guys, update me.
so user can login with any password?
i tried randomly typing password, can't login to my account
Chat CIMB kena hack?
Chat CIMB kena hack?
|
|
Dec 17 2018, 09:12 AM
Return to original view | Post
#1
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
guys, update me.
so user can login with any password? i tried randomly typing password, can't login to my account |
|
|
|
|
|
Dec 17 2018, 10:18 AM
Return to original view | Post
#2
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
monday blue for CIMB IT department
|
|
|
Dec 17 2018, 12:34 PM
Return to original view | Post
#3
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
QUOTE(syaifau @ Dec 17 2018, 12:32 PM) Anybody knows how to change the CIMB clicks password? > loginI can only find "forgot userid or password" I know my ID and password. I just want to change them. Didnt see it is mentioned anywhere on the banking site. > left side panel bottom got setting icon (gear icon) you should be able to navigate from there |
|
|
Dec 17 2018, 12:58 PM
Return to original view | Post
#4
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
|
|
|
Dec 17 2018, 01:01 PM
Return to original view | Post
#5
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
QUOTE(G_KeN @ Dec 17 2018, 12:57 PM) if i read correctly, if password following the new format (have special characters and more or equal to 8 characters) then password will be as it is else if old password format (8 characters), it will only take first 8 characters. any characters behind don't care..kena chopped |
|
|
Dec 17 2018, 01:06 PM
Return to original view | Post
#6
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
|
|
|
|
|
|
Dec 17 2018, 01:13 PM
Return to original view | Post
#7
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
|
|
|
Dec 17 2018, 01:22 PM
Return to original view | Post
#8
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
QUOTE(puchongite @ Dec 17 2018, 01:16 PM) Not the same thing lar. once encrypted, it will be different alot.This is login password. The backend has been doing 8 characters password all the time mah. Sending extra characters over to back end also useless. even you plainly compare the password also different already |
|
|
Dec 17 2018, 02:37 PM
Return to original view | Post
#9
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
QUOTE(rooney723 @ Dec 17 2018, 02:31 PM) but i checked the code the logic says it will accept the password if its more than 8 characters and if the password is less than 8 characters it will take the first 8 chars, or am i wrong? if got special characters and >= 8 characters, it will pass to server as it iselse it will chop off after 8 characters. topkek betul. that's why your password + any characters behind still can pass |
|
|
Dec 17 2018, 03:06 PM
Return to original view | Post
#10
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
QUOTE(PhakFuhZai @ Dec 17 2018, 02:54 PM) dun understand its not about conflict, it about the .substring(0, 8) part.if password more >= 8 char, then the first condition wont satisfy if password is <8 char, then it only check up to 8th character no conflicts what means if it doesn't satisfy the first condition, it will only take the first 8 characters of the password e.g: your password is 123456789 since it doesn't satisfy the first condition, it will take first 8 characters which is 12345678 logically, 123456789 is not the same as 12345678. even if you plainly compare it is not the same. so those who want to attack the site, just need to guess for 8 characters which lessen the time to guess a correct password what they should do (IMO) is just send the password to server as it is instead of plainly showing to the world the checking. |
|
|
Dec 17 2018, 03:25 PM
Return to original view | Post
#11
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
QUOTE(rooney723 @ Dec 17 2018, 03:15 PM) that means if i want to attack the site, i only have to keep spamming 9 chars without special chars and the password will be accepted as a legacy 8 chars no special char password and its much easier to brute force 8 chars without special chars if the user doesn't change the password then yea. just brute force 8 characters and eventually will enterthe devs really damn bodo for putting the substring part, it isnt necessary at all that's why it now has the captcha thingy to slowdown the brute force that's why really topkek the code. first time see password taken by substring and it is a bank! not some cheap blog or what. |
|
|
Dec 17 2018, 03:28 PM
Return to original view | Post
#12
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
|
|
|
Dec 17 2018, 03:31 PM
Return to original view | Post
#13
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
|
|
|
|
|
|
Dec 17 2018, 03:32 PM
Return to original view | Post
#14
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
