Showing posts with label Website Login Info - Leaked. Show all posts
Showing posts with label Website Login Info - Leaked. Show all posts

Wednesday, July 27, 2016

Website hacked by Sete Hackers

Kompletní nahrana z Hackunutých serveru
exdrazby.cz a exekuce.cz . Hacked By Sete Hackers opdestruction
Anonyous opdestruction
Heslo název hackera na stránce SeTe 
https://www.facebook.com/opdestruction/

Linky
https://ulozto.cz/!BqXJgtfpk/13-pdf

https://ulozto.cz/!847Z1YtnZ/15-12-228-069-ex-2388-15-22-liberec-doubi-u-liberce-liberec-pdf

https://ulozto.cz/!MoBpLdSX2/24-zbyly-pozemek-pdf

https://ulozto.cz/!c8E7y1nJM/052-ex-125-14-cl-76-zip

https://ulozto.cz/!hCSBrmhX8/052-ex-125-14-cl-78-zip

https://ulozto.cz/!qj1UCAsug/62-2016-slezak-425-pdf

https://ulozto.cz/!BXnKdhazx/094-ex-04801-15-drazebni-jistina-pdf

https://ulozto.cz/!zTFPvicSq/112-2016-doksanska-pdf

https://ulozto.cz/!FYwLm1zZw/052-ex-125-14-cl-77-zip

https://ulozto.cz/!Q9oAjL1ye/052-ex-125-14-cl-78-zip

https://ulozto.cz/!hWyRVG6Fm/62-2016-slezak-425-pdf

https://ulozto.cz/!1pwJcdaUb/094-ex-04801-15-drazebni-jistina-pdf

https://ulozto.cz/!ocXAayjVd/180ex000143447-1-pdf

https://ulozto.cz/!TaZxaDzpc/231-11-edv-pdf

https://ulozto.cz/!NbVxaLshn/231-11-zp-pdf

https://ulozto.cz/!QGvwgtfpk/1518-14-edv-pdf

https://ulozto.cz/!qmnVCAsug/1518-14-zp-pdf

https://ulozto.cz/!VfmQYjcCz/2100-15-edv-pdf

https://ulozto.cz/!Ho4SH93df/2100-15-zp-pdf

https://ulozto.cz/!qf2BWNMRH/4811-179-16-pdf

https://ulozto.cz/!kWy8jG9EA/6523-026-2016-ex-p7-pozemek-bilovice-pdf

https://ulozto.cz/!GjK4jL1ye/6539-042-2016-rd-hovorcovice-final-pdf

https://ulozto.cz/!qr5bCAsug/10884-14-edv-pdf

https://ulozto.cz/!j9Y4Q65pE/10884-14-zp-pdf

https://ulozto.cz/!vfuLvicSq/12149-15-edv-b-pdf

https://ulozto.cz/!CMMFa5idj/12149-15-edv-d-pdf

https://ulozto.cz/!U42PrKzxF/12149-15-zp-pdf

https://ulozto.cz/!yMtwy1nJM/20160503-potvrzeni-pdf

https://ulozto.cz/!7i861YtnZ/document-pdf
https://ulozto.cz/!jPyEAe9jJ/doklad-prokazani-totoznosti-fyzicka-osoba-1-pdf
https://ulozto.cz/!jPyEAe9jJ/doklad-prokazani-totoznosti-fyzicka-osoba-1-pdf
https://ulozto.cz/!3HLCy1nJM/ex-5498-14-drazebni-vyhlaska-novela-14-e-pdf
https://ulozto.cz/!3HLCy1nJM/ex-5498-14-drazebni-vyhlaska-novela-14-e-pdf
https://ulozto.cz/!XC9m4KJxY/ex-u-p9-rd-sluhy-ex-69-3128-16-pdf
https://ulozto.cz/!CF8tkedZv/ex-u-p9-rd-sluhy-ex-69-3128-16-pdf
https://ulozto.cz/!dtwx1YtnZ/exdrazby-pdf
https://ulozto.cz/!Wf6megXr9/exdrazby-cz-le-501643-000354-pdf
https://ulozto.cz/!ZY4sR3jfL/exdrazby-registrace-pdf,
https://ulozto.cz/!YRERvicSq/faktura-1-pdf
https://ulozto.cz/!vUY6a5idj/faktura-pdf
https://ulozto.cz/!qy3kyDC13/foto-zip
https://ulozto.cz/!C6QxrmhX8/jan-celba-prokazani-totoznosti-pdf
https://ulozto.cz/!m8KaXigny/jana-blumtrittova-cv-pdf
https://ulozto.cz/!gDL5P4zfV/jemnovani-pdf

Saturday, April 18, 2015

Another Website hacked Admin Login

  1. ---------------------------
  2. Host IP:                94.126.40.42
  3. Web Server:     Apache
  4. Powered-by:     PHP/5.3.28
  5. DB Server:      MySQL >=5
  6. Resp. Time(avg):        4241 ms
  7. Current User:   LCN123340_aeUsr@10.1.4.36
  8. Sql Version:    5.0.95-log
  9. Current DB:     geopolicity_ae_geopolicity
  10. System User:    LCN123340_aeUsr@10.1.4.36
  11. Host Name:      mysql1.hostingweb.co.uk
  12. Installation dir:       /usr/
  13. DB User:        'LCN123340_aeUsr'@'%'
  14. Data Bases:     information_schema
  15.                 geopolicity_ae_geopolicity
  16. http://www.geopolicity.ae/             
  17. Users:Administrator
  18. Pass:amiamba1965
  19. Users:silkroad
  20. Pass:geo1234
  21. Users:cvuser
  22. Pass:geo1234
  23. ---------------------------

Website Admin Login Info - Database Hack

  1. ---------------------------
  2. http://www.fourway.ae/
  3. Host IP:                67.222.133.157
  4. Web Server:     Apache
  5. Powered-by:     PHP/5.4.34
  6. DB Server:      MySQL >=5
  7. Resp. Time(avg):        554 ms
  8. Current User:   fourway_way@localhost
  9. Sql Version:    5.5.37-cll
  10. Current DB:     fourway_four
  11. System User:    fourway_way@localhost
  12. Host Name:      core18.hostingmadeeasy.com
  13. Installation dir:       /usr
  14. DB User:        'fourway_way'@'localhost'
  15. Data Bases:     information_schema
  16.                 fourway_four
  17. user:admin
  18. pass:fourway
  19. ---------------------------

List of Website Database Hacked !

  1. http://webseekers.in/
  2. DB name : webseeke_wp
  3. DB user : webseeke_webdb
  4. DB pass : wskapwdhai@2014
  5. DB host : localhost
  6. ---------------------------
  7. http://www.pleasure-desire.gr
  8. DB name : pleasus7_wrd13
  9. DB user : pleasus7_wrd13
  10. DB pass : 3J9voERjQc
  11. DB host : localhost
  12. ---------------------------
  13. http://www.realtexdevelopment.com
  14. DB name : realtexd_wor2
  15. DB user : realtexd_wor2
  16. DB pass : vuFDa04m
  17. DB host : localhost
  18. ---------------------------
  19. http://www.saugatuckrowing.com
  20. DB name : saugatu2_wor3
  21. DB user : saugatu2_wor3
  22. DB pass : ZspIPH98
  23. DB host : localhost
  24. ---------------------------
  25. http://www.test.advanceprotech.com
  26. DB name : advandz0_wor13
  27. DB user : advandz0_wor13
  28. DB pass : hI3z69Y8
  29. DB host : localhost
  30. ---------------------------
  31. http://www.utahseopros.com
  32. DB name : latestba_wor5
  33. DB user : latestba_wor5
  34. DB pass : MAuXY47x
  35. DB host : localhost
  36. ---------------------------
  37. http://www.fuerzanlcc.org
  38. DB name : boogiegr_wor9
  39. DB user : boogiegr_wor9
  40. DB pass : i8CaUE7I
  41. DB host : localhost
  42. ---------------------------
  43. http://www.zbaked.com/
  44. DB name : ab19614_zbaked
  45. DB user : ab19614_zbaked
  46. DB pass : NdXP_W{1+q$K
  47. DB host : localhost
  48. ---------------------------
  49. http://reliablegulf.ae/
  50. DB name : reliable_reliable
  51. DB user : reliable_reliable
  52. DB pass : Pass123
  53. DB host : localhost
  54. ---------------------------
  55. http://www.culligan.ae/
  56. DB name : culligan_wp
  57. DB user : culligan_admin
  58. DB pass : HGz618n9wj
  59. DB host : localhost
  60. ---------------------------

Whitehouse.gov Hacked Users and Encrypted Password

  1. Whitehouse.gov
  2.  
  3. Joseph R. Biden
  4.  
  5. Joseph R. Biden C4CA4238A0B923820DCC509A6F75849B
  6. Hillary Rodham Clinton 356A192B7913B04C54574D18C28D46E6395428AB
  7. Timothy F. Geithner 6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
  8. Leon E. Panetta DA4B9237BACCCDF19C0760CAB7AEC4A8359010B0
  9. General Eric H. Holder, Jr. F7177163C833DFF4B38FC8D2872F1EC6
  10. Kenneth L. Salazar 79B7CDCD14DB14E9CB498F1793817D69
  11. Thomas J. Vilsack C81E728D9D4C2F636F067F89CC14862C
  12. John E. Bryson F7177163C833DFF4B38FC8D2872F1EC6
  13. Hilda L. Solis 79B7CDCD14DB14E9CB498F1793817D69
  14. Secretary Kathleen Sebelius F7177163C833DFF4B38FC8D2872F1EC6
  15. Secretary Shaun L.S. Donovan 3E511DA7577D1864871B760AB30E05B56943C9B2
  16. Ray LaHood 3E511DA7577D1864871B760AB30E05B56943C9B2
  17. Steven Chu C81E728D9D4C2F636F067F89CC14862C
  18. Arne Duncan E11D8CB94B54E0A2FD0E780F93DD51837FD39BF0C9B86F21E760D02A8550DDF7
  19. Secretary Eric K. Shinseki E11D8CB94B54E0A2FD0E780F93DD51837FD39BF0C9B86F21E760D02A8550DDF7
  20. Secretary Janet A. Napolitano 3E511DA7577D1864871B760AB30E05B56943C9B2
  21. Jack Lew 79B7CDCD14DB14E9CB498F1793817D69
  22. Lisa P. Jackson 79B7CDCD14DB14E9CB498F1793817D69
  23. Jeffrey Zients, Acting Director
  24. Susan Rice 79B7CDCD14DB14E9CB498F1793817D69
  25. Chairman Alan B. Krueger 79B7CDCD14DB14E9CB498F1793817D69
  26. Karen G. Mills C81E728D9D4C2F636F067F89CC14862C
  27.  

Saturday, March 28, 2015

Website Hack - Database Username and Password leak

http://www.economysuperstar.com/  
Database Username : econo2_trashwago
Database Password : foxhead
-----------------------------------
http://pagesgays.fr/
Database Username : dbo423482245
Database Password : suzuki650
-----------------------------------
http://blog-haus.sven-und-tina.de/
Database Username : dbo323164979
Database Password : Tina2008 


Thursday, February 26, 2015

Website Login Info - Username and Password

Database: cofi
Table: PasswordProtect_Users
[11 entries]
+---------------+-------------+
| username      | password    |
+---------------+-------------+
| choward       | Rose12      |
| andi          | andi        |
| mcarter       | Serge!      |
| webmaster     | Archit3ct0n |
| ryan          | ryan        |
| scmember      | Watch5098   |
| specialpapers | N0tl0c      |
| Handbook      | Theological |
| rbmember      | Church1869  |
| rbexecutive   | Charter1870 |
| andrew        | andrew12    |
+---------------+-------------+

[14:39:49] [INFO] table 'cofi.PasswordProtect_Users' dumped to CSV file '/tmp/sqlmapdumpRCm4Mb/cofi/PasswordProtect_Users.csv'
[14:39:49] [INFO] fetched data logged to text files under '/tmp/sqlmapoutputr_Olqm/www.synod.ireland.anglican.org'

[*] shutting down at 14:39:49

bye bye

http://pastebin.com/raw.php?i=1CLS4XEV

Saturday, February 21, 2015

Indian Site Admin Login Info - Admin and Password

http://igsecurityindia.com/admin



Database: igsecuri_indo
Table: adminlogin
[1 entry]
+----+--------+---------+----------+
| Id | UserId | email   | Password |
+----+--------+---------+----------+
| 1  | admin  |  | GnTiK    |
+----+--------+---------+----------+


by Ghost Fazeur

Crunchyroll Accounts - Hacked and Leaked ( Username and Password )

 Line 6: [Crunchyroll] ajsii13x@gmail.com:phoenix - AnimeMember
 Line 13: [Crunchyroll] alafleur@frontier.com:022697 - AnimeMember
 Line 24: [Crunchyroll] danny007dan@gmail.com:amaro5 - AnimeMember
 Line 28: [Crunchyroll] cousie.g@gmail.com:pescara12 - AnimeMember
 Line 29: [Crunchyroll] gellermatan@gmail.com:1avishai - AnimeMember
 Line 39: [Crunchyroll] brycole@gmail.com:sleep123 - AnimeMember
 Line 53: [Crunchyroll] dhprogrammer@gmail.com:121252 - AnimeMember
 Line 58: [Crunchyroll] josh_pineda@yahoo.com:jipbecken - AnimeMember
 Line 76: [Crunchyroll] jnmanco@gmail.com:wowzers2 - AnimeMember
 Line 103: [Crunchyroll] belug23@gmail.com:cabot123 - AnimeMember
 Line 113: [Crunchyroll] chaorain@gmail.com:1oo121otto - AnimeMember
 Line 114: [Crunchyroll] brandon.skelly5@gmail.com:tigger7 - AnimeMember
 Line 117: [Crunchyroll] lilmutt65@hotmail.com:peewee568835 - AnimeMember
 Line 120: [Crunchyroll] dw5tattoodesigns@gmail.com:dragon86 - AnimeMember
 Line 153: [Crunchyroll] nathanbarnham@hotmail.co.uk:whocares1 - AnimeMember
 Line 172: [Crunchyroll] cheesycrabs@gmail.com:lightsaber5 - AnimeMember
 Line 181: [Crunchyroll] Ket-1995@hotmail.com:lawncare4 - AnimeMember
 Line 185: [Crunchyroll] novius792@gmail.com:tibbar792 - AnimeMember
 Line 189: [Crunchyroll] jetkrazy@gmail.com:klpo90insist - AnimeMember
 Line 206: [Crunchyroll] jholcroft@gmail.com:hogwarts - AnimeMember
 Line 243: [Crunchyroll] kumoriek@gmail.com:g00000gle5 - AnimeMember
 Line 251: [Crunchyroll] madz6297@gmail.com:maddog6297 - AnimeMember
 Line 254: [Crunchyroll] pbenson1167@gmail.com:5768purple - AnimeMember
 Line 256: [Crunchyroll] telemercury@hotmail.com:mansur0108 - AnimeMember
 Line 260: [Crunchyroll] tempest13@gmail.com:Chimaira13 - AnimeMember
 Line 265: [Crunchyroll] tippy_55@hotmail.com:pop890 - AnimeMember
 Line 293: [Crunchyroll] raptor0348@msn.com:nintendo - AnimeMember

Source:http://pastebin.com/raw.php?i=WtmskkBk

Lincoln Library - Userid and Password Hacked

Fact Cite from the Lincoln Library
Userid: OBHS
Password: knights
 
TheWeek.com
Login code: 061DG00320326666
 
Facts on File
Userid: oldbridge
Password: knights
 
Teen Health and Wellness
Load The URL below:
http://www.teenhealthandwellness.com/login?username=oldbridge&password=knight

Wednesday, January 28, 2015

Website Email and Password Hacked - Encrypted

+----------------------------------+------------------------------------------+-----------+
| sifre                            | eposta                                   | tc_kimlik |
+----------------------------------+------------------------------------------+-----------+
[23:00:30] [WARNING] console output will be trimmed to last 256 rows due to large table size
| c96398a74c490ab376c1b772f837c4cb | erdal_btn@mynet.com                      |    |
| 729815d0fb700f4a0cf295b8c92c2149 | salihdag@msn.com                         |    |
| cf55fe27dc658f684e71a543539a7bce | fehmikrz@gmail.com                       |    |
| 2223889ede32dff6505684cb25d1ac4f | erhan_ilgaz@hotmail.com                  |    |
| 0f380f609f104f3fcee3ca952d4a6599 | erhan_ilgaz06@hotmail.com                |    |
| 34ccc000015adaa65530d47fc394e52e | yagmur_samet@hotmail.com                 |    |
| 7468aa1b4111319481071218c827e952 | cahit@erbalci.com                        |    |
| 25f9e794323b453885f5181f1b624d0b | kimkiacep@hotmail.com                    |    |
| 8b18588ca10ab1ef0242f0788b26e749 | koyul58@gmail.com                        |    |
| 25d55ad283aa400af464c76d713c07ad | mibasara@hotmail.com                     |    |
| d4805328a583887d3f36b32f1d7da374 | duygusuz_m@hotmail.com                   |    |
| e10adc3949ba59abbe56e057f20f883e | murat al                                 |    |
| 54526e8c15a97d03ff17118c4334e89a | erenhalil@tnn.net                        |    |

Source: http://pastebin.com/raw.php?i=HcNJS8z4

Tuesday, January 27, 2015

MYSQL Server Login details

                            $servername = "server2.veedubmachine.co.uk";
                            $username = "james";
                            $password = "isad235";
                            $id = $_GET['id'];

                            // Create connection
                            $conn = new mysqli($servername, $username, $password);

                            // Check connection
                  

Website User Login - Hacked

mi40
  Address = 127.0.0.1
  SDPort = 9103
  Password = "bighash"
  Device = Quantumi40
  Media Type = LTO5a
  Autochanger = yes
  Maximum Concurrent Jobs = 20 # 2 drives...
}
Storage {
  Name = Quantumsl3 
  Address = 127.0.0.1
  SDPort = 9103
  Password = "bighash"
  Device = Quantumsl3
  Media Type = LTO5b
  Autochanger = yes
  Maximum Concurrent Jobs = 10 # 1 drive...
}

