UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.9K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WHAT IS BASHTOP ?
Bashtop should work with most modern Linux distributions with a terminal that supports truecolor.

Because it's written in Bash, installing Bashtop is as easy as downloading the bashtop script from its project page (or from the release archive) and installing it somewhere in your PATH. However, it has several dependencies that you need to make sure they are installed on your system (besides additional dependencies, in most cases others should already be installed):

F E A T U R E S :

1) Bash (it needs version 4.4 or newer, so it won't work, for example, on Ubuntu 16.04 or CentOS 7)

2) Basic GNU utilities

3) GNU Grep

4) ps from procps-ng (version 3.1.15 or newer, usually a

5) package named procps that you already installed)

6) sed

7) awk

8) Optional:
lm-sensors to display the CPU temperature (the package is usually named lm-sensors or lm_sensors; you need to run sensors-detect as root after installation to detect your computer's sensors)

9) curl to display messages about Bashtop updates and the ability to download additional themes (the curl package is available on most, if not all Linux distributions)

10) Easy to use, with a game inspired menu system.

11) Fast and "mostly" responsive UI with UP, DOWN keys process selection.

12) Function for showing detailed stats for selected process.

13) Ability to filter processes.

14) Easy switching between sorting options.

15) Send SIGTERM, SIGKILL, SIGINT to selected process.

17) UI menu for changing all config file options.

18) Auto scaling graph for network usage.

19) Shows message in menu if new version is available

20) Shows current read and write speeds for disks

21) Multiple data collection methods which can be switched if running on Linux

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) download or clone
https://github.com/aristocratos/bashtop

2) If you haven't got python3 installed:

> brew install python3

3) python3 -m pip install psutil

4) cd bashtop

5) sudo make install

More info & usage https://github.com/aristocratos/bashtop

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to set up automatic kernel updates on Linux :

Manual kernel updates require a system reboot. This leads to downtime, which can be problematic, so reboots are usually scheduled at regular intervals. Since manual patching is performed during these cycles, this gives hackers a "time window" in which they can attack the server infrastructure.

1) Canonical Livepatch is a service that fixes a running kernel without rebooting your Ubuntu system. Livepatch is free to use on three Ubuntu systems. To use this service on more than three computers, you need to subscribe to the Ubuntu Advantage program.

2) Before installing the service, you need to get a livepatch token from the Livepatch service website.

3) After installing the token and enabling the service by running the following two commands:

〰️sudo snap install canonical-livepatch

〰️sudo canonical-livepatch enable <your-key>

4) To check the status of the service, run:

〰️sudo canonical-livepatch status --verbose

5) Later, if you want to unregister the machine, use this command:

〰️sudo canonical-livepatch disable <your-key>

6) The same instructions apply for Ubuntu

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Signs of being hacked :

1) battery charge. If the battery of the smartphone begins to discharge rapidly, reducing the operating time of the device by several hours during normal use, then most likely this indicates the operation of malicious background applications;

2) The appearance in the general list of application icons of new ones that you have not installed may indicate that the device has been hacked;

3) notifications. Displaying strange messages on the screen with unreadable characters, links or notifications about the execution of a request, if you have not had a hand in this, does not bode well either - for sure hackers already have your data;

4) balance. If your mobile account suffers losses, although you are convinced that you did not call paid numbers, did not order additional services and were not involved in any financial transactions, then we can say with certainty that your gadget has been hacked;

5) malfunctions. Strange signals during a conversation, extraneous noises or even disconnections with a good signal level can also indicate the use of the device's microphone or even listening to conversations;

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
Violent Python and Exploit Development.pdf
409.4 KB
A. Read and write simple Python scripts.

B. Perform network attacks, including port scanning, port knocking, and brute-forcing logins.

C. Compile Python scripts to Windows executables.

D. Bypass antivirus products with Python.

E. Find buffer overflow vulnerabilities with fuzzing.

F. Create remote code execution exploits for Linux and Windows targets.

G. Understand and defeat Windows defenses, including ASLR and DEP.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is ping monitoring ?

1) Without getting into complex ping monitoring, it refers to the way our devices access the Internet.

2) Basically, when you want to go online, your device (computer, tablet, phone, etc.), known as a client, communicates with another device for information.

3) To make a request for information, your device sends a request (known as a packet) to the server that stores the information. To access a packet, the server needs to know who is requesting it so they can send it back.

4) Packages can be sent in a variety of ways, some of which are faster than others. The one most people are familiar with is HTTP .

5) This way, the server processes your packets and sends them back using the ping command , which tests the connection between the client and the server.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 new update SIPVicious suite is a set of security tools that can be used to audit SIP based VoIP systems.:

1) svmap
this is a sip scanner. When launched against
ranges of ip address space, it will identify any SIP

2) servers
which it finds on the way. Also has the option to scan
hosts on ranges of ports.

3) svwar
identifies working extension lines on a PBX. A working extension is one that can be registered.
Also tells you if the extension line requires authentication or not.

4) svcrack
a password cracker making use of digest authentication.
It is able to crack passwords on both registrar servers and proxy servers. Current cracking modes are either numeric ranges or words from dictionary files.

5) svreport
able to manage sessions created by the rest of the tools and export to pdf, xml, csv and plain text.

6) svcrash
responds to svwar and svcrack SIP messages with a message that causes old versions to crash.
For usage help make use of -h or --help switch.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/enablesecurity/sipvicious.git

2) cd sipvicious/
Setup the tool.

3) python setup.py install

4) Fire-up the scripts one by one.

sipvicious_svmap --help
sipvicious_svcrack --help
sipvicious_svcrash --help
sipvicious_svwar --help
sipvicious_svreport --help

5) Installing via pip:
Simply using pip install sipvicious should do.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A quick way to get the row count of all tables in a database is to query the data from the information_schema database directly:
#FastTips

// SELECT
table_name,
table_rows
FROM
information_schema.tables
WHERE
table_schema = 'classicmodels'
ORDER BY table_name; ////


1) This method is sometimes inaccurate because the number of rows in information_schema and the actual number of rows in the tables are out of sync. To avoid this, you must execute the ANALYZE TABLE statement before querying the row count from the information_schema database.

2) ANALYZE TABLE table_name, ...;

#FastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
ALL COURSES YOU.pdf
344.4 KB
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘MySQL Security - Generate a random password :

MySQL has the ability to generate random passwords for user accounts, as an alternative to requiring explicit administrator-supplied literal passwords.

The database administrator can use CREATE USER, ALTER USER, or SET PASSWORD to generate random passwords for user accounts.

> Let's take a quick look at using MySQL 8.0

MySQL SQL> SELECT VERSION ();
+ ----------- +
| VERSION () |
+ ----------- +
| 8.0.19 |
+ ----------- +


1) Create user account
To create a new MySQL user account with a random password, use the CREATE USER statement with the IDENTIFIED BY RANDOM PASSWORD clause:

MySQL SQL>
CREATE USER aUser @ localhost IDENTIFIED BY RANDOM PASSWORD;
+ ---------- + ----------- + ---------------------- +
| user | host | generated password |
+ ---------- + ----------- + ---------------------- +
| Stella | localhost | M3BA1Po% as1Kse8Jt! AC |
+ ---------- + ----------- + ---------------------- +


2) Change user account
To assign a new random password for the MySQL user account, use the ALTER USER statement with the IDENTIFIED BY RANDOM PASSWORD clause:

MySQL SQL>
ALTER USER aUser @ localhost IDENTIFIED BY RANDOM PASSWORD;
+ ---------- + ----------- + ---------------------- +
| user | host | generated password |
+ ---------- + ----------- + ---------------------- +
| AndreyEx | localhost | SjAA * @ (LA & fd43IOj> vS |
+ ---------- + ----------- + ---------------------- +


3) Assign a password
Another way to assign a new random password to the MySQL user account is to use the SET PASSWORD statement with the TO RANDOM clause:

MySQL SQL>

4) SET PASSWORD FOR aUser @ localhost TO RANDOM;
+ ---------- + ----------- + ---------------------- +
| user | host | generated password |
+ ---------- + ----------- + ---------------------- +
| Stella | localhost | 7kaJY ^% x1 <b8kT & 84Du, |
+ ---------- + ----------- + ---------------------- +

5) Please note that by default the generated random passwords are 20 characters long.
This length is controlled by the generate_random_password_length system variable, which has a range of 5 to 255.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
How To Shot Web.pdf
9.9 MB
Find the road less traveled
^ means find the application (or parts of an application) less tested.

1. *.acme.com scope is your friend

2. Find domains via Google (and others!) a. Can be automated well via recon-ng and other tools.

3. Port scan for obscure web servers or services (on all domains)

4. Find acquisitions and the bounty acquisition rules a. Google has a 6 month rule

5. Functionality changes or re-designs

6. Mobile websites

7. New mobile app versions
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ALL WAYS REBOOT LINUX- ubuntu
Since restarting the server is a functionally critical task, it can only be performed by users with administrator rights. In other words, you need to be superuser or use sudo to run commands to restart or shutdown the system.



1) Use the reboot command
If you want to restart your Ubuntu server immediately, you can use this command:

> sudo reboot now


If you don't use "now" in the above command, it will reboot the system after one minute.

If for some reason your Ubuntu server won't restart, you can try restarting it with the -f option.

> sudo reboot -f


2) Use the shutdown command
There are other ways as well. Our preferred way is to use the shutdown command on Linux. With the -r option, the shutdown command will reboot the system rather than just shutting down.

> sudo shutdown -r now


You can specify a timestamp instead. 0 means immediate shutdown / reboot. You can also use the -h option to stop. With this option, the system will first kill all processes and then shutdown the CPU.

> sudo shutdown -r -h +0


3) Use the systemd command
Ubuntu uses systemd, so you can also use the systemd command to reboot your server:

> sudo systemctl reboot


@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HASH CRACKING FREE ONLINE :
Best popular websites -list 2

md5cracker.org.

md5decrypt.org.

crackstation.net.

hashkiller.co.uk.

crackstation.net

hashkiller.co.uk

reverse-hash-lookup.online-domain-tools.com

md5decrypt.net

onlinehashcrack.com

cmd5.org

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Postfix vs. Sendmail :
#fastTips

Postfix and Sendmail are in the same category of Mail Transfer Agents. When selecting the MTA (Mail Transfer Agent) for your system, to choose the best option that meets your needs, you must consider a few important features, such as performance, security, documentation, and feasibility. The following points are given, based on which you can explore some technical aspects of MTAs:

1) More than one configuration file

2) Minimal syntax

3) Which type of scripting language is used

4) Check code stability

5) Source code contribution

6) Set of minimum features

Postfix vs. Sendmail – Comparison


Postfix and Sendmail are both MTAs, but the Postfix mail server is security-oriented, whereas Sendmail is a standard mail transfer agent for Unix systems. Based on the following features, we can easily compare some major differences.

#FastTips
unixforum
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to control your Mac with an iPhone :

1) Download Gateway on Mac
First you need to install Gateway on your computer.

> You can download the application from the Momentous Studio website https://www.momentous.studio/gateway or via the link below.

> The app is not available in the Mac App Store. It only works on macOS 10.13 High Sierra or newer.

Gateway Desktop for Mac https://gateway-software-update-bucket.s3.eu-west-1.amazonaws.com/Gateway.dmg

2) Install Gateway Desktop for Mac
Double click on the DMG file, which should be in the Downloads folder. The installation of the application will begin. When the disk image opens in a new window, add the Gateway Desktop to the Applications folder by dragging and dropping the icon there.

3) In the Applications folder, double-click the Gateway Desktop. Since this is a third-party program, you need to click on launch confirmation. Click "Open". You may need to change your gatekeeper settings if there is no Open button.

