UNDERCODE COMMUNITY
2.66K subscribers
1.23K photos
31 videos
2.65K files
79K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TOP HACKING SOURCES :

#Rogue BTS & CDMA/GSM Traffic Impersonation and Interception

- How to create an Evil LTE Twin/LTE Rogue BTS
How to setup a 4G/LTE Evil Twin Base Station using srsLTE and a USRP SDR device.

- How To Build Your Own Rogue GSM BTS For Fun and Profit
"In this blog post IÒ€ℒm going to explain how to create a portable GSM BTS which can be used either to create a private ( and vendor free! ) GSM network or for GSM active tapping/interception/hijacking Ò€¦ yes, with some (relatively) cheap electronic equipment you can basically build something very similar to what the governments are using from years to perform GSM interception."

- Practical attacks against GSM networks: Impersonation
"Impersonating a cellular base station with SDR: With the flexibility, relative low cost of Software Defined Radio (SDR) and abundance of open source projects that emulate a cell tower, successfully impersonating a GSM Base Station (BTS) is not a difficult task these days."

- Building a Portable GSM BTS Using BladeRF/PI
"I was always amazed when I read articles published by some hackers related to GSM technology. However, playing with GSM technologies was not cheap until the arrival of Software Defined Radios (SDRs), besides not being something easy to be implemented."

- rtl.sdr.com Tutorial-Analyzing GSM with-Airprobe and Wireshark "The RTL-SDR software defined radio can be used to analyze cellular phone GSM signals, using Linux based tools GR-GSM (or Airprobe) and Wireshark. This tutorial shows how to set up these tools for use with the RTL-SDR."

- Traffic Interception for Penetration Testing Engagements "Within the penetration testing domain quite often we have to deal with different technologies and devices. ItÒ€ℒs important to cover all aspects of connectivity of a device being tested which is why we have built a GSM/GPRS interception capability. There are a number of different devices and systems that make use of GSM/GPRS, non-exhaustively we commonly see:"



#git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Memory #Analysis Tools topic 2020 :

[Evolve](https://github.com/JamesHabben/evolve) - Web interface for the Volatility Memory Forensics Framework

inVtero.net - Advanced memory analysis for Windows x64 with nested hypervisor support

[KnTList](http://www.gmgsystemsinc.com/knttools/) - Computer memory analysis tools

LiME - LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices

[Memoryze](https://www.fireeye.com/services/freeware/memoryze.html) - Memoryze by Mandiant is a free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images, and on live systems, can include the paging file in its analysis

Memoryze for Mac - Memoryze for Mac is Memoryze but then for Macs. A lower number of features, however

[Rekall](http://www.rekall-forensic.com/) - Open source tool (and library) for the extraction of digital artifacts from volatile memory (RAM) samples

Responder PRO - Responder PRO is the industry standard physical memory and automated malware analysis solution

[Volatility](https://github.com/volatilityfoundation/volatility) - An advanced memory forensics framework

VolatilityBot - VolatilityBot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation

[VolDiff](https://github.com/aim4r/VolDiff) - Malware Memory Footprint Analysis based on Volatility

WindowsSCOPE - another memory forensics and reverse engineering tool used for analyzing volatile memory. It is basically used for reverse engineering of malwares. It provides the capability of analyzing the Windows kernel, drivers, DLLs, virtual and physical memory


> git resources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Evil BTS's,Hack 2G/3G/4G :


OpenBTS software is a Linux application that uses a software-defined radio to present a standard 3GPP air interface to user devices, while simultaneously presenting those devices as SIP endpoints to the Internet

YateBTS is a software implementation of a GSM/GPRS radio access network based on Yate and is compatible with both 2.5G and 4G core networks comprised in our YateUCN unified core network server. Resiliency, customization and technology independence are the main attributes of YateBTS

BladRF and YateBTS Configuration

srsLTE is a free and open-source LTE software suite developed by SRS (www.softwareradiosystems.com)


> git resources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
Forwarded from Backup Legal Mega
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘CCTV HACKING TERMUX-LINUX :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½

Mode
Of Execution:

1) apt-get install python3

2) apt-get install git

3) git clone https://github.com/AngelSecurityTeam/Cam-Hackers

4) pip3 install requests

5) cd Cam-Hackers

6) python3 cam-hackers.py

βœ…@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking



▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE SECURITY
πŸ¦‘ Those tutorials related to cellular hacking (focus on data-3g-4g ) & jamming :)
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

#Exploit Development References

πŸ¦‘Tutorials and Examples :

* [Shellcode Tutorial](http://www.vividmachines.com/shellcode/shellcode.html)

* [Shellcode Examples](http://shell-storm.org/shellcode/)

* [Exploit Writing Tutorials](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/)

* [Exploit Exercises](https://exploit-exercises.com/)

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