Skip to content

General Discussion

General discussions that don't fit in other categories. All topics must still follow forum rules.

19 Topics 165 Posts
  • Infosec News

    97
    1
    1 Votes
    97 Posts
    23k Views
    cycloneC
    Fortinet: FortiWeb Actively Exploited (again) [image: 1763653560091-7d7c2820-93bb-49dc-987e-db05cdd138da-image.png] Fortinet has issued an alert for CVE-2025-58034, a command injection bug in FortiWeb (CVSS 6.7) that is being weaponized. The flaw is an OS command injection issue in FortiWeb’s HTTP and CLI handling that allows arbitrary code execution, but only after an attacker has authenticated by some other method. Patches are available for all affected branches: • 8.0.0 to 8.0.1 → update to 8.0.2 • 7.6.0 to 7.6.5 → update to 7.6.6 • 7.4.0 to 7.4.10 → update to 7.4.11 • 7.2.0 to 7.2.11 → update to 7.2.12 • 7.0.0 to 7.0.11 → update to 7.0.12 Reported by Trend Micro’s Jason McFadyen, the flaw is already under active exploitation, prompting CISA to add it to the Known Exploited Vulnerabilities catalog with a federal patch deadline of November 25, 2025. Exploit chain activity: The situation escalates when paired with CVE-2025-64446, an authentication bypass silently patched by Fortinet in 8.0.2. According to Orange Cyberdefense and Rapid7, attackers are chaining the two bugs: bypassing authentication via CVE-2025-64446, then leveraging CVE-2025-58034 for command execution. This converts an authenticated-only issue into full unauthenticated RCE against unpatched appliances. Industry concern: Security teams have raised concerns about Fortinet’s decision to patch these flaws before publishing advisories. Analysts note that silent patching provides attackers with a window of advantage and leaves defenders unaware of what they're exposed to until exploitation is already underway. Action required: Apply the fixed releases immediately and audit FortiWeb instances for suspicious authenticated activity or anomalous command execution attempts, especially if systems were running vulnerable versions prior to Fortinet’s disclosure. Source: https://nvd.nist.gov/vuln/detail/CVE-2025-58034 https://thehackernews.com/2025/11/fortinet-warns-of-new-fortiweb-cve-2025.html
  • xiaopan forum

    1
    0 Votes
    1 Posts
    26 Views
    No one has replied
  • wordlists for a specific country

    3
    0 Votes
    3 Posts
    448 Views
    A1131A
    CN passwords International
  • Wordpress v6.8 Bcrypt - hmac-sha384

    1
    1 Votes
    1 Posts
    766 Views
    No one has replied
  • any one have database to brute for learning proposes?

    2
    0 Votes
    2 Posts
    651 Views
    D
    A "clean one" I wean that not all third pepole have it. I had a couple but that was along time ago. So if you please. I will be thankful
  • hashcat GPU benchmarks

