UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.8K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to remotely install applications on an Android smartphone ?

1) Open the Play Store in a browser
If you have a link to the app, you can follow it in a browser on any device and then go to step 3.

It usually starts with visiting the Play Store through the device's browser. If it's an iPhone or Mac, you can use the Safari browser. The store link looks like play.google.com/store.

2) Find the app page in the store
You can jump directly to the application you want if you have a link to the page. Alternatively, you can search the store by name. It is possible to filter search results. For example, select only apps in a tab in the left menu. You can click "See More" next to the "Applications" section in the search results.

3) Remote installation of the application
Click on the "Install" button. If the app is already installed on the device, this is reported. You need to sign in to your Google account, which is used on the Android device.

If you are already signed in and you are not using this Android device, you can change your account by clicking on your profile picture in the upper right corner.

4) You will see a list of Android devices associated with this account, including tablets and Android TVs. If the currently selected device is not where you will install the application, click on the name of the desired device in the drop-down menu. After selecting, click "Continue".

5) If this is the first time you do this, a window will appear asking when authorization is required. Whichever option you choose, a password is always required for a remote installation. You can also add the need to enter a password when shopping.

Select the option you want and click Save. After the download is complete, a message appears that the application is being installed

6) Return to your smartphone and the installation of the application will begin. The duration depends on the connection speed.

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Termux root packages manual install :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/termux/termux-root-packages

2) cd termux-root-packages

3) If you want to build a package with the docker container run

./start-builder.sh ./build-package.sh name-of-package

4) You might have to run the command as root, if you have not configured docker to be run as your user.

5) To build outside the docker container you can run

> git submodule update --init

6) ./termux-packages/build-package.sh ../packages/package-to-build)

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Microsoft will launch satellite solutions
#technologies
_
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 UPDATED LIST BEST VOICE CHANGERS FOR IOS & ANDROID :

https://apps.apple.com/ua/app/robovox-voice-changer/id584847250

https://play.google.com/store/apps/details?id=com.mikrosonic.RoboVoxLite

https://play.google.com/store/apps/details?id=app.call.changer.voice.recorder

https://apps.apple.com/app/prank-voice-changer-plus/id1385337974?l=en

https://play.google.com/store/apps/details?id=com.baviux.voicechanger&hl=en_US

https://apps.apple.com/app/funny-call/id392640258

https://play.google.com/store/apps/details?id=piper.app.maniya.callvoicechanger

https://apps.apple.com/us/app/funcall-voice-changer-rec/id775837930

https://play.google.com/store/apps/details?id=com.fun.funcalls

https://apps.apple.com/app/bendybooth-face-voice-changer/id1054793717

https://play.google.com/store/apps/details?id=com.iapp.livefacefilters

https://apps.apple.com/app/voice-changer-sound-recorder/id1006625490

https://play.google.com/store/apps/details?id=com.androidrocker.voicechanger&hl=en

https://apps.apple.com/us/app/celebrity-voice-changer-face/id1111710488

https://play.google.com/store/apps/details?id=com.CelebrityVoiceChanger.best.voice.fx.funny.lite

https://apps.apple.com/us/app/voice-changer-sound-effects/id649637699

https://play.google.com/store/apps/details?id=com.bagon.voicechanger

https://apps.apple.com/app/sound-blaster-voicefx/id714636639

https://play.google.com/store/apps/details?id=com.mobzapp.voicefx

https://apps.apple.com/ng/app/voice-changer-plus/id339440515

https://play.google.com/store/apps/details?id=com.e3games.voicechanger&hl=en_GB

https://apps.apple.com/us/app/voice-changer-change-
tones/id1028313523

https://play.google.com/store/apps/details?id=com.wondershare.voicechanger

https://apps.apple.com/us/app/change-voice-with-audio-effects/id1189261977

https://play.google.com/store/apps/details?id=studio.onepixel.voicechanger

https://apps.apple.com/us/app/voice-changer/id680063805

https://play.google.com/store/apps/details?id=com.androbaby.voicechanger&hl=en_GB

https://apps.apple.com/us/app/voice-changer-app-soundboard-effects-for-vine/id910447989

https://play.google.com/store/apps/details?id=com.tct.soundrecorder

E N J O Y :)
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Making it Rain shells in Kubernetes
180.7 KB
THIS WILL HELP YOU TO CREATE YOUR OWN SHELL :
Following on from the last post in this series lets setup a rather more ambitious set ofreverse shells when attacking a Kubernetes cluster.The scenario here is that we’ve got the ability to create a daemonset object in atarget Kubernetes cluster and we’d like to have shells on every node in the clusterwhich have the Docker socket exposed, so we can get a root shell on every node inthe cluster.To do this we’ll need something that’ll easily handle multiple incoming shells, so we’llturn to the Metasploit Framework and specifically, exploit/multi/handler
Forwarded from UNDERCODE NEWS
WARNING ! ALL TIKTOK ANDROID USERS SHOULD UPDATE THEIR APPLICATION
#Vulnerabilities
_
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FOR WHATSAPP + USERS AND OUTDATED ONE
-- LAST WHATSAPP CVE :

> The real history aboutCVE-2019-3568 Detail

1) This vulnerability has been modified since it was last analyzed by the NVD.

