Advertisement
Guest User

European Space Agency Hacked | #NullCrew Re-Birth

a guest
Aug 23rd, 2012
2,654
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.20 KB | None | 0 0
  1. _ _ _ _ _____
  2. | \ | | | | / __ \
  3. | \| |_ _| | | / \/_ __ _____ __
  4. | . ` | | | | | | | | '__/ _ \ \ /\ / /
  5. | |\ | |_| | | | \__/\ | | __/\ V V /
  6. \_| \_/\__,_|_|_|\____/_| \___| \_/\_/
  7. @OfficialNull
  8. #######################################
  9.  
  10. Today is the rebirth of NullCrew.
  11. I am here to finish what manst0rm, Zer0Pwn, IonCuber, ignit3 and airyz started.
  12. You all thought it was the end, but you were wrong.
  13.  
  14. Let's start this show with the European Space Agency's Databases.
  15.  
  16. Target ==> http://giove.esa.int/
  17. Vulnerability (MySQL Injection) ==> http://giove.esa.int/news.php?op=viewtopic&topic=6
  18.  
  19. Stay tuned for much more @OfficialNull ;)
  20.  
  21. #######################################
  22.  
  23. Databases:
  24.  
  25. information_schema
  26. data_db
  27. mysql
  28. test
  29. ws_db
  30.  
  31. Tables for: data_db
  32.  
  33. accumulated_coll_status
  34. core_products
  35. daily_qua_stats
  36. data_file
  37. data_type
  38. dsf_gallery
  39. dsf_traps
  40. fds_files
  41. gal_daily_qua_stats
  42. gal_qua_stats_giove_A
  43. gal_qua_stats_giove_B
  44. gal_weekly_deg_interv_qua_stats
  45. gal_weekly_qua_stats
  46. gnat_delay
  47. gnat_files
  48. gnat_histogram
  49. gnat_sessions
  50. gnat_stat_sess
  51. gnat_weekly_stats
  52. nagu_files
  53. origin
  54. osrt_files
  55. process
  56. scenario
  57. scenario_type
  58. session_type
  59. station_outages
  60. stations
  61. web_service
  62. web_settings
  63. weekly_deg_interv_qua_stats
  64. weekly_qua_stats
  65.  
  66. Tables for: ws_db
  67.  
  68. counter
  69. flags
  70. main
  71. menu
  72. pages
  73. queue
  74. referer
  75. stories
  76. topics
  77. user_access
  78. users_new
  79. users_online
  80.  
  81. (No data in the Users tables).
  82.  
  83. MySQL Database data:
  84.  
  85. Host User Password
  86. ________________________________________________
  87. 127.0.0.1 root
  88. 172.17.0.37 dsf_user *E7D4552C7B4118EF6F5153625612A2CD78687CF0
  89. gpcarc dsf_user 7273d07d3af18ead
  90. gpcarc ws_user 49f4fb767378fae2
  91. gpcdmz dsf_user dsf_password
  92. gpcdmz root
  93. localhost root
  94. localhost ws_user *C14D1003FA56016D3557983B825094982EA083EB
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement