Waraxe IT Security Portal
Login or Register
November 5, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 118
Members: 0
Total: 118
Full disclosure
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
APPLE-SA-10-28-2024-3 macOS Sequoia 15.1
APPLE-SA-10-28-2024-2 iOS 17.7.1 and iPadOS 17.7.1
APPLE-SA-10-28-2024-1 iOS 18.1 and iPadOS 18.1
Open Redirect / Reflected XSS - booked-schedulerv2.8.5
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 26 matches
Private crack SHA1 hash for 20 Dollars
PostForum:All other hashes Posted: Sat Sep 24, 2011 5:06 pm Subject: Private crack SHA1 hash for 20 Dollars
Hanna313
Replies: 0
Views: 4752




Hello,

I need my Mysql SHA1 hash cracked in private, send me a PM if you can help me out with this. I will pay 20 dollars for the result.
Joomla tinymce exploit
PostForum:Metasploit related Posted: Thu Mar 31, 2011 7:14 pm Subject: Joomla tinymce exploit
Hanna313
Replies: 1
Views: 13079




Anybody?
Joomla tinymce exploit
PostForum:Metasploit related Posted: Sun Mar 27, 2011 8:03 pm Subject: Joomla tinymce exploit
Hanna313
Replies: 1
Views: 13079




Hello guys,

When I want to use the joomla tinymce exploit (http://www.metasploit.com/modules/exploit/unix/webapp/joomla_tinybrowser) i have to define "URI".

but while exploiting metasploit says ...
Need md5 hash cracked
PostForum:All other hashes Posted: Mon Oct 12, 2009 9:05 pm Subject: Need md5 hash cracked
Hanna313
Replies: 4
Views: 7225




f897754a9a370c1589ab96216c2bd525:Naruto19

Thanks for your help!
Need md5 hash cracked
PostForum:All other hashes Posted: Mon Oct 12, 2009 6:38 pm Subject: Need md5 hash cracked
Hanna313
Replies: 4
Views: 7225




Thanks you very much!

Can you also help me with another one please: f897754a9a370c1589ab96216c2bd525
Need md5 hash cracked
PostForum:All other hashes Posted: Mon Oct 12, 2009 4:21 pm Subject: Need md5 hash cracked
Hanna313
Replies: 4
Views: 7225




Can somebody please crack this md5 hash please:

3a4f1924f4eed540aa2ca18b2e23a498
Help with XSS needed
PostForum:All other hashes Posted: Thu Oct 01, 2009 8:21 am Subject: Help with XSS needed
Hanna313
Replies: 5
Views: 9668




Thanks, these videos look very helpful!
Help with XSS needed
PostForum:All other hashes Posted: Wed Sep 30, 2009 1:41 pm Subject: Help with XSS needed
Hanna313
Replies: 5
Views: 9668




Yeah I did but they aren't very clear about how to exploit a XSS vulnerability.

So maybe someone personal has a suggestion...
Help with XSS needed
PostForum:All other hashes Posted: Wed Sep 30, 2009 12:17 pm Subject: Help with XSS needed
Hanna313
Replies: 5
Views: 9668




Hello,

I found a website which is vulnerable to XSS.
It is a webshop, and customers can check the status of their order by a login.
So I think that the login time is only temporarily.

When I e ...
Help with SQL injection
PostForum:All other hashes Posted: Wed Sep 23, 2009 10:40 am Subject: Help with SQL injection
Hanna313
Replies: 0
Views: 4554




hello,

I am testing a site that is vulnerable to SQL injection.

When I put a quote after www.example.com/id=118' it says you have an error in your SQL syntax.

The next thing i try is to get t ...
Help with SQL Injection version 3
PostForum:Sql injection Posted: Wed Apr 01, 2009 6:24 pm Subject: Help with SQL Injection version 3
Hanna313
Replies: 7
Views: 10625




Okey and is it possible to exploit such an error?
Help with SQL Injection version 3
PostForum:Sql injection Posted: Wed Apr 01, 2009 3:03 pm Subject: Help with SQL Injection version 3
Hanna313
Replies: 7
Views: 10625




The url on this website that requires login looks like this:

www.site.com/index.asp?lg=2

Is there any way to exploit this?

When I put magic quotes like this:

www.site.com/index.asp?lg='
...
Help with SQL Injection version 3
PostForum:Sql injection Posted: Wed Apr 01, 2009 2:10 pm Subject: Help with SQL Injection version 3
Hanna313
Replies: 7
Views: 10625




Hello Waraxe,

Can you please explain what you mean by this:

Of course, you can fetch some data - DATABASE(), USER(),etc.
INTO OUTFILE, LOAD_FILE() may be extremely useful too, if you have FILE ...
Help with SQL Injection version 3
PostForum:Sql injection Posted: Wed Apr 01, 2009 1:31 pm Subject: Help with SQL Injection version 3
Hanna313
Replies: 7
Views: 10625




Hello,

I found a site which is vulnerable for SQL injection, with a @@version query I found out that it runs mysql v3.0 with:

www.site.com/......id=131 and substring(@@version,1,1)=3

What can ...
How can I crack this?
PostForum:All other hashes Posted: Sat Jan 31, 2009 8:20 pm Subject: How can I crack this?
Hanna313
Replies: 0
Views: 4598




Hello,

I got these SMB (Server Message Block) results from cain:

NTLMv2 (NTLMSSP)
LM Hash: 562AD6A1AE68C0B3CDDABAA9FFA65BF3
NT Hash: C4DCA46CCEC32604FDF6DBE1E792EF65

NT Serv-Chall: 64CC10D ...
Page 1 of 2 Goto page 1, 2Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.041 Seconds