<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Abeon Tech</title>
	<atom:link href="https://abeontech.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://abeontech.com/</link>
	<description>Sardonic infosec.</description>
	<lastBuildDate>Mon, 09 Aug 2021 23:01:50 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://abeontech.com/wp-content/uploads/2021/07/cropped-android-chrome-512x512-1-32x32.png</url>
	<title>Abeon Tech</title>
	<link>https://abeontech.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">4629696</site>	<item>
		<title>nSkid Scambait Tool</title>
		<link>https://abeontech.com/code/nskid-scambait-tool/</link>
					<comments>https://abeontech.com/code/nskid-scambait-tool/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Sun, 18 Jul 2021 00:02:00 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<guid isPermaLink="false">https://abeontech.com/?p=1423</guid>

					<description><![CDATA[<p>nSkid is a python SERP scraper for scammer phone numbers. I made it for productivity.</p>
<p>The post <a href="https://abeontech.com/code/nskid-scambait-tool/">nSkid Scambait Tool</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>nSkid is a simple Pthon script to generate phone numbers for tech support scammers. </p>



<div class="ghostkit-gist" data-url="https://github.com/mradamdavies/number-skid" data-file="" data-caption="" data-show-footer="true" data-show-line-numbers="true"></div>



<div class="ghostkit-gist" data-url="https://github.com/mradamdavies/number-skid" data-file="" data-caption="" data-show-footer="true" data-show-line-numbers="true"></div>



<h2 class="is-style-squadforce-decorated wp-block-heading">What does nSkid do?</h2>



<p>This python <a href="https://abeontech.com/forum/scam-bait/">scam baiting</a> tool checks several Google search results pages for phone numbers reported to scam identification databases. It is a work in progress, but I plan to expand it at some point. nSkid currently only shows results for Amazon tech support scams and Microsoft tech-support scams.</p>



<p>You can choose to crawl numbers from the past day, past hour, or past week. N<strong>umbers from the past day</strong> is the suggested starting option. You can then narrow it to last hour if you get a lot of dead results.</p>



<div class="wp-block-image is-style-default"><figure class="aligncenter size-large"><img fetchpriority="high" decoding="async" width="1024" height="576" src="https://abeontech.com/wp-content/uploads/2021/07/nskid-number-skid-1024x576.jpg" alt="nSkid Scambait Tool" class="wp-image-1417" srcset="https://abeontech.com/wp-content/uploads/2021/07/nskid-number-skid-1024x576.jpg 1024w, https://abeontech.com/wp-content/uploads/2021/07/nskid-number-skid-300x169.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/nskid-number-skid-768x432.jpg 768w, https://abeontech.com/wp-content/uploads/2021/07/nskid-number-skid-500x281.jpg 500w, https://abeontech.com/wp-content/uploads/2021/07/nskid-number-skid-800x450.jpg 800w, https://abeontech.com/wp-content/uploads/2021/07/nskid-number-skid-48x27.jpg 48w, https://abeontech.com/wp-content/uploads/2021/07/nskid-number-skid-600x338.jpg 600w, https://abeontech.com/wp-content/uploads/2021/07/nskid-number-skid.jpg 1200w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>The script in action</figcaption></figure></div>



<p>It will currently only return a maximum of 40 results. There is a bug with detecting no results, which I will fix in the next update. </p>



<p>I plan to add some extra functionality, such as better selection of, or input for scam types. I could do with finding extra databases to check SERPs for (thanks Nomorobo &amp; RoboKiller). Could be an idea to integrate this with a few other tools to make an all-in-one style tool. It uses Python3 and pretty basic code.</p>



<p>Please always double check the numbers are actual scammers, and be nice to them. They&#8217;re still just people too. Also, please remember that the scammer&#8217;s change numbers often. So don&#8217;t assume they&#8217;re scammers, or complain if they&#8217;re all dead. They number hop a lot. </p>



<p>Any suggestions or ideas are very much welcome! I would love to hear feedback on additional tools for scambaiting, both to improve productivity, and just to have fun. So, feel free to submit code suggestions on GitHub, reply below or use the forum to let me know <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<p>nSkid is now avaible as a Discord bot, so you can scam bait without having to leave your favourite servers. It&#8217;s currently limited to the <a href="https://discord.gg/nvaUnnub" target="_blank" rel="noreferrer noopener">Abeon Tech Discord</a> server, bit I will roll it out after I&#8217;ve made it more stable and reliable. I also plan to add extra functionality, but this will always be one step behind our official version. </p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Usage</h3>



<p>Download from the GitHub link, below.</p>



<div class="ghostkit-button-wrapper ghostkit-button-wrapper-gap-md ghostkit-button-wrapper-align-center"><div class="ghostkit-button-wrapper-inner">
<a class="ghostkit-button ghostkit-button-md ghostkit-custom-ZWLmFA" href="https://github.com/mradamdavies/number-skid" target="_blank" rel="noreferrer noopener"><span class="ghostkit-button-icon ghostkit-button-icon-left"><svg xmlns="http://www.w3.org/2000/svg" class="ghostkit-svg-icon ghostkit-svg-icon-unicons" aria-hidden="true" role="img" fill="currentColor" width="16" height="16" viewBox="0 0 16 16"><path fill-rule="evenodd" d="M8 0C3.58 0 0 3.58 0 8c0 3.54 2.29 6.53 5.47 7.59.4.07.55-.17.55-.38 0-.19-.01-.82-.01-1.49-2.01.37-2.53-.49-2.69-.94-.09-.23-.48-.94-.82-1.13-.28-.15-.68-.52-.01-.53.63-.01 1.08.58 1.23.82.72 1.21 1.87.87 2.33.66.07-.52.28-.87.51-1.07-1.78-.2-3.64-.89-3.64-3.95 0-.87.31-1.59.82-2.15-.08-.2-.36-1.02.08-2.12 0 0 .67-.21 2.2.82.64-.18 1.32-.27 2-.27.68 0 1.36.09 2 .27 1.53-1.04 2.2-.82 2.2-.82.44 1.1.16 1.92.08 2.12.51.56.82 1.27.82 2.15 0 3.07-1.87 3.75-3.65 3.95.29.25.54.73.54 1.48 0 1.07-.01 1.93-.01 2.2 0 .21.15.46.55.38A8.013 8.013 0 0016 8c0-4.42-3.58-8-8-8z"/></svg></span><span class="ghostkit-button-text">nSkid on GitHub</span></a>
</div></div>



<p>Then run with this command&#8230;</p>



<p> <code>python3 nskid.py</code></p>



<p></p>
<p>The post <a href="https://abeontech.com/code/nskid-scambait-tool/">nSkid Scambait Tool</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/code/nskid-scambait-tool/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1423</post-id>	</item>
		<item>
		<title>An XSS attack in action</title>
		<link>https://abeontech.com/security/xss-attack-action/</link>
					<comments>https://abeontech.com/security/xss-attack-action/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Fri, 06 Sep 2019 10:49:39 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[xss]]></category>
		<guid isPermaLink="false">https://wp.nkdev.info/squadforce/?p=162</guid>

					<description><![CDATA[<p>Teh Cookie Monster. A full example of how XSS can lead to full account takeover. </p>
<p>The post <a href="https://abeontech.com/security/xss-attack-action/">An XSS attack in action</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cross site scripting attacks, commonly called XSS, are becoming more and more prevalent as the power of JavaScript has evolved way beyond simple DOM manipulation. Using the power of embeded JavaScript can be beneficial for an attacker for several reasons including…</p>



<ul class="wp-block-list"><li>HiJacking login sessions (covered in this article)</li><li>Inserting malicious code</li><li>Using resources of your visitors/website</li><li>Inserting links to undesirable websites</li><li>Stealing sensitive information</li></ul>



<h2 class="is-style-squadforce-decorated wp-block-heading">XSS? It’s just a popup!</h2>



<p>The common misconception of XSS attacks is that they are benign and of no real significance. Injecting HTML and JavaScript into a page was, once upon-a-time, fairly pointless and meant little more than funky stuff happening to the user inputting the malicious data. The power of JavaScript and now HTML, with offline storage and heavy inbuilt DOM manipulation, has grown exponentially over the past few years.</p>



<p>There are many notable instances of malicious JavaScript deployment being used for exploitation very effectively. <strong>Cross Site Scripting</strong> attacks have been used against the majority of big social media websites, among others, with notable mentions including…</p>



<p>Twitter suffered an <a href="http://www.securelist.com/en/blog/2276/Twitter_XSS_in_the_wild" target="_blank" rel="noreferrer noopener">account hijacking exploit</a>, which snared well over 100,000 Twitter accounts. A recent <a href="https://web.archive.org/web/20150919215550/http://www.hotforsecurity.com/blog/xss-exploit-that-steals-yahoo-mail-cookies-sold-for-700-4544.htmlkies-sold-for-700-4544.html" target="_blank" rel="noreferrer noopener">Yahoo XSS exploit</a> lead to many comprimised accounts but the true number is unknown.</p>



<p>FaceBook has been plagued by vulnerabilities, mostly due to it’s popularity. A notable FaceBook XSS flaw was recently discovered in it’s insant messaging JavaScipt handling which could lead to full access to the target’s private messages. Gmail has been susceptible to several stored and reflected Cross Site Scripting attacks over the past few years. A vulnerability was introduced when <a href="https://web.archive.org/web/20160322194307/http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/" target="_blank" rel="noreferrer noopener">Google+ integration</a> was rolled out and lead to complete account takeover.</p>



<p>Anonymous recently used very simple JavaScript deployment in a very effective manner by inserting a script called “The Hive”, which is a JavaScript based Ddos tool. The aim was simple: take down a well known, and possibly highest value target of all; the Department of Justic. They were successful and it required very little resources compared to previous Ddos attacks.</p>



<p>There are many more examples, but that should be enough to scare even the laziest developers.</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">An XSS Cookie Stealer In Action</h2>



<p>The process of hijacking a user’s session is fairly straight forward but the required code usually takes a little tweaking, depending on the target. The idea is simple: find a point to inject JavaScript, get someone with escalated permissions to visit the page, log their information and replace your current login with theirs.</p>



<p>The attackflow is simple:</p>



<ol class="wp-block-list"><li>Find a vulnerability</li><li>Create a payload</li><li>Entice an admin/staff/user to visit the desired URL</li><li>Clone their session or cookie</li><li>Login as victim (Admin?)</li><li>???</li><li>Profit!!!</li></ol>



<p>Ok so jokes of profit aside, the code required to be deployed on the target site is usually minimal as most of the work happens in a small script used to capture the data. Only two files are required – one to process the data and one to store the logged information (it could be combined into one file, but this is an example on protection… Not skiddie copy/pasta material!).</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">Introducing “Teh Cookie Monster!”</h2>



<p>I spent some time creating a simple cookie logger to demonstrate how this attack could take place. The main script — “cookie-monster.php” — will handle the data collected and “cookie-jar.txt” will simply log the cookies and other information we grab.</p>



<p>The aim of the script was to log all cookies from our target site to a file and allow them to be viewed. The code below is a modified working example that we use internally to help with penetration testing and script hardening.</p>



<div class="ghostkit-gist" data-url="https://gist.github.com/mradamdavies/f3d0004120f9aaa8bb644a23a2e1970c" data-file="" data-caption="" data-show-footer="true" data-show-line-numbers="true"></div>



<p><strong>File: cookie-monster.php</strong></p>



<p>In order for the above code to work we need to embed some pretty simple JavaScript into our target website…</p>



<div class="ghostkit-gist" data-url="https://gist.github.com/mradamdavies/aaf427b4c38f1c32f75308a4107da42b" data-file="" data-caption="" data-show-footer="true" data-show-line-numbers="true"></div>



<p>The line of code above will load our script as a blank image and appear to do nothing to the user. The cookie-monster.php script will grab the visitors cookie along with other data, then save it to cookie-jar.txt for later viewing. This could be expanded to return a valid image.</p>



<p>We have our code and we know what to do, so let’s use <a href="https://dvwa.co.uk/" target="_blank" rel="noreferrer noopener">Damn Vulnerable Web Application</a> as an example. I have it installed on my localhost and have two accounts – “admin” and “abeon”. I login as “abeon” and create a malicious URL to send to “admin”. This is where the uber-l337 hacking skillz come in handy… We have to make the page attract the admins attention without causing alarm. There are many tactics but an effective one seems to be pretending to report an issue, so kind of break the page but leave it intact enough so as to not arouse suspicion.</p>



<p>Something like this should do…</p>



<div class="ghostkit-gist" data-url="https://gist.github.com/mradamdavies/ad6da9c0424aa789dee87e29cd1b7466" data-file="" data-caption="" data-show-footer="true" data-show-line-numbers="true"></div>



<p>Yup, that’s right. A long and ugly URL which is only partially encoded and not very well. This is intentional as the user will see the “I BROKE IT” message clearly but will probably miss the script tags. There are many ways to obfuscate the payload such as mixed encoding, internal redirect, URL shortening services, external retrieval and more.</p>



<p>cookie-monster.php will log the information when someone clicks the link and display the saved data. View the cookies by visiting the script’s URL with the mode set as 1 and password as defined at the top of the script:</p>



<div class="wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:100%">
<pre class="wp-block-code"><code>http:&#47;&#47;example.com/cookie-monster.php?mode=1&amp;pswd=123-derpy_skid-321</code></pre>
</div>
</div>



<p>There are many ways to edit cookies but browser plugins are the most popular. <a href="https://chrome.google.com/webstore/detail/editthiscookie/fngmhnnpilhplaeedifhccceomclgfbg">Edit this cookie</a> is a useful cookie editor plugin for Chrome. <a href="https://addons.mozilla.org/en-US/firefox/addon/cookie-quick-manager/">Cookies Quick Manager</a> is very similar, but for FireFox.</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">Protecting Against XSS Attacks</h2>



<p>Defending against Cross Site Scripting attacks is handled in a similar way to most other forms of exploitation: validation and sanitization of all data is a must!</p>



<p>The best way to defend against malicious user input is to validate any data that could cause harm, such as checking for a valid email address or phone number, and sanitize any data that is displayed back to the user by converting to benign code.</p>



<p>PHP’s inbuilt htmlentities and htmlspecialchars functions handle both tasks in a very similar fashion. htmlspecialchars converts only 5 characters while htmlentities will convert any HTML characters into their representative counterparts. For this reason, it’s advisable to use htmlentities with both ENT_QUOTES and UTF-8 flags set as below.</p>



<div class="ghostkit-gist" data-url="https://gist.github.com/mradamdavies/77270a0bf96d94af43b6dd11640fd16b" data-file="" data-caption="" data-show-footer="true" data-show-line-numbers="true"></div>



<p>Setting ENT_QUOTES will convert both single and double quotes which is essential as both can cause serious problems for security. Using the UTF-8 encoding flag is also very important when using ENT_QUOTES as it defines the encoding used and can help to prevent bypassing using obfuscated code.</p>



<p>A final word of warning:<br>This example focuses on reflected XSS attacks. A <a href="https://abeontech.com/security/scoot-sun-independent-xss/">stored XSS vulnerability</a> can be far more damaging as any visitor to the site can be affected &#8211; not just those visiting malicious links.</p>



<p>The biggest offender for XSS attacks is without a doubt search forms. Any data a user can alter should be considered a potential risk. Creating validation and sanitization functions through which data can be passed is always easier and more reliable than adhoc coding. There are frameworks and pre-built classes specifically for validation but altering or further developing these can be difficult.</p>
<p>The post <a href="https://abeontech.com/security/xss-attack-action/">An XSS attack in action</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/security/xss-attack-action/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">162</post-id>	</item>
		<item>
		<title>Hacking My Bank. For teh lulz.</title>
		<link>https://abeontech.com/security/hacking-bank-secure-mortgage/</link>
					<comments>https://abeontech.com/security/hacking-bank-secure-mortgage/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Sun, 10 Jul 2016 23:58:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://abeontech.com/?p=1</guid>

					<description><![CDATA[<p>I lost count how many exploits I found in my bank. They have a huge attack surface. </p>
<p>The post <a href="https://abeontech.com/security/hacking-bank-secure-mortgage/">Hacking My Bank. For teh lulz.</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>I have around 17 years experience making people feel bad by finding errors in their code. I like to think I&#8217;m pretty good at it.</p>



<p>My computing hobby developed into a career in internet marketing as services moved online. Converting knowledge from my hobby to improve the efficacy of marketing campaigns was easier than hacking banks&#8230; Or so I thought. I was recently employed by the leading marketing agency located in Brighton.</p>



<p>They are owned by a large multinational conglomerate which reported an anual revenue of $10 billion in 2014&#8230;</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<div class=" responsive-embed responsive-embed-16x9 embed-youtube"><iframe title="Austin Powers - 100 billion dollars" width="1140" height="855" src="https://www.youtube.com/embed/jTmXHvGZiSY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe></div>
</div></figure>



<h3 class="is-style-squadforce-decorated wp-block-heading">For Lulz &#8211; And To Protect My Mortgage</h3>



<p><em>Legal disclaimer:</em> I believe in following the laws of both the UK and host country when conducting security research. As the UK is one of the most oppressive regimes for a white hat hacker, it&#8217;s a good starting point from which I must restrict my activities. Jail isn&#8217;t fun. Been there. done that, got the t-shirt. The t-shirts itch.</p>



<p>Most white hat hackers publicise posts to show weaknesses in big institutions, demonstrate skill and/or gloat. If I&#8217;m being honest, I <a href="http://abeontech.com/security/mocking-military-hacking-hackers/" target="_blank" rel="noreferrer noopener">mocked the military</a> more because I could than I wanted them to fix the issue.</p>



<p>I looked into security risks with Barclays for two reasons; I have a mortgage with them and I worked on their marketing campaign. A security breach would have been both professionally and personally inconvenient. I also assumed banking security had moved on from the days of <strong>sa:blank</strong>.</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">The &#8220;SSL = Secure&#8221; Myth</h3>



<p>My initial research into the Barclays websites was fairly brief and in preperation for a job interview. It was obvious that the SSL implementation was very insecure and could easily allow MiTM attacks. Until patched, all it would have taken was a malicious access point setup in a busy branch (London, Brighton, etc) and one could easily exfiltrate account data for malicious purposes.</p>



<p>The first issue I reported was a redundant SSL cert installed on m.barclays.co.uk. The combination of a weak certificate and poorly configured server meant that customer data was at serious risk. The attack vector is <a href="http://www.securityweek.com/new-attack-rc4-based-ssltls-leverages-13-year-old-vulnerability" target="_blank" rel="noreferrer noopener">somewhat esoteric</a>, so I&#8217;ll omit it for brevity. I looked for further problems when I had a little more time…</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">XSS (Cross-Site Scripting)</h2>



<p>I ran domains I suspected to be controlled by Barclays through a semi-automated XSS scanner I developed about a ago. I got a hit on barclaycardcentre.es. The hit was confirmed as McAfee had marked the website as being used as a phishing site. I reported the PoC and moved on&#8230;</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img decoding="async" width="799" height="483" src="https://abeontech.com/wp-content/uploads/2021/07/barclaycardcenter.es-xss-1.png" alt="" class="wp-image-1165" srcset="https://abeontech.com/wp-content/uploads/2021/07/barclaycardcenter.es-xss-1.png 799w, https://abeontech.com/wp-content/uploads/2021/07/barclaycardcenter.es-xss-1-300x181.png 300w, https://abeontech.com/wp-content/uploads/2021/07/barclaycardcenter.es-xss-1-768x464.png 768w, https://abeontech.com/wp-content/uploads/2021/07/barclaycardcenter.es-xss-1-500x302.png 500w, https://abeontech.com/wp-content/uploads/2021/07/barclaycardcenter.es-xss-1-48x29.png 48w, https://abeontech.com/wp-content/uploads/2021/07/barclaycardcenter.es-xss-1-600x363.png 600w" sizes="(max-width: 799px) 100vw, 799px" /></figure></div>



<pre class="wp-block-code"><code>barclaycardcentre.es/busqueda?criterio=1'autofocus/onfocus='prompt(String.fromCharCode(88,83,83))</code></pre>



<p>After starting work on their marketing campaign I took another look at their network. I ran another list of Barclays domains through my XSS script. This time I spotted a similar XSS issue in <a href="https://www.barx.com/" target="_blank" rel="noreferrer noopener">barx.com</a>, a website dedicated to stock trading&#8230;</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="943" height="601" src="https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1.png" alt="" class="wp-image-1166" srcset="https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1.png 943w, https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1-300x191.png 300w, https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1-768x489.png 768w, https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1-500x319.png 500w, https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1-800x510.png 800w, https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1-48x31.png 48w, https://abeontech.com/wp-content/uploads/2021/07/Barx.com-XSS-1-600x382.png 600w" sizes="auto, (max-width: 943px) 100vw, 943px" /></figure></div>



<pre class="wp-block-code"><code>barx.com/search-results.html?to=1451624400000&amp;q=barclays "&gt;&lt;svg/onload=prompt(/XSS/)&gt;&amp;from=1420088400000</code></pre>



<p>I was a little concerned about how insecure my mortgage providers where by this point. I just decided to focus on the marketing campaign and try to get the security issues fixed when I could. Then I found a winning fail…</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Public Application Connection Details</h3>



<p>I discovered the most painful security issue in the Barclays network while looking for content related issues during an SEO audit. Two pages on the apps.barclays.mobi domain were showing PHP code as HTML, which seemed odd&#8230;</p>



<p></p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="518" src="https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-1024x518.png" alt="" class="wp-image-1167" srcset="https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-1024x518.png 1024w, https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-300x152.png 300w, https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-768x389.png 768w, https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-500x253.png 500w, https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-800x405.png 800w, https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-48x24.png 48w, https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1-600x304.png 600w, https://abeontech.com/wp-content/uploads/2021/07/Barclays-php-as-html-1.png 1073w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure></div>