QUOTE(heinlein @ Dec 17 2018, 03:29 PM) Because of the news, I login check, lose RM49.04. No missing card, no TAC, no MSOS. The transfer can be made. Call paypal support found out both of my CIMB cards is linked to unknown paypal account holder. Requested permanent freeze at paypal and wait the missing money to be refunded from paypal. Waiting.... is the transaction listed at transaction history?ps: cimb is not helping much, robot copy and paste to me only. just now i check mine got nothing suspicious |
|
|
Dec 17 2018, 03:46 PM
Return to original view | Post
#15
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
QUOTE(heinlein @ Dec 17 2018, 03:37 PM) The transaction is listed in my cimb account on 6 dec 2018. I received suspicious sms my debit card was charged RM 52.32 in paypal on 4 dec 2018 but that day when i check, nothing is deducted in my account. As on today, I only login check and found RM49.04 was deducted on 6 dec 2018 Oh. I didn't receive anything suspicious message from cimb. Hope nothing happen to me |
|
|
Dec 17 2018, 03:56 PM
Return to original view | Post
#16
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
QUOTE(heinlein @ Dec 17 2018, 03:49 PM) After received my refund, gonna close cimb acc. No confident already. Imagine my card being used by random people in paypal. I thought is some nigga scammer from other country but the customer support tell me is malaysian account holder My sister also kena from cimb last few weeks. Few transactions of steam games |
|
|
Dec 17 2018, 08:15 PM
Return to original view | IPv6 | Post
#17
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
QUOTE(okuribito @ Dec 17 2018, 07:54 PM) I guess this code snippet was lifted off the net today? ie current code, right? the problem here is the Haven't read all posts here, but remember reading something about a recent change by CIMB to allow longer pw & with special characters? And because some incompetent coder wrote the above snippet, hence the exploit was created? Help me understand the logic... if PW is at least 8char long, and includes special chars, then the entire pw string is passed to encryption function if PW is at least 8char long, and dun include special chars, then the long pw is truncated & the front 8char string is passed to encryption function if PW is < 8char long eg 7char or less, irrespective got special characters or not, then what happens? Won't password = password.substring(0, 8) evaluate to #error? Previously, wasn't there a minimum # of characters for passwords ie 8? PS: i dunno coding. only trying to make sense of the if-then-else which is also used in excel CODE password = password.substring(0, 8) this means as long as the first 8 characters are correct, the hacker can enter. but by logic, "123456789" is not the same as "12345678". even with plain comparison, it is not the same. secondly, this shows the hacker only need to focus on accounts with 8 alphanumeric characters. |
|
|
Dec 18 2018, 01:54 PM
Return to original view | IPv6 | Post
#18
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
QUOTE(okuribito @ Dec 18 2018, 01:44 PM) so let's say your old pw was 12345678H%&*GGhklp ... yesterday se7en got post the code script. 1. before 18 nov, were you able to get in with just 12345678? with 12345678H? or only with 12345678H%&*GGhklp? 2. After 18 nov, were you able to get in with just 12345678? with 12345678H? or only with 12345678H%&*GGhklp? curious to figure out what cimb is doing the checking is:- if got no special characters and >= 8 characters (means new format of password), you will require to type exactly your password else (old password password), you only need to be correct on the first 8 characters. meaning if old format of password, any characters behind after 8th characters, if user type in wrongly, user will still be logged in |
|
|
Dec 18 2018, 03:36 PM
Return to original view | IPv6 | Post
#19
|
![]() ![]()
Junior Member
285 posts Joined: Mar 2010 |
QUOTE(okuribito @ Dec 18 2018, 02:13 PM) Thx bro, saw that & thinking thru the implications. How does CIMB store passwords? As Is? or after hashing? hashed/salted or not i no idea.If after hashing, old passwords longer than 8char should not be able to get in if just key in first 8 chars. Why? becos the hash would be diff. No? Only way can get in is IF the old password was stored As Is. Wonder if that makes sense good question you asked. but probably, with old format of password, CIMB also only takes in 8 character. e.g: you create account with password abc1234567890, before inserting into database, it only takes in abc12345 and hash/salt it. this is to my assumption only. i got no idea how they work on the password. if it stored as plain text then |
| Change to: | 0.0641sec
0.63
7 queries
GZIP Disabled
Time is now: 12th December 2025 - 10:22 AM |