UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.8K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Apple accepts criticism and revised App Store review guidelines πŸ₯³
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Social Engineering helpful tutorials :

* [The Limits of Social Engineering](https://www.technologyreview.com/s/526561/the-limits-of-social-engineering/) - MIT, Technology Review

* [The 7 Best Social Engineering Attacks Ever](http://www.darkreading.com/the-7-best-social-engineering-attacks-ever/d/d-id/1319411) - DarkReading

* [Social Engineering: Compromising Users with an Office Document](http://resources.infosecinstitute.com/social-engineering-compromising-users-using-office-document/) - Infosec Institute

* [The Persuasion Reading List](http://blog.dilbert.com/post/129784168866/the-persuasion-reading-list) - Scott Adams' Blog

* [How I Socially Engineer Myself Into High Security Facilities](https://motherboard.vice.com/en_us/article/qv34zb/how-i-socially-engineer-myself-into-high-security-facilities) - Sophie Daniel

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Zoom adds two-step verification to strengthen security and also launched a hardware device
#Updates
HQL for pentesters .pdf
390 KB
SQL injection is a highly coveted type of attack. Plenty of resources exist to take advantage of an injection on common DBMS (MySQL, Oracle, MS SQL, etc). But, I could not find a resource targeting Hibernate Query Language. So, here are some techniques I found reading the documentation and by trial and error.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Tracking phone calls for marketing
#FastTips

1) Demonstrates lead generation
Inbound offers are usually the last step in the buyer's journey. Before using the call tracking service, marketers could not pinpoint the exact origin of a call.

Lead tracking is limited to sponsored links and web forms. However, with tracking phone calls, it just isn't a solution anymore. By adding a unique advertising or tracking number to your ad or to your website, you can now track the origin of a call for a specific campaign.

With call tracking metrics, you can not only prove where the lead came from, but also show your post-sale marketing input.

2) Recover Lost Leads
Now that you've taken a big step in identifying which of your phone calls are leads, we suggest you take a step forward and identify which of those leads turn into a sale or an appointment.

If a lead isn't turning into a sale or an appointment, we want to know why. With call tracking, you can see why your leads aren't converting and what you can do to improve them.

πŸ¦‘Here are some ways to recover lost leads:



Call your customers back
By calling the client back, you have a new chance to capture a lead. Ask a customer about his or her requirements, incentivize the customer with a coupon, or provide exceptional service.

Even if the lead doesn't convert, you can end up with a positive customer experience. There is a high probability that they will call back in the future.

Training your customers and sales representatives
Even if you haven't regained past leads, you still have a chance to get new leads. By training your account agents and sales representatives, you can help them increase the number of customers they convert and the sales they make.

As marketers, we all understand that revenue growth is a key metric. Lost revenue opportunities arise when marketing is not part of the sales conversation in terms of a prospect's journey through the funnel.


3) Tracks multichannel campaigns
Like most organizations, you probably do more than one type of advertising. You are trying to reach customers wherever they are:

In their house
At work
In their cars
In social networks
Wherever!

4) improves paid search and organic SEO
If you are investing time, money, and energy in creating search engine marketing plans, you definitely want the investment to pay off.

While a simple link to your website can help, tracking phone calls has many benefits.

By assigning a different phone number to each ad group, there's no guesswork. You will know for sure the Google, Yandex ad group or the keyword that triggered the call.

With this data, you can:

increase your return on investment
improving your messages
buy ads based on real-time marketing tags


@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Apple is looking for cooperative banks, & Apple Card will launch in Australia,India and elsewhere
#Updates
Forwarded from UNDERCODE NEWS
Be aware of this new CVE 2020-0674 in Internet Explorer 11
#Vulnerabilities
Stealing_Signatures_and_Making_One_Invalid_Signature_at_a_Time.pdf
485.9 KB
I've noticed during testing against Anti-Virus over the years that each is different and each prioritize PE signatures differently, whether the signature is valid or not. There are some Anti-Virus vendors that give priority to certain certificate authorities without checking that the signature is actually valid, and there are those that just check to see that the certTable is populated with some value
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Ways To Hack An API (And How To Defend):

1) Reverse Engineering
2 h
https://www.youtube.com/watch?v=a2EkORFcSZo

2) User Spoofing
9 min
https://www.youtube.com/watch?v=VjguxR97xC0

3) Man in the Middle Attack
21 min
https://www.youtube.com/watch?v=3aiREf5u48Q

4) Session Replays
2 h
https://www.youtube.com/watch?v=bj8kkgLCHaw

5) Social Engineering
1 h
https://www.youtube.com/watch?v=O5lXUSMGQ2I


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Support & Share β€οΈπŸ‘πŸ»

T.me/UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST FREE GPS LOCATION &TRACKING FOR ANDROID :

https://play.google.com/store/apps/details?id=com.androidauthority.app

https://play.google.com/store/apps/details?id=com.sygic.aura&hl=en_IN

https://apps.apple.com/us/app/sygic-gps-navigation-maps/id585193266

https://play.google.com/store/apps/details?id=com.jkfantasy.gpsmapcamera&hl=en_IN

https://apps.apple.com/us/app/gps-camera-55-field-survey/id1439730560

https://play.google.com/store/apps/details?id=com.vecturagames.android.app.gpxviewer&hl=en_IN

https://play.google.com/store/apps/details?id=it.carfind&hl=en_IN

https://play.google.com/store/apps/details?id=org.findmykids.app&hl=en_IN

https://apps.apple.com/us/app/findmykids-gps-phone-tracker/id994098803

https://play.google.com/store/apps/details?id=mg.locations.track5&hl=en_IN

https://apps.apple.com/us/app/phone-tracker-by-number/
id1470943827

https://play.google.com/store/apps/details?id=com.waze&hl=en_IN

https://apps.apple.com/us/app/waze-navigation-live-traffic/id323229106

https://play.google.com/store/apps/details?id=com.life360.android.safetymapd&hl=en_IN

https://apps.apple.com/us/app/life360-safety-for-families/id384830320

https://play.google.com/store/apps/details?id=com.prime.studio.apps.route.finder.map&hl=en_IN

https://play.google.com/store/apps/details?id=com.mictale.gpsessentials&hl=en_IN

https://play.google.com/store/apps/details?id=com.mobiletracker.mobileapp&hl=en_IN

https://play.google.com/store/apps/details?id=com.wondershare.famisafe&hl=en_IN

https://apps.apple.com/us/app/famisafe-parental-control-app/id1385417904

https://play.google.com/store/apps/details?id=com.fsp.android.c&hl=en_IN

https://play.google.com/store/apps/details?id=com.isharing.isharing&hl=en_IN

https://play.google.com/store/apps/details?id=com.google.android.apps.maps&hl=en_IN

https://apps.apple.com/us/app/google-maps-transit-food/id585027354

https://play.google.com/store/apps/details?id=com.ilyabogdanovich.geotracker&hl=en_IN

https://play.google.com/store/apps/details?id=com.mapquest.android.ace&hl=en_IN

https://apps.apple.com/us/app/mapquest-gps-navigation-maps/id316126557

https://play.google.com/store/apps/details?id=com.alienmanfc6.wheresmyandroid&hl=en_IN

https://play.google.com/store/apps/details?id=com.safe365.safe365app&hl=en

https://apps.apple.com/us/app/safe365-eldercare-app/id622546357

ENJOY πŸ‘πŸ»β€οΈ
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WHAT IS BASHTOP ?
Bashtop should work with most modern Linux distributions with a terminal that supports truecolor.

Because it's written in Bash, installing Bashtop is as easy as downloading the bashtop script from its project page (or from the release archive) and installing it somewhere in your PATH. However, it has several dependencies that you need to make sure they are installed on your system (besides additional dependencies, in most cases others should already be installed):

F E A T U R E S :

1) Bash (it needs version 4.4 or newer, so it won't work, for example, on Ubuntu 16.04 or CentOS 7)

2) Basic GNU utilities

3) GNU Grep

4) ps from procps-ng (version 3.1.15 or newer, usually a

5) package named procps that you already installed)

6) sed

7) awk

8) Optional:
lm-sensors to display the CPU temperature (the package is usually named lm-sensors or lm_sensors; you need to run sensors-detect as root after installation to detect your computer's sensors)

9) curl to display messages about Bashtop updates and the ability to download additional themes (the curl package is available on most, if not all Linux distributions)

10) Easy to use, with a game inspired menu system.

11) Fast and "mostly" responsive UI with UP, DOWN keys process selection.

12) Function for showing detailed stats for selected process.

13) Ability to filter processes.

14) Easy switching between sorting options.

15) Send SIGTERM, SIGKILL, SIGINT to selected process.

17) UI menu for changing all config file options.

18) Auto scaling graph for network usage.

19) Shows message in menu if new version is available

20) Shows current read and write speeds for disks

21) Multiple data collection methods which can be switched if running on Linux

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) download or clone
https://github.com/aristocratos/bashtop

2) If you haven't got python3 installed:

> brew install python3

3) python3 -m pip install psutil

4) cd bashtop

5) sudo make install

More info & usage https://github.com/aristocratos/bashtop

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to set up automatic kernel updates on Linux :

Manual kernel updates require a system reboot. This leads to downtime, which can be problematic, so reboots are usually scheduled at regular intervals. Since manual patching is performed during these cycles, this gives hackers a "time window" in which they can attack the server infrastructure.

1) Canonical Livepatch is a service that fixes a running kernel without rebooting your Ubuntu system. Livepatch is free to use on three Ubuntu systems. To use this service on more than three computers, you need to subscribe to the Ubuntu Advantage program.

2) Before installing the service, you need to get a livepatch token from the Livepatch service website.

3) After installing the token and enabling the service by running the following two commands:

〰️sudo snap install canonical-livepatch

〰️sudo canonical-livepatch enable <your-key>

4) To check the status of the service, run:

〰️sudo canonical-livepatch status --verbose

5) Later, if you want to unregister the machine, use this command:

〰️sudo canonical-livepatch disable <your-key>

6) The same instructions apply for Ubuntu

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Signs of being hacked :

1) battery charge. If the battery of the smartphone begins to discharge rapidly, reducing the operating time of the device by several hours during normal use, then most likely this indicates the operation of malicious background applications;

2) The appearance in the general list of application icons of new ones that you have not installed may indicate that the device has been hacked;

3) notifications. Displaying strange messages on the screen with unreadable characters, links or notifications about the execution of a request, if you have not had a hand in this, does not bode well either - for sure hackers already have your data;

4) balance. If your mobile account suffers losses, although you are convinced that you did not call paid numbers, did not order additional services and were not involved in any financial transactions, then we can say with certainty that your gadget has been hacked;

5) malfunctions. Strange signals during a conversation, extraneous noises or even disconnections with a good signal level can also indicate the use of the device's microphone or even listening to conversations;

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