UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
A new route is opened by Iliad: optical fiber arrives, the information here are.
#international #Technologies
Forwarded from UNDERCODE NEWS
"The next unicorn will come from the field of cloud technologies"
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Windows hacking videos and pdfs:

https://doc.lagout.org/security/Hacking%20Windows.pdf

https://www.youtube.com/watch?v=-o1AjOA5on0

http://index-of.co.uk/Hacking-Coleccion/Windows%20XP%20Hacks%20&%20Mods%20For%20Dummies.pdf

https://switchon.eaton.com/pdf/journey/doing-more-with-less/IT-hacks-ebook.pdf

https://www.youtube.com/watch?v=1JASnfc-X8I

https://www.youtube.com/watch?v=be2jOZM8Whs

enjoy β€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
With Tizen OS, Samsung is publicly releasing a new range of smart displays.
#Technologies #Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What are Shockproof phones ?

There are many terms that can be used to describe this type of phone, such as shatterproof phones, shockproof mobile phones , rugged phones, rugged phones, construction phones, etc.

1) Each of these names has the same meaning, they all refer to mobile phones that are water, shock and drop resistant - whether they are mobile phones with buttons or premium smartphones with tactile touch screens.

But who are these phones for?

2) These devices are very popular with working professionals, that is, professions who need a communication device that they can take with them wherever they go, confident that the phone can withstand the harsh environment.

3) They can be useful in many industries, from construction sites to factories, fire brigades, rescuers and mining workers, agricultural workers, wood workshops, and many other trades.

4) Using a secure phone extends the life of your communication device, which means you no longer have to worry about breaking your phone.

5) However, rugged phones are not only designed for work, they can also be used during leisure activities, including sports, hunting, hiking, and more.

They can also be perfect for clumsy people who often drop their smartphone.

πŸ¦‘As mentioned earlier, there are two types of such phones:

1) Mobile phone: This is the classic version of phones that usually have a keypad with buttons and a small screen that is usually non-touch. This model is primarily aimed at users looking for a very easy-to-use device that only offers basic functions such as making calls or sending SMS messages. This type of phone usually doesn't allow you to surf the Internet, but it has the main advantage that it is smaller than most modern smartphones, so it fits easily in a jeans pocket.

2) Rugged Smartphone: This is the best option and is currently very popular on the market. It consists of a large touchscreen that allows you to browse the web, use applications (GPS, compass, barometer, etc.), take photos, videos, etc. Since they are more susceptible to damage than regular mobile phones, their the body is reinforced and their screen is treated to resist scratches. The touchscreen of the rugged smartphone can also be used with gloves and wet hands, ideal for builders. Many models also allow you to insert two SIM cards to be able to separate professional calls from personal calls, without having to buy two different phones.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
"Minna no Raspberry Contest 2020" was declared with several Raspberry Pis Grand Prix signs.
#Technologies #international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to get the new media controls from Android 11 on any smartphone ?

In Android 11, music player controls have been moved from the notification panel to quick settings. This makes room for the new Conversations section of the notification. It also adds controls for external media connectivity, allowing you to switch from smartphone speaker to Bluetooth speaker with just two taps.

Step 1. Install Power Shade
https://play.google.com/store/apps/details?id=com.treydev.pns&hl=us

Step 2. Enabling Accessibility Service
After installing the application, open it and click the "Accessibility" switch. The system settings menu will open, where at the top you need to enable Power Shade and click OK in the window that appears.

Step 3. Enabling the notification service
Click back to return to the app. Click on the "Notifications" switch and you will be taken to another screen of system settings. Activate the Power Shade switch and give permission in the window that appears. Press back again.

Step 4. Make sure the integration with the media player
The feature should be enabled by default. If not, click in the main application menu "More". Scroll down to the Integrate media players in quick settings radio button. Activate it and then on the main screen of the application, turn off the Running switch and turn it back on to apply the changes.

Step 5. Try the new functionality
Open your media player and start music. Swipe down on the status bar to open a miniature version of quick settings. The new controls will be located below. You can play, pause and skip tracks, you can click on this interface to open the music application.

A new button will appear in the upper right corner of the controls called Phone speaker. Here you can specify the device to which you will transfer music. Swipe down the status bar again to open the extended view. There are all the same controls as in the mini version, but there are also "Like" and "Dislike" buttons if your music playback application has them. There is also a progress bar when playing audio files.

Unlike Android 11, the controls remain in the Notifications section of the lock screen. This makes it easier to access them. On Android 11, they are always in quick settings, so you have to make an extra gesture. If you have different streaming services, you can swipe left and right on a tile to switch between controls for different media applications.

enjoy any doubt feel free to ask @Undercode_Testing
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
New critical vulnerability is Apache hackers can leak data access restrictions to obtain sensitive information.
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Cross-site scripting (XSS) for beginers:

It is a code injection attack that enables an attacker in the window of another user to run malicious JavaScript.

The perpetrator does not hit his victim specifically. Instead in order to get the website to send the malicious JavaScript to him, he exploits a flaw in a website that the victim visits. The malicious JavaScript seems to be a genuine component of the website for the victim's browser and the website has thereby acted as an unwitting accomplice to the intruder. It is possible to execute these attacks using HTML, JavaScript, VBScript, ActiveX, Flash, but malicious JavaScript is the most widely used XSS.

Such attacks can also capture data from account hijacking, user interface updates, cookie theft/poisoning, or false ads and generate DoS attacks.

πŸ¦‘Example ( examples from wiki) :
Let’s take an example to understand how it works. We have a vulnerable webpage that we got by the metasploitable machine. Now we will test the field that is highlighted in red arrow for XSS.

1) Metasploitable
First of all, we make a simple alert script

<script>
alert(β€˜I am Vulnerable’)
</script>

2) It will produce the following output βˆ’

Simple Alert

πŸ¦‘Types of XSS Attacks
XSS attacks are often divided into three types βˆ’

1) Persistent XSS, where the malicious string originates from the website's database.

2) Reflected XSS, where the malicious string originates from the victim's request.

3) DOM-based XSS, where the vulnerability is in the client-side code rather than the server-side code.

Generally, cross-site scripting is found by vulnerability scanners so that you don’t have to do all the manual job by putting a JavaScript on it like

<script>
alert('XSS')
</script>
Burp Suite and acunetix are considered as the best vulnerability scanners.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Past telephone operators: a dip in the history of the Wind.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

FREE ANDROID REVERSE ENGiNEERING :

Android emulators 5.1 (ARM), 7.1.1 (ARM) and 9.0 (x86)
androguard
apktool
AXMLPrinter
baksmali / smali
classyshark
CFR
dex2jar
enjarify
frida
google play api
google play crawler
google play downloader
jadx
java decompiler
krakatau
procyon
radare2

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/cryptax/androidre.git

2) cd androidre

3) Normally, you just need to do:

$ docker pull cryptax/android-re:latest
Unless you want to build your own image - then see below the Customization section.

4) Running the container
There are a few options:

running the container locally: you just want to run on your own machine and don't want to bother about SSH or VNC.
running to connect via SSH or VNC: the container will be available as a standalone host you can log into via SSH, or VNC.

5) Running the container locally
$ docker run -it --rm -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix cryptax/android-re:latest /bin/bash
You are directly connected to the container.

Note you can also share a directory with your host using -v hostdir:containerdir.

If you try to use any graphical interface and get an error like No protocol specified followed by an crash (SEGFAULT), using this command before running the docker should fix it: xhost +local:docker.

IMPORTANT: if you want to use the Android emulator x86 image, you need to set the --privileged option in the command line, i.e:

$ docker run -it --privileged --rm -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix cryptax/android-re:latest /bin/bash

6) Running to connect via SSH or VNC
Run the container:

$ docker run -d --name androidre -p SSH_PORT:22 -p VNC_PORT:5900 cryptax/android-re

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Gates bombards federal offices for not supplying or facing significant issues with new crown vaccinations.
#international
UNDERCODE COMMUNITY
37792.txt
Codes for android remote exploits