Création des Logiciels de gestion d'Entreprise, Création et référencement des sites web, Réseaux et Maintenance, Conception
Création des Logiciels de gestion d'Entreprise, Création et référencement des sites web, Réseaux et Maintenance, Conception
Many people think that Javascript is language that allows you to just make the web alone. In fact, JavaScript function is also a full language of sensation. JavaScript has many secrets that will only be revealed to them that have high curiosity.
Javascript turned out to also be used to detect a fake web page or a phishing site. This is important, especially if you're going to do a transaction with a secret code, such as banking accounts, emails, facebook and others.
The following javascript code, will notify you if the page you're visiting is a fake page. How, paste the following code into your browser address bar when visiting a web. Pop-up screen will appear telling you whether the website is genuine or not.
Here is the Javascript code:
javascript:alert("The actual URL is:\t\t" + location.protocol + "//" + location.hostname + "/" + "\nThe address URL is:\t\t" + location.href + "\n" + "\nIf the server names do not match, this may be a spoof.");
WS FTP is an FTP client program that is quite familiar with the function to upload and download files through a FTP Protocol (File Transfer Protocol). Beside WS_fTP, there are also some software that work with the same function such as CuteFTP, TurboFTP and others.
As a Client program that allows a client computer to upload files to the server, WS_FTP on the complete protection system with username and password. So, ftp server protected from unresponsible user.
One WS_FTP weakness is save account user all with username ang password in ws_ftp.ini file. Unfortunately, this file can be accessed easily using notepad. However, the password encrypt (hide in the character code).
See the following code found in the ws_ftp.ini like : PWD=VE0B0670A04297D09698219544F7A4E52709272946C6C6638
The code after PWD = is the account password that store in a file ws_ftp.ini. To display the original password, here's the method :
1. Search ws_ftp.ini file with Google Sarch Engine by typing : filetype:ini WS_FTP PWD (search for the server that stores files ws_ftp.ini) or can be "index of /" "ws_ftp.ini" and some of the other Google Hack as many spread on the internet. Or have direct access to the computer server physical to steal ws_ftp.ini file.
2. Visit decipherskull. Copy the code PWD= in the file ws_ftp.ini and paste in the box dencrypted. Do not forget, copy from PWD = until the end of the code. Press the Dechiper button on the site. The password will be visible.
Usually, ws_ftp file, including direct account with the hidden username, to be easy to get.
Computers are one of the media to explore cyberspace. In the computer are some informations that we can learn, especially recovering confidential information stored on the computer. One of them is a username and password to run commands on a web. Typically, the important information is stored in a file named Cookie.
A cookie is a file containing information that recorded by a browser and stored in a special directory in a computer. Cookies function is to recognize users when visit a web. When visiting a home page, the site will use the Cookie information to run a command.
The amount of information stored in these cookies so many and varied, including user username and password.
Stealing a account in this tutorial will use a tool called the Multi Password Recovery 1.1.5 by Alexandr Demchenko. This utility is usually used to recover lost or forgotten passwords to try by reading informations in the Cookie file. Although its function is very good, but we can use it to unpack the files come in to find your cookie stored.
The accounts that can be stolen by Multi Password Recovery are FTP account, Email Client, Instant Messengers and Browsers. In some trials, Mozilla Firefox could escape. However, there are other ways of dismantling the information Cookies Mozilla Firefox.
The steps are:
1. Download Multi Password Recovery 1.1.5 Portable edition here
2. Extract Rar files to a folder and then We go into the folder where the Multi Password Recovery extract results are stored
3. Run MPR.exe file with double click.
Multi Password Recovery window displays information such as Windows Explorer. Click the Password Audit to display weak accounts. In the Browser folder, MPR will display passwords from the Browser notes.
To Anticipate
To anticipate the passwords stolen through the techniques above, clean cookies exploration on the internet by the following steps:
In Mozilla Firefox select Tools menu> Clear Private Data. Check the "Cookies" and press the "Clear Private Data Now".
In Windows Explorer (Internet Explorer version 7), select the Tools menu>> Delete Browsing History, then click on the "Delete Cookies".
At the Opera Browser, select Tools>> Delete Private Data and click the "Delete" Button
In Google Chrome Browser, select Tools / Settings>> Clear Browsing Data and click on the "Clear Browsing Data"