4Tech Community


 
Acasa[Tutorial] BLASTS, INJECTIONS, AND HOW TO STOP THEM !!! I_icon_mini_portalUltimele imaginiCăutareÎnregistrareConectare
Un Nou Site De topuri MMORPG Intra pe http://gtop.hostoi.com Si adaugati Serverul !

 

 [Tutorial] BLASTS, INJECTIONS, AND HOW TO STOP THEM !!!

In jos 
AutorMesaj
Diablo

Diablo


Mesaje : 124
Puncte : 1352
Reputatie : 1
Data de inscriere : 15/06/2011
Varsta : 30
Localizare : TM

[Tutorial] BLASTS, INJECTIONS, AND HOW TO STOP THEM !!! Empty
MesajSubiect: [Tutorial] BLASTS, INJECTIONS, AND HOW TO STOP THEM !!!   [Tutorial] BLASTS, INJECTIONS, AND HOW TO STOP THEM !!! Icon_minitimeDum 27 Ian - 5:56:03

Simple but effective Server Security
Blasts - server files manipulations
The muserver files are quite good, but some of them are not with a good security level.
Dataservers

The dataservers are used to connect the ODBC Data source to the GameServer, but there is no ip limitations and basicly the unlimited (untouched) dataserver can be connected through any other host pretending to be a persistant gameserver. Which may cause the all known of you item,stats blast and other server manipulations
Solution: install a firewall or portblocker and stop the incomming/outgoing traffic from the dataservers (Allow only for the host on remote server (IF) working remotely)
MSSQL Server 2000
The server is used to store all your server online info. It connects to the ODBC. However there are some exploits,hacks,hijacking applications to break up mssql's security (google it).
Solution: same as dataserver...allowing traffic for a specific host should be only for your remote mueditor or dataserver or just a machine you want to have access to the server
Web code manipulations
SQL injections in php

How does it work?
lets suppose we have a page containing the registration form the server the code
PHP Code:
<?php
mssql_connect(..);
mssql_select_db(..);
$account = $_POST['acc']; // account field
$password = $_POST['pass']; // password field
// other vars bla bla..
// Now here is the base query
// First we check if this acc exists
$query = mssql_query("select count(*) from [memb_info] where [memb___id]='$account'"); // This is where the 'hacker" (lame kiddie) will hit you
//other code does not matter
?>
lets change the $account with
Quote:
'; shutdown; --
the code becomes
PHP Code:
<?php
mssql_connect(..);
mssql_select_db(..);
$account = $_POST['acc']; // account field
$password = $_POST['pass']; // password field
// other vars bla bla..
// Now here is the base query
// First we check if this acc exists
$query = mssql_query("select count(*) from [memb_info] where [memb___id]=''; shutdown; --'"); // This is where the 'hacker" (lame kiddie) will hit you
//other code does not matter
?>
defining the ';shutdown; --

' - ends the define of the acc name
; - ends the current query line
shutdown - our new query (shuts down mssql server)
; -- - completes our new query (in case there is further code after the if memb___id bit)

This way everyone can inject whatever query he likes into ur database. Really easy
Most people think that by limiting there fields to maxlength=10 they will avoid anything - nah totally wrong...the only thing that our NEWB hacker must do is to create the same form in his own html file and remove the maxlength...and KABOOOM..you get fucked up again

Solution: A way to avoid this w/o disabeling any symbols ?
PHP Code:
<?php
mssql_connect(..);
mssql_select_db(..);
$account = addslashes($_POST['acc']); // account field
$password = addslashes($_POST['pass']); // password field
// other vars bla bla..
// Now here is the base query
// First we check if this acc exists
$query = mssql_query("select count(*) from [memb_info] where [memb___id]='$account'"); // This is where the 'hacker" (lame kiddie) will hit you
//other code does not matter
?>
effective and easy
Injections can be done in $_POST, $_GET or $_REQUEST, $_COOKIE or every value that the user has access to, so i suggest you addslashes() to all (addslashes changes ' to \' and " to "\ - this way user cannot end ur current query)
XSS web vunrability
What is XSS? - Cross Style Sheeting
Usable: Stealing user passwords (Cookies or Session issues)
Ends a html code and may execute a js in client side (retreiving cookies)
Php - Solution: htmlspecialchars(); in every variable that is entered by the user and DISPLAYED in the server page
Basicly thats most of the stuff you need to do to stay alive .... Smile
But NOTHING online is secured enough u know ^^
Sus In jos
https://4tech.catsboard.com
 
[Tutorial] BLASTS, INJECTIONS, AND HOW TO STOP THEM !!!
Sus 
Pagina 1 din 1
 Subiecte similare
-
» Cum sa apari non-stop pe Yahoo! Messenger
» aim vecs[tutorial]RO
» bk spot Tutorial
» Tutorial Cum sa faci server de MuOnline Cu Router ! RomTelecom

Permisiunile acestui forum:Nu puteti raspunde la subiectele acestui forum
4Tech Community :: • GAMES HACKED ZONE :: MuOnline :: Tutoriale-
Mergi direct la: