Discover Habbo's history
Treat yourself with a Secret Santa gift.... of a random Wiki page for you to start exploring Habbo's history!
Happy holidays!
Celebrate with us at Habbox on the hotel, on our Forum and right here!
Join Habbox!
One of us! One of us! Click here to see the roles you could take as part of the Habbox community!


Page 3 of 3 FirstFirst 123
Results 21 to 23 of 23
  1. #21
    Join Date
    May 2006
    Location
    Hull
    Posts
    7,701
    Tokens
    2,430
    Habbo
    Moh

    Latest Awards:

    Default

    Quote Originally Posted by greggy23 View Post
    Mod can close this,
    I got new panel !
    What panel you using?

  2. #22
    Join Date
    Jan 2007
    Location
    Canada eh?
    Posts
    766
    Tokens
    75

    Default

    Quote Originally Posted by DriftPanzy View Post
    Ever heard of session stealing? They publish the users password via a SESSION its like putting it on a file on your server and calling it index.html looooooool
    Well I was about to start a big long rant about this until I saw these two posts below - just take a look at them, and yes the session that is being set contains the hashed password (I'm not stupid).

    Quote Originally Posted by NintendoNews View Post
    Drift, I think you're wrong about sessions being that easy to steal. The only reason that you could steal sessions from the Habbo site was that it had a vulnerability due to an XSS (Cross Site Scripting) issue. In general, you can't steal sessions, unless there is a browser exploit or some bad coding somewhere.

    I recall that the problem with the Habbo website was that some input was loaded through a URL (GET) parameter and it wasn't filtered so things could be done. If you're interested in find out more, I suggets you read http://en.wikipedia.org/wiki/Session_hijacking and http://en.wikipedia.org/wiki/Cross-site_scripting.
    Quote Originally Posted by Dentafrice View Post
    Sessions are on the remote server, and can't be edited, there is nothing wrong with that piece of code.

    As long as the password is a hash, and not plaintext, setting it for a session is alright, not the best practice in the world, but no harm done.

    With Habbo, they were getting the user's session ID, setting it as their own, then it would recognize you.. as them..
    Okay, now get ready for the [poop] to hit the fan....

    Quote Originally Posted by DriftPanzy View Post
    if($_SESSION['rp_logged'] == "TRUE") {
    >> $username = $_SESSION['rp_username']; <<
    $passwrd = $_SESSION['rp_passwrd'];
    $rank = $_SESSION['rp_rank'];
    $check = mysql_query("SELECT username, passwrd FROM rp_users WHERE username = ' >>> $username <<<'")or die(mysql_error());

    I do I'm sorry if you don't I've had this problem in the past.
    In order for this to be a flaw, the user would have to create a session called "rp_username" that contained the malicious code. Problem here is that sessions are all server side therefore the user has no real control over them.

    So, on a closing note, if you have the latest security updates to the panel then there is absolutely nothing [that I know of or that anyone has told me of] that would make the panel vulnerable to be hacked three different times.

  3. #23

    Default

    Quote Originally Posted by Jack120 View Post
    What panel you using?
    Using Kristall

Page 3 of 3 FirstFirst 123

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •