UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.9K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
InterScan Messaging Security expose a critical bugs could allow attackers to gain remotely control.
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘fACEBOOK PENTESTING:

Facebook friend info fetcher
Get ID from friend
Get ID friend from friend
Get group member ID
Get email friend
Get email friend from friend
Get a friend's phone number
Get a friend's phone number from friend
Mini Hack Facebook(Target)
Multi Bruteforce Facebook
Super Multi Bruteforce Facebook
BruteForce(Target)
Yahoo Checker
Bot Reactions Target Post
Bot Reactions group Post
BOT COMMENT Target Post
BOT COMMENT group Post
Mass delete Post
Mass accept friends
Mass delete friend
ACreate Post
Create Wordlist
Account Checker
See my group list
Profile Guard

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

$ git clone https://github.com/mkdirlove/FBTOOL

$ cd FBTOOL

$ sudo python2 fbtool.py

$ python2 fbtool.py

then choose option via numbers

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
There is no cure for "big data".
#Analytiques
Forwarded from UNDERCODE NEWS
The law on "remote control" has been adopted. You can stay without communication with the authorities for no more than 2 days.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘UNDERSTANDING REGISTRY:
Registry subkeys under HKEY_CLASSES_ROOT

The list of registry keys in the HKEY_CLASSES_ROOT hive is very long and just as confusing. We can't explain every one of the thousands of keys that you can see there, but we can break it down into several manageable parts that will hopefully clarify this part of the registry a bit.

πŸ¦‘Here are some of the many file extension association keys you'll find in the HKEY_CLASSES_ROOT hive, most of which start with a period:

HKEY_CLASSES_ROOT \ .avi
HKEY_CLASSES_ROOT \ .bmp
HKEY_CLASSES_ROOT \ .exe
HKEY_CLASSES_ROOT \ .html
HKEY_CLASSES_ROOT \ .pdf
HKEY_CLASSES_ROOT \ AudioCD
HKEY_CLASSES_ROOT \ dllfile
...
Each of these registry keys stores information about what Windows should do when you double-click or double-tap a file with that extension. It may include a list of programs that can be found in the "Open With ..." section when right-clicking / tapping on a file, as well as the path to each of the listed applications.

For example, on your computer, when you open a file named draft.rtf, the file can be opened with WordPad. The registry data that is responsible for this is stored in the HKEY_CLASSES_ROOT \ .rtf key, which defines WordPad as the program that should open the RTF file.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Designated as a specialized organization for combining pseudonym information, Samsung SDS, Statistics, etc.
#international
Forwarded from UNDERCODE NEWS
Samsung takes the normal mobile format into oblivion.
#international #Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘host a malware detection sys:

A) AIDE (full name "Advanced Intrusion Detection Environment") is a host-based open source intrusion detection system. AIDE checks the integrity of system binary files and basic configuration files by checking the inconsistency of many file attributes. These file attributes include permissions, file types, inodes, number of links, link names, users, user groups, and file sizes. , Block count, modification time, access time, creation time, access control list (acl), SELinux security context, xattrs and md5/sha checksum.

B) AIDE builds a file attribute database by scanning the file system of a Linux server that has not been tampered with. Then, it checks the file attributes of the server against the database, and then when the server is running, it warns if there are any changes to the index file. It is for this reason that whenever the system is updated or configuration files are changed due to legitimate reasons, AIDE must re-index the protected files.

Β» For some customers, their security policy may require some kind of intrusion detection system (IDS) to be installed on the server. But whether the customer requires IDS or not, it is a good practice for system administrators to deploy IDS.

C) Install AIDE on CentOS or RHEL

The initial installation (and first run) of AIDE is best performed on the system where the operating system has just been installed, and no service is exposed to the Internet or even to the LAN. In this early stage, we can minimize the risk of all intrusions and tampering from the outside. In fact, this is the only way to ensure that the system is clean when AIDE builds its initial database.

Β»For this reason, after we install AIDE using the command # yum install aide, we need to disconnect our machine from the network and perform some basic configuration tasks, as described below.

D) Configure AIDE

The default configuration file is located in /etc/aide.conf. The file provides several example protection rules (such as FIPSR, NORMAL, DIR, and DATAONLY). Each rule is followed by an equal sign and a list of file attributes to be checked, or any predefined rules (separated by +). You can also use this format to define any custom rules.


FIPSR = p+i+n+u+g+s+m+c+acl+selinux+xattrs+sha256

NORMAL = FIPSR+sha512

Run AIDE for the first time

E) Run the following command to initialize the AIDE database:

# aide --init



The /var/lib/aide/aide.db.new.gz file generated according to /etc/aide.conf needs to be renamed to /var/lib/aide/aide.db.gz so that AIDE can read it:

# mv /var/lib/aide/aide.db.new.gz /var/lib/aide.db.gz

Now, it’s time to perform our first system check against the database. To do this, just run:

# aide

When called without options, AIDE assumes the use of --check.

If no changes have been made since the database was created, AIDE will return an OK message after finishing the check.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁'
Forwarded from UNDERCODE NEWS
Human Credit Union,’Internet Newspaper and Quality Journalism Forum’ and’Press Awards Ceremony’
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ANDROID 11 TIP:

Enabling chat notification bubbles on Android 11
:

1) While in Android 10 only a few applications supported this functionality, primarily Android Messages, in Android 11 all applications support it. It is enough to enable this feature. It does not work in Developer Preview 4, but should appear in beta versions and the final version of the system.

2) Turn on notification bubbles
When a notification comes from any app in the Conversations section of the pull-down menu, swipe left or right on it. This will give access to a couple of buttons, among them click on the settings gear. Select "Priority". Once activated, all future notifications from this app will appear in the bubble and at the top of the Conversations section of the notification bar.

3) When you change a conversation to priority for the first time, a window appears informing you of additional benefits, including displaying the Conversations section at the top, showing your profile picture on the lock screen, and a bubble. Click "Got it" in the lower right corner for a bubble to appear.

4) The icon will be displayed on top of any open application. When you create a bubble for the first time, another window appears titled "Chat uses bubbles." It describes what bubbles are and what they can do. Click on the icon to see your correspondence. Another message appears stating that you can disable this feature using the "Manage" button.

5) Interacting with notification bubbles
When a bubble is active, all new messages from this conversation appear as a pop-up in that bubble. You can also still receive notifications in the notification center.


6) If you enable bubbles for many apps, only the most recent message icon will be displayed on the screen. When you select a bubble, each correspondence is shown, you can switch using the corresponding icon.

πŸ¦‘This also applies to different conversations within the same application, each of which has its own icon.



(1) One correspondence, (2) Telegram correspondence 1 to 1, group chat in Telegram, Google Voice message.

You can drag the bubble anywhere on the edge of the screen. To get rid of the chat bubble, drag the icon to the X at the bottom of the screen.

Bubble Management
You can manage your correspondence in several ways. There is a new "Conversations" menu that turns off the priority of any correspondence. You can find it in Settings> Apps & notifications> Conversations.

Select a conversation to customize it, including disabling priority or bubbles. Select β€œAll Bubble Settings” and change which conversation can be displayed in the bubble. You can bubble both individual and all conversations within the application.



You can change these settings by going to the Application Information page and selecting Notifications. Select a specific conversation and manage its settings, or select "Bubbles". Here you can set which individual conversations or all conversations will appear in bubbles in this application.

There is also a menu under Settings> Apps & notifications> Notifications> Bubbles. Here you can only enable and disable bubbles for the application as a whole. If you don't need them, turn off the switch.



Finally, the quickest way to disable bubbles is to use the new icon in the lower right corner of the message notification.


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
TipLink Launched 'VIGI NVR1008H', an NVR that can store up to 10TB.
#Technologies
Forwarded from UNDERCODE NEWS
Cyber ​​array: 2,000 organizations in Israel are vulnerable to hacking.
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ§ How to set up a network using the nmtui tool on parrot-ubuntu-kali linux distro:

1) An alternative to nmcli is nmtui, short for Network Manager Text User Interface .

Nmtui is another handy tool that allows you to easily configure network interfaces on Linux distributions using a graphical display by invoking the nmtui command directly from a terminal or even from putty.

To configure the IPv4 address of a network interface, start by calling the nmtui tool.

$ nmtui

2) Select the first option " Edit a connection " and press ENTER.

3) Then select the interface you want to customize and press ENTER.
In this case, the interface we are configuring is enps03.

4) In the next step, enter the IP address and define the subnet mask, default gateway and DNS servers

5) Once you're done with the settings, scroll all the way down and press ENTER to select OK.

Scroll down and click Back.

6) Now, to check that the network interface received the IP address we just configured, run the command:
$ ip addr show enp0s3
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Warning! A New Critical Vulnerability in SAGEMCOM routers could allow an attacker to gain access control.
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FOR BEGINERS-OFFICIAL INSTAGRAM BRUTER:

β€”-New updateβ€”
This program will brute force any Instagram account you send it its way. Just give it a target, a password list and a mode then press enter and forget about it. No need to worry about anonymity when using this program, its highest priority is your anonymity, it only attacks when your identity is hidden.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) https://github.com/Bitwise-01/Instagram-

2) cd instagram-

3) pip3 install -r requirements.txt

4) python3 instagram.py <username> <wordlist> -m <mode>

5) for usage :
C:\Users\Mohamed\Desktop\Instagram>python3 instagram.py -h
usage: instagram.py [-h] [-m MODE] username wordlist

positional arguments:
username email or username
wordlist password list

optional arguments:
-h, --help show this help message and exit
-m MODE, --mode MODE modes: 0 => 32 bots; 1 => 16 bots; 2 => 8 bots; 3 => 4 bots

πŸ¦‘EXAMPLES :

1) Chill mode
This mode uses only 4 bots, or 64 passwords at a time.

C:\Users\Mohamed\Desktop\Instagram>python3 instagram.py Sami09.1 pass.lst -m 3

2) Moderate mode 1
This mode uses 8 bots, or 128 passwords at a time.

C:\Users\Mohamed\Desktop\Instagram>python3 instagram.py Sami09.1 pass.lst -m 2

3) Moderate mode 2
This mode uses 16 bots, or 256 passwords at a time.

C:\Users\Mohamed\Desktop\Instagram>python3 instagram.py Sami09.1 pass.lst -m 1

4) Savage mode
This mode uses 32 bots, or 512 passwords at a time.

C:\Users\Mohamed\Desktop\Instagram>python3 instagram.py Sami09.1 pass.lst -m 0

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Long videos are going to change? It is rumored that Ali Tencent acquired iQiyi, the official response!
#international