Default Apache config Path

Apache Logo
Apache httpd 2.2 default layout (apache.org source package):

ServerRoot              ::      /usr/local/apache2
DocumentRoot            ::      /usr/local/apache2/htdocs
Apache Config File      ::      /usr/local/apache2/conf/httpd.conf
Other Config Files      ::      /usr/local/apache2/conf/extra/
SSL Config File         ::      /usr/local/apache2/conf/extra/httpd-ssl.conf
ErrorLog                ::      /usr/local/apache2/logs/error_log
AccessLog               ::      /usr/local/apache2/logs/access_log
cgi-bin                 ::      /usr/local/apache2/cgi-bin (enabled by default, but the bundled scripts are 644)
binaries (apachectl)    ::      /usr/local/apache2/bin
start/stop              ::      /usr/local/apache2/bin/apachectl (start|restart|graceful|graceful-stop|stop|configtest)

Apache httpd 2.0 default layout (apache.org source package):


ServerRoot              ::      /usr/local/apache2
DocumentRoot            ::      /usr/local/apache2/htdocs
Apache Config File      ::      /usr/local/apache2/conf/httpd.conf
SSL Config              ::      /usr/local/apache2/conf/ssl.conf
ErrorLog                ::      /usr/local/apache2/logs/error_log
AccessLog               ::      /usr/local/apache2/logs/access_log
cgi-bin                 ::      /usr/local/apache2/cgi-bin (enabled by default, but the bundled scripts are 644)
binaries (apachectl)    ::      /usr/local/apache2/bin
start/stop              ::      /usr/local/apache2/bin/apachectl (start|stop|graceful|configtest)

Debian, Ubuntu (Apache httpd 2.x):

ServerRoot              ::      /etc/apache2
DocumentRoot            ::      /var/www
Apache Config Files     ::      /etc/apache2/apache2.conf

Loadkajai VIP User

[1] xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
[2] admin:xxxxxxxxxxxxxxxxxxxxxxxxxxxx
[3] keng:dvd123:keng-pattaya@hotmail.com:2
[4] donk_roman:0827694101:roman_2550@yahoo.com:2
[22] hellomaple:6460176:hellomaple@hotmail.com:2
[39] maleficent:phil009:madamlamenta@hotmail.com:2
[45] Poa2553:3552AOp:Dsnsombut@hotmail.com:2
 .......

My Hello World.pl



See More At : http://pastebin.com/kfzr1ict

Edit : windows98SE : บ่อรู้เด้อ แต่ดูในเว็บมันก้อมีน่ะ

Twista Feat. Chris Brown - Make A Movie


Twista was one of the 100 rappers who they interviewed for the book- !HOW-T0. RAP| The Art&Science of the HipHop MC
 

My new page "Hacked Zone"


หลังจากที่ได้เห็น blog ของท่าน akira ผมก้อนืกในใจว่าอยากจะทำ page สำหลับเป็นหน้าที่เอาไว้บันทืก web ที่ผมได้เจาะไปแล้วใว้ในนั้น แต่ก้อยังไม่แน่ใจว่าจะดีไม งันผมขอ comment ใว้หน่อยว่าสมควนที่จะทำไม
ຫຼັງຈາກທີ່ໄດ້ເຫັນ blog ຂອງທ່ານ akira ຂ້ອຍກໍ່ນຶກໃນໃຈວ່າຢາກຈະເຮັດ page ສຳລັບເປັນຫນ້າທີ່ເອົາໃວ້ບັນທຶກ web ທີ່ຂ້ອຍໄດ້ເຈາະໄປແລ້ວໃວ້ໃນນັ້ນ ແຕ່ກໍ່ຍັງບໍ່ແນ່ໃຈ ສະນັ້ນເຮົາຂໍ comment ໃວ້ວ່າຈະສົມຄວນເຮັດດີບໍ່

[Python] - Boom Mail



ปล.รู้ pastebin เพราะ pe3z นะเน้ย ^^
ປລ. ຮູ້ pastebin ເພາະ pe3z ໄດ້ນິ

How to Make Keygen - by Edkung [TH]

Requirement
● Ollydbg 1.10 & Plugin ApiBreak (or Other Ollydbg Plugin for Breakpoint Windows API)
● Plugin Code Ripper for copy assembly code from Ollydbg
● Teleport Pro v 1.29 (Build 1107)
● IDE Borland Delphi 7 (or other IDE)
● Read How to crack Teleport Pro


Download Ebook Here

Credit:Edkung

D-Link Router Models Authentication Bypass Vulnerability

========================================================
D-Link Router Models Authentication Bypass Vulnerability
========================================================

# Exploit Title: Multiple D-Link Router Authentication Bypass Vulnerabilities
# Date: 12-01-2011
# Author: Craig Heffner, /dev/ttyS0
# Firmware Link: http://www.dlink.co.uk/
# Firmware Version(s): All
# Tested on: DIR-300, DIR-320, DIR-615 revD

Multiple D-Link routers that use a PHP based Web interface suffer from the same authentication bypass
vulnerability which allows unprivileged users to view and modify administrative router settings.
Further, even if remote administration is disabled this vulnerability can be exploited by a remote
attacker via a CSRF attack.

The vulnerability has been confirmed in the following routers:

    DIR-615 revD
    DIR-320
    DIR-300

The following example URL will allow access to the router's main administrative Web page without authentication:

    http://192.168.0.1/bsc_lan.php?NO_NEED_AUTH=1&AUTH_GROUP=0

For a more detailed description of the vulnerability, see: http://www.devttys0.com/wp-content/uploads/2010/12/dlink_php_vulnerability.pdf.

Note that this vulnerability was independently discovered in the DIR-300 and subsequently reported by Karol Celin on 09-Nov-2010 [1].

[1] http://www.securityfocus.com/archive/1/514687/30/120/threaded

Perl Scan Column SQL injection [ by Dreamclown]

สืกสามานานแล้ว แต่เพี่งมาเล่น perl ครั้งแลกก้อเลยลองเขืยน scan column ของ bug sql injection
ສຶກສາມາດົນແລ້ວ ແຕ່ຫາກໍ່ມາຫຼີ້ນ perl ຄັ້ງທຳອິດເລີຍລອງຂຽນ scan column ຂອງ bug sql injection


#!usr/bin/perl

Lan Over Internet with Hamachi



Hamachi จะทำงานในลักษณะ VPN (Virtual Private Network) คือการจำลอง Lan ผ่าน Internet