This Diagram Shows Exactly How The PSN Was Hacked

"If a picture is worth a thousand words, then this one is probably worth about 10 million or so. After Sony‘s press conference last night, this is one of the illustrations that was given to the press"

The story is too old to be commented.
Joni-Ice2761d ago

I dont understand that diagram. Someone make sense of it please.

CrzyFooL2761d ago (Edited 2761d ago )

They sent some sort of worm into a vulnerable spot that bypassed like two firewalls... or something.

joeorc2761d ago

They sent some sort of worm into a vulnerable spot that bypassed like two firewalls... or something. "

the answer is (3) firewall's, not including other software defenses!

Trey_4_life2761d ago

These hackers make me sick ruining millions of PSN users using the technique shown in the diagram.

Hope the FBI do catch them.

inveni02761d ago

The diagram doesn't actually say anything that wasn't already obvious. We already knew that Sony had firewalls in place, and that the firewalls had to be bypassed in order for an intrusion to occur. This is just filler.

gamerzBEreal172761d ago

"These hackers make me sick ruining millions of PSN users using the technique shown in the diagram.

Hope the FBI do catch them."

what are the female body investigators gunna do?

+ Show (3) more repliesLast reply 2760d ago
Godmars2902761d ago

Yeah, it does have a certain sock gnome order towards profit quality to it.

ravinash2761d ago (Edited 2761d ago )

A little vague (not surprising)

But there's your answer to anyone who thinks that can sue Sony for negligence.
Three firewalls between the internet and the main database.
Yes someone found a crack in the system to get through them, but it will be hard to prove that sony did not put in enough effort to protect the system.

B1663r2761d ago

They were negligent because they had no trip wire defense system in place. They had no centralized log server, and they left their servers unpatched to known exploits. They had no official data security policy in place. There was no one on staff capable of devising such a policy.

Again, their core server being rooted, then having a rootkit installed does not bode well for their audit of PCI-DSS compliance (they are supposed to be running some sort of anti-virus software... lol)

Sony is on the hook for all the damages caused here.

Also, their continued lawyerly non-answer about cc#'s and c2v numbers is all you need to know. Why is Sony gonna pay for you to change your cc# if they are not responsible, hmm?

The hackers got in, they were in there undetected for a while, they got EVERYTHING.

This is bigger than RROD.

kneon2761d ago

I've never had to pay to change my credit card #. I travel all over the planet on a regular basis so it's almost inevitable that I occasionally have some mysterious charges show up. I've had to change card numbers several times in the past 10 years and it's never cost me anything other than 5 minutes on the phone.

WhittO2761d ago

I can't believe SO much personal info was just left un-encrypted! Passwords etc were just left with no protection if accessed!

Klaykid1232761d ago


Sony said passwords weren't encrypted, but "hashed".

+ Show (1) more replyLast reply 2761d ago
Blad3star2761d ago

My only concern right is that we will probally have some black outs and glitches once PSN is up because Sony did start the upgrade from scratch and they wont have time to BETA test it.

Redempteur2761d ago

all these days of down times are for testing ..

a modification is simple ..but then there are plenty of tests and verification to see that it works properly for everyone


You have a point, but anyone is reading PS Blog?

''Q: When will the PlayStation Network and Qriocity be back online?
A: Our employees have been working day and night to restore operations as quickly as possible, and we expect to have some services up and running within a week from yesterday. However, we want to be very clear that we will only restore operations when we are confident that the network is secure. ''

Christopher2761d ago (Edited 2761d ago )

There really isn't an easy way to say this.

1. Find and utilize a vulnerability in the Application Server by sending data through the Web server as a "customer" and analyzing the response from the application server.

2. Inject a tool onto the application server that can be used to route db attack protocols through the vulnerability. Personally not sure how one would do this, though I'm assuming that CFW opened up some information on how data is sent from the customer perspective.

3. Run attacks against the db through the injected tool, resulting in eventually opening up each table to viewing. If you have access to the db, you can eventually access the data. Best practice for DB security is to prevent access to it.

#1 and #2 are not basic attack concepts and requires a high level of technical knowledge and know-how.

Joni-Ice2761d ago (Edited 2761d ago )

WHAT! I don't know what the hell you just said. You lost me at "Find" then everything went black. lol....Dont know why but it made me want to play MGS4.

gamingdroid2761d ago (Edited 2761d ago )

1. That is what every hack attempt to do when trying to get to the database. You prod the server to try and blue-print the stack.

2. Try to inject some code (like a buffer overun) to get shell access.

3. It was mention that they attacked an admin account, something equivalent to a root? Open the database and voila!

Now, if data was encrypted a lot less damaging.

Without more details of the actual hack, sounds like standard fare to me.

