Hotmail Hacked 494
SyD writes " Apparently there is a major security hole on Hotmail that could allow crackers to read your e-mail. A hacking group known as root core discovered the hole and reported it to Microsoft. " This isn't the first time that the folks who are gonna give us a internet wide universal login system had a hole. The funny part is that I posted a story almost exactly like this like 2 years ago, and about once a week, someone emails me and says "I think my boyfriend/girlfriend is cheating on me and I really need to know the backdoor into hotmail to find out". No I'm not kidding. You can't make that stuff up.
Again? (Score:3, Funny)
Score: -1, Redundant
Re:Again? (Score:2, Informative)
Saying something stupid, predicting you'd get modded down has been done since the beginning of moderation.
Average person? (Score:5, Funny)
"The average person in the street doesn't need to worry, as they would have to be specifically targeted," said Graham Cluley, an Internet security expert with antivirus firm Sophos.
I suppose the quux is whether I'm an "average person" or not. I think I'll go stand in the street to hedge my bets.
All I can say is this: (Score:2)
supplies.
No no no (Score:2, Interesting)
Bring me these experts. If someone thinks my hotmail account(s) leave a clear trail to me, they're insane. They leave a clear trail to my web proxy, perhaps. Most of my accounts only ever receive one email too... "Slashdot password for user Vladinat0r"
Sigh. Experts indeed!
Re:No no no (Score:2, Funny)
No kidding. Yeah, every time I feel like doing something that could be potentially illegal I always use my own Hotmail account. And of course I've put my name, home address, and phone number into this account's information. Not to mention the fact that I'll do it from my home or office computer with a nice and easily traceable IP back to me.
Other tidbits I liked:
In order for intruders to access a Hotmail user's emails, they would need to know the victim's user name and then guess the number that identifies a specific email message.
Lessee now, who would most people be targeting: random users or specific family, friends, or enemies who they already have an address for? Not to mention the thousands, if not millions, of Hotmail addresses that could be reaped with a simple search.
"The average person in the street doesn't need to worry, as they would have to be specifically targeted," said Graham Cluley, an Internet security expert with antivirus firm Sophos.
Hey, Average Joe! Got any enemies who might be interested in reading your mail?
Root Core has posted on its website a scanning program that automatically guesses about one message number every second. But security experts said the program's impact is limited because, in order to work, an intruder would need to have a fast Internet connection and know how often the targeted victim checks their email account.
I wonder how many script kiddies are out there sitting next to their cable or DSL modems sniggering into their milk right now?
----------
Digital Pants...ACTIVATE!
It's not quite so bad (Score:4, Informative)
Re:It's not quite so bad (Score:4, Insightful)
This isn't the "major" security hole that the slashdot submission suggested.
It would take a minor miracle to guess a message number correctly.
And considering what *I* use hotmail for, namely, a spam catcher, any hacker that got lucky enough would probably discover yet another way to get rich quick. If someone really wanted to read my email there, they could keep trying - but their hotmail username (at very least) would be recorded.
I don't mean to pooh-pooh this issue; but I think editorializing this into a *major* security problem (a la Code Red) is a little disingenuous, and misguided.
Re:It's not quite so bad (Score:5, Insightful)
Actually... not... there is only 86400 seconds in a day and you need to worry about aprox first 100 messege numbers which makes it under ten million hits required to read your whole day correspondence. And the effectivity can be increased with clever algorithm so I will have most of them after first million.
In other words, a nice perl script that will take me about 1-2 hours to write will every day fetch all your mail without even making my computer sweat. :)
What kind of miracle is that? And shall I be proclaimed saint for performing such miracles?
decoding hotmail message numbers (Score:3, Funny)
You have just published a "Circumvention Algorithm."
Shame on you. No doubt the FBI is on their way to your house to slap you on the wrists with wet noodles. Oops, I mean slap you in irons. The wet noodles are for Microsoft under the new Punitive Actions for the antitrust suit.
Baaah! (Score:2)
Re:It's not quite so bad (Score:2)
And we all know how hard those are to get.
It's not like they make you produce a stamped letter from a notary public, or even enter a credit card number, before they give you an account. Or did you really think that suzi3952@hotmail.com (the hot young co-ed) was a real person?
