|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
dune |
|
Replies: 1128 |
Views: 1217287 |
|
|
|
|
|
|
vBulletin 3.8.2
75cbe0da905d6139abb4ec29ee37a5cd:CYH
b5783b29a37e3047da6225d338d79e68:FP^
e0331e85714e45653a186faa38d6e596:#SY
9756f8b026a2459cd8192429ea090626:{IJ
Thanks in Advance! |
|
|
|
dune |
|
Replies: 2 |
Views: 8382 |
|
|
|
|
|
|
|
|
|
dune |
|
Replies: 2 |
Views: 8382 |
|
|
|
|
|
|
Difference between Hybrid Dictionary Attack and Dictionary Attack?
I have a Core2Duo @2.00GHz processor, and I get 480K passwords per seconds, is that good? When I check it says that only about 50% ... |
|
|
|
dune |
|
Replies: 3 |
Views: 5984 |
|
|
|
|
|
|
5a657aeb97cb8fca1ea9362ea156c465:1\\| the salt is actually 1\|
really? because it shows 1\\| in the database.. |
|
|
|
dune |
|
Replies: 3 |
Views: 5984 |
|
|
|
|
|
|
5a657aeb97cb8fca1ea9362ea156c465:1\|
75cbe0da905d6139abb4ec29ee37a5cd:CYH
They are vBulletin hashes so crack em using md5(md5($pass).$salt))
Whoever cracks these for me will get 10$ Pay-Pal, th ... |
|
|
|
dune |
|
Replies: 4 |
Views: 8737 |
|
|
|
|
|
|
Hash: 4f09d78334018ab175dc583d4db58086
Salt: uGA
Hash: 37e3155c7f7ef4b5f07370dcebcc137c
Salt: C\\b |
|
|
|
dune |
|
Replies: 1 |
Views: 8581 |
|
|
|
|
|
|
I got a whole SQL database with over 2.5k emails, salted md5 hashes, etc. But I also have a list of over 3k emails with their hashes and salts. |
|
|
|
dune |
|
Replies: 2 |
Views: 7789 |
|
|
|
|
|
|
This is not a vBulletin Exploit. Why do so many people think this is a vBulletin exploit. Are the skid turks advertizing it as a vBulletin exploit and selling it lawlz??
This is a simple public exp ... |
|
|
|
dune |
|
Replies: 2 |
Views: 7789 |
|
|
|
|
|
|
Basically I want to perform a SQL Injection on a 3.8.2 vBulletin forums, I want to use the following method to do this:
#!/usr/bin/perl
use IO::Socket;
print q{
################ ... |
|
|
|
dune |
|
Replies: 2 |
Views: 5729 |
|
|
|
|
|
|
ae1f61956a734e26ea759bab458b285f:rs-server
greetz WaKo
Thank you very much |
|
|
|
dune |
|
Replies: 2 |
Views: 5729 |
|
|
|
|
|
|
5a657aeb97cb8fca1ea9362ea156c465:1\\|
ae1f61956a734e26ea759bab458b285f:!l4
PLEASE SOMEONE HELP ME.. THIS IS URGENT!!! |
|
|
|
dune |
|
Replies: 0 |
Views: 4091 |
|
|
|
|
|
|
5a657aeb97cb8fca1ea9362ea156c465:1\\|
ae1f61956a734e26ea759bab458b285f:!l4
PLEASE SOMEONE HELP ME.. THIS IS URGENT!!! |
|
|
|
dune |
|
Replies: 4 |
Views: 10741 |
|
|
|
|
|
|
Thanks for the reply.
Im using:
"misc.php?sub=profile&name=0')+UNION+SELECT+0,pass,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0+FROM%20deluxebb_users%20WHERE%20(uid='".$user ;
It Ret ... |
|
|
|
dune |
|
Replies: 4 |
Views: 10741 |
|
|
|
|
|
|
how are you getting the hash? teach me please? |
|
|
|
dune |
|
Replies: 0 |
Views: 4192 |
|
|
|
|
|
|
Someone please help me crack this hash!!
5a657aeb97cb8fca1ea9362ea156c465: 1\\|
Here is the method to crack it in: md5(md5($pass).$salt)) |
|
|
Page 1 of 2 |
Goto page 1, 2Next All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|