UNDERCODE COMMUNITY
2.69K subscribers
1.24K photos
31 videos
2.65K files
80.9K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚

πŸ¦‘ from 2 months All in One

> Apache Block Bad Bots

> (Referer) Spam Referrer Blocker,

> Vulnerability Scanners, Malware, Adware, Ransomware, Malicious Sites,

> Wordpress Theme Detectors and Fail2Ban Jail for Repeat Offenders
instagram.com/UnderCodeTestingCompany

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:


1) clone https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker

2) COPY THE GLOBALBLACKLIST.CONF FILE FROM THE REPO $APACHE_CONF is generally located at /etc/apache2 or /etc/httpd depending on OS

3) Copy the contents of globalblacklist.conf into your $APACHE_CONF/custom.d folder. e.g. /etc/apache2/custom.d on Ubuntu/Debian /etc/httpd on RHEL/centos You need to create this folder.

4) The following directions use /etc/apache2 as an example.

> sudo mkdir /etc/apache2/custom.d

> sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/globalblacklist.conf -O /etc/apache2/custom.d/globalblacklist.conf

5) If your Linux distribution does not have wget you can replace the wget commands using curl as follows:

> curl -sL https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/globalblacklist.conf -o /etc/apache2/custom.d/globalblacklist.conf

6) Please do NOT ever use 127.0.0.1 as a whitelisted IP address in whitelist-ips.conf it will cause the blocker to stop functioning.

> copy the whitelist-ips.conf file into that folder

7) sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/whitelist-ips.conf -O /etc/apache2/custom.d/whitelist-ips.conf

8) copy the whitelist-domains.conf file into the same folder

9) sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/whitelist-domains.conf -O /etc/apache2/custom.d/whitelist-domains.conf

10) Use nano, vim or any other text editor to edit both whitelist-ips.conf and whitelist-domains.conf to include all your own domain names and IP addresses that you want to specifically whitelist from the blocker script.

11) copy the blacklist-ips.conf file into that folder

> sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/blacklist-ips.conf -O /etc/apache2/custom.d/blacklist-ips.conf

12) copy the bad-referrer-words.conf file into that folder

> sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/bad-referrer-words.conf -O /etc/apache2/custom.d/bad-referrer-words.conf

13) Allows you to add your own custom list of user agents with this new include file.

> copy the blacklist-user-agents.conf file into that folder

> sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/blacklist-user-agents.conf -O /etc/apache2/custom.d/blacklist-user-agents.conf

14) INCLUDE THE GLOBALBLACKLIST.CONF

Include the globalblacklist.conf file in the beginning of a directory block just after your opening Options statements and before the rest of your host config example below. Remove the "<<<<<< This needs to be added" part

<VirtualHost *:80>
ServerName local.dev
DocumentRoot /var/www/html
ErrorLog /tmp/error.log

<Directory "/var/www/html">
Options +Includes
Options +FollowSymLinks -Indexes
Include custom.d/globalblacklist.conf
</Directory>
</VirtualHost>

15) You can include globalblacklist.conf globally (for all virtual hosts) if you put the following configuration after virtual host configuration.

16) Do an Apache2 Config Test

> sudo apache2ctl configtest

> sudo service apache2 reload

17) Now Open Terminal & Type :

> curl -A "googlebot" http://yourdomain.com

Should respond with 200 OK

> curl -A "80legs" http://yourdomain.com

> curl -A "masscan" http://yourdomain.com

Should respond with 403 Forbidden

> curl -I http://yourdomain.com -e http://100dollars-seo.com

> curl -I http://yourdomain.com -e http://zx6.ru
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚

πŸ¦‘Termux 2019 tool :
PentBox is a tool that allows us to create honeypot in systema this is written in ruby language
t.me/UnderCodeTesting

πŸ¦‘Features:

> Command execution in gets (STDIN) implemented. (!command)

> Honeypot now shows attacker's IP and port (thx Shyish)

> Ip grabber direct targeting from email: yahoo,gmail,hotmail & sites like facebook gmail ...etc

> Included log options.

> Wordlist is bigger now.

> Included "back" option on menus. New tools:

> Included new area, Web tools.

> Included new module MAC address geolocation (samy.pl).

> Included new module HTTP directory bruteforce.

> Included new module HTTP common files bruteforce.

> Included exploits for DoS [other/http] 3Com SuperStack Switch DoS [other/http] 3Com OfficeConnect Routers DoS (Content-Type) [windows/

>ftp] Windows 7 IIS7.5 FTPSVC UNAUTH'D DoS [windows/ftp] Solar FTP Server 2.1 DoS [windows/pptp] MS02-063 PPTP Malformed Control Data

>Kernel DoS [windows/smb] Windows Vista/7 SMB2.0 Negotiate Protocol Request DoS BSOD

> Included pb_update.rb to update PenTBox from the SVN repository. Bugfixing:

> Fixed issue with SHODAN API.

> Deleted l33t speak and extra menu.

> Improved permissions checking, now it's done by euid, not username (thx r4mosg)

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

1) git clone https://github.com/technicaldada/pentbox

2) cd pentbox

3) tar -zxvf pentbox.tar.gz

4) cd pentbox

5) chmod 777 pentbox.rb

6) ./pentbox.rb

Written by Μ΅Ν‘M̡͘ Μ Μ–rΜΆΜ•.̡́ Μ·Ν B̴͘OΜ·Μ“TΜΆΜ†Ń̴EΜΆΝ›TΜΆΜ…(tm
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Termux/Kali/Parrot package manager script 2019
package manager for hacker's. onex manage large number's of hacking tools that can be installed on single click. Using onex, you can install all hacking tools in Termux and other Linux based distributions. onex can install more than 370+ kali linux hacking tools. use onex install [tool_name] command to install any hacking tool.
instagram.com/UnderCodeTesting

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

Open the terminal and type following commands.

1) apt update

2) apt install git

3) git clone https://github.com/Rajkumrdusad/onex.git

4) chmod +x onex/install

5) sh onex/install if not work than use ./onex/install

πŸ¦‘onex start to start onex menu mode:

> Enter a Number for a specific output:

(1) : To show all available tools and type the number of a tool which you want to install.

(2) : To show tools category.

(3) : If you want to update onex.

(4) : If you want to know About Us.

(5) : To exit the tool.

Written by Μ΅Ν‘M̡͘ Μ Μ–rΜΆΜ•.̡́ Μ·Ν B̴͘OΜ·Μ“TΜΆΜ†Ń̴EΜΆΝ›TΜΆΜ…(tm
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Remote Access Tool/Botnet
Loki is Remote Access Tool.
Loki uses RSA-2048 with AES-256 to keep your communication secure.
Warning: DO NOT upload any samples generated by this program to online scanners.
\
πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

1) git clone https://github.com/Pure-L0G1C/Loki

2) pip install -r requirements.txt

3)open /lib/const.py & configure your private and public IP's

4) start loki.py

5) navigate to http://127.0.0.1:5000

6) login, Username: loki Password: ikol

7) navigate to settings, selected server tab and start the server on the same IP as your private IP

8) Click the home button

9) Generate a payload


10) Navigate to the agent directory

> Run: python builder.py -h

It will not compile inside a virtual enivornment
> After connection

11) You can click the hostname of the bot once it connects

> Explore

πŸ¦‘Features:

>Upload & Download
> Chrome Launching
> Persistence
> Screenshot
> Keylogger
> Ddos
> SFTP
> SSH

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to get MacOs ? And How To convert to .iso?
instagram.com/UnderCodeTesting

1) There is no way to legitimately get the file without having access to a Mac, and a licensed copy of the OS via a purchase (unless you are a member of the Developer Program, for which you can expect to pay far more than the cost of the OS, what with it being free)

2) But if you can blag some access time on a Mac, then you can download the OS from the Mac App Store (You may need to Option+Click the Purchased section to force it to reshow them if you have downloaded them at least once already).

3)Once you have the installer downloaded and sat in your dock, you can simply pick it apart and get to the image file that is inside it.

4) This is the official way to get the file direct from Apple, but there is still work to do to make it into an ISO

5) Once you’ve downloaded Mavericks, find the installer on your Mac. It’s called Install OS X Mavericks.app and it should have been downloaded to your main Applications folder or be sat in your Dock.

6) Right-click (or Control+click) the installer, and choose Show Package Contents from the resulting contextual menu.

7) In the folder that appears, open Contents > Shared Support; you’ll see a disk image file called InstallESD.dmg

8) This dmg file is in essence an ISO file in s slightly different format. We'll need to convert it. Open up Disk Utility and:

9) From the menu bar, select Images > Convert and point it to your .dmg file

10) In the Save As dialog that follows, select DVD/CD master. Disk Utility will insist on saving the new ISO as a .cdr file, but it is really an ISO.

11) When complete, you can rename it to .iso in Finder.

12) Use an external HD or thumb drive which is in ExFAT format (Compared to FAT format, this allows for single files larger than 4GB).

13) Copy the .iso file and access it on the other system or vm...


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘what is AOXdeface tools?
AOXdeface is a tool for defacing dozens or hundreds of sites at once,depending on the number of sites that have been determined by you, this is not dangerous, and this is only the file upload method


πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

A)Termux:

pkg install python2
pip2 install requests
pkg install git
git clone https://github.com/Ranginang67/AOXdeface
cd AOXdeface
python2 aox.py

B)Linux:

apt-get install python
apt-get install pthon-pip
pip install requests
apt-get install git
git clone https://github.com/Ranginang67/AOXdeface
cd AOXdeface
python aox.py

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘what is Crypton tools?
cryton this a tools usefull for penetration testing, information gathering,
and for ethical hacking and this tools easy to use and easy to install
instagram.com/UnderCodeTesting

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

> install on kali, ubuntu, and parrot:

1) apt-get install git

2) git clone https://github.com/Ranginang67/Crypton

3) chmod 777 install.sh

4) ./install.sh

5) type crypton in term to run it

πŸ¦‘Features:

feature information

> credit card validator checker to check whether the credit card is active

> Facebook account information to see all the information on your Facebook account

> social media name checker search for social media users associated with that username

> website backdoor scanner looking for a backdoor shell that is embedded on the website

>http header information get http header information from website
website analyze scanner scanning website vulnerability

>find admin login page for find the admin login page
gmail account checker checking if gmail account is exists


>find my facebook id find facebook user id

>dump all friend id dump all your friend ID on Facebook
domain age checker checking age of domain

>md5 hash cracker crack md5 password
ip adres checker search for information from the ip


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘So we ve heared alot about Md5 and Still alot don t know exact definition for it so :

1) MD5 is a type of algorithm that is known as a cryptographic hash algorithm.

2) MD5 produces a hash value in a hexadecimal format. This competes with other designs where hash functions take in a certain piece of data, and change it to provide a key or value that can be used in place of the original value.

3) Security engineers and others are familiar with long lists of hash algorithms with different properties.

4) MD5 and other types of hash algorithms are often referred to as "message digest" functions.

5) The idea here is that a hash "digests" an original value and outputs a replacement value that is significantly different from the original.

6) Hashes have several main uses in security and database efficiency, related to the use of replacement values in searches and in data storage.

7) With the development of various hash algorithms, experts have noted that engineers found MD5 to have serious weaknesses in terms of not being "collision resistant." A collision happens when two hash values are found to be similar or the same.


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Crack hashes in seconds: Md5 Cracker 2019 :
t.me/UnderCodeTesting

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

1) git clone https://github.com/s0md3v/Hash-Buster

2) cd Hash-Buster

3) Hash-Buster can be run directly from the python script but I highly suggest you to install it with

> make install

4) python hash.py/

5) buster -s <hash>

6) Finding hashes from a directory
just specify a directory and Hash Buster will go through all the files and directories present in it, looking for hashes.

> buster -d /root/Documents

7) Hash Buster can find your hashes even if they are stored in a file like this

πŸ¦‘Tested On:

> Kali

> Debian


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Most advanced XSS scanner
> XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.

