Senin, 21 September 2009

How to bypass bios Passwords

bios Passwords
BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS

DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.


Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS
Use password cracking software
Reset the CMOS using the jumpers or solder beads.
Removing the CMOS battery for at least 10 minutes
Overloading the keyboard buffer

Using a professional service
Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.

Backdoor passwords
Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

Award BIOS backdoor passwords:
ALFAROME ALLy aLLy aLLY ALLY aPAf _award AWARD_SW AWARD?SW AWARD SW AWARD PW AWKWARD awkward BIOSTAR CONCAT CONDO Condo d8on djonet HLT J64 J256 J262 j332 j322 KDD Lkwpeter LKWPETER PINT pint SER SKY_FOX SYXZ syxz shift + syxz TTPTHA ZAAADA ZBAAACA ZJAAADC 01322222
589589 589721 595595 598598

AMI BIOS backdoor passwords:

AMI AAAMMMIII BIOS PASSWORD HEWITT RAND AMI?SW AMI_SW LKWPETER A.M.I. CONDO

PHOENIX BIOS backdoor passwords:

phoenix, PHOENIX, CMOS, BIOS

MISC. COMMON PASSWORDS

ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj

OTHER BIOS PASSWORDS BY MANUFACTURER
Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba

TOSHIBA BIOS
Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot

IBM APTIVA BIOS
Press both mouse buttons repeatedly during the boot

Password cracking software

The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos password recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings
Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.


Removing the CMOS Battery
The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.


Overloading the KeyBoard Buffer
On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.


Jumping the Solder Beads on the CMOS
It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.


Using a professional service
If the manufacturer of the laptop or desktop PC can't or won't reset the BIOS password, you still have the option of using a professional service. Password Crackers, Inc., offers a variety of services for desktop and laptop computers for between $100 and $400. For most of these services, you'll need to provide some type of legitimate proof of ownership. This may be difficult if you've acquired the computer second hand or from an online auction.

Rabu, 16 September 2009

Installing Apache on Windows

ApacheInstalling Apache on Windows, why? Because let's face it Windows is easy, and well Apache sure beats using IIS. This tutorial is meant for the person who would like to set up there own little web server. It's not meant for the IT Person running a fortune 500 company. But hey if you want go ahead.

Instalation:

First thing you need is to download the webserver. Now for windows users your gonna want to go download the .exe . The apache website is www.apache.org Your gonna wanna head to the apache binaries sections for Win32 I believe it is at http://www.apache.org/dist/httpd/binaries/win32/There you will be able to download a version of apache.

Now before you download it you gonna want to make a folder. This folder is where your gonna server your root directory. Now if you don't want to do this it's ok. You can use the default path if you want. Put usually this helps in setting up other things like php, and MySQL. Most people do is they create a folder in the C:\ directory called WWW or somthin. You can name it whatever you want.

Ok so have downloaded the Apache Web Server. Your ready to go with the setup. No the version I have downloaded was apache_2.0.36-win32-x86-no_ssl.msi Thiswas a newer version and supposedly supposed to be more secure. The first screen you get when your in the setup is The welcome screen we don't care much about that but owell so hit next. The next screen is the terms and service. And yes your going to agree to the terms duh. The next screen is some documentation. I never really read it but if you want go ahead and do it. Once your done
hit next again. Know we see a screen that says enter a network domain. Erase what is ever in there and type localhost.

Now the next box says Servername, erace what is ever in the box and put in localhost. The next is Administrators e-mail address. Go ahead and fill that in. But make sure to change it. Now there are 2 little radio buttons. Pick the one that best suites your needs. Now that we got that all filled out. Hit Next and you'll go to a screen that asks you which type of install you want to do. Then hit next.

If you wanted to server out of your one special folder. Change the file location of were your gonna install apache. Or just leave it at the default path. Click install and it should be on it's way. Once it's done installing hit the finish button.

The test:
First were gonna check to see if Apache installed correctly. This is how we do it. Open up Internet Explorer and type in " http://localhost" . If everything went smooth then you should
be seeing a message that looks like this" Seeing this instead of the website you expected?" Yippee!!! Apache is working. See now wasnt' that really simple. Ok now were gonna do some fun stuff.

Alright now that we got or test done lets move on to changing some of this stuff that apache did on default. In Internet Explorer if you installed on the deafult path. Make your way to C:\Program Files\Apache Group\Apache2 This is your Main Apache Directory were you can find everything. If you want take a short break and run around. There are some cool things there. Don't worry if you don't understand what's in these files just yet.

Break Time:
Go take a leak, get some pepsi and somthin to eat. If you got smokes light
them up in your new found glory. Alright so now you've got apache installed and your about to start dishing out your web pages that you took so much time on to build. Head to the folder called htdocs, this is your main folder. There should be a whole bunch of pages What i do
is i select them all and move them to another folder. The htdocs folder is the best folder in the world. It's gonna be one of the places you spend most of your time dishing out content for the world. Ok so get rid of all that stuff that is in your htdocs folder. And move all your great content inside replacing it.

Alright so now once we moved all are content inside the htdocs folder and we tested it to make
sure it was there. http://localhost remember. Now let's get out of there. Go to Apache's main directory. Now just to be aware of what is going on and get a good example of how Apache Functions head off to a folder called "conf" This is the configuration files Apache Uses. If you ever wanted to install php and other server side scripting languages this is where you would do it. Now you get 2 copys Use 1 as a backup and never edit it at all.

Go ahead and open the folder and open "httpd.conf" Read it very carefully cause in this tutorial were not gonna read about it. I just want you to know it's there. Anytime you edit the httpd.conf file you must re-start apache in order for it to work. Another good tip for you new people to apache is you may notice the log files. Yes there great and make sure to make backups of the logs they will come in handy. As security precautions. I also recommend getting a firewall set up. There are lots of great security features that apache has but this is a tutorial to installing apache.

Alright so now you've got your wbpages up. But the only way people will be able to view your pages is my typing in your ip address. This is a bumper. Lets look at some free re-directories. www.n2v.net, This is a cool one. You sign up put your ip adress of your new webserver in and whalla your done. Type in www. .n2v.net and it goes to your server and brings up your super nice webpages. Now if you go to google and search for free domain names or re-directors you should come up with alot. Many People already know about the www.dot.tk one of the coolest things in the world. Free .tk very simple That's all you need. It works perfect for my webserver and I've got around 3,000 hits so it's working good. If you don't wanna do it you don't have to. But it just makes it simple.

Alright that comes to the conclusion of installing Apache Win32 for WINDOWS users. Very easy. One last thing Please Read more of the Apache Documentation either on there website or in your Apache2 directory. If you liked reading this tutorial on how to setup Apache check my website for others at www.bonfire.tk . Yes there will be follow ups. I'll be writing another apache tutorail soon so you can set up PHP. The most awesome scripting language ever built. And also another on how to secure Apache and yes ALL FOR WINDOWS!! .

Minggu, 13 September 2009

How to make key generators

How to make key generators?

Introduction
------------
I take no responsibility of the usage of this information. This tutorial, is for educational knowledge ONLY. Hi there, in this tutorial, I intend to teach you how to make a pretty simple keygen, of a program called W3Filer 32 V1.1.3. W3Filer is a pretty good web downloader... I guess some of you might know the program. I`ll assume you know:

A.How to use debugger (in this case, SoftIce).
B.How to crack, generally (finding protection routines,patching them,etc...).
C.How to use Disassembler (This knowledge can help).
D.Assembly.
E.How to code in Turbo Pascal ™.
Tools you`ll need:
A.SoftIce 3.00/01 or newer.
B.WD32Asm. (Not a must).
C.The program W3Filer V1.13 (if not provided in this package), can be found in
www.windows95.com I believe.
D.Turbo Pascal (ANY version).
Well, enough blah blah, let's go cracking...
Run W3Filer 32.
A nag screen pops, and , demands registration (Hmm, this sux ;-)) Now,
We notice this program has some kind of serial number (Mine is 873977046),
Let's keep the serial in mind, I bet we`ll meet it again while we're on
the debugger.
Well, now, let's put your name and a dummy reg code...
set a BP on GetDlgItemTextA, and, press OK.
We pop inside GetDlgItemTextA, Lets find the registration routine...
I`ll save you the work, the registration routine is this:
:00404DB2 8D95A8FAFFFF lea edx, dword ptr [ebp+FFFFFAA8]
:00404DB8 52 push edx ---> Your user name here.
:00404DB9 E80B550000 call 0040A2C9 ---> Registration routine.
:00404DBE 83C408 add esp, 00000008 ---> Dunno exactly what is it.
:00404DC1 85C0 test eax, eax ---> Boolean identifier, 0 if
:00404DC3 7D17 jge 00404DDC ---> registration failed, 1 if
OK.
Well, Let's enter the CALL 40A2C9, and see what's inside it:
(Please read my comments in the code).
* Referenced by a CALL at Addresses:
|:00404DB9 , :00407F76
|
:0040A2C9 55 push ebp
:0040A2CA 8BEC mov ebp, esp
:0040A2CC 81C4B0FEFFFF add esp, FFFFFEB0
:0040A2D2 53 push ebx
:0040A2D3 56 push esi
:0040A2D4 57 push edi
:0040A2D5 8B5508 mov edx, dword ptr [ebp+08]
:0040A2D8 8DB500FFFFFF lea esi, dword ptr [ebp+FFFFFF00]
:0040A2DE 33C0 xor eax, eax
:0040A2E0 EB16 jmp 0040A2F8
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A2FB©
|
:0040A2E2 0FBE0A movsx ecx, byte ptr [edx] ----> Here Starts the
interesting part.
:0040A2E5 83F920 cmp ecx, 00000020 ----> ECX is the the current
char in the user name, Hmm, 20h=' '...
:0040A2E8 740D je 0040A2F7 ----> Let's see,
:0040A2EA 8A0A mov cl, byte ptr [edx] ----> Generally, all this loop
does, is copying
the user name from
[EDX], to [ESI], WITHOUT the spaces!
(Keep this in mind! ).
:0040A2EC 880C06 mov byte ptr [esi+eax], cl
:0040A2EF 42 inc edx
:0040A2F0 40 inc eax
:0040A2F1 C6040600 mov byte ptr [esi+eax], 00
:0040A2F5 EB01 jmp 0040A2F8
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A2E8©
|
:0040A2F7 42 inc edx
* Referenced by a (U)nconditional or ©onditional Jump at Addresses:
|:0040A2E0(U), :0040A2F5(U)
|
:0040A2F8 803A00 cmp byte ptr [edx], 00
:0040A2FB 75E5 jne 0040A2E2 ----------------> This is the loop , we got
what it does,
Let's continue tracing
the code...
:0040A2FD 56 push esi --------> The user name is pushed, in order
to
Upcase it's chars.
* Reference To: USER32.CharUpperA, Ord:0000h
|
:0040A2FE E80F330000 Call User!CharUpper ---> After this, our name is in
upper case.
:0040A303 56 push esi -----> Our name in upper case here.
* Reference To: cw3220mt._strlen, Ord:0000h
|
:0040A304 E86F300000 Call 0040D378 ---> This is the length of our name.
:0040A309 59 pop ecx
:0040A30A 8BC8 mov ecx, eax ---> ECX=Length.
:0040A30C 83F904 cmp ecx, 00000004 ---> Length>=4 (MUST).
:0040A30F 7D05 jge 0040A316 ---> Let's go to this address...
:0040A311 83C8FF or eax, FFFFFFFF
:0040A314 EB67 jmp 0040A37D
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A30F©
|
:0040A316 33D2 xor edx, edx
:0040A318 33C0 xor eax, eax
:0040A31A 3BC8 cmp ecx, eax
:0040A31C 7E17 jle 0040A335 ---> (Not important, just another useless
checking).

FROM HERE AND ON, THE IMPORTANT CODE, PAY ATTENTION

One thing before we continue, EDX = 00000000h as we enter to the next instructions.
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A333©
|
:0040A31E 0FBE1C06 movsx ebx, byte ptr [esi+eax] ---> EBX <--- char in user name, offset EAX. :0040A322 C1E303 shl ebx, 03 -----> Hmm, it shl's the char by 03h...
(Remember that).
:0040A325 0FBE3C06 movsx edi, byte ptr [esi+eax] ---> Now EDI <--- Char in user name , offset EAX. :0040A329 0FAFF8 imul edi, eax -----> It multiplies the char by the
offset in user name! (Remember that).
:0040A32C 03DF add ebx, edi -----> Adds the result to EBX (That was
Shelled (Ding Dong =)).
:0040A32E 03D3 add edx, ebx -----> EDX=EDX+EBX!!! - This is the CORE
of this registration routine!!!
:0040A330 40 inc eax -----> Increase EAX by one (next char).
:0040A331 3BC8 cmp ecx, eax
:0040A333 7FE9 jg 0040A31E ----> If ECX HMMMMMM, What's in
here?????
:0040A33A C1F803 sar eax, 03 ---------> WAIT! Please type in SIce '?
EAX'
Does this number in EAX look
familiar to us? ;-)
If you still don`t understand,
than, It's
our SERIAL NUMBER! (PLEASE, take
your time, and check by
yourself - don`t trust me!). OK,
so now we know,
That it SHR's EAX by 03 (SAR is
almost identical to SHR).
:0040A33D 03D0 add edx, eax ---------> Hmm, it adds the result from the
loop, the serial number shr'd by 03h
:0040A33F 52 push edx -------> Let's continue. (At this point, I
can tell you , the reg number, is
in EDX - only that the reg number
is in HEX --> That's how you enter it).
* Possible StringData Ref from Data Obj ->"%lx"
|
:0040A340 685EF54000 push 0040F55E
:0040A345 8D95B0FEFFFF lea edx, dword ptr [ebp+FFFFFEB0]
:0040A34B 52 push edx
* Reference To: USER32.wsprintfA, Ord:0000h
|
:0040A34C E8E5320000 Call 0040D636 -------> This one, does HEX2STR (Takes
the value from EDX, and turns it to an hex string).
:0040A351 83C40C add esp, 0000000C
:0040A354 8D8DB0FEFFFF lea ecx, dword ptr [ebp+FFFFFEB0] -----> type 'd ecx' -
THIS is the reg number! That's enough for us, the rest of
the code, is
just for comparing the correct reg code with ours.
:0040A35A 51 push ecx
* Reference To: USER32.CharLowerA, Ord:0000h
|
:0040A35B E8B8320000 Call 0040D618
:0040A360 8D85B0FEFFFF lea eax, dword ptr [ebp+FFFFFEB0]
:0040A366 50 push eax
:0040A367 FF750C push [ebp+0C]
* Reference To: cw3220mt._strcmp, Ord:0000h
|
:0040A36A E875300000 Call 0040D3E4
:0040A36F 83C408 add esp, 00000008
:0040A372 85C0 test eax, eax
:0040A374 7405 je 0040A37B
:0040A376 83C8FF or eax, FFFFFFFF
:0040A379 EB02 jmp 0040A37D
* Referenced by a (U)nconditional or ©onditional Jump at Address:
|:0040A374©
|
:0040A37B 33C0 xor eax, eax
* Referenced by a (U)nconditional or ©onditional Jump at Addresses:
|:0040A314(U), :0040A379(U)
|
:0040A37D 5F pop edi
:0040A37E 5E pop esi
:0040A37F 5B pop ebx
:0040A380 8BE5 mov esp, ebp
:0040A382 5D pop ebp
:0040A383 C3 ret
Making the actual Keygen
~~~~~~~~~~~~~~~~~~~~~~~~
Now, after I've explained how does the program calculate the registration
code, you can either write your own keymaker, without looking at my code, or
look at my code (in Turbo Pascal - sorry for all you C lovers ;-) Next time).
That's it, here's the source of my keygen:
------------------- Cut here ---------------------------------------------
Program W3FilerKeygen;
var
Key,SerialNum,EB,ED,digit:Longint;
I,x:Byte;
Name,KeyHex:String;
begin
Writeln(' W3Filer32 V1.1.3 Keymaker');
writeln('Cracked by ^pain^ ''97 / Rebels!');
Write('Your Name:'); { Read the name }
readln(Name);
Write('Serial Number:');
readln(SerialNum); {Yes, we need the serial number for the calculation!}
Key:=0;
x:=0;
For I:=1 to length(Name) do
begin
Name[I]:=upcase(Name[i]);
If Name[I]<>' ' then begin
eb:=ord(Name[I]) shl 3; {EB = Name[I] Shl 03h}
Ed:=ord(Name[I]); {ED = Name[I]}
ed:=ed*(x); {ED=ED*Offset}
inc(x);
eb:=eb+ed; {Add ED to EB}
Key:=Key+EB; {Add EB to KEY}
end;
end;
Key:=Key+(SerialNum shr 3); { Add SerialNum shr 03h to Key}
{ From here, this is just HEX2STRING --> I`m quite sure it's
Self explaintory, else - go and learn number bases again! ;-)}
KeyHex:='';
repeat
digit:=Key mod 16;
key:=key div 16;
If digit<10>10 then KeyHex:=Chr(Digit-10+ord('a'))+KeyHex;
until key=0;
writeln('Your Key:',KeyHex);
writeln(' Enjoy!');
end.

Jumat, 04 September 2009

Cara membobol hotspot

Untuk tulisan ini ilmu belajar komputer bukannya mau memberikan saran yah, tapi hanya sebagai pelajaran aja yaitu Cara membobol hotspot warnet dan jaringan wireles internet yang dapat kamu tangkap keberadaannya OK.

