β β β Uππ»βΊπ«Δπ¬πβ β β β
This script should be used only for fair purposes like making your own backup copies of games you own on your account.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) clone https://github.com/ZeDoCaixao/activate
2) Copy latest ACTiVATED crack .so-files to $HOME/.local/share/activate/x86/libsteam_api.so and $HOME/.local/share/activate/x86_64/libsteam_api.so. Copy script file (activate) anywhere in your $PATH, e.g. /usr/local/bin.
3) Go to game directory and enter activate. The script may ask for AppID if it can't find it. That's it.
cd ~/Games/SuperSteamGame
activate
4) It will replace libsteam_api.so files with ACTiVATED crack (of right architecture), detect a version of Steam interfaces and fill activated.ini files with right interfaces section.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
This script should be used only for fair purposes like making your own backup copies of games you own on your account.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) clone https://github.com/ZeDoCaixao/activate
2) Copy latest ACTiVATED crack .so-files to $HOME/.local/share/activate/x86/libsteam_api.so and $HOME/.local/share/activate/x86_64/libsteam_api.so. Copy script file (activate) anywhere in your $PATH, e.g. /usr/local/bin.
3) Go to game directory and enter activate. The script may ask for AppID if it can't find it. That's it.
cd ~/Games/SuperSteamGame
activate
4) It will replace libsteam_api.so files with ACTiVATED crack (of right architecture), detect a version of Steam interfaces and fill activated.ini files with right interfaces section.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - ZeDoCaixao/activate: Use ACTiVATED crack on Steam game
Use ACTiVATED crack on Steam game. Contribute to ZeDoCaixao/activate development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦β¬οΈ GoScan: interactive network scanner:
GoScan: an interactive network scanner client
GoScan Network Scanner is especially suitable for unstable environments such as: unstable and unreliable network connection, no available connections, etc.).
It uses a SQLite database to run scans, monitor and maintain health.
In addition, the scan runs in the background (disconnected from the main thread), so even if the connection to the machine running GoScan is lost, the results can be downloaded asynchronously.
Features:
Interactive network scanner with autocomplete,
Suitable for everyday and professional tasks,
Capable of host detection, port scans and service enumeration (integrates many tools such as: EyeWitness, Hydra, nikto, etc.)
Scanning is performed in the background, in case of connection loss, you can download the results asynchronously (there is no need to restart the process, data can be imported at different stages),
Supports all major stages of network enumeration,
and much more.
External Integrations [Service Support]
ARP: nmap
DNS: nmap, dnsrecon, dnsenum, host
FINGER: nmap, finger-user-enum
FTP: nmap, ftp-user-enum, hydra [AGGRESIVE]
HTTP: nmap, nikto, dirb, EyeWitness, SQLmap, fimap
RDP: nmap, EyeWitness
SMB: nmap, enum4linux, nbtscan, samrdump
SMTP: nmap, smtp-user-enum
SNMP: nmap, snmpcheck, onesixtyone, snmpwalk
SSH: hydra [AGGRESIVE]
SQL: nmap
VNC: EyeWitnes
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Building from source
Clone the repo: If you want to create a multiplatform binary, run:
$ git clone https://github.com/marco-lancini/goscan.git
2) Change to the GoScan directory and build it:
$ cd goscan / goscan /
$ make setup
$ make build
3) If you want to create a multi-platform binary, run:
$ make cross
π¦Installing the binary
This is the recommended installation method.
1) $ wget https://github.com/marcolancini/goscan/releases/download/v2.3/goscan_2.3_linux_amd64.zip $ unzip goscan_2.3_linux_amd64.zip
Then put the executable in PATH:
2) $ chmod + x goscan
3) $ sudo mv ./goscan / usr / local / bin / goscan
4) choose option via numbers
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦β¬οΈ GoScan: interactive network scanner:
GoScan: an interactive network scanner client
GoScan Network Scanner is especially suitable for unstable environments such as: unstable and unreliable network connection, no available connections, etc.).
It uses a SQLite database to run scans, monitor and maintain health.
In addition, the scan runs in the background (disconnected from the main thread), so even if the connection to the machine running GoScan is lost, the results can be downloaded asynchronously.
Features:
Interactive network scanner with autocomplete,
Suitable for everyday and professional tasks,
Capable of host detection, port scans and service enumeration (integrates many tools such as: EyeWitness, Hydra, nikto, etc.)
