How a white hat gets tarnished.**************
I had wrote a thread, and asked for it to be deleted. But now im far to mad.
Over the past 4 years i've reported near close to, if not over, 100 exploits. For Free.
Those exploits could have been abused and used to gain revenue to finance a nice trip to russia, or what ever.
Most of the time I get no responce from the admins, but its obvious they forward the emails around and such because the exploits actually do get patched.
So a few days ago... i found a cache of amazingly stupid exploits on telus and rogers sites. And even tho i've made contact with them, they seem to want to blow it off, or completely delete the conversation. So Im going to teach you all something today
http://www.rogers.com/web/link/signin?lithium_forum=true&referer=http://google.ca
heres a very, very...VERY simple exploit. You can probably see whats going to happen.
If you dont have a rogers account, you'll just have to take my word for it. After you sign in, it moves us along to http://google.ca
If we were real smart what we would do is have it go to our server, and put up a fake "you entered the wrong password" page...and users would enter the password again and we would get there data...
But no, were even smarter then that
we know they will probably look in the url bar and see that its no longer rogers so we'll give up on that plan.
See this page? http://www.rogers.com/web/Rogers.portal?_nfpb=true&_pageLabel=PTV_Landing
hmm, lable, thats a weird variable...lets change it to something awesome.
http://www.rogers.com/web/Rogers.portal?_nfpb=true&_pageLabel=Andy_is_leet
oh lame, the page broke, wait a second...no 404? thats weird?
I know lets just push random keys
http://www.rogers.com/web/Rogers.po...ntent/images/2009/05/telus-logo.jpg"><script>
OH WHAT THE EFF?! how did that get there?!? who put telus links on rogers page...
We better avenge rogers, lets go screew with telus.
https://www.telusmobility.com/amser...dW50L1lvdXJBY2NvdW50LnBvcnRhbA==&encoded=true
Ah there we go, now were even.
I had wrote a thread, and asked for it to be deleted. But now im far to mad.
Over the past 4 years i've reported near close to, if not over, 100 exploits. For Free.
Those exploits could have been abused and used to gain revenue to finance a nice trip to russia, or what ever.
Most of the time I get no responce from the admins, but its obvious they forward the emails around and such because the exploits actually do get patched.
So a few days ago... i found a cache of amazingly stupid exploits on telus and rogers sites. And even tho i've made contact with them, they seem to want to blow it off, or completely delete the conversation. So Im going to teach you all something today
http://www.rogers.com/web/link/signin?lithium_forum=true&referer=http://google.ca
heres a very, very...VERY simple exploit. You can probably see whats going to happen.
If you dont have a rogers account, you'll just have to take my word for it. After you sign in, it moves us along to http://google.ca
If we were real smart what we would do is have it go to our server, and put up a fake "you entered the wrong password" page...and users would enter the password again and we would get there data...
But no, were even smarter then that
See this page? http://www.rogers.com/web/Rogers.portal?_nfpb=true&_pageLabel=PTV_Landing
hmm, lable, thats a weird variable...lets change it to something awesome.
http://www.rogers.com/web/Rogers.portal?_nfpb=true&_pageLabel=Andy_is_leet
oh lame, the page broke, wait a second...no 404? thats weird?

I know lets just push random keys
http://www.rogers.com/web/Rogers.po...ntent/images/2009/05/telus-logo.jpg"><script>
OH WHAT THE EFF?! how did that get there?!? who put telus links on rogers page...
We better avenge rogers, lets go screew with telus.
https://www.telusmobility.com/amser...dW50L1lvdXJBY2NvdW50LnBvcnRhbA==&encoded=true
Ah there we go, now were even.
(?)