β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Mac os hacking new tool :
This hack doesn't work on systems with SIP (System Integrity Protection) enabled, and it's enabled by default since El Capitan. It can be easily disabled from Recovery Mode but it's another layer of security which is always good to have so disabling it permanently is not the wisest idea. I'll implement some solution to bypass this restriction when I have time.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
-git clone https://github.com/gebeto/macos-hacks
-cd macos-hacks
-cd <APPLICATION>
-make
-You can use run.sh, it's a wrapper script that sets necessary environment variables to insert the lib and launches Applications (it assumes that installed to /Applications, edit the script if it differs for you).
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Mac os hacking new tool :
This hack doesn't work on systems with SIP (System Integrity Protection) enabled, and it's enabled by default since El Capitan. It can be easily disabled from Recovery Mode but it's another layer of security which is always good to have so disabling it permanently is not the wisest idea. I'll implement some solution to bypass this restriction when I have time.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
-git clone https://github.com/gebeto/macos-hacks
-cd macos-hacks
-cd <APPLICATION>
-make
-You can use run.sh, it's a wrapper script that sets necessary environment variables to insert the lib and launches Applications (it assumes that installed to /Applications, edit the script if it differs for you).
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - gebeto/macos-hacks: MacOS Apps Hacks
MacOS Apps Hacks. Contribute to gebeto/macos-hacks development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How really can you remove any malware from windows:
1) Delete the illegal program started with the system in the registry, then search for all the key values ββin the registry and delete it. A virus program started as a system service will hide in Hkey_Local_Machine/System/ControlSet001/services and controlset002/services, and then be eliminated when found.
γ
2) Stop the problematic service and change it to ban automatically.
γ
3) If the file system32/drivers/etc/hosts has been tampered with, restore it, that is, only one line of valid value "127.0.0.1localhost" is left, and the remaining lines are deleted. Then set the host to read-only.
γγ
4) Restart the computer and press F8 to enter "Safe Mode with Network". The purpose is to prevent the virus program from starting, but also to patch the Windows upgrade and upgrade the anti-virus software.
γγ
5) Search for the executable file of the virus and wipe it out manually.
γγ
6) Patch Windows upgrades and upgrade anti-virus software.
γγ
7) Turn off unnecessary system services, such as remoteegistryservice.
γ
8) After the completion of step 6, use anti-virus software to perform a comprehensive scan on the system to eliminate the fish that missed the net.
γγ
9) After the previous step is completed, restart the computer to complete all operations.
γγ
> This is the end of the virus prevention process. I hope you have mastered it.
As long as the computer system is infected with a virus, there will always be abnormal phenomena in the computer system. When these phenomena are found, it should usually be suspected that the system has been invaded by a virus.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How really can you remove any malware from windows:
1) Delete the illegal program started with the system in the registry, then search for all the key values ββin the registry and delete it. A virus program started as a system service will hide in Hkey_Local_Machine/System/ControlSet001/services and controlset002/services, and then be eliminated when found.
γ
2) Stop the problematic service and change it to ban automatically.
γ
3) If the file system32/drivers/etc/hosts has been tampered with, restore it, that is, only one line of valid value "127.0.0.1localhost" is left, and the remaining lines are deleted. Then set the host to read-only.
γγ
4) Restart the computer and press F8 to enter "Safe Mode with Network". The purpose is to prevent the virus program from starting, but also to patch the Windows upgrade and upgrade the anti-virus software.
γγ
5) Search for the executable file of the virus and wipe it out manually.
γγ
6) Patch Windows upgrades and upgrade anti-virus software.
γγ
7) Turn off unnecessary system services, such as remoteegistryservice.
γ
8) After the completion of step 6, use anti-virus software to perform a comprehensive scan on the system to eliminate the fish that missed the net.
γγ
9) After the previous step is completed, restart the computer to complete all operations.
γγ
> This is the end of the virus prevention process. I hope you have mastered it.
As long as the computer system is infected with a virus, there will always be abnormal phenomena in the computer system. When these phenomena are found, it should usually be suspected that the system has been invaded by a virus.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦what is CTF?
#forBeginers
A) CTF (Capture The Flag) is a kind of information security competition that challenges contestants to solve a variety of tasks ranging from a scavenger hunt on wikipedia to basic programming exercises, to hacking your way into a server to steal data. In these challenges, the contestant is usually asked to find a specific piece of text that may be hidden on the server or behind a webpage. This goal is called the flag, hence the name!
B) Like many competitions, the skill level for CTFs varies between the events. Some are targeted towards professionals with experience operating on cyber security teams. These typically offer a large cash reward and can be held at a specific physical location. Other events target the high school and college student range, sometimes offering monetary support for education to those that place highly in the competition!
C) CTFtime details the different types of CTF. To summarize, Jeopardy style CTFs provide a list of challenges and award points to individuals or teams that complete the challenges, groups with the most points wins. Attack/Defense style CTFs focus on either attacking an opponent's servers or defending one's own. These CTFs are typically aimed at those with more experience and are conducted at a specific physical location.
CTFs can be played as an individual or in teams so feel free to get your friends onboard!
I'd like to stress that CTFs are available to everyone. Many challenges do not require programming knowledge and are simply a matter of problem solving and creative thinking.
π¦Challenge types :
1) Jeopardy style CTFs challenges are typically divided into categories. I'll try to briefly cover the common ones.
2) Cryptography - Typically involves decrypting or encrypting a piece of data
3) Steganography - Tasked with finding information hidden in files or images
4) Binary - Reverse engineering or exploiting a binary file
5) Web - Exploiting web pages to find the flag
6) Pwn - Exploiting a server to find the flag
(some wifi resources)
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦what is CTF?
#forBeginers
A) CTF (Capture The Flag) is a kind of information security competition that challenges contestants to solve a variety of tasks ranging from a scavenger hunt on wikipedia to basic programming exercises, to hacking your way into a server to steal data. In these challenges, the contestant is usually asked to find a specific piece of text that may be hidden on the server or behind a webpage. This goal is called the flag, hence the name!
B) Like many competitions, the skill level for CTFs varies between the events. Some are targeted towards professionals with experience operating on cyber security teams. These typically offer a large cash reward and can be held at a specific physical location. Other events target the high school and college student range, sometimes offering monetary support for education to those that place highly in the competition!
C) CTFtime details the different types of CTF. To summarize, Jeopardy style CTFs provide a list of challenges and award points to individuals or teams that complete the challenges, groups with the most points wins. Attack/Defense style CTFs focus on either attacking an opponent's servers or defending one's own. These CTFs are typically aimed at those with more experience and are conducted at a specific physical location.
CTFs can be played as an individual or in teams so feel free to get your friends onboard!
I'd like to stress that CTFs are available to everyone. Many challenges do not require programming knowledge and are simply a matter of problem solving and creative thinking.
π¦Challenge types :
1) Jeopardy style CTFs challenges are typically divided into categories. I'll try to briefly cover the common ones.
2) Cryptography - Typically involves decrypting or encrypting a piece of data
3) Steganography - Tasked with finding information hidden in files or images
4) Binary - Reverse engineering or exploiting a binary file
5) Web - Exploiting web pages to find the flag
6) Pwn - Exploiting a server to find the flag
(some wifi resources)
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Multiple Unpatched vulnerabilities has been discovered in wireless sensor networks.
#Vulnerabilities
#Vulnerabilities
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦DNS TYPES:
1) DNS recursor: The DNS recursorβalso called the recursive DNS serverβis usually supplied by the internet service provider. This server is responsible for receiving user queries, resolving them, and responding with the IP address. Think of it as being the middleman. It serves as the liaison between the other servers, and undertakes all the communicating, organizing, and transferring of information. It visits the cache initially, to see if the IP address requested already exists there and contacts the root name server if not.
2) Root name server: The root name server, or root server, gets involved when the DNS recursor canβt find what it needs in its cache. The root server exists at the top of the DNS hierarchy, in a position called the root zoneβthis is the point at which requests are redirected to the appropriate zone. There are 13 root zone servers, which are run by a dozen independent organizations. At this stage, the 13 servers respond to the recursor with the IP address for the TLD name server.
3) TLD name server: Next, the request goes through the TLD (Top Level Domain) name server. This server retains the information for hostnames sharing common extensionsβfor example, .com, .net, .gov, .edu, or .co.uk. The TLD server then points the recursor server to the authoritative name server IP address.
4) Authoritative name server: The authoritative name server is the last step before the request is resolved. This server contains all the data for specific domains (e.g., google.com). The authoritative server resolves the hostname to the correct IP address, then sends this back to the recursor to be cached. Itβs then returned to the userβs browser, so the requested site can be accessed via the IP address.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦DNS TYPES:
1) DNS recursor: The DNS recursorβalso called the recursive DNS serverβis usually supplied by the internet service provider. This server is responsible for receiving user queries, resolving them, and responding with the IP address. Think of it as being the middleman. It serves as the liaison between the other servers, and undertakes all the communicating, organizing, and transferring of information. It visits the cache initially, to see if the IP address requested already exists there and contacts the root name server if not.
2) Root name server: The root name server, or root server, gets involved when the DNS recursor canβt find what it needs in its cache. The root server exists at the top of the DNS hierarchy, in a position called the root zoneβthis is the point at which requests are redirected to the appropriate zone. There are 13 root zone servers, which are run by a dozen independent organizations. At this stage, the 13 servers respond to the recursor with the IP address for the TLD name server.
3) TLD name server: Next, the request goes through the TLD (Top Level Domain) name server. This server retains the information for hostnames sharing common extensionsβfor example, .com, .net, .gov, .edu, or .co.uk. The TLD server then points the recursor server to the authoritative name server IP address.
4) Authoritative name server: The authoritative name server is the last step before the request is resolved. This server contains all the data for specific domains (e.g., google.com). The authoritative server resolves the hostname to the correct IP address, then sends this back to the recursor to be cached. Itβs then returned to the userβs browser, so the requested site can be accessed via the IP address.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FREE WINDOWS PASSWORD CRACKER:
100% recovery rate.
Easy to install and use with a very handy and clear user interface.
Resets passwords with a bootable CD/DVD.
Resets passwords with a bootable USB drive.
Resets local Administrator password.
Retrieve product keys from unbootable Windows installations.
WinPE Recovery CD Builder.
Automatically detects several operating systems installed on the computer.
Unlocks and Enables user accounts.
Disables the password expiry option.
Supports Windows 2000, XP, Vista, 7, Windows 8, Windows 8.1, Windows 10.
Works on all laptops including Legend, Toshiba, Dell, IBM etc.
Supports 32-bit and 64-bit Windows.
Support WinPE USB boot disk.
Added options to special WinPE version and type while building boot disk
Added options to special custom drivers while building boot disk
Enhanced password recovery for Windows 8, Windows 8.1, Windows 10
Create UEFI boot USB disk/CD/DVD
Supports Windows 10 x86
Supports Windows 10 x64
Enhanced guides for resetting Windows Live ID user account password
Recover Windows 8/8.1 OEM product key from BIOS
Start Menu on boot disk
FREE technical support.
Download : https://www.lazesoft.com/downloads/lsrmphdsetup.exe
How to use
https://youtu.be/68jkBLKIJas
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FREE WINDOWS PASSWORD CRACKER:
100% recovery rate.
Easy to install and use with a very handy and clear user interface.
Resets passwords with a bootable CD/DVD.
Resets passwords with a bootable USB drive.
Resets local Administrator password.
Retrieve product keys from unbootable Windows installations.
WinPE Recovery CD Builder.
Automatically detects several operating systems installed on the computer.