Re:It's not quite so bad (Score:2)
Of course she is. She just happens to be a 37 year old man sitting around at home in his dirty underwear.
Re:It's not quite so bad (Score:2)
The details of the hole... (Score:5, Funny)
Guess they haven't gotten rid of Code Red yet!
(For the humor impaired: no, I did not actually do the telnet session.)
Oh no (Score:4, Insightful)
One nice thing (Score:2)
I'm glad for Onebox and my regular email accounts.
Sure, some would say, "It's free; shut up!" But: MS is __still__ claiming to provide a service even though there is no direct cost to me. That there's no cost doesn't mean I don't expect the service to be useable. My recourse is to leave. Is that what MS wants?
Oh, as an aside, I hope the message #292192399 bug is never fixed - "Imagine if there's no First Posts...It's easy if you try..."
Why is MS reaping the benifits of OSS security? (Score:4, Insightful)
Despite the fact that MS beleives very firmly in a security through obscurity model of business, they have both benevolent and malcious hackers and crackers world wide working to expose as many of their security holes as possible, thereby forcing MS to patch those holes. Code Red would still be unpatched if eEye hadn't released it's exploit POC. This exploit would still be out in the open and freely abuseable if it hadn't been released.
Since MS is the 'standard' for most internet users, it's also the recipient of all the world's security unsolicited security advice.
Re:Why is MS reaping the benifits of OSS security? (Score:3, Insightful)
Re:Why is MS reaping the benifits of OSS security? (Score:2)
And if you do, your webserver crashes every time a Code Red talks to it.
Not exactly a well tested patch was it?
Re:Why is MS reaping the benifits of OSS security? (Score:2)
According to my firewall logs, code red *is* unpatched on thousands of systems. Sure, there's a patch. But that doesn't make the hole, or the thousands of unpatched boxes banging away at port 80, excusable.
Go with Yahoo! Mail. (Score:2, Informative)
And Yahoo! Messenger kicks AIM's and MSN Messenger's asses.
Why tempt fate?
Re:Go with Yahoo! Mail. (Score:2)
Big Surprise - More info... (Score:4, Informative)
This was already posted to BugTraq [securityfocus.com] not too long ago. For a more technical breakdown of the details surrounding the Hotmail vulnerability, go here:
http://www.securityfocus.com/archive/1/205785 [securityfocus.com]
PLEASE! (Score:2, Funny)
Microsoft's response... (Score:5, Funny)
"However," Microsoft said, "we recognize the concerns raised in the computational infeasibility of this mechanism and are investigating ways that we can raise this bar even higher."
Like Taco said...you just can't make this stuff up. That response is just too funny.
Re:Microsoft's response... (Score:4, Funny)
Re:Microsoft's response... (Score:3, Informative)
Re:Microsoft's response... (Score:2)
Whoops, this is MS we're talking about. Sory for that burst of sanity.
No, you really can't make this stuff up (Score:2)
So what MS product got hacked again?
universal variables (Score:2, Interesting)
Security works the same way. The more places you use a key, or the more people you give a copy of your key to, the higher risk you have for errors, being hacked, identiy theft, being robbed, etc. A 'single sign-on' like the MSN/Hotmail passport or AOL's new Single-Signon or Screenname (not sure what they are calling it) that all AIM accounts/AOL accounts now have become are just another invitation of risk.
Users need to be alerted of this fact, that these systems may not be secure, and users need to understand that the more people who they use their single sign-on for, the higher the risk becomes.
In this situation though, you have to wonder. If the person issuing the 'keys', microsoft in this case, does not do a good job of protecting them and making sure that their security is up to date, can it be any better than if you had a safe deposit box that sat unlocked in the middle of Times Square?
I can't wait to see what happens when in addition to all these Single Sign-on and Passport type programs, that we have Digital Signatures too. That should be interesting.
again? (Score:2)
I'm glad I stopped using them years ago, when M$ took over. I kinda new that their service was going down.
Lets see, they were hacked once, then the red worm did a little damage, now they are hacked again... hmm can't wait for .net, so that everyone can read my design documents. hmm do you think they 'll have local or remote storage with .net???
It's to bad that they are such a hackers target and they do little in the way of security. I wonder how strong the M$ firewall will be in XP..
I know it may seem a bit trollish, and would be suprised if someone did not ask quesitons, but then again there are those that follow blindly.. Are you a sheep or a wolf?
'Found it' ? (Score:2)
Im so glad hackers keep 'finding' things, like credit card numbers, ways into banking systems, viruses like code red - makes me feel warm and fuzzy.
My question - not to be a troll - is this (and this does not just relate to MS products but im asking a serious question)
if this security flaw had not been found (by these guys looking for a way to break into hotmail to read peoples mail) would anyone have been affected ? i mean if the flaw had to be looked for with carefull thought etc then was it a real serious issue BEFORE these guys told everyone ?
networks can have flaws and holes, open ports etc left active by a careless admin - not the best i know but big systems have a lot of work and these days we are coping with less staff (i know my company is) so sometimes things slip through.
But these guys go and look for the exploit (i mean what other reason would you have to search for this exploit BUT to be able to hack in and read mail? and then why tell everyone?
These things need to be fixed i agree but if no one wold know they were there expect for some kindly souls seeking them out then how much of an issue are they ? Are we just accepting that hackers are a good thing cause they find these problems ? what will you think when they 'fin' that flaw in the company which has your credit card number ?
Re:'Found it' ? (Score:5, Insightful)
Rudimentary Treatise on the Construction of Locks
A commercial, and in some respects a social, doubt has been started within the last year or two, whether or not it is right to discuss so openly the security or insecurity of locks. Many well-meaning persons suppose that the discussion respecting the means for baffling the supposed safety of locks offers a premium for dishonesty, by showing others how to be dishonest. This is a fallacy. Rogues are very keen in their profession, and already know much more than we can teach them respecting their several kinds of roguery. Rogues knew a good deal about lockpicking long before locksmiths discussed it among themselves, as they have lately done. If a lock -- let it have been made in whatever country, or by whatever maker -- is not so inviolable as it has hitherto been deemed to be, surely it is in the interest of honest persons to know this fact, because the dishonest are tolerably certain to be the first to apply the knowledge practically; and the spread of knowledge is necessary to give fair play to those who might suffer by ignorance. It cannot be too earnestly urged, that an acquintance with real facts will, in the end, be better for all parties.
Some time ago, when the reading public was alarmed at being told how London milk is adulterated, timid persons deprecated the exposure, on the plea that it would give instructions in the art of adulterating milk; a vain fear -- milkmen knew all about it before, whether they practiced it or not; and the exposure only taught purchasers the necessity of a little scrutiny and caution, leaving them to obey this necessity or not, as they pleased.
...The unscrupulous have the command of much of this kind of knowledge without our aid; and there is moral and commercial justice in placing on their guard those who might possibly suffer therefrom. We employ these stray expressions concerning adulteration, debasement, roguery, and so forth, simply as a mode of illustrating a principle -- the advantage of publicity. In respect to lock-making, there can scarcely be such a thing as dishonesty of intention: the inventor produces a lock which he honestly thinks will posess such and such qualities; and he declares his belief to the world. If others differ from him in opinion concerning those qualities, it is open to them to say so; and the discussion, truthfully conducted, must lead to public advantage: the discussion stimulates curiosity, and curiosity stimulates invention. Nothing but a partial and limited view of the question could lead to the opinion that harm can result: if there be harm, it will be much more than counterbalanced by good.
Re:'Found it' ? (Score:2)
BTW tomlinson's treatise is very interseting and he was using it to say that just beacuse information may be used for wrong does not mean it should not be covered under freedom of speech, and thats a good poin, However from what i have read freedom of speech does not cover criminal actions and incitment to commit a criminal act - the knowing distribution of information designed to facilitate or encourage an act contrary to the law.
Thats what these guys are doing - they set out to compromise a commercial system belonging to a private company with the aim of exploiting that system for their gain (fame, notoriety etc etc) - this is a crime no matter what they claim. They then spread the information in a way designed to allow people to gain access that system thus allowing them to cmmit the same crime - in effect making them accomplices.
My point is these guys are not worthy of the attention and support they get. Thats my opinion anyway.
But thanks for a great reply post - very well done and ineresting. and made me think - you may be right, i may be wrong , but thats what this place is all about
Re:'Found it' ? (Score:2)
Re:'Found it' ? (Score:2)
But you are correct vendors dont fix code and i agree its an issue and we should be telling them about flaws - but these guys told much more than them - if they had only told MS and bugtraq that would be fine, yet in this topic we have full details on the exploit and everyone on IRC and my ICQ contact know about it - it's all over the web, thus they are not just telling the vendors, or bugtraq or CERT but they are telling everyone how to hack a system - this makes them 'black hats' in my eyes (i hate that term !).
All this sort of news does is bring publicity and cause the vendor to circle the wagons and deny everything - and they start another discussion on evil hackers (watch the TV - newsflash Hackers can read your mail) and obfuscate the fact that ALL systems have vulnerabilities - we all need to be aware of that. (not thats my opinion only)
Another damn good point - i enjoy your posts man !
If one found it, others could too (Score:2)
So if I see a dangerous condition -- say, a truck moving down the highway with a flat tire falling to pieces, or a leaking gasoline tank, or a fallen power line, or a boat coming unmoored, or a building with loose masonry, or a bad pothole, any number of things -- if I see any of these, rather than warn the public of the danger, better I should leave a note for the owner, who may be off on vacation and won't respond for several weeks? Am I supposed to be so worried that some lunatic might throw a match into the leaking gasoline that I say nothing at all?
I think you need to bury your head in the sand a bit deeper, instead of surfacing now and then to say such silly things.
"Limited Scope" (Score:3, Insightful)
Re:"Limited Scope" (Score:2)
In terms of relative damage one can do, a better analogy might be comparing the damage potential of a kid on a bicycle compared to an 18-wheeler.
Re:"Limited Scope" (Score:2)
But let's not get that in the way of Microsofts denying the relevance of this attack.
Bad, but getting better. (Score:2, Insightful)
I am subscribed to their security notifications and there is an honest effort on their part to fix the problems. More shocking is the recognition they are giving to groups that expose these vulnerabilities - a 180 turn around how they used to desparage those who uncovered such problems.
Oh crap! (Score:3, Funny)
Thanks to Hotmail there are going to be a number of people out there now using my name to get valuable college degrees over the `net.
Hopefully they'll be good sports and also get me a lower interest rate on my home.
If they hacked my account... (Score:2, Redundant)
And let's not forget...I send you this e-mail in order to have your advice. I have a hard enough time reading my e-mail. Good luck to all the crackers out there who want to read my e-mail. I even got spammed the other day by someone selling orthopedic in-soles for people with a "leg lenght discrepancy" now that is something I'm looking forward to more in the future, Niche Spam.
Hushmail, people... (Score:2)
J
Very secret information.... (Score:5, Funny)
NOTE: By following these directions you will be breaking the law.
while (in_car(use *right_foot))\
push(($pedal) to go [@REALLY_FAST]);
I have had this information in my head for years, but felt it was time to inform the rest of you how to do it. Now I know I will be pursued by lawyers attempting to utilize the DMCA against me for revealing this information that the vehicle manufacturers did not want you to know... such is the life of a hacker...
Alternate Headlines? (Score:2)
But then, MS keeps messing with things.
maybe that's what they are doing. Not so much fixing bugs, but practicing security by randoming shifting the bugs around.
Sorta like Whack-a Mole
;-)
- - -
Radio Free Nation [radiofreenation.com]
is a news site based on Slash Code
"If You have a Story, We have a Soap Box"
- - -
So what? (Score:2)
"Dear Somebody-you-never-heard-of,
How are you? I am fine. Blah-blah-blah, blah-blah, blah-blah.
Yours Truly,
Some Bozo."
Big deal.
--Homer Simpson
Let me get this straight... (Score:3, Insightful)
This is similar to the Ameritech ebill security hole: no checking of user authentication - just GET any billing information with a *SEQUENTIAL* session ID in the GET string.
If this is an example of the authentication they've planned for Hailstorm services, I think many more people may have second thoughts about quick adoption.
Is it still open? (Score:5, Interesting)
But to me, the most astounding betrayal of computer security ever was Microsoft's conduct during the last Hotmail breach. Not that it happened (could happen to anyone) or even that they didn't pull the plug days until days after the exploit was made public but that they kept going for hours after everyone had the URL for the backdoor.
There was a great Salon article [salon.com] by a woman who heard about the breach on CNN, found the URL here and read her ex's new girlfriend's mail. I love the conclusion:
Late Monday, Microsoft continued to downplay the Hotmail hack in a statement published by Reuters: "We're hoping that because we jumped on it so quickly no one was affected."
Fat chance.
I wonder if this time will be different...
H1, H0W 4R3 Y0U? (Score:2, Funny)
4cc0unt!
(I just could'n resist
How my friend had his hotmail acct hacked... (Score:2, Insightful)
Needless to say, once she got in and had a look at his e lover's correspondence, the four year relationship ended quickly.
Your friend learned a valuable lesson... (Score:2)
1. The person cracking/social-engineering into your e-mail account will more than likely be somebody who you already know. So don't use widely-known personal info as a password reminder!
2. If you cheat on your S.O., you WILL get caught. This is especially true if you're a man or a lesbian - women seem to be natural Sherlock Holmeses. And yes, "e-lovers" count as cheating.
Re:How my friend had his hotmail acct hacked... (Score:2, Funny)
Re:How my friend had his hotmail acct hacked... (Score:2)
Kind of like answering "Yes, with butter and ambrosia sauce" when asked if you like children.
TechTV's "experts" (Score:2)
Uh, yeah, more like "intruders would first need to log in to a new, free, anonymous Hotmail account". Not much of a deterrent!
Come on... (Score:2)
--Blair
Re:Come on... (Score:2)
--Blair
"Keep it unreal."
Ugly VB Code... yeechhh (Score:5, Informative)
a) it's in VB
b) you'll see methods like this:
Public Sub ii(MSG As String)
l_info.Caption = ">" & MSG
End Sub
are there no coding standards even among hacks?
"hacker" vs. "cracker": something to consider. (Score:5, Funny)
CHEF: Now, children, don't leave your computer on when you're not around! Crazy crackers can read your email!
STAN: Holy crap!
CARTMAN: You guys are so lame.
- A.P.
BFD (Score:2)
Now you can be a hacker too (Score:3, Funny)
Bah. (Score:2)
Experts? Experts who think you need real-world authentication to log into hotmail?
I'll just leave my door unlocked because it's not a problem unless I'm specifically targeted.
Anyway, if you're going to write a web page that cites other web pages, please put in a link. The anonymous authors of this page ("Tech Live staff") neglected
to link to Root-Core [root-core.com], which seems to be the focus of the story, although they linked to Sophos, which was tangential.
And this was on Bugtraq on Saturday.
Oh no... (Score:2)
I mean, really, does anyone use hotmail for anything other than a spam repository?
Dear ColdDeadMail - (Score:2)
I don't care (Score:2)
Step-by-step hacking tutorial (Score:4, Offtopic)
For script kiddies who don't want to be bothered with the detailes, there's even a Windows program [can-host.com] that automates the process.
Re:here's the instructions how to do it (Score:2, Interesting)
What would be really interesting is to show an example hacking the rest of the sites that use Passport type technology. This would definitely blow holes in MSs idea of being the "gatekeeper".
Our better yet, it might just close the gate!!
Cal
Informative - More like criminal action actually (Score:2, Troll)
Just a point - now if you guys have a brain you will mod this back down or remove it - i think its an interstin post but i would encourage the users NOT to post full exploits but a link to a page (use geotcities or someone similar) off site - as you cannot be held responsible for it (pretty disclaimers aside you are legally responsible for the content here - its just that no one has decided to pursue it yet)
YES I AM A LAWYER
So we might as well shut down Bugtraq... (Score:5, Insightful)
Yes, perhaps one unfortunate day it will be illegal to explain security vulnerabilities in depth, but until then there's little wrong in supporting open disclosure. Security through obscurity doesn't work.
Accessories to a crime by having this post on Slashdot? Yep, you Must be a lawyer if you can come up with and rationalize arguments like that.
Re:So we might as well shut down Bugtraq... (Score:2)
why would it be the most secure?
Because there are more people trying to find holes in it than any other system.
I suggest you try out Hushmail.
What I want is an email account which PGP encrypts the email with my public key as soon as it receives it, and then destroys the original. Then even my email provider can't read my mail unless it intercepts the mail before it is encrypted. Anyone who breaks in likewise can only get newly sent mail.
Even if that was implemented I'd still assume that all my mail could be read by someone if they really wanted to. You simply shouldn't be sending sensitive information via email unless it's end to end encrypted. If you're assuming any security against a semi-determined attacker absent that encryption, that is your main problem.
Re:Informative - More like criminal action actuall (Score:4, Interesting)
This suit [findlaw.com] is the closest I've managed to dig up so far, but between Communications Privacy Decency Act (or somesuch) and DMCA, along with a prevailing broad interpretation of "service provider", most message boards such as AOL, etc., have been found to have no liability for what goes on. If that weren't the case, ezboards would've been toast a long time ago, and AOL would be fighting dozens of lawsuits a month. Do you have any examples of case law to back up your statement?
Re:Informative - More like criminal action actuall (Score:2)
note im not commenting on the right or wrong of it - i agree the post may be foolish but thats not my opinion to state - i just disagree with the statement that this ruling covers
Re:Informative - More like criminal action actuall (Score:2)
Still you might be right - but would this not depend on the jurisdiction ? - if the case was in the New York Courts but Slashdot is based in say California it might not neccesarily be precedent setting as its not a federal case ? I dont know as i am not a lawyer but it would be interesting to know as this is a valid question
Re:Informative - More like criminal action actuall (Score:2)
How about the part of thelaw that says that parody, satire and caricature is free speech. Clearly the layout of this exploit is a satire along the lines of: How A Three Year Old Can Break Into Fort Knox And Get Away With Half A Trillion Dollars Without Even Trying Very Hard.
We await your lawyerly opinion.
You may be a lawyer, but it appears you are wrong about the link part. 2600 and many others were taken to court and lost, by posting links to DeCSS code, something that is quite outrageous, but it flew in court.
Re:Informative - More like criminal action actuall (Score:2)
in fact, it is not a criminal offence.
I have legally hacked many systems. Now it may be a law to enter a system without permission, but thats not the same thing. There's also the arguement that a hotmail user does have a legal right to be on that system, so what it come down to is this "is it criminal to break a contract with a private company?" no, but you may be liable on a civil 'level'.
Doesn't 'hacking' imply bypassing security? (Score:2)
Re:Informative - More like criminal action actuall (Score:2, Funny)
Motion for Summary Judgment (Score:2, Insightful)
A smart lawyer, of which I could be one, would quickly dispatch the "promoting a felony" argument by pointing out that none of the promoting was done by the hypothetical defendants in this matter. Any promoting or highlighting of the "offensive" subject matter, like the posting itself as a matter of fact, was done by pseudo-anonymous members of the community at large.
It could be argued, I suppose, that Slashdot.org has created a forum that fosters or even encourages(?) such offenses, but that argument has fallen flat in a number of cases already decided.
Precedent being what it is I don't think Taco and friends should be speed-dialing Johnnie Cochran just yet.
-Coach-
Speaking of pretty disclaimers...I am not your lawyer and this is not legal advice, merely my educated opinion. If you wish legal advice seek out an attorney licensed to practice the kind of law you need in your area and pay them for it.
Re:Informative - More like criminal action actuall (Score:3, Interesting)
Microsoft's hotmail operation is in flagrant violation of the opt-out provisions of existing privacy laws.
Microsoft sends email to users' inboxes by going around the entire email system, circumventing all attempts to opt out, block, or filter the spam. These emails come from "staff@hotmail.com" and are clearly not normal messages, because they have to power to disable the Reply buttons.
When told they are breaking the law, Microsoft sends back boilerplate that alternately denies the spam is from Microsoft or gives the instructions for the aforementioned nonworking methods of blocking spam.
--Blair
P.S. As it turns out, their monthly spam-o-gram came very shortly after I opened my first--and only--hotmail account, so just about all of the correspondence that has ever transited that account has been my complaints, their responses, and more spam from them. I think the balance is one or two non-microsoft spams and one email from a guy who runs an anti-spam website to whom I'd mailed the long transcript of nonsense that had occurred.
Re:Informative - More like criminal action actuall (Score:2)
Yahoo was spam city - it may not be hackable but christ did i get spammed - and emails from yahoo 'affiliates' were a constant problem - even though i asked them not too
RocketMail - not bad - but now gone
Altavista - More porn spam than you can poke a stick at and mesaages from them every day
Thats a fee examples
Hotmail used to be bad - but over the last 8 months with the account i have i average 1 spam a week (those dammned college degree ones) and 1 message a month from hotmal staff - i get little other spam and the filters work - its also fress so who cares about 1 little message - and the address is a non reply - i have them here on my system for helpdesk and notification purposes - its not 'power' it's a standard thing.
Do you use hotmail daily these days ? (just wondering not flamebaiting)
Re:Informative - More like criminal action actuall (Score:2)
That's playing with words, a smart lawyer could argue.. since you're arguing you consider youself smart?
Okay, go sue everyone that has moderation rights here, even those who have it tagged on and don't even know exactly what it is because they barely started reading slashdot, and while at it, sue the school/isp/company on which the computer used to commit such a moderation was hooked, and since we're in the complete nonsence and you obviously don't get what moderation is for, why not sue the company that made the keyboard and mouse with which the CRIMINAL act was commited.
Oh shit, wait! you're probably about to sue microsoft...
>YES I AM A LAWYER
Yeah, and your caps lock is on too.
----
Disclaimer
These comments aren't my own, I was playing quake and got owned.
Re:Informative - More like criminal action actuall (Score:2)
Re:Informative - More like criminal action actuall (Score:2)
Re:Informative - More like criminal action actuall (Score:2)
Re:Informative - More like criminal action actuall (Score:2, Insightful)
I dunno.. but it is. I keep asking myself the same question. [freesklyarov.org]
Re:Informative - More like criminal action actuall (Score:2, Insightful)
In what twisted universe is "This is almost certainly illegal, idiots." (to paraphrase) construed as legal advice?
Re:Informative - More like criminal action NOT (Score:3, Interesting)
If you're really concerned about Microsoft's lack of security and quality control, don't buy their software or use their services. And it's the problem of millions of users like you who use Hotmail, many of whom either don't have much of a choice for email accounts or were using it before MS took over. Lastly, exploiting the flaw won't make them fix it any faster than they are right now. It'll just get criminal charges pressed against a few script kiddies, and rightly so.
Personally, I think anything beyond Pine is overkill. Not everyone is lucky enough to have email accounts on Unix servers, though. Passport sounds like an absurdly awful idea, but I don't think anyone could do it right. I'm worried about Microsoft taking over the Internet, but I don't think they'd necessarily do a worse job on Passport than, say, Sun. There's not a lot of practical work done so far involving such massive systems, and I don't think they've thought it through very clearly beyond the marketing department.
Re:here's the instructions how to do it (Score:2)
Here's another way (Score:5, Funny)
1. Log into hotmail normally.
2. Type in this link:
http://pv2fd.pav2.hotmail.msn.com/default.ida?XX XX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
X XX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
X XX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX%u9090%u6858
8 %u cbd3%u7801%u9090%u9090%u8190%u00c3%u0003%u8b00%u53
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u685
1b%u53ff%u0078%u0000%u00=a HTTP/1.0
haha (Score:2)
Re:here's the instructions how to do it (Score:5, Informative)
My guess is you are a karma whore, nothing more. Now I may be wrong, you might be the actual author. In this case, let us know.
Research by wAwAsAn4
wAwAsAn4@root-core.com
Web: www.root-core.com [root-core.com]
Email: [Digital-Vortex]@securityfocus.com [mailto]
Voila.
Re:here's the instructions how to do it (Score:2, Interesting)
Re:Finding a specific message not easy (Score:2)
Re:Finding a specific message not easy (Score:2)
Comment removed (Score:5, Funny)
Re:You've got mail! (Score:2)
Re:You've got mail! (Score:2)
Re:Well... (Score:2)
...j
Re:and this is news? (Score:2)