lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 24 Dec 2012 10:42:50 -0600
From: Grandma Eubanks <>
To: "Jason A. Donenfeld" <>
Subject: Re: Wordpress Remote Exploit - W3 Total Cache

This reminds me of a funny story about a decently popular database plugin
for WordPress. Even though they use a bruteforceable value based on time of
creation, there was something even funnier. A person would make a quick
database backup and it would just place it in the backups folder, that by
default wasn't a protected directory (nor was there an option to do it via
the plugin), and you could just view && download all the backups freely.
Again, hashes and associated salt(s) were available from here.

I'll leave it for someone else to ruin what plugin it is. I use it
currently in a capture the flag game as bonus points.

On Mon, Dec 24, 2012 at 6:12 AM, Jason A. Donenfeld <> wrote:

> On Mon, Dec 24, 2012 at 7:39 AM, Jason A. Donenfeld <>
> wrote:
> > hashes. A simple google search of
> > "inurl:wp-content/plugins/w3tc/dbcache" and maybe some other magic
> An astute reader writes to me privately that the /plugins/ part of
> that googledork isn't correct, and that the best way to search is
> actually:
> inurl:wp-content/w3tc
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter:
> Hosted and sponsored by Secunia -

Content of type "text/html" skipped

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists