β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦WMI .NET COM
Let's look at the beginning of the list of WMI classes to understand what you can work with by UndercOde :
T.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) PS C: Windowssystem32> Get-WmiObject -list
> For example, let's choose a class like win32_OperatingSystem:
> PS C: Windowssystem32> Get-WmiObject win32_operatingSystem
2) SystemDirectory: C: Windowssystem32
3) Now let's see what's under the hood of this class (the output is shortened):
4) PS C: Windowssystem32> Get-WmiObject win32_operatingSystem | Get-member
5) TypeName: System.Management.ManagementObject # rootcimv2Win32_OperatingSystem
π¦ Example Name MemberType Definition
β- ββββ- βββ-
Reboot Method System.Management.ManagementBaseObject Reboot ()
SetDateTime Method System.Management.ManagementBaseObject SetDateTime (System.St
Shutdown Method System.Management.ManagementBaseObject Shutdown ()
Win32Shutdown Method System.Management.ManagementBaseObject Win32Shutdown (System.
Win32ShutdownTracker Method System.Management.ManagementBaseObject Win32ShutdownTracker (
BootDevice Property System.String BootDevice {get; set;}
BuildNumber Property System.String BuildNumber {get; set;}
BuildType Property System.String BuildType {get; set;}
Caption Property System.String Caption {get; set;}
CodeSet Property System.String CodeSet {get; set;}
π¦ And output some property:
PS C: Windowssystem32> Get-WmiObject win32_operatingSystem | Format-List -property BuildType
BuildType: Multiprocessor Free
For starters, everything is very clear and simple. Move on:
For example, you can rename the computer in this way ...
(Get-Wmiobject -Class win32_computersystem -ComputerName job) .Rename ("home")
> The Rename () method I watched from the output (Get-Wmiobject -Class win32_computersystem -ComputerName job) | Get-member
> WSH objects can be created by defining the following program identifiers: WScript.Shell , WScript.Network , Scripting.Dictionary, and Scripting.FileSystemObject .
π¦ These objects are created by the following commands:
New-Object -ComObject WScript.Shell New-Object -ComObject WScript.Network
For example, connect a network printer:
PS C: Windowssystem32> $ wshell = New-Object -comobject wscript.network
PS C: Windowssystem32> $ wshell | Get-member
TypeName: System .__ ComObject # {24be5a31-edfe-11d2-b933-00104b365c9f}
Name MemberType Definition
AddPrinterConnection Method void AddPrinterConnection (string, string, Variant, Variant, Variant)
AddWindowsPrinterConnection Method void AddWindowsPrinterConnection (string, string, string)
EnumNetworkDrives Method IWshCollection EnumNetworkDrives ()
EnumPrinterConnections Method IWshCollection EnumPrinterConnections ()
MapNetworkDrive Method void MapNetworkDrive (string, string, Variant, Variant, Variant)
RemoveNetworkDrive Method void RemoveNetworkDrive (string, Variant, Variant)
RemovePrinterConnection Method void RemovePrinterConnection (string, Variant, Variant)
SetDefaultPrinter Method void SetDefaultPrinter (string)
ComputerName Property string ComputerName () {get}
Organization Property string Organization () {get}
Site Property string Site () {get}
PS C: Windowssystem32> $ wshell.AddWindowsPrinterConnection ("\ serverHP LaserJet M5035 MFP PCL 6")
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦WMI .NET COM
Let's look at the beginning of the list of WMI classes to understand what you can work with by UndercOde :
T.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) PS C: Windowssystem32> Get-WmiObject -list
> For example, let's choose a class like win32_OperatingSystem:
> PS C: Windowssystem32> Get-WmiObject win32_operatingSystem
2) SystemDirectory: C: Windowssystem32
3) Now let's see what's under the hood of this class (the output is shortened):
4) PS C: Windowssystem32> Get-WmiObject win32_operatingSystem | Get-member
5) TypeName: System.Management.ManagementObject # rootcimv2Win32_OperatingSystem
π¦ Example Name MemberType Definition
β- ββββ- βββ-
Reboot Method System.Management.ManagementBaseObject Reboot ()
SetDateTime Method System.Management.ManagementBaseObject SetDateTime (System.St
Shutdown Method System.Management.ManagementBaseObject Shutdown ()
Win32Shutdown Method System.Management.ManagementBaseObject Win32Shutdown (System.
Win32ShutdownTracker Method System.Management.ManagementBaseObject Win32ShutdownTracker (
BootDevice Property System.String BootDevice {get; set;}
BuildNumber Property System.String BuildNumber {get; set;}
BuildType Property System.String BuildType {get; set;}
Caption Property System.String Caption {get; set;}
CodeSet Property System.String CodeSet {get; set;}
π¦ And output some property:
PS C: Windowssystem32> Get-WmiObject win32_operatingSystem | Format-List -property BuildType
BuildType: Multiprocessor Free
For starters, everything is very clear and simple. Move on:
For example, you can rename the computer in this way ...
(Get-Wmiobject -Class win32_computersystem -ComputerName job) .Rename ("home")
> The Rename () method I watched from the output (Get-Wmiobject -Class win32_computersystem -ComputerName job) | Get-member
> WSH objects can be created by defining the following program identifiers: WScript.Shell , WScript.Network , Scripting.Dictionary, and Scripting.FileSystemObject .
π¦ These objects are created by the following commands:
New-Object -ComObject WScript.Shell New-Object -ComObject WScript.Network
For example, connect a network printer:
PS C: Windowssystem32> $ wshell = New-Object -comobject wscript.network
PS C: Windowssystem32> $ wshell | Get-member
TypeName: System .__ ComObject # {24be5a31-edfe-11d2-b933-00104b365c9f}
Name MemberType Definition
AddPrinterConnection Method void AddPrinterConnection (string, string, Variant, Variant, Variant)
AddWindowsPrinterConnection Method void AddWindowsPrinterConnection (string, string, string)
EnumNetworkDrives Method IWshCollection EnumNetworkDrives ()
EnumPrinterConnections Method IWshCollection EnumPrinterConnections ()
MapNetworkDrive Method void MapNetworkDrive (string, string, Variant, Variant, Variant)
RemoveNetworkDrive Method void RemoveNetworkDrive (string, Variant, Variant)
RemovePrinterConnection Method void RemovePrinterConnection (string, Variant, Variant)
SetDefaultPrinter Method void SetDefaultPrinter (string)
ComputerName Property string ComputerName () {get}
Organization Property string Organization () {get}
Site Property string Site () {get}
PS C: Windowssystem32> $ wshell.AddWindowsPrinterConnection ("\ serverHP LaserJet M5035 MFP PCL 6")
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How Use AJAX and PHP to create a simple file loader with the ability to add multiple files at once by UndercOde:
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) What you need: AJAX connected library .