Scanning is performed in the background, in case of connection loss, you can download the results asynchronously (there is no need to restart the process, data can be imported at different stages),
Supports all major stages of network enumeration,
and much more.
External Integrations [Service Support]
ARP: nmap
DNS: nmap, dnsrecon, dnsenum, host
FINGER: nmap, finger-user-enum
FTP: nmap, ftp-user-enum, hydra [AGGRESIVE]
HTTP: nmap, nikto, dirb, EyeWitness, SQLmap, fimap
RDP: nmap, EyeWitness
SMB: nmap, enum4linux, nbtscan, samrdump
SMTP: nmap, smtp-user-enum
SNMP: nmap, snmpcheck, onesixtyone, snmpwalk
SSH: hydra [AGGRESIVE]
SQL: nmap
VNC: EyeWitnes
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Building from source
Clone the repo: If you want to create a multiplatform binary, run:
$ git clone https://github.com/marco-lancini/goscan.git
2) Change to the GoScan directory and build it:
$ cd goscan / goscan /
$ make setup
$ make build
3) If you want to create a multi-platform binary, run:
$ make cross
π¦Installing the binary
This is the recommended installation method.
1) $ wget https://github.com/marcolancini/goscan/releases/download/v2.3/goscan_2.3_linux_amd64.zip $ unzip goscan_2.3_linux_amd64.zip
Then put the executable in PATH:
2) $ chmod + x goscan
3) $ sudo mv ./goscan / usr / local / bin / goscan
4) choose option via numbers
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - marco-lancini/goscan: Interactive Network Scanner
Interactive Network Scanner. Contribute to marco-lancini/goscan development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π Using Tor with Python :
1) download https://www.torproject.org/download/tor/
2) Install Python requests
We need Python requests
You can install it using the following commands:
pip install requests
pip install requests [socks]
pip install requests [security]
Python code working with TOR
The following Python code allows you to run TOR and Python together.
We will use the requests library to execute requests.
3) Make sure you have TOR running before running the code.
import requests
domain = "https://itsecforu.ru"
#define your proxies
#the socks5h method allows the socks server to translate the #hostname. So make sure that you add 'socks5h'.
proxies = {
'http': 'socks5h://127.0.0.1:9050',
'https': 'socks5h://127.0.0.1:9050'
}
a = requests.get(domain.strip(), proxies=proxies).text
print(a)
When can you use this
There can be various reasons why you might want to use TOR and Python together.
4) Python itself is just a programming language, and if it works in Python, then most likely the same approach will work in other programming languages ββas well.
use case 1: crawler
You can use this code to create your own Python crawler via TOR.
Just create a list or dictionary of URLs you want to visit and instruct the tool to use your list.
myurls = ['url1','url2','url3','url4']
for url in myurls:
#dosomething
use case 2: Forensics
In some cases, you may only be interested in the text.
5) The code allows you to load entire pages without viewing visual content.
This can be a big advantage in some use cases.
my_interest = ['keyword1','keyword2','keyword3','keyword4']
for keyword in my_interest:
if keyword in a:
#dosomething
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π Using Tor with Python :
1) download https://www.torproject.org/download/tor/
2) Install Python requests
We need Python requests
You can install it using the following commands:
pip install requests
pip install requests [socks]
pip install requests [security]
Python code working with TOR
The following Python code allows you to run TOR and Python together.
We will use the requests library to execute requests.
3) Make sure you have TOR running before running the code.
import requests
domain = "https://itsecforu.ru"
#define your proxies
#the socks5h method allows the socks server to translate the #hostname. So make sure that you add 'socks5h'.
proxies = {
'http': 'socks5h://127.0.0.1:9050',
'https': 'socks5h://127.0.0.1:9050'
}
a = requests.get(domain.strip(), proxies=proxies).text
print(a)
When can you use this
There can be various reasons why you might want to use TOR and Python together.
4) Python itself is just a programming language, and if it works in Python, then most likely the same approach will work in other programming languages ββas well.
use case 1: crawler
You can use this code to create your own Python crawler via TOR.
Just create a list or dictionary of URLs you want to visit and instruct the tool to use your list.
myurls = ['url1','url2','url3','url4']
for url in myurls:
#dosomething
use case 2: Forensics
In some cases, you may only be interested in the text.
5) The code allows you to load entire pages without viewing visual content.
This can be a big advantage in some use cases.
my_interest = ['keyword1','keyword2','keyword3','keyword4']
for keyword in my_interest:
if keyword in a:
#dosomething
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
www.torproject.org
The Tor Project | Privacy & Freedom Online
Defend yourself against tracking and surveillance. Circumvent censorship.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π« A look at how credit card information can be stolen and how to keep you safe :
1) Cloning maps
Making a cloned credit card is the easiest way for a thief to spend someone else's money.
All they have to do is temporarily access your credit card (often in fractions of a minute) and program it onto another prepaid card.
The cloned cards can then be sold on the darknet, usually through cryptocurrency.
Many of these stolen cards resemble real cards, and the attention to detail is mind-boggling.
2) How can this be prevented?
To prevent credit card cloning, try not to transfer your credit card to another person unless it is an emergency.
Many restaurants, clubs and bars now have desktop payment terminals.
Change your PIN regularly and keep track of small unaccounted charges on your credit card with SMS alerts or alerts from the bank app on your phone.
Many thieves made small spending on a cloned credit card at first in order to make a big purchase later.
This gives you at least a lower risk for this problem.
3) Skimming cards
Breathing in the neck of credit card cloning, ATM skimming is one of the most common ways to get credit and debit card data.
It typically uses magnetic stripe cards rather than chip and pin code cards, but as the story suggests, thieves can also install a mini camera on the skimmer to capture the pin number.
Skimmers can also be placed in the shadow terminal of the point of sale and are not detectable with the naked eye.
Law enforcement usually monitors thieves using this method, but skimming remains a fairly popular way of collecting data from someone's credit card.
You are more vulnerable if you are traveling to a country where the police turn a blind eye to such crimes.
4) Formjacking
The digital equivalent of ATM skimming, "formjacking" is a term Symantec uses to refer to hackers who steal credit card information from checkout pages on websites.
They usually install malicious software, usually JavaScript code, to remove credit card numbers.
Cryptojacking is another similar term that refers to the withdrawal of cryptocurrency details.
Formjacking became a threat in 2019-2020 as leading websites such as British Airways, Ticketmaster, Home Depot, Target, and Feedify reported hacking incidents.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π« A look at how credit card information can be stolen and how to keep you safe :
1) Cloning maps
Making a cloned credit card is the easiest way for a thief to spend someone else's money.
All they have to do is temporarily access your credit card (often in fractions of a minute) and program it onto another prepaid card.
The cloned cards can then be sold on the darknet, usually through cryptocurrency.
Many of these stolen cards resemble real cards, and the attention to detail is mind-boggling.
2) How can this be prevented?
To prevent credit card cloning, try not to transfer your credit card to another person unless it is an emergency.
Many restaurants, clubs and bars now have desktop payment terminals.
Change your PIN regularly and keep track of small unaccounted charges on your credit card with SMS alerts or alerts from the bank app on your phone.
Many thieves made small spending on a cloned credit card at first in order to make a big purchase later.
This gives you at least a lower risk for this problem.
3) Skimming cards
Breathing in the neck of credit card cloning, ATM skimming is one of the most common ways to get credit and debit card data.
It typically uses magnetic stripe cards rather than chip and pin code cards, but as the story suggests, thieves can also install a mini camera on the skimmer to capture the pin number.
Skimmers can also be placed in the shadow terminal of the point of sale and are not detectable with the naked eye.
Law enforcement usually monitors thieves using this method, but skimming remains a fairly popular way of collecting data from someone's credit card.
You are more vulnerable if you are traveling to a country where the police turn a blind eye to such crimes.
4) Formjacking
The digital equivalent of ATM skimming, "formjacking" is a term Symantec uses to refer to hackers who steal credit card information from checkout pages on websites.
They usually install malicious software, usually JavaScript code, to remove credit card numbers.
Cryptojacking is another similar term that refers to the withdrawal of cryptocurrency details.
Formjacking became a threat in 2019-2020 as leading websites such as British Airways, Ticketmaster, Home Depot, Target, and Feedify reported hacking incidents.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
KISA holds a seminar to strengthen information protection capabilities in the Arab region.
#international
#international
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WINDOWS POPULAR PORTS USED BY ATTACKERS :
TCP port 21 β FTP (File Transfer Protocol)
TCP port 22 β SSH (Secure Shell)
TCP port 23 β Telnet
TCP port 25 β SMTP (Simple Mail Transfer Protocol)
TCP and UDP port 53 β DNS (Domain Name System)
TCP port 443 β HTTP (Hypertext Transport Protocol) and HTTPS (HTTP over SSL)
TCP port 110 β POP3 (Post Office Protocol version 3)
TCP and UDP port 135 β Windows RPC
TCP and UDP ports 137β139 β Windows NetBIOS over TCP/IP
TCP port 1433 and UDP port 1434 β Microsoft SQL Server
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WINDOWS POPULAR PORTS USED BY ATTACKERS :
TCP port 21 β FTP (File Transfer Protocol)
TCP port 22 β SSH (Secure Shell)
TCP port 23 β Telnet
TCP port 25 β SMTP (Simple Mail Transfer Protocol)
TCP and UDP port 53 β DNS (Domain Name System)
TCP port 443 β HTTP (Hypertext Transport Protocol) and HTTPS (HTTP over SSL)
TCP port 110 β POP3 (Post Office Protocol version 3)
TCP and UDP port 135 β Windows RPC
TCP and UDP ports 137β139 β Windows NetBIOS over TCP/IP
TCP port 1433 and UDP port 1434 β Microsoft SQL Server
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to use Sudo when used with Output Redirection or Pipe:
A) When using sudo with output redirection (>) or pipe (|), bash displays a Permission denied error message.
B) Next, I'll show you different ways to solve this problem.
Use sudo with tree
For example, to redirect the output from echo 1 to ip_forward, run:
$ sudo echo 1> / proc / sys / net / ipv4 / ip_forward
bash: / proc / sys / net / ipv4 / ip_forward: Permission denied
The above sudo command resulted in a permission denied error because the redirection is done by a shell that doesn't have write permission.
C) We can use the sudo command with the tee command to fix this error:
$ echo 1 | sudo tee / proc / sys / net / ipv4 / ip_forward
With the approach described above, the command executed before the pipe will not be executed as the root user (echo 1).
D) This is useful if you just want the output of a program that does not require root privileges.
If the command before the channel requires root, we could use sudo before each command, for example:
$ sudo echo 1 | sudo tee / proc / sys / net / ipv4 / ip_forward> / dev / null
E) A similar approach that we can use to write "1" to the file "ip_forward" as in the previous examples is to level up the write process to the file.
Here's an example:
$ sudo tee / proc / sys / net / ipv4 / ip_forward> / dev / null << EOF
1
EOF
Start the shell with sudo -c
F) Another popular approach is to start another shell as root with the -c option.
Example:
$ sudo sh -c 'echo 1> / proc / sys / net / ipv4 / ip_forward'
Start the shell with sudo -s
G) Another way is to start a shell with sudo -s and then execute the command:
$ sudo -s
# echo 1> / proc / sys / net / ipv4 / ip_forward
# ^ D
$
With a Bash script
Another way to run sudo with a redirect or pipe is to create a bash script with all your commands and run that script with sudo.
Let's see how we can implement this.
First, we need to create a new file using any text editor like nano, vim, gedit or whatever.
Let's call it myscript.sh.
Then paste the following commands into myscript.sh and save the file:
#! / bin / sh
echo 1> / proc / sys / net / ipv4 / ip_forward
Now you just need to run the myscript.sh file using the sudo command:
$ sudo myscript.sh
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to use Sudo when used with Output Redirection or Pipe:
A) When using sudo with output redirection (>) or pipe (|), bash displays a Permission denied error message.
B) Next, I'll show you different ways to solve this problem.
Use sudo with tree
For example, to redirect the output from echo 1 to ip_forward, run:
$ sudo echo 1> / proc / sys / net / ipv4 / ip_forward
bash: / proc / sys / net / ipv4 / ip_forward: Permission denied
The above sudo command resulted in a permission denied error because the redirection is done by a shell that doesn't have write permission.
C) We can use the sudo command with the tee command to fix this error:
$ echo 1 | sudo tee / proc / sys / net / ipv4 / ip_forward
With the approach described above, the command executed before the pipe will not be executed as the root user (echo 1).
D) This is useful if you just want the output of a program that does not require root privileges.
If the command before the channel requires root, we could use sudo before each command, for example:
$ sudo echo 1 | sudo tee / proc / sys / net / ipv4 / ip_forward> / dev / null
E) A similar approach that we can use to write "1" to the file "ip_forward" as in the previous examples is to level up the write process to the file.
Here's an example:
$ sudo tee / proc / sys / net / ipv4 / ip_forward> / dev / null << EOF
1
EOF
Start the shell with sudo -c
F) Another popular approach is to start another shell as root with the -c option.
Example:
$ sudo sh -c 'echo 1> / proc / sys / net / ipv4 / ip_forward'
Start the shell with sudo -s
G) Another way is to start a shell with sudo -s and then execute the command:
$ sudo -s
# echo 1> / proc / sys / net / ipv4 / ip_forward
# ^ D
$
With a Bash script
Another way to run sudo with a redirect or pipe is to create a bash script with all your commands and run that script with sudo.
Let's see how we can implement this.
First, we need to create a new file using any text editor like nano, vim, gedit or whatever.
Let's call it myscript.sh.
Then paste the following commands into myscript.sh and save the file:
#! / bin / sh
echo 1> / proc / sys / net / ipv4 / ip_forward
Now you just need to run the myscript.sh file using the sudo command:
$ sudo myscript.sh
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BTC- DEEP WEBSITES:
http://ow24et3tetp6tvmk.onion/ β OnionWallet β Anonymous Bitcoin Wallet and Bitcoin Laundry
http://nr6juudpp4as4gjg.onion/pptobtc.html β PayPal to BitCoins
http://nr6juudpp4as4gjg.onion/doublecoins.html β Double Your BitCoins
http://tfwdi3izigxllure.onion/ β Apples 4 Bitcoin
http://fogcore5n3ov3tui.onion/ β Bitcoin Fog β Bitcoin Laundry
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BTC- DEEP WEBSITES:
http://ow24et3tetp6tvmk.onion/ β OnionWallet β Anonymous Bitcoin Wallet and Bitcoin Laundry
http://nr6juudpp4as4gjg.onion/pptobtc.html β PayPal to BitCoins
http://nr6juudpp4as4gjg.onion/doublecoins.html β Double Your BitCoins
http://tfwdi3izigxllure.onion/ β Apples 4 Bitcoin
http://fogcore5n3ov3tui.onion/ β Bitcoin Fog β Bitcoin Laundry
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME CMD COMMANDS USED BI HACKERS:
1) Copy Path on Folder Drop.
I had a file buried in C:\xampp\htdocs\Vonster\wp-content\themes\twentytwelve that I needed but look at that folder path: if I manually type it Iβll instantly make myself susceptible to all kinds of typos plus Iβm lazy and couldnβt care less about typing folder paths.
To paste the full path, just drag the folder and drop it into the command prompt.
In my case I typed cd in the command prompt and then dragged my folder into the command window.
2) View history with F7
One way to recount the list of commands you typed during a session is to press the up and down arrow keys. Up goes back in time and Down moves forward to the present. You probably already knew that; however, thereβs an alternate way that can save you a few keystrokes.
Pressing F7 lets you see your 10 most recent commands in a single glance. Now you can arrow up or down and press enter on the exact command you need to recall.
3) Pretty Print the Current Directory
Whenever you want to view the directory contents you type dir but sometimes you just want to view the structure without the datestamps and file sizes. Welcome to the tree /a command.
tree letβs you view all the folders and subfolders of the current directory as a rudimentary ASCII art print out.
Since the output is usually long, I always add the redirection operator to send the results to a file.
Command Prompt tree /a commandCommand Prompt tree /a command
And hereβs the text file I saved the output to.
I entered this command from C:\xampp\htdocs\Vonster. If I entered it from C:\xampp\htdocs\ I would get every folder and subfolder in the htdocs parent
tree /a > c:\vonsterWebsite.txt
Command Prompt tree /a command outputCommand Prompt tree /a command output
4) Send Command Output to the Clipboard
A related command is the clip option. After any command insert a space then type the vertical pipe (itβs right below the backspace and shares a key with the backslash). After the pipe insert another space and type clip.
For example to send the ipconfig results to your clipboard rather than the command prompt window β type this:
ipconfig /all | clip
Send Output to the ClipboardSend Output to the Clipboard
5) Get Help
The quick way to get help on a command is to tack on a baskslash and question mark.
For example, letβs say I want to use netsh but I forgot how to view all the Wireless Profiles on my computer.
I enter:
netsh /?
Reference: https://sites.google.com/site/betheboos/home/command-prompt-hacks-and-tricks-xp
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME CMD COMMANDS USED BI HACKERS:
1) Copy Path on Folder Drop.
I had a file buried in C:\xampp\htdocs\Vonster\wp-content\themes\twentytwelve that I needed but look at that folder path: if I manually type it Iβll instantly make myself susceptible to all kinds of typos plus Iβm lazy and couldnβt care less about typing folder paths.
