<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to Home</title><link>https://sourceforge.net/p/flippingbitbot/wiki/Home/</link><description>Recent changes to Home</description><atom:link href="https://sourceforge.net/p/flippingbitbot/wiki/Home/feed" rel="self"/><language>en</language><lastBuildDate>Wed, 21 Aug 2013 17:05:25 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/flippingbitbot/wiki/Home/feed" rel="self" type="application/rss+xml"/><item><title>Home modified by bwall</title><link>https://sourceforge.net/p/flippingbitbot/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v8
+++ v9
@@ -4,6 +4,8 @@

 There are no supplied credentials, and it is intended that the network services on the VM are the attack vectors.

+You can find more information about Bitbot here: http://cylance.com/techblog/A-Study-in-Bots-Bitbot.shtml
+
 If you have questions, feel free to ask in #vulnhub on freenode(I'm bwall on there). You can also ask me on Twitter(@botnet_hunter).  You can also email me at bwall(at)ballastsecurity.net

 [[download_button]]
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">bwall</dc:creator><pubDate>Wed, 21 Aug 2013 17:05:25 -0000</pubDate><guid>https://sourceforge.netbd43abe10731af6f189eb6dc6a4cb508202d6123</guid></item><item><title>Home modified by bwall</title><link>https://sourceforge.net/p/flippingbitbot/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v7
+++ v8
@@ -1,5 +1,3 @@
-This vulnerable VM is in BETA.  Please report any issues that may be blocking your ability to complete the challenge, but try to do so privately to avoid spoiling it for others.
-
 This is a Linux based VM that is intended as a way to get security researchers started with simple botnet research. It also requires the researcher have some ability to assess and exploit vulnerabilities, with the ultimate goal of obtaining root access to the VM. This is the second of many to come, please feel free to supply feedback so I can make future ones more enjoyable and fulfilling.

 The network configuration of the VM is set to auto, so it is easiest to run with some sort of DHCP server on the same network(or just select the NAT option in your virtualization software). It is suggested that you use the NAT option along with port forwarding, but as long as you have TCP access to the VM, you should be fine.
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">bwall</dc:creator><pubDate>Tue, 20 Aug 2013 03:19:28 -0000</pubDate><guid>https://sourceforge.net527a2e0d8cbf8eb349ef6fa43d752c66fb41df0c</guid></item><item><title>Home modified by bwall</title><link>https://sourceforge.net/p/flippingbitbot/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v6
+++ v7
@@ -6,6 +6,6 @@

 There are no supplied credentials, and it is intended that the network services on the VM are the attack vectors.

-If you have questions, feel free to ask in #vulnhub on freenode(I'm bwall on there). You can also ask me on Twitter(@botnet_hunter).  You can also email me at bwall [at] ballastsecurity.net
+If you have questions, feel free to ask in #vulnhub on freenode(I'm bwall on there). You can also ask me on Twitter(@botnet_hunter).  You can also email me at bwall(at)ballastsecurity.net

 [[download_button]]
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">bwall</dc:creator><pubDate>Mon, 19 Aug 2013 22:55:45 -0000</pubDate><guid>https://sourceforge.net8e71ae3bdb179a94c19046821485bd585f8de103</guid></item><item><title>Home modified by bwall</title><link>https://sourceforge.net/p/flippingbitbot/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v5
+++ v6
@@ -6,6 +6,6 @@

 There are no supplied credentials, and it is intended that the network services on the VM are the attack vectors.

-If you have questions, feel free to ask in #vulnhub on freenode(I'm bwall on there). You can also ask me on Twitter(@botnet_hunter).
+If you have questions, feel free to ask in #vulnhub on freenode(I'm bwall on there). You can also ask me on Twitter(@botnet_hunter).  You can also email me at bwall [at] ballastsecurity.net

 [[download_button]]
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">bwall</dc:creator><pubDate>Mon, 19 Aug 2013 22:55:23 -0000</pubDate><guid>https://sourceforge.net21c768fbfb411164e542818ddab2201130407f18</guid></item><item><title>Home modified by bwall</title><link>https://sourceforge.net/p/flippingbitbot/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v4
+++ v5
@@ -1,4 +1,4 @@
-This vulnerable VM is in BETA.  Please report any issues that may be blocking your ability to complete the challenge, but try to do so privately to avoid spoiling it for other.
+This vulnerable VM is in BETA.  Please report any issues that may be blocking your ability to complete the challenge, but try to do so privately to avoid spoiling it for others.

 This is a Linux based VM that is intended as a way to get security researchers started with simple botnet research. It also requires the researcher have some ability to assess and exploit vulnerabilities, with the ultimate goal of obtaining root access to the VM. This is the second of many to come, please feel free to supply feedback so I can make future ones more enjoyable and fulfilling.

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">bwall</dc:creator><pubDate>Mon, 12 Aug 2013 19:43:21 -0000</pubDate><guid>https://sourceforge.net29946d47759c03c6b5035f4a92c73236fbed69cc</guid></item><item><title>Home modified by bwall</title><link>https://sourceforge.net/p/flippingbitbot/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v3
+++ v4
@@ -1,3 +1,5 @@
+This vulnerable VM is in BETA.  Please report any issues that may be blocking your ability to complete the challenge, but try to do so privately to avoid spoiling it for other.
+
 This is a Linux based VM that is intended as a way to get security researchers started with simple botnet research. It also requires the researcher have some ability to assess and exploit vulnerabilities, with the ultimate goal of obtaining root access to the VM. This is the second of many to come, please feel free to supply feedback so I can make future ones more enjoyable and fulfilling.

 The network configuration of the VM is set to auto, so it is easiest to run with some sort of DHCP server on the same network(or just select the NAT option in your virtualization software). It is suggested that you use the NAT option along with port forwarding, but as long as you have TCP access to the VM, you should be fine.
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">bwall</dc:creator><pubDate>Mon, 12 Aug 2013 19:40:46 -0000</pubDate><guid>https://sourceforge.net3033b358618c5c26631d02fcd568f3c3b815eaca</guid></item><item><title>Home modified by bwall</title><link>https://sourceforge.net/p/flippingbitbot/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v2
+++ v3
@@ -1,6 +1,9 @@
 This is a Linux based VM that is intended as a way to get security researchers started with simple botnet research. It also requires the researcher have some ability to assess and exploit vulnerabilities, with the ultimate goal of obtaining root access to the VM. This is the second of many to come, please feel free to supply feedback so I can make future ones more enjoyable and fulfilling.
+
 The network configuration of the VM is set to auto, so it is easiest to run with some sort of DHCP server on the same network(or just select the NAT option in your virtualization software). It is suggested that you use the NAT option along with port forwarding, but as long as you have TCP access to the VM, you should be fine.
+
 There are no supplied credentials, and it is intended that the network services on the VM are the attack vectors.
+
 If you have questions, feel free to ask in #vulnhub on freenode(I'm bwall on there). You can also ask me on Twitter(@botnet_hunter).

 [[download_button]]
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">bwall</dc:creator><pubDate>Mon, 12 Aug 2013 06:48:49 -0000</pubDate><guid>https://sourceforge.net3fd0ff9fecfec9867fd4dc7593a01914df4d3e8d</guid></item><item><title>Home modified by bwall</title><link>https://sourceforge.net/p/flippingbitbot/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v1
+++ v2
@@ -1,8 +1,6 @@
-Welcome to your wiki!
+This is a Linux based VM that is intended as a way to get security researchers started with simple botnet research. It also requires the researcher have some ability to assess and exploit vulnerabilities, with the ultimate goal of obtaining root access to the VM. This is the second of many to come, please feel free to supply feedback so I can make future ones more enjoyable and fulfilling.
+The network configuration of the VM is set to auto, so it is easiest to run with some sort of DHCP server on the same network(or just select the NAT option in your virtualization software). It is suggested that you use the NAT option along with port forwarding, but as long as you have TCP access to the VM, you should be fine.
+There are no supplied credentials, and it is intended that the network services on the VM are the attack vectors.
+If you have questions, feel free to ask in #vulnhub on freenode(I'm bwall on there). You can also ask me on Twitter(@botnet_hunter).

-This is the default page, edit it as you see fit. To add a new page simply reference it within brackets, e.g.: [SamplePage].
-
-The wiki uses [Markdown](/p/flippingbitbot/wiki/markdown_syntax/) syntax.
-
-[[members limit=20]]
 [[download_button]]
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">bwall</dc:creator><pubDate>Mon, 12 Aug 2013 06:48:23 -0000</pubDate><guid>https://sourceforge.net53847ad4b1742c1380de0fdaca19b72738c642d7</guid></item><item><title>Home modified by bwall</title><link>https://sourceforge.net/p/flippingbitbot/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Welcome to your wiki!&lt;/p&gt;
&lt;p&gt;This is the default page, edit it as you see fit. To add a new page simply reference it within brackets, e.g.: &lt;span&gt;[SamplePage]&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;The wiki uses &lt;a class="" href="/p/flippingbitbot/wiki/markdown_syntax/"&gt;Markdown&lt;/a&gt; syntax.&lt;/p&gt;
&lt;p&gt;&lt;h6&gt;Project Members:&lt;/h6&gt;
&lt;ul class="md-users-list"&gt;
&lt;li&gt;&lt;a href="/u/nightstrike9809/"&gt;bwall&lt;/a&gt; (admin)&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;/p&gt;&lt;p&gt;&lt;span class="download-button-520884adbcf63a07ff945ad8" style="margin-bottom: 1em; display: block;"&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">bwall</dc:creator><pubDate>Mon, 12 Aug 2013 06:46:06 -0000</pubDate><guid>https://sourceforge.netb29480a7c06f60a94fae713fa5327bfe8df016b6</guid></item></channel></rss>