β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦bs2.dll manual deletion methode :
1. Click start, choose'run'
2. Type'cmd'-You should now have a DOS-commando window open.
3. Type cd "%WinDir%\System"
4. regsvr32 /u "..\rem00001.dll "
5. regsvr32 /u "..\bs2.dll"
6. regsvr32 /u "..\bs3.dll"
7. Click start, choose'run '
8. Type'regedit '
9. Find the key
HKEY_LOCAL_MACHINE\Software \Microsoft\Windows\CurrentVersion\Run
and delete the entry'BookedSpace' (BS2 variant) or'Bsx3' (BS3 variant).
10. Reboot your computer
11. Delete the'rem00001.dll','bs2.dll' or ' bs3.dll' file in the Windows folder.
12. Click start, choose'run' 13. Type'regedit
14. delete the key
HKEY_LOCAL_MACHINE\Software\Remanent or HKEY_LOCAL_MACHINE_Software\BookedSpace
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦bs2.dll manual deletion methode :
1. Click start, choose'run'
2. Type'cmd'-You should now have a DOS-commando window open.
3. Type cd "%WinDir%\System"
4. regsvr32 /u "..\rem00001.dll "
5. regsvr32 /u "..\bs2.dll"
6. regsvr32 /u "..\bs3.dll"
7. Click start, choose'run '
8. Type'regedit '
9. Find the key
HKEY_LOCAL_MACHINE\Software \Microsoft\Windows\CurrentVersion\Run
and delete the entry'BookedSpace' (BS2 variant) or'Bsx3' (BS3 variant).
10. Reboot your computer
11. Delete the'rem00001.dll','bs2.dll' or ' bs3.dll' file in the Windows folder.
12. Click start, choose'run' 13. Type'regedit
14. delete the key
HKEY_LOCAL_MACHINE\Software\Remanent or HKEY_LOCAL_MACHINE_Software\BookedSpace
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Change PHP's default Fastcgi mode to ISAPI mode (only run in Windows environment)
1) Download the ZIP file package of PHP at http://www.php.net (note that the version should correspond)
2) Copy the php4isapi.dll in the sapi directory to the c:\php directory
3) Enter the virtual host "Website Management"-"Virtual Host" of the management platform-in the server settings, modify the PHP mapping to change the original:
.php,C:\PHP\php.exe,5,GET,HEAD,POST,TRACE|
Change Into:
.php,C:\PHP\php4isapi.dll,5,GET,HEAD,POST,TRACE|
4) (Required only for IIS 6) Open the IIS manager, click on the Web service extension, click on the properties of php, "required File"---Add in--Select "C:\PHP\php4isapi.dll", after confirming, PHP can call.|
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Change PHP's default Fastcgi mode to ISAPI mode (only run in Windows environment)
1) Download the ZIP file package of PHP at http://www.php.net (note that the version should correspond)
2) Copy the php4isapi.dll in the sapi directory to the c:\php directory
3) Enter the virtual host "Website Management"-"Virtual Host" of the management platform-in the server settings, modify the PHP mapping to change the original:
.php,C:\PHP\php.exe,5,GET,HEAD,POST,TRACE|
Change Into:
.php,C:\PHP\php4isapi.dll,5,GET,HEAD,POST,TRACE|
4) (Required only for IIS 6) Open the IIS manager, click on the Web service extension, click on the properties of php, "required File"---Add in--Select "C:\PHP\php4isapi.dll", after confirming, PHP can call.|
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Change PHP's default Fastcgi mode to ISAPI mode (only run in Windows environment)
1) Download the ZIP file package of PHP at http://www.php.net (note that the version should correspond)
2) Copy the php4isapi.dll in the sapi directory to the c:\php directory
3) Enter the virtual host "Website Management"-"Virtual Host" of the management platform-in the server settings, modify the PHP mapping to change the original:
.php,C:\PHP\php.exe,5,GET,HEAD,POST,TRACE|
Change Into:
.php,C:\PHP\php4isapi.dll,5,GET,HEAD,POST,TRACE|
4) (Required only for IIS 6) Open the IIS manager, click on the Web service extension, click on the properties of php, "required File"---Add in--Select "C:\PHP\php4isapi.dll", after confirming, PHP can call.|
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Change PHP's default Fastcgi mode to ISAPI mode (only run in Windows environment)
1) Download the ZIP file package of PHP at http://www.php.net (note that the version should correspond)
2) Copy the php4isapi.dll in the sapi directory to the c:\php directory
3) Enter the virtual host "Website Management"-"Virtual Host" of the management platform-in the server settings, modify the PHP mapping to change the original:
.php,C:\PHP\php.exe,5,GET,HEAD,POST,TRACE|
Change Into:
.php,C:\PHP\php4isapi.dll,5,GET,HEAD,POST,TRACE|
4) (Required only for IIS 6) Open the IIS manager, click on the Web service extension, click on the properties of php, "required File"---Add in--Select "C:\PHP\php4isapi.dll", after confirming, PHP can call.|
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Massive XS-Search over multiple Google products.pdf
539.1 KB
Massive XS-Search over multiple Google products
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Eight basic principles to stay away from viruses :
1) Establish good security habits. For example: Do not open some unknown emails and attachments, do not go to some unknown websites, do not execute software that has not been anti-virus after downloading from the Internet , etc. These necessary habits will make you The computer is more secure.
2) Turn off or delete unnecessary services in the system . By default, many operating systems will install some auxiliary services, such as FTP client, Telnet, and Web server. These services provide convenience for attackers, but are not of much use to users. If they are deleted, the possibility of being attacked can be greatly reduced.
3) Update security patches frequently. According to statistics, 80% of network viruses spread through system security vulnerabilities , such as Worm King, Shockwave, Sasser, etc. Therefore, we should regularly download the latest security patches from the Microsoft website to prevent Before it happens.
4) Using complex passwords Many network viruses attack the system by guessing simple passwords. Therefore, using complex passwords will greatly improve the safety of the computer.
5) Quickly isolate the infected computer. When your computer finds a virus or abnormality, you should immediately disconnect the network to prevent the computer from being infected more or becoming a source of transmission and infecting other computers again.
6) Know some virus knowledge so that you can discover new viruses in time and take corresponding measures to protect your computer from virus damage at critical moments. If you can understand some registry knowledge, you can regularly check whether there are suspicious keys in the registry's self-starting items; if you understand some memory knowledge, you can often check whether there are suspicious programs in the memory.
7) It is best to install professional anti-virus software for comprehensive monitoring. With the increasing number of viruses today, using anti-virus software for anti-virus is an increasingly economical choice. However, after installing anti-virus software, users should frequently upgrade and change some The main monitoring is often opened (such as mail monitoring), memory monitoring, etc., and problems should be reported, so as to truly protect the security of the computer.
8) Users should also install personal firewall software to prevent hacking. Due to the development of the network, hacker attacks on usersβ computers are becoming more and more serious. Many network viruses use hacker methods to attack usersβ computers. Therefore, users should also install Personal firewall software, set the security level to medium or high, so as to effectively prevent hacker attacks on the network.
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Eight basic principles to stay away from viruses :
1) Establish good security habits. For example: Do not open some unknown emails and attachments, do not go to some unknown websites, do not execute software that has not been anti-virus after downloading from the Internet , etc. These necessary habits will make you The computer is more secure.
2) Turn off or delete unnecessary services in the system . By default, many operating systems will install some auxiliary services, such as FTP client, Telnet, and Web server. These services provide convenience for attackers, but are not of much use to users. If they are deleted, the possibility of being attacked can be greatly reduced.
3) Update security patches frequently. According to statistics, 80% of network viruses spread through system security vulnerabilities , such as Worm King, Shockwave, Sasser, etc. Therefore, we should regularly download the latest security patches from the Microsoft website to prevent Before it happens.
4) Using complex passwords Many network viruses attack the system by guessing simple passwords. Therefore, using complex passwords will greatly improve the safety of the computer.
5) Quickly isolate the infected computer. When your computer finds a virus or abnormality, you should immediately disconnect the network to prevent the computer from being infected more or becoming a source of transmission and infecting other computers again.
6) Know some virus knowledge so that you can discover new viruses in time and take corresponding measures to protect your computer from virus damage at critical moments. If you can understand some registry knowledge, you can regularly check whether there are suspicious keys in the registry's self-starting items; if you understand some memory knowledge, you can often check whether there are suspicious programs in the memory.
7) It is best to install professional anti-virus software for comprehensive monitoring. With the increasing number of viruses today, using anti-virus software for anti-virus is an increasingly economical choice. However, after installing anti-virus software, users should frequently upgrade and change some The main monitoring is often opened (such as mail monitoring), memory monitoring, etc., and problems should be reported, so as to truly protect the security of the computer.
8) Users should also install personal firewall software to prevent hacking. Due to the development of the network, hacker attacks on usersβ computers are becoming more and more serious. Many network viruses use hacker methods to attack usersβ computers. Therefore, users should also install Personal firewall software, set the security level to medium or high, so as to effectively prevent hacker attacks on the network.
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Eight basic principles to stay away from viruses :
1) Establish good security habits. For example: Do not open some unknown emails and attachments, do not go to some unknown websites, do not execute software that has not been anti-virus after downloading from the Internet , etc. These necessary habits will make you The computer is more secure.
2) Turn off or delete unnecessary services in the system . By default, many operating systems will install some auxiliary services, such as FTP client, Telnet, and Web server. These services provide convenience for attackers, but are not of much use to users. If they are deleted, the possibility of being attacked can be greatly reduced.
3) Update security patches frequently. According to statistics, 80% of network viruses spread through system security vulnerabilities , such as Worm King, Shockwave, Sasser, etc. Therefore, we should regularly download the latest security patches from the Microsoft website to prevent Before it happens.
4) Using complex passwords Many network viruses attack the system by guessing simple passwords. Therefore, using complex passwords will greatly improve the safety of the computer.
5) Quickly isolate the infected computer. When your computer finds a virus or abnormality, you should immediately disconnect the network to prevent the computer from being infected more or becoming a source of transmission and infecting other computers again.
6) Know some virus knowledge so that you can discover new viruses in time and take corresponding measures to protect your computer from virus damage at critical moments. If you can understand some registry knowledge, you can regularly check whether there are suspicious keys in the registry's self-starting items; if you understand some memory knowledge, you can often check whether there are suspicious programs in the memory.
7) It is best to install professional anti-virus software for comprehensive monitoring. With the increasing number of viruses today, using anti-virus software for anti-virus is an increasingly economical choice. However, after installing anti-virus software, users should frequently upgrade and change some The main monitoring is often opened (such as mail monitoring), memory monitoring, etc., and problems should be reported, so as to truly protect the security of the computer.
8) Users should also install personal firewall software to prevent hacking. Due to the development of the network, hacker attacks on usersβ computers are becoming more and more serious. Many network viruses use hacker methods to attack usersβ computers. Therefore, users should also install Personal firewall software, set the security level to medium or high, so as to effectively prevent hacker attacks on the network.
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Eight basic principles to stay away from viruses :
1) Establish good security habits. For example: Do not open some unknown emails and attachments, do not go to some unknown websites, do not execute software that has not been anti-virus after downloading from the Internet , etc. These necessary habits will make you The computer is more secure.
2) Turn off or delete unnecessary services in the system . By default, many operating systems will install some auxiliary services, such as FTP client, Telnet, and Web server. These services provide convenience for attackers, but are not of much use to users. If they are deleted, the possibility of being attacked can be greatly reduced.
3) Update security patches frequently. According to statistics, 80% of network viruses spread through system security vulnerabilities , such as Worm King, Shockwave, Sasser, etc. Therefore, we should regularly download the latest security patches from the Microsoft website to prevent Before it happens.
4) Using complex passwords Many network viruses attack the system by guessing simple passwords. Therefore, using complex passwords will greatly improve the safety of the computer.
5) Quickly isolate the infected computer. When your computer finds a virus or abnormality, you should immediately disconnect the network to prevent the computer from being infected more or becoming a source of transmission and infecting other computers again.
6) Know some virus knowledge so that you can discover new viruses in time and take corresponding measures to protect your computer from virus damage at critical moments. If you can understand some registry knowledge, you can regularly check whether there are suspicious keys in the registry's self-starting items; if you understand some memory knowledge, you can often check whether there are suspicious programs in the memory.
7) It is best to install professional anti-virus software for comprehensive monitoring. With the increasing number of viruses today, using anti-virus software for anti-virus is an increasingly economical choice. However, after installing anti-virus software, users should frequently upgrade and change some The main monitoring is often opened (such as mail monitoring), memory monitoring, etc., and problems should be reported, so as to truly protect the security of the computer.
8) Users should also install personal firewall software to prevent hacking. Due to the development of the network, hacker attacks on usersβ computers are becoming more and more serious. Many network viruses use hacker methods to attack usersβ computers. Therefore, users should also install Personal firewall software, set the security level to medium or high, so as to effectively prevent hacker attacks on the network.
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Use routers to limit others' internet speed :
1) Enter the correct account password
Nowadays, many routers have built-in wireless bandwidth control function, TP-link and even routers under 100 yuan have this function. First enter the IP address of the wireless router in the address bar of the browser. The default is generally 192.168.1.1. Then enter the user name and password of the router to log in to the router. The default account password is included in the manual. Many routers have default account passwords. .
2) Turn on IP bandwidth control
Find the IP bandwidth control function in the router's setting menu. Take TP wireless router as an example, it will be effective only if you check "Enable IP Bandwidth Control". Some wireless routers need to restart the router to take effect after turning on IP control. Please fill in the broadband type and maximum bandwidth carefully, otherwise it is easy to be "speed limited", that is, 4M broadband may reach the speed of 2M.
3) Choose different IP control rules
Select the IP control mode, such as limit the maximum bandwidth, reserve the minimum bandwidth, etc., can be set to "limit the maximum bandwidth", so that you can control and limit his network speed to limit the download speed. It can be set to "reserve minimum bandwidth", which can ensure basic requirements such as browsing the web.
4) All computers have fixed IP addresses
In the IP address field, fill in the IP address of the computer you want to control. Here you need to fill in the address range, that is, fill in an IP range. If there is only one computer, then the starting IP should be set to the same. It is recommended to set a fixed IP address for all computers in the network, or assign a relatively fixed IP address in the router according to different MAC addresses.
5) Use the router's network isolation function
In order to prevent computer poisoning, or prevent others from using software such as P2P Terminator to damage, if the router has anti-ARP function, please enable it. More expensive routers will have the function of network isolation. If available, you can set the computer to different VLANs for easy management. At the same time, if the router can brush Pomodoro, it is recommended to use the firmware with built-in bandwidth control script.
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Use routers to limit others' internet speed :
1) Enter the correct account password
Nowadays, many routers have built-in wireless bandwidth control function, TP-link and even routers under 100 yuan have this function. First enter the IP address of the wireless router in the address bar of the browser. The default is generally 192.168.1.1. Then enter the user name and password of the router to log in to the router. The default account password is included in the manual. Many routers have default account passwords. .
2) Turn on IP bandwidth control
Find the IP bandwidth control function in the router's setting menu. Take TP wireless router as an example, it will be effective only if you check "Enable IP Bandwidth Control". Some wireless routers need to restart the router to take effect after turning on IP control. Please fill in the broadband type and maximum bandwidth carefully, otherwise it is easy to be "speed limited", that is, 4M broadband may reach the speed of 2M.
3) Choose different IP control rules
Select the IP control mode, such as limit the maximum bandwidth, reserve the minimum bandwidth, etc., can be set to "limit the maximum bandwidth", so that you can control and limit his network speed to limit the download speed. It can be set to "reserve minimum bandwidth", which can ensure basic requirements such as browsing the web.
4) All computers have fixed IP addresses
In the IP address field, fill in the IP address of the computer you want to control. Here you need to fill in the address range, that is, fill in an IP range. If there is only one computer, then the starting IP should be set to the same. It is recommended to set a fixed IP address for all computers in the network, or assign a relatively fixed IP address in the router according to different MAC addresses.
5) Use the router's network isolation function
In order to prevent computer poisoning, or prevent others from using software such as P2P Terminator to damage, if the router has anti-ARP function, please enable it. More expensive routers will have the function of network isolation. If available, you can set the computer to different VLANs for easy management. At the same time, if the router can brush Pomodoro, it is recommended to use the firmware with built-in bandwidth control script.
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Use routers to limit others' internet speed :
1) Enter the correct account password
Nowadays, many routers have built-in wireless bandwidth control function, TP-link and even routers under 100 yuan have this function. First enter the IP address of the wireless router in the address bar of the browser. The default is generally 192.168.1.1. Then enter the user name and password of the router to log in to the router. The default account password is included in the manual. Many routers have default account passwords. .
2) Turn on IP bandwidth control
Find the IP bandwidth control function in the router's setting menu. Take TP wireless router as an example, it will be effective only if you check "Enable IP Bandwidth Control". Some wireless routers need to restart the router to take effect after turning on IP control. Please fill in the broadband type and maximum bandwidth carefully, otherwise it is easy to be "speed limited", that is, 4M broadband may reach the speed of 2M.
3) Choose different IP control rules
Select the IP control mode, such as limit the maximum bandwidth, reserve the minimum bandwidth, etc., can be set to "limit the maximum bandwidth", so that you can control and limit his network speed to limit the download speed. It can be set to "reserve minimum bandwidth", which can ensure basic requirements such as browsing the web.
4) All computers have fixed IP addresses
In the IP address field, fill in the IP address of the computer you want to control. Here you need to fill in the address range, that is, fill in an IP range. If there is only one computer, then the starting IP should be set to the same. It is recommended to set a fixed IP address for all computers in the network, or assign a relatively fixed IP address in the router according to different MAC addresses.
5) Use the router's network isolation function
In order to prevent computer poisoning, or prevent others from using software such as P2P Terminator to damage, if the router has anti-ARP function, please enable it. More expensive routers will have the function of network isolation. If available, you can set the computer to different VLANs for easy management. At the same time, if the router can brush Pomodoro, it is recommended to use the firmware with built-in bandwidth control script.
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Use routers to limit others' internet speed :
1) Enter the correct account password
Nowadays, many routers have built-in wireless bandwidth control function, TP-link and even routers under 100 yuan have this function. First enter the IP address of the wireless router in the address bar of the browser. The default is generally 192.168.1.1. Then enter the user name and password of the router to log in to the router. The default account password is included in the manual. Many routers have default account passwords. .
2) Turn on IP bandwidth control
Find the IP bandwidth control function in the router's setting menu. Take TP wireless router as an example, it will be effective only if you check "Enable IP Bandwidth Control". Some wireless routers need to restart the router to take effect after turning on IP control. Please fill in the broadband type and maximum bandwidth carefully, otherwise it is easy to be "speed limited", that is, 4M broadband may reach the speed of 2M.
3) Choose different IP control rules
Select the IP control mode, such as limit the maximum bandwidth, reserve the minimum bandwidth, etc., can be set to "limit the maximum bandwidth", so that you can control and limit his network speed to limit the download speed. It can be set to "reserve minimum bandwidth", which can ensure basic requirements such as browsing the web.
4) All computers have fixed IP addresses
In the IP address field, fill in the IP address of the computer you want to control. Here you need to fill in the address range, that is, fill in an IP range. If there is only one computer, then the starting IP should be set to the same. It is recommended to set a fixed IP address for all computers in the network, or assign a relatively fixed IP address in the router according to different MAC addresses.
5) Use the router's network isolation function
In order to prevent computer poisoning, or prevent others from using software such as P2P Terminator to damage, if the router has anti-ARP function, please enable it. More expensive routers will have the function of network isolation. If available, you can set the computer to different VLANs for easy management. At the same time, if the router can brush Pomodoro, it is recommended to use the firmware with built-in bandwidth control script.
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WHAT IS FCK COMMANDS ?
fsck options filesystem
1) If you do not specify a file system, the system will analyze your fstab file (/ etc / fstab) for devices to scan.
>You will need to run the command as root or use it with sudo .
2) You can use the fdisk or df command to list the hard drive in Linux. This way you can specify which device to check with the fsck command.
> Disk / dev / nvme0n1: 238.49 GiB, 256060514304 bytes, 500118192 sectors
3) Device Start End Sectors Size Type
/ dev / nvme0n1p1 2048 1050623 1048576 512M EFI System
/ dev / nvme0n1p2 1050624 98563270 97512647 46.5G Linux filesystem
/ dev / nvme0n1p3 98564096 500117503 401553408 191.5G
4) Linux filesystem
> Unmount the device before running fsck
Don't run fsck on a mounted device, you need to disable the target first to avoid corrupting your files.
5) If you try to run fsck on a mounted device, you should see an error like this:
> destroyer @ andreyex: ~ $ sudo fsck / dev / sda3
> fsck from util-linux 2.34
e2fsck 1.45.5 (07-Jan-2020)
/ dev / sda3 is mounted.
e2fsck: Cannot continue, aborting.
6) Running fsck on a normal healthy disk looks like this:
destroyer @ andreyex: ~ $ sudo fsck / dev / sda2
fsck from util-linux 2.34
fsck.fat 4.1 (2020-01-24)
/ dev / sda2: 5 files, 1967/1972 clusters
7) Although fsck accepts a device name, such as / dev / sda, you can enter the UUID to avoid the confusion with connecting and disconnecting devices. The UUID is a fixed value assigned to your device and will not be affected by these system changes.
8) Understanding the exit codes for the fsck command
This is a list of codes that can be returned from fsck after checking the disk. Your exit code will be the sum of these codes if you analyze one disc. If you use fsck on multiple devices it will return the bitwise OR of two sums.
0 - no errors
1 - fixed file system errors
2 - the system must be rebooted
4 - Filesystem errors left unpatched
8 - Operational error
16 - usage or syntax error
32 - Fsck canceled at user request
128 - Shared library error
9) You can check the exit code of the last run command using the echo $? Command.
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WHAT IS FCK COMMANDS ?
fsck options filesystem
1) If you do not specify a file system, the system will analyze your fstab file (/ etc / fstab) for devices to scan.
>You will need to run the command as root or use it with sudo .
2) You can use the fdisk or df command to list the hard drive in Linux. This way you can specify which device to check with the fsck command.
> Disk / dev / nvme0n1: 238.49 GiB, 256060514304 bytes, 500118192 sectors
Disk model: THNSN5256GPUK NVMe TOSHIBA 256GB> Disk identifier: 014A45DC-22A2-4FC0-BEEA-25A6F2406380
Units: sectors of 1 * 512 = 512 bytes
> Sector size (logical / physical): 512 bytes / 512 bytes
I / O size (minimum / optimal): 512 bytes / 512 bytes
Disklabel type: gpt
3) Device Start End Sectors Size Type
/ dev / nvme0n1p1 2048 1050623 1048576 512M EFI System
/ dev / nvme0n1p2 1050624 98563270 97512647 46.5G Linux filesystem
/ dev / nvme0n1p3 98564096 500117503 401553408 191.5G
4) Linux filesystem
> Unmount the device before running fsck
Don't run fsck on a mounted device, you need to disable the target first to avoid corrupting your files.
5) If you try to run fsck on a mounted device, you should see an error like this:
> destroyer @ andreyex: ~ $ sudo fsck / dev / sda3
> fsck from util-linux 2.34
e2fsck 1.45.5 (07-Jan-2020)
/ dev / sda3 is mounted.
e2fsck: Cannot continue, aborting.
6) Running fsck on a normal healthy disk looks like this:
destroyer @ andreyex: ~ $ sudo fsck / dev / sda2
fsck from util-linux 2.34
fsck.fat 4.1 (2020-01-24)
/ dev / sda2: 5 files, 1967/1972 clusters
7) Although fsck accepts a device name, such as / dev / sda, you can enter the UUID to avoid the confusion with connecting and disconnecting devices. The UUID is a fixed value assigned to your device and will not be affected by these system changes.
8) Understanding the exit codes for the fsck command
This is a list of codes that can be returned from fsck after checking the disk. Your exit code will be the sum of these codes if you analyze one disc. If you use fsck on multiple devices it will return the bitwise OR of two sums.
0 - no errors
1 - fixed file system errors
2 - the system must be rebooted
4 - Filesystem errors left unpatched
8 - Operational error
16 - usage or syntax error
32 - Fsck canceled at user request
128 - Shared library error
9) You can check the exit code of the last run command using the echo $? Command.
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WHAT IS FCK COMMANDS ?
fsck options filesystem
1) If you do not specify a file system, the system will analyze your fstab file (/ etc / fstab) for devices to scan.
>You will need to run the command as root or use it with sudo .
2) You can use the fdisk or df command to list the hard drive in Linux. This way you can specify which device to check with the fsck command.
> Disk / dev / nvme0n1: 238.49 GiB, 256060514304 bytes, 500118192 sectors
3) Device Start End Sectors Size Type
/ dev / nvme0n1p1 2048 1050623 1048576 512M EFI System
/ dev / nvme0n1p2 1050624 98563270 97512647 46.5G Linux filesystem
/ dev / nvme0n1p3 98564096 500117503 401553408 191.5G
4) Linux filesystem
> Unmount the device before running fsck
Don't run fsck on a mounted device, you need to disable the target first to avoid corrupting your files.
5) If you try to run fsck on a mounted device, you should see an error like this:
> destroyer @ andreyex: ~ $ sudo fsck / dev / sda3
> fsck from util-linux 2.34
e2fsck 1.45.5 (07-Jan-2020)
/ dev / sda3 is mounted.
e2fsck: Cannot continue, aborting.
6) Running fsck on a normal healthy disk looks like this:
destroyer @ andreyex: ~ $ sudo fsck / dev / sda2
fsck from util-linux 2.34
fsck.fat 4.1 (2020-01-24)
/ dev / sda2: 5 files, 1967/1972 clusters
7) Although fsck accepts a device name, such as / dev / sda, you can enter the UUID to avoid the confusion with connecting and disconnecting devices. The UUID is a fixed value assigned to your device and will not be affected by these system changes.
8) Understanding the exit codes for the fsck command
This is a list of codes that can be returned from fsck after checking the disk. Your exit code will be the sum of these codes if you analyze one disc. If you use fsck on multiple devices it will return the bitwise OR of two sums.
0 - no errors
1 - fixed file system errors
2 - the system must be rebooted
4 - Filesystem errors left unpatched
8 - Operational error
16 - usage or syntax error
32 - Fsck canceled at user request
128 - Shared library error
9) You can check the exit code of the last run command using the echo $? Command.
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WHAT IS FCK COMMANDS ?
fsck options filesystem
1) If you do not specify a file system, the system will analyze your fstab file (/ etc / fstab) for devices to scan.
>You will need to run the command as root or use it with sudo .
2) You can use the fdisk or df command to list the hard drive in Linux. This way you can specify which device to check with the fsck command.
> Disk / dev / nvme0n1: 238.49 GiB, 256060514304 bytes, 500118192 sectors
Disk model: THNSN5256GPUK NVMe TOSHIBA 256GB> Disk identifier: 014A45DC-22A2-4FC0-BEEA-25A6F2406380
Units: sectors of 1 * 512 = 512 bytes
> Sector size (logical / physical): 512 bytes / 512 bytes
I / O size (minimum / optimal): 512 bytes / 512 bytes
Disklabel type: gpt
3) Device Start End Sectors Size Type
/ dev / nvme0n1p1 2048 1050623 1048576 512M EFI System
/ dev / nvme0n1p2 1050624 98563270 97512647 46.5G Linux filesystem
/ dev / nvme0n1p3 98564096 500117503 401553408 191.5G
4) Linux filesystem
> Unmount the device before running fsck
Don't run fsck on a mounted device, you need to disable the target first to avoid corrupting your files.
5) If you try to run fsck on a mounted device, you should see an error like this:
> destroyer @ andreyex: ~ $ sudo fsck / dev / sda3
> fsck from util-linux 2.34
e2fsck 1.45.5 (07-Jan-2020)
/ dev / sda3 is mounted.
e2fsck: Cannot continue, aborting.
6) Running fsck on a normal healthy disk looks like this:
destroyer @ andreyex: ~ $ sudo fsck / dev / sda2
fsck from util-linux 2.34
fsck.fat 4.1 (2020-01-24)
/ dev / sda2: 5 files, 1967/1972 clusters
7) Although fsck accepts a device name, such as / dev / sda, you can enter the UUID to avoid the confusion with connecting and disconnecting devices. The UUID is a fixed value assigned to your device and will not be affected by these system changes.
8) Understanding the exit codes for the fsck command
This is a list of codes that can be returned from fsck after checking the disk. Your exit code will be the sum of these codes if you analyze one disc. If you use fsck on multiple devices it will return the bitwise OR of two sums.
0 - no errors
1 - fixed file system errors
2 - the system must be rebooted
4 - Filesystem errors left unpatched
8 - Operational error
16 - usage or syntax error
32 - Fsck canceled at user request
128 - Shared library error
9) You can check the exit code of the last run command using the echo $? Command.
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to generate fake traffic using
Traffic generator ?
A simple python script that generates random HTTP/DNS traffic noise in the background while you go about your regular web browsing, to make your web traffic data less valuable for selling and for extra obscurity.
1) Install requests if you do not have it already installed, using pip:
> pip install requests
2) Clone the repository
> git clone https://github.com/1tayH/noisy.git
Navigate into the noisy directory
3) cd noisy
Run the script
4) python noisy.py --config config.json
5) The program can accept a number of command line arguments:
$ python noisy.py --help
usage: noisy.py -h --log -l --config -c --timeout -t
π¦Commands :
-h, --help show this help message and exit
--log -l logging level
--config -c config file
--timeout -t for how long the crawler should be running, in seconds
π¦Build Using Docker
1) Build the image
docker build -t noisy .
Or if you'd like to build it for a Raspberry Pi (running Raspbian stretch):
2) docker build -f Dockerfile.pi -t noisy .
Create the container and run:
3) docker run -it noisy --config config.json
β Verified by Undercode on
- Ubuntu
E N J O Y β€οΈππ»
git topic
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to generate fake traffic using
Traffic generator ?
A simple python script that generates random HTTP/DNS traffic noise in the background while you go about your regular web browsing, to make your web traffic data less valuable for selling and for extra obscurity.
1) Install requests if you do not have it already installed, using pip:
> pip install requests
2) Clone the repository
> git clone https://github.com/1tayH/noisy.git
Navigate into the noisy directory
3) cd noisy
Run the script
4) python noisy.py --config config.json
5) The program can accept a number of command line arguments:
$ python noisy.py --help
usage: noisy.py -h --log -l --config -c --timeout -t
π¦Commands :
-h, --help show this help message and exit
--log -l logging level
--config -c config file
--timeout -t for how long the crawler should be running, in seconds
π¦Build Using Docker
1) Build the image
docker build -t noisy .
Or if you'd like to build it for a Raspberry Pi (running Raspbian stretch):
2) docker build -f Dockerfile.pi -t noisy .
Create the container and run:
3) docker run -it noisy --config config.json
β Verified by Undercode on
- Ubuntu
E N J O Y β€οΈππ»
git topic
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - 1tayH/noisy: Simple random DNS, HTTP/S internet traffic noise generator
Simple random DNS, HTTP/S internet traffic noise generator - 1tayH/noisy
Finding_the_Balance_Between_Speed_&_Accuracy_During_an_Internet.pdf
13 MB
Finding the Balance Between Speed & Accuracy During an Internet-wide Port Scanning #full #requested
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦https encryption is also cracked HEIST attack to obtain plaintext from encrypted data :
1) WHAT IS The TCP-Windows protocol ?
The TCP-Windows protocol is also called TCP Receive Window. It is a buffer on both ends of a TCP connection for temporarily saving incoming data. The data in this buffer will be sent to the application to make room for new incoming data. If the buffer is full, the data receiver will warn the sender that it cannot receive more data before the buffer is emptied. There are some details involved, but they are all very basic things. Generally, the device will notify the other party of the current size of its TCPWindows in the TCP Header information.
2) C O N D I T I O N S :
The conditions for the use of the HEIST attack are very simple, requiring only a few lines of simple javascript code, and no man-in-the-middle attack is required. First, the transmitted sensitive data will be captured and saved. This attack method can obtain private sensitive information such as bank card number, real name, phone number, and social security number. But as we all know, most of these data are encrypted by HTTPS. Then make a probe on the size and length of the encrypted data. Many websites use file compression technology to improve the loading speed of web pages, and attackers can just use the design flaws to decrypt the data payload (similar to BREACH attacks and CRIME attacks).
3) HEIST technology can use new APIs (Resource Timing and Fetch) to calculate the number of transmission frames and windows sent by the target host. Throughout the process, researchers can use a piece of JavaScript code to determine the actual size of the HTTPS response message. Then, the malicious HEIST code can cooperate with the BREACH technology to extract the encrypted information from the user's request data.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦https encryption is also cracked HEIST attack to obtain plaintext from encrypted data :
1) WHAT IS The TCP-Windows protocol ?
The TCP-Windows protocol is also called TCP Receive Window. It is a buffer on both ends of a TCP connection for temporarily saving incoming data. The data in this buffer will be sent to the application to make room for new incoming data. If the buffer is full, the data receiver will warn the sender that it cannot receive more data before the buffer is emptied. There are some details involved, but they are all very basic things. Generally, the device will notify the other party of the current size of its TCPWindows in the TCP Header information.
2) C O N D I T I O N S :
The conditions for the use of the HEIST attack are very simple, requiring only a few lines of simple javascript code, and no man-in-the-middle attack is required. First, the transmitted sensitive data will be captured and saved. This attack method can obtain private sensitive information such as bank card number, real name, phone number, and social security number. But as we all know, most of these data are encrypted by HTTPS. Then make a probe on the size and length of the encrypted data. Many websites use file compression technology to improve the loading speed of web pages, and attackers can just use the design flaws to decrypt the data payload (similar to BREACH attacks and CRIME attacks).
3) HEIST technology can use new APIs (Resource Timing and Fetch) to calculate the number of transmission frames and windows sent by the target host. Throughout the process, researchers can use a piece of JavaScript code to determine the actual size of the HTTPS response message. Then, the malicious HEIST code can cooperate with the BREACH technology to extract the encrypted information from the user's request data.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦so hepful top google chrome plugins 2020 :
https://chrome.google.com/webstore/detail/tab-wrangler/egnjhciaieeiiohknchakcodbpgjnchh?hl=en
https://chrome.google.com/webstore/detail/the-great-suspender/klbibkeccnjlkjkiokjodocebajanakg?hl=en
https://chrome.google.com/webstore/detail/foxclocks/obcbigljfpgappaaofailjjoabiikckk?hl=en
https://chrome.google.com/webstore/detail/lastpass-free-password-ma/hdokiejnpimakedhajhdlcegeplioahd
https://chrome.google.com/webstore/detail/evernote-web-clipper/pioclpoplcdbaefihamjohnefbikjilc?hl=en
https://chrome.google.com/webstore/detail/ghostery-%E2%80%93-privacy-ad-blo/mlomiejdfkolichcflejclcbmpeaniij?hl=en
https://chrome.google.com/webstore/detail/adblock-plus-free-ad-bloc/cfhdojbkjhnklbpkdaibdccddilifddb
https://chrome.google.com/webstore/detail/hover-zoom%2B/pccckmaobkjjboncdfnnofkonhgpceea?hl=en
https://chrome.google.com/webstore/detail/panicbutton/faminaibgiklngmfpfbhmokfmnglamcm?hl=en
https://chrome.google.com/webstore/detail/user-agent-switcher-for-c/djflhoibgkdhkhhcedjiklpkjnoahfmg
https://chrome.google.com/webstore/detail/evernote-web-clipper/pioclpoplcdbaefihamjohnefbikjilc?hl=en
enjoy β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦so hepful top google chrome plugins 2020 :
https://chrome.google.com/webstore/detail/tab-wrangler/egnjhciaieeiiohknchakcodbpgjnchh?hl=en
https://chrome.google.com/webstore/detail/the-great-suspender/klbibkeccnjlkjkiokjodocebajanakg?hl=en
https://chrome.google.com/webstore/detail/foxclocks/obcbigljfpgappaaofailjjoabiikckk?hl=en
https://chrome.google.com/webstore/detail/lastpass-free-password-ma/hdokiejnpimakedhajhdlcegeplioahd
https://chrome.google.com/webstore/detail/evernote-web-clipper/pioclpoplcdbaefihamjohnefbikjilc?hl=en
https://chrome.google.com/webstore/detail/ghostery-%E2%80%93-privacy-ad-blo/mlomiejdfkolichcflejclcbmpeaniij?hl=en
https://chrome.google.com/webstore/detail/adblock-plus-free-ad-bloc/cfhdojbkjhnklbpkdaibdccddilifddb
https://chrome.google.com/webstore/detail/hover-zoom%2B/pccckmaobkjjboncdfnnofkonhgpceea?hl=en
https://chrome.google.com/webstore/detail/panicbutton/faminaibgiklngmfpfbhmokfmnglamcm?hl=en
https://chrome.google.com/webstore/detail/user-agent-switcher-for-c/djflhoibgkdhkhhcedjiklpkjnoahfmg
https://chrome.google.com/webstore/detail/evernote-web-clipper/pioclpoplcdbaefihamjohnefbikjilc?hl=en
enjoy β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google
Tab Wrangler
Automatically closes inactive tabs and makes it easy to get them back
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦TOP 202 FIREFOX PLUGINS- HELPFUL :
https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/
https://addons.mozilla.org/en-US/firefox/addon/ghostery/
https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
https://addons.mozilla.org/en-US/firefox/addon/greasemonkey/
https://addons.mozilla.org/en-US/firefox/addon/lightshot/
https://addons.mozilla.org/en-US/firefox/addon/umatrix/
https://addons.mozilla.org/en-US/firefox/addon/darkreader/
https://addons.mozilla.org/en-US/firefox/addon/clippings/
https://addons.mozilla.org/en-US/firefox/addon/
grammarly-1/
https://addons.mozilla.org/en-US/firefox/addon/videospeed/
https://addons.mozilla.org/en-US/firefox/addon/tabliss/
https://addons.mozilla.org/en-US/firefox/addon/gesturefy/
https://addons.mozilla.org/en-US/firefox/addon/bitwarden-password-manager/
https://addons.mozilla.org/en-US/firefox/addon/image-search-options/
https://addons.mozilla.org/en-US/firefox/addon/cookie-autodelete/
https://addons.mozilla.org/en-US/firefox/addon/export-tabs-urls-and-titles/
https://addons.mozilla.org/en-US/firefox/addon/smart-referer/
enjoy β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦TOP 202 FIREFOX PLUGINS- HELPFUL :
https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/
https://addons.mozilla.org/en-US/firefox/addon/ghostery/
https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
https://addons.mozilla.org/en-US/firefox/addon/greasemonkey/
https://addons.mozilla.org/en-US/firefox/addon/lightshot/
https://addons.mozilla.org/en-US/firefox/addon/umatrix/
https://addons.mozilla.org/en-US/firefox/addon/darkreader/
https://addons.mozilla.org/en-US/firefox/addon/clippings/
https://addons.mozilla.org/en-US/firefox/addon/
grammarly-1/
https://addons.mozilla.org/en-US/firefox/addon/videospeed/
https://addons.mozilla.org/en-US/firefox/addon/tabliss/
https://addons.mozilla.org/en-US/firefox/addon/gesturefy/
https://addons.mozilla.org/en-US/firefox/addon/bitwarden-password-manager/
https://addons.mozilla.org/en-US/firefox/addon/image-search-options/
https://addons.mozilla.org/en-US/firefox/addon/cookie-autodelete/
https://addons.mozilla.org/en-US/firefox/addon/export-tabs-urls-and-titles/
https://addons.mozilla.org/en-US/firefox/addon/smart-referer/
enjoy β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
addons.mozilla.org
Adblock Plus β Get this Extension for π¦ Firefox (en-US)
Download Adblock Plus for Firefox. One of the most popular free ad blockers for Firefox. Block annoying ads on sites like Facebook, YouTube and all other websites.
Adblock Plus blocks all annoying ads, and supports websites by not blocking unobtrusive adsβ¦
Adblock Plus blocks all annoying ads, and supports websites by not blocking unobtrusive adsβ¦
Windows for Pentester_ Certutil.pdf
984.9 KB
Windows for Pentester_ Certutil
-What is certutil? What is Living off Land? -Working with certutil?
- What is Alternative Data Stream (ADS)?
-What is certutil? What is Living off Land? -Working with certutil?
- What is Alternative Data Stream (ADS)?
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 Topic Hacking :
F E A T U R E S :
-Subdomains monitoring: put data to Discord, Slack or Telegram
-webhooks. See Subdomains Monitoring for more information.
-Multi-thread support for API querying, it makes that the maximun time that Findomain will take to search subdomains for any target is 15 seconds (in case of API's timeout).
-Parallel support for subdomains resolution, in good network conditions can resolv about 3.5k of subdomains per minute.
DNS over TLS support.
-Specific IPv4 or IPv6 query support.
-Discover subdomains without brute-force, it tool uses Certificate
-Transparency Logs and APIs.
-Discover only resolved subdomains.
-Discover subdomains IP for data analisis.
-Read target from user argument (-t) or file (-f).
-Write to one unique output file specified by the user all or only resolved subdomains.
-Write results to automatically named TXT output file(s).
-Hability to query directly the Findomain database created with
Subdomains Monitoring for previous discovered subdomains.
-Hability to import and work data discovered by other tools.
-Quiet mode to run it silently.
-Cross platform support: Any platform, it's written in Rust and Rust is multiplatform. See the documentation for instructions.
-Multiple API support.
-Possibility to use as subdomain resolver.
-Subdomain wildcard detection for accurate results.
-Support for subdomain discover using bruteforce method.
-Support for configuration file in TOML, JSON, HJSON, INI or YAML format.
-Custom DNS IP addresses for fast subdomains resolving (more than 60 per second by default, adjustable using the --threads option.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) $ git clone https://github.com/Edu4rdSHL/findomain.git -b develop # Only the develop branch is needed
2) $ cd findomain
3) $ cargo build --release
4) $ ./target/release/findomain
5) for linux
> $ chmod +x findomain-linux
> $ ./findomain-linux
C O M P A T I B I L I T Y :
Linux
Windows
MacOS
Aarch64 (Raspberry Pi)
NixOS
Docker
MORE TUTORIALS https://asciinema.org/a/3kHnCYTDsOp20ttgNXXgvCRjX
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 Topic Hacking :
F E A T U R E S :
-Subdomains monitoring: put data to Discord, Slack or Telegram
-webhooks. See Subdomains Monitoring for more information.
-Multi-thread support for API querying, it makes that the maximun time that Findomain will take to search subdomains for any target is 15 seconds (in case of API's timeout).
-Parallel support for subdomains resolution, in good network conditions can resolv about 3.5k of subdomains per minute.
DNS over TLS support.
-Specific IPv4 or IPv6 query support.
-Discover subdomains without brute-force, it tool uses Certificate
-Transparency Logs and APIs.
-Discover only resolved subdomains.
-Discover subdomains IP for data analisis.
-Read target from user argument (-t) or file (-f).
-Write to one unique output file specified by the user all or only resolved subdomains.
-Write results to automatically named TXT output file(s).
-Hability to query directly the Findomain database created with
Subdomains Monitoring for previous discovered subdomains.
-Hability to import and work data discovered by other tools.
-Quiet mode to run it silently.
-Cross platform support: Any platform, it's written in Rust and Rust is multiplatform. See the documentation for instructions.
-Multiple API support.
-Possibility to use as subdomain resolver.
-Subdomain wildcard detection for accurate results.
-Support for subdomain discover using bruteforce method.
-Support for configuration file in TOML, JSON, HJSON, INI or YAML format.
-Custom DNS IP addresses for fast subdomains resolving (more than 60 per second by default, adjustable using the --threads option.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) $ git clone https://github.com/Edu4rdSHL/findomain.git -b develop # Only the develop branch is needed
2) $ cd findomain
3) $ cargo build --release
4) $ ./target/release/findomain
5) for linux
> $ chmod +x findomain-linux
> $ ./findomain-linux
C O M P A T I B I L I T Y :
Linux
Windows
MacOS
Aarch64 (Raspberry Pi)
NixOS
Docker
MORE TUTORIALS https://asciinema.org/a/3kHnCYTDsOp20ttgNXXgvCRjX
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Findomain/Findomain: The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTPβ¦
The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, subdomain monitoring, alerts via Discord, Slack and Telegram, ...
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Sniffer may cause harm:
1) The sniffer can capture passwords
2) It can capture private or confidential information
3) It can be used to compromise the security of network neighbors, or to obtain higher-level access rights.
> In fact, If you have an unauthorized sniffer on the network, you think your system has been exposed to others. (You can try the sniffing function of Skyline 2)
4) Generally, we only sniff the first 200 to 300 bytes of each message. The username and password are included in this part, which is the real part we care about. Workers can also sniff all the packets on a given interface. If there is enough space for storage and enough for processing, they will find other very interesting things...
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Sniffer may cause harm:
1) The sniffer can capture passwords
2) It can capture private or confidential information
3) It can be used to compromise the security of network neighbors, or to obtain higher-level access rights.
> In fact, If you have an unauthorized sniffer on the network, you think your system has been exposed to others. (You can try the sniffing function of Skyline 2)
4) Generally, we only sniff the first 200 to 300 bytes of each message. The username and password are included in this part, which is the real part we care about. Workers can also sniff all the packets on a given interface. If there is enough space for storage and enough for processing, they will find other very interesting things...
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β