UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
Have a good Sunday, for everyone β€οΈπŸ‘πŸ»
Forwarded from Backup Legal Mega
πŸ¦‘Organizational BI with SSAS Tabular - Intermediate

https://mega.nz/folder/GoNmjSob#2wzYBkQ6sKHZQycp0OdBwA

1. Introduction and Foreword
https://mega.nz/folder/iwd0jCwB#tVYHlC-AqgE2L_6TR8S36w

2. Intermediate Data Analysis eXpressions (DAX)
https://mega.nz/folder/joEE1AIa#tLVY_haxr8x4SebLlhbY0Q

3. Intermediate Modeling in SSAS Tabular
https://mega.nz/folder/q4NAzSKL#Mx9Znz7rRUxpps7NS7CLeg

4. Time and Dates in SSAS Tabular (Part I)
https://mega.nz/folder/LtEGCIoL#MLs31ZJCL01OQPgacbnoNQ

5. Time and Dates in SSAS Tabular (Part II)
https://mega.nz/folder/D9FWCa7a#YBiPLv5d7tlsNo62DE3Adg

6. Assorted Intermediate SSAS Tabular Topics
https://mega.nz/folder/6gVyBAYY#3nJEy48-REf4BEP46Pwzig
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HACK CCTV 2020 USING LINUX OR TERMUX :
#Reposted

1) pkg install git python -y

2) git clone https://github.com/AngelSecurityTeam/Cam-Hackers

3) cd Cam-Hackers

4) pip3 install requests

5) python3 cam-hackers.py

6) Now Select any country You want from this list and press Enter.for example : You can type 1 and press enter to select USA.

7) Now you will see a list of URLs, just copy anyone URL from the list.

8) Paste URL into a Chrome Tab on Google and you'll be able to see a Camera Control feature as well as use it from the phone.

9) When you see Login Window and query for Username and Password then you should use the most popular Default Username and Passwords, provided Combinations.
Username: admin password: administrator
Username: admin password: (Password blank)

10) When you are still unable to sign in, you can search the camera business name to find the default username and password for that service.

enjoy β€οΈπŸ‘πŸ»
@undercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘ SQL Server - Optimizing Stored Procedure Performance

https://mega.nz/folder/btdTyIQQ#rYgH_m_95ECV0jW0jDWhXg

1. Introduction
https://mega.nz/folder/j0NVgQ5I#zQ_9t5OAqBs3cR89-1ASng

2. Why Use Stored Procedures
https://mega.nz/folder/OwdhCKbZ#06S8Edh0wLBtrwwK3qMrNg

3. Creation, Compilation, and Invalidation Section 1
https://mega.nz/folder/i9cXSCAA#vuWilCamUaNFIuSOSwrrmw

4. Creation, Compilation, and Invalidation Section 2
https://mega.nz/folder/6lUxhQzb#R14mINK4K2IVvMyYQSwkHw

5. Optimization and Recompilation Section 1
https://mega.nz/folder/34dzDIxT#s2TqrJ5_5P7hKQPFoZ67Pg

6. Optimization and Recompilation Section 2
https://mega.nz/folder/flEUgQZJ#Q8UVQJiqgTAje7w_6pOL8Q

7. Optimization and Recompilation Section 3
https://mega.nz/folder/S8MSWAQC#sozppTU3_vs2H3Ga843UqQ

8. Optimization and Recompilation Section 4
https://mega.nz/folder/2hFXHAzK#I-IRUC_v-m8hz8mH0XIUXA

9. Other Concerns and Considerations
https://mega.nz/folder/H4NRgILD#aRpF3JIhohzml-Xy_f21Og

enjoy β€οΈπŸ‘πŸ»
hacking COMMAND & CONTROL FULL WITH PICTURES
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Differences between tcpdump and Wireshark :

Wireshark is also designed to capture and analyze network packets. Wireshark has a graphical interface and a command line interface; tcpdump has a command line interface only

Wireshark supports two types of filters:

1) capture filters

2) display filters

πŸ¦‘ Wireshark capture filters are identical to tcpdump filters. In Wireshark and tcpdump, capture filters are used to filter the data that will be saved to a file (or displayed). As for the Wireshark display filters, they do not affect the amount of captured and saved data, but are used only to filter the displayed information. Wireshark display filters and tcpdump / Wireshark capture filters support:

1) Data link protocol traffic

2) Gateway protocol traffic

3) Transport layer protocol traffic

4) Filters for Wi-Fi frames

5) Wireshark Display Filters support all of the Capture Filters capabilities, plus additionally:

> Application protocol traffic (HTTP, DNS, SSH, FTP, SMTP, RDP, SNMP, RTSP, GQUIC, CDP, LLMNR, SSDP and many others)
In addition, Wireshark has more tools for analyzing network data and visualizing it.

6) So, Wireshark is more suitable for analyzing application layer protocol traffic and analyzing related data streams.

As for tcpdump, it will work in the absence of a graphical environment. Also, this program is great for capturing network traffic and filtering it according to specified criteria. Tcpdump can also be used to perform all sorts of analysis and testing of network settings.

enjoy β€οΈπŸ‘πŸ»
@undercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘ Getting Started with Apache Kafka

https://mega.nz/folder/X90gWSha#4wFW650Od6yVDwSgbK3FEQ

1. Course Overview
https://mega.nz/folder/Tp9GzaZZ#2J8K-yuNDoNIfo5rhIy2FA

2. Getting Started with Apache Kafka
https://mega.nz/folder/j9sWzARJ#YFn753rqz2qybydgLIuxRQ

3. Getting to Know Apache Kafka's Architecture
https://mega.nz/folder/etlGlQ7I#vRpdEpP9ZudICsyHP63PRw

4. Understanding Topics, Partitions, and Brokers
https://mega.nz/folder/3o1ykS7T#rsuFejAfU_SIp3QkB5piAg

5. Producing Messages with Kafka Producers
https://mega.nz/folder/j9kyRIwY#5ReqkqfhwyajOmWU5Yi4tg

6. Consuming Messages with Kafka Consumers and Consumer Groups
https://mega.nz/folder/G4lWWYIB#15X8UutvtDgo10AxVT9tpQ

7. Exploring the Kafka Ecosystem and Its Future
https://mega.nz/folder/ew1UxI5B#GDU9gh3OyHGRebSXU2alGg

enjoy β€οΈπŸ‘πŸ»
Exploit_Mitigation_Techniques_Data_Execution_Prevention_DEP_.pdf
276.5 KB
Exploit Mitigation Techniques - Data Execution Prevention (DEP)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘MySQL Super Dump is a tool to efficiently create filtered and manipulated database dumps. It relies in the power of the SQL native language to do this, using WHERE clauses and complete SELECT statements with aliases to do this.

πŸ¦‘ F E A T U R E S :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) Install the latest Go compiler installed (check instructions at: http://golang.org)

2) Check you environment with go env:
The repository will be clones at $GOPATH/src/github.com/hgfischer/mysqlsuperdump

3) The binary will be installed in $GOBIN

4) Then run go get to download, build and install mysqlsuperdump: go get github.com/hgfischer/mysqlsuperdump

5) Create a config file based on example.cfg and place where you like it.

6) Run mysqlsuperdump -h to see command line options and voilΓ‘.

πŸ¦‘Configuration Example

[mysql]
# See https://github.com/Go-SQL-Driver/MySQL for details on this
dsn = username:password@protocol(address)/dbname?charset=utf8
extended_insert_rows = 1000
#use_table_lock = true
max_open_conns = 50

# Use this to restrict exported data. These are optional
[where]
sales_order = created_at >= DATE_SUB(NOW(), INTERVAL 7 DAY)
customer_upload = created_at >= DATE_SUB(NOW(), INTERVAL 7 DAY)
newsletter_subscriber = created_at >= DATE_SUB(NOW(), INTERVAL 7 DAY)

# Use this to override value returned from tables. These are optional
[select]
system_user.salt = 'reset salt of all system users'
system_user.password = 'reset password of all system users'

customer.first_name = CONCAT('Charlie ', id)
customer.last_name = 'Last'
customer.salt = 'reset salt of all customers'
customer.password = 'reset password of all customers'
customer.username = CONCAT(id, '@fiction.tld')
customer.username_canonical = CONCAT(id, '@fiction.tld')
customer.email = CONCAT(id, '@fiction.tld')
customer.email_canonical = CONCAT(id, '@fiction.tld')

newsletter_subscriber.email = CONCAT(id, '@fiction.tld')

customer_address.recipient_name = CONCAT('Recipient Name ', id)
customer_address.company = CONCAT('Company Name ', id)
customer_address.phone = CONCAT('(', id, ') 1234-1234')

sales_order_address.recipient_name = CONCAT('Recipient Name ', id)
sales_order_address.company = CONCAT('Company Name ', id)
sales_order_address.phone = CONCAT('(', id, ') 1234-1234')

system_dump_version.created_at = NOW()

# Use this to filter entire table (ignore) or data only (nodata)
[filter]
customer_stats = nodata
customer_private = ignore

enjoy β€οΈπŸ‘πŸ»
GIT TOPIC
@undercodeTesting
@UNDERCODEHACKING
@undercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Samurai Web Testing Framework is a virtual machine that can run in VirtualBox and VMWare, It has been pre-configured to function as a penetration testing environment. It contains the best open source and free tools that focus on testing and attacking websites.

It also contains vulnerable web applications and scripts for practical application of penetration testing skills and testing tools designed to audit web application security.


πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/SamuraiWTF/samuraiwtf.git

2) cd samuraiwtf

3) cd /vagrant

4) ansible-playbook -i /etc/ansible/hosts install/tools.yml

5) From a command-line terminal in the project directory, run the command vagrant up. Then sit back and wait for it to finish.

6) (Optional) If you want to understand this process a little more, we have a video that discusses what is happening with more detail. It is listed as a free course on our training site: https://training.secureideas.com/course/foldingsteel/

enjoy β€οΈπŸ‘πŸ»
@undercodeTesting
#UndercodeHacking
@Undercodesecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