UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
get an admin password on a work PC in an Active Directory domain
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hackers crack 16-bit passwords within 1 hour and hash password security research :

1) Anti-virus research information security professionals said that hackers cracking passwords are as straightforward and simple as our clients use . Avast’s AntonΓ­n HΓ½ΕΎa has been engaged in password security research for many years.

2) He has collected nearly 40,000 password samples and found that only 10% of the passwords in these samples are β€œbeyond the level that can be guessed and cracked under normal circumstances”. It can be cracked very easily. In these samples, almost no password contains uppercase English characters , although software security experts often remind you to use a mixture of uppercase and lowercase characters to set the password (finally know why Apple’s password must be uppercase, lowercase and then add numbers. ). And usually these passwords have an average length of 6 characters , and only 52 passwords exceed 12 characters. The frequently mentioned passwords use some special characters , but there are only a handful of people who really set this format.

3) A hacker group recently tried to crack more than 14,800 random passwords. Each hacker has a success rate of 62% to 90% , and successfully cracked 90% of the hash code in less than an hour by using a computer cluster . It is reported that the hacker group serves the ArsTechnica website. In order to better study the hacking strategy, they also published a method to crack the password. In addition to repeatedly entering passwords and passwords on the website, the hacker team also tried to obtain a series of hashed passwords online.

4) The hashing method makes it difficult for hackers to return to the password from the hash table, and it also allows the website to store a series of hashes instead of storing them as low-security text passwords. This means that even if the hashed password is stolen, the real plain text password will still be stored securely .


Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What Is IP Spoofing Data is transferred via the internet through "packets." An IP (Internet Protocol) address is a unique code that each computer has that identifies the machine these packets are being sent from. IP addresses can be used to identify where a computer is connecting from. In many cases IP look-up services such as whois.com can provide information about who may be using the computer that is associated with an IP address. IP Spoofing is the process of using a fake or random IP address in an attempt to mask where a computer is connecting from or which computer is connecting to a network.

Why IP Spoofing Happens As the internet has grown in scope and usability, so too has the network of individuals who would seek to manipulate internet network protocols for criminal and malicious purposes. Not all cases of IP spoofing are of malevolent intent; for example, some people choose to spoof their IP addresses when going to web sites that the believe have politically or morally questionable content, in fear that their IP address will be saved and they may one day be associated with unpopular causes or viewpoints. However, a significant percentage of IP spoofing happens because those with dubious intent seek to disguise the source of their attacks.

For example, individuals or groups coordinating denial of service (DOS) attacks will often send a barrage of traffic in the form of fake or random IP addresses to certain websites or networks in an attempt to render the sever or servers hosting the sites incapable of processing the traffic, and thus anonymously shutting down the website or network.

Another common use of IP spoofing is the circumvention of user authentication based on IP address or region. For instance, many corporations use an intranet. In order to access all the content on this intranet, the machines requesting access must have an IP address within a specified valid range that shows it is recognized as a trusted machine or the machine is being access from a trusted location. By spoofing a connection from a trusted machine, individuals are able to bypass this authentication method and illegally access the network.

Ways To Protect Yourself Against IP Spoofing IP spoofing can allow an outside party to steal sensitive information or inflict damage on your network. Fortunately, there are a few ways that you can protect yourself against this menace.

The first step you should take is to eliminate host-based authentication on your network. Host-based authentication uses the public host key of the client machine to authenticate a user. Rely instead on network encryption, which sends encrypted packets over a network.

https://github.com/greenarmor/Net-Spoofing-tool
Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to defend against Sniffer attacks ?

1) Autosniffer is a tool developed by the well-known hacker organization (now a security company) L0pht. It is used to detect whether there is a machine in the local network in promiscuous mode (that is, listening mode).

2) A machine in promiscuous mode means that it has probably been hacked and Sniffer installed. It is very important for network administrators to understand which machine is in promiscuous mode for further investigation.

3) Antisniff 1.X version runs in the WindOWS NT system of Ethernet and provides a simple and easy-to-use graphical user interface. The tool tests whether the remote system is capturing and analyzing data packets that are not sent to it in a variety of ways. These test methods have nothing to do with the operating system itself.

4) Antisniff runs on a network segment of the local Ethernet. If it runs in a non-switched Class C network, Antisniff can monitor the entire network; if the network switches are isolated according to working groups, each working group needs to run an Antisniff. The reason is that some special tests use invalid Ethernet addresses, and some tests require statistics in promiscuous mode (such as response time, packet loss rate, etc.).

5) The usage of Antisniff is very simple, select the machine to be checked in the graphical interface of the tool, and specify the checking frequency. For tests other than network response time checks, each machine will return a certain positive or negative value. The returned positive value indicates that the machine is in promiscuous mode, which may have already been installed Sniffer.

6) For the return value of the network response time test, it is recommended to calculate the standard value based on the value returned for the first time, and then check the machine that has a large change in the results returned during the two tests of flood and non-flood. Once these machines exit promiscuous mode and return to normal operation mode, the next test of Antisniff will record the difference (positive value) between promiscuous mode and non-promiscuous mode.

7) Antisniff should be run periodically. The specific period value varies according to different sites, different network loads, the number of machines tested, and website strategies.

https://github.com/LYSYyy/AutoSniff

Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ALL THOSE SHELLS FREE :

AIX-0days.txt AIX 4.2 local root vulnerabilities
leehseinloong.cpp Sudoku2 exploit written for Lee Hsien Loong. (.sg PM)
linux-ia32.c Linux Kernel 2.6.32 ia32entry emulation x86_64 exploit
lotus_exp.py Lotus Domino IMAP4 Server Release 6.5.4 win2k remote exploit
mikrotik-jailbreak.txt Mikrotik 6.40 & below "telnet" jailbreak exploit
mirc-DoS-Script.ini Mirc 6.12 & 6.11 denial-of-service IRC script
mobileiron0day.txt MobileIron Virtual Smartphone Platform local root exploit
MobileIronBypass.tgz MobileIron mobile device management jailbreak detection bypass
mulftpdos.zip Serv-U / G6 / WarFTPD denial-of-service exploit in asm
neogeox.txt NeoGeo Gold X games console jailbreak via UART root shell
NetBSD-sa-2016-003-howto-abuse-cpp.png NetBSD 6.1.5 calendar local root exploit PoC
openbsd-0day-cve-2018-14665.sh OpenBSD 6.4 Xorg local root exploit
prdelka-vs-AEP-smartgate.c AEP Smartgate V4.3B arbitrary file download exploit
prdelka-vs-APPLE-chpass.sh OS-X 10.6.3 & below chpass arbitrary file creation exploit
prdelka-vs-APPLE-ptracepanic.c OS-X 10.6.1 & below ptrace() mutex handling kernel panic
prdelka-vs-BSD-ptrace.tar.gz NetBSD 2.1 ptrace() local root exploit
prdelka-vs-CISCO-httpdos.zip Cisco IOS 12.2 & below HTTP denial-of-service exploit
prdelka-vs-CISCO-vpnftp.c Cisco VPN Concentrator 3000 FTP remote exploit
prdelka-vs-GNU-adabas2.txt Adabas D 13.01 SQL injection & directory traversal
prdelka-vs-GNU-adabas.c Adabas D 13.01 local root exploit Linux
prdelka-vs-GNU-chpasswd.c SquirrelMail 3.1 Change_passwd plugin & below local root exploit
prdelka-vs-GNU-citadel.tar.gz Citadel SMTP 7.10 & below remote code execution exploit
prdelka-vs-GNU-exim.c Exim 4.43-r2 & below host_aton() local root exploit (Linux)
prdelka-vs-GNU-lpr.c Slackware 1.01 stack overflow local root exploit (Linux)
prdelka-vs-GNU-mbsebbs.c mbse-bbs 0.70.0 & below local root exploit (Linux)
prdelka-vs-GNU-peercast.c PeerCast v0.1216 remote root exploit (linux)
prdelka-vs-GNU-sudo.c sudo 1.6.8p9 race condition local root exploit (Linux)
prdelka-vs-GNU-tin.c Slackware 1.01 local root exploit (Linux)
prdelka-vs-HPUX-libc.c HP-UX 11.11 & below libc local root exploit (hppa)
prdelka-vs-HPUX-swask.c HP-UX 11.11 & below swask format string local root exploit (hppa)
prdelka-vs-HPUX-swmodify.c HP-UX 11.11 & below swmodify local root exploit (hppa)
prdelka-vs-HPUX-swpackage.c HP-UX 11.11 & below swpackage local root exploit (hppa)
prdelka-vs-http-fuzz.tar.gz HTTP fuzzing tool & example Savant 3.1 vulnerability
prdelka-vs-LINUS-fchown.tar Linux kernel 2.4.x/2.6.6 & below fchown() file ownership exploit
prdelka-vs-MISC-massftp.tar.gz Mass scanning ftp exploiter tool
prdelka-vs-MS-hotmail.txt Microsoft Hotmail Authentication Bypass vulnerability
prdelka-vs-MS-IE-6.0.2800.1106.XPSP1.rar Internet Explorer 6.0 IFRAME Windows XP exploit
prdelka-vs-MS-rshd.tar.gz Windows RSH daemon 1.8 & below remote exploit
prdelka-vs-MS-winzip.c WinZip 10.0.7245 Win32 & below exploit (the one that angered CERT)
prdelka-vs-SCO-enable SCO OpenServer 5.0.7 enable local root exploit
prdelka-vs-SCO-netwarex.c SCO OpenServer 5.0.7 netware printing local "lp" exploit
prdelka-vs-SCO-ptrace.c SCO Unixware 7.1.3 ptrace() linux kernel emulation local root exploit
prdelka-vs-SCO-tcpdos SCO OpenServer 5.0.7 TCP RST denial-of-service exploit
prdelka-vs-SCO-termshx.c SCO OpenServer 5.0.7 termsh local gid "auth" exploit
prdelka-vs-SGI-xrunpriv SGI IRIX 6.5 runpriv local root exploit
prdelka-vs-SUN-sysinfo.c Solaris 10 sysinfo() local kernel memory information leak
prdelka-vs-SUN-telnetd.c Solaris in.telnetd 8.0 & 7.0 remote exploit (sparc)
prdelka-vs-SUN-virtualbox.sh Sun VirtualBox 3.0.6 local root exploit
prdelka-vs-THC-vmap THC vmap DoS exploit
prdelka-vs-UNIX-permissions.tar.gz UNIX file permissions generic directory exploit

