Programming

Programming

Hacking

Hacking

Hardware

Hardware

Anti Virus

Anti Virus

Tutorial DDos [100 % TESTED &WORKING]

Nov 28, 2009

Selamat berkunjung para visitor yang kelaparan akan informasi.

Sekarang ane lagi bingung mau nulis apa , yang enak apa ya ... bosen juga kalau lama lama nulis tweaking dan maintenance sekali-sekali ane tulis tentang hacking tapi yang mudah mudah aja.

langsung saja sekarang kita membahas tentang DDOS.










ap
a itu DDOS ? simak aja artikel ini :

DDoS attack adalah Distributed-Denial-of-Service attack, sebuah usaha untuk membuat suatu sumber daya komputer menjadi tidak bisa dipakai oleh user-nya, dengan menggunakan ribuan zombie system yang ‘menyerang’ secara bersamaan. Tujuannya negatif, yakni agar sebuah website atau layanan online tidak bisa bekerja dengan efisien atau bahkan mati sama sekali, untuk sementara waktu atau selama-lamanya. DDoS attack adalah salah satu model dari DoS ( denial-of-service) attack.

Target serangan DoS attack bisa ditujukan ke berbagai bagian jaringan. Bisa ke routing devices, web, electronic mail, atau server Domain Name System.

Ada 5 tipe dasar DoS attack :

1. Penggunaan berlebihan sumber daya komputer, seperti bandwith, disk space, atau processor.
2. Gangguan terhadap informasi konfigurasi, seperti informasi routing.
3. Gangguan terhadap informasi status, misalnya memaksa me-reset TCP session.
4. Gangguan terhadap komponen-komponen fisik network.
5. Menghalang-halangi media komunikasi antara komputer dengan user sehingga mengganggu komunikasi.

DoS attack juga termasuk eksekusi malware, yang dimaksudkan untuk :

* Memaksimalkan kerja processor, sehingga memblok tugas-tugas yang lain.
* Memicu terjadinya error di dalam microcode.
* Memicu error pada urutan instruksi dan memaksa komputer menjadi tidak stabil dan locked-up.
* Memanfaatkan error-error yang ada di system operasi yang berbuntut pada ‘kematian’ system.
* Membuat system operasi menjadi crash.
* iFrame (D)DoS, di dalamnya terdapat sebuah dokumen HTML yang sengaja dibuat untuk mengunjungi halaman web ber-kilobyte tinggi dengan berulang-ulang, hingga melampaui batas bandwith.

Gejala-gejala DDoS attack :

* Kinerja jaringan menurun. Tidak seperti biasanya, membuka file atau mengakses situs menjadi lebih lambat.
* Fitur-fitur tertentu pada sebuah website hilang.
* Website sama sekali tidak bisa diakses.
* Peningkatan jumlah email spam yang diterima sangat dramatis. Tipe DoS yang ini sering diistilahkan dengan “Mail Bomb”.

Contoh kasus DoS attack :

1. Februari 2007, lebih dari 10.000 server game online seperti Return to Castle Wolfenstein, Halo, Counter-Strike, diserang oleh group hacker “RUS”. DDoS attack berasal dari 1.000 lebih komputer yang terletak di negara bekas Uni Sovyet. Kebanyakan berasal dari Rusia, Uzbekistan dan Belarusia.

2. Juli 2008, banyak blog milik blogger-blogger konservatif, termasuk Macsmind.com, merasa mendapat serangan DDoS attack hingga beberapa terpaksa harus offline. Serangan ini dikaitkan dengan 3 IP address yang diregister melalui GoDaddy.com ke barrackobama.com, situs resmi calon presiden AS dari partai Demokrat, Barrack Obama. Sebelumnya, beberapa pendukung Obama juga melakukan serangan ke situs-situs pendukung Hillary Rodham Clinton dengan menggunakan google.com. Sampai 8 Agustus kemarin, asal pasti serangan masih belum jelas, namun Obama atau tim kampanyenya secara personal dianggap terlibat.

Sudah faham ? ,

kalau begitu kita langsung praktek aja deh cape ngomong terus ...


Tutorial :
Pertama tama kalian semua harus memiliki koneksi internet tidak perlu harus mempunya bandwith besar terus kalian download softwarenya disini
Code:
http://www.kitaupload.com/download.php?file=585dos%20web..zip
beberapa antivirus seperti avast, avg atau NOD32 akan mendeteksi file tersebut adalah virus sebaiknya disablekan dulu antivirusnya apa bila ingin menggunakannya (sebaiknya jangan) setelah di download buka file tersebut nanti akan timbul gambar seperti ini masukkan alamat ip korban pada kolom yang tertulis "localhost" apabila anda tidak mengetahui ip addresnya klik menu "toolz" pilih "URL To IP Converter" tinggal tekan "Attack"

NB:Untuk Server Yang Kuat Gunakan Beberapa Komputer sekaligus serta ubah "interval" nya menjadi lebih kecil.

cocok buat ngerjain temen atau server sekolah yang lagi Deadline entry nilai ane juga pernah pake cara ini pas kelas 1 sma biar bisa remedial gitu, bagi yang belom ngerti bisa di baca lagi kok dan ane mau nambahin nih software DDOS itu segudang macam nya semakin banyak komputer yang melakukan DDOS semakin lemot tuh server ...

ok sampai disini perjumpaan kite wassalam .

Test the Brand-New Google Homepage Redesign Yourself – Screenshots

With a simple JavaScript trick



Google is always tweaking the design of its products even, or especially, that of its search engine. The site has evolved in time but for the most part the changes have been subdued and discrete. Not anymore though, Google is planning a major revamp of its search engine, by Google standards anyway, promising to be the biggest single redesign to date. The company is already testing the design with a number of users, but the rest of us will have to wait until next year to get to see it in action. However, if you just can't wait that long, there's a little trick you can use to get into the trial.

The trick involves modifying the cookies Google stores on your computer to keep various settings and data. This sounds more complicated than it really is, all you need to do is copy and paste the code below into your browser's address bar. You need to sign out of your Google account either before or after pasting the code and then you should see the brand-new design regardless of whether you're signed in or not.

After this, the new design is all yours in all its Technicolor glory. It's still the same minimalist Google design that we all know and love, but it's gotten a bit livelier. A lot livelier actually, thanks to the small icons adorning the categories in the now-permanent sidebar, but especially to the bright, new blue, which is everywhere from the links to the logo.

There's a more detailed account of the features and changes in the new design over here. Moreover, if you want to check out the “disappearing” homepage Google has also been testing for a while, you can read about it here. And, finally, if you don't want to mess with your browser's cookies you can check out some screenshots below.

Here's the code you need to copy and then paste in the address bar:

javascript:void(document.cookie="PREF=ID=20b6e4c2f44943bb:U=4bf292d46faad806:TM=1249677602:LM=1257919388:S=odm0Ys-53ZueXfZG;path=/; domain=.google.com");



The new Google homepage
Enlarge picture
The main search results page in Google Search
Enlarge picture
The news filter in Google Search
Enlarge picture
The video section in Google Search
Enlarge picture

Symantec Online Store Hacked

Nov 27, 2009

User passwords and product serial numbers potentially exposed


http://www.logitech.com.au/Images/Other/Symantec%20big.JPG

A self-proclaimed grey-hat hacker has located a critical SQL injection vulnerability in a website belonging to security giant Symantec. The flaw can be leveraged to extract a wealth of inf
ormation from the database including customer and admin login credentials, product serial numbers, and possibly credit card information.

The flaw was found by a Romanian hacker going by the online handle of Unu, according to whom an insecure parameter of a script from the pcd.symantec.com website, allows for a blind SQL injection (SQLi) attack to be performed. In such an attack, the hacker obtains read and/or write permission to the underlying database of the vulnerable website.

During a regular SQLi attack, the result of a rogue SQL query is displayed inside the browser instead of the normal web page output. Meanwhile, in a blind SQL injection, the query executes, but the website continues to display normally, making it much more difficult to extract information.

