β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦#tip law enforcement recover deleted files?
1) Before we dive into the technical issues, it is worth discussing the boring procedural and legal aspects of computer forensics in a law enforcement context.
2) First, let's dispel the old myth that a law enforcement officer always needs a warrant to check a digital device like a phone or computer. While this is usually the case, many loopholes (for lack of a better word) can be found in the structure of the law.
3) Many jurisdictions, such as the United Kingdom and the United States, allow customs and immigration officials to inspect electronic devices without a warrant. US border guards can also investigate the contents of devices without a warrant if there is a threat of destruction of evidence, as confirmed by a 2018 11th District decision .
4) Compared to their American counterparts, British police officers tend to have more ability to seize the contents of devices without seeking the help of a judge or magistrate. They can, for example, download phone content through a piece of legislation called the Police and Criminal Evidence Act (PACE) , regardless of whether any charges are filed. However, if the police ultimately decide that they wish to examine the contents, they will need court permission.
5) The legislation also gives the UK Police the right to inspect devices without a warrant in certain circumstances when there is an urgent need, for example, in the case of terrorism or when there is real reason to believe that a child may have been sexually abused.
6) Ultimately, no matter how, confiscating a computer is simply the beginning of a lengthy process that starts with placing a laptop or phone in a tamper-proof plastic bag and often ends with the presentation of evidence to the courtroom.
7) The police must adhere to a set of rules and procedures to ensure the admissibility of evidence. Forensic teams document their every action so that other experts can repeat the same steps if necessary and achieve the same results. They use special tools to ensure the integrity of the files. One example is a "write blocker" that allows forensic experts to retrieve information while protecting against inadvertent alteration of the evidence under investigation.
8) The success of a computer forensic investigation is determined by the legal basis and the severity of the procedures, not by technical complexity.
π¦Despite the legal challenges, it is always interesting to note the many factors that can determine how easily deleted files can be recovered by law enforcement agencies. These include the type of disk used, whether encryption was used, and the file system of the disk.
Take hard drives, for example. Although they have been largely surpassed by faster solid state drives (SSDs), mechanical hard drives (HDDs) have been the predominant storage mechanism for over 30 years.
Hard drives used magnetic platters to store data. If you've ever taken apart a hard drive, you've probably noticed that it looks a bit like a CD. They are round and silver in color.
In use, these plates rotate at incredible speeds - typically 5400 or 7200 rpm, and in some cases even 15000 rpm. These plates are connected to special "heads" that perform read and write operations. When you save a file to disk, this βheadβ moves to a specific part of the disk and converts an electric current into a magnetic field, thereby changing the properties of the disk.
But how does she know where to go? Well, she looks at a so-called allocation table, which contains a record of every file stored on disk. But what happens when the file is deleted?
Short answer? Little.
Here's the long answer: the entry for this file is deleted in the allocation table, allowing you to later overwrite the space it occupied on the hard disk. However, the data remains physically present on the magnetic platters and is only really deleted when new data is added to that particular location on the platter (that is, when other information overwrites that location on the disk).
π¦#tip law enforcement recover deleted files?
1) Before we dive into the technical issues, it is worth discussing the boring procedural and legal aspects of computer forensics in a law enforcement context.
2) First, let's dispel the old myth that a law enforcement officer always needs a warrant to check a digital device like a phone or computer. While this is usually the case, many loopholes (for lack of a better word) can be found in the structure of the law.
3) Many jurisdictions, such as the United Kingdom and the United States, allow customs and immigration officials to inspect electronic devices without a warrant. US border guards can also investigate the contents of devices without a warrant if there is a threat of destruction of evidence, as confirmed by a 2018 11th District decision .
4) Compared to their American counterparts, British police officers tend to have more ability to seize the contents of devices without seeking the help of a judge or magistrate. They can, for example, download phone content through a piece of legislation called the Police and Criminal Evidence Act (PACE) , regardless of whether any charges are filed. However, if the police ultimately decide that they wish to examine the contents, they will need court permission.
5) The legislation also gives the UK Police the right to inspect devices without a warrant in certain circumstances when there is an urgent need, for example, in the case of terrorism or when there is real reason to believe that a child may have been sexually abused.
