Waraxe IT Security Portal
Login or Register
April 18, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 91
Members: 0
Total: 91
Full disclosure
83 vulnerabilities in Vasion Print / PrinterLogic
[CVE-2025-32102, CVE-2025-32103] SSRF and Directory Traversal in CrushFTP 10.7.1 and 11.1.0 (as well as legacy 9.x)
Re: APPLE-SA-03-11-2025-2 iOS 18.3.2 and iPadOS 18.3.2
[KIS-2025-01] UNA CMS <= 14.0.0-RC4 (BxBaseMenuSetAclLevel.ph p) PHP Object Injection Vulnerability
OXAS-ADV-2025-0001: OX App Suite Security Advisory
APPLE-SA-04-01-2025-1 watchOS 11.4
APPLE-SA-03-31-2025-11 visionOS 2.4
APPLE-SA-03-31-2025-10 tvOS 18.4
APPLE-SA-03-31-2025-9 macOS Ventura 13.7.5
APPLE-SA-03-31-2025-8 macOS Sonoma 14.7.5
APPLE-SA-03-31-2025-7 macOS Sequoia 15.4
APPLE-SA-03-31-2025-6 iOS 15.8.4 and iPadOS 15.8.4
APPLE-SA-03-31-2025-5 iOS 16.7.11 and iPadOS 16.7.11
APPLE-SA-03-31-2025-4 iPadOS 17.7.6
APPLE-SA-03-31-2025-3 iOS 18.4 and iPadOS 18.4
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 26 matches
Private crack SHA1 hash for 20 Dollars
PostForum:All other hashes Posted: Sat Sep 24, 2011 5:06 pm Subject: Private crack SHA1 hash for 20 Dollars
Hanna313
Replies: 0
Views: 5155




Hello,

I need my Mysql SHA1 hash cracked in private, send me a PM if you can help me out with this. I will pay 20 dollars for the result.
Joomla tinymce exploit
PostForum:Metasploit related Posted: Thu Mar 31, 2011 7:14 pm Subject: Joomla tinymce exploit
Hanna313
Replies: 1
Views: 13528




Anybody?
Joomla tinymce exploit
PostForum:Metasploit related Posted: Sun Mar 27, 2011 8:03 pm Subject: Joomla tinymce exploit
Hanna313
Replies: 1
Views: 13528




Hello guys,

When I want to use the joomla tinymce exploit (http://www.metasploit.com/modules/exploit/unix/webapp/joomla_tinybrowser) i have to define "URI".

but while exploiting metasploit says ...
Need md5 hash cracked
PostForum:All other hashes Posted: Mon Oct 12, 2009 9:05 pm Subject: Need md5 hash cracked
Hanna313
Replies: 4
Views: 7797




f897754a9a370c1589ab96216c2bd525:Naruto19

Thanks for your help!
Need md5 hash cracked
PostForum:All other hashes Posted: Mon Oct 12, 2009 6:38 pm Subject: Need md5 hash cracked
Hanna313
Replies: 4
Views: 7797




Thanks you very much!

Can you also help me with another one please: f897754a9a370c1589ab96216c2bd525
Need md5 hash cracked
PostForum:All other hashes Posted: Mon Oct 12, 2009 4:21 pm Subject: Need md5 hash cracked
Hanna313
Replies: 4
Views: 7797




Can somebody please crack this md5 hash please:

3a4f1924f4eed540aa2ca18b2e23a498
Help with XSS needed
PostForum:All other hashes Posted: Thu Oct 01, 2009 8:21 am Subject: Help with XSS needed
Hanna313
Replies: 5
Views: 10557




Thanks, these videos look very helpful!
Help with XSS needed
PostForum:All other hashes Posted: Wed Sep 30, 2009 1:41 pm Subject: Help with XSS needed
Hanna313
Replies: 5
Views: 10557




Yeah I did but they aren't very clear about how to exploit a XSS vulnerability.

So maybe someone personal has a suggestion...
Help with XSS needed
PostForum:All other hashes Posted: Wed Sep 30, 2009 12:17 pm Subject: Help with XSS needed
Hanna313
Replies: 5
Views: 10557




Hello,

I found a website which is vulnerable to XSS.
It is a webshop, and customers can check the status of their order by a login.
So I think that the login time is only temporarily.

When I e ...
Help with SQL injection
PostForum:All other hashes Posted: Wed Sep 23, 2009 10:40 am Subject: Help with SQL injection
Hanna313
Replies: 0
Views: 4904




hello,

I am testing a site that is vulnerable to SQL injection.

When I put a quote after www.example.com/id=118' it says you have an error in your SQL syntax.

The next thing i try is to get t ...
Help with SQL Injection version 3
PostForum:Sql injection Posted: Wed Apr 01, 2009 6:24 pm Subject: Help with SQL Injection version 3
Hanna313
Replies: 7
Views: 11259




Okey and is it possible to exploit such an error?
Help with SQL Injection version 3
PostForum:Sql injection Posted: Wed Apr 01, 2009 3:03 pm Subject: Help with SQL Injection version 3
Hanna313
Replies: 7
Views: 11259




The url on this website that requires login looks like this:

www.site.com/index.asp?lg=2

Is there any way to exploit this?

When I put magic quotes like this:

www.site.com/index.asp?lg='
...
Help with SQL Injection version 3
PostForum:Sql injection Posted: Wed Apr 01, 2009 2:10 pm Subject: Help with SQL Injection version 3
Hanna313
Replies: 7
Views: 11259




Hello Waraxe,

Can you please explain what you mean by this:

Of course, you can fetch some data - DATABASE(), USER(),etc.
INTO OUTFILE, LOAD_FILE() may be extremely useful too, if you have FILE ...
Help with SQL Injection version 3
PostForum:Sql injection Posted: Wed Apr 01, 2009 1:31 pm Subject: Help with SQL Injection version 3
Hanna313
Replies: 7
Views: 11259




Hello,

I found a site which is vulnerable for SQL injection, with a @@version query I found out that it runs mysql v3.0 with:

www.site.com/......id=131 and substring(@@version,1,1)=3

What can ...
How can I crack this?
PostForum:All other hashes Posted: Sat Jan 31, 2009 8:20 pm Subject: How can I crack this?
Hanna313
Replies: 0
Views: 4896




Hello,

I got these SMB (Server Message Block) results from cain:

NTLMv2 (NTLMSSP)
LM Hash: 562AD6A1AE68C0B3CDDABAA9FFA65BF3
NT Hash: C4DCA46CCEC32604FDF6DBE1E792EF65

NT Serv-Chall: 64CC10D ...
Page 1 of 2 Goto page 1, 2Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.041 Seconds