UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
In early 2021, Apple is scheduled to announce the first iPad Pro with a mini LED display.
#Technologies
Forwarded from UNDERCODE NEWS
The fixed and mobile network inefficiencies have been formalized by Tiscali after attack.
#CyberAttacks
Looking for more ecryption, a management tool for dnscrypt-proxy :

-Free

-Open source

https://simplednscrypt.org/

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
This year, Apple will change the cash incentives for managers based on environmental principles.
#International
Forwarded from UNDERCODE NEWS
The Russian hackers sells in darknet a program that allows you to distribute spam messages bypassing traffic and email protection.
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Pyongyang 2407 - Android ROM from North Korea, modified to run on WBW5511_MAINBOARD_P2 devices. Releases contains an archived ROM with all needed tools to boot DPRK Android on compatible hardware. …

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

Check you can see the preloader of your device, this shows up very briefly on powering device without battery. It contains a simple download & boot from RAM backdoor that lets you run any .bin code to read/write/format the EMMC / NAND and SDMMC (which MT6582 boots from). It is provided by the "preloader" function.

1) [136466.320357] usb 1-5: new high-speed USB device number 48 using xhci_hcd

2) [136466.462845] usb 1-5: New USB device found, idVendor=0e8d, idProduct=2000, bcdDevice= 1.00
[136466.462853] usb 1-5: New USB device strings: Mfr=1, Product=2, SerialNumber=0

3) [136466.462858] usb 1-5: Product: MT65xx Preloader

4) [136466.462862] usb 1-5: Manufacturer: MediaTek

5) [136466.526864] cdc_acm 1-5:1.1: ttyACM0: USB ACM device

6) [136468.181907] usb 1-5: USB disconnect, device number 48

7) If you can see something similar to above in dmesg output and no ModemManager is running you can proceed.

load included jellybean (WBW5511GI_0202_T5752) based rom onto device, using SPFlashTool

8) Boot device, it will take a few minutes
root device - kingroot APK (works)

9) put data.ext4 and system.tar onto /sdcard via "adb push"
upload "gnutar" and "busybox-android" from this repo
"adb shell" and check "su" works

10) Install ROM 평양 files
I made some modifications to the KCC files to work with the supplied ROM. For instance I have replaced missing kernel modules in "/usr/lib/modules" and created a compatible layout file with a new kernel image and clean boot loaders. you still need to manually overwrite "/system" and "/data" from a root shell. You must first remount both into rw mode from "adb shell" as root.

11) "mount -o rw,remount /system" "mount -o rw,remount /data"

You then want to "rm -rf /system/" and "/data/" but you cannot run "busybox-android" from "/sdcard" so you must ensure that it survives your "rm -rf" brutality. You are going to wipe important system files and replace them with the contents of the two tar files.

12) cp "busybox-android" and "gnutar" into a executable safe place such as /data.

13) wipe /system after remount rw with "rm -rf /system", run twice, some files will stick.

14) use supplied "gnutar" and PRESERVE PERMISSIONS with "gnutar -xvpf" and unpack system.tar /system
once you have /system unpacked, put busybox-android and gnutar in /system/xbin

15) now do the same "rm -rf /data/*" and "gnutar -xvpf" to /data with data.ext4

16) reboot
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Why are features such as HDMI performance from FreeSync not built into the open source driver?
#Technologies
Forwarded from UNDERCODE NEWS
The president Trump: Banned transactions with 8 Chinese apps including Alipay, QQ, and WPS .
#Ban
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Dynamic analysis of Android applications :

Deploying release candidate
This is a guide to get DroidBox running. The release has only been tested on Linux and Mac OS. If you do not have the Android SDK, download it from http://developer.android.com/sdk/index.html. The following libraries are required: http://www.scipy.org/PyLab'>pylab and http://matplotlib.sourceforge.net/'>matplotlib to provide visualization of the analysis result.

1) Export the path for the SDK tools
export PATH=$PATH:/path/to/android-sdk/tools/ export PATH=$PATH:/path/to/android-sdk/platform-tools/

2) Download necessary files and uncompress it anywhere wget http://droidbox.googlecode.com/files/DroidBox411RC.tar.gz

3) Setup a new AVD targeting Android 4.1.2 and choose Nexus 4 as device as well as ARM as CPU type by running: android

4) Start the emulator with the new AVD: ./startemu.sh <AVD name>

5) When emulator has booted up, start analyzing samples (please use the absolute path to the apk): ./droidbox.sh <file.apk> <duration in secs (optional)>

6) The analysis is currently not automated except for installing and starting packages. Ending the analysis is simply done by pressing Ctrl-C. A package will also be implemented soon to populate the emulator with data prior to performing analysis.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ”΅Cross Site Request Forgery vulnerability in McAfee :

https://dailycve.com/cross-site-request-forgery-vulnerability-mcafee
Forwarded from UNDERCODE NEWS
CES 2021 is going to open online soon. Intel will take the opportunity to warm up the desktop Core.
#Technologies
Forwarded from UNDERCODE NEWS
Microsoft starts mass extermination of famous applications and resources for Windows 10.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The Automation FOrensics Tool (AFOT) is an automation tool build in Python and used for Windows Forensics in order to combine the following tools:

> AnalyzePESig (http://didierstevens.com/files/software/AnalyzePESig_V0_0_0_2.zip)

> National Software Reference Library reduced set (http://www.nsrl.nist.gov/RDS/rds_2.52/rds_252m.zip)

>NSRL Tool (http://didierstevens.com/files/software/nsrl_V0_0_2.zip)

>VirusTotal Search Tool (http://didierstevens.com/files/software/virustotal-search_V0_1_2.zip)

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) https://github.com/harris21/afot

2) cd https://github.com/harris21/afot

3) now run python afot.py in your terminal.

So the procedure is pretty straight-forward:

The user provides the path, which will be used to analyze all the executables included in those folders/subfolders.
AnalyzePESig looks for signed executables, whom certificate will soon be revoked.

AFOT will collect all the non-signed executables and cross-check them with NSRL's hashset database, using the NSRL tool.

Last but not least, if any hashes were found to be in NSRL's hashset database too, we cross-check those hashes with VirusTotal, using the VirusTotal Search tool.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
OnePlus 8T devices are suffering from a serious error reported several times by users. Here's what happens and how to fix.
#Bugs
Forwarded from UNDERCODE NEWS
The 2021 Nest home surveillance camera product line is about to be launched by Google.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘DNS SPECIAL UTILITIES :

Β» dnsgram (https://doc.powerdns.com/md/manpages/dnsgram.1/): dnsgram is a debugging tool for intermittent resolver failures. it takes one or more input PCAP files and generates statistics on 5 second segments allowing the study of intermittent resolver issues.

Β» dnsreplaY (https://doc.powerdns.com/md/manpages/dnsreplay.1/): Dnsreplay takes recorded questions and answers and replays them to the specified nameserver and reporting afterwards which percentage of answers matched, were worse or better. Then compares the answers and some other metrics with the actual ones with those found in the dumpfile.

Β» dnsscan (https://doc.powerdns.com/md/manpages/dnsscan.1/): dnsscan takes one or more INFILEs in PCAP format and generates a list of the number of queries per query type.

Β» dnsscope (https://doc.powerdns.com/md/manpages/dnsscope.1/): dnsscope takes an input PCAP and generates some simple statistics outputs these to console.

Β» dnswasher (https://doc.powerdns.com/md/manpages/dnswasher.1/): dnswasher takes an input file in PCAP format and writes out a PCAP file, while obfuscating end-user IP addresses. This is useful to share data with third parties while attempting to protect the privacy of your users.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Mozilla Firefox 85.0 Beta 5 has been released to the official FTP today.
#Updates
Forwarded from UNDERCODE NEWS
They threw away hard drives containing 7,500 Bitcoins as garbage!
#International