Cloudflare Data Leak
-
mrkps bunu yazdı
duckduckgo.com aratınca bura çıkıyor: http://tahribat.com/mgmt/diags
Hardware
Total Physical Memory: 31,712 GB
Free Physical Memory: 12,033 GB
Memory Load: 62%
Client Info
IP:82.194.90.69
Direct IP: 82.194.90.69
Browser: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:51.0) Gecko/20100101 Firefox/51.0
Request.IsSecureConnection: False
Request.Url.Port: 80
Request.Url.Scheme: http
Headers:
Connection: Keep-Alive
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
Cookie: __cfduid=1
Host: www.tahribat.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:51.0) Gecko/20100101 Firefox/51.0
CF-IPCountry: ES
X-Forwarded-For: 82.194.90.69
CF-RAY: 3366df98f4f32f89-MAD
X-Forwarded-Proto: http
CF-Visitor: {"scheme":"http"}
Upgrade-Insecure-Requests: 1
CF-Connecting-IP: 82.194.90.69Security
Username: IIS APPPOOL\Tahribat.com
ImpersonationLevel: None
Is Site running as Admin:FalseDirectory Permissions
Klasör Yetki / Read+Write+ /Uploads Read+Write+ /App_Data Read+Write+ C:\Windows\ Read+Write+ C:\ Read+Write+ D:\ Read+Write+ J:\ QueryError Buradaki bilgiyi cache etmiş işe birimizin cookie si dışarıa demektir burayı kim açık bırakmış kabak gibi sunucu bilgisi veriyor
-
O degilde lastpass filan hacklenirse fena karışır piyasa:)
-
ip ispanya sörviri görünüyor
hs-1819.dedicated.hostalia.com
-
https://api.auroraproject.xyz/api/v1/cloudbleed?key=&qry=haberler bu elemanların yaptığıda sanırım aranan kelimeye göre cloudflare kullanan siteleri çekmek fakat halen daha elle tutulur somut bir veri göremedim
-
EcHoLL bunu yazdımrkps bunu yazdı
duckduckgo.com aratınca bura çıkıyor: http://tahribat.com/mgmt/diags
Hardware
Total Physical Memory: 31,712 GB
Free Physical Memory: 12,033 GB
Memory Load: 62%Client Info
IP:82.194.90.69
Direct IP: 82.194.90.69
Browser: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:51.0) Gecko/20100101 Firefox/51.0
Request.IsSecureConnection: False
Request.Url.Port: 80
Request.Url.Scheme: http
Headers:
Connection: Keep-Alive
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
Cookie: __cfduid=1
Host: www.tahribat.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:51.0) Gecko/20100101 Firefox/51.0
CF-IPCountry: ES
X-Forwarded-For: 82.194.90.69
CF-RAY: 3366df98f4f32f89-MAD
X-Forwarded-Proto: http
CF-Visitor: {"scheme":"http"}
Upgrade-Insecure-Requests: 1
CF-Connecting-IP: 82.194.90.69Security
Username: IIS APPPOOL\Tahribat.com
ImpersonationLevel: None
Is Site running as Admin:FalseDirectory Permissions
Klasör Yetki / Read+Write+ /Uploads Read+Write+ /App_Data Read+Write+ C:\Windows\ Read+Write+ C:\ Read+Write+ D:\ Read+Write+ J:\ QueryError Buradaki bilgiyi cache etmiş işe birimizin cookie si dışarıa demektir burayı kim açık bırakmış kabak gibi sunucu bilgisi veriyor
aktif session bilgisi var orada. kimsenin ifşa olduğu yok :D
-