To paste the full path, just drag the folder and drop it into the command prompt.
In my case I typed cd in the command prompt and then dragged my folder into the command window.
2) View history with F7
One way to recount the list of commands you typed during a session is to press the up and down arrow keys. Up goes back in time and Down moves forward to the present. You probably already knew that; however, thereβs an alternate way that can save you a few keystrokes.
Pressing F7 lets you see your 10 most recent commands in a single glance. Now you can arrow up or down and press enter on the exact command you need to recall.
3) Pretty Print the Current Directory
Whenever you want to view the directory contents you type dir but sometimes you just want to view the structure without the datestamps and file sizes. Welcome to the tree /a command.
tree letβs you view all the folders and subfolders of the current directory as a rudimentary ASCII art print out.
Since the output is usually long, I always add the redirection operator to send the results to a file.
Command Prompt tree /a commandCommand Prompt tree /a command
And hereβs the text file I saved the output to.
I entered this command from C:\xampp\htdocs\Vonster. If I entered it from C:\xampp\htdocs\ I would get every folder and subfolder in the htdocs parent
tree /a > c:\vonsterWebsite.txt
Command Prompt tree /a command outputCommand Prompt tree /a command output
4) Send Command Output to the Clipboard
A related command is the clip option. After any command insert a space then type the vertical pipe (itβs right below the backspace and shares a key with the backslash). After the pipe insert another space and type clip.
For example to send the ipconfig results to your clipboard rather than the command prompt window β type this:
ipconfig /all | clip
Send Output to the ClipboardSend Output to the Clipboard
5) Get Help
The quick way to get help on a command is to tack on a baskslash and question mark.
For example, letβs say I want to use netsh but I forgot how to view all the Wireless Profiles on my computer.
I enter:
netsh /?
Reference: https://sites.google.com/site/betheboos/home/command-prompt-hacks-and-tricks-xp
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google
Command Prompt Hacks and tricks (xp) - Hacking The Art Of Exploitation
Hacking and computer tricks and much more Have fun :)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦In Linux systems, there are three main types of logging subsystems:
1) Connection time log: It is executed by multiple programs, and records are written to /var/log/wtmp and /var/run/utmp. Programs such as login will update the wtmp and utmp files so that the system administrator can track who is where Log in to the system when (The utmp and wtmp log files are the key to most Linux log subsystems. They save the user login and logout records. Information about the currently logged-in user is recorded in the file utmp; login and logout are recorded in the file wtmp; data exchange , Shutdown and restart machine information are also recorded in the wtmp file. All records include a time stamp.)
2) Process statistics: executed by the system kernel, when a process terminates, a record is written to the process statistics file (pacct or acct) for each process. The purpose of process statistics is to provide command usage statistics for basic services in the system.
3) Error log: Executed by the syslogd (8) daemon, various system daemons, user programs and kernels report notable events to the file /var/log/messages through the syslogd (3) daemon. In addition, many Unix programs create logs. Servers that provide network services like HTTP and FTP also maintain detailed logs.
Log directory: /var/log (default directory)
View process log cat /var/log/messagesp4
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦In Linux systems, there are three main types of logging subsystems:
1) Connection time log: It is executed by multiple programs, and records are written to /var/log/wtmp and /var/run/utmp. Programs such as login will update the wtmp and utmp files so that the system administrator can track who is where Log in to the system when (The utmp and wtmp log files are the key to most Linux log subsystems. They save the user login and logout records. Information about the currently logged-in user is recorded in the file utmp; login and logout are recorded in the file wtmp; data exchange , Shutdown and restart machine information are also recorded in the wtmp file. All records include a time stamp.)
2) Process statistics: executed by the system kernel, when a process terminates, a record is written to the process statistics file (pacct or acct) for each process. The purpose of process statistics is to provide command usage statistics for basic services in the system.
3) Error log: Executed by the syslogd (8) daemon, various system daemons, user programs and kernels report notable events to the file /var/log/messages through the syslogd (3) daemon. In addition, many Unix programs create logs. Servers that provide network services like HTTP and FTP also maintain detailed logs.
Log directory: /var/log (default directory)
View process log cat /var/log/messagesp4
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Now all ubuntu users should update their systems.
New Vulnerability in Ubuntu gdm3 could allow attackers to gain root access.
New Vulnerability in Ubuntu gdm3 could allow attackers to gain root access.