UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ NTP communication:
twitter.com/UnderCodetc

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) From the SRX specification, NTP communication should be considered. It is possible to synchronize with an NTP server behind the DMZ or Untrust, but only the RG0 Primary.

2) In order to synchronize NTP with the Secondary of RG0, it is necessary to reach the NTP server via the segment to which the management interface (fxp0) is connected or via that segment. Don't forget to set up a backup router if you want to go over a segment. Since the Secondary of RG0 cannot have a routing table, it is necessary to set up a backup router.

3) Since RG0 Secondary cannot start ntpd, perform manual synchronization. In the case of SRX, this is equivalent to the command "set date ntp". Make the following settings to execute this command periodically.

set event-options generate-event ntp-sync time-of-day β€œ05:00:00 +0900”
set event-options policy Policy1 events ntp-sync
set event-options policy Policy1 then execute-commands commands β€œset date ntp”
set event-options policy Policy1 then execute-commands output-filename ntp-sync
set event-options policy Policy1 then execute-commands destination local-directory
set event-options destinations local-directory archive-sites / var / tmp /

4) This setting synchronizes the time of node0 and node1 with the NTP server by "set date ntp" every day at 5:00 in the morning. Of course, ntp server settings are required separately.

πŸ¦‘ NTP server settings
set system ntp server xxxx prefer
set system ntp server yyyy

If there is an NTP server that you want to prioritize, add "prefer".

5) Backup router settings
set groups node0 system backup-router 192.168.2.1 destination 8.8.8.8/32
set groups node1 system backup-router 192.168.2.1 destination 8.8.8.8/32

6) Set up backup routers separately for node0 and node1. Since the RG0 Secondary cannot have a routing table, be sure to set backup routers for both node0 and node1 so that either of them can be the Secondary.

Note that the backup router is separate from the static routing configuration.

7) Automatic switching back is recommended for control links
Basically, I don't think it is necessary to consider because the control link is directly connected, but if the control link (fxp1) goes down, the RG0 Secondary machine will be disabled and will not be usable.

8) If the control link is linked up again, it will not be able to escape from the disabled state by default, and will not recover from the disabled state without restarting.

9) To avoid such a situation, it is necessary to set a setting to automatically restore the control link status when the control link is restored. When designing SRX, we recommend that you apply the following settings.

set chassis cluster control-link-recovery

10) If this setting is entered, the device that was in the Disabled state when the control link was restored will automatically restart and restore the control link.

11) Fabric link monitoring should be disabled
By default, when the fabric link is linked down, the RG0 Secondary is disabled and becomes unusable.

12) The fabric link is used for synchronizing the ARP table and the session table. If the link goes down or goes up, the existing communication will not be affected much.

13) Like the control link, the fabric link is basically directly connected, so I don't think that the link will go down, but we recommend that you disable the monitoring setting in case of emergency. This is the Juniper recommended setting .

14) set chassis cluster no-fabric-monitoring

With this setting, nothing happens when the fabric link goes down or up.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to build a cluster- nTp
How to build Chassis Cluster (abbreviated CC) with SRX. If the versions do not exactly match, you cannot form a cluster.

1) Initialize settings
Initialize in operation mode. All subsequent operations are based on console connection.

root> request system zeroize

2) Executing this command automatically restarts.

Enable Chassis Cluster
We recommend connecting the control link.

3) Operations on the primary device
root @% cli
root> configure shared
root # delete interfaces
root # delete vlans
root # delete security
root # set system root-authentication plain-text-password
root # commit
root # exit
root> set chassis cluster cluster-id 1 node 0 reboot

4) Operations on the secondary device
root @% cli
root> configure shared
root # delete interfaces
root # delete vlans
root # delete security
root # set system root-authentication plain-text-password
root # commit
root # exit
root> set chassis cluster cluster-id 1 node 1 reboot

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ quick protection of a stationary PC by UnderCode :
instagram.com/UndrCodeTestingCompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Install system updates: activate the automatic installation of Windows updates - so you will not miss important fixes.

2) Installing anti-virus: we recommend using domestic products from Kaspersky Lab and Doctor Web, which also have free products.

3) Software Updates: Close security holes in third-party applications, such as Adobe Reader and Java.

4) Checking browser extensions: look through the list of installed plugins and get rid of unknown ones.

5) Check OS security tools: Spybot program will save the system from spyware.

6) Immense scope for attacks

> there were nearly 700 million malware variants worldwide - a skyrocketing growth.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to hack computers using the FM-receiver in the phone : > basic
pinterest.com/UnderCodeOfficial

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Hacking computers is carried out using mobile phones. In this case, you do not need to connect either a phone or a PC to any modern wireless connection. However, there is one condition: the computer from which the data will be received must be infected with a certain code.

2) AirHopper receives data from the radiation of a computer monitor and from keystrokes on the keyboard. In this case, a receiver operating in the FM band is used, reports tomsguide.com.

3) Some technical details of the research work have already been posted on the Ben Gurion University website, but basic information has not yet been disclosed. AirHopper has an effective range of up to 7 meters, and the walls are not an obstacle for him (since he receives FM radio signals).

4) β€œA large number of mobile phones currently have FM receivers. With appropriate malware, using electromagnetic radiation, radio signals can be received by a computer. This combination of a PC with a mobile receiver creates a potentially hidden channel that is not controlled by conventional security equipment, ”says one of the developers of AirHopper.

5) the computer and smartphones are not connected to a wired or wireless network. One phone is just a few meters from the monitor, and the second is in another room. The text typed on the computer is simultaneously displayed on the monitor and on the screens of two phones.

written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ What to do if my Home pc is hacked ?
instagram.com/UnderCodeTestingCompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) preventing further spread of the threat (isolation of a compromised device, cleaning, full system recovery from a trusted backup, etc.);


2) identifying methods of penetration / infection and eliminating them (examining an exident, installing security updates, refusing to use vulnerable software and network equipment, using intrusion prevention and detection systems, installing anti-virus software, changing the organization’s information security policy, etc.);


3) assessment and elimination of the consequences of hacking (determination of information that fell as a result of hacking into the hands of attackers, change of credentials, CDN recovery, warning users about the need to change passwords, etc.)

written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to Know if my home pc is Hacked
twitter.com/UnderCodeTC

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> Signs indicating that the computer has been compromised (Indicators of Compromise) hacked, can be:

1) the appearance on the computer of malicious files (viruses, backdoors, trojans, kilograms, cryptors, miners, etc.), as well as hacking tools (for network research, exploiting vulnerabilities, collecting credentials, etc.);

2) the appearance of unauthorized new executable and other files, even if they are not detected by antivirus software as malicious;
unauthorized network activity (connecting to remote hosts, opening unknown ports to listen on ports, or programs that should not do this, etc.);

3) abnormal activity on disk devices and increased consumption of system resources (due to disk searches, file encryption, using computer resources for an attacker to perform calculations or store and disseminate data, etc.)

4) and other signs, both visible "by eye" and requiring the use of specialized software to identify.


written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ What is a spyware program?+ protection from it :

Spyware is a type of malware whose presence on the system is almost invisible to the user and often undetectable. Such a program collects information about the search history, habits and preferences of the user - or his sensitive data (for example, bank card data) and without the user's knowledge sends the collected information to remote servers belonging to the attackers. Keyloggers are a special kind of spyware that can track keystrokes on a user's keyboard.

πŸ¦‘ How spyware infiltrates a user's device :

Spyware most often penetrates the victim’s computer along with programs or files downloaded from file-sharing sites (for example, providing free movies or music for downloading), or by downloading a file attached to an unsolicited email message. mail. As a rule, most users are not even aware of the penetration of spyware onto a computer.

πŸ¦‘ How to recognize spyware
The presence of spyware is often accompanied by the appearance of new and / or unknown icons in the taskbar at the bottom of the screen, as well as the execution of search queries by a different search provider than the default setting. From time to time, error messages may appear when performing operations previously performed without difficulty.

πŸ¦‘ How to suspend spyware
Modern antivirus software, as a rule, even in the basic version contains an anti-spyware protection component and is able to detect and remove spyware. You can also check the list of installed programs for unknown and / or not installed by you.

πŸ¦‘ How to protect yourself from spyware

>Make sure you install the latest security updates for your browser, operating system, and third-party programs.

>Activate a higher level of security policy for your browser.
Be especially vigilant when downloading files from file hosting services.

>Do not click on pop-up messages of an advertising nature.

> install any anti-virus software

written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘UNLIMITED HACKING-PROGRAMMING TIPS ARE POSTED HERE. BUT STILL WONDERING WHAT MOST LANGUAGE PROGRAMMING DESIGNED FOR HACKING SPECIALLY ?
Anonymous Poll
22%
JAVA-JAVASCRIPT?
22%
C,C++ ?
72%
PYTHON ?
UNDERCODE COMMUNITY
πŸ¦‘UNLIMITED HACKING-PROGRAMMING TIPS ARE POSTED HERE. BUT STILL WONDERING WHAT MOST LANGUAGE PROGRAMMING DESIGNED FOR HACKING SPECIALLY ?
84% right, python is most usuable by hackers because its easy, but without C no python, python is made by CπŸ€”πŸ˜‚
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Set up a large-capacity Web-based Email system full tutorial by UnderCode :
pinterest.com/UnderCodeOfficial

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> An Email system can be divided into server-side and client-side. The Email system of the Web interface puts the Email client on the Web server-side, so what the Email system needs to implement is an Email client of the Web interface. However, because this Email system requires a large number of users, there are specific requirements for the Email server.

γ€€γ€€β—† operating system and user databases

1) by providing high-capacity Email System requirements for the operating system and the database is very high, therefore, select the appropriate operating system and the database is the most basic question.

2) Because of the high stability and performance required to provide web and email services, unix is ​​generally used as the server operating system. For example, hotmail uses freebsd and solaris, and domestic sites such as 163 also use the bsd series.

3) However, Unix's standard email system is also unsuitable for such large capacity services. Some Unix systems, such as the current version of Linux, have only 16-bit user IDs, so the number of users can only be up to 64k, even if the Unix system itself supports 32-bit user IDs. Considering performance factors, the number of users supported by a single server Do not exceed 100,000. In order to support scalability for more users, multiple servers are generally used to provide services at the same time. Although standard Unix users can still be used as email users at this time, non-Unix systems are generally used in consideration of security, performance, and manageability.

4) Users come as email users. The storage of user data is usually in the form of a database that supports network access. Commonly used are ldap, standard databases, and user databases implemented by the email system itself. Among them, ldap is the standard for providing directory services, so it should be the best choice. Its commonly used open source implementation is openldap; while the standard database is easy to implement and highly scalable, and the most commonly used on the Internet is mysql. ; In addition, there are other ways to achieve.
γ€€γ€€
β—† save messages

1) for bulk Email system, the most critical technical issue is how to handle mail storage, the manner in which to improve storage efficiency, we will determine the success of Email system or not.

2) Due to the large number of users, how to save users' emails is a very important issue. Traditional Unix uses a single directory to store mail for all users, which greatly reduces the performance of the file system when there are a large number of users.

3) Only by using multi-level directories and a limited number of files in each directory, can we reduce the system consumption when opening files, or no longer use simple files to save emails, but use a certain form of packaging. The database is completely used to save emails. Because users' email operations are mostly file operations, and the size changes greatly, it will cause a large waste of performance and storage space.

4) Due to the huge number of users and the need to be accessed by multiple servers at the same time, a server or server cluster with a large storage space must be used for storage. The storage space is shared through Fibre Channel or the network file system NFS, so that each user's mail storage The path is consistent for each server. Fibre Channel is a very expensive solution. It is more common to use NFS. You can use a dedicated NFS server, such as NetApp, or a PC Unix server with RAID capabilities.
5) When using NFS shared storage space, you must pay attention to a very important issue: Because NFS lacks a file locking mechanism, when using the traditional user mail storage format mailbox, all mails are stored in the same file, so mail is sent. The operation must be locked to ensure that there are no access conflicts, which makes it unsuitable for NFS storage. In order to solve this problem, qmail proposes the Maildir storage method. Each mail is stored as a separate file in the user's personal mail directory, which avoids locking. Therefore, common free mail servers generally use the Maildir method to store user mail.

6) If you do not plan to use a shared file system to store user mail, and you want to allow each server to access only user mail on its own hard disk storage space, then both the Email server and the client need to be customized so that they can pass the user name Come to find the real server to which the user belongs, and hand over the access task to this server to complete. The disadvantages of this method are that in addition to the large changes required and the complex system structure, the server is divided by users, which is not conducive to load sharing.
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘PART 2- Set up a large-capacity Web-based Email system full tutorial by UnderCode :
pinterest.com/UnderCodeOfficial


β—† Web client

1) what kind of script to use Web Email client program is not standard, but if the use of open source will save a lot of trouble.

2) Web Interface Another important part of the Email system is the Web client. This part will function like OutLook in a personal computer and is responsible for providing users with the ability to access their own mail. Because Web access itself is connectionless, user security must be guaranteed. Basically, security can be guaranteed by the session ID, temporary directory established after login, and verification in the program.

3) The Web client must access the server in a unified way. It can obtain the user's mail through direct file access, or through standard protocols such as POP3 and IMAP. For a system that uses a network file system to share user mail, the direct file access method is the most direct and convenient, and does not require additional consumption. The direct benefit of accessing the server through the POP3 and IMAP protocols is that the Web client is separated from the Email server, which improves system security.

β—† load balancing

1) Load balancing system will be a long-term problem, which determines the scalability of the system.

2) Because it needs to provide access to a large number of users, a single server cannot meet this need, and a multi-server approach must be used.

3) In addition to partitioning according to functionality, such as the separation of Web server, Email server, and file server, it is also necessary to use multiple servers for load balancing for some resource-constrained services. Although some current commercial manufacturers have also proposed some server cluster solutions, the common simple and effective methods are DNS cycle analysis, Web server relocation, and NAT load balancing.

4) DNS round-robin resolution is to assign multiple IP addresses to the same name. It is used on quite large sites such as Yahoo and the actual results are quite good. Web server relocation is a process in which the web server randomly generates real page URLs on different servers, so that different browsers load pages on different servers. Using it can only achieve load balancing for web clients. And NAT load balancing uses the fourth layer switch to make the same request to different servers. In addition to expensive switches, there are some software that can complete the NAT function. I have changed the FreeBSD natd to support load balancing, which is also an option for users who have to reduce performance requirements due to switch price issues.

γ€€γ€€β—† case study

1) there are many domestic Web Email system, Netease, 21CN and Sina Email is one of the representatives.

2) Currently, the most popular Web interface Email system in rusia/leb is NetEase's system. It is a system that uses qmail as the basic server software and then changes it. It uses the NFS network file system as the user's mail storage space, uses Maildir as the mail storage format, and provides multi-level directories to support a large number of users. The Web client is implemented for them, and provides services to users by directly accessing users' emails.

Written by UnderCode
 ▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Full Hacking Process by UnderCode :
T.me/UndercOdeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

First determine the purpose of the invasion: To obtain information about the Bruce computer

1) Collect information
again, according to the more information searched again, and then search again ... to see if there
is the other party's mailbox, facebook, twitter, home address, public information on salary, etc. in
this information, this is Social engineering.

2) Analysis: Knowing the collected information

3) Determine the target of the invasion. Invade a government website.

4) Prepare stable broilers. Use them as a springboard.

