{"id":23788,"date":"2014-02-23T23:58:47","date_gmt":"2014-02-24T05:58:47","guid":{"rendered":"http:\/\/rankexploits.com\/musings\/?p=23788"},"modified":"2014-03-13T14:01:24","modified_gmt":"2014-03-13T20:01:24","slug":"sks-non-revelations-about-their-hack-part-i","status":"publish","type":"post","link":"https:\/\/rankexploits.com\/musings\/2014\/sks-non-revelations-about-their-hack-part-i\/","title":{"rendered":"SkS Non-revelations about their &#8216;hack&#8217;: Part I."},"content":{"rendered":"<p>Bob Lacatanae just wrote a post discussing SkS being &#8220;hacked&#8221; way back in February 2012. You know&#8230;. the hack that we are all supposed to know is hack because SkS says it&#8217;s a hack but they won&#8217;t tell use how they know it&#8217;s a hack? Well it seems Bob has just posted part I of some sort of &#8220;tell all&#8221;.  I wasn&#8217;t going to pre-empt Brandon , who alerted me to the story (and has since posted at <a href=\"http:\/\/hiizuru.wordpress.com\/2014\/02\/24\/skeptical-science-hacked-or-just-a-hack\/\">his own blog<\/a> and <a href=\"http:\/\/hiizuru.wordpress.com\/2014\/02\/27\/is-skeptical-science-stupid-or-does-it-think-we-are\/\">II<\/a>, <a href=\"http:\/\/hiizuru.wordpress.com\/2014\/02\/28\/skeptical-science-leak-was-not-a-hack\/\">III<\/a>).  But really, this new SkS post is beyond coy.<\/p>\n<p>Here&#8217;s Bob telling us how much he&#8217;s going to tell us:<\/p>\n<blockquote><p>So how did the hack happen?  Again, I am reluctant to share too many details,&#8230; <\/p><\/blockquote>\n<p>Indeed, Bob shares <em>very<\/em> few details. <\/p>\n<p>What we are told is that according to Bob&#8217;s <em>theory<\/em>, the &#8220;hack&#8221; happened in on February 21, 2012 and was perpetrated by someone Bob calls &#8220;The German&#8221; who used a Tor browser. Other than that: at least in Part 1, readers are not provided <em>any<\/em> information to permit one to figure out whether this theory is remotely plausible. <\/p>\n<p>We are also told that no one at SkS suspected or detected &#8216;the hack&#8217; for <em>month<\/em> (in Bob&#8217;s estimate). But somehow or another, when Bob logged into SkS, he saw that someone else at SkS has learned of the &#8220;hack&#8221; which, Bob tells us impelled him to &#8220;quickly followed the link supplied by grypo to a comment on a backwater pseudo-skeptic blog announcing the hack&#8221;.   Though Bob does not identify the &#8220;backwater pseudo-skeptic blog announcing the hack&#8221;, I think the link pointing to the SkS files corresponding to their forum data base appeared in comments in this <a href=\"http:\/\/tomnelson.blogspot.com\/2012\/03\/bill-mcfibben-on-weirdest-weather.html\">post at Tom Nelson&#8217;s blog<\/a><\/p>\n<p>The comment begins:<\/p>\n<blockquote><p>Dear Friends:<\/p>\n<p>In the interest of transparency, I think you should see these files from Skeptical Science.<\/p>\n<p>An anonymous whistleblower has brought to my attention some database logs and other files (e.g., http:\/\/www.skepticalscience.com\/logs\/2012-03-21.zip (the current day is txt, past days zip)). These files detail everything that happens on the site, from forum conversations to user accounts. I have collated some of the data in a more readable form.<\/p>\n<p>http:\/\/files.molongo.ru\/en\/my\/sks.zip<\/p>\n<p>Why has SkS chosen to publish all this on the public internet? Is it the first step towards transparency, or a catastrophic error? This is what I first intended to ask Mr. Cook.<\/p><\/blockquote>\n<p>What this suggests is that someone at skeptical science was backing up the database by duplicating it, zipping the database file and storing these files in a directory called http:\/\/www.skepticalscience.com\/logs\/. (For those wondering: My database at Dreamhost lets me create a todays_date.zip file back up of my database  at the touch of a button. Heck, I can instruct Dreamhost to create these and store them somewhere on the server, or email them to myself or do any number of things. If I am <I>not insane<\/i> I make sure that I do not store these in any <I>accessible address<\/i>, like, for example, a file called http:\/\/rankexploits.com\/logs\/ Note: I do not store my backups in an web-accessible directory.)<\/p>\n<p>So, somehow this &#8216;logs&#8217; directory and it&#8217;s contents were found. How might they have been found? Who knows? Maybe a curious person thought, &#8220;Why don&#8217;t I type http:\/\/www.skepticalscience.com\/logs and see what happens?&#8221; Or maybe someone started typing a uri, hit return before finishing and found the \/logs directory. Or someone typed a broken link.  <\/p>\n<p>However they might have typed  http:\/\/www.skepticalscience.com\/logs, if it contained zip files and no index  and John Cook has not excluded surfing to that directory with .htaccess, and had not prevented display of the directory tree, the directory tree would have displayed.  (This is <I>default<\/i> behavior of many servers.)<\/p>\n<p>The person who found the directory might then have been <I>curious<\/i> abut what they saw and clicked. OMG!  <\/p>\n<p>I would not call this &#8220;a hack&#8221;. I would not consider accomplishing this &#8220;real skill&#8221;. In fact, it might be called &#8220;an accidental discovery&#8221;.<\/p>\n<p>Could the &#8220;well that&#8217;s not really a hack unless an accidental discovery can be called a &#8216;hack'&#8221; have possibly happened the way I suggest? <\/p>\n<p>Well, <a href=\"http:\/\/rankexploits.com\/musings\/2013\/the-sks-nazi-images-thoughts-on-fair-use\/\">remember how the SkS Nazi Image Files were found<\/a>? They were found pretty much the way I described above. Directory trees can display, they often do. They did at &#8220;http:\/\/sksforum.org\/image&#8221;. This isn&#8217;t rocket science. It&#8217;s the way &#8220;the web&#8221; works.<\/p>\n<p><a href=\"http:\/\/rankexploits.com\/musings\/wp-content\/uploads\/2014\/02\/SkepticalScience_logs_directory.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/rankexploits.com\/musings\/wp-content\/uploads\/2014\/02\/SkepticalScience_logs_directory-300x174.png\" alt=\"SkepticalScience_logs_directory\" width=\"300\" height=\"174\" class=\"alignright size-thumbnail wp-image-23804\" srcset=\"https:\/\/rankexploits.com\/musings\/wp-content\/uploads\/2014\/02\/SkepticalScience_logs_directory-300x174.png 300w, https:\/\/rankexploits.com\/musings\/wp-content\/uploads\/2014\/02\/SkepticalScience_logs_directory-500x291.png 500w, https:\/\/rankexploits.com\/musings\/wp-content\/uploads\/2014\/02\/SkepticalScience_logs_directory-1024x597.png 1024w, https:\/\/rankexploits.com\/musings\/wp-content\/uploads\/2014\/02\/SkepticalScience_logs_directory.png 1113w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>So: in other words, the simplest theory is that someone found the logs the same way someone found all the images. Somehow someone found the \/logs\/ directory, all the files displayed and then they clicked to download. That person downloaded the files, then created a database to hold the files and hosted it on a Russian server. (This is all easy.) they later described finding stuff in the \/logs\/ directory in a comment at Tom Nelsons and pointed someone to the address that displayed the database. Not. Real. Difficult. <\/p>\n<p>No one at SkS has ever said anything to suggest this is <I>not<\/i> what happened. <\/p>\n<p>Meanwhile, we have Bob&#8217;s theory. Does Bob give us enough information to tell whether this person he called &#8220;The German&#8221; &#8216;hacked in&#8217; in February 2012? Nope. Do we know what uri&#8217;s or requests were made that permitted this &#8220;The German&#8221; to &#8216;hack in&#8217;? Nope. Bob intimates that an SQL injection attack occurred on the day they &#8220;think&#8221; &#8220;The German&#8221;  hacked in using his &#8220;Tor&#8221; browser.  Can we inspect what he did to see if that particular SQL could possibly have resulted in SkS&#8217;s server disgorging the entire contents of the database? Nope. Does Bob tell us the IP so we can check his theory that this Tor connection hacked in? Nope.  (I&#8217;ve averaged 8 Tor connections a day over the past 3 weeks. I&#8217;m Tor hostile and ban them, but just try to visit the blog. Some do do weird things. The mere appearance of Tor does not mean that a hack was attempted. It certainly doesn&#8217;t mean one succeeded. One needs to know more.)<\/p>\n<p>Now maybe all of this will be revealed in Part II, III or even XXVI. It will turn out SkS caught &#8220;The German&#8221; dead to rights&#8211; Tor Browser and all. Bob does have some <i>very specific dates and times<\/i> in Part I, so maybe he&#8217;s reveal something to make me believe they actually know this was &#8220;a hack&#8221;. If so: Good going!