close ad
 
Important WebAssist Announcement
open ad
View Menu

Technical Support Forums

Free, outstanding support from WebAssist and your colleagues

rating

How did this happen?

Thread began 11/22/2014 3:39 am by mrs | Last modified 11/26/2014 9:12 am by Jason Byrnes | 1262 views | 5 replies |

mrs

How did this happen?

I've had some tool use my membership sign up form, but what they've done is create an automated email response that doesn't match my database fields. How have they managed to achieve this:

Please verify your email address

To gain full access to the website, you must first verify your email address.
Form Submitted: 11-22-2014 | 3:39 AM UTC

title: bonnet visiere timberland
url: http://www.capteo.com/wp-content/cache/meta/fr-timberland/OnEhFf7axM/
excerpt: Can you tell us more about this? I'd want to find out some additional information.
blog name: bonnet visiere timberland
Email Verification Link:
http://www.showmetransport.com/user-verified.php?id=&randomString=c7qck8ot7b&email=

The only field in this that matches my database is Email Verification Link

What have they done to override my info, how have they managed to get past my required fields, and what should I be looking for if I've been subjected to some sort of cyber attack?

No entry has been made to the users table in the database, so I am concerned that I need to know what else may be afoot!

Thanks.

Sign in to reply to this post

Jason ByrnesWebAssist

most likely you are using different triggers int he Behaviors for sending the email, and Validating / inserting to the database.

Make sure that all the behaviors use the same trigger.

if it is set up where validation uses a trigger Button Submit pressed, and the email behavior is set to any form post, it can pretty easy to get around the validation, an attacker would save the source of your page to a local copy, then edit the name of the submit button and change the form action to post to the page on your site.

By changing the submit button name, they by pass the validation, but still trigger sending the email.

Sign in to reply to this post

mrs

I've not looked to see if that's the problem, but regardless of how they've achieved it, is it possible for them to have done something malicious? What should I look for?

Thanks.

Sign in to reply to this post

Jason ByrnesWebAssist

No, I don't believe they have done anything malicious other then send the email

Sign in to reply to this post

mrs

OK, thank you for your advice on this. Hacking isn't my forte, I wouldn't even know where to start doing it, as a result, I don't really know how to defend against it other than ensure I have strong passwords etc.

Sign in to reply to this post

Jason ByrnesWebAssist

You're welcome.

Sign in to reply to this post

Build websites with a little help from your friends

Your friends over here at WebAssist! These Dreamweaver extensions will assist you in building unlimited, custom websites.

Build websites from already-built web applications

These out-of-the-box solutions provide you proven, tested applications that can be up and running now.  Build a store, a gallery, or a web-based email solution.

Want your website pre-built and hosted?

Close Windowclose

Rate your experience or provide feedback on this page

Account or customer service questions?
Please user our contact form.

Need technical support?
Please visit support to ask a question

Content

rating

Layout

rating

Ease of use

rating

security code refresh image

We do not respond to comments submitted from this page directly, but we do read and analyze any feedback and will use it to help make your experience better in the future.

Close Windowclose

We were unable to retrieve the attached file

Close Windowclose

Attach and remove files

add attachmentAdd attachment
Close Windowclose

Enter the URL you would like to link to in your post

Close Windowclose

This is how you use right click RTF editing

Enable right click RTF editing option allows you to add html markup into your tutorial such as images, bulleted lists, files and more...

-- click to close --

Uploading file...