UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.9K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ–§ How to limit / decrease rsync transfer speed on Linux:

A) If you are using the rsync utility to synchronize your backups between servers or your local computer, you might want to prevent the script from using too much network bandwidth.

The point of limiting bandwidth is to keep your backup scripts from clogging up your network connection.

B) Naturally limiting the bandwidth your backups use will make them run slower.

Here's a common rsync command:

$ rsync –avz -e 'ssh' / path / to / source user @ remotehost: / path / to / dest /
What you need to do is use the –bwlimit parameter with a KB / s value, for example:
$ rsync –bwlimit = [kb / second] –avz -e 'ssh' / path / to / source user @ remotehost: / path / to / dest /
Thus, if you want to limit the transfer rate to 10,000 KB / s (9.7 MB / s), enter:
$ rsync –bwlimit = 10000 –avz -e 'ssh' / path / to / source user @ remotehost: / path / to / dest /
Here's a real world example:

rsync –bwlimit = 10000 –avz -e 'ssh' / backup / root@192.168.0.51: / backup /
In this example rsync will be capped at 10,000 kbps, or about 9.7 MB / s.
Using trickle

C) There is an alternative to the -bwlimit option.

You can also use the "trickle" command to limit the bandwidth of any application you run.

The trickle command syntax is:

$ trickle -u | -d [uploadLimit | downloadLimit] [app]
Where:

-u uploadLimit -> limits the upload bandwidth
-d downloadLimit -> limits the download bandwidth
app -> this is the application for which you want to limit the bandwidth, for example Rsync .
Thus, in our case, we will limit the bandwidth usage of the rsync command to 10,000KB / s using the following commands:
$ trickle -s -u 10000 -d 10000 rsync –avz -e 'ssh' / backup / root@192.168.0.51: / backup /


@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Should you use the Raspberry Pi 3 Model B + IN NETWORK HACKING ?
This model is also suitable for the purposes described above, since the Pi 3 Model B + has even more power compared to its younger brother, but we chose the Orange Pi Zero for the following reasons:

1) the cost of this gadget is almost 2 times lower than that of the Pi 3 Model B +, with similar characteristics, so its loss in case of detection or failure will not be as significant

2) the connection to the target router will be made via an Ethernet port, which the Pi Zero does not have, but here you can configure a gigabit network connection via a USB 2.0 port by purchasing an Ethernet-USB adapter

3) during testing, Orange Pi Zero shows much better performance compared to Raspberry Pi Zero, surpassing the Raspberry Pi 2 model, which has a larger form factor, in all respects, despite the fact that the price of these devices is about the same

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
MELSEC iQ-R Series PLC CPU unit resource exhaustion vulnerability.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Apple plans to destroy its mini-tablet, replacing it with a super-modern iPhone.
#Technologies
Forwarded from UNDERCODE NEWS
PS5 is finally available! Expert: Sony will make money mainly on it in the future.
#Technologies
Forwarded from UNDERCODE NEWS
YouTube suffered a global downtime, all video playback errors reported.
#Updates
Forwarded from UNDERCODE NEWS
All Microsoft Windows Users should update their systems.
A New Dangerous Microsoft Windows Print Spooler Vulnerability
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Line app for iPad introduces FIDO-based passwordless login function.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Free Credit card Updated 2020 :


https://www.oxigenwallet.com/

http://tracking.payoneer.com/SH2J0

https://revolut.ngih.net/c/393170/584909/9626?subId1=

https://www.microsoft.com/en-us/p/mb-way/9nblggh3vcn3?

https://www.vcpay.co.za/

https://www.zeta.tech/

https://www.freecharge.in/

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODER
Advised on caution on smishing text messages for iPhone hijacking from Naver account.
#Vulnerabilities

MORE INFO - https://undercodenews.com/advised-on-caution-on-smishing-text-messages-for-iphone-hijacking-from-naver-account/12/11/2020/
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘NETWORK HACKING :
SUBDOMAINE TAKE OVER...


πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) DOWNLOAD:

https://github.com/mhmdiaa/second-order

2) go get github.com/mhmdiaa/second-order
This will download the code, compile it, and leave a second-order binary in $GOPATH/bin.

πŸ¦‘Command line options
-base string
Base link to start scraping from (default "http://127.0.0.1")
-config string
Configuration file (default "config.json")
-debug
Print visited links in real-time to stdout
-output string
Directory to save results in (default "output")

πŸ¦‘Example

> go run second-order.go -base https://example.com -config

config.json -output example.com -concurrency 10
Configuration File

πŸ¦‘Example configuration file included (config.json)

F E A T U R E S :

Headers: A map of headers that will be sent with every request.
Depth: Crawling depth.

LogCrawledURLs: If this is set to true, Second Order will log the URL of every crawled page.

LogQueries: A map of tag-attribute queries that will be searched for in crawled pages. For example, β€œa”: β€œhref” means log every
href attribute of every a tag.

LogURLRegex: A list of regular expressions that will be matched against the URLs that are extracted using the queries in

LogQueries; if left empty, all URLs will be logged.

LogNon200Queries: A map of tag-attribute queries that will be searched for in crawled pages, and logged only if they don’t return a 200 status code.

ExcludedURLRegex: A list of regular expressions whose matching URLs will not be accessed by the tool.

ExcludedStatusCodes: A list of status codes; if any page responds with one of these, it will be excluded from the results of

LogNon200Queries; if left empty, all non-200 pages’ URLs will be logged.

LogInlineJS: If this is set to true, Second Order will log the contents of every script tag that doesn’t have a src attribute.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Today, NVIDIA Patches High-Risk Vulnerability In GeForce.
#Vulnerabilities #Updates #Bugs
Forwarded from UNDERCODE NEWS
Huawei plans to invest US$23 million in new data centre in Thailand.
#international
Forwarded from UNDERCODE NEWS
Samsung’s latest β€œsurround screen machine” patent is exposed: a screen is what you see!
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WHAT IS CAUSE OF VPN LEAK :

1
) IP leaks
IP leaks happen the moment your IP goes out of the VPN tunnel.

They are of two types:

IPv4 leaks - This happens when there are incorrect communication errors between your device and the VPN server, the VPN server is poorly configured, or your ISP or operating system is having problems connecting to the VPN server.
IPv6 leaks - such a leak occurs when the VPN does not support IPv6 traffic. Not many VPN providers provide this feature, and your IPv6 address will leak outside of the VPN tunnel.

2) DNS leaks
These leaks happen when your VPN does not route your DNS requests (website connection requests) through their own DNS server.

Instead, they go through your ISP's DNS server, which means they can see (and broadcast) which websites you are browsing.

3) WebRTC Leaks
WebRTC is an open source project that allows web browsers to support video calling, voice calling, and P2P exchange functions. WebRTC is also a major problem for VPNs as it can cause IP leaks.

4) Traffic leaks
This is when all your internet traffic is leaked through the VPN tunnel.

A traffic leak occurs the moment your VPN connection is interrupted - even if it only takes a few seconds.

This can happen if you are using a resource-intensive protocol, if the VPN server is very far from you, or if the VPN client simply crashed.

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