 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 143
Members: 0
Total: 143
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
Pinox |
|
Replies: 1 |
Views: 5796 |
|
|
 |
 |
 |
|
Found one:
7d6a6ae44490c4df23c982d052a2cbf6:vaoltf
 |
|
|
|
Pinox |
|
Replies: 1 |
Views: 9183 |
|
|
 |
 |
 |
|
Think you got the link wrong thats all you can download it from here:
http://www.freerainbowtables.com/download/rti2rto.zip
Edit: oh yeah it is down i'll try find another link for you. |
|
|
|
Pinox |
|
Replies: 6 |
Views: 7346 |
|
|
 |
 |
 |
|
Yeah that's right just download passwordspro find a good wordlist and use this setting to try and crack the hash:
md5(md5($salt).md5($pass))
 |
|
|
|
Pinox |
|
Replies: 1 |
Views: 7168 |
|
|
 |
 |
 |
|
As the title says really, how do you clear the logs from the ACP panel in invision.
Cheers |
|
|
|
Pinox |
|
Replies: 2 |
Views: 5603 |
|
|
 |
 |
 |
|
Ran these through my wordlists got nothing please try them:
01ef3c67beab3ed5728db00b78c4e878:"-~)?
df8cb3447386064b108783f647622052:[;,/3
a0e4ef8a135294df7d233e98417aa3d3&# ... |
|
|
|
Pinox |
|
Replies: 79 |
Views: 166968 |
|
|
 |
 |
 |
|
Weird question I know but instead of using the script is there anyway to just directly get the hash and salt:
For example just like you can check if it is vuln
index.php?act=xmlout&do=check- ... |
|
|
|
Pinox |
|
Replies: 5 |
Views: 7958 |
|
|
 |
 |
 |
|
Another one to add:
Hash::1510a232b17523e7da75567dd745aa23 Salt:xdz?]
Password: death133 |
|
|
|
Pinox |
|
Replies: 3 |
Views: 5970 |
|
|
 |
 |
 |
|
Managed one of them for you:
Hash: fb40d9823609375bdcadbcab19f0be4b Salt: _75`p :
Password: nantes |
|
|
|
Pinox |
|
Replies: 0 |
Views: 4683 |
|
|
 |
 |
 |
|
Hey guys I couldn't crack the other hashes I posted so please could you all give this one a try for me:
Hash: a0e4ef8a135294df7d233e98417aa3d3
Salt: vl3Yt
Its an invision hash would reaaaaall ... |
|
|
|
Pinox |
|
Replies: 0 |
Views: 4983 |
|
|
 |
 |
 |
|
If any of you have the chance please could you give these two hashes a try just running them through that 28gb wordlist but my pc is so slow so you might be able to get them faster.
Cheers in advan ... |
|
|
|
Pinox |
|
Replies: 0 |
Views: 9412 |
|
|
 |
 |
 |
|
Hey,
Just wondering if anyone has or written a perl script which can open a sql file and extract all the md5 hashes from it, I had a script like this before but have forgotten where I got it from. |
|
|
|
Pinox |
|
Replies: 2 |
Views: 10704 |
|
|
 |
 |
 |
|
Look in the changelog, to find that here is an example:
http://www.site.com/forum/docs/CHANGELOG.html
Hope that helps. |
|
|
|
Pinox |
|
Replies: 0 |
Views: 7588 |
|
|
 |
 |
 |
|
Hey,
I was just wondering seeing as most of the phpbb forums I visit dont have html enabled would anyone be able to put this:
<B C=">" ''style='font-size:0;color:#EFEFEF'style='top:express ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|