UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A simple way for others to prompt for an empty number when they call your phone

When you don't want to be annoyed by others and are embarrassed to turn off the phone, it is a good idea to let others call your phone to prompt an empty number. Here is a way to make your mobile phone become an empty number at any time. It is very simple~~ Friends in need can make a note...
γ€€γ€€
Enter **21*999999# in the standby mode and press the dial button~ OK ! ~ done
γ€€γ€€
example someone hit you over the phone number is empty and you will not receive phone preliminary judging most phones can
γ€€γ€€
Note: Since there is no test for all models, we can not guarantee success rate
exγ€€γ€€

the code number to cancel the empty state is the same as above ## 21 # enter the
γ€€γ€€
last remind remember to finish off state so as not to cause delay in releasing the empty No.
γ€€γ€€
this principle probably use call forwarding to achieve, but do not answer incoming calls There is no charge if you pass, so this method will not waste your phone bill

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The startup sound is back on the Apple Silicon-equipped Mac, I’m worried about software compatibility.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Another good wordpress bot :

Promise API
Stream API
Pagination API
HTTP2 support
Request cancelation
RFC compliant caching
Follows redirects
Retries on failure
Progress events
Handles gzip/deflate/brotli
Timeout handling
Errors with metadata
JSON mode
WHATWG URL support
HTTPS API
Hooks
Instances with custom defaults
Types
Composable
Plugins

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) https://github.com/sindresorhus/got

2) cd got

3) $ npm install got

4) Promise
const got = require('got');

(async () => {
try {
const response = await got('https://sindresorhus.com');
console.log(response.body);
//=> '<!doctype html> ...'
} catch (error) {
console.log(error.response.body);
//=> 'Internal server error ...'
}
})();
JSON
const got = require('got');

(async () => {
const {body} = await got.post('https://httpbin.org/anything', {
json: {
hello: 'world'
},
responseType: 'json'
});

console.log(body.data);
//=> {hello: 'world'}
})();

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
New Amazon Bug allowing an attacker to decrypts and becomes particularly important in a multi-recipient setting.
#Bugs
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The new amazon Bug:

AWS: In-band protocol negotiation and robustness weaknesses in AWS KMS and Encryption SDKs

{
"eventVersion": "1.05",
"userIdentity": {
"type": "AWSAccount",
"principalId": "<redacted this is the principal ID of the victim>",
"accountId": "<redacted - this is the AWS account ID of the victim>"
},
"eventTime": "2020-06-21T21:05:04Z",
"eventSource": "kms.amazonaws.com",
"eventName": "Decrypt",
"awsRegion": "us-west-2",
"sourceIPAddress": "<redacted - this is the IP address of the victim>",
"userAgent": "<redacted - this is the user agent of the victim>",
"errorCode": "InvalidCiphertextException",
"requestParameters": {
// The encryption context might include other data from the victim
"encryptionContext": {
"aws-crypto-public-key": "AzfNOGOnNYFmpHspKrAm1L6XtRybONkmkhmB/IriKSA7b2NsV4MEPMph9yX2KTPKWw=="
},
"encryptionAlgorithm": "SYMMETRIC_DEFAULT"
},
"responseElements": null,
"requestID": "aeced8e8-75a2-42c3-96ac-d1fa2a1c5ee6",
"eventID": "780a0a6e-4ad8-43d4-a426-75d05022f870",
"readOnly": true,
"resources": [
{
"accountId": "<redacted - this is the account ID of the attacker>",
"type": "AWS::KMS::Key",
"ARN": <redacted - this is the key ARN of the attacker>
}
],
"eventType": "AwsApiCall",
"recipientAccountId": "<redacted - this is the account ID of the attacker>",
"sharedEventID": "033e147c-8a36-42f5-9d6c-9e071eb752b7"
}

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
2020 Korea Digital Forensics Society Winter Conference.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A scamming message for Hosting letter:

Dear CEO,

(It's very urgent, please transfer this email to your CEO. If this email affects you, we are very sorry, please ignore this email. Thanks)

We are a Network Service Company which is the domain name registration center in China.
We received an application from Hua Hai Ltd on June 17 , 2019. They want to register ”itsecforu” as their Internet Keyword and ”itsecforu .cnβ€œ 、 ”itsecforu .com.cn” 、 ”itsecforu .net.cnβ€œ 、 ”itsecforu .org.cn ”、” itsecforu .asia β€œdomain names, they are in China and Asia domain names. But after checking it, we find ”itsecforu” conflicts with your company. In order to deal with this matter better, so we send you email and confirm whether this company is your distributor or business partner in China or not?



Best Regards

*************************************

Mike Zhang | Service Manager

Cn YG Domain (Head Office)

8006, Xinlong Building, No. 415 WuBao Road, Shanghai 201105, China

Tel: + 86-2161918696 | Fax: + 86-2161918697 | Mob: + 86-1582177 1823

Web: www (dot) cnygdomain (dot) com (dot) cn

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
All JetBrains clients should update their products.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
A wireless networking system has been developed by the Russians underwater. In the planet, there are no analogues
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ–§LINUX SECURITY TIP
How to monitor packets passing through the firewall


Configure rsyslog to use the log file /var/log/firewall_trace.log for firewall tracing.

$ cat << EOF | sudo tee /etc/rsyslog.d/01-firewall_trace.conf
# Log messages generated by iptables firewall to file
if \ $ syslogfacility-text == 'kern' and \ $ msg contains 'TRACE' then /var/log/firewall_trace.log
# stop processing it further
& stop
EOF
Apply rsyslog configuration.

$ sudo systemctl restart rsyslog
Rotate the log file to save disk space.
$ cat << EOF | sudo tee /etc/logrotate.d/firewall_trace.conf
/var/log/firewall_trace.log
{
rotate 7
daily
missingok
notifempty
delaycompress
compress
postrotate
invoke-rc.d rsyslog rotate> / dev / null
endscript
}
EOF
You should be sure to rate these logs hourly by size or send them to an external logging service, which I highly recommend.
How to track incoming packages
Use raw and PREROUTING to monitor packets coming in on any network interface.

$ sudo iptables -t raw -A PREROUTING -p tcp --destination 1.2.3.4 --dport 443 -j TRACE
Let's see the raw table
$ sudo iptables -t raw -L -v -n --line-numbers
Chain PREROUTING (policy ACCEPT 3501 packets, 946K bytes)
num pkts bytes target prot opt ​​in out source destination
1 468 28159 TRACE tcp - * * 0.0.0.0/0 1.2.3.4 tcp dpt: 443
Chain OUTPUT (policy ACCEPT 885 packets, 695K bytes)
num pkts bytes target prot opt ​​in out source destination
The trail to the internal network will look like this.

[...]
Jul 18 18:33:27 cerberus kernel: [68907.892027] TRACE: raw: PREROUTING: policy: 2 IN = eth0 OUT = MAC = 00: 15: 17: c3: a1: aa: 00: 15: 17: c3: fb : 07: 01: 00 SRC = 172.69.63.16 DST = 1.2.3.4 LEN = 40 TOS = 0x00 PREC = 0x00 TTL = 56 ID = 64783 DF PROTO = TCP SPT = 62598 DPT = 443 SEQ = 234589096 ACK = 404477568 WINDOW = 82 RES = 0x00 ACK URGP = 0
Jul 18 18:33:27 cerberus kernel: [68907.892093] TRACE: mangle: INPUT: policy: 1 IN = eth0 OUT = MAC = 00: 15: 17: c3: a1: aa: 00: 15: 17: c3: fb : 07: 01: 00 SRC = 172.69.63.16 DST = 1.2.3.4 LEN = 40 TOS = 0x00 PREC = 0x00 TTL = 56 ID = 64783 DF PROTO = TCP SPT = 62598 DPT = 443 SEQ = 234589096 ACK = 404477568 WINDOW = 82 RES = 0x00 ACK URGP = 0
Jul 18 18:33:27 cerberus kernel: [68907.892113] TRACE: filter: INPUT: rule: 6 IN = eth0 OUT = MAC = 00: 15: 17: c3: a1: aa: 00: 15: 17: c3: fb : 07: 01: 00 SRC = 172.69.63.16 DST = 1.2.3.4 LEN = 40 TOS = 0x00 PREC = 0x00 TTL = 56 ID = 64783 DF PROTO = TCP SPT = 62598 DPT = 443 SEQ = 234589096 ACK = 404477568 WINDOW = 82 RES = 0x00 ACK URGP = 0
Jul 18 18:33:27 cerberus kernel: [68907.892150] TRACE: raw: PREROUTING: policy: 2 IN = eth0 OUT = MAC = 00: 15: 17: c3: a1: aa: 00: 15: 17: c3: fb : 07: 01: 00 SRC = 172.69.63.16 DST = 1.2.3.4 LEN = 40 TOS = 0x00 PREC = 0x00 TTL = 56 ID = 64784 DF PROTO = TCP SPT = 62598 DPT = 443 SEQ = 234589096 ACK = 404477569 WINDOW = 82 RES = 0x00 ACK RST URGP = 0
[...]
Map the filyer table, INPUT chain, rule number 6, which will accept bound and established connections.

$ sudo iptables -t filter -L INPUT 6 -v -n --line-numbers
6 979K 851M ACCEPT all - * * 0.0.0.0/0 0.0.0.0/0
Remove the first rule in the raw table, the PREROUTING chain.
$ sudo iptables -t raw -D PREROUTING 1

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Alibaba is subject to another class action, and plaintiffs argue that compensation focuses on mediation rather than victory.
#international
Forwarded from UNDERCODE NEWS
The two leading wireless headsets plummeted, the company responded: everything is normal.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Malware on your phone IS possible ?
Most people doubt that mobile devices can get infected with malware.

It's true?

That's 101% possible, well, maybe not in the standard traditional method, for iPhone and Apple devices.

But, technically, the same process applies.
Let's look at the problem more specifically.

1) Once the malware connects to your phone, it performs several operations.

2) Competing with your phone's resources and destroying many programs.

The classic signs of malware on your phone are:

Apps take longer to load

> Your battery is draining faster than usual

> Apps you haven't downloaded appear as available

#FastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Why does the phone recognize you wearing a mask? Mainly because of it.
#Technologies
Forwarded from UNDERCODE NEWS
Unpatched Cisco Security Manager Java Deserialization Vulnerabilities.
#Vulnerabilities \
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Some Good websites for Steam Games:

www.gamecards.com

www.offgamers.com

www.gamersgate.com

www.instant-gaming.com

www.kinguin.net

www.getgamesgo.com

www.bundlestars.com

www.dlgamer.us

www.yuplay.com

www.elitekeys.com

www.gog.com

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Apple customer service responds to iPhone 12 screen "green" situation: will be fixed in the new system
#Updates