136
Posts
Posts
372
Likes
Likes
Some russian skids were crawling my site with user-agent value set to "gamesense.fun" so I decided to check their website... also FYI; this is not their first time getting breached whatsoever
Website: gamesense.fun ― https://web.archive.org/web/202209182032...sense.fun/
Backend IP: 45.130.41.76
SMTP: admin@gamesense.fun:lwL*x0BL
Compromised users: 150
Date of Breach: 18th September 2022
Attack vector: blind SQLi
Contains both, hashed passwords in SHA1( $password ) and plain text versions stored in the "nopass" column.
Website: gamesense.fun ― https://web.archive.org/web/202209182032...sense.fun/
Backend IP: 45.130.41.76
SMTP: admin@gamesense.fun:lwL*x0BL
Compromised users: 150
Date of Breach: 18th September 2022
Attack vector: blind SQLi
Contains both, hashed passwords in SHA1( $password ) and plain text versions stored in the "nopass" column.