UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Kaspersky Internet Security ( KIS 91 ) Days OEM Trial Keys:

4CH4C-PPFDT-NFK4B-45R69
WN2CH-P55VX-B53EK-UY222
NQJMW-GBXCX-HSJZ3-Z2ZQS
783RV-DQRXR-XXVM9-93HKM ( for Mac )
Kaspersky Anti-Virus ( KAV ) 91 Days OEM Trial Key:

JHJ7C-C69PX-MQY3J-PKG5B
D36NR-H27XY-5MVEQ-6WUFX
QTZJM-3EA1P-VNFSV-HPWFX
52MFR-XMPS3-RPXBM-K6T5E

Kaspersky Total Security 91 Days OEM Trial Key:

B3DFM-Q3KGA-UP7WG-X5SQ6
VYRVR-YHE4C-QQXMK-PVYJE ( for Android )
Kaspersky Interner Security for Android 90 days :

BYK9U-EHE8S-J1WY8-SG1CN
JAPXZ-9G9EJ-CSUV2-7YQUS
Kaspersky Small Office Security for 91 days

BJT18-15VFY-DTQ7C-U2NBS
VACVK-SJ4E4-9GN3T-WCJD8
BJSYM-2YX3V-1RV9S-UHVYM
YGXVQ-1VF6D-6B7EZ-G5SK7
4CH4C-PPFDT-NFK4B-45R69
BYK9U-EHE8S-J1WY8-SG1CN
AKHW5-HRNA6-FKVD9-QYW8C

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Three ways to crack Email account
t.me/UndercodeTesting

E-mail is not safe. There may be a weak link in each link of the entire process of sending, transmitting and receiving mail. If a malicious user takes advantage of his vulnerability, he can easily hack out his account and obtain the content of the mail.



1. Exploit the loopholes in the mail server operating system

The mail server software runs on a specific operating system, such as Linux, Windows NT / 2000, etc. The default installation and configuration of these operating systems are insecure, and hackers can easily invade the system and obtain all user names and passwords.

1 Windows server

If it is an Exchange Mail Server based on Windows2000, the system itself has not been configured for any security and several services have been opened. Intruders can use the terminal server combined with the Chinese input method vulnerability or IIS's Buffer Overflow program to obtain Administrator permissions, use pwdump3 to export the hashed password, and then use L0pht to connect the dictionary or Brute Force to crack the user password. According to experience, if the password is simple, it can be cracked in a few minutes, and the Brute Force method with a length of 8 or less can be solved in a day.

2 Linux / UNIX server

UNIX systems generally use Sendmail as a mail system. After gaining control of the system, software such as John can crack passwords from / etc / passwd or / etc / shadow. If you use a database to save user information and passwords, it is also easy to export.

πŸ¦‘ Second, use the loopholes in the mail server software itself

The most common mail server programs are Sendmail, Qmail, etc., and there are security flaws to varying degrees. Taking Sendmail as an example, in the previous old version, telnet to port 25, enter wiz, and then enter the shell, you can get a rootshell, and debug commands, you can also get root permissions. Qmail is more secure than Sendmail, but Qpoper has a Buffer Overflow defect, and it can remotely get the root shell to control the system.

Even if the mail server is secure, the intruder can obtain more information, such as the user name. Telnet to port 25, enter expn tom or vrfy tom to check if there are tom users in the system Although the latest version of Sendmail disables these two commands, you can determine whether the user exists by forging the sender and then using rcpt to.

Obtained the user name, you can telnet to port 110, try a simple password connection, or apply a dictionary to crack.

Therefore, it is necessary to prohibit the relay of non-local domain (relay), or use the module that is used by many ISPs to add SMTP authentication, which can enhance the security of the mail server.

πŸ¦‘ In addition to receiving messages in POP3 mode, it is more popular to process mail on the WEB interface. This method is not without weaknesses. Generally, CGI is used to accept the form FORM parameters passed by the user, including username and password. If correct, you can enter the page for processing mail. To crack the passwords of known users, there are many softwares that use dictionaries or brute force combinations. The more famous one is Xiao Rong's "Snow Tracking". When the password is simple, the results will soon be available.

WEB mail system has the option of "forgot password", if you can crack another mailbox to send back the password or guess the answer to the prompt question, you can also succeed.

