UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HOW SCAN OPEN PORTS ?
MASSCAN web interface
:

1) Masscan is natively packaged in Kali Linux and can handle a huge number of nodes.

Masscan has several convenient output formats such as binary and XML.

However, there is another convenient feature of this network scanner - the web interface.

2) The masscan web user interface setup is pretty standard and straight forward.

You will need to create a MySQL database, import the database schema, move the PHP files as root, and edit the config file with the correct options.

3) First, install and run your web server and some other required packages and add the masscan repository:

# apt-get install apache2 php libapache2-mod-php php-mysqli php-xml mysql-server

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/offensive-security/masscan-web-ui

2) mv masscan-web-ui/* /var/www/html/

3) cd /var/www/html/

4) root@kali:/var/www/html

# mysql -u root -p

5) Enter password:
Type 'help;' or '\h' for help. Type '\c' to clear the current input statement.

# mysql> create database masscan;
Query OK, 1 row affected (0.01 sec)

# mysql> CREATE USER 'masscan'@'localhost' IDENTIFIED BY 'changem3';
Query OK, 0 rows affected (0.00 sec)

# mysql> GRANT ALL PRIVILEGES ON masscan.* TO 'masscan'@'localhost';
Query OK, 0 rows affected (0.01 sec)

# mysql> exit
Bye
# root@kali:/var/www/html# mysql -u root -p masscan < db-structure.sql
Enter password:
root@kali:/var/www/html

# rm db-structure.sql index.html README.md

# nano config.php

define('DB_DRIVER', 'mysql');

define('DB_HOST', 'localhost');

define('DB_USERNAME', 'masscan');

define('DB_PASSWORD', 'changem3');

define('DB_DATABASE', 'masscan');

Now you can use masscan to scan and output .xml documents

# masscan 10.0.0.0/8 -p80,21,53 --banners --source-ip 10.0.0.2 --max-rate 100000 -oX scan-01.xml

root @ kali: / var / www / html

ls -l scan *

-rw-r - r-- 1 root root 212929324 Dec 1 13:23 scan-01.xml

-rw-r - r-- 1 root root 700816226 Dec 1 13:55 scan-02.xml

root @ kali: / var / www / html

php import.php scan-01.xml

Do you want to clear the database before importing (yes / no) ?: yes

Clearing the db

Written by
(no one allowed to clone our tutorials)
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to run a PHP program in Xampp?
#Requested

1) Install XAMPP
The first step is to install XAMPP onto your computer. it is very easy to install XAMPP. Just visit the official website to download XAMPP.

xampp download page
Apache Friends: https://www.apachefriends.org/index.html

2) On this site you can see XAMPP for Windows, Linux and OS X. Where you can download XAMPP based on your computer OS and after downloading install it.

3) Open XAMPP control panel
After installing XAMPP on to your PC the next step is to start the Apache server and MySQL.

The control panel XAMPP which is something like this.

xampp control panel

4) To launch Apache service and MySQL service, click on the Start button. if you want to stop any of the services at any time you can click on stop button in XAMPP control panel.

5) Executing Project
Once the Apache and MySQL services are started and running in the background. Now extract the project zip file which you have downloaded from our site.

6) extract project mini project
After extracting you should see the folder which contains all the code and related files of the project that you have downloaded.

7) copy project folder
Copy this folder and navigate to xampp folder (which is basically located in C drive) and inside this folder (xampp) find the htdocs folder and paste the project folder into this htdocs folder

8) example In my case, the path is something like this C:\xampp\htdocs

Paste folder to htdocs

9) After the project folder is successfully copied to the specified location on your computer. Then go to your browser (Chrome) and type in URL field: localhost/ FOLDER NAME and then hit enter.

10) Run project using xampp
If the project folder name is β€œCriminal_Mini_Project” then type in URL field: localhost/ Criminal_Mini_Project and hit enter. That’s it your project will start running.

11) I hope the article was useful. If you find any difficulty in running your code feel free to share your problem with us, we will try to solve it.

source linux forum
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Windows Hacking tutorials and tools :

1) Windows-Post-Exploitation:


https://github.com/emilyanncr/Windows-Post-Exploitation


2) Windows Post Exploitation Shells and File Transfer with Netcat for Windows:


https://medium.com/p/a2ddc3557403

3) Windows Privilege Escalation Fundamentals:

https://www.fuzzysecurity.com/tutorials/16.html


4) Windows Privilege Escalation Guide:

www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/

5) https://github.com/LazoCoder/Windows-Hacks


6) https://github.com/D4Vinci/Dr0p1t-Framework

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
from now Again starting 24/24

T.me/UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘behavior of centralized crypto exchanges :

To understand the behavior of centralized crypto exchanges, you need to analyze some key components individually or in groups, and generalize some concepts at a higher level. Here are a few key components related to the behavior of centralized crypto exchanges:

1) Hot wallet: Hot wallet usually refers to the main communication method between external parties and exchanges. This wallet can be used to trade cryptocurrency assets.

2) Cold wallet: A cold wallet is seen as a means of secure storage of encrypted assets. Such wallets usually hold large amounts of assets that are not intended for frequent transactions.

3) Deposit address: usually refers to a temporary address on the blockchain used to transfer funds to the exchange. The main purpose of this type of address is to facilitate users to exchange cash flow.

4) Withdrawal address: usually refers to a temporary address on the blockchain used to transfer funds from the main transaction wallet. Sometimes the withdrawal address can also play the dual role of the deposit address.

5) Although these four components represent the core of the on-chain architecture of a centralized exchange, to identify them requires quite complex heuristics or machine learning methods. Part of the challenge is that the interaction model between these components can be arbitrary and complex, and is not well understood.

With the help of IntoTheBlock 's transaction machine learning classifier, the visual exploration of the blockchain data set revealed some very elegant and charming models.


@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
some helpful old written tutorials :)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 update wireless protocol investigation
any
linux/macos

The Universal Radio Hacker (URH) is a complete suite for wireless protocol investigation with native support for many common Software Defined Radios. URH allows easy demodulation of signals combined with an automatic detection of modulation parameters making it a breeze to identify the bits and bytes that fly over the air. As data often gets encoded before transmission, URH offers customizable decodings to crack even sophisticated encodings like CC1101 data whitening. When it comes to protocol reverse-engineering, URH is helpful in two ways. You can either manually assign protocol fields and message types or let URH automatically infer protocol fields with a rule-based intelligence. Finally, URH entails a fuzzing component aimed at stateless protocols and a simulation environment for stateful attacks.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/jopohl/urh

2) cd urh

3) sudo python3 -m pip install --upgrade pip # Update your pip installation

4) sudo python3 -m pip install urh # Install URH

5) python setup.py install

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