Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
September 19, 2020
 Members List
 IRC chat
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 Sql Char Encoder
 y3dips ITsec
 Md5 Cracker
 User Manuals
 Recommend Us
 Your Account

User Info
Welcome, Anonymous

Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 346
Members: 0
Total: 346
PacketStorm News
Currently there is a problem with headlines from this site
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 10 matches
phpnuke trojaned scripts.
PostForum: PhpNuke   Posted: Wed Jun 16, 2004 1:05 am   Subject: phpnuke trojaned scripts.
Replies: 3
Views: 5464

It seems someone has trojaned alot of phpnuke scripts about 6 months ago. It seems these trojans are still in the wild today. It seems like all you fuckers running phpnuke are fucking gimps. fish i ...
How secure is Cpanel?
PostForum: MySql   Posted: Wed Jun 16, 2004 12:59 am   Subject: How secure is Cpanel?
Replies: 11
Views: 14412

btw, these a-squad.com guys are retards. rm them with no remorse.
How secure is Cpanel?
PostForum: MySql   Posted: Wed Jun 16, 2004 12:55 am   Subject: How secure is Cpanel?
Replies: 11
Views: 14412

This is from <!--
# PROGRAM: cpanel.php
# AUTHORS: Rob Brown (rob@asquad.com)
# PURPOSE: Detect possible vulnerabilities
Few Questions about XSS
PostForum: Cross-site scripting aka XSS   Posted: Fri Jun 04, 2004 7:47 am   Subject: Few Questions about XSS
Replies: 5
Views: 7881

Dont forget that you dont need to put any real javascript on the website. You can use remote scripts by using the src= attribute in many different methods. Also, javascript is not the only language ...
How secure is Cpanel?
PostForum: MySql   Posted: Fri Jun 04, 2004 7:30 am   Subject: How secure is Cpanel?
Replies: 11
Views: 14412

There was a remote root vuln in cpanel. And I saw over 5 exploits for it in under a day. Many boxes were rooted that week. Cpanel has a simple to use update feature, which saved alot of admin's ass ...
Tutorials and whitepapers about cross-site scripting
PostForum: Cross-site scripting aka XSS   Posted: Mon May 31, 2004 6:52 am   Subject: Tutorials and whitepapers about cross-site scripting
Replies: 5
Views: 18067

Of all the xss papers out there you decide to link mine. Thanks I guess.

But this paper is very outdated. It was written in I think 2001, when xss was very new. XSS came out in 2000 I believe, i ...
secure nuke_authors
PostForum: Sql injection   Posted: Mon May 31, 2004 5:10 am   Subject: secure nuke_authors
Replies: 4
Views: 7087

/**/UN/**/ION will only work with some databases to evade this. mySQL treats /**/ as a field seporator. So this will not work.

as for the check. it is flawed as waraxe stated. Also, checking fo ...
What's bad about XSS?
PostForum: Cross-site scripting aka XSS   Posted: Mon May 31, 2004 4:51 am   Subject: What's bad about XSS?
Replies: 7
Views: 10226

here is post from text avaliable at There are almost unlimited ways javascript can be used to make an attack. For more ways look at the thread in bugtraq started on Mar 16 2002 by zeroboy@arrakis.es ...
Posion null byte TM
PostForum: All other security holes   Posted: Mon May 31, 2004 4:39 am   Subject: Posion null byte TM
Replies: 1
Views: 4774

Olaf Kirch came up with the term "poison null byte". RFP just used this term in his article.
Hackers/Crackers Mentality
PostForum: General discussion   Posted: Mon May 31, 2004 4:35 am   Subject: Hackers/Crackers Mentality
Replies: 5
Views: 7479

I think most hackers care more for shell access than admin access. Once they have this they might touch files which hold login, network, and command logs. They will probably also try to download exp ...
Page 1 of 1
All times are GMT

Powered by phpBB 2001-2008 phpBB Group

Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2020 Janek Vind "waraxe"
Page Generation: 0.060 Seconds