UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.9K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HOW CONFIGURE PROXIES IN MY BROWSER FOR BEGINERS :
pinterest.com/undercode_Testing

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

HOW DO I CONFIGURE MY BROWSER
This depends on which browser you use:

1) Firefox

> Tools > Options > Advanced > Settings (next to Connection) > Manual
Proxy Configuration > then enter proxy details

2) IE

> Tools > Internet Options > Connections > LAN Settings > select β€œUse a proxy server for your LAN” and then enter proxy details
Chrome

> Tools > Settings > Show advanced settings > Change proxy settings (in Network section) > enter proxy details

πŸ¦‘ HOW DO I KNOW IT’S WORKED?

1) Go online via a β€œnormal” browser, ie that hasn’t been configured
Visit https://hidester.com/what-is-my-ip-address and note down your IP address. This is your real IP, assigned to you by your Internet Service Provider

2) Go online using your manually configured browser
Visit our What’s my IP address page and you should see a different IP address. This is your proxy IP – you’re now free to browse incognito!


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Premium Proxies from few seconds:
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

πŸ¦‘ IP Address Port Code Country Anonymity Google Https Last Checked

117.239.4.37 3128 IN India anonymous no yes 5 seconds ago

103.126.218.68 8080 BD Bangladesh elite proxy no yes 5 seconds ago

146.88.23.38 53281 AU Australia elite proxy no yes 5 seconds ago

105.208.44.183 52841 ZA South Africa elite proxy no yes 5 seconds ago

176.9.35.158 808 DE Germany elite proxy no yes 5 seconds ago

144.217.101.242 3129 CA Canada elite proxy no yes 1 minute ago

190.2.249.77 8888 AR Argentina anonymous no yes 1 minute ago

78.46.81.7 1080 DE Germany elite proxy no yes 1 minute ago

51.158.108.135 8811 FR France anonymous no yes 1 minute ago

132.255.89.58 33554 BR Brazil elite proxy no yes 1 minute ago

62.171.161.146 8080 DE Germany elite proxy no yes 1 minute ago

188.40.183.185 1080 DE Germany elite proxy no yes 1 minute ago

51.158.123.250 8811 FR France anonymous no yes 1 minute ago

80.187.140.26 8080 DE Germany elite proxy no yes 1 minute ago

190.147.93.2 52925 CO Colombia elite proxy no yes 1 minute ago

@undercodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘best 2019-2020 apps for earn free bitcoin Android :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) https://play.google.com/store/apps/details?id=weekend.bitcoin.free

2) https://play.google.com/store/apps/details?id=com.cakecodes.bitmaker

3) https://play.google.com/store/apps/details?id=bitcoin.alien.run

4) https://play.google.com/store/apps/details?id=app.getloaded.bitcoinblast

5) https://play.google.com/store/apps/details?id=com.mansoon.cryptopop

6) https://play.google.com/store/apps/details?id=com.vweeter.wordbricker


πŸ¦‘Note may some apps restricted in your contrie so, any proxie or usa vpn will fix

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to check if the linux server is hacked FULL GUIFE BY UNDERCODE
T.me/UndercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Symptoms of compromised server

> When servers are invaded by inexperienced attackers or automated attack programs, they often consume 100% of the resources. They may consume CPU resources to mine digital currencies or send spam, or they may consume bandwidth to launch DoS attacks.

2) So the first manifestation of the problem is that the server "slowed down". This may be due to the slow opening of pages on the website, or the e-mail taking a long time to send out.

πŸ¦‘ So what should you look at?

Check 1-Who is currently logged in?
You must first check who is currently logged on to the server. It is not complicated to find that the attacker logs in to the server to operate.

πŸ¦‘ The corresponding command is w . Running w will output the following results:

08:32:55 up 98 days, 5:43, 2 users, load average: 0.05, 0.03, 0.00
USER TTY FROM LOGIN @ IDLE JCPU PCPU WHAT
root pts / 0 113.174.161.1 08:26 0.00s 0.03s 0.02s ssh root @ coopeaa12
root pts / 1 78.31.109.1 08:26 0.00s 0.01s 0.00sw
The first IP is a British IP, and the second IP is a Vietnamese IP. This is not a good sign.

1) Stop and take a deep breath, don't panic just kill their SSH connection. Unless you can prevent them from entering the server again, they will come in quickly and kick you out in case you go back again.

2) Please refer to the section "What to do after an invasion" at the end of this article to see what to do if you find evidence of an invasion.

3) The whois command can take an IP address and tell you all the information of the organization registered with the IP, including the country information.

> Check 2-Who ever logged in?
The Linux server records which users, from which IP, when they logged in and how long they logged in. Use the last command to view this information.

1) The output looks like this:

root pts / 1 78.31.109.1 Thu Nov 30 08:26 still logged in
root pts / 0 113.174.161.1 Thu Nov 30 08:26 still logged in
root pts / 1 78.31.109.1 Thu Nov 30 08: 24-08: 26 (00:01)
root pts / 0 113.174.161.1 Wed Nov 29 12:34-12:52 (00:18)
root pts / 0 14.176.196.1 Mon Nov 27 13:32-13:53 (00:21)
Here you can see that the UK IP and Vietnam IP appear alternately, and the top two IPs are still logged in. If you see any unauthorized IP, then please refer to the last chapter.

2) The history after login will be recorded in the binary / var / log / wtmp file (LCTT Annotation: The author should write it wrong here, modify it according to the actual situation), so it is easy to delete. Usually the attacker will delete this file directly to cover up their attacks. Therefore, if you run the last command and only see your current login, then this is a bad signal.

3) If there is no login history, please be careful and continue to pay attention to other clues of the invasion.

πŸ¦‘ Check 3-Review command history

1) Attackers at this level usually do not pay attention to obscuring the history of commands, so running the history command will show everything they have done. You must pay attention to whether you use wget or curl commands to download unconventional software such as spam robots or mining programs.

2) The command history is stored in the ~ / .bash_history file, so some attackers will delete the file to hide what they did. As with the login history, if you run the history command but nothing is output, it means that the history file has been deleted. This is also a bad signal, you need to check the server very carefully. (LCTT translation, if there is no command history, it may be your configuration error.)

πŸ¦‘ Check 4-Which processes are consuming CPU?

1) The kind of attackers you often encounter often don't cover up what they do. They will run some processes that consume CPU in particular. This makes it easy to discover these processes. Just run top and look at the first few processes.

2) This can also show those attackers who are not logged in. For example, someone may be using unprotected mail scripts to send spam.
3) If you do n’t know the top process, you can Google the process name or use losf and strace to see what it does.

πŸ¦‘Using these tools, the first step is to copy the PID of the process from top and then run:

1) strace -p PID
This will show all system calls called by the process. It will produce a lot of content, but this information can tell you what this process is doing.

2) lsof -p PID
This program will list the files opened by the process. You can understand what it is doing by viewing the files it accesses.

πŸ¦‘ Check 5-Check all system processes
Unauthorized processes that do not consume CPU too much may not show up in top , but it can still be listed by ps . The command ps auxf can display clear enough information.

1) You need to check every unknown process. Running ps frequently (which is a good habit) can help you find strange processes.

πŸ¦‘ Check 6-Check the network usage of the process
Iftop 's function is similar to top , it will arrange the process of sending and receiving network data and their source and destination addresses. Processes like DoS attacks or spam robots are easily displayed at the top of the list.

πŸ¦‘Check 7-Which processes are listening for network connections?
Usually an attacker will install a backdoor program to listen to the network port to accept commands. The process will not consume CPU and bandwidth during the waiting period, so it is not easy to find through commands such as top .

1) The lsof and netstat commands will list all the networking processes. I usually let them bring the following parameters:

lsof -i
netstat -plunt
You need to pay attention to those processes in the LISTEN and ESTABLISHED state, these processes are either waiting for connection (LISTEN), or already connected (ESTABLISHED). If you encounter a process you do n’t know, use strace and lsof to see what they are doing.

πŸ¦‘ What should I do after being hacked?

1) First, do n’t be nervous, especially when the attacker is logged in. You need to regain control of the machine before the attacker is alerted that you have discovered him. If he finds that you have discovered him, then he may lock you from logging on to the server, and then start ruining the corpse.

2) If your technology is not very good then just shut it down. You can run one of the two commands shutdown -h now or systemctl poweroff on the server . You can also log in to the hosting provider's control panel to shut down the server. After shutting down, you can start to configure the firewall or consult the supplier for advice.

3) If you are confident in yourself and your hosting provider also provides upstream firewalls, then you only need to create and enable the following two rules based on this:

4) Only allow SSH login from your IP address.
Block anything but this, not just SSH, but any protocol on any port.
This will immediately close the attacker's SSH session, leaving only you with access to the server.

5) If you cannot access the upstream firewall, you need to create and enable these firewall policies on the server itself, and then use the kill command to close the attacker's SSH session after the firewall rules take effect . (LCTT Annotation: The local firewall rules may not block the established SSH session, so for security reasons, you need to manually kill the session.)

6) Finally, there is a way, if supported, to log in to the server through an out-of-band connection such as a serial console, and then stop the network function through systemctl stop network.service . This will close the network connections on all servers, so you can slowly configure those firewall rules.

7) After regaining control of the server, don't think everything will be fine.

Don't try to repair this server, and then use it. You never know what the attacker has done, so you can never guarantee that this server is still secure.

8) The best way is to copy out all the data and then reinstall the system. (LCTT Annotation: Your program is not trusted at this time, but the data is generally ok.)

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ Full guide How to check if the linux server is hacked FULL GUIFE BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ About the new whatsapp cve from undercode report :

> starting since 2017 by ..xa

> patched since 2019

> release new 2020 till Now !!!

πŸ¦‘ Prevent it :

> block all caller, going offline then restart whatsapp

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ HACK ANDROID REMONTLY 2020 :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

A) What is controlled on a phone with spy software ?

1) People are always amazed at how powerful these spyware apps can be. Individual hacking programs offer a variety of advanced feature lists. By default, in almost all spyware applications you can: see a detailed call log, read text messages, see GPS data (where the phone was or was recently), browser history, messages, photos and videos on the phone, a list of applications installed .... this list goes on.

> GPS location


2) Advanced spy features differ - for example, FlexiSpy and Xnspy have a call recording feature where you can listen to the voice of callers received on a hacked device.

2) You will see messages sent and received on popular sites and social networks, application messages - Instagram, Facebook, WhatsApp, Snapchat, etc.

3) You can track your child’s phone in real time and receive notifications if you activate the function β€œset restricted areas”.

4) It is your power to control many smartphone features, such as blocking individual applications or websites; block certain contact numbers or erase data - all remotely (after installation).

5) The bottom line is that you will get access to almost every activity that happens with a hacked smartphone or tablet device. From a small text message to a weekly browser history.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to remotely hack a phone without physically accessing

1) full control of the software, you need access to install the program physically on the target phone or device. After that, monitoring and control can be done remotely using the online dashboard.

2) hack apple iphone

> Without installing software, you can hack only Apple products, subject to certain conditions: Firstly, you must have an Apple ID and user password, and secondly, the phone must already be configured to start backups in iCloud.

> If not, you will need to access the device to set up backups to run initially.

3) This leads us to the next section, where I consider some other ways that you can hack someone else’s cell phone without having it in your hands.

> These methods are not readily available to most people and are likely to be very expensive and illegal. But I have to tell about them! (for informational purposes it is finished)

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Hacking a smartphone using Kali full :
t.me/UndercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> Kali - one of the varieties of Linux, a program used by hackers and specialists in information security. A very popular and irreplaceable thing. I won’t describe the pros and cons, but let's get down to business immediately:

Step 1: open a terminal

Of course, to get started, launch Kali and open a terminal.

Step 2: Install the required libraries

In order to run these Android virtual devices on 64-bit Debian operating systems (e.g. Kali), we need to install several key libraries that are not enabled by default. Fortunately, they are all in the Kali vault.

kali> apt-get install lib32stdc ++ 6 lib32ncurses5 lib32zl

Installing these three libraries is enough to work, now we can proceed with the installation of the Android Software Developer Kit (SDK).

Step 3: Install the Android SDK

From your browser, go to the Android SDK website and download the Android SDK installer. Make sure you download the Linux kit. You can download and install options for Windows or Mac, and then test these virtual devices in Kali, but this will be a more complicated option. Let's go the simple way and set everything to Kali.


πŸ¦‘ Installer SDK Androyd

Once you have downloaded it, you can extract it using the GUI archiving tool in Kali, or using the command line.

Retrieving kali GUI


Step 4: Go to the tools catalog

Next, we need to go to the tools directory of the SDK directory.

kali> cd / android-pentest-framework / sdk / tools


πŸ¦‘ SDK tools


1) After we are in the tool catalog, we can launch the application for Android. Just enter

kali> / android

2) When you do this, the SDK manager will open the GUI, as above. Now we will download two versions of the Android operating system to practice our hacking of the smartphone, Android 4.3 and Android 2.2. Make sure you find them among this list, click on the box next to them, and click on the β€œInstall XX packages” button. This will force the SDK to load these operating systems into your Kali.

Step 5: Android Virtual Device Manager

After we have downloaded all the packages, now we need to build our Android virtual devices, or AVDs. From the SDK manager shown above, select tools -> Manage AVDs, which will open the interface, as below from Android Virtual Device Manager.


Click on the "Create" button, which will open such an interface below. Create two Androyd virtual devices, one for Android 4.3 and one for Android 2.2. I just named my devices β€œAndroid 4.3” and β€œAndroid 2.2,” and I recommend that you do the same.


πŸ¦‘ Create a virtual android device


Select the Nexus 4 device and the appropriate target (API 18 for Android 4.3 and API 8 for Android 2.2) and "Skin with dynamic hardware controls." The rest of the settings you should leave the default value, except to add 100 MiB SD-cards.

Step 6: launch the android device

After creating two Android virtual devices, Android Device Manager should look like this with two devices.

πŸ¦‘ Android Virtual Device Create

Select one of the virtual devices and click the "Start" button.

Start Android Emulator

This will launch the Androyd emulator creating your Android virtual device. Be patient it may take some time. When he finishes, you should be greeted by a virtual smartphone on your Kali desktop!

Step 7: Install the Pentest Framwork Smartphone

The next step is to install the Smartphone Pentest Framework. You can use git clone to download it to

kali> git clone https://github.com/georgiaw/Smartphone-Pentest-Framework.git


πŸ¦‘Install Smartphone Pentest Framework


Step 8: Starting Apache

As the web server and MySQL database will be needed, go ahead and start both of these services

kali> service apache2 startkali> service mysql start

Step 9: change the configuration.

Like almost all Linux applications, the Smartphone Pentest Framework is configured using a text configuration file. First you need to go to the directory with a subdirectory of the framework console

kali> CD / root / Smartphone-Pentest-Framework / frameworkconsole
> Then open the configuration file in any text editor. In this case, I used Leafpad

kali> leafpad config

πŸ¦‘ We will need to edit the IPADDRESS variable and the SHELLIPADDRESS variable to reflect the actual IP address of your Kali system (you can find it by entering "ifconfig").

Step 10: Launch the Platform
Now we are ready to launch the Smartphone Pentest Framework. Just enter

kali> ./framework.py

And that should open the Framework menu as shown below.

Finish! Now we are ready to start hacking smartphones!

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ FULL ANDROID HACKING @UndercodeTesting
πŸ¦‘ AFTER ALL THOSE TUTORIALS TIME TO SEND IMPORTANTS TERMUX-LINUX HACKING TOOLS :)
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Best Proxy Grabber Tool!
t.me/undercodeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/04x/HttpLiveProxyGrabber

2) cd HttpLiveProxyGrabber

3) python ProxGrab.py

simply then choose options
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Fast instagram cracking :

very fast!
work with proxylist
only work on python2.7

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/04x/instagramCracker

2) cd instagramCracker

3)python CheckProxy.py

4)python instagram.py