_______________________________________________________________________ | :::::::: ::: ::: ::::::::::: ::: ::: ::: ::: | |:+: :+: :+: :+: :+: :+: :+: :+: :+: :+: | |+:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ +:+ | |+#+ +:+ +#+ +:+ +#+ +#+ +#++:++#++: +#+ +:+ +#+ | |+#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+ +#+#+ +#+ | |#+# #+# #+# #+# #+# #+# #+# #+# #+#+# #+#+# | | ######## ######## ### ########## ### ### ### ### | |_______________________________________________________________________| ££Digital_OutLaw brings ya££ A very very short update/leak. Due to time pressure atm I can't find time to explore the new Bhutan Government site I just injected. But the sharing man I am, I here offer you the link: http://www.nsb.gov.bt/index.php?id=13' I took time to extract the Administrator username and password. Still encrypted though but shouldn't take many minutes to decrypt. -But as said, you are more than welcome to do whatever you feel like with this government sites vulnerability. ( http://www.nsb.gov.bt/index.php?id=13' ) ## User Info Password User 2bb4823d7de4ad4f rinchen 7a283d0d26fa3e86 root -But stick around guys, cause I am only Just getting started! # Hack # AntiSec # LulzSec