UNDERCODE COMMUNITY
2.71K subscribers
1.24K photos
31 videos
2.65K files
82.5K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to evaluate OS security ?


---- With the development of the network, enterprises are connecting their local area networks to wide area networks or connecting their internal networks to the Internet. This gives more and more people (internal and external) access to internal network resources. As a result of this exposure, companies urgently need to address network security issues.

---- A major part of providing effective security is to evaluate how well the existing security mechanism is integrated with the enterprise's network security strategy-that is, to judge whether the security strategy is effectively implemented. The increasing complexity of the network makes the implementation of security policies more and more difficult.

---- Evaluating the effectiveness of each network security component is necessary to ensure effective network security. The two main components that provide network security are: firewall and operating system (OS).

---- Many companies put their energies on the firewall, and according to the report provided by Aberdeen Group, the most easily overlooked security holes are those that exist in the operating environment. Some vendors are committed to providing reliable versions of the operating environment, while most only provide optional, installable security services.

---- The operating system's security mechanism helps protect the machine running the OS from unauthorized access. Special protection for unauthorized access to specific information, specific machine instructions, and UNIX superuser instructions within the machine. Most firewalls and the Internet itself are built on a standard, unsecured UNIX operating environment. This is why everyone is not surprised by the existence of security threats. UNIX is very insecure, it is difficult to configure, and configuration errors may cause vulnerabilities.

---- The following two factors make the OS security mechanism very important:

---- (1) A second line of defense is provided behind the firewall. Hackers often break through or bypass firewalls, and OS security policies can effectively protect the system against such intruders.

---- (2) Defense against intruders in the enterprise. Internal intruders are already inside the firewall, and the FBI report indicates that more than 60% of computer crimes come from inside the enterprise. In most cases, the offenders are angry employees or contractors.

---- Evaluating OS security is quite difficult, especially UNIX, because it has many variants and vendors. Assessing the security of a UNIX system requires mastering the following three aspects:

---- (1) UNIX system settings

---- (2) Weaknesses caused by different versions of UNIX applications, including sending mail, FTP, NFS (Network File System) and TFTP (Simple File Transfer Protocol)

---- (3) Provided by different manufacturers Security patches-The

operating system is constantly patching BUGS and adding features to make the evaluation more complicated. These updates introduce new security vulnerabilities. What is needed at this time is a method for automatically evaluating operating system vulnerabilities and automatically implementing security policies. Only in this way can the gap between security strategy and security implementation be effectively assessed and shortened.

---- OS security scanning? The file just provides the required solution. The scanning software runs on each machine and probes each machine through a series of tests to dig out potential weaknesses. This software evaluates the stand-alone security environment from the perspective of the operating system and generates a detailed report of the vulnerabilities it finds, and proposes solutions.
---- System Security Scanner (S3) from ISS is a security assessment tool that facilitates the management and implementation of security policies. It enables companies to implement security policies across heterogeneous operating platforms. Currently, S3 supports most popular UNIX versions, including Linux, SunOS4.1.3, Solaris, HP-UX, and AIX. It helps companies automatically conduct security assessment and maintenance on their operating system platforms. With this effective tool, companies can make full use of the potential of the network and continuously enhance their competitivenessβ€”without worrying about security.

WRitten by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ How to evaluate OS security
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to limit the speed of others by wireless router


A) Router settings

1. First log in to your router to set the URL. The editor is 192.168.1.253. Β» DEFAULT IP After entering it in the browser, a login window will appear. Enter the login password to log in!



2. First of all, we can first look at the IP addresses on our router, click on the IP and MAC binding-ARP mapping table in the left navigation! !



3. Then we can see the IP address segment on the router, most of them start with 192.168.1.100! ! Look at the IP address so it's time to set it!



4. Then click on the IP broadband control in the left navigation. Then click on the control rules! !



5. The editor here has already been set, click the button to add a new item without setting!



6. The most important thing is that this rule is set. Your own IP can avoid this rule. For example, you can set the address range to 192.168.1.2-192.168.1.253, and then set your own IP to 192.168.1.254, which is basically Can control the speed of others in all routers! Set the port segment to 20-65535. This editor is also inquiring online. I don't know why. Haha! ! Then it is to control the network speed. Here is a good control according to the size of your network cable, there is no need to set too dead. It's okay to be average! !



7. After setting, click OK! ! Then restart the router! ! You can restart the router directly in the system settings in the router settings page navigation! !