<p>Both pages where saved in Google&#8217;s cache, so have been visible to the public for a while&#8230;</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="784" height="441" src="https://abeontech.com/wp-content/uploads/2021/07/barclays-cache-1.png" alt="" class="wp-image-1168" srcset="https://abeontech.com/wp-content/uploads/2021/07/barclays-cache-1.png 784w, https://abeontech.com/wp-content/uploads/2021/07/barclays-cache-1-300x169.png 300w, https://abeontech.com/wp-content/uploads/2021/07/barclays-cache-1-768x432.png 768w, https://abeontech.com/wp-content/uploads/2021/07/barclays-cache-1-500x281.png 500w, https://abeontech.com/wp-content/uploads/2021/07/barclays-cache-1-48x27.png 48w, https://abeontech.com/wp-content/uploads/2021/07/barclays-cache-1-600x338.png 600w" sizes="auto, (max-width: 784px) 100vw, 784px" /></figure></div>



<p>Checking the page source code showed connection details for the application&#8230;</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="576" src="https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-1024x576.png" alt="" class="wp-image-1169" srcset="https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-1024x576.png 1024w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-300x169.png 300w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-768x432.png 768w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-500x281.png 500w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-800x450.png 800w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-1280x720.png 1280w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-48x27.png 48w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1-600x337.png 600w, https://abeontech.com/wp-content/uploads/2021/07/barclays.mobi-public-app-details-1-1.png 1366w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure></div>



<pre class="wp-block-code"><code>$login = new MDG_ApplicationLogin('*snip*', '*snip*', '*snip*');</code></pre>



<p>Enumerating a database once you have the application login details is fairly rudimentary. Having an admin username / password publicly available on a world leading bank is definitely a winning fail. The best case scenario is exfiltrated data. A proficient hacker will root the box and move through the network.</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Stating The Obvious</h3>



<p>It should go without saying but unfortunatly doesn&#8217;t; a global bank with total assets in the region of <a href="https://en.wikipedia.org/wiki/Barclays" target="_blank" rel="noreferrer noopener">£1.12 trillion</a>, and an entire team of security specialists, shouldn&#8217;t suffer from such basic security issues.</p>



<p>During my brief employment for the McDonald&#8217;s of marketing, I was allotted 1 hour 30 minutes to penetration test their portfolio of well known clients. I managed to find exploits on all of them. Which is just sad.</p>



<p>As always, the issues were fixed within days when I got in touch with the right person. The problem is that it can take months to get the right contact.</p>



<p>Ethical hackers are often given free swag as a way of saying thanks. It helps promote the companies we hack and they get secured in the process. All I received were legal threats from my previous employer.</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Disclosure Timeline</h3>



<ul class="wp-block-list"><li>June 2015 &#8211; Initial report made over the phone. (first few days of the month).</li><li>13 July 2015 &#8211; SEO report conducted on Barclays for job interview. Weak SSL cert reported.</li><li>01 April 2016 &#8211; Started work on Barclays marketing. Reported 2x XSS and weak SSL again.</li><li>31 March 2016 &#8211; Issues escalated to Barclays IT security team. Then ignored.</li><li>04 April 2016 &#8211; Reported publicly available application login details.</li><li>13 June 2016 &#8211; Initial contact with Director of Cyber Response.</li><li>21 June 2016 &#8211; All issues fixed.</li><li>12 July 2016 &#8211; Post made public.</li></ul>
<p>The post <a href="https://abeontech.com/security/hacking-bank-secure-mortgage/">Hacking My Bank. For teh lulz.</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/security/hacking-bank-secure-mortgage/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1</post-id>	</item>
		<item>
		<title>Mocking the Military; Hacking Hackers</title>
		<link>https://abeontech.com/security/mocking-military-hacking-hackers/</link>
					<comments>https://abeontech.com/security/mocking-military-hacking-hackers/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Tue, 05 Apr 2016 10:46:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[xss]]></category>
		<guid isPermaLink="false">https://wp.nkdev.info/squadforce/?p=156</guid>

					<description><![CDATA[<p>I found a way to add pages to the U.S. Department of Defence. Of course I took the piss. Also, hacking hackers bonus content. </p>
<p>The post <a href="https://abeontech.com/security/mocking-military-hacking-hackers/">Mocking the Military; Hacking Hackers</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Disclaimer: This post is probably not safe for work. Bad language, political views, and oxford commas aplenty.</p>



<p>This article covers a few basic cross site scripting bugs in Department of Defence and Ghost Security websites. The idea is to highlight how even the most security conscience among us can forget to check for the most basic exploits.</p>



<p>I love Einstein. I have always had a passion for physics, relativity, and politics. A little cited quote from the aforementioned scientific genius is&#8230;</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">Mocking the military</h2>



<p>As much as I hate murder, the recent escalation of terrorism has been far worse. Another idol of mine &#8211; Bill Hicks &#8211; famously said: &#8220;I was in the unenviable position of being for the war, but against the troops. And ah&#8230; Not the most popular stance I&#8217;ve ever taken on an issue&#8221;.</p>



<p>War is bad, m&#8217;kay. Terrorism is worse, m&#8217;kaaay&#8230; Getting on with it.</p>



<p>Cross site scripting is one of the easiest exploits to protect against, yet is one of the most prolific. The example below is a perfect example of an easily overlooked bug in a website that could cause a lot of damage. Simply altering a URL on the Department of Defence website allowed any HTML to get shown in the PDF document:</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="800" height="540" src="https://abeontech.com/wp-content/uploads/2021/07/dod-html-injection-final-1.jpg" alt="" class="wp-image-1154" srcset="https://abeontech.com/wp-content/uploads/2021/07/dod-html-injection-final-1.jpg 800w, https://abeontech.com/wp-content/uploads/2021/07/dod-html-injection-final-1-300x203.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/dod-html-injection-final-1-768x518.jpg 768w, https://abeontech.com/wp-content/uploads/2021/07/dod-html-injection-final-1-500x338.jpg 500w, https://abeontech.com/wp-content/uploads/2021/07/dod-html-injection-final-1-48x32.jpg 48w, https://abeontech.com/wp-content/uploads/2021/07/dod-html-injection-final-1-600x405.jpg 600w" sizes="auto, (max-width: 800px) 100vw, 800px" /><figcaption>The little URL that could</figcaption></figure></div>



<p>The vulnerable page was:</p>



<pre class="wp-block-code"><code>http://www.militaryinstallations.dod.mil/mcfp-web/newsletter.jsp?url=http://www.militaryinstallations.dod.mil/MOS/f?p=MI:PRINT:0::::P11_INST_ID,P11_CONTENT_TITLE,P11_CONTENT_EKMT_ID,P11_CONTENT_DIRECTORY:1930,&#91;HTML_INJECTION] ....</code></pre>



<p>The Department of Defence responded quickly and a fix was rolled out within 24 hours. They confirmed the logic issue was fixed as there were several affected pages. I imagine the reply was sent through gritted teeth, but it got fixed and everyone is happy. Mostly.</p>



<p>I always email the site owner, wait 12 weeks, then try additional contact to get the issue resolved. Certain religious extremist groups may not be as helpful.</p>



<p>My sardonic proof of concept was intended to get a reaction. The vast majority of vulnerabilities go unfixed for months, even in government websites. I have reported hundreds of exploits on websites ranging from a plumber&#8217;s personal blog to <a href="https://www.openbugbounty.org/incidents/63848/" target="_blank" rel="noreferrer noopener">wikileaks</a>.</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">Hacking hackers</h2>



<p>So we&#8217;ve mocked the military. Why not hack the hackers? I tried to use the same simple technique on a group I&#8217;ve morally supported for a while. Ghost Security are a splinter-group of Anonymous which specialise in combating the spread of religious extremism on the internet.</p>



<p>Surely, the uber-1337 hax0rz can protect against a simple XSS vector? Sadly not.</p>



<h3 class="wp-block-heading">Even hackers make mistakes.</h3>



<p><a href="http://www.ghostsec.org/" target="_blank" rel="noreferrer noopener">GhostSec</a> are great guys and fighting for the right team by taking down extremists. I decided to check their website because T.V kills brain cells.</p>



<p>Within about 30 seconds I found a validation error in their hostchecker tool:</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="800" height="540" src="https://abeontech.com/wp-content/uploads/2021/07/GhostSec-XSS-1-1.jpg" alt="" class="wp-image-1155" srcset="https://abeontech.com/wp-content/uploads/2021/07/GhostSec-XSS-1-1.jpg 800w, https://abeontech.com/wp-content/uploads/2021/07/GhostSec-XSS-1-1-300x203.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/GhostSec-XSS-1-1-768x518.jpg 768w, https://abeontech.com/wp-content/uploads/2021/07/GhostSec-XSS-1-1-500x338.jpg 500w, https://abeontech.com/wp-content/uploads/2021/07/GhostSec-XSS-1-1-48x32.jpg 48w, https://abeontech.com/wp-content/uploads/2021/07/GhostSec-XSS-1-1-600x405.jpg 600w" sizes="auto, (max-width: 800px) 100vw, 800px" /></figure></div>



<p>I notified them about this <a href="https://twitter.com/mradamdavies/status/675407849527353345" target="_blank" rel="noreferrer noopener">on Twitter</a>. They added some basic input validation, replying with: &#8220;just feeding our XSS database ty&#8221;.</p>



<figure class="wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter"><div class="wp-block-embed__wrapper">
<div class=" embed-twitter"><blockquote class="twitter-tweet" data-width="550" data-dnt="true"><p lang="en" dir="ltr">Erm&#8230; <a href="https://twitter.com/Windev01?ref_src=twsrc%5Etfw">@Windev01</a>, <a href="https://twitter.com/TorReaper?ref_src=twsrc%5Etfw">@TorReaper</a>, <a href="https://twitter.com/ComediAnon?ref_src=twsrc%5Etfw">@ComediAnon</a>. Fix please? <a href="https://t.co/YZzDb0LOIL">pic.twitter.com/YZzDb0LOIL</a></p>&mdash; Mr Adam Davies (@mradamdavies) <a href="https://twitter.com/mradamdavies/status/675407849527353345?ref_src=twsrc%5Etfw">December 11, 2015</a></blockquote><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></div>
</div></figure>



<p>The proof of concept code used was, as always, basic:</p>



<pre class="wp-block-code"><code>derp.com/?pwn=1&amp;"&gt;&lt;img src=x onerror=prompt(/XSS/)&gt;</code></pre>



<p>They eventually put some XSS security in place. I thought I&#8217;d test the hacker&#8217;s anti-hacker protection. Only a basic filter had been put in place:</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="600" height="542" src="https://abeontech.com/wp-content/uploads/2021/07/ghostsec-xss-bypass-1.png" alt="" class="wp-image-1158" srcset="https://abeontech.com/wp-content/uploads/2021/07/ghostsec-xss-bypass-1.png 600w, https://abeontech.com/wp-content/uploads/2021/07/ghostsec-xss-bypass-1-300x271.png 300w, https://abeontech.com/wp-content/uploads/2021/07/ghostsec-xss-bypass-1-500x452.png 500w, https://abeontech.com/wp-content/uploads/2021/07/ghostsec-xss-bypass-1-48x43.png 48w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure></div>



