Waraxe IT Security Portal
Login or Register
July 27, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 178
Members: 0
Total: 178
Full disclosure
CyberDanube Security Research 20240722-0 | Multiple Vulnerabilities in Perten/PerkinElmer ProcessPlus
[KIS-2024-06] XenForo <= 2.2.15 (Template System) Remote Code Execution Vulnerability
[KIS-2024-05] XenForo <= 2.2.15 (Widget::actionSave) Cross-Site Request Forgery Vulnerability
CVE-2024-33326
CVE-2024-33327
CVE-2024-33328
CVE-2024-33329
CyberDanube Security Research 20240703-0 | Authenticated Command Injection in Helmholz Industrial Router REX100
SEC Consult SA-20240627-0 :: Local Privilege Escalation via MSI installer in SoftMaker Office / FreeOffice
SEC Consult SA-20240626-0 :: Multiple Vulnerabilities in Siemens Power Automation Products
Novel DoS Vulnerability Affecting WebRTC Media Servers
APPLE-SA-06-25-2024-1 AirPods Firmware Update 6A326, AirPods Firmware Update 6F8, and Beats Firmware Update 6F8
40 vulnerabilities in Toshiba Multi-Function Printers
17 vulnerabilities in Sharp Multi-Function Printers
SEC Consult SA-20240624-0 :: Multiple Vulnerabilities allowing complete bypass in Faronics WINSelect (Standard + Enterprise)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 65 matches
SHA1 hash
PostForum:All other hashes Posted: Mon Jan 19, 2009 6:53 pm Subject: SHA1 hash
oniric
Replies: 1
Views: 5035




No luck with this?
SHA1 hash
PostForum:All other hashes Posted: Fri Jan 16, 2009 11:46 am Subject: SHA1 hash
oniric
Replies: 1
Views: 5035




Hi guys, I have this SHA1 hash, hope someone can help me out! Thank you!

5dc1e6f2d3592722419704cb273f9f914edf3c3c

No salt.
MD5 Hash Question
PostForum:MD5 hashes Posted: Sat Aug 09, 2008 4:05 pm Subject: MD5 Hash Question
oniric
Replies: 10
Views: 13218




I tested the hash on my wordlists and I didn't find a collision..
MD5 Hash Question
PostForum:MD5 hashes Posted: Sat Aug 09, 2008 9:12 am Subject: MD5 Hash Question
oniric
Replies: 10
Views: 13218




You are using a Brute Force Attack, so you checking all the possible passwords in the key space generated by the character set of your choice and the desired range. Try first a dictionary attack? Do y ...
stuck in SQL injection
PostForum:Sql injection Posted: Fri Aug 08, 2008 9:40 pm Subject: stuck in SQL injection
oniric
Replies: 2
Views: 7982




This is also some good information.

http://www.webapptest.org/ms-access-sql-injection-cheat-sheet-EN.html
Can't find the number of columns!
PostForum:Sql injection Posted: Fri Aug 08, 2008 8:25 pm Subject: Can't find the number of columns!
oniric
Replies: 5
Views: 8278




Did you try n = 1?
Can't find the number of columns!
PostForum:Sql injection Posted: Fri Aug 08, 2008 6:43 pm Subject: Can't find the number of columns!
oniric
Replies: 5
Views: 8278




Try

news.php?id=409%20ORDER%20BY%20n%20--%20

and substitute n with a number. Try first n=4 and it this throws an error try n/2, if it doesn't give errors increment n. Using such a method you sho ...
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Fri Aug 08, 2008 2:48 pm Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 82564




I just download the same zip file and it's there Shocked
easy?
PostForum:Sql injection Posted: Fri Aug 08, 2008 12:36 pm Subject: easy?
oniric
Replies: 12
Views: 13039




So now you understand why I said it's necessary to be very creative ^_^ Also knowing javascript is extremely important!
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Fri Aug 08, 2008 12:31 pm Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 82564




Isn't it in the ext dir as I said?
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Fri Aug 08, 2008 11:10 am Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 82564




Look in you php ext dir for the file php_curl.dll ( I assume you use Windows ). If it's there then add to your php.ini the line

extension=php_curl.dll

The extension is included in php for window ...
MD5 Hash Question
PostForum:MD5 hashes Posted: Fri Aug 08, 2008 9:11 am Subject: MD5 Hash Question
oniric
Replies: 10
Views: 13218




Just looked more carefully at the screenshot and you put admin as the user name but you used the hash of another user.. Which are the two versions of SMF you attacked?
easy?
PostForum:Sql injection Posted: Thu Aug 07, 2008 9:19 pm Subject: easy?
oniric
Replies: 12
Views: 13039




Uch, it's a big big big big topic, believe me. You should read something about it. It's really interesting, and very very creative. I built a Javascript worm once, very funny indeed ^_^
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Thu Aug 07, 2008 9:12 pm Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 82564




You have to enable curl extension from you php.ini. Decomment the related line.
easy?
PostForum:Sql injection Posted: Thu Aug 07, 2008 8:12 pm Subject: easy?
oniric
Replies: 12
Views: 13039




Look at this:

http://securityreason.com/securityalert/4000

read carefullly. It's a bit elaborated.
Page 1 of 5 Goto page 1, 2, 3, 4, 5Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.430 Seconds