Waraxe IT Security Portal
Login or Register
September 1, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 142
Members: 0
Total: 142
Full disclosure
Multi-Protocol Traceroute
SEC Consult SA-20250728-0 :: Stored Cross-Site-Scripting in Optimizely Episerver CMS
SEC Consult SA-20250807-0 :: Race Condition in Shopware Voucher Submission
Insufficient Resource Allocation Limits in nopCommerce v4.10 and v4.80.3 Excel Import Functionality
CSV Injection in nopcommerce v4.10 and 4.80.3
Insufficient Session Cookie Invalidation in nopCommerce v4.10and 4.80.3
Session Fixation Vulnerability in iDempiere WebUI v12.0.0.202508171158
CSV Injection in iDempiere WebUI 12.0.0.202508171158
liblcf v0.8.1 liblcf/lcf2xml: Untrusted LCF data triggers uncaught std::length_error via negative vector resize (DoS)
liblcf v0.8.1 Integer Overflow in liblcf `ReadInt()` Leads to Out-of-Bounds Reads and Denial of Service
Piciorgros TMO-100: Unauthorized configuration change via TFTP (CVE-2025-29617)
Piciorgros TMO-100: Unauthorized log data access
[tool] CRSprober
iOS 18.6 - Undocumented TCC Access to Multiple Privacy Domainsvia preflight=yes
Kigen eUICC issue (custom backdoor vs. FW update bug)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 21 matches
?? WHAT KIND OF HASH IS THIS
PostForum:MD5 hashes Posted: Sat May 16, 2009 12:44 am Subject: ?? WHAT KIND OF HASH IS THIS
access101
Replies: 0
Views: 6321




admin/$Py5HMvkAlRiRHrhAqdFHT9yokVEXkA//admin@wpopup.com


FOR WORDPRESS 1.7.4
PHP backdoor
PostForum:Php Posted: Fri May 15, 2009 2:35 am Subject: PHP backdoor
access101
Replies: 2
Views: 9297




you need netcat
http://netcat.sourceforge.net/download.php
they have a windows version to

than in terminal or if you got verison for windows same i think

nc -v -n -l -p 1234
PHP backdoor
PostForum:Php Posted: Thu May 14, 2009 1:42 am Subject: PHP backdoor
access101
Replies: 2
Views: 9297




alright i got shell

visit for the shell
http://pentestmonkey.net/tools/php-reverse-shell/

just need to find host that will run this
PHP backdoor
PostForum:Php Posted: Wed May 13, 2009 10:59 pm Subject: PHP backdoor
access101
Replies: 2
Views: 9297




is there a PHP trojan/backdoor?

im trying to upload a php file as a image to a forum

here are the details
-------------------------------------------------------------------
Many forums/sites, ...
the worst that can happen
PostForum:General discussion Posted: Fri May 08, 2009 1:36 pm Subject: the worst that can happen
access101
Replies: 3
Views: 8483




whats the worst that can happen for hacking a forum. Maybe internet ISP cuts off your internet off?
1 IPBorad hash
PostForum:All other hashes Posted: Wed May 06, 2009 12:49 am Subject: 1 IPBorad hash
access101
Replies: 1
Views: 5646




didnt get anything
v buletin hash with salt for u guys to crack! ^_^
PostForum:MD5 hashes Posted: Wed May 06, 2009 12:39 am Subject: v buletin hash with salt for u guys to crack! ^_^
access101
Replies: 2
Views: 6619




scanned and found nothing
Salted md5 hash
PostForum:MD5 hashes Posted: Mon May 04, 2009 12:48 pm Subject: Salted md5 hash
access101
Replies: 2
Views: 6239




impossible to crack salted hash

salt is required
Crack md5 hashes / help!
PostForum:MD5 hashes Posted: Mon May 04, 2009 8:59 am Subject: what about these
access101
Replies: 1128
Views: 1326074




please someone sovle these two

---------------------------------------------------
Hash: 728264c4415c0a27ffd55f5e909b74a7

Salt: ##*dJ
---------------------------------------------------
Hash: ...
deluxebb
PostForum:Sql injection Posted: Fri May 01, 2009 10:02 pm Subject: deluxebb
access101
Replies: 1
Views: 8294




is there a sql injection to get the salt?

here is a sql injection for the hash

misc.php?sub=profile&name=0')+UNION+SELECT+0,pass,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0+FROM%20de ...
PHP EXPLOIT
PostForum:Newbies corner Posted: Fri May 01, 2009 5:21 am Subject: PHP EXPLOIT
access101
Replies: 1
Views: 6334




how do i run a PHP exploit. i done everything...heres what i done

1.I ran a apache server with php installed and put the php file to /var/www folder . For windows i have wampserver and put the php ...
exploit
PostForum:Newbies corner Posted: Fri May 01, 2009 5:09 am Subject: exploit
access101
Replies: 3
Views: 6967




ok i was wondering do u or anybody have the exploit code to get the salt for VBBULLETIN OR DELUXEBB

i have a exploit here

#!/usr/bin/perl

use IO::Socket;


print q{
######## ...
BRUTEFORCE A HASH
PostForum:Newbies corner Posted: Thu Apr 30, 2009 6:38 pm Subject: BRUTEFORCE A HASH
access101
Replies: 1
Views: 5991




is there a way to bruteforce a salted hash to get 2 hashes

example say we brute force

92b018144d1b4fa38a820679d32a44b4

after we get 64 characthers?

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx ...
does DELUXEBB USE SALT IN THEIR MD5
PostForum:Newbies corner Posted: Thu Apr 30, 2009 6:17 pm Subject: does DELUXEBB USE SALT IN THEIR MD5
access101
Replies: 1
Views: 6181




does deluxebb implement salt in their hash?
hash
PostForum:MD5 hashes Posted: Thu Apr 30, 2009 6:15 pm Subject: hash
access101
Replies: 0
Views: 4820




------------------------------------------

Hash: 5c3706834b610838e0cc497e0e3bddfe
Salt: v^38v
------------------------------------------

hash 728264c4415c0a27ffd55f5e909b74a7

salt ##*d ...
Page 1 of 2 Goto page 1, 2Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.026 Seconds