Jumat, 16 Maret 2012

Macam-Macam Hash

DES(Unix)
Example: IvS7aeT4NzQPM
Used in Linux and other similar OS.
Length: 13 characters.
Description: The first two characters are the salt (random characters; in our example the salt is the string "Iv"Wink, then there follows the actual hash.

Domain Cached Credentials
Example: Admin:b474d48cdfc4974d86ef4d24904cdd91
Used for caching passwords of Windows domain.
Length: 16 bytes.
Algorithm: MD4(MD4(Unicode($pass)).Unicode(strtolower($username)))

MD5(Unix)
Example: $1$12345678$XM4P3PrKBgKNnTaqG9P0T/
Used in Linux and other similar OS.
Length: 34 characters.
Description: The hash begins with the $1$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"Wink, then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 2000 times.


MD5(APR)
Example: $apr1$12345678$auQSX8Mvzt.tdBi4y6Xgj.
Used in Linux and other similar OS.
Length: 37 characters.
Description: The hash begins with the $apr1$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"Wink, then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 2000 times.

MD5(phpBB3)
Example: $H$9123456785DAERgALpsri.D9z3ht120
Used in phpBB 3.x.x.
Length: 34 characters.
Description: The hash begins with the $H$ signature, then there goes one character (most often the number '9'Wink, then there goes the salt (8 random characters; in our example the salt is the string "12345678"Wink, followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 2048 times.

MD5(Wordpress)
Example: $P$B123456780BhGFYSlUqGyE6ErKErL01
Used in Wordpress.
Length: 34 characters.
Description: The hash begins with the $P$ signature, then there goes one character (most often the number 'B'Wink, then there goes the salt (8 random characters; in our example the salt is the string "12345678"Wink, followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 8192 times.

MySQL
Example: 606717496665bcba
Used in the old versions of MySQL.
Length: 8 bytes.
Description: The hash consists of two DWORDs, each not exceeding the value of 0x7fffffff.

MySQL5
Example: *E6CC90B878B948C35E92B003C792C46C58C4AF40
Used in the new versions of MySQL.
Length: 20 bytes.
Algorithm: SHA-1(SHA-1($pass))
Note: The hashes are to be loaded to the program without the asterisk that stands in the beginning of each hash.

RAdmin v2.x
Example: 5e32cceaafed5cc80866737dfb212d7f
Used in the application Remote Administrator v2.x.
Length: 16 bytes.
Algorithm: The password is padded with zeros to the length of 100 bytes, then that entire string is hashed with the MD5 algorithm.

MD5
Example: c4ca4238a0b923820dcc509a6f75849b
Used in phpBB v2.x, Joomla version below 1.0.13 and many other forums and CMS.
Length: 16 bytes.
Algorithm: Same as the md5() function in PHP.

md5($pass.$salt)
Example: 6f04f0d75f6870858bae14ac0b6d9f73:1234
Used in WB News, Joomla version 1.0.13 and higher.
Length: 16 bytes.

md5($salt.$pass)
Example: f190ce9ac8445d249747cab7be43f7d5:12
Used in osCommerce, AEF, Gallery and other CMS.
Length: 16 bytes.

md5(md5($pass))
Example: 28c8edde3d61a0411511d3b1866f0636
Used in e107, DLE, AVE, Diferior, Koobi and other CMS.
Length: 16 bytes.

md5(md5($pass).$salt)
Example: 6011527690eddca23580955c216b1fd2:wQ6
Used in vBulletin, IceBB.
Length: 16 bytes.

md5(md5($salt).md5($pass))
Example: 81f87275dd805aa018df8befe09fe9f8:wH6_S
Used in IPB.
Length: 16 bytes.

md5(md5($salt).$pass)
Example: 816a14db44578f516cbaef25bd8d8296:1234
Used in MyBB.
Length: 16 bytes.

md5($salt.$pass.$salt)
Example: a3bc9e11fddf4fef4deea11e33668eab:1234
Used in TBDev.
Length: 16 bytes.

md5($salt.md5($salt.$pass))
Example: 1d715e52285e5a6b546e442792652c8a:1234
Used in DLP.
Length: 16 bytes.

SHA-1
Example: 356a192b7913b04c54574d18c28d46e6395428ab
Used in many forums and CMS.
Length: 20 bytes.
Algorithm: Same as the sha1() function in PHP.

sha1(strtolower($username).$pass)
Example: Admin:6c7ca345f63f835cb353ff15bd6c5e052ec08e7a
Used in SMF.
Length: 20 bytes.

sha1($salt.sha1($salt.sha1($pass)))
Example: cd37bfbf68d198d11d39a67158c0c9cddf34573b:1234
Used in Woltlab BB.
Length: 20 bytes.


