Waraxe IT Security Portal
Login or Register
July 19, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 97
Members: 0
Total: 97
Full disclosure
Missing Critical Security Headers in OpenBlow
SAP NetWeaver S/4HANA - ABAP Code Execution via InternalFunction
Tiki Wiki CMS Groupware <= 28.3 Two Server-Side TemplateInjection Vulnerabilities
KL-001-2025-011: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Server-Side Request Forgery
KL-001-2025-010: Schneider Electric EcoStruxure IT Data Center Expert Privilege Escalation
KL-001-2025-009: Schneider Electric EcoStruxure IT Data Center Expert Remote Command Execution
KL-001-2025-008: Schneider Electric EcoStruxure IT Data Center Expert Root Password Discovery
KL-001-2025-007: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Remote Code Execution
KL-001-2025-006: Schneider Electric EcoStruxure IT Data Center Expert XML External Entities Injection
eSIM security research (GSMA eUICC compromise and certificatetheft)
Directory Traversal "Site Title" - bluditv3.16.2
XSS via SVG File Uploa - bluditv3.16.2
Stored XSS "Add New Content" Functionality - bluditv3.16.2
Session Fixation - bluditv3.16.2
iOS Activation Flaw Enables Pre-User Device Compromise andIdentity Exposure (iOS 18.5)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 65 matches
SHA1 hash
PostForum:All other hashes Posted: Mon Jan 19, 2009 6:53 pm Subject: SHA1 hash
oniric
Replies: 1
Views: 5890




No luck with this?
SHA1 hash
PostForum:All other hashes Posted: Fri Jan 16, 2009 11:46 am Subject: SHA1 hash
oniric
Replies: 1
Views: 5890




Hi guys, I have this SHA1 hash, hope someone can help me out! Thank you!

5dc1e6f2d3592722419704cb273f9f914edf3c3c

No salt.
MD5 Hash Question
PostForum:MD5 hashes Posted: Sat Aug 09, 2008 4:05 pm Subject: MD5 Hash Question
oniric
Replies: 10
Views: 16574




I tested the hash on my wordlists and I didn't find a collision..
MD5 Hash Question
PostForum:MD5 hashes Posted: Sat Aug 09, 2008 9:12 am Subject: MD5 Hash Question
oniric
Replies: 10
Views: 16574




You are using a Brute Force Attack, so you checking all the possible passwords in the key space generated by the character set of your choice and the desired range. Try first a dictionary attack? Do y ...
stuck in SQL injection
PostForum:Sql injection Posted: Fri Aug 08, 2008 9:40 pm Subject: stuck in SQL injection
oniric
Replies: 2
Views: 8948




This is also some good information.

http://www.webapptest.org/ms-access-sql-injection-cheat-sheet-EN.html
Can't find the number of columns!
PostForum:Sql injection Posted: Fri Aug 08, 2008 8:25 pm Subject: Can't find the number of columns!
oniric
Replies: 5
Views: 9565




Did you try n = 1?
Can't find the number of columns!
PostForum:Sql injection Posted: Fri Aug 08, 2008 6:43 pm Subject: Can't find the number of columns!
oniric
Replies: 5
Views: 9565




Try

news.php?id=409%20ORDER%20BY%20n%20--%20

and substitute n with a number. Try first n=4 and it this throws an error try n/2, if it doesn't give errors increment n. Using such a method you sho ...
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Fri Aug 08, 2008 2:48 pm Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 110383




I just download the same zip file and it's there Shocked
easy?
PostForum:Sql injection Posted: Fri Aug 08, 2008 12:36 pm Subject: easy?
oniric
Replies: 12
Views: 14985




So now you understand why I said it's necessary to be very creative ^_^ Also knowing javascript is extremely important!
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Fri Aug 08, 2008 12:31 pm Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 110383




Isn't it in the ext dir as I said?
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Fri Aug 08, 2008 11:10 am Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 110383




Look in you php ext dir for the file php_curl.dll ( I assume you use Windows ). If it's there then add to your php.ini the line

extension=php_curl.dll

The extension is included in php for window ...
MD5 Hash Question
PostForum:MD5 hashes Posted: Fri Aug 08, 2008 9:11 am Subject: MD5 Hash Question
oniric
Replies: 10
Views: 16574




Just looked more carefully at the screenshot and you put admin as the user name but you used the hash of another user.. Which are the two versions of SMF you attacked?
easy?
PostForum:Sql injection Posted: Thu Aug 07, 2008 9:19 pm Subject: easy?
oniric
Replies: 12
Views: 14985




Uch, it's a big big big big topic, believe me. You should read something about it. It's really interesting, and very very creative. I built a Javascript worm once, very funny indeed ^_^
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Thu Aug 07, 2008 9:12 pm Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 110383




You have to enable curl extension from you php.ini. Decomment the related line.
easy?
PostForum:Sql injection Posted: Thu Aug 07, 2008 8:12 pm Subject: easy?
oniric
Replies: 12
Views: 14985




Look at this:

http://securityreason.com/securityalert/4000

read carefullly. It's a bit elaborated.
Page 1 of 5 Goto page 1, 2, 3, 4, 5Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.124 Seconds