DOWNLOAD :

https://github.com/hackerhouse-opensource/exploits

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Wordpress Exploit tool 2020 :

F E A T U R E S :

Effective version number filtering
Advanced filtering
Fast search
View search results in a table with keywords highlighting
View search results in a table without keywords highlighting
View search results without a table
Save search results into a text file
Search suggestions with customization
Open the source code of exploits and shellcodes using vim
View information about the characteristics of exploits and shellcodes
Copy an exploit or a shellcode file into a directory specified by the user
Automatic check for database update and for hsploit updates

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

Linux (not-root user) [recommended]
We can install hsploit simply by doing:

$ git clone https://github.com/nicolas-carolo/hsploit
$ cd hsploit
$ ./install_db_linux.sh
$ pip install -r requirements.txt
$ python setup.py install
Now you can remove the repository of hsploit you have downloaded, because this repository has been cloned in ~/.HoundSploit/hsploit for supporting automatic updates. If you have already installed the version 2.3.0 of HoundSploit or you never installed HoundSploit, you can check if there is the directory ~/HoundSploit and then you can delete it.

Linux (root user)
We can install hsploit simply by doing:

$ git clone https://github.com/nicolas-carolo/hsploit
$ cd hsploit
$ mkdir /root/.HoundSploit
$ touch /root/.HoundSploit/enable_root.cfg
$ ./install_db_linux.sh
$ pip install -r requirements.txt
$ python setup.py install

don't clone our tutorials
FROM GIT 2020
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘UNDERCODE TESTING FACEBOOK GROUP OPEN AGAIN FOR ALL MEMBERSπŸ‘πŸ»

fb.com/groups/UndercodeTesting

-Your allowed to share anything related to hacking

Β»Rules
:

No Spam, No phishing Links, No Selling
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Free bug Bounty:

https://bounty.github.com

https://github.com/djadmin/awesome-bug-bounty. (( 500 ))

https://securitylab.github.com/bounties

https://m.youtube.com/watch?v=AO_NoVxt2ss

https://m.youtube.com/watch?v=AbebbJ3cRLI

https://m.youtube.com/watch?v=-xbbvAKGXK8


Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