UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.6K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ ways to connect to SSH and SCP through a proxy server (jump) on Linux :

1) SCP via proxy
Method 1: using scp with ProxyJump
In openssh package version 7.4p1-11 or newer, we can use the ProxyJump option to transfer files using a proxy server.

The scp command syntax for proxy file transfers is:

# scp -o "ProxyJump <User> @ <Proxy-Server>" <File-Name> <User> @ <Destination-Server>: <Destination-Path>
For instance:

# scp -o "ProxyJump user@10.23.100.70" dataFile.txt user@192.168.10.100: / tmp
user@10.23.100.70's password:
user@192.168.10.100's password:
dataFile.txt
Where my proxy is 10.23.100.70 and the target server is 192.168.10.100.

Method 2: using scp with ProxyCommand
SCP uses ssh as its main protocol and hence we can use ssh options along with scp commands.

2) Setting up SSH to make your life easier

The syntax for using the ProxyCommand option with the scp command is:

# scp -o "ProxyCommand ssh <user> @ <Proxy-Server> nc% h% p" <File-Name> <User @ <Destination-Server>: <Destination-Path>
Where:
% h will be replaced with the hostname to connect
% p will be replaced with port

3) When using the ProxyCommand parameter, make sure the nmap-ncat package is installed on the proxy that provides the nc command, otherwise the following error message will be displayed.

ssh_exchange_identification: Connection closed by remote host

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Online fortune-telling is investigated by CCTV: touching porcelain with high technology and researching psychology is "money"!
#international
Forwarded from UNDERCODE NEWS
Indian operators are asking the Department of Telecommunications to allow Huawei and ZTE to engage in 5G tests.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is memory forensics?

1) Memory forensics is a forensic analysis of a computer's memory dump.

Its main use is to investigate sophisticated computer attacks that are stealthy enough not to leave data on a computer's hard drive.

2) Therefore, memory (RAM) must be analyzed for forensic information.

Necessary requirements
Instruments:
Volatility
Redline
Caploader

2) Command:

vol.py -f <memory_image> –profile = <profile> envars | findstr COMPUTERNAME

3) Windows has many environment variables for starting processes that can retrieve reference data such as OS, TEMP, windir, Path ... and the currently used hostname will be stored in a variable named COMPUTERNAME.

4) You can view environment variables through Power Shell.
Command:
Get-ChildItem Env

5) Get a list of processes
Tool: Volatility

Command:

vol.py -f <file_image> –profile == <profile_name> pslist
pslist: Finds and views a doubly linked list of processes and displays a summary of the data.

6) This method usually cannot show you terminated or hidden processes.

psscan: Scans for _EPROCESS objects rather than relying on a linked list.

7) This plugin can also find terminated and unrelated (hidden) processes.

psxview: finds processes using alternative process lists, so you can refer to different sources of information and identify malicious inconsistencies.

8) Extract hashes
Now, using the virtual offset SYSTEM and SAM, we can extract the hashes:

D: \ volatility> vol.py -f ch2.dmp –profile = Win7SP1x86 hashdump -y 0x8b21c008 -s 0x9aad6148> hashes.txt
Volatility Foundation Volatility Framework 2.6.1
Let's take a look at the hashes.txt file:
Administrator: 500: aad3b435b51404eeaad3b435b51404ee: 31d6cfe0d16ae931b73c59d7e0c089c0 :::
Guest: 501: aad3b435b51404eeaad3b435b51404ee: 31d6cfe0d16ae931b73c59d7e0c089c0 :::
John Doe: 1000: aad3b435b51404eeaad3b435b51404ee: b9f917853e3dbf6e6831ecce60725930 :::

9) now crack hash with John
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
On the internet, personal information and medical records of 300,000 Muscovites recovering from coronavirus were found
#Leaks
Forwarded from UNDERCODE NEWS
Calculated cruelty: When the algorithm makes decisions instead of public bodies.
#Technologies #Analytiques
Forwarded from UNDERCODE NEWS
A blow to Cellcom: Expon in advanced negotiations with Pelephone for a network sharing agreement.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How Password Tracking to Protect Against Hacks Works in iOS 14 ?

