Waraxe IT Security Portal
Login or Register
January 15, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 160
Members: 0
Total: 160
Full disclosure
[REVIVE-SA-2026-001] Revive Adserver Vulnerabilities
Defense in depth -- the Microsoft way (part 95): the (shared)"Start Menu" is dispensable
Re: Multiple Security Misconfigurations and CustomerEnumeration Exposure in Convercent Whistleblowing Platform(EQS Group)
RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in RIOT ethos Serial Frame Parser
RIOT OS 2026.01-devel-317 Stack-Based Buffer Overflow in tapslip6 Utility via Unbounded Device Path Construction
TinyOS 2.1.2 Stack-Based Buffer Overflow in mcp2200gpio
TinyOS 2.1.2 printfUART Global Buffer Overflow via UnboundedFormat Expansion
KL-001-2026-01: yintibao Fun Print Mobile Unauthorized Access via Context Hijacking
Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Panda3d v1.10.16 Uncontrolled Format String in Panda3D egg-mkfont Allows Stack Memory Disclosure
Panda3d v1.10.16 egg-mkfont Stack Buffer Overflow
Panda3d v1.10.16 deploy-stub Unbounded Stack Allocation Leading to Uninitialized Memory
MongoDB v8.3.0 Integer Underflow in LMDB mdb_load
Bioformats v8.3.0 Untrusted Deserialization of Bio-Formats Memoizer Cache Files
Bioformats v8.3.0 Improper Restriction of XML External Entity Reference in Bio-Formats Leica Microsystems XML Parser
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 33 matches
l
PostForum:PhpBB Posted: Tue Apr 18, 2006 6:47 pm Subject: l
syntax9
Replies: 25
Views: 53160




nice hijack. but for the original post, oobiin is looking at the same targetas iam. ill match whatever he offers, so the reward is dbl'd.
Question about XSS Remote Cookie Disclosure Exploiting
PostForum:PhpBB Posted: Tue Apr 18, 2006 6:45 pm Subject: Question about XSS Remote Cookie Disclosure Exploiting
syntax9
Replies: 4
Views: 9990




beastyarny if you know of a way with .18 / .19 with the new indentifier please let me know, ive been trying for months on a certain site and i always get the same cookies with the decial. 31 bit hash.
phpBB <= 2.0.19 XSS Remote Cookie Disclosure Exploit
PostForum:PhpBB Posted: Sat Mar 18, 2006 8:46 am Subject: phpBB <= 2.0.19 XSS Remote Cookie Disclosure Exploit
syntax9
Replies: 19
Views: 57800




there is no password there, the user doesnt have autolog in checked.

you need to retry and get some1 else that does use autologin
phpBB <= 2.0.19 XSS Remote Cookie Disclosure Exploit
PostForum:PhpBB Posted: Tue Mar 14, 2006 9:27 pm Subject: phpBB <= 2.0.19 XSS Remote Cookie Disclosure Exploit
syntax9
Replies: 19
Views: 57800




the code is for phpbb, never tried it with phpnuke.
How to hack phpBB forum if you dont know what version is it?
PostForum:PhpBB Posted: Mon Mar 13, 2006 2:44 pm Subject: How to hack phpBB forum if you dont know what version is it?
syntax9
Replies: 5
Views: 23306




should not really post URL's..

try exploits on the site..
at least attempt to exploit it with all versions. work with 2.019 and work backwards.
l
PostForum:PhpBB Posted: Sun Feb 12, 2006 11:53 am Subject: l
syntax9
Replies: 25
Views: 53160




check your pm's ><
exploit for 2.0.17
PostForum:PhpBB Posted: Thu Feb 09, 2006 9:33 pm Subject: exploit for 2.0.17
syntax9
Replies: 4
Views: 11204




><...
all of them do it minus like 2...
exploit for 2.0.17
PostForum:PhpBB Posted: Wed Feb 08, 2006 11:51 pm Subject: exploit for 2.0.17
syntax9
Replies: 4
Views: 11204




u didnt serach very hard considering a working explit for 2.0.17 is posted on PAGE 1 of PhpBB forums, on this EXACT page.

><
phpBB Style Changer/Demo Mod GET HASH EXPLOIT not complete?
PostForum:PhpBB Posted: Tue Feb 07, 2006 12:19 am Subject: phpBB Style Changer/Demo Mod GET HASH EXPLOIT not complete?
syntax9
Replies: 11
Views: 30175




phpBB Style Changer/Demo Mod-->GET HASH EXPLOIT


is why, didnt read the comment.
phpBB Style Changer/Demo Mod GET HASH EXPLOIT not complete?
PostForum:PhpBB Posted: Tue Feb 07, 2006 12:01 am Subject: phpBB Style Changer/Demo Mod GET HASH EXPLOIT not complete?
syntax9
Replies: 11
Views: 30175




doesnt work for me on any forums i have tried.
phpBB 2.0.19 search.php and profile.php DOS Vulnerability
PostForum:PhpBB Posted: Sat Feb 04, 2006 1:09 am Subject: phpBB 2.0.19 search.php and profile.php DOS Vulnerability
syntax9
Replies: 4
Views: 13046




works but so pointless in my eyes.
id rather get an admin password and dump the sql than dos the site.
Hash
PostForum:PhpBB Posted: Fri Feb 03, 2006 11:52 am Subject: Hash
syntax9
Replies: 4
Views: 14589




how do you get it? use a XSS cookie stealer.

once you get it crack it with a MD5 rainbow table, IE plain-text.info or milw0rm.com
phpBB <= 2.0.18 Remote XSS Cookie Disclosure Exploit
PostForum:PhpBB Posted: Tue Jan 31, 2006 11:41 pm Subject: phpBB <= 2.0.18 Remote XSS Cookie Disclosure Exploit
syntax9
Replies: 1
Views: 10622




/******************************************************************

phpBB <= 2.0.18 XSS Cookie Disclosure Proof of Concept
-- 'the html is on exploit'

original exploit by: Maksymilian Arcie ...
phpBB <= 2.0.18 Remote Dictionary Attack Tool
PostForum:PhpBB Posted: Tue Jan 31, 2006 11:41 pm Subject: phpBB <= 2.0.18 Remote Dictionary Attack Tool
syntax9
Replies: 8
Views: 14337




# Will be moved to tools section when completed. /str0ke

#!/usr/bin/perl
############################################
# Credits: Weakness and Xploit by DarkFig
# Affected ...
phpBB <= 2.0.19 XSS Remote Cookie Disclosure Exploit
PostForum:PhpBB Posted: Tue Jan 31, 2006 11:40 pm Subject: phpBB <= 2.0.19 XSS Remote Cookie Disclosure Exploit
syntax9
Replies: 19
Views: 57800




# to be used with cookie stealer located here: http://www.milw0rm.com/id.php?id=1103
# Make sure you change www.milw0rm.com to your domain. thnx. /str0ke
# Author: threesixthousan

/*
As long as ...
Page 1 of 3 Goto page 1, 2, 3Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.038 Seconds