Waraxe IT Security Portal
Login or Register
November 23, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 79
Members: 0
Total: 79
Full disclosure
APPLE-SA-11-19-2024-5 macOS Sequoia 15.1.1
Local Privilege Escalations in needrestart
APPLE-SA-11-19-2024-4 iOS 17.7.2 and iPadOS 17.7.2
APPLE-SA-11-19-2024-3 iOS 18.1.1 and iPadOS 18.1.1
APPLE-SA-11-19-2024-2 visionOS 2.1.1
APPLE-SA-11-19-2024-1 Safari 18.1.1
Reflected XSS - fronsetiav1.1
XXE OOB - fronsetiav1.1
St. Poelten UAS | Path Traversal in Korenix JetPort 5601
St. Poelten UAS | Multiple Stored Cross-Site Scripting in SEH utnserver Pro
Apple web content filter bypass allows unrestricted access to blocked content (macOS/iOS/iPadOS/visionO S/watchOS)
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 208 matches
Hack this script - challenge
PostForum:Remote file inclusion Posted: Wed Jan 20, 2010 6:36 am Subject: Hack this script - challenge
gibbocool
Replies: 5
Views: 14132




nice work, I'm sure people who want a secure upload script will find this useful
Hack this script - challenge
PostForum:Remote file inclusion Posted: Tue Jan 19, 2010 11:25 am Subject: Hack this script - challenge
gibbocool
Replies: 5
Views: 14132




Hey all, this is a file upload script I had on my site previously, it has been hacked somehow and I can't figure out how! So here's a challenge - someone was able to upload php files.


<?php
...
Newbie.
PostForum:General discussion Posted: Sun Oct 11, 2009 11:51 pm Subject: Newbie.
gibbocool
Replies: 8
Views: 14916




Hey kyle, and hey mooka!
How to gain root on a hacked box
PostForum:Newbies corner Posted: Sun Oct 11, 2009 11:49 pm Subject: How to gain root on a hacked box
gibbocool
Replies: 5
Views: 10493




free hosting is quite secure, they go to special steps because they are giving almost public access to their boxes. however, even sites like www.hackthissite.org have been hacked before, so there's al ...
HELP THIS IS DRIVING ME CRAZY
PostForum:Newbies corner Posted: Tue Sep 29, 2009 1:38 am Subject: HELP THIS IS DRIVING ME CRAZY
gibbocool
Replies: 4
Views: 8062




Strange, could be something simple like your OS is hiding .pl files, or maybe virus scanner is deleting it.
What is symlink tools
PostForum:Newbies corner Posted: Thu Sep 03, 2009 10:36 am Subject: What is symlink tools
gibbocool
Replies: 2
Views: 9750




looks like some kind of web shell thing that uses a symlink exploit to retrieve files.
Dictionary Attack Questions
PostForum:General discussion Posted: Tue Sep 01, 2009 7:15 am Subject: Re: Dictionary Attack Questions
gibbocool
Replies: 2
Views: 8421




Difference between Hybrid Dictionary Attack and Dictionary Attack?

I have a Core2Duo @2.00GHz processor, and I get 480K passwords per seconds, is that good? When I check it says that only about 50% ...
what if the ACP link has been removed?
PostForum:Invision Power Board Posted: Tue Sep 01, 2009 7:11 am Subject: what if the ACP link has been removed?
gibbocool
Replies: 18
Views: 20162




You should install invision on your own server and then play around with moving the ACP and seeing if you can still find a link to it or something. You can also play around with other things that an a ...
Uploading Shell VIA IPB 2.3.5
PostForum:Invision Power Board Posted: Sun Aug 30, 2009 10:58 pm Subject: Uploading Shell VIA IPB 2.3.5
gibbocool
Replies: 1
Views: 10819




can you run any PHP code at all?
what if the ACP link has been removed?
PostForum:Invision Power Board Posted: Sun Aug 30, 2009 10:55 pm Subject: what if the ACP link has been removed?
gibbocool
Replies: 18
Views: 20162




Please help with this! isnt there a exploit that allows you to find out the location of the admin directory or something??
Nope. If the admin is really paranoid he might delete the admin CP whenever ...
Derp
PostForum:Newbies corner Posted: Thu Aug 27, 2009 9:08 am Subject: Derp
gibbocool
Replies: 1
Views: 6667




Why not spend a little time trying to understand what you are doing.

php exploit.php www.site.com /forum/
28Gb Wordlist (rar +-70MB)
PostForum:Wordlists Posted: Thu Aug 27, 2009 9:06 am Subject: 28Gb Wordlist (rar +-70MB)
gibbocool
Replies: 11
Views: 55331




Agreed, it's pretty useless.. might as well do brute force instead.
help hacking a forum..
PostForum:Newbies corner Posted: Mon Aug 24, 2009 12:35 am Subject: help hacking a forum..
gibbocool
Replies: 3
Views: 8984




/docs/CHANGELOG.html
How would i do this?
PostForum:vBulletin Board Posted: Sun Aug 23, 2009 1:32 am Subject: How would i do this?
gibbocool
Replies: 2
Views: 9623




it would probably require alot of learning on your part to get that XSS to do something useful for you. Basically you can get another user to create a new thread with it. If you want to try it, set up ...
help with this exploit please
PostForum:Invision Power Board Posted: Fri Aug 21, 2009 7:41 am Subject: help with this exploit please
gibbocool
Replies: 4
Views: 8271




You specify the arguments on the command line when u start the script.

eg: php exploit.php -attack 1 -url www.site.com/forum/ -uid 1

Pretty straight forward.
Page 1 of 14 Goto page 1, 2, 3 ... 12, 13, 14Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.050 Seconds