Come on, based on the information from your comments, we’re outside with no access to the logs, no access to the server, no access to your codes, we can only assume where the problem is happening.
- Usam SSL.
If all communications use SSL
the problem dies here... when I say todas as comunicações
I mean that your site should do all communication between browser(client) and your server via https:
, another point is whether your ajax
sends the data to the .asp
using communication SSL
, if the answer is OK, it would be very difficult for someone to intercept (sniffar, spoofar) the communication between browser(client) and server(Nginx, apache, IIS, etc), it would also be very difficult to forge the SSL
to try to take the data naked way...
If sending the data between your ajax
and the .asp
is not encrypted, any sniffer
or arp spoof
running on the network where your server is able to read this information, the same happens on the network where you are receiving the data, in your case the network where is the .asp
, in both cases you are hostage, have no control over any of the networks, sit and cry, or ensure that everything is encrypted
- Não salvam nada no banco de dados referente ao cartão
.
If you guarantee that nothing is saved anywhere, forget about database intrusion problems and sql injections
- O Servidor disse que não tem virus.
This is very vague, the problem may be occurring here yes, it can be server or vulnerability in your code, it is of no use everything to be encrypted via ssl, if your server is compromised, some ftp port open, open ssh port, something that can be exploited by exploits and allow full access to the server, this would ensure that the attacker changes codes in a hidden way and sends forms to his server/pc/database... the same can happen with his php/Asp codes, if you have any holes in them, the attacker can insert hidden codes into your server without you taking any notice.
Imagine that the Hacker
get a way to access your server, it can achieve this by exploiting http/ssh/ftp/exploits/loopholes in code(php, Asp), etc, imagine I’m in the form and I’m typing my credit card number, ok the data is encrypted via ssl once I hit the Submit no one in theory could read the transaction, but the data in the form contained on the server side is not encrypted, someone could enter something in the code that saved or sent this data...
- Quais ações posso tomar para tentar resolver isso? Falando em
programação
Not knowing for sure where the problem is :-(
Do any employees have access to this information? You checked the access log on the server to see if there is someone coming in and capturing something?
– hugocsl
no one has access, the information is not recorded anywhere.
– Anderson Nunes
And there’s no way they could’ve gotten the information "in transit" during validation... Type a bot that is waiting for the event to run and takes what is in the script something like?
– hugocsl
Is this also my question? How can I avoid this? What treatment to use? How can I find out if this is it?
– Anderson Nunes
when the guy registers on your site his credit card is not recorded even ? all purchases he makes he will have to write the card number ?
– ederwander
How this bot will break SSL security??
– Marcelo Shiniti Uchimura
nothing is saved. Every time you have to write everything down;
– Anderson Nunes
ajax that sends the data to . Asp tbm sends the data by ssl ?
– ederwander
Yeah, your
$.ajax()
has something likeurl: 'https://blablabla.com/blablabla'
?– Marcelo Shiniti Uchimura
yes, it has the url or at least it is possible to identify it by inspecting. How do I resolve?
– Anderson Nunes
if the url your ajax sends to . Asp uses ssl, things don’t smell right to me :-(
– ederwander
I did not get to look at it, it may be that the destination url, the one that receives the post and processes the payment data do not use ssl.
– Anderson Nunes
But there
https
inurl:
?– Marcelo Shiniti Uchimura
ajax is sending the post to the file, example: payment_card.asp. It does not have the full url in the ajax call.
– Anderson Nunes
there was an Injection of this javascript in the system database, https://cdn.rawgit.com/0shrk/web/master/p.js it is strange to the functionality of the store, it must have been this.
– Anderson Nunes