β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦SOME FACEBOOK CVE TYPES
fb.com/UnderCodeTesting :
π¦ ππΌππ πππΈβπ :
1) CVE-2019-15841 352 CSRF 2019-08-30 2019-09-03 6.8 None Remote Medium Not required Partial Partial Partial
The facebook-for-woocommerce plugin before 1.9.15 for WordPress has CSRF via ajax_woo_infobanner_post_click, ajax_woo_infobanner_post_xout, or ajax_fb_toggle_visibility.
2) CVE-2019-15840 352 CSRF 2019-08-30 2019-09-03 6.8 None Remote Medium Not required Partial Partial Partial
The facebook-for-woocommerce plugin before 1.9.14 for WordPress has CSRF.
3) CVE-2019-11929 119 Exec Code Overflow 2019-10-02 2019-10-10 7.5 None Remote Low Not required Partial Partial Partial
Insufficient boundary checks when formatting numbers in number_format allows read/write access to out-of-bounds memory, potentially leading to remote code execution. This issue affects HHVM versions prior to 3.30.10, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.18.2, and versions 4.19.0, 4.19.1, 4.20.0, 4.20.1, 4.20.2, 4.21.0, 4.22.0, 4.23.0.
4) CVE-2019-11926 125 2019-09-06 2019-10-09 7.5 None Remote Low Not required Partial Partial Partial
Insufficient boundary checks when processing M_SOFx markers from JPEG headers in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1.
5) CVE-2019-11925 125 2019-09-06 2019-10-09 7.5 None Remote Low Not required Partial Partial Partial
Insufficient boundary checks when processing the JPEG APP12 block marker in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1.
6) CVE-2019-11924 400 2019-08-20 2019-08-30 7.8 None Remote Low Not required None None Complete
A peer could send empty handshake fragments containing only padding which would be kept in memory until a full handshake was received, resulting in memory exhaustion. This issue affects versions v2019.01.28.00 and above of fizz, until v2019.08.05.00.
7) CVE-2019-11922 362 2019-07-25 2019-08-12 6.8 None Remote Medium Not required Partial Partial Partial
A race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.
8) CVE-2019-11921 787 2019-07-25 2019-08-02 7.5 None Remote Low Not required Partial Partial Partial
An out of bounds write is possible via a specially crafted packet in certain configurations of Proxygen due to improper handling of Base64 when parsing malformed binary content in Structured HTTP Headers.
Powered by Wiki
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦SOME FACEBOOK CVE TYPES
fb.com/UnderCodeTesting :
π¦ ππΌππ πππΈβπ :
1) CVE-2019-15841 352 CSRF 2019-08-30 2019-09-03 6.8 None Remote Medium Not required Partial Partial Partial
The facebook-for-woocommerce plugin before 1.9.15 for WordPress has CSRF via ajax_woo_infobanner_post_click, ajax_woo_infobanner_post_xout, or ajax_fb_toggle_visibility.
2) CVE-2019-15840 352 CSRF 2019-08-30 2019-09-03 6.8 None Remote Medium Not required Partial Partial Partial
The facebook-for-woocommerce plugin before 1.9.14 for WordPress has CSRF.
3) CVE-2019-11929 119 Exec Code Overflow 2019-10-02 2019-10-10 7.5 None Remote Low Not required Partial Partial Partial
Insufficient boundary checks when formatting numbers in number_format allows read/write access to out-of-bounds memory, potentially leading to remote code execution. This issue affects HHVM versions prior to 3.30.10, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.18.2, and versions 4.19.0, 4.19.1, 4.20.0, 4.20.1, 4.20.2, 4.21.0, 4.22.0, 4.23.0.
4) CVE-2019-11926 125 2019-09-06 2019-10-09 7.5 None Remote Low Not required Partial Partial Partial
Insufficient boundary checks when processing M_SOFx markers from JPEG headers in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1.
5) CVE-2019-11925 125 2019-09-06 2019-10-09 7.5 None Remote Low Not required Partial Partial Partial
Insufficient boundary checks when processing the JPEG APP12 block marker in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1.
6) CVE-2019-11924 400 2019-08-20 2019-08-30 7.8 None Remote Low Not required None None Complete
A peer could send empty handshake fragments containing only padding which would be kept in memory until a full handshake was received, resulting in memory exhaustion. This issue affects versions v2019.01.28.00 and above of fizz, until v2019.08.05.00.
7) CVE-2019-11922 362 2019-07-25 2019-08-12 6.8 None Remote Medium Not required Partial Partial Partial
A race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.
8) CVE-2019-11921 787 2019-07-25 2019-08-02 7.5 None Remote Low Not required Partial Partial Partial
An out of bounds write is possible via a specially crafted packet in certain configurations of Proxygen due to improper handling of Base64 when parsing malformed binary content in Structured HTTP Headers.
Powered by Wiki
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
UndercOde Testing Company
UndercOde Testing Company. 97 likes Β· 3 talking about this. Programming, Hacking,Security, Web & Applications Developpements, Fix Errors , Hosts, Server Security, Hacking Pentest, Phone softwares &...
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ New Critical RCE Bug in OpenBSD SMTP Server Threatens Linux Distros
twitter.com/undercodeNews
π¦ ππΌππ πππΈβπ :
1) Security researchers have discovered a new critical vulnerability in the OpenSMTPD email server. An attacker could exploit it remotely to run shell commands as root on the underlying operating system.
2) OpenSMTPD is present on many Unix-based systems, including FreeBSD, NetBSD, macOS, Linux (Alpine, Arch, Debian, Fedora, CentOS).
3) Bug present since late 2015
Tracked as CVE-2020-8794, the remote code execution bug is present in OpenSMTPD's default installation. Proof-of-concept (PoC) exploit code
4) Server-side exploitation is possible when the attacker connects to the OpenSMTPD server and sends an email that creates a bounce.
When OpenSMTPD connects back to deliver the bounce, the attacker can take advantage of the client-side vulnerability.
5) On OpenBSD, binary patches are available by running the 'syspatch' command and confirming that OpenSMTPD restarted:
$ doas syspatch
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ New Critical RCE Bug in OpenBSD SMTP Server Threatens Linux Distros
twitter.com/undercodeNews
π¦ ππΌππ πππΈβπ :
1) Security researchers have discovered a new critical vulnerability in the OpenSMTPD email server. An attacker could exploit it remotely to run shell commands as root on the underlying operating system.
2) OpenSMTPD is present on many Unix-based systems, including FreeBSD, NetBSD, macOS, Linux (Alpine, Arch, Debian, Fedora, CentOS).
3) Bug present since late 2015
Tracked as CVE-2020-8794, the remote code execution bug is present in OpenSMTPD's default installation. Proof-of-concept (PoC) exploit code
4) Server-side exploitation is possible when the attacker connects to the OpenSMTPD server and sends an email that creates a bounce.
When OpenSMTPD connects back to deliver the bounce, the attacker can take advantage of the client-side vulnerability.
5) On OpenBSD, binary patches are available by running the 'syspatch' command and confirming that OpenSMTPD restarted:
$ doas syspatch
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Twitter
UNDERCODE NEWS (@UndercodeNews) | Twitter
The latest Tweets from UNDERCODE NEWS (@UndercodeNews). We provides you daily hacking News & Security Warning & Technologies news & Bugs reports & Analysis... @UndercodeNews @UndercodeUpdate @iUndercode @DailyCve. Aus/Leb
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦SSH Secure Shell 3.0.0 Vulnerability Scanner how and why ?
twitter.com/undercodeNews
π¦ ππΌππ πππΈβπ :
1) The following tool will scan the network for hosts using the vulnerable SSH version 3.0 that allows attackers to login to accounts without prompting for a user when their password is shorter than two characters.
2) Tool:
#!/usr/bin/perl
#
# A local SSH 3.0.0 vulnerability scanner for the
# SSH Short Password Login Vulnerability
#
# Note: You must have superuser access on the system to scan it.
#
# usage: ./ssh3.pl
# Optional: -e turn off error
# -h specify a different /etc/shadow file
# (Options must come before host name)
#
# This and all of my programs fall under my disclaimer, which
# can be found at: http://hypoclear.cjb.net/hypodisclaim.txt
use IO::Socket; use Getopt::Std;
getopts(''h:e'');
4) die "" usage: $0 Optional: -e turn off error -h specify a different /etc/shadow file "" unless @ARGV > 0;
if (!defined $opt_h)
{ $opt_h = ""/etc/shadow"";
}
$out = &bannerGrab($ARGV[0],22);
sysread $out, $message,100;
close $out;
5) if (($message =~ /3.0.0/) || (defined $opt_e))
{ print ""Running SSH 3.0.0, checking for vulnerabilities... "";
open(SHADOW, ""<$opt_h"") || die ""Cannot open $opt_h! Note: You must have superuser access to run this script. "";
while()
{ $name = $_;
$name =~ s/:.*$//;
$_ =~ s/^.*?://;
$_ =~ s/:.*$//;
$name =~ s/s//g; $_=~s/s//g;
push(@name,$name);
push(@hash,$_);
push(@lnnum,$cnt++); $cnt++;
}
close(SHADOW);
foreach $hash (@hash)
{ @chars = split(//,$hash);
foreach $char (@chars)
{ $count++;
}
if ($count <= 2)
{ print ""$name[$line] (line $lnnum[$line]) may be vulnerable! "";
$vulnFlag = 1;
}
$count=0; $line++;
}
if ($vulnFlag != 1)
{ print ""No accounts appear to be vulnerable. "";
}
}
else
{ if (!defined $opt_e)
{ print ""You are not running SSH 3.0.0. "";
die ""If you feel that this is an error run with the -e option. "";
}
}
print "" "";
6) sub bannerGrab
{ $host = gethostbyname($_[0]) || warn ""cannot connect to $ARGV[0] "";
$port = getservbyport($_[1], ''tcp'');
$haddr = sockaddr_in($_[1], $host);
socket(OUT, PF_INET, SOCK_STREAM, getprotobyname(''tcp'')) || warn ""$! "";
connect(OUT, $haddr) ;
return OUT;
}
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦SSH Secure Shell 3.0.0 Vulnerability Scanner how and why ?
twitter.com/undercodeNews
π¦ ππΌππ πππΈβπ :
1) The following tool will scan the network for hosts using the vulnerable SSH version 3.0 that allows attackers to login to accounts without prompting for a user when their password is shorter than two characters.
2) Tool:
#!/usr/bin/perl
#
# A local SSH 3.0.0 vulnerability scanner for the
# SSH Short Password Login Vulnerability
#
# Note: You must have superuser access on the system to scan it.
#
# usage: ./ssh3.pl
# Optional: -e turn off error
# -h specify a different /etc/shadow file
# (Options must come before host name)
#
# This and all of my programs fall under my disclaimer, which
# can be found at: http://hypoclear.cjb.net/hypodisclaim.txt
use IO::Socket; use Getopt::Std;
getopts(''h:e'');
4) die "" usage: $0 Optional: -e turn off error -h specify a different /etc/shadow file "" unless @ARGV > 0;
if (!defined $opt_h)
{ $opt_h = ""/etc/shadow"";
}
$out = &bannerGrab($ARGV[0],22);
sysread $out, $message,100;
close $out;
5) if (($message =~ /3.0.0/) || (defined $opt_e))
{ print ""Running SSH 3.0.0, checking for vulnerabilities... "";
open(SHADOW, ""<$opt_h"") || die ""Cannot open $opt_h! Note: You must have superuser access to run this script. "";
while()
{ $name = $_;
$name =~ s/:.*$//;
$_ =~ s/^.*?://;
$_ =~ s/:.*$//;
$name =~ s/s//g; $_=~s/s//g;
push(@name,$name);
push(@hash,$_);
push(@lnnum,$cnt++); $cnt++;
}
close(SHADOW);
foreach $hash (@hash)
{ @chars = split(//,$hash);
foreach $char (@chars)
{ $count++;
}
if ($count <= 2)
{ print ""$name[$line] (line $lnnum[$line]) may be vulnerable! "";
$vulnFlag = 1;
}
$count=0; $line++;
}
if ($vulnFlag != 1)
{ print ""No accounts appear to be vulnerable. "";
}
}
else
{ if (!defined $opt_e)
{ print ""You are not running SSH 3.0.0. "";
die ""If you feel that this is an error run with the -e option. "";
}
}
print "" "";
6) sub bannerGrab
{ $host = gethostbyname($_[0]) || warn ""cannot connect to $ARGV[0] "";
$port = getservbyport($_[1], ''tcp'');
$haddr = sockaddr_in($_[1], $host);
socket(OUT, PF_INET, SOCK_STREAM, getprotobyname(''tcp'')) || warn ""$! "";
connect(OUT, $haddr) ;
return OUT;
}
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Twitter
UNDERCODE NEWS (@UndercodeNews) | Twitter
The latest Tweets from UNDERCODE NEWS (@UndercodeNews). We provides you daily hacking News & Security Warning & Technologies news & Bugs reports & Analysis... @UndercodeNews @UndercodeUpdate @iUndercode @DailyCve. Aus/Leb
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HOW TO USE [Turn] PHP as Shell Script ?
fb.com/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) Why PHP is so
popular Recently PHP (Personal Hypertext Preprocessor) seems to have become the most widely used web processing language on Linux / Unix in the past two years. Its convenience, powerful functions and OpenSource features have gradually eroded it. In the traditional CGI and even the MicroSoft ASP (Active Server Page) market, almost every major website recruits people with PHP as its basic condition.