6) Ultimately, no matter how, confiscating a computer is simply the beginning of a lengthy process that starts with placing a laptop or phone in a tamper-proof plastic bag and often ends with the presentation of evidence to the courtroom.
7) The police must adhere to a set of rules and procedures to ensure the admissibility of evidence. Forensic teams document their every action so that other experts can repeat the same steps if necessary and achieve the same results. They use special tools to ensure the integrity of the files. One example is a "write blocker" that allows forensic experts to retrieve information while protecting against inadvertent alteration of the evidence under investigation.
8) The success of a computer forensic investigation is determined by the legal basis and the severity of the procedures, not by technical complexity.
π¦Despite the legal challenges, it is always interesting to note the many factors that can determine how easily deleted files can be recovered by law enforcement agencies. These include the type of disk used, whether encryption was used, and the file system of the disk.
Take hard drives, for example. Although they have been largely surpassed by faster solid state drives (SSDs), mechanical hard drives (HDDs) have been the predominant storage mechanism for over 30 years.
Hard drives used magnetic platters to store data. If you've ever taken apart a hard drive, you've probably noticed that it looks a bit like a CD. They are round and silver in color.
In use, these plates rotate at incredible speeds - typically 5400 or 7200 rpm, and in some cases even 15000 rpm. These plates are connected to special "heads" that perform read and write operations. When you save a file to disk, this βheadβ moves to a specific part of the disk and converts an electric current into a magnetic field, thereby changing the properties of the disk.
But how does she know where to go? Well, she looks at a so-called allocation table, which contains a record of every file stored on disk. But what happens when the file is deleted?
Short answer? Little.
Here's the long answer: the entry for this file is deleted in the allocation table, allowing you to later overwrite the space it occupied on the hard disk. However, the data remains physically present on the magnetic platters and is only really deleted when new data is added to that particular location on the platter (that is, when other information overwrites that location on the disk).
After all, actually removing it would require the magnetic head to physically move to that location on the platter and overwrite it. This can slow down the performance of the computer, because instead of doing this useless operation, it needs to read and write to running applications. So when it comes to hard drives, it's easier to pretend that the deleted files just don't exist.
written by
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
written by
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 POWERFUL Modern Denial-of-service ToolKit
- SMS & Call flood:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
Linux:
1) sudo apt update
2) sudo apt install python3 python3-pip git -y
3) git clone https://github.com/LimerBoy/Impulse
4) cd Impulse/
5) pip3 install -r requirements.txt
6) python3 impulse.py --help
π¦Termux:
1) pkg update
2) pkg install python3 python3-pip git -y
3) git clone https://github.com/LimerBoy/Impulse
4) cd Impulse/
5) pip3 install -r requirements.txt
6) python3 impulse.py --help
π¦ E X A M P L E :
python3 impulse.py --method SMS --time 20 --threads 15 --target +....XY
VERIFIED BY
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 POWERFUL Modern Denial-of-service ToolKit
- SMS & Call flood:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
Linux:
1) sudo apt update
2) sudo apt install python3 python3-pip git -y
3) git clone https://github.com/LimerBoy/Impulse
4) cd Impulse/
5) pip3 install -r requirements.txt
6) python3 impulse.py --help
π¦Termux:
1) pkg update
2) pkg install python3 python3-pip git -y
3) git clone https://github.com/LimerBoy/Impulse
4) cd Impulse/
5) pip3 install -r requirements.txt
6) python3 impulse.py --help
π¦ E X A M P L E :
python3 impulse.py --method SMS --time 20 --threads 15 --target +....XY
VERIFIED BY
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - LimerBoy/Impulse: :bomb: Impulse Denial-of-service ToolKit
:bomb: Impulse Denial-of-service ToolKit. Contribute to LimerBoy/Impulse development by creating an account on GitHub.
Phishing With a Rogue Wi-Fi Access Point.pdf
3.9 MB
Fast wifi hacking #full with examples & pictures
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦12 Best Laravel Helpers To Consider Using :
Laravel comes with a ton of useful global helper functions. If you havenβt used them so far, this is the best time to start. Over the years of me using the Laravel, 10 of those emerged as the most useful, making the development a lot easier. Sometimes we donβt really see how we can apply some methods until we see an example. So letβs get down to it and see the top 10 helpers I often use the most.
1)) array_flatten()
The array_flatten function flattens a multi-dimensional array into a single level array:
$array = ['name' => 'John', 'tools' => ['Laravel', 'Recipes']];
$flattened = array_flatten($array);
// ['John', 'Laravel', 'Recipes']
It is really helpful if I need to collect all the array values where some values might contain another array. Here, I am just concentrated on getting a new array with a list of all the values. It works like a charm!
2)) array_forget()
The array_forget function removes a given key / value pair from a deeply nested array using βdotβ notation:
$array = ['users' => ['managers' => ['name' => 'John']]];
array_forget($array, 'users.managers');
// ['users' => []]
This is a nicer version of unset() function which is a native PHP function for removing array elements.
3)) array_get()
Another amazing method that makes your development life easier. The array_get function retrieves a value from a deeply nested array using βdotβ notation:
$array = ['users' => ['managers' => ['name' => 'John']]];
$price = array_get($array, 'products.desk.price');
// 100
The array_get function also accepts a default value, which will be returned if the specific key is not found:
$discount = array_get($array, 'users.managers.missing', 'Jane');
// Jane
ο»Ώ
If there is anything more valuable than getting a deeply nested value withing an array, thatβs an ability to set a default value.
4)) array_only()
Imagine you had a lot of keys inside your array that you donβt want to use. As a matter of fact, out of 10 keys, you only want to use two and instantly create a new array. Instead of going through and array_forget()each item, you could simply pick the ones you want. The array_only function returns only the specified key / value pairs from the given array:
$array = ['name' => 'John', 'type' => 'user', 'age' => 44];
$slice = array_only($array, ['name', 'age']);
// ['name' => 'John', 'age' => 44]
5)) array_prepend()
How often have you used array_push and had to reverse the array instead of pre-pending it. The array_prepend function will push an item onto the beginning of an array:
$array = ['one', 'two', 'three', 'four'];
$array = array_prepend($array, 'zero');
// ['zero', 'one', 'two', 'three', 'four']
Itβs great that it works for key/value as well. If needed, you may specify the key that should be used for the value:
$array = ['price' => 100];
$array = array_prepend($array, 'Desk', 'name');
// ['name' => 'Desk', 'price' => 100]
6)) array_sort_recursive()
Many times you would get nested arrays that you might need to sort all at the same time. Yes, you could write a simple function to loop through and sort each array, but why, when you have the following function. The array_sort_recursive function recursively sorts an array using the sort function:
$array = [
['Roman', 'Taylor', 'Li'],
['PHP', 'Ruby', 'JavaScript'],
];
$sorted = array_sort_recursive($array);
/*
[
['Li', 'Roman', 'Taylor'],
['JavaScript', 'PHP', 'Ruby'],
]
*/
7)) array_wrap()
Sometimes you want to turn your single, string result into an array with only one element. Being able to reduce code to one line is always good. The array_wrap function wraps the given value in an array. If the given value is already an array it will not be changed:
$string = 'Success';
$array = array_wrap($string);
// ['Success']
If the given value is null, an empty array will be returned:
$nothing = null;
$array = array_wrap($nothing);
// []
π¦12 Best Laravel Helpers To Consider Using :
Laravel comes with a ton of useful global helper functions. If you havenβt used them so far, this is the best time to start. Over the years of me using the Laravel, 10 of those emerged as the most useful, making the development a lot easier. Sometimes we donβt really see how we can apply some methods until we see an example. So letβs get down to it and see the top 10 helpers I often use the most.
1)) array_flatten()
The array_flatten function flattens a multi-dimensional array into a single level array:
$array = ['name' => 'John', 'tools' => ['Laravel', 'Recipes']];
$flattened = array_flatten($array);
// ['John', 'Laravel', 'Recipes']
It is really helpful if I need to collect all the array values where some values might contain another array. Here, I am just concentrated on getting a new array with a list of all the values. It works like a charm!
2)) array_forget()
The array_forget function removes a given key / value pair from a deeply nested array using βdotβ notation:
$array = ['users' => ['managers' => ['name' => 'John']]];
array_forget($array, 'users.managers');
// ['users' => []]
This is a nicer version of unset() function which is a native PHP function for removing array elements.
