GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   Is your NATS hacked ? (https://gfy.com/showthread.php?t=794078)

SmokeyTheBear 12-21-2007 08:14 PM

Is your NATS hacked ?
 
are there any nats sponsors who havent been compromised ?

seems like every sponsor who has commented has been compromised, just curious as to if anyone who runs nats that didn't get compromised by a nats employee's user/pass

sicone 12-21-2007 08:31 PM

I find it odd that NATs insists on having admin access...


Doesn't NATs also own a pay site program (Teen Dolls)? Would seem to me that having a free list of verified emails of people who are willing to pull out their CC to join a site would be of great value to them.

Not accusing them of anything, just some food for thought

teksonline 12-21-2007 08:35 PM

hrmph, im hungry

iMind 12-21-2007 08:36 PM

Quote:

Originally Posted by sicone (Post 13549275)
I find it odd that NATs insists on having admin access...


Doesn't NATs also own a pay site program (Teen Dolls)? Would seem to me that having a free list of verified emails of people who are willing to pull out their CC to join a site would be of great value to them.

Not accusing them of anything, just some food for thought

threats of lawsuit in 10, 9 , 8 , 7 ...

SmokeyTheBear 12-21-2007 08:49 PM

i find it odd they would allow an employee one user/pass to get into every nats sponsor.

i find it doubly odd that nobody from nats noticed this account had been compromised before it was posted on gfy.

I find it even more strange that there are not any security measures in place that would have spotted this ( i.e. hourly logins from the same employee on almost every nats sponsor so far ) in laymans terms how an employye could log into several nats sponsors at the same time using the same account.

shouldn't any of these things raised more than 1 red flag ?

as far as affiliates are concerned , should we be worried we will now become targets of identity theft ? what plans does nats have on informing affiliates who's information might have been disclosed.

what information can any sponsors provide that might shed some light on what information is available to the nats employee's account that was used to login ? ( i.e. ss#'s ? passwords ? )

sicone 12-21-2007 08:49 PM

sue for what.. pointing out the obvious conflicts of interest.

hope you didnt pay much for your law degree

OzMan 12-21-2007 08:52 PM

shit waddeye miss? ... time to search

dropped9 12-21-2007 08:54 PM

http://notanotherdesigner.com/seesiggy.gif

SmokeyTheBear 12-21-2007 08:56 PM

Quote:

Originally Posted by OzMan (Post 13549336)
shit waddeye miss? ... time to search

a nats employee's username was used to login and most likely steal information from quite a few nats sponsors. infact theres only one sponsor i have heard of using nats that hasn't been compromised , and only because they manually disabled nats employees from logging onto their server

Gordon G 12-21-2007 08:57 PM

Quote:

Originally Posted by Headless (Post 13549339)

My god you are such a fucking idiot.

spacedog 12-21-2007 08:58 PM

Quote:

Originally Posted by SmokeyTheBear (Post 13549344)
a nats employee's username was used to login and most likely steal information from quite a few nats sponsors. infact theres only one sponsor i have heard of using nats that hasn't been compromised , and only because they manually disabled nats employees from logging onto their server


A nats employee who last posted on the Nats board in August but then started posting elsewhere looking for freelance jobs in September?????

Gordon G 12-21-2007 08:58 PM

why anyone uses nats is beyond me:2 cents:

SmokeyTheBear 12-21-2007 09:01 PM

i wonder how many affiliates who used nats sponsors had their epassporte accounts stolen thru info obtained from this compromise ? it would explain the rash of epassporte thefts.

spacedog 12-21-2007 09:04 PM

Quote:

Originally Posted by SmokeyTheBear (Post 13549364)
i wonder how many affiliates who used nats sponsors had their epassporte accounts stolen thru info obtained from this compromise ? it would explain the rash of epassporte thefts.

Not likely. Programs don't ask for your epass password.

Gotta be a real fucking idiot to be using same password everywhere in first place.

wtfent 12-21-2007 09:07 PM

Quote:

Originally Posted by sicone (Post 13549275)
I find it odd that NATs insists on having admin access...


Doesn't NATs also own a pay site program (Teen Dolls)? Would seem to me that having a free list of verified emails of people who are willing to pull out their CC to join a site would be of great value to them.

Not accusing them of anything, just some food for thought

Why the hell would they do that? So they can make a quick $10,000 and loose out on the millions they will make in the future with nats? I buy trials every now and then and if i saw them spamming me with their sites I think it would make for pretty huge drama that would spread within a week max. The Nats guys are all stand up guys.

SmokeyTheBear 12-21-2007 09:12 PM

Quote:

Originally Posted by spacedog (Post 13549376)
Not likely. Programs don't ask for your epass password.

Gotta be a real fucking idiot to be using same password everywhere in first place.

do you think it would be easier to hack an epassporte account knowing all their personal information ? :winkwink:

also take into account that many sponsors created the epassporte accounts for their affiliates ( perhaps with the affiliates current password )

now obviously using shared passwords is a big no-no but thats beside the point. ideally everyone should have a deadbolt on their door , but i would think if your locksmith's key was used to get in you first look at the locksmith

AlienQ - BANNED FOR LIFE 12-21-2007 09:12 PM

Stats and client information are the most coveted of things a program owner can have. Why people that use NATS chose NATS is pure stupidity.

I said it 3 years ago and I am still saying it.
People called me an idiot then, and will probably call me an idiot now for saying so...

And to this day I still say I told ya so.
No sympathy from me.

Dumb is dumb.

iMind 12-21-2007 09:23 PM

Quote:

Originally Posted by sicone (Post 13549329)
sue for what.. pointing out the obvious conflicts of interest.

hope you didnt pay much for your law degree

I was referring to John from nats, How he starts threatening lawsuits and using legal jargon to try and shut people up.:1orglaugh

Gordon G 12-21-2007 09:25 PM

Quote:

Originally Posted by iMind (Post 13549424)
I was referring to John from nats, How he starts threatening lawsuits and using legal jargon to try and shut people up.:1orglaugh

John and lawsuits have a ring to it lol

:1orglaugh:1orglaugh

SmokeyTheBear 12-21-2007 09:27 PM

Quote:

Originally Posted by AlienQ (Post 13549396)
Stats and client information are the most coveted of things a program owner can have. Why people that use NATS chose NATS is pure stupidity.

I said it 3 years ago and I am still saying it.
People called me an idiot then, and will probably call me an idiot now for saying so...

And to this day I still say I told ya so.
No sympathy from me.

Dumb is dumb.

yer freakin nostradamus :winkwink:

i think many sponsors use nats because

A) its pretty easy
B) alot of other sponsors use it so for affiliates its easy to navigate.

those arent of course very good reasons , but understandable anyways.

having a standard sponsor software will always lead to troubles when you have a compromise like this .

iMind 12-21-2007 09:28 PM

Quote:

Originally Posted by SmokeyTheBear (Post 13549435)
yer freakin nostradamus :winkwink:

i think many sponsors use nats because

A) its pretty easy
B) alot of other sponsors use it so for affiliates its easy to navigate.

those arent of course very good reasons , but understandable anyways.

having a standard sponsor software will always lead to troubles when you have a compromise like this .

Alienq invented hacking nats

JOKER 12-21-2007 09:46 PM

Quote:

Originally Posted by SmokeyTheBear (Post 13549395)
do you think it would be easier to hack an epassporte account knowing all their personal information ? :winkwink:

also take into account that many sponsors created the epassporte accounts for their affiliates ( perhaps with the affiliates current password )

now obviously using shared passwords is a big no-no but thats beside the point. ideally everyone should have a deadbolt on their door , but i would think if your locksmith's key was used to get in you first look at the locksmith

Right on the fucking money. :2 cents:

Remember the TrafficHangar incident and how many have been affected?

Didnt see this thread at first, sorry...

Posted something similiar here as well:

http://www.gofuckyourself.com/showpo...&postcount=184

SmokeyTheBear 12-21-2007 10:34 PM

seems like a few sponsors would be glad to pipe in that their nats wasnt hacked unless everyone was hacked except those that banned nats employees access.

V_RocKs 12-22-2007 12:02 AM

Epassporte hacks are usually someone using their Epassporte account password as their affiliate account password. The affiliate Db gets hacked and the hacker just has to trial and error his way through the DB...

Instant cash.

Then see where you bank if you are one of the wires types and use your password there too. Again.. easy money. Especially if the hacker can gain access to an account as the same bank... Transfer all your money with a few clicks...

Of course, every time this happens the guy who got fucked in the ass says he didn't use the same password. Yeah... Way to save face pall.. We all know you did. No use lying about it!

Brad Mitchell 12-22-2007 12:07 AM

Quote:

Originally Posted by JOKER | JOKEREMPIRE Inc. (Post 13549482)
Right on the fucking money. :2 cents:

Remember the TrafficHangar incident and how many have been affected?

Didnt see this thread at first, sorry...

Posted something similiar here as well:

http://www.gofuckyourself.com/showpo...&postcount=184

oh jesus christ does NATS really store the affiliate passwords in plain text for an admin access user to view? Tell me that's not true. Please, really. Can anyone confirm?

Brad

SmokeyTheBear 12-22-2007 12:16 AM

Quote:

Originally Posted by V_RocKs (Post 13549802)
Epassporte hacks are usually someone using their Epassporte account password as their affiliate account password. The affiliate Db gets hacked and the hacker just has to trial and error his way through the DB...

Instant cash.

i dont know about usally but i'm sure it happens this way quite often , but prob just as often it is other things further down the line , like once they know your epass account name = (affilid+sponsorname) + users real email they have ALOT more to go on even if the passwords are different ( besides having all your personal info needed to steal your identity )

gotta wonder how the "head programmer" of nats lost his password :Oh crap

you would think that would be a pretty important password to lose when it means you can backdoor every nats sponsor and walk away with a kings ransom in data.

you would also think it would be a pretty hard thing to miss for so long , the head programmers master backdoor is compromised and nobody notices a thing . :Oh crap

rowan 12-22-2007 12:25 AM

Quote:

Originally Posted by Brad Mitchell (Post 13549820)
oh jesus christ does NATS really store the affiliate passwords in plain text for an admin access user to view? Tell me that's not true. Please, really. Can anyone confirm?

Even if it's not plain text, it wouldn't take too long to brute force crack some common passwords such as 'coffee' or '12345'. As a bonus, they're probably the most likely people to use the same pass everywhere. :Oh crap

D 12-22-2007 12:33 AM

So, what I'm hearing is anyone using NATS who didn't disable TMM's access to their servers has the personal information of their entire user-base and affiliate-base compromised?

:Oh crap

milan 12-22-2007 12:37 AM

Quote:

Originally Posted by D (Post 13549878)
So, what I'm hearing is anyone using NATS who didn't disable TMM's access to their servers has the personal information of their entire user-base and affiliate-base compromised?

:Oh crap

Exactly!

Nails 12-22-2007 01:41 AM

Sounds like someone should be sueing Nats right about now.

D 12-22-2007 02:05 AM

Quote:

Originally Posted by Brad Mitchell (Post 13549820)
oh jesus christ does NATS really store the affiliate passwords in plain text for an admin access user to view? Tell me that's not true. Please, really. Can anyone confirm?

Brad

Sorry I missed this before my first post in this thread... was kinda dumb-founded at the fact that I blew that thread off this morning as "another drama thread."

As of the last time we used NATS (a year ago), and as I can recall, all affiliate and user passwords, usernames, addresses, epass account names, etc. were stored in plain text.

