UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.5K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How to Find origin servers of websites behind by CloudFlare using Internet-wide scan data from Censys
>CloudFlair is a tool to find origin servers of websites protected by CloudFlare who are publicly exposed and don't restrict network access to the CloudFlare IP ranges as they should.
> The tool uses Internet-wide scan data from Censys to find exposed IPv4 hosts presenting an SSL certificate associated with the target's domain name
T.me/UnderCodeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) Register an account (free) on https://censys.io/register

2) Browse to https://censys.io/account/api, and set two environment variables with your API ID and API secret

3) export CENSYS_API_ID=...

4) export CENSYS_API_SECRET=...

5) Clone the repository
> git clone https://github.com/christophetd/cloudflair.git

6) cd cloudflair

7) pip install -r requirements.txt

8) Run CloudFlair (see Usage below for more detail)

9) python cloudflair.py myvulnerable.site

Then

10) python cloudflair.py --help

usage: cloudflair.py [-h] [-o OUTPUT_FILE] [--censys-api-id CENSYS_API_ID]
[--censys-api-secret CENSYS_API_SECRET]
domain

๐Ÿฆ‘Docker image


A lightweight Docker image of CloudFlair (christophetd/cloudflair) is provided. A scan can easily be instantiated using the following command.

1) docker run --rm -e CENSYS_API_ID=your-id -e CENSYS_API_SECRET=your-secret christophetd/cloudflair myvulnerable.site

2) You can also create a file containing the definition of the environment variables, and use the Docker--env-file option.

> cat censys.env
CENSYS_API_ID=your-id
CENSYS_API_SECRET=your-secret

3) docker run --rm --env-file=censys.env christophetd/cloudflair myvulnerable.site

๐Ÿฆ‘Tested by UndercOde

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘BEST METHODES FOR HACKING ATM
t.me/UndercOdeTesting

1) fake processing center :

>This method can be used if an attacker is able to access the cable that connects the cashier to the network. A hacker disconnects the ATM from the bank's network and then connects it to a device that acts as a fake processing center.

>The cashier is used to control the withdrawal of cash and sends commands to the cashier requesting that money be withdrawn from the selected tray. Voila! The attacker can use any card or enter any PIN code, the false transaction would seem legitimate.

2) remote attack on several ATMs

> In this method an infiltrate is needed to work in the bank. The offender remotely obtains (acquires) a key used to open the cashier's rack. Although this key does not allow the attacker to access the withdrawal of money, the network cable would be exposed. The hacker disconnects the ATM from the bank's network and connects a special device that sends all the data to its own server.

> Often, the network to which you connect to the ATM is not segmented and the ATMs themselves may be misconfigured. In this case, with this device, a hacker could compromise several ATMs at once, even if the malicious device is only connected to one of them.

>The rest of the attack is carried out as we have explained before. A fake processing center is installed on the server and the attacker gains full control over the cashier. Using any card, the culprit can withdraw money from the cashier, regardless of the model

3) Black Box Attack

> As in the method described above, the attacker obtains the key from the cashier's frame and puts the machine into maintenance mode. Then, the hacker connects the so-called black box to the exposed USB port. A black box is a device that allows the hacker to control the cash drawer.

> While the criminal alters the cashier, the screen shows a message that says "in maintenance" or "out of service", although, in reality, it is possible to get money from it. In addition, the black box can be controlled wirelessly with a smartphone .

> hacker only has to press a button on the screen for sacardinero in cash and get rid of the black box to hide the evidence.

4) malware attack

> There are two ways to infect a cashier with malware : inserting a USB device with malware (that means having the key to open the cashier's rack) or infecting the machine remotely, all after having compromised the bank's network.

> If the cashier is not protected against malware and does not use whitelists, a hacker can have the malware send commands to the cashier and sell money. The attack could be repeated until the cashier's money runs out.

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Before You Test An ATM VULNERABILITY OR BUG UNDERSTAND HOW IT WORKS ?
Twitter.com/UndercOdeTC

1) An ATM is composed of electronic subsystems with industrial controllers. However, behind the terminals there is a totally conventional computer that controls the system, in many cases with an outdated
operating system.

2) If the cashier works with Windows XP, it will no longer receive technical support from Microsoft, so any vulnerability it suffers will remain unpatched , leaving it unprotected against hacker attacks.

