UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The Automation FOrensics Tool (AFOT) is an automation tool build in Python and used for Windows Forensics in order to combine the following tools:

> AnalyzePESig (http://didierstevens.com/files/software/AnalyzePESig_V0_0_0_2.zip)

> National Software Reference Library reduced set (http://www.nsrl.nist.gov/RDS/rds_2.52/rds_252m.zip)

>NSRL Tool (http://didierstevens.com/files/software/nsrl_V0_0_2.zip)

>VirusTotal Search Tool (http://didierstevens.com/files/software/virustotal-search_V0_1_2.zip)

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) https://github.com/harris21/afot

2) cd https://github.com/harris21/afot

3) now run python afot.py in your terminal.

So the procedure is pretty straight-forward:

The user provides the path, which will be used to analyze all the executables included in those folders/subfolders.
AnalyzePESig looks for signed executables, whom certificate will soon be revoked.

AFOT will collect all the non-signed executables and cross-check them with NSRL's hashset database, using the NSRL tool.

Last but not least, if any hashes were found to be in NSRL's hashset database too, we cross-check those hashes with VirusTotal, using the VirusTotal Search tool.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
OnePlus 8T devices are suffering from a serious error reported several times by users. Here's what happens and how to fix.
#Bugs
Forwarded from UNDERCODE NEWS
The 2021 Nest home surveillance camera product line is about to be launched by Google.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘DNS SPECIAL UTILITIES :

Β» dnsgram (https://doc.powerdns.com/md/manpages/dnsgram.1/): dnsgram is a debugging tool for intermittent resolver failures. it takes one or more input PCAP files and generates statistics on 5 second segments allowing the study of intermittent resolver issues.

Β» dnsreplaY (https://doc.powerdns.com/md/manpages/dnsreplay.1/): Dnsreplay takes recorded questions and answers and replays them to the specified nameserver and reporting afterwards which percentage of answers matched, were worse or better. Then compares the answers and some other metrics with the actual ones with those found in the dumpfile.

Β» dnsscan (https://doc.powerdns.com/md/manpages/dnsscan.1/): dnsscan takes one or more INFILEs in PCAP format and generates a list of the number of queries per query type.

Β» dnsscope (https://doc.powerdns.com/md/manpages/dnsscope.1/): dnsscope takes an input PCAP and generates some simple statistics outputs these to console.

Β» dnswasher (https://doc.powerdns.com/md/manpages/dnswasher.1/): dnswasher takes an input file in PCAP format and writes out a PCAP file, while obfuscating end-user IP addresses. This is useful to share data with third parties while attempting to protect the privacy of your users.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Mozilla Firefox 85.0 Beta 5 has been released to the official FTP today.
#Updates
Forwarded from UNDERCODE NEWS
They threw away hard drives containing 7,500 Bitcoins as garbage!
#International
Forwarded from UNDERCODE NEWS
Despite US sanctions, GitHub heads over to the hand of Crimea.
#Updates
Forwarded from UNDERCODE NEWS
The past and tag synchronization feature of Microsoft Edge officially started to roll out.
#Updates
Forwarded from UNDERCODE NEWS
In the first half of the year, Apple placed orders for suppliers to produce more than 95 million iPhones.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Attack identification

There are two main methods for identifying traffic attacks:

1) Ping test: If the Ping timeout or severe packet loss is found, it may be attacked. If the server on the same switch is found to be inaccessible, it can basically be determined as a traffic attack. The premise of the test is that the ICMP protocol between the victim host and the server is not blocked by devices such as routers and firewalls;

2) Telnet test: Its distinguishing feature is that the remote terminal fails to connect to the server, and it is easy to judge relative traffic attacks and resource exhaustion attacks. If the website is suddenly very slow or inaccessible, but it can be pinged, it is likely to be attacked. On the Netstat-na command, a large number of SYN_RECEIVED, TIME_WAIT, FIN_WAIT_1 and other statuses were observed, and EASTBLISHED is rarely, which can be determined as a resource exhaustion attack. The characteristic is that the victim host cannot Ping or the packet loss is serious and the server on the same switch is pinged normally. The reason is that the attack caused the system kernel or application CPU utilization to reach 100% and failed to respond to the Ping command, but because there is still bandwidth, the host on the same switch can be pinged.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Apple may launch its redesigned iMac in March.
#Technologies
Forwarded from UNDERCODE NEWS
UK regulatory regulators will probe the purchase of ARM by Nvidia.
#International