:(

Someone please correct me if that's not the status quo.

pocketkangaroo 12-22-2007 02:23 AM

Quote:

Originally Posted by D (Post 13549989)
Sorry I missed this before my first post in this thread... was kinda dumb-founded at the fact that I blew that thread off this morning as "another drama thread."

As of the last time we used NATS (a year ago), and as I can recall, all affiliate and user passwords, usernames, addresses, epass account names, etc. were stored in plain text.

:(

Someone please correct me if that's not the status quo.

Would this include banks and account numbers for wires/ACH? I'm just a tad worried that my company's banking information is sitting in the hands of a hacker right now. I'm hoping it's somehow protected though.

Also, what about stuff like SSN? My company uses a FEIN but I'm guessing some still use their SSN.

Doctor Dre 12-22-2007 02:28 AM

Quote:

Originally Posted by wtfent (Post 13549384)
Why the hell would they do that? So they can make a quick $10,000 and loose out on the millions they will make in the future with nats? I buy trials every now and then and if i saw them spamming me with their sites I think it would make for pretty huge drama that would spread within a week max. The Nats guys are all stand up guys.

I'm in NO WAY saying Nat's are the one emailing the members... not at all. I think (to myself) with the answers we've seen here, it's pretty clear that John might be arrogant, but I doubt he's guilty of this one.

But having access to emailing 50 % + of the surfers paying for porn will bring a lot more money then $10 000. It's totally targetted surfers, the perfect list.

I'm sure lots of people could be willing to spend a tons of cash developping a technology to hack into that kind of data.

The webmaster epass stolen could also be explained.

SmokeyTheBear 12-22-2007 02:32 AM

Quote:

Originally Posted by pocketkangaroo (Post 13550012)
Would this include banks and account numbers for wires/ACH? I'm just a tad worried that my company's banking information is sitting in the hands of a hacker right now. I'm hoping it's somehow protected though.

Also, what about stuff like SSN? My company uses a FEIN but I'm guessing some still use their SSN.

my guess would be yes, if the account passwords were not encrypted then i dont know why they would encrypt the banking info.

besides if the password is there the hacker can just login with your account and see the banking info if its available in your settings.

kmanrox 12-22-2007 02:34 AM

doh!!!!!!!

hateman 12-22-2007 02:38 AM

NATS is fucked

it has so many flaws

why sponsors use it is beyond me.

borked 12-22-2007 03:17 AM

Quote:

Originally Posted by Brad Mitchell (Post 13549820)
oh jesus christ does NATS really store the affiliate passwords in plain text for an admin access user to view? Tell me that's not true. Please, really. Can anyone confirm?

Brad

No, members passes are cleartext by default. Affiliate passwords are two-way encrypted. What I don't understand is why the need for two-way encryption? To reset an affiliates pass if they forgot it in the backend is nothing, so 1-way encryption would have been far better. John posted in another thread that this is to be included in NATS4. Shame it wasn't sooner IMPO.

c0py-BANNED FOR LIFE 12-22-2007 04:01 AM

All I can say is SQL Injection.

quantum-x 12-22-2007 04:11 AM

Quote:

Originally Posted by c0py (Post 13550137)
All I can say is SQL Injection.

Bang on the money.

quantum-x 12-22-2007 04:11 AM

Quote:

Originally Posted by Nails (Post 13549955)
Sounds like someone should be sueing Nats right about now.

They already have pending law suits.

k0nr4d 12-22-2007 04:11 AM

I've seen code by the tmm guys, i seriously doubt there are any sql injection issues in nats...

uno 12-22-2007 04:15 AM

Panchodog has had the admin locked down via specific full IPs for a very long time now.

quantum-x 12-22-2007 04:18 AM

Quote:

Originally Posted by k0nr4d (Post 13550154)
I've seen code by the tmm guys, i seriously doubt there are any sql injection issues in nats...

