UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
2020 Korea Digital Forensics Society Winter Conference.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A scamming message for Hosting letter:

Dear CEO,

(It's very urgent, please transfer this email to your CEO. If this email affects you, we are very sorry, please ignore this email. Thanks)

We are a Network Service Company which is the domain name registration center in China.
We received an application from Hua Hai Ltd on June 17 , 2019. They want to register ”itsecforu” as their Internet Keyword and ”itsecforu .cnβ€œ 、 ”itsecforu .com.cn” 、 ”itsecforu .net.cnβ€œ 、 ”itsecforu .org.cn ”、” itsecforu .asia β€œdomain names, they are in China and Asia domain names. But after checking it, we find ”itsecforu” conflicts with your company. In order to deal with this matter better, so we send you email and confirm whether this company is your distributor or business partner in China or not?



Best Regards

*************************************

Mike Zhang | Service Manager

Cn YG Domain (Head Office)

8006, Xinlong Building, No. 415 WuBao Road, Shanghai 201105, China

Tel: + 86-2161918696 | Fax: + 86-2161918697 | Mob: + 86-1582177 1823

Web: www (dot) cnygdomain (dot) com (dot) cn

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
All JetBrains clients should update their products.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
A wireless networking system has been developed by the Russians underwater. In the planet, there are no analogues
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ–§LINUX SECURITY TIP
How to monitor packets passing through the firewall


Configure rsyslog to use the log file /var/log/firewall_trace.log for firewall tracing.

$ cat << EOF | sudo tee /etc/rsyslog.d/01-firewall_trace.conf
# Log messages generated by iptables firewall to file
if \ $ syslogfacility-text == 'kern' and \ $ msg contains 'TRACE' then /var/log/firewall_trace.log
# stop processing it further
& stop
EOF
Apply rsyslog configuration.

$ sudo systemctl restart rsyslog
Rotate the log file to save disk space.
$ cat << EOF | sudo tee /etc/logrotate.d/firewall_trace.conf
/var/log/firewall_trace.log
{
rotate 7
daily
missingok
notifempty
delaycompress
compress
postrotate
invoke-rc.d rsyslog rotate> / dev / null
endscript
}
EOF
You should be sure to rate these logs hourly by size or send them to an external logging service, which I highly recommend.
How to track incoming packages
Use raw and PREROUTING to monitor packets coming in on any network interface.

$ sudo iptables -t raw -A PREROUTING -p tcp --destination 1.2.3.4 --dport 443 -j TRACE
Let's see the raw table
$ sudo iptables -t raw -L -v -n --line-numbers
Chain PREROUTING (policy ACCEPT 3501 packets, 946K bytes)
num pkts bytes target prot opt ​​in out source destination
1 468 28159 TRACE tcp - * * 0.0.0.0/0 1.2.3.4 tcp dpt: 443
Chain OUTPUT (policy ACCEPT 885 packets, 695K bytes)
num pkts bytes target prot opt ​​in out source destination
The trail to the internal network will look like this.

[...]
Jul 18 18:33:27 cerberus kernel: [68907.892027] TRACE: raw: PREROUTING: policy: 2 IN = eth0 OUT = MAC = 00: 15: 17: c3: a1: aa: 00: 15: 17: c3: fb : 07: 01: 00 SRC = 172.69.63.16 DST = 1.2.3.4 LEN = 40 TOS = 0x00 PREC = 0x00 TTL = 56 ID = 64783 DF PROTO = TCP SPT = 62598 DPT = 443 SEQ = 234589096 ACK = 404477568 WINDOW = 82 RES = 0x00 ACK URGP = 0
Jul 18 18:33:27 cerberus kernel: [68907.892093] TRACE: mangle: INPUT: policy: 1 IN = eth0 OUT = MAC = 00: 15: 17: c3: a1: aa: 00: 15: 17: c3: fb : 07: 01: 00 SRC = 172.69.63.16 DST = 1.2.3.4 LEN = 40 TOS = 0x00 PREC = 0x00 TTL = 56 ID = 64783 DF PROTO = TCP SPT = 62598 DPT = 443 SEQ = 234589096 ACK = 404477568 WINDOW = 82 RES = 0x00 ACK URGP = 0
Jul 18 18:33:27 cerberus kernel: [68907.892113] TRACE: filter: INPUT: rule: 6 IN = eth0 OUT = MAC = 00: 15: 17: c3: a1: aa: 00: 15: 17: c3: fb : 07: 01: 00 SRC = 172.69.63.16 DST = 1.2.3.4 LEN = 40 TOS = 0x00 PREC = 0x00 TTL = 56 ID = 64783 DF PROTO = TCP SPT = 62598 DPT = 443 SEQ = 234589096 ACK = 404477568 WINDOW = 82 RES = 0x00 ACK URGP = 0
Jul 18 18:33:27 cerberus kernel: [68907.892150] TRACE: raw: PREROUTING: policy: 2 IN = eth0 OUT = MAC = 00: 15: 17: c3: a1: aa: 00: 15: 17: c3: fb : 07: 01: 00 SRC = 172.69.63.16 DST = 1.2.3.4 LEN = 40 TOS = 0x00 PREC = 0x00 TTL = 56 ID = 64784 DF PROTO = TCP SPT = 62598 DPT = 443 SEQ = 234589096 ACK = 404477569 WINDOW = 82 RES = 0x00 ACK RST URGP = 0
[...]
Map the filyer table, INPUT chain, rule number 6, which will accept bound and established connections.

$ sudo iptables -t filter -L INPUT 6 -v -n --line-numbers
6 979K 851M ACCEPT all - * * 0.0.0.0/0 0.0.0.0/0
Remove the first rule in the raw table, the PREROUTING chain.
$ sudo iptables -t raw -D PREROUTING 1

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Alibaba is subject to another class action, and plaintiffs argue that compensation focuses on mediation rather than victory.
#international
Forwarded from UNDERCODE NEWS
The two leading wireless headsets plummeted, the company responded: everything is normal.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Malware on your phone IS possible ?
Most people doubt that mobile devices can get infected with malware.

It's true?

That's 101% possible, well, maybe not in the standard traditional method, for iPhone and Apple devices.

But, technically, the same process applies.
Let's look at the problem more specifically.

1) Once the malware connects to your phone, it performs several operations.

2) Competing with your phone's resources and destroying many programs.

The classic signs of malware on your phone are:

Apps take longer to load

> Your battery is draining faster than usual

> Apps you haven't downloaded appear as available

#FastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Why does the phone recognize you wearing a mask? Mainly because of it.
#Technologies
Forwarded from UNDERCODE NEWS
Unpatched Cisco Security Manager Java Deserialization Vulnerabilities.
#Vulnerabilities \
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Some Good websites for Steam Games:

www.gamecards.com

www.offgamers.com

www.gamersgate.com

www.instant-gaming.com

www.kinguin.net

www.getgamesgo.com

www.bundlestars.com

www.dlgamer.us

www.yuplay.com

www.elitekeys.com

www.gog.com

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Apple customer service responds to iPhone 12 screen "green" situation: will be fixed in the new system
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to edit a file without changing its timestamp on Linux ?

Editing a file without changing its timestamp on Linux
The file time stamp can be updated using the touch command .

Time stamps are also updated when we manually add content to or remove data from the file.

If you want to change the contents of files without changing its timestamps, there is no direct way to do this. But it is possible!

We can use one of the touch command options -r (link) to preserve the timestamps of the file after editing or modification. The -r parameter is used to set the timestamps of one file to the timestamps of another.

I have a text file named undercode .txt.

Let's take a look at the timestamps of this file using the stat command:

$ stat undercode .txt
File: undercode .txt
Size: 38 Blocks: 8 IO Block: 4096 regular file
Device: 801h/2049d Inode: 4351679 Links: 1
Access: (0775/-rwxrwxr-x) Uid: ( 1000/ sk) Gid: ( 1000/ sk)
Access: 2020-11-17 19:47:55.992788870 +0530
Modify: 2020-11-17 19:47:55.992788870 +0530
Change: 2020-11-17 19:47:55.992788870 +0530
Birth: -
As mentioned, if we change the content or metadata of this file, the timestamps will also change.

$ touch -r undercode.txt undercode .timestamp
Let's check the timestamps of the new file:
$ stat undercode.timestamp
File: undercode .timestamp
Size: 0 Blocks: 0 IO Block: 4096 regular empty file
Device: 801h/2049d Inode: 4328645 Links: 1
Access: (0664/-rw-rw-r--) Uid: ( 1000/ sk) Gid: ( 1000/ sk)
Access: 2020-11-17 19:47:55.992788870 +0530
Modify: 2020-11-17 19:47:55.992788870 +0530
Change: 2020-11-17 19:48:48.934235300 +0530
Birth: -
See?

The atime and mtime of both files are the same!

Now make your changes to the main file, i.e. undercode .txt.

As you might have guessed, the timestamps of the main file will change.

Finally, copy the timestamps of the new file, for example undercode .timestamp, into the main file:
$ touch -r undercode .timestamp undercode.txt

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
OPPO released X2021 scroll screen concept machine: screen size 6.7-7.4 inches.
#Technologies
Forwarded from UNDERCODE NEWS
KonaWiki3 leave millions of users vulnerables against attacks.
#Vulnerabilities