Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 09-22-2002, 03:43 PM   #1
cgiGeek
Confirmed User
 
Industry Role:
Join Date: Jan 2002
Location: Miami Beach, FL
Posts: 203
Brute force attack

some one is brute forcing my member area with multipe country ips and very fast, cannot block it on account of the amount of ips he is using, about 10 diferent ones per second,
cant script anything either on account of ip quantity

any ideas would be appreciate it

Thanks
__________________
Need help dealing with a hacked website? Contact me via icq 163583431 :D
Premium Bandwidth Managed Servers, 12 Years in business xxxHOSTit.com
I work for xxxhostit.com
cgiGeek is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-22-2002, 03:49 PM   #2
pr0
rockin tha trailerpark
 
pr0's Avatar
 
Industry Role:
Join Date: May 2001
Location: ~Coastal~
Posts: 23,088
Get used to it...take all known precautions & just ride out the storm.

People will tell you pennywise this...proxy gaurd that...but nothing works if someone knows what they are doing.
pr0 is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-22-2002, 06:24 PM   #3
Backov
Confirmed User
 
Join Date: Mar 2001
Location: Cat Detector Van
Posts: 1,600
Quote:
Originally posted by pr0
Get used to it...take all known precautions & just ride out the storm.

People will tell you pennywise this...proxy gaurd that...but nothing works if someone knows what they are doing.
Sorry mate, you're just plain wrong.

To the poster - go get proxypass http://www.proxypass.com/ - it will fix your problem, like it did ours.

When the script denies any attempts to brute force from an open proxy, then they've got no tools. The others like Pennywise and IProtect and such are useless against an open proxy based brute force attack.

Cheers,
Backov
__________________
<embed src="http://banners.spotbrokers.com/button.swf" FlashVars="clickURL=http://banners.spotbrokers.com" quality=high pluginspage="http://www.macromedia.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash" type="application/x-shockwave-flash" width="120" height="60"></embed>
Backov is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-22-2002, 06:25 PM   #4
notjoe
Confirmed User
 
Industry Role:
Join Date: May 2002
Location: Toronto, Canada
Posts: 5,599
Quote:
Originally posted by cgiGeek
some one is brute forcing my member area with multipe country ips and very fast, cannot block it on account of the amount of ips he is using, about 10 diferent ones per second,
cant script anything either on account of ip quantity

any ideas would be appreciate it

Thanks

Write a script to deactivate the username/password trying to be cracked and have it re-enabled once the attack is done... shouldnt be too hard to implement.

Joe
notjoe is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-22-2002, 06:26 PM   #5
pr0
rockin tha trailerpark
 
pr0's Avatar
 
Industry Role:
Join Date: May 2001
Location: ~Coastal~
Posts: 23,088
Yea im just plain wrong

We got kevin mitnick from BikiniVoyeur over here.....

I clearly stated "nothing works if someone knows what they are doing". I.E. using non standard port proxies etc. much like the new 3rd generation hitbots.

What does your script scan 3128, 80, 8080, 8000, 8001, 1080, 21, 22, 25 etc.

Any surfers firewall would be lighting up like an x-mas tree.

But its cool, if what you got is working for you then great, just don't tell me im plain wrong.

Last edited by pr0; 09-22-2002 at 06:30 PM..
pr0 is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-22-2002, 08:20 PM   #6
Jamie
Confirmed User
 
Join Date: Apr 2001
Location: CelebPay.com
Posts: 2,517
Pennywise ?
__________________
CelebPay: Promote Celebrity Reviews
i/c/q - :1851935
Jamie is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-22-2002, 08:51 PM   #7
WiredGuy
Pounding Googlebot
 
Industry Role:
Join Date: Aug 2002
Location: Canada
Posts: 34,482
Well, your users are real people that probably click on the members link to enter your site right? And this script is stupid and will keep hitting the same login page over and over? So why not just do a simple renaming of the login section?

So if your members site is http://www.site.com/members/, just rename your directory something like /member/ and the old directory deleted. This won't prevent the brute force aspect but it won't bog down your server as much from failed login attempts, it will just 401 error the script.

Not a great solution I admit but its a quick solution until you can reduce brute force attacks.

WG
__________________
I play with Google.
WiredGuy is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-22-2002, 08:53 PM   #8
SleazyDream
I'm here for SPORT
 
SleazyDream's Avatar
 
Industry Role:
Join Date: Jul 2001
Location: Phone # (401) 285-0696
Posts: 41,470
Quote:
Originally posted by cgiGeek
some one is brute forcing my member area with multipe country ips and very fast, cannot block it on account of the amount of ips he is using, about 10 diferent ones per second,
cant script anything either on account of ip quantity

any ideas would be appreciate it

Thanks
send him the password to get in. Obviously he wants to see the members area. don't be soo cheap - show him the good porn.
__________________
This dog, is dog, a dog, good dog, way dog, to dog, keep dog, an dog, idiot dog, busy dog, for dog, 20 dog, seconds dog!

