Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
November 22, 2019
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 237
Members: 0
Total: 237
PacketStorm News
Currently there is a problem with headlines from this site
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 21 matches
A few simple MD5s for your pleasure!
PostForum: MD5 hashes   Posted: Sat Mar 08, 2008 7:57 pm   Subject: A few simple MD5s for your pleasure!
Dorsk
 
Replies: 6
Views: 5709






Thanks for the input! I am at that rainbow tables site, and I am getting the 1-12_0 and 1-12_1... Now, I need both of these for the tables correct?
A few simple MD5s for your pleasure!
PostForum: MD5 hashes   Posted: Sat Mar 08, 2008 6:28 pm   Subject: A few simple MD5s for your pleasure!
Dorsk
 
Replies: 6
Views: 5709




Thank you very much guys!

Quick Question, I have a few really good password lists. but I would like to get more, anyone know if a good website to get more lists?
A few simple MD5s for your pleasure!
PostForum: MD5 hashes   Posted: Sat Mar 08, 2008 8:41 am   Subject: A few simple MD5s for your pleasure!
Dorsk
 
Replies: 6
Views: 5709




Hey all,

I have stumbled on some hashes that I need a little help on, so I decided to post them here. Let me know what you guys come up with. Many many thanks in advance.


5a318fc42dafc869fd3 ...
[Help] How to hack PHPBB 2.0.21
PostForum: PhpBB   Posted: Fri Mar 07, 2008 6:46 pm   Subject: [Help] How to hack PHPBB 2.0.21
Dorsk
 
Replies: 14
Views: 21228





Nope, you don't have attack vector, so you can't do anything useful.

This error message points to the fact, that webmaster was editing one of the template files and caused that error.

Thanks f ...
[Help] How to hack PHPBB 2.0.21
PostForum: PhpBB   Posted: Thu Mar 06, 2008 7:12 pm   Subject: [Help] How to hack PHPBB 2.0.21
Dorsk
 
Replies: 14
Views: 21228




I was looking through a forum and when I clicked on a user, then clicked on the "show all posts from this user" I got this (edited code for safety):


Parse error: syntax error, unexpected '&#1 ...
SMF section?
PostForum: Suggestions   Posted: Tue Sep 25, 2007 6:10 pm   Subject: SMF section?
Dorsk
 
Replies: 3
Views: 6471




waraxe,
I have a quick question about these exploits,
they say:
"user/bin/php" at the top of them.

How do you go about using them? (or a link to a how to,etc...)

I know how to use:
"user/bin ...
PasswordPro v.2.3.4.0
PostForum: Tools   Posted: Mon Sep 10, 2007 2:44 pm   Subject: PasswordPro v.2.3.4.0
Dorsk
 
Replies: 5
Views: 7478




I brut that type of hashes with JTR.This is normal MD5.I think the first option.

Thanks for the input koko,
I will try it. Very Happy
How to hack these forums
PostForum: PhpBB   Posted: Sun Sep 09, 2007 5:12 pm   Subject: How to hack these forums
Dorsk
 
Replies: 1
Views: 5286




Some really good exploits I have found use active perl.
Do a google search for it.

Once you install active perl, copy and paste a perl script into a text document.
Change the .txt to a .pl file
...
PasswordPro v.2.3.4.0
PostForum: Tools   Posted: Sun Sep 09, 2007 5:01 pm   Subject: PasswordPro v.2.3.4.0
Dorsk
 
Replies: 5
Views: 7478




Ya beat me to it! Haha, I got this program a few days ago, and I was going to post about it.

I did have a question about it, when I have a users name and hash in the inputs. Within the HASH drop ...
phpBB Links MOD 1.2.2 Remote SQL Injection Exploit
PostForum: PhpBB   Posted: Fri Sep 07, 2007 8:58 pm   Subject: phpBB Links MOD 1.2.2 Remote SQL Injection Exploit
Dorsk
 
Replies: 14
Views: 17811




Thanks waraxe,
I have a few PHPNUKE testing sites up with different NUKE versions, with PHPBB. I will try on there and if I get something, I will be sure to post it!
phpBB Links MOD 1.2.2 Remote SQL Injection Exploit
PostForum: PhpBB   Posted: Fri Sep 07, 2007 5:32 pm   Subject: phpBB Links MOD 1.2.2 Remote SQL Injection Exploit
Dorsk
 
Replies: 14
Views: 17811




Works! nice script!

Thanks waraxe!

EDIT---> What about a PHPNUKE website using PHPBB forums?

Would we try looking under the "/modules/forums/" folder? Also depending on where their foru ...
Virtual War v1.5 R15 help
PostForum: PhpNuke   Posted: Fri Sep 07, 2007 3:19 am   Subject: Virtual War v1.5 R15 help
Dorsk
 
Replies: 10
Views: 12476




Waraxe,
This is some very good finds! I will take a look at these and let you know if I find something that works!

Thanks!
Virtual War v1.5 R15 help
PostForum: PhpNuke   Posted: Mon Sep 03, 2007 5:34 pm   Subject: Virtual War v1.5 R15 help
Dorsk
 
Replies: 10
Views: 12476




no worries then. Haha, I will try another route. What other modules can I input script?

I do use the script for the search module. Any others that are good?
Virtual War v1.5 R15 help
PostForum: PhpNuke   Posted: Mon Sep 03, 2007 5:11 pm   Subject: Virtual War v1.5 R15 help
Dorsk
 
Replies: 10
Views: 12476




Seems to be problematic target. Maybe give up and select next target? Smile

Haha, it looks that way.

Unless you have any other ideas.

I stated above the PHPNUKE version and sentinal version.
...
Virtual War v1.5 R15 help
PostForum: PhpNuke   Posted: Mon Sep 03, 2007 4:40 pm   Subject: Virtual War v1.5 R15 help
Dorsk
 
Replies: 10
Views: 12476




Haha, wow, still the same 500 error. I did make sure everything was correct before I pressed "enter"
Page 1 of 2 Goto page 1, 2  Next
All times are GMT
  




Powered by phpBB 2001-2008 phpBB Group






All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2013 Janek Vind "waraxe"
Page Generation: 0.084 Seconds