Just curious..I wouldnt mind dipping into the persons password dump since I see his ***
Edit:
Looks like it tricks the server into thinking the request is from pixel.quantserve.com which allows it to be ran into the pages html...hm..
Results 1 to 8 of 8
- 03 May. 2010 07:59pm #1
So how do people work those *** password image exploits?
Last edited by JustAStupidAsshole; 03 May. 2010 at 08:08pm.
- 04 May. 2010 01:13am #2
It is called an Flw and is pure PHP scripting.
You can not 'Dip into his password list' unless you guess his Password list URL, Since it us purly PHP.
- 04 May. 2010 01:23am #3
- 04 May. 2010 01:47am #4
Right, and you can not see where they are going because it is PHP.
- 04 May. 2010 02:07am #5
- 04 May. 2010 02:21am #6
You can NOT see PHP script for THIS reason...
You can look at where it says it is from but that still leaves you guessing the .txt file name.
Unless you plan to Bruteforce guess the page title then you are SOL.
- 04 May. 2010 02:27am #7
- 04 May. 2010 07:28pm #8
If the FLW is on gaiafag.***.com/login.php, go to gaiafag.***.com and you might see an index showing where the password is stored.
LG's resident grammar nazi.
Need warez? I can probably find it for you. Throw me a PM.
For all of my sales, if you refer a buyer to me and they make a purchase, you can recieve 5%