2) It is awaiting reanalysis which may result in further changes to the information provided.

> Current Description

A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number.

The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.

πŸ¦‘CVE-2020-1894
A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message.

> CVE-2020-1891
A user controlled parameter used in video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices.

> CVE-2020-1890
A URL validation issue in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have caused the recipient of a sticker message containing deliberately malformed data to load an image from a sender-controlled URL without user interaction.

> CVE-2020-1889
A security feature bypass issue in WhatsApp Desktop versions prior to v0.3.4932 could have allowed for sandbox escape in Electron and escalation of privilege if combined with a remote code execution vulnerability inside the sandboxed renderer process.

> CVE-2020-1886
A buffer overflow in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have allowed an out-of-bounds write via a specially crafted video stream after receiving and answering a malicious video call.

> CVE-2019-11928
An input validation issue in WhatsApp Desktop versions prior to v0.3.4932 could have allowed cross-site scripting upon clicking on a link from a specially crafted live location message.


#wiki + whatsapp
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WEB HACKING
WPForce
is a suite of Wordpress Attack tools. Currently this contains 2 scripts - WPForce, which brute forces logins via the API, and Yertle, which uploads shells once admin credentials have been found. Yertle also contains a number of post exploitation modules.

F E A T U R E S :

Brute Force via API, not login form bypassing some forms of protection

Can automatically upload an interactive shell

Can be used to spawn a full featured reverse shell

Dumps WordPress password hashes

Can backdoor authentication function for plaintext
password collection

Inject BeEF hook into all pages

Pivot to meterpreter if needed

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/n00py/WPForce.git

2) cd WPForce

3) python wpforce.py -i usr.txt -w pass.txt -u "http://www.[website].com"

4) python wpforce.py -i for all commands

use for learn !!
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to install & check Java version- Linux:

1) Java version control
Java uses semantic versioning. Versions of the ready-to-release releases are presented as follows:

MAJOR.MINOR.SECURITY

> For example, in Java 11.0.8, 11 is the major version, 0 is the minor version, and 8 is the security version.

MAJOR - Major releases contain new features and capabilities.

MINOR - Minor releases contain various bug fixes and compatibility improvements.

SECURITY - Security releases contain critical security fixes.

2) Checking Java version
To find out what version of Java is installed on your system, run the java -version command:

> java -version

3) The command will display the default Java version:

> openjdk 11.0.8 2020-07-14

4) OpenJDK Runtime Environment (build 11.0.8 + 10-post-Ubuntu-0ubuntu120.04)

> OpenJDK 64-Bit Server VM (build 11.0.8 + 10-post-Ubuntu-0ubuntu120.04, mixed mode, sharing)

5) In this example 11.0.8 we have Java version installed on our system. The version installed on your system may be different.

> If you got the message (Ubuntu, Debian):

6) Command 'java' not found, but can be installed with:

> apt install default-jre                                                                                                                                                         

> apt install openjdk-11-jre-headless

> apt install openjdk-8-jre-headless

7) this means Java is not installed on the system.

The system can also have multiple Java versions installed at the same time. To check if you have multiple Java installations on your machine:

> sudo update-alternatives --config java

8) If you only have one Java installation, the output will look something like this:

> There is only one alternative in link group java (providing / usr / bin / java): / usr / lib / jvm / java-11-openjdk-amd64 / bin / java

> Nothing to configure.

9) Otherwise, if you have multiple Java installations, the command will display a menu where you can choose which version will be the default Java version:

There are 3 choices for the alternative java (providing / usr / bin / java).

