UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Various libraries (Libraries) and Android runtime environment (RunTime) :


This level corresponds to the general embedded system and is equivalent to the middleware level. This level of Android is divided into two parts, one is various libraries, and the other is the Android runtime environment. The content of this layer is mostly implemented in C++. Among them, various libraries include:


1) C library: The standard library of C language, which is also one of the lowest level libraries in the system. The C library is implemented through Linux system calls.

2) Multimedia Framework (MediaFrameword): This part of the content is the core part of Android multimedia, based on PacketVideo (PV)

3) OpenCORE, functionally this library is divided into two parts, one part is the audio and video playback (PlayBack), and the other One part is audio and video records (Recorder).

4) SGL: 2D graphics engine.

5) SSL: The SecureSocket Layer is located between the TCP/IP protocol and various application layer protocols to provide security support for data communication.

6) OpenGL ES 1.0: This part provides support for 3D.

7) Interface management tool (Surface Management): This part provides functions such as managing the display subsystem.

8) SQLite: a general embedded database

9) WebKit: the core of the web browser

10) FreeType: The function of bitmap and vector font.

11) Various Android libraries are generally provided in the form of system middleware, and one of their distinctive features is that they are closely related to the applications of the mobile device platform. The Android operating environment mainly refers to the virtual machine technology-Dalvik. The Dalvik virtual machine is different from the general Java virtual machine (Java VM) in that it executes files in the Dalvik executable format (.dex) instead of the Java standard bytecode (bytecode). In the process of execution, each application is a process (a Process of Linux). The biggest difference between the two is that Java VM is a stack-based virtual machine (Stack-based), while Dalvik is a register-based virtual machine (Register-based). Obviously, the biggest advantage of the latter is that it can achieve greater optimization based on the hardware, which is more suitable for the characteristics of mobile devices.


don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘β˜ΈοΈ How to copy Kubernetes secrets between namespaces :

1) Creating Kubernetes secrets
We will create a secret with username and password from a file.

echo -n 'admin' > ./username.txt
echo -n 'Password' > ./password.txt

2) Run the kubectl create secret command to pack these files into a secret and create an object on the API server.

$ kubectl create secret generic my-user-pass --from-file=./username.txt --from-file=./password.txt
secret/my-user-pass created
Let's list our secrets:

$ kubectl get secrets

3) Copying Kubernetes secrets between namespaces
Use the following kubectl command syntax to copy a secret from one namespace to another namespace.

kubectl get secret <secret-name> \
--namespace=<source-nemespace> \
--export -o yaml | \
kubectl apply --namespace=<new-namespace> -f -

4) In my example, I will execute:

kubectl get secret my-user-pass \
--namespace=namespace1 \
--export -o yaml | \
kubectl apply --namespace=namespace2 -f -

5) Command execution output:

secret/my-user-pass created
Confirm the creation of the secret in the namespace.

$ kubectl get secret -n namespace2 my-user-pass
NAME TYPE DATA AGE
my-user-pass Opaque 2 38s

6) Decrypt the secret to confirm the correctness of the data:

secret_name="my-user-pass"
namespace="namespace2"
kubectl get secret -n $namespace $secret_name -o go-template='{{range $k,$v := .data}}{{printf "%s: " $k}}{{if not $v}}{{$v}}{{else}}{{$v | base64decode}}{{end}}{{"\n"}}{{end}}'

7) Command output:

password.txt: Password
username.txt: admin
If you have jq, you can use the following command to decrypt.

$ kubectl get secret my-user-pass -o json | jq '.data | map_values(@base64d)'
{
"password.txt": "Password",
"username.txt": "admin"

}

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SOME GOOD HARDDISK REPAIRING TOOLS FOR WINDOWS :

http://windirstat.info/

http://clonezilla.org/

http://www.osforensics.com/tools/mount-disk-images.html

http://www.piriform.com/defraggler

http://ssd-life.com/eng/download-ssdlife.html

http://www.dban.org/

http://www.hdtune.com/index.html

http://crystalmark.info/software/CrystalDiskInfo/index-e.html

http://www.piriform.com/recuva

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Broadly speaking, the data used for tracking has three related applications:


1) Long-term data receiver

According to use cases, long-term storage such as HDFS can open large-scale analysis to discover "what is normal" in the network and then identify historical trends. It is a simple way to get data to the ELK (Elasticsearch Logstash Kibana) stack to perform search and trend analysis. This method of quickly searching for known IOCs uses an open source stack, while detecting any deviations from normal values.

2) Monitor

The monitor counts various DNS transmissions, such as the number of NXDOMAIN, the number of bytes requested, the number of requests, the number of user requests, or the requested distribution TLD, etc. It is very helpful to understand hourly and daily trends. Monitoring applications such as (Graphite) generate graphs and statistics for different data points and allow us to proactively identify anomalies.

3) Real-time threat tracking

When the data arrives, this user process records and detects threats in real time, and constantly searches for malicious transmission patterns, but it performs anomaly detection. Time series analysis, using link libraries such as Karios, to help track, detect abnormal behavior and all data interruptions or cycles.

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Encryption algorithm

1) This project builds an efficient certificateless encryption scheme. Compared with the general example, it transforms the identity-based encryption and signature scheme into a combined certificateless protocol, and uses a certificateless encryption verification mechanism to extend the traditional signature encryption method. Based on the technology of identity authentication, pairing is used to verify the related public key. As long as the amortized cost of this verification is low, the result will be as efficient as basic encryption.

2) It not only maintains the advantages of identity-based public key cryptosystems that do not require the use of public key certificates, but also better solves its inherent key escrow problem. Signcryption combines public key encryption and digital signatures At the same time, the two functions of public key encryption and digital signature can be completed in a reasonable logical step, and the calculation amount and communication cost are lower than the traditional "sign before encryption" mode.

3) Use certificateless signature encryption algorithm based on bilinear pairing to use in wireless sensor network. Construct an efficient certificateless encryption scheme. Compared with the general paradigm, the identity-based encryption and signature scheme is transformed into a combined certificateless protocol, and the certificateless encryption verification mechanism is used to extend the traditional signature encryption method. According to the basic identity-based authentication Technology, pairing is used to verify the related public key. As long as the amortized cost of this verification is low, the result will be as efficient as basic encryption.

4) The PBC encryption algorithm is implanted in wireless sensors with limited memory and processing speed (wireless sensors use 51 cores). The ROM is only 4K and has to deal with the sensor's own information transmission, sensor signal detection and peripherals The state of the device is supervised, so it is extremely challenging to use in wireless sensor networks.

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hack Wi-Fi via Windows Commands :

YOUR NEED FIRST NETSH - https://docs.microsoft.com/en-us/windows-server/networking/technologies/netsh/netsh-contexts

1) This works because Windows 8 and 10 create a profile for every Wi-Fi network you join. If you tell Windows to forget the network, it will also forget the password, so it won't work. But most people never do that.

2) It is necessary that you enter the Windows command line with administrator rights. To do this, use Cortana to search for "cmd" and Command Prompt will appear in the menu; right click on this entry and select "Run as administrator". A black window opens with white text C: WINDOWS system32>. A flashing cursor will indicate where you are typing. Start with this: netsh wlan

3) As a result, you will get the "User Profiles" section - these are all Wi-Fi networks (for example, WLAN or wireless local area networks) that you have accessed and saved. Select the one you want to get the password for, highlight it and copy it. At the prompt below, enter the following, but replace X with the network name you copied; you only need what is in quotes.

> netsh wlan show profile name = "XXXXXXXX" key = clear

4) For the new data that appears, look in the Security Settings section for the Key Content string. The displayed word is the Wi-Fi password / key.

5) On macOS, open up Spotlight search (Cmd + Space) and type in terminal to get the Mac equivalent of the command line. Enter the following, replacing X with the share name.

> security find-generic-password -wa XXXXX

πŸ¦‘Reset router :

1) Before hard resetting your router to connect to your wireless network, try logging into the router first. From there, you can easily reset your Wi-Fi password / key if you've forgotten it.

2) This is not possible if you do not know the password for the router. (They are not the same unless you set it up like this). Resetting your router only works if you have access. This access can be via Wi-Fi or a physical connection using an Ethernet cable. This is closer to the topic of not hacking Wi-Fi, but setting up Wi-Fi or reconfiguring Wi-Fi which we wrote about recently.

3) The only difficulty is being in the same room as the router. Almost every router has a built-in reset button. Press it down with a pen or unrolled paper clip, hold it for about 10 seconds, and the router will revert to factory settings.

4) If you have a router that your Internet Service Provider (ISP) installed, check the stickers on the device before resetting - the ISP may have printed the Wi-Fi key on the router as well.

5) Once the router is reset, you need another password (plus username) to access the router itself. Again, you can do this through a PC connected to your router via Ethernet, as the reboot will likely kill any potential Wi-Fi connection. The actual access is usually done using a web browser.

Input url: 192.168.1.1 or 192.168.0.1 usually but some companies are kinky. Try them, it generally works. To find out which PC is connected to the router, open a command prompt and enter "ipconfig" without quotes. Look among gobbledygook for an "IPv4 address" that starts at 192.168. The other two, called octets, will range from 0 to 255. Note the third octet (possibly 1 or 0). The fourth one relates to the computer you use to log into the router.

6) In your browser, enter 192.168.x.1, replacing X with the number found in the ipconfig search. The digit 1 in the last octet should indicate the router - this is the number one device on the network.

7) At this point, the router should ask for a username and password. You can check your manual, but you probably lost it or threw it away. So instead go to RouterPasswords.com, which only exists to: tell users the default username / password on every router ever created.

don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