2) The code is simple in one file:
<?php
if($_FILES){
foreach ($_FILES as $key => $value) {
move_uploaded_file( $value['tmp_name'], "./upload/".mb_convert_encoding( $value['name'], "Windows-1251", "utf-8" ) );
echo "<br /><b>ΠΠ°Π³ΡΡΠΆΠ΅Π½: ".$value['name']."</b><br />";
}
}else{
echo "
<html>
<head>
<title>Rambo</title>
<meta charset='utf-8' />
<script src='/rambo/jquery.js' type='text/javascript'></script>
<script>
$(document).ready(function(){
$('#file').bind('change', function(){
var data = new FormData();
jQuery.each($('#file')[0].files, function(i, file) { data.append('file-'+i, file); });
$.ajax({
url: 'index.php',
data: data,
cache: false,
contentType: false,
processData: false,
type: 'POST',
success: function(data){
$('#info').html(data);
}
});
})
});
</script>
</head>
<body>
<h2>ΠΠΎΠ±Π°Π²ΠΈΡΡ ΡΠ°ΠΉΠ»Ρ</h2>
<form action='' enctype='multipart/form-data' method='POST'>
<input id='file' type='file' multiple='multiple' name='file[]' />
<div id='info'></div>
</form>
</body>
</html>
";
}
?>
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How Use AJAX and PHP to create a simple file loader with the ability to add multiple files at once by UndercOde:
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) What you need: AJAX connected library .
2) The code is simple in one file:
<?php
if($_FILES){
foreach ($_FILES as $key => $value) {
move_uploaded_file( $value['tmp_name'], "./upload/".mb_convert_encoding( $value['name'], "Windows-1251", "utf-8" ) );
echo "<br /><b>ΠΠ°Π³ΡΡΠΆΠ΅Π½: ".$value['name']."</b><br />";
}
}else{
echo "
<html>
<head>
<title>Rambo</title>
<meta charset='utf-8' />
<script src='/rambo/jquery.js' type='text/javascript'></script>
<script>
$(document).ready(function(){
$('#file').bind('change', function(){
var data = new FormData();
jQuery.each($('#file')[0].files, function(i, file) { data.append('file-'+i, file); });
$.ajax({
url: 'index.php',
data: data,
cache: false,
contentType: false,
processData: false,
type: 'POST',
success: function(data){
$('#info').html(data);
}
});
})
});
</script>
</head>
<body>
<h2>ΠΠΎΠ±Π°Π²ΠΈΡΡ ΡΠ°ΠΉΠ»Ρ</h2>
<form action='' enctype='multipart/form-data' method='POST'>
<input id='file' type='file' multiple='multiple' name='file[]' />
<div id='info'></div>
</form>
</body>
</html>
";
}
?>
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How Migrating a virtual machine from VMWare ESX to Hyper-V
The task is as follows: migrate a virtual machine from VMWare ESX to Hyper-V :
fb.com/UndercodeTestingCompany
π¦πβπππΈπππππΈπππβ & βπβ:
1) Used old versions of VMWare and Hyper-V for stabilty issue
For this task, we need a free utility V @ VConverter
> https://www.starwindsoftware.com/starwind-v2v-converter
And the actions are as follows:
1) For example, download files of a virtual machine disk with VMWare in vmdk format onto a hard disk
2) using V @ VConverter, we transfer the file to vhd format
3) We put the file for example on a disk with Hyper-V
4) We create a new Hyper-V virtual machine , but on the "virtual disk" tab we do not create a new one, but connect the necessary one.
Everything is ready, you can run!
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How Migrating a virtual machine from VMWare ESX to Hyper-V
The task is as follows: migrate a virtual machine from VMWare ESX to Hyper-V :
fb.com/UndercodeTestingCompany
π¦πβπππΈπππππΈπππβ & βπβ:
1) Used old versions of VMWare and Hyper-V for stabilty issue
For this task, we need a free utility V @ VConverter
> https://www.starwindsoftware.com/starwind-v2v-converter
And the actions are as follows:
1) For example, download files of a virtual machine disk with VMWare in vmdk format onto a hard disk
2) using V @ VConverter, we transfer the file to vhd format
3) We put the file for example on a disk with Hyper-V
4) We create a new Hyper-V virtual machine , but on the "virtual disk" tab we do not create a new one, but connect the necessary one.
Everything is ready, you can run!
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
UndercOde Testing Company
UndercOde Testing Company. 94 likes Β· 6 talking about this. Local service
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦IIS: web.config substitute page for error PART 1
>t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) It is very simple to substitute any page for the place of the error.
> For example, we need IIS to display a 404.htm page instead of a standard 404 error
2) We go to the site folder, for example: C: \ inetpub \ wwwroot \ your_site
> Throw in there 404.htm
3) In the Web.config file we find the <system.web> section , and add a piece of the type to it:
<system.web>
<httpRuntime maxRequestLength="1048576" executionTimeout="3600" />
<compilation debug="true" targetFramework="4.6.1" />
<customErrors mode="On">
<error statusCode="404" redirect="~/404.htm"/>
</customErrors>
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦IIS: web.config substitute page for error PART 1
>t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) It is very simple to substitute any page for the place of the error.
> For example, we need IIS to display a 404.htm page instead of a standard 404 error
2) We go to the site folder, for example: C: \ inetpub \ wwwroot \ your_site
> Throw in there 404.htm
3) In the Web.config file we find the <system.web> section , and add a piece of the type to it:
<system.web>
<httpRuntime maxRequestLength="1048576" executionTimeout="3600" />
<compilation debug="true" targetFramework="4.6.1" />
<customErrors mode="On">
<error statusCode="404" redirect="~/404.htm"/>
</customErrors>
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BASH Tutorial Full by UndercOde PART 1 :
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
Scripts in the bash begin with the instructions of the interpreter:
#! / usr / local / bin / bash
To find out where bash is located , use the command:
which bash
You can make the script executable by adding rights:
chmod + x test.sh
Comments begin with the symbol - #
An example of writing a simple script:
cd / home / user
vi test.sh
#! / usr / local / bin / bash
# This is first script
echo "This is echo line"
chmod + x test.sh
Launch Options:
./test.sh
This is echo line
bash ./test.sh
This is echo line
Debug start option:
bash -x ./test.sh
+ echo ' This is echo line '
Use to debug option -x
In large and unfamiliar scripts, it is priceless
Add the simplest function:
#! / usr / local / bin / bash
# This is first script
echo "This is echo line"
π¦In this script, we will make a couple of functions:
cat test.sh
#! / usr / local / bin / bash
# Does not accept arguments
function echo_ text ( )
{
echo "This is echo line"
}
# Accepts arguments, displays them
function echo_text_ args ( )
{
echo "This is echo linei args : $ 1 $ 2"
}
# Call functions
echo_text
echo_text_args "1_arg" "2_arg"
echo_text_args $ 1 $ 2
π¦ Calling a script with and without arguments:
./test.sh
This is echo line
This is echo linei args : 1_arg 2_arg
This is echo linei args :
./test.sh 1_global_arg 2_global_arg
This is echo line
This is echo linei args : 1_arg 2_arg
This is echo linei args : 1_global_arg 2_global_arg
As you can see, the argument names in the script are the same, the result is different
Globally and locally in a function, these are different variables.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BASH Tutorial Full by UndercOde PART 1 :
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
Scripts in the bash begin with the instructions of the interpreter:
#! / usr / local / bin / bash
To find out where bash is located , use the command:
which bash
You can make the script executable by adding rights:
chmod + x test.sh
Comments begin with the symbol - #
An example of writing a simple script:
cd / home / user
vi test.sh
#! / usr / local / bin / bash
# This is first script
echo "This is echo line"
chmod + x test.sh
Launch Options:
./test.sh
This is echo line
bash ./test.sh
This is echo line
Debug start option:
bash -x ./test.sh
+ echo ' This is echo line '
Use to debug option -x
In large and unfamiliar scripts, it is priceless
Add the simplest function:
#! / usr / local / bin / bash
# This is first script
echo "This is echo line"
π¦In this script, we will make a couple of functions:
cat test.sh
#! / usr / local / bin / bash
# Does not accept arguments
function echo_ text ( )
{
echo "This is echo line"
}
# Accepts arguments, displays them
function echo_text_ args ( )
{
echo "This is echo linei args : $ 1 $ 2"
}
# Call functions
echo_text
echo_text_args "1_arg" "2_arg"
echo_text_args $ 1 $ 2
π¦ Calling a script with and without arguments:
./test.sh
This is echo line
This is echo linei args : 1_arg 2_arg
This is echo linei args :
./test.sh 1_global_arg 2_global_arg
This is echo line
This is echo linei args : 1_arg 2_arg
This is echo linei args : 1_global_arg 2_global_arg
As you can see, the argument names in the script are the same, the result is different
Globally and locally in a function, these are different variables.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦A Great Hacker Build His Own Custom Apps So :
> To Build Your Own Termux You need those Official Packages :
t.me/UndercOdetesting
π¦ ππΌππ πππΈβπ :
1) This project contains scripts and patches to build packages for the Termux Android application.
2) The pakages available here are only from main set. We have some additional repositories:
a) https://github.com/termux/game-packages
b) Game packages, e.g. angband or moon-buggy.
https://github.com/termux/science-packages
c) Science-related packages like gap and gnucap.
https://github.com/termux/termux-root-packages
d) Packages which can be used only on rooted devices. Some stuff available here requires custom kernel (like aircrack-ng or lxc).
https://github.com/termux/unstable-packages
e) Staging repository. Packages that are not stable are only available here.Most likely, new packages will also be placed here.
https://github.com/termux/x11-packages
f) Packages that require X11 Windows System.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦A Great Hacker Build His Own Custom Apps So :
> To Build Your Own Termux You need those Official Packages :
t.me/UndercOdetesting
π¦ ππΌππ πππΈβπ :
1) This project contains scripts and patches to build packages for the Termux Android application.
2) The pakages available here are only from main set. We have some additional repositories:
a) https://github.com/termux/game-packages
b) Game packages, e.g. angband or moon-buggy.
https://github.com/termux/science-packages
c) Science-related packages like gap and gnucap.
https://github.com/termux/termux-root-packages
d) Packages which can be used only on rooted devices. Some stuff available here requires custom kernel (like aircrack-ng or lxc).
https://github.com/termux/unstable-packages
e) Staging repository. Packages that are not stable are only available here.Most likely, new packages will also be placed here.
https://github.com/termux/x11-packages
f) Packages that require X11 Windows System.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦IIS: web.config substitute page for error (part 2)
Continuing the loop with IIS, the first part with customErrors
t.me/UndercodeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
> The task is changing and becoming more complicated.
> It is necessary to make sure that everyone displays instead of errors stub pages, and developers can see the error logs in xml
> For IIS I chose the Failed the Request Tracing The Rules , in the components of WIndows Server dostavyalem for IIS , if not installed initially with the role of You:
Web Server - Health and diagnostic - Tracing
Now, going to the IIS snap-in - The right site , you will see the Failed Request Tracing Rules
In the Failed Request Tracing Rules in the "Actions" section on the right, select "Edit Site Tracing" and enable tracing
In the Failed Request Tracing Rules in the "Actions" section on the right, select "Add."
1) All content (*)
2) Status codes - for example 401-999
3) For example, we are interested in everything
4) Finish
5) Now in "C: \ inetpub \ logs \ FailedReqLogFiles \" you will see folders with logs
6) Do not forget that I also added stub pages, now in the config you can see it - path = "/ CustomErrors / error.aspx"
In Web.config, the piece looked like this:
<system.webServer>
...
<httpErrors errorMode="Custom" existingResponse="Replace" >
<clear/>
<error statusCode="401" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="403" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="404" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="405" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="406" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="412" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="501" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="502" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
</httpErrors>
<tracing>
<traceFailedRequests>
<add path="*">
<traceAreas>
<add provider="ASP" verbosity="Verbose" />
<add provider="ASPNET" areas="Infrastructure,Module,Page,AppServices" verbosity="Verbose" />
<add provider="ISAPI Extension" verbosity="Verbose" />
<add provider="WWW Server" areas="Authentication,Security,Filter,StaticFile,CGI,Compression,Cache,RequestNotifications,Module,FastCGI" verbosity="Verbose" />
</traceAreas>
<failureDefinitions statusCodes="401-999" />
</add>
</traceFailedRequests>
</tracing>
</system.webServer>
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦IIS: web.config substitute page for error (part 2)
Continuing the loop with IIS, the first part with customErrors
t.me/UndercodeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
> The task is changing and becoming more complicated.
> It is necessary to make sure that everyone displays instead of errors stub pages, and developers can see the error logs in xml
> For IIS I chose the Failed the Request Tracing The Rules , in the components of WIndows Server dostavyalem for IIS , if not installed initially with the role of You:
Web Server - Health and diagnostic - Tracing
Now, going to the IIS snap-in - The right site , you will see the Failed Request Tracing Rules
In the Failed Request Tracing Rules in the "Actions" section on the right, select "Edit Site Tracing" and enable tracing
In the Failed Request Tracing Rules in the "Actions" section on the right, select "Add."
1) All content (*)
2) Status codes - for example 401-999
3) For example, we are interested in everything
4) Finish
5) Now in "C: \ inetpub \ logs \ FailedReqLogFiles \" you will see folders with logs
6) Do not forget that I also added stub pages, now in the config you can see it - path = "/ CustomErrors / error.aspx"
In Web.config, the piece looked like this:
<system.webServer>
...
<httpErrors errorMode="Custom" existingResponse="Replace" >
<clear/>
<error statusCode="401" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="403" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="404" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="405" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="406" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="412" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="501" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="502" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
</httpErrors>
<tracing>
<traceFailedRequests>
<add path="*">
<traceAreas>
<add provider="ASP" verbosity="Verbose" />
<add provider="ASPNET" areas="Infrastructure,Module,Page,AppServices" verbosity="Verbose" />
<add provider="ISAPI Extension" verbosity="Verbose" />
<add provider="WWW Server" areas="Authentication,Security,Filter,StaticFile,CGI,Compression,Cache,RequestNotifications,Module,FastCGI" verbosity="Verbose" />
</traceAreas>
<failureDefinitions statusCodes="401-999" />
</add>
</traceFailedRequests>
</tracing>
</system.webServer>
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How Add a New Hard Drive to FreeBSD
t.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
> Adding a New Hard Drive to FreeBSD
1) We have a hard drive defined as:
/ dev / sdb1
2) Delete existing sdb1 disk
layout : gpart destroy -F sdb1
3) Create a new gpt sdb1 disk
layout : gpart create -s gpt / dev / sdb1
4) Example of creating swap and fs with ufs:
gpart add -t freebsd-swap -s 1048576 / dev / sdb1
gpart add -t freebsd-ufs / dev / sdb1
5) Create ufs fs on the second created partition:
newfs -U / dev / sdb1p2
6) Add lines to mount on / etc / fstab when loading the
OS : / dev / sdb1p1 none swap sw 0 0
/ dev / sdb1p2 / mnt ufs rw 2 2
7) We connect on the fly ufs section:
mount -a
8) We connect swap section on the fly:
swapon / dev / sdb1p1
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How Add a New Hard Drive to FreeBSD
t.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
> Adding a New Hard Drive to FreeBSD
1) We have a hard drive defined as:
/ dev / sdb1
2) Delete existing sdb1 disk
layout : gpart destroy -F sdb1
3) Create a new gpt sdb1 disk
layout : gpart create -s gpt / dev / sdb1
4) Example of creating swap and fs with ufs:
gpart add -t freebsd-swap -s 1048576 / dev / sdb1
gpart add -t freebsd-ufs / dev / sdb1
5) Create ufs fs on the second created partition:
newfs -U / dev / sdb1p2
6) Add lines to mount on / etc / fstab when loading the
OS : / dev / sdb1p1 none swap sw 0 0
/ dev / sdb1p2 / mnt ufs rw 2 2
7) We connect on the fly ufs section:
mount -a
8) We connect swap section on the fly:
swapon / dev / sdb1p1
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦PowerShell Small Commands by UndercOde :
twitter.com/UNDERCODETC
1) Powershell is located here:
C: \ Windows \ System32 \ WindowsPowerShell \ v1.0
or
% SystemRoot% \ System32 \ WindowsPowerShell \ v1.0
2) There is also a development tool - ISE (Integrated Script Environment)
powershell_ise.exe
3) Running PowerShell scripts:
By default, running Windows PowerShell scripts is not allowed
4) Restricted level - prohibits script execution
Unrestricted level - all scripts can be run
AllSigned level - all scripts must be digitally signed
RemoteSigned level - scripts from the network must be signed
5) In the registry, by the path: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ PowerShell A
parameter is set, for example - "ExecutionPolicy" = "AllSigned"
Or we control the cmdlets - Get-ExecutionPolicy and Set-ExecutionPolicy
Example: Set-ExecutionPolicy RemoteSigned
6) Acquaintance
We carry out custom projects in Python
We carry out projects in Python to order. The team of specialists.
python.dm consulting.rf
7) Yandex.Direct
The basic construction of a verb-noun language.
π¦Simple examples:
1> Get-Help - display help.
2> Get-Process - list the processes.
3> Get-Command - print commands.
π¦Parameters are passed through a hyphen β-β.
The output of the commands with the verb " Get":
Get-Command βVerb Get
Command output with the noun β Eventβ:
Get-Command βNoun event
π¦ Implicit parameter passing to Get- help command ( command help):
Get-Help Get-Event
Get-Help Get-Event βDetailed
Get-Help Get-Event -Full
Get-Help Get-Event -Examples
List of modules in Powershell:
Get-Module βListAvailable
Print all commands from the NetTCPIP module :
> Get-Command βModule NetTCPIP
Update help (you need an Internet connection and administrator rights):
Update-help
π¦ Environment variables :
Get-Childitem env:
Get-Childitem env:
dir env: | sort name
π¦ Output variable name and values
Get-Item env: windir
Get-Childitem env: UserName
π¦ Output of the value of the variable
> write-host $ env: windir
write-host $ env: UserName
write-host ([System.Environment] :: CurrentDirectory)
write-host ([System.Environment] :: UserName)
#Changing variables (the Set-Item, Remove-Item, and Copy-Item cmdlets are available)
$ env: customvar = "Var1"
$ env: customvar = $ env: customvar + "Var2"
Set-Item -path env: customvar -value ($ env: customvar + 'Var3')
EN J O Y BY U N D E R C O D E
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦PowerShell Small Commands by UndercOde :
twitter.com/UNDERCODETC
1) Powershell is located here:
C: \ Windows \ System32 \ WindowsPowerShell \ v1.0
or
% SystemRoot% \ System32 \ WindowsPowerShell \ v1.0
2) There is also a development tool - ISE (Integrated Script Environment)
powershell_ise.exe
3) Running PowerShell scripts:
By default, running Windows PowerShell scripts is not allowed
4) Restricted level - prohibits script execution
Unrestricted level - all scripts can be run
AllSigned level - all scripts must be digitally signed
RemoteSigned level - scripts from the network must be signed
5) In the registry, by the path: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ PowerShell A
parameter is set, for example - "ExecutionPolicy" = "AllSigned"
Or we control the cmdlets - Get-ExecutionPolicy and Set-ExecutionPolicy
Example: Set-ExecutionPolicy RemoteSigned
6) Acquaintance
We carry out custom projects in Python
We carry out projects in Python to order. The team of specialists.
python.dm consulting.rf
7) Yandex.Direct
The basic construction of a verb-noun language.
