UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.6K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Huge lawsuit against Facebook: 48 states in the US are demanding that it be forced to disband.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hijacking tutorial:

1) First, we will need to gear up for the attack:

Open up the Ettercap utility in Kali Linux. To work with it in a GUI, open up a terminal and type:


$ ettercap -G

The Ettercap GUI window will be displayed. Go to the menu and select β€˜sniff>unisniff,’ as shown in the following window:


2) Next, open up a new terminal without closing the other one, and type the following command:


$ ifconfig

3) After entering the above command, you will see your default network interface. Now, copy it and select it in the Ettercap menu.


With that done, click the β€˜host’ button in the menu and select the β€˜scan for host’ option. Then, wait until the scan is finished.


4) The results will be displayed . From the submenu, click on the MITM tab and select β€˜ARP poisoning.’


Next, instruct the machine using the options tab that has just popped up. Enable the β€˜sniff remote network’ option by checking the box next to it.

5) Then, hit the start button from the menu to the attack. Your machine will now engage in sniffing for any systems connected to your remote network.


Now that the ettercap has been primed for the attack, leave it running in the background and proceed to launch the Ferret tool.


6) Start the Ferret plugin
To launch the Ferret plugin, open up a new terminal and type the following syntax, then hit Enter:

$ ferret -i eth0

You have now successfully launched the ferret tool, as well. Next, we will minimize this window and fire up the Hamster plugin.

7) Launch Hamster
Start Hamster by typing the following into a new command terminal:


$ hamster

This will listen to the loopback IP, which, in our case, is [IP address] and [port number]

8) Next, fire up the web browser and type the port number and the loopback IP in its URL terminal to set up the web interface for Hamster:



With the Hamster utility prepared, we must now configure the adapters. Go to the options in the browser’s menu and click on β€˜eth0,’ and wait until the browser comes up with some results:


9) Examine the results carefully once they pop up. You will see a whole bunch of IP addresses, including your own.

10) Next, we will select the target IP address in the Hamster web interface

11) See the Victim’s Web History
You can click on each of the recorded cookies to see what is going on in the sessions, which websites were accessed, the user’s private chat logs, file transfer history, etc. You can extract a lot of information here, as you are likely to have a lot of cookies.

Mess around and see what you can get your hands on. And remember, everything that you can do on the system that you are pen-testing here, a hacker can do as well, which goes to show how prone a system can be to such simple attacks.


Reference linuxforo
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Xiaomi and Redmi are working on a smartphone with Snapdragon 888.
#Technologies
Forwarded from UNDERCODE NEWS
Vodafone, the latest rate is here: internet, free tablet and $US 604 bonus.
#Updates
Forwarded from UNDERCODE NEWS
The days when compliance was the key to security are over.
#CyberAttacks
Forwarded from UNDERCODE NEWS
An electronic nose for detecting cancer and other odor-related diseases.
#Technologies
Forwarded from UNDERCODE NEWS
WhatsApp: police warning arrives, so your account can be hacked.
#CyberAttacks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘β˜ΈοΈ How to install Netdata on Kubernetes using Helm ?

1) Step 1 - Install Helm on Linux | macOS
Next, we'll show you the steps you need to take to install Helm on Linux | macOS.

2) Download the Helm package from this link : https://github.com/helm/helm/releases

3) Unpack the package using tar -xvzf <downloaded-package>

4) Move the binary to usr / local / bin / helm

πŸ¦‘We will be using an installation script that automates the steps above.

1) curl -fsSL -o get_helm.sh https://raw.githubusercontent.com/helm/helm/master/scripts/get-helm-3

2) chmod 700 get_helm.sh

3) sudo ./get_helm.sh

4) MacOS users can also use brew's package management tool.

