Koozali.org: home of the SME Server

Ruffdogs taken by linux hackers

Janm

Ruffdogs taken by linux hackers
« on: March 07, 2005, 06:16:57 AM »
Take a look it looks like they have a problem
http://ruffdogs.com

Skydiver

Takeover
« Reply #1 on: March 07, 2005, 06:51:46 AM »
Wow ... Not a nice thing to happen.

Janm

source
« Reply #2 on: March 07, 2005, 07:59:51 AM »
if you look at the source it look like the are from uk

http://www.kucc.org.uk/chat/docs/hi.gif

Skydiver

UK site
« Reply #3 on: March 07, 2005, 08:05:29 AM »
Yes i viewed the page source and found the same.. the image file from a chat foulder... they might have breached there site also to cover tracks.. who knows but they are still down

guest22

Ruffdogs taken by linux hackers
« Reply #4 on: March 07, 2005, 08:33:14 AM »
I have informed Ruffdogs. Please allow them some time for they are in a different Time zone.

guest

Janm

they have taken mpn.com to
« Reply #5 on: March 07, 2005, 08:45:05 AM »
maybe its a special project
link
http://www.socialmpn.com

Janm

the site is there
« Reply #6 on: March 07, 2005, 08:48:55 AM »

Offline jackl

  • ****
  • 136
  • +0/-0
Ruffdogs taken by linux hackers
« Reply #7 on: March 07, 2005, 09:50:57 AM »
The most likely reason the GIF source is at another site is that they have only gained edit rights to the ruffdogs website and are unable to drop the file directly there, however they have may have sufficient rights at the UK site.
Looks like another unpatched PHP website, not very promising.

Jack
......

Offline girkers

  • *
  • 296
  • +0/-0
    • gk computer services
Ruffdogs taken by linux hackers
« Reply #8 on: March 07, 2005, 11:35:50 PM »
I find this event unfortunate, but I don't beleive that ruffdogs is to blame.  From an outside stand point let's look at it this way.

Say for instance he is running the website on SME and using the current stable released version which I beleive is 6.0.1.

The version of PHP in the released version is not up to date for obvious reasons so a hole may have been identified in the version of PHP in the version of SME, thus it could still be exploited.  As there is no proper patching system in SME, on a production server you would be reluctant to apply any updates.

I appreciate that security fixes need to be applied to stop these sort of attacks and fix holes, so I think one of the first things on the agenda for SME may be an update system  :-)

Just may take on this event.

garret

Ruffdogs taken by linux hackers
« Reply #9 on: March 08, 2005, 01:05:46 AM »
LOL, I'm certainly happy to see that everybody is so concerned about the Ruffdogs site.

The site was hacked through the sanitizer script inhereted from myPHPNuke. It was Social MPN (a web application) that got hacked, not the server that it's on. The server that it's on is not an SME box but a debian box running a modified version of DTC (http://www.gplhost.com/?rub=softwares&sousrub=dtc) of which Ruffdogs has contributed a number of patches and code to.

So folks, it's the same old story with a PHP app, (if they try long enough they will find a way in) nothing more.

They got no further into the system than replacing the index.php page.

And BTW, the hacker has agreed to test our PHP based apps for us. What's the old saying, "keep your friends close and your enemies closer"? :-)

And please remember, I am not aware of any CMS that has been around for any extended period of time, that hasn't been exploited in one manner or another. This was the first for Social MPN.

Garret

keepright

Ruffdogs taken by linux hackers
« Reply #10 on: March 08, 2005, 11:31:28 PM »
garret, I have to say your post has encouraged me to give ruffdogs a chance with your run at the SME server.

I hope you guys succeed in your goals.

But that is no excuse for having such an ugly web site and logo :P (no offence)

Offline girkers

  • *
  • 296
  • +0/-0
    • gk computer services
Ruffdogs taken by linux hackers
« Reply #11 on: March 09, 2005, 12:26:04 AM »
Garret, you are right in saying that "try long enough and you will find a hole"  Look at M$ software.

Great to here that the hole has been plugged.  Maybe one day we will see an SME server at ruffdogs   :-P

garret

Ruffdogs taken by linux hackers
« Reply #12 on: March 09, 2005, 02:24:58 AM »
Quote
Maybe one day we will see an SME server at ruffdogs


There are a number of SME servers running at Ruffdogs, it's just that they are not best suited as a major hosting platform IMO :-).


Garret

Offline CharlieBrady

  • *
  • 6,918
  • +3/-0
Ruffdogs taken by linux hackers
« Reply #13 on: March 09, 2005, 04:14:46 AM »
Quote from: "girkers"

The version of PHP in the released version is not up to date for obvious reasons so a hole may have been identified in the version of PHP in the version of SME, thus it could still be exploited.


Although PHP has not been faultless, it's PHP application faults that have been responsible for most PHP related website breakins. PHP just makes it too easy to make mistakes.

If anyone is looking for an alternative, I'd strongly recommend perl, with taint checking enabled (via the -T flag).