UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘The working principle of sniffer attack

Generally, all network interfaces in the same network segment have the ability to access all data transmitted on the physical media, and each network interface should also have a hardware address, which is different from other network interfaces existing in the network. Hardware address, and at least one broadcast address for each network. (Representing all interface addresses). Under normal circumstances, a legal network interface should only respond to these two data frames:

1) The target area of ​​the frame has a hardware address that matches the local network interface.

2) The target area of ​​the frame has a "broadcast address".
When receiving the data packets in the above two situations, nc generates a hardware interrupt through the cpu, which can attract the attention of the operating system, and then transmit the data contained in the frame to the system for further processing.

3) And sniffer is a kind of software that can set the local nc state to (promiscuous) state. When nc is in this "promiscuous" mode, the nc has a "broadcast address", and it generates one for every frame encountered The hardware interrupts to remind the operating system to process every packet that flows through the physical media. (Most ncs have the ability to be set to promiscuous mode)

4) Visible, sniffer works at the bottom of the network environment, it will intercept all the data being transmitted on the network, and through the corresponding software processing, can analyze the data in real time Content, and then analyze the network status and overall layout. It is worth noting that: sniffer is extremely quiet, it is a negative security attack.

don't clone our tutorials :)
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to transfer landline calls :


1) When you're out of your incoming calls can be transferred to a landline phone on their mobile phone or other landline phone does not ensure bobble.
γ€€γ€€
2) Second, set the
γ€€γ€€
> application: * 57 * TN #; Cancel: # 57 #. (TN stands for the phone number or mobile phone you want to set) I have tested that both Telecom and Tietong landlines are suitable. Because there is no Netcom landline installed, I did not test it myself!
γ€€γ€€
3) Third, Tips
γ€€γ€€
This function can not be transferred to a long distance number
γ€€γ€€
four charges
γ€€γ€€
no monthly transfer once counted a fee; (cost of landline perform call transfer call transfer fee of numbers)

4) Fifth, for dial 10000 apply in person at the Telecommunications Business Office processing. Normal dial 10086 in the north (Netcom)

#FastTips
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ–§ How to enable SSH root user login on Ubuntu 20.04 Focal Fossa Linux :

1) Open the / etc / ssh / sshd_config file as an administrator and change the following line:
FROM:
#PermitRootLogin prohibit-password

2) TO:
PermitRootLogin yes

3) A quick way to get the job done is to simply use the sed command as shown below:

$ sudo sed -i 's / # PermitRootLogin prohibit-password / PermitRootLogin yes /' / etc / ssh / sshd_config

4) Restart SSH service:

$ sudo systemctl restart ssh

5) By default, the root password is not set in Ubuntu 20.04 and an error message will appear:

6) Permission denied, please try again
For this reason, we need to set a root password.

7) When prompted, enter the current user password followed by the new root password:
$ sudo passwd
[sudo] password for itsecforu

8) Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully

9) Considering that your Ubuntu 20.04 system allows inbound traffic on port 22 over ssh, you should now be ready to SSH into the system as root:
$ ssh root @ ubuntu-server
root @ ubuntu-server's password:

10) Welcome to Ubuntu Focal Fossa (GNU / Linux 5.3.0-23-generic x86_64)

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Linux vs. Windows Hosting. What's the best for WordPress?

Comparison of hosting on Linux and Windows
The two operating systems are very different. Here's a comparison:

1) User interface. Windows is easy to use thanks to its familiar menus. On the other hand, Linux relies on the command line with functions and syntaxes that can be difficult to learn. This is why many administrators rely on cPanel to simplify server maintenance.

2) Stability and safety. While there are risks of being compromised for both operating systems, Windows is generally more vulnerable to threats. In addition, Linux is more stable and almost never requires a reboot. Windows can have trouble solving multiple problems, so it might not be the right choice for business-critical applications.

3) Hardware and software compatibility. Windows servers are often used in large organizations with complex IT infrastructures. Sharepoint and Exchange are typical examples. They are compatible with other Microsoft applications, so you get better support. Linux may not run smoothly with these solutions, and relying on a Linux administrator is not ideal in a corporate environment.

4) Development tools. Linux hosting is commonly used to set up personal websites with access to tools such as Apache, PHP, MySQL, and File Transfer Protocol ( FTP ). Experienced developers can also set up an NGINX web server or use Perl or Python. However, sites developed using Microsoft ASP.NET and MS SQL technologies will only work with Windows servers.

5) Speed. Linux tends to be faster than Windows because it is lightweight and easy to use server resources when executing commands.



@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ–§ How to specify your own SSH port when using rdiff-backup :

1) rdiff-backup uses the standard SSH port when connecting to a remote host.

$ rdiff-backup --print-statistics ~ / Projects / personal / rdiff-backup@backup.example.org :: / rdiff-backup / repositories / personal
ssh: connect to host backup.example.org port 22: Connection refused
Fatal Error: Truncated header string (problem probably originated remotely)

Couldn't start up the remote connection by executing

2) ssh -C rdiff-backup@backup.example.org rdiff-backup --server

Remember that, under the default settings, rdiff-backup must be
installed in the PATH on the remote system.

3) This message may also be displayed if the remote
version of rdiff-backup is quite different from the local version (2.0.0).
See the man page for how to specify advanced connection parameters.
$ rdiff-backup --print-statistics --remote-schema "ssh -C -p 2222 % s rdiff-backup --server" ~ / Projects / personal / rdiff-backup@backup.example.org :: / rdiff- backup / repositories / personal


-------------- [Session statistics] --------------

StartTime 1599393121.00 (Sun 11:52:01 2020)
EndTime 1599393121.48 (Sun 11:52:01 2020)
ElapsedTime 0.48 (0.48 seconds)
SourceFiles 11
SourceFileSize 10543 (10.3 KB)
MirrorFiles 1
MirrorFileSize 0 (0 bytes)
NewFiles 10
NewFileSize 10543 (10.3 KB)
DeletedFiles 0
DeletedFileSize 0 (0 bytes)
ChangedFiles 1
ChangedSourceSize 0 (0 bytes)
ChangedMirrorSize 0 (0 bytes)
IncrementFiles 0
IncrementFileSize 0 (0 bytes)
TotalDestinationSizeChange 10543 (10.3 KB)
Errors 0
--------------------------------------------------

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸš« A look at how credit card information can be stolen and how to keep you safe :

1) Cloning maps
Making a cloned credit card is the easiest way for a thief to spend someone else's money.

All they have to do is temporarily access your credit card (often in fractions of a minute) and program it onto another prepaid card.

The cloned cards can then be sold on the darknet, usually through cryptocurrency.

Many of these stolen cards resemble real cards, and the attention to detail is mind-boggling.

2) Skimming cards
Breathing in the neck of credit card cloning, ATM skimming is one of the most common ways to get credit and debit card data.

It typically uses magnetic stripe cards rather than chip and pin code cards, but as the story suggests, thieves can also install a mini camera on the skimmer to capture the pin number.

3) Formjacking
The digital equivalent of ATM skimming, "formjacking" is a term Symantec uses to refer to hackers who steal credit card information from checkout pages on websites.

They usually install malicious software, usually JavaScript code, to remove credit card numbers.

Cryptojacking is another similar term that refers to the withdrawal of cryptocurrency details.


@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How secure your credit card ?

1) To prevent credit card cloning, try not to transfer your credit card to another person unless it is an emergency.

Many restaurants, clubs and bars now have desktop payment terminals.

Change your PIN regularly and keep track of small unaccounted charges on your credit card with SMS alerts or alerts from the bank app on your phone.

Many thieves initially made small spending with a cloned credit card in order to make a big purchase later.

This gives you at least a lower risk for this problem.

2) To avoid card skimming, you can try to detect fraudulent devices using a mobile app.

But no amount of prevention works better than the above-described tracking of unauthorized transactions and frequent changing of the PIN number.

3) Since most form theft attacks use malicious script, you must β€œkill” it during validation with script blockers.

In Firefox use NoScript, and in Chrome you can use an extension called Script Blocker.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
HTB_ Hackback.pdf
3.8 MB
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘
What is FTP and what port does it use?


1) FTP or File Transfer Protocol is one of the oldest protocols and should probably be removed.

2) FTP is primarily intended for transferring large files, with the ability to resume downloads if they are interrupted.

3)The FTP server can be accessed in two different ways: anonymous access and standard login.

4)They are both basically the same, except that anonymous access does not require an active user login, while standard login does.

5)However, this is the big problem with FTP - user credentials are transmitted in clear text, which means that anyone listening over the wire can eavesdrop on the credentials extremely easily.

6)Two competing FTP implementations that solve this problem are SFTP (FTP over SSH) and FTPS (FTP over SSL). FTP uses TCP ports 20 and 21.

#FastTips
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ› You don't have permission to access / on this server” ?


