Headlines News :
Apply to be a Chitika Publisher!

Latest Post

CounterLanguage

English French German Spain Italian Dutch

Russian Brazil Japanese Korean Arabic Chinese Simplified
Google Translate Muhammad Afifudin Aziz
Free Twitter Followers

How to Track the IP address and real "ADDRESS"

Written By Unknown on Saturday, December 4, 2010 | 8:29 PM

#------------------------------------------------- --------------------#
1. Track the IP address of a site
2. Track Real Address server of a site
3. How to Know the IP address we are chatting

                                                      (:::::-----
Discussion -----:::::)


1. Track the IP address of a site
To find the IP address of a site, we can do PING on the site. How: Go to command prompt and typing ping-of-track.com www.situs and press enter. It will appear Ip address of the site.

2. Track Location of servers (real address) of a site
We can track the location of the server of a site just by knowing the address of the site only. Try to open www.domainwhitepages.com Just enter the IP address of this site, or enter the site address and you will get complete info about the server from the site of which is the location of the state and city.


3. Track the IP address we are chatting
When we use Yahoo messenger, in fact we can know the IP address of the person we chat. How:
:: Send a file on the opponent we chat.
:: Then go to command prompt (MSDOS) and type NETSTAT-N and press enter, then you are chatting with the IP address (that you send a file to earlier) will appear along with the port used for file delivery.
:: To find the location you are chatting with (real address) like he was on campus or in a cafe where you live check in with www.domainwhitepages.com use the IP address you get.

Key Generator (keygen) For Cracking

 Jasakom Community#------------------------------------------------- ------------------------------------------------#

It started when I was reading one magazine I bought a new computer, in this magazine I found writing more or less as follows: â € œBagaimana can (maybe), the code and algorithms that in fact is very confidential for a manufacturer of application-doers can be solved by the keygen ( cracker)? â €? (PCMedia edition 06/2006), maybe some people would be confused to find the answer, here there are 3 Â Â probably why we are confused in answering the questions above:1. The algorithms created by the software manufacturers are confidential, and not the manufacturer may meet the cracker at home to inform a new algorithm that he created.2. Application made by the manufacturers is very valuable, surely the producers will protect applications that are not easily hijacked.3. The asker has never looked the underworld (underground community) like this Jasakom,:-PLet me answer this question will pass this article.
What is Key Generator (keygen)?Actually, this question does not need to answer, because I'm sure 98% of computer users who entered Indonesia ranked the Top 5 largest software piracy in Asia or maybe even the world, would never see, wear, or feel that his name keygen!.
All right way better than most of us begin our cracking tutorial.
Cracking StartBefore we start I must ask maa € ™ af used on Khaled Mardam-Bey, because I will use his application to our experiments this time.For example I will just make mIRC application as a victim.
The tools should we use for our cracking are:1. W32dasm (Wind * ws 32 Disassembly).2. Calculator Wind * ws.3. Cheat Engine (I use version 4.4),  I'm not use SoftICE SoftICE because I can not   pathin XP. To download Cheat Engine: http://www.heijnen1.demon.nl/4. Application targets: recent mIRC version now is 6:16. <- Khaled Iâ € ™ m sory for this.5. UltraEdit (if necessary)6. Chocolate wafers (I love chocolate) :-)
Actually Cheat Engine is an application to cheat the game was made by dark_byte, but instead I was wrong to use for cracking ..he.he. because the application itself has a miraculous kelebihan not shared by other debuger programs, such as stealth to overcome anti-debug protection system. And more cool again this tool could be to bypass the password on some securtiy applications (author've been breaking a few computers in the apartment who use keys  password using this tool:-P)
Okay we start aja
Install mIRC v6.16, W32Dasm and Cheat Engine (all except a calculator).After the install is complete run mIRC, you're going to look in the windows nag (nag screen) which indicates that the application is still 30-day trial version, and expect you to buy it.Click â € œContinueâ €??,In the window œmIRC Optionsâ € â €? click â € œCancelâ €??.Click the â € œHelp> Registerâ €??.Now you can see a window containing two TextBox, one for username and one for the serial number.Enter the name of â € œ4NVIeâ €? on â € œFull Nameâ €? and enter œ12345â € â €? on â € œRegistration Codeâ €??.Click OK or press Enter, what happened?â € œThe registration name and number you have ENTERED are not valid. Please make sure you are enteringâ € | blah .. blah .. blah .. â €?
This paper appeared, supported by a red X symbol. Hiks, Relax do not worry.Now its run Cheat Engine. Then it will appear a window like this:
Click the computer image in the top left corner, Â after the windows process list look looking for a process called â € œmirc.exeâ €?

