UNDERCODE COMMUNITY
2.69K subscribers
1.24K photos
31 videos
2.65K files
80.9K links
🦑 Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


Youtube.com/Undercode
by Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 LBin Credit Card Generator: (Android/Linux/Windows)

The LBin Credit Card Generator is a Python-based tool used for generating valid credit and debit card numbers. It provides details about the bank and the card number, along with the ability to generate combinations of 3-digit codes and expiry dates.

⚠️ Ethical Use Warning
This tool should only be used for ethical purposes. Unauthorized generation and use of credit card numbers is illegal and unethical.



📋 Quick Start Guide

#### Windows Installation
1. Install Git
Download Git for Windows [here](https://git-scm.com/download/win). Ensure you select the option to add Git to the system PATH during installation.

2. Install Python
Download Python [here](https://www.python.org/downloads/), making sure to check the "Add Python to PATH" option during installation.

3. Clone the Repository
Open the command prompt and clone the repository:
   git clone https://github.com/lalaio1/LBin-CC-generator-.git


4. Navigate to the Project Directory
   cd LBin-CC-generator-


5. Run the Script
   python start.py


Linux Installation
1. Clone the Repository
   git clone https://github.com/lalaio1/LBin-CC-generator-.git


2. Navigate to the Project Directory
   cd LBin-CC-generator-


3. Add Execution Permissions
   chmod +x start.py


4. Run the Script
   python3 start.py


#### Termux (Android) Installation
1. Install Termux
Download and install [Termux](https://play.google.com/store/apps/details?id=com.termux) from the Google Play Store.

2. Install Git
   pkg install git


3. Install Python
   pkg install python3


4. Clone the Repository
   git clone https://github.com/lalaio1/LBin-CC-generator-.git


5. Navigate to the Project Directory
   cd LBin-CC-generator-


6. Add Execution Permissions
   chmod +x start.py


7. Run the Script
   python3 start.py


💻 Supported Operating Systems
- Windows 💻
- Linux 🐧
- Termux (Android) 📱
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Cars Hacking Utilities:

- [How to hack a car — a quick crash-course](https://medium.freecodecamp.org/hacking-cars-a-guide-tutorial-on-how-to-hack-a-car-5eafcfbbb7ec) - Car enthusiast Kenny Kuchera illustrates just enough information to get you up and running. An excellent resource for first timers!

- [Stopping a Jeep Cherokee on the Highway Remotely](https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/) - Chris Valasek's and Charlie Miller's pivotal research on hacking into Jeep's presented at DEFCON in 2015.

- [Troy Hunt on Controlling Nissans](https://www.troyhunt.com/controlling-vehicle-features-of-nissan/) - Troy Hunt goes into controlling Nissan vehicles.

- [Tesla hackers explain how they did it at Defcon](http://www.cnet.com/roadshow/news/tesla-hackers-explain-how-they-did-it-at-def-con-23/) - Overview of DEFCON 23 presentation on hacking into Tesla cars.

- [Anatomy of the Rolljam Wireless Car Hack](http://makezine.com/2015/08/11/anatomy-of-the-rolljam-wireless-car-hack/) - Overview of the RollJam rolling code exploitation device.

- [IOActive's Tools and Data](http://blog.ioactive.com/2013/08/car-hacking-content.html) - Chris Valasek and Charlie Miller release some of their tools and data for hacking into vehicles in an effort to get more people into vehicle security research.

- [Developments in Car Hacking](https://www.sans.org/reading-room/whitepapers/ICS/developments-car-hacking-36607) - via the SANS Reading Room, Currie's paper analyses the risks and perils of smart vehicle technology.

- [Car Hacking on the Cheap](http://www.ioactive.com/pdfs/IOActive_Car_Hacking_Poories.pdf) - A whitepaper from Chris Valasek and IOActive on hacking your car when you don't have a lot of resources at your disposal.

- [Car Hacking: The definitive source](http://illmatics.com/carhacking.html) - Charlie Miller and Chris Valasek publish all tools, data, research notes, and papers for everyone for free

- [Car Hacking on the cheap](https://community.rapid7.com/community/transpo-security/blog/2017/02/08/car-hacking-on-the-cheap) - Craig Smith wrote a brief article on working with Metasploitâ€s HWBrige using ELM327 Bluetooth dongle

- [Researchers tackle autonomous vehicle security](https://phys.org/news/2017-05-tackle-autonomous-vehicle.html) - Texas A&M researchers develop intelligence system prototype.

