Friday, 18 September 2015

Oleh-oleh ketika scanning nmap windows 7 sendiri

Skipping SYN Stealth Scan against 192.168.1.17 because Windows does not support scanning your own machine (localhost) this way.

Nmap scan report for 192.168.1.17

Host is up.

PORT      STATE   SERVICE

7/tcp     unknown echo

9/tcp     unknown discard

13/tcp    unknown daytime

21/tcp    unknown ftp

22/tcp    unknown ssh

23/tcp    unknown telnet

25/tcp    unknown smtp

26/tcp    unknown rsftp

37/tcp    unknown time

53/tcp    unknown domain

79/tcp    unknown finger

80/tcp    unknown http

81/tcp    unknown hosts2-ns

88/tcp    unknown kerberos-sec

106/tcp   unknown pop3pw

110/tcp   unknown pop3

111/tcp   unknown rpcbind

113/tcp   unknown ident

119/tcp   unknown nntp

135/tcp   unknown msrpc

139/tcp   unknown netbios-ssn

143/tcp   unknown imap

144/tcp   unknown news

179/tcp   unknown bgp

199/tcp   unknown smux

389/tcp   unknown ldap

427/tcp   unknown svrloc

443/tcp   unknown https

444/tcp   unknown snpp

445/tcp   unknown microsoft-ds

465/tcp   unknown smtps

513/tcp   unknown login

514/tcp   unknown shell

515/tcp   unknown printer

543/tcp   unknown klogin

544/tcp   unknown kshell

548/tcp   unknown afp

554/tcp   unknown rtsp

587/tcp   unknown submission

631/tcp   unknown ipp

646/tcp   unknown ldp

873/tcp   unknown rsync

990/tcp   unknown ftps

993/tcp   unknown imaps

995/tcp   unknown pop3s

1025/tcp  unknown NFS-or-IIS

1026/tcp  unknown LSA-or-nterm

1027/tcp  unknown IIS

1028/tcp  unknown unknown

1029/tcp  unknown ms-lsa

1110/tcp  unknown nfsd-status

1433/tcp  unknown ms-sql-s

1720/tcp  unknown h323q931

1723/tcp  unknown pptp

1755/tcp  unknown wms

1900/tcp  unknown upnp

2000/tcp  unknown cisco-sccp

2001/tcp  unknown dc

2049/tcp  unknown nfs

2121/tcp  unknown ccproxy-ftp

2717/tcp  unknown pn-requester

3000/tcp  unknown ppp

3128/tcp  unknown squid-http

3306/tcp  unknown mysql

3389/tcp  unknown ms-wbt-server

3986/tcp  unknown mapper-ws_ethd

4899/tcp  unknown radmin

5000/tcp  unknown upnp

5009/tcp  unknown airport-admin

5051/tcp  unknown ida-agent

5060/tcp  unknown sip

5101/tcp  unknown admdog

5190/tcp  unknown aol

5357/tcp  unknown wsdapi

5432/tcp  unknown postgresql

5631/tcp  unknown pcanywheredata

5666/tcp  unknown nrpe

5800/tcp  unknown vnc-http

5900/tcp  unknown vnc

6000/tcp  unknown X11

6001/tcp  unknown X11:1

6646/tcp  unknown unknown

7070/tcp  unknown realserver

8000/tcp  unknown http-alt

8008/tcp  unknown http

8009/tcp  unknown ajp13

8080/tcp  unknown http-proxy

8081/tcp  unknown blackice-icecap

8443/tcp  unknown https-alt

8888/tcp  unknown sun-answerbook

9100/tcp  unknown jetdirect

9999/tcp  unknown abyss

10000/tcp unknown snet-sensor-mgmt

32768/tcp unknown filenet-tms

49152/tcp unknown unknown

49153/tcp unknown unknown

49154/tcp unknown unknown

49155/tcp unknown unknown

49156/tcp unknown unknown

49157/tcp unknown unknown



Nmap done: 256 IP addresses (5 hosts up) scanned in 40.17 seconds
Android to android vpn
buy apps or software that verified like from google play.

north korea
indonesia
malaysia
japan
united states
Britney Spears
Barrack obama
Arab Emirates
Joko Widodo
Mochatir Mohammad
Whitney Houston
Israel
Anggara Susetyaningprang
Taufan Prakasa
Pizza Hut
Cambodia
Taiwan
Sleeping
Taking Bath
Finlandia
https://en.wikipedia.org/wiki/AFRINIC
 


African Network Information Center (AFRINIC)

AFRINIC has been allocated the IPv4 address blocks 41.0.0.0/8, 102.0.0.0/8, 105.0.0.0/8 and 197.0.0.0/8 and IPv6 blocks 2c00::/12 and 2001:4200::/23. AFRINIC also administers the address space for 196.0.0.0/8 and 154.0.0.0/8.[3]

 

Tuesday, 15 September 2015

$ who
pi@raspberrypi ~ $ who
pi       pts/0        2015-09-15 02:46 (192.168.1.13)

Information: List username(s) that logged into rpi.

$ date
 pi@raspberrypi ~ $ date
Tue Sep 15 04:59:33 UTC 2015

Information:

$ who am i
pi@raspberrypi ~ $ who am i
pi       pts/0        2015-09-15 02:46 (192.168.1.13)

Information:

$ date; who
pi@raspberrypi ~ $ date; who
Tue Sep 15 05:02:55 UTC 2015
pi       pts/0        2015-09-15 02:46 (192.168.1.13)

Information:
- date executed first; this is a compound (composed of two or more parts) command.
- dont forget the semi-colon to seperate commands

$ uptime
pi@raspberrypi ~ $ uptime
 05:32:33 up 13:49,  1 user,  load average: 0.00, 0.01, 0.05

Information:
- Show/tell how long the system has been up. In this example: 5 hours, 32 minutes, 33 seconds.

$ man

Information: command should you use to access the online help for a utility. Commands = utility.

$ ls

Example:
pi@raspberrypi ~ $ ls
add.sh     Desktop        helloworld    python_games    test.py
aloha.txt  Documents      helloworld.c  python.py.save  test.pyc
array.c    helloserver.c  learnc        Scratch         world.sh


$ ls -a

Information: list files and directories include hidden file.

Example:
pi@raspberrypi ~ $ ls -a
.              .bashrc          .gvfs          python_games    .vnc
..             .cache           helloserver.c  python.py.save  world.sh
add.sh         .config          helloworld     .scratch        .Xauthority
aloha.txt      .dbus            helloworld.c   Scratch         .xsession-errors
array.c        Desktop          .idlerc        test.py
.asoundrc      Documents        learnc         test.pyc
.bash_history  .fontconfig      .local         .themes
.bash_logout   .gstreamer-0.10  .profile       .thumbnails


$ ls -F
pi@raspberrypi ~ $ ls -F
add.sh*    Desktop/       helloworld*    python_games/   test.py*
aloha.txt  Documents/     helloworld.c*  python.py.save  test.pyc
array.c    helloserver.c  learnc/        Scratch/        world.sh*

$ ls -1

Information: 
Example:
pi@raspberrypi ~ $ ls -1
add.sh
aloha.txt
array.c
Desktop
Documents
helloserver.c
helloworld
helloworld.c
learnc
python_games
python.py.save
Scratch
test.py
test.pyc
world.sh

$ cat
To view the content of a file
Example:
pi@raspberrypi ~ $ cat helloworld.c
#include <stdio.h>

int main()
{
        printf("Hello, World!");
        return 0;
}

$ cat -n 
$ cat -n helloworld.c

To view the content of a file with numbers the output lines
Example:
pi@raspberrypi ~ $ cat -n helloworld.c
     1  #include <stdio.h>
     2
     3  int main()
     4  {
     5          printf("Hello, World!");
     6          return 0;
     7  }

$

Monday, 14 September 2015

execute
1.
2.

Creating a script:
1. Sha bang followed location of the shell interpreter location
2.
3. Name the script with like example.sh


Finding the location:
1. ps | grep $$
2. which bash