UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
here are the innovations that will appear on your smartphone in the coming year.
#Technologies
Forwarded from UNDERCODE NEWS
Hyundai: Negotiating on electric car production with Apple.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

hacking & security presentations :

>>Behind the Scenes of iOS Security(https://www.youtube.com/watch?v=BLGFriOKz6U)
>>Modern iOS Application Security(https://www.infoq.com/presentations/ios-security/)
>>Demystifying the Secure Enclave Processor(https://www.youtube.com/watch?v=7UNeUT_sRos)
>>HackPac Hacking Pointer Authentication in iOS User Space(https://www.youtube.com/watch?v=DJFxhShJ6Ns)
>>Analyzing and Attacking Apple Kernel Drivers(https://www.youtube.com/watch?v=07VqX4bbXTI)
>>Remotely Compromising iOS via Wi-Fi and Escaping the Sandbox(https://www.youtube.com/watch?v=bP5VP7vLLKo)
>>Reverse Engineering iOS Mobile Apps(https://www.bugcrowd.com/resources/webinars/reverse-engineering-ios-mobile-apps/)
>>iOS 10 Kernel Heap Revisited(https://www.youtube.com/watch?v=DNW6Im31lQo)
>>KTRW: The journey to build a debuggable iPhone(https://media.ccc.de/v/36c3-10806-ktrw_the_journey_to_build_a_debuggable_iphone)
>>The One Weird Trick SecureROM Hates(https://media.ccc.de/v/36c3-11238-the_one_weird_trick_securerom_hates)
>>Tales of old: untethering iOS 11-Spoiler: Apple is bad at patching(https://media.ccc.de/v/36c3-11034-tales_of_old_untethering_ios_11)
>>Messenger Hacking: Remotely Compromising an iPhone through iMessage(https://media.ccc.de/v/36c3-10497-messenger_hacking_remotely_compromising_an_iphone_through_imessage)
>>Recreating An iOS 0-Day Jailbreak Out Of Apple's Security Updates(https://www.youtube.com/watch?v=p512McKXukU)
>>Reverse Engineering the iOS Simulator’s SpringBoard(https://vimeo.com/231806976)
>>Attacking iPhone XS Max(https://www.youtube.com/watch?v=8cOx7vfszZU&feature=youtu.be)

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The frequently question: when Bitcoin will peak?
#Analytiques
Forwarded from UNDERCODE NEWS
Players use the Unreal Engine to remake Futaba Town's "PokΓ©mon: Diamond/Pearl"
#Updates
Forwarded from UNDERCODE NEWS
"Among us" is the smartphone game most downloaded by consumers in 2020.
#Updates
Forwarded from UNDERCODE NEWS
Japan's 5G hit directly by Corona, can it be rebuilt in 2021?
#Technologies
Forwarded from UNDERCODE NEWS
This may be the year of ultra-fast Internet connectivity.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to properly protect sysctl on Linux from spoofing and Syn flooding:

This configuration will be as follows:
Disable IP forwarding
Disable packet forwarding
Disable accepting ICMP redirects
Enable protection against incorrect error messages
What you need:
Linux OS
User with sudo privileges

πŸ¦‘How to edit sysctl config file ?

Log into your Linux server or desktop and open a terminal window.

πŸ¦‘In the terminal enter the command:

sudo nano /etc/sysctl.conf
First required parameter:
# net.ipv4.ip_forward = 1
change to:

net.ipv4.ip_forward = 0
Next line:

# net.ipv4.conf.all.send_redirects = 0
change to:

net.ipv4.conf.all.send_redirects = 0
Find the line:

# net.ipv4.conf.all.accept_redirects = 0
change to:

net.ipv4.conf.all.accept_redirects = 0
Add the following line below that:

net.ipv4.conf.default.accept_redirects = 0
Finally, add the following lines to the end of the file:

net.ipv4.icmp_ignore_bogus_error_responses = 1
net.ipv4.tcp_syncookies = 1
net.ipv4.tcp_max_syn_backlog = 2048
net.ipv4.tcp_synack_retries = 3
net.ipv4.netfilter.ip_conpntracktime

πŸ¦‘The above settings do the following:

Includes protection against incorrect error messages

Enable SYN cookies to prevent the server from dropping connections when the SYN queue is full

Increase SYS queue size to 2048

W akryvayut state SYN_RECV compound pre
Decrease SYN_RECV timeout value to help mitigate SYN flood attack

Save and close the file.

πŸ¦‘How to reload the configuration ?

You can reload the configuration with the command:

sudo sysctl -p
I found that the sysctl -p command did not load the tcp_max_syn_backlog correctly.
Only after a reboot was the value 2048 added.
So, after running the sudo sysctl -p command, enter the command:

sudo less / proc / sys / net / ipv4 / tcp_max_syn_backlog
Make sure the value shown is 2048.

If the value is less, restart the server.

At this point, your Linux server should be better protected against SYN attacks and IP spoofing.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The value of Robles is equivalent to $30 billion, beating Ubisoft and CDPR.
#International
Forwarded from UNDERCODE NEWS
Many businesses are refuting rumors: the Spring Festival this year will not close.
#International