β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is FTP and what port does it use?
1) FTP or File Transfer Protocol is one of the oldest protocols and should probably be removed.
2) FTP is primarily intended for transferring large files, with the ability to resume downloads if they are interrupted.
3)The FTP server can be accessed in two different ways: anonymous access and standard login.
4)They are both basically the same, except that anonymous access does not require an active user login, while standard login does.
5)However, this is the big problem with FTP - user credentials are transmitted in clear text, which means that anyone listening over the wire can eavesdrop on the credentials extremely easily.
6)Two competing FTP implementations that solve this problem are SFTP (FTP over SSH) and FTPS (FTP over SSL). FTP uses TCP ports 20 and 21.
#FastTips
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is FTP and what port does it use?
1) FTP or File Transfer Protocol is one of the oldest protocols and should probably be removed.
2) FTP is primarily intended for transferring large files, with the ability to resume downloads if they are interrupted.
3)The FTP server can be accessed in two different ways: anonymous access and standard login.
4)They are both basically the same, except that anonymous access does not require an active user login, while standard login does.
5)However, this is the big problem with FTP - user credentials are transmitted in clear text, which means that anyone listening over the wire can eavesdrop on the credentials extremely easily.
6)Two competing FTP implementations that solve this problem are SFTP (FTP over SSH) and FTPS (FTP over SSL). FTP uses TCP ports 20 and 21.
#FastTips
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π How to create your own service What Is My IP :
#FastTips
1) Python, Web Hosting and PHP
For this tutorial, we are going to use Python and assume we already have our own web hosting environment.
2) This is necessary as we need our own online server that will return our external IP address.
π¦Python
1) The Python code you see below will get the page that was set as 'URL', and then it will filter out the H1 header and the end of the H1 header, just like between the header HTML, we will output the external IP address.
import requests
url = 'https://UndercodeNews.com/getip.php'
r = requests.get(url)
r.text
ip = r.text.split('<h1>')[1].split('</h1>')[0]
print(ip)
π¦Web hosting
In your web hosting environment, you will need to host a PHP file containing some code, this code will return the page as shown in the picture below.
For example, in Apache, you would need to store content in the following directory:
/var/www/html/getip.php
#FastTips
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π How to create your own service What Is My IP :
#FastTips
1) Python, Web Hosting and PHP
For this tutorial, we are going to use Python and assume we already have our own web hosting environment.
2) This is necessary as we need our own online server that will return our external IP address.
π¦Python
1) The Python code you see below will get the page that was set as 'URL', and then it will filter out the H1 header and the end of the H1 header, just like between the header HTML, we will output the external IP address.
import requests
url = 'https://UndercodeNews.com/getip.php'
r = requests.get(url)
r.text
ip = r.text.split('<h1>')[1].split('</h1>')[0]
print(ip)
π¦Web hosting
In your web hosting environment, you will need to host a PHP file containing some code, this code will return the page as shown in the picture below.
For example, in Apache, you would need to store content in the following directory:
/var/www/html/getip.php
#FastTips
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦no root Social Engineering Toolkit on Termux
#FastTips
1) pkg update && pkg upgrade -y
2) apt install curl -y
3) curl -LO https://raw.githubusercontent.com/Hax4us/setoolkit/master/setoolkit.sh
4) sh setoolkit.sh
5) After finishing the above process type the following command
6) cd setoolkit
7) ./setup.py install
8) ./setoolkit
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦no root Social Engineering Toolkit on Termux
#FastTips
1) pkg update && pkg upgrade -y
2) apt install curl -y
3) curl -LO https://raw.githubusercontent.com/Hax4us/setoolkit/master/setoolkit.sh
4) sh setoolkit.sh
5) After finishing the above process type the following command
6) cd setoolkit
7) ./setup.py install
8) ./setoolkit
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Everything you need to know about Google Stadia :
#FastTips
1) On June 12, Google fixed one of the main shortcomings of the Stadia service: it is now available on any Android device, whether it is on the official support list or not. In addition, all OnePlus models from OnePlus 5 will support Stadia.
2) To use Stadia on a device without official support, you need to download the Stadia app, open the βExperimentsβ tab, click βPlayβ. The service should work without problems.
3) Last year Google announced the Stream project. This was a limited test built around Assassin's Creed Odyssey. After a short period of testing in January, the project ended and Google said nothing about its future plans to stream games. Stadia was announced at GDC 2019.
4) The idea of ββstreaming is far from new. However, Google's service may turn out to be one of the most ambitious.
Google Stadia is a game streaming service to any user's device. It can be a TV, smartphone, laptop, tablet. In any case, you will be able to access the most advanced games.
How is this possible? Google servers process the image of the games and broadcast it. The user only needs a device with a screen. This gives everyone access to high quality games with high system requirements. Including those who cannot afford to buy an expensive gaming computer or console.
π¦Supported platforms
The cloud service works with a Chromecast Ultra device when connected to a TV. Chrome browser is supported on computers, laptops and tablets, including Chrome OS. Among smartphones, Google Pixel 2, Pixel 3, Pixel 3a and Pixel 4 are supported.
In February, support for the following smartphones appeared:
Samsung Galaxy S8
Samsung Galaxy S8 Plus
Samsung Galaxy S8 Active
Samsung Galaxy Note 8
Samsung Galaxy S9
Samsung Galaxy S9 Plus
..../.......
5) in June it was announced that all Android smartphones will be able to work with Stadia. Even those that are not included in the above list. You can install the Stadia application on them, open the "Experiments" tab and click "Play".
6) Since this is a cloud service, all the heavy processing is done by other people's computers remotely. You can work with a smartphone, tablet or even a weak computer, the quality will be equally high. Users of the service will receive the computing power of a custom AMD 2.7 GHz x86 processor, 16 GB of RAM, data transfer rates up to 484 GB / s and a GPU with a capacity of 10.7 teraflops.
This makes Google's platform more powerful than any game console on the market. In addition, Google will be responsible for updates and users will not have to do anything.
Of course, the quality of the games will depend on your internet connection. Playing on Chromecast Ultra, you can get 4K support with HDR and 5.1 surround sound if you have a TV, sound system, and fast enough internet to support it all.
π¦Can I try Stadia for free?
Yes. Google has announced a two-month free trial for Stadia Pro. Any owner of supported devices can play several games on the service for free. They can buy additional games to play and stream. After the trial period ends, you can renew your Stadia Pro subscription for $ 9.99 per month. You can unsubscribe at any time before the end of the trial period.
Your not allowed to copy our tutorials
!@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Everything you need to know about Google Stadia :
#FastTips
1) On June 12, Google fixed one of the main shortcomings of the Stadia service: it is now available on any Android device, whether it is on the official support list or not. In addition, all OnePlus models from OnePlus 5 will support Stadia.
2) To use Stadia on a device without official support, you need to download the Stadia app, open the βExperimentsβ tab, click βPlayβ. The service should work without problems.
3) Last year Google announced the Stream project. This was a limited test built around Assassin's Creed Odyssey. After a short period of testing in January, the project ended and Google said nothing about its future plans to stream games. Stadia was announced at GDC 2019.
4) The idea of ββstreaming is far from new. However, Google's service may turn out to be one of the most ambitious.
Google Stadia is a game streaming service to any user's device. It can be a TV, smartphone, laptop, tablet. In any case, you will be able to access the most advanced games.
How is this possible? Google servers process the image of the games and broadcast it. The user only needs a device with a screen. This gives everyone access to high quality games with high system requirements. Including those who cannot afford to buy an expensive gaming computer or console.
π¦Supported platforms
The cloud service works with a Chromecast Ultra device when connected to a TV. Chrome browser is supported on computers, laptops and tablets, including Chrome OS. Among smartphones, Google Pixel 2, Pixel 3, Pixel 3a and Pixel 4 are supported.
In February, support for the following smartphones appeared:
Samsung Galaxy S8
Samsung Galaxy S8 Plus
Samsung Galaxy S8 Active
Samsung Galaxy Note 8
Samsung Galaxy S9
Samsung Galaxy S9 Plus
..../.......
5) in June it was announced that all Android smartphones will be able to work with Stadia. Even those that are not included in the above list. You can install the Stadia application on them, open the "Experiments" tab and click "Play".
6) Since this is a cloud service, all the heavy processing is done by other people's computers remotely. You can work with a smartphone, tablet or even a weak computer, the quality will be equally high. Users of the service will receive the computing power of a custom AMD 2.7 GHz x86 processor, 16 GB of RAM, data transfer rates up to 484 GB / s and a GPU with a capacity of 10.7 teraflops.
This makes Google's platform more powerful than any game console on the market. In addition, Google will be responsible for updates and users will not have to do anything.
Of course, the quality of the games will depend on your internet connection. Playing on Chromecast Ultra, you can get 4K support with HDR and 5.1 surround sound if you have a TV, sound system, and fast enough internet to support it all.
π¦Can I try Stadia for free?
Yes. Google has announced a two-month free trial for Stadia Pro. Any owner of supported devices can play several games on the service for free. They can buy additional games to play and stream. After the trial period ends, you can renew your Stadia Pro subscription for $ 9.99 per month. You can unsubscribe at any time before the end of the trial period.
Your not allowed to copy our tutorials
!@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack wifi with gerix on linux :
#FastTips
1) download or clone https://github.com/kimocoder/gerix-wifi-cracker/archive/master.zip
2) apt-get install qt4-dev-tools
3) Running Gerix Wireless 802.11 Hacking Tool
$ python gerix.py
4) it gui interface appears now click at scan and attack
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack wifi with gerix on linux :
#FastTips
1) download or clone https://github.com/kimocoder/gerix-wifi-cracker/archive/master.zip
2) apt-get install qt4-dev-tools
3) Running Gerix Wireless 802.11 Hacking Tool
$ python gerix.py
4) it gui interface appears now click at scan and attack
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Network security
#FastTips
is essentially the information security on the network. In a broad sense, all relevant technologies and theories related to the confidentiality, integrity, availability, authenticity and controllability of information on the network are the field of network security research. Ensuring the information security of the network system is the goal of network security. Information security includes two aspects: the security of information storage and the security of information transmission. Information storage security refers to the security of information in a static storage state, such as whether it will be used without authorization, etc. The transmission security of information refers to the safety of information in the dynamic transmission process. In order to ensure the security of network information transmission, there are the following issues:
γγ(1) The monitoring of information on the network
γγ(2) The impersonation of the user's identity
γγ(3) The tampering of information on the network
γγ(4) The denial of the information sent
γγ(5) The retransmission of the information
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Network security
#FastTips
is essentially the information security on the network. In a broad sense, all relevant technologies and theories related to the confidentiality, integrity, availability, authenticity and controllability of information on the network are the field of network security research. Ensuring the information security of the network system is the goal of network security. Information security includes two aspects: the security of information storage and the security of information transmission. Information storage security refers to the security of information in a static storage state, such as whether it will be used without authorization, etc. The transmission security of information refers to the safety of information in the dynamic transmission process. In order to ensure the security of network information transmission, there are the following issues:
γγ(1) The monitoring of information on the network
γγ(2) The impersonation of the user's identity
γγ(3) The tampering of information on the network
γγ(4) The denial of the information sent
γγ(5) The retransmission of the information
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Mod your own apk
#fastTips
source code: https://github.com/kaleemullah360/android-APK-Mods
1) Load APK
java -jar apktool.jar if application-name.apk
2) Decode APK
java -jar apktool.jar decode application-name.apk
3) Recompile APK
java -jar apktool.jar b application-name.apk
4) Add signature using APK Signer
java -jar apk-signer-1.8.5.jar certificate.pem key.pk8 application-name.apk
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Mod your own apk
#fastTips
source code: https://github.com/kaleemullah360/android-APK-Mods
1) Load APK
java -jar apktool.jar if application-name.apk
2) Decode APK
java -jar apktool.jar decode application-name.apk
3) Recompile APK
java -jar apktool.jar b application-name.apk
4) Add signature using APK Signer
java -jar apk-signer-1.8.5.jar certificate.pem key.pk8 application-name.apk
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - kaleemullah360/android-APK-Mods: Hack into android applications, some tools and instructions. decode, modify and recompileβ¦
:sparkles: Hack into android applications, some tools and instructions. decode, modify and recompile APK :sparkles: - GitHub - kaleemullah360/android-APK-Mods: Hack into android applications, some ...
