"i" attribute file cannot be changed: it cannot be deleted or renamed, and this file cannot be created Cannot write data to this file. Only the system administrator can set and clear this attribute. If you want to change the inetd.conf file, you must first clear the flag that does not allow changes:
[root@deep]# chattr -i /etc/inetd.conf
but for things like sendmail, Named, www and other services, because they are not like finger, telnet and other services, when the request comes, the inet daemon starts the corresponding process to provide services, but runs as a daemon when the system starts. For redhat linux, a linuxconfig command is provided, through which you can interactively set whether to run related services at startup under the graphical interface. You can also use commands to set whether to start a service at startup, such as: [root@deep]# chkconfig -level 35 named off.
/etc/hosts.allow file
However, if telnet, ftp and other services are shut down together, it is very inconvenient for the administrator to need remote management. Linux provides another more flexible and effective method to limit the service request users, so that on the basis of ensuring security, trusted users can use various services. Linux provides a program called TCP wrapper. This program is installed by default in most releases. With TCP wrapper you can restrict access to certain services mentioned earlier. And the TCP wrapper log file records all attempts to access your system. By viewing the log of the program through the last command, the administrator can know who has or attempted to connect to your system.
In the /etc directory, there are two files: hosts.deny hosts.allow By configuring these two files, you can specify which machines can use these services and which can not use these services.
/etc/services file
The correspondence between port numbers and standard services is defined in detail in RFC 1700 "Assigned Numbers". The "/etc/services" file enables the server and client programs to convert the name of the service into a port number. This table exists on every host and its file name is "/etc/services". Only the "root" user has the authority to modify this file, and under normal circumstances this file is not necessary to modify, because this file already contains the port number corresponding to the commonly used services. In order to improve security, we can add protection to this file to avoid unauthorized deletion and change. To protect this file, use the following command:
[root@deep]# chattr +i /etc/services
/etc/securetty file The
"/etc/securetty" file allows you to specify that the "root" user can log in from that TTY device. The login program (usually "/bin/login") needs to read the "/etc/securetty" file. Its format is: the listed tty devices are allowed to log in, and comments or those that do not exist in this file do not allow root login.
/etc/inittab file
Comment out a line in the file to disable Control-Alt-Delete from shutting down the computer. If the server is not placed in a safe place, this is very important.
Edit the inittab file (vi /etc/inittab) and change this line:
γca::ctrlaltdel:/sbin/shutdown -t3 -r now
to:
#ca::ctrlaltdel:/sbin/shutdown -t3 -r now
Use the following command to make the changes take effect:
[root@deep]# /sbin/init q
/etc/rc.d/init.d/
/etc/rc. The script under d/init.d/ mainly contains the script program to start the service. There is no need for the average user to know the contents of the script file. So the permissions of these script files should be changed.
γγ[root@deep]# chmod -R 700 /etc/rc.d/init.d/*
This way, only root can read, write, and execute scripts in this directory.
written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
[root@deep]# chattr -i /etc/inetd.conf
but for things like sendmail, Named, www and other services, because they are not like finger, telnet and other services, when the request comes, the inet daemon starts the corresponding process to provide services, but runs as a daemon when the system starts. For redhat linux, a linuxconfig command is provided, through which you can interactively set whether to run related services at startup under the graphical interface. You can also use commands to set whether to start a service at startup, such as: [root@deep]# chkconfig -level 35 named off.
/etc/hosts.allow file
However, if telnet, ftp and other services are shut down together, it is very inconvenient for the administrator to need remote management. Linux provides another more flexible and effective method to limit the service request users, so that on the basis of ensuring security, trusted users can use various services. Linux provides a program called TCP wrapper. This program is installed by default in most releases. With TCP wrapper you can restrict access to certain services mentioned earlier. And the TCP wrapper log file records all attempts to access your system. By viewing the log of the program through the last command, the administrator can know who has or attempted to connect to your system.
In the /etc directory, there are two files: hosts.deny hosts.allow By configuring these two files, you can specify which machines can use these services and which can not use these services.
/etc/services file
The correspondence between port numbers and standard services is defined in detail in RFC 1700 "Assigned Numbers". The "/etc/services" file enables the server and client programs to convert the name of the service into a port number. This table exists on every host and its file name is "/etc/services". Only the "root" user has the authority to modify this file, and under normal circumstances this file is not necessary to modify, because this file already contains the port number corresponding to the commonly used services. In order to improve security, we can add protection to this file to avoid unauthorized deletion and change. To protect this file, use the following command:
[root@deep]# chattr +i /etc/services
/etc/securetty file The
"/etc/securetty" file allows you to specify that the "root" user can log in from that TTY device. The login program (usually "/bin/login") needs to read the "/etc/securetty" file. Its format is: the listed tty devices are allowed to log in, and comments or those that do not exist in this file do not allow root login.
/etc/inittab file
Comment out a line in the file to disable Control-Alt-Delete from shutting down the computer. If the server is not placed in a safe place, this is very important.
Edit the inittab file (vi /etc/inittab) and change this line:
γca::ctrlaltdel:/sbin/shutdown -t3 -r now
to:
#ca::ctrlaltdel:/sbin/shutdown -t3 -r now
Use the following command to make the changes take effect:
[root@deep]# /sbin/init q
/etc/rc.d/init.d/
/etc/rc. The script under d/init.d/ mainly contains the script program to start the service. There is no need for the average user to know the contents of the script file. So the permissions of these script files should be changed.
γγ[root@deep]# chmod -R 700 /etc/rc.d/init.d/*
This way, only root can read, write, and execute scripts in this directory.
written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Speed ββoptimization-Detailed network configuration file for tuning the performance of LINUX network by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Popular ways in 2020 for hack gmail :
> Keylogger
> backdoor
> cookies
> reverse engeneer
>social engeneer 40% luck
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Popular ways in 2020 for hack gmail :
> Keylogger
> backdoor
> cookies
> reverse engeneer
>social engeneer 40% luck
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦What is TCP Wrappers
1) does not encrypt data, it has a logging system and can control who can access your system.
2) It wraps some other binary files in inted, such as telnet and ftp.
3) The system uses TCP Wrappers to monitor incoming connections, records all requests, and compares with the access control list. If the connection is allowed, TCP Wrappers will call the actual binary file to connect, such as the telnet service; if rejected, the connection will be disconnected
written by Undercode
π¦What is TCP Wrappers
1) does not encrypt data, it has a logging system and can control who can access your system.
2) It wraps some other binary files in inted, such as telnet and ftp.
3) The system uses TCP Wrappers to monitor incoming connections, records all requests, and compares with the access control list. If the connection is allowed, TCP Wrappers will call the actual binary file to connect, such as the telnet service; if rejected, the connection will be disconnected
written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦DIFFERENCE BETWEEN Exploit-Payload-Shellcode :
1) Exploit - An exploit is the means by which an attacker, or penetration tester for that matter, takes advantage of a vulnerability within a system, an application, or a service. An attacker uses an exploit to attack a system in a way that results in a particular desired outcome that the developer never expected. Common exploits include buffer overflows, web application vulnerabilities (such as SQL injection), and configuration errors.
2) Payload - A payload is a custom code that attacker want the system to execute and that is to be selected and delivered by the Framework. For example, a reverse shell is a payload that creates a connection from the target machine back to the attacker as a Windows command prompt, whereas a bind shell is a payload that βbindsβ a command prompt to a listening port on the target machine, which the attacker can then connect. A payload could also be something as simple as a few commands to be executed on the target operating system.
3) Shellcode - Shellcode is basically a list of carefully crafted commands that can be executed once the code is injected into a running application. Itβs a series of instructions used as a payload when exploiting a vulnerability. Shellcode is typically written in assembly language. In most cases, a command shell or a Meterpreter shell will be provided after the set of instructions have been performed by the target machine, hence the name.
source wiki
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦DIFFERENCE BETWEEN Exploit-Payload-Shellcode :
1) Exploit - An exploit is the means by which an attacker, or penetration tester for that matter, takes advantage of a vulnerability within a system, an application, or a service. An attacker uses an exploit to attack a system in a way that results in a particular desired outcome that the developer never expected. Common exploits include buffer overflows, web application vulnerabilities (such as SQL injection), and configuration errors.
2) Payload - A payload is a custom code that attacker want the system to execute and that is to be selected and delivered by the Framework. For example, a reverse shell is a payload that creates a connection from the target machine back to the attacker as a Windows command prompt, whereas a bind shell is a payload that βbindsβ a command prompt to a listening port on the target machine, which the attacker can then connect. A payload could also be something as simple as a few commands to be executed on the target operating system.
3) Shellcode - Shellcode is basically a list of carefully crafted commands that can be executed once the code is injected into a running application. Itβs a series of instructions used as a payload when exploiting a vulnerability. Shellcode is typically written in assembly language. In most cases, a command shell or a Meterpreter shell will be provided after the set of instructions have been performed by the target machine, hence the name.
source wiki
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 APPS FOR WATCH MOVIES FOR FREE ANDROID/IOS :
1) https://play.google.com/store/apps/details?id=com.tubitv&hl=en
https://itunes.apple.com/us/app/tubi-tv-stream-free-movies/id886445756
2) https://play.google.com/store/apps/details?id=com.curiousbrain.popcornflix
https://itunes.apple.com/us/app/popcornflix-free-movies/id493605531
3) https://play.google.com/store/apps/details?id=com.yidio.androidapp
https://itunes.apple.com/us/app/yidio/id664306931
4) https://play.google.com/store/apps/details?id=com.gotv.crackle.handset
https://itunes.apple.com/us/app/crackle-movies-tv/id377951542
5) https://play.google.com/store/apps/details?id=air.com.snagfilms
https://itunes.apple.com/us/app/snagfilms/id404906625
6) https://play.google.com/store/apps/details?id=tv.pluto.android
https://itunes.apple.com/us/app/pluto-tv/id751712884
7) https://play.google.com/store/apps/details?id=air.com.vudu.air.DownloaderTablet
https://itunes.apple.com/us/app/vudu-movies-tv/id487285735
8) https://play.google.com/store/apps/details?id=com.recipe.filmrise
https://apps.apple.com/us/app/filmrise/id1353108336
9) https://play.google.com/store/apps/details?id=com.plexapp.android
https://apps.apple.com/us/app/plex-movies-tv-music-more/id383457673
10) https://apps.apple.com/us/app/crackle-movies-tv/id377951542
https://play.google.com/store/apps/details?id=com.gotv.crackle.handset&hl=en_US
11) https://play.google.com/store/apps/details?id=tv.pluto.android&hl=en_US
https://apps.apple.com/us/app/pluto-tv-live-tv-and-movies/id751712884
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 APPS FOR WATCH MOVIES FOR FREE ANDROID/IOS :
1) https://play.google.com/store/apps/details?id=com.tubitv&hl=en
https://itunes.apple.com/us/app/tubi-tv-stream-free-movies/id886445756
2) https://play.google.com/store/apps/details?id=com.curiousbrain.popcornflix
https://itunes.apple.com/us/app/popcornflix-free-movies/id493605531
3) https://play.google.com/store/apps/details?id=com.yidio.androidapp
https://itunes.apple.com/us/app/yidio/id664306931
4) https://play.google.com/store/apps/details?id=com.gotv.crackle.handset
https://itunes.apple.com/us/app/crackle-movies-tv/id377951542
5) https://play.google.com/store/apps/details?id=air.com.snagfilms
https://itunes.apple.com/us/app/snagfilms/id404906625
6) https://play.google.com/store/apps/details?id=tv.pluto.android
https://itunes.apple.com/us/app/pluto-tv/id751712884
7) https://play.google.com/store/apps/details?id=air.com.vudu.air.DownloaderTablet
https://itunes.apple.com/us/app/vudu-movies-tv/id487285735
8) https://play.google.com/store/apps/details?id=com.recipe.filmrise
https://apps.apple.com/us/app/filmrise/id1353108336
9) https://play.google.com/store/apps/details?id=com.plexapp.android
https://apps.apple.com/us/app/plex-movies-tv-music-more/id383457673
10) https://apps.apple.com/us/app/crackle-movies-tv/id377951542
https://play.google.com/store/apps/details?id=com.gotv.crackle.handset&hl=en_US
11) https://play.google.com/store/apps/details?id=tv.pluto.android&hl=en_US
https://apps.apple.com/us/app/pluto-tv-live-tv-and-movies/id751712884
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Google Play
Tubi: Free Movies & Live TV - Apps on Google Play
On Tubi, Movies, Shows, (and Love) Don't Cost a Thing!