UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.2K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Why apk encryption and hardening :
> Android applications are mainly based on Java development
instagram.com/UnderCodeTestingCompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> Easily cracked

>Make an impact

> Code or key interfaces exposed

> It has even been repackaged and released by others, including advertisements and viruses.

>Huge risks for companies and users

>The most convenient and effective way to deal with cracking
Reinforce

> Through reinforcement, the effects of decompilation and preventing secondary packaging can be achieved to a certain extent
Some other reasons

> For learning purposes, I want to understand, analyze, and learn the internal design and code logic of an Android app

>So need to decompile and crack

>So to prevent others from cracking it is necessary to encrypt and strengthen

>But there are some disadvantages to reinforcement:

>Impact on the application after strengthening
volume
>Startup speed
compatibility

>All platforms can run normally without crashing
The cost

>Charges for some reinforcement schemes

>Customer service response speed

>Some platforms have different response speeds after encryption problems

Wrten by UnderCode

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Cracking apk- start decomp[ile - Android developement turtorial by UnderCode Testing
t.me/UnderCodeTesting
> How to deobfuscate :
Background: using the decompiler tool, you can only see the code structure after obfuscation, but not the original code before obfuscation.

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) If yes: mapping.txtfile
Opportunity to deobfuscate, restore and restore the original code
background:

2) The developers of the Android project only have (generating) the mapping.txt file when tossing ProGuard.

3) In fact: as a person to crack, often there is no
If yes: source file and line number file

4) Opportunity to deobfuscate, restore and restore the original code
background:

5) In order to save the source file class name, line number and other information in the event of a crash, many APK developers will add the following rules to keep the source file information when the APK is confused

-keepattributes SourceFile, LineNumberTable

πŸ¦‘ In fact: as a person to crack, often there is no
»»Some anti-obfuscation tools

>JEB = JEB Decompiler

> JEB2 is called anti-obfuscation artifact

> Some plugins for anti-obfuscation

> S3cuRiTy-Er1C / JebScripts: Jeb public scripts
flankerhqd / jebPlugins: Various Jeb plugins, including obfuscation restore
enovella / jebscripts: A set of JEB Python / Java scripts for reverse engineering Android obfuscated code

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ XML Tutorial by undercode :
XML is an extension (suffix) of extensible markup language files. It is a markup language used to mark electronic files with a structure. It is used to transfer and store data. Content.pakMany important files are XML files, so you need to understand this kind of file deeply
twitter.com/undercodetc

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

>First look at the following XML example


<bookstore>
<book category = "Fantasy" >
<title lang = "en" > The Chronicles of Narnia </ title>
<author> Clive Staples Lewis </ author>
<year> 1950 </ year>
<series order = " 7 " />
</ book>
<book category = " SF " selected >
<title lang = " zh " > The Three Body Problem </ title>
<author> Big Liu </ author>
<year>2008 </ year>
<series order = "3" />
</ book>
</ bookstore>

1) In this example, the first line <bookstore>is referred to as the root element , row 2 and row 8 is the root element of the two sub-elements ,

2) the two sub-elements are contained in the root element start tag to the end of label between the same token, a element has , , , four sub-elements; for these sub-elements, it is their parent element, and because they have the same parent element, so they called each other

3) compatriots parent element parent element of an element, or the parent element , Or even higher, can be called the ancestor of this element , for example , the same as the ancestor of all , the child of an element, or the child of its child, or the lower, can be called this Descendants of the element<bookcategory="Fantasy"><bookcategory="SF"selected><bookstore></bookstore>
<book…><title…><author…><year…><series…><book…>

<bookstore><bookcategory="Fantasy"><titlelang="en">

πŸ¦‘Elements ΒΆ
The element refers to the part from the beginning (label) to the end (label). For the convenience of description, only the start tag is taken in the description.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Speed ​​Optimization-Use tmpfs to speed up your Linux server
pinterest.com/undercodeOfficial

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :
>cache files today and learned a trick is to use the virtual disk to store squid and seesion of php. A lot faster!
The default system will load / dev / shm, which is the so-called tmpfs. Some people say that it is different from ramdisk (virtual disk). Like a virtual disk, tmpfs can use your RAM, but it can also use your swap partition for storage. Moreover, the traditional virtual disk is a block device and requires a command such as mkfs to really use it. Tmpfs is a file system, not a block device; you just install it and it will work.
tmpfs has the following advantages:

1) The size of the dynamic file system;

2) Another major benefit of tmpfs is its lightning speed. Because a typical tmpfs file system resides entirely in RAM, reading and writing can be almost instantaneous;

3) tmpfs data is not retained after a restart, because virtual memory is inherently volatile. So it is necessary to do some scripts for operations such as loading and binding.

Okay, let ’s talk about some road principles, everyone is annoying, let ’s talk about my application :)
First, create a tmp folder in / dev / shm, and then bind it with the actual / tmp:
mkdir / dev / shm / tmp
chmod 1777 / dev / shm / tmp
mount --bind / dev / shm / tmp / tmp
Application example: 1. Squid cache directory settings
vi /etc/squid/squid.conf
Modify it to
cache_dir ufs / tmp 256 16 256
The first 256 here means using 256M memory, I think the method of using ramdisk
>shtml is not as good Use tmpfs directly, at least without using mkfs each time, and can also change the size dynamically. / Tmp at this time is actually dev / shm / tmp.
Then restart the service, ok, now all squid cache files are saved in the tmpfs file system, soon.

πŸ¦‘ Optimization of PHP performance

1) For a website with a large number of visits to Apache + PHP, there may be many temporary files under tmp, such as seesion or some cache files, then you can save it to a tmpfs file.

2) The way to save the seesion is very simple, just modify php.ini. Since I have bound / dev / stm / tmp to / tmp, it is not necessary to rewrite. As for the cache file generated by the php program, it can only be changed Php program :)

3) As for other applications of tmpfs, I think everyone may be inspired by this tutorial

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ CraftingRecipes resolve
>CraftingRecipes.xmlXml file storing all synthetic tables
This undercode tutorial will explain the file structure and content of the file in detail :
T.me/UnderCodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Recipe elementΒΆ
The <Recipes>element names of multiple sub- elements under the root element of the xml file are used to express classifications. Each of the many element names under these "classification" elements Recipestores a synthesis table in the game. Below is one of the element names. as Recipeelements:

<Recipe Result = "StonePickaxeBlock" ResultCount = "1" RequiredHeatLevel = "0" a = "stick" b = "cobblestone" Description = "Make a stone tool" >
"bbb"
"a"
"a"
</ Recipe>

πŸ¦‘Detailed properties:
Attribute name translation Detailed
Result product The attribute value BlocksData.txtis one of the squaresClass Name
ResultCount Yield Requires an attribute value less than that of the blockMaxStacking
ResultCount Yield Requires an attribute value less than that of the blockMaxStacking
Required
HeatLevel Demand fuel grade If the attribute value is equal to 0, can be synthesized in a backpack and synthetic station, not produced in the furnace
, if more than 0, only synthesized in the furnace, and the fuel box FuelHeatLevelmust be greater than or equal to the property value
a, b, etc. Raw materials
a, b, etc. Attribute value of the blockCraftingId
Description description The description of the interface display in the game synthesis table

πŸ¦‘The text part of this element is how the raw materials are placed. Some things to note:
Blanks represent blanks, no raw materials can be placed in this position
For Required a synthetic table with an attribute value of 0, if the number of columns and columns is less than 3, it can be synthesized in both the backpack and the synthesis table
There is also a synthetic table with the following two attributes

πŸ¦‘Attribute name translation Detailed

>Remains Remaining And Result similar, can be seen as a second product

>Remains
Count Remaining number Requires an attribute value less than that of the blockMaxStacking


Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 open source software Nginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders
instagram.com/UnderCodeTestingCompany

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• 𝔸ℕ𝔻 β„π•Œβ„•
linux

1) Download install-ngxblocker to your /usr/local/sbin/directory and make the script executable.

2) sudo wget https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master/install-ngxblocker -O /usr/local/sbin/3) install-ngxblocker
3) sudo chmod +x /usr/local/sbin/install-ngxblocker
If your Linux distribution does not have wget you can replace the wget command above using curl as follows:

4) curl -sL https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master/install-ngxblocker -o /usr/local/sbin/install-ngxblocker
πŸ¦‘ FreeBSD
Install the package.
1) pkg install www/nginx-ultimate-bad-bot-blocker
Alternatively install via portmaster:
2) portmaster www/nginx-ultimate-bad-bot-blocker

3) Now run the install-ngxblocker script in DRY-MODE which will show you what changes it will make and what files it will download for you. This is only a DRY-RUN so no changes are being made yet.

4) The install-ngxblocker downloads all required files including the setup and update scripts.

cd /usr/local/sbin
sudo ./install-ngxblocker
This will show you output as follows of the changes that will be made (NOTE: this is only a DRY-RUN no changes have been made)
5) Checking url: https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master/include_filelist.txt

Dry Run | not updating files | run as 'install-ngxblocker -x' to install files.

6) Creating directory: /etc/nginx/bots.d

REPO = https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master

Downloading [FROM]=> [REPO]/conf.d/globalblacklist.conf [TO]=> /etc/nginx/conf.d/globalblacklist.conf
Downloading [FROM]=> [REPO]/conf.d/botblocker-nginx-settings.conf [TO]=> /etc/nginx/conf.d/botblocker-nginx-settings.conf

REPO = https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master

Downloading [FROM]=> [REPO]/bots.d/blockbots.conf [TO]=> /etc/nginx/bots.d/blockbots.conf
Downloading [FROM]=> [REPO]/bots.d/ddos.conf [TO]=> /etc/nginx/bots.d/ddos.conf
Downloading [FROM]=> [REPO]/bots.d/whitelist-ips.conf [TO]=> /etc/nginx/bots.d/whitelist-ips.conf
Downloading [FROM]=> [REPO]/bots.d/whitelist-domains.conf [TO]=> /etc/nginx/bots.d/whitelist-domains.conf
Downloading [FROM]=> [REPO]/bots.d/blacklist-user-agents.conf [TO]=> /etc/nginx/bots.d/blacklist-user-agents.conf
Downloading [FROM]=> [REPO]/bots.d/blacklist-ips.conf [TO]=> /etc/nginx/bots.d/blacklist-ips.conf
Downloading [FROM]=> [REPO]/bots.d/bad-referrer-words.conf [TO]=> /etc/nginx/bots.d/bad-referrer-words.conf
Downloading [FROM]=> [REPO]/bots.d/custom-bad-referrers.conf [TO]=> /etc/nginx/bots.d/custom-bad-referrers.conf

REPO = https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master

Downloading [FROM]=> [REPO]/setup-ngxblocker [TO]=> /usr/local/sbin/setup-ngxblocker
Downloading [FROM]=> [REPO]/update-ngxblocker [TO]=> /usr/local/sbin/update-ngxblocker
setup-ngxblocker, install-ngxblocker and update-ngxblocker can all be configured with custom installation / update locations from the command line.

7) Run any of the setup, install or update scripts with --help or -h to view options.
8) Now run the install script with the -x parameter to download all the necessary files from the repository:

cd /usr/local/sbin/
sudo ./install-ngxblocker -x
This will give you the following output:

Checking url: https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master/include_filelist.txt
8) Creating directory: /etc/nginx/bots.d

REPO = https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master
Downloading [FROM]=> [REPO]/conf.d/globalblacklist.conf [TO]=> /etc/nginx/conf.d/globalblacklist.conf...OK
Downloading [FROM]=> [REPO]/conf.d/botblocker-nginx-settings.conf [TO]=> /etc/nginx/conf.d/botblocker-nginx-settings.conf...OK

REPO = https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master

9) Downloading [FROM]=> [REPO]/bots.d/blockbots.conf [TO]=> /etc/nginx/bots.d/blockbots.conf...OK
Downloading [FROM]=> [REPO]/bots.d/ddos.conf [TO]=> /etc/nginx/bots.d/ddos.conf...OK
Downloading [FROM]=> [REPO]/bots.d/whitelist-ips.conf [TO]=> /etc/nginx/bots.d/whitelist-ips.conf...OK
Downloading [FROM]=> [REPO]/bots.d/whitelist-domains.conf [TO]=> /etc/nginx/bots.d/whitelist-domains.conf...OK
Downloading [FROM]=> [REPO]/bots.d/blacklist-user-agents.conf [TO]=> /etc/nginx/bots.d/blacklist-user-agents.conf...OK
Downloading [FROM]=> [REPO]/bots.d/blacklist-ips.conf [TO]=> /etc/nginx/bots.d/blacklist-ips.conf...OK
Downloading [FROM]=> [REPO]/bots.d/bad-referrer-words.conf [TO]=> /etc/nginx/bots.d/bad-referrer-words.conf...OK
Downloading [FROM]=> [REPO]/bots.d/custom-bad-referrers.conf [TO]=> /etc/nginx/bots.d/custom-bad-referrers.conf...OK

REPO = https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master

10) Downloading [FROM]=> [REPO]/setup-ngxblocker [TO]=> /usr/local/sbin/setup-ngxblocker...OK
Downloading [FROM]=> [REPO]/update-ngxblocker [TO]=> /usr/local/sbin/update-ngxblocker...OK
All the required files have now been downloaded to the correct folders on Nginx for you direct from the repository.

11) MAKE SURE you set your setup and update scripts to be executable by running the following two commands. This is important before continuing with Step 4 and onwards.

sudo chmod +x /usr/local/sbin/setup-ngxblocker
sudo chmod +x /usr/local/sbin/update-ngxblocker
setup-ngxblocker, install-ngxblocker and update-ngxblocker can all be configured with custom installation / update locations from the command line.

Run any of the setup, install or update scripts with --help or -h to view options.

12) Now run the setup-ngxblocker script in DRY-MODE which will show you what changes it will make and what files it will download for you. This is only a DRY-RUN so no changes are being made yet.

cd /usr/local/sbin/
sudo ./setup-ngxblocker
This will give you output as follows (this output below assumes your nginx.conf file already has the default include of /etc/nginx/conf.d/*) All Nginx installations I know of have this default include in the nginx.conf file distributed with all versions.

13) Checking url: https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master/include_filelist.txt

Dry Run | not updating files | run as 'setup-ngxblocker -x' to setup files.

INFO: /etc/nginx/conf.d/* detected => /etc/nginx/nginx.conf
inserting: include /etc/nginx/bots.d/blockbots.conf; => /etc/nginx/sites-available/mydomain2.com.vhost
inserting: include /etc/nginx/bots.d/ddos.conf; => /etc/nginx/sites-available/mydomain2.com.vhost
inserting: include /etc/nginx/bots.d/blockbots.conf; => /etc/nginx/sites-available/mydomain1.com.vhost
inserting: include /etc/nginx/bots.d/ddos.conf; => /etc/nginx/sites-available/mydomain1.com.vhost

Whitelisting ip: x.x.x.x => /etc/nginx/bots.d/whitelist-ips.conf
This script also whitelists your IP in the whitelist-ips.conf file for you. Further IP's or IP ranges can be added to your customizable whitelits-ips.conf file located in /etc/nginx/bots.d/whitelist-ips.conf.

setup-ngxblocker, install-ngxblocker and update-ngxblocker can all be configured with custom installation / update locations from the command line.
πŸ¦‘ Run any of the setup, install or update scripts with --help or -h to view options.

1) Now run the setup script with the -x parameter to make all the n ecessary changes to your nginx.conf (if required) and also to add the required includes into all your vhost files.
2) This setup-ngxblocker script assumes that all your vhost files located in /etc/nginx/sites-available end in an extension .vhost. It is good practice to make all your vhost config files end with a .vhost extension but if you prefer to stick what you already have eg .conf you can simply modify run setup-ngxblocker using the -e parameter to specify the extension you use for your vhost files.

