Jump to content

Submitting Help Ticket And Exposing Password


dlevens

Recommended Posts

Hello everyone, I am sure someone may have asked this question before but I was not able to find anything on it.

 

I submitted my first help ticket and noticed there was a section asking for my cpanel username and my cpanel password.

 

This seems to be security risk, especially since I noticed that the form is not secured with ssl.

 

Is this necessary? I don't like having my cpanel password exposed like that.

 

Dennis Levens

Link to comment
Share on other sites

Has anyone ever heard of someone sniffing and reconstructing packets that weren't sent over https? I'm just wondering because a lot of folks worry about it but I've never heard of it myself.

Link to comment
Share on other sites

Has anyone ever heard of someone sniffing and reconstructing packets that weren't sent over https? I'm just wondering because a lot of folks worry about it but I've never heard of it myself.

Yes.

Link to comment
Share on other sites

Yes, unencrypted. Honestly I don't worry about things, even passwords, sent over the internet because:

1. the packet nature of things makes it a jumble to start with.

2. there's much more chance the guy fulfilling my order will steal my passwords.

3. the #1 cryptographer rule: Any security method is sufficiently safeguarded if the pain of getting the information is greater than the value of the information itself. :)

 

Basically, 99% of my stuff is not important enough for anyone to bother with #1 and the pain it takes to sniff and reconstruct.

 

If it were locations or codes of nukes or the details of that new patent I'm applying for dealing with "events being announced by sounds stored in small sound files which are played when the event occurs" it would be different. :)

 

I was just wondering how "real" the threat is for the average Internet user.

Link to comment
Share on other sites

Well, I don't want to scare anyone, because in the majority of cases, you aren't going to have a problem, but I do want to clarify a couple things.

 

Pulling traffic off a network and making sense of it is extremely easy. It's not as mumbo jumbo as you may think, and there are many tools that will make sense of it for you. Getting onto the network in the first place is the harder part. That would require them to either already be on your network, or gain access to a machine on it.

 

I have seen many cases were this has happened, though. One of the worse is when a company hired me a couple years ago to do some work one weekend. I went on their firewall to change a ruleset, and found that the firewall had been compromised, a sniffer was installed to look for specific data (accounts, passwords, etc...), and the captures were being emailed offsite on a periodic basis so the culprit could parse the data at their leisure. Everything else they left alone so as not to raise any flags.

 

The thing is, in many cases they don't want your account for what's in it... they want your account for what they can do with it (DOS attacks, spamming, anonymous hacking, etc....). So in that sense, your account login *is* valuable to them.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...