Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Install and Use Raspberry Pi Imager
First, update the APT package repository cache with the following command:
$ sudo apt update
The APT package repository cache should be updated.
To install Raspberry Pi Imager, run the following command:
$ sudo apt install rpi-imager
To confirm the installation, press Y and then press <Enter>.
The Raspberry Pi Imager is being installed. It may take a few seconds.
At this point, the Raspberry Pi Imager should be downloaded.
Once the Raspberry Pi Imager is installed, you can start it from Application Menu > Accessories > Imager as shown in the screenshot below.
Raspberry Pi Imager should be started.
Installing Raspberry Pi Imager on Windows 10:
First, visit the official downloads page of Raspberry Pi Imager from your favorite web browser.
Once the page loads, click on the Raspberry Pi Imager for Windows link as marked on your screen
Your browser should prompt you to save the installation file of Raspberry Pi Imager. Click on Save.
Once the download is finished, run the Raspberry Pi Imager installer.
To allow the installer on your computer, click on Yes.
The Raspberry Pi Imager installer should start. Click on Install.
The Raspberry Pi Imager is being installed.
At this point, the Raspberry Pi Imager should be installed. Click on Finish.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Install and Use Raspberry Pi Imager
First, update the APT package repository cache with the following command:
$ sudo apt update
The APT package repository cache should be updated.
To install Raspberry Pi Imager, run the following command:
$ sudo apt install rpi-imager
To confirm the installation, press Y and then press <Enter>.
The Raspberry Pi Imager is being installed. It may take a few seconds.
At this point, the Raspberry Pi Imager should be downloaded.
Once the Raspberry Pi Imager is installed, you can start it from Application Menu > Accessories > Imager as shown in the screenshot below.
Raspberry Pi Imager should be started.
Installing Raspberry Pi Imager on Windows 10:
First, visit the official downloads page of Raspberry Pi Imager from your favorite web browser.
Once the page loads, click on the Raspberry Pi Imager for Windows link as marked on your screen
Your browser should prompt you to save the installation file of Raspberry Pi Imager. Click on Save.
Once the download is finished, run the Raspberry Pi Imager installer.
To allow the installer on your computer, click on Yes.
The Raspberry Pi Imager installer should start. Click on Install.
The Raspberry Pi Imager is being installed.
At this point, the Raspberry Pi Imager should be installed. Click on Finish.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ 4 ways to connect to SSH and SCP through a proxy server (jump) on Linux
SCP via proxy
Method 1: using scp with ProxyJump
In openssh package version 7.4p1-11 or newer, we can use the ProxyJump option to transfer files using a proxy server.
The scp command syntax for proxy file transfers is:
# scp -o "ProxyJump <User> @ <Proxy-Server>" <File-Name> <User> @ <Destination-Server>: <Destination-Path>
For instance:
# scp -o "ProxyJump user@10.23.100.70" dataFile.txt user@192.168.10.100: / tmp
user@10.23.100.70's password:
user@192.168.10.100's password:
dataFile.txt
Where my proxy is 10.23.100.70 and the target server is 192.168.10.100.
Method 2: using scp with ProxyCommand
SCP uses ssh as its main protocol and hence we can use ssh options along with scp commands.
Setting up SSH to make your life easier
The syntax for using the ProxyCommand option with the scp command is:
# scp -o "ProxyCommand ssh <user> @ <Proxy-Server> nc% h% p" <File-Name> <User @ <Destination-Server>: <Destination-Path>
Where:
% h will be replaced with the hostname to connect
% p will be replaced with port
When using the ProxyCommand parameter, make sure the nmap-ncat package is installed on the proxy that provides the nc command, otherwise the following error message will be displayed.
bash: nc: command not found
ssh_exchange_identification: Connection closed by remote host
lost connection
For instance:
# scp -o "ProxyCommand ssh user@10.23.100.70 nc% h% p" dataFile.txt root@192.168.10.100: / tmp
user@10.23.100.70's password:
root@192.168.10.100's password:
dataFile.txt 100% 5 0.0KB / s 00:00
Where my proxy is 10.23.100.70 and the target server is 192.168.10.100.
SSH through a proxy server
Method 1: pass ProxyCommand using ssh parameters
We can again use the ProxyCommand to ssh login to another server using a proxy server.
The syntax for SSH over a proxy will be as follows:
# ssh -o "ProxyCommand ssh user_name_on_proxy @ hostname_or_IP_of_proxy nc% h% p" user_name_on_server @ hostname_or_IP_of_server
Example: login as root user at 192.168.10.100 through proxy at 10.23.100.70 with proxy credentials for proxy_user
# ssh -o "ProxyCommand ssh proxy_user@10.23.100.70 nc% h% p" root@192.168.10.100
proxy_user@10.23.100.70's password:
root@192.168.10.100's password:
Last login: Tue Dec 24 10:40:33 2019 from 10.23.100.70
# ip al | grep eth0
2: eth0: <BROADCAST, MULTICAST, UP, LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
inet 192.168.10.100/24 ββbrd 192.168.1.255 scope global eth0
If the nc command is not installed on the proxy server, or you do not have proxy login credentials, but a proxy service such as squid is running on the proxy server that will accept SSH connections, you can use the following command.
Note that this method requires you to have the nc command installed on your local / client system.
# ssh -o "ProxyCommand nc --proxy hostname_or_IP_of_proxy: proxy_service_port --proxy-type http% h% p" user_name_on_server @ hostname_or_IP_of_server
For example, to log in as root on 192.168.10.100 through a proxy service listening on port 3128 on 10.23.100.70.
The proxy service does not require any credentials.
# ssh -o "ProxyCommand nc --proxy 10.23.100.70:3128 --proxy-type http% h% p" root@192.168.10.100
root@192.168.10.100's password:
Last login: Tue Dec 24 10:40:46 2019 from 10.23.100.70
# ip al | grep eth0
2: eth0: <BROADCAST, MULTICAST, UP, LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
inet 192.168.10.100/24 ββbrd 192.168.1.255 scope global eth0
Method 2: Using an ssh client config file
We discussed the SSH client config file in detail
π§ How to check OpenSSH client configuration
π§ How to use SSH configuration for each Linux host
So instead of providing all the options as input arguments for SSH, we can also use the SSH client config file.
π¦ 4 ways to connect to SSH and SCP through a proxy server (jump) on Linux
SCP via proxy
Method 1: using scp with ProxyJump
In openssh package version 7.4p1-11 or newer, we can use the ProxyJump option to transfer files using a proxy server.
The scp command syntax for proxy file transfers is:
# scp -o "ProxyJump <User> @ <Proxy-Server>" <File-Name> <User> @ <Destination-Server>: <Destination-Path>
For instance:
# scp -o "ProxyJump user@10.23.100.70" dataFile.txt user@192.168.10.100: / tmp
user@10.23.100.70's password:
user@192.168.10.100's password:
dataFile.txt
Where my proxy is 10.23.100.70 and the target server is 192.168.10.100.
Method 2: using scp with ProxyCommand
SCP uses ssh as its main protocol and hence we can use ssh options along with scp commands.
Setting up SSH to make your life easier
The syntax for using the ProxyCommand option with the scp command is:
# scp -o "ProxyCommand ssh <user> @ <Proxy-Server> nc% h% p" <File-Name> <User @ <Destination-Server>: <Destination-Path>
Where:
% h will be replaced with the hostname to connect
% p will be replaced with port
When using the ProxyCommand parameter, make sure the nmap-ncat package is installed on the proxy that provides the nc command, otherwise the following error message will be displayed.
bash: nc: command not found
ssh_exchange_identification: Connection closed by remote host
lost connection
For instance:
# scp -o "ProxyCommand ssh user@10.23.100.70 nc% h% p" dataFile.txt root@192.168.10.100: / tmp
user@10.23.100.70's password:
root@192.168.10.100's password:
dataFile.txt 100% 5 0.0KB / s 00:00
Where my proxy is 10.23.100.70 and the target server is 192.168.10.100.
SSH through a proxy server
Method 1: pass ProxyCommand using ssh parameters
We can again use the ProxyCommand to ssh login to another server using a proxy server.
The syntax for SSH over a proxy will be as follows:
# ssh -o "ProxyCommand ssh user_name_on_proxy @ hostname_or_IP_of_proxy nc% h% p" user_name_on_server @ hostname_or_IP_of_server
Example: login as root user at 192.168.10.100 through proxy at 10.23.100.70 with proxy credentials for proxy_user
# ssh -o "ProxyCommand ssh proxy_user@10.23.100.70 nc% h% p" root@192.168.10.100
proxy_user@10.23.100.70's password:
root@192.168.10.100's password:
Last login: Tue Dec 24 10:40:33 2019 from 10.23.100.70
# ip al | grep eth0
2: eth0: <BROADCAST, MULTICAST, UP, LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
inet 192.168.10.100/24 ββbrd 192.168.1.255 scope global eth0
If the nc command is not installed on the proxy server, or you do not have proxy login credentials, but a proxy service such as squid is running on the proxy server that will accept SSH connections, you can use the following command.
Note that this method requires you to have the nc command installed on your local / client system.
# ssh -o "ProxyCommand nc --proxy hostname_or_IP_of_proxy: proxy_service_port --proxy-type http% h% p" user_name_on_server @ hostname_or_IP_of_server
For example, to log in as root on 192.168.10.100 through a proxy service listening on port 3128 on 10.23.100.70.
The proxy service does not require any credentials.
# ssh -o "ProxyCommand nc --proxy 10.23.100.70:3128 --proxy-type http% h% p" root@192.168.10.100
root@192.168.10.100's password:
Last login: Tue Dec 24 10:40:46 2019 from 10.23.100.70
# ip al | grep eth0
2: eth0: <BROADCAST, MULTICAST, UP, LOWER_UP> mtu 1500 qdisc pfifo_fast qlen 1000
inet 192.168.10.100/24 ββbrd 192.168.1.255 scope global eth0
Method 2: Using an ssh client config file
We discussed the SSH client config file in detail
π§ How to check OpenSSH client configuration
π§ How to use SSH configuration for each Linux host
So instead of providing all the options as input arguments for SSH, we can also use the SSH client config file.
Edit the ~ / .ssh / config file as shown below:
# vim ~ / .ssh / config
...
Host <nickname>
HostName <hostname_of_server>
User <user_on_server>
ProxyCommand ssh <user_on_server> @ <proxy_server> nc% h% p
If this file already contains content, you will need to add the above to the end of the file.
Where:
<nickname>: Sets the alias for the target server.
<hostname_of_sever>: sets the real name of the remote server / host
<user_on_server>: the real user that exists on the target server
<proxy_server>: IP or hostname of the proxy server
% h will be replaced with the hostname to connect
% p will be replaced with port
Then you can use SSH with an additional verbose parameter to check the configuration
# ssh -vvv <target_server>
β β β Uππ»βΊπ«Δπ¬πβ β β β
# vim ~ / .ssh / config
...
Host <nickname>
HostName <hostname_of_server>
User <user_on_server>
ProxyCommand ssh <user_on_server> @ <proxy_server> nc% h% p
If this file already contains content, you will need to add the above to the end of the file.
Where:
<nickname>: Sets the alias for the target server.
<hostname_of_sever>: sets the real name of the remote server / host
<user_on_server>: the real user that exists on the target server
<proxy_server>: IP or hostname of the proxy server
% h will be replaced with the hostname to connect
% p will be replaced with port
Then you can use SSH with an additional verbose parameter to check the configuration
# ssh -vvv <target_server>
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
AirPods are here. Will they be immediately accessible next Tuesday on the official website?
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
Micron responded to the power outage at the Taoyuan plant: production capacity will be restored within a few days.
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hacking Platforms :
- [YesWeHack](https://yeswehack.com/)
- [intigriti](https://intigriti.com/)
- [HackerOne](https://hackerone.com/)
- [Bugcrowd](https://bugcrowd.com/)
- [Cobalt](https://cobalt.io/)
- [Bountysource](https://www.bountysource.com/)
- [Bounty Factory](https://bountyfactory.io/)
- [Coder Bounty](http://www.coderbounty.com/)
- [FreedomSponsors](https://freedomsponsors.org/)
- [FOSS Factory](http://www.fossfactory.org/)
- [Synack](https://www.synack.com/)
- [HackenProof](https://hackenproof.com/)
- [Detectify](https://cs.detectify.com/)
- [Bugbountyjp](https://bugbounty.jp/)
- [Safehats](https://safehats.com/)
- [BugbountyHQ](https://www.bugbountyhq.com/)
- [Hackerhive](https://hackerhive.io/)
- [Hacktrophy](https://hacktrophy.com/)
- [AntiHACK](https://www.antihack.me/)
- [CESPPA](https://www.cesppa.com/)
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hacking Platforms :
- [YesWeHack](https://yeswehack.com/)
- [intigriti](https://intigriti.com/)
- [HackerOne](https://hackerone.com/)
- [Bugcrowd](https://bugcrowd.com/)
- [Cobalt](https://cobalt.io/)
- [Bountysource](https://www.bountysource.com/)
- [Bounty Factory](https://bountyfactory.io/)
- [Coder Bounty](http://www.coderbounty.com/)
- [FreedomSponsors](https://freedomsponsors.org/)
- [FOSS Factory](http://www.fossfactory.org/)
- [Synack](https://www.synack.com/)
- [HackenProof](https://hackenproof.com/)
- [Detectify](https://cs.detectify.com/)
- [Bugbountyjp](https://bugbounty.jp/)
- [Safehats](https://safehats.com/)
- [BugbountyHQ](https://www.bugbountyhq.com/)
- [Hackerhive](https://hackerhive.io/)
- [Hacktrophy](https://hacktrophy.com/)
- [AntiHACK](https://www.antihack.me/)
- [CESPPA](https://www.cesppa.com/)
β β β Uππ»βΊπ«Δπ¬πβ β β β
YesWeHack
Global Bug Bounty & Vulnerability Management Platform | YesWeHack
Explore YesWeHack, leading global Bug Bounty & Vulnerability Management Platform. Connect with tens of thousands of ethical hackers worldwide to uncover vulnerabilities in your websites, mobile apps, and digital infrastructure, bolstering your cyber defenceβ¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How mount operation relates to partitioning and formatting :
Mounting is one of the types of actions that you can perform on a disk (block device). Referring to the device by its name / dev / * it is possible:
1) create new sections
2) delete existing partitions
3) format partitions or entire disk
4) perform low-level settings at the device level (setting the read
5) only flag at the disk level, reset the write cache on the disk, control Advanced Power Management, etc.), as well as read the values of these settings and disk properties
6) mount disk partitions (or the entire disk if not partitioned)
#fASTtIPS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How mount operation relates to partitioning and formatting :
Mounting is one of the types of actions that you can perform on a disk (block device). Referring to the device by its name / dev / * it is possible:
1) create new sections
2) delete existing partitions
3) format partitions or entire disk
4) perform low-level settings at the device level (setting the read
5) only flag at the disk level, reset the write cache on the disk, control Advanced Power Management, etc.), as well as read the values of these settings and disk properties
6) mount disk partitions (or the entire disk if not partitioned)
#fASTtIPS
β β β Uππ»βΊπ«Δπ¬πβ β β β