UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to install Suricata intrusion detection system on Linux?

1) Install
Suricata IDS on Linux

Might as well build Suricata from source code. You have to install a few required dependencies first, as shown below.

Install dependencies on Debian, Ubuntu or Linux Mint

$ sudo apt-get install wget build-essential libpcre3-dev libpcre3-dbg automake autoconf libtool libpcap-dev libnet1-dev libyaml-dev zlib1g-dev libcap-ng-dev libjansson-dev

2) install dependencies on CentOS, Fedora or RHEL

$ sudo yum install wget libpcap-devel libnet-devel pcre-devel gcc-c++ automake autoconf libtool make libyaml-devel zlib-devel file-devel jansson-devel nss-devel

3) Once you have installed all the necessary packages, you can now install Suricata , As shown below.

4) First, download the latest Suricata source code from http://suricata-ids.org/download/ and compile the code. As of this writing, the latest version is 2.0.8.
This is a sample output of the configuration.

5) Now compile and install it.

$ make
$ sudo make install
Suricata source code comes with default configuration files. May wish to install these default configuration files as shown below.

$ sudo make install-conf
As you know, Suricata is useless without the IDS rule set. Conveniently, the Makefile comes with IDS rules installation options. To install IDS rules, just run the following command.

$ sudo make install-rules The
above rule installation command will install the latest snapshot of the available community rule sets from EmergingThreats.net ( https://www.bro.org ) and store them under /etc/suricata/rules.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WANNACRY FOR BEGINERS :

WannaCry encrypts most or even all of the files on your computer. The software then displays a specific message on the computer screen asking for a $ 300 ransom to decrypt your files. The payment must be made to the Bitcoin wallet. If the user does not pay the ransom in 3 days, the amount is doubled to $ 600. After 7 days, the virus will delete all encrypted files and all your data will be lost.



Who
is behind this or the origin of the virus
The exact origin of the virus has not yet been established. But our editor was able to find the 3 most basic versions.

1)Russian hackers
Yes, friends, how can you not bypass such a resonant virus without all your favorite "Russian hackers". The incident may be linked to recent warnings from the Shadow Brokers group to US President Donald Trump following his approved missile strikes in Syria.

2) US intelligence services
On May 15, Russian President Vladimir Putin called the US intelligence services the source of the virus and said that "Russia has absolutely nothing to do with it." Microsoft executives have also stated that the US intelligence services are the primary source of this virus.

3)Government of the DPRK
Representatives of the antivirus companies Symantec and Kaspersky Lab said that cybercriminals from the Lazarus Group were involved in cyber attacks using the WanaCrypt0r 2.0 virus, which hit thousands of computers in 150 countries .

DOWNLOAD : https://github.com/ytisf/theZoo/tree/master/malwares/Binaries/Ransomware.WannaCry

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ computer file anti-leakage systems :

1) The computer file anti-leakage system based on C/S architecture usually installs the management terminal on a computer in the LAN, installs the client on the controlled computer in the LAN, and then actively connects to the client through the management terminal and sends the computer to the client File encryption instruction, the client computer file is encrypted to prevent leakage of computer files.

2) Aiming at the channel for computer file leakage, the current mainstream computer file anti-leakage system in China usually effectively controls the external computer equipment. It prevents the passage by prohibiting the computer USB port, disabling optical drive burning, and prohibiting Bluetooth and PCI devices. Such external devices leaked secrets.

3) For the leakage of network channels, similar computer file anti-leakage systems, on the one hand, set to prohibit computers from accessing the Internet, on the other hand, it encrypts external files to prevent files from being sent through mailboxes, network disks, chat software, and other network channels. The computer file was sent out and the secret was leaked.

4) Many traditional computer file anti-leakage systems use the clipboard of the HOOK client computer to prevent the copying of computer files. However, because many copying and cutting actions of third-party software do not need to be implemented through the clipboard, it directly leads to The failure of this control method.

don't clone our tutorials
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