Minggu, 19 Februari 2012

permisi...
nubitol numpang sharing sdikit ilmu berdasarkan exsperimen ane sendiri....wkwkwk
...smoga bermanfaat....

mencoba memberikan sdikit tutorial untuk agan2 yang mempunyai dua koneksi ato lebih
dan menginginkan speed yang lumayan kenceng jg hehehehehe

siapkan mesinnya dulu yang pasti PC ato lepi dan pastinya modem include kartunya jg paket internet
keduax wooweb pro download dimari atau dimari
ketigax hamachi download dimari atau Dimari

l...
setelah smuanya terinstal...buka wooweb agan seperti gambar di bawah...lanjut klik quick setup...


silahkan pilih modem agan...isi username dan passwordnya dan lihat dibawah network device catat IP address dan subnet mask nya [bisa dirubah sesuai selera]...lanjut klik OK
setelah klik OK agan akan masuk ke tampilan seperti di bawah


nah sekarang 1 koneksi sudah masuk..dan untuk menambahkan koneksi/modem lain..
klik Menu >>> Setting >>> Remote Conection...agan akan melihat tampilan seperti di bawah...


setelah itu klik add akan tampil seperti di bawah ini...
ISP/Conection Name : isi sesuai selera agan agan


lanjut klik OK....

skarang waktunya qta mengoneksikan kedua koneksi qta [bisa lebih dari 2]



klik Start Conection...


setelah smua modem/koneksi sudah conected akan Tampil seperti di bawah...


Sekarang qta setting Hamachi Network Interface nya...

masuk ke Control Panel >>> Network Connections >>> Klik Kanan Hamachi Network Interface >>> Propertise
akan Tampil seperti gambar di bawah


setelah itu klik Internet Protocol (TCP/IP) >>> Klik properties akan tampil seperti di bawah
isi dengan ...
ini di PC ane
IP address : 192.168.0.x (x bisa di isi 2-254)
subnet mask : 255.255.255.0
Default Gateway : 192.168.0.1 (agan ambil dari catatan di wooweb tadi)
untuk DNS silahkan isi sesuai selera kalo ane itu pake DNS smart
setelah itu klik OK...


sampe sini ane rasa smua sudah bisa konak...eh konek wkwkwkwk

sekarang waktunya kita coba ping domain..
klik start >>> Run >>> ketik CMD akan tampil seperti di bawah


Setelah itu ketik ping www.google.com -t tekan enter akan tampil seperti di bawah


yupz sudah reply...skarang waktunya qta tes dongcrot....lihat perbedaan speednya...wkwkwkwk
Spoiler for Bukti


pas dongcrot bokep wkwkwk

penampakan dial up
sumber : http://www.kaskus.us/showthread.php?t=9864706

Rabu, 08 Februari 2012

web ganti dns

http://thehackernews.com/2011/12/dns-cache-poisoning-attack-on-google.html

How To Hack Websites Using Havji (All Versions)

Download Havij


 Havij v1.15 Free
 Havij v1.14 Free
 Havij v1.13 Free 
 Havij v1.12 Free
 Havij v1.10



1st Step :- Find a  vulnerabale website ....

I Found This website

http://www.hypetrading.com/productinfo.php?id=285

Now Lets Start ..  


Open havij and copy and paste infected link as shown in figure
Now click in the "Analyze"
Then It shows some messages there....Be alert on it and be show patience for sometime to find it's vulernable and type of injection and if db server is mysql and it will find database name.Then after get it's database is name like xxxx_xxxx
Then Move to another operation to find tables by clicking "tables" as figure shown.Now click "Get tables" Then wait some time if needed
After founded the tables ,you can see there will be "users" Put mark on it and click in the " get columns " tab as shown in figure
In that Just put mark username and password and click "Get data"
Bingo Got now id and pass that may be admin...
The pass will get as md5 you can crack it also using this tool as shown in figure...


Now Find Admin Panel and Login with Your Crashed Username & Passwords !

Sites That Crack Md5 Hashes




* www.tmto.org
* md5.noisette.ch
* md5decryption.com
* www.c0llision.net
* www.netmd5crack.com
* www.md5decrypter.com
* md5hashcracker.appspot.com
* www.hashhack.com
* isc.sans.edu
* www.md5crack.com
* passcracking.com
* authsecu.com
* md5.rednoize.com
* md5.web-max.ca
* www.cmd5.com
* md5.thekaine.de
* www.shell-storm.org
* www.md5this.com
* www.hashchecker.com
* hashcrack.com
* md5pass.com
* md5pass.info 
* cmd5.org

Real Hacking (Use It In Ur Own Risk) With Video Tutorial

Types of Hacking

1. Local Hacking
Local hacking is done from local area where we have physical access, like through printer etc. We do this type of hacking thought Trojans and virus with help of hard disk and pen drive.

2. Remote Hacking
Remote hacking done from remote with help of vulnerability of target system. We need to follow steps for remote hacking to enter on target system.

3. Social EngineeringSocial engineering is the act of manipulating people actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face.

Real Hacking Steps (Remote Hacking)

1. Information Gathering/Foot printing
2. Port Scanning
3. OS Fingerprinting
4. Banner Grabbing
5. Vulnerability Assessment
6. Search & Build Exploit
7. Attack
8. Maintain Access with help of Root kits and Trojans.
9. Covering Tracks

1. Information Gathering / Foot printing
Informational gathering is the process to get maximum details of target host. It is very important part of remote hacking because when we have more information about target system we can launch more attacks.

Information gathering is done with these steps:
1. Find our company URL / IP address
2. Google for more information from different websites
3. Foot printing Through Job Sites
4. Find out whois record of target domain name (open www.who.is)
5. Find out physical location of victim (open www.whatismyipaddress.com)

Case-Study: 1.1
You are working in your company as a hacker, and your company want physical address and IP address and employee record and domain details. Your company gives u domain name:

Ans)
1. Open Dos prompt and type ping kulhari.net [Enter] after you will get IP address of victim.
2. Open google.com and search kulhari.net (and browse website for all information’s like contact number, employee records and their services).
3. For domain owner email address and hosting company details open: www.who.is and type www.kulhari.net (any target site).
4. For physical address location of server open www.whatismyipaddress.com and type IP address that you get in step 1. And trace it after that.


2. Port Scanning
What is port?
Port is medium for communication between 2 computers. Every service on a host is identified by a unique 16-bit number called a port.

Some default ports:

Port number ~ Service

7 ~ Ping
21 ~ FTP (File Transfer Protocol)
22 ~ SSH (Secure Shell)
23 ~ Telnet
25 ~ SMTP (Mail)
43 ~ WHOIS
53 ~ DNS
80 ~ HTTP
110 ~ POP3 (Mail Access)
513 ~ Rlogin
8080 ~ Proxy


TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two of the protocols that make up the TCP/IP protocol suite which is used universally to communicate on the Internet. Each of these has ports 0 through 65535 available so essentially there are more than 65,000 doors to lock.

The first 1024 TCP ports are called the Well-Known Ports and are associated with standard services such as FTP, HTTP, SMPTP or DNS.

What is port scanning?
It is similar to a thief going through your neighborhood and checking every door and window on each house to see which ones are open and which ones are locked.

What is port scanner?
A port scanner is a piece of software designed to search a network host for open ports. This is often used by administrators to check the security of their networks and by hackers to identify running services on a host with the view to compromising it. To port scan a host is to scan for listening ports on a single target host. To port sweep is to scan multiple hosts for a specific listening port.

Best port scanners: nmap, Hping2, Superscan.
Download link: http://sectools.org/


Why we perform port scanning?

We perform port scanning for finding our open services, so after we can search exploits related to that service and application.


NMAP (Port Scanner): A Hacker’s Best Friend
Nmap is a tool that has the ability to detect hosts, scanning ports and Oss. Nmap used in matrix, sword and many hacking movies.

Nmap Modes of operation:

TCP PING: -PT: This method of pinging sends a TCP packet to the host with an ACK flag. If the host replies with an RST, then the host is UP(running).

ICMP Ping: -PI
: This is standard ping used by UNIX / Linux boxes.

Connect (): -ST
: All Linux/Unix systems provide a system call to connect to a machine on a specified port, with a given protocol.

SYN Stealth: -sS
: This is stealth scan in that it does not get logged.

How to Find Out Own computer Ports:
Open Dos prompt and type following command.

C:\> netstat –no


fter Show active connections:
Active Connections

Proto ~ Local Address ~ Foreign Address ~ State ~ PID
TCP ~ 117.196.225.191:3604 ~ 69.93.227.45:80 ~ ESTABLISHED ~ 2148
TCP ~ 117.196.227.116:1067 ~ 80.190.154.74:80 ~ CLOSE_WAIT ~ 3064
TCP ~ 127.0.0.1:1990 ~ 127.0.0.1:1991 ~ ESTABLISHED ~ 2020
TCP ~ 127.0.0.1:1991 ~ 127.0.0.1:1990 ~ ESTABLISHED ~ 2020
TCP ~ 127.0.0.1:1992 ~ 127.0.0.1:1993 ~ ESTABLISHED ~ 2020
TCP ~ 127.0.0.1:1993 ~ 127.0.0.1:1992 ~ ESTABLISHED ~ 2020


PID is Process ID,
We can find out their associate application with help of following command:

C:\> tasklist

To terminate 2020 PID or another process

C:\> taskkill /PID 2020

After All connections will be close on our system.


