About 2 weeks ago my account was hacked by someone, and they started using it to sell things and have made me the admin of sketchy pages. They changed the email and phone number associated with my account, and enabled two factor authentication under their phone number. I have been able to change the email back to mine, and have changed my password, but to fully access my account I need to enter a code from the Code Generator. The only way to access this code is either from in the account already, or from a third party app- which he hooked up to his phone number. There is literally no way for me to get this code, and I have no idea what to do. I have tried to contact Facebook 3 times through submitting forms and I have had no response. I am so frustrated with their lack of customer support. Any advice on how to get past the code generator or how to actually talk to someone live at facebook?
Posts are handled in a special way by Jekyll. The date you specify in thefilename is used to construct the URL in the generated site. This post, forinstance, ends up at -werner.com/2008/11/17/blogging-like-a-hacker.html.
Rule number one of securing webapps is to never trust the client. The client is under the full control of the user - or in this case, the attacker. You can not be sure that any code you send to the client is used for anything, and no blocks you put in place on the client has any security value what so ever. Validation on the client is just for providing a smooth user experience, not to actually enforce any security relevant constraints.
The historic problem that this has caused is that, yes, image uploads can contain PHP. And if the web server is willing to filter those files through the PHP interpreter, then that code will execute. See the Wordpress "Tim Thumb" plugin fiasco.
I totally agree with the accepted answer, but I would suggest to do a little bit more than just playing around with the filename. You should re-compress the original/uploaded file with PHP using GD or Imagick and use the new image. This way, you destroy any injected code (to be honest, 90% of the time, there are ways to make the code survive the compression, but it's a lot of work).
I allow image uploads but assume every one is loaded with trojan code. I temporarily place the uploaded image above web root upon upload, then use ImageMagick to convert it to BMP, then over to JPG, then move it where the web app can use it. This effectively removes any embedded PHP code.
In the message, the hackers included a link to a Telegram chat where they said Riot Games could speak with them. Motherboard joined this channel. Its members included usernames that matched those of names of Riot Games employees.
We have obtained your valuable data, including the precious anti-cheat source code and the entire game code for League of Legends and its tools, as well as Packman, your usermode anti-cheat. We understand the significance of these artifacts and the impact their release to the public would have on your major titles, Valorant and League of Legends. In light of this, we are making a small request for an exchange of $10,000,000.
In return, we will immediately remove all source code from our servers and guarantee that the files will never be released to the public. We will also provide insight into how the breach occurred and offer advice on preventing future breaches. We suggest communicating through Telegram, you can join us here:
Some of the juiciest bugs are very difficult to uncover from pure black-box testing. Reviewing source code offers more insights and a fresh perspectives on applications that can yield more bugs. Someone with coding experience will always be more adept at uncovering vulnerable code than someone without coding experience. This is especially true if you have experience with the language or framework being used.
Some examples of these methods leading to high/critical severity CVEs are CVE-2020-13379 (Found by Justin Gardner) and CVE-2021-22054 (Found by Keiran Sampson, James Hebden, and Shubham Shah). These examples are great to read through to get an idea of the kinds of sources and sinks ethical hackers look for in modern software.
If you have the programming knowledge and are ready to use it to your advantage, I recommend you grab some source code from a bug bounty program, an open-source project, or otherwise publicly available software and start hacking. I hope this has encouraged some developers to try flexing those ethical hacker muscles. I think you will find that it can be a very fun transition to try breaking software instead of building it. Many developer-turned-hackers would love to welcome you to the club. Have fun and happy hacking!
My online alias is G0lden. I am a hacker out of the midwest United States. I came into the hacking world through corporate jobs out of college, and I also do bug bounties. I enjoy finding new ways to hunt bugs and cutting-edge new tools. Making new connections with fellow hackers is the best part of this community for me!
Coupons have been used for over a decade by online retailers as a powerful advertising tool. As eCommerce rapidly expands, so does the number of online coupon codes offered to customers to attract their attention and replace the old printed ones. Today we can no longer ignore it; coupons have become an integral part of eCommerce. During 2017, as much as $3.1 billion was saved by consumers thanks to coupons! 90% of consumers use coupons, finding them from a variety of online and offline sources.
Despite this most online retailers take the security aspect of the coupon code mechanism for granted, keeping it too simple to abuse. And as long as easy money is up for grabs - hackers will be there to collect it.
In this post, we summarize why coupon codes are an easy target for hackers, what techniques hackers might apply to abuse the coupon code mechanism, and finally, what coupon code management policies should eCommerce retailers implement to stay protected.
While online retailers manage a wide range of coupon codes (personal/public/targeted/short and long term, and so on), there are many places where hackers, as well as other consumers, can put their hands on the desired coupons:
A typical consumer, exposed to all these data sources, will be satisfied with the variety of discount opportunities and redeem the desired coupon for personal use. A hacker, however, will search for a way to benefit from all this easily accessible data.
A basic assumption is that hackers do not have much interest in minor discounts, as provided by newsletters/free shipping codes and so on. They will try to use the available information and resources to escalate to the "next level" and reveal some major discounts. Once they get what they are looking for, they can use it as barter on the black market.
A much more efficient technique would be to use all available data to create a list of coupon code phrases, eventually defining a dictionary to brute force with: This could be a general dictionary that contains the most common coupon code patterns. For example, the 30 most used code phrases by retailers are:
After analyzing the most popular public coupon codes online, we identified a recurring pattern of "10% OFF". So we decided to test this pattern with increased discount amounts such as "90% OFF". Surprisingly ?, it worked:
A hacker may try to exploit coupon code input validation by injecting SQL queries and obtaining sensitive information, resulting in extracting valid coupon codes or, if they get lucky, the entire coupon code database and more!
While most leading e-brands may have good input validation and strong anti-Brute Force protection, small online retailers may be unaware of the importance of safe coupon code mechanism management and stay vulnerable to the imposed threats.
Make sure to disable unwanted/internal/testing coupon codes:
According to CouponFollow, 78% of the retailers limit the coupon code run time to 1 day. However, do they make sure to clean up all the expired coupon codes?
In this particular case, it was so urgent that we wouldn't have time to go through a development/test/deployment cycle - and there was no need for this to be completely hacker-proof. I found it to be a fun challenge - and I'll describe the solution here in case it can benefit others.
The stolen code is four to five years old and the Mountain View, California, company stressed that the there were no signs that customer information had been tampered with, and they stated that their own security networks had not been breached.
A hacker from the group, Yama Tough, provided security site Infosec Island with files that appeared to contain source code from the 2006 version of Norton Antivirus. The site passed the code on to Symantec, which confirmed that the code was genuine. Symantec also pointed out that the exposed source code corresponded to its enterprise products.
Outside Symantec, reports said that the hackers gained access to source code related to Symantec Endpoint Protection (SEP) 11.0 and Symantec Antivirus 10.2; both were reportedly sitting on the Indian military servers. The Symantec Antivirus 10.2 was five years old and was discontinued but, according to Reuters, is still being serviced. SEP 11.0, utilized to block outgoing data from being leaked, was four years old and had been updated regularly since.
Security experts outside the company appear to concur with Symantec that the incident is unwelcome but not catastrophic. Fundamentally, the reaction was that there was not much the hackers could do with what they got.
While security watchers did not see any serious consumer risks, the question being asked is, whether it is trophy, museum piece, or act of breach, however termed, but at what enterprise-business price? Analysts say that any hacker publicity involving a security software company can never be an easy ride for the affected vendor.
df19127ead