Rwandan Hackers hack into Tanzania Commission for Universities "Education System in Tanzania"
www.tcu.go.tz ,Rwandan Hackers has found and exploited a Error based SQL Injection.
We published a full database in pastebin note
http://pastebin.com/R8JyWUP4
Saturday, March 31, 2012
NTV uganda database leaked by Rwandan Hackers #OPUGANDANMEDIA
Rwandan Hackers found multiple vulnerability in www.ntvuganda.co.ug .The database has been hacked and exposed by Rwandan hackers
more than 200 account have been stolen,username,password and email in pastebin note
http://pastebin.com/bakSKPmf
#OPUGANDANMEDIA
more than 200 account have been stolen,username,password and email in pastebin note
http://pastebin.com/bakSKPmf
#OPUGANDANMEDIA
Publié par
Rwandan hackers
Friday, March 30, 2012
Discovery.com Vulnerable to XSS
Vulnerability found by Rwandan Hackers in the official website of National Geographic.To know the vulnerable link click here. Also we would like to give you reminder that earlier in 2011 another Indian hacker named Zero has found XSS in the official website of Discovery.com.
Brief About National Geographic:- Is a commercially abbreviated and trademarked as Nat Geo, is a subscription television channel that airs non-fiction television programs produced by the National Geographic Society. Like History and the Discovery Channel, the channel features documentaries with factual content involving nature, science, culture, and history. The channel is owned primarily by Fox Cable Networks, a division of News Corporation. Its primary sister network worldwide, including the United States.
Brief About National Geographic:- Is a commercially abbreviated and trademarked as Nat Geo, is a subscription television channel that airs non-fiction television programs produced by the National Geographic Society. Like History and the Discovery Channel, the channel features documentaries with factual content involving nature, science, culture, and history. The channel is owned primarily by Fox Cable Networks, a division of News Corporation. Its primary sister network worldwide, including the United States.
Publié par
Rwandan hackers
Saturday, March 17, 2012
Rwandan Hackers take down 4 Uganda gov websites #OPSTOPJOSEPHKONY
4 Ugandan government website hacked by Rwandan Hackers
the website hacked are:
Arua District(www.arua.go.ug)
Uganda Media Centre(www.mediacentre.go.ug)
Ministry of Internal Affairs - Uganda(www.mia.go.ug)
National Medical Stores - Uganda(www.nms.go.ug)
websites hacked link:
http://pastebin.com/tfz9t23Y
Our Message:
Dear JosephKony, Your actions over the course of these many years have displeased us, greatly.
You should be ashamed of calling yourself a human being.
Abducting children, turning the boys into soldiers, having them kill their own parents, and turning the girls into sex slaves, He has abducted over 30,000 children and forced them to be child soldiers in Central Africa. He remains at large because he is INVISIBLE to the world. FEW know his name, even FEWER know his crimes. WE ARE MAKING HIM FAMOUS! Because when he is, the world will unite against him and demand his arrest
Your actions will not go unpunished Joseph.
You are no longer invisible, Joseph.
Everyone can see you now, Joseph.
We know your name now, Joseph.
We know what you've done, and we will no longer sit at our computers waiting for others to take action, Joseph.
Do not sit and watch Do not sit and cheer! Use your powers. Everyone take part of this,
Make Joseph Kony famous.
Artists be creative, Singers be lyrical, writers spread the word
Operation Joseph Kony 2012 engaged.
Joseph Kony, We will stop you.
the website hacked are:
Arua District(www.arua.go.ug)
Uganda Media Centre(www.mediacentre.go.ug)
Ministry of Internal Affairs - Uganda(www.mia.go.ug)
National Medical Stores - Uganda(www.nms.go.ug)
websites hacked link:
http://pastebin.com/tfz9t23Y
Our Message:
Dear JosephKony, Your actions over the course of these many years have displeased us, greatly.
You should be ashamed of calling yourself a human being.
Abducting children, turning the boys into soldiers, having them kill their own parents, and turning the girls into sex slaves, He has abducted over 30,000 children and forced them to be child soldiers in Central Africa. He remains at large because he is INVISIBLE to the world. FEW know his name, even FEWER know his crimes. WE ARE MAKING HIM FAMOUS! Because when he is, the world will unite against him and demand his arrest
Your actions will not go unpunished Joseph.