Unlocks and Enables user accounts.
Disables the password expiry option.
Supports Windows 2000, XP, Vista, 7, Windows 8, Windows 8.1, Windows 10.
Works on all laptops including Legend, Toshiba, Dell, IBM etc.
Supports 32-bit and 64-bit Windows.
Support WinPE USB boot disk.
Added options to special WinPE version and type while building boot disk
Added options to special custom drivers while building boot disk
Enhanced password recovery for Windows 8, Windows 8.1, Windows 10
Create UEFI boot USB disk/CD/DVD
Supports Windows 10 x86
Supports Windows 10 x64
Enhanced guides for resetting Windows Live ID user account password
Recover Windows 8/8.1 OEM product key from BIOS
Start Menu on boot disk
FREE technical support.
Download : https://www.lazesoft.com/downloads/lsrmphdsetup.exe
How to use
https://youtu.be/68jkBLKIJas
β β β Uππ»βΊπ«Δπ¬πβ β β β
YouTube
Windows 7 Password Recovery Freeware Lazesoft
www.lazesoft.com - Forgot your Windows 7 Administrator password? Freeware that allows you to remove your Windows password safe and easy.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Crack Linux Password Hash :
using JohnTheripper:
1) Example of Linux Password Hash:
$1$e7NfNpNi$A6nCwOTqrNR2oDuIKirRZ
$1 = MD5 hashing algorithm.
$2 =Blowfish Algorithm is in use.
$2a=eksblowfish Algorithm
$5 =SHA-256 Algorithm
$6 =SHA-512 Algorithm
2) So this is MD5 hash
3) The second field is salt value so e7NfNpNi is the salt
4) The last field is the hash value of salt+user password i.e A6nCwOTqrNR2oDuIKirRZ
5) Now comes the cracking part. But unless this is a common hash which it isnβt you canβt decrypt it.
6) You can use Johntheripper to crack the password. This might take a long time if you are keyspace bruteforcing. If you want you can use a dictionary based attack to crack it. To do this first you
need to setup the hash file.
cp /etc/passwd ./
cp /etc/shadow ./
7) unshadow passwd shadow > hashes
8) After this you can do one of the following
9) Dictionary Based Cracking
john -w /path/to/wordlist β format=md5crypt hashes
10) Key-space Brute-forcing
john β show hashes
π¦Other Methods :
1) If you have access to a GPU, you can harness its power for your
cracking process. For this you can use hash-cat.
hashcat -m 1800 -a 0 [Path-to-Hashes] [Path-to-Word-list] -o [Path-to-Output-Cracked-Hashes]
2) you can set m to either 500 or 1800, depending on your setup.
(mediuM
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Crack Linux Password Hash :
using JohnTheripper:
1) Example of Linux Password Hash:
$1$e7NfNpNi$A6nCwOTqrNR2oDuIKirRZ
$1 = MD5 hashing algorithm.
$2 =Blowfish Algorithm is in use.
$2a=eksblowfish Algorithm
$5 =SHA-256 Algorithm
$6 =SHA-512 Algorithm
2) So this is MD5 hash
3) The second field is salt value so e7NfNpNi is the salt
4) The last field is the hash value of salt+user password i.e A6nCwOTqrNR2oDuIKirRZ
5) Now comes the cracking part. But unless this is a common hash which it isnβt you canβt decrypt it.
6) You can use Johntheripper to crack the password. This might take a long time if you are keyspace bruteforcing. If you want you can use a dictionary based attack to crack it. To do this first you
need to setup the hash file.
cp /etc/passwd ./
cp /etc/shadow ./
7) unshadow passwd shadow > hashes
8) After this you can do one of the following
9) Dictionary Based Cracking
john -w /path/to/wordlist β format=md5crypt hashes
10) Key-space Brute-forcing
john β show hashes
π¦Other Methods :
1) If you have access to a GPU, you can harness its power for your
cracking process. For this you can use hash-cat.
hashcat -m 1800 -a 0 [Path-to-Hashes] [Path-to-Word-list] -o [Path-to-Output-Cracked-Hashes]
2) you can set m to either 500 or 1800, depending on your setup.
(mediuM
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODER
Again a new whatsapp vulnerability strike.
#Vulnerabilities
MORE INFO - https://undercodenews.com/again-a-new-whatsapp-vulnerability-strike/04/11/2020/
#Vulnerabilities
MORE INFO - https://undercodenews.com/again-a-new-whatsapp-vulnerability-strike/04/11/2020/
UNDERCODER
Again a new whatsapp vulnerability strike. #Vulnerabilities MORE INFO - https://undercodenews.com/again-a-new-whatsapp-vulnerability-strike/04/11/2020/
SO IMPORTANT IOS USERS Β»> UPDATE WHATSAPP
At any time you can visit, still under-construction in covid-19, UndercodeTesting.com
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 ALL REAL CRACKING TOOLS :
https://hashcat.net/hashcat/
http://www.openwall.com/john/
https://www.darknet.org.uk/2006/09/brutus-password-cracker-download-brutus-aet2zip-aet2/
https://www.thc.org/thc-hydra/
http://www.foofus.net/jmk/tools/medusa-2.1.1.tar.gz
http://ophcrack.sourceforge.net/tables.php
http://www.l0phtcrack.com/
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 ALL REAL CRACKING TOOLS :
https://hashcat.net/hashcat/
http://www.openwall.com/john/
https://www.darknet.org.uk/2006/09/brutus-password-cracker-download-brutus-aet2zip-aet2/
https://www.thc.org/thc-hydra/
http://www.foofus.net/jmk/tools/medusa-2.1.1.tar.gz
http://ophcrack.sourceforge.net/tables.php
http://www.l0phtcrack.com/
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
hashcat.net
hashcat - advanced password recovery
World's fastest and most advanced password recovery utility
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is Google Dork?
1) It is basically a search string that uses advanced search query to find information that are not easily available on the websites. It is also regarded as illegal google hacking activity which hackers often uses for purposes such as cyber terrorism and cyber theft.
Dork
2) They are like search criteria in which a search engine returns results related to your dork.
π¦Can Google be used by Hackers to hack websites?
1) People often take Google as just a search engine used to find text, images, videos, and news. However, in the infosec world, it has a very vast role. Google can also be used as a very useful hacking tool.
2) You cannot hack websites directly using Google. But, itβs tremendous web crawling capabilities can be of great help to index almost anything within any websites which includes sensitive information. This can include from username, password and other general vulnerabilities you wonβt even be knowing.
Basically, using Google Dorking you can find vulnerabilities of any web applications and servers with the help of native Google Search engine.
(medium)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is Google Dork?
1) It is basically a search string that uses advanced search query to find information that are not easily available on the websites. It is also regarded as illegal google hacking activity which hackers often uses for purposes such as cyber terrorism and cyber theft.
Dork
2) They are like search criteria in which a search engine returns results related to your dork.
π¦Can Google be used by Hackers to hack websites?
1) People often take Google as just a search engine used to find text, images, videos, and news. However, in the infosec world, it has a very vast role. Google can also be used as a very useful hacking tool.
2) You cannot hack websites directly using Google. But, itβs tremendous web crawling capabilities can be of great help to index almost anything within any websites which includes sensitive information. This can include from username, password and other general vulnerabilities you wonβt even be knowing.
Basically, using Google Dorking you can find vulnerabilities of any web applications and servers with the help of native Google Search engine.