2) PHP does have this qualification and can be so
popular for several reasons: PHP is OpenSource software, completely free and can be distributed freely, so it has attracted a lot of people to use it, and because of this, it has attracted commercial companies to develop it better Engine and optimization software
3) PHP itself is very simple and easy to understand, with a simple instruction syntax, plus some basic object-oriented processing capabilities, so that novices can learn in the shortest time.
4) PHP provides quite a lot of functions, including mathematical processing, string processing, network-related functions, support for various databases, image processing functions, and a large number of developers are developing various new functions for PHP, expanding Excellent sex.
5) PHP is very easy to combine with Apache. It is used as an Apache module, and it is quite simple to set up and install. Because Apache has already occupied 60% of the global Web Server market, PHP naturally becomes the best combination of Apache.
6) However, the topic this time is not the application of PHP in web design, but the application of PHP in Shell Script. Generally known Shell Script is about tcsh, bash, perl or python. I want It's all about using PHP as a shell script.
π¦ Installation of PHP executable files
1) Generally, PHP as a web processing language is compiled into Apache modules. Of course, it is not necessary to do this, so it is very easy to compile. As long as the root, perform the following actions:
> Unzip php-3.0.xx. After tar.gz
cd php
configure
make is
compiled, there is an executable file in the php directory named php and you can copy it to / usr / local / bin. Note that if the file is too large, you can use the strip command to remove unnecessary information from PHP, so the file will be much smaller.
2) The first program
starts writing our first PHP Shell Script program. This example prints "Hello world!":
#! / Usr / local / bin / php -q
<?
Echo "Hello, world!";
?>
3) Note that PHP was originally used in web applications, so it will definitely send HTML headers, but here we are using PHP as a shell script, "-q"
4) In this example, / usr / local / bin / php is meant to execute PHP under / usr / local / bin / because we just installed it there. The echo command prints "Hello, world!", where the "" character is a newline character.
5) Note that after saving this program as a file, you must change its chmod to an executable attribute (chmod + x file name) before you can run it.
6) Advanced use of I
Sometimes we need to input some parameters when the program is executed, such as the ls command, followed by the -l parameter. PHP Shell Script also supports this usage. There are two special variables: $ argc keeps track of the number of arguments passed in, and the $ argv [] array argument holds the contents of the argument. For example, I want to design a program that calculates the sum of two numbers:
#! / Usr / local / bin / php -q
<?
$ Sum = 0;
$ sum = $ sum + $ argv [1] + $ argv [2] ;
echo $ sum;
?>
7) Assuming this program is named sum.php3, execute sum.php3 1 2 Press enter and it will print 3.
If you want to calculate an unspecified number of parameters, you need to use the special variable $ argc:
#! / Usr / local / bin / php -q
<?
$ Sum = 0;
for ($ t = 1; $ t <= $ argc; $ t ++)
$ sum = $ sum + $ argv [$ t];
echo $ sum;
?>
π¦HOW TO USE [Turn] PHP as Shell Script ?
fb.com/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) Why PHP is so
popular Recently PHP (Personal Hypertext Preprocessor) seems to have become the most widely used web processing language on Linux / Unix in the past two years. Its convenience, powerful functions and OpenSource features have gradually eroded it. In the traditional CGI and even the MicroSoft ASP (Active Server Page) market, almost every major website recruits people with PHP as its basic condition.
2) PHP does have this qualification and can be so
popular for several reasons: PHP is OpenSource software, completely free and can be distributed freely, so it has attracted a lot of people to use it, and because of this, it has attracted commercial companies to develop it better Engine and optimization software
3) PHP itself is very simple and easy to understand, with a simple instruction syntax, plus some basic object-oriented processing capabilities, so that novices can learn in the shortest time.
4) PHP provides quite a lot of functions, including mathematical processing, string processing, network-related functions, support for various databases, image processing functions, and a large number of developers are developing various new functions for PHP, expanding Excellent sex.
5) PHP is very easy to combine with Apache. It is used as an Apache module, and it is quite simple to set up and install. Because Apache has already occupied 60% of the global Web Server market, PHP naturally becomes the best combination of Apache.
6) However, the topic this time is not the application of PHP in web design, but the application of PHP in Shell Script. Generally known Shell Script is about tcsh, bash, perl or python. I want It's all about using PHP as a shell script.
π¦ Installation of PHP executable files
1) Generally, PHP as a web processing language is compiled into Apache modules. Of course, it is not necessary to do this, so it is very easy to compile. As long as the root, perform the following actions:
> Unzip php-3.0.xx. After tar.gz
cd php
configure
make is
compiled, there is an executable file in the php directory named php and you can copy it to / usr / local / bin. Note that if the file is too large, you can use the strip command to remove unnecessary information from PHP, so the file will be much smaller.
2) The first program
starts writing our first PHP Shell Script program. This example prints "Hello world!":
#! / Usr / local / bin / php -q
<?
Echo "Hello, world!";
?>
3) Note that PHP was originally used in web applications, so it will definitely send HTML headers, but here we are using PHP as a shell script, "-q"
4) In this example, / usr / local / bin / php is meant to execute PHP under / usr / local / bin / because we just installed it there. The echo command prints "Hello, world!", where the "" character is a newline character.
5) Note that after saving this program as a file, you must change its chmod to an executable attribute (chmod + x file name) before you can run it.
6) Advanced use of I
Sometimes we need to input some parameters when the program is executed, such as the ls command, followed by the -l parameter. PHP Shell Script also supports this usage. There are two special variables: $ argc keeps track of the number of arguments passed in, and the $ argv [] array argument holds the contents of the argument. For example, I want to design a program that calculates the sum of two numbers:
#! / Usr / local / bin / php -q
<?
$ Sum = 0;
$ sum = $ sum + $ argv [1] + $ argv [2] ;
echo $ sum;
?>
7) Assuming this program is named sum.php3, execute sum.php3 1 2 Press enter and it will print 3.
If you want to calculate an unspecified number of parameters, you need to use the special variable $ argc:
#! / Usr / local / bin / php -q
<?
$ Sum = 0;
for ($ t = 1; $ t <= $ argc; $ t ++)
$ sum = $ sum + $ argv [$ t];
echo $ sum;
?>
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
8) Assuming this program is named bigsum.php3, then running bigsum.php3 1 2 3 4 5 Pressing enter will print 15; executing bigsum.php3 1 2 3 4 5 6 pressing enter will Print out 21.
Sometimes we need to input data during the execution of the program, but PHP is originally used for web design, and the data input on the webpage is naturally input by FORM, so the problem comes when PHP is used as the shell script. In PHP, the file opening function is provided. Under Linux / Uinx, inputting can be done by opening files. We need to open the device file / dev / stdin (stdin is (Meaning standard input), the program is as follows:
#! / Usr / local / bin / php -q
<?
$ Fp = fopen ("/ dev / stdin", "r");
$ inputstr = fgets ($ fp, 100 );
fclose ($ fp);
echo "\ n ---------------------- \ n";
echo $ inputstr;
?>
9) where fgets ($ fp , 100) refers to the file $ fp (that is, "/ dev / stdin" ) Read 100 bytes of data, the program will stop at this line and wait for our input. After we enter and press enter, the program will print the data we just entered.
Advanced Use II
10) Although it can already handle input, such a function is obviously too simple to cope with larger applications. For example, I need a function to remove the HTML from a data stream. At this time, it needs to be complete. The ability to handle output and input redirection, we can first design the program as follows:
#! / Usr / local / bin / php -q
<?
$ Fp = fopen ("/ dev / stdin", "r");
while (! Feof ( $ fp)) {
$ c = fgetc ($ fp);
$ inputstr = $ inputstr. $ c;
};
fclose ($ fp);
echo $ inputstr;
?>
11) Assuming this program is named filt.php3, if you directly Run this program, it will wait for your input, it will not print your input data until you press Ctrl + D, we can run it like this :
more filt.php3 | filt.php3
12) This way is to filter The .php3 program is shown with more and switched to the program filt.php3. Filt.php3 will continue to accept information (in fact, the code of the filt.php3 program), and finally print it out.
We can add HTML filtering to it:
#! / Usr / local / bin / php -q
<?
$ Fp = fopen ("/ dev / stdin", "
while (! feof ($ fp)) {
$ c = fgetc ($ fp);
$ inputstr = $ inputstr. $ c;
};
fclose ($ fp);
$ inputstr = ereg_replace ("<([^ <>] * )> "," ", $ inputstr);
echo $ inputstr;
?>
13) Suppose this program is named filt2.php3, so that the filtering function is completed. If you do nβt believe me, please try an HTML file:
more xxx.html filt2.php3
You will see that the HTML TAG file has been deleted.
Conclusion
14) PHP is actually quite easy to use as Shell Script, because PHP itself is easy to learn, and it supports various databases. After you have often used PHP to design your website, you definitely do not like to use other Shell Script language to deal with other parts that must not be web pages. At this time, the benefits of using PHP as Shell Script will become apparent. You can develop the entire system in a consistent manner, without having to use PHP and use it again. Perl / Python or C.
15) The domestic PHP atmosphere has been quite prosperous. The LinuxFab on this site is developed entirely with PHP and MySQL. In fact, there are still many wonderful uses of PHP. I have the opportunity to introduce it later. If readers need information about PHP, welcome to this site. Participate in more discussions on the PHP forum.
& nb
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Sometimes we need to input data during the execution of the program, but PHP is originally used for web design, and the data input on the webpage is naturally input by FORM, so the problem comes when PHP is used as the shell script. In PHP, the file opening function is provided. Under Linux / Uinx, inputting can be done by opening files. We need to open the device file / dev / stdin (stdin is (Meaning standard input), the program is as follows:
#! / Usr / local / bin / php -q
<?
$ Fp = fopen ("/ dev / stdin", "r");
$ inputstr = fgets ($ fp, 100 );
fclose ($ fp);
echo "\ n ---------------------- \ n";
echo $ inputstr;
?>
9) where fgets ($ fp , 100) refers to the file $ fp (that is, "/ dev / stdin" ) Read 100 bytes of data, the program will stop at this line and wait for our input. After we enter and press enter, the program will print the data we just entered.
Advanced Use II
10) Although it can already handle input, such a function is obviously too simple to cope with larger applications. For example, I need a function to remove the HTML from a data stream. At this time, it needs to be complete. The ability to handle output and input redirection, we can first design the program as follows:
#! / Usr / local / bin / php -q
<?
$ Fp = fopen ("/ dev / stdin", "r");
while (! Feof ( $ fp)) {
$ c = fgetc ($ fp);
$ inputstr = $ inputstr. $ c;
};
fclose ($ fp);
echo $ inputstr;
?>
11) Assuming this program is named filt.php3, if you directly Run this program, it will wait for your input, it will not print your input data until you press Ctrl + D, we can run it like this :
more filt.php3 | filt.php3
12) This way is to filter The .php3 program is shown with more and switched to the program filt.php3. Filt.php3 will continue to accept information (in fact, the code of the filt.php3 program), and finally print it out.
We can add HTML filtering to it:
#! / Usr / local / bin / php -q
<?
$ Fp = fopen ("/ dev / stdin", "
while (! feof ($ fp)) {
$ c = fgetc ($ fp);
$ inputstr = $ inputstr. $ c;
};
fclose ($ fp);
$ inputstr = ereg_replace ("<([^ <>] * )> "," ", $ inputstr);
echo $ inputstr;
?>
13) Suppose this program is named filt2.php3, so that the filtering function is completed. If you do nβt believe me, please try an HTML file:
more xxx.html filt2.php3
You will see that the HTML TAG file has been deleted.
Conclusion
14) PHP is actually quite easy to use as Shell Script, because PHP itself is easy to learn, and it supports various databases. After you have often used PHP to design your website, you definitely do not like to use other Shell Script language to deal with other parts that must not be web pages. At this time, the benefits of using PHP as Shell Script will become apparent. You can develop the entire system in a consistent manner, without having to use PHP and use it again. Perl / Python or C.
15) The domestic PHP atmosphere has been quite prosperous. The LinuxFab on this site is developed entirely with PHP and MySQL. In fact, there are still many wonderful uses of PHP. I have the opportunity to introduce it later. If readers need information about PHP, welcome to this site. Participate in more discussions on the PHP forum.
& nb
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Kernel Technology-Compile and Upgrade Kernel-2.6.0 Kernel as example
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
> the method of compiling the kernel is more convenient. If you are using GRUB boot, it is more convenient to install the new kernel without changing any files.
1) Download the 2.6.0 kernel
wget http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.0.tar.gz
2)Decompress the kernel
tar zvxf / download path /linux-2.6.0.tar.gz in the / usr / src directory
3) Configuration
# make mrproper
# make menuconfig
make mrproper is an action to clean up the code tree and ensure that the source code is clean
4) Compile
make
5) Install
make modules_install
make install
It seems that the compilation of 2.6 is much more convenient than before. The previous steps such as make bzImage make modules are all done in the make step. Previously, the cp kernel and System.map were also modified. The steps for modifying Grub.conf , All make install is done, convenient
> If you are assured, you can go to the / boot directory to see if the latest vlinuz-2.6.0 and System.map-2.6.0 and grub.conf are automatically configured for you.
