UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to be anonymous during CARDING?
t.me/UndercodeTesting

> Hiding your identity while surfing the Internet is challenging, but a lot has changed in this era. It is not as difficult as you think to hide your identity when surfing through the Internet. Most of us know that security plays an important role in completing the card swiping operation. No one wants to give the federal government the satisfaction of destroying us and shutting down production, so we should remain anonymous.

πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹ :

First let me remind you that there is no way to sort out with a 100% safety guarantee . Don't let others fool you. There are many ways to capture, such as agents, socks and anywhere else in the world, no matter where you are, you will leave a "digital fingerprint". For my personal benefit, I use a card ISP with an anonymous account.

# 1 Card ISP: I personally do n’t know how safe it is to sort out, because according to my personal experience, I have n’t been found so far. Some popular ISP cards are Earthlink prepaid (you can prepay for one year to find links on its confusing website) and America Online (more suitable for express cards, just get free of its 849308490383904 One) 10000000 hours cds and enter some ccs *****)

# 2 www.anonymizer.com, because it provides a level 1 agent. But I do not recommend that everyone do this. Because it provides excellent service for those who want to remain anonymous . The frustration lies in one of its services. As with any other service provided, you must pay for it. Because of fraudulent use, they will limit your account. Just card another ceremony? If you are eager to use an anonymizer, you only need to focus on keeping the IP as confidential as possible from its services, not on the site where you want the card. The only obstacle to this service is that they have some problems with websites that use Java Applets, which means you may have to skip some major websites that require Java.

# 3 Stealther: There is a problem here that will actually link your agents together to achieve maximum anonymity. The program is called Stealther, it is registered with a key (so you can go to #serialz on efnet and get the key), and it is an anonymous descendant program.

# 4 Agent: I use a paid private hidden agent, but you can also search for free-as far as I know, free agents may not work properly. You can get a free agent from www.anonymitycheker.com/page1.htm, which is a pedigree website, and its agent rankings range from "transparent" (leak your IP) to "highly anonymous". They also conduct real-time proxy testing and others.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

If you may need to know your true identity, you can test it with some simple hacks:
t.me/UndercodeTesting


The links given below provide you with anonymous information:

# 1 www.whatismyip.com: This is a simple way to know your IP on the web. Although it cannot be run through JAVA, you cannot really tell whether you are anonymous from this site alone.

# 2 http://www.multiproxy.org/env_check.htm: This is the basic anonymity level. JAVA must be enabled-the real purpose of the site is to promote their software (multiproxy), which works in a manner similar to a secreter.

# 3http: //www.sinfulcherries.com/? A…: This is actually a porn site protected by ibill When you try to register here,
> as example site and it s banned anyway
it is a Java applet that tells you "Your current IP is being recorded. If it is not your real IP, you will have a second test. (You can also check here CC)

πŸ¦‘No matter what reason you are combing for novice combing tutorial , this combing technical tutorial should answer some noobie questions and be free from the entire combing game. I repeat, the resources and techniques mentioned in this carding tutorial are not the only carding methods. Combing experience is the key. You have to practice your own method and try the new technology in carding to get the system that is right for you

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘VERIFIED BINS FOR NETFLIX PRE

515462001xx8207x
515462001xxx578x

CVV : RND
Date : RND
IP : Palestine πŸ‡΅πŸ‡Έ
VPN : VYPR VPN

> how use bin : https://t.me/UnderCodeTesting/3768

> cc generators 2020 : https://t.me/UnderCodeTesting/3411

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ INSTALL ALL KALI TOOLS ON TERMUX :
t.me/UndercodeTesting

1) git clone https://github.com/kres0345/katoolin4termux.git katoolin/ && cp katoolin/katoolin.py /usr/bin/katoolin

2) chmod +x /usr/bin/katoolin

3) sudo katoolin

4) Typing the number of a tool will install it

5) Typing 0 will install all Kali Linux tools in a category or all, and definitly start alot of bugs.
back : Go to the previous menu.
gohome : Go to the main menu.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ FRESH ELITE PROXIES
T.me/UndercodeTesting

47.106.170.9 8000 1 hour ago
1945 ms 32% (75) cn China Elite -
47.94.200.124 3128 1 hour ago
1440 ms 25% (72) cn China - Hangzhou Elite -
80.187.140.26 8080 1 hour ago
740 ms 92% (57) de Germany Elite -
82.119.170.106 8080 1 hour ago
729 ms 87% (52) de Germany - Berlin Elite -
5.202.192.149 8080 1 hour ago
3873 ms 14% (68) ir Iran Elite -
91.205.174.26 80 1 hour ago
1041 ms 85% (60) de Germany - Munich Elite -
167.99.75.87 8080 1 hour ago
1517 ms 57% (53) sg Singapore Elite -
178.128.53.246 8080 1 hour ago
1118 ms 73% (47) gr Greece Elite -
195.209.176.2 8080 1 hour ago
3626 ms 16% (69) ru Russia Elite -
109.195.131.124 8080 1 hour ago
763 ms 70% (49) ru Russia Elite -
124.106.86.10 8080 1 hour ago
2659 ms 50% (51) ph Philippines Elite -
159.138.20.247 80 1 hour ago
2623 ms 7% (77) hk Hong Kong Elite -


155.93.240.101 8080 1 hour ago
2541 ms 38% (56) za South Africa - Brackenfell Elite -
211.149.252.155 8888 1 hour ago
923 ms 3% (90) cn China Elite -
202.138.241.166 8080 1 hour ago
2964 ms 15% (69) id Indonesia - Bandung Elite -
37.111.42.210 8080 1 hour ago
3993 ms 23% (70) mm Myanmar Elite -
49.81.26.214 4216 1 hour ago
4105 ms 55% (46) cn China Elite -
101.132.39.115 8080 1 hour ago
2282 ms 26% (66) cn China - Hangzhou Elite -
77.38.21.239 8080 1 hour ago
4513 ms 10% (73) si Slovenia - Smartno pri Slovenj Gradcu Elite -
187.60.163.242 8081 1 hour ago
3554 ms 19% (72) br Brazil - Linhares Elite -
103.253.113.54 80 1 hour ago
3960 ms 9% (86) id Indonesia Elite -
113.254.182.241 80 1 hour ago
817 ms 19% (55) hk Hong Kong - Central Elite -
159.65.43.38 8118 1 hour ago
1133 ms 7% (95) us United States - Clifton Elite -
159.8.114.37 25 1 hour ago
377 ms 100% (43) fr France - Clichy Elite -
144.76.214.158 1080 1 hour ago
3079 ms 66% (52) de Germany Elite -
159.138.21.170 80 1 hour ago
2561 ms 13% (72) hk Hong Kong Elite -
79.137.44.85 3129 1 hour ago
2201 ms 58% (71) es Spain - Madrid Elite -
62.213.14.166 8080 1 hour ago
2917 ms 26% (62) ru Russia - Samara Elite -
91.236.61.65 8080 1 hour ago
3438 ms 28% (72) ru Russia - Ivanovo Elite -
188.40.183.185 1080 1 hour ago
2935 ms 72% (60) de Germany Elite -
35.220.131.188 80 1 hour ago
992 ms 29% (70) us United States Elite -
36.37.177.186 8080 1 hour ago
3356 ms 41% (62) kh Cambodia Elite -
34.214.16.51 8080 1 hour ago
3325 ms 3% (89) us United States - Boardman Elite -
159.138.22.112 443 1 hour ago
3658 ms 30% (67) hk Hong Kong Elite -
169.57.157.148 25 1 hour ago
586 ms 100% (43) br Brazil - SΓ£o Paulo Elite -


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ install kali tools in Termux tool METHODE 2 for beginers :-
t.me/UndercodeTesting

step 1 :- Install Termux from Play Store

step 2:- Open Termux application

step 3:- Update termux using this command apt update

step 4:- now install some important packages

pkg install clang

pkg install git

step 5 :- install python2, you must be install python2

pkg install python2

step 6 :- install lazymux on Your Termux

git clone https://github.com/Gameye98/Lazymux.git

step 7 :- make the python file executable

chmod +x lazymux.py

step 8 :- Now run Lazymux :- python2 lazymux.py

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘POPULAR 2020 ATTACKS FOR HACK WIFI


Rogue Wireless Devices: ...

Peer-to-peer Attacks: ...

Eavesdropping: ...

Encryption Cracking: ...

Authentication Attacks: ...

MAC Spoofing: ...

Management Interface Exploits: ...

Wireless Hijacking:

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WIFI HACKING -great rogue hotspad in 2020 :
fb.com/UndercodeTesting

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :


1) git clone https://github.com/InfamousSYN/rogue.git

2) cd rogue

3) python install.py

usage: python rogue.py -i wlan0 -h g -c 6 -e rogue --auth open --internet


πŸ¦‘FEATURES :

> ostile portal

> Integration with metasploit

> Add an automated update system

> Create automation DNS spoofing system for cloned websites

> Add support to allow for RDP MITM attacks

> Add support for keyboard interruption closing

> Add support for 3 additional user-defined sslsplit selections

> Segment freeradius-wpe.conf file into individual EAP mode templates for increased control, and add an "all" mode.

> INCLUDE :

hostapd-wpe
freeradius-wpe
isc-dhcp-server
httrack
sslsplit
responder
be3f framework
apache2/httpd
openssl
tcpdump

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How prevent this kind of wifi attack ?
T.me/UndercodeTesting


Look for the following rogue AP characteristics:

1) Odd SSIDs, including the popular default ones such as linksys and free wifi.

2) Odd AP system names β€” that is, the name of the AP if your hardware supports this feature. Not to be confused with the SSID.

3) MAC addresses that don’t belong on your network. Look at the first three bytes of the MAC address, which specify the vendor name. You can perform a MAC-address vendor lookup to find information on APs you’re unsure of.

4) Weak radio signals, which can indicate that an AP has been hidden away or is adjacent to or even outside of your building.
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘NETWORK ATTACKs & How works For beginers by Undercode
t.me/UndercodeTesting

1) Illegal use of wireless network: Campus wireless network often happens to send advertising letters, infringing intellectual property rights; and the hacker's favorite wireless network is a wireless network that does not require certification, such as school teachers and students often set up by themselves Wireless network, and using a wireless network access point that has not changed the factory settings at all, can easily be used by hackers to do illegal things. Finally, the teachers and students who set up the wireless network access point are the ones behind it.

2) Eavesdropping (Eavesdropping): Eavesdropping refers to intruders monitoring wireless network communication content and using the eavesdropping content to obtain the victim's personal information such as account / password; the most common example is to steal the victim's login account when logging in to the wireless network password.

3) Traffic Analysis: Traffic analysis is to analyze the traffic, content, and behavior of wireless network communications. Through the analysis of communication content or traffic, you can obtain considerable data on the target network, such as: server address, Communication mode, etc.

4) Masquerade: Masquerade refers to an attacker setting up an illegally disguised wireless network system to deceive users. For example, an attacker can set a wireless network identification code (SSID, Service Set Identifier) ​​that requires authentication, such as disguising the wireless network ntu system of NTU campus, after defrauding the victim ’s account account password, log in to the school and use the account account password Any system certified.

5) Replay: Replay means that the attacker will resend some communication content (such as authentication information) intercepted from the wireless network to deceive the wireless network authentication system.

6) Message Modification: Message modification refers to an attacker adding, deleting, or changing the content of wireless network communications.

7) Denial of service: Denial of service is probably the most familiar attack method. Attackers use various possible methods (ICMP flooding, UDP flooding, etc.) to prevent users and administrators from obtaining system resources. And services. However, the bandwidth of wireless network users is much lower than that of back-end wired devices, so when encountering a service denial attack, other users who are using wireless networks will not easily notice. However, there is another type of service blocking attack that exploits IP protocol vulnerabilities. For example, the attacker acts as a DHCP server to allow the user to obtain an incorrect IP when requesting an IP. Another example is when the attacker tells the user to attack via ARP (Address Resolution Protocol). The user's computer is the default gateway (Default Gateway). At this time, the user's traffic goes to the attacker's computer, and the victim cannot use the wireless network.

8) Man-in-the-middle attack: refers to an attacker who can act as a man-in- the-middle, allowing communication between the two ends to pass through him, and reading, inserting, and changing the transmission without the knowledge of both ends of the communication message.

γ€€WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM