UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.8K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

Unlimited Tethering (TERMUX-LINUX-WINDOWS)
Updated

Bypass tethering caps or throttling on cell phone unlimited data plans. Potentially cancel your internet and route your whole home though your unlimited data plan.

β€”Unlimited data plan
β€”Ability to hotspot your phone
β€”Computer or Router

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) Download Termux app, install openssh on it, make sure you have python2 as well and simlink the python2 command to python.

β€”pkg install python2

β€”py2_path=$(which python2)

β€”py_path=${py2_path%/*}/python

β€”ln -s "$py2_path" "$py_path"

2) Configure authentication as explained here for SSH. If you don't already have a keypair it explains how to set up an ssh keypair and use it to authenticate to your phone from a PC. I personally used my existing SSH public key and made a folder / file ~/.ssh/authorized_keys on Termux and dropped it in there with something like curl "https://github.com/rifi2k.keys" > ~/.ssh/authorized_keys if you already have your public keys on github .

3) Hotspot your phone.

Run ifconfig inside Termux to get your current tethering local IP. It will be the only 192.x.x.x spit out and generally for andriod will be ending in 192.x.43.x. Save this.

4) Run sshd -dD inside Termux which starts an openssh server in debug mode to audit traffic. Your looking to see something like this as output from the above command.

debug1: Bind to port 8022 on ::.
Server listening on :: port 8022.
debug1: Bind to port 8022 on 0.0.0.0.
Server listening on 0.0.0.0 port 8022.

5) Now pop onto a PC and connect it to your hotspot.

Now SSH tunnel all the traffic from the device back through the openssh server your running on the Termux app. Now that you are on the same local network you can SSH tunnel into our saved IP address and port from earlier 192.x.43.x:8022 or similar.

6) You can use ssh which would look something like this.

If you want to use OpenSSH on Windows my recommendation would be Chocolatey package manager. https://gitlab.com/DarwinJS/ChocoPackages/tree/master/openssh

TERMUX_USER="u0_a249"
TERMUX_IP="192.x.43.x"
TERMUX_PORT="8022"
LOCAL_SOCKS_PORT="8123"
ssh -D $LOCAL_SOCKS_PORT -fqgN $TERMUX_USER@$TERMUX_IP -p $TERMUX_PORT
TERMUX_USER would be your username on the Termux app. TERMUX_IP would be the IP you got from ifconfig in Termux. TERMUX_PORT would be the port sshd is using in Termux. LOCAL_SOCKS_PORT would be the port you want to use for your local proxy.

7) So then once you run the above ssh command you need to configure a system wide or application specific Socks Proxy which would be proxying all traffic to 127.0.0.1 for the Socks Host and whatever LOCAL_SOCKS_PORT is from above for the Socks Port.

I use sshuttle which already handles most of the gotchas with tcp over tcp etc. and which also has a solution for Windows and linux. Also sshuttle generally handles setting up the Socks Proxy for you. A command for sshuttle might look like this.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The Russians have released a smartphone with a giant screeN .
#Technologies
Forwarded from UNDERCODE NEWS
Ozon will earn more than $ 1 billion on IPO.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘APPS & TIPS FOR VIEWS & SUBSC YOUTUBE :

https://play.google.com/store/apps/details?id=com.viewgrip.viewgripapp&hl=en&gl=US
(VIEWS)

https://play.google.com/store/apps/details?id=com.fairware.viralmyvideo&hl=en&gl=US
(VIEWS)

https://github.com/mayurkadampro/YouTube-SubBot
(BOT FOR SUBSC)
Part 1 Youtube Subscriber Python Bot - https://youtu.be/xXXryQw6CYc

Part 2 Youtube Subscriber Python Bot - https://youtu.be/M_ZauWVzWKc

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Thousands of employees return to Beeline: The operator refused to outsource communication networks.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Pentest with java..
Leshan provides libraries which help people to develop their own Lightweight M2M server and client.
The project also provides a client, a server and a bootstrap server demonstration as an example of the Leshan API and for testing purpose.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) Get and run the last binary of our demo server :

wget https://ci.eclipse.org/leshan/job/leshan/lastSuccessfulBuild/artifact/leshan-server-demo.jar
java -jar ./leshan-server-demo.jar

2) Get and run the last binary of our demo client :

wget https://ci.eclipse.org/leshan/job/leshan/lastSuccessfulBuild/artifact/leshan-client-demo.jar
java -jar ./leshan-client-demo.jar

3) Get and run the last binary of our bootstrap demo server :

wget https://ci.eclipse.org/leshan/job/leshan/lastSuccessfulBuild/artifact/leshan-bsserver-demo.jar
java -jar ./leshan-bsserver-demo.jar
ℹ️ : All the demos have a --help option.

πŸ¦‘Compile Leshan & Run Demos

4) Get sources :

#using ssh
git clone git@github.com:eclipse/leshan.git
or

#using https

5) git clone https://github.com/eclipse/leshan.git

Compile it, by running in leshan root folder :

6) mvn clean install

7) Run demo server:

java -jar leshan-server-demo/target/leshan-server-demo-*-SNAPSHOT-jar-with-dependencies.jar

8) Connect on Leshan demo UI: http://localhost:8080
Leshan server Demo provides a very simple UI to get the list of connected clients and interact with clients resources.

9) Now you can register a LWM2M client by running our client demo:

java -jar leshan-client-demo/target/leshan-client-demo-*-SNAPSHOT-jar-with-dependencies.jar
or trying the Eclipse Wakaama test client.

10) You can also try our bootstrap demo server:

java -jar leshan-bsserver-demo/target/leshan-bsserver-demo-*-SNAPSHOT-jar-with-dependencies.jar

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Black Rota, a highly-based malware that makes analysis impossible through obfuscation.
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST WIFI ANALYSING APPS FOR WINDOWS:

https://www.metageek.com/products/inssider/index-2.html

https://www.microsoft.com/en-us/store/p/wifi-analyzer/9nblggh33n0n

https://www.vistumbler.net/

https://www.wireshark.org/

https://www.microsoft.com/en-us/p/wifi-analyzer-tool/9nblggh1nj0s?activetab=pivot%3aoverviewtab

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Hacker's are targeting google play again with adware and hidden backdoor's
#Malwares
Forwarded from UNDERCODE NEWS
Xiaomi has released a super-cheap smartphone with a record battery and declared its independence.
#Technologies
Forwarded from UNDERCODE NEWS
A new potential leak of the magic cookie in SUSE Linux Enterprise discovered today, leaving millions of Europ servers vulnerable against attackers
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘.onion links:
(ue tor server for opening those links)

DarkZone http://darkzonebry27nxa.onion/ online

Money Market http://moneyd6327quniuo.onion online

Dark Web Hackers Zone http://darkzonebry27nxa.onion/ online

Trusted Market http://trustedb3yde3prf.onion online

GUROchan http://gurochanocizhuhg.onion/ offline

Aktif Haber http://6a3nny6zpg23dj7g.onion/ offline

zmovie – Watch Movies online for free on zmovie.tv http://
zmovietoropzaid3.onion/ online

IW4x http://iw4xcachep26muba.onion/ online
Rent-A-Hacker – Hire a hacker for every job you can imagine,
from DDOS to completely ruining people or destroy reputation of a company or individual http://2ogmrlfzdthnwkez.onion/ online


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Beware of malicious code infection and phishing impersonation by the National Tax Service after opening'e-tax invoice'
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘methods to bypass anti-crawlers in python:

1) On the way we climbed, there were different routes to reach the end. Because of the different routes chosen, the difficulty of climbing is also different. Just like when I taught you how to get data in the past few days, I have intermittently talked about methods such as header and address ip. I believe you have mastered the specific crawling methods. This editor is mainly for you to sort out the anti-crawler methods. While reviewing the methods, you can check and fill in the gaps and establish a systematic crawler knowledge framework.

2) First analyze the website to be crawled, which is essentially an information query system that provides a search page. For example, if I want to get a case, I need to use the id or name field of the case to search for the page of this case.

3) For security considerations, some websites will take some anti-crawl measures, such as the need to judge user-angent and cookies as mentioned before, or judge whether the requested IP has been accessed multiple times in a short period of time. This website uses the security service of Know Chuangyu, frequent visits will prompt abnormal ip behavior.

πŸ¦‘The browser is essentially an application. As long as the ip is not blocked, since it can be accessed through the browser, it should be no problem for us to write a program to request it.

Some common measures to bypass anti-reptiles are:

1) Structure the message header: The user-angent and cookies mentioned above are all included in the message header.

2) Extend the request interval: If you send requests quickly and frequently, a large amount of server resources will be preempted.

> In this case, it is easy to be detected by the security measures of the website and block the IP.

3) Therefore, the request interval should be extended appropriately, such as sending the next request at random intervals ranging from 2-5 seconds.

4) Use proxy ip to solve ip detection problems.
Of course, the common anti-crawler methods are not limited

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
A big mistake creating access list with 6-digit phone number, increase accessibility to'digitally vulnerable groups'
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Search "Yandex" switched to neurotechnology, which he has been focusing on for 10 years.
#Updates