<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security &#8211; Scott Mcintyre</title>
	<atom:link href="https://scott.cm/category/security-related-posts/feed/" rel="self" type="application/rss+xml" />
	<link>https://scott.cm</link>
	<description>Web Operations Engineer,  Linux Systems Administrator,  mySQL DBA,  MongoDB DBA,  Python+PHP Developer,  Performance Engineer</description>
	<lastBuildDate>Tue, 18 Jul 2017 08:58:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.2.3</generator>
	<item>
		<title>WHMCS Hacked</title>
		<link>https://scott.cm/whmcs-hacked/</link>
				<comments>https://scott.cm/whmcs-hacked/#respond</comments>
				<pubDate>Tue, 22 May 2012 03:16:44 +0000</pubDate>
		<dc:creator><![CDATA[Scott Mcintyre]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[whmcs hacked]]></category>

		<guid isPermaLink="false">https://scott.cm/?p=177</guid>
				<description><![CDATA[Been following a thread over at Web Hosting Talk today called &#8220;WHMCS got hacked?&#8220;. It seems their server was compromised by accessing the owners email and using this to gain access to the servers authentication details directly from the hosting provider. Many questions arise from this and from the information]]></description>
								<content:encoded><![CDATA[<p>Been following a thread over at Web Hosting Talk today called &#8220;<a href="http://www.webhostingtalk.com/showthread.php?t=1156920">WHMCS got hacked?</a>&#8220;.   It seems their server was compromised by accessing the owners email and using this to gain access to the servers authentication details directly from the hosting provider.</p>
<p>Many questions arise from this and from the information provided so far it looks like very little steps were done to prevent such incidents,  most important of all &#8211; how did his email get accessed in the first place.</p>
<p>It seems like some basic security steps could have prevented this and most importantly,  prevented the leak of all the customers details,  credit cards,  support tickets,  internal emails and a whole treasure trove of information from now circulating through-out the internet.</p>
<blockquote><p>
Following an initial investigation I can report that what occurred today was the result of a social engineering attack.</p>
<p>The person was able to impersonate myself with our web hosting company, and provide correct answers to their verification questions. And thereby gain access to our client account with the host, and ultimately change the email and then request a mailing of the access details.</p>
<p>This means that there was no actual hacking of our server. They were ultimately given the access details.</p>
<p>This is obviously a terrible situation, and very unfortunate, but rest assured that this was no issue or vulnerability with the WHMCS software itself.</p>
<p>We are immediately reviewing all of our hosting arrangements, and will be migrating to a new setup at the earliest opportunity.</p>
<p>I would like to take this opportunity to thank all of you who have sent in messages of support, and offers of help. It has clearly been a very stressful time, and I thank everyone both personally and on behalf of WHMCS for their loyalty and support.</p>
<p>The matter is now in the hands of the FBI.
</p></blockquote>
<p>The attackers have posted much more information at their twitter feed: http://twitter.com/#!/UGNazi</p>
]]></content:encoded>
							<wfw:commentRss>https://scott.cm/whmcs-hacked/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Outbound DoS</title>
		<link>https://scott.cm/outbound-dos/</link>
				<comments>https://scott.cm/outbound-dos/#respond</comments>
				<pubDate>Sun, 18 Oct 2009 23:14:50 +0000</pubDate>
		<dc:creator><![CDATA[Scott Mcintyre]]></dc:creator>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[System Administration]]></category>
		<category><![CDATA[apache status]]></category>
		<category><![CDATA[bandwidth graph]]></category>
		<category><![CDATA[bandwidth network monitor]]></category>
		<category><![CDATA[cacti]]></category>
		<category><![CDATA[cacti graphs]]></category>
		<category><![CDATA[cacti monitoring]]></category>
		<category><![CDATA[mrtg graphs]]></category>
		<category><![CDATA[outbound dos]]></category>
		<category><![CDATA[outbound firewall]]></category>
		<category><![CDATA[php ddos]]></category>
		<category><![CDATA[php dos]]></category>
		<category><![CDATA[posix acl]]></category>
		<category><![CDATA[server management]]></category>
		<category><![CDATA[traffic graph]]></category>
		<category><![CDATA[udp.pl]]></category>

		<guid isPermaLink="false">https://scott.cm/?p=33</guid>
				<description><![CDATA[Last Sunday I had a new customer sign up to our Linux Server Management company and one of the issues they were receiving was bandwidth overages for continual outbound DoS attacks their system was performing but they were unable to track. So in effort to find the initial cause of]]></description>
								<content:encoded><![CDATA[<p>Last Sunday I had a new customer sign up to our <a href="http://www.admingeekz.com">Linux Server Management</a> company and one of the issues they were receiving was bandwidth overages for continual outbound DoS attacks their system was performing but they were unable to track.</p>
<p>So in effort to find the initial cause of this with no real data to work from I had a search around the system for the usual suspects but couldn&#8217;t find any particular culprit. Manually inspecting nearly 2 million files was not an option so opted to carry on with the usual setup and enforced posix ACL&#8217;s against the apache user and setup some more explicit bandwidth monitoring to obtain data when an attack was occurring.</p>
<p>A few hours later an alert came in that the outbound bandwidth exceeded the threshold so I promptly begin investigating, The process list doesn&#8217;t seem to show any obvious usual culprits. After spending a few minutes with iftop and tcpdump I identified the targeted IP and that the traffic was being directed to a DNS server (port 53). I filtered traffic to this IP while investigating the source, as there was no unusual processes I decided to have alook at the apache status and found the GET request containing the destination IP and port (xxx.php?target=xx.xx.xx.xx&amp;port=53).</p>
<p>I got the vhosts path from the httpd.conf and reviewed the file and it looks like a simple php script to perform a UDP flood to the target,</p>
<p><code>$sock=socket_create(AF_INET,SOCK_DGRAM,SOL_UDP);</code></p>
<p>if(!$sock) die(&#8220;Cant Create Socket!!!&#8221;);</p>
<p>$data=&#8221;;<br />
for($i=0;$i&lt;1400;$i++)<br />
{<br />
$data.=chr(rand(0,255));<br />
}</p>
<p>while(true)<br />
{<br />
if(!socket_sendto($sock,$data,strlen($data),0,$target,$port)) die(&#8220;Error SendTo!!!&#8221;);<br />
}</p>
<p>That is a snippet of it. It is very unusual to see these PHP based which is the reason for this blog entry and a definite new addition to the <em>search list</em>.</p>
<p>For those of you interested the customer already had MRTG installed and below is the last week which shows the attack saturating the uplink (100Mbit) when it was occurring but has since been stopped.</p>
<p><a href="https://scott.cm/wp-content/uploads/2009/10/index-week.png" title="Outbound DoS Attack"><img src="https://scott.cm/wp-content/uploads/2009/10/index-week-300x81.png" alt="Outbound DoS Attack" /></a></p>
]]></content:encoded>
							<wfw:commentRss>https://scott.cm/outbound-dos/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Password Security</title>
		<link>https://scott.cm/password-security/</link>
				<pubDate>Wed, 14 Jun 2006 09:54:43 +0000</pubDate>
		<dc:creator><![CDATA[Scott Mcintyre]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[/etc/shadow]]></category>
		<category><![CDATA[cracker password]]></category>
		<category><![CDATA[john the ripper]]></category>
		<category><![CDATA[linux password testing]]></category>
		<category><![CDATA[password crack]]></category>
		<category><![CDATA[password decrypt]]></category>
		<category><![CDATA[password multiple sites]]></category>
		<category><![CDATA[password security]]></category>
		<category><![CDATA[password testing]]></category>
		<category><![CDATA[secure password]]></category>
		<category><![CDATA[secure passwords]]></category>
		<category><![CDATA[weak passwords]]></category>

		<guid isPermaLink="false">https://scott.cm/2006/06/14/password-security/</guid>
				<description><![CDATA[Basic Use of Passwords After all these years you would think basic password security would be drilled into everyone who uses the Internet, yet time and time again I always come across people who still have not learned the basics.  Really what is so hard about remembering a password that]]></description>
								<content:encoded><![CDATA[<p><strong>Basic Use of Passwords</strong></p>
<p>After all these years you would think basic password security would be drilled into everyone who uses the Internet, yet time and time again I always come across people who still have not learned the basics.  Really what is so hard about remembering a password that is not text only?  One simple `odd` character in the word would make it a reasonable secure password.  Yet people still do not get the message that adding just one character really makes a difference.</p>
<p>When I see people who get compromised due to passwords it just makes me cringe.  I have yet to understand why they do not learn until someone takes advantage of their weak password.  It happens so often now I even have an example ready now for weak passwords.</p>
<p>You can still have a secure password which is easy to remember, it does not have to be full of random characters, just one or two really does make a difference.</p>
<p>Take my name for example, Scott Mcintyre, that&#8217;s 13 characters long and easy to remember all you have to do now is throw a few odd characters in there such as,</p>
<p>Sc0tt`Mcintyr?e</p>
<p>Which is easy to remember, it includes capitals and has a number, and is more than 10 characters.</p>
<p><strong>Do you test you&#8217;re passwords?</strong></p>
<p>Now it brought me on to the fact that does anyone actually test their password against dictionaries?  Both users and system administrators should test them regularly and the reaction I get when I guess the passwords is quite strange as if it has never happened before.</p>
<p><em>System Administrators</em></p>
<p>I personally only work with *NIX and test passwords atleast once a week on every single server with user accounts I manage.  On one time work the successrate for more than 100 passwords is generally 1-10%, however today I did get a 58% success-rate which sparked this entry.</p>
<p>As a *NIX administrator I feel it&#8217;s my job to ensure peoples passwords are updated also, I often use tools like John The Ripper against the /etc/shadow file to acheive this.  You may view my guide <a href="http://www.hostgeekz.com/guides/Security/67/Password_Security.htm">/etc/shadow password testing</a> if you are unsure how to this.</p>
<p><em>End Users</em></p>
<p>End users should not have to test their passwords and should be using a password that gives them 100% reassurance.  Ultimately if you feel the need to check you&#8217;re password against dictionaries then you&#8217;re password is not good enough.</p>
<p><strong>Multiple Locations</strong></p>
<p>Do you use you&#8217;re password in multiple locations?  If so why? While it might be easy to remember it always leads to problems if by the off chance you&#8217;re password was ever compromised.  I feel this form of basic password security is the one that is the one that is not taken seriously the most.  I used to do it myself however have since realized it was bad just because of the number of people I have been bad things happen to.  There are methods of keeping you&#8217;re same password principal yet not using the same password. Take our above example,</p>
<p>Sc0tt`Mcintyr?e</p>
<p>You could change the position of the question mark for each different location, such as you&#8217;re instant messenger password could be S?c0tt`Mcintyre and you&#8217;re email could be Sc?0tt`Mcintyre, this is just different variations yet it keeps you&#8217;re password simple to remember.</p>
<p><strong>Changing passwords</strong></p>
<p>Do you change you&#8217;re password after a certain period?  This is generally a good idea if you use the same password in multiple locations.  Personally I do change my passwords around once every 3-4 months.  I do it so I can remember them easier, newer passwords will stay fresh in the mind whilst older passwords can be forgotten and confused with others.</p>
<p><strong>Conclusion</strong></p>
<p>As it seems I have joined the list of thousands, possible millions, of other articles/rants about password security but I think it has to be said that it&#8217;s quite shocking the number of people that totally ignore the basic concept.</p>
]]></content:encoded>
										</item>
		<item>
		<title>Sony and Warner Music Defaced</title>
		<link>https://scott.cm/sony-and-warner-music-defaced/</link>
				<pubDate>Fri, 02 Jun 2006 02:40:26 +0000</pubDate>
		<dc:creator><![CDATA[Scott Mcintyre]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[sony]]></category>
		<category><![CDATA[sony hacked]]></category>
		<category><![CDATA[sony music defaced]]></category>
		<category><![CDATA[sony music hacked]]></category>
		<category><![CDATA[thepiratebay]]></category>
		<category><![CDATA[warnermusic defaced]]></category>
		<category><![CDATA[warnermusic hacked]]></category>

		<guid isPermaLink="false">https://scott.cm/2006/06/02/sony-and-warner-music-defaced/</guid>
				<description><![CDATA[As reported on zone-h, Some big music corporation sites have been defaced both sonymusicstudios.co.uk and warnermusic.com.tw. Could this be a result of ThePirateBay going down recently? Could it be a coincidence, I think not.  It makes me wonder what will happen in the next few weeks because I suspect there]]></description>
								<content:encoded><![CDATA[<p>As reported on zone-h,</p>
<p>Some big music corporation sites have been defaced both sonymusicstudios.co.uk and warnermusic.com.tw.</p>
<p>Could this be a result of ThePirateBay going down recently? Could it be a coincidence, I think not.  It makes me wonder what will happen in the next few weeks because I suspect there will be a waive of these type of defacements.</p>
<p>One comment states,</p>
<p>&#8220;Just wait for the defacements tomorrow is all I can say.. (PRQ/TPB aren&#8217;t to be taken lightly when it comes to defacement support..)&#8221;</p>
<p>Which does indicate we should expect to see more of this in the coming days.</p>
<p>I wonder how both Sony and Warner Music will respond to these attacks.</p>
]]></content:encoded>
										</item>
	</channel>
</rss>
