Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar Mark Forums Read
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 12-12-2005, 04:24 PM   #1
Young
Bland for life
 
Industry Role:
Join Date: Nov 2004
Posts: 10,468
Image Verification SUCKS!@!!!!!!!11

I will not promote any sponser that uses it. Why? Because I find it to be a pain in the ass to use....so why do I want my surfers to go through the same shit?

The images are so fucking hard to read now. Some requier spaces...others don't. Sometimes it takes 2-3 attempts just to get it right. I understand it protects against scripts and brute force...but its a fucking pain.

[/rant]

that is all.
__________________
★★★
Young is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 07:57 PM   #2
bbe
Confirmed User
 
Join Date: Feb 2005
Posts: 110
Never seen one with whitespace in it. Maybe that's why it's taking your two,three times to get in. Bf'ing is a bigger headache, it's a good development imo.
bbe is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 07:59 PM   #3
BoyAlley
So Fucking Gay
 
Join Date: Nov 2004
Posts: 19,714
Quote:
Originally Posted by Young
Sometimes it takes 2-3 attempts just to get it right. I understand it protects against scripts and brute force...but its a fucking pain.
Learn to read
BoyAlley is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 08:01 PM   #4
JoeMeca
So Fucking Banned
 
Join Date: Nov 2005
Location: Juicy's House! Icq: 265529404
Posts: 2,266
boyalley when u get a chance hit me on icq i needa buy my mom a christmas present lol
JoeMeca is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 08:06 PM   #5
BIGTYMER
Junior Achiever
 
BIGTYMER's Avatar
 
Industry Role:
Join Date: Nov 2004
Location: Walled Garden
Posts: 17,066
Spaces? I don't think so. Can you show us one that uses them?
BIGTYMER is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 08:09 PM   #6
Dynamix
G F Y not
 
Industry Role:
Join Date: Jan 2004
Location: MN
Posts: 2,910
Never seen spaces, either, but I do agree that they blow.. especially the ones that have gone through 3-5 distortion filters..
__________________

TGPFactory Full TGP Design & Installation Services
ICQ 250 142 484 · AIM TGPDynamix · Email: patrick (at) tgpfactory (dot) com
See who I am at AdultWhosWho.com!
Dynamix is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 09:23 PM   #7
Marshal
Biz Dev and SEO
 
Marshal's Avatar
 
Industry Role:
Join Date: Jun 2005
Posts: 15,180
i hate this shit! too hard to read...
__________________
---
Busy ranking websites on Google...
Marshal is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 09:25 PM   #8
Splum
Confirmed User
 
Join Date: May 2003
Location: USA
Posts: 6,195
Which sponsors use it?
Splum is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 09:30 PM   #9
Babagirls
Text Writer
 
Babagirls's Avatar
 
Join Date: Feb 2001
Location: Wisconsin
Posts: 18,812
I love you.
__________________




Need a Text Writer?
Blogs|Reviews|Descriptions|Paysites|TGP's|Stories

ICQ: 397892500
Babagirls is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 09:31 PM   #10
brand0n
been very busy
 
Join Date: Nov 2002
Location: the queen city
Posts: 26,983
you mean to tell me you think its asking to much to type in 1 fucking word?

i mean youve convinced them to break out there cc, type that number in, name addy, all that jazz, and a 4-8 letter combo is 2 much to ask?
__________________
want to buy this spot for cheap? it is of course for sale. long term deals are always the best bet. brand0n/ at/ a o l dot commies.
brand0n is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 09:33 PM   #11
FreeHugeMovies
Too lazy to set a custom title
 
Join Date: Dec 2001
Location: Charlotte, NC
Posts: 14,137
Very good post. Some of this latest shit, it's rediculous at what level they expect you to see.
FreeHugeMovies is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 09:36 PM   #12
Splum
Confirmed User
 
Join Date: May 2003
Location: USA
Posts: 6,195
Quote:
Originally Posted by brand0n
you mean to tell me you think its asking to much to type in 1 fucking word?

i mean youve convinced them to break out there cc, type that number in, name addy, all that jazz, and a 4-8 letter combo is 2 much to ask?
Do they ask you to do that at the supermarket too? Ive actually been halfway through purchasing something and they come up with some dumb jump through the hoops shit and I say fuck it. Lost sale. Shrug.
Splum is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 09:58 PM   #13
Rob
I'm a great bowler.
 
Rob's Avatar
 
Industry Role:
Join Date: Nov 2003
Location: Right Outside of Normal.
Posts: 13,309
I had one the other day that used Wingdings...talk about a pain in the ass.
__________________
Rob is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 10:22 PM   #14
V_RocKs
Damn Right I Kiss Ass!
 
Industry Role:
Join Date: Dec 2003
Location: Cowtown, USA
Posts: 32,409
Without image verification:

Bruteforce Basic Auth - 25,000 to 250,000 an hour depending on your connection.

Loss: 10 to 200 passwords a day. Used by 10 to 2000 people a day. Money lost is in the millions a year, BW costs are 50 times higher because these surfers are going to download the entire website since they don't know when they will get a password again. Login screen is unresponsive to others because it is being bruteforced which is essentially DOS'ing it.

Form Login - 8,000 - 50,000 tries per hour.

Loss - 5 to 50 passwords a day. Used by 5 to 500 surfers. Because the entire form is being sent at 70K per request, that is 1,750,000,000 bytes total or about a gig and a half per entry attempt. So without a security code you are wasting 87.5 gigs a day just to the login attempts. Add that to the 50 people site sucking 200gigs each... all of a sudden that ultra cheap BW is extremely expensive.

Many sponsors think that if they allow 'some' cracking to go on then it is OK because when the password monitoring scripts kick in and block the account, some of the surfers then break down and signup. This is not the case. You can go into many forums and IRC channels and have someone crack a password that will only be given to you. If someone else asks for one, they will crack them a different account. You password monitoring software will not stop them since they are not triggering any alarms...

#1 - Use MD5 password hashing, not DES. At least then they take a lot longer to crack if they steal your password file.
#2 - Encrypt passwords that go into the DB. Most of you have them stored in plain text or DES.
#3 - Make the users passwords for them. The only reason DES decrpytion even works is because most people use the same password EVERYWHERE. So if you run Nubiles.net and they still a comparable sites password file, your encrypted passwords are easy to crack.
#4 - Use a form login and a security code. Make sure that there is no other part of the website that you can force basic autentication. With some free/cheap authorization software you can bypass the form and code login by just entering a direct link to a file inside the members area.


Some of you require a member to choose a password with an uppercase letter and a number. Big mistake. You actually made it easier to guess passwords, not harder.

This password:

surkfloi

- requires 218,340,105,584,896 tries. Because I don't know if I need an uppercase letter, lowercase letter or a number for each place. 62 different combos per 8 places.
Or - 62*62*62*62*62*62*62*62
Surkflo1

- Now I know that 85% of the lazy American public will make the first letter a capital and the last character a 1. Now I need:
26*62*62*62*62*62*62*1 = 1,476,806,125,184

218340105584896/1476806125184=147

What do all of these numbers mean? Well, with DES I can decrypt the larger number and get a password to spit out about once every 3 months.. hardly worth the trouble. Doing the second number I can get a password about once or twice a day... And if I take over a few networked dual/quad XEON's I can do it in hours... Which means it is actually 147 times EASIER to get into your website when you require an uppercase letter and a number in the 6 to 8 character password.

Allow 6 character passwords and I can use my home machine to get about 5 password per hour... or 30 with the stolen .edu network.

Last edited by V_RocKs; 12-12-2005 at 10:24 PM..
V_RocKs is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 10:27 PM   #15
Rob
I'm a great bowler.
 
Rob's Avatar
 
Industry Role:
Join Date: Nov 2003
Location: Right Outside of Normal.
Posts: 13,309
Quote:
Originally Posted by V_RocKs
Without image verification:

Bruteforce Basic Auth - 25,000 to 250,000 an hour depending on your connection.

Loss: 10 to 200 passwords a day. Used by 10 to 2000 people a day. Money lost is in the millions a year, BW costs are 50 times higher because these surfers are going to download the entire website since they don't know when they will get a password again. Login screen is unresponsive to others because it is being bruteforced which is essentially DOS'ing it.

Form Login - 8,000 - 50,000 tries per hour.

Loss - 5 to 50 passwords a day. Used by 5 to 500 surfers. Because the entire form is being sent at 70K per request, that is 1,750,000,000 bytes total or about a gig and a half per entry attempt. So without a security code you are wasting 87.5 gigs a day just to the login attempts. Add that to the 50 people site sucking 200gigs each... all of a sudden that ultra cheap BW is extremely expensive.

Many sponsors think that if they allow 'some' cracking to go on then it is OK because when the password monitoring scripts kick in and block the account, some of the surfers then break down and signup. This is not the case. You can go into many forums and IRC channels and have someone crack a password that will only be given to you. If someone else asks for one, they will crack them a different account. You password monitoring software will not stop them since they are not triggering any alarms...

#1 - Use MD5 password hashing, not DES. At least then they take a lot longer to crack if they steal your password file.
#2 - Encrypt passwords that go into the DB. Most of you have them stored in plain text or DES.
#3 - Make the users passwords for them. The only reason DES decrpytion even works is because most people use the same password EVERYWHERE. So if you run Nubiles.net and they still a comparable sites password file, your encrypted passwords are easy to crack.
#4 - Use a form login and a security code. Make sure that there is no other part of the website that you can force basic autentication. With some free/cheap authorization software you can bypass the form and code login by just entering a direct link to a file inside the members area.


Some of you require a member to choose a password with an uppercase letter and a number. Big mistake. You actually made it easier to guess passwords, not harder.

This password:

surkfloi

- requires 218,340,105,584,896 tries. Because I don't know if I need an uppercase letter, lowercase letter or a number for each place. 62 different combos per 8 places.
Or - 62*62*62*62*62*62*62*62
Surkflo1

- Now I know that 85% of the lazy American public will make the first letter a capital and the last character a 1. Now I need:
26*62*62*62*62*62*62*1 = 1,476,806,125,184

218340105584896/1476806125184=147

What do all of these numbers mean? Well, with DES I can decrypt the larger number and get a password to spit out about once every 3 months.. hardly worth the trouble. Doing the second number I can get a password about once or twice a day... And if I take over a few networked dual/quad XEON's I can do it in hours... Which means it is actually 147 times EASIER to get into your website when you require an uppercase letter and a number in the 6 to 8 character password.

Allow 6 character passwords and I can use my home machine to get about 5 password per hour... or 30 with the stolen .edu network.
If he complains about typing in 8 characters for verification do you really think he will read all of that?
__________________
Rob is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 10:29 PM   #16
Violetta
Affiliate
 
Violetta's Avatar
 
Join Date: Jul 2004
Posts: 28,735
it has happend that I had to give in!
__________________
M&A Queen
Violetta is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 11:20 PM   #17
Fetish
Confirmed User
 
Join Date: Mar 2005
Posts: 823
Good thread
Fetish is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 11:21 PM   #18
smack
Push Porn Like Weight.
 
smack's Avatar
 
Industry Role:
Join Date: Mar 2002
Location: Inside .NET
Posts: 10,652
it's hard enough for the average surfer to keep a boner long enough to fumble out their credit card. without having to take a typing test.
__________________
Cry havoc and let slip the dogs of war.
smack is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-12-2005, 11:25 PM   #19
Splum
Confirmed User
 
Join Date: May 2003
Location: USA
Posts: 6,195
You people arguing that image verification is a good security tool need to really figure out how the internets works You can BLOCK IPs *GASP* after x amount of tries for x amount of time with x account. I have no idea what the hell image verification is going to accomplish.
Splum is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 04:58 AM   #20
V_RocKs
Damn Right I Kiss Ass!
 
Industry Role:
Join Date: Dec 2003
Location: Cowtown, USA
Posts: 32,409
Quote:
Originally Posted by Splum
You people arguing that image verification is a good security tool need to really figure out how the internets works You can BLOCK IPs *GASP* after x amount of tries for x amount of time with x account. I have no idea what the hell image verification is going to accomplish.
Right and when I run a bruteforce attack with 2,000 proxies @ 30,000 tries per hour, each proxy will only hit you 15 times per hour. This means if you block me, you also need to block AOL customers...
V_RocKs is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 05:09 AM   #21
kmanrox
aka K-Man
 
kmanrox's Avatar
 
Industry Role:
Join Date: Oct 2001
Location: The Gutter
Posts: 29,292
bookmarked this thread, thx
__________________
Crypto HODLr
Crypto mining
Angel investor
kmanrox is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 05:16 AM   #22
devnull
Registered User
 
Join Date: Dec 2005
Posts: 65
Quote:
Originally Posted by Splum
You people arguing that image verification is a good security tool need to really figure out how the internets works You can BLOCK IPs *GASP* after x amount of tries for x amount of time with x account. I have no idea what the hell image verification is going to accomplish.
What a clueless piece of shit, maybe you should learn how the "internets work" you dumbfuck.
devnull is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 05:50 AM   #23
Ace-wtf
Confirmed User
 
Join Date: Jun 2005
Location: rolling for CASH
Posts: 2,983
w0rd
there will be one in the entrance to the show in vegas
be prepared lol
__________________

Don't miss out on the new HYPE!!!
icq: 226370630
Ace-wtf is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 06:20 AM   #24
Pete-KT
Workin With The Devil
 
Industry Role:
Join Date: Oct 2004
Location: West Bloomfield, MI
Posts: 51,532
Ive never had a problem with image verification I love it
Pete-KT is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 06:21 AM   #25
fris
Too lazy to set a custom title
 
fris's Avatar
 
Industry Role:
Join Date: Aug 2002
Posts: 55,372
ya its a pain even when joining forums, but some sites have image verify and are clear and can read it. sometimes they make it with gradient so its so hard to read they make you do it like 3 or 4 times over. like they are trying to make you fail.
__________________
Since 1999: 69 Adult Industry awards for Best Hosting Company and professional excellence.


WP Stuff
fris is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 06:22 AM   #26
who
So Fucking Banned
 
Join Date: Aug 2003
Location: ICQ #23642053
Posts: 19,593
Are you colorblind?
who is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 06:24 AM   #27
Crypt
Confirmed User
 
Join Date: Apr 2004
Posts: 2,225
Quote:
Originally Posted by Splum
You people arguing that image verification is a good security tool need to really figure out how the internets works You can BLOCK IPs *GASP* after x amount of tries for x amount of time with x account. I have no idea what the hell image verification is going to accomplish.
Clueless idiot , maybe you should learn how internet work
Crypt is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 09:45 AM   #28
Young
Bland for life
 
Industry Role:
Join Date: Nov 2004
Posts: 10,468
Quote:
Originally Posted by Babagirls
I love you.
i love you too baba

anyways...for me its hard to read. the letters are distorted. its just a pain. maybe i just don't understand the technology because i don't run a program or website that needs it.
__________________
★★★
Young is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 09:47 AM   #29
Young
Bland for life
 
Industry Role:
Join Date: Nov 2004
Posts: 10,468
Quote:
Originally Posted by fris
ya its a pain even when joining forums, but some sites have image verify and are clear and can read it. sometimes they make it with gradient so its so hard to read they make you do it like 3 or 4 times over. like they are trying to make you fail.
the gradient ones are an extreme pain in the ass



smack...you nearly made me blow coca cola out my nose
__________________
★★★
Young is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 10:34 AM   #30
u-Bob
there's no $$$ in porn
 
u-Bob's Avatar
 
Industry Role:
Join Date: Jul 2005
Location: icq: 195./568.-230 (btw: not getting offline msgs)
Posts: 33,063
If it's easy to read, no problem.
If they are like the ones blogspot uses (or worse), then it sucks big time.
u-Bob is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 10:54 AM   #31
andi_germany
Confirmed User
 
Join Date: Oct 2002
Location: Germany
Posts: 768
Quote:
Originally Posted by V_RocKs
Without image verification:

Bruteforce Basic Auth - 25,000 to 250,000 an hour depending on your connection.

Loss: 10 to 200 passwords a day. Used by 10 to 2000 people a day. Money lost is in the millions a year, BW costs are 50 times higher because these surfers are going to download the entire website since they don't know when they will get a password again. Login screen is unresponsive to others because it is being bruteforced which is essentially DOS'ing it.

Form Login - 8,000 - 50,000 tries per hour.

Loss - 5 to 50 passwords a day. Used by 5 to 500 surfers. Because the entire form is being sent at 70K per request, that is 1,750,000,000 bytes total or about a gig and a half per entry attempt. So without a security code you are wasting 87.5 gigs a day just to the login attempts. Add that to the 50 people site sucking 200gigs each... all of a sudden that ultra cheap BW is extremely expensive.

Many sponsors think that if they allow 'some' cracking to go on then it is OK because when the password monitoring scripts kick in and block the account, some of the surfers then break down and signup. This is not the case. You can go into many forums and IRC channels and have someone crack a password that will only be given to you. If someone else asks for one, they will crack them a different account. You password monitoring software will not stop them since they are not triggering any alarms...

#1 - Use MD5 password hashing, not DES. At least then they take a lot longer to crack if they steal your password file.
#2 - Encrypt passwords that go into the DB. Most of you have them stored in plain text or DES.
#3 - Make the users passwords for them. The only reason DES decrpytion even works is because most people use the same password EVERYWHERE. So if you run Nubiles.net and they still a comparable sites password file, your encrypted passwords are easy to crack.
#4 - Use a form login and a security code. Make sure that there is no other part of the website that you can force basic autentication. With some free/cheap authorization software you can bypass the form and code login by just entering a direct link to a file inside the members area.


Some of you require a member to choose a password with an uppercase letter and a number. Big mistake. You actually made it easier to guess passwords, not harder.

This password:

surkfloi

- requires 218,340,105,584,896 tries. Because I don't know if I need an uppercase letter, lowercase letter or a number for each place. 62 different combos per 8 places.
Or - 62*62*62*62*62*62*62*62
Surkflo1

- Now I know that 85% of the lazy American public will make the first letter a capital and the last character a 1. Now I need:
26*62*62*62*62*62*62*1 = 1,476,806,125,184

218340105584896/1476806125184=147

What do all of these numbers mean? Well, with DES I can decrypt the larger number and get a password to spit out about once every 3 months.. hardly worth the trouble. Doing the second number I can get a password about once or twice a day... And if I take over a few networked dual/quad XEON's I can do it in hours... Which means it is actually 147 times EASIER to get into your website when you require an uppercase letter and a number in the 6 to 8 character password.

Allow 6 character passwords and I can use my home machine to get about 5 password per hour... or 30 with the stolen .edu network.
Sorry but there is a lot of bull in this post and a lot of conclusions that actually are so wrong that it gives you such a false sense of security.

1. Fact. Image verification is broken. ALL images have been proven to be broken by machines so you are in false security. You get keep the script kiddies out but the serious crackers are in.

2. Fact. Brute force starts with dictonary attacks as hardly anyone not forced to use capital or numbers not uses a normal word which renders your calculations kind of useless.

3. Fact. You actually assume a lot in your chance calculation but forgot to calculate that if you don't require people to use capital or numbers people simply use lowercase and even a dictionary word for the same reasons you assumed they use a capital first letter.
Dictionary words bring you to about 1:100000 or even less or at most 1:26^8

4. Fact. You might actually break laws using captcha verification. In many countries there are accessability laws for people that have disabilities. Given that blind people won't watch porn but some lawmaker might actually use this to fuck you because they cannot get you otherwise.
__________________
SIG TOO BIG! Maximum 120x60 button and no more than 3 text lines of DEFAULT SIZE and COLOR. Unless your sig is for a GFY top banner sponsor, then you may use a 624x80 instead of a 120x60.
andi_germany is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 11:52 AM   #32
Doctor Dre
Too lazy to set a custom title
 
Doctor Dre's Avatar
 
Industry Role:
Join Date: Jan 2001
Posts: 51,692
Quote:
Originally Posted by andi_germany
Sorry but there is a lot of bull in this post and a lot of conclusions that actually are so wrong that it gives you such a false sense of security.

1. Fact. Image verification is broken. ALL images have been proven to be broken by machines so you are in false security. You get keep the script kiddies out but the serious crackers are in.

2. Fact. Brute force starts with dictonary attacks as hardly anyone not forced to use capital or numbers not uses a normal word which renders your calculations kind of useless.

3. Fact. You actually assume a lot in your chance calculation but forgot to calculate that if you don't require people to use capital or numbers people simply use lowercase and even a dictionary word for the same reasons you assumed they use a capital first letter.
Dictionary words bring you to about 1:100000 or even less or at most 1:26^8

4. Fact. You might actually break laws using captcha verification. In many countries there are accessability laws for people that have disabilities. Given that blind people won't watch porn but some lawmaker might actually use this to fuck you because they cannot get you otherwise.
In adult there are probably 80 % of the attacks that are caused by script kiddies.
__________________
Quote:
Originally Posted by rayadp05 View Post
I rebooted, deleted temp files, history, cookies and everything...still cannot view the news clip. All I see is that fucking gay ass music video from "Rick Roll". Anyone else have a different link to the news clip?
Doctor Dre is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 12:44 PM   #33
Splum
Confirmed User
 
Join Date: May 2003
Location: USA
Posts: 6,195
Bottom line its about sales, I know for a fact that people get turned off by long and tedious sign up processess(which is only that way to stop criminals). Its akin to blanketing everyone as a criminal until proven otherwise, is that any way to do business?
Splum is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 12:47 PM   #34
Splum
Confirmed User
 
Join Date: May 2003
Location: USA
Posts: 6,195
Quote:
Originally Posted by Crypt
Clueless idiot , maybe you should learn how internet work
So everyone on the internet brute force attacks porn websites? The percentage of brute force attacks on websites are proportionately insignificant compared to honest potential customers. Dumbass stop being so fucking paranoid and use other methods to filter incoming traffic.
Splum is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 12:53 PM   #35
Splum
Confirmed User
 
Join Date: May 2003
Location: USA
Posts: 6,195
Quote:
Originally Posted by V_RocKs
Right and when I run a bruteforce attack with 2,000 proxies @ 30,000 tries per hour, each proxy will only hit you 15 times per hour. This means if you block me, you also need to block AOL customers...
Incorrect. You can ban specific IPs there is no cause for a blanket ban. Most common proxies are known and can be banned easily. There is even programs out there that can monitor specific patterns in network traffic no matter the source(time,length,etc). Oh and you can NEVER stop a hacker no matter what tools you use, you CAN stop 99.9% of the script kiddies.
Splum is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 12:55 PM   #36
Splum
Confirmed User
 
Join Date: May 2003
Location: USA
Posts: 6,195
Quote:
Originally Posted by devnull
What a clueless piece of shit, maybe you should learn how the "internets work" you dumbfuck.
1 post - December 05 sign up date...

Im gonna brute force your mouth if you dont STFU surfer.
Splum is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 01:26 PM   #37
Deek
Registered User
 
Join Date: Nov 2005
Posts: 31
password cracking....

Ok first, md5 is busted, mainly because of the invention of the rainbow tables. Basically what people have done is taken and computed the md5 hashes then simply compare the hash to those stored in their database

2nd.. Sure if your inside of the network you have direct access to the hashes, most wont and will be attempting to break into the site via webform. Thats what the image verification is trying to prevent.. Not attacks against the hash it self.

The proxy comment, the propper use of the published lists via ARIN can reduce the number of attacks from proxies considerably. Why? most of these attacks happen from outside of the united states. And this is also related to vuln scanning/port scanning. Blocking this at your edge device (router/firewall etc NOT YOUR SERVER!)

Im new to porn, so this statement may be wrong... It doesnt seem like many people care much for traffic outside of north america/europe. IE china/asia/russia, this is where a great deal (not alot of them) of proxies exist. So blocking the not so well liked countries servers two perposes, both security and more legit traffic. Again im new so im unsure how well this paragraph will fly.

Also most attacks by "Script kids" are not even geard towards adult. Its geard towards a pool of addresses. One of the botnets i busted in Feb 05 had bots which were assigned seperate areas of the net to search for open window file shares.

Im going post a poll after this... asking about how many actually check their logs...

Image verification is a major hassel. Dont get me wrong it upsets me. However image verification is typically implemented on community websites to prevent spammers. This is what i like. The use of a image verification on a pay site prior to payment does not make sense to me, because its unlikly (to me being new to the porn industry) that someone is going to take a credit card and apply to a whole series of pay sites.. If a person has the loot, their likly going for electronics which are easier to sell say on ebay.

As a gentleman stated before, theres no fool proof security mechinism, you can however be aware of the risks around you, and implement as many speed bumps as you can.

In security you must balance the "CIA", confidentiality, integrity, and the availability.

-Deek
3420164

Last edited by Deek; 12-13-2005 at 01:28 PM..
Deek is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 01:49 PM   #38
Deek
Registered User
 
Join Date: Nov 2005
Posts: 31
sorry i just caught something.

regarding my comment "Inside of the network" , gaining access to the password files should be rather difficult unless they have put them in an improper location.

And rather then saying "inside of the network" i should have stated shell access to the server.

Apologizes for the mis-type
Deek is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-13-2005, 02:19 PM   #39
nexcom28
So Fucking Banned
 
Join Date: Jan 2005
Posts: 3,716
I think image verification sucks.. I will leave a site that asks me to verify some stupid letters unless it's easy..
nexcom28 is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-14-2005, 12:27 AM   #40
V_RocKs
Damn Right I Kiss Ass!
 
Industry Role:
Join Date: Dec 2003
Location: Cowtown, USA
Posts: 32,409
Quote:
Originally Posted by andi_germany
Sorry but there is a lot of bull in this post and a lot of conclusions that actually are so wrong that it gives you such a false sense of security.

1. Fact. Image verification is broken. ALL images have been proven to be broken by machines so you are in false security. You get keep the script kiddies out but the serious crackers are in.

2. Fact. Brute force starts with dictonary attacks as hardly anyone not forced to use capital or numbers not uses a normal word which renders your calculations kind of useless.

3. Fact. You actually assume a lot in your chance calculation but forgot to calculate that if you don't require people to use capital or numbers people simply use lowercase and even a dictionary word for the same reasons you assumed they use a capital first letter.
Dictionary words bring you to about 1:100000 or even less or at most 1:26^8

4. Fact. You might actually break laws using captcha verification. In many countries there are accessability laws for people that have disabilities. Given that blind people won't watch porn but some lawmaker might actually use this to fuck you because they cannot get you otherwise.
A lot of reaction.. I will start with this guy.

1 - You point in #1 is pointless. Give me an article, give me a white paper. Just because you say hackers are all knowing doesn't mean shit. You say all images are broken... The only way to thwart image varification is to create signatures. Similar to virus software. You create an image of what a set of numbers with lines running through them look like, now you know what the number is. With SPARTA this is to tedeous. The people hacking porn are working 40 hours a week or going to school or both. They don't have 2000 man hours to do this. They have instead A.D.D... they couldn't keep their attention on the task of creating signatures for SPARTA no matter how much they would like to.

2 - Bruteforcing does start with a dictionary attack. What takes longer smart-guy, finding 8 characters in a dictionary with 62 possibilities per letter or only having to find 6*62 because I know that the first character is always going to be a capitol and the last is always going to be a number? I said always... I guess I should say 85% of the time. But with 85% of the 8,000 member passfile, who gives a flying fuck about the other 15%?

3 - I stated over and over that the best option is to make the password for the customer. If you all them to make it then the hacker doesn't need to look for trillions of passwords, he only needs to look for the 70,000 commonly used words, and then apply simple rul3s t0 f1nd 3v3n m0r3.

4 - You think I give a fuck about some arcane Isreali law saying I can't use Captcha? Why do I need to go to one of these countries anyway?

It seems like you just wanted to rant. I am offering sound advice and you sound like a sleezy defense lawyer trying to protect someone who got caught in the act of a crime and even confessed offering an account of the crime that could only be known by the perpatrator...
V_RocKs is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-14-2005, 12:33 AM   #41
V_RocKs
Damn Right I Kiss Ass!
 
