UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.2K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
LG announces a new update: Bringing a deadly improuvements to Remote.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Linux security tips:

1) Beware of the emergence of Linux virus at the beginning of Linux. Because of its original excellent design, it seems to have innate virus immunity. At that time, many people believed that there would not be a virus against Linux, but Linux is no exception. In the fall of 1996, an organization called VLAD in Australia wrote Staog, which was said to be the first virus under the Linux system, in assembly language.

2) It specifically infected binary files and tried to obtain root permissions in three ways. Of course, the Staog virus is designed to demonstrate and prove that Linux is potentially dangerous to be infected by the virus. It does not perform any damage to the infected system.

3) In 2001, a Linux worm named Ramen appeared. Ramen virus can spread automatically without manual intervention. Although it does not cause any damage to the server, its scanning behavior while spreading will consume a lot of network bandwidth. Ramen virus is spread by exploiting two security vulnerabilities, rpc.statd and wu-ftp, in some versions of Linux (Redhat6.2 and 7.0).

4) In the same year, Lion, another worm against Linux, caused actual harm. At that time, Lion spread rapidly through the Internet and caused serious damage to the computer systems of some users. Lion virus can send some passwords and configuration files to a mailbox on the Internet via email. After collecting these files, the attacker may enter the entire system again through the gap in the first breakthrough, and further damage Activities, such as obtaining confidential information, installing backdoors, etc. When the user's Linux system is infected with this virus, it is very likely that they may choose to reformat the hard drive because they cannot determine how the intruder has changed the system. Moreover, after a Linux host is infected with the Lion virus, it will automatically start searching for other victims on the Internet. The feedback after the event showed that the Lion virus caused serious losses to many Linux users.

5) Other viruses on Linux platforms include OSF.8759, Slapper, Scalper, Unux.Svat, BoxPoison, etc. Of course, most ordinary Linux users have hardly encountered them. This is because until now, there are very few viruses on Linux and the scope of their impact is very small. However, with the increase of Linux users, more and more Linux systems are connected to the LAN and WAN, which naturally increases the possibility of being attacked. It is foreseeable that more and more Linux viruses will appear, so how to prevent Linux viruses Become something that every Linux user should start paying attention to now.

6) Grasp the weaknesses. Everyone who breaks
Linux may have heard of or even encountered some Linux viruses. The principles and symptoms of these Linux viruses are different, so the prevention methods they take are also different. In order to better prevent Linux viruses, we first classify some known Linux viruses.

7) From the current appearance of Linux viruses, it can be summarized into the following virus types:
1. Viruses that infect ELF format files
This type of virus uses files in the ELF format as the main target of infection. A virus that can infect ELF files can be written through compilation or C. Lindose virus is a virus that can infect ELF files. When it finds an ELF file, it will check whether the infected machine type is Intel80386. If it is, check whether there is a part of the file with a size greater than 2784 bytes (or hexadecimal AEO). If there is, the virus will overwrite it with its own code and add the code of the corresponding part of the host file, and the host The entry point of the file points to the virus code part.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
It is confirmed that an investigation into Google's "Privacy Sandbox" initiative was undertaken by the British antitrust regulator.
#International
Forwarded from UNDERCODE NEWS
We know this bug since long time, and now exposed to public ! Through Telegram, you can find out the location of a person.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
TikTok also excludes the inciting video of Trump claiming that disinformation is not tolerated.
#Ban
Forwarded from UNDERCODE NEWS
Huawei appealed that Sweden had been exempt from 5G building.
#International
Forwarded from UNDERCODE NEWS
Today, AMD officially announced that Dr. Su Zifeng, AMD President and CEO, will give a keynote speech at CES 2021.
#International
Forwarded from UNDERCODE NEWS
Google AI researchers have demonstrated how to create an interpretable model of machine learning.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘importants hacking tools and easy to run :

>>Infoga - Email OSINT(https://github.com/m4ll0k/Infoga)
>>ReconDog(https://github.com/s0md3v/ReconDog)
>>Striker(https://github.com/s0md3v/Striker)
>>SecretFinder (like API & etc)(https://github.com/m4ll0k/SecretFinder)
>>Find Info Using Shodan(https://github.com/m4ll0k/Shodanfy.py)
>>Port Scanner - rang3r(https://github.com/floriankunushevci/rang3r)
>>Breacher(https://github.com/s0md3v/Breacher)
### Wordlist Generator
>>Cupp(https://github.com/Mebus/cupp.git)
>>WordlistCreator(https://github.com/Z4nzu/wlcreator)
>>Goblin WordGenerator(https://github.com/UndeadSec/GoblinWordGenerator.git)
>>Password list (1.4 Billion Clear Text Password)(https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got)


### Wireless attack tools
>>WiFi-Pumpkin(https://github.com/P0cL4bs/wifipumpkin3)
>>pixiewps(https://github.com/wiire/pixiewps)
>>Bluetooth Honeypot GUI Framework(https://github.com/andrewmichaelsmith/bluepot)
>>Fluxion(https://github.com/thehackingsage/Fluxion)
>>Wifiphisher(https://github.com/wifiphisher/wifiphisher)
>>Wifite(https://github.com/derv82/wifite2)
>>EvilTwin(https://github.com/Z4nzu/fakeap)
>>Fastssh(https://github.com/Z4nzu/fastssh)

Reference: git
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Lastest twitter update offer High-resolution images land for Android.
#Updates
Forwarded from UNDERCODE NEWS
Facebook plans to delete from the pages the Like icon.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Signs of a serious infection

Symptom 1: Infected with ransomware

This is the most obvious symptom. The ransomware developer needs to clearly tell the target user that they are infected with the ransomware, otherwise how can they make money? If you are unfortunate enough to become the target user, then your computer should pop up a Warning box and tell you that all your files have been encrypted and you need to pay a ransom for your data to an account before a certain deadline, otherwise you can say goodbye to your files directly.

Symptom 2: Browser redirection



When you use Google to search for the topic "My computer started to exhibit all kinds of strange behaviors", you clicked on a webpage that seemed to meet your search requirements, but the link opened another webpage. Your first reaction is of course to go back to the Google search results just now, and then try to access other links. But it didn't help much. What happened just now happened again. You find that every link you click is redirected to other websites. If this happens, then congratulations, you are infected with malware.

Symptom 3: The homepage is tampered with

For example, you set your favorite sports news website as the homepage, but don't know why, every time you open the browser, the homepage of Yahoo.com will always pop up. And you also find that there are many new widget icons in the browser window, and these icons can't be deleted. Then please be careful, you are probably infected with malware.

Symptom 4: Pop-up window full of screen

The so-called pop-up window full of screen means that after you close this window, another window pops up again. And when you are not connected to the Internet, your system will continue to pop up various notification windows. Of course, there are many websites that will pop up various advertisements. These websites will make you feel very disgusted. If all kinds of inexplicable pop-up messages always appear on your screen, then you may have been infected by malicious ads or spyware.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Once again,after uploading a variety of tweets, Twitter permanently disabled the account of @TeamTrump.
#Ban