Forwarded from WEB UNDERCODE - PRIVATE
βipβ Command cheat sheet (Command Line Reference).pdf
82.9 KB
Forwarded from WEB UNDERCODE - PRIVATE
βHacking with Metasploitβ Tutorial.pdf
1.6 MB
Forwarded from WEB UNDERCODE - PRIVATE
12 Hacking Cheatsheets That You Must Keep Handy! .pdf
206.2 KB
Forwarded from WEB UNDERCODE - PRIVATE
A Complete Docker Command List in Cheat Sheet .pdf
1.4 MB
Forwarded from WEB UNDERCODE - PRIVATE
Advanced PowerUp.ps1 Usage.pdf
726.1 KB
Forwarded from WEB UNDERCODE - PRIVATE
Auto-sslscan (Automatic SSL Scanning) .pdf
664 KB
Forwarded from WEB UNDERCODE - PRIVATE
π¦RANDOM HELPFUL WRITTEN TUTORIALS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ThanatosMiner is here, to capture the mining Trojan spread by BlueKeep high-risk vulnerability attacks
#News
> the ThanatosMiner mining Trojan exploited the BlueKeep vulnerability CVE-2019-0708 to spread. The attacker packaged the public Python version BlueKeep exploit code to generate scan.exe, and scanned a large range of randomly generated IP addresses for detection and attack.
> After the vulnerability is successfully exploited, the shellcode is executed to download the Trojan svchost.exe written in C#, and then the Trojan is used to download the Monero mining Trojan and attack modules for the next round of attacks. Because the assembly name of the Payload program is ThanatosCrypt, the mining Trojan is named ThanatosMiner (Death Miner).
> On May 15, 2019, Microsoft released a security update for CVE-2019-0708, a critical remote code execution vulnerability in Remote Desktop Services, which affected some older versions of Windows. Once the attacker successfully triggers the vulnerability, he can execute arbitrary code on the target system. The triggering of the vulnerability does not require any user interaction-meaning that the computer with the vulnerability only needs to be connected to the Internet, and no remote operations may be encountered without any operation. Attack and fall. The BlueKeep vulnerability (CVE-2019-0708) is a high-risk vulnerability that all security vendors attach great importance to.
> The vulnerability affects older versions of Windows systems, including:
Windows 7, Windows Server 2008 R2, Windows Server 2008, Windows 2003, and Windows XP. Windows 8 and Windows 10 and later versions are not affected by this vulnerability.
written by undercode
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ThanatosMiner is here, to capture the mining Trojan spread by BlueKeep high-risk vulnerability attacks
#News
> the ThanatosMiner mining Trojan exploited the BlueKeep vulnerability CVE-2019-0708 to spread. The attacker packaged the public Python version BlueKeep exploit code to generate scan.exe, and scanned a large range of randomly generated IP addresses for detection and attack.
> After the vulnerability is successfully exploited, the shellcode is executed to download the Trojan svchost.exe written in C#, and then the Trojan is used to download the Monero mining Trojan and attack modules for the next round of attacks. Because the assembly name of the Payload program is ThanatosCrypt, the mining Trojan is named ThanatosMiner (Death Miner).
> On May 15, 2019, Microsoft released a security update for CVE-2019-0708, a critical remote code execution vulnerability in Remote Desktop Services, which affected some older versions of Windows. Once the attacker successfully triggers the vulnerability, he can execute arbitrary code on the target system. The triggering of the vulnerability does not require any user interaction-meaning that the computer with the vulnerability only needs to be connected to the Internet, and no remote operations may be encountered without any operation. Attack and fall. The BlueKeep vulnerability (CVE-2019-0708) is a high-risk vulnerability that all security vendors attach great importance to.
> The vulnerability affects older versions of Windows systems, including:
Windows 7, Windows Server 2008 R2, Windows Server 2008, Windows 2003, and Windows XP. Windows 8 and Windows 10 and later versions are not affected by this vulnerability.
written by undercode
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FOR BEGINER GNU and Windows
> To build programs using the GNU toolchain on Windows, two projects are often used: Cygwin and MinGW + MSYS. They have similar goals, but different implementation details. Let's figure it out.
π¦ Cygwin
1) Cygwin is the most complete implementation of the GNU environment for Windows. It provides most of the POSIX API as a library, which allows you to build programs from UNIX without porting, unless they require UNIX semantics. A striking example is demons, they also need fork()signals that are not in Windows, and Windows services are completely different.
2) In addition to the library, the distribution kit contains a set of classic UNIX commands and a terminal. Command implementations use this library and support some UNIX features, such as case-sensitive file names.
3) Intended use: if there is no desire or ability to port the program to Windows or use only platform independent APIs, it can be built "under Cygwin", at the cost of dependence on cygwin1.dlland relative isolation from the rest of the system.
4) Many people have installed and continue to install the Cygwin environment to be able to use classic UNIX commands on Windows. Some developers also include Cygwin in their instructions for building their Windows programs, although the program itself does not link with cygwin1.dll. It may be more correct to use MSYS for this purpose.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FOR BEGINER GNU and Windows
> To build programs using the GNU toolchain on Windows, two projects are often used: Cygwin and MinGW + MSYS. They have similar goals, but different implementation details. Let's figure it out.
π¦ Cygwin
1) Cygwin is the most complete implementation of the GNU environment for Windows. It provides most of the POSIX API as a library, which allows you to build programs from UNIX without porting, unless they require UNIX semantics. A striking example is demons, they also need fork()signals that are not in Windows, and Windows services are completely different.
2) In addition to the library, the distribution kit contains a set of classic UNIX commands and a terminal. Command implementations use this library and support some UNIX features, such as case-sensitive file names.
3) Intended use: if there is no desire or ability to port the program to Windows or use only platform independent APIs, it can be built "under Cygwin", at the cost of dependence on cygwin1.dlland relative isolation from the rest of the system.
4) Many people have installed and continue to install the Cygwin environment to be able to use classic UNIX commands on Windows. Some developers also include Cygwin in their instructions for building their Windows programs, although the program itself does not link with cygwin1.dll. It may be more correct to use MSYS for this purpose.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NEW DEEP DANGEROUS WEBSITES Non-English
7/24 & 24/24 ALIVE
http://germanyhusicaysx.onion - Deutschland im Deep Web - German forum
http://ffi5v46ttwgx3fby.onion/ - Das ist Deutschland hier 2.0 - German Board
http://paisleli66axejos.onion/ - PAIS
http://hyjmkmb3lfymiprp.onion/hen/papieze/ - DzieciΔca pedofilia
http://runionv62ul3roit.onion/ - Russian Onion Union
http://s6cco2jylmxqcdeh.onion/ - ?ltimos bumps
http://5xki35vc4g5ts6gc.onion - GTF Greek Tor Forum . For greek speaking users
http://cipollatnumrrahd.onion/index.php - Cipolla 2.0 - Italian Community
http://runionv62ul3roit.onion - Russian community: market and anonymous talks about security, guns etc.
http://ptrackcp2noqu5fh.onion/ - PoliceTrack - Ne vous faites plus suivre par la police.
http://amberoadychffmyw.onion - Amberoad - russian anonymous market
http://r2d2akbw3jpt4zbf.onion - R2D2 - russian anonymous market
http://ramp2bombkadwvgz.onion - RAMP - biggest russian market (drugs only)
http://szmyt4v4vjbnxpg3.onion/ - Π‘Π»Π°Π²ΡΠ½ΡΠΊΠΈΠΉ
http://o2tu5zjxjlibrary.onion/ - Bibliotheca Alexandrina
http://xzzpowtjlobho6kd.onion/wordpress/ - DeepBlog
http://zqiirytam276uogb.onion/ - Thorlauta
http://ocbh4hoqs37unvv6.onion - French Deep Web
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NEW DEEP DANGEROUS WEBSITES Non-English
7/24 & 24/24 ALIVE
http://germanyhusicaysx.onion - Deutschland im Deep Web - German forum
http://ffi5v46ttwgx3fby.onion/ - Das ist Deutschland hier 2.0 - German Board
http://paisleli66axejos.onion/ - PAIS
http://hyjmkmb3lfymiprp.onion/hen/papieze/ - DzieciΔca pedofilia
http://runionv62ul3roit.onion/ - Russian Onion Union
http://s6cco2jylmxqcdeh.onion/ - ?ltimos bumps
http://5xki35vc4g5ts6gc.onion - GTF Greek Tor Forum . For greek speaking users
http://cipollatnumrrahd.onion/index.php - Cipolla 2.0 - Italian Community
http://runionv62ul3roit.onion - Russian community: market and anonymous talks about security, guns etc.
http://ptrackcp2noqu5fh.onion/ - PoliceTrack - Ne vous faites plus suivre par la police.
http://amberoadychffmyw.onion - Amberoad - russian anonymous market
http://r2d2akbw3jpt4zbf.onion - R2D2 - russian anonymous market
http://ramp2bombkadwvgz.onion - RAMP - biggest russian market (drugs only)
http://szmyt4v4vjbnxpg3.onion/ - Π‘Π»Π°Π²ΡΠ½ΡΠΊΠΈΠΉ
http://o2tu5zjxjlibrary.onion/ - Bibliotheca Alexandrina
http://xzzpowtjlobho6kd.onion/wordpress/ - DeepBlog
http://zqiirytam276uogb.onion/ - Thorlauta
http://ocbh4hoqs37unvv6.onion - French Deep Web
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦VPS & LEAK .ONION 7/24 & 24/24 ALIVE
https://www.torproject.org/
http://torvps7kzis5ujfz.onion/ β TorVPS
http://novarcbekzy3xwcq.onion/ β Home :: NOVA LABS
http://s5q54hfww56ov2xc.onion/ β BitPharma β biggest european .onion drug store β Cocaine for Bitcoins, Psychedelics for Bitcoins, Prescriptions for Bitcoins, Viagra for Bitcoins
http://kp6yw42wb5wpsd6n.onion/ β Login Β· Minerva
http://onionlandbakyt3j.onion/ β Onionland Β· Enjoy the rides, but you might die.
http://4apu65ago3nbpbaf.onion/ β SHARE ! This deep web links list is provided by http://hiddenwikitor.org/ and http://wiki5kauuihowqi5.onion/
http://5xgrs443ogbyfoh2.onion/ β Tor Project: Anonymity Online
http://kpj3orlxmfs6yqah.onion/ β Products β MUSHBUD
http://sejnfjrq6szgca7v.onion/ β Debian β The Universal Operating System
http://familybw6azkhjsc.onion/ β My Family Videos
http://7rmath4ro2of2a42.onion/ β SoylentNews: SoylentNews is people
http://zcashph5mxqjjby2.onion/ β Zcash β All coins are created equal.
http://exoduockgfq3ikf7.onion/ β Ex0du$ β Malware,Leaks,Exploits,Dumps and more!
http://dr5aamfveql2b34p.onion/ β VuzeWiki
http://hbooruahi4zr2h73.onion/ β HBS
http://4fvfamdpoulu2nms.onion/ β Lucky Eddieβs Home
http://tmskhzafkndqaqyx.onion/ β DreamMarket Forum
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦VPS & LEAK .ONION 7/24 & 24/24 ALIVE
https://www.torproject.org/
http://torvps7kzis5ujfz.onion/ β TorVPS
http://novarcbekzy3xwcq.onion/ β Home :: NOVA LABS
http://s5q54hfww56ov2xc.onion/ β BitPharma β biggest european .onion drug store β Cocaine for Bitcoins, Psychedelics for Bitcoins, Prescriptions for Bitcoins, Viagra for Bitcoins
http://kp6yw42wb5wpsd6n.onion/ β Login Β· Minerva
http://onionlandbakyt3j.onion/ β Onionland Β· Enjoy the rides, but you might die.
http://4apu65ago3nbpbaf.onion/ β SHARE ! This deep web links list is provided by http://hiddenwikitor.org/ and http://wiki5kauuihowqi5.onion/
http://5xgrs443ogbyfoh2.onion/ β Tor Project: Anonymity Online
http://kpj3orlxmfs6yqah.onion/ β Products β MUSHBUD
http://sejnfjrq6szgca7v.onion/ β Debian β The Universal Operating System
http://familybw6azkhjsc.onion/ β My Family Videos
http://7rmath4ro2of2a42.onion/ β SoylentNews: SoylentNews is people
http://zcashph5mxqjjby2.onion/ β Zcash β All coins are created equal.
http://exoduockgfq3ikf7.onion/ β Ex0du$ β Malware,Leaks,Exploits,Dumps and more!
http://dr5aamfveql2b34p.onion/ β VuzeWiki
http://hbooruahi4zr2h73.onion/ β HBS
http://4fvfamdpoulu2nms.onion/ β Lucky Eddieβs Home
http://tmskhzafkndqaqyx.onion/ β DreamMarket Forum
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
www.torproject.org
The Tor Project | Privacy & Freedom Online
Defend yourself against tracking and surveillance. Circumvent censorship.
Forwarded from Free Premium Accounts Telegram Channel - Netflix - Spotify
Please open Telegram to view this post
VIEW IN TELEGRAM
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HOW INSTALL TOR IN KALI 2 STEPS :
How To Install Tor Browser In Kali Linux Using Apt
Open a terminal window
1) Run apt-get update
2) Run apt-get install tor torbrowser-launcher and select Y at the prompt
3) Now youβll have a new Tor Browser application in the Applications menu under Usual Applications and Internet.
> This shortcut will only work if youβre not running as the root user.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HOW INSTALL TOR IN KALI 2 STEPS :
How To Install Tor Browser In Kali Linux Using Apt
Open a terminal window
1) Run apt-get update
2) Run apt-get install tor torbrowser-launcher and select Y at the prompt
3) Now youβll have a new Tor Browser application in the Applications menu under Usual Applications and Internet.
> This shortcut will only work if youβre not running as the root user.
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Be wary of the BasedMiner mining Trojan blasting weak SQL passwords to invade mining :
#News
> The mining Trojan gang mainly targeted MS SQL services to blast weak password attacks. After successful blasting, it will download the Gh0st remote control Trojan to control the system. It will also use multiple Windows vulnerabilities to perform privilege escalation attacks to obtain the highest system privileges and implant Monroe. The coin mining Trojan has been mining and has made a profit of 8,000 yuan.
> Because its remote control module is named based.dll, Tencent Security Center named it BasedMiner. After the BasedMiner invasion, the remote control Trojan is implanted in the enterprise server, which may lead to the leakage of confidential information of the victimized enterprise.
> When mining, the server resources will be seriously consumed, which will affect the normal business operation. Tencent security experts recommend that companies check and correct the use of weak passwords to log in to the server, repair security vulnerabilities in the server, and avoid intrusion by mining gangs.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Be wary of the BasedMiner mining Trojan blasting weak SQL passwords to invade mining :
#News
> The mining Trojan gang mainly targeted MS SQL services to blast weak password attacks. After successful blasting, it will download the Gh0st remote control Trojan to control the system. It will also use multiple Windows vulnerabilities to perform privilege escalation attacks to obtain the highest system privileges and implant Monroe. The coin mining Trojan has been mining and has made a profit of 8,000 yuan.
> Because its remote control module is named based.dll, Tencent Security Center named it BasedMiner. After the BasedMiner invasion, the remote control Trojan is implanted in the enterprise server, which may lead to the leakage of confidential information of the victimized enterprise.
> When mining, the server resources will be seriously consumed, which will affect the normal business operation. Tencent security experts recommend that companies check and correct the use of weak passwords to log in to the server, repair security vulnerabilities in the server, and avoid intrusion by mining gangs.
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Synchronizing local and remote directories in Linux using Lsyncd ?
Installing Lsyncd
1οΈβ£On Debian and its derivatives, such as Ubuntu , Linux Mint, run the following command to install Lsyncd:
> sudo apt-get install lsyncd
2οΈβ£On RHEL, CentOS , you need to enable the Epel repository first.
a) sudo yum install epel-release
b) Then install Lsyncd with the command:
> sudo yum install lsyncd
> Lsyncd configuration on Debian and Ubuntu and derivatives
> Lsyncd does not provide a default configuration file on DEB based systems.
c) We need to create it manually. However, Lsyncd includes some sample configuration files that are useful to get a general idea of ββhow to do synchronization. The configuration example files will be found under the directory β/ usr / share / doc / lsyncd - * / examplesβ .
> ls / usr / share / doc / lsyncd / examples /
d) Output example:
lbash.lua lgforce.lua lpostcmd.lua lrsyncssh.lua
lecho.lua limagemagic.lua lrsync.lua
e) As you can see in the above output, each config file is with a .lua extension. This is because the lsync configuration file is written using the Lua programming language. Let's take a look at a sample configuration file.
> cat /usr/share/doc/lsyncd/examples/lrsync.lua
f) The Lrsync configuration file looks like this:
----
- User configuration file for lsyncd.
-
- Simple example for default rsync.
-
settings = {
statusFile = "/tmp/lsyncd.stat",
statusInterval = 1,
}
sync {
default.rsync,
source = "src",
target = "trg",
}
enjoy β€οΈππΏ
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Synchronizing local and remote directories in Linux using Lsyncd ?
Installing Lsyncd
1οΈβ£On Debian and its derivatives, such as Ubuntu , Linux Mint, run the following command to install Lsyncd:
> sudo apt-get install lsyncd
2οΈβ£On RHEL, CentOS , you need to enable the Epel repository first.
a) sudo yum install epel-release
b) Then install Lsyncd with the command:
> sudo yum install lsyncd
> Lsyncd configuration on Debian and Ubuntu and derivatives
> Lsyncd does not provide a default configuration file on DEB based systems.
c) We need to create it manually. However, Lsyncd includes some sample configuration files that are useful to get a general idea of ββhow to do synchronization. The configuration example files will be found under the directory β/ usr / share / doc / lsyncd - * / examplesβ .
> ls / usr / share / doc / lsyncd / examples /
d) Output example:
lbash.lua lgforce.lua lpostcmd.lua lrsyncssh.lua
lecho.lua limagemagic.lua lrsync.lua
e) As you can see in the above output, each config file is with a .lua extension. This is because the lsync configuration file is written using the Lua programming language. Let's take a look at a sample configuration file.
> cat /usr/share/doc/lsyncd/examples/lrsync.lua
f) The Lrsync configuration file looks like this:
----
- User configuration file for lsyncd.
-
- Simple example for default rsync.
-
settings = {
statusFile = "/tmp/lsyncd.stat",
statusInterval = 1,
}
sync {
default.rsync,
source = "src",
target = "trg",
}
enjoy β€οΈππΏ
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β