Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
April 19, 2024
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 556
Members: 0
Total: 556
PacketStorm News
·301 Moved Permanently

read more...
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> PhpNuke -> How to protect PHP-Nuke against hackers that use md5 pw
Post new topic  Reply to topic View previous topic :: View next topic 
How to protect PHP-Nuke against hackers that use md5 pw
PostPosted: Sun May 30, 2004 4:26 pm Reply with quote
Saladin
Regular user
Regular user
 
Joined: May 26, 2004
Posts: 19




Your report about PhpNuke cookies manual crafting HowTo is cool and it works %100, i did it and i could get admin rights..


but know, how can you protect your own site against attackers that have received md5 passwords from your site of admins ..


Now my site is unsure against this attack code, please how can i save my site even if the attacker has my admin name and md5 passwords...

I installed PHP-Nuke-7.3 ( i also tested 7.0 and 7.2 ) and i tried to hack my own web site, and i could get admin rights over admin.php and /modules/Forums/admin/ , there are two big security holes...

Protector Systems or Fortress, UnionTap all can not block this security holes

Hi, waraxe, please help me, you really are my last rescue

I have to secure my site against md5 password attackers that use this code..
View user's profile Send private message
PostPosted: Sun May 30, 2004 6:18 pm Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




This is tricky problem. Because if attacker has your passwords md5 hash, then how can your website's engine be sure that it is you or someone else? This will apply not only to phpnuke, but to many other software, even when Session ID-s are used, not the md5 hash directly.
So i suggest to use IP address/range filtering, so admins/superadmin can administrate only from predefined addresses. If you have static IP, then it's very secure and simple to implement. If you have dynamic IP address (like many DSL services offer), then you must define IP address range(-es), which can be legitime for admin. This restriction will hold back most malicious people, I hope.
You can try other methods too, like specific UserAgent string from browser (it can be modified for IE and other browsers, if needed), so phpnuke engine can distinguish between legitimate admin and attacker.
By the way - there is one more thing which can be theoretically implemented in the phpnuke engine. Let's assume that the legitimate admin is about to log in and delivers username and real password (not md5 hash) to phpnuke engine. Now phpnuke will set up clientside cookie with md5 hash, but additionally will save in database ip address of the logged in admin. And if next in any time someone uses that cookie-stored md5 hash, then phpnuke will compare real ip address and stored ip address. If they do not match, authentication is assumed as a failed one. In this way admin can enjoy comfortability of the password caching, when ip address has not changed, but after IP change must log in again. And attacker will fail with md5 hash using.
View user's profile Send private message Send e-mail Visit poster's website
cool idea
PostPosted: Sun May 30, 2004 7:04 pm Reply with quote
Saladin
Regular user
Regular user
 
Joined: May 26, 2004
Posts: 19




Cool Idea

Quote:
This is - lets assume, that legitime admin is about logging in and delivers username and real password (not md5 hash) to phpnuke engine. Now phpnuke will set up clientside cookie with md5 hash, but additionally will save in database ip address of the logged in admin


But now, how can i configure the PHP-Nuke so that ip adress of admins will be saved ( or how can i configure the DB so) .. what a script do i need for this way?


additionally, i have used a Script named as HackAlert and this script could and can catch all codes that allow you to get the md5 hash, but how ever, i want to be sure andso to protect my site against the possibility that some one could get the md5 hash, and so to prevent that he can get admin rights with Mozilla Browser by using Cookies...
View user's profile Send private message
PostPosted: Sun May 30, 2004 8:49 pm Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




1. Use Fortress or Sentinel protection systems for preventing attackers to gather md5 hash from database.
2. Second layer, what i described, was my theoretical suggestion. Maybe it's allready working code in some of the protectors, but it can be custom coded as well. Have you experience with php/mysql?
View user's profile Send private message Send e-mail Visit poster's website
How to protect PHP-Nuke against hackers that use md5 pw
  www.waraxe.us Forum Index -> PhpNuke
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

  
  
 Post new topic  Reply to topic  




Powered by phpBB © 2001-2008 phpBB Group






Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2020 Janek Vind "waraxe"
Page Generation: 0.153 Seconds