The website of the European Space Agency (ESA) has been hacked into and a list of FTP accounts, as well as email addresses and passwords for administrators and editors have been leaked.A list of database users with hashed passwords was also disclosed, together with the SHA1-hashed server root password.
The site administrator and editor credentials were exposed in plain text, as well as email addresses and passwords corresponding to website user accounts.
The passwords are in readable form, but TinKode took the measure of partially hiding them before publishing. There is also a list of associated proxy user names and passwords.
ESA’s space flight program includes human spaceflight, mainly through the participation in the International Space Station program, the launch and operations of unmanned exploration missions to other planets and the Moon, Earth observation, science, telecommunication as well as maintaining a major spaceport, the Guiana Space Centre at Kourou, French Guiana, and designing launch vehicles.
******************************************************************
(+) Authors : TinKode
(+) WebSite : TinKode27.BayWords.Com
(+) Date : 17.04.2011
(+) Hour : 17:17 PM
(+) Targets : www.esa.int (European Space Agency)
(+) Document: ESA.int Full Disclosure (Hacked)
(+) Method : UnKn0Wn
******************************************************************
Text Files:
Main informations about server. Click here.
Main accounts from ESA.INT (Root Accounts, Emails, FTPs, Admins, Editors, etc). Click here.
Emails:
Preview of Root accounts, Emails, FTPs, etc:
[Root Account]
---------------------------------------------------------------------
Username = root
Password = *8009BCFDDF013C178B831737138F2A3D8E652B8E (SHA1)
[DB Accounts]
---------------------------------------------------------------------
Username = jbossuser
Password = 49c6641168b072d0
Username = psocrat
Password = 49c6641168b072d0
Username = root
Password = 49c6641168b072d0
Username = jbossuser
Password = 7fe05ad56133d52b
Username = psocrat
Password = 7fe05ad56133d52b
[Administrator Account]
---------------------------------------------------------------------
username = rnay06
password = eduxxxr3
admin = y
[Editor account]
---------------------------------------------------------------------
Username = editor
Password = editor2005
[FTP Accounts]
---------------------------------------------------------------------
Password : service2004
Username : nrtservice
Webserver: localhost
Protocol : scp
Username : riverusr
Password : usrriver
WebServer: styx.esrin.esa.it
Protocol : ftp
Username : mapinject
Password : .mapinject
Webserver: ssems1.esrin.esa.int
Protocol : sftp
Password : fire
Username : wfaa
WebServer: twin.esrin.esa.int
Protocol : ftp
Password : MMvomir07.
Username : uvomir
Webserver: 193.204.231.156
More : http://whois.domaintools.com/193.204.231.156
Protocol : sftp
Password : 12qwas
Username : kimv
Webserver: kes.esrin.esa.int
Protocol : ftp
Password : Bk7Wdkf6hY
Username : emathot
Webserver: testlab4.esrin.esa.int
Protocol : ftp
Password : MecoGPOD123
Username : MecoGPOD
Webserver: metheny.esrin.esa.int
Protocol : ftp
Password : brteon
Username : betlem
Webserver: uranus.esrin.esa.it
Protocol : ftp
Password : ch9l
Username : ftpriv
Webserver: uranus.esrin.esa.int
Protocol : ftp
Password : .mapinject
Username : mapinject
Webserver: ssems1.esrin.esa.int
Protocol : sftp
Password : esa2004
Username : Olivier
Webserver: dummy.server.esa.int
Protocol : ftp
Password : .passWIL
Username : wilkinsa
Webserver: esa-mm.esa.int
Protocol : ftp
Special thanks to for sharing this info:http://tinkode27.baywords.com
The site administrator and editor credentials were exposed in plain text, as well as email addresses and passwords corresponding to website user accounts.
The passwords are in readable form, but TinKode took the measure of partially hiding them before publishing. There is also a list of associated proxy user names and passwords.
ESA’s space flight program includes human spaceflight, mainly through the participation in the International Space Station program, the launch and operations of unmanned exploration missions to other planets and the Moon, Earth observation, science, telecommunication as well as maintaining a major spaceport, the Guiana Space Centre at Kourou, French Guiana, and designing launch vehicles.
******************************************************************
(+) Authors : TinKode
(+) WebSite : TinKode27.BayWords.Com
(+) Date : 17.04.2011
(+) Hour : 17:17 PM
(+) Targets : www.esa.int (European Space Agency)
(+) Document: ESA.int Full Disclosure (Hacked)
(+) Method : UnKn0Wn
******************************************************************
Text Files:
Main informations about server. Click here.
Main accounts from ESA.INT (Root Accounts, Emails, FTPs, Admins, Editors, etc). Click here.
Emails:
Preview of Root accounts, Emails, FTPs, etc:
[Root Account]
---------------------------------------------------------------------
Username = root
Password = *8009BCFDDF013C178B831737138F2A3D8E652B8E (SHA1)
[DB Accounts]
---------------------------------------------------------------------
Username = jbossuser
Password = 49c6641168b072d0
Username = psocrat
Password = 49c6641168b072d0
Username = root
Password = 49c6641168b072d0
Username = jbossuser
Password = 7fe05ad56133d52b
Username = psocrat
Password = 7fe05ad56133d52b
[Administrator Account]
---------------------------------------------------------------------
username = rnay06
password = eduxxxr3
admin = y
[Editor account]
---------------------------------------------------------------------
Username = editor
Password = editor2005
[FTP Accounts]
---------------------------------------------------------------------
Password : service2004
Username : nrtservice
Webserver: localhost
Protocol : scp
Username : riverusr
Password : usrriver
WebServer: styx.esrin.esa.it
Protocol : ftp
Username : mapinject
Password : .mapinject
Webserver: ssems1.esrin.esa.int
Protocol : sftp
Password : fire
Username : wfaa
WebServer: twin.esrin.esa.int
Protocol : ftp
Password : MMvomir07.
Username : uvomir
Webserver: 193.204.231.156
More : http://whois.domaintools.com/193.204.231.156
Protocol : sftp
Password : 12qwas
Username : kimv
Webserver: kes.esrin.esa.int
Protocol : ftp
Password : Bk7Wdkf6hY
Username : emathot
Webserver: testlab4.esrin.esa.int
Protocol : ftp
Password : MecoGPOD123
Username : MecoGPOD
Webserver: metheny.esrin.esa.int
Protocol : ftp
Password : brteon
Username : betlem
Webserver: uranus.esrin.esa.it
Protocol : ftp
Password : ch9l
Username : ftpriv
Webserver: uranus.esrin.esa.int
Protocol : ftp
Password : .mapinject
Username : mapinject
Webserver: ssems1.esrin.esa.int
Protocol : sftp
Password : esa2004
Username : Olivier
Webserver: dummy.server.esa.int
Protocol : ftp
Password : .passWIL
Username : wilkinsa
Webserver: esa-mm.esa.int
Protocol : ftp
Special thanks to for sharing this info:http://tinkode27.baywords.com
No comments:
Post a Comment