 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 275
Members: 0
Total: 275
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
PPPLZZZ HELP! HOW I GET THIS?!??? |
 |
Posted: Mon Mar 16, 2009 2:24 pm |
|
|
BenMix2 |
Advanced user |

 |
|
Joined: Jan 08, 2009 |
Posts: 65 |
|
|
|
 |
 |
 |
|
How i Get Admin Hash By this Exploit:
http://www.milw0rm.com/exploits/1720
????
i have this screen:
Code: |
[~] SERVER : www.**.com
[~] PATH : /
[~] LOGIN : **
[~] PASSWORD : **
[~] TARGET : 0 - IPB 2.0.*
[~] Login ... [ DONE ]
[+] SID: d2c515493ef5ab89d36fad2626b5ed90
[~] Try get md5_check ... [ DONE ]
[+] MD5_CHECK : e15701d0d94a9360b5c37e9a21759dd2
[~] Create new message ... [ DONE ]
[~] Search message ... [ DONE ]
[+] SEARCHID: 382b843900f6104187496c1c647f6d6f
|
Where The MD5 OF THE ADMIN?!!? |
|
|
|
|
Posted: Mon Mar 16, 2009 3:52 pm |
|
|
waraxe |
Site admin |

 |
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
 |
 |
 |
|
This is Remote Command Execution exploit.
From exploit source code:
Code: |
while ()
{
print "Command for execute or 'exit' for exit # ";
while(<STDIN>)
{
$cmd=$_;
chomp($cmd);
exit() if ($cmd eq 'exit');
last;
}
&run($cmd);
}
|
Did you saw that message when exploit was running? |
|
|
|
|
Posted: Mon Mar 16, 2009 4:13 pm |
|
|
BenMix2 |
Advanced user |

 |
|
Joined: Jan 08, 2009 |
Posts: 65 |
|
|
|
 |
 |
 |
|
waraxe wrote: | This is Remote Command Execution exploit.
From exploit source code:
Code: |
while ()
{
print "Command for execute or 'exit' for exit # ";
while(<STDIN>)
{
$cmd=$_;
chomp($cmd);
exit() if ($cmd eq 'exit');
last;
}
&run($cmd);
}
|
Did you saw that message when exploit was running? |
Yes, I saw, what to write for Get the pass hash from the admin?! |
|
|
|
|
Posted: Mon Mar 16, 2009 5:38 pm |
|
|
BenMix2 |
Advanced user |

 |
|
Joined: Jan 08, 2009 |
Posts: 65 |
|
|
|
 |
 |
 |
|
plz help!!
What i need to do for GET THE ADMIN HASH ?|!?@!?@!?@? |
|
|
|
|
Posted: Mon Mar 16, 2009 7:37 pm |
|
|
waraxe |
Site admin |

 |
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
 |
 |
 |
|
BenMix2 wrote: | plz help!!
What i need to do for GET THE ADMIN HASH ?|!?@!?@!?@? |
Usually the attack goes this way:
-->webapp admin hash-->webapp admin plaintext pass-->
-->log in to admin interface-->find a way to the php code execution-->
-->find a way to operating system level-->local root exploit-->pwnd
Now ... think 1 minute ... you are advanced allready further than admin pass hash
And if you want that hash, then just write some php code for getting the job done - because this exploit gives you ability to execute arbitrary php code on remote server (assuming, that it's really working in your case) |
|
|
|
|
www.waraxe.us Forum Index -> Invision Power Board
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|