 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 444
Members: 0
Total: 444
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
working on "the" forum? doesnt say anything to me. firstable tell what software you are working on (NOT the url where the forum is though).
and not every long hex string is a md5 hash.
so get the so ... |
|
|
|
|
i used this exploit for { phpBB2 Plus 1.55 based on phpBB }
I send PM's to All Admins And i got this
Cookie: phpbb2mysql_data=a:2:{s:11:\"autologinid\";s:0:\"\";s:6:\"userid\";s:1:\"5\";}; phpbb2 ... |
|
|
|
|
Can someone get me the hash?
3e31ab558c5337c90458be46df18606d
None could crack it man.... ^_^
I appriciate it in advance |
|
|
|
|
no, thats a tool to convert a STRING to MD5...
from wat i see written above it goes likes this:
1-------------------------------------2=============3
USERS ACTUAL PASSWORD => MD5 => this ... |
|
|
|
|
alright that explains alot.
Is there a way to convert it to MD5? without access to the DB? |
|
|
|
|
I am wokring on the forum... and the HASH im getting looks like the following:
47128202943ccf2d68fbbf0.73346491
Can anyone help me understand what kind of pass hash this is?
Its not md5. yet, i ... |
|
|
|
|
EDIT: for safety purposes the content of this post has been altered. Please PM the user for more info. |
|
|
|
|
OK and for the final step:
IF you want to convert it to Serilized just put the cookie into a Text file
and replace(Ctrl-H) all of these with the following:
: => %3A
; => %3B
{ => %7 ... |
|
|
|
|
OMG im a little newbish today. This worked PERFECTLY. (Didnt work before because I was being an idiot and I was Not clicking on Save my Login for next time I log in)
-_-
ladies and gentlemen thi ... |
|
|
|
|
EDIT: for safety purposes the content of this post has been altered. |
|
|
|
|
EDIT: for safety purposes the content of this post has been altered. |
|
|
|
|
EDIT: for safety purposes the content of this post has been altered. |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|