After the Cheat Engine to attach process € ~ â € ™ mirc.exeâ our next step is mendebugnya by clicking the â € œMemory viewâ €?in Cheat Engine. behold, the following window
Click the menu View> Enumerate Dllâ € ™ s and symbols, there will appear some symbol of the â € œDynamic Links Libraryâ €?Wind * ws-owned (DLL). Click on â €  € œUSER32â? and search functions â € œGetWindowTextAâ €??, he .. he .. would be difficult because not use alphabetical order (that lack Cheat Engine) after See you double-click on the function page and click â € œCloseâ €??.Memory Viewer will show the address they will function. Press F5 to make breakpoin, click OK on the registration window in mIRC, failed!. We'll try again with another function â € œGetDlgItemTextAâ €??, Remove the first breakpoin the first function by pressing the F5 key, ngulang search again DEHA €??, After making breakpoin on a second function, the contents of the name and serial number and press again on mIRC the OK button.Failed Again!, Damn!. Because many times fail, we run W32Dasm, click Disassembly menu> Open File to disassemblyâ € | mirc.exe locate the file in the directory you installed mIRC.After the loading process is complete Click the â € œSearch> Find textâ €? in the Find window, the contents of the text with œRegisterâ € â € | â €? not use quotation marks (this string I found on the body exenya that I go to use UltraEdit), Click œFind Nextâ € â €? 3 times, press â € œPage Upa €? 8 times, to appear:
: 004C764C 8D94240C010000 Â lea edx, dword ptr [esp +0000010 C]: 004C7653 8D4C2408Â Â Â Â Â Â lea ecx, dword ptr [esp +08]: 004C7657 E8A4FDFFFF Â Â Â Â call 004C7400: 004C765C 85C0Â Â Â Â Â Â Â Â Â Â test eax, eax: 004C765E 740EÂ Â Â Â Â Â Â Â Â Â je 004C766E
lea edx, dword ptr [esp +0000010 C] This assembly code will enter the address of the serial number that we had input into the register EDX.lea ecx, dword ptr [esp +08] if this one will enter the address of our name to the register ECX.call 004C7400 nah! This call calculates the name and number that we enter and will result in the return value in EAX register, if the name / serial number is valid, the EAX register will be worth 1, but if not valid then the EAX register will be worth 0 (zero).test eax, eax check whether EAX 0 / 1.je 004C766E if EAX = 0 then jump. We could have passed this leap with his way to the NOP, but in this way will change the CRC of files eksekutebelnya (crack rough), so not good, especially if the application that we will crack equipped CRC protection system, which is not the program will run if there is a change CRC!, or maybe we can not update because not use serial numbers!, so we use a way to make keygennya kelemubutan aja.
Continue!See the address 004C7657, because we already know where the address name and serial checking in, now we move into Cheat Engine, at the window œMemory Viewerâ € â €? right click on the first column,
On the popup menu click â € œGo to addressâ €??, On the window â € œGo to addressâ €? enter the address that we have had the â € œ004C7657â €? without the quotes, click â € œOKâ €??, it will tampakÂ:
Now make breakpoin on 004C7657 address by pressing the F5 key, move to mIRC, enter the name and serial number, click â € œOKâ €??, Process stopped, return to Cheat Engine, trace into the call 004c7400 procedure by pressing F7, after entering the trial  trace over by pressing the F8 key until you see

