 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 95
Members: 0
Total: 95
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
I have tried the IPB 1.3 and the IPB <=2.3.5 scripts found on an IPB forum but neither worked, at the bottom of the homepage it says;
Powered by IP.Board 1.3 © 2003 - iPBFree 2.1 © 2010
... |
|
|
|
|
Any help in cracking the below salt and hash greatly appreciated
39949386ecef8567a7b74107bdadcd42:.TSc?
Thanks |
|
|
|
|
Currently I use
Hide my IP 2009 and
Torpark or XeroBank Browser
I prefer Hide my IP but have been told that my IP can still be traced back to my PC, anyone know anything about this ?
Torpar ... |
|
|
|
|
893bb2ff08efd3d2cd1677c04701501f:lingnoi
cheers mate  |
|
|
|
|
Any help cracking these 4 hashes greatly appreciated;
1:486cd3da9d45e3dd9ece075dd9d46cd1:Op?rW
2:9ec931bb9e3c8f6558a5dee0e1f74084:gv7GE
3:c6a25a3a0ffbf6e412a441fdcea81448:XbytW
4:893bb2ff08efd ... |
|
|
|
|
Try this exploit:
http://www.waraxe.us/ftopict-3340.html
It should work
The exploit worked on one of the forums I was trying to get into but 3 others I'm trying have been patched.
Are ... |
|
|
|
|
Hoping someone can help me with this one ?
HASH 893bb2ff08efd3d2cd1677c04701501f SALT a79Gl
TIA |
|
|
|
|
Please, Help-me.
Hash: 3ad846f5522ec20c45f2f7721761edc9
Salt: He0hY
getlost
no I mean it the password for this one is getlost couldn't crack any of the others  |
|
|
|
|
I'm getting better, I found how to download better dictionaries to PasswordPro and how to add them, but still limited to simple dictionary search and brute force attacks at the minute.
having troub ... |
|
|
|
|
The formatting is terrible.. I'll give them a whirl.
I know, I have this problem with passwordspro that even tough I put it in the right format hash:salt. It only adds 1 hash at the time and I don' ... |
|
|
|
|
First try dictionary, then experiment with other options. Dictionary is the fastest way You can download some dictionary for passwordpro from their web site, but you can also generate your own dict ... |
|
|
|
|
Brisk and Zipo can I ask what you used to crack those hash's, I'm using PasswordPro and despite it running for nearly 24 hours it hasn't cracked any of the list I put up even the ones you guys cracked ... |
|
|
|
|
I have around 200 hash's and salt's from the IPB and I'm now running them through PasswordPro using the
MD5(MD5($SALT).MD5($PASS))
equation but after 24 hours Passwordpro hasn't hacked one yet ... |
|
|
|
|
Brisk and Zipo can I ask what you used to crack those hash's, I'm using PasswordPro and despite it running for nearly 24 hours it hasn't cracked any of the list I put up even the ones you guys cracked ... |
|
|
Page 1 of 2 |
Goto page 1, 2Next All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|