UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 Optimize script, High-Performance Monitoring System :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) mkdir -p $GOPATH/src/github.com/didi

2) cd $GOPATH/src/github.com/didi

3) git clone https://github.com/didi/nightingale.git

4) cd nightingale

# export env[GOPROXY] if your network is not good

# export GOPROXY=https://mirrors.aliyun.com/goproxy/

5) ./control build

πŸ¦‘FEATURES :

Scalability
Scalable monitoring system is necessary to support rapid business growth. Each module of Nightingale is super easy to scale horizontally.

Performance
With RRA(Round Robin Archive) mechanism and memory TSDB, the one-year history data of 100+ metrics could be returned in just one second.

High Availability
No critical single point of failure, easy to operate and deploy. The system will not be affected if any machine is hung up.

Flexibility
Nightingale collector is compatible with falcon-agent. Plugin mechanism and log collector are built-in.

Efficiency
Integrated with object tree, Nightingale supports strategy inheritance, multiple alerting method, and callback for recovery.

Easy Deployment
All modules have been rewritten in go, which reduces the number of modules and greatly reduces the difficulty of deployment.

πŸ¦‘Tested by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 TOPIC Flutter makes it easy and fast to build beautiful mobile apps :
twitter.com/UnderCodeNews

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> System requirements
To install and run Flutter, your development environment must meet these minimum requirements:

> Operating Systems: Windows 7 SP1 or later (64-bit)
Disk Space: 400 MB (does not include disk space for IDE/tools).
Tools: Flutter depends on these tools being available in your environment.

πŸ¦‘ Windows PowerShell 5.0 or newer (this is pre-installed with Windows 10)
Git for Windows 2.x, with the Use Git from the Windows Command Prompt option.

> If Git for Windows is already installed, make sure you can run git commands from the command prompt or PowerShell.

πŸ¦‘ Get the Flutter SDK
Download the following installation bundle to get the latest stable release of the Flutter SDK:

1) For other release channels, and older builds, see the SDK archive page.

2) Extract the zip file and place the contained flutter in the desired installation location for the Flutter SDK (for example, C:\src\flutter; do not install Flutter in a directory like C:\Program Files\ that requires elevated privileges).

3) If you don’t want to install a fixed version of the installation bundle, you can skip steps 1 and 2. Instead, get the source code from the Flutter repo on GitHub, and change branches or tags as needed. For example:

4) content_copy
C:\src>git clone https://github.com/flutter/flutter.git -b stable
You are now ready to run Flutter commands in the Flutter Console!

5) Update your path
If you wish to run Flutter commands in the regular Windows console, take these steps to add Flutter to the PATH environment variable:

6) From the Start search bar, enter β€˜env’ and select Edit environment variables for your account.
Under User variables check if there is an entry called Path:

7) If the entry exists, append the full path to flutter\bin using ; as a separator from existing values.
If the entry doesn’t exist, create a new user variable named Path with the full path to flutter\bin as its value.
Note that you have to close and reopen any existing console windows for these changes to take effect.

πŸ¦‘ Run flutter doctor

1) From a console window that has the Flutter directory in the path (see above), run the following command to see if there are any platform dependencies you need to complete the setup:

2) content_copy

> C:\src\flutter>flutter doctor

3) This command checks your environment and displays a report of the status of your Flutter installation. Check the output carefully for other software you might need to install or further tasks to perform (shown in bold text).

πŸ¦‘ For example:

content_copy
[-] Android toolchain - develop for Android devices
β€’ Android SDK at D:\Android\sdk
βœ— Android SDK is missing command line tools; download from https://goo.gl/XxQghQ
β€’ Try re-installing or updating your Android SDK,
visit https://flutter.dev/setup/#android-setup for detailed instructions.

πŸ¦‘ LINUX INSTALL :

System requirements
>To install and run Flutter, your development environment must meet these minimum requirements:

πŸ¦‘Operating Systems: Linux (64-bit)
Disk Space: 600 MB (does not include disk space for IDE/tools).
Tools: Flutter depends on these command-line tools being available in your environment.
bash
curl
git 2.x
mkdir
rm
unzip
which
xz-utils
zip
Shared libraries: Flutter test command depends on this library being available in your environment.
libGLU.so.1 - provided by mesa packages such as libglu1-mesa on Ubuntu/Debian

1) Get the Flutter SDK

2) Download the following installation bundle to get the latest stable release of the Flutter SDK:

3) For other release channels, and older builds, see the SDK archive page.

4) Extract the file in the desired location, for example:

content_copy
5) cd ~/development

6) tar xf ~/Downloads/flutter_linux_v1.12.13+hotfix.8-stable.tar.xz
7) If you don’t want to install a fixed version of the installation bundle, you can skip steps 1 and 2. Instead, get the source code from the Flutter repo on GitHub, and change branches or tags as needed. For example:

8) content_copy

9) git clone https://github.com/flutter/flutter.git -b stable
Add the flutter tool to your path:

> content_copy
export PATH="$PATH:pwd/flutter/bin"

10) This command sets your PATH variable for the current terminal window only. To permanently add Flutter to your path, see Update your path.

> Optionally, pre-download development binaries:

11) The flutter tool downloads platform-specific development binaries as needed. For scenarios where pre-downloading these artifacts is preferable (for example, in hermetic build environments, or with intermittent network availability), iOS and Android binaries can be downloaded ahead of time by running:

content_copy
flutter precache

πŸ¦‘Tested by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 updated Hatch is a brute force tool that is used to brute force most websites :
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1)pip2 install selenium

2) pip2 install requests

3) git clone https://github.com/MetaChar/Hatch

4) cd Hatch

5) python2 main.py

πŸ¦‘How to use (text)

1). Find a website with a login page

2). Inspect element to find the Selector of the username form

3). Do the same for the password field

4). The the login form

5). When Asked put in the username to brute force

@UnderCodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
twitter.com/undercodeNews :

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) git clone https://github.com/leebaird/discover /opt/discover/
All scripts must be ran from this location.

2) cd /opt/discover/

3) ./update.sh

API key locations:

recon-ng
show keys
keys add bing_api <value>

theHarvester
/opt/theHarvester/api-keys.yaml


πŸ¦‘ RECON
1. Domain
2. Person
3. Parse salesforce

πŸ¦‘ SCANNING
4. Generate target list
5. CIDR
6. List
7. IP, range, or domain
8. Rerun Nmap scripts and MSF aux

πŸ¦‘WEB
9. Insecure direct object reference
10. Open multiple tabs in Firefox
11. Nikto
12. SSL

πŸ¦‘MISC
13. Parse XML
14. Generate a malicious payload
15. Start a Metasploit listener



@UnderCodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 updated A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) git clone https://github.com/codingo/Reconnoitre.git
After you have done this run setup.py with the following:

2) python3 setup.py install

3) After setup has run Reconnoitre will now be in your path (as reconnoitre) and you can launch it anywhere using:

reconnoitre <args>

πŸ¦‘-h, --help Display help message and exit
-t TARGET_HOSTS Set either a target range of addresses or a single host to target. May also be a file containing hosts.
-o OUTPUT_DIRECTORY Set the target directory where results should be written.
-w WORDLIST Optionally specify your own wordlist to use for pre-compiled commands, or executed attacks.
--pingsweep Write a new target.txt file in the OUTPUT_DIRECTORY by performing a ping sweep and discovering live hosts.
--dns, --dnssweep Find DNS servers from the list of target(s).
--snmp Find hosts responding to SNMP requests from the list of target(s).
--services Perform a service scan over the target(s) and write recommendations for further commands to execute.
--hostnames Attempt to discover target hostnames and write to hostnames.txt.
--virtualhosts Attempt to discover virtual hosts using the specified wordlist. This can be expended via discovered hostnames.
--ignore-http-codes Comma separated list of http codes to ignore with virtual host scans.
--ignore-content-length Ignore content lengths of specificed amount. This may become useful when a server returns a static page on every virtual host guess.
--quiet Supress banner and headers and limit feedback to grepable results.
--quick Move to the next target after performing a quick scan and writing first-round recommendations.
--no-udp Disable UDP service scanning, which is ON by default.


@UnderCodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ ENJOY WITH ALL THOSE 2020 TOOLS - TESTED & Most Populars- Use for Learn..
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ STM32 series BIN file to source code C language by undercode
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) It has always been impossible for all development engineers to convert .BIN or .ASM files into C files. However, from the perspective of the reverse industry of chip decryption, it is completely achievable. However, reverse engineers must have sufficient development experience and sufficient understanding of STM32 series microcontrollers.

