Skip to main content

Block ads domain di router openwrt

Kesal sekali tentunya ketika kita lagi berselancar di Dunia maya banyak banget iklan yang berbayang!!!
apalagi iklannya bejibun sampai-sampai halaman browser sampai penuh dan kita handak mengkliknya satu persatu lama sekali kan!!!???
sedikit juga penjelasan mengenai ads ini, ads ini sangatlaah mengurusa bandwith kita dan yang paling parahnya penyebaran malware melalui ads ini sangatlah membahayakan komputer kita.
okeh sekian penjelasan singkatnya
CWIMM
tutorial ini saya gunakan di router yang sudah saya ganti firmware ke OPENWRT
1. tambahkan file yang berada di
    root@unsheel:~#/vi etc/dnsmasq.conf
tambahkan ini

address=/207.net/127.0.0.1
address=/247realmedia.com/127.0.0.1
address=/247realmedia.com/127.0.0.1
address=/2mdn.net/127.0.0.1
address=/2o7.net/127.0.0.1
address=/33across.com/127.0.0.1
address=/51yes.com/127.0.0.1
address=/abmr.net/127.0.0.1
address=/adbrite.com/127.0.0.1
address=/adbureau.net/127.0.0.1
address=/adchemy.com/127.0.0.1
address=/addthis.com/127.0.0.1
address=/addthisedge.com/127.0.0.1
address=/admeld.com/127.0.0.1
address=/admob.com/127.0.0.1
address=/adocean.pl/127.0.0.1
address=/adsonar.com/127.0.0.1
address=/advertising.com/127.0.0.1
address=/advertserve.com/127.0.0.1
address=/afy11.net/127.0.0.1
address=/aquantive.com/127.0.0.1
address=/atdmt.com/127.0.0.1
address=/atwola.com/127.0.0.1
address=/axf8.net/127.0.0.1
address=/blueseek.com/127.0.0.1
address=/bravenet.com/127.0.0.1
address=/bravenet.com/127.0.0.1
address=/channelintelligence.com/127.0.0.1
address=/cmcore.com/127.0.0.1
address=/cnzz.com/127.0.0.1
address=/coremetrics.com/127.0.0.1
address=/corp.kaltura.com/127.0.0.1
address=/cqcounter.com/127.0.0.1
address=/crowdscience.com/127.0.0.1
address=/decdna.net/127.0.0.1
address=/decideinteractive.com/127.0.0.1
address=/doubleclick.com/127.0.0.1
address=/doubleclick.net/127.0.0.1
address=/edgecastcdn.net/127.0.0.1
address=/esomniture.com/127.0.0.1
address=/fastclick.net/127.0.0.1
address=/fimserve.com/127.0.0.1
address=/flingwebads.com/127.0.0.1
address=/footprint.net/127.0.0.1
address=/foxnetworks.com/127.0.0.1
address=/googleadservices.com/127.0.0.1
address=/googlesyndication.com/127.0.0.1
address=/gravity.com/127.0.0.1
address=/hitbox.com/127.0.0.1
address=/hittail.com/127.0.0.1
address=/imiclk.com/127.0.0.1
address=/imrworldwide.com/127.0.0.1
address=/insightexpress.com/127.0.0.1
address=/insightexpressai.com/127.0.0.1
address=/intellitxt.com/127.0.0.1
address=/invitemedia.com/127.0.0.1
address=/ivwbox.de/127.0.0.1
address=/kaltura.com/127.0.0.1
address=/leadback.com/127.0.0.1
address=/mercent.com/127.0.0.1
address=/metriweb.be/127.0.0.1
address=/misstrends.com/127.0.0.1
address=/mookie1.com/127.0.0.1
address=/myads.com/127.0.0.1
address=/netconversions.com/127.0.0.1
address=/nexac.com/127.0.0.1
address=/nextaction.net/127.0.0.1
address=/nielsen-online.com/127.0.0.1
address=/nuggad.net/127.0.0.1
address=/offermatica.com/127.0.0.1
address=/omniture.com/127.0.0.1
address=/omtrdc.net/127.0.0.1
address=/paypopup.com/127.0.0.1
address=/pm14.com/127.0.0.1
address=/quantcast.com/127.0.0.1
address=/quantserve.com/127.0.0.1
address=/realmedia.com/127.0.0.1
address=/revsci.net/127.0.0.1
address=/rightmedia.com/127.0.0.1
address=/rmxads.com/127.0.0.1
address=/ru4.com/127.0.0.1
address=/rubiconproject.com/127.0.0.1
address=/scorecardresearch.com/127.0.0.1
address=/sitemeter.com/127.0.0.1
address=/smartadserver.com/127.0.0.1
address=/statcounter.com/127.0.0.1
address=/tacoda.net/127.0.0.1
address=/targetingmarketplace.com/127.0.0.1
address=/themig.com/127.0.0.1
address=/tradedoubler.com/127.0.0.1
address=/valueclick.net/127.0.0.1
address=/xiti.com/127.0.0.1
address=/yesadvertising.com/127.0.0.1
address=/yesadvertising.com/127.0.0.1
address=/yieldmanager.com/127.0.0.1
address=/yieldmanager.net/127.0.0.1
address=/yldmgrimg.net/127.0.0.1
address=/youknowbest.com/127.0.0.1
address=/zango.com/127.0.0.1
address=/zedo.com/127.0.0.1
2. tambahkan file yang berada di
root@unsheel:~#vi /etc/hosts
DOWNLOAD di sini nanti copy ke file host itu

