85+ Websites Hacked By ZCompany Hacking Crew - [ZHC]


More than 85 websites Hacked and defaced by Zhc Disastar of well known hackers group ZCompany Hacking Crew (ZHC) to spread message. 

List of Hacked Sites & Mirrors:-
http://pastebin.com/bESiyDVc


Message of ZHC:-

"...Free Kashmir .. Freedom is our goal..// End the Occupation. . . .

This institutionalized impunity with which the killings of civilians by military and police forces in Jammu and Kashmir continues should be a source of shame for India which propagates to be a democracy!

Kashmir does not want militarized governance - STOP killing children, raping women and imprisoning the men! They just want freedom! Freedom from the evil of the Indian Military!

You will never kill the Kashmiri spirit and remember one thing India; Ghandi himself said - Freedom is never dear at any price. It is the breath of life. What would a man not pay for living?

Everyday 100s of innocent people are abused, raped and even killed in kashmir by the indian army, a third of the deaths are children, - we dont want war, take back your men, your tanks and your guns and go back to where you came from, all we ask is for freedom, you can kill us but you cant kill us all, we shall not give up, giving up is not an option.

who are the real soldiers? the children holding stones or the Army men holding guns? ..."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

DSH is Taking Anonymous More Seriously & Issued A Security Bulletin To Warn About The Upcoming Cyber Threats



The Department of Homeland Security is beginning to take Anonymous and other non-professional cyber-attackers more seriously as it issues a warning about potential attacks.
The United States Department of Homeland Security warned the security community about potential attacks from hacking collective Anonymous over the next few months. The Sept. 2 security bulletin from the DHS National Cyber-Security and Communications Integration Center warned financial services companies to be on the lookout for attackers operating under the Anonymous umbrella to "solicit ideologically dissatisfied, sympathetic employees" to the cause. The collective recently took to Twitter to persuade employees within the financial sector to hand over information and access to enterprise networks. Though such attempts may have been unsuccessful so far, "unwilling coercion through embarrassment or blackmail may be a risk to personnel," the DHS bulletin warned.
DHS issued the bulletin primarily for cyber-security professionals and staff in charge of protecting critical infrastructure. The bulletin also refer to new tools that Anonymous may be using in launching future attacks. Anonymous has been primarily using the Low Orbit Ion Cannon, a fairly simple testing software that can ping a server repeatedly, to launch its distributed denial of service attacks. Some of the members have been working on a new DDoS tool, based on JavaScript,  dubbed #RefRef.

The new attack tool is said to be capable of using the server's own resources and processing power to launch a denial of service attack against itself, but "so far it's unclear what the true capabilities of #RefRef are," the DHS said in the bulletin. The tool is slated to be released Sept. 17.
DHS also referenced the "Apache Killer" Perl script that can be used to launch denial of service attacks against Web servers running the popular Apache software. Apache developers released a patch earlier this week to fix the vulnerability in Apache 2.2. Administrators have been urged to patch their servers immediately.

The DHS also mentioned three cyber-attacks and civil protests Anonymous has already announced. "Occupy Wall Street" is the first scheduled one, for Sept. 17. Announced by a group Adbusters in July and actively supported by Anonymous, the goal is to get 20,000 individuals to gather on Wall Street to protest various U.S. government policies. Similar rallies targeting financial districts are being planned in Madrid, Milan, London, Paris and San Francisco.
Another protest in October, also led by Adbusters, is scheduled to be held at the Washington, D.C. National Mall to mark the 10th anniversary of the war in Afghanistan. There is also the supposed Nov. 11 attack against Facebook and Project Mayhem, scheduled for Dec. 21, 2012, DHS warned. There are indications that Project Mayhem would be a combination of physical disruption and targeting of information systems.

The bulletin itself is unusual in that DHS hasn't commented on the activities of Anonymous ever since the group stepped up its efforts over the past few months, attacking federal agencies and private corporations to protest a wide range of issues. As anyone following the security space undoubtedly knows, there have been at least one or two attacks by Anonymous, even more, each week for the past few months, so the bulletin may be just stating the obvious when warning of future potential attacks.
"Anonymous has shown through recently reported incidents that it has members who have relatively more advanced technical capabilities who can also marshal large numbers of willing, but less technical, participants for DDOS activities," the DHS said.

-News Source (e-Week)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Thousands of Sources in Written-Password (SNAFU) Exposed By WikiLeaks



The cone of silence over WikiLeaks' thousands of sources - many of whose lives are at risk if identified - has been shattered, all thanks to the most mundane, all-too-human security screwup imaginable.
To wit: WikiLeaks founder Julian Assange wrote down the password on a piece of paper, and then forgot to change it later. The security breach has thrown open the doors to WikiLeaks' entire archive of 251,000 secret U.S. diplomatic cables.
To the horror of the media partners it has worked with in the past to carefully redact the documents - The Guardian, The New York Times, El Pais, Der Spiegel and Le Monde - WikiLeaks has published its entire archive, unredacted, putting in danger several thousands of people whom the U.S. has tagged as being at risk if exposed. The documents also cite more than 150 whistle blowers.
"We deplore the decision of WikiLeaks to publish the unredacted state department cables, which may put sources at risk," the organizations said in a joint statement. 
"Our previous dealings with WikiLeaks were on the clear basis that we would only publish cables which had been subjected to a thorough joint editing and clearance process. We will continue to defend our previous collaborative publishing endeavour. We cannot defend the needless publication of the complete data – indeed, we are united in condemning it."

The media partners made it clear that this time, with this move, Assange got no help from them. "The decision to publish by Julian Assange was his, and his alone," they said in the statement. Der Spiegel has chronicled the archive’s publishing, tracing it back to a meeting between Assange and David Leigh of The Guardian.
According to the account, as the British journalist recounts in his book "Inside Julian Assange's War on Secrecy", Leigh and Assange at one point sat down to discuss how Assange would provide Leigh with a file including all of the diplomatic dispatches received by WikiLeaks.
According to Der Spiegel, Assange placed the file on a server and wrote part of the password on a slip of paper. To make it work, one had to complete the list of characters with a certain word.

Can you remember it? Assange asked. Of course, Leigh said.

"At the time, Daniel Domscheit-Berg, who later founded the site OpenLeaks, was the German spokesman for WikiLeaks. When he and others undertook repairs on the WikiLeaks server, he took a dataset off the server which contained all manner of files and information that had been provided to WikiLeaks. What he apparently didn't know at the time, however, was that the dataset included the complete collection of diplomatic dispatches hidden in a difficult-to-find sub-folder," according to Der Spiegel.
With the dataset in the hands of Domscheit-Berg, Leigh went on to describe his meeting with Assange in his book. In the book, however, he included not only the portion of the password on the slip of paper, but also the part he had been asked to commit to memory.
What followed included feuding between Domscheit-Berg and Assange, attempts to prove that Assange wasn’t trustworthy, and the eventual disclosure that not only was the entire dataset circulating, but that the password could be found in Leigh's book.
At this point, fingerpointing is rampant. WikiLeaks' Twitter feed blames The Guardian. The Guardian is protesting its innocence, putting out a statement claiming that it had been told the password was only temporary.
The U.S. Embassy in London and the U.S. State Department were notified of the possible publication on August 25 to enable officials to warn the named informants. Hopefully, this has given them enough time to remove themselves from harm.
Whether that is possible for all the sources who’ve been put in harm's way is an open question.
But one thing is certain: The platforms to which whistleblowers have hitherto brought their leaks are compromised. They are as riddled with security holes, as flailing with common human weaknesses, as the most ridiculed home user running an unsecured wireless network and the most inept office worker writing down his password on a Post-It note.
Let us hope that this carelessness, this breathtaking lapse in security hygiene, leads to no loss of life.

-News Source (Wikileaks & Naked Security)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Sony Released Head Mounted Display Equipped With High Definition OLED Panel (Personal 3D Viewer, HMZ-T1)

 
Sony Corporation announced the launch of Head Mounted Display “Personal 3D Viewer” ‘HMZ-T1’, a device that offers a spectacular new style for viewing both 2D and 3D content. Simply slip the device onto your head to experience the movie theater-like virtual screen (equivalent to a 750-inch screen*2) expand before your eyes.*3
It is equipped with the newly-developed 0.7-inch (diagonal 18.0mm) high definition OLED panel (1280 x 720), which have been realized through Sony’s unique expertise in both OLED display and semiconductor silicon drive technologies. The ‘HMZ-T1’ achieves HD picture quality that makes full use of the OLED display’s high contrast, color reproducibility, and fast response. In addition, the device adopts the ‘Dual Panel 3D Method’ which consists of separate panels for the left and right eye in order to display independent HD picture quality to each eye, which realize 3D vision. The viewer can enjoy natural and bright 3D picture quality that is crosstalk-free. Furthermore, we have achieved a wide horizontal viewing angle of 45 degrees by incorporating an optical lens that thoroughly suppresses unwanted elements such as aberration and distortion. Viewers can now enjoy watching video on a movie theater-like big-screen (750-inch virtual screen, virtual viewing distance approx. 20m)*2. Sony has also adopted its original virtual surround signal processing technology. Combined with the high-resolution 3D picture quality, viewers will be able to fully enjoy powerful acoustics equivalent to a maximum of 5.1ch through the left and right headphones alone.