2) the binary code BIN file is extracted by chip decryption, and then converted into a C language file. After having the source code, the customer can target Perform secondary development and modification.

3) Usually our operations are, the first step:

> first decrypt, provide the binary code BIN file.


> Step 2: Convert the BIN file into a disassembly file. The assembly file is also a programming file, but few engineers can understand it now.

> Step 3: compiles the C language based on the disassembled file as we do in undercode . This process is edited line by line by the engineer and is also very time consuming. The entire cycle is about 30 days (depending on the file size, normal 100K calculation ).

> Step 4: Debug according to the prototype provided by the customer. After debugging is OK, let the customer confirm.

4) During the entire project development process, customers must provide samples for debugging . After all is completed,

> will generate a BIN face-to-face and burn it into the product for customer testing to ensure that the source code we provide is authentic and reliable. .

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Detailed DS28E01 typical applications and cracking methods
pinterest.com/undercode_testing

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) DS28E01 is generally used in encryption protection to prevent products from being easily copied and pirated

2) Brief introduction of DS28E01:

> DS28E01 communicates with the MCU through a single bus. There is not much to say about the single bus. The time is very strict and accurate to the us level.

3) DS28E01 has four memory areas:

Data Memory (EEPROM) (4 pages, 32 bytes per page)

Key memory (secret) (8 bytes)

Register page with specific functions and user bytes

Volatile scratchpad (8 bytes)


4) The MCU can only read and write the scratchpad through a single bus, and cannot directly read and write to other storage areas.

5) When writing data to the data memory, loading the initial key, or writing data to the register page, the data is first written to the scratchpad, and then the corresponding command is used to allow the chip to copy the data from the scratchpad to the destination address.

πŸ¦‘ working principle:

> There is a SHA-160 encryption module inside the chip, which participates in the SHA algorithm for 55 bytes of specific format data.

> The data contains an 8-byte key, a 5-byte user-specified random number, a 32-byte EEPROM content, a 7-byte ROMID, a 2-byte fixed data (0xFF), and a 1-byte EEPROM address TA1.

> The MCU can read the 20-byte hash value of the chip encrypted by SHA, and compare it with the hash value calculated by the MCU using the same algorithm.

> Since the MCU needs to perform the same encryption operation, or it must definitely generate the same 55-byte message as the chip's internal, how can it be obtained?

> The 8-byte key is generated and written by itself.-> OK

> The 5-byte random number is the value written into the scratchpad before the chip performs the SHA.-> OK

> The 32-byte EEPROM data, before reading back the 20-byte hash value, the chip will return the 32-byte content. -> OK

7-byte ROMID, the ROMID of the chip can@undercodeofficial be read at any time.-> OK

2 bytes fixed value, you can see in the manual-> OK

1 byte TA1, write it in yourself.-> OK

πŸ¦‘ Typical application process:

Process 1: Initialize the DS28E01 key

The initialization key is only operated at the factory before the product is manufactured, and only needs to be operated once.

Procedure flow chart:

1) Read the chip ROMID

2) Generate a unique 64-bit key through a certain algorithm to ensure that the key generated by each motherboard is different.

3) Write the key to the chip temporary storage area and read it back to verify that it is written correctly

4)Execute the chip load key command to let the chip save the 64-bit key in the temporary storage area to the key storage area

5) Done.

πŸ¦‘ Process 2: Verify DS28E01 key

1) The verification key is performed in the product application. Every time the product is started, the DS28E01 key is verified to be correct.

2) If it passes the verification, it will run normally. If the verification is incorrect, it will make the product work abnormally by some means.

πŸ¦‘ Procedure flow chart:

1) Read the chip ROMID

2) Generate the 64-bit key through the same algorithm as in the initialization process

3) Write 8-byte random number to the chip temporary storage area (only 5 bytes are used), and read back to verify

4) Send a cryptographic authentication command to the chip, which can read back 32 bytes of EEPROM data and 20 bytes of hash value

5) Use the data read above to generate a 55-byte digest message and perform the SHA1 operation

6) Compare the hash value calculated by yourself with the hash value read back from the chip


πŸ¦‘Cracking method:

From the above application process, we can see that the key algorithm here is SHA1, and there are two copies of the data participating in the SHA calculation. One is inside the chip, and we cannot read it
However, the other copy is generated inside the MCU, so as long as the process of generating messages inside the MCU is obtained, there is a possibility of cracking.

