UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
πŸ¦‘WINDOWS EXPLOIT TUTORIALS + PICTURES

ENJOY
GET ALL KALI TOOLS ON TERMUX #fastTips

1) apt update

2) apt install git

3) git clone https://github.com/rajkumardusad/onex.git

4) chmod +x onex/install

5) sh onex/install if not work than use ./onex/install

6) COMMANDS :

onex install [tool_name] install any tool.
onex -i [tool_name] install any tool.
onex search [tool_name] search any tool.
onex -s [tool_name] search any tool.
onex list list all tools.
onex list -a list all tools.
onex -l list all tools.
onex -l -a list all tools.
onex help get help.
onex -h get help.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Which shortener url pay highest $ ?

1)
Shorte.ST stats :

No. of Registered users: 1,017,836
Total URLs shortened: 1,758,071,729
Total URLs clicked: 6,679,203
Highest CPM: $14.04 for US traffic

β–ͺ️www.Shorte.ST

2)
Adf.LY stats:
No. of Registered users: 5,373,907
Total URLs clicked: 1,413,375 daily clicks
Highest CPM: $22.18 for unique visits from the US
Worldwide CPM: $0.25 β€” $2.00

β–ͺ️ www.Adf.LY

3) Ouo.IO stats:

No. of Registered users: 1,080,000+
Total URLs shortened: 275,000,000+
Total URLs clicked: 1,200,000+ clicks per day
Highest CPM: $5 for AUS traffic
Worldwide CPM: $1.5

β–ͺ️www.Ouo.IO

4)
ShrinkMe.IO stats:
No. of Registered users: 9,161
Total URLs shortened: 93,110
Total URLs clicked: 1,740,721
Highest CPM: $22 for Greenland traffic
Worldwide CPM: $3.50

β–ͺ️www.ShrinkMe.IO

THIEIR
IS MANY MORE BUT THOSE ONLY STATS IN 2019-2020

E N J O Y β€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘Updated Beyond Beginner GameMaker Studio 2 - Creating A Full Tower Defense Game From Scratch for beginer & experts
β€”top ratingβ€”
β€”5.8 GBβ€”

https://www.skillshare.com/classes/Beyond-Beginner-GameMaker-Studio-2-Creating-A-Full-Tower-Defense-Game-From-Scratch/3495473

https://mega.nz/folder/LwsliQJQ#L4kJ4fWP-Yt7764-75HO4g
bitcoin-hacking-tools-.zip
187.4 KB
BITCOIN PYTHON BEST HACKING TOOLS
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ANOTHER BITCOIN HACKING
-Bruteforce wallet
The purpose of this program is to try to find the password of an
encrypted Peercoin (or Bitcoin, Litecoin, etc...) wallet file (i.e. wallet.dat).

It can be used in two ways:

βž–try all the possible passwords given a charset
βž–try all the passwords in a file
There is a command line option to specify the number of threads to use.

Sending a USR1 signal to a running bruteforce-wallet process makes it print progress and continue

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣apt install libdb-dev libssl-dev -y

2️⃣git clone https://github.com/glv2/bruteforce-wallet.git

3️⃣./autogen.sh

4️⃣Then, build the program with the commands:

./configure
make

5️⃣make install

6️⃣EXAMPLES :

1) Try to find the password of an encrypted wallet file using 4 threads, trying only passwords with 5 characters:

bruteforce-wallet -t 4 -l 5 -m 5 wallet.dat

2) Try to find the password of an encrypted wallet file using 8 threads, trying only passwords with 5 to 10 characters beginning with "W4l" and ending with "z":

bruteforce-wallet -t 8 -l 5 -m 10 -b "W4l" -e "z" wallet.dat

3) Try to find the password of an encrypted wallet file using 8 threads, trying only passwords with 10 characters using the character set "P8Ε­":

bruteforce-wallet -t 8 -l 10 -m 10 -s "P情8ŭ" wallet.dat

4) Try to find the password of an encrypted wallet file using 6 threads, trying the passwords contained in a dictionary file:

bruteforce-wallet -t 6 -f dictionary.txt wallet.dat

5) Print progress info:

pkill -USR1 -f bruteforce-wallet

6) Print progress info every 30 seconds:

bruteforce-wallet -t 6 -f dictionary.txt -v 30 wallet.dat

7) Save/restore state between sessions:

bruteforce-wallet -t 6 -f dictionary.txt -w state.txt wallet.dat

> (Let the program run for a few minutes and stop it)
bruteforce-wallet -t 6 -w state.txt wallet.dat

πŸ¦‘Tested by undercode on :

> parrot

> ubuntu

> kali

ENJOYβ€οΈπŸ‘πŸ»
βœ…Topic git
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Methode about- NEC broke a large number of security loopholes, or will affect all small and medium-sized enterprises and governments!
β–ͺ️Which methode they use ? & How ?

#News

Japan's NEC is one of the world's leading suppliers of IT and communication networks and one of the world's top 500 companies. NEC is mainly engaged in the research and development, cluster software, production and sales of IT services, platform business, operator networks, social infrastructure, personal solutions and other products. There are more than 15,000 products. NEC conducts business in more than 150 countries and regions around the world , Integrate advanced information technology and network technology to provide excellent comprehensive solutions to governments, enterprises and individuals.

However, on July 30, NEC was exposed to a large number of security vulnerabilities in its communications products and solutions. Many of its communications servers and telephone switches were recruited, which may affect all small and medium-sized enterprises and governments. It should be noted that these vulnerabilities that were exposed have existed last year.

The following are the details of the vulnerability:

1. CVE-2019-20025: Static user authentication credentials provide manufacturer-level access to the web configuration utility.

CVSS score: 9.8 (serious)

NEC SV9100 is a unified communication solution of NEC Corporation. Its IP communication server UNIVERGE SV9100 is a feature-rich unified communication function system used by thousands of small and medium-sized enterprises. Some specific versions of SV9100 software It may allow remote unauthenticated attackers to use hard-coded user names and passwords (also known as static certificate vulnerabilities) to log in to devices running affected versions. The vulnerability is caused by an undocumented user account with the manufacturer's privilege level. An attacker can exploit this vulnerability by using this account to remotely log in to the affected device. Successful exploitation of this vulnerability could allow an attacker to log in to the device with manufacturer-level access rights. This vulnerability affects SV9100 PBX running software version 6.0 or higher. This vulnerability does not affect SV9100 software versions before 6.0.

2. CVE-2019-20026: The password reset function can be accessed from an unprivileged context.

The WebPro interface in SV9100 software version 7.0 or later allows an unauthenticated remote attacker to reset all existing usernames and passwords to default values ​​through a carefully designed request.

CVSS score: 9.8 (serious)

3. CVE-2019-20027: A potentially misconfigured system may allow successful authentication using blank credentials.

Aspir (phone system) derivative products NEC PBX switches, including SV8100, SV9100, SL1100 and SL2100 with software version, if not configured properly, it may allow entering a blank username and password combination as a valid successful authentication account.

CVSS score: 6.4 (medium)

4. CVE-2019-20028: Access to voice mail from a web server without authentication

NEC PBX, a derivative of Aspire running InMail software (including SV8100, SV9100, SL1100 and SL2100), allows unauthenticated read-only access to voice mail, greetings, and voice response system content through the system's WebPro management interface.

CVSS score: 7.5 (high)

5. CVE-2019-20029: Privilege escalation allows hidden developer access in the web configuration utility.

There is an exploitable privilege escalation vulnerability in the WebPro function of NEC PBX from Aspire. The affected products and versions include SV8100, SV9100, SL1100 and SL2100. A specially crafted HTTP POST may lead to privilege escalation, resulting in higher privileged accounts, including undocumented developer access.

CVSS score: 8.8 (high)

6. CVE-2019-20030: Able to access the local network through the voice mail system.
There are security loopholes in NEC UM8000 (a voice mail solution). Attackers with modem access numbers on NEC UM8000 voice mail systems can use SSH tunnels or standard Linux utilities to access the system’s LAN ports.

CVSS score: 10.0 (serious)

7. CVE-2019-20031: The risk of brute force attacks on voicemail passwords has been mitigated.

NEC UM8000, UM4730 and previous non-InMail voicemail systems with all known software versions may allow countless login attempts in the telephone user interface (TUI), effectively performing a brute force attack.

CVSS score: 7.7 (high)

8. CVE-2019-20032: "Find me/follow me" function allows access to the modem interface from any voice mailbox

The attacker can access the InMail voice mailbox equipped with the "find/follow me" function on NEC PBX (including SV8100, SV9100, SL1100 and SL2100) derived from Aspire, and can access the system's management modem.

CVSS score: 7.1 (high)

9. CVE-2019-20033: The accessible DIM interface after establishing a PPP connection has static user authentication credentials.

On NEC PBX (including SV8100), a derivative of Aspire, a set of documented static login credentials can be used to access the DIM interface.

CVSS score: 9.8 (serious)

Bug fix

At present, NEC company has not released repair measures to solve this security problem. It is recommended that users who use this communication solution pay attention to the NEC homepage or refer to the website for solutions: https://www.nec.com/

ENJOYβ€οΈπŸ‘πŸ»
βœ…Topic git
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