UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
COMMANDS INSIDE THE PICTURE
5️⃣Airbase-ng is a multi-purpose tool designed to attack customers, not access points. It can be used to capture half-handshakes, the attack algorithm is as follows: Airbase-ng looks at which access points clients are looking for (for example, a cell phone with Wi-Fi enabled) and creates an access point with this name; the client tries to connect to this fake access point, as a result, half the handshake is captured, which is suitable for cracking the password from a true Wi-Fi network.

>< https://kali.tools/?p=2377

6️⃣WPA2-HalfHandshake-Crack is a working concept to demonstrate the possibility of hacking a WPA2 network by grabbing a handshake from a user trying to connect to a fake AP. Those. grabs a half handshake.


> https://kali.tools/?p=2794

7️⃣zizzania automates handshake capture for all access points within reach.


https://kali.tools/?p=1075
8️⃣Wi-Fi frame injection
Aireplay-ng is used to inject frames. Very often deauthentication is used to attack, the meaning of which is that they are sent, frames due to which clients are disconnected from the access point; after that, clients reconnect to their access point, as a result of which the attacker has the opportunity to grab a handshake.

>https://kali.tools/?p=483

9️⃣boopstrike - a program from the BoopSuite package for performing deauthentication attacks.

>https://kali.tools/?p=3409
COMMANDS INSIDE
πŸ¦‘πŸ”ŸHacking passwords from handshakes and WEP
Hashcat is the universal and fastest password cracker. Among others, it also can crack a password from Wi-Fi networks. The fastest thing is that it simultaneously uses video cards and a central processor to sort through possible password options.

> https://kali.tools/?p=578
enjoyβ€οΈπŸ‘πŸ» wifi hacking methodes & usage kali-parrot tools :


90 % OF GITHUB SCRIPTS clone a BIG PARTS FROM THOSE TOP 10 WIFI HACKING TOOLS :)
(except Fluxion/wifiphisher..)
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Global Spam Settings
#foradvancedusers

>g_from_allow_ip – IP addresses to bypass local from check
This setting has no further documentation currently available

Syntax: g_from_allow_ip string

>g_from_allow_to – destination user to bypass local from check
This setting has no further documentation currently available

Syntax: g_from_allow_to string

>g_from_bl – Domain Based Blacklist Zones, lookups FROM domain in dns
The β€˜from’ domain is checked against the specified RBL which must be a special β€˜FROM’ based rbl which lists spammers by from address. Most spammers fake from addresses so this is a fairly marginally useful method.

Syntax: g_from_bl name=string stamp=string

>g_from_body_bounce – Reject if local from header address is probably faked
Checks if the sender is authenticated or from an address that can relay, if not then the message is bounced if it claims to be from a local domain. One of the settings to prevent forgery

Syntax: g_from_body_bounce bool

>g_from_bounce – Bounce if from is probably faked
Bounce if from address is probably faked.

This check is activated for any mail with a local domain in the from address but not using SMTP authentcation, relay allow IP address or spam allow IP address.

Syntax: g_from_bounce bool

>g_from_check – Check from matches valid local domain
Check from domains match valid local domains if user is authenticated, or

>g_from_allow.Should be used with g_from_bounce β€œtrue” which basically forces them to authenticate and then makes this setting work properly.

Syntax: g_from_check bool

>g_from_domain – Default domain for from envelope
Fixes the β€˜from’ envelope if the email client failed to specify a domain name, this doesn’t fix the from header currently but we may change that in future!

Syntax: g_from_domain string

>g_from_exact – Check from matches authenticated user
Check from matches authenticated user. If user is not authenticated the setting is skipped.

Should be used with g_from_bounce β€œtrue” which basically forces them to authenticate and then makes this setting work properly.

Syntax: g_from_exact bool

>g_from_force – From address for all sent messages
Used when you want to make all messages use the same valid bounce address, reply-to header will contain original from if it doesn’t exist

Syntax: g_from_force string

>g_from_header – From header used in delivery bounces
From header used in delivery bounces.

Syntax: g_from_header string

>g_from_list_too – Also enforce from rules from lists
Doesn’t allow lists to bypass forge rules

Syntax: g_from_list_too bool

>g_from_must_exist – Require local from addresses to exist or reject mail
Can be useful in blocking dumb spam robots

Syntax: g_from_must_exist bool

>g_from_noforge – If envelope or from is local domain then the other must be too
This can prevent many common forms of forgery, this will bounce some real email, so probably better to use the noforgeme setting instead. One of the settings to prevent forgery

Syntax: g_from_noforge bool

>g_from_noforge_some – If from matches this then from/envelope must match
Prevent forgeries of important local addresses, e.g. *support*

Syntax: g_from_noforge_some string

> g_from_noforgeme – If to==from then from and env from must match
This can prevent many common forms of forgery, this is safer than the noforge setting above, and generally almost as effective. One of the settings to prevent forgery

Syntax: g_from_noforgeme bool

> g_from_noforgename – If from contains two addresses the domains must match
Prevents forgery where the descriptive name is a fake email address that doesn’t match the real address

Syntax: g_from_noforgename bool

> g_from_nofriend – If forge setting would bounce message then allow message but don’t allow friend match
This setting modifies the g_from_noforgeme behaviour so it doesn’t block the message but does prevent a friend match occurring

Syntax: g_from_nofriend bool


@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘powerful Dos tool for Termux-linux:
> The main difference from Python version layed in Golang architecture for concurrency: the goroutines. hulk.py runs a new thread for each connection in the connection pool so it uses hundreds and thousands of threads. hulk.go just uses lightweight goroutines that used only tens of threads (commonly golang runtime started one thread for CPU core + several service threads). This architecture allows golang version better consume resources and got much higher connection pool on the same hardware than Python version can.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣git clone https://github.com/grafov/hulk.git

2️⃣cd hulk

3️⃣python hulk.py

4️⃣Examples :

1) $ hulk -site http://example.com/test/ 2>/dev/null

2) $HULKMAXPROCS=4096 hulk -site http://example.com 2>/tmp/errlog

πŸ¦‘ Notes :

> GOMAXPROCS Set it to number of your CPUs or higher (no more actual for latest golang versions).

> HULKMAXPROCS Limit the connection pool (1024 by default).


Enjoy β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