UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WMI .NET COM
Let's look at the beginning of the list of WMI classes to understand what you can work with by UndercOde :
T.me/UndercOdeTesting

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

1) PS C: Windowssystem32> Get-WmiObject -list

> For example, let's choose a class like win32_OperatingSystem:

> PS C: Windowssystem32> Get-WmiObject win32_operatingSystem

2) SystemDirectory: C: Windowssystem32


3) Now let's see what's under the hood of this class (the output is shortened):

4) PS C: Windowssystem32> Get-WmiObject win32_operatingSystem | Get-member

5) TypeName: System.Management.ManagementObject # rootcimv2Win32_OperatingSystem

πŸ¦‘ Example Name MemberType Definition
β€”- β€”β€”β€”β€”- β€”β€”β€”-
Reboot Method System.Management.ManagementBaseObject Reboot ()
SetDateTime Method System.Management.ManagementBaseObject SetDateTime (System.St
Shutdown Method System.Management.ManagementBaseObject Shutdown ()
Win32Shutdown Method System.Management.ManagementBaseObject Win32Shutdown (System.
Win32ShutdownTracker Method System.Management.ManagementBaseObject Win32ShutdownTracker (
BootDevice Property System.String BootDevice {get; set;}
BuildNumber Property System.String BuildNumber {get; set;}
BuildType Property System.String BuildType {get; set;}
Caption Property System.String Caption {get; set;}
CodeSet Property System.String CodeSet {get; set;}

πŸ¦‘ And output some property:

PS C: Windowssystem32> Get-WmiObject win32_operatingSystem | Format-List -property BuildType

BuildType: Multiprocessor Free

For starters, everything is very clear and simple. Move on:
For example, you can rename the computer in this way ...

(Get-Wmiobject -Class win32_computersystem -ComputerName job) .Rename ("home")

> The Rename () method I watched from the output (Get-Wmiobject -Class win32_computersystem -ComputerName job) | Get-member


> WSH objects can be created by defining the following program identifiers: WScript.Shell , WScript.Network , Scripting.Dictionary, and Scripting.FileSystemObject .

πŸ¦‘ These objects are created by the following commands:

New-Object -ComObject WScript.Shell New-Object -ComObject WScript.Network
For example, connect a network printer:
PS C: Windowssystem32> $ wshell = New-Object -comobject wscript.network
PS C: Windowssystem32> $ wshell | Get-member

TypeName: System .__ ComObject # {24be5a31-edfe-11d2-b933-00104b365c9f}

Name MemberType Definition

AddPrinterConnection Method void AddPrinterConnection (string, string, Variant, Variant, Variant)
AddWindowsPrinterConnection Method void AddWindowsPrinterConnection (string, string, string)
EnumNetworkDrives Method IWshCollection EnumNetworkDrives ()
EnumPrinterConnections Method IWshCollection EnumPrinterConnections ()
MapNetworkDrive Method void MapNetworkDrive (string, string, Variant, Variant, Variant)
RemoveNetworkDrive Method void RemoveNetworkDrive (string, Variant, Variant)
RemovePrinterConnection Method void RemovePrinterConnection (string, Variant, Variant)
SetDefaultPrinter Method void SetDefaultPrinter (string)
ComputerName Property string ComputerName () {get}
Organization Property string Organization () {get}
Site Property string Site () {get}
PS C: Windowssystem32> $ wshell.AddWindowsPrinterConnection ("\ serverHP LaserJet M5035 MFP PCL 6")

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How Use AJAX and PHP to create a simple file loader with the ability to add multiple files at once by UndercOde:
t.me/UndercOdeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) What you need: AJAX connected library .

2) The code is simple in one file:

<?php
if($_FILES){
foreach ($_FILES as $key => $value) {
move_uploaded_file( $value['tmp_name'], "./upload/".mb_convert_encoding( $value['name'], "Windows-1251", "utf-8" ) );
echo "<br /><b>Π—Π°Π³Ρ€ΡƒΠΆΠ΅Π½: ".$value['name']."</b><br />";
}
}else{
echo "
<html>
<head>
<title>Rambo</title>
<meta charset='utf-8' />
<script src='/rambo/jquery.js' type='text/javascript'></script>
<script>
$(document).ready(function(){
$('#file').bind('change', function(){
var data = new FormData();
jQuery.each($('#file')[0].files, function(i, file) { data.append('file-'+i, file); });
$.ajax({
url: 'index.php',
data: data,
cache: false,
contentType: false,
processData: false,
type: 'POST',
success: function(data){
$('#info').html(data);
}
});
})
});
</script>
</head>
<body>
<h2>Π”ΠΎΠ±Π°Π²ΠΈΡ‚ΡŒ Ρ„Π°ΠΉΠ»Ρ‹</h2>
<form action='' enctype='multipart/form-data' method='POST'>
<input id='file' type='file' multiple='multiple' name='file[]' />
<div id='info'></div>
</form>
</body>
</html>
";
}
?>

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How Migrating a virtual machine from VMWare ESX to Hyper-V
The task is as follows: migrate a virtual machine from VMWare ESX to Hyper-V :
fb.com/UndercodeTestingCompany

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

1) Used old versions of VMWare and Hyper-V for stabilty issue
For this task, we need a free utility V @ VConverter
> https://www.starwindsoftware.com/starwind-v2v-converter

And the actions are as follows:

1) For example, download files of a virtual machine disk with VMWare in vmdk format onto a hard disk

2) using V @ VConverter, we transfer the file to vhd format

3) We put the file for example on a disk with Hyper-V

4) We create a new Hyper-V virtual machine , but on the "virtual disk" tab we do not create a new one, but connect the necessary one.

Everything is ready, you can run!

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘IIS: web.config substitute page for error PART 1
>t.me/UndercOdeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) It is very simple to substitute any page for the place of the error.

> For example, we need IIS to display a 404.htm page instead of a standard 404 error

2) We go to the site folder, for example: C: \ inetpub \ wwwroot \ your_site

> Throw in there 404.htm

3) In the Web.config file we find the <system.web> section , and add a piece of the type to it:

<system.web>
<httpRuntime maxRequestLength="1048576" executionTimeout="3600" />
<compilation debug="true" targetFramework="4.6.1" />
<customErrors mode="On">
<error statusCode="404" redirect="~/404.htm"/>
</customErrors>

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BASH Tutorial Full by UndercOde PART 1 :
t.me/UndercOdeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

Scripts in the bash begin with the instructions of the interpreter:

#! / usr / local / bin / bash

To find out where bash is located , use the command:

which bash

You can make the script executable by adding rights:

chmod + x test.sh

Comments begin with the symbol - #

An example of writing a simple script:



cd / home / user



vi test.sh

#! / usr / local / bin / bash

# This is first script

echo "This is echo line"



chmod + x test.sh





Launch Options:

./test.sh

This is echo line



bash ./test.sh

This is echo line



Debug start option:

bash -x ./test.sh

+ echo ' This is echo line '





Use to debug option -x
In large and unfamiliar scripts, it is priceless

Add the simplest function:

#! / usr / local / bin / bash

# This is first script

echo "This is echo line"

πŸ¦‘In this script, we will make a couple of functions:

cat test.sh

#! / usr / local / bin / bash

# Does not accept arguments

function echo_ text ( )

{

echo "This is echo line"

}



# Accepts arguments, displays them

function echo_text_ args ( )

{

echo "This is echo linei args : $ 1 $ 2"
}

# Call functions

echo_text

echo_text_args "1_arg" "2_arg"

echo_text_args $ 1 $ 2

πŸ¦‘ Calling a script with and without arguments:

./test.sh

This is echo line

This is echo linei args : 1_arg 2_arg

This is echo linei args :

./test.sh 1_global_arg 2_global_arg

This is echo line

This is echo linei args : 1_arg 2_arg

This is echo linei args : 1_global_arg 2_global_arg

As you can see, the argument names in the script are the same, the result is different

Globally and locally in a function, these are different variables.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A Great Hacker Build His Own Custom Apps So :
> To Build Your Own Termux You need those Official Packages :
t.me/UndercOdetesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) This project contains scripts and patches to build packages for the Termux Android application.