Then you're a bad coder. :2 cents:
It's just that simple.

jscott 12-22-2007 04:22 AM

Any input from NATS on this matter? I find this very disturbing, need a little reassurance please John

k0nr4d 12-22-2007 04:24 AM

Quote:

Originally Posted by quantum-x (Post 13550170)
Then you're a bad coder. :2 cents:
It's just that simple.

preventing sql injection is not rocket science, buddy.

quantum-x 12-22-2007 04:32 AM

Quote:

Originally Posted by k0nr4d (Post 13550184)
preventing sql injection is not rocket science, buddy.

Please don't patronize me. I've worked very closely w/ NATS and CARMA since they were in beta.
I have personally tested and proved SQL injections against NATS and CARMA [and dutifully reported them]. I have looked at the source of both, and literally just took a scroll through it again. There are exploitable areas. I haven't seen a mysql_real_escape_string anywhere in the code I saw, and 6 months ago, there were definite issues. HTML_special_chars / [and god forbid] addslashes and the ilk are not sql protection.

Check out - http://www.gofuckyourself.com/showpo...&postcount=218

I know programmers love to piss on each other, but the fact of the matter is that basically ANY script online is susceptible to attack, whether it be by the script itself, or the frameworks that support it.

borked 12-22-2007 04:37 AM

Quote:

Originally Posted by jscott (Post 13550178)
Any input from NATS on this matter? I find this very disturbing, need a little reassurance please John

John said in this thread that he's emailing all NATS customers. You haven't received that email by now?

borked 12-22-2007 04:40 AM

Quote:

Originally Posted by quantum-x (Post 13550198)
Please don't patronize me. I've worked very closely w/ NATS and CARMA since they were in beta.
I have personally tested and proved SQL injections against NATS and CARMA [and dutifully reported them]. I have looked at the source of both, and literally just took a scroll through it again. There are exploitable areas. I haven't seen a mysql_real_escape_string anywhere in the code I saw, and 6 months ago, there were definite issues. HTML_special_chars / [and god forbid] addslashes and the ilk are not sql protection.

Check out - http://www.gofuckyourself.com/showpo...&postcount=218

I know programmers love to piss on each other, but the fact of the matter is that basically ANY script online is susceptible to attack, whether it be by the script itself, or the frameworks that support it.

Interesting...
How many people have access to the open source of NATS? Surely the only way to know where these exploits are, if what you say is correct, is to have access to the source.

How come you have access to the source?

k0nr4d 12-22-2007 04:42 AM

Quote:

Originally Posted by quantum-x (Post 13550198)
Please don't patronize me. I've worked very closely w/ NATS and CARMA since they were in beta.
I have personally tested and proved SQL injections against NATS and CARMA [and dutifully reported them]. I have looked at the source of both, and literally just took a scroll through it again. There are exploitable areas. I haven't seen a mysql_real_escape_string anywhere in the code I saw, and 6 months ago, there were definite issues. HTML_special_chars / [and god forbid] addslashes and the ilk are not sql protection.

Check out - http://www.gofuckyourself.com/showpo...&postcount=218

I know programmers love to piss on each other, but the fact of the matter is that basically ANY script online is susceptible to attack, whether it be by the script itself, or the frameworks that support it.

You may be right, or they may be doing their escaping in the nats_db_query function or relying on magic_quotes_gpc. I don't have access to the nats source, but I'm working on a project with TMM and from the cleanliness of their code, I doubt they would make some noobish mistakes like not sanitizing user input.

quantum-x 12-22-2007 04:44 AM

Quote:

Originally Posted by borked (Post 13550216)
Interesting...
How many people have access to the open source of NATS? Surely the only way to know where these exploits are, if what you say is correct, is to have access to the source.

How come you have access to the source?

A lot of exploits are found by brute forcing. Even public live distros like Backtrack have huge DBs of exploits you can just run over a site / server looking for penetration points.

I don't have the full source, I just have it for a few key files that were left on my server after a tech did an upgrade. TMM knows I have seen them, and I promised them to pass on any info I saw in there that might cause problems, and I have :)


All times are GMT -7. The time now is 11:16 PM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123