Now read without the word dog.
SleazyDream is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-22-2002, 10:20 PM   #9
Backov
Confirmed User
 
Join Date: Mar 2001
Location: Cat Detector Van
Posts: 1,600
Quote:
Originally posted by pr0
Yea im just plain wrong

We got kevin mitnick from BikiniVoyeur over here.....

I clearly stated "nothing works if someone knows what they are doing". I.E. using non standard port proxies etc. much like the new 3rd generation hitbots.

What does your script scan 3128, 80, 8080, 8000, 8001, 1080, 21, 22, 25 etc.

Any surfers firewall would be lighting up like an x-mas tree.

But its cool, if what you got is working for you then great, just don't tell me im plain wrong.
You're just plain wrong bud. There it is. Again. I've been a programmer for about 16 years - have you been alive that long?

Anyway, it's not my script. We just use it. It not only scans for tags that the attacker is using an open proxy, there's a HUGE centralized db of open proxies that's constantly updated. It's about as serious as you can get.


Cheers,
Backov
__________________
<embed src="http://banners.spotbrokers.com/button.swf" FlashVars="clickURL=http://banners.spotbrokers.com" quality=high pluginspage="http://www.macromedia.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash" type="application/x-shockwave-flash" width="120" height="60"></embed>

Last edited by Backov; 09-22-2002 at 10:28 PM..
Backov is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-23-2002, 11:04 AM   #10
PxG
Confirmed User
 
Join Date: Feb 2002
Posts: 105
Dear CGI Geek,
If you got Qs, please hit me up on ICQ and we can chat!
#153529369

BTW. Backov is not the owner of the pxp , but he is a client
of ours, here's another testimonial from another one of our clients
"The load times where averaging 5.0 and got as high as 16.0 the same day you installed this I stopped our daily backups as well so I think between the two this server should be smooth. It's doing .3 - .5 all day wow I'm happy this server was crashing daily. On top of the servers already high loads customers where yakking about pennywize which causes even higher loads. So your solution is a miracle in the working. I think everything is fine, I probably going to roll this out on two more boxes next week.

Thank you,

Charles Yarbrough
www.dwhs.net
www.adult-website-hosting.com
1-866-660-HOST"

Also check out TopCash's testimonial at http://www.proxypass.com/modules.php...rder=0&thold=0

Sorry not trying to spam, but people should be aware that there's an alternative to Pennywize and Iprotect.


Best regards,



PxG
__________________
Kill Password Hackers Now!
Kill Hit-Botters Now!
_____________________________
PxG is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-23-2002, 11:16 AM   #11
exitmoney
Confirmed User
 
Join Date: Apr 2002
Location: montreal, canada
Posts: 143
change your member area files or something like that so the robot hammers a file that does not exist

exitmoney is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-23-2002, 11:45 AM   #12
mike503
Confirmed User
 
Industry Role:
Join Date: May 2002
Location: oregon.
Posts: 2,243
if you're a true CGI geek, you should be able to figure something out on your own. ya know.
__________________
php/mysql guru. hosting, coding, all that jazz.
mike503 is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-23-2002, 11:49 AM   #13
salsbury
Confirmed User
 
Join Date: Feb 2002
Location: Seattle
Posts: 1,070
tips from a guy who knows how to do this:

1) avoid any programs/scripts that attempt to "throttle" the crackers in real time. that is a sure path to doom. your server's connections will be so tied up with this throttling that nobody else will be able to get in.

2) don't use ipf - your CPU will be so busy checking each and every incoming packet that it will slow down the site for everyone else.

3) if you don't know how to do it, don't worry about it. just catch the guys who make it in. or assign good passwords.
__________________
salsbury is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-23-2002, 12:04 PM   #14
Rory
Confirmed User
 
Join Date: Jul 2002
Location: I Love Ixtapa, Mexico ö
Posts: 616
Just wanted to mention that I just talked to a guy from proxypass.com cause I had a few questions and he got right back to me and answered all the questions I had quickly and he seemed to know what he was talking about. He seemed very proffessional and knowledgeable, I will be using proxypass when I get launched, if it does what it says should be nice addition.

Rory
Rory is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-23-2002, 12:16 PM   #15
PxG
Confirmed User
 
Join Date: Feb 2002
Posts: 105
Quote:
Originally posted by salsbury
tips from a guy who knows how to do this:

1) avoid any programs/scripts that attempt to "throttle" the crackers in real time. that is a sure path to doom. your server's connections will be so tied up with this throttling that nobody else will be able to get in.

2) don't use ipf - your CPU will be so busy checking each and every incoming packet that it will slow down the site for everyone else.

3) if you don't know how to do it, don't worry about it. just catch the guys who make it in. or assign good passwords.
I just wanted to respond to both Salsbury and pr0. Both have interesting points that I'd like to address.

Salsbury: your point about network connections is valid. However, we use UDP protocol which extremely low level and doesn't rely on a three-part handshake. Basically, we average response times of 0.01 - 0.05 seconds to our clients. And, since its UDP there is never any network backup or bottleneck. Also, we do deposit a local db of proxies we've caught on the client system, for fast reference.

pr0: your concern about non-standard port proxies has one problem with it: there are very few non-standard port proxies around. I found a list of proxies on your web site, it was a list of 2065. Our DB currently has between 50,000 - 100,000 open, abusable proxies that we refresh and remove old ones from on a daily basis. Now, I am not sure if all of your proxies are non-standard port or not, but let's assume they are.

You have a list of 2000, more or less. Let's do some math:

1) Our software will also block attempts from the same IP after X attempts (usually 5 or so). As a result, even if we don't detect your 2000 proxies then you will get about 10,000 attempts to crack a password. In the cracking world, this is not a lot.

2) Let's say you optimize your cracking effort and therefore use only 1 username (you've lowered the number of variables you need to guess at to 1 now). Our software also does username blocks after X attempts on a particular username (regardless of IP). So this optimization is now null.

So the bottom line is that since there are very few non-standard port proxies available to a cracker, attempting to crack a site protected with ProxyPass has very little chance for success. 10,000 attempts is VERY LOW, as most cracking requires 100,000s or millions of attempts before a username/pass is obtained. And that's if you concentrate on a single username!
And the most important thing is that your server doesn't handle and return a ton of authentication attempts, lowering the user load average greatly.

The cracker would be much better off to assemble a list of say, 10,000 proxies and attack another site that is not protected with proxypass.

I hope this helps,
__________________
Kill Password Hackers Now!
Kill Hit-Botters Now!
_____________________________
PxG is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-23-2002, 02:49 PM   #16
cgiGeek
Confirmed User
 
Industry Role:
Join Date: Jan 2002
Location: Miami Beach, FL
Posts: 203
attack does not repeat ip per user,
so no conventional method will work,
I have stop proactivly 100 IPs attacks before,
this is very diferent.
Now proxi based software is based on 2 assumtions:
1. Attack signature
Does not have one
2. It knows all open proxies
Numeric imposibility
Also it has to authenticarte ip on query, but next query to log it
would be a killer counting on God giving you a way to tell which IP is bad and which one is not.

I think is more on replacing apache authentication
with something booby trapped with timeouts,
and non standard http headers so damn bot goes crazy,
of course at a great resources cost.
__________________
Need help dealing with a hacked website? Contact me via icq 163583431 :D
Premium Bandwidth Managed Servers, 12 Years in business xxxHOSTit.com
I work for xxxhostit.com
cgiGeek is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 09-23-2002, 03:08 PM   #17
PxG
Confirmed User
 
Join Date: Feb 2002
Posts: 105
Quote:
Originally posted by cgiGeek
attack does not repeat ip per user,
so no conventional method will work,
I have stop proactivly 100 IPs attacks before,
this is very diferent.
Now proxi based software is based on 2 assumtions:
1. Attack signature
Does not have one
2. It knows all open proxies
Numeric imposibility
Also it has to authenticarte ip on query, but next query to log it
would be a killer counting on God giving you a way to tell which IP is bad and which one is not.

I think is more on replacing apache authentication
with something booby trapped with timeouts,
and non standard http headers so damn bot goes crazy,
of course at a great resources cost.
cgiGeek,

We do not simply rely on our DB of open proxies. We actively search for open proxies during an attack, so that you receive denial of proxies in REAL-TIME, even though they are not in our DB yet. Of course, we analyze millions of hits per day between the proxypass and proxyguard products, so we have a very sizable database of open proxies.

We built this program because there is no commercial program out there right now to stop brute force attacks through proxies and because we felt there is room in the market for something that does. Our clients have all seen dramatically improved results, as you can tell by their testimonials and unprompted comments on this and other boards.

Of course, nothing is perfect and the Apache auth scheme sucks.
That's the core of the problem, you are right. But until Ibill, CCbill, and Epoch change their requirements (right now they require apache auth) there is very little alternative. Our program has built in "booby traps" too. I won't get into specifics, but under "heavy attacks" a mode is triggered in which responses are not given to proxy-ip requests. This frustrates bots and spins them into timeout/wait states... it's a little way of saying BACK OFF. This could potentially crash a botters server, etc.

And even if you used php/mysql, the potential is still there for brute forcing via proxies... it just won't take such a dangerous toll on your server (PHP is faster and has less overhead than apache auth schemes). But the physical attacks will still persist and passwords will be stolen.

Best Regards,
__________________
Kill Password Hackers Now!
Kill Hit-Botters Now!
_____________________________
PxG is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.