UNDERCODE COMMUNITY
2.69K subscribers
1.24K photos
31 videos
2.65K files
81K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
Forwarded from Backup Legal Mega
Forwarded from Backup Legal Mega
πŸ¦‘When a new or reset pair of Airpods initially belongs to an iCloud account with an Apple device, Secure Simple Pairing (SSP) is used. All subsequent Airpods and devices connected to the iCloud account will use the Magicpair protocol as a pairing mechanism. MagicPair contains multiple keys and derived functions. It relies on the Advanced Encryption Standard (AES) in Integrated Initialization Vector (SIV) mode for authentication and encryption.

> The general logic of Magic Pairing is that it can be integrated into any IoT-based ecosystem, thereby increasing the relevance to the entire security community.

> Although MagicPairing protocol overcomes two shortcomings of Bluetooth device pairing : poor scalability and easy to collapse security model defects . (If the permanent key Link Layer or Long-Term Key is trapped, it will crash.)

> However, the researchers used code called ToothPicker to perform wireless fuzzing and in-process fuzzing and found 8 MagicPairing and 2 L2CAP vulnerabilities, which can cause crashes, CPU overload, and paired device associations. According to foreign media reports, the information was disclosed between October 30, 2019 and March 13, 2020, and has not yet been determined
Forwarded from Backup Legal Mega
Forwarded from Backup Legal Mega
πŸ¦‘"Because MagicPair is used before pairing and encryption, it provides a huge zero-click wireless attack surface. We found that all different implementations have different problems, including lock-in attacks and denial of service that can cause 100% CPU load. These issues were discovered during the general wireless test and the in-process fuzzing test on iOS. "

@iUndercode
▁ β–‚ β–„ iο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
> full report written by iUndercode
Apple's Bluetooth protection framework MagicPairing was revealed 10 0day vulnerabilities were not fixed
Forwarded from Backup Legal Mega
πŸ¦‘ Send screanshoats @Undercode_bot
Forwarded from Backup Legal Mega
βœ…verified NordVpn Prem :

pastebin.com/hytRvt6S
Forwarded from Backup Legal Mega
πŸ¦‘ Send screanshoats @Undercode_bot
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘americanexpress.com
Username: belfrank
Password: 122399fbm
Email: belfrank@msn.com
Email Pass
#######NBILLING##############
Name: BELINDA MUNIZ
Address: 444 BRIGHTON ST
City : ROANOKE,
State : TX,
Zipcode : 76262-
###################
cc| 371307162121008
Cid
Exp 02/19
Phone: 702129-2366
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to solve the failure to call dllregisterserver on Win10 64-bit?
instagram.com/undercodeTesting


1) Press the win + x key on the keyboard to call up commonly used commands.


2) We want to select "Command Prompt (Admin)".

3) Then enter "regsvr32 c: \ Windows \ SysWOW64 \ comdlg32.ocx" in the "Command Prompt"

4) After entering, press Enter to confirm. After a while, he will be prompted to succeed. This means that we have successfully registered.

written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘yesterday we post 40 hacking 2020 tools, as extra one will present this :
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
t.mE/UndercodeTesting

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/UnaPibaGeek/ctfr.git

2) cd ctfr

3) pip3 install -r requirements.txt

4) python3 ctfr.py --help

-d --domain [target_domain] (required)
-o --output [output_file] (optional)

5)Examples:

$ python3 ctfr.py -d starbucks.com
$ python3 ctfr.py -d facebook.com -o /home/shei/subdomains_fb.txt

βœ… VERIFIED BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘commun error 80% pc- win10 ltsc screenshot does not respond to how to solve? win10 ltsc screenshot does not respond to tutorial
fb.com/UndercodeTesting

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

The processing method is as follows:

1) The image save location is wrong

Press [Win + R] to call out and run, enter regedit and click OK to open the registry;

2) Expand in sequence: HKEY_CURRENT-USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ User Shell Folders

3) Double-click "My Pictures" on the right and change "Value Data" to:% USERPROFILE% \ Pictures, click OK to save

πŸ¦‘Case 2: caused by third-party software

1) Press the [Win + R] key combination to call out to run, enter: msconfig and click OK to open [System Configuration];

2) Click the "Services" tab, check "Hide all Microsoft system services", and then disable the third-party services one by one.

πŸ¦‘Case 3: The system file is damaged

1) Press [Win + R] to call out and run, enter cmd and click OK to open the command prompt;

2) In the command prompt box, type: sfc / scannow Press the Enter key to automatically detect and repair damaged files in the system.

> FIXEDβœ…

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is the difference between VMware workstation and VMware player ?
pinterest.com/Undercode_Testing

πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹ :

A ) VMware Workstation software features

> VMware supports running multiple operating systems on one guest

>No installation or complicated settings, you can experience the functions and features of the preset products

> VMware virtual machine supports data sharing between host and virtual machine

> VMware virtual machine supports 32-bit and 64-bit virtual machine systems

> Support third-party preset virtual machine and image files

> Easy access to virtual machine devices through an intuitive homepage interface

B) VMWARE PLAYER :

-The free VMWare Player is only more than 90 MB in size, which is undoubtedly more suitable for personal users than the VMware Workstation that requires more than 700 MB and requires payment.

-The main interface is refreshing and simple, almost all the functions do not need to be set manually

-Very complete support for floppy drives, optical drives, Bluetooth and USB devices, users are as simple and convenient as operating real systems in virtual systems

-Compared with windows7 XP Mode, Player not only has no requirements for system version, but also has no hard requirements for hardware, basically it can be used by PC

-The virtual system perfectly supports Aero (frosted glass special effects), supports DirectX 9 3D acceleration, and can basically play many games smoothly

-Now supports virtual machine creation, the usability is greatly enhanced than previous VMware Player

-Support both 32-bit 64-bit host and virtual

-Virtual machines now support IPv6 networks

BY
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Solutions to webpage certificate errors BY UNDERCODE :
youtube.com/undercode

πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹ :

Step 1: Clear temporary files in IE browser and change IE cache settings

> First open the IE browser, select the "Tools" menu, select "Internet Options" in the pop-up menu, complete "Delete Cookies" and "Delete Files (must check: delete all offline content)", and then click "Settings", Find "Used Disk Space" in the pop-up window, adjust it to about 10M or less, click OK, and finally click "Clear History" to clear the record, and change the "Number of days the webpage remains in history" to 2 Or smaller.


Step 2: Adjust the security level of Internet Explorer

> In the IE browser tool menu, select "Internet Options", select the "Security" tab, in turn set all four Internet levels to the "default level", and finally click OK to exit.

Step 3: Restore IE browser to default browser

> Find the "Programs" tab in "Internet Options", tick "Check if Internet Explorer is the default browser", and click OK to exit.

Step 4: Use 360 ​​Security Guard or other anti-virus software to repair the system and IE

> Use the "Clean Plug-in" and "System Repair" functions in 360 Security Guard to remove malicious plug-in programs present in the system and repair IE functions.

BY
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM