UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
"Bytedance sells TikTok US business" deadline has been postponed
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Built-in SSH client in Windows 10:
1) The Microsoft PowerShell development team decided to migrate OpenSSH (both client and server) to Windows in 2015.

Finally, it appeared in the Windows 10 Fall Creator Update in 2017 and is enabled by default in the April 2018 update.

2) To use the OpenSSH client on Windows 10, simply open a PowerShell window or Command Prompt window and run ssh.

For example, if I want to connect to my Ubuntu desktop on my local network, I would run.

ssh cryptoparty@192.168.0.101
cryptoparty is the username on my Ubuntu desktop and 192.168.0.101 is the private IP address of my Ubuntu desktop.

3) The first time you connect to a Linux computer, you will be prompted to accept the host key.

4) Then enter your password to login .
Once logged in, you can run Linux commands to perform administrative tasks.

5) To exit the Linux window, run the exit command or press Ctrl + D.

To exit the Linux window, run the exit command or press Ctrl + D.
NOW CONNECTED!

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Apple will launch the new AirPods 3 and mini LED iPad in the first half of next year.
#Technologies
Forwarded from UNDERCODE NEWS
Say goodbye to boring video conferencing, Apple’s β€œmmhmm” launch.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to use ASP.NET to encrypt password ?

In ASP, encrypted objects are not provided, we can only use external objects to encrypt. Well now, the encryption solution is provided in ASP.NET. In the namespace System.Web.Security contains the class FormsAuthentication, which has a method HashPasswordForStoringInConfigFile. This method can turn the characters provided by the user into garbled codes, and then store them, or even store them in cookies.
The HashPasswordForStoringInConfigFile method is very simple to use, it supports "SHA1" and "MD5" encryption algorithms.
The following code simply demonstrates its usage:
<%@ Page language="c#" %>
<%@ Import Namespace="System.Web.Security" %>
<html>
<head>
<script language="C#" runat="server">
public void encryptString(Object sender, EventArgs e)
{
SHA1.Text = FormsAuthentication.
MD5.Text =FormsAuthentication.HashPasswordForStoringInConfigFile(txtPassword.Text, "MD5");
}
</script>
</head>
<body>
<form runat="server" ID="Form1">
<p>
<b>Original Clear Text Password: </b>
<br>
<asp:Textbox id="txtPassword" runat="server" />
<asp:Button runat="server" text="Encrypt String" onClick="encryptString" ID="Button1 "/>
</p>
<p>
<b>Encrypted Password In SHA1: </b>
<asp:label id="SHA1" runat="server" />
</p>
<p>
<b>Encrypted Password In MD5: </b>
<asp:label id="MD5" runat="server" />
</p>
</form>
</body>
</html>
As you can see, it is so easy to use. We can encapsulate this encryption program in a function for repeated use. The code is as follows:
public string EncryptPassword(string PasswordString,string PasswordFormat)
{
if (PasswordFormat="SHA1"){
EncryptPassword=FormsAuthortication.HashPasswordForStoringInConfigFile(PasswordString ,"SHA1");
}
elseif (PasswordFormat="MD5")
{EncryptPassword=FormsAuthortication. HashPasswordForStoringInConfigFile(PasswordString ,"MD5");
}
else
{
EncryptPassword="";
}
We can add a field to the database and use insert to store the encrypted password as a string in the database. When the user logs in, the encrypted result of the password entered by the user can be compared with the correct result in the database, and the correctness of the password can be verified by this method

@uNDERCODETesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
PS5 is crispy by adopting explosive SSD, initially opposed to adopting "liquid metal"
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FREE FOR NOW, HACK & FIND :

Name of Breach

Domain Name

Date of Breach

Fabrication status

Verification Status

Retirement status

Spam Status

πŸ¦‘FOR :
Kali Linux
BlackArch Linux
Kali Nethunter
Termux

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

A) Ubuntu / Kali Linux / Nethunter / Termux

1) git clone https://github.com/thewhiteh4t/pwnedOrNot.git

2) cd pwnedOrNot

3) pip3 install requests


B) BlackArch Linux

pacman -S pwnedornot

C) Docker

docker pull thewhiteh4t/pwnedornot
docker create -it --name pon thewhiteh4t/pwnedornot
docker start pon -i
MORE USAGE ON SAME GIT LINK..

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Qualcomm has been approved to sell 4G chips to Huawei.
#Technologies
πŸ¦‘Free official-Code Your First Game: Arcade Classic in JavaScript on Canvas
#LimitedTime

4,5 rating

Display, position, and move filled shapes for retro and prototype gameplay

Move a ball around your game space such that it bounces off boundaries

Handle real-time mouse input

Detect and respond to simple collisions

Program very basic artificial intelligence

Keep and display score during play

Understand the subtle, key difference between a classic game in
this style which is fun to play versus one that isn't

Define and code a win condition and end state for your game


πŸ¦‘https://www.udemy.com/course/code-your-first-game/
Forwarded from UNDERCODE NEWS
CCB Labuan Branch statement: not a blockchain bond issuer and does not accept bitcoin transactions.
#international
How to Get and Set Up a Free Windows VM for Malware Analysis.pdf
1.1 MB
PRACTICAL GUIDE

Step 1: Install Virtualization Software

Step 2: Get a Windows Virtual Machine

Step 3: Update the VM and Install Malware Analysis Tools

Step 4: Isolate the Analysis VM and Disable Windows Defender AV

Step 5: Analyze Some Malware
Forwarded from UNDERCODE NEWS
Microsoft lured retired β€œbenevolent dictator” Python into state
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘No conditions are required for successful exploitation of this vulnerability.

Through this vulnerability, any application software can obtain the following information:

-Hardware data, including: system version, system compilation information, memory and CPU information, battery information, IMEI, baseband version, equipment production serial number, etc.

-Current status data, including: current Basic process information, trace results of all processes, partition mount information, routing table and ARP cache table, operator, current system service status, content provider and broadcast data structure and authority management information maintained by the system, software running time

-log Data, including: system log, system event log, kernel event log, kernel message,

-software data, including: package name, version, signature certificate, usage authority, installation time, last use time

-user sensitive data , Including: connected WiFi network (MAC address, SSID, type, IP, DNS, gateway, DHCP), surrounding available WiFi network SSID/BSSID and type, etc.; Broadcast processing history (can make statistics on user behavior ), current geographic location, historical geographic location, user name of the user's current account, user name and time of the user data synchronization account, and software usage statistics.

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Russian IT companies are outraged by the upcoming cannibalistic law against Google and Apple.
#international
Forwarded from UNDERCODE NEWS
Unique security software that major PC companies are focusing on, the rival horse is that company.
#CyberAttacks