Senin, 29 Maret 2010

Mau Aman Account Texas Holdem Poker dan Facebook Anda?

1.Belajar Jaringan & komputer [NGENET ABIS]

2.Sering Baca Artikel Apa aja dikhususkan yang berkaitan dengan Tehnologi

3.Proteksi Komputer dan jaringan kamu dari hasil belajar anda misalnya kemaren anda belajar dan membaca tentang Fungsi dan kegunaan firewall serta lain lain sebagainya yg bersifat membahas vurneability di suatu system.

4.Makan buat mengisi tenaga biar Fresh

5.Santai sambil baca koran

6.Telpon-telponan sama pacar

7.Buka Facebook.. Set Rules account anda mengenai semua informasi yang berharga agar tidak mudah diketahui orang banyak misalnya seperti nomor hp,alamat,dll.

8.pastikan email anda Security Question serta passwordnya "STRONG DAN KUAT" dalam arti terkombinasi dengan baik dan mudah diingat biar kagak mudah di tebak.Dan jangan lupa setiap bulan Ganti password

9.Kalo pas ngenet di warnet mesti hati-hati ama yang namanya tools "Hacking LAN & ROUTER" seperti contoh sedikitnya cain and abel,keylogger,radmin,vnc,wireshark,dan lain sebagainya silahkan baca "waspada online di warnet" untuk proteksinya

10.Evaluasi apa yg didapat hari ini dan pikirkan apa yang besok akan dilakukan

11.Sleep well and have fun

ref:
from my brain

Smadav 2010 - Indonesian Antivirus




This Antivirus can colaboration with other antiviruses,try it for protection.

* SmaRTP Technology, SmaRT-Protection
* Smad-Behavior Technology
* Smad-Lock Technology
* Smart Scanner
* Fast cleaner file infection
* Repair (1500 value) Registry
* New Update
* Free
* Portable dan support OS Windows 2000/XP/Vista/7




Link download : http://www.smadav.net/download/?mirror


have fun

refern:

http://www.smadav.net

McAfee CSniffer v1.0.0.3 command line



Wow,McAfee Aurora release new tools for detection Vurneability.We can download from here: http://www.foundstone.com/us/resources/freetools/csniffer.zip



About this tool

McAfee has developed this free utility as a proof-of-concept to highlight the ease of which critical network information is obtained without performing any kind of active scanning.

* File: CSniffer.exe
* Size: 105984 bytes
* File Version: 1, 0, 0, 3
* Modified: Wednesday, March 03, 2010, 2:21:22 PM
* Md5: DE9A9EB7AC8FA9D2EDF41C3BC85A579D
* SHA1: 6DCD9FD27125C1B85A47D0A5427B7C40FEC03FCC

NOTE: McAfee does not offer technical or customer support for this tool.
Purpose

This tool acts much like a standard Ethernet network sniffer. However, unlike a traditional packet sniffer it doesn't attempt to capture and decode all traffic but instead is geared toward discovering useful infrastructure and security-related data from the network, often from traffic not sent to or from the host system i.e. general broadcast network traffic. This data can reveal all manner of useful information, ranging from live systems on the network, hostnames, Ipv6 systems, routers and name servers, user names and passwords.

Note that the tool is not comprehensive in the amount and range of information it gathers. Rather it goes to show that your network is constantly chattering away, unintentionally revealing vast amounts of useful information that could be utilized by an attacker. This tool highlights some of that data. This is the kind of information that was obtained by systems hit by the Aurora vulnerability (Ms10-002) affecting Microsoft's Internet Explorer web browser including for example, obtaining credentials to source control systems leading to the theft of highly confidential intellectual property.
Tool requirements

CSniffer runs on Microsoft Windows systems (Windows 2000 upwards) and attempts to sniff network data in promiscuous mode. It can use one of two methods to achieve this:

* Using Windows' built-in raw sockets API (default).
* Using the WinPcap packet driver.

This necessitates running with administrator privileges.

However, when using Windows raw sockets there is a workaround that allows a regular user to run the tool.

Apply the following registry setting and reboot:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\
[DWORD] "AllowUserRawAccess"

Set the value to 1 to allow regular users to use raw sockets.

Being able to apply this registry setting itself requires administrator privileges. However, once rebooted you can use the tool in raw socket mode without requiring administrator privileges.

Utilizing a privilege escalation attack on a Windows system and applying the registry setting above could allow sniffing of all network traffic when running under a non-privileged account, something that is not generally known!
Limitations

Other than the aforementioned requirements of running under an administrator level account, there are some severe limitations when using the built-in Windows raw sockets mode.

The Microsoft raw sockets API has several restrictions that have been introduced over the years in an effort to reduce security risks associated with low level network packet access. Depending on what platform you are running on you may find that you are limited in what data can be seen on the network. A comprehensive list of all known limitations seen on different Windows operating systems and service pack levels of those operating systems has not been compiled, but here are some known issues. Again, this only applies to Windows raw sockets mode.

* Outgoing UDP and ICMP packets are not captured (OS, SP specific).
* On Windows XP Sp1, XP Sp3 and Vista no outgoing packets of any kind are captured.
* On Windows Vista with Sp1, only UDP packets are captured. TCP packets are not captured.

If you do not have the ability to use WinPcap your best bet is to use XP Sp2 or a server level OS such as Windows Server 2003.

WinPcap is a free download. Visit http://www.winpcap.org/ for details.
Usage

CSniffer is a command-line tool. Syntax for usage can be obtained by typing

CSniffer -h

or

CSniffer -?

CSniffer
Command-line network sniffer and network intelligence gathering tool
Copyright (c) McAfee, Inc. 2010

Syntax:
CSniffer -t -u -i -e -b -oO -adlmnpsvwx

-a Include timestamps in output
-b Bind to the given IP address
-d Ignore duplicate data when using -p or -n
-e Log Ethernet data (WinPcap mode only)
-i Log ICMP packets
-l List the IP addresses on this system
-m Ignore traffic to or from the host (this) machine
-n Network intelligence gathering
-o Send output to file (overwrite)
-O Send output to file (append)
-p Password gathering
-s Silent mode. No packet display. Useful with -n and -p
-t [ ...] Log TCP packets. Port can be '*' for any.
-u [ ...] Log UDP packets. Port can be '*' for any.
-v Verbose output
-w Use WinPcap library instead of Windows raw sockets
-x Output packet in Hex&Text format (default text only)

-a

Timestamps will be included in the output for each event.

-b

When using raw sockets mode (default), this specifies which interface will be used, given by an associated IP address. See the -l option. When using raw sockets mode and no interface is specified, an arbitrary one is chosen by default. When using WinPcap, all interfaces are automatically used and this option is ignored.

-d

When used with -p (password gathering) or -n (network intelligence gathering) this option will attempt to only display unique messages from each source IP address. This can cut down on noise.

-e

Ethernet-level data (basically MAC addresses) will be logged. This option is only applicable when using WinPcap (-w ). It displays interesting NIC vendors such as VMWare devices. If none of -e, -i, -t or -u are specified, all protocols are automatically examined.

-i

Sniff for ICMP traffic. If none of -e, -i, -t or -u are specified, all protocols are automatically examined.

-l

List the Ipv4 addresses for this system. This can be used with -b when binding to a NIC. Only applicable to raw socket mode.

-m

Ignore traffic originating from or destined to this system (i.e. the system you're running the tool from). Only Ipv4 addresses are supported for now.

-n

Enable network intelligence gathering mode. Interesting data packets are decoded and presented to the user. The currently supported protocols are HTTP HEAD, GET, POST and OPTIONS requests (various TCP ports), BootP/DHCP (UDP ports 67, 68), TFTP (UDP port 69), NetBIOS Name Requests (UDP port 137), NetBIOS Browser Service (UDP port 138) and SSDP (UDP port 1900). In addition some interesting MAC vendors are identified and detected Ipv6 addresses on the network are shown.