2) The pakages available here are only from main set. We have some additional repositories:

a) https://github.com/termux/game-packages

b) Game packages, e.g. angband or moon-buggy.

https://github.com/termux/science-packages

c) Science-related packages like gap and gnucap.

https://github.com/termux/termux-root-packages

d) Packages which can be used only on rooted devices. Some stuff available here requires custom kernel (like aircrack-ng or lxc).

https://github.com/termux/unstable-packages

e) Staging repository. Packages that are not stable are only available here.Most likely, new packages will also be placed here.

https://github.com/termux/x11-packages

f) Packages that require X11 Windows System.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘IIS: web.config substitute page for error (part 2)
Continuing the loop with IIS, the first part with customErrors
t.me/UndercodeTesting

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

> The task is changing and becoming more complicated.

> It is necessary to make sure that everyone displays instead of errors stub pages, and developers can see the error logs in xml

> For IIS I chose the Failed the Request Tracing The Rules , in the components of WIndows Server dostavyalem for IIS , if not installed initially with the role of You:

Web Server - Health and diagnostic - Tracing

Now, going to the IIS snap-in - The right site , you will see the Failed Request Tracing Rules

In the Failed Request Tracing Rules in the "Actions" section on the right, select "Edit Site Tracing" and enable tracing

In the Failed Request Tracing Rules in the "Actions" section on the right, select "Add."

1) All content (*)

2) Status codes - for example 401-999

3) For example, we are interested in everything

4) Finish

5) Now in "C: \ inetpub \ logs \ FailedReqLogFiles \" you will see folders with logs

6) Do not forget that I also added stub pages, now in the config you can see it - path = "/ CustomErrors / error.aspx"

In Web.config, the piece looked like this:

<system.webServer>
...
<httpErrors errorMode="Custom" existingResponse="Replace" >
<clear/>
<error statusCode="401" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="403" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="404" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="405" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="406" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="412" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="501" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
<error statusCode="502" path="/CustomErrors/error.aspx" responseMode="ExecuteURL" />
</httpErrors>
<tracing>
<traceFailedRequests>
<add path="*">
<traceAreas>
<add provider="ASP" verbosity="Verbose" />
<add provider="ASPNET" areas="Infrastructure,Module,Page,AppServices" verbosity="Verbose" />
<add provider="ISAPI Extension" verbosity="Verbose" />
<add provider="WWW Server" areas="Authentication,Security,Filter,StaticFile,CGI,Compression,Cache,RequestNotifications,Module,FastCGI" verbosity="Verbose" />
</traceAreas>
<failureDefinitions statusCodes="401-999" />
</add>
</traceFailedRequests>
</tracing>
</system.webServer>

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How Add a New Hard Drive to FreeBSD
t.me/UndercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> Adding a New Hard Drive to FreeBSD


1) We have a hard drive defined as:
/ dev / sdb1

2) Delete existing sdb1 disk
layout : gpart destroy -F sdb1

3) Create a new gpt sdb1 disk
layout : gpart create -s gpt / dev / sdb1

4) Example of creating swap and fs with ufs:
gpart add -t freebsd-swap -s 1048576 / dev / sdb1
gpart add -t freebsd-ufs / dev / sdb1

5) Create ufs fs on the second created partition:
newfs -U / dev / sdb1p2

6) Add lines to mount on / etc / fstab when loading the
OS : / dev / sdb1p1 none swap sw 0 0
/ dev / sdb1p2 / mnt ufs rw 2 2

7) We connect on the fly ufs section:
mount -a

8) We connect swap section on the fly:
swapon / dev / sdb1p1

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘PowerShell Small Commands by UndercOde :
twitter.com/UNDERCODETC

1) Powershell is located here:
C: \ Windows \ System32 \ WindowsPowerShell \ v1.0
or
% SystemRoot% \ System32 \ WindowsPowerShell \ v1.0

2) There is also a development tool - ISE (Integrated Script Environment)
powershell_ise.exe

3) Running PowerShell scripts:
By default, running Windows PowerShell scripts is not allowed

4) Restricted level - prohibits script execution
Unrestricted level - all scripts can be run
AllSigned level - all scripts must be digitally signed
RemoteSigned level - scripts from the network must be signed

5) In the registry, by the path: HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ PowerShell A
parameter is set, for example - "ExecutionPolicy" = "AllSigned"
Or we control the cmdlets - Get-ExecutionPolicy and Set-ExecutionPolicy
Example: Set-ExecutionPolicy RemoteSigned

6) Acquaintance
We carry out custom projects in Python
We carry out projects in Python to order. The team of specialists.
python.dm consulting.rf

7) Yandex.Direct
The basic construction of a verb-noun language.

πŸ¦‘Simple examples:

1> Get-Help - display help.

2> Get-Process - list the processes.

3> Get-Command - print commands.

πŸ¦‘Parameters are passed through a hyphen β€œ-”.

The output of the commands with the verb " Get":

Get-Command –Verb Get

Command output with the noun β€œ Event”:

Get-Command –Noun event

πŸ¦‘ Implicit parameter passing to Get- help command ( command help):

Get-Help Get-Event

Get-Help Get-Event –Detailed

Get-Help Get-Event -Full

Get-Help Get-Event -Examples

List of modules in Powershell:

Get-Module –ListAvailable

Print all commands from the NetTCPIP module :

> Get-Command –Module NetTCPIP

Update help (you need an Internet connection and administrator rights):

Update-help

πŸ¦‘ Environment variables :
Get-Childitem env:
Get-Childitem env:
dir env: | sort name

πŸ¦‘ Output variable name and values
Get-Item env: windir
Get-Childitem env: UserName

πŸ¦‘ Output of the value of the variable

> write-host $ env: windir
write-host $ env: UserName
write-host ([System.Environment] :: CurrentDirectory)
write-host ([System.Environment] :: UserName)

#Changing variables (the Set-Item, Remove-Item, and Copy-Item cmdlets are available)
$ env: customvar = "Var1"
$ env: customvar = $ env: customvar + "Var2"
Set-Item -path env: customvar -value ($ env: customvar + 'Var3')

EN J O Y BY U N D E R C O D E

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Creating Accessory Lists for Cisco Routers :
> t.me/UndercOdeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Configure a simple sheet (identification up to 100):
Create sheet 10 and deny any connections with the address 192.168.0.2 in it

R1 (config) # access-list 10 deny 192.168.0.2

2) We connect the sheet with the input interface:

R1 (config) #interface fastEthernet 1/0
R1 (config-if) #ip access-group 10 in
R1 (config-if) #exit

3) Delete a sheet as follows (you cannot change a simple sheet):
Once you enter the interface, enter

R1 (config-if) #no ip access-group in

4) Configure a complex sheet (identification greater than 100):

Create

R2 (config) #ip access-list extended 110

5) We go to the sheet and configure it (disable icmp between hosts):

R2 (config) #ip access-list extended 110
R2 (config-ext-nacl) #deny icmp host 192.168.0.1 host 192.168.0.2
R2 (config-ext-nacl) #exit

6) We will connect with the interface

R2 (config) #interface fastEthernet 1/0
R2 (config-if) #ip access-group 110 in

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hidden redirect, rewrite and reverse proxy server in nginx to a third-party server :
fb.com/UndercodeTestingCompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Redirect, rewrites the address in the browser, defines a new (rewritten)
#server {
# listen 3001;
# server_name test-on-mongo;
# return 301 $ scheme: // test-on-mongo: 5001 $ request_uri;
#}

2) Rewrite, rewrites the address in the browser, defines a new (rewritten)
#server {
# listen 3001;
# server_name test-on-mongo;
# rewrite ^ (. *) $ $ scheme: // test-on-mongo: 5001 $ 1 permanent;
# return 403;
#}

3) Rewrite, rewrites the address in the browser, defines a new (rewritten)
#server {
# listen 3001;
# server_name test-on-mongo;
# location / {
# if ($ http_host ~ "^ test-on-mongo: 3001") {
# rewrite ^ / (. *) http: // test-on-mongo: 5001 redirect;
#}
#}
#}

4) A third-party web server is running on port 3001, it was previously on port 5001

5) From the old link 5001, nginx redirects to port 80, and then to 3001
# Made to bite a port in url
server {
listen 80;
listen [::]: 80;
server_name test-on-mongo;

location / {
proxy_pass http: // test-on-mongo: 3001;
}
}

server {
listen 5001;
listen [::]: 5001;
server_name test-on-mongo;

return 301 $ scheme: // test-on-mongo $ request_uri;
}

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Official Microsoft GitHub Repository containing code samples for SQL Server for any Linux Server/ Windows or Win server
t.me/UndercOdeTesting

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

1) git clone -n https://github.com/Microsoft/sql-server-samples

2) cd sql-server-samples

3) git config core.sparsecheckout true

4 )echo samples/features/*| out-file -append -encoding ascii .git/info/sparse-checkout

5) echo samples/demos/*| out-file -append -encoding ascii .git/info/sparse-checkout

6) git checkout

πŸ¦‘Extra Note Recommended by UndercOde:

> Sparse checkouts enable you to work on a subset of the repository. It’s worth the effort to set up sparse checkouts on large repositories, everything is much faster!

> I struggled with setting it up on windows getting a lot of β€œerror: Sparse checkout leaves no entry on the working directory”. After a bit of research, I found the following steps were minimal and had consistently good results for me – YMMV.

> The most important point is this – DO NOT USE POWERSHELL/CMD FOR THESE STEPS – use a git bash prompt. This is because otherwise the echo command produces a UNICODE file with a BOM marker. The file MUST be an ANSI formatted file with UNIX style line endings for git to parse it correctly. This is the most likely cause of β€œerror: Sparse checkout leaves no entry on the working directory” errors.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How Crack Pdf PassWord Guide Tested :
t.me/iOsDeveloppers

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

1) git clone https://github.com/magnumripper/JohnTheRipper.git

2) cd ./JohnTheRipper/src

3) sudo apt-get update

4) sudo apt-get install libssl-dev

5) ./configure && make

6) cd ..

7) cd ./run

8) ls

πŸ¦‘ Generate PDF hash file :

type in term:

> pdf2john.pl /root/Desktop/pdf_exampleprotected.pdf > /root/Desktop/pdf.hash

πŸ¦‘Brute Force with John:


Now :
>john exampleprotected_pdf.hash

> john --wordlist=password.lst exampleprotected_pdf.hash

πŸ¦‘Tested by UndercOde on:

> Kali

> Parrot

> debian

> Ubanto

E N J O Y

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Powershell: send SMTP email with authorization :
t.me/UndercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

Now Powershell code , I wanted to check if the services are running, if someone of interest is stopped, then an SMTP notification is sent

πŸ¦‘ Sender and Recipient Info
$MailFrom = "sender@senderdomain.com"
$MailTo = "recipient@recipientdomain.com"

# Sender Credentials
$Username = "SomeUsername@SomeDomain.com"
$Password = "SomePassword"

# Server Info
$SmtpServer = "smtp.domain.com"
$SmtpPort = "2525"

# Message stuff
$MessageSubject = "Live your best life now"
$Message = New-Object System.Net.Mail.MailMessage $MailFrom,$MailTo
$Message.IsBodyHTML = $true
$Message.Subject = $MessageSubject
$Message.Body = @'
<!DOCTYPE html>
<html>
<head>
</head>
<body>
This is a test message to trigger an ETR.
</body>
</html>
'@

πŸ¦‘Construct the SMTP client object, credentials, and send
$Smtp = New-Object Net.Mail.SmtpClient($SmtpServer,$SmtpPort)
$Smtp.EnableSsl = $true
$Smtp.Credentials = New-Object System.Net.NetworkCredential($Username,$Password)
$Smtp.Send($Message)

@UndercOdeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘PostgreSQL guide bu utc
The scheme of the PostgreSQL application is as follows:
t.me/UndercOdeTesting

1) The " POSTMASTER " process on the server receives a connection request

2) Upon successful completion of the check, POSTMASTER creates its copy

3) Next, the interaction with the client database is already through a copy

πŸ¦‘After installation (Configuring a database cluster)


On Windows, the installation package most likely will write everything automatically to start the cluster, depending on the specified directory, but you can configure the cluster using the utilities below initdb and pg_ctl , they will be in the bin directory, for example - D: \ Postgres \ bin


In this case, it is a set of databases that will be managed by a single server instance.

πŸ¦‘ A single PostgreSQL instance can start and monitor a set of databases that are isolated from each other but served through the same TCP / IP or UNIX socket


You can use the option to create a cluster with:

initdb - creates a new PostgreSQL database cluster

The syntax is initdb [option ...] [–pgdata | -D] directory


πŸ¦‘ The desired location of the database cluster is indicated by the -D option:

> sudo postgres

> initdb -D / usr / local / pgsql / data


Or so:

$ sudo postgres

$ pg_ctl -D / usr / local / pgsql / data initdb


πŸ¦‘ After that, you can try to start the server - sudo service postgresql start


Or there are options


Run postmaster in active mode:

$ postmaster - D / usr / local / pgsql / data


Running in the background using pg_ctl:

$ pg_ctl - D / usr / local / pgsql / data - 1 /tmp/postgresql.log start


πŸ¦‘ Examples of pg_ctl actions :


Server start:

$ pg_ctl start


Server Stop:

$ pg_ctl stop


Server restart:

$ pg_ctl restart


Server Status:

$ pg_ctl status

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Psql utility :
t.me/UndercodeTesting

In the standard delivery with the server with the postgresql-client package for administration, the psql utility is used , I will give several examples of its functionality (examples for Windows and Linux are similar)

1) On Linux - su - postgres, Windows - cmd - psql


psql --help - help


2) Some utility arguments:

psql -l - list the databases

psql -d database - connect to the database with the name " database "

psql -f script .sql - execute the SQL script " script .sql"

psql -d test -H -c "SELECT * FROM students " -o D: \ Postgres \ f .html - output to file


3) Listing configuration files:

psql> SELECT name, setting FROM pg_settings WHERE category = 'File Locations';


4) Listing Active Sessions:

psql> SELECT * FROM pg_stat_activity;


5) Kill Session:

- Learn id session from

6) SELECT datname as database,

pid

7) usename as username,

application_name as application,

client_addr as client_address,

query

8) FROM pg_stat_activity;


- Specify the session id and database

SELECT pg_terminate_backend ( session id )

FROM pg_stat_activity

WHERE datname = 'DB';

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Some BlackArch Program examples2019-2020
t.me/undercOdeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) blackarch-code-audit
Packages for auditing existing vulnerability analysis code.

Examples: flawfinder, pscan

2) blackarch-cracker
Packages used to crack cryptographic functions, such as passwords.

Examples: hashcat, john, crunch

3) blackarch-crypto
Packages that work with cryptography, with the exception of hacking.

Examples: ciphertest, xortool, sbd

4) blackarch-cryptography
Security audit tools for cryptographic algorithms and technologies.

Examples: pyssltest, skul

5) blackarch-database
Packages that at some level include exploit databases.

Examples: metacoretex, blindsql

6) blackarch-debugger
Packages that allow the user to see what a particular program "does" in real time.

Examples: radare2, shellnoob

7) blackarch-decompiler
Packages that try to convert compiled programs to source code.

Examples: flasm, jd-gui

8) blackarch-defensive
Packages that are used to protect against malware and attacks from other users.

Examples: arpon, chkrootkit, sniffjoke

9) blackarch-disassembler
Like blackarch-decompiler and probably a lot of programs will fall into both categories, however, these packages produce assembler code in the output, rather than the raw source code.

Examples: inguma, radare2

10) blackarch-dos
Packets that use DoS attacks (Denial of Service).

Examples: 42zip, nkiller2

11) blackarch-drone
Packages that are used to control physically engineered drones.

Examples: meshdeck, skyjack

12) blackarch-exploitation
Packages that take advantage of exploits in other programs or services.

Examples: armitage, metasploit, zarp

& more...
WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WIFI HACKING : WPA downgrade test:
The WPA downgrade test is a test mode indicated by the letter g . This mode has only one option -t <bssid> , after which you need to specify the target network.
twitter.com/UndercOdeTC

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> The essence of this attack is that mdk3 deauthenticates Stations and APs by sending encrypted WPA packets. With this test, you can check whether the system administrator will try to set the network settings to WEP or disable encryption. mdk3 will allow clients to work with WEP without encryption, so this attack is carried out in the hope that the system administrator will just think that "WPA is broken." Therefore, this attack is designed for an advanced user who will think of changing the settings of the router and be able to do it. This attack refers to social engineering, to increase the likelihood of a successful outcome, it can be combined with other social engineering techniques.

1) look at the available networks:

> sudo airodump-ng wlan0

2) Suppose we are interested in a network called dlink, it uses WPA2 encryption and its BSSID 00: 1E: 58: C6: AC: FB, we also note that the AP works on channel 6.

3) We need to transfer our wireless card to the same channel that the AP works:

> sudo iw wlan0 set channel 6

4) We launch an attack that disconnects all clients from this network and prevents them from reconnecting until encryption is changed to WEP or removed at all:

> sudo mdk3 wlan0 g -t 00:1E:58:C6:AC:FB

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is mdk3 and what can do ?

> mdk3 is a multifunctional program whose main goal is to show the weak points of Wi-Fi networks. The mdk3 utility can be used to suppress Wi-Fi, deauthenticate clients, to confuse wireless network monitors or to confuse intruders who want to attack your wireless network, as well as to perform an attack aimed at lowering the encryption algorithm from WPA to a weaker one or refusing to use it encryption. Those. it can be seen that the program is very versatile.
t.me/UndercodeTesting

πŸ¦‘ Now Using mdk3 :
The program starts as follows:

> mdk3 - h

πŸ¦‘in usage :

<interface> is the name of your wireless interface,

<test mode> is one of the program’s functions, for example, stress testing, flood, etc. It is indicated by a small letter without a dash.
mdk3 does not know how to transfer cards to monitor mode and does not switch the interface to the desired channel. Because of this, most often there are problems when mdk3 does not work. These are the most common usage errors - before you start an attack, you need to switch to the desired channel yourself.

πŸ¦‘ Stop NetworkManager so that it does not bother us:

> sudo systemctl stop NetworkManager
Putting the wireless interface in monitor monitor mode

> sudo ip link set wlan0 down<font></font>

>sudo iw wlan0 set monitor control<font></font>

> sudo ip link set wlan0 up

Note that the interface name is still wlan0 , although it is now in monitor mode

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