Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
November 18, 2019
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 387
Members: 0
Total: 387
PacketStorm News
Currently there is a problem with headlines from this site
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 2418 matches
Htpasswd
PostForum: All other hashes   Posted: Thu Jan 02, 2014 3:18 pm   Subject: Re: Htpasswd
waraxe
 
Replies: 2
Views: 5085




Hello guys,

Can I ask you for favor, I need to crack one password from .htpasswd file.

fogxFDgIY8ZMY

Thank you

Plaintext of fogxFDgIY8ZMY is edindzek
Previously unseen PHP encoding, a challenge!
PostForum: PHP script decode requests   Posted: Thu Dec 19, 2013 4:51 pm   Subject: Previously unseen PHP encoding, a challenge!
waraxe
 
Replies: 2
Views: 4638




Just replace "eval" with "print" Smile


function check_serial_valid() {
$host = $_SERVER['HTTP_HOST'];

if (preg_match("/^(www.)(.*)/si", ...
please crack 8 vb hashes
PostForum: PHP script decode requests   Posted: Thu Dec 20, 2012 12:22 pm   Subject: please crack 8 vb hashes
waraxe
 
Replies: 1
Views: 3379




Plaintext of 035b34234885be8be1bf2639c055532d is jrpx7v2
Plaintext of c4371440330ab7a298802624773d871a is mqd8eq
Plaintext of 7c01e86a2dc31e5cc9027f7f5e899b02 is !barbecue
Plaintext of 1a21e33e3d31 ...
How to Decode /xhh
PostForum: Newbies corner   Posted: Fri Dec 07, 2012 4:29 pm   Subject: How to Decode /xhh
waraxe
 
Replies: 2
Views: 6551




Best solution would be specially written php script for decoding, but here is quick method:

1. use text editor ( like Notepad++) and do search/replace
Search for \x and replace with %
2. Use onli ...
hashes but not sure what, i guess mysql
PostForum: All other hashes   Posted: Fri Dec 07, 2012 2:56 pm   Subject: Re: hashes but not sure what, i guess mysql
waraxe
 
Replies: 2
Views: 3505




anyone who is able to decrypt this, i have tried it several times but failed,

so giving this challenge to the forum since i saw ya guys did it before with hashes thanks

3a135b16102e7b43
3e6656 ...
Ipboard 3.3.0 lfi exploit
PostForum: Newbies corner   Posted: Tue Sep 18, 2012 11:15 am   Subject: Ipboard 3.3.0 lfi exploit
waraxe
 
Replies: 5
Views: 10808




According to php version it may be possible to use null bytes.
Now there is one thing, that makes exploitation little bit harder - we need
base64 encoder, which does accept null bytes. Online encod ...
Ipboard 3.3.0 lfi exploit
PostForum: Newbies corner   Posted: Sun Sep 16, 2012 3:47 pm   Subject: Ipboard 3.3.0 lfi exploit
waraxe
 
Replies: 5
Views: 10808




First of all, there are preconditions listed in advisory:

Preconditions:
1. attacker must be logged in as valid user
2. PHP must be < 5.3.4 for null-byte attacks to work

If you want to use ...
Ipboard 3.3.0 lfi exploit
PostForum: Newbies corner   Posted: Fri Sep 14, 2012 8:13 pm   Subject: Ipboard 3.3.0 lfi exploit
waraxe
 
Replies: 5
Views: 10808




You can find many tutorials about exploiting LFI via "/proc/self/environ" and uploaded gif/jpg pictures, for example:

https://bechtsoudis.com/hacking/php-code-into-jpeg-metadata-from-hide-to-unhide ...
LM and NTLM Hash Decryption
PostForum: All other hashes   Posted: Fri Apr 27, 2012 2:00 pm   Subject: Re: LM and NTLM Hash Decryption
waraxe
 
Replies: 4
Views: 6376




Kindly hack this LM and NTLM hash. Thank you.

LM Hash : 2fd901f1686492e7ab28d4c7aab1ea45

NTLM Hash : 5340f1e408a802a35b69de7b4083a2ce

Plaintext of 5340F1E408A802A35B69DE7B4083A2CE is ...
[waraxe-2012-SA#085] - XSS in Uploadify Integratiotion
PostForum: All other software   Posted: Sat Apr 07, 2012 10:32 am   Subject: [waraxe-2012-SA#085] - XSS in Uploadify Integratiotion
waraxe
 
Replies: 0
Views: 4437




------------------------------------
[waraxe-2012-SA#084] - Vulnerabilities in OpenCart 1.5.2.1
PostForum: All other software   Posted: Sat Apr 07, 2012 10:30 am   Subject: [waraxe-2012-SA#084] - Vulnerabilities in OpenCart 1.5.2.1
waraxe
 
Replies: 0
Views: 5666




---------------------------------
// Router
if (isset($request->get---------------------------------
final class Action {
protected $file;
...
public function __construct($route, $args = ar ...
[waraxe-2012-SA#083] - Vulnerabilities in Uploadify 2.1.4
PostForum: All other software   Posted: Sat Apr 07, 2012 10:28 am   Subject: [waraxe-2012-SA#083] - Vulnerabilities in Uploadify 2.1.4
waraxe
 
Replies: 0
Views: 3922




---------------------------------
if (!empty($_FILES)) {
$tempFile = $_FILES-----------------------------------
<html><body><center>
<form action="http://localhost/uploadify-v ...
[waraxe-2012-SA#082] - Vulnerabilities in Uploadify 3.0.0
PostForum: All other software   Posted: Sat Apr 07, 2012 10:27 am   Subject: [waraxe-2012-SA#082] - Vulnerabilities in Uploadify 3.0.0
waraxe
 
Replies: 0
Views: 4126




---------------------------------
if (file_exists($_SERVER-----------------------------------
<html><body><center>
<form action="http://localhost/uploadify-v3.0.0/uploadify-che ...
my friends why no one give me help
PostForum: Sql injection   Posted: Fri Apr 06, 2012 11:02 pm   Subject: my friends why no one give me help
waraxe
 
Replies: 2
Views: 5728




Bypassing IPS/IDS needs advanced skills and lot's of testing and thinking.
And if you find for example a way to fool mod_security anti-sql-injection filter, then you have 0-day information, which wil ...
need help about MYSQL version 4
PostForum: Sql injection   Posted: Thu Mar 29, 2012 6:32 pm   Subject: need help about MYSQL version 4
waraxe
 
Replies: 1
Views: 5209




There is no easy way to this.
You can try educated guess or wordlist/bruteforce methods.
And analyze target website html form source code - POST parameters naming tends to correlate with SQL databas ...
Page 1 of 162 Goto page 1, 2, 3 ... 160, 161, 162  Next
All times are GMT
  




Powered by phpBB 2001-2008 phpBB Group






All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2013 Janek Vind "waraxe"
Page Generation: 0.108 Seconds