24-12-25, 05:57 PM
![[Image: zadazd.png]](https://bytetobreach.com/wp-content/uploads/2025/12/zadazd.png)
-
https://ibb.co/gMdBTLz5
https://ibb.co/k2Tksdwj
https://ibb.co/21P9xhh9
https://ibb.co/1tpF2JYf
https://ibb.co/G4D1JgMv
https://ibb.co/dswLwVcD
https://ibb.co/ZzXjDhjJ
https://ibb.co/xwJ1Zxg
https://ibb.co/VcvRrYzJ
https://ibb.co/35vTyffR
https://ibb.co/xthc5Mwy
https://ibb.co/20wR8nKB
https://ibb.co/zHS8Qm5x
--
Collection of data from IFX networks, emails, B2B clients, internal documents, local Ldap dumps and a client database, from both Colombia and Miami sections of the networks.
There is also a lot of hashes and credentials that were gathered as well, with a network map of the whole architecture. There was account taken for some services, like Forticloud and Sohpos Central, through quick password resets with the email service accounts.
Two of the main servers that i compromised as root user, one of which was a major relay for emails in Latin America, are still down at the time writing.
(zmxrelay.ifxnetworks.com - zmxcorprelay.ifxcorp.com)
IFX and Ufinet networks, this is not an ideal way to represent the region.
-
RECON: https://drive.google.com/file/d/1WfR0O6W...drive_link
EMAILS: https://drive.google.com/file/d/1SpGA64_...drive_link
CREDENTIALS: https://drive.google.com/file/d/1v9WixIb...drive_link
HASHES: https://drive.google.com/file/d/1lJo4xiP...drive_link
NETWORK_TABLE: https://drive.google.com/file/d/1e9lbG9q...drive_link
LDAP_FROM_POSTMAN: https://drive.google.com/file/d/1ZQJCncN...drive_link
LDIF: https://drive.google.com/file/d/1fheNCpu...drive_link
--
Session: 05c2db4775cb46350f16814dfe3bfa856664f315585653e4c368af08ce50b0c31b
Ricochet: vgrps2kcrwdlxr5zpnozdwtgnjgpxisftbomw5fiajtiom7tergp2kyd
Tox: 4CC9A8ECB047F1375824307E86ADA3A7DB205E76ED0BFB3EEE7398C4CCEB4C5794117C746508
Email : Bytetobreach@tuta.com / bytestobreach@tuta.com (With S)
Signal : @ByteToBreach.33
Telegram: @bytetobreach33
X: @ByteToBreach
--
PS: Prefer messages on Session / Signal.
