Hack Wordpress [Reset Password] (Manual)

I'll show you How to inject site - word press - And enter to admin panel in Seconds . lets say we have this vuln site : PHP Code: www.site.com/wp-content/plugins/leaflet-maps-marker/leaflet-fullscreen…

Read more »
08 Sep 2012

WAF Bypassing For beginners and EasyWAF Bypassing For beginners and Easy

First sorry for my english and I make thread about WAF bypassing error For beginners ☆¸.•*☆ How to know if Web Application Firewalls! on/off ☆*•.¸☆ to know this we will use this statement after site l…

Read more »
08 Sep 2012

Joomla | NEW Shell Upload VulnerabilityJoomla | NEW Shell Upload Vulnerability

Tanpa basa-basi :D (malas ngetik) Google Dork: inurl:index.php?option=com_fabrik > Upload Shell Lokasi shell: www.site.com/media/shell_name.php Selesai ^_^…

Read more »
08 Sep 2012

Bypass Forbidden (WAF) @>Sql InjectionBypass Forbidden (WAF) @>Sql Injection

Sore para pentester :p udah lama g update blog cupu ini.. bru ad wktu soalx ckckckc... kali ini ane mau share beberapa cheat utk bypass WAF (Web Application Firewall) [nemu jg] wkwkwk cekidott.. 1+Uni…

Read more »
28 Aug 2012

[Share] Backdoor :p[Share] Backdoor :p

Kayaknya g usah ane jelasin yg dimaksud backdoor yee.. pst kalian udah pada tau. ckckck sekirannya backdoornya cuma untuk pembelajaran.. jgn dibikin rusuh cekidot:!! http://tlphotography.co.za/images/…

Read more »
27 Jun 2012

Malaysia Claim Tarian Tor Tor, Hacker Indonesia Mengamuk !!Malaysia Claim Tarian Tor Tor, Hacker Indonesia Mengamuk !!

Malaysia klaim tari tor-tor !! hacker indonesia mengamuk !!!!!!!!!!!! >. puluhan bahkan ratusan website malaysia kena deface oleh hacker indonesia beberapa website malaysia yg blm di patch http://tnim…

Read more »
21 Jun 2012

Hacking Administrator Joomla – Get Full Access!

Tools required:SQL-i Knowledgereiluke SQLiHelper 2.7Joomla! Query KnowledgeFinding Exploit And TargetThose two steps could go in different order, depend what you find first target or exploit… Google d…

Read more »
07 Jun 2012

[TUTOR] Cracking Password - John The Ripper[TUTOR] Cracking Password - John The Ripper

MD5 HASH Format = karakter hexa 0-F Panjang = 32 karakter Contoh md5 hash 84e3fbdf4986585d06d4e7aa2c2e2be7 555f70a1c266100421e2cf45d62a3938 Cara crack save hashes dalam format id:hash, id boleh apa aj…

Read more »
05 Jun 2012

Membongkar Password Mikrotik dengan Linux

Salam Hangat, Tutorial ini dibuat untuk sahabat-sahabat yang mungkin belum terlalu paham memanfaatkan linux untuk membongkar password mikrotik. Catatan : Tutorial ini hanya bisa diimplement…

Read more »
03 Jun 2012

Under ContructionUnder Contruction

Maaf ya kawan,.. untuk smentara blog ini, agak rusak :p lagi ganti template. hehe…

Read more »
03 Jun 2012

Implementasi Port Scanning

Adalah langkah awal yang harus kita lakukan sebelum kita melakukan aktivitas hacking jarak jauh (remote) yang berfungsi untuk melihat servis yang diberikan oleh server / target di Internet. Dalam ko…

Read more »
03 Jun 2012
 
Top