10) Selection Path Priority Status

* 0 / usr / lib / jvm / java-11-openjdk-amd64 / bin / java 1111
auto mode

1 / usr / lib / jvm / java-11-openjdk-amd64 / bin / java 1111 manual mode

2 / usr / lib / jvm / java-8-openjdk-amd64 / jre / bin / java 1081 manual mode

11) Press <enter> to keep the current choice [*], or type selection number

DONE :)
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
WARNING ! New Vulnerability in ZTE Router F602W
#Vulnerabilities
_
ss7.pdf
150.2 KB
All you need to know about SS7 Attack :

1. WhatIsSignaling?
2. WhatIsOut-of-BandSignaling?
3. SignalingNetworkArchitechture
4. TheNorthAmericanSignalingArchitecture
5. BasicSignalingArchitecture
6. SS7LinkTypes
7. BasicCallSetupExample
8. DatabaseQueryExample
9. LayersoftheSS7Protocol
10. WhatGoesOvertheSignalingLink
11. AddressingintheSS7Network
12. SignalUnitStructure
13. WhatAretheFunctionsoftheDifferentSignalingUnits?
14. Message Signal Unit Structure
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to get the new Android 11 media controls on any smartphone ?

1) Install Power Shade
An app called Power Shade gives you access to new media controls in quick settings. You can download the application from the link

https://play.google.com/store/apps/details?id=com.treydev.pns&hl

2) Enabling Accessibility Service
After installing the application, open it and click the "Accessibility" switch. The system settings menu will open, where you need to enable Power Shade at the top and click OK in the window that appears

3) Enabling the notification service
Click back to return to the app. Click on the "Notifications" switch and you will be taken to another screen of system settings. Activate the Power Shade switch and give permission in the window that appears. Press back again.

4) Make sure the integration with the media player
The feature should be enabled by default. If not, click in the main application menu "More". Scroll down to the Integrate media players in quick settings radio button. Activate it and then on the main screen of the app, turn off the Running switch and turn it back on to apply the changes.

5) Try the new functionality
Open your media player and start music. Swipe down on the status bar to open a miniature version of quick settings. The new controls will be located below. You can play, pause and skip tracks, you can click on this interface to open the music application.

A new button will appear in the upper right corner of the controls called Phone speaker. Here you can specify the device to which you will transfer music. Swipe down on the status bar again to open Advanced View. There are all the same controls as in the mini version, but there are also "Like" and "Dislike" buttons if your music playback application has them. There is also a progress bar when playing audio files.

6) Unlike Android 11, the controls remain in the Notifications section of the lock screen. This makes it easier to access them. On Android 11, they are always in quick settings, so you have to make an extra gesture. If you have different streaming services, you can swipe left and right on a tile to switch between controls for different media applications.

ENJOY β€οΈπŸ‘πŸ»
WRITTEN BY
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to skip intros, end credits, and other unnecessary things on YouTube on Android ?

1) Install YouTube Vanced
YouTube Vanced is a third-party YouTube app with tools not found in the official app. Among other things, it offers a dark graphics theme and several YouTube Premium features, such as background playback.

After complaining about the complexity of the installation process, the developer of this open source application has combined all the tools into one application called Vanced Manager. You need to download the Vanced Manager APK and use the manager to third-party install the other two files. You will then be able to work with YouTube Vanced.

2) Enabling Sponsor Block
Once installed, launch YouTube Vanced and select the avatar icon in the upper right corner. Then open the settings. Select Sponsor Block Settings and activate the Enable Sponsor Block (beta) radio button.

3) Configuring Sponsor Block
On the next page, in the "What to do with different segments" section, there is a list of all video sections, which allows you to skip unnecessary parts of the video. Each setting is marked with its own color, which will appear on the progress bar when watching a video. This shows where the unneeded content is.

4) The first option will automatically skip the fragment and display a message about it. This is the default for all segments. The second option displays a small "Skip" button in the right corner of the video. The last option leaves everything as it is.

5) Testing
Open the video in Vanced and look at the progress bar. If you see sections of different colors, everything worked out. If there are no colors, Sponsor Block users have not marked this video and its sections will not be automatically skipped.

When watching a video, parts of the introduction, messages about sponsors, and other sections you do not need may be cut out. You will receive notifications about this.

6) Helping the community (optional)
Sponsor Block is an open source project, which means that anyone can add tags to every video on YouTube. You can do this too. To do this, return to the Sponsor Block settings page and activate the "Enable adding a new segment" switch.

Now, when playing a video, a new icon appears in the upper left corner. It looks like a play button inside a shield. When you click on this button, a toolbox is displayed (if you hold the smartphone in portrait orientation). These tools provide the ability to add segments to the video. You can use tools to mark distractions in your video.

Disclaimer : This article is written for educational purposes only. The author or publisher did not publish this tutorial for malicious purposes. If readers would like to use the information for personal gain, then the author and the publisher are not responsible for any harm or damage caused.

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