Author Topic: Early beta release: Project Alpha Webpage  (Read 5475 times)

0 Members and 1 Guest are viewing this topic.

Offline Kulverstukas

  • Administrator
  • Zeus
  • *
  • Posts: 6627
  • Cookies: 542
  • Fascist dictator
    • View Profile
    • My blog
Early beta release: Project Alpha Webpage
« on: November 01, 2013, 03:52:39 pm »
Merge fail, ignore this message :/
« Last Edit: December 28, 2013, 08:41:53 pm by Kulverstukas »

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Early beta release: Project Alpha Webpage
« Reply #1 on: December 24, 2013, 04:13:26 am »
Hello EZ!


Some of you may be familiar with project Alpha and some of you may not. So here are some explanations:Project AlphaProject Alpha is the code name for a project to re-design and re-code many of Evilzone's systems from scratch, such as the IRCd and the website.Project Alpha started as a design concept, very unlike this one, about one and a half year ago and have ever since evolved into something bigger and bigger.In addition to re-designing and re-coding we also wanted to add new features and services such as a webOS, web terminal, challenges, EvilShop, pastebin, exploitDB and much more. I wont go into details about those sub-projects right now. But they are also under development. Some more information can be found in the AWESOME STUFF page.



Introduction
This is an public early beta release. There have been several development versions for staff and VIP, but this is the first real public publication of the webpage.


Please keep in mind that this is a beta and is not complete. The only major part that is open to public that is not yet complete is the profile and all its systems (account settings, private messages, etc) (and sub-projects like the webOS).


Try it, break it, smash is and hack it. But please don't do any harm and report to me when you are done. Although I am pretty confident in the security part of the project.




http://alpha.evilzone.org/index.php?page=forum&sub=thread&thread=1




Oh and merry christmas!  ;D
« Last Edit: January 09, 2014, 12:51:16 pm by ande »
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline Zesh

  • Royal Highness
  • ****
  • Posts: 699
  • Cookies: 42
    • View Profile
Re: Early beta release: Project Alpha Webpage
« Reply #2 on: December 24, 2013, 04:57:15 am »
Very sexy! Thanks for the gift :)



What's with the broken characters?
« Last Edit: December 24, 2013, 05:01:31 am by Zesh »


Offline Uriah

  • Sir
  • ***
  • Posts: 454
  • Cookies: 42
  • άξονας
    • View Profile
Re: Early beta release: Project Alpha Webpage
« Reply #3 on: December 24, 2013, 09:05:33 am »
Looks beautiful. Can we have the list of people who worked on this, so we can give thanks?

Really good job guys :)

Offline Stackprotector

  • Administrator
  • Titan
  • *
  • Posts: 2515
  • Cookies: 205
    • View Profile
Re: Early beta release: Project Alpha Webpage
« Reply #4 on: December 24, 2013, 10:12:20 am »
Very sexy! Thanks for the gift :)



What's with the broken characters?
That's because it's showing you raw binary output in ASCII thus giving you random ascii stuff.
~Factionwars

Offline rasenove

  • Baron
  • ****
  • Posts: 950
  • Cookies: 53
  • ಠ_ಠ
    • View Profile
Re: Early beta release: Project Alpha Webpage
« Reply #5 on: December 24, 2013, 01:01:37 pm »
Really awesome work.
Its worth the wait.
My secrets have secrets...

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: Early beta release: Project Alpha Webpage
« Reply #6 on: December 24, 2013, 03:36:34 pm »
Very sexy! Thanks for the gift :)



What's with the broken characters?

Its supposed to be a joke/representation of an exploit doing some sort of overflow.


Looks beautiful. Can we have the list of people who worked on this, so we can give thanks?

Really good job guys :)

The website is mostly me.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline Fur

  • Knight
  • **
  • Posts: 216
  • Cookies: 34
    • View Profile
Re: Early beta release: Project Alpha Webpage
« Reply #7 on: December 24, 2013, 05:41:47 pm »
Everything is so smooth and lovely. 10/10 would visit again.

Also, what's up with the client side hashing when logging in?

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: Early beta release: Project Alpha Webpage
« Reply #8 on: December 24, 2013, 11:43:36 pm »
Everything is so smooth and lovely. 10/10 would visit again.

Also, what's up with the client side hashing when logging in?

Not sure how to answer this. The client side hashing is done for obvious reasons: Not sending your password in plaintext to the server.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline Matriplex

  • Knight
  • **
  • Posts: 323
  • Cookies: 66
  • Java
    • View Profile
Re: Early beta release: Project Alpha Webpage
« Reply #9 on: December 25, 2013, 01:55:06 am »
I visited this when you first posted about it yesterday and was extremely impressed. Very nice work ande.
I visited today, when I had more time, and what can I say other than holy shit. I mean, the terminal, exploitdb, ctf, challenges. Ande you are taking EZ to a whole nother level. Hats off to you my friend!
\x64\x6F\x75\x65\x76\x65\x6E\x00

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: Early beta release: Project Alpha Webpage
« Reply #10 on: December 25, 2013, 02:52:26 am »
I WANT TO LOGIN!! When is our acct. info transferred over?
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python

Offline Fur

  • Knight
  • **
  • Posts: 216
  • Cookies: 34
    • View Profile
Re: Early beta release: Project Alpha Webpage
« Reply #11 on: December 25, 2013, 07:53:59 am »
The client side hashing is done for obvious reasons: Not sending your password in plaintext to the server.
Theoretically, couldn't an attacker just modify the function if the site is not using https? I get that it would make password sniffing harder, but still. Oh, and wouldn't I need JS enabled just to login?
I skimmed this and this, and it's generally agreed to be insecure, but it does prevent the sniffer from logging into other sites that are using the same credentials, obviously (but you'd have to be stupid to use the same password twice).

Forgive me if some of this is fatally flawed, I just woke up and security isn't my speciality. Sorry if my tone sounds a bit unusual, I couldn't think of how to put it.
Anyway, merry Christmas.
« Last Edit: December 25, 2013, 07:55:02 am by Fur »

Offline ande

  • Owner
  • Titan
  • *
  • Posts: 2664
  • Cookies: 256
    • View Profile
Re: Early beta release: Project Alpha Webpage
« Reply #12 on: December 25, 2013, 05:26:07 pm »
I WANT TO LOGIN!! When is our acct. info transferred over?

You can register :P


Theoretically, couldn't an attacker just modify the function if the site is not using https? I get that it would make password sniffing harder, but still. Oh, and wouldn't I need JS enabled just to login?
I skimmed this and this, and it's generally agreed to be insecure, but it does prevent the sniffer from logging into other sites that are using the same credentials, obviously (but you'd have to be stupid to use the same password twice).

Forgive me if some of this is fatally flawed, I just woke up and security isn't my speciality. Sorry if my tone sounds a bit unusual, I couldn't think of how to put it.
Anyway, merry Christmas.

If you modify the function to send some other form of hash you will not be able to log in because the server is expecting 100x SHA512 and anything else will just give you wrong username / password. Removing the function all together will give an error/warning message when the server detects you are sending in plaintext, and you wont be able to login.

When hashing the password at client side you ensure that sniffers only gets the hashed version of the password thus not revealing your actual password.

However, the password sent from a given account will always be the same as no sort of salt is introduced. So simply replying the same password and username would effectively log you in. Maybe one could implement the client's IP as salt, thus making it impossible for anyone else to use your pre/client-hashed password.
if($statement) { unless(!$statement) { // Very sure } }
https://evilzone.org/?hack=true

Offline ca0s

  • VIP
  • Sir
  • *
  • Posts: 432
  • Cookies: 53
    • View Profile
    • ka0labs #
Re: Early beta release: Project Alpha Webpage
« Reply #13 on: December 25, 2013, 05:55:10 pm »
I once made an implementation in which every user had to login with username + password + secret. Then, the hash was calculated with a SHA256-HMAC(password, secret), and username + hash were sent to the server. I was never sure about if that was secure or not, so I finally removed it.

Btw, looks amazing :)
« Last Edit: December 25, 2013, 06:18:13 pm by ca0s »

Offline lucid

  • #Underground
  • Titan
  • **
  • Posts: 2683
  • Cookies: 243
  • psychonaut
    • View Profile
Re: Early beta release: Project Alpha Webpage
« Reply #14 on: December 25, 2013, 06:39:35 pm »
You can register :P
Indeed, I was just wondering when my uber leet posts and super hardcore gmod status will be transferred. Although I imagine it won't be until the final release is out.
"Hacking is at least as much about ideas as about computers and technology. We use our skills to open doors that should never have been shut. We open these doors not only for our own benefit but for the benefit of others, too." - Brian the Hacker

Quote
15:04  @Phage : I'm bored of Python