Follow us on...
Follow us on G+ Follow us on Twitter Follow us on Facebook Watch us on YouTube
Register
Page 12 of 18 FirstFirst ... 21011121314 ... LastLast
Results 166 to 180 of 263
  1. #166
    Status
    Offline
    Shima's Avatar
    Newbie
    Join Date
    May 2008
    Posts
    68
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    wah pengen ikut, cuman ilmu nya masi kurang en kurang nya kurang banyak... Click here to enlarge

    tp tetep coba tes -tes dikit ah.. Click here to enlarge

  2. #167
    Status
    Offline
    chestercazz's Avatar
    Newbie
    Join Date
    Apr 2008
    Posts
    42
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    masih seminggu lagi aman... hehehehe...

  3. #168
    Status
    Offline
    spymedan's Avatar
    Moderator
    Join Date
    Oct 2007
    Location
    Medan Metropolitan
    Posts
    2,821
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge Originally Posted by Shima Click here to enlarge
    wah pengen ikut, cuman ilmu nya masi kurang en kurang nya kurang banyak... Click here to enlarge

    tp tetep coba tes -tes dikit ah.. Click here to enlarge
    awas netes sekali netes bunting sendiri...Click here to enlarge semangat gann testnya...semoga berhasil.....Click here to enlarge kalo berhasil shared cara bobol mikocok ntuh yaa ama saya Click here to enlarge

  4. #169
    Status
    Offline
    [a]
    [a]'s Avatar
    Administrator
    Join Date
    Jun 2007
    Location
    Jakarta, Indonesia, Indonesia
    Posts
    1,729
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    1 (100%)
    Click here to enlarge Originally Posted by xeon Click here to enlarge
    Jangan dong om, firewall itu nanti akan dipublish setelah ada yg berhasil masuk atau tanggal 20 kalau nggak ada yg berhasil masuk. Yg jelas pasti saya publish.
    yups, supaya prasangka2 yg ada bisa di tepis yah om...

  5. #170
    Status
    Offline
    sherayusuf's Avatar
    Member
    Join Date
    Sep 2007
    Location
    bekasi-jakarta bolak balik
    Posts
    188
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    om xeon ni om abong yah? <--- yusuf (laxo)
    klo yang set om robby saya tau pass nya dia hahaha kiding Click here to enlarge

    kenapa ngak kepikiran pada exploitasi di kernelnya yah??
    hayo2 di coba2 payload nya, binding port yang kebuka hihhiihi

    semangat om om semua


    Code:
    Starting Nmap 4.76 (  ) at 2009-09-13 04:07 SE Asia Standard Time
    
    Initiating Ping Scan at 04:07
    
    Scanning 125.160.17.33 [5 ports]
    
    Completed Ping Scan at 04:07, 0.11s elapsed (1 total hosts)
    
    Initiating Parallel DNS resolution of 1 host. at 04:07
    
    Completed Parallel DNS resolution of 1 host. at 04:08, 0.67s elapsed
    
    Initiating SYN Stealth Scan at 04:08
    
    Scanning 125.160.17.33 [1000 ports]
    
    Discovered open port 22/tcp on 125.160.17.33
    
    Discovered open port 8080/tcp on 125.160.17.33
    
    Discovered open port 111/tcp on 125.160.17.33
    
    Completed SYN Stealth Scan at 04:08, 3.77s elapsed (1000 total ports)
    
    Initiating Service scan at 04:08
    
    Scanning 3 services on 125.160.17.33
    
    Completed Service scan at 04:08, 6.17s elapsed (3 services on 1 host)
    
    Initiating OS detection (try #1) against 125.160.17.33
    
    Retrying OS detection (try #2) against 125.160.17.33
    
    Retrying OS detection (try #3) against 125.160.17.33
    
    Retrying OS detection (try #4) against 125.160.17.33
    
    Retrying OS detection (try #5) against 125.160.17.33
    
    125.160.17.33: guessing hop distance at 5
    
    Initiating Traceroute at 04:08
    
    Completed Traceroute at 04:08, 0.05s elapsed
    
    Initiating Parallel DNS resolution of 7 hosts. at 04:08
    
    Completed Parallel DNS resolution of 7 hosts. at 04:08, 6.94s elapsed
    
    SCRIPT ENGINE: Initiating script scanning.
    
    Initiating SCRIPT ENGINE at 04:08
    
    Completed SCRIPT ENGINE at 04:08, 0.08s elapsed
    
    Host 125.160.17.33 appears to be up ... good.
    
    Interesting ports on 125.160.17.33:
    
    Not shown: 981 closed ports
    
    PORT      STATE    SERVICE        VERSION
    
    22/tcp    open     ssh            OpenSSH 4.3 (protocol 2.0)
    
    111/tcp   open     rpcbind
    
    |  rpcinfo:  
    
    
    |  100000  2    111/udp  rpcbind  
    
    
    |  100024  1    748/udp  status   
    
    
    |  100000  2    111/tcp  rpcbind  
    
    
    |_ 100024  1    751/tcp  status   
    
    135/tcp   filtered msrpc
    
    445/tcp   filtered microsoft-ds
    
    593/tcp   filtered http-rpc-epmap
    
    1024/tcp  filtered kdm
    
    1025/tcp  filtered NFS-or-IIS
    
    1026/tcp  filtered LSA-or-nterm
    
    1027/tcp  filtered IIS
    
    1028/tcp  filtered unknown
    
    1029/tcp  filtered ms-lsa
    
    1030/tcp  filtered iad1
    
    1080/tcp  filtered socks
    
    1720/tcp  filtered H.323/Q.931
    
    4444/tcp  filtered krb524
    
    6346/tcp  filtered gnutella
    
    8080/tcp  open     http-proxy     Squid webproxy 2.6.STABLE22
    
    9898/tcp  filtered unknown
    
    12345/tcp filtered netbus
    
    No exact OS matches for host (If you know what OS is running on it, see  ).
    
    TCP/IP fingerprint:
    
    OS:SCAN(V=4.76%D=9/13%OT=22%CT=1%CU=44478%PV=N%DS=5%G=Y%TM=4AAC0DCE%P=i686-
    
    OS:pc-windows-windows)SEQ(SP=CA%GCD=1%ISR=CD%TI=Z%II=I%TS=A)OPS(O1=M5B4ST11
    
    OS:NW3%O2=M5B4ST11NW3%O3=M5B4NNT11NW3%O4=M5B4ST11NW3%O5=M5B4ST11NW3%O6=M5B4
    
    OS:ST11)WIN(W1=16A0%W2=16A0%W3=16A0%W4=16A0%W5=16A0%W6=16A0)ECN(R=Y%DF=Y%T=
    
    OS:3E%W=16D0%O=M5B4NNSNW3%CC=N%Q=)T1(R=Y%DF=Y%T=3E%S=O%A=S+%F=AS%RD=0%Q=)T2
    
    OS:(R=N)T3(R=N)T4(R=Y%DF=Y%T=3E%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)T5(R=Y%DF=Y%T=3E
    
    OS:%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=3E%W=0%S=A%A=Z%F=R%O=%RD=0%Q
    
    OS:=)T7(R=N)U1(R=Y%DF=N%T=3E%TOS=0%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G
    
    OS:%RUL=G%RUD=G)IE(R=Y%DFI=N%T=3E%TOSI=Z%CD=S%SI=S%DLI=S)
    
    
    
    
    
    Uptime guess: 28.350 days (since Sat Aug 15 19:44:28 2009)
    
    Network Distance: 5 hops
    
    TCP Sequence Prediction: Difficulty=202 (Good luck!)
    
    IP ID Sequence Generation: All zeros
    
    
    
    TRACEROUTE (using port 21/tcp)
    
    HOP RTT   ADDRESS
    
    1   0.00  192.168.0.1
    
    2   0.00  192.11.29.1
    
    3   16.00 host17-50.lintaswave.net.id (117.103.50.17)
    
    4   16.00 117.103.61.130
    
    5   0.00  telkomnet.openixp.net (218.100.27.179)
    
    6   0.00  125.160.17.33
    
    
    
    Read data files from: C:\Program Files\Nmap
    
    OS and Service detection performed. Please report any incorrect results at  .
    
    Nmap done: 1 IP address (1 host up) scanned in 31.42 seconds
    
               Raw packets sent: 1183 (56.310KB) | Rcvd: 1064 (46.150KB)
    ngetest di exploit proxynya Click here to enlarge
    Code:
    
    04:14:37 - squid_ntlm_authenticate[*] Launching exploit linux/proxy/squid_ntlm_authenticate...
    04:14:37 - squid_ntlm_authenticate[*] Started bind handler
    04:14:37 - squid_ntlm_authenticate[*] Trying 0xbfffcfbc...
    04:14:37 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:14:37 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:14:52 - squid_ntlm_authenticate[*] Trying 0xbfffd03e...
    04:14:52 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:14:52 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:15:08 - squid_ntlm_authenticate[*] Trying 0xbfffd0c0...
    04:15:08 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:15:08 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:15:23 - squid_ntlm_authenticate[*] Trying 0xbfffd142...
    04:15:23 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:15:23 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:15:39 - squid_ntlm_authenticate[*] Trying 0xbfffd1c4...
    04:15:39 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:15:39 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:15:54 - squid_ntlm_authenticate[*] Trying 0xbfffd246...
    04:15:54 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:15:54 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:16:10 - squid_ntlm_authenticate[*] Trying 0xbfffd2c8...
    04:16:10 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:16:10 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:16:25 - squid_ntlm_authenticate[*] Trying 0xbfffd34a...
    04:16:25 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:16:25 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:16:41 - squid_ntlm_authenticate[*] Trying 0xbfffd3cc...
    04:16:41 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:16:41 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:16:58 - squid_ntlm_authenticate[*] Trying 0xbfffd44e...
    04:16:58 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:16:58 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:17:14 - squid_ntlm_authenticate[*] Trying 0xbfffd4d0...
    04:17:14 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:17:15 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:17:31 - squid_ntlm_authenticate[*] Trying 0xbfffd552...
    04:17:31 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:17:31 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:17:46 - squid_ntlm_authenticate[*] Trying 0xbfffd5d4...
    04:17:46 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:17:46 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:18:02 - squid_ntlm_authenticate[*] Trying 0xbfffd656...
    04:18:02 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:18:02 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:18:17 - squid_ntlm_authenticate[*] Trying 0xbfffd6d8...
    04:18:17 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:18:17 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:18:33 - squid_ntlm_authenticate[*] Trying 0xbfffd75a...
    04:18:33 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:18:33 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)
    04:18:49 - squid_ntlm_authenticate[*] Trying 0xbfffd7dc...
    04:18:49 - squid_ntlm_authenticate[*] Sending NTLMSSP_NEGOTIATE (32 bytes)
    04:18:49 - squid_ntlm_authenticate[*] Sending NTLMSSP_AUTHENTICATE (356 bytes)

    boleh tau ngak ni pake pc apa routerboard? dugaan saya ini routerboard, klo iya ni mipsle apa mipsbe
    menurut saya hampir imposible untuk di hack (maklum nyubie)
    kita tidak tau versi mikrotik yang di gunakan sehiggan tidak bisa menentukan kernel versi berapa yang dipakai
    kita juga tidak tau arsitektur apa yang dipakai si router
    service yang di jalankan hanya openssh4.3 dan menggunakan protocol 2 < sulit dan hampir tidak ada bugs > dan Squid webproxy 2.6.STABLE22
    wlw encryption yang di pakai mikrotik cukup Weaknesses namun sulit untuk melakukan snipping,

    klo adminya berbaik hati, coba di buka ssl nya dan klo boleh jg hotspotnya di hidupkan donk Click here to enlarge
    atau kirimin file .backupnya Click here to enlarge
    Last edited by sherayusuf; 13-09-2009 at 06:08.

  6. #171
    Status
    Offline
    BatavianX's Avatar
    Member Senior
    Join Date
    Dec 2007
    Location
    x-Region
    Posts
    485
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Nah tuh udah mulai terkuak jalan menuju hacking router-nya, sosial hacking... Click here to enlarge

  7. #172
    Status
    Offline
    cyberfish's Avatar
    Member
    Join Date
    Aug 2009
    Posts
    236
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Starting Nmap 5.00 ( ) at 2009-09-13 05:02 SE Asia Standard Time

    NSE: Loaded 59 scripts for scanning.

    Initiating Ping Scan at 05:02

    Scanning 119.2.45.14 [16 ports]

    Completed Ping Scan at 05:02, 0.17s elapsed (1 total hosts)

    Initiating Parallel DNS resolution of 1 host. at 05:02

    Completed Parallel DNS resolution of 1 host. at 05:02, 0.23s elapsed

    Initiating SYN Stealth Scan at 05:02

    Scanning ip-45-14.laxo.net.id (119.2.45.14) [1000 ports]

    Completed SYN Stealth Scan at 05:03, 51.03s elapsed (1000 total ports)

    Initiating UDP Scan at 05:03

    Scanning ip-45-14.laxo.net.id (119.2.45.14) [1000 ports]

    Completed UDP Scan at 05:04, 51.03s elapsed (1000 total ports)

    Initiating Service scan at 05:04

    Scanning 1000 services on ip-45-14.laxo.net.id (119.2.45.14)

    Service scan Timing: About 0.40% done

    Service scan Timing: About 1.60% done; ETC: 06:58 (1:52:45 remaining)

    Service scan Timing: About 3.10% done; ETC: 06:33 (1:25:58 remaining)

    Service scan Timing: About 4.60% done; ETC: 06:24 (1:16:03 remaining)

    Service scan Timing: About 6.10% done; ETC: 06:19 (1:10:33 remaining)

    Service scan Timing: About 9.10% done; ETC: 06:14 (1:04:06 remaining)

    Service scan Timing: About 12.10% done; ETC: 06:12 (0:59:56 remaining)

    Service scan Timing: About 16.60% done; ETC: 06:10 (0:55:16 remaining)

    Service scan Timing: About 21.10% done; ETC: 06:09 (0:51:25 remaining)

    Service scan Timing: About 25.60% done; ETC: 06:08 (0:47:57 remaining)

    Service scan Timing: About 30.10% done; ETC: 06:08 (0:44:42 remaining)

    Service scan Timing: About 36.10% done; ETC: 06:07 (0:40:34 remaining)

    Service scan Timing: About 42.10% done; ETC: 06:07 (0:36:35 remaining)

    Service scan Timing: About 48.10% done; ETC: 06:07 (0:32:39 remaining)

    Service scan Timing: About 54.10% done; ETC: 06:07 (0:28:47 remaining)

    Service scan Timing: About 60.10% done; ETC: 06:06 (0:24:58 remaining)

    Service scan Timing: About 66.10% done; ETC: 06:06 (0:21:10 remaining)

    Service scan Timing: About 72.10% done; ETC: 06:06 (0:17:23 remaining)

    Service scan Timing: About 78.10% done; ETC: 06:06 (0:13:38 remaining)

    Service scan Timing: About 84.10% done; ETC: 06:06 (0:09:53 remaining)

    Service scan Timing: About 90.10% done; ETC: 06:06 (0:06:09 remaining)

    Service scan Timing: About 96.10% done; ETC: 06:06 (0:02:25 remaining)

    Completed Service scan at 06:05, 3686.75s elapsed (1000 services on 1 host)

    Initiating OS detection (try #1) against ip-45-14.laxo.net.id (119.2.45.14)

    Retrying OS detection (try #2) against ip-45-14.laxo.net.id (119.2.45.14)

    NSE: Script scanning 119.2.45.14.

    NSE: Starting runlevel 1 scan

    Initiating NSE at 06:06

    Completed NSE at 06:06, 31.16s elapsed

    NSE: Starting runlevel 2 scan

    Initiating NSE at 06:06

    Completed NSE at 06:06, 5.03s elapsed

    NSE: Script Scanning completed.

    Host ip-45-14.laxo.net.id (119.2.45.14) is up (0.047s latency).

    All 2000 scanned ports on ip-45-14.laxo.net.id (119.2.45.14) are filtered (1000) or open|filtered (1000)

    Too many fingerprints match this host to give specific OS details



    Host script results:

    | asn-query:

    | BGP: 119.2.44.0/23 | Country: ID

    | Origin AS: 38524 - LAXONET-AS-ID Laxo Global Akses, PT

    |_ Peer AS: 45147

    | whois: Record found at whois.apnic.net

    | inetnum: 119.2.40.0 - 119.2.47.255

    | netname: LAXONET-ID

    | descr: PT. LAXO GLOBAL AKSES

    | country: ID

    | person: Robby Tarudji

    |_ email: robby@laxo.net.id

    |_ nbstat: ERROR: Name query failed: TIMEOUT



    Read data files from: C:\Program Files\Nmap

    OS and Service detection performed. Please report any incorrect results at .

    Nmap done: 1 IP address (1 host up) scanned in 3842.06 seconds

    Raw packets sent: 4046 (149.132KB) | Rcvd: 10 (1110B)



    maksude apa ya???

  8. #173
    Status
    Offline
    xeon's Avatar
    Verified Account - Partner
    Join Date
    Mar 2008
    Location
    DKI Jakarta
    Posts
    1,539
    Reviews
    Read 0 Reviews
    Downloads
    3
    Uploads
    0
    Feedback Score
    2 (100%)
    Click here to enlarge Originally Posted by sherayusuf Click here to enlarge
    boleh tau ngak ni pake pc apa routerboard? dugaan saya ini routerboard, klo iya ni mipsle apa mipsbe menurut saya hampir imposible untuk di hack (maklum nyubie)
    kita tidak tau versi mikrotik yang di gunakan sehiggan tidak bisa menentukan kernel versi berapa yang dipakai
    kita juga tidak tau arsitektur apa yang dipakai si router
    service yang di jalankan hanya openssh4.3 dan menggunakan protocol 2 < sulit dan hampir tidak ada bugs > dan Squid webproxy 2.6.STABLE22
    wlw encryption yang di pakai mikrotik cukup Weaknesses namun sulit untuk melakukan snipping,

    klo adminya berbaik hati, coba di buka ssl nya dan klo boleh jg hotspotnya di hidupkan donk Click here to enlarge
    atau kirimin file .backupnya Click here to enlarge
    Baca dari depan sup, itu udah dikasih penjelasan mengenai boardnya dan versinya. Info aja, di Versi 3, mikrotik tidak pernah ganti kernel. Bahkan sampai 3.28 (stable version saat ini), masih pake kernel yang lama.

  9. #174
    Status
    Offline
    xeon's Avatar
    Verified Account - Partner
    Join Date
    Mar 2008
    Location
    DKI Jakarta
    Posts
    1,539
    Reviews
    Read 0 Reviews
    Downloads
    3
    Uploads
    0
    Feedback Score
    2 (100%)
    Click here to enlarge Originally Posted by BatavianX Click here to enlarge
    Nah tuh udah mulai terkuak jalan menuju hacking router-nya, sosial hacking... Click here to enlarge
    wkwkwkwk... iya, tapi salah tujuan.. he he he.... Kan udah nggak pake speedy.

  10. #175
    Status
    Offline
    xeon's Avatar
    Verified Account - Partner
    Join Date
    Mar 2008
    Location
    DKI Jakarta
    Posts
    1,539
    Reviews
    Read 0 Reviews
    Downloads
    3
    Uploads
    0
    Feedback Score
    2 (100%)
    Click here to enlarge Originally Posted by cyberfish Click here to enlarge
    maksude apa ya???
    Lah.. pan situ yang nye-ken bos?

    Sembilan.. Jadi situ yang tahu scan apa.

  11. #176
    Status
    Offline
    yosanpro's Avatar
    Co-Admin
    Join Date
    Nov 2007
    Location
    Bantul, Bantul, Yogyakarta
    Posts
    2,548
    Reviews
    Read 0 Reviews
    Downloads
    11
    Uploads
    4
    Feedback Score
    1 (100%)
    Hmmm... Lagi puasa nih... males bobol-bobol...


    Emang nggak isa kali....

  12. #177
    Status
    Offline
    kdebugx86's Avatar
    Moderator
    Join Date
    Oct 2008
    Location
    greyarea
    Posts
    1,283
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge Originally Posted by yosanpro Click here to enlarge
    Hmmm... Lagi puasa nih... males bobol-bobol...


    Emang nggak isa kali....
    hahahaha... bukan males bobol2, dasar sistemya saja sudah tertutup. almost closed system gak ada service2 yang bisa dimanfaatkan untuk exploit...(mysql, apache..blablabla) ... udah sistem yang siap siaga menerima 'tembakan' hehehe

    btw,
    jika gw tau exploit untuk nge hack system ini pun, lebih baik ke higher bidder. wakakakakakaka
    Last edited by kdebugx86; 13-09-2009 at 15:58.

  13. #178
    Status
    Offline
    sherayusuf's Avatar
    Member
    Join Date
    Sep 2007
    Location
    bekasi-jakarta bolak balik
    Posts
    188
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge Originally Posted by xeon Click here to enlarge
    Baca dari depan sup, itu udah dikasih penjelasan mengenai boardnya dan versinya. Info aja, di Versi 3, mikrotik tidak pernah ganti kernel. Bahkan sampai 3.28 (stable version saat ini), masih pake kernel yang lama.
    wah om sori saya tidak menyimak, oke deh saya coba exploitasi lebih ke kernel, moga2 dapet payload yang cocok hihihi, btw ni om robby apa om abong yah Click here to enlarge

  14. #179
    Status
    Offline
    git
    git's Avatar
    Baru Gabung
    Join Date
    Sep 2009
    Posts
    18
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge Originally Posted by xeon Click here to enlarge
    Belum ada yang bisa masuk juga nih....

    Kalau gitu, hadiah ditambah... 1 unit RB/750 buat yang bisa nge-hack.
    makin meriah nih om Click here to enlarge

    buat yang lagi ssibuk seken2 n browsing sampe .ru, ayo, semangat !!

  15. #180
    Status
    Offline
    git
    git's Avatar
    Baru Gabung
    Join Date
    Sep 2009
    Posts
    18
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge Originally Posted by sherayusuf Click here to enlarge
    wah om sori saya tidak menyimak, oke deh saya coba exploitasi lebih ke kernel, moga2 dapet payload yang cocok hihihi, btw ni om robby apa om abong yah Click here to enlarge
    hehehe. ada yang lagi coba social engineering.

 

 
Page 12 of 18 FirstFirst ... 21011121314 ... LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Lomba Setting Mikrotik
    By xeon in forum News & Events
    Replies: 93
    Last Post: 11-07-2010, 14:11
  2. Modem Prolink Di Hack
    By yogaponsel in forum General Networking
    Replies: 14
    Last Post: 13-05-2010, 07:37
  3. Mikrotik Kena Hack
    By mikroseek in forum General Networking
    Replies: 28
    Last Post: 06-12-2009, 10:08
  4. Lomba Setting Mikrotik
    By xeon in forum Wireless Networking
    Replies: 2
    Last Post: 04-06-2009, 09:23
  5. help: somebody will hack my router??
    By xxx123 in forum General Networking
    Replies: 18
    Last Post: 12-01-2008, 00:30

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •