|
Hacking Menu |
||||
| rules | notes WWWBoard | beginer | math teory | net password |
| unix pass | ISP Pass | Web Pages | NT Passwd | PC Hacking FAQ |
|
Crack Menu |
||||
| crack faq | inside crack | Crack mail | TakeoverChan/nick | Program Files |
WWWboard cgi
script
If your website uses the WWWboard cgi script from Matt's Script Archive (www.worldwidemart.com/scripts )
you could be vulnerable to hackers getting the admin id and password and
deleting messages. Unfortunately Matt lists people who use his wwwboard
cgi script. Whoops...I tested the first person on his
list and yes it was a semi-good job of protection (renaming the cgi's) but I was
still able to get the password and able to go in and edit the messages. **NOTE**
I didn't though because I was satisfied with just getting in.
By default you must put the passwd.txt file in the same directory as your
wwwboard. If this is true anyone could simple download the passwd.txt file and
put it against Password crackers like Crackerjack or John the Ripper (UCF). I
tested this myself and found my wwwboard was vunerable.
You might ask... How do I fix this?? Well simple, rename the file to a unique
file name. and edit your cgi scripts to reflect the new file name. Make your
password difficult..with alpha-numeric so a password attack won't crack it.
How to crack the passwd.txt file.
If you happen to get a hold of this file save it to your hard drive.
I'll explain how to crack it.
The passwd.txt file contains only 1 user id and 1 encrypted password.
For example: (this is mine)
km:aeMkCtJZYkUnI
By Default the id and password are
Username: WebAdmin
Password: WebBoard
Hopefully the webmaster would have changed this...
Once you get this download a copy of John the Ripper (available at the HackerZ
Hideout)
You will need to edit the passwd.txt file and make it look like a Unix passwd
file. This file uses the same encryption scheme that is vulnerable to a
dictionary attack.
(Q) What do you mean by edit the
passwd.txt file?
(A) Make it look like this...
km:aeMkCtJZYkUnI:275:15:James. "Tiger" Gordon: /usr/email/users/jgordon:/bin/csh
Save the text file and kick off John the Ripper or Cracker Jack to hack the
password.
Once you get the password go back to the site in which you got the passwd.txt
file and look at the source html code. If they use the standard settings you
will see a call to wwwboard.pl or .cgi in there. If this is true 99% of the time
they didn't rename the admin script which is wwwadmin.pl or .cgi Use this and
jump right in and do your deed. However I do suggest if you plan on deleting
messages that its *YOUR* responsibility. I'm just
writing about vulnerability I found.
- = - = - = - = - = - = - = - = - = - = -
= - = - = - = -
StopWar
Contact information:
Email - MohamadAzmie@Hotmail.Com
Http:// - MasterZCrew.Cjb.Net & HackerMasterZ.Cjb.Net
- = - = - = - = - = - = - = - = - = - = - = - = - = - = -
Copyrighted (C) 2002
by StopWar All rights Reserved MasterZCrew, Inc.