Waraxe IT Security Portal
Login or Register
July 7, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 246
Members: 0
Total: 246
Full disclosure
iOS Activation Flaw Enables Pre-User Device Compromise andIdentity Exposure (iOS 18.5)
Remote DoS in httpx 1.7.0 – Out-of-Bounds Read via Malformed <title> Tag
CVE-2025-32978 - Quest KACE SMA Unauthenticated LicenseReplacement
CVE-2025-32977 - Quest KACE Unauthenticated Backup Upload
CVE-2025-32976 - Quest KACE SMA 2FA Bypass
CVE-2025-32975 - Quest KACE SMA Authentication Bypass
RansomLord (NG v1.0) anti-ransomware exploit tool
Disclosure Yealink Cloud vulnerabilities
: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
SEC Consult SA-20250612-0 :: Reflected Cross-Site Scripting in ONLYOFFICE Docs (DocumentServer)
SEC Consult SA-20250611-0 :: Undocumented Root Shell Access on SIMCom SIM7600G Modem
Call for Applications: ERCIM STM WG 2025 Award for the Best Ph.D. Thesis on Security and Trust Management (July 31, 2025)
SEC Consult SA-20250604-0 :: Local Privilege Escalation and Default Credentials in INDAMED - MEDICAL OFFICE (Medical practice management) Demo version
Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Defense in depth -- the Microsoft way (part 89): user grouppolicies don't deserve tamper protection
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 12 matches
mysql5 hash help
PostForum:All other hashes Posted: Sat May 02, 2009 10:45 pm Subject: mysql5 hash help
mehu
Replies: 0
Views: 4505




root:*542F0994E4371CC5E7EFD99A3A7560077595A5A4

Thank you in advance Smile
ipb hash with salt crack plz
PostForum:All other hashes Posted: Fri Apr 10, 2009 11:15 am Subject: ipb hash with salt crack plz
mehu
Replies: 5
Views: 8539




Sorry to disappoint you topy, but that isn't a valid hash. The forum is probably not vulnerable.
Offering a reward to crack a couple of IPB hashes
PostForum:All other hashes Posted: Fri Apr 10, 2009 11:13 am Subject: Offering a reward to crack a couple of IPB hashes
mehu
Replies: 1
Views: 5270




xxx:ce66ee58c625cea00929362a95bbc422:iX]`]
xxx:4317458736cdbf2bdf8684d98cdbb425:UH&$+
xxx:3a57aaa767c4e6d1fdae0114cd8ae61f:&{>TC
xxx:cc3680e019282ad05356492b0231aa8a:96(Ws
xxx:a9d41d162 ...
IPB <= 2.3.5 sql injection exploit (new version 1.2)
PostForum:Invision Power Board Posted: Tue Dec 23, 2008 3:14 pm Subject: IPB <= 2.3.5 sql injection exploit (new version 1.2)
mehu
Replies: 79
Views: 163297




Waraxe, can this exploit be used to fetch the users loginid (in some cases the display name differs from the login name) or email? And if so could you help me out with that?
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Mon Sep 29, 2008 4:35 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
mehu
Replies: 68
Views: 135212




Is it possible to fetch the users login name rather than memberid that will get me their display name. I'm asking because I have a admin pw cracked, but the admin's display name seems to differ from h ...
$20 to crack one account and $50 to teach me how u did it.
PostForum:All other hashes Posted: Sun Sep 28, 2008 7:55 pm Subject: $20 to crack one account and $50 to teach me how u did it.
mehu
Replies: 4
Views: 12100




Brute forcing salted hashes is pretty useless because of the high amount of time it takes, but I'd suggest you to try dictionary attack with good dictionaries.

Meanwhile I'll give those a try.
ipb password hash with salt [10 Euro]
PostForum:All other hashes Posted: Sun Sep 28, 2008 4:41 pm Subject: ipb password hash with salt [10 Euro]
mehu
Replies: 4
Views: 8375




Did you get these from a forum? And if so then what type of forum? (IPB, vBulletin, phpbb?)
Help with IPB database
PostForum:Invision Power Board Posted: Wed Sep 24, 2008 7:57 pm Subject: Help with IPB database
mehu
Replies: 6
Views: 11163




Works like a charm. Thanks! Smile
Help with IPB database
PostForum:Invision Power Board Posted: Wed Sep 24, 2008 4:09 pm Subject: Help with IPB database
mehu
Replies: 6
Views: 11163




Table ibf_members

id, name, mgroup, email, joined, ip_address, posts, title, allow_admin_mails, time_offset, hide_email, email_pm, email_full, skin, warn_level, warn_lastwarn, language, last_post, ...
Help with IPB database
PostForum:Invision Power Board Posted: Tue Sep 23, 2008 7:49 pm Subject: Help with IPB database
mehu
Replies: 6
Views: 11163




Table 'ibf_members' column 'name'

Table 'ibf_members_converge' columns 'converge_pass_hash' 'converge_pass_salt'
IPB <= 2.3.5 sql injection hash/salt fetching exploit
PostForum:Invision Power Board Posted: Tue Sep 23, 2008 2:18 pm Subject: IPB <= 2.3.5 sql injection hash/salt fetching exploit
mehu
Replies: 68
Views: 135212




I have to say, this is a brilliant script. Really well done waraxe! Smile
Help with IPB database
PostForum:Invision Power Board Posted: Tue Sep 23, 2008 2:16 pm Subject: Help with IPB database
mehu
Replies: 6
Views: 11163




Hey,

When extracting tables with usernames/hashes/salts from IPB database I have found that the passwords and salts are in two different tables. The problem is I can only get either username:email: ...
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.028 Seconds