Posts

Cara Menemukan Hp Android Yang Dicuri / Hilang

Image
Bismillah... Coba hitung berapa di antara kita yang pernah mengalami lupa menaruh Hand Phone? Jawabannya adalah hampir semua pernah mengalaminya. Ya, Terkadang tertinggal di kantor, di rumah, di mobil, atau di suatu tempat yang kita tidak tahu percisnya. Bersykur kepada Tuhan dan Google sekarang kita tahu Cara Menemukan Hp Android Yang Dicuri / Hilang.  Bagaimana caranya? Buka browser atau perambah di komputer lalu login ke google akun (gmail) yang sama dengan hand phone, janga lupa dan pastikan google app di hp sudah diupdate dengan versi terbaru. Terakhir buka google.com dan ketikan "find mt phone" tanpa tanda kutip. Tidak lama setelah menekan tombol cari, google akan menampilkan lokasi hp di map dengan akurasi kurang lebih 35 kaki. Untuk mendapatkan lokasi yang lebih baik aktfikan GPS di hp android yang digunakan. Lalu bagaimana jika tidak tampil lokasi pada map? Pada bagian bawah map ada tombol RING yang akan membunyikan hp dengan volume maksimal s...

Mengatasi ERROR 1045 (28000): Access denied for user ‘root’@’localhost’ (using password: NO) di Backtrack 5

1.Stop mysql service: service mysql stop 2.Start mysql deamon dengan perintah: mysqld_safe --skip-grant-tables --skip-networking 3.Buka terminal baru dan ketikan mysql untuk di execute: mysql 4.Masukan password: UPDATE mysql.user SET password=PASSWORD('YOUR_NEW_PASSWORD_HERE') WHERE user='root'; 5.Tambahkan privilege, untuk keamanan: flush privileges; 6.Keluar: quit; 7.Start kembali mysql service: service mysql start

How To Install Sublime On Linux

Install via the Package Manager(apt-get): For Sublime-Text-2: sudo add-apt-repository ppa:webupd8team/sublime-text-2 sudo apt-get update sudo apt-get install sublime-text For Sublime-Text-3: sudo add-apt-repository ppa:webupd8team/sublime-text-3 sudo apt-get update sudo apt-get install sublime-text-installer Source: https://gist.github.com/dantoncancella/4977978 Install Manually via Terminal: Download from the Sublime Site: 32-bit: wget http://c758482.r82.cf2.rackcdn.com/Sublime\ Text\ 2.0.2.tar.bz2 tar vxjf Sublime\ Text\ 2.0.2.tar.bz2 64-bit: wget http://c758482.r82.cf2.rackcdn.com/Sublime\ Text\ 2.0.2\ x64.tar.bz2 tar vxjf Sublime\ Text\ 2.0.2\ x64.tar.bz2 For Both:  sudo mv Sublime\ Text\ 2 /opt/ sudo ln -s /opt/Sublime\ Text\ 2/sublime_text /usr/bin/sublime Source: http://www.tecmint.com/install-sublime-text-editor-in-linux/

Install Faenza Icons 1.2 In Ubuntu 12.10/12.04/11.10/Mint

Image
Bismillah... To install Faenza icons in Ubuntu/Linux Mint open Terminal (Press Ctrl+Alt+T) and copy the following commands in the Terminal: sudo add-apt-repository ppa:tiheum/equinox sudo apt-get update sudo apt-get install faenza-icon-theme Or sudo add-apt-repository ppa:tiheum/equinox && apt-get update && apt-get install faenza-icon-theme Semoga bermanfaat XD

Install TOR Ubuntu Based

Need proxy to open blocked website or to hide your IP Address. :D Tor can halp you to solve this. 1. Configure repository add-apt-repository ppa:ubun-tor/ppa apt-get update && apt-get install tor tor-geoipdb privoxy vidalia  2. Configure Privoxy gedit /etc/privoxy/config  Append the following line :  forward-socks5 / 127.0.0.1:9050 .                                                                                      3. Start the engines /etc/init.d/privoxy start /etc/init.d/tor start  4. Download Torbutton for firefox https://www.torproject.org/dist/torbutton/torbutton-current.xpi 5. Check if you are using tor in Firefox https://check.torproject.org/ Source

