Page 6 of 7 FirstFirst ... 34567 LastLast
Results 51 to 60 of 69

Thread: OMG, HDBits has been hacked

  1. #51
    Bfietta's Avatar Elite member BT Rep: +12BT Rep +12BT Rep +12
    Join Date
    May 2007
    Posts
    339
    on my way

  2. BitTorrent   -   #52
    BANNED BT Rep: +18BT Rep +18BT Rep +18BT Rep +18
    Join Date
    Jul 2007
    Age
    39
    Posts
    154
    Quote Originally Posted by mforcex View Post
    lets lower the hdbits ranking now

    the recent site that stores stuff in plaintext is RTS... oh no i blew the whistle. damn me.
    Hope u burns in Hell and
    RTS stuff must do something about that

  3. BitTorrent   -   #53
    TheFoX's Avatar www.arsebook.com
    Join Date
    Jan 2007
    Posts
    1,560
    Standard TB source will always hash the password using secrets as the salt, so the default storage of passwords is MD5 (excepting the very early TB source snapshots which used plaintext, but they are way past their sell by dates, and should not be used).

    For a modern tracker to store passwords as plaintext requires the site operator to modify the takelogin and takesignup to store a plaintext password (and do the comparison on login) into the 'users' table (a column already exists called 'oldpassword').

    In other words, this is not an accident, but intentional. The only reason that anyone would store passwords in plaintext is so that they can discern your passwords. The only reason for this is so that they can harvest your accounts at other trackers.

    A number of individuals, such as Jait, have shown that TB derived scripts have numerous vulnerabilities, and they have also shown how to seal these holes. There is an entire thread on TBDev addressing all manner of exploits, including the stealing of the passhash (which can be made secure through the cookie mechanism, contrary to popular belief).

    The simple point I am making is that there is enough information at TBDev to secure any source, and the simple fact remains that too many site operators are either too complacent to think it will happen to them, or too damn stupid to even run their own site. Anyone who thinks they don't need to scrutinise their code from time to time is asking for trouble. New vulnerabilities are discovered all the time, and new measures to deter these attacks are being created all the time.

    The web waits for no man.

  4. BitTorrent   -   #54
    kaffeine's Avatar No queda el tiempo
    Join Date
    Jul 2007
    Posts
    884
    man... this is so messed up. and knowing that the storage of the user base in plain text had to be done intentionally.... it's very disappointing

    i would suggest to stay away from the invites section for some time, as there could be many stolen accounts giveaways (as we have already seen) and invites giveaways form this stolen accounts.

  5. BitTorrent   -   #55
    FSC [Fight Club] BT Rep: +2
    Join Date
    May 2006
    Posts
    612
    Quote Originally Posted by TheFoX View Post
    For a modern tracker to store passwords as plaintext requires the site operator to modify the takelogin and takesignup to store a plaintext password (and do the comparison on login) into the 'users' table (a column already exists called 'oldpassword').

    In other words, this is not an accident, but intentional. The only reason that anyone would store passwords in plaintext is so that they can discern your passwords. The only reason for this is so that they can harvest your accounts at other trackers.


    The simple point I am making is that there is enough information at TBDev to secure any source, and the simple fact remains that too many site operators are either too complacent to think it will happen to them, or too damn stupid to even run their own site.

    The web waits for no man.
    So sad but true
    Proud Member of:

  6. BitTorrent   -   #56
    Sylar666's Avatar Kingpin BT Rep: +45BT Rep +45BT Rep +45BT Rep +45BT Rep +45BT Rep +45BT Rep +45BT Rep +45BT Rep +45
    Join Date
    May 2007
    Location
    Hungary
    Posts
    1,589
    Are these nasty rats developing this good old habit of just hacking around? There has to be done something. Thanx for the info.
    Quote Originally Posted by DV8type View Post
    Quote Originally Posted by Sylar666 View Post
    Is it HDbits or Bit-HDTV ? Which one was hacked, for God's sake? I thought it was Bit-HDTV. Or both have been screwed up?
    Bit-HDTV was recently hacked, HDBits was hacked a while ago
    A malis vituperari laus est.

  7. BitTorrent   -   #57
    KFlint's Avatar ... BT Rep: +35BT Rep +35BT Rep +35BT Rep +35BT Rep +35BT Rep +35BT Rep +35
    Join Date
    Mar 2007
    Posts
    4,034
    i just hope that HDBits is safer now...

  8. BitTorrent   -   #58
    terrorize's Avatar God of Warez BT Rep: +13BT Rep +13BT Rep +13
    Join Date
    Jan 2007
    Posts
    134
    STOP REQUESTING THE.txt FILE!!!!
    DO NOT PM ME ANYMORE!!!!

  9. BitTorrent   -   #59
    BANNED BT Rep: +8BT Rep +8
    Join Date
    Sep 2006
    Location
    Portugal
    Posts
    565
    unencrypted passwords..?
    fucking loosers

  10. BitTorrent   -   #60
    I first noticed the hack when a leecher was uploading to me after I was at 100% and I was seeding. Didnt think nothing of it at first. Three hours later I was still downloading bad data from the same leecher while seeding. I immediately blocked the IP address and informed staff.For the next two days the hacker was trying to gain access to my PC, to no avail. I changed my IP address and haven't seen him since. This dickwad needs to be hung from his testicles and lowered into a pail of $&^&#*@%!.

Page 6 of 7 FirstFirst ... 34567 LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •