UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
🦑WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
Forwarded from UNDERCODE NEWS
Go up against the breeze! Google aims to amend guidance to reiterate that its charging scheme must be used for in-app transactions.
#international
_
Forwarded from UNDERCODE NEWS
WeChat ate up my phone space before software swallowed the world
#Vulnerabilities
_
Forwarded from UNDERCODE NEWS
The Bank of China will stop moving money from the cell phone edition of Windows Phone tomorrow.
#Updates
_
Forwarded from UNDERCODE NEWS
Microsoft CEO talks about the negotiation of acquiring Tiktok: the taste has changed, I will never participate
#international
_
Forwarded from UNDERCODE NEWS
Why Telegram Yesterday Blocked ?
#international
_
Forwarded from UNDERCODE COMMUNITY
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑2020 ANDROID MALWARE:

Generic Android Deobfuscator
:

Simplify virtually executes an app to understand its behavior and then tries to optimize the code so that it behaves identically but is easier for a human to understand. Each optimization type is simple and generic, so it doesn't matter what the specific type of obfuscation is used.

🄸🄽🅂🅃🄰🄻🄻🄸🅂🄰🅃🄸🄾🄽 & 🅁🅄🄽 :

1) Building requires the Java Development Kit 8 (JDK) to be installed.

Because this project contains submodules for Android frameworks, either clone with --recursive:

git clone --recursive https://github.com/CalebFenton/simplify.git
Or update submodules at any time with:

git submodule update --init --recursive

2) Then, to build a single jar which contains all dependencies:

./gradlew fatjar

3) The Simplify jar will be in simplify/build/libs/. You can test it's working by simplifying the provided obfuscated example app. Here's how you'd run it (you may need to change simplify.jar):

java -jar simplify/build/libs/simplify.jar -it 'org/cf/obfuscated' -et 'MainActivity' simplify/obfuscated-app.a

🦑FULL USAGE & EXAMPLE :

https://github.com/CalebFenton/simplify

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑TERMUX HACKING TOOLS LIST & USAGE :

- [Clickjacking-Tester](https://github.com/D4Vinci/Clickjacking-Tester) - A python script designed to check if the website if vulnerable of clickjacking and create a poc.[![->](https://img.shields.io/github/stars/D4Vinci/Clickjacking-Tester.svg?style=social&label=Star&maxAge=2592000)](https://github.com/D4Vinci/Clickjacking-Tester/stargazers/)

- [Dr0p1t-Framework](https://github.com/D4Vinci/Dr0p1t-Framework) - A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks.[![->](https://img.shields.io/github/stars/D4Vinci/Dr0p1t-Framework.svg?style=social&label=Star&maxAge=2592000)](https://github.com/D4Vinci/Dr0p1t-Framework/stargazers/)

- [elpscrk](https://github.com/D4Vinci/elpscrk) - A Common User Passwords generator script that looks like the tool Eliot used it in Mr.Robot Series Episode 01 :D :v.[![->](https://img.shields.io/github/stars/D4Vinci/elpscrk.svg?style=social&label=Star&maxAge=2592000)](https://github.com/D4Vinci/elpscrk/stargazers/)

- [SecLists](https://github.com/danielmiessler/SecLists) - SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more..[![->](https://img.shields.io/github/stars/danielmiessler/SecLists.svg?style=social&label=Star&maxAge=2592000)](https://github.com/danielmiessler/SecLists/stargazers/)

- [dnsrecon](https://github.com/darkoperator/dnsrecon) - DNS Enumeration Script.[![->](https://img.shields.io/github/stars/darkoperator/dnsrecon.svg?style=social&label=Star&maxAge=2592000)](https://github.com/darkoperator/dnsrecon/stargazers/)

- [HiddenEye](https://github.com/DarkSecDevelopers/HiddenEye) - Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ].[![->](https://img.shields.io/github/stars/DarkSecDevelopers/HiddenEye.svg?style=social&label=Star&maxAge=2592000)](https://github.com/DarkSecDevelopers/HiddenEye/stargazers/)

- [Intersect-2.5](https://github.com/deadbits/Intersect-2.5) - Post-Exploitation Framework.[![->](https://img.shields.io/github/stars/deadbits/Intersect-2.5.svg?style=social&label=Star&maxAge=2592000)](https://github.com/deadbits/Intersect-2.5/stargazers/)

- [wifite](https://github.com/derv82/wifite) - No description provided[![->](


@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE NEWS
New category called Bugs added to UndercodeNews.com
Forwarded from UNDERCODE COMMUNITY
The Fully Remote Attack Surface of the iPhone .pdf
308.4 KB
The Fully Remote Attack Surface of the iPhone


While there have been several rumours and reports of fully remote vulnerabilities affecting the iPhone being used by attackers in the last couple of years, limited information is available about the technical details of these vulnerabilities, as well as the underlying attack surface they occur in. I investigated the remote, interaction-less attack surface of the iPhone, and found several serious vulnerabilities.
Vulnerabilities are considered ‘remote’ when the attacker does not require any physical or network proximity to the target to be able to use the vulnerability. Remote vulnerabilities are described as ‘fully remote’, ‘interaction-less’ or ‘zero click’ when they do not require any physical interaction from the target to be exploited, and work in real time. I focused on the attack surfaces of the iPhone that can be reached remotely, do not require any user interaction and immediately process input.
There are several
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑🗄WTLAN | Five Key Considerations When Choosing Floor Standing Server Cabinets ?

1) Server cabinet cooling systems
The choice of server cabinet will depend on the cooling system implemented in your data center and server room.

Hot Aisle Containment (HAC) and Cold Aisle Containment (CAC) systems are highly efficient air control processes that optimize the use of cold air by improving the flow of chilled air through aisles and server enclosures.
In connection with the increase in the cost of electricity energy planning it is also an important factor to be taken into account, because such action may include reducing the amount of used by the PDU, rack selection with improved cabling and space for ventilation.
Follow the link to view the solutions from WTLAN - https://wtlan.ru/catalog/Napolnyeshkafy/

2) Power management
Power distribution units (PDUs) and backup battery are also important factors to consider when choosing a server cabinet and the number of outlets required.

Remote power tools such as smart power strips can help reduce server downtime, and reboot problems can be resolved from a remote location via internet access, whereas standard power strips can provide vital information and must be locally controlled.

3) Server cabinet size
Server cabinets and internal racks are available in a wide range of sizes up to 48U, 19 '' and ETSI standard, in a wide range of widths from 600 mm, 800 mm and 1000 mm, in a wide range of depths from 600 mm, 800 mm, 900 mm, 1000 mm and 1200 mm.

Key features and benefits may include: - modular design, factory assembled, bay design (using a docking kit), hybrid design, thermal efficiency, hot and cold aisle isolation, robust locking solutions, a variety of cabling and accessory options.

4) Security
Companies are constantly looking for ways to improve their security solutions, as security and protection are very important for a growing number of businesses to protect against vandalism.

Floor-standing server cabinets can provide the following security options: - fire protection, highly reliable locking solutions

Additional measures include lockable front and rear doors, limiting the number of windows in a building and ensuring safe entrances and exits, and installing video surveillance for additional security measures.

5) Server cabinet design
Selecting the right server cabinets and racks and installing them according to your business needs will keep your IT equipment running reliably and efficiently and help improve power protection, cabling, and physical security.

When designing a server cabinet, consider: - the height of the internal cabinet, width, depth, and rated load, cabinet layout, room characteristics, electrical equipment placement, cabling and environmental protection.

You can also choose from several cabinet options and accessories, including: - cable trunking kit, chassis rail kit, shelves, top and side panels, mounting rails, heavy duty wheel kit, and paint color.


@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE NEWS
Apple’s trick! The device cannot be reinstalled after deleting it
#Bugs
_
Forwarded from UNDERCODE NEWS
Thirteen companies have formed a coalition against Apple’s monopoly
#international
_
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑🕵️What you need for Anonymity and security ?

1) Setting up the working environment. Improved and revised work with virtual machines (perhaps the only analogy with the previous course);

2) Fine work with different cryptocurrencies;

3) Selection, rental, administration and protection of VPS (70% of the work in the course takes place on servers);

4) Lifting and configuring services on VPS and working with them;

5) Fine work with Tor services;

6) Squeezing the maximum out of the Raspberry Pi;

7) Anonymous routers;

8) Lifting, configuring and administering the Tor node;

9) Work with PC hardware. Removing hardware bookmarks;

10) Risk minimization and ... authoring.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE NEWS
How a Nigerian hacker made over $ 1,000,000 from printer cartridges
#CyberAttacks.
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑VECTOR IN C++:
#FastTips

1) Assigning
a Vector during Construction
During construction, an empty vector can be created while another one is assigned to it, as follows:

vector <float> vtr1{1.1, 2.2, 3.3, 4.4};
vector <float> vtr2 =vtr1;

2) The second statement is equivalent to:

vector <float> vtr2 = {1.1, 2.2, 3.3, 4.4};
const Vector

3) A const vector is a vector whose elements cannot be changed. The values in this vector are read-only. When created, the vector appears as follows:

const vector <float> vtr{1.1, 2.2, 3.3, 4.4};

4) In this vector type, no element can be added or removed. Moreover, no value can be changed.

🦑Constructing with Iterator

1) A template provides a generic representation for a data type. An iterator provides a generic representation of scanning through the values of a container. The syntax to create a vector with an iterator is as follows:

template<class InputIterator>
vector(InputIterator first, InputIterator last,const Allocator& = Allocator());

2) This constructs a vector for the range [first, last) using the specified allocator, which will be discussed later in this article.

3) Destroying a Vector
To destroy a vector, simply allow it to go out of scope and destroy is handled automatically.

Vector Capacity
size_type capacity() const noexcept

4) The total number of elements the vector can hold without requiring reallocation is returned by the capacity member function. A code segment for this is as follows:

vector <float> vtr(4);
int num = vtr.capacity();
cout << num << '\n';
The output is 4.

reserve(n)

5) Memory space is not always freely available. Extra space can be reserved in advance. Consider the following code segment:

vector <float> vtr(4);
vtr.reserve(6);
cout << vtr.capacity() << '\n';

6) The output is 6. So, the extra space reserved is 6 – 4 = 2 elements. The function returns void.

size() const noexcept


This returns the number of elements in the vector. The following code illustrates this function:

vector <float> vtr(4);
float sz = vtr.size();
cout << sz << '\n';
The output is 4.

shrink_to_fit()

After giving extra capacity to a vector with the reserve() function, the vector can be sized down to fit to its original size. The following code illustrates this:

vector <float> vtr(4);
vtr.reserve(6);
vtr.shrink_to_fit();
int sz = vtr.size();
cout << sz << '\n';
The output is 4 and not 6. The function returns void.

▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE NEWS
Another 5G-6G low-orbit satellite plans to be deployed before the end of next year''
#Technologies.