Jump to content
eichzero

PBS (Public Broadcasting Service) & Writerspace Hacked Again by Warv0x (AKA Kaihoe)

Recommended Posts

Posted

PBS (Public Broadcasting Service) & Writerspace Hacked Again by Warv0x (AKA Kaihoe)

300px-PBS_1971_id.svg.png

Yes ! Its True that PBS (Public Broadcasting Service) Hacked once again .Last time, A month before Public Broadcasting Service (PBS) Hacked by Lulzsec and Users data ,Database was Leaked and then Lulzsec claim that PSB.org was hacked with 0day exploit for MoveableType . This time Warv0x (AKA Kaihoe) expose the whole Database of PBS.org using SQL injection.

According to Warv0x (AKA Kaihoe) "This wasn't done for fame or fun,just proving LulzSec aren't as goodas they think they are. I haven't rooted the box or been up to crack the hashes, I'm just proving that most of their attacks are very lame and basic (i'm pretty sure and automated) SQL injections and further privilege escalation, which is just matter of time." He also said "Support for WebNinjas & Jester, good job at exposing them.Sad to mention, but I really agree with th3j35t3r & WebNinjas - LulzSec are just a bunch of script kiddies..."

Today Th3J35t3r (The Jester) claim to expose identities of LulzSec Leader "Sabu". Read Here...

Warv0x (AKA Kaihoe) shared a Pastebin post with us (The Hacker News) PBS (Public Broadcasting Service) [The one that LulzSec hack - Pastebin.com , Via this they expose the Database and various Hashes of PSB .

Untitled.png

PSB is still Vulnerable to Hackers .Warv0x (AKA Kaihoe) also expose the SQL Vulnerable Link.

Untitled.png

On 16th June, 2011 LulzSec Leaks 62,000 Email/Passwords of writerspace.com . That time Lulzsec give statement that "We don't know from where we got these 62000 Logins". But Warv0x (AKA Kaihoe) Exposed the SQL Vulnerability of Writerspace.com - Websites for Authors; Communities for Readers - websites, bulletin boards, chatrooms and net events also which was the source of Lulsec Release.

Its : Writerspace Book Search: Nikita Black'

Source:Thehackernews

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...