UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Why all hackers should study C ++ ? Who is C ++ for
#FastTips

1) C ++ is considered a mid-level language as it includes a combination of high-level and low-level language features.

2) C ++ is widely used to write device drivers, operating system kernels, critical OS programs, and other software that rely on direct manipulation of hardware in real time.

3) C ++ is widely used for teaching and research because it is clear enough to successfully teach basic concepts.

4) In application writing, C ++ is used when performance is key. C ++ programs run faster and take up less space when compared to many other programming languages.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The report says the emails of local election officials in the United States may be affected by phishing attacks
#News

> According to a new report from the Wall Street Journal, the e-mail system that many election officials across the United States are using may make them more vulnerable to phishing attacks. Area 1 Security found that less than 20% of the 10,000 state and local election management agencies in the United States have advanced anti-phishing control measures, and about 666 election officials rely on personal email addresses to handle election-related matters.

> According to reports, judicial agencies in several states are using a version of the free Exim software, and Russia’s GRU intelligence agency has launched online attacks against the software in 2019. However, security experts say that weak email security is unlikely to cause votes to be hacked because the email system is not connected to the vote-counting system.

> But this raises concerns that local election officials may be insufficiently prepared for possible intrusions into email systems. In 2016, GRU was accused of stealing and leaking emails from the Hillary Clinton presidential campaign team; in 2018, GRU registered a network domain name that appeared to be a fake government website, ostensibly for phishing purposes. Microsoft seized these domain names before it was officially deemed to have caused any damage.

> According to reports, this year foreign hackers have targeted the personal email accounts of staff working for the presumed Democratic candidate Joe Biden and President Trump’s campaigns. For example, Iranian hackers allegedly targeted emails from Trump campaign staff. Google, which reported these attempts, said last month that it had not seen evidence of the success of these attacks.

#News
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘SEO Nexus Bundle Full 2020 : β€”-14,6 gbβ€”

https://mega.nz/folder/V2ICxSZB#4dQEo0rsmZJHy9lQ0gop-w
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Terms related to ss/encrypt/OpenSSL that we will use:

genpkey (replaces genrsa , gendh and gendsa ) - generates private keys

req - utility for creating certificate signing requests and for generating self-signed PKCS # 10 certificates

x509 - utility for signing certificates and for showing properties of certificates

rsa - utility for working with RSA keys, for example, for converting
keys to various formats

enc - various actions with symmetric ciphers

pkcs12 - Create and parse PKCS # 12 files

crl2pkcs7 - program for converting CRL to PKCS # 7

pkcs7 - Performs operations on PKCS # 7 files in DER or PEM format

verify - program for verifying certificate chains

s_client - This command implements an SSL / TLS client that connects to a remote host using SSL / TLS. This is a very useful diagnostic tool for SSL servers

ca - is a minimal CA application. It can be used to sign various forms of certificate requests and generate CRLs. It also maintains a text database of issued certificates and their status

rand - This command generates the specified number of random bytes using a cryptographically secure pseudo-random number generator (CSPRNG)

rsautl - command can be used to sign, verify, encrypt and decrypt data using the RSA algorithm

smime - the command processes S / MIME mail. It can encrypt, decrypt, sign and verify S / MIME messages

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
βœ…SOME VERIFIED BINS :

βœ…BIN DISNEY PLUS:
> BIN》6501592675x45x77
> BIN》6501592675x3xx50
> FECHA》RND
> ZIP CODE》10080
USA πŸ‡ΊπŸ‡Έ

βœ…BIN VRYVPN VIA PAYPAL

BIN》657368xxxxxxxxxx
BIN》657368xx44xx3x23
BIN》657368x7x64x0x83
FECHA》RND
CCV》RND
USA πŸ‡ΊπŸ‡²
ANDDRESS : Street 123
STATE: New York
CITY: NEW YORK
ZIP CODE: 10080
Ph No : (213) 212 xxxx


ONLY VERIFIED BY US

πŸ„β€β™‚οΈBest Cc generators : https://t.me/UNDERCODEHACKING/2150


Enjoy β€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘COMMUN METHODES HACK NETFLIX FOR BEGINERS
#fASTtIPS

> Unfortunately, password theft is very common within cyber security, especially for Netflix accounts.

> With over 75 million subscribers, Netflix passwords grant cyber criminals to both access user accounts without paying for a subscription, or even worse…

> sell the user’s password details and payment information on the Deep Web.

πŸ¦‘How do they do it? β€” Some examples

1) Phishing

Hackers often use phishing campaigns to obtain access to user’s device. They accomplish this by tricking users (often via a malicious email link that leads the user to a fake Netflix login page).

Once the user clicks on the link, the malware steals their account information.

2) Keyloggers

Keylogging is a password-theft tactic that resides in a device’s system memory, runs every time you startup your PC, and logs all your keystrokes. The logs are then sent to the hacker.

3) Trojan Horse Viruses

Trojan horses are sent to victims via malicious links or file attachments that trick users into downloading malicious software onto their device. Once downloaded this malware can take full control of the computer. Its main goal is to damage, disrupt, steal or damage your data or network.

> Once installed, it can extract user logins of any website or software that the infected computer uses, way more than just Netflix accounts; Skype, Facebook, Emails, and more.

> Unfortunately, computer passwords aren’t really a safety measure against hackers who access your device remotely, as they access the system through other tactics.

> Computer passwords are more of a protection against physical theft so that somebody whose obtained physical possession of your PC cannot login to the device.

ENJOYβ€οΈπŸ‘πŸ»
deepwiki
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Some NordVpn accounts

halldor0gudmundsson@gmail.com:awesome123
lacaveafromage@sfr.fr:Velaux1391
federicomariani215@gmail.com:Camilla78
halldor0gudmundsson@gmail.com:awesome123
lacaveafromage@sfr.fr:Velaux1391
joyceanne@gmail.com:j0yceanne
vja2001@gmail.com:bigboy101
jwg553@gmail.com:Patriots8281
jacksonchetty73@gmail.com:Lemonade20
bombardouglas@gmail.com:Hotdogs10
imaveryscaryghost@gmail.com:w4rr10rme
yasmeend22@gmail.com:mileycyrus
imaveryscaryghost@gmail.com:w4rr10rme
bethany@bcsmallbiz.com:3bluebears
trond.magnuus@hotmail.com:Passord10
kendallcox@gate.net:cupcake234
adrianxhahnemi@gmail.com:gjakova93
philweschen@gmail.com:wesley88
fangjin_1981@163.com:19811209
michalis13@gmail.com:99488451m
brendan.grosse@gmail.com:05161990Bg
ryantupa20@gmail.com:punx1977
diegoto77@gmail.com:benzema9
nicholas.aviles@gmail.com:N1cholas
r.malette@yahoo.com:Basketball18
jwg553@gmail.com:Patriots8281
tsuntat1995@hotmail.com:tattat11
halldor0gudmundsson@gmail.com:awesome123
sellyourcell@hotmail.com:russ1979
joyceanne@gmail.com:j0yceanne
siri.wallin@hotmail.de:bYT0zuA5
389727104@qq.com:james199639
km.skazka@gmail.com:shust0517
imaveryscaryghost@gmail.com:w4rr10rme
obren1977@yahoo.com:dragoon777
lacaveafromage@sfr.fr:Velaux1391
cartwrightayres@gmail.com:Kipper12
diegoto77@gmail.com:benzema9
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘NMAP USEFUL COMMANDS :

Scan network for live hosts

(nmap/zenmap)

For NMAP –


nmap -vv -sP 192.168.0.1-254 -oG hosts_up.txt

cat hosts_up.txt | grep -i β€œup”




nmap -PN 192.168.9.200-254

(this will also show open ports for each host)




Identify OS

(nmap/zenmap)

For NMAP –


nmap -O 192.168.0.100 (just OS fingerprint)


nmap -A 192.168.9.201 (runs an β€œaggressive” scan – scan,OS fingerprint, version scan, scripts and traceroute)




Check hosts for services

(nmap/zenmap)

For NMAP

- nmap -sS 192.168.9.254 (TCP)

- nmap -sU 192.168.9.254 (UDP)

(Could be better to do this in zenmap and group servers by services)


FOR SNMP

- snmpwalk -c public -v1 192.168.9.254 1 |grep hrSWRunName|cut -d” ” -f


For a known port

- nmap – p 139 192.168.9.254



DNS Lookups/Hostnames


host -l <domain> <dns server>

e.g. host -l acme.local 192.168.0.220




Banner grab/Version services

(nmap/zenmap/SNMP)

Check versions of software/services against milw0rm and security focus)


For NMAP

- nmap -sV 192.168.9.254


@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE HACKING
3 Billiar combo.rar
15.4 MB
3 BILLIARDS COMBO MAIL PASS @UndercodeTesting

english - spanish
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST 2020 SITES FOR CRACKED APK

– https://acmarket.net/

– https://www.apkwhale.com/

– https://apkmb.com/

– https://ihackedit.com/

– https://apk4free.net/

– https://rexdl.com/

– https://www.revdl.com

– https://aptoide.com

– https://www.apk4fun.com/

– https://apkpure.com

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘ Setup your own web hosting full guide for beginers β€”769.47 MBβ€”

https://mega.nz/folder/IqRAnSib#mSKVpXDrqibkCwW0gN9cLg
How to bypass AMSI and execute ANY malicious Powershell code.pdf
398 KB
the most #requested tutorial
How to bypass AMSI and execute ANY malicious Powershell code
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘METASPLOIT MODULES & HACKING :

Http://www.indepthdefense.com/2009/02/reverse-pivots-with-metasploit-how-not.html

http://code.google.com/p/msf-hack/wiki/WmapNikto

Http://www.indepthdefense.com/2009/01/metasploit-visual-basic-payloads-in.html

Http://seclists.org/metasploit/

Http://pauldotcom.com/2010/03/nessus-scanning-through-
a-meta.html

Http://meterpreter.illegalguy.hostzi.com/

Http://blog.metasploit.com/2010/03/automating-metasploit-console.html

Http://www.workrobot.com/sansfire2009/561.html

Http://www.securitytube.net/video/711

http://en.wikibooks.org/wiki/Metasploit/
MeterpreterClient#download

Http://vimeo.com/16852783

Http://milo2012.wordpress.com/2009/09/27/xlsinjector/

Http://www.fastandeasyhacking.com/

Http://trac.happypacket.net/

http://www.blackhat.com/presentations/bh-dc-10/Ames_Colin/BlackHat-DC-2010-colin-david-neurosurgery-with-meterpreter-wp.pdf

http://www.blackhat.com/presentations/bh-dc-10/Egypt/BlackHat-DC-2010-Egypt-UAV-slides.pdf

http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training

Http://www.irongeek.com/i.php?page=videos/metasploit-class

Http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6158.0/

Http://vimeo.com/16925188

Http://www.ustream.tv/recorded/13396511

Http://www.ustream.tv/recorded/13397426

Http://www.ustream.tv/recorded/13398740


enjoyβ€οΈπŸ‘πŸ»
βœ…GIT 2020
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