Ok, reboot the machine
Enjoy the charm of the 2.6 kernel, enjoy it
π¦attached: (common mistakes)
) After an error message appears after startup, it deadlocks:
kernel panic: no init found, try passing init = option to kernel ....... ......
> solution: Note that if your system is beginning ext3 format, preferably directly to the ext3 file system compiled into the kernel, and not to load the module, otherwise the start will be similar to the reported error
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Kernel Technology-Compile and Upgrade Kernel-2.6.0 Kernel as example
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
> the method of compiling the kernel is more convenient. If you are using GRUB boot, it is more convenient to install the new kernel without changing any files.
1) Download the 2.6.0 kernel
wget http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.0.tar.gz
2)Decompress the kernel
tar zvxf / download path /linux-2.6.0.tar.gz in the / usr / src directory
3) Configuration
# make mrproper
# make menuconfig
make mrproper is an action to clean up the code tree and ensure that the source code is clean
4) Compile
make
5) Install
make modules_install
make install
It seems that the compilation of 2.6 is much more convenient than before. The previous steps such as make bzImage make modules are all done in the make step. Previously, the cp kernel and System.map were also modified. The steps for modifying Grub.conf , All make install is done, convenient
> If you are assured, you can go to the / boot directory to see if the latest vlinuz-2.6.0 and System.map-2.6.0 and grub.conf are automatically configured for you.
Ok, reboot the machine
Enjoy the charm of the 2.6 kernel, enjoy it
π¦attached: (common mistakes)
) After an error message appears after startup, it deadlocks:
kernel panic: no init found, try passing init = option to kernel ....... ......
> solution: Note that if your system is beginning ext3 format, preferably directly to the ext3 file system compiled into the kernel, and not to load the module, otherwise the start will be similar to the reported error
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to connect PHP and Oracle without using OCI8 interface
instagram.com/undercodeTestingCompany
π¦ ππΌππ πππΈβπ :
1)With the expansion of the scale of the site, MySql obviously can not meet the demand, many sites are in
the case of large-scale Oracle database, how to use PHP to access Oracle becomes more and more important.
2) I talk about how I do it from a simple iERP system I wrote, and it is also explained in the official PHP manual.
Under normal circumstances or most people use Oracle8 Call-Interface (OCI8) to connect to the database.
30 Here I introduce the use of PHP's Oracle functions to connect to the database and process data without using the OCI8 interface.
π¦ Note:
> Remove the php.ini configuration; the semicolon before
extension = php_oracle.dll is extension = php_oracle.dll
1) connect to the database
Use ora_logon () or ora_plogon () to connect to the database
ora_plogon function ora_logon similar, but ora_plogon open and Oracle's long-term link
up web service stops
$ handle = ora_plogon ("system @ localhost", "manager") or die;
"system @ localhost" where localhost is the oracle SID name, system is the user name, and manager is the user password
2) open the cursor
$ cursor = ora_open ($ handle);
3) Analyze the syntax and execute the instruction $ query = "select count (*) from area where areacode = '$ addcode'";
ora_parse ($ cursor, $ query) or die;
ora_exec ($ cursor);
4) get data
if (ora_fetch ($ cursor))
$ datacount = ora_getcolumn ($ cursor, 0);
5)_ close the cursor
ora_close ($ cursor);
Of course you may do is delete or insert statement the step of acquiring the data does not exist, such as:
INSERT :( insert)
$handle = ora_plogon("system@localhost", "manager") or die;
ora_commiton($handle);
$cursor = ora_open($handle);
$query = "insert into area(areacode,areaname) values('$addcode','$addname')";
ora_parse($cursor, $query) or die;
ora_exec($cursor);
ora_close($cursor);
DELETE: (Delete)
$handle = ora_plogon("system@localhost", "manager") or die;
$cursor = ora_open($handle);
ora_commiton($handle);
$query = "delete from area where areacode in ('222','444')" ;
ora_parse($cursor, $query) or die;
ora_exec($cursor);
ora_close($cursor)
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to connect PHP and Oracle without using OCI8 interface
instagram.com/undercodeTestingCompany
π¦ ππΌππ πππΈβπ :
1)With the expansion of the scale of the site, MySql obviously can not meet the demand, many sites are in
the case of large-scale Oracle database, how to use PHP to access Oracle becomes more and more important.
2) I talk about how I do it from a simple iERP system I wrote, and it is also explained in the official PHP manual.
Under normal circumstances or most people use Oracle8 Call-Interface (OCI8) to connect to the database.
30 Here I introduce the use of PHP's Oracle functions to connect to the database and process data without using the OCI8 interface.
π¦ Note:
> Remove the php.ini configuration; the semicolon before
extension = php_oracle.dll is extension = php_oracle.dll
1) connect to the database
Use ora_logon () or ora_plogon () to connect to the database
ora_plogon function ora_logon similar, but ora_plogon open and Oracle's long-term link
up web service stops
$ handle = ora_plogon ("system @ localhost", "manager") or die;
"system @ localhost" where localhost is the oracle SID name, system is the user name, and manager is the user password
2) open the cursor
$ cursor = ora_open ($ handle);
3) Analyze the syntax and execute the instruction $ query = "select count (*) from area where areacode = '$ addcode'";
ora_parse ($ cursor, $ query) or die;
ora_exec ($ cursor);
4) get data
if (ora_fetch ($ cursor))
$ datacount = ora_getcolumn ($ cursor, 0);
5)_ close the cursor
ora_close ($ cursor);
Of course you may do is delete or insert statement the step of acquiring the data does not exist, such as:
INSERT :( insert)
$handle = ora_plogon("system@localhost", "manager") or die;
ora_commiton($handle);
$cursor = ora_open($handle);
$query = "insert into area(areacode,areaname) values('$addcode','$addname')";
ora_parse($cursor, $query) or die;
ora_exec($cursor);
ora_close($cursor);
DELETE: (Delete)
$handle = ora_plogon("system@localhost", "manager") or die;
$cursor = ora_open($handle);
ora_commiton($handle);
$query = "delete from area where areacode in ('222','444')" ;
ora_parse($cursor, $query) or die;
ora_exec($cursor);
ora_close($cursor)
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ ALL BANKING TORGANS Types
Worms.
Trojans.
Hybrids and exotic forms.
Fileless malware.
Adware.
Malvertising.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Worms.
Trojans.
Hybrids and exotic forms.
Fileless malware.
Adware.
Malvertising.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Google Hacking 2020 :
fb.com/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) clone or download : https://github.com/octalmage/googlehacks
> download https://web.archive.org/web/20100928034139/http://code.google.com:80/p/googlehacks/downloads/detail?name=GoogleHacksSetup1.6.exe&can=1&q=
2) Google Hacks is a compilation of carefully crafted Google searches that expose novel functionality from Google's search and map services. For example, you can use it to view a timeline of your search results, view a map, search for music, search for books, and perform many other specific kinds of searches.
> This is a rewrite of the very popular cross platform desktop app. Google Hacks has had millions of downloads, been featured on many websites, it's time for an update.
3) run setup, enjoy
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Google Hacking 2020 :
fb.com/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) clone or download : https://github.com/octalmage/googlehacks
> download https://web.archive.org/web/20100928034139/http://code.google.com:80/p/googlehacks/downloads/detail?name=GoogleHacksSetup1.6.exe&can=1&q=
2) Google Hacks is a compilation of carefully crafted Google searches that expose novel functionality from Google's search and map services. For example, you can use it to view a timeline of your search results, view a map, search for music, search for books, and perform many other specific kinds of searches.
> This is a rewrite of the very popular cross platform desktop app. Google Hacks has had millions of downloads, been featured on many websites, it's time for an update.
3) run setup, enjoy
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
godsword95@gmail.com:Runescape1
mitchellfrazier16@yahoo.com:Bigmonster7
aboodilatif@gmail.com:aboodi2442
sandyroy9911@gmail.com:violin43
joelsilver@live.com.au:Thomas01
blakeevanhowell@gmail.com:Evan1234
dezzylanham@gmail.com:acft1tm1vb
tobeajufo@icloud.com:Tobe123a
jordanwinslow21@gmail.com:Buzzkill1
granthamlong98@gmail.com:321321gl
colekowalczyk@hotmail.com:Cole123456
sareson91@gmail.com:lauren8769
qhertm@gmail.com:Pokemon111
kernowlokal@yahoo.co.uk:rossi2002
kiki67250@hotmail.fr:69Lyon67
bythebrook42@gmail.com:Maxxer42
kc821guam@gmail.com:2ioijlui
marcustinaza@gmail.com:blahblahblah
tsmckenzie2000@yahoo.com:Pathfinder01
mortisogame@gmail.com:Firefly91
simonmli99@gmail.com:simonli1
sammyblaze@gmail.com:thehotboy1
jruthven@outlook.com:toyota07
mark@rychel.com:jackie10
pjring87@gmail.com:Ducati02
pacobata1973@gmail.com:bata2024
amittpatel@hotmail.com:A156k1s1
slaphappyike@gmail.com:sneaker0201
millerbreadbox@gmail.com:baseball12
livesey.gill@talktalk.net:vanston1402
s.madorski@gmail.com:photo21253
plantalex21@gmail.com:hanner2105
karolvzarinana@hotmail.com:Zarinana123
brian.juan204@yahoo.com:oizanauj95
johngeorgiou1989@hotmail.com:crazyone1
drasia10@yahoo.com:dthvPA123
richard.comicart@gmail.com:donotmove
karlil13@gmail.com:ka131182
Habermancole3@gmail.com:Colesdog1
arsenis.christos@gmail.com:bbf59Fyaz053
snewberry1982@gmail.com:Superman24
hbinmohammed66@gmail.com:hamad5566
irpalmerjr@yahoo.com:matrix22
deson94@gmail.com:boyscout94
th.flavien@hotmail.fr:Bonjourle44
catslack@gmail.com:minesweeper
danes2531@gmail.com:Redwings4
madianne22@outlook.com:Roxybuster09
crarnewc@126.com:wc183007526
mathieu.lebougre@gmail.com:aveyron12
lacknerniklas@hotmail.com:karlmarx1
desman120@gmail.com:danderson123
jrizzly@gmail.com:Rocky1234
wesowens1@gmail.com:Bigblue12
rgrlowe@gmail.com:wireless175
m33msn@aol.com:sean1493
begon123@gmail.com:s0075267
peterat61@gmail.com:bcu5obzx
joehelm@hotmail.co.uk:ploppy11
hari.varma93@gmail.com:Google123
samuelb15@outlook.com:Dodger69
lggeorge@outlook.com:jerome812
oscar2118ortiz@gmail.com:2118hell
catslack@gmail.com:minesweeper
brendonwest@live.co.uk:Rexman007
kajcampbell@sbcglobal.net:kajl1040
viet88tp@gmail.com:Rip2surf
popptaylor23@gmail.com:Oreo2301
gabrielle.thibodeau14@gmail.com:darkl0rd14
aj15444@yahoo.com:ambitious108
nikolas.karatzas@gmail.com:Kasteel24
faganthelee@gmail.com:Strawhat1
eemeli.tampio@gmail.com:8d8swybas
ninjaking574@gmail.com:123kye321
garrett.taggart@yahoo.com:taggart24
ciprianiorga@hotmail.com:cior3652
anastasiasheldon1999@gmail.com:17060007
brazzale@gmail.com:m8q7rwbr
chicagojersey@gmail.com:Q1w2e3R4
tqco@netzero.net:richest3
njdevils99@outlook.com:bagels01
jostorey@live.com:elizabeth
deniseusuka@hotmail.com:cdjuly13
2342w3e4r@gmail.com:1231q2w3e
killerburrito.aj@gmail.com:Awesome01
gs1983@live.com.au:1eighty2
almurar@gmail.com:gzxix1a5
marc-antoine_michaud@outlook.com:crosby87
steven.a.hiller@gmail.com:demonking6
supra_gal@hotmail.com:Sc00bydoo
stegemann@gmail.com:calif0rnia
justin18y@gmail.com:Erindale30
trevor.edwards.04@gmail.com:chester1
zach.kilpack@gmail.com:leapyear44
ven6212@gmail.com:23395589
jacobash91@gmail.com:Shimano65
craig@craigmaguire.net:Stygian01
veronicatracy@me.com:peekaboo23
to.fawaz@gmail.com:vwPassat86
nporikos@gmail.com:hockey21
blackopswmd@gmail.com:Goodbye27
Gladiogaming@gmail.com:Mikemike007
sruthi2801@gmail.com:2801ammu
danielblier@gmail.com:Dblier454
sk_randhawa@hotmail.com:Austin316
elias.fazal@gmail.com:Portland02
ritsblack@hotmail.com:Aa010010
matthieu.dejoue@gmail.com:moutt2k7
serebiisean@gmail.com:Megotgrammar1
fulhamhamster09@googlemail.com:hamster123
benji512512@gmail.com:Brady5126
begon123@gmail.com:s0075267
remy_svardal@hotmail.com:xhevdet222
manicoletta94@gmail.com:Beaser94
pandaboy626@gmail.com:frost626
macha.pavlova@gmail.com:Nikita2004
joenorrie@hotmail.co.uk:Keanu123
mariaL_casino@yahoo.com:loraine12
bigwilsy@gmail.com:imflying123
aes1972@mac.com:Cartman72
peturbjarnason@gmail.com:a1a1a1a2
ashkon28@Hotmail.com:Stpauls12
marinushove@hotmail.com:Kasperkat20
sader8818@gmail.com:marvin8818
slogan6152@gmail.com:Bbranch1
mitchellfrazier16@yahoo.com:Bigmonster7
aboodilatif@gmail.com:aboodi2442
sandyroy9911@gmail.com:violin43
joelsilver@live.com.au:Thomas01
blakeevanhowell@gmail.com:Evan1234
dezzylanham@gmail.com:acft1tm1vb
tobeajufo@icloud.com:Tobe123a
jordanwinslow21@gmail.com:Buzzkill1
granthamlong98@gmail.com:321321gl
colekowalczyk@hotmail.com:Cole123456
sareson91@gmail.com:lauren8769
qhertm@gmail.com:Pokemon111
kernowlokal@yahoo.co.uk:rossi2002
kiki67250@hotmail.fr:69Lyon67
bythebrook42@gmail.com:Maxxer42
kc821guam@gmail.com:2ioijlui
marcustinaza@gmail.com:blahblahblah
tsmckenzie2000@yahoo.com:Pathfinder01
mortisogame@gmail.com:Firefly91
simonmli99@gmail.com:simonli1
sammyblaze@gmail.com:thehotboy1
jruthven@outlook.com:toyota07
mark@rychel.com:jackie10
pjring87@gmail.com:Ducati02
pacobata1973@gmail.com:bata2024
amittpatel@hotmail.com:A156k1s1
slaphappyike@gmail.com:sneaker0201
millerbreadbox@gmail.com:baseball12
livesey.gill@talktalk.net:vanston1402
s.madorski@gmail.com:photo21253
plantalex21@gmail.com:hanner2105
karolvzarinana@hotmail.com:Zarinana123
brian.juan204@yahoo.com:oizanauj95
johngeorgiou1989@hotmail.com:crazyone1
drasia10@yahoo.com:dthvPA123
richard.comicart@gmail.com:donotmove
karlil13@gmail.com:ka131182
Habermancole3@gmail.com:Colesdog1
arsenis.christos@gmail.com:bbf59Fyaz053
snewberry1982@gmail.com:Superman24
hbinmohammed66@gmail.com:hamad5566
irpalmerjr@yahoo.com:matrix22
deson94@gmail.com:boyscout94
th.flavien@hotmail.fr:Bonjourle44
catslack@gmail.com:minesweeper
danes2531@gmail.com:Redwings4
madianne22@outlook.com:Roxybuster09
crarnewc@126.com:wc183007526
mathieu.lebougre@gmail.com:aveyron12
lacknerniklas@hotmail.com:karlmarx1
desman120@gmail.com:danderson123
jrizzly@gmail.com:Rocky1234
wesowens1@gmail.com:Bigblue12
rgrlowe@gmail.com:wireless175
m33msn@aol.com:sean1493
begon123@gmail.com:s0075267
peterat61@gmail.com:bcu5obzx
joehelm@hotmail.co.uk:ploppy11
hari.varma93@gmail.com:Google123
samuelb15@outlook.com:Dodger69
lggeorge@outlook.com:jerome812
oscar2118ortiz@gmail.com:2118hell
catslack@gmail.com:minesweeper
brendonwest@live.co.uk:Rexman007
kajcampbell@sbcglobal.net:kajl1040
viet88tp@gmail.com:Rip2surf
popptaylor23@gmail.com:Oreo2301
gabrielle.thibodeau14@gmail.com:darkl0rd14
aj15444@yahoo.com:ambitious108
nikolas.karatzas@gmail.com:Kasteel24
faganthelee@gmail.com:Strawhat1
eemeli.tampio@gmail.com:8d8swybas
ninjaking574@gmail.com:123kye321
garrett.taggart@yahoo.com:taggart24
ciprianiorga@hotmail.com:cior3652
anastasiasheldon1999@gmail.com:17060007
brazzale@gmail.com:m8q7rwbr
chicagojersey@gmail.com:Q1w2e3R4
tqco@netzero.net:richest3
njdevils99@outlook.com:bagels01
jostorey@live.com:elizabeth
deniseusuka@hotmail.com:cdjuly13
2342w3e4r@gmail.com:1231q2w3e
killerburrito.aj@gmail.com:Awesome01
gs1983@live.com.au:1eighty2
almurar@gmail.com:gzxix1a5
marc-antoine_michaud@outlook.com:crosby87
steven.a.hiller@gmail.com:demonking6
supra_gal@hotmail.com:Sc00bydoo
stegemann@gmail.com:calif0rnia
justin18y@gmail.com:Erindale30
trevor.edwards.04@gmail.com:chester1
zach.kilpack@gmail.com:leapyear44
ven6212@gmail.com:23395589
jacobash91@gmail.com:Shimano65
craig@craigmaguire.net:Stygian01
veronicatracy@me.com:peekaboo23
to.fawaz@gmail.com:vwPassat86
nporikos@gmail.com:hockey21
blackopswmd@gmail.com:Goodbye27
Gladiogaming@gmail.com:Mikemike007
sruthi2801@gmail.com:2801ammu
danielblier@gmail.com:Dblier454
sk_randhawa@hotmail.com:Austin316
elias.fazal@gmail.com:Portland02
ritsblack@hotmail.com:Aa010010
matthieu.dejoue@gmail.com:moutt2k7
serebiisean@gmail.com:Megotgrammar1
fulhamhamster09@googlemail.com:hamster123
benji512512@gmail.com:Brady5126
begon123@gmail.com:s0075267
remy_svardal@hotmail.com:xhevdet222
manicoletta94@gmail.com:Beaser94
pandaboy626@gmail.com:frost626
macha.pavlova@gmail.com:Nikita2004
joenorrie@hotmail.co.uk:Keanu123
mariaL_casino@yahoo.com:loraine12
bigwilsy@gmail.com:imflying123
aes1972@mac.com:Cartman72
peturbjarnason@gmail.com:a1a1a1a2
ashkon28@Hotmail.com:Stpauls12
marinushove@hotmail.com:Kasperkat20
sader8818@gmail.com:marvin8818
slogan6152@gmail.com:Bbranch1
π¦fifia 08 serial X8MM-RWM9-FIFA-KFLT-FIFA
Adobe Photoshop CS2 v9.0
S/N: 1045-0436-9551-0266-5984-9386
S/N: 1045-0436-9551-0266-5984-9386
Age Of Empires III: The Warchiefs
RLD12-XTBWA-RLD13-MDFKA-RCTJP
RLD4E-VERAN-DALWA-YS3XA-TPCCR
RLD12-XTBWA-RLD13-MDFKA-RCTJP
RLD4E-VERAN-DALWA-YS3XA-TPCCR
Command And Conquer 3: Tiberium Wars - Kane Edition
HKM5-YD73-72H6-B273-6FLT
HKM5-YD73-72H6-B273-6FLT
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ File Transfer Protocol FTP :
t.me/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
1) In a typical FTP application, users interact with FTP through an FTP proxy. The user first provides the host name of the remote host, so that the FTP user agent establishes a TCP connection to the remote host. After that, the user is required to provide a user name and password, which are transmitted over the TCP connection as part of the FTP command; once the server is authorized, the user can communicate with The server is transferring files.
2) Both HTTP and FTP are application layer protocols. They both run on top of the TCP protocol, but there are some important differences between them. One is that FTP uses a parallel TCP connection to transfer data. One TCP is called a control connection .
3) Used to transfer FTP commands. A TCP connection is called a data connection , which is used to transfer file data. Because the control information in the FTP protocol is transmitted through an independent TCP connection, we call FTP control information transmitted out of band ; as if the control and data information transmitted through the same TCP is called inband. TCP control connection port 21, data connection port 20
4) It should be noted that the control connection in FTP runs through the entire session, but the data connection is established when a file starts to be transferred and closed after the transfer is completed; therefore, each time a new file is transferred, a new data connection is created;
5) At the same time, FTP needs to retain the user's state during the entire session , that is, to associate the control connection with the user account, while recording the user's operations on the remote directory tree, which limits the total number of sessions that FTP can simultaneously maintain.
6) FTP commands and answers
The commands from the client to the server and the responses from the server to the client are passed on the control connection in 7-bit ASCII format.
π¦ The common commands are as follows:
RETR <filename> Retrieve (copy) files from the server
STOR <filename> Store (copy) files to the server
USER <username >> User name for system login
PASS <password> System login password
The common answers are as follows:
125 Open data connection and start transmission
331 Require password
452 Insufficient disk space, write error
425 Unable to open data connection
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ File Transfer Protocol FTP :
t.me/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
1) In a typical FTP application, users interact with FTP through an FTP proxy. The user first provides the host name of the remote host, so that the FTP user agent establishes a TCP connection to the remote host. After that, the user is required to provide a user name and password, which are transmitted over the TCP connection as part of the FTP command; once the server is authorized, the user can communicate with The server is transferring files.
2) Both HTTP and FTP are application layer protocols. They both run on top of the TCP protocol, but there are some important differences between them. One is that FTP uses a parallel TCP connection to transfer data. One TCP is called a control connection .
3) Used to transfer FTP commands. A TCP connection is called a data connection , which is used to transfer file data. Because the control information in the FTP protocol is transmitted through an independent TCP connection, we call FTP control information transmitted out of band ; as if the control and data information transmitted through the same TCP is called inband. TCP control connection port 21, data connection port 20
4) It should be noted that the control connection in FTP runs through the entire session, but the data connection is established when a file starts to be transferred and closed after the transfer is completed; therefore, each time a new file is transferred, a new data connection is created;
5) At the same time, FTP needs to retain the user's state during the entire session , that is, to associate the control connection with the user account, while recording the user's operations on the remote directory tree, which limits the total number of sessions that FTP can simultaneously maintain.
6) FTP commands and answers
The commands from the client to the server and the responses from the server to the client are passed on the control connection in 7-bit ASCII format.
π¦ The common commands are as follows:
RETR <filename> Retrieve (copy) files from the server
STOR <filename> Store (copy) files to the server
USER <username >> User name for system login
PASS <password> System login password
The common answers are as follows:
125 Open data connection and start transmission
331 Require password
452 Insufficient disk space, write error
425 Unable to open data connection
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Email on the Internet-understand before attack
pinterest.com/undercode_Testing
π¦ ππΌππ πππΈβπ :
1) Internet e-mail system has three core components: user agent , mail server , and SMTP (Simple Mail Transfer Protocol).
2) The mail server forms the core of the email system. Each sender and receiver has a mailbox on the mail server; a typical e-mail has been sent: the sender sends the mail to the sender's mail server through the user agent, and then to the receiver's mail server, and then the mail is distributed To the recipient's mailbox; the recipient needs to go through the mail server to get their own mail from the mail server
3) Is the main application layer protocol SMTP Internet email, it uses the TCP can send mail to the mail server of the recipient from the sender's mail server by data transmission; running SMTP server and SMTP clients simultaneously on each mail server. When the mail server receives mail from other mail servers, it behaves as an SMTP server, and when the mail server sends mail to other mail servers, it behaves as an SMTP client.
4) If the sender cannot send the mail to the server of the receiver, the mail server of the sender will keep the message in a message queue and try to send it again later.
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Email on the Internet-understand before attack
pinterest.com/undercode_Testing
π¦ ππΌππ πππΈβπ :
1) Internet e-mail system has three core components: user agent , mail server , and SMTP (Simple Mail Transfer Protocol).
2) The mail server forms the core of the email system. Each sender and receiver has a mailbox on the mail server; a typical e-mail has been sent: the sender sends the mail to the sender's mail server through the user agent, and then to the receiver's mail server, and then the mail is distributed To the recipient's mailbox; the recipient needs to go through the mail server to get their own mail from the mail server
3) Is the main application layer protocol SMTP Internet email, it uses the TCP can send mail to the mail server of the recipient from the sender's mail server by data transmission; running SMTP server and SMTP clients simultaneously on each mail server. When the mail server receives mail from other mail servers, it behaves as an SMTP server, and when the mail server sends mail to other mail servers, it behaves as an SMTP client.
4) If the sender cannot send the mail to the server of the receiver, the mail server of the sender will keep the message in a message queue and try to send it again later.
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Pinterest
UnderCode TESTING (UNDERCODE_TESTING) - Profile | Pinterest
UnderCode TESTING | πππππ£βπ ππ πππ€π₯πππ βπ ππ‘πππͺ:
Programming, Web & Applications makers, Host, bugs fix, Satellite Reicivers Programming..
Started Since 2011
Programming, Web & Applications makers, Host, bugs fix, Satellite Reicivers Programming..
Started Since 2011