January 5, 2012 at 8:47 pm #7215mohaabParticipant
please read our new article
January 6, 2012 at 9:11 am #45128ChrisLazParticipant
Very interesting approach. Thank you for sharing.
January 6, 2012 at 9:58 am #45129j0rDyParticipant
nice hack! I always enjoy reading hacks like this, there fun and still very informative.
January 6, 2012 at 12:00 pm #45130vp75Participant
Thanks for sharing, also reading some of the articles which interests me……
January 6, 2012 at 2:34 pm #45131MrTuxracerParticipant
That’s the Hack-me “HackademicRTB1” provided by GhostInTheLab 🙂 I’ve posted a slightly different solution for it on my blog, but it works on this way too.
Thanks for sharing!
January 6, 2012 at 10:15 pm #45132SeenParticipant
Interesting, I’ll have to try this against my wordpress site, thanks.
January 7, 2012 at 7:03 pm #45133SephStormParticipant
Now I havent looked at the article yet, but my question is, what would be the approval for this? Would you need to contact WP or just have permission from the blog owner?
January 7, 2012 at 7:24 pm #45134hayabusaParticipant
@ SephStorm – you can host your own WordPress site, so pentesting an individual’s site wouldn’t require any permission from WordPress, just the owner of the site and / or the server owner / provider, if the site is hosted.
January 8, 2012 at 3:27 pm #45135AnonymousParticipant
Yeah just download and maybe use WAMP kit
January 9, 2012 at 2:44 am #45136MaXeParticipant
Some constructive feedback: ;D
* Hacking other sites on the same server and / or the Registrar is illegal unless you have explicit permission to hack any of these.
* The: “nmap -O” command will only make a “best guess” on what the target is running, and this highly depends on 1) The NMAP version, 2) The open ports, 3) Services
* Example: scanme.nmap.org can be anything from Windows to Linux, depending on if you use NMAP or Xprobe2, and of course also which version of NMAP. (This is just an example out of context.)
* About the hash(es) that were cracked, here’s some notes.
All of these three hashes, is “admin” in cleartext:
(Note: WordPress version 3.3.1)
These three hashes are also “admin” in cleartext:
(Note: WordPress version 2.8.4)
In case you wonder, $P$ comes from class_phpass.php:
$output = ‘$P$’; in the function gensalt_private($input); function.
* When an attacker comes across a kernel version like this: 188.8.131.52-127.fc12.1686, the last number (127) is often the distribution specific patch number. (Meaning security patches could’ve been applied nullifying known vulnerabilities for 184.108.40.206)
No offense intended of course, there’s just a few loose ends 😉
January 9, 2012 at 6:21 am #45137SephStormParticipant
learning is occurring. Wait a minute… is ninja-sec affiliated with ISI? These guys are getting around…
OKAY, the answer is on the resources page:
“Mohamed Ramadan is a researcher for InfoSec Institute. He also teaches Penetration Testing at Ninja-Sec.com.”
- You must be logged in to reply to this topic.