<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom"><title>Michael Jay Lissner</title><link href="https://michaeljaylissner.com/" rel="alternate"></link><link href="https://michaeljaylissner.com/feeds/tag/hacking" rel="self"></link><id>https://michaeljaylissner.com/</id><updated>2012-09-16T10:33:31-07:00</updated><entry><title>Calculating the average elevation of a trip using a TCX file</title><link href="https://michaeljaylissner.com/posts/2012/09/16/calculate-the-average-elevation-for-a-trip-using-a-tcx-file/" rel="alternate"></link><updated>2012-09-16T10:33:31-07:00</updated><author><name>Mike Lissner</name></author><id>tag:michaeljaylissner.com,2012-09-16:posts/2012/09/16/calculate-the-average-elevation-for-a-trip-using-a-tcx-file/</id><summary type="html">&lt;p&gt;If you use a site like &lt;a href="http://ridewithgps.com"&gt;ridewithgps&lt;/a&gt;, something you may want to know is how to calculate the average elevation for a trip. Unfortunately, most sites don&amp;#8217;t seem to provide this, so we have to do a little&amp;nbsp;hacking. &lt;/p&gt;
&lt;p&gt;Here&amp;#8217;s what worked for&amp;nbsp;me:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;download the &lt;span class="caps"&gt;GPS&lt;/span&gt; &lt;span class="caps"&gt;TCX&lt;/span&gt;&amp;nbsp;file&lt;/li&gt;
&lt;li&gt;grep out the altitude lines (&lt;code&gt;grep -i 'altitude' your_file.tcx&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;find &lt;span class="amp"&gt;&amp;amp;&lt;/span&gt; replace out the remaining &lt;span class="caps"&gt;XML&lt;/span&gt; tags and whitespace using a basic text&amp;nbsp;editor&lt;/li&gt;
&lt;li&gt;average the remaining values in a&amp;nbsp;spreadsheet&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Takes about five minutes. For &lt;a href="http://ridewithgps.com/routes/1701701"&gt;my trip&lt;/a&gt; the number came out to be 10,753&amp;nbsp;feet!&lt;/p&gt;</summary><category term="ridewithgps"></category><category term="hiking"></category><category term="hacking"></category><category term="GPS"></category><category term="elevation"></category><category term="biking"></category></entry><entry><title>URL Hacking at REI.com</title><link href="https://michaeljaylissner.com/posts/2012/07/31/url-hacking-at-rei-dot-com/" rel="alternate"></link><updated>2012-07-31T19:19:00-07:00</updated><author><name>Mike Lissner</name></author><id>tag:michaeljaylissner.com,2012-07-31:posts/2012/07/31/url-hacking-at-rei-dot-com/</id><summary type="html">&lt;p&gt;I&amp;#8217;m about two hours away from heading on vacation to Montreal, but I wanted to post a quick update about a vulnerability I found on &lt;span class="caps"&gt;REI&lt;/span&gt;.com last&amp;nbsp;night.&lt;/p&gt;
&lt;p&gt;The vulnerability was a simple one. A few days ago, to get a 15% off coupon, I signed up for their Gear Mail newsletter. It eventually came, and at the bottom it had a link to unsubscribe, which I clicked (I was only after the 15% sign-up&amp;nbsp;coupon). &lt;/p&gt;
&lt;p&gt;The link led&amp;nbsp;to:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre&gt;&lt;span class="nl"&gt;http:&lt;/span&gt;&lt;span class="c1"&gt;//email.rei.com/cgi-bin12/DM/t/nCT4n0N3xbv0ESo05DPf0Et&amp;amp;EmailAddr=mlissner@michaeljaylissner.com&lt;/span&gt;
&lt;/pre&gt;&lt;/div&gt;


&lt;p&gt;Which redirects&amp;nbsp;to:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre&gt;&lt;span class="nl"&gt;https:&lt;/span&gt;&lt;span class="c1"&gt;//preferences.rei.com/rei/rei_PrefCtr.asp?EmailAddr=mlissner@michaeljaylissner.com&lt;/span&gt;
