β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Best Netflix checker sites 2020 :
t.me/undercodeTesting
1) https://pjsins.com/best-netflix-checker-by-xrisky-v2-2020/
2) https://ouo.io/YAdby5
> download
3) https://cracked.to/Thread-NetFlix-Checker-by-xRisky
4) https://checkz.net/tools/tag/netflix-checker-online
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Best Netflix checker sites 2020 :
t.me/undercodeTesting
1) https://pjsins.com/best-netflix-checker-by-xrisky-v2-2020/
2) https://ouo.io/YAdby5
> download
3) https://cracked.to/Thread-NetFlix-Checker-by-xRisky
4) https://checkz.net/tools/tag/netflix-checker-online
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ best 2020 apps to get virtual-real credit Card for android :
twitter.com/undercodeNews
π¦ ππΌππ πππΈβπ :
1) https://www.entropay.com/
2) https://play.google.com/store/apps/details?id=com.icicibank.pockets
3) DigiPurse by Union Bank
> https://apkpure.com/union-bank-digital-banking/com.epic.ubmobilebank
4) https://apkpure.com/free-virtual-credit-card/free.virtualcard.com
5) https://apkpure.com/virtual-credit-card-vcc/com.wRajaPaypal
6) https://apkpure.com/vcc-pro-virtual-card/www.vccpro.com.vccprovirtualcreditcard
7) https://apkpure.com/metropcs-virtual-mastercard/com.netone.vcc
8) https://m.apkpure.com/free-virtual-credit-card/free.virtualcard.com/download?from=details
9) https://m.apkpure.com/cc-virtual-homes/com.californiaclosets.vr/download/8-XAPK
@UmdercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ best 2020 apps to get virtual-real credit Card for android :
twitter.com/undercodeNews
π¦ ππΌππ πππΈβπ :
1) https://www.entropay.com/
2) https://play.google.com/store/apps/details?id=com.icicibank.pockets
3) DigiPurse by Union Bank
> https://apkpure.com/union-bank-digital-banking/com.epic.ubmobilebank
4) https://apkpure.com/free-virtual-credit-card/free.virtualcard.com
5) https://apkpure.com/virtual-credit-card-vcc/com.wRajaPaypal
6) https://apkpure.com/vcc-pro-virtual-card/www.vccpro.com.vccprovirtualcreditcard
7) https://apkpure.com/metropcs-virtual-mastercard/com.netone.vcc
8) https://m.apkpure.com/free-virtual-credit-card/free.virtualcard.com/download?from=details
9) https://m.apkpure.com/cc-virtual-homes/com.californiaclosets.vr/download/8-XAPK
@UmdercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Twitter
UNDERCODE NEWS (@UndercodeNews) | Twitter
The latest Tweets from UNDERCODE NEWS (@UndercodeNews). We provides you daily hacking News & Security Warning & Technologies news & Bugs reports & Analysis... @UndercodeNews @UndercodeUpdate @iUndercode @DailyCve. Aus/Leb
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Best 2019-2020 cc generator sites :
1) https://www.bestccgen.com/
2) https://creditcardgenerator.com/
3) https://creditcardgenerator.com/visa-credit-card-generator/
4) https://www.gleanster.com/credit-card-generator-with-cvv-and-expiration-date/history/
5) https://saijogeorge.com/dummy-credit-card-generator/
6) https://generator-credit-card.com/
7) https://www.vccgenerator.com/
8) https://www.creditcardrush.com/credit-card-generator-with-money/
9) https://fake-card-generator.com/
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Best 2019-2020 cc generator sites :
1) https://www.bestccgen.com/
2) https://creditcardgenerator.com/
3) https://creditcardgenerator.com/visa-credit-card-generator/
4) https://www.gleanster.com/credit-card-generator-with-cvv-and-expiration-date/history/
5) https://saijogeorge.com/dummy-credit-card-generator/
6) https://generator-credit-card.com/
7) https://www.vccgenerator.com/
8) https://www.creditcardrush.com/credit-card-generator-with-money/
9) https://fake-card-generator.com/
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Fake Valid Credit card numbers for TRIALS
> spootify- netflix-virtual numbers
T.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
4822787842278095 | Name David MartΓn | Cvv 194 | Vence | 01/25
5134571890159641 | First name Taylor Lewis | Cvv 117 | Vence | 12/2022
349856972922624 | Diamond Johnson name | Cvv 423 | Vence | 05/2028
3568892723271712 | First name Ethen Gonzalez | Cvv 442 | Vence |
09/2025
6011342228039426 | First name Madison Allen | Cvv 782 | Vence | 02/2026
4771753420740642 | Name Daniel Wright | Cvv 493 | Expires | 01/22
5444780411243272 | Ruby Baker Name | Cvv 134 | Vence | 12/2024
346206148867860 | Name Reagan Brown | Cvv 242 | Vence | 11/2026
3529701135256302 | Name Joseph Edwards | Cvv 732 | Vence | 02/2023
6011796428775230 | Name Jes Johnson | Cvv 764 | Vence | 02/2026
4553227938934074 | First name Michael Mitchell | Cvv 906 | Vence |
11/2022
5519178874098970 | First name Tristan Collins | Cvv 146 | Vence | 01/2029
344005630347676 | Van Baker name | Cvv 557 | Vence | 09/2024
3579308837651175 | First name Walker Anderson | Cvv 369 | Vence | 10/2025
6011200380898973 | First name Brianna Jones | Cvv 275 | Vence | 03/2024
4276090643767346 | First name William Rodriguez | Cvv 847 | Vence | 07/2022
5267907545409651 | Name Noel Williams | Cvv 718 | Vence | 10/2028
379948265263312 | First name Tristan Adams | Cvv 667 | Vence | 04/2026
3539667905342580 | First name Javion Johnson | Cvv 430 | Vence | 11/2025
6011355116046469 | First name Gideon Davis | Cvv 875 | Vence | 02/2026
4094888777502193 | Name Elijah Campbell | Cvv 789 | Vence | 07/2022
5361691169041249 | Name Eliana White | Cvv 667 | Vence | 12/2024
340078524118614 | Name Atticus Miller | Cvv 723 | Vence | 04/2022
3558627383367331 | First name Ruby Garcia | Cvv 624 | Vence | 07/2028
6011136497811444 | Name Faith Jones | Cvv 792 | Vence | 02/2026
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Fake Valid Credit card numbers for TRIALS
> spootify- netflix-virtual numbers
T.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
4822787842278095 | Name David MartΓn | Cvv 194 | Vence | 01/25
5134571890159641 | First name Taylor Lewis | Cvv 117 | Vence | 12/2022
349856972922624 | Diamond Johnson name | Cvv 423 | Vence | 05/2028
3568892723271712 | First name Ethen Gonzalez | Cvv 442 | Vence |
09/2025
6011342228039426 | First name Madison Allen | Cvv 782 | Vence | 02/2026
4771753420740642 | Name Daniel Wright | Cvv 493 | Expires | 01/22
5444780411243272 | Ruby Baker Name | Cvv 134 | Vence | 12/2024
346206148867860 | Name Reagan Brown | Cvv 242 | Vence | 11/2026
3529701135256302 | Name Joseph Edwards | Cvv 732 | Vence | 02/2023
6011796428775230 | Name Jes Johnson | Cvv 764 | Vence | 02/2026
4553227938934074 | First name Michael Mitchell | Cvv 906 | Vence |
11/2022
5519178874098970 | First name Tristan Collins | Cvv 146 | Vence | 01/2029
344005630347676 | Van Baker name | Cvv 557 | Vence | 09/2024
3579308837651175 | First name Walker Anderson | Cvv 369 | Vence | 10/2025
6011200380898973 | First name Brianna Jones | Cvv 275 | Vence | 03/2024
4276090643767346 | First name William Rodriguez | Cvv 847 | Vence | 07/2022
5267907545409651 | Name Noel Williams | Cvv 718 | Vence | 10/2028
379948265263312 | First name Tristan Adams | Cvv 667 | Vence | 04/2026
3539667905342580 | First name Javion Johnson | Cvv 430 | Vence | 11/2025
6011355116046469 | First name Gideon Davis | Cvv 875 | Vence | 02/2026
4094888777502193 | Name Elijah Campbell | Cvv 789 | Vence | 07/2022
5361691169041249 | Name Eliana White | Cvv 667 | Vence | 12/2024
340078524118614 | Name Atticus Miller | Cvv 723 | Vence | 04/2022
3558627383367331 | First name Ruby Garcia | Cvv 624 | Vence | 07/2028
6011136497811444 | Name Faith Jones | Cvv 792 | Vence | 02/2026
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 lastest trick How hack netflix AND GET WORKING PREM ACCOUNTS by Undercode
> Netflix use cookies . The owner of the Netflix account could be located anywhere in the world and that is not a problem, since if they share Netflix cookies, anyone who copies them in their browser will be able to enter the owner's account without having to enter a Username and password. As a result, you will be able to enjoy extraordinary Netflix content for free.
π¦ A disadvantage of the use of cookies is that Netflix does not allow playback on more than 4 screens at the same time. Therefore, if the cookie is already programmed for 4 people and they are currently in use, you must wait a while to be able to enter and reproduce the content. Follow below step by step the following instructions so you can enjoy hours of pleasure and fun on this incredible entertainment platform completely free.
π¦ Until now, Netflix could be accessed using the Chrome browser. Currently it is no longer possible due to new browser updates. In this new " Hack" we will use the Mozilla FireFox browser and an extension called Cookie Editor.
1) The first thing you should do is download and install the browser on your PC. Click on the following link
> https://www.mozilla.org/en-US/firefox/new/
2) Install the Cookie Editor Add-on extension
> https://addons.mozilla.org/en-US/firefox/addon/cookie-editor/
3) Once installed you will have to reboot your computer.
3. You must connect to a VPN with an address or IP in the USA. Once connected, click to go to Netflix USA and wait for the page to load completely.
4) In the browser bar click on the tools section on the icon that says "Cookie Editor"
5) Delete all the cookies stored in the browser by clicking on the βAdd Onβ box in the pop-up menu and pressing βDeleteβ.
6) Copy the Netflix cookie from the available list using the "Cookie Editor" extension and import it by pressing the corresponding button, see the images sended here
7) In this step you must do the following as it is essential for this βHackβ to work. When visiting the official Netflix site, the url of the detected country is automatically re-written. For example, if the company detects that the IP is from the United Kingdom, the url will be rewritten as follows: netflix.com/uk and so on for any country; so you must delete all the text written after the forward slash (/) ... Then just click the "Enter" button .
8) And that's it ...! .. Once the page is fully loaded you will have access to all content as a Premium subscriber.
π¦Note:
After logging in to Netflix, avoid changing the data of the original account such as Email and phone number. If you do so, you will lose your access to that account. Also remember that if the session is occupied by 4 people, you must wait your turn to see the content.
π¦ Use for learn not for Steal !!!
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 lastest trick How hack netflix AND GET WORKING PREM ACCOUNTS by Undercode
> Netflix use cookies . The owner of the Netflix account could be located anywhere in the world and that is not a problem, since if they share Netflix cookies, anyone who copies them in their browser will be able to enter the owner's account without having to enter a Username and password. As a result, you will be able to enjoy extraordinary Netflix content for free.
π¦ A disadvantage of the use of cookies is that Netflix does not allow playback on more than 4 screens at the same time. Therefore, if the cookie is already programmed for 4 people and they are currently in use, you must wait a while to be able to enter and reproduce the content. Follow below step by step the following instructions so you can enjoy hours of pleasure and fun on this incredible entertainment platform completely free.
π¦ Until now, Netflix could be accessed using the Chrome browser. Currently it is no longer possible due to new browser updates. In this new " Hack" we will use the Mozilla FireFox browser and an extension called Cookie Editor.
1) The first thing you should do is download and install the browser on your PC. Click on the following link
> https://www.mozilla.org/en-US/firefox/new/
2) Install the Cookie Editor Add-on extension
> https://addons.mozilla.org/en-US/firefox/addon/cookie-editor/
3) Once installed you will have to reboot your computer.
3. You must connect to a VPN with an address or IP in the USA. Once connected, click to go to Netflix USA and wait for the page to load completely.
4) In the browser bar click on the tools section on the icon that says "Cookie Editor"
5) Delete all the cookies stored in the browser by clicking on the βAdd Onβ box in the pop-up menu and pressing βDeleteβ.
6) Copy the Netflix cookie from the available list using the "Cookie Editor" extension and import it by pressing the corresponding button, see the images sended here
7) In this step you must do the following as it is essential for this βHackβ to work. When visiting the official Netflix site, the url of the detected country is automatically re-written. For example, if the company detects that the IP is from the United Kingdom, the url will be rewritten as follows: netflix.com/uk and so on for any country; so you must delete all the text written after the forward slash (/) ... Then just click the "Enter" button .
8) And that's it ...! .. Once the page is fully loaded you will have access to all content as a Premium subscriber.
π¦Note:
After logging in to Netflix, avoid changing the data of the original account such as Email and phone number. If you do so, you will lose your access to that account. Also remember that if the session is occupied by 4 people, you must wait your turn to see the content.
π¦ Use for learn not for Steal !!!
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Firefox
Download the fastest Firefox ever
Faster page loading, less memory usage and packed with features, the new Firefox is here.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Setting up DHCP Server
A) Foreword:
1) DHCP is the abbreviation of Dynamic Host Configuration Protocol, mainly used to simplify network management in: The problem of "troublesome" in the configuration of workstation / host network configuration, commonly known as: "" dynamic allocation of IP "".
2) Compared with the dynamic allocation mechanism, it uses manual and manual methods to set one by one , Is called static setting.
3) Static setting is quite inefficient.
Imagine: If there are hundreds of workstations in a network segment, manually set it manually, it is not strange to be tired, and, in the future, if you want to change The network configuration is also extremely inconvenient!
4) Therefore, in the network management work, DHCP Server is a very important installation service. In the
5) past, most of the school βs DHCP Server was installed on NT / W2K, but the performance and The stability is not very good,
therefore, the following introduces the installation of DHCP Server on RedHat Linux.
π¦This article does not talk about too many theories, with the principle of being easy to set up.
B) Required packages:
dhcp-2.0-5.i386.rpm (RedHat 6.2)
dhcp-2.0-12.i186.rpm (RedHat 7.0)
dhcp-2.0-12.i386.rpm (CLE 1.0)
dhcp-2.0p15-4.i386.rpm ( RedHat 7.1)
C) Please choose the dhcp Server package according to your Linux version.
Setting up:
On RedHat Linux, setting up a DHCP Server is very simple!
1) Installation:
(a) rpm -ivh dhcp-2.0-5.i386. After rpm
(b), check, what files does this package place on the host?
rpm -ql dhcp | more
will get the following list:
/etc/rc.d/init.d/dhcpd
/ usr / doc / dhcp- 2.0
/usr/doc/dhcp-2.0/CHANGES
/usr/doc/dhcp-2.0/README
/usr/doc/dhcp-2.0/RELNOTES
/usr/doc/dhcp-2.0/dhcpd.conf.sample
/ usr / man / man5 / dhcp-options.5.gz
/usr/man/man5/dhcpd.conf.5.gz
/usr/man/man5/dhcpd.leases.5.gz
/usr/man/man8/dhcpd.8.gz
/usr/man/man8/dhcrelay.8.gz
/ usr / sbin / dhcpd
/ usr / sbin / dhcrelay
/ var / state / dhcp
, of which two are more important :
One is, /etc/rc.d/init.d/dhcpd, which can be used to control the behavior of the dhcp server, such as:
start: /etc/rc.d/init.d/dhcpd start
stop: / etc / rc .d / init.d / dhcpd stop
restart: /etc/rc.d/init.d/dhcpd restart
Observe the operation status: /etc/rc.d/init.d/dhcpd status The
other is, / usr / doc /dhcp-2.0/dhcpd.conf.sample
(RedHat 7.0 in /usr/share/doc/dhcp-2.0)
As the name implies, this is a configuration file of the dhcp server, we will copy it to / etc , And named dhcpd.conf.