π¦Simple examples:
1> Get-Help - display help.
2> Get-Process - list the processes.
3> Get-Command - print commands.
π¦Parameters are passed through a hyphen β-β.
The output of the commands with the verb " Get":
Get-Command βVerb Get
Command output with the noun β Eventβ:
Get-Command βNoun event
π¦ Implicit parameter passing to Get- help command ( command help):
Get-Help Get-Event
Get-Help Get-Event βDetailed
Get-Help Get-Event -Full
Get-Help Get-Event -Examples
List of modules in Powershell:
Get-Module βListAvailable
Print all commands from the NetTCPIP module :
> Get-Command βModule NetTCPIP
Update help (you need an Internet connection and administrator rights):
Update-help
π¦ Environment variables :
Get-Childitem env:
Get-Childitem env:
dir env: | sort name
π¦ Output variable name and values
Get-Item env: windir
Get-Childitem env: UserName
π¦ Output of the value of the variable
> write-host $ env: windir
write-host $ env: UserName
write-host ([System.Environment] :: CurrentDirectory)
write-host ([System.Environment] :: UserName)
#Changing variables (the Set-Item, Remove-Item, and Copy-Item cmdlets are available)
$ env: customvar = "Var1"
$ env: customvar = $ env: customvar + "Var2"
Set-Item -path env: customvar -value ($ env: customvar + 'Var3')
EN J O Y BY U N D E R C O D E
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Creating Accessory Lists for Cisco Routers :
> t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) Configure a simple sheet (identification up to 100):
Create sheet 10 and deny any connections with the address 192.168.0.2 in it
R1 (config) # access-list 10 deny 192.168.0.2
2) We connect the sheet with the input interface:
R1 (config) #interface fastEthernet 1/0
R1 (config-if) #ip access-group 10 in
R1 (config-if) #exit
3) Delete a sheet as follows (you cannot change a simple sheet):
Once you enter the interface, enter
R1 (config-if) #no ip access-group in
4) Configure a complex sheet (identification greater than 100):
Create
R2 (config) #ip access-list extended 110
5) We go to the sheet and configure it (disable icmp between hosts):
R2 (config) #ip access-list extended 110
R2 (config-ext-nacl) #deny icmp host 192.168.0.1 host 192.168.0.2
R2 (config-ext-nacl) #exit
6) We will connect with the interface
R2 (config) #interface fastEthernet 1/0
R2 (config-if) #ip access-group 110 in
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Creating Accessory Lists for Cisco Routers :
> t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) Configure a simple sheet (identification up to 100):
Create sheet 10 and deny any connections with the address 192.168.0.2 in it
R1 (config) # access-list 10 deny 192.168.0.2
2) We connect the sheet with the input interface:
R1 (config) #interface fastEthernet 1/0
R1 (config-if) #ip access-group 10 in
R1 (config-if) #exit
3) Delete a sheet as follows (you cannot change a simple sheet):
Once you enter the interface, enter
R1 (config-if) #no ip access-group in
4) Configure a complex sheet (identification greater than 100):
Create
R2 (config) #ip access-list extended 110
5) We go to the sheet and configure it (disable icmp between hosts):
R2 (config) #ip access-list extended 110
R2 (config-ext-nacl) #deny icmp host 192.168.0.1 host 192.168.0.2
R2 (config-ext-nacl) #exit
6) We will connect with the interface
R2 (config) #interface fastEthernet 1/0
R2 (config-if) #ip access-group 110 in
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hidden redirect, rewrite and reverse proxy server in nginx to a third-party server :
fb.com/UndercodeTestingCompany
π¦ ππΌππ πππΈβπ :
1) Redirect, rewrites the address in the browser, defines a new (rewritten)
#server {
# listen 3001;
# server_name test-on-mongo;
# return 301 $ scheme: // test-on-mongo: 5001 $ request_uri;
#}
2) Rewrite, rewrites the address in the browser, defines a new (rewritten)
#server {
# listen 3001;
# server_name test-on-mongo;
# rewrite ^ (. *) $ $ scheme: // test-on-mongo: 5001 $ 1 permanent;
# return 403;
#}
3) Rewrite, rewrites the address in the browser, defines a new (rewritten)
#server {
# listen 3001;
# server_name test-on-mongo;
# location / {
# if ($ http_host ~ "^ test-on-mongo: 3001") {
# rewrite ^ / (. *) http: // test-on-mongo: 5001 redirect;
#}
#}
#}
4) A third-party web server is running on port 3001, it was previously on port 5001
5) From the old link 5001, nginx redirects to port 80, and then to 3001
# Made to bite a port in url
server {
listen 80;
listen [::]: 80;
server_name test-on-mongo;
location / {
proxy_pass http: // test-on-mongo: 3001;
}
}
server {
listen 5001;
listen [::]: 5001;
server_name test-on-mongo;
return 301 $ scheme: // test-on-mongo $ request_uri;
}
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hidden redirect, rewrite and reverse proxy server in nginx to a third-party server :
fb.com/UndercodeTestingCompany
π¦ ππΌππ πππΈβπ :
1) Redirect, rewrites the address in the browser, defines a new (rewritten)
#server {
# listen 3001;
# server_name test-on-mongo;
# return 301 $ scheme: // test-on-mongo: 5001 $ request_uri;
#}
2) Rewrite, rewrites the address in the browser, defines a new (rewritten)
#server {
# listen 3001;
# server_name test-on-mongo;
# rewrite ^ (. *) $ $ scheme: // test-on-mongo: 5001 $ 1 permanent;
# return 403;
#}
3) Rewrite, rewrites the address in the browser, defines a new (rewritten)
#server {
# listen 3001;
# server_name test-on-mongo;
# location / {
# if ($ http_host ~ "^ test-on-mongo: 3001") {
# rewrite ^ / (. *) http: // test-on-mongo: 5001 redirect;
#}
#}
#}
4) A third-party web server is running on port 3001, it was previously on port 5001
5) From the old link 5001, nginx redirects to port 80, and then to 3001
# Made to bite a port in url
server {
listen 80;
listen [::]: 80;
server_name test-on-mongo;
location / {
proxy_pass http: // test-on-mongo: 3001;
}
}
server {
listen 5001;
listen [::]: 5001;
server_name test-on-mongo;
return 301 $ scheme: // test-on-mongo $ request_uri;
}
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
UndercOde Testing Company
UndercOde Testing Company. 94 likes Β· 6 talking about this. Local service
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Official Microsoft GitHub Repository containing code samples for SQL Server for any Linux Server/ Windows or Win server
t.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone -n https://github.com/Microsoft/sql-server-samples
2) cd sql-server-samples
3) git config core.sparsecheckout true
4 )echo samples/features/*| out-file -append -encoding ascii .git/info/sparse-checkout
5) echo samples/demos/*| out-file -append -encoding ascii .git/info/sparse-checkout
6) git checkout
π¦Extra Note Recommended by UndercOde:
> Sparse checkouts enable you to work on a subset of the repository. Itβs worth the effort to set up sparse checkouts on large repositories, everything is much faster!
> I struggled with setting it up on windows getting a lot of βerror: Sparse checkout leaves no entry on the working directoryβ. After a bit of research, I found the following steps were minimal and had consistently good results for me β YMMV.
> The most important point is this β DO NOT USE POWERSHELL/CMD FOR THESE STEPS β use a git bash prompt. This is because otherwise the echo command produces a UNICODE file with a BOM marker. The file MUST be an ANSI formatted file with UNIX style line endings for git to parse it correctly. This is the most likely cause of βerror: Sparse checkout leaves no entry on the working directoryβ errors.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Official Microsoft GitHub Repository containing code samples for SQL Server for any Linux Server/ Windows or Win server
t.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone -n https://github.com/Microsoft/sql-server-samples
2) cd sql-server-samples
3) git config core.sparsecheckout true
4 )echo samples/features/*| out-file -append -encoding ascii .git/info/sparse-checkout
5) echo samples/demos/*| out-file -append -encoding ascii .git/info/sparse-checkout
6) git checkout
π¦Extra Note Recommended by UndercOde:
> Sparse checkouts enable you to work on a subset of the repository. Itβs worth the effort to set up sparse checkouts on large repositories, everything is much faster!
> I struggled with setting it up on windows getting a lot of βerror: Sparse checkout leaves no entry on the working directoryβ. After a bit of research, I found the following steps were minimal and had consistently good results for me β YMMV.
> The most important point is this β DO NOT USE POWERSHELL/CMD FOR THESE STEPS β use a git bash prompt. This is because otherwise the echo command produces a UNICODE file with a BOM marker. The file MUST be an ANSI formatted file with UNIX style line endings for git to parse it correctly. This is the most likely cause of βerror: Sparse checkout leaves no entry on the working directoryβ errors.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How Crack Pdf PassWord Guide Tested :
t.me/iOsDeveloppers
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/magnumripper/JohnTheRipper.git
2) cd ./JohnTheRipper/src
3) sudo apt-get update
4) sudo apt-get install libssl-dev
5) ./configure && make
6) cd ..
7) cd ./run
8) ls
π¦ Generate PDF hash file :
type in term:
> pdf2john.pl /root/Desktop/pdf_exampleprotected.pdf > /root/Desktop/pdf.hash
π¦Brute Force with John:
Now :
>john exampleprotected_pdf.hash
> john --wordlist=password.lst exampleprotected_pdf.hash
π¦Tested by UndercOde on:
> Kali
> Parrot
> debian
> Ubanto
E N J O Y
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How Crack Pdf PassWord Guide Tested :
t.me/iOsDeveloppers
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/magnumripper/JohnTheRipper.git
2) cd ./JohnTheRipper/src
3) sudo apt-get update
4) sudo apt-get install libssl-dev
5) ./configure && make
6) cd ..
7) cd ./run
8) ls
π¦ Generate PDF hash file :
type in term:
> pdf2john.pl /root/Desktop/pdf_exampleprotected.pdf > /root/Desktop/pdf.hash
π¦Brute Force with John:
Now :
>john exampleprotected_pdf.hash
> john --wordlist=password.lst exampleprotected_pdf.hash
π¦Tested by UndercOde on:
> Kali
> Parrot
> debian
> Ubanto
E N J O Y
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
ππΎππππ±π ΄
Youtube.com/c/Undercode
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTesting
@iUNDERCODE
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestinG
@iUNDERCODE
πππ Έπππ ΄π
@iUNDERCODE
@UNDERCODENEWS
ππΎππππ±π ΄
Youtube.com/c/Undercode
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTesting
@iUNDERCODE
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestinG
@iUNDERCODE
πππ Έπππ ΄π
@iUNDERCODE
@UNDERCODENEWS
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Powershell: send SMTP email with authorization :
t.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
Now Powershell code , I wanted to check if the services are running, if someone of interest is stopped, then an SMTP notification is sent
π¦ Sender and Recipient Info
$MailFrom = "sender@senderdomain.com"
$MailTo = "recipient@recipientdomain.com"
# Sender Credentials
$Username = "SomeUsername@SomeDomain.com"
$Password = "SomePassword"
# Server Info
$SmtpServer = "smtp.domain.com"
$SmtpPort = "2525"
# Message stuff
$MessageSubject = "Live your best life now"
$Message = New-Object System.Net.Mail.MailMessage $MailFrom,$MailTo
$Message.IsBodyHTML = $true
$Message.Subject = $MessageSubject
$Message.Body = @'
<!DOCTYPE html>
<html>
<head>
</head>
<body>
This is a test message to trigger an ETR.
</body>
</html>
'@
π¦Construct the SMTP client object, credentials, and send
$Smtp = New-Object Net.Mail.SmtpClient($SmtpServer,$SmtpPort)
$Smtp.EnableSsl = $true
$Smtp.Credentials = New-Object System.Net.NetworkCredential($Username,$Password)
$Smtp.Send($Message)
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Powershell: send SMTP email with authorization :
t.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
Now Powershell code , I wanted to check if the services are running, if someone of interest is stopped, then an SMTP notification is sent
π¦ Sender and Recipient Info
$MailFrom = "sender@senderdomain.com"
$MailTo = "recipient@recipientdomain.com"
# Sender Credentials
$Username = "SomeUsername@SomeDomain.com"
$Password = "SomePassword"
# Server Info
$SmtpServer = "smtp.domain.com"
$SmtpPort = "2525"
# Message stuff
$MessageSubject = "Live your best life now"
$Message = New-Object System.Net.Mail.MailMessage $MailFrom,$MailTo
$Message.IsBodyHTML = $true
$Message.Subject = $MessageSubject
$Message.Body = @'
<!DOCTYPE html>
<html>
<head>
</head>
<body>
This is a test message to trigger an ETR.
</body>
</html>
'@
π¦Construct the SMTP client object, credentials, and send
$Smtp = New-Object Net.Mail.SmtpClient($SmtpServer,$SmtpPort)
$Smtp.EnableSsl = $true
$Smtp.Credentials = New-Object System.Net.NetworkCredential($Username,$Password)
$Smtp.Send($Message)
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦PostgreSQL guide bu utc
The scheme of the PostgreSQL application is as follows:
t.me/UndercOdeTesting
1) The " POSTMASTER " process on the server receives a connection request
2) Upon successful completion of the check, POSTMASTER creates its copy
3) Next, the interaction with the client database is already through a copy
π¦After installation (Configuring a database cluster)
On Windows, the installation package most likely will write everything automatically to start the cluster, depending on the specified directory, but you can configure the cluster using the utilities below initdb and pg_ctl , they will be in the bin directory, for example - D: \ Postgres \ bin
In this case, it is a set of databases that will be managed by a single server instance.
π¦ A single PostgreSQL instance can start and monitor a set of databases that are isolated from each other but served through the same TCP / IP or UNIX socket
You can use the option to create a cluster with:
initdb - creates a new PostgreSQL database cluster
The syntax is initdb [option ...] [βpgdata | -D] directory
π¦ The desired location of the database cluster is indicated by the -D option:
> sudo postgres
> initdb -D / usr / local / pgsql / data
Or so:
$ sudo postgres
$ pg_ctl -D / usr / local / pgsql / data initdb
π¦ After that, you can try to start the server - sudo service postgresql start
Or there are options
Run postmaster in active mode:
$ postmaster - D / usr / local / pgsql / data
Running in the background using pg_ctl:
$ pg_ctl - D / usr / local / pgsql / data - 1 /tmp/postgresql.log start
π¦ Examples of pg_ctl actions :
Server start:
$ pg_ctl start
Server Stop:
$ pg_ctl stop
Server restart:
$ pg_ctl restart
Server Status:
$ pg_ctl status
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦PostgreSQL guide bu utc
The scheme of the PostgreSQL application is as follows:
t.me/UndercOdeTesting
1) The " POSTMASTER " process on the server receives a connection request
2) Upon successful completion of the check, POSTMASTER creates its copy
3) Next, the interaction with the client database is already through a copy
π¦After installation (Configuring a database cluster)
On Windows, the installation package most likely will write everything automatically to start the cluster, depending on the specified directory, but you can configure the cluster using the utilities below initdb and pg_ctl , they will be in the bin directory, for example - D: \ Postgres \ bin
In this case, it is a set of databases that will be managed by a single server instance.
π¦ A single PostgreSQL instance can start and monitor a set of databases that are isolated from each other but served through the same TCP / IP or UNIX socket
You can use the option to create a cluster with:
initdb - creates a new PostgreSQL database cluster
The syntax is initdb [option ...] [βpgdata | -D] directory
π¦ The desired location of the database cluster is indicated by the -D option:
> sudo postgres
> initdb -D / usr / local / pgsql / data
Or so:
$ sudo postgres
$ pg_ctl -D / usr / local / pgsql / data initdb
π¦ After that, you can try to start the server - sudo service postgresql start
Or there are options
Run postmaster in active mode:
$ postmaster - D / usr / local / pgsql / data
Running in the background using pg_ctl:
$ pg_ctl - D / usr / local / pgsql / data - 1 /tmp/postgresql.log start
π¦ Examples of pg_ctl actions :
Server start:
$ pg_ctl start
Server Stop:
$ pg_ctl stop
Server restart:
$ pg_ctl restart
Server Status:
$ pg_ctl status
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Psql utility :
t.me/UndercodeTesting
In the standard delivery with the server with the postgresql-client package for administration, the psql utility is used , I will give several examples of its functionality (examples for Windows and Linux are similar)
1) On Linux - su - postgres, Windows - cmd - psql
psql --help - help
2) Some utility arguments:
psql -l - list the databases
psql -d database - connect to the database with the name " database "
psql -f script .sql - execute the SQL script " script .sql"
psql -d test -H -c "SELECT * FROM students " -o D: \ Postgres \ f .html - output to file
3) Listing configuration files:
psql> SELECT name, setting FROM pg_settings WHERE category = 'File Locations';
4) Listing Active Sessions:
psql> SELECT * FROM pg_stat_activity;
5) Kill Session:
- Learn id session from
6) SELECT datname as database,
pid
7) usename as username,
application_name as application,
client_addr as client_address,
query
8) FROM pg_stat_activity;
- Specify the session id and database
SELECT pg_terminate_backend ( session id )
FROM pg_stat_activity
WHERE datname = 'DB';
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Psql utility :
t.me/UndercodeTesting
In the standard delivery with the server with the postgresql-client package for administration, the psql utility is used , I will give several examples of its functionality (examples for Windows and Linux are similar)
1) On Linux - su - postgres, Windows - cmd - psql
psql --help - help
2) Some utility arguments:
psql -l - list the databases
psql -d database - connect to the database with the name " database "
psql -f script .sql - execute the SQL script " script .sql"
psql -d test -H -c "SELECT * FROM students " -o D: \ Postgres \ f .html - output to file
3) Listing configuration files:
psql> SELECT name, setting FROM pg_settings WHERE category = 'File Locations';
4) Listing Active Sessions:
psql> SELECT * FROM pg_stat_activity;
5) Kill Session:
- Learn id session from
6) SELECT datname as database,
pid
7) usename as username,
application_name as application,
client_addr as client_address,
query
8) FROM pg_stat_activity;
- Specify the session id and database
SELECT pg_terminate_backend ( session id )
FROM pg_stat_activity
WHERE datname = 'DB';
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Some BlackArch Program examples2019-2020
t.me/undercOdeTesting
π¦ ππΌππ πππΈβπ :
1) blackarch-code-audit
Packages for auditing existing vulnerability analysis code.
Examples: flawfinder, pscan
2) blackarch-cracker
Packages used to crack cryptographic functions, such as passwords.
Examples: hashcat, john, crunch
3) blackarch-crypto
Packages that work with cryptography, with the exception of hacking.
Examples: ciphertest, xortool, sbd
4) blackarch-cryptography
Security audit tools for cryptographic algorithms and technologies.
Examples: pyssltest, skul
5) blackarch-database
Packages that at some level include exploit databases.
Examples: metacoretex, blindsql
6) blackarch-debugger
Packages that allow the user to see what a particular program "does" in real time.
Examples: radare2, shellnoob
7) blackarch-decompiler
Packages that try to convert compiled programs to source code.
Examples: flasm, jd-gui
8) blackarch-defensive
Packages that are used to protect against malware and attacks from other users.
Examples: arpon, chkrootkit, sniffjoke
9) blackarch-disassembler
Like blackarch-decompiler and probably a lot of programs will fall into both categories, however, these packages produce assembler code in the output, rather than the raw source code.
Examples: inguma, radare2
10) blackarch-dos
Packets that use DoS attacks (Denial of Service).
Examples: 42zip, nkiller2
11) blackarch-drone
Packages that are used to control physically engineered drones.
Examples: meshdeck, skyjack
12) blackarch-exploitation
Packages that take advantage of exploits in other programs or services.
Examples: armitage, metasploit, zarp
& more...
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Some BlackArch Program examples2019-2020
t.me/undercOdeTesting
π¦ ππΌππ πππΈβπ :
1) blackarch-code-audit
Packages for auditing existing vulnerability analysis code.
Examples: flawfinder, pscan
2) blackarch-cracker
Packages used to crack cryptographic functions, such as passwords.
Examples: hashcat, john, crunch
3) blackarch-crypto
Packages that work with cryptography, with the exception of hacking.
Examples: ciphertest, xortool, sbd
4) blackarch-cryptography
Security audit tools for cryptographic algorithms and technologies.
Examples: pyssltest, skul
5) blackarch-database
Packages that at some level include exploit databases.
Examples: metacoretex, blindsql
6) blackarch-debugger
Packages that allow the user to see what a particular program "does" in real time.
Examples: radare2, shellnoob
7) blackarch-decompiler
Packages that try to convert compiled programs to source code.
Examples: flasm, jd-gui
8) blackarch-defensive
Packages that are used to protect against malware and attacks from other users.
Examples: arpon, chkrootkit, sniffjoke
9) blackarch-disassembler
Like blackarch-decompiler and probably a lot of programs will fall into both categories, however, these packages produce assembler code in the output, rather than the raw source code.
Examples: inguma, radare2
10) blackarch-dos
Packets that use DoS attacks (Denial of Service).
Examples: 42zip, nkiller2
11) blackarch-drone
Packages that are used to control physically engineered drones.
Examples: meshdeck, skyjack
12) blackarch-exploitation
Packages that take advantage of exploits in other programs or services.
Examples: armitage, metasploit, zarp
& more...
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Telegram
UNDERCODE TESTING OFFICIAL
π¦ WELCOME TO UNDERCODE TESTING FOR LEARN HACKING & PROGRAMMING & MORE... @UndercodeTesting @DailyCve @iUndercode
ππΎππππ±π ΄
youtube.com/c/UNDERCODE
π ΅π°π ²π ΄π±πΎπΎπ Ί
Fb.com/UNDERCODETESTING
π Έπ ½πππ°π Άππ°π Ό
INSTAGRAM.com/UNDERCODETESTING
πππ Έπππ ΄π
@UndercodeNews
ππΎππππ±π ΄
youtube.com/c/UNDERCODE
π ΅π°π ²π ΄π±πΎπΎπ Ί
Fb.com/UNDERCODETESTING
π Έπ ½πππ°π Άππ°π Ό
INSTAGRAM.com/UNDERCODETESTING
πππ Έπππ ΄π
@UndercodeNews
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦WIFI HACKING : WPA downgrade test:
The WPA downgrade test is a test mode indicated by the letter g . This mode has only one option -t <bssid> , after which you need to specify the target network.
twitter.com/UndercOdeTC
π¦ ππΌππ πππΈβπ :
> The essence of this attack is that mdk3 deauthenticates Stations and APs by sending encrypted WPA packets. With this test, you can check whether the system administrator will try to set the network settings to WEP or disable encryption. mdk3 will allow clients to work with WEP without encryption, so this attack is carried out in the hope that the system administrator will just think that "WPA is broken." Therefore, this attack is designed for an advanced user who will think of changing the settings of the router and be able to do it. This attack refers to social engineering, to increase the likelihood of a successful outcome, it can be combined with other social engineering techniques.
1) look at the available networks:
> sudo airodump-ng wlan0
2) Suppose we are interested in a network called dlink, it uses WPA2 encryption and its BSSID 00: 1E: 58: C6: AC: FB, we also note that the AP works on channel 6.
3) We need to transfer our wireless card to the same channel that the AP works:
> sudo iw wlan0 set channel 6
4) We launch an attack that disconnects all clients from this network and prevents them from reconnecting until encryption is changed to WEP or removed at all:
> sudo mdk3 wlan0 g -t 00:1E:58:C6:AC:FB
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦WIFI HACKING : WPA downgrade test:
The WPA downgrade test is a test mode indicated by the letter g . This mode has only one option -t <bssid> , after which you need to specify the target network.
twitter.com/UndercOdeTC
π¦ ππΌππ πππΈβπ :
> The essence of this attack is that mdk3 deauthenticates Stations and APs by sending encrypted WPA packets. With this test, you can check whether the system administrator will try to set the network settings to WEP or disable encryption. mdk3 will allow clients to work with WEP without encryption, so this attack is carried out in the hope that the system administrator will just think that "WPA is broken." Therefore, this attack is designed for an advanced user who will think of changing the settings of the router and be able to do it. This attack refers to social engineering, to increase the likelihood of a successful outcome, it can be combined with other social engineering techniques.
1) look at the available networks:
> sudo airodump-ng wlan0
2) Suppose we are interested in a network called dlink, it uses WPA2 encryption and its BSSID 00: 1E: 58: C6: AC: FB, we also note that the AP works on channel 6.
3) We need to transfer our wireless card to the same channel that the AP works:
> sudo iw wlan0 set channel 6
4) We launch an attack that disconnects all clients from this network and prevents them from reconnecting until encryption is changed to WEP or removed at all:
> sudo mdk3 wlan0 g -t 00:1E:58:C6:AC:FB
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β