You are no longer invisible, Joseph.
Everyone can see you now, Joseph.
We know your name now, Joseph.
We know what you've done, and we will no longer sit at our computers waiting for others to take action, Joseph.
Do not sit and watch Do not sit and cheer! Use your powers. Everyone take part of this,
Make Joseph Kony famous.
Artists be creative, Singers be lyrical, writers spread the word
Operation Joseph Kony 2012 engaged.
Joseph Kony, We will stop you.
Publié par
Rwandan hackers
Friday, March 16, 2012
Orinfor.gov.rw file upload vulnerability
Rwandan hackers has discovered a vulnerability in FCKeditor, which potentially can be exploited by malicious people to compromise a vulnerable system.
The problem is that it is possible to upload arbitrary files to a location inside the web root if the file extension does not match the list of denied file extensions. This can e.g. be exploited to upload and execute a malicious PHP script with the ".php.txt" file extension.
Successful exploitation requires that file uploads have been enabled in the "config.php" configuration file (not enabled by default).
orinfor.gov.rw uses FCKEDITOR
The problem is that it is possible to upload arbitrary files to a location inside the web root if the file extension does not match the list of denied file extensions. This can e.g. be exploited to upload and execute a malicious PHP script with the ".php.txt" file extension.
Successful exploitation requires that file uploads have been enabled in the "config.php" configuration file (not enabled by default).
orinfor.gov.rw uses FCKEDITOR
NASA is Vulnerable to xss by RWANDAN HACKERS
a sub-domain of NASA is Vulnerable (www.spaceplace.nasa.gov)
Rwandan Hackers found xss vulnerability on www.spaceplace.nasa.gov
using this vulnerability an attacker can even exploit the website and execute unauthorized commands
Click Here to know the vulnerable
VULNERABLE LINK:
www.spaceplace.nasa.gov/search/?q=";alert("hacked by rwandan hackers");"
Rwandan Hackers found xss vulnerability on www.spaceplace.nasa.gov
using this vulnerability an attacker can even exploit the website and execute unauthorized commands
Click Here to know the vulnerable
VULNERABLE LINK:
www.spaceplace.nasa.gov/search/?q=";alert("hacked by rwandan hackers");"
Siemens's Databases exploited by Rwandan Hackers
Rwandan Hackers hack into subdomains of Siemens.Rwandan Hackers has found and exploited a Error based SQL Injection in Siemens
We published a full disclosure on both of the databases on pastebin:
Siemens : http://pastebin.com/ZfF8ntZy
We published a full disclosure on both of the databases on pastebin:
Siemens : http://pastebin.com/ZfF8ntZy
Publié par
Rwandan hackers
Kevin Mitnick's website open to Cross-Site Scripting ( XSS ) vulnerability
Cross-Site Scripting ( XSS ) vulnerability discovered in official website of Kevin Mitnick (one of the most talented hackers, and the one one most prosecuted by the state
his is a serious security issue, with potential implications that are only starting to be understood. However, it is critical to realize that this problem does not expose any way to break into the server itself. What it allows is for malicious attackers to potentially take control of the interaction between a user and a website. It is likely that the most serious thing that an attacker can potentially do in this situation is change how a page appears to a particular user.
Vulnerable Link : http://mitnicksecurity.com/workshop_signup.php
Vulnerable Textbox : strEmail is not filtered some html tags in textbox
Method: Post
Example payload: /"><iframe onload=alert(document.cookie)>
his is a serious security issue, with potential implications that are only starting to be understood. However, it is critical to realize that this problem does not expose any way to break into the server itself. What it allows is for malicious attackers to potentially take control of the interaction between a user and a website. It is likely that the most serious thing that an attacker can potentially do in this situation is change how a page appears to a particular user.
Vulnerable Link : http://mitnicksecurity.com/workshop_signup.php
Vulnerable Textbox : strEmail is not filtered some html tags in textbox
Method: Post
Example payload: /"><iframe onload=alert(document.cookie)>
Publié par
Rwandan hackers
Subscribe to:
Posts (Atom)