ascript'/>

Sunday, May 26, 2013

Sleuthkit Exercise – Report

Ok i'm back again for share my report about Sleuthkit Unallocated Extraction & Examination. first about sleuthkit, we must installation sleuthkit, simple installation we can find tutorial from google..in there we can get tutorial about how to steps installation sleuthkit. SleuthKit is a collection of shell program for forensic analysis, SleuthKit,...

Thursday, May 23, 2013

introduction computer forensik

+ What Is Computer Forensic ? Computer forensics is to explain the state of digital artifacts. The term digital artifact can include a computer system, storage media (such as a hard disk or CD-ROM), electronic document (eg an email message or JPEG image) or even a sequence of packets transferred over a computer network. The straightforward explanation can be as clear "what information is here?"...

Monday, May 20, 2013

Hacking DVWA for get Root

ok, now we will try hacking dvwa for get access root os linux..ok lets go to the steps ;) + Create backdoor with weevely open the terminal, and write the command and run virtual box metasploit os we generate the file with the name "weevely.py ok time to open browser and login dvwa, dvwa address "192.168.56.101/dvwa" in here im using security...

Sunday, May 19, 2013

Attack Vactor Scheme involving several hacking techniques, here I use two ways to gain access to the target computer. We will do the buffer overflow hacking technique on BigAnt server, The following is an explanation - Install applications BigAnt server on the komputer target and run the application hacking on the lab - We will make and...

Thursday, April 18, 2013

Try to Expliot Easy RM

After a few days I tried to exploit the easy RM application and having problems,but now I will try to explain how to exploit easy RM application using perl language in Backtrack... Ok, this is step by step.......

Tuesday, April 16, 2013

Okay, now we will learn a little about the direct  returns method, and how to exploit application warftp. lets see, what we need next ? - Backtrack 5 - Metasploid Framework - VirtualBox Windows XP Sp2 - Fuzzer - OllyDbg - WarFTP - If you need a coffe, please make for a more relaxed..;) Ok lets go to the step...

Sunday, April 7, 2013

Advance Information Gathering With MALTEGO

What Is Maltego ?? :) Maltego is a program that can be used to determine the relationship of information between : domains, DNS names, netblocks, ip address, people and many other (appropriate method on the entity...