1) Monitoring passwords in Safari
If iCloud Keychain is configured to automatically enter passwords in mobile apps and web apps, Safari will alert you of cracked passwords when you visit the site. If you use iCloud Keychain to automatically enter logins and passwords on sites in this browser, after logging in, the browser will warn you about the need to change the password on the site:


>β€œThis password appeared in a data breach, which increases the risk of this account being compromised. You must change your password immediately. "

β€œThe iPhone can create a complex password for you. Do you want to change the password for [site name] "?

2) If you click on the "Change password on the site" button, a window will open in the "Passwords" menu in the system settings. Here you can enter and change the password on the site or use the "Forgot your password?" Command, depending on the options available on the site. iCloud Keychain will help you choose a strong password.

If the site has an option to sign in with an Apple account, it is suggested that you do just that instead of having iCloud Keychain automatically generate a password. Your Apple ID will be used to sign in to your account. This will limit the amount of information the site collects about you.

3) Monitoring passwords in settings
If you don't want to wait for a warning about vulnerable passwords from Safari, for which you need to sign in to your account on the site, you can open system preferences and see security recommendations. This way you can take action before it's too late. It's also useful if you store passwords in the iCloud Keychain but don't use it for automatic data entry, so you won't get warnings in Safari.

Open the "Passwords" section in the system settings. Or you can tell Siri to "Open Passwords." Use Face ID, Touch ID, or PIN to sign in.

4) After logging into your account, you will see an option to auto-complete passwords. Here you can choose iCloud Keychain or another password manager like LastPass to automatically enter your username and password. Below this option and before the list of accounts, you will see security recommendations. Open them up.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
What has to be done nowadays? Similar diagnostics for non-vulnerability and penetration checking
#Analytiques
Forwarded from UNDERCODE NEWS
With Death to 2020, Netflix tell 2020, check the details.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to determine which services to restart on a Linux system:

1) Use the needrestart utility to determine which services need to be restarted after an upgrade.

2) Install the needrestart utility.

$ sudo apt install needrestart

3) Let's display the summary using the command line.
$ sudo needrestart --help
needrestart 3.4 - Restart daemons after library updates.

4) Check what needs to be restarted using convenient output:

$ sudo needrestart -b
NEEDRESTART-VER: 3.4
NEEDRESTART-KCUR: 4.19.0-8-amd64
NEEDRESTART-KEXP: 4.19.0-9-amd64
NEEDRESTART-KSTA: 3
NEEDRESTART-SVC: exim4.service
NEEDRESTART-SVC: postgresql@11-main.service

5) Verify what needs to be restarted using human-readable output (requires user interaction).

$ sudo needrestart -u NeedRestart :: UI :: stdio -rl

6) Restart the services.

$ sudo needrestart -u NeedRestart :: UI :: stdio -ra

7) Again, check if you need to restart.
$ sudo needrestart -b
NEEDRESTART-VER: 3.4
NEEDRESTART-KCUR: 4.19.0-8-amd64
NEEDRESTART-KEXP: 4.19.0-9-amd64
NEEDRESTART-KSTA: 3

8) Reboot your operating system and check if you need to restart.

$ sudo needrestart -b
NEEDRESTART-VER: 3.4
NEEDRESTART-KCUR: 4.19.0-9-amd64
NEEDRESTART-KEXP: 4.19.0-9-amd64
NEEDRESTART-KSTA: 1

9) $ sudo needrestart -u NeedRestart :: UI :: stdio -rl
Scanning processes ...
Scanning linux images ...
Running kernel seems to be up-to-date.
No services need to be restarted.
No containers need to be restarted.
No user sessions are running outdated binaries.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Demonstration experiment of search and reservation of work facilities will start in January next year, NTT Com and other three parties.
#international
Forwarded from UNDERCODE NEWS
Many vulnerabilities discovered today in NGINX Controller Agent.
#Vulnerabilities
Enjoy Support & Share β€οΈπŸ‘πŸ»

T.me/UndercodeTesting