During this hack it was allowed to run at least 100,000 times, however there is no limit to how many email addresses could be harvested. This line instructs the script to keep running forever, or until a human turns it off. Generally, its a bad idea for web applications to rely on the user agent because this field can be spoofed very easily. This makes the AT&T website believe that the request came from an iPad. The line above sets the HTTP User-Agent header to the one that the iPad uses. $useragent=”Mozilla/5.0 (iPad)” //Spoof as iPad Here are the portions I find most significant. This script is not a work of art (like most PHP code out there), but it does the trick. I bolded the sections I found interesting, and which I will explain further down. Below is the script, titled “iPad 3G Account Slurper”. This allowed security researchers to peek ‘behind the scenes’ and see what techniques were used. Goatse Security, the group behind this exploit revealed the PHP script that they used. This request is legitimate, and therefore was not detected by AT&T when the breach occurred, allowing the hackers to harvest a huge number of email addresses before they announced the hack to the world. The script will be invoked remotely using a standard HTTP GET request, that will look something like this:
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |