UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Europians Facebook data probably got leaked
#dataBreach
[Bug Bounty] Exploiting Cookie Based XSS by Finding RCE.pdf
1.2 MB
While doing Bug Bounty Hunting , I found a Cookie Based XSS Vulnerability on a website. Cookie Based XSS basically is a Self XSS. It will be very unfortunate if the ndings were reported and only got Very Low Severity which for the severity there was no Bounty or Points given.
The scope of this program is very limited, but the target domain has lots of subdomains. The rst thing that comes to mind is looking for XSS Vulnerabilities in target subdomains that are out of scope to trigger Cookie Based XSS in in-scope target domains, so by that severity will increase at least to High or Medium.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Download AndroidMalware_2020
free
β€” https://github.com/sk3ptre/AndroidMalware_2020 β€”

All Popular Android threats in 2020 :

January

Silent Adware
75fd1658cd6cb56f9194dbb1aabadd64
80abde70e5f4d4dc7ace31586097e026
1250f1296c0e92112d554960d4f99710

New Anubis samples
d4be1208d35bc8badb0fa97a36a28c8c
d936dad9349ebe2daf8f69427f414fdc

Coybot Brazilian banker
058de750a4a2402104e4bd22179f8432050c98ea88b5bfec2f065f6dc2a950f9
bf20ad4fcc9fb6910e481a199bb7da649bcd29dd91846692875a3a2c737b83d9

Bread
2273af79cae07c3d0d07eb4d3f30d60c
35027baae5178b5642dd6fa17857ff51
e674fb1705779c2e0599659a8a96befb

CVE exploitation in the wild
5db521d8bafa37bc3b96feebac99121e
8b6642efb498f829870fc108b8f2f29a

Fake AV
8476aa9e1887fadd03a1df0a608d5877
73107da87705c19c7ca8873f04323c6b
fd6ae5a3d73d9f13c2a88934d4af9a90

Shopaholic
0a421b0857cfe4d0066246cb87d8768c
0b54b822683a70b9d4a3af08a2d506b2
0b682e9cae5b8623fc3e62048623dcdb

Stars Wallpaper
42bd23110fbfde71be924a9bdb5a8381

Xiny
171dba383d562bec235156f101879223bf7b32c7
f9f87a2d2f4d91cd450aa9734e09534929170c6c
f9f87a2d2f4d91cd450aa9734e09534929170c6c

February

PremiumRateSMS
cf661506978f088f276a5a5bc4f0ea71101f99941840dd0864b2068ee2eb2271

Joker
d36be817f7dce6712d1e84b6e1a49e7a9210092749c508d7b1121854ebf018d8
5ec214704b63d93181932d389f4ed76bd730bd05e912518a1357a413d6fa96b1

Mobok
a9b6ad7233eed5b592a78e3a37e3143bd185554b4e9166aa2fa5ff0f99b1248c
e750766c16eca9501f07efe044db683dc08551c42d399ae8cc9e585345df8469

Anubis
c38c675a4342052a18e969e839cce797fef842b9d53032882966a3731ced0a70

AdFraud
a26ce61f3137307ab3456d6312d823bec7a3924d830d8764778803ad48843467
230f66be98f30155934379022cc8656e25917c4fd5c08a36903539ce1bd36f4c
381620b5fc7c3a2d73e0135c6b4ebd91e117882f804a4794f3a583b3b0c19bc5

Cerberus
6363beadf56ad162bc58fa8f1c5393223cd94221af0b3b2e9db0d718c3fae085
fe23b30a9296477557f027d4710e81eb1b08d65a1a83b6d81a4ed6128ed6e2a0

March

Banker
ce448fb2d1575f3a74ee59c611f6ec06
d5577c5f181d5496ae2ebd295a705a73
e491d383e9f89ba76864491598734e96

CookieStealer
65a92baefd41eb8c1a9df6c266992730
c907d74ace51cec7cb53b0c8720063e1
f84a43b008a25ba2ba1060b33daf14a5

MonitorMirror
ecac763feff38144e2834c43de813216

Adobot
c05fbe8f45ba26416b7ddbc2269603f9

BeanShell
57eb0919e5b8eee24547f74cb2a1562780ecb00c
28612e3c18f179d125f97443ba194e13d6ac635c

EventBot
7F5D728119951839B46895808107B281
8A563B6AF3CF74C8CBB88B99E104D949
7107AC3BCCD8DB274B21F0E494E3ECCC
F73F66B15791A42DAC86D0CED46D660F

& More on the same git link

Free: https://github.com/sk3ptre/AndroidMalware_2020

βœ…git 2020
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 new list of OSINT Resources :

* [Awesome OSINT](https://github.com/jivoi/awesome-osint) - Awesome list of OSINT

* [OSINT Framework](http://osintframework.com/) - Collection of various OSInt tools broken out by category.

* [Intel Techniques](https://inteltechniques.com/menu.html) - A collection of OSINT tools. Menu on the left can be used to navigate through the categories.

* [NetBootcamp OSINT Tools](http://netbootcamp.org/osinttools/) - A collection of OSINT links and custom Web interfaces to other services such as [Facebook Graph Search](http://netbootcamp.org/facebook.html) and [various paste sites](http://netbootcamp.org/pastesearch.html).

* [Automating OSINT blog](http://www.automatingosint.com/blog/) - A blog about OSINT curated by Justin Seitz, the same author of BHP.

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The tool detects the wordpress version and try to find the vulnerabilities that are vulnerable on the version,the tools detects also the the plugins and themes installed on the website.

> WPHunter can aslo find the backup files, path disclosure, and checks security headers.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

Installation Linux alt tag

1) git clone https://github.com/Jamalc0m/wphunter.git

2) cd WPHunter

3) php wphunter.php

Installation Windows alt tag

1) Download and install PHP

2) Download WPHunter

3) Extract WPHunter into Desktop

4) Open CMD and type the following commands:

5) cd Desktop/wphunter-master/

6) php wphunter.php

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
VTB online app now have an ability to trade six new currencies πŸ₯³
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Clearing linux systemd logs :

1) First check the space taken up by the logs with the du command:

> du -sh / var / log / journal /

2) You can also use journalctl command for the same task:

> journalctl --disk-usage

3) Both commands should give approximately the same result:

> annihilator @ dega-undercode: ~ $ journalctl --disk-usage
Archived and active journals take up 1.6G in the file system.

4) annihilator @ dega-undercode: ~ $ sudo du -sh / var / log / journal /
1.7G / var / log / journal /

5) Now that you know how much space the log logs are taking up, you can decide if you want to clear the logs or not. If you decide to clear your logs, let me show you a few ways to do it.

6) Of course, you can use the rm command to delete files in the log folder, but we won't recommend that. Journalctl command gives you the correct way to handle old journals.

7) The first thing you should do is rotate the log files. This will mark the currently active log logs as archive and create new new logs. This is optional, but good practice.

> sudo journalctl --rotate

8) You now have two ways to clear the old logs. You either delete logs older than a certain time, or you delete old log files so that the total size of the log is limited to a predetermined disk space.

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
Fork Sparta, Join The Legion.pdf
1.2 MB
I've been given the directive at work to try to automate the things that I can. One thing I'd like to investigate automating is the discovery and recon portions of a pen test. I came across a tool that claims to do just that. Legion is "an open source, easy-to-use, super-extensible and semiautomated network penetration testing framework that aids in discovery, reconnaissance and exploitation of information systems." So let's dive in and see if Legion can help achieve my goals
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Tips for securing SSH on Linux servers :

Don't go blindly follow all the SSH security tips mentioned here. Read all of them and then see which ones suit your needs. Also keep in mind that some tips may not be compatible with others.

For example, if you disable password-based SSH login, you don't need to go to the Fail2Ban solution.

