![]() |
Verotel password problems - STILL!
A little while back there was huge post on Verotel's password files being accessd/haxored and being posted on various boards.
Im still having this problem, 99% is my verotel users...What was the solution to these problems for those using verotel? I would do a search but Lensman shut it off cause Amp was attacking gfy thru it. :winkwink: |
Verotel is going out of business one of these days anyway, you might as well switch now to keep the damage minimal.
|
I added the following to one of our clients verotel script:
$remote_address = $ENV{'REMOTE_ADDR'}; $remote_address =~m!^195.20.32! || die "access denied to $remote_address to run this script."; near the top, that stops anyone but verotels class C range from running the script. people were saying it's more likely verotel themselves were hacked because only verotel passwords were leaking, not ccbill etc. |
Quote:
|
Quote:
did well with them for 2 weeks then it just all went to shit... What do you know about verotel? Speak up please, people are listening |
Quote:
|
Quote:
|
Thx Xeno, Ill see what i can do with that snippet of code.
Got to figure out where to paste it lol :winkwink: |
I had heard that somone had managed to get a grip on the method used to generate the Verotel number pairs. If you have a list of 10000 or so valid pairs you will be able to brute force any Verotel site. Same thing with Ibill 900 pincodes, on occasion they will leak out as well.
|
I normally do it towards the top, near where all the settings variables are, password, directory etc.
to ensure it executes first. |
Quote:
:helpme |
Quote:
This is a good step but there are others. Firstly you should rename verotelrum.pl and if you are having trouble that would solve most of it. The other thing is to review your apache access_log to see where it is being executed and by whom. Chances are you will find nothing out of the ordinary. On one of my sites I got a really slick Ibill password hacker causing me grief. I thought he was somehow able to view the .htpasswd file and was then decrypting the passwords. But I sure as shit don't see how. There is a new breed of password hackers now who are really good. |
.htpasswd should utilize the MD5 hash algorithm, which is a one way hash, so it cannot be decrypted, just brute forced with a dictionary attack.
also .ht* is protected in the default apache config, to stop it being displayed. It's more than likely they're accessing the verotellog.txt which contains userid/password combo. |
You can greatly limit your exposure to a web based intrusion with a few simple
changes. CGI scripts: do you need all the ones you have? you may have changed scripts or stopped using a script but did not delete/disable the older version, check your directories for executable scripts you are not using, they might be vulnerable. avoid world writable permissions on your scripts & files, I have seen people who write data to their other websites who keep their home and public_html world writable so their other site can write files to it (bad idea!) If the web server can write to your home directory or files, the attacker can insert backdoors, or even deface your webpage, I notice a lot of the credit card processing companies require your .htpasswd to be world-writable so their scripts can write to it, if an attacker can gain control of apache (via CGI or direct exploitation) they can insert their own username or passwords into your password file(s), I am often amazed that insecurely coded CGI scripts are issued by CC merchants, with the nature of the information they process, and the amount of profit they make I would have thought they would have their scripts audited for security problems by a third-party - but alas no, if you know anyone who knows perl/python ask them to check your scripts for you, especially for input validation attacks, via metacharacters - anyone who is worth their salt will know how to locate/fix these for you. Ensure your provider has patched the web server for known vulnerabilities, I still see web servers vulnerable to remote exploitation via PHP,openSSL and the apache chunking exploit (apache-nosejob.c) this information barely scratches the surface of web security, whole books and web sites have been wrote about the subject but if you're interested here are a few sites that cover some of the topics above: http://www.cgisecurity.com/ http://www.w3.org/Security/Faq/www-security-faq.html http://www.onlamp.com/lpt/a/4045 http://www.cert.org/tech_tips/cgi_metacharacters.html http://www.donkboy.com/html/cgi_exploits.htm http://www.linuxsecurity.com/feature...ting-http.html |
Quote:
|
Quote:
What he said! |
Quote:
|
Quote:
Update: added this snipet of code and over the weekend 20 more accounts were cracked! So my problem still exists...this is startin to really piss me off! anyone else, or am I alone? :mad: |
why not moving to websitebilling?
|
Quote:
<b><font size ="7">I already said I was with ccbill. Im just having problems with some older verotel subscribers.</font></b> |
What website are you running?
|
Quote:
Here is my situation. I renamed verotelrum.pl I renamed the .txt file in which verotel stores usernames. My password file, and verotel txt files are not in the home directory where my sites are. Each and every one of my Verotel un/pw have been posted on passboards. Every single one of them. My site was NOT brute forced. Not a chance. I have scripts that log brute force attacks, and not once has anyone run a verotel combo list on my site. Get this. I have CCBill running as well. Not one of my CCBill un/pw have been compromised. I seeded my pass file with fairly easy un/pw that are in combo lists etc. eg. test123 type shit. None of them have been brute forced. Only my Verotel un/pw' have been shared. Every single one of them. Verotel is blaming me, of course. I blame them. There are too many people, on too many different servers, on too many different networks, on too many different hosts etc. for Verotel to say that servers are being breached, people are sniffing passwords on my network, my server is hacked etc. Bullshit. I think it is on their end. Someone is sniffing packets on their network, or something else is wrong. Maybe there are backdoors into their servers? Read their forums. There are too many people with the exact same problem for Verotel to even think of saying their customers have hacked servers, there are packet sniffers on the customer's networks etc. Nothing is 100% secure, but I am absolute certain that my Verotel un/pw are not being breached on my end. It is on their end. :glugglug |
After reading their board its obivous that its not on our end.
Now, how the hell do i make this shit stop? :helpme fucking verotel :ak47: |
Am in the only getting hamered day in day out with this shit?
Is the only solution to completely remove the User from the passfile? No one else is having this problem? looks like im fucked :( |
One way to stop this is get rid of them. We use them as well and have not had any problems yet, but have been watching.
If you also run ccbill, create a UN and PW for them and stop the rebills on V. The just stop using V. You may loose some cash at the start, but it will work out in the long run. You are loosing bandwidth etc. to these people... |
I hear what your saying Pornyguy, Also i have not used them in awhile but i still have rebills coming in with them and some of these people have been members for a long time.
There has to be a better way to handle this. I cant beleive im the only complaining about it either since a few people use them here. Strange that im the only being hit, worse part is if I change them right now in a few hours they will be cracked again...fucking retarded im telling you! Almost as if the verotel staff is rigth there as i change them and 2 seconds later they are posting the passwords themselves on password boards...sounds crazy but what the hell, how can shit leak so quick unless: a) its an inside job or b) the admin doors are wide open for anyone to retrieve member information. Christ I dont know what to think anymore. at this point it wouldnt hurt for verotel to say something on this, the silence here an on their board is deafening |
doober, i use Verotel on a couple of smallish paysites (read 300-400 members) and haven't run into this problem at all (so far)... are you sure someone isn't accessing your .htpasswd files in some way, that just happens to know how to decrpyt their passwords? also, are you running any sort of protection script on your server to keep track of how many IP addresses use the same password-pair? we use pw sentry to catch rogue accounts and it works pretty flawlessly for us, it will lock an account after it is used by toom any surfers and send am email to you so you can take appropriate action..
|
Chupacabra, Im suing pennywize and keep getting emails all the time.
The only passwords getting hammered are the verotel ones. From what i see on their board im not alone and it has happened before and then suddenly stopped but now it started once again and has not stopped for almost a week....its getting lame and I know for a fact that it cant be on my side. Like i said I change one pass now and in 10 mins it will be used somehwere else pathetic |
doober - are you on a dedicated server, or a shared server? And what OS is it running?
chupacabra - same as above? Reason I am asking is because some old Epoch scripts could be used to root a server, but it could only be done through an exploit in RedHat linux, I forget which kernel. Maybe it is the same for Verotel scripts. |
Quote:
|
Quote:
|
Quote:
|
Quote:
Quote:
|
I think you will find that it is more likely that something is occuring on verotels end, that might be a hack on their servers, or their traffic is sniffed, even with modifications to the perl script which worked and stopped anyone but verotel calling it - there was another password incident, this wasn't a password sharing either, the account was over a year old.
other things point at this: a: people with other merchants are not having the same problems. b: their CGI script isn't being exploited (at least in our case) c: mod_security's logs do not display any suspicious activity, nor does apache logs. seeing has verotel had ftp access to this box, I also checked lastlog and no suspicious logins from the account concerned! - doesn't leave much else BUT them being owned. |
All times are GMT -7. The time now is 11:10 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123