UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
πŸ¦‘hide secret data inside image
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Cybercriminals use COVID-19 discount codes to sell viruses and fake items How ? by Undercode :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) As the world continues to watch the coronavirus pandemic, cybercriminals take advantage of people's fears and are looking for new ways to get them to install viruses on their devices.

2) Another study from Checkpoint says that hackers use the COVID-19 code to sell malicious applications and tools on the darknet. For example, a Facebook account hacking tool is shown below for $ 300 with a 15% discount.

3) Attackers also send offers to buy fake products, such as a cheap MacBook Air laptop, which could be stolen. Trusting such offers is never worth it.

4) Researchers at Checkpoint also say that the number of coronavirus-related domains is growing rapidly. Last week alone, 6,000 were registered. Of the domains registered over the past three weeks, only 93 (0.8%) were malicious. However, more than 2200 (19%) sites were suspicious.

5) In another study, Zscalar writes that cybercriminals are creating more and more sites with fake home testing tools for coronavirus and applications that supposedly protect you from COVID-19.

6) In addition, criminals use the words corona and covid in URLs to carry out phishing attacks. Attackers are asking people to enter a username and password from an email, supposedly to go to the article of the Center for Disease Control and Prevention.

7) Earlier in March, it was reported how hackers use fake coronavirus distribution cards and Android apps to steal data and money. It is recommended that you use trusted sources of information and buy health-related devices from trusted sellers. Also, do not open file attachments from unknown sources.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to visit DarkNet anonymously?+ tested LIsts
Remember that the Tor browser is absolutely not enough for anonymous surfing, and even more so for any active actions on the darknet. We recommend that you use the onion browser in conjunction with the VPN. CyberGhost is best suited for these purposes :

1) does not save any logs (even connection metadata);

2) Prevents IP, DNS, or WebRTC leakage

3) best data encryption AES-256;

4) high speed and a bunch of locations to choose from;
the cheapest VPN that is suitable for surfing on DarkNet.
Again! To get started, buy yourself a normal VPN and only then pop into the darknet. You can read the review on CyberGhost or look at something else from the VPN rating ok .

5) DarkNet list of sites for Russian-speaking users:
http://lwplxqzvmgu43uff.onion - Runion, Anonymous forum: Bitcoin, Tor, free market;

http://bitmixbizymuphkc.onion - the best bitcoin mixer , you can mix BTC, ETH, LTC.

buybit4xcbat2cwn.onion RU BuyBit - instant purchase and sale of bitcoin (with Qiwi integration), the service does not require any confirmations and accepts payment from terminals. Good online support that solves your questions online. Online discussion

http://totetxidh73fm4e3.onion - Totet, Bitcoin tote;

https://onion.cab - clearnet (!) onion.cab, viewing hidden onion-sites without Tor;

http://facebookcorewwwi.onion - Facebook, the same one));

http://sms4tor3vcr2geip.onion - SMS4TOR, a service of self-destructing messages;

http://oi4bvjslpt5gabjq.onion - RΓ©publique de Hackers, another French hacker forum;

http://pwoah7foa6au2pul.onion - marketplace Alphabay market;

http://mail2tor2zyjdctd.onion - Mail2Tor, e-mail service;

http://torbox3uiot6wchz.onion - TorBox, e-mail service inside .onion;

http://zw3crggtadila2sg.onion/imageboard - TorChan, "Tor's # 1 imageboard";

http://cyjabr4pfzupo7pg.onion - CYRUSERV, jabber service from CYRUSERV;

http://rutorc6mqdinc4cz.onion - RuTor.org, a well-known torrent tracker;

http://flibustahezeous3.onion is a famous on-line electronic library.