If you are familiar with the basics of SSH, you know that the SSH configuration files are located in / etc / ssh / sshd_config.


Let's see what steps you can take to secure your SSH server :

1) Disable blank passwords

2) Change the default SSH ports

3) Disable root login via SSH

4) Disable ssh 1 protocol

5) Configure the idle timeout interval

6) Allow SSH access only for selected users

7) Disable X11 forwarding

8) Automatically mitigate brute force attacks

ENJOY β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The rebirth of Trojan horse backdoor in anti-injection :

> For the current popular SQL injection, programmers generally add anti-injection programs when writing programs. Some anti-injection programs will automatically record your IP address as long as we submit some illegal parameters, and the submission is illegal. Parameters and actions, etc., and also write the illegally submitted data into the file with the suffix of the system as ASP.

> This also gives us some places to use. As you know, a word is written by using the incomplete program filtering. Enter, according to this idea, can we add a sentence of horse to the illegal parameter submission and the anti-injection program will record the data we submitted and the sentence of horse and write it into the database, so as to get a WEBSHELL?

β€”- Ha ha, the answer is yes Yes, but how to bypass the filtering program for a sentence to be written is a problem. The common format of a sentence is "<%execute request("a")%>, but it is difficult for <%%> Bypass HTML filtering, but we can bypass it in different ways

E X A M P L E 1 :

1) Open "http://127.0.0.1/2005/sia-log.asp,

2) "Type mismatch:'execute' appears, and the IE option that displays internal errors shows that friends errors are hooked off.

3) " We use another sentence client to upload one after another and successfully get a WEBSHELL.

πŸ¦‘Example 2: Let’s talk about the utilization and analysis of the "Happy Audiovisual Music Network V4.0" system:

The system strengthens anti-sql injection, cancels Asp pages, and blocks unfriendly IP or IP segments. The Ip function of the injector is automatically blocked, so that the injector can no longer visit this site!

It can manage and display the system interface in the background. When submitting illegal data after the parameters, the system automatically records your IP address, the illegal parameters and actions submitted, and then the system blocks your IP address

so that you can no longer access the website. Let's take a look at part of the code in the anti-injection sql.asp file. Anyone who has read the anti-injection code can tell at a glance that this file is a modified version.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
empire_without_powershell_exe.pdf
912.9 KB
The client has blocked Powershell.exe using AppLocker and I don’t have the dough for Cobalt Strike. I want to get an Empire payload on a workstation via a phishing campaign and I need payloads ready once I have a foothold. Nearly all of the launcher methods for Empire rely on the ability to use PowerShell.exe. Other methods like msbuild.exe requires dropping a file to disk, and I really liked the regsvr32 method of loading my .sct over the internet (it too drops a file to disk) and using a ducky. I also really appreciate the simplicity of VBA’s in documents or HTA’s. Problem is, Empire is a Powershell RAT so one way or another PowerShell has to run.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 Deepwebsites :

website url: msydqstlz2kzerdg.onion

website url: xmh57jrzrnw6insl.onion

website url: dnmugu4755642434.onion

website: hss3uro2hsxfogfq.onion

website: gjobqjj7wyczbqie.onion

website: haystakvxad7wbk5.onion

website: abikogailmonxlzl.onion

website: 3bbaaaccczcbdddz.onion

source wiki
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is ping monitoring?
#FastTips

1) Without getting into complex ping monitoring, it refers to the way our devices access the Internet.

2) Basically, when you want to go online, your device (computer, tablet, phone, etc.), known as a client, communicates with another device for information.

3) To make a request for information, your device sends a request (known as a packet) to the server that stores the information. To access a packet, the server needs to know who is requesting it so they can send it back.

4) Packages can be sent in a variety of ways, some of which are faster than others. The one most people are familiar with is HTTP .

5) This way, the server processes your packets and sends them back using the ping command , which tests the connection between the client and the server.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
New way of leaking,the prosecutor's office verifies the evidence on the selling of vehicles records #Leaks