Black Hat

Theme Blogspot version Blackhat Indonesia

Black Hat

Theme Blogspot version Blackhat Indonesia

Black Hat

Theme Blogspot version Blackhat Indonesia

Kamis, 23 Desember 2021

PROMO WIFI INDIHOME DESEMBER 2021


 

Paket 2P (Internet + TV)


Up to 20 Mbps = Rp. 345.000,-/Bulan

Up to 30 Mbps = Rp. 420.000,-/Bulan

Up to 40 Mbps = Rp. 495.000,-/Bulan

Up to 50 Mbps = Rp. 560.000,-/Bulan

Up to 100 Mbps = Rp. 915.000,-/Bulan

Keterangan:

UseeTV New Basic terdiri dari 108 channels UseeTV (89 channels SD dan 19 channels HD).

Pilihan bonus Indihome Study, Movies atau Music

Harga berlaku untuk pelanggan baru mulai Oktober 2020.

Harga di atas untuk pembayaran setiap bulan.

Harga paket sudah termasuk Hybrid Box IndiHome dan ONT selama berlangganan.

Harga belum termasuk PPN.

Daftar Indihome Via WhatsApp 08577 569 4200


PAKET 3P INTERNET+TV+PHONE


Paket 3P (Internet + TV + Phone)

Up to 20 Mbps = Rp. 375.000,-/Bulan

Up to 30 Mbps = Rp. 450.000,-/Bulan

Up to 40 Mbps = Rp. 525.000,-/Bulan

Up to 50 Mbps = Rp. 590.000,-/Bulan

Up to 100 Mbps = Rp. 945.000,-/Bulan

Up to 200 Mbps = Rp. 1.665.000,-/Bulan

Up to 300 Mbps = Rp. 2.655.000,-/Bulan

Keterangan:

Gratis 300 menit nelpon lokal / interlokal.

UseeTV New Basic terdiri dari 108 channels UseeTV (89 channels SD dan 19 channels HD).

Pilihan bonus Indihome Study, Movies, Music, Gamers atau Entertaintment.

Harga berlaku untuk pelanggan baru mulai Oktober 2021

Harga di atas untuk pembayaran setiap bulan.

Harga sudah termasuk Hybrid Box IndiHome dan ONT selama berlangganan.

Harga belum termasuk PPN.



HUB : 085775694200 - TLP/WHATS UP

Selasa, 14 Agustus 2012

How To Use Dll Hijack Exploit

The exploit is simply a error in the programming These exploit are at the sites and programs is caused by a error in any programming language For example, sites that have been programmed by PHP You may find in them many of the mistakes being exploited To discover this you must to learn php :) it's not easy But there are several sites Discover a lot of exploit And set them free like exploit-db.com .



Generally in this topic we will talk about  Dll Hijack Exploit this type has spread dramatically in the programs It is also easy to use

First, what is Dll :
Simply that one file contains a large number of important functions to complete the work of  the program There are two types :
The first in the form of libraries as it is called dynamic link libraries Of operating systems which is the same which are present in this path ( WindowsDirectory%/system32%/) It is containing functions that help the program to call on other functions The other type of these libraries, which are be coming with the same program

What is Dll Hijacking :
DLL Hijacking is an attack that exploits the way some Windows applications search and load DLLs that they need and use. Most Windows applications will not use a fully qualified path to load any required DLLs. A bad guy can place a DLL for a known program in a location that is searched before the real DLL's location almost guarantee that the malicious DLL is loaded, resulting in whatever code the attacker wants to run running! When programs are not written to specify the exact location of a required DLL, Windows will search for the DLL by name in a specific order.

This type of exploit will help you to hack your victim easily by injecting the program And choose the path of the server that will not see the victim ( Server must be attached with the program files ) Hundreds of dll hijack exploit Are discovered daily in popular programs With an explanation of how to use Exploit-Db.Com

This simple explanation of how discover  Dll Hijacking (The manual methods) :





Download :


Download dev c++ from the site official :) 


You can easily change the path of calculator with your server


Enjoy !!! 

New Exploit In Internet Explorer 8 Browser

New Exploit In Internet Explorer 8 Browser Infect Windows 7 / XP  systems

This exploit enables you to apply some codes To penetrate the users easily ,And this is the compiler error of memory corruption in the presence of weakness in dealing with the elements, control, and introduction to the browser and of course the exploit skip the protections DEP / ASLR  And targeting systems XP / 7 So far there is no updates to eliminate the exploit

This Exploit has become available in the Metasploit  project

Generally This is the exploit : http://pastebin.com/VmZNrzgw

Enjoy !!!

Gartland1 Email Bomber

Gartland1 email bomber lets you bomb any email address sent from any email address with no login or smtp its fast and easy to use :)

Video of the programmer :
 
Download :

NCC Cracker - Yahoo Crackers !

Now there are many yahoo crackers  Enables you to crack the password easily

Tools that will need :



How to use NCC Cracker :

after load the id names text file in cracker.. start button will not enable.
to enable start button, need to add 1 more name by pressing on + button like this...
add any name you like, just at least 1 name
after add it , start button will be enabled.
 
  Download :


Download Xtreme Mail Bomber

Download :


Or

What is Crypter

Crypter is  software to  Bypass Security used to hide our viruses, RATs or any keylogger from antiviruses so that they are not detected and deleted by antiviruses. Thus, a crypter is a program that allow users to crypt the source code of their program. Generally, antivirus They typically look on the binary instructions and dependencies that are declared by the software. If their combination is risky then the heuristic alarm will be triggered.



How does a FUD crypter work?
The cryptor takes the Origial binary file of your exe and applies many encryptions on it then stores it on the ''end of file'' (EOF) ,.. so that a new encrypted executable file is created. In computing, EOF is a condition where no more data can be read from a data source.

Below is a simple diagram on FUD encryption;

As you can see from the above illustration, the new .exe file (encrypted) file can not be detected by antivirus be its Original code has been scrambled by the FUD crypter. When executed, the new .exe file decrypts its binary code into small portions of data at a time and injects them into another already existing process or it drops the code into multiple chunks in alternative data streams (rarely scanned by antivirus software) then executes it as a .txt or mp3 file.

Why Most FUD Crypters dont Work?
As a FUD crypter becomes popular, it also gains too much attention from Antivirus companies. The Antivirus software will be updated regulary and may include new detection mechanism that will easily detect any encryptions made by the crypter.

Where to Test whether your crypter is FUD or not?
If you want to test wheather your crypter is FUD or not, go to  http://scanner.novirusthanks.org and dont forget to check the box ''Do not distribut the sample''

Note:-Do not test your crypter on http://virustotal.com as it distributes the samples and your crypter will not remain FUD if you scan with virustotal.

Where to get a free FUD crypter?

its hard to find a 100% FUD crypter, because of the constant update in antivirus detection mechanisms. But just incase you get your hands on a latest FUD crypter If you followed FreeHackTools.Com you will find the best