n00bzUnit3d

17 posts

n00bzUnit3d banner
n00bzUnit3d

n00bzUnit3d

@n00bzunit3d

Twitter account for ctf team n00bzunit3d. CTFTime: https://t.co/eKPpARoBIY Website: https://t.co/ikpfyAmgla

Katılım Mayıs 2022
6 Takip Edilen42 Takipçiler
Paul Melson
Paul Melson@pmelson·
Hi @Namecheap team! This domain (n00bzunit3d[.]xyz) is hosting Empire malware C2. Can you take them offline please?
ScumBots@ScumBots

#PowerShellEmpireAgent SHA256: 1b9c291c4dca0f4af299a0ece26a7c3b3f87a0a7eb9f5b57aa7c894774c40407 C2: http://wiki[.]n00bzunit3d[.]xyz:8080

English
7
6
60
0
n00bzUnit3d
n00bzUnit3d@n00bzunit3d·
@pmelson @shishcat8214 @Namecheap @ScumBots Hey, thank you! We actually did not know that the challenge file had been uploaded to Pastebin, cause that generally makes it look fishy. Just a tip for your bot: Maybe visit the sites to make sure they are actually bad? Just a thought, no hard feelings :)
English
1
0
1
0
Paul Melson
Paul Melson@pmelson·
@shishcat8214 @Namecheap @ScumBots I’m sorry you were inconvenienced, genuinely I am. But it was a legit abuse report based on available information. I will add “n00bzunit3d[.]xyz” to @ScumBots bogon list so it won’t report on your domain again in the future.
English
1
0
0
0
n00bzUnit3d
n00bzUnit3d@n00bzunit3d·
@pmelson @Namecheap @ScumBots And I would also appreciate if you could send me the source from which you obtained the said samples. It might be that the source is from github.com/n00bzUnit3d/n0…, or somewhere similar, which is just a part of our previous CTF. It's just a dummy for a forensics challenge.
English
1
0
1
0
n00bzUnit3d
n00bzUnit3d@n00bzunit3d·
@pmelson @Namecheap @ScumBots Hey Paul, I really don't think there is anything there, wiki[.]n00bzunit3d[.]xyz:8080 just redirects to the main wiki page, but if you think I'm wrong, please dm me. If there is anything bad going on, I would appreciate help in getting it resolved - not getting banned permanently
English
0
0
1
0
n00bzUnit3d
n00bzUnit3d@n00bzunit3d·
@GossiTheDog Well seems like our CTF is getting promoted for next year😝
English
0
0
12
0
n00bzUnit3d
n00bzUnit3d@n00bzunit3d·
@frekason @GossiTheDog The CTF got over a week ago, the bot which actually tweeted about us went through our writeups repo (github.com/n00bzUnit3d/n0…). We had a challenge with a dummy empire stager with the link to wiki[.]n00bzunit3d[.]xyz port 8080 which it thought is "live malware" and had us nuked😂
English
0
0
5
0
Frekason
Frekason@frekason·
@GossiTheDog Turns out it was a live CTF site and it was restored
English
2
0
31
0
n00bzUnit3d
n00bzUnit3d@n00bzunit3d·
@pmelson @Namecheap If you still believe that we are hosting malware, please email/dm me - we need the domain.
English
0
0
3
0
n00bzUnit3d
n00bzUnit3d@n00bzunit3d·
@pmelson @Namecheap Maybe you thought it is malware because there was a forensics challenge in our ctf which posed the wiki domain as a malware hosting domain. It was fake and there was no malware - it was just for the flag. Link to the challenge writeup: github.com/n00bzUnit3d/n0…
English
0
0
2
0
n00bzUnit3d
n00bzUnit3d@n00bzunit3d·
A very big thanks to OtterSec for sponsoring n00bzCTF. Thanks to them for helping us have cash prizes :)
English
0
0
1
0