π¦BIN YOUTUBE PREMIUM
π³: 417170xxxxxxxx00
41717050x3x4xxx1
>CCV/FECHA: RND (Random)
πIP: INDIA
> Direction: Street 54 ,c Block, St Floor, Caption Colony, Opp.cross Road, Tardeo
Ciudad: Mumbai
Estado: Maharashtra
Codigo Postal: 400034
Telefono: 02265828692
(Verified only by undercode)
π³: 417170xxxxxxxx00
41717050x3x4xxx1
>CCV/FECHA: RND (Random)
πIP: INDIA
> Direction: Street 54 ,c Block, St Floor, Caption Colony, Opp.cross Road, Tardeo
Ciudad: Mumbai
Estado: Maharashtra
Codigo Postal: 400034
Telefono: 02265828692
(Verified only by undercode)
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦THIS POST IS FOR PRO USERS A preliminary study of using in Gtk+/GnomeI :
development environment and development tools
1οΈβ£The desktop environment of the common Linux Contribution is internationalized, as long as you modify some configuration files. Realize the display of Chinese characters. Chinese character input has also followed the XIM standard. As long as the client program accepts XIM, the Chinese characters can be input in theory. The key problem is that not all familiar applications support internationalization, and sometimes even the software itself Support, also need to do some setting work.
2οΈβ£My working environment is Mandrake 7.2 and input 3.0 as exmaple recommended to use this old version for Testing
3οΈβ£ The KDE desktop realizes localization. Generally speaking, my editing tool is Vim. If you want to input arabic characters, you need to have a Terminal that supports XIM, rxvt- CLE is a good choice. I think Gnome-Terminal should obviously be able to achieve Chinese character input and output, but I havenβt got it right now. The main problem is I donβt know where to set the fontset, because only in this way can arabic and English mixed display After two days, look at the original code, it should not be difficult to modify.
4οΈβ£The vgraphical editor can use Gedit, and the bluefish I am currently using to write this HTML file. If you want to use your own definition in bluefish Fontset, instead of Gtk+'s default settings, needs to set the fontset variable in ~/.bluefish/rcfile to 1.
5οΈβ£The internationalization of software like Netscape has been done very well. After you set the locale and XIM, the input and output are satisfactory. Of course, you may need to set the font in the configuration file.
π¦Gtk+/Gnome example
/* Use the Chinese example ""base.c"" in gtk+/gnome programming
*
* This code uses gtk+/gnome to generate an editing window, through the system's XIM Server
* Input Chinese characters, the input font uses the definition in this program .
*
* Compilation method:
* gcc -o base base.c ``gnome-config --cflags --libs gnome gtk gnomeui`
*/
#include
/* Macro
* Define your locale at PACKAGE_LOCALE_DIR Location.
* I use Mandrake 7.2, LC_ALL=zh_CN.GB2312
* */
#define PACKAGE ""base""
#define PACKAGE_LOCALE_DIR ""/usr/local/share/locale""
gint delete_event (GtkWidget *widget, GdkEvent *event, gpointer data)
{
g_print(""delete event occerred "");
return(FALSE);
}
void destroy( GtkWidget *widget, gpointer data)
{
gtk_main_quit();
}
int main (int argc, char *argv[])
{
GtkWidget *window;
GtkWidget *text;
/* Variables related to font modification */
GtkStyle *style;
GdkFont *tmpfont;
gchar *fontstring;
/* Set the font to use: Two fonts correspond to English and Chinese respectively.
Modify this sentence according to your Xwindow *, Use fonts recognized by the system.
* Available
* xlsfonts |grep gb
* command to find your Chinese font.
* */
fontstring = ""-*-fixed-medium-r-normal--16-*-*-*- *-*-iso8859-1,-*-simsun-medium-r-normal--16-*-*-*-*-*-gb2312.1980-0"";
/* load locale:
* these two sentences have to*/
bindtextdomain (PACKAGE, PACKAGE_LOCALE_DIR);
textdomain (PACKAGE);
/* Gnome initialization */
gnome_init (PACKAGE, ""0.1"", argc, argv);
window = gtk_window_new (GTK_WINDOW_TOPLEVEL);
gtk_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect)) "",
GTK_SIGNAL_FUNC (delete_event), NULL);
gtk_signal_connect (GTK_OBJECT (window), ""destroy"",
GTK_SIGNAL_FUNC (destroy), NULL);
text = gtk_text_new (NULL, NULL);
/* Set custom font: * /
style = gtk_rc_get_style (GTK_WIDGET(text));
tmpfont = style->font;
if(!(style->font = gdk_fontset_load(fontstring)))
g_print(""fontset_load false "");
gdk_font_unref(tmpfont);
gtk_widget_set_style(GTK_WIDGET(text), style);
gtk_container_add (GTK_CONTAINER (window), text);
gtk_widget_show (text);
gtk_widget_show (window);
gtk_text_set_editable (GTK_TEXT (text), TRUE);
gtk_main ();
return(0);
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦THIS POST IS FOR PRO USERS A preliminary study of using in Gtk+/GnomeI :
development environment and development tools
1οΈβ£The desktop environment of the common Linux Contribution is internationalized, as long as you modify some configuration files. Realize the display of Chinese characters. Chinese character input has also followed the XIM standard. As long as the client program accepts XIM, the Chinese characters can be input in theory. The key problem is that not all familiar applications support internationalization, and sometimes even the software itself Support, also need to do some setting work.
2οΈβ£My working environment is Mandrake 7.2 and input 3.0 as exmaple recommended to use this old version for Testing
3οΈβ£ The KDE desktop realizes localization. Generally speaking, my editing tool is Vim. If you want to input arabic characters, you need to have a Terminal that supports XIM, rxvt- CLE is a good choice. I think Gnome-Terminal should obviously be able to achieve Chinese character input and output, but I havenβt got it right now. The main problem is I donβt know where to set the fontset, because only in this way can arabic and English mixed display After two days, look at the original code, it should not be difficult to modify.
4οΈβ£The vgraphical editor can use Gedit, and the bluefish I am currently using to write this HTML file. If you want to use your own definition in bluefish Fontset, instead of Gtk+'s default settings, needs to set the fontset variable in ~/.bluefish/rcfile to 1.
5οΈβ£The internationalization of software like Netscape has been done very well. After you set the locale and XIM, the input and output are satisfactory. Of course, you may need to set the font in the configuration file.
π¦Gtk+/Gnome example
/* Use the Chinese example ""base.c"" in gtk+/gnome programming
*
* This code uses gtk+/gnome to generate an editing window, through the system's XIM Server
* Input Chinese characters, the input font uses the definition in this program .
*
* Compilation method:
* gcc -o base base.c ``gnome-config --cflags --libs gnome gtk gnomeui`
*/
#include
/* Macro
* Define your locale at PACKAGE_LOCALE_DIR Location.
* I use Mandrake 7.2, LC_ALL=zh_CN.GB2312
* */
#define PACKAGE ""base""
#define PACKAGE_LOCALE_DIR ""/usr/local/share/locale""
gint delete_event (GtkWidget *widget, GdkEvent *event, gpointer data)
{
g_print(""delete event occerred "");
return(FALSE);
}
void destroy( GtkWidget *widget, gpointer data)
{
gtk_main_quit();
}
int main (int argc, char *argv[])
{
GtkWidget *window;
GtkWidget *text;
/* Variables related to font modification */
GtkStyle *style;
GdkFont *tmpfont;
gchar *fontstring;
/* Set the font to use: Two fonts correspond to English and Chinese respectively.
Modify this sentence according to your Xwindow *, Use fonts recognized by the system.
* Available
* xlsfonts |grep gb
* command to find your Chinese font.
* */
fontstring = ""-*-fixed-medium-r-normal--16-*-*-*- *-*-iso8859-1,-*-simsun-medium-r-normal--16-*-*-*-*-*-gb2312.1980-0"";
/* load locale:
* these two sentences have to*/
bindtextdomain (PACKAGE, PACKAGE_LOCALE_DIR);
textdomain (PACKAGE);
/* Gnome initialization */
gnome_init (PACKAGE, ""0.1"", argc, argv);
window = gtk_window_new (GTK_WINDOW_TOPLEVEL);
gtk_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect)) "",
GTK_SIGNAL_FUNC (delete_event), NULL);
gtk_signal_connect (GTK_OBJECT (window), ""destroy"",
GTK_SIGNAL_FUNC (destroy), NULL);
text = gtk_text_new (NULL, NULL);
/* Set custom font: * /
style = gtk_rc_get_style (GTK_WIDGET(text));
tmpfont = style->font;
if(!(style->font = gdk_fontset_load(fontstring)))
g_print(""fontset_load false "");
gdk_font_unref(tmpfont);
gtk_widget_set_style(GTK_WIDGET(text), style);
gtk_container_add (GTK_CONTAINER (window), text);
gtk_widget_show (text);
gtk_widget_show (window);
gtk_text_set_editable (GTK_TEXT (text), TRUE);
gtk_main ();
return(0);
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Tool designed to help identify incorrectly configured Django applications that are exposing sensitive information
Termux-Linux
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£https://github.com/jimywork/djangohunter.git
2οΈβ£cd djangohunter
3οΈβ£pip install -r requirements.txt
(Those are requirements:
Shodan
Pyfiglet
Requests
BeautifulSoup)
4οΈβ£python3 djangohunter.py --key {shodan}
Dorks: 'DisallowedHost', 'KeyError', 'OperationalError', 'Page not found at /'
5οΈβ£More guide about usage :
> https://asciinema.org/a/210648
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Tool designed to help identify incorrectly configured Django applications that are exposing sensitive information
Termux-Linux
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£https://github.com/jimywork/djangohunter.git
2οΈβ£cd djangohunter
3οΈβ£pip install -r requirements.txt
(Those are requirements:
Shodan
Pyfiglet
Requests
BeautifulSoup)
4οΈβ£python3 djangohunter.py --key {shodan}
Dorks: 'DisallowedHost', 'KeyError', 'OperationalError', 'Page not found at /'
5οΈβ£More guide about usage :
> https://asciinema.org/a/210648
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
jimywork/djangohunter
Tool designed to help identify incorrectly configured Django applications that are exposing sensitive information. - jimywork/djangohunter
π¦BIN VYPR VPN VIA PAYPAL
β :
CVV/Fecha : RND (Random)
IP : USA
LINK
β :
515462002xxxxxxx
657368xxxxxxxxxx
CVV/Fecha : RND (Random)
IP : USA
LINK
VyprVPN
The Best VPN Provider for a Private Internet | VyprVPN | VyprVPN
Protect yourself with exclusive features and proprietary technology. VyprVPN is the best VPN for hiding your IP address for streaming, privacy, and more!
π¦Learning Terraform on Microsoft Azure β3.1 GBβ
https://mega.nz/#F!twRihKSY!40uXd-C7Iu2Y7feMvzAp4w
https://mega.nz/#F!twRihKSY!40uXd-C7Iu2Y7feMvzAp4w
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hacker basic knowledge commonly used commands and shortcut keys :
*net user View user list
γγ
*net user username password/add add user
γγ*net user username password change user password
γγ
*net localgroup administrators username/add add user to management group
γγ*net user username/delete delete user
γγ*net user User name to view the basic situation of the
γγuser *net user user name/active:no disable the user
γγ*net user user name/active:yes enable the user
γγ*net share to view the computer IPC$ shared resources
γγ*net share share name to view the share
γγ*net share share name=path setting share. For example, net share c$=c:
γγ*net share share name/delete delete IPC$ share
γγ*net use View IPC$ connection status
γγ*net use //ip/ipc$Content$nbsp;"password" /user:"user name" ipc$
connection
γγ*net time //ip view the time on the remote computer
γγ*copy path: /filename//ip/share name to copy the file to the
computer connected to ipc$
γγ*net view ip view the shared resource on the computer
γγ*ftp Server address Enter FTP server
γγ*at View scheduled jobs on your computer
γγ*at //ip to view the scheduled job on the remote computer
γγ*at //ip time command (note the extra letter) Add a job on the
remote computer
γγ*at //ip scheduled job ID /delete Delete a scheduled job on the
remote computer
γγ*at //ip all /delete delete all scheduled jobs on the remote computer
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hacker basic knowledge commonly used commands and shortcut keys :
*net user View user list
γγ
*net user username password/add add user
γγ*net user username password change user password
γγ
*net localgroup administrators username/add add user to management group
γγ*net user username/delete delete user
γγ*net user User name to view the basic situation of the
γγuser *net user user name/active:no disable the user
γγ*net user user name/active:yes enable the user
γγ*net share to view the computer IPC$ shared resources
γγ*net share share name to view the share
γγ*net share share name=path setting share. For example, net share c$=c:
γγ*net share share name/delete delete IPC$ share
γγ*net use View IPC$ connection status
γγ*net use //ip/ipc$Content$nbsp;"password" /user:"user name" ipc$
connection
γγ*net time //ip view the time on the remote computer
γγ*copy path: /filename//ip/share name to copy the file to the
computer connected to ipc$
γγ*net view ip view the shared resource on the computer
γγ*ftp Server address Enter FTP server
γγ*at View scheduled jobs on your computer
γγ*at //ip to view the scheduled job on the remote computer
γγ*at //ip time command (note the extra letter) Add a job on the
remote computer
γγ*at //ip scheduled job ID /delete Delete a scheduled job on the
remote computer
γγ*at //ip all /delete delete all scheduled jobs on the remote computer
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦WIN 10 SHORTCUT KEYS :
1οΈβ£ Use the shortcut keys of "Windows Explorer"
Purpose shortcut key
If the current selection is expanded, to collapse or select the parent folder left arrow
Fold the selected folder NUM LOCK + minus sign (-)
If the current selection is collapsed, to expand
or select the first subfolder right arrow to
expand All folders under the current selection NUM LOCK+*
Expand the selected folder NUM LOCK+Plus sign (+)
to switch between the left and right panes F6
3. Use the WINDOWS button
You can use the following shortcut keys from the Microsoft Natural Keyboard or any other compatible keyboard that contains the Windows logo key.
Purpose shortcut keys
Cycle through the buttons on the task bar WINDOWS+ TAB
displays "Find: All Files" WINDOWS+ F
displays "Find: Computer" CTRL+ WINDOWS+ F
displays "Help" WINDOWS+ F1
displays the "Run" command WINDOWS+ R
displays the "Start" menu WINDOWS
Display "System Properties" dialog box WINDOWS+ BREAK
Display "Windows Explorer" WINDOWS+ E
Minimize or restore all windows WINDOWS+ D
Undo Minimize all windows SHIFT+ WINDOWS+ M
2οΈβ£Use the shortcut keys of "My Computer" and "Windows Explorer"
Purpose shortcut key
Close the selected folder and all its parent
folders Hold down the SHIFT key and click the "Close button (only applicable to "My Computer")
to move backward to the previous view ALT+Left arrow
Move forward to the previous one View ALT+Right Arrow
View the previous folder BACKSPACE
Five, use the shortcut keys in the dialog box
Purpose shortcut key
Cancel current task ESC
If the current control is a button, click the button or if the current control is a check box, select or clear the check box or if the current control is an option button, click the option space bar
Click the corresponding command ALT + underlined letters
Click the selected button ENTER
Move backward on the option SHIFT + TAB Move backward
on the tab CTRL + SHIFT + TAB
Move forward
on the option TAB Move forward on the tab CTRL + TAB
If you select a folder in the "Save As" or "Open" dialog box, you want to open the previous folder BACKSPACE
in the "Save As" or "Open" dialog box, open "Save To" or "Review" F4
refresh "Save As" or "Open" Dialog F5
Six, use the "Desktop", "My Computer" and "Windows Explorer" shortcut keys
When selecting an item, you can use the following shortcut keys.
Shortcut key for purpose
Don't use the "AutoPlay"
function when inserting a disc. Hold down SHIFT to insert a CD-ROM to
copy files. Hold down CTRL to drag files.
Create a shortcut. Hold down CTRL+SHIFT and drag files
to delete an item immediately without putting it into SHIFT+ DELETE
"Recycle Bin"
displays "find: all files" F3
displays the shortcut menu of the project APPLICATION key
refreshes the contents of the window F5
renames the project F2
selects all projects CTRL+ A
View the properties of the project ALT+ENTER or ALT+double-click
to use the APPLICATION key for Microsoft Natural keyboard or other compatible keys with APPLICATION key
3οΈβ£Shortcut keys for Microsoft magnifier
The combination of the Windows logo key and other keys is used here.
Shortcut key purpose
Windows logo + PRINT SCREEN to copy the screen to the clipboard (including the mouse cursor)
Windows logo + SCROLL LOCK to copy the screen to the clipboard (excluding the mouse cursor)
Windows logo + PAGE UP to switch the reverse color.
Windows logo + PAGE DOWN switch to follow the mouse cursor
Windows logo + up arrow increases magnification
Windows logo + down arrow decreases magnification
Eight, use auxiliary shortcut keys
Purpose shortcut key
Toggle filter key switch Right SHIFT eight seconds
Toggle high contrast switch Left ALT+Left SHIFT+PRINT SCREEN
Toggle mouse key switch Left ALT+Left SHIFT+NUM LOCK
Toggle sticky key switch SHIFT key five times
Toggle switch key NUM LOCK for five seconds
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦WIN 10 SHORTCUT KEYS :
1οΈβ£ Use the shortcut keys of "Windows Explorer"
Purpose shortcut key
If the current selection is expanded, to collapse or select the parent folder left arrow
Fold the selected folder NUM LOCK + minus sign (-)
If the current selection is collapsed, to expand
or select the first subfolder right arrow to
expand All folders under the current selection NUM LOCK+*
Expand the selected folder NUM LOCK+Plus sign (+)
to switch between the left and right panes F6
3. Use the WINDOWS button
You can use the following shortcut keys from the Microsoft Natural Keyboard or any other compatible keyboard that contains the Windows logo key.
Purpose shortcut keys
Cycle through the buttons on the task bar WINDOWS+ TAB
displays "Find: All Files" WINDOWS+ F
displays "Find: Computer" CTRL+ WINDOWS+ F
displays "Help" WINDOWS+ F1
displays the "Run" command WINDOWS+ R
displays the "Start" menu WINDOWS
Display "System Properties" dialog box WINDOWS+ BREAK
Display "Windows Explorer" WINDOWS+ E
Minimize or restore all windows WINDOWS+ D
Undo Minimize all windows SHIFT+ WINDOWS+ M
2οΈβ£Use the shortcut keys of "My Computer" and "Windows Explorer"
Purpose shortcut key
Close the selected folder and all its parent
folders Hold down the SHIFT key and click the "Close button (only applicable to "My Computer")
to move backward to the previous view ALT+Left arrow
Move forward to the previous one View ALT+Right Arrow
View the previous folder BACKSPACE
Five, use the shortcut keys in the dialog box
Purpose shortcut key
Cancel current task ESC
If the current control is a button, click the button or if the current control is a check box, select or clear the check box or if the current control is an option button, click the option space bar
Click the corresponding command ALT + underlined letters
Click the selected button ENTER
Move backward on the option SHIFT + TAB Move backward
on the tab CTRL + SHIFT + TAB
Move forward
on the option TAB Move forward on the tab CTRL + TAB
If you select a folder in the "Save As" or "Open" dialog box, you want to open the previous folder BACKSPACE
in the "Save As" or "Open" dialog box, open "Save To" or "Review" F4
refresh "Save As" or "Open" Dialog F5
Six, use the "Desktop", "My Computer" and "Windows Explorer" shortcut keys
When selecting an item, you can use the following shortcut keys.
Shortcut key for purpose
Don't use the "AutoPlay"
function when inserting a disc. Hold down SHIFT to insert a CD-ROM to
copy files. Hold down CTRL to drag files.
Create a shortcut. Hold down CTRL+SHIFT and drag files
to delete an item immediately without putting it into SHIFT+ DELETE
"Recycle Bin"
displays "find: all files" F3
displays the shortcut menu of the project APPLICATION key
refreshes the contents of the window F5
renames the project F2
selects all projects CTRL+ A
View the properties of the project ALT+ENTER or ALT+double-click
to use the APPLICATION key for Microsoft Natural keyboard or other compatible keys with APPLICATION key
3οΈβ£Shortcut keys for Microsoft magnifier
The combination of the Windows logo key and other keys is used here.
Shortcut key purpose
Windows logo + PRINT SCREEN to copy the screen to the clipboard (including the mouse cursor)
Windows logo + SCROLL LOCK to copy the screen to the clipboard (excluding the mouse cursor)
Windows logo + PAGE UP to switch the reverse color.
Windows logo + PAGE DOWN switch to follow the mouse cursor
Windows logo + up arrow increases magnification
Windows logo + down arrow decreases magnification
Eight, use auxiliary shortcut keys
Purpose shortcut key
Toggle filter key switch Right SHIFT eight seconds
Toggle high contrast switch Left ALT+Left SHIFT+PRINT SCREEN
Toggle mouse key switch Left ALT+Left SHIFT+NUM LOCK
Toggle sticky key switch SHIFT key five times
Toggle switch key NUM LOCK for five seconds
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Windows operating system shortcuts
π¦ALL WINDOWS SHORTCUTS BY UNDERCODE :
F1 displays the help content of the current program or windows.
F2 When you select a file, it means "rename"
F3 When you are on the desktop, open the "Find: All Files" dialog box
F10 or ALT activate the menu bar of the current program
windows key or CTRL+ESC to start Menu
CTRL+ALT+DELETE In win9x, open and close the program dialog
DELETE to delete the selected item, if it is a file, it will be put into the recycle bin
SHIFT+DELETE to delete the selected item, if it is a file, it will be directly deleted Instead of putting it in the recycle bin
CTRL+N Create a new file
CTRL+O Open the "Open File" dialog
CTRL+P Open the "Print" dialog
CTRL+S Save the currently operated file
CTRL+X Cut the selected item To the clipboard
CTRL+INSERT or CTRL+C Copy the selected items to the clipboard
SHIFT+INSERT or CTRL+V Paste in the clipboard What is the nose to
restore?
ALT+BACKSPACE or CTRL+Z Undo the previous operation
ALT +SHIFT+BACKSPACE Redo the operation that was canceled in the
previous step.
Windows key +M Minimize all open windows.
Windows key +CTRL+M will restore the size and position of the window before the last operation
Windows key +E Open Explorer
Windows key +F Open the "Find: All Files" dialog box
Windows key +R Open the "Run" dialog box
Windows key +BREAK Open the "System Properties" dialog box
Windows key +CTRL+F Open the "Find: Computer" dialog box
SHIFT+F10 or right-click to open the shortcut menu of the currently
active item
SHIFT Press and hold when inserting the CD , You can skip automatic CD
playback. Press and hold when opening the word, you can skip the self-
starting macro
ALT+F4 Close the current application
ALT+SPACEBAR Open the menu at the top left corner of the program
ALT+TAB Switch the current program
ALT+ESC Switch the current program
ALT+ENTER will The MSDOS window running under windows switches between the window and the full screen state.
PRINT SCREEN Copy the current screen to the clipboard as an image
ALT+PRINT SCREEN Copy the current active program window to the clipboard as an image
CTRL+F4 Close the current application The current text in the program
(as in word)
CTRL+F6 Switch to the next text in the current application (plus shift can jump to the previous window)
in IE:
ALT+RIGHT ARROW displays the previous page (forward key)
ALT+LEFT ARROW displays the next page (back key)
CTRL+TAB to switch between the frames on the page (plus shift reverse)
F5 refresh
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Windows operating system shortcuts
π¦ALL WINDOWS SHORTCUTS BY UNDERCODE :
F1 displays the help content of the current program or windows.
F2 When you select a file, it means "rename"
F3 When you are on the desktop, open the "Find: All Files" dialog box
F10 or ALT activate the menu bar of the current program
windows key or CTRL+ESC to start Menu
CTRL+ALT+DELETE In win9x, open and close the program dialog
DELETE to delete the selected item, if it is a file, it will be put into the recycle bin
SHIFT+DELETE to delete the selected item, if it is a file, it will be directly deleted Instead of putting it in the recycle bin
CTRL+N Create a new file
CTRL+O Open the "Open File" dialog
CTRL+P Open the "Print" dialog
CTRL+S Save the currently operated file
CTRL+X Cut the selected item To the clipboard
CTRL+INSERT or CTRL+C Copy the selected items to the clipboard
SHIFT+INSERT or CTRL+V Paste in the clipboard What is the nose to
restore?
ALT+BACKSPACE or CTRL+Z Undo the previous operation
ALT +SHIFT+BACKSPACE Redo the operation that was canceled in the
previous step.
Windows key +M Minimize all open windows.
Windows key +CTRL+M will restore the size and position of the window before the last operation
Windows key +E Open Explorer
Windows key +F Open the "Find: All Files" dialog box
Windows key +R Open the "Run" dialog box
Windows key +BREAK Open the "System Properties" dialog box
Windows key +CTRL+F Open the "Find: Computer" dialog box
SHIFT+F10 or right-click to open the shortcut menu of the currently
active item
SHIFT Press and hold when inserting the CD , You can skip automatic CD
playback. Press and hold when opening the word, you can skip the self-
starting macro
ALT+F4 Close the current application
ALT+SPACEBAR Open the menu at the top left corner of the program
ALT+TAB Switch the current program
ALT+ESC Switch the current program
ALT+ENTER will The MSDOS window running under windows switches between the window and the full screen state.
PRINT SCREEN Copy the current screen to the clipboard as an image
ALT+PRINT SCREEN Copy the current active program window to the clipboard as an image
CTRL+F4 Close the current application The current text in the program
(as in word)
CTRL+F6 Switch to the next text in the current application (plus shift can jump to the previous window)
in IE:
ALT+RIGHT ARROW displays the previous page (forward key)
ALT+LEFT ARROW displays the next page (back key)
CTRL+TAB to switch between the frames on the page (plus shift reverse)
F5 refresh
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦All Destination shortcut win 10 :
γγActivate the menu bar F10 in the program to
γγ
execute the corresponding command on the menu ALT + underlined letters on the menu γγclose the current window
γγin the multi-document interface program
γγCTRL + F4
close the current window or exit the program ALT + F4
γγcopy CTRL + C
γγcut CTRL + X
γγdelete DELETE
γγdisplay Help for the selected dialog box item F1
γγdisplays the system menu of the current window ALT+Spacebar
γγdisplays the shortcut menu of the selected item SHIFT+ F10
γγdisplays the "Start" menu CTRL+ ESC
γγdisplays the system of the multi-document interface program
γγmenu ALT+hyphen (-)
γγpastes CTR L+ V
γγSwitch to the last used window or
γγhold down ALT and then press TAB repeatedly,
γγswitch to another window ALT+TAB
γγundo CTRL+Z
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦All Destination shortcut win 10 :
γγActivate the menu bar F10 in the program to
γγ
execute the corresponding command on the menu ALT + underlined letters on the menu γγclose the current window
γγin the multi-document interface program
γγCTRL + F4
close the current window or exit the program ALT + F4
γγcopy CTRL + C
γγcut CTRL + X
γγdelete DELETE
γγdisplay Help for the selected dialog box item F1
γγdisplays the system menu of the current window ALT+Spacebar
γγdisplays the shortcut menu of the selected item SHIFT+ F10
γγdisplays the "Start" menu CTRL+ ESC
γγdisplays the system of the multi-document interface program
γγmenu ALT+hyphen (-)
γγpastes CTR L+ V
γγSwitch to the last used window or
γγhold down ALT and then press TAB repeatedly,
γγswitch to another window ALT+TAB
γγundo CTRL+Z
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦LAN Intrusion Complete Edition by Undercode :
First declare:
γγ1. The scope of the intrusion only includes the local area network, if it is in the school, it can invade the entire campus network;
γγ2. The only thing that can be invaded is the existence of a weak password (the user name is administrator, etc., the password is blank), and port 139 is opened, But the machine without the firewall.
π¦γγIntrusion tools:
γγgenerally need to use three: NTscan metamorphic scanner, Recton-D free anti-killing version, DameWare mini Chinese version 4.5. (The first two tools antivirus software will report poison, it is recommended to temporarily turn off real-time antivirus antivirus software And encrypt the compressed packages of these two software to prevent being killed.)
π¦γγInvasion steps:
γγ1. Use "NTscan metamorphic scanner", fill in the IP range to be scanned in the IP, select "WMI scan" method, press After "Start", wait for the scan result.
