Rails Security - First part.pdf
617 KB
Rails is a software library that extends the Ruby programming language. Itβs often promoted as an MVC web framework, which stands for Model, View, and Controller respectively.
De facto, Web developers are attracted by its simplicity and the priciple of Convention over Conο¬guration, and it has become more popular in recent days.
Despite Rails is a mature framework being used today, Web Security issues are still there. Therefore, this paper will brieο¬y address and give introduction to those discovered vulnerabilities of Rails.
De facto, Web developers are attracted by its simplicity and the priciple of Convention over Conο¬guration, and it has become more popular in recent days.
Despite Rails is a mature framework being used today, Web Security issues are still there. Therefore, this paper will brieο¬y address and give introduction to those discovered vulnerabilities of Rails.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACKING ANDROID APPS 2020 LIST :
https://apkpure.com/sshdroid/berserker.android.apps.sshdroid
https://wifikillapk.com/download/
https://www.offensive-security.com/kali-linux-nethunter-download/
https://play.google.com/store/apps/details?id=com.overlook.android.fing&hl=en
https://github.com/wszf/androrat
https://github.com/pjlantz/droidbox
https://secwiki.org/w/Nmap/Android
https://play.google.com/store/apps/details?id=com.overlook.android.fing&hl=en
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACKING ANDROID APPS 2020 LIST :
https://apkpure.com/sshdroid/berserker.android.apps.sshdroid
https://wifikillapk.com/download/
https://www.offensive-security.com/kali-linux-nethunter-download/
https://play.google.com/store/apps/details?id=com.overlook.android.fing&hl=en
https://github.com/wszf/androrat
https://github.com/pjlantz/droidbox
https://secwiki.org/w/Nmap/Android
https://play.google.com/store/apps/details?id=com.overlook.android.fing&hl=en
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
APKPure.com
SSHDroid APK for Android Download
SSHDroid 2.1.2 APK download for Android. Connect through SSH to your device!
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦PRACTICE YOUR KNOWLEDGE :
HACKING EXERCICES :
0 - Last Layer Attack
1 - Backdooring
2 - Extracting Information
3 - Brute Forcing
4 - Neural Overflow
5 - Malware Injection
6 - Neural Obfuscation
7 - Bug Hunting
8 - GPU Attack
π¦Packages :
-Keras: Installing Keras can be tricky. We refer to the official installation guide at https://keras.io/
-#installation and suggest TensorFlow as a backend (using the GPU-enabled version, if one is available on the machine).
-NumPy, SciPy and scikit-image: NumPy and SciPy are excellent helper packages, which are used throughout all exercises. Following the official SciPy
-instructions should also install NumPy https://
www.scipy.org/install.html. We will also need to
-install scikit-image for image loading and saving:
https://scikit-image.org/docs/stable/install.html.
PyCuda: PyCuda is required for the GPU-based attack exercise. If no nVidia GPU is available on the machine, this can be skipped. https://wiki.tiker.net/PyCuda/Installation
-NLTK: NLTK provides functionalities for natural language processing and is very helpful for some of the exercises. https://www.nltk.org/install.html
D O W N L O A D :
https://github.com/Kayzaks/HackingNeuralNetworks
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦PRACTICE YOUR KNOWLEDGE :
HACKING EXERCICES :
0 - Last Layer Attack
1 - Backdooring
2 - Extracting Information
3 - Brute Forcing
4 - Neural Overflow
5 - Malware Injection
6 - Neural Obfuscation
7 - Bug Hunting
8 - GPU Attack
π¦Packages :
-Keras: Installing Keras can be tricky. We refer to the official installation guide at https://keras.io/
-#installation and suggest TensorFlow as a backend (using the GPU-enabled version, if one is available on the machine).
-NumPy, SciPy and scikit-image: NumPy and SciPy are excellent helper packages, which are used throughout all exercises. Following the official SciPy
-instructions should also install NumPy https://
www.scipy.org/install.html. We will also need to
-install scikit-image for image loading and saving:
https://scikit-image.org/docs/stable/install.html.
PyCuda: PyCuda is required for the GPU-based attack exercise. If no nVidia GPU is available on the machine, this can be skipped. https://wiki.tiker.net/PyCuda/Installation
-NLTK: NLTK provides functionalities for natural language processing and is very helpful for some of the exercises. https://www.nltk.org/install.html
D O W N L O A D :
https://github.com/Kayzaks/HackingNeuralNetworks
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
keras.io
Keras: Deep Learning for humans
Keras documentation
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦CREATE ANDROID APK - WITHOUT CODING :
https://www.appypie.com/
https://www.goodbarber.com/
https://mobileroadie.com/
https://www.theappbuilder.com/
https://www.appmakr.com/
http://www.makemedroid.com/en/
https://www.swiftic.com/
http://www.appmachine.com/
https://www.biznessapps.com/
https://www.appsgeyser.com/
https://appinstitute.com/
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦CREATE ANDROID APK - WITHOUT CODING :
https://www.appypie.com/
https://www.goodbarber.com/
https://mobileroadie.com/
https://www.theappbuilder.com/
https://www.appmakr.com/
http://www.makemedroid.com/en/
https://www.swiftic.com/
http://www.appmachine.com/
https://www.biznessapps.com/
https://www.appsgeyser.com/
https://appinstitute.com/
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Appy Pie
Best AI No-Code Development Platform for Apps and Websites
Create apps and websites easily. Appy Pie's AI-powered no-code platform is trusted as the best & leader in no-code app development.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦VIRUS & MALWARE TOOLS & TUTORIALS :
[JSDetox](http://www.relentless-coding.com/projects/jsdetox/) - JavaScript
malware analysis tool.
jsunpack-n - A javascript
unpacker that emulates browser functionality.
[Krakatau](https://github.com/Storyyeller/Krakatau) - Java decompiler,
assembler, and disassembler.
Malzilla - Analyze malicious web pages.
[RABCDAsm](https://github.com/CyberShadow/RABCDAsm) - A "Robust
ActionScript Bytecode Disassembler."
SWF Investigator -
Static and dynamic analysis of SWF applications.
[swftools](http://www.swftools.org/) - Tools for working with Adobe Flash
files.
xxxswf - A
Python script for analyzing Flash files.
ENJOY β€οΈππ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦VIRUS & MALWARE TOOLS & TUTORIALS :
[JSDetox](http://www.relentless-coding.com/projects/jsdetox/) - JavaScript
malware analysis tool.
jsunpack-n - A javascript
unpacker that emulates browser functionality.
[Krakatau](https://github.com/Storyyeller/Krakatau) - Java decompiler,
assembler, and disassembler.
Malzilla - Analyze malicious web pages.
[RABCDAsm](https://github.com/CyberShadow/RABCDAsm) - A "Robust
ActionScript Bytecode Disassembler."
SWF Investigator -
Static and dynamic analysis of SWF applications.
[swftools](http://www.swftools.org/) - Tools for working with Adobe Flash
files.
xxxswf - A
Python script for analyzing Flash files.
ENJOY β€οΈππ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - urule99/jsunpack-n: Automatically exported from code.google.com/p/jsunpack-n
Automatically exported from code.google.com/p/jsunpack-n - urule99/jsunpack-n
Linux for Pentester _ ZIP Privilege Escalation.pdf
515.4 KB
How can we perform Privilege Escalation with Zip command
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦for kali 2020 users #requested
Β» Enable Monitor Mode Using iw:
First, we will take a look at the use of the iw Wi-Fi configuration tool. It is used for configuring Wi-Fi in particular and can be more powerful than other tools. You might have already used iw for several other purposes, for example, to obtain information about your Wi-Fi network. In fact, this tool can even give you more information about different commands. The iw list gives you much more information about wireless wlan0, interface modes, HT, bit rates, scanning, etc.
π»π΄π 'π π π π°π π :
The first step is to check the interface information. You can do so by entering the following:
1) $ sudo iw dev
The output will look like the following window:
To access the traffic of other people, you will have to switch this over to Monitor Mode. You can switch iw to Monitor Mode by entering the commands given below:
2) $ sudo ip link set IFACE down
3) $ sudo iw IFACE set monitor control
4) $ sudo ip link set IFACE up
IFACE replaced the actual name, as shown:
5) $ sudo ip link set wlan0 down
6) $ sudo iw wlan0 set monitor control
7) $ sudo ip link set wlan0 up
The next step is to check the wireless interface one more time by entering the following command:
8) $ sudo iw dev
9) The output of the aforementioned commands can be seen in the window above.
Wondering how to get back to the Managed Mode? To do so, enter the following commands:
10) $ sudo ip link set IFACE down
11) $ sudo iw IFACE set type managed
12) $ sudo ip link set IFACE up
IFACE replaced the actual name, as shown:
13) $ sudo ip link set wlan0 down
14) $ sudo iw wlan0 set type managed
15) $ sudo ip link set wlan0 up
Enable Monitor Mode Using iwconfig
As in previous sections, check your interface name via the following command:
$ sudo iwconfig
The next step is to enable Monitor Mode. Do so by entering the following commands:
$ sudo ifconfig IFACE down
$ sudo iwconfig IFACE mode monitor
$ sudo ifconfig IFACE up
Furthermore,
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode monitor
$ sudo ifconfig wlan0 up
Disable Monitor Mode
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode managed
$ sudo ifconfig wlan0 up
Turn off the Network Manager that Prevents Monitor Mode
$ sudo systemctl stop NetworkManager
π»π΄π 'π π π π°π π :
π¦Another two methode for wifi monitor mode :
You can also via airmon-ng but this methode is recommended
Enable Monitor Mode Using iwconfig
As in previous sections, check your interface name via the following command:
$ sudo iwconfig
The next step is to enable Monitor Mode. Do so by entering the following commands:
$ sudo ifconfig IFACE down
$ sudo iwconfig IFACE mode monitor
$ sudo ifconfig IFACE up
Furthermore,
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode monitor
$ sudo ifconfig wlan0 up
Disable Monitor Mode
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode managed
$ sudo ifconfig wlan0 up
Turn off the Network Manager that Prevents Monitor Mode
$ sudo systemctl stop NetworkManager
source linux forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦for kali 2020 users #requested
Β» Enable Monitor Mode Using iw:
First, we will take a look at the use of the iw Wi-Fi configuration tool. It is used for configuring Wi-Fi in particular and can be more powerful than other tools. You might have already used iw for several other purposes, for example, to obtain information about your Wi-Fi network. In fact, this tool can even give you more information about different commands. The iw list gives you much more information about wireless wlan0, interface modes, HT, bit rates, scanning, etc.
π»π΄π 'π π π π°π π :
The first step is to check the interface information. You can do so by entering the following:
1) $ sudo iw dev
The output will look like the following window:
To access the traffic of other people, you will have to switch this over to Monitor Mode. You can switch iw to Monitor Mode by entering the commands given below:
2) $ sudo ip link set IFACE down
3) $ sudo iw IFACE set monitor control
4) $ sudo ip link set IFACE up
IFACE replaced the actual name, as shown:
5) $ sudo ip link set wlan0 down
6) $ sudo iw wlan0 set monitor control
7) $ sudo ip link set wlan0 up
The next step is to check the wireless interface one more time by entering the following command:
8) $ sudo iw dev
9) The output of the aforementioned commands can be seen in the window above.
Wondering how to get back to the Managed Mode? To do so, enter the following commands:
10) $ sudo ip link set IFACE down
11) $ sudo iw IFACE set type managed
12) $ sudo ip link set IFACE up
IFACE replaced the actual name, as shown:
13) $ sudo ip link set wlan0 down
14) $ sudo iw wlan0 set type managed
15) $ sudo ip link set wlan0 up
Enable Monitor Mode Using iwconfig
As in previous sections, check your interface name via the following command:
$ sudo iwconfig
The next step is to enable Monitor Mode. Do so by entering the following commands:
$ sudo ifconfig IFACE down
$ sudo iwconfig IFACE mode monitor
$ sudo ifconfig IFACE up
Furthermore,
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode monitor
$ sudo ifconfig wlan0 up
Disable Monitor Mode
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode managed
$ sudo ifconfig wlan0 up
Turn off the Network Manager that Prevents Monitor Mode
$ sudo systemctl stop NetworkManager
π»π΄π 'π π π π°π π :
π¦Another two methode for wifi monitor mode :
You can also via airmon-ng but this methode is recommended
Enable Monitor Mode Using iwconfig
As in previous sections, check your interface name via the following command:
$ sudo iwconfig
The next step is to enable Monitor Mode. Do so by entering the following commands:
$ sudo ifconfig IFACE down
$ sudo iwconfig IFACE mode monitor
$ sudo ifconfig IFACE up
Furthermore,
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode monitor
$ sudo ifconfig wlan0 up
Disable Monitor Mode
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode managed
$ sudo ifconfig wlan0 up
Turn off the Network Manager that Prevents Monitor Mode
$ sudo systemctl stop NetworkManager
source linux forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Change the MAC Address
#forBeginers
In a Kali Linux, it is very easy to spoof the MAC address. This can be done by opening the terminal window in the Kali Linux system. Initially, we will check all of the adapters that are using the ifconfig command, as shown:
1) $ sudo ifconfig
2) $ sudo ifconfig eth0 down
3) Next, we will change the MAC address. This can be done by entering the following command:
$ sudo macchanger -r eth0
4) In this command, the -r flag is used to change the current MAC address to the random MAC address in the network interface of eth0.
In the screenshot above, note that the MAC address has been successfully spoofed. Now, we will turn on the network interface again.
5) This can be done by entering the following command:
$ sudo ifconfig eth0 up
6) Next, it is necessary to check the MAC address again with the help of the ifconfig command:
$ sudo ifconfig
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Change the MAC Address
#forBeginers
In a Kali Linux, it is very easy to spoof the MAC address. This can be done by opening the terminal window in the Kali Linux system. Initially, we will check all of the adapters that are using the ifconfig command, as shown:
1) $ sudo ifconfig
2) $ sudo ifconfig eth0 down
3) Next, we will change the MAC address. This can be done by entering the following command:
$ sudo macchanger -r eth0
4) In this command, the -r flag is used to change the current MAC address to the random MAC address in the network interface of eth0.
In the screenshot above, note that the MAC address has been successfully spoofed. Now, we will turn on the network interface again.
5) This can be done by entering the following command:
$ sudo ifconfig eth0 up
6) Next, it is necessary to check the MAC address again with the help of the ifconfig command:
$ sudo ifconfig
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦2020 Code with Mosh - The Ultimate Data Structures & Algorithms
https://mega.nz/folder/tJAD2QYJ#iGTd0Hi4k3a4kbEcKddTtg
https://mega.nz/folder/tJAD2QYJ#iGTd0Hi4k3a4kbEcKddTtg
mega.nz
3.11 GB folder on MEGA
45 files and 4 subfolders
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACKING WITH Unicornscan:
F E A T U R E S :
-Asynchronous stateless TCP scanning with each of the TCP flags or flag combinations
-Asynchronous protocol-specific UDP scanning
superior interface for measuring a response from a TCP/IP enabled stimulus
-Active and Passive remote OS and application detection
-PCAP file logging and filtering
-capable of sending packets with different OS
-fingerprints than the OS of the host.
-Relational database output for storing the results of your scans
-Customizable module support to fit according to the system being pentested
-Customized data set views.
-Has its TCP/IP stack, a distinguishing feature that sets it apart from other port scanners
-Comes built into Kali Linux, no need to download
π»π΄π 'π π π π°π π :
1) Performing a simple scan with Unicornscan
The most basic scan withUnicornscan allows us to scan a single host IP.
$ sudo unicornscan 192.168.100.35
2) as example :
the key is that it doesnβt use ICMP by default. Out of the ports mentioned, only ports 135,139,445 and 554 are open.
3) Scanning multiple IPs wit Unicornscan
We will make a slight modification in the basic scan syntax to scan multiple hosts, and youβll notice the subtle difference from scan commands we use in nmap and hping. The targets are placed in sequence to initiate scanning:
$ sudo unicornscan 192.168.100.35 192.168.100.45
4) Scanning Class C networks with Unicornscan
$ sudo unicornscan 192.168.100.35/24:31
5) Unicornscan has successfully returned us to all the hosts that have port 31 open. The cool thing about unicornscan is that it doesnβt stop at our network, where speed is a limiting factor.
UDP scanning:
We can also scan for UDP ports with unicornscan. Type:
$ sudo unicornscan -r300 -mU linuxhint.com
6) Saving results to a PCAP file
$ sudo unicornscan 216.1.0.0/8:5505 -r500 -w huntfor5505.pcap
-W1 -s 192.168.100.35
β unix forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACKING WITH Unicornscan:
F E A T U R E S :
-Asynchronous stateless TCP scanning with each of the TCP flags or flag combinations
-Asynchronous protocol-specific UDP scanning
superior interface for measuring a response from a TCP/IP enabled stimulus
-Active and Passive remote OS and application detection
-PCAP file logging and filtering
-capable of sending packets with different OS
-fingerprints than the OS of the host.
-Relational database output for storing the results of your scans
-Customizable module support to fit according to the system being pentested
-Customized data set views.
-Has its TCP/IP stack, a distinguishing feature that sets it apart from other port scanners
-Comes built into Kali Linux, no need to download
π»π΄π 'π π π π°π π :
1) Performing a simple scan with Unicornscan
The most basic scan withUnicornscan allows us to scan a single host IP.
$ sudo unicornscan 192.168.100.35
2) as example :
the key is that it doesnβt use ICMP by default. Out of the ports mentioned, only ports 135,139,445 and 554 are open.
3) Scanning multiple IPs wit Unicornscan
We will make a slight modification in the basic scan syntax to scan multiple hosts, and youβll notice the subtle difference from scan commands we use in nmap and hping. The targets are placed in sequence to initiate scanning:
$ sudo unicornscan 192.168.100.35 192.168.100.45
4) Scanning Class C networks with Unicornscan
$ sudo unicornscan 192.168.100.35/24:31
5) Unicornscan has successfully returned us to all the hosts that have port 31 open. The cool thing about unicornscan is that it doesnβt stop at our network, where speed is a limiting factor.
UDP scanning:
We can also scan for UDP ports with unicornscan. Type:
$ sudo unicornscan -r300 -mU linuxhint.com
6) Saving results to a PCAP file
$ sudo unicornscan 216.1.0.0/8:5505 -r500 -w huntfor5505.pcap
-W1 -s 192.168.100.35
β unix forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦Paid = 80000$ FOR YOUπ€©
EVERY ADOBE PROGRAM | ADOBE SUITE 2020 FULL CRACKS
WHATS INCLUDED HERE:
Adobe Photoshop CC 2020
Adobe Animate CC 2020
Adobe Illustrator CC 2020
Adobe Premiere Pro CC 2020
[extra/new] Primere Rush 2020
Adobe Media Encoder: 2020
Adobe Photoshop Lightroom Classic CC 2020
Adobe After Effects CC 2020
Adobe InDesign CC 2020
Adobe InCopy CC 2020
Adobe Dimension CC 2020
Adobe Audition CC 2020
Adobe Dreamweaver CC 2020
Adobe Character Animator CC 2020
Adobe Photoshop CC 2020 | https://drive.google.com/uc?id=1b1VAYz8mq8gn6uhOUfnSCb7ydsdoIVj5&export=download
Adobe Animate CC 2020 | https://drive.google.com/uc?id=1ARH0MgFijoB6RC2f29vJzZFnoFuVhTxB&export=download
Adobe Illustrator CC 2020 | https://drive.google.com/uc?id=1wFOR8f4nHGUG0nihv9Id4rlwzKYBTX3z&export=download
Adobe Premiere Pro CC 2020 | https://drive.google.com/uc?id=1qyaRufD4gXMl6zMwtD0Tofc6xEuIbNHj&export=download
[extra] [b]Premiere Rush 2020 | [/b]https://drive.google.com/uc?id=1eVet0xZjD85ruG-0oAQm6e_IygwBGCCh&export=download
Adobe Media Encoder: 2020 | https://drive.google.com/uc?id=10SEL8TaxzfTQkQK6a9gslASF20PVnLmz&export=download
Adobe Photoshop Lightroom Classic CC 2020 | https://drive.google.com/uc?id=1W5PwNfCfSqCIEDnrWx6KjPJL_ubWQ8l2&export=download
Adobe After Effects CC 2020 | https://drive.google.com/uc?id=1-yVPlnA4L2Cz70CL32V9V7ST20zRxWch&export=download
Adobe InDesign CC 2020 | https://drive.google.com/uc?id=1XKvDUG8HexPp_p2c7gQAovx6kIc9rf3b&export=download
Adobe InCopy CC 2020 | https://drive.google.com/uc?id=1WVFbkmQq3ZFrNHaqE20uRollFROJZvtz&export=download
Adobe Dimension CC 2020 | [b]https://drive.google.com/uc?id=1r2YJB7z2teF820i3x_gkokhnzrVvYEDi&export=download[/b]
Adobe Audition CC 2020 | https://drive.google.com/uc?id=1bw6F6gYKjXdnqpwj-jV5D2IsXG3fyJmq&export=download
Adobe Dreamweaver CC 2020 | https://drive.google.com/uc?id=1XVQ6lRmQYdBItaVE1SGYMGmexBIqynx7&export=download
Adobe Character Animator CC 2020 | https://drive.google.com/uc?id=1kZLLRQyXsBZZZN66gKjc7aFfDlDC9FzZ&export=download
ENJOYβ€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
EVERY ADOBE PROGRAM | ADOBE SUITE 2020 FULL CRACKS
WHATS INCLUDED HERE:
Adobe Photoshop CC 2020
Adobe Animate CC 2020
Adobe Illustrator CC 2020
Adobe Premiere Pro CC 2020
[extra/new] Primere Rush 2020
Adobe Media Encoder: 2020
Adobe Photoshop Lightroom Classic CC 2020
Adobe After Effects CC 2020
Adobe InDesign CC 2020
Adobe InCopy CC 2020
Adobe Dimension CC 2020
Adobe Audition CC 2020
Adobe Dreamweaver CC 2020
Adobe Character Animator CC 2020
Adobe Photoshop CC 2020 | https://drive.google.com/uc?id=1b1VAYz8mq8gn6uhOUfnSCb7ydsdoIVj5&export=download
Adobe Animate CC 2020 | https://drive.google.com/uc?id=1ARH0MgFijoB6RC2f29vJzZFnoFuVhTxB&export=download
Adobe Illustrator CC 2020 | https://drive.google.com/uc?id=1wFOR8f4nHGUG0nihv9Id4rlwzKYBTX3z&export=download
Adobe Premiere Pro CC 2020 | https://drive.google.com/uc?id=1qyaRufD4gXMl6zMwtD0Tofc6xEuIbNHj&export=download
[extra] [b]Premiere Rush 2020 | [/b]https://drive.google.com/uc?id=1eVet0xZjD85ruG-0oAQm6e_IygwBGCCh&export=download
Adobe Media Encoder: 2020 | https://drive.google.com/uc?id=10SEL8TaxzfTQkQK6a9gslASF20PVnLmz&export=download
Adobe Photoshop Lightroom Classic CC 2020 | https://drive.google.com/uc?id=1W5PwNfCfSqCIEDnrWx6KjPJL_ubWQ8l2&export=download
Adobe After Effects CC 2020 | https://drive.google.com/uc?id=1-yVPlnA4L2Cz70CL32V9V7ST20zRxWch&export=download
Adobe InDesign CC 2020 | https://drive.google.com/uc?id=1XKvDUG8HexPp_p2c7gQAovx6kIc9rf3b&export=download
Adobe InCopy CC 2020 | https://drive.google.com/uc?id=1WVFbkmQq3ZFrNHaqE20uRollFROJZvtz&export=download
Adobe Dimension CC 2020 | [b]https://drive.google.com/uc?id=1r2YJB7z2teF820i3x_gkokhnzrVvYEDi&export=download[/b]
Adobe Audition CC 2020 | https://drive.google.com/uc?id=1bw6F6gYKjXdnqpwj-jV5D2IsXG3fyJmq&export=download
Adobe Dreamweaver CC 2020 | https://drive.google.com/uc?id=1XVQ6lRmQYdBItaVE1SGYMGmexBIqynx7&export=download
Adobe Character Animator CC 2020 | https://drive.google.com/uc?id=1kZLLRQyXsBZZZN66gKjc7aFfDlDC9FzZ&export=download
ENJOYβ€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to prevent systemd-resolved from using port 53 in Ubuntu :
It's worth noting that you can free port 53 by simply uncommenting the DNSStubListener and setting it to no in /etc/systemd/resolved.conf. The rest of the steps are for enabling a DNS server - without it, your system won't be able to resolve any domain names, so you won't be able to visit websites in a web browser, etc.
1) Edit /etc/systemd/resolved.conf with a text editor (as root), for example open it with the Nano console text editor:
> sudo nano /etc/systemd/resolved.conf
2) And uncomment (remove the # from the beginning of the line) the DNS = line and the DNSStubListener = line. Then change the DNS = value in this file to the DNS server you want to use (e.g. 127.0.0.1 to use a local proxy, 1.1.1.1 to use Cloudflare DNS, etc.), and also change the DNSStubListener = value from yes to no.
3) This is how the file should look after you have made these changes (we are using 1.1.1.1 as the DNS server here, i.e. Cloudflare DNS):
[Resolve]
DNS = 1.1.1.1
# FallbackDNS =
# Domains =
# LLMNR = no
# MulticastDNS = no
# DNSSEC = no
# DNSOverTLS = no
# Cache = no
DNSStubListener = no
# ReadEtcHosts = yes
4) To save the file using the Nano text editor , press Ctrl + x, then type y and press Enter.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to prevent systemd-resolved from using port 53 in Ubuntu :
It's worth noting that you can free port 53 by simply uncommenting the DNSStubListener and setting it to no in /etc/systemd/resolved.conf. The rest of the steps are for enabling a DNS server - without it, your system won't be able to resolve any domain names, so you won't be able to visit websites in a web browser, etc.
1) Edit /etc/systemd/resolved.conf with a text editor (as root), for example open it with the Nano console text editor:
> sudo nano /etc/systemd/resolved.conf
2) And uncomment (remove the # from the beginning of the line) the DNS = line and the DNSStubListener = line. Then change the DNS = value in this file to the DNS server you want to use (e.g. 127.0.0.1 to use a local proxy, 1.1.1.1 to use Cloudflare DNS, etc.), and also change the DNSStubListener = value from yes to no.
3) This is how the file should look after you have made these changes (we are using 1.1.1.1 as the DNS server here, i.e. Cloudflare DNS):
[Resolve]
DNS = 1.1.1.1
# FallbackDNS =
# Domains =
# LLMNR = no
# MulticastDNS = no
# DNSSEC = no
# DNSOverTLS = no
# Cache = no
DNSStubListener = no
# ReadEtcHosts = yes
4) To save the file using the Nano text editor , press Ctrl + x, then type y and press Enter.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦LINUX SERVICES :
How to list active services in systemd ?
Systemd services are controlled by the systemctl command. If you run systemctl without any arguments, it calls the default list-units subcommand and lists the different types of system units such as services, sockets, targets, etc.
1) But your goal is to enumerate services so that you specify the device type with the βtype flag, for example:
systemctl --type = service
2) Did you notice that we didn't include the list-units subcommand because it's the default? If you want to follow the convention, you can also indicate that. We prefer it this way, and we will follow this convention for the rest of the article.
systemctl list-units --type = service
3) In both cases, the output will be the same. By default, this command only shows loaded and active services in alphabetical order:
-UNIT LOAD ACTIVE SUB DESCRIPTION
accounts-daemon.service loaded active running Accounts Service
-acpid.service loaded active running ACPI event daemon
alsa-restore.service loaded active exited Save / βRestore Sound Card State apparmor.service loaded active exited Load AppArmor profiles
apport.service loaded active exited LSB: automatic crash report generation
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦LINUX SERVICES :
How to list active services in systemd ?
Systemd services are controlled by the systemctl command. If you run systemctl without any arguments, it calls the default list-units subcommand and lists the different types of system units such as services, sockets, targets, etc.
1) But your goal is to enumerate services so that you specify the device type with the βtype flag, for example:
systemctl --type = service
2) Did you notice that we didn't include the list-units subcommand because it's the default? If you want to follow the convention, you can also indicate that. We prefer it this way, and we will follow this convention for the rest of the article.
systemctl list-units --type = service
3) In both cases, the output will be the same. By default, this command only shows loaded and active services in alphabetical order:
-UNIT LOAD ACTIVE SUB DESCRIPTION
accounts-daemon.service loaded active running Accounts Service
-acpid.service loaded active running ACPI event daemon
alsa-restore.service loaded active exited Save / βRestore Sound Card State apparmor.service loaded active exited Load AppArmor profiles
apport.service loaded active exited LSB: automatic crash report generation
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
Hot Potato.pdf
1.5 MB
Hot potato is the code name of a Windows privilege escalation technique that was discovered by Stephen Breen
Forwarded from WEB UNDERCODE - PRIVATE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Understanding the exit codes for the fsck command #FastTips
This is a list of codes that can be returned from fsck after checking the disk. Your exit code will be the sum of these codes if you analyze one disc. If you use fsck on multiple devices, it will return a bitwise OR of two sums.
0 - no errors
1 - fixed file system errors
2 - the system must be rebooted
4 - Filesystem errors left unpatched
8 - Operational error
16 - usage or syntax error
32 - Fsck canceled at user request
128 - Shared library error
You can check the exit code of the last run command using the echo $? Command.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Understanding the exit codes for the fsck command #FastTips
This is a list of codes that can be returned from fsck after checking the disk. Your exit code will be the sum of these codes if you analyze one disc. If you use fsck on multiple devices, it will return a bitwise OR of two sums.
0 - no errors
1 - fixed file system errors
2 - the system must be rebooted
4 - Filesystem errors left unpatched
8 - Operational error
16 - usage or syntax error
32 - Fsck canceled at user request
128 - Shared library error
You can check the exit code of the last run command using the echo $? Command.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦MAN-IN-MIDDLE ATTACK #ForBeginers :
π»π΄π 'π π π π°π π :
Launch the Parrot or Kali Linux machine to get started.
Set up the DNS config file in Ettercap
1) Setup the command terminal and change the DNS configuration of the Ettercap by typing the following syntax into the editor of your choice.
$ gedit /etc/ettercap/etter.dns
2) You will be displayed the DNS configuration file.
3) Next, youβll need to type your address in the terminal
>* a 10.0.2.15
4) Check your IP address by typing ifconfig in a new terminal if you donβt already know what it is.
To save changes, press ctrl+x, and press (y) bottom.
Prepare the Apache server
5) Now, we will move our fake security page to a location on the Apache server and run it. You will need to move your fake page to this apache directory.
6) Run the following command to format the HTML directory:
$ Rm /Var/Www/Html/*
7) Next up, youβll need to save your fake security page and upload it to the directory weβve mentioned. Type the following in the terminal to start the upload:
$ mv /root/Desktop/fake.html /var/www/html
8) Now fire up the Apache Server with the following command:
$ sudo service apache2 start
9) Youβll see that the server has successfully launched.
Spoofing with Ettercap addon
Now weβll see how Ettercap would come into play. We will be DNS spoofing with Ettercap.
10) Launch the app by typing:
$ettercap -G
source linux forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦MAN-IN-MIDDLE ATTACK #ForBeginers :
π»π΄π 'π π π π°π π :
Launch the Parrot or Kali Linux machine to get started.
Set up the DNS config file in Ettercap
1) Setup the command terminal and change the DNS configuration of the Ettercap by typing the following syntax into the editor of your choice.
$ gedit /etc/ettercap/etter.dns
2) You will be displayed the DNS configuration file.
3) Next, youβll need to type your address in the terminal
>* a 10.0.2.15
4) Check your IP address by typing ifconfig in a new terminal if you donβt already know what it is.
To save changes, press ctrl+x, and press (y) bottom.
Prepare the Apache server
5) Now, we will move our fake security page to a location on the Apache server and run it. You will need to move your fake page to this apache directory.
6) Run the following command to format the HTML directory:
$ Rm /Var/Www/Html/*
7) Next up, youβll need to save your fake security page and upload it to the directory weβve mentioned. Type the following in the terminal to start the upload:
$ mv /root/Desktop/fake.html /var/www/html
8) Now fire up the Apache Server with the following command:
$ sudo service apache2 start
9) Youβll see that the server has successfully launched.
Spoofing with Ettercap addon
Now weβll see how Ettercap would come into play. We will be DNS spoofing with Ettercap.
10) Launch the app by typing:
$ettercap -G
source linux forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β