💤 Inactive SecureServer.TV / Killstream.TV - ALL PAYPIGS DOXED BY RALPH on October 15th, 2021.

  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account
They have to fly in a security expert from Bangladesh to fix their security problems.
Pajeet++ has already visited, got confused, and defaulted to scamming as a Microsoft representative. Expect delays while he keeps nervously typing mscfg into the bash shell.
 
Why would he ever do that? I can't think of a reason he would ever consider it. He cancelled a week of shows in the most beta cuck way possible during this past Lost Wages trip. Did any paypigs challenge him? Paypigs are some of the most contemptible faggots alive today. They will not only blindly follow whatever exceptional individual validates their worldview, but they will pay for the privilege of getting scammed.
Hmm, about paypigs.
1635447751285.png

What makes me laugh, the Pajeets want to put Ralph on a "more secure setting", yet how is this different to just straight up admitting that they are continuing to leave their other customers vulnerable?
It's probably going to become a hobby of antifag "hacktivists" just to fuck this site up the ass every few days for shits and giggles. And probably some others who don't even have an ideological reason, they just see a wide open goatse.
That's exactly it. In my experience, a website that's down this long simply doesn't come back up.
It's like an NYC restaurant with a "Closed for Remodeling" sign. That shit isn't going to be open ever again.
 
Last edited:
It's probably going to become a hobby of antifag "hacktivists" just to fuck this site up the ass every few days for shits and giggles. And probably some others who don't even have an ideological reason, they just see a wide open goatse.
It already is just a hobby for some from what I can tell - not that I am an expert.

However, between hackers who are ideologically motivated, state sponsored, organised crime groups looking for victims to extort and hobbyists there are plenty of possibilities.

I do find it shocking though, if I was pulling in the kind of money Secure Server was - while touting security as my brand - I would have at least outsourced this to someone competent.
 
I do find it shocking though, if I was pulling in the kind of money Secure Server was - while touting security as my brand - I would have at least outsourced this to someone competent.
That's pretty clearly fraud at this point. They're definitely on notice at this point that their shitty servers are basically goatseated beyond belief and still selling it as "secure." It isn't. There are probably Windows 98 boxes still in existence more secure than this bullshit.

My bet is this site, a literal ISP that is a lolcow, gets hacked a few more times until something really big, then disappears along with its scamming pajeet owners.
 
That's pretty clearly fraud at this point. They're definitely on notice at this point that their shitty servers are basically goatseated beyond belief and still selling it as "secure." It isn't. There are probably Windows 98 boxes still in existence more secure than this bullshit.
You are probably correct, again I am no expert but Windows 98 is a known system with known flaws but equally these flaws have been identified and patched over time. In addition to this, older hardware is probably difficult to compromise just due to it not being commonplace anymore - if there are further exploits that are not patched is anyone really putting effort into finding them now?
My bet is this site, a literal ISP that is a lolcow, gets hacked a few more times until something really big, then disappears along with its scamming pajeet owners.
Hard agree.
 
However much doesn't trigger Target or Walmat shift managers to look at a purchase. The Ralphamale needs the same social considerations and protections as your 90 year old grandmother.
How old is this retard? In his mid-30s or something? I have actually known 80 year old grandmothers with a better grasp of the Internet. How is he an utter boomer in his 30s?
 
They have to fly in a security expert from Bangladesh to fix their security problems.r
>They
Im going to bet the "Secure Server" organization consists of nothing but a guy and some rented servers in a low-tier retail data center.

Stripe is a credit card processor you normally see at small eCommerce businesses like hipster T-shirt stores. And SS's 1-800 number is from a text to toll free gateway provider. Zipwhip. So that number could be just going to some guy's cellphone.
Their platform is just some white label garbage he probably contracted from pajeet's and there is noone to fix the massive holes now. The grift was probably going fine when it was just harmless Qboomers but now Gunt showed challenging his alawgs to hack him thats all over.
 
Last edited:
I do find it shocking though, if I was pulling in the kind of money Secure Server was - while touting security as my brand - I would have at least outsourced this to someone competent.
My bet is this site, a literal ISP that is a lolcow, gets hacked a few more times until something really big, then disappears along with its scamming pajeet owners.
See, I'm not shocked at all that a site that caters to qboomers and has the opportunity to type "Ethan Ralph Killstream" into Google before taking on killstream hosting duties is run by incompetent dipshits. They don't have to be good at their jobs, they just have to be the platform of last resort

I don't see sstv pulling the plug voluntarily. They have a captive customer base what with qanon being treated as literal violence by every other platform. Their exit plan will probably be to lose all access to payment processing because too many people complained to stripe about the q content
 
At work I sometimes joke that we should shut off our boxes and encase them in concrete to make them secure. When you look at it via that lens Ralph actually does have a secure server now, broke dick pedophile terrorist farms btfo.
 
How many iTunes cards has Ralph paid them so far?
After the team's recent payment infrastructure upgrade, Ralph had to send $5,000 wrapped in copious layers of aluminium foil to Tyrone's AirBnB via FedEx NextDay(tm) delivery service for an updated server.
UltraSecureSever(tm).tv, designed for Killstream.tv. The team at Silicon Valley, Kolkata have been working overtime without pay.
 
Interesting. Secureserver.tv still has a whois entry, but an nslookup returns "no authoritative answer/can't find secureserver.tv" when querying the dns server I connect to, and the page (and all subpages such as /killstream) doesn't even get far enough in the internet to load an error message like 404. Tried again on a web service and got 0 global secureserver.tv results. Killstream.tv still works, but still points at nothing

Just a dns hiccup? For a company enduring months of embarrassing web intrusions? I wouldn't presume to speculate on matters like that

Chances of killstream.tv coming back up this week, fellow ayyylawwwgs?
 
Interesting. Secureserver.tv still has a whois entry, but an nslookup returns "no authoritative answer/can't find secureserver.tv" when querying the dns server I connect to, and the page (and all subpages such as /killstream) doesn't even get far enough in the internet to load an error message like 404. Tried again on a web service and got 0 global secureserver.tv results. Killstream.tv still works, but still points at nothing

Just a dns hiccup? For a company enduring months of embarrassing web intrusions? I wouldn't presume to speculate on matters like that

Chances of killstream.tv coming back up this week, fellow ayyylawwwgs?
sstv.png

Fucking lol. This is supposed to be a serious business with actual clients paying hundreds of dollars a month and they can't even put up a basic HTML "Under Maintenance" page? And directory listings turned on exposing the cgi-bin directory too. /cgi-bin returns a 403 Forbidden error, but it shouldn't even be visible in the first place. Who knows what other holes are.

$ nmap --open secureserver.tv Starting Nmap 7.80 ( https://nmap.org ) at 2021-11-02 16:39 MDT Nmap scan report for secureserver.tv (107.180.105.10) Host is up (0.11s latency). rDNS record for 107.180.105.10: ip-107-180-105-10.ip.secureserver.net Not shown: 948 closed ports, 39 filtered ports Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 80/tcp open http 110/tcp open pop3 111/tcp open rpcbind 143/tcp open imap 443/tcp open https 465/tcp open smtps 587/tcp open submission 993/tcp open imaps 995/tcp open pop3s 3306/tcp open mysql Nmap done: 1 IP address (1 host up) scanned in 3.09 seconds
MySQL and SSH ports still show open as well. If the admin responsible for this host worked for me he would be fired so fucking fast.
 
View attachment 2682317
Fucking lol. This is supposed to be a serious business with actual clients paying hundreds of dollars a month and they can't even put up a basic HTML "Under Maintenance" page? And directory listings turned on exposing the cgi-bin directory too. /cgi-bin returns a 403 Forbidden error, but it shouldn't even be visible in the first place. Who knows what other holes are.

$ nmap --open secureserver.tv Starting Nmap 7.80 ( https://nmap.org ) at 2021-11-02 16:39 MDT Nmap scan report for secureserver.tv (107.180.105.10) Host is up (0.11s latency). rDNS record for 107.180.105.10: ip-107-180-105-10.ip.secureserver.net Not shown: 948 closed ports, 39 filtered ports Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 80/tcp open http 110/tcp open pop3 111/tcp open rpcbind 143/tcp open imap 443/tcp open https 465/tcp open smtps 587/tcp open submission 993/tcp open imaps 995/tcp open pop3s 3306/tcp open mysql Nmap done: 1 IP address (1 host up) scanned in 3.09 seconds
MySQL and SSH ports still show open as well. If the admin responsible for this host worked for me he would be fired so fucking fast.
Can you explain in simple terms why this is so fucked, just imagine I'm a neanderthal... Wait no, imagine I'm Ralph.
 
View attachment 2682317
Fucking lol. This is supposed to be a serious business with actual clients paying hundreds of dollars a month and they can't even put up a basic HTML "Under Maintenance" page? And directory listings turned on exposing the cgi-bin directory too. /cgi-bin returns a 403 Forbidden error, but it shouldn't even be visible in the first place. Who knows what other holes are.

$ nmap --open secureserver.tv Starting Nmap 7.80 ( https://nmap.org ) at 2021-11-02 16:39 MDT Nmap scan report for secureserver.tv (107.180.105.10) Host is up (0.11s latency). rDNS record for 107.180.105.10: ip-107-180-105-10.ip.secureserver.net Not shown: 948 closed ports, 39 filtered ports Some closed ports may be reported as filtered due to --defeat-rst-ratelimit PORT STATE SERVICE 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 80/tcp open http 110/tcp open pop3 111/tcp open rpcbind 143/tcp open imap 443/tcp open https 465/tcp open smtps 587/tcp open submission 993/tcp open imaps 995/tcp open pop3s 3306/tcp open mysql Nmap done: 1 IP address (1 host up) scanned in 3.09 seconds
MySQL and SSH ports still show open as well. If the admin responsible for this host worked for me he would be fired so fucking fast.
I really, really like the part of the screenshot that shows

"Not secure", " secureserver.tv"

Ps. My nmap returns nothing. Try to flush your dns cache and see if you can still reach sstv by name
 
I really, really like the part of the screenshot that shows

"Not secure", " secureserver.tv"

Ps. My nmap returns nothing. Try to flush your dns cache and see if you can still reach sstv by name
Screenshot_20211102-234232__01.jpg
Have the Pajeets cut and run? Ralphabros.... Noooooo

Not to worry though, yes their customer service rep is a Walmart cashier - but rest assured their technical support is top notch!

Screenshot_20211102-234614__01.jpg
I mean, who would doubt the experience of Ben here?
Screenshot_20211102-234619__01.jpg
Clearly his experience as a Walmart employees and truck driver would have prepared him for his role... Right? Well, I'm sure he has at least the educational background for the job...
Screenshot_20211102-234632__01.jpg
With people like this on the team, it's a wonder why SecureServer.TV is having so much downtime. I guess we'll never know.
 
Last edited by a moderator:
Can you explain in simple terms why this is so fucked, just imagine I'm a neanderthal... Wait no, imagine I'm Ralph.
Those services are available to anyone, anywhere, with a computer and PuTTy.

So if someone were to look deeper, they could pull a version number and look for any vulnerabilities applicable, or if they were to get REALLY froggy, try to get some creds via OSINT or just brute-forcing (which would probably work considering what we know so far).

Ideally, you want critical services, such as SSH/SQL/(Also, that DNS-53 is TCP, not UDP, so uhh could be bad if someone got access to that) to be accessible to admins via specific connections and not completely fucking open.


Edit: At least they aren't using Telnet
 
Those services are available to anyone, anywhere, with a computer and PuTTy.

So if someone were to look deeper, they could pull a version number and look for any vulnerabilities applicable, or if they were to get REALLY froggy, try to get some creds via OSINT or just brute-forcing (which would probably work considering what we know so far).

Ideally, you want critical services, such as SSH/SQL/(Also, that DNS-53 is TCP, not UDP, so uhh could be bad if someone got access to that) to be accessible to admins via specific connections and not completely fucking open.


Edit: At least they aren't using Telnet
I think @Mr E. Grifter is looking for something a little more layman's terms, as useful as this is

For a web server, /cgi-bin/ is very roughly analogous to c: \windows or /usr/bin . If you got in there, you could theoretically play with all the stuff the web server knows how to do. Being able to see that it exists is halfway to being able to open it and run the stuff inside it
 
Back
Top Bottom