UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ELITE FRESH PROXIES

167.86.66.178 3128 1 hour ago
3347 ms 46% (51) de Germany - Nuremberg Elite -
79.137.123.252 3131 1 hour ago
1194 ms 11% (74) fr France Elite -
101.231.104.82 80 1 hour ago
1002 ms 70% (46) cn China - Shanghai Elite -
79.137.44.85 3129 1 hour ago
2617 ms 58% (50) es Spain - Madrid Elite -
103.216.82.200 6666 1 hour ago
3870 ms 12% (79) in India - Ahmedabad Elite -
103.216.82.216 6666 1 hour ago
3982 ms 10% (75) in India - Ahmedabad Elite -
108.74.113.180 80 1 hour ago
746 ms 48% (55) us United States - Atlanta Elite -
47.91.44.217 8000 1 hour ago
2133 ms 31% (52) au Australia - Melbourne Elite -
176.9.221.34 808 1 hour ago
2179 ms 19% (69) de Germany Elite -
177.91.111.233 8080 1 hour ago
3371 ms 17% (67) br Brazil - Bom Jesus da Lapa Elite -
185.72.27.12 8080 1 hour ago
3144 ms 9% (80) ir Iran Elite -
194.67.92.81 3128 1 hour ago
4208 ms 6% (85) ru Russia Elite -


118.24.89.206 1080 1 hour ago
3881 ms 9% (59) cn China Elite -
144.76.214.158 1080 1 hour ago
3052 ms 73% (43) de Germany Elite -
159.8.114.34 8123 1 hour ago
431 ms 92% (37) fr France - Clichy Elite -
140.227.174.216 1000 1 hour ago
2315 ms 12% (67) jp Japan Elite -
173.192.128.238 25 1 hour ago
153 ms 100% (33) us United States - Seattle Elite -
173.192.128.238 9999 1 hour ago
150 ms 100% (36) us United States - Seattle Elite -
64.227.126.95 3128 1 hour ago
1289 ms 22% (65) us United States - Jacksonville Elite -
62.213.14.166 8080 1 hour ago
3244 ms 25% (64) ru Russia - Samara Elite -
103.119.54.188 8888 1 hour ago
3221 ms 15% (74) cn China Elite -
103.216.82.28 6666 1 hour ago
3452 ms 8% (68) in India - Ahmedabad Elite -
213.6.136.150 8080 1 hour ago
3230 ms 17% (71) ps Palestinian Territories - Gaza Elite -
36.89.8.235 8080 1 hour ago
4558 ms 7% (78) id Indonesia Elite -
51.255.103.170 3129 1 hour ago
2916 ms 38% (70) gb United Kingdom Elite -
155.93.240.101 8080 1 hour ago
2217 ms 40% (46) za South Africa - Brackenfell Elite -
151.237.175.183 80 1 hour ago
4331 ms 24% (64) ru Russia - Novokuznetsk Elite -
178.128.211.134 6868 1 hour ago
1134 ms 65% (28) gr Greece Elite -
185.108.141.114 8080 1 hour ago
3630 ms 7% (79) bg Bulgaria Elite -
103.250.166.17 6666 1 hour ago
4328 ms 9% (78) in India - Gandhidham Elite -
103.247.216.114 8080 1 hour ago
3978 ms 11% (82) id Indonesia - Jakarta Elite -
122.226.57.70 8888 1 hour ago
942 ms 34% (51) cn China Elite -
113.254.134.196 8118 1 hour ago
835 ms 5% (71) hk Hong Kong - Central Elite -

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘In-depth analysis of how hackers steal QQ :
t.me/UndercodeTesting

If you provoke it, the OICQ password may be leaked before you know it. Even more frightening is that it will send the password to the Internet, so hackers don't have to work hard on your machine. The thing that the hacking team will introduce today is GOP (Get Oicq Password).

1) First, analyze the use settings of the Trojan

As the saying goes, "Know yourselves and know each other, you can't fight a hundred battles." To prevent GOP attacks, you must first understand its operating mechanism.

2) After downloading and unzipping the latest version of GOP, there are 3 executable files plus a description file, and an accompanying icon. Among them, gop.exe is the server (don't run it on your computer!), Editgop.exe is the server editor, and gopslit.exe is a tool to organize the sending records. The configuration of GOP is divided into four parts.

πŸ¦‘ General settings

1) Copy to the definition directory: one of four categories: directory, directory, directory and source directory can be selected in the drop-down menu. This is where the Trojan hides.

2) Delete the source file after running: the act of adding extravagance, even the author himself recommends not to choose it. (Who does n’t know that the thing that disappeared inexplicably after running is the Trojan, if this happens, hey, be careful!)

3) Service file name: it is the name of the Trojan, you can change any name, it is not easy to be found.

4) Define the registry key name: Once the Trojan has been run, it will add the Trojan key under the HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun primary key in the registry, so that the Trojan can run automatically every time it is turned on in the future.

5) When the number of records exceeds XX, the cleanup starts: when the number of records in the GOP record file reaches this XX value, the records are automatically cleared.

πŸ¦‘Mail settings

1) SMTP: Set the mail sending server. Do you know what this is for? When you go online, GOP will send your OICQ password to the Internet through this mail server!

2) Mailbox: This is the mailbox account used by hackers to send mail. Most domestic free2 mailbox providers restrict the SMTP server, so you need to set up a legal mail account to send letters.

3) Receive mailbox: The mailbox that receives the password record document sent by GOP, the final destination of the victim's password.

4) Check interval (seconds): Set the time interval for GOP check record files. If the record has been updated and online at the time of inspection, the record will be sent immediately.

πŸ¦‘Deception window

1) (I think the Trojan is very powerful) You can choose whether to pop up a spoof window when running GOP for the first time. For example, define a deceit window with the title "Warning", the content "Insufficient memory!" And the icon "Exclamation Point". In this way, when someone else runs the Trojan for the first time, the defined window will pop up, so the Trojan has been implanted into the computer without knowing it.

2) File binding

The Trojan comes with a file binding tool, which is really scary. The following are its important options:

3) Host file: The hacker can find a small animation or small program on the Internet, and use it as a "parasitic" target.

4) File icon: If a hacker finds an icon that is the same as a system tool, ordinary people are afraid to delete it. In this way, knowing that there is a Trojan can not be removed in time.

(Okay, with GOP, everyone can safely steal someone ’s OICQ password, hahaha ... ah! Black! "The author crawled out of the garbage dump." Ah? That's the case, why didn't you say it early. ")

Let's talk about how to deal with this Trojan. Because it's very new, don't just open things from others. This is a very risky behavior, this is by no means alarmist!

πŸ¦‘Trojan inspection

1) When the Trojan is running, it is not visible in the Windows task window. Don't believe the Windows task window-this is my second advice.
2) Click "Start", "Run", "msinfo32" on the task bar (the system information that comes with Windows, in "Accessories"). Look at the software environment β†’ running tasks. This is the task that Windows runs all now. When you think something is wrong after running something, take a look here. If a project has a program name and path, but no version, manufacturer, and description, you should be nervous.

3) Turn off your cat first (off the network), and then log in to your OICQ again offline to find whether there is a record.dat file on your computer (this is the document that the GOP records the OICQ password. If your OICQ password is monitored, it must be Yes, of course, even if you hit the Trojan, this file will not be available when you have not used OICQ. Anyway, you are not online now, don't worry about the password being sent away) If so, then "congratulations" you, 100% hit the Trojan. Do not believe? Open the record.dat with notepad and see if there is your baby OICQ number and password.

4) Third, the removal of the Trojan

Fortunately, so far most of the Trojans have added a key value under the HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun primary key of the registry to let the Trojan run automatically, and the Trojan is no exception. Run regedit, enter the HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun primary key, remember that the file found in the system information (in "Analysis of Trojan Settings", we know that the Trojan file name can be customized arbitrarily,

5) so the specific file name cannot be determined) Path, delete the key. Then shut down the computer and wait for a while to start the computer (note: do not choose to restart). Then enter the file storage path and delete the Trojan file.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ Torjans usages..
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hosts file to prevent QQ virus
t.me/UndercodeTesting

> Recently, the QQ virus is very rampant. Such viruses mainly send malicious website addresses that can infect the virus through QQ.

πŸ¦‘ So, how to prevent access to those known malicious websites due to misuse? Here the hacker team introduces a simple and effective prevention method-using the Hosts file to prevent accidental access to malicious websites!

1) analysis

When we use a domain name to access a website, the DNS server in the network will interpret the domain name as the corresponding IP address. If the domain name of a malicious website is disturbed before it is interpreted as the corresponding IP address, will it not achieve our purpose?

2) Solution

The Hosts file can help us realize this vision. Take the Win98 system as an example, the Hosts file is located in the "C: \ Windows" directory, it can be viewed as a DNS system of the machine, and its priority is higher than the DNS server in the network. We can open it with Notepad and you will see instructions for using the Hosts file. For example, we can write the following line:



>After saving 127.0.0.1 www.test.com , run it in the MS-DOS window:

> ping www.test.com

> What do you see? Yes! The system interprets the domain name www.test.com as 127.0.0.1 (local IP), which is exactly the effect we want! Of course, we can also specify it as a website we often visit IP address. Now do you understand? We can explain all the domain names of known malicious websites to the IP address of the machine, namely: 127.0.0.1. After this setting, when we visit a malicious website by mistake, Hosts will interpret the domain name as the address of the machine, so as to prevent the malicious entry of the malicious website. After the author writes a few example website addresses (for example, not real URLs) into the Hosts file, when you visit these URLs, you will directly access 127.0.0.1:

>127.0.0.1 www.123.com

127.0.0.1 321.123.com

127.0.0.1 213.123.com

127.0.0.1 321.123.com

> Note: The file name of the Hosts file is Hosts.sam by default. You must remove the extension .sam after modification, otherwise it will be invalid.

> After saving the Hosts file, try to refresh the system as many times as possible.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Programming
> technology-best compilation parameters for different CPUs by undercode
t.me/undercodeTesting

πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹ :


> gcc has different compilation effects under different architectures / CPUs, and you need to use different Compile parameters to achieve the best results.

1. Version 1.2 (gcc version 2.9.x)

-pipe -fomit-frame-pointer "
CXXFLAGS ="-march = i486 -O3 -pipe -fomit-frame-pointer "

Pentium, Pentium MMX +, Celeron (Mendocino) (Intel)
CHOST = "i586-pc-linux-gnu"
CFLAGS = "-march = pentium -O3 -pipe -fomit-frame-pointer"
CXXFLAGS = "-march = pentium -O3 -pipe -fomit-frame-pointer"

Pentium Pro / II / III / 4, Celeron (Coppermine), Celeron (Willamette?) (Intel)
CHOST = "i686-pc-linux-gnu"
CFLAGS = "-march = i686 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS = "


CHOST="i586-pc-linux-gnu"
CFLAGS="-march=i586 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=i586 -O3 -pipe -fomit-frame-pointer"

Quote : I did the original gentoo install using 1.2, with gcc 2.95 using -march=i586. i686 won't work.

K6 or beyond (AMD)
CHOST="i586-pc-linux-gnu"
CFLAGS="-march=k6 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=k6 -O3 -pipe -fomit-frame-pointer"

(A Duron will report "Athlon" in its /proc/cpuinfo)

Athlon (AMD)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=k6 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=k6 -O3 -pipe -fomit-frame-pointer"

For the following, i don't know of any flag that enhance performances..., do you ?

PowerPC
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer"

Sparc
CHOST="sparc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer"

Sparc 64
CHOST="sparc64-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer"


δΊŒγ€1.4η‰ˆ(gcc 3.xη‰ˆ):


i386 (Intel), do you really want to install gentoo on that ?
CHOST="i386-pc-linux-gnu"
CFLAGS="-march=i386 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=i386 -O3 -pipe -fomit-frame-pointer"

i486 (Intel), do you really want to install gentoo on that ?
CHOST="i486-pc-linux-gnu"
CFLAGS="-march=i486 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=i486 -O3 -pipe -fomit-frame-pointer"

Pentium 1 (Intel)
CHOST="i586-pc-linux-gnu"
CFLAGS="-march=pentium -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium -O3 -pipe -fomit-frame-pointer"

Pentium MMX (Intel)
CHOST="i586-pc-linux-gnu"
CFLAGS="-march=pentium-mmx -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium-mmx -O3 -pipe -fomit-frame-pointer"

Pentium PRO (Intel)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=pentiumpro -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentiumpro -O3 -pipe -fomit-frame-pointer"

Pentium II (Intel)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=pentium2 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium2 -O3 -pipe -fomit-frame-pointer"

Celeron (Mendocino), aka Celeron1 (Intel)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=pentium2 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium2 -O3 -pipe -fomit-frame-pointer"