> Instead of injecting payloads and checking it works like all the other tools do, XSStrike analyses the response with multiple parsers and then crafts payloads that are guaranteed to work by context analysis integrated with a fuzzing engine. Here are some examples of the payloads generated by XSStrike:

}]};(confirm)()//\
<A%0aONMouseOvER%0d=%0d[8].find(confirm)>z
</tiTlE/><a%0donpOintErentER%0d=%0d(prompt)``>z
</SCRiPT/><DETAILs/+/onpoINTERenTEr%0a=%0aa=prompt,a()//
t.me/UndercOdeTestingOfficial

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

1) git clone https://github.com/s0md3v/XSStrike

2) cd XSSrtike

3) pip install -m requirements.txt

4) python xsstrike.py

πŸ¦‘Features:

> Reflected and DOM XSS scanning

> Multi-threaded crawling

> Context analysis

> Configurable core

> WAF detection & evasion

> Outdated JS lib scanning

> Intelligent payload generator

> Handmade HTML & JavaScript parser

> Powerful fuzzing engine

> Blind XSS support


> Highly researched work-flow

> Complete HTTP support

> Bruteforce payloads from a file

> Powered by Photon, Zetanize and Arjun

> Payload Encoding
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Network Trick
Tensorflow implementation of Deep Convolutional Generative Adversarial Networks which is a stabilize Generative Adversarial Networks


πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

1) git clone https://github.com/carpedm20/DCGAN-tensorflow

2) cd DCGAN-tensorflow

3) python download.py mnist celebA

4) To train a model with downloaded dataset:

> python main.py --dataset mnist --input_height=28 --output_height=28 --train

> python main.py --dataset celebA --input_height=108 --train --crop

πŸ¦‘ To test with an existing model:

1) python main.py --dataset mnist --input_height=28 --output_height=28

2) python main.py --dataset celebA --input_height=108 --crop

> Or, you can use your own dataset (without central crop) by:

3) mkdir data/DATASET_NAME
... add images to data/DATASET_NAME ...

4) python main.py --dataset DATASET_NAME --train

5) python main.py --dataset DATASET_NAME

6) # example

7) python main.py --dataset=eyes --input_fname_pattern="*_cropped.png" --train

8) If your dataset is located in a different root directory:

> python main.py --dataset DATASET_NAME --data_dir DATASET_ROOT_DIR --train

9) python main.py --dataset DATASET_NAME --data_dir DATASET_ROOT_DIR
> # example

10) python main.py --dataset=eyes --data_dir ../datasets/ --input_fname_pattern="*_cropped.png" --train



▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to Discover Cross-Domain Relations with Generative Adversarial Networks


πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

1) git clone https://github.com/carpedm20/DiscoGAN-pytorch

2) cd DiscoGAN-pytorch

3) Or > sudo apt-get install imagemagick (avaible ata ubanto Repo)

> mogrify -resize 256x256! -quality 100 -path YOUR_DATASET_NAME/A/*.jpg

> mogrify -resize 256x256! -quality 100 -path YOUR_DATASET_NAME/B/*.jpg

πŸ¦‘ for Mac

1) brew install imagemagick

> mogrify -resize 256x256! -quality 100 -path YOUR_DATASET_NAME/A/*.jpg
$ mogrify -resize 256x256! -quality 100 -path YOUR_DATASET_NAME/B/*.jpg

2) for scale and center crop
$ mogrify -resize 256x256^ -gravity center -crop 256x256+0+0 -quality 100 -path ../A/*.jpg

πŸ¦‘To train a model:

1) python main.py --dataset=edges2shoes --num_gpu=1

2) python main.py --dataset=YOUR_DATASET_NAME --num_gpu=4

> To test a model (use your load_path):

3) python main.py --dataset=edges2handbags --load_path=logs/edges2handbags_2017-03-18_10-55-37 --num_gpu=0 --is_train=False


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is PostgreSQL ? (@ wikipedia)


> PostgreSQL is a general purpose and object-relational database management system, the most advanced open source database system. PostgreSQL was developed based on POSTGRES 4.2 at Berkeley Computer Science Department, University of California.

>PostgreSQL was designed to run on UNIX-like platforms. However, PostgreSQL was then also designed to be portable so that it could run on various platforms such as Mac OS X, Solaris, and Windows.

>PostgreSQL is free and open source software. Its source code is available under PostgreSQL license, a liberal open source license. You are free to use, modify and distribute PostgreSQL in any form.

>PostgreSQL requires very minimum maintained efforts because of its stability. Therefore, if you develop applications based on PostgreSQL, the total cost of ownership is low in comparison with other database management systems.