<p>A common XSS WAF bypass technique worked. It took about 2 minutes:</p>



<pre class="wp-block-code"><code>derp.com/?pwn="&gt;&lt;marquee loop=1 width=0 onfinish=1/prompt`/XSSPOSED/`&gt;derp&lt;/marquee&gt;</code></pre>



<p>The rest of the site seemed fairly secure so I moved on, after the obligatory bragging on social media. I read another story about them around 4 months later, so decided to check the once secure site. <a href="https://twitter.com/mradamdavies/status/707252595463684096" target="_blank" rel="noreferrer noopener">XSS number 3</a>&#8230;</p>



<figure class="wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter"><div class="wp-block-embed__wrapper">
<div class=" embed-twitter"><blockquote class="twitter-tweet" data-width="550" data-dnt="true"><p lang="en" dir="ltr">*sigh* <a href="https://twitter.com/hashtag/XSS?src=hash&amp;ref_src=twsrc%5Etfw">#XSS</a> in your domain lookup tool this time. <a href="https://twitter.com/TorReaper?ref_src=twsrc%5Etfw">@TorReaper</a>, @_Ransacker? <a href="https://t.co/g3Xuw6ZETS">pic.twitter.com/g3Xuw6ZETS</a></p>&mdash; Mr Adam Davies (@mradamdavies) <a href="https://twitter.com/mradamdavies/status/707252595463684096?ref_src=twsrc%5Etfw">March 8, 2016</a></blockquote><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></div>
</div><figcaption>Same simple technique, different page. Funnily enough I didn&#8217;t get a reply this time.</figcaption></figure>



<h2 class="is-style-squadforce-decorated wp-block-heading">Trash or treasure?</h2>



<p>The point of this rant is that even the the experts make simple mistakes. The only real difference is scale of impact. If I had been trying to recruit bad people to do silly things, it would be a very different conversation. From making websites dance, to <a href="http://abeontech.com/security/xss-attack-action/">hijacking accounts</a> or <a href="https://ret2libc.wordpress.com/2016/01/03/hacking-banks-for-fun-and-profit/" target="_blank" rel="noreferrer noopener">stealing bank data</a>&#8230;</p>



<p>If I can make your website dance, what are the bad guys doing? The code isn&#8217;t that different.</p>



<figure class="wp-block-embed aligncenter is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<div class=" responsive-embed responsive-embed-16x9 embed-vimeo"><iframe loading="lazy" title="Shake It" src="https://player.vimeo.com/video/158220403?dnt=1&amp;app_id=122963" width="1140" height="641" frameborder="0" allow="autoplay; fullscreen; picture-in-picture" allowfullscreen></iframe></div>
</div></figure>



<hr class="wp-block-separator aligncenter"/>



<h3 class="is-style-squadforce-decorated wp-block-heading">Update</h3>



<p>I have been informed that Ghost Sec and Ghost Security are different entities. One apparently riding the fame of the other. The source is reliable and respected, so I trust it. The group split and skidz formed GhostSec. The story holds true as, initially, they didn&#8217;t seem to think XSS was an issue. According to press-releases, the original Ghost Security have beem known to use XSS and phishing techniques to hijack accounts. So, check out ghostsecuritygroup.com for comparison.</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Feedback</h3>



<p>The most frustrating thing is that cross site scripting attacks are the easiest to test for, most basic to protect against, indicative of weak security, and a risk on many levels. I&#8217;ve used similar techniques to circumvent world leading Web Application Firewalls, then helping to get patched, obviously.</p>



<p>I am genuinely curious as to why such basic exploits are still on such high priority websites. Could it be the budget is too small? Maybe the training isn&#8217;t good enough?</p>



<p>I&#8217;d really like to read comments from professionals and hackers alike, but hey, this is the internet &#8211; try to XSS my comment form if you must <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> </p>
<p>The post <a href="https://abeontech.com/security/mocking-military-hacking-hackers/">Mocking the Military; Hacking Hackers</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/security/mocking-military-hacking-hackers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">156</post-id>	</item>
		<item>
		<title>Scoot.co.uk XSS</title>
		<link>https://abeontech.com/security/scoot-sun-independent-xss/</link>
					<comments>https://abeontech.com/security/scoot-sun-independent-xss/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Fri, 17 Apr 2015 02:26:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[xss]]></category>
		<guid isPermaLink="false">https://abeontech.com/?p=1181</guid>

					<description><![CDATA[<p>Stored XSS in several nationwide UK newspapers. One XSS to rule them all.</p>
<p>The post <a href="https://abeontech.com/security/scoot-sun-independent-xss/">Scoot.co.uk XSS</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>I am an SEO engineer at heart. Always on the lookout for opportunities from which links and/or citations can be gleaned. Often, while looking for link placements, I find sites with security vulnerabilities. I always try to work with affected sites to help secure the attack vector with mixed results. More often than not the sites get patched and everyone is happy. Sometimes I get ignored. Sometimes I get a generic &#8220;we will fix it&#8221; reply but the exploit gets ignored. The site in question passes the information stored on its site onto several authoritative websites in the UK, some of which are the biggest news organisations we have…</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">XSS Is Bad</h2>



<p><strong>Cross-Site Scripting attacks</strong> (often abbreviated to <a href="https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29" target="_blank" rel="noreferrer noopener">XSS</a>) are bad. They use to be nothing more than annoying popups or adverts inserted into target websites. Technology has since moved on and now the same security flaw can lead to <a href="http://www.symantec.com/connect/blogs/getting-sassy-xss-part-3-port-scanning" target="_blank" rel="noreferrer noopener">colaborative resource management</a>, full data exfiltration, and more. JavaScript using a simple Java extension means hackers are limited by their imagination, nothing less! If a bad guy can inject arbitrary HTML, CSS, and JavaScript into your website they can embed a Java Applet and bypass all sorts of restrictions which would otherwise be in place.</p>



<p>A recent example of effective XSS leverage &#8220;in the wild&#8221; was Anonymous using a <a href="https://code.google.com/p/lowc/" target="_blank" rel="noreferrer noopener nofollow">JavaScript version of LOIC</a> to sucessfully Ddos government targets. Simply asking supporters to visit unrelated but infected sites conducted the attack. The end-user was still culpable but focus shifted from the initial, very small scale hack. <a href="https://abeontech.com/security/xss-attack-action/">XSS cookie stealers</a> are another popular method of implementing XSS as an attack vector and their use is increasing, due to the popularity of JavaScript.</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">XSS in Scoot.co.uk</h2>



<p>There are multiple vulnerabilities in dashboard.scoot.co.uk subdomain. Scoot then passes this easily exploited information onto many other website, some of which include the most popular UK news services. This data passes, unvalidated, through sites to which they offer an intergrated business directory.</p>



<p>Arbitrary code including HTML, CSS, JavaScript and Java is stored in the database without any validation.</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">What is the problem?</h2>



<p>The implementation is simple and lasting. The attack vector is classed as a &#8220;persistent XSS&#8221; or &#8220;stored XSS&#8221; exploit and is found in many input fields of the dashboard.scoot.co.uk subdodomain. The website contains many vulnerabilities but this article focuses on the stored XSS problem. The attack flow is simple: create a free business listing, add a gallery image, <em>insert your malicious code</em>, wait 2-3 minutes and it&#8217;s live.</p>



<p>An easy way to obfuscate the code is to use the second gallery image as the exploit will be hidden from initial view is present in the page source, being executed as a result.</p>



<p>The main culprit is an unvalidated title attribute for the gallery images. The input field allows arbitrary code to be inserted. Below is a proof of concept code:</p>



<pre class="wp-block-code"><code>"&gt;&lt;/a&gt;XSS HERE&lt;a title="</code></pre>



<p>For reporting purposes I used the following:</p>



<pre class="wp-block-code"><code>"&gt;&lt;/a&gt;&lt;img src=x onerror=prompt(/XSSPOSED/)&gt; &lt;a title="</code></pre>



<p>The image below shows the entry point.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1024" height="695" src="https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1.jpg" alt="" class="wp-image-1183" srcset="https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1.jpg 1024w, https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1-300x204.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1-768x521.jpg 768w, https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1-500x339.jpg 500w, https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1-800x543.jpg 800w, https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1-48x33.jpg 48w, https://abeontech.com/wp-content/uploads/2021/07/scoot-dashboard-xss-1024x695-1-600x407.jpg 600w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure></div>



<h2 class="is-style-squadforce-decorated wp-block-heading">Several Newspapers Hacked!</h2>



<p>Below are examples of the Scoot XSS vulnerability passing the insecure data onto&#8230;.</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="602" height="319" src="https://abeontech.com/wp-content/uploads/2021/07/the-sun-xss.jpg" alt="" class="wp-image-1184" srcset="https://abeontech.com/wp-content/uploads/2021/07/the-sun-xss.jpg 602w, https://abeontech.com/wp-content/uploads/2021/07/the-sun-xss-300x159.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/the-sun-xss-500x265.jpg 500w, https://abeontech.com/wp-content/uploads/2021/07/the-sun-xss-48x25.jpg 48w, https://abeontech.com/wp-content/uploads/2021/07/the-sun-xss-600x318.jpg 600w" sizes="auto, (max-width: 602px) 100vw, 602px" /><figcaption>The Sun</figcaption></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="601" height="318" src="https://abeontech.com/wp-content/uploads/2021/07/the-independant-xss.jpg" alt="" class="wp-image-1185" srcset="https://abeontech.com/wp-content/uploads/2021/07/the-independant-xss.jpg 601w, https://abeontech.com/wp-content/uploads/2021/07/the-independant-xss-300x159.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/the-independant-xss-500x265.jpg 500w, https://abeontech.com/wp-content/uploads/2021/07/the-independant-xss-48x25.jpg 48w" sizes="auto, (max-width: 601px) 100vw, 601px" /><figcaption><strong>The Independent</strong></figcaption></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="603" height="318" src="https://abeontech.com/wp-content/uploads/2021/07/touchlocal-xss.jpg" alt="" class="wp-image-1186" srcset="https://abeontech.com/wp-content/uploads/2021/07/touchlocal-xss.jpg 603w, https://abeontech.com/wp-content/uploads/2021/07/touchlocal-xss-300x158.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/touchlocal-xss-500x264.jpg 500w, https://abeontech.com/wp-content/uploads/2021/07/touchlocal-xss-48x25.jpg 48w, https://abeontech.com/wp-content/uploads/2021/07/touchlocal-xss-600x316.jpg 600w" sizes="auto, (max-width: 603px) 100vw, 603px" /><figcaption><strong>TouchLocal</strong></figcaption></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="601" height="316" src="https://abeontech.com/wp-content/uploads/2021/07/Scoot-XSS.jpg" alt="" class="wp-image-1187" srcset="https://abeontech.com/wp-content/uploads/2021/07/Scoot-XSS.jpg 601w, https://abeontech.com/wp-content/uploads/2021/07/Scoot-XSS-300x158.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/Scoot-XSS-500x263.jpg 500w, https://abeontech.com/wp-content/uploads/2021/07/Scoot-XSS-48x25.jpg 48w" sizes="auto, (max-width: 601px) 100vw, 601px" /><figcaption><strong>And Scoot themselves</strong></figcaption></figure></div>



<h2 class="is-style-squadforce-decorated wp-block-heading">The Fix using Responsible disclosure</h2>



<p><a href="https://web.archive.org/web/20150525074730/http://abeontech.com/security/xss-attack-action/#xss-protect">Preventing XSS</a> exploits is simple and can be done in one line of code. Using htmlentities with ENT_QUOTES to encode quotes and UTF-8 to convert text.</p>



<p>This was a stored XSS vulnerability on one site, which then passed the exploit on to several large UK newspaper websites. Getting it fixed was important to me!</p>



<p>I have emailed, called, and begged Scoot to fix this issue as I use thier services. Each time I was told &#8220;we will look into it&#8221;, or &#8220;it&#8217;s a feature&#8221; from confused sales staff. Several attempts to contact the relevant person about this situation have gone unresolved. It appears they care more about up-sales than security.</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">Disclosure Timeline</h2>



<ul class="wp-block-list"><li>14 December 2012. Initial email ignored.</li><li>01 June 2013. Confused but lengthy phone call. Ignored.</li><li>01 December 2014. Two phone calls ignored. Reply was &#8220;we will look into it&#8221;</li><li>17 April 2015. Final email to Scoot. Public disclosure.</li><li>19 April 2015. Reply from developer. Issue being worked on.</li><li>23 April. Fix implemented by developer. Bounty received. </li></ul>



<p></p>
<p>The post <a href="https://abeontech.com/security/scoot-sun-independent-xss/">Scoot.co.uk XSS</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/security/scoot-sun-independent-xss/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1181</post-id>	</item>
		<item>
		<title>How to: not get hacked</title>
		<link>https://abeontech.com/security/how-not-to-get-hacked/</link>
					<comments>https://abeontech.com/security/how-not-to-get-hacked/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Wed, 08 Apr 2015 10:48:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://wp.nkdev.info/squadforce/?p=159</guid>

					<description><![CDATA[<p>Most people don&#8217;t really care about security. We hope and believe our computers take care of security for us. Posting the latest Facebook update pretending to be our cat is...</p>
<p>The post <a href="https://abeontech.com/security/how-not-to-get-hacked/">How to: not get hacked</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Most people don&#8217;t really care about security. We hope and believe our computers take care of security for us. Posting the latest Facebook update pretending to be our cat is far more important. The cat and mouse game could work, if your computer was the cat. It&#8217;s not. The best we can do is play catch-up and hope the hackers take more time to develop an exploit than it takes to run an instantaneous, worldwide, fix. Of course, there is no such thing.</strong></p>



<p>I&#8217;ve played and worked with computers for around 17 years. Probably a lot longer if you count my terrible snake clone for the BBC Micro. My hobby developed into a career as the internet&#8230; exploded. I have at least looked at, if not tried to code in, the majority of major languages and systems. From C to Zend, Matlab to MySQL.</p>



<p>My esoteric hobby has had several advantages. My obsession with the least interesting parts of computing &#8211; the mundane code &#8211; has lead to some interesting discoveries. The ability to charge for my hobby being my favourite, learning how to infiltrate most websites on the internet being a close second. I am a devoted white hat developer but not everyone follows the same ethics. My first website was hacked to show nothing but a beheading video&#8230; When I was 13. Learning <a href="https://abeontech.com/security/">security </a>was an obvious step for me. I was obsessed with how people get hacked.</p>



<p>I will not deny that I&#8217;ve had some fun but it&#8217;s always been that. Virii intended for their original purpose &#8211; as a <a href="https://web.archive.org/web/20160311034729/http://priceonomics.com/who-invented-the-computer-virus/" target="_blank" rel="noreferrer noopener">practical joke</a> for friends. I have worked with hundreds of websites to close exploits which could have been used by people with malicious intent. I would rather get a few angrily defensive emails from developers than see terrorists use these same exploits to perpetuate their chosen brand of insanity.</p>



<p>Make sure your tinfoil hat is comfortable. This post will digress. I will go off on tangents. This is my rant. Feel free to call me out in the comments. Until then&#8230;</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="400" height="300" src="https://abeontech.com/wp-content/uploads/2021/07/read-cartmans-opinions.jpg" alt="" class="wp-image-1142" srcset="https://abeontech.com/wp-content/uploads/2021/07/read-cartmans-opinions.jpg 400w, https://abeontech.com/wp-content/uploads/2021/07/read-cartmans-opinions-300x225.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/read-cartmans-opinions-48x36.jpg 48w" sizes="auto, (max-width: 400px) 100vw, 400px" /></figure></div>



<h2 class="has-text-align-left is-style-squadforce-decorated wp-block-heading">Am I a target?</h2>



<p>A common misconception is that &#8220;my computer isn&#8217;t worth hacking&#8221;. This just isn&#8217;t true. Some of the many reasons people get hacked can include: resource abuse, data exfiltration, virus spreading, and last but by no means least… because they can. E-peen is fully extended with coders trying to develop a reputation in the hacking scene. The majority of websites and services are exploited simply because they can be. Often with a fitting excuse being created after the fact.</p>



<hr class="wp-block-separator"/>



<p>If your device is connected to the internet it will, at some point, be the target of an attack. Successful or not. Computers are constantly scanning the internet on the lookout for vulnerabilities. Finding exploitable websites is usually just a case of firing up your chosen scanner with a target domain, I.P. and/or I.P. range. Anyone with even basic knowledge of coding could attack hundreds of thousands of websites, computers and mobile devices using supposed &#8220;white hat&#8221; tools such as <a href="https://web.archive.org/web/20160311034729/http://sectools.org/tool/metasploit/" target="_blank" rel="noreferrer noopener">MetaSploit</a>, w3af, sqlmap, and BeEF. Most people don&#8217;t, but the few that do can be real dicks. The &#8220;internet of things&#8221; is close, but worrying.</p>



<p>So we&#8217;ve built the tension. The end is nigh. Hack all the things is no longer just a meme. What could I do if I wanted to become less of a target? Well, there are a few simple steps anyone can take that can greatly reduce the risk of becoming yet another hacking statistic.</p>



<h2 class="has-text-align-left is-style-squadforce-decorated wp-block-heading">Secure all the things!</h2>



<p>Top 5 lists are for losers. So this is a lenthy top 4 list. Because all hacks fit into 4 categories. Insult me in the comments if you disagree.</p>



<p>Avoiding the vast majority of exploits is actually pretty simple but, as it&#8217;s a change of habit, can take some prompting. Most of the tips below offer ways to help prevent you getting hacked, which shouldn&#8217;t be ignored. I believe it&#8217;s far easier to complete an update than it is to restore files corrupted by <a href="http://en.wikipedia.org/wiki/CryptoLocker" target="_blank" rel="noreferrer noopener">CryptoLocker</a> or something similar.</p>



<ul class="wp-block-list"><li><a href="https://web.archive.org/web/20160311034729/https://abeontech.com/security/how-not-to-get-hacked/#awareness">Awareness</a></li><li><a href="https://web.archive.org/web/20160311034729/https://abeontech.com/security/how-not-to-get-hacked/#updates">Updates</a></li><li><a href="https://web.archive.org/web/20160311034729/https://abeontech.com/security/how-not-to-get-hacked/#pass-man">Password management</a></li><li><a href="https://web.archive.org/web/20160311034729/https://abeontech.com/security/how-not-to-get-hacked/#res-abuse">Resource abuse</a> (Ddos, FXP, etc)</li></ul>



<h3 class="has-text-align-left is-style-squadforce-decorated wp-block-heading">Awareness</h3>



<p>The internet is inherently insecure. It is relativly easy to pretend to be anyone, send emails as another person or pretend to be another website. If you are not careful you could enter your Facebook details into a malicious website. The biggest step required to become less of a target for hackers is simple diligence.</p>



<p>Internet diligence really boils down to one thing: If you click links in emails or on social media, check the website you are visiting is the correct website by confirming the URL is as expected. An extremely long link or shortening services such as bit.ly could be used to cloak malicious data.</p>



<p>It sounds simple but is easy to overlook as the evolution of social media requires clicking on links from unknown sources. Just remember to check the site if it asks you for login details. Recently, <a href="https://web.archive.org/web/20160311034729/https://twitter.com/mradamdavies/status/562941506735312896" target="_blank" rel="noreferrer noopener">I was almost phished</a> by an advert in Google&#8217;s Adsense which used a cloaked URL&#8230; It happens to the best of us</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Updates</h3>



<p>The best way to mitigate exploitation is to simply keep your operating system and applications up-to-date. I know it can be time consuming and a bit of a pain, but it is the single best way to pro-actively prevent becoming a victim. Patches for most major software are released pretty quickly after disclosure and updating usually just means clicking a button.</p>



<p>A list of common updates should include:</p>



<ul class="wp-block-list"><li>Operating system updates (Windows, Mac, Linux, Mobile)</li><li>Server software updates (LAMP, CMSs, libraries)</li><li>System software (Flash, Java, FTP client, etc)</li></ul>



<p>It&#8217;s a short list but could include hundreds of updates. If you don&#8217;t use software, removal is recommended. Two good examples are Flash and Java. These two are among the most attacked and unused software on the internet. Many websites have abandoned Java due to the constant security issues and HTML5 has all but replaced Flash for most developers. Most modern software will update itself if set to. If it isn&#8217;t set to autoupdate, you should do it manually at least once a month.</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Password Management</h3>



<p>Having a unique password for every website is one of the best ways to prevent account hijacking. Your email password should be the most secure as it truly is the one ring to pwn them all. If someone can gain access to your email account they can easily hack any other associated account. I have recommended <a href="https://web.archive.org/web/20160311034729/https://lastpass.com/" target="_blank" rel="noreferrer noopener">LastPass</a> as a means of securely managing passwords for several years. It is free and <a href="https://web.archive.org/web/20160311034729/https://blog.lastpass.com/2010/07/lastpass-gets-green-light-from-security.html/" target="_blank" rel="noreferrer noopener">has been audited</a> several times with very little complaint from the security professionals I respect the most.</p>



<p>Which of the following two passwords is stronger, more secure, and more difficult to crack?</p>



<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="" data-enlighter-highlight="" data-enlighter-linenumbers="" data-enlighter-lineoffset="" data-enlighter-title="" data-enlighter-group="">D0g.....................
PrXyc.N(n4k77#L!eVdAfp9</pre>



<p>You may expect that this is a trick question and you&#8217;d be right. The first of the two passwords is actually stronger. Password cracking works on a binary basis &#8211; Is the password correct? Yes / No. So each character added will effectively double the entropy. Password entropy can be counter-intuitive with length being the main factor.</p>



