β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§5 best CLI tools for finding words using regular expressions:
1) Grep command
First of all comes the utility tool grep, which stands for Global Regular Expression Print, a powerful command line tool that comes in handy when searching for a specific string or pattern in a file.
Grep comes by default with modern Linux distributions and gives you the ability to return different search results.
With grep, you can perform a wide variety of functions such as:
Search for strings or matching patterns in the file.
Search for strings or matching patterns in Gzip files.
Count the number of string matches.
Print line numbers containing a string or pattern.
Recursive search for a string in directories.
Perform a reverse search (that is, display results for rows that do not match your search criteria).
Ignore case sensitivity when searching for strings.
The syntax for using the grep command is pretty simple:
$ grep pattern FILE
For example, to find the string "itsecforu" in a file, say hello.txt, ignoring case, run the command:
$ grep -i itsecforu hello.txt
2) sed command
Sed, short for Stream Editor, is another useful command line tool for manipulating text in a text file.
Sed searches, filters, and replaces lines in a given file in a non-interactive way.
By default, the sed command prints the output to STDOUT (standard output), implying that the output is written to the terminal rather than saved to a file.
The Sed command is invoked as follows:
$ sed -OPTIONS command [file]
For example, to replace all instances of "Unix" with "Linux", issue the command:
$ sed 's / Unix / Linux' hello.txt
If you want to redirect the output rather than display it on the terminal, use the redirection sign (>) as follows:
$ sed 's / Unix / Linux' hello.txt> output.txt
The output of the command will be saved in the file output.txt, rather than being printed to the screen.
Check the man pages again for other options that you can use.
$ man sed
3) Team Ack
Ack is a fast and portable command line tool written in Perl.
Ack is considered a convenient replacement for grep, and displays results in a visually appealing form.
The Ack command searches a file or directory for strings that match the search criteria.
Then it highlights the corresponding line.
Ack has the ability to differentiate between files based on their extensions and, to a certain extent, the content in the files.
Ack command syntax:
$ ack [options] PATTERN [FILE ...]
$ ack -f [options] [DIRECTORY ...]
For example, to find the word itsecforu, run:
$ ack itsecforu hello.txt
To install ask on your system, run the command:
$ sudo apt install ack-grep [On Debian / Ubuntu]
$ sudo dnf install ack-grep [On CentOS / RHEL]
4) Team Awk
Awk is a complete scripting language, word processing and data manipulation tool.
It looks for files or programs that contain a search pattern.
When a string or pattern is found, awk performs the action on the match or string and prints the results to STDOUT.
The AWK pattern is enclosed in curly braces, and the entire program is enclosed in single quotes.
Let's take the simplest example.
Suppose you are displaying your system date as shown below:
$ date
Suppose you only want to display the first value, that is, the day of the week.
In this case, pipe the output to awk as shown below:
$ date | awk '{print $ 1}'
To display subsequent values, separate them with a comma, as shown below:
$ date | awk '{print $ 1, $ 2}'
The above command will display the day of the week and date .
5) Silver Searcher
Silver Searcher is a cross-platform open source code search tool similar to ack but with a focus on speed.
It makes it easy to find a specific string in files in no time at all:
$ ag OPTIONS search_pattern / path / to / file
For example, to find the string "Linux" in hello.txt, run the command:
$ ag Linux hello.txt
For additional options:
$ man ag
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§5 best CLI tools for finding words using regular expressions:
1) Grep command
First of all comes the utility tool grep, which stands for Global Regular Expression Print, a powerful command line tool that comes in handy when searching for a specific string or pattern in a file.
Grep comes by default with modern Linux distributions and gives you the ability to return different search results.
With grep, you can perform a wide variety of functions such as:
Search for strings or matching patterns in the file.
Search for strings or matching patterns in Gzip files.
Count the number of string matches.
Print line numbers containing a string or pattern.
Recursive search for a string in directories.
Perform a reverse search (that is, display results for rows that do not match your search criteria).
Ignore case sensitivity when searching for strings.
The syntax for using the grep command is pretty simple:
$ grep pattern FILE
For example, to find the string "itsecforu" in a file, say hello.txt, ignoring case, run the command:
$ grep -i itsecforu hello.txt
2) sed command
Sed, short for Stream Editor, is another useful command line tool for manipulating text in a text file.
Sed searches, filters, and replaces lines in a given file in a non-interactive way.
By default, the sed command prints the output to STDOUT (standard output), implying that the output is written to the terminal rather than saved to a file.
The Sed command is invoked as follows:
$ sed -OPTIONS command [file]
For example, to replace all instances of "Unix" with "Linux", issue the command:
$ sed 's / Unix / Linux' hello.txt
If you want to redirect the output rather than display it on the terminal, use the redirection sign (>) as follows:
$ sed 's / Unix / Linux' hello.txt> output.txt
The output of the command will be saved in the file output.txt, rather than being printed to the screen.
Check the man pages again for other options that you can use.
$ man sed
3) Team Ack
Ack is a fast and portable command line tool written in Perl.
Ack is considered a convenient replacement for grep, and displays results in a visually appealing form.
The Ack command searches a file or directory for strings that match the search criteria.
Then it highlights the corresponding line.
Ack has the ability to differentiate between files based on their extensions and, to a certain extent, the content in the files.
Ack command syntax:
$ ack [options] PATTERN [FILE ...]
$ ack -f [options] [DIRECTORY ...]
For example, to find the word itsecforu, run:
$ ack itsecforu hello.txt
To install ask on your system, run the command:
$ sudo apt install ack-grep [On Debian / Ubuntu]
$ sudo dnf install ack-grep [On CentOS / RHEL]
4) Team Awk
Awk is a complete scripting language, word processing and data manipulation tool.
It looks for files or programs that contain a search pattern.
When a string or pattern is found, awk performs the action on the match or string and prints the results to STDOUT.
The AWK pattern is enclosed in curly braces, and the entire program is enclosed in single quotes.
Let's take the simplest example.
Suppose you are displaying your system date as shown below:
$ date
Suppose you only want to display the first value, that is, the day of the week.
In this case, pipe the output to awk as shown below:
$ date | awk '{print $ 1}'
To display subsequent values, separate them with a comma, as shown below:
$ date | awk '{print $ 1, $ 2}'
The above command will display the day of the week and date .
5) Silver Searcher
Silver Searcher is a cross-platform open source code search tool similar to ack but with a focus on speed.
It makes it easy to find a specific string in files in no time at all:
$ ag OPTIONS search_pattern / path / to / file
For example, to find the string "Linux" in hello.txt, run the command:
$ ag Linux hello.txt
For additional options:
$ man ag
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Too much hacker news & security warning in T.me/UndercodeNews, if you interested join
follow Undercode News:
Twitter.com/UndercodeNews
Fb.com/UndercodeNews
instagram.com/UndercodeNews
follow Undercode News:
Twitter.com/UndercodeNews
Fb.com/UndercodeNews
instagram.com/UndercodeNews
Telegram
UNDERCODE NEWS
Daily News, Hacking News, Tech News, Analytiques and more...
For Updates: UndercodeNews.com
instagram.com/UndercodeNews
Twitter.com/UndercodeNews
For Support: Support@UndercodeNews.com
For Feedback: Feedback@UndercodeNews.com
More:
undercode.help
For Updates: UndercodeNews.com
instagram.com/UndercodeNews
Twitter.com/UndercodeNews
For Support: Support@UndercodeNews.com
For Feedback: Feedback@UndercodeNews.com
More:
undercode.help
Forwarded from UNDERCODE COMMUNITY
Presentation_Social_Engineering.pdf
3.4 MB
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME INTERESTING HACKING COURSES FROM YOUTUBE
1) 9 hours hacking
https://www.youtube.com/watch?v=dz7Ntp7KQGA
2) 1 HOUR BURPSUITE :
https://www.youtube.com/watch?v=vKudm1kDu8k
3) 14 HOURS HACKING :
https://www.youtube.com/watch?v=3Kq1MIfTWCE
4) 40 MINUTES MOBILE HACKING :
https://www.youtube.com/watch?v=3XUo7UBn28o
5) 24 MINUTES jAVA Course Objects& Classes
https://youtu.be/84hGoR9HjAY
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME INTERESTING HACKING COURSES FROM YOUTUBE
1) 9 hours hacking
https://www.youtube.com/watch?v=dz7Ntp7KQGA
2) 1 HOUR BURPSUITE :
https://www.youtube.com/watch?v=vKudm1kDu8k
3) 14 HOURS HACKING :
https://www.youtube.com/watch?v=3Kq1MIfTWCE
4) 40 MINUTES MOBILE HACKING :
https://www.youtube.com/watch?v=3XUo7UBn28o
5) 24 MINUTES jAVA Course Objects& Classes
https://youtu.be/84hGoR9HjAY
β β β Uππ»βΊπ«Δπ¬πβ β β β
YouTube
Ethical Hacking Full Course - Learn Ethical Hacking in 10 Hours | Ethical Hacking Tutorial | Edureka
π₯Certified Ethical Hacking Course - CEH v12 Training : https://www.edureka.co/ceh-ethical-hacking-certification-course
π₯CompTIA Security+ Certification Training: https://www.edureka.co/comptia-security-plus-certification-training
This Edureka video on "Ethicalβ¦
π₯CompTIA Security+ Certification Training: https://www.edureka.co/comptia-security-plus-certification-training
This Edureka video on "Ethicalβ¦
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Install Xrdp Server (Remote Desktop) on Ubuntu 20.04 :
1) Install a Desktop Environment
Unless you are using Ubuntu for desktop (in which case you may ignore this step), you will need to download an externally available desktop environment to get started. For this demonstration, Gnome will be used as the desktop environment, as it is the default environment for newer versions of Ubuntu. So, this guide will be easy to follow for those who are already using an Ubuntu desktop.
$ sudo apt update
$ sudo apt install ubuntu-desktop
2) Install Xrdp
To download and install Xrdp from the standard Ubuntu repositories, enter the following command:
$ sudo apt install xrdp
Verify the install by entering the following command:
$ sudo systemctl status xrdp
3) There is a file in the /etc/ssl/private/ directory named ssl-cert-snakeoil.key that is fundamental to the functions of the Xrdp services. This file must be made readable for an xrdp user. To do so, use the following command:
$ sudo adduser xrdp ssl-cert
4) To make these modifications permanent, reboot the Xrdp service:
$ sudo systemctl restart xrdp
5) Getting Started with Xrdp
Configuring Firewall with Xrdp
We will now open up the Xrdp port, which is port 3389, by configuring the firewall. Enter the following command to allow access from a certain IP range:
$ sudo ufw allow from 192.168.33.0/24 to any port 3389
π¦Connect to the Xrdp Server (for Windows OS)
With the installation and firewall configurations taken care of, you may now connect to the Xrdp server. The following steps show you how to connect to the Xrdp server:
1) Head over to the windows search bar.
Type in βremote.β
2) Select βRemote Desktop Connectionβ to load the RDP client.
3) Navigate to the field labeled βcomputer.β
4) Paste the server IP address.
5) Hit the connect button.
6) The login screen will display, into which you will put your user credentials.
7) Click βok.β
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Install Xrdp Server (Remote Desktop) on Ubuntu 20.04 :
1) Install a Desktop Environment
Unless you are using Ubuntu for desktop (in which case you may ignore this step), you will need to download an externally available desktop environment to get started. For this demonstration, Gnome will be used as the desktop environment, as it is the default environment for newer versions of Ubuntu. So, this guide will be easy to follow for those who are already using an Ubuntu desktop.
$ sudo apt update
$ sudo apt install ubuntu-desktop
2) Install Xrdp
To download and install Xrdp from the standard Ubuntu repositories, enter the following command:
$ sudo apt install xrdp
Verify the install by entering the following command:
$ sudo systemctl status xrdp
3) There is a file in the /etc/ssl/private/ directory named ssl-cert-snakeoil.key that is fundamental to the functions of the Xrdp services. This file must be made readable for an xrdp user. To do so, use the following command:
$ sudo adduser xrdp ssl-cert
4) To make these modifications permanent, reboot the Xrdp service:
$ sudo systemctl restart xrdp
5) Getting Started with Xrdp
Configuring Firewall with Xrdp
We will now open up the Xrdp port, which is port 3389, by configuring the firewall. Enter the following command to allow access from a certain IP range:
$ sudo ufw allow from 192.168.33.0/24 to any port 3389
π¦Connect to the Xrdp Server (for Windows OS)
With the installation and firewall configurations taken care of, you may now connect to the Xrdp server. The following steps show you how to connect to the Xrdp server:
1) Head over to the windows search bar.
Type in βremote.β
2) Select βRemote Desktop Connectionβ to load the RDP client.
3) Navigate to the field labeled βcomputer.β
4) Paste the server IP address.
5) Hit the connect button.
6) The login screen will display, into which you will put your user credentials.
7) Click βok.β
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The connotation of safety :
#fAStTips
The security of the system includes the following aspects:
β Protect various resources in the system from natural and man-made damage;
β‘ Estimate various threats in the operating system and its special
problems;
β’ Effective development and implementation security policies to minimize the risks faced by the system;
β£ prepare appropriate contingency measures to enable the system to return to normal as soon as the destruction or attacks;
β€ regularly check the implementation of various security management measures.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The connotation of safety :
#fAStTips
The security of the system includes the following aspects:
β Protect various resources in the system from natural and man-made damage;
β‘ Estimate various threats in the operating system and its special
problems;
β’ Effective development and implementation security policies to minimize the risks faced by the system;
β£ prepare appropriate contingency measures to enable the system to return to normal as soon as the destruction or attacks;
β€ regularly check the implementation of various security management measures.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Communication line and network security
#FastTips
Such as:
- destroy or delete the message,
- read the message, watch the message and its transmission mode
- change, delay, reorder or copy, forge the message
π¦System security features
Different computer operating systems have different security requirements, but in general the system should have the following characteristics:
(1) Confidentiality (Security) is accessed by authorized persons
(2) Integrity is changed by authorized persons
(3) ) Availability (Availability) Available to authorized persons
(3) Reliability (Authenticity) Can verify the user's identity
π¦Security threats-threat source
The threats to the security of computer systems mainly come from the following three aspects:
(1) accidental
(2) natural disasters
(3) man-made attacks-active threats
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Communication line and network security
#FastTips
Such as:
- destroy or delete the message,
- read the message, watch the message and its transmission mode
- change, delay, reorder or copy, forge the message
π¦System security features
Different computer operating systems have different security requirements, but in general the system should have the following characteristics:
(1) Confidentiality (Security) is accessed by authorized persons
(2) Integrity is changed by authorized persons
(3) ) Availability (Availability) Available to authorized persons
(3) Reliability (Authenticity) Can verify the user's identity
π¦Security threats-threat source
The threats to the security of computer systems mainly come from the following three aspects:
(1) accidental
(2) natural disasters
(3) man-made attacks-active threats
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Functions involved in operating system security
β User identification.
β‘ Memory protection.
β’ File and I/O device access control.
β£ Carry out distribution and access control to general entities, and implement certain control and protection on them.
β€ Sharing constraints.
β₯ While considering the security mechanism of the operating system, it is also necessary to ensure that system users enjoy fair services without permanent waiting services; it is also necessary to ensure that the operating system provides timely responses for process synchronization and asynchronous communication.
π¦Confidential and secure operating system design principles
The design principle of the safe OS, the
least privilege, the least privilege, the economy of the general security mechanism, the open design, the security strategy, the integrity of the
privilege separation
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Functions involved in operating system security
β User identification.
β‘ Memory protection.
β’ File and I/O device access control.
β£ Carry out distribution and access control to general entities, and implement certain control and protection on them.
β€ Sharing constraints.
