UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to restrict employees' computers from installing programs at will and how to allow specific programs :

The whole process of software installation only takes a few seconds, and the software is automatically hidden after installation. You need to use shortcut keys to call out and enter the password before you can see the interface. All functions are on the interface, just check the item to be controlled, and the check will take effect. Although the operation is very simple, the functions of this software are really powerful. Its functions mainly include:

1️⃣USB storage device management.

1. It is forbidden to connect the computer to all USB storage devices, including USB flash drives, mobile hard drives, mobile phones, tablets, etc., and it does not affect USB mice, keyboards, and dongles.

2. Set a specific U disk, that is, the computer can only recognize the U disk in the whitelist. At the same time, you can also set secondary permissions for a specific U disk.

3. It is only allowed to copy files from the USB flash drive to the computer, and prohibits the computer from copying files to the USB flash drive, or only allows the computer to copy files to the USB flash drive, and prohibits the USB flash drive to copy files to the computer.

4. Password permission setting. The administrator password is required when setting files to be copied from the computer to the U disk or mobile hard disk.

5. Disable the CD/DVD drive and disc drive burning function, but allow the CD drive to read and disable the floppy drive.

6. Monitor copy records of USB storage devices. It records in detail the log when the U disk copy computer files, including copy time, file name, etc.

2️⃣ The bottom layer protection of the operating system.

Disable Registry, Disable Device Manager, Disable Group Policy, Disable Computer Management, Disable Task Manager, Disable Msconfig, Disable Safe Mode, Disable CD Boot Computer, Disable Infrared, Disable Serial/Parallel, Disable 1394, Disable PCMCIA, Disable Modem , Disable U disk to start the computer, disable DOS commands, disable formatting and Ghost, disable IP/Mac modification, block PrtScn, block Esc key, block clipboard, block network sharing, block viewing processes, block Win key, block Ctrl+Alt +A key, disable Telnet, automatically hide operation when booting system, set global whitelist, prohibit LAN communication, disable virtual machine, prohibit user creation, disable wired network card, disable wireless network card, prohibit installation of portable WIFI, disable Bluetooth, login password setting, The software calls out hot key management, installation directory authority management, UAC management, recovery management, etc.

3️⃣ Management of network leaks.

1. Leaking secrets of chat software is prohibited. Set specific QQ, allow xy chat but prohibit file transfer, prohibit xy group file transfer, prohibit WeChat file transfer, etc.

2. It is forbidden to transfer files outside the mailbox. Forbid to log in to all mailboxes, allow to log in to specific mailboxes, only allow receiving mail, prohibit sending mail, etc.

3. It is forbidden to transfer files from the network disk. It is forbidden to use all network disks and cloud disks, and you can also set to use specific network disks and cloud disks.

4. Program black and white list management. Set a list of prohibited programs, or set a list of only allowed programs.

5. Web page black and white list management. Set a list of URLs that are forbidden to open, or set a list of URLs that are only allowed to be opened.

6. It is forbidden to log in to forums, blogs, post bars, spaces, etc., use FTP to upload files, and prohibit mobile phones and computers from transferring files to each other over the network.


E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to become a hacker? How to learn hackers from 0 ?

> If you want to be a real hacker, let me say a few points first. First of all, to be a hacker is interest, curiosity, and general knowledge. As long as you have this, you can be a hacker.

> Generally speaking, people who like to be hackers are especially fond of hackers. His Internet level and IQ will continue to improve every day. It is higher than ordinary people's thinking because he has a sense of exploration and curiosity. It is not only a genius who can be a hacker. Of course, ordinary knowledge is also essential. When you are a hacker, you will learn what you have not learned, and you will experience suffering or despair, but if you really want to be a hacker, you must There is only success, no failure because once you give up, there is no hope.

> In the real network world, there are not only WINDOWS, but also LINUX, and various operating systems such as UNIX. The WINDOWS operating system is the most vulnerable to attack. Why? Because the people who use it are the most, and many of the people who use it don't pay attention to safety protection at all, computer novices, these users have very weak awareness of safety protection on software or hardware.

1️⃣First learn the basics of computer systems. This includes windows and linux. Linux recommends learning centos. The reason is that it’s free. The kali and other system commands that will be used in the future are almost the same. In fact, it is to learn the basics of the system. Various services, such as the construction of dns dhcp server, the construction of mail server and so on.

2️⃣ Learn the basics of the network, starting from the seven-layer protocol, and then to switch configuration and routing.

3️⃣Learn how to build a website and a database. If you haven't built a website before, how can you infiltrate it? At the very least, you have to know how to add, delete, modify, and check the database. Or else, how to do SQL hand notes in the future?

4️⃣ Next, you can learn hacking techniques and find yourself a goal. For example, you must first learn basic vulnerabilities, learn logic vulnerabilities, or learn top10 first. There are more tutorials on the Internet, but they are uneven Qi, it is better to have an old driver take the area.

5️⃣ While learning infiltration, you must also learn languages. It is recommended to learn c or python first, then java.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How can hackers use mobile phones to attack?

1️⃣ Control the server to attack

Generally speaking, hackers have a lot of server resources in their hands, and these server hackers can also connect remotely through mobile phones, and then enter commands to carry out remote attacks. If you use this method to attack, the attack that a computer can launch can also be achieved through a mobile phone, and there is no need to carry a laptop with you. It is no exaggeration to say that as long as a hacker can connect to the server remotely, any mobile phone may become its attack tool.



2️⃣ Launch an attack through the phone itself

This method will have higher requirements for mobile phones. Not all mobile phones can be realized. Apple is basically impossible. Android phones have a chance to try. So how does a hacker attack others through the Android system?

First of all, the first is to fake wifi hotspots: we all know that nowadays wifi is an indispensable part of our lives. Connecting to wifi in public is also a routine operation, so forging a fake wifi hotspot also has an opportunity to attack others The mobile phone is also a breeze.

The second is badusb hijacking: the operation of this method is that as long as the USB cable connected to the mobile phone is inserted into the computer, the computer will automatically execute the command, and the final result is the computer collapse.

Finally, there is the complete toolkit of Cary Linux. The most powerful part of this mobile phone attack is that it can launch an attack without a remote server.


3️⃣ Hackers don't like to use mobile phones
Mobile phones are usually Android or Apple systems. In fact, most of the hacker software is computer software, and mobile phones cannot run. Therefore, it is impossible to implement hacking techniques on mobile phones, and it seems very tasteless, and no hackers like to hold one. The little mobile phone slowly tapped the code. On the computer, the hacker's favorite is not the window system, but the kali linux system for hackers .

4️⃣What should I do if I want to learn hacking techniques through mobile phones?
Using a mobile phone to do hackers seems very tasteless, but it is indeed a good choice to learn hacking skills with a mobile phone. It has become the norm to learn hacker knowledge through the Internet, but because the computer is very inconvenient to carry, mobile phones are the mainstream now. How good is it to be able to learn hacking knowledge on a mobile phone? For this reason, the editor brings you benefits

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘Udemy - How to Draw Folds, Clothes and Draperyβ€”2 Gbβ€”

https://mega.nz/folder/Osd1GIQT#d3Q2x9cEfwuLQt7nZUQO4g
Forwarded from Backup Legal Mega
πŸ¦‘LinkedIn - Review and Manage the SAP MRP List

https://mega.nz/folder/esM1haZJ#CCfHSuO5duxRPMLxgWDGOg
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Interesting News :
The report states that the cost of remediation of a company's "super large" data breach may be as high as US$392 million
:
#News

> According to foreign media ZDNet, in the past year, the average cost of "very large" data breaches has increased astronomically, and companies affected by such security incidents are expected to pay as much as US$392 million. Now, data breaches are commonplace. Cyber ​​attacks against companies have spawned a new cyber insurance industry. There have been regulations and class actions against companies that fail to protect data, and new lawsβ€”such as the EU’s GDPRβ€”can be used Heavy penalties are imposed on data controllers with lax security.

<> However, data breaches continue to occur, some of which result in consumer records being stolen and sold on underground forums, increasing the risk of identity theft. In order to deal with the consequences of data breaches, companies may need to spend money to repair systems and upgrade architectures, may need to invest in new network security services and network forensics, and may also face legal proceedings or penalties from regulatory authorities-if customer PII is involved, the cost is still year by year increase.

> On Wednesday, IBM released its annual "Data Breach Cost Report" , which stated that the average cost of a data breach is now $3.86 million. Although this average is down by 1.5% compared to 2019, when more than 50 million consumer records are involved, the remediation cost of these "ultra-large" data breaches may be as high as US$392 million, up from 3.88 in 2019 One hundred million U.S. dollars.

> If an organization acts as the data controller for 40-50 million records, the average cost is US$364 million, and the organization may face a cost of up to US$175 per consumer record involving data theft or leakage. The research was conducted by the Ponemon Institute and included interviews with more than 3,200 security professionals who worked at companies that experienced data breaches in the past year.

> As highlighted by the recent Twitter hacking incident, leaked employees and internal accounts are one of the most expensive factors in data breaches today, making the average cost of a data breach as high as $4.77 million. When it comes to internal accounts, 80% of incidents result in exposure of customer records. In total, stolen or leaked account credentials – along with cloud misconfigurations – accounted for nearly 40% of security incidents.

> IBM said that in one-fifth of data breaches, leaked account credentials were used as an attacker's entry point, resulting in more than 8.5 billion records exposed in 2019 alone. Cloud misconfiguration accounted for nearly 20% of network vulnerabilities. Exploiting third-party vulnerabilities, such as zero-day or unpatched security vulnerabilities in enterprise software, is also an expensive factor in data leakage. If an enterprise company suffers a data breach due to such vulnerabilities, it is estimated that it will be compensated up to $4.5 million.

> State-sponsored attacks, including those carried out by Advanced Persistent Threats (APT) organizations, are far less common, accounting for only 13% of the overall data breaches reported by companies. However, when these threat actors are involved, the losses they cause often result in higher recovery costs, representing an average of US$4.43 million.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘hack android via termux/Linux - AndroBugs Framework is an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications. No splendid GUI interface, but the most efficient (less than 2 minutes per scan in average) and more accurate.

F E A T U R E S :

-Find security vulnerabilities in an Android app
-Check if the code is missing best practices
-Check dangerous shell commands (e.g. β€œsu”)
-Collect Information from millions of apps
-Check the app’s security protection (marked as <Hacker>, designed for app repackaging hacking)

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣FOR LINUX - Termux (root)

1) CLONE https://github.com/AndroBugs/AndroBugs_Framework

2) cd AndroBugs_Framework

3) python androbugs.py -f [APK file]

> python androbugs.py -h

Usage of Massive Analysis Tools for Unix/Linux
Prerequisite: Setup MongoDB and config your own MongoDB settings in "androbugs-db.cfg"

4) To run the massive analysis for AndroBugs Framework:####

> python AndroBugs_MassiveAnalysis.py -b [Your_Analysis_Number] -t [Your_Analysis_Tag] -d [APKs input directory] -o [Report output directory]
Example:

5) To get the summary report and all the vectors of massive analysis:

> python AndroBugs_MassiveAnalysis.py -b 20151112 -t BlackHat -d ~/All_Your_Apps/ -o ~/Massive_Analysis_Reports


python AndroBugs_ReportSummary.py -m massive -b [Your_Analysis_Number] -t [Your_Analysis_Tag]

πŸ¦‘Example:

> python AndroBugs_ReportSummary.py -m massive -b 20151112 -t BlackHat

6) To list the potentially vulnerable apps by Vector ID and Severity Level (Log Level):####

>python AndroBugs_ReportByVectorKey.py -v [Vector ID] -l [Log Level] -b [Your_Analysis_Number] -t [Your_Analysis_Tag]
python AndroBugs_ReportByVectorKey.py -v [Vector ID] -l [Log Level] -b [Your_Analysis_Number] -t [Your_Analysis_Tag] -a
Example:

7) python AndroBugs_ReportByVectorKey.py -v WEBVIEW_RCE -l Critical -b 20151112 -t BlackHat

> python AndroBugs_ReportByVectorKey.py -v WEBVIEW_RCE -l Critical -b 20151112 -t BlackHat -a

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE HACKING
Forwarded from UNDERCODE HACKING
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Topic 2020 LInux Ip Spoof - SIP-CRACK is a password cracker & much more ...
> SIP-CRACK is a password cracker. Again, it uses the same sniffing mechanism and it allows you to catch the SIP REGISTER messages, extract the authentication data such as hash values. You can do brute-force based cracking, or you can choose dictionary or rainbow table cracking. So SIP is a time critical protocol and cracking should be an offline attack.
(follow
us youtube.com/undercode πŸ™ˆ)

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) open terminal and type :

> pip install netifaces pip install ipaddress pip install pyfiglet

2) or via apt

> apt-get install python-scapy

βž–for manual install you can clone https://github.com/meliht/Mr.SIP

πŸ¦‘E X A M P L E :

3) ./mr.sip.py --ns --tn <target_ip> --dp=5060

4) ./mr.sip.py --ns --tn <target_network_range> --dp=5060 ./mr.sip.py --ns --tn <target_network_address> --dp=5060

NOTE-1: <target_network_range> should be like 192.168.1.10-192.168.1.20

NOTE-2: <target_network> should be like 192.168.1.0 NOTE-3: You can specify the output by -i <output_file_name>. By default the output will be written to ip_list.txt file which is already exists in the repo. SIP-ENUM uses that file as an input.

NOTE-3: Default destionation port 5060, if not given.

4) Call flow created by SIP-NES on the target SIP server:

> sudo ngrep -W byline -d eth0 port 5060

5) SIP-ENUM usage:

./mr.sip.py --se --dp=5060 --fu=fromUser.txt

NOT-1: SIP-ENUM uses ip_list.txt file as an input.

