As part of my ‘day job’ I happen to admin the better part of a dozen or more servers that run varying traffic levels from under a mbit to the monster cluster which does about 60mbit for a single domain alone (it runs multiple domains, just that that one is a monster)…
We are going to pimp out everything, so you should expect faster and better forums and tickets system.
EDIT: Everything is back to normal now! We apologize for such a long downtime, all the open issues and e-mails will be answered shortly. Thank you for your patience.
DIM is pretty simple to understand, but a bit complex on the execution. Here is a quick diagram to explain how it works:
In the following days we are going to cover every single step of this technique, and for those without background experience we are also going to show what tools you need to execute this.
This will be a case study too, so you will be able to see live examples of it – Some of them with a big, steady monthly income.
Disclaimer: This post was written to raise awareness about the importance of protecting your sites against this kind of attacks. Even though all the technical stuff (including the XSS!) is real, the actual story of what we supposedly did is not — We just wanted to spice things up a bit. Keep in mind that Digg is one of the most visited sites in the world and they must have a whole team of experts dedicated to protect themselves to this kind of stuff, don’t they?
Almost a year and a half ago we learned about an undisclosed XSS hole in Digg.com thanks to Beni. He is an outstanding security researcher and author of pretty sick stuff like this Digg, Delicious, Netscape and Technorati XSS Worm.
The actual XSS hole is this:
Removed after a long talk with my crew because there is the *possibility* that the XSS vector could be used as an SQL Injection too.
For those who aren’t tech savvy enough, we are going to try to explain everything so you can get a grasp about the importance of this kind of holes.
XSS is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other user. This type of vulnerabilities are useful to overcome the same origin policy that is implemented in all modern browsers. In a nutshell, this policy permits scripts running on pages originating from the same site to access the content with no specific restrictions — but prevents access to the content across pages on different sites.
For example, if we access http://asd.com and a script is executed, that script will be able to access f http://asd.com/*.html. However, it won’t be able to read anything located at http://jkl.com or even at http://subdomain.asd.com.
Now let’s examine Digg’s architecture, starting with their voting button:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
The code above will generate a button similar to this one:
In order to prevent a CSRF attack to autovote stories, Digg implemented the digcheck value. If you are a mean webmaster and you want to autovote your story from your visitors accounts without their knowledge, you would need to obtain the digcheck value and the Digg cookie of each visitor. There are various ways of obtaining those two bits of information, but in this case we are going to use the XSS vulnerability.
The best way of learning is doing-it-yourself, so open up the Firebug console while browsing Digg (make sure you are logged in) and execute the following script:
1 2 3 4
c = document.cookie; l = 'loginn'; u = c.substr(c.indexOf(l)+10,c.indexOf(';',c.indexOf(l))-c.indexOf(l)-10); alert(u);
You will see your username in an alert box since you are running the script inside Digg.com. You can achieve the same effect using the XSS, or you could use it to do something more interesting like autovoting.
Our “setup” for autovoting can be explained with this diagram:
The exploit is pretty straight forward, and it consists of two files. The first file sends a POST request to the vulnerable page to inject a script:
1 2 3 4 5 6 7 8 9 10 11
The second file is the actual script that autovotes the post in the “money” site:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
Of course we couldn’t leave it like this, so we took things down a step further and we implemented a lot of more goodies. One of them was this neat css history hack thingy, to check if the visitor actually came from Digg. Another thing we implemented, the cherry on the pie, is this:
We had a mother fucker robot that informed us anytime someone Digged one of our stories. Yes, a freakin’ XSS exploit communicating with us via tweets.
We rule so bad.
The best damn content generator in the world has just been updated. Get the details at http://getyacg.com/yacg-3-9.
Double the goodness, half the file size. Still open source and free!