Christopher2761d ago

1. Not every. Most Web sites, for example, only require bypassing Web Server level security to get to the db.

2. This is where I don't have any experience. Specifically with sending code that wouldn't be stripped by either level of securities (Web and Application Server) to create a protocol that would act as your pathway to the db. I can imagine it being done, but I wouldn't know what one would need to do in order to do it without being caught by IDS/IPS.

3. Not sure it would matter once you got to the level that they did. DBs are way too easy to get into once you have fairly direct access, which you would from the Application Server. Combination of binary and hex data prods if they're on SQL servers and it will pretty much open it up for you. This is a huge issue right now with ASP VBScript sites still running out there since Microsoft stopped supporting it. Lots of ways to bypass certain protocols to spoof data through your header data.

50Terabytespersec2760d ago

Must of been an Windows Application server (lol)or is it custom Linux boxes??? Also it is obvious that they did not heavily invest in the security of our personal data as the cost would not of been worth the actually loss incurred by this breach.
So for a publicly traded company I say this " next time think of your customers not your Dollars!"
I hope this doesn't take away from them building a PS4 with SSD drive in it!!
Also whats the BS with KZ3 having no in game custom sound track like part 2?????
If this is the case with PS4 I will gladly by go back to PC gaming!!

Masterchef20072760d ago

Speak english my good man. You really make me feel like a moron with your extremely technical dialect.

bozebo2760d ago (Edited 2760d ago )

The fact that they had an Application server at all nearly proves that they use Microsoft servers (like 95% of large companies do).

So the hackers looked up some latest vulnerabilities for IIS. Pretty simple.

There is no IIS network in the entire world that is secure, none, not one, ever. Sony will be switching to a full Linux system right now. (except office workstations, so they are still vulnerable... lol)

blahblah2760d ago (Edited 2760d ago )

"Best practice for DB security is to prevent access to it."

major problem being that you need some access to it in 99.99% and application server injection has already passed by firewall.

but if you mean to say it should be exposed with restricted API done in specialized custom built protocol and run in userland chrooted environment. yes, hiding is best practice;)

@bozebo: "The fact that they had an Application server at all nearly proves that they use Microsoft servers (like 95% of large companies do)."

you really don't know what application server is, don't you? i'm avid linux fan and wouldn't touch windows even with remote on empty batteries. but, ... application server categorizes any protocol exposed API. even apache and webservice made script fit the bill. not to mention any application that does it fully, like multi tier db access for example.

and, if you are linux enthusiast like me, i'd suggest hoping that sony will avoid it like plague. sony meddling into it would only bring sorrow. imagine broadcom, nvidia and likes are actually really friendly to linux compared to sony

Christopher2760d ago

***but if you mean to say it should be exposed with restricted API done in specialized custom built protocol and run in userland chrooted environment. yes, hiding is best practice;)***

That would be covered under "preventing access"...

Whether it's through parameterization, user access limitations, middleman web services, and others, it's a method of preventing access. Perhaps better word would have been limitation of access... but that's a preventive measure unto itself.

+ Show (5) more repliesLast reply 2760d ago
jke822761d ago (Edited 2761d ago )

networking not being my strong point pretty sure it goes vulnerablity in access to application server and to my understanding they could fake a legit application trying to access psn database, since the application server has full trusted access your shit gets stolen and totally bypasses all the firewalls in between

edit: cgoodno said it better

frostypants2760d ago

This diagram is actually very generic, and isn't really specific to this PSN attack. Most corporate sites can be looked at this way. I.E., 3 layers: the website, which sits on top of an application server, which sits on top of a database environment. Websites make constant requests and submissions to the application server, meaning that a clever person can figure out ways to interact with the application server in ways not intended by the developer. If the hacker somehow manages to do so, and successfully plants a means of obtaining further control at that app server level, they are now "inside" and in many corporations would have an easy route to the database.

+ Show (4) more repliesLast reply 2760d ago
ravinash2761d ago

It would be interneting to see where this application they used came from.

ALFAxD_CENTAURO2761d ago (Edited 2761d ago )

The Hackers are suppose to detect those holes and let them know to the owner (like in various cases) there is a hole in the system, without harming, stealing, or to improve security and in the end is a WIN WIN in both sides (the white hat Hackers), this is not the case.

This annoying Hackers, are the Crackers, also known as the ''Black Hat'' Hackers, they steal and harm everything.

Mario182761d ago (Edited 2761d ago )

A blue guy using a laptop, over the internet, sent arrows to communication tools and account information.

The bricks and concrete shows how a house is supposed to be made. The top concrete joins with the bottom followed by 3 large blocks of bricks.

Cosmit2760d ago

Of course! It was right in front of us the whole time. This makes perfect sense! :P

Lol nice one! :D

Anonymous_2761d ago ShowReplies(1)