GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   Verotel hacked passes?... (https://gfy.com/showthread.php?t=241058)

mattyboy 02-23-2004 07:19 AM

Verotel hacked passes?...
 
We use Verotel on 4 of our paysites along with Pennywize and a few other billers.
This morning we've have an unusually high amount of Pennywize emails informing us of abused accounts - all Verotel ID's and from all 4 different sites.
We get a few abused accounts most days but as i say, today is getting a lot from only Verotel ID's - more than we've had in the last few months.
Anyone else getting this?

nudecanada 02-23-2004 07:52 AM

Hey, hey...

Chances are it's Verotel. On their end.
I dumped those cheeseheads last week.
Or, it could be on your end. I know 100% for sure that mine were hacked, somehow, on their end.

http://www.gofuckyourself.com/showth...hreadid=235941

raymor 02-23-2004 08:58 AM

It is possible to hack the older version of Verotels' add/remove password
scripts (verotelrum.pl). People do actively scan for that script,
as evidenced by server logs of sites I have seen.
It is quite possible that the breach occurred through
verotelrum.pl on your server.

Also, due to the way Vertoel chooses usernames, Verotel usernames
and good targets for brute force attacks. Pennywize's
brute force detection is broken in so far as it does not acount
for open proxies, which most brute force attackers use nowadays.

For optimal security, you should update verotelrum.pl
to the latest version and have a security aware tech take a
look at your script configuration and related items.
Also you may wish to replace pennydumb's suckurity based
on 1998 methods with something up to date and far more
secure, such as Strongbox.

mattyboy 02-23-2004 08:58 AM

Interesting link - thanks

jawanda 02-23-2004 08:59 AM

Quote:

Originally posted by raymor
It is possible to hack the older version of Verotels' add/remove password
scripts (verotelrum.pl). People do actively scan for that script,
as evidenced by server logs of sites I have seen.
It is quite possible that the breach occurred through
verotelrum.pl on your server.

Also, due to the way Vertoel chooses usernames, Verotel usernames
and good targets for brute force attacks. Pennywize's
brute force detection is broken in so far as it does not acount
for open proxies, which most brute force attackers use nowadays.

For optimal security, you should update verotelrum.pl
to the latest version and have a security aware tech take a
look at your script configuration and related items.
Also you may wish to replace pennydumb's suckurity based
on 1998 methods with something up to date and far more
secure, such as Strongbox.

Good post :thumbsup


All times are GMT -7. The time now is 03:06 PM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123