Select an option from the HackMiami Pwn-Off drop down menu above
Also, please visit the AntiVirus CVE option from the menu above or click here
The network main switch was a CISCO 881W. We had a box running SLAX to capture the traffic for analysis after the event. The resulting traffic generated a PCAP file that requires over 4 gb of RAM to open with Wire Shark. (Denial of Service Exploit)
For our VM Targets, we used 2 hosts, the Beast and Satan.
The Beast is a machine born for gaming but with 24 gigs of RAM was able to host several hosts/targets.
Satan was a home built machine representing Windows, OSX and several versions of the penguin.
The Beast
The VM's that we had one the network are as follow:
- Windows NT SP6
- Windows 2000 SP4
- Windows XP Professional SP1
- Windows XP Professional SP2
- Windows XP Professional SP3
- Windows 7 Ultrimate Edition
- Windows Server 2003
- RedHat 6.2
- Solaris 8 x86
- Ubuntu Desktop 10.4 32-Bit
- Ubuntu Desktop 9.10 32-Bit
- Ubuntu Desktop 9.10 32-Bit
- Ubuntu Desktop 8.10 32-Bit
- SUSE 11
- Debian 5
- Hackerdemia
- De-ICE 1.100
- De-ICE 1.110
- De-ICE 2.100
- pWnOS/Ubuntu
- OSX 10.6.3
- Windows ME
Our attacking computers had both CANVAS and Metasploit Express running on Unbuntu 10.04. Core Impact PRO was running on Windows XP SP3. We used Firefox to load the Metasploit Express Web Console.
A big special thanks to all the people who put in such hard work to make this a successful event. The faces have been blanked out to protect the guilty. Just because you're paranoid, doesn't mean they're not after you.