β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HOW SCAN OPEN PORTS ?
MASSCAN web interface :
1) Masscan is natively packaged in Kali Linux and can handle a huge number of nodes.
Masscan has several convenient output formats such as binary and XML.
However, there is another convenient feature of this network scanner - the web interface.
2) The masscan web user interface setup is pretty standard and straight forward.
You will need to create a MySQL database, import the database schema, move the PHP files as root, and edit the config file with the correct options.
3) First, install and run your web server and some other required packages and add the masscan repository:
# apt-get install apache2 php libapache2-mod-php php-mysqli php-xml mysql-server
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/offensive-security/masscan-web-ui
2) mv masscan-web-ui/* /var/www/html/
3) cd /var/www/html/
4) root@kali:/var/www/html
# mysql -u root -p
5) Enter password:
Type 'help;' or '\h' for help. Type '\c' to clear the current input statement.
# mysql> create database masscan;
Query OK, 1 row affected (0.01 sec)
# mysql> CREATE USER 'masscan'@'localhost' IDENTIFIED BY 'changem3';
Query OK, 0 rows affected (0.00 sec)
# mysql> GRANT ALL PRIVILEGES ON masscan.* TO 'masscan'@'localhost';
Query OK, 0 rows affected (0.01 sec)
# mysql> exit
Bye
# root@kali:/var/www/html# mysql -u root -p masscan < db-structure.sql
Enter password:
root@kali:/var/www/html
# rm db-structure.sql index.html README.md
# nano config.php
define('DB_DRIVER', 'mysql');
define('DB_HOST', 'localhost');
define('DB_USERNAME', 'masscan');
define('DB_PASSWORD', 'changem3');
define('DB_DATABASE', 'masscan');
Now you can use masscan to scan and output .xml documents
# masscan 10.0.0.0/8 -p80,21,53 --banners --source-ip 10.0.0.2 --max-rate 100000 -oX scan-01.xml
root @ kali: / var / www / html
ls -l scan *
-rw-r - r-- 1 root root 212929324 Dec 1 13:23 scan-01.xml
-rw-r - r-- 1 root root 700816226 Dec 1 13:55 scan-02.xml
root @ kali: / var / www / html
php import.php scan-01.xml
Do you want to clear the database before importing (yes / no) ?: yes
Clearing the db
Written by
(no one allowed to clone our tutorials)
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HOW SCAN OPEN PORTS ?
MASSCAN web interface :
1) Masscan is natively packaged in Kali Linux and can handle a huge number of nodes.
Masscan has several convenient output formats such as binary and XML.
However, there is another convenient feature of this network scanner - the web interface.
2) The masscan web user interface setup is pretty standard and straight forward.
You will need to create a MySQL database, import the database schema, move the PHP files as root, and edit the config file with the correct options.
3) First, install and run your web server and some other required packages and add the masscan repository:
# apt-get install apache2 php libapache2-mod-php php-mysqli php-xml mysql-server
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/offensive-security/masscan-web-ui
2) mv masscan-web-ui/* /var/www/html/
3) cd /var/www/html/
4) root@kali:/var/www/html
# mysql -u root -p
5) Enter password:
Type 'help;' or '\h' for help. Type '\c' to clear the current input statement.
# mysql> create database masscan;
Query OK, 1 row affected (0.01 sec)
# mysql> CREATE USER 'masscan'@'localhost' IDENTIFIED BY 'changem3';
Query OK, 0 rows affected (0.00 sec)
# mysql> GRANT ALL PRIVILEGES ON masscan.* TO 'masscan'@'localhost';
Query OK, 0 rows affected (0.01 sec)
# mysql> exit
Bye
# root@kali:/var/www/html# mysql -u root -p masscan < db-structure.sql
Enter password:
root@kali:/var/www/html
# rm db-structure.sql index.html README.md
# nano config.php
define('DB_DRIVER', 'mysql');
define('DB_HOST', 'localhost');
define('DB_USERNAME', 'masscan');
define('DB_PASSWORD', 'changem3');
define('DB_DATABASE', 'masscan');
Now you can use masscan to scan and output .xml documents
# masscan 10.0.0.0/8 -p80,21,53 --banners --source-ip 10.0.0.2 --max-rate 100000 -oX scan-01.xml
root @ kali: / var / www / html
ls -l scan *
-rw-r - r-- 1 root root 212929324 Dec 1 13:23 scan-01.xml
-rw-r - r-- 1 root root 700816226 Dec 1 13:55 scan-02.xml
root @ kali: / var / www / html
php import.php scan-01.xml
Do you want to clear the database before importing (yes / no) ?: yes
Clearing the db
Written by
(no one allowed to clone our tutorials)
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - offensive-security/masscan-web-ui: MASSCAN Web UI
MASSCAN Web UI. Contribute to offensive-security/masscan-web-ui development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to run a PHP program in Xampp?
#Requested
1) Install XAMPP
The first step is to install XAMPP onto your computer. it is very easy to install XAMPP. Just visit the official website to download XAMPP.
xampp download page
Apache Friends: https://www.apachefriends.org/index.html
2) On this site you can see XAMPP for Windows, Linux and OS X. Where you can download XAMPP based on your computer OS and after downloading install it.
3) Open XAMPP control panel
After installing XAMPP on to your PC the next step is to start the Apache server and MySQL.
The control panel XAMPP which is something like this.
xampp control panel
4) To launch Apache service and MySQL service, click on the Start button. if you want to stop any of the services at any time you can click on stop button in XAMPP control panel.
5) Executing Project
Once the Apache and MySQL services are started and running in the background. Now extract the project zip file which you have downloaded from our site.
6) extract project mini project
After extracting you should see the folder which contains all the code and related files of the project that you have downloaded.
7) copy project folder
Copy this folder and navigate to xampp folder (which is basically located in C drive) and inside this folder (xampp) find the htdocs folder and paste the project folder into this htdocs folder
8) example In my case, the path is something like this C:\xampp\htdocs
Paste folder to htdocs
9) After the project folder is successfully copied to the specified location on your computer. Then go to your browser (Chrome) and type in URL field: localhost/ FOLDER NAME and then hit enter.
10) Run project using xampp
If the project folder name is βCriminal_Mini_Projectβ then type in URL field: localhost/ Criminal_Mini_Project and hit enter. Thatβs it your project will start running.
11) I hope the article was useful. If you find any difficulty in running your code feel free to share your problem with us, we will try to solve it.
source linux forum
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to run a PHP program in Xampp?
#Requested
1) Install XAMPP
The first step is to install XAMPP onto your computer. it is very easy to install XAMPP. Just visit the official website to download XAMPP.
xampp download page
Apache Friends: https://www.apachefriends.org/index.html
2) On this site you can see XAMPP for Windows, Linux and OS X. Where you can download XAMPP based on your computer OS and after downloading install it.
3) Open XAMPP control panel
After installing XAMPP on to your PC the next step is to start the Apache server and MySQL.
The control panel XAMPP which is something like this.
xampp control panel
4) To launch Apache service and MySQL service, click on the Start button. if you want to stop any of the services at any time you can click on stop button in XAMPP control panel.
5) Executing Project
Once the Apache and MySQL services are started and running in the background. Now extract the project zip file which you have downloaded from our site.
6) extract project mini project
After extracting you should see the folder which contains all the code and related files of the project that you have downloaded.
7) copy project folder
Copy this folder and navigate to xampp folder (which is basically located in C drive) and inside this folder (xampp) find the htdocs folder and paste the project folder into this htdocs folder
8) example In my case, the path is something like this C:\xampp\htdocs
Paste folder to htdocs
9) After the project folder is successfully copied to the specified location on your computer. Then go to your browser (Chrome) and type in URL field: localhost/ FOLDER NAME and then hit enter.
