 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 72
Members: 0
Total: 72
|
|
|
|
|
 |
Full disclosure |
 |
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
bleh |
|
Replies: 0 |
Views: 6077 |
|
|
 |
 |
 |
|
Vulnerable url:
http://www.example.com/product.aspx?idC=132'
Result:
Server Error in '/' Application.
http://h.imagehost.org/t/0382/error.jpg
Hackable?  |
|
|
|
bleh |
|
Replies: 4 |
Views: 12447 |
|
|
 |
 |
 |
|
So.. you want a program that every X minutes will beep? |
|
|
|
bleh |
|
Replies: 2 |
Views: 11280 |
|
|
 |
 |
 |
|
Great!  |
|
|
|
bleh |
|
Replies: 2 |
Views: 11280 |
|
|
 |
 |
 |
|
Im new to RFI, so excuse my noobness
Is this exploitable?
if (!defined('ROOT_DIR')) define('ROOT_DIR', realpath(dirname(__FILE__)).'/');
require_once ... |
|
|
|
bleh |
|
Replies: 11 |
Views: 27707 |
|
|
 |
 |
 |
|
does anyone got a working shell? Mine doesn't work  |
|
|
|
bleh |
|
Replies: 5 |
Views: 15314 |
|
|
 |
 |
 |
|
Look, what i wrote in my previous post:
find sql injection in UPDATE query, which deals with table you want to manipulate
So if you have sql injection in UPDATE query, which deals with polls ... |
|
|
|
bleh |
|
Replies: 10 |
Views: 13765 |
|
|
 |
 |
 |
|
Right now (april 2008) i don't know any fast methods for Vbulletin salted hashes cracking. Rainbow tables can't be used because of salting. Only options are wordlist method and bruteforce. And becau ... |
|
|
|
bleh |
|
Replies: 10 |
Views: 13765 |
|
|
 |
 |
 |
|
Right now (april 2008) i don't know any fast methods for Vbulletin salted hashes cracking. Rainbow tables can't be used because of salting. Only options are wordlist method and bruteforce. And becau ... |
|
|
|
bleh |
|
Replies: 5 |
Views: 15314 |
|
|
 |
 |
 |
|
That was what I first thought, just wanted to hear the experts. So, after more digging, I've found out another vuln. It's in a poll script, so there's a high probability of using the update command.. ... |
|
|
|
bleh |
|
Replies: 5 |
Views: 15314 |
|
|
 |
 |
 |
|
Hey
I've got this vulnerable url:
http://www.example.com/main/index.php?type=journal&kid=NULL+UNION+ALL+SELECT+1,concat(uid),3,4,5,6,7,8,9,10,11,12,13,14+FROM+admin--
I want ... |
|
|
|
bleh |
|
Replies: 9 |
Views: 23762 |
|
|
 |
 |
 |
|
its my footer.php and it gave me that...i dont know what to do with it
 |
|
|
|
bleh |
|
Replies: 9 |
Views: 23762 |
|
|
 |
 |
 |
|
Well... I decoded it with the same app and it gave me this:
<div class="clear"></div>
</div>
<div id="footer">
Communist design ... |
|
|
|
bleh |
|
Replies: 7 |
Views: 13792 |
|
|
 |
 |
 |
|
Use $_POST or $_COOKIE, because $_GET means, that webserver will log your payload ...
Oh crap, that's not good
I've rewritten it. Thanks!
$f = fopen("userprofile.php", & ... |
|
|
|
bleh |
|
Replies: 7 |
Views: 13792 |
|
|
 |
 |
 |
|
I have been running passwordpro for over 3 hours and nothing. I will just let it run. Meanwhile I'll do my hack in the middle of the night so there will be few people online
I've tested this b ... |
|
|
|
bleh |
|
Replies: 9 |
Views: 23762 |
|
|
 |
 |
 |
|
np  |
|
|
Page 1 of 2 |
Goto page 1, 2Next All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|