Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🌐 #Tesla Superchargers Hit Record High, Network Expands and Speeds Up for All EVs
https://undercodenews.com/tesla-superchargers-hit-record-high-network-expands-and-speeds-up-for-all-evs/
@Undercode_News
https://undercodenews.com/tesla-superchargers-hit-record-high-network-expands-and-speeds-up-for-all-evs/
@Undercode_News
UNDERCODE NEWS
Tesla Superchargers Hit Record High, Network Expands and Speeds Up for All EVs - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Roblox Will No Longer Support #Windows 7 & 8.1 After January 16th, 2025
https://undercodenews.com/roblox-will-no-longer-support-windows-7-amp-8-1-after-january-16th-2025/
@Undercode_News
https://undercodenews.com/roblox-will-no-longer-support-windows-7-amp-8-1-after-january-16th-2025/
@Undercode_News
Forwarded from UNDERCODE TESTING
🦑Phishing email analysis:
1. Mail Header Analysis
- Tool:
- Usage: Extract and analyze email headers to trace the source.
2. Link Analysis
- Tool:
- Usage: Check if links are flagged as malicious.
3. Attachment Analysis
- Tool:
- Usage: Scan attachments for malware.
4. Text Analysis
- Tool:
- Usage: Extract and analyze suspicious text patterns.
5. Complete Email Analysis
- Tool:
- Description: Use this open-source framework to analyze and share Indicators of Compromise (IOCs).
6. Sandbox Analysis
- Tool:
- Usage: Isolate and run suspicious files or links for dynamic analysis.
Installation Example
For ClamAV:
1. Mail Header Analysis
- Tool:
exiftool or mha-parser- Usage: Extract and analyze email headers to trace the source.
exiftool email.eml
2. Link Analysis
- Tool:
urlscan.io CLI or PhishTank API- Usage: Check if links are flagged as malicious.
curl -X POST --data-urlencode 'url=http://example.com' https://urlscan.io/api/v1/scan/
3. Attachment Analysis
- Tool:
ClamAV- Usage: Scan attachments for malware.
clamscan attachment.zip
4. Text Analysis
- Tool:
strings or grep- Usage: Extract and analyze suspicious text patterns.
strings email.eml | grep -i "password"
5. Complete Email Analysis
- Tool:
PyMISP- Description: Use this open-source framework to analyze and share Indicators of Compromise (IOCs).
6. Sandbox Analysis
- Tool:
Cuckoo Sandbox- Usage: Isolate and run suspicious files or links for dynamic analysis.
Installation Example
For ClamAV:
sudo apt update
sudo apt install clamav
sudo freshclam # Update virus definitions
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #Apple's Pro Display XDR: A Look Ahead
https://undercodenews.com/apples-pro-display-xdr-a-look-ahead/
@Undercode_News
https://undercodenews.com/apples-pro-display-xdr-a-look-ahead/
@Undercode_News
UNDERCODE NEWS
Apple's Pro Display XDR: A Look Ahead - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🕵️ Japan #AI Key Business Events to Watch on December 9th
https://undercodenews.com/japan-ai-key-business-events-to-watch-on-december-9th/
@Undercode_News
https://undercodenews.com/japan-ai-key-business-events-to-watch-on-december-9th/
@Undercode_News
UNDERCODE NEWS
Japan AI Key Business Events to Watch on December 9th - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 LBin Credit Card Generator: (Android/Linux/Windows)
The LBin Credit Card Generator is a Python-based tool used for generating valid credit and debit card numbers. It provides details about the bank and the card number, along with the ability to generate combinations of 3-digit codes and expiry dates.
⚠️ Ethical Use Warning
This tool should only be used for ethical purposes. Unauthorized generation and use of credit card numbers is illegal and unethical.
📋 Quick Start Guide
#### Windows Installation
1. Install Git
Download Git for Windows [here](https://git-scm.com/download/win). Ensure you select the option to add Git to the system PATH during installation.
2. Install Python
Download Python [here](https://www.python.org/downloads/), making sure to check the "Add Python to PATH" option during installation.
3. Clone the Repository
Open the command prompt and clone the repository:
4. Navigate to the Project Directory
5. Run the Script
Linux Installation
1. Clone the Repository
2. Navigate to the Project Directory
3. Add Execution Permissions
4. Run the Script
#### Termux (Android) Installation
1. Install Termux
Download and install [Termux](https://play.google.com/store/apps/details?id=com.termux) from the Google Play Store.
2. Install Git
3. Install Python
4. Clone the Repository
5. Navigate to the Project Directory
6. Add Execution Permissions
7. Run the Script
💻 Supported Operating Systems
- Windows 💻
- Linux 🐧
- Termux (Android) 📱
The LBin Credit Card Generator is a Python-based tool used for generating valid credit and debit card numbers. It provides details about the bank and the card number, along with the ability to generate combinations of 3-digit codes and expiry dates.
⚠️ Ethical Use Warning
This tool should only be used for ethical purposes. Unauthorized generation and use of credit card numbers is illegal and unethical.
📋 Quick Start Guide
#### Windows Installation
1. Install Git
Download Git for Windows [here](https://git-scm.com/download/win). Ensure you select the option to add Git to the system PATH during installation.
2. Install Python
Download Python [here](https://www.python.org/downloads/), making sure to check the "Add Python to PATH" option during installation.
3. Clone the Repository
Open the command prompt and clone the repository:
git clone https://github.com/lalaio1/LBin-CC-generator-.git
4. Navigate to the Project Directory
cd LBin-CC-generator-
5. Run the Script
python start.py
Linux Installation
1. Clone the Repository
git clone https://github.com/lalaio1/LBin-CC-generator-.git
2. Navigate to the Project Directory
cd LBin-CC-generator-
3. Add Execution Permissions
chmod +x start.py
4. Run the Script
python3 start.py
#### Termux (Android) Installation
1. Install Termux
Download and install [Termux](https://play.google.com/store/apps/details?id=com.termux) from the Google Play Store.
2. Install Git
pkg install git
3. Install Python
pkg install python3
4. Clone the Repository
git clone https://github.com/lalaio1/LBin-CC-generator-.git
5. Navigate to the Project Directory
cd LBin-CC-generator-
6. Add Execution Permissions
chmod +x start.py
7. Run the Script
python3 start.py
💻 Supported Operating Systems
- Windows 💻
- Linux 🐧
- Termux (Android) 📱
Python.org
Download Python
The official home of the Python Programming Language
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Cars Hacking Utilities:
- [How to hack a car — a quick crash-course](https://medium.freecodecamp.org/hacking-cars-a-guide-tutorial-on-how-to-hack-a-car-5eafcfbbb7ec) - Car enthusiast Kenny Kuchera illustrates just enough information to get you up and running. An excellent resource for first timers!
- [Stopping a Jeep Cherokee on the Highway Remotely](https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/) - Chris Valasek's and Charlie Miller's pivotal research on hacking into Jeep's presented at DEFCON in 2015.
- [Troy Hunt on Controlling Nissans](https://www.troyhunt.com/controlling-vehicle-features-of-nissan/) - Troy Hunt goes into controlling Nissan vehicles.
- [Tesla hackers explain how they did it at Defcon](http://www.cnet.com/roadshow/news/tesla-hackers-explain-how-they-did-it-at-def-con-23/) - Overview of DEFCON 23 presentation on hacking into Tesla cars.
- [Anatomy of the Rolljam Wireless Car Hack](http://makezine.com/2015/08/11/anatomy-of-the-rolljam-wireless-car-hack/) - Overview of the RollJam rolling code exploitation device.
- [IOActive's Tools and Data](http://blog.ioactive.com/2013/08/car-hacking-content.html) - Chris Valasek and Charlie Miller release some of their tools and data for hacking into vehicles in an effort to get more people into vehicle security research.
- [Developments in Car Hacking](https://www.sans.org/reading-room/whitepapers/ICS/developments-car-hacking-36607) - via the SANS Reading Room, Currie's paper analyses the risks and perils of smart vehicle technology.
- [Car Hacking on the Cheap](http://www.ioactive.com/pdfs/IOActive_Car_Hacking_Poories.pdf) - A whitepaper from Chris Valasek and IOActive on hacking your car when you don't have a lot of resources at your disposal.
- [Car Hacking: The definitive source](http://illmatics.com/carhacking.html) - Charlie Miller and Chris Valasek publish all tools, data, research notes, and papers for everyone for free
- [Car Hacking on the cheap](https://community.rapid7.com/community/transpo-security/blog/2017/02/08/car-hacking-on-the-cheap) - Craig Smith wrote a brief article on working with Metasploit’s HWBrige using ELM327 Bluetooth dongle
- [Researchers tackle autonomous vehicle security](https://phys.org/news/2017-05-tackle-autonomous-vehicle.html) - Texas A&M researchers develop intelligence system prototype.
- [Reverse engineering of the Nitro OBD2](https://blog.quarkslab.com/reverse-engineering-of-the-nitro-obd2.html) - Reverse engineering of CAN diagnostic tools.
- [Analysis of an old Subaru Impreza - Subaru Select Monitor v1 (SSM1)](https://p1kachu.pluggi.fr/project/automotive/2018/12/28/subaru-ssm1/) - Digging into an old ECU through an old protocol and disabling a 1997 Subaru Impreza's speed limiter.
- [Car Hacking in 30 Minutes or Less](https://brysonpayne.com/2018/10/20/start-car-hacking-in-30-minutes-or-less/) - Using VirtualBox and Kali Linux, you can start car hacking using completely free open-source software and tools, including can-utils, ICSim, ScanTool, Wireshark, and tcpdump
Source
- [How to hack a car — a quick crash-course](https://medium.freecodecamp.org/hacking-cars-a-guide-tutorial-on-how-to-hack-a-car-5eafcfbbb7ec) - Car enthusiast Kenny Kuchera illustrates just enough information to get you up and running. An excellent resource for first timers!
- [Stopping a Jeep Cherokee on the Highway Remotely](https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/) - Chris Valasek's and Charlie Miller's pivotal research on hacking into Jeep's presented at DEFCON in 2015.
- [Troy Hunt on Controlling Nissans](https://www.troyhunt.com/controlling-vehicle-features-of-nissan/) - Troy Hunt goes into controlling Nissan vehicles.
- [Tesla hackers explain how they did it at Defcon](http://www.cnet.com/roadshow/news/tesla-hackers-explain-how-they-did-it-at-def-con-23/) - Overview of DEFCON 23 presentation on hacking into Tesla cars.
- [Anatomy of the Rolljam Wireless Car Hack](http://makezine.com/2015/08/11/anatomy-of-the-rolljam-wireless-car-hack/) - Overview of the RollJam rolling code exploitation device.
- [IOActive's Tools and Data](http://blog.ioactive.com/2013/08/car-hacking-content.html) - Chris Valasek and Charlie Miller release some of their tools and data for hacking into vehicles in an effort to get more people into vehicle security research.
- [Developments in Car Hacking](https://www.sans.org/reading-room/whitepapers/ICS/developments-car-hacking-36607) - via the SANS Reading Room, Currie's paper analyses the risks and perils of smart vehicle technology.
- [Car Hacking on the Cheap](http://www.ioactive.com/pdfs/IOActive_Car_Hacking_Poories.pdf) - A whitepaper from Chris Valasek and IOActive on hacking your car when you don't have a lot of resources at your disposal.
- [Car Hacking: The definitive source](http://illmatics.com/carhacking.html) - Charlie Miller and Chris Valasek publish all tools, data, research notes, and papers for everyone for free
- [Car Hacking on the cheap](https://community.rapid7.com/community/transpo-security/blog/2017/02/08/car-hacking-on-the-cheap) - Craig Smith wrote a brief article on working with Metasploit’s HWBrige using ELM327 Bluetooth dongle
- [Researchers tackle autonomous vehicle security](https://phys.org/news/2017-05-tackle-autonomous-vehicle.html) - Texas A&M researchers develop intelligence system prototype.
- [Reverse engineering of the Nitro OBD2](https://blog.quarkslab.com/reverse-engineering-of-the-nitro-obd2.html) - Reverse engineering of CAN diagnostic tools.
- [Analysis of an old Subaru Impreza - Subaru Select Monitor v1 (SSM1)](https://p1kachu.pluggi.fr/project/automotive/2018/12/28/subaru-ssm1/) - Digging into an old ECU through an old protocol and disabling a 1997 Subaru Impreza's speed limiter.
- [Car Hacking in 30 Minutes or Less](https://brysonpayne.com/2018/10/20/start-car-hacking-in-30-minutes-or-less/) - Using VirtualBox and Kali Linux, you can start car hacking using completely free open-source software and tools, including can-utils, ICSim, ScanTool, Wireshark, and tcpdump
Source
freeCodeCamp
How to hack a car — a quick crash-course
The goal of this article is to get you started hacking cars — fast, cheap, and easy. In order to do this, we’ll spoof the RPM gauge as an…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ VinFast Doubles Down on Electric Vehicles with New Factory in Vietnam
https://undercodenews.com/vinfast-doubles-down-on-electric-vehicles-with-new-factory-in-vietnam/
@Undercode_News
https://undercodenews.com/vinfast-doubles-down-on-electric-vehicles-with-new-factory-in-vietnam/
@Undercode_News
UNDERCODE NEWS
VinFast Doubles Down on Electric Vehicles with New Factory in Vietnam - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
🦑How End Users Can Be Susceptible to Malicious PDF Attacks: A Practical Illustration
End users often underestimate the risks of downloading and opening PDFs, assuming these files are harmless. However, attackers can exploit vulnerabilities in PDF readers or embed malicious payloads to compromise a system. Here's an illustrative example of how this attack can be executed: Kali Linux as the attacker's machine, Windows 7 as the victim's machine, and the Metasploit Framework for exploitation.
Attackers often use social engineering to trick the victim into downloading the malicious file:
· Email Phishing: The attacker sends an email impersonating a trusted entity, with the malicious.
PDF attached or linked.
· Drive-By Downloads: Hosting the PDF on a compromised or malicious website.
· USB Drops: Leaving USB devices with the file in public places.
· File Sharing Platforms: Publicly accessible platforms for file sharing, such as peer-to-peer networks or forums, can also be a source of malicious PDFs. Hackers upload infected files disguised as free resources.
Mitigation Strategies
To prevent such attacks, end users and organizations should:
· Update Software Regularly: Keep operating systems and applications, including PDF readers, up to date.
· Use Anti-Malware Tools: Employ advanced threat detection tools to identify and block malicious payloads.
· Be Cautious of Unknown Sources: Avoid downloading files from unknown emails or untrusted websites.
· Sandboxing: Open unknown files in isolated environments to limit potential damage.
· Security Awareness Training: Educate users about phishing tactics and the dangers of opening unsolicited attachments.
End users often underestimate the risks of downloading and opening PDFs, assuming these files are harmless. However, attackers can exploit vulnerabilities in PDF readers or embed malicious payloads to compromise a system. Here's an illustrative example of how this attack can be executed: Kali Linux as the attacker's machine, Windows 7 as the victim's machine, and the Metasploit Framework for exploitation.
Attackers often use social engineering to trick the victim into downloading the malicious file:
· Email Phishing: The attacker sends an email impersonating a trusted entity, with the malicious.
PDF attached or linked.
· Drive-By Downloads: Hosting the PDF on a compromised or malicious website.
· USB Drops: Leaving USB devices with the file in public places.
· File Sharing Platforms: Publicly accessible platforms for file sharing, such as peer-to-peer networks or forums, can also be a source of malicious PDFs. Hackers upload infected files disguised as free resources.
Mitigation Strategies
To prevent such attacks, end users and organizations should:
· Update Software Regularly: Keep operating systems and applications, including PDF readers, up to date.
· Use Anti-Malware Tools: Employ advanced threat detection tools to identify and block malicious payloads.
· Be Cautious of Unknown Sources: Avoid downloading files from unknown emails or untrusted websites.
· Sandboxing: Open unknown files in isolated environments to limit potential damage.
· Security Awareness Training: Educate users about phishing tactics and the dangers of opening unsolicited attachments.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #WhatsApp for #iOS 242483: Sharing Sticker Packs, Simplified
https://undercodenews.com/whatsapp-for-ios-242483-sharing-sticker-packs-simplified/
@Undercode_News
https://undercodenews.com/whatsapp-for-ios-242483-sharing-sticker-packs-simplified/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Unmasking Malicious Activity: A Look at Honeypot Logs
https://undercodenews.com/unmasking-malicious-activity-a-look-at-honeypot-logs/
@Undercode_News
https://undercodenews.com/unmasking-malicious-activity-a-look-at-honeypot-logs/
@Undercode_News
UNDERCODE NEWS
Unmasking Malicious Activity: A Look at Honeypot Logs - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #Apple to Expand Retail Presence in Saudi Arabia
https://undercodenews.com/apple-to-expand-retail-presence-in-saudi-arabia/
@Undercode_News
https://undercodenews.com/apple-to-expand-retail-presence-in-saudi-arabia/
@Undercode_News
UNDERCODE NEWS
Apple to Expand Retail Presence in Saudi Arabia - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#ByteDance's #AI Ambitions: A Chinese #Tech Giant's Rise
https://undercodenews.com/bytedances-ai-ambitions-a-chinese-tech-giants-rise/
@Undercode_News
https://undercodenews.com/bytedances-ai-ambitions-a-chinese-tech-giants-rise/
@Undercode_News
UNDERCODE NEWS
ByteDance's AI Ambitions: A Chinese Tech Giant's Rise - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
☁️ #AI for the Masses: Perplexity CEO Proposes Free Access for Indian Students
https://undercodenews.com/ai-for-the-masses-perplexity-ceo-proposes-free-access-for-indian-students/
@Undercode_News
https://undercodenews.com/ai-for-the-masses-perplexity-ceo-proposes-free-access-for-indian-students/
@Undercode_News
UNDERCODE NEWS
AI for the Masses: Perplexity CEO Proposes Free Access for Indian Students - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
A Glimpse into the Future: One UI 7's Now Bar
https://undercodenews.com/a-glimpse-into-the-future-one-ui-7s-now-bar/
@Undercode_News
https://undercodenews.com/a-glimpse-into-the-future-one-ui-7s-now-bar/
@Undercode_News
UNDERCODE NEWS
A Glimpse into the Future: One UI 7's Now Bar - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
💾 #Galaxy S25 Ultra Rumored to Feature 16GB RAM on Higher Storage Tiers
https://undercodenews.com/galaxy-s25-ultra-rumored-to-feature-16gb-ram-on-higher-storage-tiers/
@Undercode_News
https://undercodenews.com/galaxy-s25-ultra-rumored-to-feature-16gb-ram-on-higher-storage-tiers/
@Undercode_News
UNDERCODE NEWS
Galaxy S25 Ultra Rumored to Feature 16GB RAM on Higher Storage Tiers - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚠️ A New #Malware Campaign Targets Russian Users
https://undercodenews.com/a-new-malware-campaign-targets-russian-users/
@Undercode_News
https://undercodenews.com/a-new-malware-campaign-targets-russian-users/
@Undercode_News
UNDERCODE NEWS
A New Malware Campaign Targets Russian Users - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ Timestamp Sharing on #YouTube Music: A New Audio Sharing
https://undercodenews.com/timestamp-sharing-on-youtube-music-a-new-audio-sharing/
@Undercode_News
https://undercodenews.com/timestamp-sharing-on-youtube-music-a-new-audio-sharing/
@Undercode_News
UNDERCODE NEWS
Timestamp Sharing on YouTube Music: A New Audio Sharing - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🔒 Level Up Your Game: Unlock Exclusive Rewards with Garena Free Fire Max Redeem Codes
https://undercodenews.com/level-up-your-game-unlock-exclusive-rewards-with-garena-free-fire-max-redeem-codes/
@Undercode_News
https://undercodenews.com/level-up-your-game-unlock-exclusive-rewards-with-garena-free-fire-max-redeem-codes/
@Undercode_News
UNDERCODE NEWS
Level Up Your Game: Unlock Exclusive Rewards with Garena Free Fire Max Redeem Codes - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 Jeff Bezos's Unconventional Approach to Meetings
https://undercodenews.com/jeff-bezoss-unconventional-approach-to-meetings/
@Undercode_News
https://undercodenews.com/jeff-bezoss-unconventional-approach-to-meetings/
@Undercode_News
UNDERCODE NEWS
Jeff Bezos's Unconventional Approach to Meetings - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…