Waraxe IT Security Portal
Login or Register
January 30, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 95
Members: 0
Total: 95
Full disclosure
Username Enumeration - elggv6.3.3
Weak Password Complexity - elggv6.3.3
Paper-Exploiting XAMPP Installations
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
SEC Consult SA-20260126-2 :: UART Leaking Sensitive Data in dormakaba registration unit 9002 (PIN pad)
SEC Consult SA-20260126-1 :: Multiple Critical Vulnerabilities in dormakaba Access Manager
SEC Consult SA-20260126-0 :: Multiple Critical Vulnerabilities in dormakaba Kaba exos 9300
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
OpenMetadata <= 1.11.3 Authenticated SQL Injection
[REVIVE-SA-2026-001] Revive Adserver Vulnerabilities
Defense in depth -- the Microsoft way (part 95): the (shared)"Start Menu" is dispensable
Re: Multiple Security Misconfigurations and CustomerEnumeration Exposure in Convercent Whistleblowing Platform(EQS Group)
RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in RIOT ethos Serial Frame Parser
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 5 matches
phpBB exploit/s Question (noob question)
PostForum:PhpBB Posted: Sun Oct 23, 2005 4:00 pm Subject: phpBB exploit/s Question (noob question)
mcxar
Replies: 6
Views: 20535




That bunch of text is a perl exploit,read at the start:

#!/usr/bin/perl

Copy paste to a txt file and then change the .txt to .pl and run it,you need perl installed.
Plz plz plz crack this!
PostForum:Newbies corner Posted: Sun Oct 23, 2005 1:03 am Subject: Plz plz plz crack this!
mcxar
Replies: 17
Views: 32034




is it 23b55c

Nope,also if it was a 6 char pass would have been a lot easier to crack,must be at least higher then 8 characters since no one as cracked it yet.
phpbb hacking with a twist
PostForum:Newbies corner Posted: Sat Oct 22, 2005 12:10 am Subject: phpbb hacking with a twist
mcxar
Replies: 12
Views: 18774




If you have the money and can afford to pay 6-8 $$ try findnot (VPN service,same as proxys but fully functional and not so damn slow,also they dont save logs Wink ) , also they have like 30 server ...
Help with sql injection
PostForum:Newbies corner Posted: Tue Oct 18, 2005 1:07 am Subject: Help with sql injection
mcxar
Replies: 1
Views: 8294




Update,i found the file that precess the form:

include("includes/config.inc.php");

echo "<form action=\"?page=changepass\" method=\"post\">Login& ...
Help with sql injection
PostForum:Newbies corner Posted: Mon Oct 17, 2005 12:27 pm Subject: Help with sql injection
mcxar
Replies: 1
Views: 8294




I have tried all there is,like simple pocs but the database is not spiting any errors,can someone give me a hand since im kinda new to injection,here is the form:

<form action="?mod=chpass& ...
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.027 Seconds