• Sanity (unregistered) in reply to junkman
    junkman:
    it's very easy to say 'anyone could view the source code' etc... but this is patently not true. The key point is that a lot of people do not have the technological skills to understand what source code even IS, never mind know how to view and read it.

    Except this could've easily been done by accident.

    The essential problem here is, the site sent the password to anyone who asked for it. The fact that most browsers would hide the source is irrelevant -- maybe some browser bug would expose it?

    junkman:
    That said, using php exploits, and countless other ways are equally 'easy' to someone of succificient skill - so surely the argument of 'well I found it easy therefore it's not hacking' seems slightly misplaced?

    It's not that "I found it easy". It's not that it was insecure.

    It's like the difference between a closed and an open wireless router. If you leave yours open, you may claim that "Well, it takes a sophisticated user to connect and steal our Internet!" But in reality, your router is sitting there broadcasting that it is there for the taking.

    It is difficult, as there really aren't good metaphors for software. We can say "It's like a house", but it really isn't. It's up to us to decide where we draw the line.

    But I do think there's a fundamental difference between, say, a SQL injection, and actually broadcasting administrative credentials to anyone who asks. (Consider, too, that they didn't even hide that page in their robots.txt.)

  • someone (unregistered)

    For not overloading Google I just saved all that cached pages here:

    http://www.web-share.net/download/file/item/federalsuppliers.tar.gz_4221

    anybody can polish it to really useble directory of supliers, or start new bussiness by offering them better service ... ENJOY

  • Gilhad (unregistered) in reply to Sanity
    Sanity:
    It is difficult, as there really aren't good metaphors for software. We can say "It's like a house", but it really isn't. It's up to us to decide where we draw the line.

    I think, this example is like placing big advertisment to the more frekvented road in public with small letters on top saying "Do not read, please, if we did not tell you so ..."

  • Hello (unregistered) in reply to Horton Hears a FAIL
    Horton Hears a FAIL:
    Good news!!!!

    You may be eligible for support to fix your horrible coding.....Wow! really good news....For only $1500 I can fix that for you....Whaddaya say>?

    702-229-3111

    Umm... hello. I hope you don't mind but I just subscribed your phone number to a couple of porn and other advertisement agency call lists. I'm not sure why, but I just felt like doing that.

    Have a, uh, nice day?

  • argh (unregistered)

    i think actually it's more like having a door to the house, with the key taped near the lock, AND with a big neon sign on the door pointing to the second door right beside it, which is wide open.

  • Tom AT Certified Contracting Solutions.com (unregistered)

    Government contracting is my life (OK, that COULD be sad, but it's a really dynamic field and just full of the poor slobs that tried to sell you space in their "directory") The sad part is that NO ONE I know (after 30 years in the business) uses such directories because everything you need to know to do business with the government is available FREE, and I can tell you where!

    If he's got a wife and kids to support, I suggest he find a legitimate way to make money rather than rippoing off unsupecting newbies. Sadly there are a LOT of such companies out there. My view is that unless I help you actually make money by creating cash flow for you, then I haven't "earned" anything. No up-front pay for me. And my commpany is doing quite well thank you.

    BTW - I get these same solicitations from people who have not done their homework. After they quote me their pricing, I tell them what I charge to do the same thing! It's usually pretty hilarious! And most of them have hacked some site to get their email lists in the first place, and do NOT comply with the Federal CANSPAM Act. So turn the threat around and report them to the FTC!

  • SimonSays (unregistered) in reply to Sir. Consultant

    Are you kidding me? Everyone knows that a simple ROT13 is not secure enough. No, you need to apply TWO layers of ROT13, THEN it will be unbreakable.

  • First time visitor (unregistered)

    First off, yes, this a scam, and FSG deserves no mercy.

    But the people posting comments here aren't much cleverer than FSG's webguy.

    • 63 People found it necessary to post the same comment about the username/password changing. All probably sure they were contributing to the discussion.

    • Everyone is rail about the security implications. The whole point of paying them (the ridiculous) $600/year fee is for the advertising. It's sort of weird that FSG is set up so that you needed a password to view the material they were being paid to advertise (imagine if the yellow pages tried this) which is much stranger than the fact that a password was needed.

  • (cs) in reply to argh

    argh is on to something.

    Okay...here's my refinement to the key-under-the-mat analogy.

    When you knock on the door, someone comes out, hands you the key, and points out that the building has no walls, so you don't even need the key.

  • Saad Rabia (unregistered)

    I was playing around when I found out this interesting link that leads to thousands of agent ad listing. Have a look at it and someone download everything before it is taken down again! ;)

    Here is the link:

    http://www.federalsuppliersguide.net/?_orderBy=name&_offset=0

    And originally found here:

    http://www.federalsuppliers.com/test.html

    I have downloaded about 200 ads. :)

    Enjoy web securing!

    Saad R. www.saadrabia.com

  • Troy McClure (unregistered) in reply to Hello
    Hello:
    Horton Hears a FAIL:
    Good news!!!!

    You may be eligible for support to fix your horrible coding.....Wow! really good news....For only $1500 I can fix that for you....Whaddaya say>?

    702-229-3111

    Umm... hello. I hope you don't mind but I just subscribed your phone number to a couple of porn and other advertisement agency call lists. I'm not sure why, but I just felt like doing that.

    Have a, uh, nice day?

    You mean you subscribed the Las Vegas Police Dept's Missing Child line to agency call lists. I'm sure they'll appreciate your effort.

    Retard. Did you really think that was a real phone number? OMGZLOLZ.

  • confused (unregistered)

    Apparently they just moved it to http://www.federalsuppliers.com/warning.html.

    The username is still "zzzzzz" and the password is still "fffxxx". Talk about insecure. The least they could do is include a PHP page.

  • (cs) in reply to Saad Rabia
    Saad Rabia:
    I was playing around when I found out this interesting link that leads to thousands of agent ad listing. Have a look at it and someone download everything before it is taken down again! ;)

    Here is the link:

    http://www.federalsuppliersguide.net/?_orderBy=name&_offset=0

    And originally found here:

    http://www.federalsuppliers.com/test.html

    I have downloaded about 200 ads. :)

    Enjoy web securing!

    Saad R. www.saadrabia.com

    The search on that page is based at http://www.federalsuppliersguide.net/ which has a different person as the admin contact. Is it possible that the original site is thieving from a different scam artist?

  • Ha Ha - This Made My Night (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    Dear Mr. Customer Support:

    It's a scam unless you can prove it isn't. In this age of credit fraud, identity theft, and everything else, it's always best for the person with the money to remain skeptical.

    But - I have a D&B number too. And a BBB listing, OMG! Woo woo! These can be obtained by just about anyone. But the thing here you need to understand - most companies can provide proof that they provide a service. Can yours? If you can provide the proof, then I'll believe you.

    But whether you are a real company or just some big joke, you probably should stop putting the password right in the source code. BTW - looking at source code isn't hacking. You provide it to us.

  • Smash (unregistered)

    Due to the bytes shortage we've been experiencing, I fell a need to sum 90% of the next 300 posts.

    1- (reply to 180051) Your security sucks! There was no hacking at all. You don't know how to type or spell. You sent the password and blah blah blah... 2- Now the UserID is "moron" and the password is "scam3000" 3- Hey everyone, they changed the page to http://www.federalsuppliers.com/warning.html 4- Too bad they put it offline now. But I bet it still is available on Google's cache.

    If your post resembles any of the statements above, don't bother. Save those precious bytes to something that have not been written countless times. Thank you

  • lol (unregistered)

    six hunrdid and sitxy sixth!1111!one

  • Felix Lockhart (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    To "FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT":

    For a company that claims to have that much prestige, you sure do suck at making a website. What you fail to realize is that anyone with a web browser and the ability to read English can get into your so-called "secure site", it's not "hacking" at all. To get the information posted here, click on the View menu in your browser and choose Source. Voila!

    Oh, and next time you post something in an official capacity, as part of a company, use proper capitalization and sentence structure. Especially when you're trying to defend yourself against allegations of illegitimacy.

  • Felix Lockhart (unregistered) in reply to Felix Lockhart
    Felix Lockhart:
    To "FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT":

    For a company that claims to have that much prestige, you sure do suck at making a website. What you fail to realize is that anyone with a web browser and the ability to read English can get into your so-called "secure site", it's not "hacking" at all. To get the information posted here, click on the View menu in your browser and choose Source. Voila!

    Oh, and next time you post something in an official capacity, as part of a company, use proper capitalization and sentence structure. Especially when you're trying to defend yourself against allegations of illegitimacy.

    What I send in this comment has probably been said several times throughout this discussion, I didn't realize when I posted it that there were more comments than what was on the initial page.

  • (cs)

    I notice a few things. It lets you login now, but the page doesn't exist once you do login (or access it directly, it doesn't matter), and it is still in the javascript code. And what is the "Sample Page" menu for? That is also a link to something that doesn't exist. And the link for "FEDERAL R" "EGULATIONS" is broken up on that page, on other pages it is correct, though. I think for some reason, they can't use server script. If they can't use server script, at least encrypt the page. And maybe also they should make the link to that page secret, they can just tell the federal procurement officer when they need it, anyways. Also look at form.html for more things wrong. They still don't use server script, the server script is a different web-site, which doesn't seem to work right now.

  • Chris (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    LOL

  • (cs) in reply to Smash
    Smash:
    Due to the bytes shortage we've been experiencing, I fell a need to sum 90% of the next 300 posts.

    1- (reply to 180051) Your security sucks! There was no hacking at all. You don't know how to type or spell. You sent the password and blah blah blah... 2- Now the UserID is "moron" and the password is "scam3000" 3- Hey everyone, they changed the page to http://www.federalsuppliers.com/warning.html 4- Too bad they put it offline now. But I bet it still is available on Google's cache.

    If your post resembles any of the statements above, don't bother. Save those precious bytes to something that have not been written countless times. Thank you

    5- You people are all posting the same four things!...

  • Get a new IT Manager (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    Not hacking if the password and user name are in plain sight !!! read up on your laws :) and get a web developer that understands how to deal with ISO security standards. It could of been worse if a real hacker was on your site they could of extracted vital company info and really caused some havoc , judging from the level of security I am sure you guys are SO out of date and ripe for the picking. lets hope that there are no bored black hats around or your in deep Sh*t and you wouldn't be able to do anything to them they usually do there dirty work on router/server overseas ("non prosecutable ") in the US.

  • The Fixer (unregistered)

    Send a little cash my way and I can help you seal the big security hole one your website.....

  • Whatever (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    Dude,

    You need to make your site more secured than showing userID and password in the script. No one is hacking your site. You are leaving the information open there.

    If you don't understand how to fix it, pay some $$$ to someone who does and fix it. All these folks are actually helping you by pointing out the issue with your site. Take it as help, fix the site and move on.

  • captcha modo (unregistered)

    I see two real WTF here

    1. Pointing that Google cache has information. AFAIK Google was sued many times for indexing private information

    2. Most of people thinking that anyone found "door" open with sign "do not enter - private area" can free enter and consider this not breaching.

  • Watts (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT
    sorry our site wasn't protected to your standards however all of you are being reported to the appropriate authorities as we have your information too. you should of protected your info a little better.
    Yeah, see, this is the kind of thing that makes you look stupid. No offense. Do you understand that there is no "hacking" that has happened here? That what people have done to find the password and username that you use for your website is to use the "View Source" command that every web browser has? This is the web equivalent of locking a door and leaving the key, no, not under a doormat, but hanging on a hook by the doorknob. Telling you that you have poor security isn't truthful, because you have NO SECURITY AT ALL.

    And this "all of you should have protected your information better" is absolutely juvenile. Just cut it out.

    Incidentally, I notice in your list of "check out what we do is real," you didn't suggest checking out the Better Business Bureau. Hmm.

    Also incidentally, your company doesn't come up in a search at Dun & Bradstreet, GSA Advantage (which is, y'know, the free catalog service for federal suppliers that everyone who has a GSA schedule contract is required to join, making the whole idea of a printed catalog kind of moot, but whatever), or the West Pasco Chamber of Commerce.

    Again, no offense, but it's not slander if it's true.

  • Anon Barbarzyńca (unregistered) in reply to someone
    For not overloading Google I just saved all that cached pages here:

    TRWTF.

  • Anonymous (unregistered) in reply to Felix Lockhart
    Felix Lockhart:
    What I send in this comment has probably been said several times throughout this discussion, I didn't realize when I posted it that there were more comments than what was on the initial page.
    Aaaah, so that's the problem.

    Voting for removal of "reply" button on featured comments.

  • so your commentsystem is WTF (unregistered)

    maybe if the comments were more logicly organised next to the comment they comment on instead of just piling them up in one big tree would help prevent reading esentially the same content over and over again?!

  • Kevin (unregistered)

    I found if you use google you can find all the pages in their cache also:

    • site:federalsuppliers.com
  • Air Force General (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    Worked there for 10 years? And you still can't spell? Didn't Mommy teach you upper case?

    Son, get lost!

  • rocky (unregistered) in reply to Sys

    well now you guys have gone and wrecked this guy's life. His http://officers.federalsuppliers.com/agents.html page is offline now. How can I call up his customers for references?

