Your browser does not seem to support CSS. If images appear below, please disregard them.
toggle
May
S M T W T F S
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31
Sponsored Links
Latest Postings
Topic Options
Rate This Topic
#41252 - 12/18/06 07:01 AM Hack a PS3, win it
Joined: Jun 2003
Posts: 807
Ghost Offline
UGN Super Poster
Ghost Offline
UGN Super Poster

Joined: Jun 2003
Posts: 807
Wisconsin
http://ps3.shimpinomori.net

This guy has a PS3 setup running FC5. If anyone can hack it under his terms and conditions, they get to keep it.

I've been trying my hand at it for shits and giggles.

The funny thing about this is that just about every TCP port from 0 to 65535 (if not all of them) respond as open, and yet very few actually run any sort of daemon. I haven't found any, other than SSH and HTTP (obviously) that do actually function.

Another funny thing that I found was that the robots.txt file in the root directory of the site lists admin/, but after noticing a few anomalies, I found that admin/ is symbolically linked to the directory directly above it.

http://ps3.shimpinomori.net/admin/admin/...in/admin/adminv

I'm planning on doing a Nessus probe when I finally download all the plugin updates.

Thought I'd let you guys know, in case you wanted to try your hand at it.

Top
Sponsored Links
#41257 - 12/18/06 07:32 AM Re: Hack a PS3, win it [Re: Ghost]
Joined: Feb 2002
Posts: 7,194
Gremelin Offline
Community Owner
Gremelin Offline

Community Owner

Joined: Feb 2002
Posts: 7,194
Portland, OR; USA
lol sounds awesome. He likely has a honeypot setup to see everyone who's attmepting anything; sounds kinda fun hehe


Donate to UGN Security here.
UGN Security, Back of the Web, and VNC Web Services Owner
Top
#41268 - 12/19/06 12:26 AM Re: Hack a PS3, win it [Re: Gremelin]
Joined: Jun 2003
Posts: 807
Ghost Offline
UGN Super Poster
Ghost Offline
UGN Super Poster

Joined: Jun 2003
Posts: 807
Wisconsin
So yeah; there don't seem to be any services running, other than SSH and HTTP. The HTTP server that it runs is publicfile, which seems to be optimized for security (I wasn't able to find any vulnerability reports on the web).

One thing though. There seems to be some sort of cryptogram in the source of the page, enclosed in HTML comments. My guess is that this contains the root login credentials. It has an interesting structure. The first and last lines are purely letters, and only the last long line contains letters in it. Curious.

Top

Member Spotlight
Gremelin

Gremelin
Portland, OR; USA
Posts: 7,194
Joined: February 2002
Show All Member Profiles 
Forum Statistics
Forums46
Topics45,521
Posts80,689
Members2,157
Most Online1,567
Apr 25th, 2010
Top Posters(All Time)
UGN Security 38,685
Gremelin 7,194
§intå× 3,255
SilentRage 1,273
Ice 1,146
pergesu 1,136
Infinite 1,041
jonconley 955
Girlie 908
unreal 860
Newest Members
Herbert_Sherbert, codemauve, Lillysdragon1984, Brewwit, boa
2157 Registered Users
Who's Online Now
0 registered members (), 3 guests and 2 spiders.
Latest News