GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   password list back online again (https://gfy.com/showthread.php?t=79689)

Easy 09-29-2002 11:48 PM

password list back online again
 
http://tmd.df.ru/private.html

Mr.Fiction 09-29-2002 11:50 PM

Thanks.

Easy 09-30-2002 12:06 AM

hmm.. maybe here someone has a good idea how to stop bruteforce attacks.

They are using a huge anon proxylist and testing each day 50k combinations within two hours. Blocking the IPs won't work...

echo465 09-30-2002 12:09 AM

Quote:

Originally posted by Easy
hmm.. maybe here someone has a good idea how to stop bruteforce attacks.

They are using a huge anon proxylist and testing each day 50k combinations within two hours. Blocking the IPs won't work...

How about this:

When you've detected that an attack is underway, always fail the first login from an IP, even if the password is correct.. a surfer will (hopefully) assume that they mistyped their password, and try again, while a brute forcer will just continue on.

Anyone?

pimpdog3 09-30-2002 12:12 AM

god damn, that list would make a kick ass plugin!!

Backov 09-30-2002 12:14 AM

Quote:

Originally posted by Easy
hmm.. maybe here someone has a good idea how to stop bruteforce attacks.

They are using a huge anon proxylist and testing each day 50k combinations within two hours. Blocking the IPs won't work...

http://www.proxypass.com

That will kick the shit out of basically all brute force attacks.

Cheers,
Backov

Rictor 09-30-2002 12:15 AM

Cool. Free porn. Cha ching.

echo465 09-30-2002 12:16 AM

Quote:

Originally posted by Easy
hmm.. maybe here someone has a good idea how to stop bruteforce attacks.

They are using a huge anon proxylist and testing each day 50k combinations within two hours. Blocking the IPs won't work...

Another idea -- monitor the webpage for compromized accounts, and then redirect users with that username and password to that 'hey everyone, i'm looking at gay porn!!' page :Graucho

link to that website that YOU DO NOT WANT TO CLICK ON is http://d-m-s-1-0-0.org/worksucks (without the dashes) (i think, but i'm sure as hell not gonna go check).

Mr.Fiction 09-30-2002 12:17 AM

Quote:

Originally posted by pimpdog3
god damn, that list would make a kick ass plugin!!
:thumbsup

kinkyplace 09-30-2002 12:37 AM

I checked out some of the sites from that list. Gee, I cannot believe people are actually paying for that...!
But maybe that was a collection of all the crappy sites?

eru 09-30-2002 12:50 AM

FREE PORN YES!!!!

BrettJ 09-30-2002 01:39 AM

Quote:

Originally posted by kinkyplace
I checked out some of the sites from that list. Gee, I cannot believe people are actually paying for that...!
But maybe that was a collection of all the crappy sites?

Hey Fag - my site was on that =)

well back to jerking off to lots of "FREE" Porn!!

~Brett

eru 09-30-2002 03:42 AM

lindaoneil.com was on there! Nice! She's one hot mama!

SetTheWorldonFire 09-30-2002 03:44 AM

anyone got anymore lotion? :eyecrazy

mastamindz 09-30-2002 03:55 AM

Quote:

Originally posted by SetTheWorldonFire
anyone got anymore lotion? :eyecrazy
The BBW sites are hot. I must have jerked it 12 times in the last half hour.

B40 09-30-2002 04:07 AM

Quote:

Originally posted by eru
FREE PORN YES!!!!
Time to jerk off!

sherbert 09-30-2002 04:11 AM

WOOHOO!

kinkyplace 09-30-2002 04:35 AM

Quote:

Originally posted by BrettJ


Hey Fag - my site was on that =)

well back to jerking off to lots of "FREE" Porn!!

~Brett

Stop calling me names! I'm a Pervert and not a Fag! :thefinger

So which of the crappy sites was yours? Is the password still working? I have to check it out... :evil-laug

PxG 09-30-2002 07:11 AM

Quote:

Originally posted by Easy
hmm.. maybe here someone has a good idea how to stop bruteforce attacks.

They are using a huge anon proxylist and testing each day 50k combinations within two hours. Blocking the IPs won't work...


Thanks Backov,
As a client of Proxypass, you know that we stop brute force attacks that are run through proxies. But I am sure many people out there haven't heard of our new ProxyPass product.

If anyone has any questions, please feel free to post them and we will do our best to answer them.

On a side note, pr0 posted a concern about non-standard port proxies and my response initially was that ProxyPass did not block them. I asked a programmer and he corrected me: we DO block most non-standard port proxies too. Not only are they extremely rare (only 1 in 8000 according to our counts), but we block most of them anyway. Sorry for the misinformation.
You may also hit us up privately on ICQ: 153529369

Fire away guys,

The ProxyPass Team

MaxDent 09-30-2002 10:22 AM

That list must have just been updated because all the accounts they had for our site weren't suspended yet. Now they are :-)

BVF 09-30-2002 10:30 AM

Quote:

Originally posted by MaxDent
That list must have just been updated because all the accounts they had for our site weren't suspended yet. Now they are :-)
no matter. they'll have a fresh batch of them by tomorrow..fucking russians!

salsbury 09-30-2002 10:30 AM

i wonder how many of the sites on this list use Epoch or Jettis for billing. no amount of password crack checking would work for them.

JamesK 09-30-2002 10:51 AM

muhahaha u dix using bruteforce, i got adultbouncer passwords! :321GFY

JamesK 09-30-2002 10:52 AM

oh shit u got them too :(

pink_in_the_middle 09-30-2002 11:37 AM

my sites on that list !!! FUCKERS

LOL it's okay it's all fixed ;)

TarPy 09-30-2002 11:59 AM

it's 403 now... LOL, back up, back down

gothweb 09-30-2002 12:02 PM

Okay, now... How did they get a new login so fast? I cleared out the three they were using last week, and they already have them down and a new one back up. :(

DrGuile 09-30-2002 12:04 PM

Quote:

Originally posted by gothweb
Okay, now... How did they get a new login so fast? I cleared out the three they were using last week, and they already have them down and a new one back up. :(

maybe you should fix the problem this time.

:2 cents:

gothweb 09-30-2002 12:06 PM

Hey now, that's not good. The one they had wasn't in the CCBill database... Hacked? :(

DrGuile 09-30-2002 12:10 PM

Quote:

Originally posted by gothweb
Hey now, that's not good. The one they had wasn't in the CCBill database... Hacked? :(
brute force attack most likely...

i.e.: dictionary attacks

gothweb 09-30-2002 12:12 PM

A brute force attack won't help them get passwords that aren't already there. The logins they have had have not been the result of paying members, or of me manually updating.

salsbury 09-30-2002 12:16 PM

if you use Epoch or Jettis they can add passwords to your site themselves. Paypal's script gives me a headache because it is obfuscated - but because it is obfuscated i strongly suspect it's vulnerable as well.

JFK 09-30-2002 12:22 PM

the link you posted is coming up 404 for me !

Pornwolf 09-30-2002 12:31 PM

Damnit, it's down! I was hoping to see some midget oil wrestling today.

Massivecock 09-30-2002 03:14 PM

Where did you get that link?
What I mean is Where did you find it?
--
And can you get me the new one... it seems to have changed file names and is gone?

Easy 09-30-2002 11:59 PM

Quote:

Originally posted by gothweb
Hey now, that's not good. The one they had wasn't in the CCBill database... Hacked? :(
sometimes ccbill fails to remove inactive accounts. So the pwd is still in the password file.. just check your active usernames, download the password file and compare


and that's what the russians answered...

Thanks for your report.

We'd appreciate it if you direct this type of reports to [email protected]
(rather than the webmaster) in the future.
We aren't in a position to determine what legal and what isn't. We
have an Acceptable Use Policy, which is a part of our customer agreement,
and we enforce it whenever we determine or are notified of a violation.

The particular AUP document that we use has been approved by OFISP, a
Russian/CIS ISP forum, and is shared by many Russian ISPs.

Hosting some form of content is not an AUP violation, with the only
exception for "spam support services". "Bypassing server security"
would be it, but only hosting content that enables to do so isn't.

It's only due to the details of agreement with this particular customer
that we can in fact ask and insist that they remove this content simply
because "we don't like it".

--
Alexander Peslyak
DataForce ISP

SeRsH 10-01-2002 02:08 AM

I belive the largest daily updated with hundreds of passwords password list is here - http://www.xxxhq.com/vb/ ( you need to register to view )

Also I have see it here - http://www.sublimechat.com/phpBB/vie...hp?forum=7&674 ( the part of sublimedirectory )

kÿ®ëë 10-01-2002 02:24 AM

Quote:

Originally posted by salsbury
if you use Epoch or Jettis they can add passwords to your site themselves. Paypal's script gives me a headache because it is obfuscated - but because it is obfuscated i strongly suspect it's vulnerable as well.
same goes for ibill's mastergate cgi easier than cracking them

that's ALL ibill sites


All times are GMT -7. The time now is 09:39 AM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2026, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123