Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security

Even My Mom Could Hack These Sites 233

Frequent Slashdot Contributor Bennett Haselton's latest story is ready for your consumption. He starts "Recently, as an experiment, I wrote from my Hotmail account to ten different hosting companies that were each hosting some of my Web sites, asking for logins to change the domain settings. Even though I never provided any proof that the messages from the Hotmail account were really coming from me (the address they all had on file for me was a different one), half of them replied back and gave me the logins that I needed."

I figured that if I wrote to them saying "I forgot my password, please mail it to me," that would be too obvious. Instead, at the time I had set up shop with these hosting companies, I entered a domain name at the time of creating my account, and asked them to register it on my behalf (long before I had this experiment in mind). Then when I wrote to them recently from my Hotmail address, I sent each of them a message saying: I need to transfer this domain somewhere else, can you give me the login at the registrar where you registered the domain, so I can change the domain settings. Five of the ten companies either (a) gave me the registrar login, (b) transferred the domain to my registrar account on request (even though I never provided any proof that the owner of that registrar account was really me, either), or (c) changed the domain to point to a new IP address that I specified -- all of which, of course, would allow an attacker to take over a site temporarily or even permanently, if it hadn't really been me writing from the Hotmail address.

But slow down before you go off to try this out on Yahoo, eBay or Google hoping to get the same 50% success rate. First, these were all low-budget hosting companies, so the people handling my queries were likely not highly trained professionals who would have developed all the right habits about when to get suspicious. Second, this ruse only worked because the hosting companies registered the domains on my behalf. Most sites that are really worth taking over, are hosted on dedicated servers, and this trick wouldn't work on a dedicated hosting company because they usually don't register domains on behalf of customers; they assume that anybody buying an expensive dedicated server, knows enough to buy the domain and point it at the server that the company gives them.

But even for small-time hosting, a 50% success rate for a trick like this is uncomfortably high. So what can we do about it? Well, every problem has a non-solution that requires changing human nature ("People should just stop buying from spammers and they'd go out of business!") and a non-solution that ignores the economics of the situation ("ISPs should devote more resources to stopping spammers on their own network!"). In this case, the corresponding non-solutions would be (a) "People who work for hosting companies should be less gullible" and (b) "ISPs should hire smarter people, without charging more to their hosting customers".

The solution that doesn't require any cheating, though, is to have procedures in place for anything remotely security-related, and drum into employees' heads that they have to follow those procedures. Here's some good news: Of the five companies that fell for the ruse asking for my registrar login information, when I followed up with them saying "Hey, I forgot my account password, can you mail it to me", only two of them actually sent my password to the Hotmail account. To those two, I replied with some terse words about having a six-inch-thick steel door while leaving the window wide open. But at least it was only two out of ten that fell for that ruse, compared to five out of ten that fell for the registrar trick. The difference is that hosting companies have procedures in place to deal with password resets -- a script that sends the existing password, or sends a reset-password link, only to the customer's e-mail address on file.

Similarly, any hosting company that registers domains on behalf of users, should have procedures in place for transferring the domains to users or letting them change domain settings. In fact, of the five companies that didn't fall for the ruse, most of them said "Go to the customer control panel here and log in" -- it wasn't that their guard went up because I was writing from a Hotmail account, it was that they already had procedures in place for a customer wanting to change domain settings, and what's what the idiot-proof book told them to do. Kevin Mitnick always said that the weakest link in any security chain was people. Sometimes the way for ISPs to tighten security is to make the people in the chain act more like machines.

Until then, there are probably many sites out there that are this easy to "hack", using a method that could charitably be called low-tech. After seeing which hosting companies fell for the trick, I pointed out that they had sent the login information to an unverified address and admonished them to be more careful in the future, but I didn't storm out vowing to take all of my business elsewhere -- after all, if 50% of all low-budget hosting companies out there fall for this, what would be the point?

This discussion has been archived. No new comments can be posted.

Even My Mom Could Hack These Sites

Comments Filter:
  • by Reason58 ( 775044 ) on Wednesday May 16, 2007 @12:05PM (#19146651)
    You get what you pay for.
  • Statistical sample (Score:5, Insightful)

    by winkydink ( 650484 ) * <sv.dude@gmail.com> on Wednesday May 16, 2007 @12:06PM (#19146657) Homepage Journal
    One cannot conclude from the small sample size that 50% of all small, low-budget hosting companies are not security-conscious. Further, if you want to motivate these insecure companies to change their behavior, voting with your feet by taking your business elsewhere is the correct behavior.
  • by Anonymous Coward on Wednesday May 16, 2007 @12:10PM (#19146733)
    I'd go out on a limb and suggest that none of this really occurred and what he's really doing is showing off a huge social experiment about how people will talk about nothing. If he really did find something viable out he would definitely offer up the names and contact information of these companies so that people could complain and drop their services.
  • Re:past mistakes (Score:3, Insightful)

    by pembo13 ( 770295 ) on Wednesday May 16, 2007 @12:11PM (#19146751) Homepage
    Why? It seems to me that it is the most reliable form..
  • by brunascle ( 994197 ) on Wednesday May 16, 2007 @12:12PM (#19146769)
    for various reasons, i think passwords should be stored in hashed format. it should be impossible for the hosting company to tell me my password. they should just reset it.
  • Pick any two... (Score:5, Insightful)

    by SighKoPath ( 956085 ) on Wednesday May 16, 2007 @12:13PM (#19146787)
    of these three options: Cheap, Fast, Secure.
  • by Toreo asesino ( 951231 ) on Wednesday May 16, 2007 @12:14PM (#19146795) Journal
    A quick scan of Google would confirm this:

    http://www.google.com/search?q=inurl%3Aadmin%3Dtru e [google.com]

