Waraxe IT Security Portal
Login or Register
January 7, 2026
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 152
Members: 0
Total: 152
Full disclosure
Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
Panda3d v1.10.16 Uncontrolled Format String in Panda3D egg-mkfont Allows Stack Memory Disclosure
Panda3d v1.10.16 egg-mkfont Stack Buffer Overflow
Panda3d v1.10.16 deploy-stub Unbounded Stack Allocation Leading to Uninitialized Memory
MongoDB v8.3.0 Integer Underflow in LMDB mdb_load
Bioformats v8.3.0 Untrusted Deserialization of Bio-Formats Memoizer Cache Files
Bioformats v8.3.0 Improper Restriction of XML External Entity Reference in Bio-Formats Leica Microsystems XML Parser
MongoDB v8.3.0 Heap Buffer Underflow in OpenLDAP LMDB mdb_load
zlib v1.3.1.2 Global Buffer Overflow in TGZfname() of zlib untgz Utility via Unbounded strcpy() on User-Supplied Archive Name
SigInt-Hombre v1 / dynamic Suricata detection rules from real-time threat feeds
Security Vulnerability in Koller Secret: Real Hidden App(com.koller.secret.hid emyphoto)
Linux Kernel Block Subsystem Vulnerabilities
[KIS-2025-14] PKP-WAL <= 3.5.0-1 Login Cross-Site RequestForgery Vulnerability
[KIS-2025-13] PKP-WAL <= 3.5.0-3 (X-Forwarded-Host) LESS Code Injection Vulnerability
[KIS-2025-12] PKP-WAL <= 3.5.0-1 (baseColour) LESS CodeInjection Vulnerability
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 11 matches
Exploits in phpBB 2.0.16
PostForum:PhpBB Posted: Thu Apr 20, 2006 1:23 am Subject: Exploits in phpBB 2.0.16
Indiction
Replies: 22
Views: 41092




Ok. So basically, you are logged in as the admin but you cannot reauth.

Realize now that you can still access the user CP...but in a weird way.
Every command must be issued via POST arguements thr ...
[Help] How these codes work !!!
PostForum:PhpBB Posted: Mon Apr 17, 2006 1:40 am Subject: [Help] How these codes work !!!
Indiction
Replies: 15
Views: 25170




Download the Windows MSI installer and run it.
Question about XSS Remote Cookie Disclosure Exploiting
PostForum:PhpBB Posted: Sat Apr 15, 2006 10:08 pm Subject: Re: Question about XSS Remote Cookie Disclosure Exploiting
Indiction
Replies: 4
Views: 9978




\"205340551044400583937258.37903461\"

I think this is supposed to by the hash, but why is it a floating point number?

There is a way to get around relogging in admin CP you know with just the SI ...
I need SQL Injection Exploit tool
PostForum:Sql injection Posted: Sat Apr 15, 2006 10:02 pm Subject: I need SQL Injection Exploit tool
Indiction
Replies: 6
Views: 18089




basic perl script for injection


#!/etc/bin/perl
# replace this line with #!C:\Perl\bin\perl on a Windows system
# provided AS-IS, no warranty, expressed or implied
# this program is comple ...
[Help] How these codes work !!!
PostForum:PhpBB Posted: Sat Apr 15, 2006 9:39 pm Subject: [Help] How these codes work !!!
Indiction
Replies: 15
Views: 25170




lol.

So basically when you submit a form, thats where an SQL injection goes. If index.php accepts an unsanatized arguement sid, then you type in

http://victim.haxme.com/directory/index.php?sid=U ...
Ok, i can login as an admin, but
PostForum:PhpBB Posted: Fri Apr 14, 2006 8:25 pm Subject: Ok, i can login as an admin, but
Indiction
Replies: 8
Views: 16933




Backup and store the database. It will probably be useful later.

Look for bugs in mods too, like EasyMOD which will let you write a modification and pretty much will let you, with a well written PH ...
A little help
PostForum:PhpBB Posted: Thu Apr 13, 2006 3:48 am Subject: A little help
Indiction
Replies: 1
Views: 7490




There are a lot of exploits for that version. Search on the web for some.
...I can't believe I'm doing this.
PostForum:Newbies corner Posted: Thu Apr 13, 2006 3:32 am Subject: ...I can't believe I'm doing this.
Indiction
Replies: 4
Views: 10902




I would recommend reading up on SQL injection;

http://www.google.com/search?q=SQL+injection

As well as learn some PHP;

http://www.google.com/search?q=PHP+tutorial

And some Perl;

http:// ...
Salt+md5 --> md5 --> plain text?
PostForum:Newbies corner Posted: Thu Apr 13, 2006 3:24 am Subject: Salt+md5 --> md5 --> plain text?
Indiction
Replies: 5
Views: 12003




Yes, you can crack salted hashes but its much harder.

First you must cryptanalyze the MD5 hash and determine its reverse. Now bear in mind that a salted md5 function is as follows:

md5(x ? c)
...
A lot of the md5 are uncrackables!!!!
PostForum:PhpBB Posted: Wed Apr 12, 2006 10:13 pm Subject: A lot of the md5 are uncrackables!!!!
Indiction
Replies: 6
Views: 12351




Basically if there is a salt, you cannot remove it at the MD5 step.

First you will have to know what the salt is. If the salt is say md(x+5), then you must first reverse the hash through bruteforci ...
EasyMOD decryption
PostForum:PhpBB Posted: Wed Apr 12, 2006 7:33 pm Subject: EasyMOD decryption
Indiction
Replies: 0
Views: 6803




I've been working on EasyMOD for phpBB, but I have'nt been able to reverse the blowfish encrypted FTP password. When I try it on a localhost setup, the password

"?‹rb%þ?Šy`4NUTTICK?&# ...
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.069 Seconds