Guest User

accesskenya group hacked by rwandan hackers

a guest
May 8th, 2012
359
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.13 KB | None | 0 0
  1. accesskenya group hacked BY Rwandan hackers
  2. http://rwandan-hackers.blogspot.fr
  3. TWITTER:@rwandanhackers
  4.  
  5. =======================================================================================
  6.  
  7.  
  8. The Group comprises AccessKenya, and Broadband Access (BLUE), one of Kenya’s largest Data Carrier Network Operators (DCNOs), and now Openview Business Systems, one of Kenya’s IT services providers. The Group currently has over 2400 corporate leased lines across Kenya.[citation needed]
  9.  
  10. Why we have hacked their system?
  11. it is to prove that their new system is vulnerable.
  12.  
  13. Access Kenya Group has announced deployment of a new email authentication system aimed at securing client emails as well as enabling them (clients) use the service while abroad (roaming).
  14.  
  15.  
  16. The system, Soft Mail Transfer Protocol Authentication (SMTP AUTH), is touted as the most secure authentication system and the company says it’s a necessary deployment in the wake of increased internet security concerns worldwide.
  17. Access Kenya Systems Engineer Sam Oduor said the SMTP AUTH system guarantees email security thence enabling clients to safeguard their information on through the AccessKenya network.
  18.  
  19. “Communication on this authentication system comes through a secure socket layer. This improves customer privacy since conversations cannot be intercepted,” said Oduor.
  20. =============================================================================================
  21. Target:http://accesskenya.com/
  22. Host IP:196.200.16.33
  23. Web Server:Apache
  24. DB Server:MySQL >=5
  25. Resp. Time(avg):1082 ms
  26. Current User: 5crew1x@localhost
  27. Sql Version:5.0.45
  28. Current DB:access_bea3
  29. System User:5crew1x@localhost
  30. Host Name:mirror.accesskenya.com
  31. Installation dir:/usr/
  32. DB User:'5crew1x'@'localhost'
  33. Data Bases:information_schema
  34. access_bea3
  35. bea3zsa_a
  36.  
  37. DB Detection: MySQL >=5 (Auto Detected)
  38. Method: GET
  39. Type: Integer (Auto Detected)
  40.  
  41. access_bea3
  42. Table Name
  43. categories
  44. sections
  45. uploads
  46. users
  47.  
  48. Table: users
  49. Total Rows: 1
  50. username password
  51. admin 5f4dcc3b5aa765d61d8327deb882cf99:password
Add Comment
Please, Sign In to add comment