Advertisement
anonops_RD

poder judicial

Sep 24th, 2011
1,270
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.67 KB | None | 0 0
  1. ///////////////////////////////////////////
  2. / HACKED by: @anonops_RD ///
  3. / HACK SUPREMA CORTE DE JUSTICIA ///
  4. / poderjudicial /
  5. / http://www.suprema.gov.do/ /
  6. //////////////////////////////////////////
  7.  
  8. ***********************************************************************************************************
  9. CON ESTO QUEREMOS, DEJAR CLARO QUE SI TENEMOS EL CONOCIMIENTO PARA HACER CUALQUIER TIPO DE DAÑO PERO, NUESTRA INTENCIÓN NO ES HACER EL MAL, ES HACER EL BIEN, HACEMOS ATAQUES PACÍFICOS “DDOS” PARA QUE NUESTRAS PROTESTAS SE ESCUCHEN Y JUNTO A TODOS LOS DOMINICANOS LUCHAR POR UN MEJOR PAÍS, JUNTOS A TODOS LOS ANONYMOUS DEL MUNDO LUCHAR POR UN MUJER MUNDO..BY @ANONOPS_RD
  10. ************************************************************************************************************
  11.  
  12. HACKED by: @anonops_RD
  13.  
  14.  
  15. ////////////////////////////////
  16. // INFORMACION DE SUS SITEMAS//
  17. //////////////////////////////
  18.  
  19. System Info
  20.  
  21. ost Name: WEBSERVER3
  22. OS Name: Microsoft(R) Windows(R) Server 2003 Datacenter x64 Edition
  23. OS Version: 5.2.3790 Service Pack 2 Build 3790
  24. OS Manufacturer: Microsoft Corporation
  25. OS Configuration: Standalone Server
  26. OS Build Type: Multiprocessor Free
  27. Registered Owner: PORDER JUDICIAL
  28. Registered Organization: SUPREMA CORTE
  29. Product ID: 76871-641-4573531-50048
  30. Original Install Date: 10/10/2009, 1:20:06 AM
  31. System Up Time: 8 Days, 22 Hours, 24 Minutes, 34 Seconds
  32. System Manufacturer: HP
  33. System Model: ProLiant DL385 G5p
  34. System Type: x64-based PC
  35. Processor(s): 4 Processor(s) Installed.
  36. [01]: AMD64 Family 16 Model 4 Stepping 2 AuthenticAMD
  37. 2800 Mhz
  38. [02]: AMD64 Family 16 Model 4 Stepping 2 AuthenticAMD
  39. 2800 Mhz
  40. [03]: AMD64 Family 16 Model 4 Stepping 2 AuthenticAMD
  41. 2800 Mhz
  42. [04]: AMD64 Family 16 Model 4 Stepping 2 AuthenticAMD
  43. 2800 Mhz
  44. BIOS Version: UNKNOWN
  45. Windows Directory: C:\WINDOWS
  46. System Directory: C:\WINDOWS\system32
  47. Boot Device: \Device\HarddiskVolume1
  48. System Locale: en-us;English (United States)
  49. Input Locale: en-us;English (United States)
  50. Time Zone: (GMT-04:30) Caracas
  51. Total Physical Memory: 8,190 MB
  52. Available Physical Memory: 295 MB
  53. Page File: Max Size: 9,795 MB
  54. Page File: Available: 1,932 MB
  55. Page File: In Use: 7,863 MB
  56. Page File Location(s): C:\pagefile.sys
  57. Domain: WEBPORTAL
  58. Logon Server: N/A
  59. Hotfix(s): 285 Hotfix(s) Installed.
  60. [01]: File 1
  61. [02]: File 1
  62. [03]: File 1
  63. [04]: File 1
  64. [05]: File 1
  65.  
  66.  
  67.  
  68. HACKED by: @anonops_RD
  69.  
  70. /////////////////////
  71. //SUS PROCESOS!!!!///
  72. /////////////////////
  73.  
  74. Image Name PID Session Name Session# Mem Usage
  75. ========================= ======== ================ =========== ============
  76. System Idle Process 0 Console 0 24 K
  77. System 4 Console 0 264 K
  78. smss.exe 324 Console 0 680 K
  79. csrss.exe 372 Console 0 4,212 K
  80. winlogon.exe 400 Console 0 15,084 K
  81. services.exe 448 Console 0 91,400 K
  82. lsass.exe 460 Console 0 14,856 K
  83. svchost.exe 684 Console 0 4,104 K
  84. svchost.exe 736 Console 0 5,716 K
  85. svchost.exe 800 Console 0 7,428 K
  86. svchost.exe 836 Console 0 5,432 K
  87. svchost.exe 852 Console 0 43,092 K
  88. spoolsv.exe 980 Console 0 8,300 K
  89. msdtc.exe 1028 Console 0 7,020 K
  90. bedbg.exe 1148 Console 0 3,464 K
  91. cissesrv.exe 1168 Console 0 2,920 K
  92. cpqrcmc.exe 1184 Console 0 2,472 K
  93. vcagent.exe 1200 Console 0 8,020 K
  94. svchost.exe 1224 Console 0 3,352 K
  95. MsDtsSrvr.exe 1268 Console 0 24,196 K
  96. sqlservr.exe 1404 Console 0 129,084 K
  97. msmdsrv.exe 1436 Console 0 37,724 K
  98. NTRTScan.exe 1476 Console 0 9,220 K
  99. svchost.exe 1568 Console 0
  100.  
  101. HACKED by: @anonops_RD
  102. ///////////////
  103. //PUERTOSS!!!!!//
  104. ///////////////
  105. ComResult
  106. Proto Local Address Foreign Address State
  107. TCP 0.0.0.0: 1025 0.0.0.0:0 LISTENING
  108. TCP 0.0.0.0: 135 0.0.0.0:0 LISTENING
  109. TCP 0.0.0.0: 1433 0.0.0.0:0 LISTENING
  110. TCP 0.0.0.0: 21714 0.0.0.0:0 LISTENING
  111. TCP 0.0.0.0: 2301 0.0.0.0:0 LISTENING
  112. TCP 0.0.0.0: 2381 0.0.0.0:0 LISTENING
  113. TCP 0.0.0.0: 2383 0.0.0.0:0 LISTENING
  114. TCP 0.0.0.0: 3389 0.0.0.0:0 LISTENING
  115. TCP 0.0.0.0: 445 0.0.0.0:0 LISTENING
  116. TCP 127.0.0.1: 1025 127.0.0.1:1445 ESTABLISHED
  117. TCP 127.0.0.1: 1026 0.0.0.0:0 LISTENING
  118. TCP 127.0.0.1: 1434 0.0.0.0:0 LISTENING
  119. TCP 127.0.0.1: 1445 127.0.0.1:1025 ESTABLISHED
  120. TCP 127.0.0.1: 6999 0.0.0.0:0 LISTENING
  121. TCP 172.16.31.12:139 0.0.0.0:0 LISTENING
  122.  
  123. HACKED by: @anonops_RD
  124. //////////////////////////
  125. // BASES DE DATOS //
  126. /////////////////////////
  127.  
  128. Base de datos
  129. • Compendiojudicial
  130. • Master
  131. • Tempdb
  132. • Model
  133. • Msdb
  134. • acceso_infor
  135. • automatizacivil
  136. • Compendio
  137. • Cooperativa
  138. • Dbo_sce
  139. • DBO_SGE
  140. • Iislog
  141. • db_intranet
  142. • Magistratus
  143.  
  144. |
  145. |
  146. |
  147. /////////////TABLAS///////////////
  148. //////////////////////////////////
  149. // //
  150. // tablas //
  151. // //
  152. // JuezSuplente //
  153. // SolicitudAscensos //
  154. // QuerellaJuez //
  155. // Movimientos //
  156. // Municipio //
  157. // Tribunales //
  158. // Login //
  159. // DetalleSuplencias //
  160. // Accesos //
  161. // NivelAcceso //
  162. // Usuarios //
  163. // Jueces //
  164. // abogados //
  165. // puestos //
  166. // empleados //
  167. //////////////////////////////////
  168. ////////////////////////////////
  169.  
  170.  
  171. HACKED by: @anonops_RD
  172. /////////////////////
  173. /// LOCALHOST ///
  174. /////////////////////
  175.  
  176. Windows IP Configuration
  177.  
  178. Host Name . . . . . . . . . . . . : WEBSERVER3
  179.  
  180. Primary Dns Suffix . . . . . . . :
  181.  
  182. Node Type . . . . . . . . . . . . : Unknown
  183.  
  184. IP Routing Enabled. . . . . . . . : No
  185.  
  186. WINS Proxy Enabled. . . . . . . . : No
  187.  
  188. Ethernet adapter LAN:
  189.  
  190. Connection-specific DNS Suffix . :
  191.  
  192. Description . . . . . . . . . . . : HP NC382i DP Multifunction Gigabit Server Adapter
  193.  
  194. Physical Address. . . . . . . . . : 00-24-81-E1-99-DC
  195.  
  196. DHCP Enabled. . . . . . . . . . . : No
  197.  
  198. IP Address. . . . . . . . . . . . : 172.16.31.12
  199.  
  200. Subnet Mask . . . . . . . . . . . : 255.255.255.240
  201.  
  202. Default Gateway . . . . . . . . . : 172.16.31.1
  203.  
  204. DNS Servers . . . . . . . . . . . : 172.16.31.12
  205.  
  206. 196.3.81.5
  207.  
  208.  
  209. HACKED by: @anonops_RD
  210. /////////////////////
  211. // LOCAL DIR ///
  212. /////////////////////
  213.  
  214. Volume in drive C has no label.
  215. Volume Serial Number is B096-CDAB
  216. Directory of C:\WINDOWS\system32
  217. 09/24/2011 02:18 AM <DIR> .
  218. 09/24/2011 02:18 AM <DIR> ..
  219. 10/10/2009 01:20 AM 1,769 $winnt$.inf
  220. 10/09/2009 08:48 PM <DIR> 1025
  221. 10/09/2009 08:48 PM <DIR> 1028
  222. 10/09/2009 08:48 PM <DIR> 1031
  223. 10/09/2009 08:48 PM <DIR> 1033
  224. 10/09/2009 08:48 PM <DIR> 1037
  225. 10/09/2009 08:48 PM <DIR> 1041
  226. 10/09/2009 08:48 PM <DIR> 1042
  227. 10/09/2009 08:48 PM <DIR> 1054
  228. 10/09/2009 08:48 PM <DIR> 2052
  229. 10/09/2009 08:48 PM <DIR> 3076
  230. 10/09/2009 08:48 PM <DIR> 3com_dmi
  231. 02/12/2010 10:29 AM 124,928 6to4svc.dll
  232. 10/09/2009 08:40 PM 43,520 aaaamon.dll
  233. 10/09/2009 08:40 PM 80,384 access.cpl
  234. 10/09/2009 08:40 PM 14,032 accserv.mib
  235. 10/09/2009 08:40 PM 65,536 acctres.dll
  236. 10/09/2009 08:40 PM 224,768 accwiz.exe
  237. 10/09/2009 08:40 PM 194,048 acledit.dll
  238. 10/09/2009 08:40 PM 180,736 aclui.dll
  239. 10/09/2009 08:40 PM 356,864 activeds.dll
  240. 10/09/2009 08:40 PM 112,640 activeds.tlb
  241. 10/09/2009 08:40 PM 5,632 actmovie.exe
  242. 10/09/2009 08:40 PM 225,792 actxprxy.dll
  243. 10/09/2009 08:48 PM <DIR> administration
  244. 03/08/2009 04:09 AM 88,064 admparse.dll
  245. 10/09/2009 08:40 PM 1,129,472 adprop.dll
  246. 10/09/2009 08:40 PM 40,448 adptif.dll
  247. 10/09/2009 08:40 PM 342,016 adsldp.dll
  248. 10/09/2009 08:40 PM 246,272 adsldpc.dll
  249. 10/09/2009 08:40 PM 105,472 adsmsext.dll
  250. 10/09/2009 08:40 PM 548,352 adsnt.dll
  251. 07/18/2009 02:15 PM 1,052,160 advapi32.dll
  252. 03/08/2009 04:09 AM 161,792 advpack.dll
  253. 03/08/2009 01:48 PM 9,728 advpack.dll.mui
  254. 10/09/2009 08:40 PM 32,256 aelupsvc.dll
  255. 10/09/2009 08:40 PM 45,
  256.  
  257. by: twitt> @anonops_RD
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement