UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Mac malware spreads and exploits vulnerabilities in WebKit and Data Vault through the Xcode project
Forwarded from UNDERCODE NEWS
NSA and FBI jointly reveal Drvorub, a malicious Linux system built in Russia
Forwarded from UNDERCODE NEWS
Reports reveal that the United States treats DDS as a terrorist hacking enterprise
UNDERCODE START A HACKERS NEWS SITE

FOR MORE VISIT: https://www.UndercodeNews.com

To watch more videos, please subscribe to the channel

You can also follow UndercodeNews on other social media platforms:

Twitter https://twitter.com/UndercodeNews
Instagram https://www.instagram.com/UndercodeNews
Facebook https://www.facebook.com/UndercodeNews
Telegram @UndercodeNews

Under code channel provides a news service around the clock, related to hacking & programming & much more... to follow up on events as soon as they happen.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘topic updated web hacking-GoLismero is an open source framework for security testing. It's currently geared towards web security, but it can easily be expanded to other kinds of scans.

F E A T U R E S :

-Real platform independence. Tested on Windows, Linux, *BSD and OS X.

-No native library dependencies. All of the framework has been written in pure Python.

-Good performance when compared with other frameworks written in Python and other scripting languages.
Very easy to use.

-Plugin development is extremely simple.

-The framework also collects and unifies the results of well known tools: sqlmap, xsser, openvas, dnsrecon, theharvester...

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

-Integration with standards: CWE, CVE and OWASP.

1) sudo bash

2) apt-get install python2.7 python2.7-dev python-pip python-docutils git perl nmap sslscan

3) cd /opt

4) git clone https://github.com/golismero/golismero.git

5) cd golismero

6) pip install -r requirements.txt

7) pip install -r requirements_unix.txt

8) ln -s ${PWD}/golismero.py /usr/bin/golismero

9) exit

πŸ¦‘ If you have an API key for Shodan, or an OpenVAS server or SpiderFoot server you want to integrate with GoLismero, run the following commands:

1) mkdir ~/.golismero

2) touch ~/.golismero/user.conf

3) chmod 600 ~/.golismero/user.conf

4) nano ~/.golismero/user.conf

5) At the editor, add the following sections to the file, as appropriate:

[shodan:Configuration]
apikey = <INSERT YOUR SHODAN API KEY HERE>

[openvas]
host = <INSERT THE OPENVAS HOST HERE>
user = <INSERT THE OPENVAS USERNAME HERE>
*password = <INSERT THE OPENVAS PASSWORD HERE>

[spiderfoot]
url = <INSERT THE SPIDERFOOT URL HERE>

βœ…GIT TOPIC
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
How to Get and Set Up a Free Windows VM for Malware Analysis.pdf
1.1 MB
How to Get and Set Up a Free Windows VM for Malware Analysis #full with pictures β€οΈπŸ‘πŸ»
Forwarded from UNDERCODE NEWS
Microsoft has fixed a vulnerability of 0-day Windows file signature that exists since 2018
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Auto Scanning to SSL Vulnerability :
HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc

A. Support Vulnerability

- CVE-2007-1858] Anonymous Cipher
- CVE-2012-4929] CRIME(SPDY)
- CVE-2014-0160] CCS Injection
- CVE-2014-0224] HeartBleed
- CVE-2014-3566] SSLv3 POODLE
- CVE-2015-0204] FREAK Attack
- CVE-2015-4000] LOGJAM Attack
- CVE-2016-0800] SSLv2 DROWN

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

A. Download(clone) & Unpack A2SV

1) $ git clone https://github.com/hahwul/a2sv.git

2) $ cd a2sv

B. Install Python Package / OpenSSL

3) $ pip install argparse

4) $ pip install netaddr

5) $ apt-get install openssl

C. Run A2SV

6) $ python a2sv.py -h

πŸ¦‘How to Use?

usage: a2sv [-h] [-t TARGET] [-tf TARGETFILE] [-p PORT] [-m MODULE]
[-d DISPLAY] [-u] [-v]

βœ…GIT TOPIC
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
osif.png
47.5 KB
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FACEBOOK info gathering :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) $ pkg update upgrade

2) $ pkg install git python2

3) $ git clone https://github.com/ciku370/OSIF

4) $ cd OSIF

5) $ pip2 install -r requirements.txt

6) $ python2 osif.py

7) if you are confused how to use it, please type 'help' to display the help menu

8) [Warn] please turn off your VPN before using this program !!!

9) [Tips] do not overuse this program !!!

βœ…git topic/verified

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE SECURITY
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Hacking tool For Hackers:

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/Z4nzu/hackingtool.git

2) chmod -R 755 hackingtool

3) cd hackingtool

4) sudo pip3 install -r requirement.txt

5) bash install.sh

6) sudo hackingtool


βœ…git topic
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Nine practical methods to break through the IDS intrusion detection system

The first trick: "/./" string insertion method

In view of the special role of "./", we can insert it into the URL to achieve URL transformation. For example, for /msadc/msadcs.dll, we can rewrite it as /././msadc/./. /msadcs.dll, /./msadc/.//./msadcs.dll and other forms to disrupt IDS The identification mark analysis engine realizes the purpose of deceiving IDS. Moreover, the URL after the rewrite is equivalent to the unmodified URL. The author has shown through experiments that this method can bypass IDS such as Snort.

