Guest User

FBI SMTP and DNS Servers 0wned by @Hagbut

a guest
Oct 20th, 2015
210
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
C 2.95 KB | None | 0 0
  1. Hahaha the skids of the Ashley Madison leak,
  2. Did you think you were big shit you little skid? Hahahha kid you don't even know the name of your own
  3. M0M. Looks like we got a suprise for you because the FBI has been LEAKED!! Hi guys this is L0TU5 1337 from IndoHackerTeam and we have found a 0day in fbi.gov which allowed to us to get access to their whole server. This was extremely difficult as they had many filters on and their CMS is closed-source so the exploit was both web-app and server based. We have shelled their server and hid and crypted our shells in many hidden directories which they will almost never find, we also made backups like saving senior agent's login's and adding more root accounts so if the files are found we can still have access.
  4. ==============================================
  5.         [!] SAMPLE LEAK [!]  
  6. ==============================================
  7. lisa.narendra@fbi.gov - ncuwn27874gtvdj
  8. akiraa79.williams@fbi.gov - Jdbopah2699jbdkii
  9. patrick1123us@fbi.gov - p@ssw0rds966684Agent
  10. Rogers.birdchan@fbi.gov - 7Kgwkdfrs&1auikb7
  11. lisa.shirazi222@fbi.gov - m00re.lisa987
  12. thomas.jeanbee@fbi.gov - thomas.gancsoo00ario
  13. eddie.mahon@fbi.gov - jh2i888921bhuid
  14. deborah.coldwaterfish@fbi.gov - Iuk269g78a57athsd2
  15. pccebu.mcrae@fbi.gov - J8UY2hja9sh0rv
  16. jobsinworld@fbi.gov - Hnguaih^&*jsdk977
  17. Raul.roldan@fbi.gov - Bufg8^%^2jlor
  18. Tini.dswlmbt@fbi.gov - Hst99g&&92nj
  19. ==============================================
  20.  
  21. Small code of the 0day which was used. This will also be publicized as we don't think people will actually know how to use it, but we're grey hats.
  22. ===============================================
  23. 0xb5d9d87c is located 0 bytes to the right of 163964-byte region
  24. [0xb5d75800,0xb5d9d87c)
  25. allocated by thread T0 here:
  26.  #0 0xb72c3ae4 in operator new(unsigned int)
  27. (/usr/lib/i386-linux-gnu/libasan.so.1+0x51ae4)
  28.  #1 0x8340cce in xercesc_3_1::MemoryManagerImpl::allocate(unsigned int)
  29. xercesc/internal/MemoryManagerImpl.cpp:40
  30.  #2 0x8094cb2 in xercesc_3_1::XMemory::operator new(unsigned int,
  31. xercesc_3_1::MemoryManager*) xercesc/util/XMemory.cpp:68
  32. ==================================================
  33. All the data is here, there is users, emails, phones, addresses, names, badge numbers, documents, credit cards, etc etc. The data is compressed so the file would be faster. And the full 0day is there too, feel free to inspect it.
  34. ==================================================
  35. Download: OVER 100,000 users, pass, credit cards, and 0day: http://adf.ly/1HLBCb
  36. ==================================================
  37. Tutorial: In truth, the 0day took us a very long time to find and was very hard, considering their CMS is closed source we first went server sided and combined it with a web app based source code.
  38. ===================================================
  39. REQUIREMENTS:
  40. PHP (cURL needed)
  41. C
  42. Windows/Mac/Linux
  43. ===================================================
  44. L0TU5 1337 - OuT
  45. Greetz: PakCyberCrew - Dr.TU[N]A - Hmei7 - Gantengers Crew- d3b~x
Add Comment
Please, Sign In to add comment