<p>Interested in how passwords really work? I suggest you read Steve Gibson&#8217;s <a href="https://web.archive.org/web/20160311034729/https://www.grc.com/haystack.htm" target="_blank" rel="noreferrer noopener">Password Haystacks</a> if you are in to really techy stuff&#8230; It&#8217;s a great read!</p>



<p>The idea is simple: think of a long password that is easy to remember but contains upper and lower case characters with punctuation. Then simply remember how many dots, dollar signs or other symbol you have at the beginning or end for each site. Security through obscurity isn&#8217;t a recommended technique but it&#8217;s better than nothing!</p>



<p><em>Aside</em>: an easy way to check if a website is handling passwords properly is to reset it. If your password is sent to you, in an email or text, they probably aren&#8217;t hashing the data correctly and your password could be at risk. Any secure database handling of passwords will implement a one way hashing process to ensure the only person that can know your password is you.</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Resource Abuse (Ddos, FXP, etc)</h3>



<p>A hacked server or device can cause many issues. Resource abuse is usually the result of ignoring the above. Often an affect of using a default password, outdated software, or account compromise. For this reason I&#8217;m going to include a typical attack scenario from around 5 years ago. This is an offensive way by which folders can be created to obfuscate their true contents. Inspecting, editing, deleting such folders is difficult unless you know the attack vector. It is now a well known and secured vector making it essentially pointless (no copy/pasta here skidz).</p>



<p>FXP is a very little-known form of hacking. It refers to File Transfer Protocol. FXP, although almost dead, is analogous to many hacking techniques. It leverages exploits to distribute illegal material. Hackers target FTP servers (or websites to setup services such as FTP, Torrents, Usenet, etc) to store illegal warez. And even worse on hacked servers. FXP was incorporated into the wider spectrum of &#8220;collaborative resource management&#8221; around 5 years ago, but the logic remains true. If you can hack it some one will then find a reason to justify it after the fact.</p>



<p>Assumptions: we have found a public server in which we can create folders, upload, and download.</p>



<p>First we will create a folder called&#8230;</p>



<pre class="EnlighterJSRAW" data-enlighter-language="shell" data-enlighter-theme="" data-enlighter-highlight="" data-enlighter-linenumbers="" data-enlighter-lineoffset="" data-enlighter-title="" data-enlighter-group="">/.ÿÿcom1 ÿ%d ÿ  /</pre>



<p>This will tell us a lot about the server. The folder created could be shown a number of ways, depending on the server setup. ÿ is a Unix escape character so will try to execute the return command when encountered. This depends on setup. It essentially tells the server to return to the last folder, confusing both server and client as to the folder trying to be entered. %d is one of many command tokens which will try to force a text prompt in some clients/servers. This will usually disrupt further information gathering. There are several other techniques but you get the idea. Forgetting to filter one character can lead to a lot more than you may think. Sneaky people will stuff hacked publci servers with dodgy contents.</p>



<p>Below are variants of the ending folder name with a brief explanation:</p>



<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="" data-enlighter-highlight="" data-enlighter-linenumbers="" data-enlighter-lineoffset="" data-enlighter-title="" data-enlighter-group="">/.ÿÿcom1 ÿ%d ÿ  / &lt; Folder name as entered. Not vulnerable.
/.ÿÿcom1ÿ%dÿ/ &lt; Enter by clicking? Not vulnerable.
/com1%d  / &lt; ÿ obfuscates previous character. Vulnerable.
/.ÿÿcom1 ÿ ÿ  / &lt; Command token executed. Vulnerable.
/com1%d  / &lt; Path obfuscated. Vulnerable.
/.ÿcom1    / &lt; Command token executed and path obfuscated. Vulnerable.</pre>



<p>This may mean nothing to the average person. To a hacker it means they can distribute any file they choose with little chance it will get discovered. The combination of possible folder names is almost infinite which makes automated detection almost impossible. A single character can often lead to total security failure. Append-Apostrophe-Sec&#8230; I mean <a href="https://web.archive.org/web/20160311034729/http://en.wikipedia.org/wiki/LulzSec" rel="noreferrer noopener" target="_blank">LulzSec</a> used a simple apostrophe to &#8220;pwn&#8221; some of the biggest government agencies on the plant. Sabu was only caught because he accessed IRC using his real IP. He also ordered car parts to his home address. Not all hackers are that stupid.</p>



<h3 class="wp-block-heading">/ Rant</h3>



<p>I can understand why people don&#8217;t care about security, or getting hacked. I kind of bored myself writing this ~1800 word article.  Then and had to considerably reduce it. I can understand why companies don&#8217;t spend more on security. It seems pointless until you get hacked and have to recover every email ever sent to/from your company.</p>
<p>The post <a href="https://abeontech.com/security/how-not-to-get-hacked/">How to: not get hacked</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/security/how-not-to-get-hacked/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">159</post-id>	</item>
		<item>
		<title>Legacy blog posts</title>
		<link>https://abeontech.com/seo/legacy-blog-posts/</link>
					<comments>https://abeontech.com/seo/legacy-blog-posts/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Mon, 15 Sep 2014 03:54:00 +0000</pubDate>
				<category><![CDATA[SEO]]></category>
		<guid isPermaLink="false">https://abeontech.com/?p=1222</guid>

					<description><![CDATA[<p>I have written several articles for random websites over the years. This page lists a few of them I&#8217;ve done. There are a few I must be forgetting. RocketMill Below...</p>
<p>The post <a href="https://abeontech.com/seo/legacy-blog-posts/">Legacy blog posts</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>I have written several articles for random websites over the years. This page lists a few of them I&#8217;ve done.  There are a few I must be forgetting.</p>



<h3 class="is-style-squadforce-decorated wp-block-heading">RocketMill</h3>



<p>Below is a list of blog posts I authored during my time working at RocketMill. They tend to rename the author when som eone leaves. As a result, I have noted them here for posterity. I have only listed the ones that are worth reading. The company had some great content writers at the time. My contributions were not that big.</p>



<p><a href="https://web.archive.org/web/20130627233042/http://www.rocketmill.co.uk/so-your-wordpress-site-was-hacked">So, your WordPress site was hacked?</a></p>



<p><a href="https://web.archive.org/web/20130707112402/http://www.rocketmill.co.uk/bilderberg-2013-secret-private-technophiles">Bilderberg 2013: Secret/Private Technophiles</a></p>



<p><a href="https://web.archive.org/web/20130210030512/http://www.rocketmill.co.uk/ratings-in-google-listings">Ratings in Google listings</a></p>



<p><a href="https://web.archive.org/web/20130121023300/http://www.rocketmill.co.uk/getting-better-listings-in-google">Getting better listings in Google</a></p>



<p><a href="https://web.archive.org/web/20130508121353/http://www.rocketmill.co.uk/time-saving-seo-bookmarklets">Time saving SEO bookmarklets</a></p>



<p><a href="https://web.archive.org/web/20130115202127/http://www.rocketmill.co.uk/ppc-and-google-penalties">PPC and Google Penalties</a></p>



<p><a href="https://web.archive.org/web/20121031222113/http://www.rocketmill.co.uk/checking-keyword-position-with-php">Checking keyword position with PHP</a></p>



<p><a href="https://web.archive.org/web/20121115010739/http://www.rocketmill.co.uk/google-vs-semantic-code">Google vs non-semantic code</a></p>



<p><a href="https://web.archive.org/web/20130120144040/http://www.rocketmill.co.uk/retentive-backlinks">Confessions of a spammer</a></p>



<p><a href="https://web.archive.org/web/20130507141157/http://www.rocketmill.co.uk/hubsquat-duplicate-content">HubSquat – Duplicate content</a></p>



<p><a href="https://web.archive.org/web/20130202023637/http://www.rocketmill.co.uk/fixing-seoquake-pagerank-check">Fixing SEOQuake PageRank check</a></p>



<p><a href="https://web.archive.org/web/20130530155848/http://www.rocketmill.co.uk/php-twitter-feed-importer">PHP Twitter Feed Importer</a></p>



<p><a href="https://web.archive.org/web/20130210001112/http://www.rocketmill.co.uk/secure-php-form">Secure PHP form</a></p>



<p><a href="https://web.archive.org/web/20130509223048/http://www.rocketmill.co.uk/creating-a-captcha">Creating a captcha</a></p>



<h3 class="is-style-squadforce-decorated wp-block-heading">Dave&#8217;s Computer Tips </h3>



<p>Here are also a few articles I wrote for Dave&#8217;s Computer Tips. I had some spare time and was asked out of the blue, so I did a few articles before getting bored. This website has great articles to pretty much everything computer related. </p>



<figure class="wp-block-embed is-type-wp-embed is-provider-daves-computer-tips wp-block-embed-daves-computer-tips"><div class="wp-block-embed__wrapper">
<div class=""><blockquote class="wp-embedded-content" data-secret="0Yf19uDKxG"><a href="https://davescomputertips.com/windows-10-privacy-problems/">Windows 10 Privacy Problems</a></blockquote><iframe loading="lazy" class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;Windows 10 Privacy Problems&#8221; &#8212; Daves Computer Tips" src="https://davescomputertips.com/windows-10-privacy-problems/embed/#?secret=0Yf19uDKxG" data-secret="0Yf19uDKxG" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></div>
</div></figure>



<figure class="wp-block-embed is-type-wp-embed is-provider-daves-computer-tips wp-block-embed-daves-computer-tips"><div class="wp-block-embed__wrapper">
<div class=""><blockquote class="wp-embedded-content" data-secret="ZGVbdHkaKs"><a href="https://davescomputertips.com/dealing-with-data-breaches-have-you-been-pwned/">Dealing With Data Breaches &#8211; Have You Been PWNED</a></blockquote><iframe loading="lazy" class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;Dealing With Data Breaches &#8211; Have You Been PWNED&#8221; &#8212; Daves Computer Tips" src="https://davescomputertips.com/dealing-with-data-breaches-have-you-been-pwned/embed/#?secret=ZGVbdHkaKs" data-secret="ZGVbdHkaKs" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></div>
</div></figure>



<figure class="wp-block-embed is-type-wp-embed is-provider-daves-computer-tips wp-block-embed-daves-computer-tips"><div class="wp-block-embed__wrapper">
<div class=""><blockquote class="wp-embedded-content" data-secret="wvVBOM0QgA"><a href="https://davescomputertips.com/4-tips-to-avoid-getting-hacked/">4 Tips To Avoid Getting Hacked</a></blockquote><iframe loading="lazy" class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;4 Tips To Avoid Getting Hacked&#8221; &#8212; Daves Computer Tips" src="https://davescomputertips.com/4-tips-to-avoid-getting-hacked/embed/#?secret=wvVBOM0QgA" data-secret="wvVBOM0QgA" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></div>
</div></figure>



