Stratfor: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
(Added hyrriiya letter)
 
(10 intermediate revisions by 3 users not shown)
Line 6: Line 6:
<br>
<br>
https://en.wikipedia.org/wiki/2012%E2%80%9313_Stratfor_email_leak
https://en.wikipedia.org/wiki/2012%E2%80%9313_Stratfor_email_leak
<br>
https://www.scribd.com/document/229261982/Stratfor-Computer-Forensic-Investigation
<br>
https://zone-h.org/mirror/id/16416728
<br>
https://www.dailydot.com/debug/hammond-sabu-fbi-stratfor-hack/
<br>
[[File:Antisec_teaser_1225.txt]]<br>
[[File:Antisec_teaser_1229.txt]]<br>
[[File:Antisec_teaser_1229_(legit).txt]]


== Explanation of the Hack ==


Stratfor was first discovered to have an open MySQL server by an anonymous hacker called Hyrriiya who then passed on the information to sup_g now known as [https://enlacehacktivista.org/index.php?title=Jeremy_Hammond Jeremy Hammond]. MySQL by default has the user set to root with an empty password, this was the hole stratfor suffered from.
To access the server you do:
mysql -u root -h <stratfor>
Conversation between sup_g and Hyrriiya leading up to the Stratfor hack. https://uploads.dailydot.com/e04/15/antisec.jpg?auto=compress%2Cformat&ixlib=php-3.3.0
[[Category:Stub pages]]
[[Category:Stub pages]]
[[Category:Hacks]]
[[Category:Hacks]]

Latest revision as of 20:12, 25 April 2022

https://www.courtlistener.com/docket/4350549/68/13/united-states-v-ackroyd/
https://www.documentcloud.org/documents/2998983-LulzXmas-Redacted
https://en.wikipedia.org/wiki/Stratfor#Leaks
https://en.wikipedia.org/wiki/2012%E2%80%9313_Stratfor_email_leak
https://www.scribd.com/document/229261982/Stratfor-Computer-Forensic-Investigation
https://zone-h.org/mirror/id/16416728
https://www.dailydot.com/debug/hammond-sabu-fbi-stratfor-hack/
File:Antisec teaser 1225.txt
File:Antisec teaser 1229.txt
File:Antisec teaser 1229 (legit).txt

Explanation of the Hack

Stratfor was first discovered to have an open MySQL server by an anonymous hacker called Hyrriiya who then passed on the information to sup_g now known as Jeremy Hammond. MySQL by default has the user set to root with an empty password, this was the hole stratfor suffered from.

To access the server you do:

mysql -u root -h <stratfor>

Conversation between sup_g and Hyrriiya leading up to the Stratfor hack. https://uploads.dailydot.com/e04/15/antisec.jpg?auto=compress%2Cformat&ixlib=php-3.3.0