• Jp (unregistered)

    the page test.html call urchinTracker() from http://www.google-analytics.com/urchin.js Javascript is Greek to me, so I have no idea what it does. Probably just keeps track of how many people have hacked. :) I tried to submit their form, but it was broken. I wonder who wrote it.

  • ZangieF (unregistered) in reply to More

    It's not really a password, just whatever you put in with ".html" at the end. If you type the word "warning" into that field, you'll get the same page you're on.

  • Jordan (unregistered) in reply to More

    Why wouldn't you tell the clients and save them some money. And why would you tell

    the scaming company. Just seems childish and stupid. Sorry I'm responding in a mean way

    but it just doesn't make sense to be that heartless.

  • human (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    Your sales rep sucked. What he said, did, and sent made your business seem like a scam.

    If the author is guilty of slander then so are all your clients he called to get their honest opinion of your services.

    You should look in your client list and find some competent web designers.

  • James (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    Located in Florida eh? Florida is the "right-to-scam" state, isn't it?

  • (cs) in reply to The Dean

    http://answers.yahoo.com/question/index?qid=20080221122622AAn21Qx

    Holy crap, did you see the smear campaign they waged against the responder? LOL

    Its funny that they had to post 7 replies to try and discredit the answerer, and even funnier that they say things like "grow up"!

  • Safety Tom (unregistered)

    Thanks to the wonderful person who caught this flaw. I co-own Professional Security Services Inc., and our business information was kindly displayed to the world via the hole in this so called 'legitimate' business, that we've never heard of (page 4). Besides that, no harm done on our part, and if anything came from it, it was more advertising. A scary way of doing it, but we prefer to maintain a positive attitude. Again thanks to the whistle blower, those who maintain this site, and all hackers that enjoy to knock companies off their high horse, before the bad guys actually get the information.

  • Lora (unregistered)

    http://funnyhack.blogspot.com

    Here you can see some funny hack tips and tricks/....

  • Kim André Akerø (unregistered)

    You've.. GOT to be kidding me! They still haven't learned, apparently. Their only sense of security heavily relies on relative obscurity. It didn't take much skill to break through their current "wall of security" today, either.

    I just went to their front page, http://www.federalsuppliers.com/ and clicked on "Agent Login" which lead me to http://www.federalsuppliers.com/component/option,com_wrapper/Itemid,51/lang,english/. Just clicking "Verify" without entering a password showed me that they were putting the login form itself inside an iframe -> http://www.federalsuppliers.com/agent_login.html. The source of this page shows the following snippet just around the login form code portion:

        <script language="JavaScript">
    <!--
    // **** You WILL NOT get access without a valid password ****
    var suffix = ".html"
    
    // **** javascript:IPcatch:subject?Source_code_violator ****
    var pass_msg = "Enter Password: ";
    var pass_form = "agents08-dsp";
    
    function go_there() {
     location.href = document.pass_form.pass.value + suffix;
    }
    
    document.write('<form name="pass_form" onSubmit="go_there();return false">'
     + pass_msg + '<input type="password" name="pass" size="20" value="">'
     + ' <input type="button" value="Verify" onClick="go_there()"></form>');
    // -->
    
      </script></pre></div></BLOCKQUOTE>
    

    "Naw, they couldn't have...."

    But sure enough, just paste the "pass_form" and "suffix" JavaScript variables together and use it with the current directory of the page you get http://www.federalsuppliers.com/agents08-dsp.html, which claims "You have been authenticated!" along with a link that says "Click here to launch the List". This link further leads to http://agents.federalsuppliers.com/target.htm.

    Amazing. Again, you'd think they would've learned by now.

  • Jordan (unregistered) in reply to More

    Password is still in the page, but now its called pass_form. Try hitting this page and using the value of pass_form.

    Wow... these guys are bright.

