UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is Webmin

Simply put, Webmin is a Web-based Unix system management tool. The administrator accesses various management functions of Webmin through the browser and completes the corresponding management actions. At present, Webmin supports most Unix systems. In addition to various versions of Linux, these systems also include: AIX, HPUX, Solaris, Unixware, Irix and FreeBSD.

πŸ¦‘Compared with other GUI management tools, Webmin has the following significant advantages:

* Web management method enables Webmin to have both local and remote management capabilities;
* Plug-in structure makes Webmin have strong scalability and flexibility. At present, the standard management modules provided by Webmin almost cover common Unix management, and third-party management modules are constantly being developed;
* Access control and SSL support provide sufficient security for remote management;
* Internationalization support, providing multi-language version

is installed Webmin

some linux distributions have been pre-installed Webmin, such as OpenLinux and soft Linux. If your Linux version does not include Webmin, you can download Webmin's RPM package and TARBALL to install.

πŸ¦‘The following are the installation steps of TAR BALL:

* To install Webmin, you need to install perl 5.0.6 or above. If perl is not installed on the target system, you need to download and install {perl-for-linux} from http://www.cpan.org, and also need to install common perl modules; if you need Webmin to support SSL, you also need to install OpenSSL and perl module Net::SSLeay.
* Go to http://www.webmin.com/ to download webmin-0.91.tar.gz
* Unpack webmin-0.91.tar.gz to the directory where you want to install Webmin, such as /usr/local/webmin
* Run the installation script setup.pl. The installation process will ask for the Webmin configuration file directory, the Log directory and the system's listening port (the default is 10000), and you will also be asked to set the administrator password. The installation script will also install Webmin as a system daemon, which is automatically started when the system is turned on.
* Restart the system and visit http://localhost:10000. If the login interface of Webmin appears, the installation is successful.

πŸ¦‘Webmin using UNIX system management

has already been said, all management functions are inserted in the form of a module in Webmin. Webmin categorizes various management modules. The main categories are: Webmin, systems, services, hardware and others. When you successfully log in to the home page of Webmin, these categories will be displayed in front of you in different property pages. The picture below is the home page of a Webmin server.

written by
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ how to determine the first matching record, which is not based on the natural order of the records in the data table. definite. The priority of each record in each data table is arranged as follows:
#ProTips

(1) User table: Determined according to the order of host first and user. The search rules are as follows: records that do not contain wildcard characters, records that contain wildcard characters, and empty records. In the same host, continue to arrange according to user, the rules are the same as above.

(2) db table: the order of retrieval is determined by the host field: records that do not contain wildcards, records that contain wildcards, and empty records.

(3) Host table: The search order is determined according to the host field: records that do not contain wildcards, records that contain wildcards, and empty records. We use the following example to illustrate the rules for matching search:

Please remember that if you change these data tables, you must use mysqladmin reload to make it effective.

The following is how the system performs the search:

+-----------+---------+-
| Host | User | ...
+-----------+---------+-
|% | root | ...
|% | jeffrey | ...
| localhost | root | ...
| localhost | | ...
+-----------+---------+- The

πŸ¦‘search order should be:

localhost/root
localhost/any
any/jeffrey
any/root
like this, if If the user jeffrey on localhost wants to connect to the database, his authorization should be based on the permissions specified in the localhost/"any" line instead of the permissions specified in the "any"/jeffrey line. Please pay attention to this point, because if the configuration is not appropriate It may make you unable to use this database system normally.


written by
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘webdav command line interface is really easy to use so you can easily create a WebDAV server for your own user.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1)git clone https://github.com/hacdias/webdav.git

2) By default, it runs on a random free port and supports JSON, YAML and TOML configuration. An example of a YAML configuration with the default configurations:

3
) # Server related settings
address: 0.0.0.0
port: 0
auth: true
tls: false
cert: cert.pem
key: key.pem
prefix: /

4) # Default user settings (will be merged)
scope: .
modify: true
rules: []

5) # CORS configuration
cors:
enabled: true
credentials: true
allowed_headers:
- Depth
allowed_hosts:
- http://localhost:8080
allowed_methods:
- GET
exposed_headers:
- Content-Length
- Content-Range

6) users:
- username: admin
password: admin
scope: /a/different/path
- username: encrypted
password: "{bcrypt}$2y$10$zEP6oofmXFeHaeMfBNLnP.DO8m.H.Mwhd24/TOX2MWLxAExXi4qgi"
- username: "{env}ENV_USERNAME"
password: "{env}ENV_PASSWORD"
- username: basic
password: basic
modify: false
rules:
- regex: false
allow: false
path: /some/file

7) There are more ways to customize how you run WebDAV through flags and environment variables. Please run webdav --help for more information on that.

8) CORS
The allowed_* properties are optional, the default value for each of them will be *. exposed_headers is optional as well, but is not set if not defined. Setting credentials to true will allow you to:

β–ͺ️Use withCredentials = true in javascript.
β–ͺ️Use the username:password@host syntax.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘AGAIN NEW NORDVPN PREMIUM βœ…

j-lochner@hotmail.com:Harley12 | Expiration = 2020-11-13 16:40:11
j.leening@gmail.com:Melbourne1984! | Expiration = 2021-04-21 10:14:04
j199@hotmail.com:happy199 | Expiration = 2023-03-27 17:18:13
jae.toledo@gmail.com:Snickers1 | Expiration = 2020-08-01 09:58:35
jaime8726.jm@gmail.com:Jaime6278 | Expiration = 2020-10-14 18:06:45
Jake_Tatt@hotmail.com:halorules12 | Expiration = 2020-08-02 19:47:07
jakebarryb@gmail.com:548julia | Expiration = 2020-10-20 14:36:30
jakemsawyer@outlook.com:Tokulerok1! | Expiration = 2020-08-25 22:14:11
jamela3@students.fscj.edu:Badass15! | Expiration = 2022-05-11 20:09:26
james.r.foster86@gmail.com:Itsasecret86 | Expiration = 2021-05-01 19:39:44
james1983thompson@hotmail.com:Arsenal01 | Expiration = 2022-09-15 11:10:41
Jamesd10886@hotmail.com:Jimjam99 | Expiration = 2021-12-04 04:48:57

E N J O Y β€οΈπŸ‘πŸ»
BYPASSING UAC ON WINDOWS 10 USING DISK CLEANUP.pdf
682.8 KB
BYPASSING UAC ON WINDOWS 10 USING DISK CLEANUP
full
with pictures
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FastTips for speedup windows 10 :

1) Disable Startup Programs

2) Switch to the β€œStartup” tab and check for unnecessary apps with higher impact on the system. You can do so by clicking on β€œStartup Impact” label. Next, right-click on applications and click on β€œDisable”. Do this for every unnecessary app. This will speed up Windows 10 every time you turn on your PC.

3) Disable Background Apps
Background apps are Windows apps which run in the background to receive notifications and updates. While messaging and email apps may require background sync, apps like Candy Crush and Calculator don’t need it at all. These apps constantly run in the background and make the computer slow, besides draining the battery. So to speed up Windows 10, first disable the background apps. Here is how to do it.

4) Regularly, then you may skip this section. However, if you don’t use Cortana and want to limit your search to just PC, then it’s better to disable it at once. This will save you a lot of computer resources as Cortana keeps hogging memory and important resources in the background. Follow these steps to disable Cortana and speed up Windows 10 significantly.

5) Uninstall Multiple Antivirus Programs
It is a bad idea to install multiple Antivirus programs to secure your PC. Antivirus checks file integrity in the background which in turn eats disk usage. Having multiple antiviruses will further make your computer slow. In fact, installing an antivirus on Windows 10 is completely avoidable as it comes with Windows Defender pre-installed. And frankly, it’s pretty good and reliable. In case, your PC is attacked by some rogue virus and Windows Defender is unable to remove it then we recommend you to install Malwarebytes to clean up your PC. Malwarebytes will speed up Windows 10 and also remove the viruses.

6) Change Power Plan to high performance

7) Disable Windows UpdateBlock Telemetry Service
Windows is increasingly tracking users with its various tools and techniques. It constantly sends and retrieves data to its server in the background. All these background telemetry services hog down crucial computer resources which further makes your PC slow down. So to block these telemetry services from running in the background, you can use a personalized host file. It blocks the server and the PC from establishing a communication. A user named Scorthyn on Reddit has created the host file and you can use it on your Windows 10 PC

8) Disable Indexing on Older Windows 10 PCs
In simple terms, Indexing means keeping a list of all the files located in your PC. It helps Windows in finding the file quickly when you hit the search button. However, on older PCs, the indexing process eats up too many resources and makes the PC remarkably slow. Note that if you are using a Windows PC with powerful configs then disabling indexing will not make a considerable difference.

9) Debloat Windows 10
Of late, Windows has become incredibly bloated with useless apps and services. These apps take up crucial RAM, processing power and disk space. It significantly slows down the system and you are left with a laggy mess. The sad part is that you can’t even uninstall these apps through the Control Panel


10) Keep a Check on Background Processes

11) Use an Efficient Browser
Most of us use a web browser on our Windows 10 PC to browse the internet. In my case, I use Chrome all the time because I am deep into the Google’s ecosystem. However, it is quite popularly know that Chrome is a resource hogger. It really eats up most of my computer resources, making it slow and overall laggy for a few seconds

12) Switch to an SSD
I believe Windows 10 is a great Operating Systemv β€” almost as good as the macOS β€” but it has been marred by sloppy hardware over the years. Most of us use Windows 10 on a mechanical hard drive(HDD) which is quite slow and further results in slow performance.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
written combined between wiki & redit
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Java se basics
1). Java basic data types and expressions, branch and loop.

2). Use of String and StringBuffer, regular expressions.

3). Object-oriented abstraction, encapsulation, inheritance, polymorphism, class and object, object initialization and recovery; constructor, this keyword, method and method parameter passing process, static keyword, internal class.

4). Object instantiation process, method coverage, final keywords, abstract classes, interfaces, inheritance advantages and disadvantages analysis; object polymorphism: conversion between subclasses and parent classes, abstract classes and interfaces are many Application in the state, the benefits of polymorphism.

5). Java exception handling, the mechanism of exception.

6). Commonly used design patterns: Singleton, Template, Strategy patterns.

7). JavaAPI introduction: a kind of basic data type packaging class, System and Runtime class, Date and DateFomat class, etc.

8). Java collection introduction: Collection, Set, List, ArrayList, LinkedList, Hashset, Map, HashMap, Iterator and other commonly used collection APIs.

9).JavaI/O input and output streams: File and FileRandomAccess classes, byte stream InputStream and OutputStream, character stream Reader and Writer, and corresponding implementation classes, IO performance analysis, byte and character conversion stream, and the concept of packaging stream, And commonly used packaging, computer coding.

10). Java advanced features: reflection and generics.

11). Multithreading principle: how to create multithreading (Thread, Runnable) in the program, thread safety issues, thread synchronization, communication between threads, deadlock.

12). You can remember some of the Java knowledge points you encounter daily with cloud notes such as Youdaoyun, such as the syntactic sugar of java8

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘What is the correct learning posture for "C Primer Plus"?

1) We often hear people arguing that "Python, Java, PHP... are the best languages in the world", but we rarely hear people praise the C language.

2) Why do so many people do not learn C language? Because many people find it too difficult to use the C language as an introductory language. There are pointers, callbacks, and recursive operations that are too difficult. Why do so many people find C language difficult? Asynchronous Jun summarized based on the sharing of netizens:

3) C language itself has certain difficulties

Compared with the more popular Java, Python and other languages, C language is a bit more difficult to get started, especially some of the function pointers, pointer functions, callbacks, and recursion in the C language inside. I think this thing is too difficult. , It is too abstract to understand, and unpredictable to use. The pointer is a threshold for learning C language, and once you cross it, you will be able to get there. How many people are falling on the pointer.


4) C language is a process-oriented language

In principle, functions and modules can be called indiscriminately in the C language. If the framework is not strong, the code written is a mess and very difficult to maintain. Many beginners use the C language to implement a function, basically put it in a file or function, messy code together, if you use pointers to implement the function, the code is almost impossible to see, of course this is a common problem for beginners.

5) When it comes to learning the C language, one thousand people may have a thousand feelings. The functions are too complicated and the pointers cannot be understood...Those who have been abused by it have really tried many times.

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
The Fully Remote Attack Surface of the iPhone .pdf
308.4 KB
The Most #requested tutorial
The Fully Remote Attack Surface of the iPhone
full
with pictures
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘4 dependency injection methods of Spring Bean by Undercode:
)

The so-called dependency injection is actually assigning values to properties in the object, because there are other objects in the object, so dependencies are formed. Spring has 4 ways to assign values to attributes:

1) Constructor injection
Constructor injection refers to injecting attributes or objects in the constructor to achieve dependency injection. As shown below, define a bean with id userDaoImpl in the tag, and inject the value of name as username and value as admin. After the injection is completed Get the value admin directly through this.username. The reference type uses the ref attribute, and the basic type uses the value attribute.

public class UserDaoImpl {

private String username;

public UserDaoImpl(String username) {
this.username = username;
}
<bean id="userDaoImpl" class="com.example.UserDaoImpl">
<constructor-arg name="username" value="admin"></constructor-arg>
</bean>

2) set method injection
The set method injection is to realize the dependency injection of attributes or objects by implementing get and set methods in the class. As shown below, define a Bean with an id of userDaoImpl in the label, and inject the value of name as username and value as admin , After the injection is completed, the value admin is directly obtained through getUsername().

public class UserDaoImpl {

private String username;


public String getUsername() {
return username;
}

public void setUsername(String username) {
this.username = username;
}
}
<bean id="userDaoImpl" class="com.example.UserDaoImpl">
<property name="username" value="admin"></property>
</bean>

3) Automatic assembly
Spring provides the function of automatic assembly, which simplifies our configuration. Automatic assembly is not turned on by default. There are two common ways:

byName: Automatic assembly by parameter name, as shown below, after the autowire with id of userService is set to byName, the IOC container will auto-assemble by name, and find that there is an attribute called userDao in the UserService class, and then look at the IOC container Is there an id of userDao, if so, install it.

 id="userDao" class="com.example.UserDao"></bean>
<bean id="userService" class="com.example.UserService" autowire="byName"/>

4) Annotation
The @Undercode_Autowired as example annotation can realize automatic assembly, as long as the annotation is marked on the corresponding attribute, but the @autowired_autowired annotation is only injected according to byType.

 class UserController {

@Autowired_example
private IUserService userService;
}

πŸ¦‘The @Resource annotation can realize automatic assembly. It has two important attributes: name and type. The name attribute is resolved to the name of the bean, and the type attribute is resolved to the type of the bean. So if the name attribute is used, the automatic injection strategy of byName is used, and the automatic injection strategy of byType is used if the type attribute is used. If neither the name nor the type attribute is specified, then the byName automatic injection strategy will be used through the reflection mechanism.


ENJOYβ€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘All Popular WAYS TO HACK YOUR WIRELESS NETWORK?

Wireless Attacks have grown to be a very popular as it’s an easy way to attack a company’s network and steal information. Hackers use various methods and styles to steal your WiFi password and information. Below are a few ways a hacker can attack your wireless network to gain access to your data. Make sure you have security protocols and measures in place to for each!

1) Rouge Access Point
When an unauthorized access point (AP) is installed on your network and broadcasts a WiFi signal (SSID) that a hacker uses to hack your network.

2) Man in the Middle Attack
Hackers trick computers or mobile devices into sending their transmissions to the attacker’s system using various methods like creating duplicate wireless signals (SSID).

3) War Driving
War driving is when someone drives around with a WiFi scanning device and special software looking for vulnerable access points hack. They’ve even have taken it a step further and are now using drones to look for vulnerable access points in high rise offices. Ways to address this is turn down he power of your access point signal or hide your WiFi signal.

4) WEP ATTACKS
WEP Attacks: If your Wireless Network is using WEP Encryption to password protect it, you might as well call your WiFi SSID β€œFREE NETWORK ACCESS STEAL FROM ME”. Why? WEP is an earlier encryption method for WiFi that hackers have mastered how to crack quite easily.

5) Bluetooth Attacks: There are a variety of ways to attack a Bluetooth device that allows a hacker to takeover and steal information.

