β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The attack
according to known vulnerabilities attack. The intercepted user account and password can be deciphered through the guessing program; the intercepted system password file can be deciphered by the deciphering program; electronic lures (such as the installation of a Trojan horse) can be implemented by using the weak links and security vulnerabilities of the network and the system itself, etc. . Hackers either modify web pages to perform pranks, or destroy system programs or put viruses to paralyze the system, or steal political, military, or commercial secrets; or perform e-mail harassment or transfer fund accounts, steal money, etc.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The attack
according to known vulnerabilities attack. The intercepted user account and password can be deciphered through the guessing program; the intercepted system password file can be deciphered by the deciphering program; electronic lures (such as the installation of a Trojan horse) can be implemented by using the weak links and security vulnerabilities of the network and the system itself, etc. . Hackers either modify web pages to perform pranks, or destroy system programs or put viruses to paralyze the system, or steal political, military, or commercial secrets; or perform e-mail harassment or transfer fund accounts, steal money, etc.
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
The process of hackers cracking the password is roughly as follows:
First, the words in a large number of word lists are transformed with certain rules, and then encrypted with an encryption algorithm. See if it matches the encrypted password in the /etc/passwd file: If so, the password is likely to be cracked. The rules for word change generally include: alternate use of upper and lower case; spell the words forward and backward and join them together (such as cannac); add the number 1 at the beginning and/or end of each word, and so on. At the same time, there are many word lists available on the Internet. If the user chooses an inappropriate password, and the password falls into the dictionary, hackers obtain the /etc/passwd file, which is basically equivalent to completing the password cracking task.
1οΈβ£ Trojan horse (trojan horse) The
so-called Trojan program refers to any program that provides hidden functions that users do not want. It can appear in any form, and it may be any program introduced into the system by the user or client. Trojan programs provide or hide some functions, these functions can leak some private information of the system, or control the system.
2οΈβ£ Trojan programs are harmless and useful programs on the surface, but in reality they are potentially dangerous. For example, a Trojan program is found in Wuarchive FTP daemon (ftpd) version 2.2. The Trojan program allows any user (local and remote) to log in to UNIX as root. Such a Trojan program can cause the entire system to be hacked, because it is difficult to find in the first place. It may have existed for several weeks or even months before it was discovered. Secondly, during this period of time, an intruder with root privileges can modify the system according to his needs. In this way, even if the Trojan program is discovered, it leaves a loophole in the system that the system administrator may not notice.
3οΈβ£ Network sniffer (Sniffer)
Sniffer is used to intercept information transmitted on the network, used in Ethernet or other shared transmission medium network. Placing the Sniffer can make the network interface in a broadcast state, thereby intercepting the information transmitted on the network. Sniffer can be used to intercept passwords, secret and proprietary information to attack adjacent networks. The threat of Sniffer is that the attacked party cannot find it. Sniffer is a passive program that does not leave any traces on the network.
Β» Commonly used Sniffers are: Gobbler, ETHLOAD, Netman, Esniff.c, Linux Sniffer.c, NitWitc, etc.
5οΈβ£Undermine the system
common break device the mail bombs and viruses. Among them, mail bombs are less harmful, while viruses are more harmful.
6οΈβ£Mail bomb refers to the continuous transmission of useless information to the attacker, filling the other party's mail box, making it impossible to receive useful information. In addition, mail bombs can also cause denial of service on the mail server. Commonly used e-mail bombs are: UpYours, KaBoom, Avalanche, Unabomber, eXtreme Mail, Homicide, Bombtrack, FlameThrower, etc.
7οΈβ£ Virus programs are significantly different from Trojan programs. Trojan programs are static programs that exist in another harmless, trusted program. The Trojan program will perform some unauthorized functions, such as passing the password file to the attacker or providing him with a back door. The attacker can enter the host through this backdoor and gain the power to control the system.
8οΈβ£ The virus program has the function of self-replication, and its purpose is to infect the computer. Virus programs are awake at all times, monitoring system activities. Once the activity of the system meets certain conditions, the virus becomes active and copies itself into the program of that activity.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
The process of hackers cracking the password is roughly as follows:
First, the words in a large number of word lists are transformed with certain rules, and then encrypted with an encryption algorithm. See if it matches the encrypted password in the /etc/passwd file: If so, the password is likely to be cracked. The rules for word change generally include: alternate use of upper and lower case; spell the words forward and backward and join them together (such as cannac); add the number 1 at the beginning and/or end of each word, and so on. At the same time, there are many word lists available on the Internet. If the user chooses an inappropriate password, and the password falls into the dictionary, hackers obtain the /etc/passwd file, which is basically equivalent to completing the password cracking task.
1οΈβ£ Trojan horse (trojan horse) The
so-called Trojan program refers to any program that provides hidden functions that users do not want. It can appear in any form, and it may be any program introduced into the system by the user or client. Trojan programs provide or hide some functions, these functions can leak some private information of the system, or control the system.
2οΈβ£ Trojan programs are harmless and useful programs on the surface, but in reality they are potentially dangerous. For example, a Trojan program is found in Wuarchive FTP daemon (ftpd) version 2.2. The Trojan program allows any user (local and remote) to log in to UNIX as root. Such a Trojan program can cause the entire system to be hacked, because it is difficult to find in the first place. It may have existed for several weeks or even months before it was discovered. Secondly, during this period of time, an intruder with root privileges can modify the system according to his needs. In this way, even if the Trojan program is discovered, it leaves a loophole in the system that the system administrator may not notice.
3οΈβ£ Network sniffer (Sniffer)
Sniffer is used to intercept information transmitted on the network, used in Ethernet or other shared transmission medium network. Placing the Sniffer can make the network interface in a broadcast state, thereby intercepting the information transmitted on the network. Sniffer can be used to intercept passwords, secret and proprietary information to attack adjacent networks. The threat of Sniffer is that the attacked party cannot find it. Sniffer is a passive program that does not leave any traces on the network.
Β» Commonly used Sniffers are: Gobbler, ETHLOAD, Netman, Esniff.c, Linux Sniffer.c, NitWitc, etc.
5οΈβ£Undermine the system
common break device the mail bombs and viruses. Among them, mail bombs are less harmful, while viruses are more harmful.
6οΈβ£Mail bomb refers to the continuous transmission of useless information to the attacker, filling the other party's mail box, making it impossible to receive useful information. In addition, mail bombs can also cause denial of service on the mail server. Commonly used e-mail bombs are: UpYours, KaBoom, Avalanche, Unabomber, eXtreme Mail, Homicide, Bombtrack, FlameThrower, etc.
7οΈβ£ Virus programs are significantly different from Trojan programs. Trojan programs are static programs that exist in another harmless, trusted program. The Trojan program will perform some unauthorized functions, such as passing the password file to the attacker or providing him with a back door. The attacker can enter the host through this backdoor and gain the power to control the system.
8οΈβ£ The virus program has the function of self-replication, and its purpose is to infect the computer. Virus programs are awake at all times, monitoring system activities. Once the activity of the system meets certain conditions, the virus becomes active and copies itself into the program of that activity.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Common tools introduced
1οΈβ£scanners
in the field of Internet security, the scanner is best known for cracking tools. The so-called scanner is actually a program that automatically detects the security weaknesses of the remote or local host. The scanner selects TCP/IP ports and services, and records the answers of the target machine to obtain information about the target machine. By understanding and analyzing this information, it is possible to discover the key factors that undermine the security of the target machine. There are many commonly used scanners, some of which can be obtained for free on the Internet. Here is a brief introduction.
2οΈβ£ NSS (Network Security Scanner): It is written in Perl and can perform regular checks such as Sendmail, anonymous FTP, NFS export, TFTP, Hosts.equiv, Xhost, etc.
3οΈβ£Strobe (super optimized TCP port detection program): is a TCP port scanner that can record all open ports of the specified machine, quickly identify what services are running on the specified machine, and prompt what services can be attacked.
4οΈβ£SATAN (Network Analysis Tool for Security Administrators): Used to scan remote hosts and find vulnerabilities. Including: FTPD vulnerability and writable FTP directory, NFS vulnerability, NIS vulnerability, RSH vulnerability, Sendmail, X server vulnerability, etc.
5οΈβ£ Jakal: It is a secret scanner. It starts but does not complete the SYN/ACK process with the target host. Therefore, it can scan an area without leaving any traces, and can avoid the detection and tracking of the port scanning detector.
6οΈβ£ IdengTCPscan: is a more specialized scanner that can identify the user of a specified TCP port process, that is, it can measure the UID of the process;
7οΈβ£CONNECT: used to scan the TFTP server subnet.
8οΈβ£ FSPScan: used to scan FSP server.
9οΈβ£ XSCAN: Scan subnets or hosts with X server vulnerabilities.
π SAFESuite: is a fast, advanced and comprehensive UNIX network security scanner. Various attacks can be performed on the designated network to detect specific security vulnerabilities in the network environment, including: Sendmail, TFP, NNTP, Telnet, RPC, NFS, etc.
1οΈβ£1οΈβ£ Scanners are constantly evolving and changing. Whenever a new vulnerability is discovered, the function of checking the vulnerability will be added to the existing scanner. Scanner is not only a tool used by hackers for network attacks, but also an important tool for maintaining network security. System administrators must learn to use scanners.
1οΈβ£2οΈβ£ Password intrusion
The so-called password intrusion refers to cracking passwords or shielding password protection. But in fact, the real encrypted password is difficult to reverse crack. The technology used by hackers' commonly used password intrusion tools is simulation comparison, using the same method as the original password program, through comparative analysis, and using different encrypted passwords to match the original password.
π¦Most servers on the Internet run UNIX or UNIX-like operating systems. On the UNIX platform, the user login ID and password are stored in etc/passwd. UNIX is based on the data encryption standard DES, and uses ID as a key to encrypt passwords. The encryption algorithm Crypt(3) is public. Although the encryption algorithms are separated, there is currently no method that can reversely crack the encrypted information.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Common tools introduced
1οΈβ£scanners
in the field of Internet security, the scanner is best known for cracking tools. The so-called scanner is actually a program that automatically detects the security weaknesses of the remote or local host. The scanner selects TCP/IP ports and services, and records the answers of the target machine to obtain information about the target machine. By understanding and analyzing this information, it is possible to discover the key factors that undermine the security of the target machine. There are many commonly used scanners, some of which can be obtained for free on the Internet. Here is a brief introduction.
2οΈβ£ NSS (Network Security Scanner): It is written in Perl and can perform regular checks such as Sendmail, anonymous FTP, NFS export, TFTP, Hosts.equiv, Xhost, etc.
3οΈβ£Strobe (super optimized TCP port detection program): is a TCP port scanner that can record all open ports of the specified machine, quickly identify what services are running on the specified machine, and prompt what services can be attacked.
4οΈβ£SATAN (Network Analysis Tool for Security Administrators): Used to scan remote hosts and find vulnerabilities. Including: FTPD vulnerability and writable FTP directory, NFS vulnerability, NIS vulnerability, RSH vulnerability, Sendmail, X server vulnerability, etc.
5οΈβ£ Jakal: It is a secret scanner. It starts but does not complete the SYN/ACK process with the target host. Therefore, it can scan an area without leaving any traces, and can avoid the detection and tracking of the port scanning detector.
6οΈβ£ IdengTCPscan: is a more specialized scanner that can identify the user of a specified TCP port process, that is, it can measure the UID of the process;
7οΈβ£CONNECT: used to scan the TFTP server subnet.
8οΈβ£ FSPScan: used to scan FSP server.
9οΈβ£ XSCAN: Scan subnets or hosts with X server vulnerabilities.
π SAFESuite: is a fast, advanced and comprehensive UNIX network security scanner. Various attacks can be performed on the designated network to detect specific security vulnerabilities in the network environment, including: Sendmail, TFP, NNTP, Telnet, RPC, NFS, etc.
1οΈβ£1οΈβ£ Scanners are constantly evolving and changing. Whenever a new vulnerability is discovered, the function of checking the vulnerability will be added to the existing scanner. Scanner is not only a tool used by hackers for network attacks, but also an important tool for maintaining network security. System administrators must learn to use scanners.
1οΈβ£2οΈβ£ Password intrusion
The so-called password intrusion refers to cracking passwords or shielding password protection. But in fact, the real encrypted password is difficult to reverse crack. The technology used by hackers' commonly used password intrusion tools is simulation comparison, using the same method as the original password program, through comparative analysis, and using different encrypted passwords to match the original password.
π¦Most servers on the Internet run UNIX or UNIX-like operating systems. On the UNIX platform, the user login ID and password are stored in etc/passwd. UNIX is based on the data encryption standard DES, and uses ID as a key to encrypt passwords. The encryption algorithm Crypt(3) is public. Although the encryption algorithms are separated, there is currently no method that can reversely crack the encrypted information.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦ Bitcoin tutorials :
1) TUTORIALS PACK 1
https://mega.nz/folder/AUAUzQja#bB4eIcEY0YCpZIZSWCcmBA
2) TUTORIAL PACK 2 :
https://mega.nz/folder/cVJyhaxb#f9GuPuOoMjOJJ_DK0h0IAQ
3) TUTORIALS PART 3:
https://mega.nz/folder/cdQUnCyJ#YlOa5VnX4T9p7mCyKKYjWg
1) TUTORIALS PACK 1
https://mega.nz/folder/AUAUzQja#bB4eIcEY0YCpZIZSWCcmBA
2) TUTORIAL PACK 2 :
https://mega.nz/folder/cVJyhaxb#f9GuPuOoMjOJJ_DK0h0IAQ
3) TUTORIALS PART 3:
https://mega.nz/folder/cdQUnCyJ#YlOa5VnX4T9p7mCyKKYjWg
mega.nz
50.53 MB folder on MEGA
4 files
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST SITES FOR DOWNLOAD CRACKED APPLICATIONS FOR ANDROID :
https://blackmart.xyz/apk/
https://www.revdl.com/category/apps/
https://rexdl.com/
https://apkpure.com/
https://apk4free.net/
https://ihackedit.com/
https://acmarket.net/
https://apkmb.com/
https://getapk.ooo/getapk-market-download/
THERE IS MUCH MORE SITES ON WIKI BUT THOSE MOST POPULAR WEBSITES
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST SITES FOR DOWNLOAD CRACKED APPLICATIONS FOR ANDROID :
https://blackmart.xyz/apk/
https://www.revdl.com/category/apps/
https://rexdl.com/
https://apkpure.com/
https://apk4free.net/
https://ihackedit.com/
https://acmarket.net/
https://apkmb.com/
https://getapk.ooo/getapk-market-download/
THERE IS MUCH MORE SITES ON WIKI BUT THOSE MOST POPULAR WEBSITES
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Magento 2.3.1_ Unauthenticated Stored XSS to RCE.pdf
499.7 KB
In the following they analyze two distinct security vulnerabilities that can be chained. Due to the severity of these issues, certain exploit details are omitted on purpose.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACKING Using BeEF THE -PARROT-KALI DEFAULT TOOL: (ALL TIPS)
1) This walkthrough will demonstrate how to use BeEF in your local network using the localhost.
2) For the connections to be made outside the network, we will need to open ports and forward them to the users waiting to connect. In this article, we will stick to our home network. We will discuss port forwarding in future articles.
π¦Hooking a browser :
1) To get to the core of what BeEF is about, first, you will need to understand what a BeEF hook is. It is a JavaScript file, used to latch on to a targetβs browser to exploit it while acting as a C&C between it and the attacker. This is what is meant by a βhookβ in the context of using BeEF. Once a web browser is hooked by BeEF, you can proceed to inject further payloads and begin with post-exploitation.
2) To find your local IP address, you open a new terminal and enter the following:
$ sudo ifconfig
Follow the steps below to perform the attack:
3) To target a web browser, you will first need to identify a webpage that the victim to-be likes to visit often, and then attach a BeEF hook to it.
Deliver a javascript payload, preferably by including the javascript hook into the web pageβs header. The target browser will become hooked once they visit this site.
If you have been able to follow these steps without any problems, you should be able to see the hooked IP address and OS platform in the BeEF GUI. You can find out more about the compromised system by clicking on the hooked browser listed in the window.
4) Also, there are several generic webpage templates they have made available for your use.
http://localhost:3000/demos/butcher/index.html
5) You can glean all sorts of information from here, such as the plugins and extensions that the browser is using, and various information about the hardware and software specs of the target.
6)The BeEF framework goes so far as to create complete logs of mouse movements, double-clicks, and other actions performed by the victim.
7) Here is a list of available modules that can be used to breach a designated system. These modules include keyloggers and spyware, including the ones that use the webcams and microphones of the target browser.
8) Note that certain commands have a colored icon. These icons all have different connotations that you can find out by taking the βgetting startedβ introductory tour, which introduces various aspects of the BeEF interface. Also, notice how each module has a traffic light icon associated with it. These traffic symbols are used to indicate any of the following:
> The command module works against the target and should be invisible to the user
> The command module works against the target but may be visible to the user
> The command module has yet to be verified against this target
> The command module does not work against this target
Linux Forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACKING Using BeEF THE -PARROT-KALI DEFAULT TOOL: (ALL TIPS)
1) This walkthrough will demonstrate how to use BeEF in your local network using the localhost.
2) For the connections to be made outside the network, we will need to open ports and forward them to the users waiting to connect. In this article, we will stick to our home network. We will discuss port forwarding in future articles.
π¦Hooking a browser :
1) To get to the core of what BeEF is about, first, you will need to understand what a BeEF hook is. It is a JavaScript file, used to latch on to a targetβs browser to exploit it while acting as a C&C between it and the attacker. This is what is meant by a βhookβ in the context of using BeEF. Once a web browser is hooked by BeEF, you can proceed to inject further payloads and begin with post-exploitation.
2) To find your local IP address, you open a new terminal and enter the following:
$ sudo ifconfig
Follow the steps below to perform the attack:
3) To target a web browser, you will first need to identify a webpage that the victim to-be likes to visit often, and then attach a BeEF hook to it.
Deliver a javascript payload, preferably by including the javascript hook into the web pageβs header. The target browser will become hooked once they visit this site.
If you have been able to follow these steps without any problems, you should be able to see the hooked IP address and OS platform in the BeEF GUI. You can find out more about the compromised system by clicking on the hooked browser listed in the window.
4) Also, there are several generic webpage templates they have made available for your use.
http://localhost:3000/demos/butcher/index.html
5) You can glean all sorts of information from here, such as the plugins and extensions that the browser is using, and various information about the hardware and software specs of the target.
6)The BeEF framework goes so far as to create complete logs of mouse movements, double-clicks, and other actions performed by the victim.
7) Here is a list of available modules that can be used to breach a designated system. These modules include keyloggers and spyware, including the ones that use the webcams and microphones of the target browser.
8) Note that certain commands have a colored icon. These icons all have different connotations that you can find out by taking the βgetting startedβ introductory tour, which introduces various aspects of the BeEF interface. Also, notice how each module has a traffic light icon associated with it. These traffic symbols are used to indicate any of the following:
> The command module works against the target and should be invisible to the user
> The command module works against the target but may be visible to the user
> The command module has yet to be verified against this target
> The command module does not work against this target
Linux Forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A few things to be a programmer :
1) The first and most important point is that you must love the work of writing code and be interested in writing code. You have to be interested in doing everything. If you lose your interest, you can't do anything. You have to think that the code you wrote becomes software and countless users use your software. At this time, how much sense of accomplishment will you feel? If there are still lively discussions about your software online, wouldn't you be happier than taking an LCD monitor for free?
2) You must keep learning new knowledge. Don't be satisfied with the status quo (the knowledge you have now). Don't think that you are complacent when you learn C. Even C, there are many things you don't know about, let alone C++ Up. But donβt learn this one. When you see a new language come out, learn that one. You wonβt be able to learn this one.
3) If you want to learn, you must learn quickly. If you look for one, learn quickly. I always ask boringly on the Internet: What should I learn? Which is better, JAVA or C#? Does it make sense? Since you want to learn, you have to think about what kind of program you want to write, and then look for a language and start learning.
4) You must read other people's code. Reading other people's code is also the work you must do as a programmer, because only in this way will you see the gap between you and others, and discover: Oh! The original program can be written like this!
5) You must be humble. If you are confident about the code you write and need to show off, you must not write it in a NB manner publicly. You can write: Who can help me see this code? After all, there are so many masters! In case you are NB, if a master finds a piece of your smelly code, you will start to laugh at you. At this time, you will be sadder than death.
6) Sleep must be adequate, otherwise no code can be written.
7) You must be dedicated to writing code. If you want to write, you must write well. You must think about the code everywhere. Don't go to the VIDEO half of your work. Even if you go out with GF, you must think about the code, otherwise you I will not feel strange and bored before returning to COMPUTER.
8) You must make more friends with NB who write code, so that when you are confused, you can discuss the issue with them. When they have problems, you can also help them. In the process of helping, you are not Have you learned a lot?
9) You must drink Coke, even in winter, because Coke is the best refreshing stuff.
10) You must experiment with different compilers. You can use only one compiler to write the code, but you cannot use only one compiler to determine whether this code is wrong or not, because after all, the compiler that fully supports ISO C++ is now There is no one, but some support is good, some is poor. After several different compilers are tested, you can know whether this code is wrong.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A few things to be a programmer :
1) The first and most important point is that you must love the work of writing code and be interested in writing code. You have to be interested in doing everything. If you lose your interest, you can't do anything. You have to think that the code you wrote becomes software and countless users use your software. At this time, how much sense of accomplishment will you feel? If there are still lively discussions about your software online, wouldn't you be happier than taking an LCD monitor for free?
2) You must keep learning new knowledge. Don't be satisfied with the status quo (the knowledge you have now). Don't think that you are complacent when you learn C. Even C, there are many things you don't know about, let alone C++ Up. But donβt learn this one. When you see a new language come out, learn that one. You wonβt be able to learn this one.
3) If you want to learn, you must learn quickly. If you look for one, learn quickly. I always ask boringly on the Internet: What should I learn? Which is better, JAVA or C#? Does it make sense? Since you want to learn, you have to think about what kind of program you want to write, and then look for a language and start learning.
4) You must read other people's code. Reading other people's code is also the work you must do as a programmer, because only in this way will you see the gap between you and others, and discover: Oh! The original program can be written like this!
5) You must be humble. If you are confident about the code you write and need to show off, you must not write it in a NB manner publicly. You can write: Who can help me see this code? After all, there are so many masters! In case you are NB, if a master finds a piece of your smelly code, you will start to laugh at you. At this time, you will be sadder than death.
6) Sleep must be adequate, otherwise no code can be written.
7) You must be dedicated to writing code. If you want to write, you must write well. You must think about the code everywhere. Don't go to the VIDEO half of your work. Even if you go out with GF, you must think about the code, otherwise you I will not feel strange and bored before returning to COMPUTER.
8) You must make more friends with NB who write code, so that when you are confused, you can discuss the issue with them. When they have problems, you can also help them. In the process of helping, you are not Have you learned a lot?
9) You must drink Coke, even in winter, because Coke is the best refreshing stuff.
10) You must experiment with different compilers. You can use only one compiler to write the code, but you cannot use only one compiler to determine whether this code is wrong or not, because after all, the compiler that fully supports ISO C++ is now There is no one, but some support is good, some is poor. After several different compilers are tested, you can know whether this code is wrong.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
New speed improuvement in search engine. Google uses neural network to create a new image compression algorithm #Updates
Forwarded from UNDERCODE NEWS
Founder of Epic Games: Appleβs rejection of a product is a death sentence
#international
#international
Forwarded from Backup Legal Mega
π¦15 CARDING NEW VIDEOS :
βUse For Learnβ
https://mega.nz/folder/8Jg3UaiC#iHAu3ljJnTzKRmboRG6njA
βUse For Learnβ
https://mega.nz/folder/8Jg3UaiC#iHAu3ljJnTzKRmboRG6njA
mega.nz
File folder on MEGA
Forwarded from Backup Legal Mega
π¦BONUS via carding METHODE:
https://mega.nz/file/Bd4zxSQA#fWWBivoBcwgyOq_2McD0WNv6eB2tQJdlYPM6Jiva5rM
(not checked )
https://mega.nz/file/Bd4zxSQA#fWWBivoBcwgyOq_2McD0WNv6eB2tQJdlYPM6Jiva5rM
(not checked )
mega.nz
File on MEGA
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Cracking tool:
F E A T U R E S :
auto detect hash
supports windows and linux platforms
fast decrypt
list of supported hashes:
- md4
- md5
- sha1
- sha224
- sha256
- sha384
- sha512
- ripemd160
- whirlpool
- mysql 3.2.3
- mysql 4.1
- mssql2000
- mssql2005
- nthash
- lmhash
- ntlm hash
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) $ apt update upgrade
2) $ apt install python2 git
3) $ git clone https://github.com/ciku370/hasher
4) $ cd hasher
5) $ python2 hash.py
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Cracking tool:
F E A T U R E S :
auto detect hash
supports windows and linux platforms
fast decrypt
list of supported hashes:
- md4
- md5
- sha1
- sha224
- sha256
- sha384
- sha512
- ripemd160
- whirlpool
- mysql 3.2.3
- mysql 4.1
- mssql2000
- mssql2005
- nthash
- lmhash
- ntlm hash
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) $ apt update upgrade
2) $ apt install python2 git
3) $ git clone https://github.com/ciku370/hasher
4) $ cd hasher
5) $ python2 hash.py
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE COMMUNITY
How to Get and Set Up a Free Windows VM for Malware Analysis.pdf
1.1 MB
Step 1: Install Virtualization Software
Step 2: Get a Windows Virtual Machine
Step 3: Update the VM and Install Malware Analysis Tools Step
4: Isolate the Analysis VM and Disable Windows Defender AV
Step 5: Analyze Some Malware
Step 2: Get a Windows Virtual Machine
Step 3: Update the VM and Install Malware Analysis Tools Step
4: Isolate the Analysis VM and Disable Windows Defender AV
Step 5: Analyze Some Malware
Forwarded from Backup Legal Mega
mega.nz
35.22 GB folder on MEGA
7931 files and 891 subfolders
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Automatically check for illegal root accounts in the password file :
It is an important task of the system administrator to regularly check whether an account with a user ID equal to 0 appears in the password file! However, it must be impractical to check at any time! Let the system do the work!
1) Edit /usr/local/bin/checkhacker and write:
#! /bin/bash
for id in awk FS=":"{if($3==0 && $1 !="root"))\ print $1} /etc/passwd
do
mail -s "Hacker Alert" root@localhost <<eof
* ALERT! Login ID echo $ {id} has uid 0
* Date"+Detacted On:%D Time:%r"
******************** **************
EOF
done
2) chmod +x checkhacker, make it executable:
3) Add in /etc/crontab:
15 **** /usr/local/bin/ checkhacker /dev/null 2> &1 In
this way, the system will automatically check once every 15 minutes, and will send MAIL to the system administrator when there is a situation!
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Automatically check for illegal root accounts in the password file :
It is an important task of the system administrator to regularly check whether an account with a user ID equal to 0 appears in the password file! However, it must be impractical to check at any time! Let the system do the work!
1) Edit /usr/local/bin/checkhacker and write:
#! /bin/bash
for id in awk FS=":"{if($3==0 && $1 !="root"))\ print $1} /etc/passwd
do
mail -s "Hacker Alert" root@localhost <<eof
* ALERT! Login ID echo $ {id} has uid 0
* Date"+Detacted On:%D Time:%r"
******************** **************
EOF
done
2) chmod +x checkhacker, make it executable:
3) Add in /etc/crontab:
15 **** /usr/local/bin/ checkhacker /dev/null 2> &1 In
this way, the system will automatically check once every 15 minutes, and will send MAIL to the system administrator when there is a situation!
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦ANOTHER CARDING COURSE:
https://mega.nz/file/1FF3ECYD#bEq1NEH274Xxf5u_S2tuIxvO9YUWSJjsm6HVmbL0Yss
https://mega.nz/file/1FF3ECYD#bEq1NEH274Xxf5u_S2tuIxvO9YUWSJjsm6HVmbL0Yss
mega.nz
File on MEGA