amuck-landowner

Search results

  1. Magiobiwan

    This post made me laugh: l00k1ng for phr33 VPS plezze!

    I could use it. For winning any e-peen contest EVER CREATED.
  2. Magiobiwan

    Is WHMCS next to be exploited?

    @MartinD I was going to write up a response like that to his statement, but it's such a pain to write a long reply on my phone. And your post hits everything I would have said too :)
  3. Magiobiwan

    Is WHMCS next to be exploited?

    Now to ban netnub too.
  4. Magiobiwan

    ChicagoVPS / CVPS Hacked. New SolusVM exploit? [PT 2/2]

    Seriously you two. What are you getting out of this? Lulz? It's not helping the community any. Providers are locking down their stuff, unwilling to risk being compromised, which inconveniences their clients. The node wiping is causing people to lose their data, their time, the effort they've put...
  5. Magiobiwan

    ChicagoVPS / CVPS Hacked. New SolusVM exploit? (Content Restored) [PT. 1/2]

    Seriously you two. What are you getting out of this? Lulz? It's not helping the community any. Providers are locking down their stuff, unwilling to risk being compromised, which inconveniences their clients. The node wiping is causing people to lose their data, their time, the effort they've put...
  6. Magiobiwan

    ChicagoVPS / CVPS Hacked. New SolusVM exploit? [PT 2/2]

    And then the past where you threatened to hack, DDoS, and exploit several hosts for no apparent reason. And then claimed it was someone ELSE behind all this. 
  7. Magiobiwan

    ChicagoVPS / CVPS Hacked. New SolusVM exploit? (Content Restored) [PT. 1/2]

    And then the past where you threatened to hack, DDoS, and exploit several hosts for no apparent reason. And then claimed it was someone ELSE behind all this. 
  8. Magiobiwan

    ChicagoVPS / CVPS Hacked. New SolusVM exploit? (Content Restored) [PT. 1/2]

    Again, better safe than compromised, with your DB dumped and made public and your nodes rm -rf --no-preserve-root /'ed. 
  9. Magiobiwan

    ChicagoVPS / CVPS Hacked. New SolusVM exploit? (Content Restored) [PT. 1/2]

    I suspect that following this series of incidents, there's going to be a large increase in home-grown panel solutions. 
  10. Magiobiwan

    ChicagoVPS / CVPS Hacked. New SolusVM exploit? (Content Restored) [PT. 1/2]

    I doubt BuyVM would do this. Too risky. Anyways, if you're a provider and HAVE NOT taken SolusVM down, YOU SHOULD!
  11. Magiobiwan

    ChicagoVPS / CVPS Hacked. New SolusVM exploit? (Content Restored) [PT. 1/2]

    I didn't grab it myself, but I hear (from thread on LET) it's the same stuff as was in the RamNode one. Names, Emails, Client IDs, Hashed PW, Original Root PW, IPs, Hostnames, OS, Virt Type, etc. 
  12. Magiobiwan

    SolusVM Exploit - Who got hit?

    Oh look. I'd say we can add CVPS to the list.
  13. Magiobiwan

    ChicagoVPS / CVPS Hacked. New SolusVM exploit? (Content Restored) [PT. 1/2]

    Well, looks like CVPS has also fallen victim to the latest SolusVM Exploit. Given their CP page anyways.  Take a look for yourself! https://manage.chicagovps.net:5656/ Someone posted this on LET, but nobody had posted here. YET.
  14. Magiobiwan

    ChicagoVPS / CVPS Hacked. New SolusVM exploit? (Content Restored) [PT. 1/2]

    Well, looks like CVPS has also fallen victim to the latest SolusVM Exploit. Given their CP page anyways.  Take a look for yourself! https://manage.chicagovps.net:5656/ Someone posted this on LET, but nobody had posted here. YET. EDIT: TO COMMENT ON THIS THREAD PLEASE VISIT PART 2...
  15. Magiobiwan

    ChicagoVPS / CVPS Hacked. New SolusVM exploit? [PT 2/2]

    NOTICE EDIT: Original thread content here: http://vpsboard.com/topic/984-chicagovps-cvps-hacked-new-solusvm-exploit-pt-1 The thread had to be split into two after some errors. All original posts have been restored in that thread. Further discussion can be had within this thread. -MannDude...
  16. Magiobiwan

    SolusVM Exploit - Who got hit?

    They gave 3 months free service for their FREE PRODUCTS? It's... So amazing!
  17. Magiobiwan

    SolusVM Vulnerability

    @Jack it's this page: 
  18. Magiobiwan

    SolusVM Vulnerability

    It's a vulnerability in SolusVM's Control Panel, so anyone using SolusVM for anything (be it OVZ, KVM, Xen-PV, or Xen-HVM) is vulnerable unless they patch. 
  19. Magiobiwan

    SolusVM Vulnerability

    Just in case you providers using SolusVM didn't know, you can find the IPs clients logged in with under the Client Log page in SolusVM. 
Top
amuck-landowner