(C) cp /usr/doc/dhcp-2.0/dhcpd.conf.sample /etc/dhcpd.conf
2) Configuration:
Then, you can start the configuration file for dhcp server / etc / dhcpd.conf to do the setting work. The
following is the original content of the file:
subnet 192.168.0.0 netmask 255.255.255.0 {
# --- default gateway
option routers 192.168.0.1;
option subnet-mask 255.255.255.0;
option nis-domain "" domain.org "";
option domain-name "" domain.org "";
option domain-name-servers 192.168.1.1;
3) option time-offset -5; # Eastern Standard Time
# option ntp-servers 192.168.1.1;
# option netbios-name-servers 192.168.1.1;
# --- Selects point -to-point node (default is hybrid). Don``t change this unless
#-you understand Netbios very well
# option netbios-node-type 2;
4) range dynamic-bootp 192.168.0.128 192.168.0.255;
default-lease- time 21600;
max-lease-time 43200;
5) we want the nameserver to appear at a fixed address
host ns {
next-server marvin.redhat.com;
hardware ethernet 12: 34: 56: 78: AB: CD;
fixed-address 207.175.42.254;
}
}
6) Junior High School as an example, the school is the first half of 1/2 C) subnet 163.26.167.0 netmask 255.255.255.128 {
# --- default gateway
# router IP
7) option routers 163.26.197.126;
# network mask
option subnet -mask 255.255.255.128;
# Domain
option domain-name "" jmjh.tnc.edu.tw "";
# Specify which DNS servers to dispatch to provide services?
option domain-name-servers 163.26.167.1, 163.26.200.1 , 168.95.1.1;
option time-offset -5; # Eastern Standard Time
π¦Setting up DHCP Server
A) Foreword:
1) DHCP is the abbreviation of Dynamic Host Configuration Protocol, mainly used to simplify network management in: The problem of "troublesome" in the configuration of workstation / host network configuration, commonly known as: "" dynamic allocation of IP "".
2) Compared with the dynamic allocation mechanism, it uses manual and manual methods to set one by one , Is called static setting.
3) Static setting is quite inefficient.
Imagine: If there are hundreds of workstations in a network segment, manually set it manually, it is not strange to be tired, and, in the future, if you want to change The network configuration is also extremely inconvenient!
4) Therefore, in the network management work, DHCP Server is a very important installation service. In the
5) past, most of the school βs DHCP Server was installed on NT / W2K, but the performance and The stability is not very good,
therefore, the following introduces the installation of DHCP Server on RedHat Linux.
π¦This article does not talk about too many theories, with the principle of being easy to set up.
B) Required packages:
dhcp-2.0-5.i386.rpm (RedHat 6.2)
dhcp-2.0-12.i186.rpm (RedHat 7.0)
dhcp-2.0-12.i386.rpm (CLE 1.0)
dhcp-2.0p15-4.i386.rpm ( RedHat 7.1)
C) Please choose the dhcp Server package according to your Linux version.
Setting up:
On RedHat Linux, setting up a DHCP Server is very simple!
1) Installation:
(a) rpm -ivh dhcp-2.0-5.i386. After rpm
(b), check, what files does this package place on the host?
rpm -ql dhcp | more
will get the following list:
/etc/rc.d/init.d/dhcpd
/ usr / doc / dhcp- 2.0
/usr/doc/dhcp-2.0/CHANGES
/usr/doc/dhcp-2.0/README
/usr/doc/dhcp-2.0/RELNOTES
/usr/doc/dhcp-2.0/dhcpd.conf.sample
/ usr / man / man5 / dhcp-options.5.gz
/usr/man/man5/dhcpd.conf.5.gz
/usr/man/man5/dhcpd.leases.5.gz
/usr/man/man8/dhcpd.8.gz
/usr/man/man8/dhcrelay.8.gz
/ usr / sbin / dhcpd
/ usr / sbin / dhcrelay
/ var / state / dhcp
, of which two are more important :
One is, /etc/rc.d/init.d/dhcpd, which can be used to control the behavior of the dhcp server, such as:
start: /etc/rc.d/init.d/dhcpd start
stop: / etc / rc .d / init.d / dhcpd stop
restart: /etc/rc.d/init.d/dhcpd restart
Observe the operation status: /etc/rc.d/init.d/dhcpd status The
other is, / usr / doc /dhcp-2.0/dhcpd.conf.sample
(RedHat 7.0 in /usr/share/doc/dhcp-2.0)
As the name implies, this is a configuration file of the dhcp server, we will copy it to / etc , And named dhcpd.conf.
(C) cp /usr/doc/dhcp-2.0/dhcpd.conf.sample /etc/dhcpd.conf
2) Configuration:
Then, you can start the configuration file for dhcp server / etc / dhcpd.conf to do the setting work. The
following is the original content of the file:
subnet 192.168.0.0 netmask 255.255.255.0 {
# --- default gateway
option routers 192.168.0.1;
option subnet-mask 255.255.255.0;
option nis-domain "" domain.org "";
option domain-name "" domain.org "";
option domain-name-servers 192.168.1.1;
3) option time-offset -5; # Eastern Standard Time
# option ntp-servers 192.168.1.1;
# option netbios-name-servers 192.168.1.1;
# --- Selects point -to-point node (default is hybrid). Don``t change this unless
#-you understand Netbios very well
# option netbios-node-type 2;
4) range dynamic-bootp 192.168.0.128 192.168.0.255;
default-lease- time 21600;
max-lease-time 43200;
5) we want the nameserver to appear at a fixed address
host ns {
next-server marvin.redhat.com;
hardware ethernet 12: 34: 56: 78: AB: CD;
fixed-address 207.175.42.254;
}
}
6) Junior High School as an example, the school is the first half of 1/2 C) subnet 163.26.167.0 netmask 255.255.255.128 {
# --- default gateway
# router IP
7) option routers 163.26.197.126;
# network mask
option subnet -mask 255.255.255.128;
# Domain
option domain-name "" jmjh.tnc.edu.tw "";
# Specify which DNS servers to dispatch to provide services?
option domain-name-servers 163.26.167.1, 163.26.200.1 , 168.95.1.1;
option time-offset -5; # Eastern Standard Time
8) Dynamic allocation of IP fence
range dynamic-bootp 163.26.167.50 163.26.167.100;
9) IP lease time
default-lease-time 21600;
max-lease-time 43200;
10) Set your school βs DNS host to a fixed IP
# we want the nameserver to appear at a fixed address
host ns {
next-server dns.jmjh.tnc.edu.tw;
hardware ethernet 12: 34: 56: 78: AB: CD;
fixed-address 163.26.167.1;
}
} In the
11) above settings, please follow Your school configuration, modify it
by yourself . It should be noted that:
(a) host ns {
next-server dns.jmjh.tnc.edu.tw;
hardware ethernet 12: 34: 56: 78: AB: CD; --- > This is the number of the DNS host network card (6 bytes), please use ifconfig to query, as follows:
fixed-address 163.26.167.1;
}
ifconfig got:
eth0 Link encap: Ethernet HWaddr 48: 54: E8: 26: CC: C9
inet addr: 163.26.167.1 Bcast: 163.26.167.127 Mask: 255.255.255.128
UP BROADCAST RUNNING MULTICAST MTU: 1500 Metric: 1
RX packets: 762193 errors: 0 dropped: 0 overruns: 0 frame: 0
TX packets: 555401 errors: 0 dropped : 0 overruns: 0 carrier: 0
collisions: 0 txqueuelen: 100
Interrupt: 11 Base address: 0x8000
12) take HWaddr 48: 54: E8: 26: CC: C9 48: 54: E8: 26: CC: C9
fill in the above The hardware ethernet setting is sufficient.
π¦ Special attention: your school βs network card number (each card is unique globally) must not be the same as this one, please do not copy the settings here!
(b) This dhcp server can Coexist with the original dhcp server on NT / W2K, but please note that the IP allocation segment should be staggered.
So, in the end, which dhcp server the workstation will get dynamic allocation?
Very simple, when the workstation sends a request (request ) Message, whoever grabs it first will provide it first.
3) Execution:
/etc/rc.d/init.d/dhcpd start
will not succeed the first time,
If it is dhcp-2.0-5 version, it will show a failed red string and warn you:
/var/state/dhcp/dhcpd.leases This file does not exist, so you must manually open a new file:
touch / var /state/dhcp/dhcpd.leases
4) this purpose archives are: IP recording situation lease of each workstation.
5) if the DHCP-2.0-12 later version, it will not appear any message, you will find that it is not up and running.
6) this is Because: Once this version finds that you have not opened this file, it will jump out without running.
And the location of this file is slightly different:
it is located in /var/lib/dhcp/dhcpd.leases
OK, open it manually ?!
touch /var/lib/dhcp/dhcpd.leases
7) can now be started, and set it to run automatically upon booting (either linuxconf or ntsysv can be set)
/etc/rc.d/init.d/dhcpd start
Congratulations ! Your school already has a very stable DHCP server!
π¦ Note:
8) If you have a Linux firewall, you want to allocate the DHCP server from a certain network card (one network card represents a network segment),
for example: Zhang network card interface eth1 dispensed, as long as the modifications to /etc/rc.d/init.d/dhcpd.
π¦ follows:
9) the start daemons place
by the:
daemon / usr / sbin / dhcpd
10) changed to:
daemon / usr / sbin / dhcpd eth1
π¦Conclusion:
11) DHCP Server is a very important weapon in network management work. It is also wise to set up more than two backups.
And, from then on, you can no longer rely on NT / W2K this poor and unstable performance (PE ratio is too low) of the system.
(not necessarily limited to a particular one closed the company, but does not have to cost a lot, is the primary and secondary schools network Build, the best PE ratio choice!)
π¦ Don t clone without credits
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
range dynamic-bootp 163.26.167.50 163.26.167.100;
9) IP lease time
default-lease-time 21600;
max-lease-time 43200;
10) Set your school βs DNS host to a fixed IP
# we want the nameserver to appear at a fixed address
host ns {
next-server dns.jmjh.tnc.edu.tw;
hardware ethernet 12: 34: 56: 78: AB: CD;
fixed-address 163.26.167.1;
}
} In the
11) above settings, please follow Your school configuration, modify it
by yourself . It should be noted that:
(a) host ns {
next-server dns.jmjh.tnc.edu.tw;
hardware ethernet 12: 34: 56: 78: AB: CD; --- > This is the number of the DNS host network card (6 bytes), please use ifconfig to query, as follows:
fixed-address 163.26.167.1;
}
ifconfig got:
eth0 Link encap: Ethernet HWaddr 48: 54: E8: 26: CC: C9
inet addr: 163.26.167.1 Bcast: 163.26.167.127 Mask: 255.255.255.128
UP BROADCAST RUNNING MULTICAST MTU: 1500 Metric: 1
RX packets: 762193 errors: 0 dropped: 0 overruns: 0 frame: 0
TX packets: 555401 errors: 0 dropped : 0 overruns: 0 carrier: 0
collisions: 0 txqueuelen: 100
Interrupt: 11 Base address: 0x8000
12) take HWaddr 48: 54: E8: 26: CC: C9 48: 54: E8: 26: CC: C9
fill in the above The hardware ethernet setting is sufficient.
π¦ Special attention: your school βs network card number (each card is unique globally) must not be the same as this one, please do not copy the settings here!
(b) This dhcp server can Coexist with the original dhcp server on NT / W2K, but please note that the IP allocation segment should be staggered.
So, in the end, which dhcp server the workstation will get dynamic allocation?
Very simple, when the workstation sends a request (request ) Message, whoever grabs it first will provide it first.
3) Execution:
/etc/rc.d/init.d/dhcpd start
will not succeed the first time,
If it is dhcp-2.0-5 version, it will show a failed red string and warn you:
/var/state/dhcp/dhcpd.leases This file does not exist, so you must manually open a new file:
touch / var /state/dhcp/dhcpd.leases
4) this purpose archives are: IP recording situation lease of each workstation.
5) if the DHCP-2.0-12 later version, it will not appear any message, you will find that it is not up and running.
6) this is Because: Once this version finds that you have not opened this file, it will jump out without running.
And the location of this file is slightly different:
it is located in /var/lib/dhcp/dhcpd.leases
OK, open it manually ?!
touch /var/lib/dhcp/dhcpd.leases
7) can now be started, and set it to run automatically upon booting (either linuxconf or ntsysv can be set)
/etc/rc.d/init.d/dhcpd start
Congratulations ! Your school already has a very stable DHCP server!
π¦ Note:
8) If you have a Linux firewall, you want to allocate the DHCP server from a certain network card (one network card represents a network segment),
for example: Zhang network card interface eth1 dispensed, as long as the modifications to /etc/rc.d/init.d/dhcpd.
π¦ follows:
9) the start daemons place
by the:
daemon / usr / sbin / dhcpd
10) changed to:
daemon / usr / sbin / dhcpd eth1
π¦Conclusion:
11) DHCP Server is a very important weapon in network management work. It is also wise to set up more than two backups.
And, from then on, you can no longer rely on NT / W2K this poor and unstable performance (PE ratio is too low) of the system.
(not necessarily limited to a particular one closed the company, but does not have to cost a lot, is the primary and secondary schools network Build, the best PE ratio choice!)
π¦ Don t clone without credits
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦END OF TUTORIAL FULL SETUP DHCP SERVER BY UNDERCODE
NOW LET S SEND SOME TERMUX-LINUX SCRIPT
NOW LET S SEND SOME TERMUX-LINUX SCRIPT
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Automater - IP URL and MD5 OSINT Analysis TERMUX-LINUX
fb.com/undercodeTesting
π¦ ππΌππ πππΈβπ :
π¦ Linux:
As this is a python script you will need to ensure you have the correct version of python, which for this script is python 2.7. I used mostly standard libraries, but just incase you don't have them, here are the libraries that are required: httplib2, re, sys, argparse, urllib, urllib2
1) With the python and the libraries out of the way, you can simply use git to clone the tekdefense code to your local machine.
<> git clone https://github.com/1aN0rmus/TekDefense-Automater.git
If you don't have git installed you can simply download the script from https://github.com/1aN0rmus/TekDefense-Automater/archive/master.zip
π¦ Usage:
2) Once installed the usage is pretty much the same across Windows, Linux, and Kali.
> python Automater.py -h
or if you chmod +x Automater.py you can
3) ./Automater.py -h
π¦ usage: Automater.py [-h] [-o OUTPUT] [-w WEB] [-c CSV] [-d DELAY] [-s SOURCE]
[--p]
target
IP, URL, and Hash Passive Analysis tool
positional arguments:
target List one IP Addresses, URL or Hash to query or pass
the filename of a file containing IP Addresses, URL or
Hash to query each separated by a newline.
π¦ optional arguments:
-h, --help show this help message and exit
-o OUTPUT, --output OUTPUT
This option will output the results to a file.
-w WEB, --web WEB This option will output the results to an HTML file.
-c CSV, --csv CSV This option will output the results to a CSV file.
-d DELAY, --delay DELAY
This will change the delay to the inputted seconds.
Default is 2.
-s SOURCE, --source SOURCE
This option will only run the target against a
specific source engine to pull associated domains.
Options are defined in the name attribute of the site
element in the XML configuration file
--p This option tells the program to post information to
sites that allow posting. By default the program will
NOT post to sites that require a post.
4) To run Automater against a target ip, hash, url, or file simply type
> Python Automater.py <target>
5) python Automater.py 37.221.161.215
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Automater - IP URL and MD5 OSINT Analysis TERMUX-LINUX
fb.com/undercodeTesting
π¦ ππΌππ πππΈβπ :
π¦ Linux:
As this is a python script you will need to ensure you have the correct version of python, which for this script is python 2.7. I used mostly standard libraries, but just incase you don't have them, here are the libraries that are required: httplib2, re, sys, argparse, urllib, urllib2
1) With the python and the libraries out of the way, you can simply use git to clone the tekdefense code to your local machine.
<> git clone https://github.com/1aN0rmus/TekDefense-Automater.git
If you don't have git installed you can simply download the script from https://github.com/1aN0rmus/TekDefense-Automater/archive/master.zip
π¦ Usage:
2) Once installed the usage is pretty much the same across Windows, Linux, and Kali.
> python Automater.py -h
or if you chmod +x Automater.py you can
3) ./Automater.py -h
π¦ usage: Automater.py [-h] [-o OUTPUT] [-w WEB] [-c CSV] [-d DELAY] [-s SOURCE]
[--p]
target
IP, URL, and Hash Passive Analysis tool
positional arguments:
target List one IP Addresses, URL or Hash to query or pass
the filename of a file containing IP Addresses, URL or
Hash to query each separated by a newline.
π¦ optional arguments:
-h, --help show this help message and exit
-o OUTPUT, --output OUTPUT
This option will output the results to a file.
-w WEB, --web WEB This option will output the results to an HTML file.
-c CSV, --csv CSV This option will output the results to a CSV file.
-d DELAY, --delay DELAY
This will change the delay to the inputted seconds.
Default is 2.
-s SOURCE, --source SOURCE
This option will only run the target against a
specific source engine to pull associated domains.
Options are defined in the name attribute of the site
element in the XML configuration file
--p This option tells the program to post information to
sites that allow posting. By default the program will
NOT post to sites that require a post.
4) To run Automater against a target ip, hash, url, or file simply type
> Python Automater.py <target>
5) python Automater.py 37.221.161.215
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated Findomain has a Plus version that provides a lot of additional features and a dedicated monitoring server hosted in Amazon, performance improvements and practical ways to configure and get it working.
instagram.com/undercodeTesting
π¦ FEATURES :
Subdomains monitoring: put data to Discord, Slack or Telegram webhooks. See Subdomains Monitoring for more information.
Multi-thread support for API querying, it makes that the maximun time that Findomain will take to search subdomains for any target is 15 seconds (in case of API's timeout).
Parallel support for subdomains resolution, in good network conditions can resolv about 3.5k of subdomains per minute.
DNS over TLS support.
Specific IPv4 or IPv6 query support.
Discover subdomains without brute-force, it tool uses Certificate Transparency Logs and APIs.
Discover only resolved subdomains.
Discover subdomains IP for data analisis.
Read target from user argument (-t) or file (-f).
Write to one unique output file specified by the user all or only resolved subdomains.
Write results to automatically named TXT output file(s).
Hability to query directly the Findomain database created with Subdomains Monitoring for previous discovered subdomains.
Hability to import and work data discovered by other tools.
Quiet mode to run it silently.
Cross platform support: Any platform, it's written in Rust and Rust is multiplatform. See the documentation for instructions.
Multiple API support.
Possibility to use as subdomain resolver.
Subdomain wildcard detection for accurate results.
Support for subdomain discover using bruteforce method.
Update checker. Use the --check-updates flag.
π¦ ππΌππ πππΈβπ :
$ git clone https://github.com/Edu4rdSHL/findomain.git -b develop # Only the develop branch is needed
$ cd findomain
$ cargo build --release
$ ./target/release/findomain
π¦ To update the repository when new commits are added, just go to the folder where Findomain's develop branch was cloned and excute:
$ git pull
$ cargo build --release
$ ./target/release/findomain
@uNDERCODEoFFICIAL
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated Findomain has a Plus version that provides a lot of additional features and a dedicated monitoring server hosted in Amazon, performance improvements and practical ways to configure and get it working.
instagram.com/undercodeTesting
π¦ FEATURES :
Subdomains monitoring: put data to Discord, Slack or Telegram webhooks. See Subdomains Monitoring for more information.
Multi-thread support for API querying, it makes that the maximun time that Findomain will take to search subdomains for any target is 15 seconds (in case of API's timeout).
Parallel support for subdomains resolution, in good network conditions can resolv about 3.5k of subdomains per minute.
DNS over TLS support.
Specific IPv4 or IPv6 query support.
Discover subdomains without brute-force, it tool uses Certificate Transparency Logs and APIs.
Discover only resolved subdomains.
Discover subdomains IP for data analisis.
Read target from user argument (-t) or file (-f).
Write to one unique output file specified by the user all or only resolved subdomains.
Write results to automatically named TXT output file(s).
Hability to query directly the Findomain database created with Subdomains Monitoring for previous discovered subdomains.
Hability to import and work data discovered by other tools.
Quiet mode to run it silently.
Cross platform support: Any platform, it's written in Rust and Rust is multiplatform. See the documentation for instructions.
Multiple API support.
Possibility to use as subdomain resolver.
