β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Types and behaviors of hackers According :
γγ
1) To my understanding, "hackers" should be roughly divided into two categories: "positive" and "evil". Decent hackers rely on their knowledge to help system administrators find loopholes in the system and To be improved, and evil sect hackers use various hacking skills to attack, invade, or do other things harmful to the network, because evil sect hackers are engaged in things that violate the "Hacker Code", so their real names It is called "Cracker" instead of "Hacker", which is what we often hear of "Cacker" and "Hacker".
2) Regardless of the type of hacker, their initial learning content will be the content involved in this part, and the basic skills they master will be the same. Even if they each embarked on a different path in the future, they did the same thing, but the starting point and purpose were different.
3) Many people once asked me: "What do you usually do as a hacker?
Β» Isn't it very exciting?" Some people understand hackers as "doing boring and repetitive things every day." In fact, these are misunderstandings. Hackers usually need to spend a lot of time to learn. I donβt know if this process has an end or not. I only know "the more the better." Since learning hackers is entirely out of personal hobbies, there is no such thing as "boring"; repetition is inevitable, because "practice makes perfect". Only through constant contact and practice can one experience something that can only be expected and unspeakable.
4) In addition to learning, hackers should apply their knowledge to practice. No matter what kind of hackers do, the fundamental purpose is to master what they have learned in practice.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Types and behaviors of hackers According :
γγ
1) To my understanding, "hackers" should be roughly divided into two categories: "positive" and "evil". Decent hackers rely on their knowledge to help system administrators find loopholes in the system and To be improved, and evil sect hackers use various hacking skills to attack, invade, or do other things harmful to the network, because evil sect hackers are engaged in things that violate the "Hacker Code", so their real names It is called "Cracker" instead of "Hacker", which is what we often hear of "Cacker" and "Hacker".
2) Regardless of the type of hacker, their initial learning content will be the content involved in this part, and the basic skills they master will be the same. Even if they each embarked on a different path in the future, they did the same thing, but the starting point and purpose were different.
3) Many people once asked me: "What do you usually do as a hacker?
Β» Isn't it very exciting?" Some people understand hackers as "doing boring and repetitive things every day." In fact, these are misunderstandings. Hackers usually need to spend a lot of time to learn. I donβt know if this process has an end or not. I only know "the more the better." Since learning hackers is entirely out of personal hobbies, there is no such thing as "boring"; repetition is inevitable, because "practice makes perfect". Only through constant contact and practice can one experience something that can only be expected and unspeakable.
4) In addition to learning, hackers should apply their knowledge to practice. No matter what kind of hackers do, the fundamental purpose is to master what they have learned in practice.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Create OpenSSL Certificate with Ansible :
1) When working with OpenSSL, public keys are derived from the corresponding private key.
The first step will always be to generate a private key using a specific algorithm.
2) For production use, you need a Certification Authority (CA) or Certification Authority that is responsible for signing a certificate that you can trust on the Internet.
Since we are talking about Dev and Lab use cases, we are creating a self signed certificate.
3) Create OpenSSL Certificate with Ansible
In the examples shown in this article, the private key is named hostname_privkey.pem, the certificate file is hostname_fullchain.pem, and the CSR file is hostname.csr, where hostname is the actual DNS for which the certificate was generated.
Before we start
$ sudo dnf install ansible
$ sudo yum -y install epel-release
$ sudo yum install ansible
$ sudo apt update
$ sudo apt install software-properties-common
$ sudo apt-add-repository --yes --update ppa:ansible/ansible
$ sudo apt install ansible
$ echo "deb http://ppa.launchpad.net/ansible/ansible/ubuntu trusty main" | sudo tee -a /etc/apt/sources.list
$ sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 93C4A3FD7BB9C367
$ sudo apt update
$ sudo apt install ansible
$ pacman -S ansible
Confirm the Ansible installation by checking the version.
$ ansible --version
ansible --version
ansible 2.9.11
config file = None
configured module search path = ['/usr/share/ansible/plugins/modules']
ansible python module location = /usr/local/Cellar/ansible/2.9.11/libexec/lib/python3.8/site-packages/ansible
executable location = /usr/local/bin/ansible
python version = 3.8.5 (default, Jul 21 2020, 10:48:26) [Clang 11.0.3 (clang-1103.0.32.62)]
Install dependencies
pyOpenSSL is required to generate keys and certificates using Ansible.
$ sudo pip install pyOpenSSL
$ sudo pip3 install pyOpenSSL
Writing an Ansible playbook to generate a self signed certificate
With the dependencies installed, we need to start creating the certificate using Ansible.
We will make a single playbook with tasks for creating a private key, CSR and certificate.
I'll walk through each feature block by block, and later we'll combine everything to get a working playbook.
Create project folders:
$ mkdir -p ~/projects/ansible/{certificates,files,templates}
$ cd ~/projects/
$ tree
.
`-- ansible
|-- certificates
|-- files
`-- templates
4 directories, 0 files
Create a playbook template
$ vim ~/projects/ansible/openssl_certificates.yml
Add standard sections.
---
- hosts: localhost
vars:
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Create OpenSSL Certificate with Ansible :
1) When working with OpenSSL, public keys are derived from the corresponding private key.
The first step will always be to generate a private key using a specific algorithm.
2) For production use, you need a Certification Authority (CA) or Certification Authority that is responsible for signing a certificate that you can trust on the Internet.
Since we are talking about Dev and Lab use cases, we are creating a self signed certificate.
3) Create OpenSSL Certificate with Ansible
In the examples shown in this article, the private key is named hostname_privkey.pem, the certificate file is hostname_fullchain.pem, and the CSR file is hostname.csr, where hostname is the actual DNS for which the certificate was generated.
Before we start
$ sudo dnf install ansible
$ sudo yum -y install epel-release
$ sudo yum install ansible
$ sudo apt update
$ sudo apt install software-properties-common
$ sudo apt-add-repository --yes --update ppa:ansible/ansible
$ sudo apt install ansible
$ echo "deb http://ppa.launchpad.net/ansible/ansible/ubuntu trusty main" | sudo tee -a /etc/apt/sources.list
$ sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 93C4A3FD7BB9C367
$ sudo apt update
$ sudo apt install ansible
$ pacman -S ansible
Confirm the Ansible installation by checking the version.
$ ansible --version
ansible --version
ansible 2.9.11
config file = None
configured module search path = ['/usr/share/ansible/plugins/modules']
ansible python module location = /usr/local/Cellar/ansible/2.9.11/libexec/lib/python3.8/site-packages/ansible
executable location = /usr/local/bin/ansible
python version = 3.8.5 (default, Jul 21 2020, 10:48:26) [Clang 11.0.3 (clang-1103.0.32.62)]
Install dependencies
pyOpenSSL is required to generate keys and certificates using Ansible.
$ sudo pip install pyOpenSSL
$ sudo pip3 install pyOpenSSL
Writing an Ansible playbook to generate a self signed certificate
With the dependencies installed, we need to start creating the certificate using Ansible.
We will make a single playbook with tasks for creating a private key, CSR and certificate.
I'll walk through each feature block by block, and later we'll combine everything to get a working playbook.
Create project folders:
$ mkdir -p ~/projects/ansible/{certificates,files,templates}
$ cd ~/projects/
$ tree
.
`-- ansible
|-- certificates
|-- files
`-- templates
4 directories, 0 files
Create a playbook template
$ vim ~/projects/ansible/openssl_certificates.yml
Add standard sections.
---
- hosts: localhost
vars:
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Why transfer data in HTTP headers :
1) Usually, predictable technical information is conveyed in HTTP headers, so not all programs for logging and traffic analysis have the function of saving the contents of HTTP headers. For example, Apache usually (it depends on the setting of the log format) stores such HTTP header fields as Referer and User-Agent . If you want, you can configure Apache to save the data submitted by the POST method, but this is usually not done, since the logs begin to take up too much space.
2) As for storing other HTTP header fields, this is in principle possible, but this requires enabling and configuring the mod_log_forensic module , this also happens infrequently, plus storing a large amount of practically unnecessary data.
3) Therefore, there are certain reasons to use HTTP headers for data transfer, since GET requests are saved almost always, POST requests are rarely saved, and HTTP headers are almost never saved.
4) Among the popular applications that use the HTTP header field to transfer data, you can at first recall PhpSploit - "a hidden framework for subsequent exploitation", in short, a Trojan, a PHP backdoor for web servers.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Why transfer data in HTTP headers :
1) Usually, predictable technical information is conveyed in HTTP headers, so not all programs for logging and traffic analysis have the function of saving the contents of HTTP headers. For example, Apache usually (it depends on the setting of the log format) stores such HTTP header fields as Referer and User-Agent . If you want, you can configure Apache to save the data submitted by the POST method, but this is usually not done, since the logs begin to take up too much space.