The second trick: "00" ASCII code

Some time ago, the Internet upload vulnerability was used to exploit this feature, and everyone must be familiar with it. Its principle is that the computer automatically truncates the character string at ASCII code 00 when it is processed. We can rewrite /msadc/msadcs .dll to /msadc/msadcs.dll Iloveheikefangxian, use Winhex to change the space between .dll and Ilove to the ASCII code of 00, save it, and then submit it with NC and pipe. In this way, in the view of some IDS, /msadc/msadcs.dll Iloveheikefangxian is not the same as the string with the attack intent specified in its rule set file, so it will be indifferent to the attacker's behavior.Look! How extensive is the application of the principle of "automatically truncating at ASCII code 00 when the computer processes a character string"! Philosophically speaking, there is a connection between things, we should think more and dig out the internal laws, so There will be new discoveries.

The third trick: use the path separator "\"

For Web servers like Microsoft's IIS, "\" can also be used as a path separator like "/". Some IDS did not consider the non-standard path separator "\" when setting up the rule set file. If we rewrite /msadc /msadcs.dll to \msadc\ msadcs.dll, we can escape snort, because there is no identification mark of \msadc\ msadcs.dll in the snort rule set file. It is worth mentioning that the path separator "\" also has a magical effect, which is the "%5c" violent library method mentioned in the "Hacker Line of Defense" some time ago. "%5c" is the hexadecimal representation of "\".

Fourth trick: hexadecimal encoding

For a character, we can use the escape symbol "%" plus its hexadecimal ASCII code to represent it. For example, the first character "/" in /msadc/msadcs.dll can be expressed as %2F, and the following characters can be expressed by their corresponding hexadecimal ASCII code combined with "%". The URL encoded by this method It is no longer what it was before, and there may be no encoded string in the IDS rule set file, so IDS can be bypassed. But this method is invalid for IDS that uses HTTP preprocessing technology.

The fifth trick. Illegal Unicode encoding

UTF-8 encoding allows the character set to contain more than 256 characters, so it also allows more than 8 bits of encoding. The hexadecimal ASCII code of the "/" character is 2F, and the binary number is 00101111. The standard way to represent 2F in UTF-8 format is still 2F, but multi-byte UTF-8 can also be used to represent 2F. The character "/" can be represented by single-byte, double-byte, and three-byte UTF-8 encoding as shown in the following table:

"/" character representation binary hexadecimal

Single byte 0xxxxxxx 00101111 2F

Double byte 110xxxxx 10xxxxxx 11000000 10101111 C0 AF

Three bytes 1110xxxx 10xxxxxx 10xxxxxx 11100000 10000000 10101111 E0 80 AF

According to this method, we can encode the entire string accordingly. Although the resources that the encoded URLs ultimately point to are the same, their expressions are different, and the filter string may not exist in the IDS rule set file, thus achieving the goal of breaking through the IDS.

Sixth trick: redundant coding method
The redundant coding is also called double decoding. I still remember that the Unicode decoding vulnerabilities and the double decoding vulnerabilities of IIS in 2000-2001 were making a lot of noise. At that time, many friends were confused and thought that the Unicode decoding vulnerabilities were double decoding vulnerabilities. In fact, they are two different things. Is described in "Illegal Unicode Encoding". The redundant encoding refers to encoding a character multiple times.For example, the "/" character can be represented by %2f, and the "%", "2", and "f" characters in "%2f" can be represented by its ASCII code hexadecimal. According to the mathematical According to the knowledge of permutation and combination, the encoding form is 2 to the 3rd power, so "%2f" can be rewritten as: "%25%32%66", "%252f" and so on to realize the polymorphism of URL. After encoding, The string may not be collected in the IDS rule set file, which can fool some IDS.

Seventh trick. Add false paths

After adding the string "../" to the URL, the directory after the string has no meaning and becomes invalid. Therefore, the use of the "../" string can achieve the effect of disrupting the identification mark analysis engine and breaking through the IDS!

Eighth trick: insert multiple slashes

We can use multiple "/" instead of a single "/". The replaced URL will still work as before. For example, the request for /msadc/msadcs.dll can be changed to ////msadc////msadcs.dll. After the author has experimented, this method can bypass some IDS.

Ninth trick: Comprehensive polymorphic coding

Smart, you will know it when you read this subtitle.

ENJOY β€οΈπŸ‘πŸ»
writtenby
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Nine practical methods to break through the IDS intrusion detection system
Forwarded from UNDERCODE NEWS
PurpleWave: Information stealing program from Russia