setelah itu
root@unsheel:~# /etc/init.d/dnsmasq restart
selesai 

Comments

Popular posts from this blog

SUB-SUB TOOLS PADA BACKTRACK

Backtrack adalah penetrasi tools yang terdiri dari banyak tools/aplikasi. Sub-sub tools pada menu naga backtrack adalah bejumlah lebih dari 300 tools. Untuk menampilkannya anda tinggal harus memasukan perintah root@bt:#dpkg-list Setiap tools di klasifikasikan pada beberapa kelompok dengan fungsi masing-masing tools. I.1 Information gathering. Information gathering adalah sub tools yang berisi tools – tools yang di gunakan atau berhubungan dengan mengumpulkan informasi ( information gathering ). Seorang attacker akan terlebih dahulu mengumpulkan informasi-informasi targetnya sebelum dia akan melakukan exploitasi dan explorasi. informasi yang di kumpulkan biasanya informasi ip, port, protokol, dns, record. Contoh tools yang sering di gunakan disini adalah nmap, hping, unicorn , openvas , dll. I.2 Vulnerability assesment. Vulnerability Assesment (VA) diterjemahkan dalam bahasa Indonesia menjadi ‘pengukuran kelemahan serangan’, suatu kata yang bikin kita berpikir panjang a...

Learn Java for Android Development: Introduction to Java

Tutorials \ Android

Cracking WPA2 PSK with Backtrack 4, aircrack-ng and John The Ripper

Basic steps : Put interface in monitor mode Find wireless network (protected with WPA2 and a Pre Shared Key) Capture all packets Wait until you see a client and deauthenticate the client, so the handshake can be captured Crack the key using a dictionary file (or via John The Ripper) I’ll use a Dlink DWL-G122 (USB) wireless network interface for this procedure.  In backtrack4, this device is recognized as wlan0. First, put the card in monitor mode : root@bt:~# airmon-ng Interface Chipset Driver wifi0 Atheros madwifi-ng ath0 Atheros madwifi-ng VAP (parent: wifi0) ath1 Atheros madwifi-ng VAP (parent: wifi0) wlan0 Ralink 2573 USB rt73usb - [phy0] root@bt:~# airmon-ng start wlan0 Interface Chipset Driver wifi0 Atheros madwifi-ng ath0 Atheros madwifi-ng VAP (parent: wifi0) ath1 Atheros madwifi-ng VAP (parent: wif...