 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 488
Members: 0
Total: 488
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
2B74D471:99B354D472437CCB57040A21FACB72CF4B5B0AF4
Mac OS X 10.4.11 unshadowed hash. First person to crack and provide me with pass will get $30 USD by PayPal. |
|
|
|
|
Nice! i aint white hat tho  |
|
|
|
|
Come on, no one? This is IPB 2.3.5 |
|
|
|
|
Do you have the salt? Otherwise its impossible to retrieve.
The salt is root. All hashes are in this format:
salt:hash |
|
|
|
|
What about payment for cracking first hash? -.-
Yeah, pay Henderson first before I release the second hash. I don't like scammers.  |
|
|
|
|
Here's a salted SHA1 hash I retrieved from Mac OS X.
root:2B74D47199B354D472437CCB57040A21FACB72CF4B5B0AF4 |
|
|
|
|
Whats your paypal email, also can you do another so I can send you $30 straight ahead?
Hash: c9df66a5966e99d1f769d7e0e6295a0a
Salt: RA
I'll do this, gimme a coupla hours. $15 to PayPal? |
|
|
|
|
I used Janek's awesome script, here's the result:
Hash: 509840f358e585c633ebafe3e071472b
Salt: FpTo;
Crack please!  |
|
|
|
|
I'm cracking it now...may take a while... |
|
|
|
|
It would be helpful if you listed the script.  |
|
|
|
|
Well, well, well...what do we have here? It seems Apollo wants to extract the root pass for our iBooks! Heh heh searching the pass on Google automatically came to this thread, seems like waraxe has a ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|