-
Posts
3673 -
Joined
-
Last visited
-
Days Won
19
Everything posted by Vlachs
-
sa ai noroc la copii prosti cum a avut noroc maicata de tine
-
doamne ce copil retard, de unde mortii tai ai iesit ma, ai tu treaba cu ce vinde omu aici, si in plus inainte sa cumperi ca prostu ceri screen,etc si intre noi ne cunoastem si garantam pentru el
-
cpanele, whm-uri,iplay.ro,etc, ceretii si o sa va faca rost
-
da nu e nici o metoda, sincer tine de inteligenta toata treaba cu deface si de imprejurari, nu o sa gasesti nici un tutorial despre cum sa faci deface pentru ca nu exista un tipar pentru deface-uri
-
e gata pregatit sa ii dai drumu in o pizda ?
-
www.comunicatemedia.rolistare_comunicate.php and 1=CAST(version() as int)
-
off:ce idiot esti baiatu on:as dori un articol despre postgresql injection
-
wow si u cum de ti-ai dat seama sau cum ai analizat u aplicatia ?
-
sincer eu unu nu as incerca nimic postat de tine si recomand si celor care au putina minte sa nu foloseasca
-
da nu stii cati ani am eu deci nu ai cum sa fii mai mare sau mai mic decat mine ps:ce imi place offtopicul
-
si doar nu aveti mai mult de 14,15 anisori si aveti pula, ce as vrea sa ma intalnesc cu voi fata in fata si sa vedem atunci cine, ce si cum
-
UDC - a program established to quickly restore the password for the hash value for different hashing algorithms (over 40: MD5, NTLM, DES, MD4, SHA, MySQL ...) [fastest] The attack on the mask: the simultaneous enumeration of 5000 passwords for Windows (NTLM) with an average speed exceeding 7,000,000 passwords per second on Pentium IV 3.4Ghz. More than five million words in the dictionary in a second on Pentium IV 3.4Ghz with restoring Windows-password.Hybrid attack is significantly advanced, with virtually the same speed as an ordinary direct enumeration of more than 6,000,000 p / s on Pentium IV 3.4Ghz with hacking password in Windows (NTLM). Available new method of correcting input errors, which you can recover your own password in a short time!Modern and functional interface (see screenshot, 28Kb), (all screens). Cryptanalytic program with a wide list of supported hash functions: MD (2, 4, 5); NTLM; Adler; CRC (16, 32, 16CC); XOR (16, 32); GOST R 34.11; Haval (128 - 256) ; Panama; RMD (128 - 320); SHA (160 - 512); Sapphire (128 -320); Snefru (128, 256); Tiger; Whirlpool.Unlimited number of hash values with little loss of velocity crowding. Hash arbitrarily long lines. ???????? API. Open API. You can expand the library's own function or use of UDC as a hash library in their products. The latest development of Hybrid Rainbow Tables will help to restore passwords of any length for very little time!The extreme power of a distributed attack is now in real time. Not just a cracker passwords and multiple cryptanalytic means. http://the-udc.com/files/udc3210.zip
-
