UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
20 critical Vulnerabities patched by Oracle this month.
#Vulnerabilities
TUTORIALS + PICTURES
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Free Dynamic Analysis :

* [Autoruns](https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns)

* [Process Monitor](https://docs.microsoft.com/en-us/sysinternals/downloads/procmon)

* [Process Explorer](https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer)

* [Process Hacker](https://processhacker.sourceforge.io/)

* [Noriben - Portable, Simple, Malware Analysis Sandbox](https://github.com/Rurik/Noriben)

* [API Monitor](http://www.rohitab.com/apimonitor)

* [INetSim: Internet Services Simulation Suite](http://www.inetsim.org/)

* [FakeNet](https://practicalmalwareanalysis.com/fakenet/)

* [Volatility Framework](https://github.com/volatilityfoundation/volatility)

* [Stardust](https://my.comae.io/login)

* [LiME: Linux Memory Extractor](https://github.com/504ensicsLabs/LiME)

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Mac os hacking new tool :

This hack doesn't work on systems with SIP (System Integrity Protection) enabled, and it's enabled by default since El Capitan. It can be easily disabled from Recovery Mode but it's another layer of security which is always good to have so disabling it permanently is not the wisest idea. I'll implement some solution to bypass this restriction when I have time.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

-git clone https://github.com/gebeto/macos-hacks

-cd macos-hacks

-cd <APPLICATION>

-make

-You can use run.sh, it's a wrapper script that sets necessary environment variables to insert the lib and launches Applications (it assumes that installed to /Applications, edit the script if it differs for you).

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How really can you remove any malware from windows:

1) Delete the illegal program started with the system in the registry, then search for all the key values ​​in the registry and delete it. A virus program started as a system service will hide in Hkey_Local_Machine/System/ControlSet001/services and controlset002/services, and then be eliminated when found.
γ€€
2) Stop the problematic service and change it to ban automatically.
γ€€
3) If the file system32/drivers/etc/hosts has been tampered with, restore it, that is, only one line of valid value "127.0.0.1localhost" is left, and the remaining lines are deleted. Then set the host to read-only.
γ€€γ€€
4) Restart the computer and press F8 to enter "Safe Mode with Network". The purpose is to prevent the virus program from starting, but also to patch the Windows upgrade and upgrade the anti-virus software.
γ€€γ€€
5) Search for the executable file of the virus and wipe it out manually.
γ€€γ€€
6) Patch Windows upgrades and upgrade anti-virus software.
γ€€γ€€
7) Turn off unnecessary system services, such as remoteegistryservice.
γ€€
8) After the completion of step 6, use anti-virus software to perform a comprehensive scan on the system to eliminate the fish that missed the net.
γ€€γ€€
9) After the previous step is completed, restart the computer to complete all operations.
γ€€γ€€
> This is the end of the virus prevention process. I hope you have mastered it.
As long as the computer system is infected with a virus, there will always be abnormal phenomena in the computer system. When these phenomena are found, it should usually be suspected that the system has been invaded by a virus.

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
WAGO series resource exhaustion vulnerabilities.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Russian media: the only "thick hair" cracks in the ISS air leak.
#CyberAttacks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘what is CTF?
#forBeginers

A) CTF (Capture The Flag) is a kind of information security competition that challenges contestants to solve a variety of tasks ranging from a scavenger hunt on wikipedia to basic programming exercises, to hacking your way into a server to steal data. In these challenges, the contestant is usually asked to find a specific piece of text that may be hidden on the server or behind a webpage. This goal is called the flag, hence the name!

B) Like many competitions, the skill level for CTFs varies between the events. Some are targeted towards professionals with experience operating on cyber security teams. These typically offer a large cash reward and can be held at a specific physical location. Other events target the high school and college student range, sometimes offering monetary support for education to those that place highly in the competition!

C) CTFtime details the different types of CTF. To summarize, Jeopardy style CTFs provide a list of challenges and award points to individuals or teams that complete the challenges, groups with the most points wins. Attack/Defense style CTFs focus on either attacking an opponent's servers or defending one's own. These CTFs are typically aimed at those with more experience and are conducted at a specific physical location.

CTFs can be played as an individual or in teams so feel free to get your friends onboard!

I'd like to stress that CTFs are available to everyone. Many challenges do not require programming knowledge and are simply a matter of problem solving and creative thinking.

πŸ¦‘Challenge types :

1) Jeopardy style CTFs challenges are typically divided into categories. I'll try to briefly cover the common ones.

2) Cryptography - Typically involves decrypting or encrypting a piece of data

3) Steganography - Tasked with finding information hidden in files or images

4) Binary - Reverse engineering or exploiting a binary file

5) Web - Exploiting web pages to find the flag

6) Pwn - Exploiting a server to find the flag

(some wifi resources)
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Multiple Unpatched vulnerabilities has been discovered in wireless sensor networks.
#Vulnerabilities