UNDERCODE COMMUNITY
2.69K subscribers
1.24K photos
31 videos
2.65K files
81K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
Forwarded from Backup Legal Mega
>Such an attack scenario is very effective and has been successfully implemented during penetration testing on multiple occasions. Additional support for criminals can be provided by resources that contain information about the infrastructure: for example, monitoring systems that administrators use in their work or technical support resources for users.

> This data increases the confidence of intruders in their knowledge of the internal network structure and helps them to take into account operational details of the bank's business processes during the attack, so as not to raise suspicions or trigger detection.
Forwarded from Backup Legal Mega
πŸ¦‘ The main methods of theft are:

1) Transferring funds to fictitious accounts through interbank payment systems

2) Transferring funds to cryptocurrency wallets

3) Controlling bank cards and accounts

4) Controlling ATM cash dispensing

5) Developing or adapting malicious software for the software and

6) OS versions used in the bank

7) Preparing phishing emails

8) Setting up infrastructure (including domain registration, server rental, and purchase of exploits)

9) Preparing the infrastructure for money laundering and cash

10) Searching for money mules

11) Testing the infrastructure and malicious software

@Wiki @UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘ FULL DETAILED HOW THEY HACK BANK IN 2020-USE FOR SECURE YOUR CC
Forwarded from Backup Legal Mega
πŸ¦‘ SOME DANGEROUS MALWARES FOR WINDOWS SOLUTION AND DESCRIPTION
Forwarded from Backup Legal Mega
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Win32/Sality

Windows Defender detects and removes this threat.

This malware family can steal your personal information and lower your PC security settings.

Threats in this family can:
1) Stop your security software from running

2) Steal your sensitive information

3) Download and run other files

4) Delete security-related files from your PC

5) Lower your PC security settings

6) Find out ways that malware can get on your PC.

πŸ¦‘Spammer:Win32/Sality.A


> Spammer:Win32/Sality.A is a detection for malware that searches a user's Outlook address book and Internet Explorer cached files for e-mail addresses to send spammed messages to.

>It then sends out spammed messages based on information it retrieves from a remote server.


πŸ¦‘Virus:Win32/Sality.AU

> Windows Defender Antivirus detects and removes this threat.

> This threat can lower your PC security.

> It is installed by Worm:Win32/Sality.AU. It also spreads through infected removable drives, such as USB flash drives.

> Find out ways that malware can get on your PC.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SEVER MALWARES FONCTIONS 2 :

TrojanDropper:Win32/Sality.AU

> TrojanDropper:Win32/Sality.AU is a trojan that drops the virus

> Win32/Sality.AU. The trojan may be executed by Exploit:Win32/CplLnk.A.

Β» Alert level: SEVERE

> Virus:Win32/Sality.AM

> This virus is a member of the Win32/Sality family. This family can delete Windows files with the extensions .SCR or .EXE.

> This family can also end or close your antimalware software and other security-related processes.

πŸ¦‘Virus:Win32/Sality.G.dll

> This virus is a member of the Win32/Sality family. This family can delete Windows files with the extensions .scr or .exe.

> They can also end or close antivirus software and other security-related processes and services.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The official facebook hacking tool :

πŸ¦‘Requirements :

Selenium
Matplotlib-1.2.1
Networkx-1.8.1
Numpy-1.7.1
Pygraphviz-1.1
Simplejson-3.3.0
Mechanize-0.2.5
Other: gephi-0.8.2-beta (Graphs software)

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/chinoogawa/fbht.git

2) cd fbht

3) python main.py

βœ… Verified by Undercode :

> slax
> kali
> parrot
> debian


E N J O Y

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘ EXPERT HACKING & PROGRAMMING TIPs BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Detailed webpack advanced configuration and optimization

> The so-called multi-page packaging means that multiple html pages are packaged at the same time. The multi-page packaging also uses html-webpack-plugin. However, when the plugin is introduced, multiple plugin objects are created because one html-webpack-plugin plugin object Can package a html page. Such as:
1) When packaging multiple pages, the key lies in the configuration of the chunks attribute, because in the absence of the configuration of the chunks attribute, the index.html and foo.html output by the package will both import index.js and foo.js.

2) Therefore, the chunks attribute must be configured to specify the output module to be introduced in the packaged html file. The elements of the array are the chunk names specified when the entry attribute value is the object. The above configuration can be implemented. Index.html only introduces index. js, foo.html only import foo.js file

3) Second, configure source-map

source-map is the source code mapping, mainly to facilitate code debugging, because the code we packaged on the line will be compressed and processed, resulting in all the code being compressed into one line. If there is an error in the code, the browser will only prompt an error The location is on the first line, so that we can't really know the specific location of the error in the source code. webpack provides a devtool attribute to configure source code mapping.
πŸ¦‘ SO WHAT HAPPEN S NOW ?
πŸ¦‘The location of the error in the source code is clearly the second line of code, and the error prompted in the browser is indeed on the first line, so if the code is very complicated, we cannot find the specific location of the error

There are 6 common configurations of devtool:

1) source-map: This mode will generate a .map file. If an error occurs, it will prompt specific rows and columns. The file retains the mapping relationship between the packaged file and the original file. The packaged output file will point to the generation The .map file tells the js engine where the source code is. Because the source code is separate from the .map file, it needs a browser to send a request to get the .map file. It is often used in production environments, such as:

/# sourceMappingURL=index.js.map

2) eval: This mode has the fastest packaging speed and does not generate .map files. It will use eval to wrap the module and add sourceURL at the end. It is often used in development environments, such as:


//# sourceURL=webpack:///./src/index.js


3) eval-source-map: Each module will be executed by eval () and generate a SourceMap in the form of DataUrl (that is, the base64 encoding form is embedded at the end of the eval statement), but the .map file will not be generated, which can reduce the network Request *, but the package file will be very large *.


//# sourceMappingURL=data:application/json;charset=utf-8;base64,eyJ2ZXJzaW9uIjozLCJzb3VyY2VzIjpbIndlYnBhY2s6Ly8vLi9zcmMvaW5kZXguanM/YjYzNSJdLCJuYW1lcyI6WyJmb28iLCJjb25zb2xlIiwibGciXSwibWFwcGluZ3MiOiJBQUFBLElBQUlBLEdBQUcsR0FBRyxDQUFWO0FBQ0FDLE9BQU8sQ0FBQ0MsRUFBUix1RSxDQUFxQyIsImZpbGUiOiIuL3NyYy9pbmRleC5qcy5qcyIsInNvdXJjZXNDb250ZW50IjpbImxldCBmb28gPSAxO1xuY29uc29sZS5sZyhgY29uc29sZeWvueixoeeahOaWueazleWQjWxvZ+WGmeaIkOS6hmxnYCk7IC8vIOa6kOaWh+S7tuesrOS6jOihjOWHuumUmVxuIl0sInNvdXJjZVJvb3QiOiIifQ==

//# sourceURL=webpack-internal:///./src/index.js


4) cheap-source-map: With cheap, you will only be prompted to the first few lines of error, less column information prompts, and will not map the imported library, which can improve packaging performance, but will generate .map files.

5) Cheap-module-source-map: Compared with cheap-source-map, if you add a module, it will map the imported library, and it will also generate a .map file, which is used in the production environment.

6) cheap-module-eval-source-map: commonly used in development environments, using cheap mode can greatly improve the efficiency of souremap generation, plus module will also map the imported libraries, eval improves the speed of packaging and construction, and will not produce The .map file reduces network requests.

> Any mode with eval cannot be used in a production environment, because it does not generate a .map file, which will cause the packaged file to become very large. Usually we don't care about the column information, so we will use cheap mode, but we still need to map third-party libraries in order to find the wrong location accurately.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Three, watch and watchOptions configuration :

Webpack can monitor file changes, and recompile when they are modified. If you need to enable this function, you need to set watch to true, and the specific monitoring configuration can be set through watchOptions.
Four, the use of three common widgets

> clean-webpack-plugin: Its function is to clear the contents of the output directory before packing, and then output the packaged output files to the output directory.