5) Perform an initial security check on the website, check the IP address, scan the development
port (different ports correspond to different services), see the number of domain names bound
to this server, see if other websites on the server can invade, and check the websites on all servers
( (Side note), to see if there are common vulnerabilities in the website (upload, injection, database
thrashing, cross-domain xml, fake cookies, weak passwords, default file addresses, including
vulnerabilities, etc.), go through Detection of these columns, that site is very safe on the server.

6) In this regard the invasion server with IP end room. Finally found the same room server has
a low level of security vulnerabilities, squat one week finally got shell of this site, enter Insufficient
server privileges, elevation of privileges .... finally obtained server privileges.

7) Sniffing from the same computer room , this server ... After 1 month of sniffing.I found the
background password of a website ... enter privileges and get server permissions.

8) Make a web Trojan ... upload a website .... Waiting for Bruce to hook up.
8. Squat guard ,"undercode after waiting for a month, I found that the broiler increased by more than 100 ...
Among them, there is a Bruce host.

9) Copy content ...

10) Wipe the butt ... .. completely delete all traces ...
.... probably similar process

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ WebShell Full tutorial by UnderCode :
instagram.com/UnderCodetestingCompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) First of all, we need to determine the website we want to detect. It can be a certain website that we have set, or we can search it through Google

2) The best success rate for dynamic website invasion such as ASP. Without going into detail, this step is to select the target site. Then we started testing the website. Take a closer look at the end of this website's hyperlink if there is a character like "ID = XXX (XXX stands for number)"; if so, we can perform the following basic test on it: open this link, and enter the ID in the address bar = XXX followed by "and 1 = 2" (do not add quotes), click submit to open a new page, if this page is displayed abnormally, or if something is wrong, it means there is an injection vulnerability!

3) We You can try to inject it! Here we pay attention, there are generally 2 types of databases: ACCESS, MSSQL 2 databases. Let's talk about the solution of the ACCESS database first. Here we can use the tool to guess the contents of the database (you can also guess manually, but it is too tedious), here we use the "SQL injection guess" in the Ming Xiaozi tool. Fill in the injection points that we just manually detected. After clicking the detection, the program starts to detect whether there are injection points.

4) At the beginning, we have already detected them manually, so they definitely exist. Then you can click "guess the table name" to guess the table name of the database. With the program, we will perform these operations very easily; we will guess all the table names soon, and then select the table name we want to guess.

5) To solve the table name, use the program to guess the column name of the table name, and then you can guess the record content. Websites with improper general precautions will be guessed the username and password; then we use the program's built-in function to guess the background address, after guessing, log in with the obtained username and password; websites with poor general precautions can even directly Login with universal username and password 'or' = 'or'. After landing successfully, we enter the background, which is the basic condition for all invasions. Officially started our invasion. First look at the database backup function. If so, let's see how to get the Webshell.

6) In one sentence, the Trojan. Through various methods, write this sentence into the database, and then turn the database written into this sentence into a suffix by backing up. Asp files, of course, you must pay attention to the file address after backup, and then access it. If the display is garbled, then congratulations, basically successful! If you use a one-line Trojan client to connect locally, just The URL of the page with garbled characters is connected.


7) After the connection is successful, you can see the familiar WebShell! 2. Use the picture upload function. We change the suffix of the ASP Trojan to the suffix of the picture, such as GIF, JPG, BMP, etc., and upload it. After the upload is successful, it will prompt the file to be uploaded successfully, and will give the file location, such as' UploadFiles / 20080501012. gif '; However, some may not prompt, we will use WSockExpert to capture the upload process and capture the upload path; then, we use the database backup function to change the format of gif and other pictures into ASP Format database for access. At this time, we can usually see our WebShell! However, some current website upload functions will detect this.
8) If the backup file cannot be found to belong to the database, it will prompt "Illegal database" "What should we do at this time? Since we want to detect whether there are database features, then we can't add pictures to the database features? Right! That's the truth, we can add database features to pictures through the DOS COPY command. The command is "COPY Trojan picture.gif database file.mdb synthesized file.gif" This way, our synthesized picture It will have the characteristics of the database! However, some websites do not find a place where there is a database backup.

πŸ¦‘ The above method will not work. What should we do at this time? Don't worry, things are always resolved Way. Find a page with an upload function, upload anything, use WSockExpert to capture the upload process. Generally, after we click upload, we will find the uploaded ASP page and the corresponding cookies in the package captured by WSockExpert, of course. We must first enter the background here and upload it with the administrator's account.

10) The obtained cookies are the administrator's, which can be used later. We then use the upload function of Mingzi, select the uploaded page, that is, the page we captured, fill in the obtained cookies, and select the Trojan we want to upload (to avoid killing! Otherwise delete it to the server), click upload, when the program prompts success, we can access our WebShell! If it fails, try another upload type.

11) Sometimes we may not be able to get the WebShell of a website at all. At this time, we can use a marginal method to take a WebShell for a website that belongs to the same server, and then escalate to the entire server.

12) The target website can be hacked. The above is the analysis of the ACCESS database and obtaining the webshell. Below, I analyze the MSSQL database. In the past, I also learned the solution of the ACCESS database.

13) When I learned the MSSQL database, I found that I still did not understand a lot, so I took a lot of detours. Now I will summarize the method of using the webshell of the MSSQL database. Friends who contacted webshell were helpful. First, we first check the user permissions of the MSSQL database. Generally, there are two types. One is the SA (system admin) permission. This permission is very large. The other is the DB_OWNER permission.

14) This permission is assigned to the user. Modify, delete, and add data tables to the database and execute most of the stored procedure permissions. However, the permissions related to some system-sensitive operations are not available, which is the only difference between it and SA permissions. We first look for the directory on the server where the website is located. You can use D to view the directory and find the directory of the website.

15) My personal experience is in the D, E, and F locations. But what to do sometimes? We just upload a vbs file and save the following file as lookweb.vbs: On Error Resume Next If it fails, try another upload type. Sometimes we may not be able to get the WebShell of a website at all. At this time, we can use a marginal method to take a WebShell for a website that belongs to the same server, and then escalate the rights to the entire server. The target website can be hacked. The above is the analysis of the ACCESS database and obtaining the webshell. Below, I analyze the MSSQL database.

16) In the past, I also learned the solution of the ACCESS database. When I learned the MSSQL database, I found that I still do n’t understand a lot, so I took a lot of detours. Now I summarize the method of the MSSQL database using the webshell. Friends who contacted webshell were helpful.

17) First, we first check the user permissions of the MSSQL database. Generally, there are two types. One is the SA (system admin) permission. This permission is very large. The other is the DB_OWNER permission. This permission is assigned to the user. Modify, delete, and add data tables to the database and execute most of the stored procedure permissions.
18) However, the permissions related to some system-sensitive operations are not available, which is the only difference between it and SA permissions. We first look for the directory on the server where the website is located. You can use D to view the directory and find the directory of the website. My personal experience is in the D, E, and F locations.

19) But what to do sometimes? We just upload a vbs file and save the following file as lookweb.vbs: On Error Resume Next If it fails, try another upload type. Sometimes we may not be able to get the WebShell of a website at all. At this time, we can use a marginal method to take a WebShell for a website that belongs to the same server, and then escalate the rights to the entire server.

20) The target website can be hacked. The above is the analysis of the ACCESS database and obtaining the webshell. Below, I analyze the MSSQL database. In the past, I also learned the solution of the ACCESS database. When I learned the MSSQL database, I found that I still do n’t understand a lot, so I took a lot of detours.

21) Now I summarize the method of the MSSQL database using the webshell. Friends who contacted webshell were helpful. First, we first check the user permissions of the MSSQL database. Generally, there are two types.

