UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ The hazards of XSS :


1) Break through domain restrictions

2) Modify HTML code

3) XSS worm attack

4) Command execution

5) Get client information

6) Combining CSRF attacks

7) Obtain system management background permissions

8) Steal account

9) DDOS attack

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘DIFFERENT XSS TYPES :

1) Reflective XSS


> <Reflective XSS>, also known as < non-persistent XSS >, is characterized by entering malicious code directly in the URL

> This XSS attack has poor concealment, and ordinary browsers can recognize and intercept it

> Beautiful cherry blossoms

πŸ¦‘Storage XSS


< Storage XSS > is also known as < persistent XSS >. This attack is characterized by malicious code stored in a database or server

> Generally, the XSS of the storage type is relatively concealed, and the browser generally does not detect and intercept it, so the harm is also the biggest.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Mining XSS vulnerabilities :

> When digging, XSS input test should be carried out wherever things can be input

> Generally common such as message module

> If it is a reflective XSS , you must pay attention to the parameters in the URL
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


If it is a storage type XSS , you should pay attention to the text box and any other places where you can fill in the content
πŸ¦‘Simple demonstration of storage XSS

1) We assume that there is such a website where people leave a message, the system will store the message on the server

2) We still use OWASP to demonstrate


3) There is a message system here, let's leave a comment


4) We tested it and found that we can completely keep our message in the system
πŸ¦‘ full xss tutorial
t.me/undercodeTesting
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘news: Cisco opens API to third parties to extend intent-based networks :
fb.com/undercodeTesting

1) Cisco announced the launch of an API that allows third-party developers to program their campuses and wide area networks (WANs) to improve the integration of third-party devices and IT processes.

2) Sachin Gupta, senior vice president of Cisco Enterprise Networks, said that end-to-end visibility in the network is critical for network managers. "Using these APIs, network administrators can manage controllers and switches from HPE, Aruba or Huawei, which makes the inclusion of third-party devices flexible and simple." This is also an extension of Cisco's intent-based network strategy launched a year ago .

3) Gupta added that Cisco's API opens the network to developers so that they can write custom applications without understanding the network.

4) Cisco's goal is to make the network more programmable. The concept of IBN is that network administrators can convert their business intent through automatic activation strategies instead of manually converting the intent into a large number of lines of code.

5) The API will allow network operators to manage third-party devices through the DNA center, which will effectively act as a centralized network controller. From Cisco's point of view, this is important because even if network operators introduce equipment from Cisco partners or even competitors, Cisco can retain customer relationships. In addition, this move will also promote the relationship between network operations and IT business operations teams.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ A good tool for reading source code-tips for using Replace in Path in Intellij IDEA full
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Match case : If this button is checked, upper and lower case letters will be distinguished when searching.

2) Preserve case: If this button is checked, the search is not case sensitive, but when replacing, the first letter of the string you give will be replaced with lower case.

For example, if you type HelloWorld, it will be replaced with helloWorld.

3) Regex : You can use regular expression search, refer to java.util.regex.

4) There are several options for the blue funnel in the upper right corner:


5) File mask: You can filter the file format to be found. You can use wildcards:


Multiple files can be specified at the same time, separated by commas. note:! , That is, the negative mode, implicitly uses * matching.

6) Search field: This is the one we use the most, namely-the search box, which can be entered manually, or you can click the drop-down box to find the history. Regular expressions can also be used.

7) Replace field: Replace the field, you can specify the replacement text, you can also use the expression to replace the text, if you want to use \ in the expression, you need to insert three extra backslashes in front of the escape.

8) In Project: Search within your own project scope.

9) Module: Search in the module, you can specify the module, and you can switch the module in the drop-down box.

10) Directory: Search in the specified directory. The small file tree icon on the right seems to be useless ...

11)Scope: search within the specified range. There are various ranges in the drop-down box.

12) Preview area: Of course, the most powerful one is still the preview window. You can use the arrow keys to preview up and down, and you can edit in the preview box.

13) The most dangerous is the following operation:

πŸ¦‘When you refactor it, if it doesn't work well, replace it all. . . . . That would be embarrassing.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ FRESH PREMIUM PROXIES :
t.me/undercodeTesting

1m 36s ago 117.6.112.47 55443 Elite Vietnam 2/1 118ms
1m 37s ago 115.213.228.132 3000 Elite China 1/0 55ms
1m 39s ago 167.99.166.194 8081 Elite United States 2/1 55ms
1m 41s ago 138.68.53.44 8118 Elite United States 2/0 482ms
1m 43s ago 108.74.113.180 80 Elite United States 3/0 50ms
1m 43s ago 75.80.242.9 41007 Elite United States 2/1 191ms
1m 47s ago 209.80.12.183 80 Elite United States 2/0 930ms
1m 48s ago 172.254.124.231 3128 Elite United States 2/0 54ms
1m 55s ago 165.227.182.151 8888 Elite United States 1/0 41ms
1m 57s ago 72.182.145.208 80 Elite United States 5/3 339ms
2m 5s ago 46.253.185.128 8118 Elite Switzerland 1/0 114ms
2m 7s ago 193.59.27.71 36748 Elite Poland 2/0 495ms
2m 8s ago 213.6.146.66 33746 Elite Palestine 1/0 565ms
2m 9s ago 193.95.228.13 53281 Elite Slovenia 2/0 113ms
2m 9s ago 41.170.12.92 37444 Elite South Africa 1/0 62ms
2m 10s ago 166.98.140.50 8080 Elite United States 640/168 266ms
2m 10s ago 66.42.65.149 8118 Elite United States 2/0 43ms
2m 11s ago 41.79.66.106 58369 Elite Nigeria 1/0 479ms
2m 12s ago 208.67.183.240 80 Elite United States 3/0 850ms
2m 12s ago 62.250.97.199 80 Elite Netherlands 1/0 484ms
2m 13s ago 191.98.198.42 56633 Elite Panama 1/0 325ms
2m 13s ago 207.144.111.230 8080 Elite United States 3/0 298ms
2m 13s ago 94.73.239.124 55443 Elite Russia 1/0 103ms
2m 14s ago 213.16.81.189 54040 Elite Hungary 2/0

@UndercodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ WORKING LASTEST NORDVPN :


gaming_yeti@hotmail.com:sasquatch10
brianleong96@gmail.com:19961025b
nguyen.richard@hotmail.com:manchester7
the_griff_2003@hotmail.com:cCk2ghd86
grim-eyes@live.com:bmf1mbm00
Mannyd0719@gmail.com:Math8000
rjy2281@gmail.com:fisher222
keaton2800@hotmail.co.uk:Rachel2800
enriquewilliams20@yahoo.com:Imadome123
lexandjason@gmail.com:slater69
joninwm@yahoo.com:hooters2
idahogeology@yahoo.com:Richard1
danjshapiro@yahoo.com:Adin1023
drasia10@yahoo.com:dthvPA123
randysesariojr@gmail.com:ninja3221
k_leepearce@hotmail.com:nokiae71
jooga02@gmail.com:copperbird4
jwylie22@hotmail.com:dookie22
fulhamhamster09@googlemail.com:hamster123
quentinde3i1103@gmail.com:Quentinde3
rplim.b@gmail.com:Q1yfe5G5
jaspertchang@gmail.com:Casperc811
bethsharae@gmail.com:bsc10785
ply_1234@yahoo.com:Royalty9
nstonetile@aol.com:m5a9r8c0
ygagne@gmail.com:gu1doune
cynthg2834@gmail.com:orangeblue
smacchesney@gmail.com:ruffryders

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
e n j o y
This media is not supported in your browser
VIEW IN TELEGRAM