UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ email2phonenumber: get the target's phone number just by having their email address :
This tool helps automate the discovery of someone's phone number by exploiting the design flaws of password reset and public data.


Supports 3 main functions:

1) "Scrape" - scrape websites for phone numbers, initiating a password reset using the recipient's email address

2) Generate - Generates a list of valid phone numbers based on the publicly available country phone numbering plan information.

3) Bruteforce - Loops through a list of phone numbers and initiates a password reset on various websites to retrieve associated masked emails and match them to the victim's address

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/martinvigo/email2phonenumber.git

2) pip install BeautifulSoup requests

Scan sites for phone numbers

python email2phonenumber.py scrape -e target@email.co

3) Create a dictionary of valid phone numbers based on the phone number mask

4) python email2phonenumber.py generate -m 555XXX1234 -o /tmp/dic.txt

5) Find the target's phone number by resetting passwords on websites that do not alert the target using a phone number mask and proxy to avoid captchas and other anti-abuse remedies.

6) python email2phonenumber.py bruteforce -m 555XXX1234 -e target@email.com -p /tmp/proxies.txt -q

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘β˜οΈ How to keep the application running after closing Putty?


So, you have an application on a remote VPS server.

You connect to it via Putty and launch an application (for example) with a script.

After closing Putty, your application crashes.
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”

1) For
users who have the same problem, we will show the necessary steps on how to use screen:

First of all, install it:

sudo apt-get install screen

2) You can now start a new screen session by simply typing screen at the command line.

3) You will be shown some information about the screen.

4) Press Enter and you will see the usual prompt.

5) To disconnect (but leave the session enabled)

Hit Ctrl + A and then Ctrl + D in immediate succession. You will see the message [detached]
It's all!

6) After the [detached] message, your application will start after you close putty.
Some additional commands

7) To reconnect to an already running session

screen -r

To reconnect to an existing session or create a new one if it doesn't exist

screen -D -r

8) To create a new window within a screen session
Hit Ctrl + A and then C in immediate succession. You will see a new prompt.

9) To switch from one screen to another

Hit Ctrl + A and then Ctrl + A in immediate succession.

10) To list open windows:

Hit Ctrl + A and then W in immediate succession

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ§ How to view Linux system statistics with Saidar :

1) Saidar is available in the default repositories of popular Linux distributions.

To install Saidar on Debian, Ubuntu and derivatives, run:

$ sudo apt install saidar

2) Saidar is available in the EPEL repository for CentOS 7.

Enable the EPEL repository using the command:
$ sudo yum install epel-release

3) Then install Saidar on CentOS 7 using the command:

$ sudo yum install saidar

4) Fedora:

$ sudo dnf install saidar

5) OpenSUSE:

$ sudo zypper install saidar

6) Viewing Linux System Statistics with Saidar
To view the current system statistics with Saidar on Linux, simply run:

$ saidar


@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Full report about The default branch of newly created GitHub repository & "master" name
#Updates
_
Forwarded from UNDERCODE NEWS
Qbot Strikes again, Secures Position Among Top Malware Threats this month
#Malwares
_
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ•΅οΈ vulnerable-AD: create your own vulnerable active directory :

β€”-Vulnerable-ADβ€”-

1) Create a vulnerable active directory that allows you to test most AD attacks on a local bench.

F E A T U R E S :

Main characteristics
Randomized attacks
Full coverage of known attacks
You need to run the script on a DC with Active Directory installed
Some of the attacks require a client workstation
Supported attacks
Abusing ACLs / ACEs
Kerberoasting
AS-REP Roasting
Abuse DnsAdmins
Password in the AD User comment
Password spraying
DCSync
Silver Ticket
Golden Ticket
Pass-the-Hash
Pass-the-Ticket
SMB Signing Disabled

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

2) git clone https://github.com/WazeHell/vulnerable-AD.git

Example
#

3) if you have not installed Active Directory yet, you can try if you have already installed Active Directory, just run the script

4) Install-ADDSForest -CreateDnsDelegation:$false -DatabasePath "C:\Windows\NTDS" -DomainMode "7" -DomainName "cs.org" -DomainNetbiosName "cs" -ForestMode "7" -InstallDns:$true -LogPath "C:\Windows\NTDS" -NoRebootOnCompletion:$false -SysvolPath "C:\Windows\SYSVOL" -Force:$true

5) #
!
IEX((new-object net.webclient).downloadstring("https://raw.githubusercontent.com/wazehell/vulnerable-AD/master/vulnad.ps1"));
Invoke-VulnAD -UsersLimit 100 -DomainName "cs.org"


@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Support & Shareβ€οΈπŸ‘πŸ» :

T.me/UndercodeTesting
Forwarded from UNDERCODE NEWS
Education Sector: A Lucrative Target for Cyberattackers
#CyberAttacks
_
Forwarded from UNDERCODE NEWS
IQIYI's agents in Taiwan: stop customer service from October 15th
#international
_
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FOR LINUX GPS TRACKING SOFTWARE :

Viking – GPS data editor and analyzer
Viking aims to be an easy to use, yet powerful in accomplishing, a wide variety of GPS related tasks. It uses a hierarchical layering system to organize GPS data, maps, and other layer types with spatial data, such as coordinate lines.

😲F E A T U R E S :

Uploading and downloading waypoints, tracks to/from GPS.
Realtime GPS tracking and track recording.
Preparing tracks and waypoints for trips using maps from
services such as Googlemaps, Terrasever. You only need to
upload the data to your GPS before you leave. The maps together with your tracks and waypoints can also be printed and used during the trip.
After trips, tracks and waypoints from GPS can be downloaded, stored, managed and reused in later trips.
Analyzing OHV and hiking trips, understanding where you went and how far you were from something.
Making waypoints and tracks to follow to easily get someplace you have not been to or do not have GPS data for but Terraserver maps exist for it.
Making maps with coordinate lines.
Analyzing speed at different places, adding waypoints where you forgot to mark one but did slow down or stop.
Grouping data from multiple trips using a hierarchical data manager.
Show the live GPS position on the map (for use on a mobile device – e.g. a laptop).
Layers supported:
Aggregate – a container layer to hold other layers. This layer type is useful for grouping other layers, especially TrackWaypoint layers.
TrackWaypoint – displays GPS data (tracks and waypoints).
GPS – responsible for uploading and downloading GPS data from a GPS device. It also is responsible for realtime GPS tracking.
DEM – provides elevation data from the Shuttle Radar Topography Mission (SRTM).
Coord – allows drawing of grid lines on the viewport.
GeoRef – allows users to use any image as a map.
Maps – provides a single map resource, you may have multiple map layers but only top one (if enabled) will be visible. Inbuilt maps include:
Terraserver Topos.
Terraserver Aerials.
Terraserver Urban Areas.
OpenStreetMap (Osmarender).
OpenStreetMap (Mapnik).
OpenStreetMap (Maplint).
OpenStreetMap (Cycle).
NASA BlueMarble.
SpotMap (Viking Version1.1+).
Supports a wide variety of map types including WMS, OSM, TMS, SPOTMaps.
Support for Locosys and DeLorme GPS devices.
Internationalization support.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

FOR BSD Windows Mac Linux:)

sourceforge.net/projects/viking


@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Manual switching to different LTE frequency bands on any Samsung Galaxy smartphones :

1) Download QuickShortCutMaker
Download and install the free QuickShortCutMaker app from the Google Play Store .

https://play.google.com/store/apps/details?id=com.sika524.android.quickshortcut&hl=en

2)Select a new LTE band
After installation, launch the application and open the "Activity" tab. Click on the down arrow next to Call Settings. In the list, select the last option above "Camera" and click "Try".

3) On a new page, open the side menu by clicking on the three horizontal lines in the upper left corner. Click Select Lane.

4) you will see a list of all the bands supported by the smartphone, including LTE and 5G. You need to select the LTE band supported by your mobile operator. For the USA, these are the following operators and bands:

Verizon: 0/1/2/4/5/13

AT&T: 2/4/5/12/17

T-Mobile / Sprint: 2/4/5/12/25/26/41

US Cellular: 2/4/5/12

5) When you have selected a supported LTE band, activate the Select switch in the upper right corner. Use the Back button or gesture to return to the previous screen. To verify that the change worked, it is recommended that you restart your smartphone.

6) Approve the change
Download the Network Cell Info Lite app from the Google Play store.
https://play.google.com/store/apps/details?id=com.novvia.fispy&hl=en

7) After installation, launch the application and give the required permissions. The first Gauge tab on the right shows the selected frequency band.

Don't clone our tutorials :)
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Lastest analytiques about Ransomware attacks this month
#international
_
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸš« A look at how credit card information can be stolen :

1) Cloning maps
Making a cloned credit card is the easiest way for a thief to spend someone else's money.

All they have to do is temporarily access your credit card (often in fractions of a minute) and program it onto another prepaid card.

The cloned cards can then be sold on the darknet, usually through cryptocurrency.

Many of these stolen cards resemble real cards, and the attention to detail is mind-boggling.

2) Skimming cards
Breathing in the neck of credit card cloning, ATM skimming is one of the most common ways to get credit and debit card data.

It typically uses magnetic stripe cards rather than chip and pin code cards, but as the story suggests, thieves can also install a mini camera on the skimmer to capture the pin number.

3) Formjacking
The digital equivalent of ATM skimming, "formjacking" is a term Symantec uses to refer to hackers who steal credit card information from checkout pages on websites.

They usually install malicious software, usually JavaScript code, to remove credit card numbers.

Cryptojacking is another similar term that refers to the withdrawal of cryptocurrency

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