TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Specialforces.com Site Hacked

137 pointsby mschonfeldover 13 years ago

11 comments

tanseyover 13 years ago
As I'm currently in the middle of a research project on password security, I downloaded the passwords and had a look. I'm beginning to believe that you should just assume that if your site does not have any password creation rules, it will be hacked soon.<p>The specialforces password dataset contains passwords like "post"-- four lowercase letters found in any English dictionary, and even matches part of the email (@post.ca.gov) for the user. If a site lets you choose this as your password <i>do not give your credit card info to that site</i>, simple as that. A site that is built by someone who is so unaware of the basics of password security is likely following other insecure practices as well, like storing your data in plaintext and not properly sanitizing user input.<p>All the major recent attacks (phpbb, singles.org, rockyou, battlefield heroes beta, faithwriters, and now specialforces) have had this same glaring issue in common. In reality, if these sites are letting users choose any password then for the majority of users you might as well just store them in plaintext. Most users (70-90%), if left to their own discretion will choose a 6 or 7 character password with all lowercase letters, meaning it will be trivial to crack even if it's hashed and salted.
评论 #3398800 未加载
评论 #3398821 未加载
burgerbrainover 13 years ago
Good to see them making use of Tor hidden services.
评论 #3401333 未加载
mike-cardwellover 13 years ago
Never a good idea to publicly announce that your service is hacker proof.
评论 #3398439 未加载
评论 #3397867 未加载
biturdover 13 years ago
I have found this is a useful service after every one of these lulz has happened: <a href="https://shouldichangemypassword.com/" rel="nofollow">https://shouldichangemypassword.com/</a>
评论 #3400414 未加载
mschonfeldover 13 years ago
To what extent do you think GoDaddy should be held liable for?
评论 #3398272 未加载
评论 #3400327 未加载
scytheover 13 years ago
Let's be honest here. Has <i>any</i> "Secured by X company" certification <i>ever</i> actually meant a damn thing? I swear I hear reports about sites like this getting broken into every week. Those banners are basically the equivalent of painting a target on your back.
评论 #3398653 未加载
评论 #3399227 未加载
评论 #3398438 未加载
dutchbritover 13 years ago
While I find it's awesome that people like this bring these security issues to attention, at least leave the CC &#38; password details out. Sure, you got them, whoopty-doo, we believe you. Still isn't moral to share them.
评论 #3399501 未加载
nhangenover 13 years ago
Former Soldier, the type that would have purchased things from sites like this before venturing overseas, and I'm highly annoyed by the childish nature of this hack.<p>Some of these products keep people alive, and it's juvenile to blame SpecialForces.com for pepper spray during a protest.<p>If they were really intending on improving the security of these websites, they wouldn't hand out the data. Sadly, I fear that the worst of this type of behavior has yet to come.
smackfuover 13 years ago
I'm sure people with their CC leaked will now be against SOPA.
评论 #3398145 未加载
评论 #3398077 未加载
dutchbritover 13 years ago
If they really want to make a ding, they should hack GoDaddy.com :)
elbacover 13 years ago
Can someone clarify exactly what and from whom was stolen?
评论 #3397850 未加载
评论 #3398151 未加载
评论 #3397994 未加载