![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#1 |
Confirmed User
Join Date: Jul 2003
Location: in yoOoo kitchen
Posts: 6,984
|
Verotel password problems - STILL!
A little while back there was huge post on Verotel's password files being accessd/haxored and being posted on various boards.
Im still having this problem, 99% is my verotel users...What was the solution to these problems for those using verotel? I would do a search but Lensman shut it off cause Amp was attacking gfy thru it. ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#2 |
Too lazy to set a custom title
Industry Role:
Join Date: Jul 2001
Posts: 59,204
|
Verotel is going out of business one of these days anyway, you might as well switch now to keep the damage minimal.
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#3 |
Confirmed User
Join Date: Mar 2004
Location: Dallas
Posts: 874
|
I added the following to one of our clients verotel script:
$remote_address = $ENV{'REMOTE_ADDR'}; $remote_address =~m!^195.20.32! || die "access denied to $remote_address to run this script."; near the top, that stops anyone but verotels class C range from running the script. people were saying it's more likely verotel themselves were hacked because only verotel passwords were leaking, not ccbill etc. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#4 | |
Confirmed User
Industry Role:
Join Date: Nov 2003
Posts: 8,053
|
Quote:
__________________
Programs that owe me money ---- Epassporte.com ~ $2700 | Protraffic.com ~ $2600 | XonDemand.com ~ $3000 Email: [email protected] |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#5 | |
Confirmed User
Join Date: Jul 2003
Location: in yoOoo kitchen
Posts: 6,984
|
Quote:
did well with them for 2 weeks then it just all went to shit... What do you know about verotel? Speak up please, people are listening |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#6 | |
Too lazy to set a custom title
Industry Role:
Join Date: Jul 2001
Posts: 59,204
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#7 | |
Confirmed User
Join Date: Sep 2002
Posts: 3,626
|
Quote:
![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#8 |
Confirmed User
Join Date: Jul 2003
Location: in yoOoo kitchen
Posts: 6,984
|
Thx Xeno, Ill see what i can do with that snippet of code.
Got to figure out where to paste it lol ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#9 |
Richest man in Babylon
Industry Role:
Join Date: Jan 2002
Location: Posts: 10,002
Posts: 5,726
|
I had heard that somone had managed to get a grip on the method used to generate the Verotel number pairs. If you have a list of 10000 or so valid pairs you will be able to brute force any Verotel site. Same thing with Ibill 900 pincodes, on occasion they will leak out as well.
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#10 |
Confirmed User
Join Date: Mar 2004
Location: Dallas
Posts: 874
|
I normally do it towards the top, near where all the settings variables are, password, directory etc.
to ensure it executes first. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#11 | |
Confirmed User
Join Date: Jul 2003
Location: in yoOoo kitchen
Posts: 6,984
|
Quote:
![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#12 | |
Richest man in Babylon
Industry Role:
Join Date: Jan 2002
Location: Posts: 10,002
Posts: 5,726
|
Quote:
This is a good step but there are others. Firstly you should rename verotelrum.pl and if you are having trouble that would solve most of it. The other thing is to review your apache access_log to see where it is being executed and by whom. Chances are you will find nothing out of the ordinary. On one of my sites I got a really slick Ibill password hacker causing me grief. I thought he was somehow able to view the .htpasswd file and was then decrypting the passwords. But I sure as shit don't see how. There is a new breed of password hackers now who are really good. |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#13 |
Confirmed User
Join Date: Mar 2004
Location: Dallas
Posts: 874
|
.htpasswd should utilize the MD5 hash algorithm, which is a one way hash, so it cannot be decrypted, just brute forced with a dictionary attack.