Lea ESI, [eax +10]; enter the effective address of the serial number that we enter into the ESIMov dl, [eax]; enter 1 character from the serial number into dlInc eax     Â; eax = eax +1Test dl, DLA       Â; whether the characters already out?Jne 004c7518 Â; if not jump into 004c7518 (looping)Sub eax, Esia Â; eax eax reduce the ESI results contains the number of characters of the serial number which we enter or equal to the VB command len (ESI)Cmp eax, ecx Â; whether the number of charactersJae 004c7532 Â; more than 4? If yes skip to 004c7532
Once we trace over to here go to the address 004c7532 by pressing the F7 key, after entry we will see the following code:
Mov ebx, [esp +10]; enter effectively address the serial number located to the EBX, if not believe in trying to trace so that the code is executed first then right click on the column to the bottom and on the popup menu click œGoto addressâ â € €??, Type â œebxâ € €? (Not use quotes) hit enter, it will show the serial number that we enter earlier.
Push 2dÂ; enter the stack of 2D (hexadecimal character from 45 = â € œ-â € œ)Push ebx; enter values into the stack EBXCall 00570260; regularly to check whether there is a character â € œ-â € œ on our serial number?Oops! Apparently there must be a sign of â € œ-â € œ on the serial number, is it possible serial format like this? :  € œ12345-12345â €??.Okay because there must be a sign of â € œ-â € œ on the serial number then we have to repeat the serial number input with the format as above, make breakpoin at address 004C7539 not let me re-trace (press F5), press F9 two times until the dialog box appears rejection , the contents of œFull Nameâ € â €? with â € œ4Nvieâ €? (Not use quotes) and â € œRegistration Codeâ €?with â € œ12345-12345â €? (Not use quotes), press Enter, the process stops, back to Cheat Engine, press F9Mov ESI, eaxAdd esp, 08Test ESI, ESIJe 004c7525Once the code is executed ESI register will contain the address of the character â € œ-â € œ on which we enter the serial number earlier.Push ebx; enter the value of ebx to the stackMov byte ptr [ESI], 00; change the character of â € œ-â € œ with a null byteCall 00570543; this routine will keep our first seriesAdd esp, 04Mov byte ptr [ESI], 2d; return the character â € œ-â € œESI Inc.; ESI +1Mov ebp, eaxCmp byte ptr [ESI], 00; whether the ESI is pointing at the end of the series?Je 004c7525; if yes jump into 004c7525Psuh ESI; enter values into the stack ESICall 00570543; not importantMov ecx, edi; EDI contains our nameAdd esp, 04Mov [esp +10], eaxLea edx, [ecx +01]Mov al, [ecx]; enter the 1 character of our name to ALEcx Inc.; ecx = ecx +1Test al, ala   Â; if al = 0Jne 004c7570; if not loop!Sub ecx, edx; subtract ECX EDX, ECX contains the number of characters results from our nameMov ESI, 00000003; ESI = 3Xor edx, edx  Â; clear EDXXor ebx, ebx; clear EBXCmp ecx, ESI; whether the number of characters in our name -Jle 004c75a8; less than or equal to 3? (Len (name) <= 3) if yes jump!Because the number of characters we name more than 3 then this would not happen leap.Trace and hold (do not remember pake pake F7 F8), in jmp 004c7590 we will jump a short, After the jump we landed on the following code:Movzx eax, byte ptr [ESI + edi]; enter a character in EAXImul eax, [esp + edx * 4 +14]; multiply EAX by .... (Maybe an array?), Let's look at the address of the ESP, is there a magic value there?, I click on the right hand column below and select â € œGoto addressâ €??, Type â € œesp + edx * 4 +14 â €? (Not use quotes) hit enter.Jreng!
He .. he .. he ..., it turns out I was right see in the picture above, it is an array! Which contains a magic number, well!, Now we need a calculator Bill to convert hexadecimal values to decimal values, (Bill pinjem kalulatornya dong!), The calculator click menu â € œView> Scientificâ €??, Select the radio button â € œHexâ €??, enter the magical and moving his radio buttons to œDecâ € â €?then we can know the decimal value:Konvertasi dec hex value to the array above is:
             1a 2a 3a 4a 5a 6a 7a 8a 9 10 11 12 13 14 15 16 17 18 19 20Hexadecimal: 06 11 0C 0B 0C 0E 05 0C 10 0B 0A 0B 06 0E 0E 04 06 0E 0E 04DECIMAL   Â: 11  6 17 12 12 5 12 16 10 14a 11a 14a 4 11 6 14 6 14 14a 4             21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39Hexadecimal: 0C 09 0B 0A 0B 0A 0A 08 10 08 04 06 0A 0A 0C 10 08 04 10DECIMAL   Â: 11A 9 12 11 8 10 10 16A 10A 4A 8A 6 10 12 16 08 10A 4 16
It turns out that there is a magic number 39 is summarized in the table array.So the command Imul eax, [esp + edx * 4 +14] together with the command in VB:
Asc (Mid $ (ESI, X, 1)) * NomorAjaib (EDX)
He .. he .. he .. The algorithm is simple is not it?, Okay, eat chocolate first ... ahUp here I've seen a bright spot. Continue!Add ebx, eax; added EBX value multiplication results in EAXÂ Â inc edx; EDX is countercmp edx, 26; whether it has been spinning as much as 38 times?(Really 38 not 39?, Yes because the first array to read starting from 0)jle 004c75a3; if less or equal to 38 jump!Xor edx, edxÂ; but if you've more than 38 sets of EDX to 0 (back to the magic number first)Esia Inc. Â Â Â Â; adds ESI to 1 (next character)Cmp ESI, Â ecx; whether the characters already out?Jnge 004c7590; if not back again (loop! Sampe exhausted characters)Well here until we certainly have understood the purpose of the above code, so illustration roughly like this:
Name -> split into two parts with serial 00000-00000 format -> calculated the first section -> calculate the second part-> serial numbers equate that we enter with the results of calculations on the EBX -> conclusion (valid / invalid code).Âwell now we make key generator, would be made use what? Relax do not panic I'm not going to make use Assembly anyway, we make use VB wrote that easy. Yup!, We start aja.
Prepare one TextBox and a CommandButton and then type the following source code:CUT HERE -------------------[ ]--------------------------- ----------------------Option Explicit
Private Sub Command1_Click ()Dim NomorAjaib (38) As LongDim EDX, EAX As LongDim Bagian1, Bagian2 As LongDim X As Long
â € ~ magic numbers we fill into arrayNomorAjaib (0) = 11: NomorAjaib (1) = 6:NomorAjaib (2) = 17: NomorAjaib (3) = 12NomorAjaib (4) = 12: NomorAjaib (5) = 14:NomorAjaib (6) = 5: NomorAjaib (7) = 12NomorAjaib (8) = 16: NomorAjaib (9) = 10:NomorAjaib (10) = 11: NomorAjaib (11) = 6NomorAjaib (12) = 14: NomorAjaib (13) = 14:NomorAjaib (14) = 4: NomorAjaib (15) = 11NomorAjaib (16) = 6: NomorAjaib (17) = 14:NomorAjaib (18) = 14: NomorAjaib (19) = 4NomorAjaib (20) = 11: NomorAjaib (21) = 9:NomorAjaib (22) = 12: NomorAjaib (23) = 11NomorAjaib (24) = 10: NomorAjaib (25) = 8:NomorAjaib (26) = 10: NomorAjaib (27) = 10NomorAjaib (28) = 16: NomorAjaib (29) = 8:NomorAjaib (30) = 4: NomorAjaib (31) = 6NomorAjaib (32) = 10: NomorAjaib (33) = 12:NomorAjaib (34) = 16: NomorAjaib (35) = 8NomorAjaib (36) = 10: NomorAjaib (37) = 4:NomorAjaib (38) = 16'Number of characters a name at least 4 charactersIf Len (Text1.Text) <4 Then   MsgBox "Name at least 4 characters!"   Text1.SetFocus   Exit SubEnd IfEDX = 0 'xor edx, edx'Create a serial number for the first part firstFor X = 4 To Len (Text1.Text)   EAX = Asc (Mid $ (Text1.Text, x, 1)) * NomorAjaib (EDX)   Bagian1 = Bagian1 + EAX   EDX = EDX + 1   If EDX> 38 Then EDX = 0X NextEDX = 0EAX = 0'For the second serial numberFor X = 4 To Len (Text1.Text)   EAX = Asc (Mid $ (Text1.Text, x - 1, 1)) * Asc (Mid $ (Text1.Text, x, 1))   Bagian2 = Bagian2 + EAX * NomorAjaib (EDX)   EDX = EDX + 1   If EDX> 38 Then EDX = 0X Next'The results of calculations show the MsgBoxMsgBox "Number serial loe:" & Trim $ (Str $ (Bagian1)) & "-" & Trim $ (Str $ (Bagian2)),, "mIRC 6:16 KEYGEN"End SubEOF -------------------[ ]---------------------------- ---------------------After dikompil try running and enter the name, then enter your name and serial number on windows œRegistrationâ € â €? mIRC, click œOKâ € â €? and ...
Huaaahmâ € |. Hours are shown at 3:30, finally finished also nih articles.By the way this is how I can find algorithms protection system on an application / software without the need to peek / request the source code on the developers!.
Last wordsThis is only for educational purposes only, therefore the author is not responsible if the science is misused for things that are harmful.Hopefully with this writing software developers to be more careful and pay more attention to the security on the application.

