A Network for Information Security Professionals
HIRCNetwork is a network that welcomes information security professionals from all around the world.
IRC Server Information
To connect to our network use the following information:
Server Address: mHUB.HIRCNetwork.com Ports: +6697 (SSL) / 6667 (NON-SSL)
SSL Certificate Information
A new certificate was installed on March 13th 2013. Please use the updated checksums below !
Issuer: C=A2/ST=Satellite/O=HIRCNetworx/OU=InfoSec/CN=mHUB.HIRCNetwork.com Subject: C=A2/ST=Satellite/O=HIRCNetworx/OU=InfoSec/CN=mHUB.HIRCNetwork.com Ciphers: AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1 SHA1 Fingerprint: 4F:32:70:C8:4C:AD:38:E7:9B:FC:DF:C6:FD:87:AF:70:13:CD:59:BB MD5 Fingerprint: 5F:E1:5D:3A:CD:56:A8:91:74:DC:47:1B:66:31:E6:49 [DEPRECATED]
In order to get the fingerprints either use your IRC client or run one of the following commands in your terminal, with GnuTLS:
gnutls-cli -p 6697 mhub.hircnetwork.com
Using OpenSSL library and toolkit:
openssl s_client -connect mhub.hircnetwork.com:6697 | openssl x509 -noout -fingerprint
Note that creating a collision in MD5 is likely to happen nowadays, MD5 fingerprint is only provided for compatibility reasons or can be used to double check the authenticity of the certificate.
TOR and Hidden Service
You can connect to our network using TOR without restrictions. In fact we encourage our users to use TOR and SSL. However some exit nodes might be blocked if we get a lot of abusers from that node, if you encounter a K:Lined node, simply change your exit node.
You can connect to our IRC network without leaving the TOR network by connecting to this address
by simply setting your IRC client to route connections via port 9050 (default) on your localhost then:
/SERVER g4fgcymm27afes2d.onion +6697 <password> or 6667 for NON-SSL
However to prevent abuse you need to be added to a white-list in order to join.
To do so register your nick with NICKSERV, choose a strong password and join the IRC via TOR and the WebIRC, find dNetGuru (You can leave a memo using MEMOSERV if not online) and provide him with the hash of your password (SHA1) and your ident (you don't need identd running) to be added to the white-list.
Again, we don't want to enforce anything but again we don't want to get flooded by tor abusers !
#MW is our Malware Analysis Community
#Linux is our Linux interest group with a focus on security