UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.8K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Intel's sales this year will hit 75 billion US dollars, the highest results in 52 years.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Encrypt a disk with cryptsetup

1. prepare the empty disk (sdc)

2. parted sdc
# parted /dev/sdc
> mktable
> mkpart

3. format drive as luks
# cryptsetup luksFormat /dev/sdc1

4. open luks
# cryptsetup luksOpen /dev/sdc1 NAME
(where NAME is a mapped device name,
which will be seen at /dev/mapper/${NAME}
here we assume NAME=luks
)
# ls /dev/mapper/
** luks

5. format volume inside luks
# mkfs.ext4 /dev/mapper/luks
OR
# mkfs.ext4 /dev/dm-0

6. mount this ext4 filesystem
# mount /dev/dm-0 /MOUNT_POINT

7. umount filesystem
# umount /MOUNT_POINT

8. close luks
# cryptsetup luksClose /dev/dm-0



encrypt a disk image with luks
------------------------------

0. create my symlink
# ln -s /sbin/cryptsetup /sbin/luks

1. prepare a blank image file, by using dd or truncate
# truncate -s 1G luks.img

2. setup the image file as loop device
# losetup -f luks.img

3. Format this (virtual) device with luks header
# luks luksFormat /dev/loop0
P.S. input uppercase 'YES', then input your password for key slot 0

4. Open device
# luks open /dev/loop0 luks0
# lsblk
loop0     7:0    0     1G  0 loop  
└─luks0 253:0 0 1022M 0 crypt

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Fastweb Mobile: the upcoming 5G network will soon be official in Italy.
#International
Forwarded from UNDERCODE NEWS
In 2021, five things to expect for email protection.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

Shells programing and checkers :
>>iCode CNES for Shell(https://github.com/lequal/iCodeCNES) An open source static code analysis tool for Shell and Fortran (77 and 90).

>>kmdr(https://kmdr.sh) CLI tool for learning commands from your terminal. kmdr delivers a break down of commands with every attribute explained.

>>shellcheck(https://www.shellcheck.net) ShellCheck, a static analysis tool that gives warnings and suggestions for bash/sh shell scripts.

>>SwiftFormat(https://github.com/nicklockwood/SwiftFormat) A library and commandline formatting tool for reformatting Swift code.

>>SwiftLint(https://realm.github.io/SwiftLint) A tool to enforce Swift style and conventions.

>>Tailor(https://github.com/sleekbyte/tailor) :warning: A static analysis and lint tool for source code written in Apple's Swift programming language.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Apple Music support for Tesla app upgrade hints.
#Updates
Forwarded from UNDERCODE NEWS
One point is decided between Washington and Beijing: the strength of the technological firms is underestimated.
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

4,2 rating free hacking course-- Hacking Academy: How to Monitor & Intercept Transmitted Data:

Learn how to intercept data in networks

Monitor transmitted data

Detect intrusions

See what is going on in your network

Learn how to read and filter data in Wireshark

https://www.udemy.com/course/hacking-academy-monitoring-transmitted-data/
Forwarded from UNDERCODE NEWS
Samsung Galaxy S21: more news arriving in January at the top of the range.
#Technologies
Forwarded from UNDERCODE NEWS
The slim and light cell phone flagship, from "mainstream" to "heterogeneous".
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Kitty is a powerful GPU based terminal emulator for linux:

Method 1: from the Ubuntu repository

First open a terminal and update your system.

$ sudo apt update

Use apt to install Kitty:
$ sudo apt install kitty -y

Just enter β€œkitty” to open it.

$ kitty

Method 2: from ready-made binaries
If you have a Mac or other Linux, just install the pre-built Kitty
banners.


Use the following curl command:

$ curl -L https://sw.kovidgoyal.net/kitty/installer.sh | sh / dev / stdin

The system will install the binary to ~ / .local / kitty.app / bin / directory.

You can simply run it by typing:
$ ~ / .local / kitty.app / bin / kitty

You can also launch kitty by searching applications.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Windows 10 laptops are instantly turned on.
#Updates
Forwarded from UNDERCODE NEWS
The HomePod Mini is compliant with 18W chargers after the 14.3 firmware upgrade is done.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

OpenVPN USE VPN FROM YOUR CHOICE- LINUX-TERMUX:

1) Open terminal and type
apt-get install openvpn

2) configure
* test vpn

server # openvpn --remote CLIENT --dev tun1 --ifconfig 10.9.8.1 10.9.8.2 255.255.255.0
client # openvpn --remote SERVER --dev tun1 --ifconfig 10.9.8.2 10.9.8.1 255.255.255.0
then check ifconfig
* static key vpn
Server

3) cd /etc/openvpn

4) openvpn --genkey --secret static.key

5) cat > tun0.conf << EOF

6) REMOTE

dev tun0

ifconfig 10.9.8.1 10.9.8.2 255.255.255.0

secret /etc/openvpn/static.key

7) EOF

cp server:/etc/openvpn/static.key client:/etc/openvpn/static.key
Client

cd /etc/openvpn

cat > tun0.conf << EOF

8) SERVER

dev tun0

ifconfig 10.9.8.2 10.9.8.1 255.255.255.0

secret /etc/openvpn/static.key

9) Firewall

UDP:1149

Test on both sides

openvpn --config /etc/openvpn/tun0.conf --verb 6


ref : wiki.debian.org :: openvpn
wiki.archlinux.org :: openvpn
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Gang crashed: Hacker hover.
#CyberAttacks
Forwarded from UNDERCODE NEWS
cyber security tips for your New Year's not to turn into a nightmare.
#CyberAttacks #Analytiques
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ‘₯ Add, remove and grant sudo rights to Arch Linux users:

1) How to add, remove and grant sudo rights to users on Arch Linux
Make sure you have installed the sudo package by running the following commands as root:

# pacman -Syu
# pacman -S sudo

2) The first command will sync the repositories and update your Arch Linux system to the latest version available.
The second command will install sudo if not already installed.

πŸ¦‘Then create a new user and add sudo rights to it.

1) / Create a sudo user on Arch Linux.
Run the following command to create a new user, for example undercode:

# useradd --create-home undercode
2) Set a password for the new user:

# passwd undercode
3) We have created a new user named undercode.

We haven't given the user sudo rights yet.

4) You can check if a user is a sudo user or not using the command:

# sudo -lU undercode
Output example:

5) User undercode is not allowed to run sudo on archlinux.
Yes, the user is not yet allowed to perform administrative tasks.

Let's go ahead and give it sudo rights.

To add a regular user to the sudoers list, simply add him to the wheel group.

6) For those of you curious, wheel is a special group on some Unix-like operating systems.

All members to this group are allowed to perform administrative tasks.

The Wheel group is similar to the sudo group on Debian based systems.

We can add users to the sudoers list in two ways.

7) 4The first way is to use the usermod command.

1.1. Add users to the sudoers list using the usermod command on Arch Linux
To add a user to the sudoers list on Arch Linux, run:

# usermod -aG wheel undercode
or

# usermod --append --groups wheel undercode

The above command will add a user named undercode to the "wheel" group.

As mentioned, members of the wheel group can perform administrative tasks using the sudo command.

Then edit the / etc / sudoers file with the command:

# visudo
Find and uncomment the following line (just remove the # at the beginning of the line):

%wheel ALL=(ALL) ALL
Press ESC and type: wq to save the file and exit.

You can also add the user to the sudo group:

# usermod -aG sudo undercode
Edit the / etc / sudoers file:
# visudo
Uncomment the following line:

%sudo ALL=(ALL) ALL
Save the file and exit.

We have added the user undercode to the sudoers list.

Now go to section β€œ1.3. Let's check if the user has sudo access on Arch Linux ”and check if the user has sudo rights.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The UK mobile network will not reintroduce payments for EU roaming.
#Updates
Forwarded from UNDERCODE NEWS
Next-generation Mercedes-Benz launches Mercedes connect me app.
#Updates