Friday, December 15, 2006

Spoofed DoS Attack!!!

before attack scenario

After attack scenario

-> is a process whereby one host sends a flood network traffic to another host. By flooding the network would caused "denial of service" or DoS attacks. the target host is unable to handle heavy load of data that is received. Due to this implication, the whole bandwidth for target host is eaten by the sender host. i have tried it using free source software called xxpoof. if you wish to try it, responsibility is under you and implication is effect immediately. for downloading, just click into this link

Wednesday, December 13, 2006

What is VNC?

VNC stands for Virtual Network Computing. It is remote control software which allows you to view and interact with one computer (the "server") using a simple program (the "viewer") on another computer anywhere on the Internet. The two computers don't even have to be the same type, so for example you can use VNC to view an office Linux machine on your Windows PC at home. VNC is freely and publicly available and is in widespread active use by millions throughout industry, academia and privately.
what is putty?
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator.

Create VPN using WindowsXP

WindowsXP VPN Server

The following page details the steps necessary to create a WindowsXP VPN Server


1. Go to Start / Settings / Network Connections
2. Start the New Connection Wizard

3. Click on the Next button
4. Select Set up advanced connection

5. Click on the Next button.
6. Click on Accept incoming connections

7. Click on the Next button
8. At the LPT1 page, skip it and just click on the Next button.

9. Click on Allow virtual private connection

10. Click on the Next button
11. Add user accounts that you want to be able to connect to your WindowsXP computer.

12. Click on the Next button.
13. Highlight Internet Protocol (TCP/IP) and click on Properties

14. Determine how you want the remote computers to get their IP address

19. The above example will assign IP addresses to each client. Make sure the IP scheme is the same as on your server.

20. Submitted by Andy Bloss
If the VPN server is behind a router, Port Mapping will need to be done on the router. Standard port usage is 1723 for PPTP. You might also need to configure your router for PPTP Passthrough. Port usage for IPSec is 500, 50-51. These ports will have to be forwarded to the VPN server's IP


Monday, December 11, 2006

..::: my workplace :::..

everyday working and working!!. I really need vacation..... ;-)

Saturday, December 09, 2006

romantic song from indon band - Ungu - Tercipta untukku

Analyze your network security using Nmap-tool

Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source (license).

Nmap is ...

  • Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP & UDP), OS detection, version detection, ping sweeps, and more. See the documentation page.
  • Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines.
  • Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more.
  • Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap -v -A targethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Binaries are available for those who do not wish to compile Nmap from source.
  • Free: The primary goals of the Nmap Project is to help make the Internet a little more secure and to provide administrators/auditors/hackers with an advanced tool for exploring their networks. Nmap is available for free download, and also comes with full source code that you may modify and redistribute under the terms of the license.
  • Well Documented: Significant effort has been put into comprehensive and up-to-date man pages, whitepapers, and tutorials. Find them in multiple languages here.
  • Supported: While Nmap comes with no warranty, it is well supported by the community and we appreciate bug reports and patches. If you encounter a problem, please follow these instructions.
  • Acclaimed: Nmap has won numerous awards, including "Information Security Product of the Year" by Linux Journal, Info World and Codetalker Digest. It has been featured in hundreds of magazine articles, several movies, dozens of books, and one comic book series. Visit the press page for further details.
  • Popular: Thousands of people download Nmap every day, and it is included with many operating systems (Redhat Linux, Debian Linux, Gentoo, FreeBSD, OpenBSD, etc). It is among the top ten (out of 30,000) programs at the Freshmeat.Net repository. This is important because it lends Nmap its vibrant development and user support communities.

Wednesday, November 15, 2006

Nocat guidelines

im still doing my research on this... until now i have successfully setuped gateway for Nocat, but no yet settle with authentication maybe around 90% to finish it. This is due to time constraint and routine jobs that i have to do everyday. recently, my company is having ISO 9002 :2000 auditing and alot of management issue such as filing, memos, updating inventory records. hopefully that this coming month, i could finish my project and upload my guidelines A.S.A.P.

just click it!!!

Sunday, November 12, 2006

Make your own home-based server

hi guys,
i'm back. my topic today is to share with you my experience on installing home-based server for my company. actually, company that i worked is just education-based company where medium sized server is required with a very low cost. First thing i did, was OS (FC 5- according to me) should be installed and port for telnet, ftp should be opened for you do remote access. Once you have done, connect your server to internet. During this phase you supposed to configure the IP address, DNS and netmask properly. Then, adjust your modem+router (in my case) in VIRTUAL SERVER section. type IP address of your server into it. This is to allow certain IP address can be accessed from outside. Once you finished, you have to know your Public IP address, this is to make links directly into your website.... and it's done.... try it! happy testing

Saturday, November 11, 2006

How you want to recover when you forgot administration password?

some people when they forgot admin password, it's like "end of the world". However, there is way to cater the problem. since i worked as manager cam network admin and system admin, i had faced this kind of problem and i did some research on it. It come across when i searched over (the best search engine!!). the link is as follows

this website provides to you step-by-step on how to break through your system and demolish the existing password. the author proposed 3rd party tools in which it is free to use.

Here are 5 of these free tools:
Windows Password recovery - Can retrieve forgotten admin and users' passwords in minutes. Safest possible option, does not write anything to hard drive.
Petter Nordahl-Hagen's Offline NT Password & Registry Editor (recommended)- A great boot CD/Floppy that can reset the local administrator's password.
Openwall's John the Ripper - Good boot floppy with cracking capabilities.
EBCD – Emergency Boot CD - Bootable CD, intended for system recovery in the case of software or hardware faults.
Austrumi - Bootable CD for recovering passwords and other cool tools

I have tried using all the tools and successfully hacked my friend's pc using these tools...hehheh

best of luck guys..

Friday, November 10, 2006

PHP - HyperText Preprocessor

PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. It can be used normally for online system that used browser for run it. i have been involved in this field since 2000, during my study in university. what makes this programming language popular among people are the ease of use and no licensing required in which under GnU privacy agreement. For me, i get used of special software (PHPTriad) in which consists of PHP4+MySQL+Apache. i think until now it still free to download and use it.


Clustering project using ParallelKnoppix


since last december 2005, i did my research on clustering project. alot of journals i have read and did several testing.... (eg; knoppixcluster, rocks, parallelknoppix, tablix, morphix etc). finally i found the solution by using parallelknoppix . it is a live cd format and can only run on cd player or diskless. however, when there is a will, there is a way, i found a solution where the system can install into hd.....and recently i've successfully clustered 10 PCs and goes fine until today. I did testing on several software(such as, povray-3.5 for-image rendering)by installing on this clustered PCs. Guidelines will be upload later...

Linux or windows

from my point of view, both operating system do have pros and cons.. actually it depends on us in which is preferable for you all. since i have used both operating system(WXP and Linux), WXP is more on user friendly system where user can play around the system and not more than that.. Linux system is for those who what to learn more such as proxy or some security features to test without any license in which under GNU privacy agreement. In Linux ... i get use with FC 5 and mandrake... until now i have tried FC 5 for installing proxies(using squids and webmin (as the frontend) for my company..

Thursday, November 09, 2006

my next project -->setup network authentication

this is my next project. right now i have tried some "open source" software for it so called "nocat" or for those who need to know abt it, just logon to they provided to you all user guide from downloading --> installation. For sure, linux is the platform for the system....

Setup a proxy server

hi all,

setup for a proxy server is not really tough!!. what you need is just your effort in determining the right way based on your experience. Basically, you need to have 2 network card+ 1 pc(i think enough la). install linux fedora core 5 into it....

Thursday, April 27, 2006

SMS gateway

hi!, dude...

long time to go... recently i have successfully setup a sms gateway for my company. even though, it is simple, but reflect me overall. for those who interested to know abt it, don't hesitate to ask just email to me


selamat hari raya aidilfitri 2007