Showing posts with label network. Show all posts
Showing posts with label network. Show all posts

NoboDy KnoWs wHo I'M:Part 2:The HeLL GaTe Just OpeneD

on Monday, May 18, 2009

The truth is..UTP spent God knows how much on Symantec and Novell product. But none of it really works. We always stuck on error every now and then. Bet it,
DNS border manager error, or symantec overloaded is just normal. Either the products are faulty or the admins are dumb.

MoreOver, Our IT department think by reducing student internet usage can help fasten internet...within that they spend a lots of money to accomplish that goal,monitoring network...so for this purpose...network filter used ...NetworkBox arriveD ....yes,that system really works...but it is even make network become slower...

Guess what?the system only restrict student that qualified to be monitored..and only catch people that deserved to be caught ...what is that mean?..
They only catch idiots...idiots that don't know how to think wise...they catch idiots that don't know how to cover their track..they only catch Script kiddie that claim to be expert hacker!There was a time i heard from script kiddie said

"You know what?last week ITMS came to my house and check our connection usage..oh no...we are near to be caught",

somebody said that proudly.I just smile and walk a way,deep in my heart...
"This dumbass proud to be detected ..i wish him good luck.. -sigh-"



The problem is..IT department overlook the situation...they can get better or bigger internet bandwidth if they spend those money in right way...and use correct open source product for their internet management,which required self-setting...but then...none of them are capable doing that..so they decide to waste money for something that they can get equally for free/lower price...their egoistic also too strong...which kills the needs for asking IT expert students.

Back to the track...i start asking in forum...searching for solutions ...the first question as far as i remember is this on
1. Use Tor
2.Here's the idea: Different protocols handle data in different ways, but you can generally manage to transport the data for one protocol over another. (For example, an SSH session can be transported over HTTPS.) This is what I call protocol tunneling -- I don't think that's the actual name. If you set up a tunnel between your computer and an off-campus friend's computer, using a protocol that only transmits data in small chunks. I don't know enough about the various protocols and tools to know how one would construct this system, but it is definitely within the range of possibility.

From answer replied...i know there are 2 ways to solve my problem..first is of course using Tor. At that time there are only few people from my University know how to use tor...so the download speed is not really bad.Meanwhile...i also struggle how to speed it up ..so i learned a lots from that..like elite proxy, elite proxy switcher ,OpenDns, Local DNS cache..etc...

After a while,my interest change to second option..but i'm sorry i can't write anything relating second option because it is illegal , & can lead to academic dismissaL ..at least in my universityYOU

Own Research K!!



At first i really wish to introduce linux to my folks..i start asking around...up flayers promoting linux....sadly it turns out just few people interest with it...because many students think linux is sooooo complicated...all they want is short cut!



so i decided to move on my learning..
-a(0N3-

Then..I also wonder about hacking..what it really is..and how i'm able to be one...where can i found article or somebody to teach me? i found Nubuntu,and did explore few network software..but then it seems already arrived at the end of semester...



2o07-New Sem, New year.. 19th of February 2007, 16:21 GMT - ProtecH released...This awesome distribution really help me a lots exploring networking world..especially i'm able to compare with previous analysis related tor and tunnel...few weeks later..i become one of the moderator in protech forum.It really boost me up to explore networking in deep....Thank You P1nT4S !

Sadly...Protech main developers seems disappeared for sudden and next version hang in the middle...



few months later...Backtrack start become popular hacking distribution...many hacking video demonstrated using backtrack too...so i decided to give a try ..



(To Be ConTiNuEd) (Last ChaPteR)

NoboDy KnoWs wHo I'M:Part 1: the Begining of Do0msday

on Friday, May 15, 2009
-So0RY , I'm jus7 no7 7h47 9o0D-


I'm born as normal person...i dont have any good looking attraction ..i'm not kind person who shine as genius.. i'm not even feeling i'm needed in this community ..all about me is just so plain...living in this so called sophisticated place makes me sometime wonder...what's the purpose i'm here ..does my existence even make difference to my surrounding ?....everything such a mess... but there is one thing for sure....my road was covered with blood and tears. I'm not born with everything-ready-to-learn ,everything that i have now...was all from tremendous pain and sacrifices ...maybe all start from this -----)

I'm taking Information , Communication and Technology course...in this engineering technology university .... most of engineering students see us as nobody ...and not even worth to exist compare to their engineering knowledge complexity... why is this happening...?we are here what we are now...do i need to remind you guys that we entered this university equally qualified ?why do you guys need to isolate us ? why ? why ? why?

i'm once think about this ..and at foundation , i did mentioned it to one of my IT expert senior...He smile and said to me

"Do you want want to learn what so called truth about your course in real life? OR all you want to spend here is forcing yourselves remembering notes,book and score ? "

i said...

"is it possible to go for both?"

"Nope...choices exist to be choose...and it is up to you to decide it"

"I think i'm prefer the first option"

"Then you need to be ready to walk to the hell with me"

what on earth is that suppose to mean ?did he ask me to commit suicide with him ?..i wonder....but then it just turn out it is even worse than that... It start with he introduced Linux to me...as everything about linux is so much pain...atleast for me to struggle alone...because after he teach me the basics...he ignore me and whenever i ask him , all he said was

"Go explore by yourselves"

I really hate that words..i'm not just linux newbie at that time...i also don't have any other alternative source to learn except from him...i don't care what perception that he thinks at that time about me...the only thing i do care ...is the fact that i can't care anything at all,as long as i gain the knowledge..then after i keep continue asking newbie questions to him...he then said

"It is not to late now to stop...all you need to do is just to delete everything i ever said to you from your memory..and go back to your real life"

i'm speechless ... i'm hopeless .... but atlease it make me realized that i need to depend everything on my shoulder..and no matter what...i'm not kind of person that easily give up ...

At that time , the download limit is 2mb...my IT department not just dumbass but also cruel and never think of behalf of student...what on earth can we use internet for if 2Mb is limit...even sometime lecture notes are bigger than that (PDF)....? i complained not because i want to download movie or what...but it is just that such a pain for me to update linux software..because most of it ofcourse bigger than 2mb....alteast no matter how brainless and heartless you are...set the limit to 10mb...even 8mb is still ok... but 2mb ???what's hell kind of internet in TecHnoLoGy university is that???

all i did to counter this situation was after i finished my foundation class...i went to library ..download software ...and it just seems like kind of duty going there everyday...and it happen to be i did it everyday ...

UNTILL ... i realized that...if i continue like this...i'm not only showing that i'm same such dumass and moron like them...but i'm giving up on learning to improve myself...so i figure it out why don't i explore about network....maybe it can help me somehow...atleast help to upgrade my linux software that obviously more than 2mb at my room...

(To Be ConTiNued)

H4ckin9 4 l1f3 ~~

Baru2 nih...ade bape dak Universiti ak ...kantoi wt ape tah...pasal network...kesannye...kne Kick /dismissal ...walopon dak2 tuh...ade yg final year final semester ...iaitu..xsampai pon sebulan lagi untuk graduate.....antara ura2 yg ak dengar....

1. Derang men tunnel...village ke village...speed up network...steal bandwidth...etc...
2.Derang cilok paper final exam....pastu jual...ni ak x confirm...yg ak taw..akak IRC pon kecoh2 bende nih...so kemungkinan besar la bende nih btol...


Pasal cilok paper nih... bende ni mmg wujud kt university nih....even sblom ak msk university nih lagi...so no doubt klo korang tertnya- tnya , bole ke tak bende ni berlaku...tapi aku rasa yg sesiapa yang cilok paper exam ni(tahun2 sebelum nih pon) tak lah tidak bijak...ataupon xpercaya lansung ngn diri bole wat final exam...pasal derang da lepas SPM dengan cemerlangnya ( Da kat University kn.. haaa..itu yg kita xtaw) ,so wat pe nk cilok2 lagi? ...ak juga rase derang ni xde la pokai sangat and nk cari duit makan ngn jual paper nih..

apa yg ak rase...sume nih...lebih kepada challenge ... and knowledge..tapi ak masih lagi rase itu sumua bukan alasan yang baik untuk wat bende tuh. . .tapi jangan lah semata2 wat benda ni untuk kasi orang tahu yang anda mampu buatnya... pasal hacking nih....bnyk dak University ak expert..... tapi it is up to invidual...whether to use it for good reason or via-versa...

haaa...itu sume intro je sbnrnye...best tak? (hak3 ...perasan sendiri!!)..topik yg ak nk cakap ari nih...pasal... kat dunia ni memang camtu...wujud bende bertentangan untuk ape2 pon...

so Sebab tu lah polis itu wujud...pasal orang jahat ada lah polis wujud... member aku cakap..polis tu wujud pasal nak menjaga keamanan ..bukan sebab orang jahat wujud...memang la...keadaan tak aman tu...disebabkan sifat jahat itu wujud lah...cukup lah jika undang2 saja wujud..dan tidak ada polis..di dalam setiap manusia...yang korng perlu ingat.... tiga benda yang akan membuatkan insan bergelar manusia nih patuh akan sesuatu

1. Perasaan Takut
2.Ganjaran terhadap sesuatu
3.Perasaan Hormat

Perasaan takut..kalau tiada hukuman terhadap larangan...lebih banyak jenayah akan berlaku...sama lah orang takut membuat sesuatu kejahatan pasal sedar akan dibalas kelak .

Ganjaran...setiap benda kita mahukan ganjaran...untuk menjadi sebab kita berusaha kearah nya...tapi jangan lah sampai terlibat dengan penipuan...

Hormat...adalah satu benda yang sangt unik ... kerana dengan menghormati Allah ataupon seseorang lain...manusia tidak akan menghindari kejahatan tanpa sebab takut akan dosa/punishment ... atapon sebabkan inginkan ganjaran..hanya lak semata-mate kerana hormat...dan bersyukur akan nikmat yg ada disekeliling ...mampu kah kita mencapai tahap ini?

bak kata Karam Sigh Walia.

::..tepuk dada tanya selera, tepuk perut. .tnyalah nasi dah masak ke belum::

you want to screw my MyBank2U??..WTF..hak3..

on Monday, May 11, 2009



First of all...i don't even have myBank account...hak3...this email really such funny..

Lets see....how he/she's screwing people around....


First of all....we want to know...how this a$$H0(3 do this...to send an email using fake email address isn't difficult...there are plenty ways though...easiest is just by doing

Form MAsterGuru Post -->
> telnet mail.company.com 25

Telnet is the application we are going to use but in this case we are connecting to port 25 and not to the normal telnet port of 23. Port 25 is used for SMTP or the protocol used for email. You should get the following response back if you are connecting to an exchange server. 220 mail.company.com Microsoft ESMTP MAIL Service, Version: 6.0.3790.1830 ready at Tue, 19 Feb 2005 14:44:12 -0500 Now you should type the following

> helo company.com


The server should respond that helo back. Next type in the following:

> mail from: theboss@company.com

This tells the server that you want to send email from the bosses account. Next type:


> rcpt to:
friend@company.com

This is your friends email address. And next type:


> data

This sets the system to get ready for you to begin writing your message. Now start typing what you want to say:

> Friend, I am tired of your constant watching of penny arcade video’s and now you are fired.

Once you are done writing your message hit enter, then type a period “.” And then hit enter again. It will store and then save your message sending it to your friend. Now that is what I call funny!

This person also make stupid spelling errors ,where we can easily detect it. Noted that the address also difference with the link given

For website...it is easy to build...you just need to googling around for html howto ..and learn it...or just use webdevelopment tools such as...dreamweaver ...

To save his/her ass... might hosting the website using ghost pc (Botnet) or spoof his/her ip address...

How to defend ?

how eh ?? i also don't know...hahaha ..just don't be such dumAss and moron... if you recieved email such as this..or even phone call...make sure to call the real company mention and confirm about it first....Remember... there is no such thing as free give....atleast in this world....




key to the hell....(ultimated private networking)..

on Wednesday, March 14, 2007
(only adult allowed )(just a joke...(",)

wow,i am a student,in this daily life,as a student who really learn knowledge..i struggle a lot for every single thing that i really like...right now i want to talk about networking...
there a too many ways to encrypt your connection as we also have too many reason to do that..privacy is not crime ,as long as you doesn't break any rules,and doesn't steal anything..
so here i will teach few ways to encrypt your connection,and hope you will only use this for a good reasons....

daMn!!,can you just straight to the Point!!

ok,relax . . .first see this warning..

IF YOU ARE UNIVERSITY STUDENT , DON'T USE THIS UNLESS YOU CAN TAKE RISK BY YOUR OWN , THIS IS BREAKing THE RULES EVEN YOU CAN GIVE ANY GOOD REASON . . .(USE IT IN HOME ,FINE)

First..if you are lazy and you don't have any problem to pay a few amount of money than this is the best for you----> anonymizer

is there any better choice...let go to second choice ...this guide for using tor (ultimated guide)..hm,you can see there how to configure it..but you will get slow connection(sometime too slow) for this..so is there anywhere to speed it up..i will explain how and why...

ONly FoR liNuX onLy,foR WinDows go to heLL,

There are many branches of linux distro...so i decided to only concentrate to two major branches of linux which are Debian branches and ReD HAt branches . . .(why i post this even if just search using google you can get too many result for howto tor?because most of the guide are useless , all are the same)..and too complicated..lets simplify it here...

for debian,you can download tor using official repository . .but for Ret hat ,got to tor website(link above)...download it...
then
(remember Red Hat branches doesn't need to write sudo , only just su - to get super user privilege . .and if file doesn't exist ,create it...)

using terminal

sudo gedit /etc/privoxy/config

add this

forward-socks4a / localhost:9050 .

Don't forget that small '.'

search for

logfile logfile

and

jarfile jarfile

then put # in front of it to disable logging...

save,close..

sudo gedit /etc/tor/torrc

add these in that...t

ReachableDirAddresses *:80
ReachableORAddresses *:443

1 May 2009 ---->abeskn draft

ok actually there are better references if you googling around ..and perhaps...vanilla might help for windows user...erm..example like

: http://blog.banditdefense.com/2009/03/03/howto-anonymous-web-application-hacking/

there are plenty other ways though ..but then to avoid any circumstance from ITMS (erk),maybe ..

that if for me to know...for you to find out

but remember

the quieter you become the more you able to hear

(ps /:NI DRAFT awl taun 2007...skrng?..hehehe)