Bungie.net Community
This topic has moved here: Subject: Group Immunity Guide
  • Subject: Group Immunity Guide
  • Pages:
  • 1
  • 2
  • of 2
Subject: Group Immunity Guide
  • gamertag:
  • user homepage:
  • last post: 01.01.0001 12:00 AM PDT

Actually, a brute force attack is not the first method one would approach when trying to hack a website such a Bungie.net. It's a well-known fact that Passport is exposed to cookie attacks. What this means is that for older IE users, you are volnurable to an attemp to either take your unencrypted cookie files, or for someone to intercept them while they are being sent to Passport.

What does this mean? It means that with the guides available on the internet, one could probably hack Bungie.net within the hour. I was warned about this recently, and I have Firefox set to clear cookies whenever I exit a session. It is likely that this flaw was how MBT was exploited recently for no traceable reason, and I recommend you protect against it.

Yes I read this, and no I won't provide you with the article. This is merely informative, not instructive. lol

  • 06.09.2006 10:02 PM PDT
  • gamertag: [none]
  • user homepage:

I really don't think a whole "guide" is needed for something as simple as not giving out powers to people you don't know.

-TGP-

  • 06.09.2006 11:17 PM PDT

Official Town Drunk of Sandwichia. Nation of the Flood.
MBT - Impossible Just Happened
* How is it that "Fat Chance" and "Slim Chance" mean the same thing?
* If you choke a Smurf, what color will it turn?

XBOX User Space profile

Posted by: Great_Pretender
I really don't think a whole "guide" is needed for something as simple as not giving out powers to people you don't know.

-TGP-


have you seen some of the people on these forums?

  • 06.09.2006 11:20 PM PDT
  •  | 
  • Exalted Mythic Member

News? Podcasts? Machinima? Active forums? Competitions? Jaffa Cakes!? OMG!
Thee Warriors!

Best. Mod. Ever.

I'm afraid I'd have to disagree TGP. People need to become more aware of the troubles that are happening in the groups. Conquerers are a major problem.

  • 06.10.2006 5:26 AM PDT
  • gamertag: [none]
  • user homepage:

Posted by: mr poopoo232
its like a large force of win going through fusion, thus creating a chain reaction of a huge asplosion of win destroying any fail within its awesomeness.

Posted by: m00zor campycow
Actually, a brute force attack is not the first method one would approach when trying to hack a website such a Bungie.net. It's a well-known fact that Passport is exposed to cookie attacks. What this means is that for older IE users, you are volnurable to an attemp to either take your unencrypted cookie files, or for someone to intercept them while they are being sent to Passport.

What does this mean? It means that with the guides available on the internet, one could probably hack Bungie.net within the hour. I was warned about this recently, and I have Firefox set to clear cookies whenever I exit a session. It is likely that this flaw was how MBT was exploited recently for no traceable reason, and I recommend you protect against it.

Yes I read this, and no I won't provide you with the article. This is merely informative, not instructive. lol


Yes, I am the one that brought up this article. Like m00z said, he won't provide you with an article. But I'll provide you a snippit on prevention from this article.


If you are a user of Microsoft Passport, it is recommended that you browse with great care. Do not ever check the box when logging into Passport that reads Sign me in automatically on this computer. This creates the MSPSec cookie documented above that is used to automatically log you in without having to reenter your password at participating sites. When this cookie is compromised, it represents the greatest danger to your account.

It is also recommended that you only log into Passport before browsing sites that require Passport and log out immediately after your visit. Logging out essentially destroys the majority of your cookies, so that they cannot be compromised by further browsing.

Most importantly, I recommend that you do not use a browser with the vulnerability I have described. If you are using a vulnerable browser, Microsoft Internet Explorer (all versions prior to 5.5), and wish to continue using it, there is a patch available to repair this bug located at http://www.microsoft.com/technet/security/bulletin/ms00-0 33.asp.


[Edited on 6/10/2006]

  • 06.10.2006 7:10 AM PDT

  • Pages:
  • 1
  • 2
  • of 2