<figure class="wp-block-embed is-type-wp-embed is-provider-daves-computer-tips wp-block-embed-daves-computer-tips"><div class="wp-block-embed__wrapper">
<div class=""><blockquote class="wp-embedded-content" data-secret="z5ZY6F2MMQ"><a href="https://davescomputertips.com/kaspersky-gets-hacked/">Kaspersky Gets Hacked</a></blockquote><iframe loading="lazy" class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;Kaspersky Gets Hacked&#8221; &#8212; Daves Computer Tips" src="https://davescomputertips.com/kaspersky-gets-hacked/embed/#?secret=z5ZY6F2MMQ" data-secret="z5ZY6F2MMQ" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></div>
</div></figure>



<figure class="wp-block-embed is-type-wp-embed is-provider-daves-computer-tips wp-block-embed-daves-computer-tips"><div class="wp-block-embed__wrapper">
<div class=""><blockquote class="wp-embedded-content" data-secret="hzvkvbTWdh"><a href="https://davescomputertips.com/the-lastpass-breach-of-2015/">The LastPass Breach of 2015</a></blockquote><iframe loading="lazy" class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;The LastPass Breach of 2015&#8221; &#8212; Daves Computer Tips" src="https://davescomputertips.com/the-lastpass-breach-of-2015/embed/#?secret=hzvkvbTWdh" data-secret="hzvkvbTWdh" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></div>
</div></figure>
<p>The post <a href="https://abeontech.com/seo/legacy-blog-posts/">Legacy blog posts</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/seo/legacy-blog-posts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1222</post-id>	</item>
		<item>
		<title>AV Arcade FaceBook app</title>
		<link>https://abeontech.com/code/av-arcade-facebook-app/</link>
					<comments>https://abeontech.com/code/av-arcade-facebook-app/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Sat, 21 Apr 2012 03:16:00 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<guid isPermaLink="false">https://abeontech.com/?p=1200</guid>

					<description><![CDATA[<p>AV Arcade FaceBook app is a plugin to instantly turn your website into an arcade on Facebook.</p>
<p>The post <a href="https://abeontech.com/code/av-arcade-facebook-app/">AV Arcade FaceBook app</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A plugin created by Abeon Tech for AV Arcade which allows easy creation of an arcade on FaceBook. Version 2.0 has just been updated to fix a few bugs and several new features have been added.</p>



<p>Take advantage of the 500 million members using facebook! Turn your arcade into a FaceBook application in minutes. Your FaceBook application will update it’s self as you add games to your arcade. Easy to setup and admin panel for options.</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">Features</h2>



<ul class="wp-block-list"><li>Instant and automated FaceBook application with admin panel</li><li>Compatible with AVArcade Pro (v5) and AV Arcade Free (v4)</li><li>Autopost when playing a game (customizable)</li><li>Fullscreen button if game is too wide</li><li>Pagination and sorting</li><li>Track game plays on facebook</li><li>Comments on game page</li><li>Intergrated forum</li><li>Like button on every page</li><li>Tag Cloud</li><li>Search feature</li><li>FaceBook Adverts</li><li>Updated to be &lt;= v5.3.x compatible&#8230; The way it was meant to be.</li></ul>



<h2 class="is-style-squadforce-decorated wp-block-heading">Screenshots</h2>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="373" height="250" src="https://abeontech.com/wp-content/uploads/2021/07/admin-settings-373x250-2.jpg" alt="" class="wp-image-1206" srcset="https://abeontech.com/wp-content/uploads/2021/07/admin-settings-373x250-2.jpg 373w, https://abeontech.com/wp-content/uploads/2021/07/admin-settings-373x250-2-300x201.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/admin-settings-373x250-2-48x32.jpg 48w" sizes="auto, (max-width: 373px) 100vw, 373px" /></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="373" height="250" src="https://abeontech.com/wp-content/uploads/2021/07/cat-page-373x250-1.jpg" alt="" class="wp-image-1203" srcset="https://abeontech.com/wp-content/uploads/2021/07/cat-page-373x250-1.jpg 373w, https://abeontech.com/wp-content/uploads/2021/07/cat-page-373x250-1-300x201.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/cat-page-373x250-1-48x32.jpg 48w" sizes="auto, (max-width: 373px) 100vw, 373px" /></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="373" height="250" src="https://abeontech.com/wp-content/uploads/2021/07/game-page-373x250-1.jpg" alt="" class="wp-image-1204" srcset="https://abeontech.com/wp-content/uploads/2021/07/game-page-373x250-1.jpg 373w, https://abeontech.com/wp-content/uploads/2021/07/game-page-373x250-1-300x201.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/game-page-373x250-1-48x32.jpg 48w" sizes="auto, (max-width: 373px) 100vw, 373px" /></figure></div>



<h2 class="is-style-squadforce-decorated wp-block-heading">Purchase</h2>



<p>This mod is no longer available. Sorry. I am available for custom code projects.</p>
<p>The post <a href="https://abeontech.com/code/av-arcade-facebook-app/">AV Arcade FaceBook app</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/code/av-arcade-facebook-app/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1200</post-id>	</item>
		<item>
		<title>AV Arcade v402 (Clean)</title>
		<link>https://abeontech.com/code/av-arcade-v402-clean/</link>
					<comments>https://abeontech.com/code/av-arcade-v402-clean/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Wed, 04 Jan 2012 04:25:00 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[mod]]></category>
		<category><![CDATA[php]]></category>
		<guid isPermaLink="false">https://abeontech.com/?p=1208</guid>

					<description><![CDATA[<p>I have been using AV Arcade for a while now and think it’s a great script. I have spent a lot of time looking through the source code and have...</p>
<p>The post <a href="https://abeontech.com/code/av-arcade-v402-clean/">AV Arcade v402 (Clean)</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>I have been using AV Arcade for a while now and think it’s a great script. I have spent a lot of time looking through the source code and have have some success with my arcade site. There are a few small issues with the script which don’t detract from the usability, but could reduce crawlability, SERPs and so on.</p>



<p><a href="https://www.avscripts.net/avarcade" target="_blank" rel="noreferrer noopener">AV Arcade</a> v4.0.2 [Unofficial] is my contribution to the great free arcade script.</p>



<p><br>I have removed and updated any redundant code.<br>The whole script has been made totally w3c compliant, in the hope of making search engine indexing and updating easier.<br>I&#8217;ve implemented various small SEO changes to various pages.</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">What&#8217;s the difference?</h2>



<p>Most of the changes I made were small. It will, hopefully, make creating modules and templates a little easier too. I havn’t changed the functionality of the script at all, but hope to have cleaned it up and added a few small tweaks. When I first installed the script, well version 4, I checked it for validation errors&#8230;</p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="373" height="108" src="https://abeontech.com/wp-content/uploads/2021/07/avarcade-pre-w3c-clean-373x108-1.jpg" alt="av arcade css errors" class="wp-image-1209" srcset="https://abeontech.com/wp-content/uploads/2021/07/avarcade-pre-w3c-clean-373x108-1.jpg 373w, https://abeontech.com/wp-content/uploads/2021/07/avarcade-pre-w3c-clean-373x108-1-300x87.jpg 300w, https://abeontech.com/wp-content/uploads/2021/07/avarcade-pre-w3c-clean-373x108-1-48x14.jpg 48w" sizes="auto, (max-width: 373px) 100vw, 373px" /><figcaption><strong>[ Before ]</strong></figcaption></figure></div>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="373" height="90" src="https://abeontech.com/wp-content/uploads/2021/07/av-arcade-post-w3c-clean-373x90-1.gif" alt="av arcade css errors fixed" class="wp-image-1210"/><figcaption><strong>[ After ]</strong></figcaption></figure></div>



<p>Most of these were minor and all were easily fixed, but should hopefully help Google index new sites and content faster.</p>



<h2 class="is-style-squadforce-decorated wp-block-heading">What&#8217;s newin AV Arcade (Clean)?</h2>



<p>I have included as many bugfixes on the AV Arcade Forums as I could find.<br>Also added, edited or created are the following changes:</p>



<ul class="wp-block-list"><li>Fully XHTML v1.0 Strict Valid</li><li>CSS Level 2.1 Valid (See below)</li><li>Bugfixes</li><li>9 Languages</li><li>Arabic</li><li>Chineese Simplified</li><li>Dutch</li><li>Spanish</li><li>Finnish</li><li>French</li><li>German</li><li>Italian</li><li>Portuguese</li><li>New template &#8211; AV Elf</li><li>5 Banners + .psd</li><li>XHTML 1.0 Strict Valid</li><li>Adsense Optimized</li><li>Sitemap page</li><li>Bookmark Module</li><li>Tested with 3 Browsers</li><li>Internet Explorer v7.0.57</li><li>FireFox v3.0.4</li><li>Opera v9.62</li></ul>



<h2 class="is-style-squadforce-decorated wp-block-heading">Notes</h2>



<p>Please remember to backup all files before making any changes!<br>No SQL was harmed during the making of this update <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f61b.png" alt="😛" class="wp-smiley" style="height: 1em; max-height: 1em;" /> (No need to update or change the database)</p>



<p>CSS is only valid with Featured games disabled, so the button is hidden if the option is on (For the delta template)<br>AVElf won’t work with Featured games disabled without modification.</p>



<p>Use the AVElf Template, you need to follow the steps below:</p>



<ul class="wp-block-list"><li>Login and go to the Admin / Settings page</li><li>Turn OFF Featured Games</li><li>Select AVElf from the Templates on the left hand side</li><li>Upload the contents of the “# Replace” folder into your main site</li><li>Choose your banner image and upload to the images folder (Renaming to banner_image.jpg).</li></ul>



<p>Switch back to the Delta Template:</p>



<ul class="wp-block-list"><li>Login and go to the Admin / Settings page</li><li>Select delta from the Templates on the left hand side</li><li>Upload the contents of the “# Replace” (in the delta template) folder into your main site</li></ul>



<h2 class="is-style-squadforce-decorated wp-block-heading">Download</h2>



<p>This download is no longer available. I&#8217;ll keep this post live for archival purposes. </p>
<p>The post <a href="https://abeontech.com/code/av-arcade-v402-clean/">AV Arcade v402 (Clean)</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/code/av-arcade-v402-clean/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1208</post-id>	</item>
		<item>
		<title>WebWoW In-game mail hack</title>
		<link>https://abeontech.com/code/webwow-game-mail-hack/</link>
					<comments>https://abeontech.com/code/webwow-game-mail-hack/#respond</comments>
		
		<dc:creator><![CDATA[mradamdavies]]></dc:creator>
		<pubDate>Wed, 19 Jan 2011 04:02:00 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[mod]]></category>
		<category><![CDATA[php]]></category>
		<guid isPermaLink="false">https://abeontech.com/?p=1197</guid>

					<description><![CDATA[<p>This little mod will replace WebWoW&#8217;s in built RA mail system (Remote Access, which uses telnet). It will change it to a fully SOAP compatible version. This will replace both...</p>
<p>The post <a href="https://abeontech.com/code/webwow-game-mail-hack/">WebWoW In-game mail hack</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>This little mod will replace WebWoW&#8217;s in built RA mail system (Remote Access, which uses telnet). It will change it to a fully SOAP compatible version. This will replace both the admins &#8220;send mail&#8221; and users &#8220;vote shop&#8221; features. I created this little hack so the WebWoW In-game mail would use SOAP as it just seems more logical (and more easily secured!).</p>



<p>Having recently switched back to version 3.6.3 of the WebWoW CMS (using the web creator v1), I tried to sort out a few issues with the default setup. The latest version just doesn&#8217;t seem ready yet. I had problems sending in-game mail with the older version of WebWoW. I&#8217;d disabled Remote Access in MangOS as the port being opened didn&#8217;t seem necessary.</p>



<p>Didn&#8217;t like the way telnet was forced instead of a web interface, so I replaced the telnet mail system.</p>



<p>The only error I saw was &#8220;Remote Login Problem:&#8221;, apparently caused by incorrect settings. I knew the problem was remote access so I patched the system to use SOAP.</p>



<p>I have edited the mail system in WebWoW so it can be used to send anything including money, items, support tickets, postcards, and more. So getting it working was top of my list of things to do!</p>



<p>Below is how to get it working:</p>



<ul class="wp-block-list"><li>Enable SOAP in your mangosd.conf file</li><li>Open: includes/core/mangos_sendmail.php</li><li>Replace the sendmail function, below:</li></ul>



<pre class="EnlighterJSRAW" data-enlighter-language="php" data-enlighter-theme="" data-enlighter-highlight="" data-enlighter-linenumbers="" data-enlighter-lineoffset="" data-enlighter-title="" data-enlighter-group="">function sendmail($playername,$playerguid, $subject, $text, $item, $shopid=0,  $money=0, $realmid='1') //returns, IMPORTANT: do not remove &lt;!-- success --> if success
{
    global $server,$ra_user,$ra_pass,$db,$a_user,$se_c,$realm;
    $playername = clean_string($playername);
    $subject = preg_replace( "/[^A-Za-z0-9]/", "", clean_string($subject)); //no whitespaces
    $item = preg_replace( "/[^0-9]/", "", $item); //item id
    $realmid = preg_replace( "/[^0-9]/", "", $realmid); //item id
    if ($item&lt;>'') $item = " ".$item;
    $text = clean_string($text);
    $money= preg_replace( "/[^0-9]/", "", $money);
    
    $telnet = fsockopen($server, $realm[$realmid]['port_ra'], $error, $error_str, 3);
    if($telnet)
    {
        fgets($telnet,1024); // Motd
        fputs($telnet, $ra_user."\n");
        
        sleep(3);
        
        //fgets($telnet,1024); // PASS
        fputs($telnet, $ra_pass."\n");
        
        sleep(3);
        
        $remote_login = fgets($telnet,1024);
        if(strstr($remote_login, "Logged in."))
        {
            if ($item&lt;>'' &amp;&amp; $item&lt;>'0')//send item
            {
                //sendmail to RA console
                fputs($telnet, ".send items ".$playername." \"".$subject."\" \"".$text."\"".$item."\n");
                $easf=time();
                $mailtext="Mail with item sent! No money was sent.";
            }
            elseif ($money>'0' &amp;&amp; $money&lt;>'')//send money
            {
                fputs($telnet, ".send money ".$playername." \"".$subject."\" \"".$text."\" ".$money."\n");
                $moneytext="Mail with money sent! No item was sent.";
            }
            else //send letter
            {
                fputs($telnet, ".send mail ".$playername." \"".$subject."\" \"".$text."\"\n");
                $moneytext="Normal Mail sent!";
            }
            //check database if actuall item is there
            //WebsiteVoteShopREFXXXXXXX ->this is unique
            $check=$db->query("SELECT * FROM mail WHERE receiver = '".$playerguid."' AND subject ='".$subject."' LIMIT 1")or die(mysql_error());
            if(mysql_num_rows($check)=='0')
                $status="Recheck script (just to make sure mail is actually sent):&lt;br>&lt;br>&lt;center>&lt;iframe style='width:96%;  height:100px' src='./include/core/mangos_iframe_mailcheck.php?shopid=".$shopid."&amp;reciver=".$playerguid."&amp;subject=".$subject."&amp;realmid=".$realmid."&amp;shash=".sha1($a_user['id'].$playerguid.$subject.$se_c.$shopid)."'>&lt;a href='./include/core/mangos_iframe_mailcheck.php?shopid=".$shopid."&amp;reciver=".$playerguid."&amp;subject=".$subject."&amp;realmid=".$realmid."&amp;shash=".sha1($a_user['id'].$playerguid.$subject.$se_c.$shopid)."'>Check here if your mail is here.&lt;/a>&lt;/iframe>&lt;/center>";
                
            return  "&lt;!-- success -->&lt;span class=\"colorgood\">".$mailtext.$moneytext."&lt;br>&lt;/span>&lt;br>".$status;
        }
        else
            return  "&lt;span class=\"colorbad\">Remote Login Problem: ".$remote_login."&lt;/span>&lt;br>Used login: ".$ra_user;
        
        
        fclose($telnet);
    }
    else
        return  "&lt;span class=\"colorbad\">MaNGOS server is offline, you must do this when server is online.&lt;/span>";
}</pre>



<p>With the following function:</p>



<pre class="EnlighterJSRAW" data-enlighter-language="php" data-enlighter-theme="" data-enlighter-highlight="" data-enlighter-linenumbers="" data-enlighter-lineoffset="" data-enlighter-title="" data-enlighter-group="">function sendmail($playername,$playerguid, $subject, $text, $item, $shopid=0,  $money=0, $realmid='1') //returns, IMPORTANT: do not remove &lt;!-- success --> if success
{
 global $server,$ra_user,$ra_pass,$db,$a_user,$se_c,$realm;
   $playername = clean_string($playername);
   $subject = preg_replace( "/[^A-Za-z0-9]/", "", clean_string($subject)); //no whitespaces
   $item = preg_replace( "/[^0-9]/", "", $item); //item id
   $realmid = preg_replace( "/[^0-9]/", "", $realmid); //item id
 if ($item&lt;>'') $item = " ".$item;
   $text = clean_string($text);
   $money = preg_replace( "/[^0-9]/", "", $money);
 
   $username = 'GMNAME';
   $password = 'GMPASS';
   $host = "localhost";
   $soapport = 7878;

if ($item&lt;>'' &amp;&amp; $item&lt;>'0') //send item
 {
  $command = 'send items '.$playername.' "'.$subject.'" "'.$text.'" '.$item.'';
  $moneytext = "&lt;strong>Your reward has been sent.&lt;/strong> Please check your mailbox in game!";
  
  $client = new SoapClient(NULL,
  array(
   "location" => "http://$host:$soapport/",
   "uri" => "urn:MaNGOS",
   "style" => SOAP_RPC,
   'login' => $username,
   'password' => $password
  ));
  
  try {
   $result = $client->executeCommand(new SoapParam($command, "command"));
   return  "&lt;!-- success -->&lt;span class=\"colorgood\">".$mailtext.$moneytext."&lt;br />&lt;/span>&lt;br />".$status;
  }
  catch (Exception $e) 
  {
   echo "Command failed! Reason:&lt;br />\n";
   echo $e->getMessage();
  }

}
 
elseif ($money>'0' &amp;&amp; $money&lt;>'')//send money
 {
  $command = 'send money '.$playername.' "'.$subject.'" "'.$text.'" '.$money.'';
  $client = new SoapClient(NULL,
  array(
   "location" => "http://$host:$soapport/",
   "uri" => "urn:MaNGOS",
   "style" => SOAP_RPC,
   'login' => $username,
   'password' => $password
  ));
  
  try {
   $result = $client->executeCommand(new SoapParam($command, "command"));
   $moneytext = "&lt;strong>Your money has been sent.&lt;/strong> Please check your mailbox in game!";
  }
  catch (Exception $e) {
   $moneytext = "Failed to send any money. &lt;br />Please contact support!";
  }
}

else //send mail
 {
  $command = 'send mail '.$playername.' "'.$subject.'" "'.$text.'"';
  $client = new SoapClient(NULL,
  array(
   "location" => "http://$host:$soapport/",
   "uri" => "urn:MaNGOS",
   "style" => SOAP_RPC,
   'login' => $username,
   'password' => $password
  ));
  
  try {
   $result = $client->executeCommand(new SoapParam($command, "command"));
   $moneytext = "&lt;strong>Your mail was sent.&lt;/strong> Please check your mailbox in game!";
  }
  catch (Exception $e) {
   $moneytext = "Failed to send your mail. &lt;br />Please contact support!";
  }
}

   $check=$db->query("SELECT * FROM mail WHERE receiver = '".$playerguid."' AND subject ='".$subject."' LIMIT 1")or die(mysql_error());
   if(mysql_num_rows($check)=='0') {
    $status="Rechecking, just to make sure mail is actually sent:&lt;br>&lt;br>&lt;center>&lt;iframe style='width:96%;  height:100px' src='./include/core/mangos_iframe_mailcheck.php?shopid=".$shopid."&amp;reciver=".$playerguid."&amp;subject=".$subject."&amp;realmid=".$realmid."&amp;shash=".sha1($a_user['id'].$playerguid.$subject.$se_c.$shopid)."'>&lt;a href='./include/core/mangos_iframe_mailcheck.php?shopid=".$shopid."&amp;reciver=".$playerguid."&amp;subject=".$subject."&amp;realmid=".$realmid."&amp;shash=".sha1($a_user['id'].$playerguid.$subject.$se_c.$shopid)."'>Check here if your mail is here.&lt;/a>&lt;/iframe>&lt;/center>";
    
   return  "&lt;!-- success -->&lt;span class=\"colorgood\">".$mailtext.$moneytext."&lt;br>&lt;/span>&lt;br>".$status;
  }
  else
   return  "&lt;span class=\"colorbad\">Mail Problem: ".$remote_login."&lt;/span>&lt;br>Used login: ".$ra_user;
}</pre>



<p>Change the username, password, host, and port (in the code above):</p>



<pre class="EnlighterJSRAW" data-enlighter-language="php" data-enlighter-theme="" data-enlighter-highlight="" data-enlighter-linenumbers="" data-enlighter-lineoffset="" data-enlighter-title="" data-enlighter-group="">$username = 'GMNAME';
$password = 'GMPASS';
$host = "localhost";
$soapport = 7878;</pre>



<p>To a relevant account with admin access and you’re all set. This modification will allow you to use SOAP instead of the default RA (Remote Access) and should work exactly the same.</p>
<p>The post <a href="https://abeontech.com/code/webwow-game-mail-hack/">WebWoW In-game mail hack</a> appeared first on <a href="https://abeontech.com">Abeon Tech</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://abeontech.com/code/webwow-game-mail-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1197</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Minified using Disk
Database Caching 143/178 queries in 0.053 seconds using Disk (Request-wide modification query)

Served from: abeontech.com @ 2026-05-05 06:27:53 by W3 Total Cache
-->