UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.2K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘In Linux Firewalls - create your own part 2 Packet filtering process:
T.me/UndercOdeTesting

πŸ¦‘LETS START:

> Before Installation Before starting to install the iptables userspace tool, you need to make some modifications to the system. First, you need to use the make config command to configure kernel options. During configuration, they must be turned on by setting the CONFIG_NETFILTER and CONFIG_IP_NF_IPTABLES options to Y, as this is required to make netfilter / iptables work. Here are other options you might want to turn on:

1) CONFIG_PACKET: This option is useful if you want applications and programs to use certain network devices directly.
CONFIG_IP_NF_MATCH_STATE: This option is very important and useful if you want to configure a stateful firewall. This type of firewall remembers previous decisions about packet filtering and makes new decisions based on them. I will discuss this further in the advantages section of the netfilter / iptables system.

2) CONFIG_IP_NF_FILTER: This option provides a basic packet filtering framework. If this option is turned on, a basic filter table (with built-in INPUT, FORWARD, and OUTPUT chains) is added to kernel space.
CONFIG_IP_NF_TARGET_REJECT: This option allows you to specify that ICMP error messages should be sent in response to inbound packets that have been dropped by DROP, rather than simply killing them.
Now you are ready to install this userspace tool.

πŸ¦‘ Install the userspace tools :
> After downloading the source code for the iptables userspace tools (it's similar to iptables-1.2.6a.tar.bz2), you can begin the installation. You need to log in as root to perform the installation. Listing 1 shows an example that indicates the commands required to install the tool, their necessary order, and their descriptions.

1) Listing 1. Example of userspace tool installation
First, unpack the tool package into a directory:

# bzip2 -d iptables-1.2.6a.tar.bz2
# tar -xvf iptables-1.2.6a.tar

2) This will unpack the tool source into a directory named iptables-1.2.6a.
Now change to the iptables-1.2.6a directory:

# cd iptables-1.2.6a

3) The INSTALL file in this directory contains a lot of useful information
on compiling and installing this tool.

4) Now compile the userspace tool using the following command:

# make KERNEL_DIR = / usr / src / linux /

5) Here the KERNEL_DIR = / usr / src / linux / specifies the path to the kernel's
directory. If the directory of kernel happens to be different on some
systems, the appropriate directory path should be substituted for
/ usr / src / linux.

6) Now install the source binaries using the following command:

# make install KERNEL_DIR = / usr / src / linux /

> Now the installation is complete.

Written by UndercOde
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Android apps/Games hack- testing by UndercOde :
t.me/UndercOdeTesting

πŸ¦‘LETS START:
> How to get more game points / money?

Note: This technique is not suitable for some online games.

1) Download the Game Killer app and install it on your Android device.
>https://apkpure.com/game-killer/com.charles.lpoqasert/download?from=details

2) Open Game Killer and allow root access


3) Open the game you want to hack, then check the current game points / money and write it down.

4) Click the Game Killer icon

5) Now enter the game funds you have and click the search icon. Then select "Automatic Recognition" and within two seconds you will see the search results.

6) Now go to Options> Data Controls> Modify all values. A small box will appear.

7) Enter the maximum value you can enter and click OK.

> That's it, it's perfect.

Written by UndercOde
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to hack an online Android game?- FOR BEGINERS
> Fact: You can also use this in some offline games.
T.me/UnderCodeTesting

πŸ¦‘LETS START:

1) Download and install the Xmodgames application on your Android device.
> https://apkpure.com/xmodgames/com.satsaniz.aniz/download?from=details

2) Open the application and allow root access


3) Click on the application you want to crack (only when it says "Mod"), you will see the mod details.

example hack the 8 ball pool game

4) Click Install and wait for it to complete.

> Note: This application requires a working internet connection to install the mod.

5) Then click "Start" and the game will open. When you reach the main menu, a small window will pop up, if not, click on x-bot.

6) Click "Xmod".


7) Turn on the features, here is the infinite guide. Then close the floating window and play the game!

Wish you have fun ...

> Note: Using Xmodgames may prevent you from using the game. So use it with caution.

πŸ¦‘ Now you might ask "What if Xmodgames doesn't have a game-specific mode?"

The answer is simple, just search for a modified version of the game on Google or any other search engine.


Written by UndercOde
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ for beginers ALL BZIP2 LINUX COMMANDS :
twitter.com/UndercOdeTC

πŸ¦‘ #Function description: Compression program for .bz2 file by undercode

>Syntax: bzip2 [-cdfhkLstvVz] [-repetitive-best] [-repetitive-fast] [-compression level] [files to be compressed]

> Supplementary explanation: bzip2 uses a new compression algorithm, and the compression effect is better than traditional LZ77 / The LZ78 compression algorithm is good. If you do not add any parameters, bzip2 will generate a .bz2 compressed file after deleting the file, and delete the original file.

πŸ¦‘ Parameters:

1) -c or --stdout send compressed and decompressed results to standard output.

2) -d or --decompress performs decompression.

3) -f or --force bzip2 When compressing or decompressing, if the output file has the same name as an existing file, the preset file will not be overwritten by default. To override, use this parameter.

4) -h or --help Display help.

5) -k or --keep bzip2 deletes the original file after compression or decompression. To keep the original file, use this parameter.

6) -s or --small reduces the amount of memory used during program execution.

7) -t or --test Test the integrity of the .bz2 compressed file.

8) -v or --verbose Display detailed information when compressing or decompressing files.

9) -z or --compress Force compression.

10) -L, --license,

11) -V or --version Display version information.

12) --repetitive-best If there are repeated data in the file, you can use this parameter to improve the compression effect.

13) --repetitive-fast If there is repeated information in the file, this parameter can be used to speed up the execution.

14) -Compression level Block size when compressed.


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘For apps developpers > How to strengthen Android apk to prevent cracking (prevent reverse compilation) ? by Undercode :
T.me/UnderCodeTesting

πŸ¦‘LETS START:


> Now the main tool is to contact the SDK. In order to prevent game packages from being cracked and compiled, and to discover encrypted strings, let me share the following points:
There are four main ways to implement anti-cracking technology:

1) ProGuard technology

2) Signature ratio For technology

3) NDK .so dynamic library technology

4) Dynamic loading technology

5) Third-party platform encryption and detection of vulnerabilities

πŸ¦‘ How to decompile and encrypt the apk package in Android Security so knowledge points by undercode

1) The first one: Code obfuscation technology (ProGuard) This technology is mainly used to obfuscate the code and reduce the readability of the code after reverse compiling. However, this technology cannot prevent the packing technology from packing (adding codes such as fees, advertisements and viruses) And, as long as a careful person, the code can still be analyzed in reverse, so the technology does not solve the problem of cracking, but only increases the difficulty of cracking.

2) Second: Signature comparison technology This technology mainly prevents the packing technology from packing, but the risk of reverse analysis of the code still exists. And this technology cannot solve the problem of being packed at all. If the cracker commented out the signature comparison code and compiled it back, the technology would be cracked.

3) The third: NDK .so dynamic library technology. This technology implements all important core code in C files, and uses NDK technology to compile the core code into a .so dynamic library, which is then called by JNI. Although this technology can protect the core code, the risk of being packed still exists.

4) The fourth type: dynamic loading technology, which is a relatively mature technology in Java, but this technology in Android has not been fully utilized by everyone.

5) Fifth type: use of third-party platforms

πŸ¦‘ The fourth method is mainly explained. This technology can effectively prevent problems such as reverse analysis, being cracked, and being packed. The dynamic loading technology is divided into the following steps:

a) Jar package that compiles the core code into a dex file

b) Encrypting the jar package
Decrypt with NDK at the main entrance of the program
Then use ClassLoader to dynamically load the jar package
Use reflection technology to set ClassLoader as the system's ClassLoader.

πŸ¦‘ The main advantages are:

1) The core code is in the encrypted jar, so the cracker cannot extract the class file. If the encryption key is obtained by the cracker, it will be another level of security.

2) This technology can also effectively prevent the shelling technology. The code is dynamically loaded. The cracker's shell program cannot be added to the encrypted jar package. The cracker injected the shell program entry in time.

3) The shell program is not in the ClassLoader jar package. Therefore, it cannot be executed unless the cracker replaces the ClassLoader jar package and turns off the NDK decryption code. However, this installation on the phone is no longer our application, and the user must uninstall it.

4) Therefore, when compared, the fourth dynamic loading technology is the safest, but the efficiency is not strictly tested. After a rough experiment, the efficiency has not been significantly reduced.

LEARN AND SECURE YOUR APP,
Written by Under Code
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Input method class-xsim installation :



1) First, uninstall the original minichinput

2) rpm -e chinput

2) Second, install xsim

3) . / configure --with-cn-locale = GB2312 --enable-status-kde3

4) make

5) make install

6) make install-data

7) Configuration file

> Run locale chooser and change locale to zh_CN.

> vi / usr / local / xsim / xsimrc

XIM Locale "zh_CN" (modified value)

> Fourth, let the system automatically run xsim
vi ~ / .bash_profile after each startup and
add this line:

> export XMODIFIERS = @ im = XSIM

> re-login to xwindows, you can use ctrl + space Dropping the input method is really great!

Written by Under Code
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Programming Techniques-Cross-platform Code Debugging by undercode :
twitter.com/UndercOdeTC

> In development, for code reuse, we always separate the core algorithm from the interface part, the
> It is best to support it when writing code. If you work in the company, you can have more
machines one with linux, the code has to be copied, or the server using Telnet.
If there is only one computer, it will be miserable. Install two operating systems. , Restart, switch operating system.

πŸ¦‘LETS START:

> Here is a software that can solve this problem. The same source code under Windows is
compiled and debugged with VC and gcc at the same time. It is cygwin. I use vc6.0, gcc2.95.2.

1) Install cygwin
First install cygwin. Cygwin is a cygnus.com product. Download it from its website and
install it directly on the Internet. Do n’t forget to select the gcc option during installation.

2) Code directory
My code directory is ZCore. The following are subdirectories. There are two subdirectories in the subdirectory Build:
VC and gcc hold the VC project files and gcc Makefile respectively; the subdirectory Src is the code directory; the
subdirectory Doc In the code is the Readme and other instructions (not used to Chinese comments in English code), the code
To be compiled into a static library. Needless to say the VC compilation environment, let's see how to set up a gcc compilation environment.
Makefile has to be written by myself, there is no Makefile auxiliary tool in my cygwin. Run cygwin.

3) Mapping the directory
We first mount the win32 directory into the posix directory, and run mount to view the original
mounted path. The path of my ZCore is: d: studyzcore, I want to map into / zcore, the
command is: "mount d: / study / zcore / zcore". There is a warning, but no problem. Now
using mount to view, there is one more. This information is stored in the registry
[HKEY_CURRENT_USERSoftwareCygnus SolutionsCygwinmounts v2 / zcore]
If you want to uninstall, use the command "umount / zcore".

4) gcc compile
with "cd / zcore / build / gcc" into the compilation directory, make it.

In this way, you can use VC to compile with gcc when debugging code, and it will be easier to migrate to other environments in the future.

Written by Under Code
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 tool for m performing a denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools
T.me/UndercOdeTesting

πŸ¦‘LETS START:

1) git clone https://github.com/entynetproject/quack

2) cd quack

3) chmod +x install.sh

4) ./install.sh

πŸ¦‘usage: quack [-h] [--target <IP:port/URL/phone>]
[--tool [SMS|NTP|TCP|UDP|SYN|POD|SLOWLORIS|MEMCACHED|HTTP|NJRAT]]
[--timeout <timeout>] [--threads <threads>] [-u]

optional arguments:
-h, --help show this help message and exit
--target <IP:port/URL/phone>
Target IP:port, URL or phone.
--tool [SMS|NTP|TCP|UDP|SYN|POD|SLOWLORIS|MEMCACHED|HTTP|NJRAT]
Attack tool.
--timeout <timeout> Timeout in secounds.
--threads <threads> Threads count.
-u, --update Update Quack Toolkit.

πŸ¦‘Example of the SMS attack:

quack --tool SMS --target 15554443333 --time 10 --threads 10
Example of the HTTP attack:

quack --tool HTTP --target http://example.com/ --time 10 --threads 10
Example of the TCP attack:

quack --tool TCP --target 192.168.1.100:80 --time 10 --threads 10


Written by Under Code
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Make an xbm picture ? by undercode :
> xbm is a simple two-color image bitmap format. It was used more in early cgi. It is currently used on counters.
T.me/UndercOdeTesting

πŸ¦‘LETS START:

<? php
setXBM (1234567890,0);

function setXBM ($ num, $ mode = 0) {
settype ( $ num, "string");
$ mode = $ mode? 0xff: 0x00;
$ int_width = strlen ($ num); // digits
$ count_width = 8; // single number width
$ count_height = 16; // height

$ bitmap = array (
0 => array (0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
1 => array (0xff, 0xff) , 0xff, 0xcf, 0xc7, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xff, 0xff, 0xff),
2 => array (0xff, 0xff, 0xff, 0xc3, 0x99, 0x9f, 0x9f, 0xcf , 0xe7, 0xf3, 0xf9, 0xf9, 0x81, 0xff, 0xff, 0xff),
3 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x9f, 0x9f, 0xc7, 0x9f, 0x9f, 0x9f, 0x99, 0xc3, 0xff, 0xff, 0xff),
4 => array(0xff, 0xff, 0xff, 0xcf, 0xcf, 0xc7, 0xc7, 0xcb, 0xcb, 0xcd, 0x81, 0xcf, 0x87, 0xff, 0xff, 0xff),
5 => array(0xff, 0xff, 0xff, 0x81, 0xf9, 0xf9, 0xf9, 0xc1, 0x9f, 0x9f, 0x9f, 0x99, 0xc3, 0xff, 0xff, 0xff),
6 => array(0xff, 0xff, 0xff, 0xc7, 0xf3, 0xf9, 0xf9, 0xc1, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
7 => array(0xff, 0xff, 0xff, 0x81, 0x99, 0x9f, 0x9f, 0xcf, 0xcf, 0xe7, 0xe7, 0xf3, 0xf3, 0xff, 0xff, 0xff),
8 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0xc3, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
9 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0x99, 0x83, 0x9f, 0x9f, 0xcf, 0xe3, 0xff, 0xff, 0xff)
);

echo "#define counter_width " .($count_width * $int_width)."\r\n";
echo "#define counter_height " .$count_height. "\r\n";
echo "static unsigned char counter_bits[] = {\r\n";
for($i=0; $i<$count_height; ++$i) {
for($j = 0; $j < $int_width; ++$j) {
printf("0x%2x, ",$bitmap[$num[$j]][$i]^$mode);
}
}


Written by Under Code
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Network Filtering-Address Mapping with iptables :
> t.me/UnderCodeTesting

πŸ¦‘LETS START:

many users such redhat os- asks:
> How Can I make my internal FTP server accessible to Internet users? That is how to map IP addresses, please give pointers ..well follow this UnderCode Tutorial

you can't ftp / telnet on the LAN, and then there is really no way, you turned off iptables!> see this fix


1) Ftp dnat
# / sbin / iptables -t nat -A PREROUTING -p tcp -d $ addr0 --dport 20 -i eth0 DNAT --to $ ADDR3 -j: 20
# / sbin / iptables -t NAT -A PREROUTING -p tcp -d $ ADDR0 --dport 21 -i eth0 -j DNAT --to $ ADDR3: 21
this is what I have done An example. Used well. See if it helps you.

2) $ addr0 The IP of the external network card of this machine

3) $ addr1 The IP of the internal server

πŸ¦‘ Isn't there only one machine that can FTP?
try

1) insertmod ip_nat_ftp
and other related modules. I didn't specify whether a PC can FTP ... but all our LANs can FTP.

2) Or your iptable firewall script was written incorrectly. No open ftp port.

Written by Under Code
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Seven elements of being a successful programmer recommended by UnderCode
T.me/UnderCodeTesting

1) First, low commitment, high realization: If your commitment is indeed what the manager wants to hear, he will like you. However, he will not like you any more if the software is not delivered in a timely manner as promised.

2) Second, don't put errors in software: Good programmers don't put errors in their code.

3) Third, full of enthusiasm and hard work: Excellent programmers are full of enthusiasm and hard work, they are highly organized, and pay attention to methods, they have the ability to structure things. Moreover, the enthusiasm of most programmers for their hard work is incredible.

4) Fourth, know the unknown factors.

5) Fifth, get along well with team members: Software development is the result of team members' coordinated efforts.

6) Six, good beginning, good end, towards the ultimate goal: always towards the ultimate goal is a very important ability.
One of the things you're looking for when interviewing someone for work is the work he actually participates in on the product the group has already delivered.

7) Seven, learning the emerging technology: Excellent developers are people who are eager to learn.

Written by Under Code
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Hack Like expert
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ HOW TO LOAD IFRAMES IN YOUR MODULES ?


> If you have used one or more modules you must have seen the iframes used for realtime result display. In this tutorial I'm going to show you how to insert them into your module and how they function.

> We need and a bit of php code in order to get started and a screen file that spits out the content.

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) The start of your index.php file in your module should look like this:

<?php
if(!defined('IN_SCRIPT')){
exit;
}
// iframe that shows attack
$_CONTEXT['screen'] = array();
$_CONTEXT['screen']['src'] = $_PATHS['module_default_root_http']."/screen.php";
$_CONTEXT['screen']['w'] = 800;
$_CONTEXT['screen']['h'] = 200;
$_CONTEXT['screen']['name'] = "screen";
?>

2) You can however place the context variable anywhere in your code as long as you put it before your html form.

> In case you don't understand what the context variable is about, here's some explanation:

a) src: source of the iframe

b)w: width of the iframe

c)h: height of the iframe

e) name: name of the iframe

πŸ¦‘ The start of the module with all code would look like this:

<?php
if(!defined('IN_SCRIPT')){
exit;
}
// iframe that shows attack
$_CONTEXT['screen'] = array();
$_CONTEXT['screen']['src'] = $_PATHS['module_default_root_http']."/screen.php";
$_CONTEXT['screen']['w'] = 800;
$_CONTEXT['screen']['h'] = 200;
$_CONTEXT['screen']['name'] = "screen";
$sCode = (isset($sCode) ? $sCode : "");
$sCode .= " <div class=\"moddesc\"><img src=\"./".$_CONTEXT['module_current']."/".$_CONTEXT['module_current'].".png\" width=\"90\" align=\"left\" /><h2>".$_CONTEXT['modules'][$_CONTEXT['module_current']]['name']."</h2>".$_CONTEXT['modules'][$_CONTEXT['module_current']]['description']."</div>\n";
$sCode .= "<form method=\"post\" action=\"".$_CONTEXT['screen']['src']."\" target=\"".$_CONTEXT['screen']['name']."\">\n";
?>

> You can copy the code above for any module you want to create that requires usage of iframes.

Written by Under Code
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Create Your First HackSuite Tutorial by UnderCode :
T.me/UndeCodeTesting

1) In this small tutorial we are going to create a new app for the hacksuite. We're not going to do anything fancy here, we will make a simple app to get familiar how to write compatible scripts for the suite.

2) We are going to create a tool that allows you to get the profile page of a facebook image name..
See this example :

πŸ¦‘The bold part is the profile id we want, there's a 1001 ways to isolate it but I'll do it the lazy way:

<?php
$sInput = "http://sphotos-a.ak.fbcdn.net/hphotos-ak-prn1/396991_258579564204685_1706121139_n.jpg";
$aInput = @explode("_",$sInput);
if(false==($iInput = @count($aInput))){
die("Invalid facebook image");
}
if(!isset($aInput[$iInput-1]) || $aInput[$iInput-1]!="n.jpg" || !is_numeric($aInput[$iInput-3])){
die("Invalid facebook image, wrong structure");
}
echo"http://www.facebook.com/profile.php?id=".$aInput[$iInput-3];
?>

πŸ¦‘ This will produce the facebook profile url of where the image originally comes from.

> Of course this is not very useful unless the user can input any url through a form:

<?php
if(!isset($_POST['submit'])){
echo"<form method=\"post\">";
echo"<input type=\"text\" name=\"sUrl\"> <input type=\"submit\" name=\"submit\">";
echo"</form>";
}
else{
$aInput = @explode("_",$_POST['sUrl']);
if(false==($iInput = @count($aInput))){
die("Invalid facebook image");
}
if(!isset($aInput[$iInput-1]) || $aInput[$iInput-1]!="n.jpg" || !is_numeric($aInput[$iInput-3])){
die("Invalid facebook image, wrong structure");
}
echo"http://www.facebook.com/profile.php?id=".$aInput[$iInput-3];
}
?>

πŸ¦‘ To get started with creating your application click on development and then create new app:

1) name of app: give the app unique names like 'AppName', you can't use

2) names that have this pattern (thc_xx)

3) location: relative location from the hacksuite root folder, eg

4) MyAppFolder/Start, you can't use locations that have this pattern (thc_xx)

5) version: typically applications in the hacksuite start at 0.0.1, you can however use any version

6) When you submit the form, a new form will appear

7) Replace the line echo world with the code above(of course without the php open and close tag), submit the form and you created your first - not so fancy - hacksuite application. You would still need to put some styling and other html but this is just a POC.

Written by Under Code
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How Identify System Fingerprint Information undercode tutorial
pinterest.com/UnderCodeOfficial

πŸ¦‘LETS START:

1) Use the -O option of the Nmap command to enable the operating system testing function. The execution command is as follows:

> root@kali:~# nmap -O 192.168.41.136

2) Starting Nmap 6.40 ( http://nmap.org )
Nmap scan report for www.example site... (192.168.xx.xxx)
Host is up (0.00045s latency).
Not shown: 996 closed ports
PORT STATE SERVICE
22/tcp open ssh
53/tcp open domain
80/tcp open http
111/tcp open rpcbind

> MAC Address: 00:0C:29:31:02:17 (VMware) //MACεœ°ε€
Device type: general purpose
Running: Linux 2.6.X|3.X
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3

OS details: Linux..version xx
Network Distance: 1 hop

2) OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 2.18 seconds

3) The output information shows the fingerprint information of the host 192.168.xx.xxx, including the port opened by the target host, the MAC address, the operating system type, and the kernel version.

πŸ¦‘ Fingerprint recognition tool p0f :

> p0f is a 100% passive fingerprint recognition tool. The tool analyzes the data packets sent by the target host to identify the operating system on the host, even if a good-performance firewall is installed on the system. The main identifying information of p0f is as follows:

> Operating system type;
port;

1) Whether it is running behind a firewall;

2) Whether to run in NAT mode;

3) Whether to run in load balancing mode;

4) Remote system has been started;

5) DSL and ISP information for remote systems.

6) Use p0f to analyze a file captured by Wireshark. The execution command is as follows:

> check picture
πŸ¦‘ output is a result of p0f analyzing the targethost.pcap package. This information displays detailed information about the client and server, including the operating system type, address, Ethernet mode, running server and port number, etc
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Draw a network structure diagram :

> The CaseFile tool is used to draw a network structure diagram. Use this tool to quickly add and connect, and to build a network structure diagram flexibly in the form of a graphical interface. This section will introduce the use of Maltego CaseFile.

1) Before using the CaseFile tool, you need to modify the Java and Javac versions used by the system. Because the CaseFile tool is developed in Java, and the tool must run on Java

2) However, in Kali Linux, JDK6 and JDK7 are installed, and CaseFile uses JDK6 by default. After running the CaseFile tool, the menu bar cannot be displayed in the graphical interface. Therefore, you need to change the JDK version

3) Use the update-alternatives command to modify the java command version. The execution command is as follows:

> update-alternatives -- - config java

4) From the output information, you can see that it has been modified to the JDK7 version, and it is in manual mode. Or use the java command to view the current version information. The execution command is as follows:

> root@kali:~# java -version
java version "xy..

5) OpenJDK Runtime Environment (IcedTea 2.3.10) (7u25-2.3.10-1~deb7u1)
OpenJDK Server VM (build 23.7-b01, mixed mode)

6) From the above results, it can be determined that the java command version of the current system

7) Use the update-alternatives command to modify the javac command version. The execution command is as follows:

update-alternatives -- - config javac

8) Use CaseFile to draw a network structure diagram. The specific operation steps are shown below.

> Start CaseFile. Select "Applications" | Kali Linux | "Information Collection" | "Intelligence Analysis" | casefile command in sequence

>them maltego appear on your screan

9) Select Open a blank graph and let me play around, then click Finish button

> this will appear >
πŸ¦‘ You can see that there is no information from this interface, because no device is selected by default.
T.me/UnderCodeTesting

1) This tool is the same as the Maltego tool, you need to drag each entity from the component Palette into the chart. In this example, select the domain entity and change the domain attributes

2) A comment can be added to the domain in this interface. Point the mouse to the domain entity, and then double-click the comment icon to display

3) ou can see the added comment information on this interface, and this information can be modified. Mouse over the position of the annotation information to modify it. You can also drag other entities on this interface. Here, drag the domain name of another entity to record DNS information from the target host

4) The two entities can be connected on this interface. Just drag a line from one entity to another

5) After connecting two entities You can modify the thickness, format, and color of the line.

πŸ¦‘Organization Network

1) From this interface, you can see an organization network structure diagram. At this point, the user can save the diagram, and if needed, can open and edit the diagram later.

> Clicking the New button on this interface will create a new Graph, which will be named New Graph (2)

WRITTEN BY UNDERCODE