Waraxe IT Security Portal
Login or Register
June 15, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 39
Members: 0
Total: 39
Full disclosure
SEC Consult SA-20250604-0 :: Local Privilege Escalation and Default Credentials in INDAMED - MEDICAL OFFICE (Medical practice management) Demo version
Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Defense in depth -- the Microsoft way (part 89): user grouppolicies don't deserve tamper protection
CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0
ERPNext v15.53.1 Stored XSS in bio Field Allows Arbitrary Script Execution in Profile Page
ERPNext v15.53.1 Stored XSS in user_image Field Allows Script Execution via Injected Image Path
Local information disclosure in apport and systemd-coredump
Stored XSS via File Upload - adaptcmsv3.0.3
IDOR "Change Password" Functionality - adaptcmsv3.0.3
Stored XSS "Send Message" Functionality - adaptcmsv3.0.3
Authenticated File Upload to RCE - adaptcmsv3.0.3
Stored XSS in "Description" Functionality - cubecartv6.5.9
Multiple Vulnerabilities in SAP GuiXT Scripting
CVE-2024-47081: Netrc credential leak in PSF requests library
Exploit CVE-2019-9978: Remote Code Execution in Social Warfare WordPress Plugin (<= 3.5.2)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 27 matches
XSS advice
PostForum:Cross-site scripting aka XSS Posted: Fri Dec 25, 2009 4:29 am Subject: XSS advice
Chedda
Replies: 1
Views: 10515




I have been using this exploit found 8.2 Reflected Cross Site Scripting in index.php
------------------------------------------------------------------------------------------------------------------ ...
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 7:13 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
Chedda
Replies: 68
Views: 134615




it there anyway to make it do more than one target ID ? Shocked

You mai change tirget id from Xploit

$id = 1;// ID of the target user, default value "1" is admin's ID

He means can you check mult ...
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 2:10 am Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
Chedda
Replies: 68
Views: 134615




Works like a charm, way to go =)
MD5 Hash Question
PostForum:MD5 hashes Posted: Sat Aug 09, 2008 3:46 pm Subject: MD5 Hash Question
Chedda
Replies: 10
Views: 16385




You are using a Brute Force Attack, so you checking all the possible passwords in the key space generated by the character set of your choice and the desired range. Try first a dictionary attack? Do y ...
MD5 Hash Question
PostForum:MD5 hashes Posted: Sat Aug 09, 2008 1:37 am Subject: MD5 Hash Question
Chedda
Replies: 10
Views: 16385




Just looked more carefully at the screenshot and you put admin as the user name but you used the hash of another user.. Which are the two versions of SMF you attacked?
I'm not 100% sure about your re ...
MD5 Hash Question
PostForum:MD5 hashes Posted: Fri Aug 08, 2008 8:20 am Subject: MD5 Hash Question
Chedda
Replies: 10
Views: 16385




I can't seem to get any passwords. I even registered on a vulnerable forums and used the password 'password' just as a control and I wasn't even able to crack the hash that came with my account. If an ...
MD5 Hash Question
PostForum:MD5 hashes Posted: Thu Aug 07, 2008 9:44 am Subject: MD5 Hash Question
Chedda
Replies: 10
Views: 16385




I read the script and it exactly says:

sha1(strtolower($username) . $password);

In passwordspro there is such a scheme. It's indicated as

sha1($username.$password);

you have to set the use ...
MD5 Hash Question
PostForum:MD5 hashes Posted: Thu Aug 07, 2008 8:43 am Subject: MD5 Hash Question
Chedda
Replies: 10
Views: 16385




Oh I just finished reading the rest of the script and it is saying,


The password hash is generated as:
sha1(strtolower() . );


Sadly I have no idea what that means, but I have a feeling its ...
MD5 Hash Question
PostForum:MD5 hashes Posted: Thu Aug 07, 2008 8:24 am Subject: MD5 Hash Question
Chedda
Replies: 10
Views: 16385




Well I have been using an exploit for SMF forums. It has revealed Hashes, but I have no idea what type of hash it is. It seems a bit long for just a plain MD5 hash so I am thinking there is more too i ...
Coppermine <= 1.4.18 LFI / Remote Code Execution
PostForum:Coppermine Photo Gallery Posted: Fri Aug 01, 2008 5:51 am Subject: Coppermine <= 1.4.18 LFI / Remote Code Execution
Chedda
Replies: 0
Views: 9697





C:\php>php script.php www.*****.com /gallery/

+-------------------------------------------------------------------------+
| Coppermine Photo Gallery <= 1.4.18 LFI / Code Execution Expl ...
New advisory is out!
PostForum:Coppermine Photo Gallery Posted: Sun Jun 15, 2008 2:57 am Subject: New advisory is out!
Chedda
Replies: 5
Views: 14686




I realize this is a couple of months old, but I have found a website with an older version of coppermine and just testing out this vulnerability. I have uploaded the PoC provided, but when I click tes ...
Hmm question
PostForum:Newbies corner Posted: Sun Jun 08, 2008 5:00 am Subject: Hmm question
Chedda
Replies: 8
Views: 14402




Quite simple, it's just a matter of knowing unix commands. If you don't know them, i advise you to install linux such as Ubuntu and have a play.

All I did here was
1. find a directory with write ...
Hmm question
PostForum:Newbies corner Posted: Sun Jun 08, 2008 12:33 am Subject: Hmm question
Chedda
Replies: 8
Views: 14402




I successfully uploaded a shell. Too easy.

When you've had your fun I'll email them about the vulnerability. All it takes is one malicious hacker to destroy that site, and seriously who would want ...
Hmm question
PostForum:Newbies corner Posted: Sat Jun 07, 2008 4:41 pm Subject: Hmm question
Chedda
Replies: 8
Views: 14402




I was merely googling random thing about hacking in general and came across it on a forum. I didn't really find anything someone else did all the work. The forum is dead though and the post a couple o ...
Hmm question
PostForum:Newbies corner Posted: Sat Jun 07, 2008 3:05 am Subject: Hmm question
Chedda
Replies: 8
Views: 14402




So I was browsing around looking for a good place for a wannabe hacker. I came across this, but wasn't given any information on how its performed. I have been looking elsewhere to find more informatio ...
Page 1 of 2 Goto page 1, 2Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.052 Seconds