UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
6) The BATCH file first sets the windir environment variable to "cmd /K" with a following script which deletes the original windir enviroment variable then uses REM to comment the rest of the line out.

7) Executing this on Windows 10 Anniversary Edition and above as a split token admin will get you a shell running as an administrator. I've not tested it on any earlier versions of Windows so YMMV.


8) didn't send this to MSRC but through a friend confirmed that it should already be fixed in a coming version of RS3, so it really looks like MS are serious about trying to lock UAC back down, at least as far as it can be

9) If you want to mitigate now you should be able to reconfigure the task to not use environment variables using the following Powershell script run as administrator (doing this using the UAC bypass is left as an exercise for reader).

$action = New-ScheduledTaskAction -Execute $env:windir\System32\cleanmgr.exe -Argument "/autoclean /d $env:systemdrive"
Set-ScheduledTask SilentCleanup -TaskPath \Microsoft\Windows\DiskCleanup -Action $action


10) If you want to find other potential candidates the following Powershell script will find all tasks with
executable actions which will auto elevate. On my system there are 4 separate tasks, but only one (the SilentCleanup task) can be executed as a normal user, so the rest are not exploitable. Good thing I guess.

> $tasks = Get-ScheduledTask |
Where-Object { $_.Principal.RunLevel -ne "Limited" -and
$_.Principal.LogonType -ne "ServiceAccount" -and
$_.State -ne "Disabled" -and
$_.Actions[0].CimClass.CimClassName -eq "MSFT_TaskExecAction" }

powered by wikisources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Exploiting Environment Variables in Scheduled Tasks for UAC Bypass the Windows Task Scheduler full guide
πŸ¦‘ x2 βœ… Bins For Crunchyroll Premium

BIN : 51056626645xxxxx
BIN : 51056650173xxxxx

Date: GEN
CVV: GEN
IP: USA
CP: 10080
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Firepower Threat Defense Site-to-site VPN Guidelines and Limitations :

1) A VPN connection can only be made across domains by using an extranet peer for the endpoint not in the current domain.

2) A VPN topology cannot be moved between domains.

3) Network objects with a 'range' option are not supported in VPN

4) Firepower Threat Defense VPNs are only be backed up using the Firepower Management backup.

5) The Firepower Threat Defense VPNs do not currently support PDF export and policy comparison.

6) There is no per-tunnel or per-device edit option for Firepower Threat Defense VPNs, only the whole topology can be edited.

7) Device interface address verification will not be performed for Transport mode when Crypto ACL is selected.

8) All nodes in a topology must be configured with either Crypto ACL or Protected Network. A topology may not be configured with Crypto ACL on one node and Protected Network on another.

9) There is no support for automatic mirror ACE generation. Mirror ACE generation for the peer is a manual process on either side.

10) While using Crypto ACL, there is no support for tunnel health events for VPN topologies. With Crypto ACL, there is no support for Hub, Spoke, and Full Mesh topologies; only point to point VPN is supported.

11) Whenever IKE ports 500/4500 are in use or when there are some PAT translations that are active, the Site-to-Site VPN cannot be configured on the same ports as it fails to start the service on those ports.

12) Tunnel status is not updated in realtime, but at an interval of 5 minutes in the Firepower Management Center.

13) The character " (double quote) is not supported as part of pre-shared keys. If you have used " in a pre-shared key, ensure that you change the character after you upgrade to Firepower Threat Defense 6.30.

> vpnconfig source
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Network Attack Tool-any Linux :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :


1️⃣ Enter the following commands on Terminal to download and install zarp:

- git clone https://github.com/hatRiot/zarp (Download zarp)
-cd zarp
-pip install -r requirements.txt (Install the required modules)
-python zarp.py

2️⃣bryan@devbox:~/zarp$ sudo ./zarp.py --help


3️⃣ Choose options via numbers :

1 Poisoners 5 Parameter
2 DoS Attacks 6 Services
3 Sniffers 7 Attacks
4 Scanners 8 Sessions

 FOR LEARNING ONLY !!!


@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#Resources about Zone-based Firewalls

#Deployment and Configuration Guides :


- Security Configuration Guide: Zone-Based Policy Firewall

- Zone-Based Policy Firewall Design and Application Guide

- Configuring ZBFW from GeeksforGeeks


LEARN BEFORE BREAK

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#Rules For Applying Zone-Based Policy Firewall !!


- Router network interfacesÒ€ℒ membership in zones is subject to several rules that govern interface behavior, as is the traffic moving between zone member interfaces:
- A zone must be configured before interfaces can be assigned to the zone.
- An interface can be assigned to only one security zone.
- All traffic to and from a given interface is implicitly blocked when the interface is assigned to a zone, except traffic to and from other interfaces in the same zone, and traffic to any interface on the router.
- Traffic is implicitly allowed to flow by default among interfaces that are members of the same zone.
- In order to permit traffic to and from a zone member interface, a policy allowing or inspecting traffic must be configured between that zone and any other zone.
- The self zone is the only exception to the default deny all policy. All traffic to any router interface is allowed until traffic is explicitly denied.
- Traffic cannot flow between a zone member interface and any interface that is not a zone member. Pass, inspect, and drop actions can only be applied between two zones.
- Interfaces that have not been assigned to a zone function as classical router ports and might still use classical stateful inspection/CBAC configuration.
- If it is required that an interface on the box not be part of the zoning/firewall policy. It might still be necessary to put that interface in a zone and configure a pass all policy (sort of a dummy policy) between that zone and any other zone to which traffic flow is desired.
- From the preceding it follows that, if traffic is to flow among all the interfaces in a router, all the interfaces must be part of the zoning model (each interface must be a member of one zone or another).
- The only exception to the preceding deny by default approach is the traffic to and from the router, which will be permitted by default. An explicit policy can be configured to restrict such traffic.

> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Virus Total API Maltego Transform Set For Canari-
- New tool

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣ Requires Canari https://github.com/allfro/canari/tree/c90ed9f0f0fb5075358d7a1a4c1080aac3d4e6bc

, specifically this branch/version

2️⃣ Install Malformity https://github.com/digital4rensics/Malformity

3️⃣sudo python setup.py install

4️⃣canari create-profile ripVT

5️⃣Import generated ripVT.mtz

6️⃣Import entities stored at:
src/ripVT/resources/external/entities.mtz

7️⃣Copy src/ripVT/resources/etc/ripVT.conf to ~/.canari/
Pivot

7️⃣Pivots


πŸ¦‘FEATURES :

Multiple unique entities enable forward & reverse searches. Unique graphically-distinguished icons.

Search (Phrase Entity) ->

Generic Search
Behavioral
Engines
ITW
Generic

Hash -> Download to Repository
Hash -> VT File Report ->

Behavioral (Copied Files, Deleted, Downloaded, Moved, Mutex, Network, Opened, Read, Replaced, Written)
Imphash
Cert / Certs
Compile Time
Detections
Exports / Imports
File Names
In-The-Wild (ITW) Locations
Parents (Dropped / Created By)
PE Resources
PE Sections
SSDEEP
Similar-To
Domain -> VT Domain Report ->

Undetected/Detected Communicating Samples
Undetected/Detected Domain-Embedding Samples
Undetected/Detected Domain-Downloaded Samples
PCAP
Domain Resolutions
Siblings
Subdomains
Detected URLs
IP Address -> VT IP Report

Undetected/Detected Communicating Samples
Undetected/Detected Domain-Embedding Samples
Undetected/Detected Domain-Downloaded Samples
PCAP
Domain Resolutions
Siblings
Subdomains
Detected URLs
Detections ->

Search Detection Name (Engine Included)
Search Detection Name (No Engine
Cuckoo -> (Report ID)

Report -> Network

βœ… git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Node.js & Hapi.js: Building Enterprise Web Apps β€”1.9 GB-


https://mega.nz/#F!1hZ3TShR!Jeb32K_d8MX4_T75BpY5qA
πŸ¦‘BIN SPOTIFY

πŸ’³: 5524903601xxxxxx

FECHA: 11/22

IP: Canada

Codigo Postal: V5K0A8

VPN: VYPR VPN
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Intel processor reveals two new SGX vulnerabilities attackers can easily extract sensitive data :

1) While Intel is working to eliminate the negative effects of multiple processor vulnerabilities, security researchers at the three universities once again relentlessly exposed two other flaws in the SGX software protection extension instructions.

2) For attackers, this allows them to extract sensitive data fairly easily. Fortunately, new issues can be fixed through active remedies, and there is currently no evidence that new vulnerabilities have been exploited in the wild.

3) Researchers from three universities in Michigan, Amsterdam, Netherlands, and Adelaide, Australia disclosed that attackers can use the multi-core architecture to work to gain access to sensitive data on infected systems.

4) It has developed corresponding attack methods for the two vulnerabilities, and gave proofs of concept for SGAxe and CrossTalk.

5) The former appears to be an advanced version of the CacheOut attack exposed earlier this year, and hackers can extract content from the CPU's L1 cache.

6) The researchers explained that SGAxe is a failed attempt by Intel to mitigate the bypass attack against the software protection extension (SGX). As a dedicated area on the CPU, SGX originally intended to ensure the integrity and confidentiality of the code and data being processed.

7) With the help of a transient execution attack, a hacker can essentially recover the encryption key stored in the SGX area and use it to decrypt the long storage area to obtain the machine's EPID key. The latter is used to ensure the security of transactions, such as financial transactions and DRM-protected content.

8) As for the second CrossTalk vulnerability, which is a derivative of Microarchitecture Data Sampling (MDS), it can attack data processed by the Line Fill Buffer (LBF) of the CPU.

9) t originally wanted to provide a "staging buffer" for CPU core access, but hackers were able to use specially-made software running on a separate core to destroy the software code and data private key that protected it.

10) It is reported that the new vulnerability affects many Intel processors released from 2015 to 2019, including some Xeon E3 SKUs (E5 and E7 series have been proven to be resistant to this new type of attack).

11) Intel said in a June security bulletin that only a very small number of people can launch these attacks in a laboratory environment, and there are currently no reports of exploits in the wild.

12) Even so, the company will still release microcode updates as soon as possible, while invalidating previously issued certification keys.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Bin For Google Ads, Instagram Facebookβœ…βœ…

BIN: 53651740xxxxxxxx
Date: RND
CVV: RND
IP: Brazil
CPF: Cualquiera