3) ATM systems have vulnerable software , from non-updated Flash players, and with more than 9,000 known bugs, to remote management tools.

4) The manufacturers of these terminals usually think that ATMs always operate in normal conditions and that they have no operating errors. Therefore, in many cases, ATMs do not have antivirus , or authentication of the application that is responsible for sending commands to the cash dispenser.

5) If a part of the cashier does not contain money, why worry about its security?

> this is what most ATM manufacturers think. Thus, accessing the deposit and ticket dispenser is a complicated task since they are usually shielded and blocked.

6) access to the cashier's computer is quite simple . Security measures are not enough to stop cybercriminals, since the computer is protected only by a plastic case or a thin metal.

7) ATM modules are usually connected to standard interfaces, usually through USB and COM ports (serial port). However, many times the interface can be accessed remotely .

8) Since the Internet is the most economical form of communication today, banks use the Network to connect ATMs to their processing centers. However, many banks do not know that their terminals appear in the Shodan search engine .

> This site allows anyone to find a wide variety of systems connected only with the word " admin " as username and " 1234 " as password, thus demonstrating the poor security of these devices .

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Banking Trojans ALL TYPES 2017 -โ€”> 2020 :
T.me/UndercOdeTesting

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

Alina Spark (Point of Sales Trojan)
Betabot, Neurevt (Trojan)
Bleeding Life 2 (Exploit Pack)
Carberp (Botnet)
Carberp (Banking Trojan)
Crimepack 3.1.3 (Exploit Pack)
Dendroid (Android Trojan)
Dexter v2 (hack point of sale Trojan)
Eda2, Stolich, Win32.Stolich (Ransom)
Sednit, Fancy Bear, APT28, Sofacy, Strontium (Gmail C2C)
FlexiSpy (Spyware)
Fuzzbunch (Exploit Framework)
GMBot (Android Trojan)
Gozi-ISFB - (Banking Trojan)
Grum (Spam Bot)
Hacking Team RCS (Remote Control System)
Hidden Tear (Ransom)
KINS (Banking Trojan)
Mazar (Android Trojan)
Mirai (IoT Botnet)
Pony 2.0 (Stealer)
Poshspy (APT29 backdoor)
PowerLoader (Botnet)
RIG Front-end (Exploit Kit)
Rovnix (Bootkit)
Tinba (Tiny ASM Banking Trojan)
TinyNuke, Nuclear Bot, Micro Banking Trojan, NukeBot (Banking Trojan)
Trochilus, RedLeaves (RAT)
ZeroAccess (Toolkit for ZeroAccess/Sirefef v3)
Zeus (Banking Trojan)

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘AUTHENTIC TUTORIAL HACK BANKS AND CREDIT CARDS EXAMPLE Tested ATTACK BY UndercOde :
(Note: Posted For Educational Purposes Only ๐Ÿ’€)
Twitter.com/UndercOdeTC

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

The attack

1) The fatal error that allowed sensitive information to be stolen is possible when an end user is not properly educated in an easy-to- make and well-known SSL - SSL MITM exploit format :

> The hacker goes to the cafeteria and connects to the same Wi - Fi network to which it is connected. Direct a series of utilities to redirect

2) the data of other users through your machine. He manages a number of other public services to sniff the data, act as an SSL server certificate and be the man - the-middle.

so your SSL Banking session should work under normal conditions, and how it would work during an attack

3) The first thing he would do is turn on fragrouter, so your machine can perform IP forwarding

> shell console > type :
fragrouter (+your ip)

4) After that, he will want to direct his Wi - Fi network traffic to his machine instead of his data traffic going directly to the Internet . This allows you to be the " Man-in - the-middle" between the computer and the Internet. Using arpspoof , a way easy real to do this , it determines its direction IP is 192.168.1.15 and the default gateway of the network Wi - Fi is 192.168.1.1
> or Type ifconfig to get as well

5) The next step is to enable DNS Spoofing through dnsspoof
>Since it is going to replace the Bank or the valid certificate of the online store with its own fake one , you will have to activate the utility so that your system is the Man- in-the- Middle for web sessions and handle certificates . This is done through webmitm

> again in console type :
webmitm -d

6) At this point , it is set up and ready to go , you must now begin to actively smell your data pass through the machine, including access information and credit card information. You choose to do this with Ethereal
> https://download.cnet.com/Ethereal-Network-Protocol-Analyzer/3001-2085_4-10492160.html
Old Stable Version
> then save your capture :
>click save simply

