TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How I Hacked Facebook and Found Someone's Backdoor Script

865 pointsby phwdabout 9 years ago

21 comments

reginaldoabout 9 years ago
This is Reginaldo from the Facebook Security team. We're really glad Orange reported this to us. On this case, the software we were using is third party. As we don't have full control of it, we ran it isolated from the systems that host the data people share on Facebook. We do this precisely to have better security, as chromakode mentioned. After incident response, we determined that the activity Orange detected was in fact from another researcher who participates in our bounty program. Neither of them were able to compromise other parts of our infra-structure so, the way we see it, it's a double win: two competent researchers assessed the system, one of them reported what he found to us and got a good bounty, none of them were able to escalate access.
评论 #11545308 未加载
评论 #11544150 未加载
评论 #11545315 未加载
评论 #11548648 未加载
评论 #11546348 未加载
评论 #11609879 未加载
评论 #11570168 未加载
评论 #11581707 未加载
评论 #11544268 未加载
chatmastaabout 9 years ago
It&#x27;s buried in the bottom of the post, but I&#x27;m happy to see that Facebook paid a bug bounty of $10,000 for this. In the past we&#x27;ve seen Facebook refuse to pay bug bounties when the hacker goes beyond scope. Interesting that going beyond the usually scope of bug bounties actually discovered a latent exploit and <i>helped</i> Facebook. Maybe this will result in change of policies for bounty scope.
dopameanabout 9 years ago
I&#x27;m not sure I understand some of the comments here claiming that 10k is not enough money for this. It clearly is enough money because Orange found the problem and reported it.<p>These arguments always remind me of people claiming that certain professions are not paid enough. They forget that there is a market for labor and in this case the labor is finding vulnerabilities. People will either be willing to work for the posted price or not. In the case of pen testing facebook I&#x27;d be willing to bet there are plenty of people out there looking for bugs who aren&#x27;t even really concerned with what the final payout is going to be.<p>Yeah, they could have gotten completely owned if he didn&#x27;t report this. But to him reporting it and getting 10k in compensation was sufficient. Why would facebook pay him a million if he was willing to take 10k?
评论 #11545659 未加载
评论 #11544582 未加载
评论 #11544543 未加载
评论 #11544234 未加载
评论 #11545675 未加载
volkkabout 9 years ago
I really think 10,000 for serious exploits like these is just not enough money. Even if OP only spent an hour or two on finding this out (although highly unlikely), they should pay based on seriousness&#x2F;potential damage of the bug. Great writeup though. Super interesting stuff.
评论 #11543588 未加载
评论 #11543551 未加载
评论 #11543593 未加载
sveissabout 9 years ago
This isn&#x27;t the first time files.fb.com has been publicly reported as having been breached: <a href="http:&#x2F;&#x2F;www.nirgoldshlager.com&#x2F;2013&#x2F;01&#x2F;how-i-hacked-facebook-employees-secure.html" rel="nofollow">http:&#x2F;&#x2F;www.nirgoldshlager.com&#x2F;2013&#x2F;01&#x2F;how-i-hacked-facebook-...</a> .
nickpsecurityabout 9 years ago
Nice write up. Of course, this would be the team member whose photo is merely an Orange. Paranoid security people haha...<p>Part that jumped out at me, aside from obvious goodies, was this:<p>&quot;FTA is a product which enables secure file transfer, online file sharing and syncing, as well as integration with Single Sign-on mechanisms including AD, LDAP and Kerberos&quot;<p>...followed by...<p>&quot;...web-based user interfaces were mainly composted of Perl &amp; PHP... PHP source codes were encrypted by IonCube... lots of Perl Daemons in the background&quot;<p>Wow. That inspires a lot of confidence in the &quot;secure&quot; product. I&#x27;d have doubted Facebook relied on such a system had I not known they built their empire on PHP. We all know its reputation. Their &quot;secure, file-transfer appliance&quot; fits right in.
6stringmercabout 9 years ago
Article is exactly as headline advertised, and a well-laid out write-up. Neat to come across it.
TheGuyWhoCodesabout 9 years ago
Nice work, very detailed. However this is hack of Accellion’s Secure File Transfer. How should Facebook, or anyone for that matter, protect themselves in these cases? I mean other then some obvious ones like not running as root, limiting file access, limiting network access to other servers...
评论 #11543101 未加载
gillm4about 9 years ago
I know nothing about pen testing, but this was very interesting and easy to follow regardless. Thanks so much for sharing!
Techbrunchabout 9 years ago
This is the same researcher that found a RCE in Uber: <a href="https:&#x2F;&#x2F;hackerone.com&#x2F;reports&#x2F;125980" rel="nofollow">https:&#x2F;&#x2F;hackerone.com&#x2F;reports&#x2F;125980</a><p>Shameless plug but if you like that kind of articles I suggest signing to my newsletter: <a href="http:&#x2F;&#x2F;bugbountyweekly.com" rel="nofollow">http:&#x2F;&#x2F;bugbountyweekly.com</a>. A free, once–weekly e-mail round-up of news and articles about Bug Bounty.
coldcodeabout 9 years ago
Fascinating. Looking for a hackable system and finding someone beat you to it.
评论 #11543603 未加载
morleyabout 9 years ago
This is a great write-up. I know little about pen testing, yet I was able to follow along easily.
utefan001about 9 years ago
Seems like two factor authentication here would have helped.
评论 #11543896 未加载
libberabout 9 years ago
If there is someone to be upset with in this situation its accellion the vendor who backs files.fb.com.<p>Looking at how egregious their security mistakes are they dont appear to take security seriously.<p>This is the same company that (last I was down there) had a billboard on 101 that says &quot;Secure&quot;.<p>Many echos of oracles &quot;unbreakable&quot; ad campaign while being an aggressively bad at security company
frostymarvelousabout 9 years ago
So Wes got only 2.5K after successfully proved he could access signing and api keys,after he was threatened with a lawsuit.<p>How does setting up a shell and collecting credentials and then downloading them later give you a pat on the back?<p>Is this some kind of a joke?
aybenabout 9 years ago
emreayben23
edemabout 9 years ago
Why do you use so much emoticons in your article?
mxuribeabout 9 years ago
Quite clever find! Good write-up, too! Kudos!
ryanlolabout 9 years ago
Only $10000? What the hell do you have to find to qualify for that &quot;million dollar bug&quot;?
评论 #11552660 未加载
lawnchair_larryabout 9 years ago
So since they were unable to pivot laterally, you pat them on the back and call it a win. But last time someone did successfully pivot laterally, you threatened his employer? You guys are really sending mixed messages! Are they allowed to escalate or not? And if that&#x27;s the new policy, shouldn&#x27;t you pay the other guy who did escalate?
评论 #11547673 未加载
评论 #11544874 未加载
评论 #11544730 未加载
oliverhandsabout 9 years ago
i hacked facebook and someone saw me hacking and siad why are you hacking and so that&#x27;s how i hacked facebook