Hack Wordpress [Reset Password] (Manual) Hack Wordpress [Reset Password] (Manual)

I'll show you How to inject site - word press - And enter to admin panel in Seconds . lets say we have this vuln site : PHP Code:...

Read more »

WAF Bypassing For beginners and Easy WAF Bypassing For beginners and Easy

First sorry for my english and I make thread about WAF bypassing error For beginners ☆¸.•*☆ How to know if Web Application Firewalls! on/o...

Read more »

Joomla | NEW Shell Upload Vulnerability Joomla | NEW Shell Upload Vulnerability

Tanpa basa-basi :D (malas ngetik) Google Dork: inurl:index.php?option=com_fabrik > Upload Shell Lokasi shell: www.site.com/media/...

Read more »

Bypass Forbidden (WAF) @>Sql Injection Bypass Forbidden (WAF) @>Sql Injection

Sore para pentester :p udah lama g update blog cupu ini.. bru ad wktu soalx ckckckc... kali ini ane mau share beberapa cheat utk bypass ...

Read more »

[Share] Backdoor :p [Share] Backdoor :p

Kayaknya g usah ane jelasin yg dimaksud backdoor yee.. pst kalian udah pada tau. ckckck sekirannya backdoornya cuma untuk pembelajaran.. ...

Read more »

Malaysia Claim Tarian Tor Tor, Hacker Indonesia Mengamuk !! Malaysia Claim Tarian Tor Tor, Hacker Indonesia Mengamuk !!

Malaysia klaim tari tor-tor !! hacker indonesia mengamuk !!!!!!!!!!!! >.< puluhan bahkan ratusan website malaysia kena deface oleh h...

Read more »

Hacking Administrator Joomla – Get Full Access! Hacking Administrator Joomla – Get Full Access!

Tools required: SQL-i Knowledge reiluke SQLiHelper 2.7 Joomla! Query Knowledge Finding Exploit And Target Those two steps could go in differ...

Read more »

[TUTOR] Cracking Password - John The Ripper [TUTOR] Cracking Password - John The Ripper

MD5 HASH Format = karakter hexa 0-F Panjang = 32 karakter Contoh md5 hash 84e3fbdf4986585d06d4e7aa2c2e2be7 555f70a1c266100421e2cf45d62...

Read more »

Membongkar Password Mikrotik dengan Linux Membongkar Password Mikrotik dengan Linux

Salam Hangat, Tutorial ini dibuat untuk sahabat-sahabat yang mungkin belum terlalu paham memanfaatkan linux untuk membongkar password mikro...

Read more »

Under Contruction Under Contruction

Maaf ya kawan,.. untuk smentara blog ini, agak rusak :p lagi ganti template. hehe

Read more »

Implementasi Port Scanning Implementasi Port Scanning

Adalah langkah awal yang harus kita lakukan sebelum kita melakukan aktivitas hacking jarak jauh (remote) yang berfungsi untuk melihat servi...

Read more »
 
Top