Thursday, October 10, 2013
Bel Otomatis Sekolah dibuat khusus untuk membantu dan mempermudah membunyikan bel (menghindari: secara manual) saat Pelajaran berganti sesuai Jadwal yg Telah di tentukan. 

Tampilan Aplikasi Auto-Bel Sekolah.

Fitur : 
  1. Penggunaan Event tak terbatas (diset dengan Hari + Jam-Menit-Detik).
  2. File Audio (*.wav, *.mp3).
  3. Aplikasi bisa berjalan tanpa harus di Buka secara manual.. alias dah include START_UP
  4. + Audio Bel (put from @SMAN1TSM)
Wednesday, May 1, 2013
Scenario:- The attacker sets up a fake access point in the hope a curious victim will connect; and provide a route to the Internet to encourage the victim(s) to remain connected. The attacker is acting as a man-in-the-middle and can see all the Internet traffic between the Internet and victim(s). This includes websites they are visiting, and any usernames or passwords they enter.

Requirements
1. Working internet connection
2. Vmware workstation
3. Backtrack with NAT mode network
4. External wifi card
5. Fake access point
6. DHCP server
7. SSLSTRIP sniffing tool


INTRODUCTION

Dns Spoofing (Dns Cache Poisoning): So Basically a Domain Name System Poisoning Attack or Dns Spoofing Is That in Which Attacker Is able to redirect a victim to different website than the address that he types into his browser. For example a user type www.google.com but instead of being directed to Google’s servers. He Is Instead Send To Another Site Or A Fraud Site That Is Managed By The Attacker.

Metasploit: Metasploit is a framework which is used for the hacking of different kinds of applications, operating systems, web applications etc. Metasploit contains various exploits, payloads, modules etc. and in 21st century it is used by most of the hackers, security researchers for exploiting different kinds of operating systems like windows xp, windows 2003, windows vista, windows 8 and etc and it is also called as hackers helping hand because by default all is setup already for hacking systems and applications and web applications and it is also used by security researchers for Pentesting. 
According to Wikipedia: The Metasploit Project is a computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

Cari

Samy Code. Powered by Blogger.