Ministry Of Home Affairs, Bangladesh is SQL-I Vulnerable (DB Hacked By Team T!g3R)


The official Website of Ministry Of Home Affairs Of Bangladesh is Vulnerable to SQL-i said Team T!g3R. w3bd3f4c3r, n3ll@!s@mur4!, r00t, burn3r 3 members of (Team T!g3R) hacked into the DB of that site and exposed DB info including DB name, tables, online user details, admin credentials

Server Info:-

Target    :     http://www.mha.gov.bd/index5.php?category=105
Host IP   :    202.79.16.14
Web Server:     Apache/2.2.3 (CentOS)
Powered-by:     PHP/5.1.6
DB Server :     MySQL >=5
Resp. Time(avg):7161 ms
Current User:     mha@localhost
Sql Version:     5.0.77
Current DB :     mha
System User:     mha@localhost
Host Name  :     webstar
Installation dir:/usr/
DB User    :     'mha'@'localhost'

Admin Details:- 

USERNAME : behari
PASSWORD : bbn19741

For More Information and see the hacked DB Click Here

Here are some screen shots Submitted By the Hacker:-



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Rural Electrification Board of Bangladesh Govt. (REB) Hacked


The official website of Rural Electrification Board of Bangladesh (REB) hacked and defaced by 9Y3H.511

Hacked Site:-
http://www.reb.gov.bd/

Mirror Link:-
http://k0-ka.in/attack/?id=38757

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Entire Database of Federally Administered Tribal Areas (FATA) Hacked


Federally Administered Tribal Areas (FATA) of Pakistan and Afghanistan database hacked by Team Open Fire & Team Blacklisted. They Hacked into the DB of FATA's website and exposed lots of credential information like DB name, tables, cities, config files, user names passwords, GOV secretes and so on.   


Here are some screen shots submitted by the hacker to prove the Data Breach:-



To see the hacked DB click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Apache 2.2.20 Released (DDoS Vulnerability Fixed)


This afternoon the Apache Foundation released an awaited fix to the denial of service (DoS) vulnerability reported a few days ago. The fixes in version 2.2.20 of the Apache httpd server reduce the amount of memory that is used by range requests. If the total bytes of a file requested exceed the total file size, httpd will return the entire file. This follows closely on the heels of a tool released to the Full Disclosure mailing list this week that exploits the flaw. Apache web administrators are encouraged to apply this fix immediately. Unfortunately, as we see all too frequently, many Linux and Unix administrators "set and forget" their installations and never bother to look after their servers.
The Apache team should be applauded for testing and releasing an important security fix so quickly. Now it is up to you, the IT administrators who are using Apache, to follow through and apply these fixes.

For More information, to see the official release of Apache notes and patches of that vulnerability click Here

-News Source (NS & Apache)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Slowhttptest (HTTP DoS Vulnerability Testing Tool)


Slowhttptest is a Slow HTTP DoS attacks rely on the fact that the HTTP protocol, by design, requires requests to be completely received by the server before they are processed.

Supported features for Slowhttptest:-

  • Slowing down either the header or the body section of the request
  • Any HTTP verb can be used in the request
  • Configurable Content-Length header
  • Random size of follow-up chunks, limited by optional value
  • Random header names and values
  • Random message body data
  • Configurable interval between follow-up data chunks
  • Support for SSL
  • Support for hosts names resolved to IPv6
  • Verbosity levels in reporting
  • Connection state change tracking
  • Variable connection rate
Detailed statistics available in CSV format and as a chart generated as HTML file using Google Chart Tools. This tool actively tests if it’s possible to acquire enough resources on an HTTP server by slowing down requests to get denial of service at the application layer. Thanks to Sergey Shekyan, Developer Web Application Scanning at Qualys 

How to Use:- 

./slowhttptest -c 1000 -B -g -o my_server_stats -i 110 -r 200 -s 8192 -t FAKEVERB -u https://example/resources/index.html -x 10

To Download Slowhttptest Click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

A Man Has Been Busted While Hacking Into BJP Leaders Facebook Account


A man has been arrested in connection with the hacking of Facebook accounts of the son and daughter of a BJP leader, who was slapped by local SSP Raghubir Lal after he complained of delay in police action, an official said on Sunday. Jagan Bansal, a resident of Panipat, was apprehended on Saturday and sent to 14-day judicial custody for allegedly breaking into the Facebook accounts of the offsprings of BJP media executive SP Singh two months ago, SHO Kotwali Vivek Ranjan Rai said.
Rai said police are searching for Bansal’s son Vishal, who is also suspected to be involved in the crime. SSP Ghaziabad Raghubir Lal on Friday had slapped Singh who went to the former’s office to complain about delay in the police action in the case. The incident sparked protests by partymen following which Lal rendered an unconditional apology.


-News Source (Hindustan Times)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

SQl-i Vulnerability Found By Chirag Singh on 7 Websites (Govt Of Pakistan, Nepal & Bhutan)


SQl-i Vulnerability found by Chirag Singh on 7 websites including Pakistan University, Pakistan Govt. Nepal Govt. Nepal TV, Bhutan Govt. and so on.


Bahauddin Zakariya University, Multan, Pakistan
Vulnerable Website:- 
http://www.bzu.edu.pk/
Vulnerable link:- 
http://www.bzu.edu.pk/departmentindex.php?id=48

Gender Justice through Musalihat Anjuman Project(GJTMAP)

Vulnerable Website:-
http://gjtmap.gov.pk/
Vulnerable link:- 
http://gjtmap.gov.pk/ngos/sb_bro_ngo.php?id=14


Mercantile Communication Pvt. Ltd.

Vulnerable Website:- 
http://www.mos.com.np/
Vulnerable link:- 
http://www.mos.com.np/description.php?id=115


Nepali Videos-Live TV
Vulnerable Website:- 
http://www.npvideo.com/
Vulnerable Link:- 
http://www.npvideo.com/channel.php?id=1


National Statistic Bureau of Bhutan
Vulnerable Website:- 
http://www.nsb.gov.bt/
Vulnerable link:-
http://www.nsb.gov.bt/index.php?id=11


Small & Medium Enterprises Development Authority of Pakistan

Vulnerable Website:- 
http://www.smeda.org.pk/
Vulnerable link:- 
http://www.smeda.org.pk/main.php?id=34


Travelling Birder-Travel agency of Nepal

Vulnerable Website:- 
http://www.travellingbirder.com/
Vulnerable link:- 
http://www.travellingbirder.com/tripreports/view_birding_tripreport.php?id=220

Threat:- 
1700+ user data have been dumped and have been uploaded to pastebin here is the link
link of pastebin- http://pastebin.com/yKhASf28

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...