LeakedIn Logo
Stories About Data Leaks and Related Stuff

Archive for the ‘Pastebin’ Category

Potential leak of data: Simple Password

0 votedvote

Detected 1 occurrence(s) of ‘\npassword[ \t]+[:=][ \t]+[a-zA-Z0-9\-_\!\=\+\/\$]{5,}’:

-----=|#mmm#" # #m # #    #|=-----
      #      #  # # #    #
     #      #   ## "mmmm"


                                """
print 'Welcome to PNU!'
username = raw_input('Input your desired username:  ')
print ''
print 'Welcome ' +username +'!'
password = raw_input('Input your desired password:  ')
def home():
        cmd = raw_input('> ')

        if cmd == 'exit':
                        exit()
        elif cmd == 'help':
                        halp()
        elif cmd == 'chuser':
                       

Source: pastebin.com/raw.php?i=PFqxbg8f

Potential leak of data: Linux IPTables Policy

0 votedvote

Detected 3 occurrence(s) of ‘Chain (INPUT|OUTPUT|FORWARD) \(‘:

h icmp-host-prohibited 

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         
REJECT     all  --  anywhere             anywhere            PHYSDEV match ! --physdev-is-bridged reject-with icmp-host-prohibited 

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination

Source: pastebin.com/raw.php?i=hpyyfih2

Potential leak of data: Exploit

0 votedvote

Detected 2 occurrence(s) of ‘exploit’:

presumably to harvest information on infected 
  Macs.” A newer version of SabPub takes advantage of a 
  vulnerability in older versions of Microsoft Word to infect Macs 
  with the malware.
 
<http://www.intego.com/mac-security-blog/sabpab-backdoor-exploits-java-vulnerability/>
<http://www.intego.com/mac-security-blog/new-sabpab-variant-uses-word-files-to-infect-macs/>
 
  The company says unpatched versions of Microsoft Word 2004 and Word 
  2008 are vulnerable, but Word 2011 is not. (Microsoft fixed t

Source: pastebin.com/raw.php?i=Xp5ZhEyd

Potential leak of data: Email Addresses List

0 votedvote

Detected 1 occurrence(s) of ‘[A-Z0-9._%-]+@[A-Z0-9.-]+\.[A-Z]{2,4}\n.*[A-Z0-9._%-]+@[A-Z0-9.-]+\.[A-Z]{2,4}\n.*[A-Z0-9._%-]+@[A-Z0-9.-]+\.[A-Z]{2,4}’:

Making exceptions to potential duplicate names in a user database
id   first_name    last_name   email
---------------------------------------------------
 1   chris         baker       
 2   chris         baker       chris@gmail.com
 3   chris         baker       chris@hotmail.com
 4   chris         baker       crayzyguy@crazy.com  
 5   carl          castle      castle@npr.org
 6   mike          rotch       fakeuser@sample.com
	
SELECT 
    GROUP_CONCAT(id) AS "ids",
    CONCAT(UPPER(first_name), UPPER(last_name)) AS "name",
    COUNT(*) AS "duplicate_count" 
FROM 
    users 
GR

Source: pastebin.com/raw.php?i=JgrTxi3A

Potential leak of data: Simple Password

0 votedvote

Detected 1 occurrence(s) of ‘\npassword[ \t]+[:=][ \t]+[a-zA-Z0-9\-_\!\=\+\/\$]{5,}’:

--------------------+'
print '|               kOS               |'
print '+--------------------------------+'
print ''
print ''
print 'Welcome to kOS!'
username = raw_input('Input your desired username:  ')
print ''
print 'Welcome ' +username +'!'
password = raw_input('Input your desired password:  ')
def home():
        cmd = raw_input('> ')

        if cmd == 'exit':
                        exit()
        elif cmd == 'help':
                        halp()
        elif cmd == 'chuser':
                       

Source: pastebin.com/raw.php?i=Ner0Tkxt

You are currently browsing the archives for the Pastebin category.