β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Intel showed how sand turns into a 10 nm processor
instagram.com/undercodeTesting
π¦ ππΌππ πππΈβπ :
A low-level look at how Intel manufactures its processors.
1) After the February video( intel), which showed the processorβs journey from concept to consumer , Intel posted another video. There you can find out what the production process looks like. This is worth a look, especially taking into account Intel's problems in mastering the 10 nm process technology.
2) The process of turning a pile of sand into the brain of a computer is quite confusing. The chip travels hundreds of kilometers along Intel automated lines, moving from one tool to another. The processor, or rather the plate, goes through more than a thousand stages of transistor formation before being sent to the packaging.
3) Intel briefly talked about some of the technologies that are at the core of the FinFET process technology. For example, the formation of High-K Metal Gate and Gate-Last. One section mentions Intel COAG technology (contact over active gate). Rumors claim that this is where Intel's problem lies in mastering the 10 nm process technology.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Intel showed how sand turns into a 10 nm processor
instagram.com/undercodeTesting
π¦ ππΌππ πππΈβπ :
A low-level look at how Intel manufactures its processors.
1) After the February video( intel), which showed the processorβs journey from concept to consumer , Intel posted another video. There you can find out what the production process looks like. This is worth a look, especially taking into account Intel's problems in mastering the 10 nm process technology.
2) The process of turning a pile of sand into the brain of a computer is quite confusing. The chip travels hundreds of kilometers along Intel automated lines, moving from one tool to another. The processor, or rather the plate, goes through more than a thousand stages of transistor formation before being sent to the packaging.
3) Intel briefly talked about some of the technologies that are at the core of the FinFET process technology. For example, the formation of High-K Metal Gate and Gate-Last. One section mentions Intel COAG technology (contact over active gate). Rumors claim that this is where Intel's problem lies in mastering the 10 nm process technology.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ What can I do on someone elseβs PC using SSH
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) If you want to prove to someone that you have remote access to the device, or just want to convince someone that their computer is vulnerable, you can use SSH.
2) Distance action
If for you the fact that a PC can be hacked is clear and obvious, then for an average user it is not. Rather, he is inclined to attribute the strange behavior of his computer to errors, crashes, or other reasons independent of the attackers. Although with the help of SSH access, a hacker can easily create fake alerts and in every way mask his activity.
π¦ What can be done through SSH access
1) For example, we can run applications such as Firefox to go to any web page, working in full screen mode, or use several small browser windows. Most people associate spontaneous web page launching with a virus or adware, especially if most websites are about Viagra or casino, for example.
2) Then we can begin to "make noise." You can use speakers connected to a computer. If the victim thinks she is alone at home, then unexpectedly turned on sound from the computer can frighten her greatly. The same can be said of a computer that begins to squeak violently, as if it was about to explode.
3) If this is not enough, you can activate error messages that occupy the entire screen. By combining beeps and error messages, we can create fake problems that look very serious.
π¦ What do you need
1) You will need ready-made SSH-access to any computer. We will take an example for Ubuntu, but you can control most computers, including MacOS, using the same commands.
2) You also need to be connected to the same network as the computer you want to control. After you logged in to the target computer through SSH, you can start launching applications and perform any other actions remotely.
π¦ ππΌππ πππΈβπ :
1) Configure Access and Launch Basic Applications
First you need to register a command so that everything we do appears on the remote computer that we logged in through SSH, and not on the local computer on which we logged in. Configure the display path with the following command:
> export DISPLAY =: 0.0
2) Now, by writing a simple firefox command via SSH, you will open a Firefox browser window on the remote computer.
But for our first example, let's open the xterm window , displaying network data that looks pretty troubling for a beginner. To make the situation worse, we will do it 10 times. Accordingly, there will be 10 open windows.
3) To do this, we will execute the command in a loop:
for i in {1..10}; do sudo xterm -maximize -e sudo tcpdump; done
In this case, we open the terminal window of the maximum size, and the -e command means that we execute sudo tcpdump in the xterm window that we run.
4) Calling, Whistling and Speech
Before we can reproduce any noise, we need to execute the following command in order to be able to control the speakers remotely.
>sudo modprobe pcspkr
5) Now we have many options! First, we can say any phrase through the computer using the say or espeak command .
say "I am a canadian randomware, I have not encrypted any files but would appreciate some change"
espeak "please give me quarters sorry to bother you"
We can schedule such messages so that they periodically go to chrontab.
6) We can use the beep to drive the user crazy. To use beep , install it with apt install beep .
7) After installation, look at the manual using man beep to evaluate its capabilities:
BEEP(1) General Commands Manual BEEP(1)
NAME
beep - beep the pc speaker any number of ways
π¦We can generate almost any noise with Beep. The following table with frequencies may come in handy:
Note Frequency
C 261.6
C# 277.2
D 293.7
D# 311.1
E 329.6
F 349.2
F# 370.0
G 392.0
G# 415.3
A 440.0
A# 466.2
B 493.9
C 523.2
π¦ What can I do on someone elseβs PC using SSH
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) If you want to prove to someone that you have remote access to the device, or just want to convince someone that their computer is vulnerable, you can use SSH.
2) Distance action
If for you the fact that a PC can be hacked is clear and obvious, then for an average user it is not. Rather, he is inclined to attribute the strange behavior of his computer to errors, crashes, or other reasons independent of the attackers. Although with the help of SSH access, a hacker can easily create fake alerts and in every way mask his activity.
π¦ What can be done through SSH access
1) For example, we can run applications such as Firefox to go to any web page, working in full screen mode, or use several small browser windows. Most people associate spontaneous web page launching with a virus or adware, especially if most websites are about Viagra or casino, for example.
2) Then we can begin to "make noise." You can use speakers connected to a computer. If the victim thinks she is alone at home, then unexpectedly turned on sound from the computer can frighten her greatly. The same can be said of a computer that begins to squeak violently, as if it was about to explode.
3) If this is not enough, you can activate error messages that occupy the entire screen. By combining beeps and error messages, we can create fake problems that look very serious.
π¦ What do you need
1) You will need ready-made SSH-access to any computer. We will take an example for Ubuntu, but you can control most computers, including MacOS, using the same commands.
2) You also need to be connected to the same network as the computer you want to control. After you logged in to the target computer through SSH, you can start launching applications and perform any other actions remotely.
π¦ ππΌππ πππΈβπ :
1) Configure Access and Launch Basic Applications
First you need to register a command so that everything we do appears on the remote computer that we logged in through SSH, and not on the local computer on which we logged in. Configure the display path with the following command:
> export DISPLAY =: 0.0
2) Now, by writing a simple firefox command via SSH, you will open a Firefox browser window on the remote computer.
But for our first example, let's open the xterm window , displaying network data that looks pretty troubling for a beginner. To make the situation worse, we will do it 10 times. Accordingly, there will be 10 open windows.
3) To do this, we will execute the command in a loop:
for i in {1..10}; do sudo xterm -maximize -e sudo tcpdump; done
In this case, we open the terminal window of the maximum size, and the -e command means that we execute sudo tcpdump in the xterm window that we run.
4) Calling, Whistling and Speech
Before we can reproduce any noise, we need to execute the following command in order to be able to control the speakers remotely.
>sudo modprobe pcspkr
5) Now we have many options! First, we can say any phrase through the computer using the say or espeak command .
say "I am a canadian randomware, I have not encrypted any files but would appreciate some change"
espeak "please give me quarters sorry to bother you"
We can schedule such messages so that they periodically go to chrontab.
6) We can use the beep to drive the user crazy. To use beep , install it with apt install beep .
7) After installation, look at the manual using man beep to evaluate its capabilities:
BEEP(1) General Commands Manual BEEP(1)
NAME
beep - beep the pc speaker any number of ways
π¦We can generate almost any noise with Beep. The following table with frequencies may come in handy:
Note Frequency
C 261.6
C# 277.2
D 293.7
D# 311.1
E 329.6
F 349.2
F# 370.0
G 392.0
G# 415.3
A 440.0
A# 466.2
B 493.9
C 523.2
8) In our case, we are going to do something terrible for the end user. The -f flag sets the frequency to 4000 kHz, the d flag sets the delay between the audio signals at 500 ms, and the -l flag sets the length of the audio signal per second. Finally, the -r flag repeats this terrible noise 10 times.
beep -f 4000 -D 500 -l 1000 -r 10
9) Awesome Error Messages
> notify-send 'WARNING' 'I AM CALLING THE INTERNET POLICE'
This message will pop up in the corner. Kinda boring. Instead, we can display a large bold alarm message with the whiptail command and run it in a full-screen window.
xterm -maximized -fullscreen -fa 'Monospace' -fs 19.31 -e whiptail --title "CRITICAL: ACTION CANNOT BE UNDONE" --msgbox "UNAUTHORIZED LOGIN! DATA SAFEGUARD SYSTEM WILL DESTROY THIS TERMINAL IN 10 SECONDS, STAY 30 FEET CLEAR TO AVOID BLAST" --topleft 23 79
beep -f 4000 -D 500 -l 1000 -r 10
9) Awesome Error Messages
> notify-send 'WARNING' 'I AM CALLING THE INTERNET POLICE'
This message will pop up in the corner. Kinda boring. Instead, we can display a large bold alarm message with the whiptail command and run it in a full-screen window.
xterm -maximized -fullscreen -fa 'Monospace' -fs 19.31 -e whiptail --title "CRITICAL: ACTION CANNOT BE UNDONE" --msgbox "UNAUTHORIZED LOGIN! DATA SAFEGUARD SYSTEM WILL DESTROY THIS TERMINAL IN 10 SECONDS, STAY 30 FEET CLEAR TO AVOID BLAST" --topleft 23 79
π¦NOW
10) Cron Tasks from Hell
Now we can start combining tasks and plan their automatic launch. We can check if there are any existing jobs in crontab with the -l flag, and then add a new job with the -e flag.
crontab -l
crontab -e
11) In the configuration window that opens, you can add a task for execution every 60 seconds according to the following formula.
