UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘RocketMQ transaction message :
#fastTips

RocketMQ began to support distributed transaction messages in version 4.3, using the idea of ​​2PC to implement the commit transaction message, and at the same time adding a compensation logic to handle the two-stage timeout or failure message,

1
.1 Send and submit

(1) Send a message (half message, that is, sent but not consumed);

(2) The server responds to the message writing result;

(3) Execute local transactions according to the sent results. If the write fails, the half message is not visible to the business at this time, and the local logic is not executed;

(4) Execute Commit or Rollback according to the local transaction status (Commit operation generates a message index, and the message is visible to consumers)

1.1 Compensation process

(1) For transaction messages without Commit/Rollback (messages in the pending state), initiate a "back check" from the server;

(2) Producer receives the check-back message and checks the status of the local transaction corresponding to the check-back message;

(3) Re Commit or Rollback according to the local transaction status;

Among them, the compensation phase is used to resolve the timeout or failure of the message Commit or Rollback.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is SSH and what port does it use?

1)
SSH or Secure Shell is most familiar to Linux users, but ssh has many features that users can use.

2)SSH is designed to create a secure tunnel between devices, be they systems, switches, thermostats, toasters, etc.

3)SSH also has the unique ability to tunnel other programs through it, similar to the VPN concept, so even unsafe programs or programs that run on unsecured connections can be used in a secure state if configured correctly. SSH runs over TCP port 22.

#FastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to transfer landline calls :


1) When you're out of your incoming calls can be transferred to a landline phone on their mobile phone or other landline phone does not ensure bobble.
γ€€γ€€
2) Second, set the
γ€€γ€€
> application: * 57 * TN #; Cancel: # 57 #. (TN stands for the phone number or mobile phone you want to set) I have tested that both Telecom and Tietong landlines are suitable. Because there is no Netcom landline installed, I did not test it myself!
γ€€γ€€
3) Third, Tips
γ€€γ€€
This function can not be transferred to a long distance number
γ€€γ€€
four charges
γ€€γ€€
no monthly transfer once counted a fee; (cost of landline perform call transfer call transfer fee of numbers)

4) Fifth, for dial 10000 apply in person at the Telecommunications Business Office processing. Normal dial 10086 in the north (Netcom)

#FastTips
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘
What is FTP and what port does it use?


1) FTP or File Transfer Protocol is one of the oldest protocols and should probably be removed.

2) FTP is primarily intended for transferring large files, with the ability to resume downloads if they are interrupted.

3)The FTP server can be accessed in two different ways: anonymous access and standard login.

4)They are both basically the same, except that anonymous access does not require an active user login, while standard login does.

5)However, this is the big problem with FTP - user credentials are transmitted in clear text, which means that anyone listening over the wire can eavesdrop on the credentials extremely easily.

6)Two competing FTP implementations that solve this problem are SFTP (FTP over SSH) and FTPS (FTP over SSL). FTP uses TCP ports 20 and 21.

#FastTips
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ“‹ How to create your own service What Is My IP :
#FastTips

1) Python, Web Hosting and PHP
For this tutorial, we are going to use Python and assume we already have our own web hosting environment.

2) This is necessary as we need our own online server that will return our external IP address.

πŸ¦‘Python

1) The Python code you see below will get the page that was set as 'URL', and then it will filter out the H1 header and the end of the H1 header, just like between the header HTML, we will output the external IP address.
import requests
url = 'https://UndercodeNews.com/getip.php'
r = requests.get(url)
r.text
ip = r.text.split('<h1>')[1].split('</h1>')[0]
print(ip)

πŸ¦‘Web hosting
In your web hosting environment, you will need to host a PHP file containing some code, this code will return the page as shown in the picture below.

For example, in Apache, you would need to store content in the following directory:

/var/www/html/getip.php

#FastTips
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘no root Social Engineering Toolkit on Termux
#FastTips

1) pkg update && pkg upgrade -y

2) apt install curl -y

3) curl -LO https://raw.githubusercontent.com/Hax4us/setoolkit/master/setoolkit.sh

4) sh setoolkit.sh

5) After finishing the above process type the following command

6) cd setoolkit

7) ./setup.py install

8) ./setoolkit

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Everything you need to know about Google Stadia :
#FastTips


1) On June 12, Google fixed one of the main shortcomings of the Stadia service: it is now available on any Android device, whether it is on the official support list or not. In addition, all OnePlus models from OnePlus 5 will support Stadia.

2) To use Stadia on a device without official support, you need to download the Stadia app, open the β€œExperiments” tab, click β€œPlay”. The service should work without problems.

3) Last year Google announced the Stream project. This was a limited test built around Assassin's Creed Odyssey. After a short period of testing in January, the project ended and Google said nothing about its future plans to stream games. Stadia was announced at GDC 2019.

4) The idea of ​​streaming is far from new. However, Google's service may turn out to be one of the most ambitious.

Google Stadia is a game streaming service to any user's device. It can be a TV, smartphone, laptop, tablet. In any case, you will be able to access the most advanced games.

How is this possible? Google servers process the image of the games and broadcast it. The user only needs a device with a screen. This gives everyone access to high quality games with high system requirements. Including those who cannot afford to buy an expensive gaming computer or console.

πŸ¦‘Supported platforms
The cloud service works with a Chromecast Ultra device when connected to a TV. Chrome browser is supported on computers, laptops and tablets, including Chrome OS. Among smartphones, Google Pixel 2, Pixel 3, Pixel 3a and Pixel 4 are supported.

In February, support for the following smartphones appeared:

Samsung Galaxy S8

Samsung Galaxy S8 Plus

Samsung Galaxy S8 Active

Samsung Galaxy Note 8

Samsung Galaxy S9

Samsung Galaxy S9 Plus
..../.......

5) in June it was announced that all Android smartphones will be able to work with Stadia. Even those that are not included in the above list. You can install the Stadia application on them, open the "Experiments" tab and click "Play".

6) Since this is a cloud service, all the heavy processing is done by other people's computers remotely. You can work with a smartphone, tablet or even a weak computer, the quality will be equally high. Users of the service will receive the computing power of a custom AMD 2.7 GHz x86 processor, 16 GB of RAM, data transfer rates up to 484 GB / s and a GPU with a capacity of 10.7 teraflops.

This makes Google's platform more powerful than any game console on the market. In addition, Google will be responsible for updates and users will not have to do anything.

Of course, the quality of the games will depend on your internet connection. Playing on Chromecast Ultra, you can get 4K support with HDR and 5.1 surround sound if you have a TV, sound system, and fast enough internet to support it all.

πŸ¦‘Can I try Stadia for free?

Yes. Google has announced a two-month free trial for Stadia Pro. Any owner of supported devices can play several games on the service for free. They can buy additional games to play and stream. After the trial period ends, you can renew your Stadia Pro subscription for $ 9.99 per month. You can unsubscribe at any time before the end of the trial period.

Your not allowed to copy our tutorials
!@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘Hack wifi with gerix on linux :
#FastTips

1) download or clone https://github.com/kimocoder/gerix-wifi-cracker/archive/master.zip

2) apt-get install qt4-dev-tools

3) Running Gerix Wireless 802.11 Hacking Tool

$ python gerix.py

4) it gui interface appears now click at scan and attack


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Network security
#FastTips
is essentially the information security on the network. In a broad sense, all relevant technologies and theories related to the confidentiality, integrity, availability, authenticity and controllability of information on the network are the field of network security research. Ensuring the information security of the network system is the goal of network security. Information security includes two aspects: the security of information storage and the security of information transmission. Information storage security refers to the security of information in a static storage state, such as whether it will be used without authorization, etc. The transmission security of information refers to the safety of information in the dynamic transmission process. In order to ensure the security of network information transmission, there are the following issues:

γ€€γ€€(1) The monitoring of information on the network
γ€€γ€€(2) The impersonation of the user's identity
γ€€γ€€(3) The tampering of information on the network
γ€€γ€€(4) The denial of the information sent
γ€€γ€€(5) The retransmission of the information

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Mod your own apk
#fastTips


source code: https://github.com/kaleemullah360/android-APK-Mods

1) Load APK
java -jar apktool.jar if application-name.apk

2) Decode APK
java -jar apktool.jar decode application-name.apk

3) Recompile APK
java -jar apktool.jar b application-name.apk

4) Add signature using APK Signer
java -jar apk-signer-1.8.5.jar certificate.pem key.pk8 application-name.apk

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to solve the problem that there is a black border around the Windows 10 monitor that cannot be displayed in full screen?

Some friends reported that in the actual application of their win10 system, the display cannot be displayed in full screen and there is a black border around it! How to solve the problem of a black border around the display in win10 cannot be displayed in full screen? Today, the editor brings you a solution to the black border around the win10 monitor that cannot be displayed in full screen. Interested friends should not miss it.

πŸ¦‘How to solve the problem that there is a black border around the Windows 10 monitor that cannot be displayed in full screen:

1) Press win+r to enter the run window, enter "regedit" and press Enter.

2) In the registry editor window, locate [HKEY_CURRENT_USER/SOFTWARE/BLIZZARD ENTERTAIMENT/WARCRAFTIII/Video].

3) Open the reshight file (screen height) in the left margin and change the numerical data inside to "768", then open the reswidth file (screen width) and change the numerical data to "1366".

4) In the blank area of ​​the desktop, right-click and select "Display Settings".

5) In the window, select "Advanced Display Settings", then change the resolution to "1366 x 768" and click Apply.

#fASTtIPS
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SpeeduP Linux Tips:

> Reduce the default grub load time:

>Manage startup applications:

>Install preload to speed up application load time:

>Choose the best mirror for software updates:

>Use apt-fast instead of apt-get for a speedy update:

>Remove language related ign from apt-get update:

>Reduce overheating by disabling system services

#FastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘DOM-based or local XSS

Based on DOM or local XSS attacks. Generally, a free wifi is provided, but a gateway that provides free wifi will insert a script into any page you visit or directly return a phishing page, thereby implanting malicious scripts. This kind of direct existence on the page without returning from the server is a local XSS attack.

Example 1:

1. Provide a free wifi.

1. Start a special DNS service, resolve all domain names to our computer, and set the Wifi DHCP-DNS to our computer IP.

2. After the user connected to wifi opens any website, the request will be intercepted by us. We forward to the real server according to the host field in the http header.

3. After receiving the data returned by the server, we can inject the webpage script and return it to the user.

4. When the injected script is executed, the user's browser will preload the common script libraries of major websites in turn.
#FastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to check for unnecessary subscriptions on iPhone?
#FastTips

1) These days, one-time purchases of games, music, books, news, movies, and TV shows on mobile are being replaced by monthly subscriptions. It is enough to subscribe once and the funds will be automatically debited every month. There are free trial periods, to gain access to which you also need to subscribe to the service. After that, you can forget to unsubscribe if you don't want to pay. Or some don't know how to unsubscribe. We will tell you how to avoid such troubles.

2) There are several ways to check for subscriptions on iPhone, whether paid or free. Subscriptions made with your Apple ID account are verified. Services like Apple Arcade, Apple News +, Apple Music, Apple TV +, Apple TV, and third-party services appear in one place.

3) You can access the subscription management page from applications such as Books, Music, iTunes Store. The fastest way to do this is in system settings, App Store and TV apps.

Settings: Apple ID -> Subscriptions

Profile icon (in Today, Games, Apps and Arcade) -> subscriptions on the app Store

4) Settings (left), App Store (center), TV (right)

Once on the subscription page, you will see all subscriptions associated with your Apple ID account, active and expired. To cancel, click under the active ones, then click "Cancel free trial" or "Cancel subscription", then in the window click "Confirm".

5) Keep in mind that these are only Apple ID-related subscriptions. You may have others with other accounts that do not appear on this page. If you suspect the existence of such subscriptions, check the corresponding applications. Examples include subscriptions to GrubHub, DoorDash, Netflix, Hulu.

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Malware on your phone IS possible ?
Most people doubt that mobile devices can get infected with malware.

It's true?

That's 101% possible, well, maybe not in the standard traditional method, for iPhone and Apple devices.

But, technically, the same process applies.
Let's look at the problem more specifically.

1) Once the malware connects to your phone, it performs several operations.

2) Competing with your phone's resources and destroying many programs.

The classic signs of malware on your phone are:

Apps take longer to load

> Your battery is draining faster than usual

> Apps you haven't downloaded appear as available

#FastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