4) Give Gateway Desktop full disk access
When you start Gateway Desktop for the first time, some information is given. On the last page, you need to give a few permissions. The app asks for full disk access, which it needs to communicate and control your Mac with the iPhone. You can click the arrow button to open Settings> Security & Privacy.

5) If you click Next instead, you will be able to manually configure the settings. Before that, click on the Gateway Desktop icon in the Mac menu, then click on (β€’β€’β€’) and "Exit". Now there will be no request to do this later.

6) Open the system settings, go to the "Security and privacy" section. From the Privacy tab in the left pane, select Full Disk Access. If the settings are locked, click on the lock at the bottom left, enter your password and click "Unlock".

If you do not see Gateway in the list of applications, click on the plus sign (+), find and select Gateway Desktop, click Open and make sure the checkbox is checked.

7) Give Gateway Desktop Accessibility
Before closing the settings, you need to give access to accessibility features. This allows the app to control your Mac from your iPhone. Select accessibility in the left pane, select Gateway from the list. If the app is not here, click on the (+) button, select Gateway Desktop, and click Open. Click on the lock at the bottom left to prevent further changes and exit the settings.

8) Reboot Gateway Desktop
You will need to log out and back in the Gateway Desktop application to apply the changes.

9) Select a password for remote access (optional)
When the Gateway Desktop application is running, click on the icon in the menu, select (β€’β€’β€’) and go to settings. The "Security" tab should be open, where you need to enter the password and exit the settings. This step is optional, but provides an additional layer of security.

10) Installing Gateway on iPhone
On Mac, the installation is almost complete, now you need to install the program on your iPhone. The app is available in the iOS App Store. Requires iOS 13.2 or later. You can install the application on iPhone, iPad, iPod touch.

11) Find your Mac in Gateway Control
Open Gateway on iPhone, then wait for Mac to appear there. If you don't see it, make sure your computer and smartphone are on the same Wi-Fi network and then try again. When the device is found, the default Mac name and IP address will appear in the list. Click on it, enter your password and click "Connect". If you have not set a password, you can connect without it.

12) .Use the Gateway to remotely control your Mac
When you access your Mac via the iPhone app, you will see the System Control remote. Various functions can be performed here. When you select one of these, you need to grant more Gateway Desktop rights before you can use these features. Here's what you can do:

Sleep mode . The computer will be put to sleep without locking the screen.

Reboot .

Screen lock . To unlock, you will need to enter a password.

Shutdown .

Muting the sound .

Volume control .
13) Adding additional controls.
Only the simplest possibilities are described above. If you're willing to pay a little, you can click on the icon to access the Gateway Store. Here, with a one-time purchase, you can expand the possibilities of remote control. Some of the features are free, such as Apple Music Control, Podcasts, Screenshot, VLC and Force Quit.

14) Once you've added these features, you'll see them on the home screen of the System Control app on your Mac. You can click on the Blocks icon at the top to view them in a short list. There you can change the order of the commands. After that click "Finish" and close the settings.

15) Give Gateway Desktop additional permissions
We will not describe how each control or Block works. It must be said that some of them require additional permissions on the Mac computer. In particular, system events for automation, which controls interface elements by simulating keyboard and mouse actions.

The first time you encounter these applications, you will be prompted for access on your Mac. You need to click OK. Access permission can be seen under System Preferences> Security & Privacy> Privacy> Automation. Once you've given permission once, it should work for future Blocks too.

15) Momentous Studios does not store your data and requests. The developers say this information is stored locally on user devices.

Gateway's only drawback is that the iPhone and Mac must be on the same wireless network. If you want to get remote access away from home, this is not yet possible with the Gateway. Hopefully, SSH (Secure Shell) will appear in the future for access from an application on an iPhone. Until then, you can use Chrome Remote Desktop, which turns your iPhone into a mouse and trackpad for your Mac if it's running the client.

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