Jump to content
Existing user? Sign In

Sign In



Sign Up

BlueFile hosting -- 500+ free wetting videos


Recommended Posts

Did a search for a specific video clip today and came across this site, which hosts over half a thousand wetting and desperation videos, all of which can be downloaded free of charge.

 

http://2.bluewetting.net/dfh/files.php

 

Only problem is there is no preview function, and some of the files aren't exactly clearly labelled, so you're picking files "blindly" much of the time, but it's still a great resouce. Enjoy!

Thank you, looks interesting!

Link to comment

Judging the contents of the clips by title I found some good clips, most but not all of which I'd seen before. I have searched this forum for the ones I had never seen, leaving me with two videos I can't find here either. One of them is from wettingherpanties so I won't post that one, but here's the other. Hopefully this is not a repost and at least some of you will enjoy it as much as I did.

For some reason I can't upload a file from my smartphone so I'll add the attatchment from my computer tomorrow.

Edited by ola93 (see edit history)
Link to comment

This website uses some horribly insecure PHP software.

 

I don't know all the technical implications of PHP - but a note to comrades, I downloaded a random bunch of these last night and my computer shut down. Had to go restore it in DOS and when I finally got it up all the security systems were disabled, to the point of having to reinstall.

 

Could be coincidence, but keep an eye out.

 

And thanks to the poster, there must be some old gems in there.

Link to comment

I mean the website itself runs using insecure software, not it hosts malicious content.

 

All inputs are unsanitized and the admin page (which is kindly publicly linked for everyone to see) contains nothing but a single, unprotected password input field.

 

Also, generating a CAPTCHA form that just asks you to write out a string from plain text (not a distorted image) is silly. It takes three minutes to program a web scraper to bypass that entirely.

Link to comment

I mean the website itself runs using insecure software, not it hosts malicious content.

 

All inputs are unsanitized and the admin page (which is kindly publicly linked for everyone to see) contains nothing but a single, unprotected password input field.

 

Also, generating a CAPTCHA form that just asks you to write out a string from plain text (not a distorted image) is silly. It takes three minutes to program a web scraper to bypass that entirely.

That software IS horrible. I got interested after your post and and downloaded it.

It's been a while since I read PHP, but it looks awesome. Like what I made 10 or so years back.

Just for laughs:

- It uses double MD5 for password check

- It stores the password hash in a directory called "secure" with an .htaccess , assuming people will only run Apache.

- When you log in, it stores the quadruple MD5 of the password in the session (because a simple TRUE would not do).

- They implement their own filters and do not handle NULL bytes.

 

They're also using an old version. A fair bet would be to be a bit careful with this.

Anyway, the contents seem to be okay and there are some good videos in there.

Link to comment

That software IS horrible. I got interested after your post and and downloaded it.

It's been a while since I read PHP, but it looks awesome. Like what I made 10 or so years back.

Just for laughs:

- It uses double MD5 for password check

- It stores the password hash in a directory called "secure" with an .htaccess , assuming people will only run Apache.

- When you log in, it stores the quadruple MD5 of the password in the session (because a simple TRUE would not do).

- They implement their own filters and do not handle NULL bytes.

 

They're also using an old version. A fair bet would be to be a bit careful with this.

Anyway, the contents seem to be okay and there are some good videos in there.

Oho, awesome to find another user with a bit of PHP programming experience here. :tongue:

 

It not only assumes people use Apache with AllowOverride enabled, it also makes the assumption that all users will see and upload that hidden .htaccess file with the software. Why in gods name doesn't it just use a PHP file to store those settings like every other sane developer does? If you're going to cram all that data in a publicly web accessible directory, at least store them as variables in a PHP file and include them, instead of that completely unnecessary hacky mess.

 

It's kind of amusing that since the settings are ".dfh" files, the download script will actually try and read them as downloadable files, but it mistakes the 7th item in the list of settings as an MD5 password to download the file,

http://2.bluewetting.net/dfh/download.php?file=../secure/settings

Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...