Read also: Video cards for cryptocurrency mining
Darknet Search Engines:
http://hss3uro2hsxfogfq.onion - search engine not Evil;

http://xmh57jrzrnw6insl.onion/ - Torch search engine;

http://gjobqjj7wyczbqie.onion/ - Candle search engine;

http://msydqstlz2kzerdg.onion - search engine Ahmia;

https://3g2upl4pq6kufc4m.onion/ - DuckDuckGo search engine;

http://grams7enufi7jmdl.onion/ - Grams search engine;

https://tor2web.org - Search for darknet sites without Tor.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Fix VPN VPN Issues for Privacy :
instagram.com/undercodeTesting



> Ineffective VPN service can be a source of trouble. Netflix and Hulu browsing will not work in countries where access to them is denied. You will not be protected on publicly accessible Wi-Fi networks. Worst of all, your provider will be able to see everything that you do, which is a big violation of privacy.

If the VPN service you have installed does not work or does not work fully, try the tips below.

1) Restart VPN
Often the problem is that the service is looping when trying to connect. This happens when you switch from one Wi-Fi network to another or to mobile Internet. The problem persists, there is no solution for it. Is that constantly work on the same network.

> To fix the connection problem, start the VPN application, turn it off and on again. Depending on the particular service, it may be quite simple to run the program and press a single button to turn it on and off. Or you can open the settings and turn the VPN off and on again.

2) Forced closing the VPN application
Even easier to completely close the VPN application. This can be done by opening the list of currently running applications and removing the VPN program from there. If you have an iPhone X or newer, the list of running applications opens with a gesture from the bottom of the screen up to the middle. On iPhone 8 and older models, double-click the Home button, then with a gesture up the VPN card, uninstall the application.

3) Reset LTE connection
If you travel a lot in your home country or between countries, network connection problems may occur. This may affect the VPN connection. Therefore, it is recommended that you reset the LTE connection. To do this, run the settings, go to the "Cellular" section, turn off and on the switch "Mobile data". After a few seconds, the VPN application will try to reconnect.

4) Reset network settings
Problems can be solved by resetting network settings. Go to Settings> General> Reset. Click on reset network settings, enter the pin code and confirm that it will lead to a reboot of the device and will clear all network settings.

> This is one of the best ways to solve all the connection problems, but it will erase all Wi-Fi networks and passwords for them.

5) Reboot iPhone
Even if the connection to the VPN is completed, it may not work correctly. For example, if you chose a server in another country because you want to bypass geographic restrictions on access to content, but could not bypass the restriction, the connection may be incorrect or the VPN does not work in the background. In this case,undercode- you should restart the iPhone and there are several ways to do this.

> Go to Settings> General> Turn Off, swipe the slider. Need iOS 11 or later.

> Use the AssistiveTouch shortcut (iOS 11 and later)

>Use voice control (iOS 13 and later)

> Press and hold the Sleep / Wake button, swipe the slider that appears (iPhone 8 and older)

> Press and hold the side button and one of the volume buttons, swipe the slider that appears (iPhone X and newer)

>If you use voice control or AssistiveTouch, the iPhone will turn off and on itself. Otherwise, you need to press and hold the side button or Sleep / Wake button before the unit turns on.
6) Force reboot iPhone
You can perform a hard reset of your iPhone:

Press and hold the volume control down and simultaneously on the Sleep / Wake button before the Apple logo appears (iPhone 7)
Press the volume control up, then down, then press and hold the side button or Sleep / Wake button until the Apple logo appears (iPhone 8 or later)
Press and hold the Sleep / Wake and Home buttons until the Apple logo appears (iPhone 6s and later)

7) Select a different region.
If the VPN connection is not working or working too slowly, try changing the region. Some services automatically select the server that they consider the most suitable. In some, you can specify the server yourself from a specific country or city. After changing the server, you may need to restart your iPhone.


8) Update your VPN application
If there are problems with the VPN, such as application freezes or crashes, you may need to update the program. In iOS 12 and older, launch the App Store, click on the "Updates" tab at the bottom, find your VPN application and click "Update." You can also search for your application in the store.

For iOS 13, open the App Store, click on the icon of your profile, find the VPN application and click "Update." You can also use the search.


9) Use a different VPN application
If all else fails, you can choose a different VPN service from the App Store. If you tried all the above tips and the application does not work correctly, it's time to try something else. Enter in the store in the search for VPN and choose any other program.




Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to find, delete and manage the sending of data from applications and sites to Facebook :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) What is activity outside of Facebook?
Although Facebook collects a lot of information about users on its platform, these are not all sources. The sites and applications you visit can also share collected data from Facebook. When you enter the application or website using your Facebook account or the website has a hidden Facebook tracker, all your actions are sent to this social network.

>You bought shoes in the online store

> An online store shares your activity with your business tools.

> Facebook receives your activity outside of Facebook and stores it in your account. Activity is saved as β€œVisit to the site of clothes and shoes” and β€œPurchase”.

> You see Facebook ads with a 10% discount on the following shoes or clothes in the online store.

2 ) What is Facebook doing with your activity?
The question is what Facebook is doing with information regarding your activity outside the social network. Facebook claims there are five uses for this activity:

>Targeted ad serving

>Offer groups, events, products that you may like

>Help finding companies and brands

>Helping organizations and enterprises understand how their sites, applications, and advertising reach the right people.

>Identify Suspicious Activity for Facebook Security

3) Search for activity outside of Facebook
There are a couple of ways to find an activity page outside of Facebook.

A) Via Facebook Settings
In an iOS app, click on the Facebook icon at the bottom of the navigation bar. If you have an older version of the application, click on the hamburger menu icon. On Android, click on the hamburger menu icon at the top in the navigation bar. In both cases, scroll down, click Settings and Privacy, then Settings. Scroll down again and select "Activity outside of Facebook."

B) Through privacy settings
You can click "Privacy Settings" in the "Settings and Privacy" section. Then scroll down and click on β€œView or clear activity outside of Facebook”.

4) View activity in individual applications and sites
On the β€œActivity outside of Facebook” page, you can click β€œManage activity outside of Facebook” or on the set of profile icons at the top. Here you can see a list of all applications and sites from where Facebook receives information.

> Each source in the list shows the date when Facebook received the information, and the number of similar cases above the icon. The maximum value of 20+ can be any large.

> Click on a source to analyze activity. At the top you will again see the date of receipt of information,

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HOW fix android Ransomware:
> network has appeared the source code of the ransomware SLocker Android, simulating WannaCry
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

>WannaCry malware interface , which infected hundreds of thousands of computers in countries around the world.

1) After infection, SLocker runs in the background of the victim without their knowledge and consent, encrypting images, documents and videos on mobile devices.

2) Once SLocker encrypted the files on the device, the ransomware takes complete control of the phone. He is also able to obtain administrator rights and control the microphone and camera devices.

πŸ¦‘ Smartphones that have been infected by malware
Here is a list of infected smartphones:

Galaxy Note 2
Galaxy Tab S2
LG G4
Galaxy S7
Xiaomi Mi 4i
Galaxy S4
Galaxy Note 4
ZTE x500
Galaxy Note 3
Galaxy Tab 2
Oppo n3
Galaxy Note 5
Vivo X6 plus
Nexus 5
Nexus 5X
Galaxy Note Edge
Asus zenfone 2
Galaxy A5
LenovoS90
OppoR7 plus
Xiaomi Redmi
Lenovo A850

πŸ¦‘How to protect yourself?

> We recommend that you take basic precautions to protect yourself from these threats:

1) Never open email attachments from unknown senders.

2) Never click on links in SMS or MMS messages.

3) Even if the letter looks normal from some company ,.

4) Go to Settings β†’ Security and disable "allow installation of applications from sources other than Google Play."

5) We do not recommend connecting to unknown Wi-Fi networks and turn off Wi-Fi when not in use.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

FIX GAMING ERROR 0x0000013 WINDOWS 7-WIN8 fro microsoft :
Twitter.com/undercodeNews

Press Windows key + X
Click Command Prompt (Admin)

Type in at the prompt OR Copy and Paste these one at a time : (Hit enter after each)

Dism /Online /Cleanup-Image /CheckHealth

Dism /Online /Cleanup-Image /ScanHealth

Dism /Online /Cleanup-Image /RestoreHealth

Also run the System File Checker utility:

Press Windows key + X
Click Command Prompt (Admin)

At the Command Prompt, type: sfc/scannow

This will check for any integrity violations

Restart your system

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ OpenVpn Vulnerabilities :
pinterest.com/undercode_Testing

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) CVE-2017-7508 - the ability to remotely shut down a server or client by sending a specially designed IPv6 packet. The problem manifests itself when the β€œβ€“mssfix” option is enabled;

2) CVE-2017-7512 is a series of problems in the OpenSSL certificate parsing code caused by the leak of several bytes of memory during the processing of each connection attempt. Having generated a large number of requests, you can cause the exhaustion of all available memory for the server process and cause a crash or prepare the conditions for exploiting the vulnerability CVE-2017-7521;

3) CVE-2017-7520 - the possibility of remote crashes of client software or information leakage from the client at the stage prior to authentication (you can read 96 extra bytes of the stack, which may well contain a proxy password). The problem is caused by the ability to read from the memory area outside the buffer boundaries and is manifested in systems using the β€œ-http-proxy" option together with authentication via ntlm2. Operation can be accomplished by modifying traffic during the MITM attack between the client and the proxy;

4) CVE-2017-7522 - the ability to cause a server crash using the β€œ-x509-track" option when an authenticated client sends a certificate with a null character in the ASN.1 line. The problem is manifested in configurations compiled with the mbed TLS / PolarSSL library. An attack is unlikely since a certificate with a null character certified by a certification authority is required;
Function dereference of a null pointer
establish_http_proxy_passthru ()

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Well bad guys also fond corona virus as good way for hacking :
twitter.com/undercodeNews

1) The coronavirus epidemic has become a global pandemic, so many want to track its spread. Some organizations offer panels showing the distribution of COVID-19. Unfortunately, hackers were able to use these panels to spread viruses to computers.

2) Researchers Labs found that hackers use these cards to steal user information. Among other things, they steal names, passwords, credit card information and other data from the browser.

3) Attackers design coronavirus websites to force users to download the application. It supposedly shows the spread of coronavirus. In fact, the application generates a malicious binary file that is installed on users' computers.

4) These sites do show genuine coronavirus distribution maps, but the URL and information are different from the original source.

5) Currently, only Windows computers are in danger. Researchers suggest that versions of the malicious offer for other operating systems will soon appear.

6) New option AZORult sets up a secret administrator account for remote attacks.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘YOUR FAVOR LINUX DISTRO IS :
Anonymous Poll
24%
PARROT ?
58%
KALI ?
5%
UBUNTU ?
5%
REDHATS ?
7%
OTHER ?
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Tor launches bug bounty program
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Now, the Tor Project, with the support of the Open Technology Fund, has teamed up with HackerOne and finally announced the launch of an open program for everyone. It is proposed to search for bugs in the Tor browser and the Tor network daemon. We consider vulnerabilities that allow escalation of privileges, remote execution of arbitrary code, unauthorized access to user data, as well as information about attack methods that can be used to extract encrypted data from nodes and clients.

2) The Tor Project announced its intention to launch the bug bounty program at the end of December 2015 during a speech by the Tor project admins at the Haos Communication Congress (CCC), held in Hamburg, Germany.

3) Depending on the severity of the problem, Tor Project is ready to pay researchers between $ 100 and $ 4,000. So, highly dangerous bugs are estimated at 2000-4000 dollars, on vulnerabilities of medium danger you can earn 500-2000 dollars, and for detecting very minor problems you can get 100 or even be left without a cash prize, but get a t-shirt, stickers and a place in Hall of Fame Tor.

4) In addition, less serious problems will be rewarded with corporate T-shirts, stickers and mentions in the Tor Hall of Fame.

5) The project first announced plans to launch a bug bounty program after Tor accused the FBI, commissioned by researchers from Carnegie Mellon University, of at least $ 1 million to help them crack the Tor chain and reveal the IP addresses of users, but the FBI categorically denies the claim.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