Berbagi Itu Indah

SEKOLAH INTERNET MARKETING


SEKOLAH INTERNET MARKETING JAKARTA


sekolah bisnis internet marketing  jakarta yang keanggotannya seumur hidup ? ? ?
gabung aja bareng kita sekolah bisnis 1 milyar
ayoo buruaan gabung !!!
SB1M 450 x 450 untuk dibawah artikel
SB1M JAKARTA

Sekolah Bisnis 1 Milyar As Seen On  :




Link Kompas.com : link : http://vod.kompas.com/read/2014/01/25/140708/policy.html

Watch This Video Below 

 




BANNER FREE MEMBER

Mau ikut kelas SB1M ?

--->> Hubungi : Wahyu Budi P ( 0888-0865-1562 ) <<--

Or PIN BB : 315-28-0B2 

 

  



Testimoni beberapa teman -teman yang ada di kelas SB1M




Salah Satu Pelajaran di Sekolah Bisnis Online 1 Milyar : dari Adryan Fitra
" Trik Bisa Rank 1 Google dan Terindex Google kurang dari 10 detik"




Pengguna Internet di Indonesia Makin Meningkat . 

Peluang Menjual dari internet makin Besar - warta kota 21 oktober -




Produk Dropship apa yang dipilih SB1M? 


-->Weight LOSS <--

Mengapa dipilih Pasar Weight Loss ? 

Contoh di Bisnis Clickbank Apa Yang paling laku di jual ? 

Produk Di Clickbank yang terlaris adalah Produk Weight Loss

-- >> Bahkan Selalu menempati 10 Besar Produk Terlaris di CBENGINE<<--


------


Cek juga Tabloid Kontan Edisi 3 XVIII 2013 

-- >> Selalu ada Pasar Gemuk dari Orang Yang Ingin Kurussss <<--

Pasar Weight Loss Pasar Yang abadi dan akan selalu ada pembeli dan Hampir Selalu Repeat Order




-----

Thx For Coming & Share Adryan Fitra @ Sekolah Bisnis 1 Milyar







---




Lebih Dari 50 Video Tutorial Bisa di pelajari dirumah

1 Minggu = 4 x Kelas Langsung Praktek di SB1M



kartun gif

Mau ikut kelas SB1M ?

--->> Hubungi : Wahyu Budi P ( 0888-0865-1562 ) <<--

Or PIN BB : 315-28-0B2 



READMORE
 

Detection IDS/IPS with Suricata + Port Mirroring Cisco

Detection IDS/IPS with Suricata + Port Mirroring Cisco




Simple Explanation about Suricata is the OISF IDP engine, the open source Intrusion Detection and Prevention Engine.
which you can so easy download file in here

in this tutorial i'm using Centos Minimal for base OS, for reason about performance and memory utilization what can i get than other, ok let's me explain about how to install suricata in centos 6.4

1. Install dependencies package or Development tools
------------------------------------------------------------------------------------------------------------------------
~# yum -y install libpcap libpcap-devel libnet libnet-devel pcre \
pcre-devel gcc gcc-c++ automake autoconf libtool make libyaml \
libyaml-devel zlib zlib-devel libcap-ng libcap-ng-devel magic magic-devel file file-devel
------------------------------------------------------------------------------------------------------------------------ 

IPS Support

If you want to build Suricata with IPS support, we to need “libnfnetlink” and “libnetfilter_queue” packages, these pre-built packages is not available in the EPEL or CentOS Base repositories. So, we need to download and install rpms from the Emerging Threats CentOS repository.

------------------------------------------------------------------------------------------------------------------------
~# rpm -Uvh http://rules.emergingthreatspro.com/projects/emergingrepo/i386/libnetfilter_queue-0.0.15-1.i386.rpm \
http://rules.emergingthreatspro.com/projects/emergingrepo/i386/libnetfilter_queue-devel-0.0.15-1.i386.rpm \
http://rules.emergingthreatspro.com/projects/emergingrepo/i386/libnfnetlink-0.0.30-1.i386.rpm \
http://rules.emergingthreatspro.com/projects/emergingrepo/i386/libnfnetlink-devel-0.0.30-1.i386.rpm

OR

~# mkdir /etc/suricata
~# cd /etc/suricata
~# wget -c http://rules.emergingthreats.net/open/suricata-1.3/emerging.rules.tar.gz
~# tar -zxvf emerging.rules.tar.gz
------------------------------------------------------------------------------------------------------------------------ 

2. Download and Compile suricata package
------------------------------------------------------------------------------------------------------------------------ 
~# cd /opt/
~# wget -c  http://www.openinfosecfoundation.org/download/suricata-1.4.6.tar.gz
~# tar -zxvf suricata-1.4.6.tar.gz
~# cd  suricata-1.4.6
~# ./configure && make && make install-conf
~# ./configure && make && make install-rules
~# ./configure && make && make install-full
------------------------------------------------------------------------------------------------------------------------ 
 
3. Create spesific directory for Suricata configuration
------------------------------------------------------------------------------------------------------------------------

~# mkdir /var/log/suricata
~# touch /var/log/suricata 
~# chown suricata.suricata /var/log/suricata
 ------------------------------------------------------------------------------------------------------------------------

4. Copy default configuration to spesific directory
 ------------------------------------------------------------------------------------------------------------------------
~# cp classification.config /etc/suricata
~# cp reference.config /etc/suricata
~# cp suricata.yaml /etc/suricata
 ------------------------------------------------------------------------------------------------------------------------

5. Config Suricata.yaml and rules from http://rules.emergingthreats.net
------------------------------------------------------------------------------------------------------------------------

~# vi /etc/suricata/suricata.yaml

----------------------------------------------------------------

default-log-dir: /var/log/suricata/

filename: /var/log/suricata/suricata.log

default-rule-path: /etc/suricata/rules
rule-files:
 - botcc.rules
 - ciarmy.rules
 - compromised.rules
 - drop.rules
 - dshield.rules
 - emerging-activex.rules
 - emerging-attack_response.rules
 - emerging-chat.rules
 - emerging-current_events.rules
 - emerging-dns.rules
 - emerging-dos.rules
 - emerging-exploit.rules
 - emerging-ftp.rules
 - emerging-games.rules
 - emerging-icmp_info.rules
 - emerging-icmp.rules
 - emerging-imap.rules
 - emerging-inappropriate.rules
 - emerging-malware.rules
 - emerging-misc.rules
 - emerging-mobile_malware.rules
 - emerging-netbios.rules
 - emerging-p2p.rules
 - emerging-policy.rules
 - emerging-pop3.rules
 - emerging-rpc.rules
 - emerging-scada.rules
 - emerging-scan.rules
 - emerging-shellcode.rules
 - emerging-smtp.rules
 - emerging-snmp.rules
 - emerging-sql.rules
 - emerging-telnet.rules
 - emerging-tftp.rules
 - emerging-trojan.rules
 - emerging-user_agents.rules
 - emerging-virus.rules
 - emerging-voip.rules
 - emerging-web_client.rules
 - emerging-web_server.rules
 - emerging-web_specific_apps.rules
 - emerging-worm.rules

 HOME_NET: "[192.168.56.0/24,10.0.0.0/8]"

 ----------------------------------------------------------------
note : 
 "default-rule-path: /etc/suricata/rules"
- is dependen all rules files in /etc/suricata/rules

 "HOME_NET: "[X.X.X.X/24]"
- This variable indicates network address or the address of the computer that will be monitored by Suricata
------------------------------------------------------------------------------------------------------------------------ 