    <!-- // **** You WILL NOT get access without a valid password **** var suffix = ".html" // **** javascript:IPcatch:subject?Source_code_violator **** var pass_msg = "Enter Password: "; var pass_form = "agents08-dsp"; function go_there() { location.href = document.pass_form.pass.value + suffix; } document.write('<form name="pass_form" onSubmit="go_there();return false">' + pass_msg + '<input type="password" name="pass" size="20" value="">' + '&nbsp;<input type="button" value="Verify" onClick="go_there()"></form>'); // -->
  • Jordan (unregistered) in reply to Kim André Akerø

    Dang... Kim André Akerø beat me to it... sorry for the dupe post

  • mdmadph (unregistered) in reply to Jordan

    Even after a month... they STILL aren't getting why their security sucks... :\

  • Amused Anonymously (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    This is great - I like how you begin with telling us about your kids and how your feelings are hurt, etc. etc. It is, after all, OK to scam money out of people if you have some kids. I am sure they are all millionaire fatcat bachelors with no dependents. No small business run by a family barely getting by, investing a large portion of their savings in a listing in a database that gets them nothing, will end up being destroyed by these hard sell tactics.

    Also, accessing a publicly available web page is, last I checked, not illegal. You gave out the password freely, to the public, no 'hacking' involved. Viewing source is hacking in the same way that window shopping is armed robbery. And where is the comment that is 'not truthful'? The statement that he called some of the clients and they were not satisfied? Are you saying every one of your clients gets showered in federal contracts? And slander? again, where is the untrue comment? The author says he thinks this is a scam. That is an opinion. Are you saying he doesn't think it is a scam, and is lying about that opinion? Wouldn't that be slandering himself, not the company? On the plus side, this is one of the funnier things I have read today, so thank you for that. Keep up the good work.

  • lImbus (unregistered) in reply to Kim André Akerø

    really impressive they do not seem to get it.

    If I had money like shit (sounds like) and had a technical problem (looks like), I'd call somebody to help me, be it for money, and be it somebody from the directory I hold.

  • Matthew Flaschen (unregistered) in reply to More

    They've finally fixed it. Now it's top of the line security.

    <!-- // **** You WILL NOT get access without a valid password **** var suffix = ".html" // **** javascript:IPcatch:subject?Source_code_violator **** var pass_msg = "Enter Password: "; var pass_form = "agents08-dsp"; function go_there() { location.href = document.pass_form.pass.value + suffix; } document.write('<form name="pass_form" onSubmit="go_there();return false">' + pass_msg + '<input type="password" name="pass" size="20" value="">' + '&nbsp;<input type="button" value="Verify" onClick="go_there()"></form>'); // -->
  • Ponedonkey (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    Lammer:"Man, I got 5 kids to feed..." So called hacker:"I thought you said you had 4." Lammer:"Gimme your credit cards."

    The "So-Called-Hacker" checked with your customers. You can scam the gov't quite easy-like. My Father did it for 8 years. If this guy is telling the truth, i'll eat my hat.

    Captcha: Erat. Doushenozzles are e-rats. Doushenozzles like this guy.

  • (cs)

    What's with the title of the page? "Agents Government Work Securing Federal State GSA Contracts Listing Federal Suppliers Guide"

  • Tom (unregistered) in reply to Steve

    You don't even need a password anymore to get to the agent page.

    This link goes straight to it! -http://agents.federalsuppliers.com/target.htm

    They also changed the login method. The password inputed is the actual page name. They add the suffix .html to the end of the password to redirect to a page to open the link above!

  • Not a Contractor (unregistered) in reply to Fry-kun

    These guys are so low budget, it's unbelievable.

    They changed their "secure" login page to an IFRAME and now you don't even have to know a password imbedded in JS - you just have to piece together a url:

    <!--
    // **** You WILL NOT get access without a valid password ****
    var suffix = ".html"
    
    // **** javascript:IPcatch:subject?Source_code_violator ****
    var pass_msg = "Enter Password: ";
    var pass_form = "agents08-dsp";
    
    function go_there() {
     location.href = document.pass_form.pass.value + suffix;
    }
    
    document.write('<form name="pass_form" onSubmit="go_there();return false">'
     + pass_msg + '<input type="password" name="pass" size="20" value="">'
     + '&nbsp;<input type="button" value="Verify" onClick="go_there()"></form>');
    // -->
    

    Despite the scary commented warning to all of us "hackers", you do indeed gain access with this url:

    http://www.federalsuppliers.com/agents08-dsp.html

    Presto! You're greeted with a warm-feeling "You have been authenticated!" reward message for getting in - and then you may browse the horribly formatted list beyond this golden gate.

    Apparently, they spend so little on IT (as if you couldn't tell from the security), that they roll out updates with a double KO combo of MicroVision WebExpress and Word's "Save as HTML" function, (from MicroVision's website) "Now anyone can have a quality web page without spending a lot of time or money." Now, why should companies spend good money to list when federal suppliers definitely doesn't want to spend the money to keep it up properly?

    For kicks check the source to find author names like Donna DeBoer and Customer.

  • 1337 (unregistered) in reply to More

    Been changed again, dangit it took me a little while to work out the 2048bit RSA cypher this time....

  • eh..... (unregistered)

    http://agents.federalsuppliers.com/target.htm

    Look ma, no password!

  • flamingtooth (unregistered) in reply to eh.....

    This has been going on for months. You'd think they'd just hire somebody that knew something about Web security and end this. Idiots.

  • Konrad (unregistered)

    23rd April and the thing is still got a javascript password.

    Even a complete novice would have been able to find an online tutorial on how to do basic server side password verification by now.

    that is assuming that their hosting account allows for a server side script. (most of the free ones dont).

  • Josh in California (unregistered)

    I'm tempted to offer to secure their site for a nominal fee. Say, about $10,000. Best five minutes of work I'd ever do. ;-)

  • r30 (unregistered)

    Wow. Just... wow. You know, people could get away with javascript passwords... in 1998. Hell, you could even obfuscate the password using javascript or simply secure it using .htaccess, but no. They are complete and utter morons.

    I just ran wget -r on their site. I'll write a secure version, rebrand it and make millions! Seriously, I've had this list for years. It's called yellowpages.com.

  • awhaha (unregistered)

    hilarious. i only read the first page because i got no time, but where he threatens you and says he tells you about his kids - lol -

    death to scammers. theres a reason comcast.fl is blocked at the firewall.

  • keeble (unregistered)

    if you want to take the easy copy and paste approach instead of using a database (you make millions, i bet! and you can't even afford a decent developer?)

    <? if(isset($_GET['auth']) && $_GET['auth'] == "pazzwurdl0lz123"){ include("shitty_catalog.html"); }else{ die("ERRAR INVALID PAZZWURD!!!!!1"); } ?>

    login.php?auth=pazzwurdl0lz123

    hey, at least nobody will be able to see your password WITH THE CLICK OF TWO FUCKING BUTTONS.

    View->Page Source. THAT IS ALL IT TAKES. Why can't you get it?

  • duh (unregistered)

    http://en.wikipedia.org/wiki/Honeypot_%28computing%29

  • Paolo (unregistered)

    Actually, the password need not be in the iframe anymore, but they are putting it!!! There are actually two things called pass_form (a variable and a form field). The variable is unused, but they still send it and it has the password in clear!

  • WAH!? (unregistered)

    Honeypot!? are you kidding me? a honeypot for people who know how to view source...yeh thats gonna attract all the 1337 eastern european blackhats.

  • demosthenes (unregistered)

    well, it's been a while since the author first "hacked" their "secure area", but they have yet to rectify the situation.

    the only explanation i can put forward is that they honestly think that the people posting on this forum are a bunch of hackers. hence, they probably don't feel it's worth spending money getting a real website made, since normal, non-hacker types won't be able to "hack" in, and there are very few "hackers" out there who know how to do this type of thing.

    godspeed, fsg, godspeed.

    ...that name reminds me of a food preservative.

  • Disable right click (unregistered)

    I can just see them for there next security step is to disable right click. hahahaha

  • postmode (unregistered) in reply to Drewc
    Drewc:
    Did you mention to your clients that you left their personal information on an unsecured server that any kid with a web browser would be able to view? I don't think they'd be very happy with you. Welcome to the internet.

    *internets

  • Thom S (unregistered) in reply to postmode

    Perhaps someone should report them to the Better Business Bureau or something. This is absurd. Somebody needs to convince them that they need REAL security.

  • gobbledygook (unregistered) in reply to hire someone

    New website, new poll: http://www.federalsuppliers.com/

    Sadly their poll has trouble "remembering" ip addresses ...

  • postmode (unregistered)

    It would seem that they finally got a clue and set it up correctly. The Agent Login page now goes to a page that use's Joomla's PHP-based login system (I believe). Which is good, because now maybe they can will actually realize that one login for everybody is really a bad idea... Glad to see a happy ending to this.

    Now if we can just get them to start doing what they advertise, per the comments of other people who have "used" the "service" and didn't get anything out of it...

  • Bruce (unregistered)

    Damn, they changed it to php. It looks like they need a CAPTCHA on their polls, or at least an IP recorder.

    Direct Marketing - Email 1337 84%

    Combination of two or more of the above 138 8.7%

    ;)

  • Daniil (unregistered)

    This is absolutely hilarious. These people are completely out of their mind and don't know a thing about security. As if JavaScript is the only thing that exists these days. For God's sake, use PHP or CGI!!!

  • Daniil (unregistered) in reply to Lucy

    HAHAHAHA.... There are absolutely no legal lines to be crossed here. He is giving the complete truth about what happened, and even I, who barely knows anything about security, can tell you that that is the absolute stupidest way to secure your site. I do not believe that this is not a scam, and am looking into taking legal action on behalf of all the people who you have "scammed" (the post even gives real examples).

  • sanjeev sharma (unregistered) in reply to Steve

    Do you really want to remain hidden from GOOGLE? .Crawlers always try to get deeper into your web sites. Google has recently decided to let it’s Googlebot crawl through forms in an effort to index the “Deep Web”. Googlebot is about to start submitting forms in an effort to get to your website’s deeper data.

    want to read the whole story http://sanjevsharma.blogspot.com/2008/04/googlebot-attacks.html

  • sanjeev sharma (unregistered)

    Do you really want to remain hidden from GOOGLE? .Crawlers always try to get deeper into your web sites. Google has recently decided to let it’s Googlebot crawl through forms in an effort to index the “Deep Web”. Googlebot is about to start submitting forms in an effort to get to your website’s deeper data.

    want to read the whole story http://sanjevsharma.blogspot.com/2008/04/googlebot-attacks.html

  • Pete (unregistered) in reply to More

    Hey, these guys are legit for sure! They have Segways at their head office!

    http://www.federalsuppliers.com/content/view/12/26/lang,english/

    See!

  • oppeto (unregistered)

    what is funny is they now claim SSL tranacations though their pages are not even filtered though SSL. They have mod_SSL installed on their server, but that doesn't make the connections SSL hah!

  • Zennehoy (unregistered)

    Either I missed out in grade school math classes, or something just shouts faked data to me: [image]

  • Zennehoy (unregistered)

    Either I missed out in grade school math classes, or something just shouts faked data to me: [image]

  • Zennehoy (unregistered)

    Sorry about the double post.

    Btw, I found this really interesting site that lists a bunch of businesses: http://www.federalsuppliersguide.net/?_name=&_description=&_q1=&_q2=&_q3=&_orderBy=name

  • T@[[$ (unregistered)

    Heh, Funny how they're company at http://www.federalsuppliers.com/ uses an open source content management system called Joomla http://www.joomla.org/ to build their website.

    Just found that kind of funny, Taccs.

  • Elixer (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    Seriously, some 13 year old could of come up with that story. What kind of company replies to a blog. Your website is nothing but text, imagery, and lies. You're just another parasite on the nationalist economy. Die.

  • Biff (unregistered)

    Looks like someone did hack their site:

    Main heading is "Where fuckers and qualified small businesses meet"

    and in the source, it says: <!-- D.T. WAS HERE ASSHOLES! -->

    I guess it was just a matter of time given their practices.

  • ANONYMOUS (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    Well MR. you dont give your name have you always been a legit company or just recently have you got 1 person out of a million has actually got a job from it so . so go ahead keep ripping people off I hope you sleep well at night

Leave a comment on “So You Hacked Our Site!?”

Log In or post as a guest

Replying to comment #:

« Return to Article