<div dir="ltr">We had a few flags at the the Hackfest last Saturday, obtained while we were providing a fairly complex presentation on Spoofing.<div> </div><div>Pentester/hacker: John Peters (19 years old) [he signed his work:]</div>
<div>Flag/target: <a href="http://12.159.65.86/">http://12.159.65.86/</a></div><div><br><div>We also had four people obtain the wireless password (configured as "password)" for WPA2. Unfortunately, the AP was not plugged into upstream, so while you could get a dhcp address, you could not get "internet". Additionally, the firmware image had been hacked and replaced by someone who did not claim their flag (which often happens at hackfests). The creative trick here was accessing the wireless router via management interface using the default password (which was done).</div>
<div><br></div><div>October Spoofing Presentation: </div><div><a href="http://it-clowns.com/c/files/drawer/SPOOFING-be_afraid_very_afraid.odp">http://it-clowns.com/c/files/drawer/SPOOFING-be_afraid_very_afraid.odp</a><br>
</div><div><br></div><div>See you in November for a presentation by David Demland (and a ton more flags).</div>-- <br>(503) 754-4452 Android<br>(623) 239-3392 Skype<br>(623) 688-3392 Google Voice<br>Chief Clown<br><br><br>
<br><br><br><br><br><br><br><br><br><br><br>
</div></div>