γγ2. Use "Recton--D Special Edition" to
γγselect the "CMD command" item, and enter "net share C$=C:\" in "CMD:" to open the C drive sharing of the remote host. Change "C" to D, E, F, etc., you can open the sharing of D drive, E drive, F drive, etc. This sharing method is highly concealed, and it is completely shared, and will not appear on the other host. Hold the shared logo of the disk with one hand and enter "\\Party IP\C$" in the address bar to enter the other party's C drive.
γγSelect the "Telnet" item, enter the IP just scanned in the "Remote Host", remotely start the Telnet service, after successful, in the "CMD Options", execute the command: "net share ipc$", then execute: "net share admin$", and finally execute "net use \*.
γγ3. Use "DameWare Mini Chinese Version 4.5", click "DameWare Mini Remote Control" after installation, select the activation product in the "Help" item, enter the registration information, and after successful registration, enter the "Remote Connection" window, in the "Host" Fill in the IP address, click "Settings", click "Edit" in the "Service Installation Options", remove the "Notify when connecting" in the "Notification Dialog", and deselect none of the "Additional Settings". Remove "Enable User Options Menu" in User Options. After the settings are completed, you can click "Connect", click "OK" in the pop-up dialog box, after success, you can control other people's computers like operating your own machine, of course, you can also just choose to monitor the other party's screen. Note: If you don't register, a dialog box will pop up on the host to reveal your identity.
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦LAN Intrusion Complete Edition by Undercode :
First declare:
γγ1. The scope of the intrusion only includes the local area network, if it is in the school, it can invade the entire campus network;
γγ2. The only thing that can be invaded is the existence of a weak password (the user name is administrator, etc., the password is blank), and port 139 is opened, But the machine without the firewall.
π¦γγIntrusion tools:
γγgenerally need to use three: NTscan metamorphic scanner, Recton-D free anti-killing version, DameWare mini Chinese version 4.5. (The first two tools antivirus software will report poison, it is recommended to temporarily turn off real-time antivirus antivirus software And encrypt the compressed packages of these two software to prevent being killed.)
π¦γγInvasion steps:
γγ1. Use "NTscan metamorphic scanner", fill in the IP range to be scanned in the IP, select "WMI scan" method, press After "Start", wait for the scan result.
γγ2. Use "Recton--D Special Edition" to
γγselect the "CMD command" item, and enter "net share C$=C:\" in "CMD:" to open the C drive sharing of the remote host. Change "C" to D, E, F, etc., you can open the sharing of D drive, E drive, F drive, etc. This sharing method is highly concealed, and it is completely shared, and will not appear on the other host. Hold the shared logo of the disk with one hand and enter "\\Party IP\C$" in the address bar to enter the other party's C drive.
γγSelect the "Telnet" item, enter the IP just scanned in the "Remote Host", remotely start the Telnet service, after successful, in the "CMD Options", execute the command: "net share ipc$", then execute: "net share admin$", and finally execute "net use \*.
γγ3. Use "DameWare Mini Chinese Version 4.5", click "DameWare Mini Remote Control" after installation, select the activation product in the "Help" item, enter the registration information, and after successful registration, enter the "Remote Connection" window, in the "Host" Fill in the IP address, click "Settings", click "Edit" in the "Service Installation Options", remove the "Notify when connecting" in the "Notification Dialog", and deselect none of the "Additional Settings". Remove "Enable User Options Menu" in User Options. After the settings are completed, you can click "Connect", click "OK" in the pop-up dialog box, after success, you can control other people's computers like operating your own machine, of course, you can also just choose to monitor the other party's screen. Note: If you don't register, a dialog box will pop up on the host to reveal your identity.
one allowed to clone our tutorials)@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦The following are the six major database attacks:
1. Strong (or non-strong) cracking of weak passwords or default usernames and passwords
2. Elevation of privileges
3. Exploitation of unused and unwanted database services and vulnerabilities in functions
4. Targeting unpatched database vulnerabilities
5.SQL injection
6. steal tape backup (unencrypted)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦The following are the six major database attacks:
1. Strong (or non-strong) cracking of weak passwords or default usernames and passwords
2. Elevation of privileges
3. Exploitation of unused and unwanted database services and vulnerabilities in functions
4. Targeting unpatched database vulnerabilities
5.SQL injection
6. steal tape backup (unencrypted)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Wifi Post Exploitation on Remote PC.pdf
4.6 MB
Wifi Post Exploitation on Remote PC
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦What is the A5 encryption algorithm?
1οΈβ£The A5 algorithm was developed by the French in 1989. It is a serial cipher algorithm mainly used in the GSM system. The A5 encryption algorithm is used to encrypt the communication connection from the mobile phone to the base station. The algorithm has three versions, A5/1, A5/2, and A5/3.
2οΈβ£ If not specified, the commonly referred to as A5 refers to Is A5/1. Regarding the issue of GSM encryption, some people believe that the security of passwords will hinder the promotion of GSM phones; others believe that the strength of the A5 encryption algorithm is too weak to resist eavesdropping by some intelligence agencies.
3οΈβ£A5 encryption algorithm is characterized by high efficiency, suitable for efficient implementation on hardware, and it can also pass known statistical tests.
4οΈβ£In short, the basic idea of ββthe A5 encryption algorithm is not a problem, and its execution efficiency is very high. But from the perspective of cryptography and security, this algorithm has many security problems
written by Undercode powered by wiki
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦What is the A5 encryption algorithm?
1οΈβ£The A5 algorithm was developed by the French in 1989. It is a serial cipher algorithm mainly used in the GSM system. The A5 encryption algorithm is used to encrypt the communication connection from the mobile phone to the base station. The algorithm has three versions, A5/1, A5/2, and A5/3.
2οΈβ£ If not specified, the commonly referred to as A5 refers to Is A5/1. Regarding the issue of GSM encryption, some people believe that the security of passwords will hinder the promotion of GSM phones; others believe that the strength of the A5 encryption algorithm is too weak to resist eavesdropping by some intelligence agencies.
3οΈβ£A5 encryption algorithm is characterized by high efficiency, suitable for efficient implementation on hardware, and it can also pass known statistical tests.
4οΈβ£In short, the basic idea of ββthe A5 encryption algorithm is not a problem, and its execution efficiency is very high. But from the perspective of cryptography and security, this algorithm has many security problems
written by Undercode powered by wiki
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Use and unneeded database services and features unused #vulnerabilities :
γ> An external attacker will look for weak database passwords, see its potential Is the victim running the listener function on their Oracle database? The listener can search out the network connection to the Oracle database, and can forward the connection, so that the link between the user and the database will be exposed.
> γγWith just a few Google hacking attacks, an attacker can search and find the listeners exposed on the database service. Markovich said, "Many customers do not set a password on the listener, so hackers can search for the string and find the listener active on the Web. I just searched and found that there are some things that can attract peopleβs attention, such as Government sites. This is indeed a big problem."
>γOther features, such as the hook between the operating system and the database, can expose the database to attackers. This hook can become a communication link to the database.
-When you link the library and write the program... that will become the interface with the database," you are exposing the database and may allow hackers to enter inside without authentication and authorization.
> Usually, the database administrator does not shut down unnecessary services. Julian said, "They just leave it alone. This design is outdated and management can't keep up. This is the easiest way to make it work. Unwanted services exist in the infrastructure, which will make your Vulnerabilities are exposed."The
> key is to keep the database features streamlined and install only what you have to use. Don't need anything else. Markovich said, "Any feature can be used to deal with you, so only install what you need. If you have not deployed a feature, you do not need to patch it later."
written @UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Use and unneeded database services and features unused #vulnerabilities :
γ> An external attacker will look for weak database passwords, see its potential Is the victim running the listener function on their Oracle database? The listener can search out the network connection to the Oracle database, and can forward the connection, so that the link between the user and the database will be exposed.
> γγWith just a few Google hacking attacks, an attacker can search and find the listeners exposed on the database service. Markovich said, "Many customers do not set a password on the listener, so hackers can search for the string and find the listener active on the Web. I just searched and found that there are some things that can attract peopleβs attention, such as Government sites. This is indeed a big problem."
>γOther features, such as the hook between the operating system and the database, can expose the database to attackers. This hook can become a communication link to the database.
-When you link the library and write the program... that will become the interface with the database," you are exposing the database and may allow hackers to enter inside without authentication and authorization.
> Usually, the database administrator does not shut down unnecessary services. Julian said, "They just leave it alone. This design is outdated and management can't keep up. This is the easiest way to make it work. Unwanted services exist in the infrastructure, which will make your Vulnerabilities are exposed."The
> key is to keep the database features streamlined and install only what you have to use. Don't need anything else. Markovich said, "Any feature can be used to deal with you, so only install what you need. If you have not deployed a feature, you do not need to patch it later."
written @UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#HackersToday
> Ordinary hackers can complete a data attack in less than 10 seconds from entry to exit. This time is almost insufficient for database administrators even if they notice an intruder. Therefore, many database attacks were not noticed by the organization until the data was damaged for a long time.
> Strangely, according to the introduction of many experts, as the base of the "crown" of the enterprise, the database has not been properly secured in many enterprises. Malicious hackers are using very simple attack methods to enter the database, such as the use of weak passwords and imprecise configuration, and the use of unpatched known vulnerabilities.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#HackersToday
> Ordinary hackers can complete a data attack in less than 10 seconds from entry to exit. This time is almost insufficient for database administrators even if they notice an intruder. Therefore, many database attacks were not noticed by the organization until the data was damaged for a long time.
> Strangely, according to the introduction of many experts, as the base of the "crown" of the enterprise, the database has not been properly secured in many enterprises. Malicious hackers are using very simple attack methods to enter the database, such as the use of weak passwords and imprecise configuration, and the use of unpatched known vulnerabilities.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β