<\/p>\n<p>That said: until I read anything to suggest that &#8220;revelation of the SkS forum database&#8221; didn&#8217;t happen exactly in the manner that is consistent with the description in the comment at Tom Nelson&#8217;s, I&#8217;m going to assume that&#8217;s how it happened. You know why? Because the &#8220;not a hack&#8221; method of revelation totally believable <i>and<\/i> it wouldn&#8217;t require anyone with any skills to accomplish. It would merely require us to believe that John Cook organized the &#8220;SkepticalScience.com&#8221; more or less the way he later organized &#8220;sksforum.org&#8221;. <\/p>\n<p>Now, moving away from &#8220;the hack&#8221;, there are a number of other funny things in Bob&#8217;s post. Turns out SkS has particularly bad password security:<\/p>\n<blockquote><p>Sceptical Wombat at 10:54 AM on 22 February, 2014<br \/>\nOne thing I think you should stop doing is holding passwords in plain text.  A better way is to use a one way encryption algorithm and to only store the encrypted password.  That way you never know my password and so no one else can get it from you.  If I forget my password you issue a new one and require me to  change it.<\/p>\n<blockquote><p>Moderator Response:<\/p>\n<p>[BL] Passwords are not and have never been stored in the database as clear text.  They are and always have been encrypted, and they are never decrypted.  Rather, the password sent by the user is encrypted, and that encrypted password is compared to the encrypted password stored for the user.  If they match, then the password supplied by the user is valid.<\/p>\n<p>[BL]  Correction, I just looked at the code, and passwords are decrypted in the &#8220;Forgot your password&#8221; function &#8212; but that doesn&#8217;t represent much of a security hole, because it can&#8217;t be used to breach the system, and it can only be used to steal passwords if you already have the password and so can change a user&#8217;s e-mail, <em>or otherwise have access to that person&#8217;s e-mail.<\/em><\/p>\n<p>Either way, that particular flaw doesn&#8217;t represent a pressing issue, at least compared to the effort it would take to correct.<\/p><\/blockquote>\n<\/blockquote>\n<p>Italics mine. That Bob. Bless his heart. <\/p>\n<p>Mind you, those skepticalscience.com passwords are only used to prevent spam at skeptical science. But anyone who knows anything about phishing also knows that people often use the same password on many sites. Some long time email users and even some &#8216;security experts&#8217; know that people who &#8220;otherwise have access to that person&#8217;s e-mail&#8221; are sometimes called &#8220;their employers IT department&#8221;.  At some companies, emails are stored. That means that skepticalscience is putting their own users at risk of revealing &#8220;pet&#8221; passwords which they might be using elsewhere to their IT department. So if you have a password at SkepticalScience, maybe you should consider changing it. Oy. <\/p>\n<p>In the meantime, we can all wonder whether Part II will give us any information to suggest that SkS has information to show the &#8220;the hack&#8221; was accomplished with an SQL injection attack perpetrated by &#8220;The German&#8221; using a Tor browser.  Maybe they will. Maybe they won&#8217;t.  To Be Continued. <\/p>\n<p><b>Update:<\/b> edited to add link to Brandon&#8217;s post.<br \/>\n<b>Update Feb 25:<\/b>Barry Woods found a directory listing at the Wayback machine. I took a screenshot, uploaded and inserted at the appropriate location in the narrative.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bob Lacatanae just wrote a post discussing SkS being &#8220;hacked&#8221; way back in February 2012. You know&#8230;. the hack that we are all supposed to know is hack because SkS says it&#8217;s a hack but they won&#8217;t tell use how they know it&#8217;s a hack? Well it seems Bob has just posted part I of &hellip; <a href=\"https:\/\/rankexploits.com\/musings\/2014\/sks-non-revelations-about-their-hack-part-i\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">SkS Non-revelations about their &#8216;hack&#8217;: Part I.<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[134],"tags":[],"class_list":["post-23788","post","type-post","status-publish","format-standard","hentry","category-politics"],"_links":{"self":[{"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/posts\/23788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/comments?post=23788"}],"version-history":[{"count":0,"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/posts\/23788\/revisions"}],"wp:attachment":[{"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/media?parent=23788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/categories?post=23788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/tags?post=23788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}