UNDERCODE COMMUNITY
2.72K subscribers
1.24K photos
31 videos
2.65K files
84K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
upload (i, fileMd5Value, file) {
const { uploadProgress, chunks } = this
return new Promise((resolve, reject) => {
let { chunkSize } = this
////FormData HTML5
let end =
(i + 1) * chunkSize >= file.size ? file.size : (i + 1) * chunkSize
let form = new FormData()
form.append('data', file.slice(i * chunkSize, end)) //
form.append('total', chunks) //
form.append('index', i) //
form.append('fileMd5Value', fileMd5Value)
services
.uploadLarge(form)
.then(data => {
if (data.ok) {
this.hasUploaded++
uploadProgress(file)
}
console.log({ data })
resolve(data)
})
.catch(err => {
reject(err)
})
})
}
5. Upload progress

Although the bulk upload of shards is much faster than the single upload of large files, there is still a period of loading time. At this time, a prompt of the upload progress should be added to display the progress of the file upload in real time.

The native Javascript XMLHttpRequest provides a progress event, which returns the uploaded size and total size of the file. Project uses axios of ajax encapsulated may increase in the config onUploadProgressmethod, monitor file upload progress.
const config = {
onUploadProgress: progressEvent => {
var complete = (progressEvent.loaded / progressEvent.total * 100 | 0) + '%'
}
}
services.uploadChunk(form, config)
6. Merge shards

After uploading all the file fragments, the front end actively informs the server to merge. When the server receives this request, it actively merges the slices and finds the folder with the same name in the file upload path of the server through the file MD5. As can be seen from the above, the file fragments are named according to the fragment sequence number, and the fragment upload interface is asynchronous, and there is no guarantee that the slices received by the server are spliced ​​in the order requested. So it should be before the segment file merge folder, and sorted according to file name, and then by concat-filesmerging fragmented files get uploaded files from users. So far, the large file upload is complete.
exports.merge = {
validate: {
query: {
fileName: Joi.string()
.trim()
.required()
.description(
md5: Joi.string()
.trim()
.required()
.description(md5'),
size: Joi.string()
.trim()
.required()
.description('文仢倧小'),
},
},
permission: {
roles: ['user'],
},
async handler (ctx) {
const { fileName, md5, size } = ctx.request.query
let { name, base: filename, ext } = path.parse(fileName)
const newFileName = randomFilename(name, ext)
await mergeFiles(path.join(uploadDir, md5), uploadDir, newFileName, size)
.then(async () => {
const file = {
key: newFileName,
name: filename,
mime_type: mime.getType(${uploadDir}/${newFileName}),
ext,
path: ${uploadDir}/${newFileName},
provider: 'oss',
size,
owner: ctx.state.user.id,
}
const key = encodeURIComponent(file.key)
.replace(/%/g, '')
.slice(-100)
file.url = await uploadLocalFileToOss(file.path, key)
file.url = getFileUrl(file)
const f = await File.create(omit(file, 'path'))
const files = []
files.push(f)
ctx.body = invokeMap(files, 'toJSON')
})
.catch(() => {
throw Boom.badData
})
},
}
πŸ¦‘ to sum up

This UNDERCODE expert tutorial @undercodetesting
@undercodecourses

describes some of the practices for optimizing the upload of large-format files. It is summarized as the following 4 points:

1) ob.slice slices the file and uploads multiple slices concurrently. After all slices are uploaded, the server is notified to merge to realize the large file slice upload;

2) The native XMLHttpRequest onprogress monitors the upload progress of the slice and obtains the file upload progress in real time;

3) spark-md5 calculates the file MD5 according to the content of the file, gets the unique identifier of the file, and binds it to the file upload status;

4) Before uploading the slices, check the uploaded slice list through the file MD5. Only the slices that have not been uploaded are uploaded during the upload to realize the resuming of the breakpoint.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ This expert tut is written by undercode
> don't clone our tutorials
> support & share
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hack news by Undercode :

For security reasons, OpenSSH announced to abandon support for SHA-1 authentication scheme

1) OpenSSH is one of the most popular tools for connecting and managing remote servers. Recently, the team announced plans to abandon support for the SHA-1 authentication scheme. OpenSSH cited the security problems in the SHA-1 hash algorithm in the announcement, which is considered insecure in the industry. The algorithm was cracked by Google cryptography experts in February 2017 and can use SHAttered technology to sign two different files with the same SHA-1 file.

