UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
How to Get and Set Up a Free Windows VM for Malware Analysis.pdf
1.1 MB
PRACTICAL GUIDE

Step 1: Install Virtualization Software

Step 2: Get a Windows Virtual Machine

Step 3: Update the VM and Install Malware Analysis Tools

Step 4: Isolate the Analysis VM and Disable Windows Defender AV

Step 5: Analyze Some Malware
Forwarded from UNDERCODE NEWS
Microsoft lured retired β€œbenevolent dictator” Python into state
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘No conditions are required for successful exploitation of this vulnerability.

Through this vulnerability, any application software can obtain the following information:

-Hardware data, including: system version, system compilation information, memory and CPU information, battery information, IMEI, baseband version, equipment production serial number, etc.

-Current status data, including: current Basic process information, trace results of all processes, partition mount information, routing table and ARP cache table, operator, current system service status, content provider and broadcast data structure and authority management information maintained by the system, software running time

-log Data, including: system log, system event log, kernel event log, kernel message,

-software data, including: package name, version, signature certificate, usage authority, installation time, last use time

-user sensitive data , Including: connected WiFi network (MAC address, SSID, type, IP, DNS, gateway, DHCP), surrounding available WiFi network SSID/BSSID and type, etc.; Broadcast processing history (can make statistics on user behavior ), current geographic location, historical geographic location, user name of the user's current account, user name and time of the user data synchronization account, and software usage statistics.

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Russian IT companies are outraged by the upcoming cannibalistic law against Google and Apple.
#international
Forwarded from UNDERCODE NEWS
Unique security software that major PC companies are focusing on, the rival horse is that company.
#CyberAttacks
πŸ¦‘A REAL IP SPOOFING :

Network Scanner detects SIP components, manufacturer and version information.

SIP Enumerator identifies valid SIP users and authentications information.

You can capture SIP traffic using SIP Sniffer which also supports MiTM attack.

Eavesdropper allows you listen the SIP traffic and collect the call-specific information and it supports MiTM attack too.

SIP-VSCAN detects and reports known vulnerabilities and exploits.

You can performs TDoS-based attacks, ush DoS Attack Simulator which has a powerful IP spoofer.

We have seperated MiTM Attacker which allows to act as a proxy in the network.

Attack Scenario Player allows to perform stateful SIP scenarios, and it has pre-defined attack scenarios, you can also add more.
By using SIP Password Cracker you can performs real-time digest authentication cracking by intervening which also support MiTM attack too.

Signaling Manipulator allows generating custom SIP messages helping to perform caller-id spoofing a

Β»> DOWNLOAD: https://github.com/meliht/Mr.SIP

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Radar COVID Vulnerability could allow attackers to fake identities of peoples in application.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Apple product plan transparent from M1-equipped Mac Work from home and attack the game market.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to remove password from PDF file on Linux ?

Using Pdftk
Pdftk is another great software for processing PDF documents.
it's pre-installed tool
Pdftk can do almost all kinds of pdf operations, for example;

F E A T U R E S

Encrypt and decrypt PDF files.
Combine PDF documents.
Sorting PDF pages Scanning.
Split PDF pages.
Rotate PDF files or pages.
Fill out PDF forms with X / FDF data and / or smoothing forms.
Generate stencils of FDF data from PDF forms.
Apply a background watermark or foreground print.
Check the metadata, bookmarks and PDF metadata.
Add / update PDF bookmarks or metadata.
Attach files to PDF pages or PDF document.
Unzip PDF attachments.
Expand the PDF file into separate pages.
Compressing and unpacking page streams.
Repair the damaged PDF file.
Pddftk is available in the AUR, so you can install it using any AUR helper programs on Arch Linux.


# pacaur -S pdftk
Using Packer:


# packer -S pdftk
Using Trizen:


# trizen -S pdftk
Using Yay:


# yay -S pdftk
Using Yaourt:


# yaourt -S pdftk
On Debian, Ubuntu, Linux Mint, run:


# sudo apt-get instal pdftk
On CentOS, Fedora, Red Hat:

First, install the EPEL repository:

?
# sudo yum install epel-release
Or


#sudo dnf install epel-release
Then install the PDFtk app using the command:

?
# sudo yum install pdftk
Or


#sudo dnf install pdftk
After installing pdftk, you can remove the password from the pdf document with the command:


# pdftk secure.pdf input_pw 123456 output output.pdf
Replace "123456" with the correct password.

This command decrypts the "secure.pdf" file and creates an equivalent non-password protected file named "output.pdf".
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸŒ How to clear or wipe DNS cache on Linux:

> DNS caching service Systemd-resolve.
Systemd-resolve is a systemd service that provides a system-level DNS caching service for local applications.

It is part of the systemd package that is installed by default.

> This service is enabled by default on most modern Linux operating systems such as Fedora and Ubuntu.

1) First, let's check if the systemd-resolved service is active using the command:

$ sudo systemctl is-active systemd-resolved.service

2) If the systemd-resolved service is enabled, the output will display "active".

3) If it is inactive, the system will display " inactive ".
The systemd-resolved service is active on my system.

4) Let's see the statistics of the systemd-resolve caching service using the command:

$ sudo systemd-resolve --statistics
Conclusion:

DNSSEC supported by current servers: no

Transactions
Current Transactions: 0
Total Transactions: 3117

Cache
Current Cache Size: 58
Cache Hits: 1248
Cache Misses: 1891

DNSSEC Verdicts
Secure: 0
Insecure: 0
Bogus: 0
Indeterminate: 0


As you can see, the above output shows the total of the current cache size, hits, and missed caches.

To clear the systemd-resolve cache, run:

$ sudo systemd-resolve --flush-caches
If successful, you will not see any output.

Now check the systemd-resolve statistics to see if the local DNS cache has been cleared.

$ sudo systemd-resolve --statistics
Now you will see that the current cache size is zero.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
New eclipse bug allow attacker to exploit users.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
App Store accidentally exposed imaginary pictures about touch-screen Macs.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FOR INSTAGRAM HACKING:

A) https://github.com/deathsec/instagram-py

https://github.com/DarkSecDevelopers/HiddenEye-Legacy

B) FOR UNLIMITED FOLLOWERS :

https://github.com/kaex/Insta-mass-account-creator

C) FOR INSTA BOT
https://github.com/timgrossmann/InstaPy

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Five companies including Fujitsu aim for clinical trials in the fall of 2021 as a new company for developing therapeutic agents for the new corona.
#international