    14
    0 Votes
    14 Posts
    2k Views
    cycloneC
    hashcat v7.0.0+4.2 benchmark (updated 2025/08/02@16:25) # gpu: nvidia rtx 4090 # manufacture: msi # model: suprim liquid x # settings: 450w stock settings # vbios: 95.02.18.00.52 # 08/02/2025 # NVIDIA-SMI 575.57.08 # CUDA Version: 12.9.1 # hashcat (v7.0.0+4.2) ./hashcat.bin -b hashcat (v7.0.0-4-g9727714cf) starting in benchmark mode Benchmarking uses hand-optimized kernel code by default. You can use it in your cracking session by setting the -O option. Note: Using optimized kernel code limits the maximum supported password length. To disable the optimized kernel code in benchmark mode, use the -w option. Initializing bridges. Please be patient...Initialized bridgesInitializing backend runtimes. Please be patient...Initialized backend runtimesInitializing backend devices. Please be patient...Initialized backend devicesCUDA API (CUDA 12.9) ==================== * Device #01: NVIDIA GeForce RTX 4090, 23688/24080 MB, 128MCU OpenCL API (OpenCL 3.0 CUDA 12.9.76) - Platform #1 [NVIDIA Corporation] ======================================================================= * Device #02: NVIDIA GeForce RTX 4090, skipped Benchmark relevant options: =========================== * --backend-devices=2 * --backend-devices-virtmulti=1 * --backend-devices-virthost=1 * --optimized-kernel-enable ------------------- * Hash-Mode 0 (MD5) ------------------- Speed.#01........: 164.2 GH/s (90.81ms) @ Accel:128 Loops:1024 Thr:896 Vec:8 ---------------------- * Hash-Mode 100 (SHA1) ---------------------- Speed.#01........: 58208.9 MH/s (73.51ms) @ Accel:64 Loops:1024 Thr:512 Vec:1 --------------------------- * Hash-Mode 1400 (SHA2-256) --------------------------- Speed.#01........: 21947.7 MH/s (91.50ms) @ Accel:15 Loops:1024 Thr:1024 Vec:4 --------------------------- * Hash-Mode 1700 (SHA2-512) --------------------------- Speed.#01........: 7476.6 MH/s (89.57ms) @ Accel:8 Loops:1024 Thr:640 Vec:1 ------------------------------------------------------------- * Hash-Mode 22000 (WPA-PBKDF2-PMKID+EAPOL) [Iterations: 4095] ------------------------------------------------------------- Speed.#01........: 2574.3 kH/s (88.52ms) @ Accel:7 Loops:1024 Thr:1024 Vec:1 ----------------------- * Hash-Mode 1000 (NTLM) ----------------------- Speed.#01........: 284.1 GH/s (73.54ms) @ Accel:192 Loops:1024 Thr:896 Vec:8 --------------------- * Hash-Mode 3000 (LM) --------------------- Speed.#01........: 155.7 GH/s (95.78ms) @ Accel:448 Loops:1024 Thr:256 Vec:1 -------------------------------------------- * Hash-Mode 5500 (NetNTLMv1 / NetNTLMv1+ESS) -------------------------------------------- Speed.#01........: 158.2 GH/s (77.39ms) @ Accel:96 Loops:1024 Thr:1024 Vec:1 ---------------------------- * Hash-Mode 5600 (NetNTLMv2) ---------------------------- Speed.#01........: 11696.0 MH/s (89.49ms) @ Accel:8 Loops:1024 Thr:1024 Vec:1 -------------------------------------------------------- * Hash-Mode 1500 (descrypt, DES (Unix), Traditional DES) -------------------------------------------------------- Speed.#01........: 6321.6 MH/s (84.67ms) @ Accel:4 Loops:1024 Thr:1024 Vec:1 ------------------------------------------------------------------------------ * Hash-Mode 500 (md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)) [Iterations: 1000] ------------------------------------------------------------------------------ Speed.#01........: 70840.0 kH/s (96.54ms) @ Accel:56 Loops:1000 Thr:1024 Vec:1 ---------------------------------------------------------------- * Hash-Mode 3200 (bcrypt $2*$, Blowfish (Unix)) [Iterations: 32] ---------------------------------------------------------------- Speed.#01........: 248.8 kH/s (95.61ms) @ Accel:8 Loops:32 Thr:24 Vec:1 -------------------------------------------------------------------- * Hash-Mode 1800 (sha512crypt $6$, SHA512 (Unix)) [Iterations: 5000] -------------------------------------------------------------------- Speed.#01........: 1210.2 kH/s (85.52ms) @ Accel:4 Loops:1000 Thr:1024 Vec:1 -------------------------------------------------------- * Hash-Mode 7500 (Kerberos 5, etype 23, AS-REQ Pre-Auth) -------------------------------------------------------- Speed.#01........: 3642.8 MH/s (95.91ms) @ Accel:334 Loops:256 Thr:32 Vec:1 ------------------------------------------------- * Hash-Mode 13100 (Kerberos 5, etype 23, TGS-REP) ------------------------------------------------- Speed.#01........: 3551.8 MH/s (96.00ms) @ Accel:326 Loops:256 Thr:32 Vec:1 --------------------------------------------------------------------------------- * Hash-Mode 15300 (DPAPI masterkey file v1 (context 1 and 2)) [Iterations: 23999] --------------------------------------------------------------------------------- Speed.#01........: 463.4 kH/s (82.19ms) @ Accel:7 Loops:1000 Thr:1024 Vec:1 --------------------------------------------------------------------------------- * Hash-Mode 15900 (DPAPI masterkey file v2 (context 1 and 2)) [Iterations: 12899] --------------------------------------------------------------------------------- Speed.#01........: 262.2 kH/s (76.61ms) @ Accel:4 Loops:512 Thr:1024 Vec:1 ------------------------------------------------------------------ * Hash-Mode 7100 (macOS v10.8+ (PBKDF2-SHA512)) [Iterations: 1023] ------------------------------------------------------------------ Speed.#01........: 3273.1 kH/s (79.01ms) @ Accel:4 Loops:512 Thr:1024 Vec:1 --------------------------------------------- * Hash-Mode 11600 (7-Zip) [Iterations: 16384] --------------------------------------------- Speed.#01........: 2231.6 kH/s (91.80ms) @ Accel:17 Loops:4096 Thr:512 Vec:1 ------------------------------------------------ * Hash-Mode 12500 (RAR3-hp) [Iterations: 262144] ------------------------------------------------ Speed.#01........: 287.1 kH/s (71.10ms) @ Accel:5 Loops:16384 Thr:512 Vec:1 -------------------------------------------- * Hash-Mode 13000 (RAR5) [Iterations: 32799] -------------------------------------------- Speed.#01........: 278.7 kH/s (85.27ms) @ Accel:12 Loops:1024 Thr:512 Vec:1 -------------------------------------------------------------------------------- * Hash-Mode 6211 (TrueCrypt RIPEMD160 + XTS 512 bit (legacy)) [Iterations: 1999] -------------------------------------------------------------------------------- Speed.#01........: 1989.6 kH/s (90.02ms) @ Accel:6 Loops:500 Thr:1024 Vec:1 ----------------------------------------------------------------------------------- * Hash-Mode 13400 (KeePass 1 (AES/Twofish) and KeePass 2 (AES)) [Iterations: 24569] ----------------------------------------------------------------------------------- Speed.#01........: 332.1 kH/s (82.05ms) @ Accel:10 Loops:1024 Thr:512 Vec:1 ------------------------------------------------------------------- * Hash-Mode 6800 (LastPass + LastPass sniffed) [Iterations: 100099] ------------------------------------------------------------------- Speed.#01........: 92374 H/s (86.89ms) @ Accel:8 Loops:1024 Thr:768 Vec:1 -------------------------------------------------------------------- * Hash-Mode 11300 (Bitcoin/Litecoin wallet.dat) [Iterations: 200459] -------------------------------------------------------------------- Speed.#01........: 34141 H/s (78.29ms) @ Accel:4 Loops:1024 Thr:1024 Vec:1 Started: Sat Aug 2 16:11:47 2025 Stopped: Sat Aug 2 16:19:10 2025
  • Hello, how can I contact sir Cyclone?

    Moved
    2
    0 Votes
    2 Posts
    350 Views
    cycloneC
    First, make sure to read through the Forum Rules: https://forum.hashpwn.net/topic/27/welcome-to-hashpwn-start-here There's several ways to contact me: Reply to this Topic with your question Chat with me here on hashpwn: https://forum.hashpwn.net/user/cyclone Message me on Matrix: https://forum.hashpwn.net/post/138
  • Systems Programming: Memory Safety

    Solved
    2
    0 Votes
    2 Posts
    594 Views
    cycloneC
    Thanks to everyone who played along! Rust is the clear favorite out of the 59 responses. https://www.rust-lang.org/ With Zig trailing behind for second place. https://ziglang.org/ [image: 1745243283992-2ea96ec5-2d29-4f6b-972f-e42303887766-image.png]
  • Fake "Security Alert" issues being posted on GitHub

    2
    0 Votes
    2 Posts
    273 Views
    cycloneC
    Update: The fake issue posted by djiazz, and the user's account have been removed from GitHub. GitHub's response: ...Our review of the account named in your report has concluded. We have determined that one or more violations of GitHub’s Terms of Service have occurred and have taken appropriate action in response... Full response: GitHub (GitHub Support) Mar 16, 2025, 9:27 PM UTC Hi cyclone, Our review of the account named in your report has concluded. We have determined that one or more violations of GitHub’s Terms of Service have occurred and have taken appropriate action in response. Please note that our response to abuse on GitHub varies depending on the exact circumstances of each case, as noted in our Community Guidelines: What happens if someone violates GitHub's Policies Additional information on dealing with offensive users or content can be found here: What if something or someone offends you? Thank you for helping create a safe and welcoming environment for software developers. Regards, GitHub Trust & Safety
  • JetKVM - SSH password-auth w/insecure default root password

    2
    15
    2 Votes
    2 Posts
    681 Views
    cycloneC
    GitHub Repo Updates: 2025/02/22 - Issue: jetkvm/kvm https://github.com/jetkvm/kvm/issues/187 2025/02/24 - Issue: jetkvm/rv1106-system https://github.com/jetkvm/rv1106-system/issues/6 2025/02/24 - PR: jetkvm/rv1106-system https://github.com/jetkvm/rv1106-system/pull/7 2025/02/24 - PR: chemhack removed default root password "rockchip" https://github.com/jetkvm/rv1106-system/pull/8
  • Solflare Crypto Wallet Vulnerability - "xpass exploit"

    14
    2
    1 Votes
    14 Posts
    1k Views
    cycloneC
    New GitHub Release: https://forum.hashpwn.net/post/434
  • Makemore for password candidate / rule generation

    2
    1 Votes
    2 Posts
    251 Views
    0
    Just wanted to stop by and say thanks for giving the challenge a go. Your uploads were a fun surprise also, as it's still on the down low :). Made my day, cheers.
  • GPU / Cracking Hardware in Signature

    6
    2 Votes
    6 Posts
    577 Views
    6
    Updated mine just now.
  • Happy New Year!

    2
    3 Votes
    2 Posts
    181 Views
    6
    And the same to you.
  • Benchmarking different speeds when I actually run it.

    2
    0 Votes
    2 Posts
    214 Views
    R
    Update. I solve the issue I put -O in the commandline.
  • Customized hashcat that can run on v0 blockchain.info wallet?

    1
    0 Votes
    1 Posts
    130 Views
    No one has replied
  • Happy Holidays All 🙂

    4
    1 Votes
    4 Posts
    346 Views
    PlumP
    Merry Christmas and Happy New Year everyone!
  • Help Setting up Phantom tool

    2
    0 Votes
    2 Posts
    282 Views
    cycloneC
    First, you'll need to compile the source code as specified in the GitHub README under Compile from source: https://github.com/cyclone-github/phantom_pwn/blob/main/README.md For your reference, I've included this below: Compile from source: This assumes you have Go and Git installed git clone https://github.com/cyclone-github/phantom_pwn.git phantom_extractor cd phantom_pwn/phantom_extractor go mod init phantom_extractor go mod tidy go build -ldflags="-s -w" . phantom_decryptor cd phantom_pwn/phantom_decryptor go mod init phantom_decryptor go mod tidy go build -ldflags="-s -w" . Compile from source code how-to: https://github.com/cyclone-github/phantom_pwn/blob/main/README.md Note: all of my crypto wallet *_pwn toolsets are similar in how to compile the binaries, extract crypto wallet hashes and decrypting / cracking them. Once you have the extractor and decryptor compiled, you'll need to run the extractor by pointing it at the directory with your wallet vault: phantom_extractor path/to/your/wallet Once the wallet hash has been extracted, save this to a file such as phantom.txt, then run phantom_decryptor with your phantom.txt and wordlist. This is similar to how you would run hashcat, jtr or mdxfind, but mind the specific -h {hash} and -w {wordlist} CLI commands below: phantom_decryptor -h phantom.txt -w wordlist.txt Running these toolsets requires a prior knowledge of CLI tools. If you're still stumped, send me a DM and I'll walk you through the process.
  • The theme for the forum. Private chats of users.

    7
    0 Votes
    7 Posts
    850 Views
    cycloneC
    @oe3p32wedw Rep added. You can send me a DM here on the forum or on Matrix: https://forum.hashpwn.net/topic/65/matrix-encrypted-chat-info

Who's Online [Full List]

8 users active right now (3 members and 5 guests).
freeroute, petrovivo1234, hashpwn-bot

Board Statistics

Our members have made a total of 6.3k posts in 158 topics.
We currently have 299 members registered.
Please welcome our newest member, hashwolf.
The most users online at one time was 49 on Thursday, December 26, 2024.