- [Reverse engineering of the Nitro OBD2](https://blog.quarkslab.com/reverse-engineering-of-the-nitro-obd2.html) - Reverse engineering of CAN diagnostic tools.

- [Analysis of an old Subaru Impreza - Subaru Select Monitor v1 (SSM1)](https://p1kachu.pluggi.fr/project/automotive/2018/12/28/subaru-ssm1/) - Digging into an old ECU through an old protocol and disabling a 1997 Subaru Impreza's speed limiter.

- [Car Hacking in 30 Minutes or Less](https://brysonpayne.com/2018/10/20/start-car-hacking-in-30-minutes-or-less/) - Using VirtualBox and Kali Linux, you can start car hacking using completely free open-source software and tools, including can-utils, ICSim, ScanTool, Wireshark, and tcpdump

Source
Forwarded from Exploiting Crew (Pr1vAt3)
🦑How End Users Can Be Susceptible to Malicious PDF Attacks: A Practical Illustration

End users often underestimate the risks of downloading and opening PDFs, assuming these files are harmless. However, attackers can exploit vulnerabilities in PDF readers or embed malicious payloads to compromise a system. Here's an illustrative example of how this attack can be executed: Kali Linux as the attacker's machine, Windows 7 as the victim's machine, and the Metasploit Framework for exploitation.
Attackers often use social engineering to trick the victim into downloading the malicious file:

· Email Phishing: The attacker sends an email impersonating a trusted entity, with the malicious.
PDF attached or linked.

· Drive-By Downloads: Hosting the PDF on a compromised or malicious website.

· USB Drops: Leaving USB devices with the file in public places.

· File Sharing Platforms: Publicly accessible platforms for file sharing, such as peer-to-peer networks or forums, can also be a source of malicious PDFs. Hackers upload infected files disguised as free resources.

Mitigation Strategies
To prevent such attacks, end users and organizations should:

· Update Software Regularly: Keep operating systems and applications, including PDF readers, up to date.

· Use Anti-Malware Tools: Employ advanced threat detection tools to identify and block malicious payloads.

· Be Cautious of Unknown Sources: Avoid downloading files from unknown emails or untrusted websites.

· Sandboxing: Open unknown files in isolated environments to limit potential damage.

· Security Awareness Training: Educate users about phishing tactics and the dangers of opening unsolicited attachments.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Create your own Wordlist:
The tool Crunch is a wordlist generator used for creating custom wordlists based on specific parameters:

Basic Usage:
./crunch <min-len> <max-len> [charset]

For example:
./crunch 3 7 abcdef

This command generates all combinations of characters abcdef between lengths 3 and 7.

### Options Overview:
- -b: Limit the output file size (in bytes). For example, -b 10MB will stop each file at 10MB.
- -c: Limit the number of lines per file, useful when splitting large wordlists.
- -d: Avoid sequences with too many duplicate characters. E.g., -d 2@ suppresses more than 2 adjacent identical letters.
- -e: Stop at a specific string (useful for large datasets).
- -f: Use predefined character sets from a file (e.g., charset.lst).
- -i: Invert the order of character changes (useful for some cracking methodologies).
- -l: Use literal characters in patterns.
- -o: Specify an output file for the generated list.
- -p: Generate all permutations without repeating characters.
- -t: Use patterns to control string structure (e.g., @@god@@ where @ is replaced with lowercase letters).
- -z: Compress the output directly into formats like gzip, bzip, lzma, or 7z.

### Advanced Examples:
1. Generate a list of passwords with a fixed structure:
   ./crunch 8 8 -t abcd@@@@ -o passwords.txt

Output contains 8-character passwords starting with abcd.

2. Limit to 100 lines per file:
   ./crunch 5 5 abcdef -o START -c 100


3. Create a compressed output:
   ./crunch 4 6 1234 -o wordlist.gz -z gzip


4. Avoid adjacent duplicates:
   ./crunch 5 5 abc -d 2@

Excludes passwords like aabbc.

Crunch is powerful and highly configurable, making it ideal for creating targeted wordlists for penetration testing or other tasks. For detailed documentation, visit the [Crunch SourceForge page](https://sourceforge.net/projects/crunch-wordlist/).