3. Eavesdropping during the transmission of mail

Install Sniffer in the network, specify to listen to the data packets sent to port 110 of the external server, and check the user and pass strings from the collected information to see the user name and corresponding password.


written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘ FAST BEGINERS TIPS
> Three common methods used by hackers to crack passwords
t.me/UndercodeTesting


πŸ¦‘ Obtaining the password of the system administrator by cracking, and then mastering the control of the server, is an important method for hackers. There are many ways to crack and obtain the administrator password. The following are the three most common methods.



(1) Guess simple passwords: Many people use their or family members ’birthdays, phone numbers, room numbers, simple numbers, or ID numbers; others use their own names, children, spouse, or pet names; and Of system administrators use "password", even without a password, so that hackers can easily guess the password.

(2) Dictionary attack: If the simple password attack fails to guess, the hacker starts to try the dictionary attack, that is, every possibility of using the program to try the words in the dictionary. Dictionary attacks can use repeated logins or collect encrypted passwords and try to match words in the encrypted dictionary. Hackers usually use an English dictionary or a dictionary in other languages. They also use additional types of dictionary databases, such as names and commonly used passwords.

(3) Brute force guessing: similar to dictionary attacks, hackers try all possible combinations of characters. A password composed of 4 lowercase letters can be cracked in a few minutes, and a longer password composed of uppercase and lowercase letters, including numbers and punctuation, the possible combinations of 10 trillion. If you can try 1 million combinations per second, you can crack it within a month.


written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Network test commands that must be learned
t.me/UndercodeTesting


>Understanding and mastering the following three commands will help y ou detect the network fault faster, thereby saving time and improving efficiency.

πŸ¦‘ ping

Ping is a very useful tool for testing network connection status and packet sending and receiving status. It is the most commonly used command for network testing. Ping sends a loopback request packet to the target host (address, 2189), asking the target host to give a reply after receiving the request, thereby judging whether the network's response πŸ¦‘time and local machine are connected to the target host (address, 2189).

If the ping is unsuccessful, you can predict the failure in the following aspects: network cable failure, incorrect network adapter configuration, incorrect IP address. If the ping is successful and the network is still unavailable, the problem is probably in the software configuration of the network system. Successful ping can only guarantee that there is a connected physical path between the machine and the target host.

πŸ¦‘Command format:

ping ip address or host name [-t] [-a] [-n count] [-l size]

Parameter meaning:

-t sends data to the target host non-stop;
-a displays the network address of the target host in ip address format;
-n count specifies how many times to ping, the specific number is specified by count;
-l size specifies the number sent to the target host The size of the packet.

πŸ¦‘ For example, when your machine cannot access the internet, first of all, you want to confirm whether it is the failure of the local LAN. Assuming that the IP address of the proxy server on the LAN is 192.168.1.1, you can use the ping 192.168.1.1 command to check whether the machine is connected to the proxy server. As another example, the common command to test whether the local network card is installed correctly is ping 127.0.0.1.

πŸ¦‘tracert

The tracert command is used to display the path that the data packet traverses to the target host and the time to reach each node. The command function is similar to ping, but the information it obtains is much more detailed than the ping command. It displays the entire path taken by the packet, the node's IP, and the time it takes. This command is more suitable for large networks.

πŸ¦‘ Command format:

tracert ip address or host name [-d] [-h maximumhops] [-j host_list] [-w timeout]

Parameter meaning:

-d Does not resolve the name of the target host;
-h maximum_hops specifies the maximum number of hops to the target address;
-j host_list releases the source route according to the address in the host list;
-w timeout specifies the timeout interval, the default time unit of the program is milliseconds .

For example, if you want to know the detailed transmission path information between your computer and the target host www.cce.com.cn, you can enter tracert www.cce.com.cn in ms-dos mode.

πŸ¦‘ If we add some parameters after the tracert command, we can also detect other more detailed information. For example, use the parameter -d to specify that the program also resolves the domain name of the target host when tracking the path information of the host.

netstat

The netstat command can help network administrators understand the overall usage of the network. It can display the detailed information of the currently active network connection, such as displaying network connection, routing table and network interface information. It can count the total number of network connections currently in operation.

Using command parameters, the command can display the usage status of all protocols, such as tcp protocol, udp protocol and ip protocol, etc. In addition, you can select a specific protocol and view its specific information, but also display the port number of all hosts and the current host Detailed routing information.

