UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.9K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Report from the ILO: Home employees deserve better security.
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Huawei switch configuration commands :

1. Configuration file related commands
[Quidway]display current-configuration Display the currently effective configuration
[Quidway]display saved-configuration Display the configuration file in the flash, that is, the configuration file used at the next power-up
reset saved-configuration Remove the old one Configuration file
reboot Switch reboot
display version Display system version information

2. Basic configuration
[Quidway]super password Modify privileged user password
[Quidway]sysname Switch naming
[Quidway]interface ethernet 1/0/1 Enter interface view
[Quidway]interface vlan 1 Enter interface view
[Quidway-Vlan-interfacex]ip address 10.1.1.11 255.255.0.0 Configure the IP address of the VLAN
[Quidway]ip route-static 0.0.0.0 0.0.0.0 10.1.1.1 Static route = gateway

3. Telnet configuration
[Quidway]user-interface vty 0 4 Enter virtual terminal
[S3026-ui-vty0-4]authentication-mode password Set password mode
[S3026-ui-vty0-4]set authentication-mode password simple xmws123 Set password
[S3026-ui-vty0-4]user privilege level 3 user level

4. Port configuration
[Quidway-Ethernet1/0/1]duplex {half|full|auto} Configure port working status
[Quidway-Ethernet1/0/1]speed {10|100|auto} Configure port working speed
[Quidway-Ethernet1 /0/1]flow-control Configure port flow control
[Quidway-Ethernet1/0/1]mdi {across|auto|normal} Configure
port link-type [Quidway-Ethernet1/0/1]port link-type {trunk |access|hybrid} Set the port working mode
[Quidway-Ethernet1/0/1] undo shutdown Activate the port
[Quidway-Ethernet1/0/2]quit Exit the system view

5. Link aggregation configuration
[DeviceA] link-aggregation group 1 mode manual Create manual aggregation group 1
[Qw_A] interface ethernet 1/0/1 Add Ethernet port Ethernet1/0/1 to aggregation group 1
[Qw_A-Ethernet1/0 /1] port link-aggregation group 1
[Qw_A-Ethernet1/0/1] interface ethernet 1/0/2 Add Ethernet port Ethernet1/0/1 to aggregation group 1
[Qw_A-Ethernet1/0/2] port link- aggregation group 1
[Qw_A] link-aggregation group 1 service-type tunnel # Create
tunnel service loopback group based on manual aggregation group.
[Qw_A] interface ethernet 1/0/1 Add the Ethernet port Ethernet1/0/1 to the service loopback group.
[Qw_A-Ethernet1/0/1] undo stp
[Qw_A-Ethernet1/0/1] port link-aggregation group 1

6. Port mirroring
[Quidway] monitor-port designated mirror port
[Quidway]port mirror designated mirrored port
[Quidway]port mirror int_list observing-port int_type int_num designated mirroring and mirroring

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
2.5 Gigabit USB Network Card D-Link.
#Technologies
Forwarded from UNDERCODE NEWS
Google and Apple spared Muscovites from the authorities’ general monitoring.
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Bug Bounty Programs:

>>123Contact Form(http://www.123contactform.com/security-acknowledgements.htm)
>>99designs(https://hackerone.com/99designs)
>>Abacus(https://bugcrowd.com/abacus)
>>Acquia(mailto:security@acquia.com)
>>ActiveCampaign(mailto:security@activecampaign.com)
>>ActiveProspect(mailto:security@activeprospect.com)
>>Adobe(https://hackerone.com/adobe)
>>AeroFS(mailto:security@aerofs.com)
>>Airbitz(https://cobalt.io/airbitz)
>>Airbnb(https://hackerone.com/airbnb)
>>Algolia(https://hackerone.com/algolia)
>>Altervista(http://en.altervista.org/feedback.php?who=feedback)
>>Altroconsumo(https://go.intigriti.com/altroconsumo)
>>Amara(mailto:security@amara.org)
>>Amazon Web Services(mailto:aws-security@amazon.com)
>>Amazon.com(mailto:security@amazon.com)
>>ANCILE Solutions Inc.(https://bugcrowd.com/ancile)
>>Anghami(https://hackerone.com/anghami)
>>ANXBTC(https://cobalt.io/anxbtc)
>>Apache httpd(https://hackerone.com/ibb-apache)
>>Appcelerator(mailto:Infosec@appcelerator.com)
>>Apple(mailto:product-security@apple.com)
>>Apptentive(https://www.apptentive.com/contact)
>>Aptible(mailto:security@aptible.com)
>>Ardour(http://tracker.ardour.org/my_view_page.php)
>>Arkane(https://go.intigriti.com/arkanenetwork)
>>ARM mbed(mailto:whitehat@polarssl.org)
>>Asana(mailto:security@asana.com)
>>ASP4all(mailto:support@asp4all.nl)
>>AT&T(https://bugbounty.att.com/bugform.php)
>>Atlassian(https://securitysd.atlassian.net/servicedesk/customer/portal/2)
>>Attack-Secure(mailto:admin@attack-secure.com)
>>Authy(mailto:security@authy.com)
>>Automattic(https://hackerone.com/automattic)
>>Avast!(mailto:bugs@avast.com)
>>Avira(mailto:vulnerabilities@avira.com)
>>AwardWallet(https://cobalt.io/awardwallet)
>>Badoo(https://corp.badoo.com/en/security/#send_bid)
>>Barracuda(https://bugcrowd.com/barracuda)
>>Base(https://go.intigriti.com/base)
>>Basecamp(mailto:security@basecamp.com)
>>Beanstalk(https://wildbit.wufoo.com/forms/wildbit-security-response)
>>BillGuard(https://cobalt.io/billguard)
>>Billys Billing(https://cobalt.io/billys-billing)
>>Binary.com(https://hackerone.com/binary)
>>Binary.com Cashier(https://hackerone.com/binary_cashier)
>>BitBandit.eu(https://cobalt.io/bitbandit-eu)
>>Bitcasa(mailto:security@bitcasa.com)
>>BitCasino(https://cobalt.io/bitcasino)

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Predator is coming and will launch a linkage skin in "Fortnite" game.
#Updates
Forwarded from UNDERCODE NEWS
Intel introduced over 50 processors in one go at the CES show.
#Technologies
Forwarded from UNDERCODE NEWS
"US Department of Defense Further Accelerate 5G Development"
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow to realise efficient attacks, and also allows to carry out denial of service attacks and port scanning. Powered by bettercap and nmap.

F E A T U R E S :

Port scanning
Network mapping
Dos attack
Html code injection
Javascript code injection
Download intercaption and replacement
Sniffing
Dns spoofing
Background audio reproduction
Images replacement
Drifnet
Webpage defacement and more ...

Depencies:

nmap
hping3
build-essential
ruby-dev
libpcap-dev
libgmp3-dev
tabulate
terminaltables

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/LionSec/xerosploit

2) cd xerosploit && sudo python install.py

3) sudo xerosploit

4) CHOOSE option

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