UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.2K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Connecting to networks and creating an Access Point :


1) I always recommend stopping NetworkManager when auditing the security of Wi-Fi networks, as its constant intervention makes attacks unstable and leads to incomprehensible and random errors. However, you may need to connect to a Wi-Fi network such as the Captive Portal to carry out further attacks. Some attacks require Internet access. Therefore, now the script helps you connect to Wi-Fi networks directly from the command line.

2) Remember that you can select the Wi-Fi adapter for which the action is performed. For example, we want to check all access points against the 3WIFI base. To do this, we select the first adapter and connect to the Internet. Then we select the second adapter and use it to scan the air.

3) Added the function of creating an Access Point with or without a password. This access point can be used to enhance the signal from a distant Access Point or to make the Internet connection available to other devices.

πŸ¦‘Strengthening the wireless signal in the router settings
This is an optional step. If using Router Scan by Stas'M or RouterSploit you managed to get access to the admin panel of the router, you can change the signal level in the wireless network settings.
> https://kali.tools/?p=501

https://kali.tools/?p=2187

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
All android users should update their google application.
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ Brute SSH the remote server:

Brute SSH the remote server

For brute-force attacks (brute-force attacks), we will use the Hydra tool , which is included with the Kali Linux distribution. SSH is present on any Linux or Unix server and is generally the primary use for administrators to access and control their systems.

Warning: Hydra is an attack tool

β€œ Use it only on your own systems and networks unless you have written permission from the owner. Otherwise, it is illegal . "

To implement the attack, use the command:

# hydra -s 22 -l root -P / usr / share / wordlists / fasttrack .txt 192.168.1.1 -t 4 ssh
Now let's analyze it:

- s - The flag indicates the port. It is worth noting that administrators can replace the default port 22 for the ssh service , in order to find out on which port the service is running, it is necessary to perform an initial scan of the target using the Nmap tool . We wrote about how to do this earlier in the article .

- l - the flag indicates the login, in our example we use root and admin. (we can provide a link to the dictionary here)

- P - the flag indicates the password, in our case we use the fasttrack .txt dictionary from the kali distribution , which is located in the / usr / share / wordlists / directory

It is worth noting that in order to effectively carry out a brute-force attack, it is worth paying due attention to the preparation of the dictionary, namely: taking into account geographical and linguistic peculiarities, including the name of the company, the names of its subsidiaries, the names of the services and applications running, the names of employees, etc.

192.168.1.1 - ip address of the target, since the target we are using has a white ip, it is smeared

- t - the flag indicates the number of simultaneously used threads. We indicate 4

ssh - used protocol

Based on the results of the team's work, we see that the passwords from the dictionary did not fit for the admin and root


@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
New Vulnerability in F5.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
New Bug discovered in Big-Ip Systems could allow the damage of TMM process.
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Wifi Hacking
any linux

R E Q U I R E M E N T S :

- libpcap >= 0.8.1
- libnet >= 1.1.2.1 (>= 1.1.5 for IPv6 support)
- openssl >= 0.9.7
- libpthread
- zlib
- libgeoip
- CMake 2.8
- Curl >= 7.26.0 to build SSLStrip plugin
If you don't want to enable SSLStrip plugin you have to disable it.
(more information about disabling a plugin in the README.GIT file)

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/Ettercap/ettercap

2) The easiest way to compile ettercap is in the form:
mkdir build

3) cd build

4) cmake ..

(Use ccmake . to change options such as disabling IPv6 support,
5) add

6) plugins support, etc).

7) make install

8) choose options depend on wifi security

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
20 critical Vulnerabities patched by Oracle this month.
#Vulnerabilities
TUTORIALS + PICTURES
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Free Dynamic Analysis :

* [Autoruns](https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns)

* [Process Monitor](https://docs.microsoft.com/en-us/sysinternals/downloads/procmon)

* [Process Explorer](https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer)

* [Process Hacker](https://processhacker.sourceforge.io/)

* [Noriben - Portable, Simple, Malware Analysis Sandbox](https://github.com/Rurik/Noriben)

* [API Monitor](http://www.rohitab.com/apimonitor)

* [INetSim: Internet Services Simulation Suite](http://www.inetsim.org/)

* [FakeNet](https://practicalmalwareanalysis.com/fakenet/)

* [Volatility Framework](https://github.com/volatilityfoundation/volatility)

* [Stardust](https://my.comae.io/login)

* [LiME: Linux Memory Extractor](https://github.com/504ensicsLabs/LiME)

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