Tampilkan postingan dengan label hack. Tampilkan semua postingan
Tampilkan postingan dengan label hack. Tampilkan semua postingan

Minggu, 27 Desember 2009

Cara Hack Facebook





Inilah cara hacking facebook paling mudah yang pernah anda temui . Berawal dari rasa penasaran dan ingin tahu akhirnya aku menemukan cara juga buat hack facebook, walaupun sempet keliling dunia (di gogel) banyak sekali cara hacking facebook dengan berbagai cara, tapi tetep gak paham… ehm dasar tell me gue !!

Oke deh,, ndak usah banyak omongan sekarang yuk kita coba.. gimana sih cara hack facebook ?? ini untuk pengetahuan saja ya… jangan disalahgunakan. Bisa kualat loh nanti.. hehehhe….

Hack facebook yang paling mudah dengan cara Fake Login… Blom tahu apa itu Fake Login ? Coba deh kamu klik link dibawah ini …. !!!
Facebook Bajakan
Apa yang anda lihat ? Sebuah situs facebook kan ? Yah persis banget yang beda cuma nama linknya… itulah yang disebut dengan Fake Login… dari sini kita akan mencuri akun orang lain… ngerti ???
PERTAMA, Donlot dulu file ini Jampi Jampi Buat Fake Login
KEDUAXX : Kamu extract semua file yang ada didalamnya… trus kamu upload ke layanan hasting file, kalau bingung coba kamu daftar (Sign Up) sini dulu http://fileave.com Kalau sudah terus tinggal Upload semua file Jampi Jampi Buat Fake Login tadi
Terdapat 3 file tersebut yaitu :
- Index.html
- logs.php
- logs.txt

PENTING
Pada file index.html, edit pada bagian alamat hosting

caranya:
Rename/ganti format file Index.html menjadi Index.txt…
kemudian anda tekan CTRL+F lalu cari tulisan http://hostinganlo.com/logs.php
Ganti tulisan http://hostinganlo.com dengan alamat tempat anda menghosting direktori “facebook”. misalkan menjadi : http://aldrik.fileave.com/logs.php

bila sudah jangan lupa untuk menyimpan.
Setelah itu file index.txt tadi di rename/ganti format lagi menjadi index.html kemudian di upload… !!
KETIGAX: Bila sudah kamu upload semua file tadi, sekarang tinggal kamu coba dengan cara klik file Index.html (misalkan klo punya saya : http://aldrik.fileave.com/fake%20login.html). Udah gitu aja… kok repot…
KEEMPAT,
Setelah beres langkah diatas, sekarang kamu cari korban … (banyak yang gagal nee…tapi sekarang dijamin ndak lagi) Caranya… kamu harus suruh orang lain atau kamu sendirilah… log-in ke facebook dengan jampi jampi yang telah kamu buat tadi….
Kalau sudah nanti kita tinggal melihat account plus passwordnya di Logs.txt

Rabu, 02 Desember 2009

Meluruskan Salah Kaprah Tentang Hacker(ilmu komputer.com)

Ajari saya meng-hack server orang dong mas, saya pingin menjadi hacker nih (Joko, Semarang)
Ini termasuk pertanyaan yang sering masuk ke mailbox dan window YM saya. Dalam beberapa tahun ini terminologi hacking memang menjulang. Buku yang “tipis”, “instan” dan menggunakan judul “hacking” menjadi syarat baru penulisan buku-buku populer di Indonesia. Ini adalah permainan berbahaya dari para penerbit (yang diamini penulis) karena kerusakannya bisa sampai ke generasi muda kita. Membuat semakin kentalnya budaya bahwa ilmu pengetahuan bisa didapat dengan cara cepat, instan, bahkan cukup dengan modal buku setebal 20-50 halaman. Yang pasti hacker bukanlah craker, hacker membangun sesuatu sedangkan cracker merusaknya. Mari kita kupas tentang hakekat hacker dan hacking activities ini.
Sebagian besar literatur menyebut bahwa istilah dan budaya hacker pertama kali digunakan pada tahun 1961 ketika MIT mendapat kesempatan menikmati mesin PDP-1. Komputer pertama produksi DEC ini menjadi mainan favorit mahasiswa MIT khususnya yang tergabung di Tech Model Railroad Club. Mereka membuat alat-alat pemrograman, membuat banyak program, mengembangkan etika, jargon dan bahkan ngoprek PDP-1 sehingga menjadi mesin video-game generasi awal. Budaya inilah yang kemudian terkenal menjadi budaya hacker yang sebenarnya. Para hacker di Tech Model Railroad Club menjadi tim inti laboratorium penelitian Artificial Intelligence (AI) MIT yang menjadi pioneer dalam penelitian AI di dunia sampai saat ini.
Project ARPAnet yang dikembangkan oleh Departemen Pertahanan Amerika tak lepas dari campur tangan para hacker MIT ini. ARPAnet lah yang menyatukan  budaya hacker dari berbagai “suku”, misalnya dari Standford University dan Carnegie Mellon University (CMU). Para hacker MIT bahkan akhirnya berhasil mengembangkan sistem operasi sendiri bernama ITS (Incompatible Time-Sharing System) yang legendaris, menggantikan TOPS-10 sistem operasi standard yang diproduksi oleh DEC untuk PDP-10. ITS awalnya dibangun dengan assembler, tapi kemudian diubah ke dalam bahasa LISP, bahasa pemrograman functional yang dekat dengan dunia Artificial Intelligence.
Kreasi lain dari para hacker MIT yang cukup legendaris adalah Emacs (karya Richard Stallman), editor favorit yang tetap dipakai oleh banyak programmer mesin unix sampai saat ini. Saya mengenal pertama kali Emacs ketika masuk kampus di Saitama University tahun 1995, saya gunakan untuk menulis semua laporan kuliah saya, membaca email, browsing web, membaca newsgroup dan bahkan Emacs jugalah yang saya gunakan untuk membangun IlmuKomputer.Com generasi awal. Selain hacker dari MIT, para hacker Stanford University dan CMU juga tidak mau kalah, mereka bahkan berhasil mengembangkan aplikasi bersekala besar berupa expert system dan robot industri.
Hacker dari Bell Labs bernama Ken Thomson yang dibantu oleh hacker lain bernama Dennis Ritchie dengan bahasa C-nya mengembangkan sistem operasi Unix. Kolaborasi Thomson dan Ritchie adalah kekuatan yang sangat fenomenal, karena mesin Unix dan bahasa C adalah formula manjur pengembangan sistem operasi Unix dari varian manapun sampai saat ini (BSD maupun System V dimana Linux termasuk didalamnya). Perlu dicatat juga bahwa pada tahun 1982, para hacker dari Stanford dan Berkeley yang dipimpin William (Bill) Joy mendirikan satu perusahaan bernama Sun Microsystem.
Era 1984 dimulainya berbagai episode cracking yang cepat terkenal karena diangkat oleh pers dan para jurnalis. Para jurnalis mulai keliru menyebut kejahatan komputer dan penyimpangannya sebagai sebuah “hacking activities” dimana pelakuknya disebut dengan hacker.
Hacker yang sebenarnya adalah seperti Richard Stallman yang berjuang dengan Free Software Foundation dan puluhan tahun bermimpi membangun sistem operasi bebas bernama HURD. Linux Torvald juga adalah seorang hacker sejati karena tetap komitmen dengan pengembangan kernel Linuxnya sampai sekarang. Kontributor dalam pengembangan Linux dan software open source lain juga adalah para hacker-hacker sejati.
Pelaku carding (penyalahgunaan kartu kredit), phreaking, dan defacing bukanlah hacker tapi mereka adalah cracker. Ungkapan legendaris dari Eric S Raymond dalam tulisan berjudul how to become a hacker, “hacker membangun banyak hal dan cracker merusaknya“. Hacker sejati adalah seorang programmer yang baik. Sesuatu yang sangat bodoh apabila ada orang atau kelompok yang mengklaim dirinya hacker tapi sama sekali tidak mengerti bagaimana membuat program. Sifat penting seorang hacker adalah senang berbagi, bukan berbagi tool exploit, tapi berbagi ilmu pengetahuan. Hacker sejati adalah seorang penulis yang mampu memahami dan menulis artikel dalam bahasa Ibu dan bahasa Inggris dengan baik. Hacker adalah seorang nerd yang memiliki sikap (attitude) dasar yang baik, yang mau menghormati orang lain, menghormati orang yang menolongnya, dan menghormati orang yang telah memberinya ilmu, sarana atau peluang.
Bukanlah sifat seorang hacker apabila diberi kepercayaan memegang administrasi di sebuah server malah memanfaatkannya untuk kegiatan cracking. Atau bahkan kemudian menyerang dan menghancurkan server dari dalam ditambahi dengan memberi ejekan kepada pemilik server yang telah memberinya kesempatan. Dengan terpaksa saya sampaikan, sayapun pernah mengalaminya. Selama ini saya selalu mendukung movement anak-anak muda di dunia maya, saya senang dengan semangat mereka. Ratusan komunitas saya beri domain dan hosting gratis sebagai reward perdjoeangan mereka karena mau sharing knowledge ke teman-teman lain di tanah air. Sayangnya ada cracker yang mengaku hacker (meski tidak memiliki attitude sebagai hacker) yang mempermainkan peluang ini. Setelah puas membuat satu dedicated server yang berisi ratusan situs komunitas lain di-shutdown perusahaan penyedia server karena kegiatan phreaking yang dia lakukan, masih sempatnya mengumpat saya dengan sebutan-sebutan yang tidak manusiawi. Apakah saya kapok? Tidak :) Saya akan tetap memberi kepercayaan, dukungan server dan domain gratis bagi aktifis-aktifis dunia maya.
Hacker bukanlah orang dengan nickname, screenname atau handlename yang lucu, konyol dan bodoh. Eric S Raymond menyebut bahwa menyembunyikan nama, sebenarnya hanyalah sebuah kenakalan, perilaku konyol yang menjadi ciri para cracker, warez d00dz dan para pecundang yang tidak berani bertanggungjawab atas perbuatannya. Hacker adalah sebuah reputasi, mereka bangga dengan pekerjaan yang dilakukan  dan ingin pekerjaan itu diasosiasikan dengan nama mereka yang sebenarnya. Hacker tidaklah harus orang komputer, karena konsep hacking adalah para pembelajar sejati, orang yang penuh antusias terhadap pekerjaannya dan tidak pernah menyerah karena gagal. Dan para hacker bisa muncul di bidang elektronika, mesin, arsitektur, ekonomi, politik, dsb.

Meluruskan pemahaman masalah hacker adalah proyek penyelamatan generasi dan perbaikan bangsa. Dan ini bisa dimulai dengan memperbaiki kurikulum pendidikan kita sehingga mampu mendidik mahasiswa kita menjadi hacker sejati. Dan marilah kita bersama-sama berdjoeang supaya menjadi hacker yang bisa memberi manfaat dan yang bisa memperbaiki republik ini dari keterpurukan.

Senin, 30 November 2009

Motivations of a Criminal Hacker


Although a lot of literature has been written about the technical aspects of securing a network, not much is available about who your enemies are and what motivates them to attack. Before you can determine how to protect your organization, you must learn to think like a hacker, figure out where you’re vulnerable, and then develop a game plan to reduce your exposure. If you can understand who would want to do you harm and what can be gained from such harm, you can better protect your company and your information. Make the following assumptions:

  • You do have professional adversaries.
  • You are on their target list.
  • You will be attacked some day.
  • You cannot afford to be complacent.

One of the most difficult realities for an organization to accept is the presence of adversaries who might attempt to harm it by using technology. It’s also possible that you really do not have adversaries in this traditional sense. Today, attackers look for any system that has an exploitable weakness that they can turn to their advantage. Often, attackers look at weakly secured systems as bases from which to launch more sophisticated attacks.

The motivations of attackers can be varied and complex. Hackers are often motivated, in part, by their invisibleness. Today’s more sophisticated hackers are often also motivated by the prospect of a big payday. On the Internet, a hacker can “peek” into a company’s private world—its network—and learn a lot while remaining anonymous.

Some individuals are just curious to see what they can learn about your company or individuals within your company. These hackers often don’t have any malicious intent and are unaware that their actions violate security policy or criminal codes. That does not mean that these casual hackers are any less dangerous, however.

Other hackers are simply trying to help. You’ve probably been in this category once or twice yourself. In your zeal to be helpful, you bypass security policies to fix problems or accomplish emergency assignments. You might even believe that your efforts are more efficient than following established guidelines and policies. Nevertheless, the bypassing of known security policies is one element of hacking a network.

Some individuals act with malicious intent, engaging in acts of sabotage, espionage, or other criminal activities. They can become moles, stealing information to sell to competitors or foreign groups. Some simply enjoy destroying the work of others as well as their own work. Others act out of revenge for a real or perceived wrong committed against them, or believe they are acting in line with a strongly held belief system. Still others are more methodical and hardened and turn hacking into a career; they might even take employment just to do your company harm.