B) Settings on the computer

1. After setting the router, of course, you need your own IP to avoid this rule! Let's check our IP address and DNS first! This is helpful for setting up! Click "Start"-"Run"! Then enter CMD!



2. After clicking OK, enter the code in this black box: ipconfig / all and then remember your DNS address! !



3. Then right-click on Network Neighborhood-Properties! Then right click on Local Area Connection-Properties! Then the following picture will appear! Click Internet Protocol. Then click on properties! !


4. Then set a fixed IP. IP address setting needs to avoid your setting rules in the router! Then the gateway is the address set by your router! DNS is the address that CMD just came out! After entering, click OK! !

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁

πŸ¦‘CUSTOMIZE - CREATE YOUR OWN TERMUX USING THOSE TOOLS > oFFICIAL

> This project contains scripts and patches to build packages for the Termux Android application.

>The packages available here are only from main set. We have some additional repositories:

1) https://github.com/termux/game-packages

Game packages, e.g. angband or moon-buggy.

2) https://github.com/termux/science-packages

Science-related packages like gap and gnucap.

3) https://github.com/termux/termux-root-packages

Packages which can be used only on rooted devices. Some stuff available here requires custom kernel (like aircrack-ng or lxc).

4) https://github.com/termux/unstable-packages

Staging repository. Packages that are not stable are only available here.Most likely, new packages will also be placed here.

5) https://github.com/termux/x11-packages

Packages that require X11 Windows System.


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁


πŸ¦‘TOPIC TERMUX SCRIPTS
> WE ALREADY POST ALL USAGE AND TERMUX-LINUX POPULAR SCRIPTS THIS LIST MAY HELPS NEW TERMUX USERS Β» THIS SOURCE WIKI β€”

Termux App ⭐️
Android terminal and Linux environment - app repository.

Aidlearning Framework ⭐️
AidLearning build Linux environment running on the Android devices with GUI, Deep-Learning and Python Visual Programming support. Now support VSCode,Jupyter, pyToApk! One-click install.πŸš€

Termux Packages ⭐️
Android terminal and Linux environment - packages repository.

Hiddeneye ⭐️
Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services Android-Support-Available

Tool X ⭐️
Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.

Snoop ⭐️
Snoop β€” инструмСнт Ρ€Π°Π·Π²Π΅Π΄ΠΊΠΈ Π½Π° основС ΠΎΡ‚ΠΊΡ€Ρ‹Ρ‚Ρ‹Ρ… Π΄Π°Π½Π½Ρ‹Ρ… (OSINT world)

Hacktronian ⭐️
All in One Hacking Tool for Linux

Atilo ⭐️
Linux installer for termux

Termuxarch
You can use setupTermuxArch.bash πŸ“² to install Arch Linux in Amazon, Android, Chromebook and Windows. https://sdrausty.github.io/TermuxArch/docs/install
Anlinux App
AnLinux allow you to run Linux on Android without root access.

Gbt ⭐️
Highly configurable prompt builder for Bash, ZSH and PowerShell written in Go.

Termux Api ⭐️
Termux add-on app which exposes device functionality as API to command line programs.

Termux Adb ⭐️
Install ADB & FastBoot Tools in Termux!

Termux Archlinux ⭐️
You can use setupTermuxArch.bash to install Arch Linux in Termux on Amazon, Android, Chromebook and Windows. https://sdrausty.github.io/termux-archlinux/

Zphisher ⭐️
Automated Phishing Tool

Easyhack ⭐️
Hack the World using Termux

Bombers ⭐️
SMS/Email/Whatsapp bombers Collection πŸ’£

Gcc
termux ⭐️
Gcc for termux with fortran scipy etc... Use apt for newest updates instructions in README.txt

Termux Styling ⭐️
Termux add-on app for customizing the terminal font and color theme.

Hackerpro ⭐️
All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog

Telegram Scraper ⭐️
telegram group scraper tool. fetch all information about group members

Covid19 Tracker Cli ⭐️
A curl-based command line tracker for Novel Coronavirus or COVID-19 pandemic. It Supports terminal for linux and macos, command prompt for windows, and termux for android with real-time updates. curl -L covid19.trackercli.com

Lightnovel Crawler ⭐️
An app to download novels from online sources and generate e-books.

Buildapks ⭐️
Really quickly build APKs on handheld device (smartphone and tablet) in Amazon, Android, Chromebook, PRoot and WindowsπŸ“² See https://buildapks.github.io/docsBuildAPKs/setup to start building APKs.

Txtool ⭐️
an easy pentesting tool.

