β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ PHP can also be used as Shell Script Why PHP is so
popular Recently PHP (Personal Hypertext Preprocessor) seems to have become the most widely used web processing language on Linux by Underc0de :
instagram.com/UnderCodeTestingCompany
π¦ ππΌππ πππΈβπ :
1) Unix in the past two years. Its convenience, powerful functions and OpenSource features have gradually eroded it. In the traditional CGI and even the MicroSoft ASP (Active Server Page) market, almost every major website recruits people with PHP as its basic condition.
2) PHP does have this qualification and can be so
popular for several reasons: PHP is OpenSource software, completely free and can be distributed freely, so it has attracted a lot of people to use it, and because of this, it has attracted commercial companies to develop it better Engine and optimization software
3) PHP itself is very simple and easy to understand, with a simple instruction syntax, plus some basic object-oriented processing capabilities, so that novices can learn in the shortest time.
PHP provides quite a lot of functions, including mathematical processing, string processing, network-related functions, support for various databases, image processing functions, and a large number of developers are developing various new functions for PHP, expanding Excellent sex.
4) PHP is very easy to combine with Apache. It is used as an Apache module, and it is quite simple to set up and install. Because Apache has already occupied 60% of the global Web Server market, PHP naturally becomes the best combination of Apache.
> However, the topic this time is not the application of PHP in web design, but the application of PHP in Shell Script. Generally known Shell Script is about tcsh, bash, perl or python. It's all about using PHP as a shell script.
π¦I nstallation of PHP executable files
1) Generally, PHP as a webpage processing language is compiled into Apache modules. Of course, it is not necessary to do this, so it is very easy to compile. As long as you are root, perform the following actions:
Unzip php-3.0.xx. After tar.gz
> cd php
> configure
> make is
2) compiled, there is an executable file in the php directory named php and you can copy it to / usr / local / bin. Note that if the file is too large, you can use the strip command to remove unnecessary information from PHP, so the file will be much smaller.
π¦ The first program
starts writing our first PHP Shell Script program. This example prints "Hello world!":
#! / Usr / local / bin / php -q
<?
Echo "Hello, world!";
?>
Note that PHP was originally used in web applications, so it will definitely send HTML headers, but here we are using PHP as a shell script, "-q"
1) In this example, / usr / local / bin / php is meant to execute PHP under / usr / local / bin / because we just installed it there. The echo command prints "Hello, world!", where the "" character is a newline character.
Note that after saving this program as a file, you must change its chmod to an executable attribute (chmod + x file name) before you can run it.
Advanced use of I
2) Sometimes we need to input some parameters when the program is executed, such as the ls command, followed by the -l parameter. PHP Shell Script also supports this usage. There are two special variables: $ argc keeps track of the number of arguments passed in, and the $ argv [] array argument holds the contents of the argument. For example, I want to design a program that calculates the sum of two numbers:
#! / Usr / local / bin / php -q
<?
$ Sum = 0;
$ sum = $ sum + $ argv [1] + $ argv [2] ;
echo $ sum;
?>
3) Assuming this program is named sum.php3, execute sum.php3 1 2 Press enter and it will print 3.
4) If you want to calculate an unspecified number of parameters, you need to use the special variable $ argc:
#! / Usr / local / bin / php -q
<?
$ Sum = 0;
for ($ t = 1; $ t <= $ argc; $ t ++)
$ sum = $ sum + $ argv [$ t];
echo $ sum;
?>
π¦ PHP can also be used as Shell Script Why PHP is so
popular Recently PHP (Personal Hypertext Preprocessor) seems to have become the most widely used web processing language on Linux by Underc0de :
instagram.com/UnderCodeTestingCompany
π¦ ππΌππ πππΈβπ :
1) Unix in the past two years. Its convenience, powerful functions and OpenSource features have gradually eroded it. In the traditional CGI and even the MicroSoft ASP (Active Server Page) market, almost every major website recruits people with PHP as its basic condition.
2) PHP does have this qualification and can be so
popular for several reasons: PHP is OpenSource software, completely free and can be distributed freely, so it has attracted a lot of people to use it, and because of this, it has attracted commercial companies to develop it better Engine and optimization software
3) PHP itself is very simple and easy to understand, with a simple instruction syntax, plus some basic object-oriented processing capabilities, so that novices can learn in the shortest time.
PHP provides quite a lot of functions, including mathematical processing, string processing, network-related functions, support for various databases, image processing functions, and a large number of developers are developing various new functions for PHP, expanding Excellent sex.
4) PHP is very easy to combine with Apache. It is used as an Apache module, and it is quite simple to set up and install. Because Apache has already occupied 60% of the global Web Server market, PHP naturally becomes the best combination of Apache.
> However, the topic this time is not the application of PHP in web design, but the application of PHP in Shell Script. Generally known Shell Script is about tcsh, bash, perl or python. It's all about using PHP as a shell script.
π¦I nstallation of PHP executable files
1) Generally, PHP as a webpage processing language is compiled into Apache modules. Of course, it is not necessary to do this, so it is very easy to compile. As long as you are root, perform the following actions:
Unzip php-3.0.xx. After tar.gz
> cd php
> configure
> make is
2) compiled, there is an executable file in the php directory named php and you can copy it to / usr / local / bin. Note that if the file is too large, you can use the strip command to remove unnecessary information from PHP, so the file will be much smaller.
π¦ The first program
starts writing our first PHP Shell Script program. This example prints "Hello world!":
#! / Usr / local / bin / php -q
<?
Echo "Hello, world!";
?>
Note that PHP was originally used in web applications, so it will definitely send HTML headers, but here we are using PHP as a shell script, "-q"
1) In this example, / usr / local / bin / php is meant to execute PHP under / usr / local / bin / because we just installed it there. The echo command prints "Hello, world!", where the "" character is a newline character.
Note that after saving this program as a file, you must change its chmod to an executable attribute (chmod + x file name) before you can run it.
Advanced use of I
2) Sometimes we need to input some parameters when the program is executed, such as the ls command, followed by the -l parameter. PHP Shell Script also supports this usage. There are two special variables: $ argc keeps track of the number of arguments passed in, and the $ argv [] array argument holds the contents of the argument. For example, I want to design a program that calculates the sum of two numbers:
#! / Usr / local / bin / php -q
<?
$ Sum = 0;
$ sum = $ sum + $ argv [1] + $ argv [2] ;
echo $ sum;
?>
3) Assuming this program is named sum.php3, execute sum.php3 1 2 Press enter and it will print 3.
4) If you want to calculate an unspecified number of parameters, you need to use the special variable $ argc:
#! / Usr / local / bin / php -q
<?
$ Sum = 0;
for ($ t = 1; $ t <= $ argc; $ t ++)
$ sum = $ sum + $ argv [$ t];
echo $ sum;
?>
Β»π¦ php/shell full by under0de
5) Assuming this program is named bigsum.php3, then running bigsum.php3 1 2 3 4 5 Pressing enter will print 15; executing bigsum.php3 1 2 3 4 5 6 pressing enter will Print out 21.
6) Sometimes we need to input data during the execution of the program, but PHP is originally used for web design, and the data input on the webpage is naturally input by FORM, so the problem comes when PHP is used as the shell script In PHP, a file opening function is provided. Under Linux / Uinx, inputting can be done by opening files. We need to open the device file / dev / stdin (stdin is (Meaning standard input), the program is as follows:
#! / Usr / local / bin / php -q
<?
$ Fp = fopen ("/ dev / stdin", "r");
$ inputstr = fgets ($ fp, 100 );
fclose ($ fp);
echo "\ n ---------------------- \ n";
echo $ inputstr;
?>
7) where fgets ($ fp , 100) refers to the file $ fp (that is, "/ dev / stdin" ) Read out 100 bytes of data, the program will stop at this line and wait for our input. After we enter and press enter, the program will print out the data we just entered.
Advanced Use II
8) Although it can already handle input, such a function is obviously too simple to cope with larger applications. For example, I need a function to remove the HTML from a data stream. At this time, it needs to be complete. The ability to handle output and input redirection, we can first design the program as follows: #! / Usr / local / bin / php -q
<?
$ Fp = fopen ("/ dev / stdin", "r");
while (! Feof ( $ fp)) {
$ c = fgetc ($ fp);
$ inputstr = $ inputstr. $ c;
};
fclose ($ fp);
echo $ inputstr;
?>
9) Assuming this program is named filt.php3, if you directly Run this program, it will wait for your input, it will not print your input data until you press Ctrl + D, we can run it like this :
more filt.php3 | filt.php3
10) This way is to filter The .php3 program is shown with more and switched to the program filt.php3. Filt.php3 will continue to accept information (in fact, the code of the filt.php3 program), and finally print it out.
We can add HTML filtering to it:
#! / Usr / local / bin / php -q
<?
$ Fp = fopen ("/ dev / stdin", "
while (! feof ($ fp)) {
$ c = fgetc ($ fp);
$ inputstr = $ inputstr. $ c;
};
fclose ($ fp);
$ inputstr = ereg_replace ("<([^ <>] * )> "," ", $ inputstr);
echo $ inputstr;
?> We can add HTML filtering to it
#! / Usr / local / bin / php -q
π¦Assuming this program is named filt2.php3, then the filtering function is completed. If you do nβt believe me, please try an HTML file:
more xxx.html filt2.php3
You will see that the HTML TAG file has been deleted.
Written by Underc0de
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
5) Assuming this program is named bigsum.php3, then running bigsum.php3 1 2 3 4 5 Pressing enter will print 15; executing bigsum.php3 1 2 3 4 5 6 pressing enter will Print out 21.
6) Sometimes we need to input data during the execution of the program, but PHP is originally used for web design, and the data input on the webpage is naturally input by FORM, so the problem comes when PHP is used as the shell script In PHP, a file opening function is provided. Under Linux / Uinx, inputting can be done by opening files. We need to open the device file / dev / stdin (stdin is (Meaning standard input), the program is as follows:
#! / Usr / local / bin / php -q
<?
$ Fp = fopen ("/ dev / stdin", "r");
$ inputstr = fgets ($ fp, 100 );
fclose ($ fp);
echo "\ n ---------------------- \ n";
echo $ inputstr;
?>
7) where fgets ($ fp , 100) refers to the file $ fp (that is, "/ dev / stdin" ) Read out 100 bytes of data, the program will stop at this line and wait for our input. After we enter and press enter, the program will print out the data we just entered.
Advanced Use II
8) Although it can already handle input, such a function is obviously too simple to cope with larger applications. For example, I need a function to remove the HTML from a data stream. At this time, it needs to be complete. The ability to handle output and input redirection, we can first design the program as follows: #! / Usr / local / bin / php -q
<?
$ Fp = fopen ("/ dev / stdin", "r");
while (! Feof ( $ fp)) {
$ c = fgetc ($ fp);
$ inputstr = $ inputstr. $ c;
};
fclose ($ fp);
echo $ inputstr;
?>
9) Assuming this program is named filt.php3, if you directly Run this program, it will wait for your input, it will not print your input data until you press Ctrl + D, we can run it like this :
more filt.php3 | filt.php3
10) This way is to filter The .php3 program is shown with more and switched to the program filt.php3. Filt.php3 will continue to accept information (in fact, the code of the filt.php3 program), and finally print it out.
We can add HTML filtering to it:
#! / Usr / local / bin / php -q
<?
$ Fp = fopen ("/ dev / stdin", "
while (! feof ($ fp)) {
$ c = fgetc ($ fp);
$ inputstr = $ inputstr. $ c;
};
fclose ($ fp);
$ inputstr = ereg_replace ("<([^ <>] * )> "," ", $ inputstr);
echo $ inputstr;
?> We can add HTML filtering to it
#! / Usr / local / bin / php -q
π¦Assuming this program is named filt2.php3, then the filtering function is completed. If you do nβt believe me, please try an HTML file:
more xxx.html filt2.php3
You will see that the HTML TAG file has been deleted.
Written by Underc0de
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ACTIVE IP USED IN ATTACKING NOW:-UnderCode-Report-2020
T.me/UndercOdeTesting
IP Country Block Count
160.153.147.141 United States 5
37.9.169.9 Slovakia 4
47.254.89.228 United States 4
160.153.147.143 United States 3
64.71.32.73 United States 3
160.153.154.6 United States 2
198.71.238.7 United States 2
207.246.240.124 United States 2
198.71.238.5 United States 2
207.246.240.119 United States 2
62.210.185.4 France 2
160.153.147.161 United States 2
198.71.238.3 United States 2
198.71.239.46 United States 2
91.208.99.2 United Kingdom 2
198.71.238.9 United States 1
184.168.46.161 United States 1
64.71.32.78 United States 1
160.153.147.142 United States 1
184.168.27.169 United States 1
160.153.153.30 United States 1
160.153.154.26 United States 1
103.228.112.110 India 1
160.153.154.19 United States 1
160.153.147.160 United States 1
185.129.248.187 Spain 1
160.153.154.7 United States 1
@Underc0deoFFICIAL
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ACTIVE IP USED IN ATTACKING NOW:-UnderCode-Report-2020
T.me/UndercOdeTesting
IP Country Block Count
160.153.147.141 United States 5
37.9.169.9 Slovakia 4
47.254.89.228 United States 4
160.153.147.143 United States 3
64.71.32.73 United States 3
160.153.154.6 United States 2
198.71.238.7 United States 2
207.246.240.124 United States 2
198.71.238.5 United States 2
207.246.240.119 United States 2
62.210.185.4 France 2
160.153.147.161 United States 2
198.71.238.3 United States 2
198.71.239.46 United States 2
91.208.99.2 United Kingdom 2
198.71.238.9 United States 1
184.168.46.161 United States 1
64.71.32.78 United States 1
160.153.147.142 United States 1
184.168.27.169 United States 1
160.153.153.30 United States 1
160.153.154.26 United States 1
103.228.112.110 India 1
160.153.154.19 United States 1
160.153.147.160 United States 1
185.129.248.187 Spain 1
160.153.154.7 United States 1
@Underc0deoFFICIAL
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Secure your linux first Network Filtering-Use netfilter-iptables to configure a firewall for Linux Part 1 full
netfilter / iptables is Integrated IP packet filtering system for the latest 2.4.x version of the Linux kernel(old and stable version)
> If the Linux system is connected to the Internet or a LAN, a server, or a proxy server that connects to the LAN and the Internet, the system facilitates better control of IP packet filtering and firewall configuration on the Linux system
> undercode will introduce the netfilter / iptables system, how it works, its advantages, installation and configuration, and how to use it to configure a firewall on a Linux system to filter IP packets.
twitter.com/UndercOdeTC
π¦ ππΌππ πππΈβπ :
1) Among Linux packet filtering solutions such as ipfwadm and ipchains, the netfilter / iptables IP packet filtering system is the latest solution and the first solution integrated into the Linux kernel.
