โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCrack-Sniffer-Keylogger-webcam modules :
# Common crack module
Auxiliary/scanner/mssql/mssqllogin
Auxiliary/scanner/ftp/ftplogin
Auxiliary/scanner/ssh/sshlogin
Auxiliary/scanner/telnet/telnetlogin
Auxiliary/scanner/smb/smblogin
Auxiliary/scanner/mssql/mssqllogin
Auxiliary/scanner/mysql/mysqllogin
Auxiliary/scanner/oracle/oraclelogin
Auxiliary/scanner/postgres/postgreslogin
Auxiliary/scanner/vnc/vnclogin
Auxiliary/scanner/pcanywhere/pcanywherelogin
Auxiliary/scanner/snmp/snmplogin
Auxiliary/scanner/ftp/anonymous
# Keylogger
Keyscanstart # Start key record
keyscandump # Export record data
keyscanstop # End key record
# Sniffer capture package
Use sniffer
Snifferinterfaces # View NIC
snifferstart 1 # Select NIC 1 to start capturing
snifferstats 1 # View NIC 1 status
snifferdump 1 /tmp/wlan1.pcap # Export pcap packet
snifferstop 1 # Stop NIC 1 capture
snifferrelease 1 # Release NIC 1 traffic
# Webcam
recordmic # audio recording
webcamchat # open a video chat (the other party pop)
webcamlist # view camera
webcamsnap # through the camera to take pictures
webcamstream # open by video surveillance cameras (to monitor โ live as a web page)
# Screen capture
Screenshot # Screenshots
use espia # Use espia module
screengrab # screenshot
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCrack-Sniffer-Keylogger-webcam modules :
# Common crack module
Auxiliary/scanner/mssql/mssqllogin
Auxiliary/scanner/ftp/ftplogin
Auxiliary/scanner/ssh/sshlogin
Auxiliary/scanner/telnet/telnetlogin
Auxiliary/scanner/smb/smblogin
Auxiliary/scanner/mssql/mssqllogin
Auxiliary/scanner/mysql/mysqllogin
Auxiliary/scanner/oracle/oraclelogin
Auxiliary/scanner/postgres/postgreslogin
Auxiliary/scanner/vnc/vnclogin
Auxiliary/scanner/pcanywhere/pcanywherelogin
Auxiliary/scanner/snmp/snmplogin
Auxiliary/scanner/ftp/anonymous
# Keylogger
Keyscanstart # Start key record
keyscandump # Export record data
keyscanstop # End key record
# Sniffer capture package
Use sniffer
Snifferinterfaces # View NIC
snifferstart 1 # Select NIC 1 to start capturing
snifferstats 1 # View NIC 1 status
snifferdump 1 /tmp/wlan1.pcap # Export pcap packet
snifferstop 1 # Stop NIC 1 capture
snifferrelease 1 # Release NIC 1 traffic
# Webcam
recordmic # audio recording
webcamchat # open a video chat (the other party pop)
webcamlist # view camera
webcamsnap # through the camera to take pictures
webcamstream # open by video surveillance cameras (to monitor โ live as a web page)
# Screen capture
Screenshot # Screenshots
use espia # Use espia module
screengrab # screenshot
ENJOYโค๏ธ๐๐ป
โ git sources
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆThe latest variant of the eternal blue downloader restarts the EXE file attack, and the new variant has infected 15,000 servers :
> A new variant of the eternal blue downloader Trojan. This variant uses Python to package EXE executable files for attacks. The organization used a similar method at the end of 2018. Tencent security big data monitoring data shows that the latest variant of the eternal blue downloader quickly spread after it appeared. It has infected about 15,000 servers. The poisoning system is finally used to download and run the Monero mining Trojan.
> In the process of continuous evolution and update, the eternal blue downloader Trojan has gradually switched the EXE attack mode to use Powershell scripts to achieve fileless attacks. After its functions became more and more huge, the gang of gangsters again added the code of exploiting the eternal blue vulnerability attack and mssql blasting attack to the EXE Trojan, and shielded the relevant code in Powershell.
> The system trapped by this variant attack will download if.bin, download and run an EXE attack module named by a random string for large-scale vulnerability scanning and attack propagation, and will also download the Monero coin mining Trojan to occupy a large amount of CPU resources on the server Mining will cause severe productivity losses to the injured enterprises.
enjoyโค๏ธ๐๐ป
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆThe latest variant of the eternal blue downloader restarts the EXE file attack, and the new variant has infected 15,000 servers :
> A new variant of the eternal blue downloader Trojan. This variant uses Python to package EXE executable files for attacks. The organization used a similar method at the end of 2018. Tencent security big data monitoring data shows that the latest variant of the eternal blue downloader quickly spread after it appeared. It has infected about 15,000 servers. The poisoning system is finally used to download and run the Monero mining Trojan.
> In the process of continuous evolution and update, the eternal blue downloader Trojan has gradually switched the EXE attack mode to use Powershell scripts to achieve fileless attacks. After its functions became more and more huge, the gang of gangsters again added the code of exploiting the eternal blue vulnerability attack and mssql blasting attack to the EXE Trojan, and shielded the relevant code in Powershell.
> The system trapped by this variant attack will download if.bin, download and run an EXE attack module named by a random string for large-scale vulnerability scanning and attack propagation, and will also download the Monero coin mining Trojan to occupy a large amount of CPU resources on the server Mining will cause severe productivity losses to the injured enterprises.
enjoyโค๏ธ๐๐ป
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBest Boot - Repair access to operating systems
GRUB reinstall, MBR restore, UEFI, SecureBoot, RAID, LVM, Wubi, filesystem repair... :
Download : https://sourceforge.net/p/boot-repair/home
#FastTips
GRUB reinstall, MBR restore, UEFI, SecureBoot, RAID, LVM, Wubi, filesystem repair... :
Download : https://sourceforge.net/p/boot-repair/home
#FastTips
Forwarded from UNDERCODE COMMUNITY
GitHub Enterprise Remote Code Execution.pdf
208 KB
GitHub Enterprise Remote Code Execution
Forwarded from Backup Legal Mega
๐ฆGrow a Profitable Affiliate Website with Long Tail Keywords That Ranks in Google. Learn from people with experience, and build a successful online businessโฆ
https://insider.nichepursuits.com/sign-up
Mega link:
https://mega.nz/folder/RYxmyIDS#dG6ASQ2bFuqbYMncFrtuZg
https://insider.nichepursuits.com/sign-up
Mega link:
https://mega.nz/folder/RYxmyIDS#dG6ASQ2bFuqbYMncFrtuZg
Nichepursuits
Niche Pursuits Insider
Get the real-time blueprints and insider network you need to grow your online business.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWHAt Network Tools should you choose ?
#FastTips
> The most advanced network monitoring tools can also perform the following 5 functions :
1. Network and application monitoring
2. Network problem analysis
3. Application data and stream interception analysis
4. Virtualization and operating system problem detection
5. Root cause analysis
Different network performance monitoring vendors have different granularities in performing these tasks. Moreover, the more precise the task, the more complicated it will be when it is implemented and managed. Therefore, we must accurately understand the needs of our organization, and then properly balance the granularity and complexity.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWHAt Network Tools should you choose ?
#FastTips
> The most advanced network monitoring tools can also perform the following 5 functions :
1. Network and application monitoring
2. Network problem analysis
3. Application data and stream interception analysis
4. Virtualization and operating system problem detection
5. Root cause analysis
Different network performance monitoring vendors have different granularities in performing these tasks. Moreover, the more precise the task, the more complicated it will be when it is implemented and managed. Therefore, we must accurately understand the needs of our organization, and then properly balance the granularity and complexity.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
BIN Multifunctional:(PUBG)
BIN: 431732027035xxxx
DATE: 02/23
CVV: RANDOM
IP: USA ๐บ๐ธ
Working For :
Pubg Uc
Prime Video
PlayStore
Spotify (Paid & Auto Renew)
Netflix
Ding (Charged Card Needed)
Note: Lives CVV Needed.
- Working on more Sites.
(Only verified, not created by us)
BIN: 431732027035xxxx
DATE: 02/23
CVV: RANDOM
IP: USA ๐บ๐ธ
Working For :
Pubg Uc
Prime Video
PlayStore
Spotify (Paid & Auto Renew)
Netflix
Ding (Charged Card Needed)
Note: Lives CVV Needed.
- Working on more Sites.
(Only verified, not created by us)
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWe all know what happen's to twitter but the real details :
#news
?Twitter mass hacking may evolve into a global security crisis
Sina Technology News, July 16th, Beijing time, according to foreign media reports, Bitcoin scammers will not be the last person to steal a certified account-we should be vigilant, because there will be other people to steal our account .
Everything is expected.
The hacker attack on July 15, 2020 is TwitterThe worst security breach in company history. No matter how the company ultimately tells the story, one thing must be acknowledged that the crisis has been brewing as early as a few years ago.
Since the spring of 2018, scammers have been posing as well-known cryptocurrency enthusiast Elon Musk. They use Musk's avatar, choose a similar username, and then post an effective invitation that looks like a pie in the sky: lend him some cryptocurrency and he will give you back more. Sometimes scammers will reply to a connected and authenticated account (such as Musk's SpaceX) to make the fake account look more real. Scammers also spread false tweets through botnets, also to increase authenticity.
The events of 2018 let us see three things. First, there are always people who are deceived, and every time someone is deceived, it is enough to inspire further fraud; second, Twitter's handling of this threat is slow, far less than the company's promise to take these issues seriously in the morning; Third, the needs of scammers and Twitterโs initial countermeasures formed a cat-and-mouse game, which in turn encouraged criminals to take more aggressive actions to create damage.
So there is today's largest attack. Nick Statt reports:
โLarge companies and individualsโ Twitter accounts have recently encountered the largest hacker attack on the platform ever. All attacks are aimed at promoting bitcoin scams, and the initiators seem to have earned a small amount of money from them. We donโt know how the attack happened Yes, I donโt know how much damage to Twitterโs own system. The hackers seem to have stopped, but the authentication account has been posting new scam tweets from 4 pm Eastern time, which has lasted for more than two hours. It has been silent for more than one hour At last, Twitter finally admitted the time of the hacker attack. At 5:45 ET, it wrote on the company's user support account:'We have been informed of the security incidents affecting users of our platform. We are investigating and actively taking measures to respond to the attack. We We will provide you with the latest information as soon as possible.'"
Including former President Barack Obama, Joe Biden, AmazonCEOs Jeff Bezos, Bill Gates and pop singer Kanye West among others and AppleAnd UberThe authentication accounts of other technology companies were hacked.
But they are all later things. Who was the first celebrity account to be attacked? Elon Musk, no doubt.
In the first few hours of hacking, the deceived people sent more than 118,000 dollars to the hackers. In addition, hackers may also access a large number of personal direct messages. Even more disturbing is the speed and scale of hacker attacks, as well as deeper national security issues.
Of course, the most important and most obvious question is, who is the initiator of the attack and how did they do it? As of press time, we have no answer. According to a report by security reporter Joseph Cox, screenshots shared among members of the underground hacker community show that someone can access the tools used to manage accounts within Twitter. Cox wrote:
ใใ"Two sources of the underground hacker community provided a screenshot of an internal control panel to the media. It is alleged that Twitter employees use this internal control panel to manage user accounts. A source said that this control panel of Twitter is also used to Change the ownership of certain so-called OG accounts. Twitter has deleted screenshots of these control panels and suspended the user accounts that posted these screenshots, saying the content violates community rules."
๐ฆWe all know what happen's to twitter but the real details :
#news
?Twitter mass hacking may evolve into a global security crisis
Sina Technology News, July 16th, Beijing time, according to foreign media reports, Bitcoin scammers will not be the last person to steal a certified account-we should be vigilant, because there will be other people to steal our account .
Everything is expected.
The hacker attack on July 15, 2020 is TwitterThe worst security breach in company history. No matter how the company ultimately tells the story, one thing must be acknowledged that the crisis has been brewing as early as a few years ago.
Since the spring of 2018, scammers have been posing as well-known cryptocurrency enthusiast Elon Musk. They use Musk's avatar, choose a similar username, and then post an effective invitation that looks like a pie in the sky: lend him some cryptocurrency and he will give you back more. Sometimes scammers will reply to a connected and authenticated account (such as Musk's SpaceX) to make the fake account look more real. Scammers also spread false tweets through botnets, also to increase authenticity.
The events of 2018 let us see three things. First, there are always people who are deceived, and every time someone is deceived, it is enough to inspire further fraud; second, Twitter's handling of this threat is slow, far less than the company's promise to take these issues seriously in the morning; Third, the needs of scammers and Twitterโs initial countermeasures formed a cat-and-mouse game, which in turn encouraged criminals to take more aggressive actions to create damage.
So there is today's largest attack. Nick Statt reports:
โLarge companies and individualsโ Twitter accounts have recently encountered the largest hacker attack on the platform ever. All attacks are aimed at promoting bitcoin scams, and the initiators seem to have earned a small amount of money from them. We donโt know how the attack happened Yes, I donโt know how much damage to Twitterโs own system. The hackers seem to have stopped, but the authentication account has been posting new scam tweets from 4 pm Eastern time, which has lasted for more than two hours. It has been silent for more than one hour At last, Twitter finally admitted the time of the hacker attack. At 5:45 ET, it wrote on the company's user support account:'We have been informed of the security incidents affecting users of our platform. We are investigating and actively taking measures to respond to the attack. We We will provide you with the latest information as soon as possible.'"
Including former President Barack Obama, Joe Biden, AmazonCEOs Jeff Bezos, Bill Gates and pop singer Kanye West among others and AppleAnd UberThe authentication accounts of other technology companies were hacked.
But they are all later things. Who was the first celebrity account to be attacked? Elon Musk, no doubt.
In the first few hours of hacking, the deceived people sent more than 118,000 dollars to the hackers. In addition, hackers may also access a large number of personal direct messages. Even more disturbing is the speed and scale of hacker attacks, as well as deeper national security issues.
Of course, the most important and most obvious question is, who is the initiator of the attack and how did they do it? As of press time, we have no answer. According to a report by security reporter Joseph Cox, screenshots shared among members of the underground hacker community show that someone can access the tools used to manage accounts within Twitter. Cox wrote:
ใใ"Two sources of the underground hacker community provided a screenshot of an internal control panel to the media. It is alleged that Twitter employees use this internal control panel to manage user accounts. A source said that this control panel of Twitter is also used to Change the ownership of certain so-called OG accounts. Twitter has deleted screenshots of these control panels and suspended the user accounts that posted these screenshots, saying the content violates community rules."
Continuing speculation will inevitably appear irresponsible, but Coxโs report has at least stated that this is not a simple and ordinary hacking incident. One possibility is that a hacker broke Twitterโs internal tools; Cox also proposed another possibility. There are ghosts in Twitter employees who participated in this attack-if that is the case, then Twitter is really a lottery in the year. Twice.
In either case, Twitterโs response to this incident has caused further confusion. The companyโs earliest tweet about this matter basically did not mention any substantive content. Two hours later, Twitter simply stated that the company has disabled the tweet function of the authenticated account, or has reset their password. Try to investigate the root cause of the attack. But just before Twitter explained the situation, many users were already forced to find that they couldn't tweet.
Politicians, celebrities, and national news media will not be able to tweet, but save Twitter some public relations trouble. Although ordinary users are ridiculous, but think about more serious problems. Twitter, whether good or bad, is always one of the most important communication systems in the world. Many of its users are related to emergency medical services. For example, the National Weather Service of Lincoln, Illinois just issued a tornado warning before the certification account was banned. Those who rely on this account to understand the follow-up of the tornado may be unlucky.
Of course, Twitter's ban on certified account statements is also a last resort. People probably prefer that the National Meteorological Service can't push, or want hackers to sell their accounts to criminals and then the latter took the opportunity to log in to the account to post some false information, such as falsely claiming that the tornado fee swept the major cities of the United States and so on. But using this clumsy method to solve the problem-prohibiting most of the 359,000 certified accounts from publishing messages-reflects the wide scope of the incident.
Then you can't help but wonder what emergency measures the company will take if it is not a greedy bitcoin scammer next time, but a national-level person or a mental patient. After this incident, it is not difficult to imagine that if someone controls the account of a world leader and then attempts to launch a nuclear war, it is possible.
At this point, what the Senator Josh Hawley of the Republic of Missouri mentioned in his letter to Twitter CEO Jack Dorsey is very resonant. Holly said:
"I am concerned that this incident is not just a series of planned and premeditated independent hacker attacks, but also a successful attack on Twitter's own security. As you know, your millions of users not only rely on your service for public release Tweets also use your direct messaging service to communicate with each other in private. Successful attacks on your system's servers will pose a threat to the privacy and data security of all users."
However, Holly did not say comprehensively. Here, not only user privacy and data security are threatened. More importantly, impostor and fraud on Twitter are very likely to cause turmoil in the real world. To this day, we have seen this assumption actually happen. With less than four months left before the 2020 election, God knows exactly what will happen.
In the next few days, Twitter may investigate the cause of the security incident. The company may not be able to give a completely satisfactory explanation. But the important thing is that Twitter shares with the public what it has learned about the incident in a timely manner-and what measures the company will take in the future to prevent such a thing from happening again. (noob)
@โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
In either case, Twitterโs response to this incident has caused further confusion. The companyโs earliest tweet about this matter basically did not mention any substantive content. Two hours later, Twitter simply stated that the company has disabled the tweet function of the authenticated account, or has reset their password. Try to investigate the root cause of the attack. But just before Twitter explained the situation, many users were already forced to find that they couldn't tweet.
Politicians, celebrities, and national news media will not be able to tweet, but save Twitter some public relations trouble. Although ordinary users are ridiculous, but think about more serious problems. Twitter, whether good or bad, is always one of the most important communication systems in the world. Many of its users are related to emergency medical services. For example, the National Weather Service of Lincoln, Illinois just issued a tornado warning before the certification account was banned. Those who rely on this account to understand the follow-up of the tornado may be unlucky.
Of course, Twitter's ban on certified account statements is also a last resort. People probably prefer that the National Meteorological Service can't push, or want hackers to sell their accounts to criminals and then the latter took the opportunity to log in to the account to post some false information, such as falsely claiming that the tornado fee swept the major cities of the United States and so on. But using this clumsy method to solve the problem-prohibiting most of the 359,000 certified accounts from publishing messages-reflects the wide scope of the incident.
Then you can't help but wonder what emergency measures the company will take if it is not a greedy bitcoin scammer next time, but a national-level person or a mental patient. After this incident, it is not difficult to imagine that if someone controls the account of a world leader and then attempts to launch a nuclear war, it is possible.
At this point, what the Senator Josh Hawley of the Republic of Missouri mentioned in his letter to Twitter CEO Jack Dorsey is very resonant. Holly said:
"I am concerned that this incident is not just a series of planned and premeditated independent hacker attacks, but also a successful attack on Twitter's own security. As you know, your millions of users not only rely on your service for public release Tweets also use your direct messaging service to communicate with each other in private. Successful attacks on your system's servers will pose a threat to the privacy and data security of all users."
However, Holly did not say comprehensively. Here, not only user privacy and data security are threatened. More importantly, impostor and fraud on Twitter are very likely to cause turmoil in the real world. To this day, we have seen this assumption actually happen. With less than four months left before the 2020 election, God knows exactly what will happen.
In the next few days, Twitter may investigate the cause of the security incident. The company may not be able to give a completely satisfactory explanation. But the important thing is that Twitter shares with the public what it has learned about the incident in a timely manner-and what measures the company will take in the future to prevent such a thing from happening again. (noob)
@โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSPEEDUP ANY LINUX -WIKI SOURCES :
1. Reduce the default grub load time:
The grub gives you 10 seconds to change between dual boot OS or to go in recovery etc. To me, itโs too much. It also means you will have to sit beside your computer and press the enter key to boot into Ubuntu as soon as possible. A little time taking, ainโt it? The first trick would be to change this boot time. If you are more comfortable with a GUI tool, read this article to change grub time and boot order with Grub Customizer.
For the rest of us, you can simply use the following command to open grub configuration:
sudo gedit /etc/default/grub &
And change GRUB_TIMEOUT=10 to GRUB_TIMEOUT=2. This will change the boot time to 2 seconds. Prefer not to put 0 here as you will lose the privilege to change between OS and recovery options. Once you have changed the grub configuration, update grub to make the change count:
sudo update-grub
2. Manage startup applications:
Over the time you tend to start installing applications. If you are a regular Itโs FOSS reader, you might have installed many apps from App of the week series.
Some of these apps are started at each startup and of course resources will be busy in running these applications. Result: a slow computer for a significant time duration at each boot. Go in Unity Dash and look for Startup Applications:
start up application Ubuntu 13.10
In here, look at what applications are loaded at startup. Now think if there are any applications which you donโt require to be started up every time you boot in to Ubuntu. Feel free to remove them:
change start up applications Ubuntu 13.10
But what if you donโt want to remove the applications from startup? For example, if you installed one of the best indicator applets for Ubuntu, you will want them to be started automatically at each boot.
What you can do here is to delay some the start of some of the programs. This way you will free up the resource at boot time and your applications will be started automatically, after some time. In the previous picture click on Edit and change the run command with a sleep option.
For example, if you want to delay the running of Dropbox indicator for letโs say 20 seconds, you just need to add a command like this in the existing command:
sleep 10;
So, the command โdropbox start -iโ changes to โsleep 20; drobox start -iโ. Which means that now Dropbox will start with a 20 seconds delay. You can change the start time of another start up applications in the similar fashion.
Edit start up applications to make Ubuntu 13.10 run faster
3. Install preload to speed up application load time:
Preload is a daemon that runs in the background and analyzes user behavior and frequently run applications. Open a terminal and use the following command to install preload:
sudo apt-get install preload
After installing it, restart your computer and forget about it. It will be working in the background. Read more about preload.
4. Choose the best mirror for software updates:
Itโs good to verify that you are using the best mirror to update the software. Ubuntu software repository are mirrored across the globe and it is quite advisable to use the one which is nearest to you. This will result in a quicker system update as it reduces the time to get the packages from the server.
In Software & Updates->Ubuntu Software tab->Download From choose Other and thereafter click on Select Best Server:
Change mirrors to speed up Ubuntu 13.10
It will run a test and tell you which is the best mirror for you. Normally, the best mirror is already set but as I said, no harm in verifying it. Also, this may result in some delay in getting the updates if the nearest mirror where the repository is cached is not updated frequently. This is useful for people with a relatively slower internet connection. You can also these tips to speed up wifi speed in Ubuntu.
๐ฆSPEEDUP ANY LINUX -WIKI SOURCES :
1. Reduce the default grub load time:
The grub gives you 10 seconds to change between dual boot OS or to go in recovery etc. To me, itโs too much. It also means you will have to sit beside your computer and press the enter key to boot into Ubuntu as soon as possible. A little time taking, ainโt it? The first trick would be to change this boot time. If you are more comfortable with a GUI tool, read this article to change grub time and boot order with Grub Customizer.
For the rest of us, you can simply use the following command to open grub configuration:
sudo gedit /etc/default/grub &
And change GRUB_TIMEOUT=10 to GRUB_TIMEOUT=2. This will change the boot time to 2 seconds. Prefer not to put 0 here as you will lose the privilege to change between OS and recovery options. Once you have changed the grub configuration, update grub to make the change count:
sudo update-grub
2. Manage startup applications:
Over the time you tend to start installing applications. If you are a regular Itโs FOSS reader, you might have installed many apps from App of the week series.
Some of these apps are started at each startup and of course resources will be busy in running these applications. Result: a slow computer for a significant time duration at each boot. Go in Unity Dash and look for Startup Applications:
start up application Ubuntu 13.10
In here, look at what applications are loaded at startup. Now think if there are any applications which you donโt require to be started up every time you boot in to Ubuntu. Feel free to remove them:
change start up applications Ubuntu 13.10
But what if you donโt want to remove the applications from startup? For example, if you installed one of the best indicator applets for Ubuntu, you will want them to be started automatically at each boot.
What you can do here is to delay some the start of some of the programs. This way you will free up the resource at boot time and your applications will be started automatically, after some time. In the previous picture click on Edit and change the run command with a sleep option.
For example, if you want to delay the running of Dropbox indicator for letโs say 20 seconds, you just need to add a command like this in the existing command:
sleep 10;
So, the command โdropbox start -iโ changes to โsleep 20; drobox start -iโ. Which means that now Dropbox will start with a 20 seconds delay. You can change the start time of another start up applications in the similar fashion.
Edit start up applications to make Ubuntu 13.10 run faster
3. Install preload to speed up application load time:
Preload is a daemon that runs in the background and analyzes user behavior and frequently run applications. Open a terminal and use the following command to install preload:
sudo apt-get install preload
After installing it, restart your computer and forget about it. It will be working in the background. Read more about preload.
4. Choose the best mirror for software updates:
Itโs good to verify that you are using the best mirror to update the software. Ubuntu software repository are mirrored across the globe and it is quite advisable to use the one which is nearest to you. This will result in a quicker system update as it reduces the time to get the packages from the server.
In Software & Updates->Ubuntu Software tab->Download From choose Other and thereafter click on Select Best Server:
Change mirrors to speed up Ubuntu 13.10
It will run a test and tell you which is the best mirror for you. Normally, the best mirror is already set but as I said, no harm in verifying it. Also, this may result in some delay in getting the updates if the nearest mirror where the repository is cached is not updated frequently. This is useful for people with a relatively slower internet connection. You can also these tips to speed up wifi speed in Ubuntu.
5. Use apt-fast instead of apt-get for a speedy update:
apt-fast is a shell script wrapper for โapt-getโ that improves updated and package download speed by downloading packages from multiple connections simultaneously. If you frequently use terminal and apt-get to install and update the packages, you may want to give apt-fast a try. Install apt-fast via official PPA using the following commands:
sudo add-apt-repository ppa:apt-fast/stable
sudo apt-get update
sudo apt-get install apt-fast
6. Remove language related ign from apt-get update:
Have you ever noticed the output of sudo apt-get update? There are three kinds of lines in it, hit, ign and get. You can read their meaning here. If you look at IGN lines, you will find that most of them are related to language translation. If you use all the applications, packages in English, there is absolutely no need for a translation of package database from English to English.
If you suppress this language related updates from apt-get, it will slightly increase the apt-get update speed. To do that, open the following file:
sudo gedit /etc/apt/apt.conf.d/00aptitude
And add the following line at the end of this file:
Acquire::Languages "none";
speed up apt get update in Ubuntu
7. Reduce overheating:
Overheating is a common problem in computers these days. An overheated computer runs quite slow. It takes ages to open a program when your CPU fan is running like Usain Bolt. There are two tools which you can use to reduce overheating and thus get a better system performance in Ubuntu, TLP and CPUFREQ.
To install and use TLP, use the following commands in a terminal:
sudo add-apt-repository ppa:linrunner/tlp
sudo apt-get update
sudo apt-get install tlp tlp-rdw
sudo tlp start
You donโt need to do anything after installing TLP. It works in the background.
To install CPUFREQ indicator use the following command:
sudo apt-get install indicator-cpufreq
Restart your computer and use the Powersave mode in it:
CPUFREQ Indicator Applet
8. Tweak LibreOffice to make it faster:
If you are a frequent user of office product, then you may want to tweak the default LibreOffice a bit to make it faster. You will be tweaking memory option here. Open LibreOffice and go to Tools->Options. In there, choose Memory from the left sidebar and enable Systray Quickstarter along with increasing memory allocation.
Improve Libre Office performance
You can read more about how to speed up LibreOffice in detail.
9. Use a lightweight desktop environment (if you can)
If you chose to install the default Unity of GNOME desktop environment, you may choose to opt for a lightweight desktop environment like Xfce or LXDE.
These desktop environments use less RAM and consume less CPU. They also come with their own set of lightweight applications that further helps in running Ubuntu faster. You can refer to this detailed guide to learn how to install Xfce on Ubuntu.
Of course, the desktop might not look as modern as Unity or GNOME. Thatโs a compromise you have to make.
10. Use lighter alternatives for different applications:
This is more of a suggestion and liking. Some of the default or popular applications are resource heavy and may not be suitable for a low-end computer. What you can do is to use some alternates to these applications. For example, use AppGrid instead of Ubuntu Software Center. Use Gdebi to install packages. Use AbiWord instead of LibreOffice Writer etc.
That concludes the collection of tips to make Ubuntu 18.04, 16.04 and other versions faster. I am sure these tips would provide overall a better system performance.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
apt-fast is a shell script wrapper for โapt-getโ that improves updated and package download speed by downloading packages from multiple connections simultaneously. If you frequently use terminal and apt-get to install and update the packages, you may want to give apt-fast a try. Install apt-fast via official PPA using the following commands:
sudo add-apt-repository ppa:apt-fast/stable
sudo apt-get update
sudo apt-get install apt-fast
6. Remove language related ign from apt-get update:
Have you ever noticed the output of sudo apt-get update? There are three kinds of lines in it, hit, ign and get. You can read their meaning here. If you look at IGN lines, you will find that most of them are related to language translation. If you use all the applications, packages in English, there is absolutely no need for a translation of package database from English to English.
If you suppress this language related updates from apt-get, it will slightly increase the apt-get update speed. To do that, open the following file:
sudo gedit /etc/apt/apt.conf.d/00aptitude
And add the following line at the end of this file:
Acquire::Languages "none";
speed up apt get update in Ubuntu
7. Reduce overheating:
Overheating is a common problem in computers these days. An overheated computer runs quite slow. It takes ages to open a program when your CPU fan is running like Usain Bolt. There are two tools which you can use to reduce overheating and thus get a better system performance in Ubuntu, TLP and CPUFREQ.
To install and use TLP, use the following commands in a terminal:
sudo add-apt-repository ppa:linrunner/tlp
sudo apt-get update
sudo apt-get install tlp tlp-rdw
sudo tlp start
You donโt need to do anything after installing TLP. It works in the background.
To install CPUFREQ indicator use the following command:
sudo apt-get install indicator-cpufreq
Restart your computer and use the Powersave mode in it:
CPUFREQ Indicator Applet
8. Tweak LibreOffice to make it faster:
If you are a frequent user of office product, then you may want to tweak the default LibreOffice a bit to make it faster. You will be tweaking memory option here. Open LibreOffice and go to Tools->Options. In there, choose Memory from the left sidebar and enable Systray Quickstarter along with increasing memory allocation.
Improve Libre Office performance
You can read more about how to speed up LibreOffice in detail.
9. Use a lightweight desktop environment (if you can)
If you chose to install the default Unity of GNOME desktop environment, you may choose to opt for a lightweight desktop environment like Xfce or LXDE.
These desktop environments use less RAM and consume less CPU. They also come with their own set of lightweight applications that further helps in running Ubuntu faster. You can refer to this detailed guide to learn how to install Xfce on Ubuntu.
Of course, the desktop might not look as modern as Unity or GNOME. Thatโs a compromise you have to make.
10. Use lighter alternatives for different applications:
This is more of a suggestion and liking. Some of the default or popular applications are resource heavy and may not be suitable for a low-end computer. What you can do is to use some alternates to these applications. For example, use AppGrid instead of Ubuntu Software Center. Use Gdebi to install packages. Use AbiWord instead of LibreOffice Writer etc.
That concludes the collection of tips to make Ubuntu 18.04, 16.04 and other versions faster. I am sure these tips would provide overall a better system performance.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆFake Card Transactions-In Carding :
> This type of fraud accounts for the largest share of payment system losses.
The mechanism of fraud can be different: a fraudster receives a regular card in a bank in a lawful manner, deposits the minimum necessary amount to a special card account. Then he obtains the necessary information about the holder of the plastic card of the same company, but with a more solid account, and enters the new data thus obtained into his card. To implement this method of fraud, the offender must obtain information about the code numbers, surname, name, patronymic of the card holder, sample signature, etc.
๐ฆThere are various ways to fake such a fake:
1) changing the information available on magnetic media;
2) changing the information embossed (squeezed out) on the front side;
3) having done both;
4) having falsified the signature of the legal card holder.
When faking a signature, several options are used, but it takes into account that it is impossible to erase a signature sample, because when you try to do this, the word VOID will appear in the signature field - "invalid". Therefore, it is often simply painted over with white paint.
One of the most dangerous tricks for counterfeiting plastic cards is the production of completely fake cards. The most widely used method of full copying is in some countries in Southeast Asia. This method is most often used by organized criminal groups, which, as a rule, include employees of restaurants and other service establishments. The latter are used to collect information about credit cards that fall into their hands when paying for restaurant and other services.
Credit information used in the manufacture of fake credit cards can be collected in various countries around the world. The most commonly used data are from Canada, the United States of America, European countries, as well as from the Asian region.
written by Undercode
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆFake Card Transactions-In Carding :
> This type of fraud accounts for the largest share of payment system losses.
The mechanism of fraud can be different: a fraudster receives a regular card in a bank in a lawful manner, deposits the minimum necessary amount to a special card account. Then he obtains the necessary information about the holder of the plastic card of the same company, but with a more solid account, and enters the new data thus obtained into his card. To implement this method of fraud, the offender must obtain information about the code numbers, surname, name, patronymic of the card holder, sample signature, etc.
๐ฆThere are various ways to fake such a fake:
1) changing the information available on magnetic media;
2) changing the information embossed (squeezed out) on the front side;
3) having done both;
4) having falsified the signature of the legal card holder.
When faking a signature, several options are used, but it takes into account that it is impossible to erase a signature sample, because when you try to do this, the word VOID will appear in the signature field - "invalid". Therefore, it is often simply painted over with white paint.
One of the most dangerous tricks for counterfeiting plastic cards is the production of completely fake cards. The most widely used method of full copying is in some countries in Southeast Asia. This method is most often used by organized criminal groups, which, as a rule, include employees of restaurants and other service establishments. The latter are used to collect information about credit cards that fall into their hands when paying for restaurant and other services.
Credit information used in the manufacture of fake credit cards can be collected in various countries around the world. The most commonly used data are from Canada, the United States of America, European countries, as well as from the Asian region.
written by Undercode
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Hacking Tutorials Tips and Tricks Methods
โ
HOW TO MAKE NETFLIX FROM MYCANALโ
https://ph.apps2app.com/2020/05/0.html#?o=df4c88b678c64e22b904e1ea8577342116d12b624bc65d4d0956fe6b6040ec2340bb54661629043cce5cbc357451c1ce8fb7f236208e9bdbfad461c8ca8c9a53414c06ccc6a09fc4b2701c3c7ac93901b491efd278fc96ef
HOW TO Open Links Check Here: https://t.me/PremiumHostTuts/3
Share My Channel For More๐๐
โ @PremiumHostTG โ
https://ph.apps2app.com/2020/05/0.html#?o=df4c88b678c64e22b904e1ea8577342116d12b624bc65d4d0956fe6b6040ec2340bb54661629043cce5cbc357451c1ce8fb7f236208e9bdbfad461c8ca8c9a53414c06ccc6a09fc4b2701c3c7ac93901b491efd278fc96ef
HOW TO Open Links Check Here: https://t.me/PremiumHostTuts/3
Share My Channel For More๐๐
โ @PremiumHostTG โ
Pentesting With Burp Suite.pdf
737.9 KB
๐ฆNo waste time, Full burpsuite :
๏ฎ Intro to Web App Testing
๏ฎ Scoping with Burp
๏ฎ Mapping with Burp Spider, Intruder, and Engagement Tools ๏ฎ Replacing Some good common methodology tasks
๏ฎ Automated Scanner Breakdown
๏ฎ Stealing from other tools and Modifying your Attacks
๏ฎ Fuzzing with Intruder and FuzzDB
๏ฎ Auth Bruting with Burp Intruder
๏ฎ Random Burping, IBurpExtender ++
๏ฎ Intro to Web App Testing
๏ฎ Scoping with Burp
๏ฎ Mapping with Burp Spider, Intruder, and Engagement Tools ๏ฎ Replacing Some good common methodology tasks
๏ฎ Automated Scanner Breakdown
๏ฎ Stealing from other tools and Modifying your Attacks
๏ฎ Fuzzing with Intruder and FuzzDB
๏ฎ Auth Bruting with Burp Intruder
๏ฎ Random Burping, IBurpExtender ++
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCrunch VS Hashcat by Undercode ;
Crunch - a dictionary generator with passwords in which you can define a standard or specified encoding. Crunch can create a list of words with all kinds of combinations and permutations according to the given criteria. The data that crunch displays can be displayed on the screen, saved to a file, or transferred to another program.
This is a very flexible dictionary generation program.
Hashcat is the world's fastest password recovery (cracker). But we are not interested in this function. Hashcat can also generate dictionaries. In order not to crack passwords, but only to show candidates for Hashcat there is an option --stdout
Hashcat uses various methods for generating passwords (by mask, combinatorial, permutation, rule-based attack and others). The most popular way is to generate passwords by mask.
In order not to get confused in terms, we will call the symbol in a certain place of the mask or pattern (pattern) โpositionโ. For example, the first character in the candidates for passwords is the first position. The second character is the second position, etc.
Using a mask, we can gain control over each position.
For example, we want to make one of the positions a static symbol (always the same in all candidates for passwords) - so maybe Crunch. But we can also use custom character sets for certain positions. For example, we know that in the second position there are only numbers from 1, 3, 5. In Hashcat we can create a custom character set that includes the numbers 1, 3, 5 and put this user set in the second position in the mask.
In Crunch there is no concept of โmaskโ, but there is a concept of โpatternโ, โpatternโ. In essence, it is equivalent to a mask. Moreover, Crunch can also create up to four custom character sets. Those. in terms of functionality, Crunch is not inferior to the capabilities of Hashcat.
Crunch has a couple of options that are not available in Hashcat. For example, -d allows you to specify the maximum number of duplicate characters. And the -p option creates dictionaries without duplicate characters. Those. This program has its own unique features.
written by Undercode
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCrunch VS Hashcat by Undercode ;
Crunch - a dictionary generator with passwords in which you can define a standard or specified encoding. Crunch can create a list of words with all kinds of combinations and permutations according to the given criteria. The data that crunch displays can be displayed on the screen, saved to a file, or transferred to another program.
This is a very flexible dictionary generation program.
Hashcat is the world's fastest password recovery (cracker). But we are not interested in this function. Hashcat can also generate dictionaries. In order not to crack passwords, but only to show candidates for Hashcat there is an option --stdout
Hashcat uses various methods for generating passwords (by mask, combinatorial, permutation, rule-based attack and others). The most popular way is to generate passwords by mask.
In order not to get confused in terms, we will call the symbol in a certain place of the mask or pattern (pattern) โpositionโ. For example, the first character in the candidates for passwords is the first position. The second character is the second position, etc.
Using a mask, we can gain control over each position.
For example, we want to make one of the positions a static symbol (always the same in all candidates for passwords) - so maybe Crunch. But we can also use custom character sets for certain positions. For example, we know that in the second position there are only numbers from 1, 3, 5. In Hashcat we can create a custom character set that includes the numbers 1, 3, 5 and put this user set in the second position in the mask.
In Crunch there is no concept of โmaskโ, but there is a concept of โpatternโ, โpatternโ. In essence, it is equivalent to a mask. Moreover, Crunch can also create up to four custom character sets. Those. in terms of functionality, Crunch is not inferior to the capabilities of Hashcat.
Crunch has a couple of options that are not available in Hashcat. For example, -d allows you to specify the maximum number of duplicate characters. And the -p option creates dictionaries without duplicate characters. Those. This program has its own unique features.
written by Undercode
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTOR-BOT UPDATEDโ
F e a t u r e s
Onion Crawler (.onion).(Completed)
Returns Page title and address with a short description about the site.(Partially Completed)
Save links to database.(PR to be reviewed)
Get emails from site.(Completed)
Save crawl info to JSON file.(Completed)
Crawl custom domains.(Completed)
Check if the link is live.(Completed)
Built-in Updater.(Completed)
TorBot GUI(see branch front_end)
Social Media integration.(not Started) ...(will be updated)
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
1๏ธโฃDependencies :
beautifulsoup4
pyinstaller
PySocks
termcolor
requests
requests_mock
yattag
2๏ธโฃGET TOR - TORPROJECT.COM
3๏ธโฃBefore you run the torBot make sure the following things are done properly:
> Run tor service sudo service tor start
> Make sure that your torrc is configured to SOCKS_PORT localhost:9050
> CLONE https://github.com/DedSecInside/TorBot then
>Install TorBot Python requirements pip3 install -r requirements.txt
4๏ธโฃOn Linux platforms, you can make an executable for TorBot by using the install.sh script. You will need to give the script the correct permissions using chmod +x install.sh Now you can run ./install.sh to create the torBot binary. Run ./torBot to execute the program.
5๏ธโฃAn alternative way of running torBot is shown below, along with help instructions.
> python3 torBot.py or use the -h/--help argument
โ git topic
ENJOYโค๏ธ๐๐ป
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTOR-BOT UPDATEDโ
F e a t u r e s
Onion Crawler (.onion).(Completed)
Returns Page title and address with a short description about the site.(Partially Completed)
Save links to database.(PR to be reviewed)
Get emails from site.(Completed)
Save crawl info to JSON file.(Completed)
Crawl custom domains.(Completed)
Check if the link is live.(Completed)
Built-in Updater.(Completed)
TorBot GUI(see branch front_end)
Social Media integration.(not Started) ...(will be updated)
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
1๏ธโฃDependencies :
beautifulsoup4
pyinstaller
PySocks
termcolor
requests
requests_mock
yattag
2๏ธโฃGET TOR - TORPROJECT.COM
3๏ธโฃBefore you run the torBot make sure the following things are done properly:
> Run tor service sudo service tor start
> Make sure that your torrc is configured to SOCKS_PORT localhost:9050
> CLONE https://github.com/DedSecInside/TorBot then
>Install TorBot Python requirements pip3 install -r requirements.txt
4๏ธโฃOn Linux platforms, you can make an executable for TorBot by using the install.sh script. You will need to give the script the correct permissions using chmod +x install.sh Now you can run ./install.sh to create the torBot binary. Run ./torBot to execute the program.
5๏ธโฃAn alternative way of running torBot is shown below, along with help instructions.
> python3 torBot.py or use the -h/--help argument
โ git topic
ENJOYโค๏ธ๐๐ป
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - DedSecInside/TorBot: Dark Web OSINT Tool
Dark Web OSINT Tool. Contribute to DedSecInside/TorBot development by creating an account on GitHub.