UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Network test commands that must be learned
t.me/UndercodeTesting


>Understanding and mastering the following three commands will help y ou detect the network fault faster, thereby saving time and improving efficiency.

πŸ¦‘ ping

Ping is a very useful tool for testing network connection status and packet sending and receiving status. It is the most commonly used command for network testing. Ping sends a loopback request packet to the target host (address, 2189), asking the target host to give a reply after receiving the request, thereby judging whether the network's response πŸ¦‘time and local machine are connected to the target host (address, 2189).

If the ping is unsuccessful, you can predict the failure in the following aspects: network cable failure, incorrect network adapter configuration, incorrect IP address. If the ping is successful and the network is still unavailable, the problem is probably in the software configuration of the network system. Successful ping can only guarantee that there is a connected physical path between the machine and the target host.

πŸ¦‘Command format:

ping ip address or host name [-t] [-a] [-n count] [-l size]

Parameter meaning:

-t sends data to the target host non-stop;
-a displays the network address of the target host in ip address format;
-n count specifies how many times to ping, the specific number is specified by count;
-l size specifies the number sent to the target host The size of the packet.

πŸ¦‘ For example, when your machine cannot access the internet, first of all, you want to confirm whether it is the failure of the local LAN. Assuming that the IP address of the proxy server on the LAN is 192.168.1.1, you can use the ping 192.168.1.1 command to check whether the machine is connected to the proxy server. As another example, the common command to test whether the local network card is installed correctly is ping 127.0.0.1.

πŸ¦‘tracert

The tracert command is used to display the path that the data packet traverses to the target host and the time to reach each node. The command function is similar to ping, but the information it obtains is much more detailed than the ping command. It displays the entire path taken by the packet, the node's IP, and the time it takes. This command is more suitable for large networks.

πŸ¦‘ Command format:

tracert ip address or host name [-d] [-h maximumhops] [-j host_list] [-w timeout]

Parameter meaning:

-d Does not resolve the name of the target host;
-h maximum_hops specifies the maximum number of hops to the target address;
-j host_list releases the source route according to the address in the host list;
-w timeout specifies the timeout interval, the default time unit of the program is milliseconds .

For example, if you want to know the detailed transmission path information between your computer and the target host www.cce.com.cn, you can enter tracert www.cce.com.cn in ms-dos mode.

πŸ¦‘ If we add some parameters after the tracert command, we can also detect other more detailed information. For example, use the parameter -d to specify that the program also resolves the domain name of the target host when tracking the path information of the host.

netstat

The netstat command can help network administrators understand the overall usage of the network. It can display the detailed information of the currently active network connection, such as displaying network connection, routing table and network interface information. It can count the total number of network connections currently in operation.

Using command parameters, the command can display the usage status of all protocols, such as tcp protocol, udp protocol and ip protocol, etc. In addition, you can select a specific protocol and view its specific information, but also display the port number of all hosts and the current host Detailed routing information.

> Command format:

netstat [-r] [-s] [-n] [-a]

Parameter meaning:
-r displays the content of the local routing table;
-s displays the usage status of each protocol (including tcp protocol, udp protocol, ip protocol, 2189);
-n displays the address and port in the form of a digital table;
-a displays the host computer The port number.
witten by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ helpful Networking tests
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘15 ways to speed up computer startup
by undercode :
Specialy for old windows
Fb.com/UndercodeTesting

It is a common problem for every computer fan that computer startup is too slow. Here are the fifteen tricks to speed up computer startup collected by the hacking team. Some of them have not been tried.



1. Bios optimization settings

On the home page of bios settings, we enter the "advanced bios features" option, move the cursor to the "frist boot device" option, press "pageup" and "pagedown" to select, the default value is "floppy", this It means that the system will first read the boot information from the floppy drive during startup. Doing so will increase the startup time of the machine and shorten the life of the floppy drive. So we have to choose "hdd-0" to boot directly from the hard disk, so that the boot will be fast for a few seconds. In addition, it is recommended to select "disabled" for "above 1mbmemorytest" in the bios settings, and to enable for "quickpoweronselftest".

The settings in the "advanced chipset features" item have a great impact on the acceleration of the machine, please pay more attention. Change "bank 0/1 dram timing" from "8ns / 10ns" to "fast" or "turbo". "Turbo" is faster than "fast", but not very stable, it is recommended to choose "fast". If the quality of the memory is good, you can choose "turbo" to try. If it is unstable, you can change it back to "fast".

