 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 90
Members: 0
Total: 90
|
|
|
|
|
 |
Full disclosure |
 |
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
jade |
|
Replies: 2 |
Views: 8268 |
|
|
 |
 |
 |
|
ok thanks sm0ke .. so i do the same with with these ...admin'--
' or 0=0 --
" or 0=0 --
or 0=0 --
?hi or 1=1--
i type these only in the username ans leave the password empty ? |
|
|
|
jade |
|
Replies: 2 |
Views: 8268 |
|
|
 |
 |
 |
|
when i try a simple sql injection with ?OR 1=1-- .. should i type the whole ?OR 1=1-- thing in username and password ..or should i type OR 1 in username and 1-- in password? |
|
|
|
jade |
|
Replies: 0 |
Views: 6288 |
|
|
 |
 |
 |
|
is ther anyway to steal the admin cookie on phpbb 2.0.19 forum? the html is of !!
or should i scan the server for other vulnerabilities? |
|
|
|
jade |
|
Replies: 0 |
Views: 7192 |
|
|
 |
 |
 |
|
is it possible to steal the password of the admin running a phpBB 2.0.19 forum? is ther such cookie exploit to do that .. .. have already tried different exploits coded in perl..but none of them ... |
|
|
|
jade |
|
Replies: 6 |
Views: 14008 |
|
|
 |
 |
 |
|
lol! i thought that script was gona carry out some kindof dictionary attack .... y do i need an exploit if i am the admin ?  |
|
|
|
jade |
|
Replies: 6 |
Views: 14008 |
|
|
 |
 |
 |
|
it doesnt work..
tried this exploit tooo...
#!/usr/bin/perl
## r57phpbba2e2.pl - phpBB admin 2 exec exploit
## version 2 (based on user_sig_bbcode_uid bug)
## tested on 2.0.1 ... |
|
|
|
jade |
|
Replies: 6 |
Views: 14008 |
|
|
 |
 |
 |
|
that didnt work....
wat does this exploit do?
#!/usr/bin/perl
#########################################################
# _______ _______ ______ #
# |______ |______ | \ #
# _____ ... |
|
|
|
jade |
|
Replies: 6 |
Views: 14008 |
|
|
 |
 |
 |
|
this is my first post .. yea am trying hack into a phpbb 2.0.9 forum ....wat are the different ways to do that.. none of the exploits i used so far worked
#!/usr/bin/perl
use ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|