UNDERCODE COMMUNITY
2.72K subscribers
1.24K photos
31 videos
2.65K files
83.1K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
2) Idea Two: Drawing on Internet Posts


I have searched for similar posts before, and the post said that the search string was "successful payment", so I converted the string into a unicode code, searched in AK, and then found three results:
3) Similarly, to verify whether this is the logic code to determine whether the payment is successful, set a breakpoint at the function head where each string is located, and there is no breakpoint at the position where the string is located because I will not dig out the wallet,

4) All operations are payment failure operations. The code logic of successful payment will definitely not come, so set a breakpoint in the function header, and then click to confirm that the payment has not been broken, but when I click the close button, it succeeds Is broken in the first function. This was an unexpected surprise. Then use jadx to view the logic of this function:
5) The logic of the code is very clear, check the value of the parameter resultCode, and then judge whether the payment is successful, so here is probably the key code logic I want. Verify that all switch structures are changed to case1 branch. The syntax of the Smali code is to put all the cases together, as follows
6) The above code means that the value in the switch is compared with 1. If the result is 0, it jumps to the pswitch_0 label, and if the result is 1, it jumps to the pswitch_1 execution, so here all the labels are changed to pwtich_0, and a line is added below , So that by default, it will also jump to pswtich_0, that is, the three types will jump to the successful branch regardless of the value of resultCode, as follows:
7) Finally, compile and repackage, install and test, success, OK. So far, the internal function of this app has been successfully cracked.



In fact, I didn't press the close button of the payment box at the beginning, so I took another way of thinking. If you have patience here, you can take a look at my detour, haha.
βœ…NordVpn Prem
Forwarded from Backup Legal Mega
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘OFFICIAL MICROSOFT WINDOWS 10 ALL VERSIONS LINK FROM MICROSOFT WILL REMOVED IN 24 NH IN 24 HOURS



1) https://software-download.microsoft.com/db/Win10_1909_EnglishInternational_x64.iso?t=bb0ee77b-65a3-4600-ac4e-4eec1e9da28f&e=1590661565&h=cefa3e04e5bc567c0cbb70d25776d5c9 x 64



2) https://software-download.microsoft.com/db/Win10_1909_EnglishInternational_x32.iso?t=bb0ee77b-65a3-4600-ac4e-4eec1e9da28f&e=1590661565&h=08b458da0c8f37ed06594d12d9d06403 x 32



▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘OFFICIAL MICROSOFT OFFICE PRO PLUS LINKs FROM MICROSOFT WILL REMOVED IN 24 NH IN 24 HOURs

> https://officecdn.microsoft.com/db/492350F6-3A01-4F97-B9C0-C7C6DDF67D60/media/en-US/ProPlus2019Retail.img X64

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST 2020 SITES FOR PAID SOFTWARES- CRACKED- AND SAFE - LIST 2 :
> nion torrents list

https://sharewareonsale.com/

https://topwaresale.com/product-category/software-giveaway/

https://www.techno360.in/category/free-stuff/

https://giveaway.download.hr/

πŸ¦‘FOR ANDROID LIST 2 > FOR MORE SEE CHATS @UndercodeTesting


https://apk4free.net/

https://www.apkmirror.com/

https://apkpure.com/

https://www.9apps.com/

https://www.revdl.com/

https://androidapksfree.com/

https://www.modapkdown.com/

http://apkreal.com/

http://allfreeapk.com/

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
DDOS FOR NOOBS- RECENTLY WE SEND DDOS TOOLS + INSTALL > ACTUALLY ALL POPULAR TOOLS ...

> NOW UNDERSTANDING HOW DDOS WORK !!
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is a DoS attack?

> DOS is an attack used to deny legitimate users access to a resource, such as accessing websites, networks, e-mail, etc., or make it extremely slow. DoS is D enial O F S initials ervice abbreviation. This type of attack is usually achieved by simultaneously clicking on a target resource with too many requests (such as a web server). This prevents the server from responding to all requests. This may cause the server to crash or slow down.

> Cutting off some businesses from the Internet may result in significant business or capital losses. The Internet and computer networks provide power for many companies. Organizations such as payment gateways and e-commerce websites rely entirely on the Internet for business.
πŸ¦‘ Dos type of attack

There are two types of Dos attacks namely;

1) DoS -This type of attack is performed by a single host

2) Distributed DoS -This type of attack is performed by many attacked computers, all targeting the same victim. It floods the network with data packets.
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How DoS attacks work

> Let's take a look at how DoS attacks are performed and the technologies used. We will study five common types of attacks.
youtube.com/Undercode

πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹:


1) The death

ping command is usually used to test the availability of network resources. It works by sending small data packets to network resources. Ping of death took advantage of this and sent packets exceeding the maximum limit allowed by TCP / IP (65,536 bytes). TCP / IP fragmentation divides the data packet into small chunks that are sent to the server. Since the data packets sent are larger than those that the server can handle, the server may freeze, restart, or crash.

2) Smurfs
such attacks use a large number of Internet Control Message Protocol (ICMP) ping traffic targets at Internet broadcast addresses. The reply IP address spoofed the IP address of the target victim. All replies are sent to the victim, not the IP used for ping. Since a single Internet broadcast address can support up to 255 hosts, a smurf attack will amplify a single ping 255 times. The effect of this is to reduce the speed of the network to such an extent that it is impossible to use it.

3) Buffer overflow The
buffer is a temporary storage location in RAM for saving data so that the CPU can manipulate it before writing it back to the disc. The buffer has a size limit. This type of attack loads more data into the buffer. This will cause the buffer to overflow and destroy the data it has. An example of buffer overflow is sending an email with a file name of 256 characters.

4) Teardrop
attacks of this type use larger packets. TCP / IP breaks them down into pieces assembled on the receiving host. Attackers manipulate data packets when they are sent so that they overlap each other. This may cause the target victim to crash when trying to reassemble the packet.

5) SYN attack
SYN is a short form of Synchronize. This type of attack uses a three-way handshake to establish communication using TCP. SYN attacks work by flooding victims with incomplete SYN messages. This causes the victim's computer to allocate memory resources that have never been used, and denies access to legitimate users.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
It was developed in Python for testing DOS attacks, but people also use it as hacking tool.
> Download GoldenEye: http://packetstormsecurity.com/files/120966/GoldenEye-HTTP-Denial-Of-Service-Tool.html


@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