Previous Thread
Next Thread
Print Thread
Rate Thread
#75833 08/12/2001 3:03 PM
Joined: Jul 2001
Posts: 1,111
Member
Member
Offline
Joined: Jul 2001
Posts: 1,111
dose anyone know how easy ubb 6.05 is to get into? one of my members can get a admin pass and change stuff in the cp on his own free will, the guys a nice guy, but last time he dident listen to the admins and i banned him he went right in took out his ip and took over the forum , its really anoying! >.< he always sets custom titles for people!, can any body help me out?

Sponsored Links
#75834 08/12/2001 3:14 PM
Joined: Jul 2000
Posts: 1,349
Ell Offline
Member
Member
Offline
Joined: Jul 2000
Posts: 1,349
Any idea if he's creating a new admin account (making an existing normal member into an admin) or using an existing admin account?

#75835 08/12/2001 3:17 PM
Joined: Jul 2001
Posts: 1,111
Member
Member
Offline
Joined: Jul 2001
Posts: 1,111
nope he usein a admin acount thats already there, ive tried changeing all the pass on the acounts and he still gets in.. -_-

#75836 08/12/2001 4:03 PM
Joined: May 2001
Posts: 81
Member
Member
Offline
Joined: May 2001
Posts: 81
obvious Q: does he have FTP access?

do you allow HTML in forums/sigs or have codebuttons installed?

#75837 08/12/2001 4:38 PM
Joined: Jul 2001
Posts: 1,111
Member
Member
Offline
Joined: Jul 2001
Posts: 1,111
he as no ftp acess, hes only a normal member :-/ he clames to "hack" tho, yes i do allow html in my forums but not in the sigs and i dont have codebuttons installed

Sponsored Links
#75838 08/12/2001 4:44 PM
Joined: Feb 2000
Posts: 4,625
Member
Member
Offline
Joined: Feb 2000
Posts: 4,625
Are you on apache?
If so, grab his IP and ban him with an .htaccess file.

#75839 08/12/2001 4:46 PM
Joined: Jul 2001
Posts: 1,111
Member
Member
Offline
Joined: Jul 2001
Posts: 1,111
quote:
Originally posted by MasterMind:
Are you on apache?
If so, grab his IP and ban him with an .htaccess file.



will do man, were on unix so im contacting the server right now.

#75840 08/12/2001 5:30 PM
Joined: Jan 2001
Posts: 1,940
Developer
Developer
Offline
Joined: Jan 2001
Posts: 1,940
If he's grabbing passwords, I suspect a hack is messing up. Many hacks are not security conscious

qasic

#75841 08/12/2001 5:55 PM
Joined: Mar 2000
Posts: 21,079
Likes: 3
I type Like navaho
I type Like navaho
Joined: Mar 2000
Posts: 21,079
Likes: 3
yet another reason to not allow html in posting.


- Allen wavey
- What Drives You?
#75842 08/12/2001 6:51 PM
Joined: May 2001
Posts: 81
Member
Member
Offline
Joined: May 2001
Posts: 81
Yea, I would take a guess its the html in posts thing.

One person on tribalwar forums (VBB, same principle I guess), managed to setup some code, that when the topic was opened by anybody, it managed to send their cookies or some form of info to another server, whereupon that person could simply view the passwords.

However, the TW forums have the passwords encrypted so it wasn't a complete take-over..

That'd make a good hack.. is it not possible to have something done so the passwords are encrypted?

Sponsored Links
#75843 08/12/2001 7:06 PM
Joined: Feb 2000
Posts: 4,625
Member
Member
Offline
Joined: Feb 2000
Posts: 4,625
yes but not cross platform.

#75844 08/12/2001 9:40 PM
Joined: May 2000
Posts: 1,356
Addict
Addict
Joined: May 2000
Posts: 1,356
crypt() function can be used, but you cant send the passwords back to users. it is a one way thing... so, it is not suitable for a forum member system...

But there are some modules for this job...

[ August 12, 2001: Message edited by: jeologic ]

#75845 08/12/2001 9:54 PM
Joined: Aug 2000
Posts: 874
Moderator / Developer
Moderator / Developer
Offline
Joined: Aug 2000
Posts: 874
Soul - thats something that is very hard to do, and i would doubt that the person who did it was actually "stealing" the cookies, rather than running some html code in the posts, or exploiting a hole in vB. but vB does use MD5 encoded passwords so its not a big deal to leak them out like that.

#75846 08/12/2001 10:27 PM
Joined: Jan 2001
Posts: 1,940
Developer
Developer
Offline
Joined: Jan 2001
Posts: 1,940
jordo,

Passwords in vB are stored in plain text, just like UBB. However, there is a hack for vB which encrypts passwords though.

Creating such a function in UBB isn't hard but Ted has decided not to do it (although us hackers can )

qasic

#75847 08/12/2001 11:16 PM
Joined: Aug 2000
Posts: 874
Moderator / Developer
Moderator / Developer
Offline
Joined: Aug 2000
Posts: 874
heh oh. i thought it was a standard feature. very usefull nonetheless, would be something good to see as a hack.

#75848 08/13/2001 2:49 AM
Joined: May 2001
Posts: 6,708
Member
Member
Offline
Joined: May 2001
Posts: 6,708
If AL is talking about who I think he is, This person hacked my forum too and I didn't have HTML in posting. I think he uses some password revealer or something like that to get Admins passes.

#75849 08/13/2001 5:29 AM
Joined: Feb 1999
Posts: 1,379
cal Offline
Programmer
Programmer
Offline
Joined: Feb 1999
Posts: 1,379
i'd be interested to see how this is being done. if html is turned on, then that explains it, but otherwise a stock ubb is (as far as we know) secure.

hmmm

#75850 08/13/2001 7:01 AM
Joined: Jul 2000
Posts: 1,349
Ell Offline
Member
Member
Offline
Joined: Jul 2000
Posts: 1,349
Not at all. It's 100% susceptible to a brute-force attack- there's no flood checking on logging in (which there should be).

AL, at the very least, do this to your files:

[code][/code]

And replace "viewpw" with something unique+non-guessable to you- "pilot", "tomato", whatever. Now, even if this guy hacks in, he's not going to be able to see all your members' passwords (which should be the default behaviour). But, YOU can see them, because you know what the secret "in" word is.. to view a members' password, open their profile as usual, and add "&(yourword)=true" to the url of the profile, and hit enter.

So, if you didn't change my code, and if the URL looks like:

http://www.myubb.com/cp.cgi?ubb=get_profile_for_admin&u=00006479

Change it to:

http://www.myubb.com/cp.cgi?ubb=get_profile_for_admin&u=00006479[b]&viewpw=true[/b]

This will reload the page, and let you see the users' password. (note that you should change "viewpw" to something else, just incase any potential hackers are reading this)

Obviously this won't stop him hacking in in the first place, but it does let you breate if/when he does, knowing that he's not able to get everyone elses' passwords. For this reason, I suggest that you don't tell ANY other admins/anyone else what your secret replacement word for "viewpw" is- they don't have any legitimate reason for needing a members password.

On another note, have you changed all the passwords on your admins' email accounts? If they were the same as the UBB passwords at any point, he may have access to your email, and so to get the latest admin password, he just needs to use the "forgot my password" feature, then check your email.

[ August 13, 2001: Message edited by: Borg ]

#75851 08/13/2001 8:02 AM
Joined: Feb 1999
Posts: 1,379
cal Offline
Programmer
Programmer
Offline
Joined: Feb 1999
Posts: 1,379
quote:
Originally posted by Borg:
Not at all. It's 100% susceptible to a brute-force attack- there's no flood checking on logging in (which there should be).

Perhaps it should be, but you're being picky about what's secure and what's not. No site can stand up to a DDOS attack but we'd hardly catergorize it as unsecure because of it.

blergh

#75852 08/13/2001 8:49 AM
Joined: Feb 2000
Posts: 4,625
Member
Member
Offline
Joined: Feb 2000
Posts: 4,625
There's always gonna be some kind of security flaw... I mean, I'd like floodcheck on logging in too, but..

#75853 08/13/2001 9:00 AM
Joined: Jul 2000
Posts: 1,349
Ell Offline
Member
Member
Offline
Joined: Jul 2000
Posts: 1,349
quote:
Perhaps it should be, but you're being picky about what's secure and what's not. No site can stand up to a DDOS attack but we'd hardly catergorize it as unsecure because of it.


What's so difficult about it? Obviously it would have to be an 'optional feature' (doesn't everything?), but if there are more than 20 or so failed login attempts to a username, the UBB could then refuse to accept login attempts from that IP / to that Username more than once every 30/60 secs. That way, any brute-forcer that's running will be slowed down to a crawl... 1 attempt every 60 seconds? Expect the password to be cracked in a few YEARS...

Either that, or we're doing to have to start distributing those cute little RSA modulo keychains to all users.

#75854 08/13/2001 10:45 AM
Joined: Mar 2000
Posts: 21,079
Likes: 3
I type Like navaho
I type Like navaho
Joined: Mar 2000
Posts: 21,079
Likes: 3
quote:
Originally posted by Borg:


What's so difficult about it? Obviously it would have to be an 'optional feature' (doesn't everything?), but if there are more than 20 or so failed login attempts to a username, the UBB could then refuse to accept login attempts from that IP / to that Username more than once every 30/60 secs. That way, any brute-forcer that's running will be slowed down to a crawl... 1 attempt every 60 seconds? Expect the password to be cracked in a few YEARS...



That actualy sounds pretty cool... would be neat if we could have a "tighter security" modification we could distribute several of these in... as an idea comes up and it's tested, it could be added to it.


- Allen wavey
- What Drives You?
#75855 08/13/2001 11:34 AM
Joined: Jul 2000
Posts: 1,349
Ell Offline
Member
Member
Offline
Joined: Jul 2000
Posts: 1,349
waah! I'll add it to the already-large UBB Powertools list...

[*] Alter member NAME + other profile properties
[*] Alter member NUMBER
[*] Register new member from control panel
[*] Allow staff to search/search all forums
[*] Prevent double posting
[*] Mark unread from date
[*] Vink-version updates
[*] UBB Code adder
[*] Ban list thing
[*] Memberlist backup
[*] CP meta refresh time
[*] Forgotten password reminder / question
[*] Notes on users
[*] Destroy inactive users
[*] Logging options for staff
[*] Login bruteforcer protection
[*] 'Member passwords not viewable'

[ August 13, 2001: Message edited by: Borg ]

#75856 08/13/2001 11:43 AM
Joined: Mar 2000
Posts: 21,079
Likes: 3
I type Like navaho
I type Like navaho
Joined: Mar 2000
Posts: 21,079
Likes: 3
"Powertools" - yep, thas the one...

Sounds cool, ell.


- Allen wavey
- What Drives You?
#75857 08/13/2001 11:48 AM
Joined: Jul 2000
Posts: 1,349
Ell Offline
Member
Member
Offline
Joined: Jul 2000
Posts: 1,349
Thanks. At least the bottom item's done... but I shudder how many 1-line changes this uber-hack is gonna run into. o_O

#75858 08/14/2001 3:24 AM
Joined: May 2001
Posts: 6,708
Member
Member
Offline
Joined: May 2001
Posts: 6,708
I have no idea what he uses, I think he uses some hack tools to do it because this Person I know is one good hacker, And he seems to hack forums with ease, I have no idea how he does it I can con him into telling me...

#75859 08/14/2001 6:08 PM
Joined: Jul 2001
Posts: 1,111
Member
Member
Offline
Joined: Jul 2001
Posts: 1,111
qasic if u could make ausch a hack id really be gratefull, he is now givein people back postin rights that were takein, were havein a war on spam or something,and i cant bann spamers -_- i couldent get him banned form the server but thanks to all that have rpelyed, my server is ganna work on something tonight

#75860 08/14/2001 6:29 PM
Joined: Jan 2001
Posts: 1,940
Developer
Developer
Offline
Joined: Jan 2001
Posts: 1,940
Anime-loo,

Do you have access to server logs and the such?

Furthermore, have you upgraded to 6.1? 6.1 now includes such tools as admin logging - this should help greatly as to how your hacker hacked in (if the person did it via control panel).

I know it's a pain not to have hacks and such but security should always be your top concern. My advice would be this.

1) Upgrade to 6.1 and install NO HACKS.

2) Kill all admins except yourself. And I mean ALL admins.

3) Make sure you FTP passsword is secure. Change it. Make sure no one else has access to your FTP.

4) Protect cp.cgi with a .htaccess and .htpasswd. Make sure the l/p for these files is at least > 10 characters long.

5) Check access to cp.cgi in your logs.

This should be sufficient to thwart most common hackers. If this doesn't seem to help, please e-mail me and I'll see if I can stop this loser

qasic

[ August 14, 2001: Message edited by: qasic ]

#75861 08/14/2001 10:21 PM
Joined: Jul 2001
Posts: 1,111
Member
Member
Offline
Joined: Jul 2001
Posts: 1,111
ok i still wanna stay with 6.05, im ganna have him banned form the server, ill go to 6.1 soon tho

[ August 14, 2001: Message edited by: Anime-loo ]

#75862 08/15/2001 2:59 AM
Joined: May 2001
Posts: 6,708
Member
Member
Offline
Joined: May 2001
Posts: 6,708
Yeah, but can he just change his IP and get back in AL?

#75863 08/16/2001 2:26 AM
Joined: Jul 2001
Posts: 6
Junior Member
Junior Member
Offline
Joined: Jul 2001
Posts: 6
post edited by admin

the chit chat forum is not an area for security discussions or malicous advice. thankyou

[ August 16, 2001: Message edited by: cal ]

#75864 08/16/2001 1:17 PM
Joined: Jan 2001
Posts: 1,940
Developer
Developer
Offline
Joined: Jan 2001
Posts: 1,940
quote:
Yeah, but can he just change his IP and get back in AL?


.htaccess my friend

qasic

#75865 08/17/2001 3:17 AM
Joined: May 2001
Posts: 6,708
Member
Member
Offline
Joined: May 2001
Posts: 6,708
quote:
Originally posted by qasic:


.htaccess my friend smile

#75866 08/18/2001 4:01 AM
Joined: Jul 2001
Posts: 6
Junior Member
Junior Member
Offline
Joined: Jul 2001
Posts: 6
quote:
Originally posted by Askushi:
post edited by admin

the chit chat forum is not an area for security discussions or malicous advice. thankyou smile

#75867 08/20/2001 2:59 AM
Joined: Feb 1999
Posts: 1,379
cal Offline
Programmer
Programmer
Offline
Joined: Feb 1999
Posts: 1,379
These problems no longer exist in ubb 6.x

The information you posted is only of use for breaking into early series 5 boards.

If you have any further queries, contact me directly. Thread closed.


Link Copied to Clipboard
Donate Today!
Donate via PayPal

Donate to UBBDev today to help aid in Operational, Server and Script Maintenance, and Development costs.

Please also see our parent organization VNC Web Services if you're in the need of a new UBB.threads Install or Upgrade, Site/Server Migrations, or Security and Coding Services.
Recommended Hosts
We have personally worked with and recommend the following Web Hosts:
Stable Host
bluehost
InterServer
Visit us on Facebook
Member Spotlight
AllenAyres
AllenAyres
Texas
Posts: 21,079
Joined: March 2000
Forum Statistics
Forums63
Topics37,573
Posts293,925
Members13,849
Most Online5,166
Sep 15th, 2019
Today's Statistics
Currently Online
Topics Created
Posts Made
Users Online
Birthdays
Top Posters
AllenAyres 21,079
JoshPet 10,369
LK 7,394
Lord Dexter 6,708
Gizmo 5,833
Greg Hard 4,625
Top Posters(30 Days)
Top Likes Received
isaac 82
Gizmo 20
Brett 7
WebGuy 2
Morgan 2
Top Likes Received (30 Days)
None yet
The UBB.Developers Network (UBB.Dev/Threads.Dev) is ©2000-2024 VNC Web Services

 
Powered by UBB.threads™ PHP Forum Software 8.0.0
(Preview build 20221218)