\

Featured

Powered by Blogger.

Browsing "Older Posts"

Selamat malam sobat IDCA, kayaknya dunia underground saat ini baru rame-ramenya Exploit vBulletin yaaa, ya udah dah ikut-ikutan ngesahre nih :P

[+] Dork [+]

Inurl://install/upgrade.php
intext:vBulletin 4.2.1 Upgrade System
intext:vbulletin-style.xml

[+] Langkah - Langkah [+]

1. Masukan expoit :/install/upgrade.php
#localhost/path//install/upgrade.php

Tampilan akan seperti ini'


2. Kemudian tekan CTRL + U dan cari Customer ID nya :)


3. Setelah itu, buka vBullein 0day disini, lalu masukan Costumer ID dan data lainnya :)
website diisi, contoh : http://bimo-cyber.org/install/upgrade.php


4. Setelah itu klik Inject Admin, maka tampilan akan seperti berikut 


5. Nah sekarang tinggal login aja deh, login admin vBulletin adalah : /admincp/
#contoh : http://bimo-cyber.org/admincp/


nah udah berhasil login tuh =))

tinggal tebas aja, kalau belum bisa memasang shell bisa download video dibawah ini :)

Untuk cara upload file, bisa download tutorial disini

[+] Web Demo [+]

http://www.3drcforums.com/install/upgrade.php
http://www.cosportbikeclub.org/forums/install/upgrade.php
http://windowssecrets.com/forums/install/upgrade.php
http://passivehouseplus.ie/forum/install/upgrade.php
http://www.aussiemuslims.com/forums/install/upgrade.php
http://www.georgiarcracing.com/install/upgrade.php
http://www.doula.com.au/install/upgrade.php
http://www.ohiovalleydtr.com/install/upgrade.php
http://www.doula.com.au/install/upgrade.php
http://www.barrreport.com/install/upgrade.php
http://www.mabinogiworld.com/install/upgrade.php
http://www.coolminiornot.com/forums/install/upgrade.php
http://www.ukuleleunderground.com/forum/install/upgrade.php
http://www.coronet.dk/install/upgrade.php
http://www.thebagforum.com/install/upgrade.php
http://www.3dallusions.com/forums/install/upgrade.php


Content Created By Bimo Septiawan

vBulletin 4.x.x and 5.x.x Upgrade 0day Exploit

By admin → Tuesday, September 17, 2013
Selamat sore sobat IDCA, udah lama sekali nih engak coret-coret di blog lagi hehe :D
Untuk kesempatan kali ini, kita tinggalkan dulu soal hacking dan tetek bengeknya :)

Pada kesempatan kali ini, saya akan membagikan script "Ulang Tahun Flash Player" daripada bingung maksud saya apaan, langsung lihat aja penampakan berikut :)




Okay, gimana ? berminat? langsung aja sedot disini gan =))


#Note : Edit dibagian config.xml

Content Created By :  Bimo Septiawan ( Garuda Attacker )

Script Ulang Tahun Keren

By admin →



So here we are…our main victim is LAN … But remember if
you are sniffing on a local area network,make sure that your
network card is in the promiscuous mode..if not then use
this cmd “netsh int UR IP set global taskoffload=disable”
Now letz begin the main part of this topic. we can classify
our topic into three main part

1=> ARP Poisoning—in order to poison victims “ARP Cache”

2=> With Wireshark we will sniff the coockie

3=> Finally we will replace the victims authentication
coockie with our coockies and deploy the victims account..:P
Before we start we need some tools like ::::::::
1) Cain & Abel

2) Wireshark

3) Coockie Manager Plus (A firefox Addon)

Step1::::::::::: ARP Poisoning

i) download Cain & Abel from their official site

ii) now turn on the sniffer by clicking green button where I
indicate with red circle, after starting Sniffer now press “+”
button to scan all MAC address available in our
Lets Go xD

LAN like this pic..



Once you have scanned all MAC address and ip ,itz time to
perform MitMA, to start that click on ARP tab at the bottom
and click on the white area to turn + sign in blue.
Next click on “+” sign and a list of host will appear to which
you will like to sniff the packets..like this pic..

Now click Sniffer button which I mar in the image..it will start
poisoning the router in short of time and you will start
capturing packets from your victims..:D


Now see this image it will clear that ARP Poisoning and
routing..


So till now we done ARP Poisonig on victims ARP cache,now
we will use wireshark to trace the packets (ie Sniffing) now
we will start Wireshark to capture packets…

so open wireshark and click on the interfaces… like this
image..


Now choose the right interface and click on start button.. and
continue sniffing around 15 min to capture all packets …and
stop after capturing…..
Next set the filter string as http.coockie contains “datr” as we
know that datr is the facebook authentication cookie…:P




Now right click on ->copy->bytes->printable text only and copy
the all data to Notepad …. Now we will use the Coockie
Manager (firefox addon) ..so open it on firefox ..first of all open
http://facebook.com and aopen coockie manager ..and on
coockie manager click on add button…



After refreshing I got…


So my mates that’s all 

ARP Poisoning

By admin → Tuesday, September 3, 2013

I myself have had a few people in the past ask me questions on social engineering. I always say to
anyone, you need to imagine social engineering as a game. But before i talk about the 'Game', I want to
go into detail about Basic knowledge and self preparation.
Basic knowledge and self preparation:

It's important like most things in life to be fully equipped and prepared to take on a task. I myself would
suggest you have clear outlines of what your trying to achieve, be it to get someone's email
password, exploiting them for money, to get into a online game group/clan etc etc. In this case the email
and password of Facebook account.
First of all, you need to take into consideration of what you will need, for this social engineering tutorial
i'm going to outline this from an obtaining someone's email password perspective. Before i continue, i
would like to stress some important factors you might want to take into consideration:

1) People are more open to you if they perceive you as an idiot.
2) People are less suspicious of you when you make them laugh.
3) People are more trusting if you actually take an interest in them.

I'm going to break these three points down to give you a better understanding of why this is:

In the case of 1 - nearly everyone seems to be more careless when they perceive you as an idiot, the
main reason for that is, you don't consider someone who appears to be an idiot as a threat. Another
reason is that people tend to become more open and arrogant when they feel they are on a higher
pedistel than you (never forget that!). Now there are things you need to remember however, although
these things are true if you overplay your idiot persona it will not be good in your fortune. Always
remember real morons are annoying as hell, you DO NOT want to put off the person your trying to
social engineer(unless your trying to fail, then knock yourself out).

In the case of 2 - when talking to someone it's easy to see why this rule is advised. Often it's a good ice
breaker, also reinforcing the idea that "your a nice guy", it slowly allows the person to build a
relationship of 'trust' with you.

in the case of 3 - also an obvious advisement, if you just pester someone for information without atleast
pretending to take an interest in what they are saying, not only will you come across as rude, it will
make the person wonder why your probing them for person info.

With these three points made, i will now continue with my example of obtaining someone's Facebook
Email and password. Before you go into detail, it's important to outline what you need to successfully
social engineer the password out of someone. Now you could try to Social engineer them for their
password, I advise you be a bit more intelligent and indirectly social engineer them for their password by
obtaining their password recovery knowledge. Now it's important to what you need to successfully hack
their account through recovery questions. You will need the following:

Their email address
Their account password

With this in mind it's imperative you plan how you will obtain these details. I will tell you how i do it. But
first i need you to understand, this whole transaction will not be completed over a course of a day, it can
take days to weeks depending on the person. I suggest you talk to them and read them first. If their open,
then you can do it within days, if their not then it would be better you spread this out over a week or two.
I also want you to imagine what you will say, try to predict their answers and MOST OF ALL, think of a
scapegoat on why your probing them for these answers, just in case your less than suttle and arouse
suspicion, if they ever suspect you it will go from a flame to a fire it's important to stamp all of their doubt
in you as soon as possible.
Now there are many ways you can obtain their password and addressee. Some people and post their
address on their profiles. In which case this is easy pickings, however that is rare. So you need to devise a
way of obtaining that info. Now you can pretend that you are from bank or something like this and ask for
their email address. Or you can pretend that you are some student an doing some research. Be creative

Now i need the answer to their security question, now you need to find out what the question is, i suggest
pretend to recover password to see what it is or get the info for all of the recovery questions email asks.
Im going to go with the first option and say for example their recovery question was : What is your dogs
name?.

How I would go about obtaining this would be to pretend to have a pet of my own, i would start off the
convo like so:

me: Ffs my dog wont stop barking, seriously where did i leave my ducktape lol!
victim: lol yeah i know sometimes my dog's the same, annoying -.-
me: Oh you have a dog? i didn't realize whats your dogs name, if you don't mind me asking.

It is important to add "if you don't mind me asking", because it gives the person a bit of power over you
and also show's a little respect (once again reinforcing the notion your a nice fellow).

POINT: I wouldn't dive straight into "whats your dogs name" start with the breed first and remember try

to predict what they will inturn ask (mines blah blah whats yours?).
With that in mind, I'm sure by now you can see how easy it is, to social engineer someone's password
through the indirect method of password recovery. Now obviously most recovery questions wont be about
pets mostly they're "mothers maiden name" "place of birth" etc. But use the same logic and work around
it, remember think every detail through and ask yourself this if someone gave you this story or asked you
in a certain way would it seem legit to you?
and when you have the email address, click on Facebook, I forgot password and will be sent on your
email.

The Game:

The game is basically, perfecting "self preparation". Social engineering is a game,. If you think about it in
this way: each time trust is given to you, you advance a level, which each level you advance, your ability
of obtaining information from this person becomes easier. In a sense mastering the ability to come up
with more ingenious ways of manipulating someone, without arousing suspicion, is what separates the
lucky noobs from the elites.
When thinking about this as a game, you need to reflect on your goals. As I've mentioned before try to
imagine the dialogue between you both, think about how you will obtain certain things and more
importantly have clear directives. With this in mind i think we can now talk about how you might want to
consider presenting yourself (only applies if the person is indeed a stranger).

So if you were going to go after a complete stranger, you should first try and get as much research on
them as you can. For example, age, name. This is important for making up for fake identity. I would also
suggest if you social engineer more than one person you write down, in detail! your differn't alias so you
don't get confused. Nothing would be worse than using the wrong alias on the wrong person.

When building your identity decide on what would give you the biggest advantage with this person. This
can be from faking your age to match the interests of this person, thus giving you the advantage of being
able to "click" with the person. Pretending to be a student or in a dead end job for sympathy manipulation
or in the case of a dead end job, pretending to relate to the slave. There are many things you can do, as
I've mentioned it depends on the circumstances you need.

Social Engineering The Art of Human Hacking ?

Download Link - Click Me

Social Engineering Attack

By admin →


Hey guys i m Back with my new hacking skill
one frnd tell me he (Sam Idies) want to know this
trick so i'll post and many others members want to know about this trick

Step 0 - The Tools

1.Athena II
2.Raptor 3 -
3.Proxy Finder
4.Proxy Checker -
5.CForce -

Download All Tools!

 HERE###




Step 1 - Athena II
1.Run Athena II.
2.Setup Athena II.
3.Click Start.
4.Wait about 5~10 min. and click stop...
5.Copy Logins.txt from Athena II folder to the desktop.

Step 2 - Raptor 3
1.Open Raptor 3.
2.Go to File > Open and in the dialog open logins.txt from desktop.
3.In Tools click "Remove Duplicats".
4.Go to Filet in Tools > Click on "Custom Filters" tab.
5.Right click in empty spot > click "Add".
6.In filter name type "bangbros" > Action: Keep If > Filter Subject: Line > Condition: Has > Amount: Any > Filter: What: bangbros > Click Ok.
7.Check the new made filter and click filter buton under empty spot.
8.In Generators select "Pass Leecher" > Right click at emty spot > click on "Add" > Select logins.txt from decktop > click "Leech" buton under emty spot.
9.Now go to File > Save All > Save the file as Combo.txt on desktop.


Step 3 - Proxy Finder (Click to Hide)
1.Open ProxyFinder.
2.Click "Find" button.
3.When its done click "Save" button and save as Proxy.txt on desktop.


Step 4 - Proxy Checker (Click to Hide)
1.Open Proxy Checker.
2.On Proxy field click "Load" button and load Proxy.txt from desktop.
3.Click "Start" button.
4.When its done click "Save" button on Responding Proxys field and save as CheckedProxys.txt on desktop.


Step 5 - CForce (Click to Hide)
1.Open CForce.
2.Click on "Auto" tab.
3.In url field type the members login url from the site that you want to hack.
4.At "Proxy-List" field click on "Load" button and load CheckedProxys.txt from desktop.
5.At "Combo-List" field click on "Load" button and load Combo.txt from desktop.
6.Click start and wait till its done.
7.When its done you will have working logins here.



How To Crack Porn Website Premium Account

By admin → Sunday, September 1, 2013