12) In order for the computer to beep every 60 seconds, we can add this record and then press ctrl x and y to save the file.
* * * * * beep -f 300.7 -r 10 -d 50 -l 400
13) As soon as the file is saved, the computer will emit a sound signal with the given parameters every 60 seconds.
14) Completing Custom Tasks
If you have access to someone elseβs computer using SSH, you can turn off any running process. This will lead to a sudden stop of the used application, and accordingly, the user will not be able to effectively use the computer. To find the process ID, we can use the top or htop commands . If you do not have htop installed , you can do this with the command below.
apt install htop
top
Tasks: 219 total, 1 running, 178 sleeping, 0 stopped, 0 zombie
%Cpu(s): 3.0 us, 0.4 sy, 0.0 ni, 95.6 id, 0.9 wa, 0.0 hi, 0.0 si, 0.0 st
KiB Mem : 4968836 total, 1431244 free, 1104324 used, 2433268 buff/cache
KiB Swap: 5138428 total, 5138428 free, 0 used. 3367804 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
31906 root 20 0 0 0 0 I 6.2 0.0 0:00.59 kworker/u16:1
32560 toor 20 0 41928 3880 3192 R 6.2 0.1 0:00.02 top
1 root 20 0 160212 9592 6816 S 0.0 0.2 0:02.35 systemd
2 root 20 0 0 0 0 S 0.0 0.0 0:00.01 kthreadd
4 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/0:0H
6 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 mm_percpu_wq
7 root 20 0 0 0 0 S 0.0 0.0 0:01.33 ksoftirqd/0
8 root 20 0 0 0 0 I 0.0 0.0 0:09.13 rcu_sched
9 root 20 0 0 0 0 I 0.0 0.0 0:00.00 rcu_bh
10 root rt 0 0 0 0 S 0.0 0.0 0:00.00 migration/0
11 root rt 0 0 0 0 S 0.0 0.0 0:00.03 watchdog/0
12 root 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/0
13 root 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/1
14 root rt 0 0 0 0 S 0.0 0.0 0:00.03 watchdog/1
15) If I want to kill the process from above, I just take the PID and run the following command.
16) kill PID#
In the above example, I would run kill 32560 to terminate the top running process.
17) Putting It All Together
Now let's combine all that we have learned so that the end user gets a βvivid impressionβ from using their PC. Take a random beep and combine it with some bash commands to create many Firefox browser windows that open every 60 seconds and go to βNever Gonna Give You Up.β
for i in {1..10}; do beep -f 4000 -D 500 -l 1000 -r 10 & firefox -new-window
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
10) Cron Tasks from Hell
Now we can start combining tasks and plan their automatic launch. We can check if there are any existing jobs in crontab with the -l flag, and then add a new job with the -e flag.
crontab -l
crontab -e
11) In the configuration window that opens, you can add a task for execution every 60 seconds according to the following formula.
12) In order for the computer to beep every 60 seconds, we can add this record and then press ctrl x and y to save the file.
* * * * * beep -f 300.7 -r 10 -d 50 -l 400
13) As soon as the file is saved, the computer will emit a sound signal with the given parameters every 60 seconds.
14) Completing Custom Tasks
If you have access to someone elseβs computer using SSH, you can turn off any running process. This will lead to a sudden stop of the used application, and accordingly, the user will not be able to effectively use the computer. To find the process ID, we can use the top or htop commands . If you do not have htop installed , you can do this with the command below.
apt install htop
top
Tasks: 219 total, 1 running, 178 sleeping, 0 stopped, 0 zombie
%Cpu(s): 3.0 us, 0.4 sy, 0.0 ni, 95.6 id, 0.9 wa, 0.0 hi, 0.0 si, 0.0 st
KiB Mem : 4968836 total, 1431244 free, 1104324 used, 2433268 buff/cache
KiB Swap: 5138428 total, 5138428 free, 0 used. 3367804 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
31906 root 20 0 0 0 0 I 6.2 0.0 0:00.59 kworker/u16:1
32560 toor 20 0 41928 3880 3192 R 6.2 0.1 0:00.02 top
1 root 20 0 160212 9592 6816 S 0.0 0.2 0:02.35 systemd
2 root 20 0 0 0 0 S 0.0 0.0 0:00.01 kthreadd
4 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/0:0H
6 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 mm_percpu_wq
7 root 20 0 0 0 0 S 0.0 0.0 0:01.33 ksoftirqd/0
8 root 20 0 0 0 0 I 0.0 0.0 0:09.13 rcu_sched
9 root 20 0 0 0 0 I 0.0 0.0 0:00.00 rcu_bh
10 root rt 0 0 0 0 S 0.0 0.0 0:00.00 migration/0
11 root rt 0 0 0 0 S 0.0 0.0 0:00.03 watchdog/0
12 root 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/0
13 root 20 0 0 0 0 S 0.0 0.0 0:00.00 cpuhp/1
14 root rt 0 0 0 0 S 0.0 0.0 0:00.03 watchdog/1
15) If I want to kill the process from above, I just take the PID and run the following command.
16) kill PID#
In the above example, I would run kill 32560 to terminate the top running process.
17) Putting It All Together
Now let's combine all that we have learned so that the end user gets a βvivid impressionβ from using their PC. Take a random beep and combine it with some bash commands to create many Firefox browser windows that open every 60 seconds and go to βNever Gonna Give You Up.β
for i in {1..10}; do beep -f 4000 -D 500 -l 1000 -r 10 & firefox -new-window
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ FULL 2020 SSH HACKING WHY :
>SSH access lets you do anything
Doing harm through SSH or bullying is not something you will use daily, but knowing these processes is very useful for social engineering. Do not abuse the knowledge gained as the victim can really be very scared. It is not legal to access someone else's computer!
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
>SSH access lets you do anything
Doing harm through SSH or bullying is not something you will use daily, but knowing these processes is very useful for social engineering. Do not abuse the knowledge gained as the victim can really be very scared. It is not legal to access someone else's computer!
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 SFTP and FTPS servers- recommended by undercode
instagram.com/undercodetESTING
π¦ ππΌππ πππΈβπ :
1) SolarWinds SFTP / SCP Server . Secure file transfer utility for Windows from a leader in the development segment of network management tools.
2)FileZilla FTPS . Reliable free FTP server that runs on Windows, but can receive files from other operating systems.
3) IIS FTPS Server . Windows Secure FTP Server, which is built into Windows Server and protects file transfers using encryption.
4) Free FTP . A lightweight utility on Windows that provides secure file transfer as an external tool or as a system service.
5) Syncplify.me SFTP . Paid secure FTP utility for Windows. There is a free version to evaluate the possibilities.
6) Rebex Tiny SFTP Server . A secure file transfer system that can be embedded in software using .NET libraries.
7) CrushFTP . A simple and attractive FTP utility for Windows. A free trial period of 30 days is available for the server, the client is always free.
8) Cornerstone MFT . Managed File Transfer (MFT) is a paid system for transferring files to Windows, there is a 30-day trial period.
9) Globalscape SFTP . A number of options for secure file transfer under the general name Enhanced File Transfer with the ability to work in the cloud or install on Windows. This is a paid tool with a free trial.
10) Titan FTP . FTP utility includes FTPS and SFTP for secure file transfers and runs on Windows Server 2008 and 2012. This is a paid service, there is a 20-day trial period.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 SFTP and FTPS servers- recommended by undercode
instagram.com/undercodetESTING
π¦ ππΌππ πππΈβπ :
1) SolarWinds SFTP / SCP Server . Secure file transfer utility for Windows from a leader in the development segment of network management tools.
2)FileZilla FTPS . Reliable free FTP server that runs on Windows, but can receive files from other operating systems.
3) IIS FTPS Server . Windows Secure FTP Server, which is built into Windows Server and protects file transfers using encryption.
4) Free FTP . A lightweight utility on Windows that provides secure file transfer as an external tool or as a system service.
5) Syncplify.me SFTP . Paid secure FTP utility for Windows. There is a free version to evaluate the possibilities.
6) Rebex Tiny SFTP Server . A secure file transfer system that can be embedded in software using .NET libraries.
7) CrushFTP . A simple and attractive FTP utility for Windows. A free trial period of 30 days is available for the server, the client is always free.
8) Cornerstone MFT . Managed File Transfer (MFT) is a paid system for transferring files to Windows, there is a 30-day trial period.
9) Globalscape SFTP . A number of options for secure file transfer under the general name Enhanced File Transfer with the ability to work in the cloud or install on Windows. This is a paid tool with a free trial.
10) Titan FTP . FTP utility includes FTPS and SFTP for secure file transfers and runs on Windows Server 2008 and 2012. This is a paid service, there is a 20-day trial period.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Make an information release functionPHP by undercode :
π¦ ππΌππ πππΈβπ :
CREATE TABLE
PRIMARY KEY (
) TYPE = MyISAM AUTO_INCREMENT = 2;
#
# Export table data` jb_administrators`
#
INSERT INTO
# ------------------------------------- -------------------
#
structure # jb_administratorsoption` table `
#
CREATE TABLE
PRIMARY KEY (
) TYPE=MyISAM AUTO_INCREMENT=10 ;
#
INSERT INTO
INSERT INTO
# ------------------------------------------------- -------
π¦ CREATE TABLE
PRIMARY KEY (
) TYPE=MyISAM AUTO_INCREMENT=168 ;
# <
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Make an information release functionPHP by undercode :
π¦ ππΌππ πππΈβπ :
CREATE TABLE
jb_administrators (administratorsID int(10) unsigned NOT NULL auto_increment,userID mediumint(6) unsigned NOT NULL default '0',administratorsGroupID int(10) unsigned NOT NULL default '0',administratorsName varchar(50) NOT NULL default '',password varchar(32) NOT NULL default '',email varchar(50) NOT NULL default '',ipAddress varchar(32) NOT NULL default '',isAdministrators enum('y','n') NOT NULL default 'n',orderByID int(10) unsigned NOT NULL default '0',createDate bigint(14) unsigned NOT NULL default '0',PRIMARY KEY (
administratorsID)) TYPE = MyISAM AUTO_INCREMENT = 2;
#
# Export table data` jb_administrators`
#
INSERT INTO
jb_administrators VALUES (1, 1, 1, 'sky', 'sky', '', '', 'n', 0, 0);# ------------------------------------- -------------------
#
structure # jb_administratorsoption` table `
#
CREATE TABLE
jb_administratorsoption ( administratorsOptionID int (8) NOT NULL auto_increment,userID mediumint (6) unsigned NOT NULL default '0', optionFieldName varchar (50) NOT NULL default '' ,length tinyint(2) unsigned NOT NULL default '40',rows tinyint(2) unsigned NOT NULL default '4',types varchar(10) NOT NULL default '',isPublic enum('y','n') NOT NULL default 'y',orderByID int(8) unsigned NOT NULL default '0',PRIMARY KEY (
administratorsOptionID)) TYPE=MyISAM AUTO_INCREMENT=10 ;
#
jb_administratorsoption
#INSERT INTO
jb_administratorsoption VALUES (8, 1, '57777', 40, 50, 'text', 'y', 8);INSERT INTO
jb_administratorsoption VALUES (9, 1,', 40, 0, 'text', 'y', 9); jb_administratorsoptionlist ## ------------------------------------------------- -------
π¦ CREATE TABLE
jb_administratorsoptionlist (administratorsOptionListID int(12) unsigned NOT NULL auto_increment,userID mediumint(6) unsigned NOT NULL default '0',administratorsID int(10) unsigned NOT NULL default '0',administratorsOptionID int(8) unsigned NOT NULL default '0',value text NOT NULL,createDate int(14) unsigned NOT NULL default '0',PRIMARY KEY (
administratorsOptionListID)) TYPE=MyISAM AUTO_INCREMENT=168 ;
# <
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Most active malware in this month the cloudnet.exe :
>< ransoware & backdoor
twitter.com/undercodeNews
π¦ ππΌππ πππΈβπ :
How to remove this generated malware:
1) Check Windows Defender for status (On/OFF), remove all files from exclude list.
2) Turn on PUP protection in Windows Defender to protect from more potentially unwanted apps/programs(if using it as your antivirus):
3) https://answers.microsoft.com/en-us/protect/forum/protect_defender-protect_scanning-windows_10/windows-defender-not-detecting-known-adware/9cfe114b-8d1b-42a2-8268-34dc3acf9390?auth=1
->
4) PUA Protection is disabled by default and needs to be enabled. This is easy with PowerShell β just run this command line at the elevated PowerShell Prompt:
Set-MpPreference -PUAProtection 1
5) Then confirm that the value was reset by returning the current state for PUAProtection:
$Preferences = Get-MpPreference
$Preferences.PUAProtection
---------------------------------------------------
6) Also, Remove all add-ons/extensions in all browsers, and reset browsers....
7) Make sure your data is backed up with OneDrive, and/or FileHistory and/or something else. Consider a Windows10 Reset or Clean Install of Win10, if you can not get it resolved with scans..
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Most active malware in this month the cloudnet.exe :
>< ransoware & backdoor
twitter.com/undercodeNews
π¦ ππΌππ πππΈβπ :
How to remove this generated malware:
1) Check Windows Defender for status (On/OFF), remove all files from exclude list.
2) Turn on PUP protection in Windows Defender to protect from more potentially unwanted apps/programs(if using it as your antivirus):
3) https://answers.microsoft.com/en-us/protect/forum/protect_defender-protect_scanning-windows_10/windows-defender-not-detecting-known-adware/9cfe114b-8d1b-42a2-8268-34dc3acf9390?auth=1
->
4) PUA Protection is disabled by default and needs to be enabled. This is easy with PowerShell β just run this command line at the elevated PowerShell Prompt:
Set-MpPreference -PUAProtection 1
5) Then confirm that the value was reset by returning the current state for PUAProtection:
$Preferences = Get-MpPreference
$Preferences.PUAProtection
---------------------------------------------------
6) Also, Remove all add-ons/extensions in all browsers, and reset browsers....
7) Make sure your data is backed up with OneDrive, and/or FileHistory and/or something else. Consider a Windows10 Reset or Clean Install of Win10, if you can not get it resolved with scans..
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Twitter
UNDERCODE NEWS (@UndercodeNews) | Twitter
The latest Tweets from UNDERCODE NEWS (@UndercodeNews). We provides you daily hacking News & Security Warning & Technologies news & Bugs reports & Analysis... @UndercodeNews @UndercodeUpdate @iUndercode @DailyCve. Aus/Leb
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to track traffic from a smartphone using Wireshark part 1 full
instagram.com/undercodeTesting
π¦ ππΌππ πππΈβπ
1) Download Wireshark and connect to a Wi-Fi network
Download and install Wireshark if you havenβt already installed it. Connect to the desired Wi-Fi network. If you intend to use the PSK instead of the network key, you need to calculate it using the Wireshark tool , since you will not be able to go online during the capture, depending on your card.
