UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
An dangerous vulnerability was discovered in OpenStack blazar.
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘bUILD YOUR OWN OTP :
building massively scalable soft real-time systems with requirements on high availability.

Binary Distributions
Erlang/OTP is available as pre-built binary packages by most OS package managers.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) apt-get install erlang
Compiling from source

2) git clone https://github.com/erlang/otp.git

3) cd otp

4) ./otp_build autoconf

5) ./configure

6) make

7) make install

πŸ¦‘EXAMPLE :

-module(hello).
-export([world/0]).

world() -> io:format("Hello, world\n").
Save the file as hello.erl and run erl to enter the Erlang shell to compile the module.

Erlang/OTP 19 [erts-8.2] [source] [64-bit] [smp:4:4] [async-threads:10] [hipe] [kernel-poll:false] [dtrace]

Eshell V8.2 (abort with ^G)
1> c(hello).
{ok,hello}
2> hello:world().
Hello, world
ok

git 2020
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘in 4 steps How to set the discrete graphics card as the default graphics card in win10 dual graphics card environment:

1) Right-click on the desktop and select the Nivida control panel

2) Click "Manage 3D Settings

3) Click here to select the default graphics card

4) Select "High-performance NVIDIA processor (discrete graphics card)

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is ping of death ?
#forbeginers

Ping of Death is a type of Denial of Service ( DoS) attack in which, by sending malformed or oversized packets using a simple ping order, an attacker attempts to crash, destabilize, or freeze the targeted device or service.

While PoD attacks are leveraging legacy flaws in target systems that may have been patched. The attack is still important and dangerous in an unpatched scheme, however. A new form of PoD attack has become common recently. The targeted device is hit by this attack, commonly known as a Ping flood, with ICMP packets sent rapidly via ping without waiting for replies.


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
5 differents hacking methodes
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Change the default email client in iOS 14 to Outlook, Spark, Gmail and more:

1) One of the most significant changes in the iOS 14 operating system is the ability to change default apps. Since the introduction of the first iPhone, Apple's own Mail app has been the default email client. Now you can change it.

Apple allows you to set third-party email clients by default. You can use Microsoft Outlook or Spark Mail instead of the Mail app. The choice is easy enough. Mail links that you open from your contact list or in your browser will open in the default mail client of your choice.

Note: in iOS 14.0, when the device is rebooted, the mail client settings are reset by default. IOS version 14.0.1 or higher must be installed.

2) Changing the default email client in iOS 14
Open system preferences, scroll down and find the mail app you want. Click on its name and look for the "Default Mail Client" setting. If it is, select it. If not, the application has not received the support it needs.

After clicking on "Mail client by default", you need to select a new application. All mail clients available for this are displayed here, not only the one by name you followed.

3) Activating the default email client in other applications
Now let's check our choice. In the Contacts application, open any contact and click on its mailing address. A pop-up window will appear asking you to open the mail client. Click β€œOpen, then a new email will open in the application of your choice. In the future, you will not need to click the "Open" button.

4) It doesn't just work in contacts. It didn't work with the Safari browser, the Apple Mail application opens there. But in browsers like Firefox and DuckDuckGo, links with a URI (Uniform Resource Identifier) ​​open in the mail client of your choice.

Some apps were able to do this prior to iOS 14 using their own URL schemes. For example, the Google Chrome browser asked if you wanted to open the Mail or Gmail app. This is how it works now, since it was not included in the changelog in iOS 14.

If you see a hyperlink with a postal address, click on it and a question will appear if you want to open it in the selected application. After that, the second time this window should not appear for the currently open application and the selected mail client.

5) Return to Apple Mail
If you want to revert to Apple's default Mail app, open System Preferences and go to the Mail section. Select "Default mail client" and set "Mail". When the Apple Mail app is set by default, you won't see the Default Mail Client setting under Mail in System Preferences. It can only be found in the settings of third-party email clients. This is how Apple tries to prevent the use of other people's email clients.


Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How can A variant of the CTB-Locker Trojan for Websites detected ?

1) After several months of relative calm, the CTB-Locker malware, also known as Critroni, has returned to the attention of cybersecurity experts. Researchers have discovered a new variant of the Trojan and named it β€œCTB-Locker for Websites”. Unlike earlier versions, which encrypt files on victims' computers, this type encrypts content of Internet resources.

2) According to the owner of the BleepingComputer website cyber security expert Lawrence Abrams, hackers compromise the servers of hosting providers and replace the original index.php or index.html with the new index.php. The new index.php is used to encrypt data on the site with 256-bit AES and display a new home page demanding ransom for decryption.

3) Abrams estimates that CTB-Locker for Websites has infected over 100 resources so far. The original CTB-Locker for Windows peaked and now it is not as popular as TeslaCrypt, CryptoWall and Locky ransomware. According to the researcher, the new variant of the Trojan will not succeed in gaining the fame of its predecessor, since the data on the sites always have backups that allow them to be easily restored without paying a ransom.

Errors exploited to infect CTB-Locker sites remain unknown. However, experts do not rule out the possibility of resource infection using vulnerabilities in WordPress


Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Crypt / Why? / Types / Issue price :

1) This is the process of modifying the code of your file (exe / dll) in such a way that the file itself remains operational and all antiviruses will consider that the file is harmless to the system.

2) This is accomplished in a variety of ways. The simplest ones are adding garbage sections or false calls and jumps to the file code. This simplest method has long lost its relevance due to the development of antiviruses and logistic methods of file analysis (heuristic analysis).

3) Now more complex methods are used, which include a huge complex of file file modifications. And the more sophisticated the methods, the longer your file will remain "clean" for AB.

πŸ¦‘There are two types of such crypts:
Manual - this is when your file is modified manually, individually for the task. It is believed that this method gives a better quality result and the file stays "clean" longer.

4) With the help of a cryptor, this is an automatic method in which a program is written in advance, which produces a number of modifications standard for each file. This method is considered less reliable because the procedures performed on the file are the same for all files. This, in turn, means that if one of the files is caught by the AV, then all the others will soon begin to be detected (identified by AV as malicious).
With each such modification (process), the file size increases by a certain number of kilobytes. This size is different for each service / cryptor and can vary from 5kb to 300kb. Less is better. The extra dimension is called STAB. The price ranges from $ 5 - $ 50. Automatic (using a crypter costs $ 5-15), manual costs $ 25-50.


Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Random tips :

The advantages of using AJAX (XMLHttpRequest) for AJAX (XMLHttpRequest) Support are:

1) cleaner and thinner client-side lib

2) no issues with "busy" indicators

3) pure XML data exchange (iso JavaScript callbacks)

πŸ¦‘Pay attention to 4 points:
1: Version 2.0.2
2: Mode pull
3: Format xml-strict
4: File ajax-pushlet-client.js

πŸ¦‘In fact, Pushlet officially has examples
demos-Pushlets-AJAX
Click to run and you can see that the content returned by the server is, please look at the above 6 points:

p_event=join-listen-ack
p_mode=pull
p_time=1380021729
p_id=qabynopuvu
p_format=xml-strict
p_sid=vyrel

Β» Then open the source code of the page to see the referenced files:
<script type="text/javascript" src="../../lib/ajax-pushlet-client.js"></script>
If you open ajax-pushlet-client.js and take a look, you can see:

NV_P_FORMAT:'p_format=xml-strict'
In other words, the default is xml-strict

So, referring to this example, you can organize your own applications under XMLHttpRequest adaptation

don't copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ improve your Wi-Fi signal :

1) Update the firmware on the router

2) Find the best place for your router

3) What frequency does your router operate on?
Review your network admin interface - the router should be configured for optimal performance. If your router is dual band, then you have the opportunity to get better bandwidth by switching to the 5 GHz band instead of the more common 2.4 GHz band.

4) Change the channel
Interference is a big problem, especially for those living in densely populated areas. Signals from other wireless networks can significantly affect connection speed, not to mention wireless phone systems, microwave ovens, and other electronic devices.

5) Control the quality
Most modern routers are equipped with Quality of Service (QoS) tools to limit the bandwidth used by applications.

6) Don't rely on outdated hardware
Everyone wants to get the most out of their hardware, but if you are using an older device it would be foolish to expect high performance from it. If you bought your router a few years ago, chances are it is using the older, slower 802.11n standard (or maybe 802.11g at all).

7) Add an antenna
If your router uses an internal antenna then it makes sense to add an external antenna as it sends out a stronger signal.

8) Install a Wi-Fi signal booster
Distance is one of the most obvious problems, as each router has its own specific optimum area that it can cover. If your network needs to cover a larger area than the router can cover, or if there are many obstacles and walls in its path, then expect a bad signal.

don't copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to Choose a Bitcoin Wallet: A Beginner's Guide :

hen choosing a reliable Bitcoin wallet, software or hardware, you need to adhere to the following criteria:

1) Management of private keys . You must control your keys.

2) Back up and security features . I need backup keys and pin codes.

3) Community of developers . People to actively maintain the wallet.

4) Hot or cold wallets .

5) Ease of use . Convenient user interface for quick access.

6) Compatibility with different operating systems.

7) HD Wallet . Wallets that generate new addresses themselves.

8) KYC . Wallets that do not require additional documents.

don't copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