22) One is the SA (system admin) permission. This permission is very large. The other is the DB_OWNER permission. This permission is assigned to the user. Modify, delete, and add data tables to the database and execute most of the stored procedure permissions.

23) However, the permissions related to some system-sensitive operations are not available, which is the only difference between it and SA permissions.

24) We first look for the directory on the server where the website is located. You can use D to view the directory and find the directory of the website. My personal experience is in the D, E, and F locations. But what to do sometimes? We just upload a vbs file and save the following file as lookweb.vbs: On Error Resume Next The other is the DB_OWNER permission, which grants the user permission to modify, delete, and add new data tables to the database, and execute most stored procedures. However, the permissions related to some system-sensitive operations are not available, which is the only difference between it and SA permissions.

25) We first look for the directory on the server where the website is located. You can use D to view the directory and find the directory of the website. My personal experience is in the D, E, and F locations. But what to do sometimes? We just upload a vbs file and save the following file as lookweb.vbs: On Error Resume Next The other is the DB_OWNER permission, which grants the user permission to modify, delete, and add new data tables to the database, and execute most stored procedures.

26) However, the permissions related to some system-sensitive operations are not available, which is the only difference between it and SA permissions. We first look for the directory on the server where the website is located. You can use D to view the directory and find the directory of the website. My personal experience is in the D, E, and F locations.
27) But what to do sometimes? We just upload a vbs file, and save the following file as lookweb.vbs: On Error Resume Next
If (LCase (Right (WScript.Fullname, 11)) = "wscript.exe") Then
Msgbox Space (12) & "IIS Virtual Web Viewer" & Space (12) & Chr (13) & Space (9) & " Usage: Cscript vWeb.vbs ", 4096," Lilo "
WScript.Quit
End If
Set ObjService = GetObject (" IIS: // LocalHost / W3SVC ")
For Each obj3w In objservice
If IsNumeric (obj3w.Name) Then
Set OService = GetObject ("IIS: // LocalHost / W3SVC /" & obj3w.Name)
Set VDirObj = OService.GetObject ("IIsWebVirtualDir", "ROOT")
If Err <> 0 Then WScript.Quit (1)
WScript.Echo Chr (10) & "[" & OService.ServerComment & "]"
For Each Binds In OService.ServerBindings
Web = "{" & Replace (Binds, ":", "} {") & "}"
WScript.Echo Replace (Split (Replace (Web, "", ""), "} {") (2), "}", "")
Next
WScript.Echo "Path:" & VDirObj.Path
End If
Next
γ€€γ€€
28) and then use NBSI to upload to the server, and then execute cscript X: \ lookweb.vbs, we can see this in the echo message The corresponding website on the server and its corresponding website directory are very convenient. Website directory at a glance. After finding the directory of the website, we can use the differential backup to obtain the webshell.

> where a is the password we want to connect to the Trojan.

29) We must pay attention to what type the MSSQL database is. The type is still digital. Fill in the corresponding place, the path is usually the directory of the website, such as "D: \ wwwroot \" write the database name after the backup, such as ri.asp; click "BackupShell" system to automatically back up the database. After the backup is successful, we will access the file we backed up, and it will be successful when the browser is garbled. We can use the one sentence link of lake2, please pay attention to the password. You can basically get the webshell here; It is also possible to directly find the website directory without uploading the difference, and upload the webshell file directly to the website directory.

30) The above are all written by undercode long-term practice and experience. It is completely original, whirring and exhausting me.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ AFTER THIS TUTORIAL YOU ARE ABLE TO HACK ANY VIA WEBSHELL
πŸ¦‘ Tested Bin Amazon Prime Video- Underc0de

548583xxxxxxxxxx
IP: Spain / Spain
Vpn: VyprVPN or the like
Mail: Gmail, Outlook, etc.
Address Line 1: Calle Reyes Catolicos
Population: Barcelona
State / Province / Region: Barcelona
Postal code: 11011
Country Spain
Telephone number: 300xxxxxxx (replace x with numbers)

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