β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦another methode #forbeginers how can we protect the security of shared folders in the local area network? This requires the following means:
When setting access permissions for shared folders, set important shared files as read-only.
1) Most of the time, users only need to view or copy the shared file, and often do not directly modify the shared folder. However, for convenience, some employees directly share a folder and file in a readable and writable manner. This is very dangerous.
2) On the one hand, these unrestricted shared file homes and shared files have become carriers of virus transmission. During my work, I discovered that some users do not have permission restrictions when sharing files. After some time, I went to look at the shared file again, and found that there were traces of viruses or Trojan horses in some shared files or shared folders.
3) It turns out that because this shared folder has write permissions, how other users open this file, if there is a virus or Trojan horse in this computer, it will be infected to this shared folder. In this way, other computers that access this shared folder are also caught. It can be seen that the shared folders without protection measures and the shared files inside have become a good carrier for virus transmission.
4) On the other hand, when the data is changed illegally, it is difficult to find out who is playing the prank. Although the relevant log information can be used to query who has accessed the shared file and whether any changes have been made. However, based on this information alone, it is impossible to know what changes the user made to this shared folder.
5) Sometimes, when we open a shared file, we accidentally press a space bar or a character key, accidentally overwrite a word, etc. These situations are often encountered in actual work. Sometimes, even if he finds the responsible person, he doesn't know what has been changed. Therefore, when the shared file is set to be writable, it is difficult to prevent employees from changing it intentionally or unintentionally.
6) Third, if files are shared in a writable way, the unity of data may not be guaranteed. For example, the personnel department has shared an attendance file in a readable and writable manner. At this time, if the financial department modifies this document, the personnel department does not know. Because the financial staff may forget to tell the personnel department, at this time, the data between the two departments will be inconsistent, which may cause some unnecessary troubles.
>Moreover, since there is no relevant evidence, no one can tell who is right and who is wrong.
7) In order to solve these problems, I suggest that corporate users, when sharing folders, it is best to set the permissions of the folder to read-only. If this shared folder sometimes needs to save files in this folder by other users, it cannot be set as read-only. Then we can also set the files in the shared folder as read-only.
> In this case, because the folders are read-only, viruses and Trojan horses cannot infect these folders, thereby avoiding being a source of contamination for spreading viruses; moreover, it can also prevent unauthorized changes by users, which may lead to inconsistent data. and many more.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦another methode #forbeginers how can we protect the security of shared folders in the local area network? This requires the following means:
When setting access permissions for shared folders, set important shared files as read-only.
1) Most of the time, users only need to view or copy the shared file, and often do not directly modify the shared folder. However, for convenience, some employees directly share a folder and file in a readable and writable manner. This is very dangerous.
2) On the one hand, these unrestricted shared file homes and shared files have become carriers of virus transmission. During my work, I discovered that some users do not have permission restrictions when sharing files. After some time, I went to look at the shared file again, and found that there were traces of viruses or Trojan horses in some shared files or shared folders.
3) It turns out that because this shared folder has write permissions, how other users open this file, if there is a virus or Trojan horse in this computer, it will be infected to this shared folder. In this way, other computers that access this shared folder are also caught. It can be seen that the shared folders without protection measures and the shared files inside have become a good carrier for virus transmission.
4) On the other hand, when the data is changed illegally, it is difficult to find out who is playing the prank. Although the relevant log information can be used to query who has accessed the shared file and whether any changes have been made. However, based on this information alone, it is impossible to know what changes the user made to this shared folder.
5) Sometimes, when we open a shared file, we accidentally press a space bar or a character key, accidentally overwrite a word, etc. These situations are often encountered in actual work. Sometimes, even if he finds the responsible person, he doesn't know what has been changed. Therefore, when the shared file is set to be writable, it is difficult to prevent employees from changing it intentionally or unintentionally.
6) Third, if files are shared in a writable way, the unity of data may not be guaranteed. For example, the personnel department has shared an attendance file in a readable and writable manner. At this time, if the financial department modifies this document, the personnel department does not know. Because the financial staff may forget to tell the personnel department, at this time, the data between the two departments will be inconsistent, which may cause some unnecessary troubles.