 Sony group has offered a wide range of 3D products and 3D content production systems, from industrial 3D filming and editing equipment and movie theater systems through to its “BRAVIA” LCD TVs, home projectors, Blu-ray™ Disc devices, Personal Computer VAIO and “PlayStation 3” while its “Handycam” and “Cyber-shot” cameras even enable people to film 3D video themselves. And now, this new 3D viewing style provided by ‘HMZ-T1’ will enable users to enjoy the movie theater-like experience whilst relaxing on their living room sofa, thus further expanding Sony’s 3D world.

Main Features:-
  1. The high definition OLED panel delivers HD picture quality.
  2. The ‘Dual Panel 3D Method’ delivers natural and bright 3D picture quality that is crosstalk-free.
  3. Optical lens which realize wide 45-degree horizontal viewing angle (750-inch virtual screen, virtual viewing distance approx. 20m)*2 which is equivalent to a movie theatre screen, while the shielding construction creates a deep feeling of immersion.
  4. ‘5.1ch Virtual Surround Technology (Virtualphones Technology)’ for realistic and expressive sound.  
Demo:-
 
 

For more information & to see the official press release by Sony click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

5 GB Data of Sri-Lankan Govt Dumped By Team T!g3R


Team T!g3R strikes again, this time the target is Sri Lankan cyber fence. w3bd3f4c3r, n3ll@!s4mur4!, r00t, burn3r, !nd4!nRuBuk, violence_$h@r0n (members of Team T!g3R) who conducted this operation. They have done data dump of many high profile site of srilanka including Srilankan Army, Port Authority, Business Online, Lawnet Govt, National Science Foundation, Sunday times News Paper and so on. 

  • SRILANKAN ARMY:-

WEBSITE : www.slpa.lk
Vulnerabile to SQLi
Dumped Database Link:- http://pastebin.com/ygfSmu3C

  • MICROFINANCE OF SRILANKA:-

WEBSITE : www.lbo.lk
Vulnerable to SQL-i
Dumped Database Link:- http://pastebin.com/drBwfngj
LAWNET GOVERNMENT OF SRILANKA:-

Website : www.lawnet.lk
Vulnerable to SQL-i  
Dumped Database Link:- http://pastebin.com/p9YVkj4U



  • NATIONAL SCIENCE FOUNDATION  OF SRILANKA:-

Website : www.nsf.ac.lk
Vulnerable to SQL-i
Dumped Database Link:- http://pastebin.com/htyxY8Dz
                         


  • SRILANKA PORT AUTHORITY:-
WEBSITE : www.slpa.lk
Vulnerabile to SQL-i
Dumped Database Link:-  http://pastebin.com/ygfSmu3C


  • LANKA BUISNESS ONLINE:-
WEBSITE : www.lbo.lk
Vulnerable to SQL-i
Dumped Database Link:- http://pastebin.com/C4z7QEit


  • SUNDAY TIMES NEWS PAPER OF SRILANKA:-
Website : http://sundaytimes.lk
Vulnerable to SQL-i
Dumped Database Link:- http://pastebin.com/aTFWNgWj

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Database of Stanford University's Hacked By An0nym0us sn3Ak3r


The official website of Stanford University's Nanoelectronics Group is Vulnerable to SQL-i and its DB Hacked By An0nym0us sn3Ak3r. The hacker exposed many information like Db name, Tables, Column, user credentials, admin details and so on. 



Vulnerable Site:-  http://nano.stanford.edu/

Host IP: 171.67.216.22
Web Server: Apache
DB Server: MySQL
Column Count is 10
String Column is 2


User Credentials:-

User Name=superadmin
Password=93a76158cafcd6bd9227607a5f5bd8eaf36ac7d8
User Name=addcontent
Password=fd9b61ca989759ecb0cd0ae5298e2c61f8e0add7
User Name=hspwong
Password=4ba878ab4d1d19d3
User Name=mrlinPassword=f87f8271afa4e5c2380822d33d37f132c4c6675b

To See The hacked DB Click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Team Ghost Exposed Secrete Documents of DOD, NATO, NSA, Home Land Security & Many More


The team "Ghosts" uploaded a .Zip file containing files from Government, Military, DOD, NSA, Homeland security, NATO and many more organizations. The download itself contained 27 PDF Files, 13 Microsoft Word Files, 1 ppt File and a Text file.
The text file contains 130+ login details  for a website that had been infiltrated an hour beforehand.
www.Westdorset.org.uk

The download contained information such as forms, Top secret cover sheets and restricted and classified information about the organisation.

To download the secrete file uploaded by  Ghost click Here

Twitter Page of Team Ghost:- https://twitter.com/BlackHatGhosts
FB Page of Team Ghost:- http://www.facebook.com/TeamGhosts

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...