UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘VALID CC FOR TRIALS :
t.me/UndercodeTesting

5147504059695050 | 11 | 2020 | 661 | | Dan Leuchs | 14009 Gun Club Rd,| Epworth | IA | 52045-8884 | 6087928084 ||

***************************

5523930012521311 01/23 168 Robert Robinson 952 Paul Acuff Lane Loudon TN 37774

***************************

5243631024164202|01|2021|006|UNITED STATES|Seonwoo Yee|4204 172nd St|Flushing|NY|11358-2725|9173483563||

***************************

4400667713261828 10/19 848 Patricia K Olive 6560 340TH ST Stacy MN 55079-4532 UNITED STATES

***************************

5522631015034887
10/2019 197
Guitonkagya Algonquin
REVOLUCION 1014, COATZACOALCOS CENTRO, 96400
VERACRUZ Coatzacoalcos
96400 MX
(921)212-3631


Card number:4884984369409063

Name:Brooklyn White

Adress:Grand Avenue 103

Country:Switzerland

CVV:383

Exp:02/2021

*******************************

5162208645638588 05/21 971 GLEIDISON GON?ALVES RUA DOS CRAVOS ,50 AP 12 S?O PAULO / SP S?O BERNARDO DO CAMPO 09810290 BRAZIL +5511987476206

*******************************

5574473002561201 12/20 738 Fredrik Bergman John Erikssonsgatan 41A Sm?land J?nk?ping 55472 SWEDEN +46723996456

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Network filtering-restore the default settings of iptables
instagram.com/undercodeTesting

/usr/local/sbin/iptables -P INPUT ACCEPT
/usr/local/sbin/iptables -P FORWARD ACCEPT
/usr/local/sbin/iptables -P OUTPUT ACCEPT

#
# reset the default policies in the nat table.
#
/usr/local/sbin/iptables -t nat -P PREROUTING ACCEPT
/usr/local/sbin/iptables -t nat -P POSTROUTING ACCEPT
/usr/local/sbin/iptables -t nat -P OUTPUT ACCEPT

#
# flush all the rules in the filter and nat tables.
#
/usr/local/sbin/iptables -F
/usr/local/sbin/iptables -t nat -F

#
# erase all chains that's not default in filter and nat table.
#
/usr/local/sbin/iptables -X
/usr/local/sbin/iptables -t nat -X'

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Network filtering-About the problems faced by three proxy gateways in one proxy

Three proxy gateways for 600 machines in the unnamed original LAN The server goes online, and the subnet is divided into three segments:
192.168.1.1/192.168.2.1/192.168.3.1 To save the machine source, I now want to use a proxy server without
changing the client's IP, mask, gateway (too many machines).

My iptables configuration is as follows:
#! / Bin / sh
/ sbin / modprobe ip_tables
/ sbin / modprobe ip_nat_ftp
/ sbin / modprobe ip_conntrack_ftp

/ sbin / iptables -F
/ sbin / iptables -F -t nat
/ sbin / iptables -X
/ sbin / iptables -Z

echo "1"> / proc / sys / net / ipv4 / ip_forward
iptables -P INPUT ACCEPT
iptables -P FORWARD ACCEPT
iptables -P OUTPUT ACCEPT

iptables -t nat -A PREROUTING -p tcp -s 192.168.0.0/24 --dport 80 -j REDIRECT --to-port 3128
iptables -t nat -A POSTROUTING -s 192.168.0.0/24 -o eth1 -j SNAT --to 210.183.14.22
iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE
iptables -A FORWARD -s 0/0 -d 0/0 -j ACCEPT
In addition, I use a proxy machine high? I use intel i7 as example CPU

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Network filtering-set up IP and MAC binding on Linux routing :
There are such requirements in some systems, I hope some of the internal network IP addresses are connected to the Internet, and hope that these
IP addresses will not be stolen by illegal users. This can be achieved by the following solutions:

1) First use ipchains or iptables to set only allow legitimate IP addresses to connect.
Establish IP / MAC bundling for legitimate IP. To discuss this issue, we first need to understand the working principle of the
ARP protocol . The ARP protocol is an abbreviation of Address Resolution Protocol. Its function and working principle are as follows:
In the underlying network communication, two nodes want to communicate with each other. You must first know the MAC addresses of the source and destination. In order
to allow the system to quickly find the MAC address of a remote node, each local kernel maintains an immediate

2) lookup table (called ARP cache). ARP contains a list that maps the IP address of the remote host to its corresponding MAC address. The
Address Resolution Protocol (ARP) cache is a data structure that is resident in memory, and its contents are managed
and maintained by the kernel of the local system . By default, the IP
address (and corresponding MAC address) of the node that the local system communicates with in the last ten minutes is retained in the ARP cache .

4) When the MAC address of a remote host exists in the ARP cache of the local host, there is no problem in converting the IP address of the remote node to the MAC
address. However, in many cases, the MAC address of the remote host does not exist in the local ARP cache,
What will the system do? When the IP address of a remote host is known, but the MAC address is not in the local ARP cache
, the following process is used to obtain the MAC address of the remote node: the
local host sends a broadcast packet to all nodes in the network, asking if There is a corresponding IP address. A node
(only one) will answer this ARP broadcast message. The MAC
address of the remote host will be included in the response packet . After receiving this return packet, the local node will record the MAC address of the remote node in the local ARP cache.
If we IP / MAC correspondence between the establishment of a fixed, that is, to establish a static MAC to those legitimate IP address of
the time should be the relationship, even if illegal users from stealing the IP address, connection linux router in response to these IP requests made
not Will query its MAC address through the ARP protocol, but use the static MAC address established by linux to send out the response data. In this way,

5) IP thieves will not get the response data, so they can not use network services.

6) The method of establishing static IP / MAC binding is to establish / etc / ethers file, which contains the correct IP / MAC correspondence
, the format is as follows:
192.168.2.32 08: 00: 4E: B0: 24: 47
and then in / etc / The last addition of rc.d / rc.local:
arp -f
can be

7) The iptables of the 2.4 kernel can limit both IP and MAC. Use this function to limit the
IP address and MAC address of the rules of legal IP at the same time .

---
end

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
FB.COM/UNDERCODETESTING

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

Zip

1) wget -c https://github.com/danielmiessler/SecLists/archive/master.zip -O SecList.zip \

2) && unzip SecList.zip \

3) && rm -f SecList.zip

> Git (Small)

git clone --depth 1 https://github.com/danielmiessler/SecLists.git
Git (Complete)

git clone https://github.com/danielmiessler/SecLists.git
Kali Linux (Tool Page)

apt -y install seclists

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 updated Weaponized web shell


πŸ¦‘ FEATURES :

Shell access to the target
SQL console pivoting on the target
HTTP/HTTPS proxy to browse through the target
Upload and download files
Spawn reverse and direct TCP shells
Audit remote target security
Port scan pivoting on target
Mount the remote filesystem
Bruteforce SQL accounts pivoting on the target

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

Linux
The following example runs on a Debian/Ubuntu derived Linux environments with Python 3.

# Make sure that the python package manager and yaml libraries are installed
$ sudo apt-get install -y python3 python3-pip curl
$ cd weevely3/
$ sudo pip3 install -r requirements.txt --upgrade
OS X
OS X requires Python3 to be installed in the system. Follow the following commands to install manually gnureadline Python package.

$ sudo pip3 install gnureadline
$ cd weevely3/
$ sudo pip3 install -r requirements.txt --upgrade

@uNDERCODEtESTING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