UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What are the hazards website vulnerabilities :

The harm of SQL injection vulnerabilities is not only reflected in the database level, but also may endanger the operating system that hosts the database; if SQL injection is used to hang horses, it may also be used to spread malware, etc. These hazards include but are not limited to:

1) Database information leakage: user privacy information stored in the database is leaked.

2) Web page tampering: tampering with specific web pages by operating the database.

3) The website is hacked to spread malicious software: modify the value of some fields in the database, embed the link of the network horse, and carry out a hacking attack.

4) The database was maliciously operated: The database server was attacked and the database system administrator account was tampered with.

5) The server is controlled remotely and a backdoor is installed: the operating system support provided by the database server allows hackers to modify or control the operating system.

6) Destroy hard disk data and paralyze the entire system.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WEB HACK METHODE BY UNDERCODE:
πŸ” Injection of OS command to attack web applications
:

A) What is OS Command Injection?

OS Command Injection (also known as shell injection) is a web security vulnerability that allows an attacker to execute arbitrary operating system (OS) commands on the server running an application, and typically completely compromise the application and all of its data.

Very often, an attacker can exploit an OS command injection vulnerability to compromise other parts of the hosting infrastructure, using trust relationships to attack other systems in an organization.

B) Execution of arbitrary commands

1) Consider a shopping app that allows a user to see if an item is in stock at a particular store.

2) This information is available via a URL, for example:


3) To provide information on promotions, the application must query various legacy systems.

4) For historical reasons, functionality is implemented by invoking a shell command with product IDs and storing the IDs:
stockreport.pl 381 29

5) This command displays the stock status for the specified item, which is returned to the user.

Since the application does not implement any protection against OS command injection, an attacker can send the following input to execute an arbitrary command:

& echo aiwefwlguh &

9) If this input is passed in the productID parameter, then the command executed by the application is:
stockreport.pl & echo aiwefwlguh & 29

10) The echo command simply causes the passed string to fly to stdout, which is a useful way to test some types of OS command injection.
The & character is the shell command separator, and therefore actually three separate commands are executed one after the other.
As a result, the output returned to the user is:
Error - productID was not provided
aiwefwlguh
29: command not found

11) These lines of output demonstrate that:
The original stockreport.pl command was executed with no expected arguments and therefore returned an error.

12) The echo command was injected and the provided string was reflected in the output.
The original argument 29 was executed as the command that caused the error.

13) Placing an extra command separator & after the entered command is usually good practice, as it separates the command you entered from what follows the insertion point.
This reduces the likelihood that subsequent action will prevent the execution of the command entered.

WRITTEN BY
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ” What is the .htpasswd file and why is it needed ?


.htpasswd is a system file used to store usernames and passwords.
This file is typically used by a web server like Apache, Nginx, etc. to authenticate users using HTTP basic authentication.

A) What is the content of the .htpasswd file?
.htpasswd is a text file containing ASCII text.

1) The structure of .htpaswd is very simple, where each line stores a username and associated passwords.

2) The username and password are separated by a colon.

3) In addition, the password is stored encrypted rather than in clear text to keep the password secure.

example :

ismail:$apr1$/5EzxSg3$SXVemrqNIb/TrKvJv4Z5r0
ahmet:$apr1$cEKbD/Wa$M012WG8Txqp/dhso8.znk0
ali:$apr1$o/t1Efly$E7798GsGjMWoNUpqmG4l60
How do I create a .httpaswd file?

B) The .htpasswd file can be created using the htpasswd command, touch command, or a text editor .

1) But the most suitable way is to use the httpasswd command.

2) You can also edit the contents of the .htpasswd file using the htpasswd command.

3) Next, we will create a .htpasswd file using the htpasswd command, where we will provide the filename with the -c option.

$ htpasswd -c .htpasswd itsecforu
Or we can specify the full path as shown below.
$ htpasswd -c /var/www/mysite/.htpasswd itsecforu
Alternatively, we can use the touch command where the generated .htpasswd file will be an empty file with its own name.

$ touch .htpasswd
4) Another alternative for creating the .htpasswd file is to use the command line or a text editor.

5) We will use the nano text editor as an example, but alternatively text editors such as vi, vim, KWrite can be used.

$ nano .htpasswd

6) Setting up the .htpasswd file
Since the .htpasswd file is used for Apache and its associated web server software to authenticate users, we must configure the web server to use the .htpasswd file.

7) Next, we'll enable HTTP Basic Authentication by specifying a .htpasswd file for the username and password.

AuthUserFile /var/www/mysite/.htpasswd
AuthType Basic
Require valid-user

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘445 port intrusion reason detailed analysis :

In Windows NT 4.0, a challenge response protocol is used to establish a session with a remote machine. The successful session will become a secure tunnel through which the two parties can exchange information. The general sequence of this process is as follows:

1) The session requester (client) sends a data packet to the session receiver (server) to request the establishment of a secure tunnel;

2) The server generates a random 64-digit number (implementation challenge) and sends it back to the client;

3) The client obtains the 64-digit number generated by the server, disrupts it with the password of the account that is trying to establish a session, and returns the result to the server (response);

4) After the server accepts the response, it sends it to the local security authentication (LSA). The LSA verifies the response by using the user's correct password to confirm the identity of the requester. If the account of the requester is a local account of the server, the verification occurs locally; if the account requested is a domain account, the response is sent to the domain controller for verification. When the response to the challenge is verified as correct, an access token is generated and then sent to the client. The client uses this access token to connect to the resource on the server until the proposed session is terminated.


@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TOR VS VPN, VPN AND TOR, one of which is more anonymous ?

> If your purpose is to encrypt the transmitted data such that it can not be examined by your Internet provider, then you can come up with both Tor and your VPN! I would not consider using any third-party VPNs, as all the transmitted traffic + client IP (that is, your IP address) can be identified by their user. If you use a VPN provider from a third party, then you are sure to get a spyware that knows your real IP address at least as well! If this is a paying VPN, then anonymity is completely not acceptable, since the VPN operator not only knows your IP address and has access to all sent data, but also knows who you are from your payment information.

> The self-configured OpenVPN enables transmitted information to be secured and your computers to be inserted into a virtual private network. Your actual IP address and bypass web blocking can also be covered.

> But this alternative is not ideal for anonymity, since you need to reserve a VPS for the OpenVPN service, for which you have to pay. While OpenVPN can allow you to remain anonymous, whether you use cryptocurrencies or other anonymous payment methods.

> Using a single proxy has the same downside as a VPN: your exact IP address is exposed by the eavesdropper + proxy application. In the absence of encryption, an added downside is that your ISP can also examine your traffic and also restrict links to websites.

> If a proxy chain is used, the situation of IP concealment increases because (depending on the settings), any next proxy knows (always) the IP address of the previous node and (sometimes) the IP address of 1 node before the previous one. If we assume that traffic at every point is not encrypted, and a certain portion of public proxies are only honeypots, then the proxy alternative is not the safest way to guarantee confidentiality.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What skills should modern network performance monitoring tools have? Network and application monitoring >

The network performance monitoring tool is an indispensable tool for the IT industry, but when using it, you must also pay attention to what skills the network performance monitoring tool should have. The following editor will explain the modern network performance monitoring in detail. What kind of skills the tool should have.

In the past, enterprise network engineers had to provide network access and sufficient bandwidth for various connected servers, applications, and terminal devices. From the perspective of the OSI model, these tools mainly focus on the 1-4 layer network. Since all traffic and data flows passing through a network share all bandwidth and queue resources, the higher OSI level is somewhat ignored.

Slowly, network equipment becomes more and more complex, and now different data streams in the network can be identified and treated differently. Various quality of service (QoS) and application layer process shaping techniques can also be used to achieve this goal. In addition, with the increasing dependence on key business applications, network engineers also urgently need to understand the higher levels of the OSI model so that they can discover the performance of the network, server operating systems, virtualization software, and applications themselves. Questions or other issues. However, in order to solve these problems, they need some tools.