2) As for storing other HTTP header fields, this is in principle possible, but this requires enabling and configuring the mod_log_forensic module , this also happens infrequently, plus storing a large amount of practically unnecessary data.
3) Therefore, there are certain reasons to use HTTP headers for data transfer, since GET requests are saved almost always, POST requests are rarely saved, and HTTP headers are almost never saved.
4) Among the popular applications that use the HTTP header field to transfer data, you can at first recall PhpSploit - "a hidden framework for subsequent exploitation", in short, a Trojan, a PHP backdoor for web servers.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦good for bypass steam ban
β-Valve Anti-Cheat bypass testedβ
https://github.com/danielkrupinski/VAC-Bypass
β-Valve Anti-Cheat bypass testedβ
https://github.com/danielkrupinski/VAC-Bypass
GitHub
GitHub - danielkrupinski/VAC-Bypass: Valve Anti-Cheat bypass written in C.
Valve Anti-Cheat bypass written in C. Contribute to danielkrupinski/VAC-Bypass development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST NETWORK HACKING :
ARP Poisoning and Sniffing
DHCP Discover and Starvation
Subdomains Identification
Certificate Cloning
TCP Analysis (ISN, Flags)
Username check on social networks
Web Techonologies Identification
and a lot more!
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/fportantier/habu.git
2) cd habu
3) habu.arp.ping [OPTIONS] IP
A) Send ARP packets to check if a host it's alive in the local network.
Example:
# habu.arp.ping 192.168.0.1
Ether / ARP is at a4:08:f5:19:17:a4 says 192.168.0.1 / Padding
Options:
-i TEXT Interface to use
-v Verbose output
--help Show this message and exit.
habu.arp.poison
Usage: habu.arp.poison [OPTIONS] VICTIM1 VICTIM2
B) Send ARP 'is-at' packets to each victim, poisoning their ARP tables for
send the traffic to your system.
Note: If you want a full working Man In The Middle attack, you need to
enable the packet forwarding on your operating system to act like a
router. You can do that using:
# echo 1 > /proc/sys/net/ipv4/ip_forward
Example:
# habu.arpoison 192.168.0.1 192.168.0.77
Ether / ARP is at f4:96:34:e5:ae:1b says 192.168.0.77
Ether / ARP is at f4:96:34:e5:ae:1b says 192.168.0.70
Ether / ARP is at f4:96:34:e5:ae:1b says 192.168.0.77
...
Options:
-i TEXT Interface to use
-v Verbose
--help Show this message and exit.
habu.arp.sniff
Usage: habu.arp.sniff [OPTIONS]
C) Listen for ARP packets and show information for each device.
Columns: Seconds from last packet | IP | MAC | Vendor
Example:
1 192.168.0.1 a4:08:f5:19:17:a4 Sagemcom Broadband SAS
7 192.168.0.2 64:bc:0c:33:e5:57 LG Electronics (Mobile Communications)
2 192.168.0.5 00:c2:c6:30:2c:58 Intel Corporate
6 192.168.0.7 54:f2:01:db:35:58 Samsung Electronics Co.,Ltd
Options:
-i TEXT Interface to use
--help Show this message and exit.
habu.asydns
Usage: habu.asydns [OPTIONS]
D) Requests a DNS domain name based on public and private RSA keys using the
AsyDNS protocol https://github.com/portantier/asydns
AND MUCH MORE
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST NETWORK HACKING :
ARP Poisoning and Sniffing
DHCP Discover and Starvation
Subdomains Identification
Certificate Cloning
TCP Analysis (ISN, Flags)
Username check on social networks
Web Techonologies Identification
and a lot more!
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/fportantier/habu.git
2) cd habu
3) habu.arp.ping [OPTIONS] IP
A) Send ARP packets to check if a host it's alive in the local network.
Example:
# habu.arp.ping 192.168.0.1
Ether / ARP is at a4:08:f5:19:17:a4 says 192.168.0.1 / Padding
Options:
-i TEXT Interface to use
-v Verbose output
--help Show this message and exit.
habu.arp.poison
Usage: habu.arp.poison [OPTIONS] VICTIM1 VICTIM2
B) Send ARP 'is-at' packets to each victim, poisoning their ARP tables for
send the traffic to your system.
Note: If you want a full working Man In The Middle attack, you need to
enable the packet forwarding on your operating system to act like a
router. You can do that using:
# echo 1 > /proc/sys/net/ipv4/ip_forward
Example:
# habu.arpoison 192.168.0.1 192.168.0.77
Ether / ARP is at f4:96:34:e5:ae:1b says 192.168.0.77
Ether / ARP is at f4:96:34:e5:ae:1b says 192.168.0.70
Ether / ARP is at f4:96:34:e5:ae:1b says 192.168.0.77
...
Options:
-i TEXT Interface to use
-v Verbose
--help Show this message and exit.
habu.arp.sniff
Usage: habu.arp.sniff [OPTIONS]
C) Listen for ARP packets and show information for each device.
Columns: Seconds from last packet | IP | MAC | Vendor
Example:
1 192.168.0.1 a4:08:f5:19:17:a4 Sagemcom Broadband SAS
7 192.168.0.2 64:bc:0c:33:e5:57 LG Electronics (Mobile Communications)
2 192.168.0.5 00:c2:c6:30:2c:58 Intel Corporate
6 192.168.0.7 54:f2:01:db:35:58 Samsung Electronics Co.,Ltd
Options:
-i TEXT Interface to use
--help Show this message and exit.
habu.asydns
Usage: habu.asydns [OPTIONS]
D) Requests a DNS domain name based on public and private RSA keys using the
AsyDNS protocol https://github.com/portantier/asydns
AND MUCH MORE
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - fportantier/habu: Hacking Toolkit
Hacking Toolkit. Contribute to fportantier/habu development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Creating a project on OpenShift :
1) Create a project on OpenShift.
This can be done using the command line interface or the web console.
$ oc new-project test
Now using project "test" on server "https://api.devocp.example.com:6443".
2) Then you can list all available projects to make sure the one you just created is available.
$ oc get projects
Granting user access to an OpenShift project
3) You must have users who already have access to the OpenShift cluster before you can grant them permission to access the project.
There are several providers that can be used to authenticate users in OpenShift, such as HTPassw:
π¦OpenShift / OKD user management with HTPasswd indentity provider:
You can get a list of users who are already logged into the cluster with the oc get users command:
$ oc get users
JKMUTAI 17a06002-b543-4fa9-bfa8-92e510646d0a Josphat Mutai
4) Give the user access to the rolebinding project.
The syntax used is:
$ oc adm policy add-role-to-user <role> <user> -n <projectname>
To assign the edit role to user JKMUTAI in the test project (test), I will run the following commands.
$ oc adm policy add-role-to-user edit JKMUTAI -n test
clusterrole.rbac.authorization.k8s.io/edit added: "JKMUTAI"
For Cluster role use command:
$ oc adm policy add-cluster-role-to-user edit JKMUTAI -n test
5) To remove a user role use:
$ oc adm policy remove-role-from-user <role> <user> -n <projectname>
$ oc adm policy remove-cluster-role-from-user <role> <user> -n <projectname>
6) If you want to get a list of users who have access to the project, run the following command:
$ oc get rolebindings -n <projectname>
$ oc get rolebindings <rolename> -n <projectname>
You can log in from the CLI or Console and confirm that you can switch to the project to deploy applications.
$ oc login
Switch to the project with the command:
$ oc project test
Already on project "test" on server "https://api.example.com:6443".
7) Deploy the test application.
oc apply -f - <<EOF
apiVersion: v1
kind: Pod
metadata:
name: command-demo
labels:
purpose: demonstrate-command
spec:
containers:
- name: command-demo-container
image: debian
command: ["printenv"]
args: ["HOSTNAME", "KUBERNETES_PORT"]
restartPolicy: OnFailure
EOF
8) Confirm that the container is running:
$ oc get pods
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Creating a project on OpenShift :
1) Create a project on OpenShift.
This can be done using the command line interface or the web console.
$ oc new-project test
Now using project "test" on server "https://api.devocp.example.com:6443".
2) Then you can list all available projects to make sure the one you just created is available.
$ oc get projects
Granting user access to an OpenShift project
3) You must have users who already have access to the OpenShift cluster before you can grant them permission to access the project.
There are several providers that can be used to authenticate users in OpenShift, such as HTPassw:
π¦OpenShift / OKD user management with HTPasswd indentity provider:
You can get a list of users who are already logged into the cluster with the oc get users command:
$ oc get users
JKMUTAI 17a06002-b543-4fa9-bfa8-92e510646d0a Josphat Mutai
4) Give the user access to the rolebinding project.
The syntax used is:
$ oc adm policy add-role-to-user <role> <user> -n <projectname>
To assign the edit role to user JKMUTAI in the test project (test), I will run the following commands.
$ oc adm policy add-role-to-user edit JKMUTAI -n test
clusterrole.rbac.authorization.k8s.io/edit added: "JKMUTAI"
For Cluster role use command:
$ oc adm policy add-cluster-role-to-user edit JKMUTAI -n test
5) To remove a user role use:
$ oc adm policy remove-role-from-user <role> <user> -n <projectname>
$ oc adm policy remove-cluster-role-from-user <role> <user> -n <projectname>
6) If you want to get a list of users who have access to the project, run the following command:
$ oc get rolebindings -n <projectname>
$ oc get rolebindings <rolename> -n <projectname>
You can log in from the CLI or Console and confirm that you can switch to the project to deploy applications.
$ oc login
Switch to the project with the command:
$ oc project test
Already on project "test" on server "https://api.example.com:6443".
7) Deploy the test application.
oc apply -f - <<EOF
apiVersion: v1
kind: Pod
metadata:
name: command-demo
labels:
purpose: demonstrate-command
spec:
containers:
- name: command-demo-container
image: debian
command: ["printenv"]
args: ["HOSTNAME", "KUBERNETES_PORT"]
restartPolicy: OnFailure
EOF
8) Confirm that the container is running:
$ oc get pods
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SpeeduP Linux Tips:
> Reduce the default grub load time:
>Manage startup applications:
>Install preload to speed up application load time:
>Choose the best mirror for software updates:
>Use apt-fast instead of apt-get for a speedy update:
>Remove language related ign from apt-get update:
>Reduce overheating by disabling system services
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SpeeduP Linux Tips:
> Reduce the default grub load time:
>Manage startup applications:
>Install preload to speed up application load time:
>Choose the best mirror for software updates:
>Use apt-fast instead of apt-get for a speedy update:
>Remove language related ign from apt-get update:
>Reduce overheating by disabling system services
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦DOM-based or local XSS
Based on DOM or local XSS attacks. Generally, a free wifi is provided, but a gateway that provides free wifi will insert a script into any page you visit or directly return a phishing page, thereby implanting malicious scripts. This kind of direct existence on the page without returning from the server is a local XSS attack.
Example 1:
1. Provide a free wifi.
1. Start a special DNS service, resolve all domain names to our computer, and set the Wifi DHCP-DNS to our computer IP.
2. After the user connected to wifi opens any website, the request will be intercepted by us. We forward to the real server according to the host field in the http header.
3. After receiving the data returned by the server, we can inject the webpage script and return it to the user.
4. When the injected script is executed, the user's browser will preload the common script libraries of major websites in turn.
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦DOM-based or local XSS
Based on DOM or local XSS attacks. Generally, a free wifi is provided, but a gateway that provides free wifi will insert a script into any page you visit or directly return a phishing page, thereby implanting malicious scripts. This kind of direct existence on the page without returning from the server is a local XSS attack.
Example 1:
1. Provide a free wifi.
1. Start a special DNS service, resolve all domain names to our computer, and set the Wifi DHCP-DNS to our computer IP.
2. After the user connected to wifi opens any website, the request will be intercepted by us. We forward to the real server according to the host field in the http header.
3. After receiving the data returned by the server, we can inject the webpage script and return it to the user.
4. When the injected script is executed, the user's browser will preload the common script libraries of major websites in turn.
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π What process is listening on a port on Windows?
1) Using the command line
Use the following command to find out the process id (pid) listening on port 433 .
You can change this value to look for a different port.
netstat -aon | findstr ": 443" | findstr "LISTENING"
Conclusion:
TCP 0.0.0.0:443 0.0.0.0 0 LISTENING 2180
TCP 127.0.0.1:44312 0.0.0.0 0 LISTENING 4620
TCP [::]: 443 [::]: 0 LISTENING 2180
The last column of the output displays the process ID.
The output shows the pid is 2189 and 4620 for processes listening on port 443.
Use this process ID with the task list command to find the process name.
tasklist / fi "pid eq 2190"
2) Using PowerShell Get-Process
The second method uses a PowerShell command to identify the process running on a specific port on Windows.
Start a PowerShell terminal and run the following command to find the name of the process running on port 443.
You can change the port number to check for other ports.
Get-Process -Id (Get-NetTCPConnection -LocalPort 443) .OwningProcess
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π What process is listening on a port on Windows?
1) Using the command line
Use the following command to find out the process id (pid) listening on port 433 .
You can change this value to look for a different port.
netstat -aon | findstr ": 443" | findstr "LISTENING"
Conclusion:
TCP 0.0.0.0:443 0.0.0.0 0 LISTENING 2180
TCP 127.0.0.1:44312 0.0.0.0 0 LISTENING 4620
TCP [::]: 443 [::]: 0 LISTENING 2180
The last column of the output displays the process ID.
The output shows the pid is 2189 and 4620 for processes listening on port 443.
Use this process ID with the task list command to find the process name.
tasklist / fi "pid eq 2190"
2) Using PowerShell Get-Process
The second method uses a PowerShell command to identify the process running on a specific port on Windows.
Start a PowerShell terminal and run the following command to find the name of the process running on port 443.
You can change the port number to check for other ports.
Get-Process -Id (Get-NetTCPConnection -LocalPort 443) .OwningProcess
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Basic Linux commands:
pwd. List the current (working) directory. [user @ testhost ~] $ pwd / home / user.
date. Display the current date and time of the system.
w. This command shows who is logged in to the system.
ls. Print directory contents.
cd. Change the current directory.
mkdir. Create directory.
rm. Delete a file.
cp. Copy file or directory.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Basic Linux commands:
pwd. List the current (working) directory. [user @ testhost ~] $ pwd / home / user.
date. Display the current date and time of the system.
w. This command shows who is logged in to the system.
ls. Print directory contents.
cd. Change the current directory.
mkdir. Create directory.
rm. Delete a file.
cp. Copy file or directory.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦100% working way to remove protection from Excel document with and without password :
https://www.linkconnector.com/ta.php?lc=155151095842006248&lcpt=1&lcpf=0
https://www.linkconnector.com/ta.php?lc=155151095842006248&lcpt=1&lcpf=0
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How Night Shift on Unsupported Macs ?
MacBookPro9,x
iMacPro1,x
iMac13,x
Macmini6,x
MacBookAir5,x
MacPro6,x
MacBook8,x
π»π΄π 'π π π π°π π :
1) Open the Installer in the Root of the Repository
https://github.com/TMRJIJ/Night-Shift-on-Unsupported-Macs
2) Follow the steps and agree to the terms
3) Accept & Install
4) Upon Completion, Restart your Mac
5) You will see that the Night Shift tab is now available in System Preferences > Display as well as the toggle at the top of your Notification Center.
6) Open the Terminal app in your Applications Folder
7) Drag the 'Enable NightShift.sh' into the Terminal Window
Following the instructions
8) After Patching. Restart your Mac.
9) You will see that the Night Shift tab is now available in System Preferences > Display as well as the toggle at the top of your Notification Center.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How Night Shift on Unsupported Macs ?
MacBookPro9,x
iMacPro1,x
iMac13,x
Macmini6,x
MacBookAir5,x
MacPro6,x
MacBook8,x
π»π΄π 'π π π π°π π :
1) Open the Installer in the Root of the Repository
https://github.com/TMRJIJ/Night-Shift-on-Unsupported-Macs
2) Follow the steps and agree to the terms
3) Accept & Install
4) Upon Completion, Restart your Mac
5) You will see that the Night Shift tab is now available in System Preferences > Display as well as the toggle at the top of your Notification Center.
6) Open the Terminal app in your Applications Folder
7) Drag the 'Enable NightShift.sh' into the Terminal Window
Following the instructions
8) After Patching. Restart your Mac.
9) You will see that the Night Shift tab is now available in System Preferences > Display as well as the toggle at the top of your Notification Center.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - TMRJIJ/Night-Shift-on-Unsupported-Macs: Enable Night Shift on older Unsupported Macs
Enable Night Shift on older Unsupported Macs. Contribute to TMRJIJ/Night-Shift-on-Unsupported-Macs development by creating an account on GitHub.
π¦best wireless debugging for android devices :
https://dl.google.com/android/repository/platform-tools-latest-windows.zip (debug via windows)
https://dl.google.com/android/repository/platform-tools-latest-windows.zip (debug via windows)
Forwarded from UNDERCODE NEWS
Appleβs official website enters maintenance status: iPhone 12mini opens pre-order tonight.
#international
#international