UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
Tutorials related to exploits
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Linux privilege escalation auditing tool

LES
tool is designed to assist in detecting security deficiencies for given Linux kernel/Linux-based machine

๐Ÿ„ธ๐Ÿ„ฝ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ„ป๐Ÿ„ป๐Ÿ„ธ๐Ÿ…‚๐Ÿ„ฐ๐Ÿ…ƒ๐Ÿ„ธ๐Ÿ„พ๐Ÿ„ฝ & ๐Ÿ…๐Ÿ…„๐Ÿ„ฝ :

Quick download:

wget https://raw.githubusercontent.com/mzet-/linux-exploit-suggester/master/linux-exploit-suggester.sh -O les.sh
Details about LES usage and inner workings:

https://mzet-.github.io/2019/05/10/les-paper.html
Additional resources for the LES:

https://github.com/mzet-/les-res

2) Assess exposure of the Linux box on publicly known exploits:

$ ./linux-exploit-suggester.sh
Show state of security features on the Linux box:

3) $ ./linux-exploit-suggester.sh --checksec
Assess exposure of Linux kernel on publicly known exploits based on the provided 'uname' string (i.e. output of uname -a command):

$ ./linux-exploit-suggester.sh --uname <uname-string>

4) MORE USAGE https://github.com/mzet-/linux-exploit-suggester

@UndercodeTesting
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘cdaengine0400.dll manual deletion method:

cdaEngine0400.dll has earlier been reported as spyware, but new reports show that newer versions of the file is clean. We still don't have the file though, and only provide removal instructions.

1) Uninstall notice for WildTangent
Notice that removing WildTangent may cause the program that bundled
it to not function as intended.

2) Uninstall procedure
Uninstall WildTangent from "Add/Remove Programs" in the Windowsยฎ Control Panel.

3) The vendor is also offering uninstall instructions. If you run into problems

uninstalling, please contact the vendor for support. Note that you will not be able to play WildTangent games if you decide to uninstall.

4) Earlier versions of WildTangent's uninstaller leaved a large number of files
in the "%WinDir%\wt\" folder which can be deleted manually after running the
uninstaller.
Note: %WinDir% is a variable (?)

@UndercodeTesting
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘SUB DOMAINS FINDER TOOLS KALI :

A) Sublist3r
Sublist3r - a tool in Python, intended for the transfer of sub-domains of websites using OSINT.

It helps penetration testers and bug hunters collect subdomains from the domain they are targeting.

Sublist3r lists subdomains using many search engines such as Google, Yahoo, Bing, Baidu, and Ask.

Sublist3r also lists subdomains with Netcraft, Virustotal, ThreatCrowd, DNSdumpster and ReverseDNS.

This very nice tool is hosted on github, although when I last checked there were some complaints about it crashing with some of its engines mentioned above.

๐Ÿฆ‘How to install sublist3r

git clone https://github.com/about3la/Sublist3r.git

Then, in the directory where you cloned the repository, run:

python3 setup.py install
Then you can just run it like normal Linux commands

sublist3r -d itsecforu.ru

B) Dnscan
Dnscan is a Python wordlist based DNS subdomain scanner.

The script will first try to transfer the zone using each of the target domain name servers.

If that fails, it will look up the domain's TXT and MX records and then recursively scan the subdomains using the provided dictionary.

The tool is dictionary based, which means it will use its internal wordlist to try and check if the subdomain actually exists.
Some of the dictionaries it contains include:
subdomains-1000.txt

subdomains-10000.txt

subdomains-500.txt

subdomains-uk-1000.txt

subdomains-uk-500.txt

subdomains.txt

As you can see, subdomain scanning depends entirely on the above files.
Also this tool is available on the Internet, you can test it:
https://www.nmmapper.com/sys/tools/subdomainfinder/


@UndercodeTesting
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘May you interested in those links :

1) The Hacker Playbook : Practical Guide To Penetration Testing
Link : http://www.allitebooks.com/the-hacker-playbook-practical-guide-to-penetration-testing/

2) The Hacker Playbook 2: Practical Guide To Penetration Testing
Link : http://www.allitebooks.com/the-hacker-playbook-2-practical-guide-to-penetration-testing/

3) Android Hacker's Handbook
Link : http://www.allitebooks.com/android-hackers-handbook/

4) BackTrack 5 Wireless Penetration Testing Beginner's Guide
Link : http://www.allitebooks.com/backtrack-5-wireless-penetration-testing-beginners-guide/

5) Black Hat Python
Link : http://www.allitebooks.com/black-hat-python/


โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How to solve the problem that there is a black border around the Windows 10 monitor that cannot be displayed in full screen?

Some friends reported that in the actual application of their win10 system, the display cannot be displayed in full screen and there is a black border around it! How to solve the problem of a black border around the display in win10 cannot be displayed in full screen? Today, the editor brings you a solution to the black border around the win10 monitor that cannot be displayed in full screen. Interested friends should not miss it.

๐Ÿฆ‘How to solve the problem that there is a black border around the Windows 10 monitor that cannot be displayed in full screen:

1) Press win+r to enter the run window, enter "regedit" and press Enter.

2) In the registry editor window, locate [HKEY_CURRENT_USER/SOFTWARE/BLIZZARD ENTERTAIMENT/WARCRAFTIII/Video].

3) Open the reshight file (screen height) in the left margin and change the numerical data inside to "768", then open the reswidth file (screen width) and change the numerical data to "1366".

4) In the blank area of โ€‹โ€‹the desktop, right-click and select "Display Settings".

5) In the window, select "Advanced Display Settings", then change the resolution to "1366 x 768" and click Apply.

#fASTtIPS
@UndercodeTesting
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘# ๏ธโƒฃ What is HMAC (Hach-based Message Authentication Code) ?

Hach-based Message Authentication Code or HMAC is used to authenticate a message using hash functions.
Message authentication is an important mechanism in cybersecurity and is used to authenticate a message.
There are different ways and mechanisms for message authentication.

๐Ÿ„ป๐Ÿ„ด๐Ÿ…ƒ'๐Ÿ…‚ ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ…๐Ÿ…ƒ :

1) Message
A message is data, text, image, or whatever we want to authenticate.

The message is verified for authenticity with the key by hashing them.

2) Key
The key is used by both parties to authenticate the message.

As stated earlier, the message and the key are used together and the hash value is calculated.

3) Hash function
The hash function is used to compute a hash value that is unique.

The hash function can be sha1, sha256, or use a different algorithm.

ยปEncryption and Hashing. Difference and application

@UndercodeTesting
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–


๐Ÿฆ‘How to create an HMAC using OpenSSL


1) We can use the OpenSSL tool to generate some HMAC or hash value.

2) We will use the echo and openssl commands.

3) We will also use sha256 as our hash algorithm.

4) We will provide data or messages to HMAC, and then we will have it with the -hmac switch and mysecretkey as shown :

$ echo -n "secretmessage.txt" | openssl dgst -sha256 -hmac "mysecretkey"

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘PHP Ransomware 2020:
Ransomware will self-destruct upon running, which means you only have one chance at decrypting your data.

Keep also in mind that each decryption file has a uniquely generated salt used in encryption and as such cannot be replaced with another decryption file.

๐Ÿ„ธ๐Ÿ„ฝ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ„ป๐Ÿ„ป๐Ÿ„ธ๐Ÿ…‚๐Ÿ„ฐ๐Ÿ…ƒ๐Ÿ„ธ๐Ÿ„พ๐Ÿ„ฝ & ๐Ÿ…๐Ÿ…„๐Ÿ„ฝ :

1) download the code https://github.com/ivan-sincek/php-ransomware

2) cd php-ransomware

3) Requires PHP v5.5.0 or greater because openssl_pbkdf2() is being used.

4) Copy \src\encrypt.php to your server's web root directory (e.g. to \xampp\htdocs\ on XAMPP).

Navigate to the encryption file with your preferred web browser.

5) Decryption file will be created automaticly after the encryption phase.

P.S. On web servers other than XAMPP (Apache) you might need to load OpenSSL and Multibyte String libraries within PHP.

6) In XAMPP it is as simple as uncommenting the following in the "php.ini" file:

> extension=php_openssl.dll

> extension=mbstring
โœ…git 2020
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
TODAY TOPICS :

EC-Council - Computer Hacking Forensic Investigator (CHFIv9)
https://t.me/UnderCodeTesting/11684

How JavaScript email attachments may carry malicious code ?
https://t.me/UnderCodeTesting/11685

Some good fresh sock5
https://t.me/UnderCodeTesting/11686

Vulnserver 5 tutorials + pictures (pdf)
https://t.me/UnderCodeTesting/11688

Linux privilege escalation auditing tool
https://t.me/UnderCodeTesting/11695

cdaengine0400.dll manual deletion method
https://t.me/UnderCodeTesting/11696

SUB DOMAINS FINDER TOOLS KALI
https://t.me/UnderCodeTesting/11697

May you interested in those links
(collection hack)
https://t.me/UnderCodeTesting/11698

How to solve the problem that there is a black border around the Windows 10 monitor that cannot be displayed in full screen?
https://t.me/UnderCodeTesting/11699

6 days Lab vulnhub tutorial
https://t.me/UnderCodeTesting/11700

What is HMAC (Hach-based Message Authentication Code) ?
https://t.me/UnderCodeTesting/11701

How to create an HMAC using OpenSSL tip
https://t.me/UnderCodeTesting/11702

Which Programming language is the fastest in 2020, compared to 27 languages
https://t.me/UnderCodeTesting/11703

PHP Ransomware 2020
https://t.me/UnderCodeTesting/11704

ENJOY FRIENDSโค๏ธ๐Ÿ‘๐Ÿป
@UndercodeTesting
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–