This blog is part of a legitimate project made possible by the IT department at the college I attend to investigate several relatively untouched aspects of computer security, hacktivism, network architecture, and advanced cryptography. The end result will be data gathered from a bastion host as part of a joint project to determine whether "blackhats, Greyhats and the sort" can be properly integrated into a colleg environment and helpful with supplying cognizance and insider techniques into defending campus networks. The box will be operational in the next few weeks and will be open to intrusion attempts from whom ever thinks they have both the talent and bravery. Please help in making this project succeed by helping spam this blog and gathering enough talent to allow for a good data set, also please be refined in your approach(not the penetration but post attack documentation). Credit will be supplied to the first user to gain root access.
The blog I need help with is nightstalker777.wordpress.com.