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to solve the problem that there is a black border around the Windows 10 monitor that cannot be displayed in full screen?
Some friends reported that in the actual application of their win10 system, the display cannot be displayed in full screen and there is a black border around it! How to solve the problem of a black border around the display in win10 cannot be displayed in full screen? Today, the editor brings you a solution to the black border around the win10 monitor that cannot be displayed in full screen. Interested friends should not miss it.
π¦How to solve the problem that there is a black border around the Windows 10 monitor that cannot be displayed in full screen:
1) Press win+r to enter the run window, enter "regedit" and press Enter.
2) In the registry editor window, locate [HKEY_CURRENT_USER/SOFTWARE/BLIZZARD ENTERTAIMENT/WARCRAFTIII/Video].
3) Open the reshight file (screen height) in the left margin and change the numerical data inside to "768", then open the reswidth file (screen width) and change the numerical data to "1366".
4) In the blank area of ββthe desktop, right-click and select "Display Settings".
5) In the window, select "Advanced Display Settings", then change the resolution to "1366 x 768" and click Apply.
#fASTtIPS
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to solve the problem that there is a black border around the Windows 10 monitor that cannot be displayed in full screen?
Some friends reported that in the actual application of their win10 system, the display cannot be displayed in full screen and there is a black border around it! How to solve the problem of a black border around the display in win10 cannot be displayed in full screen? Today, the editor brings you a solution to the black border around the win10 monitor that cannot be displayed in full screen. Interested friends should not miss it.
π¦How to solve the problem that there is a black border around the Windows 10 monitor that cannot be displayed in full screen:
1) Press win+r to enter the run window, enter "regedit" and press Enter.
2) In the registry editor window, locate [HKEY_CURRENT_USER/SOFTWARE/BLIZZARD ENTERTAIMENT/WARCRAFTIII/Video].
3) Open the reshight file (screen height) in the left margin and change the numerical data inside to "768", then open the reswidth file (screen width) and change the numerical data to "1366".
4) In the blank area of ββthe desktop, right-click and select "Display Settings".
5) In the window, select "Advanced Display Settings", then change the resolution to "1366 x 768" and click Apply.
#fASTtIPS
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
38995760-7b25ec4c-439e-11e8-9430-c33bd9b1f5b4.png
115.3 KB
π¦Gmail bruteforce:
1) git clone https://github.com/Ha3MrX/Gemail-Hack
2) cd Gemail-Hack
3) chmod +x gemailhack.py
4) python gemailhack.py
#fastTips
1) git clone https://github.com/Ha3MrX/Gemail-Hack
2) cd Gemail-Hack
3) chmod +x gemailhack.py
4) python gemailhack.py
#fastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SpeeduP Linux Tips:
> Reduce the default grub load time:
>Manage startup applications:
>Install preload to speed up application load time:
>Choose the best mirror for software updates:
>Use apt-fast instead of apt-get for a speedy update:
>Remove language related ign from apt-get update:
>Reduce overheating by disabling system services
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SpeeduP Linux Tips:
> Reduce the default grub load time:
>Manage startup applications:
>Install preload to speed up application load time:
>Choose the best mirror for software updates:
>Use apt-fast instead of apt-get for a speedy update:
>Remove language related ign from apt-get update:
>Reduce overheating by disabling system services
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦DOM-based or local XSS
Based on DOM or local XSS attacks. Generally, a free wifi is provided, but a gateway that provides free wifi will insert a script into any page you visit or directly return a phishing page, thereby implanting malicious scripts. This kind of direct existence on the page without returning from the server is a local XSS attack.
Example 1:
1. Provide a free wifi.
1. Start a special DNS service, resolve all domain names to our computer, and set the Wifi DHCP-DNS to our computer IP.
2. After the user connected to wifi opens any website, the request will be intercepted by us. We forward to the real server according to the host field in the http header.
3. After receiving the data returned by the server, we can inject the webpage script and return it to the user.
4. When the injected script is executed, the user's browser will preload the common script libraries of major websites in turn.
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦DOM-based or local XSS
Based on DOM or local XSS attacks. Generally, a free wifi is provided, but a gateway that provides free wifi will insert a script into any page you visit or directly return a phishing page, thereby implanting malicious scripts. This kind of direct existence on the page without returning from the server is a local XSS attack.
Example 1:
1. Provide a free wifi.
1. Start a special DNS service, resolve all domain names to our computer, and set the Wifi DHCP-DNS to our computer IP.
2. After the user connected to wifi opens any website, the request will be intercepted by us. We forward to the real server according to the host field in the http header.
3. After receiving the data returned by the server, we can inject the webpage script and return it to the user.
4. When the injected script is executed, the user's browser will preload the common script libraries of major websites in turn.
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to check for unnecessary subscriptions on iPhone?
#FastTips
1) These days, one-time purchases of games, music, books, news, movies, and TV shows on mobile are being replaced by monthly subscriptions. It is enough to subscribe once and the funds will be automatically debited every month. There are free trial periods, to gain access to which you also need to subscribe to the service. After that, you can forget to unsubscribe if you don't want to pay. Or some don't know how to unsubscribe. We will tell you how to avoid such troubles.
2) There are several ways to check for subscriptions on iPhone, whether paid or free. Subscriptions made with your Apple ID account are verified. Services like Apple Arcade, Apple News +, Apple Music, Apple TV +, Apple TV, and third-party services appear in one place.
3) You can access the subscription management page from applications such as Books, Music, iTunes Store. The fastest way to do this is in system settings, App Store and TV apps.
Settings: Apple ID -> Subscriptions
Profile icon (in Today, Games, Apps and Arcade) -> subscriptions on the app Store
4) Settings (left), App Store (center), TV (right)
Once on the subscription page, you will see all subscriptions associated with your Apple ID account, active and expired. To cancel, click under the active ones, then click "Cancel free trial" or "Cancel subscription", then in the window click "Confirm".
5) Keep in mind that these are only Apple ID-related subscriptions. You may have others with other accounts that do not appear on this page. If you suspect the existence of such subscriptions, check the corresponding applications. Examples include subscriptions to GrubHub, DoorDash, Netflix, Hulu.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to check for unnecessary subscriptions on iPhone?
#FastTips
1) These days, one-time purchases of games, music, books, news, movies, and TV shows on mobile are being replaced by monthly subscriptions. It is enough to subscribe once and the funds will be automatically debited every month. There are free trial periods, to gain access to which you also need to subscribe to the service. After that, you can forget to unsubscribe if you don't want to pay. Or some don't know how to unsubscribe. We will tell you how to avoid such troubles.
2) There are several ways to check for subscriptions on iPhone, whether paid or free. Subscriptions made with your Apple ID account are verified. Services like Apple Arcade, Apple News +, Apple Music, Apple TV +, Apple TV, and third-party services appear in one place.
3) You can access the subscription management page from applications such as Books, Music, iTunes Store. The fastest way to do this is in system settings, App Store and TV apps.