In many scenarios, network performance monitoring tools have evolved from more traditional and simple network monitoring software. These monitoring tools usually use ICMP ping and Simple Network Monitoring Protocol (SNMP) polling/traps to check the network status. More modern supplementary features include monitoring, baselineization, and intelligent analysis of all states of the application itself. The most advanced network monitoring tools can also perform the following 5 functions :

1) Network and application monitoring

2) Network problem analysis

3) Application data and flow interception analysis

4) Virtualization and operating system problem detection

5) Root cause analysis

Different network performance monitoring vendors have different granularity in performing these tasks. Moreover, the more precise the task, the more complex it will be to implement and manage. Therefore, we must accurately understand the needs of our own organization, and then properly balance the granularity and complexity. So, let's continue to analyze the 5 common functions of modern network performance monitoring tools.

enjoy β€οΈπŸ‘πŸ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Network and application monitoring :

As mentioned earlier, modern network monitoring tools have evolved from network monitoring using ICMP ping and SNMP protocols to more complex tools. The regular ping command from the network monitoring server will be sent to various networks, servers and other terminal devices that need to be monitored. If the monitored device does not respond to the ping request, the monitoring tool may mark the device as "down" and then alert the support staff.

1) SNMP collects and organizes various types of data from network and server components that support this protocol.

For network devices, this usually means constantly monitoring the status of specific device interfaces and data throughput. In addition, it will monitor the hardware status, including power, fan, and memory usage.

2) Some network performance monitoring tools can also collect and respond to various system log (Syslog) messages. System log is a common standard for log messages of infrastructure devices. These messages will be sent and stored in a centralized network monitoring tool, after analysis, will be used to notify support engineers in the event of a system failure.

3) The network monitoring tool has comprehensive monitoring capabilities. It can monitor not only availability and performance statistics, but even the entire application layer. This kind of monitoring usually depends on the configured software plug-in or operating system settings to send monitoring data back to the central monitoring server.

enjoy β€οΈπŸ‘πŸ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

A) Virtualization and operating system problem detection

There must be some problems between the network and the application. This includes virtualization, server operating systems, and various middleware on which applications depend. The hypervisor needs to separately monitor problems that may cause performance degradation at the application layer. The main operating system and middleware responsible for managing communications between distributed systems have the same problem. Network performance monitoring vendors will use different methods to monitor these problems, some of which also support more hypervisors, operating systems and middleware software.

B) Network problem analysis

In addition to providing simple online/disconnected status and utilization information, network performance monitoring products can also perform more complex automated network fault repair tasks. This includes routing protocol monitoring and unplanned routing change alerts. In addition, some products can use smart technology to understand how various WAN technologies, virtual stacking, and QoS features work. In addition, they can be set to automatically send alerts when problems occur, and they can even perform automatic fixes.

Written by
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Capture and analysis of application data and flow :

The most important task of modern network performance monitoring tools is to parse and analyze data and flows. In the network, different areas can use different methods to capture data packets, and then perform automatic and/or manual analysis. The most common methods are:

1) Deploy distributed data collection agents in all key network locations.

2) Use the packet capture function of specific router/switch hardware.

3) Analyzing data packets and performing more granular application analysis is a requirement that many enterprise organizations are paying more and more attention to. By using deep packet inspection technology, network administrators can identify communication problems that are more closely related to the application, which would otherwise be difficult to detect.

4) Network flow collection will sort out the IP network statistics of data entering and leaving the network card. Once the data is sent to a centralized server and analyzed by network performance monitoring flow analysis tools, the network support administrator can distinguish the source and target information of the traffic, as well as the detailed QoS policies that the traffic will encounter when passing through the network. Ultimately, these data will be used to identify configuration problems between network devices or congestion problems in various network paths.

Written by
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Root cause analysis

1) Integrating and analyzing various event data on a network performance monitoring tool can form an automated root cause analysis function.

2) If a problem occurs in the network, and then it triggers events of multiple components, many network performance monitoring tools will use artificial intelligence technology to analyze the correlation of these events, and finally determine the root cause of the problem.

3) This is one of the complex functions that need to be configured because it requires all equipment and monitoring systems to be properly configured.

> For example, if the device time is not synchronized through the Network Time Protocol (Network Time Protocol), the time found by the event will be wrong. This will negatively affect the accuracy of the root cause analysis engine.

4) However, once it is created and the correct maintenance measures are taken, automated root cause analysis tools can save a lot of time in troubleshooting.

Written by
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
WinDbg Malware Analysis Cheat Sheet.pdf
2 MB
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to skip Face ID unlocking on iPhone while wearing a mask ?

Apple has released the latest version of the iOS system for developers. There are not many new features here, apart from a few related to the coronavirus. IOS 13.5 beta 3 contains a new API from Apple and Google. This interface should show whether you have been in contact with infected people or not.

Here's how it works: Using Bluetooth, the iPhone securely shares randomly generated IDs with nearby devices and retrieves their IDs. This allows the app to notify you if you have been exposed to a virus. You can also share your coronavirus diagnosis anonymously.

This update also makes it easier to bypass Face ID unlocking on your iPhone if you're wearing a mask. Since you must have a password that is created when you set up Face ID, the device will use this password to log in to the system.

πŸ¦‘How to bypass Face ID while wearing a mask ?

Apple has enabled these features to work by default on the iPhone. This means that the machine recognizes you faster, regardless of whether you are wearing a mask or not. Prior to iOS 13.5, a failed face scan had to be performed a couple of times before a password could be entered.

The process was quite tedious, but now you can immediately swipe up the screen to unlock. When you do this, the iPhone automatically opens the lock screen where you can enter a passcode. If you are wearing a mask, lift the device as usual, gesture upward as you would when unlocking with Face ID. A password entry field will appear.

πŸ¦‘How to turn off COVID-19 notifications on iOS :

As stated above, Apple and Google have teamed up to notify people that they have spoken with someone infected with the coronavirus. These notifications use a unique API. Applications of medical organizations can take advantage of it.

These applications do not contain personal information, but there may be people who want to disable them.

1) open iPhone Settings.

2) Scroll down and select "Privacy".

3) Click "Health".

4) Select COVID-19 Exposure Notifications.

5) Press the switch so that it is in the off position.

6) This feature can be useful these days. Apple should release the final version of iOS 13.5 soon and it will be available to everyone.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is the Pokki virus?

Pokki is essentially not a virus, as it is just an adware that is legally installed on a PC only after the user's consent. Meanwhile, as a result of its installation, many intrusive ads appear, which are shown in the form of sudden pop-up browser windows, as well as new buttons on the "Toolbar" and "Taskbar" begin to appear.

Most virus scanners now identify "Pokki" as a program that poses a moderate threat to your computer. Unlike real viruses, which try to take your computer under full remote control in order to obtain important confidential information, adware simply annoys users with the constant appearance of various banners and links. However, the Pokki utility can also negatively affect the performance of your hardware, just like regular viruses.

πŸ¦‘How does the Pokki virus work?

Pokki.com is actually a legitimate site that distributes an adware utility that can drastically change the look of the Windows Start menu, making it look like a mobile operating system.

Since this application is usually installed along with other software, you may not even notice that you are downloading it to your computer. In addition, this utility will subsequently constantly receive unknown automatic updates, downloading along with them alternative potentially dangerous programs (PUP). This usually leads to incorrect operation of the browser, in which many links to other malicious Internet resources appear.

At the same time, more and more anti-virus applications classify Pokki as an object that does not pose a serious threat to the PC. In summary, while the software in question does not harm your operating system or files, it can display potentially malicious content that increases the chances of an aggressive virus infecting your computer.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How can I get rid of Pokki virus?

The most effective way to get rid of any tricky software on your computer is to use a strong anti-virus program that can solve a wide range of adware and virus-related issues. The system verification process, depending on the integrated hardware, can take a long time, but this is the best method to get rid of such programs.

In other cases, you can do the following manipulations to remove "Pokki":

Try to erase the Pokki virus manually by Pokki simply by deleting certain applications and files associated with it. Both Windows and macOS have built-in tools to centrally uninstall programs you no longer want to use.
If you suspect that the installation of the Pokki virus was the result of the activity of another malicious object, then try to delete it as well. However, in most cases, antivirus software is required to remove these types of infiltrations.

1) If the "Pokki" virus has begun to control your browser, then the first step is to remove suspicious add-ons and extensions from it.

2) If the problem is with a mobile device, then you may need to use other methods to remove the virus from Android.

3) If none of these tips helped solve the problem, then we recommend using System Restore to go back to an earlier backup point when you did not have the Pokki virus on your computer. In this case, be sure to select the time period in which you know for sure that the virus was absent in the system

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