  • NoOneReallyCares (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT
    thank you hackers for trying to destroy federal suppliers guides reputation

    You will find that the term 'hackers' probably applier more accurately to the group of individuals who 'hacked' together the password protection that you appear to still have faith in.

    your comments are not truthful we are not a scam

    Which comments are not truthful? The ones in reference to your cold call? Maybe the segment about calling a disgruntled customer of your service?

    not only is the company legit we actually have held a 5 year GSA contract with the federal government

    Hopefully your tender documents contain better punctuation then your post above.

  • (cs) in reply to Rotary Jihad
    Rotary Jihad:
    Saad Rabia:
    I was playing around when I found out this interesting link that leads to thousands of agent ad listing. Have a look at it and someone download everything before it is taken down again! ;)

    Here is the link:

    http://www.federalsuppliersguide.net/?_orderBy=name&_offset=0

    And originally found here:

    http://www.federalsuppliers.com/test.html

    I have downloaded about 200 ads. :)

    Enjoy web securing!

    Saad R. www.saadrabia.com

    The search on that page is based at http://www.federalsuppliersguide.net/ which has a different person as the admin contact. Is it possible that the original site is thieving from a different scam artist?

    whois.net has this to say. Matching it up against the previous info for federalsuppliers.com is left as an exercise for the student.

    Registrant:

    2256 Toniwood Lane Palm Harbor, FL 34685 US

    Domain name: FEDERALSUPPLIERSGUIDE.NET

    Administrative Contact: Powers, Jamie [email protected] 2256 Toniwood Lane Palm Harbor, FL 34685 US 813-925-0195 Fax: 000-000-0000

    Technical Contact: Powers, Jamie [email protected] 2256 Toniwood Lane Palm Harbor, FL 34685 US 813-925-0195 Fax: 000-000-0000

    Registration Service Provider: AccountSupport, [email protected] 1-866-642-4678

    Registrar of Record: TUCOWS, INC. Record last updated on 27-Jul-2007. Record expires on 27-Jul-2008. Record created on 27-Jul-2007.

    Registrar Domain Name Help Center: http://domainhelp.tucows.com

    Domain servers in listed order: NS2.HOSTPROSERVER.COM
    NS1.HOSTPROSERVER.COM

    Domain status: clientTransferProhibited clientUpdateProhibited

    PeriSoft:
    Smash:
    Due to the bytes shortage we've been experiencing, I fell a need to sum 90% of the next 300 posts.

    1- (reply to 180051) Your security sucks! There was no hacking at all. You don't know how to type or spell. You sent the password and blah blah blah... 2- Now the UserID is "moron" and the password is "scam3000" 3- Hey everyone, they changed the page to http://www.federalsuppliers.com/warning.html 4- Too bad they put it offline now. But I bet it still is available on Google's cache.

    If your post resembles any of the statements above, don't bother. Save those precious bytes to something that have not been written countless times. Thank you

    5- You people are all posting the same four things!...

    Yeah, but at least Smash's #5 got highlighted as a Featured Comment, so it should be somewhat more effective in stemming the tide.

  • (cs) in reply to Watts
    Watts:
    Incidentally, I notice in your list of "check out what we do is real," you didn't suggest checking out the Better Business Bureau. Hmm.

    Summary: 10 complaints opened within the past three years, 9 closed (4 within the past year) with "they made a reasonable effort to fix it" (and the customer accepted / rejected / was still upset / didn't follow up with the BBB).

  • Lucas (unregistered) in reply to emurphy

    So, did anyone notice that they no longer have a 'login' page on the site? What a shame - no longer can we have duplicate comments (with some cut and paste) about what the password is now :(

    Not wanting to be the reason for a lot of more ridicule against these poor sods - but have they not read about not using the phrase 'click here' when doing web pages? To top that off - putting the 'click here' as an image, without any alt tags...well at least the offending javascript routine is now gone.

    Oh btw, did anyone try and load the page as https ? Go on try....

  • Lucas (unregistered) in reply to Lucas
    Lucas:
    So, did anyone notice that they no longer have a 'login' page on the site? What a shame - no longer can we have duplicate comments (with some cut and paste) about what the password is now :(

    Not wanting to be the reason for a lot of more ridicule against these poor sods - but have they not read about not using the phrase 'click here' when doing web pages? To top that off - putting the 'click here' as an image, without any alt tags...well at least the offending javascript routine is now gone.

    Oh btw, did anyone try and load the page as https ? Go on try....

    Ok, before anyone TRWTF's me, and really not wanting to repeat any previous posts, I just found the offending js is still on the site (and I am NOT going to post the url here...)

    I will call myself stupid, and promise not to post comments after I had a few vodka's.

    Man do I feel stupid tight now :(

  • Anonymous Coward (unregistered)

    Who else notices that there are no robots.txt files? Who says we add the URL for the Google webbot? Who else is for Digg or del.icio.us?

    I feel clickey links popping up all over the net.

  • (cs)

    I think they may have got the point by now.

    This thread is becoming TRWTF. Brillant!

  • Alfred Baeumler (unregistered) in reply to Franz Kafka

    So, I totally agree with your technical points, but wasn't Kafka born in Prague?

    Not trying to troll, we just have to keep one another honest...

  • Nimrand (unregistered)

    Out of sheer curiosity, I decided to look at US's anti-hacking law. I found a page at http://www.rent-a-hacker.net/hacklaw.htm that covers at least some of the relevant statutes (there might be more than one). In summary, since the "hacked" site was owned by a domestic company, it seems that one would have to either cause or intend ham or freud in order for it to be considered illegal. Technically, though, any unauthorized access, regardless of how inadequate the security measures, could be illegal. Calling it "hacking" though, is still a stretch in my book.

  • INTit (unregistered)

    I know bugger all about secure website development but im guessing you probably need the authentication process done server side.

  • Felix Lockhart (unregistered) in reply to Anonymous
    Anonymous:
    Felix Lockhart:
    What I send in this comment has probably been said several times throughout this discussion, I didn't realize when I posted it that there were more comments than what was on the initial page.
    Aaaah, so that's the problem.

    Voting for removal of "reply" button on featured comments.

    Yeah, there's no indication on the front page that there are more comments, or how many more comments there are, there's only a poorly-placed link that says "All Comments". And I didn't even see that until I went back to see if there was such a thing.

  • Lolowner (unregistered) in reply to Smash

    Lol, im glad mine doesnt resemble that xD

    Im gonna quote one of the first ones

    "its rude, your comments are not truthful we are not a scam"

    I dont remember anyone ever saying it was a scam o.O

    and if someone did, please copypasta for me

  • Vempele (unregistered)

    So TRWTF is that the passwords were too short, right? That's the only possible explanation for the fact that everybody's been able to hack their site.

    Fixed script:

    <script language="javascript"> <!--// /*This Script allows people to enter by using a form that asks for a UserID and Password*/ function pasuser(form) { if (form.id.value=="Agent") { if (form.pass.value=="<span style="color:white;">completelyHackerProofReallyLongSecurePasswordNobodyWouldThinkToCopyPastaFromTheSource</span>") { /* spaces removed from password in order to save, well, space */ location="http://officers.federalsuppliers.com/agents.html" } else { alert("Invalid Password") } } else { alert("Invalid UserID") } } //--> </script>

    I dare you to hack that!

  • (cs) in reply to Anonymous
    Anonymous:
    Voting for removal of "reply" button on featured comments.

    Aye.

  • Vempele (unregistered) in reply to Nimrand
    Nimrand:
    In summary, since the "hacked" site was owned by a domestic company, it seems that one would have to either cause or intend ham or freud in order for it to be considered illegal.

    Whoever wrote that law was evidently computer illiterate. Everybody knows you can't cause ham over the internet!

  • jimmy (unregistered) in reply to OzPeter
    OzPeter:
    I think they may have got the point by now.

    This thread is becoming TRWTF. Brillant!

    Paula! Where have you been?

  • (cs) in reply to Vempele
    Vempele:
    Nimrand:
    In summary, since the "hacked" site was owned by a domestic company, it seems that one would have to either cause or intend ham or freud in order for it to be considered illegal.

    Whoever wrote that law was evidently computer illiterate. Everybody knows you can't cause ham over the internet!

    Suppose you did one of those "hunt via webcam" things, except in reverse, where you could click on a gate and let a hog into a pen with a bunch of sows? I think that might qualify.

  • Nimrand (unregistered) in reply to Vempele
    Vempele:
    Nimrand:
    In summary, since the "hacked" site was owned by a domestic company, it seems that one would have to either cause or intend ham or freud in order for it to be considered illegal.

    Whoever wrote that law was evidently computer illiterate. Everybody knows you can't cause ham over the internet!

    Obviously, that was supposed to be "harm." Unfortunately, there's no way to go back and edit it now.

Leave a comment on “So You Hacked Our Site!?”

Log In or post as a guest

Replying to comment #:

« Return to Article