List of algorithms in forum engines: ------------------------------------------------------------------------------------ -------------------------------------------------- ---------------------------------- | ???????? | ???????? ??????????? | ??????? | ??????? | | Name | Hash Algorithm | Prefix | Table | ------------------------------------------------------------------------------------ -------------------------------------------------- ---------------------------------- | Beehive | md5($pass) | ??? | USER | | Beehive | md5 ($ pass) | No | USER | | Intellect Board | md5($pass) | ??? | User | | Intellect Board | md5 ($ pass) | no | User | | IPB 1.xx | md5($pass) | ibf_ | members | | IPB 1.xx | md5 ($ pass) | ibf_ | members | | IPB 2.xx | md5(md5($salt).md5($pass)) | ibf_ | members_converge | | IPB 2.xx | md5 (md5 ($ salt). Md5 ($ pass)) | ibf_ | members_converge | | ITA Forum | md5($pass) | itaf_ | user | | ITA Forum | md5 ($ pass) | itaf_ | user | | MercuryBoard | md5($pass) | mb_ | users | | MercuryBoard | md5 ($ pass) | mb_ | users | | MiniBB | md5($pass) | minibbtable_ | users | | MiniBB | md5 ($ pass) | minibbtable_ | users | | myBB 1.2.x | md5(md5($salt).md5($pass)) | mybb_ | users | | MyBB 1.2.x | md5 (md5 ($ salt). Md5 ($ pass)) | mybb_ | users | | PBLang | md5($pass) | ??? ??? ??????? ???????????? ???????? ? ????? /db/members/???_????? | | PBLang | md5 ($ pass) | hash for each user is stored in a file / db / members / imya_yuzera | | phpBB | md5($pass) | phpbb_ | users | | PhpBB | md5 ($ pass) | phpbb_ | users | | phpBB > 3.0.0 RC5 | md5(phpbb3) | phpbb_ | users | | PhpBB> 3.0.0 RC5 | md5 (phpbb3) | phpbb_ | users | | PhpMyForum | md5($pass) | pmf_ | user | | PhpMyForum | md5 ($ pass) | pmf_ | user | | PunBB 1.2.x | SHA-1 | ??? | users | | PunBB 1.2.x | SHA-1 | no | users | | SMF 1.0.x | md5(HMAC) | smf_ | members | | SMF 1.0.x | md5 (HMAC) | smf_ | members | | SMF 1.1.x | sha1($username.$pass) | smf_ | members | | SMF 1.1.x | sha1 ($ username. $ Pass) | smf_ | members | | Snitz forums 2000 | SHA-256 | FORUM_ | MEMBERS | | Snitz forums 2000 | SHA-256 | FORUM_ | MEMBERS | | QuickSilver Forum | md5($pass) | qsf_ | users | | QuickSilver Forum | md5 ($ pass) | qsf_ | users | | UseBB | md5($pass) | usebb_ | members | | UseBB | md5 ($ pass) | usebb_ | members | | Vanilla | md5($pass) | LUM_ | User | | Vanilla | md5 ($ pass) | LUM_ | User | | VBulletin | md5(md5($pass).$salt) | ??? | user | | VBulletin | md5 (md5 ($ pass). $ Salt) | there | user | | VikingBoard | md5($pass) | vboard_ | member | | VikingBoard | md5 ($ pass) | vboard_ | member | | W-Agora | md5($pass) | [????????]_ | users | | W-Agora | md5 ($ pass) | [name] _ | users | | WWWThreads | DES(unix) | w3t_ | users | | WWWThreads | DES (unix) | w3t_ | users | | XMB Forum | md5($pass) | ??? | members | | XMB Forum | md5 ($ pass) | no | members | | YaBB | md5(HMAC) | yabbse_ | members | | YaBB | md5 (HMAC) | yabbse_ | members | ------------------------------------------------------------------------------------ -------------------------------------------------- ---------------------------------- List of algorithms used in CMS, online shops, etc.: ------------------------------------------------------------------------------------ -------------------------------------------------- ---------------------------------- | ???????? | ???????? ??????????? | ??????? | ??????? | | Name | Hash Algorithm | Prefix | Table | ------------------------------------------------------------------------------------ -------------------------------------------------- ---------------------------------- | AboCMS | md5($pass) | ??? | users | | AboCMS | md5 ($ pass) | No | users | | Bitrix | md5($pass) | ????????? ?? ??????? | | Bitrix | md5 ($ pass) | not able to check | | DaneoCMS | md5($pass) | dn[??????]_ | users | | DaneoCMS | md5 ($ pass) | dn [version] _ | users | | DataLife Engine | md5(md5($pass)) | dle_ | users | | DataLife Engine | md5 (md5 ($ pass)) | dle_ | users | | e107 | md5(md5($pass)) | e107_ | user | | E107 | md5 (md5 ($ pass)) | e107_ | user | | Joomla | md5($pass) | jos_ | users | | Joomla | md5 ($ pass) | jos_ | users | | Joomla >=1.0.13 | md5($pass.$salt) | jos_ | users | | Joomla> = 1.0.13 | md5 ($ pass. $ Salt) | jos_ | users | | Koobi CMS | md5($pass) | koobi_ | user | | Koobi CMS | md5 ($ pass) | koobi_ | user | | Koobi CMS >= 6 | md5(md5($pass)) | koobi_ | user | | Koobi CMS> = 6 | md5 (md5 ($ pass)) | koobi_ | user | | osCommerce | md5($salt.$pass) | ??? | ?ustomers | | OsCommerce | md5 ($ salt. $ Pass) | No | sustomers | | PHP-Nuke | md5($pass) | nuke_ | authors | | PHP-Nuke | md5 ($ pass) | nuke_ | authors | | RunCMS | sha1($username.$pass) | runcms_ | users | | RunCMS | sha1 ($ username. $ Pass) | runcms_ | users | | Slaed CMS | md5($pass) | slaed_ | users | | Slaed CMS | md5 ($ pass) | slaed_ | users | | Wordpress | md5($pass) | wp_ | users | | Wordpress | md5 ($ pass) | wp_ | users | | Wordpress >= 2.5 | md5(phpbb3) | wp_ | users | | Wordpress> = 2.5 | md5 (phpbb3) | wp_ | users | | XOOPS | md5($pass) | xoops_ | users | | XOOPS | md5 ($ pass) | xoops_ | users | ------------------------------------------------------------------------------------ -------------------------------------------------- ----------------------------------
-
sa imi trag palme da nush de unde naiba tot veniti
-
sincer nu inteleg nici o pl de aici
-
[x] MultiInjector.py http://www.sn3akers.com/downloads/MultiInjector.py [x] Palector_v1 http://rapidshare.com/files/245915644/Palector_v1.rar [x] sql_2005_inj_0.2_Final http://www.pcsec.org/UPLOAD/2009/2/sql_2005_inj_0.2_Final.zip [x] SQL_PwnZ_1_1 http://rapidshare.com/files/245911433/SQL_PwnZ__1_1.zip [x] sqlihelper_v2.7 http://rapidshare.com/files/245911131/sqlihelper_v2.7.zip [x] WITOOL_V0.1_081231 http://rapidshare.com/files/245908541/WITOOL_V0.1_081231.zip [x] SQL_Injection_Tool http://rapidshare.com/files/245912866/SQL_Injection_Tool.rar [x] SQL_Injection_Tool_v2.1a http://rapidshare.com/files/245912048/SQL_Injection_Tool_v2.1a.rar [x] sqlmap-0.6.4.tar http://rapidshare.com/files/245910308/sqlmap-0.6.4.tar.gz [x] pangolin_free_edition_2.1.2.924 http://down2.nosec.org/pangolin_free_edition_2.1.2.924.rar [x] MySQLi_Dumper_v.1.2_BIN http://rapidshare.com/files/178768473/MySQLi_Dumper_v.1.2_BIN.zip [x] MultiInjectorV0.3.tar http://www.packetstormsecurity.org/UNIX/scanners/MultiInjectorV0.3.tar.gz [x] Absinthe-1.4.1-Windows http://www.xfocus.net/tools/200609/Absinthe-1.4.1-Windows.zip
-
http://rapidshare.com/files/245875587/packetstorm_hacking_articles_all-at-rstcenter.com_.rar pass: rstcenter.com
-
asta e cam 27% din sql injection si "articolul" tau se defera la mysql injection
-
e facut de tine tutorialul ?
-
esti rau, nu inteleg dc faci misto de fata, ce nu are si ea dreptu sa stea pe rst sau ce ?