$ brew install helm

5) After installation, confirm that everything is ok by checking the current version:
$ helm version
version.BuildInfo{Version:"v3.4.0", GitCommit:"7090a89efc8a18f3d8178bf47d2462450349a004", GitTreeState:"clean", GoVersion:"go1.14.10"}

6) Add the helm-charts repository then update helm

$ helm repo add stable https://charts.helm.sh/stable
$ helm repo update

7) Hang tight while we grab the latest from your chart repositories...
...Successfully got an update from the "stable" chart repository
Update Complete. ⎈Happy Helming!⎈

Β» Step 2 - Installing Netdata Using the Helm Chart
You can install Helm Chart in two ways:

1) Install from Netdata's Helm repository

2) Clone the Netdata Git repository.

3) Make sure you have git installed on your system

Clone the git repository locally

git clone https://github.com/netdata/helmchart.git netdata-helmchart

4) Let's install the chart:

helm install netdata ./netdata-helmchart/charts/netdata

5) Now you can see the Helm deployed:
$ helm list
NAME NAMESPACE REVISION UPDATED STATUS CHART APP VERSION
netdata default 1 2020-11-20 18:41:46.244774507 +0000 UTC deployed netdata-3.1.0 v1.26.0

6) To check if the parent and child pods have been successfully deployed:
$ kubectl get pods
NAME READY STATUS RESTARTS AGE
netdata-child-fgh5c 2/2 Running 0 16h
netdata-child-qzhjp 2/2 Running 0 16h
netdata-child-ssmhp 2/2 Running 0 16h
netdata-parent-55d88fc784-x66ss 1/1 Running 0 16h
Step 3. Open Netdata-parent with NodePort
In this tutorial, we will introduce deployment using NodePort.

Netdata is configured by default to run on port 19999.

To open the port, use the command shown below:
$ kubectl expose deployment netdata-parent --type="NodePort" --port 19999
Now you can check the port on which the service was provided with the kubectl get service command:

$ kubectl get service
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
kubernetes ClusterIP 10.96.0.1 <none> 443/TCP 21h
netdata ClusterIP 10.99.202.135 <none> 19999/TCP 17h
netdata-parent NodePort 10.97.24.181 <none> 19999:30939/TCP 16h

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
France fines Google 100 million euros and Amazon 35 million for illegal collection of user information.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ§ How to enable rc.local shell script in systemd on Linux boot ?

1) Enabling rc.local shell script in systemd at boot of Linux system
Compatibility with /etc/rc.local is achieved through systemd using a special service called rc-local.service.

2) This module is automatically called in multi-user.target by systemd-rc-local-generator if /etc/rc.local is executable.

3) Executing rc.local shell script at boot time using systemd
Naturally, create or update / edit a file called /etc/rc.local using your favorite text editor.

I'm going to use the vim command:

$ sudo vim /etc/rc.local
## RHEL/CentOS/Fedora Linux ΠΎΡ‚Ρ€Π΅Π΄Π°ΠΊΡ‚ΠΈΡ€ΡƒΠΉΡ‚Π΅ Ρ„Π°ΠΉΠ» /etc/rc.d/rc.local ##
$ sudo vim /etc/rc.d/rc.local

Add the required commands or call the script.
Here is my file:
#!/bin/sh
# add your commands
# call your scripts here

# let us set stuff for my wifi
/sbin/iw phy0 wowlan enable magic-packet disconnect

# last line must be exit 0
exit 0
Save and close the file when using vim.

🐧 How to save a file in Vi / Vim and exit

Make sure you set the executable permissions for the file with the chmod command:

$ sudo chmod -v +x /etc/rc.local

Setting up rc-local.service on Linux when systemd starts
All we need to do is enter the following systemctl command:

$ sudo systemctl enable rc-local.service

4) Reboot Linux:
$ sudo reboot
Check the status after reboot:
$ sudo systemctl status rc-local.service

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Enjoy Support & Share β€οΈπŸ‘πŸ»

T.me/UndercodeTesting
Forwarded from UNDERCODE NEWS
TVer introduces new promotional products and promotes connected TV ad creation.
#Technologies