Forwarded from UNDERCODE NEWS
The iPhone 13 product is expected to support Wi-Fi 6E. Large-size SE is unlikely to be launched in early 2021.
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Do you want to hack your database, like a prank test ?
Hack SQL Fake is unit testing library for Hack. It enables testing database-driven applications with an in-memory simulation of MySQL. It supports a wide variety of queries, rapid snapshot/restore of the database between test cases, and more. This is done with a Fake Object, which contains an implementation of the database, avoiding the need for explicit stubbing or mocking.
F E A T U R E S :
download > https://github.com/slackhq/hack-sql-fake
or This package can be installed via composer:
type :
> composer require slack/hack-sql-fake
HOW TO USE ??
SQL Fake works by providing a subclass of AsyncMysqlConnectionPool, the recommended method of querying MySQL built-in to Hack. A subclass for AsyncMysqlClient is provided as well.
This library assumes you currently have some form of establishing a database connection using AsyncMysqlConnectionPool. The best way to use SQLFake will depend on your code, but you can use dependency injection or fb_intercept() to instantiate a Slack\SQLFake\AsyncMysqlConnectionPool when testing. This will behave like a database for the rest of your test run.
Once per test run, you should also call Slack\SQLFake\init() to register database schema. See Exporting Database Schema for instructions.
For example, assume you have a class in your source code that manages database connections called Db with a method named getConnectionPool(): AsyncMysqlConnectionPool. In your tests, you can intercept that function to return an instance of SQLFake's connection pool.
$pool = new Slack\SQLFake\AsyncMysqlConnectionPool(darray[]);
fb_intercept('Db::getConnectionPool', (string $name, mixed $obj, array<mixed> $args, mixed $data, bool &$done) ==> {
$done = true;
return $pool;
};
}
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Do you want to hack your database, like a prank test ?
Hack SQL Fake is unit testing library for Hack. It enables testing database-driven applications with an in-memory simulation of MySQL. It supports a wide variety of queries, rapid snapshot/restore of the database between test cases, and more. This is done with a Fake Object, which contains an implementation of the database, avoiding the need for explicit stubbing or mocking.
F E A T U R E S :
FROM, WHERE, GROUP BY, HAVING, ORDER BY, LIMIT clauses supported as appropriate for each query typeπΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
JOIN queries with all join types
multi-queries such as subqueries, UNION, UNION ALL, INTERSECT, EXCEPT
complex expressions such as CASE, BETWEEN, and row comparators (1, 2, 3) < (4, 5, 6)
all basic operators implemented with operator precedence
column aliases, cross-database queries
INSERT ... ON DUPLICATE KEY UPDATE
A variety of SQL functions such as COUNT(), NULLIF(), COALESCE(), CONCAT_WS() and many others
Strict SQL mode can be enabled or disabled to throw exceptions for invalid data types and missing not-null fields
Validating parser: the query parser will throw exceptions on most invalid
SQL Queries, helping protect your production environment from accidental SQL syntax errors
download > https://github.com/slackhq/hack-sql-fake
or This package can be installed via composer:
type :
> composer require slack/hack-sql-fake
HOW TO USE ??
SQL Fake works by providing a subclass of AsyncMysqlConnectionPool, the recommended method of querying MySQL built-in to Hack. A subclass for AsyncMysqlClient is provided as well.
This library assumes you currently have some form of establishing a database connection using AsyncMysqlConnectionPool. The best way to use SQLFake will depend on your code, but you can use dependency injection or fb_intercept() to instantiate a Slack\SQLFake\AsyncMysqlConnectionPool when testing. This will behave like a database for the rest of your test run.
Once per test run, you should also call Slack\SQLFake\init() to register database schema. See Exporting Database Schema for instructions.
For example, assume you have a class in your source code that manages database connections called Db with a method named getConnectionPool(): AsyncMysqlConnectionPool. In your tests, you can intercept that function to return an instance of SQLFake's connection pool.
$pool = new Slack\SQLFake\AsyncMysqlConnectionPool(darray[]);
fb_intercept('Db::getConnectionPool', (string $name, mixed $obj, array<mixed> $args, mixed $data, bool &$done) ==> {
$done = true;
return $pool;
};
}
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - slackhq/hack-sql-fake: A library for testing database driven code in Hack
A library for testing database driven code in Hack - slackhq/hack-sql-fake
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
90% of servers are victims of encryption and are unaware of unexplained infections of malware.
#Malwares
#Malwares
Forwarded from UNDERCODE NEWS
Without touch, iPhone images can be hacked, British hackers discovered Apple's deadly flaw.
#Vulnerabilities
#Vulnerabilities
Forwarded from UNDERCODE NEWS
A new trailer demonstrating the realization of the VR component was revealed by "Microsoft Flight Simulator"
#Updates
#Updates
Forwarded from UNDERCODE NEWS
The reaction of Cook to FB's privacy dispute is close to Jobs' speech on privacy concerns many years earlier.
#international
#international
Forwarded from UNDERCODE NEWS
It is speculated that Microsoft, using the ARM architecture, plans to build PC and server chips on its own.
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
US Judge: The Department of Justice. The antitrust case against Google can begin in September 2023
#International
#International
Forwarded from UNDERCODE NEWS
The United States introduces new regulatory standards for digital currencies, Bitcoin diving overnight
#Updates
#Updates
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hack & secure windows ports :
A) Use the built-in function of the system to close the port
Closing the system port is not an advanced technology. Windows itself has a built-in port management function, but we rarely use it. This function is called "TCP/IP filtering".
1) Enter "Control Panel" β "Network Connections". We can find a "local connection" in it, right-click on the "local connection", select "properties", and then the properties window will appear.
2) In the center of the window, there is an option of "This connection uses the following selected components", in which you can find "Internet Protocol (TCP/IP)", select it and click the right mouse button again, and click "in the new properties window that appears Advanced" button to enter advanced TCP/IP settings. Switch to the "Options" tab, you can find our protagonist "TCP/IP Filtering" in the "Optional Settings". Double-click "TCP/IP Filtering" to set it.
B) Use "TCP/IP Filtering"
3) Let's set the TCP port first. Select the "Allow only" option in the TCP port settings, the "Add" button below will be activated, and we can start adding ports after clicking. Here we only need to add the commonly used ports according to our own situation. For example, we need to add port 80 when we need to browse the web, and add port 110 when receiving mail with mail clients such as Foxmail. As for the ports that need to be closed, just don't add them. Similarly, the UDP port settings are similar. Finally, don't forget to check "Enable TCP/IP filtering (all adapters)" to make the settings take effect.Set the port to be closed
4) Use a network firewall
Closing ports is a function that common network firewalls have. Using a network firewall is also the easiest and fastest way to close the port. Take "Skynet Firewall" as an example, click its "IP Rule Management" and select "Add Rule". The "name" and "description" of the rule can be filled in at will. Select "Receive" in the "Packet Direction" drop-down box, select "Any Address" in the "Other IP Address", select "TCP" for "Packet Protocol Type", fill in 139-139 in the "Local Port" field, and finally Select "Intercept when the above conditions are met". This will prevent others from connecting to port 139 of the machine. If you want to prevent the machine from connecting to the outside, for example, to prevent some rebound connection type Trojans, then just drop down the "Packet Direction" Select "Send" in the box, and select "Other Port" in the port filling field.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hack & secure windows ports :
A) Use the built-in function of the system to close the port
Closing the system port is not an advanced technology. Windows itself has a built-in port management function, but we rarely use it. This function is called "TCP/IP filtering".
1) Enter "Control Panel" β "Network Connections". We can find a "local connection" in it, right-click on the "local connection", select "properties", and then the properties window will appear.
2) In the center of the window, there is an option of "This connection uses the following selected components", in which you can find "Internet Protocol (TCP/IP)", select it and click the right mouse button again, and click "in the new properties window that appears Advanced" button to enter advanced TCP/IP settings. Switch to the "Options" tab, you can find our protagonist "TCP/IP Filtering" in the "Optional Settings". Double-click "TCP/IP Filtering" to set it.
B) Use "TCP/IP Filtering"
3) Let's set the TCP port first. Select the "Allow only" option in the TCP port settings, the "Add" button below will be activated, and we can start adding ports after clicking. Here we only need to add the commonly used ports according to our own situation. For example, we need to add port 80 when we need to browse the web, and add port 110 when receiving mail with mail clients such as Foxmail. As for the ports that need to be closed, just don't add them. Similarly, the UDP port settings are similar. Finally, don't forget to check "Enable TCP/IP filtering (all adapters)" to make the settings take effect.Set the port to be closed
4) Use a network firewall
Closing ports is a function that common network firewalls have. Using a network firewall is also the easiest and fastest way to close the port. Take "Skynet Firewall" as an example, click its "IP Rule Management" and select "Add Rule". The "name" and "description" of the rule can be filled in at will. Select "Receive" in the "Packet Direction" drop-down box, select "Any Address" in the "Other IP Address", select "TCP" for "Packet Protocol Type", fill in 139-139 in the "Local Port" field, and finally Select "Intercept when the above conditions are met". This will prevent others from connecting to port 139 of the machine. If you want to prevent the machine from connecting to the outside, for example, to prevent some rebound connection type Trojans, then just drop down the "Packet Direction" Select "Send" in the box, and select "Other Port" in the port filling field.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
The hacker, who accessed Trumpβs Twitter account on his 5th attempt, shared the remarkable password.
#CyberAttacks
#CyberAttacks
Forwarded from UNDERCODE NEWS
Biella, a hacker attack at the schoolβs online Open Day with porn videos and Nazi anthems
#CyberAttacks
#CyberAttacks
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦#Hacking A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable UDP Environment)
F E A T U R E S :
Send/Receive UDP Packets with ICMP/FakeTCP/UDP headers
ICMP/FakeTCP headers help you bypass UDP blocking, UDP QOS or improper UDP NAT behavior on some ISPs. In ICMP header mode,udp2raw works like an ICMP tunnel.
UDP headers are also supported. In UDP header mode, it behaves just like a normal UDP tunnel, and you can just make use of the other features (such as encryption, anti-replay, or connection stalization).
Simulated TCP with Real-time/Out-of-Order Delivery
In FakeTCP header mode,udp2raw simulates 3-way handshake while establishing a connection,simulates seq and ack_seq while data transferring. It also simulates a few TCP options such as: MSS, sackOk, TS, TS_ack, wscale. Firewalls will regard FakeTCP as a TCP connection, but its essentially UDP: it supports real-time/out-of-order delivery(just as normal UDP does), no congestion control or re-transmission. So there wont be any TCP over TCP problem when using OpenVPN.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/wangyu-/udp2raw-tunnel.git
2) cd udp2raw-tunnel
3) # Run at server side:
./udp2raw_amd64 -s -l0.0.0.0:4096 -r 127.0.0.1:7777 -k "passwd" --raw-mode faketcp -a
4) Run at client side
./udp2raw_amd64 -c -l0.0.0.0:3333 -r44.55.66.77:4096 -k "passwd" --raw-mode faketcp -a
run as client : ./this_program -c -l local_listen_ip:local_port -r server_address:server_port [options]
run as server : ./this_program -s -l server_listen_ip:server_port -r remote_address:remote_port [options]
common options,these options must be same on both side:
--raw-mode <string> avaliable values:faketcp(default),udp,icmp
-k,--key <string> password to gen symetric key,default:"secret key"
--cipher-mode <string> avaliable values:aes128cbc(default),xor,none
--auth-mode <string> avaliable values:hmac_sha1,md5(default),crc32,simple,none
-a,--auto-rule auto add (and delete) iptables rule
-g,--gen-rule generate iptables rule then exit,so that you can copy and
add it manually.overrides -a
--disable-anti-replay disable anti-replay,not suggested
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦#Hacking A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable UDP Environment)
F E A T U R E S :
Send/Receive UDP Packets with ICMP/FakeTCP/UDP headers
ICMP/FakeTCP headers help you bypass UDP blocking, UDP QOS or improper UDP NAT behavior on some ISPs. In ICMP header mode,udp2raw works like an ICMP tunnel.
UDP headers are also supported. In UDP header mode, it behaves just like a normal UDP tunnel, and you can just make use of the other features (such as encryption, anti-replay, or connection stalization).
Simulated TCP with Real-time/Out-of-Order Delivery
In FakeTCP header mode,udp2raw simulates 3-way handshake while establishing a connection,simulates seq and ack_seq while data transferring. It also simulates a few TCP options such as: MSS, sackOk, TS, TS_ack, wscale. Firewalls will regard FakeTCP as a TCP connection, but its essentially UDP: it supports real-time/out-of-order delivery(just as normal UDP does), no congestion control or re-transmission. So there wont be any TCP over TCP problem when using OpenVPN.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/wangyu-/udp2raw-tunnel.git
2) cd udp2raw-tunnel
3) # Run at server side:
./udp2raw_amd64 -s -l0.0.0.0:4096 -r 127.0.0.1:7777 -k "passwd" --raw-mode faketcp -a
4) Run at client side
./udp2raw_amd64 -c -l0.0.0.0:3333 -r44.55.66.77:4096 -k "passwd" --raw-mode faketcp -a
run as client : ./this_program -c -l local_listen_ip:local_port -r server_address:server_port [options]
run as server : ./this_program -s -l server_listen_ip:server_port -r remote_address:remote_port [options]
common options,these options must be same on both side:
--raw-mode <string> avaliable values:faketcp(default),udp,icmp
-k,--key <string> password to gen symetric key,default:"secret key"
--cipher-mode <string> avaliable values:aes128cbc(default),xor,none
--auth-mode <string> avaliable values:hmac_sha1,md5(default),crc32,simple,none
-a,--auto-rule auto add (and delete) iptables rule
-g,--gen-rule generate iptables rule then exit,so that you can copy and
add it manually.overrides -a
--disable-anti-replay disable anti-replay,not suggested
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - wangyu-/udp2raw: A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps youβ¦
A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable UDP Environment) - wangyu-/udp2raw
Forwarded from UNDERCODE NEWS