2) However, creating a SHA-1 collision at that time was considered to be very expensive. Therefore, Google experts believe that SHA-1 needs to wait at least half a year in real life until the cost further decreases. Later in the research reports released in May 2019 and January 2020, an updated method was introduced in detail to reduce the cost of the SHA-1 selection-prefix collision attack to less than $ 110,000 and less than $ 50,000.

3) For national-level and high-end cybercrime groups, let them generate an SSH authentication key, so that they can remotely access key servers without being detected, then the price of $ 50,000 is very small. The OpenSSH developer said today: "For this reason, we will disable the 'ssh-rsa' public key signature algorithm by default in a near future version."
4) The OpenSSH application uses the "ssh-rsa" mode to generate SSH authentication keys. One of these keys is stored on the server that the user wants to log in to, and the other is stored in the user's local OpenSSH client, so that the user can access the server without entering a password each time they log in, but authenticates locally Key instead of login.

5) By default, OpenSSH ssh-rsa mode generates these keys by using the SHA-1 hash function, which means that these keys are vulnerable to SHAterred attacks, enabling threat actors to generate duplicate keys. OpenSSH developers said today: "Unfortunately, despite the existence of better alternatives, this algorithm is still widely used, and it is the only remaining public key signature algorithm specified by the original SSH RFCs."

6) The OpenSSH team now requires server owners to check whether their keys have been generated using the default ssh-rsa mode and use different modes to generate new keys. The OpenSSH team stated that the recommended modes are rsa-sha2-256 / 512 (supported since OpenSSH 7.2), ssh-ed25519 (supported since OpenSSH 6.5) or ecdsa-sha2-nistp256 / 384/521 (supported since OpenSSH 5.7) .

@UndercodeTesting
Future new chan @UndercodeNews
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘New updates in sniper tool
T.me/UndercodeTesting


> Automated pentest framework for offensive security experts

πŸ¦‘FEATURES :

Automatically collects basic recon (ie. whois, ping, DNS, etc.)

Automatically launches Google hacking queries against a target domain

Automatically enumerates open ports via NMap port scanning

Automatically exploit common vulnerabilities

Automatically brute forces sub-domains, gathers DNS info and checks for
zone transfers

Automatically checks for sub-domain hijacking

Automatically runs targeted NMap scripts against open ports

Automatically runs targeted Metasploit scan and exploit modules

Automatically scans all web applications for common vulnerabilities

Automatically brute forces ALL open services

Automatically test for anonymous FTP access

Automatically runs WPScan, Arachni and Nikto for all web services

Automatically enumerates NFS shares

Automatically test for anonymous LDAP access

Automatically enumerate SSL/TLS ciphers, protocols and vulnerabilities

Automatically enumerate SNMP community strings, services and users

Automatically list SMB users and shares, check for NULL sessions and
exploit MS08-067

Automatically tests for open X11 servers

Performs high level enumeration of multiple hosts and subnets

Automatically integrates with Metasploit Pro, MSFConsole and Zenmap for reporting

Automatically gathers screenshots of all web sites

Create individual workspaces to store all scan output

Scheduled scans (https://github.com/1N3/Sn1per/wiki/Scheduled-Scans)

Slack API integration (https://github.com/1N3/Sn1per/wiki/Slack-API-
Integration)

Hunter.io API integration (https://github.com/1N3/Sn1per/wiki/
Hunter.io-API-Integration)