Subdomain wildcard detection for accurate results.
Support for subdomain discover using bruteforce method.
Update checker. Use the --check-updates flag.
π¦ ππΌππ πππΈβπ :
$ git clone https://github.com/Edu4rdSHL/findomain.git -b develop # Only the develop branch is needed
$ cd findomain
$ cargo build --release
$ ./target/release/findomain
π¦ To update the repository when new commits are added, just go to the folder where Findomain's develop branch was cloned and excute:
$ git pull
$ cargo build --release
$ ./target/release/findomain
@uNDERCODEoFFICIAL
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Findomain/Findomain: The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTPβ¦
The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, subdomain monitoring, alerts via Discord, Slack and Telegram, ...
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ What is a Reverse Proxy vs. Load Balancer?
t.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
1) Load Balancing
Load balancers are most commonly deployed when a site needs multiple servers because the volume of requests is too much for a single server to handle efficiently. Deploying multiple servers also eliminates a single point of failure, making the website more reliable.
> Most commonly, the servers all host the same content, and the load balancerβs job is to distribute the workload in a way that makes the best use of each serverβs capacity, prevents overload on any server, and results in the fastest possible response to the client.
π¦ 2) Reverse Proxy
> Whereas deploying a load balancer makes sense only when you have multiple servers, it often makes sense to deploy a reverse proxy even with just one web server or application server.
> You can think of the reverse proxy as a websiteβs βpublic face.β Its address is the one advertised for the website, and it sits at the edge of the siteβs network to accept requests from web browsers and mobile apps for the content hosted at the website. The benefits are two-fold:
1) Increased security β No information about your backend servers is visible outside your internal network, so malicious clients cannot access them directly to exploit any vulnerabilities. Many reverse proxy servers include features that help protect backend servers from distributed denial-of-service (DDoS) attacks, for example by rejecting traffic from particular client IP addresses (blacklisting), or limiting the number of connections accepted from each client.
2) Increased scalability and flexibility β Because clients see only the reverse proxyβs IP address, you are free to change the configuration of your backend infrastructure. This is particularly useful In a load-balanced environment, where you can scale the number of servers up and down to match fluctuations in traffic volume.
π¦ Another reason to deploy a reverse proxy is for web acceleration β reducing the time it takes to generate a response and return it to the client. Techniques for web acceleration include the following:
1) Compression β Compressing server responses before returning them to the client (for instance, with gzip) reduces the amount of bandwidth they require, which speeds their transit over the network.
2) SSL termination β Encrypting the traffic between clients and servers protects it as it crosses a public network like the Internet. But decryption and encryption can be computationally expensive. By decrypting incoming requests and encrypting server responses, the reverse proxy frees up resources on backend servers which they can then devote to their main purpose, serving content.
3) Caching β Before returning the backend serverβs response to the client, the reverse proxy stores a copy of it locally. When the client (or any client) makes the same request, the reverse proxy can provide the response itself from the cache instead of forwarding the request to the backend server. This both decreases response time to the client and reduces the load on the backend server.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ What is a Reverse Proxy vs. Load Balancer?
t.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
1) Load Balancing
Load balancers are most commonly deployed when a site needs multiple servers because the volume of requests is too much for a single server to handle efficiently. Deploying multiple servers also eliminates a single point of failure, making the website more reliable.
> Most commonly, the servers all host the same content, and the load balancerβs job is to distribute the workload in a way that makes the best use of each serverβs capacity, prevents overload on any server, and results in the fastest possible response to the client.
π¦ 2) Reverse Proxy
> Whereas deploying a load balancer makes sense only when you have multiple servers, it often makes sense to deploy a reverse proxy even with just one web server or application server.
> You can think of the reverse proxy as a websiteβs βpublic face.β Its address is the one advertised for the website, and it sits at the edge of the siteβs network to accept requests from web browsers and mobile apps for the content hosted at the website. The benefits are two-fold:
1) Increased security β No information about your backend servers is visible outside your internal network, so malicious clients cannot access them directly to exploit any vulnerabilities. Many reverse proxy servers include features that help protect backend servers from distributed denial-of-service (DDoS) attacks, for example by rejecting traffic from particular client IP addresses (blacklisting), or limiting the number of connections accepted from each client.
2) Increased scalability and flexibility β Because clients see only the reverse proxyβs IP address, you are free to change the configuration of your backend infrastructure. This is particularly useful In a load-balanced environment, where you can scale the number of servers up and down to match fluctuations in traffic volume.
π¦ Another reason to deploy a reverse proxy is for web acceleration β reducing the time it takes to generate a response and return it to the client. Techniques for web acceleration include the following:
1) Compression β Compressing server responses before returning them to the client (for instance, with gzip) reduces the amount of bandwidth they require, which speeds their transit over the network.
2) SSL termination β Encrypting the traffic between clients and servers protects it as it crosses a public network like the Internet. But decryption and encryption can be computationally expensive. By decrypting incoming requests and encrypting server responses, the reverse proxy frees up resources on backend servers which they can then devote to their main purpose, serving content.
3) Caching β Before returning the backend serverβs response to the client, the reverse proxy stores a copy of it locally. When the client (or any client) makes the same request, the reverse proxy can provide the response itself from the cache instead of forwarding the request to the backend server. This both decreases response time to the client and reduces the load on the backend server.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β