Quantcast
Channel: Justin Shafer
Viewing all 123 articles
Browse latest View live

Williamsport PA Databreach Update

$
0
0
Williamsport PA Databreach Update
http://www.databreaches.net/ocr-closes-case-on-lanap-dental-implants-of-pennsylvania-patient-data-breach/

I heard OCR closed their investigation (Thanks Pogo!) into this easy to investigate databreach. I thought I would post my findings into who I think caused the breach, to clear up any final confusion.

I think it COULD have been a bartender down the road who found a USB Flash Drive in the middle of the road, and uploaded it to the piratebay, as someone seems to have previously uploaded their Point Of Sale (POS) Software called Plexis. Yesterday I did some detective work of my own, leading me to THINK it may have been a barternder. OR.. it is possible someone dislikes the bartender, and is posing as him.

All I did was try to help a town, and for this I was blamed for a breach, and it seems like the government NEVER actually investigated the databreach. Even better I read that the OCR said the CE has improved their security by upgrading to a higher version of DENTRIX. They might as well just give that credit to me. I truly do not think a thorough investigation was performed, as I never even got a phonecall from OCR.... kinda like my last VU# with Dentrix and CERT....................................................................

Personally I want to know when a bar called RumRunnersPub purchased their Plexis Software and from who. I think it could of been around October 2006 though they opened in May of 2006 and purchased from POSGuys.com. 

How would I be able to take a wild guess like this????? I have never been to Pennsylvania. I suppose it is possible I just called the bar one day and asked......... But I know I have never done that.........

 I think whoever uploaded the Plexis torrent, uploaded the Dentrix Torrent... maybe there is some correlation between the two uploads? Most of the time nobody has any geographic idea where torrents come from, but I know Dentrix came from Williamsport, PA. The person or piratebay user (zeusgodz) who uploaded the torrent, said around when and where they bought Plexis from.

Perhaps the answer lies in RumRunnersPub.. follow the trail.

In summary: If you are thinking of disclosing a breach, you may have second thoughts after reading this.

Maybe I should have listened to Bangerter\Dentrix:
=====================================================================
From: Bangerter, Howard [mailto:Howard.Bangerter@henryschein.com]
Sent: Monday, September 17, 2012 10:04 AM
To: Justin Shafer
Cc: Roberts, Steve (Utah)
Subject: RE: hmm

Nice catch! Wow.

Whatever you do,  please don’t out the Dr.   Hopefully, he’s already on G5. . .
=====================================================================

If you are unfamiliar with the breach, you can watch the video here:






1. I know that zeusgodz uploaded Dentrix and Plexis POS.
http://thepiratebay.org.ua/user/zeusgodz/
2. I know a youtube user called zeusgodz lives near or in Williamsport. 
I GOOGLED "Williamsport Zeusgodz"
https://www.youtube.com/user/zeusgodz (Read the comments) and he likes the RumRunnersPub
3. According to JamBase there was a website called ZeusGodz.com in Williamsport
http://www.jambase.com/shows/event.aspx?EventID=1267194
4. ZeusGodz.com redirects to RumRunnersPub in 2011! 
https://web.archive.org/web/20110209085349/http://zeusgodz.com
https://web.archive.org/web/20110209085349/http://rumrunnerspub.com
5. Oh look, is that PLEXIS I SEE??? 
https://www.facebook.com/rumrunnerspub/photos/pb.45551319779.-2207520000.1448129719./332205204779/?type=3&theater
6. IT IS!
http://www.plexispos.com

7. https://whois.domaintools.com/zeusgodz.com
Oddly enough the WHOIS information changed on 12/02/2013. Zeusgodz76@gmail.com and Jason Pfirman were removed. That is the same day Dave Bohman went around town to do interviews about the databreach.Odd coincidence?
This is what it said BEFORE:
Reverse Whois:
zeusgodz76@gmail.com
Registered through: GoDaddy.com, LLC (http://www.godaddy.com)
Domain Name: ZEUSGODZ.COM
Created on: 21-Oct-09
Expires on: 21-Oct-13
Last Updated on: 22-Oct-11

Registrant:
Jason Pfirman
605 Hawthorne Ave
Williamsport, Pennsylvania 17701
United States

Administrative Contact:
Pfirman, Jason zeusgodz76@gmail.com
605 Hawthorne Ave
Williamsport, Pennsylvania 17701
United States
5703220303

Technical Contact:
Pfirman, Jason zeusgodz76@gmail.com
605 Hawthorne Ave
Williamsport, Pennsylvania 17701
United States
5703220303

Domain servers in listed order:
NS39.DOMAINCONTROL.COM
NS40.DOMAINCONTROL.COM
8. Possibly attended Williamsport HS graduating year 1994: 2 names stand out to me, ZeusGodz and Jason Pfirman. They were posted at different dates??? Strange. Poser?
http://www.tree52.com/Groups_Class.php?csc=1994&csi=3295&csn=South%20Williamsport%20Area%20Jr.%2FSr.%20H.S
9. Rum Runners is in close proximity to LANAP


10. http://www.fixya.com/users/zeusgodz76 (Works with POS and computers)
ZeusGodz76 posted a question about Epson TM U325D Matrix Printer:

"This is a POS impact printer with a 25 pin serial connection on the back. I have connected..."
ZeusGodz76 ZeusGodz76Over a year agoGo to question page »

11. Another youtube account relating to Williamsport and ZeusGod
https://www.youtube.com/user/zeusgodz76/feed
https://www.youtube.com/user/zeusgodz76/about
"Just some random guy tryin' to survive on this dumb-ass planet, surrounded by a lot of stupid-ass people."
I have felt this way before.


12. Leader of "Team Heretic" Clan
13. At one time (2010) rumrunnerspub.com WHOIS was zeusgodz email
Whois Record for 2011-10-03
« Previous (2010-10-08)Next (2011-12-10) »
Domain:
rumrunnerspub.com
Record Date: 2011-10-03
Registrar: GODADDY.COM, INC.
Server: whois.godaddy.com
Created: 2006-10-10
Updated: 2010-10-11
Expires: 2012-10-10
Reverse Whois:
zeusgodz76@gmail.com

Registrant:
Mary Rudinski
341 Market Street
Williamsport, PA 17701
United States

Registered through: GoDaddy.com, Inc. (http://www.godaddy.com)
Domain Name: RUMRUNNERSPUB.COM
Created on: 10-Oct-06
Expires on: 10-Oct-12
Last Updated on: 11-Oct-10

Administrative Contact:
Rudinski, Mary zeusgodz76@gmail.com
341 Market Street
Williamsport, PA 17701
United States
+1.5703220303 Fax --

Technical Contact:
Rudinski, Mary zeusgodz76@gmail.com
341 Market Street
Williamsport, PA 17701
United States
+1.5703220303 Fax --

Domain servers in listed order:
NS33.DOMAINCONTROL.COM
NS34.DOMAINCONTROL.COM

14. Did RumRunnersPub purchase Plexis between 10-15-2006 and 10-21-2006 Version 2.8.8.19 from POSGUYS.COM???
From the torrent:
http://thepiratebay.ee/torrent/3530941/Plexis_POS_Restaurant_2.8.7.5_Full_Version_w__Keygen
zeusgodz at 2006-10-21 11:46 CET:
Decided to purchase the software because the newer versions are worth the cost. POSGuys have it for a good price so I went with them. It's not the most perfect program out there, but in my opinion, it's worth it. I guess I'm selling out, but I believe in the software I guess.
https://web.archive.org/web/20061016101822/http://www.plexispos.com/release_notes.asp
RELEASE NOTES
Version 2.8.8.19 Released on 10/15/2006
15. According to google this may be Jason Pfirman.


How I beat Dentrix and Dentaltown over the head with Security!

$
0
0

It all started around 2009 when I started to have fun with "security". It started with a thumbs up feature that DentalTown added, and ended with me making a FTC Statement.

http://www.dentaltown.com/dentaltown/article.aspx?aid=2623
"Data security is very cool on the cloud. I’m a big believer in establishing proven backup procedures for my clients. I’ve seen too many practices lose all of their data before I could help them. But procedures rely upon people, and too many times people don’t follow procedures. The cloud, on the other hand, is automated. Data backup is a natural part of the cloud. The doctor using Web-based dental software will never be bothered by its database backup or software upgrade worries ever again. There isn’t a better business continuity plan than the cloud."
Sigh.


After the thumbs up thing I realized I could actually ban people on DentalTown, and I did this to one person intermittently (that was actually really funny). I eventually realized that there were problems in the mechanism used to upload images as you could use it to upload shells or other peoples pictures or even deface the site.
Shell:


 After this I progressed to other websites that I won't name, but two I will. I would love to name some others but I shouldn't. I like to say, I help law enforcement though. And even a financial institution. I never thought that would happen, but to my surprise, I started seeing problems with all sorts of different websites, and I couldn't help but try to get them fixed, most of the time.

2011:
American Dental Association:
This was something called SQL Injection. I was just being a white hat, and I knew what damage this could do to dentists. I never really inspected all the databases or tables or really went into this.

Me to Howard Farran:
From: Justin Shafer [mailto:justinshafer@gmail.com]
Sent: Monday, January 17, 2011 10:36 PM
To: Howard Farran
Subject: Hacks

New stuff lately.

1.       http://dexis.com/mambo/ (I didn’t write that, it was already there.. which was funny as hell)
2.       I got into the dentrix credit card processing. They left the admin password as password. But they still haven’t completely fixed it, after I told them!
3.       ADA is open to exploit! I can look at test scores? Havent tried changing them. Gave this to Steve Roberts and I am hoping between the two of you the ADA wont get too mad. =)

Don’t share this with ANYONE. JUST YOU! And ken if you like.



Know anyone at the ADA Howard? I am giving dentrix a week until I tell them to fix the credit card stuff.

Howard Farran to Me:
From: Howard Farran <howard@dentaltown.com>
Date: Mon, Jan 17, 2011 at 11:48 PM
Subject: Get me all the ADA dentists emails and you just made yourself some money dude! I am serious!!!
To: Justin Shafer <justinshafer@gmail.com>


Get me all the ADA dentists emails and you just made yourself some money dude!  I am serious!!!  This is only between you and me. 

Create a great day!

Howard

Howard Farran DDS, MBA, MAGD

Today's Dental: * 10850 South 48th Street * Phoenix, Arizona 85044 USA * O) 480-893-1223 * F) 480-496-9363 * E) Howard@TodaysDental.com  * W) www.TodaysDental.com

Farran Media: * 9633 South 48th Street, Suite 200 Phoenix, Arizona 85044 USA * O) 480-480-445-9712 * F) 480-598-3450 * E) Howard@DentalTown.com  * W) www.DentalTown.com  * W) www.HygieneTown.com * W) www.OrthoTown.com *www.Facebook.com/DrHowardfarran

WHY?
From: Howard Farran [mailto:howard@dentaltown.com]
Sent: Tuesday, January 18, 2011 9:36 PM
To: justinshafer@gmail.com
Subject: The more I think about this Justin, the more you need to realize!

The more I think about this Justin, the more you need to realize!  You are going to turn more dentists onto first world dentistry than anyone!  When I just travel 100 miles south of Phoenix into Mexico the quality of the dentistry drops 90%.  If we can find these dentists, send them an email, and turn them onto first world dental information we will truly make a difference in this world!  This could be the most important project of your life! www.DentalTown.com has 140 free continuing education courses and the www.ADA.org has zero, yet they collect over $100 million a year in dues! 

Create a great day!

Howard

Howard Farran DDS, MBA, MAGD

Today's Dental: * 10850 South 48th Street * Phoenix, Arizona 85044 USA * O) 480-893-1223 * F) 480-496-9363 * E) Howard@TodaysDental.com  * W) www.TodaysDental.com

Farran Media: * 9633 South 48th Street, Suite 200 Phoenix, Arizona 85044 USA * O) 480-480-445-9712 * F) 480-598-3450 * E) Howard@DentalTown.com  * W) www.DentalTown.com  * W) www.HygieneTown.com * W) www.OrthoTown.com *www.Facebook.com/DrHowardfarran

OH! But what about the law?

Justin Shafer justinshafer@gmail.com

1/19/11
to Howard
DONT DO IT!
From: Howard Farran [mailto:howard@dentaltown.com]
Sent: Wednesday, January 19, 2011 9:04 AM
To: Justin Shafer
Subject: RE: The more I think about this Justin, the more you need to realize!

Don’t do it dude

Create a great day!

Howard

Howard Farran DDS, MBA, MAGD

Today's Dental: * 10850 South 48th Street * Phoenix, Arizona 85044 USA * O) 480-893-1223 * F) 480-496-9363 * E) Howard@TodaysDental.com  * W) www.TodaysDental.com

Farran Media: * 9633 South 48th Street, Suite 200 Phoenix, Arizona 85044 USA * O) 480-480-445-9712 * F) 480-598-3450 * E) Howard@DentalTown.com  * W) www.DentalTown.com  * W) www.HygieneTown.com * W) www.OrthoTown.com *www.Facebook.com/DrHowardfarran

Lorne Lavine:

Dental Technology Consultants drlavine@thedigitaldentist.com

2/1/11
to me
Get me those 55,000 emails and dinner is on me J Sincerely,

image001

Check out my blog: http://thedigitaldentist.blogspot.com Lorne Lavine, DMD, A+, Network+2501 W. Burbank Blvd. #303Burbank, CA 91505866.204.3398drlavine@thedigitaldentist.comwww.thedigitaldentist.com

From: Dental Technology Consultants [mailto:drlavine@thedigitaldentist.com]
Sent: Tuesday, February 01, 2011 10:56 PM
To: Justin Shafer
Subject: RE: Xray

Yup…if I knew how and could use a different IP to access, I probably would. I certainly would never advocate theft or anything like that, but if the list happened to plop into my lap, not so sure I would throw it out.

Sorry if you think less of me for that, I happen to know the value of email addresses for someone like me who uses the Internet extensively to market.

Sincerely,
image001

Lorne Lavine, DMD, A+, Network+
2501 W. Burbank Blvd. #303
Burbank, CA 91505

Howard gets Curious:

Howard Farran howard@dentaltown.com

2/3/11
to me
Now the ADA is spamming me with emails??  LOL..  How many emails did you actually get? 

Create a great day!

Howard

Howard Farran DDS, MBA, MAGD

Today's Dental: * 10850 South 48th Street * Phoenix, Arizona 85044 USA * O) 480-893-1223 * F) 480-496-9363 * E) Howard@TodaysDental.com   * W) www.TodaysDental.com * www.Facebook.com/TodaysDental

Farran Media: * 9633 South 48th Street, Suite 200 Phoenix, Arizona 85044 USA * O) 480-445-9712 * F) 480-598-3450 * E) Howard@DentalTown.com   * W) www.DentalTown.com   * W) www.HygieneTown.com  * W) www.OrthoTown.com  *www.FarranMedia.com * www.Facebook.com/DrHowardfarran

OK! 
So some time goes by and the ADA was still exploitable and I sent them an email asking them why and my response was an email from the director, in the form of a threat, I threatened to tell DentalTown Magazine (rofl):

From: OLoughlin, Kathleen T. <oloughlink@ada.org>
Date: Mon, Apr 4, 2011 at 4:57 PM
Subject: RE: Ummm
To: Justin Shafer <justinshafer@gmail.com>
Cc: "Pittman, Lalita"<pittmanl@ada.org>


Dear Mr. Shafer:

    We appreciate your interest in ADA and in ensuring the security of our computer systems.  You may be assured that we have addressed the issues with which you expressed concern and are confident that our measures are successful.  If you have specific evidence of weaknesses in our systems, or points of entry whereby you think access is possible, we would be pleased to learn more. 

    We are concerned, however, with what appear to be threats that you have made in your recent messages to publicize purported weaknesses in the ADA systems.  To make such threatswithout disclosing the nature of the alleged weaknesses, and for the apparent purpose of soliciting business from our organization, seems to us to be a questionable practice.  Moreover, we are equally concerned that you might be attempting, whether successful or not, to access ADA’s computer system in a manner that ADA has not authorized and that might therefore violate the law.

     Please understand that we do not intend to be overly contentious.  Nevertheless, we do take exception to the suggestion of actions that would have no purpose other than to embarrass the ADA and create issues with our constituents.  We take the security of our computer systems very seriously, and we hope that you are not implying anything to the contrary. 

     Should you wish to communicate with me further, please feel free to do so, but only if there is a constructive purpose to be served.  Please call me by phone if you wish to discuss.

Thank you

Kathy O’Loughlin


Kathleen T. O'Loughlin, DMD, MPH  oloughlink@ada.org
Executive Director
American Dental Association
312.440.2700
312.440.7488 (FAX)

________________________________________________________________________
American Dental Association  211 E. Chicago Ave.  Chicago,  IL 60611  www.ada.org


My Response: 
I told them I never sent them an invoice and I showed their IT guy what tool I used and everything, I sent a screenshow that said NOT FIXED!

And then they finally fixed this SQL Injection problem as far as I know. I was actually more worried about the DentPin Database but I knew to stay away from it.



What I did:
I sent Dr. Farran a large sample of just email addresses without nationalities which is just absolutely useless to send to mexican dentists. We stopped talking about this, and I stopped thinking about it.

EXCEPT THIS: I asked Steve Roberts at Henry Schein to find me a connection, and he found me the director.

Dentrix Credit Card Processing Website!
epay.dentrix.com was next though I never really meant to do this on purpose. I was at a clients house waiting for him to stop arguing with his wife, and he was paying his bills, and this login prompt was on his laptop, and I thought it would be fun to try admin and password as my credentials.





After this, I had impressed people so I got invited to a Dentrix Summit??? This is where Dentrix invites "leaders and popular people" to come up to Utah and have a circle-jerk about their software. When I arrived I was all ready to see the new Dentrix G5 Beta with the new Database. We all signed an NDA to attend.

THE LIE!

I was told Dentrix G5 would have an encrypted database and encrypted tcpip packets, but as soon as the presentation was over, and employee looked at me, and told me "It's easy!" without making to much noise. I was then asked if I would like a job at Dentrix, and I told them my mom had a stroke and my dad had a heart attack (all true), but in reality I felt like I was just being asked to aide in a cover up of lies.

I waited to see Dentrix for myself.

Henry Schein Practice Solutions advertised database encryption and security from hackers because their new database flies "low under the radar" from nefarious people. *rofl*http://web.archive.org/web/20140428021311/http://www.dentrix.com/products/dentrix/documentation/g5-white-paper.pdf 

They then asked me if I would like to work for them. 3 tech guys I didn't really know that well.


After the Summit:

I got an email from Howard Bangerter asking me if I would like to enroll in the Dentrix G5 Beta. I declined but told him I would. I noticed it had a Non-Disclosure Clause, and I figured that is what he really wanted. Then I was told by Howard Bangerter via a phone call that Sikkasoft was reading the Dentrix G5 database without being enrolled in the Dentrix Developer Program, and asked me how it might be possible, which was odd to me because someone from Utah told me that ODBC access was easy, even before I received this phone call. I told Howard that packet sniffing is the first place to start. I gave Howard the professional courtesy of saying "I am the last person you want to tell this to". 


Waiting Game 1:

Waited to see Dentrix G5 release. I was also asked if I would like to be employed at the local Schein office, but I really don't know if they knew what was going on with me and the folks at Utah... I do have this one suspicion and I will get to that later.

I got bored and decided to really read up on FairCom ACE Databases. I got a trial and read the manual, created a database, and learned how I could bypass a lot of my own security.

I finally got to see it around April 2012, and as soon as I did I blew right threw ALL security. Encryption and Authentication. I was really happy about this, because I thought I could show Dentrix, and they would just fix it, and maybe stop lying. I created a youtube video that showed the password and for this I received a phone call from Michael Allsop:




I remove the video in question, and just asked that Henry Schein take security more seriously. They told me they would and that was that. 

Dentrix G5 HotFix 1 Patch through Dentrix G5 HotFix 2:

They changed the password and that was it. This was around June of 2012. So I decided to make a post on DentalTown about it, I also emailed the good folks at Dentrix to tell them the new password.

HotFix2 was a little better, they changed a dll file that no longer showed the password in a tcpip packet, but the older dll could be swapped out and it showed the new password, so FAIL.

I showed them emails showing them me accessing my SSN and asked them if we should tell DentalTown about AES.  They asked me again to be a Dentrix Beta Tester, which I again refused. My customer number starts with 666, maybe they view me as the AntiChrist.



LightHouse 360 and Write Access:

Dentrix had given DemandForce exclusive access to the Dentrix G5 Database. This was GREAT if you had a financial interest in DemandForce, otherwise it was kinda shitty. People were upgrading to G5 to find that they could not WRITE to the database. I thought this was bad. Partly because Schein doesn't seem to give a shit about security, but on the other hand uses the security, to restrict other companies from writing to the database.

Using False Encryption to Keep Customers:

I found that Provo Dental Care was trying to leave Dentrix G5 but she was going to be charged an hourly rate to decrypt her database. This made them upset. I have also received an email from Curve Dental asking if I could do anything at all in regards to Dentrix giving them the run-around in regarding decrypting a database.
http://thedigitaldentist.com/2012/02/dentrix-g5-ships/


Dentrix 11 Database on the piratebay:

I found a database in September 2012 on a file-sharing website, and 18 people were seeding this database without realizing what they were seeding most likely. Either way this was bad, and I emailed Dentrix. Bangerter asked me not to "out the doctor" because he was probably already on Dentrix G5. I informed Howard my SSN had not changed between 11 and G5 letting him know that I wasn't buying their security bullshit, and I called the doctor to let him know, and then Howard followed up. Howard told me again not to out the doctor. I had a feeling they would blame me if I did. Just a hunch.


US-CERT & DentalTown Ad:

Since they asked me not to out the doctor, for a very serious breach, I sensed a real culture problem at Henry Schein, so I decided I should probably tell US-CERT about Dentrix. This was going to have serious reprocussions on my business and contacts\relationships, but I felt like this shouldn't matter because a lie is a lie is a lie, and someone should try to stop them.

US-CERT created VU# 948155 in response, in October of 2012 and during this time was working with Schein.

While all of this was going on, Schein decided to go ahead and advertise encryption and safety from hackers, before the first VU# from US-CERT was even public on DentalTown.


This irritated me, mainly because they were now ignoring my work. This is fine if your just some ho-hum company, but when your in charge of writing the nations #1 PMS Software in Dentistry... not good culture. During this time I pleaded with Howard Goldstein at Dentaltown which he told me:

From: Howard Goldstein <HoGo@farranmedia.com>Date: Tue, Nov 6, 2012 at 8:49 PMSubject: RE: oh yeahTo: Justin Shafer <justinshafer@gmail.com>, howard.bangerter@henryschein.com

Justin-You are much smarter than I am with technology and I listen to you.However I am much smarter than you with common senseJEven if you are right, common sense says that it is not worth getting into a legal battle with a big company.Please listen to me and let this go.Take Care…Howard Howard M. Goldstein, DMDDirector of Continuing EducationFarran Media LLCDentaltown / Orthotown / HygienetownDentaltown Message Board Manager9633 S 48th Street  / Suite 200  /  Phoenix, AZ 85044cell: 610.216.3374   | fax: 610.866-1936 HoGo@farranmedia.com

This upset me because all my posts (that got deleted) and emails were falling on deaf ears.

I had a conversation with Lorne:

The Digital Dentist drlavine@thedigitaldentist.com

11/6/12
to me
Well, here's my take on it, you can take it as advice from someone older, or just ignore it as the ramblings of someone whose opinion doesn't matter: One of the things I've learned after 25+ years in business is that what you know is rarely as important as who you know. Dentistry is a small community and you never know who you're going to want in your corner someday. If you choose to do battle with an $8 billion company, I guess that's your prerogative, but it separates you away from a good chunk of the rest of the community. I compete with Schein on deals every day…but I also get a lot of my income from doing webinars, lectures, whitepapers, etc for them and their partners. There's no reason you can't play nicely with them and turn it to your advantage. Your posts, however, are having the opposite effect. I don't know if HoGo has communicated with you, but if I were Moderator of that forum, I'd certainly be suggesting that you tread lightly. Again, take the advice as you want. As a colleague and friend, I felt I owed it to you to at least try. Sincerely,

image001

Check out my blog: http://thedigitaldentist.blogspot.com Lorne Lavine, DMD, A+, Network+824 N. Victory Blvd. #1-CBurbank, CA 91502866.204.3398drlavine@thedigitaldentist.comwww.thedigitaldentist.com

Then I was threatened with a "Linked In View".. ROFL. Yes that is correct, except how would you feel? Bangerter told me "they even work on Christmas!"
http://www.proskauer.com/professionals/sigal-mandelker/



Sigal testified before Congress a number of times on matters of criminal law, prepared Administration officials for congressional hearings, and negotiated various legislative provisions with congressional staff and within the Administration. She also represented the Department of Justice before the Federal Communications Commission, chaired Team Telecom, an interagency group that reviews telecommunications licenses where there is foreign investment and worked with a number of Federal agencies on a wide-range of regulatory and policy matters. In numerous enforcement areas, she coordinated the Department’s work with the FBI, DHS, ICE, U.S. Secret Service, the State Department, USTR, the Department of Commerce, the White House, the National Security Council, the Homeland Security Council and other government agencies.


I went on DentalTown and made a post that I needed a Ferrari if I was going to look the other way now. This was just a joke, but my intention was to let them know I was not backing down.

Right before this went public in April 2013, I created a new youtube video showing off how FairCom Standard Encryption could always be bypassed, confusing a lot of people. as they thought this new video had something to do with the VU# that came out, but it didn't.

Dentistry IQ released an article about this, and let Lorne Lavine give a quote, in which he said there was nothing to really worry about. Yeah... Hard-Coding Credentials, Local Admin, and Flash.. nothing to worry about there.... (IDIOT)

Chalk it up to a culture problem. Lorne was with me at the summit, and perhaps he just doesn't care about security and being honest. At this point, I thought Dentrix G5 was finally fixed regarding authentication, up until I had the weirdest dream! More on that later.


US-CERT Part 2:

Faircom Standard Encryption Vulnerability! US-CERT decided to do something with the second youtube video I made.

 They talked to Faircom and persuaded Faircom to rename encryption to something called data camouflage, which is a catchy name for data scrambling. I commend Faircom for doing this.

Henry Schein ignored ALL of this, and just kept calling Dentrix G5 encrypted for HIPAA, which was just an absolute awful thing to do.

Not only this, but I was getting PISSED. I decided to come up with a new plan. Remember that Dentrix Database on a File-Sharing Site????

Waiting Game 2:

May 2013, I was about to freak out. Waiting for US-CERT to do the second VU#. Dentrix was no longer talking to me, none of my efforts seemed to have had any affect, and everyone I knew told me not to care about this, and let it go, but I just didn't want to quit. I realized my mugshots were also on the internet. Everytime I went to US-CERT, mugshots.com would find dirt to dig up on me. This really depressed me as I had been arrested in the past and I just hated knowing someone would try using this against me to shut me up. I decided to play into this (screw it right?). I posted an instrumental version to Cypress Hill's Illusions.



And I had a bite from someone named DewDropInn... I kinda regretted doing this test, but I figured eventually they would try to laugh me off of DentalTown if GIVEN ENOUGH TIME. So I decided my time on DentalTown was most likely short lived. It was only a matter of time until the mugshots oozed into DentalTown by "mistake" only to be there long enough for enough people to see it, and then Hogo will "act" like he cares and moderate it. I figure this video would let someone know, I don't give a shit about the mugshots.. Bring it!!! In fact, I will GO FIRST!

My dad offered me a job so I took it because I was extremely depressed at this point in my life. I regret this, but I would probably not have my house still if I hadn't... All I could do was keep my head down on my desk, I barely answered the phone.. Life really sucked. Working for your parents wasn't all I thought it would be, worse I spent most of my time doing computer projects like intraoral capture buttons.

Also during this time I was asked many times to refrain from talking about Dentrix. Howard Goldstein told me I was not allowed to talk about it. I reminded him to remind Howard Farran about the ADA Emails and I would do whatever the hell I fucking please. Ta Ta!
From: Howard Goldstein <HoGo@farranmedia.com>Date: Thu, May 16, 2013 at 9:42 AMSubject: RE: Reported Post: Total Lack of SupportTo: Kerrie Kruse <kerrie@farranmedia.com>, Lorie Xelowski <lorie@farranmedia.com>, Ashley Harris <ashley@farranmedia.com>, Ken Scott <ken@farranmedia.com>Cc: "Justin Shafer (justinshafer@gmail.com)"<justinshafer@gmail.com>

Justin-Today was your last post about ANYTHING Dentrix.  Even if helpful.   Sorry but I have way too much of a workload to have to be monitoring you on a daily basis.  Uwe Mohr is not allowed to post anything about Cerec.  Kevin Tighe is not allowed to post about 123postcards.com.  Others are not allowed to post about other subjects that they have issues with.  The new rule is that you are not allowed to post about Dentrix.Your other posts are valuable but enough is enough....Sorry...Howard
Howard M. Goldstein, DMDDirector of Continuing EducationFarran Media LLCDentaltown / Orthotown / HygienetownDentaltown Message Board Manager9633 S 48th Street  / Suite 200  /  Phoenix, AZ 85044cell: 610.216.3374

I also added links to my DentalTown Signature so ALL my posts would show this information, and I have 11K of posts!

Breaking Hard Coded Credentials AGAIN:

That is right. I thought it was fixed, I wanted it to BE fixed. I posted on DentalTown it was fixed. I told US-CERT it was fixed. But in reality it was NOT fixed. I give credit to god for this (Yeah, I know this sounds quite bizarre) but I had this dream one night that I was using WinHex to swap actual hashes out of the FairCom.FCS file and pasting it to another, and if you did this with 9.0, it would show that password hash in RAM. This was a dream, and I was doing it with someone... holier then me. I know, it is crazy right? Well I woke up and ran to me computer and sure enough, that method WORKED! And I was BACK IN BUSINESS!!!!! WOOT WOOT!!!!!!!!!!!!!!!!!!!

I told US-CERT, and heard nothing.......  So I figured they were in Schein's pocket at this point, or had some other motive I was and am still not REALLY that fully aware of, except that US-CERT has WAY more patience then I do!

NIST and US-CERT Release VU# 900031:

I can FINALLY go to the folks at DentalTown and tell them that YES, even NIST agrees with me!
https://www.kb.cert.org/vuls/id/900031
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0148
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4952

I contacted Hogo and Howard Farran and literally got nowhere. We had a phone call and all they wanted me to do was not talk about this on DentalTown, this bugged me because DentalTown was paid money to carry on a lie, and I wanted them to DO something about it. (Not realizing that is easier said then done, I really didn't give a shit, and still don't)



Shit Hits the Fan:


August 2013, I had enough of this. I decided I would start a thread stating that Dentrix G5 was NOT encrypted. I think I called out Lorne, but I am not 100% sure since DentalTown deleted the thread.
http://www.dentaltown.com/MessageBoard/thread.aspx?s=2&f=145&t=209313

I have already been reminded to what would happen to me if I was banned:
From: Howard Goldstein [mailto:HoGo@farranmedia.com]
Sent: Wednesday, February 08, 2012 5:40 PM
To: justin@onsitedentalsystems.com
Cc: Ken Scott; Lorie Xelowski; Kerrie Kruse
Subject: Justin's Account...


Justin- If we are forced to ban you, you no doubt would open a new fake account.  However you would never be able to post openly on Dentaltown again.  This would not be good for your business or your reputation.   We would not hetitate to let Townies know why Justin is gone.  If you EVER give out a password like you did on that post today or post so rudely about a company the way that you did today,  your account will be officially inactivated.  Use your head and think before you post on Dentaltown.  You do not have free reign to post whatever you feel.. Furthermore your account information has you listed as Phfvtacb Vbvbjqmg from San Francisco with a phone # of 555-666-0606.You need to update your account within 24 hours or your account will be inactivated. Regards…Howard   Howard M. Goldstein, DMDDirector of Continuing EducationFarran Media LLCDentaltown / Orthotown / HygienetownDentaltown Message Board Manager9633 S 48th Street  / Suite 200  /  Phoenix, AZ 85044cell: 610.216.3374   | fax: 610.866-1936 HoGo@farranmedia.com

In the Dentrix G5 thread, I remember Lorne saying that Dentrix G5 was encrypted, even after US-CERT and NIST said it wasn't. I called him ignorant, a hybrid (part IT part perio), and asked him if he was in on the take. I also promised him that one day when you googled "Dentrix Encryption" that all the results would be truthful. He was actually the top result, and he posted that he was glad and he should commend his social marketing manager.

I then was banned for 1 week, and I decided this should be a permanent ban. Why participate on a board that doesn't care about truth or hurting patients during a data breach? Why continue years of posts knowing this? Even after the ADA, Thumbs up and even being able to grab the entire database and SSL keys, even after the Dentrix Credit Card thing, even after the Dentrix Database on a File Sharing Site, and NIST and US-CERT (twice), no somehow none of this was enough..

Justin-
You are accusing Lorne of being on the take.
You have called him ignorant on our message board.
We have told you repeatedly that you cannot let your anger get the best of you and do that on the message board.
You can get your points without the personal attacks...
I am going to inactivate your account for one week so you can think about ways that you can get your points across without the personal attacks.
Please don't hack back in.
Next Sunday I will reactivate your account.
You have been warned so many times.  We have no choice.
...Howard

Howard M. Goldstein, DMD
Director of Continuing Education
Farran Media LLC
Dentaltown / Orthotown / Hygienetown
Dentaltown Message Board Manager
9633 S 48th Street  / Suite 200  /  Phoenix, AZ 85044
cell: 610.216.3374
HoGo@farranmedia.com<mailto:HoGo@farranmedia.com>

So I decided to exploit a cross site scripting vulnerability that I told Ken the Dentaltown IT guy about. The reason I found it was because in July 2013 someone had their gmail account hacked and thought it was Dentaltown because DT and Gmail were the only 2 sites that had that password, further more at the same time someone was able to make posts in the Classifieds section without an account. Anyways the night of my first ban I started posting as other people, and I ended DentalTown with a good Rick Roll. I do apologize if I offended anyone or used your account to make a statement. Also, you should say thank you to me because in the end, I increased the security of DentalTown and also posted that they tell everyone to change their passwords especially if your DT password was the same as your email, then I could have logged into you account..... I may have tested this theory.

I originally wanted to turn DewDropInn's avatar into Mike Barr's monkey butt photo, but instead I did "civil disobedience" in DentalLand.

So now I am banned!





That Didn't Work... Whatever happened to that Data Breach I found out about?????


SHIT REALLY HITS THE FAN:


So I noticed that Data Breach was not on the HHS Wall of Shame, and the dentist never called me back, and Howard Bangerter acted like they were "taking care of it" and the doctor was going to notify HHS. But I didn't see it on the wall of shame, so I called Dr. David DiGiallorenzo's Office Manager to ask her if they mailed out letters, and she told me I would have to ask the doctor that question. I then went on LinkedIn and asked an employee and she had no idea of what I was talking about, which was odd to me. So eventually I contacted a local news station, WNEP in Pennsylvania. I gave them a list of patients and Dave Bohman went around asking people if they had received a letter from the doctor.

Basically the doctor said I hacked him and filed 2 criminal complaints against me in 2 states, mine and his.


http://wnep.com/2013/12/09/stolen-data-on-thousands-of-williamsport-area-dental-patients/
(This is continued in another blog post on my site because of the length)

This is when I met a woman named PogoWasRight aka Dissent


DISSENT (Bum Bum Bum):


2014
"Hell hath no fury like a woman scorned"

Dissent aka "PogoIsRight" is a woman who runs a couple of blogs on databreaches. She knows a lot of people and loves to read stuff that only attorneys would like to read. She is very helpful.

She made this awesome blog post!
http://www.phiprivacy.net/dentrix-claims-it-encrypts-their-data-but-does-it/
And she has friends!
http://www.alertboot.com/blog/blogs/endpoint_security/archive/2014/01/14/hipaa-encryption-when-is-encryption-not-encryption.aspx

And this is what got Dentrix to stop calling the database encrypted. She found many experts and had them comment, and that was enough to make them think twice about what life will be like in a court room?

She also taught me that when someone accuses you, you should respond to this allegation. I think she is right. She wrote some FTC complaints and I gave her statements and worked with her on understanding how all these hacks work. This took awhile and after we finished she said "now wait a couple of years" and I thought I was going to die!

US-CERT... Again:
March 2014
I took the oportunity to show US-CERT my FTC statement hoping that would get their attention along with muttered phrases like "who lies to homeland security???" and I figured this would get some sort of emotional response out of this black hole called CERT. I jokingly say this because we did have some phone calls in 2012 and I found them to be "cool", up until they ignored me, albeit, I can be annoying as hell to some people I want to be annoying to. I usually do this by sending LOTS and LOTS of email.

To my surprise, they responded. I was using techniques from my dream and they told me my dream wasn't good enough. They told me I had to actually crack the algorigthm, even though my youtube video was good enough to me.

So I then worked out the algorithm and they asked me to put it in a script form and that was my requirement to get a new VU#... Sigh.. So I called a friend and he created a script from the algorithm and THEN they assigned me VU# 176231.

CERT told me that Schein should have it fixed with Dentrix G5.3 and that a fix probably would not be around until August 2014 but could be later.

ADA posts a notification of a Data Breach:
May 2014
ADA has a tiny data breach and still notifies. Good Job! 
I also had a hand at getting a website called the dental record updated.

WAITING GAME 4:
August 2014:
After US-CERT told me to wait, I did. I heard that Dentrix G5.3 was not actually going to be released, instead they were going to call the product Dentrix G6. So I met a client with Dentrix G6 Beta and I tested the security of that. I found that the hard coded credentials were STILL present, which meant that I was waiting for nothing.

I then say this and realized that the Dentrix was REALLY not taking things seriously:
http://blog.osvdb.org/2013/05/21/henry-schein-practice-solutions-legal-threat/ They had also threatened legal action against a well known security researcher. Not a good feeling. This was an old blog post, but this was news to me.

Since the argument was based wether or not the exploit could be used remotely, I decided to port scan the internet, and 10 minutes later I found a server running Dentrix that was exposed to the internet. I decided to exploit this and when into the resource table and found the office phone number and doctor's social security number. Instead of just calling the office, I sent an email to US-CERT, FTC and HSPS and then waited about 3 days. After that I called the dentist and he reconfigured the internet and I told him this was not a data breach, but was more my own security testing.

"that should shut them up"

CSO Magazine, Baby:
So after a REALLY long wait of wondering when US-CERT would publish my vulnerability, I got on twitter and told Dissent that I was getting depressed and wasn't sure we were getting anywhere. She calls on a friend of her's named Steve Ragan. Steve is cool. He writes an article about Dentrix Hard Coded Credentials.

http://justinshafer.blogspot.com/2016/01/hard-coded-credentials-placing-dental.html
This seems to help a lot, in the background.

During this time my friend who works at Henry Schein Tech Support sent me some screenshots of what was going around.

November 2015:
My patience started to run thin. I posted my G5 and G6 security research on my blog and my evidence on the LANAP breach, and to my dismay the investigation into that data breach was already over. Wow.


FTC RESPONDS!!!
January 2016:
http://justinshafer.blogspot.com/2016/01/ftc-takes-on-toothless-encryption.html
Schein was fined 250K for my efforts if I can interpret the news correctly. I am also aware that this is a public comment period as well. I personally hoped for a larger fine in all honesty, but at least I know nobody in dentistry will falsely advertise security again. (I hope!)

Dentrix G6.2:
Dentrix drops the hard-coded credentials and adobe flash! Great Job Mick Gomm, Nick Pelliccio and me. NOW you set a Database Passphrase and this will then be scrambled to be a Database Password you do not know.
Dentrix G6.2 Screenshot!


Summary:
Was this worth it to lose this many friends?????????? Not even my own Dentist uses me for IT Services, because when I went to work for my dad I told him to use my friend and instead he signed some contract paying $600 a month for IT Services... Sigh.

I don't have access to my 12 year diary (DentalTown).

I don't really feel like this was "closure".

Was it worth it?
Ask me in 10 more years, and I might have a better answer. I still wait for some answer regarding LANAP and I wonder when US-CERT will come around. I do know that when people discuss Dentistry and Security, I get a smile on my face. So yeah, probably so. I also know a woman in a van drove to my house honking her horn and told me if you care about your kids and drove away during late 2012. That had my heart rate up to 160 bpm for months. Usually when I tell this part of the story people say something like "Uhhhh, yeah". I received a call from the FBI and I kept thinking I would hear back from them again. I got really paranoid.

So I leave you with that.





If Dentrix and Eaglesoft and Open Dental were the same price, which one would I get?

$
0
0
My answer is simple.. If they were not the same price, Open Dental. If they were the same price... Hard to say. Grass is always greener on the other side. I would probably still go with OD. Reasons.
1. Transparent Company
2. Great Tech Support
3. The software rarely needs tech support to fix a bug. (Stable)
4. Open Database Access to build your own reports! (WOOT WOOT!)
http://opendentalsoft.com:1942/ODQueryList/QueryList.aspx

5. More secure then Dentrix and Eaglesoft but with backend database control
6. Less Expensive
7. No Exclusive Agreements to worry about.
8. Open Source so nobody can buy it and take it away, also you can make your own changes to the program.
http://opendentalsoft.com/forum/viewtopic.php?f=2&t=4892 


http://www.bigideasoft.com/ 

My Oral Surgeon wrote EASy. He was a Dentrix User. I showed him Open Dental.. THAT IS WHAT HE DID WITH IT!!!!!(Makes you wonder why even call me for help if you can write a damn program all by yourself!!!!) haha.. He did a great job on my wife’s exposure. This software records data from a vital sign monitor during surgery. I imagine this is what you would find in a hospital.
=================================================================================

That leaves functionality.. I prefer to grow with a good program and watch functionality grow, and be apart of that. We have enough reporting power with OD, etc. Anyone who disagrees.. IS wrong and probably a bit BIASED. We can do our own queries.. We can do anything.

I am a bit biased: After this encryption débâcle.. I personally would feel foolish to have purchased Dentrix!

Moving onto Eaglesoft aka Patterson Dental

$
0
0

Moving onto Eaglesoft aka Patterson Dental

(Thanks Dissent!)
So I have been asking Eaglesoft since 2014 if they would improve the authentication of Eaglesoft. Eaglesoft uses Sybase iSQL Anywhere for its database. 

How do they currently authenticate?
Currently for read access they use the default username and password dba and sql.

Do they support changing the backend database for reading AND writing?
I do not know but I plan on finding this out, I have asked US-CERT.

I have heard that if you want to write to their database, they do charge money, which I find odd because they don't seem to take great efforts into protecting write access, which is exactly what I heard is supposed to cost money.


I met their security guru Mike Snead via LinkedIn. He wanted to connecte with me and told me he liked my work regarding Dentrix. I thanked him and then said something he probably didn't like. I told him he had until Eaglesoft 18 to fix the authentication. He disconnected from me and I guess people in Dentistry are indignant so I am not that surprised.



I noticed this great post by Patterson (whom I like, don't get me wrong) on LinkedIn.

"Hackers are awful, evil, and rotten, but one thing they aren't is stupid. In fact, many hackers specifically target small dental practices, assuming they don't have "sophisticated" data protection systems. Learn how to secure your important data by reading up on PattLock, Patterson's "sophisticated" data protection service. #PinkyOut"

I thought about this and realized I most likely wasn't being taken seriously. Last week I went to an office that was giving out the 2Wire WPA2 key to PATIENTS (key=office phone number?). This offices has Eaglesoft. Somehow FEAR is the only thing that seems to work in Dentistry so..... 

Other then spending time on how Eaglesoft authenticates, I noticed a free Eaglesoft 16 Developer License was on the Eaglesoft FTP site. This led to me wondering: What other careless mistakes have they put on their FTP Server?

OH... Let me tell you.

1. A file called Dental.Log which is a transactional log file without the actual Dental.DB file to go along with it. I converted the dental.log file to dental.sql and discovered patient data with over 5000 patients. The patients belong to Massachusetts General Hospital.

2. A Recall Report from ES that was converted to PDF. This file belonged to a Dental office in Canada. There are over 2300 patients in this file. The SSN is not present, but insurance info, balances, and patient alerts are present.

3. An entire Eaglesoft Database was also present. This database was to an office in Canada and has a little over 15 thousand patients in the database.

This is all pretty sad, in a way. Apparently they just finished having a seminar February 2nd over "how to protect yourself from a data breach"


I hope SOMEONE at Patterson Dental or Eaglesoft knows I mean business, and the only HARM that can happen in not fulfilling our wishes, is what can happen to the generation that follows after us. It should be VERY CLEAR now.

#PinkyOut




Hints!

"IT GUY" HIPAA Compliance CheckList

$
0
0

"IT GUY" HIPAA Compliance Checklist:

HIPAA Compliance! Note this list does not include all of the OTHER things a business will need to do for HIPAA, for that go here: http://hipaanews.org/checklist.htm

1. Enable BitLocker on ALL computers TPM+Pin or TPM+USB including Backup Drives.


*When employees login
*The number of failed login attempts on a computer
*The last time you conducted a software update
*Who downloaded a new program, and when
*When you changed your password
*Who logged into the EHR at a certain time
*What information was accessed by the person logged in
*What protected health information (PHI) was changed and by whom
*FileSharing Auditing (Who deleted a file on a network share?)
Domain Auditing + Net ShareMonitor (use the portable version and use as a service)

3. Domain instead of a WorkGroup.

4. Up to date on Security Software and Updates. I use Kaspersky, MalwareBytes, and OpenDNS.

5. Automatic locking of screens after 30 minutes of inactivity in your Group Policies.

6. Check for Vulnerabilties. (on going!)
a. PMS.
b. Wireless Mice can now be vulnerable!?!?
c. Wireless Security (reaver, aircrack)
d. Use two-factor authentication for remote access.
e. Check your router for open ports and vulnerabilities.
f. Read up on security from time to time!


7. Use Standard Users if software supports it (Dentrix G6.2 will, probably Dexis 11), Open Dental Does.

8. Use usernames by computername with the employee name as the "Full Name" and roaming profiles for Domain users for auditing purposes and convenience. This goes to naming convention rules. Keep account for which employees are assigned to users, especially if employees change. Use different passwords per User! Keep a master password list!

Username: Operatory1
Computername: Operatory1-PC
User Full Name: Jane Doe

9. Is your server physically secure?

10. Is your email and fax compliant?

11. HIPAA Security Risk Assessment. Check out the Security Risk Assessment Tool as well: https://www.healthit.gov/providers-professionals/security-risk-assessment-tool

How frequent should a Risk Assessment be performed?
http://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/securityrule/rafinalguidancepdf.pdf
 "Some covered entities may perform these processes annually or as needed (e.g., bi-annual or every 3 years) depending on circumstances of their environment."


12. Do you have all of your Business Associate Agreements (BAA) in order?
(this will be updated over time)

Have you had a databreach (even small) and do you want a Breach Risk Analysis by a professional? Are you in Texas? If so I HIGHLY recommend Jeff Drummond.
http://www.jw.com/Jeffery_P_Drummond/

PS. Thanks to Dissent from databreaches.net for helping me with this list.

Dentrix ODBC Access: 11 through G4

$
0
0

How to use ODBC and Dentrix 11 to G4.

The Dentrix ODBC Driver seems to want SQLExecDirect for a SELECT call, and the driver wants the first 4 characters to be XOR encrypted with the first character appended to the front that is part of the one time pad or key. I suspect this key is similar to Dentrix G5 and G6 on the guid to password algorithm. The G5 key I figured out, the G6 algorithm is stronger, and I haven't really looked at trying to break it. Besides, there are other ways.

Another project is Driller but it does not use the ODBC Driver and instead sticks the data into a MySQL database. More on that at a later time, though it is on google.

ODBC allows you to see the Dentrix Data without using the Letters feature in Dentrix.

Be sure to disable UAC or run these programs in an elevated environment.

Set the Dentrix Data Directory in the ODBC Driver




I used Advanced Query Tool 10.1 to extract data from tables using the SQL Interface:
Set some options, Use SQLExecDirect







2AW^WCT = SELECT
aSTI_RT = INSERT
You can get more with enabling the ODBC Tracing Log in Windows.

SQL Query Tool 6.1 works just fine without setting any options. Seems it works without SQLExecDirectW (this program uses SQLExecDirect)


Credit goes to TwoBitsShort

Eaglesoft 18 Security

$
0
0

Eaglesoft 18 Security: 

This was tested with ES 18 RC3 because Eaglesoft 18 is currently in beta.

How does ES Authenticate?


When ES18 is installed, 3 backend database accounts are created: SA, DBA, and PDBA.
All 3 passwords are randomly generated, and each have different levels of access. Though the SA password may go off the License File. (Needs more testing)

These passwords are stored in a binary file called:
C:\Eaglesoft\Data\Eaglesoft.Server.Configuration.data

Patterson Eaglesoft consists of 2 main services to function (actually 3):
“Sybase SQLAnywhere” and the “Patterson Application Server” service.

When the The Patterson Application Server service starts, it reads the Eaglesoft Server Configuration Data File at: C:\Eaglesoft\Data\Eaglesoft.Server.Configuration.data, which then allows it to know all the backend database passwords, when it does this it resets the password for the SA account, if the password has changed, but leaves PDBA and DBA untouched.

This service also checks the database signature to make sure it is from a Patterson Database.

SELECT user_id, "option", setting FROM SYS.SYSOPTION WHERE "option" = 'database_authentication';

Example of returned information:
Company=Patterson Technology Center;
Application=Patterson EagleSoft;
Signature=010fa55157edb8e14d818eb4fe3db41447146f1571g574591ba89b065b5aabdb10bca8923c8b6b14496

This signature seems to match data in Eaglesoft.Server.Configuration.data file, because the two seem to go together.

NOW THE SERVER IS READY TO HANDLE CLIENTS!


What happens next?
The Eaglesoft Clients on workstations talk to the "Patterson Application Server" service that is running on the server and get the database credentials through TCP and Ajax calls (partly encrypted).

This allows the Eaglesoft Client to login as DBA or PDBA respectively.

Example of a DSN-Less ConnectString:
DBN=DENTSERV;DSN=DENTAL;UID=PDBA;PWD=vBB(JDvSi1M?p%weic$f-T-SFOMm#UAz
DBN=DENTSERV;DSN=DENTAL;UID=DBA;PWD=CKGHF2L.

Patient, and Provider SSN's seem encrypted.
Example of what is in the database
SSN=*****6789
Encrypted SSN=/KYTzmB7YfkdyN4SqbNM5vPzw2lxbpli5gr1Niv6UXE=




Passwords in the actual database that Eaglesoft users store are now hashed.




Thoughts:

What happens if we only have the Patterson Database files without the file that knows the passwords??? C:\Eaglesoft\Data\Eaglesoft.Server.Configuration.data  Lets say someone forgot to back that file up? I suppose I could change the hashes in the database server, reset passwords to a different installation based off the same license file?

IS Eaglesoft 17... Not HIPAA Compliant because of the lax security and passwords that are not hashed?????? http://justinshafer.blogspot.com/2016/02/moving-onto-eaglesoft-aka-patterson.html

NOW FOR THE BAD NEWS: WEAK LINKS!


The big weak link I see is someone who is malicious (or obsessive), could use an Eaglesoft 18 client to find the PDBA Password by just hacking the wifi, and launching Eaglesoft.exe, and then use WinHex to find the backend password for another installation, then dump the patient table.

The last thing they will have to deal with (the third possible weak link) is decrypting the SSN, although they would have the last 4 digits of the SSN which could pose a security risk.

This doesn't matter, because someone could (in theory) dump the database remotely (after they hacked the wifi), and then use the Eaglesoft software itself to decrypt the database (yes, with a different license installed). I have a good idea that the key is a 64 character key, but you would need to know exactly how the Patterson Services Crypto Service decrypts the password. Once the dump the databases, and have the PDBA Password, they could probably get the SSN's out of the database (I think I could, but only using the actual ES software, after I added the patients table to my own database).

The weak link I see in this overall design is the Patterson Application Server service, and it handing out backend database passwords to people who know how to ask it without some sort of password from an administrator.

Solution:

When a new client wants to connect or install, let the office come up with their own database password to initially connect. I believe this is how Dentrix G6.2 is going to work (I hope). You could make it a database passhphrase (scrambled password) instead of a password, or just make it the actual password. Or beef up the Patterson Application Server Service.

#PinkyOut



Dentrix G6 Document Center Compression is GONE!

$
0
0

Dentrix G6 Document Center Compression is GONE!


In case you haven't noticed, the Dentrix G6 Document Center Compression options were removed from Dentrix G6, WITHOUT ANY WARNING TO DENTRIX USERS.

One of my clients who scans many documents was using 500MB in Dentrix G5, but in Dentrix G6 they started to use 2GB per day. Each page in a pdf scan is coming out to around 20MB in the DocFiles folder instead of 5MB.

I have been waiting for Dentrix to fix the issue in Dentrix G6.2, but since it was not released in February I called Tech Support to find out what is going on, seeing how they left this in the Dentrix G6 Help file.


See the problem? We have no Document Center Compression settings in the actual program, but it seems they DID leave it in the help file.

So.. was it on purpose or accidental? As far as I can tell, this was on purpose. I called Dentrix yesterday and they told my client they had problems with Document Center compression with CORRUPT IMAGES (NEWS TO ME), and the developers decided to remove it. That is GREAT and all, but Dentrix never warned us users about it. For an 8 thousand dollar program, it sure seems like a pile of krap.

Lots of TWAIN scanners don't have a method to scan to a pdf from the push of a button so I thought I would come up with a solution. Lucky for you I thought fujitsu ripped out the SnapScan Manager for the newer FI Series models BUT.. you can actual request it if you give them your serial number and model:
https://www.pfu.fujitsu.com/registration/ssmanager/en/form.html
For the scanners with asterisk "*", only models bundled with "ScanSnap Manager for fi-Series" or "ScandAll PRO ScanSnap mode Add-in" are applicable.

Guess I will find out tomorrow if it was bundled...... Sigh.

Solution:


I found ScanToPDF ($40) from http://www.scantopdf.com/en/home.aspx and then created it's own Scanner Event in Windows by adding some registry keys. (Learned this from messing with cameras)

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StillImage\Events\STIProxyEvent\{7F6EB40D-F370-40F4-A2A5-D748F3FA1919}]
"Icon"="sti.dll,0"
"Name"="ScanToPDF"
"Desc"="ScanToPDF"
"Cmdline"="C:\\Program Files (x86)\\O Imaging Corporation\\ScanToPDF\\ScanToPDF.exe /autoscan /autosave /pdfpath=\"C:\\Users\\DentrixScan\\scanned.pdf\" /terminateaftersave"

Restart the Windows Image Acquisition service or reboot!
Then I assigned the event to the scanner.

And then finally setup the new Dentrix Document Center automatic file acquisition mode (Because Dentrix just can't seem to use a decent scanner library that the developers actually know how to use, and TALK about a LACK of TESTING)


Nice eh?



Thoughts: You should be like Eaglesoft and write a utility that will open ALL scanned documents on the weekend and let us know which ones may be corrupt?????  YOU KNOW A DENTAL OFFICE CAN BE SUED FOR HAVING CORRUPT DOCUMENTS, YOU COULD LOSE A LAWSUIT!!! YOU SHOULD BE MORE TRANSPARENT!!!



Note for developers:Try EZ-Twain Dentrix... Open Dental uses it... works great. I believe ScanToPDF is using the same library. I think they even include samples.....
http://opendentalsoft.com/forum/viewtopic.php?f=2&t=561

Springfield doctors office broken into and computers stolen

$
0
0
Springfield doctors office broken into and computers stolen
POSTED: 06:59 PM CST Jan 22, 2015 





SPRINGFIELD, Mo. -

A theft of computers at a Springfield doctor's office poses many questions about a patients personal information.



Such a crime would typically have patients worried the security of their medical records, but not so in this case.

Yung Hwang says he loves his patients and loves the community here in Springfield.

Hwang is old school in the sense that he still files information about his patients on paper, yes paper.

That traditional practice could be what saved some sensitive information from getting into the hands of crooks when they recently went through the exam rooms and his office.

"Three things missing, two lap tops and one Apple iPad, those contain lots of personal information and the email but more then a thousand emails, and all the documents that I present to Korean war veterans at the time was all there, pictures, those are all gone," says Dr. Yung Hwang.

He says police asked him how many people have keys to his office since the front door was not broken or busted.

He says he trusts all four employees he works and has no reason to question their integrity.

Hwang says he's been in this office for more than 10 years and he says he’s never had anything like this happen before, he says he and his office are still in shock.

"I feel like I have been violated…I been so lucky that everybody, my patients or whatever feel to me is very kind to me and they support me always," says Hwang.

Hwang says he doesn't plan on pressing charges if the thieves are caught, he says he just hopes whoever did this found what they were looking for and won't have to do it again.

Most doctor offices today have electric filing.

Medical experts say you should talk with your doctor to find out how they store your medical records and what they do to prevent sensitive records from being stolen or shared.

Copyright © 2015, KSPR News

How I helped secure the Dental Industry!

$
0
0


It all started around 2009 when I started to have fun with "security". It started with a thumbs up feature that DentalTown added, and ended with me making a FTC Statement and 4 US-CERT vulnerability notes. 1 to Faircom, 2 to Dentrix (1 remains private) and 1 to Eaglesoft.

"Data security is very cool on the cloud. I’m a big believer in establishing proven backup procedures for my clients. I’ve seen too many practices lose all of their data before I could help them. But procedures rely upon people, and too many times people don’t follow procedures. The cloud, on the other hand, is automated. Data backup is a natural part of the cloud. The doctor using Web-based dental software will never be bothered by its database backup or software upgrade worries ever again. There isn’t a better business continuity plan than the cloud."
Sigh.

After the thumbs up thing I realized I could actually ban people on DentalTown, and I did this to one person intermittently (that was actually really funny). I eventually realized that there were problems in the mechanism used to upload images as you could use it to upload shells or other peoples pictures or even deface the site.
Shell:

 After this I progressed to other websites that I won't name, but two I will. I would love to name some others but I shouldn't. I like to say, I help law enforcement though. And even a financial institution. I never thought that would happen, but to my surprise, I started seeing problems with all sorts of different websites, and I couldn't help but try to get them fixed, most of the time.

2011:

Dental Websites: If you had a business in dentistry, I might of tested you.

http://www.dentalaegis.com/news/?id=1 I remember... Oh.. nevermind. Heh.

later on:
http://www.dentalrecord.com/ Just because Darrell was buying paper from there. Heh.

American Dental Association:
This was something called SQL Injection. I was just being a white hat, and I knew what damage this could do to dentists. I never really inspected all the databases or tables or really went into this.

Me to Howard Farran:
From: Justin Shafer [mailto:justinshafer@gmail.com]
Sent: Monday, January 17, 2011 10:36 PM
To: Howard Farran
Subject: Hacks

New stuff lately.

1.       http://dexis.com/mambo/ (I didn’t write that, it was already there.. which was funny as hell)
2.       I got into the dentrix credit card processing. They left the admin password as password. But they still haven’t completely fixed it, after I told them!
3.       ADA is open to exploit! I can look at test scores? Havent tried changing them. Gave this to Steve Roberts and I am hoping between the two of you the ADA wont get too mad. =)

Don’t share this with ANYONE. JUST YOU! And ken if you like.



Know anyone at the ADA Howard? I am giving dentrix a week until I tell them to fix the credit card stuff.

Howard Farran to Me:
From: Howard Farran <howard@dentaltown.com>
Date: Mon, Jan 17, 2011 at 11:48 PM
Subject: Get me all the ADA dentists emails and you just made yourself some money dude! I am serious!!!
To: Justin Shafer <justinshafer@gmail.com>


Get me all the ADA dentists emails and you just made yourself some money dude!  I am serious!!!  This is only between you and me. 

Create a great day!

Howard

Howard Farran DDS, MBA, MAGD

Today's Dental: * 10850 South 48th Street * Phoenix, Arizona 85044 USA * O) 480-893-1223 * F) 480-496-9363 * E) Howard@TodaysDental.com  * W) www.TodaysDental.com

Farran Media: * 9633 South 48th Street, Suite 200 Phoenix, Arizona 85044 USA * O) 480-480-445-9712 * F) 480-598-3450 * E) Howard@DentalTown.com  * W) www.DentalTown.com  * W) www.HygieneTown.com * W) www.OrthoTown.com *www.Facebook.com/DrHowardfarran

WHY?
From: Howard Farran [mailto:howard@dentaltown.com]
Sent: Tuesday, January 18, 2011 9:36 PM
To: justinshafer@gmail.com
Subject: The more I think about this Justin, the more you need to realize!

The more I think about this Justin, the more you need to realize!  You are going to turn more dentists onto first world dentistry than anyone!  When I just travel 100 miles south of Phoenix into Mexico the quality of the dentistry drops 90%.  If we can find these dentists, send them an email, and turn them onto first world dental information we will truly make a difference in this world!  This could be the most important project of your life! www.DentalTown.com has 140 free continuing education courses and the www.ADA.org has zero, yet they collect over $100 million a year in dues! 

Create a great day!

Howard

Howard Farran DDS, MBA, MAGD

Today's Dental: * 10850 South 48th Street * Phoenix, Arizona 85044 USA * O) 480-893-1223 * F) 480-496-9363 * E) Howard@TodaysDental.com  * W) www.TodaysDental.com

Farran Media: * 9633 South 48th Street, Suite 200 Phoenix, Arizona 85044 USA * O) 480-480-445-9712 * F) 480-598-3450 * E) Howard@DentalTown.com  * W) www.DentalTown.com  * W) www.HygieneTown.com * W) www.OrthoTown.com *www.Facebook.com/DrHowardfarran

OH! But what about the law?

Justin Shafer justinshafer@gmail.com

1/19/11

to Howard

DONT DO IT!
From: Howard Farran [mailto:howard@dentaltown.com]
Sent: Wednesday, January 19, 2011 9:04 AM
To: Justin Shafer
Subject: RE: The more I think about this Justin, the more you need to realize!

Don’t do it dude

Create a great day!

Howard

Howard Farran DDS, MBA, MAGD

Today's Dental: * 10850 South 48th Street * Phoenix, Arizona 85044 USA * O) 480-893-1223 * F) 480-496-9363 * E) Howard@TodaysDental.com  * W) www.TodaysDental.com

Farran Media: * 9633 South 48th Street, Suite 200 Phoenix, Arizona 85044 USA * O) 480-480-445-9712 * F) 480-598-3450 * E) Howard@DentalTown.com  * W) www.DentalTown.com  * W) www.HygieneTown.com * W) www.OrthoTown.com *www.Facebook.com/DrHowardfarran

Lorne Lavine:

Dental Technology Consultants drlavine@thedigitaldentist.com

2/1/11

to me

Get me those 55,000 emails and dinner is on me J Sincerely,

image001

Check out my blog: http://thedigitaldentist.blogspot.com Lorne Lavine, DMD, A+, Network+2501 W. Burbank Blvd. #303Burbank, CA 91505866.204.3398drlavine@thedigitaldentist.comwww.thedigitaldentist.com

From: Dental Technology Consultants [mailto:drlavine@thedigitaldentist.com]
Sent: Tuesday, February 01, 2011 10:56 PM
To: Justin Shafer
Subject: RE: Xray

Yup…if I knew how and could use a different IP to access, I probably would. I certainly would never advocate theft or anything like that, but if the list happened to plop into my lap, not so sure I would throw it out.

Sorry if you think less of me for that, I happen to know the value of email addresses for someone like me who uses the Internet extensively to market.

Sincerely,
image001

Lorne Lavine, DMD, A+, Network+
2501 W. Burbank Blvd. #303
Burbank, CA 91505

Howard gets Curious:

Howard Farran howard@dentaltown.com

2/3/11

to me

Now the ADA is spamming me with emails??  LOL..  How many emails did you actually get? 

Create a great day!

Howard

Howard Farran DDS, MBA, MAGD

Today's Dental: * 10850 South 48th Street * Phoenix, Arizona 85044 USA * O) 480-893-1223 * F) 480-496-9363 * E) Howard@TodaysDental.com   * W) www.TodaysDental.com * www.Facebook.com/TodaysDental

Farran Media: * 9633 South 48th Street, Suite 200 Phoenix, Arizona 85044 USA * O) 480-445-9712 * F) 480-598-3450 * E) Howard@DentalTown.com   * W) www.DentalTown.com   * W) www.HygieneTown.com  * W) www.OrthoTown.com  *www.FarranMedia.com * www.Facebook.com/DrHowardfarran

OK! 
So some time goes by and the ADA was still exploitable and I sent them an email asking them why and my response was an email from the director, in the form of a threat, I threatened to tell DentalTown Magazine (rofl):

From: OLoughlin, Kathleen T. <oloughlink@ada.org>
Date: Mon, Apr 4, 2011 at 4:57 PM
Subject: RE: Ummm
To: Justin Shafer <justinshafer@gmail.com>
Cc: "Pittman, Lalita"<pittmanl@ada.org>


Dear Mr. Shafer:

    We appreciate your interest in ADA and in ensuring the security of our computer systems.  You may be assured that we have addressed the issues with which you expressed concern and are confident that our measures are successful.  If you have specific evidence of weaknesses in our systems, or points of entry whereby you think access is possible, we would be pleased to learn more. 

    We are concerned, however, with what appear to be threats that you have made in your recent messages to publicize purported weaknesses in the ADA systems.  To make such threatswithout disclosing the nature of the alleged weaknesses, and for the apparent purpose of soliciting business from our organization, seems to us to be a questionable practice.  Moreover, we are equally concerned that you might be attempting, whether successful or not, to access ADA’s computer system in a manner that ADA has not authorized and that might therefore violate the law.

     Please understand that we do not intend to be overly contentious.  Nevertheless, we do take exception to the suggestion of actions that would have no purpose other than to embarrass the ADA and create issues with our constituents.  We take the security of our computer systems very seriously, and we hope that you are not implying anything to the contrary. 

     Should you wish to communicate with me further, please feel free to do so, but only if there is a constructive purpose to be served.  Please call me by phone if you wish to discuss.

Thank you

Kathy O’Loughlin


Kathleen T. O'Loughlin, DMD, MPH  oloughlink@ada.org
Executive Director
American Dental Association
312.440.2700
312.440.7488 (FAX)

________________________________________________________________________
American Dental Association  211 E. Chicago Ave.  Chicago,  IL 60611  www.ada.org


My Response: 
I told them I never sent them an invoice and I showed their IT guy what tool I used and everything, I sent a screenshow that said NOT FIXED!

And then they finally fixed this SQL Injection problem as far as I know. I was actually more worried about the DentPin Database but I knew to stay away from it.



What I did:
I sent Dr. Farran a large sample of just email addresses without nationalities which is just absolutely useless to send to mexican dentists. We stopped talking about this, and I stopped thinking about it.

EXCEPT THIS: I asked Steve Roberts at Henry Schein to find me a connection, and he found me the director.

Dentrix Credit Card Processing Website!
epay.dentrix.com was next though I never really meant to do this on purpose. I was at a clients house waiting for him to stop arguing with his wife, and he was paying his bills, and this login prompt was on his laptop, and I thought it would be fun to try admin and password as my credentials.





After this, I had impressed people so I got invited to a Dentrix Summit??? This is where Dentrix invites "leaders and popular people" to come up to Utah and have a circle-jerk about their software. When I arrived I was all ready to see the new Dentrix G5 Beta with the new Database. We all signed an NDA to attend.

THE LIE!

I was told Dentrix G5 would have an encrypted database and encrypted tcpip packets, but as soon as the presentation was over, and employee looked at me, and told me "It's easy!" without making to much noise. I was then asked if I would like a job at Dentrix, and I told them my mom had a stroke and my dad had a heart attack (all true), but in reality I felt like I was just being asked to aide in a cover up of lies.

I waited to see Dentrix for myself.

Henry Schein Practice Solutions advertised database encryption and security from hackers because their new database flies "low under the radar" from nefarious people. *rofl*http://web.archive.org/web/20140428021311/http://www.dentrix.com/products/dentrix/documentation/g5-white-paper.pdf 

They then asked me if I would like to work for them. 3 tech guys I didn't really know that well.


After the Summit:

I got an email from Howard Bangerter asking me if I would like to enroll in the Dentrix G5 Beta. I declined but told him I would. I noticed it had a Non-Disclosure Clause, and I figured that is what he really wanted. Then I was told by Howard Bangerter via a phone call that Sikkasoft was reading the Dentrix G5 database without being enrolled in the Dentrix Developer Program, and asked me how it might be possible, which was odd to me because someone from Utah told me that ODBC access was easy, even before I received this phone call. I told Howard that packet sniffing is the first place to start. I gave Howard the professional courtesy of saying "I am the last person you want to tell this to". 


Waiting Game 1:

Waited to see Dentrix G5 release. I was also asked if I would like to be employed at the local Schein office, but I really don't know if they knew what was going on with me and the folks at Utah... I do have this one suspicion and I will get to that later.

I got bored and decided to really read up on FairCom ACE Databases. I got a trial and read the manual, created a database, and learned how I could bypass a lot of my own security.

I finally got to see it around April 2012, and as soon as I did I blew right threw ALL security. Encryption and Authentication. I was really happy about this, because I thought I could show Dentrix, and they would just fix it, and maybe stop lying. I created a youtube video that showed the password and for this I received a phone call from Michael Allsop:




I remove the video in question, and just asked that Henry Schein take security more seriously. They told me they would and that was that. 

Dentrix G5 HotFix 1 Patch through Dentrix G5 HotFix 2:

They changed the password and that was it. This was around June of 2012. So I decided to make a post on DentalTown about it, I also emailed the good folks at Dentrix to tell them the new password.

HotFix2 was a little better, they changed a dll file that no longer showed the password in a tcpip packet, but the older dll could be swapped out and it showed the new password, so FAIL.

I showed them emails showing them me accessing my SSN and asked them if we should tell DentalTown about AES.  They asked me again to be a Dentrix Beta Tester, which I again refused. My customer number starts with 666, maybe they view me as the AntiChrist.



LightHouse 360 and Write Access:

Dentrix had given DemandForce exclusive access to the Dentrix G5 Database. This was GREAT if you had a financial interest in DemandForce, otherwise it was kinda shitty. People were upgrading to G5 to find that they could not WRITE to the database. I thought this was bad. Partly because Schein doesn't seem to give a shit about security, but on the other hand uses the security, to restrict other companies from writing to the database.

Using False Encryption to Keep Customers:

I found that Provo Dental Care was trying to leave Dentrix G5 but she was going to be charged an hourly rate to decrypt her database. This made them upset. I have also received an email from Curve Dental asking if I could do anything at all in regards to Dentrix giving them the run-around in regarding decrypting a database.
http://thedigitaldentist.com/2012/02/dentrix-g5-ships/

Dentrix 11 Database on the piratebay:

I found a database in September 2012 on a file-sharing website, and 18 people were seeding this database without realizing what they were seeding most likely. Either way this was bad, and I emailed Dentrix. Bangerter asked me not to "out the doctor" because he was probably already on Dentrix G5. I informed Howard my SSN had not changed between 11 and G5 letting him know that I wasn't buying their security bullshit, and I called the doctor to let him know, and then Howard followed up. Howard told me again not to out the doctor. I had a feeling they would blame me if I did. Just a hunch.


US-CERT & DentalTown Ad:

Since they asked me not to out the doctor, for a very serious breach, I sensed a real culture problem at Henry Schein, so I decided I should probably tell US-CERT about Dentrix. This was going to have serious reprocussions on my business and contacts\relationships, but I felt like this shouldn't matter because a lie is a lie is a lie, and someone should try to stop them.

US-CERT created VU# 948155 in response, in October of 2012 and during this time was working with Schein.

While all of this was going on, Schein decided to go ahead and advertise encryption and safety from hackers, before the first VU# from US-CERT was even public on DentalTown.


This irritated me, mainly because they were now ignoring my work. This is fine if your just some ho-hum company, but when your in charge of writing the nations #1 PMS Software in Dentistry... not good culture. During this time I pleaded with Howard Goldstein at Dentaltown which he told me:

From: Howard Goldstein <HoGo@farranmedia.com>Date: Tue, Nov 6, 2012 at 8:49 PMSubject: RE: oh yeahTo: Justin Shafer <justinshafer@gmail.com>, howard.bangerter@henryschein.com

Justin-You are much smarter than I am with technology and I listen to you.However I am much smarter than you with common senseJEven if you are right, common sense says that it is not worth getting into a legal battle with a big company.Please listen to me and let this go.Take Care…Howard Howard M. Goldstein, DMDDirector of Continuing EducationFarran Media LLCDentaltown / Orthotown / HygienetownDentaltown Message Board Manager9633 S 48th Street  / Suite 200  /  Phoenix, AZ 85044cell: 610.216.3374   | fax: 610.866-1936 HoGo@farranmedia.com

This upset me because all my posts (that got deleted) and emails were falling on deaf ears.

I had a conversation with Lorne:

The Digital Dentist drlavine@thedigitaldentist.com

11/6/12

to me

Well, here's my take on it, you can take it as advice from someone older, or just ignore it as the ramblings of someone whose opinion doesn't matter: One of the things I've learned after 25+ years in business is that what you know is rarely as important as who you know. Dentistry is a small community and you never know who you're going to want in your corner someday. If you choose to do battle with an $8 billion company, I guess that's your prerogative, but it separates you away from a good chunk of the rest of the community. I compete with Schein on deals every day…but I also get a lot of my income from doing webinars, lectures, whitepapers, etc for them and their partners. There's no reason you can't play nicely with them and turn it to your advantage. Your posts, however, are having the opposite effect. I don't know if HoGo has communicated with you, but if I were Moderator of that forum, I'd certainly be suggesting that you tread lightly. Again, take the advice as you want. As a colleague and friend, I felt I owed it to you to at least try. Sincerely,

image001


Then I was threatened with a "Linked In View".. ROFL. Yes that is correct, except how would you feel? Bangerter told me "they even work on Christmas!"
http://www.proskauer.com/professionals/sigal-mandelker/


Sigal testified before Congress a number of times on matters of criminal law, prepared Administration officials for congressional hearings, and negotiated various legislative provisions with congressional staff and within the Administration. She also represented the Department of Justice before the Federal Communications Commission, chaired Team Telecom, an interagency group that reviews telecommunications licenses where there is foreign investment and worked with a number of Federal agencies on a wide-range of regulatory and policy matters. In numerous enforcement areas, she coordinated the Department’s work with the FBI, DHS, ICE, U.S. Secret Service, the State Department, USTR, the Department of Commerce, the White House, the National Security Council, the Homeland Security Council and other government agencies.


I went on DentalTown and made a post that I needed a Ferrari if I was going to look the other way now. This was just a joke, but my intention was to let them know I was not backing down.

Right before this went public in April 2013, I created a new youtube video showing off how FairCom Standard Encryption could always be bypassed, confusing a lot of people. as they thought this new video had something to do with the VU# that came out, but it didn't.
Dentistry IQ released an article about this, and let Lorne Lavine give a quote, in which he said there was nothing to really worry about. Yeah... Hard-Coding Credentials, Local Admin, and Flash.. nothing to worry about there.... (IDIOT)

Chalk it up to a culture problem. Lorne was with me at the summit, and perhaps he just doesn't care about security and being honest. At this point, I thought Dentrix G5 was finally fixed regarding authentication, up until I had the weirdest dream! More on that later.


US-CERT Part 2:

Faircom Standard Encryption Vulnerability! US-CERT decided to do something with the second youtube video I made.

 They talked to Faircom and persuaded Faircom to rename encryption to something called data camouflage, which is a catchy name for data scrambling. I commend Faircom for doing this.

Henry Schein ignored ALL of this, and just kept calling Dentrix G5 encrypted for HIPAA, which was just an absolute awful thing to do.

Not only this, but I was getting PISSED. I decided to come up with a new plan. Remember that Dentrix Database on a File-Sharing Site????

Waiting Game 2:

May 2013, I was about to freak out. Waiting for US-CERT to do the second VU#. Dentrix was no longer talking to me, none of my efforts seemed to have had any affect, and everyone I knew told me not to care about this, and let it go, but I just didn't want to quit. I realized my mugshots were also on the internet. Everytime I went to US-CERT, mugshots.com would find dirt to dig up on me. This really depressed me as I had been arrested in the past and I just hated knowing someone would try using this against me to shut me up. I decided to play into this (screw it right?). I posted an instrumental version to Cypress Hill's Illusions.



And I had a bite from someone named DewDropInn... I kinda regretted doing this test, but I figured eventually they would try to laugh me off of DentalTown if GIVEN ENOUGH TIME. So I decided my time on DentalTown was most likely short lived. It was only a matter of time until the mugshots oozed into DentalTown by "mistake" only to be there long enough for enough people to see it, and then Hogo will "act" like he cares and moderate it. I figure this video would let someone know, I don't give a shit about the mugshots.. Bring it!!! In fact, I will GO FIRST!

My dad offered me a job so I took it because I was extremely depressed at this point in my life. I regret this, but I would probably not have my house still if I hadn't... All I could do was keep my head down on my desk, I barely answered the phone.. Life really sucked. Working for your parents wasn't all I thought it would be, worse I spent most of my time doing computer projects like intraoral capture buttons.

Also during this time I was asked many times to refrain from talking about Dentrix. Howard Goldstein told me I was not allowed to talk about it. I reminded him to remind Howard Farran about the ADA Emails and I would do whatever the hell I fucking please. Ta Ta!
From: Howard Goldstein <HoGo@farranmedia.com>Date: Thu, May 16, 2013 at 9:42 AMSubject: RE: Reported Post: Total Lack of SupportTo: Kerrie Kruse <kerrie@farranmedia.com>, Lorie Xelowski <lorie@farranmedia.com>, Ashley Harris <ashley@farranmedia.com>, Ken Scott <ken@farranmedia.com>Cc: "Justin Shafer (justinshafer@gmail.com)"<justinshafer@gmail.com>

Justin-Today was your last post about ANYTHING Dentrix.  Even if helpful.   Sorry but I have way too much of a workload to have to be monitoring you on a daily basis.  Uwe Mohr is not allowed to post anything about Cerec.  Kevin Tighe is not allowed to post about 123postcards.com.  Others are not allowed to post about other subjects that they have issues with.  The new rule is that you are not allowed to post about Dentrix.Your other posts are valuable but enough is enough....Sorry...Howard
Howard M. Goldstein, DMDDirector of Continuing EducationFarran Media LLCDentaltown / Orthotown / HygienetownDentaltown Message Board Manager9633 S 48th Street  / Suite 200  /  Phoenix, AZ 85044cell: 610.216.3374

I also added links to my DentalTown Signature so ALL my posts would show this information, and I have 11K of posts!

Breaking Hard Coded Credentials AGAIN:

That is right. I thought it was fixed, I wanted it to BE fixed. I posted on DentalTown it was fixed. I told US-CERT it was fixed. But in reality it was NOT fixed. I give credit to god for this (Yeah, I know this sounds quite bizarre) but I had this dream one night that I was using WinHex to swap actual hashes out of the FairCom.FCS file and pasting it to another, and if you did this with 9.0, it would show that password hash in RAM. This was a dream, and I was doing it with someone... holier then me. I know, it is crazy right? Well I woke up and ran to me computer and sure enough, that method WORKED! And I was BACK IN BUSINESS!!!!! WOOT WOOT!!!!!!!!!!!!!!!!!!!

I told US-CERT, and heard nothing.......  So I figured they were in Schein's pocket at this point, or had some other motive I was and am still not REALLY that fully aware of, except that US-CERT has WAY more patience then I do!

NIST and US-CERT Release VU# 900031:

I can FINALLY go to the folks at DentalTown and tell them that YES, even NIST agrees with me!
https://www.kb.cert.org/vuls/id/900031
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0148
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4952

I contacted Hogo and Howard Farran and literally got nowhere. We had a phone call and all they wanted me to do was not talk about this on DentalTown, this bugged me because DentalTown was paid money to carry on a lie, and I wanted them to DO something about it. (Not realizing that is easier said then done, I really didn't give a shit, and still don't)



Shit Hits the Fan:


August 2013, I had enough of this. I decided I would start a thread stating that Dentrix G5 was NOT encrypted. I think I called out Lorne, but I am not 100% sure since DentalTown deleted the thread.
http://www.dentaltown.com/MessageBoard/thread.aspx?s=2&f=145&t=209313

I have already been reminded to what would happen to me if I was banned:
From: Howard Goldstein [mailto:HoGo@farranmedia.com]
Sent: Wednesday, February 08, 2012 5:40 PM
To: justin@onsitedentalsystems.com
Cc: Ken Scott; Lorie Xelowski; Kerrie Kruse
Subject: Justin's Account...


Justin- If we are forced to ban you, you no doubt would open a new fake account.  However you would never be able to post openly on Dentaltown again.  This would not be good for your business or your reputation.   We would not hetitate to let Townies know why Justin is gone.  If you EVER give out a password like you did on that post today or post so rudely about a company the way that you did today,  your account will be officially inactivated.  Use your head and think before you post on Dentaltown.  You do not have free reign to post whatever you feel.. Furthermore your account information has you listed as Phfvtacb Vbvbjqmg from San Francisco with a phone # of 555-666-0606.You need to update your account within 24 hours or your account will be inactivated. Regards…Howard   Howard M. Goldstein, DMDDirector of Continuing EducationFarran Media LLCDentaltown / Orthotown / HygienetownDentaltown Message Board Manager9633 S 48th Street  / Suite 200  /  Phoenix, AZ 85044cell: 610.216.3374   | fax: 610.866-1936 HoGo@farranmedia.com

In the Dentrix G5 thread, I remember Lorne saying that Dentrix G5 was encrypted, even after US-CERT and NIST said it wasn't. I called him ignorant, a hybrid (part IT part perio), and asked him if he was in on the take. I also promised him that one day when you googled "Dentrix Encryption" that all the results would be truthful. He was actually the top result, and he posted that he was glad and he should commend his social marketing manager.

I then was banned for 1 week, and I decided this should be a permanent ban. Why participate on a board that doesn't care about truth or hurting patients during a data breach? Why continue years of posts knowing this? Even after the ADA, Thumbs up and even being able to grab the entire database and SSL keys, even after the Dentrix Credit Card thing, even after the Dentrix Database on a File Sharing Site, and NIST and US-CERT (twice), no somehow none of this was enough..

Justin-
You are accusing Lorne of being on the take.
You have called him ignorant on our message board.
We have told you repeatedly that you cannot let your anger get the best of you and do that on the message board.
You can get your points without the personal attacks...
I am going to inactivate your account for one week so you can think about ways that you can get your points across without the personal attacks.
Please don't hack back in.
Next Sunday I will reactivate your account.
You have been warned so many times.  We have no choice.
...Howard

Howard M. Goldstein, DMD
Director of Continuing Education
Farran Media LLC
Dentaltown / Orthotown / Hygienetown
Dentaltown Message Board Manager
9633 S 48th Street  / Suite 200  /  Phoenix, AZ 85044
cell: 610.216.3374
HoGo@farranmedia.com<mailto:HoGo@farranmedia.com>

So I decided to exploit a cross site scripting vulnerability that I told Ken the Dentaltown IT guy about. The reason I found it was because in July 2013 someone had their gmail account hacked and thought it was Dentaltown because DT and Gmail were the only 2 sites that had that password, further more at the same time someone was able to make posts in the Classifieds section without an account. Anyways the night of my first ban I started posting as other people, and I ended DentalTown with a good Rick Roll. I do apologize if I offended anyone or used your account to make a statement. Also, you should say thank you to me because in the end, I increased the security of DentalTown and also posted that they tell everyone to change their passwords especially if your DT password was the same as your email, then I could have logged into you account..... I may have tested this theory.

I originally wanted to turn DewDropInn's avatar into Mike Barr's monkey butt photo, but instead I did "civil disobedience" in DentalLand.

So now I am banned!





That Didn't Work... Whatever happened to that Data Breach I found out about?????


SHIT REALLY HITS THE FAN:


So I noticed that Data Breach was not on the HHS Wall of Shame, and the dentist never called me back, and Howard Bangerter acted like they were "taking care of it" and the doctor was going to notify HHS. But I didn't see it on the wall of shame, so I called Dr. David DiGiallorenzo's Office Manager to ask her if they mailed out letters, and she told me I would have to ask the doctor that question. I then went on LinkedIn and asked an employee and she had no idea of what I was talking about, which was odd to me. So eventually I contacted a local news station, WNEP in Pennsylvania. I gave them a list of patients and Dave Bohman went around asking people if they had received a letter from the doctor.

Basically the doctor said I hacked him and filed 2 criminal complaints against me in 2 states, mine and his.


http://wnep.com/2013/12/09/stolen-data-on-thousands-of-williamsport-area-dental-patients/
(This is continued in another blog post on my site because of the length)

This is when I met a woman named PogoWasRight aka Dissent


DISSENT (Bum Bum Bum):


2014
"Hell hath no fury like a woman scorned"

Dissent aka "PogoIsRight" is a woman who runs a couple of blogs on databreaches. She knows a lot of people and loves to read stuff that only attorneys would like to read. She is very helpful.

She made this awesome blog post!
http://www.phiprivacy.net/dentrix-claims-it-encrypts-their-data-but-does-it/
And she has friends!
http://www.alertboot.com/blog/blogs/endpoint_security/archive/2014/01/14/hipaa-encryption-when-is-encryption-not-encryption.aspx

And this is what got Dentrix to stop calling the database encrypted. She found many experts and had them comment, and that was enough to make them think twice about what life will be like in a court room?

She also taught me that when someone accuses you, you should respond to this allegation. I think she is right. She wrote some FTC complaints and I gave her statements and worked with her on understanding how all these hacks work. This took awhile and after we finished she said "now wait a couple of years" and I thought I was going to die!

US-CERT... Again:
March 2014
I took the oportunity to show US-CERT my FTC statement hoping that would get their attention along with muttered phrases like "who lies to homeland security???" and I figured this would get some sort of emotional response out of this black hole called CERT. I jokingly say this because we did have some phone calls in 2012 and I found them to be "cool", up until they ignored me, albeit, I can be annoying as hell to some people I want to be annoying to. I usually do this by sending LOTS and LOTS of email.

To my surprise, they responded. I was using techniques from my dream and they told me my dream wasn't good enough. They told me I had to actually crack the algorigthm, even though my youtube video was good enough to me.

So I then worked out the algorithm and they asked me to put it in a script form and that was my requirement to get a new VU#... Sigh.. So I called a friend and he created a script from the algorithm and THEN they assigned me VU# 176231.

CERT told me that Schein should have it fixed with Dentrix G5.3 and that a fix probably would not be around until August 2014 but could be later.

ADA posts a notification of a Data Breach:
May 2014
ADA has a tiny data breach and still notifies. Good Job! 
I also had a hand at getting a website called the dental record updated.

WAITING GAME 4:
August 2014:
After US-CERT told me to wait, I did. I heard that Dentrix G5.3 was not actually going to be released, instead they were going to call the product Dentrix G6. So I met a client with Dentrix G6 Beta and I tested the security of that. I found that the hard coded credentials were STILL present, which meant that I was waiting for nothing.

I then say this and realized that the Dentrix was REALLY not taking things seriously:
http://blog.osvdb.org/2013/05/21/henry-schein-practice-solutions-legal-threat/ They had also threatened legal action against a well known security researcher. Not a good feeling. This was an old blog post, but this was news to me.

Since the argument was based wether or not the exploit could be used remotely, I decided to port scan the internet, and 10 minutes later I found a server running Dentrix that was exposed to the internet. I decided to exploit this and when into the resource table and found the office phone number and doctor's social security number. Instead of just calling the office, I sent an email to US-CERT, FTC and HSPS and then waited about 3 days. After that I called the dentist and he reconfigured the internet and I told him this was not a data breach, but was more my own security testing.

"that should shut them up"

CSO Magazine, Baby:
So after a REALLY long wait of wondering when US-CERT would publish my vulnerability, I got on twitter and told Dissent that I was getting depressed and wasn't sure we were getting anywhere. She calls on a friend of her's named Steve Ragan. Steve is cool. He writes an article about Dentrix Hard Coded Credentials.

This seems to help a lot, in the background.

During this time my friend who works at Henry Schein Tech Support sent me some screenshots of what was going around.

November 2015:
My patience started to run thin. I posted my G5 and G6 security research on my blog and my evidence on the LANAP breach, and to my dismay the investigation into that data breach was already over. Wow.


FTC RESPONDS!!!
January 2016:
Schein was fined 250K for my efforts if I can interpret the news correctly. I am also aware that this is a public comment period as well. I personally hoped for a larger fine in all honesty, but at least I know nobody in dentistry will falsely advertise security again. (I hope!)

Dentrix G6.2:
Dentrix drops the hard-coded credentials and adobe flash! Great Job Mick Gomm, Nick Pelliccio and me. NOW you set a Database Passphrase and this will then be scrambled to be a Database Password you do not know.
Dentrix G6.2 Screenshot!


Summary:
Was this worth it to lose this many friends?????????? Not even my own Dentist uses me for IT Services, because when I went to work for my dad I told him to use my friend and instead he signed some contract paying $600 a month for IT Services... Sigh.

I don't have access to my 12 year diary (DentalTown).

I don't really feel like this was "closure".

Was it worth it?
Ask me in 10 more years, and I might have a better answer. I still wait for some answer regarding LANAP and I wonder when US-CERT will come around. I do know that when people discuss Dentistry and Security, I get a smile on my face. So yeah, probably so. I also know a woman in a van drove to my house honking her horn and told me if you care about your kids and drove away during late 2012. That had my heart rate up to 160 bpm for months. Usually when I tell this part of the story people say something like "Uhhhh, yeah". I received a call from the FBI and I kept thinking I would hear back from them again. I got really paranoid.



CERT RESPONDS TO MY EAGLESOFT WORK! 


Yeah.... I made a promise not to do this, but after I realized how much help they needed..... 

http://justinshafer.blogspot.com/2016/02/moving-onto-eaglesoft-aka-patterson.html

*Why not SoftDent?
a) I want the LATEST version to test
b) They are transitioning between Faircom from 1997 and Microsoft SQL
c) I know I could find their password and I am sure it is most likely the same across all installations
d) I make up a lot of excuses not to.

Hopefully.. they will get the message.. Otherwise, anyone could easily do it from just watching my Dentrix Videos...........

Dentrix Image stores SSNs... Why I don't know... All one needs is the SQL SA account password that is hard coded? Not sure about Dexis 10, I am pretty sure it does not. I have heard other rumors..

Mogo??? Sure... why not?

Now you know, and knowing is half the battle... Seriously.. the other half is getting people to care.

Developers have this idea that the network is the last line of defense, when in reality, it SHOULD be the DATABASE. Most companies choose to hard-code the database back end passwords...........

Except for Open Dental. But then again, that was one really big reason why Jordan Sparks left the Dentrix Platfrom and started development on Free Dental, which in turn became Open Dental... control over the database.

I have heard Dentrix Enterprise owners can set the backend database password.. No idea of the validity on that, but I am pretty sure it is true. Strange.


Uninstalling PowerPay breaks the Dentrix Signature Pad FIX.

$
0
0
If you uninstall PowerPay 5, it deletes a registry key required for Dentrix to use Signature Pads, it also prevents the Document Center Preferences windows from working, and as a result, nothing happens when you click it, also your only option to sign a document is the Pointing Device.

This should fix it. I requested this to be added to the public side of the Dentrix Knowledgebase. I called into tech support and nobody I spoke to could fix this (I do know one tech at HSPS who most likely knew the answer, but I didn't want to bug him.. I wish I had looking back).

Long story short, adding these registry keys will correct the problem. I finally fixed it myself, only to find out.. well... nevermind.

64 bit

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\PMTS\Signature]

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\PMTS\Signature\Devices]
"PMTSSigInstalled"="1"

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\PMTS\Signature\Devices\Interlink_VP9701]
"DESC"="Interlink ePad"
"DLL"="C:\\Program Files\\Dentrix\\esigdevice.dll"

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\PMTS\Signature\Devices\Interlink_VP9851]
"DESC"="Interlink ePad II"
"DLL"="C:\\Program Files\\Dentrix\\esigdevice.dll"

32 bit

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\PMTS\Signature]

[HKEY_LOCAL_MACHINE\SOFTWARE\PMTS\Signature\Devices]
"PMTSSigInstalled"="1"

[HKEY_LOCAL_MACHINE\SOFTWARE\PMTS\Signature\Devices\Interlink_VP9701]
"DESC"="Interlink ePad"
"DLL"="C:\\Program Files\\Dentrix\\esigdevice.dll"

[HKEY_LOCAL_MACHINE\SOFTWARE\PMTS\Signature\Devices\Interlink_VP9851]
"DESC"="Interlink ePad II"
"DLL"="C:\\Program Files\\Dentrix\\esigdevice.dll"

Dentist Wifi Hack tweet analysis

$
0
0
I am doing this out of boredom, and just because I thought this was interesting.

Not exactly scientific research. I searched twitter for Dentist Hack and couldn't help but notice these tweets where they claimed to of hacked a dentist wifi. No telling who they really are, I just thought it was interesting. Especially because in 2015, most dentists use WPA2, and not a dictionary word? But then again it is possible the guest network is simply another router attached to the office router and its not restricting the subnet. Or this is just bullshit. It makes sense though, the majority is female. This does NOT include tweets about attempting to hack the wifi (mainly female, yet again), nor did I include a dentist claiming he got hacked because he seemed to be joking.



And no, I don't "owe you 3 minutes of time back".. hahaha.




How I helped secure the Dental Industry

$
0
0


It all started around 2009 when I started to have fun with "security". It started with a thumbs up feature that DentalTown added, and ended with me making a FTC Statement and 4 US-CERT vulnerability notes. 1 to Faircom, 2 to Dentrix (1 remains private) and 1 to Eaglesoft.

"Data security is very cool on the cloud. I’m a big believer in establishing proven backup procedures for my clients. I’ve seen too many practices lose all of their data before I could help them. But procedures rely upon people, and too many times people don’t follow procedures. The cloud, on the other hand, is automated. Data backup is a natural part of the cloud. The doctor using Web-based dental software will never be bothered by its database backup or software upgrade worries ever again. There isn’t a better business continuity plan than the cloud."
Sigh.

After the thumbs up thing I realized I could actually ban people on DentalTown, and I did this to one person intermittently (that was actually really funny). I eventually realized that there were problems in the mechanism used to upload images as you could use it to upload shells or other peoples pictures or even deface the site.
Shell:

 After this I progressed to other websites that I won't name, but two I will. I would love to name some others but I shouldn't. I like to say, I help law enforcement though. And even a financial institution. I never thought that would happen, but to my surprise, I started seeing problems with all sorts of different websites, and I couldn't help but try to get them fixed, most of the time.

2011:

Dental Websites: If you had a business in dentistry, I might of tested you.

http://www.dentalaegis.com/news/?id=1 I remember... Oh.. nevermind. Heh.

later on:
http://www.dentalrecord.com/ Just because Darrell was buying paper from there. Heh.

American Dental Association:
This was something called SQL Injection. I was just being a white hat, and I knew what damage this could do to dentists. I never really inspected all the databases or tables or really went into this.

Me to Howard Farran:
From: Justin Shafer [mailto:justinshafer@gmail.com]
Sent: Monday, January 17, 2011 10:36 PM
To: Howard Farran
Subject: Hacks

New stuff lately.

1.       http://dexis.com/mambo/ (I didn’t write that, it was already there.. which was funny as hell)
2.       I got into the dentrix credit card processing. They left the admin password as password. But they still haven’t completely fixed it, after I told them!
3.       ADA is open to exploit! I can look at test scores? Havent tried changing them. Gave this to Steve Roberts and I am hoping between the two of you the ADA wont get too mad. =)

Don’t share this with ANYONE. JUST YOU! And ken if you like.



Know anyone at the ADA Howard? I am giving dentrix a week until I tell them to fix the credit card stuff.

Howard Farran to Me:
From: Howard Farran <howard@dentaltown.com>
Date: Mon, Jan 17, 2011 at 11:48 PM
Subject: Get me all the ADA dentists emails and you just made yourself some money dude! I am serious!!!
To: Justin Shafer <justinshafer@gmail.com>


Get me all the ADA dentists emails and you just made yourself some money dude!  I am serious!!!  This is only between you and me. 

Create a great day!

Howard

Howard Farran DDS, MBA, MAGD

Today's Dental: * 10850 South 48th Street * Phoenix, Arizona 85044 USA * O) 480-893-1223 * F) 480-496-9363 * E) Howard@TodaysDental.com  * W) www.TodaysDental.com

Farran Media: * 9633 South 48th Street, Suite 200 Phoenix, Arizona 85044 USA * O) 480-480-445-9712 * F) 480-598-3450 * E) Howard@DentalTown.com  * W) www.DentalTown.com  * W) www.HygieneTown.com * W) www.OrthoTown.com *www.Facebook.com/DrHowardfarran

WHY?
From: Howard Farran [mailto:howard@dentaltown.com]
Sent: Tuesday, January 18, 2011 9:36 PM
To: justinshafer@gmail.com
Subject: The more I think about this Justin, the more you need to realize!

The more I think about this Justin, the more you need to realize!  You are going to turn more dentists onto first world dentistry than anyone!  When I just travel 100 miles south of Phoenix into Mexico the quality of the dentistry drops 90%.  If we can find these dentists, send them an email, and turn them onto first world dental information we will truly make a difference in this world!  This could be the most important project of your life! www.DentalTown.com has 140 free continuing education courses and the www.ADA.org has zero, yet they collect over $100 million a year in dues! 

Create a great day!

Howard

Howard Farran DDS, MBA, MAGD

Today's Dental: * 10850 South 48th Street * Phoenix, Arizona 85044 USA * O) 480-893-1223 * F) 480-496-9363 * E) Howard@TodaysDental.com  * W) www.TodaysDental.com

Farran Media: * 9633 South 48th Street, Suite 200 Phoenix, Arizona 85044 USA * O) 480-480-445-9712 * F) 480-598-3450 * E) Howard@DentalTown.com  * W) www.DentalTown.com  * W) www.HygieneTown.com * W) www.OrthoTown.com *www.Facebook.com/DrHowardfarran

OH! But what about the law?

Justin Shafer justinshafer@gmail.com

1/19/11

to Howard

DONT DO IT!
From: Howard Farran [mailto:howard@dentaltown.com]
Sent: Wednesday, January 19, 2011 9:04 AM
To: Justin Shafer
Subject: RE: The more I think about this Justin, the more you need to realize!

Don’t do it dude

Create a great day!

Howard

Howard Farran DDS, MBA, MAGD

Today's Dental: * 10850 South 48th Street * Phoenix, Arizona 85044 USA * O) 480-893-1223 * F) 480-496-9363 * E) Howard@TodaysDental.com  * W) www.TodaysDental.com

Farran Media: * 9633 South 48th Street, Suite 200 Phoenix, Arizona 85044 USA * O) 480-480-445-9712 * F) 480-598-3450 * E) Howard@DentalTown.com  * W) www.DentalTown.com  * W) www.HygieneTown.com * W) www.OrthoTown.com *www.Facebook.com/DrHowardfarran

Lorne Lavine:

Dental Technology Consultants drlavine@thedigitaldentist.com

2/1/11

to me

Get me those 55,000 emails and dinner is on me J Sincerely,

image001

Check out my blog: http://thedigitaldentist.blogspot.com Lorne Lavine, DMD, A+, Network+2501 W. Burbank Blvd. #303Burbank, CA 91505866.204.3398drlavine@thedigitaldentist.comwww.thedigitaldentist.com

From: Dental Technology Consultants [mailto:drlavine@thedigitaldentist.com]
Sent: Tuesday, February 01, 2011 10:56 PM
To: Justin Shafer
Subject: RE: Xray

Yup…if I knew how and could use a different IP to access, I probably would. I certainly would never advocate theft or anything like that, but if the list happened to plop into my lap, not so sure I would throw it out.

Sorry if you think less of me for that, I happen to know the value of email addresses for someone like me who uses the Internet extensively to market.

Sincerely,
image001

Lorne Lavine, DMD, A+, Network+
2501 W. Burbank Blvd. #303
Burbank, CA 91505

Howard gets Curious:

Howard Farran howard@dentaltown.com

2/3/11

to me

Now the ADA is spamming me with emails??  LOL..  How many emails did you actually get? 

Create a great day!

Howard

Howard Farran DDS, MBA, MAGD

Today's Dental: * 10850 South 48th Street * Phoenix, Arizona 85044 USA * O) 480-893-1223 * F) 480-496-9363 * E) Howard@TodaysDental.com   * W) www.TodaysDental.com * www.Facebook.com/TodaysDental

Farran Media: * 9633 South 48th Street, Suite 200 Phoenix, Arizona 85044 USA * O) 480-445-9712 * F) 480-598-3450 * E) Howard@DentalTown.com   * W) www.DentalTown.com   * W) www.HygieneTown.com  * W) www.OrthoTown.com  *www.FarranMedia.com * www.Facebook.com/DrHowardfarran

OK! 
So some time goes by and the ADA was still exploitable and I sent them an email asking them why and my response was an email from the director, in the form of a threat, I threatened to tell DentalTown Magazine (rofl):

From: OLoughlin, Kathleen T. <oloughlink@ada.org>
Date: Mon, Apr 4, 2011 at 4:57 PM
Subject: RE: Ummm
To: Justin Shafer <justinshafer@gmail.com>
Cc: "Pittman, Lalita"<pittmanl@ada.org>


Dear Mr. Shafer:

    We appreciate your interest in ADA and in ensuring the security of our computer systems.  You may be assured that we have addressed the issues with which you expressed concern and are confident that our measures are successful.  If you have specific evidence of weaknesses in our systems, or points of entry whereby you think access is possible, we would be pleased to learn more. 

    We are concerned, however, with what appear to be threats that you have made in your recent messages to publicize purported weaknesses in the ADA systems.  To make such threatswithout disclosing the nature of the alleged weaknesses, and for the apparent purpose of soliciting business from our organization, seems to us to be a questionable practice.  Moreover, we are equally concerned that you might be attempting, whether successful or not, to access ADA’s computer system in a manner that ADA has not authorized and that might therefore violate the law.

     Please understand that we do not intend to be overly contentious.  Nevertheless, we do take exception to the suggestion of actions that would have no purpose other than to embarrass the ADA and create issues with our constituents.  We take the security of our computer systems very seriously, and we hope that you are not implying anything to the contrary. 

     Should you wish to communicate with me further, please feel free to do so, but only if there is a constructive purpose to be served.  Please call me by phone if you wish to discuss.

Thank you

Kathy O’Loughlin


Kathleen T. O'Loughlin, DMD, MPH  oloughlink@ada.org
Executive Director
American Dental Association
312.440.2700
312.440.7488 (FAX)

________________________________________________________________________
American Dental Association  211 E. Chicago Ave.  Chicago,  IL 60611  www.ada.org


My Response: 
I told them I never sent them an invoice and I showed their IT guy what tool I used and everything, I sent a screenshow that said NOT FIXED!

And then they finally fixed this SQL Injection problem as far as I know. I was actually more worried about the DentPin Database but I knew to stay away from it.



What I did:
I sent Dr. Farran a large sample of just email addresses without nationalities which is just absolutely useless to send to mexican dentists. We stopped talking about this, and I stopped thinking about it.

EXCEPT THIS: I asked Steve Roberts at Henry Schein to find me a connection, and he found me the director.

Dentrix Credit Card Processing Website!
epay.dentrix.com was next though I never really meant to do this on purpose. I was at a clients house waiting for him to stop arguing with his wife, and he was paying his bills, and this login prompt was on his laptop, and I thought it would be fun to try admin and password as my credentials.





After this, I had impressed people so I got invited to a Dentrix Summit??? This is where Dentrix invites "leaders and popular people" to come up to Utah and have a circle-jerk about their software. When I arrived I was all ready to see the new Dentrix G5 Beta with the new Database. We all signed an NDA to attend.

THE LIE!

I was told Dentrix G5 would have an encrypted database and encrypted tcpip packets, but as soon as the presentation was over, and employee looked at me, and told me "It's easy!" without making to much noise. I was then asked if I would like a job at Dentrix, and I told them my mom had a stroke and my dad had a heart attack (all true), but in reality I felt like I was just being asked to aide in a cover up of lies.

I waited to see Dentrix for myself.

Henry Schein Practice Solutions advertised database encryption and security from hackers because their new database flies "low under the radar" from nefarious people. *rofl*http://web.archive.org/web/20140428021311/http://www.dentrix.com/products/dentrix/documentation/g5-white-paper.pdf 

They then asked me if I would like to work for them. 3 tech guys I didn't really know that well.


After the Summit:

I got an email from Howard Bangerter asking me if I would like to enroll in the Dentrix G5 Beta. I declined but told him I would. I noticed it had a Non-Disclosure Clause, and I figured that is what he really wanted. Then I was told by Howard Bangerter via a phone call that Sikkasoft was reading the Dentrix G5 database without being enrolled in the Dentrix Developer Program, and asked me how it might be possible, which was odd to me because someone from Utah told me that ODBC access was easy, even before I received this phone call. I told Howard that packet sniffing is the first place to start. I gave Howard the professional courtesy of saying "I am the last person you want to tell this to". 


Waiting Game 1:

Waited to see Dentrix G5 release. I was also asked if I would like to be employed at the local Schein office, but I really don't know if they knew what was going on with me and the folks at Utah... I do have this one suspicion and I will get to that later.

I got bored and decided to really read up on FairCom ACE Databases. I got a trial and read the manual, created a database, and learned how I could bypass a lot of my own security.

I finally got to see it around April 2012, and as soon as I did I blew right threw ALL security. Encryption and Authentication. I was really happy about this, because I thought I could show Dentrix, and they would just fix it, and maybe stop lying. I created a youtube video that showed the password and for this I received a phone call from Michael Allsop:




I remove the video in question, and just asked that Henry Schein take security more seriously. They told me they would and that was that. 

Dentrix G5 HotFix 1 Patch through Dentrix G5 HotFix 2:

They changed the password and that was it. This was around June of 2012. So I decided to make a post on DentalTown about it, I also emailed the good folks at Dentrix to tell them the new password.

HotFix2 was a little better, they changed a dll file that no longer showed the password in a tcpip packet, but the older dll could be swapped out and it showed the new password, so FAIL.

I showed them emails showing them me accessing my SSN and asked them if we should tell DentalTown about AES.  They asked me again to be a Dentrix Beta Tester, which I again refused. My customer number starts with 666, maybe they view me as the AntiChrist.



LightHouse 360 and Write Access:

Dentrix had given DemandForce exclusive access to the Dentrix G5 Database. This was GREAT if you had a financial interest in DemandForce, otherwise it was kinda shitty. People were upgrading to G5 to find that they could not WRITE to the database. I thought this was bad. Partly because Schein doesn't seem to give a shit about security, but on the other hand uses the security, to restrict other companies from writing to the database.

Using False Encryption to Keep Customers:

I found that Provo Dental Care was trying to leave Dentrix G5 but she was going to be charged an hourly rate to decrypt her database. This made them upset. I have also received an email from Curve Dental asking if I could do anything at all in regards to Dentrix giving them the run-around in regarding decrypting a database.
http://thedigitaldentist.com/2012/02/dentrix-g5-ships/

Dentrix 11 Database on the piratebay:

I found a database in September 2012 on a file-sharing website, and 18 people were seeding this database without realizing what they were seeding most likely. Either way this was bad, and I emailed Dentrix. Bangerter asked me not to "out the doctor" because he was probably already on Dentrix G5. I informed Howard my SSN had not changed between 11 and G5 letting him know that I wasn't buying their security bullshit, and I called the doctor to let him know, and then Howard followed up. Howard told me again not to out the doctor. I had a feeling they would blame me if I did. Just a hunch.


US-CERT & DentalTown Ad:

Since they asked me not to out the doctor, for a very serious breach, I sensed a real culture problem at Henry Schein, so I decided I should probably tell US-CERT about Dentrix. This was going to have serious reprocussions on my business and contacts\relationships, but I felt like this shouldn't matter because a lie is a lie is a lie, and someone should try to stop them.

US-CERT created VU# 948155 in response, in October of 2012 and during this time was working with Schein.

While all of this was going on, Schein decided to go ahead and advertise encryption and safety from hackers, before the first VU# from US-CERT was even public on DentalTown.


This irritated me, mainly because they were now ignoring my work. This is fine if your just some ho-hum company, but when your in charge of writing the nations #1 PMS Software in Dentistry... not good culture. During this time I pleaded with Howard Goldstein at Dentaltown which he told me:

From: Howard Goldstein <HoGo@farranmedia.com>Date: Tue, Nov 6, 2012 at 8:49 PMSubject: RE: oh yeahTo: Justin Shafer <justinshafer@gmail.com>, howard.bangerter@henryschein.com

Justin-You are much smarter than I am with technology and I listen to you.However I am much smarter than you with common senseJEven if you are right, common sense says that it is not worth getting into a legal battle with a big company.Please listen to me and let this go.Take Care…Howard Howard M. Goldstein, DMDDirector of Continuing EducationFarran Media LLCDentaltown / Orthotown / HygienetownDentaltown Message Board Manager9633 S 48th Street  / Suite 200  /  Phoenix, AZ 85044cell: 610.216.3374   | fax: 610.866-1936 HoGo@farranmedia.com

This upset me because all my posts (that got deleted) and emails were falling on deaf ears.

I had a conversation with Lorne:

The Digital Dentist drlavine@thedigitaldentist.com

11/6/12

to me

Well, here's my take on it, you can take it as advice from someone older, or just ignore it as the ramblings of someone whose opinion doesn't matter: One of the things I've learned after 25+ years in business is that what you know is rarely as important as who you know. Dentistry is a small community and you never know who you're going to want in your corner someday. If you choose to do battle with an $8 billion company, I guess that's your prerogative, but it separates you away from a good chunk of the rest of the community. I compete with Schein on deals every day…but I also get a lot of my income from doing webinars, lectures, whitepapers, etc for them and their partners. There's no reason you can't play nicely with them and turn it to your advantage. Your posts, however, are having the opposite effect. I don't know if HoGo has communicated with you, but if I were Moderator of that forum, I'd certainly be suggesting that you tread lightly. Again, take the advice as you want. As a colleague and friend, I felt I owed it to you to at least try. Sincerely,

image001


Then I was threatened with a "Linked In View".. ROFL. Yes that is correct, except how would you feel? Bangerter told me "they even work on Christmas!"
http://www.proskauer.com/professionals/sigal-mandelker/


Sigal testified before Congress a number of times on matters of criminal law, prepared Administration officials for congressional hearings, and negotiated various legislative provisions with congressional staff and within the Administration. She also represented the Department of Justice before the Federal Communications Commission, chaired Team Telecom, an interagency group that reviews telecommunications licenses where there is foreign investment and worked with a number of Federal agencies on a wide-range of regulatory and policy matters. In numerous enforcement areas, she coordinated the Department’s work with the FBI, DHS, ICE, U.S. Secret Service, the State Department, USTR, the Department of Commerce, the White House, the National Security Council, the Homeland Security Council and other government agencies.


I went on DentalTown and made a post that I needed a Ferrari if I was going to look the other way now. This was just a joke, but my intention was to let them know I was not backing down.

Right before this went public in April 2013, I created a new youtube video showing off how FairCom Standard Encryption could always be bypassed, confusing a lot of people. as they thought this new video had something to do with the VU# that came out, but it didn't.
Dentistry IQ released an article about this, and let Lorne Lavine give a quote, in which he said there was nothing to really worry about. Yeah... Hard-Coding Credentials, Local Admin, and Flash.. nothing to worry about there.... (IDIOT)

Chalk it up to a culture problem. Lorne was with me at the summit, and perhaps he just doesn't care about security and being honest. At this point, I thought Dentrix G5 was finally fixed regarding authentication, up until I had the weirdest dream! More on that later.


US-CERT Part 2:

Faircom Standard Encryption Vulnerability! US-CERT decided to do something with the second youtube video I made.

 They talked to Faircom and persuaded Faircom to rename encryption to something called data camouflage, which is a catchy name for data scrambling. I commend Faircom for doing this.

Henry Schein ignored ALL of this, and just kept calling Dentrix G5 encrypted for HIPAA, which was just an absolute awful thing to do.

Not only this, but I was getting PISSED. I decided to come up with a new plan. Remember that Dentrix Database on a File-Sharing Site????

Waiting Game 2:

May 2013, I was about to freak out. Waiting for US-CERT to do the second VU#. Dentrix was no longer talking to me, none of my efforts seemed to have had any affect, and everyone I knew told me not to care about this, and let it go, but I just didn't want to quit. I realized my mugshots were also on the internet. Everytime I went to US-CERT, mugshots.com would find dirt to dig up on me. This really depressed me as I had been arrested in the past and I just hated knowing someone would try using this against me to shut me up. I decided to play into this (screw it right?). I posted an instrumental version to Cypress Hill's Illusions.



And I had a bite from someone named DewDropInn... I kinda regretted doing this test, but I figured eventually they would try to laugh me off of DentalTown if GIVEN ENOUGH TIME. So I decided my time on DentalTown was most likely short lived. It was only a matter of time until the mugshots oozed into DentalTown by "mistake" only to be there long enough for enough people to see it, and then Hogo will "act" like he cares and moderate it. I figure this video would let someone know, I don't give a shit about the mugshots.. Bring it!!! In fact, I will GO FIRST!

My dad offered me a job so I took it because I was extremely depressed at this point in my life. I regret this, but I would probably not have my house still if I hadn't... All I could do was keep my head down on my desk, I barely answered the phone.. Life really sucked. Working for your parents wasn't all I thought it would be, worse I spent most of my time doing computer projects like intraoral capture buttons.

Also during this time I was asked many times to refrain from talking about Dentrix. Howard Goldstein told me I was not allowed to talk about it. I reminded him to remind Howard Farran about the ADA Emails and I would do whatever the hell I fucking please. Ta Ta!
From: Howard Goldstein <HoGo@farranmedia.com>Date: Thu, May 16, 2013 at 9:42 AMSubject: RE: Reported Post: Total Lack of SupportTo: Kerrie Kruse <kerrie@farranmedia.com>, Lorie Xelowski <lorie@farranmedia.com>, Ashley Harris <ashley@farranmedia.com>, Ken Scott <ken@farranmedia.com>Cc: "Justin Shafer (justinshafer@gmail.com)"<justinshafer@gmail.com>

Justin-Today was your last post about ANYTHING Dentrix.  Even if helpful.   Sorry but I have way too much of a workload to have to be monitoring you on a daily basis.  Uwe Mohr is not allowed to post anything about Cerec.  Kevin Tighe is not allowed to post about 123postcards.com.  Others are not allowed to post about other subjects that they have issues with.  The new rule is that you are not allowed to post about Dentrix.Your other posts are valuable but enough is enough....Sorry...Howard
Howard M. Goldstein, DMDDirector of Continuing EducationFarran Media LLCDentaltown / Orthotown / HygienetownDentaltown Message Board Manager9633 S 48th Street  / Suite 200  /  Phoenix, AZ 85044cell: 610.216.3374

I also added links to my DentalTown Signature so ALL my posts would show this information, and I have 11K of posts!

Breaking Hard Coded Credentials AGAIN:

That is right. I thought it was fixed, I wanted it to BE fixed. I posted on DentalTown it was fixed. I told US-CERT it was fixed. But in reality it was NOT fixed. I give credit to god for this (Yeah, I know this sounds quite bizarre) but I had this dream one night that I was using WinHex to swap actual hashes out of the FairCom.FCS file and pasting it to another, and if you did this with 9.0, it would show that password hash in RAM. This was a dream, and I was doing it with someone... holier then me. I know, it is crazy right? Well I woke up and ran to me computer and sure enough, that method WORKED! And I was BACK IN BUSINESS!!!!! WOOT WOOT!!!!!!!!!!!!!!!!!!!

I told US-CERT, and heard nothing.......  So I figured they were in Schein's pocket at this point, or had some other motive I was and am still not REALLY that fully aware of, except that US-CERT has WAY more patience then I do!

NIST and US-CERT Release VU# 900031:

I can FINALLY go to the folks at DentalTown and tell them that YES, even NIST agrees with me!
https://www.kb.cert.org/vuls/id/900031
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0148
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4952

I contacted Hogo and Howard Farran and literally got nowhere. We had a phone call and all they wanted me to do was not talk about this on DentalTown, this bugged me because DentalTown was paid money to carry on a lie, and I wanted them to DO something about it. (Not realizing that is easier said then done, I really didn't give a shit, and still don't)



Shit Hits the Fan:


August 2013, I had enough of this. I decided I would start a thread stating that Dentrix G5 was NOT encrypted. I think I called out Lorne, but I am not 100% sure since DentalTown deleted the thread.
http://www.dentaltown.com/MessageBoard/thread.aspx?s=2&f=145&t=209313

I have already been reminded to what would happen to me if I was banned:
From: Howard Goldstein [mailto:HoGo@farranmedia.com]
Sent: Wednesday, February 08, 2012 5:40 PM
To: justin@onsitedentalsystems.com
Cc: Ken Scott; Lorie Xelowski; Kerrie Kruse
Subject: Justin's Account...


Justin- If we are forced to ban you, you no doubt would open a new fake account.  However you would never be able to post openly on Dentaltown again.  This would not be good for your business or your reputation.   We would not hetitate to let Townies know why Justin is gone.  If you EVER give out a password like you did on that post today or post so rudely about a company the way that you did today,  your account will be officially inactivated.  Use your head and think before you post on Dentaltown.  You do not have free reign to post whatever you feel.. Furthermore your account information has you listed as Phfvtacb Vbvbjqmg from San Francisco with a phone # of 555-666-0606.You need to update your account within 24 hours or your account will be inactivated. Regards…Howard   Howard M. Goldstein, DMDDirector of Continuing EducationFarran Media LLCDentaltown / Orthotown / HygienetownDentaltown Message Board Manager9633 S 48th Street  / Suite 200  /  Phoenix, AZ 85044cell: 610.216.3374   | fax: 610.866-1936 HoGo@farranmedia.com

In the Dentrix G5 thread, I remember Lorne saying that Dentrix G5 was encrypted, even after US-CERT and NIST said it wasn't. I called him ignorant, a hybrid (part IT part perio), and asked him if he was in on the take. I also promised him that one day when you googled "Dentrix Encryption" that all the results would be truthful. He was actually the top result, and he posted that he was glad and he should commend his social marketing manager.

I then was banned for 1 week, and I decided this should be a permanent ban. Why participate on a board that doesn't care about truth or hurting patients during a data breach? Why continue years of posts knowing this? Even after the ADA, Thumbs up and even being able to grab the entire database and SSL keys, even after the Dentrix Credit Card thing, even after the Dentrix Database on a File Sharing Site, and NIST and US-CERT (twice), no somehow none of this was enough..

Justin-
You are accusing Lorne of being on the take.
You have called him ignorant on our message board.
We have told you repeatedly that you cannot let your anger get the best of you and do that on the message board.
You can get your points without the personal attacks...
I am going to inactivate your account for one week so you can think about ways that you can get your points across without the personal attacks.
Please don't hack back in.
Next Sunday I will reactivate your account.
You have been warned so many times.  We have no choice.
...Howard

Howard M. Goldstein, DMD
Director of Continuing Education
Farran Media LLC
Dentaltown / Orthotown / Hygienetown
Dentaltown Message Board Manager
9633 S 48th Street  / Suite 200  /  Phoenix, AZ 85044
cell: 610.216.3374
HoGo@farranmedia.com<mailto:HoGo@farranmedia.com>

So I decided to exploit a cross site scripting vulnerability that I told Ken the Dentaltown IT guy about. The reason I found it was because in July 2013 someone had their gmail account hacked and thought it was Dentaltown because DT and Gmail were the only 2 sites that had that password, further more at the same time someone was able to make posts in the Classifieds section without an account. Anyways the night of my first ban I started posting as other people, and I ended DentalTown with a good Rick Roll. I do apologize if I offended anyone or used your account to make a statement. Also, you should say thank you to me because in the end, I increased the security of DentalTown and also posted that they tell everyone to change their passwords especially if your DT password was the same as your email, then I could have logged into you account..... I may have tested this theory.

I originally wanted to turn DewDropInn's avatar into Mike Barr's monkey butt photo, but instead I did "civil disobedience" in DentalLand.

So now I am banned!





That Didn't Work... Whatever happened to that Data Breach I found out about?????


SHIT REALLY HITS THE FAN:


So I noticed that Data Breach was not on the HHS Wall of Shame, and the dentist never called me back, and Howard Bangerter acted like they were "taking care of it" and the doctor was going to notify HHS. But I didn't see it on the wall of shame, so I called Dr. David DiGiallorenzo's Office Manager to ask her if they mailed out letters, and she told me I would have to ask the doctor that question. I then went on LinkedIn and asked an employee and she had no idea of what I was talking about, which was odd to me. So eventually I contacted a local news station, WNEP in Pennsylvania. I gave them a list of patients and Dave Bohman went around asking people if they had received a letter from the doctor.

Basically the doctor said I hacked him and filed 2 criminal complaints against me in 2 states, mine and his.


http://wnep.com/2013/12/09/stolen-data-on-thousands-of-williamsport-area-dental-patients/
(This is continued in another blog post on my site because of the length)

This is when I met a woman named PogoWasRight aka Dissent


DISSENT (Bum Bum Bum):


2014
"Hell hath no fury like a woman scorned"

Dissent aka "PogoIsRight" is a woman who runs a couple of blogs on databreaches. She knows a lot of people and loves to read stuff that only attorneys would like to read. She is very helpful.

She made this awesome blog post!
http://www.phiprivacy.net/dentrix-claims-it-encrypts-their-data-but-does-it/
And she has friends!
http://www.alertboot.com/blog/blogs/endpoint_security/archive/2014/01/14/hipaa-encryption-when-is-encryption-not-encryption.aspx

And this is what got Dentrix to stop calling the database encrypted. She found many experts and had them comment, and that was enough to make them think twice about what life will be like in a court room?

She also taught me that when someone accuses you, you should respond to this allegation. I think she is right. She wrote some FTC complaints and I gave her statements and worked with her on understanding how all these hacks work. This took awhile and after we finished she said "now wait a couple of years" and I thought I was going to die!

US-CERT... Again:
March 2014
I took the oportunity to show US-CERT my FTC statement hoping that would get their attention along with muttered phrases like "who lies to homeland security???" and I figured this would get some sort of emotional response out of this black hole called CERT. I jokingly say this because we did have some phone calls in 2012 and I found them to be "cool", up until they ignored me, albeit, I can be annoying as hell to some people I want to be annoying to. I usually do this by sending LOTS and LOTS of email.

To my surprise, they responded. I was using techniques from my dream and they told me my dream wasn't good enough. They told me I had to actually crack the algorigthm, even though my youtube video was good enough to me.

So I then worked out the algorithm and they asked me to put it in a script form and that was my requirement to get a new VU#... Sigh.. So I called a friend and he created a script from the algorithm and THEN they assigned me VU# 176231.

CERT told me that Schein should have it fixed with Dentrix G5.3 and that a fix probably would not be around until August 2014 but could be later.

ADA posts a notification of a Data Breach:
May 2014
ADA has a tiny data breach and still notifies. Good Job! 
I also had a hand at getting a website called the dental record updated.

WAITING GAME 4:
August 2014:
After US-CERT told me to wait, I did. I heard that Dentrix G5.3 was not actually going to be released, instead they were going to call the product Dentrix G6. So I met a client with Dentrix G6 Beta and I tested the security of that. I found that the hard coded credentials were STILL present, which meant that I was waiting for nothing.

I then say this and realized that the Dentrix was REALLY not taking things seriously:
http://blog.osvdb.org/2013/05/21/henry-schein-practice-solutions-legal-threat/ They had also threatened legal action against a well known security researcher. Not a good feeling. This was an old blog post, but this was news to me.

Since the argument was based wether or not the exploit could be used remotely, I decided to port scan the internet, and 10 minutes later I found a server running Dentrix that was exposed to the internet. I decided to exploit this and when into the resource table and found the office phone number and doctor's social security number. Instead of just calling the office, I sent an email to US-CERT, FTC and HSPS and then waited about 3 days. After that I called the dentist and he reconfigured the internet and I told him this was not a data breach, but was more my own security testing.

"that should shut them up"

CSO Magazine, Baby:
So after a REALLY long wait of wondering when US-CERT would publish my vulnerability, I got on twitter and told Dissent that I was getting depressed and wasn't sure we were getting anywhere. She calls on a friend of her's named Steve Ragan. Steve is cool. He writes an article about Dentrix Hard Coded Credentials.

This seems to help a lot, in the background.

