|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 58
Members: 0
Total: 58
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Chedda |
|
Replies: 1 |
Views: 10022 |
|
|
|
|
|
|
I have been using this exploit found 8.2 Reflected Cross Site Scripting in index.php
------------------------------------------------------------------------------------------------------------------ ... |
|
|
|
Chedda |
|
Replies: 68 |
Views: 129639 |
|
|
|
|
|
|
it there anyway to make it do more than one target ID ?
You mai change tirget id from Xploit
$id = 1;// ID of the target user, default value "1" is admin's ID
He means can you check mult ... |
|
|
|
Chedda |
|
Replies: 68 |
Views: 129639 |
|
|
|
|
|
|
Works like a charm, way to go =) |
|
|
|
Chedda |
|
Replies: 10 |
Views: 15161 |
|
|
|
|
|
|
You are using a Brute Force Attack, so you checking all the possible passwords in the key space generated by the character set of your choice and the desired range. Try first a dictionary attack? Do y ... |
|
|
|
Chedda |
|
Replies: 10 |
Views: 15161 |
|
|
|
|
|
|
Just looked more carefully at the screenshot and you put admin as the user name but you used the hash of another user.. Which are the two versions of SMF you attacked?
I'm not 100% sure about your re ... |
|
|
|
Chedda |
|
Replies: 10 |
Views: 15161 |
|
|
|
|
|
|
I can't seem to get any passwords. I even registered on a vulnerable forums and used the password 'password' just as a control and I wasn't even able to crack the hash that came with my account. If an ... |
|
|
|
Chedda |
|
Replies: 10 |
Views: 15161 |
|
|
|
|
|
|
I read the script and it exactly says:
sha1(strtolower($username) . $password);
In passwordspro there is such a scheme. It's indicated as
sha1($username.$password);
you have to set the use ... |
|
|
|
Chedda |
|
Replies: 10 |
Views: 15161 |
|
|
|
|
|
|
Oh I just finished reading the rest of the script and it is saying,
The password hash is generated as:
sha1(strtolower() . );
Sadly I have no idea what that means, but I have a feeling its ... |
|
|
|
Chedda |
|
Replies: 10 |
Views: 15161 |
|
|
|
|
|
|
Well I have been using an exploit for SMF forums. It has revealed Hashes, but I have no idea what type of hash it is. It seems a bit long for just a plain MD5 hash so I am thinking there is more too i ... |
|
|
|
|
C:\php>php script.php www.*****.com /gallery/
+-------------------------------------------------------------------------+
| Coppermine Photo Gallery <= 1.4.18 LFI / Code Execution Expl ... |
|
|
|
Chedda |
|
Replies: 5 |
Views: 14049 |
|
|
|
|
|
|
I realize this is a couple of months old, but I have found a website with an older version of coppermine and just testing out this vulnerability. I have uploaded the PoC provided, but when I click tes ... |
|
|
|
Chedda |
|
Replies: 8 |
Views: 13613 |
|
|
|
|
|
|
Quite simple, it's just a matter of knowing unix commands. If you don't know them, i advise you to install linux such as Ubuntu and have a play.
All I did here was
1. find a directory with write ... |
|
|
|
Chedda |
|
Replies: 8 |
Views: 13613 |
|
|
|
|
|
|
I successfully uploaded a shell. Too easy.
When you've had your fun I'll email them about the vulnerability. All it takes is one malicious hacker to destroy that site, and seriously who would want ... |
|
|
|
Chedda |
|
Replies: 8 |
Views: 13613 |
|
|
|
|
|
|
I was merely googling random thing about hacking in general and came across it on a forum. I didn't really find anything someone else did all the work. The forum is dead though and the post a couple o ... |
|
|
|
Chedda |
|
Replies: 8 |
Views: 13613 |
|
|
|
|
|
|
So I was browsing around looking for a good place for a wannabe hacker. I came across this, but wasn't given any information on how its performed. I have been looking elsewhere to find more informatio ... |
|
|
Page 1 of 2 |
Goto page 1, 2Next All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|