Waraxe IT Security Portal
Login or Register
June 17, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 48
Members: 0
Total: 48
Full disclosure
SEC Consult SA-20250604-0 :: Local Privilege Escalation and Default Credentials in INDAMED - MEDICAL OFFICE (Medical practice management) Demo version
Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Defense in depth -- the Microsoft way (part 89): user grouppolicies don't deserve tamper protection
CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0
ERPNext v15.53.1 Stored XSS in bio Field Allows Arbitrary Script Execution in Profile Page
ERPNext v15.53.1 Stored XSS in user_image Field Allows Script Execution via Injected Image Path
Local information disclosure in apport and systemd-coredump
Stored XSS via File Upload - adaptcmsv3.0.3
IDOR "Change Password" Functionality - adaptcmsv3.0.3
Stored XSS "Send Message" Functionality - adaptcmsv3.0.3
Authenticated File Upload to RCE - adaptcmsv3.0.3
Stored XSS in "Description" Functionality - cubecartv6.5.9
Multiple Vulnerabilities in SAP GuiXT Scripting
CVE-2024-47081: Netrc credential leak in PSF requests library
Exploit CVE-2019-9978: Remote Code Execution in Social Warfare WordPress Plugin (<= 3.5.2)
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 31 matches
List of algorithms
PostForum:Hash related information Posted: Sat Jan 24, 2009 6:27 pm Subject: List of algorithms
waplet
Replies: 14
Views: 48383




omg,good info
Logged out
PostForum:Invision Power Board Posted: Fri Jan 23, 2009 12:35 pm Subject: Logged out
waplet
Replies: 4
Views: 8931




Omg,big thx waraxe , your the best Smile
Logged out
PostForum:Invision Power Board Posted: Fri Jan 23, 2009 5:54 am Subject: Logged out
waplet
Replies: 4
Views: 8931




Yeah,ill try to find , but if there is someone who really knows that?
Logged out
PostForum:Invision Power Board Posted: Thu Jan 22, 2009 8:04 pm Subject: Logged out
waplet
Replies: 4
Views: 8931




Is there a way , to make all users logged out in IPB. It will be good with password logger. Smile
I can conect to DB , and ACP!
hash?
PostForum:All other hashes Posted: Wed Jan 21, 2009 8:53 pm Subject: hash?
waplet
Replies: 2
Views: 6282




With 7.0.2 php-fusion blind sql injections, its so laggy, because , on each scan , its shows different nummbers and letters!
hash?
PostForum:All other hashes Posted: Wed Jan 21, 2009 7:30 pm Subject: hash?
waplet
Replies: 2
Views: 6282




what type of hash this is?
0e765440000001000000000
i got it from php fusion , but not sure about md5!
and could you crack
md5:salt
PostForum:All other hashes Posted: Mon Jan 19, 2009 6:08 pm Subject: md5:salt
waplet
Replies: 4
Views: 8113




no , its not the real one!
md5:salt
PostForum:All other hashes Posted: Mon Jan 19, 2009 5:45 pm Subject: md5:salt
waplet
Replies: 4
Views: 8113




boss::7f71b464977438729d6f55f222851daa:3nLy@
MD5:SALT
PostForum:All other hashes Posted: Sun Jan 18, 2009 2:36 pm Subject: MD5:SALT
waplet
Replies: 1
Views: 5231




kavi:dc488320995ed6a53a2a5f8546f72b3e:iVW"a
psniezek:444ab67f33c3d00f5d5ca9ede99ea134:&SeXR
Susami:7d59272eba43523ebd8aa266a75ad242:s1./]

Maybe its include poland names , because i dont reall ...
some md5:salt
PostForum:All other hashes Posted: Fri Jan 16, 2009 7:10 pm Subject: some md5:salt
waplet
Replies: 1
Views: 5331




md5(md5(salt).md5(pass))

avolknet:2a9b96d425b94966d2530e490786e219:]vu8y
sinnerman:bbdb10318074eeaa5a282a89188ec3ce:!bqN>
1:3b0829429067a6d2a42e3eb1974a9569:yGsKP
...
IPB <= 2.3.5 sql injection exploit (new version 1.2)
PostForum:Invision Power Board Posted: Tue Jan 13, 2009 9:17 pm Subject: IPB <= 2.3.5 sql injection exploit (new version 1.2)
waplet
Replies: 79
Views: 162754




But i dont understand , i think you can write the write answer,
$username = UNION select bla bla bla
echo $url.$usernam
plase waraxe
i dont know Blind sql injections ;(
IPB <= 2.3.5 sql injection exploit (new version 1.2)
PostForum:Invision Power Board Posted: Tue Jan 13, 2009 9:00 pm Subject: IPB <= 2.3.5 sql injection exploit (new version 1.2)
waplet
Replies: 79
Views: 162754




waraxe , can you add, members username finding , and id?
hash:salt comes from ipb_members_converge
maybe you can add something like
union select `members_l_username` from ibf_members where id = $id ...
Any one have idea how to decrypt...
PostForum:Javascript Posted: Tue Jan 13, 2009 3:41 pm Subject: Any one have idea how to decrypt...
waplet
Replies: 2
Views: 8917




base60_decode()?
[IPB][Tutorial]Password logger
PostForum:Invision Power Board Posted: Tue Jan 13, 2009 2:45 pm Subject: [IPB][Tutorial]Password logger
waplet
Replies: 12
Views: 63461




I got this !
$this->return_code = 'SUCCESS';
return;
But where to put
@include("conf_global.php");
$lg_username = strtolower($username);
$lg_password = ...
Salt
PostForum:Invision Power Board Posted: Sun Jan 11, 2009 8:15 pm Subject: Salt
waplet
Replies: 0
Views: 6174




Where is stored the salt from the nickname , because in ipb_members i cant find it ;(
Page 1 of 3 Goto page 1, 2, 3Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.036 Seconds