 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 191
Members: 0
Total: 191
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
Really no1?
a script to check multiple mail domains /google/hotmail with pass provided? |
|
|
|
|
he's probarly using some kind of gpu bruteforcer, it's md5:salt so.... would be probarly minute's work.
edit/ goody = seconds work |
|
|
|
|
Merry Christmas to you to!!
And a happy newyear in advance
Justforyou |
|
|
|
|
Hacker is able to find new security holes, write his own tools when needed and develope new attack methods.
Probably any hacker starts as skriptkiddie, only small fraction will reach real hacker leve ... |
|
|
|
|
How did you go about cracking the pass?
Maybe used wrong algorithm command for your'e cracker?
Maybe admin changed pass in the meantime recheck passhash with database(original/new). |
|
|
|
|
Hi all,
I'm Justforyou and i was wondering if somebody could help me with this prob. i have.
So i hacked some torrentsite and got there Root/Directadmin panel everything and whent to the phpmyad ... |
|
|
|
|
this is probarly an windows-LM or windows-NTLM.
i'm trying to crack but it wqould be nice to know what would be the best guess for the length of the password.
Currently running al char. with max ... |
|
|
|
|
i dont know what kind it is.
It's 22 char long not known?
this is a list of algorithm's for 24 char. long.
Haval128(Base64)
MD2(Base64)
MD4(Base64)
MD5(Base64)
RipeMD128(Base64)
SNEFRU12 ... |
|
|
|
|
chmod 777 filename.ext then run exploit again |
|
|
|
|
hi all,
So i rooted this server and made a second root account and probarly got everything i wanted.
But now i got bored and am trying to decrypt the shadow file root line.
But it goes very s ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|