💤 Inactive SecureServer.TV / Killstream.TV - ALL PAYPIGS DOXED BY RALPH on October 15th, 2021.

  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account
View attachment 2682486
Have the Pajeets cut and run? Ralphabros.... Noooooo

Not to worry though, yes their customer service rep is a Walmart cashier - but rest assured their technical support is top notch!

View attachment 2682502
I mean, who would doubt the experience of Ben here?
View attachment 2682504
Clearly his experience as a Walmart employees and truck driver would have prepared him for his role... Right? Well, I'm sure he has at least the educational background for the job...
View attachment 2682510
With people like this on the team, it's a wonder why SecureServer.TV is having so much downtime. I guess we'll never know.
These pajeets were smart enough to hire a native English speaker so the marks wouldn't run off the instant they had to talk to some poo in the loo when something went wrong.
 
I think @Mr E. Grifter is looking for something a little more layman's terms, as useful as this is

For a web server, /cgi-bin/ is very roughly analogous to c: \windows or /usr/bin . If you got in there, you could theoretically play with all the stuff the web server knows how to do. Being able to see that it exists is halfway to being able to open it and run the stuff inside it
I wish I could rate a post both informative and horrifying.
 
Impressive that Ralph has led to the death of yet another streaming/content host.

Is he still coping and saying that it’s going to be back online any day now?
 
I think @Mr E. Grifter is looking for something a little more layman's terms, as useful as this is

For a web server, /cgi-bin/ is very roughly analogous to c: \windows or /usr/bin . If you got in there, you could theoretically play with all the stuff the web server knows how to do. Being able to see that it exists is halfway to being able to open it and run the stuff inside it
It makes me wonder who is legally liable in this instance for the breach.

Is it the Pajeets running the site?

Or is it anyone with a little bit of tech knowhow entering the server with ease because of how lousy the whole thing is set up?

The way you put it, I think secureserver should be held liable. I am just a layman but the way you are putting it, it seems that metaphorically speaking, secureserver is holding the doors of his house wide open with flashing lights asking everyone to enter and loot the place.
 
It's not dead. Customer sites (excluding Killstream) are still up: https://watch.x22report.tv/webtv-v3/
They just fucked up their main site or some hacker took it down.
Killstream.tv is still up too, it's a separate domain/server that points at the sstv back end. Can we play video from the x22report domain or invoke the login page that would hit the sstv servers?
It makes me wonder who is legally liable in this instance for the breach.

Is it the Pajeets running the site?

Or is it anyone with a little bit of tech knowhow entering the server with ease because of how lousy the whole thing is set up?

The way you put it, I think secureserver should be held liable. I am just a layman but the way you are putting it, it seems that metaphorically speaking, secureserver is holding the doors of his house wide open with flashing lights asking everyone to enter and loot the place.
You still have to access the directory to do anything, the explanation was regarding the "why is a sign of horrible incompetence that the folder is exposed" question. The answer being that it's got a lot of important stuff in it, and leaving it exposed/visible is leaving a potentially very damaging vector of attack open. Whether the attack succeeds or not is another question, but step 1 at a service with "secure" in the name would to be to not leave those avenues of potential intrusion available in the first place
 
Last edited:
View attachment 2682486
Have the Pajeets cut and run? Ralphabros.... Noooooo

Not to worry though, yes their customer service rep is a Walmart cashier - but rest assured their technical support is top notch!

View attachment 2682502
I mean, who would doubt the experience of Ben here?
View attachment 2682504
Clearly his experience as a Walmart employees and truck driver would have prepared him for his role... Right? Well, I'm sure he has at least the educational background for the job...
View attachment 2682510
With people like this on the team, it's a wonder why SecureServer.TV is having so much downtime. I guess we'll never know.
First "Camden County High School."
Then "Camen County High school." Wut?
 
Killstream.tv is still up too, it's a separate domain/server that points at the sstv back end. Can we play video from the x22report domain or invoke the login page that would hit the sstv servers?
Yeah, X22 videos are still there so should play for anyone logged in.
Killstream.tv videos are now gone from the CDN so if it comes back, all his videos will likely need to be re-uploaded unless they moved them to whatever new CDN he is setting up. But it's far more likely shit ain't coming back.
 
Yeah, X22 videos are still there so should play for anyone logged in.
Killstream.tv videos are now gone from the CDN so if it comes back, all his videos will likely need to be re-uploaded unless they moved them to whatever new CDN he is setting up. But it's far more likely shit ain't coming back.
The more basic template that is coneofarc.tv returns "fatal error: unknown domain" when it tries to directly hit the sstv servers after using the signup link.

X22 appears to have all of its assets residing entirely under its own domain
 
1635909100554.png

I cannot help myself from adding this to the OP. Well done!
 
ssnet.png

This guy works for Secure Server dot Net and is infinitely more qualified than the people we've found that work for Secure Server dot TV. nmap scan below also shows only 80/443 open which is what you should see when scanning a web host. These retards are getting absolutely techmogged by a pack of Bengali curryniggers. This level of professional embarrassment shouldn't even be possible.

Code:
$ nmap --open secureserver.net
Starting Nmap 7.80 ( https://nmap.org ) at 2021-11-03 06:40 MDT
Nmap scan report for secureserver.net (208.109.192.71)
Host is up (0.074s latency).
rDNS record for 208.109.192.71: ip-208-109-192-71.ip.secureserver.net
Not shown: 998 filtered ports
Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
PORT    STATE SERVICE
80/tcp  open  http
443/tcp open  https
Nmap done: 1 IP address (1 host up) scanned in 6.61 seconds

(Post edited for clarity as original post caused some confusion)
 
Last edited:
Fucking lol.
What the fuck are they doing?
:story:
With people like this on the team, it's a wonder why SecureServer.TV is having so much downtime. I guess we'll never know.
...and the tech support is a fucking truck driver from Walmart. That drives Uber in his spare time.
Military Grade Encryption Ladies and Guntlemen.
Oh I can see this is going to be another "win" for the Ralphamale.
I just have that feeling...
:gunt:
 
View attachment 2683416
The retards at SecureServer dot TV are getting absolutely techmogged by the Bengali curryniggers at SecureServer dot Net. This level of professional embarrassment shouldn't even be possible.
So their "project manager" who "re-engineer test deploy end-user support" (what the fuck does that mean, does this person not know how to use commas or is that supposed to be a single sentence?) has only experience doing end-user support?
Wait, no sorry he was an "end-user support mentor", amazing.
 
View attachment 2683416
The retards at SecureServer dot TV are getting absolutely techmogged by the Bengali curryniggers at SecureServer dot Net. This level of professional embarrassment shouldn't even be possible.
1635927138136.png

Holy shit :story: I swear this was just one of the four Indian cities I know of and I pretty much randomly picked it.

1635927199663.png


Having COOMER as your surname, Silicon Valley isn't sending their best.
 
View attachment 2684034
Holy shit :story: I swear this was just one of the four Indian cities I know of and I pretty much randomly picked it.
I think this is the centre of India Tech scams, I remember the name and I think it's because of my binge watching of Jim Browning.

Edit: Holy Fuck it is.
Screenshot_20211103-104459__01.jpg

It's bad enough their security is so bad it got breached three times - that we are aware of, which isn't surprising based on what I've seen of Tech Scammers network security - but to give your financial supporters details to some Kalkata based Indian Tech scammer is just awful, so irresponsible on every level. There's nothing to prevent these guys selling these details on to scammers who will phone them up aiming to rip them off.

Further Edit:
SecureServer.TV lack the IT skills of Indian Tech Scammers :story:
 
Last edited:
It's bad enough their security is so bad it got breached three times - that we are aware of, which isn't surprising based on what I've seen of Tech Scammers network security - but to give your financial supporters details to some Kalkata based Indian Tech scammer is just awful, so irresponsible on every level.
Imagine paypigging for some repulsive gunt that does this to you, then continuing to paypig as if he didn't just fuck you in the ass repeatedly. Looks like it isn't just Faith and May who got gunted. I wonder if the pajeets will outright scam their credit cards, or just put them on a sucker list for future scams.
 
Imagine paypigging for some repulsive gunt that does this to you, then continuing to paypig as if he didn't just fuck you in the ass repeatedly. Looks like it isn't just Faith and May who got gunted. I wonder if the pajeets will outright scam their credit cards, or just put them on a sucker list for future scams.
My guess is the latter, that said idk much about how CCNs are kept secure from companies.

It does make some sense actually, although whether it is intentional is questionable, the demographics of those who used SecureServer are Qoomers and the like. People who are gullible, lack understanding of technology and are generally vulnerable rubes.

This could be a honeypot for identifying people who are marks, and charging then for the pleasure. Whoever said Pajeets were incompetent?
 
In this case, apparently not at all, because there was CC info in the original leak by @Mundane Ralph
Was it not just the last 3 of the CCN though, I know that is often accessible but it's not necessarily an issue.

Don't vendors/companies use a 3rd party to process the actual info so their hands are completely off it?
 
Don't vendors/companies use a 3rd party to process the actual info so their hands are completely off it?
Legitimate ones? Yes. Scamming pajeets in Calcutta? I think they do whatever they can get away with, although I'm not sure what that is. SA used to have actual CCNs that they kept in the clear, according to former goons.
 
Back
Top Bottom