3) For instance if your vhost files end in .conf you will change this execute setup-ngxblocker with an additional command line parameter as follows:

sudo ./setup-ngxblocker -x -e conf
4) So now let's run the setup script and let it make all the changes we need to make the Bot Blocker active on all your sites.

cd /usr/local/sbin/
sudo ./setup-ngxblocker -x
You will see output as follows:

Checking url: https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master/include_filelist.txt

INFO: /etc/nginx/conf.d/* detected => /etc/nginx/nginx.conf
inserting: include /etc/nginx/bots.d/blockbots.conf; => /etc/nginx/sites-available/mydomain2.com.vhost
inserting: include /etc/nginx/bots.d/ddos.conf; => /etc/nginx/sites-available/mydomain2.com.vhost
inserting: include /etc/nginx/bots.d/blockbots.conf; => /etc/nginx/sites-available/mydomain1.com.vhost
inserting: include /etc/nginx/bots.d/ddos.conf; => /etc/nginx/sites-available/mydomain1.com.vhost

5) Whitelisting ip: x.x.x.x => /etc/nginx/bots.d/whitelist-ips.conf
You will note it has done the includes in all the .vhost files on my test bed server and also whitelisted your own IP address in the whitelist-ips.conf file for you. Further IP's or IP ranges can be added to your customizable whitelits-ips.conf file located in /etc/nginx/bots.d/whitelist-ips.conf.

What this setup script has done has simply added the following include statements into your .vhost files for you, it also adds /etc/nginx/conf.d/* to the includes in nginx.conf (if not already in nginx.conf), otherwise, the whole script will fail.

πŸ¦‘ Bad Bot Blocker
include /etc/nginx/bots.d/ddos.conf;
include /etc/nginx/bots.d/blockbots.conf;
setup-ngxblocker, install-ngxblocker and update-ngxblocker can all be configured with custom installation / update locations from the command line.

Run any of the setup, install or update scripts with --help or -h to view options.



Now test your nginx configuration

sudo nginx -t

and you should see

nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
nginx: configuration file /etc/nginx/nginx.conf test is successful


Now simply reload / restart Nginx and the Bot Blocker will immediately be active and protecting all your web sites.

sudo nginx -t && sudo nginx -s reload

or

sudo service nginx restart

That's it, the blocker is now active and protecting your sites from thousands of malicious bots and domains.



Now setup cron to automatically update the blocker for you every day so you always have the latest up to date protection.

sudo crontab -e

Add the following line at the end of your crontab file. Note adding the -e command line parameter to specify your email address where the update report is sent to. Obviously substitute yourname@youremail.com with your real email address or you will not receive the email when the script has updated.

00 22 * * * sudo /usr/local/sbin/update-ngxblocker -e yourname@youremail.com

This will update the blocker every night for you at 10 PM.

If you want it to update more frequently (as sometimes I push out 3-4 updates a day) you can set it as follows to run the cron every 8 hours, although just once a day is more than enough.

00 */8 * * * sudo /usr/local/sbin/update-ngxblocker -e yourname@youremail.com

If you don't want any email notification after an update (not advisable in case Nginx ever has an EMERG when reloading), then simply run your cron as follows.

00 */8 * * * sudo /usr/local/sbin/update-ngxblocker -n

If you would rather send e-mail via mailgun then run your cron as so:
00 22 * * * sudo /usr/local/sbin/update-ngxblocker -g yourname@yourdomain.com -d yourdomain.com -a mailgun api key -f from@yourdomain.com

That's it, the blocker will automatically keep itself up to date and also reload Nginx once it has downloaded the latest version of the globalblacklist.conf file.



You can now customize any of the following files below to suit your environment or requirements. These include files never get modified during an update using the auto update script above so whatever customizations you do here will never be overwritten during an update.

/etc/nginx/bots.d/whitelist-ips.conf
/etc/nginx/bots.d/whitelist-domains.conf
/etc/nginx/bots.d/blacklist-user-agents.conf
/etc/nginx/bots.d/blacklist-ips.conf
/etc/nginx/bots.d/bad-referrer-words.conf
/etc/nginx/bots.d/custom-bad-referrers.conf
Let's say for some "obscure" reason you actually want to block GoogleBot from accessing your site. You would simply add it to the /etc/nginx/bots.d/blacklist-user-agents.conf file and it will over-ride the default whitelist for GoogleBot. the same applies to any other bots that are whitelisted by default.

πŸ¦‘Tested and recommended by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ NTP communication:
twitter.com/UnderCodetc

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) From the SRX specification, NTP communication should be considered. It is possible to synchronize with an NTP server behind the DMZ or Untrust, but only the RG0 Primary.

2) In order to synchronize NTP with the Secondary of RG0, it is necessary to reach the NTP server via the segment to which the management interface (fxp0) is connected or via that segment. Don't forget to set up a backup router if you want to go over a segment. Since the Secondary of RG0 cannot have a routing table, it is necessary to set up a backup router.

3) Since RG0 Secondary cannot start ntpd, perform manual synchronization. In the case of SRX, this is equivalent to the command "set date ntp". Make the following settings to execute this command periodically.

set event-options generate-event ntp-sync time-of-day β€œ05:00:00 +0900”
set event-options policy Policy1 events ntp-sync
set event-options policy Policy1 then execute-commands commands β€œset date ntp”
set event-options policy Policy1 then execute-commands output-filename ntp-sync
set event-options policy Policy1 then execute-commands destination local-directory
set event-options destinations local-directory archive-sites / var / tmp /

4) This setting synchronizes the time of node0 and node1 with the NTP server by "set date ntp" every day at 5:00 in the morning. Of course, ntp server settings are required separately.

πŸ¦‘ NTP server settings
set system ntp server xxxx prefer
set system ntp server yyyy

If there is an NTP server that you want to prioritize, add "prefer".

5) Backup router settings
set groups node0 system backup-router 192.168.2.1 destination 8.8.8.8/32
set groups node1 system backup-router 192.168.2.1 destination 8.8.8.8/32

6) Set up backup routers separately for node0 and node1. Since the RG0 Secondary cannot have a routing table, be sure to set backup routers for both node0 and node1 so that either of them can be the Secondary.

Note that the backup router is separate from the static routing configuration.

7) Automatic switching back is recommended for control links
Basically, I don't think it is necessary to consider because the control link is directly connected, but if the control link (fxp1) goes down, the RG0 Secondary machine will be disabled and will not be usable.

8) If the control link is linked up again, it will not be able to escape from the disabled state by default, and will not recover from the disabled state without restarting.

9) To avoid such a situation, it is necessary to set a setting to automatically restore the control link status when the control link is restored. When designing SRX, we recommend that you apply the following settings.

set chassis cluster control-link-recovery

10) If this setting is entered, the device that was in the Disabled state when the control link was restored will automatically restart and restore the control link.

11) Fabric link monitoring should be disabled
By default, when the fabric link is linked down, the RG0 Secondary is disabled and becomes unusable.

12) The fabric link is used for synchronizing the ARP table and the session table. If the link goes down or goes up, the existing communication will not be affected much.

13) Like the control link, the fabric link is basically directly connected, so I don't think that the link will go down, but we recommend that you disable the monitoring setting in case of emergency. This is the Juniper recommended setting .

14) set chassis cluster no-fabric-monitoring

With this setting, nothing happens when the fabric link goes down or up.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to build a cluster- nTp
How to build Chassis Cluster (abbreviated CC) with SRX. If the versions do not exactly match, you cannot form a cluster.

1) Initialize settings
Initialize in operation mode. All subsequent operations are based on console connection.

root> request system zeroize

2) Executing this command automatically restarts.

Enable Chassis Cluster
We recommend connecting the control link.

3) Operations on the primary device
root @% cli
root> configure shared
root # delete interfaces
root # delete vlans
root # delete security
root # set system root-authentication plain-text-password
root # commit
root # exit
root> set chassis cluster cluster-id 1 node 0 reboot

4) Operations on the secondary device
root @% cli
root> configure shared
root # delete interfaces
root # delete vlans
root # delete security
root # set system root-authentication plain-text-password
root # commit
root # exit
root> set chassis cluster cluster-id 1 node 1 reboot

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ quick protection of a stationary PC by UnderCode :
instagram.com/UndrCodeTestingCompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Install system updates: activate the automatic installation of Windows updates - so you will not miss important fixes.

2) Installing anti-virus: we recommend using domestic products from Kaspersky Lab and Doctor Web, which also have free products.

3) Software Updates: Close security holes in third-party applications, such as Adobe Reader and Java.

4) Checking browser extensions: look through the list of installed plugins and get rid of unknown ones.

5) Check OS security tools: Spybot program will save the system from spyware.

6) Immense scope for attacks

> there were nearly 700 million malware variants worldwide - a skyrocketing growth.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to hack computers using the FM-receiver in the phone : > basic
pinterest.com/UnderCodeOfficial

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Hacking computers is carried out using mobile phones. In this case, you do not need to connect either a phone or a PC to any modern wireless connection. However, there is one condition: the computer from which the data will be received must be infected with a certain code.

2) AirHopper receives data from the radiation of a computer monitor and from keystrokes on the keyboard. In this case, a receiver operating in the FM band is used, reports tomsguide.com.

3) Some technical details of the research work have already been posted on the Ben Gurion University website, but basic information has not yet been disclosed. AirHopper has an effective range of up to 7 meters, and the walls are not an obstacle for him (since he receives FM radio signals).

4) β€œA large number of mobile phones currently have FM receivers. With appropriate malware, using electromagnetic radiation, radio signals can be received by a computer. This combination of a PC with a mobile receiver creates a potentially hidden channel that is not controlled by conventional security equipment, ”says one of the developers of AirHopper.

5) the computer and smartphones are not connected to a wired or wireless network. One phone is just a few meters from the monitor, and the second is in another room. The text typed on the computer is simultaneously displayed on the monitor and on the screens of two phones.

written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ What to do if my Home pc is hacked ?
instagram.com/UnderCodeTestingCompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) preventing further spread of the threat (isolation of a compromised device, cleaning, full system recovery from a trusted backup, etc.);


2) identifying methods of penetration / infection and eliminating them (examining an exident, installing security updates, refusing to use vulnerable software and network equipment, using intrusion prevention and detection systems, installing anti-virus software, changing the organization’s information security policy, etc.);


3) assessment and elimination of the consequences of hacking (determination of information that fell as a result of hacking into the hands of attackers, change of credentials, CDN recovery, warning users about the need to change passwords, etc.)

written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to Know if my home pc is Hacked
twitter.com/UnderCodeTC

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> Signs indicating that the computer has been compromised (Indicators of Compromise) hacked, can be:

1) the appearance on the computer of malicious files (viruses, backdoors, trojans, kilograms, cryptors, miners, etc.), as well as hacking tools (for network research, exploiting vulnerabilities, collecting credentials, etc.);

2) the appearance of unauthorized new executable and other files, even if they are not detected by antivirus software as malicious;
unauthorized network activity (connecting to remote hosts, opening unknown ports to listen on ports, or programs that should not do this, etc.);

3) abnormal activity on disk devices and increased consumption of system resources (due to disk searches, file encryption, using computer resources for an attacker to perform calculations or store and disseminate data, etc.)

4) and other signs, both visible "by eye" and requiring the use of specialized software to identify.


written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ What is a spyware program?+ protection from it :

Spyware is a type of malware whose presence on the system is almost invisible to the user and often undetectable. Such a program collects information about the search history, habits and preferences of the user - or his sensitive data (for example, bank card data) and without the user's knowledge sends the collected information to remote servers belonging to the attackers. Keyloggers are a special kind of spyware that can track keystrokes on a user's keyboard.

πŸ¦‘ How spyware infiltrates a user's device :

Spyware most often penetrates the victim’s computer along with programs or files downloaded from file-sharing sites (for example, providing free movies or music for downloading), or by downloading a file attached to an unsolicited email message. mail. As a rule, most users are not even aware of the penetration of spyware onto a computer.

πŸ¦‘ How to recognize spyware
The presence of spyware is often accompanied by the appearance of new and / or unknown icons in the taskbar at the bottom of the screen, as well as the execution of search queries by a different search provider than the default setting. From time to time, error messages may appear when performing operations previously performed without difficulty.

πŸ¦‘ How to suspend spyware
Modern antivirus software, as a rule, even in the basic version contains an anti-spyware protection component and is able to detect and remove spyware. You can also check the list of installed programs for unknown and / or not installed by you.

πŸ¦‘ How to protect yourself from spyware

>Make sure you install the latest security updates for your browser, operating system, and third-party programs.

>Activate a higher level of security policy for your browser.
Be especially vigilant when downloading files from file hosting services.

>Do not click on pop-up messages of an advertising nature.

> install any anti-virus software

written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