Sabitlenmiş Tweet
SMJS
736 posts

SMJS
@SMJSGaming
23 | I modify games in my free time. Discord: @smjs
Katılım Şubat 2019
42 Takip Edilen586 Takipçiler

@SMJSGaming Speaking of Windows did you hear about the possible back door that they found for BitLocker lol
English

@bakathesussy Besides the subdomains which are already there
what for?
English

#GeometryDash So currently I have all the Android app IDs robtop uses for his GD variants connected to my Discord account (I own the domain)

English

@1aubreygraham1 Likely just following the trend back then of everything having an X in the name
English

@SMJSGaming @brint is he really relying on Cloudflare to prevent sql injection?
English

#GeometryDash So considering RobTop never did the due diligence he should have as a European company to report what was leaked. I may as well just reveal one thing I kept secret for quite a while to not immediately soil his reputation.
In the DB leak were unencrypted passwords.
English

@33YYYYYYY @chrissvector @RobTopGames 1) 2 way obfuscation is useless
2) Nah, most apps use a one time access token which can be revoked at any time when it's compromised. Besides no party involved should have any reason to leave a password 2 way encrypted/encoded since you should test against the hash.
English

@chrissvector @SMJSGaming @RobTopGames dude, 1) the password in the save file is somewhat obfuscated and 2) you're SUPPOSED to store passwords locally (such as in cookies). ALL apps with authenication store it locally unencrypted (or decryptable by one with access to your computer which is essentially that)
English

@ArcadiacManiac @ClingingBogGMD @tricipital14 Anyone confirmed compromised through this person's messages was already informed. But unless RobTop goes through the SQL logs (which sadly he isn't doing) I have no way to confirm the scale of the exploit abuse.
English

@SMJSGaming @ClingingBogGMD @tricipital14 if people have their accounts compromised and you are aware of who these are you should at least have the decency to inform these people
English

@ArcadiacManiac @ClingingBogGMD @tricipital14 Due to sensitivity on this topic I'm not providing anything identifiable but please refer to my reply on the top comment in this thread to explain how non temp this really is.
English

@SMJSGaming @ClingingBogGMD @tricipital14 “This same person also got into a bunch of accounts at the time” could you list examples because if so then yea maybe there’s some legitimacy to those login details. But I highly doubt a table named “temp” would contain actual user data
English

@ArcadiacManiac @ClingingBogGMD @tricipital14 This same person also got into a bunch of accounts at the time, so there's a high likelihood that they used this same table or used a login bypass trick you can execute when you have read access to the DB.
English

@ArcadiacManiac @ClingingBogGMD @tricipital14 Currently the person from who we found evidence of knowing about this exploit before pen testers got to it has been inactive. I've always said that it's currently unknown to what extend the breach was abused. Just that the possibility of this data was leaked.
English

@tricipital14 Basically rob seems to have made this table to find common passwords bots check for so that he can blacklist these. However, he just straight up captures raw login inputs from anyone to achieve this. This table has also existed for years.
English

@SMJSGaming So the table you had access to was called "tempLoginTest" ?
Can you give a little more info because a leak of a table with both "Temporary" and "Test" in the title implies that the data inside is worthless or not worth causing a panic over
English

@SMJSGaming yeah but isn't it just a temporary test that was... meant for testing?
English

@SMJSGaming is this how teamtuff hacked accounts or was that just bruteforce
English






