Waraxe IT Security Portal
Login or Register
November 10, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 50
Members: 0
Total: 50
Full disclosure
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
APPLE-SA-10-28-2024-3 macOS Sequoia 15.1
APPLE-SA-10-28-2024-2 iOS 17.7.1 and iPadOS 17.7.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Invision Power Board -> IPB <= 2.3.5 sql injection exploit (new version 1.2) Goto page Previous1, 2, 3, 4, 5, 6Next
Post new topicReply to topic View previous topic :: View next topic
working on one but not so working on the other.
PostPosted: Tue Oct 14, 2008 3:31 pm Reply with quote
hshepherd
Beginner
Beginner
Joined: Oct 14, 2008
Posts: 3




I would like to thank waraxe for this great tool, I have retrieved an admin hash on one IPB site. But when I used it on the other IPB site, I get this following data:

Hash: ffffffffffffffffffffffffffffffff
Salt: €€€€€

This data is the same for the USER ID 1 to ID 10

Any ideas guys?

Thank you again, if no one knows about this its ok, im already grateful to get the other vulnerable IPB site. I'm just curious Smile
View user's profile Send private message
PostPosted: Tue Oct 14, 2008 3:56 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




Probably site is allready patched or there is some custom modification in IPB's code, which makes exploit fail ...
View user's profile Send private message Send e-mail Visit poster's website
thank you waraxe :)
PostPosted: Tue Oct 14, 2008 4:18 pm Reply with quote
hshepherd
Beginner
Beginner
Joined: Oct 14, 2008
Posts: 3




thank you waraxe Smile very good work on this website Smile
View user's profile Send private message
problem with the exploit
PostPosted: Sun Oct 19, 2008 1:53 pm Reply with quote
Andy1
Beginner
Beginner
Joined: Oct 19, 2008
Posts: 1




I think thiers a problem with forums.website.com, it tells me the site is vulnerable but they never work, any suggestions?.
View user's profile Send private message
PostPosted: Mon Oct 27, 2008 3:02 pm Reply with quote
VERTIGO
Advanced user
Advanced user
Joined: Sep 25, 2008
Posts: 87




you are very good coder.Thanks for these and now i will ask how to fix these vuln
View user's profile Send private message
PostPosted: Sat Nov 01, 2008 9:35 am Reply with quote
gyan007
Advanced user
Advanced user
Joined: Oct 17, 2008
Posts: 106




Anyway to find the prefix, if its not default?
View user's profile Send private message
PostPosted: Tue Nov 11, 2008 4:31 pm Reply with quote
Pinox
Regular user
Regular user
Joined: Dec 22, 2005
Posts: 13




Weird question I know but instead of using the script is there anyway to just directly get the hash and salt:

For example just like you can check if it is vuln

Code:
index.php?act=xmlout&do=check-display-name&name=%2527


Tried this:

Code:
index.php?act=xmlout&do=check-display-name&name=UNION SELECT 1,1 FROM ibf_members_converge WHERE converge_id=2 AND LENGTH(converge_pass_hash)=32


Doesnt seem to work but forum is definately vuln im just being lazy haha but would appreciate it if you could help if not i'll just have to use the script Razz
View user's profile Send private message
PostPosted: Wed Nov 12, 2008 1:52 am Reply with quote
_mranderson_
Valuable expert
Valuable expert
Joined: Oct 30, 2008
Posts: 51




nope, you can only use blind sql injection, that means you have to guess one char at a time. can't retrieve the whole hash at once
View user's profile Send private message
PostPosted: Mon Nov 17, 2008 9:32 am Reply with quote
Denis_Korablev
Beginner
Beginner
Joined: Nov 17, 2008
Posts: 4




waraxe, good job man!!!

waiting on 2.3.6 release... do you already have some ideas about it??? Embarassed Laughing
As is known 70% of forums patch themselves within 2-3 days after such beautiful releases, and in a week I belive 90% of big forums are patched. Rolling Eyes
View user's profile Send private message
PostPosted: Tue Nov 18, 2008 7:47 pm Reply with quote
JohnsonA
Regular user
Regular user
Joined: Nov 18, 2008
Posts: 6




Once I have the hash and the salt... How do I get into the forum as the admin?

I thought I could edit my cookie but it doesn't seem to work?

I don't know how to crack using a hash + salt either
View user's profile Send private message
exploit
PostPosted: Wed Nov 19, 2008 4:07 am Reply with quote
djpepis
Beginner
Beginner
Joined: Nov 19, 2008
Posts: 2




which program is working that exploit?
View user's profile Send private message
PostPosted: Wed Nov 19, 2008 4:30 am Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




JohnsonA wrote:
Once I have the hash and the salt... How do I get into the forum as the admin?

I thought I could edit my cookie but it doesn't seem to work?

I don't know how to crack using a hash + salt either


Yes, in most cases you need crack the hash first, because IPB can't be fooled with cookie crafting or something like that - you need plaintext password.
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Wed Nov 19, 2008 5:17 am Reply with quote
djpepis
Beginner
Beginner
Joined: Nov 19, 2008
Posts: 2




hello can anybody explain to me how this PHP exploits works? thanks!! i am new!!
View user's profile Send private message
PostPosted: Wed Nov 19, 2008 3:04 pm Reply with quote
JohnsonA
Regular user
Regular user
Joined: Nov 18, 2008
Posts: 6




waraxe wrote:
JohnsonA wrote:
Once I have the hash and the salt... How do I get into the forum as the admin?

I thought I could edit my cookie but it doesn't seem to work?

I don't know how to crack using a hash + salt either


Yes, in most cases you need crack the hash first, because IPB can't be fooled with cookie crafting or something like that - you need plaintext password.


Thanks,
Could you explain how to crack IPB passes?

I know how to do normal MD5's on milw0rm etc, but IPB you need to input the salt somewhere too I think?

Thanks
View user's profile Send private message
PostPosted: Fri Dec 05, 2008 12:05 am Reply with quote
Crypz
Beginner
Beginner
Joined: Dec 05, 2008
Posts: 2
Location: Estonia




application couldnt start because php4tl.dll was not found. re-installing the application may fix this problem, what am I missing?
View user's profile Send private message
IPB <= 2.3.5 sql injection exploit (new version 1.2)
www.waraxe.us Forum Index -> Invision Power Board
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 2 of 6
Goto page Previous1, 2, 3, 4, 5, 6Next
Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.049 Seconds