Sunday, 26 August 2012


TrojanHunter searches for and removes trojans from your system. With an easy-to-use Scanner and a Guard that scans in the background TrojanHunter is a must-have complement to your virus scanner. If you are downloading files from the Internet, you need TrojanHunter!

Saturday, 25 August 2012

XSS Persistence Demo [video]

Penjelesan dan video mengenai XSS Persistence Demo

Thursday, 23 August 2012

tutorial r00t on server

This small book is will explain
you how professional hackers got root on servers.
this book is for beginner.

Leassons Of Book

Lesson 1- What is Root ?
Lesson 2- How can I get on the Root ?
Lesson 3- Local root and how to search for
him ?
Lesson 4- How connect the server ?
Lesson 5- How to get Root access ?
Lesson 6- What happen after the root ?
Lesson 7- The withdrawal of my domain ?
Lesson 8- How to do mass deface ?
Lesson 9- How to register the hacked
websites on Zoneh?
Lesson 10- How to clear tracks from server ?

Download Link -
bila download korang dapat tools + pdf


BoNeSi- A New DDoS Botnet Simulator Tool Available For Download

After Armageddon now we got BoNeSi, the DDoS Botnet Simulator is a Tool to simulate Botnet Traffic in a testbed environment on the wire. It is designed to study the effect of DDoS attacks. BoNeSi generates ICMP, UDP and TCP (HTTP) flooding attacks from a defined botnet size (different IP addresses). BoNeSi is highly configurable and rates, data volume, source IP addresses, URLs and other parameters can be configured. There are plenty of other tools out there to spoof IP addresses with UDP and ICMP, but for TCP spoofing, there is no solution. BoNeSi is the first tool to simulate HTTP-GET floods from large-scale bot networks. BoNeSi also tries to avoid to generate packets with easy identifiable patterns (which can be filtered out easily).
It is highly recommend to run BoNeSi in a closed testbed environment. However, UDP and ICMP attacks could be run in the internet as well, but you should be carefull. HTTP-Flooding attacks can not be simulated in the internet, because answers from the webserver must be routed back to the host running BoNeSi. A demo video of BoNeSi in action can be found here.
To Download BoNeSi Click Here

BT5 R3 preview was released!!

BT5 R3 preview was released  in BlackHat 2012 Las Vegas for the enjoyment of conference attendees. The main aim of that pre-release was to figure out their last bug reports and tool suggestions from the BH / Defcon crowds. This final release mainly focuses on bug-fixes as well as the addition of over 60 new tool. A whole new tool category was populated – “Physical Exploitation”, which now includes tools such as the Arduino IDE and libraries, as well as the Kautilya Teensy payload collection.
As usual KDE and GNOME, 32/64 bit ISOs, have been released a single VMware Image (Gnome, 32 bit). 
We would also like to give to reminder that the first release candidate (R1) of BackTrack 5 was released in August last year. Later in March this year we got the second release candidate (R2) of BT 5. 
For those requiring other VM flavors of BackTrack If you want to build your own VMWare image then instructions can be found in the BackTrack Wiki. Direct ISO downloads will be available once all our HTTP mirrors have synched. But still you can download BackTrack 5 R3 via torrent from the below links. 


Wednesday, 13 June 2012

Gmail Hacked!! State-Sponsored Attackers Accessing Millions of Gmail Accounts Illegally

This year cyber criminals became very busy while penetrating security systems of many leading Industries. Last week we have seen hackers had managed to steal more than 6.5 million passwords of LinkedIn users. Also this week we have seen popular dating site eHarmony faced cyber attacks which causes serious damages. Now its the turn for Internet giant Google. Hackers have managed to breach the tight security system of Google Mail I mean Gmail. According to last report state-sponsored attackers are accessing millions of Gmail accounts illegally. Google unveiled a new warning system to alert Gmail users when it suspects “state-sponsored” attackers are attempting to compromise their accounts or computers using malicious software.

Monday, 11 June 2012

Test Anti-virus / Firewall anda

1- buka notepad
2- copy and paste code kt bawah
3- save namepape.exe kat destop anda.
4- kalau file nie automatic kene delete maknenye Antivirus/firewall anda berfungsi..
     kalau x paham paham je larr erk..hahaha

Reason to be careful if 'PayPal' says you have changed your email address

 Have you received a notification claiming that your PayPal email address has changed?
Messages like the following have been spammed out to internet users:

Sunday, 10 June 2012 [Forum Untuk penggemar IT]

Harini aku nak sembang sket pasal Forum nie bukanlah seperti forum-forum hacking yang terdapat di luar saner tu.. ape yang menjadikan TBD nie special sket adalah, TBD akan membincangkan topik-topik Keselamatan Komputer dan Internet, Programming dan macam-macam lagi. Ingat, dorang akan bincangkan sahaje,kadang2 akan bagi terus pe yang korang nak tu.Tapi ini langkah yang terbaik sebab korang akan lebih banyak buat research sendiri dan akan lebih cepat faham..Kat sinie korang akan belajar banyak benda baru. Aku selalu gak bukak forum nie, hampir tiap2 hari..hehehe..Tapi hanya sekadar silent reader!! bhahahaha!!!!!

Understanding Different Types of Malware

You may have probably heard of the term malware, virus, Trojan, key-logger, worm, backdoor, bot, root-kit, ransom-ware, ad-ware, spyware and dialer but wonder what are the differences as you may probably only know about virus. Basically malware is short for Malicious Software where all of the terms above falls into this category because they are all malicious. The different term being used instead of just plain virus is to categorize what the malicious software is capable of doing. For example, a keylogger steals whatever that is typed on your keyboard and sends it to the hacker, a trojan opens up a backdoor allowing the hacker to gain full access to your computer and etc.

Firemin - The ultimate tool to fix Firefox memory leaks and optimize usage

Firefox high memory consumption is one of the biggest challenges this popular, open-source project, has faced in tough browser wars, while there have been quite a few attempts to make the web-browser optimized with forks and utilities and Mozilla foundation even addressed the "memory leakage" issue with targeted efforts like MemShrink - the results were promising but nothing very exciting.

Saturday, 9 June 2012

Dating Site eHarmony Hacked, 1.6 Million Password Stolen

After LinkedIn now cyber criminals targeted one of the famous dating site eHarmony and stolen more than 1.6 millions of passwords from the database. The authority has admitted that its password database has been compromised, with around 1.5 million hashed passwords being found in the wild. The leaked database that appeared in public contained unsalted MD5 hashed passwords and was reported to not contain any identifying user-names or email addresses. According to the sources all the password hashes has been

15 Killer Windows 7 Keyboard Shortcuts

1. Ctrl+Shift+N to Create a New Folder

2. Ctrl+Shift+Click to Open a Program As Administrator

3. Shift+Right-Click Enhances Send to Menu

Kena Virus Atau Tidak!!

Adakah komputer anda 'running slow' atau adakah anda fikir anda telah dijangkiti?
Sesetengah pengguna sekarang akan segera menyalahkan virus jika sesuatu yang pelik terjadi di komputer mereka!! kamon laa weyh!!!

Pertama, anda mesti belajar untuk membezakan antara jangkitan dan perkara umum apabila komputer anda perlahan.

Melajukan Komputer Anda


Sekarang anda tidak perlu memuat turun apa-apa perisian untuk membuat komputer anda lebih pantas, anda akan mencipta aplikasi anda sendiri atau boleh dikatakan skrip yang akan Mempercepatkan komputer anda sebanyak 25% dan ya, anda dapat kesan yang serta-merta pada pc anda. Jadi hanya ikut langkah mudah ini ..


TOR Browser[stay anonymous]


kat sini aku nak kongsi sedikit sebanyak pasal TOR browser.. TOR browser nie membolehkan korang melepasi sekatan-sekatan ke atas website untuk di lihat menggunakan IP malaysia..bile korang guna TOR nie, IP korang akan bertukar tukar..hehehe..
Bawang nie Icon dye, bukan aku nak jual bawang ke hape!!

Friday, 8 June 2012

Flamer/Skywiper Stuxnet

kebelakangan ini, Ace tengok kebanyakkan media sosial banyak Update mengenai Flame malware. So, Ace nak gak menyebok wat 1 post mengenai ni. hehehe.Selepas "Duqu" kini The Iranian Computer Emergency Response Team (IRCert) mendakwa telah menemui Stuxnet baru yang disasarkan untuk menyerang sistem dalaman negara.Stuxnet yang baru dijumpai nie telah digelar Flame (juga dikenali sebagai Flamer atau Skywiper). Nama "Flamer" datang dari modul serangan,

Thumbnail Zoom Plus Di Firefox!!

salam wahai blogger yang sudi singgah di sni..hehe.. hari ni Ace nak sembang 1 perkara, ni pasal Thumbnail Zoom Plus.. benda ni adalah add-ons [FIREFOX ONLY] untuk zoom mana-mana yang kita sentuh guna , kalau kt facebook tu, korang x payah susah-susah nak click gambar.. hehehe..sesuai sangat untuk stalker sepenuh masa!! hahaha
[aku macam x percaye aku wat tutorial untuk install add-ons..hahaha]

6.5 Million of LinkedIn Passwords Stolen By Cyber Criminals

security compromised
Very popular social networking site LinkedIn are currently running through a massive cyber attacks. It has been allegedly reported that more than six million passwords belonging to LinkedIn users have been compromised among them more than 300,000 passwords has already been cracked and published as plain text. A file containing 6,458,020 SHA-1 unsalted password hashes has been posted on the internet, and hackers

Thursday, 7 June 2012

-[alat pengesan untuk laptop/pc]-

salam blogger!!
kt snie aku nk kongsi satu ni dah lama wujud, but aku nak kongsi kt dalam blog
untu sekadar pameran dan informasi kepada yang x berapa nak tau tue..orite??

[tuto]How to Upload Shell in Wordpress

wordpress logo
ok.let us learn together.
this tutorial will be in dual language
- english
+ bahasa melayu

Wednesday, 6 June 2012

Crack Password WEP using BEINI

Question: WEP Key - What Are WEP Keys?
WEP stands for Wired Equivalent Privacy, a standard for WiFi wireless network security. But what exactly are WEP keys?
Answer: A WEP key is a security code used on some Wi-Fi networks. WEP keys allow a group of devices on a local network (such as a home network) to exchange encoded messages with each other while hiding the contents of the messages from easy viewing by outsiders.

Hacker Evolution Duality Game

Hacker Evolution Duality is the upcoming hacking simulation game, developed by exosyphen studios. Based on the successful Hacker Evolution game series, it has been completely redesigned to offer an impressive and new gaming experience.
Hacker Evolution Duality starts in the early days of Brian Spencer when he was nothing more than a brilliant programmer. It then fast forwards to the future, where he has to stop an Artificial Intelligence he has created, unknowingly and take back control of a giant company he once used to own.

Use ALFA in VMware

Post kali ini untuk memberi solution kepada mereka yang menggunakan ALFA NETWORK Wireless USB adapter..

ALFA AWUS036NHR review!!

AWUS036NHR is the IEEE 802.11b/g/n Wireless USB adapter provides users to launch IEEE 802.11b/g/n wireless network at 150 Mbps in the 2.4GHz band, which is also compatible with IEEE 802.11b/g wireless devices at 54 Mbps. You can configure AWUS036NHR with ad-hoc mode to connect to other 2.4GHz wireless computers, or with Infrastructure mode to connect to a wireless AP or router for accessing to Internet.
AWUS036NHR includes a convenient Utility for scanning available networks and saving preferred networks that users usually connected with. Security encryption can also be configured by this utility.


BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date. Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community.

Tuesday, 5 June 2012

Phishing Attack: Login Overflow

semua dah tau pasal phising kan, phishing ni da macam ancient technique untuk hacking..hehe

so x perlu buang masa jom kite tengok phishing yang dah di upgrade oleh BinusHacker  !!


DATABASE adalah pangkalan data yang penting bagi sesebuah organisasi. Database juga terdapat dalam dynamic website.. Database ini penting jika melibatkan maklumat-maklumat peribadi dan menjadi bahaya kepada mangsa jika maklumat tersebut disalah guna oleh pihak yang lain..


Google menyokong beberapa operator canggih, yang mana merupakan perkataan yang dicari yang mempunyai erti khas untuk Google. Biasanya operator ini mengubahsuai pencarian dalam beberapa cara, atau bahkan memberitahu Google untuk melakukan sejenis yang sama sekali berlainan pencarian. Contohnya, "link:" adalah pengendali khas, dan permintaan tersebut [link:] tidak melakukan pencarian yang biasa sebaliknya menemui semua laman web yang mempunyai pautan ke


SQL (disebut "ess-que-el") bermaksud untuk Bahasa Pertanyaan Berstruktur(Structured Query Language). SQL digunakan untuk berkomunikasi dengan pangkalan data. Menurut ANSI (American National Standard Institute), ia merupakan bahasa standard untuk sistem pengurusan pangkalan data hubungan. Kenyataan SQL digunakan untuk melaksanakan tugas-tugas seperti mengemas kini data dalam pangkalan data, atau mendapatkan data daripada pangkalan data. Beberapa hubungan


sql injection
schemafuzz ditulis dalam coding python oleh darkc0de crew.. tool ini berfungsi untuk melakukan sql injection terhadap website yang vuln atau dalam kata lainnya mempunyai kelemahan SQL..
Related Posts Plugin for WordPress, Blogger...