SHA-256(Unix)
Example: $5$12345678$jBWLgeYZbSvREnuBr5s3gp13vqiKSNK1rkTk9zYE1v0
Used in Linux and other similar OS.
Length: 55 characters.
Description: The hash begins with the $5$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"Wink, then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the SHA-256 algorithm 5000 times.

SHA-512(Unix)
Example: $6$12345678$U6Yv5E1lWn6mEESzKen42o6rbEmFNLlq6Ik9X3reMXY3doKEuxrcDohKUx0Oxf44aeTI​xGEjssvtT1aKyZHjs
Used in Linux and other similar OS.
Length: 98 characters.
Description: The hash begins with the $6$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"Wink, then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the SHA-512 algorithm 5000 times.

====================================

Windows 2000 / Windows XP / Windows Server 2003 / Windows Vista / Windows Server 2008 / Windows 7
Hash type: NTLM
Example: 9f4df2fecd29d92e2e1a989541cf1bdf

Mandriva Linux(2010)
Hash type: Blowfish(OpenBSD)

Ubuntu Linux(10.10) / Backtrack(4)
Hash type: SHA-512(Unix)

Debian Linux(5.*)
Hash type: MD5(Unix)

OpenSuSe(11.1)
Hash type: Blowfish(OpenBSD)

RedHat Enterprise Linux(5) / CentOS(5)
Hash type: MD5(Unix)

Fedora(12)
Hash type: SHA-512(Unix)

Solaris(11)
Hash type: SHA-256(Unix)

HP-UX(11i v3)
Hash type: SHA-512(Unix)

HP-UX(старые верси&#1080Wink
Hash type: DES(Unix)

IBM AIX(6.1)
Hash type: SSHA-1
Example: {ssha1}06$JcBuCWY2GaHrLwc0$JXfeozdbk9dAVxj8xpxpqCZT..N

Gentoo Linux(10)
Hash type: MD5(Unix)

Slackware Linux(13)
Hash type: MD5(Unix)

MacOS X(10.4+)
Hash type: Salted SHA-1
Example: 33BA7C74C318F5D3EF40EB25E1C42F312ACF905E20540226 ("33BA7C74" is salt in the hexadecimal format)

MacOS X(<=10.2)
Hash type: DES(Unix)

FreeBSD([0-9])
Hash type: MD5(Unix)

OpenBSD(*)
Hash type: Blowfish(OpenBSD)

NetBSD(*)
Hash type: DES(Unix), MD5(Unix), Blowfish(OpenBSD) or SHA-1(Unix)

Arch Linux(2010)
Hash type: MD5(Unix), SHA-256(Unix) or SHA-512(Unix)

Examples:
DES(Unix): 7rpABVh3LoKjE
MD5(Unix): $1$FSh3ps5T$Etg/3eGiSBqdGahf29lIN1
SHA1(Unix): $sha1$21773$uV7PTeux$I9oHnvwPZHMO0Nq6/WgyGV/tDJIH
Blowfish(OpenBSD): $2a$04$3/vwv4ibdVz2SUG3w.SRwOgI6kk7FUmmCVswZ/KUS9bngvgGEkqNq
SHA-256(Unix): $5$12345678$5B8vYYiY.CVt1RlTTf8KbXBH3hsxY/GNooZaBBGWEc5
SHA-512(Unix): $6$FFH2inEE$bDig7qKFq0m3wZY6BahqWjTzmcFma9rAfPPocCvyXKyGqrErw5s1daWDotarbiUk76Sb​8NO/ZhJ8WzeM6RW.q0

Source : insidepro.com



SOFTWARE BUAT BruteForce Hashnya 

PasswordsPro
- Operating System: Windows NT/2000/XP/2003/Vista/7
- Developer: insidepro.com

SAMInside
- Operating System: Windows NT/2000/XP/2003/Vista/7
- Developer: insidepro.com

Extreme GPU Bruteforcer
- Operating System: Windows NT/2000/XP/2003/Vista/7
- Developer: insidepro.com

World Fastest MD5 cracker BarsWF
- Operating System: Windows NT/2000/XP/2003/Vista/7
- Developer: http://3.14.by/en/md5

hashcat
- Operating System: Linux, Windows XP/Vista/7
- Developer: hashcat.net/hashcat/

oclHashcat
- Operating System: Linux, Windows XP/Vista/7
- Developer: hashcat.net

John the Ripper
- Operating System: Cross-platform
- Developer : openwall.com 


Online Cracking

-MD5

Hashkiller.com
c0llision.net
passcracking.com
tmto.org
md5decrypter.co.uk
md5this.com
bitdelivery.net
crackfor.me
ihteam.net
md5.my-addr.com
md5pass.info
hashcrack.com
generuj.pl
authsecu.com
md5decryption.com
md5decrypter.com
md5-db.de
md5online.net
hash-database.net
web-security-services.com
hash.toolz.in
isc.sans.org
md5-lookup.com
gromweb.com
noisette.ch
crackfoo.nicenamecrew.com
shell-storm.org
askcheck.com
hashcracking.com
md5.net
web-max.ca
xanadrel.99k.org
md5.com.cn
hash-cracker.com
bigtrapeze.com
cloudcracker.net
gat3way.eu
vulnlabs.org
tobtu.com
cmd5hash.com
onlinehashcrack.com
freerainbowtables.com
xdecrypt.com
hax0r.in
crackstation.net
md5-decrypter.com
netmd5crack.com
xmd5.org

SHA1:

md5decrypter.co.uk
hash.toolz.in
isc.sans.org
stringfunction.com
md5-lookup.com
crackfoo.nicenamecrew.com
askcheck.com
vulnlabs.org
xdecrypt.com


ICQ:

hashkiller.com (405-701-776) <- md5

LM:

lmcrack.com
crackfoo.nicenamecrew.com
bitdelivery.net

NTLM:

md5decrypter.co.uk
bitdelivery.net
traaad.org

IRC:

c0llision.net (#md5crack channel on ix.dal.net)

Multi:

hashkiller.com
md5hashcracker.appspot.com
hashchecker.de
crackfor.me
kalkulators.org
hash-decrypt.com 


Sumber HN

Read more »

I-47 v1.1 Shell released

Hallo bertemu dengan saya lagi 
Ok saya dapat shell dari teman saya yang lumayan fiturnya
The new version of I-47 shell contains 

- improved database functions
- improved symlinking
- new look 
- Removed bugs

Many more..(Lihat gambar)

Read more »

Minggu, 11 Maret 2012

Mempercepat Koneksi Di Linux

1. Buka Terminal : Application -> Accessories -> Terminal
2. Buka file sysclt.conf dengan cara ketik :


sudo gedit /etc/sysctl.conf 


3. Copy teks dibawah ini lalu pastekan pada baris terakhir sysctl.conf


# increase TCP max buffer size setable using setsockopt()
net.core.rmem_max = 16777216
net.core.wmem_max = 16777216
# increase Linux autotuning TCP buffer limits
# min, default, and max number of bytes to use
# set max to at least 4MB, or higher if you use very high BDP paths
net.ipv4.tcp_rmem = 4096 87380 16777216
net.ipv4.tcp_wmem = 4096 65536 16777216
# don't cache ssthresh from previous connection
net.ipv4.tcp_no_metrics_save = 1
net.ipv4.tcp_moderate_rcvbuf = 1
# recommended to increase this for 1000 BT or higher
net.core.netdev_max_backlog = 2500
# for 10 GigE, use this, uncomment below
# net.core.netdev_max_backlog = 30000
# Turn off timestamps if you're on a gigabit or very busy network
# Having it off is one less thing the IP stack needs to work on
#net.ipv4.tcp_timestamps = 0
# disable tcp selective acknowledgements.
net.ipv4.tcp_sack = 0
#enable window scaling
net.ipv4.tcp_window_scaling = 1





4. Simpan hasil editan diatas dengan cara tekan keyboard Ctrl + S, kemudian tekan Alt + F4 untuk keluar
5. Aktifkan settingan diatas dengan cara ketik :


sudo sysctl -p

Test kecepatan koneksi internet Anda via http://www.speedtest.net
Untuk menonaktifkan settingan diatas, hapus semua baris seperti pada langkah ke 2 di sysctl.conf, ketik :


sudo gedit /etc/sysctl.conf

Sumber AYO BELAJAR LINUX

Read more »

Selasa, 06 Maret 2012

Scan Backdoor di website mu!!!

kali ini ane mau share tentang script php yang mungkin berguna buat pertahanan situs kita ...
  script ini akan menscan file2 yang ada di root yang di curigai atau berpotensi sebagai shell
  PHP Code:
===========================================================
#!/usr/bin/php
/*
*    this script find some shell like
*    c99, c100, r57, erne, Safe_Over
*    and try to find some of unknow shell searching specific words this can be
*    not safe
*
*      how to use:
*      the script don't need no-one of these parameter thay are facoltative
*      -e Y/N enable disable eusristic mode (default is enable)
*      -p a number 1-100 , it's the percentual of word that must be find into the file to warm the euristic mode
*      -f check a single file
*    -d check a single dir (normaly the program is recursive chek ALL file )
*        powered by Dr. nefasto
*/
$euristic__ = array("fopen", "file(", "file_get_contents", "sql", "opendir", "perms", 

"port", "eval", "system", "exec", "rename", "copy", "delete", "hack", "(\$_", "phpinfo", 

"uname", "glob", "is_writable", "is_readable", "get_magic_quotes_gpc()", 

"move_uploaded_file", "\$dir", "& 00", "get");
$word__ = array(
            "c99" => array("c999shexit();", "setcookie(\"c999sh_surl\");", "c999_buff_prepare();"),
            "c100" => array("\$back_connect_c=\"f0VMRgEBAQA", "function myshellexec(\$command) {", "tEY87ExcilDfgAMhwqM74s6o"),
            "r57" => array("if(strpos(ex(\"echo abcr57\"),\"r57\")!=3)", "function ex(\$cfe)", "\$port_bind_bd_c=\"I2luY2x1ZGUg"),
            "erne"=> array("function unix2DosTime(\$unixtime = 0)", "eh(\$errno, \$er", "\$mtime=@date(\"Y-m-d H:i:s\",@filemti"),
            "Safe_Over" => array("function walkArray(\$array){", "function printpagelink(\$a, \$b, \$link = \"\")", "if (\$cmd != \"downl\")"),
            "cmd_asp" => array("  ' -- Read th", "ll oFileSys.D", "Author: blackc0de crew")
        );
//the script work
$euristic_active = true;
$euristic_sens = 40;
for ($i = 1; $i < $argc; $i++)
{
    if ($argv[$i] == "-h")
        help($argv[0]);
    elseif($argv[$i] == "-e")
    {
        if ($argv[$i+1] == "Y") $euristic_active = true;
        if ($argv[$i+1] == "N") $euristic_active = false;
    }
    elseif($argv[$i] == "-p")
        $euristic_sens = $argv[$i+1];
    elseif($argv[$i] == "-d")
    {
        dir_scan($argv[$i+1]);    
        exit;
    }
    elseif($argv[$i] == "-f")
    {
        a($argv[$i+1]);    
        exit;
    }
}
dir_scan(".");
function dir_scan($name)
{
    if (!is_dir($name))
        echo "$name is not a dir\n"; 
    if ($o = @opendir($name))
    {
        while(false !== ($file = readdir($o)))
        {
            if ($file == '.' or $file == '..' or $file == basename(__file__)){    continue;}
            else if (is_dir($name."/".$file)){dir_scan($name."/".$file);}
            else
                a($name."/".$file);
        }
        closedir($o);
    }
    else
        echo "i can't open $name dir\n";
}
function a($file)
{
    global $euristic_active;
    global $euristic_sens;
    if ($l = file_get_contents($file))
    {
        if ( $shell = check($l))
        {
            echo "[DANGER] word_list > ".$file."\tprobably ".$shell." shell\n";
        } 
        else if ($euristic_active)
            if ($t = check_euristic($l)  and $t > $euristic_sens)
            {    
                echo "[_ALERT] euristic $t%> ".$file."\tprobably is a shell\n";
            }
    }
    else
    {
        echo "i can't open $file file\n";
    }
}
function check($string)
{
    $check = 0;
    global $word__;
    foreach($word__ as $shell => $code)
        foreach($code as $microcode)
            if (stripos($string, $microcode) !== false)
            {
                $check ++;
                if ($check == 3) return $shell;
            }
    return false;
}
function check_euristic($string)
{
    global $euristic__;
    $check = 0;
    foreach($euristic__ as $code)
        if (stripos($string, $code) !== false)
            $check++;
    return intval(($check * 100) / count($euristic__));
}
function help($me)
{
    echo    "Blackc0de shell scanner\n".
        "$me {-e [euristic method default = Y] Y/N  -p [[0-100] euristic sensibility fewer == most feeble ]  [-d [directory] / -f [file] ]}\n".
        "exemple: $me -e N -d /tmp\n"
        ;
    exit;
}
?>
===========================================================


simpan dengan nama scan.php atau terserah ente dah
panggil url nah ... http://situsanda/scan.php
dan tinggal liat hasilnyah....

Credit: Manusia Biasa Team

Read more »

Friends Blog