Waraxe IT Security Portal
Login or Register
June 15, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 67
Members: 0
Total: 67
Full disclosure
SEC Consult SA-20250604-0 :: Local Privilege Escalation and Default Credentials in INDAMED - MEDICAL OFFICE (Medical practice management) Demo version
Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Defense in depth -- the Microsoft way (part 89): user grouppolicies don't deserve tamper protection
CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0
ERPNext v15.53.1 Stored XSS in bio Field Allows Arbitrary Script Execution in Profile Page
ERPNext v15.53.1 Stored XSS in user_image Field Allows Script Execution via Injected Image Path
Local information disclosure in apport and systemd-coredump
Stored XSS via File Upload - adaptcmsv3.0.3
IDOR "Change Password" Functionality - adaptcmsv3.0.3
Stored XSS "Send Message" Functionality - adaptcmsv3.0.3
Authenticated File Upload to RCE - adaptcmsv3.0.3
Stored XSS in "Description" Functionality - cubecartv6.5.9
Multiple Vulnerabilities in SAP GuiXT Scripting
CVE-2024-47081: Netrc credential leak in PSF requests library
Exploit CVE-2019-9978: Remote Code Execution in Social Warfare WordPress Plugin (<= 3.5.2)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 65 matches
SHA1 hash
PostForum:All other hashes Posted: Mon Jan 19, 2009 6:53 pm Subject: SHA1 hash
oniric
Replies: 1
Views: 5834




No luck with this?
SHA1 hash
PostForum:All other hashes Posted: Fri Jan 16, 2009 11:46 am Subject: SHA1 hash
oniric
Replies: 1
Views: 5834




Hi guys, I have this SHA1 hash, hope someone can help me out! Thank you!

5dc1e6f2d3592722419704cb273f9f914edf3c3c

No salt.
MD5 Hash Question
PostForum:MD5 hashes Posted: Sat Aug 09, 2008 4:05 pm Subject: MD5 Hash Question
oniric
Replies: 10
Views: 16385




I tested the hash on my wordlists and I didn't find a collision..
MD5 Hash Question
PostForum:MD5 hashes Posted: Sat Aug 09, 2008 9:12 am Subject: MD5 Hash Question
oniric
Replies: 10
Views: 16385




You are using a Brute Force Attack, so you checking all the possible passwords in the key space generated by the character set of your choice and the desired range. Try first a dictionary attack? Do y ...
stuck in SQL injection
PostForum:Sql injection Posted: Fri Aug 08, 2008 9:40 pm Subject: stuck in SQL injection
oniric
Replies: 2
Views: 8841




This is also some good information.

http://www.webapptest.org/ms-access-sql-injection-cheat-sheet-EN.html
Can't find the number of columns!
PostForum:Sql injection Posted: Fri Aug 08, 2008 8:25 pm Subject: Can't find the number of columns!
oniric
Replies: 5
Views: 9438




Did you try n = 1?
Can't find the number of columns!
PostForum:Sql injection Posted: Fri Aug 08, 2008 6:43 pm Subject: Can't find the number of columns!
oniric
Replies: 5
Views: 9438




Try

news.php?id=409%20ORDER%20BY%20n%20--%20

and substitute n with a number. Try first n=4 and it this throws an error try n/2, if it doesn't give errors increment n. Using such a method you sho ...
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Fri Aug 08, 2008 2:48 pm Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 109993




I just download the same zip file and it's there Shocked
easy?
PostForum:Sql injection Posted: Fri Aug 08, 2008 12:36 pm Subject: easy?
oniric
Replies: 12
Views: 14778




So now you understand why I said it's necessary to be very creative ^_^ Also knowing javascript is extremely important!
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Fri Aug 08, 2008 12:31 pm Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 109993




Isn't it in the ext dir as I said?
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Fri Aug 08, 2008 11:10 am Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 109993




Look in you php ext dir for the file php_curl.dll ( I assume you use Windows ). If it's there then add to your php.ini the line

extension=php_curl.dll

The extension is included in php for window ...
MD5 Hash Question
PostForum:MD5 hashes Posted: Fri Aug 08, 2008 9:11 am Subject: MD5 Hash Question
oniric
Replies: 10
Views: 16385




Just looked more carefully at the screenshot and you put admin as the user name but you used the hash of another user.. Which are the two versions of SMF you attacked?
easy?
PostForum:Sql injection Posted: Thu Aug 07, 2008 9:19 pm Subject: easy?
oniric
Replies: 12
Views: 14778




Uch, it's a big big big big topic, believe me. You should read something about it. It's really interesting, and very very creative. I built a Javascript worm once, very funny indeed ^_^
Cutenews <= 1.4.5 usernames fetching exploit
PostForum:All other software Posted: Thu Aug 07, 2008 9:12 pm Subject: Cutenews <= 1.4.5 usernames fetching exploit
oniric
Replies: 27
Views: 109993




You have to enable curl extension from you php.ini. Decomment the related line.
easy?
PostForum:Sql injection Posted: Thu Aug 07, 2008 8:12 pm Subject: easy?
oniric
Replies: 12
Views: 14778




Look at this:

http://securityreason.com/securityalert/4000

read carefullly. It's a bit elaborated.
Page 1 of 5 Goto page 1, 2, 3, 4, 5Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.057 Seconds