UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.
>HexInject is a very versatile packet injector and sniffer,
that provide a command-line framework for raw network access.
fb.com/UndercOdeTestingCompany
It's designed to work together with others command-line utilities,
and for this reason it facilitates the creation of powerful shell scripts
capable of reading, intercepting and modifying network traffic in a transparent manner

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/ParrotSec/hexinject

2) cd hexinject

3) Type make to compile (install)

๐Ÿฆ‘Features :

1) hexinject:
The main sniffer and injector.

2) prettypacket:
Disassemble raw packets (received on its standard input) and print their field.
Can also print example packets (useful if you want to know the structure of an header).

3) hex2raw:
Convert hexstring (the textual format used by hexinject) to raw data,
and vice-versa.

4) packets.tcl:
Experimental packet forger, written in TCL.
It uses a simple packet representation format based on APD

๐Ÿฆ‘Tested On:

>Parrot

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Top 2019-2020 injection tools agaible on gitlab & github
twitter.com/UndercOdeTc

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) SQLMap - Automatic SQL Injection And Database Takeover Tool

2) jSQL Injection - Java Tool For Automatic SQL Database Injection

3) BBQSQL - A Blind SQL Injection Exploitation Tool

4) NoSQLMap - Automated NoSQL Database Pwnage

5) Whitewidow - SQL Vulnerability Scanner

6) DSSS - Damn Small SQLi Scanner

7) explo - Human And Machine Readable Web Vulnerability Testing Format

8) Blind-Sql-Bitshifting - Blind SQL Injection via Bitshifting

9) Leviathan - Wide Range Mass Audit Toolkit

10) Blisqy - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB)

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Crack GitKraken 2019 tool
T.me/UndercOdeTesting

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/5cr1pt/GitCracken

2) cd GitCracken

3) then run :


> yarn install

4) yarn build

5) node dist/bin/gitcracken.js --help for more usage information

6)gitcracken patcher [options] [actions...]

๐Ÿฆ‘Examples :

> Auto patch installed GitKraken (maybe require sudo privileges on GNU/Linux)

1) gitcracken patcher
Use custom path to app.asar

2)?gitcracken patcher --asar ~/Downloads/gitkraken/resources/app.asar
Use custom actions (backup, unpack and patch)

3) gitcracken patcher backup unpack patch

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How install & Run any Yarn File :
T.me/UndercOdeTesting

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) open terminal & type

> curl -sS https://dl.yarnpkg.com/debian/pubkey.gpg | sudo apt-key add

4) Add the Yarn APT repository to your system's software repository list by typing:

> echo "deb https://dl.yarnpkg.com/debian/ stable main" | sudo tee /etc/apt/sources.list.d/yarn.list

5) Once the repository is added to the system, update the package list, and install Yarn, with:

> sudo apt update

> sudo apt install yarn

6) If you already don't have Node.js installed on your system, the command above will install it.

7)!Those who are using nvm can skip the Node.js installation with:

> sudo apt install --no-install-recommends yarn

8) To verify that Yarn installed successfully, run the following commands which will print the Yarn version number:
yarn --version

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Trity Exploite Tool top 2019:Emulator Escape
>Trinity is the third public jailbreak for the PS Vitaโ„ข, which supports the latest firmwares 3.69 and 3.70. The exploit chain consists of three stages: the MIPS Kernel Exploit, the PSP Emulator Escape and the ARM Kernel Exploit.
t.me/UndercOdeTesting

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) Download and install qcma and psvimgtools.
> https://codestation.github.io/qcma/
>https://github.com/yifanlu/psvimgtools/releases

2) Start qcma and within the qcma settings set the option Use this version for updates to FW 0.00 (Always up-to-date) to spoof the System Software check.

3) Launch Content Manager on your PS Vita and connect it to your computer, where you then need to select PS Vita System -> PC, and after that you select Applications. Finally select PSPโ„ข/Other and click on the game that you want to turn into the Trinity exploit. If you see an error message about System Software, you should simply reboot your device to solve it (if this doesn't solve, then put your device into airplane mode and reboot). If this does still not work, then alternatively set DNS to 212.47.229.76 to block updates.

4) Transfer the game over to your computer by clicking on Copy on your PS Vita. After copying, you go to the folder /Documents/PS Vita/PGAME/xxxxxxxxxxxxxxxx/YYYYZZZZZ on your computer, where xxxxxxxxxxxxxxxx is some string corresponding to your account ID and YYYYZZZZZ is the title id of the game that you've just copied over. You can look at the image at YYYYZZZZZ/sce_sys/icon0.png to verify that it is indeed your chosen game. Furthermore, the YYYYZZZZZ folder should contain these folders: game, license and sce_sys.

5) Before you attempt to modify the backup, you should make a copy of it. Just copy YYYYZZZZZ somewhere else, such that if you fail to follow the instructions, you can copy it back and retry.

6) Insert the xxxxxxxxxxxxxxxx string here. If the AID is valid, it will yield a key that you can now use to decrypt/re-encrypt your game.

7) Decrypt the game backup by executing the following command in your command line/terminal (make sure you're in the right working directory. On Windows you can open the terminal in the current working directory by typing in cmd in the path bar of the file explorer. Also, if you haven't installed psvimgtools yet, then just place them in the YYYYZZZZZ folder):

> psvimg-extract -K YOUR_KEY game/game.psvimg game_dec
If done correctly, you should see an output like this:

> creating file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/EBOOT.PBP (x bytes)...
>creating file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/__sce_ebootpbp (x bytes)...
all done.

8) Download Trinity and copy the PBOOT.PBP file to game_dec/ux0_pspemu_temp_game_PSP_GAME_YYYYZZZZZ/PBOOT.PBP (the files EBOOT.PBP, __sce_ebootpbp and VITA_PATH.txt should exist in this folder). If PBOOT.PBP does already exist there, just overwrite it.
> https://github.com/TheOfficialFloW/Trinity/releases/download/v1.0/PBOOT.PBP

9) Now re-encrypt the backup similar to above by typing this in your command line/terminal:

> psvimg-create -n game -K YOUR_KEY game_dec game
If done correctly, you should see an output like this:

>adding files for ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ
packing file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/EBOOT.PBP (x bytes)...
packing file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/PBOOT.PBP (x bytes)...
packing file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/__sce_ebootpbp (x bytes)...
created game/game.psvimg (size: x, content size: x)
created game/game.psvmd

10) Remove the game_dec folder (and PSVimg tools if copied here) and

11) select Refresh database in qcma settings.

12) Now you need to copy back the modified backup to your PS Vita: Launch Content Manager on your PS Vita and connect it to your computer (if it's already open, just go back to the first menu), where you then need to select PC -> PS Vita System, and after that you select Applications. Finally select PSPโ„ข/Other and click on the modified game.
Perform the copy operation and exit Content Manager.
13) In the livearea, the game should now have a different icon and should now be called Trinity (eventually you have to rebuild the database in recovery mode to make the bubble change its look). If not, please re-read the instructions more carefully and begin from fresh.

> Turn on Wi-Fi, then reboot your device and straightly launch Trinity. Do not do anything else, otherwise the exploit will be less reliable. It is very important that you do not have any running downloads in background.

15) Enjoy the exploitation process and wait until it launches the Construct. If the exploit fails, simply rerun Trinity.

16) Within the Construct, select Download VitaShell, then Install HENkaku and finally Exit.

Congratulations, your device is now able to run homebrews. It is highly suggested that you downgrade your device to either firmware 3.60 or 3.65/3.67/3.68 using modoru. On 3.60, you can use HENkaku and on 3.65/3.67/3.68 you can use h-encore. If you don't downgrade your device now, you may lose the ability to launch Trinity later and therefore not be able to hack your device anymore.

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Best Cleaner for Linux /
BleachBit system cleaner for Windows and Linux
fb.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/bleachbit/bleachbit

2) make -C po local # build translations

3) python bleachbit.py
Then, review the preferences.

4) Then, select some options, and click Preview. Review the files, toggle options accordingly, and click Delete.

5) For information regarding the command line interface, run:

>python bleachbit.py --help

That! all
@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Hack any android the evil-droid :
t.me/UndercOdeTesting

๐Ÿฆ‘Requirements :

1 ) metasploit-framework

2 ) xterm

3 ) Zenity

4 ) Aapt

5 ) Apktool

6) Zipalign

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) Download the tool from github

> git clone https://github.com/M4sc3r4n0/Evil-Droid.git

2) Set script execution permission

> cd Evil-Droid

> chmod +x evil-droid

3) Run Evil-Droid Framework :

> ./evil-droid

choose option

๐Ÿฆ‘Tested by UndercOde

> kali

>debian

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How design your termux Like Your Desktop Windows ?
T.me/UndercOdeTesting

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) Open Termux and type :

pkg update && pkg upgrade && pkg install x11-repo && pkg install tigervnc openbox obconf xorg-xsetroot xcompmgr xterm polybar st zsh geany pcmanfm rofi feh neofetch htop vim elinks mutt git wget curl xfce4-settings

2) cd $HOME && git clone https://github.com/adi1090x/termux-desktop

3) Now go to the cloned directory termux-desktop and copy or move 'home' & 'usr' directories to /data/data/com.termux/files.

4) Now type:

>!cp -rf ./home /data/data/com.termux/files && cp -rf ./usr /data/data/com.termux/files
or

> mv -f ./home /data/data/com.termux/files && mv -f ./home /data/data/com.termux/files

5) Warning : I'm assuming you're doing this on a fresh termux install. If not so, please backup your files before running these command above. These commands will forcefully copy or move files in home & usr directory. So, before doing that, take a look inside the repo directories, and backup your existing config files (like .vimrc, .zshrc, .gitconfig, etc).


6) VNC Server Now, Let's configure the vnc server for graphical output. Run -
vncserver -localhost
At first time, you will be prompted for setting up passwords -
You will require a password to access your desktops.

7) Password:
Verify:

8) Would you like to enter a view-only password (y/n)? n
Note that passwords are not visible when you are typing them and maximal password length is 8 characters.
If everything is okay, you will see this message -

> New 'localhost:1 ()' desktop is localhost:1

9) Creating default startup script /data/data/com.termux/files/home/.vnc/xstartup
Creating default config /data/data/com.termux/files/home/.vnc/config

10) Starting applications specified in /data/data/com.termux/files/home/.vnc/xstartup

11) Log file is /data/data/com.termux/files/home/.vnc/localhost:1.log
It means that X (vnc) server is available on display 'localhost:1'.

12) Finally, to make programs do graphical output to the display 'localhost:1', set environment variable like shown here (yes, without specifying 'localhost'):
export DISPLAY=":1"

13) You may even put this variable to your bashrc or profile so you don't have to always set it manually unless display address will be changed.
Now You can start the vnc server by,
vncserver

14) And to stop the server, run -
vncserver -kill :1
VNC Client Now you need a vnc client app to connect to server. I'm using this Android VNC client: VNC Viewer (developed by RealVNC Limited). You can use TigerVNC if you're trying to connect to server by a computer (Windows or Linux).

15) Determine port number on which VNC server listens. It can be calculated like this: 5900 + {display number}. So for display 'localhost:1' the port will be 5901.

16) Now open the VNC Viewer application and create a new connection with the following information (assuming that VNC port is 5901) - EXAMPLE:
Address:
127.0.0.1:5901

Name:
Termux

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘2020 Termux tool Zphisher is an upgraded form of Shellphish.
Fb.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:


1) apt update

2) apt install git php openssh curl -y

3) git clone https://github.com/htr-tech/zphisher

4) cd zphisher

5) chmod +x zphisher.sh

6) bash zphisher.sh

๐Ÿฆ‘Or ; Use Single Command

> apt update && apt install git php curl openssh -y && git clone https://github.com/htr-tech/zphisher && cd zphisher && chmod +x zphisher.sh && bash zphisher.sh

๐Ÿฆ‘Features :


1) Latest Login Pages

2) New Instagram Auto Follower Page

3) All types of Erros Fixed


Written by UnderCode
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘A new fun way to send virus to your victim from just link in termux
t.me/UnderCodeTesting

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) apt-get update -y

2) apt-get upgrade -y

3) pkg install python -y

4) pkg install python2 -y

5) pkg install git -y

6)pip install lolcat

7) git clone https://github.com/noob-hackers/Infect

8) ls

9) cd infect

10) ls

11) bash infect.sh

๐Ÿฆ‘How it works ?


Infect :

1) From this option you will get link of virus in your termux just send that link to your victim and let the fun happen.
Save :

2) From this option you can repair damaged device of your victm from that virus by just installing this anti-virus in his device.

3)From this option you can update the infect script.
Exit :

4) From this option you can exit from infect tool

๐Ÿฆ‘Tested by UndercOde on


Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘2020 Termux styling

> T Style is a tool to change Font & color Schemes of Termux App.
Instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:


1) apt update

2) apt install git -y

3) git clone https://github.com/htr-tech/tstyle

4) cd tstyle

5) bash setup.sh

> type tstyle to run this tool.

๐Ÿฆ‘ Or ; Use Single Command
apt update && apt install git -y && git clone https://github.com/htr-tech/tstyle && cd tstyle && bash setup.sh && tstyle

๐Ÿฆ‘Features :

> Latest Fonts & Themes !

>Full Offline

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘The Dos Protection :
>How to protect the network from cyber attacks of the Wi-Fi Routers (new logo)?
t.me/UndercOdeTesting

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> SPI (Stateful Packet Inspection) Firewall and DoS (Denial of Service) Protection protect the router from cyber attacks.

> The SPI Firewall can prevent cyber attacks and validate the traffic that is passing through the router based on the protocol. This function is enabled by default, and itโ€™s recommended to keep the default settings.

>The DoS Protection can protect your home network against DoS attacks from flooding your network with server requests.

๐Ÿฆ‘ Follow the steps below to configure DoS Protection.

1) Log in to the web-based interface of the router

2) Go to Advanced > Security > Settings.

3) Enable DoS Protection.

4) Set the level (Off, Low, Middle or High) of protection for ICMP-FLOOD Attack Filtering, UDP-FlOOD Attack Filtering and TCP-SYN-FLOOD Attack Filtering.

โ€ข ICMP-FLOOD Attack Filtering - Enable to prevent the ICMP (Internet Control Message Protocol) flood attack.

โ€ข UDP-FlOOD Attack Filtering - Enable to prevent the UDP (User Datagram Protocol) flood attack.

โ€ข TCP-SYN-FLOOD Attack Filtering - Enable to prevent the TCP-SYN (Transmission Control Protocol-Synchronize) flood attack

5) If you want to ignore the ping packets from the WAN port, select Ignore Ping Packet From WAN Port; if you want to ignore the ping packets form the LAN port, select Ignore Ping Packet From LAN Port.

6) Click Save.

That All !

@UndercodeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How does DoS protection work?
Instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) A โ€œdenial-of-serverโ€ attack is an explicit attempt to deny legitimate users from using a service or computer resource.

2) DoS/DDoS attempts to reach below three goals to make victim/system/server fail to provide service.

3) Make victim/system too busy to provide service

4) Occupy LAN bandwidth of victim/system

5) Occupy WAN bandwidth of victim/system

๐Ÿฆ‘EXAMPLE :

ASUS router uses following methods to detect suspicious attack.

1) SYN-Flooding Protection : Only allow one TCP/SYN packet to pass per second.

2) Port Scanner Protection : Protect router from port scanning via external port scan tool

3) Ping of Death : Only allow one ICMP packet(type 8) to pass per second or drop the length of ICMP packet over 65535.

4) Enable DoS protection feature can filter suspicious or unreasonable packets to prevent from flooding the network with large amounts of fake traffic.

@UndercodeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–