The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#3
|
|||
|
|||
![]()
They use a MySQL injection that outputs admin hashes on the page. Then use vB hacking tools they can use their favourite dictionary list and find the password.
[edit] I know vB uses something like md5(md5($password . $salt)); but the tools hackers have circumvent it. If they have the hash, they can match it against a dictionary list. |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|