Settings: Apple ID -> Subscriptions
Profile icon (in Today, Games, Apps and Arcade) -> subscriptions on the app Store
4) Settings (left), App Store (center), TV (right)
Once on the subscription page, you will see all subscriptions associated with your Apple ID account, active and expired. To cancel, click under the active ones, then click "Cancel free trial" or "Cancel subscription", then in the window click "Confirm".
5) Keep in mind that these are only Apple ID-related subscriptions. You may have others with other accounts that do not appear on this page. If you suspect the existence of such subscriptions, check the corresponding applications. Examples include subscriptions to GrubHub, DoorDash, Netflix, Hulu.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Malware on your phone IS possible ?
Most people doubt that mobile devices can get infected with malware.
It's true?
That's 101% possible, well, maybe not in the standard traditional method, for iPhone and Apple devices.
But, technically, the same process applies.
Let's look at the problem more specifically.
1) Once the malware connects to your phone, it performs several operations.
2) Competing with your phone's resources and destroying many programs.
The classic signs of malware on your phone are:
Apps take longer to load
> Your battery is draining faster than usual
> Apps you haven't downloaded appear as available
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Malware on your phone IS possible ?
Most people doubt that mobile devices can get infected with malware.
It's true?
That's 101% possible, well, maybe not in the standard traditional method, for iPhone and Apple devices.
But, technically, the same process applies.
Let's look at the problem more specifically.
1) Once the malware connects to your phone, it performs several operations.
2) Competing with your phone's resources and destroying many programs.
The classic signs of malware on your phone are:
Apps take longer to load
> Your battery is draining faster than usual
> Apps you haven't downloaded appear as available
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The main ways to distribute your Trojan:
#fastTips
1. Protroyan gamer: Go to the gaming forum, well, or a blog where you can leave comments and glue your Trojan with cheats, as they say the profit is good, because gamers turn off their antivirus.
2. The same thing, but gluing with cracks, again comments on forums, torrent trackers, etc. The coverage is great, maybe as they say.
3. Varez music and clips, here the method is quite simple, a shortcut is made, like music / playlist, etc. for example, it runs it, and instead of it, the Trojan starts, well, of course, music / film, you can also run it to divert your eyes. The main thing is to mask your virus so that no one thinks that this is an executable file that will launch the shortcut.
4. Distribution by mail with the extension .src, you can spam by mail like there: "You received an invoice!"
5. Extensions like doc.exe are used less often, but everything is clear here, this is spam for soap, etc.
6. Another good way, this is a miracle program for hacking VKontakte, etc., there are many victims in general.
7. Phishing sites, such as update adob, chrome, etc.
8. Well, the last way, trample the hacker, go for a hack. board and put a cryptor, a stealer, etc. there. with a fucker, you can both in the build and in the builder. In the latter case, someone else will do the job for you. UPD This article was created for informational purposes only. If we missed something, add it in the comments.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The main ways to distribute your Trojan:
#fastTips
1. Protroyan gamer: Go to the gaming forum, well, or a blog where you can leave comments and glue your Trojan with cheats, as they say the profit is good, because gamers turn off their antivirus.
2. The same thing, but gluing with cracks, again comments on forums, torrent trackers, etc. The coverage is great, maybe as they say.
3. Varez music and clips, here the method is quite simple, a shortcut is made, like music / playlist, etc. for example, it runs it, and instead of it, the Trojan starts, well, of course, music / film, you can also run it to divert your eyes. The main thing is to mask your virus so that no one thinks that this is an executable file that will launch the shortcut.
4. Distribution by mail with the extension .src, you can spam by mail like there: "You received an invoice!"
5. Extensions like doc.exe are used less often, but everything is clear here, this is spam for soap, etc.
6. Another good way, this is a miracle program for hacking VKontakte, etc., there are many victims in general.
7. Phishing sites, such as update adob, chrome, etc.
8. Well, the last way, trample the hacker, go for a hack. board and put a cryptor, a stealer, etc. there. with a fucker, you can both in the build and in the builder. In the latter case, someone else will do the job for you. UPD This article was created for informational purposes only. If we missed something, add it in the comments.
