9) This file specifies how to resolve the host name. Linux uses the parser library to obtain the IP address corresponding to the host name. The following is an example of "/etc/host.conf":
order bind, hosts
γγmulti on
γγospoof on
10) "order bind, hosts" specifies the order of the host name query, here it is specified that DNS is used to resolve the domain name, and then query "/etc/ hosts" file (or vice versa).
"Multi on" specifies whether the host specified in the "/etc/hosts" file can have multiple addresses, and hosts with multiple IP addresses are generally called multi-hole hosts.
"Nospoof on" means that IP address spoofing of the server is not allowed. IP spoofing is a means of attacking the security of the system, by disguising the IP address as another computer to gain the trust of other computers.
/etc/hosts file
11) When the machine starts, before the DNS can be queried, the machine needs to look up some host name to IP address matches. The matching information is stored in the /etc/hosts file. In the absence of a domain name server, all network programs on the system resolve the IP address corresponding to a host name by querying the file.
The following is an example of the "/etc/hosts" file:
γγIP Address Hostname Alias
γγ127.0.0.1 Localhost Gate.openarch.com
γγ208.164.186.1 gate.openarch.com Gate
γγ..........................................
The leftmost column is Host IP information, the middle column is the host name. Any subsequent columns are aliases for that host. Once the network configuration file of the machine is configured, the network should be restarted for the modification to take effect. Use the following command to restart the network: /etc/rc.d/init.d/network restart.
/etc/inetd.conf file
12) As we all know, as a server, the more service ports are opened, the more difficult it is to guarantee the security and stability of the system. Therefore, the server that provides specific services should open the ports necessary to provide the service as much as possible, and close the services that are not related to the server service. For example: a machine that is a www and ftp server should only open ports 80 and 25, and Other unrelated services such as finger auth and other services are turned off to reduce system vulnerabilities.
13) Inetd, also known as a "super server", is a daemon that monitors some network requests. It calls corresponding service processes to process connection requests based on network requests. inetd.conf is the configuration file of inetd. The inetd.conf file tells inetd which network ports to monitor and which services to start for each port. When using Linux in any network environment, the first thing to do is to understand what services the server will provide. Those services that are not needed should be banned, and it is best to uninstall them, so that hackers will have fewer opportunities to attack the system. Check the "/etc/inetd.conf" file to see what services inetd provides. Use the method of adding a comment (add a # at the beginning of a line) to prohibit any unnecessary services, and then send a SIGHUP signal to the inetd process:
Step 1: Change the file permissions to 600.
[root@deep]# chmod 600 /etc/inetd.conf
Β· Step 2: Make sure that the owner of the file is root.
γ
[root@deep]# stat /etc/inetd.conf
Β· Step 3: Edit the "inetd.conf" file (vi /etc/inetd.conf) to prohibit all unnecessary services, such as: ftp, telnet, shell, login, exec, talk, ntalk, imap, pop-2, pop-3, finger, auth, etc. If you think certain services are useful, you can not ban them.
Β· Step 4: After changing the "inetd.conf" file, don't forget to send a SIGHUP signal (killall -HUP inetd) to the inetd process.
γ[root@deep /root]# killall -HUP inetd
Β· Step 5: In order to ensure the security of the "inetd.conf" file, you can use chattr command to make it unchangeable. To make the file unchangeable, just use the following command:
[root@deep]# chattr +i /etc/inetd.conf The
order bind, hosts
γγmulti on
γγospoof on
10) "order bind, hosts" specifies the order of the host name query, here it is specified that DNS is used to resolve the domain name, and then query "/etc/ hosts" file (or vice versa).
"Multi on" specifies whether the host specified in the "/etc/hosts" file can have multiple addresses, and hosts with multiple IP addresses are generally called multi-hole hosts.
"Nospoof on" means that IP address spoofing of the server is not allowed. IP spoofing is a means of attacking the security of the system, by disguising the IP address as another computer to gain the trust of other computers.
/etc/hosts file
11) When the machine starts, before the DNS can be queried, the machine needs to look up some host name to IP address matches. The matching information is stored in the /etc/hosts file. In the absence of a domain name server, all network programs on the system resolve the IP address corresponding to a host name by querying the file.
The following is an example of the "/etc/hosts" file:
γγIP Address Hostname Alias
γγ127.0.0.1 Localhost Gate.openarch.com
γγ208.164.186.1 gate.openarch.com Gate
γγ..........................................
The leftmost column is Host IP information, the middle column is the host name. Any subsequent columns are aliases for that host. Once the network configuration file of the machine is configured, the network should be restarted for the modification to take effect. Use the following command to restart the network: /etc/rc.d/init.d/network restart.
/etc/inetd.conf file
12) As we all know, as a server, the more service ports are opened, the more difficult it is to guarantee the security and stability of the system. Therefore, the server that provides specific services should open the ports necessary to provide the service as much as possible, and close the services that are not related to the server service. For example: a machine that is a www and ftp server should only open ports 80 and 25, and Other unrelated services such as finger auth and other services are turned off to reduce system vulnerabilities.
13) Inetd, also known as a "super server", is a daemon that monitors some network requests. It calls corresponding service processes to process connection requests based on network requests. inetd.conf is the configuration file of inetd. The inetd.conf file tells inetd which network ports to monitor and which services to start for each port. When using Linux in any network environment, the first thing to do is to understand what services the server will provide. Those services that are not needed should be banned, and it is best to uninstall them, so that hackers will have fewer opportunities to attack the system. Check the "/etc/inetd.conf" file to see what services inetd provides. Use the method of adding a comment (add a # at the beginning of a line) to prohibit any unnecessary services, and then send a SIGHUP signal to the inetd process:
Step 1: Change the file permissions to 600.
[root@deep]# chmod 600 /etc/inetd.conf
Β· Step 2: Make sure that the owner of the file is root.
γ
[root@deep]# stat /etc/inetd.conf
Β· Step 3: Edit the "inetd.conf" file (vi /etc/inetd.conf) to prohibit all unnecessary services, such as: ftp, telnet, shell, login, exec, talk, ntalk, imap, pop-2, pop-3, finger, auth, etc. If you think certain services are useful, you can not ban them.
Β· Step 4: After changing the "inetd.conf" file, don't forget to send a SIGHUP signal (killall -HUP inetd) to the inetd process.
γ[root@deep /root]# killall -HUP inetd
Β· Step 5: In order to ensure the security of the "inetd.conf" file, you can use chattr command to make it unchangeable. To make the file unchangeable, just use the following command:
[root@deep]# chattr +i /etc/inetd.conf The
"i" attribute file cannot be changed: it cannot be deleted or renamed, and this file cannot be created Cannot write data to this file. Only the system administrator can set and clear this attribute. If you want to change the inetd.conf file, you must first clear the flag that does not allow changes:
[root@deep]# chattr -i /etc/inetd.conf
but for things like sendmail, Named, www and other services, because they are not like finger, telnet and other services, when the request comes, the inet daemon starts the corresponding process to provide services, but runs as a daemon when the system starts. For redhat linux, a linuxconfig command is provided, through which you can interactively set whether to run related services at startup under the graphical interface. You can also use commands to set whether to start a service at startup, such as: [root@deep]# chkconfig -level 35 named off.
/etc/hosts.allow file
However, if telnet, ftp and other services are shut down together, it is very inconvenient for the administrator to need remote management. Linux provides another more flexible and effective method to limit the service request users, so that on the basis of ensuring security, trusted users can use various services. Linux provides a program called TCP wrapper. This program is installed by default in most releases. With TCP wrapper you can restrict access to certain services mentioned earlier. And the TCP wrapper log file records all attempts to access your system. By viewing the log of the program through the last command, the administrator can know who has or attempted to connect to your system.