Industry Role:
Join Date: Dec 2003
Location: Cowtown, USA
Posts: 32,409
Quote:
Originally Posted by Splum
Incorrect. You can ban specific IPs there is no cause for a blanket ban. Most common proxies are known and can be banned easily. There is even programs out there that can monitor specific patterns in network traffic no matter the source(time,length,etc). Oh and you can NEVER stop a hacker no matter what tools you use, you CAN stop 99.9% of the script kiddies.
There is no such thing as a common proxy dude. You show me the IP's that are common.. Please man.. you are too funny. Your COMMON proxies are NOT COMMON. Common would infer that the majority of proxies fall within a certain set of address blocks. They do not. I have been collecting proxies for 5 years now and I have NEVER seen a common address block of proxies. There are address blocks that commonly have proxies but there are also billions of addresses. And there are plenty of proxies on "un-common" address blocks so I have no need to use one that is on one of these common blocks.

Script kiddies are the people giving out 98% of the passwords. The real hackers don't get caught up in the 'game'.

Also a good portion of big name sponsors don't even keep logs because the server can't handle it. Do you really think it can handle filtering the massive amount of traffic that comes in on any given day?

Last edited by V_RocKs; 12-14-2005 at 12:35 AM..
V_RocKs is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-14-2005, 12:52 AM   #42
V_RocKs
Damn Right I Kiss Ass!
 
Industry Role:
Join Date: Dec 2003
Location: Cowtown, USA
Posts: 32,409
Quote:
Originally Posted by Deek
password cracking....

Ok first, md5 is busted, mainly because of the invention of the rainbow tables. Basically what people have done is taken and computed the md5 hashes then simply compare the hash to those stored in their database

2nd.. Sure if your inside of the network you have direct access to the hashes, most wont and will be attempting to break into the site via webform. Thats what the image verification is trying to prevent.. Not attacks against the hash it self.

The proxy comment, the propper use of the published lists via ARIN can reduce the number of attacks from proxies considerably. Why? most of these attacks happen from outside of the united states. And this is also related to vuln scanning/port scanning. Blocking this at your edge device (router/firewall etc NOT YOUR SERVER!)

Im new to porn, so this statement may be wrong... It doesnt seem like many people care much for traffic outside of north america/europe. IE china/asia/russia, this is where a great deal (not alot of them) of proxies exist. So blocking the not so well liked countries servers two perposes, both security and more legit traffic. Again im new so im unsure how well this paragraph will fly.

Also most attacks by "Script kids" are not even geard towards adult. Its geard towards a pool of addresses. One of the botnets i busted in Feb 05 had bots which were assigned seperate areas of the net to search for open window file shares.

Im going post a poll after this... asking about how many actually check their logs...

Image verification is a major hassel. Dont get me wrong it upsets me. However image verification is typically implemented on community websites to prevent spammers. This is what i like. The use of a image verification on a pay site prior to payment does not make sense to me, because its unlikly (to me being new to the porn industry) that someone is going to take a credit card and apply to a whole series of pay sites.. If a person has the loot, their likly going for electronics which are easier to sell say on ebay.

As a gentleman stated before, theres no fool proof security mechinism, you can however be aware of the risks around you, and implement as many speed bumps as you can.

In security you must balance the "CIA", confidentiality, integrity, and the availability.

-Deek
3420164

1 - Ever made tables? Takes a long time to make ones with any significance. I have. I actually crashed a drive making them because it got over heated after the abuse on day 10. The majority of password crackers and hackers are no smarter than your Maytag repairman. Even still, cracking MD5 with rainbow tables still takes a lot longer than 400,000 c/s with DES.

2 - Belive it or not... most websites have been hacked at some point. When I say most I mean 80% and I am being generous. When Globill got hacked, every single member they ever processed became public domain. All 1.2 million. Consiquently they filed for bankruptsy not long after. Hackers don't care about strongbox, they prey on the idiot webmaster using phpBB, Awstats or a host of other hackable apps. They still the password DB/file and then decrypt it or get lucky because it is in plain text and just use the account in reverse figuring the last person that signed up has another 30 days left. No bruteforce needed.

Proxies - From my own experience, 10% give or take a few points is how much money comes in from outside UK, CA, US, DE and MX. If you ask someone to give up on those sales, you are asking the wrong industry unfortunately. Everyone here is just way to greedy.

Most crackers who are cracking basic auth or the form are not port scanning and doing other shit. Why would they? They are planning on going in on port 80, why do I care if port 3306 has mysql running if I won't be using it?

Script Kids - I lived in the cracking world for years. They are 99% Script Kids... and when I say Kids, I mean Kids... as in 15 - 22.

Log Checking - Most of the people here that run porn sites have no clue about their logs or even if they do log. They 'pay people to do that sort of stuff.' But no one ever gets around to it. Or they think their managed hosting includes such services and don't realise the host is only responsible for the server hardware, apache and mysql and the kernal. Everything else is the clients problem.

Image Verification - ??? I don't know of many pornsites that require it to signup, but I know of a lot who require it to login. If you cannot figure out the image we have Darwin Awards available on your way out. I personally think that if it is to hard, perhaps you should live with someone who takes care of you because you must be a fucking retard.

As the gentleman - Dude, there are no gentlemen here...