Termux Api Package ⭐️
Termux package containing scripts to call functionality in Termux:API.

Termux Boot ⭐️
Termux add-on app allowing programs to be run at boot.

Debian On Termux
HOWTO install plain Debian 10 (buster) on your non-rooted Android smartphone

Termux Style
Simple Program for customizing the termux font and color theme...

Andronixorigin
This is the official repository for the back end of the Andronix app πŸš€.
πŸ’£ Impulse Denial-of-service ToolKit

Proot
An chroot-like implementation using ptrace.

Termuxalpine
Use TermuxAlpine.sh calling to install Alpine Linux in Termux on
Android. This setup script will attempt to set Alpine Linux up in your Termux environment.

Anlinux Resources
Image and Script for LinuxOnAndroid App

Nexphisher

Hackapk
An Advanced Tool For Complete Apk-Modding In Termux ...

X11 Packages
Packages using the X Window System.

Termux Widget

Termux add-on app which adds shortcuts to commands on the home screen.

Termux Desktop
Setup A Beautiful Desktop/GUI In Termux

Termux.github.io


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁

πŸ¦‘WIKILEAKS DARKWEB- .ONION 2020 SITES
7/24 & 24/24 ONLINE

http://6sgjmi53igmg7fm7.onion/index.php?title=Main_Page –
Bugged Planet

http://faerieuaahqvzgby.onion/ – Fairie Underground

http://2r2tz6wzqh7gaji7.onion/ – Kavkaz Center

http://tnysbtbxsf356hiy.onion/ – The New Yorker Strongbox

http://duskgytldkxiuqc6.onion/ – Example rendezvous points page

http://rrcc5uuudhh4oz3c.onion/ – The Intel Exchange Forum :: Information and discussion on various topics, ranging from Illegal Activities and Alternative Energy, to Conspiracy Theories and Hacking. Same people from SnapBBS on a fully secure, moderated and categorized forum.

http://opnju4nyz7wbypme.onion/weblog/index.html – A7B blog :: a blog dedicated to the restoration of a limited constitutional republic in the USA

http://assmkedzgorodn7o.onion/ – Anonymous, safe, secure, crowdfunded assassinations.

http://duskgytldkxiuqc6.onion/comsense.html – Commo Sense by Thomas Paine

http://nwycvryrozllb42g.onion/ – Destination Unknown

http://zbnnr7qzaxlk5tms.onion/ – Wiki Leaks



▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁
πŸ‘1
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁

πŸ¦‘Warez DARKWEB- .ONION 2020 SITES
7/24 & 24/24 ONLINE


http://2gxxzwnj52jutais.onion/ – The Nowhere Server (restored from backup after FH)

http://jntlesnev5o7zysa.onion/ – The Pirate Bay – Torrents

http://am4wuhz3zifexz5u.onion/ – Tor Library – library of books and other media files

http://uj3wazyk5u4hnvtk.onion/ – The Pirate Bay – Torrents (official .onion)

http://doxbindtelxceher.onion/ – DOXBIN

http://wuvdsbmbwyjzsgei.onion/ – Music Downloads

http://lolicore75rq3tm5.onion/ – Lolicore and Speedcore Music

http://xfmro77i3lixucja.onion/ – ebooks

http://vt27twhtksyvjrky.onion/ – lol 20th Century Western Music Recordings and Scores

http://2ygbaoezjdmacnro.onion/ – Pony at Noisebridge

http://xfmro77i3lixucja.onion/ – Imperial Library of Trantor

http://c3jemx2ube5v5zpg.onion/ – Jotunbane’s Reading Club

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁
πŸ‘1
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁

πŸ¦‘ updated Dark Web OSINT Tool
Xd Some Noobs govs use this :

Dark Web OSINT Tool


πŸ¦‘ Features :
Onion Crawler (.onion).(Completed)
Returns Page title and address with a short description about the site.(Partially Completed)
Save links to database.(PR to be reviewed)
Get emails from site.(Completed)
Save crawl info to JSON file.(Completed)
Crawl custom domains.(Completed)
Check if the link is live.(Completed)
Built-in Updater.(Completed)
TorBot GUI(see branch frontend)
Social Media integration.(not Started) ...(will be updated)

πŸ¦‘OS Dependencies
Tor
Python 3.x
Golang 1.x (Not Currently Used)

πŸ¦‘Python Dependencies
beautifulsoup4
pyinstaller
PySocks
termcolor
requests
requests
mock
yattag

πŸ¦‘INSTALLISATION & RUN :

git clone https://github.com/DedSecInside/TorBot

cd TorBot

python3 torBot.py or use the -h -help argument

βœ…

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁
πŸ‘1
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁

πŸ¦‘Install Google Gadgets (Google Gadgets) on traditional Linux desktop

1) Google recently released the Linux version of Google Gadgets (Google Gadgets). Prior to this, Google Gadgets on the desktop released by Google only supports Windows and Mac. As a Linux desktop user, why not try this beautiful and useful Google gadget (Google Gadgets) launched by Google? Currently, Google only releases the source package of Google Gadgets (Google Gadgets), which we can only install by compiling. Whether you are a GNOME user or a KDE user, you can install Google Gadgets (Google Gadgets) on your Linux desktop. Let ’s install Google Gadgets on your Linux desktop with OwnLinux!

2) Download and unzip Google Gadgets (Google Gadgets)

Google Gadgets (Google Gadgets) is published on Google as a compressed package in .tar.gz format, you need to unzip it after downloading.from google or here
> CLICK HERE
3) Install dependent environment required for compilation

4) Open the terminal and enter the following code

> sudo apt-get -y install libtool automake autoconf libxul-dev libghc6-mozembed-dev libcurl4-gnutls-dev libxml2-dev zlib1g-dev xulrunner xulrunner-1.9-dev libgtk2.0-dev libcairo2-dev libdbus-1-dev libdbus-glib-1-dev libgstreamer0.10-dev libgstreamer-plugins-base0.10-dev libqt4-dev


5) Configure compile and install Google Gadgets (Google Gadgets)

6) Open the terminal and enter the following codes in sequence

7) ./configure --prefix=/usr
make
sudo make install


8) Run Google Gadgets (Google Gadgets)

If all goes well, you can run Google Gadgets (Google Gadgets). Use ALT + F2 to bring up the "run application" GNOME user input ggl-gtk, KDE user input ggl-qt, so that you can start the Google Gadgets (Google Gadgets) application.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁

πŸ¦‘SOME DEFINITIONS IMPORTANT +HOW THEY ATTACK API βœ…

A) User Spoofing

> User spoofing is when an attacker pretends to be someone they’re not. Often, the attacker will attempt to portray themselves as a trusted user in order to pivot to additional users, allowing them free access to data and the ability to deal more damage without being readily discovered. These attacks often use data discovered through phishing or other such credential leaks in order to prevent other alarms, such as those found in reverse engineering, from going off.

> Once the attacker has broached the system, the attack often attempts to inject some sort of privilege escalation attack by directing URI functions to other URIs (as is the case in media encoding APIs), inserting code acting as text (as in the case of translation APIs), or just flooding APIs with more data that it can handle, forcing an overflow failure.

B) MITM OR Man in the Middle Attack

> In this type of attack, the attacker will pose as an element either in the chain of communication to the server, or the server itself. The attacker’s aim here is to act as if they are some trusted link in the API chain, intercepting data either for morphing or offloading.

>Sometimes, this attack can be done by squatting on a domain that is similar to the API URI scheme and copying the format of the API request/resource location (or at least, making it seem the same). In this case, a user might be requesting a call using a resource located at API.io/media/function, and a squatter might sit on APO.io/media/function. A single character’s difference could make all the difference in the world, and open up the requester to the reality of sending their credentials to the wrong server.

C) Session Replays

> Session replays are specifically against websites and other systems that generate and store sessions. While proper RESTful design should not deal with state, that’s not always the reality of the situation – many APIs, whether for valid reasons or not, have state as part of their core flow, even if they call themselves
> β€œRESTful”. When sessions are part of the equation, this type of attack is designed to capture the session, and replay it to the server. In effect, the attacker is rewinding time and forcing the server to divulge data as if the same interaction is occurring once more.

D) Social Engineering
While this is not in and of itself technically an β€œAPI hack”, it directly affects the API. Social engineering is attacking not the machine code and the API itself, but the weakest element of all – the human element. Humans are fallible, and they can be tricked – often very easily. Social engineering takes advantage of this in a multitude of ways.

>Phishing is the process of sending out mass contact to known users, often using cleverly crafted emails providing links to reset a password or validate a security incident. The catch is that these links aren’t real, and instead result in the attacker grabbing credentials. Spear phishing is much the same but focuses on one high-value target, often providing additional data, typically stolen in some sort of security incident, to instill trust in the user that the communication is indeed valid.

this postispoweredbywiki
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁
This media is not supported in your browser
VIEW IN TELEGRAM