UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TeamViewer exposes vulnerable computers that can be hacked without passwords by browsing specific web pages
:

> TeamViewer officially announced that a vulnerability has recently been fixed, which may allow an attacker to quietly establish a connection with your computer and further exploit the system. Vulnerability number: CVE-2020-13699, this vulnerability affects TeamViewer versions: 8,9,10,11,12,13,14,15.

> The picture above shows the CVE-2020-13699 PoC demonstration. Using an invisible iframe code in the web page will start the TeamViewer Windows desktop client and force it to open the remote SMB share . That is to say, the attacker does not need to know the TeamViewer password. This vulnerability will The system session permission of the victim machine is automatically authenticated and obtained permission.

> Windows will perform NTLM authentication when opening the SMB share, and can forward the request (using a tool such as a responder) to execute code (or capture the
request for hash cracking).

#news
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
Information Security Professional (CISSP Preparation).pdf
530.5 KB
Information Security Professional (CISSP Preparation)
#FULL
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Repair USB disk and other removable devices via linux :
#FastTips

For our purposes, let's assume that you've already identified the problematic device / dev / sdb.

1) First, you need to make sure the drive is offline:

> sudo umount / dev / sdb


2) Now run the fsck command:

> sudo fsck / dev / sdb

3) Check the output for errors. If nothing appears, check the exit code with echo $ ?.

> There are also some flag options that we can add to enable automatic fixes.

4) Regardless, you can use -pfsck for automatic repair.

> sudo fsck -p / dev / sdb


5) Likewise, -y fixes will be applied to any detected file system corruption.

#FastTips
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

T E R M S :

πŸ¦‘The DNS ( Domain Name System ) is indisputably one of the most important parts of the internet. DNS is used to translate an actual name into these IP address numbers. Each device connected to the Internet has a unique IP address that other machines use to find the device. DNS records explain the link

πŸ¦‘Alexa traffic rank is determined by the web information company Alexa. Alexa internet, inc. is a California based subsidiary company of Amazone.com that provides commercial web traffic data. All Website ranking data provided by Alexa ( Amazon ) Tool. Check your Alexa rank now free our Tool Alexa rank checker.

πŸ¦‘What is ROT13 Encoding
It’s a letter substitution cipher and the latter’s are or are short for rotate. we rotating well each letter in the alphabet hash a numeric position 1 to 26 a is at position 1 and b is at position2 and z is a last position 26.

πŸ¦‘What is URL Encoding
URL encoding is simply just a way we can safely transfer data in the URL it is typically used inside the URL for things like URL parameter and query strings. when submitting get request or form posts request. it is simply just an encoding technique.

πŸ¦‘What is base64 encoding
Base64 is a group of binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64 representation. Each Base64 digit represents exactly 6 bits of data.

base64 is a way to take any form of data to transform it into a long string of plaintext to be sent over the web.

E N J O Y β€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁'
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘RANDOM TIPS RELATED TO GNOME :
#FastTips

> GNOME has many libraries and components, but now we only need to know two of them: GTK+ and GNOME. You may have heard of TK, which is another toolkit for writing graphical interface applications using perl. TK The task is to tell X Server how to draw buttons, menus, dialog boxes, etc., and return some signals to trigger the corresponding Perl function to handle some changes.

> As an intermediary between the Perl program and X Server. GTK+ does similar work , But it turns out that it works more beautifully. It can provide all graphical elements, such as: buttons, text labels, text input, etc., using a loop waiting for events to achieve interaction.

> The GNOME library establishes an abstraction on top of GTK+ The first layer provides more advanced graphical objects, such as: main application window, about window, button panel, dialog box, color and font selection box, and provides collaboration with other GNOME environment programs (such as spelling checkers, calculators) interface.

@UNDERCODE_Testing
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Random pc hacking tips :

1) Control your computer through the "mouse hole"
:

> The night was dark and the wind was high, and a black figure rushed into a computer room. Skillfully opened a computer with important data. However, the data in this computer has been encrypted. To obtain these data, an administrator account must be used. The black shadow smiled disdainfully, and used a known ordinary authority account to enter the system. With the "help" of Microsoft Windows keyboard event privilege escalation vulnerability, it is easy to obtain administrator privileges to steal data. After leaving the computer room, his figure disappeared into the boundless darkness.

γ€€γ€€
2) Discover new vulnerabilities

> Due to design flaws, Windows desktop applications have overflow errors when processing keyboard events sent through the keybd_event() function. Attackers can send malicious keyboard events to desktop applications running with higher authority (such as explorer.exe). Execute arbitrary code with administrator rights. This vulnerability allows an account with ordinary user rights to use administrator rights to perform arbitrary operations on the system. The systems affected..

3) ready for intrusion tools

> pulist: A process PID viewer, you can view the PID value of the current system process at the command prompt.

γ€€γ€€
> keybd: An overflow tool for keyboard event privilege escalation vulnerability, through which system administrator privileges can be obtained.

γ€€γ€€
> nc: The "Swiss Army Knife" of hacker intrusion, a powerful tool for system port monitoring.

γ€€γ€€
4) Invasion process

γ€€γ€€
> One, get the process PID value

γ€€γ€€
> According to the characteristics of the vulnerability, we need to obtain the process PID value of a desktop application (such as explorer.exe). In the "Task Manager" of the system, we can't see the PID value of the process, so we need to use a small tool that can view the PID value of the system process-pulist. Run "pulist.exe" in the "command prompt" to display the PID value of the current system process...

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘bs2.dll manual deletion methode :

1. Click start, choose'run'
2. Type'cmd'-You should now have a DOS-commando window open.
3. Type cd "%WinDir%\System"
4. regsvr32 /u "..\rem00001.dll "
5. regsvr32 /u "..\bs2.dll"
6. regsvr32 /u "..\bs3.dll"
7. Click start, choose'run '
8. Type'regedit '
9. Find the key
HKEY_LOCAL_MACHINE\Software \Microsoft\Windows\CurrentVersion\Run
and delete the entry'BookedSpace' (BS2 variant) or'Bsx3' (BS3 variant).
10. Reboot your computer
11. Delete the'rem00001.dll','bs2.dll' or ' bs3.dll' file in the Windows folder.
12. Click start, choose'run' 13. Type'regedit

14. delete the key

HKEY_LOCAL_MACHINE\Software\Remanent or HKEY_LOCAL_MACHINE_Software\BookedSpace


@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Change PHP's default Fastcgi mode to ISAPI mode (only run in Windows environment)

1) Download the ZIP file package of PHP at http://www.php.net (note that the version should correspond)

2) Copy the php4isapi.dll in the sapi directory to the c:\php directory

3) Enter the virtual host "Website Management"-"Virtual Host" of the management platform-in the server settings, modify the PHP mapping to change the original:
.php,C:\PHP\php.exe,5,GET,HEAD,POST,TRACE|
Change Into:
.php,C:\PHP\php4isapi.dll,5,GET,HEAD,POST,TRACE|

4) (Required only for IIS 6) Open the IIS manager, click on the Web service extension, click on the properties of php, "required File"---Add in--Select "C:\PHP\php4isapi.dll", after confirming, PHP can call.|

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Change PHP's default Fastcgi mode to ISAPI mode (only run in Windows environment)

1) Download the ZIP file package of PHP at http://www.php.net (note that the version should correspond)

2) Copy the php4isapi.dll in the sapi directory to the c:\php directory

3) Enter the virtual host "Website Management"-"Virtual Host" of the management platform-in the server settings, modify the PHP mapping to change the original:
.php,C:\PHP\php.exe,5,GET,HEAD,POST,TRACE|
Change Into:
.php,C:\PHP\php4isapi.dll,5,GET,HEAD,POST,TRACE|

4) (Required only for IIS 6) Open the IIS manager, click on the Web service extension, click on the properties of php, "required File"---Add in--Select "C:\PHP\php4isapi.dll", after confirming, PHP can call.|

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Massive XS-Search over multiple Google products.pdf
539.1 KB
Massive XS-Search over multiple Google products
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Eight basic principles to stay away from viruses :

1) Establish good security habits. For example: Do not open some unknown emails and attachments, do not go to some unknown websites, do not execute software that has not been anti-virus after downloading from the Internet , etc. These necessary habits will make you The computer is more secure.

2) Turn off or delete unnecessary services in the system . By default, many operating systems will install some auxiliary services, such as FTP client, Telnet, and Web server. These services provide convenience for attackers, but are not of much use to users. If they are deleted, the possibility of being attacked can be greatly reduced.

3) Update security patches frequently. According to statistics, 80% of network viruses spread through system security vulnerabilities , such as Worm King, Shockwave, Sasser, etc. Therefore, we should regularly download the latest security patches from the Microsoft website to prevent Before it happens.

4) Using complex passwords Many network viruses attack the system by guessing simple passwords. Therefore, using complex passwords will greatly improve the safety of the computer.

5) Quickly isolate the infected computer. When your computer finds a virus or abnormality, you should immediately disconnect the network to prevent the computer from being infected more or becoming a source of transmission and infecting other computers again.

6) Know some virus knowledge so that you can discover new viruses in time and take corresponding measures to protect your computer from virus damage at critical moments. If you can understand some registry knowledge, you can regularly check whether there are suspicious keys in the registry's self-starting items; if you understand some memory knowledge, you can often check whether there are suspicious programs in the memory.

7) It is best to install professional anti-virus software for comprehensive monitoring. With the increasing number of viruses today, using anti-virus software for anti-virus is an increasingly economical choice. However, after installing anti-virus software, users should frequently upgrade and change some The main monitoring is often opened (such as mail monitoring), memory monitoring, etc., and problems should be reported, so as to truly protect the security of the computer.

8) Users should also install personal firewall software to prevent hacking. Due to the development of the network, hacker attacks on users’ computers are becoming more and more serious. Many network viruses use hacker methods to attack users’ computers. Therefore, users should also install Personal firewall software, set the security level to medium or high, so as to effectively prevent hacker attacks on the network.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Eight basic principles to stay away from viruses :

1) Establish good security habits. For example: Do not open some unknown emails and attachments, do not go to some unknown websites, do not execute software that has not been anti-virus after downloading from the Internet , etc. These necessary habits will make you The computer is more secure.

2) Turn off or delete unnecessary services in the system . By default, many operating systems will install some auxiliary services, such as FTP client, Telnet, and Web server. These services provide convenience for attackers, but are not of much use to users. If they are deleted, the possibility of being attacked can be greatly reduced.

3) Update security patches frequently. According to statistics, 80% of network viruses spread through system security vulnerabilities , such as Worm King, Shockwave, Sasser, etc. Therefore, we should regularly download the latest security patches from the Microsoft website to prevent Before it happens.

4) Using complex passwords Many network viruses attack the system by guessing simple passwords. Therefore, using complex passwords will greatly improve the safety of the computer.

5) Quickly isolate the infected computer. When your computer finds a virus or abnormality, you should immediately disconnect the network to prevent the computer from being infected more or becoming a source of transmission and infecting other computers again.

6) Know some virus knowledge so that you can discover new viruses in time and take corresponding measures to protect your computer from virus damage at critical moments. If you can understand some registry knowledge, you can regularly check whether there are suspicious keys in the registry's self-starting items; if you understand some memory knowledge, you can often check whether there are suspicious programs in the memory.

7) It is best to install professional anti-virus software for comprehensive monitoring. With the increasing number of viruses today, using anti-virus software for anti-virus is an increasingly economical choice. However, after installing anti-virus software, users should frequently upgrade and change some The main monitoring is often opened (such as mail monitoring), memory monitoring, etc., and problems should be reported, so as to truly protect the security of the computer.

8) Users should also install personal firewall software to prevent hacking. Due to the development of the network, hacker attacks on users’ computers are becoming more and more serious. Many network viruses use hacker methods to attack users’ computers. Therefore, users should also install Personal firewall software, set the security level to medium or high, so as to effectively prevent hacker attacks on the network.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Use routers to limit others' internet speed :


1) Enter the correct account password

Nowadays, many routers have built-in wireless bandwidth control function, TP-link and even routers under 100 yuan have this function. First enter the IP address of the wireless router in the address bar of the browser. The default is generally 192.168.1.1. Then enter the user name and password of the router to log in to the router. The default account password is included in the manual. Many routers have default account passwords. .


2) Turn on IP bandwidth control

Find the IP bandwidth control function in the router's setting menu. Take TP wireless router as an example, it will be effective only if you check "Enable IP Bandwidth Control". Some wireless routers need to restart the router to take effect after turning on IP control. Please fill in the broadband type and maximum bandwidth carefully, otherwise it is easy to be "speed limited", that is, 4M broadband may reach the speed of 2M.

3) Choose different IP control rules

Select the IP control mode, such as limit the maximum bandwidth, reserve the minimum bandwidth, etc., can be set to "limit the maximum bandwidth", so that you can control and limit his network speed to limit the download speed. It can be set to "reserve minimum bandwidth", which can ensure basic requirements such as browsing the web.


4) All computers have fixed IP addresses

In the IP address field, fill in the IP address of the computer you want to control. Here you need to fill in the address range, that is, fill in an IP range. If there is only one computer, then the starting IP should be set to the same. It is recommended to set a fixed IP address for all computers in the network, or assign a relatively fixed IP address in the router according to different MAC addresses.


5) Use the router's network isolation function

In order to prevent computer poisoning, or prevent others from using software such as P2P Terminator to damage, if the router has anti-ARP function, please enable it. More expensive routers will have the function of network isolation. If available, you can set the computer to different VLANs for easy management. At the same time, if the router can brush Pomodoro, it is recommended to use the firmware with built-in bandwidth control script.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Use routers to limit others' internet speed :


1) Enter the correct account password

Nowadays, many routers have built-in wireless bandwidth control function, TP-link and even routers under 100 yuan have this function. First enter the IP address of the wireless router in the address bar of the browser. The default is generally 192.168.1.1. Then enter the user name and password of the router to log in to the router. The default account password is included in the manual. Many routers have default account passwords. .


2) Turn on IP bandwidth control

Find the IP bandwidth control function in the router's setting menu. Take TP wireless router as an example, it will be effective only if you check "Enable IP Bandwidth Control". Some wireless routers need to restart the router to take effect after turning on IP control. Please fill in the broadband type and maximum bandwidth carefully, otherwise it is easy to be "speed limited", that is, 4M broadband may reach the speed of 2M.

3) Choose different IP control rules

Select the IP control mode, such as limit the maximum bandwidth, reserve the minimum bandwidth, etc., can be set to "limit the maximum bandwidth", so that you can control and limit his network speed to limit the download speed. It can be set to "reserve minimum bandwidth", which can ensure basic requirements such as browsing the web.


4) All computers have fixed IP addresses

In the IP address field, fill in the IP address of the computer you want to control. Here you need to fill in the address range, that is, fill in an IP range. If there is only one computer, then the starting IP should be set to the same. It is recommended to set a fixed IP address for all computers in the network, or assign a relatively fixed IP address in the router according to different MAC addresses.


5) Use the router's network isolation function

In order to prevent computer poisoning, or prevent others from using software such as P2P Terminator to damage, if the router has anti-ARP function, please enable it. More expensive routers will have the function of network isolation. If available, you can set the computer to different VLANs for easy management. At the same time, if the router can brush Pomodoro, it is recommended to use the firmware with built-in bandwidth control script.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WHAT IS FCK COMMANDS ?

fsck options filesystem


1) If you do not specify a file system, the system will analyze your fstab file (/ etc / fstab) for devices to scan.

>You will need to run the command as root or use it with sudo .

2) You can use the fdisk or df command to list the hard drive in Linux. This way you can specify which device to check with the fsck command.

> Disk / dev / nvme0n1: 238.49 GiB, 256060514304 bytes, 500118192 sectors

 Disk model: THNSN5256GPUK NVMe TOSHIBA 256GB        
Units: sectors of 1 * 512 = 512 bytes

> Sector size (logical / physical): 512 bytes / 512 bytes
I / O size (minimum / optimal): 512 bytes / 512 bytes
Disklabel type: gpt

> Disk identifier: 014A45DC-22A2-4FC0-BEEA-25A6F2406380

3) Device Start End Sectors Size Type
/ dev / nvme0n1p1 2048 1050623 1048576 512M EFI System
/ dev / nvme0n1p2 1050624 98563270 97512647 46.5G Linux filesystem
/ dev / nvme0n1p3 98564096 500117503 401553408 191.5G

4) Linux filesystem

> Unmount the device before running fsck
Don't run fsck on a mounted device, you need to disable the target first to avoid corrupting your files.

5) If you try to run fsck on a mounted device, you should see an error like this:

> destroyer @ andreyex: ~ $ sudo fsck / dev / sda3

> fsck from util-linux 2.34
e2fsck 1.45.5 (07-Jan-2020)
/ dev / sda3 is mounted.
e2fsck: Cannot continue, aborting.

6) Running fsck on a normal healthy disk looks like this:

destroyer @ andreyex: ~ $ sudo fsck / dev / sda2
fsck from util-linux 2.34
fsck.fat 4.1 (2020-01-24)
/ dev / sda2: 5 files, 1967/1972 clusters

7) Although fsck accepts a device name, such as / dev / sda, you can enter the UUID to avoid the confusion with connecting and disconnecting devices. The UUID is a fixed value assigned to your device and will not be affected by these system changes.

8) Understanding the exit codes for the fsck command
This is a list of codes that can be returned from fsck after checking the disk. Your exit code will be the sum of these codes if you analyze one disc. If you use fsck on multiple devices it will return the bitwise OR of two sums.

0 - no errors
1 - fixed file system errors
2 - the system must be rebooted
4 - Filesystem errors left unpatched
8 - Operational error
16 - usage or syntax error
32 - Fsck canceled at user request
128 - Shared library error

9) You can check the exit code of the last run command using the echo $? Command.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WHAT IS FCK COMMANDS ?

fsck options filesystem


1) If you do not specify a file system, the system will analyze your fstab file (/ etc / fstab) for devices to scan.

>You will need to run the command as root or use it with sudo .

2) You can use the fdisk or df command to list the hard drive in Linux. This way you can specify which device to check with the fsck command.

> Disk / dev / nvme0n1: 238.49 GiB, 256060514304 bytes, 500118192 sectors

 Disk model: THNSN5256GPUK NVMe TOSHIBA 256GB        
Units: sectors of 1 * 512 = 512 bytes

> Sector size (logical / physical): 512 bytes / 512 bytes
I / O size (minimum / optimal): 512 bytes / 512 bytes
Disklabel type: gpt

> Disk identifier: 014A45DC-22A2-4FC0-BEEA-25A6F2406380

3) Device Start End Sectors Size Type
/ dev / nvme0n1p1 2048 1050623 1048576 512M EFI System
/ dev / nvme0n1p2 1050624 98563270 97512647 46.5G Linux filesystem
/ dev / nvme0n1p3 98564096 500117503 401553408 191.5G

4) Linux filesystem

> Unmount the device before running fsck
Don't run fsck on a mounted device, you need to disable the target first to avoid corrupting your files.

5) If you try to run fsck on a mounted device, you should see an error like this:

> destroyer @ andreyex: ~ $ sudo fsck / dev / sda3

> fsck from util-linux 2.34
e2fsck 1.45.5 (07-Jan-2020)
/ dev / sda3 is mounted.
e2fsck: Cannot continue, aborting.

6) Running fsck on a normal healthy disk looks like this:

destroyer @ andreyex: ~ $ sudo fsck / dev / sda2
fsck from util-linux 2.34
fsck.fat 4.1 (2020-01-24)
/ dev / sda2: 5 files, 1967/1972 clusters

7) Although fsck accepts a device name, such as / dev / sda, you can enter the UUID to avoid the confusion with connecting and disconnecting devices. The UUID is a fixed value assigned to your device and will not be affected by these system changes.

8) Understanding the exit codes for the fsck command
This is a list of codes that can be returned from fsck after checking the disk. Your exit code will be the sum of these codes if you analyze one disc. If you use fsck on multiple devices it will return the bitwise OR of two sums.

0 - no errors
1 - fixed file system errors
2 - the system must be rebooted
4 - Filesystem errors left unpatched
8 - Operational error
16 - usage or syntax error
32 - Fsck canceled at user request
128 - Shared library error

9) You can check the exit code of the last run command using the echo $? Command.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to generate fake traffic using
Traffic generator ?

A simple python script that generates random HTTP/DNS traffic noise in the background while you go about your regular web browsing, to make your web traffic data less valuable for selling and for extra obscurity.

1) Install requests if you do not have it already installed, using pip:

> pip install requests

2) Clone the repository

> git clone https://github.com/1tayH/noisy.git
Navigate into the noisy directory

3) cd noisy
Run the script

4) python noisy.py --config config.json

5) The program can accept a number of command line arguments:

$ python noisy.py --help
usage: noisy.py -h --log -l --config -c --timeout -t

πŸ¦‘Commands :

-h, --help show this help message and exit
--log -l logging level
--config -c config file
--timeout -t for how long the crawler should be running, in seconds

πŸ¦‘Build Using Docker

1) Build the image
docker build -t noisy .

Or if you'd like to build it for a Raspberry Pi (running Raspbian stretch):

2) docker build -f Dockerfile.pi -t noisy .

Create the container and run:

3) docker run -it noisy --config config.json

βœ…Verified by Undercode on

- Ubuntu

E N J O Y β€οΈπŸ‘πŸ»
git topic
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Finding_the_Balance_Between_Speed_&_Accuracy_During_an_Internet.pdf
13 MB
Finding the Balance Between Speed & Accuracy During an Internet-wide Port Scanning #full #requested
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘https encryption is also cracked HEIST attack to obtain plaintext from encrypted data :

1) WHAT IS The TCP-Windows protocol ?


The TCP-Windows protocol is also called TCP Receive Window. It is a buffer on both ends of a TCP connection for temporarily saving incoming data. The data in this buffer will be sent to the application to make room for new incoming data. If the buffer is full, the data receiver will warn the sender that it cannot receive more data before the buffer is emptied. There are some details involved, but they are all very basic things. Generally, the device will notify the other party of the current size of its TCPWindows in the TCP Header information.

2) C O N D I T I O N S :

The conditions for the use of the HEIST attack are very simple, requiring only a few lines of simple javascript code, and no man-in-the-middle attack is required. First, the transmitted sensitive data will be captured and saved. This attack method can obtain private sensitive information such as bank card number, real name, phone number, and social security number. But as we all know, most of these data are encrypted by HTTPS. Then make a probe on the size and length of the encrypted data. Many websites use file compression technology to improve the loading speed of web pages, and attackers can just use the design flaws to decrypt the data payload (similar to BREACH attacks and CRIME attacks).

3) HEIST technology can use new APIs (Resource Timing and Fetch) to calculate the number of transmission frames and windows sent by the target host. Throughout the process, researchers can use a piece of JavaScript code to determine the actual size of the HTTPS response message. Then, the malicious HEIST code can cooperate with the BREACH technology to extract the encrypted information from the user's request data.

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