It is recommended to set "2" in the "sdram cas latency" option for memory modules with good memory quality, which can speed up the speed.

Newer motherboards support agp4x. If your graphics card also supports agp4x, then activate this option at "agp-4xmode", that is, select "enabled". This will make better use of the capabilities of the graphics card and speed up the system. Start speed.

2. Start DMA mode to increase hard disk speed

The maximum transfer rate of hard disks using udma / 33, 66, 100 technology is 33mb / s, 66mb / s, 100mb / s, which is theoretically the ide hard disk (here refers to the pio mode4 mode, its transfer rate is 16.6mb / s ) The transmission rate is 3 to 6 times, but in the default setting in windows, dma is disabled, so we must turn it on.

The specific method is: open the "Control Panel β†’ System β†’ Device Manager" window, expand the "Disk Drive" branch, double-click the icon of the udma hard disk, enter "Properties β†’ Settings β†’ Options", "√" in front of the "dma" item, then Press OK to close all dialog boxes and restart the computer.

Third, remove the boot logo of windows

First you have to open "Start" β†’ "Settings" β†’ "Binder Options" and check "Show all files" from the "Advanced Settings" list box in the "View" tab. Then open the c drive, find the file msdos.sys, and cancel its "read-only" attribute, open it, add a line of statements under the "option" paragraph: logo = 0, so that the boot logo of windows will not be Loading and running, the boot time can also be shortened by 3 seconds.

Fourth, optimize the "start" group

Computer beginners love to try various software and delete it in a short time, but often because of some inexplicable reasons, these software will still reside in the "startup" project (especially when using some version d software ), Windows will waste a lot of time when it starts. To solve this problem, it is actually very simple, you can open "Start" β†’ "Run", select "msconfig" in the "Open" column of the dialog box that appears, and then click "OK", it will bring up the "System Configuration" "Utilities", click on the "Startup" tab to remove the "√" in front of the program that does not need to load the startup group. In this way, the startup time can be shortened by at least 10 seconds.

5. Organize and optimize the registry
After Windows starts up, the system should read the relevant information in the registry and temporarily store it in the ram (memory). Most of the time that Windows starts up is spent on this. Therefore, it is necessary to organize and optimize the registry. For the optimization of the registry, you can use software such as windows optimization master. Use windows optimization master, click "Registration Information Cleanup" β†’ "Scan", the software will automatically clean up the rubbish in the registry for you. After the scan, a menu will pop up to let you choose whether to back up the registry, it is recommended to choose backup, After backup, click "Clear".

6. Frequent maintenance system

If too many games, too many application software, too many old materials are installed in the system, your computer will run slower and slower, and the boot time will become longer and longer. Therefore, it is best to do a full maintenance of the computer every once in a while. Click "Start" β†’ "Programs" β†’ "Accessories" β†’ "System Tools" β†’ "Maintenance Wizard", and then click "OK" button to perform a comprehensive maintenance of the computer, which will keep your computer in the best state . It is best to do "disk defragmentation" every two weeks for the hard disk, which will significantly speed up the program startup speed, click "System Tools" β†’ "disk defragmentation program". Note that when defragmenting the disk, the disk where the system is located must be defragmented in order to really speed up the startup sequence of windows.

Seven, expand the virtual memory capacity

If your hard disk is large enough, please open the "System" in the "Control Panel", open the "Virtual Memory" in the "Performance" option, select the second item: the user sets the virtual memory settings, pointing to a Use less hard disk, and set the maximum and minimum values ​​to a fixed value, about 2 times the size of physical memory. In this way, when using the hard disk in the virtual memory, there is no need to accommodate the large and small differences, and the fixed space is used as the virtual memory to speed up the access speed. The setting of virtual memory is best performed after "disk defragmentation", so that virtual memory is not in a continuous, non-fragmented file space, and can play a better role.

8. Remove fancy settings like "wallpaper" and "screen saver"

These settings take up system resources, not to mention that it also seriously affects the startup sequence of windows. The way to remove them is: click the right mouse button on a blank space on the desktop, select "Properties" in the pop-up menu, select the "Background" and "Screen Saver" tabs in the pop-up dialog box, and change the "Wallpaper" and "Screen" The "Protection Program" can be set to "None".

