GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   Is your NATS hacked ? (https://gfy.com/showthread.php?t=794078)

k0nr4d 12-22-2007 04:11 AM

I've seen code by the tmm guys, i seriously doubt there are any sql injection issues in nats...

uno 12-22-2007 04:15 AM

Panchodog has had the admin locked down via specific full IPs for a very long time now.

quantum-x 12-22-2007 04:18 AM

Quote:

Originally Posted by k0nr4d (Post 13550154)
I've seen code by the tmm guys, i seriously doubt there are any sql injection issues in nats...

Then you're a bad coder. :2 cents:
It's just that simple.

jscott 12-22-2007 04:22 AM

Any input from NATS on this matter? I find this very disturbing, need a little reassurance please John

k0nr4d 12-22-2007 04:24 AM

Quote:

Originally Posted by quantum-x (Post 13550170)
Then you're a bad coder. :2 cents:
It's just that simple.

preventing sql injection is not rocket science, buddy.

quantum-x 12-22-2007 04:32 AM

Quote:

Originally Posted by k0nr4d (Post 13550184)
preventing sql injection is not rocket science, buddy.

Please don't patronize me. I've worked very closely w/ NATS and CARMA since they were in beta.
I have personally tested and proved SQL injections against NATS and CARMA [and dutifully reported them]. I have looked at the source of both, and literally just took a scroll through it again. There are exploitable areas. I haven't seen a mysql_real_escape_string anywhere in the code I saw, and 6 months ago, there were definite issues. HTML_special_chars / [and god forbid] addslashes and the ilk are not sql protection.

Check out - http://www.gofuckyourself.com/showpo...&postcount=218

I know programmers love to piss on each other, but the fact of the matter is that basically ANY script online is susceptible to attack, whether it be by the script itself, or the frameworks that support it.

borked 12-22-2007 04:37 AM

Quote:

Originally Posted by jscott (Post 13550178)
Any input from NATS on this matter? I find this very disturbing, need a little reassurance please John

John said in this thread that he's emailing all NATS customers. You haven't received that email by now?

borked 12-22-2007 04:40 AM

Quote:

Originally Posted by quantum-x (Post 13550198)
Please don't patronize me. I've worked very closely w/ NATS and CARMA since they were in beta.
I have personally tested and proved SQL injections against NATS and CARMA [and dutifully reported them]. I have looked at the source of both, and literally just took a scroll through it again. There are exploitable areas. I haven't seen a mysql_real_escape_string anywhere in the code I saw, and 6 months ago, there were definite issues. HTML_special_chars / [and god forbid] addslashes and the ilk are not sql protection.

Check out - http://www.gofuckyourself.com/showpo...&postcount=218

I know programmers love to piss on each other, but the fact of the matter is that basically ANY script online is susceptible to attack, whether it be by the script itself, or the frameworks that support it.

Interesting...
How many people have access to the open source of NATS? Surely the only way to know where these exploits are, if what you say is correct, is to have access to the source.

How come you have access to the source?

k0nr4d 12-22-2007 04:42 AM

Quote:

Originally Posted by quantum-x (Post 13550198)
Please don't patronize me. I've worked very closely w/ NATS and CARMA since they were in beta.
I have personally tested and proved SQL injections against NATS and CARMA [and dutifully reported them]. I have looked at the source of both, and literally just took a scroll through it again. There are exploitable areas. I haven't seen a mysql_real_escape_string anywhere in the code I saw, and 6 months ago, there were definite issues. HTML_special_chars / [and god forbid] addslashes and the ilk are not sql protection.

Check out - http://www.gofuckyourself.com/showpo...&postcount=218

I know programmers love to piss on each other, but the fact of the matter is that basically ANY script online is susceptible to attack, whether it be by the script itself, or the frameworks that support it.

You may be right, or they may be doing their escaping in the nats_db_query function or relying on magic_quotes_gpc. I don't have access to the nats source, but I'm working on a project with TMM and from the cleanliness of their code, I doubt they would make some noobish mistakes like not sanitizing user input.

quantum-x 12-22-2007 04:44 AM

Quote:

Originally Posted by borked (Post 13550216)
Interesting...
How many people have access to the open source of NATS? Surely the only way to know where these exploits are, if what you say is correct, is to have access to the source.

How come you have access to the source?

A lot of exploits are found by brute forcing. Even public live distros like Backtrack have huge DBs of exploits you can just run over a site / server looking for penetration points.

I don't have the full source, I just have it for a few key files that were left on my server after a tech did an upgrade. TMM knows I have seen them, and I promised them to pass on any info I saw in there that might cause problems, and I have :)

Jet - BANNED FOR LIFE 12-22-2007 04:50 AM

Quote:

Originally Posted by jscott (Post 13550178)
Any input from NATS on this matter? I find this very disturbing, need a little reassurance please John

why do you care, you don't even have an affiliate program

mattyboy 12-22-2007 05:02 AM

Quote:

Originally Posted by Jet (Post 13550243)
why do you care, you don't even have an affiliate program

Perhaps his details have got into the wrong hands if hes joined nats programs :2 cents:

borked 12-22-2007 07:27 AM

Quote:

Originally Posted by SmokeyTheBear (Post 13549328)
i find it odd they would allow an employee one user/pass to get into every nats sponsor.

i find it doubly odd that nobody from nats noticed this account had been compromised before it was posted on gfy.

The TMM login name seems pretty generic and long. AFAIK, there isn't one master access user/pass that accesses all installs.

John said in another thread that it "fully appears to be a compromised password list", so I guess the TMM passwords all got out somehow.

Looks like that's all closed now as he also stated "We have changed our policy so that we no longer maintain ANY passwords to ensure this does not happen via us ever in the future"

borked 12-22-2007 07:40 AM

So, to summarise, since John's last post has gotten buried in a lot of FUD

It looks like a password list has gotten out so NATS owners should contact TMM to see if their customer data has been compromised. OC3 ([email protected]) have also said they can help people with this.

TMM have or are in the process of changing all TMM passwords throughout their client base.

TMM have now taken additional security measures by not storing all passes on their end to prevent this happening again.

TMM are adding additional security measures (1-way encrypted passes) in future NATS releases.

So, if I'm not mistaken, any current NATS owners should now be secured (or over the next day or two) from further compromise via this route.

But, in all, everyone, nomatter what software you use, should take database security very seriously and daily audit any accounts (ssh/mysql/web-based) that have privilege access.

Looks like this issue has come to resolution, so I'm off to enjoy my holidays :thumbsup

s9ann0 12-22-2007 07:42 AM

It wouldn't be the first time it had happenned and it wouldn't be the first time someone got an admin's password and used it on other machines either.

I thought NATS were more security conscious than most though

Paul Markham 12-22-2007 09:11 AM

Quote:

Originally Posted by iMind (Post 13549292)
threats of lawsuit in 10, 9 , 8 , 7 ...

The lawsuit might be coming, but in a different direction.

notoldschool 12-22-2007 09:21 AM

NATS haters unite..lol. TMM is awesome and unliKe most other companies in the industry are on the problems before or as they happen. Its funny you see the shady programs come in here to bash nats when they are the most suspect. Your stats scare the shit out of me....0/10ooo+.

DO NOT TRUST PROGRAMS THAT HAVE CUSTOM BACKENDS. THEY ARE THE ONES TO WATCH FOR.

SmokeyTheBear 12-22-2007 09:27 AM

Quote:

Originally Posted by notoldschool (Post 13550899)
NATS haters unite..lol. TMM is awesome and unliKe most other companies in the industry are on the problems before or as they happen.

thats funny because they were aware of this problem many moons ago and yet instead of fixing the problem they put the blame on their customers. meanwhile MY personal information was stolen.. that doesnt sound like being "on the problem" this issue has been going on for MONTHS.



Quote:

Originally Posted by notoldschool (Post 13550899)
Its funny you see the shady programs come in here to bash nats when they are the most suspect. Your stats scare the shit out of me....0/10ooo+.

you must be the "exception" to the rule , i have never seen any sponsors "bashing" nats , and i think any long term webmaster has noticed non-nats sponsors perform better as a whole.

Quote:

Originally Posted by notoldschool (Post 13550899)


DO NOT TRUST PROGRAMS THAT HAVE CUSTOM BACKENDS. THEY ARE THE ONES TO WATCH FOR.

like nastydollars and bangbros , industry leaders ?

SmokeyTheBear 12-22-2007 09:32 AM

p.s. i should also mention at this point that one of the only sponsors i have heard from that WASN'T hacked was mayors money, and this is because THEY went thru extra security measures above and beyond.

big props to mayors money, your info is secure

SmokeyTheBear 12-22-2007 09:34 AM

Quote:

Originally Posted by borked (Post 13550531)
TMM have now taken additional security measures by not storing all passes on their end to prevent this happening again.

i wonder if one of their security measures will be to listen to their clients and stop blaming their customers for their own security problems.

TheDoc 12-22-2007 09:45 AM

Quote:

Originally Posted by SmokeyTheBear (Post 13550952)
p.s. i should also mention at this point that one of the only sponsors i have heard from that WASN'T hacked was mayors money, and this is because THEY went thru extra security measures above and beyond.

big props to mayors money, your info is secure

http://www.mayorsmoney.com/
http://www.score-group.com/
http://www.evilgneiuscash.com/
http://www.dukedollars.com/

I haven't checked everyone and as I do have updated - corrected them. Thus far, these 4 programs do not have any logins from that IP.

This is a short list of the SEVERAL that use the NATS built in security features that protect your members, webmasters, and admin data.

NATS has the security features already - question is which sponsors are using them?

spacedog 12-22-2007 09:47 AM

Quote:

Originally Posted by mattyboy (Post 13550265)
Perhaps his details have got into the wrong hands if hes joined nats programs :2 cents:

While that certainly is a possibility, there's no indication that this has occured.
It so far just appears to be a harvest of emails

borked 12-22-2007 09:48 AM

Quote:

Originally Posted by TheDoc (Post 13551012)
I haven't checked everyone and as I do have updated - corrected them. Thus far, these 4 programs do not have any logins from that IP.

You need to be checking not for just that IP, but *any* IP on the TMM account that isn't TMM's (67.84.12.95)

TheDoc 12-22-2007 09:50 AM

Mod to above post, wrong URL for score, duh..

http://www.score-cash.com/ (clean program)

TheDoc 12-22-2007 09:51 AM

Quote:

Originally Posted by borked (Post 13551034)
You need to be checking not for just that IP, but *any* IP on the TMM account that isn't TMM's (67.84.12.95)

Aye, I know this.. When the NATS systems are IP locked, nobody but the allowed IP's can access the backend.

SmokeyTheBear 12-22-2007 09:57 AM

Quote:

Originally Posted by spacedog (Post 13551024)
While that certainly is a possibility, there's no indication that this has occured.
It so far just appears to be a harvest of emails

i would find it very unlikely they "only" grabbing emails of members.

the bot is likely used to maintain the list thats why it accesses so often but the affiliate info would likely only be grabbed once making it alot harder to spot amongst the hundreds of email grabs :2 cents:

Gordon G 12-22-2007 10:00 AM

Quote:

Originally Posted by Jet (Post 13550243)
why do you care, you don't even have an affiliate program

Why do you care, you are just a contest whore, amazing you are actually posting in a thread that is not a contest, you silly fuck.

milan 12-22-2007 10:18 AM

Quote:

Originally Posted by SmokeyTheBear (Post 13551080)
i would find it very unlikely they "only" grabbing emails of members.

the bot is likely used to maintain the list thats why it accesses so often but the affiliate info would likely only be grabbed once making it alot harder to spot amongst the hundreds of email grabs :2 cents:


True since they full access they probably collected much more... I just posted what we discovered back in October 2007

https://gfy.com/fucking-around-and-business-discussion/794159-nats-issue.html

D 12-22-2007 10:27 AM

Quote:

Originally Posted by borked (Post 13550081)
No, members passes are cleartext by default. Affiliate passwords are two-way encrypted. What I don't understand is why the need for two-way encryption? To reset an affiliates pass if they forgot it in the backend is nothing, so 1-way encryption would have been far better. John posted in another thread that this is to be included in NATS4. Shame it wasn't sooner IMPO.

Perhaps I'm misremembering, but I coulda sworn that affiliate passwords were displayed... is the encryption something that's changed in the last eighteen months?

And even if passwords are not available, I do, certainly, remember the 'become reseller' option... can affiliates examine their own password via their account's interface, or no? If "no," maybe the case is that I've misremembered, and would appreciate confirmation on that.

Been awhile, and I don't have an updated version of NATs in front of me to play around with.

Ray@TastyDollars 12-22-2007 10:39 AM

Quote:

Originally Posted by TheDoc (Post 13551012)
http://www.mayorsmoney.com/
http://www.score-group.com/
http://www.evilgneiuscash.com/
http://www.dukedollars.com/

I haven't checked everyone and as I do have updated - corrected them. Thus far, these 4 programs do not have any logins from that IP.

This is a short list of the SEVERAL that use the NATS built in security features that protect your members, webmasters, and admin data.

NATS has the security features already - question is which sponsors are using them?

Add TastyDollars to that list.

We had 1 login from that NATS admin account and the date matched on the day they were doing some work for us.

We have also deleted that account just to extra carefull.

Ray

Karupted Charles 12-22-2007 10:42 AM

I wonder if anyone tried to warn people a long time ago that they had serious security issues but was bashed by all the guys John bought drinks for.

fuzebox 12-22-2007 11:08 AM

Quote:

Originally Posted by Brad Mitchell (Post 13549820)
oh jesus christ does NATS really store the affiliate passwords in plain text for an admin access user to view? Tell me that's not true. Please, really. Can anyone confirm?

Brad

Yes, this is true. Both affiliate (including admin users who are stored as affiliates) and members (surfer joins) are stored in plaintext.

borked 12-22-2007 11:13 AM

Quote:

Originally Posted by fuzebox (Post 13551293)
Yes, this is true. Both affiliate (including admin users who are stored as affiliates) and members (surfer joins) are stored in plaintext.

PURE FUD.

Thomas N 12-22-2007 11:33 AM

QuickBuck has not been compromised in any way.

ARS Bryan 12-22-2007 11:35 AM

Quote:

Originally Posted by notoldschool (Post 13550899)
NATS haters unite..lol. TMM is awesome and unliKe most other companies in the industry are on the problems before or as they happen. Its funny you see the shady programs come in here to bash nats when they are the most suspect. Your stats scare the shit out of me....0/10ooo+.

DO NOT TRUST PROGRAMS THAT HAVE CUSTOM BACKENDS. THEY ARE THE ONES TO WATCH FOR.

You're a fucking moron :thumbsup

SmokeyTheBear 12-22-2007 12:22 PM

Quote:

Originally Posted by Ray@TastyDollars (Post 13551213)
Add TastyDollars to that list.

We had 1 login from that NATS admin account and the date matched on the day they were doing some work for us.

We have also deleted that account just to extra carefull.

Ray

:thumbsup:thumbsup

SmokeyTheBear 12-22-2007 12:26 PM

Quote:

Originally Posted by TheDoc (Post 13551053)
Aye, I know this.. When the NATS systems are IP locked, nobody but the allowed IP's can access the backend.

then again , if the head programmer at nats has his password compromised its likely they "could" use nats ip to connect and get the info the same way.

AlienQ - BANNED FOR LIFE 12-22-2007 12:50 PM

Quote:

Originally Posted by Karupted Charles (Post 13551222)
I wonder if anyone tried to warn people a long time ago that they had serious security issues but was bashed by all the guys John bought drinks for.


Raises hand.

WarChild 12-22-2007 12:52 PM

Quote:

Originally Posted by AlienQ (Post 13551639)
Raises hand.

You're just an idiot that nobody takes serious. You didn't warn anybody of anything. You don't have nor have you ever had any insider information about nats or anything else. Again, you're just a broke tool.

notoldschool 12-22-2007 12:55 PM

Quote:

Originally Posted by ARS Bryan (Post 13551364)
You're a fucking moron :thumbsup

You're a fucking dick. Thanks for the compliment.


All times are GMT -7. The time now is 04:14 AM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123