Leaks Gamesense.fun Database Dump

136
Posts
372
Likes

iShatterZz


Level ( I )
Some russian skids were crawling my site with user-agent value set to "gamesense.fun" so I decided to check their website... also FYI; this is not their first time getting breached whatsoever

Website: gamesense.funhttps://web.archive.org/web/202209182032...sense.fun/
Backend IP: 45.130.41.76
SMTP: admin@gamesense.fun:lwL*x0BL
Compromised users: 150
Date of Breach: 18th September 2022
Attack vector: blind SQLi

Contains both, hashed passwords in SHA1( $password ) and plain text versions stored in the "nopass" column.


 
145
Posts
112
Likes

Dederus


Level ( I )
Some russian skids were crawling my site with user-agent value set to "gamesense.fun" so I decided to check their website... also FYI; this is not their first time getting breached whatsoever

Website: gamesense.funhttps://web.archive.org/web/202209182032...sense.fun/
Backend IP: 45.130.41.76
SMTP: admin@gamesense.fun:lwL*x0BL
Compromised users: 150
Date of Breach: 18th September 2022
Attack vector: blind SQLi

Contains both, hashed passwords in SHA1( $password ) and plain text versions stored in the "nopass" column.


*** Hidden text: cannot be quoted. ***
great
 
Top