GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   Porn Site hacked - 26,000 usernamed / password released (https://gfy.com/showthread.php?t=1026145)

Catalyst 06-10-2011 09:06 PM

Porn Site hacked - 26,000 usernamed / password released
 
I was just talked to someone ( Michael Fattorosi - PornLaw) about how many security problems are very common in adult.

And I just read that LulzSec get around 26,000 porn usernames and password from porn dot com.

Some of the emails address include whitehouse.gov / af.mil and other adult webmasters..

CyberHustler 06-10-2011 09:09 PM

:1orglaugh

dynastoned 06-10-2011 09:21 PM

user:pass = infiltrate emails (find cool shit like paypal acct info, banking info, server info, etc..) all very useful in their own way.
use emails = for targeted niche mail spam which is worth gold in terms of conversion ratios.

those kids use that info to make more money than 99% of gfy users could even hope of making.

then after they blast it for a month they sell the data to 50 other spammers for $100 bucks a pop and move on to the next victim.

st0ned 06-10-2011 09:39 PM

Wow that is quite the list they have there. Has quite a few webmasters in there also (might want to check).

ThatOtherGuy - BANNED FOR LIFE 06-10-2011 09:42 PM

gg
good game

JustDaveXxx 06-10-2011 09:42 PM

Yup. Just heard that too. Damn!!

Catalyst 06-10-2011 09:45 PM

I emailed all the webmasters already. but non have replied..


Quote:

Originally Posted by st0ned (Post 18208742)
Wow that is quite the list they have there. Has quite a few webmasters in there also (might want to check).


mikke 06-10-2011 11:38 PM

here's the list:

http://lulzsecurity.com/releases/pronz.txt

Just Alex 06-10-2011 11:46 PM

Quote:

Originally Posted by Catalyst (Post 18208703)
I was just talked to someone ( Michael Fattorosi - PornLaw) about how many security problems are very common in adult.

And I just read that LulzSec get around 26,000 porn usernames and password from porn dot com.

Some of the emails address include whitehouse.gov / af.mil and other adult webmasters..

Itst pROn.com not porn.com
Porn.com is pimproll. Watch what you saying.

Catalyst 06-11-2011 12:29 AM

Good Point..

i promote pimproll.. and they take care of me.. so I should have been more MUCH more clear..

Quote:

Originally Posted by Just Alex (Post 18208851)
Itst pROn.com not porn.com
Porn.com is pimproll. Watch what you saying.


Oracle Porn 06-11-2011 12:34 AM

Quote:

Originally Posted by Just Alex (Post 18208851)
Itst pROn.com not porn.com
Porn.com is pimproll. Watch what you saying.

drama level reduced -%200

2intense 06-11-2011 12:38 AM

who cares

rowan 06-11-2011 12:41 AM

Quote:

Originally Posted by Oracle Porn (Post 18208893)
drama level reduced -%200

Still plenty of bad shit that can happen with a list of emails and passwords...

I looked up five random emails and four of them are on facebook. One is a chick with a muslim headscarf. lol.

Emil 06-11-2011 12:48 AM

lol, people are using so weak passwords. Do a search for "123456". There's 1257 results.

martinsc 06-11-2011 12:52 AM

Quote:

Originally Posted by Oracle Porn (Post 18208893)
drama level reduced -%200

....:2 cents:

V_RocKs 06-11-2011 01:56 AM

This thread is funny in many ways actually...

Let me give you a little history of the porn Internet as I know it.

Every single CCBILL site and every single IBILL site gave up their user/pass combos and it was normal for people to just download the log file that stored them. Very common. It went on for YEARS and nobody noticed.

Globill, 2000Charge and several other smaller billers also had all of their stuff out there for anyone to take. 99% of the affiliate programs lost their password files and often more than that since often you could perform remote shell commands. So from the beginning of online porn to about 2003 or so 99% of everyone was hackable.

Things slowly tapered off a bit and then picked right back up when the hosting companies got hacked. Many of them are still hacked and don't even know it. That means all of their customers are hacked also.

Try doing things like:

find /blah/blah/some/directory/tree/with/images/only -name *.php

Many of you will find backdoors that were hidden ages ago by hackers trying to bury their shells in your image directories you never look into.

Anyway... another list I can add to my bruteforcing collection.

grumpy 06-11-2011 02:18 AM

Quote:

Originally Posted by Emil (Post 18208910)
lol, people are using so weak passwords. Do a search for "123456". There's 1257 results.


6th on the list is password gofuckyourself, someone from here?

V_RocKs 06-11-2011 02:31 AM

Quote:

Originally Posted by grumpy (Post 18208986)
6th on the list is password gofuckyourself, someone from here?

It is a weak site... Do you use your banking password for pron?

pornmasta 06-11-2011 02:42 AM

http://www.nextcubes.com/[email protected]

check the list

Klen 06-11-2011 03:47 AM

I see one Croatian webmaster on list.

ladida 06-11-2011 04:09 AM

Woa, call the fbi 26k wow.


Yea, i've seen lists with millions and no one cares. Whole emails/users/passwords are shared on boards of almost any site owner that posts here.


All times are GMT -7. The time now is 09:04 PM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc