UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.9K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘ (Best Offensive Password Scrambler) is a powerful tool designed for targeted wordlist generation, ideal for penetration testers and cybersecurity professionals. Here's an overview:

ใ€‹ Key Features
1. Personalized Wordlist Creation:
- Combine target-specific words with additional transformations.
- Includes separators, numbers, and special characters for realistic passwords.

2. LyricPass Module:
- Search song lyrics by artist and integrate lines into the wordlist.
- Automatically adds artist names and initialisms for phrases.

3. Customizable Transforms:
- Define character sets and transformation patterns in a configuration file.
- New case transformation mode for extensive variations.

4. Two Interfaces:
- Interactive Mode: Guided input for creating tailored wordlists.
- One-Line Commands: Quick operations for power users.

5. Compatibility:
- Built with Python 3 (Python 2.7 support available in a secondary branch).
- Includes modules like requests and alive-progress.

ใ€‹ Installation
ใ€‹# From PyPI:
pip install bopscrk

ใ€‹# From GitHub:
git clone --recurse-submodules https://github.com/r3nt0n/bopscrk
cd bopscrk
pip install -r requirements.txt

ใ€‹ Usage Examples
ใ€‹# Interactive Mode:
bopscrk -i

ใ€‹# Non-Interactive Mode:
bopscrk -w "name,birthday,city" --min 6 --max 12 -c -l -o wordlist.txt

ใ€‹# LyricPass Integration:
bopscrk -a "Eminem,Taylor Swift" -c -o lyrics_wordlist.txt

ใ€‹# Full Options:
bopscrk -w "target,custom,info" -a "ArtistName" -c -l -n 3 --min 8 --max 16 -o final_list.txt

ใ€‹ Latest Version (2.4.7) Updates:
- Improved speed and performance.
- Advanced case transformations for generating all case variants.

ใ€‹ Advanced Features
1. Combine common symbols (-, _, ., etc.) and numbers for realistic passwords.
2. Use leet transformations (e.g., a -> @, e -> 3) to mimic user behavior.
3. Save and customize configurations using bopscrk.cfg.

For further details, check the repository: [Bopscrk GitHub](https://github.com/r3nt0n/bopscrk).

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐–๐ข๐ง๐๐จ๐ฐ๐ฌ ๐’๐ž๐ซ๐ฏ๐ž๐ซ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“ ๐€๐œ๐ญ๐ข๐ฏ๐ž ๐ƒ๐ข๐ซ๐ž๐œ๐ญ๐จ๐ซ๐ฒ ๐๐ž๐ฐ ๐…๐ž๐š๐ญ๐ฎ๐ซ๐ž๐ฌ
Windows Server 2025 introduces several noteworthy enhancements, particularly in security, functionality, and Active Directory improvements:

๐ŸŸฅ๐‹๐ƒ๐€๐ ๐‚๐ก๐š๐ข๐ง ๐๐ข๐ง๐๐ข๐ง๐  ๐€๐ฎ๐๐ข๐ญ ๐’๐ฎ๐ฉ๐ฉ๐จ๐ซ๐ญ:
Administrators can now audit devices that fail or do not support LDAP channel binding. This is vital for environments transitioning to more secure channel binding configurations.

๐ŸŸฅ ๐€๐œ๐ญ๐ข๐ฏ๐ž ๐ƒ๐ข๐ซ๐ž๐œ๐ญ๐จ๐ซ๐ฒ ๐„๐ง๐ก๐š๐ง๐œ๐ž๐ฆ๐ž๐ง๐ญ๐ฌ:
โ—ผ๏ธ New forest and domain functional levels (DomainLevel 10 and ForestLevel 10) are introduced, enabling features like a 32K database page size.
โ—ผ๏ธ Improved algorithms for SID-to-name lookups and domain controller discovery, using Kerberos authentication rather than legacy Netlogon channels.
โ—ผ๏ธ Secure management of sensitive attributes by requiring encrypted connections for operations involving these attributes.

๐ŸŸฅ ๐Š๐ž๐ซ๐›๐ž๐ซ๐จ๐ฌ ๐š๐ง๐ ๐‚๐ซ๐ฒ๐ฉ๐ญ๐จ๐ ๐ซ๐š๐ฉ๐ก๐ข๐œ ๐€๐ ๐ข๐ฅ๐ข๐ญ๐ฒ:
โ—ผ๏ธ Improved Kerberos support with PKINIT for enhanced cryptographic flexibility.
โ—ผ๏ธ Active Directory now generates random default computer account passwords to bolster security, restricting manual assignment of predictable passwords.

๐ŸŸฅ ๐‘๐ž๐ญ๐ข๐ซ๐ž๐ ๐‹๐ž๐ ๐š๐œ๐ฒ ๐…๐ž๐š๐ญ๐ฎ๐ซ๐ž๐ฌ:
โ—ผ๏ธ Deprecation of WINS and mailslots, streamlining domain controller discovery methods and focusing on DNS-based technologies.

๐ŸŸฅ ๐€๐๐๐ข๐ญ๐ข๐จ๐ง๐š๐ฅ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐…๐ž๐š๐ญ๐ฎ๐ซ๐ž๐ฌ:
โ—ผ๏ธEnhanced security for computer account password defaults and policies to prevent weak configurations.
โ—ผ๏ธAdjustments in Group Policy settings to improve control over default password configurations.

These updates are designed to meet modern ๐—ฐ๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฎ๐—ป๐—ฑ ๐—ผ๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐—ฎ๐—น ๐—ฑ๐—ฒ๐—บ๐—ฎ๐—ป๐—ฑ๐˜€ while maintaining backward compatibility where feasible. For more details, you can explore the official documentation here:

๐‹๐ข๐ง๐ค ๐Ÿ: https://lnkd.in/g8a6xwbE
๐‹๐ข๐ง๐ค ๐Ÿ: https://lnkd.in/gN-UKCf8

Ref: G M Ahmad Faruk
@undercodecommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘U-Turn NAT: A Simple Concept with Diagrams ๐Ÿ”ด๐ŸŸข๐Ÿ”ต

Two days ago, I shared the concepts of Source NAT (S-NAT) and Destination NAT (D-NAT). A great question came up: What is U-Turn NAT, and how does it differ?

I realized that explaining U-Turn NAT With Source & Destination NAT provides a better understanding of how these NAT types work together. Letโ€™s dive in!

Why is it called U-Turn NAT ?

U-Turn NAT is used when internal users need to access an internal server using its public IP address. The traffic makes a "U-turn" at the firewall as it flows out and then returns to the same internal network.

1. Source NAT (S-NAT)
๐Ÿ”ด Purpose: Mainly for internal users accessing the internet.
๐Ÿ”ด How it works: NAT changes the (Source IP) in the original packet.

2. Destination NAT (D-NAT)
๐ŸŸข Purpose: Used for servers accessed from the internet.
๐ŸŸข How it works: NAT changes the (Destination IP) in the Original packet, replacing the public IP with the serverโ€™s private IP in Translated packet.

3. U-Turn NAT (U-NAT)
๐Ÿ”ต Purpose: For internal users accessing internal servers using their public IP address.
๐Ÿ”ต How it works: NAT modifies both the (Source IP and Destination IP) in the packet when the same public IP is used for external and internal access:

Understanding these NAT types together helps clarify their distinct roles and how they work in different scenarios.

Ref:Dahri A
@undercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
UNDERCODE TESTING
bypass_ai_detections.pdf
Using this method, there is no need to rewrite the article in humanised AI.