(medium)
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ Bash function for extracting file archives of various types:
1) Bash function for extracting file archives of various types
Open your ~ / .bashrc file:
$ nano ~/.bashrc
2) Add the following snippet at the end:
# Bash Function To Extract File Archives Of Various Types
extract () {
if [ -f $1 ] ; then
case $1 in
*.tar.bz2) tar xjf $1 ;;
*.tar.gz) tar xzf $1 ;;
*.bz2) bunzip2 $1 ;;
*.rar) rar x $1 ;;
*.gz) gunzip $1 ;;
*.tar) tar xf $1 ;;
*.tbz2) tar xjf $1 ;;
*.tgz) tar xzf $1 ;;
*.zip) unzip $1 ;;
*.Z) uncompress $1 ;;
*.7z) 7z x $1 ;;
*) echo "'$1' cannot be extracted via extract()" ;;
esac
else
echo "'$1' is not a valid file"
fi
}
3) Press Ctrl + o and press ENTER to save the file and then press Ctrl + x to exit the file.
4) Run the following command for the changes to take effect:
$ source ~/.bashrc
5) From now on, you can simply call this function to extract archives of various types.
For example, I'm going to extract a .7z archive file using the command:
$ extract archive.7z
π¦Output example:
p7zip Version 16.02 (locale=en_IN,Utf16=on,HugeFiles=on,64 bits,4 CPUs Intel(R) Core(TM) i3-2350M CPU @ 2.30GHz (206A7),ASM)
7) Scanning the drive for archives:
1 file, 16013693 bytes (16 MiB)
8) Extracting archive: archive.7z
--
Path = archive.7z
Type = 7z
Physical Size = 16013693
Headers Size = 1204
Method = LZMA:23
Solid = +
Blocks = 1
Folders: 21
Files: 37
Size: 16625007
Compressed: 16013693
9) Likewise, to extract .zip files, the command would be:
$ extract archive.zip
10) Please note that you must install the appropriate archive manager before using this function.
If your system does not have supported archiving tools installed, you will receive an error message similar to the one below:
$ extract archive.zip
11) bash: /usr/bin/unzip: No such file or directory
This script is mentioned in many places on the Internet.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ Bash function for extracting file archives of various types:
1) Bash function for extracting file archives of various types
Open your ~ / .bashrc file:
$ nano ~/.bashrc
2) Add the following snippet at the end:
# Bash Function To Extract File Archives Of Various Types
extract () {
if [ -f $1 ] ; then
case $1 in
*.tar.bz2) tar xjf $1 ;;
*.tar.gz) tar xzf $1 ;;
*.bz2) bunzip2 $1 ;;
*.rar) rar x $1 ;;
*.gz) gunzip $1 ;;
*.tar) tar xf $1 ;;
*.tbz2) tar xjf $1 ;;
*.tgz) tar xzf $1 ;;
*.zip) unzip $1 ;;
*.Z) uncompress $1 ;;
*.7z) 7z x $1 ;;
*) echo "'$1' cannot be extracted via extract()" ;;
esac
else
echo "'$1' is not a valid file"
fi
}
3) Press Ctrl + o and press ENTER to save the file and then press Ctrl + x to exit the file.
4) Run the following command for the changes to take effect:
$ source ~/.bashrc
5) From now on, you can simply call this function to extract archives of various types.
For example, I'm going to extract a .7z archive file using the command:
$ extract archive.7z
π¦Output example:
p7zip Version 16.02 (locale=en_IN,Utf16=on,HugeFiles=on,64 bits,4 CPUs Intel(R) Core(TM) i3-2350M CPU @ 2.30GHz (206A7),ASM)
7) Scanning the drive for archives:
1 file, 16013693 bytes (16 MiB)
8) Extracting archive: archive.7z
--
Path = archive.7z
Type = 7z
Physical Size = 16013693
Headers Size = 1204
Method = LZMA:23
Solid = +
Blocks = 1
Folders: 21
Files: 37
Size: 16625007
Compressed: 16013693
9) Likewise, to extract .zip files, the command would be:
$ extract archive.zip
10) Please note that you must install the appropriate archive manager before using this function.
If your system does not have supported archiving tools installed, you will receive an error message similar to the one below:
$ extract archive.zip
11) bash: /usr/bin/unzip: No such file or directory
This script is mentioned in many places on the Internet.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β