UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘COMMUN METHODES HACK NETFLIX FOR BEGINERS
#fASTtIPS

> Unfortunately, password theft is very common within cyber security, especially for Netflix accounts.

> With over 75 million subscribers, Netflix passwords grant cyber criminals to both access user accounts without paying for a subscription, or even worse…

> sell the user’s password details and payment information on the Deep Web.

πŸ¦‘How do they do it? β€” Some examples

1) Phishing

Hackers often use phishing campaigns to obtain access to user’s device. They accomplish this by tricking users (often via a malicious email link that leads the user to a fake Netflix login page).

Once the user clicks on the link, the malware steals their account information.

2) Keyloggers

Keylogging is a password-theft tactic that resides in a device’s system memory, runs every time you startup your PC, and logs all your keystrokes. The logs are then sent to the hacker.

3) Trojan Horse Viruses

Trojan horses are sent to victims via malicious links or file attachments that trick users into downloading malicious software onto their device. Once downloaded this malware can take full control of the computer. Its main goal is to damage, disrupt, steal or damage your data or network.

> Once installed, it can extract user logins of any website or software that the infected computer uses, way more than just Netflix accounts; Skype, Facebook, Emails, and more.

> Unfortunately, computer passwords aren’t really a safety measure against hackers who access your device remotely, as they access the system through other tactics.

> Computer passwords are more of a protection against physical theft so that somebody whose obtained physical possession of your PC cannot login to the device.

ENJOYβ€οΈπŸ‘πŸ»
deepwiki
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Some NordVpn accounts

halldor0gudmundsson@gmail.com:awesome123
lacaveafromage@sfr.fr:Velaux1391
federicomariani215@gmail.com:Camilla78
halldor0gudmundsson@gmail.com:awesome123
lacaveafromage@sfr.fr:Velaux1391
joyceanne@gmail.com:j0yceanne
vja2001@gmail.com:bigboy101
jwg553@gmail.com:Patriots8281
jacksonchetty73@gmail.com:Lemonade20
bombardouglas@gmail.com:Hotdogs10
imaveryscaryghost@gmail.com:w4rr10rme
yasmeend22@gmail.com:mileycyrus
imaveryscaryghost@gmail.com:w4rr10rme
bethany@bcsmallbiz.com:3bluebears
trond.magnuus@hotmail.com:Passord10
kendallcox@gate.net:cupcake234
adrianxhahnemi@gmail.com:gjakova93
philweschen@gmail.com:wesley88
fangjin_1981@163.com:19811209
michalis13@gmail.com:99488451m
brendan.grosse@gmail.com:05161990Bg
ryantupa20@gmail.com:punx1977
diegoto77@gmail.com:benzema9
nicholas.aviles@gmail.com:N1cholas
r.malette@yahoo.com:Basketball18
jwg553@gmail.com:Patriots8281
tsuntat1995@hotmail.com:tattat11
halldor0gudmundsson@gmail.com:awesome123
sellyourcell@hotmail.com:russ1979
joyceanne@gmail.com:j0yceanne
siri.wallin@hotmail.de:bYT0zuA5
389727104@qq.com:james199639
km.skazka@gmail.com:shust0517
imaveryscaryghost@gmail.com:w4rr10rme
obren1977@yahoo.com:dragoon777
lacaveafromage@sfr.fr:Velaux1391
cartwrightayres@gmail.com:Kipper12
diegoto77@gmail.com:benzema9
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘NMAP USEFUL COMMANDS :

Scan network for live hosts

(nmap/zenmap)

For NMAP –


nmap -vv -sP 192.168.0.1-254 -oG hosts_up.txt

cat hosts_up.txt | grep -i β€œup”




nmap -PN 192.168.9.200-254

(this will also show open ports for each host)




Identify OS

(nmap/zenmap)

For NMAP –


nmap -O 192.168.0.100 (just OS fingerprint)


nmap -A 192.168.9.201 (runs an β€œaggressive” scan – scan,OS fingerprint, version scan, scripts and traceroute)




Check hosts for services

(nmap/zenmap)

For NMAP

- nmap -sS 192.168.9.254 (TCP)

- nmap -sU 192.168.9.254 (UDP)

(Could be better to do this in zenmap and group servers by services)


FOR SNMP

- snmpwalk -c public -v1 192.168.9.254 1 |grep hrSWRunName|cut -d” ” -f


For a known port

- nmap – p 139 192.168.9.254



DNS Lookups/Hostnames


host -l <domain> <dns server>

e.g. host -l acme.local 192.168.0.220




Banner grab/Version services

(nmap/zenmap/SNMP)

Check versions of software/services against milw0rm and security focus)


For NMAP

- nmap -sV 192.168.9.254


@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE HACKING
3 Billiar combo.rar
15.4 MB
3 BILLIARDS COMBO MAIL PASS @UndercodeTesting

english - spanish
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST 2020 SITES FOR CRACKED APK

– https://acmarket.net/

– https://www.apkwhale.com/

– https://apkmb.com/

– https://ihackedit.com/

– https://apk4free.net/

– https://rexdl.com/

– https://www.revdl.com

– https://aptoide.com

– https://www.apk4fun.com/

– https://apkpure.com

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘ Setup your own web hosting full guide for beginers β€”769.47 MBβ€”

https://mega.nz/folder/IqRAnSib#mSKVpXDrqibkCwW0gN9cLg
How to bypass AMSI and execute ANY malicious Powershell code.pdf
398 KB
the most #requested tutorial
How to bypass AMSI and execute ANY malicious Powershell code
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘METASPLOIT MODULES & HACKING :

Http://www.indepthdefense.com/2009/02/reverse-pivots-with-metasploit-how-not.html

http://code.google.com/p/msf-hack/wiki/WmapNikto

Http://www.indepthdefense.com/2009/01/metasploit-visual-basic-payloads-in.html

Http://seclists.org/metasploit/

Http://pauldotcom.com/2010/03/nessus-scanning-through-
a-meta.html

Http://meterpreter.illegalguy.hostzi.com/

Http://blog.metasploit.com/2010/03/automating-metasploit-console.html

Http://www.workrobot.com/sansfire2009/561.html

Http://www.securitytube.net/video/711

http://en.wikibooks.org/wiki/Metasploit/
MeterpreterClient#download

Http://vimeo.com/16852783

Http://milo2012.wordpress.com/2009/09/27/xlsinjector/

Http://www.fastandeasyhacking.com/

Http://trac.happypacket.net/

http://www.blackhat.com/presentations/bh-dc-10/Ames_Colin/BlackHat-DC-2010-colin-david-neurosurgery-with-meterpreter-wp.pdf

http://www.blackhat.com/presentations/bh-dc-10/Egypt/BlackHat-DC-2010-Egypt-UAV-slides.pdf

http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training

Http://www.irongeek.com/i.php?page=videos/metasploit-class

Http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6158.0/

Http://vimeo.com/16925188

Http://www.ustream.tv/recorded/13396511

Http://www.ustream.tv/recorded/13397426

Http://www.ustream.tv/recorded/13398740


enjoyβ€οΈπŸ‘πŸ»
βœ…GIT 2020
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Tens of thousands of MSSQL servers have been invaded by blasting and have become Monero mining machines
#News

> a mining Trojan targeting MS SQL server attacks. The mining Trojan mainly targeted MS SQL services to blast weak password attacks. After successful blasting, Monero mining Trojans will be implanted for mining.

> At the same time, the attacker downloads the frpc intranet penetration tool to install the backdoor, and will add users to facilitate the intruder to log in to the server remotely.

> Judging from the HFS server count of the mining Trojan, tens of thousands of MS SQL servers have been implanted with the mining Trojan, and dozens of servers have been installed with backdoors.

> The attacker installs intranet penetration tools on the compromised server will further increase the risk of hacker intrusion, and the compromise of the corporate database server will lead to serious information leakage incidents.

#News
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Information Gathering With Cobalt Strike.pdf
1.3 MB
Information Gathering With Cobalt Strike full tutorial
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘1) What is investigation in hacking ?
Reconnaissance is to collect as much information as possible on the target network. From a hacker's point of view, information collection is very helpful for attacks. Generally speaking, the following information can be collected:

Email, port number, operating system, running service, Traceroute or DNS information, firewall identification and escape, etc.

2) Introduction to NMAP
Nmap is a network connection end scanning software, used to scan the open network connection end of the computer on the Internet. Determine which services are running on which connections, and infer which operating system the computer is running (this is also known as fingerprinting). It is one of the necessary software for network administrators and is used to evaluate network system security.

3) NMAP script engine
The NMAP script engine is the most powerful and flexible feature of NMAP. It allows users to write simple scripts to automate various network tasks, basically these scripts are written in lua language. Usually NMAP script engine can do many things, such as:

4) Network discovery
This is the basic function of NMAP. Examples include finding the whois information of the target domain name, querying the ownership of the target ip on ARIN, RIPE, or APNIC, finding open ports, SNMP query and listing available NFS/SMB/RPC shares and services .

5) Vulnerability detection
When a new vulnerability is discovered, you want to quickly scan the network to identify vulnerable systems before intruders. Although NMAP is not a comprehensive vulnerability scanner, NSE is powerful enough to handle demanding vulnerability checks. Many vulnerable scripts are already available, and more scripts are planned.

6) Backdoor detection
Many attackers and some automated worms will leave back doors so that they can be re-entered later. Some of them can be detected by NMAP based on regular expressions.

7) Exploit
As a scripting language, NSE can even exploit vulnerabilities, not just find them. The ability to add custom attack scripts may be valuable to some people (especially penetration testers), but it is not intended to develop NMAP into something like the metasploit framework.


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to encrypt, decrypt PDF files using TERMUX :

1️⃣DOWNLOAD https://d-05.winudf.com/b/apk/Y29tLmNidXp6YXBwcy5wZGZ1bmxvY2tlcm1hc3Rlcl8xX2Y0OWExMDcy?_fn=UERGIFBhc3N3b3JkIFVubG9ja2VyIExvY2sgVW5sb2NrIFBERl92MS4wX2Fwa3B1cmUuY29tLmFwaw&_p=Y29tLmNidXp6YXBwcy5wZGZ1bmxvY2tlcm1hc3Rlcg&as=ded856575890fedcbcbc1ec37a7d6dfa5a753208&c=1%7CTOOLS&k=58607254a02f1c85b65759aa04a431245a7850cd

2️⃣ Now type command chmod +x peepdf.py and Press Enter

3️⃣type command python2 peepdf.py -i and press Enter.

4️⃣The steps above help in installation of PDF Unlocker in system.

5️⃣Now we come to the Encryption part.

1) After opening the PDF, type command encrypt Yourpassword Here β€œYourPassword” is Password for PDF file to open.

2) then type command β€œsave” and press Enter which makes your PDF Password Protected – a note pops up on your screen describing the same.

πŸ¦‘how decrypt pdf- termux :

Step#1: Open the file again by command open -f /sdcard/FileName.pdfand press Enter.

Step#2: Then type command decrypt YourPassword and press Enter. Password must be the same as set to encrypt the same PDF. In case of problem, PDF Unlocker is always there to help you

termux-wiki
enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Pay attention to container security: Doki infects Docker servers in the cloud

πŸ¦‘Main findings

1) The Ngrok Mining Botnet is an active activity that targets Docker servers exposed in AWS, Azure and other cloud platforms. It has been active for at least two years.

2) We detected a recent attack that included completely undetected Linux malware and previously undocumented technology that used blockchain wallets to generate C&C domain names.

3) Anyone with public access to the Docker API can be hacked in just a few hours. This is most likely due to the hacker's automatic and continuous full Internet scan of vulnerable victims.

4) Since the first analysis on January 14, 2020, VirusTotal’s 60 malware detection engines have not yet detected a new malware called β€œDoki”.

5) The attacker is using the infected victim to search for other vulnerable cloud servers.

πŸ¦‘MORE DETAILS :

Linux threats are becoming more and more common. One factor causing this situation is the increasing shift and reliance on cloud environments, which are mainly based on Linux infrastructure. Therefore, attackers have adopted new tools and techniques specifically designed for this infrastructure.

A popular technique is to abuse misconfigured Docker API ports, where attackers scan for publicly accessible Docker servers and use them to set up their own containers and execute malware on the victim's infrastructure.

The Ngrok botnet is one of the longest-lasting attacks using the Docker API port, previously reported by researchers from Netlab and Trend Micro. As part of the attack, the attacker abused the Docker configuration function to evade standard container restrictions and execute various malicious loads from the host. They also deployed a network scanner and used it to scan the IP range of the cloud provider to find other potentially vulnerable targets. Our evidence shows that it only takes a few hours from the launch of the newly misconfigured Docker server to the infection.

Recently, we detected a new malware payload that is different from the standard crypto miners usually deployed in this attack. The malware is a completely undiscovered backdoor, we named it Doki.

Doki uses a previously undocumented method to abuse the Dogecoin cryptocurrency blockchain in a unique way to contact its operator in order to dynamically generate its C2 domain address. Although VirusTotal publicly provided samples, the malware has been successfully hidden for more than six months.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