the vulnerability here is that people usually use 1 password for everything so if someone has time, you can go into many of those email accounts.....possibly FB pages and twitter...
Ndungu,Look up something called "SQL Injection" and you will see what exploit was used to access this server. This is not the work of a polished hacker, more of a "script kiddy" trolling for vulnerabilities and chalking up a personal scorecard. Nevertheless, we should be afraid, very afraid... as it is abundantly clear that we have very low or zero standards within our organizations for Information Security...MblayoOn Tue, Jul 17, 2012 at 4:22 PM, ndungu stephen <ndungustephen@gmail.com> wrote:
And here i was thinkin it was KCB...
So the guy was able to discover a loop hole to access the admin pages (mabbe a default password was used) ;Then he entered the sql database using the same password and give us a print out of users who access the page and leave their email address behind ... Big WhOOPP!!!I am sure the emails are not even KBC staff - these are probably those users told to register inorder to drop their comments .._______________________________________________
Skunkworks mailing list
Skunkworks@lists.my.co.ke
------------
List info, subscribe/unsubscribe
http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks
------------
Skunkworks Rules
http://my.co.ke/phpbb/viewtopic.php?f=24&t=94
------------
Other services @ http://my.co.ke
_______________________________________________
Skunkworks mailing list
Skunkworks@lists.my.co.ke
------------
List info, subscribe/unsubscribe
http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks
------------
Skunkworks Rules
http://my.co.ke/phpbb/viewtopic.php?f=24&t=94
------------
Other services @ http://my.co.ke