> Command format:

netstat [-r] [-s] [-n] [-a]

Parameter meaning:
-r displays the content of the local routing table;
-s displays the usage status of each protocol (including tcp protocol, udp protocol, ip protocol, 2189);
-n displays the address and port in the form of a digital table;
-a displays the host computer The port number.
witten by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ helpful Networking tests
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘15 ways to speed up computer startup
by undercode :
Specialy for old windows
Fb.com/UndercodeTesting

It is a common problem for every computer fan that computer startup is too slow. Here are the fifteen tricks to speed up computer startup collected by the hacking team. Some of them have not been tried.



1. Bios optimization settings

On the home page of bios settings, we enter the "advanced bios features" option, move the cursor to the "frist boot device" option, press "pageup" and "pagedown" to select, the default value is "floppy", this It means that the system will first read the boot information from the floppy drive during startup. Doing so will increase the startup time of the machine and shorten the life of the floppy drive. So we have to choose "hdd-0" to boot directly from the hard disk, so that the boot will be fast for a few seconds. In addition, it is recommended to select "disabled" for "above 1mbmemorytest" in the bios settings, and to enable for "quickpoweronselftest".

The settings in the "advanced chipset features" item have a great impact on the acceleration of the machine, please pay more attention. Change "bank 0/1 dram timing" from "8ns / 10ns" to "fast" or "turbo". "Turbo" is faster than "fast", but not very stable, it is recommended to choose "fast". If the quality of the memory is good, you can choose "turbo" to try. If it is unstable, you can change it back to "fast".

It is recommended to set "2" in the "sdram cas latency" option for memory modules with good memory quality, which can speed up the speed.

Newer motherboards support agp4x. If your graphics card also supports agp4x, then activate this option at "agp-4xmode", that is, select "enabled". This will make better use of the capabilities of the graphics card and speed up the system. Start speed.

2. Start DMA mode to increase hard disk speed

The maximum transfer rate of hard disks using udma / 33, 66, 100 technology is 33mb / s, 66mb / s, 100mb / s, which is theoretically the ide hard disk (here refers to the pio mode4 mode, its transfer rate is 16.6mb / s ) The transmission rate is 3 to 6 times, but in the default setting in windows, dma is disabled, so we must turn it on.

The specific method is: open the "Control Panel β†’ System β†’ Device Manager" window, expand the "Disk Drive" branch, double-click the icon of the udma hard disk, enter "Properties β†’ Settings β†’ Options", "√" in front of the "dma" item, then Press OK to close all dialog boxes and restart the computer.

Third, remove the boot logo of windows

First you have to open "Start" β†’ "Settings" β†’ "Binder Options" and check "Show all files" from the "Advanced Settings" list box in the "View" tab. Then open the c drive, find the file msdos.sys, and cancel its "read-only" attribute, open it, add a line of statements under the "option" paragraph: logo = 0, so that the boot logo of windows will not be Loading and running, the boot time can also be shortened by 3 seconds.

Fourth, optimize the "start" group

Computer beginners love to try various software and delete it in a short time, but often because of some inexplicable reasons, these software will still reside in the "startup" project (especially when using some version d software ), Windows will waste a lot of time when it starts. To solve this problem, it is actually very simple, you can open "Start" β†’ "Run", select "msconfig" in the "Open" column of the dialog box that appears, and then click "OK", it will bring up the "System Configuration" "Utilities", click on the "Startup" tab to remove the "√" in front of the program that does not need to load the startup group. In this way, the startup time can be shortened by at least 10 seconds.

5. Organize and optimize the registry
After Windows starts up, the system should read the relevant information in the registry and temporarily store it in the ram (memory). Most of the time that Windows starts up is spent on this. Therefore, it is necessary to organize and optimize the registry. For the optimization of the registry, you can use software such as windows optimization master. Use windows optimization master, click "Registration Information Cleanup" β†’ "Scan", the software will automatically clean up the rubbish in the registry for you. After the scan, a menu will pop up to let you choose whether to back up the registry, it is recommended to choose backup, After backup, click "Clear".

6. Frequent maintenance system

If too many games, too many application software, too many old materials are installed in the system, your computer will run slower and slower, and the boot time will become longer and longer. Therefore, it is best to do a full maintenance of the computer every once in a while. Click "Start" β†’ "Programs" β†’ "Accessories" β†’ "System Tools" β†’ "Maintenance Wizard", and then click "OK" button to perform a comprehensive maintenance of the computer, which will keep your computer in the best state . It is best to do "disk defragmentation" every two weeks for the hard disk, which will significantly speed up the program startup speed, click "System Tools" β†’ "disk defragmentation program". Note that when defragmenting the disk, the disk where the system is located must be defragmented in order to really speed up the startup sequence of windows.