>Moreover, since there is no relevant evidence, no one can tell who is right and who is wrong.
7) In order to solve these problems, I suggest that corporate users, when sharing folders, it is best to set the permissions of the folder to read-only. If this shared folder sometimes needs to save files in this folder by other users, it cannot be set as read-only. Then we can also set the files in the shared folder as read-only.
> In this case, because the folders are read-only, viruses and Trojan horses cannot infect these folders, thereby avoiding being a source of contamination for spreading viruses; moreover, it can also prevent unauthorized changes by users, which may lead to inconsistent data. and many more.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Hefei Changxin is scheduled to become the fourth biggest 17 nm memory DRAM factory in the world next year
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 powerfull multi tools :
F E A T U R E S :
WHOIS
DNSWALK
FIERCE
DNSRecon
DNSenum
NMAP
DMitry
theHarvester
LBD
SSLScan
SSLYze
WhatWeb
Automater
Grabber
Parsero
Uniscan
Metagoofil
A2SV
WPScan
Droopescan
WPSeku
XssPy
Spaghetti
sublist3r
WAFW00F
nslookup
nslookup
dirsearch
OWASP Joomscan
Spaghetti
Globuster
Grabber
OTHER TOOLS
Pureblood
Wapiti
Lscript
Trity
RED_HAWK
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/penetrate2hack/ITWSV.git
2) cd ITWSV
3) chmod +x start.sh
4) chmod +x update.sh (only if required)
5) ./start.sh
Verified β
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 powerfull multi tools :
F E A T U R E S :
WHOIS
DNSWALK
FIERCE
DNSRecon
DNSenum
NMAP
DMitry
theHarvester
LBD
SSLScan
SSLYze
WhatWeb
Automater
Grabber
Parsero
Uniscan
Metagoofil
A2SV
WPScan
Droopescan
WPSeku
XssPy
Spaghetti
sublist3r
WAFW00F
nslookup
nslookup
dirsearch
OWASP Joomscan
Spaghetti
Globuster
Grabber
OTHER TOOLS
Pureblood
Wapiti
Lscript
Trity
RED_HAWK
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/penetrate2hack/ITWSV.git
2) cd ITWSV
3) chmod +x start.sh
4) chmod +x update.sh (only if required)
5) ./start.sh
Verified β
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - penetrate2hack/ITWSV: ITWSV- Integrated Tool for Web Security Vulnerability
ITWSV- Integrated Tool for Web Security Vulnerability - penetrate2hack/ITWSV
What is mad-metasploit, db_autopwn.pdf
1.8 MB
mad-metasploit is my project related to metasploit framework To sum upβ¦
"Metasploit custom modules, plugins, resource script and.. awesome metasploit collection"
and db_autopwn is automation exploit plugin on metasploit-framework. but it is deprecated.. :(
I keeping db_autopwn source code on my github repo, and added to mad-metasploit project! Now, letβs use Mad-Metasploit to launch an automated attac
"Metasploit custom modules, plugins, resource script and.. awesome metasploit collection"
and db_autopwn is automation exploit plugin on metasploit-framework. but it is deprecated.. :(
I keeping db_autopwn source code on my github repo, and added to mad-metasploit project! Now, letβs use Mad-Metasploit to launch an automated attac
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How iPhone and Mac will also be hacked. An iMessage password may be stolen ?
Get infected
as long as you receive a message
1) The so-called identity credential information specifically includes WiFi passwords, login credentials, and email login information. The scope of the vulnerability is relatively wide, including most of Apple's operating systems, including macOS (that is, OS X), watchOS, tvOS, watchOS, and iOS. So iPhone, iPod touch, Apple Watch, Apple TV, Mac device users need to pay attention.
2) The vulnerability was reported by Tyler Bohan, a senior researcher at Cisco Talos, but Bohan did not disclose the details of the vulnerability, and our knowledge is relatively limited.
3) The high-risk vulnerability exists in ImageIO-ImageIO is actually an API of these operating systems. The attacker can construct a TIFF file (an image file format)-which contains malicious code exploiting the vulnerability, and then send this image to Apple users in the form of MMS or iMessage.
4) After receiving the message, the Apple user was recruited. This process does not require any interaction by the user , because the system will automatically process the received pictures. Specifically, what can be done to exploit this vulnerability, as described above, is to obtain stored identity credential information from the device memory. From the perspective of not requiring user interaction, the vulnerability is indeed a high-risk level. Bohan called it a "very dangerous bug".
5) In addition to sending messages, the vulnerability can also be used to build web pages containing malicious code. Apple users can use Safari to browse the web pages to leak identity credentials. This process does not require users to perform any operations on the web pages.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How iPhone and Mac will also be hacked. An iMessage password may be stolen ?
Get infected
as long as you receive a message
1) The so-called identity credential information specifically includes WiFi passwords, login credentials, and email login information. The scope of the vulnerability is relatively wide, including most of Apple's operating systems, including macOS (that is, OS X), watchOS, tvOS, watchOS, and iOS. So iPhone, iPod touch, Apple Watch, Apple TV, Mac device users need to pay attention.
2) The vulnerability was reported by Tyler Bohan, a senior researcher at Cisco Talos, but Bohan did not disclose the details of the vulnerability, and our knowledge is relatively limited.
3) The high-risk vulnerability exists in ImageIO-ImageIO is actually an API of these operating systems. The attacker can construct a TIFF file (an image file format)-which contains malicious code exploiting the vulnerability, and then send this image to Apple users in the form of MMS or iMessage.
4) After receiving the message, the Apple user was recruited. This process does not require any interaction by the user , because the system will automatically process the received pictures. Specifically, what can be done to exploit this vulnerability, as described above, is to obtain stored identity credential information from the device memory. From the perspective of not requiring user interaction, the vulnerability is indeed a high-risk level. Bohan called it a "very dangerous bug".
5) In addition to sending messages, the vulnerability can also be used to build web pages containing malicious code. Apple users can use Safari to browse the web pages to leak identity credentials. This process does not require users to perform any operations on the web pages.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Comprehensive analysis of SQL optimization - explain in detail
Index common operations
A) Query Index
show index from tablename;
increase index
1) οΌ alter table - add indexοΌ
2) alter table - add UNIQUE [indexName] ON (username(length))οΌ
3) οΌ alter TABLE mytable add index index1_index2_index3 (index1,index2,index3);
4) PRIMARY KEY(indexName)
5) Delete the index
alter table drop index index_name;
drop index index_name on
6) Index optimization-explain
Before optimization, use the explain keyword before the query , check the execution plan of the SQL language , and judge whether the query uses index.
7) EXPLAIN: Simulate how the Mysql optimizer executes the SQL query, so as to know how Mysql processes your SQL statement. Analyze the performance bottleneck of your query or table structure.
E.g
mysql> explain select * from tb_user;
image.png
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Comprehensive analysis of SQL optimization - explain in detail
Index common operations
A) Query Index
show index from tablename;
increase index
1) οΌ alter table - add indexοΌ
2) alter table - add UNIQUE [indexName] ON (username(length))οΌ
3) οΌ alter TABLE mytable add index index1_index2_index3 (index1,index2,index3);
4) PRIMARY KEY(indexName)
5) Delete the index
alter table drop index index_name;
drop index index_name on
6) Index optimization-explain
Before optimization, use the explain keyword before the query , check the execution plan of the SQL language , and judge whether the query uses index.
7) EXPLAIN: Simulate how the Mysql optimizer executes the SQL query, so as to know how Mysql processes your SQL statement. Analyze the performance bottleneck of your query or table structure.