-o

Send output to the given file. Output is simultaneously displayed in the command window and saved to the specified file. If the file exists its contents are deleted.

-O

Send output to the given file. Output is simultaneously displayed in the command window and saved to the specified file. If the file exists its contents are appended with the new output.

-p

Password gathering mode. Common protocols are examined for credentials and they are displayed in the output. The currently supported protocols are FTP (TCP port 21), POP3 (TCP port 110), NNTP (TCP port 119), SMB hashes (TCP port 445), Perforce (TCP port 1666) and many common HTTP ports (basic auth).

-s

Silent mode. No packet dumps are displayed. Useful if you are not interested in the actual raw contents of the packets.

-t

Log TCP packets. Optional port numbers to examine can be specified. If none of -e, -i, -t or -u are specified, all protocols are automatically examined.

-u

Log UDP packets. Optional port numbers to examine can be specified. If none of -e, -i, -t or -u are specified, all protocols are automatically examined.

-v

Verbose mode. Displays which command options are specified on the command line. Use this option as the first parameter.

-w

Use the WinPcap packet driver rather than the Windows raw sockets API. This option is highly recommended but requires you already have WinPcap installed.

-x

Output the packet's raw contents in Hex and Text format. Without this option the output format is text only.

Examples

Usage is best demonstrated through examples. All examples shown here are specifying the use of WinPcap (-w).

Show the tool's syntax.

CSniffer -h

Raw packet capture of everything, displaying text-only output (default).

CSniffer -w

Raw packet capture of everything, displaying Hex and Text output.

CSniffer -wx

Raw packet capture of TCP port 80 traffic, displaying Hex and Text output.

CSniffer -wx -t 80

Raw packet capture of TCP port 80 and port 8080 traffic, displaying Hex and Text output.

CSniffer -wx -t 80 8080

Raw packet capture of TCP port 80 and UDP port 137 traffic, displaying Hex and Text output.

CSniffer -wx -t 80 -u 137

Network intelligence gathering mode. Don't display packet dumps.

CSniffer -wns

Network intelligence gathering mode for UDP port 138 traffic only. Remove duplicate entries. Don't display packet dumps.

CSniffer -wnds

Password monitoring mode. All protocols. Remove duplicate entries. Don't display packet dumps.

CSniffer -wpds

Network intelligence gathering and password sniffing. Remove duplicate entries. Don't display packet dumps.

CSniffer -wnpds

Network intelligence gathering and password sniffing. Remove duplicate entries. Don't display packet dumps. Ignore traffic to and from this machine

CSniffer -wnpdsm

Network intelligence gathering and password sniffing. Remove duplicate entries. Don't display packet dumps. Ignore traffic to and from this machine. Send output to a file.

CSniffer -wnpsdm -o log.txt

Network intelligence gathering and password sniffing. Remove duplicate entries. Don't display packet dumps. Ignore traffic to and from this machine. Send output to a file, appending to it.

CSniffer -wnpsdm -O log.txt

Network intelligence gathering and password sniffing. Remove duplicate entries. Don't display packet dumps. Ignore traffic to and from this machine. Show timestamps. Send output to a file, appending to it.

CSniffer -wnpsdma -O log.txt

Updates

Check the McAfee website for updates to this tool.

http://www.mcafee.com/911/
Feedback

Please submit all questions, comments, and inquiries regarding McAfee free tools via email only: freetools@mcafee.com. Although McAfee does not offer technical or customer support for these tools, your feedback and bug reporting is appreciated.


referen:

http://download.mcafee.com/products/tools/csniffer/readme.html
http://www.foundstone.com/us/resources/proddesc/csniffer.htm

Minggu, 28 Maret 2010

Watching/Nonton TV Online with Much Channel Using TVU Player


Anda bete,jenuh sedangkan TV dirumah lagi rusak atau emang nggak punya TV hehe just kidding bisa download software ini buat nonton TV secara online. silahkan download di http://tvuplayer.en.softonic.com/download

screenshot:







HTML Encrypter and Decrypter

Jika anda ingin melakukan encrypting pada file berbahasa HTML agar tidak mudah di lihat oleh orang lain bisa mengunjungi website http://www.iwebtool.com/html_encrypter.Cukup submit HTML code anda.Berikut ini screenshotnya





Dan apabila jika ingin dencrypting file yang terenkripsi bisa mengunjungi website http://www.gooby.ca/decrypt/




Have fun :p

ref:
http://www.iwebtool.com/html_encrypter
http://www.gooby.ca/decrypt/

Shell Gratisan bisa load psyBNC and Eggdrop

Hehe langsung saja kalo lagi kagak ada shell inject maupun shell resmi untuk bikin eggdrop atau psybnc/bnc pake alternatif lain yaitu cari shell yang gratisan.Penulis cuma menggunakan shell gratisan dari sign.io sama http://webenabled.com.

1.sign.io [http://sign.io]



Simpel mudah dan cepat menggunakan shell gratisan ini support ssh and ftp login.Silahkan registrasi dan kemudian load menggunakan Putty.Silahkan download di http://en.softonic.com atau googling saja.Setelah anda login masuk ke shell,upload file pada directory /public_html file psy atau eggdrop anda dan lakukan penginstallan.



Pada saat ingin mengedit file misalnya psybnc.conf atau eggdrop.conf Karena Text Editor yang di gunakan disini adalah vi bukan nano/pico bikin pusing kepala penulis saja karena dari dulu memang gak suka text editor vi jadi kita tambahkan di profile sedikit source code seperti ini untuk mencari text editor nano atau pico di bash shell.

-------------------------------------------------------------------------------------
#######
#######
### Begin: Nano/Pico search: Look for NANO or PICO in common locations, add a full path location as an alias to both or one-of them.
### Also, make my environment variable EDITOR and VISUAL equal to the pico/nano binary if one exists
#######
#######

PROFILE_VERSION=0.1
PROFILE_STRING="[Bash Profile v$PROFILE_VERSION]"

NANO_LOCATION=`which nano 2>&1`
PICO_LOCATION=`which pico 2>&1`

NANO_LOC_FIRSTCHAR=${NANO_LOCATION:0:1}
PICO_LOC_FIRSTCHAR=${PICO_LOCATION:0:1}

if [[ "$NANO_LOC_FIRSTCHAR" != "/" && "$PICO_LOC_FIRSTCHAR" != "/" ]]; then
EDITOR_LOCATIONS=(/bin/ /var/ /usr/bin/ /usr/local/bin/ /opt/bin/ /opt/local/bin/ /sbin/)
EDITOR_DIR=""

for ((i=0;i<${#EDITOR_LOCATIONS};i++)); do
if [ -x ${EDITOR_LOCATIONS[${i}]}/nano ]; then
NANO_LOCATION=${EDITOR_LOCATIONS[${i}]}nano
NANO_LOC_FIRSTCHAR=${NANO_LOCATION:0:1}
EDITOR_DIR=${EDITOR_LOCATIONS[${i}]}
echo "$PROFILE_STRING Found nano in ${EDITOR_DIR} !" >&2
fi
done

for ((i=0;i<${#EDITOR_LOCATIONS};i++)); do
if [ -x ${EDITOR_LOCATIONS[${i}]}/pico ]; then
PICO_LOCATION=${EDITOR_LOCATIONS[${i}]}pico
PICO_LOC_FIRSTCHAR=${PICO_LOCATION:0:1}
EDITOR_DIR=${EDITOR_LOCATIONS[${i}]}
echo "$PROFILE_STRING Found pico in ${EDITOR_DIR} !" >&2
fi
done
fi

