 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 316
Members: 0
Total: 316
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
dude, It's just session id you can't do anything with it. Get the password hashes of the users if you want to "hack" the forum or whatever you want to do. |
|
|
|
|
Hi,
VWIE9nz4reiAg
mpnKOLB4.Tw2I
kIERfnmWzBid2
And 2 other hashes still can't get them (already posted in this forum) :
BYVcY7ddlYnaw
BY3zu2N3zEOms
Thanks.
Update: kIERfnmWzBid2 Decod ... |
|
|
|
|
OWNED! I'm gonna try to get root later :p
Very nice game gat3way thanks! |
|
|
|
|
DES(UNIX) hashes :
BYVcY7ddlYnaw
BY3zu2N3zEOms
Thanks |
|
|
|
|
Good job man!
I like the word Multiple Vulns
Greetz. |
|
|
|
|
You can also crack it with John the ripper. |
|
|
|
|
I'm a noob, so if someone could point me in the right direction to find the simplest exploit/sql injection run in perl used to get admin hash/capabilities. And please don't say google.
Why run in per ... |
|
|
|
|
This is not a hash, where/how did you got it in php fusion?? |
|
|
|
|
Plaintext of a6424b4a13bc383ccc436f5602db9014 is th3r31sn0sp00n
Enjoy
HOW?!
With a script that search in online rainbow tables websites.
Pass found at http://opencrack.hashkiller.com/ |
|
|
|
|
Plaintext of a6424b4a13bc383ccc436f5602db9014 is th3r31sn0sp00n
Enjoy  |
|
|
|
|
Another one
1c50f21ec66e480566622bcf4a10d066:niUQv02PUr6GW9yI |
|
|
|
|
md5 :
2161dc77f384768c04f41f7218ab8db4
017849559a523a3f0923b91a5347d217
Thanks. |
|
|
|
|
I need help with this md5($pass.$salt) :
21f5f6ed1e5f229576e07ceadd4f1b53:MMMTmcZ5mGLRQSYzl67CimyHnJkY7vfo
dc8f78ab8dc3779b474bad731c0155a6:xfEA1KjMYZNHlWASwkHxIMlXPNqmYTbP
b415cd496949eec3158542 ... |
|
|
|
|
54196555872b875e9a412ad0c2709843
f5c581d8152393cd761d87db4fa166da
282e432de67005f37ecdefd6bdd47339
458977f5917334522034e8d01362f02a
f861a8315c1bc32fe56c13700f5aa223
3034360d422b2486007e4d1a6b145f ... |
|
|
|
|
Hi,
I need help with this md5 : 9e56575cf8c90ec87d91f2dbfbbbda3f
Thanks in advance. |
|
|
Page 1 of 2 |
Goto page 1, 2Next All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|