UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Say goodbye to boring video conferencing, Apple’s β€œmmhmm” launch.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to use ASP.NET to encrypt password ?

In ASP, encrypted objects are not provided, we can only use external objects to encrypt. Well now, the encryption solution is provided in ASP.NET. In the namespace System.Web.Security contains the class FormsAuthentication, which has a method HashPasswordForStoringInConfigFile. This method can turn the characters provided by the user into garbled codes, and then store them, or even store them in cookies.
The HashPasswordForStoringInConfigFile method is very simple to use, it supports "SHA1" and "MD5" encryption algorithms.
The following code simply demonstrates its usage:
<%@ Page language="c#" %>
<%@ Import Namespace="System.Web.Security" %>
<html>
<head>
<script language="C#" runat="server">
public void encryptString(Object sender, EventArgs e)
{
SHA1.Text = FormsAuthentication.
MD5.Text =FormsAuthentication.HashPasswordForStoringInConfigFile(txtPassword.Text, "MD5");
}
</script>
</head>
<body>
<form runat="server" ID="Form1">
<p>
<b>Original Clear Text Password: </b>
<br>
<asp:Textbox id="txtPassword" runat="server" />
<asp:Button runat="server" text="Encrypt String" onClick="encryptString" ID="Button1 "/>
</p>
<p>
<b>Encrypted Password In SHA1: </b>
<asp:label id="SHA1" runat="server" />
</p>
<p>
<b>Encrypted Password In MD5: </b>
<asp:label id="MD5" runat="server" />
</p>
</form>
</body>
</html>
As you can see, it is so easy to use. We can encapsulate this encryption program in a function for repeated use. The code is as follows:
public string EncryptPassword(string PasswordString,string PasswordFormat)
{
if (PasswordFormat="SHA1"){
EncryptPassword=FormsAuthortication.HashPasswordForStoringInConfigFile(PasswordString ,"SHA1");
}
elseif (PasswordFormat="MD5")
{EncryptPassword=FormsAuthortication. HashPasswordForStoringInConfigFile(PasswordString ,"MD5");
}
else
{
EncryptPassword="";
}
We can add a field to the database and use insert to store the encrypted password as a string in the database. When the user logs in, the encrypted result of the password entered by the user can be compared with the correct result in the database, and the correctness of the password can be verified by this method

@uNDERCODETesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
PS5 is crispy by adopting explosive SSD, initially opposed to adopting "liquid metal"
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FREE FOR NOW, HACK & FIND :

Name of Breach

Domain Name

Date of Breach

Fabrication status

Verification Status

Retirement status

Spam Status

πŸ¦‘FOR :
Kali Linux
BlackArch Linux
Kali Nethunter
Termux

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

A) Ubuntu / Kali Linux / Nethunter / Termux

1) git clone https://github.com/thewhiteh4t/pwnedOrNot.git

2) cd pwnedOrNot

3) pip3 install requests


B) BlackArch Linux

pacman -S pwnedornot

C) Docker

docker pull thewhiteh4t/pwnedornot
docker create -it --name pon thewhiteh4t/pwnedornot
docker start pon -i
MORE USAGE ON SAME GIT LINK..

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Qualcomm has been approved to sell 4G chips to Huawei.
#Technologies
πŸ¦‘Free official-Code Your First Game: Arcade Classic in JavaScript on Canvas
#LimitedTime

4,5 rating

Display, position, and move filled shapes for retro and prototype gameplay

Move a ball around your game space such that it bounces off boundaries

Handle real-time mouse input

Detect and respond to simple collisions

Program very basic artificial intelligence

Keep and display score during play

Understand the subtle, key difference between a classic game in
this style which is fun to play versus one that isn't

Define and code a win condition and end state for your game


πŸ¦‘https://www.udemy.com/course/code-your-first-game/
Forwarded from UNDERCODE NEWS
CCB Labuan Branch statement: not a blockchain bond issuer and does not accept bitcoin transactions.
#international
How to Get and Set Up a Free Windows VM for Malware Analysis.pdf
1.1 MB
PRACTICAL GUIDE

Step 1: Install Virtualization Software

Step 2: Get a Windows Virtual Machine

Step 3: Update the VM and Install Malware Analysis Tools

Step 4: Isolate the Analysis VM and Disable Windows Defender AV

Step 5: Analyze Some Malware
Forwarded from UNDERCODE NEWS
Microsoft lured retired β€œbenevolent dictator” Python into state
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘No conditions are required for successful exploitation of this vulnerability.

Through this vulnerability, any application software can obtain the following information:

-Hardware data, including: system version, system compilation information, memory and CPU information, battery information, IMEI, baseband version, equipment production serial number, etc.

-Current status data, including: current Basic process information, trace results of all processes, partition mount information, routing table and ARP cache table, operator, current system service status, content provider and broadcast data structure and authority management information maintained by the system, software running time

-log Data, including: system log, system event log, kernel event log, kernel message,

-software data, including: package name, version, signature certificate, usage authority, installation time, last use time

-user sensitive data , Including: connected WiFi network (MAC address, SSID, type, IP, DNS, gateway, DHCP), surrounding available WiFi network SSID/BSSID and type, etc.; Broadcast processing history (can make statistics on user behavior ), current geographic location, historical geographic location, user name of the user's current account, user name and time of the user data synchronization account, and software usage statistics.

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Russian IT companies are outraged by the upcoming cannibalistic law against Google and Apple.
#international
Forwarded from UNDERCODE NEWS
Unique security software that major PC companies are focusing on, the rival horse is that company.
#CyberAttacks
πŸ¦‘A REAL IP SPOOFING :

Network Scanner detects SIP components, manufacturer and version information.

SIP Enumerator identifies valid SIP users and authentications information.

You can capture SIP traffic using SIP Sniffer which also supports MiTM attack.

Eavesdropper allows you listen the SIP traffic and collect the call-specific information and it supports MiTM attack too.

SIP-VSCAN detects and reports known vulnerabilities and exploits.

You can performs TDoS-based attacks, ush DoS Attack Simulator which has a powerful IP spoofer.

We have seperated MiTM Attacker which allows to act as a proxy in the network.

Attack Scenario Player allows to perform stateful SIP scenarios, and it has pre-defined attack scenarios, you can also add more.
By using SIP Password Cracker you can performs real-time digest authentication cracking by intervening which also support MiTM attack too.

Signaling Manipulator allows generating custom SIP messages helping to perform caller-id spoofing a

Β»> DOWNLOAD: https://github.com/meliht/Mr.SIP

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Radar COVID Vulnerability could allow attackers to fake identities of peoples in application.
#Vulnerabilities