Forwarded from UNDERCODE NEWS
Intel's sales this year will hit 75 billion US dollars, the highest results in 52 years.
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Encrypt a disk with cryptsetup
1. prepare the empty disk (sdc)
2. parted sdc
# parted /dev/sdc
> mktable
> mkpart
3. format drive as luks
# cryptsetup luksFormat /dev/sdc1
4. open luks
# cryptsetup luksOpen /dev/sdc1 NAME
(where NAME is a mapped device name,
which will be seen at /dev/mapper/${NAME}
here we assume NAME=luks
)
# ls /dev/mapper/
** luks
5. format volume inside luks
# mkfs.ext4 /dev/mapper/luks
OR
# mkfs.ext4 /dev/dm-0
6. mount this ext4 filesystem
# mount /dev/dm-0 /MOUNT_POINT
7. umount filesystem
# umount /MOUNT_POINT
8. close luks
# cryptsetup luksClose /dev/dm-0
encrypt a disk image with luks
------------------------------
0. create my symlink
# ln -s /sbin/cryptsetup /sbin/luks
1. prepare a blank image file, by using dd or truncate
# truncate -s 1G luks.img
2. setup the image file as loop device
# losetup -f luks.img
3. Format this (virtual) device with luks header
# luks luksFormat /dev/loop0
P.S. input uppercase 'YES', then input your password for key slot 0
4. Open device
# luks open /dev/loop0 luks0
# lsblk
π¦Encrypt a disk with cryptsetup
1. prepare the empty disk (sdc)
2. parted sdc
# parted /dev/sdc
> mktable
> mkpart
3. format drive as luks
# cryptsetup luksFormat /dev/sdc1
4. open luks
# cryptsetup luksOpen /dev/sdc1 NAME
(where NAME is a mapped device name,
which will be seen at /dev/mapper/${NAME}
here we assume NAME=luks
)
# ls /dev/mapper/
** luks
5. format volume inside luks
# mkfs.ext4 /dev/mapper/luks
OR
# mkfs.ext4 /dev/dm-0
6. mount this ext4 filesystem
# mount /dev/dm-0 /MOUNT_POINT
7. umount filesystem
# umount /MOUNT_POINT
8. close luks
# cryptsetup luksClose /dev/dm-0
encrypt a disk image with luks
------------------------------
0. create my symlink
# ln -s /sbin/cryptsetup /sbin/luks
1. prepare a blank image file, by using dd or truncate
# truncate -s 1G luks.img
2. setup the image file as loop device
# losetup -f luks.img
3. Format this (virtual) device with luks header
# luks luksFormat /dev/loop0
P.S. input uppercase 'YES', then input your password for key slot 0
4. Open device
# luks open /dev/loop0 luks0
# lsblk
loop0 7:0 0 1G 0 loopβ β β Uππ»βΊπ«Δπ¬πβ β β β
ββluks0 253:0 0 1022M 0 crypt
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
Shells programing and checkers :
>>iCode CNES for Shell(https://github.com/lequal/iCodeCNES) An open source static code analysis tool for Shell and Fortran (77 and 90).
>>kmdr(https://kmdr.sh) CLI tool for learning commands from your terminal. kmdr delivers a break down of commands with every attribute explained.
>>shellcheck(https://www.shellcheck.net) ShellCheck, a static analysis tool that gives warnings and suggestions for bash/sh shell scripts.
>>SwiftFormat(https://github.com/nicklockwood/SwiftFormat) A library and commandline formatting tool for reformatting Swift code.
>>SwiftLint(https://realm.github.io/SwiftLint) A tool to enforce Swift style and conventions.
>>Tailor(https://github.com/sleekbyte/tailor) :warning: A static analysis and lint tool for source code written in Apple's Swift programming language.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Shells programing and checkers :
>>iCode CNES for Shell(https://github.com/lequal/iCodeCNES) An open source static code analysis tool for Shell and Fortran (77 and 90).
>>kmdr(https://kmdr.sh) CLI tool for learning commands from your terminal. kmdr delivers a break down of commands with every attribute explained.
>>shellcheck(https://www.shellcheck.net) ShellCheck, a static analysis tool that gives warnings and suggestions for bash/sh shell scripts.
>>SwiftFormat(https://github.com/nicklockwood/SwiftFormat) A library and commandline formatting tool for reformatting Swift code.
>>SwiftLint(https://realm.github.io/SwiftLint) A tool to enforce Swift style and conventions.
>>Tailor(https://github.com/sleekbyte/tailor) :warning: A static analysis and lint tool for source code written in Apple's Swift programming language.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
One point is decided between Washington and Beijing: the strength of the technological firms is underestimated.
#International
#International
β β β Uππ»βΊπ«Δπ¬πβ β β β
4,2 rating free hacking course-- Hacking Academy: How to Monitor & Intercept Transmitted Data:
Learn how to intercept data in networks
Monitor transmitted data
Detect intrusions
See what is going on in your network
Learn how to read and filter data in Wireshark
https://www.udemy.com/course/hacking-academy-monitoring-transmitted-data/
4,2 rating free hacking course-- Hacking Academy: How to Monitor & Intercept Transmitted Data:
Learn how to intercept data in networks
Monitor transmitted data
Detect intrusions
See what is going on in your network
Learn how to read and filter data in Wireshark
https://www.udemy.com/course/hacking-academy-monitoring-transmitted-data/
Udemy
Free Ethical Hacking Tutorial - Hacking Academy: How to Monitor & Intercept Transmitted Data
Learn how to intercept data in your network. Monitor transmitted data and detect intrusion. Free hacking lesson. - Free Course
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Kitty is a powerful GPU based terminal emulator for linux:
Method 1: from the Ubuntu repository
First open a terminal and update your system.
$ sudo apt update
Use apt to install Kitty:
$ sudo apt install kitty -y
Just enter βkittyβ to open it.
$ kitty
Method 2: from ready-made binaries
If you have a Mac or other Linux, just install the pre-built Kitty
banners.
Use the following curl command:
$ curl -L https://sw.kovidgoyal.net/kitty/installer.sh | sh / dev / stdin
The system will install the binary to ~ / .local / kitty.app / bin / directory.
You can simply run it by typing:
$ ~ / .local / kitty.app / bin / kitty
You can also launch kitty by searching applications.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Kitty is a powerful GPU based terminal emulator for linux:
Method 1: from the Ubuntu repository
First open a terminal and update your system.
$ sudo apt update
Use apt to install Kitty:
$ sudo apt install kitty -y
Just enter βkittyβ to open it.
$ kitty
Method 2: from ready-made binaries
If you have a Mac or other Linux, just install the pre-built Kitty
banners.
Use the following curl command:
$ curl -L https://sw.kovidgoyal.net/kitty/installer.sh | sh / dev / stdin
The system will install the binary to ~ / .local / kitty.app / bin / directory.
You can simply run it by typing:
$ ~ / .local / kitty.app / bin / kitty
You can also launch kitty by searching applications.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
OpenVPN USE VPN FROM YOUR CHOICE- LINUX-TERMUX:
1) Open terminal and type
apt-get install openvpn
2) configure
* test vpn
server # openvpn --remote CLIENT --dev tun1 --ifconfig 10.9.8.1 10.9.8.2 255.255.255.0
client # openvpn --remote SERVER --dev tun1 --ifconfig 10.9.8.2 10.9.8.1 255.255.255.0
then check ifconfig
* static key vpn
Server
3) cd /etc/openvpn
4) openvpn --genkey --secret static.key
5) cat > tun0.conf << EOF
6) REMOTE
dev tun0
ifconfig 10.9.8.1 10.9.8.2 255.255.255.0
secret /etc/openvpn/static.key
7) EOF
cp server:/etc/openvpn/static.key client:/etc/openvpn/static.key
Client
cd /etc/openvpn
cat > tun0.conf << EOF
8) SERVER
dev tun0
ifconfig 10.9.8.2 10.9.8.1 255.255.255.0
secret /etc/openvpn/static.key
9) Firewall
UDP:1149
Test on both sides
openvpn --config /etc/openvpn/tun0.conf --verb 6
ref : wiki.debian.org :: openvpn
wiki.archlinux.org :: openvpn
β β β Uππ»βΊπ«Δπ¬πβ β β β
OpenVPN USE VPN FROM YOUR CHOICE- LINUX-TERMUX:
1) Open terminal and type
apt-get install openvpn
2) configure
* test vpn
server # openvpn --remote CLIENT --dev tun1 --ifconfig 10.9.8.1 10.9.8.2 255.255.255.0
client # openvpn --remote SERVER --dev tun1 --ifconfig 10.9.8.2 10.9.8.1 255.255.255.0
then check ifconfig
* static key vpn
Server
3) cd /etc/openvpn
4) openvpn --genkey --secret static.key
5) cat > tun0.conf << EOF
6) REMOTE
dev tun0
ifconfig 10.9.8.1 10.9.8.2 255.255.255.0
secret /etc/openvpn/static.key
7) EOF
cp server:/etc/openvpn/static.key client:/etc/openvpn/static.key
Client
cd /etc/openvpn
cat > tun0.conf << EOF
8) SERVER
dev tun0
ifconfig 10.9.8.2 10.9.8.1 255.255.255.0
secret /etc/openvpn/static.key
9) Firewall
UDP:1149
Test on both sides
openvpn --config /etc/openvpn/tun0.conf --verb 6
ref : wiki.debian.org :: openvpn
wiki.archlinux.org :: openvpn
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π₯ Add, remove and grant sudo rights to Arch Linux users:
1) How to add, remove and grant sudo rights to users on Arch Linux
Make sure you have installed the sudo package by running the following commands as root:
# pacman -Syu
# pacman -S sudo
2) The first command will sync the repositories and update your Arch Linux system to the latest version available.
The second command will install sudo if not already installed.
π¦Then create a new user and add sudo rights to it.
1) / Create a sudo user on Arch Linux.
Run the following command to create a new user, for example undercode:
# useradd --create-home undercode
2) Set a password for the new user:
# passwd undercode
3) We have created a new user named undercode.
We haven't given the user sudo rights yet.
4) You can check if a user is a sudo user or not using the command:
# sudo -lU undercode
Output example:
5) User undercode is not allowed to run sudo on archlinux.
Yes, the user is not yet allowed to perform administrative tasks.
Let's go ahead and give it sudo rights.
To add a regular user to the sudoers list, simply add him to the wheel group.
6) For those of you curious, wheel is a special group on some Unix-like operating systems.
All members to this group are allowed to perform administrative tasks.
The Wheel group is similar to the sudo group on Debian based systems.
We can add users to the sudoers list in two ways.
7) 4The first way is to use the usermod command.
1.1. Add users to the sudoers list using the usermod command on Arch Linux
To add a user to the sudoers list on Arch Linux, run:
# usermod -aG wheel undercode
or
# usermod --append --groups wheel undercode
The above command will add a user named undercode to the "wheel" group.
As mentioned, members of the wheel group can perform administrative tasks using the sudo command.
Then edit the / etc / sudoers file with the command:
# visudo
Find and uncomment the following line (just remove the # at the beginning of the line):
%wheel ALL=(ALL) ALL
Press ESC and type: wq to save the file and exit.
You can also add the user to the sudo group:
# usermod -aG sudo undercode
Edit the / etc / sudoers file:
# visudo
Uncomment the following line:
%sudo ALL=(ALL) ALL
Save the file and exit.
We have added the user undercode to the sudoers list.
Now go to section β1.3. Let's check if the user has sudo access on Arch Linux βand check if the user has sudo rights.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π₯ Add, remove and grant sudo rights to Arch Linux users:
1) How to add, remove and grant sudo rights to users on Arch Linux
Make sure you have installed the sudo package by running the following commands as root:
# pacman -Syu
# pacman -S sudo
2) The first command will sync the repositories and update your Arch Linux system to the latest version available.
The second command will install sudo if not already installed.
π¦Then create a new user and add sudo rights to it.
1) / Create a sudo user on Arch Linux.
Run the following command to create a new user, for example undercode:
# useradd --create-home undercode
2) Set a password for the new user:
# passwd undercode
3) We have created a new user named undercode.
We haven't given the user sudo rights yet.
4) You can check if a user is a sudo user or not using the command:
# sudo -lU undercode
Output example:
5) User undercode is not allowed to run sudo on archlinux.
Yes, the user is not yet allowed to perform administrative tasks.
Let's go ahead and give it sudo rights.
To add a regular user to the sudoers list, simply add him to the wheel group.
6) For those of you curious, wheel is a special group on some Unix-like operating systems.
All members to this group are allowed to perform administrative tasks.
The Wheel group is similar to the sudo group on Debian based systems.
We can add users to the sudoers list in two ways.
7) 4The first way is to use the usermod command.
1.1. Add users to the sudoers list using the usermod command on Arch Linux
To add a user to the sudoers list on Arch Linux, run:
# usermod -aG wheel undercode
or
# usermod --append --groups wheel undercode
The above command will add a user named undercode to the "wheel" group.
As mentioned, members of the wheel group can perform administrative tasks using the sudo command.
Then edit the / etc / sudoers file with the command:
# visudo
Find and uncomment the following line (just remove the # at the beginning of the line):
%wheel ALL=(ALL) ALL
Press ESC and type: wq to save the file and exit.
You can also add the user to the sudo group:
# usermod -aG sudo undercode
Edit the / etc / sudoers file:
# visudo
Uncomment the following line:
%sudo ALL=(ALL) ALL
Save the file and exit.
We have added the user undercode to the sudoers list.
Now go to section β1.3. Let's check if the user has sudo access on Arch Linux βand check if the user has sudo rights.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS