Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ///////////////////////////////////////////
- / HACKED by: @anonops_RD ///
- / HACK SUPREMA CORTE DE JUSTICIA ///
- / poderjudicial /
- / http://www.suprema.gov.do/ /
- //////////////////////////////////////////
- ***********************************************************************************************************
- CON ESTO QUEREMOS, DEJAR CLARO QUE SI TENEMOS EL CONOCIMIENTO PARA HACER CUALQUIER TIPO DE DAÑO PERO, NUESTRA INTENCIÓN NO ES HACER EL MAL, ES HACER EL BIEN, HACEMOS ATAQUES PACÍFICOS “DDOS” PARA QUE NUESTRAS PROTESTAS SE ESCUCHEN Y JUNTO A TODOS LOS DOMINICANOS LUCHAR POR UN MEJOR PAÍS, JUNTOS A TODOS LOS ANONYMOUS DEL MUNDO LUCHAR POR UN MUJER MUNDO..BY @ANONOPS_RD
- ************************************************************************************************************
- HACKED by: @anonops_RD
- ////////////////////////////////
- // INFORMACION DE SUS SITEMAS//
- //////////////////////////////
- System Info
- ost Name: WEBSERVER3
- OS Name: Microsoft(R) Windows(R) Server 2003 Datacenter x64 Edition
- OS Version: 5.2.3790 Service Pack 2 Build 3790
- OS Manufacturer: Microsoft Corporation
- OS Configuration: Standalone Server
- OS Build Type: Multiprocessor Free
- Registered Owner: PORDER JUDICIAL
- Registered Organization: SUPREMA CORTE
- Product ID: 76871-641-4573531-50048
- Original Install Date: 10/10/2009, 1:20:06 AM
- System Up Time: 8 Days, 22 Hours, 24 Minutes, 34 Seconds
- System Manufacturer: HP
- System Model: ProLiant DL385 G5p
- System Type: x64-based PC
- Processor(s): 4 Processor(s) Installed.
- [01]: AMD64 Family 16 Model 4 Stepping 2 AuthenticAMD
- 2800 Mhz
- [02]: AMD64 Family 16 Model 4 Stepping 2 AuthenticAMD
- 2800 Mhz
- [03]: AMD64 Family 16 Model 4 Stepping 2 AuthenticAMD
- 2800 Mhz
- [04]: AMD64 Family 16 Model 4 Stepping 2 AuthenticAMD
- 2800 Mhz
- BIOS Version: UNKNOWN
- Windows Directory: C:\WINDOWS
- System Directory: C:\WINDOWS\system32
- Boot Device: \Device\HarddiskVolume1
- System Locale: en-us;English (United States)
- Input Locale: en-us;English (United States)
- Time Zone: (GMT-04:30) Caracas
- Total Physical Memory: 8,190 MB
- Available Physical Memory: 295 MB
- Page File: Max Size: 9,795 MB
- Page File: Available: 1,932 MB
- Page File: In Use: 7,863 MB
- Page File Location(s): C:\pagefile.sys
- Domain: WEBPORTAL
- Logon Server: N/A
- Hotfix(s): 285 Hotfix(s) Installed.
- [01]: File 1
- [02]: File 1
- [03]: File 1
- [04]: File 1
- [05]: File 1
- HACKED by: @anonops_RD
- /////////////////////
- //SUS PROCESOS!!!!///
- /////////////////////
- Image Name PID Session Name Session# Mem Usage
- ========================= ======== ================ =========== ============
- System Idle Process 0 Console 0 24 K
- System 4 Console 0 264 K
- smss.exe 324 Console 0 680 K
- csrss.exe 372 Console 0 4,212 K
- winlogon.exe 400 Console 0 15,084 K
- services.exe 448 Console 0 91,400 K
- lsass.exe 460 Console 0 14,856 K
- svchost.exe 684 Console 0 4,104 K
- svchost.exe 736 Console 0 5,716 K
- svchost.exe 800 Console 0 7,428 K
- svchost.exe 836 Console 0 5,432 K
- svchost.exe 852 Console 0 43,092 K
- spoolsv.exe 980 Console 0 8,300 K
- msdtc.exe 1028 Console 0 7,020 K
- bedbg.exe 1148 Console 0 3,464 K
- cissesrv.exe 1168 Console 0 2,920 K
- cpqrcmc.exe 1184 Console 0 2,472 K
- vcagent.exe 1200 Console 0 8,020 K
- svchost.exe 1224 Console 0 3,352 K
- MsDtsSrvr.exe 1268 Console 0 24,196 K
- sqlservr.exe 1404 Console 0 129,084 K
- msmdsrv.exe 1436 Console 0 37,724 K
- NTRTScan.exe 1476 Console 0 9,220 K
- svchost.exe 1568 Console 0
- HACKED by: @anonops_RD
- ///////////////
- //PUERTOSS!!!!!//
- ///////////////
- ComResult
- Proto Local Address Foreign Address State
- TCP 0.0.0.0: 1025 0.0.0.0:0 LISTENING
- TCP 0.0.0.0: 135 0.0.0.0:0 LISTENING
- TCP 0.0.0.0: 1433 0.0.0.0:0 LISTENING
- TCP 0.0.0.0: 21714 0.0.0.0:0 LISTENING
- TCP 0.0.0.0: 2301 0.0.0.0:0 LISTENING
- TCP 0.0.0.0: 2381 0.0.0.0:0 LISTENING
- TCP 0.0.0.0: 2383 0.0.0.0:0 LISTENING
- TCP 0.0.0.0: 3389 0.0.0.0:0 LISTENING
- TCP 0.0.0.0: 445 0.0.0.0:0 LISTENING
- TCP 127.0.0.1: 1025 127.0.0.1:1445 ESTABLISHED
- TCP 127.0.0.1: 1026 0.0.0.0:0 LISTENING
- TCP 127.0.0.1: 1434 0.0.0.0:0 LISTENING
- TCP 127.0.0.1: 1445 127.0.0.1:1025 ESTABLISHED
- TCP 127.0.0.1: 6999 0.0.0.0:0 LISTENING
- TCP 172.16.31.12:139 0.0.0.0:0 LISTENING
- HACKED by: @anonops_RD
- //////////////////////////
- // BASES DE DATOS //
- /////////////////////////
- Base de datos
- • Compendiojudicial
- • Master
- • Tempdb
- • Model
- • Msdb
- • acceso_infor
- • automatizacivil
- • Compendio
- • Cooperativa
- • Dbo_sce
- • DBO_SGE
- • Iislog
- • db_intranet
- • Magistratus
- |
- |
- |
- /////////////TABLAS///////////////
- //////////////////////////////////
- // //
- // tablas //
- // //
- // JuezSuplente //
- // SolicitudAscensos //
- // QuerellaJuez //
- // Movimientos //
- // Municipio //
- // Tribunales //
- // Login //
- // DetalleSuplencias //
- // Accesos //
- // NivelAcceso //
- // Usuarios //
- // Jueces //
- // abogados //
- // puestos //
- // empleados //
- //////////////////////////////////
- ////////////////////////////////
- HACKED by: @anonops_RD
- /////////////////////
- /// LOCALHOST ///
- /////////////////////
- Windows IP Configuration
- Host Name . . . . . . . . . . . . : WEBSERVER3
- Primary Dns Suffix . . . . . . . :
- Node Type . . . . . . . . . . . . : Unknown
- IP Routing Enabled. . . . . . . . : No
- WINS Proxy Enabled. . . . . . . . : No
- Ethernet adapter LAN:
- Connection-specific DNS Suffix . :
- Description . . . . . . . . . . . : HP NC382i DP Multifunction Gigabit Server Adapter
- Physical Address. . . . . . . . . : 00-24-81-E1-99-DC
- DHCP Enabled. . . . . . . . . . . : No
- IP Address. . . . . . . . . . . . : 172.16.31.12
- Subnet Mask . . . . . . . . . . . : 255.255.255.240
- Default Gateway . . . . . . . . . : 172.16.31.1
- DNS Servers . . . . . . . . . . . : 172.16.31.12
- 196.3.81.5
- HACKED by: @anonops_RD
- /////////////////////
- // LOCAL DIR ///
- /////////////////////
- Volume in drive C has no label.
- Volume Serial Number is B096-CDAB
- Directory of C:\WINDOWS\system32
- 09/24/2011 02:18 AM <DIR> .
- 09/24/2011 02:18 AM <DIR> ..
- 10/10/2009 01:20 AM 1,769 $winnt$.inf
- 10/09/2009 08:48 PM <DIR> 1025
- 10/09/2009 08:48 PM <DIR> 1028
- 10/09/2009 08:48 PM <DIR> 1031
- 10/09/2009 08:48 PM <DIR> 1033
- 10/09/2009 08:48 PM <DIR> 1037
- 10/09/2009 08:48 PM <DIR> 1041
- 10/09/2009 08:48 PM <DIR> 1042
- 10/09/2009 08:48 PM <DIR> 1054
- 10/09/2009 08:48 PM <DIR> 2052
- 10/09/2009 08:48 PM <DIR> 3076
- 10/09/2009 08:48 PM <DIR> 3com_dmi
- 02/12/2010 10:29 AM 124,928 6to4svc.dll
- 10/09/2009 08:40 PM 43,520 aaaamon.dll
- 10/09/2009 08:40 PM 80,384 access.cpl
- 10/09/2009 08:40 PM 14,032 accserv.mib
- 10/09/2009 08:40 PM 65,536 acctres.dll
- 10/09/2009 08:40 PM 224,768 accwiz.exe
- 10/09/2009 08:40 PM 194,048 acledit.dll
- 10/09/2009 08:40 PM 180,736 aclui.dll
- 10/09/2009 08:40 PM 356,864 activeds.dll
- 10/09/2009 08:40 PM 112,640 activeds.tlb
- 10/09/2009 08:40 PM 5,632 actmovie.exe
- 10/09/2009 08:40 PM 225,792 actxprxy.dll
- 10/09/2009 08:48 PM <DIR> administration
- 03/08/2009 04:09 AM 88,064 admparse.dll
- 10/09/2009 08:40 PM 1,129,472 adprop.dll
- 10/09/2009 08:40 PM 40,448 adptif.dll
- 10/09/2009 08:40 PM 342,016 adsldp.dll
- 10/09/2009 08:40 PM 246,272 adsldpc.dll
- 10/09/2009 08:40 PM 105,472 adsmsext.dll
- 10/09/2009 08:40 PM 548,352 adsnt.dll
- 07/18/2009 02:15 PM 1,052,160 advapi32.dll
- 03/08/2009 04:09 AM 161,792 advpack.dll
- 03/08/2009 01:48 PM 9,728 advpack.dll.mui
- 10/09/2009 08:40 PM 32,256 aelupsvc.dll
- 10/09/2009 08:40 PM 45,
- by: twitt> @anonops_RD
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement