Waraxe IT Security Portal
Login or Register
November 2, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 82
Members: 0
Total: 82
Full disclosure
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
APPLE-SA-10-28-2024-3 macOS Sequoia 15.1
APPLE-SA-10-28-2024-2 iOS 17.7.1 and iPadOS 17.7.1
APPLE-SA-10-28-2024-1 iOS 18.1 and iPadOS 18.1
Open Redirect / Reflected XSS - booked-schedulerv2.8.5
SEC Consult SA-20241024-0 :: Unauthenticated Path Traversal Vulnerability in Lawo AG - vsm LTC Time Sync (vTimeSync) (CVE-2024-6049)
[RESEARCH] DTLS 'ClientHello' Race Conditions in WebRTCImplementations
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 208 matches
Hack this script - challenge
PostForum:Remote file inclusion Posted: Wed Jan 20, 2010 6:36 am Subject: Hack this script - challenge
gibbocool
Replies: 5
Views: 14057




nice work, I'm sure people who want a secure upload script will find this useful
Hack this script - challenge
PostForum:Remote file inclusion Posted: Tue Jan 19, 2010 11:25 am Subject: Hack this script - challenge
gibbocool
Replies: 5
Views: 14057




Hey all, this is a file upload script I had on my site previously, it has been hacked somehow and I can't figure out how! So here's a challenge - someone was able to upload php files.


<?php
...
Newbie.
PostForum:General discussion Posted: Sun Oct 11, 2009 11:51 pm Subject: Newbie.
gibbocool
Replies: 8
Views: 14789




Hey kyle, and hey mooka!
How to gain root on a hacked box
PostForum:Newbies corner Posted: Sun Oct 11, 2009 11:49 pm Subject: How to gain root on a hacked box
gibbocool
Replies: 5
Views: 10405




free hosting is quite secure, they go to special steps because they are giving almost public access to their boxes. however, even sites like www.hackthissite.org have been hacked before, so there's al ...
HELP THIS IS DRIVING ME CRAZY
PostForum:Newbies corner Posted: Tue Sep 29, 2009 1:38 am Subject: HELP THIS IS DRIVING ME CRAZY
gibbocool
Replies: 4
Views: 8000




Strange, could be something simple like your OS is hiding .pl files, or maybe virus scanner is deleting it.
What is symlink tools
PostForum:Newbies corner Posted: Thu Sep 03, 2009 10:36 am Subject: What is symlink tools
gibbocool
Replies: 2
Views: 9686




looks like some kind of web shell thing that uses a symlink exploit to retrieve files.
Dictionary Attack Questions
PostForum:General discussion Posted: Tue Sep 01, 2009 7:15 am Subject: Re: Dictionary Attack Questions
gibbocool
Replies: 2
Views: 8343




Difference between Hybrid Dictionary Attack and Dictionary Attack?

I have a Core2Duo @2.00GHz processor, and I get 480K passwords per seconds, is that good? When I check it says that only about 50% ...
what if the ACP link has been removed?
PostForum:Invision Power Board Posted: Tue Sep 01, 2009 7:11 am Subject: what if the ACP link has been removed?
gibbocool
Replies: 18
Views: 19995




You should install invision on your own server and then play around with moving the ACP and seeing if you can still find a link to it or something. You can also play around with other things that an a ...
Uploading Shell VIA IPB 2.3.5
PostForum:Invision Power Board Posted: Sun Aug 30, 2009 10:58 pm Subject: Uploading Shell VIA IPB 2.3.5
gibbocool
Replies: 1
Views: 10765




can you run any PHP code at all?
what if the ACP link has been removed?
PostForum:Invision Power Board Posted: Sun Aug 30, 2009 10:55 pm Subject: what if the ACP link has been removed?
gibbocool
Replies: 18
Views: 19995




Please help with this! isnt there a exploit that allows you to find out the location of the admin directory or something??
Nope. If the admin is really paranoid he might delete the admin CP whenever ...
Derp
PostForum:Newbies corner Posted: Thu Aug 27, 2009 9:08 am Subject: Derp
gibbocool
Replies: 1
Views: 6613




Why not spend a little time trying to understand what you are doing.

php exploit.php www.site.com /forum/
28Gb Wordlist (rar +-70MB)
PostForum:Wordlists Posted: Thu Aug 27, 2009 9:06 am Subject: 28Gb Wordlist (rar +-70MB)
gibbocool
Replies: 11
Views: 54461




Agreed, it's pretty useless.. might as well do brute force instead.
help hacking a forum..
PostForum:Newbies corner Posted: Mon Aug 24, 2009 12:35 am Subject: help hacking a forum..
gibbocool
Replies: 3
Views: 8899




/docs/CHANGELOG.html
How would i do this?
PostForum:vBulletin Board Posted: Sun Aug 23, 2009 1:32 am Subject: How would i do this?
gibbocool
Replies: 2
Views: 9567




it would probably require alot of learning on your part to get that XSS to do something useful for you. Basically you can get another user to create a new thread with it. If you want to try it, set up ...
help with this exploit please
PostForum:Invision Power Board Posted: Fri Aug 21, 2009 7:41 am Subject: help with this exploit please
gibbocool
Replies: 4
Views: 8202




You specify the arguments on the command line when u start the script.

eg: php exploit.php -attack 1 -url www.site.com/forum/ -uid 1

Pretty straight forward.
Page 1 of 14 Goto page 1, 2, 3 ... 12, 13, 14Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.049 Seconds