Jump to content
go_sword

US Army site hacked :)

Recommended Posts

Posted

A Romanian grey hat hacker has disclosed an SQL inject (SQLi) vulnerability on a website belonging to the United States Army, which leads to full database compromise. The website, called Army Housing OneStop, is used to provide information about military housing facilities to soldiers.

The Army Housing OneStop (AHOS) is "the official Army website for soldiers who need information about Military Family Housing (MFH), Unaccompanied Personnel Housing (UPH) and/or Community (Off-Post) Housing. It includes both comprehensive and quick-reference information for Army installations worldwide."

A self-confessed security enthusiast, who goes by the online handle of TinKode, documented a proof-of-concept attack against the onestop.army.mil on his personal blog. The published screenshots reveal that the Web server runs on Microsoft Windows 2003 with Service Pack 2 and the database engine used to power the ASP website is Microsoft SQL Server 2000.

The AHOS website seems to have been developed by DynaTouch Corporation, a third-party government contractor that provides software and hardware solutions to create "self-service kiosk systems." The company's client portfolio includes a long list of local and federal government organizations.

There are a number of 76 databases on the server, but TinKode focused his attention on the one called "AHOS." There are various tables in this database containing general website configuration information, but two in particular stand out as they are called "mgr_login" and "mgr_login_passwords."

Upon investigating the latter, the hacker stumbled upon passwords stored in plain text, a major security oversight. Storing cryptographic hashes instead of the actual password strings has been a common practice in Web application programming for years now. Furthermore, if for convenience the hashes are generated with a weak algorithm, a technique known as "salting" can be employed to make them nearly impossible to crack.

In a time when even the most amateur programmers follow such security practices, the fact that many business or government websites do not boggles one's mind. Additionally, the administrative account is called "Dynatouch" – who would have guessed that? – and its password is "AHOS" – yes, really.

Note: Softpedia has contacted both Dynatouch and the Army.mil Webmasters about this vulnerability. Only the Army.mil Web Team responded and directed us to the U.S. Army Public Affairs Media Relations Division for questions. The website has since been taken offline.

http://news.softpedia.com/news/Army-Website-Compromised-Through-SQL-Injection-131649.shtml

http://www.tinkode.baywords.com

Posted (edited)

Da, zeul de Tinkode, cel mai 1337 hacker roman. Plecati-va in fata lui.

PS: Doar nu o sa imi dau singur warn :)

PS2: Sa sti ca eu sunt si voi ramane fanul tau nr. 1. Am inceput sa plang cand am vazut ca e o stire despre tine si nu despre Nytro, dar cum esti cel mai 1337, am inteles :)

Edited by Nytro
Guest Praetorian
Posted (edited)
Da, zeul de Tinkode, cel mai 1337 hacker roman. Plecati-va in fata lui.

Ce penal esti ma! Si vezi ca esti offtopic ADMINE! =))

Edited by Praetorian
Posted

Din cate am vazut eu TinKode, daca nu ma insel, este membru si aici pe rst, cum de nu are probleme cu autoritatile ptr. treaba asta ?

Ma gandesc ca ar putea sa ii ceara ip-ul atat celor care au forumurile pe care umbla el dar chiar mai ales celor care ii gazduiesc blogul, nu ?

Nu s-a riscat prea mult facand asta ? Ma gandesc ca orucat te-ai proteja cu proxy-uir cu tor si asa mai departe, ip-ul tau poate fi luat si din alta parte , in acest caz chiar de la cei care ii gazduiesc blogul.

Eu nu am nimic cu el si nici cu nimeni altcineva, nu ma intelegeti gresit, dar sunt doar curios cum de nu sar americanii sa faca ceva ca mie mi se par "sensibili" (cazul cu ala care a spart NASA) la chestii de astea ?

Multumesc !

btw, oare ce metoda de anonimitate a folosit ?

voi cum v-ati proteja daca ati face o treaba ca asta (care e totusi importanta ca nu spargi site-ul unui golan oarecare de cartier) ?

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...