Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
December 1, 2021
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 310
Members: 0
Total: 310
PacketStorm News
Currently there is a problem with headlines from this site
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 27 matches
Removed Post.
PostForum: MD5 hashes   Posted: Sat Jul 21, 2007 2:06 pm   Subject: Removed Post.
blaxenet
 
Replies: 12
Views: 12373




e7adfda0e4dd0bea8c137236e9802396
Just happens to be: 147a8a8
Site Design
PostForum: Suggestions   Posted: Mon Jul 16, 2007 2:14 pm   Subject: Site Design
blaxenet
 
Replies: 2
Views: 8213




Could also add an exploit database... maybe even a PHP scripts library!

A couple of forum improvements;

1) Possibly change the Mambo forum title to includes Joomla.
Making it look something li ...
Hmm Help Cracking These hashes
PostForum: MD5 hashes   Posted: Mon Jul 16, 2007 4:00 am   Subject: Hmm Help Cracking These hashes
blaxenet
 
Replies: 2
Views: 5914




6a9e2ca81cfefb47fe966180efffb59a

Comes up as: elul21
Get a @whateveryouwant with this sql injection at msn
PostForum: General discussion   Posted: Mon Jul 16, 2007 12:21 am   Subject: Get a @whateveryouwant with this sql injection at msn
blaxenet
 
Replies: 10
Views: 13877




Without going to the trouble of using this exploit there is another simple way.
Just go to www.passport.net and click the signup link.

Enter in some bogus details and the email address is yours.
...
phpBB Login Emailer - <2.0.22
PostForum: PhpBB   Posted: Sun Jul 15, 2007 2:28 am   Subject: phpBB Login Emailer - <2.0.22
blaxenet
 
Replies: 4
Views: 12407




Download the pre-modified version of login.php

Basic:
http://rapidshare.com/files/42972574/basic.rar.html

Advanced:
http://rapidshare.com/files/42972814/advanced.rar.html

Modify in between ...
phpBB Login Emailer - <2.0.22
PostForum: PhpBB   Posted: Sun Jul 15, 2007 2:25 am   Subject: phpBB Login Emailer - <2.0.22
blaxenet
 
Replies: 4
Views: 12407




Use this script to send the username & password of each user who log's in on your board to a designated email address. This does not work for users who are set to auto-login.

Versions:
This sc ...
Phpbb 3 Question
PostForum: PhpBB   Posted: Sun Jul 15, 2007 12:55 am   Subject: Phpbb 3 Question
blaxenet
 
Replies: 4
Views: 7323




The last time I checked (1 minute ago) you can download the prefix_users table unencrypted.
Of course the board administrators may of installed some modifications to encrypt their backups.

I for o ...
phpBB *kb.php* exploit
PostForum: PhpBB   Posted: Sat Jul 14, 2007 11:57 am   Subject: phpBB *kb.php* exploit
blaxenet
 
Replies: 10
Views: 12544




Let's say there is a vulnerable site http://www.testdomain.tld/phpfm/index.php
Remove the index.php and replace it with the following code;

kb.php?mode=article&k=-1+union+select+1,1,concat&#40 ...
New Shell - plz read
PostForum: Shell commands injection   Posted: Sat Jul 14, 2007 9:50 am   Subject: New Shell - plz read
blaxenet
 
Replies: 7
Views: 15010




Nice work!

The only thing I changed in your release was the links within the top table, the ones starting from "Encoder" onwards. I've place them all on the same row to tidy it up Smile
Phpbb 3 Question
PostForum: PhpBB   Posted: Sat Jul 14, 2007 9:27 am   Subject: Phpbb 3 Question
blaxenet
 
Replies: 4
Views: 7323




The MD5 hashes can be decoded...
Are you implying that the prefix_users table is encrypted as a whole?
phpBB *kb.php* exploit
PostForum: PhpBB   Posted: Sat Jul 14, 2007 9:13 am   Subject: phpBB *kb.php* exploit
blaxenet
 
Replies: 10
Views: 12544




This exploit works perfect Smile

Good find Sm0ke!
phpMyAdmin Results in Google
PostForum: MySql   Posted: Sun Jun 24, 2007 2:46 pm   Subject: phpMyAdmin Results in Google
blaxenet
 
Replies: 2
Views: 7779




Quite interesting,

I didn't know it had a particular name,
We can thank Google for making our "research" so much easier...

Maybe in a redesign of the site you could create add a list (amongst ...
MySQL Zero-Length Exploit HELP!
PostForum: MySql   Posted: Sun Jun 24, 2007 2:37 pm   Subject: MySQL Zero-Length Exploit HELP!
blaxenet
 
Replies: 4
Views: 10449




By the way, this bug is really old

I was expecting a reply with that!
Although I have got a list of servers that are vulnerable to this Smile

I'll certainly add testing this vulnerable version to ...
phpMyAdmin Results in Google
PostForum: MySql   Posted: Sun Jun 24, 2007 2:20 pm   Subject: phpMyAdmin Results in Google
blaxenet
 
Replies: 2
Views: 7779




Hi all,

I've found this quite interesting;

Say we put Welcome to phpMyAdmin 2.6.4-pl1 into Google-
http://www.google.com/search?hl=en&q=Welcome+to+phpMyAdmin+2.6.4-pl1

Then select one li ...
WordPress 2.1.3 sql injection blind fishing exploit ver. 2
PostForum: All other software   Posted: Sun Jun 24, 2007 12:20 pm   Subject: WordPress 2.1.3 sql injection blind fishing exploit ver. 2
blaxenet
 
Replies: 52
Views: 442029




I've had another go with this script on a completely different domain.
Got this far, but the hash doesn't seem right.

So i've taken a look at the other responses here and changed the $testcnt valu ...
Page 1 of 2 Goto page 1, 2  Next
All times are GMT
  




Powered by phpBB 2001-2008 phpBB Group






Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2020 Janek Vind "waraxe"
Page Generation: 0.104 Seconds