UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Customize Termux Font & Colors:

β’Ύβ“ƒβ“ˆβ“‰β’Άβ“β“β’Ύβ“ˆβ’Άβ“‰β’Ύβ“„β“ƒ & β“‡β“Šβ“ƒ :

1) apt update
2) apt install git -y
3) git clone https://github.com/htr-tech/tstyle
4) cd tstyle
5) bash setup.sh

> in on command install :

apt update && apt install git -y && git clone https://github.com/htr-tech/tstyle && cd tstyle && bash setup.sh && tstyle

6) then choose options via numbers

πŸ¦‘Features :

Latest Fonts & Themes
Full Offline !
Easy to Use !
βœ…
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Wi-Fi hacking methods in 2020 :

What you need to hack Wi-Fi ?


1) You need a sufficient number of wireless networks. If you live on the edge of the village and you have within your reach one Wi-Fi network that you can see, then it is invisible that there are not many chances.

The more networks in the area, the better.

2) There are no special hardware requirements, and for some attacks even Wi-Fi adapters that do not support monitor mode are suitable. Nevertheless, I highly recommend adapters with an external antenna, and if the antenna is removable, it is better to buy another larger one. IMHO, half the "skills" of a Wi-Fi cracker in a large antenna ...
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Fast brute force password L:

1)Unfortunately, there are not many access points with WPS enabled. Nevertheless, we will return to them. Now we will consider the classic version of capturing a handshake and breaking a password. Its speed is as follows:

2)automatic handshake capture for all Access Points within reach
two types of brute force with Hashcat are launched: according to the dictionary and the mask in eight digits. Experience shows that quite a few APs lend themselves to. This method also has a good ratio of time to result

3)example we put the wireless interface in monitor mode.

4) Run the command to collect handshakes:


<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo besside-ng INTERFACE -W</font></font>

All handshakes will be saved to the wpa.cap file .


5) If you are going to hack them all, you can all at once convert to hashcat format using cap2hccapx :

https://kali.tools/?p=658#cap2hccapx

> <font style="vertical-align: inherit;"><font style="vertical-align: inherit;">cap2hccapx wpa.cap output.hccapx</font></font>

πŸ¦‘If you only need the hash of a specific Access Point, then use the network name (ESSID) as a filter. For example, I’m only interested in the Wi-Fi handshake of the netis56 network and I want to save it to the netis56.hccapx file :

<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">cap2hccapx wpa.cap netis56.hccapx netis56</font></font>
If you want to split the wpa.cap file into separate handshakes,

6) use the script from the article β€œ How to extract handshakes from a capture file with several handshakes ”, and then also convert them with cap2hccapx .

> For a dictionary attack, I use the rockyou dictionary , a cleaned version can be downloaded from this link > https://github.com/Mi-Al/WiFi-autopwner/raw/master/dict/rockyou_cleaned.txt

πŸ¦‘Example of a successful dictionary hack (hacking time 9 seconds):
Another example of a successful dictionary hack (hacking time 13 seconds):
πŸ¦‘My command to run:



<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">hashcat --force --hwmon-temp-abort = 100 -m 2500 -D 1,2 -a 0 'HASH.hccapx' /PUT/DO/rockyou_cleaned.txt</font></font>


πŸ¦‘Mandatory options in this command:

'HASH.hccapx' - your hccapx file with one or more hashes
/ WAY / DO/rockyou_cleaned.txt - path to the dictionary
-m 2500 - the type of hash to be cracked
Optional options:

-a 0 - type of attack: dictionary attack. You can skip, because the default
-D 1.2 - means using both the central processor and the video card to crack the password. If you do not specify, most likely only the video card will be selected
--force - means to ignore warnings. Without this option, the central processor for cracking passwords is not used. Be careful with this option.
--hwmon-temp-abort = 100 - this is the maximum temperature at which brute force will be forcibly interrupted. I have such a climate that in the daytime the room is always more than + 30 ℃, in addition, I run brute-force on the laptop (I do not recommend doing this on the laptop !!!), so in my conditions the default barrier of + 90 ℃ is reached quickly and busting stops. With this option set to a temperature above the default 90, you can actually burn your comp / video card / laptop. Use only at your own peril and risk - I WARNED YOU !!! Although in practice, my temperature reaches 94-96 and then the video card resets frequencies - apparently, it also has its own limit.

πŸ¦‘To launch a mask attack:


hashcat --force --hwmon-temp-abort=100 -m 2500 -D 1,2 -a 3 'Π₯Π•Π¨.hccapx' ?d?d?d?d?d?d?d?d

> From the new in this command:

? d? d? d? d? d? d? d? d - a mask, it means eight digits, it takes about 20 minutes on my hardware to add a larger number of digits to the mask, add ? d .
-a 3 - means mask attack.

> In addition to passwords of 8 digits, passwords of 9-11 digits are also common (the latter are most often telephone numbers, so you can specify a mask as 89? D? D? D? D? D? D? D? D? D ), but each an additional digit increases the search time by 10 times.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Full wifi hacking @UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Best bin checkers sites :

https://iinbinlist.com/

https://www.creditcardrush.com/bin-checker/

https://www.freebinchecker.com/

https://www.bankbinlist.com/

https://www.exactbins.com/


πŸ¦‘Best Netflix checker sites 2020 :
t.me/undercodeTesting

1) https://pjsins.com/best-netflix-checker-by-xrisky-v2-2020/

2) https://ouo.io/YAdby5
> download

3) https://cracked.to/Thread-NetFlix-Checker-by-xRisky

4) https://checkz.net/tools/tag/netflix-checker-online


@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE HACKING
The Drebin Dataset.pdf
201.5 KB
Forwarded from UNDERCODE HACKING
The Hacker Playbook Updates.pdf
150.9 KB
Forwarded from UNDERCODE HACKING
The Lazy Hacker.pdf
650.4 KB
Forwarded from UNDERCODE HACKING
The OSINT Toolkit.pdf
497.3 KB
Forwarded from UNDERCODE HACKING
πŸ¦‘Hacking and carding new tips-pdfs
bind shell generator code.py
8.9 KB
2020-leaked shellcode -uploaded to exploit site..