|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 48
Members: 0
Total: 48
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Narsil |
|
Replies: 209 |
Views: 285281 |
|
|
|
|
|
|
|
|
|
Narsil |
|
Replies: 13 |
Views: 28895 |
|
|
|
|
|
|
#!/usr/bin/perl
## Invision Power Board SQL injection exploit by Coyl. CiaNeeD team.
## for stealing converge_pass_salt value from ipb database
## on some ipb forums it steals the legacy_password ... |
|
|
|
Narsil |
|
Replies: 209 |
Views: 285281 |
|
|
|
|
|
|
i hope you can help me cracking these md5 hashes. i've been trying for days now.
e04342109ba1433536e42c93de279760
32b47bbddcc1c410603fcaf62132fb88
987719d935c6d0667de61684336e11e0
02ed032378 ... |
|
|
|
|
he used for User id and password fake-logon.
"member_id=31337420" it could be another number
"pass_hash=" you see a blank password for the fake-member.
------------------------------------------- ... |
|
|
|
Narsil |
|
Replies: 209 |
Views: 285281 |
|
|
|
|
|
|
Someone can help me with these md5 hashes, i tried with cain, but without rt tables are very slow. tnxs
6871e9266b18f4812de9caaad0899394
a356e545b86864f6a56fec6699ef9447
mb52e9fe67232c0755446 ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|