The key data is an 8-byte key, because the 8-byte key is generally bound to the ROMID and CPUID.

Therefore, the binary code of the program must be able to be read from the chip, and then the algorithm for key generation must be disassembled and analyzed to achieve the purpose of cracking.

However, disassembling and analyzing the algorithm is not easy.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ Last Two tutorial for hackers with little bit experience :)
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ BEST Docker images + tools i fond at git random link -MOst popular hack tools :
for Penetration Testing LASTEST :
fb.com/UnderCodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

docker pull kalilinux/kali-linux-docker official Kali Linux
>https://hub.docker.com/r/kalilinux/kali-linux-docker/

docker pull owasp/zap2docker-stable - official OWASP ZAP
>https://github.com/zaproxy/zaproxy

docker pull wpscanteam/wpscan - official WPScan
> https://hub.docker.com/r/wpscanteam/wpscan/

docker pull pandrew/metasploit - docker-metasploit
> https://hub.docker.com/r/citizenstig/dvwa/

docker pull citizenstig/dvwa - Damn Vulnerable Web Application (DVWA)
> https://hub.docker.com/r/citizenstig/dvwa/

docker pull wpscanteam/vulnerablewordpress - Vulnerable WordPress
Installation
>https://hub.docker.com/r/wpscanteam/vulnerablewordpress/

docker pull hmlio/vaas-cve-2014-6271 - Vulnerability as a service: Shellshock
> https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/

docker pull hmlio/vaas-cve-2014-0160 - Vulnerability as a service: Heartbleed
>https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/

docker pull opendns/security-ninjas - Security Ninjas
> https://hub.docker.com/r/opendns/security-ninjas/


>http://www.xss-payloads.com/ XSS Payloads to leverage XSS vulnerabilities, build custom payloads, practice penetration testing skills.
https://github.com/joaomatosf/jexboss JBoss (and others Java Deserialization Vulnerabilities) verify and EXploitation Tool
https://github.com/commixproject/commix Automated All-in-One OS command injection and exploitation tool
https://github.com/pathetiq/BurpSmartBuster A Burp Suite content discovery plugin that add the smart into the Buster!
https://github.com/GoSecure/csp-auditor Burp and ZAP plugin to analyze CSP headers
https://github.com/ffleming/timing_attack Perform timing attacks against web applications
https://github.com/lalithr95/fuzzapi Fuzzapi is a tool used for REST API pentesting
https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)
https://github.com/nccgroup/wssip Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.
https://github.com/tijme/angularjs-csti-scanner Automated client-side template injection (sandbox escape/bypass) detection for AngularJS (ACSTIS).
https://reshift.softwaresecured.com A source code analysis tool for detecting and managing Java security vulnerabilities.
https://encoding.tools Web app for transforming binary data and strings, including hashes and various encodings. GPLv3 offline version available.
https://gchq.github.io/CyberChef/ A "Cyber Swiss Army Knife" for carrying out various encodings and transformations of binary data and strings.
https://github.com/urbanadventurer/WhatWeb WhatWeb - Next generation web scanner
https://www.shodan.io/ Shodan - The search engine for find vulnerable servers
https://github.com/WangYihang/Webshell-Sniper A webshell manager via terminal

@UnderCodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Is it necessary for an Xbox console to use an accelerator? How did the Dolphin Acceleration Box improve the Xbox? by undercode
instagram.com/UnderCodeTestingCompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1 ) Over the past year, the number of console players has grown rapidly, and the number of Xbox console players, which is one of the three major consoles, has naturally increased significantly, reaching a level that can compete with the Sony PS4.

> Although XBOX no longer announces sales for reasons of paying more attention to player participation, but from the online feedback of games such as Halo 5, Battle Machine 4, and so on, the number of Xbox users is considerable, and in addition to the number, online feedback has another noteworthy The thing is that the Xbox online network is very unstable.

2) The Xbox online network is very unstable, which is mainly reflected in the high delay, character transient, packet loss, and ping, etc. It is necessary to wait for a long time before entering the game or game, causing players a headache. This environment is also forcing players to think about the need for Xbox Accelerators.

3) The Xbox Accelerator can improve the method of game data transmission! Improve the network manifestation in the Xbox game history. A good Xbox Accelerator can make the player's network appear very different, no longer subject the player to the game being unable to connect and disconnect And match the environment with long waiting times.

4) The first full-platform intelligent acceleration hardware-Dolphin Acceleration Box! It is well reflected in the Xbox console acceleration. Players can enjoy Dolphin Acceleration after holding a brief setting! The box improves the results under the HTSA intelligent acceleration strategy and experiences Differences before and after gaming network

5) The Dolphin Acceleration Box breaks through the limitation of NAT types, improves the P2P teaming experience, and uses intelligent acceleration methods to ensure that the network in the game history shows a stable and smooth state of connectivity. It is an Xbox accelerator you are worth buying.

6) Which Xbox accelerator is better, Dolphin Accelerator is your first choice. Dolphin acceleration box, plug and play to solve the poor NAT type in Xbox games. P2P matching speed is too slow and delays, etc., so that your Xbox game network steadily rises and enjoys a high-quality network.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘LAST 24 sended tutorials :

1) 2020 optimize script, performance monitor system- speed up android...

2) 2020 TOPIC Flutter makes it easy and fast to build beautiful mobile apps + pic

3) 2020 updated Hatch is a brute force tool that is used to brute force most websites

4) 2020 Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.

5) 2020 updated A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.

6) STM32 series BIN file to source code C language by undercode

+ Leak & EXPLOITE pdf tutorial

7) Detailed DS28E01 typical applications and cracking methods

8) Is it necessary for an Xbox console to use an accelerator? How did the Dolphin Acceleration Box improve the Xbox? by undercode

ENJOY MORE FOR LATER !@UNDERCODETESTING

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
LOL THIS WAY TO GET MANY ACCOUNT WITH PHISHING , One of undercode testing Report
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Fix Commun error: Network Configuration-Deny Secondary Agent full by undercode :
fb.com/undercodeOfficial

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Because a legitimate IP (MAC and IP has been bound on Linux) was installed as a gateway, MASQUERADE allows all other users to masquerade as this legitimate IP through it, causing anyone to point the gateway It can go out.

> For example: The gateway of 192.168.1.168 (00: 01: 02: 49: 19: 85) points to 192.168.1.254 and can go out. Now two networks are installed on 192.168.1.168, eth0: 192.168.1.168, eth1: 10.136.14.254, configured as a NAT using MASQUERADE, so all 10.136.14.0/24 can be disguised as 192.168.1.168 and go out through 192.168.1.254 .

2) How to identify this situation and reject it or block the IP for one hour. DROP of ETH1 FORWARD to EXT-IP Thank you gentoo, but it seems that this is not the best solution. I understand, but you do n’t know clearly (maybe it ’s a problem of my understanding ability), it ’s convenient to make it clear!

3) This is a recent problem that occurred in our school. IP addresses used by professionals, this network segment can be MASQUERADE on the Internet through S, all IPs on this network segment are bound in / etc / ethers in GateWay S, excluding the possibility of others changing the IP (Of course, you can change the MAC address, this does not care about him). 10.136.14.0/24 This network segment is used by all ordinary students. The problem now is that some individual computer majors add a new network card to their computer, and then set up a Linux, and use MASQUERADE to pretend to be 192.168.1 for everyone on the 10.136.14.0/24 network segment.

4) X goes on the internet. As a result, many students often do things they shouldn't. So in response to this new situation, would you like to ask if you can refuse such a situation? Or have related commercial software.

5) Adding a network card yourself belongs to the category of physical attacks, and it is theoretically impossible to eliminate this situation. It is also useless to divide VLANs. The solution in our school is to rivet all the cases with rivets.

6) Only a few people have the right to open the case and then divide the VLAN, which works well. The IP of the network segment 192.168.1.0 is bound to the mac. The student uses the IP of the network segment 10.136.14.0/24.

7) How can the student obtain the IP of the network segment of 192.168.1.0? Students can't get the IP of 192.16.8.1.0 on this network segment, can't it be disguised? It is 192.168.1.0/24 that an IP owner set up a Linux, and then use MASQUERADE to disguise all 10.136.14.0/24 people as 192.168.1.X, so that 10.136.14.0/24 can go out Yeah. Theoretically, to prevent this situation, you need to be able to identify whether the packet is from the real 192.168.1.X or has been spoofed. But this seems to be more difficult, you need someone who can come up with a good idea

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Install PHP as Apache DSOPHP full by undercode
instagram.com/UnderCodeTestingCompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Install PHP as Apache DSOPHP is often used with the Apache Web server for Linux / Unix platforms. When we install PHP in the Apache environment, you have three installation modes to choose from: static modules, dynamic modules (DSO), and CGI.

