UNDERCODE COMMUNITY
2.71K subscribers
1.24K photos
31 videos
2.65K files
83.3K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
πŸ¦‘DoS protection:Tips To prevent attack

> organizations can use the following strategies to protect themselves from denial of service attacks.

1) Attacks such as SYN flooding exploited vulnerabilities in the operating system. Installing security patches can help reduce the possibility of such attacks.

2) Intrusion detection systems can also be used to identify or even stop illegal activities

3) The firewall can block all traffic from the attacker by identifying its IP, thereby preventing simple DoS attacks.

4) You can configure the router through the access control list to restrict access to the network and discard suspicious illegal traffic.

5) cloudflare

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘For this example, we use mobile broadband connection details. Write down the IP address. Note: In order to make this example more effective, you must use a LAN network. Switch to the computer to be used to attack and open a command prompt
us to use the unlimited data package 65500 ping victim computer
, enter the following command

1) ping 10.128.131.108 -t | 65500
here,
2) "Ping" sends the packet to the victim
3) "10.128.131.108" is the victim's IP address
4) "-T" indicates that the packet should be sent before the program stops
5) "-L" specifies the data payload to be sent to the victim
You will get a result similar to the one shown below
πŸ¦‘Flooding the target computer with packets does not have much impact on the victim. To make the attack more effective, you should use ping from multiple computers to attack the target computer.

1) The above attacks can be used to attack routers, web servers, etc.

2) If you want to view the impact of the attack on the target computer, you can open the task manager and view the network activity.

3) Right click on the taskbar

4) Select Start Task Manager

5) Click the Network tab

6) You will get results similar to the following
πŸ¦‘1) The purpose of denial of service attacks is to deny legitimate users access to resources such as networks and servers.

2) There are two types of attacks, denial of service and distributed denial of service.

3) You can use SYN Flooding, Ping of Death, Teardrop, Smurf or buffer overflow to perform a denial of service attack

4) Operating system, router configuration, firewall and intrusion detection system security patches can be used to prevent denial of service attacks.

written @Undercoder
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘x900 Hulu Premium Accounts :


pastebin.com/h1eXJqVY
> non cracked by us
> send screanshoats @Undercode_bot after login
> total verified accounts X 700
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Efficient configuration of Linux proxy server-Squid :

A) proxy services

1) agency services refers to other hosts on by a machine with standard IP address instead of the IP address is no standard number of machines and the Internet dealing with the provision of agency services this machine called proxy server.

2) When a machine with an internal address wants to connect to the Internet, it first sends the request to a proxy server with a standard IP address, and the proxy server sends the request to the destination address of the request through its standard IP address.

3) Then the server at the target address sends the returned result back to the proxy server, and the proxy server sends the data to the internal host intact. Several machines with internal addresses form an internal network. The role of the proxy server is to communicate the internal network and the Internet and solve the problem of the internal network accessing the Internet.

4) This kind of proxy is irreversible. Hosts on the Internet cannot access any machine with an internal address, which can ensure the security of internal data.

5) An advantage of the agent software is that it can inspect many things other than data packets. Squid checks the payload of the data packet, that is, the portion of the TCP (or UDP) portion of the data packet that traverses the firewall. Based on the information in the packet header (the IP part of the packet) and the packet payload (TCP part), the proxy firewall can decide where the packet will be sent, what the packet requests, and what must be provided based on the packet Information determines what action to take.

6) For Web users, Squid is a high-performance proxy cache server, which can speed up the speed of intranet browsing the Internet and improve the hit rate of client access. Squid not only supports the HTTP protocol, but also supports protocols such as FTP, gopher, SSL, and WAIS. Unlike common proxy caching software, Squid uses a single, non-modular, I / O-driven process to handle all client requests.

7) Squid caches data elements in memory and caches DNS search results. In addition, it also supports non-modular DNS queries to passively cache failed requests. Squid supports SSL and access control. Because of the use of ICP, Squid can implement overlapping proxy arrays, thereby maximizing bandwidth savings.
Squid is composed of a main service program Squid, a DNS query program dnsserver, several rewriting requests and performing authentication procedures, and several management tools. When Squid is started, it can spawn a specified number of dnsserver processes, and each dnsserver process can perform a separate DNS query, which greatly reduces the time the server waits for DNS queries.

8) Another advantage of Squid is that it uses access control lists (ACL) and access permission lists (ARL). Access control lists and access permission lists reduce potential Internet illegal connections by blocking specific network connections. These lists can be used to ensure that hosts on the intranet cannot access threatening or inappropriate sites

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘There are two ways to
compile and install the Squid
squid software package: one is the rpm package used by RedHat, and the other is the source code package.


πŸ¦‘Installation of rpm package:


1. Enter / mnt / cdrom / RedHat / RPMS.
2. Run rpm -ivh squid-2.2.STABLE4-8.I386.rpm.
Installation of source code package:
1. Download squid-2.2.STABLE4-src.tar.gz from http://www.squid-cache.org.
2. Copy the file to the / usr / local directory.
3. Unzip the file tar xvzf squid-2.2.STABLE4-src.tar.gz, generate a new directory squid-2.2.STABLE4 in the / usr / local directory, in order to facilitate the use of mv squid-2.2.STABLE4 squid rename the directory squid. .
4. Enter the Squid directory.
5. Execute ./configure, you can use ./configure -prefix = / directory / you / want to specify the installation directory. The system default installation directory is / usr / local / squid.
6. Run make all.
7. Run make install.
8. After the installation is complete, the Squid executable file is in the bin subdirectory of the installation directory, and the configuration file is in the etc subdirectory.
Configure the squid
configuration file squid.conf
Squid has a main configuration file squid.conf, located in the / etc / squid directory, users only need to modify the configuration file.

πŸ¦‘only -|anonymous hackers do this xd :)

WRITTEN BY
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘MORE FOR squid


The squid.conf configuration file is divided into 13 parts, namely:
1. NETWORK OPTIONS (related network options)

2.OPTIONS WHICH AFFECT THE NEIGHBOR SELECTION ALGORITHM (relevant options for the neighbor selection algorithm)

3. OPTIONS WHICH AFFECT THE CACHE SIZE (define cache size option)

4.LOGFILE PATHNAMES AND CACHE DIRECTORIES (define the log file path and cache directory)

5.OPTIONS FOR EXTERNAL SUPPORT PROGRAMS (external support program options)

6.OPTIONS FOE TUNING THE CACHE (Adjust cache option)

7. TIMEOUTS (Timeout)

8. ACCESS CONTROLS (Access Control)

9.ADMINISTRATIVE PARAMETERS (Management parameters)

10. OPTIONS FOR THE CACHE REGISTRATION SERVICE (cache
registration service option)

11. HTTPD-ACCELERATOE OPTIONS (HTTPD acceleration option)

12. MISCELLANEOUS (Miscellaneous)

13. DELAY POOL PARAMETERS (delay pool options)
WRITTEN BY
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
For Any Suggessions or any Missed Tutorials,... leave a message @UndercodePosts
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Researchers detect StrandHogg 2.0 vulnerability in low version systems such as Android 9.0 ☠️

1) Promon researchers have just exposed a StrandHogg 2.0 privilege escalation vulnerability that affects low-level systems such as Android 9.0. If it is used by a hacker, all users' applications will be tainted by it. Promon notified Google of the CVE-2020-0096 security vulnerability, and the search giant has been downgraded to "critical". Fortunately, the vulnerability has not been widely exploited in the wild. But after today ’s disclosure, tens of millions of Android device users will become more vulnerable.

2) The Promon announcement pointed out that the vulnerability allowed malicious applications to obtain an assumed legal identity while completely hiding themselves.

3) Once a malicious application is installed on the device, users can be infected with personal data such as text messages, photos, login credentials, tracking GPS movements, call logs, and listening to users through cameras and microphones.


πŸ¦‘Promon said that Google had received the vulnerability disclosure notice on December 4, 2019, which means that the search giant has five months to fix the vulnerability before it is exposed to the public

4) It should be noted that StrandHogg 2.0 is more complex than the first-generation vulnerabilities, making it difficult to be detected by anti-virus and security scanners.

5) End users need to be careful not to install Android apps from untrusted sources that are never known, so as not to be affected by such malicious attacks.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ WIth this android 9.0 bug-andd many others cve
> we already tracked many -|anonymous hackers πŸ˜ƒ
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Domain information mining architecture based on graph embedding

1) Based on massive security big data, undercode has in-depth research in knowledge graph, graph calculation and other aspects. In the application of graph neural network, the embedding and determination of domain name nodes based on multiple types of graph structures are realized.

2) The following figure is the main structure currently embedded in the domain name intelligence map. First of all, according to the relationship between the domain name and other entities, construct a homogenous relationship diagram of the domain name, then train the graph embedding representation of the domain name based on the graph embedding technology, and finally, according to the specific needs, combine other dimensions of data to achieve the corresponding tasks.

3) The embedding implementation of the homogeneous domain name map based on the sample download relationship is described in detail below :