Linux for Pentester _ ZIP Privilege Escalation.pdf
515.4 KB
How can we perform Privilege Escalation with Zip command
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦for kali 2020 users #requested
Β» Enable Monitor Mode Using iw:
First, we will take a look at the use of the iw Wi-Fi configuration tool. It is used for configuring Wi-Fi in particular and can be more powerful than other tools. You might have already used iw for several other purposes, for example, to obtain information about your Wi-Fi network. In fact, this tool can even give you more information about different commands. The iw list gives you much more information about wireless wlan0, interface modes, HT, bit rates, scanning, etc.
π»π΄π 'π π π π°π π :
The first step is to check the interface information. You can do so by entering the following:
1) $ sudo iw dev
The output will look like the following window:
To access the traffic of other people, you will have to switch this over to Monitor Mode. You can switch iw to Monitor Mode by entering the commands given below:
2) $ sudo ip link set IFACE down
3) $ sudo iw IFACE set monitor control
4) $ sudo ip link set IFACE up
IFACE replaced the actual name, as shown:
5) $ sudo ip link set wlan0 down
6) $ sudo iw wlan0 set monitor control
7) $ sudo ip link set wlan0 up
The next step is to check the wireless interface one more time by entering the following command:
8) $ sudo iw dev
9) The output of the aforementioned commands can be seen in the window above.
Wondering how to get back to the Managed Mode? To do so, enter the following commands:
10) $ sudo ip link set IFACE down
11) $ sudo iw IFACE set type managed
12) $ sudo ip link set IFACE up
IFACE replaced the actual name, as shown:
13) $ sudo ip link set wlan0 down
14) $ sudo iw wlan0 set type managed
15) $ sudo ip link set wlan0 up
Enable Monitor Mode Using iwconfig
As in previous sections, check your interface name via the following command:
$ sudo iwconfig
The next step is to enable Monitor Mode. Do so by entering the following commands:
$ sudo ifconfig IFACE down
$ sudo iwconfig IFACE mode monitor
$ sudo ifconfig IFACE up
Furthermore,
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode monitor
$ sudo ifconfig wlan0 up
Disable Monitor Mode
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode managed
$ sudo ifconfig wlan0 up
Turn off the Network Manager that Prevents Monitor Mode
$ sudo systemctl stop NetworkManager
π»π΄π 'π π π π°π π :
π¦Another two methode for wifi monitor mode :
You can also via airmon-ng but this methode is recommended
Enable Monitor Mode Using iwconfig
As in previous sections, check your interface name via the following command:
$ sudo iwconfig
The next step is to enable Monitor Mode. Do so by entering the following commands:
$ sudo ifconfig IFACE down
$ sudo iwconfig IFACE mode monitor
$ sudo ifconfig IFACE up
Furthermore,
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode monitor
$ sudo ifconfig wlan0 up
Disable Monitor Mode
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode managed
$ sudo ifconfig wlan0 up
Turn off the Network Manager that Prevents Monitor Mode
$ sudo systemctl stop NetworkManager
source linux forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦for kali 2020 users #requested
Β» Enable Monitor Mode Using iw:
First, we will take a look at the use of the iw Wi-Fi configuration tool. It is used for configuring Wi-Fi in particular and can be more powerful than other tools. You might have already used iw for several other purposes, for example, to obtain information about your Wi-Fi network. In fact, this tool can even give you more information about different commands. The iw list gives you much more information about wireless wlan0, interface modes, HT, bit rates, scanning, etc.
π»π΄π 'π π π π°π π :
The first step is to check the interface information. You can do so by entering the following:
1) $ sudo iw dev
The output will look like the following window:
To access the traffic of other people, you will have to switch this over to Monitor Mode. You can switch iw to Monitor Mode by entering the commands given below:
2) $ sudo ip link set IFACE down
3) $ sudo iw IFACE set monitor control
4) $ sudo ip link set IFACE up
IFACE replaced the actual name, as shown:
5) $ sudo ip link set wlan0 down
6) $ sudo iw wlan0 set monitor control
7) $ sudo ip link set wlan0 up
The next step is to check the wireless interface one more time by entering the following command:
8) $ sudo iw dev
9) The output of the aforementioned commands can be seen in the window above.
Wondering how to get back to the Managed Mode? To do so, enter the following commands:
10) $ sudo ip link set IFACE down
11) $ sudo iw IFACE set type managed
12) $ sudo ip link set IFACE up
IFACE replaced the actual name, as shown:
13) $ sudo ip link set wlan0 down
14) $ sudo iw wlan0 set type managed
15) $ sudo ip link set wlan0 up
Enable Monitor Mode Using iwconfig
As in previous sections, check your interface name via the following command:
$ sudo iwconfig
The next step is to enable Monitor Mode. Do so by entering the following commands:
$ sudo ifconfig IFACE down
$ sudo iwconfig IFACE mode monitor
$ sudo ifconfig IFACE up
Furthermore,
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode monitor
$ sudo ifconfig wlan0 up
Disable Monitor Mode
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode managed
$ sudo ifconfig wlan0 up
Turn off the Network Manager that Prevents Monitor Mode
$ sudo systemctl stop NetworkManager
π»π΄π 'π π π π°π π :
π¦Another two methode for wifi monitor mode :
You can also via airmon-ng but this methode is recommended
Enable Monitor Mode Using iwconfig
As in previous sections, check your interface name via the following command:
$ sudo iwconfig
The next step is to enable Monitor Mode. Do so by entering the following commands:
$ sudo ifconfig IFACE down
$ sudo iwconfig IFACE mode monitor
$ sudo ifconfig IFACE up
Furthermore,
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode monitor
$ sudo ifconfig wlan0 up
Disable Monitor Mode
$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode managed
$ sudo ifconfig wlan0 up
Turn off the Network Manager that Prevents Monitor Mode
$ sudo systemctl stop NetworkManager
source linux forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Change the MAC Address
#forBeginers
In a Kali Linux, it is very easy to spoof the MAC address. This can be done by opening the terminal window in the Kali Linux system. Initially, we will check all of the adapters that are using the ifconfig command, as shown:
1) $ sudo ifconfig
2) $ sudo ifconfig eth0 down
3) Next, we will change the MAC address. This can be done by entering the following command:
$ sudo macchanger -r eth0
4) In this command, the -r flag is used to change the current MAC address to the random MAC address in the network interface of eth0.
In the screenshot above, note that the MAC address has been successfully spoofed. Now, we will turn on the network interface again.
5) This can be done by entering the following command:
$ sudo ifconfig eth0 up
6) Next, it is necessary to check the MAC address again with the help of the ifconfig command:
$ sudo ifconfig
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Change the MAC Address
#forBeginers
In a Kali Linux, it is very easy to spoof the MAC address. This can be done by opening the terminal window in the Kali Linux system. Initially, we will check all of the adapters that are using the ifconfig command, as shown:
1) $ sudo ifconfig
2) $ sudo ifconfig eth0 down
3) Next, we will change the MAC address. This can be done by entering the following command:
$ sudo macchanger -r eth0
4) In this command, the -r flag is used to change the current MAC address to the random MAC address in the network interface of eth0.
In the screenshot above, note that the MAC address has been successfully spoofed. Now, we will turn on the network interface again.
5) This can be done by entering the following command:
$ sudo ifconfig eth0 up
6) Next, it is necessary to check the MAC address again with the help of the ifconfig command:
$ sudo ifconfig
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦2020 Code with Mosh - The Ultimate Data Structures & Algorithms
https://mega.nz/folder/tJAD2QYJ#iGTd0Hi4k3a4kbEcKddTtg
https://mega.nz/folder/tJAD2QYJ#iGTd0Hi4k3a4kbEcKddTtg
mega.nz
3.11 GB folder on MEGA
45 files and 4 subfolders
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACKING WITH Unicornscan:
F E A T U R E S :
-Asynchronous stateless TCP scanning with each of the TCP flags or flag combinations
-Asynchronous protocol-specific UDP scanning
superior interface for measuring a response from a TCP/IP enabled stimulus
-Active and Passive remote OS and application detection
-PCAP file logging and filtering
-capable of sending packets with different OS
-fingerprints than the OS of the host.
-Relational database output for storing the results of your scans
-Customizable module support to fit according to the system being pentested
-Customized data set views.
-Has its TCP/IP stack, a distinguishing feature that sets it apart from other port scanners
-Comes built into Kali Linux, no need to download
π»π΄π 'π π π π°π π :
1) Performing a simple scan with Unicornscan
The most basic scan withUnicornscan allows us to scan a single host IP.
$ sudo unicornscan 192.168.100.35
2) as example :
the key is that it doesnβt use ICMP by default. Out of the ports mentioned, only ports 135,139,445 and 554 are open.
3) Scanning multiple IPs wit Unicornscan
We will make a slight modification in the basic scan syntax to scan multiple hosts, and youβll notice the subtle difference from scan commands we use in nmap and hping. The targets are placed in sequence to initiate scanning:
$ sudo unicornscan 192.168.100.35 192.168.100.45
4) Scanning Class C networks with Unicornscan
$ sudo unicornscan 192.168.100.35/24:31
5) Unicornscan has successfully returned us to all the hosts that have port 31 open. The cool thing about unicornscan is that it doesnβt stop at our network, where speed is a limiting factor.
UDP scanning:
We can also scan for UDP ports with unicornscan. Type:
$ sudo unicornscan -r300 -mU linuxhint.com
6) Saving results to a PCAP file
$ sudo unicornscan 216.1.0.0/8:5505 -r500 -w huntfor5505.pcap
-W1 -s 192.168.100.35
β unix forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACKING WITH Unicornscan:
F E A T U R E S :
-Asynchronous stateless TCP scanning with each of the TCP flags or flag combinations
-Asynchronous protocol-specific UDP scanning
superior interface for measuring a response from a TCP/IP enabled stimulus
-Active and Passive remote OS and application detection
-PCAP file logging and filtering
-capable of sending packets with different OS
-fingerprints than the OS of the host.
-Relational database output for storing the results of your scans
-Customizable module support to fit according to the system being pentested
-Customized data set views.
-Has its TCP/IP stack, a distinguishing feature that sets it apart from other port scanners
-Comes built into Kali Linux, no need to download
π»π΄π 'π π π π°π π :
1) Performing a simple scan with Unicornscan
The most basic scan withUnicornscan allows us to scan a single host IP.
$ sudo unicornscan 192.168.100.35
2) as example :
the key is that it doesnβt use ICMP by default. Out of the ports mentioned, only ports 135,139,445 and 554 are open.
3) Scanning multiple IPs wit Unicornscan
We will make a slight modification in the basic scan syntax to scan multiple hosts, and youβll notice the subtle difference from scan commands we use in nmap and hping. The targets are placed in sequence to initiate scanning:
$ sudo unicornscan 192.168.100.35 192.168.100.45
4) Scanning Class C networks with Unicornscan
$ sudo unicornscan 192.168.100.35/24:31
5) Unicornscan has successfully returned us to all the hosts that have port 31 open. The cool thing about unicornscan is that it doesnβt stop at our network, where speed is a limiting factor.
UDP scanning:
We can also scan for UDP ports with unicornscan. Type:
$ sudo unicornscan -r300 -mU linuxhint.com
6) Saving results to a PCAP file
$ sudo unicornscan 216.1.0.0/8:5505 -r500 -w huntfor5505.pcap
-W1 -s 192.168.100.35
β unix forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦Paid = 80000$ FOR YOUπ€©
EVERY ADOBE PROGRAM | ADOBE SUITE 2020 FULL CRACKS
WHATS INCLUDED HERE:
Adobe Photoshop CC 2020
Adobe Animate CC 2020
Adobe Illustrator CC 2020
Adobe Premiere Pro CC 2020
[extra/new] Primere Rush 2020
Adobe Media Encoder: 2020
Adobe Photoshop Lightroom Classic CC 2020
Adobe After Effects CC 2020
Adobe InDesign CC 2020
Adobe InCopy CC 2020
Adobe Dimension CC 2020
Adobe Audition CC 2020
Adobe Dreamweaver CC 2020
Adobe Character Animator CC 2020
Adobe Photoshop CC 2020 | https://drive.google.com/uc?id=1b1VAYz8mq8gn6uhOUfnSCb7ydsdoIVj5&export=download
Adobe Animate CC 2020 | https://drive.google.com/uc?id=1ARH0MgFijoB6RC2f29vJzZFnoFuVhTxB&export=download
Adobe Illustrator CC 2020 | https://drive.google.com/uc?id=1wFOR8f4nHGUG0nihv9Id4rlwzKYBTX3z&export=download
Adobe Premiere Pro CC 2020 | https://drive.google.com/uc?id=1qyaRufD4gXMl6zMwtD0Tofc6xEuIbNHj&export=download
[extra] [b]Premiere Rush 2020 | [/b]https://drive.google.com/uc?id=1eVet0xZjD85ruG-0oAQm6e_IygwBGCCh&export=download
Adobe Media Encoder: 2020 | https://drive.google.com/uc?id=10SEL8TaxzfTQkQK6a9gslASF20PVnLmz&export=download
Adobe Photoshop Lightroom Classic CC 2020 | https://drive.google.com/uc?id=1W5PwNfCfSqCIEDnrWx6KjPJL_ubWQ8l2&export=download
Adobe After Effects CC 2020 | https://drive.google.com/uc?id=1-yVPlnA4L2Cz70CL32V9V7ST20zRxWch&export=download
Adobe InDesign CC 2020 | https://drive.google.com/uc?id=1XKvDUG8HexPp_p2c7gQAovx6kIc9rf3b&export=download
Adobe InCopy CC 2020 | https://drive.google.com/uc?id=1WVFbkmQq3ZFrNHaqE20uRollFROJZvtz&export=download
Adobe Dimension CC 2020 | [b]https://drive.google.com/uc?id=1r2YJB7z2teF820i3x_gkokhnzrVvYEDi&export=download[/b]
Adobe Audition CC 2020 | https://drive.google.com/uc?id=1bw6F6gYKjXdnqpwj-jV5D2IsXG3fyJmq&export=download
Adobe Dreamweaver CC 2020 | https://drive.google.com/uc?id=1XVQ6lRmQYdBItaVE1SGYMGmexBIqynx7&export=download
Adobe Character Animator CC 2020 | https://drive.google.com/uc?id=1kZLLRQyXsBZZZN66gKjc7aFfDlDC9FzZ&export=download
ENJOYβ€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
EVERY ADOBE PROGRAM | ADOBE SUITE 2020 FULL CRACKS
WHATS INCLUDED HERE:
Adobe Photoshop CC 2020
Adobe Animate CC 2020
Adobe Illustrator CC 2020
Adobe Premiere Pro CC 2020
[extra/new] Primere Rush 2020
Adobe Media Encoder: 2020
Adobe Photoshop Lightroom Classic CC 2020
Adobe After Effects CC 2020
Adobe InDesign CC 2020
Adobe InCopy CC 2020
Adobe Dimension CC 2020
Adobe Audition CC 2020
Adobe Dreamweaver CC 2020
Adobe Character Animator CC 2020
Adobe Photoshop CC 2020 | https://drive.google.com/uc?id=1b1VAYz8mq8gn6uhOUfnSCb7ydsdoIVj5&export=download
Adobe Animate CC 2020 | https://drive.google.com/uc?id=1ARH0MgFijoB6RC2f29vJzZFnoFuVhTxB&export=download
Adobe Illustrator CC 2020 | https://drive.google.com/uc?id=1wFOR8f4nHGUG0nihv9Id4rlwzKYBTX3z&export=download
Adobe Premiere Pro CC 2020 | https://drive.google.com/uc?id=1qyaRufD4gXMl6zMwtD0Tofc6xEuIbNHj&export=download
[extra] [b]Premiere Rush 2020 | [/b]https://drive.google.com/uc?id=1eVet0xZjD85ruG-0oAQm6e_IygwBGCCh&export=download
Adobe Media Encoder: 2020 | https://drive.google.com/uc?id=10SEL8TaxzfTQkQK6a9gslASF20PVnLmz&export=download
Adobe Photoshop Lightroom Classic CC 2020 | https://drive.google.com/uc?id=1W5PwNfCfSqCIEDnrWx6KjPJL_ubWQ8l2&export=download
Adobe After Effects CC 2020 | https://drive.google.com/uc?id=1-yVPlnA4L2Cz70CL32V9V7ST20zRxWch&export=download
Adobe InDesign CC 2020 | https://drive.google.com/uc?id=1XKvDUG8HexPp_p2c7gQAovx6kIc9rf3b&export=download
Adobe InCopy CC 2020 | https://drive.google.com/uc?id=1WVFbkmQq3ZFrNHaqE20uRollFROJZvtz&export=download
Adobe Dimension CC 2020 | [b]https://drive.google.com/uc?id=1r2YJB7z2teF820i3x_gkokhnzrVvYEDi&export=download[/b]
Adobe Audition CC 2020 | https://drive.google.com/uc?id=1bw6F6gYKjXdnqpwj-jV5D2IsXG3fyJmq&export=download
Adobe Dreamweaver CC 2020 | https://drive.google.com/uc?id=1XVQ6lRmQYdBItaVE1SGYMGmexBIqynx7&export=download
Adobe Character Animator CC 2020 | https://drive.google.com/uc?id=1kZLLRQyXsBZZZN66gKjc7aFfDlDC9FzZ&export=download
ENJOYβ€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to prevent systemd-resolved from using port 53 in Ubuntu :
It's worth noting that you can free port 53 by simply uncommenting the DNSStubListener and setting it to no in /etc/systemd/resolved.conf. The rest of the steps are for enabling a DNS server - without it, your system won't be able to resolve any domain names, so you won't be able to visit websites in a web browser, etc.
1) Edit /etc/systemd/resolved.conf with a text editor (as root), for example open it with the Nano console text editor:
> sudo nano /etc/systemd/resolved.conf
2) And uncomment (remove the # from the beginning of the line) the DNS = line and the DNSStubListener = line. Then change the DNS = value in this file to the DNS server you want to use (e.g. 127.0.0.1 to use a local proxy, 1.1.1.1 to use Cloudflare DNS, etc.), and also change the DNSStubListener = value from yes to no.
3) This is how the file should look after you have made these changes (we are using 1.1.1.1 as the DNS server here, i.e. Cloudflare DNS):
[Resolve]
DNS = 1.1.1.1
# FallbackDNS =
# Domains =
# LLMNR = no
# MulticastDNS = no
# DNSSEC = no
# DNSOverTLS = no
# Cache = no
DNSStubListener = no
# ReadEtcHosts = yes
4) To save the file using the Nano text editor , press Ctrl + x, then type y and press Enter.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to prevent systemd-resolved from using port 53 in Ubuntu :
It's worth noting that you can free port 53 by simply uncommenting the DNSStubListener and setting it to no in /etc/systemd/resolved.conf. The rest of the steps are for enabling a DNS server - without it, your system won't be able to resolve any domain names, so you won't be able to visit websites in a web browser, etc.
1) Edit /etc/systemd/resolved.conf with a text editor (as root), for example open it with the Nano console text editor:
> sudo nano /etc/systemd/resolved.conf
2) And uncomment (remove the # from the beginning of the line) the DNS = line and the DNSStubListener = line. Then change the DNS = value in this file to the DNS server you want to use (e.g. 127.0.0.1 to use a local proxy, 1.1.1.1 to use Cloudflare DNS, etc.), and also change the DNSStubListener = value from yes to no.
3) This is how the file should look after you have made these changes (we are using 1.1.1.1 as the DNS server here, i.e. Cloudflare DNS):
[Resolve]
DNS = 1.1.1.1
# FallbackDNS =
# Domains =
# LLMNR = no
# MulticastDNS = no
# DNSSEC = no
# DNSOverTLS = no
# Cache = no
DNSStubListener = no
# ReadEtcHosts = yes
4) To save the file using the Nano text editor , press Ctrl + x, then type y and press Enter.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦LINUX SERVICES :
How to list active services in systemd ?
Systemd services are controlled by the systemctl command. If you run systemctl without any arguments, it calls the default list-units subcommand and lists the different types of system units such as services, sockets, targets, etc.
1) But your goal is to enumerate services so that you specify the device type with the βtype flag, for example:
systemctl --type = service
2) Did you notice that we didn't include the list-units subcommand because it's the default? If you want to follow the convention, you can also indicate that. We prefer it this way, and we will follow this convention for the rest of the article.
systemctl list-units --type = service
3) In both cases, the output will be the same. By default, this command only shows loaded and active services in alphabetical order:
-UNIT LOAD ACTIVE SUB DESCRIPTION
accounts-daemon.service loaded active running Accounts Service
-acpid.service loaded active running ACPI event daemon
alsa-restore.service loaded active exited Save / βRestore Sound Card State apparmor.service loaded active exited Load AppArmor profiles
apport.service loaded active exited LSB: automatic crash report generation
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦LINUX SERVICES :
How to list active services in systemd ?
Systemd services are controlled by the systemctl command. If you run systemctl without any arguments, it calls the default list-units subcommand and lists the different types of system units such as services, sockets, targets, etc.
1) But your goal is to enumerate services so that you specify the device type with the βtype flag, for example:
systemctl --type = service
2) Did you notice that we didn't include the list-units subcommand because it's the default? If you want to follow the convention, you can also indicate that. We prefer it this way, and we will follow this convention for the rest of the article.
systemctl list-units --type = service
3) In both cases, the output will be the same. By default, this command only shows loaded and active services in alphabetical order:
-UNIT LOAD ACTIVE SUB DESCRIPTION
accounts-daemon.service loaded active running Accounts Service
-acpid.service loaded active running ACPI event daemon
alsa-restore.service loaded active exited Save / βRestore Sound Card State apparmor.service loaded active exited Load AppArmor profiles
apport.service loaded active exited LSB: automatic crash report generation
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
Hot Potato.pdf
1.5 MB
Hot potato is the code name of a Windows privilege escalation technique that was discovered by Stephen Breen
Forwarded from WEB UNDERCODE - PRIVATE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Understanding the exit codes for the fsck command #FastTips
This is a list of codes that can be returned from fsck after checking the disk. Your exit code will be the sum of these codes if you analyze one disc. If you use fsck on multiple devices, it will return a bitwise OR of two sums.
0 - no errors
1 - fixed file system errors
2 - the system must be rebooted
4 - Filesystem errors left unpatched
8 - Operational error
16 - usage or syntax error
32 - Fsck canceled at user request
128 - Shared library error
You can check the exit code of the last run command using the echo $? Command.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Understanding the exit codes for the fsck command #FastTips
This is a list of codes that can be returned from fsck after checking the disk. Your exit code will be the sum of these codes if you analyze one disc. If you use fsck on multiple devices, it will return a bitwise OR of two sums.
0 - no errors
1 - fixed file system errors
2 - the system must be rebooted
4 - Filesystem errors left unpatched
8 - Operational error
16 - usage or syntax error
32 - Fsck canceled at user request
128 - Shared library error
You can check the exit code of the last run command using the echo $? Command.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦MAN-IN-MIDDLE ATTACK #ForBeginers :
π»π΄π 'π π π π°π π :
Launch the Parrot or Kali Linux machine to get started.
Set up the DNS config file in Ettercap
1) Setup the command terminal and change the DNS configuration of the Ettercap by typing the following syntax into the editor of your choice.
$ gedit /etc/ettercap/etter.dns
2) You will be displayed the DNS configuration file.
3) Next, youβll need to type your address in the terminal
>* a 10.0.2.15
4) Check your IP address by typing ifconfig in a new terminal if you donβt already know what it is.
To save changes, press ctrl+x, and press (y) bottom.
Prepare the Apache server
5) Now, we will move our fake security page to a location on the Apache server and run it. You will need to move your fake page to this apache directory.
6) Run the following command to format the HTML directory:
$ Rm /Var/Www/Html/*
7) Next up, youβll need to save your fake security page and upload it to the directory weβve mentioned. Type the following in the terminal to start the upload:
$ mv /root/Desktop/fake.html /var/www/html
8) Now fire up the Apache Server with the following command:
$ sudo service apache2 start
9) Youβll see that the server has successfully launched.
Spoofing with Ettercap addon
Now weβll see how Ettercap would come into play. We will be DNS spoofing with Ettercap.
10) Launch the app by typing:
$ettercap -G
source linux forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦MAN-IN-MIDDLE ATTACK #ForBeginers :
π»π΄π 'π π π π°π π :
Launch the Parrot or Kali Linux machine to get started.
Set up the DNS config file in Ettercap
1) Setup the command terminal and change the DNS configuration of the Ettercap by typing the following syntax into the editor of your choice.
$ gedit /etc/ettercap/etter.dns
2) You will be displayed the DNS configuration file.
3) Next, youβll need to type your address in the terminal
>* a 10.0.2.15
4) Check your IP address by typing ifconfig in a new terminal if you donβt already know what it is.
To save changes, press ctrl+x, and press (y) bottom.
Prepare the Apache server
5) Now, we will move our fake security page to a location on the Apache server and run it. You will need to move your fake page to this apache directory.
6) Run the following command to format the HTML directory:
$ Rm /Var/Www/Html/*
7) Next up, youβll need to save your fake security page and upload it to the directory weβve mentioned. Type the following in the terminal to start the upload:
$ mv /root/Desktop/fake.html /var/www/html
8) Now fire up the Apache Server with the following command:
$ sudo service apache2 start
9) Youβll see that the server has successfully launched.
Spoofing with Ettercap addon
Now weβll see how Ettercap would come into play. We will be DNS spoofing with Ettercap.
10) Launch the app by typing:
$ettercap -G
source linux forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is Internal Server Error 500
Every time you open a web page, your browser sends a request to the server that hosts the site, which returns the requested data and a response code. The HTTP response status codes indicate whether the request was successful or not.
The answers are divided into five classes. Codes ranging from 500 to 599 indicate a server error.
The HTTP 500 status code is a generic error response that is returned by the server when another error code does not match. This can be caused by a number of issues that prevent the server from fulfilling the request.
If the page you are visiting throws a 500 error, there is nothing you can do because the error is not caused by your browser or internet connection. Even though the error occurs on the server side, you can try some of the following options:
1) Restart your browser or try using a different one. The chances of the page loading when you refresh your browser are slim, but still worth a try.
2) Try clearing your browser cache. If a page showing a 500 error is cached, after clearing the cache, the browser will ask for a new version of the page.
3) Come back later. In the meantime, the webmaster can fix the server issue.
4) Contact the website owners. The last remaining option is to contact the person in charge of maintaining the website.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is Internal Server Error 500
Every time you open a web page, your browser sends a request to the server that hosts the site, which returns the requested data and a response code. The HTTP response status codes indicate whether the request was successful or not.
The answers are divided into five classes. Codes ranging from 500 to 599 indicate a server error.
The HTTP 500 status code is a generic error response that is returned by the server when another error code does not match. This can be caused by a number of issues that prevent the server from fulfilling the request.
If the page you are visiting throws a 500 error, there is nothing you can do because the error is not caused by your browser or internet connection. Even though the error occurs on the server side, you can try some of the following options:
1) Restart your browser or try using a different one. The chances of the page loading when you refresh your browser are slim, but still worth a try.
2) Try clearing your browser cache. If a page showing a 500 error is cached, after clearing the cache, the browser will ask for a new version of the page.
3) Come back later. In the meantime, the webmaster can fix the server issue.
4) Contact the website owners. The last remaining option is to contact the person in charge of maintaining the website.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦Full 2020 ethical hacking & Security :
https://drive.google.com/drive/folders/1EPG_Dtzs7F0zWEvWkDJat7umvxWGdHwC
https://drive.google.com/drive/folders/1EPG_Dtzs7F0zWEvWkDJat7umvxWGdHwC
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WIFI HACKING APPLICATIONS FOR WINDOWS :
http://www.aircrack-ng.org/
http://sourceforge.net/projects/airsnort/
http://www.oxid.it/cain.html
http://www.kismetwireless.net/
http://www.stumbler.net/
http://www.inssider.com/
https://www.wireshark.org/
http://sourceforge.net/projects/cowpatty/
http://sourceforge.net/projects/airjack/
http://wepattack.sourceforge.net/
http://www.wildpackets.com/products/
distributed_network_analysis/omnipeek_network_analyzer
http://www.tamos.com/products/commwifi/
https://crack.sh/
use For Learn
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WIFI HACKING APPLICATIONS FOR WINDOWS :
http://www.aircrack-ng.org/
http://sourceforge.net/projects/airsnort/
http://www.oxid.it/cain.html
http://www.kismetwireless.net/
http://www.stumbler.net/
http://www.inssider.com/
https://www.wireshark.org/
http://sourceforge.net/projects/cowpatty/
http://sourceforge.net/projects/airjack/
http://wepattack.sourceforge.net/
http://www.wildpackets.com/products/
distributed_network_analysis/omnipeek_network_analyzer
http://www.tamos.com/products/commwifi/
https://crack.sh/
use For Learn
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
sitename
AirSnort
Download AirSnort for free. AirSnort is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11b WEP networks. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.