Seven, expand the virtual memory capacity

If your hard disk is large enough, please open the "System" in the "Control Panel", open the "Virtual Memory" in the "Performance" option, select the second item: the user sets the virtual memory settings, pointing to a Use less hard disk, and set the maximum and minimum values ​​to a fixed value, about 2 times the size of physical memory. In this way, when using the hard disk in the virtual memory, there is no need to accommodate the large and small differences, and the fixed space is used as the virtual memory to speed up the access speed. The setting of virtual memory is best performed after "disk defragmentation", so that virtual memory is not in a continuous, non-fragmented file space, and can play a better role.

8. Remove fancy settings like "wallpaper" and "screen saver"

These settings take up system resources, not to mention that it also seriously affects the startup sequence of windows. The way to remove them is: click the right mouse button on a blank space on the desktop, select "Properties" in the pop-up menu, select the "Background" and "Screen Saver" tabs in the pop-up dialog box, and change the "Wallpaper" and "Screen" The "Protection Program" can be set to "None".

Nine, delete autoexec.bat and config.sys

The two files autoexec.bat and config.sys in the root directory of the system installation disk are no longer needed for windows, and you can safely delete them, which can speed up the startup speed of windows.

10. Streamline * .ini files, especially the contents of system.ini and win.ini

Many drivers and font files are loaded in the [boot] and [386enh] sections of system.ini, which is the focus of clearing. In particular, note that the shell = explorer.exe in the [boot] field is the hidden loading place that Trojans like. Trojans usually change this sentence to this: shell = explorer.exe file.exe, pay attention to the file here. Exe is the Trojan server program! The loading and running of the Trojan horse not only poses a threat to system security, but also slows down the startup of the computer. Programs loaded after "run" and "load" in win.ini that are not required to run every time can be temporarily removed. , And then click Run when you want to use it in the future. In this way, the related files called by windows during booting will be reduced a lot, and the starting speed will naturally be much faster.

11. Turn off Disk Scan

Open msdos.sys with a text editor and you will see the following:
[options]
bootmulti = 1
bootgui = 1
autoscan = 1

If you do not want to run the disk scan program after an abnormal shutdown, you can change atuoscan = 1 to autoscan = 0, so that the computer will start faster after an abnormal shutdown (because scandisk is not running).

12. Minimize the duration of the guidance information

Open msdos.sys with a text editor and set bootdelay in [options] to 0.

13. Reduce unnecessary font files

Font files take up a lot of system resources, are slow to boot, and take up a lot of hard disk space. So try to reduce unnecessary font files. But if the wrong font file is deleted, it will make windows abnormal. Therefore, the following "stealing beams and columns" method can be used (the font file can be installed without occupying a lot of disk space): first open the font binder (such as f: \ zk), select all truetype font files, and use the right mouse button Drag them to the c: \ windows \ fonts binder, and select "Create Shortcut at Current Position" in the pop-up menu, so that you can create a shortcut to the font file under the system's font binder. When you need to use these font files, you only need to insert the font disc and remove it when not in use.

14. Delete redundant dll files

There are many dll files in the system subdirectory of the window operating system. These files may be shared by many files, but some do not have a file to use it, which means that these files are useless, in order not to occupy hard disk space and Increase the startup speed, you can delete it.

Fifteen, the "side door left" approach

If the system is suspended, the current system state will be saved after shutdown. After the next startup, the system will directly enter the desktop before the last shutdown. In this way, the startup time can reach 4-5 seconds at the fastest, but not all All of the motherboard bios are supported, and it is a little troublesome to set up.

Open the registry and expand to the hkey_local_machine \ software \ microsoft \ windows \ currentversion \ shareddlls subkey. There are many dll files on the right. If the data is 0, it can be determined that the dll file is not shared by the program. You can delete it.


WRITTEN BY UNDERCODER
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ 15 tips speed up windows by undercode
# SUPPORT & SHARE :

T.me/UndercodeTesting
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Novices must master basic DOS commands BY UNDERCODE

The hacker group's article is to write some commands that novices must master. Let's take a look at the novices. After reading it, you will get something.