UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
Forwarded from UNDERCODE COMMUNITY
πŸ¦‘X 2 NETFLIX PREMIUM ACCOUNTS
send screanshoats after logins @Undercode_bot

> akash_chohan@hotmail.com:yas12341

> alexstevenbintley@sky.com:Llivebootyat
Forwarded from Backup Legal Mega
πŸ¦‘2020 Linux Academy Red Hat Certified Systems Administrator Prep Course
β€”2.59 gbβ€”

https://mega.nz/folder/6QkmzIRC#9qMF250M3-assTpK5aL55Q
Forwarded from Backup Legal Mega
πŸ¦‘Deploying Microservices with Puppet and Containers


> https://mega.nz/folder/PdN3iKoS#C0VA6bDFs-Cpt0UdxTazfA
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘all popular Types of Ransomwares from most dangerous till less :

1)CryptoLocker

CryptoLocker botnet is one of the oldest forms of cyber attacks which has been around for the past two decades. The CryptoLocker ransomware came into existence in 2013 when hackers used the original CryptoLocker botnet approach in ransomware.

CryptoLocker is the most destructive form of ransomware since it uses strong encryption algorithms. It is often impossible to decrypt (restore) the Crypto ransomware-infected computer and files without paying the ransom.

2) WannaCry

WannaCry is the most widely known ransomware variant across the globe. The WannaCry has infected nearly 125,000 organizations in over 150 countries. Some of the alternative names given to the WannaCry ransomware are WCry or WanaCrypt0r.

3) Bad Rabbit

Bad Rabbit is another strain of Ransomware which has infected organizations across Russia and Eastern Europe. It usually spreads through a fake Adobe Flash update on compromised websites.

4) Cerber

Cerber is another ransomware variant which targets cloud-based Office 365 users. Millions of Office 365 users have fallen prey to an elaborate phishing campaign carried out by the Cerber ransomware.

5) Crysis

Crysis is a special type of ransomware which encrypts files on fixed drives, removable drives, and network drives. It spreads through malicious email attachments with double-file extension. It uses strong encryption algorithms making it difficult to decrypt within a fair amount of time.

6) CryptoWall

CryptoWall is an advanced form of CryptoLocker ransomware. It came into existence since early 2014 after the downfall of the original CryptoLocker variant. Today, there are multiple variants of CryptoWall in existence. It includes CryptoDefense, CryptoBit, CryptoWall 2.0, and CryptoWall 3.0.

7) GoldenEye

GoldenEye is similar to the infamous Petya ransomware. It spreads through a massive social engineering campaign that targets human resources departments. When a user downloads a GoldenEye-infected file, it silently launches a macro which encrypts files on the victim's computer.

8) Jigsaw

Jigsaw is one of the most destructive types of ransomware which encrypts and progressively deletes the encrypted files until a ransom is paid. It starts deleting the files one after the other on an hourly basis until the 72-hour mark- when all the remaining files are deleted.

9) Locky

Locky is another ransomware variant which is designed to lock the victim's computer and prevent them from using it until a ransom is paid. It usually spread through seemingly benign email message disguised as an invoice.

When a user opens the email attachment, the invoice gets deleted automatically, and the victim is directed to enable macros to read the document. When the victim enables macros, Locky begins encrypting multiple file types using AES encryption.

Apart from the list of attacks mentioned above, Petya, NotPetya, TeslaCrypt, TorrentLocker, ZCryptor, etc., are some of the other ransomware variants that are well-known for their malicious activities.

source wiki
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Show Detailed Information on Startup- Windows :
#fastTips

1) If your PC is experiencing slowdowns or inexplicable crashes, then you should make it your priority to diagnose what’s causing those problems. One possible way to do this is to set Windows 10 startup to β€œVerbose Mode”, which will give you a much more detailed breakdown of the processes happening on your PC as you boot.

2) To activate this, go to the following registry key:

>HKEYLOCALMACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\System

3) Next, right-click an empty space in the right-hand pane, then select β€œNew -> DWORD (32-bit) Value”.

4) Name the value β€œVerboseStatus”, right-click it then select Modify, and in the β€œValue data” box enter 1.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BlackBerry open source reverse engineering tool PE Tree to reduce the complexity of reverse engineering


>BlackBerry announced the launch of a new open source tool "PE Tree" designed to reduce the time and effort required to reverse engineer malware. The company stated that PE Tree allows reverse engineers to use pefile and PyQt5 to view Portable Executable (PE) files in a tree view, thereby reducing the threshold for dumping and rebuilding malware from memory, while providing An open source PE viewer code base that the community can build.

