DotaNotice

Latest Post

Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Hack Modem Expired Quote

Written By Gerry on Tuesday, February 21, 2012 | 6:37 AM

Bagai mana rasa nya Bila Modem anda kehabisan kuota mungkin kecepatan akses internet anda akan menjadi lelet sekalian malahan seringkal menjadi disconected


langsung ajah gan saya ingin meberi tahu anda bagai mana cara agar akses internet anda tetap normal walaupun kuota sudah habis




saya ambil contoh modem yang saya gunakan adalah modem 3 paket yang saya ambil yaitu paket 1 Gb ,saya sering kali kesel klau kuota internet saya sudah habis tetapi itu dulu sakarang tidak
haha




gigi gan cara nya 
yaitu  di setinggan lagi atau di ubah lagi conection seting nya
kaya yang di bawah ini








APN:web.one.at
User :Web
pasword:Web
Dialin Number:*99#




jangan Lupa ubah jugan Dns Nya gan Kaya gini:
Dns 1: 46.18.36.206
Dns 2: 83.217.93.242 


klau gak pake yang Alternatif yang iniDNSnya google yaitu 8.8.8.8 dan 8.8.4.4 atau rubah pake DNSnya OpenDNS yaitu 208.67.222.222 dan 208.67.220.220


untuk APN lokal (pakai punya Tsel) 
APN: internet (user dan pass tetap pake 3data/3gprs)


untuk APN interlokal
APN: wap.voicestream.com (user dan pass kosong)
APN: epc.tmobile.com (user dan pass kosong)
APN: wap.gocbw.com (user dan pass kosong)
APN: gprsmms (user dan pass kosong)
APN: vfinternet.au (user dan pass kosong)
APN: live.vodafone.com (user dan pass kosong)
APN: telstra.iph (user dan pass kosong)
APN address: internet.proximus.be (user dan pass kosong)
APN: imovil.entelpcs.cl(user dan pass kosong)
APN: wap.viaginterkorn.de(user dan pass kosong)
APN address:airtelgprs.com (user dan pass kosong)
APN: vdata (user dan pass kosong)
APN: shwap or shwapint (user dan pass kosong) 


wap.cingular
User Name: WAP@CINGULARGPRS.COM (All upper case)
Password: CINGULAR1 (All upper case)


APN: internet.com
Username: wapuser1
Password: wap


APN: internet.com
Username: guest
Password: guest


APN: a1.net
Username: ppp@a1plus.at
Password: ppp


APN: web.yesss.at
Username: blank
Password: blank


APN: car games or amazon coupons
Username: web
Password: web


APN: web.one.at
Username: web
Password: web


APN: internet.be
Username: mobistar
Password: mobistar


APN: web.tmovil.cl
Username: web
Password: web


APN: bam.clarochile.cl
Username: clarochile
Password: clarochile 


APN: internet
Username: KPN
Password: gprs


APN: internet.t-mobile
Username: tm
Password: tm


APN: internet.eplus.de
user: eplus
Password: gprs


APN: ibox.tim.it
Username: blank
Password: blank


APN: internet.wind
Username: blank
Password: blank


APN: internet.dhimobile
Username: (blank)
Password: (blank)


APN: WataniyaNet
Username: (blank)
Password: (blank)


APN: internet.movistar.mx
Username: movistar
Password: movistar


APN: internet.itelcel.com
Username: webgprs
Password: webgprs2002


APN: ppsinternet
username: ppsuser
password: ppsuser


APN: sunsurf
user: 65
pass: user123 


APN: e-ideas
Username: 65IDEAS (or blank)
Password: IDEAS (or blank) 


APN address: pp.vodafone.co.uk
Username: wap
Password: wap 


APN: mobile.o2.co.uk
Username: faster
Password: web 


APN address (Contract): orangewap
APN address (PAYG): paygwap
Gateway (IP) address : 192.168.71.035
Username: Orange
Password: Multimedia 


APN:wap.digicelcuracao.com
Username: wapcu
Password: wap03cur


APN: wap.claro.pe
Username: claro
Password: claro

Google: Your Computer Appears to be Infected

Written By Gerry on Saturday, September 17, 2011 | 4:53 PM

 Google has announced they will begin displaying an alert at the top of a search results page when the search appears to result from a particular bit of malware. The alert warning reads "your computer appears to be infected" and provides a link for assistance.

According to Google, the initiative took place after engineers performing routine database analysis noticed unusual traffic patterns, tracked it to a specific strain of malware, and subsequently implemented the alerting. Google hasn't explicitly stated which malware was responsible, but the help file the Google alert points to discusses HOSTS file modification and, specifically, the address 74.125.45.100.

The HOSTS file supersedes DNS for domain name to IP address resolution and thus is a favorite target of malware authors. For example, by modifying the HOSTS file on your computer, attackers can ensure that any attempt to access www.google.com will instead get directed to their own server. In the redirect case that Google investigated, that redirect was apparently through 74.125.45.100 - an IP address affiliated with scareware.

Because a rogue server is actually handling the Google search traffic, attackers are able to insert malicious search results which appear (to the infected user) to be from Google, but in fact are resulting from the rogue server (in this case, 74.125.45.100). In other words, the results you see may not be the results that Google intended.

This ability to manipulate Google search results (or any Web page) via such a redirect means that ultimately it's possible the attackers could also remove the "Your computer appears to be infected" Google alert. Thus while it's great that Google is taking this step to warn users, it's not clear from the Google blog post or the help file as to whether the alerting mechanism is any more foolproof.

The best way to check for such redirects is to examine the HOSTS file yourself:

Windows users, see How to Edit the HOSTS File
Mac users, see How to Edit the HOSTS File in Mac OS X
Although the Google help file mentions only the 74.125.45.100 IP address, there are many other IP addresses reportedly involved with malicious Google search redirects, including the following:

74.55.47.101
89.149.210.113
96.44.181.245
69.31.81.22
69.93.33.159
64.86.17.32
76.73.37.251
84.16.244.61
89.149.225.48
209.97.213.153
178.17.165.3
67.205.118.186
78.159.110.50
89.149.210.170
67.205.118.177
67.205.118.178
212.95.49.93

Note this is not an exhaustive list. Any unexpected or unauthorized IP to domain mapping in your HOSTS file should be treated with suspicion.

DDos Attack


Trojans are often used to launch Distributed Denial of Service (DDoS) attacks against targeted systems, but just what is a DDoS attack and how are they performed?

At its most basic level, a Distributed Denial of Service (DDoS) attack overwhelms the target system with data, such that the response from the target system is either slowed or stopped altogether. In order to create the necessary amount of traffic, a network of zombie or bot computers is most often used.

Zombies or botnets are computers that have been compromised by attackers, generally through the use of Trojans, allowing these compromised systems to be remotely controlled. Collectively, these systems are manipulated to create the high traffic flow necessary to create a DDoS attack.

Use of these botnets are often auctioned and traded among attackers, thus a compromised system may be under the control of multiple criminals – each with a different purpose in mind. Some attackers may use the botnet as a spam-relay, others to act as a download site for malicious code, some to host phishing scams, and others for the aforementioned DDoS attacks.

Several techniques can be used to facilitate a Distributed Denial of Service attack. Two of the more common are HTTP GET requests and SYN Floods. One of the most notorious examples of an HTTP GET attack was from the MyDoom worm, which targeted the SCO.com website. The GET attack works as its name suggests – it sends a request for a specific page (generally the homepage) to the target server. In the case of the MyDoom worm, 64 requests were sent every second from every infected system. With tens of thousands of computers estimated to be infected by MyDoom, the attack quickly proved overwhelming to SCO.com, knocking it offline for several days.

A SYN Flood is basically an aborted handshake. Internet communications use a three-way handshake. The initiating client initiates with a SYN, the server responds with a SYN-ACK, and the client is then supposed to respond with an ACK. Using spoofed IP addresses, an attacker sends the SYN which results in the SYN-ACK being sent to a non-requesting (and often non-existing) address. The server then waits for the ACK response to no avail. When large numbers of these aborted SYN packets are sent to a target, the server resources are exhausted and the server succumbs to the SYN Flood DDoS.

Several other types of DDoS attacks can be launched, including UDP Fragment Attacks, ICMP Floods, and the Ping of Death. For further details on the types of DDoS attacks, visit the The Advanced Networking Management Lab (ANML) and review their Distributed Denial of Service Attacks (DDoS) Resources.

Software Hacking Terbaik

Written By Gerry on Saturday, August 13, 2011 | 1:09 PM




Software ini andalah software terbaik yang sering di gunakan para hacker untuk menelusuri Hal yang mustahil,hehehe.. anda paham lah..
software ini perlu di coba bagi seorang yang senang dengan dunia hacking...
Bagi kawan-kawan yang ingin mencobanya silakan lihat dulu daftar isinya dibawah ini..


Enlarge this image 


Berikut isi koleksi top 10 vital hacking software and tools:
- Cain and Abel (sniffer)
- John the Ripper (brootforce)
- NetStumbler (Wifi breaker)
- Nmap (Network scanner)
- Putty (Telnet)
- SuperScan (Scanner & pinger)
- Hping (Pinger)
- Lcp (brute force password)
- Nikto (scanner broken web server)
- Kismet (sniffer wireless network 802.11)
Jika ingin mendownload software tersebut silakan klik tulisan dibawah ini:
Ukuran file: 23,7MB DOWNLOAD

Tips Untuk Mengurangi Risiko Hacking Pada Ponsel

Written By Gerry on Thursday, August 11, 2011 | 11:05 AM




Dewasa ini ponsel pintar sudah menjadi gaya hidup bagi orang-orang modern. Bahkan jika sehari saja tanpa ponsel, hidup mungkin akan terasa berbeda, ada yang mengganjal. Oleh karena itu tak jarang kalau sebagian besar orang menyimpan data-data pribadinya di ponsel. Dari nomor rekening, password, dan informasi pribadi lainnya.
Di sisi lain, fenomena wabah ponsel pintar menumbuhkan efek lain, yakni munculnya hacker yang menjadikan ponsel sebagai sasarannya.
Secara umum terdapat dua alasan utama seorang hacker ketika meng-hack ponsel. Pertama adalah alasan finansial. Dengan adanya fasilitas transfer uang melalui ponsel, merampok dengan cara ini menjadi sangat mudah. Terlebih terdapat data-data pribadi yang dapat digunakan untuk melakukan transaksi melalui telepon.
Alasan kedua adalah memata-matai. Contoh nyata kasus ini adalah kasus penyadapan telepon yang dilakukan seorang jurnalis di Inggris. Hal tersebut dapat dilakukan dengan mudah jika hacker telah berhasil menguasai ponsel anda.
Lalu bagaimana cara untuk membentengi ponsel anda dari serangan hacker? Terlebih bagi para pengguna ponsel yang rata-rata adalah masyarakat awam yang tidak tahu banyak tentang apa itu hacking.
Menghilangkan risiko hacking bisa dikatakan adalah mustahil. Yang bisa dilakukan hanyalah mengurangi risiko di-hack. Berikut ini adalah langkah-langkah yang bisa anda lakukan:

1.  Gunakan pasword protection untuk layanan voice mail anda. Lalu ingat, jangan gunakan password yang mudah ditebak, seperti tanggal ulang tahun atau password yang sama untuk bebrapa akun.
2.  Matikan ponsel anda.
3.  Gunakan tool terbaru atau terupdate.
4.  Gunakan Phone Security. Software anti-theft mungkin bisa digunakan. Software semacam ini berguna untuk meremote lock ponsel dengan sms.  Selain itu softwaren ini juga dapat memformat ponsel dari jarak jauh, juga dengan sms.
5. Gunakan bluetooth seperlunya. Sebagian besar para hacker menggunakan bluetooth. Jadi usahakan seminimal mungkin menggunakan layanan ini.
6. Hapus history dari browser di ponsel secara berkala. Banyak ponsel yang menyediakan fitur autocomplete. Dan tentunya jika fitur ini dinyalakan, hal tersebut akan memudahkan seorang hacker untuk memata-matai anda, terlebih jika anda adalah orang yang sering mengakses situs-situs yang membutuhkan login.

