Waraxe IT Security Portal
Login or Register
July 5, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 383
Members: 0
Total: 383
Full disclosure
iOS Activation Flaw Enables Pre-User Device Compromise andIdentity Exposure (iOS 18.5)
Remote DoS in httpx 1.7.0 – Out-of-Bounds Read via Malformed <title> Tag
CVE-2025-32978 - Quest KACE SMA Unauthenticated LicenseReplacement
CVE-2025-32977 - Quest KACE Unauthenticated Backup Upload
CVE-2025-32976 - Quest KACE SMA 2FA Bypass
CVE-2025-32975 - Quest KACE SMA Authentication Bypass
RansomLord (NG v1.0) anti-ransomware exploit tool
Disclosure Yealink Cloud vulnerabilities
: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
SEC Consult SA-20250612-0 :: Reflected Cross-Site Scripting in ONLYOFFICE Docs (DocumentServer)
SEC Consult SA-20250611-0 :: Undocumented Root Shell Access on SIMCom SIM7600G Modem
Call for Applications: ERCIM STM WG 2025 Award for the Best Ph.D. Thesis on Security and Trust Management (July 31, 2025)
SEC Consult SA-20250604-0 :: Local Privilege Escalation and Default Credentials in INDAMED - MEDICAL OFFICE (Medical practice management) Demo version
Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Defense in depth -- the Microsoft way (part 89): user grouppolicies don't deserve tamper protection
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 65 matches
SHA1 hash
PostForum:All other hashes Posted: Mon Jan 19, 2009 6:53 pm Subject: SHA1 hash
oniric
Replies: 1
Views: 5874




No luck with this?
SHA1 hash
PostForum:All other hashes Posted: Fri Jan 16, 2009 11:46 am Subject: SHA1 hash
oniric
Replies: 1
Views: 5874




Hi guys, I have this SHA1 hash, hope someone can help me out! Thank you!

5dc1e6f2d3592722419704cb273f9f914edf3c3c

No salt.
MD5 Hash Question
PostForum:MD5 hashes Posted: Sat Aug 09, 2008 4:05 pm Subject: MD5 Hash Question
oniric
Replies: 10
Views: 16503




I tested the hash on my wordlists and I didn't find a collision..
MD5 Hash Question
PostForum:MD5 hashes Posted: Sat Aug 09, 2008 9:12 am Subject: MD5 Hash Question
oniric
Replies: 10
Views: 16503




You are using a Brute Force Attack, so you checking all the possible passwords in the key space generated by the character set of your choice and the desired range. Try first a dictionary attack? Do y ...
stuck in SQL injection
PostForum:Sql injection Posted: Fri Aug 08, 2008 9:40 pm Subject: stuck in SQL injection
oniric
Replies: 2
Views: 8919




This is also some good information.

http://www.webapptest.org/ms-access-sql-injection-cheat-sheet-EN.html
Can't find the number of columns!
PostForum:Sql injection Posted: Fri Aug 08, 2008 8:25 pm Subject: Can't find the number of columns!
oniric
Replies: 5
Views: 9521




Did you try n = 1?
Can't find the number of columns!
PostForum:Sql injection Posted: Fri Aug 08, 2008 6:43 pm Subject: Can't find the number of columns!
oniric
Replies: 5
Views: 9521




Try

news.php?id=409%20ORDER%20BY%20n%20--%20

and substitute n with a number. Try first n=4 and it this throws an error try n/2, if it doesn't give errors increment n. Using such a method you sho ...
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Fri Aug 08, 2008 2:48 pm Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 110247




I just download the same zip file and it's there Shocked
easy?
PostForum:Sql injection Posted: Fri Aug 08, 2008 12:36 pm Subject: easy?
oniric
Replies: 12
Views: 14908




So now you understand why I said it's necessary to be very creative ^_^ Also knowing javascript is extremely important!
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Fri Aug 08, 2008 12:31 pm Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 110247




Isn't it in the ext dir as I said?
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Fri Aug 08, 2008 11:10 am Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 110247




Look in you php ext dir for the file php_curl.dll ( I assume you use Windows ). If it's there then add to your php.ini the line

extension=php_curl.dll

The extension is included in php for window ...
MD5 Hash Question
PostForum:MD5 hashes Posted: Fri Aug 08, 2008 9:11 am Subject: MD5 Hash Question
oniric
Replies: 10
Views: 16503




Just looked more carefully at the screenshot and you put admin as the user name but you used the hash of another user.. Which are the two versions of SMF you attacked?
easy?
PostForum:Sql injection Posted: Thu Aug 07, 2008 9:19 pm Subject: easy?
oniric
Replies: 12
Views: 14908




Uch, it's a big big big big topic, believe me. You should read something about it. It's really interesting, and very very creative. I built a Javascript worm once, very funny indeed ^_^
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Thu Aug 07, 2008 9:12 pm Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 110247




You have to enable curl extension from you php.ini. Decomment the related line.
easy?
PostForum:Sql injection Posted: Thu Aug 07, 2008 8:12 pm Subject: easy?
oniric
Replies: 12
Views: 14908




Look at this:

http://securityreason.com/securityalert/4000

read carefullly. It's a bit elaborated.
Page 1 of 5 Goto page 1, 2, 3, 4, 5Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.030 Seconds