6) Call flow created by SIP-NES on the target SIP server:

sudo ngrep -W byline -d eth0 port 5060


for More :
https://github.com/meliht/Mr.SIP

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BlackWeb - termux/linux

> Blackweb is a project that collects and unifies public blocklists of domains (porn, downloads, drugs, malware, spyware, trackers, bots, social networks, warez, weapons, etc.) to make them compatible with Squid-Cache

> Blackweb es un proyecto que recopila y unifica listas pΓΊblicas de bloqueo de dominios (porno, descargas, drogas, malware, spyware, trackers, bots, redes sociales, warez, armas, etc) para hacerlas compatibles con Squid-Cache

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone --depth=1 https://github.com/maravento/blackweb.git

( download )

> wget -q -N https://raw.githubusercontent.com/maravento/blackweb/master/blackweb.tar.gz && cat blackweb.tar.gz* | tar xzf - )

2) cd blackweb

3) wget -q -N https://raw.githubusercontent.com/maravento/blackweb/master/checksum.md5
md5sum blackweb.txt | awk '{print $1}' && cat checksum.md5 | awk '{print $1}'

πŸ¦‘E X A M P L E S :

> blackweb.txt (e.g.: .youtube.com .googlevideo.com, .ytimg.com, etc) / Usar blockdomains.txt para agregar dominios no incluidos en blackweb.txt (ejemplo: .youtube.com .googlevideo.com, .ytimg.com, etc.)

> acl allowdomains dstdomain "/path_to/allowdomains.txt"
acl blockdomains dstdomain "/path_to/blockdomains.txt"
acl blackweb dstdomain "/path_to/blackweb.txt"
http_access allow allowdomains
http_access deny blockdomains
http_access deny blackweb

enjoyβ€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘FULL ANONIMITY GUIDE BY UNDERCODE
πŸ¦‘1️⃣What is Whonix
Whonix is a Linux-based operating system focused on anonymity and security. It is designed to hide the user's IP address / location and uses the Tor network to anonymize data traffic. This means that the server being accessed and the Tor network operators cannot easily determine which sites are being visited or the user's physical location.


2️⃣WHY ?
> Choice: Whonix, Tails, Tor Browser ...
Whonix is ​​not the only operating system for anonymity. Another analogue is Tails . Like Whonix , Tails also uses Tor , so the question might be: Why is an operating system that uses Tor better than the Tor browser ?

The choice of anonymity tool will largely depend on your needs.

The Tor browser will suffice if you want to bypass site blocking or want to hide your IP address in non-crete situations.

The Tails operating system is designed for those situations where not only it is critical to maintain anonymity, but also in the event of a physical seizure of a computer, make it impossible to collect evidence. For this, for example, in Tails it is impossible to save files except on a specially created encrypted storage. Program and operating system settings, like the history of any activity, are not saved by default either. To enable this you need to read the instructions - safe but not convenient. In practice, many users do not need such measures. See also Tails Guide .
3️⃣Which version of Whonix to download

> To run Whonix, you need a free program for working with virtual machines - VirtualBox .

To broaden your horizons , the VirtualBox Manual is recommended , at least read about installing this program into your operating system:

1) Installing VirtualBox on Windows

2) Installing VirtualBox on Linux

<> Go to the Whonix download page on the official website: https://www.whonix.org/wiki/Download
4️⃣In fact, Whonix for Windows and Linux is no different, since it runs in a virtual machine, so when you click on any download link, you will find yourself on the next page where you will have to choose between:

A) Whonix with XFCE (recommended for beginners) - Whonix operating system with a graphical interface (recommended for beginners)

B) Whonix with CLI is a command line only operating system.
Select " Whonix with XFCE " - you will be taken to the next page, where to download you need to press the big green button.
5️⃣How to install Whonix ?

The file will be downloaded with the extension .ova of the form Whonix-XFCE - *. Ova . Run it with a double click - if you already have VirtualBox installed, this file will automatically open in it.

Just click the " Import " button

6️⃣What is Whonix-Gateway and Whonix-Workstation ?


1) Whonix-Gateway is a gateway. It is a specially configured Linux d>stribution that runs Tor, but cannot run applications. Purpose - to provide Internet access for Whonix-Workstation , that is, to be a gateway. Whonix-Workstation can work without Whonix-Gateway, but the workstation will not have Internet access.

2) Whonix-Workstation is a complete Linux operating system that can run applications. This OS also has special Internet settings - access to the global network is possible only through the Whonix-Gateway .

3) The settings of the Whonix-Gateway virtual machine can be left by default, since it is not very resource -intensive, and you can add resources to the Whonix-Workstation , in particular, RAM. To do this, right-click on Whonix-Workstation and click " Configure ".

4) Go to the " System " tab and increase the size of the " Main memory

]