How Free SMS Through Service Operator Pro XL


Jasakom Community - Article#------------------------------------------------- -------------------------------------------------- --------#So with a bubbling sense of longing in the soul, and with a little "trial and error". I try to exploit what I have now, which is a battered mobile phone and sim card of a pulse carrier pro xl aka da emergency stay really can make a phone to the operator doang.heheheIn short way, are not accidentally (ato possible miracles times yes) I nemuin a bug in the sim card to get pro xl sms were free at certain times. Ko certain times sii? Melepasmu wants his name is also free at any time! kekeke :-)This way i pas pas last try yesterday at midnight, where the wind blows again kenceng-kencengnya.
# FirstThe first step I call the operator pro xl, and with a little technique soceng gw "pretend" confusion due to a sudden change gw sms service center number so that i can not send and receive SMS from anywhere. and I purposely asked for help so that the operator service center number i in perbaikin from the center of their system. nah this is where the "cunning" I, I accidentally calling Malem-evening, because I know their system again offline, so they recommend matching messages through the service center number manually, by setting it own. we have to patiently wait, and if we can make the operator tired of stalling for time with a variety of questions that make us "as if a new user" so that eventually they will give up a little and trying to help us overcome the problem by providing access to the providers messages that can be accessed through a menu of data services that already exist in the sim card program. usually located on the menu info.
# SecondOnce we've managed to get the message service center code number, the unique number would have seen the advantages of numbers, where numbers are key to our phreaking activity this time!hehehe. usually the number of excess is an odd value.
# ThirdOnce we get the numbers "unique", we can immediately begin air-ria for free sms. :-) The trick is that you type the sms as usual without any addition of special techniques, well when we're done and will send it, prepare a number of pro xl would you go for example 081808123456, and also no beauty that I mentioned earlier for example no beautiful is the number 7, then you should be typing in the box is notujuan destination phone number - the number "beautiful" - along with an additional longer, that number is toll free sms service, for example 818 and 284.0818081234567284 so this example, own 284 number on the back is a toll free number frequently used by customers free cards to check their lottery number of points.
# FourthAfter you format the input numbers correctly, you can press yes or okay. first may be an error sending, but do not worry, try again by pressing the redial button or right back up sms successfully delivered to the destination.
# The logic of the above problemsBecause we access via the message service center number service feature data, it means there will be an excess number defined by the system operator as a package operator, such a trivial signature does not look like it. because this number comes from operators who are generally leads to this free service, then with these characters we can make no purpose that we will send an sms "as if" a toll-free number or the number operator. for error sending that often occur alone caused "confusion" system for reading the number. Usually this technique successfully used at about 00:00 hours until 0200, so there is a deadline less than 2 hours to enjoy the "service" is.Last but not make use of this activity is only for urgent kepentingn only, and I hope this article can also be used as guidelines by the pro xl. thank you

Note:All of the above is the result of an empirical study of the writer with no intention of demeaning any party




Tools For Hacker

------------------------------------------------- ----------------------------------------------------------#

In the world of hacking was known of the term "rootkit" is so popular although many do not understand what is meant by the rootkit.

Rootkit consists of a combination of 2 words, ie root and kit. Root is the highest privileges in Unix family of operating systems and the kit is a collection of tools. So rootkits can be interpreted as a collection of tools or tools that are used to control a system permanently without being noticed by the administrator of the machine that has been mastered.

Rootkit must have the ability to hide its presence and also has the ability to keep control of the system without being noticed by the admin concerned. Rootkits typically will enter into the architecture of a system that is not detected, so it means a program such as BO and Netbus backdoor can not be categorized as a rootkit.

Rootkits are usually composed of several tools, such as:

* Backdoor Program
Is a program used for the system can remain occupied and still be accessible without the need to again via the exploit. With so although weaknesses have been corrected or exploit the system no longer valid, the attacker is still able to control the system via this backdoor.
This backdoor program usually will modify or replace programs like login.c, ftp, rlogin, inetd, etc. thus allowing an attacker gain access through a service that has been modified it. Placement backdoor even done well through hard kernel modifications to the detection kerbeadaannya.

* Packet Sniffer
Sniffer is a program used to capture the information passed from the cable network. Programs such as ftp and telnet usually in sending a username and password information in encrypted text that is not so easy to steal.

* Controller Log Files
Programs that are in and quite important to include the rootkit is a program to remove the log. With this tool all the activities of the attacker can be hidden so that the admin is not aware of the activities that occur by an unwanted party. Given these tools to make the admin will have difficulty in detecting the presence of these unwanted party. Usually for the log files also included a program for editing of the log file.

* Other Tools
Are additional tools that are used by attackers as Ddos client program, namely trinoo, IRC bot which will connect automatically to the IRC server in automatically, etc..

* System Patch
After gaining access to the vulnerability, the rootkit also provides tools to make the patch against the vulnerability is with the aim that other hackers will not go into the system. Because the attacker has made a backdoor, which has mastered the system will still be in control of the attacker with a rootkit.


Rootkits can be divided into 2, namely:
* Application Rootkit
* Kernel Rootkit




• Application Rootkit
Application rootkit is a rootkit that much in use by hackers. Rootkit is replacing or modifying the original program with the modified program with the ability trojan. Some examples of programs that replaced are:

* Ls, find that the program does not display the program of the attacker
* Netstat normally displays the port in an open, network connections, and status of listening so it will not display the program or the connection from hackers.
* Killall, so the trojan program installed by hackers will not be in the kill.
* Tcpd, syslogd so it will not record activity in a computer hacker
* Passwd, by entering a password from the root shell rootkit will be used
* Log in, all the usernames can be used for login, including root if the password of a rootkit is used
* Sshd, sshd sometimes be used so as not detected by the sniffer.
* Linsniffer, which is used for sniffing on the network
* Inet.d which will mengopen ports so that hackers can use it to enter into the target with a password that has been determined.

• Kernel Rootkit
Kernel rootkits are rootkits that are harder to detect than the rootkit application. Program for kernel rootkits is available for Linux, Solaris and FreeBSD.
By modifying the kernel, a hacker could hide network connections, files, process, etc..



• Process pemanfaatkan Rootkit
A rootkit is not a tool to attack, but a rootkit is intended to be used as a tool after the attack. With the rootkit a hacker will be able to keep control of the victim's computer undetected.



Social Engenering , Taking Over A Technics WebSite

 
Writing This is just to study materials only and to keep your website from the action - action that is in my writing this. I am not responsible Answer If my writing is in use / misused for a crime.


Social Engenering is a technique hackers To Make A Hacking into a Target, Social Where this Engenering do a thing where the attacker was, pretend - act as a figure of man, which became the target. (Confused yes With this explanation?: P)

Technics Social Engenering not require a special skill, like language pemerongraman that in use to write an exploit and can use a variety of Operating System, and others.

Social Engenering this technique is only to convince the network admin That we are Ko - Ko man Who Will We Prey

Technics Social Engenering or Psycologi Hacking Once this is very much kind of technique / how to Do It.
Here I will try the way Doing this technique to perform Takes Over A WebSite / Over site.

Okay Let's Doit Bro:


The first step that will determine the First Website You Take Over:

For example www.stupid-web.com

Now that Phase I (first) We Doing Whois towards the target where we will find out the identity of Sitarget, Open your browser and Come Into My Website http://www.neo-doank.co.nr/scan.php [here I have a simple program to melaukan scaning of a Host or Domainname,] (Scan only. com. net. org. info), then enter the domain namenya (www.stupid-web.com) for the scan. See Below Sample Scan results against targets

Sample Results of http://jasakom.com Whois:

jasakom.com resolved to 216.177.77.9
DNS Query Results:


; <<>> Dig 9.3.1 <<>> any jasakom.com
;; Global options: printcmd
;; Got answer:
;; ->> HEADER <<- opcode: QUERY, status: NOERROR, id: 40282
;; Flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 3, Additional: 3

;; Question SECTION:
; Jasakom.com. IN ANY

;; ANSWER SECTION:
jasakom.com. 3591 IN A 216.177.77.9
jasakom.com. 3591 IN NS ns3.discountasp.net.
jasakom.com. 3591 IN NS ns1.discountasp.net.
jasakom.com. 3591 IN NS ns2.discountasp.net.

;; AUTHORITY SECTION:
jasakom.com. 3591 IN NS ns2.discountasp.net.
jasakom.com. 3591 IN NS ns3.discountasp.net.
jasakom.com. 3591 IN NS ns1.discountasp.net.

;; Additional SECTION:
ns1.discountasp.net. 172150 IN A 64.79.161.51
ns2.discountasp.net. 172150 IN A 216.177.89.10
ns3.discountasp.net. 172 150 IN A 63.110.186.41

;; Query time: 3872 msec
;; SERVER: 127.0.0.1 # 53 (127.0.0.1)
;; WHEN: Mon May 22 19:32:50 2006
;; MSG SIZE rcvd: 204


Connecting to whois.arin.net ...


OrgName: Savvis
OrgID: SAVVI-2
Address: 3300 Regency Parkway
City: Cary
StateProv: NC
PostalCode: 27,511
Country: U.S.

ReferralServer: rwhois: / / rwhois.savvis.net: 4321 /

NetRange: 216.177.64.0 - 216.177.95.255
CIDR: 216.177.64.0/19
NetName: SAVVIS
NetHandle: NET-216-177-64-0-1
Parent: NET-216-0-0-0-0
NetType: Direct Allocation
Nameserver: DNS01.SAVVIS.NET
Nameserver: DNS02.SAVVIS.NET
Nameserver: DNS03.SAVVIS.NET
Nameserver: DNS04.SAVVIS.NET
Comment:
RegDate:
Updated: 2004-10-07

OrgAbuseHandle: ABUSE11-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-877-393-7878
OrgAbuseEmail: abuse@savvis.net

OrgNOCHandle: NOC99-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-800-213-5127
OrgNOCEmail: ipnoc@savvis.net

OrgTechHandle: UIAA-ARIN
OrgTechName: U.S. IP Address Administration
OrgTechPhone: +1-800-213-5127
OrgTechEmail: ipadmin@savvis.net

# ARIN WHOIS database, last updated 2006-05-21 19:10
# Enter? for additional hints on searching ARIN's WHOIS database.



 -------- Whois Results------------------------- In allwhois.com

Registrant:
      Jasakom
      Ruth Jasakom
      Jl. Kebon Kosong Gg. Mantri 3 No: 161B
      Jakarta Pusat, DKI 10620
      ID
      Email: sto2009@yahoo.com

   Registrar Name ....: REGISTER.COM, INC..
   Registrar Whois ...: whois.register.com
   Registrar Homepage: www.register.com

   Domain Name: jasakom.com

      Created on ..............: Tue, July 11, 2000
      Expires on ..............: Fri, July 11, 2008
      Record last updated on ..: Wed, February 8, 2006

   Administrative Contact:
      Jasakom
      Administrator Jasakom
      Jakarta
      Jakarta, DKI Jakarta -
      ID
      Phone: 62-8129221973
      Email: sto2009@yahoo.com

   Technical Contact:
      Register.Com
      Domain Registrar
      575 8th Avenue 11th Floor
      New York, NY 10018
      U.S.
      Phone: 1-902-7492701
      Email: domain-registrar@register.com

   DNS Servers:

   ns2.discountasp.net
   ns1.discountasp.net
  

Register your domain name at http://www.register.com


  ----------------WHO-IS --------------------------------END ---------


In the above we can see the Identity Sipemilik Domainname, where we see information ranging from name, e-mail, Address, Phone ... Etc ... ... ... ... ... ...
That was enough for We Conduct an attack on the identity of Si-Target

Now phase II (second), we do e-mail to the Administrator in which the target Hosting: D.
Open http://www.neo-doank.co.nr/mail/ Here I have a script Anonymous E-mails I write Own / Design own. Once you go in and log on Website Targeting We send e-mail to Administrator Hosting Si-Yang Having a website that we'll hack. (Fill in your E-mail E-mail As the target for its Domain Name Registering Must)

Contents E-mail is as follows:
----------------------------------------------

Dear,

My Name is Mr. Bla ... Bla ... Bla (Bla = First name and Last name The high-Domain name that will last ... We Hack you can see after the Whois)
I 'can not login to My account, I'forgot Because my Login Name And Password,' There is' Below My Identity sandwiches I's registered domain name to your My Hosting Company:

(Enter last Whois Start All proceeds from the First name, last name, address, city zip code, and so on ..)

Please Send My Login Name and Could You Change my password to: kenatipu-loe, Because I 'Want to Manage My Account and update My Site.

Please Change My Password As soon As possible, if the Password Has Been Change
Please Send login + new passwords to My Another E-mail (enter e-mail that others are here)

Regard

In accordance with the register names Account



You Can Replace the word - he says as you see fit, or for those of you who already speak English Proficient, use your own language, if my language not good: P


Okay, description techniques at the Top Is We pretend - pretend as a person who has a website that we will Hack, where we ask for the Admin HostingCompany in place of His Domain name registered. Once There komfirmasi that password changed, you can login to the target via the Control Panel, FTP or SSH.
Happy Bro HACK


Thanks To ALL, For Read my NEWS !!!!!

Fake Mail

                                                                --  Preface -- 


Fakemail or commonly called a "fake email" is the email sent by someone to another orng using false identities. Ordinary Fakemail sent by utilizing the Open Relay SMTP Server. Maybe you've received an email with a unique domain address such as: me@anywhere.com, I@Love.you c@ke.p or even sender address is the address of your own and not infrequently terdisplay [nobody] (this is because the sender does not From filling out the form.) The scope of our discussion this time is:


I. What is the purpose to send Fakemail and what dangers?

II. How do I send Fakemail?

III. How do I distinguish between Fakemail and not Fakemail (original email)?


                                                               //--- Discussion --- /


I. What is the purpose to send Fakemail and what dangers?



1. Just For Fun

This is often done by others to provide a kind of "surprize" to his friends, apalgi the victim is a person who does not really understand the ins and outs of the internet and the world of Anonymity. Most of the perpetrators are young men who (probably) less work (without purpose bermanfat).


2. Social Engineering

Attackers often use fakemail to perform social engineering (social engineering) in order to gather information about the victim. This is bad for them is pncurian password and password takeover.


3. Causing Mailing List

In a mailing list is not rare difference of opinion or thought. Often found several members yng perkatan felt offended by other members who judged "harsh". Here Fakemail role, we URLs member who was hurt was a Lamer:

1. Lamer noted the name of one member on the mailing list.

2. He then did a post with another member's name with dirty words.

3. Lamer note address emposting moderators and dirty words anymore.

4. Chaos-chaos and slander on the mailing list.

5. Members of other individuals will on leaving out the mailing list.

6. Mailing ruined!


4. Promotion ----> (Spamming)

Within one year this has been filtering Yahoo.com reported more than 2 Billion Spam. Junk emails are often sent by a company or owner of a site specific service providers to promote its product.


5. Grudges or feeling dissatisfied

Squabbles in cyberspace often happens in IRC channels. Not infrequently because they feel offended happen Cyber warfare. Sometimes a chatter was a coward that dare not use the original email address to berate and terrorize his victim.


6. Virus Spreading

It is often found in a well-known VX who want the virus. Because maybe shy and for the sake of security credentials, he spread the virus (manually) to large mailing lists using a fake identity.


7. ... ... (Fill it yourself ...: P)


II. How do I send Fakemail?


1. Utilizing TELNET

Consider the following example ... ....


Click START - RUN and type TELNET


==============================
C: \ WINDOWS \ Ssytem32 \ telnet.exe
==============================

Welcome to Microsoft Telnet Client


Escape Character is 'CTRL + J'


Microsoft Telnet>

---> Type 'o' = To connect to the server in question.

<To>

---> Type 'mail.terserah.com 25' = mail server is


<To> mail.terserah.com 25

Connecting To mail.terserah.com ...

Connected ...


Mail.terserah.com is xxx.xxx.xxx

---> Type 'helo mail.terserahkamu.com'


Helo mail.terserahkamu.com pleased to meet you


---> Type 'mail from': (name of victim) @ terserah.com '= Examples of' mail from:


anyone@anywhere.com '.

OK


---> Type 'rctp to': (name of the victim) @ terserah.com '= Sample' rcpt

to: korban@terserah.com '.


OK

---> Type 'Subject:' = contents subjectnya

---> Type 'From:' = fill up your name, example: Spyro <anyone@anywhere.com>

---> Type 'X-Mailer:' = write mailers, such as: Micorosft outlook = So that if the victim merply your letter, a letter will be returned.

---> Type the message ...


Balablabla ...

From,

El Azizy ...

---> Click enter 2x to end email

Send 37368232982, OK

---> Type 'Quit' = Disconnect from the mail server


2. Using the sendmail function in PHP

PHP sendmail function that allows us to send email without MYSQL. We are just now looking for domain hosting that allows PHP scripts. Here's an example PHP script sending Fakemail (Fakemail.php):


<? Php

fakemail function ($ ANZ, $ anzname, $ anzdomain, $ anztld)

{

$ Alpha = array ('a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'k', 'l', 'm', ' n ',' o ',' p ',' q ',' r ',' s', 't', 'u', 'v', 'w', 'x', 'y', 'z' );

$ At ='@';

$ Dot ='.';

$ Divstart = "<div style=\"display:none;\">";

$ Divende = "</ div>";

$ Name ='';

$ Domain ='';

$ Tld ='';

$ Mail = array ();

$ Block ='';

srand ((double) microtime () * 100000);

for ($ j = 0; $ j <$ ANZ; $ j + +)

{

for ($ i = 0; $ i <$ anzname; $ i + +)

{

$ Awert = rand (0.23);

$ Name .= $ alpha [$ awert];

}

for ($ i = 0; $ i <$ anzdomain; $ i + +)

{

$ Awert = rand (0.23);

$ Domain .= $ alpha [$ awert];

}

for ($ i = 0; $ i <$ anztld; $ i + +)

{

$ Awert = rand (0.23);

$ Tld .= $ alpha [$ awert];

}

$ Mails [$ j] = "<a href=\"mailto:".$name.$at.$domain.$dot.$tld."\">". $ Name. $ At. $ Domain. $ Dot . $ tld. "</ a> <br /> \ n";

$ Name ='';

$ Domain ='';

$ Tld ='';

}

for ($ k = 0; $ k <sizeof ($ mail); $ k + +)

{

$ Block .= $ email [$ k];

}

return $ divstart. $ block. $ divende;

}

/ / Aufruf für 10 Adressen,

/ / 6 Zeichen als Name,

/ / 8 Zeichen für den Domainnamen,

/ / Zeichen lange und 2 TLD


/ / Echo fakemail (10,6,8,2);

?>


3. Using the sender Fakemail

Many fake email sender application is available free (though no less well paid). We simply fill the form provided with the address of the SMTP server (there are hundreds of SMTP Open Relay is available free of charge!), Fill out the form From / Sender's up with your name, address of the victim, the attachment if available, fill in the message, then press the send button, easy enough is not it? Interested? Download the program in member area Category Mail Bomber (www.spyrozone.tk)



III. How do I distinguish between Fakemail and bukanFakemail (original email)?



We certainly have to be wary of emails that we receive fakemail in considering how dangerous a particular purpose. One way is to look at Full Headers email we receive (look for your own buttons in the mail.)


 Consider a few examples below (here I use the example mail Yahoo!):


From Gin Mon Oct 25 17:13:47 2005

X-Apparently-To: spyro_zone@yahoo.com via 68,142,201,215; Tue, 25 Oct 2005 17:20:28 -0700

X-Originating-IP: [68.142.206.28]

Return-Path: <gin_2115@yahoo.com>

Authentication-Results: mta164.mail.re2.yahoo.com from = yahoo.com; DomainKeys = pass (ok)

Received: from 68.142.206.28 (HELO web32715.mail.mud.yahoo.com) (68.142.206.28) by mta164.mail.re2.yahoo.com with SMTP; Tue, 25 Oct 2005 17:20:28 -0700

Received: (qmail 21962 invoked by uid 60001); 26 Oct 2005 00:13:47 -0000

DomainKey-Signature: a = rsa-sha1; q = dns; c = nofws; s = s1024; d = yahoo.com; h = Message-ID: Received: Date: From: Reply-To: Subject: To: MIME- Version: Content-Type: Content-Transfer-Encoding: b = oyiXejXhE6hhm6epuyNImExh1e9tnmwB5Ru + WpH1 + Eukpjv + uJjPP5G6uK8oCmfpGV6PoO2Ow + wUUmE9oHo + 8qkP48J4env4pdhVlCRD6eZwNDuzGYUXJ9B5SONU4NSe + R7N8laptsvb GoermhyKRO c8Mtv77mAtYVPTXyOf4 +4 =;

Message-ID: <20051026001347.21960.qmail @ web32715.mail.mud.yahoo.com>

Received: from [202.6.237.138] by web32715.mail.mud.yahoo.com via HTTP; Fri, 26 Oct 2005 01:13:47 BST

Date: Wed, 26 Oct 2005 01:13:47 +0100 (BST)

From: Send an Instant Message "Gin" <gin_2115@yahoo.com> View Contact Details View Contact Details Add Mobile Alert

DomainKeys has confirmed Yahoo! That this message was sent by yahoo.com. Learn more

Reply-to: sx7@yahoo.com

Subject: Hi my friend ...

To: x7zone@yahoo.com

MIME-Version: 1.0

Content-Type: multipart / alternative; boundary = "0-610143512-1130285627 =: 19591"

Content-Transfer-Encoding: 8bit

Content-Length: 516


This original email!

GIN --- ---


From gin_2115@yahoo.com Mon Oct 25 16:45:46 2005

X-Apparently-To: spyro_zone@yahoo.com via 68.142.200.72; Tue, 25 Oct 2005 16:45:46 -0700

X-YahooFilteredBulk: 198.173.4.2

X-Originating-IP: [198.173.4.2]

Return-Path: <cluster1@diffusion.agava.com>

Authentication-Results: mta124.mail.dcn.yahoo.com from = yahoo.com; DomainKeys = neutral (no sig)

Received: from 198.173.4.2 (EHLO eternity.agava.net) (198.173.4.2) by mta124.mail.dcn.yahoo.com with SMTP; Tue, 25 Oct 2005 16:45:46 -0700

Received: from diffusion.agava.com (diffusion.agava.com [198.173.4.9]) by eternity.agava.net (Postfix) with ESMTP id 8E7E115311 for <spyro_zone@yahoo.com>; Tue, 25 Oct 2005 18:45 : 46 -0500 (CDT)

Received: by diffusion.agava.com (Postfix, from userid 4036) id 89768BC6011; Tue, 25 Oct 2005 18:45:46 -0500 (CDT)

To: x7_zone@yahoo.com

Subject: Hi Spyro ...

From: Send an Instant Message gin_2115@yahoo.com View Contact Details View Contact Details Add Mobile Alert

Reply-to: gin_2115@yahoo.com

Message-Id: <20051025234546.89768BC6011 @ diffusion.agava.com>

Date: Tue, 25 Oct 2005 18:45:46 -0500 (CDT)

Content-Length: 34


These fake emails!

GIN --- ---

Differentiate the second header of the email above ...!!





                                                               //---Closing ---//


A few from my brief discussion about Fakemail remember my limitations. Better to have a little knowledge but were divided than many but have eaten their own knowledge (basic stingy loe!: P) Hope can be used as material to learn for the newbie (hiks ... but I am also a newbie) and for the master to be used as a reference.
 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. ComputerZone - All Rights Reserved
Template Created by Creating Website Published by Mas Template
Proudly powered by Blogger