10) Run project using xampp
If the project folder name is βCriminal_Mini_Projectβ then type in URL field: localhost/ Criminal_Mini_Project and hit enter. Thatβs it your project will start running.
11) I hope the article was useful. If you find any difficulty in running your code feel free to share your problem with us, we will try to solve it.
source linux forum
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
www.apachefriends.org
XAMPP Installers and Downloads for Apache Friends
XAMPP is an easy to install Apache distribution containing MariaDB, PHP and Perl.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Windows Hacking tutorials and tools :
1) Windows-Post-Exploitation:
https://github.com/emilyanncr/Windows-Post-Exploitation
2) Windows Post Exploitation Shells and File Transfer with Netcat for Windows:
https://medium.com/p/a2ddc3557403
3) Windows Privilege Escalation Fundamentals:
https://www.fuzzysecurity.com/tutorials/16.html
4) Windows Privilege Escalation Guide:
www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
5) https://github.com/LazoCoder/Windows-Hacks
6) https://github.com/D4Vinci/Dr0p1t-Framework
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Windows Hacking tutorials and tools :
1) Windows-Post-Exploitation:
https://github.com/emilyanncr/Windows-Post-Exploitation
2) Windows Post Exploitation Shells and File Transfer with Netcat for Windows:
https://medium.com/p/a2ddc3557403
3) Windows Privilege Escalation Fundamentals:
https://www.fuzzysecurity.com/tutorials/16.html
4) Windows Privilege Escalation Guide:
www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
5) https://github.com/LazoCoder/Windows-Hacks
6) https://github.com/D4Vinci/Dr0p1t-Framework
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - emilyanncr/Windows-Post-Exploitation: Windows post-exploitation tools, resources, techniques and commands to use duringβ¦
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy! - emilyanncr/Windows-Post-Expl...
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦behavior of centralized crypto exchanges :
To understand the behavior of centralized crypto exchanges, you need to analyze some key components individually or in groups, and generalize some concepts at a higher level. Here are a few key components related to the behavior of centralized crypto exchanges:
1) Hot wallet: Hot wallet usually refers to the main communication method between external parties and exchanges. This wallet can be used to trade cryptocurrency assets.
2) Cold wallet: A cold wallet is seen as a means of secure storage of encrypted assets. Such wallets usually hold large amounts of assets that are not intended for frequent transactions.
3) Deposit address: usually refers to a temporary address on the blockchain used to transfer funds to the exchange. The main purpose of this type of address is to facilitate users to exchange cash flow.
4) Withdrawal address: usually refers to a temporary address on the blockchain used to transfer funds from the main transaction wallet. Sometimes the withdrawal address can also play the dual role of the deposit address.
5) Although these four components represent the core of the on-chain architecture of a centralized exchange, to identify them requires quite complex heuristics or machine learning methods. Part of the challenge is that the interaction model between these components can be arbitrary and complex, and is not well understood.
With the help of IntoTheBlock 's transaction machine learning classifier, the visual exploration of the blockchain data set revealed some very elegant and charming models.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦behavior of centralized crypto exchanges :
To understand the behavior of centralized crypto exchanges, you need to analyze some key components individually or in groups, and generalize some concepts at a higher level. Here are a few key components related to the behavior of centralized crypto exchanges:
1) Hot wallet: Hot wallet usually refers to the main communication method between external parties and exchanges. This wallet can be used to trade cryptocurrency assets.
2) Cold wallet: A cold wallet is seen as a means of secure storage of encrypted assets. Such wallets usually hold large amounts of assets that are not intended for frequent transactions.
3) Deposit address: usually refers to a temporary address on the blockchain used to transfer funds to the exchange. The main purpose of this type of address is to facilitate users to exchange cash flow.
4) Withdrawal address: usually refers to a temporary address on the blockchain used to transfer funds from the main transaction wallet. Sometimes the withdrawal address can also play the dual role of the deposit address.
5) Although these four components represent the core of the on-chain architecture of a centralized exchange, to identify them requires quite complex heuristics or machine learning methods. Part of the challenge is that the interaction model between these components can be arbitrary and complex, and is not well understood.
With the help of IntoTheBlock 's transaction machine learning classifier, the visual exploration of the blockchain data set revealed some very elegant and charming models.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 update wireless protocol investigation
any linux/macos
The Universal Radio Hacker (URH) is a complete suite for wireless protocol investigation with native support for many common Software Defined Radios. URH allows easy demodulation of signals combined with an automatic detection of modulation parameters making it a breeze to identify the bits and bytes that fly over the air. As data often gets encoded before transmission, URH offers customizable decodings to crack even sophisticated encodings like CC1101 data whitening. When it comes to protocol reverse-engineering, URH is helpful in two ways. You can either manually assign protocol fields and message types or let URH automatically infer protocol fields with a rule-based intelligence. Finally, URH entails a fuzzing component aimed at stateless protocols and a simulation environment for stateful attacks.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/jopohl/urh
2) cd urh
3) sudo python3 -m pip install --upgrade pip # Update your pip installation
4) sudo python3 -m pip install urh # Install URH
5) python setup.py install
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 update wireless protocol investigation
any linux/macos
The Universal Radio Hacker (URH) is a complete suite for wireless protocol investigation with native support for many common Software Defined Radios. URH allows easy demodulation of signals combined with an automatic detection of modulation parameters making it a breeze to identify the bits and bytes that fly over the air. As data often gets encoded before transmission, URH offers customizable decodings to crack even sophisticated encodings like CC1101 data whitening. When it comes to protocol reverse-engineering, URH is helpful in two ways. You can either manually assign protocol fields and message types or let URH automatically infer protocol fields with a rule-based intelligence. Finally, URH entails a fuzzing component aimed at stateless protocols and a simulation environment for stateful attacks.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/jopohl/urh
2) cd urh
3) sudo python3 -m pip install --upgrade pip # Update your pip installation
4) sudo python3 -m pip install urh # Install URH
5) python setup.py install
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - jopohl/urh: Universal Radio Hacker: Investigate Wireless Protocols Like A Boss
Universal Radio Hacker: Investigate Wireless Protocols Like A Boss - jopohl/urh
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What are the hazards website vulnerabilities :
The harm of SQL injection vulnerabilities is not only reflected in the database level, but also may endanger the operating system that hosts the database; if SQL injection is used to hang horses, it may also be used to spread malware, etc. These hazards include but are not limited to:
1) Database information leakage: user privacy information stored in the database is leaked.
2) Web page tampering: tampering with specific web pages by operating the database.
3) The website is hacked to spread malicious software: modify the value of some fields in the database, embed the link of the network horse, and carry out a hacking attack.
4) The database was maliciously operated: The database server was attacked and the database system administrator account was tampered with.
5) The server is controlled remotely and a backdoor is installed: the operating system support provided by the database server allows hackers to modify or control the operating system.
6) Destroy hard disk data and paralyze the entire system.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What are the hazards website vulnerabilities :
The harm of SQL injection vulnerabilities is not only reflected in the database level, but also may endanger the operating system that hosts the database; if SQL injection is used to hang horses, it may also be used to spread malware, etc. These hazards include but are not limited to:
1) Database information leakage: user privacy information stored in the database is leaked.
2) Web page tampering: tampering with specific web pages by operating the database.
3) The website is hacked to spread malicious software: modify the value of some fields in the database, embed the link of the network horse, and carry out a hacking attack.
4) The database was maliciously operated: The database server was attacked and the database system administrator account was tampered with.
5) The server is controlled remotely and a backdoor is installed: the operating system support provided by the database server allows hackers to modify or control the operating system.
6) Destroy hard disk data and paralyze the entire system.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β