> PE Tree is also integrated with HexRays' IDA Pro decompiler, so that you can easily navigate the PE structure, dump the PE files in the memory and perform import reconstruction, which is essential in identifying and preventing various malicious software.

> The tool is developed in Python and supports Windows, Linux and Mac operating systems. It can be installed and run as a standalone application or IDAPython plug-in, allowing users to inspect any executable Windows file and view its composition.

> Use Ero Carrera's pefile module to analyze the PE file, and then map it to the tree view. There, users can view the summary of headers, including MZ header, DOS stub, Rich headers, data directory, etc.

> In addition, the "rainbow view" on the left provides a high-level overview of the PE file structure and conveys the offset/size/ratio of each area. Users can click each area to jump to the tree view, or right-click to save to a file or export to CyberChef.

> Eric Milam, vice president of research and operations at BlackBerry, said: β€œAs cybercriminals continue to evolve, the cybersecurity community needs to use new tools in its arsenal to defend and protect organizations and people. Now on the market There have been more than 1 billion malicious software, and this number continues to grow at more than 100 million per year. So we created this solution to help the cybersecurity community in this fight."

> For more details, please check the official blog: https://blogs.blackberry.com/en/2020/08/blackberry-open-source-pe-tree-tool-for-malware-reverse-engineers

#News
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘Administrator status - Termux

πŸ…°οΈ Phone without root

1) Use proottools to simulate certain environments that require root

> pkg install proot

2) Then enter in the terminal:

> termux-chroot

3) That is, the simulation rootenvironment is
under this prootenvironment, which is equivalent to entering the homedirectory, and some configurations can be easily performed.+

πŸ…±οΈPhone is rooted

1) Installation tsu, this is a suversion of termux, used to replace termux su:

> pkg install tsu

2) Then enter in the terminal:

> tsu

3) You can switch rootusers. At this time root, an authorization prompt will pop up and give them rootpermissions.


E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Termux Fasttips :
#FastTips

1) RouterSploit
RouteSploit framework is an open source router and other embedded device vulnerability detection and utilization framework.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

> pip2 install requests git clone
https://github.com/reverse-shell/routersploit cd routersploit python2 rsf.py


2) Slowloris
Low bandwidth DoS tools
πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :
git clone
https://github.com/gkbrk/slowloris.git cd slowloris chmod +x slowloris.py


3) RED_HAWK
An all-in-one penetration testing tool developed using PHP language, it can help us complete tasks such as information collection, SQL vulnerability scanning and resource crawling.
πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :
pkg install php git clone
https://github.com/Tuhinshubhra/RED\_HAWK.git cd RED_HAWK php rhawk.php


4) Cupp
Cupp is an interactive dictionary generation script written in Python. It is especially suitable for social engineering. After you collect specific information about the target, you can use this tool to intelligently generate a dictionary about the target.
πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :
git clone
https://github.com/Mebus/cupp.git cd cupp python2 cupp.py


5) Hash-Buster
Hash Buster is an online Hash cracking script written in python. The official said that it can be cracked within 5 seconds, and the actual speed test is not bad~
πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :
git clone
https://github.com/UltimateHackers/Hash-Buster.git cd Hash-Buster python2 hash.py


6) D-TECT
D-TECT is an advanced penetration testing tool written in Python,
πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :
wordpress username enumeration
Sensitive document detection
Subdomain blasting
Port scan
Wordperss scan
XSS scan
SQL injection scanning, etc.
git clone
https://github.com/shawarkhanethicalhacker/D-TECT.git cd D-TECT python2 d-tect.py


7) WPSeku
WPSeku is a simple WordPress vulnerability scanner written in Python. It can be used to scan local and remote WordPress installations to find security issues. Rated as the top ten most popular open source hacking tools in 2017.
πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :
git clone
https://github.com/m4ll0k/WPSeku.git cd WPSeku pip3 install -r requirements.txt python3 wpseku.py


8) XSStrike
XSStrike is an advanced XSS detection tool. It has a powerful fuzzing engine.
πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :
git clone
https://github.com/UltimateHackers/XSStrike.git cd XSStrike pip2 install -r requirements.txt python2 xsstrike

9) editor
Have a terminal vimartifact, and the government has also been packaged vim-python, of vimthe relevant optimization of the Python.
πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

> pkg install vim-python
Solve the garbled Chinese characters in vim under termux

> Create a new .vimrcfile in the home directory

vim .vimrc

Add the following content:

> set fileencodings=utf-8,gb2312,gb18030,gbk,ucs-bom,cp936,latin1 set enc=utf8 set fencs=utf8,gbk,gb2312,gb18030

> Then sourcethe variables:

source .vimrc

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘TERMUX LIBS :

apt update

apt upgrade

apt install python python-dev python2 python2-dev

apt-get install clang

apt-get install libxml2 libxml2-dev libxslt libxslt-dev

apt install openssl libffi libffi-dev

apt install openssl openssl-tool openssl-dev

apt install clang g++ libxml2-dev libxslt-dev python python-dev

apt install clang python python-dev

apt install fftw libzmq libzmq-dev

apt install freetype freetype-dev libpng libpng-dev pkg-config

pip install BeautifulSoup4 requests

pip install lxml

pip install scrapy

pip install numpy==1.12.1

LDFLAGS=' -lm -lcompilerrt' pip install numpy==1.12.1

LDFLAGS=' -lm -lcompiler
rt' pip install matplotlib pandas jupyter

pip install ipython

pip install demjson tushare colorama

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Detailed method of manually handling IE hijacked manual handling method of IE browser hijacked by undercode :


1) First, locate the registry
Start - Run


2) Copy codecode show as below:

cmd /c reg add "HKEYCURRENTUSER\Software\Microsoft\Windows\CurrentVersion\Applets\Regedit" /v "LastKey" /d "HKEYLOCALMACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace" /f & start regedit. exe

3) WIN7-10-XP system standard display
{1f4de370-d627-11d1-ba4f-00a0c91eedba}
{450D8FBA-AD25-11D0-98A8-0800361B1103}
{645FF040-5081-101B-9F08-00AA002F954E}
{e17d4fc0-5564-11d1-83f2-00a0c90dc849}

4) IE repair processing
starts-run
 Copy codecode show as below:

cmd /k reg delete HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace /f
cmd /k reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{1f4de370-d627-11d1- ba4f-00a0c91eedba} /ve /t REG_SZ /d "Computer Search Results Folder" /f
cmd /k reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{450D8FBA-AD25-11D0-98A8-0800361B1103 } /ve /t REG_SZ /f
cmd /k reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{450D8FBA-AD25-11D0-98A8-0800361B1103} /v "Removal Messagee" /t REG_SZ / d "@mydocs.dll,-900" /f
cmd /k reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E} /ve /t REG_SZ /d "Recycle Bin" /f
cmd /k reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849} /ve /t REG_SZ /d "Search Results Folder" /f

6) Note: In a second step, when generating extra CLSID = {XXXXXXXX-XXXXXXXX-XXXX- XXXXXXXXXXXXX}, is performed cmd / k reg delete HKEY_CLASSES_ROOT \ CLSID \ {XXXXXXXX-XXXXXXXX-XXXX-XXXXXXXXXXXXX} / f
four , If it is the IE icon that is changed from the network neighborhood or my document or the recycle bin, you can execute the subordinate command
my document first:

7) Copy codecode show as below:

cmd /k reg delete HKEY_CLASSES_ROOT\CLSID\{450D8FBA-AD25-11D0-98A8-0800361B1103} /f

my computer:

8) Copy codecode show as below:

cmd /k reg delete HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} /f

Network Neighborhood:

8) Copy codecode show as below:

cmd /k reg delete HKEY_CLASSES_ROOT\CLSID\{208D2C60-3AEA-1069-A2D7-08002B30309D} /f

9) Recycle Bin:

Copy codecode show as below:

cmd /k reg delete HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} /f

10) After completing the above operations, double-click the attached file and import it into the registry.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘One-sentence Trojan horse and prevention method of PHP through security dog/D shield/360

F U L L C O D E :
chineese

https://pastebin.com/zYemD3LF

E N J O Y β€οΈπŸ‘πŸ»
Forwarded from Backup Legal Mega
πŸ¦‘ 2020 PPT-204. Puppet 204 - System Administration Using Puppet β€”3.04 GBβ€”-

https://mega.nz/folder/TFUk1ayD#GuOdQal3GghV7o1d70oQeA
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hack Facebook using Social Engineering


STEP 1 : FIND STARTER WINDOW a.k.a HOLE
On the log on screen, he notice a link named β€œforgotten account”, Here John will be using the benefit of β€œforgotten account (password recovery)” feature. Facebook has already served our starter window at: β€œhttps://www.facebook.com/login/identify?ctx=recover”.

The page should looks like this: