UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Eight departments: In 2025, express e-commerce mail can effectively no longer be repackaged.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How do I know which process is listening on a specific port in the Windows operating system?
This article will help you find the name of the process listening on a specific port on a Windows system.

Sometimes, when installing an application, you might encounter a " port in use " problem .

You can choose one of the two methods below.

The first method uses netstat to find the pid of the process listening on a specific port, then uses the task list to find the process name by pid.

2) Using the command line
Use the following command to find out the process id (pid) listening on port 433 .

You can change this value to look for a different port.

netstat -aon | findstr ": 443" | findstr "LISTENING"
Conclusion:

TCP 0.0.0.0:443 0.0.0.0 0 LISTENING 2180
TCP 127.0.0.1:44312 0.0.0.0 0 LISTENING 4620
TCP [::]: 443 [::]: 0 LISTENING 2180


2) The last column of the output displays the process ID.

The output will shows on your screan the pid is 2189 and 4620 for processes listening on port 443.

Use this process ID with the task list command to find the process name.

tasklist / fi "pid eq 2190"

3) Using PowerShell Get-Process
The second method uses a PowerShell command to identify the process running on a specific port on Windows.

Start a PowerShell terminal and run the following command to find the name of the process running on port 443.

You can change the port number to check for other ports.

Get-Process -Id (Get-NetTCPConnection -LocalPort 443) .OwningProcess

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Accelerating the growth of the modern automotive energy market.
#international
Forwarded from UNDERCODE NEWS
Google & youtube
Having maintenance now, for updates, use vpn to Saudy, and it work’s well
Forwarded from UNDERCODE NEWS
Vishing: beware of scams of the latest kind.
#CyberAttacks
Forwarded from UNDERCODE NEWS
An attack or technical problem? Google server downtime issue, and all google services such Gmail, YouTube, Google Docs.. down!
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ–§ How to keep iptables firewall rules on Linux forever?

1) Permanently saving iptables firewall rules on Linux
You need to use the following commands to keep your iptables firewall rules permanently:

Iptables-save or ip6tables-save command - saves or dumps the contents of IPv4 or IPv6 tables in an easily parsed format to the screen or to a specified file.
Iptables-restore command or ip6tables-restore command -

2) Restores IPv4 or IPv6 firewall rules and tables from a given file on Linux.
Step 1 - Open Terminal
Open a terminal application and enter the following commands.

3) To log into a remote server using the ssh command:

$ ssh admin@server1.iundercode.help

You must enter the following command as root using the sudo or su command.

Step 2. Save the Linux firewall rules for IPv4 and IPv6.
Debian ΠΈ Ubuntu Linux:

$ sudo /sbin/iptables-save > /etc/iptables/rules.v4
## IPv6 ##
$ sudo /sbin/ip6tables-save > /etc/iptables/rules.v6

CentOS / RHEL:

$ sudo /sbin/iptables-save > /etc/sysconfig/iptables
## IPv6 ##
$ sudo /sbin/ip6tables-save > /etc/sysconfig/ip6tables

4) Displaying saved rules on Linux
We can display the saved file using cat command or search using grep / egrep command:

$ cat /etc/iptables/rules.v4

Step 3. Restoring the Linux firewall rules for IPv4 and IPv6.
We'll just reverse the above commands in reverse order for each operating system:

## Debian or Ubuntu ##
$ sudo /sbin/iptables-restore < /etc/iptables/rules.v4
$ sudo /sbin/ip6tables-restore < /etc/iptables/rules.v6
## CentOS/RHEL ##
$ sudo /sbin/iptables-save < /etc/sysconfig/iptables
$ sudo /sbin/ip6tables-save < /etc/sysconfig/ip6tables

Step 4 - Installing the iptables-persistent package for Debian or Ubuntu Linux

5) Note that the following command will conflict with iptables interfaces such as ufw or firewall-cmd. Avoid using the following packages if you are using these tools.
We need to install iptables-persistent.
It will act as a loader for Netfilter rules, the iptables netfilter-persistent plugin, which is a loader for Netfilter configuration using a plugin based architecture.
In other words, automatic loading of saved iptables rules from above files.

6) Enter the following apt command or apt-get command:
$ sudo apt install iptables-persistent
$ sudo apt-get install iptables-persistent

7) Make sure services are enabled on Debian or Ubuntu using the systemctl command:
$ sudo systemctl is-enabled netfilter-persistent.service
If not, enable:
$ sudo systemctl enable netfilter-persistent.service
Checking status:
$ sudo systemctl status netfilter-persistent.service

Step 5 - Install the iptables-services package for RHEL / CentOS
By default, RHEL / CentOS 7 or 8 comes with firewalld.

If you want a good old file firewall, enter the following commands:

$ sudo systemctl stop firewalld.service
$ sudo systemctl disable firewalld.service
$ sudo systemctl mask firewalld.service
$ sudo yum install iptables-services
$ sudo systemctl enable iptables
$ sudo systemctl enable ip6tables
$ sudo systemctl status iptables

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Fiji Miner Botnet, which bloomed in the debate on vulnerability, mines cryptocurrency.
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Is Tor Safe?


1) That seems to be the question, alright. And to that, well, it really depends on whom you ask, because there are always wolves in sheep's clothing out there who stand to gain from your ignorance. Many say no. A few say yes. The media, for all their expertise in things political and social, come up woefully lacking when something as complex as Tor is discussed.

2) Case in point: Gizmodo reported that in December, 2014, a group of hackers managed to compromise enough Tor relays to decloak Tor users. If you're just hearing this for the first time, part of what makes Tor anonymous is that it relays your data from one node to another. It was believed that if they compromised enough of them, then they could track individual users on the Tor network and reveal their real life identities. Kind of like how the agents in The Matrix find those who've been unplugged.

3) Anyway as luck would have it, it turned out to be kiddie script-hackers with too much time on their hands who simply wanted a new target to hack. Who knows why. Could be that they'd toyed with the Playstation Network and Xbox users long enough and simply wanted a curious peak here and there. These were not superhacker-level NSA members, either.

4) But as is usually the case with the media, this attack attracted the attention of a few bloggers and tech journalists unsympathetic to Tor and frankly, ignorant of what really constitutes a threat. The Tor devs commented on it, too:

"This looks like a regular attempt at a Sybil attack: the attackers have signed up many new relays in hopes of becoming a large fraction of the network. But even though they are running thousands of new relays, their relays currently make up less than 1% of the Tor network by capacity. We are working now to remove these relays from the network before they become a threat, and we don't expect any anonymity or performance effects based on what we've seen so far."

(from tor book)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The 5G security forum is held by the Korea Information Security Industry Association.
#international
Forwarded from UNDERCODE NEWS
Oracle escapes from Silicon Valley. Experts: Wow, how the state-owned company collapsed!
#international
Forwarded from UNDERCODE NEWS
Satellite positioning tracking systems to apply to high-precision positioning and autonomous driving with Super Formula at 290 km / h
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Redis different data types usage scenario code examples:

1) String
The String data structure is a simple key-value type, and the value can be not only a String, but also a number.
Conventional key-value cache application;
Regular counting: the number of Weibo, the number of fans, etc.

2) hash
Redis hash is a mapping table between field and value of string type, and hash is particularly suitable for storing objects.
Store some changed data, such as user information, etc.

3) list

A list is a linked list, and anyone with a little knowledge of data structure should be able to understand its structure. Using the Lists structure, we can easily realize the latest news ranking and other functions. Another application of List is the message queue. You can use the PUSH operation of the List to store tasks in the List, and then the worker thread will use the POP operation to take out the tasks for execution. Redis also provides an api to manipulate a certain section of the List. You can directly query and delete a certain section of the List.
Redis's list is a doubly linked list in which each child element is of type String. You can add or delete elements from the head or tail of the list through push and pop operations, so that the List can be used as a stack or a queue.

4) Message queue system
Use list to build a queue system, and use sorted set to build a priority queue system.
For example: The Redis as the log collector
is actually still a queue multiple endpoints writes log information Redis, then a worker will unify all logs to disk.

The operation of fetching the latest N data

//Add the current login person to the linked list
ret = r.lpush("login:last_login_times", uid)
//Keep only N bits in the linked list
ret = redis.ltrim("login:last_login_times", 0, N-1)
/ /Get the list of the first N latest login user IDs
last_login_list = r.lrange("login:last_login_times", 0, N-1)
For example, Sina Weibo:
In Redis, our latest Weibo ID uses a resident cache, which is always updated. However, the limit cannot exceed 5000 IDs, so the function that gets IDs will always ask Redis. Only when the start/count parameter exceeds this range, you need to access the database.


> The system does not "refresh" the cache like the traditional way, and the information in the Redis instance is always consistent. The SQL database (or other types of databases on the hard disk) is only triggered when the user needs to get "very far away" data, and the homepage or the first comment page will not bother the database on the hard disk.

5) set

A set is a collection, and the concept of a collection is a combination of unique values. Using the set data structure provided by Redis, some collective data can be stored. The elements in the set are in no order.

Case:
In the Weibo application, all the followers of a user can be stored in a collection, and all its fans can be stored in a collection. Redis also provides operations such as intersection, union, and difference for collections, which can easily implement functions such as common attention, common preference, and second-degree friends. For all the above collection operations, you can also use different command options Whether to return the result to the client or save the collection to a new collection.

Intersection, union, difference

//The book table stores the book name
set book:1:name "The Ruby Programming Language"
set book:2:name "Ruby on rail"
set book:3:name "Programming Erlang"

//tag table uses sets to store data, because sets are good at intersection and union
sadd tag:ruby 1
sadd tag:ruby 2
sadd tag:web 2
sadd tag:erlang 3



▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Not only google and youtube. Down network: Tim, WindTre, Vodafone and Iliad, here are today's problems
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

HACKING RESOURCES "

- [pwnsecurity.net](http://www.pwnsecurity.net/) - by [Shashank](https://twitter.com/cyberboyIndia)

- [breaksec.com](https://www.breaksec.com/) - by [Nir Goldshlager]

- [pwndizzle.blogspot.in](http://pwndizzle.blogspot.in/) - by [Alex Davies]

- [c0rni3sm.blogspot.in](http://c0rni3sm.blogspot.in/) - by [yappare

- [exploit.co.il/blog](http://exploit.co.il/blog/) - by [Shai rod]

- [ibreak.software](https://ibreak.software/) - by [Riyaz Ahemed Walikar]

- [panchocosil.blogspot.in](http://panchocosil.blogspot.in/) - by [Francisco Correa]

- [breakingmesh.blogspot.in](http://breakingmesh.blogspot.in/)

- [websecresearch.com](http://www.websecresearch.com/) - by [ Ajay Singh Negi]

- [securitylearn.net](http://www.securitylearn.net/about/) - by [Satish Bommisetty]

- [secinfinity.net](http://www.secinfinity.net/) - by Prakash Sharma

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Just like an orange! U.S. Observatory released the clearest sunspot photo in history
#Updates
Forwarded from UNDERCODE NEWS
Personal data leak in real estate brokerage scheme, 1st year in progress'
#Leaks