2) I suggest you install PHP as Apached's DSO. This installation mode is very easy to maintain and upgrade. For example, suppose you originally installed only database support for PHP. But after a few days you decided to add encryption to PHP. Quite simply, you just need to type the make clean command, add new configuration options, and then execute the make and make install commands.

3) In this way, the new PHP module will be installed in the appropriate location on Apache, you just restart Apache and everything is OK, of course, the entire process does not need to recompile Apache at all.

4) The simple steps to install a new version of Apache and PHP as an

πŸ¦‘ Apache DSO are as follows:

1) Download the latest version of the source code for the Apache server software from the Apache Software Foundation site.

2) Place the code files in a suitable directory such as / usr / local / or / opt /.

3) Use the Gunzip command to decompress the code file, then you can get the corresponding * .tar file.

4) Type the following unpacking command to place the above tar file in a directory of the form apache_ [version]:

tar -xvf apache_ [version] .tar

5) Go to the / usr / local / apache_ [version] directory (or The directory you specified in the above step).

6) Type the following configuration command and replace the [path] parameter with the path you set (such as / usr / local / apache [version], etc., be careful not to follow the slash!), And you also need to enable the mod_so parameter to allow Apache uses DSO.

./configure --prefix = [path] --enable-module = so

7) Return to the command prompt and type make and wait for the command execution to complete and return to the command prompt again.

8) Type make install.

At this point, the compiler can create the final directory and return to the system command prompt.

πŸ¦‘ Next install PHP:

1)Visit the download area of ​​the PHP homepage and select the link for the latest version of the source code.

2) Place the downloaded file in an appropriate directory such as / usr / local / or / opt /.

3) Use the Gunzip command to decompress the code file, then you can get the corresponding * .tar file.

4)Type the following unpacking command to put the above tar file into a directory of the form php- [version]:

tar -xvf php- [version]

5) Go to the / usr / local / php- [version] directory (Or the directory you specified).

Now you can compile PHP DSO. In fact, only one necessary configuration option is needed here-with-apxs (a file in the Apache bin directory)-however, for more comprehensive system configuration, we also added a MySQL database here support.

./configure --with-mysql = / [path to mysql] --with-apxs = / [path to apxs]

6) Return to the command prompt and type make and wait until the command is complete and return to the command prompt. .

7) Type the make install command.

πŸ¦‘ At this time, the compiler will create the final DSO and place it in the Apache module directory. At the same time, it will modify the Apache httpd.conf configuration file for you. After that, the system returns to the command prompt and waits for you to enter new instructions. Then, you can open the Apache httpd.conf configuration file to make some corrections:

1) Find the line with ServerAdmin and add your own email address, as follows:

ServerAdmin you@yourdomain.com

2) Find the beginning with ServerName Line, change the following parameters to actual values, such as:

ServerName localhost

3) Find the following paragraph:

# And for PHP 4.x, use:
#
#AddType application / x-httpd-php .php
#AddType application / x- httpd-php-source.phps
modify these configuration lines to uncomment some of the comments before AddType under PHP 4.0. At the same time you should add some file extensions used by PHP. The above modified lines may look like Here's how:

# And for PHP 4.x, use:
#
AddType application / x-httpd-php .php .phtml
AddType application / x-httpd-php-source .phps

Save the above configuration file and return to the parent directory, Start Apache by typing:

./bin/apachectl start

πŸ¦‘If there are no problems during startup, you can test the installation of Apache and PHP by creating a file called phpinfo.php, which contains the following lines of code:

<? Phpinfo ()?>

> Save the file and Place it in the Apache document root directory (htdocs), then start your web browser, type http: //localhost/phpinfo.php in the browser address bar, and the browser will display a large space Various variables and variable values ​​of the PHP and Apache systems.

> If you want to reset PHP, all you need to do is run the make clean command, then the ./configure command with the new configuration options, and then make and make install. In this way, a new module will appear in the Apache module directory, you just need to restart Apache to load the new module. Many previous headaches are now solved.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