Forwarded from UNDERCODE NEWS
Latest research reveals: How many Israeli cellular firms profit from replica rates of overseas surf packages.
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack with armitage pdf & videos :"
https://dl.packetstormsecurity.net/papers/general/Armitage-hacking_made_easy_Part-1.pdf
https://www.youtube.com/watch?app=desktop&v=EACo2q3kgHY
https://www.usenix.org/system/files/login/articles/105484-Mudge.pdf
https://www.youtube.com/watch?v=ZkqMSntMz7s
https://www.youtube.com/watch?v=uQyVKl310tg
https://www.youtube.com/watch?v=tpq9giYbaqQ
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack with armitage pdf & videos :"
https://dl.packetstormsecurity.net/papers/general/Armitage-hacking_made_easy_Part-1.pdf
https://www.youtube.com/watch?app=desktop&v=EACo2q3kgHY
https://www.usenix.org/system/files/login/articles/105484-Mudge.pdf
https://www.youtube.com/watch?v=ZkqMSntMz7s
https://www.youtube.com/watch?v=uQyVKl310tg
https://www.youtube.com/watch?v=tpq9giYbaqQ
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
New malware infect smartphones with Trojans without an Internet connection..Protecting yourself is nearly difficult.
#Malwares
#Malwares
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦EXPLOIT HACKING VIDEOS & PDFS :
https://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdf
https://www.isecur1ty.org/wp-content/uploads/2017/02/Ethical-Hacking-Basics-Course-Module5.pdf
https://www.youtube.com/watch?v=sglbDD5EKdI
https://www.youtube.com/watch?v=6xMGsdD-ArI
https://www.blackhat.com/docs/asia-14/materials/Esparza/Asia-14-Esparza-PDF-Attack-A-Journey-From-The-Exploit-Kit-To-The-Shellcode.pdf
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦EXPLOIT HACKING VIDEOS & PDFS :
https://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdf
https://www.isecur1ty.org/wp-content/uploads/2017/02/Ethical-Hacking-Basics-Course-Module5.pdf
https://www.youtube.com/watch?v=sglbDD5EKdI
https://www.youtube.com/watch?v=6xMGsdD-ArI
https://www.blackhat.com/docs/asia-14/materials/Esparza/Asia-14-Esparza-PDF-Attack-A-Journey-From-The-Exploit-Kit-To-The-Shellcode.pdf
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
A new route is opened by Iliad: optical fiber arrives, the information here are.
#international #Technologies
#international #Technologies
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Windows hacking videos and pdfs:
https://doc.lagout.org/security/Hacking%20Windows.pdf
https://www.youtube.com/watch?v=-o1AjOA5on0
http://index-of.co.uk/Hacking-Coleccion/Windows%20XP%20Hacks%20&%20Mods%20For%20Dummies.pdf
https://switchon.eaton.com/pdf/journey/doing-more-with-less/IT-hacks-ebook.pdf
https://www.youtube.com/watch?v=1JASnfc-X8I
https://www.youtube.com/watch?v=be2jOZM8Whs
enjoy β€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Windows hacking videos and pdfs:
https://doc.lagout.org/security/Hacking%20Windows.pdf
https://www.youtube.com/watch?v=-o1AjOA5on0
http://index-of.co.uk/Hacking-Coleccion/Windows%20XP%20Hacks%20&%20Mods%20For%20Dummies.pdf
https://switchon.eaton.com/pdf/journey/doing-more-with-less/IT-hacks-ebook.pdf
https://www.youtube.com/watch?v=1JASnfc-X8I
https://www.youtube.com/watch?v=be2jOZM8Whs
enjoy β€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What are Shockproof phones ?
There are many terms that can be used to describe this type of phone, such as shatterproof phones, shockproof mobile phones , rugged phones, rugged phones, construction phones, etc.
1) Each of these names has the same meaning, they all refer to mobile phones that are water, shock and drop resistant - whether they are mobile phones with buttons or premium smartphones with tactile touch screens.
But who are these phones for?
2) These devices are very popular with working professionals, that is, professions who need a communication device that they can take with them wherever they go, confident that the phone can withstand the harsh environment.
3) They can be useful in many industries, from construction sites to factories, fire brigades, rescuers and mining workers, agricultural workers, wood workshops, and many other trades.
4) Using a secure phone extends the life of your communication device, which means you no longer have to worry about breaking your phone.
5) However, rugged phones are not only designed for work, they can also be used during leisure activities, including sports, hunting, hiking, and more.
They can also be perfect for clumsy people who often drop their smartphone.
π¦As mentioned earlier, there are two types of such phones:
1) Mobile phone: This is the classic version of phones that usually have a keypad with buttons and a small screen that is usually non-touch. This model is primarily aimed at users looking for a very easy-to-use device that only offers basic functions such as making calls or sending SMS messages. This type of phone usually doesn't allow you to surf the Internet, but it has the main advantage that it is smaller than most modern smartphones, so it fits easily in a jeans pocket.
2) Rugged Smartphone: This is the best option and is currently very popular on the market. It consists of a large touchscreen that allows you to browse the web, use applications (GPS, compass, barometer, etc.), take photos, videos, etc. Since they are more susceptible to damage than regular mobile phones, their the body is reinforced and their screen is treated to resist scratches. The touchscreen of the rugged smartphone can also be used with gloves and wet hands, ideal for builders. Many models also allow you to insert two SIM cards to be able to separate professional calls from personal calls, without having to buy two different phones.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What are Shockproof phones ?
There are many terms that can be used to describe this type of phone, such as shatterproof phones, shockproof mobile phones , rugged phones, rugged phones, construction phones, etc.
1) Each of these names has the same meaning, they all refer to mobile phones that are water, shock and drop resistant - whether they are mobile phones with buttons or premium smartphones with tactile touch screens.
But who are these phones for?
2) These devices are very popular with working professionals, that is, professions who need a communication device that they can take with them wherever they go, confident that the phone can withstand the harsh environment.
3) They can be useful in many industries, from construction sites to factories, fire brigades, rescuers and mining workers, agricultural workers, wood workshops, and many other trades.
4) Using a secure phone extends the life of your communication device, which means you no longer have to worry about breaking your phone.
5) However, rugged phones are not only designed for work, they can also be used during leisure activities, including sports, hunting, hiking, and more.
They can also be perfect for clumsy people who often drop their smartphone.
π¦As mentioned earlier, there are two types of such phones:
1) Mobile phone: This is the classic version of phones that usually have a keypad with buttons and a small screen that is usually non-touch. This model is primarily aimed at users looking for a very easy-to-use device that only offers basic functions such as making calls or sending SMS messages. This type of phone usually doesn't allow you to surf the Internet, but it has the main advantage that it is smaller than most modern smartphones, so it fits easily in a jeans pocket.
2) Rugged Smartphone: This is the best option and is currently very popular on the market. It consists of a large touchscreen that allows you to browse the web, use applications (GPS, compass, barometer, etc.), take photos, videos, etc. Since they are more susceptible to damage than regular mobile phones, their the body is reinforced and their screen is treated to resist scratches. The touchscreen of the rugged smartphone can also be used with gloves and wet hands, ideal for builders. Many models also allow you to insert two SIM cards to be able to separate professional calls from personal calls, without having to buy two different phones.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
"Minna no Raspberry Contest 2020" was declared with several Raspberry Pis Grand Prix signs.
#Technologies #international
#Technologies #international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to get the new media controls from Android 11 on any smartphone ?
In Android 11, music player controls have been moved from the notification panel to quick settings. This makes room for the new Conversations section of the notification. It also adds controls for external media connectivity, allowing you to switch from smartphone speaker to Bluetooth speaker with just two taps.
Step 1. Install Power Shade
https://play.google.com/store/apps/details?id=com.treydev.pns&hl=us
Step 2. Enabling Accessibility Service
After installing the application, open it and click the "Accessibility" switch. The system settings menu will open, where at the top you need to enable Power Shade and click OK in the window that appears.
Step 3. Enabling the notification service
Click back to return to the app. Click on the "Notifications" switch and you will be taken to another screen of system settings. Activate the Power Shade switch and give permission in the window that appears. Press back again.
Step 4. Make sure the integration with the media player
The feature should be enabled by default. If not, click in the main application menu "More". Scroll down to the Integrate media players in quick settings radio button. Activate it and then on the main screen of the application, turn off the Running switch and turn it back on to apply the changes.
Step 5. Try the new functionality
Open your media player and start music. Swipe down on the status bar to open a miniature version of quick settings. The new controls will be located below. You can play, pause and skip tracks, you can click on this interface to open the music application.
A new button will appear in the upper right corner of the controls called Phone speaker. Here you can specify the device to which you will transfer music. Swipe down the status bar again to open the extended view. There are all the same controls as in the mini version, but there are also "Like" and "Dislike" buttons if your music playback application has them. There is also a progress bar when playing audio files.
Unlike Android 11, the controls remain in the Notifications section of the lock screen. This makes it easier to access them. On Android 11, they are always in quick settings, so you have to make an extra gesture. If you have different streaming services, you can swipe left and right on a tile to switch between controls for different media applications.
enjoy any doubt feel free to ask @Undercode_Testing
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to get the new media controls from Android 11 on any smartphone ?
In Android 11, music player controls have been moved from the notification panel to quick settings. This makes room for the new Conversations section of the notification. It also adds controls for external media connectivity, allowing you to switch from smartphone speaker to Bluetooth speaker with just two taps.
Step 1. Install Power Shade
https://play.google.com/store/apps/details?id=com.treydev.pns&hl=us
Step 2. Enabling Accessibility Service
After installing the application, open it and click the "Accessibility" switch. The system settings menu will open, where at the top you need to enable Power Shade and click OK in the window that appears.
Step 3. Enabling the notification service
Click back to return to the app. Click on the "Notifications" switch and you will be taken to another screen of system settings. Activate the Power Shade switch and give permission in the window that appears. Press back again.
Step 4. Make sure the integration with the media player
The feature should be enabled by default. If not, click in the main application menu "More". Scroll down to the Integrate media players in quick settings radio button. Activate it and then on the main screen of the application, turn off the Running switch and turn it back on to apply the changes.
Step 5. Try the new functionality
Open your media player and start music. Swipe down on the status bar to open a miniature version of quick settings. The new controls will be located below. You can play, pause and skip tracks, you can click on this interface to open the music application.
A new button will appear in the upper right corner of the controls called Phone speaker. Here you can specify the device to which you will transfer music. Swipe down the status bar again to open the extended view. There are all the same controls as in the mini version, but there are also "Like" and "Dislike" buttons if your music playback application has them. There is also a progress bar when playing audio files.
Unlike Android 11, the controls remain in the Notifications section of the lock screen. This makes it easier to access them. On Android 11, they are always in quick settings, so you have to make an extra gesture. If you have different streaming services, you can swipe left and right on a tile to switch between controls for different media applications.
enjoy any doubt feel free to ask @Undercode_Testing
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google Play
Power Shade: Notification Bar - Apps on Google Play
Personalized custom notifications for a better user interface and experience.
Forwarded from UNDERCODE NEWS
New critical vulnerability is Apache hackers can leak data access restrictions to obtain sensitive information.
#Vulnerabilities
#Vulnerabilities
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Cross-site scripting (XSS) for beginers:
It is a code injection attack that enables an attacker in the window of another user to run malicious JavaScript.
The perpetrator does not hit his victim specifically. Instead in order to get the website to send the malicious JavaScript to him, he exploits a flaw in a website that the victim visits. The malicious JavaScript seems to be a genuine component of the website for the victim's browser and the website has thereby acted as an unwitting accomplice to the intruder. It is possible to execute these attacks using HTML, JavaScript, VBScript, ActiveX, Flash, but malicious JavaScript is the most widely used XSS.
Such attacks can also capture data from account hijacking, user interface updates, cookie theft/poisoning, or false ads and generate DoS attacks.
π¦Example ( examples from wiki) :
Letβs take an example to understand how it works. We have a vulnerable webpage that we got by the metasploitable machine. Now we will test the field that is highlighted in red arrow for XSS.
1) Metasploitable
First of all, we make a simple alert script
<script>
alert(βI am Vulnerableβ)
</script>
2) It will produce the following output β
Simple Alert
π¦Types of XSS Attacks
XSS attacks are often divided into three types β
1) Persistent XSS, where the malicious string originates from the website's database.
2) Reflected XSS, where the malicious string originates from the victim's request.
3) DOM-based XSS, where the vulnerability is in the client-side code rather than the server-side code.
Generally, cross-site scripting is found by vulnerability scanners so that you donβt have to do all the manual job by putting a JavaScript on it like
<script>
alert('XSS')
</script>
Burp Suite and acunetix are considered as the best vulnerability scanners.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Cross-site scripting (XSS) for beginers:
It is a code injection attack that enables an attacker in the window of another user to run malicious JavaScript.
The perpetrator does not hit his victim specifically. Instead in order to get the website to send the malicious JavaScript to him, he exploits a flaw in a website that the victim visits. The malicious JavaScript seems to be a genuine component of the website for the victim's browser and the website has thereby acted as an unwitting accomplice to the intruder. It is possible to execute these attacks using HTML, JavaScript, VBScript, ActiveX, Flash, but malicious JavaScript is the most widely used XSS.
Such attacks can also capture data from account hijacking, user interface updates, cookie theft/poisoning, or false ads and generate DoS attacks.
π¦Example ( examples from wiki) :
Letβs take an example to understand how it works. We have a vulnerable webpage that we got by the metasploitable machine. Now we will test the field that is highlighted in red arrow for XSS.
1) Metasploitable
First of all, we make a simple alert script
<script>
alert(βI am Vulnerableβ)
</script>
2) It will produce the following output β
Simple Alert
π¦Types of XSS Attacks
XSS attacks are often divided into three types β
1) Persistent XSS, where the malicious string originates from the website's database.
2) Reflected XSS, where the malicious string originates from the victim's request.
3) DOM-based XSS, where the vulnerability is in the client-side code rather than the server-side code.
Generally, cross-site scripting is found by vulnerability scanners so that you donβt have to do all the manual job by putting a JavaScript on it like
<script>
alert('XSS')
</script>
Burp Suite and acunetix are considered as the best vulnerability scanners.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
FREE ANDROID REVERSE ENGiNEERING :
Android emulators 5.1 (ARM), 7.1.1 (ARM) and 9.0 (x86)
androguard
apktool
AXMLPrinter
baksmali / smali
classyshark
CFR
dex2jar
enjarify
frida
google play api
google play crawler
google play downloader
jadx
java decompiler
krakatau
procyon
radare2
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/cryptax/androidre.git
2) cd androidre
3) Normally, you just need to do:
$ docker pull cryptax/android-re:latest
Unless you want to build your own image - then see below the Customization section.
4) Running the container
There are a few options:
running the container locally: you just want to run on your own machine and don't want to bother about SSH or VNC.
running to connect via SSH or VNC: the container will be available as a standalone host you can log into via SSH, or VNC.
5) Running the container locally
$ docker run -it --rm -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix cryptax/android-re:latest /bin/bash
You are directly connected to the container.
Note you can also share a directory with your host using -v hostdir:containerdir.
If you try to use any graphical interface and get an error like No protocol specified followed by an crash (SEGFAULT), using this command before running the docker should fix it: xhost +local:docker.
IMPORTANT: if you want to use the Android emulator x86 image, you need to set the --privileged option in the command line, i.e:
$ docker run -it --privileged --rm -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix cryptax/android-re:latest /bin/bash
6) Running to connect via SSH or VNC
Run the container:
$ docker run -d --name androidre -p SSH_PORT:22 -p VNC_PORT:5900 cryptax/android-re
β β β Uππ»βΊπ«Δπ¬πβ β β β
FREE ANDROID REVERSE ENGiNEERING :
Android emulators 5.1 (ARM), 7.1.1 (ARM) and 9.0 (x86)
androguard
apktool
AXMLPrinter
baksmali / smali
classyshark
CFR
dex2jar
enjarify
frida
google play api
google play crawler
google play downloader
jadx
java decompiler
krakatau
procyon
radare2
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/cryptax/androidre.git
2) cd androidre
3) Normally, you just need to do:
$ docker pull cryptax/android-re:latest
Unless you want to build your own image - then see below the Customization section.
4) Running the container
There are a few options:
running the container locally: you just want to run on your own machine and don't want to bother about SSH or VNC.
running to connect via SSH or VNC: the container will be available as a standalone host you can log into via SSH, or VNC.
5) Running the container locally
$ docker run -it --rm -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix cryptax/android-re:latest /bin/bash
You are directly connected to the container.
Note you can also share a directory with your host using -v hostdir:containerdir.
If you try to use any graphical interface and get an error like No protocol specified followed by an crash (SEGFAULT), using this command before running the docker should fix it: xhost +local:docker.
IMPORTANT: if you want to use the Android emulator x86 image, you need to set the --privileged option in the command line, i.e:
$ docker run -it --privileged --rm -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix cryptax/android-re:latest /bin/bash
6) Running to connect via SSH or VNC
Run the container:
$ docker run -d --name androidre -p SSH_PORT:22 -p VNC_PORT:5900 cryptax/android-re
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - cryptax/androidre: Reverse engineering Android
Reverse engineering Android. Contribute to cryptax/androidre development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
Gates bombards federal offices for not supplying or facing significant issues with new crown vaccinations.
#international
#international