Hackers access data on 35 mln S. Koreans: agency

Written By Gerry on Sunday, July 31, 2011 | 5:38 PM

Hackers using an Internet address registered in China have gained access to major South Korean websites and may have stolen the private information of 35 million users, authorities said Thursday.
They breached the systems of Nate (www.nate.com) and Cyworld (www.cyworld.com), both run by SK Communications, the Korea Communications Commission said.
Nate is a search engine with 25 million users and Cyworld is a social networking website with 33 million users in a country with a population of 48.6 million.
From the two sites combined, information on about 35 million users such as names, web IDs, phone numbers, e-mail addresses and resident registration numbers appear to have been leaked, the commission said in a statement.
SK Communications has asked police to investigate the cyber attack, commission official Kim Kwang-Su told AFP, adding his office was still investigating the incident.
"We have no information on who the hackers were. This could be the biggest hacking incident in our country," he said.
The previous worst computer security breach was in February 2008, when Internet Auction -- a subsidiary of US firm eBay -- was hacked. This led to the theft of private information on more than 10 million users.
"We took security steps after detecting a malicious code originating from an IP (Internet protocol) address from China on Tuesday," said SK Communications spokeswoman Koo Ki-Hyang.
"Our probe is still under way but we believe information on an estimated 35 million users might have been leaked."
South Korea, the world's most wired nation with more than 90 percent of homes connected to the Internet, has expressed concern about cyber attacks by Chinese and North Korean hackers.
In 2004 hackers based in China allegedly used information-stealing viruses to break into the computer systems of Seoul government agencies.
Seoul accused Pyongyang of staging cyber attacks on websites of major South Korean government agencies and financial institutions in March this year and in July 2009.
In May South Korea said a North Korean cyber attack paralysed operations at one of its largest banks. North Korea reportedly maintains elite hacker units.

Anonymous says hacked U.S. government cyber supplier

WikiLeaks supporters wear masks of the "Anonymous" internet activist group and a …

WASHINGTON (Reuters) - Hackers with the loose-knit group Anonymous said on Friday they had broken into the network of U.S. government contractor Mantech International Corp and posted some NATO-related correspondence online.Anonymous, tweeting as AnonymousIRC, offered the correspondence between Mantech and the North Atlantic Treaty Organization as proof of the breach. Two involve NATO contracting offices, and one discusses deploying staffers to an unnamed "NATO Theater of Operations" for what appears to be tech services.
Mantech, which claims the U.S. Defense, State and Justice Departments among its clients, declined to comment. It offers cyber security among its services.
Hackers associated with Lulz Security and Anonymous have claimed responsibility for cyber attacks on the U.S. Central Intelligence Agency, the U.S. Senate, Sony Corp websites and the website of Murdoch's British newspaper group, News International, among others.
Authorities made some arrests in connection with the breaches, including a teenager detained at a house in the remote Shetland Islands, off Scotland's northeast coast.
There have also been other arrests in Britain and in the United States.
The group has urged supporters to boycott eBay Inc's PayPal electronic payment service, or to close existing accounts. It has previously attacked PayPal to show opposition to the service's refusal to process payments to WikiLeaks, the website founded by Julian Assange that published copies of secret U.S. government diplomatic cables.
(Reporting by Diane Bartz; Editing by Gary Hill)

Hacking Facebook Using Fake Login

Written By Gerry on Sunday, February 27, 2011 | 7:58 AM

Hello semua,
Hack Facebook Dengan Fake Login? Kenapa Tidak…
Jangan lupa sediain Hosting / Free Hosting untuk naruh script yang mau kita buat fake login lokasinya nanti. Jangan sampe lupa, karena itu hal yang paling wajib dilakukan!
Oke lanjut, mantapin juga dah. Perhatikan Baik² Dan Lakukan Dengan Benar Menurut Petunjuk Dibawah Ini. Jangan Sampe Ada Kekeliruan Sedikitpun! Berikut ini adalah ulasannya:
1. Pertama, bikin dulu sebuah file di hosting tempat anda mau bikin fake login dengan filetype: html. Kemudian kasi nama: “index.html“, sehingga di contoh URL Web adalah: http://www.hostingloedisini.com/facebook/index.html
Bikin Code Sesuai Dengan Contoh Script Dibawah Ini:
Scriptcode pada no 1:
Klick Disini Untuk Lihat Scriptnya
2. Buat file logs.php di hostingan lo sendiri, contoh http://www.hostingloedisini.com/facebook/logs.php di bawah ini script nya.
Scriptcode pada no 2:
Klick Disini Untuk Lihat Scriptnya
3. Jangan lupa dan wajib untuk membuat file kosong yg berformat txt dengan nama: logs.txt – jadi URLnya jadi: http://www.hostingloedisini.com/facebook/logs.txt
4. Ini wajib dan harus diingat! Jangan lupa change mode semua filenya, sehingga permissionnya menjadi: 777 ( chmod + 777). Chmod 777 artinya dimana semua file dapat dibaca (r), dapat ditulis(w), dan dapat di eksekusi(x). Jadi chmod 777 adalah untuk merubah file agar file tersebut dapat di eksekusi oleh User, Groups & Other. Hasil set file permission 777 adalah (rwxrwxrwx) untuk Unix Server. Untuk masalah permission ini juga tergantung dari penyedia hosting, buat yang pake hosting gak nyediain change mode, langsung ajah dicoba tanpa memperhatikan poin ini & berdoa saja ini bisa berjalan.. Selain 777 explore permission bisa menjadi 775, 755 disesuaikan dengan server dan penyedia hosting anda.
5. Kemudian sebarkan URL yang telah loe buat, misal: “http://www.hostingloedisini.com/facebook/” dengan sesama user difacebook, iklan, atau spam lewat email sebanyak banyaknya. Bisa juga merajuk kepada cewe cewe / cowo cowo yang loe suka supaya klik tu login. Dijamin mantaf klo bisa dapetin username + loginnya! :D
6. Untuk melihat hasil login Username dan Passwordnya silakan buka file di logs.txt nya, nah klo ada username email beserta passwordnya. Brarti anda telah dapet login ntuh.
Contoh tampilan ujicoba aplikasi websitenya disini:
http://www.airdata.nl/libraries/tcpdf/config/lang/facebook/index.html

Selamat Mencoba, Semoga Berhasil..
Dan buat para Facebook’ers mania, oh ya, ni skalian gw kasi tips supaya hati hati & biar gak kna Fake Login:
1) Perhatikan dengan benar link address websitenya. Contoh klo FB linknya: http://www.facebook.com
2) Jangan pernah membuka link atau bahasa pemograman (CSS, XTML, XML, atau
HTML) yang aneh. Jika di klik, kemungkinan account kita akan memberikan
username dan password kita.
3) Pakailah virtual keyboard yang bisa diperoleh dengan mudah.
Untuk Windows tampilan XP, hanya cukup klik ’start’ -> All Programs ->
Accessories -> Accessibility -> ‘On-Screen Keyboard’
Untuk Windows tampilan bukan XP, hanya cukup klik ’start’ -> Program Files
-> Accessories -> Accessibility -> ‘On-Screen Keyboard’
4) Bila bermain di Warung Internet (Warnet), hindari check-list kotak
“Remember me” pada saat login, karena hal itu dapat menyimpan username
dan password di komputer tersebut. Kecuali memakai komputer pribadi.
5) Jika anda tiba-tiba diminta login ulang, sebaiknya hati hati, karena kemungkinan halaman pe-login ulang tersebut adalah halaman palsu yang sengaja dirancang. Kekekeke..