![]() |
huh?
|
With a complicated series of exploits it's possible to get admin passhashes if HTML is enabled, and a brute force attack can make the MD5 hash into an actual string.
I've never done it, but I'm sure it's doable :) |
Quote:
You may not post replies You may not post attachments You may not edit your posts HTML code is OFF vB code is ON Smilies are ON [IMG] code is ON ...he turns his html off! :nervous: |
He or she is reading this thread. :) All he needs to do is look at his server logs, and wonder at the spike in traffic, and trace it back to this thread.
|
NanoEntity is cool... his distribution of hacks is irresponsible however :D
- miSt |
I can't believe some you morons are actually talking about attempting to crack a site in a public forum [regardless of that sites content]
Bravo |
1 Attachment(s)
Quote:
in case if anyone dont believe me.. check the attachment :P Edit: They even have gforce2k2's comments hack, I heartwholely doubt that gforce2k2 allow them upload his hacks at anywhere beside vb.org... |
Quote:
|
Quote:
|
I think I might sign up and provide him with some "code";):D
j/k I would never do that... 1.) I dont know how;) 2.) I am too paranoid:p Satan |
All times are GMT. The time now is 03:33 AM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|