Pentium III (Intel)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=pentium3 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium3 -O3 -pipe -fomit-frame-pointer"

Celeron (Coppermine) aka Celeron2 (Intel)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=pentium3 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium3 -O3 -pipe -fomit-frame-pointer"

Celeron (Willamette?) (Intel)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=pentium4 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium4 -O3 -pipe -fomit-frame-pointer"

Pentium 4 (Intel)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=pentium4 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium4 -O3 -pipe -fomit-frame-pointer"

Eden C3/Ezra (Via)
CHOST="i586-pc-linux-gnu"
CFLAGS="-march=i586 -m3dnow -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=i586 -m3dnow -O3 -pipe -fomit-frame-pointer"

quote : the ezra doesn't have any special instructions that you could optimize for, just consider is a K6-3...basically
a p2 with 3dnow
K6 (AMD)
CHOST="i586-pc-linux-gnu"
CFLAGS="-march=k6 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=k6 -O3 -pipe -fomit-frame-pointer"

K6-2 (AMD)
CHOST="i586-pc-linux-gnu"
CFLAGS="-march=k6-2 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=k6-2 -O3 -pipe -fomit-frame-pointer"

K6-3 (AMD)
CHOST="i586-pc-linux-gnu"
CFLAGS="-march=k6-3 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=k6-3 -O3 -pipe -fomit-frame-pointer"

Athlon (AMD)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=athlon -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=athlon -O3 -pipe -fomit-frame-pointer"

Athlon-tbird, aka K7 (AMD)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=athlon-tbird -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=athlon-tbird -O3 -pipe -fomit-frame-pointer"

Athlon-tbird XP (AMD)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=athlon-xp -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=athlon-xp -O3 -pipe -fomit-frame-pointer"

Athlon 4(AMD)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=athlon-4 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=athlon-4 -O3 -pipe -fomit-frame-pointer"

Athlon XP (AMD)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=athlon-xp -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=athlon-xp -O3 -pipe -fomit-frame-pointer"

Athlon MP (AMD)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=athlon-mp -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=athlon-mp -O3 -pipe -fomit-frame-pointer"

603 (PowerPC)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"

603e (PowerPC)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"

604 (PowerPC)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"

604e (PowerPC)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"

750 aka as G3 (PowerPC)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-mcpu=750 -O3 -pipe -fomit-frame-pointer
-fsigned-char"
CXXFLAGS="-mcpu=750 -O3 -pipe -fomit-frame-pointer
-fsigned-char"

Note: do not use -march=

7400, aka G4 (PowerPC)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-mcpu=7400 -O3 -pipe -fomit-frame-pointer
-fsigned-char -maltivec"
CXXFLAGS="-mcpu=7400 -O3 -pipe -fomit-frame-pointer
-fsigned-char -maltivec"

Note: do not use -march=

7450, aka G4 second generation (PowerPC)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-mcpu=7450 -O3 -pipe -fomit-frame-pointer
-fsigned-char -maltivec"
CXXFLAGS="-mcpu=7450 -O3 -pipe -fomit-frame-pointer
-fsigned-char -maltivec"

Note: do not use -march=

PowerPC (If you don't know which one)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"

Sparc
CHOST="sparc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer"

Sparc 64
CHOST="sparc64-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer"

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘full (Programming) technology-best compilation parameters for different CPUs by undercode
Forwarded from TARJETAS PRO UNDER CARDING
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘QQ password + mailbox password = method for breaking QQ second-generation password protection:
youtube.com/undercode

πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹ :

1) bring it on. Just got the ground, everyone looks at the operation, first enter dna.qq.com to log in, I have logged in, click to send to the mailbox, this email titled "Password Protection Information" has been sent to m ***** @ 163.com, this email is very important, please keep it confidential and keep it properly.


2) example I sent it to the mailbox. I can only see one letter at the beginning of the mailbox for a letter. I came to this Q information or business to find it. The mailbox mlqiji@163.com is this. Of course, some QQ is not set here. For the sake of speed, I only open this one. When you break it in the future, you can look for business or other places, and then enter the mailbox to confirm.

> Dear QQ users:

Hello!

According to your request submitted at [2011-01-03 14:28:16], the following will send you the password protection (DNA) information of QQ account [10 *******]:

Confidential question 1: What is your mother ’s name?
Answer: *******
Confidential question 2: What is your father ’s name?
Answer: *****
Confidential question 2: What is your birthplace?
Answer: **** *
Security phone: 135 ******* 7
Name: *****
ID number: 2 *************

3) See it, sent it over, it turns out to be this mailbox, and then click on, confidential question

Has been set

[Verify and modify immediately] Click to modify. Of course, we do not know the password. Enter the QQ password. The email has been sent to the secure mailbox you specified.

To reset the confidential question, go to the inbox where you can receive the e-mail, open the message titled "Reset QQ Account Confidential Question", and follow the instructions.

I sent it to the mailbox, refreshed it, received it, the network speed is relatively slow, wait a minute, see it, you can modify the settings without the previous prompt answers, congratulations, the secret question is set successfully!

Confidentiality issues are important credentials for password changes and sensitive information changes, please bear in mind.

πŸ¦‘ The modification is successful, click on my account, you can modify the mobile phone verification through security question modification, as long as the prompt answer is added,

Original mobile phone number:

Original document number:

There is no need to add these two, because there is no * in the back,

New mobile phone number: *

The verification code you received:

This input

Then it's ok, it's as simple as breaking the second generation of protection!

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘INSTALL ALL KALI-PARROT-UBUNTU TOOLS ON TERMUX :
Onex is a library of all hacking tools for Termux and other Linux distribution
t.me/undercodeTesting

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) apt update

2) apt install git

3) git clone https://github.com/rajkumardusad/onex.git

4) chmod +x onex/install

5) sh onex/install if not work than use ./onex/install

πŸ¦‘HOW TO USE :

CLI Mode :
onex -h or onex help for help.

Options :

onex install [tool_name] install any tool.
onex -i [tool_name] install any tool.
onex search [tool_name] search any tool.
onex -s [tool_name] search any tool.
onex list list all tools.
onex list -a list all tools.
onex -l list all tools.
onex -l -a list all tools.
onex help get help.
onex -h get help.
Menu Mode :
onex start to start onex menu mode.

Enter a Number for a specific output:

(1) : To show all available tools and type the number of a tool which you want to install.
(2) : To show tools category.
(3) : If you want to update onex.
(4) : If you want to know About Us.
(5) : To exit the tool.


βœ… VERIFIED BY UNDERCODE
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Paid Netflix alternatives :

1) Amazon Prime Video: Β£79 a year or 7.99 a month. Full Prime package also includes free one-hour/one-day delivery on Amazon items, access to thousands of e-books, films, TV shows (including Top Gear) and songs though Amazon's extensive media library. See our Amazon Prime FAQ to discover more.


2) NOW TV: Passes start from Β£3.99 a month or you can invest in a one off box for around Β£20. The box will turn your TV into a smart device using its USB plug-in. Users can then purchase 24-hour and 30-day Sky passes ad hoc for football matches, movies and entertainment contract free.

2) YouTube Premium: Β£11.99 a month. YouTube Premium gives you access to TV shows, series, films and music ad-free and you can also access offline from a number of platforms. It's also contract free and you can watch without any obligations and under no time constraints.

3) Sky TV: Sky's Original TV bundle starts at Β£25 a month - and the deal includes its new Sky Q, next generation box. The package includes catch up TV, Sky+ and Sky Go, as well as usual suspects Sky Atlantic, itv Encore and even Netflix. Find out more about the Sky TV Original Package here.

4)Disney+: Β£5.99 a month or Β£59 a year. Includes access to Disney's huge back catalogue of films, series and box sets as well as content from Pixar, Star Wars, Marvel and National Geographic.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Best free Netflix alternatives :
twitter.com/undercodeNews

1) Vimeo: You're unlikely to find anything you've ever heard of at Vimeo, but it's worth diving into for indie and independent films like Thunder Road and A Fighting Chance. Check out their staff picks for inspiration.
> www.vimeo.com/

2) YouTube: At 800 million unique visitors per month, with roughly 72 hours of content being uploaded each minute, YouTube is by far the most used video-sharing platform on the web. Get yourself a Google account and you can watch (and upload) TV shows and video content on its platform for free.

3) SkyGo: If you (or mum and dad) have a Sky account, you can actually log-in on any desktop, mobile or tablet on the go and watch or catch up on TV shows (included in your plan) for free. Ideal for students, all you need is your membership login details to get watching.
> https://www.sky.com/shop/tv/sky-go/

4) iPlayer: BBC iPlayer has a vast movie library available at your fingertips online. It's also great for documentaries. The service's video library covers just about every genre - including Sherlock and Killing Eve. You will need a TV Licence to watch it, though.
> https://www.bbc.co.uk/iplayer

5) ITV Player and All 4: You'll need log-in details to access these services, but again, they're free to watch. Both feature a long list of films, documentaries, dramas and reality TV shows like Derry Girls and Love Island.
> https://www.itv.com/

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Bypass Chrome password management, check the saved password of browser, pay attention to computer security
T.ME/UNDERCODETesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> In the office or other places, when a colleague or friend is out of business, the computer leaves the seat without a lock screen, you can use this gap to view his account password saved on the Chrome browser.

1) Enter chrome: // settings / passwords in the address bar to view a list of all saved passwords

2) Come out this interface:


Click the eye logo to pop up the Google Chrome protection password.


3) Use the mobile 10086 website for testing here, click on the website 10086.cn


4) Enter this interface, see if there is, the password is invisible:

5) Position the mouse pointer to the SMS password box, right-click [Check], or [Ctrl + Shift + i], and the code window will come out. If it is not easy to find, you can position the mouse pointer to the password input box again Right mouse button 【Check】

6) Rewrite type = "password" to type = "Text", and then look at the password box to see the password.

7) Firefox browser in [Settings]-[Options]-[Security]-[Saved Security Information]-[Display Password], you can directly view the password, without any credentials, so it is best not to get used to the public computer It is good to save the password, and the personal computer should also be safe.

8) For the sake of convenience, many people like to save passwords with their browsers for the next use, but they must be security-conscious. People are no longer at the computer and remember to lock the screen. If you like it, just give it a follower!

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Memory read crack QQ password full
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) We complete the QQ login by entering the correct account password. In this process, in addition to sending the account password to the server for verification, QQ will also store at least one hash value of the password in memory.

2) This value can be After the verification of some access, such as opening QQ games. We need to obtain the QQ password by reading from the memory, we first need to know where the QQ password hash value is placed in the memory. Of course, we do not need to program the location of the hash value ourselves.

3) There is an open source software called Cheat Engine, which was originally used to cheat when playing games, but we can use it to complete the search for the hash value. Mission.

4) First run QQ, if the version is different, the memory location of the hash value may also be different), enter your own account password after logging in, you don't have to worry about it. Then we need to obtain the hash value of our QQ password. This value will be used to search the location of the password hash value in the QQ process space. The hash value of the QQ password is calculated using the MD5 algorithm, so we also need an MD5 calculation tool to calculate the hash value of our own password.

5) There are many such calculation tools, both online and local. It is a tool called HASH. We create a new text file, write the password in it and then save the file. Use this tool to open the text file where the password is saved and you can see the hash value of the password is 21232F297A57A5A743894AOE4A801FC3.


6) Open Cheat Engine 5.4, click the icon of the small computer in the upper left corner to select the process "QQ.exe" that we want to open. Select "Array fo Bytes" for "Value type" on the interface, indicating that we want to search for consecutive bytes, check the check box in front of the "Hex" label, and then paste the hash value obtained before into the text after "Hex9" frame.

7) Click "First Scan" to start the first search. The left side of the software interface immediately shows three locations for storing hash values: OOf07494, Ola9a364, and Olaba97c. These three values ​​are just the addresses where the password hashes are stored. These positions may change, and I will continue to look for pointers to these addresses. Change "Value fo type" to "4 Bytes", paste the above three addresses into the search box, you can get the address pointing to OOf07494 is Ola2e448, the address pointing to Ola9a364 is 019749ec, the value of Olaba97c was not found. Now we start to wonder, which address above is the base address?

8) Since it is a base address, it is certain that its location in the same environment will not change. Therefore, we can open another QQ decisively and complete the above process again in the newly opened QQ process. This time, I still got 3 sets of data similar to the previous ones: the address pointing to OOf07494 is Ola2e448, the address pointing to Ola99c e4 is 01974aac, and Olaca34c was not found. It is not difficult to see that the pointer at address Ola2e448 has not changed in the two QQs. We can use this address to programmatically read the memory hash value.

9) I have written a GUI program with MFC, but for the sake of explanation, I re-written a console interface program to avoid the interference of MFC content. This program is written and run through using VC6.0.