E.g
mysql> explain select * from tb_user;
image.png
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦firefox 2020 plugins another collection :
#adblock_plus
https://addons.mozilla.org/firefox/downloads/file/808841/adblock_plus-3.0.2-an+fx.xpi?src=dp-btn-primary
#gnome_shell_integration
https://addons.mozilla.org/firefox/downloads/file/854306/gnome_shell_integration-10-an+fx-linux.xpi?src=dp-btn-primary
#IP Address and Domain Information
https://addons.mozilla.org/firefox/downloads/file/689443/ip_address_and_domain_information-4.0.0-fx.xpi?src=dp-btn-primary
#New Hackbar
https://addons.mozilla.org/firefox/downloads/file/831304/new_hackbar-1.0.4-an+fx.xpi?src=dp-btn-primary
#HackBar (F12)
https://addons.mozilla.org/firefox/downloads/file/851494/hackbar-1.1.7-an+fx.xpi?src=dp-btn-primary
#Proxy SwitchyOmega
https://addons.mozilla.org/firefox/downloads/file/848109/proxy_switchyomega-2.5.10-an+fx.xpi?src=dp-btn-primary
#Show External IP
https://addons.mozilla.org/firefox/downloads/file/776591/show_external_ip-1.0.6-an+fx.xpi?src=dp-btn-primary
#Show Server IP
https://addons.mozilla.org/firefox/downloads/file/739407/show_server_ip-2.3-an+fx-linux.xpi?src=dp-btn-primary
#Tampermonkey
https://addons.mozilla.org/firefox/downloads/file/813574/tampermonkey-4.5.5660-an+fx.xpi?src=dp-btn-primary
#Site Stacks extension
https://addons.mozilla.org/firefox/downloads/file/745343/sitestacks_for_firefox_instant_tech_lookup-1.0.1-fx-linux.xpi?src=dp-btn-primary
#Wappalyzer
https://addons.mozilla.org/firefox/downloads/file/852547/wappalyzer-5.4.6-an+fx.xpi?src=dp-btn-primary
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦firefox 2020 plugins another collection :
#adblock_plus
https://addons.mozilla.org/firefox/downloads/file/808841/adblock_plus-3.0.2-an+fx.xpi?src=dp-btn-primary
#gnome_shell_integration
https://addons.mozilla.org/firefox/downloads/file/854306/gnome_shell_integration-10-an+fx-linux.xpi?src=dp-btn-primary
#IP Address and Domain Information
https://addons.mozilla.org/firefox/downloads/file/689443/ip_address_and_domain_information-4.0.0-fx.xpi?src=dp-btn-primary
#New Hackbar
https://addons.mozilla.org/firefox/downloads/file/831304/new_hackbar-1.0.4-an+fx.xpi?src=dp-btn-primary
#HackBar (F12)
https://addons.mozilla.org/firefox/downloads/file/851494/hackbar-1.1.7-an+fx.xpi?src=dp-btn-primary
#Proxy SwitchyOmega
https://addons.mozilla.org/firefox/downloads/file/848109/proxy_switchyomega-2.5.10-an+fx.xpi?src=dp-btn-primary
#Show External IP
https://addons.mozilla.org/firefox/downloads/file/776591/show_external_ip-1.0.6-an+fx.xpi?src=dp-btn-primary
#Show Server IP
https://addons.mozilla.org/firefox/downloads/file/739407/show_server_ip-2.3-an+fx-linux.xpi?src=dp-btn-primary
#Tampermonkey
https://addons.mozilla.org/firefox/downloads/file/813574/tampermonkey-4.5.5660-an+fx.xpi?src=dp-btn-primary
#Site Stacks extension
https://addons.mozilla.org/firefox/downloads/file/745343/sitestacks_for_firefox_instant_tech_lookup-1.0.1-fx-linux.xpi?src=dp-btn-primary
#Wappalyzer
https://addons.mozilla.org/firefox/downloads/file/852547/wappalyzer-5.4.6-an+fx.xpi?src=dp-btn-primary
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
The_Journey_to_Try_Harder_TJnullβs_Preparation_Guide_for_PWK_OSCP.pdf
600.5 KB
Table of Contents:
Overview Dedication A Word of Warning! Section 1: Getting Comfortable with Kali Linux Section 2: Essential Tools in Kali Section 3: Passive Reconnaissance Section 4: Active Reconnaissance Section 5: Vulnerability Scanning Section 6: Buer Overflows
Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Section 7: Handling Public Exploits Section 8: Transferring Files to your target Section 9: Privilege Escalation Section 10: Client-Side Attacks Section 11: Web Application Attacks Section 12: Password Cracking Section 13: Port Redirection and Pivoting Section 14: Metasploit Framework Section 15: Antivirus Bypassing Extra Resources Setting up your Pentesting Environment Wargames/Hands-on Challenges Capture the Flag Competitions (CTFs)/Cyber Competitions Bug Bounty Programs Vulnerable Machines Tips to participate in the Proctored OSCP exam Other Resources
Overview Dedication A Word of Warning! Section 1: Getting Comfortable with Kali Linux Section 2: Essential Tools in Kali Section 3: Passive Reconnaissance Section 4: Active Reconnaissance Section 5: Vulnerability Scanning Section 6: Buer Overflows
Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD
Section 7: Handling Public Exploits Section 8: Transferring Files to your target Section 9: Privilege Escalation Section 10: Client-Side Attacks Section 11: Web Application Attacks Section 12: Password Cracking Section 13: Port Redirection and Pivoting Section 14: Metasploit Framework Section 15: Antivirus Bypassing Extra Resources Setting up your Pentesting Environment Wargames/Hands-on Challenges Capture the Flag Competitions (CTFs)/Cyber Competitions Bug Bounty Programs Vulnerable Machines Tips to participate in the Proctored OSCP exam Other Resources
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Powerful Disassembler Library For x86/AMD64
Welcome to the diStorm3 binary stream disassembler library project.
