Waraxe IT Security Portal
Login or Register
January 8, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 55
Members: 0
Total: 55
Full disclosure
Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Panda3d v1.10.16 Uncontrolled Format String in Panda3D egg-mkfont Allows Stack Memory Disclosure
Panda3d v1.10.16 egg-mkfont Stack Buffer Overflow
Panda3d v1.10.16 deploy-stub Unbounded Stack Allocation Leading to Uninitialized Memory
MongoDB v8.3.0 Integer Underflow in LMDB mdb_load
Bioformats v8.3.0 Untrusted Deserialization of Bio-Formats Memoizer Cache Files
Bioformats v8.3.0 Improper Restriction of XML External Entity Reference in Bio-Formats Leica Microsystems XML Parser
MongoDB v8.3.0 Heap Buffer Underflow in OpenLDAP LMDB mdb_load
zlib v1.3.1.2 Global Buffer Overflow in TGZfname() of zlib untgz Utility via Unbounded strcpy() on User-Supplied Archive Name
SigInt-Hombre v1 / dynamic Suricata detection rules from real-time threat feeds
Security Vulnerability in Koller Secret: Real Hidden App(com.koller.secret.hid emyphoto)
Linux Kernel Block Subsystem Vulnerabilities
[KIS-2025-14] PKP-WAL <= 3.5.0-1 Login Cross-Site RequestForgery Vulnerability
[KIS-2025-13] PKP-WAL <= 3.5.0-3 (X-Forwarded-Host) LESS Code Injection Vulnerability
[KIS-2025-12] PKP-WAL <= 3.5.0-1 (baseColour) LESS CodeInjection Vulnerability
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 31 matches
List of algorithms
PostForum:Hash related information Posted: Sat Jan 24, 2009 6:27 pm Subject: List of algorithms
waplet
Replies: 14
Views: 49734




omg,good info
Logged out
PostForum:Invision Power Board Posted: Fri Jan 23, 2009 12:35 pm Subject: Logged out
waplet
Replies: 4
Views: 9487




Omg,big thx waraxe , your the best Smile
Logged out
PostForum:Invision Power Board Posted: Fri Jan 23, 2009 5:54 am Subject: Logged out
waplet
Replies: 4
Views: 9487




Yeah,ill try to find , but if there is someone who really knows that?
Logged out
PostForum:Invision Power Board Posted: Thu Jan 22, 2009 8:04 pm Subject: Logged out
waplet
Replies: 4
Views: 9487




Is there a way , to make all users logged out in IPB. It will be good with password logger. Smile
I can conect to DB , and ACP!
hash?
PostForum:All other hashes Posted: Wed Jan 21, 2009 8:53 pm Subject: hash?
waplet
Replies: 2
Views: 6700




With 7.0.2 php-fusion blind sql injections, its so laggy, because , on each scan , its shows different nummbers and letters!
hash?
PostForum:All other hashes Posted: Wed Jan 21, 2009 7:30 pm Subject: hash?
waplet
Replies: 2
Views: 6700




what type of hash this is?
0e765440000001000000000
i got it from php fusion , but not sure about md5!
and could you crack
md5:salt
PostForum:All other hashes Posted: Mon Jan 19, 2009 6:08 pm Subject: md5:salt
waplet
Replies: 4
Views: 8644




no , its not the real one!
md5:salt
PostForum:All other hashes Posted: Mon Jan 19, 2009 5:45 pm Subject: md5:salt
waplet
Replies: 4
Views: 8644




boss::7f71b464977438729d6f55f222851daa:3nLy@
MD5:SALT
PostForum:All other hashes Posted: Sun Jan 18, 2009 2:36 pm Subject: MD5:SALT
waplet
Replies: 1
Views: 5563




kavi:dc488320995ed6a53a2a5f8546f72b3e:iVW"a
psniezek:444ab67f33c3d00f5d5ca9ede99ea134:&SeXR
Susami:7d59272eba43523ebd8aa266a75ad242:s1./]

Maybe its include poland names , because i dont reall ...
some md5:salt
PostForum:All other hashes Posted: Fri Jan 16, 2009 7:10 pm Subject: some md5:salt
waplet
Replies: 1
Views: 5677




md5(md5(salt).md5(pass))

avolknet:2a9b96d425b94966d2530e490786e219:]vu8y
sinnerman:bbdb10318074eeaa5a282a89188ec3ce:!bqN>
1:3b0829429067a6d2a42e3eb1974a9569:yGsKP
...
IPB <= 2.3.5 sql injection exploit (new version 1.2)
PostForum:Invision Power Board Posted: Tue Jan 13, 2009 9:17 pm Subject: IPB <= 2.3.5 sql injection exploit (new version 1.2)
waplet
Replies: 79
Views: 169471




But i dont understand , i think you can write the write answer,
$username = UNION select bla bla bla
echo $url.$usernam
plase waraxe
i dont know Blind sql injections ;(
IPB <= 2.3.5 sql injection exploit (new version 1.2)
PostForum:Invision Power Board Posted: Tue Jan 13, 2009 9:00 pm Subject: IPB <= 2.3.5 sql injection exploit (new version 1.2)
waplet
Replies: 79
Views: 169471




waraxe , can you add, members username finding , and id?
hash:salt comes from ipb_members_converge
maybe you can add something like
union select `members_l_username` from ibf_members where id = $id ...
Any one have idea how to decrypt...
PostForum:Javascript Posted: Tue Jan 13, 2009 3:41 pm Subject: Any one have idea how to decrypt...
waplet
Replies: 2
Views: 9402




base60_decode()?
[IPB][Tutorial]Password logger
PostForum:Invision Power Board Posted: Tue Jan 13, 2009 2:45 pm Subject: [IPB][Tutorial]Password logger
waplet
Replies: 12
Views: 64673




I got this !
$this->return_code = 'SUCCESS';
return;
But where to put
@include("conf_global.php");
$lg_username = strtolower($username);
$lg_password = ...
Salt
PostForum:Invision Power Board Posted: Sun Jan 11, 2009 8:15 pm Subject: Salt
waplet
Replies: 0
Views: 6551




Where is stored the salt from the nickname , because in ipb_members i cant find it ;(
Page 1 of 3 Goto page 1, 2, 3Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.036 Seconds