• Binks (unregistered) in reply to Sys

    Hmm...maybe they should make the password "******" to confuse people, or, you know, do some server side validation rather than handing people the password.

    Nice find

  • hamy (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT
    FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT:
    thank you hackers for trying to destroy federal suppliers guides reputation. i have worked here with my wife for 10 years now and have helped hundreds of clients obtain federal government work. i have 4 children and though you don't care you are hurting the feelings of many good employees and customers by your immature actions. sorry our site wasn't protected to your standards however all of you are being reported to the appropriate authorities as we have your information too. you should of protected your info a little better. not only is the company legit we actually have held a 5 year GSA contract with the federal government and one of my best clients just broke 500,000 dollars in federal sales directly related to the GSA contract we got them. i am proud to work here and help small businesses obtain government workand also help federal buyers locate qualified small businesses to do business with. if you not interested in government work or our services of helping small businesses navigate the federal market fine but please don't slander the company. its rude, your comments are not truthful we are not a scam and i hope someday you realize that all you have to do is check us out with dun & bradstreet or GSA or the florida local and state chambers of commerce to see that what we do is real and federal buyers do request both our hardcopy guides and the online directory as well.

    dude, seriously....are you retarded about the point being made?

  • stupidkids (unregistered) in reply to Sys

    do more research before blogging on your lame site. A more polite response would be e-mailing the company and saying "Hey, your login page is insecure by showing the username and password in plaintext on a publically accessable website" instead of your lame excuse for a blog entry.

  • Chris (unregistered)

    Alex you made the front page of Reddit, good job. Hopefully, FSG will get their act together and FIRE their web developer and stop wining about "hacking". This is not "hacking" obviously since the username and password is right there in source code for everyone to see. Since when is examining a sites source code "hacking". FSG, just fire your web developer and hire one who knows what the crap their doing.

  • (cs) in reply to stupidkids
    stupidkids:
    your lame excuse for a blog entry.

    Keep typing it! Maybe it will become true!

  • Tohuw (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT
    FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT:
    thank you hackers for trying to destroy federal suppliers guides reputation. i have worked here with my wife for 10 years now and have helped hundreds of clients obtain federal government work. i have 4 children and though you don't care you are hurting the feelings of many good employees and customers by your immature actions. sorry our site wasn't protected to your standards however all of you are being reported to the appropriate authorities as we have your information too. you should of protected your info a little better. not only is the company legit we actually have held a 5 year GSA contract with the federal government and one of my best clients just broke 500,000 dollars in federal sales directly related to the GSA contract we got them. i am proud to work here and help small businesses obtain government workand also help federal buyers locate qualified small businesses to do business with. if you not interested in government work or our services of helping small businesses navigate the federal market fine but please don't slander the company. its rude, your comments are not truthful we are not a scam and i hope someday you realize that all you have to do is check us out with dun & bradstreet or GSA or the florida local and state chambers of commerce to see that what we do is real and federal buyers do request both our hardcopy guides and the online directory as well.

    Obvious troll is obvious

  • Catlin (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    You helped someone make hundreds of thousands of dollers... but can't learn to type?

  • h8r (unregistered)

    Your parenthetical remarks aren't funny at all. If your intention was to let your audience know what you think as opposed to what you say then now you're audience knows how pathetic your sense of humor is.

    I'm doing you a favor here. No one else will tell you because they pity you so much. You'll never be Woody Allen and tech advice is miles from Annie Hall.

  • Michael (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    ... I can't tell if this is real or a joke. Either way it's a funny comment. ^_^

  • Bullwark (unregistered) in reply to stupidkids
    stupidkids:
    do more research before blogging on your lame site. A more polite response would be e-mailing the company and saying "Hey, your login page is insecure by showing the username and password in plaintext on a publically accessable website" instead of your lame excuse for a blog entry.

    Ah, yes, of course. Such an e-mail would have been met with ridicule or the like--prompting me to post this "exploit" on this "lame site."

  • wienie0001 (unregistered) in reply to Annaleemac
    Annaleemac:
    Aren't all you wienies, I mean geeks, just so proud of yourselves? I guess between taking a few tokes you have nothing better to do than slam people trying to actually work for a living. While you have all day to sit around in your underwear trying to prove your superiority breaking into what amounts to other people's houses, (albeit, online houses) the rest of the world is working. It must be tough for you to justify your lives without vilifying others. I'm sure you don't even try. People who make false statements about others may find themselves at the wrong end of a lawsuit. People in glass houses shouldn't throw stones. But, don't worry, nothing could possibly happen to you. I'm sure no one could find your address. I'm sure you all operate everything in your life on the up and up and can hold up to scrutiny as well. So, just smoke another one and don't you worry about it.

    You don't know what you're talking about. I'm over 30 have a wife and kids and have earned well over $100k per year since I was in my late 20s. I'm also a regular reader of this site.

  • Bullwark (unregistered) in reply to Tohuw
    Tohuw:
    Obvious troll is obvious

    Obvious troll is performing a public service.

  • ezacharyk (unregistered)

    They really should have used hidden fields for the user name and password. /sarcasm

  • andi (unregistered) in reply to stupidkids
    stupidkids:
    A more polite response would be e-mailing the company and saying "Hey, your login page is insecure by showing the username and password in plaintext on a publically accessable website".
    And then write the entry 'How I helped a completely legit non-scammer company run by honest married hard-working phone scam^H^H^H^H salesmen (with children to feed!) secure their site'. For some reason, this would have been a lot less funny.
  • AT (unregistered) in reply to sorakiu
    sorakiu:
    You're missing the point. This website (dailywtf) has, in the past, changed names (usually the submitter and who the work for) in order to differentiate themselves from a script kiddy website.

    A key difference here is that Alex experience this directly. He's not relying on the word of a stranger who could simply be trying to damage a company they don't like. Also, the login simply exposed a directory listing of company information that you could find in the phone book. It's not like exposing the protected pages damages anything.

  • hax0rz (unregistered)

    The federal suppliers guide.?

    http://answers.yahoo.com/question/index?qid=20080221122622AAn21Qx

  • Irony (unregistered) in reply to Catlin
    Catlin:
    You helped someone make hundreds of thousands of dollers... but can't learn to type?

    E-bo-ny and i-ro-ny!

  • A Penguin (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    You provide a professional service, but with kindergarten security. How do you expect to be taken seriously ?? Way to protect your "clients".

    Its sad to see such uninformed unintelligent people securing information...

  • Franz Kafka (unregistered) in reply to Tohuw
    Tohuw:
    Obvious troll is obvious

    Obvious troll is entertaining.

  • daqq (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    Well, you had no security to speak of. Think of it as a security audit for free. Others would just charge you hundreds of dollars for such info, however, here it is for free. Whatever the case, I really don't see the point of having to LOGIN to view ADS for which people PAY for. Either your goverment doesn't know of Google or other search methods, or something is smelly in your goverment. Anyway, if you want some real security, I bet there's a lot of smart people here willing to do it for you for a small fee ;-)

  • (cs) in reply to h8r
    h8r:
    Your parenthetical remarks aren't funny at all. If your intention was to let your audience know what you think as opposed to what you say then now you're audience knows how pathetic your sense of humor is.

    I'm doing you a favor here. No one else will tell you because they pity you so much. You'll never be Woody Allen and tech advice is miles from Annie Hall.

    Wow, you sure gave Mr. Ambiguous Antecedent the old what-for!

  • Lucas (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    Google also hacked your site:

    http://www.google.com/search?q=site:officers.federalsuppliers.com&hl=en

    I suggest you bring the full force of your company's legal team, which I assume consists of a man who drinks gasoline and a golden retriever, to bear on this hacking problem.

  • Xich (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT
    you hackers

    ... looking at the generated source of a webpage is hardly hacking. Your grandma could do it.

    sorry our site wasn't protected to your standards

    ... or anyone else's standards for that matter.

    and one of my best clients just broke 500,000 dollars in federal sales

    So he sold a toilet seat to the White House?

  • (cs)

    The real WTF is that people are responding to that fake CUSTOMER SERVICE posting.

  • (cs) in reply to jimmy
    jimmy:
    I'm awfully sorry for the operators of the site. They didn't expect the drubbing they're taking.

    But Dang! I have to print this out, put it on a wooden table, take a picture, print it, scan it, and call it Brilliant!

    Brilliant!

    It's not Brilliant... it's Brillant! See... no "i".

    Please, if you are going to use a former WTF, do it correctly!

  • Bullwark (unregistered) in reply to Xich
    Xich:
    and one of my best clients just broke 500,000 dollars in federal sales

    So he sold a toilet seat to the White House?

    I hope you're happy. That toilet seat comment has me looking for a dry office chair.

  • tim (unregistered) in reply to Steve

    It changed again,

    /This Script allows people to enter by using a form that asks for a UserID and Password/ function pasuser(form) { if (form.id.value=="zzzzzz") { if (form.pass.value=="fffxxx") {
    location="http://officers.federalsuppliers.com/agents.html" } else { alert("Invalid Password") } } else { alert("Invalid UserID") } }

    At this rate it will really be hack proof.

    Seriously, they're so inept that they can't figure out what the security flaw is? That's a real wtf.

  • Cecil (unregistered) in reply to Sys
    Somebody should tell them that changing the password will not help as long as the password is written there...

    More importantly, note that the destination URL is also written there. The username and password are completely extraneous.

  • Walleye (unregistered)

    In my mind I'm picturing their office, and everyone is wearing the company uniform, a dark suit, covered with large neon question marks.

  • Lesko (unregistered) in reply to Walleye
    Walleye:
    In my mind I'm picturing their office, and everyone is wearing the company uniform, a dark suit, covered with large neon question marks.

    shudder

  • Stenvne (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    Dear Sir,

    I understand your embarrassment over this issue, however in this environment Flaming (That is what your comment is called) is never a good thing. If you truly want to secure your site, I suggest you hire a website designer that knows a Java script passing the allowable username and password in plain text is not going to cut it.

    How this was discovered. If you go to your login page and right click choosing show/view source you will see how this code is easily accessible. This is not a hack, the information is published in a public environment with inadequate security precautions. Therefore , it is not an intentional exploitation or penetration of any properly secured system and not in any way a violation of any laws governing electronic media. Sorry to add insult to injury.

    Respectfully submitted.

  • JL (unregistered)

    I don't understand the purpose of this company. If the customers are submitting information in hopes of sales, you'd think the contact information would be public, and publicized as much as possible. It can't be for want of privacy, because their leads are coming from an already-public list of government contractors. And if it were a scam, why would they bother changing the password after it was discovered? Why bother building a site with the contact information at all?

    I can't help feeling a tiny bit sorry for them, since their web development platform apparently consists of Microsoft Word, an FTP program, and a cheap web host.

    A note to any employee is still reading this thread: If you haven't figured it out by now, you are sending the password (and the address of the "secured" page) in the text of your login web page. This does not secure your web page. There are many ways to actually secure a web page, and none of them involve sending the password to the user. Changing the password will not help, because you will then be sending the new password to the user. The other posts are advising you to get a professional to fix your site, but it's likely that even the kids in your local community college's web development course could come up with a more secure solution than what you've currently got.

  • Instaneous (unregistered) in reply to Lesko

    What's the wtf comment record? We gotta be getting close.

  • John (unregistered)

    It's not that the password and the destination URL are "available on view source".

    It's that they're SENT BY THE WEBSERVER TO THE CLIENT. In plain text! In response to the initial HTTP request to the site!

    It's not only "not secure" and it's not "available to 5-year-old hackers". It's sent directly to every single reader, immediately on connection!

    I think all the analogies so far are inaccurate. I say that this is the equivalent of claiming "hacking" because you went to goatse.cx and it sent you a picture of the inside of a man's rectum.

  • Catlin (unregistered) in reply to Irony

    Nah, I can type, I just can't spell. Besides, I don't claim to have the big bucks job.