2) Netfilter / iptables system for Linux system
administrators, network administrators, and home users who want to configure a firewall based on their specific needs, save money on firewall solutions, and have full control over IP packet filtering Very ideal.
3) Understand firewall configuration and packet filtering
For Linux systems connected to the network, a firewall is an essential defense mechanism. It only allows legitimate network traffic to enter and leave the system, and prohibits any other network traffic.
4) To determine whether network traffic is legitimate, the firewall relies on a set of rules it contains that are predefined by the network or system administrator. These rules tell the firewall whether certain traffic is legitimate and what to do with network traffic from a source, a destination, or a protocol type. The term "configure firewall" means adding, modifying, and removing these rules. I will discuss these rules in detail later in undercode grps
5) Network traffic consists of IP packets (or packets for short) βsmall pieces of data that are transmitted in a stream from the source system to the destination system. These packets have headers, which are data bits that accompany each packet and contain information about the source, destination, and protocol type of the packet.
6) The firewall checks these headers against a set of rules to determine which packets to accept and which packets to reject. We call this process packet filtering.
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Secure your linux first Network Filtering-Use netfilter-iptables to configure a firewall for Linux Part 1 full
netfilter / iptables is Integrated IP packet filtering system for the latest 2.4.x version of the Linux kernel(old and stable version)
> If the Linux system is connected to the Internet or a LAN, a server, or a proxy server that connects to the LAN and the Internet, the system facilitates better control of IP packet filtering and firewall configuration on the Linux system
> undercode will introduce the netfilter / iptables system, how it works, its advantages, installation and configuration, and how to use it to configure a firewall on a Linux system to filter IP packets.
twitter.com/UndercOdeTC
π¦ ππΌππ πππΈβπ :
1) Among Linux packet filtering solutions such as ipfwadm and ipchains, the netfilter / iptables IP packet filtering system is the latest solution and the first solution integrated into the Linux kernel.
2) Netfilter / iptables system for Linux system
administrators, network administrators, and home users who want to configure a firewall based on their specific needs, save money on firewall solutions, and have full control over IP packet filtering Very ideal.
3) Understand firewall configuration and packet filtering
For Linux systems connected to the network, a firewall is an essential defense mechanism. It only allows legitimate network traffic to enter and leave the system, and prohibits any other network traffic.
4) To determine whether network traffic is legitimate, the firewall relies on a set of rules it contains that are predefined by the network or system administrator. These rules tell the firewall whether certain traffic is legitimate and what to do with network traffic from a source, a destination, or a protocol type. The term "configure firewall" means adding, modifying, and removing these rules. I will discuss these rules in detail later in undercode grps
5) Network traffic consists of IP packets (or packets for short) βsmall pieces of data that are transmitted in a stream from the source system to the destination system. These packets have headers, which are data bits that accompany each packet and contain information about the source, destination, and protocol type of the packet.
6) The firewall checks these headers against a set of rules to determine which packets to accept and which packets to reject. We call this process packet filtering.
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Why configure your own firewall on kernel linux ?
instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
1) For various reasons and reasons, you need to configure your firewall based on your specific needs. Perhaps the most important reason is security.
2) Administrators may want their firewall to be able to prevent unauthorized sources from accessing their Linux systems, such as through Telnet. They may also want to restrict network traffic to and from their systems so that only traffic from trusted sources can enter their systems, and only authorized traffic can go out. Home users may configure the firewall to a lower security level by allowing all outbound packets to pass through.
3) Another reason behind this is that bandwidth can be saved by blocking excess traffic from sources like advertising sites.
4) Thus, the firewall configuration can be customized to meet any specific needs and any security level needs. This is where the netfilter / iptables system comes in.
π¦ How does the netfilter / iptables system work?
1) netfilter / iptables IP packet filtering system is a powerful tool for adding, editing, and removing rules. These rules are rules that the firewall follows and composes when making packet filtering decisions.
2) These rules are stored in dedicated packet filtering tables, which are integrated in the Linux kernel. In the packet filtering table, rules are grouped into what we call a chain. I will discuss these rules in detail and how to build them and group them in chains.
3) Although the netfilter / iptables IP packet filtering system is called a single entity, it actually consists of two components, netfilter and iptables.
4) The netfilter component, also called kernelspace, is part of the kernel and consists of some packet filtering tables. These tables contain the set of rules that the kernel uses to control packet filtering processing.
5) The iptables component is a tool, also known as userspace, that makes it easy to insert, modify, and remove rules from packet filtering tables. Unless you are using Red Hat Linux 7.1 or later, you need to download the tool from netfilter.org and install it.
6) By using user space, you can build your own custom rules that are stored in a packet filter table in kernel space. These rules have destinations that tell the kernel what to do with packets that come from some source, go to some destination, or have certain protocol types. If a packet matches the rule, the destination ACCEPT is used to allow the packet to pass. You can also use target DROP or REJECT to block and kill packets. There are many other goals for other operations that can be performed on packets.
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Why configure your own firewall on kernel linux ?
instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
1) For various reasons and reasons, you need to configure your firewall based on your specific needs. Perhaps the most important reason is security.
2) Administrators may want their firewall to be able to prevent unauthorized sources from accessing their Linux systems, such as through Telnet. They may also want to restrict network traffic to and from their systems so that only traffic from trusted sources can enter their systems, and only authorized traffic can go out. Home users may configure the firewall to a lower security level by allowing all outbound packets to pass through.
3) Another reason behind this is that bandwidth can be saved by blocking excess traffic from sources like advertising sites.
4) Thus, the firewall configuration can be customized to meet any specific needs and any security level needs. This is where the netfilter / iptables system comes in.
π¦ How does the netfilter / iptables system work?
1) netfilter / iptables IP packet filtering system is a powerful tool for adding, editing, and removing rules. These rules are rules that the firewall follows and composes when making packet filtering decisions.
2) These rules are stored in dedicated packet filtering tables, which are integrated in the Linux kernel. In the packet filtering table, rules are grouped into what we call a chain. I will discuss these rules in detail and how to build them and group them in chains.
3) Although the netfilter / iptables IP packet filtering system is called a single entity, it actually consists of two components, netfilter and iptables.
4) The netfilter component, also called kernelspace, is part of the kernel and consists of some packet filtering tables. These tables contain the set of rules that the kernel uses to control packet filtering processing.
5) The iptables component is a tool, also known as userspace, that makes it easy to insert, modify, and remove rules from packet filtering tables. Unless you are using Red Hat Linux 7.1 or later, you need to download the tool from netfilter.org and install it.
6) By using user space, you can build your own custom rules that are stored in a packet filter table in kernel space. These rules have destinations that tell the kernel what to do with packets that come from some source, go to some destination, or have certain protocol types. If a packet matches the rule, the destination ACCEPT is used to allow the packet to pass. You can also use target DROP or REJECT to block and kill packets. There are many other goals for other operations that can be performed on packets.
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How firewall rules acts ?
pinterest.com/UndercOdeOfficial
1) Rules can be grouped in chains based on the type of packets processed by the rules.
2) Rules for processing inbound packets are added to the INPUT chain. Rules for processing outbound packets are added to the OUTPUT chain. Rules for processing packets being forwarded are added to the FORWARD chain.
3) These three chains are the default main chains built into the basic packet filtering table. In addition, there are many other types of chains available, such as PREROUTING and POTROUTING, as well as providing user-defined chains. Each chain can have a policy that defines a "default destination", that is, the default action to be performed, which is performed when a packet does not match any rule in the chain.
4) For A linux :
Once the rules are established and the chain is in place, the real packet filtering can begin. Kernel space takes over from user space. When a packet reaches the firewall, the kernel first checks the header information of the packet, especially the destination of the packet. We call this process routing.
5)If the packet originates from the outside world and goes to the system, and the firewall is open, the kernel passes it to the INPUT chain of the kernel-space packet filtering table. If the packet originates from another source within the system or on the internal network to which the system is connected, and this packet is destined for another external system, the packet is passed to the OUTPUT chain. Similarly, packets originating from and destined for an external system are passed to the FORWARD chain.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How firewall rules acts ?
pinterest.com/UndercOdeOfficial
1) Rules can be grouped in chains based on the type of packets processed by the rules.
2) Rules for processing inbound packets are added to the INPUT chain. Rules for processing outbound packets are added to the OUTPUT chain. Rules for processing packets being forwarded are added to the FORWARD chain.
3) These three chains are the default main chains built into the basic packet filtering table. In addition, there are many other types of chains available, such as PREROUTING and POTROUTING, as well as providing user-defined chains. Each chain can have a policy that defines a "default destination", that is, the default action to be performed, which is performed when a packet does not match any rule in the chain.
4) For A linux :
Once the rules are established and the chain is in place, the real packet filtering can begin. Kernel space takes over from user space. When a packet reaches the firewall, the kernel first checks the header information of the packet, especially the destination of the packet. We call this process routing.
5)If the packet originates from the outside world and goes to the system, and the firewall is open, the kernel passes it to the INPUT chain of the kernel-space packet filtering table. If the packet originates from another source within the system or on the internal network to which the system is connected, and this packet is destined for another external system, the packet is passed to the OUTPUT chain. Similarly, packets originating from and destined for an external system are passed to the FORWARD chain.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦In Linux Firewalls - create your own part 2 Packet filtering process:
T.me/UndercOdeTesting
π¦LETS START:
> Before Installation Before starting to install the iptables userspace tool, you need to make some modifications to the system. First, you need to use the make config command to configure kernel options. During configuration, they must be turned on by setting the CONFIG_NETFILTER and CONFIG_IP_NF_IPTABLES options to Y, as this is required to make netfilter / iptables work. Here are other options you might want to turn on:
1) CONFIG_PACKET: This option is useful if you want applications and programs to use certain network devices directly.
CONFIG_IP_NF_MATCH_STATE: This option is very important and useful if you want to configure a stateful firewall. This type of firewall remembers previous decisions about packet filtering and makes new decisions based on them. I will discuss this further in the advantages section of the netfilter / iptables system.
2) CONFIG_IP_NF_FILTER: This option provides a basic packet filtering framework. If this option is turned on, a basic filter table (with built-in INPUT, FORWARD, and OUTPUT chains) is added to kernel space.
CONFIG_IP_NF_TARGET_REJECT: This option allows you to specify that ICMP error messages should be sent in response to inbound packets that have been dropped by DROP, rather than simply killing them.
Now you are ready to install this userspace tool.
π¦ Install the userspace tools :
> After downloading the source code for the iptables userspace tools (it's similar to iptables-1.2.6a.tar.bz2), you can begin the installation. You need to log in as root to perform the installation. Listing 1 shows an example that indicates the commands required to install the tool, their necessary order, and their descriptions.
1) Listing 1. Example of userspace tool installation
First, unpack the tool package into a directory:
# bzip2 -d iptables-1.2.6a.tar.bz2
# tar -xvf iptables-1.2.6a.tar
2) This will unpack the tool source into a directory named iptables-1.2.6a.
Now change to the iptables-1.2.6a directory:
# cd iptables-1.2.6a
3) The INSTALL file in this directory contains a lot of useful information
on compiling and installing this tool.
4) Now compile the userspace tool using the following command:
# make KERNEL_DIR = / usr / src / linux /
5) Here the KERNEL_DIR = / usr / src / linux / specifies the path to the kernel's
directory. If the directory of kernel happens to be different on some
systems, the appropriate directory path should be substituted for
/ usr / src / linux.
6) Now install the source binaries using the following command:
# make install KERNEL_DIR = / usr / src / linux /
> Now the installation is complete.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦In Linux Firewalls - create your own part 2 Packet filtering process:
T.me/UndercOdeTesting
π¦LETS START:
> Before Installation Before starting to install the iptables userspace tool, you need to make some modifications to the system. First, you need to use the make config command to configure kernel options. During configuration, they must be turned on by setting the CONFIG_NETFILTER and CONFIG_IP_NF_IPTABLES options to Y, as this is required to make netfilter / iptables work. Here are other options you might want to turn on:
1) CONFIG_PACKET: This option is useful if you want applications and programs to use certain network devices directly.
CONFIG_IP_NF_MATCH_STATE: This option is very important and useful if you want to configure a stateful firewall. This type of firewall remembers previous decisions about packet filtering and makes new decisions based on them. I will discuss this further in the advantages section of the netfilter / iptables system.
2) CONFIG_IP_NF_FILTER: This option provides a basic packet filtering framework. If this option is turned on, a basic filter table (with built-in INPUT, FORWARD, and OUTPUT chains) is added to kernel space.
CONFIG_IP_NF_TARGET_REJECT: This option allows you to specify that ICMP error messages should be sent in response to inbound packets that have been dropped by DROP, rather than simply killing them.
Now you are ready to install this userspace tool.
π¦ Install the userspace tools :
> After downloading the source code for the iptables userspace tools (it's similar to iptables-1.2.6a.tar.bz2), you can begin the installation. You need to log in as root to perform the installation. Listing 1 shows an example that indicates the commands required to install the tool, their necessary order, and their descriptions.
1) Listing 1. Example of userspace tool installation
First, unpack the tool package into a directory:
# bzip2 -d iptables-1.2.6a.tar.bz2
# tar -xvf iptables-1.2.6a.tar
2) This will unpack the tool source into a directory named iptables-1.2.6a.
Now change to the iptables-1.2.6a directory:
# cd iptables-1.2.6a
3) The INSTALL file in this directory contains a lot of useful information
on compiling and installing this tool.
4) Now compile the userspace tool using the following command:
# make KERNEL_DIR = / usr / src / linux /
5) Here the KERNEL_DIR = / usr / src / linux / specifies the path to the kernel's
directory. If the directory of kernel happens to be different on some
systems, the appropriate directory path should be substituted for
/ usr / src / linux.
6) Now install the source binaries using the following command:
# make install KERNEL_DIR = / usr / src / linux /
> Now the installation is complete.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Android apps/Games hack- testing by UndercOde :
t.me/UndercOdeTesting
π¦LETS START:
> How to get more game points / money?
Note: This technique is not suitable for some online games.
1) Download the Game Killer app and install it on your Android device.
>https://apkpure.com/game-killer/com.charles.lpoqasert/download?from=details
2) Open Game Killer and allow root access
3) Open the game you want to hack, then check the current game points / money and write it down.
4) Click the Game Killer icon
5) Now enter the game funds you have and click the search icon. Then select "Automatic Recognition" and within two seconds you will see the search results.
6) Now go to Options> Data Controls> Modify all values. A small box will appear.
7) Enter the maximum value you can enter and click OK.
> That's it, it's perfect.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Android apps/Games hack- testing by UndercOde :
t.me/UndercOdeTesting
π¦LETS START:
> How to get more game points / money?
Note: This technique is not suitable for some online games.
1) Download the Game Killer app and install it on your Android device.
>https://apkpure.com/game-killer/com.charles.lpoqasert/download?from=details
2) Open Game Killer and allow root access
3) Open the game you want to hack, then check the current game points / money and write it down.
4) Click the Game Killer icon
5) Now enter the game funds you have and click the search icon. Then select "Automatic Recognition" and within two seconds you will see the search results.
6) Now go to Options> Data Controls> Modify all values. A small box will appear.
7) Enter the maximum value you can enter and click OK.
> That's it, it's perfect.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to hack an online Android game?- FOR BEGINERS
> Fact: You can also use this in some offline games.
T.me/UnderCodeTesting
π¦LETS START:
1) Download and install the Xmodgames application on your Android device.
> https://apkpure.com/xmodgames/com.satsaniz.aniz/download?from=details
2) Open the application and allow root access
3) Click on the application you want to crack (only when it says "Mod"), you will see the mod details.
example hack the 8 ball pool game
4) Click Install and wait for it to complete.
> Note: This application requires a working internet connection to install the mod.
5) Then click "Start" and the game will open. When you reach the main menu, a small window will pop up, if not, click on x-bot.
6) Click "Xmod".
7) Turn on the features, here is the infinite guide. Then close the floating window and play the game!
Wish you have fun ...
> Note: Using Xmodgames may prevent you from using the game. So use it with caution.
π¦ Now you might ask "What if Xmodgames doesn't have a game-specific mode?"
The answer is simple, just search for a modified version of the game on Google or any other search engine.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to hack an online Android game?- FOR BEGINERS
> Fact: You can also use this in some offline games.
T.me/UnderCodeTesting
π¦LETS START:
1) Download and install the Xmodgames application on your Android device.
> https://apkpure.com/xmodgames/com.satsaniz.aniz/download?from=details
2) Open the application and allow root access
3) Click on the application you want to crack (only when it says "Mod"), you will see the mod details.
example hack the 8 ball pool game
4) Click Install and wait for it to complete.
> Note: This application requires a working internet connection to install the mod.
5) Then click "Start" and the game will open. When you reach the main menu, a small window will pop up, if not, click on x-bot.
6) Click "Xmod".
7) Turn on the features, here is the infinite guide. Then close the floating window and play the game!
Wish you have fun ...
> Note: Using Xmodgames may prevent you from using the game. So use it with caution.
π¦ Now you might ask "What if Xmodgames doesn't have a game-specific mode?"
The answer is simple, just search for a modified version of the game on Google or any other search engine.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ for beginers ALL BZIP2 LINUX COMMANDS :
twitter.com/UndercOdeTC
π¦ #Function description: Compression program for .bz2 file by undercode
>Syntax: bzip2 [-cdfhkLstvVz] [-repetitive-best] [-repetitive-fast] [-compression level] [files to be compressed]
> Supplementary explanation: bzip2 uses a new compression algorithm, and the compression effect is better than traditional LZ77 / The LZ78 compression algorithm is good. If you do not add any parameters, bzip2 will generate a .bz2 compressed file after deleting the file, and delete the original file.
π¦ Parameters:
1) -c or --stdout send compressed and decompressed results to standard output.
2) -d or --decompress performs decompression.
3) -f or --force bzip2 When compressing or decompressing, if the output file has the same name as an existing file, the preset file will not be overwritten by default. To override, use this parameter.
4) -h or --help Display help.
5) -k or --keep bzip2 deletes the original file after compression or decompression. To keep the original file, use this parameter.
6) -s or --small reduces the amount of memory used during program execution.
7) -t or --test Test the integrity of the .bz2 compressed file.
8) -v or --verbose Display detailed information when compressing or decompressing files.
9) -z or --compress Force compression.
10) -L, --license,
11) -V or --version Display version information.
12) --repetitive-best If there are repeated data in the file, you can use this parameter to improve the compression effect.
13) --repetitive-fast If there is repeated information in the file, this parameter can be used to speed up the execution.
14) -Compression level Block size when compressed.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ for beginers ALL BZIP2 LINUX COMMANDS :
twitter.com/UndercOdeTC
π¦ #Function description: Compression program for .bz2 file by undercode
>Syntax: bzip2 [-cdfhkLstvVz] [-repetitive-best] [-repetitive-fast] [-compression level] [files to be compressed]
> Supplementary explanation: bzip2 uses a new compression algorithm, and the compression effect is better than traditional LZ77 / The LZ78 compression algorithm is good. If you do not add any parameters, bzip2 will generate a .bz2 compressed file after deleting the file, and delete the original file.
π¦ Parameters:
1) -c or --stdout send compressed and decompressed results to standard output.
2) -d or --decompress performs decompression.
3) -f or --force bzip2 When compressing or decompressing, if the output file has the same name as an existing file, the preset file will not be overwritten by default. To override, use this parameter.
4) -h or --help Display help.
5) -k or --keep bzip2 deletes the original file after compression or decompression. To keep the original file, use this parameter.
6) -s or --small reduces the amount of memory used during program execution.
7) -t or --test Test the integrity of the .bz2 compressed file.
8) -v or --verbose Display detailed information when compressing or decompressing files.
9) -z or --compress Force compression.
10) -L, --license,
11) -V or --version Display version information.
12) --repetitive-best If there are repeated data in the file, you can use this parameter to improve the compression effect.
13) --repetitive-fast If there is repeated information in the file, this parameter can be used to speed up the execution.
14) -Compression level Block size when compressed.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦For apps developpers > How to strengthen Android apk to prevent cracking (prevent reverse compilation) ? by Undercode :
T.me/UnderCodeTesting
π¦LETS START:
> Now the main tool is to contact the SDK. In order to prevent game packages from being cracked and compiled, and to discover encrypted strings, let me share the following points:
There are four main ways to implement anti-cracking technology:
1) ProGuard technology
2) Signature ratio For technology
3) NDK .so dynamic library technology
4) Dynamic loading technology
5) Third-party platform encryption and detection of vulnerabilities
π¦ How to decompile and encrypt the apk package in Android Security so knowledge points by undercode
1) The first one: Code obfuscation technology (ProGuard) This technology is mainly used to obfuscate the code and reduce the readability of the code after reverse compiling. However, this technology cannot prevent the packing technology from packing (adding codes such as fees, advertisements and viruses) And, as long as a careful person, the code can still be analyzed in reverse, so the technology does not solve the problem of cracking, but only increases the difficulty of cracking.
2) Second: Signature comparison technology This technology mainly prevents the packing technology from packing, but the risk of reverse analysis of the code still exists. And this technology cannot solve the problem of being packed at all. If the cracker commented out the signature comparison code and compiled it back, the technology would be cracked.
3) The third: NDK .so dynamic library technology. This technology implements all important core code in C files, and uses NDK technology to compile the core code into a .so dynamic library, which is then called by JNI. Although this technology can protect the core code, the risk of being packed still exists.
4) The fourth type: dynamic loading technology, which is a relatively mature technology in Java, but this technology in Android has not been fully utilized by everyone.
5) Fifth type: use of third-party platforms
π¦ The fourth method is mainly explained. This technology can effectively prevent problems such as reverse analysis, being cracked, and being packed. The dynamic loading technology is divided into the following steps:
a) Jar package that compiles the core code into a dex file
b) Encrypting the jar package
Decrypt with NDK at the main entrance of the program
Then use ClassLoader to dynamically load the jar package
Use reflection technology to set ClassLoader as the system's ClassLoader.
π¦ The main advantages are:
1) The core code is in the encrypted jar, so the cracker cannot extract the class file. If the encryption key is obtained by the cracker, it will be another level of security.
2) This technology can also effectively prevent the shelling technology. The code is dynamically loaded. The cracker's shell program cannot be added to the encrypted jar package. The cracker injected the shell program entry in time.
3) The shell program is not in the ClassLoader jar package. Therefore, it cannot be executed unless the cracker replaces the ClassLoader jar package and turns off the NDK decryption code. However, this installation on the phone is no longer our application, and the user must uninstall it.
4) Therefore, when compared, the fourth dynamic loading technology is the safest, but the efficiency is not strictly tested. After a rough experiment, the efficiency has not been significantly reduced.
LEARN AND SECURE YOUR APP,
Written by Under Code
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦For apps developpers > How to strengthen Android apk to prevent cracking (prevent reverse compilation) ? by Undercode :
T.me/UnderCodeTesting
π¦LETS START:
> Now the main tool is to contact the SDK. In order to prevent game packages from being cracked and compiled, and to discover encrypted strings, let me share the following points:
There are four main ways to implement anti-cracking technology:
1) ProGuard technology
2) Signature ratio For technology
3) NDK .so dynamic library technology
4) Dynamic loading technology
5) Third-party platform encryption and detection of vulnerabilities
π¦ How to decompile and encrypt the apk package in Android Security so knowledge points by undercode
1) The first one: Code obfuscation technology (ProGuard) This technology is mainly used to obfuscate the code and reduce the readability of the code after reverse compiling. However, this technology cannot prevent the packing technology from packing (adding codes such as fees, advertisements and viruses) And, as long as a careful person, the code can still be analyzed in reverse, so the technology does not solve the problem of cracking, but only increases the difficulty of cracking.
2) Second: Signature comparison technology This technology mainly prevents the packing technology from packing, but the risk of reverse analysis of the code still exists. And this technology cannot solve the problem of being packed at all. If the cracker commented out the signature comparison code and compiled it back, the technology would be cracked.
3) The third: NDK .so dynamic library technology. This technology implements all important core code in C files, and uses NDK technology to compile the core code into a .so dynamic library, which is then called by JNI. Although this technology can protect the core code, the risk of being packed still exists.
4) The fourth type: dynamic loading technology, which is a relatively mature technology in Java, but this technology in Android has not been fully utilized by everyone.
5) Fifth type: use of third-party platforms
π¦ The fourth method is mainly explained. This technology can effectively prevent problems such as reverse analysis, being cracked, and being packed. The dynamic loading technology is divided into the following steps:
a) Jar package that compiles the core code into a dex file
b) Encrypting the jar package
Decrypt with NDK at the main entrance of the program
Then use ClassLoader to dynamically load the jar package
Use reflection technology to set ClassLoader as the system's ClassLoader.
π¦ The main advantages are:
1) The core code is in the encrypted jar, so the cracker cannot extract the class file. If the encryption key is obtained by the cracker, it will be another level of security.
2) This technology can also effectively prevent the shelling technology. The code is dynamically loaded. The cracker's shell program cannot be added to the encrypted jar package. The cracker injected the shell program entry in time.
3) The shell program is not in the ClassLoader jar package. Therefore, it cannot be executed unless the cracker replaces the ClassLoader jar package and turns off the NDK decryption code. However, this installation on the phone is no longer our application, and the user must uninstall it.
4) Therefore, when compared, the fourth dynamic loading technology is the safest, but the efficiency is not strictly tested. After a rough experiment, the efficiency has not been significantly reduced.
LEARN AND SECURE YOUR APP,
Written by Under Code
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Input method class-xsim installation :
1) First, uninstall the original minichinput
2) rpm -e chinput
2) Second, install xsim
3) . / configure --with-cn-locale = GB2312 --enable-status-kde3
4) make
5) make install
6) make install-data
7) Configuration file
> Run locale chooser and change locale to zh_CN.
> vi / usr / local / xsim / xsimrc
XIM Locale "zh_CN" (modified value)
> Fourth, let the system automatically run xsim
vi ~ / .bash_profile after each startup and
add this line:
> export XMODIFIERS = @ im = XSIM
> re-login to xwindows, you can use ctrl + space Dropping the input method is really great!
Written by Under Code
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Input method class-xsim installation :
1) First, uninstall the original minichinput
2) rpm -e chinput
2) Second, install xsim
3) . / configure --with-cn-locale = GB2312 --enable-status-kde3
4) make
5) make install
6) make install-data
7) Configuration file
> Run locale chooser and change locale to zh_CN.
> vi / usr / local / xsim / xsimrc
XIM Locale "zh_CN" (modified value)
> Fourth, let the system automatically run xsim
vi ~ / .bash_profile after each startup and
add this line:
> export XMODIFIERS = @ im = XSIM
> re-login to xwindows, you can use ctrl + space Dropping the input method is really great!
Written by Under Code
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Programming Techniques-Cross-platform Code Debugging by undercode :
twitter.com/UndercOdeTC
> In development, for code reuse, we always separate the core algorithm from the interface part, the
> It is best to support it when writing code. If you work in the company, you can have more
machines one with linux, the code has to be copied, or the server using Telnet.
If there is only one computer, it will be miserable. Install two operating systems. , Restart, switch operating system.
π¦LETS START:
> Here is a software that can solve this problem. The same source code under Windows is
compiled and debugged with VC and gcc at the same time. It is cygwin. I use vc6.0, gcc2.95.2.
1) Install cygwin
First install cygwin. Cygwin is a cygnus.com product. Download it from its website and
install it directly on the Internet. Do nβt forget to select the gcc option during installation.
2) Code directory
My code directory is ZCore. The following are subdirectories. There are two subdirectories in the subdirectory Build:
VC and gcc hold the VC project files and gcc Makefile respectively; the subdirectory Src is the code directory; the
subdirectory Doc In the code is the Readme and other instructions (not used to Chinese comments in English code), the code
To be compiled into a static library. Needless to say the VC compilation environment, let's see how to set up a gcc compilation environment.
Makefile has to be written by myself, there is no Makefile auxiliary tool in my cygwin. Run cygwin.
3) Mapping the directory
We first mount the win32 directory into the posix directory, and run mount to view the original
mounted path. The path of my ZCore is: d: studyzcore, I want to map into / zcore, the
command is: "mount d: / study / zcore / zcore". There is a warning, but no problem. Now
using mount to view, there is one more. This information is stored in the registry
[HKEY_CURRENT_USERSoftwareCygnus SolutionsCygwinmounts v2 / zcore]
If you want to uninstall, use the command "umount / zcore".
4) gcc compile
with "cd / zcore / build / gcc" into the compilation directory, make it.
In this way, you can use VC to compile with gcc when debugging code, and it will be easier to migrate to other environments in the future.
Written by Under Code
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Programming Techniques-Cross-platform Code Debugging by undercode :
twitter.com/UndercOdeTC
> In development, for code reuse, we always separate the core algorithm from the interface part, the
> It is best to support it when writing code. If you work in the company, you can have more
machines one with linux, the code has to be copied, or the server using Telnet.
If there is only one computer, it will be miserable. Install two operating systems. , Restart, switch operating system.
π¦LETS START:
> Here is a software that can solve this problem. The same source code under Windows is
compiled and debugged with VC and gcc at the same time. It is cygwin. I use vc6.0, gcc2.95.2.
1) Install cygwin
First install cygwin. Cygwin is a cygnus.com product. Download it from its website and
install it directly on the Internet. Do nβt forget to select the gcc option during installation.
2) Code directory
My code directory is ZCore. The following are subdirectories. There are two subdirectories in the subdirectory Build:
VC and gcc hold the VC project files and gcc Makefile respectively; the subdirectory Src is the code directory; the
subdirectory Doc In the code is the Readme and other instructions (not used to Chinese comments in English code), the code
To be compiled into a static library. Needless to say the VC compilation environment, let's see how to set up a gcc compilation environment.
Makefile has to be written by myself, there is no Makefile auxiliary tool in my cygwin. Run cygwin.
3) Mapping the directory
We first mount the win32 directory into the posix directory, and run mount to view the original
mounted path. The path of my ZCore is: d: studyzcore, I want to map into / zcore, the
command is: "mount d: / study / zcore / zcore". There is a warning, but no problem. Now
using mount to view, there is one more. This information is stored in the registry
[HKEY_CURRENT_USERSoftwareCygnus SolutionsCygwinmounts v2 / zcore]
If you want to uninstall, use the command "umount / zcore".
4) gcc compile
with "cd / zcore / build / gcc" into the compilation directory, make it.
In this way, you can use VC to compile with gcc when debugging code, and it will be easier to migrate to other environments in the future.
Written by Under Code
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 tool for m performing a denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools
T.me/UndercOdeTesting
π¦LETS START:
1) git clone https://github.com/entynetproject/quack
2) cd quack
3) chmod +x install.sh
4) ./install.sh
π¦usage: quack [-h] [--target <IP:port/URL/phone>]
[--tool [SMS|NTP|TCP|UDP|SYN|POD|SLOWLORIS|MEMCACHED|HTTP|NJRAT]]
[--timeout <timeout>] [--threads <threads>] [-u]
optional arguments:
-h, --help show this help message and exit
--target <IP:port/URL/phone>
Target IP:port, URL or phone.
--tool [SMS|NTP|TCP|UDP|SYN|POD|SLOWLORIS|MEMCACHED|HTTP|NJRAT]
Attack tool.
--timeout <timeout> Timeout in secounds.
--threads <threads> Threads count.
-u, --update Update Quack Toolkit.
π¦Example of the SMS attack:
quack --tool SMS --target 15554443333 --time 10 --threads 10
Example of the HTTP attack:
quack --tool HTTP --target http://example.com/ --time 10 --threads 10
Example of the TCP attack:
quack --tool TCP --target 192.168.1.100:80 --time 10 --threads 10
Written by Under Code
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 tool for m performing a denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools
T.me/UndercOdeTesting
π¦LETS START:
1) git clone https://github.com/entynetproject/quack
2) cd quack
3) chmod +x install.sh
4) ./install.sh
π¦usage: quack [-h] [--target <IP:port/URL/phone>]
[--tool [SMS|NTP|TCP|UDP|SYN|POD|SLOWLORIS|MEMCACHED|HTTP|NJRAT]]
[--timeout <timeout>] [--threads <threads>] [-u]
optional arguments:
-h, --help show this help message and exit
--target <IP:port/URL/phone>
Target IP:port, URL or phone.
--tool [SMS|NTP|TCP|UDP|SYN|POD|SLOWLORIS|MEMCACHED|HTTP|NJRAT]
Attack tool.
--timeout <timeout> Timeout in secounds.
--threads <threads> Threads count.
-u, --update Update Quack Toolkit.
π¦Example of the SMS attack:
quack --tool SMS --target 15554443333 --time 10 --threads 10
Example of the HTTP attack:
quack --tool HTTP --target http://example.com/ --time 10 --threads 10
Example of the TCP attack:
quack --tool TCP --target 192.168.1.100:80 --time 10 --threads 10
Written by Under Code
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Make an xbm picture ? by undercode :
> xbm is a simple two-color image bitmap format. It was used more in early cgi. It is currently used on counters.
T.me/UndercOdeTesting
π¦LETS START:
<? php
setXBM (1234567890,0);
function setXBM ($ num, $ mode = 0) {
settype ( $ num, "string");
$ mode = $ mode? 0xff: 0x00;
$ int_width = strlen ($ num); // digits
$ count_width = 8; // single number width
$ count_height = 16; // height
$ bitmap = array (
0 => array (0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
1 => array (0xff, 0xff) , 0xff, 0xcf, 0xc7, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xff, 0xff, 0xff),
2 => array (0xff, 0xff, 0xff, 0xc3, 0x99, 0x9f, 0x9f, 0xcf , 0xe7, 0xf3, 0xf9, 0xf9, 0x81, 0xff, 0xff, 0xff),
3 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x9f, 0x9f, 0xc7, 0x9f, 0x9f, 0x9f, 0x99, 0xc3, 0xff, 0xff, 0xff),
4 => array(0xff, 0xff, 0xff, 0xcf, 0xcf, 0xc7, 0xc7, 0xcb, 0xcb, 0xcd, 0x81, 0xcf, 0x87, 0xff, 0xff, 0xff),
5 => array(0xff, 0xff, 0xff, 0x81, 0xf9, 0xf9, 0xf9, 0xc1, 0x9f, 0x9f, 0x9f, 0x99, 0xc3, 0xff, 0xff, 0xff),
6 => array(0xff, 0xff, 0xff, 0xc7, 0xf3, 0xf9, 0xf9, 0xc1, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
7 => array(0xff, 0xff, 0xff, 0x81, 0x99, 0x9f, 0x9f, 0xcf, 0xcf, 0xe7, 0xe7, 0xf3, 0xf3, 0xff, 0xff, 0xff),
8 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0xc3, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
9 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0x99, 0x83, 0x9f, 0x9f, 0xcf, 0xe3, 0xff, 0xff, 0xff)
);
echo "#define counter_width " .($count_width * $int_width)."\r\n";
echo "#define counter_height " .$count_height. "\r\n";
echo "static unsigned char counter_bits[] = {\r\n";
for($i=0; $i<$count_height; ++$i) {
for($j = 0; $j < $int_width; ++$j) {
printf("0x%2x, ",$bitmap[$num[$j]][$i]^$mode);
}
}
Written by Under Code
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Make an xbm picture ? by undercode :
> xbm is a simple two-color image bitmap format. It was used more in early cgi. It is currently used on counters.
T.me/UndercOdeTesting
π¦LETS START:
<? php
setXBM (1234567890,0);
function setXBM ($ num, $ mode = 0) {
settype ( $ num, "string");
$ mode = $ mode? 0xff: 0x00;
$ int_width = strlen ($ num); // digits
$ count_width = 8; // single number width
$ count_height = 16; // height
$ bitmap = array (
0 => array (0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
1 => array (0xff, 0xff) , 0xff, 0xcf, 0xc7, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xff, 0xff, 0xff),
2 => array (0xff, 0xff, 0xff, 0xc3, 0x99, 0x9f, 0x9f, 0xcf , 0xe7, 0xf3, 0xf9, 0xf9, 0x81, 0xff, 0xff, 0xff),
3 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x9f, 0x9f, 0xc7, 0x9f, 0x9f, 0x9f, 0x99, 0xc3, 0xff, 0xff, 0xff),
4 => array(0xff, 0xff, 0xff, 0xcf, 0xcf, 0xc7, 0xc7, 0xcb, 0xcb, 0xcd, 0x81, 0xcf, 0x87, 0xff, 0xff, 0xff),
5 => array(0xff, 0xff, 0xff, 0x81, 0xf9, 0xf9, 0xf9, 0xc1, 0x9f, 0x9f, 0x9f, 0x99, 0xc3, 0xff, 0xff, 0xff),
6 => array(0xff, 0xff, 0xff, 0xc7, 0xf3, 0xf9, 0xf9, 0xc1, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
7 => array(0xff, 0xff, 0xff, 0x81, 0x99, 0x9f, 0x9f, 0xcf, 0xcf, 0xe7, 0xe7, 0xf3, 0xf3, 0xff, 0xff, 0xff),
8 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0xc3, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
9 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0x99, 0x83, 0x9f, 0x9f, 0xcf, 0xe3, 0xff, 0xff, 0xff)
);
echo "#define counter_width " .($count_width * $int_width)."\r\n";
echo "#define counter_height " .$count_height. "\r\n";
echo "static unsigned char counter_bits[] = {\r\n";
for($i=0; $i<$count_height; ++$i) {
for($j = 0; $j < $int_width; ++$j) {
printf("0x%2x, ",$bitmap[$num[$j]][$i]^$mode);
}
}
Written by Under Code
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Network Filtering-Address Mapping with iptables :
> t.me/UnderCodeTesting
π¦LETS START:
many users such redhat os- asks:
> How Can I make my internal FTP server accessible to Internet users? That is how to map IP addresses, please give pointers ..well follow this UnderCode Tutorial
you can't ftp / telnet on the LAN, and then there is really no way, you turned off iptables!> see this fix
1) Ftp dnat
# / sbin / iptables -t nat -A PREROUTING -p tcp -d $ addr0 --dport 20 -i eth0 DNAT --to $ ADDR3 -j: 20
# / sbin / iptables -t NAT -A PREROUTING -p tcp -d $ ADDR0 --dport 21 -i eth0 -j DNAT --to $ ADDR3: 21
this is what I have done An example. Used well. See if it helps you.
2) $ addr0 The IP of the external network card of this machine
3) $ addr1 The IP of the internal server
π¦ Isn't there only one machine that can FTP?
try
1) insertmod ip_nat_ftp
and other related modules. I didn't specify whether a PC can FTP ... but all our LANs can FTP.
2) Or your iptable firewall script was written incorrectly. No open ftp port.
Written by Under Code
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Network Filtering-Address Mapping with iptables :
> t.me/UnderCodeTesting
π¦LETS START:
many users such redhat os- asks:
> How Can I make my internal FTP server accessible to Internet users? That is how to map IP addresses, please give pointers ..well follow this UnderCode Tutorial
you can't ftp / telnet on the LAN, and then there is really no way, you turned off iptables!> see this fix
1) Ftp dnat
# / sbin / iptables -t nat -A PREROUTING -p tcp -d $ addr0 --dport 20 -i eth0 DNAT --to $ ADDR3 -j: 20
# / sbin / iptables -t NAT -A PREROUTING -p tcp -d $ ADDR0 --dport 21 -i eth0 -j DNAT --to $ ADDR3: 21
this is what I have done An example. Used well. See if it helps you.
2) $ addr0 The IP of the external network card of this machine
3) $ addr1 The IP of the internal server
π¦ Isn't there only one machine that can FTP?
try
1) insertmod ip_nat_ftp
and other related modules. I didn't specify whether a PC can FTP ... but all our LANs can FTP.
2) Or your iptable firewall script was written incorrectly. No open ftp port.
Written by Under Code
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Seven elements of being a successful programmer recommended by UnderCode
T.me/UnderCodeTesting
1) First, low commitment, high realization: If your commitment is indeed what the manager wants to hear, he will like you. However, he will not like you any more if the software is not delivered in a timely manner as promised.
2) Second, don't put errors in software: Good programmers don't put errors in their code.
3) Third, full of enthusiasm and hard work: Excellent programmers are full of enthusiasm and hard work, they are highly organized, and pay attention to methods, they have the ability to structure things. Moreover, the enthusiasm of most programmers for their hard work is incredible.
4) Fourth, know the unknown factors.
5) Fifth, get along well with team members: Software development is the result of team members' coordinated efforts.
6) Six, good beginning, good end, towards the ultimate goal: always towards the ultimate goal is a very important ability.
One of the things you're looking for when interviewing someone for work is the work he actually participates in on the product the group has already delivered.
7) Seven, learning the emerging technology: Excellent developers are people who are eager to learn.
Written by Under Code
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Seven elements of being a successful programmer recommended by UnderCode
T.me/UnderCodeTesting
1) First, low commitment, high realization: If your commitment is indeed what the manager wants to hear, he will like you. However, he will not like you any more if the software is not delivered in a timely manner as promised.
2) Second, don't put errors in software: Good programmers don't put errors in their code.
3) Third, full of enthusiasm and hard work: Excellent programmers are full of enthusiasm and hard work, they are highly organized, and pay attention to methods, they have the ability to structure things. Moreover, the enthusiasm of most programmers for their hard work is incredible.
4) Fourth, know the unknown factors.
5) Fifth, get along well with team members: Software development is the result of team members' coordinated efforts.
6) Six, good beginning, good end, towards the ultimate goal: always towards the ultimate goal is a very important ability.
One of the things you're looking for when interviewing someone for work is the work he actually participates in on the product the group has already delivered.
7) Seven, learning the emerging technology: Excellent developers are people who are eager to learn.
Written by Under Code
β β β ο½ππ»βΊπ«Δπ¬πβ β β β