Waraxe IT Security Portal
Login or Register
December 19, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 65
Members: 0
Total: 65
Full disclosure
[KIS-2024-07] GFI Kerio Control <= 9.4.5 Multiple HTTP Response Splitting Vulnerabilities
RansomLordNG - anti-ransomware exploit tool
APPLE-SA-12-11-2024-9 Safari 18.2
APPLE-SA-12-11-2024-8 visionOS 2.2
APPLE-SA-12-11-2024-7 tvOS 18.2
APPLE-SA-12-11-2024-6 watchOS 11.2
APPLE-SA-12-11-2024-5 macOS Ventura 13.7.2
APPLE-SA-12-11-2024-4 macOS Sonoma 14.7.2
APPLE-SA-12-11-2024-3 macOS Sequoia 15.2
APPLE-SA-12-11-2024-2 iPadOS 17.7.3
APPLE-SA-12-11-2024-1 iOS 18.2 and iPadOS 18.2
SEC Consult SA-20241211-0 :: Reflected Cross-Site Scripting in Numerix License Server Administration System Login
St. Poelten UAS | Multiple Vulnerabilities in ORing IAP
SEC Consult SA-20241204-0 :: Multiple Critical Vulnerabilities in Image Access Scan2Net (14 CVE)
Microsoft Warbird and PMP security research - technical doc
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 17 matches
IPB <= 2.3.5 sql injection exploit (new version 1.2)
PostForum:Invision Power Board Posted: Fri Sep 26, 2008 2:37 pm Subject: IPB <= 2.3.5 sql injection exploit (new version 1.2)
martin1
Replies: 79
Views: 157073




if your gettin the error with forums your testing they have probs patched it !! red in this section there is a part on how to tell if it hasnt been patched. Rolling Eyes
IPB <= 2.3.5 sql injection exploit (new version 1.2)
PostForum:Invision Power Board Posted: Wed Sep 24, 2008 2:51 pm Subject: IPB <= 2.3.5 sql injection exploit (new version 1.2)
martin1
Replies: 79
Views: 157073




Nice one just what ive been waiting for !! Exclamation Exclamation Exclamation Exclamation Exclamation Laughing
some questions on ipb
PostForum:All other hashes Posted: Wed Sep 24, 2008 10:23 am Subject: some questions on ipb
martin1
Replies: 8
Views: 10062




Thanks waraxe Wink
some questions on ipb
PostForum:All other hashes Posted: Wed Sep 24, 2008 7:55 am Subject: some questions on ipb
martin1
Replies: 8
Views: 10062




any chance one of you's can gimme some advice with this. As the link you supplied dont work Confused
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Tue Sep 23, 2008 9:07 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 129725




nice one waraxe cant wait for it Twisted Evil
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 8:25 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 129725




Yeah isnt as easy to crack the salted ones Sad
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 7:33 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 129725




Yes Chedda thats exactly what i mean Razz.

Here Poison http://www.dll-files.com/dllindex/dll-files.shtml?oci Wink
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 6:36 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 129725




No thats not what i mean. Confused
Help me please!
PostForum:General discussion Posted: Mon Sep 22, 2008 4:52 pm Subject: Help me please!
martin1
Replies: 6
Views: 11296




What version of the exploit did you use ?


Try using the newer version that waraxe posted Wink

Plus when using it say the url is site.com/forums
you have to include forums in the target ur ...
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 3:53 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 129725




it there anyway to make it do more than one target ID ? Shocked
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 3:23 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
martin1
Replies: 68
Views: 129725




What if the forum index is on a subdomain ? I think thats what he means. Rolling Eyes
IPB Hash's
PostForum:All other hashes Posted: Mon Sep 22, 2008 11:00 am Subject: IPB Hash's
martin1
Replies: 1
Views: 5070




------------------------------------------
Hash: a8b2ed32f6976cfab1343d0fe959a673
Salt: H['eb
------------------------------------------


------------------------------------------
Hash: 8bd02 ...
IpBoard
PostForum:Invision Power Board Posted: Mon Sep 22, 2008 10:05 am Subject: IpBoard
martin1
Replies: 2
Views: 7174




What i need is when i go on the forum it shows me there DISPLAY name. But is this not diffrent from there login id ? And yeah i would be intrested in that Shocked
IpBoard
PostForum:Invision Power Board Posted: Sun Sep 21, 2008 11:49 pm Subject: IpBoard
martin1
Replies: 2
Views: 7174




hey there ive tried using the recent exploit thats been posting. Yes i got it to work after a bit of trouble. Anyhow is there any way of telling what the login id of the person u got the md5 for ? For ...
Hash
PostForum:MD5 hashes Posted: Sun Sep 21, 2008 11:25 pm Subject: Hash
martin1
Replies: 0
Views: 6142




Can someone have a go at this please ?


8bd02d41b9b205c5f2811c76b63c2c17


Thanks, Cool
Page 1 of 2 Goto page 1, 2Next
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.047 Seconds