Waraxe IT Security Portal
Login or Register
March 31, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 277
Members: 0
Total: 277
Full disclosure
APPLE-SA-03-24-2026-10 Xcode 26.4
APPLE-SA-03-24-2026-9 Safari 26.4
APPLE-SA-03-24-2026-8 visionOS 26.4
APPLE-SA-03-24-2026-7 watchOS 26.4
APPLE-SA-03-24-2026-6 tvOS 26.4
APPLE-SA-03-24-2026-5 macOS Sonoma 14.8.5
APPLE-SA-03-24-2026-4 macOS Sequoia 15.7.5
APPLE-SA-03-24-2026-3 macOS Tahoe 26.4
APPLE-SA-03-24-2026-2 iOS 18.7.7 and iPadOS 18.7.7
APPLE-SA-03-24-2026-1 iOS 26.4 and iPadOS 26.4
[KIS-2026-05] MailEnable <= 10.54 Multiple Reflected Cross-Site Scripting Vulnerabilities
OpenClaw MEDIA: Protocol Prompt Injection - File Disclosure Bypassing Tool Permissions (Silently Fixed, Report Denied)
Dovecot Security Advisory OXDC-2026-0001
CVE-2026-33150, CVE-2026-33179: libfuse io_uring memory safety vulnerabilities (use-after-free, NULL deref)
snap-confine + systemd-tmpfiles = root (CVE-2026-3888)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 17 matches
IPB <= 2.3.5 sql injection exploit (new version 1.2)
PostForum:Invision Power Board Posted: Fri Sep 26, 2008 2:37 pm Subject: IPB <= 2.3.5 sql injection exploit (new version 1.2)
martin1
Replies: 79
Views: 171237




if your gettin the error with forums your testing they have probs patched it !! red in this section there is a part on how to tell if it hasnt been patched. Rolling Eyes
IPB <= 2.3.5 sql injection exploit (new version 1.2)
PostForum:Invision Power Board Posted: Wed Sep 24, 2008 2:51 pm Subject: IPB <= 2.3.5 sql injection exploit (new version 1.2)
martin1
Replies: 79
Views: 171237




Nice one just what ive been waiting for !! Exclamation Exclamation Exclamation Exclamation Exclamation Laughing
some questions on ipb
PostForum:All other hashes Posted: Wed Sep 24, 2008 10:23 am Subject: some questions on ipb
martin1
Replies: 8
Views: 11877




Thanks waraxe Wink
some questions on ipb
PostForum:All other hashes Posted: Wed Sep 24, 2008 7:55 am Subject: some questions on ipb
martin1
Replies: 8
Views: 11877




any chance one of you's can gimme some advice with this. As the link you supplied dont work Confused
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Tue Sep 23, 2008 9:07 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 142348




nice one waraxe cant wait for it Twisted Evil
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 8:25 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 142348




Yeah isnt as easy to crack the salted ones Sad
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 7:33 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 142348




Yes Chedda thats exactly what i mean Razz.

Here Poison http://www.dll-files.com/dllindex/dll-files.shtml?oci Wink
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 6:36 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 142348




No thats not what i mean. Confused
Help me please!
PostForum:General discussion Posted: Mon Sep 22, 2008 4:52 pm Subject: Help me please!
martin1
Replies: 6
Views: 13196




What version of the exploit did you use ?


Try using the newer version that waraxe posted Wink

Plus when using it say the url is site.com/forums
you have to include forums in the target ur ...
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 3:53 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 142348




it there anyway to make it do more than one target ID ? Shocked
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 3:23 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 142348




What if the forum index is on a subdomain ? I think thats what he means. Rolling Eyes
IPB Hash's
PostForum:All other hashes Posted: Mon Sep 22, 2008 11:00 am Subject: IPB Hash's
martin1
Replies: 1
Views: 6077




------------------------------------------
Hash: a8b2ed32f6976cfab1343d0fe959a673
Salt: H['eb
------------------------------------------


------------------------------------------
Hash: 8bd02 ...
IpBoard
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 10:05 am Subject: IpBoard
martin1
Replies: 2
Views: 8390




What i need is when i go on the forum it shows me there DISPLAY name. But is this not diffrent from there login id ? And yeah i would be intrested in that Shocked
IpBoard
PostForum:Invision Power Board Posted: Sun Sep 21, 2008 11:49 pm Subject: IpBoard
martin1
Replies: 2
Views: 8390




hey there ive tried using the recent exploit thats been posting. Yes i got it to work after a bit of trouble. Anyhow is there any way of telling what the login id of the person u got the md5 for ? For ...
Hash
PostForum:MD5 hashes Posted: Sun Sep 21, 2008 11:25 pm Subject: Hash
martin1
Replies: 0
Views: 7683




Can someone have a go at this please ?


8bd02d41b9b205c5f2811c76b63c2c17


Thanks, Cool
Page 1 of 2 Goto page 1, 2Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.037 Seconds