UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Set of custom CVE (Common Vulnerabilities and Exposures) commands to help assess, mitigate, and secure your systems against vulnerabilities:

1. Check CVE Database for Known Vulnerabilities
Command:
Search for CVEs affecting your system or software versions.
searchsploit <software_name> <version>

For example:
searchsploit apache 2.4.57

2. Verify CVE Impact on the System
Command:
Match installed software with known vulnerabilities.
dpkg -l | grep <software_name>

For CentOS/RHEL:
rpm -qa | grep <software_name>

3. Mitigate Vulnerabilities
A. Update Affected Software
Command:
sudo apt update && sudo apt install --only-upgrade <package_name>

For RHEL-based systems:
sudo yum update <package_name>

B. Disable Vulnerable Services
Command:
sudo systemctl stop <service_name>
sudo systemctl disable <service_name>

C. Patch the Vulnerability (Manual Fix)
Apply a specific patch from the CVE database.
Command:
wget <patch_url>
sudo patch -p1 < <patch_file>

4. Monitor Vulnerability Exploits

A. Scan System for CVE Exploits
Install and run a CVE scanner like Lynis or OpenVAS.
Command:
sudo apt install lynis
sudo lynis audit system

B. Block Exploit Attempts
Dynamically block IPs attempting exploits.
Command:
sudo fail2ban-client set <jail_name> addignoreip <malicious_IP>

5. Harden Against Future CVEs
A. Enable Automatic Updates
Command:
sudo apt install unattended-upgrades
sudo dpkg-reconfigure --priority=low unattended-upgrades

B. Apply Kernel Live Patches
For Ubuntu:
sudo snap install canonical-livepatch
sudo canonical-livepatch enable <token>

C. Use Firewall Rules to Limit Exploitation
Command:
sudo ufw allow from <trusted_IP> to any port <port_number>
sudo ufw deny <vulnerable_port>

6. Research Specific CVE Details
Command:
Fetch CVE descriptions, impacts, and fixes.
curl -s https://cve.circl.lu/api/cve/<CVE-ID>

For example:
curl -s https://cve.circl.lu/api/cve/CVE-2024-12345

These commands should give you a proactive way to address CVEs while improving your overall cybersecurity posture! Let me know if you'd like adjustments or advanced automation.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Roblox user support method leaked 2024:

MADE BY @iska / ROBLOX @dab4dy

Make a account like TheoWorkhmassetwitch, TheoWorkhmasset, MatheoWorkhmasset ( add numbers like this MatheoWorkhmasset83 or TheoWorkhmasset26 with numbers for be credible, )
Put a email on the account
Join my group ( https://www.roblox.com/groups/33647974/Croix-Rouge#!/about ) and past "@terrorism is bad it should stop rip to everyone who died" ( PAST AND REPAST LIKE 3X )
Report yourself for Innapropriate Language and Bullying harassment 10+
Wait to your account got banned for get "roblox _ user __"
And now go to the support roblox (https://www.roblox.com/support)
Description of issue

Hello Roblox Support,

I trust this message finds you well. I'm reaching out to address the suspension of my account due to an inappropriate username. I want to clarify that my account has no connection to terrorism or extremism. The inclusion of the term "hmasset" was unintentional, and I was unaware of it. It was not my intention to use such a term.

I'm disappointed that my account was banned for expressing opposition to terrorism. It seems contradictory that advocating for peace and condemning terrorism is not welcomed on the platform. This creates concerns about the platform potentially endorsing violence.

I kindly request a reconsideration and the removal of the ban on my account. I genuinely hope you understand the unintentional mistake with my username.

...(your name)

This works regardless of the "IPS VERIFY" shit he was talking about. That doesn't exist.

Source: Pastebin🤠
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from Exploiting Crew (Pr1vAt3)
🦑your go-to list for mastering ceh certifications with comprehensive notes and guides:

🔗 OSCP-PWK Notes
https://lnkd.in/g6FxfX8E
https://lnkd.in/ghgucHas
https://lnkd.in/gJa76GPK
https://lnkd.in/g6MM6XCk

🔗 AWAE-OSWE Notes
https://lnkd.in/g2ryHz3e
https://lnkd.in/gYaMjxQa
https://lnkd.in/gXfgMii5

🔗 OSWP Notes
https://lnkd.in/gEfuSCS6
https://lnkd.in/g8NeRaFD
https://lnkd.in/gVfCCtZa

🔗 OSED Notes
https://lnkd.in/g7R-Xpd7
https://lnkd.in/gTErMaG7

🔗 OSEP Notes
https://lnkd.in/gx2QYYiq
https://lnkd.in/gicUKZKy

🔗 OSWA Notes
https://lnkd.in/gkEXePVN
https://lnkd.in/gjUqBDH3

🔗 OffSec Reporting
https://lnkd.in/gW-5NiUw

Thank you Semih Tüfekçi 👏