also .ht* is protected in the default apache config, to stop it being displayed. It's more than likely they're accessing the verotellog.txt which contains userid/password combo. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#14 |
Confirmed User
Join Date: Mar 2004
Location: Dallas
Posts: 874
|
You can greatly limit your exposure to a web based intrusion with a few simple
changes. CGI scripts: do you need all the ones you have? you may have changed scripts or stopped using a script but did not delete/disable the older version, check your directories for executable scripts you are not using, they might be vulnerable. avoid world writable permissions on your scripts & files, I have seen people who write data to their other websites who keep their home and public_html world writable so their other site can write files to it (bad idea!) If the web server can write to your home directory or files, the attacker can insert backdoors, or even deface your webpage, I notice a lot of the credit card processing companies require your .htpasswd to be world-writable so their scripts can write to it, if an attacker can gain control of apache (via CGI or direct exploitation) they can insert their own username or passwords into your password file(s), I am often amazed that insecurely coded CGI scripts are issued by CC merchants, with the nature of the information they process, and the amount of profit they make I would have thought they would have their scripts audited for security problems by a third-party - but alas no, if you know anyone who knows perl/python ask them to check your scripts for you, especially for input validation attacks, via metacharacters - anyone who is worth their salt will know how to locate/fix these for you. Ensure your provider has patched the web server for known vulnerabilities, I still see web servers vulnerable to remote exploitation via PHP,openSSL and the apache chunking exploit (apache-nosejob.c) this information barely scratches the surface of web security, whole books and web sites have been wrote about the subject but if you're interested here are a few sites that cover some of the topics above: http://www.cgisecurity.com/ http://www.w3.org/Security/Faq/www-security-faq.html http://www.onlamp.com/lpt/a/4045 http://www.cert.org/tech_tips/cgi_metacharacters.html http://www.donkboy.com/html/cgi_exploits.htm http://www.linuxsecurity.com/feature...ting-http.html |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#15 | |
Confirmed User
Join Date: May 2003
Posts: 1,792
|
Quote:
__________________
ICQ: 282814268 |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#16 | |
So Fucking Banned
Join Date: Nov 2003
Location: MidWest
Posts: 3,471
|
Quote:
What he said! |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#17 | |
Confirmed User
Join Date: Mar 2004
Location: Dallas
Posts: 874
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#18 | |
Confirmed User
Join Date: Jul 2003
Location: in yoOoo kitchen
Posts: 6,984
|
Quote:
Update: added this snipet of code and over the weekend 20 more accounts were cracked! So my problem still exists...this is startin to really piss me off! anyone else, or am I alone? ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#19 |
Confirmed User
Industry Role:
Join Date: Oct 2002
Posts: 5,012
|
why not moving to websitebilling?
__________________
The Goddess Of Steps |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#20 | |
Confirmed User
Join Date: Jul 2003
Location: in yoOoo kitchen
Posts: 6,984
|
Quote:
<b><font size ="7">I already said I was with ccbill. Im just having problems with some older verotel subscribers.</font></b> |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#21 |
Damn Right I Kiss Ass!
Industry Role:
Join Date: Dec 2003
Location: Cowtown, USA
Posts: 32,409
|
What website are you running?
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#22 | |
Confirmed User
Join Date: Jan 2004
Location: Canada
Posts: 793
|
Quote:
Here is my situation. I renamed verotelrum.pl I renamed the .txt file in which verotel stores usernames. My password file, and verotel txt files are not in the home directory where my sites are. Each and every one of my Verotel un/pw have been posted on passboards. Every single one of them. My site was NOT brute forced. Not a chance. I have scripts that log brute force attacks, and not once has anyone run a verotel combo list on my site. Get this. I have CCBill running as well. Not one of my CCBill un/pw have been compromised. I seeded my pass file with fairly easy un/pw that are in combo lists etc. eg. test123 type shit. None of them have been brute forced. Only my Verotel un/pw' have been shared. Every single one of them. Verotel is blaming me, of course. I blame them. There are too many people, on too many different servers, on too many different networks, on too many different hosts etc. for Verotel to say that servers are being breached, people are sniffing passwords on my network, my server is hacked etc. Bullshit. I think it is on their end. Someone is sniffing packets on their network, or something else is wrong. Maybe there are backdoors into their servers? Read their forums. There are too many people with the exact same problem for Verotel to even think of saying their customers have hacked servers, there are packet sniffers on the customer's networks etc. Nothing is 100% secure, but I am absolute certain that my Verotel un/pw are not being breached on my end. It is on their end. ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#23 |
Confirmed User
Join Date: Jul 2003
Location: in yoOoo kitchen
Posts: 6,984
|
After reading their board its obivous that its not on our end.
Now, how the hell do i make this shit stop? ![]() fucking verotel ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#24 |
Confirmed User
Join Date: Jul 2003
Location: in yoOoo kitchen
Posts: 6,984
|
Am in the only getting hamered day in day out with this shit?