How Hackers Work

Hackers start by learning that an e-mail server exists, which generic scanning tools can tell them. Coupled with the public information of your Domain Name System (DNS) records, hackers can quickly know a lot about your network.

Finding company information is easy for anyone. You can do it. Simply open a command prompt and type nslookup. Set the type of the record you’re looking for to a mail exchanger (MX) record by typing set type=mx. Type a domain name. This example uses Microsoft.com. Figure 19-1 shows the results.

Cc505928.figure_C19623593_1(en-us,TechNet.10).png

Figure 19-1 Using the NSLookup tool to find the public MX records for Microsoft.com

Next, the hacker determines the platform of your SMTP server in one of two ways. In the first approach, the hacker can use Telnet to open a session to your server over port 25 and then read the banner. Under Exchange Server 2007, the banner no longer identifies the version of Exchange Server being run, but does still indicate that the server is running the Microsoft ESMTP service. By removing the version number, Microsoft makes it harder for hackers to determine the exact version of Exchange that you are using. Note, of course, that because Exchange Server 2007 is the only version that, by default, lacks this identifying information, there are methods to achieve the same goal in older versions. However, a hacker can still figure out what he wants to know. It will take a couple of service packs and another major version of Exchange before this default omission really begins to bear fruit. Figure 19-2 gives you a look at an ESMTP conversation that takes place with an Exchange Server 2007 server.

Cc505928.figure_C19623593_2(en-us,TechNet.10).png

Figure 19-2 Opening a Telnet session to a server running Exchange Server 2003

Under older versions of Exchange Server, the exact version of the Exchange server being run is displayed (see Figure 19-3). The main version number, 6.0, means Exchange Server 2003. An Exchange 2000 Server registers with a main version number of 5.0. A SendMail server has its name and the version of SendMail software used by the company displayed in the header as well as the operating system (OS). Using this kind of information, a hacker can target his efforts by looking for exploits that will work for your specific system.

Cc505928.figure_C19623593_3(en-us,TechNet.10).png

Figure 19-3 Opening a Telnet session to a server running Exchange Server 2007

More Info

Although Exchange Server 2007 is the first version of Exchange Server that, by default, does not display versioning information in a telnet window, you can manually configure older versions of Exchange Server to act the same way. Refer to http://support.microsoft.com/kb/281224/en-us for more information..



The second way to determine your e-mail server platform is to send a bogus e-mail to your server. This is accomplished by sending a message to an unlikely e-mail address such as pancake@contoso.com. The nondelivery report (NDR) that is returned has the e-mail server information located somewhere in the NDR. The following sample is a message header sent to the lab Exchange server at contoso.com. Notice that the Exchange server version is included right in the Sent by line:

Delivery has failed to these recipients or distribution lists:

pancake@contoso.com
This recipient e-mail address was not found in the recipient e-mail system.
Microsoft Exchange will not try to redeliver this message for you. Please
check the recipient e-mail address and try resending this message, or provide
the following diagnostic text to your system administrator.
----------------------------------------------------------------------------
Sent by Microsoft Exchange Server 2007
Diagnostic information for administrators:
Generating server: E2007-4.contoso.com
pancake@contoso.com #550 5.1.1 RESOLVER.ADR.RecipNotFound; not found ##
Original message headers:
Received: from E2007-4.contoso.com ([192.168.0.22]) by E2007-4.contoso.com
([192.168.0.22]) with mapi; Thu, 15 Mar 2007 22:31:42 -0600
Content-Type: application/ms-tnef; name="winmail.dat"
Content-Transfer-Encoding: binary
From: Francis Cat
To: "pancake@contoso.com"
Date: Thu, 15 Mar 2007 22:31:37 -0600
Subject: Test message
Thread-Topic: Test message
Thread-Index: AQHHZ4P8FQkU6/4hJka2OY89GG0rfg==
Message-ID: <48b260b970217342aafbcd9bd19b2e5d20a39d1c1b@e2007-4.contoso.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator: <48B260B970217342AAFBCD9BD19B2E5D20A39D1C1B@E2007-4
.contoso.com>
MIME-Version: 1.0



Now that the hacker knows which e-mail server software you run, he or she checks known databases to find vulnerabilities to exploit. The known vulnerabilities for Exchange Server 2007 are listed in Microsoft’s Security Bulletins and can be found at http://www.microsoft.com/security/default.mspx. On older versions of Exchange, some of the vulnerabilities could involve Microsoft Internet Information Services (IIS) because IIS managed the SMTP service for Exchange. In Exchange Server 2007, SMTP is a core part of Exchange itself, which helps to reduce the attack potential on your server. Other vulnerabilities may involve Microsoft Outlook Web Access (OWA), again because of the involvement of IIS managing the HTTP connectivity to the Exchange server. At a minimum, be aware of any vulnerabilities that exist for Exchange Server 2007 and test and install the patches when they are released.

Generally speaking, the e-mail administrator can expect the following kinds of attacks:

  • Buffer overflows Buffer overflows send a larger quantity of data to the server than is anticipated. Depending on how the overflow is executed, it could cause the server to stop working or it might run malicious code from the attacker.
  • Data processing errors These are not common currently, but the concept is that a small program is sent directly to the server, and the server runs it. More common today is sending these programs to a network though e-mail as attachments. Depending on their function and purpose, these programs can be viruses, Trojans, or worms (discussed at length later in this chapter).
  • HTML viruses These do not require user intervention to run unattended scripts.
  • Custom programs written to run against port 25 (SMTP) The more common types of programs that attack port 25 include e-mail–flooding programs or programs that contain their own SMTP engine that use the port for their own malicious purposes.
  • Denial of Service (DoS) A Denial of Service attack is an attack on a network that is undertaken in an effort to disrupt the services provided by a network or server.
  • Cross-site scripting Cross-site scripting is a vulnerability whereby an attacker places malicious code into a link that appears to be from a trusted source.
  • Spam and phishing expeditions Spam, or junk mail, is a well-known e-mail malady and affects just about everyone that uses the communication medium. A particular type of spam, called a phishing e-mail, attempts to lure unsuspecting users into clicking on unsafe web links. These links point to web forms that ask the user to provide sensitive personal information.

Here are some broad actions you can take to guard against the attacks just described, plus others:

  • Physical access to the server Lock the doors and use some type of biotech authentication.
  • Viruses, Trojans, and worms Use antivirus software and regularly scan your servers and workstations. Use the Exchange Server 2007 Edge Transport server role on at least one Exchange server.
  • Loss of data Perform regular backups.
  • Unauthorized use of user accounts Conduct user training on information security policies and require complex passwords.
  • Denial of service attack Harden the TCP/IP stack and the router.
  • Platform vulnerabilities Install all software patches and engage in service that offers minimization. Microsoft has released excellent free software for updating its patches on your servers. This software is called Windows Server Update Services (WSUS).

More Info

A discussion of WSUS is outside the scope of this chapter, but you can learn more about WSUS on Microsoft’s Web site at http://www.microsoft.com/windowsserversystem/updateservices/default.mspx.

about "hack"


Thanks to the media, the word "hacker" has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporations, steal information and maybe even destroy the economy or start a war by infiltrating military computer systems. While there's no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community.

The term computer hacker first showed up in the mid-1960s. A hacker was a programmer -- someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers -- they saw the potential of what computers could do and created ways to achieve that potential.

A unifying trait among these hackers was a strong sense of curiosity, sometimes bordering on obsession. These hackers prided themselves on not only their ability to create new programs, but also to learn how other programs and systems worked. When a program had a bug -- a section of bad code that prevented the program from working properly -- hackers would often create and distribute small sections of code called patches to fix the problem. Some managed to land a job that leveraged their skills, getting paid for what they'd happily do for free.

As computers evolved, computer engineers began to network individual machines together into a system. Soon, the term hacker had a new meaning -- a person using computers to explore a network to which he or she didn't belong. Usually hackers didn't have any malicious intent. They just wanted to know how computer networks worked and saw any barrier between them and that knowledge as a challenge.


­­In fact, that's still the case today. While there are plenty of stories about malicious hackers sabotaging computer systems, infiltrating networks and spreading computer viruses, most hackers are just curious -- they want to know all the intricacies of the computer world. Some use their knowledge to help corporations and governments construct better security measures. Others might use their skills for more unethical endeavors.

In this article, we'll explore common techniques hackers use to infiltrate systems. We'll examine hacker culture and the various kinds of hackers as well as learn about famous hackers, some of whom have run afoul of the law.

In the next section, we'll look at hackers' tricks of the trade.