Waraxe IT Security Portal
Login or Register
January 16, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 70
Members: 0
Total: 70
Full disclosure
[REVIVE-SA-2026-001] Revive Adserver Vulnerabilities
Defense in depth -- the Microsoft way (part 95): the (shared)"Start Menu" is dispensable
Re: Multiple Security Misconfigurations and CustomerEnumeration Exposure in Convercent Whistleblowing Platform(EQS Group)
RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in RIOT ethos Serial Frame Parser
RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in tapslip6 Utility via Unbounded Device Path Construction
TinyOS 2.1.2 Stack-Based Buffer Overflow in mcp2200gpio
TinyOS 2.1.2 printfUART Global Buffer Overflow via UnboundedFormat Expansion
KL-001-2026-01: yintibao Fun Print Mobile Unauthorized Access via Context Hijacking
Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Panda3d v1.10.16 Uncontrolled Format String in Panda3D egg-mkfont Allows Stack Memory Disclosure
Panda3d v1.10.16 egg-mkfont Stack Buffer Overflow
Panda3d v1.10.16 deploy-stub Unbounded Stack Allocation Leading to Uninitialized Memory
MongoDB v8.3.0 Integer Underflow in LMDB mdb_load
Bioformats v8.3.0 Untrusted Deserialization of Bio-Formats Memoizer Cache Files
Bioformats v8.3.0 Improper Restriction of XML External Entity Reference in Bio-Formats Leica Microsystems XML Parser
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 13 matches
Using 2015 database details
PostForum:PhpBB Posted: Thu Feb 16, 2006 2:06 pm Subject: Using 2015 database details
is0t0pe
Replies: 3
Views: 12564




Link me to the exploit you used, becuse I myslef, am curious how to operate a 2015 remote command execution, I seem to be at a loss of how to enter certain commands, You mind helping me?

And an ans ...
phpbb, gaining admin access
PostForum:Newbies corner Posted: Tue Feb 14, 2006 2:07 pm Subject: phpbb, gaining admin access
is0t0pe
Replies: 1
Views: 9195




2.0.18??? Eh, use XSS, it's the only known way at the moment for version 2.0.18.....


www.kisobox.com
l
PostForum:PhpBB Posted: Sun Feb 12, 2006 1:04 am Subject: l
is0t0pe
Replies: 25
Views: 53167




I think its against the rules to pay people real money to hack sites...
phpBB 2.0.19 search.php and profile.php DOS Vulnerability
PostForum:PhpBB Posted: Mon Feb 06, 2006 4:54 pm Subject: phpBB 2.0.19 search.php and profile.php DOS Vulnerability
is0t0pe
Replies: 4
Views: 13047




works but so pointless in my eyes.
id rather get an admin password and dump the sql than dos the site.
I agreee, I DoS'd a couple 2.0.19 forums and it mad eliek 10 thousand users, but didnt crash t ...
phpBB 2.0.19 search.php and profile.php DOS Vulnerability
PostForum:PhpBB Posted: Fri Feb 03, 2006 2:19 pm Subject: phpBB 2.0.19 search.php and profile.php DOS Vulnerability
is0t0pe
Replies: 4
Views: 13047




Works for me.
md5 hashes
PostForum:MD5 hashes Posted: Mon Jan 16, 2006 2:14 pm Subject: md5 hashes
is0t0pe
Replies: 343
Views: 480194




hi guys i'm new on this forum i just don't know how to crack this md5 hashes so i thought you might help about this if there is a program that you guys use to crack md5 hashes tell me but i need first ...
Using plain java script to get password hash...
PostForum:PhpBB Posted: Mon Jan 16, 2006 2:09 pm Subject: Using plain java script to get password hash...
is0t0pe
Replies: 8
Views: 15400




I really like your idea, keep me updated and good luck
Crackers Nightmare
PostForum:PhpBB Posted: Mon Jan 16, 2006 1:10 am Subject: Crackers Nightmare
is0t0pe
Replies: 3
Views: 13760




Please do not double post. Read the rules.

I don't have time but please be patient. Have you tried www.plain-text.info if its offline it normally comes back after a while. You could try their IRC c ...
Crackers Nightmare
PostForum:PhpBB Posted: Sun Jan 15, 2006 12:26 am Subject: Crackers Nightmare
is0t0pe
Replies: 3
Views: 13760




I've tried Milw0rm, I've tried cain and able, i've tried just about all the crackers I know, and this nasty bugger remains a mystery, anyone wanna give it a try?

303df032eaf4e1690e47822585c2cca5
...
2.0.19 vulnerablilty ???
PostForum:PhpBB Posted: Fri Jan 13, 2006 12:49 am Subject: 2.0.19 vulnerablilty ???
is0t0pe
Replies: 2
Views: 10627




Anyone confirm this is working?
Running exploits...
PostForum:PhpBB Posted: Thu Jan 12, 2006 11:27 pm Subject: Running exploits...
is0t0pe
Replies: 5
Views: 11992




Quick question....

WHen copying and pasting a script into a text file to compile when does the script begin? Do I paste */ this and everything after? how do I know where to begin copying.. also, wh ...
Running exploits...
PostForum:PhpBB Posted: Tue Jan 10, 2006 2:18 pm Subject: Running exploits...
is0t0pe
Replies: 5
Views: 11992




Thanks, but nnow the next step is where to put my compiled exe...i guess the sploit already tells me, but then again maybe I'm just stupid...
Running exploits...
PostForum:PhpBB Posted: Tue Jan 10, 2006 3:00 am Subject: Running exploits...
is0t0pe
Replies: 5
Views: 11992




I am having a bit of trouble when it comes to exploiting, I can sucessfully exploit 2.0.11 very well, in fact I've nailed many sites witgh it, and am still learning, thing is, I'm trying to expand and ...
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.038 Seconds