UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Breaking the information in Shirbit: Fear of leaking personal details of senior civil servants.
#Updates
Forwarded from UNDERCODE NEWS
Yandex created the "killer" Avito.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SMB Relay Attack Script:

1) clone https://github.com/Jsitech/relayer

2) cd relayer

3) ./relayer.sh

4) to use :

a) Scan for SMB Systems on Target Network and List those with SMB signing Disabled

b) User selects system to Relay the authentication attempts to

c) User selects where to set the Listener for incoming connections

d) User selects payload

e) Relayer creates payload and sets up Responder and SMBRelayX

f)Wait for connection attempts to your attacking machine and check Listener

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The production capacity of LG Chem's batteries in China will double next year.
#Technologies
Forwarded from UNDERCODE NEWS
Hanmi Pharm wins the first K-ICT information protection excellence award in the pharmaceutical and bio industry.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘When using crawlers to collect websites, several methods to solve blocked IP

Method 1.
Due to the company's project needs, we have collected google map data and some large-scale website data.
The experience is as follows:
1. IP must be required, as @alswl said is very correct, ADSL. If you have the conditions, you can actually apply for extra IP from the computer room.
2. Deploy a proxy server on the machine with an external network IP.
3. Your program uses rotation training to replace the proxy server to access the website you want to collect.
Benefits:
1. The program logic changes little, only the agent function is needed.
2. According to the blocking rules of the other party's website, you only need to add more agents.
3. Even if the specific IP is blocked, you can directly log off the proxy server and it will be OK, and the program logic does not need to be changed.

Method 2.
Some websites have weak preventive measures. You can disguise the IP and modify X-Forwarded-for (it looks like this spelling...) to bypass it.
For most websites, if you want to crawl frequently, you still need more IPs. The solution I prefer is that foreign VPSs are equipped with multiple IPs, and IP switching is realized through default gateway switching, which is much more efficient than HTTP proxy, and is estimated to be more efficient than ADSL switching in most cases.

Method 3.
ADSL + script, monitor whether it is blocked, and then constantly switch ip
settings to query frequency limits. The
orthodox approach is to call the service interface provided by the website.

Method 4. People
with more than 8 years of crawling experience tell you that domestic ADSL is the kingly way. Apply for more lines and distribute them in different telecom districts. It is better to be able to cross provinces and cities. Write your own disconnection redial components. Write your own dynamic IP tracking service, remote hardware reset (mainly for ADSL modems to prevent its downtime), other task allocation, data recovery, are not a big problem. Mine has been running stably for several years, and it's done!

Method 5.
1 User agent disguise and rotation
2 Use proxy ip and rotation
3 Cookies processing, some websites have a looser policy on login users.
Friendly reminder: Consider the burden of crawlers on other websites, be a responsible crawler :)

Method 6.
As much as possible The simulated user behavior:
1. The UserAgent is changed frequently;
2. The visit time interval is set longer, and the visit time is set to a random number;
3. The order of visiting pages can also be random.
The basis for website blocking is generally unit The number of visits to a specific IP within a period of time.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The British have spent millions dollars per a day on smartphone gaming. At the top of the list: a game in Israel
#international
Forwarded from UNDERCODE NEWS
Not just deep fake, here's how AI transforms cybercrime.
#CyberAttacks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ›₯ How to install Acutenix on Ubuntu 18.04:

Automatically tests the site for XSS, SQLi and more than 4500 vulnerabilities
Reduces false positives with gray box scanning that analyzes code at runtime
Tests on over 1200 WordPress, Drupal and Joomla! specific vulnerabilities
Scans HTML5, JavaScript, Single Page Applications and RESTful web services
Vulnerability Management and Compliance Reporting

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

These dependencies apply if you are running a headless Ubuntu 18.04 server.

sudo apt install libxdamage1 libgtk-3-0 libasound2 libnss3 libxss1 libx11-xcb1
Installing Acutenix on Ubuntu 18.04
Change to the directory where you copied the installer. For instance,

cd / home / amos /
Then you need to make the Acutenix installer script executable by running the command below;

chmod + x acunetix_trial.sh
Run the installer by running the command below;

sudo ./acunetix_trial.sh
After launching the installer, press Enter, scroll through the Acutenix license agreement and accept the license to proceed with the installation.

Acunetix Installer Version: v_190227132, Copyright (c) Acunetix
-------------------------------------------------- ----------

Checking os ...
Checking for dependencies ...
Please read the following License Agreement. You must accept the terms of this
agreement before continuing with the installation.
press ENTER to continue
>>> ENTER
...
Accept the license terms? [yes | no]
[no] >>> yes
Set the hostname of the server used to access the Acutenix user interface.

You can press ENTER to accept the default.

Configuring acunetix user ...
Creating user acunetix.

By default the Acunetix will be installed to /home/acunetix/.acunetix_trial

Checking database port ...
Checking backend port ...

Configuring hostname ...
Insert new hostname, or leave blank to use acutenix.example.com
Hostname [acutenix.example.com]: ENTER
Set the administrator credentials, email account (used as username), and password.

The password must be at least 8 characters long and contain at least 3 of the following characters: 1 number, 1 lowercase letter, 1 uppercase letter, and 1 special character.

Configuring the master user ...
Email: <Valid Email ID>
Password: P @ ssWord1
Password again: P @ ssWord1
Initializing file system ...

Extracting files to /home/acunetix/.acunetix_trial ....
The installation will then proceed without issue.

After the installation is complete, you can access the Acutenix user interface using the URL provided at the end of the installation.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Baltimore County Schools close after a ransomware attack.
#CyberAttacks
Support & Share β€οΈπŸ‘πŸ»:

T.me/UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

HACK WPA2 ON ANDROID (NO WPS):


The description of WIBR+ WIfi BRuteforce
WIBR+ WIfi BRuteforce without root, is a high-level application for testing WPA / WPA2 PSK WiFi network security.
The Application will try to connect to WPS enabled Wifi Routers that have the WPS vulnerability using some algorithms to connect to the Wifi.
The protocol BRuteforce allows you to connect to a WiFi network using an 8-digit pin number that usually is predefined in the router, the problem is that the pin of many routers from different companies is known or is known how to calculate it.

This app supports two types of Testing:
1. Dictionary Testing: WIBR + tries one-by-one in a predefined list of passwords, and if it can not find a password, it simply means that it is not in the dictionary.
2. Violent Testing - You can select the alphabet, the length of the password, and the application will attempt to combine all the characters in the alphabet.

WIBR+ WIfi How to use BRuteforce:

1) Select the network you want, and WIBR+ will automatically test on a WPA / WPA2 network with pre-shared key (PSK).
2) Select the required dictionary or set bruteforce test.
3) the first two points if you have set up, then please be patient, the results should be tested so wait for the results of some long wait patiently waiting for WiFi during the test has been enabled to ensure smooth.
4) WIBR plus WIfi BRuteforce automatically return the result of testing.

Notice: ROOT is NOT totally required & Location Permission is required for Wibr Wifi Network Scanning
Please understand how the application works before giving an assessment.

FREE DOWNLOAD:

https://m.apkpure.com/wibr-wifi-bruteforce-without-root/io.wibrplus.wpstester

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Banking scams: Sanpaolo, BNL, Unicredit users targeted
#CyberAttacks
Forwarded from UNDERCODE NEWS
Samsung Galaxy Z Fold 2: the new version of One UI 3.0 arrives
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to configure a host-based intrusion detection system on CentOS?

1) Install AIDE on CentOS or RHEL

The initial installation (and first run) of AIDE is best performed on the system where the operating system has just been installed, and no service is exposed to the Internet or even to the LAN. In this early stage, we can minimize the risk of all intrusions and tampering from the outside. In fact, this is the only way to ensure that the system is clean when AIDE builds its initial database.

For this reason, after we install AIDE using the command # yum install aide, we need to disconnect our machine from the network and perform some basic configuration tasks, as described below.

2) Configure AIDE

The default configuration file is located in /etc/aide.conf. The file provides several example protection rules (such as FIPSR, NORMAL, DIR, and DATAONLY). Each rule is followed by an equal sign and a list of file attributes to check, or any predefined rules (separated by +). You can also use this format to define any custom rules.

3) FIPSR = p+i+n+u+g+s+m+c+acl+selinux+xattrs+sha256

NORMAL = FIPSR+sha512

For example, the above example means that the NORMAL rule will check for inconsistencies in the following attributes: permission (p), index node (i), number of links (n), user (u), user group (g), size (s) ), modification time (m), creation time (c), access control list (acl), SELinux (selinux), xattrs (xattr), and SHA256/SHA512 checksum (sha256 and sha512).

The exclamation mark (!) in front of the entry tells AIDE to ignore subdirectories (or files in the directory), and another rule can be defined for subdirectories.

In addition, if you use the MAILTO variable to specify an email address, you can send the check result to your email address. Put the following line anywhere in /etc/aide.conf.

MAILTO=root@localhost

Run AIDE for the first time

Run the following command to initialize the AIDE database:

# aide --init

The /var/lib/aide/aide.db.new.gz file generated according to /etc/aide.conf needs to be renamed to /var/lib/aide/aide.db.gz so that AIDE can read it:

# mv /var/lib/aide/aide.db.new.gz /var/lib/aide.db.gz

Now, it’s time to perform our first system check against the database. To do this, just run:

# aide

When called without options, AIDE assumes the use of --check.

If no changes have been made since the database was created, AIDE will return an OK message after finishing the check.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
A new cellular process never seen before discovered.
#Technologies