UNDERCODE COMMUNITY
2.7K subscribers
1.24K photos
31 videos
2.65K files
81.3K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Python Scapy tools developed for LAN tests and advanced reconnaissance.:

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) pip3 install scapy

2) pip3 install netaddr

3) git clone https://github.com/peppelinux/pyLAN-tools.git

4) : arpscan.py [-h] -i I [-r R [R ...]] [-t T]
[-exclude EXCLUDE [EXCLUDE ...]] [-only ONLY [ONLY ...]]
[-debug]


arpscan usage examples

5) # scans only selected peers in the local network reachable on eth2 interface

6) python2 arpscan.py -i eth2 -t 0.01 -only 1 2 3 4 5 6 7 8 9 10 50 150 200 250 251 252 253 254
10.21.0.75 bc:5f:f4:f4:d0:d9 (eth2)
10.21.0.254 d4:ca:6d:e6:6a:d7

# scans only selected networks
python2 arpscan.py -i eth2 -t 0.01 -r 192.168.0.0/24 192.168.1.0/24 172.17.0.0/12
192.168.1.1 08:00:27:7c:f9:41

7) arpscan todo
parallelization with subprocess per every -r lan (performance improvements)

8) choose a number of worker to delegate a subset of addresses (address_pool/num_workers)
vendor database intergration and representation (as netdiscover already does)

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from DailyCVE
πŸ”΅Unpatched WPS Office has a denial of service vulnerability(DC 213-2021)

https://dailycve.com/wps-office-has-denial-service-vulnerability-0
Forwarded from UNDERCODE NEWS
Apple drops exclusive features from its own software that it has illegally inserted as public sentiment deteriorates.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Top Malware detected since 1 January 2021 till now.
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Trojan Horse Programs

(1) Blackmail Trojan

This type of Trojan will encrypt, destroy, modify, copy, lock, and delete data. This type of Trojan uses the data in the user's system as a condition of extortion and releases it after the user pays the ransom.

(2) Mail-Finder Trojan

The task of this type of Trojan is to find all email contacts from its target email client. The Trojan can send the list to its creator. In some cases, phishing emails are used to forward themselves to these contacts through phishing emails without the victim’s knowledge, thereby self-propagating.

(3) Fake anti-virus Trojan horse

Such Trojans will send false messages to users informing them that their devices have been infected with viruses. Sometimes complex reports and scan results are used to show a high level of threat, making users panic. Then, the Trojan horse author charges users for virus removal services.

(4) Download Trojan

The purpose of this type of Trojan is to download other malware from the Internet without the device owner’s knowledge.

(5) Botnet Trojan

Botnet Trojan horses are used to damage web browsers, infect other devices, force them to join the botnet army, and execute various cyber crimes.

(6) Backdoor/remote access Trojan

This type of Trojan allows cybercriminals to remotely access and control the intruding device, such as:

Access and modify files;

Restart the target system;

Install or uninstall other software;

Send and receive information with other connected IoT devices;

Get many other similar privileges.

(7) Spy Trojan

This type of Trojan, also known as spyware, monitors user behavior, such as surfing the Internet and what users type on websites and devices (such as personal information, financial data, login credentials, etc.). This information will then be used to perform identity theft crimes, financial fraud or ransomware attacks.

(don't copy any tutorial)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
German privacy agency reported that an online laptop and electronics store was fined EUR 10.4 million for staff control in breach of GDPR.
#International
Forwarded from UNDERCODE NEWS
Without its ultra-fast Optane memory, Intel would leave users without.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ–§ Configuring proxy settings in CentOS 8/7 | RHEL 8/7 and Fedora:

1) Configure system-wide proxy settings in the desktop interface
For users using a desktop environment on Fedora / CentOS and RHEL Linux, changes can be made in the system control panel.

Go to Settings > Network > Network Proxy

2) Select β€œManual” to enter proxy settings.

3) Fill in the proxy values ​​for http, https and ftp.
If you have a SOCKS proxy, also set it accordingly.
After saving the changes, the system will automatically apply the new parameters.

4) Proxy in Firefox browser
If you have a Firefox browser, you need to update your proxy settings under Settings> Network Settings> Manual Proxy Settings.

5) Configure system-wide proxy settings in CLI
We will add a shell script file to /etc/profile.d/proxy.sh.

This will ensure that the settings are applied to all registered users.

sudo vi /etc/profile
Add proxy settings.

# set proxy config via profie.d - should apply for all users
#
PROXY_URL="http://10.10.1.10:8080/"

export http_proxy="$PROXY_URL"
export https_proxy="$PROXY_URL"
export ftp_proxy="$PROXY_URL"
export no_proxy="127.0.0.1,localhost"

# For curl
export HTTP_PROXY="$PROXY_URL"
export HTTPS_PROXY="$PROXY_URL"
export FTP_PROXY="$PROXY_URL"
export NO_PROXY="127.0.0.1,localhost"
Where:

10.10.1.10 - proxy server ip, can be replaced with hostname
8080 - proxy server port
If authentication is required, the syntax is:

http: // username: password @ proxyserver: proxyport /

then run:

$ source /etc/profile
Confirm :

$ env | grep -i proxy

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Google has found third-party browser developers misusing access to their cloud resources built on the open source Chromium project.
#Updates
Forwarded from UNDERCODE NEWS
Tongxin UOS General Manager: The desktop ecosystem has the potential to replace Windows 7.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ brute force directories and files in webservers :

Fast
Easy and simple to use
Multithreading
Wildcard responses filtering (invalid webpages)
Keep alive connections
Support for multiple extensions
Support for every HTTP method
Support for HTTP request data
Support for raw request
Extensions excluding
Reporting (Plain text, JSON, XML, Markdown, CSV)
Recursive brute forcing
Target enumeration from an IP range
Sub-directories brute forcing
Force extensions
HTTP and SOCKS proxy support
HTTP cookies and headers support
HTTP headers from file
User agent randomization
Proxy host randomization
Batch processing
Request delaying
429 response code detecting
Multiple wordlist formats (lowercase, uppercase, capitalization)
Default configuration from file
Option to force requests by hostname
Option to add custom suffixes and prefixes
Option to whitelist response codes, support ranges (-i 200,300-399)
Option to blacklist response codes, support ranges (-x 404,500-599)
Option to exclude responses by sizes
Option to exclude responses by texts
Option to exclude responses by regexp(s)
Option to exclude responses by redirects
Options to display only items with response length from range
Option to remove all extensions from every wordlist entry
Quiet mode
Debug mode
πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/maurosoria/dirsearch.git

2) cd dirsearch

3) python3 dirsearch.py -u <URL> -e <EXTENSIONS>

4) To can use SOCKS proxy or work with ../ in the wordlist, you need to install pips with requirements.txt: pip3 install -r requirements.txt

If you are using Windows and don't have git, you can install the ZIP file here. Dirsearch also supports Docker

Dirsearch requires python 3 or greater

5) dirsearch.py [-u|--url] target [-e|--extensions] extensions [options]

Example:

root/
index.%EXT%
Passing the extensions "asp" and "aspx" (-e asp,aspx) will generate the following dictionary:

root/
index
index.asp
index.aspx
For wordlists without %EXT% (like SecLists), you need to use the -f | --force-extensions switch to append extensions to every word in the wordlists, as well as the "/". And for entries in the wordlist that you do not want to force, you can add %NOFORCE% at the end of them so dirsearch won't append any extension.
Example:

admin
home.%EXT%
api%NOFORCE%

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Phantom Green of the Galaxy S21 can become the next exclusive color of Samsung.
#Technologies
Forwarded from UNDERCODE NEWS
Microsoft's application to support the SpaceX Starlink Internet satellite group in an FCC lawsuit failed.
#bugs