LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘Pastebin’

Potential leak of data: Pwn3d Data

0 votedvote

Detected 1 occurrence(s) of ‘[p0o]wn[3d]d’:

68fX0+fYfn7l93MlOH797+MHP9//gI6CSCAWP79+sXw9+//37////wJ1PBlxkwWHi5Gbv7/rBx/Fy7+/PiB2Nq1/77/ZGD8zvjrJ1ADQACxMPz48e/3n3+/f//79RvkS2X5/+fO/WflYfzyg+njM2Z1jX///v35+Z2JhROoAOgkgABi+vPjx/8/v4E2/Pv5A6iBJynpm7AI0NO/f3/5IiTGX14OFPwNVPPz199fICcBBBDLvy9fwKp/gtC/fwwcHPwNDd/37GJk5xAyN2fk4PgLdPDPn39ZfzH8BnqUASCAWP68fQr2wK9/QLf9+wc0j5GNlcHUhImNg4GdHagaKPjvx/d/bD+Z/vwBOgkggFiAmv79/M0oJMD09zsjOBCBccIuJAJk/WNgYGJiAgqyKioxC4iBvMrAABBAjLeBGsBR+ImBgffKlR8/fsAjGML4/fv3I0dHNrAyIAAIMAAWsTLdMXjAtwAAAABJRU5ErkJggg==", 
"cn":"iVBORw0KGgo

Source: pastebin.com/raw.php?i=tr6AWZ98

Potential leak of data: Dropbox Shared File

0 votedvote

Detected 29 occurrence(s) of ‘http[s]*:\/\/dl\.dropbox\.com\/’:

==========>null
00491   	0000   	6:59:56 PM   	SimpleOutgoingCall[unknown/null->kbond!sip2sip.info/null]->prompt("I am sorry, but I did not understand you. Please try again.",true,"","",0.3,any,30000,0,*)
00492   	0000   	6:59:56 PM   	ApplicationInstance[http://dl.dropbox.com/u/24628065/javascript.js , sas_2-15-sm170z62k7ue6g0tropo] ends execution on Thread Tropo-Thread-1581065af1f22df1ee756e67da377559
00493   	0000   	6:59:56 PM   	Thread Tropo-Thread-1581065af1f22df1ee756e67da377559 returned engine com.sun.phobos.script.javas

Source: pastebin.com/raw.php?i=71t3S1ht

Potential leak of data: MySQL Access Control

0 votedvote

Detected 1 occurrence(s) of ‘grant .* to .* identified by’:

Use PHP to authenticate information in a MySQL database from an external server
$conn = mysql_connect('external-server.hostname.example.com', $user, $password);
mysql_select_db($database_name);
	
GRANT SELECT ON databasename.tablename TO `webserveruser`@`webserver-hostname` IDENTIFIED BY 'thepassword';
	
http://www.myhostingservice.com/refer/80ddca50-f41e-11e0-be50-0800200c9a66/
	
<form action="post" method="checklogin.php">
<input type="username" name="username_input" />
<input type="password" name="password_input" />
<input type="su

Detected 1 occurrence(s) of ‘mysql_[p]*connect\([^\$]’:

Use PHP to authenticate information in a MySQL database from an external server
$conn = mysql_connect('external-server.hostname.example.com', $user, $password);
mysql_select_db($database_name);
	
GRANT SELECT ON databasename.tablename TO `webserveruser`@`webserver-hostname` IDENTIFIED BY 'thepassword';
	
http://www.myhostingservice.com/refer/80ddca50-f4

Source: pastebin.com/raw.php?i=taBw57eB

Potential leak of data: Test

0 votedvote

Detected 3 occurrence(s) of ‘default (pass|passwd|password|secret)’:

 =

; Default host for mysql_connect() (doesn't apply in safe mode).
; http://php.net/mysqli.default-host
mysqli.default_host =

; Default user for mysql_connect() (doesn't apply in safe mode).
; http://php.net/mysqli.default-user
mysqli.default_user =

; Default password for mysqli_connect() (doesn't apply in safe mode).
; Note that this is generally a *bad* idea to store passwords in this file.
; *Any* user with PHP access can run 'echo get_cfg_var("mysqli.default_pw")
; and reveal this password!  And of course, any 

Source: pastebin.com/raw.php?i=M645WBtr

Potential leak of data: URL with Credentials

0 votedvote

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w*\:.*\@\w*\.\w*’:

 url from http://www.mysite.com
$content = file_get_contents($url);
var_dump($content);
?>
	
$handle = fopen("/home/rasmus/file.txt", "r");
$handle = fopen("/home/rasmus/file.gif", "wb");
$handle = fopen("http://www.example.com/", "r");
$handle = fopen("ftp://user:password@example.com/somefile.txt", "w");
	
// Get a file into an array.  In this example we'll go through HTTP to get
// the HTML source of a URL.
$lines = file('http://www.example.com/');

// Loop through our array, show HTML source as HTML source; and line numbers too.
f

Source: pastebin.com/raw.php?i=QHJ6xJtj