UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
With Death to 2020, Netflix tell 2020, check the details.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to determine which services to restart on a Linux system:

1) Use the needrestart utility to determine which services need to be restarted after an upgrade.

2) Install the needrestart utility.

$ sudo apt install needrestart

3) Let's display the summary using the command line.
$ sudo needrestart --help
needrestart 3.4 - Restart daemons after library updates.

4) Check what needs to be restarted using convenient output:

$ sudo needrestart -b
NEEDRESTART-VER: 3.4
NEEDRESTART-KCUR: 4.19.0-8-amd64
NEEDRESTART-KEXP: 4.19.0-9-amd64
NEEDRESTART-KSTA: 3
NEEDRESTART-SVC: exim4.service
NEEDRESTART-SVC: postgresql@11-main.service

5) Verify what needs to be restarted using human-readable output (requires user interaction).

$ sudo needrestart -u NeedRestart :: UI :: stdio -rl

6) Restart the services.

$ sudo needrestart -u NeedRestart :: UI :: stdio -ra

7) Again, check if you need to restart.
$ sudo needrestart -b
NEEDRESTART-VER: 3.4
NEEDRESTART-KCUR: 4.19.0-8-amd64
NEEDRESTART-KEXP: 4.19.0-9-amd64
NEEDRESTART-KSTA: 3

8) Reboot your operating system and check if you need to restart.

$ sudo needrestart -b
NEEDRESTART-VER: 3.4
NEEDRESTART-KCUR: 4.19.0-9-amd64
NEEDRESTART-KEXP: 4.19.0-9-amd64
NEEDRESTART-KSTA: 1

9) $ sudo needrestart -u NeedRestart :: UI :: stdio -rl
Scanning processes ...
Scanning linux images ...
Running kernel seems to be up-to-date.
No services need to be restarted.
No containers need to be restarted.
No user sessions are running outdated binaries.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Demonstration experiment of search and reservation of work facilities will start in January next year, NTT Com and other three parties.
#international
Forwarded from UNDERCODE NEWS
Many vulnerabilities discovered today in NGINX Controller Agent.
#Vulnerabilities
Enjoy Support & Share β€οΈπŸ‘πŸ»

T.me/UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘# ️⃣ What is HMAC (Hach-based Message Authentication Code) ?

Hach-based Message Authentication Code or HMAC is used to authenticate a message using hash functions.
Message authentication is an important mechanism in cybersecurity and is used to authenticate a message.
There are different ways and mechanisms for message authentication.

1) Message

A message is data, text, image, or whatever we want to authenticate.

The message is verified for authenticity with the key by hashing them.

2) Key
The key is used by both parties to authenticate the message.

As stated earlier, the message and the key are used together and the hash value is calculated.

3) Hash function
The hash function is used to compute a hash value that is unique.

The hash function can be sha1, sha256, or use a different algorithm.

4) Encryption and Hashing. Difference and application

πŸ¦‘How to create an HMAC using OpenSSL ?

We can use the OpenSSL tool to generate some HMAC or hash value.

We will use the echo and openssl commands.

We will also use sha256 as our hash algorithm.

We will provide data or messages to the HMAC and then haveh it using the -hmac switch and mysecretkey as shown :


$ echo -n "secretmessage.txt" | openssl dgst -sha256 -hmac "mysecretkey"

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Remote risks. Top cyber threats of 2021.
#CyberAttacks
Forwarded from UNDERCODER
Blackview Tab 8E: the economic alternative to the iPad, on offer for Christmas.
#Updates

MORE INFO - https://undercodenews.com/blackview-tab-8e-the-economic-alternative-to-the-ipad-on-offer-for-christmas/09/12/2020/
Forwarded from UNDERCODE NEWS
Huge lawsuit against Facebook: 48 states in the US are demanding that it be forced to disband.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hijacking tutorial:

1) First, we will need to gear up for the attack:

Open up the Ettercap utility in Kali Linux. To work with it in a GUI, open up a terminal and type:


$ ettercap -G

The Ettercap GUI window will be displayed. Go to the menu and select β€˜sniff>unisniff,’ as shown in the following window:


2) Next, open up a new terminal without closing the other one, and type the following command:


$ ifconfig

3) After entering the above command, you will see your default network interface. Now, copy it and select it in the Ettercap menu.


With that done, click the β€˜host’ button in the menu and select the β€˜scan for host’ option. Then, wait until the scan is finished.


4) The results will be displayed . From the submenu, click on the MITM tab and select β€˜ARP poisoning.’


Next, instruct the machine using the options tab that has just popped up. Enable the β€˜sniff remote network’ option by checking the box next to it.

5) Then, hit the start button from the menu to the attack. Your machine will now engage in sniffing for any systems connected to your remote network.


Now that the ettercap has been primed for the attack, leave it running in the background and proceed to launch the Ferret tool.


6) Start the Ferret plugin
To launch the Ferret plugin, open up a new terminal and type the following syntax, then hit Enter:

$ ferret -i eth0

You have now successfully launched the ferret tool, as well. Next, we will minimize this window and fire up the Hamster plugin.

7) Launch Hamster
Start Hamster by typing the following into a new command terminal:


$ hamster

This will listen to the loopback IP, which, in our case, is [IP address] and [port number]

8) Next, fire up the web browser and type the port number and the loopback IP in its URL terminal to set up the web interface for Hamster:



With the Hamster utility prepared, we must now configure the adapters. Go to the options in the browser’s menu and click on β€˜eth0,’ and wait until the browser comes up with some results:


9) Examine the results carefully once they pop up. You will see a whole bunch of IP addresses, including your own.

10) Next, we will select the target IP address in the Hamster web interface

11) See the Victim’s Web History
You can click on each of the recorded cookies to see what is going on in the sessions, which websites were accessed, the user’s private chat logs, file transfer history, etc. You can extract a lot of information here, as you are likely to have a lot of cookies.

Mess around and see what you can get your hands on. And remember, everything that you can do on the system that you are pen-testing here, a hacker can do as well, which goes to show how prone a system can be to such simple attacks.


Reference linuxforo
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Xiaomi and Redmi are working on a smartphone with Snapdragon 888.
#Technologies