UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
37. newer file-name: If the modification time of the file-name in the remote machine is closer than the time of the file with the same name on the local hard disk, the file is retransmitted.

38. nlist [remote-dir] [local-file]: Display the file list of the remote host directory and store it in the local-file of the local hard disk.

39. nmap [inpattern outpattern]: Set the file name mapping mechanism, so that when the file is transferred, some characters in the file are converted between each other, such as: nmap $ 1. $ 2. $ 3 & 1, $ 2; .a2.a3, the file name becomes a1, a2. This command is especially applicable when the remote host is a non-UNIX machine.

40. ntrans [inchars [outchars]: Set the translation mechanism of file name characters, such as ntrans 1R, then the file name LLL will become RRR.

41. open host [port]: establish a specified ftp server connection, you can specify the connection port.

42, passive: Enter the passive transmission mode.

43. prompt: set the interactive prompt when transferring multiple files.

44. proxy ftp-cmd: In the secondary control connection, execute an ftp command, which allows connecting two ftp servers to transfer files between the two servers. The first ftp command must be open to first establish a connection between the two servers.

45. put local-file [remote-file]: transfer the local file local-file to the remote host.

46, pwd: display the current working directory of the remote host.

47. quit: Same as bye, exit ftp session.

48. quote arg1, arg2 ...: send the parameters verbatim to the remote ftp server, such as: quote syst.

49. recv remote-file [local-file]: same as get.

50. reget remote-file [local-file]: similar to get, but if the local-file exists, it will resume transmission from the place where the last transmission was interrupted.

51. rhelp [cmd-name]: Request help from the remote host.

52. rstatus [file-name]: If the file name is not specified, the status of the remote host is displayed, otherwise the status of the file is displayed.

53. Rename article source: bbs.nju.edu.cn [to]: Change the file name of the remote host.

54. reset: clear the answer queue.

55. restart marker: restart get or put from the specified marker, such as restart 130.

56, rmdir dir-name: delete the remote host directory.

57. runique: Set the unique storage of the file name. If the file exists, add the suffix .1, .2 and so on after the original file.

58, send local-file [remote-file]: Same as put.

59. sendport: Set the use of the PORT command.

60. site arg1, arg2 ...: send the parameters verbatim to the remote ftp host as a SITE command.

61. size file-name: Display the size of the remote host file, such as: site idle 7200.

62. status: displays the current ftp status.

63. struct [struct-name]: Set the file transmission structure to struct-name, and the stream structure is used by default.

64. sunique: Set the remote host file name storage to be unique (corresponding to runique).

65. system: displays the operating system type of the remote host.

66. Tenex: Set the file transfer type to the desired type of TENEX machine.

67. tick: Set the byte counter during transmission.

68. trace: Set the packet trace.

69. type [type-name]: Set the file transfer type to type-name, the default is ascii, such as: type binary, set the binary transfer mode.

70. umask [newmask]: Set the default umask of the remote server to newmask, such as umask 3.

71. user user-name [password] [account]: Show your identity to the remote host. When you need a password, you must enter the password, such as: user anonymous my @ email.

72. verbose: Same as the -v parameter on the command line, that is, to set the detailed report mode, all responses from the ftp server will be displayed to the user, and the default is on.

73.? [Cmd]: Same as help.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Cash out CVV / Fullz with eBay
fullzcvv Tutorials 0 Comments

> Using your account, you can earn up to $ 900. It can be combined with other combing methods, and then you can make more money. To successfully buy, you need an eBay account, CC / CVV2, Socks (RDP).

πŸ¦‘ instruction:

1) To get started, you need to find a store with a short order approval period. I suggest you go to the store that ships one day.

2) Then you need to use rdps (because they are not blacklisted).
If for some reason you cannot use rdps, please switch from vip72 to socks5, check the blacklist, and then recheck it on ip-score.com.
Then I suggest that you buy CC / CVV2 in the same country and state as you saw before.

3) Clear the browser completely and prepare the computer so that it will not cause suspicion and looks like the cardholder's computer.

4) Use socks5 to open the online store, move the product you need to the shopping cart and make a purchase (fill in the data from the CC purchased by others)

πŸ¦‘ Successful combing skills:

1) Use a verified account with feedback> 100 to
use a debit card.

2) Please wear the computer carefully before purchase to make it look like the cardholder's computer.
Use CC with eBay guestbook.

3) Purchase a credit card from the same country as the sock.

4) When you buy something that no one is willing to buy (online stores will want to sell unnecessary goods quickly)
, don't forget to set the same time as in the system when opening ip-score.com.


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘VALID CC FOR TRIALS :
t.me/UndercodeTesting

5147504059695050 | 11 | 2020 | 661 | | Dan Leuchs | 14009 Gun Club Rd,| Epworth | IA | 52045-8884 | 6087928084 ||

***************************

5523930012521311 01/23 168 Robert Robinson 952 Paul Acuff Lane Loudon TN 37774

***************************

5243631024164202|01|2021|006|UNITED STATES|Seonwoo Yee|4204 172nd St|Flushing|NY|11358-2725|9173483563||

***************************

4400667713261828 10/19 848 Patricia K Olive 6560 340TH ST Stacy MN 55079-4532 UNITED STATES

***************************

5522631015034887
10/2019 197
Guitonkagya Algonquin
REVOLUCION 1014, COATZACOALCOS CENTRO, 96400
VERACRUZ Coatzacoalcos
96400 MX
(921)212-3631


Card number:4884984369409063

Name:Brooklyn White

Adress:Grand Avenue 103

Country:Switzerland

CVV:383

Exp:02/2021

*******************************

5162208645638588 05/21 971 GLEIDISON GON?ALVES RUA DOS CRAVOS ,50 AP 12 S?O PAULO / SP S?O BERNARDO DO CAMPO 09810290 BRAZIL +5511987476206

*******************************

5574473002561201 12/20 738 Fredrik Bergman John Erikssonsgatan 41A Sm?land J?nk?ping 55472 SWEDEN +46723996456

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Network filtering-restore the default settings of iptables
instagram.com/undercodeTesting

/usr/local/sbin/iptables -P INPUT ACCEPT
/usr/local/sbin/iptables -P FORWARD ACCEPT
/usr/local/sbin/iptables -P OUTPUT ACCEPT

#
# reset the default policies in the nat table.
#
/usr/local/sbin/iptables -t nat -P PREROUTING ACCEPT
/usr/local/sbin/iptables -t nat -P POSTROUTING ACCEPT
/usr/local/sbin/iptables -t nat -P OUTPUT ACCEPT

#
# flush all the rules in the filter and nat tables.
#
/usr/local/sbin/iptables -F
/usr/local/sbin/iptables -t nat -F

#
# erase all chains that's not default in filter and nat table.
#
/usr/local/sbin/iptables -X
/usr/local/sbin/iptables -t nat -X'

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Network filtering-About the problems faced by three proxy gateways in one proxy

Three proxy gateways for 600 machines in the unnamed original LAN The server goes online, and the subnet is divided into three segments:
192.168.1.1/192.168.2.1/192.168.3.1 To save the machine source, I now want to use a proxy server without
changing the client's IP, mask, gateway (too many machines).

My iptables configuration is as follows:
#! / Bin / sh
/ sbin / modprobe ip_tables
/ sbin / modprobe ip_nat_ftp
/ sbin / modprobe ip_conntrack_ftp

/ sbin / iptables -F
/ sbin / iptables -F -t nat
/ sbin / iptables -X
/ sbin / iptables -Z

echo "1"> / proc / sys / net / ipv4 / ip_forward
iptables -P INPUT ACCEPT
iptables -P FORWARD ACCEPT
iptables -P OUTPUT ACCEPT

iptables -t nat -A PREROUTING -p tcp -s 192.168.0.0/24 --dport 80 -j REDIRECT --to-port 3128
iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -o eth1 -j SNAT --to 210.183.14.22
iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE
iptables -A FORWARD -s 0/0 -d 0/0 -j ACCEPT
In addition, I use a proxy machine high? I use intel i7 as example CPU

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Network filtering-set up IP and MAC binding on Linux routing :
There are such requirements in some systems, I hope some of the internal network IP addresses are connected to the Internet, and hope that these
IP addresses will not be stolen by illegal users. This can be achieved by the following solutions:

1) First use ipchains or iptables to set only allow legitimate IP addresses to connect.
Establish IP / MAC bundling for legitimate IP. To discuss this issue, we first need to understand the working principle of the
ARP protocol . The ARP protocol is an abbreviation of Address Resolution Protocol. Its function and working principle are as follows:
In the underlying network communication, two nodes want to communicate with each other. You must first know the MAC addresses of the source and destination. In order
to allow the system to quickly find the MAC address of a remote node, each local kernel maintains an immediate

2) lookup table (called ARP cache). ARP contains a list that maps the IP address of the remote host to its corresponding MAC address. The
Address Resolution Protocol (ARP) cache is a data structure that is resident in memory, and its contents are managed
and maintained by the kernel of the local system . By default, the IP
address (and corresponding MAC address) of the node that the local system communicates with in the last ten minutes is retained in the ARP cache .

4) When the MAC address of a remote host exists in the ARP cache of the local host, there is no problem in converting the IP address of the remote node to the MAC
address. However, in many cases, the MAC address of the remote host does not exist in the local ARP cache,
What will the system do? When the IP address of a remote host is known, but the MAC address is not in the local ARP cache
, the following process is used to obtain the MAC address of the remote node: the
local host sends a broadcast packet to all nodes in the network, asking if There is a corresponding IP address. A node
(only one) will answer this ARP broadcast message. The MAC
address of the remote host will be included in the response packet . After receiving this return packet, the local node will record the MAC address of the remote node in the local ARP cache.
If we IP / MAC correspondence between the establishment of a fixed, that is, to establish a static MAC to those legitimate IP address of
the time should be the relationship, even if illegal users from stealing the IP address, connection linux router in response to these IP requests made
not Will query its MAC address through the ARP protocol, but use the static MAC address established by linux to send out the response data. In this way,

5) IP thieves will not get the response data, so they can not use network services.

6) The method of establishing static IP / MAC binding is to establish / etc / ethers file, which contains the correct IP / MAC correspondence
, the format is as follows:
192.168.2.32 08: 00: 4E: B0: 24: 47
and then in / etc / The last addition of rc.d / rc.local:
arp -f
can be

7) The iptables of the 2.4 kernel can limit both IP and MAC. Use this function to limit the
IP address and MAC address of the rules of legal IP at the same time .

---
end

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
FB.COM/UNDERCODETESTING

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

Zip

1) wget -c https://github.com/danielmiessler/SecLists/archive/master.zip -O SecList.zip \

2) && unzip SecList.zip \

3) && rm -f SecList.zip

> Git (Small)

git clone --depth 1 https://github.com/danielmiessler/SecLists.git
Git (Complete)

git clone https://github.com/danielmiessler/SecLists.git
Kali Linux (Tool Page)

apt -y install seclists

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