Trik ini juga bisa digunkan untuk mencari pasword yang digunakan oleh seseorang dalam mengakses hotspot yang bisanya menggunakan kartu prepaid atau member dari suatu warnet Lho! perhatikan baik-baik ya!

Alat yang dipersiapkan sih simple aja :

- Seperangkat Laptop : Pc yang kena wireless juga boleh, asal jaringan hotspotnya nyampek.

- Charger laptop : karena pasti memakan banyak daya batre saat keranjingan internet gratisNgakakNgakak.

Software yang diperlukan :

1. AngryIP Scanner (108 kb): ini software untuk scanning ip dan mencari mac address korban. Softwarenya search aja di google kecil kok ukurannya. Tinggal pakai alias gak perlu instalasi.

2. Mac Addres Chager (312 kb): software ini dipergunkan untuk mengganti mac addres kita. Mac Address ? gak perlu dijelasin yang penting bisa makeknya, tak pasti ngeti sambil jalan. (asal jalan gak jauh-jauh “^_^”). Silakan search di google.

Langsung aja sekarang ke caranya :

1. Cari lokasi penyedia layanan hotspot, tentunya di daerah yang terjangkau jaringan hotspot tersebut.

2. Hidupkan laptop anda, dan hidupkan pula wireless network anda dan lihat di sistem tray icon wireless network, kemudian klik kanan dan pilih view avalible wireless network, dan tentunya setelah itu anda harus connect ke wireless hotspot tujuan anda.

3. Setelah connect, klik kanan sistem tray dan pilih status >pilih tab detail > kelihatan disana ip yang diberikan kepada kita. Catat ip tersebut.

4. Buka Program AngryIP Scanner dan isikan ip range yang akan kita scan (pakai data ip kita tadi) pada bagian atas. Misalnya : IP yang kita dapat xxx.xxx.x.xx kemuadian masukkan pada kolom range pertama ip kita sesuai dengan ip yang tadi namun ganti angka di bagian akhir dengan 1 menjadi xxx.xxx.x.1 dan pada kolom kedua tuliskan sama namun angka satu diakhir itu ganti dengan 255 menjadi xxx.xxx.x.255. hasilnya xxx.xxx.x.1 to xxx.xxx.x.255 dan klik start (tombol merah).

5. Setelah melakukan scanning maka kita akan mendapatkan data ip yang hidup yang terkoneksi dengan hotspot tersebut. setelah scanning selesai maka lihat ip yang hidup (alive host) warna biru klik kanan pada ip yang hidup Klik kanan pada ip yang warna biru tadi klik kanan > show > mac address dan akan ada kode mac addres (terkadang ada mac addressnya tidak tampil, pilih saja ip yang lainnya). Catat mac address yang kita dapatkan.

6. Buka Program Mac Address Changer yang telah kita persiapkan. Disana ada field mac address. nah sekarang tinggal ganti mac address tersebut dengan yang kita dapatkan tadi dan tekan change mac id.

7. Tunggu karena mac kita aan diganti dan koneksi sementara terputus dan konek lagi otomatis sendiri.

8. Masuk web browser firefox atau apa saja boleh. Nikmati Internet Gratis…

Satu hal yang perlu diingat adalah kita sistemnya numpang data transfer pada account yang kita hack tadi (yang punya ip tadi, maaf…). Kalau Saya sih biasanya untuk mengakalinya adalah dengan masuk halaman status login hotspot tersebut (untuk dapat account). misalnya idonbiu.hotspot.net/status dan begitu masuk disana kan terlihat nomor sandi prepaid card dan kita catat saja, lalu logout, dan masuk kembali ke halaman login hotspot itu cepat-cepat masukkan sandi tadi. Hal ini akan membuat kita secara langsung dapat mengakses internet tanpa menumpang lagi (soalnya yang make prepaid card code kan kita) jadi kalau ada yang mau login pakai kartu itu (yang punya code) saat kita login pakai kartu itu tentunya dia tidak akan bisa masuk karena kartu prepaid cardnya “already login”.

Bagaiamana, menarik bukan ?

Tapi saya sarankan, seperti yang saya lakukan adalah dengan menumpang saja, karena saya tidak mau berbuat terlalu jauh, seperti cara yang saya beritau untuk me log off dan log in lagi tentunya akan membuat sang pemilik tidak bisa log in. Kasian kan ?

Jadi mumpung sudah dikasi gratisan, kenapa gak numpang saja ya, itung-itung cuman ikutan ngakses bareng kan tidak terlalu merugikan. Minta ijin langsung juga kemungkinan yang punya gak nolak, asal kepentingannya memang mendesak.

Untuk Sacanning Ip saya juga bisa gunakan aplikasi the dude untuk mengetahui kondisi koneksi komputer-komputer ke hotspot. Bisa dicoba juga ya.

Sekali lagi, semua ini hanya untuk pembelajaran saja, selama kita masih mampu kenapa gak pakai yang legal aja. Dan ini juga bisa dimanfaatkan oleh pemilik hotspot, kalau cara ini masih bisa digunakan untuk membobol. Jadi perlu keamanan yang lebihTongueTop…