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Configuring network implants based on cheap SBC single board computers:
#fASTtIPS
1) Now there is a possibility of creating various hacking devices based on single-board computers that are connected to target routers. This is done without the knowledge of system administrators, which subsequently allows an attacker to conduct remote network attacks from anywhere in the world.
2) Network implants are miniature Raspberry Pi devices that can be discreetly connected to routers, hubs, servers, and other IT equipment. Similar to the Hak5's LAN Turtle gadget, it requires a physical connection of the interfaces to interconnect with the global and local network in which other computers operate. This eliminates the need to enable port forwarding, as well as change firewall security settings, since this equipment automatically synchronizes with the Internet via remote access (RAT), allowing a hacker to manage entire domains as an administrator.
3) Typically a $ 200 off-the-shelf Lan Turtle device is used for these purposes, but we'll show you how you can get the same functionality using a cheap single board Raspberry Pi PC.
4) The SBC discussed in this article is Orange Pi Zero, although there are many analogues. The device has a small computing power with 512 Mb of RAM and a Cortex-A7 processor, but this will be enough to carry out middleman attacks (MITM), Nmap scans and brute-force passwords while creating a Wi-Fi access point , managed over a remote connection in the anonymous Tor network.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Configuring network implants based on cheap SBC single board computers:
#fASTtIPS
1) Now there is a possibility of creating various hacking devices based on single-board computers that are connected to target routers. This is done without the knowledge of system administrators, which subsequently allows an attacker to conduct remote network attacks from anywhere in the world.
2) Network implants are miniature Raspberry Pi devices that can be discreetly connected to routers, hubs, servers, and other IT equipment. Similar to the Hak5's LAN Turtle gadget, it requires a physical connection of the interfaces to interconnect with the global and local network in which other computers operate. This eliminates the need to enable port forwarding, as well as change firewall security settings, since this equipment automatically synchronizes with the Internet via remote access (RAT), allowing a hacker to manage entire domains as an administrator.
3) Typically a $ 200 off-the-shelf Lan Turtle device is used for these purposes, but we'll show you how you can get the same functionality using a cheap single board Raspberry Pi PC.
4) The SBC discussed in this article is Orange Pi Zero, although there are many analogues. The device has a small computing power with 512 Mb of RAM and a Cortex-A7 processor, but this will be enough to carry out middleman attacks (MITM), Nmap scans and brute-force passwords while creating a Wi-Fi access point , managed over a remote connection in the anonymous Tor network.
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How mount operation relates to partitioning and formatting :
Mounting is one of the types of actions that you can perform on a disk (block device). Referring to the device by its name / dev / * it is possible:
1) create new sections
2) delete existing partitions
3) format partitions or entire disk
4) perform low-level settings at the device level (setting the read
5) only flag at the disk level, reset the write cache on the disk, control Advanced Power Management, etc.), as well as read the values of these settings and disk properties
6) mount disk partitions (or the entire disk if not partitioned)
#fASTtIPS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How mount operation relates to partitioning and formatting :
Mounting is one of the types of actions that you can perform on a disk (block device). Referring to the device by its name / dev / * it is possible:
1) create new sections
2) delete existing partitions
3) format partitions or entire disk
4) perform low-level settings at the device level (setting the read
5) only flag at the disk level, reset the write cache on the disk, control Advanced Power Management, etc.), as well as read the values of these settings and disk properties
6) mount disk partitions (or the entire disk if not partitioned)
#fASTtIPS
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ How many types of shells are there in Linux?
They are the five Shells in Linux:
1) C Shell (csh): Similar to C grammar, and provides spell checking and job control.
Korn Shell (ksh): is a high-level programming language Shell.
2) Z Shell (Zsh): It provides some unique properties, such as observing login/logout monitoring, file name generation, startup file, and end comment.
3) Bourne Again Shell (bash): This is the default setting of the Linux distribution.
4) Friendly interactive Shell (Fish): It provides web-based configuration, automatic suggestions, etc.
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ How many types of shells are there in Linux?
They are the five Shells in Linux:
1) C Shell (csh): Similar to C grammar, and provides spell checking and job control.
Korn Shell (ksh): is a high-level programming language Shell.
2) Z Shell (Zsh): It provides some unique properties, such as observing login/logout monitoring, file name generation, startup file, and end comment.
3) Bourne Again Shell (bash): This is the default setting of the Linux distribution.
4) Friendly interactive Shell (Fish): It provides web-based configuration, automatic suggestions, etc.
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
What are the basic components of Linux?
1) Kernel: It is the core component of Linux, which acts as an interface between software and hardware.
2) Shell: It acts as an interface between the user and the kernel.
3) GUI: It stands for Graphical User Interface, which is another way for users to interact with the system. But this is different from images, buttons, and text boxes for interaction.
4) System Utilities: These are software functions that allow users to manage the computer.
5) Application: A set of functions designed to perform a set of tasks.
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
What are the basic components of Linux?
1) Kernel: It is the core component of Linux, which acts as an interface between software and hardware.
2) Shell: It acts as an interface between the user and the kernel.
3) GUI: It stands for Graphical User Interface, which is another way for users to interact with the system. But this is different from images, buttons, and text boxes for interaction.
4) System Utilities: These are software functions that allow users to manage the computer.
5) Application: A set of functions designed to perform a set of tasks.
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Manual Converting Video and Audio, using 'avconv'
#FastTips
# ffmpeg
#1 print supported codecs and formats
avconv -formats
avconv -codecs
#2 print the media file's information
avconv -i <media.file>
#3 converting videos
e.g. convert avi to mp4(x264):
avconv -i <media.file> -vcodec libx264 -acodec ac3 <output.file>
where 'vcodec' specifies the codec of video stream, 'acodec' specifies audio codec.
#4 convertion between video and image
avconv -i foo.avi -r 1 -s WxH -f image2 foo-%05d.png
-r 1 : 1 frame per sec.
WxH : e.g. 1920x1080
# resize a picture
avconv -i fox.jpg -s 64x64 fox_resized.jpg
ref: man avconv section << Video and Audio file format conversion >>
http://ffmpeg.org/ffmpeg.html#Video-and-Audio-file-format-conversion
avconv(1)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Manual Converting Video and Audio, using 'avconv'
#FastTips
# ffmpeg
#1 print supported codecs and formats
avconv -formats
avconv -codecs
#2 print the media file's information
avconv -i <media.file>
#3 converting videos
e.g. convert avi to mp4(x264):
avconv -i <media.file> -vcodec libx264 -acodec ac3 <output.file>
where 'vcodec' specifies the codec of video stream, 'acodec' specifies audio codec.
#4 convertion between video and image
avconv -i foo.avi -r 1 -s WxH -f image2 foo-%05d.png
-r 1 : 1 frame per sec.
WxH : e.g. 1920x1080
# resize a picture
avconv -i fox.jpg -s 64x64 fox_resized.jpg
ref: man avconv section << Video and Audio file format conversion >>
http://ffmpeg.org/ffmpeg.html#Video-and-Audio-file-format-conversion
avconv(1)
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦tRACK Online traces Free:
Libnids is an implementation of an E-component of Network Intrusion Detection System. It emulates the IP stack of Linux 2.0.x. Libnids offers IP defragmentation, TCP stream assembly and TCP port scan detection.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ :
http://libnids.sourceforge.net/
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦tRACK Online traces Free:
Libnids is an implementation of an E-component of Network Intrusion Detection System. It emulates the IP stack of Linux 2.0.x. Libnids offers IP defragmentation, TCP stream assembly and TCP port scan detection.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ :
http://libnids.sourceforge.net/
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β