UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.9K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
This is a beautiful malicous BadUSB implant photo. One of the best parts of #RedTeaming is going into an office and secretly swapping out USB cables on folks desks.

⬇️ 💻 Thanks to Lumafield’s Neptune industrial x-ray CT scanner, we can see the O.MG USB-C Cable isn’t just a regular USB cable. At its core, the O.MG Cable uses an ultra compact ESP32 Pico allow for keystroke injection attacks, remote control via wifi, hardware keylogging, ID/PID spoofing as well as remote command and control.

These are not really that new, and have existed in various forms and lesser capabilities at higher prices for almost ten years now.

Source: Linkedin
Forwarded from UNDERCODE TESTING
🦑Hack with 1 Plug:

Duckyspark v.0.4.1
Translator from USB-Rubber-Ducky payloads (Ducky script) to a Digispark code.

Usage:

python3 Duckyspark_translator.py [payload.txt] [output_file]
or
python3 Duckyspark_translator.py [payload.txt]


in this case the translated payload will be saved in the file "digipayload.ino"

Ducky payloads you can find here: https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Payloads

or here: https://github.com/CedArctic/DigiSpark-Scripts

Or, you can simply write your own payloads using Ducky script

Ducky script syntax: https://github.com/hak5darren/USB-Rubber-Ducky/wiki/Duckyscript

Recently we found the video "Digispark Flashing Guide & Ducky Payload Converters" that shows how to flash Digispark using the payloads generated by our script: https://www.youtube.com/watch?v=Lrn_hgckhGw&lc

Our site: https://awake.pro/

Upd: added 3d models of USB flesh drive to hide Digispark.

You could edit 3d model, or just print on 3d printer ready-for-print .stl models
Forwarded from UNDERCODE TESTING
Commands
Forwarded from UNDERCODE TESTING
🦑 Example of sFTP Credentials Leak in Private Program

Target Sub-Domain: trc[•]example[•]com

Impact: Full FTP Server Access Obtained

Details: sftp-config.json exposed sensitive credentials.

Severity: 🔴 Critical (9.6)

💡 Stay vigilant for exposed configuration files!