 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 115
Members: 0
Total: 115
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
Acc |
|
Replies: 2 |
Views: 19098 |
|
|
 |
 |
 |
|
lol nooblets. this is no warez board. |
|
|
|
Acc |
|
Replies: 1 |
Views: 11610 |
|
|
 |
 |
 |
|
Program to recover/crack:
SHA1
MD5
MD4
MySQL5
MD5(MD5($pass).$salt) --> as well known as vbulletin
ATI HD4850:
~980M/s single MD5
~720M/s batch of MD5s (down to ~420M for 400K hashes)
... |
|
|
|
Acc |
|
Replies: 3 |
Views: 8219 |
|
|
 |
 |
 |
|
Wrong. 41 Days till the attack will be finished. |
|
|
|
Acc |
|
Replies: 7 |
Views: 12564 |
|
|
 |
 |
 |
|
$H$9ZpuIxNr0HoR3JnGbW4OP32xBS2fpZ:burak1 |
|
|
|
Acc |
|
Replies: 1128 |
Views: 1341427 |
|
|
 |
 |
 |
|
So you have to post the salt too.
sorry about my my ignorance - but where can I find the salt?
EDIT: I found the salt value in table "user"
4c51f5784651a71ee475afa2c7a481db Salt: 5P=
... |
|
|
|
Acc |
|
Replies: 2 |
Views: 6830 |
|
|
 |
 |
 |
|
4a166833f0bbe9c2d6302b29a62216fc:1qazxsw2 |
|
|
|
Acc |
|
Replies: 1 |
Views: 5834 |
|
|
 |
 |
 |
|
66e19e0ea0830c8b4aea87323f28d25d:squadron2720
5aa2771d59af8abe87f75e7375c00342:hyhopa19 |
|
|
|
Acc |
|
Replies: 4 |
Views: 7198 |
|
|
 |
 |
 |
|
same. btw I guess it's easier if you post all hashes in one thread. |
|
|
|
Acc |
|
Replies: 4 |
Views: 7198 |
|
|
 |
 |
 |
|
I tied rainbow table:
md5_mixalpha-numeric-all-space#1-6
md5_loweralpha-numeric-space#1-8
good luck |
|
|
|
Acc |
|
Replies: 1128 |
Views: 1341427 |
|
|
 |
 |
 |
|
hashes are salted
So it's not possible to crack this?
So you have to post the salt too. |
|
|
|
Acc |
|
Replies: 1128 |
Views: 1341427 |
|
|
 |
 |
 |
|
vbulletin 3.8.1 hashes are salted |
|
|
|
Acc |
|
Replies: 2 |
Views: 5739 |
|
|
 |
 |
 |
|
It's a mysql5 hash:
59C70DA2F3E3A5BDF46B68F5C8B8F25762BCCEF0:passwd
what's an "altergram"? something like [url=http://www.insidepro.com/hashes.php?lang=rus]this? |
|
|
|
Acc |
|
Replies: 1 |
Views: 5095 |
|
|
 |
 |
 |
|
|
|
|
Acc |
|
Replies: 1 |
Views: 9868 |
|
|
 |
 |
 |
|
It's sad. Your try to sell a combo list for $4.99. |
|
|
|
Acc |
|
Replies: 34 |
Views: 97937 |
|
|
 |
 |
 |
|
http://3.14.by/en/salty-cracker/
Submit all your unsalted md5s and inform everyone interested to submit their hashes [url=http://3.14.by/en/salty-cracker/]here.
MD5 unsalted: 327073 |
|
|
Page 1 of 2 |
Goto page 1, 2Next All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|