UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
Forwarded from WEB UNDERCODE - PRIVATE
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hacking a smartphone using Kali-for beginers by undercode :

> Kali is a Linux flavored program used by hackers and security professionals. A very popular and irreplaceable item. I will not describe the pros and cons, but let's get down to business:

Step 1: Open Terminal

Of course, to get started, fire up Kali and open a terminal.

Step 2: Install the required libraries

To run these Android virtual devices on 64-bit Debian operating systems (such as Kali), we need to install a few key libraries that are not included by default. Fortunately, they are all in the Kali repository.

kali> apt-get install lib32stdc ++ 6 lib32ncurses5 lib32zl

Installing these three libraries is enough to get us going, we can now start installing the Android Software Developer Kit (SDK).

Step 3: Install Android SDK

From yo ur browser go to the "Android SDK" website and download the Android SDK installer. Make sure you download the Linux kit. You can download and install the Windows or Mac options and then test these virtual devices in Kali, but this will be a more complex option. Let's go the easy way and set everything in Kali.
Forwarded from WEB UNDERCODE - PRIVATE
Forwarded from WEB UNDERCODE - PRIVATE
Once you've downloaded it, you can extract it using Kali's GUI archiving tool, or using the command line.

Extracting the Cali GUI

Step 4: Go to the tools directory

Next, we need to navigate to the tools directory of the SDK directory.

kali> cd / android-pentest-framework / sdk / tools


SDK tools

Once we are in the tools directory, we can launch the Android application. Just enter

kali> / android


Kali Androyd Installation

When you do this, the SDK manager will open the GUI as above. We will now download two versions of the Android operating system to practice our smartphone hacking, Android 4.3 and Android 2.2. Make sure you find them among this list, click on the box next to them, and click on the "install XX packages" button. This will force the SDK to load these operating systems into your Kali.

Step 5: Android Virtual Device Manager

After we have downloaded all the packages, we now need to build our Android virtual devices, or AVDs. From the SDK manager pictured above, select Tools -> Manage AVDs which will open an interface like below from Android Virtual Device Manager.


> Click on the "Create" button, which will open such an interface below. Create two Android virtual devices, one for Android 4.3 and one for Android 2.2. I just named my devices "Android 4.3" and "Android 2.2" and I recommend that you do the same.


> Create a virtual android device

Select a Nexus 4 device and the corresponding target (API 18 for Android 4.3 and API 8 for Android 2.2) and "Skin with dynamic hardware controls." You should leave the rest of the settings at their default values, with the exception of adding a 100 MiB SD card.

Step 6: launching the Android virtual device

After creating two Android virtual devices, the Android Virtual Device Manager should look like two devices.

This will launch the Android emulator creating your Android virtual device. Please be patient this may take a while. When he's finished, you should be greeted by a virtual smartphone on your Kali desktop!

Step 7: Install the Pentest Framwork smartphone

The next step is to install Smartphone Pentest Framework. You can use git clone to download it to

kali> git clone https://github.com/georgiaw/Smartphone-Pentest-Framework.git


πŸ¦‘Installing Smartphone Pentest Framework


Step 8: Starting Apache

As you need a web server and MySQL database, go ahead and start both of these services

kali> service apache2 startkali> service mysql start

Step 9: change the configuration.

Like almost all Linux applications, Smartphone Pentest Framework is configured using a text configuration file. First you need to go to the directory with the framework console subdirectory

kali> CD / root / Smartphone-Pentest-Framework / frameworkconsole

Then open the config file in any text editor. In this case, I used Leafpad

kali> leafpad config

> We will need to edit the IPADDRESS variable and SHELLIPADDRESS variable to reflect the actual IP address of your Kali system (you can find it by entering "ifconfig").

Step 10: Launch the platform
We are now ready to launch the Smartphone Pentest Framework. Just enter

kali> ./framework.py

And that should open the Framework menu as shown below.

Finish! We are now ready to start hacking smartphones!

enjoyβ€οΈπŸ‘πŸ»
WRITTEN BY UNDERCODE
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
Hacking a smart phone steps by undercode
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Microsoft warns: large-scale Emotet is making a comeback, this time the target is banking information

According to foreign media reports, Microsoft has issued a warning a few days ago that a large-scale malware campaign is targeting end users’ bank information. Microsoft pointed out that as part of a new campaign to use Emoter malware, a large number of emails with hundreds of unique attachments were sent to users. It is understood that the Emotet banking Trojan was first discovered by security researchers in 2014.
> Emotet was originally designed as a bank malware that tried to sneak into users' computers and steal their sensitive and private information. The latest version of the software also adds spam and malware delivery services, including other banking Trojans.

Microsoft pointed out in the report that the phishing activity has been silent for several months, but recently it has made a comeback. The new campaign uses a long-term Emotet strategy: an email with a link or a file with a highly confusing malicious macro runs a PowerShell script to download the payload through 5 download links. The download URL usually points to the attacked website, which is exactly what Emotet does.

The features used by Emotet can help software avoid detection from some anti-malware products. Emotet uses worm-like features to help it spread to other connected computers, which helps the spread of malware. This feature led the US Department of Homeland Security to conclude that Emotet is one of the most expensive and destructive malware. It affects governments, private sectors, individuals and organizations, and each cleanup costs more than $1 million

WRITTEN BY UNDERCODE
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What certifications are required to become an IT auditor?
There are other certifications that will help you to become an IT auditor or go even further in the field of compliance and security if you are already working in a similar role. Below are some of the most popular certifications that you can take if you are wanting to get into the field of IT auditing:

1) IIA’s CIA: The Certified Internal Auditor certification is a good starting point for anyone that wants to get into an auditing role. This is not specifically aimed at IT auditing, but it does teach best practice and governance standards which are important for any auditor. These skills are useful when auditing in general and can be applied to IT systems

2) ISACA’s CISA: The Certified Information Systems Auditor is aimed at IT auditing and teaches many of the basics that you will need to get into a role as an IT auditor. It teaches change controls and security standards that are most used for auditing IT systems

3) ISACA’s CGEIT: This certification is aimed at more managerial candidates that act in an advisory or assurance capacity as they relate to IT governance. This covers some auditing but is looked at as a more overarching certification for more senior roles within the organization

4) ISACA’s CRISC: The CRISC certification (Certified Risk and Information Systems Control) teaches candidates how to evaluate and assess the current risk management and mitigation systems within an organization. IT systems audits are a big part of this process, although this certification will certainly teach you much more than that

SOURCE WIKI
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘web- server attack defense solution by Undercode :


> static page
Due to the slow opening speed of dynamic pages, a large amount of data needs to be frequently called from the database. For cc attackers, even a few broilers can consume all website resources, so dynamic pages are vulnerable to cc attacks. Normally, static pages are only tens of kb, while dynamic pages may need to be called from a database of tens of MB, so the consumption is obvious. For forums, a good server is often needed to run stably, because the forum is very It is difficult to be purely static.

> Hide server ip
Using CDN acceleration can hide the real IP of the server , causing the attacker to be unable to attack the real IP, but this action can only prevent some of the more sophisticated attackers, unless you can really hide the IP.

> Prohibit proxy access
As mentioned earlier, the attacker uses a large number of proxies to attack. Setting to prohibit proxy access or limit the number of proxy connections can also play a certain protective role.

> Block attack ip
When the server is attacked by cc, there will usually be thousands of tcp connections. Open cmd and enter netstat -an. If a large number of external ips appear, it is attacked. At this time, you can use protection software to block the attacking ip or manually. This method is more common. passive.

> Use protection software
I personally think that the use of protection software is minimal and can only stop small attacks. Many software claim to be effective in identifying attack methods and intercept them. Most cc attacks can be disguised as normal users, and they can also be disguised as Baidu/google spider’s ua. During an attack, the protection software has to analyze a large number of requests, which leads to an increase in the memory occupied by the protection software, which becomes a burden, and even the software itself crashes.

ENJOYβ€οΈπŸ‘πŸ»
written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘More than 200 gb hacking courses-Udemy :

https://drive.google.com/drive/u/0/folders/0Bwci1XJP8s_VZGN6OUdfTEozSmM