Realist

Monday 12 May 2014, 22:42  #1
Realist - Marabout online
th3ss
  • 5 posts

hi,
i finnaly got the source for the files but i dont know how to bypass
preg_replace("sqlite","X",$variable)
am i doing it right ?
is this even about bypassing preg_replace() or its something else?

Wednesday 14 May 2014, 20:50  #2
Realist - Marabout online
Anonymous

now, you’re doing it wrong. It’s about something else.
read this topic : http://www.root-me.org/spip.php?page=forum&id_thread=1743&lang=fr

Wednesday 14 October 2015, 13:20  #3
Realist - Marabout online
a3sc
  • 3 posts

Hello!
I found vulnerable comparsion in one of the dev files, but chance to generate weak hash is extremely low. Should i flood server with requests trying to generate weak hash or there is another way?

Sunday 7 August 2016, 10:30  #4
Realist - Marabout online
waleed nasser
  • 2 posts

I found vulnerable comparsion in one of the dev files, but chance to generate weak hash is extremely low. Should i flood server with requests trying to generate weak hash or there is another way?