UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.2K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Ransomware attack caused E-Land store business disruption
#CyberAttacks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Wi-Fi rainbow table generator
Wi-Fi rainbow tables can be generated by the wlangenpmkocl program from the hcxkeys package .

The hcxkeys package includes two utilities:

1) wlangenpmk - Generates plainmasterkeys (using CPU) from essid and password for use in hashcat (with hash mode 2501) or John the Ripper (hash type wpapsk-pmk)

2) wlangenpmkocl - generates plainmasterkeys (using GPU) from essid and password for use in hashcat (with 2501 hash mode) or John the Ripper (wpapsk-pmk hash type)
That is, the only difference between them is that

3) wlangenpmkocl uses a video card, while wlangenpmk uses a central processor. It is of course preferable to use the graphics card version (i.e. wlangenpmkocl ). The wlangenpmk version is only for extreme situations - you do not have a discrete video card or you cannot install its driver for full OpenCL support

πŸ¦‘How to install hcxkeys
To use wlangenpmkocl , install the drivers for the video card, information about this and about OpenCL can be found in the articles:

Installing video drivers in Linux
How to crack passwords in Linux with a video card and a central processor
Installation on Kali Linux

1) sudo apt install openssl opencl-headers git

2) git clone https://github.com/ZerBea/hcxkeys

3) cd hcxkeys/

4) make

5) sudo make install

If the following messages are displayed while executing the make command :

1) gcc -O3 -Wall -Wextra -std=gnu99 -DVERSION_TAG=\"6.0.0-2-gcc4549f\" -DVERSION_YEAR=\"2020\" -o wlangenpmk wlangenpmk.c -lcrypto

2) gcc -O3 -Wall -Wextra -std=gnu99 -DVERSION_TAG=\"6.0.0-2-gcc4549f\" -DVERSION_YEAR=\"2020\" -o wlangenpmkocl wlangenpmkocl.c -lcrypto -lOpenCL

3) In file included from /usr/include/CL/cl.h:20,
from wlangenpmkocl.c:26:
/usr/include/CL/cl_version.h:22:9: note: β€˜#pragma message: cl_version.h: CL_TARGET_OPENCL_VERSION is not defined.

4) Defaulting to 220 (OpenCL 2.2)’
22 | #pragma message("cl_version.h: CL_TARGET_OPENCL_VERSION is not defined. Defaulting to 220 (OpenCL 2.2)")
| ^~~~~~~

5) gcc -O3 -Wall -Wextra -std=gnu99 -DVERSION_TAG=\"6.0.0-2-gcc4549f\" -DVERSION_YEAR=\"2020\" -o pwhash pwhash.c -lcrypto

6) then these are not errors - they are information. Compilation should still succeed and you can continue.

Installation in BlackArch

sudo pacman -S hcxkeys

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Microsoft employees began moving to the new campus in Herzliya, which was established with an investment of about NIS 350 million .
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to make blurry special effects video with butter camera on android :

1. The first step is to open the butter camera, after entering, click the shooting icon at the bottom

2. After going to the album in the second step, select the video whose call distance should be blurred


3. After the third step goes to the layout interface, click Adjust



4. After the fourth step to adjust the interface, click on blur



5. After clicking on the fifth step, you can blur the video and use it as needed



apk link https://play.google.com/store/apps/details?id=com.flavionet.android.camera.pro&hl=en&gl=US

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
It is reported that Apple is looking for Samsung M1 to buy a Mac and guess it.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Static Keys(linux krnel for advanced pentesters):
Warning

A) DEPRECATED API:

The use of β€˜struct static_key’ directly, is now DEPRECATED. In addition static_key_{true,false}() is also DEPRECATED. IE DO NOT use the following:

struct static_key false = STATIC_KEY_INIT_FALSE;
struct static_key true = STATIC_KEY_INIT_TRUE;
static_key_true()
static_key_false()

B) The updated API replacements are:

DEFINE_STATIC_KEY_TRUE(key);
DEFINE_STATIC_KEY_FALSE(key);
DEFINE_STATIC_KEY_ARRAY_TRUE(keys, count);
DEFINE_STATIC_KEY_ARRAY_FALSE(keys, count);
static_branch_likely()
static_branch_unlikely()

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Phoenix has implemented a control system to monitor the company's IT system.
#international #Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Major Ransomware accident cases:

o (Server) Ransomware infection and major data leakage due to insufficient security settings-

[ Case 1] Access to remote ports (3389, 22) from outside without using an easy password or access control policy-

[Case 2] Weak account management and security updates of VPN devices built to access the internal network are not applied-

[Case 3] ] Use of operating system and software for which security support has been terminated or security updates have not been applied

(PC) Ransomware infection and major data leakage due to non-compliance with security rules-

[Case 1] Attaching malicious mail disguised as official letters, resumes, estimates, etc. Execution of files (ransomware)

-[Case 2] Execution of files disguised as the latest movies downloaded through P2P programs (ransomware)

-[Case 3] Web in which malicious codes (ransomware) are hidden using a vulnerable version of the browse

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Advice for hackers trying to get started with bug bounties.
#Analytiques
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘βœ‰οΈ How to access deleted WhatsApp conversations:

Step 1: Download and Install WhatsRemoved
https://play.google.com/store/apps/details?id=color.dev.com.whatsremoved&hl=en&gl=US


WhatsRemoved is free to download from the Google Play Store, so either follow the link or click the link to install the app.

Step 2: Share WhatsApp

1) Launch the WhatsRemoved you have installed, launch the software and follow the instructions.

2) You will be prompted to select the default installation method, so choose the recommended method.
Next, an authorization screen will appear, requesting access to images, internet and data from your computer.

3) Click "Open" to access the application.

The " Notification Lister Program " prompt may appear immediately after the application has been authorized to access your account data.

4) Click Yes to go to the Notification Access tab , then click Write Notification Information to switch the device.

5) There, click β€œEnable” in the confirmation prompt to complete the configuration.

Step 3. Wait while the application recovers deleted messages.
WhatsRemoved works to intercept any incoming messages in the background, all you have to do is wait for some of them to be delivered.

Any deleted messages that you can view directly from the notification bar are automatically notified by the app.

And while it's not 100%, the device can recover deleted media files easily as well.

Open the app to display data downloaded from the Internet.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
10 million personal information leaked from large Christian community Frey.com
#Leaks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘LINUX SPEED HACK :

[1]. Quick Fixes - Disable unnecessary servicesDisable unnecessary services to make Linux Boot Faster

Linux comes in various flavors bundled with a lot of applications.However,most of us don't even use Linux to its full potential. Depending upon the use of the machine, plenty of services and running programs won’t be needed. And if you are using Linux just for a desktop,then you won’t be needing the default sendmail , httpd, and many other services.You can also turn off many other services if your Linux box is used as a small web server by going to Administration menu,tweaking the Services entry and deselect all of the services you don’t want to start.

[2]. Free up Your Kernel - Disable unnecessary kernel modules

If your Linux box is wired to the LAN/Ethernet,then you don’t need to have a wireless kernel module loaded. More services like smartcard modules and more can be disabled and the load can be taken off from the kernel.This task is a bit Tweaking Linux Kernel is even difficult for Linux Geeks..but its worth its time and learningdifficult requires recompilation of kernel, which is daunting for even the *inux geeks. To do this, you will need the kernel sources and then follow the standard steps for compiling a kernel. You will be having a ride through the internals of your system just disable all of the kernel modules you don’t need.

For added safety,install Bootchart which will tell you if Kernel modules are properly installed and running on your system. Not only will this give you a good list of modules, it will illustrate for you what is happening during your system boot. You can also issue the command

chkconfig –list | grep 3:on

to find out what services are running. Once you know what loading modules you don’t need, you can remove them during a kernel recompilation. While you’re at it, compile the kernel to exactly match your architecture.Make your Linux Faster - Use a Lightweight Linux Distribution

[3]. Take Load Off Linux - Use a lightweight window manager instead of GNOME or KDE

Using a smaller window manager drastically reduces graphical boot time. Instead of having to wait that extra 30 to 60 seconds for GNOME or KDE to boot up, why not wait two to 10 seconds for Enlightenment or XFCE to boot up? Not only will they save you boot time, they will save your memory and the headache of dealing with bloatware.

[4]. CUI ROKZ’ - Use a text-based login instead of a graphical login

The graphical logins do two things: increase load times and create headaches trying to recover from an X windows failure.Most of Linux machines which boot to run level 3 instead of run level 5 will halt at the text-based login, where you only have to log in and issue startx to start your desktop of choice.So CUI login is the way to go.

[5]. The Flying Penguin - Use a lighter Linux distributionLet Your Linux Fly - Use a lighter Linux distribution

Are You a Linux newbie ? Instead of loading the heavyweight SUSE, why not try a DSL, Puppy Linux, or Gentoo? The boot times for these smaller distributions are far faster than the more bloated Fedora (SUSE and even Ubuntu).Loading lighter linux distributions will save you from lot of headaches. Of the larger distributions, OpenSuSE claims to boot the fastest, but between the latest Fedora and Ubuntu, Ubuntu blows Fedora’s boot times away (and that is out of the box,trust me..).

[6]. Get Savvy - Use an OpenBIOS

If you’re tech savvy enough to upgrade your PC’s firmware, you might consider a migration to open source BIOS which Use custom Open bios to meet your machine's needswill allow Linux to actually initialize the hardware as it boots (instead of relying on the BIOS). Also, many open BIOSes can be customised to meet your machine’s specific needs. If you don’t go the open BIOS route, you can at least configure your BIOS to not search for a floppy drive that’s not there or to boot directly to the first hard drive (instead of the CD drive first).

[7]. DHCP woes - Avoid dhcp
If you are working on a home network (or a small business network) where address lease isn’t a problem, go with static IP addresses. This will keep your machine from having to call out to a dhcp server to get an IP address. If you take this approach, make sure you configure yourAvioding DHCP and Unplugging Hotplug will surely speed things up

/etc/resolve.conf

to reflect your DNS server addresses as well.

[8]. Hotplug unplugged - If you can spare it, get rid of hotplug

Hotplug is the system that allows you to plug in new devices and use them immediately. If you know your server won’t need this system, delete it. This will cut down on boot time. On many systems, hotplugging consumes much of the boot time. Removing hotplug will vary depending upon the distribution you use.

NOTE: udev has, for the most part, replaced hotplug. But if you’re running an older distribution, this does apply.Are You Daring enough to mess with initng ?

[9]. If you are REALLY daring, you could give initng a try

The initng system serves as a replacement for the sysvinit system and promises to drastically decrease boot times in UNIX-like operating systems. If you would like to see the initng system in action, you can give the Pingwinek livecd a try.

[10]. HackerPunk - Use a hack with Debian

If you’re using Debian, there is a simple hack you can use to switch your startup scripts to run in parallel. If you look at Hack your debian to run startup scripts in parallelthe

/etc/init.d/rc

script, you will see:

CONCURRENCY=none

Source: www.theprohack.com
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
linux speed tips
Forwarded from UNDERCODER
Microsoft Word desktop will soon fully support the dark theme.
#Updates

MORE DETAILS - https://undercodenews.com/microsoft-word-desktop-will-soon-fully-support-the-dark-theme/23/11/2020/
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is a hive or hive registry (hive) in Windows ?

1) In the literature, especially on registry analysis programs, the expressions "registry hive" or "registry hive" are often used, in English this is denoted by the word hive .

2) Regarding programs for analyzing the registry, the expression "registry hive" usually means one of the files SOFTWARE, SAM, SECURITY, SYSTEM, and so on. That is, a registry hive is a file that stores root-level keys or root-level keys.

3) In the context of the Registry Editor, a registry hive can mean a hierarchical portion of the registry, not necessarily located in a separate file.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Cloud storage market to exceed $ 137 billion by 2025
#Analytiques #international