UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
News from google play: Starting January 18, 2021.
#Updates
Forwarded from UNDERCODE NEWS
Google and its parent company have announced the formation of hundreds of staff unions.
#International
Forwarded from UNDERCODE NEWS
In early 2021, Apple is scheduled to announce the first iPad Pro with a mini LED display.
#Technologies
Forwarded from UNDERCODE NEWS
The fixed and mobile network inefficiencies have been formalized by Tiscali after attack.
#CyberAttacks
Looking for more ecryption, a management tool for dnscrypt-proxy :

-Free

-Open source

https://simplednscrypt.org/

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
This year, Apple will change the cash incentives for managers based on environmental principles.
#International
Forwarded from UNDERCODE NEWS
The Russian hackers sells in darknet a program that allows you to distribute spam messages bypassing traffic and email protection.
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Pyongyang 2407 - Android ROM from North Korea, modified to run on WBW5511_MAINBOARD_P2 devices. Releases contains an archived ROM with all needed tools to boot DPRK Android on compatible hardware. …

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

Check you can see the preloader of your device, this shows up very briefly on powering device without battery. It contains a simple download & boot from RAM backdoor that lets you run any .bin code to read/write/format the EMMC / NAND and SDMMC (which MT6582 boots from). It is provided by the "preloader" function.

1) [136466.320357] usb 1-5: new high-speed USB device number 48 using xhci_hcd

2) [136466.462845] usb 1-5: New USB device found, idVendor=0e8d, idProduct=2000, bcdDevice= 1.00
[136466.462853] usb 1-5: New USB device strings: Mfr=1, Product=2, SerialNumber=0

3) [136466.462858] usb 1-5: Product: MT65xx Preloader

4) [136466.462862] usb 1-5: Manufacturer: MediaTek

5) [136466.526864] cdc_acm 1-5:1.1: ttyACM0: USB ACM device

6) [136468.181907] usb 1-5: USB disconnect, device number 48

7) If you can see something similar to above in dmesg output and no ModemManager is running you can proceed.

load included jellybean (WBW5511GI_0202_T5752) based rom onto device, using SPFlashTool

8) Boot device, it will take a few minutes
root device - kingroot APK (works)

9) put data.ext4 and system.tar onto /sdcard via "adb push"
upload "gnutar" and "busybox-android" from this repo
"adb shell" and check "su" works

10) Install ROM 평양 files
I made some modifications to the KCC files to work with the supplied ROM. For instance I have replaced missing kernel modules in "/usr/lib/modules" and created a compatible layout file with a new kernel image and clean boot loaders. you still need to manually overwrite "/system" and "/data" from a root shell. You must first remount both into rw mode from "adb shell" as root.

11) "mount -o rw,remount /system" "mount -o rw,remount /data"

You then want to "rm -rf /system/" and "/data/" but you cannot run "busybox-android" from "/sdcard" so you must ensure that it survives your "rm -rf" brutality. You are going to wipe important system files and replace them with the contents of the two tar files.

12) cp "busybox-android" and "gnutar" into a executable safe place such as /data.

13) wipe /system after remount rw with "rm -rf /system", run twice, some files will stick.

14) use supplied "gnutar" and PRESERVE PERMISSIONS with "gnutar -xvpf" and unpack system.tar /system
once you have /system unpacked, put busybox-android and gnutar in /system/xbin

15) now do the same "rm -rf /data/*" and "gnutar -xvpf" to /data with data.ext4

16) reboot
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Why are features such as HDMI performance from FreeSync not built into the open source driver?
#Technologies
Forwarded from UNDERCODE NEWS
The president Trump: Banned transactions with 8 Chinese apps including Alipay, QQ, and WPS .
#Ban
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Dynamic analysis of Android applications :

Deploying release candidate
This is a guide to get DroidBox running. The release has only been tested on Linux and Mac OS. If you do not have the Android SDK, download it from http://developer.android.com/sdk/index.html. The following libraries are required: http://www.scipy.org/PyLab'>pylab and http://matplotlib.sourceforge.net/'>matplotlib to provide visualization of the analysis result.

1) Export the path for the SDK tools
export PATH=$PATH:/path/to/android-sdk/tools/ export PATH=$PATH:/path/to/android-sdk/platform-tools/

2) Download necessary files and uncompress it anywhere wget http://droidbox.googlecode.com/files/DroidBox411RC.tar.gz

3) Setup a new AVD targeting Android 4.1.2 and choose Nexus 4 as device as well as ARM as CPU type by running: android

4) Start the emulator with the new AVD: ./startemu.sh <AVD name>

5) When emulator has booted up, start analyzing samples (please use the absolute path to the apk): ./droidbox.sh <file.apk> <duration in secs (optional)>

6) The analysis is currently not automated except for installing and starting packages. Ending the analysis is simply done by pressing Ctrl-C. A package will also be implemented soon to populate the emulator with data prior to performing analysis.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ”΅Cross Site Request Forgery vulnerability in McAfee :

https://dailycve.com/cross-site-request-forgery-vulnerability-mcafee
Forwarded from UNDERCODE NEWS
CES 2021 is going to open online soon. Intel will take the opportunity to warm up the desktop Core.
#Technologies
Forwarded from UNDERCODE NEWS
Microsoft starts mass extermination of famous applications and resources for Windows 10.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The Automation FOrensics Tool (AFOT) is an automation tool build in Python and used for Windows Forensics in order to combine the following tools:

> AnalyzePESig (http://didierstevens.com/files/software/AnalyzePESig_V0_0_0_2.zip)

> National Software Reference Library reduced set (http://www.nsrl.nist.gov/RDS/rds_2.52/rds_252m.zip)

>NSRL Tool (http://didierstevens.com/files/software/nsrl_V0_0_2.zip)

>VirusTotal Search Tool (http://didierstevens.com/files/software/virustotal-search_V0_1_2.zip)

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) https://github.com/harris21/afot

2) cd https://github.com/harris21/afot

3) now run python afot.py in your terminal.

So the procedure is pretty straight-forward:

The user provides the path, which will be used to analyze all the executables included in those folders/subfolders.
AnalyzePESig looks for signed executables, whom certificate will soon be revoked.

AFOT will collect all the non-signed executables and cross-check them with NSRL's hashset database, using the NSRL tool.

Last but not least, if any hashes were found to be in NSRL's hashset database too, we cross-check those hashes with VirusTotal, using the VirusTotal Search tool.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
OnePlus 8T devices are suffering from a serious error reported several times by users. Here's what happens and how to fix.
#Bugs