Ohh, before I forget...
V_RocKs is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-14-2005, 12:56 AM   #43
V_RocKs
Damn Right I Kiss Ass!
 
Industry Role:
Join Date: Dec 2003
Location: Cowtown, USA
Posts: 32,409
Quote:
Originally Posted by Deek
sorry i just caught something.

regarding my comment "Inside of the network" , gaining access to the password files should be rather difficult unless they have put them in an improper location.

And rather then saying "inside of the network" i should have stated shell access to the server.

Apologizes for the mis-type
Obtaining shell access to the server is pretty easy. Especially in the PHP world.
V_RocKs is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-14-2005, 01:03 AM   #44
andi_germany
Confirmed User
 
Join Date: Oct 2002
Location: Germany
Posts: 768
Quote:
Originally Posted by V_RocKs
A lot of reaction.. I will start with this guy.

1 - You point in #1 is pointless. Give me an article, give me a white paper. Just because you say hackers are all knowing doesn't mean shit. You say all images are broken... The only way to thwart image varification is to create signatures. Similar to virus software. You create an image of what a set of numbers with lines running through them look like, now you know what the number is. With SPARTA this is to tedeous. The people hacking porn are working 40 hours a week or going to school or both. They don't have 2000 man hours to do this. They have instead A.D.D... they couldn't keep their attention on the task of creating signatures for SPARTA no matter how much they would like to.

2 - Bruteforcing does start with a dictionary attack. What takes longer smart-guy, finding 8 characters in a dictionary with 62 possibilities per letter or only having to find 6*62 because I know that the first character is always going to be a capitol and the last is always going to be a number? I said always... I guess I should say 85% of the time. But with 85% of the 8,000 member passfile, who gives a flying fuck about the other 15%?

3 - I stated over and over that the best option is to make the password for the customer. If you all them to make it then the hacker doesn't need to look for trillions of passwords, he only needs to look for the 70,000 commonly used words, and then apply simple rul3s t0 f1nd 3v3n m0r3.

4 - You think I give a fuck about some arcane Isreali law saying I can't use Captcha? Why do I need to go to one of these countries anyway?

It seems like you just wanted to rant. I am offering sound advice and you sound like a sleezy defense lawyer trying to protect someone who got caught in the act of a crime and even confessed offering an account of the crime that could only be known by the perpatrator...
1. Ok do a simple google search "captcha broken" and you get a trizillion articles.

2. You still don't get it. Your assumtion is false. If you don't require a capital and/or number the hacker has it in about 1000-40000 tries. Your count of 62 is based on 26 + 26 + 10 but the hacker doesn't need to find the secure password but a couple of insecure ones. Calculationg means nothing here as he simply goes down his dictionary list. If you do require he has to modify the lists to cope with people replacing chars with Capital or numbers. He might still get it fast but not as fast as with no requirement.

3. This is correct but with your statement you just make my point on 2.

4. This is your personal choice. Just be aware if you visit the UK someday ;)
__________________
SIG TOO BIG! Maximum 120x60 button and no more than 3 text lines of DEFAULT SIZE and COLOR. Unless your sig is for a GFY top banner sponsor, then you may use a 624x80 instead of a 120x60.
andi_germany is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-14-2005, 01:08 AM   #45
andi_germany
Confirmed User
 
Join Date: Oct 2002
Location: Germany
Posts: 768
And here is another point. With adding captchas you introduce a new layer to the security system that also might add additional security holes and more reqirements for the user that could turn them to the competition.
__________________
SIG TOO BIG! Maximum 120x60 button and no more than 3 text lines of DEFAULT SIZE and COLOR. Unless your sig is for a GFY top banner sponsor, then you may use a 624x80 instead of a 120x60.
andi_germany is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-14-2005, 01:23 AM   #46
spacemonk
Confirmed User
 
Join Date: Jul 2004
Location: in da VIP
Posts: 969
Quote:
Originally Posted by andi_germany
1. Fact. Image verification is broken. ALL images have been proven to be broken by machines so you are in false security. You get keep the script kiddies out but the serious crackers are in.

Break this



(I know it can be done, but cmmon ;) )
__________________
I sale fu-fme, hit me up for a killer deal!
spacemonk is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-14-2005, 01:25 AM   #47
spacemonk
Confirmed User
 
Join Date: Jul 2004
Location: in da VIP
Posts: 969
Quote:
Originally Posted by Splum
Incorrect. You can ban specific IPs there is no cause for a blanket ban.
I think you are overlooking the fact that AOL forces multiple users to go through the same proxy at the same time.
__________________
I sale fu-fme, hit me up for a killer deal!
spacemonk is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 12-14-2005, 11:04 AM   #48
V_RocKs
Damn Right I Kiss Ass!
 
Industry Role:
Join Date: Dec 2003
Location: Cowtown, USA
Posts: 32,409
Almost a Woj post...
V_RocKs is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks
Thread Tools



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.