6) Bluejacking. This is the practice of sending unsolicited messages to nearby Bluetooth devices. It usually happens in crowded areas where a sender can find devices that are broadcasting their Bluetooth signal they can send messages to.

Bluesnarfing. Any unauthorized access to or theft of information from a Bluetooth connection is bluesnarfing.

Bluebugging. Allows an attacker to take over a device / phone. Attackers can listen in on phone conversations, enable call forwarding, send messages, and more.

Make sure that you put password protection on your Bluetooth device, keep you devices software up to date, and turn off your Bluetooth when not in use.

(darkwiki)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to implement user management in MySQL :

1)) What is the main function of the authorization mechanism?
The basic function of the authorization mechanism is to give a user on a host the select, insert, update, and delete permissions for a database. And its additional functions include whether to allow anonymous use of the database, using some specific functions of MysQL,

2)) How does the authorization mechanism work?
The combination of host and user is regarded as the only sign in MySQL. For example, the user lee on host 1 and host 2 are actually different, and their permissions to use MySQL can also be different. The core problem of the entire authorization mechanism is to solve the problem of granting a user who logs in from a host to use a database. You can test the authority of a user on a host for database operations through the script mysqlaccess. All authorization information is stored in the user, host and db tables of the database mysql. We can connect to this database through mysql mysql commands, and display the contents of each data table through select from user (or db, host).

3))The permissions granted in the user table are the basic authorization of the entire authorization mechanism, that is to say, the definition in user is applicable to any user + host, unless otherwise defined in the db table, therefore, for the user It is best to authorize based on a certain database. The main purpose of the host table is to maintain a list of "safe" servers. When considering the authority of a certain user/host to a certain database, we also need to study the matching search mechanism of the authorization mechanism:

4))First, we need to introduce the concept of a wildcard, which includes "% ", which means any (host, user or database), and if a record is empty, it also means any.

5))Secondly, a user's password can be encrypted in the authorization mechanism, and it must be encrypted. The encryption method is password ('password'). If the password is directly filled in, the database will be inaccessible.

ENJOYβ€οΈπŸ‘πŸ»
written by
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Install ZFS Filesystem on Ubuntu :

ZFS is a file system created by Sun Microsystems. It was first shipped with Solaris but now available in other LINUX and UNIX operating systems. ZFS uses virtual storage pools known as zpools that can deal with the storage and management of a large amount of data.
Removing the ZFS storage pool

F E A T U R E S :

Let’s take a look at some of the features of ZFS file system:

> High storage capacity
> Data integrity
> Protection against data corruption
> Efficient data protection
> Date compression

πŸ¦‘Installing ZFS Filesystem on Ubuntu
We will be using the command line Terminal application for the installation of the ZFS filesystem. To launch the command line Terminal, use the Ctrl+Alt+T keyboard shortcut.

Now to install the ZFS filesystem on Ubuntu, issue the following command in Terminal:

1) $ sudo apt install zfsutils-linux

2) When prompted for the password, provide the sudo password.

3) After running the above command, the system might ask for confirmation that if you want to continue the installation or not. Press y to continue; after that, the package will be installed on your system.

To verify ZFS file system installation, issue the following command in Terminal:

$ which zfs

4) Creating the ZFS storage pool
After the installation is completed, we will now create a storage pool for our drives. Here are the steps to do so:

> First, find out the names of the drives for the pool. Use the following command in Terminal to do so:

$ sudo fdisk –l

5) To create the striped pool, use the following syntax:

$ sudo zpool create <pool_name> <drive1> <drive2>
To create the mirror pool, use the following syntax:

$ sudo zpool create <pool_name> mirror <drive1> <drive2>

6) If any error occurs, try forcing the command using the -f option after the zpool create command.

In the following example, we will create the striped pool named β€œtest” using the /dev/sdb and /dev/sdc.

$ sudo zpool create test /dev/sdb /dev/sdc

7 )To find out where the pool has been mounted, use the following command in Terminal:

$ df –h

8 )From the above command, we can see that the pool has been mounted at the /test. You can also change the mount point for the pool using the following syntax:

$ sudo zfs set mountpoint=<path> <pool_name>
For example, to set export/zfs as the new mount point, the command would be:

$ sudo zfs set mountpoint=/export/zfs test

9) Then use the following command to verify if the mount point has changed:

$ df –h | grep test

10) You can also create the directories under the storage pool. For example, to create a directory named files under the storage pool, the command would be:

$ sudo zfs create test/files

11) To view all the ZFS storage pools on the system, you can use the following command in Terminal:

$ zpool list
It lists all the pools along with their size, space usage, health, and some other information.

12) To view all the configurations and status of each device in the ZFS storage pool, use the following command in Terminal:

$ zfs status

13) If you experience some issues related to drives in the pool, you can use the events option. Issue the following command in Terminal to view events associated with a specific pool:

$ sudo zpool events pool_name –v

14) Removing the ZFS storage pool
If you no longer need the pool, you can remove it. However, note that removing the pool will also remove the files contained within it.

Use the following command syntax to remove the storage pool:

$ sudo zpool destroy pool_name
In this article, you have learned how to install the ZFS file system on Ubuntu 20.04 LTS (Focal Fossa). You have also learned how to create a storage pool in the ZFS file system and remove it when you no longer need it.

ENJOYβ€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Muhstik botnet aggressively attacked domestic cloud servers, thousands of servers have been lost :

>undercode detected a large number of attacks originating from overseas IP and some domestic IP against domestic cloud server tenants. The attacker blasted into the server via SSH (port 22), then executed malicious commands to download the Muhstik botnet Trojan, set up a botnet and controlled the lost server to execute SSH lateral movement, download the Monero mining Trojan, and accept remote commands to initiate DDoS attacks.

> After user authorization conducted a traceability analysis of the attack and found that the cloud servers of many well-known domestic companies were attacked by the botnet. At present, thousands of servers have been compromised, experts recommend that relevant companies take necessary measures to intercept intruders and restore systems that have been compromised.

#news
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Updated WireSpy enables the automation of various WiFi attacks to conduct Man-In-The-Middle-Attacks (MITMAs).

> WireSpy allows attackers to set up quick honeypots to carry out MITMAs. Monitoring and logging functionality is implemented in order to keep records of the victims' traffic/activities. Other tools can be used together with Wirespy to conduct more advanced attacks.

πŸ¦‘Two type of attacks are supported at the moment:

1) Evil twin: Force victims to auto-connect to the honeypot by spoofing a "trusted" hotspot (clone an existing access point and de-authenticate its users to force them to transparently connect to the spoofed honeypot).

2) Honeypot: Set up a simple rogue hotspot and wait for clients to connect.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/aress31/wirespy.git

2) cd wirespy

3) $ chmod +x wirespy.sh

4) $ sudo ./wirespy.sh

5) COMMANDS :
Attacks:
eviltwin > launch an evil twin attack
honeypot > launch a rogue access point attack

F E A T U R E S :

> Capture victims' traffic.

> MAC address spoofing.

> Set-up honeypot and evil twin attacks.

> Show the list of in range access points.
Wireless adapter|card|dongle power amplification.

πŸ¦‘Tested by Undercode On :

- ubuntu

- undercode Linux

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TeamViewer exposes vulnerable computers that can be hacked without passwords by browsing specific web pages
:

> TeamViewer officially announced that a vulnerability has recently been fixed, which may allow an attacker to quietly establish a connection with your computer and further exploit the system. Vulnerability number: CVE-2020-13699, this vulnerability affects TeamViewer versions: 8,9,10,11,12,13,14,15.

> The picture above shows the CVE-2020-13699 PoC demonstration. Using an invisible iframe code in the web page will start the TeamViewer Windows desktop client and force it to open the remote SMB share . That is to say, the attacker does not need to know the TeamViewer password. This vulnerability will The system session permission of the victim machine is automatically authenticated and obtained permission.

> Windows will perform NTLM authentication when opening the SMB share, and can forward the request (using a tool such as a responder) to execute code (or capture the
request for hash cracking).

#news
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
Information Security Professional (CISSP Preparation).pdf
530.5 KB
Information Security Professional (CISSP Preparation)
#FULL