OpenVAS API integration (https://github.com/1N3/Sn1per/wiki/OpenVAS-Integration)

Burpsuite Professional 2.x integration (https://github.com/1N3/Sn1per/wiki/Burpsuite-Professional-2.x-Integration)

Shodan API integration (https://github.com/1N3/Sn1per/wiki/Shodan-Integration)

Censys API integration (https://github.com/1N3/Sn1per/wiki/Censys-API-Integration)

Metasploit integration (https://github.com/1N3/Sn1per/wiki/Metasploit-Integration)


πŸ¦‘fOR THIS REASON some hackers clone a part from this script and upload to giyhub under their names...jajaj


πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) Download https://raw.githubusercontent.com/1N3/Sn1per/master/Dockerfile

2) docker build -t sn1per .

3) docker run -it sn1per /bin/bash

or

> docker pull xerosecurity/sn1per

>docker run -it xerosecurity/sn1per /bin/bash

βœ…βœ…@undercodeTesting

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Google launches dedicated website to help people avoid online scams

1) Google announced a website on Thursday to teach people how to detect and avoid online scams because digital scams have reached a climax in the case of a coronavirus pandemic. This is named Scamspotter.org websites trying to show people how to recognize false medical examinations, fake vaccine offers or other false medical information. The site also highlights some typical scam patterns, such as love scammers asking target people to send them money or buy them gift cards.

2) Google launched this site in partnership with the Cybercrime Support Network, a nonprofit organization dedicated to helping victims of cyber fraud. The site includes a small quiz that uses common scam scenarios, such as receiving a message about winning a trip to Hawaii, and uses this quiz to test users' ability to fight fraud.

3) Google said that this work was carried out under the circumstance that scammers took advantage of the new crown epidemic at an β€œastonishing speed”. Americans have lost more than $ 40 million due to COVID-19 related scams. The Federal Trade Commission predicts that this year, the amount of coronavirus-related or other fraud losses will exceed 2 billion US dollars.

> source twitter.com/UndercodeNews
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘LIVE CC βœ…βœ…


LIVE CCN , IP US, ZIP 10010 or 10080
NEED GOOD BROWSER AND VPN

. 4266841632836688|07|2023|208 CCN Correct
. 4266841632325278|07|2022|364 CCN Correct
. 4266841632267132|05|2022|857 CCN Correct
. 4266841632136451|03|2022|072 CCN Correct
. 4266841632517858|04|2024|465 CCN Correct
. 4266841632111587|08|2022|106 CCN Correct
. 4266841632708630|08|2023|636 CCN Correct
. 4266841632740401|07|2022|304 CCN Correct
. 4266841632224810|12|2025|677 CCN Correct
. 4266841632146666|05|2025|626 CCN Correct
. 4266841632268387|06|2024|531 CCN Correct
. 4266841632802417|12|2023|204 CCN Correct
. 4266841632483564|02|2023|010 CCN Correct
. 4266841632086243|06|2025|006 CCN Correct
. 4266841632200562|01|2024|886 CCN Correct
. 4266841632275234|09|2024|704 CCN Correct
. 4266841632285001|03|2023|588 CCN Correct
. 4266841632675250|12|2025|564 CCN Correct
. 4266841632063762|12|2025|171 CCN Correct
. 4266841632867865|01|2025|556 CCN Correct
. 4266841632517502|01|2023|627 CCN Correct
. 4266841632515035|10|2025|472 CCN Correct
. 4266841632514517|11|2023|152 CCN Correct
. 4266841632518385|07|2022|231 CCN Correct
. 4266841632514434|10|2024|335 CCN Correct
. 4266841632510440|09|2024|084 CCN Correct
. 4266841632516520|07|2022|235 CCN Correct
. 4266841632510432|08|2023|500 CCN Correct
. 4266841632516363|12|2025|646 CCN Correct
. 4266841632514517|10|2023|638 CCN Correct

βœ…βœ…verified
those not by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