Thank you for taking the time to visit my personal website. Hopefully the information I have presented on this site can be useful and there is knowledge.

Sunday, July 10, 2011

Flash disk tiny weapon of hackers

Post that I made this time to discuss about using flash as a weapon / media hacking and its utilization as security tools. Maybe you can easily read the things pertaining to this article on print media in the print media but usually the discussion is merely sundries and a short course, very rare to find discussions that led to the underground world, our world, world thinkers outside the limit!

Flash as we know it is a portable device that is often used as a medium for data storage, data either office work, college or important data lainnya.karena basic concept is the creation of flash data storage medium that is portable and easy to carry anywhere, many flash flash owners who considered useful only in accordance with the basic concepts of creation. but with a little creativity you can make your flash as a media assistant in the learning process and the action of hacking and application security / security during the move on your computer you are using.

As a first step before entering the discussion further, I'll describe what I do on the flash that I use. flash me here just as a comparison because of course you have other ideas that you wish to apply. I have installed on the flash 2 (two) PortableApps portable application that is made from PortableApps.com and LIBERKEY LiberKey.com. The second application was then I for use in accordance with needs. Its use would I lay out in more detail as below:

PORTABELAPPS
You've definitely been working on your computer through windows explorer because in this mode you are free to set the directory in the directory and move more efficiently because Windows Explorer displays the folder directory tree. Well, PortableApps has a function similar to Windows Explorer and is very similar to my documents on windows operating system. You even have a separate start menu to access your flasdisk and run programs that are used as the start menu on windows. With this ability, then you can organize files on your flash with a neat because it has been available by default several directories such as Documents, music, video, picture, explorer (like windows explorer) is available even for the backup directory, menu option, help and search functions. Some software is included by default include:

1. Mozilla Firefox browser portable mode
2. Mozilla thunderbirth
3. CCleaner (eraser tracks and junk files or temporary files)
4. ClamWin Portable (antivirus)
5. KeePass Portable
6. open office
7. some multimedia applications, etc..

Based on its characteristics, PortableApps should be used as management tools and editor for your flash file tuga-your task.

LIBERKEY

The core of this tutorial is at Liberkey applications. I say this because if deifying a live disc to a hacker or network administrators such as auditors, whax, slackware or backtrack (backtrack 2 + jasakom) then said to be biased liberkey an operating system that runs through the flash media (can also be regarded as an operating system Virtual although really just a collection of portable software). By default liberkey bias includes several applications that are used for hacking activity in addition to standard applications lain.beberapa biased tools in use for hacking defense and security, among others, are as follows:

1. Recuva, reversing the application of data has been erased.
2. Search my files, the bias you use to find the infected files or files Firus principal of a virus, or confidential files on a computer.
3. Picpick, application screen capture (image capture)
4. Firefox portable, secure browser in because you avoid the rogue application on most browsers cafe.
5. Runscanner, anti-virus and anti spyware
6. Truecrypt, pengenkripsi disk drives
7. HashMyFile, the software gauges the value of hash
8. UltraShredder, securely delete files so that no bias is returned in full
9. Networks, data analysis applications on the Internet connection
10. PE network configurator, an application for network configuration
11. Yale, measuring bandwidth network adapter
12. Team Viewer, remote desktop applications
13. SoftPerfect Network Scanner, network scanner application
14. Unlocker, eraser tools files or folders are not removed normally bias.

Liberkey still have many tools that are not in because of the writer explained above is quite a lot to be explained, but will make this tutorial to be inefficient and it looks like your feed so it is better to leave it on your own creativity masing.ok

In addition to the above portable tools, of course there are drawbacks you may feel because of your favorite tools are not included. For that you can also fill your flash with other software such as Cain Able, netcut, angry ip scanner, super scan, notepad + +, anti deepfreezedll.

APPLICATION
In applying this section, we will create a scenario. We assume misalanya you enter in a cafe that applying strict retriksi. RUN in the menu off, Commandprompt in tripe, even in the grimy even notepad. Obviously you will feel your comfort is disturbed due retriksi (classic problem, the security is inversely proportional to convenience), so that you can not do the hacking activity that you have learned at home. Do not worry about things like this just make it worth your motivation and challenge (without hacking challenge / problem = stale) and do not forget that you have brought your tiny weapon (flash).

Some little things you can do for example, if you want to use the diretriksi command prompt, you can make it with a text editor notepad. Open notepad and type "command.com" without the quotes and save with extension. "Bat" on your desktop, your survivor bias using the command prompt. Notepad in retriksi? Do not worry, Always remember to bring an empty notepad file on your flash or you are biased to download a file that does not have default software for opening. Use open with notepad and delete the notepad page and then type the code to make commandprompt. Congratulations you succeed.

Network is slow because of bandwidth which is divided on all computers in the network? Use Netcut that you bring to your small arms. Run netcut and other computer connections dijaringan.selamat cut your bandwidth increases

Administrators to capture passwords or user FB cafe? Run CAIN ABEL on the mode of ARP poisoning and please wait for your victim.
Want to install a keylogger or something, run anti deepfreeze. Congratulations your keylogger has been running without having to worry about that you disable deepfreeze

You can still do many other things according to your needs. Until now you probably already get an idea of ​​how to manage your flash into a weapon when you're on a network. Sorry if this tutorial is far from perfect and has many shortcomings due to the writers still a newbie level, just the motivation to learn which makes the writer ventured to appear presented to friends who are great in this beloved community.

HACKING IS NOT a theory. BRAVO jasakom

visit the official website http://www.jasakom.com/content.php?597-Flashdisk-senjata-mungil-para-Hacker

No comments:

Post a Comment