UNDERCODE COMMUNITY
2.71K subscribers
1.24K photos
31 videos
2.65K files
82.9K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
6) For AMD64 Arch, Install Android Studio dependencies:
# apt-get install lib32z1 lib32ncurses6 lib32stdc++6


7) Run Android Studio:
# cd /opt/android-studio/bin
# ./studio.sh

8) Go to SDK Manager (Configure -> SDK Manager) and Download:
Android SDK Build-tools, Android SDK-tools, Android SDK platform-tools, Support Repository

9)Run script:
# git clone https://github.com/thelinuxchoice/whatshack
# cd whatshack/
# bash whatshack.sh

10) On First Time, Choose "n" when asks to build, then open the project on Android Studio:
cd /opt/android-studio/bin
./studio.sh

11) Import Gradle Project:
Choose whatshack app folder: whatshack/app/
▁▂ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁

πŸ¦‘HACK WHATSAPP-ANDROID USERS :
> Script to generate Android App to get all WhatsApp media (images, audios, videos)
> Issue take while to done

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) Install dependencies:
# apt-get update
# apt-get install openjdk-8-jdk
# apt-get install gradle

2) Use Java8:
Get Java8 dir with command:
# update-alternatives --list java

3) Copy and replace dir on command:
# update-alternatives --set java /usr/lib/jvm/java-8-openjdk-amd64/jre/bin/java

4) Download Android Studio:
https://developer.android.com/studio

5) Installing Android Studio:
# unzip ~/Downloads/android. zip -d /opt

6) For AMD64 Arch, Install Android Studio dependencies:
# apt-get install lib32z1 lib32ncurses6 lib32stdc++6


7) Run Android Studio:
# cd /opt/android-studio/bin
# ./studio.sh

8) Go to SDK Manager (Configure -> SDK Manager) and Download:
Android SDK Build-tools, Android SDK-tools, Android SDK platform-tools, Support Repository

9)Run script:
# git clone https://github.com/thelinuxchoice/whatshack
# cd whatshack/
# bash whatshack.sh

10) On First Time, Choose "n" when asks to build, then open the project on Android Studio:
cd /opt/android-studio/bin
./studio.sh

11) Import Gradle Project:
Choose whatshack app folder: whatshack/app/

12) Wait all dependencies downloading, if you got errors, click on showed links to solve.
Try build from Android Studio: Build > build APK's
Click on showed links if you got errors.
Close Android after building successfully.

13) open with any Text Editor the file app/build.gradle
remove "google()"

14) change gradle version from: 3.4.1 to: 2.2.0
save and exit.

15) Run script (as root):
# bash whatshack.sh

βœ…Verified Use for learn only !!

@UndercodeTesting
▁▂ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁
▁▂ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁

πŸ¦‘Payload in pdf 2020
>Inject Macro and DDE code into Excel and Word documents (reverse shell)


πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/thelinuxchoice/eviloffice

2) cd eviloffice

3) python -m pip install -r requirements.txt

4) python eviloffice.py

πŸ¦‘FEATURES :

1) Inject malicious Macro on formats: docm, dotm, xlsm, xltm

2) Inject malicious DDE code on formats: doc, docx, dot, xls, xlsx, xlt, xltx

3) Python2/Python3 Compatible
Tested: Win10 (MS Office 14.0)

βœ…Verified by Undercode
@UndercodeTesting
▁▂ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁
πŸ¦‘ Necessity of multicast technology introduced :

1)γ€€γ€€with the development of broadband multimedia networks, various broadband network applications are endless. Broadband applications such as IP TV, video conferencing, data and data distribution, network audio applications, network video applications, and multimedia distance education all pose challenges to the carrying capacity of existing broadband multimedia networks.

2) The traditional network built with unicast technology can no longer meet the requirements of emerging broadband network applications in terms of bandwidth and network service quality, and the problems of network delay, data loss and so on are followed. At this time, the introduction of IP multicast technology helps to solve the above problems. In a multicast network, even if the number of multicast users grows exponentially

3) there is no need to increase the network bandwidth in the backbone network. To put it simply, hundreds of thousands of multicast application users and a multicast application user consume the same bandwidth of the backbone network, thereby maximizing the bandwidth and network service quality requirements of current broadband applications.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁

πŸ¦‘ the multicast technology-Networking tutorial by undercode :


1) IP Multicast technology system architecture

> multicast protocol into the host - group membership protocol between the router and the router - Multicast routing protocol between routers. Group membership protocols include IGMP (Internet Group Management Protocol). Multicast routing protocols are divided into intra-domain multicast routing protocols and inter-domain multicast routing protocols. Intra-domain multicast routing protocols include PIM-SM, PIM-DM, DVMRP and other protocols, and inter-domain multicast routing protocols include MBGP, MSDP and other protocols. In order to effectively suppress the spread of multicast data at the link layer, Layer 2 multicast protocols such as IGMP Snooping and CGMP are introduced.

2) IGMP establishes and maintains the group membership information of the direct network segment of the router. The intra-domain multicast routing protocol uses certain multicast routing algorithms to construct a multicast distribution tree and forward multicast data packets based on the membership information of these multicast groups maintained by IGMP. The inter-domain multicast routing protocol distributes multicast-capable routing information and multicast source information among autonomous domains, so that multicast data can be forwarded between domains.

3) multicast IP address
multicast IP address for identifying an IP multicast group. IANA allocates Class D address space to IP multicast, which ranges from 224.0.0.0 to 239.255.255.255. As shown in the following figure (binary representation), the first four digits of the IP multicast address are 1110.
Octet (1) Octet (2) Octet (3) Octet (4)
1110XXXX XXXXXXXX XXXXXXXX XXXXXXXX

4) Group Membership Protocol (IGMP) The
IGMP protocol runs between the host and the multicast router directly connected to the host. Through this protocol, the host tells the local router that it wants to join and accept information about a particular multicast group. At the same time, the router passes this The protocol periodically queries whether the members of a known group in the local area network are active (that is, whether the network segment still has members belonging to a multicast group), so as to collect and maintain the membership of the connected network group.

5) There are three versions of IGMP, IGMPv1 is defined by RFC1112, and the current common one is IGMPv2, defined by RFC2236. IGMPv3 is still a draft. IGMPv1 defines the basic group member query and reporting process. IGMPv2 adds a mechanism for group members to leave quickly. The main function added in IGMPv3 is that members can specify whether to receive or not to receive certain multicast source packets . Here focuses on the functions of the IGMPv2 protocol.

6)IGMPv2 elects the only querier for the connected network segment through the querier election mechanism. The querier periodically sends a general group query message to query the membership relationship; the host sends a report message to answer the query. When joining a multicast group, the host does not need to wait for the query message, and actively sends a report message. When leaving the multicast group, the host sends a leave group message; after receiving the leave group message, the querier sends a specific group query message to determine whether all group members have left.

> Through the above-mentioned IGMP mechanism, a table is established in the multicast router, which contains each port of the router and which group members are on the subnet corresponding to the port. When the router receives the data packets of a certain group G, it only forwards the data packets to the ports of the members that have G. The routing protocol determines how data packets are forwarded between routers, and IGMP is not responsible.

written by @Undercoder
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁


πŸ¦‘Networking
> Network Layer multicast-related protocols include IGMP Snooping, IGMP Proxy protocol and CGMP.


1) The implementation mechanism of IGMP Snooping is that the switch forms a correspondence between the group members and the switch interface by listening to the IGMP member report message sent by the host to the router; the switch forwards the received multicast packets to the group according to the correspondence Member interface.

2) IGMP Proxy and IGMP Snooping have the same function but different mechanisms: IGMP snooping only obtains relevant information by listening to IGMP messages, and IGMP Proxy intercepts the end user ’s IGMP request and performs related processing before forwarding it to the upper layer router.

3) CGMP (Cisco Group Management Protocol) is a private protocol developed by Cisco based on the client / server model. With the support of CGMP, the multicast router can notify the switch which hosts join and leave the multicast group according to the received IGMP data packets. The switch uses the forwarding table constructed from this information to determine which interface to forward the multicast packet to. GMRP is a standard protocol from the host to the Ethernet switch. It enables multicast users to register multicast members on the layer 2 switch.

@Undercodeposts
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Termux-linux
> Automater is a URL/Domain, IP Address, and Md5 Hash OSINT tool aimed at making the analysis process easier for intrusion Analysts. Given a target (URL, IP, or HASH) or a file full of targets Automater will return relevant results from sources like the following: IPvoid.com, Robtex.com, Fortiguard.com, unshorten.me, Urlvoid.com, Labs.alienvault.com, ThreatExpert, VxVault, and VirusTotal.

πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹ :

1) git clone https://github.com/1aN0rmus/TekDefense-Automater.git

2) python Automater.py -h

3) ./Automater.py -h

usage: Automater.py -h -o OUTPUT -w WEB -c CSV -d DELAY -s SOURCE

--p

target

4) To run Automater against a target ip, hash, url, or file simply type

Python Automater.py <target>

βœ…Verified by Undercode

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁

πŸ¦‘Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform va…
fb.com/UndercodeTesting

πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹ :

1)git clone https://github.com/Screetsec/Dracnmap.git
2)cd Dracnmap
3)chmod +x Dracnmap.sh
4)sudo ./Dracnmap.sh or sudo su ./Dracnmap.sh

> for termux
> require nmap + root

βœ…Verified as good tool

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘A DEFINITION OF FTP SECURITY-

File Transfer Protocol (FTP) is a standard network protocol used to transfer files between computers over the Internet. FTP is built on client-server architecture and was developed by Abhay Bhushan in 1971. The protocol is still commonly used today, but FTP security is a major concern that can limit its usage when not addressed.

> FTP was not built to be secure. It is generally considered to be an insecure protocol because it relies on clear-text usernames and passwords for authentication and does not use encryption. Data sent via FTP is vulnerable to sniffing, spoofing, and brute force attacks, among other basic attack methods.

-wiki
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST FTP SERVERS 2020 :

https://filezilla-project.org/download.php?type=server

https://www.solarwinds.com/free-tools/free-sftp-server?CMP=BIZ-RVW-ADP-SFTPFT-sftp-LM-Q419

https://www.solarwinds.com/ftp-server-software?CMP=BIZ-RVW-ADP-servu-ftp-LM-Q419

https://www.cerberusftp.com/

https://titanftp.com/

βœ…
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Playing Modem under Linux
γ€€
> Modem can be described as one of the most difficult devices under Linux. It is the source of many disappointments and joys when we use Linux.
instagram.com/UndercodeTesting

1) port Modem type

γ€€γ€€computer interface that has many internal and external world, part of the interface is proprietary, such as the keyboard interface can connect a keyboard and not connected to any other device, not even a mouse.

γ€€γ€€
2) The multi-purpose interface for connecting external devices is called "Port". Most PCs have two serial ports and one parallel port. The serial port uses one line to transmit data serially, one data bit at a time, and it is combined into bytes after reception. The parallel port uses eight lines to transmit 8 data bits in parallel at a time. Most home printers are connected to the parallel port of the PC.

γ€€γ€€
3) Modem is a device that transmits digital information through a telephone line. We know that the telephone system was originally designed only to transmit voice information. Modem technology has broken through this limitation. It can modulate (modulate) digital information and convert the digital information into analog signals that can be sent over the telephone line. At the receiving end, the analog signal is converted back to a digital signal (ie, demodulated). The word Modem is derived from the abbreviation of modulator-demodulator.

γ€€γ€€
4) Modem was invented in the era of serial port widely used. Modems at that time were all independent devices outside the computer, connected to the serial port through cables. Today we can still see this external modem, but more is the modem card inserted into the motherboard, that is, the built-in modem. Since most computers have two serial ports, the built-in Modem usually adds a third port.

γ€€γ€€
5) The setting of the external modem is generally quite simple. Just connect the cable between the serial port and the modem, connect the telephone line, and turn on the power. Most external modems can start working directly.

γ€€γ€€
6) When the built-in Modem first appeared, it always had all the circuit elements needed for communication on the board, and provided jumpers to set the address and IRQ. Hardware manufacturers are always looking for ways to reduce costs. With the PC function getting better and better, Modem manufacturers began to replace some circuit components with software. These Modems are called soft Modems or Winmodems. Soft Modem is inexpensive, and it uses device drivers to complete some of the tasks that had to be done by the circuit elements of the Modem card.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Random Tips- by Undercode
>The problem with soft modems


1) is that its drivers are written for Windows and not for Linux. Although there is no particular reason why the Linux version of this driver cannot be written, but ultimately it depends on the modem manufacturer. So far no manufacturer has done this. This means that the soft modem cannot work under Linux.

γ€€γ€€
2) When buying a Modem, you should pay attention to whether it indicates Linux compatibility. The list of soft modems can be found at http://www.o2.net/~gromitkc/winmodem.html. According to experience, if the Modem box is marked with "HCF", "HSP", "Winmodem" or "soft modem", then it may not be available for Linux. γ€€γ€€Most accessories of the

bus, interrupt, address and PnP

3) PC are inserted directly into the motherboard together with the CPU and memory. The motherboard provides many expansion card interfaces for the access of devices such as display cards and modems. There are also many motherboards that integrate these functions directly, so there is no need to add these expansion cards. Many Modems integrated into the motherboard can work smoothly under Linux.

γ€€γ€€
4) The interface on the motherboard is connected to the system bus. There are many types of buses. Older PCs use the ISA bus and newer PCs use the PCI bus. There are other bus types, but usually only these two buses are involved. The physical and electrical characteristics of these buses are incompatible, and ISA cards must never be inserted into PCI slots, so be sure to understand the available buses before purchasing a modem. Unless your machine is very old, generally it will support PCI.

γ€€γ€€
5) Before the computer establishes contact with the newly inserted card, the computer must know the card's I / O address (input / output address) and interrupt request line.

γ€€γ€€
6) When the computer wants to communicate with a card inserted into the system bus, it selects the card by sending an I / O address. Each card only answers its own address. All cards must have different addresses.

γ€€γ€€
7) Interrupt is a bit more complicated. When we enter a URL address in the browser, a connection to the target website is established, and the modem begins to receive data; at the same time, the computer can also do other things, such as monitoring the mouse status, printout, and so on. The computer should not focus exclusively on one thing alone. There should be a way for the modem to tell the computer: "Excuse me, there is data sent to you here. This method is interruption.

γ€€γ€€
8) Each interrupt has a unique number, called IRQ. IRQ is the abbreviation of Interrupt ReQuest. There are a lot of interrupts, and you must figure out what device each interrupt is assigned to. For example, if the interrupt comes from the modem, you should not check the mouse.

γ€€γ€€
9) Early expansion cards provided jumpers for users to set their I / O address and IRQ. This method is easy to make mistakes, for example, it is easy to set two cards to the same address or IRQ. To solve this problem, software and hardware manufacturers have jointly established a standard that allows computers to actively query each expansion card and assign I / O addresses and IRQs. It not only automates the allocation of addresses and IRQs, but also avoids possible conflicts. This standard is "Plug and Play", or Plug and Play, or PnP for short.

γ€€γ€€
10) The first software that runs when the computer starts is the BIOS (Basic Input Output System). The BIOS wakes up all the devices of the computer, simply checks which devices are installed on the computer, and then loads the operating system. Many configuration tasks of PnP devices are done by the BIOS, but there are also some tasks to be done by the operating system. Linux has not yet provided complete PnP support. Although many PnP devices can be configured to work under Linux, there are many that cannot.
11) If Linux does not initialize a PnP device, don't despair about it immediately, there is a possible solution. Please check the isapnp tool documentation, Modem-HOWTO can also help. If the list of compatible devices includes this type of Modem, whether it is PnP or not, it is likely to work smoothly without any additional effort.

12) There are three most common problems with installing a modem: conflicting I / O address or IRQ settings, using a soft modem, and imperfect PnP support causing modem configuration errors.

@UndercodetESTING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘γ€€If you use KDE, kppp is an excellent tool to help you configure and manage your Internet connection. Most Linux distributions provide kppp. Note that before establishing a dial-up connection, you must collect the necessary information, such as user name, password, phone number, and DNS server address. The following is the specific configuration process.

πŸ¦‘Step 1: Specify the Modem installed in the system to

γ€€γ€€start kppp. If you cannot find it on the KDE menu, try the / usr / bin / kppp command.

γ€€γ€€The first thing to do is to let kppp know where the modem is. Click the Setup button and select "Device" in the configuration window.

γ€€γ€€Click the arrow next to "Modem Device:", a list of available modem ports appears, and select the port to which the modem is connected. Next, set the "Connection Speed:" to 115200, of course, if the machine supports this speed can be set higher.

πŸ¦‘Step 2: Test Modem

γ€€γ€€To test the Modem, first select the "Modem" page. Click the "Query Modem" button, and a window will appear showing the progress of the query Modem. Make sure that "Modem Volumn" (volume) is set in the middle of the indicator bar, so that you can hear the sound when the modem is working.

γ€€γ€€If kppp cannot find the Modem, you can go back to step 1 and try another port (or speed).

γ€€γ€€Step 3: Set the account parameters

γ€€γ€€you can then set up the account parameters. Return to the "Accounts" page and select "New" to set up a new account.

γ€€γ€€Under the "Dial" page, take a name that makes it easy to remember the dialing target (recommended to use the name of the ISP) and enter it in the "Connection Name" box. Then enter the phone number of the ISP into the "Phone Number" box.

γ€€γ€€Now select the "IP" page and check the "Dynamic IP Address" check box (if your ISP provides a fixed IP address, do not check this option). On the DNS page, enter the IP address of the DNS server provided by the ISP.

γ€€γ€€Click OK to save the newly created account. Click OK again to close the "Configuration" window.

πŸ¦‘Step 4: Connect

γ€€γ€€Now we are back to the original kppp window. Enter the user name and password, and then click the "Connect" button.

γ€€γ€€If the computer can connect to the modem, it will start dialing to the set ISP. At this time, you can hear the sound of Modem dialing.

Testing the Modem with Minicom

@UndercodetESTING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