Date: Thu, 12 Aug 1999 10:55:17 -0700 (PDT) From: Brian <bri@sonicboom.org> To: "Bill A. K." <billieakay@yahoo.com> Cc: Berndt WULF <Bwulf@quiktrak.com.au>, questions@FreeBSD.ORG Subject: Re: Microsoft ask users to crack win2000 site (fwd) Message-ID: <Pine.BSF.4.10.9908121054500.28575-100000@adsl-216-102-203-44.dsl.snfc21.pacbell.net> In-Reply-To: <000b01bee3af$a8af5f40$01010101@bopper>
next in thread | previous in thread | raw e-mail | index | archive | help
www.slashdot.org has lots of notes on it and other things UNIX. =09=09=09=09Bri On Wed, 11 Aug 1999, Bill A. K. wrote: > Does anybody have any information on how to get in on this MS testing >=20 > please let me know >=20 >=20 > bill > billieakay@yahoo.com >=20 > ----- Original Message ----- > From: Berndt WULF <Bwulf@quiktrak.com.au> > To: <rbettle@criterion-group.com>; <jhorn1@desperate.ci.tucson.az.us> > Cc: <freebsd-questions@FreeBSD.ORG>; <misc@openbsd.org> > Sent: Tuesday, August 10, 1999 10:18 PM > Subject: Re: Microsoft ask users to crack win2000 site (fwd) >=20 >=20 > Worse still, do we want to debug their operating sytem for them free of > charge? > After all, this is a task for MS' software test engineers - right? >=20 > cheerio Berndt >=20 > >>> Roy Bettle <rbettle@criterion-group.com> 11/08/99 2:45:18 >>> > Two issues to bear in mind: >=20 > 1) M$ is having a hard enough time just getting the Win2K computer to sta= y > running. The first time they turned it on and placed it "in the line of > fire" > for this challenge, it crashed within 4 hours and was subsequently down f= or > over 24 hours. >=20 > Summary: Do any of us in the *BSD community want to be associated with > something so ridiculously unstable? >=20 > 2) This is obviously an attempt by M$ to have those of us in the Open Sou= rce > community help them learn how to write a decent OS. >=20 > Summary: After all the crap we've had to put up with from M$ - from the > media > to the products we may have had to support in our "day jobs" - do we real= ly > want to help these $%!^*()& at all? >=20 > Just my $0.02. >=20 > RAB >=20 >=20 > John Horn wrote: >=20 > > This came through on BUGTRAQ last week. A new posting on BUGTRAQ indica= tes > > that LinuxPPC has issued a similar challenge with similar or identical > > rules. I'm wondering if there may be some fame or notoriety to be gaine= d > > for OBSD by joining in this challenge. It probably won't be difficult, > > or long, before someone breaks in to the NT2K challenge site so there m= ay > > not be much time. > > > > Just an idea. > > > > Regards: > > > > John Horn > > City of Tucson, IT Dept. > > jhorn1@desperate.ci.tucson.az.us > > > > ---------- Forwarded message ---------- > > Date: Tue, 3 Aug 1999 19:05:33 +0200 > > From: Peter Lowe <pgl@ti.cz> > > To: BUGTRAQ@SECURITYFOCUS.COM > > Subject: Microsoft ask users to crack win2000 site > > > > [ executive summary: Microsoft are asking you to crack their > > machine running on win2k and iis. ] > > > > I haven't seen anything about this on bugtraq before, and I'm not > > entirely sure if it's appropriate, but this is from > > http://www.windows2000test.com/ground_rules.htm: > > > > Microsoft Internet Explorer > > Microsoft Windows 2000 Server with Internet Information Server. > > > > Ground Rules > > > > 1. Make it Interesting > > > > Good safe computing practices on the Internet involve placing > > critical systems behind firewall-type devices. For this > > testing, we are intentionally not putting these machines behind > > a firewall. This mean that you could slow these machines down > > by tossing millions of random packets at them if you have > > enough bandwidth on your end. If that happens, we will simply > > start filtering traffic. Instead, find the interesting "magic > > bullet" that will bring the machine down. > > > > 2. Compromise an account > > > > Windows 2000 computers can have multiple user accounts and > > groups. See if you can find a way to logon with one of these > > accounts. > > > > 3. Change something you shouldn't have access to > > > > See if you can change any files or content on the server. If > > you manage, no foul or rude statements please. > > > > 4. Get something you shouldn't have > > > > There are hidden messages sprinkled around the computer. See if > > you can find them. > > > > 5. Our goal is to configure the system to thwart your attempts > > > > The goal is to see how a properly secured machine will stand up > > to attack. These machines are configured to prevent known > > attacks. > > > > 6. This is a test site > > > > You are welcome to attempt to compromise this site, and this > > site only. This is your chance to do a practical test of > > Microsoft Windows 2000's security. > > > > 7. Tell us about your exploits > > > > If you find something, send us some email at > > w2000its@microsoft.com. > > =A9 1999 Microsoft Corporation. All rights reserved. Terms of > > Use. > > > > -- > > Peter Lowe -- System Administrator, Telenor Internet > > http://www.ti.cz/ -- pgl@ti.cz > > > > Everything I know in life I learnt from .sigs. >=20 >=20 >=20 >=20 >=20 > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-questions" in the body of the message >=20 >=20 >=20 > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-questions" in the body of the message >=20 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9908121054500.28575-100000>