UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
New critical vulnerability in daemon lib for Linux and Windows could allow an attacker to gain access over system.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Built a special file system with a compression ratio of records.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Metasploit-Android

This module uses the Metasploit framework built into Kali-Linux to create and Android APK that will allow a back door into the users phone.

The script creates the malicious APK file and embeds it into a normal, unsuspicious APK that when opened, will automatically trigger a Perl script to create a persistent backdoor into the users phone. This can be done in two ways, over your local area network (LAN), or you can open a port for the data to be sent to and listen on the local binding for the data coming in. These options can be specified during the process of the script creating the APK.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) This tool should run under most versions of Linux but is optimized for working on Kali. The setup is very straight-forward just copy and paste the following code into a terminal:

wget https://raw.githubusercontent.com/AaronVigal/Metasploit-Android/master/setup

2) sudo chmod +x setup

3) sudo ./setup

4) cd ~/Desktop/Metasplot/Android

5) sudo ./exploit

6) The setup file checks/installs the following dependencies:

Metasploit Framework
Ruby

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Cyber attack on the website and servers of the insurance company Shirbit; Information on policyholders leaked to the network
#CyberAttacks
Forwarded from UNDERCODE NEWS
Created a replacement for the late Adobe Flash Player that works better and safer.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

New .onion legit links:

BRCHAN http://brchanansdnhvvnm.onion/ online

Neboard http://neboardo3svhysmd.onion/ online

БловСсный Π‘ΠΎΠ³Π°Ρ‚Ρ‹Ρ€ΡŒ http://sblib3fk2gryb46d.onion/ online

HYDRA http://hydraruzxpnew4af.onion/ online

Mail2Tor@onion http://mail2tor2zyjdctd.onion/ online

Stronghold Paste http://nzxj65x32vh2fkhk.onion/ online

BODY TO MIND http://bodytomind5hql5r.onion/ offline

UD http://underdj5ziov3ic7.onion/ online

Beehive http://beehive6ratfqulk.onion/ online

Sauf.Γ§a http://saufca42reinzasa.onion/ online

The Hidden Wiki http://kpvz7ki2lzvnwve7.onion/ online

Radical Militant Library http://c3jemx2ube5v5zpg.onion/ offline

Verified.VC – only checked people

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Fitbit provides paid health promotion service in Japan, JMDC exclusively sells for corporations.
#Updates
Forwarded from UNDERCODE NEWS
Breaking the information in Shirbit: Fear of leaking personal details of senior civil servants.
#Updates
Forwarded from UNDERCODE NEWS
Yandex created the "killer" Avito.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SMB Relay Attack Script:

1) clone https://github.com/Jsitech/relayer

2) cd relayer

3) ./relayer.sh

4) to use :

a) Scan for SMB Systems on Target Network and List those with SMB signing Disabled

b) User selects system to Relay the authentication attempts to

c) User selects where to set the Listener for incoming connections

d) User selects payload

e) Relayer creates payload and sets up Responder and SMBRelayX

f)Wait for connection attempts to your attacking machine and check Listener

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The production capacity of LG Chem's batteries in China will double next year.
#Technologies
Forwarded from UNDERCODE NEWS
Hanmi Pharm wins the first K-ICT information protection excellence award in the pharmaceutical and bio industry.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘When using crawlers to collect websites, several methods to solve blocked IP

Method 1.
Due to the company's project needs, we have collected google map data and some large-scale website data.
The experience is as follows:
1. IP must be required, as @alswl said is very correct, ADSL. If you have the conditions, you can actually apply for extra IP from the computer room.
2. Deploy a proxy server on the machine with an external network IP.
3. Your program uses rotation training to replace the proxy server to access the website you want to collect.
Benefits:
1. The program logic changes little, only the agent function is needed.
2. According to the blocking rules of the other party's website, you only need to add more agents.
3. Even if the specific IP is blocked, you can directly log off the proxy server and it will be OK, and the program logic does not need to be changed.

Method 2.
Some websites have weak preventive measures. You can disguise the IP and modify X-Forwarded-for (it looks like this spelling...) to bypass it.
For most websites, if you want to crawl frequently, you still need more IPs. The solution I prefer is that foreign VPSs are equipped with multiple IPs, and IP switching is realized through default gateway switching, which is much more efficient than HTTP proxy, and is estimated to be more efficient than ADSL switching in most cases.

Method 3.
ADSL + script, monitor whether it is blocked, and then constantly switch ip
settings to query frequency limits. The
orthodox approach is to call the service interface provided by the website.

Method 4. People
with more than 8 years of crawling experience tell you that domestic ADSL is the kingly way. Apply for more lines and distribute them in different telecom districts. It is better to be able to cross provinces and cities. Write your own disconnection redial components. Write your own dynamic IP tracking service, remote hardware reset (mainly for ADSL modems to prevent its downtime), other task allocation, data recovery, are not a big problem. Mine has been running stably for several years, and it's done!

Method 5.
1 User agent disguise and rotation
2 Use proxy ip and rotation
3 Cookies processing, some websites have a looser policy on login users.
Friendly reminder: Consider the burden of crawlers on other websites, be a responsible crawler :)

Method 6.
As much as possible The simulated user behavior:
1. The UserAgent is changed frequently;
2. The visit time interval is set longer, and the visit time is set to a random number;
3. The order of visiting pages can also be random.
The basis for website blocking is generally unit The number of visits to a specific IP within a period of time.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The British have spent millions dollars per a day on smartphone gaming. At the top of the list: a game in Israel
#international