Waraxe IT Security Portal
Login or Register
July 3, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 55
Members: 0
Total: 55
Full disclosure
iOS Activation Flaw Enables Pre-User Device Compromise andIdentity Exposure (iOS 18.5)
Remote DoS in httpx 1.7.0 – Out-of-Bounds Read via Malformed <title> Tag
CVE-2025-32978 - Quest KACE SMA Unauthenticated LicenseReplacement
CVE-2025-32977 - Quest KACE Unauthenticated Backup Upload
CVE-2025-32976 - Quest KACE SMA 2FA Bypass
CVE-2025-32975 - Quest KACE SMA Authentication Bypass
RansomLord (NG v1.0) anti-ransomware exploit tool
Disclosure Yealink Cloud vulnerabilities
: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
SEC Consult SA-20250612-0 :: Reflected Cross-Site Scripting in ONLYOFFICE Docs (DocumentServer)
SEC Consult SA-20250611-0 :: Undocumented Root Shell Access on SIMCom SIM7600G Modem
Call for Applications: ERCIM STM WG 2025 Award for the Best Ph.D. Thesis on Security and Trust Management (July 31, 2025)
SEC Consult SA-20250604-0 :: Local Privilege Escalation and Default Credentials in INDAMED - MEDICAL OFFICE (Medical practice management) Demo version
Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Defense in depth -- the Microsoft way (part 89): user grouppolicies don't deserve tamper protection
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 275 matches
11 Computers...
PostForum:General discussion Posted: Fri Apr 30, 2010 9:41 pm Subject: 11 Computers...
lenny
Replies: 7
Views: 14688




Update:

Got the 7 evesham boxes up and running, apparently they run at 2.4GHz - a LOT heftier than the 1.4GHz that I expected! Still haven't got the 4 other machines working yet.

Currently tryin ...
11 Computers...
PostForum:General discussion Posted: Wed Apr 28, 2010 4:25 pm Subject: 11 Computers...
lenny
Replies: 7
Views: 14688




Ooooh, I like the SETI@home idea.... actually I'm tempted to put the free rainbow tables distributed cracker (http://www.freerainbowtables.com) on them... I think I'll set aside a machine as a server ...
11 Computers...
PostForum:General discussion Posted: Tue Apr 27, 2010 10:38 pm Subject: 11 Computers...
lenny
Replies: 7
Views: 14688




So I have recently come into possession of 11 computers. 7 of them are Evesham boxes (~1.4GHz, 256MB RAM) from around 2004, and 4 of them are from around 2006 (~1.6GHz, 256MB+ RAM).

I don't really ...
IP Restricted Page
PostForum:Newbies corner Posted: Sat Jan 02, 2010 5:09 pm Subject: IP Restricted Page
lenny
Replies: 2
Views: 8283




Well if you have a valid IP, then there should be no problems using it? Please remember that IP addresses are dynamically allocated by most ISPs, meaning your IP address will probably change day to da ...
Need Help to defend my FREEDOM !!!
PostForum:Invision Power Board Posted: Thu Dec 24, 2009 3:41 pm Subject: Need Help to defend my FREEDOM !!!
lenny
Replies: 2
Views: 11019




Under the Data Protection Act (1998) it is your right to control (to an extent) what data is stored about you, be it by a company or on a website. This is UK law, now I don't know if this actually app ...
How can i use this exploit?
PostForum:Sql injection Posted: Sun Dec 20, 2009 8:59 pm Subject: How can i use this exploit?
lenny
Replies: 5
Views: 10374




Copy and paste the "live demo" into your browser address bar, replacing site.com with the address of your target website.

If that works... and you still need more information, keep us posted on how ...
Some CTF
PostForum:Try2hack sites Posted: Sat Dec 19, 2009 7:42 pm Subject: Some CTF
lenny
Replies: 1
Views: 9990




Awsome stuff, thanks Smile
How to stop php shell scripts from vieweing files via web br
PostForum:How to fix Posted: Mon Dec 07, 2009 5:30 pm Subject: How to stop php shell scripts from vieweing files via web br
lenny
Replies: 3
Views: 14744




Well you can block certain commands/keywords in php.ini - That might help.

Take a look here:
http://www.cyberciti.biz/faq/linux-unix-apache-lighttpd-phpini-disable-functions/
Some General Questions About Rooting a Box
PostForum:General discussion Posted: Thu Nov 05, 2009 5:10 pm Subject: Some General Questions About Rooting a Box
lenny
Replies: 13
Views: 20999




By its very nature, hacking is illegal..... mostly. Sucks, but true.
Some General Questions About Rooting a Box
PostForum:General discussion Posted: Wed Nov 04, 2009 9:53 pm Subject: Some General Questions About Rooting a Box
lenny
Replies: 13
Views: 20999




Skill comes with experience, you could always try setting up like a test PC that you can hack (legally) to try an improve. Rooting a box can be quite hard, don't expect to be able to do it straight aw ...
Some General Questions About Rooting a Box
PostForum:General discussion Posted: Wed Nov 04, 2009 9:25 pm Subject: Some General Questions About Rooting a Box
lenny
Replies: 13
Views: 20999




To be honest, if you are careful with the exploits you use it can be pretty undetectable. I mean, if the system administrator has no reason to be suspicious of hackers... he/she is likely to go about ...
Some General Questions About Rooting a Box
PostForum:General discussion Posted: Wed Nov 04, 2009 8:07 pm Subject: Some General Questions About Rooting a Box
lenny
Replies: 13
Views: 20999




Remember - a log cleaner only gets rid of tracks that you have already made. Your IP address will probably be somwhere in a log file, you cant keep totally clean. If you get caught, its a criminal off ...
How to send modified data to javascript page?
PostForum:General discussion Posted: Wed Oct 28, 2009 2:47 pm Subject: How to send modified data to javascript page?
lenny
Replies: 2
Views: 12980




Ok, I suggest you download "tamper data" - A plugin for Firefox. When you submit the page, a request is probably generated (AJAX or otherwise) and submitted to another part of the site (a php script f ...
What is symlink tools
PostForum:Newbies corner Posted: Wed Sep 02, 2009 12:06 pm Subject: What is symlink tools
lenny
Replies: 2
Views: 10402




To be honest I have no idea - Obviously a symlink is a "symbolic link" that points one file or directory to another....

I am interested now, anybody else have information?
Need heclp foroactivo.com
PostForum:PhpBB Posted: Tue Aug 25, 2009 11:07 am Subject: Need heclp foroactivo.com
lenny
Replies: 1
Views: 8438




Im afraid thats going to be difficult - try talking to your host again, they just don't want to lose your business!
Page 1 of 19 Goto page 1, 2, 3 ... 17, 18, 19Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.038 Seconds