Gamesense.club Database - Leaked, Download!
by - Thursday, January 1, 1970 at 12:00 AM
woow thanks brooo
Reply
(May 15, 2022, 08:59 PM)altoid Wrote: What was the actual vulnerability in the login page?


I'd like to know this too LMAO
Reply
haha.something shit was cracked...
Reply
thnaks soo much!!
Reply
Nice job man
Reply
good leak friend!
Reply
good leak my friend :)
Reply
(May 14, 2022, 10:06 AM)ZAN Wrote:
Hello BreachForums Community,
Today I have uploaded the GS.CLUB Database for you to download for free, thanks for reading and enjoy!
In April 2021, I found a rip-off site of GameSense, which of course was poorly copy & pasted off some russian source with bunch of vulnerabilities. So I decided to invest 2 minutes into viewing the login page and managed to dump the users table. I am posting this to you guys today, never seen before, anywhere! Had to laugh for the fact that admin initially hashed the passwords for authentication purposes, but he also stored plain text versions of them?
Kindly let me know whether you would like more this kind of dumps posted from me in the future.
Compromised data: user IDs, usernames, email addresses, ip adresses, plain text passwords (along with SHA-1 version of them), registration & last visit dates stored in unix format.

INSERT INTO `users` VALUES(1661, 'hvhgod', '[email protected]', '2b4ebe7025a6e34cef2bc895597aebbe150f1ef6', 'qwer123asd', '77.29.238.213', 1535638154, 1539636312);
INSERT INTO `users` VALUES(1662, 'Alyssa', '[email protected]', '4e17a448e043206801b95de317e07c839770c8b8', 'qwerty-12345', '83.220.239.249', 1535638301, 1535664885);
INSERT INTO `users` VALUES(1663, 'sosyhyi', '[email protected]', 'c8701b835c5c7e53d1260ef325b6bbd0a8dc95bf', 'sosi123', '84.18.126.87', 1535638415, 1535638570);
INSERT INTO `users` VALUES(1664, 'RyzenHvh', '[email protected]', '88ea39439e74fa27c09a4fc0bc8ebe6d00978392', '123123123', '5.18.236.23', 1535638435, 1535643333);



Wow looks good thanks :)
Reply


 Users viewing this thread: Gamesense.club Database - Leaked, Download!: No users currently viewing.