UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Most common vulnerabilities in December 2019:
t.me/UndercodeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1) Remote command injection over HTTP was the most common vulnerability affecting 33% of organizations worldwide.

> The vulnerabilities โ€œremote execution of MVPower DVR codeโ€ and โ€œdisclosure of information in the Git repository on a web server โ€ in the second and third places affected 32% and 29% of organizations, respectively.

2) Remote command injection over HTTP. Attackers remotely exploit this vulnerability by sending a special request to the victim. Successful exploitation will allow an attacker to execute arbitrary code on the victimโ€™s device.

3) Remote code execution MVPower DVR. An MVPower DVR device has a remote code execution vulnerability. An attacker could use this vulnerability to execute arbitrary code on a vulnerable router using a specially crafted request.

4) Disclosure of information in the Git repository on a web server. A vulnerability was discovered in the Git Repository that could lead to the disclosure of account information.

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

What is the RC4 cryptographic algorithm ?
t.me/UnderCodeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

> RC4 (or ARC4) is the most frequently used stream cipher in cryptography; it is used in some of the most popular protocols such as transport layer security (TLS) or secure socket layer (SSL) to protect Internet traffic and wired equivalent privacy (WEP) to add wireless network security. Using WEP is not recommended in modern systems; however, some RC4-based systems are safe enough for common use.

1) The RC4 cryptography algorithm its full name is Rivest Cipher 4, taking 2) the alternative acronym RC for ย“Ronย’s Codeย” which is used by RC2, RC5 and RC 6 encryption algorithms.

3) RC4 is part of the most commonly used encryption methods such as WEP, TKIP (WPA) for wireless cards and TLS. RC4ย’s substantial speed and simplicity are among the main factors that have helped it to be used in such a wide range of applications.

4) Implementing RC4 both in hardware and software is quite easy, requiring few resources to deliver high throughput

5) RC4 generates a pseudorandom stream of bytes (key stream) which is XOR added to the plain text for encryption. Deciphering the message is done in the same way.

6) To generate the key stream, the encryption algorithm has an internal secret state consisting of the following:

-A permutation of 256 bytes called S vector or simply "S";

-Two 8-bit index pointers: i and j; and

-The permutation is initialised with a variable-length key, usually 40-256 bits, using a key scheduling algorithm (KSA). Once key scheduling is done, the ciphering ย“key streamย” is produced by means of a pseudo-random generation algorithm (PRGA).

7) RC4 uses two blocks for encryption: KSA and PRGA. The following is RC4ย’s pseudo-code:

/ * S = S VECTOR with fixed 256 bytes * /size

/ * K = VECTOR which contains the seed * /

/ * L = length of seed (IV length plus SK length) * /

/ * N = 256, S vector size * /

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘WorldList Download sites :
t.me/UndercOdeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

>https://www.mediafire.com/file/m7tjhgfd61lfeu4/BIG-WPA-LIST-1.rar/file
(@ official site wireshark)

>https://github.com/berzerk0/Probable-Wordlists

>https://www.mediafire.com/file/6botgtnsy0rjfj9/BIG-WPA-LIST-2.rar/file
(@ official site wireshark)

>https://www.wirelesshack.org/wpa-wpa2-word-list-dictionaries.html

> https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm

> http://ftp.icm.edu.pl/packages/wordlists/

POsted By UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘WEP encryption algorithm 100 reason why wep old & not recommended :
T.me/UndercOdeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1) The cryptographic algorithm used by the WEP encryption method (and the TKIP encryption method used by WPA) is RC4, according to the standard, with 64-bit keys (the seed). These 64 bits consist of 24 bits for the initialisation vector (IV) plus 40-bit shared key (secret). The 40-bit shared key has to be distributed manually.

2) the initialisation vector is dynamically produced and should be different for every data frame. The initial IV goal was to encrypt 802.11 frames with different keys to prevent a potential attacker from capturing enough encrypted traffic with the same key and finally deducing the key.

3) new tools have been developed, such as BackTrack 2) and ย“Kleinย’s attack on RC4ย” have been expanded allowing an attacker to easily obtain the shared key in a few minutes, for example, as accomplished by the PTW attack

3) Both sides must know the secret key and the IV. The key is known by both sides since it is stored in the configuration of each network device; however, the IV is produced at one end and is sent in a frame to the other end.

4) WEP is encrypted via the following steps:

1- Calculate CRC-32 for 802.11 frame payload and concatenate the result (ICV);

2- Concatenate the 40-bit shared secret key to the 24-bit IV to form a 64-bit seed;

3- Input the seed obtained in step 2 into the RC4 pseudo-random number generator (PRNG) to generate a sequence of pseudo-random characters (called key stream) with a number of octets equal to the number of octets in step 1;

4- XOR the resulting characters from steps 1 and 3 to obtain the cipher-text; and

5- Send the IV (unencrypted) and the encrypted message within the IEEE 802.11 frame ย“frame bodyย” field.

5) The decoding algorithm is similar to the previous one. As the other end will know the IV and the secret key then it will have the seed and can thus generate the key stream. XOR operation of encrypted received data with the key stream will unencrypt the message (payload and ICV). CRC is done. It should be noted that WEP has come to be considered unsafe

Posted By UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Best Wifi Hack Tools :
fb.com/UndercOdeTestingCompany

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1) Nmap - Nmap ("Network Mapper") is free open source . Utility for network research and security auditing. It was designed to quickly scan large networks, although it works great against individual hosts. Nmap uses raw IP packets in a new way to determine which hosts are available on the network, what services (application name and version) these hosts offer, which operating systems (and OS versions) they use, what type of packet filters / firewalls are used, and also dozens of other features. Nmap runs on most types of computers and is adapted to all operating systems.
> Official site - https://nmap.org/

2) Nikto - Nikto is an open source (GPL) web server scanner that performs comprehensive tests against web servers for several items, including over 3200 potentially dangerous files / CGIs, versions on more than 625 servers, and specific versions problems on more than 230 servers. Scan items and plugins are often updated and can be automatically updated (if necessary).

Offsite - https://cirt.net/Nikto2

3) THC-AMAP - AMAP is the next generation tool for scanning and testing for penetration into the network. It performs fast and reliable discovery of application protocols running on specific ports.

Offsite - http://www.thc.org/thc-amap/

4) Wireshark- . Wireshark is the world's most important network protocol analyzer. This allows you to see what is happening on your network at a microscopic level. . Wireshark is one of the best tools for network analysis [protocols], if not the best. With Wireshark, you can analyze the network to the greatest detail to see what happens. M You can use the Live to capture packets, deep inspection of hundreds of protocols, viewing and filtering.

Offsite - https://www.wireshark.org/download.html

5) THC-Hydra - The number one of the biggest security holes is passwords, as each hack shows a security password. Hydra is one of the best brute and security testing software that supports numerous attack protocols. New modules are easy to add, in addition, the program is reliable and fast.

Off. site - https://www.thc.org/thc-hydra/

6) Metasploit Framework - The Metasploit Framework is an advanced open source platform for developing, testing and using exploit code. This project originally began as a portable network game and has become a powerful tool for penetration testing, exploit development, and vulnerability research.

Offsite - https://www.metasploit.com/

7) Jhon The Ripper - John the Ripper is a popular password cracking tool that is most often used to perform dictionary attacks. John the Ripper accepts samples of text strings (from a text file referred to as a wordlist, available here, here or here, which contains popular and complex words found in a dictionary or password that were hacked earlier, are encrypted in the same way as a password ( including both the encryption algorithm and the key), and comparing the output with the encrypted string, this tool can also be used to make various changes to the dictionaries, including brute force and Rainbow attacks.

Off. site - http://www.openwall.com/john/

8) Aircrack-ng . - A set of Wi-Fi (wireless networks) is a legendary tool, because it is very effective when used in the right hands. For those entrusted with breaking into a network or auditing wireless networks, Aircrack-NG will be their best friend. If you are an ordinary hacker, you can crack the WEP protocol in a few minutes, and you should be skilled enough to be able to crack WPA / WPA2.

Off. site - http://www.aircrack-ng.org/

Written By UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘More Hacking Tools choosed by UndercOde:
t.me/UndercOdeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1) OWASP Zed- This hacking and pentesting tool with a simple user interface finds vulnerabilities in web applications. His popularity is also due to the fact that he has great support and good resources. Using the โ€œtroubleshootingโ€ program, you can use automatic scanners, as well as various tools that allow cyber specialists to manually detect security vulnerabilities. When used as a proxy server, it allows the user to control all traffic passing through it, including traffic using HTTPS. It can also be run in daemon mode, which is then controlled through the REST application programming interface. This cross-platform tool is written in Java and is available on all popular operating systems, including Microsoft Windows,

Of.site - https://www.owasp.org/

2) RainbowCrack - a computer program for quickly breaking hashes. It is an implementation of the technique of Philipp Oxlin faster time-memory trade-off. It allows you to create a base of pre-generated LanManager hashes, with which you can almost instantly crack almost any alphanumeric password.

Of.site - http://project-rainbowcrack.com/

3) Cain & Abel - Cain and Abel is a password recovery tool used primarily for Microsoft operating systems. This popular hacking tool allows the user to recover various passwords by listening to the network (capturing some data packets), cracking encrypted passwords using a dictionary, brute (Generating hash values โ€‹โ€‹from words, and then Comparing the encrypted hash code with the created method, this method takes less time than using a dictionary) and attack analysis. Cain, as is often mentioned, can also record VoIP (Voice over IP, used to make calls over the Internet), decode hashed passwords, recover wireless network keys, and much more.

Of.st - http://www.oxid.it/cain.html

4) SuperScan - SuperScan is a powerful TCP port scanner, pinger, recognizer. SuperScan 4 (current version) is a completely rewritten update of the very popular port scanning tool for Windows, SUPERSCAN. With this program you can obtain information about entire ranges of IP addresses by scanning ports, determining host names, and pinging.

5) GFI LANguard Network Security Scanner - GFI LANguard NSS is a vulnerability management solution that scans the network and performs over 15,000 vulnerability assessments. It identifies all possible security threats and provides you with tools to fix and verify network security. GFI LANguard NSS has been recognized as the Leader in Commercial Security for Nmap Users for 2 consecutive years, and has been sold over 200,000 times!

6) Retina Network Scanner Security - Retina, recognized as the industry standard for vulnerability assessment, identifies known security vulnerabilities and helps prioritize threats for rehabilitation. With fast and accurate scans, users can protect their networks from even the most recent threats.

7) SamSpade - SamSpade provides a consistent graphical interface and implementation for many useful network query tasks. It was designed to track down spammers, but it can be useful for many other tasks โ€” network research, administration, and security. It includes tools such as ping, NSLOOKUP, WHOIS, tracing, HTTP web browser, DNS zone transfer, SMTP relay check, website search and more.

8) Nessus - nessus is the most popular vulnerability scanner, used by more than 75,000 organizations around the world. Many of the world's largest organizations realize significant cost savings by using Nessus to test mission-critical business devices and enterprise applications.

9) N-Stealth - N-Stealth is a commercial web server security scanner. It is usually updated more often than free web crawlers.
10) IRPAS - Suite Internet Attack Routing Protocol - routing protocols that are used by routers to communicate with each other to deliver data, such as IP. While many enhancements have been made to security since the early days of the Internet, the core of this network still uses unauthenticated services for critical communication.

11) Solarwinds - Solarwinds contains network monitoring, detection and attack tools. Advanced security features, Internet security test .TCP Reset remotely displays all active sessions on the device, can decrypt and recover passwords. The port scanner allows testing open TCP ports through the address and port ranges.

12) CookieDigger - CookieDigger helps identify weak cookie generation and insecure session management using web applications. The tool works by collecting and analyzing cookies. Generates a report on whether important information such as username and password are included in cookie values.

Written By UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Cisco password anti-hacking
twitter.com/UnderCodeTc

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1> Router (config) # login block-for 100 attempts 5 within 50

2> Router (config) # login quiet-mode access-class myacl

3> Router (config) # login delay 10

4> Router (config) # login on-failure log

5> Router (config) # login on-success log

A) The first command must be entered before using any other login commands. For 100 seconds, it blocks any attempts to connect to the device, if within 50 seconds 5 failed registrations were made on the router.

> If there are addresses that should not be blocked (for example, administrative), then they are described by the login quiet-mode access-class command.

B) The login delay command determines the delay time before allowing re-registration. If it is not specified, then automatic delay will be carried out by the login block-for command for 1 second. The last 2 commands include registration of successful and unsuccessful attempts to connect to the router.

C) You can verify the registration subsystem settings by using the show login command. And the show login failures command shows all failed attempts to connect to the device.


Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Code to get the names and ip of the servers associated with the sharepoint
t.me/UndercOdeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

PS Z: \> $ servers = Get-SPServer | where {$ _. role -ne "Invalid"}
PS Z: \> $ servers | select Name, Role, @ {Label = "IP Address"; Expression = {[System.Net.Dns] :: GetHostByName ($ _. Name) .AddressList.IPAddressToString}} | Format-table

๐Ÿฆ‘ Name Role IP Address

SPF1 Application 192.168.30.28
SPF1-2 Application 192.168.30.29



PS Z: \> $ servers = Get-SPServer
PS Z: \> $ servers | select Name, Role, @ {Label = "IP Address"; Expression = {[System.Net.Dns] :: GetHostByName ($ _. Name) .AddressList.IPAddressToString}} | Format-table

๐Ÿฆ‘ Name Role IP Address

DatabaseServer Invalid
db02 Invalid 192.168.30.8
FailOverServer Invalid
mail Invalid 192.168.30.13
secexch Invalid 192.168.30.14
SPF1 Application 192.168.30.28
SPF1-2 Application 192.168.30.29
SMirror Invalid 192.168.30.21

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Installation and simple configuration of yate in centos
Instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1) Downloaded wget http://voip.null.ro/tarballs/yate5/yate-5.4.0-1.src.rpm

2) the rpm -Uvh yate-5.4.0-1.src.rpm

3) Added "/ usr / local / lib" to the end of /etc/ld.so.conf

4) ldconfg

5) regfile.conf
Added by:
[100]
password = 001

[200]
password = 002

6) regexroute.conf
Corrected:
[default]
$ {username} ^ $ = -; error = noauth

7) / usr / local / bin / yate start
For debug, the launch option is: yate -vvvvvvv


Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘A simple introduction to the basics of OOP in python
t.me/UndercOdeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

Code checked on version 3


Class members are called attributes, class functions are called methods, class fields are called properties.

-
Minimum class definition:
class A:
pass

Creating an instance of the class:
o = A ()

-
The method has an argument self:
class A:
def func (self, x):
return "arg self is:" + str (self) + "arg 2 is:" + str (x)


Calling a class method without instantiating: A.func (5,2)
'arg self is: 5arg 2 is: 2'

-
Classes can inherit from other classes:
class A (object):
def func (self):
return "Func in A "

class B (A):
pass

Calling the parent class method
o = B ()
o.func ()

-
Constructor and destructor (methods called when creating and deleting a class)
class A:
def init (self, p1, p2):
self.line = (p1, p2)
def del (self):
print ("The destructor deletes from memory:% s -% s "% self.line)

We create an instance, check the execution of the constructor, delete the instance
a = A ("s1", "s2")
a.line
del a

-
Encapsulation. Hidden attributes are defined using the Attribute name construct, direct access to them will be closed:
class A (object):
def __init (self):
self . i = 1
def set_i (self, x):
self . i = x
def get_i (self):
return self . i

Change hidden attribute
a = A ()
a.get_i ()
a.set_i (5)
a.get_i ()

-
Documentation of class
class A (object):
"" "Documentation" ""
pass

Documentation call
A . doc__
'Documentation'

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘The task is to put pypi on windows::
ยป fb.com/UndercOdeTestingCompany

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1) requirepython 2.7 installed

Take pypi from link
> https://pypi.python.org/pypi/jaraco.windows

2) Unpack in c: pypi for example

3) Next, open cmd :

4) cd c: pypi

C: Python27python.exe setup.py install

5) Open a new cmd :

6) Let's check on the example of django :

pip install django

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Most Usefull Network drivers
t.me/UndercOdeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

> The Docker network subsystem is plug-in using drivers.
Several drivers exist by default and provide basic network functions:

1) bridge : the default network driver.
If you do not specify a driver, this is the type of network you are creating.
Bridged networks are commonly used when your applications run in standalone containers that must communicate.

2) host : for stand-alone containers, removes network isolation between the container and the Docker host.
The host is only available for swarm services in Docker version 17.06 and higher.

3) overlay : overlay networks connect several Docker daemons together and allow Swarm services to communicate with each other.
You can also use overlay networks to facilitate communication between the Swarm service and a stand-alone container.
Or between two standalone containers on different Docker daemons.
This strategy eliminates the need for OS-level routing between these containers.

4) macvlan : Macvlan networks allow you to assign a MAC address to a container, making it a physical device on your network.
The Docker daemon routes traffic to containers by their MAC addresses.
Using the macvlan driver is sometimes the best choice when working with legacy applications.
Applications that expect a direct connection to the physical network rather than routing through the Docker host network stack.

> none : for this container will disable all networks.
Commonly used in conjunction with a custom network driver. None are available for swarm services.

5) Network Plugins : You can install and use third-party network plugins with Docker.
These plugins are available from the Docker Hub or from third-party vendors.

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How to Display actual PostgreSQL queries
t.me/UndercOdeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1) Display the actual queries generated by \ d and other backslash commands.

2) You can use this to examine PSQL internal operations.
This is equivalent to including the ECHO_HIDDEN variable

> \set ECHO_HIDDEN

๐Ÿฆ‘Output :

postgres=# \l
*****
QUERY ******
SELECT d.datname as "Name",
pg_catalog.pg_get_userbyid(d.datdba) as "Owner",
pg_catalog.pg_encoding_to_char(d.encoding) as "Encoding",
d.datcollate as "Collate",
d.datctype as "Ctype",
pg_catalog.array_to_string(d.datacl, E'\n') AS "Access privileges"
FROM pg_catalog.pg_database d
ORDER BY 1;
**********************

List of databases
Name | Owner | Encoding | Collate | Ctype | Access privileges
-----------+----------+----------+-------------+-------------+-----------------------
postgres | postgres | UTF8 | en_US.UTF-8 | en_US.UTF-8 |
template0 | postgres | UTF8 | en_US.UTF-8 | en_US.UTF-8 | =c/postgres +
| | | | | postgres=CTc/postgres
template1 | postgres | UTF8 | en_US.UTF-8 | en_US.UTF-8 | =c/postgres +
| | | | | postgres=CTc/postgres
(3 rows)


Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How to Add a New Hard Drive to FreeBSD
Fb.com/UndercOdeTestingCompany

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1) We have a hard drive defined as:
/ dev / sdb1

2) Delete existing sdb1 disk
layout : gpart destroy -F sdb1

3) Create a new gpt sdb1 disk
layout : gpart create -s gpt / dev / sdb1

4) Example of creating swap and fs with ufs:
gpart add -t freebsd-swap -s 1048576 / dev / sdb1
gpart add -t freebsd-ufs / dev / sdb1

5) Create ufs fs on the second created partition:
newfs -U / dev / sdb1p2

6) Add lines to mount on / etc / fstab when loading the
OS : / dev / sdb1p1 none swap sw 0 0
/ dev / sdb1p2 / mnt ufs rw 2 2

7) We connect on the fly ufs section:
mount -a

8) We connect swap section on the fly:
swapon / dev / sdb1p1

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Speeding internet :

>Cisco CEF and Address Forgery
Enabling CEF Switching (Cisco Express Forwarding (CEF) is a high-speed packet routing / switching technology used in high-performance Layer 3 switches that allows faster and more efficient traffic processing.)
t.me/UndercodeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1) r1 (config) #ip cef

2) Set the reverse route check on the interface:
r1 (config) #interface fastEthernet 1/0
r1 (config-if) #ip verify unicast reverse-path

3) show ip cef - displays data in the FIB

4) Show ip cef detail displays the details of each FIB element

5) Show ip cef summary - displays general statistics of FIB elements

6) Use the show cef interface x / x command to find out if the "IP CEF switching enabled,"
or "IP distributed CEF (dCEF) switching enabled."

