UGN Security
Posted By: Ghost Hack a PS3, win it - 12/18/06 07:01 AM
http://ps3.shimpinomori.net

This guy has a PS3 setup running FC5. If anyone can hack it under his terms and conditions, they get to keep it.

I've been trying my hand at it for shits and giggles.

The funny thing about this is that just about every TCP port from 0 to 65535 (if not all of them) respond as open, and yet very few actually run any sort of daemon. I haven't found any, other than SSH and HTTP (obviously) that do actually function.

Another funny thing that I found was that the robots.txt file in the root directory of the site lists admin/, but after noticing a few anomalies, I found that admin/ is symbolically linked to the directory directly above it.

http://ps3.shimpinomori.net/admin/a...min/admin/admin/admin/admin/admin/adminv

I'm planning on doing a Nessus probe when I finally download all the plugin updates.

Thought I'd let you guys know, in case you wanted to try your hand at it.
Posted By: Gremelin Re: Hack a PS3, win it - 12/18/06 07:32 AM
lol sounds awesome. He likely has a honeypot setup to see everyone who's attmepting anything; sounds kinda fun hehe
Posted By: Ghost Re: Hack a PS3, win it - 12/19/06 12:26 AM
So yeah; there don't seem to be any services running, other than SSH and HTTP. The HTTP server that it runs is publicfile, which seems to be optimized for security (I wasn't able to find any vulnerability reports on the web).

One thing though. There seems to be some sort of cryptogram in the source of the page, enclosed in HTML comments. My guess is that this contains the root login credentials. It has an interesting structure. The first and last lines are purely letters, and only the last long line contains letters in it. Curious.
© UGN Security Forum