In the /etc directory, there are two files: hosts.deny hosts.allow By configuring these two files, you can specify which machines can use these services and which can not use these services.
/etc/services file
The correspondence between port numbers and standard services is defined in detail in RFC 1700 "Assigned Numbers". The "/etc/services" file enables the server and client programs to convert the name of the service into a port number. This table exists on every host and its file name is "/etc/services". Only the "root" user has the authority to modify this file, and under normal circumstances this file is not necessary to modify, because this file already contains the port number corresponding to the commonly used services. In order to improve security, we can add protection to this file to avoid unauthorized deletion and change. To protect this file, use the following command:
[root@deep]# chattr +i /etc/services
/etc/securetty file The
"/etc/securetty" file allows you to specify that the "root" user can log in from that TTY device. The login program (usually "/bin/login") needs to read the "/etc/securetty" file. Its format is: the listed tty devices are allowed to log in, and comments or those that do not exist in this file do not allow root login.
/etc/inittab file
Comment out a line in the file to disable Control-Alt-Delete from shutting down the computer. If the server is not placed in a safe place, this is very important.
Edit the inittab file (vi /etc/inittab) and change this line:
γca::ctrlaltdel:/sbin/shutdown -t3 -r now
to:
#ca::ctrlaltdel:/sbin/shutdown -t3 -r now
Use the following command to make the changes take effect:
[root@deep]# /sbin/init q
/etc/rc.d/init.d/
/etc/rc. The script under d/init.d/ mainly contains the script program to start the service. There is no need for the average user to know the contents of the script file. So the permissions of these script files should be changed.
γγ[root@deep]# chmod -R 700 /etc/rc.d/init.d/*
This way, only root can read, write, and execute scripts in this directory.
written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
[root@deep]# chattr -i /etc/inetd.conf
but for things like sendmail, Named, www and other services, because they are not like finger, telnet and other services, when the request comes, the inet daemon starts the corresponding process to provide services, but runs as a daemon when the system starts. For redhat linux, a linuxconfig command is provided, through which you can interactively set whether to run related services at startup under the graphical interface. You can also use commands to set whether to start a service at startup, such as: [root@deep]# chkconfig -level 35 named off.
/etc/hosts.allow file
However, if telnet, ftp and other services are shut down together, it is very inconvenient for the administrator to need remote management. Linux provides another more flexible and effective method to limit the service request users, so that on the basis of ensuring security, trusted users can use various services. Linux provides a program called TCP wrapper. This program is installed by default in most releases. With TCP wrapper you can restrict access to certain services mentioned earlier. And the TCP wrapper log file records all attempts to access your system. By viewing the log of the program through the last command, the administrator can know who has or attempted to connect to your system.
In the /etc directory, there are two files: hosts.deny hosts.allow By configuring these two files, you can specify which machines can use these services and which can not use these services.
/etc/services file
The correspondence between port numbers and standard services is defined in detail in RFC 1700 "Assigned Numbers". The "/etc/services" file enables the server and client programs to convert the name of the service into a port number. This table exists on every host and its file name is "/etc/services". Only the "root" user has the authority to modify this file, and under normal circumstances this file is not necessary to modify, because this file already contains the port number corresponding to the commonly used services. In order to improve security, we can add protection to this file to avoid unauthorized deletion and change. To protect this file, use the following command:
[root@deep]# chattr +i /etc/services
/etc/securetty file The
"/etc/securetty" file allows you to specify that the "root" user can log in from that TTY device. The login program (usually "/bin/login") needs to read the "/etc/securetty" file. Its format is: the listed tty devices are allowed to log in, and comments or those that do not exist in this file do not allow root login.
/etc/inittab file
Comment out a line in the file to disable Control-Alt-Delete from shutting down the computer. If the server is not placed in a safe place, this is very important.
Edit the inittab file (vi /etc/inittab) and change this line:
γca::ctrlaltdel:/sbin/shutdown -t3 -r now
to:
#ca::ctrlaltdel:/sbin/shutdown -t3 -r now
Use the following command to make the changes take effect:
[root@deep]# /sbin/init q
/etc/rc.d/init.d/
/etc/rc. The script under d/init.d/ mainly contains the script program to start the service. There is no need for the average user to know the contents of the script file. So the permissions of these script files should be changed.
γγ[root@deep]# chmod -R 700 /etc/rc.d/init.d/*
This way, only root can read, write, and execute scripts in this directory.
written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Speed ββoptimization-Detailed network configuration file for tuning the performance of LINUX network by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Popular ways in 2020 for hack gmail :
> Keylogger
> backdoor
> cookies
> reverse engeneer
>social engeneer 40% luck
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Popular ways in 2020 for hack gmail :
> Keylogger
> backdoor
> cookies
> reverse engeneer
>social engeneer 40% luck
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦What is TCP Wrappers
1) does not encrypt data, it has a logging system and can control who can access your system.
2) It wraps some other binary files in inted, such as telnet and ftp.
3) The system uses TCP Wrappers to monitor incoming connections, records all requests, and compares with the access control list. If the connection is allowed, TCP Wrappers will call the actual binary file to connect, such as the telnet service; if rejected, the connection will be disconnected
written by Undercode
π¦What is TCP Wrappers
1) does not encrypt data, it has a logging system and can control who can access your system.
2) It wraps some other binary files in inted, such as telnet and ftp.
3) The system uses TCP Wrappers to monitor incoming connections, records all requests, and compares with the access control list. If the connection is allowed, TCP Wrappers will call the actual binary file to connect, such as the telnet service; if rejected, the connection will be disconnected
written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦DIFFERENCE BETWEEN Exploit-Payload-Shellcode :
1) Exploit - An exploit is the means by which an attacker, or penetration tester for that matter, takes advantage of a vulnerability within a system, an application, or a service. An attacker uses an exploit to attack a system in a way that results in a particular desired outcome that the developer never expected. Common exploits include buffer overflows, web application vulnerabilities (such as SQL injection), and configuration errors.
2) Payload - A payload is a custom code that attacker want the system to execute and that is to be selected and delivered by the Framework. For example, a reverse shell is a payload that creates a connection from the target machine back to the attacker as a Windows command prompt, whereas a bind shell is a payload that βbindsβ a command prompt to a listening port on the target machine, which the attacker can then connect. A payload could also be something as simple as a few commands to be executed on the target operating system.
3) Shellcode - Shellcode is basically a list of carefully crafted commands that can be executed once the code is injected into a running application. Itβs a series of instructions used as a payload when exploiting a vulnerability. Shellcode is typically written in assembly language. In most cases, a command shell or a Meterpreter shell will be provided after the set of instructions have been performed by the target machine, hence the name.
source wiki
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦DIFFERENCE BETWEEN Exploit-Payload-Shellcode :
1) Exploit - An exploit is the means by which an attacker, or penetration tester for that matter, takes advantage of a vulnerability within a system, an application, or a service. An attacker uses an exploit to attack a system in a way that results in a particular desired outcome that the developer never expected. Common exploits include buffer overflows, web application vulnerabilities (such as SQL injection), and configuration errors.
2) Payload - A payload is a custom code that attacker want the system to execute and that is to be selected and delivered by the Framework. For example, a reverse shell is a payload that creates a connection from the target machine back to the attacker as a Windows command prompt, whereas a bind shell is a payload that βbindsβ a command prompt to a listening port on the target machine, which the attacker can then connect. A payload could also be something as simple as a few commands to be executed on the target operating system.
3) Shellcode - Shellcode is basically a list of carefully crafted commands that can be executed once the code is injected into a running application. Itβs a series of instructions used as a payload when exploiting a vulnerability. Shellcode is typically written in assembly language. In most cases, a command shell or a Meterpreter shell will be provided after the set of instructions have been performed by the target machine, hence the name.
source wiki
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 APPS FOR WATCH MOVIES FOR FREE ANDROID/IOS :
1) https://play.google.com/store/apps/details?id=com.tubitv&hl=en
https://itunes.apple.com/us/app/tubi-tv-stream-free-movies/id886445756
2) https://play.google.com/store/apps/details?id=com.curiousbrain.popcornflix
https://itunes.apple.com/us/app/popcornflix-free-movies/id493605531
3) https://play.google.com/store/apps/details?id=com.yidio.androidapp
https://itunes.apple.com/us/app/yidio/id664306931
4) https://play.google.com/store/apps/details?id=com.gotv.crackle.handset
https://itunes.apple.com/us/app/crackle-movies-tv/id377951542
5) https://play.google.com/store/apps/details?id=air.com.snagfilms
https://itunes.apple.com/us/app/snagfilms/id404906625
6) https://play.google.com/store/apps/details?id=tv.pluto.android
https://itunes.apple.com/us/app/pluto-tv/id751712884
7) https://play.google.com/store/apps/details?id=air.com.vudu.air.DownloaderTablet
https://itunes.apple.com/us/app/vudu-movies-tv/id487285735
8) https://play.google.com/store/apps/details?id=com.recipe.filmrise
https://apps.apple.com/us/app/filmrise/id1353108336
9) https://play.google.com/store/apps/details?id=com.plexapp.android
https://apps.apple.com/us/app/plex-movies-tv-music-more/id383457673
10) https://apps.apple.com/us/app/crackle-movies-tv/id377951542
https://play.google.com/store/apps/details?id=com.gotv.crackle.handset&hl=en_US
11) https://play.google.com/store/apps/details?id=tv.pluto.android&hl=en_US
https://apps.apple.com/us/app/pluto-tv-live-tv-and-movies/id751712884
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 APPS FOR WATCH MOVIES FOR FREE ANDROID/IOS :
1) https://play.google.com/store/apps/details?id=com.tubitv&hl=en
https://itunes.apple.com/us/app/tubi-tv-stream-free-movies/id886445756
2) https://play.google.com/store/apps/details?id=com.curiousbrain.popcornflix
https://itunes.apple.com/us/app/popcornflix-free-movies/id493605531
3) https://play.google.com/store/apps/details?id=com.yidio.androidapp
https://itunes.apple.com/us/app/yidio/id664306931
4) https://play.google.com/store/apps/details?id=com.gotv.crackle.handset
https://itunes.apple.com/us/app/crackle-movies-tv/id377951542
5) https://play.google.com/store/apps/details?id=air.com.snagfilms
https://itunes.apple.com/us/app/snagfilms/id404906625
6) https://play.google.com/store/apps/details?id=tv.pluto.android
https://itunes.apple.com/us/app/pluto-tv/id751712884
7) https://play.google.com/store/apps/details?id=air.com.vudu.air.DownloaderTablet
https://itunes.apple.com/us/app/vudu-movies-tv/id487285735
8) https://play.google.com/store/apps/details?id=com.recipe.filmrise
https://apps.apple.com/us/app/filmrise/id1353108336
9) https://play.google.com/store/apps/details?id=com.plexapp.android
https://apps.apple.com/us/app/plex-movies-tv-music-more/id383457673
10) https://apps.apple.com/us/app/crackle-movies-tv/id377951542
https://play.google.com/store/apps/details?id=com.gotv.crackle.handset&hl=en_US
11) https://play.google.com/store/apps/details?id=tv.pluto.android&hl=en_US
https://apps.apple.com/us/app/pluto-tv-live-tv-and-movies/id751712884
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Google Play
Tubi: Free Movies & Live TV - Apps on Google Play
On Tubi, Movies, Shows, (and Love) Don't Cost a Thing!