Written by Undercode
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Terminal File Manager (Android-Termux) Topic 2020
t.me/UndercOdeTesting

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:


1) Install the utilities you may need based on your regular workflows.
> https://github.com/jarun/nnn#utility-dependencies

2) Configure cd on quit.
>https://github.com/jarun/nnn/wiki/Basic-use-cases#configure-cd-on-quit

3) To open text files in $VISUAL (else $EDITOR, fallback vi) add program option -e in your alias.

4) For additional functionality install plugins.
>https://github.com/jarun/nnn/tree/master/plugins#installing-plugins

5) To copy selected file paths to system clipboard and show notis on cp, mv, rm completion use option -x.

6) For a strictly CLI environment, customize and use plugin nuke.
> https://github.com/jarun/nnn/blob/master/plugins/nuke

๐Ÿฆ‘fOR UBANTO :

1) Download the latest stable release or clone this repository (risky), install deps and compile. On Ubuntu 18.04:

$ sudo apt-get install pkg-config libncursesw5-dev libreadline-dev
$ sudo make strip install

2) To compile without libreadline:

$ sudo apt-get install pkg-config libncursesw5-dev
$ sudo make O_NORL=1 strip install

PREFIX is supported, in case you want to install to a different location.

WRITTEN BY UNDERCODE
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–


๐Ÿฆ‘ How Get Asterisk on Debian ? by undercOde part 1
Procedure for installing Asterisk on Debian Squeeze.
Instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1) Installing the system, Debian Squeeze (x86). Next, we perform all actions from under root.

2) After installation, configure the network by configuring the / etc / network / interfaces file.

3) Install mc: aptitude install โ€“y mc

4) We install the packages necessary for the normal functioning of asterisk: aptitude install โ€“y flex, bison, g ++, libncurses5-dev, doxogen, unixodbc, build-essential, libxml2-dev, libsqlite3-dev, kernel-package, linux-headers-2.6.32- 5-686

5) Download from sourceforge raw pwlib-1.10.0.tar.gz and openh323-1.18.0.tar.gz, from asterisk.org - asterisk-1.8.5.0.tar.gz, from asterisk.ru - libpri-1.4.12. tar.gz, dahdi-linux-complete-2.5.0 + 2.5.0.tar.gz and codecs g723 / g729 - codec_g723-ast18-gcc4-glibc-core2.so and codec_g729-ast18-gcc4-glibc-core2.so and drop it all into the / usr / src / folder (codecs can be downloaded here: http://asterisk.lv/codecs )

6) Create a link: ln โ€“s /usr/src/linux-headers-2.6.32-5-common/include/linux/compiler.h /usr/include/linux/compiler.h

7) Build pwlib:
Unpack pwlib-1.10.0.tar.gz: tar โ€“zxvf pwlib-1.10.0.tar.gz

8) n go to the resulting folder: cd / usr / src / pwlib_v1_10_0
Run ./configure, then make clean opt and finally make install

9) Build openh323:
> Unpack openh323-1.18.0.tar.gz: tar โ€“zxvf openh323-1.18.0.tar.gz

10) We go to the resulting folder: cd / usr / src / openh323_v1_18_0

11) We write: export PWLIBDIR = / usr / src / pwlib_v1_10_0

12) Run ./configure, then make clean opt and finally make install
Build and install libpri:

13) Unpack libpri-1.4.12.tar.gz: tar โ€“zxvf libpri-1.4.12.tar.gz

14) Go to the resulting folder: cd /usr/src/libpri-1.4.12
Perform make and make install

15 )Build and install dahdi-linux:
Unpack dahdi-linux-complete-2.6.0.tar.gz: tar โ€“zxvf dahdi-linux-complete-2.6.0

16) Go to the resulting folder: cd / usr / src / dahdi-linux-complete-2.6.0
Successively execute: make all, make install, make config

17) put asterisk. Unpack asterisk-1.8.5.0.tar.gz: tar โ€“zxvf asterisk-1.8.5.0.tar.gz, then go to /usr/src/asterisk-1.8.5.0/main
To prevent DTMF distortion during a callback from asterisk, open the dsp.c file for editing, find the line โ€œstatic const float dtmf_rowโ€ and โ€œstatic const float dtmf_colโ€ there and bring them to the following form:


Written by Undercode
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–