Waraxe IT Security Portal
Login or Register
January 23, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 112
Members: 0
Total: 112
Full disclosure
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
OpenMetadata <= 1.11.3 Authenticated SQL Injection
[REVIVE-SA-2026-001] Revive Adserver Vulnerabilities
Defense in depth -- the Microsoft way (part 95): the (shared)"Start Menu" is dispensable
Re: Multiple Security Misconfigurations and CustomerEnumeration Exposure in Convercent Whistleblowing Platform(EQS Group)
RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in RIOT ethos Serial Frame Parser
RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in tapslip6 Utility via Unbounded Device Path Construction
TinyOS 2.1.2 Stack-Based Buffer Overflow in mcp2200gpio
TinyOS 2.1.2 printfUART Global Buffer Overflow via UnboundedFormat Expansion
KL-001-2026-01: yintibao Fun Print Mobile Unauthorized Access via Context Hijacking
Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Panda3d v1.10.16 Uncontrolled Format String in Panda3D egg-mkfont Allows Stack Memory Disclosure
Panda3d v1.10.16 egg-mkfont Stack Buffer Overflow
Panda3d v1.10.16 deploy-stub Unbounded Stack Allocation Leading to Uninitialized Memory
MongoDB v8.3.0 Integer Underflow in LMDB mdb_load
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 13 matches
MD5 Request quick
PostForum:MD5 hashes Posted: Thu Nov 20, 2008 11:11 pm Subject: MD5 Request quick
Pinox
Replies: 1
Views: 5980




Found one:

7d6a6ae44490c4df23c982d052a2cbf6:vaoltf

Wink
rti2rto?
PostForum:Hash related information Posted: Sun Nov 16, 2008 4:19 pm Subject: rti2rto?
Pinox
Replies: 1
Views: 9390




Think you got the link wrong thats all you can download it from here:

http://www.freerainbowtables.com/download/rti2rto.zip

Smile

Edit: oh yeah it is down i'll try find another link for you.
IPB 2.3.5 Hash Help?
PostForum:All other hashes Posted: Sun Nov 16, 2008 4:17 pm Subject: IPB 2.3.5 Hash Help?
Pinox
Replies: 6
Views: 7589




Yeah that's right just download passwordspro find a good wordlist and use this setting to try and crack the hash:

md5(md5($salt).md5($pass))

Smile
How do you clear invision logs?
PostForum:Invision Power Board Posted: Thu Nov 13, 2008 3:37 pm Subject: How do you clear invision logs?
Pinox
Replies: 1
Views: 7373




As the title says really, how do you clear the logs from the ACP panel in invision.

Cheers
Few ipb hashes
PostForum:All other hashes Posted: Tue Nov 11, 2008 10:52 pm Subject: Few ipb hashes
Pinox
Replies: 2
Views: 5796




Ran these through my wordlists got nothing please try them:


01ef3c67beab3ed5728db00b78c4e878:"-~)?
df8cb3447386064b108783f647622052:[;,/3
a0e4ef8a135294df7d233e98417aa3d3&# ...
IPB <= 2.3.5 sql injection exploit (new version 1.2)
PostForum:Invision Power Board Posted: Tue Nov 11, 2008 4:31 pm Subject: IPB <= 2.3.5 sql injection exploit (new version 1.2)
Pinox
Replies: 79
Views: 169715




Weird question I know but instead of using the script is there anyway to just directly get the hash and salt:

For example just like you can check if it is vuln

index.php?act=xmlout&do=check- ...
ipb 2.3.5 salted hash (done)
PostForum:All other hashes Posted: Fri Nov 07, 2008 4:47 pm Subject: ipb 2.3.5 salted hash (done)
Pinox
Replies: 5
Views: 8229




Another one to add:

Hash::1510a232b17523e7da75567dd745aa23 Salt:xdz?]

Password: death133
3IPB hashes + 1 vb hash
PostForum:All other hashes Posted: Fri Nov 07, 2008 3:53 pm Subject: 3IPB hashes + 1 vb hash
Pinox
Replies: 3
Views: 6196




Managed one of them for you:

Hash: fb40d9823609375bdcadbcab19f0be4b Salt: _75`p :

Password: nantes
Please try this.
PostForum:All other hashes Posted: Tue Oct 28, 2008 3:04 pm Subject: Please try this.
Pinox
Replies: 0
Views: 4894




Hey guys I couldn't crack the other hashes I posted so please could you all give this one a try for me:

Hash: a0e4ef8a135294df7d233e98417aa3d3

Salt: vl3Yt

Its an invision hash would reaaaaall ...
Give this a try please
PostForum:MD5 hashes Posted: Mon Oct 27, 2008 4:27 pm Subject: Give this a try please
Pinox
Replies: 0
Views: 5173




If any of you have the chance please could you give these two hashes a try just running them through that 28gb wordlist but my pc is so slow so you might be able to get them faster.

Cheers in advan ...
MD5 Hash extractor
PostForum:General discussion Posted: Sun Apr 02, 2006 9:43 pm Subject: MD5 Hash extractor
Pinox
Replies: 0
Views: 10749




Hey,

Just wondering if anyone has or written a perl script which can open a sql file and extract all the md5 hashes from it, I had a script like this before but have forgotten where I got it from.
Powered by phpBB x.x.x
PostForum:PhpBB Posted: Sat Feb 25, 2006 4:05 pm Subject: Powered by phpBB x.x.x
Pinox
Replies: 2
Views: 10908




Look in the changelog, to find that here is an example:

http://www.site.com/forum/docs/CHANGELOG.html

Hope that helps.
Phpbb 2.0.18 exploit question
PostForum:PhpBB Posted: Thu Dec 22, 2005 6:13 pm Subject: Phpbb 2.0.18 exploit question
Pinox
Replies: 0
Views: 7810




Hey,

I was just wondering seeing as most of the phpbb forums I visit dont have html enabled would anyone be able to put this:

<B C=">" ''style='font-size:0;color:#EFEFEF'style='top:express ...
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.069 Seconds