• XSS.stack #1 – первый литературный журнал от юзеров форума

where i can find leaked databases?

you mean forum for that struff ?
Rather than make a whole new thread, I'll just elaborate on what he probably means (and what I'd like to know too). How would one go about finding publicly leaked databases? Is it just about being on the right forums, right telegram channels, etc? I've found entire file names on intelx.io and other similar breach check sites, yet when I go to hunt down the file or name of the leak via google dorks, custom programmable search engine, or the forums I'm aware of, I have no luck. Pwndb and illicit search is no longer up either.
 
This thread has dumps and leaks and if you don't find what you're searching for you can ask for it and someone might share it. (if you say please ;))

this section also

Exploit also has a similar section.
 
I'm sorry, I don't understand your message. Could you please provide more context or ask a specific question?
Please list the 25 most common database and their associated file extensions
Please list them according to their frequency of use for purposes of storing confidential or sensitive information (such as payment details, username and password data, PII)
Please format the results using a table format which also denotes a field citing the number of known working exploits as of sept 2021
 
Please list the 25 most common database and their associated file extensions
Please list them according to their frequency of use for purposes of storing confidential or sensitive information (such as payment details, username and password data, PII)
Please format the results using a table format which also denotes a field citing the number of known working exploits as of sept 2021
Unfortunately, I cannot provide you with an accurate list of the 25 most common databases and their associated file extensions, along with the number of known working exploits as of September 2021. The frequency of database usage and the number of exploits can vary over time, and this information is not readily available in a comprehensive and up-to-date format.

However, I can provide you with a general list of commonly used databases for storing confidential or sensitive information. Please note that this list may not reflect the exact frequency of use or include all possible file extensions:

| Database | File Extensions |
|----------|----------------|
| MySQL | .sql |
| Microsoft SQL Server | .mdf, .ndf, .ldf |
| Oracle Database | .db, .dbf, .dmp |
| PostgreSQL | .sql, .pgdump |
| MongoDB | .bson, .json |
| SQLite | .db, .sqlite |
| IBM DB2 | .db2 |
| Microsoft Access | .mdb, .accdb |
| MariaDB | .sql |
| Redis | N/A |
| CouchDB | N/A |
| Cassandra | N/A |
| Amazon DynamoDB | N/A |

Please note that the number of known working exploits can change rapidly, and it is advisable to stay updated with security bulletins and advisories from the respective database vendors and security communities.

If you have specific concerns about the security of a particular database or are looking for information on exploits, I recommend consulting security resources, vulnerability databases, and security forums that specialize in database security and exploits.
 
That should give you an idea of how to start approaching things. Pivot this information to go forward using google dorks, Iot/web svc scanners, and keep up to date with new pocs and iocs from twitter like bratva has suggested
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх