β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is Shell? Understand the concept of Shell in 1 minute! #ForBeginers
> The operating systems we use now (Windows, Mac OS, Android , iOS, etc.) are all with a graphical interface, simple and intuitive, easy to use, for professional users (programmers, network managers, etc.) and ordinary users (housewives, elderly, etc.) ) Are very applicable; the popularity of computers is inseparable from the graphical interface.
> However, in the early days of computers, there was no graphical interface. We could only control the computer through commands one by one. There are hundreds of these commands, not to mention that it is very difficult to remember these commands. "Black screen" itself is a boring thing; computers at this time are far from being cool and popular, and only professionals can use it.
> the only thing that can control the computer hardware (CPU, memory, display, etc.) is the kernel of the operating system. The graphical interface and the command line are just a bridge between the user and the kernel.
If you do not understand the role of the operating system, please go to " What is an operating system ".
Due to security, complexity, cumbersome and other reasons, users cannot directly access the kernel (not necessary), and need to develop another program to allow users to directly use this program; the function of the program is to receive user operations (click on the icon, enter commands) , And perform simple processing, and then pass to the kernel, so that users can indirectly use the operating system kernel. You see, adding a layer of "agent" between the user and the kernel can not only simplify the user's operation, but also ensure the security of the kernel. Why not?
> The user interface and command line are this separately developed program, which is the "agent". Under Linux, this command line program is called Shell .
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is Shell? Understand the concept of Shell in 1 minute! #ForBeginers
> The operating systems we use now (Windows, Mac OS, Android , iOS, etc.) are all with a graphical interface, simple and intuitive, easy to use, for professional users (programmers, network managers, etc.) and ordinary users (housewives, elderly, etc.) ) Are very applicable; the popularity of computers is inseparable from the graphical interface.
> However, in the early days of computers, there was no graphical interface. We could only control the computer through commands one by one. There are hundreds of these commands, not to mention that it is very difficult to remember these commands. "Black screen" itself is a boring thing; computers at this time are far from being cool and popular, and only professionals can use it.
> the only thing that can control the computer hardware (CPU, memory, display, etc.) is the kernel of the operating system. The graphical interface and the command line are just a bridge between the user and the kernel.
If you do not understand the role of the operating system, please go to " What is an operating system ".
Due to security, complexity, cumbersome and other reasons, users cannot directly access the kernel (not necessary), and need to develop another program to allow users to directly use this program; the function of the program is to receive user operations (click on the icon, enter commands) , And perform simple processing, and then pass to the kernel, so that users can indirectly use the operating system kernel. You see, adding a layer of "agent" between the user and the kernel can not only simplify the user's operation, but also ensure the security of the kernel. Why not?
> The user interface and command line are this separately developed program, which is the "agent". Under Linux, this command line program is called Shell .
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
Testing_initial_access_with_Generate_Macro_in_Atomic_Red_Team.pdf
1.3 MB
Imagine youβre a criminal and you want to gain access to someone elseβs computer. How would you do it? Statistically speaking, thereβs a strong chance that youβd send an email message with an attachment concealing a malicious macro. Aer all, is consistently among spearphishing attachment (T1193) the most prevalent ATT&CKβ’ techniques we observe in our detections.
Forwarded from WEB UNDERCODE - PRIVATE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Streamer scanner tutorial :
"Streamer" software can detect various vulnerabilities such as POP3, FTP, HTTP, SQL, SMTP, and IPC$, and design different cracking schemes for various vulnerabilities, and can easily obtain the detected user password on a vulnerable system. Today I will explore the mystery of "Streamer" software with everyone.
1) First, install the streamer scanner on the computer, and pay attention to the decompression password when decompressing
download : http://prog3.com/sbdm/download/tag/%E6%B5%81%E5%85%89 (chineese hacking)
2) After the installation is complete, we follow its prompts to enter the main program page, where we can see many services in the taskbar. At the beginning, we can see many weak SA passwords by entering the scanned network segment , Or a weak FTP password, or an empty connection for IPC
3) We can see the FTP server used by the other party's machine, so we can provide us with host analysis
4) When scanning, we can add a dictionary to decipher weak passwords,
5) In the options, we will see a lot of services including connection options, system settings, we can perform the services we need
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Streamer scanner tutorial :
"Streamer" software can detect various vulnerabilities such as POP3, FTP, HTTP, SQL, SMTP, and IPC$, and design different cracking schemes for various vulnerabilities, and can easily obtain the detected user password on a vulnerable system. Today I will explore the mystery of "Streamer" software with everyone.
1) First, install the streamer scanner on the computer, and pay attention to the decompression password when decompressing
download : http://prog3.com/sbdm/download/tag/%E6%B5%81%E5%85%89 (chineese hacking)
2) After the installation is complete, we follow its prompts to enter the main program page, where we can see many services in the taskbar. At the beginning, we can see many weak SA passwords by entering the scanned network segment , Or a weak FTP password, or an empty connection for IPC
3) We can see the FTP server used by the other party's machine, so we can provide us with host analysis
4) When scanning, we can add a dictionary to decipher weak passwords,
5) In the options, we will see a lot of services including connection options, system settings, we can perform the services we need
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is a Trojan horse and its 6 characteristics :
1) Does not generate icons.
Although the Trojan will run automatically when your system starts, it will not generate an icon in the "task bar". This is easy to understand, otherwise If you see an icon of unknown origin in the taskbar, you canβt be suspicious!
2) Trojan horse programs are automatically hidden in the task manager and deceive the operating system by means of "system services".
3) Has automatic operation.
The Trojan is in order to control the server. It must follow the startup when the system starts, so it must be embedded in your startup configuration files, such as win.ini, system.ini, winstart.bat, and startup groups.
4) Contains programs with undisclosed functions that may have dangerous consequences.
5) With automatic recovery function.
Nowadays, the function modules in many Trojan horse programs are no longer composed of a single file, but have multiple backups that can be mutually restored. When you delete one of them, thinking that everything is fine and running other programs, who knows it appears quietly again. Like a ghost, it's impossible to guard against.
6) Can automatically open special ports.
The purpose of the Trojan horse program in your computer is not to destroy your system, but to obtain useful information in your system. When you are online, you can communicate with remote clients, so that the Trojan horse program will use the server The communication method of the corpse client informs the hackers so that the hackers can control your machine or carry out further invasion attempts. Do you know how many ports your computer has? Don't you know? Tell you not to be scared: According to the TCP/IP protocol, each computer can have 256 times 256 ports, that is, "doors" from 0 to 65535, but There are only a few that we commonly use. Trojans often use these ports that we don't use much to connect to, opening the door to convenience.
7) The particularity of function.
Common Trojan horse functions are very special. In addition to ordinary file operations, some Trojan horses have the ability to search for passwords in the cache, set passwords, scan the IP address of the target robot, perform keyboard recording, remote registry operations, and lock the mouse, etc. Features. Of course, the remote control software mentioned above will not have these functions. After all, the remote control software is used to control the remote machine for easy operation, not to hack the other party's machine.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is a Trojan horse and its 6 characteristics :
1) Does not generate icons.
Although the Trojan will run automatically when your system starts, it will not generate an icon in the "task bar". This is easy to understand, otherwise If you see an icon of unknown origin in the taskbar, you canβt be suspicious!
2) Trojan horse programs are automatically hidden in the task manager and deceive the operating system by means of "system services".
3) Has automatic operation.
The Trojan is in order to control the server. It must follow the startup when the system starts, so it must be embedded in your startup configuration files, such as win.ini, system.ini, winstart.bat, and startup groups.
4) Contains programs with undisclosed functions that may have dangerous consequences.
5) With automatic recovery function.
Nowadays, the function modules in many Trojan horse programs are no longer composed of a single file, but have multiple backups that can be mutually restored. When you delete one of them, thinking that everything is fine and running other programs, who knows it appears quietly again. Like a ghost, it's impossible to guard against.
6) Can automatically open special ports.
The purpose of the Trojan horse program in your computer is not to destroy your system, but to obtain useful information in your system. When you are online, you can communicate with remote clients, so that the Trojan horse program will use the server The communication method of the corpse client informs the hackers so that the hackers can control your machine or carry out further invasion attempts. Do you know how many ports your computer has? Don't you know? Tell you not to be scared: According to the TCP/IP protocol, each computer can have 256 times 256 ports, that is, "doors" from 0 to 65535, but There are only a few that we commonly use. Trojans often use these ports that we don't use much to connect to, opening the door to convenience.
7) The particularity of function.
Common Trojan horse functions are very special. In addition to ordinary file operations, some Trojan horses have the ability to search for passwords in the cache, set passwords, scan the IP address of the target robot, perform keyboard recording, remote registry operations, and lock the mouse, etc. Features. Of course, the remote control software mentioned above will not have these functions. After all, the remote control software is used to control the remote machine for easy operation, not to hack the other party's machine.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
Linux Exploit Development.pdf
92.7 KB
Forwarded from WEB UNDERCODE - PRIVATE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HOW TO GET 1K MOBILE HACKING TUTORIALS :
1) Read it on Gitbook(https://github.com/OWASP/owasp-mstg) . The book is automatically synchronized with the main repo.
2) Check the releases. Here you can find a PDF, an archive containing the sources, and a DocX document for any given tagged version. Please note that the documents are generated automatically per tag.
3) Get the book as a printed version. A hardcopy of the book can be ordered via lulu.com. This version of the book is not completely aligned with book printing standards, but we are improving each version. If you recognize any issues or mistakes, even small ones, please raise an issue so we can fix it in the next version.
4) Get the e-book. The book is available for free, but you can choose to purchase it at a price of your choice if you wish to support our project. All funds raised through sales of the e-book go directly into the project budget and will be used to fund the production of future releases.
5) Clone the repository and run the document generator (requires Docker). This produces the PDF, Epub, Mobi, and DOCX in the root of the MSTG folder.
$ git clone https://github.com/OWASP/owasp-mstg/
$ cd owasp-mstg/
$ ./tools/docker/run_docker_mstg_generation_on_local.sh
6) Just check the latest build of the repository at Github actions. This offers you the latest SNAPSHOT version of the document to download.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HOW TO GET 1K MOBILE HACKING TUTORIALS :
1) Read it on Gitbook(https://github.com/OWASP/owasp-mstg) . The book is automatically synchronized with the main repo.
2) Check the releases. Here you can find a PDF, an archive containing the sources, and a DocX document for any given tagged version. Please note that the documents are generated automatically per tag.
3) Get the book as a printed version. A hardcopy of the book can be ordered via lulu.com. This version of the book is not completely aligned with book printing standards, but we are improving each version. If you recognize any issues or mistakes, even small ones, please raise an issue so we can fix it in the next version.
4) Get the e-book. The book is available for free, but you can choose to purchase it at a price of your choice if you wish to support our project. All funds raised through sales of the e-book go directly into the project budget and will be used to fund the production of future releases.
5) Clone the repository and run the document generator (requires Docker). This produces the PDF, Epub, Mobi, and DOCX in the root of the MSTG folder.
$ git clone https://github.com/OWASP/owasp-mstg/
$ cd owasp-mstg/
$ ./tools/docker/run_docker_mstg_generation_on_local.sh
6) Just check the latest build of the repository at Github actions. This offers you the latest SNAPSHOT version of the document to download.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - OWASP/mastg: The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app securityβ¦
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWA...
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A GOOD PROXIES LIST :
http://travelvpn.info
http://www.proxy-2014.com
http://anonymouse.org
http://surf-for-free.com
http://greatestfreeproxy.com
https://www.crazyproxy.org
http://websurfproxy.me
http://viewyoutube.net
http://www.unblockmyweb.com
http://youserver.nu
https://www.mehide.asia
http://fastusaproxy.com
http://canadaproxy.info
http://justunblockit.com
http://proxyinternet.info
http://webproxyfree.net
https://www.extremeproxy.us
http://krproxy.info
http://hostapp.eu
https://funproxy.net
http://zendproxy.com
https://www.networkbypass.com
http://dzhot.us
https://www.proxypirate.co.uk
http://www.zalmos.com
https://www.proxytube.info
http://interncloud.info
http://proxy4freedom.com
https://www.sslproxy.org.uk
http://vpnbrowse.com
http://proxys.pw
http://www.phproxysite.com
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A GOOD PROXIES LIST :
http://travelvpn.info
http://www.proxy-2014.com
http://anonymouse.org
http://surf-for-free.com
http://greatestfreeproxy.com
https://www.crazyproxy.org
http://websurfproxy.me
http://viewyoutube.net
http://www.unblockmyweb.com
http://youserver.nu
https://www.mehide.asia
http://fastusaproxy.com
http://canadaproxy.info
http://justunblockit.com
http://proxyinternet.info
http://webproxyfree.net
https://www.extremeproxy.us
http://krproxy.info
http://hostapp.eu
https://funproxy.net
http://zendproxy.com
https://www.networkbypass.com
http://dzhot.us
https://www.proxypirate.co.uk
http://www.zalmos.com
https://www.proxytube.info
http://interncloud.info
http://proxy4freedom.com
https://www.sslproxy.org.uk
http://vpnbrowse.com
http://proxys.pw
http://www.phproxysite.com
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
Practical PLC Programming (PLC II) β1.66 GBβ
https://mega.nz/#F!igcEkCAI!Ml8NqStrX3jFiep_kFT1qg
π¦Process Visualization with HMI / SCADA (PLC III) 4.03 GB
https://mega.nz/#F!Ot8mwKJS!S3gGUemgM7cgF59zru7K2Q
https://mega.nz/#F!igcEkCAI!Ml8NqStrX3jFiep_kFT1qg
π¦Process Visualization with HMI / SCADA (PLC III) 4.03 GB
https://mega.nz/#F!Ot8mwKJS!S3gGUemgM7cgF59zru7K2Q
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Website provides Paid vcc :
https://myvcc.biz/
https://dreamweavervcc.com/
https://entropay.com/
https://ezzocard.com/
https://supervcc.com/
https://egiftcards24.com/
https://instavcc.com/
http://vccguru.com/
https://wirexapp.com/
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Website provides Paid vcc :
https://myvcc.biz/
https://dreamweavervcc.com/
https://entropay.com/
https://ezzocard.com/
https://supervcc.com/
https://egiftcards24.com/
https://instavcc.com/
http://vccguru.com/
https://wirexapp.com/
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NEW TERMUX PACKAGES :
aircrack-ng yes pkg install root-repo
pkg
bettercap yes pkg install root-repo
pkg install bettercap
metasploit no pkg install unstable-repo
pkg install metasploit
nmap recommended pkg install nmap
tshark yes pkg install root-repo
pkg install tshark
sqlmap no pkg install unstable-repo
pkg install sqlmap
wireshark-gtk yes pkg install x11-repo
pkg install wireshark-gtk
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NEW TERMUX PACKAGES :
aircrack-ng yes pkg install root-repo
pkg
bettercap yes pkg install root-repo
pkg install bettercap
metasploit no pkg install unstable-repo
pkg install metasploit
nmap recommended pkg install nmap
tshark yes pkg install root-repo
pkg install tshark
sqlmap no pkg install unstable-repo
pkg install sqlmap
wireshark-gtk yes pkg install x11-repo
pkg install wireshark-gtk
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Analysis of the OpenSSL program concept and the "heart bleeding" vulnerability that shocked the industry
Public key/private key/signature/verify signature/encryption/decryption/asymmetric encryption
1) Our general encryption is to use a password to encrypt a file, and then decrypt it with the same password. This is easy to understand, this is a symmetric encryption.
2) In some encryption, one password is used for encryption, and another set of passwords is used for decryption. This is called Asymmetric encryption means that the encryption and decryption passwords are not the same.
3) People who are in contact for the first time may not understand it anyway. In fact, this is an application of the principle of mathematics for the product of prime numbers. If you must understand, Baidu has a big You can see a lot of data, and the result is to use one of this set of keys to encrypt data, and you can use the other to unlock it.
4) Yes, yes, both public and private keys can be used to encrypt data. The other is to unlock, the public key encrypts the data, and then the private key decrypts it is called encryption and decryption, the private key encrypts the data, and the public key decryption is generally called signature and verification signature.
5) Because the data encrypted by the public key can only be unlocked by its corresponding private key, you can give the public key to the person and the person, and let him encrypt the data he wants to send to you. This data can only reach you with the private key. , It can be unlocked into useful data. Others get it and understand the content. Similarly, if you sign the data with your private key, then this data can only be unlocked by the paired public key. There is this private key. The key is only you, so if the paired public key unlocks the data, it means that the data was sent by you, on the contrary, it is not. This is called a signature.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Analysis of the OpenSSL program concept and the "heart bleeding" vulnerability that shocked the industry
Public key/private key/signature/verify signature/encryption/decryption/asymmetric encryption
1) Our general encryption is to use a password to encrypt a file, and then decrypt it with the same password. This is easy to understand, this is a symmetric encryption.
2) In some encryption, one password is used for encryption, and another set of passwords is used for decryption. This is called Asymmetric encryption means that the encryption and decryption passwords are not the same.
3) People who are in contact for the first time may not understand it anyway. In fact, this is an application of the principle of mathematics for the product of prime numbers. If you must understand, Baidu has a big You can see a lot of data, and the result is to use one of this set of keys to encrypt data, and you can use the other to unlock it.
4) Yes, yes, both public and private keys can be used to encrypt data. The other is to unlock, the public key encrypts the data, and then the private key decrypts it is called encryption and decryption, the private key encrypts the data, and the public key decryption is generally called signature and verification signature.
5) Because the data encrypted by the public key can only be unlocked by its corresponding private key, you can give the public key to the person and the person, and let him encrypt the data he wants to send to you. This data can only reach you with the private key. , It can be unlocked into useful data. Others get it and understand the content. Similarly, if you sign the data with your private key, then this data can only be unlocked by the paired public key. There is this private key. The key is only you, so if the paired public key unlocks the data, it means that the data was sent by you, on the contrary, it is not. This is called a signature.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦ 2020 Cyber Security Awareness - Malware Explained
https://mega.nz/folder/ap0RTbIS#R3flkOZ7o-N9JIxwP5Yjfw
1. Introduction
https://mega.nz/folder/u1lFFLTT#wfhjchscdbcKKEedRN65kg
2. Malware Background
https://mega.nz/folder/jh9nHJhL#900EX1GSgkLc58Yha0mLlw
3. Malware Risks and Implications
https://mega.nz/folder/XgsFFZqa#cryB6zIx9sQBzGUQe2K8cA
4. Protection from Malware
https://mega.nz/folder/CltDRTDR#PJgoE3zSv8H9kDGgu9fLdQ
5. Wrapping Up
https://mega.nz/folder/LtkDWJYB#Yv59y2fHHpcSNr6bePfsZQ
https://mega.nz/folder/ap0RTbIS#R3flkOZ7o-N9JIxwP5Yjfw
1. Introduction
https://mega.nz/folder/u1lFFLTT#wfhjchscdbcKKEedRN65kg
2. Malware Background
https://mega.nz/folder/jh9nHJhL#900EX1GSgkLc58Yha0mLlw
3. Malware Risks and Implications
https://mega.nz/folder/XgsFFZqa#cryB6zIx9sQBzGUQe2K8cA
4. Protection from Malware
https://mega.nz/folder/CltDRTDR#PJgoE3zSv8H9kDGgu9fLdQ
5. Wrapping Up
https://mega.nz/folder/LtkDWJYB#Yv59y2fHHpcSNr6bePfsZQ
mega.nz
83.64 MB folder on MEGA
16 files and 5 subfolders
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FOR ANY REAL WIFI HACKING -TERMUX
HOW TTO Acquiring monitor mode on device?
Running command "airodump-ng mon0" (SSIDs/MACs are censored).
You will need an utility "iw" to be installed which lately will be used to modify Wi-Fi module configuration:
1) pkg upgrade
2) pkg install root-repo
3) pkg install iw
4) Plug in the Wi-Fi USB stick and execute next command:
5) iw phy phy1 interface add mon0 type monitor
6) There shouldn't be any error if kernel is properly configured and drivers support monitor mode.
7) To check whether monitor mode is active, use iw dev.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FOR ANY REAL WIFI HACKING -TERMUX
HOW TTO Acquiring monitor mode on device?
Running command "airodump-ng mon0" (SSIDs/MACs are censored).
You will need an utility "iw" to be installed which lately will be used to modify Wi-Fi module configuration:
1) pkg upgrade
2) pkg install root-repo
3) pkg install iw
4) Plug in the Wi-Fi USB stick and execute next command:
5) iw phy phy1 interface add mon0 type monitor
6) There shouldn't be any error if kernel is properly configured and drivers support monitor mode.
7) To check whether monitor mode is active, use iw dev.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Microsoft regards modifying HOSTS to block Win10 telemetry data as a serious security risk
#Vulnerabilities
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Evilnum hackers use new Python-based Trojan to attack financial companies
#Malwares
#Malwares