• XReactor Team Telegram Channel!
    Join now to get many free checkers, Click Here!
    XReactor Team Telegram Group, Join Now

DataBase  Thread Name: LinkedIn database leaked May 2016

tatys

5
I'm coming soon having surgery
  • Username: tatys
  • Threads: 123
  • Posts: 583
  • Likes: 11K
State
Threads
123
Posts
583
Likes
11K
Reputation
+2
Points
165
Credits
+2,487
Joined
In May 2016, LinkedIn had 164 million email addresses and passwords exposed. Originally hacked in 2012, the data remained out of sight until being offered for sale on a dark market site 4 years later. The passwords in the breach were stored as SHA1 hashes without salt, the vast majority of which were quickly cracked in the days following the release of the data.


 

Error404

4
Configmakers
  • Username: Error404
  • Threads: 3
  • Posts: 82
  • Likes: 5K
State
Threads
3
Posts
82
Likes
5K
Reputation
+2
Points
590
Credits
+0
Joined
Dont share the files available on public. File as corrupted , share if you have good file or delete this shit
 

HUNTER

1
Members
  • Username: HUNTER
  • Threads: 0
  • Posts: 58
  • Likes: 55
State
Threads
0
Posts
58
Likes
55
Reputation
None
Points
55
Credits
+140
Joined
In May 2016, LinkedIn had 164 million email addresses and passwords exposed. Originally hacked in 2012, the data remained out of sight until being offered for sale on a dark market site 4 years later. The passwords in the breach were stored as SHA1 hashes without salt, the vast majority of which were quickly cracked in the days following the release of the data.


*** Hidden text: cannot be quoted. ***
thank u very much
 
0 Likes

AlexCredy

2
Members
  • Username: AlexCredy
  • Threads: 0
  • Posts: 21
  • Likes: 25
State
Threads
0
Posts
21
Likes
25
Reputation
None
Points
160
Credits
+73
Joined
In May 2016, LinkedIn had 164 million email addresses and passwords exposed. Originally hacked in 2012, the data remained out of sight until being offered for sale on a dark market site 4 years later. The passwords in the breach were stored as SHA1 hashes without salt, the vast majority of which were quickly cracked in the days following the release of the data.


*** Hidden text: cannot be quoted. ***
Thanks for your share,, i want to get tnx. sir
 
0 Likes

AlexCredy

2
Members
  • Username: AlexCredy
  • Threads: 0
  • Posts: 21
  • Likes: 25
State
Threads
0
Posts
21
Likes
25
Reputation
None
Points
160
Credits
+73
Joined
In May 2016, LinkedIn had 164 million email addresses and passwords exposed. Originally hacked in 2012, the data remained out of sight until being offered for sale on a dark market site 4 years later. The passwords in the breach were stored as SHA1 hashes without salt, the vast majority of which were quickly cracked in the days following the release of the data.


*** Hidden text: cannot be quoted. ***
thanks for your share, i want to get a tnx sir..
 
0 Likes
Before replying a post ! Here at xreactor.org, we require high quality posts, so dont send short messages like "cool", "thanks", "lol", "ewqopdjks" or etc, otherwise you will be banned.