Symantec PC Doctor database server information
The content of the pcd.symantec.com website is written in Japanese, but from what we could determine, it serves a product called Norton PC Doctor. Accessing most of the website's sections requires authentication, and in order to exploit the blind SQLi vulnerability, the hacker had to use a few specialized tools. The Web server appears to be running Windows Server 2000 as operating system, Microsoft IIS 6.0 with ASP support and Microsoft SQL Server 2000 as database back-end.

From the screen shots released by Unu there are many potentially interesting databases, but the one he chose to look at is called "symantecstore." One of the tables in this database is named "PaymentInformationInfo" and contains columns such as BillingAddress, CardExpirationMonth, CardExpirationYear, CardNumber, CardType, CcIssueCode, CustomerEmail, CustomerFirstName, CustomerLastName or SecurityIndicator.

Database listing on Symantec PC Doctor server
Unu claims that his interest is only to point out security issues and not misuse any data. Therefore, according to him, he did not attempt to extract any information from this table. Instead, he focused on another one called TB_MEMBER, which contains 70,356 records.

For demonstration purposes, he extracted 6 of these entries at random, revealing customer names and login credentials with the passwords stored in plain text; a major security oversight. The hacker also notes that passwords for the accounts in a different table called TB_EMPLOYEE are also stored in a similar insecure way.

A third table Unu chose to investigate is called TB_ORDER and contains columns such as ProductName, ProductNumber, SaleAmount and SerialNumber. There are 122,152 entries in the SerialNumber column.

This is not the first time when Unu scrutinizes the security of websites belonging to antivirus vendors. His previous targets includes Kaspersky and Bitdefender. Some months back, he even disclosed a vulnerability affecting a different Symantec website. The AV company eventually played down its impact.

At the end of his most recent disclosure, Unu mentions his previous attack against Kaspersky's US online store website. "There was fair play, they quickly secured vulnerable parameter, and even if at first they were very angry at me, finally understood that I did not extract, I saved nothing, I did not abused in any way by those data found. My goal was, what is still, to warn. To call attention [sic.]," the hacker writes on his blog.

Note: We have alerted Symantec about the potential security breach. We will update this article when/if more information becomes available.

Update: In an e-mail to Softpedia, Symantec has confirmed the existence of a vulnerabiliy in the pcd.symantec.com. Here is the full statement we received:

"A SQL injection vulnerability has been identified at pcd.symantec.com. The Web site facilitates customer support for users of Symantec's Norton-branded products in Japan and South Korea only. This incident does not affect Symantec customers anywhere else in the world.

"This incident impacts customer support in Japan and South Korea but does not affect the safety and usage of Symantec's Norton-branded consumer products. Symantec is currently in the process of updating the Web site with appropriate security measures and will bring it back online as soon as possible. Symantec is still investigating the incident has no further details to share at this time."

Mengatasi Virus Virut

Nov 4, 2009

http://community.ca.com/blogs/securityadvisor/Methusela/virut17408_HTML.gif


Virus menginfeksi file-file .exe sehingga tidak dapat dieksekusi.
Dowload file rmvirut.exe dan rmvirut.nt. Kemudian jalankan rmvirut.exe
Code:
http://www.grisoft.cz/filedir/util/avg_rem_sup.dir/rmvirut/rmvirut.exe
Code:
http://www.grisoft.cz/filedir/util/avg_rem_sup.dir/rmvirut/rmvirut.nt
atau download Kaspersky Virus Removal Tools. ambil yang tanggalnya paling baru.
Code:
http://dnl-eu2.kaspersky-labs.com/devbuilds/AVPTool/
yang ini removal dari AVG Technologhy
Code:
http://download.softpedia.com/dl/3a8dbc822b0573f815bccba005a681f6/4af16d6b/100106366/software/antivirus/rmvirut/rmvirut.exe

Memancing virus menggunakan Killer Machine

Nov 3, 2009



virus removal n take back common registry values. Killer machine bisa mengembalikan kondisi-kondisi seperti mengenable kembali regedit, search, run, dan itu akan dilakukan setelah restart. Jika belum punya Cyberhawk, biasakan instal dulu cyberhawk karena ini adalah kombinasi yang ampuh. Cyberhawk bisa mendeteksi gerakanvirus walaupun belum ada antivirus yang bisa menanganinya.

untuk killer machine nya dapat anda download di cari disini