Stratfor: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
mNo edit summary
mNo edit summary
Line 14: Line 14:
[[File:Antisec_teaser_1229.txt]]<br>
[[File:Antisec_teaser_1229.txt]]<br>
[[File:Antisec_teaser_1229_(legit).txt]]
[[File:Antisec_teaser_1229_(legit).txt]]
== Explanation of the Hack ==
Stratfor was first discovered to have an open mysql box by an anonymous hacker called hyrriiya who then passed on the information to sup_g now known as Jeremy Hammond. MySQL by default has the user set to root and an empty password, this was the hole stratfor suffered from.
To access the server you do:
mysql -u root -h <stratfor>


[[Category:Stub pages]]
[[Category:Stub pages]]
[[Category:Hacks]]
[[Category:Hacks]]

Revision as of 17:30, 24 April 2022

https://www.courtlistener.com/docket/4350549/68/13/united-states-v-ackroyd/
https://www.documentcloud.org/documents/2998983-LulzXmas-Redacted
https://en.wikipedia.org/wiki/Stratfor#Leaks
https://en.wikipedia.org/wiki/2012%E2%80%9313_Stratfor_email_leak
https://www.scribd.com/document/229261982/Stratfor-Computer-Forensic-Investigation
https://zone-h.org/mirror/id/16416728
File:Antisec teaser 1225.txt
File:Antisec teaser 1229.txt
File:Antisec teaser 1229 (legit).txt

Explanation of the Hack

Stratfor was first discovered to have an open mysql box by an anonymous hacker called hyrriiya who then passed on the information to sup_g now known as Jeremy Hammond. MySQL by default has the user set to root and an empty password, this was the hole stratfor suffered from.

To access the server you do:

mysql -u root -h <stratfor>