Waraxe IT Security Portal
Login or Register
June 16, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 46
Members: 0
Total: 46
Full disclosure
SEC Consult SA-20250604-0 :: Local Privilege Escalation and Default Credentials in INDAMED - MEDICAL OFFICE (Medical practice management) Demo version
Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Defense in depth -- the Microsoft way (part 89): user grouppolicies don't deserve tamper protection
CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0
ERPNext v15.53.1 Stored XSS in bio Field Allows Arbitrary Script Execution in Profile Page
ERPNext v15.53.1 Stored XSS in user_image Field Allows Script Execution via Injected Image Path
Local information disclosure in apport and systemd-coredump
Stored XSS via File Upload - adaptcmsv3.0.3
IDOR "Change Password" Functionality - adaptcmsv3.0.3
Stored XSS "Send Message" Functionality - adaptcmsv3.0.3
Authenticated File Upload to RCE - adaptcmsv3.0.3
Stored XSS in "Description" Functionality - cubecartv6.5.9
Multiple Vulnerabilities in SAP GuiXT Scripting
CVE-2024-47081: Netrc credential leak in PSF requests library
Exploit CVE-2019-9978: Remote Code Execution in Social Warfare WordPress Plugin (<= 3.5.2)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 21 matches
?? WHAT KIND OF HASH IS THIS
PostForum:MD5 hashes Posted: Sat May 16, 2009 12:44 am Subject: ?? WHAT KIND OF HASH IS THIS
access101
Replies: 0
Views: 6098




admin/$Py5HMvkAlRiRHrhAqdFHT9yokVEXkA//admin@wpopup.com


FOR WORDPRESS 1.7.4
PHP backdoor
PostForum:Php Posted: Fri May 15, 2009 2:35 am Subject: PHP backdoor
access101
Replies: 2
Views: 9109




you need netcat
http://netcat.sourceforge.net/download.php
they have a windows version to

than in terminal or if you got verison for windows same i think

nc -v -n -l -p 1234
PHP backdoor
PostForum:Php Posted: Thu May 14, 2009 1:42 am Subject: PHP backdoor
access101
Replies: 2
Views: 9109




alright i got shell

visit for the shell
http://pentestmonkey.net/tools/php-reverse-shell/

just need to find host that will run this
PHP backdoor
PostForum:Php Posted: Wed May 13, 2009 10:59 pm Subject: PHP backdoor
access101
Replies: 2
Views: 9109




is there a PHP trojan/backdoor?

im trying to upload a php file as a image to a forum

here are the details
-------------------------------------------------------------------
Many forums/sites, ...
the worst that can happen
PostForum:General discussion Posted: Fri May 08, 2009 1:36 pm Subject: the worst that can happen
access101
Replies: 3
Views: 8297




whats the worst that can happen for hacking a forum. Maybe internet ISP cuts off your internet off?
1 IPBorad hash
PostForum:All other hashes Posted: Wed May 06, 2009 12:49 am Subject: 1 IPBorad hash
access101
Replies: 1
Views: 5519




didnt get anything
v buletin hash with salt for u guys to crack! ^_^
PostForum:MD5 hashes Posted: Wed May 06, 2009 12:39 am Subject: v buletin hash with salt for u guys to crack! ^_^
access101
Replies: 2
Views: 6467




scanned and found nothing
Salted md5 hash
PostForum:MD5 hashes Posted: Mon May 04, 2009 12:48 pm Subject: Salted md5 hash
access101
Replies: 2
Views: 6097




impossible to crack salted hash

salt is required
Crack md5 hashes / help!
PostForum:MD5 hashes Posted: Mon May 04, 2009 8:59 am Subject: what about these
access101
Replies: 1128
Views: 1299376




please someone sovle these two

---------------------------------------------------
Hash: 728264c4415c0a27ffd55f5e909b74a7

Salt: ##*dJ
---------------------------------------------------
Hash: ...
deluxebb
PostForum:Sql injection Posted: Fri May 01, 2009 10:02 pm Subject: deluxebb
access101
Replies: 1
Views: 8141




is there a sql injection to get the salt?

here is a sql injection for the hash

misc.php?sub=profile&name=0')+UNION+SELECT+0,pass,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0+FROM%20de ...
PHP EXPLOIT
PostForum:Newbies corner Posted: Fri May 01, 2009 5:21 am Subject: PHP EXPLOIT
access101
Replies: 1
Views: 6182




how do i run a PHP exploit. i done everything...heres what i done

1.I ran a apache server with php installed and put the php file to /var/www folder . For windows i have wampserver and put the php ...
exploit
PostForum:Newbies corner Posted: Fri May 01, 2009 5:09 am Subject: exploit
access101
Replies: 3
Views: 6794




ok i was wondering do u or anybody have the exploit code to get the salt for VBBULLETIN OR DELUXEBB

i have a exploit here

#!/usr/bin/perl

use IO::Socket;


print q{
######## ...
BRUTEFORCE A HASH
PostForum:Newbies corner Posted: Thu Apr 30, 2009 6:38 pm Subject: BRUTEFORCE A HASH
access101
Replies: 1
Views: 5856




is there a way to bruteforce a salted hash to get 2 hashes

example say we brute force

92b018144d1b4fa38a820679d32a44b4

after we get 64 characthers?

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx ...
does DELUXEBB USE SALT IN THEIR MD5
PostForum:Newbies corner Posted: Thu Apr 30, 2009 6:17 pm Subject: does DELUXEBB USE SALT IN THEIR MD5
access101
Replies: 1
Views: 6046




does deluxebb implement salt in their hash?
hash
PostForum:MD5 hashes Posted: Thu Apr 30, 2009 6:15 pm Subject: hash
access101
Replies: 0
Views: 4709




------------------------------------------

Hash: 5c3706834b610838e0cc497e0e3bddfe
Salt: v^38v
------------------------------------------

hash 728264c4415c0a27ffd55f5e909b74a7

salt ##*d ...
Page 1 of 2 Goto page 1, 2Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.029 Seconds