if [[ "$NANO_LOC_FIRSTCHAR" != "/" && "$PICO_LOC_FIRSTCHAR" == "/" ]]; then
echo "$PROFILE_STRING Only pico found ($PICO_LOCATION), adding alias for nano."
alias pico=$PICO_LOCATION
alias nano=$PICO_LOCATION
export EDITOR=$PICO_LOCATION
export VISUAL=$PICO_LOCATION
fi
if [[ "$NANO_LOC_FIRSTCHAR" == "/" && "$PICO_LOC_FIRSTCHAR" != "/" ]]; then
echo "$PROFILE_STRING Only nano found ($NANO_LOCATION), adding alias for pico."
alias pico=$NANO_LOCATION
alias nano=$NANO_LOCATION
export EDITOR=$NANO_LOCATION
export VISUAL=$NANO_LOCATION
fi
if [[ "$NANO_LOC_FIRSTCHAR" == "/" && "$PICO_LOC_FIRSTCHAR" == "/" ]]; then
echo "$PROFILE_STRING Nano and Pico already in path (nano in $NANO_LOCATION; pico in $PICO_LOCATION)."
alias pico=$NANO_LOCATION
alias nano=$PICO_LOCATION
export EDITOR=$NANO_LOCATION
export VISUAL=$NANO_LOCATION
fi
if [[ "$NANO_LOC_FIRSTCHAR" != "/" && "$PICO_LOC_FIRSTCHAR" != "/" ]]; then
echo "Nano or pico not found. Yuck."
export EDITOR=vi
export VISUAL=vi
fi

#######
#######
### End: Nano/pico search
#######
#######


-------------------------------------------------------------------------------

command:

[0931][rob@machine:~]$ source ./.profile
[Bash Profile v0.1] Found pico in /opt/bin/ !
[Bash Profile v0.1] Only pico found (/opt/bin/pico), adding alias for nano.
[0931][rob@machine:~]$


Kalo mau lebih cepat tinggal login saja pake Winscap [SFTP SCP FTP CLIENT] gampang untuk mengedit-edit file yang ingin di edit.Jadi gak perlu repot-repot mencari nano atau pico di bash shell.



2.webenabled.com [http://webenabled.com]



silahkan register dan kemudian pilih yang free trial[30 days].Web hosting ini saya coba bisa untuk load eggdrop maupun psybnc/bnc.Anda akan diberikan username dan password seperti contoh di bawah ini:


URL: http://ygcmfp.dev3.webenabled.net

SSH/SCP/SFTP Access
Username: w_ygcmfp Password: grease!small&kicked

Application login
Username: admin Password: xs9cz4mdvr

MySQL login
Username: w_ygcmfp Password: xs9ez4myvr

Setelah mendapatkan ini baru cobalah anda membuat sebuah project untuk web anda misalnya menginstall cms joomla dan sebagainya.Login lewat putty dan masuk pada directory public_html/username-anda/ kemudian silahkan upload file-file anda baik itu psybnc/eggdrop dan lain lain silahkan lakukan penginstallan.Silahkan mencari shell gratisan lainnya masih banyak dengan berbagai macam rulesnya.

Have Fun


ref:
http://google.com/search?q=shell+gratis
http://sun3.org/archives/65

Senin, 22 Maret 2010

Serial Key for My Favorite Game [CSCZ and FEAR COMBAT]

Counter Strike




Counter Strike Condition Zero:

5ZN2D-DHZ4F-3HWVC-DYVQG-MBHJB

Counter Strike v1.6:

5RP2E-EPH3K-BR3LG-KMGTE-FN8PY
ax24s-wdf25-rtf25-ab225-od1f4
as125-fgtr2-orui2-pt225-ptit2

Fear Combat:



NAD3-BUC8-XUT4-LUN3-6885
9JXA-UAJX-QCJQ-EU3T-EBCC
JAWW-PAP3-QPJU-U3AA-9AFE
EJ7C-MM3U-7C73-MAXU-B0C8
97U9-3779-TSPE-PW9C-58D7
J?MU-ACPW-J7AM-X?EP-04A0
J4E7-7UWM-7CM7-PQMP-6E4C
C4QP-3C7U-JEQ4-EMCC-7460
AXQC-X4CE-4TX4-WESJ-F723
7Q9X-M3XU-MMCE-PTWS-27C9