Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 12 Aug 1999 10:55:17 -0700 (PDT)
From:      Brian <bri@sonicboom.org>
To:        "Bill A. K." <billieakay@yahoo.com>
Cc:        Berndt WULF <Bwulf@quiktrak.com.au>, questions@FreeBSD.ORG
Subject:   Re: Microsoft ask users to crack win2000 site (fwd)
Message-ID:  <Pine.BSF.4.10.9908121054500.28575-100000@adsl-216-102-203-44.dsl.snfc21.pacbell.net>
In-Reply-To: <000b01bee3af$a8af5f40$01010101@bopper>

next in thread | previous in thread | raw e-mail | index | archive | help
www.slashdot.org has lots of notes on it and other things UNIX.

=09=09=09=09Bri

On Wed, 11 Aug 1999, Bill A. K. wrote:

> Does anybody have any information on how to get in on this MS testing
>=20
> please let me know
>=20
>=20
> bill
> billieakay@yahoo.com
>=20
> ----- Original Message -----
> From: Berndt WULF <Bwulf@quiktrak.com.au>
> To: <rbettle@criterion-group.com>; <jhorn1@desperate.ci.tucson.az.us>
> Cc: <freebsd-questions@FreeBSD.ORG>; <misc@openbsd.org>
> Sent: Tuesday, August 10, 1999 10:18 PM
> Subject: Re: Microsoft ask users to crack win2000 site (fwd)
>=20
>=20
> Worse still, do we want to debug their operating sytem for them free of
> charge?
> After all, this is a task for MS' software test engineers - right?
>=20
> cheerio Berndt
>=20
> >>> Roy Bettle <rbettle@criterion-group.com> 11/08/99 2:45:18 >>>
> Two issues to bear in mind:
>=20
> 1) M$ is having a hard enough time just getting the Win2K computer to sta=
y
> running.  The first time they turned it on and placed it "in the line of
> fire"
> for this challenge, it crashed within 4 hours and was subsequently down f=
or
> over 24 hours.
>=20
> Summary:  Do any of us in the *BSD community want to be associated with
> something so ridiculously unstable?
>=20
> 2) This is obviously an attempt by M$ to have those of us in the Open Sou=
rce
> community help them learn how to write a decent OS.
>=20
> Summary:  After all the crap we've had to put up with from M$ - from the
> media
> to the products we may have had to support in our "day jobs" - do we real=
ly
> want to help these $%!^*()& at all?
>=20
> Just my $0.02.
>=20
> RAB
>=20
>=20
> John Horn wrote:
>=20
> > This came through on BUGTRAQ last week. A new posting on BUGTRAQ indica=
tes
> > that LinuxPPC has issued a similar challenge with similar or identical
> > rules. I'm wondering if there may be some fame or notoriety to be gaine=
d
> > for OBSD by joining in this challenge. It probably won't be difficult,
> > or long, before someone breaks in to the NT2K challenge site so there m=
ay
> > not be much time.
> >
> > Just an idea.
> >
> > Regards:
> >
> > John Horn
> > City of Tucson, IT Dept.
> > jhorn1@desperate.ci.tucson.az.us
> >
> > ---------- Forwarded message ----------
> > Date: Tue, 3 Aug 1999 19:05:33 +0200
> > From: Peter Lowe <pgl@ti.cz>
> > To: BUGTRAQ@SECURITYFOCUS.COM
> > Subject: Microsoft ask users to crack win2000 site
> >
> > [ executive summary: Microsoft are asking you to crack their
> >   machine running on win2k and iis. ]
> >
> > I haven't seen anything about this on bugtraq before, and I'm not
> > entirely sure if it's appropriate, but this is from
> > http://www.windows2000test.com/ground_rules.htm:
> >
> >                     Microsoft Internet Explorer
> >    Microsoft Windows 2000 Server with Internet Information Server.
> >
> > Ground Rules
> >
> >    1. Make it Interesting
> >
> >    Good safe computing practices on the Internet involve placing
> >    critical systems behind firewall-type devices. For this
> >    testing, we are intentionally not putting these machines behind
> >    a firewall. This mean that you could slow these machines down
> >    by tossing millions of random packets at them if you have
> >    enough bandwidth on your end. If that happens, we will simply
> >    start filtering traffic. Instead, find the interesting "magic
> >    bullet" that will bring the machine down.
> >
> >    2. Compromise an account
> >
> >    Windows 2000 computers can have multiple user accounts and
> >    groups. See if you can find a way to logon with one of these
> >    accounts.
> >
> >    3. Change something you shouldn't have access to
> >
> >    See if you can change any files or content on the server. If
> >    you manage, no foul or rude statements please.
> >
> >    4. Get something you shouldn't have
> >
> >    There are hidden messages sprinkled around the computer. See if
> >    you can find them.
> >
> >    5. Our goal is to configure the system to thwart your attempts
> >
> >    The goal is to see how a properly secured machine will stand up
> >    to attack. These machines are configured to prevent known
> >    attacks.
> >
> >    6. This is a test site
> >
> >    You are welcome to attempt to compromise this site, and this
> >    site only. This is your chance to do a practical test of
> >    Microsoft Windows 2000's security.
> >
> >    7. Tell us about your exploits
> >
> >    If you find something, send us some email at
> >    w2000its@microsoft.com.
> >    =A9 1999 Microsoft Corporation. All rights reserved. Terms of
> >    Use.
> >
> > --
> > Peter Lowe -- System Administrator, Telenor Internet
> > http://www.ti.cz/ -- pgl@ti.cz
> >
> > Everything I know in life I learnt from .sigs.
>=20
>=20
>=20
>=20
>=20
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-questions" in the body of the message
>=20
>=20
>=20
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-questions" in the body of the message
>=20



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9908121054500.28575-100000>