UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.4K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑What is eBPF? 🤷♂️

With Cisco Hypershield being talked about EVERYWHERE, wouldn't it be great to know a little more about the technology that the solution is predominantly built around?

eBPF (extended Berkeley Packet Filter) is a technology that lets you run secure programs within the operating system kernel. This unlocks incredible power to monitor and control systems at a granular level, without the overhead of traditional methods.

Why eBPF Matters:

• 𝗨𝗻𝗹𝗲𝗮𝘀𝗵𝗲𝘀 𝗜𝗻𝗻𝗼𝘃𝗮𝘁𝗶𝗼𝗻: eBPF allows developers to extend kernel functionality without modifying kernel code, enabling rapid innovation in networking, security, and observability.

• 𝗕𝗼𝗼𝘀𝘁𝘀 𝗣𝗲𝗿𝗳𝗼𝗿𝗺𝗮𝗻𝗰𝗲: eBPF programs run with incredible efficiency, minimising performance impact and maximising resource utilisation.

• 𝗘𝗻𝗵𝗮𝗻𝗰𝗲𝘀 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆: Gain deep visibility into system behavior, detect threats in real-time, and enforce granular security policies at the kernel level.

• 𝗦𝗶𝗺𝗽𝗹𝗶𝗳𝗶𝗲𝘀 𝗢𝗯𝘀𝗲𝗿𝘃𝗮𝗯𝗶𝗹𝗶𝘁𝘆: Collect rich, detailed data on system performance and application behavior for faster troubleshooting and optimisation.

Ref: Antony Owen
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE TESTING
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Automated Wifi Hacking:

Wifite is a Python script designed for wireless network auditing, simplifying the use of wireless-auditing tools by automating their execution. It consolidates multiple attack methods to retrieve wireless passwords efficiently.

---

Features
- Attack Methods:
- WPS:
- Offline Pixie-Dust attack
- Online Brute-Force PIN attack
- WPA:
- Handshake Capture + offline cracking
- PMKID Hash Capture + offline cracking
- WEP:
- Fragmentation, chop-chop, aireplay, and other known attacks
- Automation:
- Select targets, and Wifite will handle the attack process automatically.
- 5GHz Support:
- Limited to compatible wireless cards (-5 switch).
- Cracked Password Storage:
- Saves results in the current directory with metadata.
- De-authentication Control:
- Disable deauths using --no-deauths.

---

Supported Operating Systems
- Designed for Kali Linux (latest version).
- Also supports ParrotSec.
- Other distributions may require manual updates of tools and wireless drivers.

---

Requirements
1. Wireless Card:
- Must support Monitor Mode and packet injection.
2. Essential Tools:
- Python (compatible with Python 2 & 3)
- Networking utilities:
- iwconfig, ifconfig
- Aircrack-ng Suite:
- airmon-ng, aircrack-ng, aireplay-ng, airodump-ng, packetforge-ng
3. Recommended Tools:
- tshark, reaver, bully, coWPAtty, pyrit, hashcat, hcxdumptool, hcxpcaptool

---

Installation
1. Clone the repository:

git clone https://github.com/derv82/wifite2.git
cd wifite2

2. Run Wifite directly:

sudo ./Wifite.py

3. Install Wifite system-wide:

sudo python setup.py install

- Installed to /usr/sbin/wifite.

4. Uninstallation:
Record and delete installed files:

sudo python setup.py install --record files.txt \
&& cat files.txt | xargs sudo rm \
&& rm -f files.txt

---

Usage
Run Wifite with default settings:
sudo ./Wifite.py
Optional arguments for specific attacks:
- PMKID capture:

--pmkid

- WPS Pixie-Dust attack:

--wps-only --pixie

- WPA handshake cracking:

--no-wps

- Disable deauth:

--no-deauths

---

Advanced Features
- Hidden SSID decloaking.
- Validation of handshakes with tools like pyrit, cowpatty, and aircrack-ng.
- WEP attack customization (e.g., replay, chopchop).
- Cracked passwords stored in the current directory with access point details.

Wifite simplifies wireless security assessments, making it an essential tool for pen testers using supported Linux distributions.

▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE TESTING
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Why Hardware Tools Are Essential in 2024 For WIFI hacking ?