6. running suricata with daemon
~# suricata -c /etc/suricata/suricata.yaml -i eth0 -D
13/12/2013 -- 15:39:01 - <Info> - This is Suricata version 1.4.6 RELEASE
13/12/2013 -- 15:39:01 - <Info> - CPUs/cores online: 1
13/12/2013 -- 15:39:01 - <Info> - Found an MTU of 1500 for 'eth2'
13/12/2013 -- 15:39:01 - <Info> - allocated 2097152 bytes of memory for the defrag hash... 65536 buckets of size 32
13/12/2013 -- 15:39:01 - <Info> - preallocated 65535 defrag trackers of size 104
13/12/2013 -- 15:39:01 - <Info> - defrag memory usage: 8912792 bytes, maximum: 33554432
13/12/2013 -- 15:39:01 - <Info> - AutoFP mode using default "Active Packets" flow load balancer
13/12/2013 -- 15:39:01 - <Info> - preallocated 1024 packets. Total memory 3170304
13/12/2013 -- 15:39:01 - <Info> - allocated 131072 bytes of memory for the host hash... 4096 buckets of size 32
13/12/2013 -- 15:39:01 - <Info> - preallocated 1000 hosts of size 76
13/12/2013 -- 15:39:01 - <Info> - host memory usage: 207072 bytes, maximum: 16777216
13/12/2013 -- 15:39:01 - <Info> - allocated 2097152 bytes of memory for the flow hash... 65536 buckets of size 32
13/12/2013 -- 15:39:01 - <Info> - preallocated 10000 flows of size 176
13/12/2013 -- 15:39:01 - <Info> - flow memory usage: 3857152 bytes, maximum: 33554432
13/12/2013 -- 15:39:01 - <Info> - IP reputation disabled
13/12/2013 -- 15:39:01 - <Info> - using magic-file /usr/share/file/magic
7. Monitoring Suricata 
~#  tail -f /var/log/suricata/fast.log


8. Config port mirroring cisco for suricata

port mirroring mechanism in this case is using to duplicate all traffic on your port or vlan Interface to IDS/IPS (Suricata Server), that configure is needed to capture all income traffic and habit how the attacker force to get privilege to some system
here is the scenarion and configuration  :



------------------------------------------------------------------------------------------------------------------------ 
Cisco_device#configure terminal
Cisco_device(config)#monitor session 1 source interface GigabitEthernet x/x
Cisco_device(config)#monitor session 1 destination interface GigabitEthernet x/x
------------------------------------------------------------------------------------------------------------------------

Source :
- http://suricata-ids.org/
- http://rules.emergingthreatspro.com/

READMORE
 

Sniffing Via Android (MITM with Dsploit)

Sniffing Via Android (MITM with Dsploit)

DSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device.


 Features :
1. WiFi Cracking
The WiFi scanner will show in green access points with known default key generation algorithms, clicking on them allows you to easily crack the key, supported models: Thomson, DLink, Pirelli Discus, Eircom, Verizon FiOS, Alice AGPF, FASTWEB Pirelli and Telsey, Huawei, Wlan_XXXX, Jazztel_XXXX, Wlan_XX, Ono ( P1XXXXXX0000X ), WlanXXXXXX, YacomXXXXXX, WifiXXXXXX, Sky V1, Clubinternet.box v1 and v2, InfostradaWifi.

2. RouterPWN
Launch the http://routerpwn.com/ service to pwn your router.

3. Trace
Perform a traceroute on target.

4. Port Scanner
A syn port scanner to find quickly open ports on a single target.

5. Inspector
Performs target operating system and services deep detection, slower than syn port scanner but more accurate.

6. Vulnerability Finder
Search for known vulnerabilities for target running services upon National Vulnerability Database.

7. Login Cracker
A very fast network logon cracker which supports many different services.

8. Packet Forger
Craft and send a custom TCP or UDP packet to the target, such as Wake On LAN packets.

9. MITM
A set of man-in-the-midtle tools to command&conquer the whole network.

10. Simple Sniff
Redirect target’s traffic through this device and show some stats while dumping it to a pcap file.

11. Password Sniffer
Sniff passwords of many protocols such as http, ftp, imap, imaps, irc, msn, etc from the target.

12. Session Hijacker
Listen for cookies on the network and hijack sessions.

13. Kill Connections
Kill connections preventing the target to reach any website or server.

14. Redirect
Redirect all the http traffic to another adtress.

15. Replace Images
Replace all images on webpages with the specified one.

16. Replace Videos
Replace all youtube videos on webpages with the specified one.

17. Script Injection
Inject a javascript in every visited webpage.

18. Custom Filter
Replace custom text on webpages with the specified one.


Requirements :
- ARM
Your device must have an ARM cpu.

-  OS Version Minimal Gingerbread
An Android device with at least the 2.3 ( Gingerbread ) version of the OS.

- Root (Super User)
The device must be rooted.

- BusyBox
The device must have a BusyBox full install, this means with every utility installed ( not the partial installation ).

Original Web : dsploit
Download File dsploit.apk
Download File busybox.apk
READMORE
 

Application Android Anti Theft ( Prey )


Application Android Anti Theft ( Prey )



Prey is a mobile tracker application to track your lost phone remotely. Prey Anti-Theft is a free Android app that acts as a mobile tracker on Android device and locates lost or stolen device.

Prey is one of the most downloaded and used tracking device application @ Android Market as prey offers many unique features and that too at zero cost.

Prey mobile tracker app is a must-have app on your Android smartphone. It also sends you the report of your stolen or lost device by sending location on Google Map. You can check this report on your email id registered with Prey app.

One of the most interesting and award wining feature of this mobile tracker app is that, it comes with sending the SMS to the registered contact number whenever any new SIM is detected by phone. It sends the SMS only on that number on which you want to receive the alert message of missing device. But the condition is that, the contact number on which you want to receive the text message should be registered with Prey.

Some Key Features Of Prey Anti-Theft Mobile Tracker App:

- It tracks the lost or stolen phone.
- This app uses GPS + Wi-Fi Geo location to locate stolen or lost phone.
- Also it is a password protected app. No ne can access or change the setting until he/she knows the password.
- It provides the location on Google Map.

- It also provides SIM change detection option. This means that it will automatically send a SMS to the registered number from new SIM detected.
- It also locks your phone if activated, incase the device is lost or stolen.
- It is a password protected app that doesn’t even allow to uninstall or stop app without password.
- It has a loud alarm sound too.
- It is very light app for your Android memory.
- Prey is also available for tracking location for laptops and tablets.

How To Install Prey Anti-Theft App:

    Just login to “Android Market”
    Click on “Search” tab. Type “Prey Anti-Theft” in search tab.
    Click on “Prey Anti-Theft”.
    Click on “Install”.

The free Prey Anti-Theft mobile tracker app will be automatically installed. Make your phone safe and throw out the fear of losing your smartphone from your mind as your phone itself will tell you where it is.

Original Source heart-hackers

READMORE
 

Bash Script for remove SHV5 rootkit

Bash Script for remove SHV5 rootkit

Requirements :
Debian
apt-get with working sources
root access

CentOS :
yum with working rpm’s
root access

Download [at] http://blog.evilcoder.net/shv5-rootkit-remover/#sthash.0GdClqnw.dpuf Or Here
========================================================
#!/bin/bash
echo "SHV Rootkit checker by alex [at] evilcoder.net"
if [ $# -ne 1 ]
then
        echo "This is a SHV5 rootkit remover"
        echo "This script is released as it is and i can't be held responsable for any damages"
        echo "This script has been tested on Debian , Ubuntu and CentOS servers "
        echo "You must agree with that"
        echo "Usage : $0 yes"
        exit 1
fi
if [ "$1" != "yes" ];
then
echo "You should agree"
exit 1
elif [ "$1" == "yes" ];
then
echo "Thanks"
fi
#checking Linux type
OS=`cat /etc/issue|cut -d " " -f 1 | head -1`
if [ -d "/usr/lib/libsh" ];
then
        echo "We have SHV rootkit"
else
        echo "You don't have shv5 installed"
        exit 1
fi
echo "System Check"
if [ "$OS" == "Debian" ];
then
        echo "We have Debian"
        echo "Removing immutable from infected files"
chattr -sia /bin/dir
chattr -sia /usr/bin/find
chattr -sia /sbin/ifconfig
chattr -sia /bin/ls
chattr -sia /usr/bin/lsof
chattr -sia /usr/bin/md5sum
chattr -sia /bin/netstat
chattr -sia /bin/ps
chattr -sia /usr/bin/pstree
chattr -sia /usr/bin/top
chattr -sia /lib/libsh.so
chattr -sia /usr/lib/libsh
chattr -sia /usr/lib/libsh/*
chattr -sia /etc/sh.conf
chattr -sia /sbin/ttymon
chattr -sia /sbin/ttyload
echo "Deleting rootkit folders"
rm -rf /lib/libsh.so
rm -rf /usr/lib/libsh/
rm -rf /etc/sh.conf
rm -rf /sbin/ttyload
rm -rf /sbin/ttymon
echo "Reinstall new files"
apt-get update >>/dev/null
apt-get -y install --reinstall coreutils binutils net-tools psmisc lsof procps findutils >>/dev/null
echo "Killing Rootkit"
killall -9 ttymon
echo "You should reboot to finish cleaning"
elif [ "$OS" == "Ubuntu" ];then
echo "We have Ubuntu"
echo "Removing immutable from Ubuntu known infected files"
chattr -sia /bin/dir
chattr -sia /usr/bin/find
chattr -sia /sbin/ifconfig
chattr -sia /bin/ls
chattr -sia /usr/bin/lsof
chattr -sia /usr/bin/md5sum
chattr -sia /bin/netstat
chattr -sia /bin/ps
chattr -sia /usr/bin/pstree
chattr -sia /usr/bin/top
chattr -sia /lib/libsh.so
chattr -sia /usr/lib/libsh
chattr -sia /usr/lib/libsh/*
chattr -sia /etc/sh.conf
chattr -sia /sbin/ttymon
chattr -sia /sbin/ttyload
echo "Deleting rootkit folders"
rm -rf /lib/libsh.so
rm -rf /usr/lib/libsh/
rm -rf /etc/sh.conf
rm -rf /sbin/ttyload
rm -rf /sbin/ttymon
echo "Reinstall new files"
apt-get update >>/dev/null
apt-get -y install --reinstall coreutils binutils net-tools psmisc lsof procps findutils >>/dev/null
echo "Killing Rootkit"
killall -9 ttymon
echo "You should reboot to finish cleaning"
elif [ "$OS" == "CentOS" ];then
echo "We got CentOS"
echo "Removing immutable flag from CentOS known infected files"
chattr -sia /usr/bin/dir
chattr -sia /usr/bin/find
chattr -sia /sbin/ifconfig
chattr -sia /bin/ls
chattr -sia /usr/sbin/lsof
chattr -sia /usr/bin/md5sum
chattr -sia /bin/netstat
chattr -sia /bin/ps
chattr -sia /usr/bin/pstree
chattr -sia /usr/bin/top
chattr -sia /lib/libsh.so
chattr -sia /usr/lib/libsh
chattr -sia /usr/lib/libsh/*
chattr -sia /etc/sh.conf
chattr -sia /sbin/ttymon
chattr -sia /sbin/ttyload
echo "Deleting rootkit folders"
rm -rf /lib/libsh.so
rm -rf /usr/lib/libsh/
rm -rf /etc/sh.conf
rm -rf /sbin/ttyload
rm -rf /sbin/ttymon
echo "Reinstall new files"
yum -y reinstall coreutils binutils net-tools psmisc lsof procps findutils >>/dev/null
echo "Killing Rootkit"
killall -9 ttymon
echo "You should reboot to finish cleaning"
fi
fi
========================================================

Source from this Link
READMORE