β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME VERIFIED BINS :
> Bin Spotify
Bin: 43476953xxxxxxxx
Date/CCV: Random
Zip Code: 10080
IP: USA
> BIN SHUDDER 1 MONTH
BIN: 5392249xxxxxxxxx
IP: USA πΊπΈ 10080
PROMO CODE: SHUTIN
> Bin google ads
536517xxxxxxxxxx
IP: BRAZIL
>Bin For WWE Network Premium
BIN: 52187011xxxxxxxx
IP: USA πΊπΈ NY STREET 1xx
10080
LINK: https://www.wwe.com/wwenetwork
> Bin NameCheap vpn
650159xxxxxxxxxx
Ip USA
10080
π¦Those bin Only veriified by Us & not created
> use for learn
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME VERIFIED BINS :
> Bin Spotify
Bin: 43476953xxxxxxxx
Date/CCV: Random
Zip Code: 10080
IP: USA
> BIN SHUDDER 1 MONTH
BIN: 5392249xxxxxxxxx
IP: USA πΊπΈ 10080
PROMO CODE: SHUTIN
> Bin google ads
536517xxxxxxxxxx
IP: BRAZIL
>Bin For WWE Network Premium
BIN: 52187011xxxxxxxx
IP: USA πΊπΈ NY STREET 1xx
10080
LINK: https://www.wwe.com/wwenetwork
> Bin NameCheap vpn
650159xxxxxxxxxx
Ip USA
10080
π¦Those bin Only veriified by Us & not created
> use for learn
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
2020 Practical Ethical Hacking - The Complete Course 11.95 GB
#REQUESTED #REPOSTED
https://www.udemy.com/course/practical-ethical-hacking/
https://mega.nz/folder/XAhmyIBY#z2RJ40zWY3K4N9_ibjG6Uw
#REQUESTED #REPOSTED
https://www.udemy.com/course/practical-ethical-hacking/
https://mega.nz/folder/XAhmyIBY#z2RJ40zWY3K4N9_ibjG6Uw
Udemy
Online Courses - Learn Anything, On Your Schedule | Udemy
Udemy is an online learning and teaching marketplace with over 250,000 courses and 80 million students. Learn programming, marketing, data science and more.
Forwarded from UNDERCODE HACKING
Decrypting_TLS_Browser_Traffic_With_Wireshark_β_The_Easy_Way!.pdf
1 MB
Decrypting TLS Browser Traffic With Wireshark β The Easy Way! #tutorial
Forwarded from Backup Legal Mega
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME UDEMY PACK- HIGH RATING -2020 -
1οΈβ£Carding Vids
https://mega.nz/folder/03IHyIYa#eWDB-A42w_Qgi7b3u9FMyg
2οΈβ£2020 CCNA Data Center DCICN 200-150 & DCICT 200-155
https://mega.nz/folder/V25AlQwC#UnAZ5lhW8eit1L9hCjSa0Q
3οΈβ£Curso Hacking
https://mega.nz/folder/x3Y3hILb#uIIyryhrMF5bUEGQKc9IqA
3οΈβ£Digital Character Illustration Create A Memorable Whimsical Character
https://mega.nz/folder/giIAhIqR#4EWS8Qh-xu1l4FTLYVtAfA
4οΈβ£Packt - Building Web Servers in Java
https://mega.nz/folder/d3ZmgQbC#7jWhIWPp9Fr7kC4IN30AJA
5οΈβ£Packt - Kubernetes in 7 Days
https://mega.nz/folder/lv4j2KQC#dLqUWCmP4fOQTeV6_IAlIQ
6οΈβ£Pluralsight - NativeScript-AnimationTechniques
https://mega.nz/folder/57AwXIjY#yRK4ONTav6V32DaYnfxwMg
7οΈβ£Udemy - Learn about Python and Blockchain The Complete Guide
https://mega.nz/folder/1q4nXaSD#a3OuvWFPQxOhcm5IHdq2bw
E N J O Y β€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME UDEMY PACK- HIGH RATING -2020 -
1οΈβ£Carding Vids
https://mega.nz/folder/03IHyIYa#eWDB-A42w_Qgi7b3u9FMyg
2οΈβ£2020 CCNA Data Center DCICN 200-150 & DCICT 200-155
https://mega.nz/folder/V25AlQwC#UnAZ5lhW8eit1L9hCjSa0Q
3οΈβ£Curso Hacking
https://mega.nz/folder/x3Y3hILb#uIIyryhrMF5bUEGQKc9IqA
3οΈβ£Digital Character Illustration Create A Memorable Whimsical Character
https://mega.nz/folder/giIAhIqR#4EWS8Qh-xu1l4FTLYVtAfA
4οΈβ£Packt - Building Web Servers in Java
https://mega.nz/folder/d3ZmgQbC#7jWhIWPp9Fr7kC4IN30AJA
5οΈβ£Packt - Kubernetes in 7 Days
https://mega.nz/folder/lv4j2KQC#dLqUWCmP4fOQTeV6_IAlIQ
6οΈβ£Pluralsight - NativeScript-AnimationTechniques
https://mega.nz/folder/57AwXIjY#yRK4ONTav6V32DaYnfxwMg
7οΈβ£Udemy - Learn about Python and Blockchain The Complete Guide
https://mega.nz/folder/1q4nXaSD#a3OuvWFPQxOhcm5IHdq2bw
E N J O Y β€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
mega.nz
231.05 MB folder on MEGA
13 files
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The secure boot function exposes a new BootHole vulnerability affecting a large number of Linux and Windows systems :
#News
> The security research company Eclypsium has just exposed a new vulnerability in the Secure Boot function and named it BootHole. It especially exists in the GRUB2 file of Secure Boot, which allows the attacker to achieve "nearly complete control" of the victim's system. Moreover, both Linux and a large number of Windows operating systems will be affected by this vulnerability in the UEFI firmware.
> Eclypsium pointed out that as long as the standard Microsoft third-party UEFI certificate authorization is used, these Windows devices that support the Secure Boot function will be affected by the BootHole vulnerability, including a large number of Windows desktops, notebooks, workstations, servers, and other related technical fields.
> Given that Secure Boot is very important to control the boot process, the influence of BootHole vulnerability is also evident. For an attacker, it can execute arbitrary malicious code before the operating system is loaded, while avoiding the control of multiple security measures, and finally allows it to gain almost complete control of the target system.
#News
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The secure boot function exposes a new BootHole vulnerability affecting a large number of Linux and Windows systems :
#News
> The security research company Eclypsium has just exposed a new vulnerability in the Secure Boot function and named it BootHole. It especially exists in the GRUB2 file of Secure Boot, which allows the attacker to achieve "nearly complete control" of the victim's system. Moreover, both Linux and a large number of Windows operating systems will be affected by this vulnerability in the UEFI firmware.
> Eclypsium pointed out that as long as the standard Microsoft third-party UEFI certificate authorization is used, these Windows devices that support the Secure Boot function will be affected by the BootHole vulnerability, including a large number of Windows desktops, notebooks, workstations, servers, and other related technical fields.
> Given that Secure Boot is very important to control the boot process, the influence of BootHole vulnerability is also evident. For an attacker, it can execute arbitrary malicious code before the operating system is loaded, while avoiding the control of multiple security measures, and finally allows it to gain almost complete control of the target system.
#News
β β β Uππ»βΊπ«Δπ¬πβ β β β
Beginner Tips to Own Boxes at HackTheBox !.pdf
1.2 MB
Helful Tips
> Beginner Tips to Own Boxes at HackTheBox !
> Beginner Tips to Own Boxes at HackTheBox !
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WEB HACKING TIPS BY UNDERCODE :
#fastTips
1. Use website filtering to bypass the background verification directly, add admin/session.asp or admin/left.asp behind the website
2. When some websites enter the background, a script prompt box will appear, enter: administrator to break! admin means to enter as an administrator.
