UNDERCODE COMMUNITY
2.69K subscribers
1.24K photos
31 videos
2.65K files
80.9K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
🦑How End Users Can Be Susceptible to Malicious PDF Attacks: A Practical Illustration

End users often underestimate the risks of downloading and opening PDFs, assuming these files are harmless. However, attackers can exploit vulnerabilities in PDF readers or embed malicious payloads to compromise a system. Here's an illustrative example of how this attack can be executed: Kali Linux as the attacker's machine, Windows 7 as the victim's machine, and the Metasploit Framework for exploitation.
Attackers often use social engineering to trick the victim into downloading the malicious file:

· Email Phishing: The attacker sends an email impersonating a trusted entity, with the malicious.
PDF attached or linked.

· Drive-By Downloads: Hosting the PDF on a compromised or malicious website.

· USB Drops: Leaving USB devices with the file in public places.

· File Sharing Platforms: Publicly accessible platforms for file sharing, such as peer-to-peer networks or forums, can also be a source of malicious PDFs. Hackers upload infected files disguised as free resources.

Mitigation Strategies
To prevent such attacks, end users and organizations should:

· Update Software Regularly: Keep operating systems and applications, including PDF readers, up to date.

· Use Anti-Malware Tools: Employ advanced threat detection tools to identify and block malicious payloads.

· Be Cautious of Unknown Sources: Avoid downloading files from unknown emails or untrusted websites.

· Sandboxing: Open unknown files in isolated environments to limit potential damage.

· Security Awareness Training: Educate users about phishing tactics and the dangers of opening unsolicited attachments.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Create your own Wordlist:
The tool Crunch is a wordlist generator used for creating custom wordlists based on specific parameters:

Basic Usage:
./crunch <min-len> <max-len> [charset]

For example:
./crunch 3 7 abcdef

This command generates all combinations of characters abcdef between lengths 3 and 7.

### Options Overview:
- -b: Limit the output file size (in bytes). For example, -b 10MB will stop each file at 10MB.
- -c: Limit the number of lines per file, useful when splitting large wordlists.
- -d: Avoid sequences with too many duplicate characters. E.g., -d 2@ suppresses more than 2 adjacent identical letters.
- -e: Stop at a specific string (useful for large datasets).
- -f: Use predefined character sets from a file (e.g., charset.lst).
- -i: Invert the order of character changes (useful for some cracking methodologies).
- -l: Use literal characters in patterns.
- -o: Specify an output file for the generated list.
- -p: Generate all permutations without repeating characters.
- -t: Use patterns to control string structure (e.g., @@god@@ where @ is replaced with lowercase letters).
- -z: Compress the output directly into formats like gzip, bzip, lzma, or 7z.

### Advanced Examples:
1. Generate a list of passwords with a fixed structure:
   ./crunch 8 8 -t abcd@@@@ -o passwords.txt

Output contains 8-character passwords starting with abcd.

2. Limit to 100 lines per file:
   ./crunch 5 5 abcdef -o START -c 100


3. Create a compressed output:
   ./crunch 4 6 1234 -o wordlist.gz -z gzip


4. Avoid adjacent duplicates:
   ./crunch 5 5 abc -d 2@

Excludes passwords like aabbc.

Crunch is powerful and highly configurable, making it ideal for creating targeted wordlists for penetration testing or other tasks. For detailed documentation, visit the [Crunch SourceForge page](https://sourceforge.net/projects/crunch-wordlist/).