UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
The attack mechanism becomes more nuanced and delicate with Rockybot upgraded.
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ” Windows security tips for people who use multiple devices at the same time:

1) Safe Wi-Fi in your home. This may seem like an easy task to some, but insecure or simple passwords in your home are a major problem that you can face day after day. The defaults are a bad idea in any advanced community. So make sure you change the default settings or ask your local professional to help you with this. When this is done, make sure the invited expert does not know your WPA2 password, so cover your keyboard while you set it. Remember that you are only responsible for providing the password to those you choose to trust.

2) Consider a VPN. Once you implement a virtual private network (VPN), your work from home is likely much safer. Identity thieves and hackers are more likely to extract your identity from outgoing traffic, so filtering is a good idea. Do not connect your devices to a VPN, as this makes your settings vulnerable and easier to hack.

3) Keep your devices locked. Data is largely stolen and re-hashed via insecure devices that are used without any passwords or security software. Any security, such as passwords, fingerprints, templates, or graphical passes, reduces the risk of data disclosure. However, be careful with facial recognition software as you can likely run into problems in financial operating systems when your face is imprinted on the system. Remember, your devices know what you look like, so use fingerprints.

4) Protect your smart TVs and smartphones with additional software. They are the most insecure and can reveal your personal information. This approach is absolutely unacceptable. However, you cannot let others spy on you through their devices. Look out for sophisticated antivirus software that allows you to use browser extensions, smartphone apps, and security gateways for your IoT environment.

5) Enhance your knowledge. Explore as many options as possible of how the Internet of Things is attacked daily by hackers and identity thieves. Improve your information security competencies. Be knowledgeable about internet security and remember that your interconnected gadgets are your weakness. As Machine Learning (ML) and Artificial Intelligence (AI) become more advanced, consider them as your key weapons against cyber attacks.

6) Don't jailbreak iOS! The latter can be borderline illegal, but be aware. If the system has vulnerabilities, your antivirus software is unlikely to help you. Buy licensed security software if you really want your system to be protected and up to date. Why is the focus on your phone? Because nowadays, you can practically control your entire IoT with it. Therefore, they should be prioritized in your intellectual environment.

7) Choose the best and most comprehensive protection from a trusted antivirus vendor. If you are not sure what features one antivirus has over another, check the comparison of the most important factors. Remember that your antivirus shouldn't be too expensive as there are price reduction options, but at the same time it should have options for all your devices, so if only computer security is offered, this is not enough.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Is personal details been leaked to 1.3 million Hyundai Motor Corporation Russia customers? The Deep Web Post Sales Posts.
#DataBreaches
Forwarded from UNDERCODE NEWS
If leaks of sensitive knowledge happen... After a business, five steps to take.
#CyberAttacks
Forwarded from UNDERCODE NEWS
AI chatbot'Achieved ', the cornerstone of several scandals, is increasing questions regarding the disclosure of personal knowledge.
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ” Monitoring Linux system resources with SAR (System Activity Report) ::

πŸ” Installing Bashtop - Monitoring Resources From Terminal For Linux | macOS | FreeBSD

SAR or System Activity Report is used to monitor Linux system resources.

It can be used to generate reports related to system performance, i.e. CPU reports, memory reports, disk reports, etc.

πŸ” Installing Sensu Go Monitoring Tool on CentOS 8 / RHEL 8

It stores reports as logs on your system.

In this guide, we will learn about system resource monitoring with SAR with some examples, but first, we will install SAR on our system.

πŸ” Installing and Configuring Checkmk on CentOS 8 and Monitoring Linux Hosts with Checkmk Agent

Installation
The SYSSTAT package is required to install the SAR utility on a system.
To install sysstat, run:
$ yum install sysstat
Now start and enable the sysstat service to start using SAR,
$ systemctl start sysstat
$ systemctl enable sysstat
After activating the service, log files for the current day will be created in the β€œ/ var / log / sa” folder in the β€œsa15” file, where 15 is the current date.

Older files will be archived.

We can also change the number of days for which we keep our log files by changing the "HISTORY" parameter in the sysstat configuration file, for example, "/ etc / sysconfig / sysstat".

SAR utility syntax
The syntax for using sar is:

$ sar option interval (in seconds) number of records
An example would be:
$ sar 2 5
In this example, sar will provide a report generated at 2 second intervals with a total of 5 records.
Examples of SAR use
Generating a CPU report
Sar command to generate CPU report:

$ sar -u 2 5
Generating a memory report
The parameter used with sar to generate a memory report is "-r"
$ sar -r 2 5
Generating device statistics
The device report generation option is "-d" and it is used with "-p" to make the report in a readable format,

$ sar -d -p 2 5
Generating a SWAP Usage Report
Ability to generate a SWAp memory report for the system - "-S",

$ sar S 2 5

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
To save device power, Android 12 or let unused apps sleep.
#Updates
Forwarded from UNDERCODE NEWS
Twitter and Facebook blocked by a U.S. Internet service provider.
#Ban
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

Hack with android malwares tutorials :

Β» Android-Reports-and-Resources(https://github.com/B3nac/Android-Reports-and-Resources/blob/master/README.md)

>> android-security-awesome(https://github.com/ashishb/android-security-awesome)

>> Android Penetration Testing Courses(https://medium.com/mobile-penetration-testing/android-penetration-testing-courses-4effa36ac5ed)

>> Lesser-known Tools for Android Application PenTesting(https://captmeelo.com/pentest/2019/12/30/lesser-known-tools-for-
android-pentest.html)

>> android-device-check - a set of scripts to check Android device security configuration(https://github.com/nelenkov/android-device-check)

>> apk-mitm - a CLI application that prepares Android APK files for HTTPS inspection(https://github.com/shroudedcode/apk-mitm)

>> Andriller - is software utility with a collection of forensic tools for smartphones(https://github.com/den4uk/andriller)

>> Dexofuzzy: Android malware similarity clustering method using opcode sequence-Paper(https://www.virusbulletin.com/virusbulletin/2019/11/dexofuzzy-android-malware-similarity-clustering-method-using-opcode-sequence/)

>> Chasing the Joker(https://docs.google.com/presentation/d/1sFGAERaNRuEORaH06MmZKeFRqpJo1ol1xFieUa1X_OA/edit#slide=id.p1)

>> Side Channel Attacks in 4G and 5G Cellular Networks-Slides(https://i.blackhat.com/eu-19/Thursday/eu-19-Hussain-Side-Channel-Attacks-In-4G-And-5G-Cellular-Networks.pdf)

>> Shodan.io-mobile-app for Android(https://github.com/PaulSec/Shodan.io-mobile-app)

>> Popular Android Malware 2018(https://github.com/sk3ptre/AndroidMalware_2018)

>> Popular Android Malware 2019(https://github.com/sk3ptre/AndroidMalware_2019)


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
He mistakenly regained 127 bitcoins lost 8 years ago and wanted to make 4 million US dollars to invest in US stocks.
#International
Forwarded from UNDERCODE NEWS
The Internet of Things transition to Russian hardware has been delayed for a year. Just 2 producers per country are present.
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to sync files and directories on Linux and Windows using Zaloha.sh ?

Installing Zaloha is trivial.

Just download the Zaloha.sh file from the GitHub repository and move it to your $ PATH, for example / usr / local / bin /.

Git clone the Zaloha repository and move the Zaloha.sh file to your $ PATH using the commands:

$ git clone https://github.com/Fitus/Zaloha.sh.git
$ sudo mv Zaloha.sh/Zaloha.sh /usr/local/bin/zaloha.sh
Finally, make it executable:
$ sudo chmod + x /usr/local/bin/zaloha.sh
On Windows, download the script to a suitable local directory.
I decided to put it in the C: \ TOOLS directory.

On Windows, CygWin must be installed as an additional step.

I have already installed CygWin on my laptop.
If you haven't installed CygWin yet, check out the official installation instructions.
Synchronizing files and directories in Linux with Zaloha.sh
Typical uses for Zaloha.sh are as follows.

$ zaloha.sh --sourceDir = <path_to_dir> --backupDir = <path_to_dir>
Let me show you a simple example.

I'm going to create two directories, namely test1 and test 2.

$ mkdir test1 test2
I have two text files named file1 and file2 in the test1 directory.

$ ls test1 /
file1 file2
And the test2 directory is empty.

Now I'm going to sync the test1 and test2 directories using Zaloha:

$ zaloha.sh --sourceDir = test1 / --backupDir = test2 / --color
Press "y" to continue.

Output example:

ANALYZING ./test1/ AND ./test2/
============================================
Parsing .............................................. done.
find ./test2/.Zaloha_metadata/ -path ./test2/.Zaloha_metadata/999_mark_executed -printf '/// \ tL \ t% y \ t% s \ t% Ts \ t% F \ t% D \ t% i \ t% n \ t% u \ t% g \ t% m \ t% P \ t /// \ t% l \ t /// \ n '
find ./test1/ -path ./test1/.Zaloha_metadata -prune -o -ipath './test1/$RECYCLE.BIN' -prune -o -path './test1/.Trash- [0-9] *' -prune -o -path ./test1/lost+found -prune -o -printf '/// \ tS \ t% y \ t% s \ t% Ts \ t% F \ t% D \ t% i \ t% n \ t% u \ t% g \ t% m \ t% P \ t /// \ t% l \ t /// \ n '
find ./test2/ -path ./test2/.Zaloha_metadata -prune -o -ipath './test2/$RECYCLE.BIN' -prune -o -path './test2/.Trash- [0-9] *' -prune -o -path ./test2/lost+found -prune -o -printf '/// \ tB \ t% y \ t% s \ t% Ts \ t% F \ t% D \ t% i \ t% n \ t% u \ t% g \ t% m \ t% P \ t /// \ t% l \ t /// \ n '
Cleaning ............................................. done.
Checking ............................................. done.
Sorting (2) .......................................... done.
Differences processing ...............................
Zaloha AWK: Warning: No last run of Zaloha found (this is OK if this is the first run)
done.
Sorting (3) .......................................... done.
Post-processing and splitting off Exec1 and Exec4 .... done.
Sorting (4) and selecting Exec2 ...................... done.
Preparing shellscript for Exec1 ...................... done.
Preparing shellscript for Exec2 ...................... done.
Preparing shellscript for Exec4 ...................... done.
Preparing shellscript to touch file 999 .............. done.
Preparing shellscripts for case of restore ........... done.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