&lt;/pre&gt;&lt;/div&gt;


&lt;p&gt;I immediately noticed the badness in these URLs, and at a whim, I tried modifying the &lt;span class="caps"&gt;URL&lt;/span&gt; to use a friend&amp;#8217;s email address. Sure enough it worked, and I could look up the full name and zip code of anybody who had an email address that was in &lt;span class="caps"&gt;REI&lt;/span&gt;&amp;#8217;s&amp;nbsp;system.&lt;/p&gt;
&lt;p&gt;Around midnight last night, I sent &lt;span class="caps"&gt;REI&lt;/span&gt; an email informing them of the problem, giving them a month to fix it, and I posted on Twitter that I had found a vulnerability on &lt;span class="caps"&gt;REI&lt;/span&gt;.com. Naively, I thought that if I didn&amp;#8217;t post the link on Twitter, nobody would be able to figure it out, but of course, by morning a friend of mine (a security/privacy researcher, sigh) had found the link and posted it. Not only that, but for fun, he had tried his address book against the link, and turned up 30 of his friend&amp;#8217;s names and zip codes out of a sample of about&amp;nbsp;200.&lt;/p&gt;
&lt;p&gt;I sent another note to &lt;span class="caps"&gt;REI&lt;/span&gt; to make sure that they knew about the link now being in the open, and that the month I promised them had been curtailed by my own&amp;nbsp;mistake. &lt;/p&gt;
&lt;p&gt;It&amp;#8217;s now 7:15pm, about 19 hours after I first informed them of the problem, and it&amp;#8217;s fixed. It still seems to be possible for me to update your email subscriptions, but at least I can&amp;#8217;t look up information about&amp;nbsp;you.&lt;/p&gt;</summary><category term="responsible disclosure"></category><category term="rei"></category><category term="hacking"></category></entry><entry><title>Bypass Form Protection in MS Word</title><link href="https://michaeljaylissner.com/posts/2008/04/18/bypass-form-protections-in-microsoft-word/" rel="alternate"></link><updated>2008-04-18T10:13:22-07:00</updated><author><name>Mike Lissner</name></author><id>tag:michaeljaylissner.com,2008-04-18:posts/2008/04/18/bypass-form-protections-in-microsoft-word/</id><summary type="html">&lt;p&gt;I recently had the occasion to need to get around the form protection in an 
&lt;span class="caps"&gt;MS&lt;/span&gt; Word file. Turns out it&amp;#8217;s a pretty easy exploit, but the directions I 
found elsewhere on the internet didn&amp;#8217;t quite do the&amp;nbsp;job. &lt;/p&gt;
&lt;p&gt;Here&amp;#8217;s the&amp;nbsp;trick:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Open the protected document, and save it as an .html&amp;nbsp;file.&lt;/li&gt;
&lt;li&gt;Close the .doc file, and open the .html file in a text editor such as notepad or &lt;span class="caps"&gt;GVIM&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;In the .html file, find a tag that says something like: &amp;#8220;&amp;lt;w:UnprotectPassword&amp;gt;&lt;span class="caps"&gt;ABCDEF01&lt;/span&gt;&amp;lt;/w:UnprotectPassword&amp;gt;&amp;#8221;&lt;/li&gt;
&lt;li&gt;Replace each of the characters in the tag with zeroes so it reads: &lt;code&gt;&amp;lt;
w:UnprotectPassword&amp;gt;00000000&amp;lt;/w:UnprotectPassword&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Open the .html file in Word, and save it as a .doc. Go to Tools &amp;gt; Unprotect&amp;nbsp;Document&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;That should do it. I&amp;#8217;d love to hear any evidence to the&amp;nbsp;contrary. &lt;/p&gt;</summary><category term="microsoft"></category><category term="msword"></category><category term="hacking"></category></entry></feed>