Hack.net

Started by
1,333 comments, last by RedZep 18 years, 7 months ago
I pwn j0o all. Worship me! :P
Advertisement
Quote:Original post by jumpjumpjump
I pwn j0o all. Worship me! :P
What? you haven't solved the puzzle.
Yeah, but this is interesting.
Here is a clue from the owner.

Quote:Anyway... I also wanted to make a post about ninebows.com- my puzzle. It's pulling in lots of hits lately, and as I designed it, step two really separates the men from the boys. I get a lot of email about step 2, and the only thing I ever say is that it's a logical progression from the first step. And yes, there is a prize at the end. Enjoy. No special skills or tools are required to solve any step of the puzzle.
One of the DNS servers for hack.net, safron.hack.net, is also running a server on port 80.
Rate me up.
Quote:Original post by jumpjumpjump
I say we email/snailmail the admin! lol


The whois was pretty interesting. The domain servers in listed order thing gave two websites, one of which was a site which contained a bunch of stuff about hiking and being a hippy? serge.hack.net, however, arrogantly refuses my connection -- bringing me back to the port knocking thing. So I'm supposed to try to access a bunch of ports (by doing "serge.hack.net:<port#>")? What do the pluses and minuses mean, though, in the thing? (This is kinda hypocritical from what I said before, but bear with me)
It is likely that the prize is webspace for you to put "I got it."
if it were a port knock, I would be very, very surprised.
I agree with C-Junkie. First off, the logical sequence in hacking games does not go "check source, translate binary, port knocking." Thats missing...I dunno...like...3 months of learning in there somewhere. Another reason? Nobody's domain host would enjoy that much, and most ISPs might get fairly suspicious.

Those two together make me think it has nothing to do with port knocking.
Also, safron.hack.net == edina.hack.net

WWW.ninebows.com
PORT STATE SERVICE
21/tcp open ftp WU-FTPD 6.00LS
22/tcp open ssh OpenSSH 3.6.1p1 (protocol 1.99)
25/tcp open smtp Postfix smtpd
53/tcp open domain ISC Bind 4.X
80/tcp open http Apache httpd 1.3.29 ((Unix) PHP/4.3.4)
119/tcp open nntp
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
3389/tcp filtered ms-term-serv
8081/tcp open blackice-icecap

SERGE.HACK.NET
PORT STATE SERVICE
22/tcp open ssh
53/tcp open domain
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds

SAFFRON.HACK.NET
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
25/tcp open smtp
53/tcp open domain
80/tcp open http
119/tcp open nntp
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
3389/tcp filtered ms-term-serv
8081/tcp open blackice-icecap

[Edited by - aftermath on December 4, 2004 8:05:18 PM]
Rate me up.

This topic is closed to new replies.

Advertisement