29 Jan 2013

Team GhostShell Leaks 7,00,000 Accounts from African universities and Businesses for #ProjectSunRise - Africa's heart

Team GhostShell Leaks 7,00,000 Accounts from African universities and Businesses for #ProjectSunRise - Africa's heart

#ProjectSunRise - Africa's heart, Team GhostShell Leaks 7,00,000 Accounts

Team GhostShell in a statement on their twitter handle has stated "#ProjectSunRise - Africa's heart: http://pastebin.com/8fJbajpc  700.000 accounts/records leaked. #BloodDiamonds #Mining #Petroleum #CIA #SouthAfrica"  
The leaks are done from the following companies :-African Reinsurance Corporation, Woolworths Holdings Limited, South African Diamond Corporation, African Mining, Allied Technology International, BEE Network, I Llovo Boulevard (I llovo Corporation), Genesis Insurance Brokers, Omni ID Company, Ornico Marketing, Moolmans Africa Mining Corporation, Angola's National Diamond Corporation, Angola's Oil field industries, South African Express Petroleum, State University, Westcol College, The Inc Company, Sasol Corporation, Kenyan Business Directory, PressOffice, FreightForwarders (transport), PostNet Internet Services.
The PasteBin Link to the 700k Accounts 
#ProjectSunRise - Africa's heart

GET OUR TOP STORIES

FOLLOW THEHACKERSBLOG


The pastebin message contains:-
With that being said, Team GhostShell has decided to take matter into it's own hands. We have been in contact with people from South Africa throughout all last year, mostly talking and getting as much information on the current situation over there, as possible. In the end, it was decided that a new Anonymous branch needs to be created to enforce the peoples will in the country and form an open bond with the rest of the world, just so that anyone can know at all times the current events that happen there. The process is still going through some changes, but we will get there.

We stand together
Divided by non
We are legion
We are team ghost shell and Anonymous together
We are a hackers ultimatum
We are active!

If you're from South Africa and you have a personal crisis, here are some places that might be of interest: http://www.southafrica.info/services/crisishelp.htm





   Stay Connect with Us:- Facebook  §   Twitter   §   Google+   §   LinkedIn   §   YouTube  §   Email Us    
NiRaj KashYaP
Article written by Niraj kashyap [ Admin ]
NiRaj KashYap aka Root_Crawler is Founder and Editor-In-chief of TheHackersBlog. Also he is a Certified Information Security Expert [C.I.S.E], Web-Designer, PHP programmer. Blogger and a Strong Supporter of Anonymous and WikiLeaks. My Effort is to make Security Much Stronger. .  
▲Want to SUBMIT you News ◙ Click Me↓ ( its Totally Free ) ◙ 
|||  Or Want to Write For Us ◙ Click Me ◙ ▲
THE ARTICLE IN THIS POST IS FOR INFORMATIVE AND EDUCATIONAL PURPOSE ONLY..FOR MORE INFORMATION OR FOR ANY QUERIES CONTACT US.

24 Jan 2013

600+ UserName, Password And Email Id Leaked From ThePressNews

JokerCracker Leaks 600+ UserName, Password And Email Id

JokerCracker Leaks 600+ UserName, Password And Email Id

In a Statement in twitter, JokerCracker mentioned us that he had hacked into http://www.thepressnews.co.uk and he had leaked 600+ details from the site, which contains Username. Email id's And passwords.

Also jokercracker has leaked 5 Rows of data's of Staffs conrtaining username and passwords

GET OUR TOP STORIES

FOLLOW THEHACKERSBLOG


he also leaked 2 rows of Admins data containing user_login  ,  user_pass  ,  user_email.

He also mentioned the same common Reason of Hacking: It's just a personal challenge 
The leaked Database :- http://database.thehackersblog.com/2013/01/thepressnewscouk-hacked-by-jokercracker.html





   Stay Connect with Us:- Facebook  §   Twitter   §   Google+   §   LinkedIn   §   YouTube  §   Email Us    
NiRaj KashYaP
Article written by Niraj kashyap [ Admin ]
NiRaj KashYap aka Root_Crawler is Founder and Editor-In-chief of TheHackersBlog. Also he is a Certified Information Security Expert [C.I.S.E], Web-Designer, PHP programmer. Blogger and a Strong Supporter of Anonymous and WikiLeaks. My Effort is to make Security Much Stronger. .  
▲Want to SUBMIT you News ◙ Click Me↓ ( its Totally Free ) ◙ 
|||  Or Want to Write For Us ◙ Click Me ◙ ▲
THE ARTICLE IN THIS POST IS FOR INFORMATIVE AND EDUCATIONAL PURPOSE ONLY..FOR MORE INFORMATION OR FOR ANY QUERIES CONTACT US.

23 Jan 2013




Header


#RAWPASTE #FACEBOOK #UGETIT? #FACE #BOOK #LULZ #SECURE #MIRRORS @CannibalSec


Mirror 1: http://www.anonpaste.me/anonpaste2/index.php?b2e741b1ded1f93b #crtF5HouxNltwm5WgW7r6dzaKDLkJETXnksmiiSpJfs=

Mirror 2: http://www.anonpaste.me/anonpaste2/index.php?d077018d732ae7f3 #wjgnIVsYzvqHAbtQWOwfSgYtaV7/19j8vC7foA7y1CY=

      FACEBOOK EXPLOIT AND VUNERABILITYS FOUNDED BY: #CANNIBALSEC
============================================================================
Exploit 1: Cross-domain JavaScript source file inclusion
The page at the following URL includes one or more script files from a third-party domain

http://www.facebook.com/badges/?ref=pf
http://b.static.ak.fbcdn.net/rsrc.php/v2/y6/r/Oczn1YJD530.js

How to fix??
------------
Ensure JavaScript source files are loaded from only trusted sources, and the sources can't be controlled by end users of the application
============================================================================
Exploit 2: Cookie set without HttpOnly flag

A cookie has been set without the HttpOnly flag, which means that the cookie can be accessed by JavaScript. If a malicious script can be run on this page then the cookie will be accessible and can be transmitted to another site. If this is a session cookie then session hijacking may be possible.
http://www.facebook.com/directory/people/
reg_ext_ref=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com
Solution

How to fix??
--------------
Ensure that the HttpOnly flag is set for all cookies.
============================================================================


GET OUR TOP STORIES

FOLLOW THEHACKERSBLOG



Exploit 3: Cross Site Request Forgery

A cross-site request forgery is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge or intent in order to perform an action as the victim. The underlying cause is application functionality using predictable URL/form actions in a repeatable way. The nature of the attack is that CSRF exploits the trust that a web site has for a user. By contrast, cross-site scripting (XSS) exploits the trust that a user has for a web site. Like XSS, CSRF attacks are not necessarily cross-site, but they can be. Cross-site request forgery is also known as CSRF, XSRF, one-click attack, session riding, confused deputy, and sea surf.

http://www.facebook.com/appcenter/category/music/?ref=pf

How to fix??
--------------
Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
============================================================================
Exploit 4: X-Content-Type-Options header missing

The Anti-MIME-Sniffing header X-Content-Type-Options was not set to 'nosniff'
http://www.facebook.com/privacy/explanation

How to fix??
-------------
This check is specific to Internet Explorer 8 and Google Chrome. Ensure each page sets a Content-Type header and the X-CONTENT-TYPE-OPTIONS if the Content-Type header is unknown.
============================================================================
Exploit 5: X-Frame-Options header not set

X-Frame-Options header is not included in the HTTP response to protect against 'ClickJacking' attacks
http://www.facebook.com/privacy/explanation

How to fix??
---------------
Most modern Web browsers support the X-Frame-Options HTTP header, ensure it's set on all web pages returned by your site (if you expect the page to be framed only by pages on your server (e.g. it's part of a FRAMESET) then you'll want to use SAMEORIGIN, otherwise if you never expect the page to be framed, you should use DENY.
============================================================================
Exploit 6: Information disclosure - sensitive information in URL

The request appeared to contain sensitive information leaked in the URL. This can violate PCI and most organizational compliance policies. You can configure the list of strings for this check to add or remove values specific to your environment
http://www.facebook.com/photo.php?v=4809778200644

the URL contains credit card informations. Parameter: v, value: 4809778200644

How to fix???
-------------
Do not pass sensitive information in URI's
============================================================================
Exploit 7: Password Autocomplete in browser

AUTOCOMPLETE attribute is not disabled in HTML FORM/INPUT element containing password type input. Passwords may be stored in browsers and retrieved.
http://www.facebook.com/r.php

How to fix??
---------------
Turn off AUTOCOMPLETE attribute in form or individual input elements containing password by using AUTOCOMPLETE='OFF'
============================================================================
Exploit 8: Cookie set without secure flag

A cookie has been set without the secure flag, which means that the cookie can be accessed via unencrypted connections.
https://www.facebook.com/ajax/intl/language_dialog.php?uri=https%3A%2F%2Fwww.facebook.com%2Fomaha%2F

datr=6Nn_UDgHVa7GDn6y0D3JRQtJ; expires=Fri, 23-Jan-2015 12:39:04 GMT; path=/; domain=.facebook.com; httponly

How to fix??
------------
Whenever a cookie contains sensitive information or is a session token, then it should always be passed using an encrypted tunnel. Ensure that the secure flag is set for cookies containing such sensitive information.
============================================================================



Footer





   Stay Connect with Us:- Facebook  §   Twitter   §   Google+   §   LinkedIn   §   YouTube  §   Email Us    
NiRaj KashYaP
Article written by Niraj kashyap [ Admin ]
NiRaj KashYap aka Root_Crawler is Founder and Editor-In-chief of TheHackersBlog. Also he is a Certified Information Security Expert [C.I.S.E], Web-Designer, PHP programmer. Blogger and a Strong Supporter of Anonymous and WikiLeaks. My Effort is to make Security Much Stronger. .  
▲Want to SUBMIT you News ◙ Click Me↓ ( its Totally Free ) ◙ 
|||  Or Want to Write For Us ◙ Click Me ◙ ▲
THE ARTICLE IN THIS POST IS FOR INFORMATIVE AND EDUCATIONAL PURPOSE ONLY..FOR MORE INFORMATION OR FOR ANY QUERIES CONTACT US.

XSS vulnerability Found On SourceForge.net


SourceForge Vulnerable To Cross Site Scripting Injection


A security researcher WilyXem from spain has discovered Reflected cross site scripting vulnerability in SourceForge(sourceforge.net).

SourceForge is a web-based source code repository. It acts as a centralized location for software developers to control and manage free and open source software development.

The vulnerability exists in the job finding page of sourceforge. The developer fails to validate input coming frin the text box that allows user to search jobs.

This left the text field vulnerable to attack.


GET OUR TOP STORIES

FOLLOW THEHACKERSBLOG







Source - e Hacking News


   Stay Connect with Us:- Facebook  §   Twitter   §   Google+   §   LinkedIn   §   YouTube  §   Email Us    
NiRaj KashYaP
Article written by Niraj kashyap [ Admin ]
NiRaj KashYap aka Root_Crawler is Founder and Editor-In-chief of TheHackersBlog. Also he is a Certified Information Security Expert [C.I.S.E], Web-Designer, PHP programmer. Blogger and a Strong Supporter of Anonymous and WikiLeaks. My Effort is to make Security Much Stronger. .  
▲Want to SUBMIT you News ◙ Click Me↓ ( its Totally Free ) ◙ 
|||  Or Want to Write For Us ◙ Click Me ◙ ▲
THE ARTICLE IN THIS POST IS FOR INFORMATIVE AND EDUCATIONAL PURPOSE ONLY..FOR MORE INFORMATION OR FOR ANY QUERIES CONTACT US.

Anonymous And Lulzsec hacks MIT websites as tribute to Aaron Swartz

Tribute to Aaron Swartz ~ Anonymous & LulzSec hacks MIT websites

Tribute to Aaron Swartz ~ Anonymous & LulzSec hacks MIT websites 

Mit.edu, cogen.mit.edu and rledev.mit.edu, were hacked into on Monday morning (IST) to display a red upon black text that condemned the US government’s prosecution of Swartz for attempting to encourage public access of scientific papers.

In a paste/statement on PasteBin, Anonymous expressed, “Whether or not the government contributed to his suicide, the government’s prosecution of Swartz was a grotesque miscarriage of justice, a distorted and perverse shadow of the justice that Aaron died fighting for – freeing the publicly-funded scientific literature from a publishing system that makes it inaccessible to most of those who paid for it – enabling the collective betterment of the world through the facilitation of sharing – an ideal that we should all support.”

GET OUR TOP STORIES

FOLLOW THEHACKERSBLOG


“Moreover, the situation Aaron found himself in highlights the injustice of U.S. computer crime laws, particularly their punishment regimes, and the highly-questionable justice of pre-trial bargaining. Aaron's act was undoubtedly political activism; it had tragic consequences.”


Swartz was also a prodigious programmer who helped establish the RSS standard at the age of 14. He also went on to play a significant part in building Reddit.


Hacked Message Displayed on MIT's Website

Swartz and the non-profit group he founded, DemandProgress had played a huge role in blocking the controversial Stop Online Piracy Act in the United States that was introduced in the House of Representatives in 2011. The bill, which was finally withdrawn amid public pressure, would have allowed court orders to curb access to certain websites deemed to be engaging in illegal sharing of intellectual property. Swartz and other activists objected on the grounds it would give the government too many broad powers to censor and squelch legitimate Web communication. 
Activist Aaron Swartz, dead at 26 (Image Credits: Slashgear.com)







   Stay Connect with Us:- Facebook  §   Twitter   §   Google+   §   LinkedIn   §   YouTube  §   Email Us    
NiRaj KashYaP
Article written by Niraj kashyap [ Admin ]
NiRaj KashYap aka Root_Crawler is Founder and Editor-In-chief of TheHackersBlog. Also he is a Certified Information Security Expert [C.I.S.E], Web-Designer, PHP programmer. Blogger and a Strong Supporter of Anonymous and WikiLeaks. My Effort is to make Security Much Stronger. .  
▲Want to SUBMIT you News ◙ Click Me↓ ( its Totally Free ) ◙ 
|||  Or Want to Write For Us ◙ Click Me ◙ ▲
THE ARTICLE IN THIS POST IS FOR INFORMATIVE AND EDUCATIONAL PURPOSE ONLY..FOR MORE INFORMATION OR FOR ANY QUERIES CONTACT US.

21 Jan 2013

UserName, Passwords, tables & Server Details leaked by XTnR3v0lt

UserName, Passwords, tables & Server Details leaked by XTnR3v0lt

Abu Dhabi university hacked and UserName, Passwords, tables & Server Details leaked


About the target:
 Every great city must have a great university & Abu Dhabi University is the great university of Abu Dhabi. Our mission is to Produce Global Leaders who understand The challenges of our time & make positive contributions to national & global prosperity. Our mission is not limited to educating Students but also rates to Transforming UAE to a vibrant, Prosperous & strong natio
}
Target: http://eportal.adu.ac.ae/


GET OUR TOP STORIES

FOLLOW THEHACKERSBLOG


http://database.thehackersblog.com/2013/01/opleak-37-opmali-abu-dhabi-university_7755.html
Under the Operation #opleak is AN operation created by xl3gi0n hackers IN which we leak 

more THAN 1000 database to show the world that they need more security.
XTnR3v0lt has leaked the #opleak 37 #opmali abu dhabi university which contains cvfile  email   gender  sname   spassword       nationality     mob1   username        userpassword    useremail.

Canada & tunisian chember of comerce hacked and UserName, Passwords leaked

Also after that, a few minutes later XTnR3v0lt leaked another paste which contains data from canada & tunisian chember of comerce
which was done under the Operation #opleak 38 #opmali : canada tunisia chamber of comerce






   Stay Connect with Us:- Facebook  §   Twitter   §   Google+   §   LinkedIn   §   YouTube  §   Email Us    
NiRaj KashYaP
Article written by Niraj kashyap [ Admin ]
NiRaj KashYap aka Root_Crawler is Founder and Editor-In-chief of TheHackersBlog. Also he is a Certified Information Security Expert [C.I.S.E], Web-Designer, PHP programmer. Blogger and a Strong Supporter of Anonymous and WikiLeaks. My Effort is to make Security Much Stronger. .  
▲Want to SUBMIT you News ◙ Click Me↓ ( its Totally Free ) ◙ 
|||  Or Want to Write For Us ◙ Click Me ◙ ▲
THE ARTICLE IN THIS POST IS FOR INFORMATIVE AND EDUCATIONAL PURPOSE ONLY..FOR MORE INFORMATION OR FOR ANY QUERIES CONTACT US.