UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HACKING WITH Unicornscan:

F E A T U R E S :

-Asynchronous stateless TCP scanning with each of the TCP flags or flag combinations

-Asynchronous protocol-specific UDP scanning
superior interface for measuring a response from a TCP/IP enabled stimulus

-Active and Passive remote OS and application detection

-PCAP file logging and filtering

-capable of sending packets with different OS

-fingerprints than the OS of the host.

-Relational database output for storing the results of your scans

-Customizable module support to fit according to the system being pentested

-Customized data set views.

-Has its TCP/IP stack, a distinguishing feature that sets it apart from other port scanners

-Comes built into Kali Linux, no need to download

πŸ„»πŸ„΄πŸ…ƒ'πŸ…‚ πŸ…‚πŸ…ƒπŸ„°πŸ…πŸ…ƒ :

1) Performing a simple scan with Unicornscan
The most basic scan withUnicornscan allows us to scan a single host IP.

$ sudo unicornscan 192.168.100.35

2) as example :
the key is that it doesn’t use ICMP by default. Out of the ports mentioned, only ports 135,139,445 and 554 are open.

3) Scanning multiple IPs wit Unicornscan
We will make a slight modification in the basic scan syntax to scan multiple hosts, and you’ll notice the subtle difference from scan commands we use in nmap and hping. The targets are placed in sequence to initiate scanning:

$ sudo unicornscan 192.168.100.35 192.168.100.45

4) Scanning Class C networks with Unicornscan

$ sudo unicornscan 192.168.100.35/24:31


5) Unicornscan has successfully returned us to all the hosts that have port 31 open. The cool thing about unicornscan is that it doesn’t stop at our network, where speed is a limiting factor.
UDP scanning:
We can also scan for UDP ports with unicornscan. Type:

$ sudo unicornscan -r300 -mU linuxhint.com

6) Saving results to a PCAP file

$ sudo unicornscan 216.1.0.0/8:5505 -r500 -w huntfor5505.pcap
-W1 -s 192.168.100.35

βœ…unix forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
Escalating SSRF to RCE.pdf
6.9 MB
#full with pictures
Forwarded from WEB UNDERCODE - PRIVATE
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to prevent systemd-resolved from using port 53 in Ubuntu :

It's worth noting that you can free port 53 by simply uncommenting the DNSStubListener and setting it to no in /etc/systemd/resolved.conf. The rest of the steps are for enabling a DNS server - without it, your system won't be able to resolve any domain names, so you won't be able to visit websites in a web browser, etc.

1) Edit /etc/systemd/resolved.conf with a text editor (as root), for example open it with the Nano console text editor:

> sudo nano /etc/systemd/resolved.conf

2) And uncomment (remove the # from the beginning of the line) the DNS = line and the DNSStubListener = line. Then change the DNS = value in this file to the DNS server you want to use (e.g. 127.0.0.1 to use a local proxy, 1.1.1.1 to use Cloudflare DNS, etc.), and also change the DNSStubListener = value from yes to no.

3) This is how the file should look after you have made these changes (we are using 1.1.1.1 as the DNS server here, i.e. Cloudflare DNS):

[Resolve]
DNS = 1.1.1.1
# FallbackDNS =
# Domains =
# LLMNR = no
# MulticastDNS = no
# DNSSEC = no
# DNSOverTLS = no
# Cache = no
DNSStubListener = no
# ReadEtcHosts = yes


4) To save the file using the Nano text editor , press Ctrl + x, then type y and press Enter.

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘LINUX SERVICES :
How to list active services in systemd
?

Systemd services are controlled by the systemctl command. If you run systemctl without any arguments, it calls the default list-units subcommand and lists the different types of system units such as services, sockets, targets, etc.

1) But your goal is to enumerate services so that you specify the device type with the –type flag, for example:

systemctl --type = service

2) Did you notice that we didn't include the list-units subcommand because it's the default? If you want to follow the convention, you can also indicate that. We prefer it this way, and we will follow this convention for the rest of the article.

systemctl list-units --type = service

3) In both cases, the output will be the same. By default, this command only shows loaded and active services in alphabetical order:

-UNIT LOAD ACTIVE SUB DESCRIPTION
accounts-daemon.service loaded active running Accounts Service
-acpid.service loaded active running ACPI event daemon
alsa-restore.service loaded active exited Save / β€”Restore Sound Card State apparmor.service loaded active exited Load AppArmor profiles
apport.service loaded active exited LSB: automatic crash report generation

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
Hot Potato.pdf
1.5 MB
Hot potato is the code name of a Windows privilege escalation technique that was discovered by Stephen Breen
Forwarded from WEB UNDERCODE - PRIVATE
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Understanding the exit codes for the fsck command #FastTips
This is a list of codes that can be returned from fsck after checking the disk. Your exit code will be the sum of these codes if you analyze one disc. If you use fsck on multiple devices, it will return a bitwise OR of two sums.

0 - no errors

1 - fixed file system errors

2 - the system must be rebooted

4 - Filesystem errors left unpatched

8 - Operational error

16 - usage or syntax error

32 - Fsck canceled at user request

128 - Shared library error

You can check the exit code of the last run command using the echo $? Command.



▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘MAN-IN-MIDDLE ATTACK #ForBeginers :

πŸ„»πŸ„΄πŸ…ƒ'πŸ…‚ πŸ…‚πŸ…ƒπŸ„°πŸ…πŸ…ƒ :

Launch the Parrot or Kali Linux machine to get started.

Set up the DNS config file in Ettercap

1) Setup the command terminal and change the DNS configuration of the Ettercap by typing the following syntax into the editor of your choice.

$ gedit /etc/ettercap/etter.dns

2) You will be displayed the DNS configuration file.

3) Next, you’ll need to type your address in the terminal

>* a 10.0.2.15

4) Check your IP address by typing ifconfig in a new terminal if you don’t already know what it is.

To save changes, press ctrl+x, and press (y) bottom.

Prepare the Apache server

5) Now, we will move our fake security page to a location on the Apache server and run it. You will need to move your fake page to this apache directory.

6) Run the following command to format the HTML directory:

$ Rm /Var/Www/Html/*

7) Next up, you’ll need to save your fake security page and upload it to the directory we’ve mentioned. Type the following in the terminal to start the upload:

$ mv /root/Desktop/fake.html /var/www/html

8) Now fire up the Apache Server with the following command:

$ sudo service apache2 start

9) You’ll see that the server has successfully launched.

Spoofing with Ettercap addon
Now we’ll see how Ettercap would come into play. We will be DNS spoofing with Ettercap.

10) Launch the app by typing:

$ettercap -G

source linux forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
WinDbg Malware Analysis Cheat Sheet.pdf
2 MB
#full + video
Forwarded from WEB UNDERCODE - PRIVATE
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is Internal Server Error 500
Every time you open a web page, your browser sends a request to the server that hosts the site, which returns the requested data and a response code. The HTTP response status codes indicate whether the request was successful or not.

The answers are divided into five classes. Codes ranging from 500 to 599 indicate a server error.

The HTTP 500 status code is a generic error response that is returned by the server when another error code does not match. This can be caused by a number of issues that prevent the server from fulfilling the request.

If the page you are visiting throws a 500 error, there is nothing you can do because the error is not caused by your browser or internet connection. Even though the error occurs on the server side, you can try some of the following options:

1) Restart your browser or try using a different one. The chances of the page loading when you refresh your browser are slim, but still worth a try.

2) Try clearing your browser cache. If a page showing a 500 error is cached, after clearing the cache, the browser will ask for a new version of the page.

3) Come back later. In the meantime, the webmaster can fix the server issue.

4) Contact the website owners. The last remaining option is to contact the person in charge of maintaining the website.

