Waraxe IT Security Portal
Login or Register
June 16, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 44
Members: 0
Total: 44
Full disclosure
SEC Consult SA-20250604-0 :: Local Privilege Escalation and Default Credentials in INDAMED - MEDICAL OFFICE (Medical practice management) Demo version
Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Defense in depth -- the Microsoft way (part 89): user grouppolicies don't deserve tamper protection
CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0
ERPNext v15.53.1 Stored XSS in bio Field Allows Arbitrary Script Execution in Profile Page
ERPNext v15.53.1 Stored XSS in user_image Field Allows Script Execution via Injected Image Path
Local information disclosure in apport and systemd-coredump
Stored XSS via File Upload - adaptcmsv3.0.3
IDOR "Change Password" Functionality - adaptcmsv3.0.3
Stored XSS "Send Message" Functionality - adaptcmsv3.0.3
Authenticated File Upload to RCE - adaptcmsv3.0.3
Stored XSS in "Description" Functionality - cubecartv6.5.9
Multiple Vulnerabilities in SAP GuiXT Scripting
CVE-2024-47081: Netrc credential leak in PSF requests library
Exploit CVE-2019-9978: Remote Code Execution in Social Warfare WordPress Plugin (<= 3.5.2)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 51 matches
Exploit Lineage II java server
PostForum:Java Posted: Tue Jan 13, 2009 11:08 am Subject: Exploit Lineage II java server
_mranderson_
Replies: 1
Views: 9188




maybe, but you have to give more info
root mysql? stuck!
PostForum:All other security holes Posted: Sun Jan 11, 2009 1:18 pm Subject: root mysql? stuck!
_mranderson_
Replies: 8
Views: 15130




it's an L2 server aight?

anyways, as already said, if you have the mysql root's password you should find a way to run SQL code on it, because with root privs you can load_file() and select into out ...
root mysql? stuck!
PostForum:All other security holes Posted: Fri Jan 09, 2009 3:38 pm Subject: root mysql? stuck!
_mranderson_
Replies: 8
Views: 15130




if you are root and can only use select statements, you're done.
use select load_file('/complete/path/to/file') to read a file, or select 'data' into outfile '/path/to/file' to write some dat ...
The easiest way to hack phpbb 2.0.11 ?
PostForum:PhpBB Posted: Thu Jan 08, 2009 1:54 am Subject: The easiest way to hack phpbb 2.0.11 ?
_mranderson_
Replies: 31
Views: 215465




I m sorry to say this is really script kiddish
vbulletin 3.7.4 hash+salt
PostForum:All other hashes Posted: Mon Dec 29, 2008 2:12 am Subject: vbulletin 3.7.4 hash+salt
_mranderson_
Replies: 5
Views: 9164




I 've used none
IPB <= 2.3.5 sql injection Retrieving other infos ?
PostForum:Invision Power Board Posted: Sun Dec 28, 2008 1:23 am Subject: IPB <= 2.3.5 sql injection Retrieving other infos ?
_mranderson_
Replies: 17
Views: 71045




lol, of course there could be other vulnerabilities...

What tou mean?
vbulletin 3.7.4 hash+salt
PostForum:All other hashes Posted: Thu Dec 25, 2008 3:36 am Subject: vbulletin 3.7.4 hash+salt
_mranderson_
Replies: 5
Views: 9164




admin:a4fb40dbb9eed3f878da94d8596bf67b:r-s
/etc/passwd
PostForum:Sql injection Posted: Sun Dec 14, 2008 12:26 am Subject: /etc/passwd
_mranderson_
Replies: 5
Views: 15167




Probably the script is outputting just the first line; try hexing the string:
hex(load_file('/etc/passwd'))

anyways, reading the passwd file nowadays will just give you an idea of what users can l ...
Unknown hash from Wordpress
PostForum:All other hashes Posted: Fri Dec 12, 2008 8:26 pm Subject: Unknown hash from Wordpress
_mranderson_
Replies: 6
Views: 11893




I think it is md5() unix, a really though one (to bruteforce)
Config encoded with IonCube
PostForum:PHP script decode requests Posted: Fri Dec 12, 2008 8:25 pm Subject: Config encoded with IonCube
_mranderson_
Replies: 6
Views: 11771




no the best way was the one waraxe told, infact I was just doing it before reading his post.

1. Install IonCube
2. create a php script that includes the coded one and prints out the variables.

...
Config encoded with IonCube
PostForum:PHP script decode requests Posted: Thu Dec 11, 2008 1:59 pm Subject: Config encoded with IonCube
_mranderson_
Replies: 6
Views: 11771




mmh, I don't wanna forget it, it's got root's password in it I think.
Config encoded with IonCube
PostForum:PHP script decode requests Posted: Thu Dec 11, 2008 9:43 am Subject: Config encoded with IonCube
_mranderson_
Replies: 6
Views: 11771




How do you decode php files encoded with ioncube?
Shall I reverse engeneer the dlls that comes with it? is it worth it?
IPB salted hash (solved)
PostForum:All other hashes Posted: Wed Dec 10, 2008 3:50 am Subject: IPB salted hash (solved)
_mranderson_
Replies: 2
Views: 5900




ty very much
IPB salted hash (solved)
PostForum:All other hashes Posted: Tue Dec 09, 2008 2:03 am Subject: IPB salted hash (solved)
_mranderson_
Replies: 2
Views: 5900




See if you can crack this one, thanks!

e314878ab5801f307684fdd3d925de8f:ans1I
Good Wordlists
PostForum:General discussion Posted: Mon Dec 08, 2008 3:39 am Subject: Good Wordlists
_mranderson_
Replies: 2
Views: 8099




Yes, I do like so: whenever I find a password, I write it down both in a combolist user:pass and in a wordlist (just the pass). This works greatly.
Page 1 of 4 Goto page 1, 2, 3, 4Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.056 Seconds