Waraxe IT Security Portal
Login or Register
December 15, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 74
Members: 0
Total: 74
Full disclosure
Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
8 vulnerabilities in AudioCodes Fax/IVR Appliance
2 vulnerabilities in Egovframe
[REVIVE-SA-2025-005] Revive Adserver Vulnerability
Missing Critical Security Headers in Legality WHISTLEBLOWING
[REVIVE-SA-2025-004] Revive Adserver Vulnerabilities
[REVIVE-SA-2025-003] Revive Adserver Vulnerabilities
[SYSS-2025-059]: Dell computer UEFI boot protection bypass
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
APPLE-SA-11-13-2025-1 Compressor 4.11.1
Re: 83 vulnerabilities in Vasion Print / PrinterLogic
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: : "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
runc container breakouts via procfs writes: CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881
OXAS-ADV-2025-0002: OX App Suite Security Advisory
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 17 matches
IPB <= 2.3.5 sql injection exploit (new version 1.2)
PostForum:Invision Power Board Posted: Fri Sep 26, 2008 2:37 pm Subject: IPB <= 2.3.5 sql injection exploit (new version 1.2)
martin1
Replies: 79
Views: 168820




if your gettin the error with forums your testing they have probs patched it !! red in this section there is a part on how to tell if it hasnt been patched. Rolling Eyes
IPB <= 2.3.5 sql injection exploit (new version 1.2)
PostForum:Invision Power Board Posted: Wed Sep 24, 2008 2:51 pm Subject: IPB <= 2.3.5 sql injection exploit (new version 1.2)
martin1
Replies: 79
Views: 168820




Nice one just what ive been waiting for !! Exclamation Exclamation Exclamation Exclamation Exclamation Laughing
some questions on ipb
PostForum:All other hashes Posted: Wed Sep 24, 2008 10:23 am Subject: some questions on ipb
martin1
Replies: 8
Views: 11567




Thanks waraxe Wink
some questions on ipb
PostForum:All other hashes Posted: Wed Sep 24, 2008 7:55 am Subject: some questions on ipb
martin1
Replies: 8
Views: 11567




any chance one of you's can gimme some advice with this. As the link you supplied dont work Confused
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Tue Sep 23, 2008 9:07 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 139996




nice one waraxe cant wait for it Twisted Evil
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 8:25 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 139996




Yeah isnt as easy to crack the salted ones Sad
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 7:33 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 139996




Yes Chedda thats exactly what i mean Razz.

Here Poison http://www.dll-files.com/dllindex/dll-files.shtml?oci Wink
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 6:36 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 139996




No thats not what i mean. Confused
Help me please!
PostForum:General discussion Posted: Mon Sep 22, 2008 4:52 pm Subject: Help me please!
martin1
Replies: 6
Views: 12851




What version of the exploit did you use ?


Try using the newer version that waraxe posted Wink

Plus when using it say the url is site.com/forums
you have to include forums in the target ur ...
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 3:53 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 139996




it there anyway to make it do more than one target ID ? Shocked
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 3:23 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 139996




What if the forum index is on a subdomain ? I think thats what he means. Rolling Eyes
IPB Hash's
PostForum:All other hashes Posted: Mon Sep 22, 2008 11:00 am Subject: IPB Hash's
martin1
Replies: 1
Views: 5877




------------------------------------------
Hash: a8b2ed32f6976cfab1343d0fe959a673
Salt: H['eb
------------------------------------------


------------------------------------------
Hash: 8bd02 ...
IpBoard
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 10:05 am Subject: IpBoard
martin1
Replies: 2
Views: 8144




What i need is when i go on the forum it shows me there DISPLAY name. But is this not diffrent from there login id ? And yeah i would be intrested in that Shocked
IpBoard
PostForum:Invision Power Board Posted: Sun Sep 21, 2008 11:49 pm Subject: IpBoard
martin1
Replies: 2
Views: 8144




hey there ive tried using the recent exploit thats been posting. Yes i got it to work after a bit of trouble. Anyhow is there any way of telling what the login id of the person u got the md5 for ? For ...
Hash
PostForum:MD5 hashes Posted: Sun Sep 21, 2008 11:25 pm Subject: Hash
martin1
Replies: 0
Views: 7508




Can someone have a go at this please ?


8bd02d41b9b205c5f2811c76b63c2c17


Thanks, Cool
Page 1 of 2 Goto page 1, 2Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.051 Seconds