  • ExFed (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    I don't know if FSG CUSTOMER SUPPORT up there is a joke or for real but putting your business in a catalog isn't going to get you government contracts. The best investment a small business can make is in a lobbyist. A good lobbyist can get your stuff sold when it's neither needed nor wanted.

  • (cs)

    Hmmm... Has anybody submitted this WTF to slashdot yet?

  • NH_Matt (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    I had no idea right clicking is "hacking". I am in so much trouble! yikees

  • (cs) in reply to John
    John:
    I say that this is the equivalent of claiming "hacking" because you went to goatse.cx and it sent you a picture of the inside of a man's rectum.

    AAAAAH! YOU HACKED MY EYES!

  • (cs) in reply to WhiskeyJack
    Actually I think it'd be more like a sign saying "There is no key under the mat that unlocks this door!"

    No, a sign that says "This door is locked, you need a key to get in", on a door that has a dummy keyhole but no actual lock.

  • (cs) in reply to Bullwark
    Bullwark:
    Xich:
    and one of my best clients just broke 500,000 dollars in federal sales

    So he sold a toilet seat to the White House?

    I hope you're happy. That toilet seat comment has me looking for a dry office chair.

    I can't remember when I've seen this much irony on this site.

  • Bob Smith (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    If you are for real, then you really don't get it, do you? No hacking is going on. This is the equivalent of a set of keys with the person's home address attached on the keychain. This is the same as leaving your wallet with your bank card and a note that has your PIN at a restaurant.

    In fact, it's even worse, because by stating that this website is "secure" and then blatantly putting the password (!) where it is publicly viewable, the site is operating under false pretenses about their own practices.

    Be thankful that someone with a backbone and a sense of morality has pointed this out while the problem can be fixed.

  • heh (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    HAHAHAHAHAHAHAHAHAHAHAHA...

    nice trolling.

  • Pro Web Developer (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    Ummm yeah, your javascript is being sent to every user that visits your site. All you have to do to get the username and password is view the source of the webpage and boom, you got the info to login. It doesn't take a hacker to do that just someone who knows how to use their web browser. Honestly why would you put the username and password in javascript like that?

  • Zock (unregistered)

    Congratulations! You've just discovered 'teh Internet'. Now take your hands off the keyboard and back away very slowly.

    :D

  • Daniel (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    I hope their reply is fake.

    "sorry our site wasn't protected to your standards" My 6 year old could get pass that login. It required no hacking, just looking at the html of the page.

    "Blah wife, blah children, blah long time employee, blah, tons of clients" Even if this isn't a load of bull, its completely besides the point.

    "its rude, your comments are not truthful we are not a scam" How about the references he called? They were all being untruthful?

    Anyways- Just because what you do isn't illegal doesn't mean its not a scam.

  • Anonymous (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    There is no way this person has a wife AND has had sex 4 different times.

  • MikeW (unregistered)

    Oh Oh, they're really on top of this now!

    <script language="javascript"> <!--// /*This Script allows people to enter by using a form that asks for a UserID and Password*/ function pasuser(form) { if (form.id.value=="zzzzzz") { if (form.pass.value=="fffxxx") { location="http://officers.federalsuppliers.com/agents.html" } else { alert("Invalid Password") } } else { alert("Invalid UserID") } } //--> </script>
  • JL (unregistered) in reply to Random832
    Random832:
    Actually I think it'd be more like a sign saying "There is no key under the mat that unlocks this door!"
    No, a sign that says "This door is locked, you need a key to get in", on a door that has a dummy keyhole but no actual lock.
    No, it's the equivalent of an open doorway with a sign next to it saying: "Please say the password aloud. ... If you said 'eggplant', you may enter the doorway. Otherwise, please leave."
  • wackyvorlon (unregistered) in reply to FEDERAL SUPPLIERS GUIDE CUSTOMER SUPPORT

    It isn't hacking if the password is written down in plain sight. You need better code.

Leave a comment on “So You Hacked Our Site!?”

Log In or post as a guest

Replying to comment #:

« Return to Article