UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Adding, Removing, and Granting Sudo Rights to Users on CentOS:

Log into the CentOS system as root or any user with sudo privileges.

First, let's add sudo privileges to the new user.

1) Add sudo users to CentOS

Let me create a new user named "senthil".

To do this, I will run the following command as root from the terminal:

# adduser senthil
Set a password for the new senthil user:

# passwd senthil
He is not yet authorized to perform any administrative tasks.
Let's check if the senthil user can use the sudo command:
# sudo -l -U senthil
Output example:

User senthil is not allowed to run sudo on centos8
That's right, it is not yet allowed to run sudo on my CentOS 8 system.
Let's give it sudo rights now.

2) Grant sudo privileges to users on CentOS.
To add a regular user to the sudoers group, you need to add him to the wheel group.

For those of you curious, wheel is a special group on some Unix-like operating systems.

All members of the wheel group are allowed to perform administrative tasks.

The Wheel group is similar to the sudo group on Debian based systems.

We can add users to sudoers in two ways.

The first way is to use the chmod command.

2.1. Adding users to sudoers using usermod command on CentOS
Now, let's grant sudo privileges to the newly created user β€œsenthil” by adding him to the wheel group using the usermod command as shown below:

# usermod -aG wheel senthil
Here -aG refers to the optional group.

In our case, this is the wheel group.

That's it, we have just granted sudo permissions to senthil.

Let's check if the user is in the sudoers list using the command:

# sudo -l -U senthil
Conclusion:

Matching Defaults entries for senthil on centos8:
!visiblepw, always_set_home, match_group_by_gid,
always_query_group_plugin, env_reset, env_keep="COLORS DISPLAY
HOSTNAME HISTSIZE KDEDIR LS_COLORS", env_keep+="MAIL PS1 PS2 QTDIR
USERNAME LANG LC_ADDRESS LC_CTYPE", env_keep+="LC_COLLATE
LC_IDENTIFICATION LC_MEASUREMENT LC_MESSAGES", env_keep+="LC_MONETARY
LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE", env_keep+="LC_TIME LC_ALL
LANGUAGE LINGUAS _XKB_CHARSET XAUTHORITY",
secure_path=/sbin\:/bin\:/usr/sbin\:/usr/bin

User senthil may run the following commands on centos8:
(ALL) ALL
As you can see in the last line of the above output, user "senthil" can now execute all commands.

2.2. Add users to sudoers by editing the sudoers config file on CentOS
Another way to add users to the sudoers list is to directly add him / her to the sudoers config file.

Edit the sudoers config file with the command:

# visudo
The system will open the / etc / sudoers file in your Vi editor or whatever you have in your $ PATH.

Scroll down until you find the following entry:

root ALL=(ALL) ALL
Add the following line immediately after the above entry:
senthil ALL=(ALL) ALL
Here the line ALL = (ALL) ALL indicates that the user "senthil" can execute any command on any host.
Replace β€œsenthil” with your username.
Save and close the file.
That's all.
The user β€œsenthil” has been added to the sudoers list.
2.3. Checking sudo users on CentOS
Log out of the current session and log in again as the newly created sudo user.

Alternatively, you can switch to another user directly without leaving your current session using the following command:

# sudo -i -u senthil
Now check if the user can perform any administrative task with sudo privileges:

$ sudo dnf update

3) Remove the sudo privileges from the CentOS user.
We can revoke sudo rights from a user without completely deleting their account.

To revoke sudo permissions from a user, simply run the following command as root:

# gpasswd -d senthil wheel

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
As of September next year the British telecom firm forbids the installation of new Huawei 5G products.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Consolidating and extending hosts files from several well-curated sources. You can optionally pick extensions to block pornography, social media, and other categories.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/StevenBlack/hosts.git

2) Option 1: Generate in a Docker container
We provide a Dockerfile that you can use to create a Docker container with everything you need. The container will contain Python 3 and all its dependency requirements, and a copy of the latest version of this repository.

Build the Docker container like this:

3) docker build ./
Access the terminal like this:

docker run -it (containerid) bash

4) Option 2: Generate it in your own environment.
To generate your own amalgamated hosts files you will need Python 3.5 or later.

First, install the dependencies with:

pip3 install --user -r requirements.txt

5) Common steps regardless of your development environment.
To run unit tests, in the top-level directory, run:

python3 testUpdateHostsFile.py
The updateHostsFile.py script will generate a unified hosts file based on the sources in the local data/ subfolder. The script will prompt you whether it should fetch updated versions (from locations defined by the update.json text file in each source's folder). Otherwise, it will use the hosts file that's already there.

python3 updateHostsFile.py [--auto] [--replace] [--ip nnn.nnn.nnn.nnn] [--extensions ext1 ext2 ext3]
Command line options:
--help, or -h: display help.

--auto, or -a: run the script without prompting. When --auto is invoked,

Hosts data sources, including extensions, are updated.
No extensions are included by default. Use the --extensions or -e flag to include any you want.
Your active hosts file is not replaced unless you include the --replace flag.
--backup, or -b: Make a backup of existing hosts file(s) as you generate over them.

--extensions <ext1> <ext2> <ext3>, or -e <ext1> <ext2> <ext3>: the names of subfolders below the extensions folder containing additional category-specific hosts files to include in the amalgamation. Example: --extensions porn or -e social porn.

--flush-dns-cache, or -f: skip the prompt for flushing the DNS cache. Only active when --replace is also active.

--ip nnn.nnn.nnn.nnn, or -i nnn.nnn.nnn.nnn: the IP address to use as the target. Default is 0.0.0.0.

--keepdomaincomments, or -k: true (default) or false, keep the comments that appear on the same line as domains. The default is true.

--noupdate, or -n: skip fetching updates from hosts data sources.

--output <subfolder>, or -o <subfolder>: place the generated source file in a subfolder. If the subfolder does not exist, it will be created.

--replace, or -r: trigger replacing your active hosts

--skipstatichosts, or -s: false (default) or true, omit the standard section at the top, containing lines like 127.0.0.1 localhost. This is useful for configuring proximate DNS services on the local network.

--nogendata, or -g: false (default) or true, skip the generation of the readmeData.json file used for generating readme.md files. This is useful if you are generating host files with additional whitelists or blacklists and want to keep your local checkout of this repo unmodified.

--compress, or -c: false (default) or true, Compress the hosts file ignoring non-necessary lines (empty lines and comments) and putting multiple domains in each line. Reducing the number of lines of the hosts file improves the performances under Windows (with DNS Client service enabled).

--minimise, or -m: false (default) or true, like --compress, but puts each domain on a separate line. This is necessary because many implementations of URL blockers that rely on hosts files do not conform to the standard which allows multiple hosts on a single line.

--blacklist <blacklistfile>, or -x <blacklistfile>: Append the given blacklist file in hosts format to the generated hosts file.

--whitelist <whitelistfile>, or -w <whitelistfile>: Use the given whitelist file to remove hosts from the generated hosts file.
Using NixOS:
To install hosts file on your machine add the following into your configuration.nix:

{
networking.extraHosts = let
hostsPath = https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts;
hostsFile = builtins.fetchurl hostsPath;
in builtins.readFile "${hostsFile}";
}
NOTE: Change hostsPath if you need other versions of hosts file.


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
after those steps, your windows is safe for childrens uses
Forwarded from UNDERCODE NEWS
The Italian antitrust regulator has awarded Apple a fine of EUR 10 million because the iPhone is not protected by water.
#international
Forwarded from UNDERCODE NEWS
STMicro, a POL converter IC with improved radiation resistance, is released.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Web hacking attacks:

Database
Injection

Broken Authentication

Sensitive Data Exposure

XML External Entities (XEE)

Broken Access Control

Security Misconfiguration

Cross-site Scripting (XSS)

Insecure Deserialization

Using Components with Known Vulnerabilities

Insufficient Logging and Monitoring

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Third millimeter-wave antenna on the iPhone 12? Secretly in the gap of Face ID.
#Technologies
Forwarded from UNDERCODE NEWS
Tricky vaccine distribution, the answer lies in IT technology.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Virus infection diagnosis:

1. Press Ctrl+Shift+Delete (press these three keys at the same time), bring up the windows task manager to view the processes running on the system, find out the unfamiliar processes and write down their names (this requires experience), if these If the process is a virus, it can be cleaned up later. Don't end these processes for now, because some viruses or illegal processes may not end here. Click Performance to view the current status of the CPU and memory. If the CPU utilization is close to 100% or the memory occupancy value remains high, the possibility of computer poisoning is 95%.
γ€€γ€€
2. Check the service items currently started in Windows, and open the "Services" in the "Management Tools" of the "Control Panel". Look at the line in the right column where the status is "Startup" and the startup category is "Auto"; generally speaking, normal windows services basically have descriptions (except for a few faked by hackers or worms), double-click at this time Open the service item that is considered to be problematic and view the path and name of the executable file in its properties. If the name and path are C:/winnt/system32/explored.exe, the computer is recruited. There is a situation that the "Control Panel" cannot be opened or all the icons in it run to the left, there is a vertical scroll bar in the middle, and the right is blank. Double-click to add/remove programs or management tools, the window is empty. This is the characteristic of the virus file winhlpp32.exe.
γ€€γ€€
3. Run the registry editor, the command is regedit or regedt32, check which programs are started together with windows. Mainly look at Hkey_Local_Machine/Software/MicroSoft/Windows/CurrentVersion/Run and the following RunOnce, etc., check the item value on the right side of the form to see if there is an illegal startup item. WindowsXp running msconfig also plays the same role. With the accumulation of experience, you can easily determine the startup items of the virus.

γ€€γ€€
4. Use a browser to go online to judge. The previous Gaobot virus can go to yahoo.com, sony.com and other websites, but you cannot visit the websites of famous security vendors such as www.symantec.com, www.ca.com, and you can’t access the Internet after installing the antivirus software of symantecNorton2004. upgrade.
γ€€γ€€
5. Unhide attributes and check the system folder winnt(windows)/system32. If the folder is empty after opening, it means that the computer has been poisoned; after opening system32, you can sort the icons by type to see if there are any executable files of popular viruses. . By the way, check the folders Tasks, wins, drivers. The current virus executable files are hidden here; the file hosts under drivers/etc is the object that viruses like to tamper with. It was originally only about 700 bytes, and it became after tampering. Above 1Kb, this is the reason why the general website can be accessed but the website of the security vendor cannot be accessed, and the famous anti-virus software cannot be upgraded.
γ€€γ€€
6. The anti-virus software determines whether it is poisoned. If it is poisoned, the anti-virus software will be automatically terminated by the virus program and the manual upgrade will fail.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
A new vulnerability in Eclipse Jetty strike again.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Adopt special innovative regulatory measures for financial technology giants.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

It is a hack tool kit for pentest and web security research, which is based on BeautifulSoup bs4 module http://www.crummy.com/software/BeautifulSoup/bs4/.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) clone https://github.com/brianwrf/hackUtils

2) cd hackUtils

3) hackUtils.py [options]

to use:

hackUtils.py -b inurl:www.example.com
hackUtils.py -g inurl:www.example.com
hackUtils.py -i 1099.java-rmi
hackUtils.py -u 1099.java-rmi
hackUtils.py -w .php?id=
hackUtils.py -j http://www.joomla.com/
hackUtils.py -j urls.txt
hackUtils.py -r http://www.joomla.com/
hackUtils.py -r urls.txt
hackUtils.py -f http://www.feifeicms.com/
hackUtils.py -f urls.txt
hackUtils.py -k 10.10.10.10
hackUtils.py -k 10.10.10.10::dir
hackUtils.py -k ips.txt
hackUtils.py -k ips.txt::"touch /tmp/jenkins"
hackUtils.py -o http://www.shiro.com/::"touch /tmp/shiro"
hackUtils.py -o urls.txt::"touch /tmp/shiro"
hackUtils.py -s http://www.struts2.com/index.action
hackUtils.py -s urls.txt
hackUtils.py -d example.com
hackUtils.py -e text

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
And here it came: Bitcoin at an all-time high.
#Updates
Forwarded from UNDERCODE NEWS
Europe threatens Russian Internet companies. Yandex, Mail.ru, Aviasales, Ozon are under attacK.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HTML-Email-Hacks
A series of HTML hacks for all those lovely Email clients out there.

This repo is a place to put all of the HTML Email hacks we all depend on so much to get our campaigns looking and feeling sweet and spiffy.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

GET https://github.com/FunWithEmail/HTML-Email-Hacks

Click To Tap:
Change button text responsively
@media screen and (max-width:600px) {
span[class=click] { display: none !important; max-height: 0 !important; }
span[class=tap]:after { content:"Tap"; }
}
<a href="#"><span class="tap"><span class="click">Click</span></span> here</a>
-courtesy of Nicole Merlin

Kill Gmail App Zooming:
Stop Gmail app from zooming text
style="min-width:600px;"
-courtesy of Chris Wise

Target Webkit Clients:
Webkit support is best support
@ media screen and (-webkit-min-device-pixel-ratio:0) { }
-courtesy of Kevin Mandeville

Margins and Float in Outlook:
Use a capital β€œM” or β€œF”
style="Margin: 20px; Float: left"
-courtesy of Nicole Merlin

Interactive Email in Gmail:
No Class or ID selector support
Use lang as selector with "x-" prefix

* [lang~="x-selector"] { }
<div lang="x-selector"></div>
-courtesy of Justin at FreshInbox

Interactive Email con’t - Hover!:
Hover effect works on these clients:
Gmail:

* [lang~="x-selector"]:hover { }
Outlook Web:

.class:hover
Yahoo! Web:

.class:hover
-courtesy of Justin at FreshInbox


More usage go to https://github.com/FunWithEmail/HTML-Email-Hacks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