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
new Bug in Excel documents
Epic Manchego-atypical transmission of maldoc takes with it multiple secret stealers
#Vulnerabilities #malwares
Forwarded from UNDERCODE HACKING
Dumping Clear-Text Credentials.pdf
1.6 MB
πŸ¦‘ANOTHER 2020 TERMUX TOOLS INSTALLER SUCH BRUTEFORCE & PHISHING...
#termux

1) pkg install git

2) pkg install python

3) git clone https://github.com/Zian25/UniTools-Termux

4) cd UniTools-Termux

5) python3 utx.py

6) Choose option via numbers

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Create an Apache Virtual Host tutorial:

πŸ„»πŸ„΄πŸ…ƒ'πŸ…‚ πŸ…‚πŸ…ƒπŸ„°πŸ…πŸ…ƒ :

1) laravel:~$ cd /etc/apache2/sites-available
laravel:/etc/apache2/sites-available$ sudo vi myapp.conf


2) <VirtualHost *:80>
ServerName myapp.localhost.com
DocumentRoot "/home/vagrant/projects/myapp/public"
<Directory "/home/vagrant/projects/myapp/public">
AllowOverride all
</Directory>
</VirtualHost>
ο»Ώ
3) Save the file, then continue below.

laravel:/etc/apache2/sites-available$ cd ../sites-enabled

laravel:/etc/apache2/sites-enabled$ sudo ln -s ../sites-available/myapp.conf

laravel:/etc/apache2/sites-enabled$ sudo service apache2
restart

4) Fixing Permissions
If you’re running a virtual machine under Vagrant, you may want to change the user and group to avoid permission issues.

5) To do this:

laravel:~$ cd /etc/apache2

laravel:/etc/apache2$ sudo vi envvars

6) Change the lines below to contain the desired user and group

export APACHE_RUN_USER=vagrant

export APACHE_RUN_GROUP=vagrant

7) Save the file and restart apache.

laravel:/etc/apache2$ sudo service apache2 restart

unix forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘NEW GOOD PHOTO EDITORS APPS(IOS/ANDROID):

https://itunes.apple.com/us/app/snapseed/id439438619?mt=8

https://play.google.com/store/apps/details?id=com.niksoftware.snapseed&hl=en

https://itunes.apple.com/us/app/snapseed/id439438619?mt=8

https://itunes.apple.com/us/app/vsco-cam/id588013838?mt=8

https://play.google.com/store/apps/details?id=com.vsco.cam&hl=en

https://vsco.co/

https://itunes.apple.com/us/app/prisma-photo-editor/id1122649984?mt=8

https://play.google.com/store/apps/details?id=com.neuralprisma

https://itunes.apple.com/us/app/adobe-photoshop-express/id331975235?mt=8

https://play.google.com/store/apps/details?id=com.adobe.psmobile

https://www.photoshop.com/products/photoshopexpress

https://itunes.apple.com/us/app/foodie-delicious-camera-for/id1076859004?mt=8

https://play.google.com/store/apps/details?id=com.linecorp.foodcam.android&hl=en

https://itunes.apple.com/us/app/foodie-camera-for-life/id1076859004?mt=8

https://itunes.apple.com/gb/app/adobe-photoshop-lightroom/id878783582?mt=8

https://play.google.com/store/apps/details?id=com.adobe.lrmobile

https://itunes.apple.com/us/app/instacollage-collage-maker/id530957474?mt=8

https://play.google.com/store/apps/details?id=mp.instagcolleage

https://itunes.apple.com/gb/app/adobe-photoshop-fix/id1033713849?mt=8

https://play.google.com/store/apps/details?id=com.adobe.adobephotoshopfix&hl=en_GB

https://play.google.com/store/apps/details?id=to.pho.visagelab&hl=en

https://itunes.apple.com/us/app/visage-perfect-photo-make-app/id489833171?mt=8

https://itunes.apple.com/us/app/afterlight-2/id1293122457?mt=8

https://play.google.com/store/apps/details?id=com.fueled.afterlight&hl=en

https://play.google.com/store/apps/details?id=com.canva.editor

https://play.google.com/store/apps/details?id=com.advasoft.touchretouch&hl=en

https://itunes.apple.com/us/app/touchretouch/id373311252?mt=8

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