UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.6K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ The meaning of sniffer and sniffer

Sniffers (sniffers) have almost as long a history as the internet. Sniffer is a commonly used method of collecting useful data. These data can be user account numbers and passwords, or some commercial confidential data. With the increasing popularity of the Internet and e-commerce, the security of the Internet has received more and more attention. Sniffer, which plays an important role in Internet security risks, has attracted more and more attention, so today I want to introduce Sniffer and how to stop it.

Most hackers only want to detect hosts on the intranet and gain control. Only those "ambitious" hackers will install Trojan horses and backdoor programs and clear records in order to control the entire network. The technique they often use is to install sniffers.

On the intranet, if hackers want to quickly obtain a large number of accounts (including user names and passwords), the most effective method is to use the "sniffer" program. This method requires that the host running the Sniffer program and the monitored host must be on the same Ethernet segment, so running the sniffer on an external host has no effect. Furthermore, you must use the sniffer program as root to be able to monitor the data flow on the Ethernet segment. When it comes to Ethernet sniffers, you must talk about Ethernet sniffing.
So what is an Ethernet

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Xbox Series X aiming for overthrow PS, just small without cost
#Technologies
Forwarded from UNDERCODE NEWS
AhnLab was selected by Frost & Sullivan as the Korean Endpoint Security Business of the Year.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ” How to check the OpenSSH version:

1) How to find out the OpenSSH version
The SSH command provides the ability to check the version of the local SSH server as well as on remote systems.

Use the following commands to check the version of OpenSSH running on local or remote systems.

Checking the OpenSSH version on the local system
Use the following command to check the version of OpenSSH running on your local system.

ssh -V

2) Let's check the OpenSSH version on the remote system -
You can also find a version of OpenSSH server running on remote servers.

This can be done by connecting the remote server via SSH in detail.

The connection log shows the version of the SSH server on the local system, as well as the version of OpenSSH running on the remote computer.

ssh -v localhost

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Germany passes a security bill conditionally permitting the usage of Huawei devices on 5G networks.
#Technologies
Forwarded from UNDERCODE NEWS
3D food printing thanks to a cassava starch gel.
#Technologies
Mac Address changer for windows in one click

https://technitium.com/tmac/
Forwarded from UNDERCODE NEWS
17,447 flaws found this year For 4 consecutive years, record upgrade
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Google secretly bought a business that openly turns outdated PCs into Chromebooks.
#Updates
Forwarded from UNDERCODE NEWS
STMicro Adds Secure 2-Core Version to LoRaWAN Wireless MCU.
#Technologies
Forwarded from UNDERCODE NEWS
How Private tweets are exposed to public ?
#Bugs
Forwarded from UNDERCODE NEWS
"Bitcoin could jump to $ 40,000; between 30 percent and 70 percent of fake trading"
#Updates
Forwarded from UNDERCODE NEWS
Anti-monopoly Internet: Will "Digital Taxes" be turned off?
#Analytiques
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘UPDATED HACK ANDROID/WEB/SNIFF/WIFI /MUCH MORE...

Information Gathering
Password Attacks
Wireless Testing
Exploitation Tools
Sniffing & Spoofing
Web Hacking
Private Web Hacking
Post Exploitation
Install The HACKERPRO
Information Gathering:
Nmap
Setoolkit
Port Scanning
Host To IP
wordpress user
CMS scanner
XSStrike
Dork - Google Dorks Passive Vulnerability Auditor
Scan A server's Users
Crips
Password Attacks:
Cupp
Ncrack
Wireless Testing:
reaver
pixiewps
Fluxion
Exploitation Tools:
ATSCAN
sqlmap
Shellnoob
commix
FTP Auto Bypass
jboss-autopwn
Sniffing & Spoofing:
Setoolkit
SSLtrip
pyPISHER
SMTP Mailer
Web Hacking:
Drupal Hacking
Inurlbr
Wordpress & Joomla Scanner
Gravity Form Scanner
File Upload Checker
Wordpress Exploit Scanner
Wordpress Plugins Scanner
Shell and Directory Finder
Joomla! 1.5 - 3.4.5 remote code execution
Vbulletin 5.X remote code execution
BruteX - Automatically brute force all services running on a target
Arachni - Web Application Security Scanner Framework
Private Web Hacking:
Get all websites
Get joomla websites
Get wordpress websites
Control Panel Finder
Zip Files Finder
Upload File Finder
Get server users
SQli Scanner
Ports Scan (range of ports)
ports Scan (common ports)
Get server Info
Bypass Cloudflare
Post Exploitation:
Shell Checker
POET
Weeman

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

A) Installation in Linux :

1) Open Terminal and Type : git clone https://github.com/jaykali/hackerpro.git

2) After Downloading The File Type : sudo cd hackerpro && sudo python2 hackerpro.py


B) Installation in Android :
1st Download Termux

1) Then Open Termux and Type : apt update && apt upgrade && apt install git && apt install python2

2) After That Open Termux and Type : git clone https://github.com/jaykali/hackerpro.git

3) Then Type : cd hackerpro && python2 hackerpro.py

After install choose options with numbers,simple to use

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The 2021 hot infrastructure technologies chosen by five specialists, the Grand Prix that exceeded the M1 chip.
#Analytiques
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SOME PHP BASICS TIPS :

1) Sort array based on string keys (default)
The following example shows the use of ksort() without an optional argument.

First, create a PHP file with the following script. One dimensional associative array of four elements are declared in the script. Here, the ksort() function is used to sort the array based on the key values in ascending order. If no optional argument is used in the ksort() function, then it will sort the array normally. Next, the foreach loop is used to print the sorted array with keys and values.

<?php
//Declare an associative array
$clients = array("c4089"=>"Mehrab Hossain", "c1289"=>"Munir Chowdhury", "c2390"=>"Meena Rahman", "c1906"=>"Roksana Kamal");

//Apply default ksort()
ksort($clients);

echo "<h2>The sorted array values are:</h2>";

//Print the array values after sort
foreach ($clients as $key => $value) {
echo "$key = $value<br />";
}
?>
Output:
The following output will appear after running the script from the server. The output shows that the key values of the array are sorted.

2) Example 2: Sort array based on numeric keys
The following example shows the way to sort the one-dimensional numeric array using the ksort() function.

First, create a PHP file with the following script. Here, an associative array of four elements is declared, where the key values of the array are numeric. 1 is used as the optional argument value of ksort() in the script that is used to sort an array based on numeric key values. Next, a foreach loop is used to print the sorted array.

<?php
//Declare an associative array
$items = array(89564=>"Monitor", 98765=>"Mouse", 34234=>"Printer", 18979=>"Scanner");

//Apply ksort() with optional argument value 1
ksort($items, 1);

echo "<h2>The sorted array values are:</h2>";

//Print the array values after sort
foreach ($items as $key => $value) {
echo "$key = $value<br />";
}
?>
Output:
The following output will appear after running the script from the server. The output shows the array keys and values after sorting the array based on numeric key values.

linux mint
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
WhatsApp tests the Mac desktop client's speech and video calling features.
#Updates