Forwarded from UNDERCODE NEWS
It's rumored that Russian hackers have infiltrated the U.S. Department of Treasury/Commerce network for email tracking.
#CyberAttacks
#CyberAttacks
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Auto schedules and executes queries :
A service that schedules and executes queries against a relational database and writes the output to files on the local filesystem or S3:
The minimum requirement is a config.yml file. The main sections of the config include:
sqlagent - The connection info to the SQL Agent service.
connections - A map of database connection info by name.
queries - An array of queries defined inline or referencing a file.
schedule - The schedule to run this set of queries.
Additional options are provided to define where files are written and their format.
D e p l o y m e n t :
1) download https://github.com/chop-dbhi/sql-extractor
The dep tool is used for managing dependencies. Install by running:
2) deploy
go get github.com/golang/dep/...
3) Then run the following to install the dependencies:
dep ensure
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Auto schedules and executes queries :
A service that schedules and executes queries against a relational database and writes the output to files on the local filesystem or S3:
The minimum requirement is a config.yml file. The main sections of the config include:
sqlagent - The connection info to the SQL Agent service.
connections - A map of database connection info by name.
queries - An array of queries defined inline or referencing a file.
schedule - The schedule to run this set of queries.
Additional options are provided to define where files are written and their format.
D e p l o y m e n t :
1) download https://github.com/chop-dbhi/sql-extractor
The dep tool is used for managing dependencies. Install by running:
2) deploy
go get github.com/golang/dep/...
3) Then run the following to install the dependencies:
dep ensure
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - chop-dbhi/sql-extractor
Contribute to chop-dbhi/sql-extractor development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to properly protect sysctl on Linux from spoofing and Syn flooding ??
1) This configuration will be as follows:
Disable IP forwarding
Disable packet forwarding
Disable accepting ICMP redirects
Enable protection against incorrect error messages
What you need:
Linux
2) User with sudo privileges
Note: I will be demonstrating an example on Ubuntu Server 18.04, but the process is the same for most Linux distributions.
3) How to edit sysctl config file
Log into your Linux server or desktop and open a terminal window.
4) In the terminal enter the command:
sudo nano /etc/sysctl.conf
5) First required parameter:
# net.ipv4.ip_forward = 1
change to:
net.ipv4.ip_forward = 0
6) Next line:
# net.ipv4.conf.all.send_redirects = 0
change to:
net.ipv4.conf.all.send_redirects = 0
7) Find the line:
# net.ipv4.conf.all.accept_redirects = 0
change to:
net.ipv4.conf.all.accept_redirects = 0
8) Add the following line below this:
net.ipv4.conf.default.accept_redirects = 0
9) Finally, add the following lines to the end of the file:
net.ipv4.icmp_ignore_bogus_error_responses = 1
net.ipv4.tcp_syncookies = 1
net.ipv4.tcp_max_syn_backlog = 2048
net.ipv4.tcp_synack_retries = 3
net.ipv4.netfilter.ip_conntrack_tcp_timeout_syn_recv = 45
The above settings do the following:
10 ) Includes protection against incorrect error messages
Enable SYN cookies to prevent the server from dropping connections when the SYN queue is full
Increase SYS queue size to 2048
W akryvayut state SYN_RECV compound pre
Decrease SYN_RECV timeout value to help mitigate SYN flood attack
Save and close the file.
11) How to reload the configuration
You can reload the configuration with the command:
sudo sysctl -p
I found that the sysctl -p command did not load the tcp_max_syn_backlog correctly.
Only after a reboot was the value 2048 added.
So, after running the sudo sysctl -p command, enter the command:
sudo less / proc / sys / net / ipv4 / tcp_max_syn_backlog
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to properly protect sysctl on Linux from spoofing and Syn flooding ??
1) This configuration will be as follows:
Disable IP forwarding
Disable packet forwarding
Disable accepting ICMP redirects
Enable protection against incorrect error messages
What you need:
Linux
2) User with sudo privileges
Note: I will be demonstrating an example on Ubuntu Server 18.04, but the process is the same for most Linux distributions.
3) How to edit sysctl config file
Log into your Linux server or desktop and open a terminal window.
4) In the terminal enter the command:
sudo nano /etc/sysctl.conf
5) First required parameter:
# net.ipv4.ip_forward = 1
change to:
net.ipv4.ip_forward = 0
6) Next line:
# net.ipv4.conf.all.send_redirects = 0
change to:
net.ipv4.conf.all.send_redirects = 0
7) Find the line:
# net.ipv4.conf.all.accept_redirects = 0
change to:
net.ipv4.conf.all.accept_redirects = 0
8) Add the following line below this:
net.ipv4.conf.default.accept_redirects = 0
9) Finally, add the following lines to the end of the file:
net.ipv4.icmp_ignore_bogus_error_responses = 1
net.ipv4.tcp_syncookies = 1
net.ipv4.tcp_max_syn_backlog = 2048
net.ipv4.tcp_synack_retries = 3
net.ipv4.netfilter.ip_conntrack_tcp_timeout_syn_recv = 45
The above settings do the following:
10 ) Includes protection against incorrect error messages
Enable SYN cookies to prevent the server from dropping connections when the SYN queue is full
Increase SYS queue size to 2048
W akryvayut state SYN_RECV compound pre
Decrease SYN_RECV timeout value to help mitigate SYN flood attack
Save and close the file.
11) How to reload the configuration
You can reload the configuration with the command:
sudo sysctl -p
I found that the sysctl -p command did not load the tcp_max_syn_backlog correctly.
Only after a reboot was the value 2048 added.
So, after running the sudo sysctl -p command, enter the command:
sudo less / proc / sys / net / ipv4 / tcp_max_syn_backlog
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Eight departments: In 2025, express e-commerce mail can effectively no longer be repackaged.
#Updates
#Updates
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How do I know which process is listening on a specific port in the Windows operating system?
This article will help you find the name of the process listening on a specific port on a Windows system.
Sometimes, when installing an application, you might encounter a " port in use " problem .
You can choose one of the two methods below.
The first method uses netstat to find the pid of the process listening on a specific port, then uses the task list to find the process name by pid.
2) Using the command line
Use the following command to find out the process id (pid) listening on port 433 .
You can change this value to look for a different port.
netstat -aon | findstr ": 443" | findstr "LISTENING"
Conclusion:
TCP 0.0.0.0:443 0.0.0.0 0 LISTENING 2180
TCP 127.0.0.1:44312 0.0.0.0 0 LISTENING 4620
TCP [::]: 443 [::]: 0 LISTENING 2180
2) The last column of the output displays the process ID.
The output will shows on your screan the pid is 2189 and 4620 for processes listening on port 443.
Use this process ID with the task list command to find the process name.
tasklist / fi "pid eq 2190"
3) Using PowerShell Get-Process
The second method uses a PowerShell command to identify the process running on a specific port on Windows.
Start a PowerShell terminal and run the following command to find the name of the process running on port 443.
You can change the port number to check for other ports.
Get-Process -Id (Get-NetTCPConnection -LocalPort 443) .OwningProcess
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How do I know which process is listening on a specific port in the Windows operating system?
This article will help you find the name of the process listening on a specific port on a Windows system.
Sometimes, when installing an application, you might encounter a " port in use " problem .
You can choose one of the two methods below.
The first method uses netstat to find the pid of the process listening on a specific port, then uses the task list to find the process name by pid.
2) Using the command line
Use the following command to find out the process id (pid) listening on port 433 .
You can change this value to look for a different port.
netstat -aon | findstr ": 443" | findstr "LISTENING"
Conclusion:
TCP 0.0.0.0:443 0.0.0.0 0 LISTENING 2180
TCP 127.0.0.1:44312 0.0.0.0 0 LISTENING 4620
TCP [::]: 443 [::]: 0 LISTENING 2180
2) The last column of the output displays the process ID.
The output will shows on your screan the pid is 2189 and 4620 for processes listening on port 443.
Use this process ID with the task list command to find the process name.
tasklist / fi "pid eq 2190"
3) Using PowerShell Get-Process
The second method uses a PowerShell command to identify the process running on a specific port on Windows.
Start a PowerShell terminal and run the following command to find the name of the process running on port 443.
You can change the port number to check for other ports.
Get-Process -Id (Get-NetTCPConnection -LocalPort 443) .OwningProcess
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Google & youtube
Having maintenance now, for updates, use vpn to Saudy, and it workβs well
Having maintenance now, for updates, use vpn to Saudy, and it workβs well
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
An attack or technical problem? Google server downtime issue, and all google services such Gmail, YouTube, Google Docs.. down!
#Updates
#Updates
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to keep iptables firewall rules on Linux forever?
1) Permanently saving iptables firewall rules on Linux
You need to use the following commands to keep your iptables firewall rules permanently:
Iptables-save or ip6tables-save command - saves or dumps the contents of IPv4 or IPv6 tables in an easily parsed format to the screen or to a specified file.
Iptables-restore command or ip6tables-restore command -
2) Restores IPv4 or IPv6 firewall rules and tables from a given file on Linux.
Step 1 - Open Terminal
Open a terminal application and enter the following commands.
3) To log into a remote server using the ssh command:
$ ssh admin@server1.iundercode.help
You must enter the following command as root using the sudo or su command.
Step 2. Save the Linux firewall rules for IPv4 and IPv6.
Debian ΠΈ Ubuntu Linux:
$ sudo /sbin/iptables-save > /etc/iptables/rules.v4
## IPv6 ##
$ sudo /sbin/ip6tables-save > /etc/iptables/rules.v6
CentOS / RHEL:
$ sudo /sbin/iptables-save > /etc/sysconfig/iptables
## IPv6 ##
$ sudo /sbin/ip6tables-save > /etc/sysconfig/ip6tables
4) Displaying saved rules on Linux
We can display the saved file using cat command or search using grep / egrep command:
$ cat /etc/iptables/rules.v4
Step 3. Restoring the Linux firewall rules for IPv4 and IPv6.
We'll just reverse the above commands in reverse order for each operating system:
## Debian or Ubuntu ##
$ sudo /sbin/iptables-restore < /etc/iptables/rules.v4
$ sudo /sbin/ip6tables-restore < /etc/iptables/rules.v6
## CentOS/RHEL ##
$ sudo /sbin/iptables-save < /etc/sysconfig/iptables
$ sudo /sbin/ip6tables-save < /etc/sysconfig/ip6tables
Step 4 - Installing the iptables-persistent package for Debian or Ubuntu Linux
5) Note that the following command will conflict with iptables interfaces such as ufw or firewall-cmd. Avoid using the following packages if you are using these tools.
We need to install iptables-persistent.
It will act as a loader for Netfilter rules, the iptables netfilter-persistent plugin, which is a loader for Netfilter configuration using a plugin based architecture.
In other words, automatic loading of saved iptables rules from above files.
6) Enter the following apt command or apt-get command:
$ sudo apt install iptables-persistent
$ sudo apt-get install iptables-persistent
7) Make sure services are enabled on Debian or Ubuntu using the systemctl command:
$ sudo systemctl is-enabled netfilter-persistent.service
If not, enable:
$ sudo systemctl enable netfilter-persistent.service
Checking status:
$ sudo systemctl status netfilter-persistent.service
Step 5 - Install the iptables-services package for RHEL / CentOS
By default, RHEL / CentOS 7 or 8 comes with firewalld.
If you want a good old file firewall, enter the following commands:
$ sudo systemctl stop firewalld.service
$ sudo systemctl disable firewalld.service
$ sudo systemctl mask firewalld.service
$ sudo yum install iptables-services
$ sudo systemctl enable iptables
$ sudo systemctl enable ip6tables
$ sudo systemctl status iptables
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to keep iptables firewall rules on Linux forever?
1) Permanently saving iptables firewall rules on Linux
You need to use the following commands to keep your iptables firewall rules permanently:
Iptables-save or ip6tables-save command - saves or dumps the contents of IPv4 or IPv6 tables in an easily parsed format to the screen or to a specified file.
Iptables-restore command or ip6tables-restore command -
2) Restores IPv4 or IPv6 firewall rules and tables from a given file on Linux.
Step 1 - Open Terminal
Open a terminal application and enter the following commands.
3) To log into a remote server using the ssh command:
$ ssh admin@server1.iundercode.help
You must enter the following command as root using the sudo or su command.
Step 2. Save the Linux firewall rules for IPv4 and IPv6.
Debian ΠΈ Ubuntu Linux:
$ sudo /sbin/iptables-save > /etc/iptables/rules.v4
## IPv6 ##
$ sudo /sbin/ip6tables-save > /etc/iptables/rules.v6
CentOS / RHEL:
$ sudo /sbin/iptables-save > /etc/sysconfig/iptables
## IPv6 ##
$ sudo /sbin/ip6tables-save > /etc/sysconfig/ip6tables
4) Displaying saved rules on Linux
We can display the saved file using cat command or search using grep / egrep command:
$ cat /etc/iptables/rules.v4
Step 3. Restoring the Linux firewall rules for IPv4 and IPv6.
We'll just reverse the above commands in reverse order for each operating system:
## Debian or Ubuntu ##
$ sudo /sbin/iptables-restore < /etc/iptables/rules.v4
$ sudo /sbin/ip6tables-restore < /etc/iptables/rules.v6
## CentOS/RHEL ##
$ sudo /sbin/iptables-save < /etc/sysconfig/iptables
$ sudo /sbin/ip6tables-save < /etc/sysconfig/ip6tables
Step 4 - Installing the iptables-persistent package for Debian or Ubuntu Linux
5) Note that the following command will conflict with iptables interfaces such as ufw or firewall-cmd. Avoid using the following packages if you are using these tools.
We need to install iptables-persistent.
It will act as a loader for Netfilter rules, the iptables netfilter-persistent plugin, which is a loader for Netfilter configuration using a plugin based architecture.
In other words, automatic loading of saved iptables rules from above files.
6) Enter the following apt command or apt-get command:
$ sudo apt install iptables-persistent
$ sudo apt-get install iptables-persistent
7) Make sure services are enabled on Debian or Ubuntu using the systemctl command:
$ sudo systemctl is-enabled netfilter-persistent.service
If not, enable:
$ sudo systemctl enable netfilter-persistent.service
Checking status:
$ sudo systemctl status netfilter-persistent.service
Step 5 - Install the iptables-services package for RHEL / CentOS
By default, RHEL / CentOS 7 or 8 comes with firewalld.
If you want a good old file firewall, enter the following commands:
$ sudo systemctl stop firewalld.service
$ sudo systemctl disable firewalld.service
$ sudo systemctl mask firewalld.service
$ sudo yum install iptables-services
$ sudo systemctl enable iptables
$ sudo systemctl enable ip6tables
$ sudo systemctl status iptables
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Fiji Miner Botnet, which bloomed in the debate on vulnerability, mines cryptocurrency.
#Vulnerabilities
#Vulnerabilities