UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘RocketMQ transaction message :
#fastTips

RocketMQ began to support distributed transaction messages in version 4.3, using the idea of ​​2PC to implement the commit transaction message, and at the same time adding a compensation logic to handle the two-stage timeout or failure message,

1
.1 Send and submit

(1) Send a message (half message, that is, sent but not consumed);

(2) The server responds to the message writing result;

(3) Execute local transactions according to the sent results. If the write fails, the half message is not visible to the business at this time, and the local logic is not executed;

(4) Execute Commit or Rollback according to the local transaction status (Commit operation generates a message index, and the message is visible to consumers)

1.1 Compensation process

(1) For transaction messages without Commit/Rollback (messages in the pending state), initiate a "back check" from the server;

(2) Producer receives the check-back message and checks the status of the local transaction corresponding to the check-back message;

(3) Re Commit or Rollback according to the local transaction status;

Among them, the compensation phase is used to resolve the timeout or failure of the message Commit or Rollback.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is SSH and what port does it use?

1)
SSH or Secure Shell is most familiar to Linux users, but ssh has many features that users can use.

2)SSH is designed to create a secure tunnel between devices, be they systems, switches, thermostats, toasters, etc.

3)SSH also has the unique ability to tunnel other programs through it, similar to the VPN concept, so even unsafe programs or programs that run on unsecured connections can be used in a secure state if configured correctly. SSH runs over TCP port 22.

#FastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to transfer landline calls :


1) When you're out of your incoming calls can be transferred to a landline phone on their mobile phone or other landline phone does not ensure bobble.
γ€€γ€€
2) Second, set the
γ€€γ€€
> application: * 57 * TN #; Cancel: # 57 #. (TN stands for the phone number or mobile phone you want to set) I have tested that both Telecom and Tietong landlines are suitable. Because there is no Netcom landline installed, I did not test it myself!
γ€€γ€€
3) Third, Tips
γ€€γ€€
This function can not be transferred to a long distance number
γ€€γ€€
four charges
γ€€γ€€
no monthly transfer once counted a fee; (cost of landline perform call transfer call transfer fee of numbers)

4) Fifth, for dial 10000 apply in person at the Telecommunications Business Office processing. Normal dial 10086 in the north (Netcom)

#FastTips
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘
What is FTP and what port does it use?


1) FTP or File Transfer Protocol is one of the oldest protocols and should probably be removed.

2) FTP is primarily intended for transferring large files, with the ability to resume downloads if they are interrupted.

3)The FTP server can be accessed in two different ways: anonymous access and standard login.

4)They are both basically the same, except that anonymous access does not require an active user login, while standard login does.

5)However, this is the big problem with FTP - user credentials are transmitted in clear text, which means that anyone listening over the wire can eavesdrop on the credentials extremely easily.

6)Two competing FTP implementations that solve this problem are SFTP (FTP over SSH) and FTPS (FTP over SSL). FTP uses TCP ports 20 and 21.

#FastTips
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ“‹ How to create your own service What Is My IP :
#FastTips

1) Python, Web Hosting and PHP
For this tutorial, we are going to use Python and assume we already have our own web hosting environment.

2) This is necessary as we need our own online server that will return our external IP address.

πŸ¦‘Python

1) The Python code you see below will get the page that was set as 'URL', and then it will filter out the H1 header and the end of the H1 header, just like between the header HTML, we will output the external IP address.
import requests
url = 'https://UndercodeNews.com/getip.php'
r = requests.get(url)
r.text
ip = r.text.split('<h1>')[1].split('</h1>')[0]
print(ip)

πŸ¦‘Web hosting
In your web hosting environment, you will need to host a PHP file containing some code, this code will return the page as shown in the picture below.

For example, in Apache, you would need to store content in the following directory:

/var/www/html/getip.php

#FastTips
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘no root Social Engineering Toolkit on Termux
#FastTips

1) pkg update && pkg upgrade -y

2) apt install curl -y

3) curl -LO https://raw.githubusercontent.com/Hax4us/setoolkit/master/setoolkit.sh

4) sh setoolkit.sh

5) After finishing the above process type the following command

6) cd setoolkit

7) ./setup.py install

8) ./setoolkit

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Everything you need to know about Google Stadia :
#FastTips


1) On June 12, Google fixed one of the main shortcomings of the Stadia service: it is now available on any Android device, whether it is on the official support list or not. In addition, all OnePlus models from OnePlus 5 will support Stadia.

2) To use Stadia on a device without official support, you need to download the Stadia app, open the β€œExperiments” tab, click β€œPlay”. The service should work without problems.

3) Last year Google announced the Stream project. This was a limited test built around Assassin's Creed Odyssey. After a short period of testing in January, the project ended and Google said nothing about its future plans to stream games. Stadia was announced at GDC 2019.

4) The idea of ​​streaming is far from new. However, Google's service may turn out to be one of the most ambitious.

Google Stadia is a game streaming service to any user's device. It can be a TV, smartphone, laptop, tablet. In any case, you will be able to access the most advanced games.

How is this possible? Google servers process the image of the games and broadcast it. The user only needs a device with a screen. This gives everyone access to high quality games with high system requirements. Including those who cannot afford to buy an expensive gaming computer or console.

πŸ¦‘Supported platforms
The cloud service works with a Chromecast Ultra device when connected to a TV. Chrome browser is supported on computers, laptops and tablets, including Chrome OS. Among smartphones, Google Pixel 2, Pixel 3, Pixel 3a and Pixel 4 are supported.

In February, support for the following smartphones appeared:

Samsung Galaxy S8

Samsung Galaxy S8 Plus

Samsung Galaxy S8 Active

Samsung Galaxy Note 8

Samsung Galaxy S9

Samsung Galaxy S9 Plus
..../.......

5) in June it was announced that all Android smartphones will be able to work with Stadia. Even those that are not included in the above list. You can install the Stadia application on them, open the "Experiments" tab and click "Play".

6) Since this is a cloud service, all the heavy processing is done by other people's computers remotely. You can work with a smartphone, tablet or even a weak computer, the quality will be equally high. Users of the service will receive the computing power of a custom AMD 2.7 GHz x86 processor, 16 GB of RAM, data transfer rates up to 484 GB / s and a GPU with a capacity of 10.7 teraflops.

This makes Google's platform more powerful than any game console on the market. In addition, Google will be responsible for updates and users will not have to do anything.

Of course, the quality of the games will depend on your internet connection. Playing on Chromecast Ultra, you can get 4K support with HDR and 5.1 surround sound if you have a TV, sound system, and fast enough internet to support it all.

πŸ¦‘Can I try Stadia for free?

Yes. Google has announced a two-month free trial for Stadia Pro. Any owner of supported devices can play several games on the service for free. They can buy additional games to play and stream. After the trial period ends, you can renew your Stadia Pro subscription for $ 9.99 per month. You can unsubscribe at any time before the end of the trial period.

Your not allowed to copy our tutorials
!@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘Hack wifi with gerix on linux :
#FastTips

1) download or clone https://github.com/kimocoder/gerix-wifi-cracker/archive/master.zip

2) apt-get install qt4-dev-tools

3) Running Gerix Wireless 802.11 Hacking Tool

$ python gerix.py

4) it gui interface appears now click at scan and attack


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Network security
#FastTips
is essentially the information security on the network. In a broad sense, all relevant technologies and theories related to the confidentiality, integrity, availability, authenticity and controllability of information on the network are the field of network security research. Ensuring the information security of the network system is the goal of network security. Information security includes two aspects: the security of information storage and the security of information transmission. Information storage security refers to the security of information in a static storage state, such as whether it will be used without authorization, etc. The transmission security of information refers to the safety of information in the dynamic transmission process. In order to ensure the security of network information transmission, there are the following issues:

γ€€γ€€(1) The monitoring of information on the network
γ€€γ€€(2) The impersonation of the user's identity
γ€€γ€€(3) The tampering of information on the network
γ€€γ€€(4) The denial of the information sent
γ€€γ€€(5) The retransmission of the information

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Mod your own apk
#fastTips


source code: https://github.com/kaleemullah360/android-APK-Mods

1) Load APK
java -jar apktool.jar if application-name.apk

2) Decode APK
java -jar apktool.jar decode application-name.apk

3) Recompile APK
java -jar apktool.jar b application-name.apk

4) Add signature using APK Signer
java -jar apk-signer-1.8.5.jar certificate.pem key.pk8 application-name.apk

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