## DEVICES
Autochanger {
  Name = Quantumi40
  Device = Drive0, Drive1
  Changer Command = "/usr/libexec/bacula/mtx-changer %c %o %S %

Monday, January 26, 2015

Website Admin and Password - Hacked

--
-- Databáze: `minicup-2015`
--

INSERT INTO `user` (`id`, `username`, `password_hash`, `role`, `fullname`) VALUES
(1, 'joe', '$2y$10$HZGTs1GzZB70Bbpc2HLnFeyBYdaudLWW/gOd7CVEcpf8C4nURUVRi', 'admin', 'Joe Kolář');

-- --------------------------------------------------------

--
-- Struktura tabulky `year`
--.

Source: http://pastebin.com/raw.php?i=DF2txkSi

Website Login Info Leaked - Hacked

http://www.logobee.com/logo-design-samples/logo-design-samples.php?c=2

===============================================================
Database: logobee_logobee
Table: lb_users
[1 entry]
+----------+------------------------------------------+
| username | password                                 |
+----------+------------------------------------------+
| admin    | 634d6bc5d417c25fb285e05d42817b759bd6a982 |
+----------+------------------------------------------+

Website Login Details

from grab import Grab

LOGIN = 'Evolution'
PASSWORD = '21186088'
TARGET = 'https://www.playelephant.com'
URL_AUT = TARGET + "/login"

g = Grab()
g.setup(post={'gloginname': LOGIN, 'gloginpsw': PASSWORD})
g.go(URL_AUT)


def download_file(download_from, file_name, dir=""):
    g.go(download_from)
    with ope

Friday, January 23, 2015

Website Table Dump with User and Password

| swift         | LOLIGOTKMSRAIDED                                                                 | igotkmsraided@nigger.cooking |
| Dragon        | JD£94jDJJ$J£sMEk3MsRZk                                                         | dontrootmekrebs@doxed.joke   |
| none          | iNsane99                                                                         | none@id.ru                   |
| themuddfamily | madeyer                                                                          | themuddfami
Detected 1 occurrence(s) of ‘\|\s+Pass(word)*\s+\|':
mysql> select username,password,email from users where rank=1;
+---------------+----------------------------------------------------------------------------------+------------------------------+
| username      | password                                                                         | email                        |
+---------------+----------------------------------------------------------------------------------+------------------------------+
| titrifle      | niggerpickle                                                            

Wednesday, January 21, 2015

Website Table Dump - USERS and ENCRYPTED PASSWORD

 | Web Administrator      | fb2a4305abe9ff741129103034dfeb6190dead3be849fb0e25d336dafc86ab8b | joanna.summers@nortech-group.com   | JSfatY67tt |
| 11  | RSkilbeck | Web Administrator      | 4b22c57d27e982a2c8251c0e6bf985e6c15a3b74e77e46a4f9160a83198e6956 | richard.skilbeck@nortech-group.com | JSocy87Gy  |
| 12  | BBunn     | Web Administrator      | 79247ac9961d79ace6490e8768b75cf26e7c6c922cdae213611028dc3f048b6b | bryan.bunn@nortech-group.com       | JSv892hGv  |
| 13  | GFish     | Staffing Administrator | bf818c41dc3dab781a396eb8ba1381fb38ab24defc0

MYSQL Connect Login Info

    $login = $_POST['login'];
    $entrar = $_POST['entrar'];
    $senha = md5($_POST['senha']);
    $connect = mysql_connect('mysql.hostinger.com.br','u383016811_ctor','ctorcripz');
    $db = mysql_select_db('u383016811_ctor');
        if (isset($entrar)) {
                     
            $verifica = mysql_query("SELECT * FROM usuarios WHERE login = '$login' AND senha = '$senha'") or die("erro ao 

Website Login Table Dump with Email and Password

27:56] [INFO] retrieved: 8933127
[04:28:01] [INFO] retrieved: sws
[04:28:05] [INFO] retrieved: eastb0urne
[04:28:05] [INFO] analyzing table dump for possible password hashes
Database: public
Table: adminuser
[2 entries]
+----------+--------------+
| username | userpassword |
+----------+--------------+
| staff    | 8933127      |
| sws      | eastb0urne   |
+----------+--------------+

[04:28:05] [INFO] table 'public.adminuser' dumped to CSV file '/usr/share/sqlmap/output/www.savestiperstonesschool.co.uk/

Contact Form

Name

Email *

Message *