Is the only solution to completely remove the User from the passfile? No one else is having this problem? looks like im fucked ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#25 |
Too lazy to set a custom title
Industry Role:
Join Date: Mar 2003
Location: Homeless
Posts: 62,911
|
One way to stop this is get rid of them. We use them as well and have not had any problems yet, but have been watching.
If you also run ccbill, create a UN and PW for them and stop the rebills on V. The just stop using V. You may loose some cash at the start, but it will work out in the long run. You are loosing bandwidth etc. to these people...
__________________
PornGuy skype me pornguy_epic AmateurDough The Hottes Shemales online! TChicks.com | Angeles Cid | Mariana Cordoba | MAILERS WELCOME! |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#26 |
Confirmed User
Join Date: Jul 2003
Location: in yoOoo kitchen
Posts: 6,984
|
I hear what your saying Pornyguy, Also i have not used them in awhile but i still have rebills coming in with them and some of these people have been members for a long time.
There has to be a better way to handle this. I cant beleive im the only complaining about it either since a few people use them here. Strange that im the only being hit, worse part is if I change them right now in a few hours they will be cracked again...fucking retarded im telling you! Almost as if the verotel staff is rigth there as i change them and 2 seconds later they are posting the passwords themselves on password boards...sounds crazy but what the hell, how can shit leak so quick unless: a) its an inside job or b) the admin doors are wide open for anyone to retrieve member information. Christ I dont know what to think anymore. at this point it wouldnt hurt for verotel to say something on this, the silence here an on their board is deafening |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#27 |
Confirmed User
Join Date: Sep 2002
Posts: 3,626
|
doober, i use Verotel on a couple of smallish paysites (read 300-400 members) and haven't run into this problem at all (so far)... are you sure someone isn't accessing your .htpasswd files in some way, that just happens to know how to decrpyt their passwords? also, are you running any sort of protection script on your server to keep track of how many IP addresses use the same password-pair? we use pw sentry to catch rogue accounts and it works pretty flawlessly for us, it will lock an account after it is used by toom any surfers and send am email to you so you can take appropriate action..
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#28 |
Confirmed User
Join Date: Jul 2003
Location: in yoOoo kitchen
Posts: 6,984
|
Chupacabra, Im suing pennywize and keep getting emails all the time.
The only passwords getting hammered are the verotel ones. From what i see on their board im not alone and it has happened before and then suddenly stopped but now it started once again and has not stopped for almost a week....its getting lame and I know for a fact that it cant be on my side. Like i said I change one pass now and in 10 mins it will be used somehwere else pathetic |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#29 |
Confirmed User
Join Date: Jan 2004
Location: Canada
Posts: 793
|
doober - are you on a dedicated server, or a shared server? And what OS is it running?
chupacabra - same as above? Reason I am asking is because some old Epoch scripts could be used to root a server, but it could only be done through an exploit in RedHat linux, I forget which kernel. Maybe it is the same for Verotel scripts. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#30 | |
Confirmed User
Join Date: Sep 2002
Posts: 3,626
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#31 | |
Confirmed User
Join Date: Sep 2002
Posts: 3,626
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#32 | |
Programming King Pin
Industry Role:
Join Date: Oct 2003
Location: Montreal
Posts: 27,360
|
Quote:
__________________
UUGallery Builder - automated photo/video gallery plugin for Wordpress! ![]() ![]() ![]() ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#33 | ||
Confirmed User
Join Date: Jul 2003
Location: in yoOoo kitchen
Posts: 6,984
|
Quote:
Quote:
|
||
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#34 |
Confirmed User
Join Date: Mar 2004
Location: Dallas
Posts: 874
|
I think you will find that it is more likely that something is occuring on verotels end, that might be a hack on their servers, or their traffic is sniffed, even with modifications to the perl script which worked and stopped anyone but verotel calling it - there was another password incident, this wasn't a password sharing either, the account was over a year old.
other things point at this: a: people with other merchants are not having the same problems. b: their CGI script isn't being exploited (at least in our case) c: mod_security's logs do not display any suspicious activity, nor does apache logs. seeing has verotel had ftp access to this box, I also checked lastlog and no suspicious logins from the account concerned! - doesn't leave much else BUT them being owned. |
![]() |
![]() ![]() ![]() ![]() ![]() |