Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
November 23, 2014
 Members List
 IRC chat
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 Sql Char Encoder
 y3dips ITsec
 Md5 Cracker
 User Manuals
 Recommend Us
 Your Account

User Info
Welcome, Anonymous

Latest: wilson_ch
New Today: 0
New Yesterday: 0
Overall: 8957

People Online:
Visitors: 153
Members: 0
Total: 153
·[web applications] - Wordpress InfusionSoft Upload Exploit
·[remote exploits] - Rejetto HttpFileServer Remote Command Execution Exploit
·[remote exploits] - F5 iControl Remote Root Command Execution Exploit
·[web applications] - Nessus Web UI 2.3.3 Cross Site Scripting Vulnerability
·[web applications] - WordPress Backup plugin Ready! Arbitrary File Download Vulnerability
·[local exploits] - Asx to Mp3 2.7.5 - Stack Overflow Exploit
·[remote exploits] - XAMPP 1.8.x Multiple Vulnerabilities
·[web applications] - ZyXEL SBG-3300 Security Gateway Denial Of Service Vulnerability
·[web applications] - ZyXEL SBG-3300 Security Gateway Cross Site Scripting Vulnerability
·[remote exploits] - Ultra Electronics SSL VPN / SQL Injection / Directory Creation

PacketStorm News
·HP Security Bulletin HPSBGN03108
·HP Security Bulletin HPSBMU03118 2
·Ubuntu Security Notice USN-2371-1
·Ubuntu Security Notice USN-2370-1
·SAP Business Warehouse Missing Authorization Check
·SAP HANA Web-based Development Workbench Code Injection
·SAP BusinessObjects Persistent Cross Site Scripting
·SAP Business Objects Information Disclosure Via CORBA
·SAP HANA Reflective Cross Site Scripting
·SAP Business Objects Denial Of Service Via CORBA

Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Sql injection -> Find a salt
Post new topic  Reply to topic View previous topic :: View next topic 
Find a salt
PostPosted: Mon Jan 23, 2012 11:36 pm Reply with quote
Regular user
Regular user
Joined: Oct 26, 2011
Posts: 5

I seed a salt in a DB, but doesn't find it. Dumped in over 800+ hashes.


Taget: hxxp://www.silikonbabe.se/index.php?id=227 (vuln: SQLi)

(use == protection) {} else fucked();

Can anyone help me with it? Twisted Evil
View user's profile Send private message
PostPosted: Wed Jan 25, 2012 11:13 pm Reply with quote
Joined: Jan 26, 2012
Posts: 2

hash : passwd
505f525105add741524025914cf79fcc : 8995
856993c79ec04b6864bf4e2b3dad1509 : 76ytr

Salted MD5. Unknown Algorithm behind.

Find the Salt.
Figure the Algorithm.
comapre salts: static? random? or based on a DB_Data?

What do you think?

*Do not judge me on my posts or signup date*
*Judge me because of my knowledge*
View user's profile Send private message
Find a salt
  www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

 Post new topic  Reply to topic  

Powered by phpBB 2001-2008 phpBB Group

ATI Radeon reviews
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2013 Janek Vind "waraxe"
Page Generation: 0.079 Seconds