💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › INTERNET › hackwww.txt captured on 2023-01-29 at 04:30:26.
⬅️ Previous capture (2022-03-01)
-=-=-=-=-=-=-
How to Hack the WWWboard Message Board 2.0 written by kM www.hackersclub.com/km 05/12/97 =========================================== If your website uses the WWWboard cgi script from Matt's Script Archive (www.worldwidemart.com/scripts) you could be vulnerable to hackers getting the admin id and password and deleting messages. Unfortunately Matt lists people who use his wwwboard cgi script. Whoops...I tested the first person on his list and yes it was a semi-good job of protection (renaming the cgi's) but I was still able to get the password and able to go in and edit the messages. **NOTE** I didn't though because I was satisfied with just getting in. By default you must put the passwd.txt file in the same directory as your wwwboard. If this is true anyone could simple download the passwd.txt file and put it against Password crackers like Crackerjack or John the Ripper (UCF). I tested this myself and found my wwwboard was vunerable. You might ask... How do I fix this?? Well simple, rename the file to a unique file name. and edit your cgi scripts to reflect the new file name. Make your password difficult..with alpha-numeric so a password attack won't crack it. =========================================== How to crack the passwd.txt file. If you happen to get a hold of this file save it to your hard drive. I'll explain how to crack it. The passwd.txt file contains only 1 user id and 1 encrypted password. For example: (this is mine) km:aeMkCtJZYkUnI By Default the id and password are Username: WebAdmin Password: WebBoard Hopefully the webmaster would have changed this... Once you get this download a copy of John the Ripper (available at the HackerZ Hideout) You will need to edit the passwd.txt file and make it look like a Unix passwd file. This file uses the same encryption scheme that is vulnerable to a dictionary attack. (Q) What do you mean by edit the passwd.txt file? (A) Make it look like this... km:aeMkCtJZYkUnI:275:15:James. "Tiger" Gordon: /usr/email/users/jgordon:/bin/csh Save the text file and kick off John the Ripper or Cracker Jack to hack the password. Once you get the password go back to the site in which you got the passwd.txt file and look at the source html code. If they use the standard settings you will see a call to wwwboard.pl or .cgi in there. If this is true 99% of the time they didn't rename the admin script which is wwwadmin.pl or .cgi Use this and jump right in and do your deed. However I do suggest if you plan on deleting messages that its *YOUR* responsibility. I'm just writing about vulnerability I found. Send questions or comments to kM@hackersclub.com ============================================= Copyrighted (C) 1997 by kM All rights Reserved