1) diStorm3 is really a decomposer, which means it takes an instruction and returns a binary structure which describes it rather than static text, which is great for advanced binary code analysis.
> diStorm3 is super lightweight (~45KB), ultra fast and easy to use (a single API)!
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Installing diStorm3 - Clone repo locally and then 'python
https://github.com/gdabah/distorm
2) setup.py install' or alternatively: 'python -m pip install distorm3'.
For Windows, use these pre-built installers in https://pypi.org/project/distorm3/#files.
that's all
Verified β
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Powerful Disassembler Library For x86/AMD64
Welcome to the diStorm3 binary stream disassembler library project.
1) diStorm3 is really a decomposer, which means it takes an instruction and returns a binary structure which describes it rather than static text, which is great for advanced binary code analysis.
> diStorm3 is super lightweight (~45KB), ultra fast and easy to use (a single API)!
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Installing diStorm3 - Clone repo locally and then 'python
https://github.com/gdabah/distorm
2) setup.py install' or alternatively: 'python -m pip install distorm3'.
For Windows, use these pre-built installers in https://pypi.org/project/distorm3/#files.
that's all
Verified β
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - gdabah/distorm: Powerful Disassembler Library For x86/AMD64
Powerful Disassembler Library For x86/AMD64. Contribute to gdabah/distorm development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WEB- HACKING METHODE
What's Parsero?
Parsero is a free script written in Python which reads the Robots.txt file of a web server and looks at the Disallow entries. The Disallow entries tell the search engines what directories or files hosted on a web server mustn't be indexed. For example, "Disallow: /portal/login" means that the content on www.example.com/portal/login it's not allowed to be indexed by crawlers like Google, Bing, Yahoo... This is the way the administrator have to not share sensitive or private information with the search engines.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/behindthefirewalls/Parsero.git
2) cd Parsero
3) sudo setup.py install
#EASYINSTALL
In Kali Linux
1) sudo apt-get update
2) sudo apt-get install parsero
example root@keiv:~# parsero -u www.example.com -sb
π¦more commands :
$ parsero -h
usage: parsero.py [-h] [-u URL] [-o] [-sb]
optional arguments:
-h, --help show this help message and exit
-u URL Type the URL which will be analyzed
-o Show only the "HTTP 200" status code
-sb Search in Bing indexed Disallows
-f FILE Scan a list of domains from a list
Verified gitβ
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WEB- HACKING METHODE
What's Parsero?
Parsero is a free script written in Python which reads the Robots.txt file of a web server and looks at the Disallow entries. The Disallow entries tell the search engines what directories or files hosted on a web server mustn't be indexed. For example, "Disallow: /portal/login" means that the content on www.example.com/portal/login it's not allowed to be indexed by crawlers like Google, Bing, Yahoo... This is the way the administrator have to not share sensitive or private information with the search engines.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/behindthefirewalls/Parsero.git
2) cd Parsero
3) sudo setup.py install
#EASYINSTALL
In Kali Linux
1) sudo apt-get update
2) sudo apt-get install parsero
example root@keiv:~# parsero -u www.example.com -sb
π¦more commands :
$ parsero -h
usage: parsero.py [-h] [-u URL] [-o] [-sb]
optional arguments:
-h, --help show this help message and exit
-u URL Type the URL which will be analyzed
-o Show only the "HTTP 200" status code
-sb Search in Bing indexed Disallows
-f FILE Scan a list of domains from a list
Verified gitβ
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - behindthefirewalls/Parsero: Parsero | Robots.txt audit tool
Parsero | Robots.txt audit tool. Contribute to behindthefirewalls/Parsero development by creating an account on GitHub.
Forwarded from UNDERCODE HACKING
π¦#fastTips
How Check if a long list of URLS :
> URL-Tester
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) You can use linux or termux for this:
2) pkg install curl
3) git clone https://github.com/rebl0x3r/urltester.git
4) cd pr0xyscr4p3r && chmod +x urltester.sh
Run:
5) bash urltester.sh
Verified gitβ
β β β Uππ»βΊπ«Δπ¬πβ β β β
How Check if a long list of URLS :
> URL-Tester
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) You can use linux or termux for this:
2) pkg install curl
3) git clone https://github.com/rebl0x3r/urltester.git
4) cd pr0xyscr4p3r && chmod +x urltester.sh
Run:
5) bash urltester.sh
Verified gitβ
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦OSCP_Helpful_Links :
OSCP Course Review
Offensive Securityβs PWB and OSCP β My Experience
http://www.securitysift.com/offsec-pwb-oscp/
OSCP Journey
https://scriptkidd1e.wordpress.com/oscp-journey/
Down with OSCP
http://ch3rn0byl.com/down-with-oscp-yea-you-know-me/
Jolly Frogs - Tech Exams (Very thorough)
http://www.techexams.net/forums/security-certifications/110760-oscp-jollyfrogs-tale.html
OSCP Inspired VMs and Walkthroughs
https://www.hackthebox.eu/
https://www.root-me.org/
https://www.vulnhub.com/
Verified β
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦OSCP_Helpful_Links :
OSCP Course Review
Offensive Securityβs PWB and OSCP β My Experience
http://www.securitysift.com/offsec-pwb-oscp/
OSCP Journey
https://scriptkidd1e.wordpress.com/oscp-journey/
Down with OSCP
http://ch3rn0byl.com/down-with-oscp-yea-you-know-me/
Jolly Frogs - Tech Exams (Very thorough)
http://www.techexams.net/forums/security-certifications/110760-oscp-jollyfrogs-tale.html
OSCP Inspired VMs and Walkthroughs
https://www.hackthebox.eu/
https://www.root-me.org/
https://www.vulnhub.com/
Verified β
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Security Sift
Offensive Security's PWB and OSCP - My Experience - Security Sift
My experience with the Offensive Security Penetration Testing with Backtrack (PWB) course and achieving the OSCP certification.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Share several IDS open source systems :
Prelude IDS
From the perspective of design, it is positioned to meet the needs of large-scale networks, and realizes network detectors, log analyzers, and alarm information centralized viewing and analysis tools. The network detector part is basically a copy of Snort's functions and is fully compatible with Snort's rule set. ( http://www.prelude-ids.org/ )
Firestorm
It is a very high-performance network intrusion detection system (NIDS). Currently it only implements the detector part and is fully compatible with Snort's rule set, but plans include real support for analysis, reporting, remote console and real-time sensor configuration. It is fully pluggable, so it is very flexible. It can record alarm information to the Prelude IDS manager. It claims to be much better than Snort in performance. http://www.scaramanga.co.uk/firestorm/
NetSTAT
Based on the research results of STAT (State Transition Analysis Technique) describing the attack, using the unique STATL language to describe the attack, the attack description text is converted into C++ code by the STATL interpretation tool and compiled into the detection engine to realize the detection function. It has been released. STATL language interpretation conversion tool and a basic example network detector part (a few examples of detection functions). To be proficient in using this IDS tool requires relatively strong programming skills, but with this IDS, very complex detection functions can be achieved.
http://www.cs.ucsb.edu/~rsg/STAT/
Bro
It is a real-time network intrusion detection software implemented by Vern Paxson. It was released in 1998 under the BSD license. Its original design goal was to achieve a real-time alarm, separation of mechanism and strategy, and highly scalable intrusion detection and network under a 100M network. Monitor the audit system.
https://www.bro.org/
Suricata
It is a system that supports IDS, IPS and NSM. The system has a Snort-like architecture and relies on signatures like Snort. It can even use the same Emerging Threat rule set used by VRT Snort rules and Snort itself. Suricata is newer than Snort and it will have a chance to overtake Snort. https://suricata-ids.org/
OSSEC
OSSEC open source security information management system (OPEN SOURCE SECURITY INFORMATION MANAGEMENT) is an open source host-based intrusion detection system, which can be referred to as HIDS for short. It has log analysis, file integrity check, policy monitoring, rootkit detection, real-time alarm and linkage response functions. https://ossec.github.io/
enjoyβ€οΈππ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Share several IDS open source systems :
Prelude IDS
From the perspective of design, it is positioned to meet the needs of large-scale networks, and realizes network detectors, log analyzers, and alarm information centralized viewing and analysis tools. The network detector part is basically a copy of Snort's functions and is fully compatible with Snort's rule set. ( http://www.prelude-ids.org/ )
Firestorm
It is a very high-performance network intrusion detection system (NIDS). Currently it only implements the detector part and is fully compatible with Snort's rule set, but plans include real support for analysis, reporting, remote console and real-time sensor configuration. It is fully pluggable, so it is very flexible. It can record alarm information to the Prelude IDS manager. It claims to be much better than Snort in performance. http://www.scaramanga.co.uk/firestorm/
NetSTAT
Based on the research results of STAT (State Transition Analysis Technique) describing the attack, using the unique STATL language to describe the attack, the attack description text is converted into C++ code by the STATL interpretation tool and compiled into the detection engine to realize the detection function. It has been released. STATL language interpretation conversion tool and a basic example network detector part (a few examples of detection functions). To be proficient in using this IDS tool requires relatively strong programming skills, but with this IDS, very complex detection functions can be achieved.
http://www.cs.ucsb.edu/~rsg/STAT/
Bro
It is a real-time network intrusion detection software implemented by Vern Paxson. It was released in 1998 under the BSD license. Its original design goal was to achieve a real-time alarm, separation of mechanism and strategy, and highly scalable intrusion detection and network under a 100M network. Monitor the audit system.
https://www.bro.org/
Suricata
It is a system that supports IDS, IPS and NSM. The system has a Snort-like architecture and relies on signatures like Snort. It can even use the same Emerging Threat rule set used by VRT Snort rules and Snort itself. Suricata is newer than Snort and it will have a chance to overtake Snort. https://suricata-ids.org/
OSSEC
OSSEC open source security information management system (OPEN SOURCE SECURITY INFORMATION MANAGEMENT) is an open source host-based intrusion detection system, which can be referred to as HIDS for short. It has log analysis, file integrity check, policy monitoring, rootkit detection, real-time alarm and linkage response functions. https://ossec.github.io/
enjoyβ€οΈππ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦small linux helpful tools :
1)
sudo apt-get install screenfetch
sudo apt-get install neofetch
2) sudo apt-get install sl
3)
sudo apt-get install yes
4)
sudo apt-get install rev
5)
sudo apt-get install fortune
6)
sudo apt-get install figlet
7)
sudo apt-get install toilet
8)
sudo apt-get install cowsay
9)
sudo apt-get install xcowsay
10)
sudo apt-get install cmatrix
11)
sudo apt-get install oneko
12)
sudo apt-get install lolcat
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦small linux helpful tools :
1)
sudo apt-get install screenfetch
sudo apt-get install neofetch
2) sudo apt-get install sl
3)
sudo apt-get install yes
4)
sudo apt-get install rev
5)
sudo apt-get install fortune
6)
sudo apt-get install figlet
7)
sudo apt-get install toilet
8)
sudo apt-get install cowsay
9)
sudo apt-get install xcowsay
10)
sudo apt-get install cmatrix
11)
sudo apt-get install oneko
12)
sudo apt-get install lolcat
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β