3)) array_get()
Another amazing method that makes your development life easier. The array_get function retrieves a value from a deeply nested array using βdotβ notation:
$array = ['users' => ['managers' => ['name' => 'John']]];
$price = array_get($array, 'products.desk.price');
// 100
The array_get function also accepts a default value, which will be returned if the specific key is not found:
$discount = array_get($array, 'users.managers.missing', 'Jane');
// Jane
ο»Ώ
If there is anything more valuable than getting a deeply nested value withing an array, thatβs an ability to set a default value.
4)) array_only()
Imagine you had a lot of keys inside your array that you donβt want to use. As a matter of fact, out of 10 keys, you only want to use two and instantly create a new array. Instead of going through and array_forget()each item, you could simply pick the ones you want. The array_only function returns only the specified key / value pairs from the given array:
$array = ['name' => 'John', 'type' => 'user', 'age' => 44];
$slice = array_only($array, ['name', 'age']);
// ['name' => 'John', 'age' => 44]
5)) array_prepend()
How often have you used array_push and had to reverse the array instead of pre-pending it. The array_prepend function will push an item onto the beginning of an array:
$array = ['one', 'two', 'three', 'four'];
$array = array_prepend($array, 'zero');
// ['zero', 'one', 'two', 'three', 'four']
Itβs great that it works for key/value as well. If needed, you may specify the key that should be used for the value:
$array = ['price' => 100];
$array = array_prepend($array, 'Desk', 'name');
// ['name' => 'Desk', 'price' => 100]
6)) array_sort_recursive()
Many times you would get nested arrays that you might need to sort all at the same time. Yes, you could write a simple function to loop through and sort each array, but why, when you have the following function. The array_sort_recursive function recursively sorts an array using the sort function:
$array = [
['Roman', 'Taylor', 'Li'],
['PHP', 'Ruby', 'JavaScript'],
];
$sorted = array_sort_recursive($array);
/*
[
['Li', 'Roman', 'Taylor'],
['JavaScript', 'PHP', 'Ruby'],
]
*/
7)) array_wrap()
Sometimes you want to turn your single, string result into an array with only one element. Being able to reduce code to one line is always good. The array_wrap function wraps the given value in an array. If the given value is already an array it will not be changed:
$string = 'Success';
$array = array_wrap($string);
// ['Success']
If the given value is null, an empty array will be returned:
$nothing = null;
$array = array_wrap($nothing);
// []
8)) public_path()
You want to have your public files, such as the application icons, svg image, css resources etc⦠that are used statically inside the app, in your public folder. The public_path function will bring back the fully qualified path to the public directory. You may also use the public_path function to generate a fully qualified path to a given file within the public directory:
$path = public_path();
$path = public_path('css/app.css');
9)) auth()
Probably used the most, auth() doesnβt require you to insert the Auth facade. It works simple and easy on the fly and I use it mostly to get the currently logged in user. The auth function returns an authenticator instance. You may use it instead of the Auth facade for convenience:
$user = auth()->user();
If needed, you may specify which guard instance you would like to access:
$user = auth('admin')->user();
10)) collect()
If you want to change your realm and do all of this with collections, and I love collections, like really love them, then you can bridge the array and collections using the collect() function. The collect function creates a collection instance from the given value:
$collection = collect(['John', 'Jane']);
11)) dump()
The dump() function dumps the given variables without stopping the execution. It is extremely useful for debugging since it pretty-prints the whole class for you, in case you would print an Eloquent Model object.
dump($var1);
dump($var1, $var2, $var3);
dd()
If you do not want to continue executing your script, use the dump function we mentioned above. However, if you are interested in inspecting a specific result and donβt care about what happens after that, then use dd(). The dd function dumps the given variables and ends execution of the script:
12)) dd($value);
dd($value1, $value2, $value3, ...);
optional()
You have probably run into this issue at least once in your dev lifetime, and that is trying to access a property that doesnβt exist. The optional() function accepts an argument and you can call its methods or access properties. If the passed object is null, methods and properties will return null instead of causing errors or throwing exceptions.
$user = User::find(1);
return optional($user)->name;
wiki source
VERIFIED BY
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
You want to have your public files, such as the application icons, svg image, css resources etc⦠that are used statically inside the app, in your public folder. The public_path function will bring back the fully qualified path to the public directory. You may also use the public_path function to generate a fully qualified path to a given file within the public directory:
$path = public_path();
$path = public_path('css/app.css');
9)) auth()
Probably used the most, auth() doesnβt require you to insert the Auth facade. It works simple and easy on the fly and I use it mostly to get the currently logged in user. The auth function returns an authenticator instance. You may use it instead of the Auth facade for convenience:
$user = auth()->user();
If needed, you may specify which guard instance you would like to access:
$user = auth('admin')->user();
10)) collect()
If you want to change your realm and do all of this with collections, and I love collections, like really love them, then you can bridge the array and collections using the collect() function. The collect function creates a collection instance from the given value:
$collection = collect(['John', 'Jane']);
11)) dump()
The dump() function dumps the given variables without stopping the execution. It is extremely useful for debugging since it pretty-prints the whole class for you, in case you would print an Eloquent Model object.
dump($var1);
dump($var1, $var2, $var3);
dd()
If you do not want to continue executing your script, use the dump function we mentioned above. However, if you are interested in inspecting a specific result and donβt care about what happens after that, then use dd(). The dd function dumps the given variables and ends execution of the script:
12)) dd($value);
dd($value1, $value2, $value3, ...);
optional()
You have probably run into this issue at least once in your dev lifetime, and that is trying to access a property that doesnβt exist. The optional() function accepts an argument and you can call its methods or access properties. If the passed object is null, methods and properties will return null instead of causing errors or throwing exceptions.
$user = User::find(1);
return optional($user)->name;
wiki source
VERIFIED BY
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦#Linux Kernel Exploitation Tutorial :
* [01.Stack smashing(32bit) & Return-to-user(ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=23789706)
* [02.Stack smashing(64bit) & Return-to-user(ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=25624684)
* [03.Stack smashing(64bit) & ROP](https://www.lazenca.net/pages/viewpage.action?pageId=25624746)
* [04.Write-what-where(Arbitrary Memory Overwrite)(feat.ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=25624658)
* [05.Null pointer dereference(32bit & 64bit)](https://www.lazenca.net/pages/viewpage.action?pageId=25624632)
* [06.Use-After-Free(UAF) (feat.struct cred)](https://www.lazenca.net/pages/viewpage.action?pageId=25624864)
* [07.Use-After-Free(UAF) (feat.tty_struct)](https://www.lazenca.net/pages/viewpage.action?pageId=29327365)
* [08.ret2dir(return-to-direct-mapped memory)](https://www.lazenca.net/pages/viewpage.action?pageId=25624881)
π¦Kernel Self-Protection
* [01.Kernel Address Space Layout Randomization (KASLR)](https://www.lazenca.net/pages/viewpage.action?pageId=25624857)
* [02.Segregation of kernel memory from userspace memory(x86's SMEP/SMAP, ARM's PXN/PAN)](https://www.lazenca.net/pages/viewpage.action?pageId=25624859)
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦#Linux Kernel Exploitation Tutorial :
* [01.Stack smashing(32bit) & Return-to-user(ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=23789706)
* [02.Stack smashing(64bit) & Return-to-user(ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=25624684)
* [03.Stack smashing(64bit) & ROP](https://www.lazenca.net/pages/viewpage.action?pageId=25624746)
* [04.Write-what-where(Arbitrary Memory Overwrite)(feat.ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=25624658)
* [05.Null pointer dereference(32bit & 64bit)](https://www.lazenca.net/pages/viewpage.action?pageId=25624632)
* [06.Use-After-Free(UAF) (feat.struct cred)](https://www.lazenca.net/pages/viewpage.action?pageId=25624864)
* [07.Use-After-Free(UAF) (feat.tty_struct)](https://www.lazenca.net/pages/viewpage.action?pageId=29327365)
* [08.ret2dir(return-to-direct-mapped memory)](https://www.lazenca.net/pages/viewpage.action?pageId=25624881)
π¦Kernel Self-Protection
* [01.Kernel Address Space Layout Randomization (KASLR)](https://www.lazenca.net/pages/viewpage.action?pageId=25624857)
* [02.Segregation of kernel memory from userspace memory(x86's SMEP/SMAP, ARM's PXN/PAN)](https://www.lazenca.net/pages/viewpage.action?pageId=25624859)
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β