Extract Database With Sqlmap

Bismlillah... Hello, buddy! have ever think why Oracle Corp will monopolize and commercialize Mysql? While many people already depended on it in their development. You do not need to answer it, seriously. Coz now we aren't going to talk about that, but we're gonna talk about how to use Sqlmap to extract database. Assumption: You have apache2, mysql, phpmyadmin instaled on your system. I use DVWA for victim site, click here  for more information and download link. You have found the vulnerable from DVWA site. Click here for tutorial. I use Mantra and Burp Suite for IG(Information Gathering). Click here for tutorial!. Important to find the cookie. Open your teminal and go to sqlmap directory " cd /pentest/database/sqlmap/ " or use gnome menu. So let's rock, here's the step: First read the manual by typing " ./sqlmap -h ". If you are already knew about the usage, let's continue. Here's the syntax " ./sqlmap.py -u victim_u...

Cara Mengatasi MySQL Server Error #1045 #2002

Bismillah... cmiw Have you ever installed phpmyadmin and got these errors: #2002 Cannot log in to the MySQL server #1045 Cannot log in to the MySQL server Here's the simple solution, but if you have another better than this, please write it in comment box :D Stop the mysql demon process using this command : sudo service mysql stop Start the mysqld demon process using the --skip-grant-tables option with this command: sudo /usr/sbin/mysqld --skip-grant-tables --skip-networking & Start the mysql client process using this command: mysql -u root From the mysql prompt execute this command to be able to change any password: FLUSH PRIVILEGES; Then reset/update your password and quit: SET PASSWORD FOR root@'localhost' = PASSWORD('password'); quit Start the mysql demon process using this command : sudo service mysql start Now, you can log in to MySQL as root user. Try to reopen from your browser!

How To Install Mutillidae And Try A Little Test

Image
Bismillah... So, bofore we start sharing about Mutillidae. Better for us to know it's definition. Open the spoiler to read it, but if you aren't patient enough, just pass it by :D Open: Mutillidae is a free, open source web application provided to allow security enthusiest to pen-test and hack a web application. Mutillidae can be installed on Linux, Windows XP, and Windows 7 using XAMMP making it easy for users who do not want to install or administrate their own webserver. It is already installed on Samurai WTF. Simply replace existing version with latest on Samurai. Mutillidae contains dozens of vulnerabilities and hints to help the user exploit them; providing an easy-to-use web hacking environment deliberately designed to be used as a hack-lab for security enthusiast, classroom labs, and vulnerability assessment tool targets. Mutillidae has been used in graduate security courses, in corporate web sec training courses, and as an "assess the assessor" tar...

How To Pen-Test Sytem [Based On Linux Server]

Image
Bismillah... The mentor said that "The important things in security testing or auditing is to follow the Hacking Phase orderly and completely". Hasking Phase First =>Information Gathering=>Service Enumeration=>Vulnerability Assessment=>Exploit=>Repeat till success. If so, then Second =>Backdooring=>Maintaining Access=>House Keeping=>End. In this article I'm gonna share (The Pyramid) step plainly

Privilege Escalation

Image
Bismillah... Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The result is that an application with more privileges than intended by the application developer or system administrator can perform unauthorized actions. Most computer systems are designed for use with multiple users. Privileges mean what a user is permitted to do. Common privileges including viewing and editing files, or modifying system files. Privilege escalation means a user receives privileges they are not entitled to. These privileges can be used to delete files, view private information, or install unwanted programs such as viruses. It usually occurs when a system has a bug that allows security to be bypassed or, alternatively, has flawed design assumptions about how it will be used. Privilege escalation occurs in two forms: ...