Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
April 20, 2024
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 584
Members: 0
Total: 584
PacketStorm News
·301 Moved Permanently

read more...
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 11 matches
Exploits in phpBB 2.0.16
PostForum: PhpBB   Posted: Thu Apr 20, 2006 1:23 am   Subject: Exploits in phpBB 2.0.16
Indiction
 
Replies: 22
Views: 34966




Ok. So basically, you are logged in as the admin but you cannot reauth.

Realize now that you can still access the user CP...but in a weird way.
Every command must be issued via POST arguements thr ...
[Help] How these codes work !!!
PostForum: PhpBB   Posted: Mon Apr 17, 2006 1:40 am   Subject: [Help] How these codes work !!!
Indiction
 
Replies: 15
Views: 20797




Download the Windows MSI installer and run it.
Question about XSS Remote Cookie Disclosure Exploiting
PostForum: PhpBB   Posted: Sat Apr 15, 2006 10:08 pm   Subject: Re: Question about XSS Remote Cookie Disclosure Exploiting
Indiction
 
Replies: 4
Views: 8283




\"205340551044400583937258.37903461\"

I think this is supposed to by the hash, but why is it a floating point number?

There is a way to get around relogging in admin CP you know with just the SI ...
I need SQL Injection Exploit tool
PostForum: Sql injection   Posted: Sat Apr 15, 2006 10:02 pm   Subject: I need SQL Injection Exploit tool
Indiction
 
Replies: 6
Views: 14829




basic perl script for injection


#!/etc/bin/perl
# replace this line with #!C:\Perl\bin\perl on a Windows system
# provided AS-IS, no warranty, expressed or implied
# this program is comple ...
[Help] How these codes work !!!
PostForum: PhpBB   Posted: Sat Apr 15, 2006 9:39 pm   Subject: [Help] How these codes work !!!
Indiction
 
Replies: 15
Views: 20797




lol.

So basically when you submit a form, thats where an SQL injection goes. If index.php accepts an unsanatized arguement sid, then you type in

http://victim.haxme.com/directory/index.php?sid=U ...
Ok, i can login as an admin, but
PostForum: PhpBB   Posted: Fri Apr 14, 2006 8:25 pm   Subject: Ok, i can login as an admin, but
Indiction
 
Replies: 8
Views: 14065




Backup and store the database. It will probably be useful later.

Look for bugs in mods too, like EasyMOD which will let you write a modification and pretty much will let you, with a well written PH ...
A little help
PostForum: PhpBB   Posted: Thu Apr 13, 2006 3:48 am   Subject: A little help
Indiction
 
Replies: 1
Views: 6127




There are a lot of exploits for that version. Search on the web for some.
...I can't believe I'm doing this.
PostForum: Newbies corner   Posted: Thu Apr 13, 2006 3:32 am   Subject: ...I can't believe I'm doing this.
Indiction
 
Replies: 4
Views: 8976




I would recommend reading up on SQL injection;

http://www.google.com/search?q=SQL+injection

As well as learn some PHP;

http://www.google.com/search?q=PHP+tutorial

And some Perl;

http:// ...
Salt+md5 --> md5 --> plain text?
PostForum: Newbies corner   Posted: Thu Apr 13, 2006 3:24 am   Subject: Salt+md5 --> md5 --> plain text?
Indiction
 
Replies: 5
Views: 9943




Yes, you can crack salted hashes but its much harder.

First you must cryptanalyze the MD5 hash and determine its reverse. Now bear in mind that a salted md5 function is as follows:

md5(x ? c)
...
A lot of the md5 are uncrackables!!!!
PostForum: PhpBB   Posted: Wed Apr 12, 2006 10:13 pm   Subject: A lot of the md5 are uncrackables!!!!
Indiction
 
Replies: 6
Views: 10356




Basically if there is a salt, you cannot remove it at the MD5 step.

First you will have to know what the salt is. If the salt is say md(x+5), then you must first reverse the hash through bruteforci ...
EasyMOD decryption
PostForum: PhpBB   Posted: Wed Apr 12, 2006 7:33 pm   Subject: EasyMOD decryption
Indiction
 
Replies: 0
Views: 5649




I've been working on EasyMOD for phpBB, but I have'nt been able to reverse the blowfish encrypted FTP password. When I try it on a localhost setup, the password

"?‹rb%þ?Šy`4NUTTICK?&#8 ...
Page 1 of 1
All times are GMT
  




Powered by phpBB © 2001-2008 phpBB Group






Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2020 Janek Vind "waraxe"
Page Generation: 0.185 Seconds