UNDERCODE COMMUNITY
2.7K subscribers
1.24K photos
31 videos
2.65K files
81.2K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
πŸ¦‘Only when there are too many files to pack in webpack, you need to use happypack for optimization, because it takes time to start multiple processes, so when there are few files, it is more time-consuming to use happypack to return

5) Pull away from the public module: For a multi-entry situation, if one or some modules are dependent on more than two files, then this module can be pulled out separately, without the need to package these common codes In the output file,

> this will cause code duplication and waste of traffic, that is, if there are two entry files index.js and other.js, they both depend on foo.js, then if you do not pull away from the public module, then foo.js The code in will be packaged into the final output index.js and other.js, that is, there are two copies of foo.js. It is also very simple to pull away from the public module, just configure it in optimization, such as
πŸ¦‘This will extract the public foo.js module into foo.js in the common directory, but if we also have multiple files that depend on third-party modules such as jquery, if configured as above,

> then jquery will also be packaged into foo In .js, it will cause code confusion, so we want to extract jquery separately, that is, separate from foo.js, we can copy more than one configuration, and achieve it by setting the weight of the code to be extracted, that is, priority to extract jquery, such as:
πŸ¦‘This will extract foo.js and jquery.js in the common directory at the same time. It should be noted that the extraction of the code must be that the module has not been excluded from packaging, that is, the module will be packaged into the output bundle, if If the third-party module has been excluded from packaging through externals, the above vendor configuration is invalid.

6) On-demand loading, that is, packaging and outputting only when it is needed. Webpack provides the import () method, passing in the module to be dynamically loaded to dynamically load the specified module.

> When webpack encounters the import () statement, The module will not be loaded immediately, but when the module is used, it will be loaded again, that is, it will be packaged together when it is packaged, but it will not be loaded immediately when it is loaded in the browser, but wait When it is used, load it again, for example, a certain module will be loaded after clicking the button, such as:
πŸ¦‘As you can see, import () returns a Promise object, which mainly uses JSONP to achieve dynamic loading. The res method returned will be different in different export methods. If you use module.exports output, then the returned res is the module .exports output results; if you are using ES6 module output, that is, export default output, the res result returned is res.default, such as:

> {default: "foo", __esModule: true, Symbol(Symbol.toStringTag): "Module"}

7) Turn on the module hot update: The module hot update can update the modified module without refreshing the web page, only compile the changed module, without repacking all the modules, greatly improving the development efficiency. In this case, every time the module is modified, it will be repackaged.

8) To enable hot update of the module, you only need to add hot: true in the devServer configuration. Of course, it is not enough to just enable the hot update of the module. We need to do some operations similar to monitoring. When the monitoring module changes, reload the module and execute, such as:
πŸ¦‘ EXPERT HACKING & PROGRAMMING TIPs BY UNDERCODE
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ FRESH PREM PROXIES 1 H DETAILED :


190.103.178.14 8080 1 hour ago
2266 ms 29% (66) us United States - Miami Gardens Anonymous -
182.160.104.213 8080 1 hour ago
3890 ms 24% (76) bd Bangladesh - Dhaka Transparent -
181.28.27.254 8080 1 hour ago
4006 ms 29% (73) ar Argentina Transparent -
181.188.166.74 8080 1 hour ago
3816 ms 26% (74) bo Bolivia Transparent -
185.21.217.20 3128 1 hour ago
453 ms 9% (67) au Australia - Sinnamon Park Elite -
181.49.103.246 999 1 hour ago
0 ms 0% (5) co Colombia Transparent -
181.113.225.114 8080 1 hour ago
3119 ms 29% (70) ec Ecuador - Guayaquil Transparent -
181.30.28.120 80 1 hour ago
2069 ms 69% (54) ar Argentina - Campana Transparent -
181.188.166.82 8080 1 hour ago
3108 ms 23% (61) bo Bolivia Transparent -
181.165.11.131 3128 1 hour ago
3689 ms 44% (60) ar Argentina - Buenos Aires Transparent -
181.30.28.120 8080 1 hour ago
1687 ms 64% (50) ar Argentina - Campana Transparent -
177.66.222.150 8081 1 hour ago
4746 ms 16% (63) br Brazil Transparent -


181.114.224.177 8080 1 hour ago
3814 ms 23% (71) ar Argentina - Mar del Plata Transparent -
176.235.80.104 9090 1 hour ago
3983 ms 8% (94) tr Turkey Transparent -
167.71.249.181 8888 1 hour ago
4736 ms 10% (96) us United States - Clifton Transparent -
178.250.92.18 8080 1 hour ago
2793 ms 21% (84) tr Turkey - Istanbul Transparent -
180.210.201.54 3128 1 hour ago
1706 ms 73% (48) sg Singapore - Singapore Transparent -
178.205.254.106 8080 1 hour ago
3000 ms 29% (71) ru Russia - Kazan’ Transparent -
177.185.157.146 8080 1 hour ago
2062 ms 50% (2) br Brazil Transparent -
178.57.106.6 8080 1 hour ago
0 ms 0% (2) ru Russia - Cherepovets Transparent -
177.93.96.100 8080 1 hour ago
3773 ms 12% (89) br Brazil Transparent -
178.176.240.49 8080 1 hour ago
4361 ms 12% (85) ru Russia Elite -
180.183.226.94 8080 1 hour ago
0 ms 0% (4) th Thailand - Chiang Mai Transparent -
177.5.221.66 8080 1 hour ago
4030 ms 14% (74) br Brazil - Dourados Transparent -
177.184.193.202 3128 1 hour ago
4413 ms 16% (76) br Brazil - Itu Transparent -
156.155.14.153 8080 1 hour ago
0 ms 0% (3) tz Tanzania Transparent -
170.233.164.192 8080 1 hour ago
3684 ms 30% (75) br Brazil - Cajobi Transparent -
177.152.143.74 8080 1 hour ago
2654 ms 27% (79) br Brazil - Barueri Transparent -
177.94.225.218 8080 1 hour ago
3638 ms 23% (72) br Brazil - JacareΓ­ Transparent -
177.130.49.201 8080 1 hour ago
2836 ms 22% (84) br Brazil - SantarΓ©m Transparent -
180.210.201.55 3129 1 hour ago
1764 ms 69% (61) sg Singapore - Singapore Transparent -
175.184.232.74 8080 1 hour ago
3905 ms 18% (75) id Indonesia - Jakarta Transparent -
174.32.139.218 87 1 hour ago
5074 ms 3% (94) us United States Transparent -
177.21.10.30 666 1 hour ago
3609 ms 25% (69) br Brazil - Salvador Transparent -
170.231.187.209 8091 1 hour ago
3961 ms 20% (76) br Brazil - Santa Rita do Sapucai Transparent -

@ Undercoders
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ What is a botnet?


>The botnet "botnet" is the vocabulary. "Bot" is the abbreviation of "robot", and "net" is "network connected by robots"; hackers who control other people's computers are called "bot herder".



>The device is infected by malicious programs and will become a "zombie computer" after being installed by "bot computer program", and then controlled by bot herder, through the command server (referred to as C & C or C2 server), to issue commands to the zombie computer to work. A botnet generally consists of hundreds or even millions of devices, including PCs, Macs, Linux servers, home routers, and smartphones.



The combination of these controlled devices, the power of the resources formed, can launch destructive and sophisticated attacks, such as sending hundreds of millions of spam emails, huge bandwidth distributed denial of service attacks (DDoS) and targeted Financial fraud.
πŸ¦‘How can a hacker crack your web server?
A) Web server vulnerability

1) web server is a program that stores files (usually web pages) and accesses them through the network or the Internet. The web server requires hardware and software. Attackers usually target attacks in software to obtain authorization to enter the server. Let's take a look at some common vulnerabilities exploited by attackers.

2) Default settings-Attackers can easily guess these settings, such as the default user ID and password. The default settings may also allow certain tasks to be performed, such as running available commands on the server.

3) Misconfigured operating system and network-If the user does not have a good password, certain configurations (such as allowing the user to execute commands on the server) may be dangerous.

4) Errors in the operating system and web server-Errors found in the operating system or web server software can also be used to gain unauthorized access to the system.
πŸ¦‘The type of Web server

The following is a list of common Web servers

1) Apache-This is a commonly used web server on the Internet. It is cross-platform, but it is usually installed on Linux. Most PHP websites are hosted on Apache servers.

2) Internet Information Service (IIS)-developed by Microsoft. It runs on Windows and is the second most used web server on the Internet. Most asp and aspx websites are hosted on IIS servers.

3) Apache Tomcat-Most Java server page (JSP) websites are hosted on such web servers.

4) Other web servers-including Novell's web server and IBM's Lotus Domino server.