UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Recently from undercode tweets :
In the future, Firefox may force HTTPS links to prohibit access to insecure pages
twitter.com/undercodeNews

1) Future versions of Firefox may introduce HTTPS-only mode, which means that access to unsecured websites is completely blocked. In the latest version of Firefox 76 Nightly, Mozilla has introduced an experimental feature. If everything goes well, it will land in the stable version in the next few months and be open to all users.

2) Browser vendors, including Mozilla, have been pushing HTTPS for a long time. Although most websites have upgraded and enabled the security protocol, some sites still use HTTP. When HTTPS-only mode is enabled, the Firefox browser will no longer load HTTP websites.

3) The browser first attempts to access the server to obtain an HTTPS link, and if the version does not exist, it will provide the user with an error message saying "Secure connection failed". To enable it, install the latest Firefox Nightly version and enable the dom.security.https_only_mode flag in the about: config page. When enabled, HTTP pages will no longer load.

> check more news their
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to use VPN to stream via Chromecast or AirPlay ?
t.me/undercodeTesting

1) Chromecast and AirPlay let you stream music and videos from your computer or mobile device to speakers, TVs, and other stream devices. But all of them need Wi-Fi, which can be problematic if you use a VPN.

2) When the VPN is turned on, your traffic moves through the encrypted tunnel, which prevents devices connected to the same Wi-Fi network from detecting each other. This is how it should work, because you don’t want someone just being in the coverage area of your network to find out what you are doing. It's sad to admit, but it also means that Chromecast and AirPlay will not work while you are using a VPN.

3) The easiest solution is to turn off the VPN, but it is not the only one. You can use split tunneling, as noted earlier, to route through the VPN only the traffic that you want to protect. You can also enable the VPN-browser plugin, it only encrypts browser traffic and nothing else.

4) Alternative solution: you can install VPN on your router. After that, all devices connected to your router (from your phone to the smart juicer) will use encrypted traffic. This is a great solution for well-equipped smart homes.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to hide secret data inside an image or audio file in seconds :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

A) How does steganography work?
There are several methods for hiding data inside regular files. One of the most common and easy to understand is a method called LSB.

> It changes the last few bits in a byte to encode the message. This is especially useful when working with images where the red, green and blue colors of each pixel are encoded using 8 bits or 1 byte from 0 to 255 in decimal or in binary from 00000000 to 11111111.

> Changing the last two bits in a completely red pixel from 11111111 to 11111101 changes the value of red from 255 to 253. For the naked eye, this difference is imperceptible, while the message will be encoded inside the picture.

2) Embedding hidden data in a file
Using Steghide is very easy. To install the application through the Linux terminal, use the apt command .

apt-get install steghide

3) When the program is installed, enter the following command to embed data in a file:

steghide embed -ef secretFile -cf coverFile -sf outputFile -z compressionLevel -e scheme

πŸ¦‘ The arguments may be as follows:

-ef specifies the path to the file you want to hide. You can embed a file of any type in another file, including Python scripts and shell files.
-cf is the file where the data is embedded. Supported file types are BMP, JPEG, WAV, and AU.
-sf is an optional argument that defines the resulting file. If you do not specify it, the original file where the data is inserted will be overwritten with the new file.
-z determines the compression level between 1 and 9. If you do not want to compress your file, use the -Z argument.
-e specifies the type of encryption. Steghide supports many encryption schemes. If this argument is not specified, the 128-bit AES algorithm is used. If you prefer not to use encryption, type -e none.

> In this example, secret text is hidden inside the cat image. The original file is not overwritten or compressed, encryption is not used.

steghide embed -ef secret.txt -cf StegoCat.jpg -e none -Z

> An example of working with Steghide through a terminal

πŸ¦‘ When you run the Steghide command, you will be asked to set a password, which will later allow you to retrieve the embedded data. Enter the password twice to confirm. After that, you can hide the data in image and audio files.

> Comparison of the original image and the image with the embedded text. The difference in the eye can not be determined.

3) Retrieve hidden data from a file
Retrieving hidden data from a file is even easier than pasting it there. The following command applies:

$ steghide extract -sf stegoFile -xf outputFile

> displayed in the terminal window.

After entering the command, you will need to enter pass

Hiding information in images is very simple.
The benefits of steganography are that you can hide data right in front of other people's eyes, but they will not see it. The minimum difference in the files is not visible by eye, at least if you do not look closely under the microscope.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘hide secret data inside image
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Cybercriminals use COVID-19 discount codes to sell viruses and fake items How ? by Undercode :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) As the world continues to watch the coronavirus pandemic, cybercriminals take advantage of people's fears and are looking for new ways to get them to install viruses on their devices.

2) Another study from Checkpoint says that hackers use the COVID-19 code to sell malicious applications and tools on the darknet. For example, a Facebook account hacking tool is shown below for $ 300 with a 15% discount.

3) Attackers also send offers to buy fake products, such as a cheap MacBook Air laptop, which could be stolen. Trusting such offers is never worth it.

4) Researchers at Checkpoint also say that the number of coronavirus-related domains is growing rapidly. Last week alone, 6,000 were registered. Of the domains registered over the past three weeks, only 93 (0.8%) were malicious. However, more than 2200 (19%) sites were suspicious.

5) In another study, Zscalar writes that cybercriminals are creating more and more sites with fake home testing tools for coronavirus and applications that supposedly protect you from COVID-19.

6) In addition, criminals use the words corona and covid in URLs to carry out phishing attacks. Attackers are asking people to enter a username and password from an email, supposedly to go to the article of the Center for Disease Control and Prevention.

7) Earlier in March, it was reported how hackers use fake coronavirus distribution cards and Android apps to steal data and money. It is recommended that you use trusted sources of information and buy health-related devices from trusted sellers. Also, do not open file attachments from unknown sources.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to visit DarkNet anonymously?+ tested LIsts
Remember that the Tor browser is absolutely not enough for anonymous surfing, and even more so for any active actions on the darknet. We recommend that you use the onion browser in conjunction with the VPN. CyberGhost is best suited for these purposes :

1) does not save any logs (even connection metadata);

2) Prevents IP, DNS, or WebRTC leakage

3) best data encryption AES-256;

4) high speed and a bunch of locations to choose from;
the cheapest VPN that is suitable for surfing on DarkNet.
Again! To get started, buy yourself a normal VPN and only then pop into the darknet. You can read the review on CyberGhost or look at something else from the VPN rating ok .

5) DarkNet list of sites for Russian-speaking users:
http://lwplxqzvmgu43uff.onion - Runion, Anonymous forum: Bitcoin, Tor, free market;

http://bitmixbizymuphkc.onion - the best bitcoin mixer , you can mix BTC, ETH, LTC.

buybit4xcbat2cwn.onion RU BuyBit - instant purchase and sale of bitcoin (with Qiwi integration), the service does not require any confirmations and accepts payment from terminals. Good online support that solves your questions online. Online discussion

http://totetxidh73fm4e3.onion - Totet, Bitcoin tote;

https://onion.cab - clearnet (!) onion.cab, viewing hidden onion-sites without Tor;

http://facebookcorewwwi.onion - Facebook, the same one));

http://sms4tor3vcr2geip.onion - SMS4TOR, a service of self-destructing messages;

http://oi4bvjslpt5gabjq.onion - RΓ©publique de Hackers, another French hacker forum;

http://pwoah7foa6au2pul.onion - marketplace Alphabay market;

http://mail2tor2zyjdctd.onion - Mail2Tor, e-mail service;

http://torbox3uiot6wchz.onion - TorBox, e-mail service inside .onion;

http://zw3crggtadila2sg.onion/imageboard - TorChan, "Tor's # 1 imageboard";

http://cyjabr4pfzupo7pg.onion - CYRUSERV, jabber service from CYRUSERV;

http://rutorc6mqdinc4cz.onion - RuTor.org, a well-known torrent tracker;

http://flibustahezeous3.onion is a famous on-line electronic library.

Read also: Video cards for cryptocurrency mining
Darknet Search Engines:
http://hss3uro2hsxfogfq.onion - search engine not Evil;

http://xmh57jrzrnw6insl.onion/ - Torch search engine;

http://gjobqjj7wyczbqie.onion/ - Candle search engine;

http://msydqstlz2kzerdg.onion - search engine Ahmia;

https://3g2upl4pq6kufc4m.onion/ - DuckDuckGo search engine;

http://grams7enufi7jmdl.onion/ - Grams search engine;

https://tor2web.org - Search for darknet sites without Tor.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Fix VPN VPN Issues for Privacy :
instagram.com/undercodeTesting



> Ineffective VPN service can be a source of trouble. Netflix and Hulu browsing will not work in countries where access to them is denied. You will not be protected on publicly accessible Wi-Fi networks. Worst of all, your provider will be able to see everything that you do, which is a big violation of privacy.

If the VPN service you have installed does not work or does not work fully, try the tips below.

1) Restart VPN
Often the problem is that the service is looping when trying to connect. This happens when you switch from one Wi-Fi network to another or to mobile Internet. The problem persists, there is no solution for it. Is that constantly work on the same network.

> To fix the connection problem, start the VPN application, turn it off and on again. Depending on the particular service, it may be quite simple to run the program and press a single button to turn it on and off. Or you can open the settings and turn the VPN off and on again.

2) Forced closing the VPN application
Even easier to completely close the VPN application. This can be done by opening the list of currently running applications and removing the VPN program from there. If you have an iPhone X or newer, the list of running applications opens with a gesture from the bottom of the screen up to the middle. On iPhone 8 and older models, double-click the Home button, then with a gesture up the VPN card, uninstall the application.

3) Reset LTE connection
If you travel a lot in your home country or between countries, network connection problems may occur. This may affect the VPN connection. Therefore, it is recommended that you reset the LTE connection. To do this, run the settings, go to the "Cellular" section, turn off and on the switch "Mobile data". After a few seconds, the VPN application will try to reconnect.

4) Reset network settings
Problems can be solved by resetting network settings. Go to Settings> General> Reset. Click on reset network settings, enter the pin code and confirm that it will lead to a reboot of the device and will clear all network settings.

> This is one of the best ways to solve all the connection problems, but it will erase all Wi-Fi networks and passwords for them.

5) Reboot iPhone
Even if the connection to the VPN is completed, it may not work correctly. For example, if you chose a server in another country because you want to bypass geographic restrictions on access to content, but could not bypass the restriction, the connection may be incorrect or the VPN does not work in the background. In this case,undercode- you should restart the iPhone and there are several ways to do this.

> Go to Settings> General> Turn Off, swipe the slider. Need iOS 11 or later.

> Use the AssistiveTouch shortcut (iOS 11 and later)

>Use voice control (iOS 13 and later)

> Press and hold the Sleep / Wake button, swipe the slider that appears (iPhone 8 and older)

> Press and hold the side button and one of the volume buttons, swipe the slider that appears (iPhone X and newer)

>If you use voice control or AssistiveTouch, the iPhone will turn off and on itself. Otherwise, you need to press and hold the side button or Sleep / Wake button before the unit turns on.
6) Force reboot iPhone
You can perform a hard reset of your iPhone:

Press and hold the volume control down and simultaneously on the Sleep / Wake button before the Apple logo appears (iPhone 7)
Press the volume control up, then down, then press and hold the side button or Sleep / Wake button until the Apple logo appears (iPhone 8 or later)
Press and hold the Sleep / Wake and Home buttons until the Apple logo appears (iPhone 6s and later)

7) Select a different region.
If the VPN connection is not working or working too slowly, try changing the region. Some services automatically select the server that they consider the most suitable. In some, you can specify the server yourself from a specific country or city. After changing the server, you may need to restart your iPhone.


8) Update your VPN application
If there are problems with the VPN, such as application freezes or crashes, you may need to update the program. In iOS 12 and older, launch the App Store, click on the "Updates" tab at the bottom, find your VPN application and click "Update." You can also search for your application in the store.

For iOS 13, open the App Store, click on the icon of your profile, find the VPN application and click "Update." You can also use the search.


9) Use a different VPN application
If all else fails, you can choose a different VPN service from the App Store. If you tried all the above tips and the application does not work correctly, it's time to try something else. Enter in the store in the search for VPN and choose any other program.




Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