UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
πŸ¦‘12 Best Laravel Helpers
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘#Linux Kernel Exploitation Tutorial :

* [01.Stack smashing(32bit) & Return-to-user(ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=23789706)


* [02.Stack smashing(64bit) & Return-to-user(ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=25624684)


* [03.Stack smashing(64bit) & ROP](https://www.lazenca.net/pages/viewpage.action?pageId=25624746)


* [04.Write-what-where(Arbitrary Memory Overwrite)(feat.ret2usr)](https://www.lazenca.net/pages/viewpage.action?pageId=25624658)


* [05.Null pointer dereference(32bit & 64bit)](https://www.lazenca.net/pages/viewpage.action?pageId=25624632)


* [06.Use-After-Free(UAF) (feat.struct cred)](https://www.lazenca.net/pages/viewpage.action?pageId=25624864)


* [07.Use-After-Free(UAF) (feat.tty_struct)](https://www.lazenca.net/pages/viewpage.action?pageId=29327365)


* [08.ret2dir(return-to-direct-mapped memory)](https://www.lazenca.net/pages/viewpage.action?pageId=25624881)

πŸ¦‘Kernel Self-Protection

* [01.Kernel Address Space Layout Randomization (KASLR)](https://www.lazenca.net/pages/viewpage.action?pageId=25624857)

* [02.Segregation of kernel memory from userspace memory(x86's SMEP/SMAP, ARM's PXN/PAN)](https://www.lazenca.net/pages/viewpage.action?pageId=25624859)


@undercodeTesting
@UndercodeHacking
@Undercodesecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
BEST PAID NEW BOOKS FOR LEARN HACKING
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Python black hat programming 3.5 DTP attack

1) Dynamic Trunking Protocol DTP (Dynamic Trunking Protocol) is a Cisco proprietary protocol. DTP is used for the directly connected Layer 2 ports of two switches to detect the configuration of the opposite end, and automatically negotiate the link type of the Layer 2 port and Ethernet protocol encapsulation to adapt to the opposite end. In this way,

2) when the peer device is modified, there is no need to manually modify the local configuration, and it can be changed adaptively through the protocol. The important role of DTP is that plug and play can be realized when the network is uncertain; when modifying the network topology, there is no need to manually modify the configuration of the second layer port.

3) DTP uses the second layer of relay frames to communicate between the directly connected ports of two switches. DTP packets are limited to the communication between two directly connected ports, maintaining the link type and Ethernet encapsulation type of the two directly connected ports

4) If the switch is enabled with the DTP protocol, the attacker will pretend to be the switch and send Dynamic desirable packets to the target switch , then the target port will be turned into a trunking port, which means that we can enter any VLAN by modifying the configuration of the machine , and at the same time we can use 3.4 The method of this section performs VLAN hopping attacks and monitors all data.

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Python black hat programming 3.5 DTP attack

1) Dynamic Trunking Protocol DTP (Dynamic Trunking Protocol) is a Cisco proprietary protocol. DTP is used for the directly connected Layer 2 ports of two switches to detect the configuration of the opposite end, and automatically negotiate the link type of the Layer 2 port and Ethernet protocol encapsulation to adapt to the opposite end. In this way,

2) when the peer device is modified, there is no need to manually modify the local configuration, and it can be changed adaptively through the protocol. The important role of DTP is that plug and play can be realized when the network is uncertain; when modifying the network topology, there is no need to manually modify the configuration of the second layer port.

3) DTP uses the second layer of relay frames to communicate between the directly connected ports of two switches. DTP packets are limited to the communication between two directly connected ports, maintaining the link type and Ethernet encapsulation type of the two directly connected ports

4) If the switch is enabled with the DTP protocol, the attacker will pretend to be the switch and send Dynamic desirable packets to the target switch , then the target port will be turned into a trunking port, which means that we can enter any VLAN by modifying the configuration of the machine , and at the same time we can use 3.4 The method of this section performs VLAN hopping attacks and monitors all data.
Forwarded from WEB UNDERCODE - PRIVATE
After the data packet is sent, there will be some delay to take effect.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘NETWORK ATTACK TIPS BY UNDERCODE :

> TCP/IP is the core of the entire network protocol system, because from here on, data transmission has moved from the local area network to the vast Internet, program is also capable of processing data from the Internet, and can directly attack and test hosts on the Internet. .

> Still an old saying, I hope you will learn the protocol in depth, practice packet analysis through packet capture tools, and understand the protocol through examples :

A)
1)) PRINCIPLES OF SNIFFING AND SNIFFER

Sniffing is a comprehensive concept that involves the second layer we talked about before and the application layer that we will talk about in the future. Data sniffing is a way of passive attack. It extracts the required information by analyzing the data flowing through the local network card.

2) According to different network types, we may have to combine ARP spoofing /DNS spoofing to get the data of the target host we want.

3) Sniffer is a tool used to obtain and analyze data. There are many such tools on the Internet. Our focus is on the principles and coding implementation of these tools.

B) IP POISONING ATTACK AND FLOOD ATTACK

1) The previous ARP poisoning attack is similar. IP poisoning is to construct fake IP data packets and use fake IP addresses to attack or hide yourself.

2) At this layer, we can construct various data packets to flood the devices on the Internet, such as SYN floods and connection flood attacks of various protocols.

C) PORT SCANNING AND SERVICE DETECTION
zmap and nmap are our commonly used port scanning and service detection programs. We also know that there are many different implementation techniques for port scanning, from simple full connections to half-open connections. It is said that zmap can scan the entire Internet in one hour . What advanced technology does it use? I will reveal the secrets for you one by one here on undercode testing :

D) SESSION HIJACKING

1) "Hijacking" is a very important concept. Only by intercepting the flow of data can we have the opportunity to tamper with data and forge normal conversations. The goal of common sessions is the data concept of the application layer, but hijacking is done at the transport layer.

2) We will see practical examples of how to implement session hijacking and data tampering through programming.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TCP port scanning is generally divided into the following types:

1) TCP connect scan: also known as full connection scan, this method directly connects to the target port and completes the TCP three-way handshake process. The scan result of this method is more accurate, but the speed is slower and can be easily detected by the target system.

2) TCP SYN scanning: also called semi-open scanning, this method will send a SYN packet, start a TCP session, and wait for the target to respond to the data packet. If a RST packet is received, it indicates that the port is closed, and if a SYN/ACK packet is received, it indicates that the corresponding port is open.

3) Tcp FIN scanning: In this way, a FIN packet indicating the teardown of an active TCP connection is sent, and the other party closes the connection. If a RST packet is received, it indicates that the corresponding port is closed.

4) TCP XMAS scanning: This method sends packets with PSH, FIN, URG, and TCP flags set to 1. If a RST packet is received, it indicates that the corresponding port is closed.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Drupal_ Reverseshell.pdf
669.6 KB
Remote Code Execution: Remote Code Evaluation is a vulnerability that occurs because of the unsafe handling of inputs by the server application or that can be exploited if user input is injected into a File or a String and executed by the programming language’s parser or the user input is not sanitised properly in POST request and also when accepting query string param during GET requests.