πŸ¦‘Features:

> User-defined types

> Table inheritance

> Sophisticated locking mechanism

> Foreign key referential integrity

> Views, rules, subquery

πŸ¦‘Official Download Link:

>https://www.postgresql.org/

> Nested transactions (savepoints)

> Multi-version concurrency control (MVCC)

> Asynchronous replication


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Best IKE Scanner Original Tool


πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

Termux-root/Kali/Debian/Parrot

1) git clone https://github.com/royhills/ike-scan

2) cd ike-scan

3) autoreconf --install to generate a viable ./configure file

4) Run ./configure or ./configure --with-openssl to use the OpenSSL libraries

5) Run make to build the project

6) Run make check to verify that everything works as expected

7) Run make install

8) ike-scan -h

πŸ¦‘Features:

1) Discovery Determine which hosts in a given IP range are running IKE. This is done by displaying those hosts which respond to the IKE requests sent by ike-scan.

2) Fingerprinting Determine which IKE implementation the hosts are using, and in some cases determine the version of software that they are running. This is done in two ways: firstly by UDP backoff fingerprinting which involves recording the times of the IKE response packets from the target hosts and comparing the observed retransmission backoff pattern against known patterns; and secondly by Vendor ID fingerprinting which compares Vendor ID payloads from the VPN servers against known vendor id patterns.

3) Transform Enumeration Find which transform attributes are supported by the VPN server for IKE Phase-1 (e.g. encryption algorithm, hash algorithm etc.).

4) User Enumeration For some VPN systems, discover valid VPN usernames.

5) Pre-Shared Key Cracking Perform offline dictionary or brute-force password cracking for IKE Aggressive Mode with Pre-Shared Key authentication. This uses ike-scan to obtain the hash and other parameters, and psk-crack (which is part of the ike-scan package) to perform the cracking

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BugBounty in Linkedln How I was able to bypass Open Redirection Protection


1) Open redirection vulnerabilities arise when an application incorporates user-controllable data into the target of a redirection in an unsafe way. An attacker can construct a URL within the application that causes a redirection to an arbitrary external domain

2)Example a site contain vulparan parameter indicates where to send user upon successful login.

> If website doesn’t validate the β€œvulparam” parameter value to make sure that target web page is legitimate and intended, attacker could manipulate that parameter to send a victim to a fake page crafted by attacker

3) Now simply changing the β€œurl” value to any malicious site won’t work

> As you can see there is an extra parameter β€œurlHash” which looks like some hash value for the URL to which the user getting redirected so if β€œurlHash” value is the actual valid hash value for the β€œurl” then only successful redirection will take place.

> One thing was clear till now basic techniques were not going to do anything good and then I went back to the raw request to find some help β€”

πŸ¦‘ β€œHow about changing the referer header value and see whether the validation working there?”

4) So I quickly jumped into it and changed the header value to some other domains and [face palm] still no luck. :/ .

Let’s give one more try , searched for LinkedIn android app referer and found the following link-

> https://github.com/snowplow/referer-parser/issues/131 and there came across LinkedIn android referer value as β€œ android-app://com.linkedin.android” . I used the referer value in the β€œreferer” header field and the rest As show in pictures will sendNext

5) Successful redirection and yeah finally I managed to bypass the Open redirection protection of LinkedIn
e n j o y


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚
πŸ¦‘All in one 2020 recon, scanning,
parsing, and creating malicious payloads and listeners with Metasploit. For use with Kali Linux
and the Penetration Testers Framework (PTF).


πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:
1) git clone https://github.com/leebaird/discover /opt/discover/
> All scripts must be ran from this location.

2) cd /opt/discover/

3) chmod 777 update.sh

4) ./update.sh


πŸ¦‘RECON
1. Domain
2. Person
3. Parse salesforce

πŸ¦‘SCANNING
4. Generate target list
5. CIDR
6. List
7. IP, range, or domain
8. Rerun Nmap scripts and MSF aux

πŸ¦‘WEB
9. Insecure direct object reference
10. Open multiple tabs in Firefox
11. Nikto
12. SSL

πŸ¦‘MISC
13. Parse XML
14. Generate a malicious payload
15. Start a Metasploit listener


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘How to create a fake AP and sniff data.



πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:
1) git clone https://github.com/xdavidhu/mitmAP

2) cd mitmAP

3) python mitmAP.py

πŸ¦‘How it Works:

1) SSLstrip2 for HSTS bypass

2) Image capture with Driftnet

3) TShark for command line .pcap capture

πŸ¦‘Features:

> SSLstrip2

> Driftnet

> Tshark

> Full featured access point, with configurable speed limit

> mitmproxy

> Wireshark

> DNS Spoofing

> Saving results to file

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘2019 tool that discovers valid subdomains for websites.

> Designed as a passive framework to be useful for bug bounties and safe for penetration testing.

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:
1) git clone https://github.com/projectdiscovery/subfinder/releases/

2) Download .tar

3) tar -xzvf subfinder-linux-amd64.tar

4) mv subfinder-linux-amd64 /usr/bin/subfinder

5)subfinder

πŸ¦‘If you want to build it yourself, you can go get the repo

> go get -v github.com/projectdiscovery/subfinder/cmd/subfinder

> If you wish to upgrade the package you can use:

> go get -u -v github.com/projectdiscovery/subfinder/cmd/subfinder


πŸ¦‘Running:

1) If you are using docker, you need to first create your directory structure holding subfinder configuration file. After modifying the default config.yaml file, you can run:

2) mkdir $HOME/.config/subfinder

3) cp config.yaml $HOME/.config/subfinder/config.yaml

4) nano $HOME/.config/subfinder/config.yaml

5) docker run -v $HOME/.config/subfinder:/root/.config/subfinder -it ice3man/subfinder -d freelancer.com

πŸ¦‘How To Use:

1) Running Subfinder

To run the tool on a target, just use the following command.

2) subfinder -d freelancer.com

This will run the tool against freelancer.com. There are a number of configuration options that you can pass along with this command. The verbose switch (-v) can be used to display verbose information.

[CERTSPOTTER] www.fi.freelancer.com
[DNSDUMPSTER] hosting.freelancer.com
[DNSDUMPSTER] support.freelancer.com
[DNSDUMPSTER] accounts.freelancer.com
[DNSDUMPSTER] phabricator.freelancer.com
[DNSDUMPSTER] cdn1.freelancer.com
[DNSDUMPSTER] t1.freelancer.com
[DNSDUMPSTER] wdc.t1.freelancer.com
[DNSDUMPSTER] dal.t1.freelancer.com

The -o command can be used to specify an output file.

> subfinder -d freelancer.com -o output.txt


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘fsstat displays the details associated with a file system. The output of this command is file system specific. At a minimum, the range of meta-data values (inode numbers) and content units (blocks or clusters) are given. Also given are details from the Super Block, such as mount times and and features. For file systems that use groups (FFS and EXT2FS), the layout of each group is listed.

>For a FAT file system, the FAT table is displayed in a condensed format. Note that the data is in sectors and not in clusters.


πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

1) Its kali pre-installed tool

2) To Run

> fsstat [-f fstype ] [-i imgtype] [-o imgoffset] [-b dev_sector_size] [-tvV] image [images]


πŸ¦‘Commands :
-t type
Print the file system type only.
-f fstype
Specify the file system type. Use ’-f list’ to list the supported file system types. If not given, autodetection methods are used.
-i imgtype
Identify the type of image file, such as raw. Use ’-i list’ to list the supported types. If not given, autodetection methods are used.
-o imgoffset
The sector offset where the file system starts in the image.
-b dev_sector_size
The size, in bytes, of the underlying device sectors. If not given, the value in the image format is used (if it exists) or 512-bytes is assumed.
-v
Verbose output of debugging statements to stderr
-V
Display version


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A Simple Termux(root) /Kali/parrot tools To scan port , Brute force protocol Service ,scan website , exploit system , exploit sql injection website and also have other characteristics


πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

1) git clone https://github.com/joker25000/DZGEN

2) The installation the tool

3) cd DZGEN

4) chmod +x DZGEN

5) ./DZGEN

6) Run DZGEN tool in terminal

> DZGEN

πŸ¦‘Tested By UnderCode

> kali

> debian


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