How-To
Services
Internal
Historical
External Tools
Providers:
Person | Hostname | Net | Description | Contact |
---|---|---|---|---|
aix | entropy.aix.ovh & entropy.aix.dn42 | clearnet & dn42 | See below | aix @ hackint |
mortzu | shell.mortzu.dn42 | dn42 only | - | - |
The Entropy shellbox runs a Grsecurity secured kernel, along with various other hardening features such as RBAC and some sysctl tweaks. It has an internal mail system which anyone can use to contact a shell user ([user]@entropy.aix.ovh
). Mail is also accepted to shell users from external mail servers. Additionally, it has all of the BlackArch tools installed and available for everyone to use.
To further enhance security, the ownership of various SUID executables and logs has been restricted to members of certain groups, which are nicely explained by the MOTD:
tpe: allows you to execute files not in root-owned
directories writeable only by root
nosock: cannot open any sockets
noclisock: cannot open client sockets
noservsock: cannot open server sockets
viewproc: can see all processes on the system
suid: can run `su`, `sudo`, `gpasswd` and `chage`
usrsuid: can run `newgrp`, `chsh`, `chfn` and `at`
share: can write to `/srv/share`
snoop: can see users logged on to the system
and their addresses
msg: can run `wall` and `write`
cron: can use the cron system
volumes: can use `mount`, `umount` and `mount.nfs`
audit: your activities are logged
By default, users will be part of only tpe
and audit
groups (as well as their own) but may request to be added to other groups. Please note that only execve()
and chdir()
calls are logged as a result of a user's membership of the audit
group.
Lastly, in the interests of full disclosure, here are the details of the box.
Hosted by: BURBLE-MNT, GRMML-MNT, XUU-MNT, JAN-MNT, LARE-MNT, SARU-MNT, ANDROW-MNT, MARK22K-MNT | Accessible via: dn42, dn42.dev, dn42.eu, wiki.dn42.us, dn42.de (IPv6-only), dn42.cc (wiki-ng), dn42.wiki, dn42.pp.ua, dn42.obl.ong
Last edited by Simon Marsh, 2020-03-07 23:24:01