 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 427
Members: 0
Total: 427
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
phpBB exploit/s Question (noob question) |
 |
Posted: Sun Oct 23, 2005 12:32 pm |
|
|
Michael_Brad |
Regular user |

 |
|
Joined: Oct 13, 2005 |
Posts: 5 |
|
|
|
 |
 |
 |
|
Alright thanks to all you guys I was able to gain administrative rights at a phpBB board using Live HTTP Headers and changing the "cookie". However I have noticed that there are other exploits for phpBB, that appear to be a bit more complicated. For example purposes;
http://www.milw0rm.com/id.php?id=1080
There are MANY similar tutorials such as that one, written with all that text (which is like reading Chinese to me). Anyone can explain how I use that? I am guessing I have to copy-paste that into my cookies.txt file?
A small explanation would be swell! Cheers |
|
|
|
|
Posted: Sun Oct 23, 2005 4:00 pm |
|
|
mcxar |
Regular user |

 |
|
Joined: Oct 17, 2005 |
Posts: 5 |
|
|
|
 |
 |
 |
|
That bunch of text is a perl exploit,read at the start:
#!/usr/bin/perl
Copy paste to a txt file and then change the .txt to .pl and run it,you need perl installed. |
|
|
|
|
Posted: Sun Oct 23, 2005 4:07 pm |
|
|
lak1s |
Regular user |

 |
|
Joined: Oct 22, 2005 |
Posts: 11 |
|
|
|
 |
 |
 |
|
And after installed perl and renamed to .pl, what to do?
Can soemone explain for noobs like me:p exaclty what to do TY |
|
|
|
|
Posted: Sun Oct 23, 2005 9:50 pm |
|
|
Chb |
Valuable expert |

 |
|
Joined: Jul 23, 2005 |
Posts: 206 |
Location: Germany |
|
|
 |
 |
 |
|
|
|
|
|
Posted: Tue Oct 25, 2005 4:29 pm |
|
|
Michael_Brad |
Regular user |

 |
|
Joined: Oct 13, 2005 |
Posts: 5 |
|
|
|
 |
 |
 |
|
LOL alright thanks, I'll download it. Could this possibly be a step forward to become a good hacker?  |
|
|
|
|
Posted: Wed Oct 26, 2005 9:15 pm |
|
|
g30rg3_x |
Active user |

 |
|
Joined: Jan 23, 2005 |
Posts: 31 |
Location: OutSide Of The PE |
|
|
 |
 |
 |
|
if you call this as a "hack", maybe..
but i think its most know as a "script kiddie/h4x0r activity" or people that just use other knowledges to getting in a server and say they are the "best"...
the best way to do the famous "step" to be a good hacker its just learning and learning...
its the famous brain of a hacker that just everything think and answers it "why?"..
if you wanna and a advice try to understand because the exploit works or why can i see the BD, why why why, its the best answer that every hacker make every day...
grettings from mexico and pardon me the bad writing |
|
|
|
|
Posted: Thu Feb 21, 2008 9:52 am |
|
|
James9r9r |
Regular user |

 |
|
Joined: Feb 21, 2008 |
Posts: 7 |
Location: hghdg |
|
|
 |
 |
 |
|
Start>Run>cmd...
cd C:\Perl\bin
C:\Perl\bin> nameofexploit.pl
Hope this helped |
|
|
|
|
www.waraxe.us Forum Index -> PhpBB
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|