UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
Forwarded from WEB UNDERCODE - PRIVATE
WinDbg Malware Analysis Cheat Sheet.pdf
2 MB
#full + video
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#ForBeginers What is Cross Site Scripting (XSS)? & How it Work's ?


1) Cross-site scripting (XSS) is a type of cyberattack in which malicious scripts are injected into trusted and trusted sites.

2) Cross-site scripting attacks are possible in HTML, Flash, ActiveX and CSS. However, JavaScript is the most frequent target of cybercriminals as it plays an important role in most web browsing.

3) JavaScript is a programming language that allows you to implement complex functionality on your website. Most of the large and interactive websites on the Internet have been built with JavaScript. β€œYou can develop interactive features, games or add additional features to better promote your products,” says Domantas Gudelyauskas, marketing manager for the Zyro project.

4) JavaScript is so popular in the web community because it allows you to do almost anything on a web page. And that's when it becomes problematic. Cybercriminals can use JavaScript to log into your web pages and insert malicious scripts.

πŸ¦‘How does cross-site scripting work?

Cybercriminals can perform XSS attacks on WordPress websites in two ways. They can either use user input or bypass policies of the same origin. Let's take a look at both methods to better understand cross-site scripting.

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Top 5 PHP Frameworks :

Now that we have all understood the PHP framework, which PHP framework is the best to use in web development?

β€” Developing any software application from scratch requires a lot of work, so it is very tedious and time-consuming. Using a better PHP environment saves you the hassle of re-creating the same functions over and over. We've looked at the countless PHP frameworks available on the market to find the best for you.

1) Laravel

2) CakePHP

3) CodeIgniter

4) Symfony

5) Zend framework

#FastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible..->
#tool


πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/FortyNorthSecurity/EyeWitness.git

2) cd Navigate into the CS directory

3) Load EyeWitness.sln into Visual Studio

4) Go to Build at the top and then Build Solution if no modifications are wanted

5) EyeWitness.exe --help

6) EyeWitness.exe -f C:\Path\to\urls.txt

7) EyeWitness.exe -f C:\Path\to\urls.txt -d [timeout in seconds] -c

8) ./EyeWitness.py -f filename --timeout optionaltimeout

E X A M P L E :

./EyeWitness -f urls.txt --web

./EyeWitness -x urls.xml --timeout 8

./EyeWitness.py -f urls.txt --web --proxy-ip 127.0.0.1 --proxy-port 8080 --proxy-type socks5 --timeout 120

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘New Computer Hacking Forensic Investigator labs and tools:

https://mega.nz/folder/fBJzUYQY#yhs2nAV7DwCTL6xiil9OgQ
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SOME POPULAR DEEPWEBSITES
1)e4unrusy7se5evw5.onion - eXeLaB, a program research portal.

2)msydqstlz2kzerdg.onion - Ahima, a darknet search engine.

3)searchl57jlgob74.onion - Fess, another search engine.

4)burgerfroz4jrjwt.onion - Burger, the recommended bitcoin mixer with
onion ring flavor.

5) http://hss3uro2hsxfogfq.onion/

6) http://gjobqjj7wyczbqie.onion/

7) http://torlinksge6enmcyyuxjpjkoouw4oorgdgeo7ftnq3zodj7g2zxi3kyd.onion/

8) http://s6cco2jylmxqcdeh.onion/w/

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Rails Security - First part.pdf
617 KB
Rails is a software library that extends the Ruby programming language. It’s often promoted as an MVC web framework, which stands for Model, View, and Controller respectively.
De facto, Web developers are attracted by its simplicity and the priciple of Convention over Configuration, and it has become more popular in recent days.
Despite Rails is a mature framework being used today, Web Security issues are still there. Therefore, this paper will briefly address and give introduction to those discovered vulnerabilities of Rails.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘PRACTICE YOUR KNOWLEDGE :

HACKING EXERCICES :

0 - Last Layer Attack
1 - Backdooring
2 - Extracting Information
3 - Brute Forcing
4 - Neural Overflow
5 - Malware Injection
6 - Neural Obfuscation
7 - Bug Hunting
8 - GPU Attack

πŸ¦‘Packages :

-Keras: Installing Keras can be tricky. We refer to the official installation guide at https://keras.io/

-#installation and suggest TensorFlow as a backend (using the GPU-enabled version, if one is available on the machine).

-NumPy, SciPy and scikit-image: NumPy and SciPy are excellent helper packages, which are used throughout all exercises. Following the official SciPy

-instructions should also install NumPy https://
www.scipy.org/install.html. We will also need to

-install scikit-image for image loading and saving:
https://scikit-image.org/docs/stable/install.html.
PyCuda: PyCuda is required for the GPU-based attack exercise. If no nVidia GPU is available on the machine, this can be skipped. https://wiki.tiker.net/PyCuda/Installation

-NLTK: NLTK provides functionalities for natural language processing and is very helpful for some of the exercises. https://www.nltk.org/install.html

D O W N L O A D :

https://github.com/Kayzaks/HackingNeuralNetworks

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘VIRUS & MALWARE TOOLS & TUTORIALS :

[JSDetox](
http://www.relentless-coding.com/projects/jsdetox/) - JavaScript
malware analysis tool.

jsunpack-n - A javascript
unpacker that emulates browser functionality.

[Krakatau](https://github.com/Storyyeller/Krakatau) - Java decompiler,
assembler, and disassembler.

Malzilla - Analyze malicious web pages.

[RABCDAsm](https://github.com/CyberShadow/RABCDAsm) - A "Robust
ActionScript Bytecode Disassembler."

SWF Investigator -
Static and dynamic analysis of SWF applications.

[swftools](http://www.swftools.org/) - Tools for working with Adobe Flash
files.

xxxswf - A
Python script for analyzing Flash files.

ENJOY β€οΈπŸ‘πŸ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Linux for Pentester _ ZIP Privilege Escalation.pdf
515.4 KB
How can we perform Privilege Escalation with Zip command
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘for kali 2020 users #requested
Β» Enable Monitor Mode Using iw:

First, we will take a look at the use of the iw Wi-Fi configuration tool. It is used for configuring Wi-Fi in particular and can be more powerful than other tools. You might have already used iw for several other purposes, for example, to obtain information about your Wi-Fi network. In fact, this tool can even give you more information about different commands. The iw list gives you much more information about wireless wlan0, interface modes, HT, bit rates, scanning, etc.

πŸ„»πŸ„΄πŸ…ƒ'πŸ…‚ πŸ…‚πŸ…ƒπŸ„°πŸ…πŸ…ƒ :

The first step is to check the interface information. You can do so by entering the following:

1) $ sudo iw dev
The output will look like the following window:
To access the traffic of other people, you will have to switch this over to Monitor Mode. You can switch iw to Monitor Mode by entering the commands given below:

2) $ sudo ip link set IFACE down

3) $ sudo iw IFACE set monitor control

4) $ sudo ip link set IFACE up
IFACE replaced the actual name, as shown:

5) $ sudo ip link set wlan0 down

6) $ sudo iw wlan0 set monitor control

7) $ sudo ip link set wlan0 up

The next step is to check the wireless interface one more time by entering the following command:

8) $ sudo iw dev

9) The output of the aforementioned commands can be seen in the window above.

Wondering how to get back to the Managed Mode? To do so, enter the following commands:

10) $ sudo ip link set IFACE down

11) $ sudo iw IFACE set type managed

12) $ sudo ip link set IFACE up
IFACE replaced the actual name, as shown:

13) $ sudo ip link set wlan0 down

14) $ sudo iw wlan0 set type managed

15) $ sudo ip link set wlan0 up

Enable Monitor Mode Using iwconfig
As in previous sections, check your interface name via the following command:

$ sudo iwconfig
The next step is to enable Monitor Mode. Do so by entering the following commands:

$ sudo ifconfig IFACE down
$ sudo iwconfig IFACE mode monitor
$ sudo ifconfig IFACE up
Furthermore,

$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode monitor
$ sudo ifconfig wlan0 up
Disable Monitor Mode

$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode managed
$ sudo ifconfig wlan0 up
Turn off the Network Manager that Prevents Monitor Mode

$ sudo systemctl stop NetworkManager

πŸ„»πŸ„΄πŸ…ƒ'πŸ…‚ πŸ…‚πŸ…ƒπŸ„°πŸ…πŸ…ƒ :

πŸ¦‘Another two methode for wifi monitor mode :

You can also via airmon-ng but this methode is recommended

Enable Monitor Mode Using iwconfig
As in previous sections, check your interface name via the following command:

$ sudo iwconfig
The next step is to enable Monitor Mode. Do so by entering the following commands:

$ sudo ifconfig IFACE down
$ sudo iwconfig IFACE mode monitor
$ sudo ifconfig IFACE up
Furthermore,

$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode monitor
$ sudo ifconfig wlan0 up
Disable Monitor Mode

$ sudo ifconfig wlan0 down
$ sudo iwconfig wlan0 mode managed
$ sudo ifconfig wlan0 up
Turn off the Network Manager that Prevents Monitor Mode

$ sudo systemctl stop NetworkManager

source linux forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to Change the MAC Address
#forBeginers
In a Kali Linux, it is very easy to spoof the MAC address. This can be done by opening the terminal window in the Kali Linux system. Initially, we will check all of the adapters that are using the ifconfig command, as shown:

1) $ sudo ifconfig

2) $ sudo ifconfig eth0 down


3) Next, we will change the MAC address. This can be done by entering the following command:

$ sudo macchanger -r eth0

4) In this command, the -r flag is used to change the current MAC address to the random MAC address in the network interface of eth0.

In the screenshot above, note that the MAC address has been successfully spoofed. Now, we will turn on the network interface again.
5) This can be done by entering the following command:

$ sudo ifconfig eth0 up

6) Next, it is necessary to check the MAC address again with the help of the ifconfig command:

$ sudo ifconfig


@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘2020 Code with Mosh - The Ultimate Data Structures & Algorithms

https://mega.nz/folder/tJAD2QYJ#iGTd0Hi4k3a4kbEcKddTtg