1) HTTP
Error 403 - Forbidden

2) Forbidden: You don't have permission to access [directory] on this server

3) 403 Forbidden
Access Denied You don't have permission to access
403 forbidden request forbidden by administrative rules

πŸ¦‘So what causes these errors?
The '403 error' occurs for the following main reasons:

1) Incorrect file / directory permissions
This error can be caused due to incorrect file / folder permissions in the webroot directory.
If the default file permissions are not configured to give users access to the website's files, the chances of this error appearing in your web browser are high.

2) Incorrect configuration of Apache configuration files
This error can also be related to incorrect configuration of one of the Apache configuration files.

It could be an invalid parameter that was included by mistake, or missing directives in the config file.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Fix '403 Forbidden Error' :

If you encounter this error, here are some steps you can take to fix it.

1) Configure file permissions and ownership of the webroot directory
Incorrect file permissions and directory ownership are known to restrict access to site files .

Therefore, first, make sure the file permissions are recursively assigned to the webroot directory as shown below.

The webroot directory must always have EXECUTE permissions and the index.html file must have READ permissions.

$ sudo chmod -R 775 / path / to / webroot / directory
Also, set up the owner of the directory as shown below:

$ sudo chown -R user: group / path / to / webroot / directory
Where user is the normal logged in user and the group is www-data or apache.

Finally, restart the Apache web server for the changes to take effect.

$ sudo systemctl restart apache2
If that doesn't solve the problem, go to the next step:


2) Configure directives in the main Apache config file
Make sure you have this block of code in your main Apache config file /etc/apache2/apache2.conf:
<Directory />
Options FollowSymLinks
AllowOverride None
Require all denied
</Directory>

<Directory / usr / share>
AllowOverride None
Require all granted
</Directory>

<Directory / var / www />
Options Indexes FollowSymLinks
AllowOverride None
Require all granted
</Directory>
Save and exit and then restart Apache.

If you are using Apache on RHEL / CentOS systems, make sure to relax access to the / var / www directory in the main Apache configuration file /etc/httpd/conf/httpd.conf.

<Directory "/ var / www">
AllowOverride None
Require all granted
</Directory>
Then save all changes and restart Apache.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Protecting your Linux servers from SYN attacks and IP spoofing isn't as difficult as you might think.

Let's take a look at this with examples.

!) Sysctl allows you to make changes to a running Linux kernel.
This utility reads and modifies various kernel attributes such as version number, maximum limits, and a number of security parameters.

2) The sysctl system also helps prevent attacks such as SYN floods and IP spoofing.

3) It also logs some types of suspicious packets - spoofed packets, source routed packets, and forwarded packets.

4) You can change kernel parameters at run time using the sysctl command, or you can make changes to the system configuration file to make these changes more permanent.

5) I want to show you how you can protect sysctl by quickly editing the config file.

πŸ¦‘This configuration will be as follows:

1) Disable IP forwarding

2) Disable packet forwarding

3) Disable accepting ICMP redirects

4) Enable protection against incorrect error messages

Your not allowed to clone our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘XSS bypass technology XSS insertion bypass some ways summary :

We conducted XSS inspections friendly, and occasionally popped up a small pop-up window. Among them, we summarized some XSS insertion methods that may be used at ordinary times, which is convenient for us to conduct quick inspections in the future, and also provides certain ideas. Among them, XSS has reflection, storage, and DOM. Three categories, as for the specific similarities and differences of each category, this article does not make an academic introduction, directly introduces the actual insertion method


0x00 preface
We conducted XSS inspections friendly, and occasionally popped up a small pop-up window. Among them, we summarized some XSS insertion methods that may be used at ordinary times, which is convenient for us to conduct quick inspections in the future, and also provides certain ideas. Among them, XSS has reflection, storage, and DOM. There are three categories. As for the specific similarities and differences of each category, this article does not make an academic introduction, but directly introduces the actual insertion method.

Four super basic bypass methods.

1) converted to ASCII
Example: the original script <script> alert ( 'I love F4ck') </ script>
by conversion into:
<Script> the String.fromCharCode (97, 108, 101, 114, 1 16, 40 , 8216, 73, 32, 108, 111, 118, 101, 32, 70, 52, 99, 107, 8217, 41) </script>

2) Convert to HEX (hexadecimal)
example: the original script is < script>alert('I love F4ck')</script>
Through conversion, it becomes:
%3c%73%63%72%69%70%74%3e%61%6c%65%72%74%28%2018 %49%20%6c%6f%76%65%20%46%34%63%6b%2019%29%3c%2f%73%63%72%69%70%74%3e

3) The size of the conversion script write
examples: The original script <script> alert ( 'I love F4ck') </ script>
converted to: <sCRIPT> ALERT ( 'Love F4ck the I') </ sCRIPT>

4) increased closing tag ">
examples: the original script Is <script>alert('I love F4ck')</script>
converted to: "><script>alert('I love F4ck')</script>

https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Create randomly insecure VMs :

SecGen is developed and tested on Ubuntu Linux. In theory, SecGen should run on Mac or Windows, if you have all the required software installed.

R E Q U I R E M E N T S :


You will need to install the following:

>Ruby (development): https://www.ruby-lang.org/en/

>Vagrant: http://www.vagrantup.com/

>Virtual Box: https://www.virtualbox.org/

>Puppet: http://puppet.com/

> Packer: https://www.packer.io/

> ImageMagick: https://www.imagemagick.org/

> And the required Ruby Gems (including Nokogiri and Librarian-puppet)
On Ubuntu (16.04) these commands will get you up and running
Install all the required packages:

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

# install a recent version of vagrant

1) wget https://releases.hashicorp.com/vagrant/1.9.8/vagrant_1.9.8_x86_64.deb

2) sudo apt install ./vagrant_1.9.8_x86_64.deb
# install other required packages via repos

3) sudo apt-get install ruby-dev zlib1g-dev liblzma-dev build-essential patch virtualbox ruby-bundler imagemagick libmagickwand-dev exiftool libpq-dev libcurl4-openssl-dev libxml2-dev graphviz graphviz-dev libpcap0.8-dev git

4) Copy SecGen to a directory of your choosing, such as /home/user/bin/SecGen

Then install gems:

5) cd /home/user/bin/SecGen
bundle install

6) To use the Windows basesboxes you will need to install Packer. Use the following command:

curl -SL https://releases.hashicorp.com/packer/1.3.2/
8) packer_1.3.2_linux_amd64.zip -o packer_1.3.2_linux_amd64.zip
unzip packer_1.3.2_linux_amd64.zip

9) sudo mv packer /usr/local/
sudo bash -c 'echo "export PATH=\"\$PATH:/usr/local/\"" >> /etc/environment'

10) sudo vagrant plugin install winrm

11) sudo vagrant plugin install winrm-fs

12) Copy SecGen to a directory of your choosing, such as /home/user/bin/SecGen

13) Then install gems:

cd /home/user/bin/SecGen
bundle install

14) To use the Windows basesboxes you will need to install Packer. Use the following command:

15) curl -SL https://releases.hashicorp.com/packer/1.3.2/packer_1.3.2_linux_amd64.zip -o packer_1.3.2_linux_amd64.zip

16) unzip packer_1.3.2_linux_amd64.zip

17) sudo mv packer /usr/local/

18) sudo bash -c 'echo "export PATH=\"\$PATH:/usr/local/\"" >> /etc/environment'

19) sudo vagrant plugin install winrm

20) sudo vagrant plugin install winrm-fs

21) ruby secgen.rb run


don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A simple way for others to prompt for an empty number when they call your phone:

γ€€γ€€When you don't want to be annoyed by others and are embarrassed to turn off the phone, it is a good idea to let others call your phone to prompt an empty number. Here is a way to make your mobile phone become an empty number at any time. It is very simple Friends in need can make a note... Enter **21*999999# in the standby mode and press the dial button~ OK You're done~! Don't be in this state


1) When you don't want to be annoyed by others and are embarrassed to turn off the phone, it is a good idea to let others call your phone to prompt an empty number. Here is a way to make your mobile phone become an empty number at any time. It is very simple
Friends in need can make a note...
γ€€γ€€
2) Enter **21*999999# in the standby mode and press the dial button~ OK You’re done~!
γ€€γ€€
3) In this state, if someone calls you, it’s empty and you won’t receive a call.
γ€€γ€€
4) Preliminary judgment is that most mobile phones can be
γ€€γ€€
Note: Since all models have not been tested, the success rate cannot be guaranteed.
γ€€γ€€
5) Remind this state even if it is turned off Power also will not cancel
γ€€γ€€the code number to cancel the empty state is the same as above ## 21 # enter the
γ€€γ€€
6) last remind remember to finish off state so as not to cause delay in releasing the empty No.
γ€€γ€€
this principle probably use call forwarding to achieve, but do not answer incoming calls There is no charge if you pass, so this method will not waste your phone bill...

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