7)You now have the data, but it is still encrypted with 128-bit SSL . No problem, since he has the key . What he simply has to do now is decrypt the data using the certificate he gave you . It does it with Dump SSL:

> ssldump -r Bankcapture -k webmitm.crt -Bankoutput

8) The data is now decrypted and executes a cat command to see the SSL information now decrypted . Note that the username is " Bankusername" and the password is (BankPassword)

> Conveniently, this dump also shows the Banking site as National City . FYI , better, the most secure banking and websites stored online will have connect for the first time to another, ( join @UndercodeTesting) which precedes page via SSL before connecting to the page where confidential information such as bank credentials or credit card numbers is entered

9) With this information , you can now access your bank account online with the same access and privileges as you

E N J O Y W I T H U N D E R C O D E

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘most commun Script In the World :
>The Web framework for perfectionists with deadlines
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) git clone https://github.com/django/django

2) cd django

3) run this command from the command prompt:

> python -m pip install .

๐Ÿฆ‘Usage :

1) Requests and responses

>python -m django --version

> Writing your first Django app

> A public site that lets people view polls and vote in them.
An admin site that lets you add, change, and delete polls.

Weโ€™ll assume you have Django installed already. You can tell Django is installed and which version by running the following command in a shell

prompt (indicated by the $ prefix):
๏…ผ/๏…น ๏…บ

> python -m django --version

If Django is installed, you should see the version of your installation. If it isnโ€™t, youโ€™ll get an error telling โ€œNo module named djangoโ€

2) If this is your first time using Django, youโ€™ll have to take care of some initial setup. Namely, youโ€™ll need to auto-generate some code that establishes a Django project โ€“ a collection of settings for an instance of Django, including database configuration, Django-specific options and application-specific settings.

3) From the command line, cd into a directory where youโ€™d like to store your code, then run the following command:
๏…ผ/๏…น ๏…บ

> django-admin startproject mysite

>This will create a any site directory in your current directory. If it didnโ€™t work, see Problems running django-admin.

๐Ÿฆ‘Where should this code live?

If your background is in plain old PHP (with no use of modern frameworks), youโ€™re probably used to putting code under the Web serverโ€™s document root (in a place such as /var/www). With Django, you donโ€™t do that. Itโ€™s not a good idea to put any of this Python code within your Web serverโ€™s document root, because it risks the possibility that people may be able to view your code over the Web. Thatโ€™s not good for security.

1) Put your code in some directory outside of the document root, such as /home/mycode.

2) Letโ€™s look at what startproject created:

mysite/
manage.py
mysite/
init.py
settings.py
urls.py
asgi.py
wsgi.py

3) These files are:

> The outer mysite/ root directory is a container for your project. Its name doesnโ€™t matter to Django; you can rename it to anything you like.

>manage.py: A command-line utility that lets you interact with this Django project in various ways. You can read all the details about manage.py in django-admin and manage.py.

> The inner mysite/ directory is the actual Python package for your project. Its name is the Python package name youโ€™ll need to use to import anything inside it (e.g. mysite.urls).

> mysite/__init__.py: An empty file that tells Python that this directory should be considered a Python package. If youโ€™re a Python beginner, read more about packages in the official Python docs.

> mysite/settings.py: Settings/configuration for this Django project. Django settings will tell you all about how settings work.

> mysite/urls.py: The URL declarations for this Django project; a โ€œtable of contentsโ€ of your Django-powered site. You can read more about URLs in URL dispatcher.

> mysite/asgi.py: An entry-point for ASGI-compatible web servers to serve your project. See How to deploy with ASGI for more details.

> mysite/wsgi.py: An entry-point for WSGI-compatible web servers to serve your project. See How to deploy with WSGI for more details.

...for more check in git

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How to Secure your Credit Card ?
Twitter.com/UNDERCODETC

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ


1) Use for Small Purchases You Can Pay Off Each Month

> The point of using a secured credit card is to show your ability to responsibly charge and then pay off your balance. To do this, make a few purchases each month and pay your bill in full and on time. By not carrying a balance, you not only avoid paying interest on purchases, but are using a time-tested strategy for building credit.

2) Pay on Time, and More Than the Minimum

> While making your minimum payment on time is one essential element to a healthy credit score, upping that payment each month has added benefits. Among them: helping to pay off more of your balance, which can show that you arenโ€™t able to properly manage your money, and reducing your credit utilization ratio, or the amount you owe compared to your credit limit. Both are factors that affect your credit score.1

3) Make Multiple Payments

> Making more than one monthly payment can help keep your balance continually low. This is important because even if you pay in full each month, you canโ€™t be sure when your credit card issuer will send your report to the three credit agencies, and a large balance reduces your overall credit, which can negatively affect your credit score. You may also choose to send a payment after a heftier-than-normal purchase.2

4) Set Payment Alerts

> Even the most organized person misses a payment now and then. But when you are trying to build credit, thatโ€™s one time too many. Avoid this scenario with payment alerts that remind you of your billโ€™s upcoming due date. You may choose to set up a โ€œPayment Dueโ€ alert with your issuer, and be texted, or manually put together a monthly โ€œalarmโ€ that notifies you a week before your bill is due. 3

5) Enroll in Auto-Pay

> Still concerned about making your payment on time? Perhaps the easiest plan is to enroll in auto-pay, which allows your issuer to automatically deduct the monthly balance from your bank account so you donโ€™t have to keep track of bills. 4

6) Discover reports your credit history to the three major credit bureaus so it can help build your credit if used responsibly. Late payments, delinquencies or other derogatory activity with your credit card accounts and loans may adversely impact your ability to build credit. Discover reports your credit history to the three major credit bureaus so it can help build your credit if used responsibly. Late payments, delinquencies or other derogatory activity with your credit card accounts and loans may adversely impact your ability to build credit.

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ two linux anonymous namespace sockets 2019 Termux api Building :
(Termux add-on app which exposes device functionality as API to command line programs)
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) Project on https://github.com/termux/termux-api

2) How API calls are made through the termux-api helper binary

> The termux-api client binary in the termux-api package generates two linux anonymous namespace sockets, and passes their address to the TermuxApiReceiver broadcast receiver as in:

> /system/bin/am broadcast ${BROADCAST_RECEIVER} --es socket_input ${INPUT_SOCKET} --es socket_output ${OUTPUT_SOCKET}

Note :
>Signature keys of all offered builds are different. Before you switch the installation source, you will have to uninstall the Termux application and all currently installed plugins

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘FULL NETWORKING HACK TOOL UPDATED 2019
t.me/UndercOdeTestingOfficial


๐Ÿฆ‘FEATURES :

ARP Poisoning
ARP Sniffing
DHCP Discover
DHCP Starvation
Fake FTP Server
LAND Attack
SNMP Cracking
Subdomains Identification
SSL/TLS Certificate Cloner
SYN Flooding
TCP Flags Analysis
TCP ISN Analysis
TCP Port Scan
Username check on social networks
Virtual Hosts Identification
Web Techonologies Identification

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) git clone https://github.com/fportantier/habu
2) cd habu
3) Run python3 setup.py

OR
> pip3 install habu

๐Ÿฆ‘Tested ON

> Rooted Termux

> Kali lINUX

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘INTERCEPT AND LISTEN CALLS ON GSM MOBILE NETWORKS :
>How It Works ??
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) Decrytping GSM phone called A5 / 1 is a flow encryption used to provide over- the - air communication privacy in the standard GSM cell phone . It was initially kept secret, but was made public through leaks and reverse engineering.

2) A number of serious deficiencies in the encryption system have been identified . The first is an active attack.

3) GSM phones can be convinced to use the much weaker A5 / 2 briefly encrypted . A5 / 2 can be easily broken , and the phone uses the same key as the strongest A5 / 1 algorithm. A second attack in A5 / 1 is outlined , an encrypted text , only time memory attack handicap that requires a lot of precalculation .

3) GSM Decryption

>recording GSM data can be recorded out of the air using, for example, a programmable radio such as the USRP.

4) When GSM uses A5 / 1 encryption, the secret key can be extracted from registered traffic.

5) Given two encrypted known clear text messages, the Kraken utility example that runs on a PC finds the secret key with a probability of about 90% in a matter of seconds in a set of rainbow tables

6) A set known current table took 2 months to calculate and contains 40 tables for a total of 2 TB.

๐Ÿฆ‘Defenses

1) Short term protocol patches already exist which makes cracking much more difficult for not revealing plain text known unnecessarily (). These patches should be deployed with high priority.


2) In the long term, GSM (2G) does not provide sufficient security and more powerful alternatives such as UMTS (3G) and LTE (4G) should be preferred.

๐Ÿฆ‘Instruments For decrypting :
The following tools are used to analyze voice calls:
- GNU Radio
- Airprobe
- Kraken

> GNU Radio is included in recent Linux distributions.Data logging requires a programmable radio receiver such as the USRP.

@UndercOdeTesting
Xd DIm to get free
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘WhatsApp general encryption Lastest Update 2019- 2020 by UndercOde
Twitter.com/UNDERCODETC

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) Types of public key

> Identity key pair - Long-term Curve25519 key pair,
generated during installation.

2) Signed Pre Key - A medium term Curve25519 pair of keys,
generated during installation, signed by the identity key, and rotated
on a periodic timed basis.

3) A pre-Keys time - a queue of key pairs for a Curve25519
using the time, generated during installation, and replenished as necessary.

๐Ÿฆ‘ Session Key Types

> Root Key - A 32-byte value that is used to create string keys.

>Keychain - A value of 32 bytes that is used to create
Keys messages .

>Key Message - A value of 80 bytes that is used to encrypt
content messages . 32 bytes are used to obtain an AES-256 key, 32 bytes for an
>HMAC-SHA256 key, and 16 bytes for an intravenous injection.

๐Ÿฆ‘client registration

1)At the time of registration, a WhatsApp client transmits its public identity
Key, public key signed Pre (with its signature), and a public batch
A time of pre Keys for the server.

2) The server stores these WhatsApp
public keys associated with the user ID. In no time the
WhatsApp server has access to any of the clients private keys.

๐Ÿฆ‘To establish a session:

1) The client that starts ("initiator") requests the public key identity,
previously signed public key, and a single one-time public Pre key
for the recipient.

2) The server returns the requested public key values. Once
Pre Key is only used once, so it is removed from server storage
after it has been requested. If the recipient's last batch of one-time
Pre keys has been consumed and the recipient has not replenished
them, they will be returned without a single key time previously.

3) The initiator saves the recipient's Key Identity as Irecipient, the
Pre Key Sign as Srecipient, and the one-time as Pre
Orecipient Key .

4) The initiator generates an ephemeral Curve25519 key pair, Einitiator.

5) The initiator loads its own identity key as Iinitiator.

6) The initiator calculates a master secret as master_secret =
ECDH (Iinitiator, Srecipient) || ECDH (Einitiator, Irecipient) ||
ECDH (Einitiator, Srecipient) || ECDH (Einitiator, Orecipient).
If there is no pre Key time, the final ECDH is skipped.

7) The initiator uses HKDF to create a string root key and
master_secret keys .
Receiving session configuration
After the construction of a long-term encryption session, the initiator can immediately

8) start sending messages to the recipient, even if the recipient is not online.
Until the recipient responds, the initiator includes the information (in the
header of all sent messages) that the receiver requires to build a corresponding
session. This includes Einitiator of the initiator and Iinitiator.
When the recipient receives a message that includes session

@UndercOdeTestingOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘TUTORIAL HACKING CART BUY AND GET CREDITCARD Semi-patched for 60% of 2019 Websites for TestingOnly
instagram.com/UnderCodeTestingCompany

>CC (credit cards) can be hacked in two ways: โ€ข Credit card scams (generally used to earn money, sometimes for shopping) โ€ข Shopadmin Hacking credit card (just for fun, knowledge, shopping on the Internet) Shopadmin hacking

> This method by undercode is used to test knowledge or to obtain a credit card to buy on the Internet, or to have fun, or any way but not to charge (because this method does not give PIN - 4-digit code) only gives cc numb, cvv2 and other basic information.

> Shopadmins are from different companies, such as: VP-ASP, X CART, etc. This tutorial is for Testing VP-ASP SHOP to protect your cc

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) I hope or seen when u try to buy something on the Internet with cc, which show u a well programmed, very safe way.

> They are carts, like xcarts vp-asp. Specific sites are not hacked, but cars are hacked. Next, I am publishing tutorial for VP ASP hack cart. Now all the sites that use that cart can be hacked, and through their * mdb file u can get the details of their customers credit card, as well as the login name and password of their administration area and All other customer information and comapny secrets.

2) Type: VP-ASP Shopping cart version 5.00

3) How to find VP-ASP 5.00 sites?

4) Finding VP-ASP 5.00 sites is so simple ...

1-Go to google.com and type: VP-ASP Shopping Cart 5.002. You will find many websites with VP-ASP 5.00 software cart installed.


2-Now we go to the feat.


5) The page will be like this: **: //*.victim.com/shop/shopdisplaycategories.asp The exploit is: diag_dbtest .aspNow you need to do this: **: // *. Victim.com/shop/diag_dbtest.asp

6) A page will appear containing: โ€ข xDatabase โ€ข shopping140 โ€ข xDblocation โ€ข resx โ€ข xdatabasetypexEmailxEmail NamexEmailSubjectxEmailSy stemxEmailTypexOrdernumbe r Example:

7) The most important thing here is xDatabasex40 Data Base

: *: //***.victim.com/shop/shopping140.mdb

8) If you did not download the database, try this while there is dblocation: xDblocationresxthe the url will be: **: //*.victim.com/shop/resx/shopping140.m

USE FOR LEARN NOT FOR SPY๐Ÿ’€

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘WINDOWS 7 ALL VERSION BYPASS LINKS BY UNDERCODE 2020
t.me/UndercOdeTesting

>No-Need for Product Key To Download from Microsoft

๐Ÿฆ‘ X64 ALL:

> https://download.microsoft.com/download/5/1/9/5195A765-3A41-4A72-87D8-200D897CBE21/7601.24214.180801-1700.win7sp1_ldr_escrow_CLIENT_ULTIMATE_x64FRE_en-us.iso

๐Ÿฆ‘X32 ALL:

> https://download.microsoft.com/download/1/E/6/1E6B4803-DD2A-49DF-8468-69C0E6E36218/7601.24214.180801-1700.win7sp1_ldr_escrow_CLIENT_ULTIMATE_x86FRE_en-us.iso


For More DM
@UndercOdeTesting

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ALL Possible Uses Of Spoofing ?
Twitter.com/UndercOdeTC

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) Guessing your email password (seems unlikely, but you would be surprised how simple many email passwords are, such as birthdays, anniversary dates, and other information easily obtained on social media)
Answering your security questions correctly

2) You entered it into a website or form (it may have been a phony website, one that offered you a free gift, or a site you visited from a link in an email)

3) You used the same password on a different site and the site used it to access your email

4) You have a spyware program on your computer that recorded you typing in your password and sent it to a hacker

5) Viruses, malware or other undesirable software is on your computer and allowed a hacker to get your email password

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Twitter profile dumper (downloader) with authorization swapping:
>Tweetlord is an open source Twitter profile dumper (downloader) with the on-the-fly account swapping support for bypassing the rate limit restrictions. It is written in Python 3, uses the Twitter API and generates .xlsx files at the output containing comprehensive information about the given profile #2019 Tested
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/snovvcrash/tweetlord

2) cd tweetlord

3) now set your API keys in the credentials.py file for every Twitter account you want to involve in the procedure

4) If a mistake is made when filling the credentials, the script will terminate with an unhandled tweepy exception

๐Ÿฆ‘Running :

>tweetlord.py [-h] (-u USER | -l) [-fr FRIENDS] [-fo FOLLOWERS]
[-fa FAVORITES] [-ti TIMELINE] [-o OUTPUT] [-w] [-e] [-d]

required arguments:
-u USER, --user USER set the user profile you want to dump: <USER> could be a screen name or an account ID (if it is an ID, you should start the string with the "id" prefix, e. g. "id859377203242426368")
OR
-l, --show-limits show the rate limit status (total โ†’ remaining โ†’ time_to_wait_till_reset) for each of the accounts you set when configuring the tool

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘What to do if your Email is HACKED ?
t.me/iOsDeveloppers

> Check your recent email activity to see if anything was sent that you were not aware of

>Change your password

> Commit to Multi Factor Authentication
Yes, multi-factor authentication adds another step to your login but it also adds another layer of protection. Enabling this will mean that in addition to your password, you will need a special one-time use code to login. This is usually sent to your mobile phone

>Use different passwords for every account

>Start using a password manager to generate random, complex passwords

> Update your system to the latest OS and update your security software

> Change Your Security Question

>Run your antivirus and malware detection programs

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–