UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
3️⃣Which version of Whonix to download

> To run Whonix, you need a free program for working with virtual machines - VirtualBox .

To broaden your horizons , the VirtualBox Manual is recommended , at least read about installing this program into your operating system:

1) Installing VirtualBox on Windows

2) Installing VirtualBox on Linux

<> Go to the Whonix download page on the official website: https://www.whonix.org/wiki/Download
4️⃣In fact, Whonix for Windows and Linux is no different, since it runs in a virtual machine, so when you click on any download link, you will find yourself on the next page where you will have to choose between:

A) Whonix with XFCE (recommended for beginners) - Whonix operating system with a graphical interface (recommended for beginners)

B) Whonix with CLI is a command line only operating system.
Select " Whonix with XFCE " - you will be taken to the next page, where to download you need to press the big green button.
5️⃣How to install Whonix ?

The file will be downloaded with the extension .ova of the form Whonix-XFCE - *. Ova . Run it with a double click - if you already have VirtualBox installed, this file will automatically open in it.

Just click the " Import " button

6️⃣What is Whonix-Gateway and Whonix-Workstation ?


1) Whonix-Gateway is a gateway. It is a specially configured Linux d>stribution that runs Tor, but cannot run applications. Purpose - to provide Internet access for Whonix-Workstation , that is, to be a gateway. Whonix-Workstation can work without Whonix-Gateway, but the workstation will not have Internet access.

2) Whonix-Workstation is a complete Linux operating system that can run applications. This OS also has special Internet settings - access to the global network is possible only through the Whonix-Gateway .

3) The settings of the Whonix-Gateway virtual machine can be left by default, since it is not very resource -intensive, and you can add resources to the Whonix-Workstation , in particular, RAM. To do this, right-click on Whonix-Workstation and click " Configure ".

4) Go to the " System " tab and increase the size of the " Main memory

]
7️⃣What is the default password in Whonix
Default credentials:

Username: user
Password: changeme
Change the password on both systems by running the command:

> sudo passwd user
8️⃣How to check the reliability of Whonix "

> You can check your system for the disclosure of the real IP address, as well as for various types of leaks (for example, DNS leaks), for this we have compiled a list of " Services for finding IP address leaks ".

9️⃣ How to update programs in Whonix
To update all packages in the system, programs and the OS itself, run the command:

> sudo apt update && sudo apt dist-upgrade

πŸ”ŸIt needs to be done from time to time in both the Whonix-Gateway and Whonix-Workstation.

> Updates, in addition to fixing bugs and adding new functions, may close identified vulnerabilities.
E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
FULL ANONIMITY GUIDE 2020 WITH PICTURES
@UndercodeTesting
Forwarded from Backup Legal Mega
ENJOY β€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ frequency scanning GUI for the OsmoSDR rtl-sdr library :

WORKING
ON :

-Windows 7 (x86 and x64)
-Windows 8.1 (x64)
-Ubuntu 12.04 (x86)
-Ubuntu 12.10 (x64)
-Ubuntu 13.04 (x64)
-Ubuntu 14.04 (x64)
-OS X Snow Leopard
-OS X Mountain Lion
-Termux(root + requirements)

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣UBUNTU :

1) Press CTRLALTT to open a command window and run the following command to install the libraries:

2)sudo apt-get install python python-wxgtk3.0 rtl-sdr

3)Install the software using:

4) sudo pip install -U rtlsdrscanner

Now you should be able to run the program:

5) python -m rtlsdr
scanner

2️⃣FEDORA :

From the GNOME desktop start a new terminal. Type the following to install the libraries:

1) sudo dnf install python-matplotlib-wx rtl-sdr

Install the software using:

2) sudo pip install -U rtlsdrscanner

Now you should be able to run the program:

3)python -m rtlsdr
scanner

3️⃣Arch Linux

From the GNOME desktop start a new terminal. Type the following to install the dependencies:

1) sudo pacman -S python2-matplotlib rtl-sdr

The install the application:

2) sudo pip install -U rtlsdrscanner

Now you should be able to run the program:

3) python -m rtlsdr
scanner

4️⃣FOR WINDOWS :

https://eartoearoak.com/taxonomy/term/12

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Debugging Punycode-IDN tutorials & tools
#resources

>Remove hostnames larger than 63 characters (RFC 1035)

> other characters inadmissible by IDN

> convert domains with international characters (not ASCII) and used for homologous attacks to Punycode/IDNA format /

> https://docs.oracle.com/javase/tutorial/i18n/network/idn.html

>https://blog.arvixe.com/using-idn-conversion-tool-in-websitepanel/

> https://www.systutorials.com/docs/linux/man/1-idn/

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Inactive Blocklists :

- CHEF-KOCH BarbBlock-filter-list

- hosts-file.net (included: ad_servers, emd, grm, hosts, psh)

- margevicius easylistlithuania

- Passwall SpamAssassin

- squidblacklist.org (included: dg-ads, dg-malicious.acl)

- UrlBlacklist

βœ…git 2020
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE COMMUNITY
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘2020 ransomware :

> A ransomware is a form of malware that prevent legitimate users from accessing their device or data and asks for a payment in exchange for the stolen functionality. They have been used for mass extortion in various forms, but the most successful seem to be encrypting ransomware: most of the user data are encrypted and the key can be retrieved with a payment to the attacker. To be widely successful a ransomware must fulfill three properties:



πŸ¦‘FEATURES

>encrypt all user files with AES-256-CBC.
>Random AES key and IV for each file.
>Works even without internet connection.
>Communication with the server to decrypt Client-private-key.
>encrypt AES key with client-public-key RSA-2048.
>encrypt client-private-key with RSA-2048 server-public-key.
>Change computer wallpaper -> Gnome, LXDE, KDE, XFCE.
>Decryptor that communicate to server to send keys.
>python webserver
>Daemon
>Kill databases

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣DOWNLOAD OR CLONE https://github.com/tarcisio-marinho/GonnaCry

2️⃣go dir then

3️⃣First the ransomware needs to know some path’s, such as the desktop directory path, trash, home, etc…
To get the user and home directory i will use some glibc librarys from unistd.h 12

char * home = get_home_enviroment(); // /home/USER/
char * desktop = get_desktop_enviroment(home); // /home/USER/Desktop/
char * username = get_username(); USERNAME
char * trash = get_trash_path(home); // /home/USER/.local/share/Trash/
char * media = get_media_path(username);
With the paths we can enter in each folder, find files inside it, create new files, whatever we want.

> First part - Finding the files

4️⃣For each file in the list, he will try to open and create a new file.

old = fopen(files->info[2], "rb");
if(old != NULL){
new_name = (char*) malloc(sizeof(char) * (strlen(files->info[2]) + 11));
strcpy(new_name, files->info[2]);
strcat(new_name, ".GNNCRY");
new = fopen(new_name, "wb");

5️⃣Generate a unique random key and IV for each file and call encrypt function(I let you guess what it does :slight_smile:).

6️⃣After the encryption, now we need to shred the old file, to never come back.

7️⃣Now the old file bytes are overwritten with zeros, and then deleted.
Even with some recovery tool software, the original file is lost.

goto Second part - Start Encryption; //This repeats for each file on the linked list.

Third part - create Desktop file: enc_files.gc

This file will help the decryptor to get the path, key and iv used to encrypt each file.
First field is the random Key, then the random IV and the file path.

πŸ¦‘VIDEO TUTORIAL : https://youtu.be/pLluFxHrc30

ENJOY❀️
πŸ‘πŸ»
βœ…2020 GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