Waraxe IT Security Portal
Login or Register
January 6, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 130
Members: 0
Total: 130
Full disclosure
Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Panda3d v1.10.16 Uncontrolled Format String in Panda3D egg-mkfont Allows Stack Memory Disclosure
Panda3d v1.10.16 egg-mkfont Stack Buffer Overflow
Panda3d v1.10.16 deploy-stub Unbounded Stack Allocation Leading to Uninitialized Memory
MongoDB v8.3.0 Integer Underflow in LMDB mdb_load
Bioformats v8.3.0 Untrusted Deserialization of Bio-Formats Memoizer Cache Files
Bioformats v8.3.0 Improper Restriction of XML External Entity Reference in Bio-Formats Leica Microsystems XML Parser
MongoDB v8.3.0 Heap Buffer Underflow in OpenLDAP LMDB mdb_load
zlib v1.3.1.2 Global Buffer Overflow in TGZfname() of zlib untgz Utility via Unbounded strcpy() on User-Supplied Archive Name
SigInt-Hombre v1 / dynamic Suricata detection rules from real-time threat feeds
Security Vulnerability in Koller Secret: Real Hidden App(com.koller.secret.hid emyphoto)
Linux Kernel Block Subsystem Vulnerabilities
[KIS-2025-14] PKP-WAL <= 3.5.0-1 Login Cross-Site RequestForgery Vulnerability
[KIS-2025-13] PKP-WAL <= 3.5.0-3 (X-Forwarded-Host) LESS Code Injection Vulnerability
[KIS-2025-12] PKP-WAL <= 3.5.0-1 (baseColour) LESS CodeInjection Vulnerability
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 27 matches
XSS advice
PostForum:Cross-site scripting aka XSS Posted: Fri Dec 25, 2009 4:29 am Subject: XSS advice
Chedda
Replies: 1
Views: 11013




I have been using this exploit found 8.2 Reflected Cross Site Scripting in index.php
------------------------------------------------------------------------------------------------------------------ ...
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 7:13 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
Chedda
Replies: 68
Views: 140640




it there anyway to make it do more than one target ID ? Shocked

You mai change tirget id from Xploit

$id = 1;// ID of the target user, default value "1" is admin's ID

He means can you check mult ...
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 2:10 am Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
Chedda
Replies: 68
Views: 140640




Works like a charm, way to go =)
MD5 Hash Question
PostForum:MD5 hashes Posted: Sat Aug 09, 2008 3:46 pm Subject: MD5 Hash Question
Chedda
Replies: 10
Views: 17441




You are using a Brute Force Attack, so you checking all the possible passwords in the key space generated by the character set of your choice and the desired range. Try first a dictionary attack? Do y ...
MD5 Hash Question
PostForum:MD5 hashes Posted: Sat Aug 09, 2008 1:37 am Subject: MD5 Hash Question
Chedda
Replies: 10
Views: 17441




Just looked more carefully at the screenshot and you put admin as the user name but you used the hash of another user.. Which are the two versions of SMF you attacked?
I'm not 100% sure about your re ...
MD5 Hash Question
PostForum:MD5 hashes Posted: Fri Aug 08, 2008 8:20 am Subject: MD5 Hash Question
Chedda
Replies: 10
Views: 17441




I can't seem to get any passwords. I even registered on a vulnerable forums and used the password 'password' just as a control and I wasn't even able to crack the hash that came with my account. If an ...
MD5 Hash Question
PostForum:MD5 hashes Posted: Thu Aug 07, 2008 9:44 am Subject: MD5 Hash Question
Chedda
Replies: 10
Views: 17441




I read the script and it exactly says:

sha1(strtolower($username) . $password);

In passwordspro there is such a scheme. It's indicated as

sha1($username.$password);

you have to set the use ...
MD5 Hash Question
PostForum:MD5 hashes Posted: Thu Aug 07, 2008 8:43 am Subject: MD5 Hash Question
Chedda
Replies: 10
Views: 17441




Oh I just finished reading the rest of the script and it is saying,


The password hash is generated as:
sha1(strtolower() . );


Sadly I have no idea what that means, but I have a feeling its ...
MD5 Hash Question
PostForum:MD5 hashes Posted: Thu Aug 07, 2008 8:24 am Subject: MD5 Hash Question
Chedda
Replies: 10
Views: 17441




Well I have been using an exploit for SMF forums. It has revealed Hashes, but I have no idea what type of hash it is. It seems a bit long for just a plain MD5 hash so I am thinking there is more too i ...
Coppermine <= 1.4.18 LFI / Remote Code Execution
PostForum:Coppermine Photo Gallery Posted: Fri Aug 01, 2008 5:51 am Subject: Coppermine <= 1.4.18 LFI / Remote Code Execution
Chedda
Replies: 0
Views: 10163





C:\php>php script.php www.*****.com /gallery/

+-------------------------------------------------------------------------+
| Coppermine Photo Gallery <= 1.4.18 LFI / Code Execution Expl ...
New advisory is out!
PostForum:Coppermine Photo Gallery Posted: Sun Jun 15, 2008 2:57 am Subject: New advisory is out!
Chedda
Replies: 5
Views: 15413




I realize this is a couple of months old, but I have found a website with an older version of coppermine and just testing out this vulnerability. I have uploaded the PoC provided, but when I click tes ...
Hmm question
PostForum:Newbies corner Posted: Sun Jun 08, 2008 5:00 am Subject: Hmm question
Chedda
Replies: 8
Views: 15195




Quite simple, it's just a matter of knowing unix commands. If you don't know them, i advise you to install linux such as Ubuntu and have a play.

All I did here was
1. find a directory with write ...
Hmm question
PostForum:Newbies corner Posted: Sun Jun 08, 2008 12:33 am Subject: Hmm question
Chedda
Replies: 8
Views: 15195




I successfully uploaded a shell. Too easy.

When you've had your fun I'll email them about the vulnerability. All it takes is one malicious hacker to destroy that site, and seriously who would want ...
Hmm question
PostForum:Newbies corner Posted: Sat Jun 07, 2008 4:41 pm Subject: Hmm question
Chedda
Replies: 8
Views: 15195




I was merely googling random thing about hacking in general and came across it on a forum. I didn't really find anything someone else did all the work. The forum is dead though and the post a couple o ...
Hmm question
PostForum:Newbies corner Posted: Sat Jun 07, 2008 3:05 am Subject: Hmm question
Chedda
Replies: 8
Views: 15195




So I was browsing around looking for a good place for a wannabe hacker. I came across this, but wasn't given any information on how its performed. I have been looking elsewhere to find more informatio ...
Page 1 of 2 Goto page 1, 2Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.050 Seconds