    I'm not attempting to start a flame-war here, but the percentage of those sites that end in ".php" is remarkably high...

    Ah to hell with it, let the flames commence.

    *runs*
  • by Anonymous Coward on Wednesday May 16, 2007 @12:14PM (#19146797)
    A large number of these budget hosting companies use the same farmed out support centers in India. Maybe the experiment should have looked a little closer?
  • Re:past mistakes (Score:5, Insightful)

    by CastrTroy ( 595695 ) on Wednesday May 16, 2007 @12:14PM (#19146803)
    I don't think there's many people that would fall for the wallet inspector, why would people fall for these social engineering attacks. I know a lot of people who sit down at a computer, and their brain turns off. They are smart people, but anything computer related makes them just lose all intelligence and common sense. People who would have no problem doing something like following instructions to assemble a child's toy, could not do something equally difficult like following instructions for sending an email with an attachment. I wonder if any studies have been done to look into stuff like this.
  • by Itninja ( 937614 ) on Wednesday May 16, 2007 @12:22PM (#19146903) Homepage
    A few years ago I wanted to impress it on my boss that the human factor is usually one of the weakest in a security model. So, with him in the room, I called HR and said something like 'Hi Sarah! How are you doing? Didn't you just get back from vacation? Did you have a good time? (...more smalltalk ad nauseum...). Anyway, I'm retarted. I just reset my password, but I must of had caps lock on or something because now I can't get it to work. Can you reset it for me again? Thanks!' No hacking, cracking, phreaking, yadda yadda yadda.
  • by prgrmr ( 568806 ) on Wednesday May 16, 2007 @12:25PM (#19146939) Journal
    a 50% success rate for a trick like this is uncomfortably high

    It seems that the only thing "uncomfortably high" is the author. If real, a 50% failure rate is deplorable, to the point where it ought to have prompted some righteous moral outrage. This isn't just another intellectual exercise in social engineering, it's a failure of the system. It's equivalent to 5 out of 10 grocery stores accepting a check presented by someone not the account holder and with no signature on it. That sort of behavior wouldn't be socially tolerable, nor should this be.

    If it is, in fact, a real event.

    The author ought to be immediately forthcoming with the who, what, and when of his experiment if he really wants some serious consideration and feedback.
  • by tttonyyy ( 726776 ) on Wednesday May 16, 2007 @12:26PM (#19146953) Homepage Journal

    I'd go out on a limb and suggest that none of this really occurred and what he's really doing is showing off a huge social experiment about how people will talk about nothing. If he really did find something viable out he would definitely offer up the names and contact information of these companies so that people could complain and drop their services.
    1: "Aaaah, now I know who these weak companies are I can be pretty sure of hacking some sites they host!".
    2: Ill gained PROFIT!!!

    It is responsible of the poster to not reveal which companies have weaknesses he has discovered.
  • Re:past mistakes (Score:2, Insightful)

    by shotgunsaint ( 968677 ) on Wednesday May 16, 2007 @12:26PM (#19146955)
    [blatantly stolen from thinkgeek.com]
    Social Engineering Expert... because there is no patch for human stupidity.
    [/blatantly stolen]
  • by Anonymous Coward on Wednesday May 16, 2007 @12:39PM (#19147191)
    An Anonymous Cowardess wrote:

    As a 48 yo grandmother, I am offended that technical incompetance is equated with being a mother. I don't think anyone would have said "even my dad could hack these sites".


    One swallow does not a summer make.

    As long as there's far more tech-savvy men than women, the generalization by assuming a gender serves a useful purpose. Get your fellow sisters to become on average at least as tech-savvy as the average man, and then complain.

    Note that men don't complain when allegories about the opposite sex are used. A statement like "His hands were typing at the speed of an old grandmother knitting" won't be met with outrage from men feeling offended because grandfathers could be knitting too.

    Take your hardcore feminism elsewhere -- it doesn't belong on /.
  • parent is a troll (Score:5, Insightful)

    by oliverthered ( 187439 ) <oliverthered@nOSPAm.hotmail.com> on Wednesday May 16, 2007 @12:42PM (#19147231) Journal
    just ask google [google.co.uk]
  • Re:Am I wrong? (Score:3, Insightful)

    by Splab ( 574204 ) on Wednesday May 16, 2007 @12:49PM (#19147353)
    One should remember, enterprise and small time companies are no longer as easy to distinguish as it used to be. One of my friends run a low budget hosting company and suffers under problems like those others have described, ig. how do you know who is who when you don't have a budget to know your customers.

    I on the other hand have worked for a company where hosted sites payed upwards of $50.000 for the site and $500+ for hosting per month, we knew our customers and never had to consider such problems.

    Both my friends company and the one I worked for had about the same number of people employed but we cater to different crowds - who is enterprise and who is small time?
  • by Anonymous Coward on Wednesday May 16, 2007 @01:08PM (#19147669)
    It seems anytime numbers are posted on /. some anally retentive math geek spits outs in first-post manner "but, but, you do not have a large enough sample size to make any intelligent observations." If only 5 out of 10 bank robbers that draw a gun actually fire shots we cannot make any statistical evaluations of that but we can sure as hell duck! There are times when the statistics of an event are irrelevant and the (possible) outcome is more important.
  • by Anonymous Coward on Wednesday May 16, 2007 @01:24PM (#19147883)
    Really. Who has 10 different hosting companies to host "some of my websites"?

    If this guy actually has 10 businesses or unique sites or whatever (unlikely), wouldn't you pick the one hosting service with the best service plan and just use it?

  • by Fifty Points ( 878668 ) on Wednesday May 16, 2007 @02:08PM (#19148505)

    It is responsible of the poster to not reveal which companies have weaknesses he has discovered.

    WARNING! WARNING! You are entering a ethical gray area in which arguments either way have valid points, please give this issue the respect it deserves and don't try to treat this like some cut-and-dry right-or-wrong answer.

    I, for one, could put forward the argument that it is the responsibility of the poster to fully disclose to the public, (after first notifying the offenders and waiting a reasonable amount of time), so that those of us who are vulnerable to such a social engineering attack, can know about it and react accordingly.
  • by Toad-san ( 64810 ) on Wednesday May 16, 2007 @02:12PM (#19148563)
    You couldn't identify them? They had no way to identify themselves?

    Sounds like a pretty crappy setup right from the start. You needed a better plan, bro, instead of being so damned greedy to take the customer's bucks. You did NOT plan for all contingencies, that's your fault. Sure, the customer is stupid. But you have to look out for them if you're doing business with them; that's YOUR responsibility, and that's why they paid you.

    Just hand out their user name and password? That's dumb. And now YOU are part of the problem.

    You can be absolutely sure I'll never do business with anyone like you.

    And I _will_ sue whoever releases information like that.

    Dumb asses.
  • by CantStopDancing ( 1036410 ) on Wednesday May 16, 2007 @02:21PM (#19148697)
    is it any more responsible for those companies to avoid *their* responsibility to their customers? I say hang 'em high, and let their customers decide if the companies deserve the business.
  • by Larry Lightbulb ( 781175 ) on Wednesday May 16, 2007 @02:35PM (#19148923)
    He could be choosing providers based on different combinations of bandwidth and space for the projects he's doing. Or they could have had special one-off pricing deals.
  • by moderatorrater ( 1095745 ) on Wednesday May 16, 2007 @03:33PM (#19149881)
    Actually, the author never said that all mothers are inept technologically, just that HIS mother was.

    While discrimination may be wrong, being overly sensitive to remarks that are true just raises the amount of discrimination and prejudice in the air. I don't know anyone that thinks women should be second class citizens, but I also know very few people who don't hate feminists.
  • by stry_cat ( 558859 ) on Wednesday May 16, 2007 @04:11PM (#19150551) Journal
    Do not keep all of your eggs in one basket. It's just a very bad idea. Discount hosts have a major tendency to quickly go down hill in terms of service and support. Host 10 domains on the same discount webhost for more than a year or two and suddenly you've got 10 clients screaming at you that their site is down or their email isn't working. Most of these discount hosting companies have very similar features and costs. It really doesn't cost you any more to host 10 domains on 10 different webhosts, as long as they provide the same uptime and service. In fact it saves you problems in the future. Eventually there will be downtime or a webhost will go bad. In stead of having all 10 of your sites experience down time and need to move them all at once, you'll only have to worry about one site. My problem is that I've only found two good discount hosts (and one of them is starting to go bad I think). I'm just glad most of my clients have grown and need their own servers. Otherwise I'd be very nervous.
  • by Solandri ( 704621 ) on Wednesday May 16, 2007 @04:53PM (#19151211)

    Really. Who has 10 different hosting companies to host "some of my websites"?

    If this guy actually has 10 businesses or unique sites or whatever (unlikely), wouldn't you pick the one hosting service with the best service plan and just use it?

    My guess as to the events leading up to this experiment: He had a bunch of domains but didn't know which hosting companies might be good, so he signed up with 10 different ones. After a year, he's decided which one is best. He was going to transfer all his sites to that one company when he started thinking, "Hmm, I wonder how hard it would be for someone to steal a site from these companies by sending a random email asking for login info..."

The key elements in human thinking are not numbers but labels of fuzzy sets. -- L. Zadeh

Working...