Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security

Anatomy of the HBGary Hack 220

PCM2 writes "Recently, Anonymous took down the Web sites of network security firm HBGary. Ars Technica has the scoop on how it happened. Turns out it wasn't any one vulnerability, but a perfect storm of SQL injection, weak passwords, weak encryption, password re-use, unpatched servers, and social engineering. The full story will make you wince — but how many of these mistakes is your company making?"
This discussion has been archived. No new comments can be posted.

Anatomy of the HBGary Hack

Comments Filter:
  • Attack Summary (Score:4, Informative)

    by Anonymous Coward on Wednesday February 16, 2011 @11:14PM (#35228068)
    1. SQL Injection

      The exact URL used to break into hbgaryfederal.com was http://www.hbgaryfederal.com/pages.php?pageNav=2&page=27 [hbgaryfederal.com]. The URL has two parameters named pageNav and page, set to the values 2 and 27, respectively. One or other or both of these was handled incorrectly by the CMS...

    2. Password Hashes didn't use salts etc.
    3. Password hashing was done using MD5.
    4. Password complexity policy was crap anyway.
    5. Password recovery policy was vulnerable to social engineering (insider attack).
  • by Anonymous Coward on Thursday February 17, 2011 @12:40AM (#35228452)

    You're missing something.

    http://www.hbgaryfederal.com/pages.php?pageNav=2&page=27

    Obviously the 2 and the 27 are not being validated before being appended into part of a larger SQL query, so construct your own URL substituting 2 (or 27) with something like 2';show tables; --

    Find the one that looks like it contains user login information and then substitute again with 2';select * from user_table; --

    Hey presto, you can now read all the user accounts and hashed passwords.

"Life begins when you can spend your spare time programming instead of watching television." -- Cal Keegan

Working...