TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

How a security pro’s ill-advised hack of a Florida elections site backfired

20 点作者 iamchmod大约 9 年前

6 条评论

jwcrux大约 9 年前
That's what happens when you compromise a site that you don't have authorization to test. You always run this risk when performing testing that isn't under the umbrella of a formal bug bounty.
评论 #11678553 未加载
评论 #11678633 未加载
Someone1234大约 9 年前
In my opinion he was likely in the wrong here, but likely had the right intentions.<p>As with all computer crimes they massively over-charge people, because of &quot;hacker&quot; moral panics and a public that doesn&#x27;t understand how proportionately bad something is (or isn&#x27;t).<p>I&#x27;d just give the dude a fine and let him walk. But he is legitimately facing jail time on this one.
sathackr大约 9 年前
Did anyone notice the Flame Internet at the top left of the page? A quick google brings up flamepro.com which is in the same geographical area. They have a picture of the original website on their facebook page also. I bet this is the company responsible for developing the site. If so, I wonder how many other sites they&#x27;ve built have similar lapses. I wonder if they posted screenshots of others on their Facebook page?<p>Also I didn&#x27;t hear any mention of the site not using SSL -- so, on top of the credentials being stored in cleartext, they&#x27;re likely sent in cleartext also.
tantalor大约 9 年前
It&#x27;s strange to call this whistleblowing.<p>1. security guy was not an insider, but whistleblowers usually are<p>2. lax security is not illegal or illicit, just dumb<p>3. security guy informed staff of vulnerability and they fixed it, so... why blow the whistle?
patcheudor大约 9 年前
A number of years ago, upon getting a Jury Duty notice, I took an observational look at the security of the jury registration site. It quickly became apparent, without exploitation that it was XSS and SQLi vulnerable. I immediately reached out to the local court IT director with a disclosure, ensuring that I was as clear as possible on the fact that I did not exploit the system. She contacted me within an hour and I worked with her office over the course of the next several months to confirm the vulnerabilities and in the end, retire the solution entirely by justifying the budget for replacement. I went from an annoying security researcher to valuable partner. Later that year a number of developers from her team joined me for my annual DEFCON outing and were extremely grateful for the discovery and how I handled it as they&#x27;d been trying to get the solution replaced for years.<p>Unfortunately a lot of people either don&#x27;t know where the line is or don&#x27;t have the skills to know how to not cross the line. Far too many times I see people toss a tool like SQLMap at something rather than understanding how SQLi works. If you understand SQLi, honestly there is very little need to run an automated discovery and exploitation tool against it, even in cases of blind SQLi, that comes when you have permission which in my experience isn&#x27;t hard to get if you come to the table with credible observational security findings.<p>This particular case appears to be a cut and dried case of attempting to use hacking for political gain.
spacemanmatt大约 9 年前
Terrible security and software skill should be defenses to hacking. I have had bad auth systems come apart in my hands because I used it &quot;wrong&quot; and was accused of hacking.