UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Phishing With a Rogue Wi-Fi Access Point.pdf
3.9 MB
Fast wifi hacking #full with examples & pictures
How to Get and Set Up a Free Windows VM for Malware Analysis.pdf
1.1 MB
How to Get and Set Up a Free Windows VM for Malware Analysis #full with pictures ❤️👍🏻
WinDbg Malware Analysis Cheat Sheet.pdf
2 MB
1) !address List all memory segments in the process with their permissions and memory type. This is similar to the Memory Map in x64dbg.

2) !address [virtual address] List information about the memory segment that contains the virtual address. For example !address 400000 would show information about the section that contains address 0x40000. This is a quick way to find the start and end of a memory segment if you want to dump it.
.writemem [file name] [start address] [end address] Dump memory range to file. For example, .writemem C:

3) \dump.bin 400000 401000 would dump memory starting at 0x40000 and ending at 0x401000 to the dump.bin file.
eb [address] [byte] Enter one byte into memory at the address. For example, eb 400000 0xff would change the byte at address 0x400000 to 0xff. For a full list of enter commands (string, word, etc.) see the Microsoft docs here.

#full with video
From unauthenticated to root on a supervision appliance.pdf
469.9 KB
EyesOfNetwork (“EON”) is the OpenSource solution combining a pragmatic usage of ITIL processes and a technological interface allowing their workaday application. EyesOfNetwork Supervision is the first brick of a range of products targeting to assist IT managment and gouvernance. EyesOfNetwork Supervision provides event management, availability, problems and capacity

#full tutorial + pictures
Big List Of Public Resources For Intelligence (OSINT) .pdf
426.9 KB

Big List Of Public Resources For Intelligence (OSINT)
#full list #requested
Stored Credentials.pdf
402.8 KB
—When an attacker has managed to gain access on a system one of his first moves is to search the entire system in order to discover credentials for the local administrator account which it will allow him to fully compromise the box.
— This is of course the easiest method of escalating privileges in a Windows system and the purpose of this article is to examine some common places of where these credentials might exist in order to assist with this process. Windows Files It is very common for administrators to use Windows Deployment Services in order to create an image of a Windows operating system and deploy this image in various systems through the network. This is called unattended installation. The problem with unattended installations is that the local administrator password is stored in various locations either in plaintext or as Base-64 encoded

#full (commands + pictures)
Comprehensive Guide on Metasploitable 2.pdf
2.4 MB
#full Commands & pictures for beginers

Exploiting Port 22 SSH Bruteforce Port 22 SSH (RSA Method) Exploiting port 23 TELNET (Credential Capture) Exploiting TELNET (Bruteforce) Port 25 SMTP User Enumeration Exploiting Port 80 (PHP) Exploiting Port 139 & 445 (Samba) Exploiting Port 8080 (Java) Exploiting Port 5432 (Postgres) Exploiting Port 6667 (UnrealIRCD) Exploiting Port 36255 Remote Login Exploitation Remote Shell Exploitation Exploiting Port 8787 Bindshell Exploiting Port 5900 (VNC) Access Port 2121 (ProFTPD) Exploiting Port 8180 (Apache Tomcat) Privilege Escalation via NFS Exploiting Port 3306 (MYSQL)Network Scan Exploiting Port 21 FTP (Hydra) Exploiting VSFTPD 2.3.4
enjoy❤️👍🏻
Forwarded from WEB UNDERCODE - PRIVATE
WinDbg Malware Analysis Cheat Sheet.pdf
2 MB
#full + video
Forwarded from WEB UNDERCODE - PRIVATE
Escalating SSRF to RCE.pdf
6.9 MB
#full with pictures
Forwarded from WEB UNDERCODE - PRIVATE
WinDbg Malware Analysis Cheat Sheet.pdf
2 MB
#full + video
Forwarded from WEB UNDERCODE - PRIVATE
HACK ACCOUNTS.pdf
196.5 KB
Dumping #full methode with pictures
malicious.link post snagging-creds-from-locked-machine.pdf
401.9 KB
First o, this is dead simple and shouldn’t work, but it does. Also, there is no possible way that I’m the rst one that has identied this, but here it is (trust me, I tested it so many ways to conrm it because I couldn’t believe it was true) TL;DR USB Ethernet + DHCP + Responder == Creds ... #Full