3. OS Fingerprinting
OS (Operating System) Fingerprinting is a process to find out victim Operating System (Windows, Linux, UNIX).

Introduction:
When exploring a network for security auditing or inventory/administration, you usually want to know more than the bar IP addresses of identified machines. Your reaction to discovering a printer may be different than to finding a router, wireless access point, telephone PBX, game console, Windows desktop, or UNIX server. Finer grained detection (such as distinguishing Mac OS X 10.4 from 10.3) is useful for determining vulnerability to specific flaws and for tailoring effective exploits for those vulnerabilities.

Tools: nmap, NetScanTools Pro, P0f.

4. Banner GrabbingBanner Grabbing is an attack designed to deduce the brand and/or version of an operating system or application. Mean after port scanning we found open port 80 (apache) and target OS is Linux, but we don’t know what is version of apache for remote hacking. Like apache 2.0, 2.2, or 2.6.

Example: c:\> telnet 69.93.227.34 80 [Enter]
Change Target Port 80 to another.


5. Vulnerability Assessment
What is Vulnerability Assessment?
The word “vulnerability” describes a problem (such as a programming bug or common misconfiguration) that allows a system to be attacked or broken into.

A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerability in a system.

Vulnerability assessments can be conducted for small business to large regional infrastructures. Vulnerability from the perspective of Disaster Management means assessing the threats from potential hazards to the population and to the infrastructure developed in that particular. It can be done in political, social, economic and in environmental fields.

Assessments are typically performed according to the following steps:

1. Cataloging assets and capabilities (resources) in a system.
2. Assigning quantifiable value (or at least rank order) and importance to those resources
3. Identifying the vulnerabilities or potential threats to each resource
4. Mitigating or eliminating the most serious vulnerabilities for the most valuable resources

Automated Tools: Nessus, Nikto, Core impact, Retina, etc

6. Search & Build Exploit
Manual Method: We can find vulnerability manually with help of vulnerability archive sites like www.milw0rm.*com and http://www.packetstormsecurity.org/

remove *

For exploit and final attack, open the websites say Microsoft, adobe or Mozilla which provides the source code to format. You need to download the code and compile them for preparing exploit for final attack.


7. Attack
Launch attack on remote system and get reverse shell.

8. Maintain Access
After getting remote access we place a root kit or Trojan virus for future remote access, without any password.
[For more information you’ll have to wait for the next chapter]

9. Covering Tracks
Covering Tracks is a process to delete all logs on the remote system. If target system is Linux or UNIX, delete all entries of /var folder and if it is windows OS delete all events and logs.

Case Study: 1.3
You are working in abc company as a ethical hacker and your company get a contract from government to hack terrorist organization server for getting all their emails.

Ans) 1st we perform Information gathering (like collect information like IP address and physical address). 2nd we perform port scanning to find open ports: 22, 25, 80. And then perform OS fingerprinting with help of nmap and p0f and if result is “Linux 2.6” then next perform banner grabbing on port no: 25 (related to email server) in which command is used:

C:\> telnet abc.com 80
Result is : HTTP 1.1 400 BAD REQUEST
Server: Apache 2.0 Linux

So after we perform manual vulnerability assessment manually with help of www.milw0rm.*com and search “Apache 2.0” >> then after download exploit code >> compile the exploit code and attack then take all email backup from remote system.

remove *

Project DONE!
Note: Wait for Chapter number: 12 for advance hacking.

How to Find Latest Exploits?

Manual Method

Browse: www.milw0rm.*com


www.securityfocus.*com

remove *

Search Exploits.

See Video


Automatic Method

Purchase these tools:

1. Core impact
2. Immunis Canvas
3. GFI LANguard
4. ISS Internet Scanner
5. QualysGuard
6. Saint


What is exploit?

An exploit is an attack on a computer system, especially one that take advantage of a particular vulnerability that the system offers to intruders.

Why we are Searching Latest Exploits?

Because exploit is a code to enter on remote system or crash the system remotely.

How do these weaknesses occur?

• Many systems are shipped with: known and unknown security holes and bugs, and insecure default settings (passwords, etc.)
• Many Vulnerabilities occur as a result of misconfiguration by system administrators.