 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 361
Members: 0
Total: 361
|
|
|
|
|
 |
Full disclosure |
 |
Google Firebase hosting suspension / "malware distribution"bypass
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
scan the target with [url=http://nmap.org]NMap |
|
|
|
|
one more
Hash: a12005acdf209bd758fa4a77819f7c12
Salt: cR)5[ |
|
|
|
|
Password:hash
3507a8fb7b21b76c71e7ac8a38406c3c:yyk3f
53cf57f120badd35385e9949068d13a6:["UO^
7ecc6fb872dae1835493bca0885d6646:moV(g
take a shot  |
|
|
|
|
and what exactly should I do with this md5 and salt? Just tell us what method tou use to decode it  |
|
|
|
|
try attacking some of the server applications which are installed |
|
|
|
|
if someone could make me one for ipb 3 it would be much appreciated. I would be willing to pay out some money if it works...
check ur pm |
|
|
|
|
Please try to decrypt these:
4a76cc5c5b565f0dda3ede448f49628b:38cBj
b330584d3119d5f4ff431dcef6566a62:_h1N0
2b8765d8ce66ecb1b4f8bcfa5bc99572:Sh2wz
6632eccfdcd035998e354a8e714cfff1:1PT_-
PA ... |
|
|
|
|
just a vulnerability.... But I think you have to be moderator to use it... |
|
|
|
|
I have only found that http://inj3ct0r.com/exploits/10083 but it's not very usefull.. |
|
|
|
|
I'm having difficulties with some hashes again.... Appretiate any help
DES:
Kow9wUEZH2sfk
O6FZHiACUbd6g
l6QwFl2vPmCZI
uT6BdQYcdIYgc
MD5(UNIX)
$1$MRhRRnRM$63p8KqeC27SMElyeSZu9N1
$1$oU ... |
|
|
|
|
make .htaccess file and ban their IPs
try to r00t the server and delete their home dir or something...
 |
|
|
|
|
I didn't understand one thing - what is the IRC server for? |
|
|
|
|
I wasn't root admin so I changed his email, reset the password and then uploaded the shell with root's account
After that I restored the old password hash and email, so nobody noticed his passw ... |
|
|
Page 1 of 5 |
Goto page 1, 2, 3, 4, 5Next All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|