712
Other references : IAVA:2001-t-0005
Plugin ID : 10522
Port is open
Plugin ID : 11219
netbios-ssn (139/tcp)
Port is open
Plugin ID : 11219
sunrpc (111/tcp)
Port is open
Plugin ID : 11219
The RPC portmapper is running on this port.
An attacker may use it to enumerate your list
of RPC services. We recommend you filter traffic
going to this port.
Risk Factor : Low
CVE : CVE-1999-0632, CVE-1999-0189
BID : 205
Plugin ID : 10223
RPC program #100000 version 2 ‘portmapper’ (portmap sunrpc rpcbind) is running on this port
Plugin ID : 11111
finger (79/tcp)
The ‘finger’ service provides useful information to attackers, since it allows
them to gain usernames, check if a machine is being used, and so on…
Here is the output we obtained for ‘root’ :
Login: root Name: (null)
Directory: /root Shell: /bin/bash
On since Tue Jul 17 13:59 (WIT) on tty1 41 minutes 56 seconds idle
On since Tue Jul 17 14:11 (WIT) on tty2 58 minutes 14 seconds idle
Mail last read Sat Jul 7 16:21 2007 (WIT)
No Plan.
Solution: comment out the ‘finger’ line in /etc/inetd.conf
Risk Factor : Low
CVE : CVE-1999-0612
Plugin ID : 10068
Port is open
Plugin ID : 11219
A finger server seems to be running on this port
Plugin ID : 10330
http (80/tcp)
Port is open
Plugin ID : 11219
The service closed the connection after 0 seconds without sending any data
It might be protected by some TCP wrapper
Plugin ID : 10330
time (37/tcp)
Port is open
Plugin ID : 11219
A time server seems to be running on this port
Plugin ID : 10330
smtp (25/tcp)
The remote SMTP server answers to the EXPN and/or VRFY commands.
The EXPN command can be used to find the delivery address of mail aliases, or
even the full name of the recipients, and the VRFY command may be used to check the validity of an account.
Your mailer should not allow remote users to use any of these commands,
because it gives them too much information.
Solution: if you are using Sendmail, add the option :
O PrivacyOptions=goaway
in /etc/sendmail.cf.
Risk Factor : Low
CVE : CVE-1999-0531
Plugin ID : 10249
Port is open
Plugin ID : 11219
An SMTP server is running on this port
Here is its banner :
220 darkstar.example.net ESMTP Sendmail 8.12.8/8.12.8
Tue, 17 Jul 2007 15:10:07 +0700
Plugin ID : 10330
Synopsis :
An SMTP server is listening on the remote port.
Description :
The remote host is running a mail (SMTP) server on this port.
Since SMTP servers are the targets of spammers, it is recommended you
disable it if you do not use it.
Solution:
Disable this service if you do not use it, or filter incoming traffic
to this port.
Risk Factor :
None
Plugin output :
Remote SMTP server banner :
220 darkstar.example.net ESMTP Sendmail 8.12.8/8.12.8
Tue, 17 Jul 2007 15:10:07 +0700
Plugin ID : 10263
For some reason, we could not send the 42.zip file to this MTA
BID : 3027
Plugin ID : 11036
ssh (22/tcp)
Port is open
Plugin ID : 11219
An ssh server is running on this port
Plugin ID : 10330
Remote SSH version : SSH-1.99-OpenSSH_3.5p1
Remote SSH supported authentication : publickey,password,keyboard-interactive
Plugin ID : 10267
The remote SSH daemon supports the following versions of the
SSH protocol :
. 1.33
. 1.5
. 1.99
. 2.0
SSHv1 host key fingerprint : 5f:4d:42:f6:f8:6e:30:60:a4:d6:9f:bb:8b:37:4e:33
SSHv2 host key fingerprint : 95:19:bf:5d:0c:63:17:07:16:44:19:59:c9:97:a2:81
Plugin ID : 10881
Synopsis :
The remote service offers an insecure cryptographic protocol
Description :
The remote SSH daemon supports connections made
using the version 1.33 and/or 1.5 of the SSH protocol.
These protocols are not completely cryptographically
safe so they should not be used.
Solution:
Disable compatiblity with version 1 of the protocol.
Risk Factor :
Low / CVSS Base Score : 3
(AV:R/AC:H/Au:NR/C:P/A:N/I:N/B:C)
CVE : CVE-2001-0361
BID : 2344
Plugin ID : 10882
ftp (21/tcp)
The remote host is running a version of ProFTPd which seems
to be vulnerable to a buffer overflow when a user downloads
a malformed ASCII file.
An attacker with upload privileges on this host may abuse this
flaw to gain a root shell on this host.
The author of ProFTPD did not increase the version number
of his product when fixing this issue, so it might be false
positive.
Solution: Upgrade to ProFTPD 1.2.9 when available or to 1.2.8p
Risk Factor : High
BID : 8679
Plugin ID : 11849
It was possible to freeze or reboot Windows by
reading a MS/DOS device through FTP, using
a file name like CONCON, AUX.htm or AUX.
A cracker may use this flaw to make your
system crash continuously, preventing
you from working properly.
Solution: upgrade your system or use a
FTP server that filters those names out.
Reference : http://support.microsoft.com/default.aspx?scid=KB
en-us
Q256015
Reference : http://online.securityfocus.com/archive/1/195054
Risk Factor : High
Plugin ID : 10929
Port is open
Plugin ID : 11219
The service closed the connection after 1 seconds without sending any data
It might be protected by some TCP wrapper
Plugin ID : 10330
Synopsis :
An FTP server is listening on this port
Description :
It is possible to obtain the banner of the remote FTP server
by connecting to the remote port.
Risk Factor :
None
Plugin output :
The remote FTP banner is :
220 ProFTPD 1.2.8 Server (ProFTPD Default Installation) [darkstar.example.net]
Plugin ID : 10092
Synopsis :
The remote FTP server is affected by multiple vulnerabilities.
Description :
The remote host is using ProFTPD, a free FTP server for Unix and
Linux.
According to its banner, the version of ProFTPD installed on the
remote host suffers from multiple format string vulnerabilities, one
involving the ‘ftpshut’ utility and the other in mod_sql’s
‘SQLShowInfo’ directive. Exploitation of either requires involvement
on the part of a site administrator and can lead to information
disclosure, denial of service, and even a compromise of the affected
system.
See Also :
http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2
Solution:
Upgrade to ProFTPD version 1.3.0rc2 or later.
Risk Factor :
Low / CVSS Base Score : 3
(AV:R/AC:H/Au:R/C:P/A:P/I:P/B:N)
CVE : CVE-2005-2390
BID : 14380, 14381
Other references : OSVDB:18270, OSVDB:18271
Plugin ID : 19302
general/icmp
Synopsis :
It is possible to determine the exact time set on the remote host.
Description :
The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.
This may help him to defeat all your time based authentication protocols.
Solution: filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).
Risk Factor :
None / CVSS Base Score : 0
(AV:R/AC:L/Au:NR/C:N/A:N/I:N/B:N)
Plugin output :
The difference between the local and remote clocks is -19 seconds
CVE : CVE-1999-0524
Plugin ID : 10114
Here is the route recorded between 99.99.45.142 and 99.99.250.2 :
99.99.250.2.
99.99.250.2.
Plugin ID : 12264
sunrpc (111/udp)
RPC program #100000 version 2 ‘portmapper’ (portmap sunrpc rpcbind) is running on this port
Plugin ID : 11111
general/udp
For your information, here is the traceroute from 99.99.45.142 to 99.99.250.2 :
99.99.45.142
99.99.250.2
Plugin ID : 10287
general/tcp
The remote host is running one of these operating systems :
Linux Kernel 2.4
Linux Kernel 2.6
Plugin ID : 11936
hehe………
ini Hasil aku nyeken ke server target n attack pake metasploit tapi gak tembus padahal sudah NGoyO banget tp gak menang (sabarlah wahai anakku ….)
Target : 99.99.250.2
OS : Linux Fedora core1
submission (587/tcp)
Port is open
Plugin ID : 11219
An SMTP server is running on this port
Here is its banner :
220 darkstar.example.net ESMTP Sendmail 8.12.8/8.12.8
Tue, 17 Jul 2007 15:10:06 +0700
Plugin ID : 10330
Synopsis :
An SMTP server is listening on the remote port.
Description :
The remote host is running a mail (SMTP) server on this port.
Since SMTP servers are the targets of spammers, it is recommended you
disable it if you do not use it.
Solution:
Disable this service if you do not use it, or filter incoming traffic
to this port.
Risk Factor :
None
Plugin output :
Remote SMTP server banner :
220 darkstar.example.net ESMTP Sendmail 8.12.8/8.12.8
Tue, 17 Jul 2007 15:10:06 +0700
Plugin ID : 10263
For some reason, we could not send the 42.zip file to this MTA
BID : 3027
Plugin ID : 11036
printer (515/tcp)
LPRng seems to be running.
This daemon has a flaw (until version 3.6.24 at least) that would
let anyone to remotely execute arbitrary commands on the server.
Nessus could not remotely determine with certainty that the
version of LPRng this machine is running is vulnerable or not.
Solution Make sure that you are running version 3.6.25 or newer
and filter incoming connections to TCP port 515.
Risk Factor : High
CVE : CVE-2000-0917
BID : 1712
Other references : IAVA:2001-t-0005
Plugin ID : 10522
Port is open
Plugin ID : 11219
netbios-ssn (139/tcp)
Port is open
Plugin ID : 11219
sunrpc (111/tcp)
Port is open
Plugin ID : 11219
The RPC portmapper is running on this port.
An attacker may use it to enumerate your list
of RPC services. We recommend you filter traffic
going to this port.
Risk Factor : Low
CVE : CVE-1999-0632, CVE-1999-0189
BID : 205
Plugin ID : 10223
RPC program #100000 version 2 ‘portmapper’ (portmap sunrpc rpcbind) is running on this port
Plugin ID : 11111
finger (79/tcp)
The ‘finger’ service provides useful information to attackers, since it allows
them to gain usernames, check if a machine is being used, and so on…
Here is the output we obtained for ‘root’ :
Login: root Name: (null)
Directory: /root Shell: /bin/bash
On since Tue Jul 17 13:59 (WIT) on tty1 41 minutes 56 seconds idle
On since Tue Jul 17 14:11 (WIT) on tty2 58 minutes 14 seconds idle
Mail last read Sat Jul 7 16:21 2007 (WIT)
No Plan.
Solution: comment out the ‘finger’ line in /etc/inetd.conf
Risk Factor : Low
CVE : CVE-1999-0612
Plugin ID : 10068
Port is open
Plugin ID : 11219
A finger server seems to be running on this port
Plugin ID : 10330
http (80/tcp)
Port is open
Plugin ID : 11219
The service closed the connection after 0 seconds without sending any data
It might be protected by some TCP wrapper
Plugin ID : 10330
time (37/tcp)
Port is open
Plugin ID : 11219
A time server seems to be running on this port
Plugin ID : 10330
smtp (25/tcp)
The remote SMTP server answers to the EXPN and/or VRFY commands.
The EXPN command can be used to find the delivery address of mail aliases, or
even the full name of the recipients, and the VRFY command may be used to check the validity of an account.
Your mailer should not allow remote users to use any of these commands,
because it gives them too much information.
Solution: if you are using Sendmail, add the option :
O PrivacyOptions=goaway
in /etc/sendmail.cf.
Risk Factor : Low
CVE : CVE-1999-0531
Plugin ID : 10249
Port is open
Plugin ID : 11219
An SMTP server is running on this port
Here is its banner :
220 darkstar.example.net ESMTP Sendmail 8.12.8/8.12.8
Tue, 17 Jul 2007 15:10:07 +0700
Plugin ID : 10330
Synopsis :
An SMTP server is listening on the remote port.
Description :
The remote host is running a mail (SMTP) server on this port.
Since SMTP servers are the targets of spammers, it is recommended you
disable it if you do not use it.
Solution:
Disable this service if you do not use it, or filter incoming traffic
to this port.
Risk Factor :
None
Plugin output :
Remote SMTP server banner :
220 darkstar.example.net ESMTP Sendmail 8.12.8/8.12.8
Tue, 17 Jul 2007 15:10:07 +0700
Plugin ID : 10263
ftp (21/tcp)
The remote host is running a version of ProFTPd which seems
to be vulnerable to a buffer overflow when a user downloads
a malformed ASCII file.
An attacker with upload privileges on this host may abuse this
flaw to gain a root shell on this host.
The author of ProFTPD did not increase the version number
of his product when fixing this issue, so it might be false
positive.
Solution: Upgrade to ProFTPD 1.2.9 when available or to 1.2.8p
Risk Factor : High
BID : 8679
Plugin ID : 11849
It was possible to freeze or reboot Windows by
reading a MS/DOS device through FTP, using
a file name like CONCON, AUX.htm or AUX.
A cracker may use this flaw to make your
system crash continuously, preventing
you from working properly.
Solution: upgrade your system or use a
FTP server that filters those names out.
Reference : http://support.microsoft.com/default.aspx?scid=KB
en-us
Q256015
Reference : http://online.securityfocus.com/archive/1/195054
Risk Factor : High
Plugin ID : 10929
dst……….
weleh….weleh…welehh mas dani kenapa aku koq gak menang yaaa padahal jauh2 datang dr SBY ke BALI…
kacian dech…aku…
fl3xu5, websitenya menarik gue suka sama layoutnya. gak neko2
oke deh.. share dong ilmunya sama gue yah…
thx 🙂