1⃣increased Security Standards:
Newer Wi-Fi standards like WPA3 implement enhanced encryption (e.g., SAE or Simultaneous Authentication of Equals) that resist traditional brute-force or offline cracking attacks.
WEP and WPA1 are now nearly obsolete, reducing opportunities for basic software-based attacks

2⃣Limitations of Built-In Laptop Wireless Cards:
Many laptop wireless cards lack support for Monitor Mode or packet injection, which are critical for capturing and injecting data during attacks.
Integrated cards are typically low-power, making them less effective for long-range or interference-prone environments.

3⃣Specialized Tools for Specific Tasks:
Capturing PMKIDs, deauthing access points, and brute-forcing PINs now require higher performance and specialized chipsets found in dedicated hardware tools.

▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Essential Hardware for Wireless Auditing Wireless Network Adapters:

1⃣USB-based adapters like the Alfa AWUS036ACH or Panda PAU09 support Monitor Mode and packet injection.

》Dual-band adapters (2.4GHz/5GHz) are necessary for modern Wi-Fi networks.

2⃣Portable Hacking Devices:

WiFi Pineapple:
A compact and powerful device for Wi-Fi auditing, man-in-the-middle attacks, and advanced monitoring.

》Raspberry Pi with Wireless Adapter:
A cost-effective, portable platform for running tools like Wifite, Aircrack-ng, and Reaver.

》HackRF One:
For advanced signal analysis, including software-defined radio (SDR) attacks

3⃣Long-Range Antennas:

High-gain antennas enhance the range and reliability of packet captures and injection.

4⃣ Battery-Powered Attack Platforms:

Devices like the Flipper Zero can execute simple wireless attacks without requiring a laptop.

▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
🦑𝐅𝐑𝐄𝐄 𝐑𝐄𝐒𝐎𝐔𝐑𝐂𝐄𝐒 - 𝐋𝐈𝐍𝐔𝐗

To acquire the basics of pentesting, it is crucial to understand what an operating system is.
As an open-source, community-developed operating system, Linux plays an essential role here.
As well as being a powerful tool for system administrators, Linux is also a powerful tool for pentesters.

In this list, you'll find various resources designed to help you understand and start with Linux.

👉𝗪𝗛𝗔𝗧 𝗜𝗦 𝗟𝗜𝗡𝗨𝗫?
🌟What is Linux on TechTarget
https://lnkd.in/eAm2rHXj

🌟What is Linux on Linux.com
https://lnkd.in/eTwMHeCM

👉𝗟𝗜𝗡𝗨𝗫 𝗙𝗢𝗥 𝗕𝗘𝗚𝗜𝗡𝗡𝗘𝗥𝗦
🌟Linux journey by Cindy Quach
https://linuxjourney.com/

🌟Your linux guide by LinuxOpSys
https://linuxopsys.com/

🌟Crash Course for Beginners by freeCodeCamp
https://lnkd.in/eF9P79U4

🌟Linux Full Course for Beginners by FreeCodeCamp
https://lnkd.in/eGhw9Qy3

🌟How Linux Works by Gwyneth Peña-Siguenza
https://lnkd.in/eDZt4CKA

🌟NDG Linux Unhatched by Netacad
https://lnkd.in/ebmPF9ev

▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
🦑𝗕𝗔𝗦𝗛 𝗦𝗖𝗥𝗜𝗣𝗧𝗜𝗡𝗚
🌟What is Bash by opensource
https://lnkd.in/eVYjUxvD

🌟Bash for Beginners by Microsoft Developer
https://lnkd.in/eA7E9wTt

🌟Bash Scripting Full Course by linuxhint
https://lnkd.in/eFTJe3Dm

▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
🦑𝗛𝗔𝗖𝗞𝗜𝗡𝗚 𝗪𝗜𝗧𝗛 𝗟𝗜𝗡𝗨𝗫:

🌟Useful Commands and tools for pentest on Linux by C.S. by G.B.
https://lnkd.in/eUS5hi8w

🌟Linux for hackers by Chuck Keith aka NetworkChuck
https://lnkd.in/er4MJht9
🌟Learn Linux on Hackthebox (blog post)
https://lnkd.in/eXcX2fng

🌟Top Kali Linux Tools for hacking by IT’s Foss
https://lnkd.in/eDKjut6n

▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