Showing posts with label ssh. Show all posts
Showing posts with label ssh. Show all posts

Thursday, 7 August 2014

proxy port 80

NI BAGI PARA PENGGUNA TERE INTERNET GRATIS PASTI LAGI BINGUNG CARI-CARI PROXY PORT 80
gak usah banyak bertele..


inject silahkah pilih


Thursday, 13 March 2014

telkampret maret 2014

Ni maret,, penguna internet telkampret gratis pasti pada merana,, ni gua kan share inject,, ples bumbu buat sup kampret.nya biar tambah maknyus.. bumbu sup  inject1  inject2  inject3  terserah mau pilih inject yang mana yang penting  sup..nya maknyus...






THANKS buat gan heriza, peretas denasri, dan putra langit..

Saturday, 15 February 2014

INET GRATIS,, GUE BANGET DAHH,,,,

Ni gue akan bahas internet gratis yang sudah kurang lebih dua minggu  gue gunakan ,ini mungkin untuk orang yang baru tahu tentang internet gratis ribet,,kala menurut gue sih gak karena gue dah terbiasa make ,, lansung aja gue jelasin alat tempurnya aja..
1.     SC (sim card)
Kalo gue ni gunain sc kampret, kadang2 juga tere.
2.     Inject yang worek.
3.     Ssh
4.     Proxyfier dan bitvise client
Ini tutorial make ssh..comot ya..


Semoga .. bermanfaat..
ni proxy nya 

ato mau donwload proxy dalam bentuk exell.
tapi check lagi di sini.  ......

Monday, 10 February 2014

SSH GRATIS 3 BULAN....

Ni kalo mau ssh gratis daftar dulu di sini 
1. Klik tu FREE DEMO.

2. PILIH FREE DEMO HOSTING..

3. Pilih Aja Yang LINUX Iar Umurnya Lebiih Awet Kalo Gak Salah 91 Hari
14. Buat nama domain mu. Next step 
                                           
25.  Trus klik check out



Selesai dah
KALO SSH NYA YANG NI
BUKA  FTP,SFTP SSH

INI IP PORT USER  CODE


SEMOGA BERGUNA ,,, THANKSSS... STATUS WOREKK


NI LAO MAU BENTUK DOC
jangan bilang2 orang banyak ya.... ok

Monday, 30 December 2013

HOW TO: Secure SSH on your VPS

Knowledgebase



The absolute first thing you should do on a clean server is secure SSH. Before you even consider anything else, edit your SSH configuration (vi /etc/ssh/sshd_config). The lines you should be concerned with are the following:

Port
PermitRootLogin
RSAAuthentication
PubkeyAuthentication
AuthorizedKeysFile
PasswordAuthentication
Banner

(Make sure all of the above lines are uncommented by removing the # in front if applicable.)

Change your Port to something other than 22, preferably either a random or hard to guess 5 digit number (no more than 65535). In reality any port other than 22 is a good port since that is the default SSH port, but be sure to check to make sure the port you pick won't conflict with other known ports.

Set PermitRootLogin to no. This will prevent people from using root to login to SSH. Since root is the last thing you want anybody to have access to, the best way to prevent access is to disable it immediately. In a moment, I will explain how you will still be able to have root access even after disabling it.

AFTER SETTING THIS DO NOT LOGOUT OF YOUR CURRENT SSH SESSION UNTIL YOU HAVE CONFIRMED THAT YOU CAN LOGIN WITH YOUR USERNAME AND RSA!

Set RSAAuthentication and PubkeyAuthentication to yes. This will allow you to use an RSA key to SSH into your server instead of your password. Also verify that AuthorizedKeysFile is set to .ssh/authorized_keys.

Set PasswordAuthentication to no. This will disable people from being able to login with a password which forces you and your staff to use RSA keys which are the most secure option you can have.

Set Banner to something like /root/sshbanner. The actual location and name of the banner is up to you. Just make sure that the file includes something along the following lines:
"This system is monitored and all logins are reported to the administrators. If you are not authorized to connect to this server disconnect now."

Of course this has little actual effect but some script kiddies might be scared off by this since by default they aren't use to seeing any kind of message when trying to login so it might make them think the server is more advanced/secure than others. Either way it's the equivalent to a "No Trespassing" notice so if you do have to ever resort to legal proceedings they can't say they didn't know. You should also setup a Message Of The Day (MOTD) with a similar message (vi /etc/motd) for the same reason.

Now once that has been setup you will want to create a new users that you will be logging in with since root will be disabled shortly. Create a new user for yourself (useradd). Now create a password for that user (passwd), ensure it is unique and differs from your root password. Not you will want to add that user to the wheel group (vi /etc/group find the wheel group and add the username to that line like so: wheel:x:10:root,username).

Once the user is added to the wheel group you will want to create an RSA key for this user. If you are using PuTTY then you will need to download PuTTYgen.

DO NOT RESTART SSHD!
  1. Open PuTTYgen.exe set the type to SSH2 RSA and minimum 1024 bits.
  2. Click Generate and move your mouse in the box for randomness.
  3. Edit the Comment to something you can easily identify if you plan to use multiple RSAs (different users, access to/from other servers, etc...).
  4. Set a Passphrase so even if somebody gets your RSA key they still cannot login to your server without entering the correct password. Do not use your username or root password!
  5. Save the public and private keys to your PC, then copy and paste the public key in the text box to a new authorized_keys file on your server (mkdir .ssh && chmod 0700 .ssh && cd .ssh && touch authorized_keys && chmod 0600 authorized_keys && vi authorized_keys).

Now restart SSH in SSH (/etc/init.d/ssh restart) while staying logged in to your current session. Open a second SSH session to your server using your new port, username, and RSA key to confirm it is working (also check for the banner and MOTD we setup). Once you are able to login with your new username and RSA key, verify you can switch to root (su -). If everything worked correctly you should now have root SSH access with password authentication and root login disabled!

Now one last thing you will want to do is setup your server to send you an e-mail when somebody logs in under root on your server by adding the following line to .bashrc (vi /root/.bashrc):
echo 'ALERT - ROOT SHELL ACCESS ON:' `date` `who` | mail -s "ALERT: ROOT ACCESS FROM: `who | cut -d"(" -f2 | cut -d")" -f1`" root

This code will send an e-mail to your "root" e-mail (which you can setup by adding a .forward file in your /root/ directory) when somebody logs into root.
  
I so respect for the source . thanks

Sunday, 29 December 2013

Layanan Penyedia SSH Gratis Dari Smoothping.com


Alhamdullilah, kali ini saya masih di beri kesehatan untuk kembali menulis artikel, khususnya artikel yang berhubungan dengan trik internet gratis. Masih seperti  postingan – postingan saya sebelumnya tentang SSH gratis, layanan SSH gratis ini di sediakan oleh layanan yang sebenarnya di peruntukkan untuk mengecilkan ping, dengan tujuan untuk memperlancar kita saat bermain game online


Sebenarnya saya sudah menulis postingan tentang SSH gratis juga yang di sediakan oleh laglessproxy, tapi karena database und3rw0rld kemarin di “rollback” sehingga postingan SSH gratis laglessproxy hilang dan kebetulan juga saya lua backup, hhehe.
:-D
Mungkin nanti akan saya tulis kembali mengenai laglessproxy.

Sepertinya tidak perlu saya jelaskan lagi, karena sudah pernah saya jelaskan di postingan – postingan saya sebelumnya jadi langsung saja ke tutorial cara membuat SSH gratis di Smoothping ini.

1. Pertama, daftar dulu di Smoothping klik disini, lalu isi form pendaftarannya dengan benar.

2. Cek email yang anda gunakan untuk daftar tadi, tunggu email dari Smoothping, lalu klik link yang ada dalam email dari Smoothping


3. Setelah anda klik link tersebut anda akan di bawa kembali ke situs Smootping dan akan ada pemberitahuan jika akun ada telah berhasil di verifikasi.


Cukup mudah bukan ? sekarang dimana kah kita bisa menemukan hostname atau IP yang akan kita gunakan sebagai SSH ? karena scara default Smoothping menggunakan client software bawaan mereka sendiri, untuk itu saya akan menyediakan semua hostname dari Smootping, daftar hostnamenya bisa di lihat di bawah ini :

*NB : Port 22 dan 443




Banyak juga ternyata, hhehe, tinggal di pilih saja mana yang sesuai dengan kebutuhan anda, selamat mencoba dan semoga bermanfaat

:)

- See more at: http://cur.lv/5vijf

Thursday, 12 December 2013

Mencari SSH Gratis Tanpa Password

Langsung aja berikut Metode Lain Mencari SSH Gratis Tanpa Password :


Sebenarnya gak perlu register juga gak papa, tetapi kalau free user tidak bisa memanfaatkan fitur tambahan untuk searching, makanya saya anjurkan untuk register dulu.

  • Search dengan keyword :

Ruckus Wireless country:TH

itu akan searching dengan kata kunci "Ruckus Wireless" dari negara Thailand. Silahkan di ganti negaranya sesui keinginan bro.


Saya ambil contoh ip 202.57.186.112

Coba kita bukak lewat bitvise mas bro.


wah sukses bro, yuk kita coba buat broswshing


mantab bro, bisa buat berselancar. Sangat sangat sangat gampang dan simple bukan???

Keyword search lain yang support untuk di jadikan gratisan es teh tanpa user name dan password :
SSH-2.0-dropbear_2011.54
SSH-2.0-dropbear_0.53.1
SSH-2.0-dropbear_0.53
SSH-2.0-dropbear_0.52
SSH-2.0-dropbear_0.51
SSH-2.0-dropbear_0.50
SSH-2.0-dropbear_0.49
SSH-2.0-dropbear_0.48
SSH-2.0-dropbear_0.47
SSH-2.0-dropbear_0.46

Sumber: Disini