Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦CISCO AUDI TOOLS PDFs and VIDEOS:
https://www.cisco.com/c/dam/en_us/training-events/product-training/prime-infrastructure-31/ja-audit/PI31_Audit_JobAid.pdf
https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cust_contact/contact_center/icm_enterprise/icm_enterprise_12_0_1/Configuration/Guide/ucce_b_12-security-guide/ucce_b_1171-security-guide_chapter_01001.pdf
https://www.cisco.com/c/en/us/td/docs/wireless/prime_infrastructure/2-2/configuration/guide/pi_22_cg/tools.pdf
https://www.youtube.com/watch?v=r39qD_FV_X4
https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/auditing_the_system.pdf
https://www.youtube.com/watch?v=EaA5pLAwnkc
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦CISCO AUDI TOOLS PDFs and VIDEOS:
https://www.cisco.com/c/dam/en_us/training-events/product-training/prime-infrastructure-31/ja-audit/PI31_Audit_JobAid.pdf
https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cust_contact/contact_center/icm_enterprise/icm_enterprise_12_0_1/Configuration/Guide/ucce_b_12-security-guide/ucce_b_1171-security-guide_chapter_01001.pdf
https://www.cisco.com/c/en/us/td/docs/wireless/prime_infrastructure/2-2/configuration/guide/pi_22_cg/tools.pdf
https://www.youtube.com/watch?v=r39qD_FV_X4
https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/auditing_the_system.pdf
https://www.youtube.com/watch?v=EaA5pLAwnkc
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SQL HACKING PDFS & VIDEOS :
https://www.pdfdrive.com/sql-injection-attacks-and-defensepdf-e23004387.html
http://index-of.es/Failed-attack-techniques/SQL%20Injection.pdf
http://scholarworks.sjsu.edu/cgi/viewcontent.cgi?article=1081&context=etd_projects
http://www.sis.pitt.edu/~jjoshi/courses/IS2620/Spring11/Paper7.pdf
https://www.youtube.com/watch?v=WFFQw01EYHM
https://www.youtube.com/watch?v=SJgYdTckMBY
https://www.youtube.com/watch?v=1qgehzaxMEY
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SQL HACKING PDFS & VIDEOS :
https://www.pdfdrive.com/sql-injection-attacks-and-defensepdf-e23004387.html
http://index-of.es/Failed-attack-techniques/SQL%20Injection.pdf
http://scholarworks.sjsu.edu/cgi/viewcontent.cgi?article=1081&context=etd_projects
http://www.sis.pitt.edu/~jjoshi/courses/IS2620/Spring11/Paper7.pdf
https://www.youtube.com/watch?v=WFFQw01EYHM
https://www.youtube.com/watch?v=SJgYdTckMBY
https://www.youtube.com/watch?v=1qgehzaxMEY
β β β Uππ»βΊπ«Δπ¬πβ β β β
Pdfdrive
SQL Injection Attacks and Defense.pdf - PDF Drive
Justin Clarke is a co-founder and Director of Gotham Digital Science, He provides Oracle security audits, security training and consulting.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦βΈοΈ How to install Netdata on Kubernetes using Helm ?
1) Step 1 - Install Helm on Linux | macOS
Next, we'll show you the steps you need to take to install Helm on Linux | macOS.
2) Download the Helm package from this link : https://github.com/helm/helm/releases
3) Unpack the package using tar -xvzf <downloaded-package>
4) Move the binary to usr / local / bin / helm
π¦We will be using an installation script that automates the steps above.
1) curl -fsSL -o get_helm.sh https://raw.githubusercontent.com/helm/helm/master/scripts/get-helm-3
2) chmod 700 get_helm.sh
3) sudo ./get_helm.sh
4) MacOS users can also use brew's package management tool.
$ brew install helm
5) After installation, confirm that everything is ok by checking the current version:
$ helm version
version.BuildInfo{Version:"v3.4.0", GitCommit:"7090a89efc8a18f3d8178bf47d2462450349a004", GitTreeState:"clean", GoVersion:"go1.14.10"}
6) Add the helm-charts repository then update helm
$ helm repo add stable https://charts.helm.sh/stable
$ helm repo update
7) Hang tight while we grab the latest from your chart repositories...
...Successfully got an update from the "stable" chart repository
Update Complete. βHappy Helming!β
Β» Step 2 - Installing Netdata Using the Helm Chart
You can install Helm Chart in two ways:
1) Install from Netdata's Helm repository
helm install netdata ./netdata-helmchart/charts/netdata
5) Now you can see the Helm deployed:
$ helm list
NAME NAMESPACE REVISION UPDATED STATUS CHART APP VERSION
netdata default 1 2020-11-20 18:41:46.244774507 +0000 UTC deployed netdata-3.1.0 v1.26.0
6) To check if the parent and child pods have been successfully deployed:
$ kubectl get pods
NAME READY STATUS RESTARTS AGE
netdata-child-fgh5c 2/2 Running 0 16h
netdata-child-qzhjp 2/2 Running 0 16h
netdata-child-ssmhp 2/2 Running 0 16h
netdata-parent-55d88fc784-x66ss 1/1 Running 0 16h
Step 3. Open Netdata-parent with NodePort
In this tutorial, we will introduce deployment using NodePort.
Netdata is configured by default to run on port 19999.
To open the port, use the command shown below:
$ kubectl expose deployment netdata-parent --type="NodePort" --port 19999
Now you can check the port on which the service was provided with the kubectl get service command:
$ kubectl get service
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
kubernetes ClusterIP 10.96.0.1 <none> 443/TCP 21h
netdata ClusterIP 10.99.202.135 <none> 19999/TCP 17h
netdata-parent NodePort 10.97.24.181 <none> 19999:30939/TCP 16h
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦βΈοΈ How to install Netdata on Kubernetes using Helm ?
1) Step 1 - Install Helm on Linux | macOS
Next, we'll show you the steps you need to take to install Helm on Linux | macOS.
2) Download the Helm package from this link : https://github.com/helm/helm/releases
3) Unpack the package using tar -xvzf <downloaded-package>
4) Move the binary to usr / local / bin / helm
π¦We will be using an installation script that automates the steps above.
1) curl -fsSL -o get_helm.sh https://raw.githubusercontent.com/helm/helm/master/scripts/get-helm-3
2) chmod 700 get_helm.sh
3) sudo ./get_helm.sh
4) MacOS users can also use brew's package management tool.
$ brew install helm
5) After installation, confirm that everything is ok by checking the current version:
$ helm version
version.BuildInfo{Version:"v3.4.0", GitCommit:"7090a89efc8a18f3d8178bf47d2462450349a004", GitTreeState:"clean", GoVersion:"go1.14.10"}
6) Add the helm-charts repository then update helm
$ helm repo add stable https://charts.helm.sh/stable
$ helm repo update
7) Hang tight while we grab the latest from your chart repositories...
...Successfully got an update from the "stable" chart repository
Update Complete. βHappy Helming!β
Β» Step 2 - Installing Netdata Using the Helm Chart
You can install Helm Chart in two ways:
1) Install from Netdata's Helm repository
2) Clone the Netdata Git repository.4) Let's install the chart:
3) Make sure you have git installed on your system
Clone the git repository locally
git clone https://github.com/netdata/helmchart.git netdata-helmchart
helm install netdata ./netdata-helmchart/charts/netdata
5) Now you can see the Helm deployed:
$ helm list
NAME NAMESPACE REVISION UPDATED STATUS CHART APP VERSION
netdata default 1 2020-11-20 18:41:46.244774507 +0000 UTC deployed netdata-3.1.0 v1.26.0
6) To check if the parent and child pods have been successfully deployed:
$ kubectl get pods
NAME READY STATUS RESTARTS AGE
netdata-child-fgh5c 2/2 Running 0 16h
netdata-child-qzhjp 2/2 Running 0 16h
netdata-child-ssmhp 2/2 Running 0 16h
netdata-parent-55d88fc784-x66ss 1/1 Running 0 16h
Step 3. Open Netdata-parent with NodePort
In this tutorial, we will introduce deployment using NodePort.
Netdata is configured by default to run on port 19999.
To open the port, use the command shown below:
$ kubectl expose deployment netdata-parent --type="NodePort" --port 19999
Now you can check the port on which the service was provided with the kubectl get service command:
$ kubectl get service
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
kubernetes ClusterIP 10.96.0.1 <none> 443/TCP 21h
netdata ClusterIP 10.99.202.135 <none> 19999/TCP 17h
netdata-parent NodePort 10.97.24.181 <none> 19999:30939/TCP 16h
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
Releases Β· helm/helm
The Kubernetes Package Manager. Contribute to helm/helm development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
France fines Google 100 million euros and Amazon 35 million for illegal collection of user information.
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to enable rc.local shell script in systemd on Linux boot ?
1) Enabling rc.local shell script in systemd at boot of Linux system
Compatibility with /etc/rc.local is achieved through systemd using a special service called rc-local.service.
2) This module is automatically called in multi-user.target by systemd-rc-local-generator if /etc/rc.local is executable.
3) Executing rc.local shell script at boot time using systemd
Naturally, create or update / edit a file called /etc/rc.local using your favorite text editor.
I'm going to use the vim command:
$ sudo vim /etc/rc.local
## RHEL/CentOS/Fedora Linux ΠΎΡΡΠ΅Π΄Π°ΠΊΡΠΈΡΡΠΉΡΠ΅ ΡΠ°ΠΉΠ» /etc/rc.d/rc.local ##
$ sudo vim /etc/rc.d/rc.local
Add the required commands or call the script.
Here is my file:
#!/bin/sh
# add your commands
# call your scripts here
# let us set stuff for my wifi
/sbin/iw phy0 wowlan enable magic-packet disconnect
# last line must be exit 0
exit 0
Save and close the file when using vim.
π§ How to save a file in Vi / Vim and exit
Make sure you set the executable permissions for the file with the chmod command:
$ sudo chmod -v +x /etc/rc.local
Setting up rc-local.service on Linux when systemd starts
All we need to do is enter the following systemctl command:
$ sudo systemctl enable rc-local.service
4) Reboot Linux:
$ sudo reboot
Check the status after reboot:
$ sudo systemctl status rc-local.service
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to enable rc.local shell script in systemd on Linux boot ?
1) Enabling rc.local shell script in systemd at boot of Linux system
Compatibility with /etc/rc.local is achieved through systemd using a special service called rc-local.service.
2) This module is automatically called in multi-user.target by systemd-rc-local-generator if /etc/rc.local is executable.
3) Executing rc.local shell script at boot time using systemd
Naturally, create or update / edit a file called /etc/rc.local using your favorite text editor.
I'm going to use the vim command:
$ sudo vim /etc/rc.local
## RHEL/CentOS/Fedora Linux ΠΎΡΡΠ΅Π΄Π°ΠΊΡΠΈΡΡΠΉΡΠ΅ ΡΠ°ΠΉΠ» /etc/rc.d/rc.local ##
$ sudo vim /etc/rc.d/rc.local
Add the required commands or call the script.
Here is my file:
#!/bin/sh
# add your commands
# call your scripts here
# let us set stuff for my wifi
/sbin/iw phy0 wowlan enable magic-packet disconnect
# last line must be exit 0
exit 0
Save and close the file when using vim.
π§ How to save a file in Vi / Vim and exit
Make sure you set the executable permissions for the file with the chmod command:
$ sudo chmod -v +x /etc/rc.local
Setting up rc-local.service on Linux when systemd starts
All we need to do is enter the following systemctl command:
$ sudo systemctl enable rc-local.service
4) Reboot Linux:
$ sudo reboot
Check the status after reboot:
$ sudo systemctl status rc-local.service
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Gps tracking apps 2020 :
https://u.famisafe.com/sign-up.html
https://www.life360.com/
https://itunes.apple.com/us/app/hubstaff-time-tracking-with-gps-and-payroll/id971894122
https://play.google.com/store/apps/details?id=com.netsoft.Hubstaff&hl=en
https://itunes.apple.com/us/app/timesheet-mobile/id560462162
https://play.google.com/store/apps/details?id=com.laborsync.mobile&hl=en
https://itunes.apple.com/us/app/labor-sync/id457863027
https://itunes.apple.com/us/app/hourstracker-time-tracking/id336456412
https://play.google.com/store/apps/details?id=com.cribasoft.HoursTrackerFree.Android&hl=en
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Gps tracking apps 2020 :
https://u.famisafe.com/sign-up.html
https://www.life360.com/
https://itunes.apple.com/us/app/hubstaff-time-tracking-with-gps-and-payroll/id971894122
https://play.google.com/store/apps/details?id=com.netsoft.Hubstaff&hl=en
https://itunes.apple.com/us/app/timesheet-mobile/id560462162
https://play.google.com/store/apps/details?id=com.laborsync.mobile&hl=en
https://itunes.apple.com/us/app/labor-sync/id457863027
https://itunes.apple.com/us/app/hourstracker-time-tracking/id336456412
https://play.google.com/store/apps/details?id=com.cribasoft.HoursTrackerFree.Android&hl=en
β β β Uππ»βΊπ«Δπ¬πβ β β β
Life360 | Family Tracking App | Location Sharing & Family Safety
Life360 | Family-Proof Your Family | Location Sharing & Safety App
Life360 is the leading family location safety app. Stay connected with your loved ones to ensure their safety with Life360.
Forwarded from UNDERCODE NEWS
AI removes mosaics, and the open source GitHub project is up, gaining almost 7,000 stars in three days..Is the mosaic safe?
#Analytiques #Updates
#Analytiques #Updates
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Detect and remove malicious code from your phone or PC:
A) What is malware?
Malware is a catch-all term for any and every destructive / parasitic software specifically designed to harm your server, computer, network, or your phone. He is called by different names, but they all have the same intention.
There is Ransomware, which is literally software designed to steal your information and demand a ransom.
GonnaCry - Linux ransomware that encrypts all user files
With threats to reveal some data and secrets, the victim has no choice but to pay a ransom.
B) In addition, there is Spyware, which is similar to Agent 007, which is malicious software designed to collect and steal information from its victims.
There are other variations:
Logic bomb
Computer worms
Trojan horse
Rootkit
Virus
Malicious programs on your phone
Most people doubt that mobile devices can get infected with malware.
C) It's true?
This is 101% possible, well, maybe not in the standard traditional method, for iPhone and Apple devices.
But, technically, the same process applies.
Let's look at the problem more specifically.
Once the malware connects to your phone, it performs several operations.
Competing with your phone's resources and destroying many programs.
D) The classic signs of malware on your phone are:
Apps take longer to load
Your battery is draining faster than usual
Apps you haven't downloaded appear as available
How do I know if my phone is infected with a virus?
There are two ways to detect and remove malware from your phone.
Manual way
Automatic way
Manual method on Android phone
Step one: turn off your phone
The moment you spot the classic signs of malware infiltration, the first thing you do, if you can't pinpoint where you entered, is to turn off your phone.
E) Turning off your phone will stop further damage and the spread of malicious software to other programs.
This is the safest first option.
Step two: activate safe mode
Activating Safe Mode on your Android device is as easy as
Hold the power button for a few seconds.
Then, while your phone is on, hold the power off button.
Click on the reboot option; Most Android phones have this option.
Then click "Restart in Safe Mode".
For devices that do not have this option, turn off the phone by long pressing the power button.
Then press and hold the volume down button, wait until the device turns on.
The Safe Mode option will appear at the bottom left corner of your phone.
Step three, part A: phone settings
Some malware is so smart and cunning that when it invades your phone, it finds a way to protect itself.
F) They go to Phone Admins settings and then change the configuration.
This way, you can try whatever you want, but you cannot remove them.
G) To fix this, do this;
Go to the settings menu of your phone.
Go to security options.
Find the Device Administrator icon, disable malware access, and change the settings.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Detect and remove malicious code from your phone or PC:
A) What is malware?
Malware is a catch-all term for any and every destructive / parasitic software specifically designed to harm your server, computer, network, or your phone. He is called by different names, but they all have the same intention.
There is Ransomware, which is literally software designed to steal your information and demand a ransom.
GonnaCry - Linux ransomware that encrypts all user files
With threats to reveal some data and secrets, the victim has no choice but to pay a ransom.
B) In addition, there is Spyware, which is similar to Agent 007, which is malicious software designed to collect and steal information from its victims.
There are other variations:
Logic bomb
Computer worms
Trojan horse
Rootkit
Virus
Malicious programs on your phone
Most people doubt that mobile devices can get infected with malware.
C) It's true?
This is 101% possible, well, maybe not in the standard traditional method, for iPhone and Apple devices.
But, technically, the same process applies.
Let's look at the problem more specifically.
Once the malware connects to your phone, it performs several operations.
Competing with your phone's resources and destroying many programs.
D) The classic signs of malware on your phone are:
Apps take longer to load
Your battery is draining faster than usual
Apps you haven't downloaded appear as available
How do I know if my phone is infected with a virus?
There are two ways to detect and remove malware from your phone.
Manual way
Automatic way
Manual method on Android phone
Step one: turn off your phone
The moment you spot the classic signs of malware infiltration, the first thing you do, if you can't pinpoint where you entered, is to turn off your phone.
E) Turning off your phone will stop further damage and the spread of malicious software to other programs.
This is the safest first option.
Step two: activate safe mode
Activating Safe Mode on your Android device is as easy as
Hold the power button for a few seconds.
Then, while your phone is on, hold the power off button.
Click on the reboot option; Most Android phones have this option.
Then click "Restart in Safe Mode".
For devices that do not have this option, turn off the phone by long pressing the power button.
Then press and hold the volume down button, wait until the device turns on.
The Safe Mode option will appear at the bottom left corner of your phone.
Step three, part A: phone settings
Some malware is so smart and cunning that when it invades your phone, it finds a way to protect itself.
F) They go to Phone Admins settings and then change the configuration.
This way, you can try whatever you want, but you cannot remove them.
G) To fix this, do this;
Go to the settings menu of your phone.
Go to security options.
Find the Device Administrator icon, disable malware access, and change the settings.
β β β Uππ»βΊπ«Δπ¬πβ β β β