Waraxe IT Security Portal
Login or Register
February 12, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 212
Members: 0
Total: 212
Full disclosure
Asterisk Security Release 23.2.2
Asterisk Security Release 21.12.1
Asterisk Security Release 22.8.2
Asterisk Security Release 20.18.2
Certified Asterisk Security Release certified-20.7-cert9
SEC Consult SA-20260202-0 :: Multiple vulnerabilities in Native Instruments Native Access (MacOS)
CyberDanube Security Research 20260119-0 | Authenticated Command Injection in Phoenix Contact TC Router Series
[KIS-2026-03] Blesta <= 5.13.1 (2Checkout) Multiple PHP Object Injection Vulnerabilities
[KIS-2026-02] Blesta <= 5.13.1 (Admin Interface) Multiple PHP Object Injection Vulnerabilities
[KIS-2026-01] Blesta <= 5.13.1 (confirm_url) Reflected Cross-Site Scripting Vulnerability
Username Enumeration - elggv6.3.3
Weak Password Complexity - elggv6.3.3
Paper-Exploiting XAMPP Installations
CVE-2025-12758: Unicode Variation Selectors Bypass in 'validator' library (isLength)
Re: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 64 matches
setup-x86.exe
PostForum:General discussion Posted: Thu Dec 18, 2014 3:22 pm Subject: setup-x86.exe
sk8er
Replies: 1
Views: 14152




you can more especific , for example how ???

cmd SETUP-X86.EXE myProgram.exe ???

i not understand Smile
sql privilege escalation problem
PostForum:Shell commands injection Posted: Thu Dec 18, 2014 3:02 pm Subject: sql privilege escalation problem
sk8er
Replies: 1
Views: 17118




I sugges :

http://resources.infosecinstitute.com/anatomy-of-an-attack-gaining-reverse-shell-from-sql-injection/

Saludos
waraxe pls help me in complex blind SQL injection
PostForum:Sql injection Posted: Thu Dec 18, 2014 2:58 pm Subject: waraxe pls help me in complex blind SQL injection
sk8er
Replies: 2
Views: 19030




hey men Very Happy

you can see this video for help :

https://www.youtube.com/watch?v=_qxvJY6Zyac
Exploiting MYSQL Database driven by ASP?
PostForum:Newbies corner Posted: Sun Oct 06, 2013 6:14 pm Subject: Exploiting MYSQL Database driven by ASP?
sk8er
Replies: 3
Views: 14544




In this case, you can see :

http://nibblesec.org/files/MSAccessSQLi/MSAccessSQLi.html

its good.
Cracking Windows 7 NTLM
PostForum:Newbies corner Posted: Sat Oct 05, 2013 8:10 am Subject: Cracking Windows 7 NTLM
sk8er
Replies: 2
Views: 12838




or you can use :

https://crackstation.net/

saludos Smile
Bypassing \' MySQL- [help] WAF Evasion
PostForum:Sql injection Posted: Sat Sep 24, 2011 4:33 am Subject: Bypassing \' MySQL- [help] WAF Evasion
sk8er
Replies: 4
Views: 16403




one good option when bloking with internal errors, is use inference (BLIND SQL) for example, SQLiX available on :

https://www.owasp.org/index.php/Category:OWASP_SQLiX_Project

working with these ...
Bypassing \' MySQL- [help] WAF Evasion
PostForum:Sql injection Posted: Thu Sep 22, 2011 6:13 pm Subject: Bypassing \' MySQL- [help] WAF Evasion
sk8er
Replies: 4
Views: 16403




if you want to avoid a firewall, I recommend you use a encoded string for you query's, is only one idea Smile
Help- Extracting Data from Columns
PostForum:Sql injection Posted: Tue Sep 20, 2011 3:10 pm Subject: Help- Extracting Data from Columns
sk8er
Replies: 1
Views: 11597




you tried Blind Sql Injection ?, maybe with these tecnique you get a bit information.

in other hand you tried reading files and show in the UNION's comand

in this site show a one example :

...
Access in phpmyadmin
PostForum:Newbies corner Posted: Sun Sep 18, 2011 6:52 am Subject: Access in phpmyadmin
sk8er
Replies: 5
Views: 14493




one resource :

http://www.openwall.com/john/

it's useful en these cases
Access in phpmyadmin
PostForum:Newbies corner Posted: Sat Sep 17, 2011 10:36 pm Subject: Access in phpmyadmin
sk8er
Replies: 5
Views: 14493




in the "owned by uid 512" you should find the root user, or scaling the privilegies
Someone can find the admin DIrectory
PostForum:Newbies corner Posted: Sat Sep 17, 2011 5:54 am Subject: Someone can find the admin DIrectory
sk8er
Replies: 1
Views: 11708




I guess, a Web Scanning for the listed the directories.
Which programing language should I choose?
PostForum:Newbies corner Posted: Thu Sep 15, 2011 5:31 pm Subject: Which programing language should I choose?
sk8er
Replies: 4
Views: 15645




I guess phyton Smile
Exploiting MYSQL Database driven by ASP?
PostForum:Newbies corner Posted: Thu Sep 15, 2011 5:30 pm Subject: Exploiting MYSQL Database driven by ASP?
sk8er
Replies: 3
Views: 14544




"Microsoft OLE DB Provider for ODBC Drivers error '80040e14'

[Microsoft][ODBC Microsoft Access Driver] Syntax error (missing operator) in query expression 'fldUserLogin='admin ' or '1'='1'/*''.

...
Problem SQLi
PostForum:Sql injection Posted: Thu Sep 15, 2011 5:23 pm Subject: Problem SQLi
sk8er
Replies: 4
Views: 16374




you should trie with clausule "HAVING" form more results Very Happy
help me !!! sqli hard...
PostForum:Sql injection Posted: Thu Sep 15, 2011 5:21 pm Subject: help me !!! sqli hard...
sk8er
Replies: 1
Views: 10410




te sugiero que intentes con BLIND SQL.

I tried with the single cuote :

http://www.pampling.com/ficha_producto.php?id_producto=%27

Warning: mysql_fetch_assoc(): supplied argument is not a vali ...
Page 1 of 5 Goto page 1, 2, 3, 4, 5Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.047 Seconds