3. Some websites have opened 3389. Before hacking, connect to 3389 first, try a weak password or blast, and then press the shift key 5 times to see if anyone has installed the back door, and then the social work password.
4. Sometimes a prompt box "Please log in" will pop up when entering the background, copy the address out (you can't copy it), and then put it in the webpage source code analyzer, select the browser-intercept jump check-check to enter the background!
5. Break through the anti-theft chain to access webshell, code:
Copy codecode show as below:
javascript:document.write("<a href='http://www.example.com/uploadfile/1.asp'>fuck</a>")
After pressing enter, click GO to enter the webshell
6. Break through the first-class information monitoring interception system access. When the pony can access but uploading to Malaysia is not possible, you can use Malaysia to merge with a picture first, upload the merged picture, and then access after the database is backed up!
7. When taking the editor's shell, sometimes adding asp|asa|cer|php|aspx and other extensions are filtered when uploading, in fact, as long as adding aaspsp and uploading asp will break through.
8. Sometimes D has guessed the table segment, but when you canβt guess the field, you can go to the background to view the source file, search for ID or type, you can usually find it, and then add a field to D to guess the content to break through .
9. This technique can be used for the social work background password. If the website domain name is: exehack.Net and the administrator name is admin, you can try the passwords "exehack" and "exehack.net" to log in.
10. If the website filters and 1=1 and 1=2 during manual injection, you can use xor 1=1 xor 1=2 to judge.
11. The local structure uploads a one-sentence Trojan. If it prompts "Please select the file you want to upload! [Re-upload]", the file is too small. Open it with Notepad and copy a few more sentences to enlarge the file size before uploading OK.
12. Use ah d to stop the watch, run the field name name and pass can not come out, the display length exceeds 50 or something, if you can't figure it out, you can usually run out of pangolins at this time!
13. Guess the administrator background tips, admin/left.asp, admin/main.asp, admin/top.asp, admin/admin.asp will show the menu navigation, and then Thunder download all links.
14. Know the table name, field, use SQL statement to add a user name and password statement in the ACCESS database:
Insert into admin(user,pwd) values('test','test')
15. When you get the administrator's password, but you can't get the administrator's account, go to the front desk to open a news item and look for words such as "submitter" and "publisher". Generally, the "submitter" is the administrator's Account now.
16. The absolute web path of the website set up by blasting ASP+IIS, assuming that the home page of the website is: http://www.xxxxx/index.asp/ Submit http://www.xxxxx.cn/fkbhvv.aspx/, fkbhvv.aspx is nonexistent.
17. Utilization of source code, many websites use source code downloaded from the Internet. Some webmasters are lazy and donβt change anything, and then upload and open the website. We can download a set, which contains a lot of default information worthy of use.
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WEB HACKING TIPS BY UNDERCODE :
#fastTips
1. Use website filtering to bypass the background verification directly, add admin/session.asp or admin/left.asp behind the website
2. When some websites enter the background, a script prompt box will appear, enter: administrator to break! admin means to enter as an administrator.
3. Some websites have opened 3389. Before hacking, connect to 3389 first, try a weak password or blast, and then press the shift key 5 times to see if anyone has installed the back door, and then the social work password.
4. Sometimes a prompt box "Please log in" will pop up when entering the background, copy the address out (you can't copy it), and then put it in the webpage source code analyzer, select the browser-intercept jump check-check to enter the background!
5. Break through the anti-theft chain to access webshell, code:
Copy codecode show as below:
javascript:document.write("<a href='http://www.example.com/uploadfile/1.asp'>fuck</a>")
After pressing enter, click GO to enter the webshell
6. Break through the first-class information monitoring interception system access. When the pony can access but uploading to Malaysia is not possible, you can use Malaysia to merge with a picture first, upload the merged picture, and then access after the database is backed up!
7. When taking the editor's shell, sometimes adding asp|asa|cer|php|aspx and other extensions are filtered when uploading, in fact, as long as adding aaspsp and uploading asp will break through.
8. Sometimes D has guessed the table segment, but when you canβt guess the field, you can go to the background to view the source file, search for ID or type, you can usually find it, and then add a field to D to guess the content to break through .
9. This technique can be used for the social work background password. If the website domain name is: exehack.Net and the administrator name is admin, you can try the passwords "exehack" and "exehack.net" to log in.
10. If the website filters and 1=1 and 1=2 during manual injection, you can use xor 1=1 xor 1=2 to judge.
11. The local structure uploads a one-sentence Trojan. If it prompts "Please select the file you want to upload! [Re-upload]", the file is too small. Open it with Notepad and copy a few more sentences to enlarge the file size before uploading OK.
12. Use ah d to stop the watch, run the field name name and pass can not come out, the display length exceeds 50 or something, if you can't figure it out, you can usually run out of pangolins at this time!
13. Guess the administrator background tips, admin/left.asp, admin/main.asp, admin/top.asp, admin/admin.asp will show the menu navigation, and then Thunder download all links.
14. Know the table name, field, use SQL statement to add a user name and password statement in the ACCESS database:
Insert into admin(user,pwd) values('test','test')
15. When you get the administrator's password, but you can't get the administrator's account, go to the front desk to open a news item and look for words such as "submitter" and "publisher". Generally, the "submitter" is the administrator's Account now.
16. The absolute web path of the website set up by blasting ASP+IIS, assuming that the home page of the website is: http://www.xxxxx/index.asp/ Submit http://www.xxxxx.cn/fkbhvv.aspx/, fkbhvv.aspx is nonexistent.
17. Utilization of source code, many websites use source code downloaded from the Internet. Some webmasters are lazy and donβt change anything, and then upload and open the website. We can download a set, which contains a lot of default information worthy of use.
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦All Port Numbers :
1 TCP Port Service Multiplexer (TCPMUX)
5 Remote Job Entry (RJE)
7 ECHO
18 Message Send Protocol (MSP)
20 FTP -- Data
21 FTP -- Control
22 SSH Remote Login Protocol
23 Telnet
25 Simple Mail Transfer Protocol (SMTP)
29 MSG ICP
37 Time
42 Host Name Server (Nameserv)
43 WhoIs
49 Login Host Protocol (Login)
53 Domain Name System (DNS)
69 Trivial File Transfer Protocol (TFTP)
70 Gopher Services
79 Finger
80 HTTP
103 X.400 Standard
108 SNA Gateway Access Server
109 POP2
110 POP3
115 Simple File Transfer Protocol (SFTP)
118 SQL Services
119 Newsgroup (NNTP)
137 NetBIOS Name Service
139 NetBIOS Datagram Service
143 Interim Mail Access Protocol (IMAP)
150 NetBIOS Session Service
156 SQL Server
161 SNMP
179 Border Gateway Protocol (BGP)
190 Gateway Access Control Protocol (GACP)
194 Internet Relay Chat (IRC)
197 Directory Location Service (DLS)
389 Lightweight Directory Access Protocol (LDAP)
396 Novell Netware over IP
443 HTTPS
444 Simple Network Paging Protocol (SNPP)
445 Microsoft-DS
458 Apple QuickTime
546 DHCP Client
547 DHCP Server
563 SNEWS
569 MSN
1080 Socks
enjoyβ€οΈππ»
powered by wiki
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦All Port Numbers :
1 TCP Port Service Multiplexer (TCPMUX)
5 Remote Job Entry (RJE)
7 ECHO
18 Message Send Protocol (MSP)
20 FTP -- Data
21 FTP -- Control
22 SSH Remote Login Protocol
23 Telnet
25 Simple Mail Transfer Protocol (SMTP)
29 MSG ICP
37 Time
42 Host Name Server (Nameserv)
43 WhoIs
49 Login Host Protocol (Login)
53 Domain Name System (DNS)
69 Trivial File Transfer Protocol (TFTP)
70 Gopher Services
79 Finger
80 HTTP
103 X.400 Standard
108 SNA Gateway Access Server
109 POP2
110 POP3
115 Simple File Transfer Protocol (SFTP)
118 SQL Services
119 Newsgroup (NNTP)
137 NetBIOS Name Service
139 NetBIOS Datagram Service
143 Interim Mail Access Protocol (IMAP)
150 NetBIOS Session Service
156 SQL Server
161 SNMP
179 Border Gateway Protocol (BGP)
190 Gateway Access Control Protocol (GACP)
194 Internet Relay Chat (IRC)
197 Directory Location Service (DLS)
389 Lightweight Directory Access Protocol (LDAP)
396 Novell Netware over IP
443 HTTPS
444 Simple Network Paging Protocol (SNPP)
445 Microsoft-DS
458 Apple QuickTime
546 DHCP Client
547 DHCP Server
563 SNEWS
569 MSN
1080 Socks
enjoyβ€οΈππ»
powered by wiki
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
Passive Data Collecting_ Shodan.pdf
1.7 MB
Forwarded from WEB UNDERCODE - PRIVATE
Penetration Testing Your WordPress Website.pdf
718.9 KB
Forwarded from WEB UNDERCODE - PRIVATE
Polyglots_ The Ultimate XSS Payloads..pdf
291.5 KB
Forwarded from WEB UNDERCODE - PRIVATE
Reverse Engineering a Linux executable β hello world.pdf
417.1 KB
Forwarded from Backup Legal Mega
π¦ ANOTHER UDEMY 2019-2020 PACK :
1οΈβ£Code with Mosh - Angular 4 - Beginner to Pro
> https://mega.nz/folder/QZpXSaya#-3jLvY6VRQrRMpCVTA7Xbw
2οΈβ£Jeff Smith - Instant Email Profits
> https://mega.nz/folder/tV40GA6a#1yrej8OWFuIAUoFYWq_seg
3οΈβ£Linux Academy - Linux Foundation Certified Engineer (2019)
> https://mega.nz/folder/IIpXmJDT#6ddbNZXgZC7wJEqkOoc16A
4οΈβ£Lynda - Advertising on Facebook
> https://mega.nz/folder/4IglgAqD#IUlKpdoVJHkqCvSHYX5CEA
5οΈβ£Lynda - Data Acquisition with LabVIEW
> https://mega.nz/folder/oNYCRYjD#9hWG1OFO2gb4kjhvmVFrRA
6οΈβ£Lynda - Learning DaVinci Resolve 16
> https://mega.nz/folder/lZhVETKJ#kWG17bGqECh1kjm_GgP-1w
7οΈβ£Packt - TypeScript for JavaScript Developers
> https://mega.nz/folder/UYxFgByB#aeAhAGEOJVLQnuS8zygsxQ
8οΈβ£Pluralsight - Securing React Apps with Auth0
> https://mega.nz/folder/FJQHwCBB#A7zmoXg3WCGhIZr4VZGw3Q
9οΈβ£Pluralsight - Troubleshooting Slow Networks with Wireshark
> https://mega.nz/folder/dRxxFB4a#qTq9iRMUlaPcU7lgt7dyOg
πSkillshare - Natural Light Portrait Retouching in Photoshop Start to Finish
> https://mega.nz/folder/YFw1GBza#c6nNbrT9AoDYzu6R1l5Ueg
1οΈβ£1οΈβ£Stone River eLearning - Common PHP Errors You Will Encounter
> https://mega.nz/folder/tY5yhYjL#UTK35kOS7O4lHiavDQJVxQ
1οΈβ£2οΈβ£The Great Courses - Understanding Complexity
> https://mega.nz/folder/MFY0iKTT#iBTtPfd7P5Z_qehHX_o_WA
1οΈβ£3οΈβ£Top Secert
> https://mega.nz/folder/hJoxSbwD#oJXfTaxuPk4QCB6owh_Daw
1οΈβ£4οΈβ£Udemy - AWS Certified Cloud Practitioner 2019 β In Depth & Hands On!
> https://mega.nz/folder/oYwn2KLA#YDWBHeCtWkGgBMG4SpPklg
1οΈβ£5οΈβ£Udemy - Build your first Microservices application using Go and gRPC
> https://mega.nz/folder/oVoXAY4A#2cow0MfEHx5IeIyhNgBs3g
1οΈβ£6οΈβ£Udemy - Learn Figma - UIUX Design Essential Training
> https://mega.nz/folder/RNJEQYSL#FtZnp3LM-3ol0eP7FPOEbg
e n j o yβ€οΈππ»
1οΈβ£Code with Mosh - Angular 4 - Beginner to Pro
> https://mega.nz/folder/QZpXSaya#-3jLvY6VRQrRMpCVTA7Xbw
2οΈβ£Jeff Smith - Instant Email Profits
> https://mega.nz/folder/tV40GA6a#1yrej8OWFuIAUoFYWq_seg
3οΈβ£Linux Academy - Linux Foundation Certified Engineer (2019)
> https://mega.nz/folder/IIpXmJDT#6ddbNZXgZC7wJEqkOoc16A
4οΈβ£Lynda - Advertising on Facebook
> https://mega.nz/folder/4IglgAqD#IUlKpdoVJHkqCvSHYX5CEA
5οΈβ£Lynda - Data Acquisition with LabVIEW
> https://mega.nz/folder/oNYCRYjD#9hWG1OFO2gb4kjhvmVFrRA
6οΈβ£Lynda - Learning DaVinci Resolve 16
> https://mega.nz/folder/lZhVETKJ#kWG17bGqECh1kjm_GgP-1w
7οΈβ£Packt - TypeScript for JavaScript Developers
> https://mega.nz/folder/UYxFgByB#aeAhAGEOJVLQnuS8zygsxQ
8οΈβ£Pluralsight - Securing React Apps with Auth0
> https://mega.nz/folder/FJQHwCBB#A7zmoXg3WCGhIZr4VZGw3Q
9οΈβ£Pluralsight - Troubleshooting Slow Networks with Wireshark
> https://mega.nz/folder/dRxxFB4a#qTq9iRMUlaPcU7lgt7dyOg
πSkillshare - Natural Light Portrait Retouching in Photoshop Start to Finish
> https://mega.nz/folder/YFw1GBza#c6nNbrT9AoDYzu6R1l5Ueg
1οΈβ£1οΈβ£Stone River eLearning - Common PHP Errors You Will Encounter
> https://mega.nz/folder/tY5yhYjL#UTK35kOS7O4lHiavDQJVxQ
1οΈβ£2οΈβ£The Great Courses - Understanding Complexity
> https://mega.nz/folder/MFY0iKTT#iBTtPfd7P5Z_qehHX_o_WA
1οΈβ£3οΈβ£Top Secert
> https://mega.nz/folder/hJoxSbwD#oJXfTaxuPk4QCB6owh_Daw
1οΈβ£4οΈβ£Udemy - AWS Certified Cloud Practitioner 2019 β In Depth & Hands On!
> https://mega.nz/folder/oYwn2KLA#YDWBHeCtWkGgBMG4SpPklg
1οΈβ£5οΈβ£Udemy - Build your first Microservices application using Go and gRPC
> https://mega.nz/folder/oVoXAY4A#2cow0MfEHx5IeIyhNgBs3g
1οΈβ£6οΈβ£Udemy - Learn Figma - UIUX Design Essential Training
> https://mega.nz/folder/RNJEQYSL#FtZnp3LM-3ol0eP7FPOEbg
e n j o yβ€οΈππ»
mega.nz
File folder on MEGA
LINUX COMMANDS & TOOLS FULL.pdf
198.3 KB
All Popular Linux commands & tools