Pakistani President’s website hacked and database leaked
Website of the President of Pakistan has been hacked and the database including table details has been leaked on Pastebin. As speculated, the website has been compromised by one of the hackers from “Anonymous Group”. However, the homepage has not been defaced. Looks like the attacker didn’t have time [or didn't know] how to crack sha1 encrypted passwords. Anyway, here are the details:
Website that has been hacked : http://www.presidentofpakistan.gov.pk/
Database Details:
Database hacked by ^_^ An0nym0us sn3Ak3r *_* vuln link : http://www.presidentofpakistan.gov.pk/ Host IP: 72.32.250.192 Web Server: Apache/2.2.3 DB Server: MySQL Column Count is 13 String Column is 3 Current DB: p0fPakistan Tables found: InternationalSecurityAgreementsTSource Tables found: InternationalTradeAgreementsTSource Tables found: RecoveringFromTheFloodsTSource Tables found: atTSource Tables found: audiosFilesTSource Tables found: basicFactsTSource Tables found: benazirBhuttoTSource Tables found: bilateral Tables found: blogCom Tables found: blogEntriesTSource Tables found: chartTsource Tables found: cms_user Tables found: counterNarcoticsTSource Tables found: demographicsTSource Tables found: easeOfDoingBusinessTSource Tables found: economyTSource Tables found: energyCrisisTSource Tables found: ensuringSecurityTSource Tables found: eventsTSource Tables found: expandingHealthCareTSource Tables found: gabinetTSource Tables found: governmentTSource Tables found: imagesFilesTSource Tables found: increasingEconomicProsperityTSource Tables found: multimediaAudiosTSource Tables found: multimediaImagesTSource Tables found: multimediaVideosTSource Tables found: newsTSource Tables found: pakistanTourismTSource Tables found: presidentInActionHeadersTSource Tables found: presidentRoleTSource Tables found: presidentTSource Tables found: presidentsTSource Tables found: pressReleasesTSource Tables found: preventingWaterCrisisTSource Tables found: reasonsLinksTSource Tables found: reasonsTSource Tables found: reducingPovertyTSource Tables found: sharedResponsibilityTSource Tables found: speechFileTSourc, Tables found: speechesTSource Tables found: strengtheningDemocracy Tables found: thePersonBehindThePoliticsTSource Tables found: tradeLinksTSource Tables found: travelInformationTSource Tables found: travelLinksTSource Tables found: tripsTSource Tables found: videosFilesTSource Columns found: idUser Columns found: Name Columns found: emailUser Columns found:password Columns found: position Columns found: userProfile Count(*) of p0fPakistan.cms_user is 2 Data Found: [email protected] Data Found: password=95bd46fafdd3eb2fe90b816fed5a218990f61281 Data Found: [email protected] Data Found: password=ef2524fd2ecd57fba015c3d97fac1a207af5ffce
The 40 character encryption tells me that its encrypted with SHA1 encryption, which is possible to be bruteforced. So if you wanna take your chances, decrypt the pass and have your fun!
Incoming search terms:
- 2011 database hacking tutorial (2)
- HACK PAKISTAN PRESIDENT WEBSITE ADMINISTRATOR LOGIN (2)
- decrypt EF2524FD2ECD57FBA015C3D97FAC1A207AF5FFCE (1)
- how to crack encrypted database (1)
- mysql database of website hack (1)
- tutorials how to hack goverment website (1)
- XFBML (1)
i think they very well deserved that
common mukesh, even we have got people attacking on their websites so i believe its kinda ongoing thing