2) When you downloaded Wireshark, launch the application and look at the network interfaces. Before you start capturing, you need to set a number of parameters for the card to work in the correct mode.
3) Configuring Wireshark to Capture
In the Wireshark menu, click on the gear icon called βCapture Optionsβ.
>The Capture Interfaces window opens:
4) Start network capture and scan EAPOL packets
If you have not connected to the network where the target device is located, you will not be able to see the packets, because you will be in another random channel. Wireshark cannot change the channel on which the wireless network adapter works, so you wonβt get the information you need.
5) Decrypt traffic using the network PSK
After confirming the establishment of communication, you can decrypt the information. To do this, add a network password or PSK. Open the Wireshark pull-down menu and select the "Settings" command. Click on Protocols here.
6) Select IEEE 802.11 and click Enable Decryption. To add a network key, click βEditβ next to the encryption keys. A window will open for adding passwords and PSK.
7) Select βwpa-pskβ from the menu and insert your key. Press Tab and OK.
8) After that, click OK in the Settings menu and Wireshark will re-scan all captured packets, trying to decrypt them. For many reasons, this may not work. In most cases, attempts succeeded if you provided a good handshake (EAPOL) and the transition between using a network password and PSK. If this works, you can continue to analyze traffic and choose which applications to use.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to track traffic from a smartphone using Wireshark part 1 full
instagram.com/undercodeTesting
π¦ ππΌππ πππΈβπ
1) Download Wireshark and connect to a Wi-Fi network
Download and install Wireshark if you havenβt already installed it. Connect to the desired Wi-Fi network. If you intend to use the PSK instead of the network key, you need to calculate it using the Wireshark tool , since you will not be able to go online during the capture, depending on your card.
2) When you downloaded Wireshark, launch the application and look at the network interfaces. Before you start capturing, you need to set a number of parameters for the card to work in the correct mode.
3) Configuring Wireshark to Capture
In the Wireshark menu, click on the gear icon called βCapture Optionsβ.
>The Capture Interfaces window opens:
4) Start network capture and scan EAPOL packets
If you have not connected to the network where the target device is located, you will not be able to see the packets, because you will be in another random channel. Wireshark cannot change the channel on which the wireless network adapter works, so you wonβt get the information you need.
5) Decrypt traffic using the network PSK
After confirming the establishment of communication, you can decrypt the information. To do this, add a network password or PSK. Open the Wireshark pull-down menu and select the "Settings" command. Click on Protocols here.
6) Select IEEE 802.11 and click Enable Decryption. To add a network key, click βEditβ next to the encryption keys. A window will open for adding passwords and PSK.
7) Select βwpa-pskβ from the menu and insert your key. Press Tab and OK.
8) After that, click OK in the Settings menu and Wireshark will re-scan all captured packets, trying to decrypt them. For many reasons, this may not work. In most cases, attempts succeeded if you provided a good handshake (EAPOL) and the transition between using a network password and PSK. If this works, you can continue to analyze traffic and choose which applications to use.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦PART 2 How to track traffic from a smartphone using Wireshark
instagram.com/undercodeTesting
π¦ ππΌππ πππΈβπ
A) Scan DNS & HTTP packets
By eliminating traffic protection, Wireshark can decrypt it and tell which devices are currently in the Wi-Fi network.
1) DNS queries
To see the packages we are interested in, let's start with DNS queries. With their help, applications verify that the IP addresses to which they should connect have not changed. They are directed to domain names, which usually contain the name of the application. From this, you can understand which applications are running on the smartphone.
2) To see application requests, we will use two capture filters, dns and http. This allows you to see the most obvious traces of applications on a Wi-Fi network. First, type dns in the filter and press enter. If this does not work, try several times in a row to switch in real time between the password and the PSK. Perhaps after that everything will work.
>Using Signal is a good idea, but itβs even better to use a VPN. Why? Just launching the Signal application creates the following traces, allowing you to understand that a person is chatting with someone in an encrypted program.
B ) HTTP packets
Next, we use the http filter to look at insecure web requests. Capture filters contain information like useragent, from which you can learn about the type of connecting device. We click on the packages and open the tab βHypertext Transfer Protocolβ.
1) In this example, you can see insecure HTTP requests to the chat server. What is it? Studying the package and domain name gives the answer that this is a WeChat application. It is installed on this smartphone and communication is not fully encrypted.
2) If you want to see all the decrypted data, you can click on the menu tab called βStatisticsβ and see the allowed addresses. This will show all the decrypted domains during the capture. This should be a long list of services to which the device connects through applications.
3) Wireshark makes it harder to trust Wi-Fi networks
This kind of monitoring seems intrusive, but you need to remember that your Internet provider saves the same information and can sell it or transfer it to law enforcement agencies upon request. If you want to protect yourself from such provider actions, you can use VPN services to hide local traffic through strong encryption. If you need to hide especially during certain actions, it is advisable to use mobile traffic instead of Wi-Fi.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦PART 2 How to track traffic from a smartphone using Wireshark
instagram.com/undercodeTesting
π¦ ππΌππ πππΈβπ
A) Scan DNS & HTTP packets
By eliminating traffic protection, Wireshark can decrypt it and tell which devices are currently in the Wi-Fi network.
1) DNS queries
To see the packages we are interested in, let's start with DNS queries. With their help, applications verify that the IP addresses to which they should connect have not changed. They are directed to domain names, which usually contain the name of the application. From this, you can understand which applications are running on the smartphone.
2) To see application requests, we will use two capture filters, dns and http. This allows you to see the most obvious traces of applications on a Wi-Fi network. First, type dns in the filter and press enter. If this does not work, try several times in a row to switch in real time between the password and the PSK. Perhaps after that everything will work.
>Using Signal is a good idea, but itβs even better to use a VPN. Why? Just launching the Signal application creates the following traces, allowing you to understand that a person is chatting with someone in an encrypted program.
B ) HTTP packets
Next, we use the http filter to look at insecure web requests. Capture filters contain information like useragent, from which you can learn about the type of connecting device. We click on the packages and open the tab βHypertext Transfer Protocolβ.
1) In this example, you can see insecure HTTP requests to the chat server. What is it? Studying the package and domain name gives the answer that this is a WeChat application. It is installed on this smartphone and communication is not fully encrypted.
2) If you want to see all the decrypted data, you can click on the menu tab called βStatisticsβ and see the allowed addresses. This will show all the decrypted domains during the capture. This should be a long list of services to which the device connects through applications.
3) Wireshark makes it harder to trust Wi-Fi networks
This kind of monitoring seems intrusive, but you need to remember that your Internet provider saves the same information and can sell it or transfer it to law enforcement agencies upon request. If you want to protect yourself from such provider actions, you can use VPN services to hide local traffic through strong encryption. If you need to hide especially during certain actions, it is advisable to use mobile traffic instead of Wi-Fi.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Is your smartphone slower? Use the built-in Android memory manager:
>Android device owners tried to solve this problem with the help of RAM managers. These are applications that close other programs to free memory. Unfortunately, there was more harm than good from them. These managers consumed system resources themselves, and other applications re-started after they were closed. Android now has a built-in memory manager that will free up memory correctly.
fb.com/undercodeTesting
π¦ ππΌππ πππΈβπ
1) Unlock settings for developers
The RAM manager is located in the settings menu for Android developers. By default, this menu is hidden. You need to go to the settings in the " About the phone " section and click on the build number seven times. After that, go to the main settings menu and the β For Developers β options will appear
2) Management of random access memory
Go to the settings for developers. In the latest versions of Android, they can be located in the Settings > System > Advanced Settings section . Inside, select " Running Services ", which should be located at the top of the list.
Now you will see active services. Services are application components that run in the background for a long time without a user interface. For example, services process RCS messages. Usually it works perfectly without the need to interact with these services or even know about their existence. Sometimes problems may arise if the amount of RAM is limited.
3) you can stop any service if there are problems in its operation. By default, applications are divided by the amount of consumed RAM in descending order. If the machine is slow, it is not recommended to stop all processes in a row. Applications will restart in a second, so this makes no sense. Instead, you need to look at the data on memory consumption and decide which applications to get rid of.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Is your smartphone slower? Use the built-in Android memory manager:
>Android device owners tried to solve this problem with the help of RAM managers. These are applications that close other programs to free memory. Unfortunately, there was more harm than good from them. These managers consumed system resources themselves, and other applications re-started after they were closed. Android now has a built-in memory manager that will free up memory correctly.
fb.com/undercodeTesting
π¦ ππΌππ πππΈβπ
1) Unlock settings for developers
The RAM manager is located in the settings menu for Android developers. By default, this menu is hidden. You need to go to the settings in the " About the phone " section and click on the build number seven times. After that, go to the main settings menu and the β For Developers β options will appear
2) Management of random access memory
Go to the settings for developers. In the latest versions of Android, they can be located in the Settings > System > Advanced Settings section . Inside, select " Running Services ", which should be located at the top of the list.
Now you will see active services. Services are application components that run in the background for a long time without a user interface. For example, services process RCS messages. Usually it works perfectly without the need to interact with these services or even know about their existence. Sometimes problems may arise if the amount of RAM is limited.
3) you can stop any service if there are problems in its operation. By default, applications are divided by the amount of consumed RAM in descending order. If the machine is slow, it is not recommended to stop all processes in a row. Applications will restart in a second, so this makes no sense. Instead, you need to look at the data on memory consumption and decide which applications to get rid of.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Best 2020 working apps for instagram followers :
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ
1) Turbo Followers for Instagram Free Android 4.4, iOS, macOS 4.7
https://play.google.com/store/apps/details?id=get.instagram.followers.unfollowers&hl=en
2) Followers & unfollowers Free Android 4.0+ 4.6
https://play.google.com/store/apps/details?id=get.instagram.followers.unfollowers&hl=en
3) Get Followers UP Free Android 4.4+, iOS
https://play.google.com/store/apps/details?id=com.fancyphoto.maker&hl=en
4) Get Super Followers - NewCam Free & paid premiums Android 4.4+, iOS, macOS 4.8
https://apkplz.net/app/com.retro.polaroid
5) Free Followers And Likes Free Android 4.0.3 +
https://play.google.com/store/apps/details?id=com.paca.likes.work&hl=en
6) Get Likes & Followers Free 2019 Free Android 4.0.3, iOS 4.3
https://apkpure.com/followers-and-likes-analyzer-for-instagram/get.free.real.followers.likes.stats
7) Followers and Likes Analyzer Free Android 4.1 and up 4.7
https://play.google.com/store/apps/details?id=get.free.real.followers.likes.stats&hl=en
8) InsEnGage Free Android 4.1+ macOS, iOS 4.8
https://play.google.com/store/apps/details?id=com.likeigviewers&hl=en
9) Get Followers & Likes Free Android 4.1+ 4.2
https://play.google.com/store/apps/details?id=com.freefollowers.freelikes&hl=en
10) Real Followers & Get Likes for Instagram Free Android 4.4+ 4.5
https://play.google.com/store/apps/details?id=com.appgen.likeandfollower&hl=en
11) Crowdfire for Instagram Growth Free + paid premiums Android 4.2+ iOS, macOS 3.5
https://play.google.com/store/apps/details?id=com.justunfollow.android&hl=en
12) Follower Insight for Instagram Free Android 4.2+ 2.5
https://play.google.com/store/apps/details?id=com.skyfireapps.followersinsightapp&hl=en
13) Real Followers For Instagram Free Android4.4+, iOS, macOS 4.2
https://play.google.com/store/apps/details?id=like.follow.tag&hl=en
14) Get Real Instagram Followers & Likes- Fame Club Free & paid premiums Android 5.0+ iOS, macOS 4.0
https://play.google.com/store/apps/details?id=com.lkgn.app&hl=en
15) InstaInfluencer Free Android 4.1+ 4.7
https://play.google.com/store/apps/details?id=get.free.real.instant.followers&hl=en
π¦apps tested by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Best 2020 working apps for instagram followers :
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ
1) Turbo Followers for Instagram Free Android 4.4, iOS, macOS 4.7
https://play.google.com/store/apps/details?id=get.instagram.followers.unfollowers&hl=en
2) Followers & unfollowers Free Android 4.0+ 4.6
https://play.google.com/store/apps/details?id=get.instagram.followers.unfollowers&hl=en
3) Get Followers UP Free Android 4.4+, iOS
https://play.google.com/store/apps/details?id=com.fancyphoto.maker&hl=en
4) Get Super Followers - NewCam Free & paid premiums Android 4.4+, iOS, macOS 4.8
https://apkplz.net/app/com.retro.polaroid
5) Free Followers And Likes Free Android 4.0.3 +
https://play.google.com/store/apps/details?id=com.paca.likes.work&hl=en
6) Get Likes & Followers Free 2019 Free Android 4.0.3, iOS 4.3
https://apkpure.com/followers-and-likes-analyzer-for-instagram/get.free.real.followers.likes.stats
7) Followers and Likes Analyzer Free Android 4.1 and up 4.7
https://play.google.com/store/apps/details?id=get.free.real.followers.likes.stats&hl=en
8) InsEnGage Free Android 4.1+ macOS, iOS 4.8
https://play.google.com/store/apps/details?id=com.likeigviewers&hl=en
9) Get Followers & Likes Free Android 4.1+ 4.2
https://play.google.com/store/apps/details?id=com.freefollowers.freelikes&hl=en
10) Real Followers & Get Likes for Instagram Free Android 4.4+ 4.5
https://play.google.com/store/apps/details?id=com.appgen.likeandfollower&hl=en
11) Crowdfire for Instagram Growth Free + paid premiums Android 4.2+ iOS, macOS 3.5
https://play.google.com/store/apps/details?id=com.justunfollow.android&hl=en
12) Follower Insight for Instagram Free Android 4.2+ 2.5
https://play.google.com/store/apps/details?id=com.skyfireapps.followersinsightapp&hl=en
13) Real Followers For Instagram Free Android4.4+, iOS, macOS 4.2
https://play.google.com/store/apps/details?id=like.follow.tag&hl=en
14) Get Real Instagram Followers & Likes- Fame Club Free & paid premiums Android 5.0+ iOS, macOS 4.0
https://play.google.com/store/apps/details?id=com.lkgn.app&hl=en
15) InstaInfluencer Free Android 4.1+ 4.7
https://play.google.com/store/apps/details?id=get.free.real.instant.followers&hl=en
π¦apps tested by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β