During this time my friend who works at Henry Schein Tech Support sent me some screenshots of what was going around.

November 2015:
My patience started to run thin. I posted my G5 and G6 security research on my blog and my evidence on the LANAP breach, and to my dismay the investigation into that data breach was already over. Wow.


FTC RESPONDS!!!
January 2016:
Schein was fined 250K for my efforts if I can interpret the news correctly. I am also aware that this is a public comment period as well. I personally hoped for a larger fine in all honesty, but at least I know nobody in dentistry will falsely advertise security again. (I hope!)

Dentrix G6.2:
Dentrix drops the hard-coded credentials and adobe flash! Great Job Mick Gomm, Nick Pelliccio and me. NOW you set a Database Passphrase and this will then be scrambled to be a Database Password you do not know.
Dentrix G6.2 Screenshot!


Summary:
Was this worth it to lose this many friends?????????? Not even my own Dentist uses me for IT Services, because when I went to work for my dad I told him to use my friend and instead he signed some contract paying $600 a month for IT Services... Sigh.

I don't have access to my 12 year diary (DentalTown).

I don't really feel like this was "closure".

Was it worth it?
Ask me in 10 more years, and I might have a better answer. I still wait for some answer regarding LANAP and I wonder when US-CERT will come around. I do know that when people discuss Dentistry and Security, I get a smile on my face. So yeah, probably so. I also know a woman in a van drove to my house honking her horn and told me if you care about your kids and drove away during late 2012. That had my heart rate up to 160 bpm for months. Usually when I tell this part of the story people say something like "Uhhhh, yeah". I received a call from the FBI and I kept thinking I would hear back from them again. I got really paranoid.



CERT RESPONDS TO MY EAGLESOFT WORK! 


Yeah.... I made a promise not to do this, but after I realized how much help they needed..... 

http://justinshafer.blogspot.com/2016/02/moving-onto-eaglesoft-aka-patterson.html

*Why not SoftDent?
a) I want the LATEST version to test
b) They are transitioning between Faircom from 1997 and Microsoft SQL
c) I know I could find their password and I am sure it is most likely the same across all installations
d) I make up a lot of excuses not to.

Hopefully.. they will get the message.. Otherwise, anyone could easily do it from just watching my Dentrix Videos...........

Dentrix Image stores SSNs... Why I don't know... All one needs is the SQL SA account password that is hard coded? Not sure about Dexis 10, I am pretty sure it does not. I have heard other rumors..

Mogo??? Sure... why not?

Now you know, and knowing is half the battle... Seriously.. the other half is getting people to care.

Developers have this idea that the network is the last line of defense, when in reality, it SHOULD be the DATABASE. Most companies choose to hard-code the database back end passwords...........

Except for Open Dental. But then again, that was one really big reason why Jordan Sparks left the Dentrix Platfrom and started development on Free Dental, which in turn became Open Dental... control over the database.

I have heard Dentrix Enterprise owners can set the backend database password.. No idea of the validity on that, but I am pretty sure it is true. Strange.

Someone reverse engineered a Dexis\Gendex Sensor to work on Linux

$
0
0
https://siliconpr0n.org/wiki/doku.php?id=uvscada:gxs700

Think I might have to try this later! I am going up to an office tonight and they just happen to have a Dexis Sensor.

Looks easy enough with his instructions. What a cool project!

IDEA! Could we use this to create a calibration file??????? Other then creating a box with led walls to create a dark room without light.. and knowing what image format the dexis software wants the calibration files.. I mean.. it might work.

But as the author notes, playing around with X-Rays is no laughing matter, and you would want safety in mind for a project like that. I saw a home made box that worked great, it was wooden and had lead lining. A sensor would go inside and somehow the box was fitted for an xray head I think.
https://en.wikipedia.org/wiki/Flat-field_correction ?

I am going to keep thinking about this. Like.. "Why don't capture buttons work on cameras?" rofl.

Update: With some help from a friend, and looking at the github and the differences between resolution and actual resolution.. I can read a raw dexis calibration file, so I should be able to write it. I have forked that man's project in case he takes it down!

Take 4 bytes out of a candy bar and pay attention to the sign the little indian boy shows you.

Also, my sensei says it is best to take an average of 8 shots of flat and gain and create an image out of the averages. 16 is better.. ImageJ can do that as well. So the only thing left to do is alter the github project to compensate for the resolution difference, and figure out.. which part of the code does raw and tell it NOT to output to PNG, because then it wouldn't be raw. I could go into greater detail.....

For instance:

You would not want a 8 bit grayscale png file for the actual calibration file because calibration files need to contain the high bit depth fidelity in order to be applied to the raw 12-16bpp grayscale in the image - prior to converting to something for display on the monitor or window leveling.

For your testing/learning you should try loading a calibration file into a software that can view 12-16bpp grayscale (that supports automatic min/max stretch or user/manual window leveling) 

Setup your own Anonymous FTP Server!

$
0
0
Hey everybody! I wanted to share a site with some cool tips on setting up your very own anonymous FTP server in Windows!



Here's the guide to doing it over on Windowscentral.com:

http://www.windowscentral.com/how-set-and-manage-ftp-server-windows-10

What can you do with an anonymous FTP server? 

Lots of neat stuff! As the administrator, you're in full control of what you want to do with every single file and folder that you explicitly add to your FTP site. You call the shots with what you want to be publicly accessible or what you want to keep private by setting a flag on the files and folders that you don't wish anonymous users to touch. You can even share private data with others, as long as you've taken the extra step to encrypt it properly, more on that below.


Who can access the data you have on the site is entirely up to you! 

When you configure your FTP to be open to anonymous users, you're allowing the use of a defined, standardized user class named "anonymous" and any old email address as the password, even a fake  one, it doesn't matter, it's anonymous! That's the authentication layer that you as the administrator of the FTP site have setup for access. Once an anonymous user has authenticated, they're free to request any file or folder you've explicitly made available to anonymous users. Remember, as the owner and administrator of the site; you get to control that, not the users. Neat, huh?


Wait! What do you mean by request?


 A person at the other end, the "anonymous" client, can see a list of your files that you're offering once they've logged in using the anonymous credentials you've explicitly allowed, but they don't just suddenly have all your data! No sir! They only see a list of what you have chosen to make available to anonymous users. The client must then ask your FTP server for permission to receive a copy of any of the files in what's called a "get" procedure. If the FTP server is configured to provide that file, then away it goes! If not, access is denied. Pretty neat, huh? There's no way to "hack" your way around that when you're an anonymous user. You're either allowed to access and copy the file, or you're not!

Is it hard for an end user to download via FTP? 

No! It's also super simple for the end­users too! It's as simple as clicking a link in your web browser when it comes to anonymous FTP. Most modern browsers don't even ask for username and password when they are connecting to an anonymous FTP server. Anonymous access is so ubiquitous that it's all done automatically for you! Want an example? Here's a link to

NASA's anonymous FTP server:

ftp://ftp.hq.nasa.gov/README

There you go! You just downloaded a file from NASA's anonymous FTP server with your browser! Cool!


So what's a cool way to use a new anonymous FTP? 

Well, if you've got patient data you want to store, transfer, or share, you could put it up on your server, and anyone anywhere would have immediate access to it without having to horse around with clunky file sharing services. The sort of stuff that perhaps too big or too unsafe to send via encrypted email. Don't forget though, you've got to keep that patient data safe from hackers and other ne'er do wells! Luckily, that's super easy to do too. Just go to 7zip.org and download their compression program which can quickly and easily put any file you want into a 256bit AES encrypted archive and copy that file onto your FTP.

http://www.howtogeek.com/203590/how-to-create-secure-encrypted-zip-or-7z-archives-on-any-operating-system/

You'll probably also want to encrypt the folder or the whole drive that your FTP resides in too using Windows 10 Bitlocker so that your FTP server's "data at rest" is encrypted but that's also super simple to do.

What about what HIPAA says about encryption in transit? 

If the file itself is already encrypted (and since it's patient data, why wouldn't it be?!) adding yet another layer of encryption is sort of pointless, but there is such a thing as SFTP or secure FTP that can also be anonymous, but that's for another day!

What about what HIPAA has to say about access logs? 

Another cool feature of having your own anonymous FTP server is that you'll have detailed logs that go back for years telling you which IP addresses connected to your site and exactly what they did on your FTP while they were there, what they requested to download and what your server sent to them. So you can easily find out how many different people downloaded and accessed any particular files you had on that server. Something you'll need for HIPAA compliance anyway!

What about what HIPAA has to say about unique user identification and access control? 

You could achieve this by keeping a separate log of the unique passwords you used for your encrypted patient files when you zip them up. Password generator programs are free and usually offer one­click operation. You can also record who the file was meant for. etc.

Extra security tips? 

You could easily setup a batch file that's triggered by your system's task scheduler to wipe out certain files and folders on your FTP server on a regular basis, perhaps the folders where you might have sensitive files, whether they're encrypted or not. That way, they're not sitting there for years available to anyone to grab.

What if someone gets access to something I didn't want them to touch? 

Whoops! Well, since you're the one that controls who gets to see what, you goofed, but it's ok! Mistakes do happen! If you think that something like that might happen to you, FTP is cool enough to allow you to put up a big text disclaimer called a login banner whenever people access the site or even a specific folder that will clearly spell out what your intentions are with the files there, even if you have given them anonymous access. It's kind of like a "No Trespassing" sign but still having your door wide open.

I forgot to put up a login banner!! 

That's probably ok too. Thanks to antiquated and vague computer crime laws that were hastily written up not long after Ronald Reagan got freaked out watching the Matthew Broderick movie "War Games" in 1983, (No, I'm not kidding), you could just file a complaint with the local authorities who will likely kick it up to the feds and they'll "investigate" the matter for you.

Have fun!



"Reproduced with the permission of the author, who wishes to remain anonymous."


Hacked TeamViewer users 'careless' in personal security

$
0
0

Hacked TeamViewer users 'careless' in personal security

The company has denied all responsibility for a recent spate of reports that user PCs have been compromised.


Faced with angry users complaining of hacked accounts, TeamViewer has placed the blame on the "careless" use of credentials rather than internal issues.
Founded in 2005, TeamViewer provides software which can be used to remotely control PC systems and conducted meetings. The company caters for over 200 million users across the globe -- and some of which have recently taken to forums to complain of alleged hacking thanks to the firm's software.
On Reddit, users have flooded the forum with complaints over the alleged hack, complaining that their accounts were compromised and attackers have been able to infiltrate their PCs for the purpose of stealing financial data, accessing other accounts and making purchases ranging from designer clothes to Amazon gift cards.
One common thread in the story appears to be a file called "webbrowserpassview.exe," which trawls through systems to find stored passwords for use.
In a series of tweets, TeamViewer said it was "experiencing issues in parts of its network," but within a few hours managed to boot the majority of the platform back to regular service.
screen-shot-2016-06-02-at-13-04-45.jpg
screen-shot-2016-06-02-at-13-04-38.jpg
In a statement, TeamViewer said the outage was caused by a denial-of-service attack (DoS) attack aimed at the company's infrastructure, but claims there is "no evidence" that the DoS attack was linked to any data breach or user account compromise.
TeamViewer said, "the truth of the matter is TeamViewer experienced network issues because of the DoS-attack to DNS servers and fixed them, there is no security breach at TeamViewer, regardless of the incident, TeamViewer continuously works to ensure the highest possible level of data and user protection."
Instead, the company blamed recent account hack claims at the feet of "careless use of account credentials." As we've seen in the last year, countless credentials are now being traded and released online, and coupled with the fact many will use the same passwords across different services, one loose set can lead to the compromise of multiple accounts.
"In addition, users might unintentionally download and install malware programs," the company said. "Yet once a system is infected, perpetrators can virtually do anything with that particular system -- depending on how intricate the malware is, it can capture the entire system, seize or manipulate information, and so forth."
The timing of the account compromises and DoS attack is interesting, but in fairness to TeamViewer, it is entirely possible that the users affected may have had their details stolen and used through other means than breaching TeamViewer servers. Just by checking Troy Hunt's HaveIbeenpwned search engine you can see if credentials belonging to you are available freely online, and if so, you should immediately start changing your passwords.
Some users have suggested the recent MySpace and LinkedIn data dumps may be to blame, whereas others have denied their credentials were weak or used elsewhere.
The takeaway? Using the same credentials across multiple online services is risky, and while remembering different sets is a pain, it prevents attacks from accessing your complete digital profile should one set be stolen. It is not a full proof solution but will certainly help.

CERT warns of hardcoded creds in medical app

$
0
0

CERT warns of hardcoded creds in medical app

(nice graphic The Register!)

Darren Pauli reports:

The US computer emergency response team has issued a warning after admin credentials were found in a popular medical application used for acquiring patient data.

The MEDHOST application is designed for handling the perioperative three stages of surgery including patient tracking, and patient conditions. It can be hosted and managed remotely.

About 1,000 healthcare facilities use the company’s various technology products.

The flaw meant attackers could key in the details and access patient data on servers that did not restrict logins from unknown locations.

Daniel Dunstedter reported the hardcoded credential flaw (CVE-2016-4328) in MEDHOST Perioperative Information Management System in versions older than 2015R1.

Read more on The Register.

If this sounds vaguely familiar, it may be because it’s precisely the same issue Justin Shafer had reported to CERT about Henry Schein Dental’s Dentrix software. And it’s the same issue he reported to CERT in February about Patterson Dental’s Eaglesoft software. The biggest difference I can see so far is that MEDHOST responded and pushed out a fix within one month, whereas Henry Schein did not effectively fix the problem in Dentrix for years and Patterson Dental hasn’t even responded to CERT’s notification.

This vulnerability is well-known and puts consumers and patients at risk of substantial injury. Maybe it’s time for FTC and HHS to issue some press release or warning or guidance? Entities that expose patients to risk of data theft or compromise of their records due to this vulnerability should be held accountable.

From Databreaches.net, which linked to a story on The Register.

 ===================================================

Glad to be of service.

Weave Phone System review

$
0
0
I thought I would let everyone know how Weave has been performing at a clients office. We left Broadview for no other reason then to check out Weave, and because their software has some bells and whistles that Broadview has not implemented. This office runs Dentrix G6, and I was also personally curious how well well this works, because Weave can integrate with other PMS besides Dentrix, and Broadview seems to just focus on Dentrix.


ANYWAYS!!!

So far ZERO PROBLEMS!!! Three weeks into testing, so far so good. Our front desk person said about 2 times she couldn't get someone off of hold, but she thinks it may have been her fault, adjusting to different phone, etc. She said she didn't have to hang up and call them back, she just had to "press a button"... So maybe it is a user thing. Being in IT.. totally believable.

I have had friends tell me they tried Weave about 2 years ago.. one IT guy had 5 offices all with problems when they had Weave... His problems were mainly dropped calls and echo on the line. He used different routers, and etc.. then left Weave and all was fixed. I asked Weave about this and long story short, I felt like they had fixed their issues. It was worth a try... We are not early adopters...

That is what I have to report. I told Weave if it went well I would throw this on my blog..

And if it went bad........

Well.. lets say we are VERY happy to report, we are happy.

Get Weave!




Hard Coding Credentials and the Shodan Search Engine

$
0
0
I thought I would make a blog post about the new search engine.. Shodan.

It is a search engine for ALL sorts of stuff, including FileShares and Databases!!! And if you have been in dentistry for awhile, you would know how weak many of the database in dentistry authenticate, you may ALSO have seen at times, people who expose servers to the internet.

This has never really been a big deal, until now. Because now, there are search engines that query actual databases and things that Google has traditionally ignored.

When you combine these two (Shodan, and Hard-Coded Database credentials) it could spell out disaster for anyone that is found in the search result for Shodan.

For instance, today I searched for Schick CDR and PowerPay and found 12 Schick CDR Databases exposed along with 14 PowerPay Servers exposed. Power Pay is merchant account software that is sold by Henry Schein and used in a dental office.



I have searched for OpenDental and Dentrix and etc. I don't think Shodan has found that many OpenDental servers but I don't think Shodan attempts to authenticate with default mysql credentials, so it wouldn't find them even if they were exposed. Same with Dentrix (Faircom ACE) and Eaglesoft (Sybase SQL). But MS-SQL.. it seems you can see information about the actual instance without authentication.



Oh.. Did I mention I got raided by the FBI for finding patient data on ftp.eaglesoft.net???
http://www.dailydot.com/politics/justin-shafer-fbi-raid/

655000 Healthcare Records (Patients) Being Sold (DeepDotWeb)

$
0
0
When Paul Syverson, Co-creator of the Tor web browser said that Your Medical Records Have Bullseyes On Them, he probably meant this. According to to what the hacker told us over an encrypted Jabber conversation, he used a “an exploit in how companies use RDP. So it is a very particular bug. The conditions have to be very precise for it “.
The hacker provided DeepDotWeb, with exclusive images of the largest database hack from their internal network, he made sure to redact all the identifiable information “so the target company can remain anonymous for now”:
1fini
The hacker, called thedarkoverlord (trdealmgn4uvm42g.onion/profile/32184)operating on TheRealDeal martet is offering to sell a unique one-off copy of each the three databases which are ranging in price from 151BTC (~100,000$) to 607BTC (~395,000$)

To read more click here:
https://www.deepdotweb.com/2016/06/26/655000-healthcare-records-patients-being-sold/
================================================
Speechless. This could NEVER happen in Dentistry (sarcasm). And to anyone reading this, NO you should not "take the offer". Why? He could still screw you over after you paid, forever deepening the amount of trouble you could be in. You are better off starting a breach investigation and shutting down the internet. Or maybe keeping the internet up and call the FBI.

OH and my bet goes to this being Athens Orthopedic Clinic, why?
1. http://srssoft.com/testimonials-orthopaedics-athens-orthopedic-clinic/ I searched for "Georgia" on the SRS website.
dcrowell could be the user in the first screenshot.
3. AOC is blurred out on the first screenshot, but you can still make it out.
4. They seem to have enough locations to justify the number of patients?
http://athensorthopedicclinic.com/locations/
Viewing all 123 articles
Browse latest View live