β₯ While considering the security mechanism of the operating system, it is also necessary to ensure that system users enjoy fair services without permanent waiting services; it is also necessary to ensure that the operating system provides timely responses for process synchronization and asynchronous communication.
π¦Confidential and secure operating system design principles
The design principle of the safe OS, the
least privilege, the least privilege, the economy of the general security mechanism, the open design, the security strategy, the integrity of the
privilege separation
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Basic technology to realize system security
All ways for Login to your account = Authentication mechanism
1) Password
Confirm a user's identity symbol string of
security passwords: the brute-force attack is not feasible, the system restricts access to the plaintext password table, encrypted password file
2) Illegally obtaining passwords
exhaustive experience try search system password table, asking the user program interception, dictionary / A Probability search
< to select a password
character type, length, to avoid the conventional word, the secret password protection, one-time password
3) encryption password
for Password/password file encryption, traditional encryption method, one-way encryption method
4) Problems
with password authentication mechanism Trojan Horse (Trojan Horse)
Like malicious programs such as viruses and worms, Trojan Horses also delete or modify files, format hard drives, upload and download files, harass users, and expel other malicious programs. Program
Trojan horses also have their unique characteristics-stealing content, remote control-which makes them the most dangerous malware.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Basic technology to realize system security
All ways for Login to your account = Authentication mechanism
1) Password
Confirm a user's identity symbol string of
security passwords: the brute-force attack is not feasible, the system restricts access to the plaintext password table, encrypted password file
2) Illegally obtaining passwords
exhaustive experience try search system password table, asking the user program interception, dictionary / A Probability search
< to select a password
character type, length, to avoid the conventional word, the secret password protection, one-time password
3) encryption password
for Password/password file encryption, traditional encryption method, one-way encryption method
4) Problems
with password authentication mechanism Trojan Horse (Trojan Horse)
Like malicious programs such as viruses and worms, Trojan Horses also delete or modify files, format hard drives, upload and download files, harass users, and expel other malicious programs. Program
Trojan horses also have their unique characteristics-stealing content, remote control-which makes them the most dangerous malware.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to detect a hidden Trojan ?
the status of the Trojan in communication
1) When you browse a website, it is normal that some advertisement windows pop up Things, but if you didn't open the browser at all, and the browser suddenly opened by itself and entered a certain website, then you have to be careful.
2) You are operating a computer, and suddenly a warning box or a question box pops up, asking some questions you have never touched on the computer.
3) Your Windows system configuration is always automatically and inexplicably changed. For example, the text displayed on the screensaver, time and date, sound size, mouse sensitivity, and CD-ROM automatic operation configuration.
4) The hard disk always reads the disk for no reason, the floppy drive light often turns on by itself, and the network connection and mouse screen appear abnormal.
π¦Emergency measures after infection
1) All accounts and passwords must be changed immediately, such as dial-up connection, ICQ, mIRC, FTP, your personal site, free email, etc., wherever a password is required, you must change the password Change it as soon as possible.
2) Delete all the things that did not exist on your hard disk.
3) Antivirus, check whether there is a virus on the hard disk once.
Written by
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to detect a hidden Trojan ?
the status of the Trojan in communication
1) When you browse a website, it is normal that some advertisement windows pop up Things, but if you didn't open the browser at all, and the browser suddenly opened by itself and entered a certain website, then you have to be careful.
2) You are operating a computer, and suddenly a warning box or a question box pops up, asking some questions you have never touched on the computer.
3) Your Windows system configuration is always automatically and inexplicably changed. For example, the text displayed on the screensaver, time and date, sound size, mouse sensitivity, and CD-ROM automatic operation configuration.
4) The hard disk always reads the disk for no reason, the floppy drive light often turns on by itself, and the network connection and mouse screen appear abnormal.
π¦Emergency measures after infection
1) All accounts and passwords must be changed immediately, such as dial-up connection, ICQ, mIRC, FTP, your personal site, free email, etc., wherever a password is required, you must change the password Change it as soon as possible.
2) Delete all the things that did not exist on your hard disk.
3) Antivirus, check whether there is a virus on the hard disk once.
Written by
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β