____ _ _ | _ \ _____ _| |__ (_)_ __ | | | |/ _ \ \/ / '_ \| | '_ \ | |_| | (_) > <| |_) | | | | | |____/ \___/_/\_\_.__/|_|_| |_|
Title:Not Full Dox Couldn t find more info
Created:Mar 21st, 2021
Created by: Anonymous
Views: 224
Comments: 0
Username: Anonymous - (Login)
Please note that all posted information is publicly available and must follow our TOS.
// Couldn't find any more infomation then what's given. (It has been sitting on my computer might as well post it.) +-------------------------------------------+ | Table Of Contents | +-------------------------------------------+ | 0x01 Introduction...................| | 0x02 Personal Information...........| | 0x03 Social Media...................| | 0x04 Family Information.............| | 0x05 IP Information.................| | 0x06 House Information..............| | 0x07 Database Entries...............| | 0x08 Court Records..................| +-------------------------------------------+ +-------------------------------------------+ | 0x01 >[Introduction:]< | +-------------------------------------------+ Reasons: [1] Targets people without proof. [2] Doxes without reason. +---------------------------------------------------------------+ | 0x02 Personal Information | +---------------------------------------------------------------+ Full Name....: Online Allias: Benji, Sirclubslol, Sirclublol, Benzi819. Gender.......: Male Age..........: 17 DOB..........: State........: Midi-Pyrenees City.........: Gramat Address......: IRL Photos......: +---------------------------------------------------------------+ | 0x03 Social Media | +---------------------------------------------------------------+ Youtube................: Instagram..............: Discord Server.........: Soundcloud.............: Personal Instagram.....: Twitter................: Snapchat...............: Common Passwords.......: dakurycy, benzi, worma1731, steve1, batecupa, worldmap, 123456654321, patty, wormawww, Passwort. Email Addres(s)........: benzi@gmail.com, clublolsv4@gmail.com, pengibengi@gmail.com, benjipenji@gmail.com, benjisrealemail@gmail.com +---------------------------------------------------------------+ | 0x04 Familly Information | +---------------------------------------------------------------+ Biological Father: ? Facebook......: ? Instagram.....: Biological Mother: ? Facebook.......: ? Instagram......: +---------------------------------------------------------------+ | 0x05 IP Information | +---------------------------------------------------------------+ 90.55.21.111 Country: France (FR) State: Midi-Pyrenees City: Gramat Timezone: Europe/Paris ISP: Orange (AS3215 Orange) +-------------------------------------------+ | 0x06 >[House Information | +-------------------------------------------+ +---------------------------------------------------------------+ | 0x07 Database Entries | +---------------------------------------------------------------+ Adobe: In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, encrypted password and a password hint in plain text. The password cryptography was poorly done and many were quickly resolved back to plain text. The unencrypted hints also disclosed much about the passwords adding further to the risk that hundreds of millions of Adobe customers already faced. Collection #1 (unverified): In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. The data contained almost 2.7 billion records including 773 million unique email addresses alongside passwords those addresses had used on other breached services. Full details on the incident and how to search the breached passwords are provided in the blog post The 773 Million Record "Collection #1" Data Breach. Data Enrichment Exposure From PDL Customer: In October 2019, security researchers Vinny Troia and Bob Diachenko identified an unprotected Elasticsearch server holding 1.2 billion records of personal data. The exposed data included an index indicating it was sourced from data enrichment company People Data Labs (PDL) and contained 622 million unique email addresses. The server was not owned by PDL and it's believed a customer failed to properly secure the database. Exposed information included email addresses, phone numbers, social media profiles and job history data. Dropbox: In mid-2012, Dropbox suffered a data breach which exposed the stored credentials of tens of millions of their customers. In August 2016, they forced password resets for customers they believed may be at risk. A large volume of data totalling over 68 million records was subsequently traded online and included email addresses and salted hashes of passwords (half of them SHA1, half of them bcrypt). Dubsmash: In December 2018, the video messaging service Dubsmash suffered a data breach. The incident exposed 162 million unique email addresses alongside usernames and PBKDF2 password hashes. In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to "BenjaminBlue@exploit.im". Evony: In June 2016, the online multiplayer game Evony was hacked and over 29 million unique accounts were exposed. The attack led to the exposure of usernames, email and IP addresses and MD5 hashes of passwords (without salt). Exploit.In (unverified): In late 2016, a huge list of email address and password pairs appeared in a "combo list" referred to as "Exploit.In". The list contained 593 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read Password reuse, credential stuffing and another billion records in Have I Been Pwned. iMesh: In September 2013, the media and file sharing client known as iMesh was hacked and approximately 50M accounts were exposed. The data was later put up for sale on a dark market website in mid-2016 and included email and IP addresses, usernames and salted MD5 hashes. Compromised data: Email addresses, IP addresses, Passwords, Usernames. LinkedIn: In May 2016, LinkedIn had 164 million email addresses and passwords exposed. Originally hacked in 2012, the data remained out of sight until being offered for sale on a dark market site 4 years later. The passwords in the breach were stored as SHA1 hashes without salt, the vast majority of which were quickly cracked in the days following the release of the data. MyHeritage: In October 2017, the genealogy website MyHeritage suffered a data breach. The incident was reported 7 months later after a security researcher discovered the data and contacted MyHeritage. In total, more than 92M customer records were exposed and included email addresses and salted SHA-1 password hashes. In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it be attributed to "BenjaminBlue@exploit.im". Onliner Spambot (spam list): In August 2017, a spambot by the name of Onliner Spambot was identified by security researcher Benkow moʞuƎq. The malicious software contained a server-based component located on an IP address in the Netherlands which exposed a large number of files containing personal information. In total, there were 711 million unique email addresses, many of which were also accompanied by corresponding passwords. A full write-up on what data was found is in the blog post titled Inside the Massive 711 Million Record Onliner Spambot Dump. Pemiblanc (unverified): In April 2018, a credential stuffing list containing 111 million email addresses and passwords known as Pemiblanc was discovered on a French server. The list contained email addresses and passwords collated from different data breaches and used to mount account takeover attacks against other services. Read more about the incident. Verifications.io: In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable. Wattpad: In June 2020, the user-generated stories website Wattpad suffered a huge data breach that exposed almost 270 million records. The data was initially sold then published on a public hacking forum where it was broadly shared. The incident exposed extensive personal information including names and usernames, email and IP addresses, genders, birth dates and passwords stored as bcrypt hashes. +-------------------------------------------+ | 0x08 >[Court Records:]< | +-------------------------------------------+ Dev/Null.