- Цена
- 4000
- Контакты
- Post.
⠀
⠀
In late February, Doxbin experienced another data scrape conducted by Valerie and @Maiko.
I had identified a vulnerability that exposed all API endpoints to unauthorized access from certain Asian servers due to a misconfiguration in Cloudflare.
I subsequently reported this vulnerability to River, and it was rectified within a week.
During this time, several community members expressed concerns that the Doxbin administrator was indifferent to the website's security.
⠀
Upon hearing this, my Chinese friend, Maiko, utilized the previously breached data by emo to feed said endpoints and scrape data intended for personal use.
After more than a week of attempts to contact River regarding a bounty, during which we received no response, we made the decision to proceed with the sale of said data.
⠀
The breached data consists of publicly available information from 384k users on Doxbin, along with all 170k pastes.
No additional users or email addresses were affected, except for those compromised in the Tooda breach.
⠀
ONE-TIME PURCHASE ONLY
4000$
⠀
Sample
https://files.catbox.moe/gddr0k.json (users)
https://files.catbox.moe/nqxkzw.zip (pastes)
⠀
Contact
Session: 057b9805db93b5b010ae94d02700a72a85186cf7f80d09dd6f987adb4512226f7a
Telegram @redstring000
Signal: https://signal.me/#eu/MfnoAQ7X62ryXKL8hz1T1ENZQ8_MlO855IE_f3LGaEhrDG6BnfFCdIT1kQYzzqJw (no longer use the signal).
For any other: Message me trough the forum.
⠀
In late February, Doxbin experienced another data scrape conducted by Valerie and @Maiko.
I had identified a vulnerability that exposed all API endpoints to unauthorized access from certain Asian servers due to a misconfiguration in Cloudflare.
I subsequently reported this vulnerability to River, and it was rectified within a week.
During this time, several community members expressed concerns that the Doxbin administrator was indifferent to the website's security.
⠀
Upon hearing this, my Chinese friend, Maiko, utilized the previously breached data by emo to feed said endpoints and scrape data intended for personal use.
After more than a week of attempts to contact River regarding a bounty, during which we received no response, we made the decision to proceed with the sale of said data.
⠀
The breached data consists of publicly available information from 384k users on Doxbin, along with all 170k pastes.
No additional users or email addresses were affected, except for those compromised in the Tooda breach.
⠀
ONE-TIME PURCHASE ONLY
4000$
⠀
Sample
https://files.catbox.moe/gddr0k.json (users)
https://files.catbox.moe/nqxkzw.zip (pastes)
⠀
Contact
Session: 057b9805db93b5b010ae94d02700a72a85186cf7f80d09dd6f987adb4512226f7a
Telegram @redstring000
Signal: https://signal.me/#eu/MfnoAQ7X62ryXKL8hz1T1ENZQ8_MlO855IE_f3LGaEhrDG6BnfFCdIT1kQYzzqJw (no longer use the signal).
For any other: Message me trough the forum.
Последнее редактирование модератором: