Waraxe IT Security Portal
Login or Register
October 21, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 444
Members: 0
Total: 444
Full disclosure
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 12 matches
Weird Md5 hash?
PostForum:PhpBB Posted: Mon Jan 23, 2006 3:11 pm Subject: Weird Md5 hash?
lld_master
Replies: 4
Views: 11315




working on "the" forum? doesnt say anything to me. firstable tell what software you are working on (NOT the url where the forum is though).
and not every long hex string is a md5 hash.
so get the so ...
phpBB 2.0.16 XSS Remote Cookie Disclosure Exploit
PostForum:PhpBB Posted: Fri Jan 20, 2006 5:39 am Subject: Re: ????????????
lld_master
Replies: 108
Views: 190873




i used this exploit for { phpBB2 Plus 1.55 based on phpBB }
I send PM's to All Admins And i got this

Cookie: phpbb2mysql_data=a:2:{s:11:\"autologinid\";s:0:\"\";s:6:\"userid\";s:1:\"5\";}; phpbb2 ...
Crack this one?
PostForum:PhpBB Posted: Tue Jan 17, 2006 8:36 pm Subject: Crack this one?
lld_master
Replies: 0
Views: 8145




Can someone get me the hash?

3e31ab558c5337c90458be46df18606d

None could crack it man.... ^_^
I appriciate it in advance
question about cookie / md5 hash
PostForum:PhpBB Posted: Tue Jan 17, 2006 6:36 pm Subject: question about cookie / md5 hash
lld_master
Replies: 6
Views: 11358




no, thats a tool to convert a STRING to MD5...

from wat i see written above it goes likes this:

1-------------------------------------2=============3
USERS ACTUAL PASSWORD => MD5 => this ...
question about cookie / md5 hash
PostForum:PhpBB Posted: Tue Jan 17, 2006 4:39 pm Subject: question about cookie / md5 hash
lld_master
Replies: 6
Views: 11358




alright that explains alot.
Is there a way to convert it to MD5? without access to the DB?
Weird Md5 hash?
PostForum:PhpBB Posted: Tue Jan 17, 2006 2:23 pm Subject: Weird Md5 hash?
lld_master
Replies: 4
Views: 11315




I am wokring on the forum... and the HASH im getting looks like the following:

47128202943ccf2d68fbbf0.73346491

Can anyone help me understand what kind of pass hash this is?
Its not md5. yet, i ...
Using plain java script to get password hash...
PostForum:PhpBB Posted: Mon Jan 16, 2006 10:03 pm Subject: Using plain java script to get password hash...
lld_master
Replies: 8
Views: 15030




EDIT: for safety purposes the content of this post has been altered. Please PM the user for more info.
Using plain java script to get password hash...
PostForum:PhpBB Posted: Mon Jan 16, 2006 6:29 pm Subject: Using plain java script to get password hash...
lld_master
Replies: 8
Views: 15030




OK and for the final step:

IF you want to convert it to Serilized just put the cookie into a Text file
and replace(Ctrl-H) all of these with the following:

: => %3A
; => %3B
{ => %7 ...
Using plain java script to get password hash...
PostForum:PhpBB Posted: Mon Jan 16, 2006 6:10 pm Subject: Using plain java script to get password hash...
lld_master
Replies: 8
Views: 15030




OMG im a little newbish today. This worked PERFECTLY. (Didnt work before because I was being an idiot and I was Not clicking on Save my Login for next time I log in)

-_-

ladies and gentlemen thi ...
Using plain java script to get password hash...
PostForum:PhpBB Posted: Mon Jan 16, 2006 4:58 pm Subject: Using plain java script to get password hash...
lld_master
Replies: 8
Views: 15030




EDIT: for safety purposes the content of this post has been altered.
Using plain java script to get password hash...
PostForum:PhpBB Posted: Mon Jan 16, 2006 4:45 pm Subject: Using plain java script to get password hash...
lld_master
Replies: 8
Views: 15030




EDIT: for safety purposes the content of this post has been altered.
Using plain java script to get password hash...
PostForum:PhpBB Posted: Mon Jan 16, 2006 1:17 pm Subject: Using plain java script to get password hash...
lld_master
Replies: 8
Views: 15030




EDIT: for safety purposes the content of this post has been altered.
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.032 Seconds