Nine, delete autoexec.bat and config.sys

The two files autoexec.bat and config.sys in the root directory of the system installation disk are no longer needed for windows, and you can safely delete them, which can speed up the startup speed of windows.

10. Streamline * .ini files, especially the contents of system.ini and win.ini

Many drivers and font files are loaded in the [boot] and [386enh] sections of system.ini, which is the focus of clearing. In particular, note that the shell = explorer.exe in the [boot] field is the hidden loading place that Trojans like. Trojans usually change this sentence to this: shell = explorer.exe file.exe, pay attention to the file here. Exe is the Trojan server program! The loading and running of the Trojan horse not only poses a threat to system security, but also slows down the startup of the computer. Programs loaded after "run" and "load" in win.ini that are not required to run every time can be temporarily removed. , And then click Run when you want to use it in the future. In this way, the related files called by windows during booting will be reduced a lot, and the starting speed will naturally be much faster.

11. Turn off Disk Scan

Open msdos.sys with a text editor and you will see the following:
[options]
bootmulti = 1
bootgui = 1
autoscan = 1

If you do not want to run the disk scan program after an abnormal shutdown, you can change atuoscan = 1 to autoscan = 0, so that the computer will start faster after an abnormal shutdown (because scandisk is not running).

12. Minimize the duration of the guidance information

Open msdos.sys with a text editor and set bootdelay in [options] to 0.

13. Reduce unnecessary font files

Font files take up a lot of system resources, are slow to boot, and take up a lot of hard disk space. So try to reduce unnecessary font files. But if the wrong font file is deleted, it will make windows abnormal. Therefore, the following "stealing beams and columns" method can be used (the font file can be installed without occupying a lot of disk space): first open the font binder (such as f: \ zk), select all truetype font files, and use the right mouse button Drag them to the c: \ windows \ fonts binder, and select "Create Shortcut at Current Position" in the pop-up menu, so that you can create a shortcut to the font file under the system's font binder. When you need to use these font files, you only need to insert the font disc and remove it when not in use.

14. Delete redundant dll files

There are many dll files in the system subdirectory of the window operating system. These files may be shared by many files, but some do not have a file to use it, which means that these files are useless, in order not to occupy hard disk space and Increase the startup speed, you can delete it.

Fifteen, the "side door left" approach

If the system is suspended, the current system state will be saved after shutdown. After the next startup, the system will directly enter the desktop before the last shutdown. In this way, the startup time can reach 4-5 seconds at the fastest, but not all All of the motherboard bios are supported, and it is a little troublesome to set up.

Open the registry and expand to the hkey_local_machine \ software \ microsoft \ windows \ currentversion \ shareddlls subkey. There are many dll files on the right. If the data is 0, it can be determined that the dll file is not shared by the program. You can delete it.


WRITTEN BY UNDERCODER
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ 15 tips speed up windows by undercode
# SUPPORT & SHARE :

T.me/UndercodeTesting
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Novices must master basic DOS commands BY UNDERCODE

The hacker group's article is to write some commands that novices must master. Let's take a look at the novices. After reading it, you will get something.
πŸ¦‘ One, ping

It is a command used to check whether the network is smooth or the network connection speed. As an administrator or hacker living on the network, the ping command is the first DOS command that must be mastered. The principle it uses is this: machines on the network have uniquely determined IP addresses, and we give the target If the IP address sends a data packet, the other party will return a data packet of the same size. Based on the returned data packet, we can determine the existence of the target host, and can initially determine the operating system of the target host. Let's take a look at some of its commonly used operations. First look at the help, type: ping /? Enter, in the DOS window. The help screen shown. Here, we only need to grasp some basic useful parameters.

-t means to send data packets to the target IP without interruption until we force it to stop. Imagine if you use 100M broadband access and the target IP is a 56K kitten, then it will not take long for the target IP to be dropped because it cannot withstand so much data. Haha, an attack is so simple to achieve.

-l defines the size of the data packet sent, the default is 32 bytes, we can use it to define up to 65500 bytes. Combined with the -t parameter introduced above, there will be better results.

-n defines the number of data packets sent to the target IP, the default is 3 times. If the network speed is slow, 3 times is also a waste of time for us, because now our purpose is only to determine whether the target IP exists, then define it as one time.

Explain that if the -t parameter and the -n parameter are used together, the ping command is based on the parameter that is placed behind, such as "ping IP -t -n 3". Although the -t parameter is used, it is not always pinged. , But only ping 3 times. In addition, the ping command does not necessarily have to ping the IP, you can also directly ping the host domain name, so you can get the IP of the host.

Below we give an example to illustrate the specific usage.

Here time = 2 means that the time taken from sending a data packet to receiving a data packet is 2 seconds, from which you can judge the size of the network connection speed. The return value from TTL can preliminarily judge the operating system of the pinged host. The reason for saying "preliminary judgment" is because this value can be modified. Here TTL = 32 indicates that the operating system may be win98.

(Tips: If TTL = 128, it means that the target host may be Win2000; if TTL = 250, then the target host may be Unix)

As for using the ping command to quickly find LAN faults, you can quickly search for the fastest QQ server, and you can ping other people ... these are all on your own.
πŸ¦‘Second, nbtstat

This command uses NetBIOS over TCP / IP to display the protocol statistics and the current TCP / IP connection. Using this command you can get the NETBIOS information of the remote host, such as the user name, the workgroup to which it belongs, and the MAC address of the network card. Here we need to understand a few basic parameters.

-a Use this parameter, as long as you know the machine name of the remote host, you can get its NETBIOS information.

-A This parameter can also get the NETBIOS information of the remote host, but you need to know its IP.

-n List the NETBIOS information of the local machine.

When you get the other party's IP or machine name, you can use the nbtstat command to further obtain the other party's information, which increases the insurance factor of our invasion.
πŸ¦‘ Three, netstat

This is a command to check the network status, easy to operate and powerful.

-a View all the open ports of the local machine, you can effectively find and prevent Trojans, you can know the information about the services opened by the machine.

Here we can see that the local machine is open with FTP service, Telnet service, mail service, WEB service, etc. Usage: netstat -a IP.

-r List the current routing information, tell us the local machine's gateway, subnet mask and other information. Usage: netstat -r IP.

Four, tracert

Tracking routing information, use this command to find out all the paths through which data is transmitted from the local machine to the target host, which is very helpful for us to understand the network layout and structure.

This shows that the data is transferred from the local machine to the 192.168.0.1 machine without any transfer between them, indicating that the two machines are in the same LAN. Usage: tracert IP.

Five, net

This command is the most important one of the network commands. You must thoroughly understand the usage of each of its subcommands, because its function is too powerful. This is simply the best intrusion tool provided by Microsoft. First let's take a look at the subcommands it has, type net /? Enter

Here, we focus on several commonly used subcommands for intrusion.

net view

Use this command to view all shared resources of the remote host. The command format is net view \\ IP.

net use

Map a shared resource of a remote host as a local drive letter, and the graphical interface is easy to use, huh, huh. The command format is net use x: \\ IP \ sharename. The previous one indicates that the shared directory named magic of 192.168.0.5IP is mapped to the local Z disk. The following means establishing an IPC $ connection with 192.168.0.7 (net use $ "> \\ IP \ IPC $" password "/ user:" name "),

After the IPC $ connection is established, hehe, you can upload files: copy nc.exe $ "> \\ 192.168.0.7 \ admin $, which means that nc.exe in the local directory is transferred to the remote host The other DOS commands can be invaded.

net start

Use it to start services on remote hosts. After you establish a connection with a remote host, what if you find that its service has not been started, and you want to use this service? Just use this command to start it. Usage: net start servername, as shown in Figure 9, successfully started the telnet service.

net stop

What should I do if a service on the remote host is hindered after the invasion? Use this command to stop and it is ok, the usage is the same as net start.
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ View information related to accounts, including creating new accounts, deleting accounts, viewing specific accounts, activating accounts, disabling accounts, etc. This is very beneficial to our invasion, and most importantly, it provides a premise for us to clone the account. Type net user without parameters to view all users, including those that have been disabled. Explained separately below.

1, net user abcd 1234 / add, create a new account named abcd, password 1234, default is a member of the user group.
2. Net user abcd / del, delete the user whose user name is abcd.
3, net user abcd / active: no, disable the user whose user name is abcd.
4, net user abcd / active: yes, activate the user whose user name is abcd.
5, net user abcd, view the situation of the user whose user name is abcd

net localgroup

View all information related to user groups and perform related operations. Type net localgroup without parameters to list all current user groups. During the intrusion process, we generally use it to promote an account to the administrator group account, so that we can use this account to control the entire remote host. Usage: net localgroup groupname username / add.

Now we add the newly created user abcd to the administrator group. At this time, the abcd user is already a super administrator. Ha ha, you can use net user abcd to check his status. come out. But this is too obvious, the network administrator can leak the flaws at a glance, so this method can only deal with the rookie network administrator, but we still have to know. The current method is to use other tools and means to clone a super administrator that the network administrator cannot see. This is a later story.

net time

This command can view the current time of the remote host. If your goal is only to enter the remote host, then this command may not be used. But the simple invasion succeeded, is it just a look? We need to penetrate further. This requires that even the current time of the remote host needs to be known, because time and other means (to be described later) can be used to achieve the regular start of a command and program, laying a foundation for our further invasion. Usage: net time \\ IP.

Six, at

The purpose of this command is to schedule a specific command and procedure to be executed on a specific date or time (know that net time is important?). When we know the current time of the remote host, we can use this command to let it execute a program and command at a later time (such as 2 minutes later). Usage: at time command \\ computer.

It means that at 6:55, let the computer named a-01 start the telnet service (here net start telnet is the command to start the telnet service).

Seven, ftp

Everyone should be familiar with this command, right? There are many ftp hosts open on the network, and a large part of them are anonymous, which means anyone can log in. Now if you scan to a host with open ftp service (usually a machine with port 21 opened), what if you still don't use the ftp command? The basic method of using ftp command is given below.

πŸ¦‘First type ftp in the command line, the ftp prompt appears, at this time you can type "help" to view the help (any DOS command can use this method to view its help).

You may see, how to use so many commands? In fact, it is not so much used, a few basics are enough.

The first is the login process, which is going to use open. Enter "open host IP ftp port" directly at the ftp prompt and press Enter. The default port is 21 by default and you can not write. The next step is to enter a valid user name and password to log in. Here we introduce anonymous ftp as an example.

The username and password are both ftp, and the password is not displayed. When prompted **** logged in, it means the login is successful. Because it is an anonymous login, the user appears as Anonymous.

Next, we will introduce the use of specific commands.
dir is the same as the DOS command. It is used to view the files on the server. Just hit dir and press Enter to see the files on the ftp server.
cd into a folder.
get Download the file to the local machine.
put upload files to a remote server. It depends on whether the remote ftp server gives you write permission. If you can, huh, huh, not much to say about how to use it. Let's play freely.
delete Delete files on the remote ftp server. This must also ensure that you have write permissions.
bye Quits the current connection.
quit Ibid.

Eight, telnet

Powerful remote login command, almost all intruders like to use it, after many trials. why? It is simple to operate, just like using your own machine, as long as you are familiar with DOS commands, after successfully connecting to the remote machine as administrator, you can use it to do everything you want to do. Here's how to use it, first type telnet to enter, then type help to view its help information.

Then type open IP at the prompt and press Enter. At this time, a login window appears, allowing you to enter a valid user name and password. Any password entered here will not be displayed.
When the user name and password are entered correctly, the telnet connection is successfully established. At this time, you have the same permissions as the user on the remote host. You can use the DOS command to achieve what you want to do. Here I use the super administrator rights to log in.

So far, the introduction of network DOS commands has come to an end. The purpose of the introduction here is just to give the rookie network administrator an impression and let him know the importance of familiarity and mastering the network DOS commands. In fact, the DOS commands related to the network are far more than that, here is just a trick, hoping to help the majority of rookie network administrators. Learning DOS is a great help for being a good network administrator, and is particularly proficient in some network DOS commands.

In addition, everyone should be clear that anyone who wants to enter the system must have a valid user name and password (the input method vulnerability is almost extinct), even if you only have a small permission to the account, you can use it To achieve the final goal. Therefore, to eliminate blank passwords and add a strong password to your account is the best way to prevent weak password intrusion.

Cultivating good security awareness is the most important.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ FULL DOS COMMANDS BEGINERS & PRO
πŸ¦‘ 110 K PRE COMBO PROXIES- Gaming, Banking, Shopping, Try Other Sites too. User:Pass @UNDERCODETESTING