UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
Forwarded from WEB UNDERCODE - PRIVATE
empire_without_powershell_exe.pdf
912.9 KB
The client has blocked Powershell.exe using AppLocker and I don’t have the dough for Cobalt Strike. I want to get an Empire payload on a workstation via a phishing campaign and I need payloads ready once I have a foothold. Nearly all of the launcher methods for Empire rely on the ability to use PowerShell.exe. Other methods like msbuild.exe requires dropping a file to disk, and I really liked the regsvr32 method of loading my .sct over the internet (it too drops a file to disk) and using a ducky. I also really appreciate the simplicity of VBA’s in documents or HTA’s. Problem is, Empire is a Powershell RAT so one way or another PowerShell has to run.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 Deepwebsites :

website url: msydqstlz2kzerdg.onion

website url: xmh57jrzrnw6insl.onion

website url: dnmugu4755642434.onion

website: hss3uro2hsxfogfq.onion

website: gjobqjj7wyczbqie.onion

website: haystakvxad7wbk5.onion

website: abikogailmonxlzl.onion

website: 3bbaaaccczcbdddz.onion

source wiki
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is ping monitoring?
#FastTips

1) Without getting into complex ping monitoring, it refers to the way our devices access the Internet.

2) Basically, when you want to go online, your device (computer, tablet, phone, etc.), known as a client, communicates with another device for information.

3) To make a request for information, your device sends a request (known as a packet) to the server that stores the information. To access a packet, the server needs to know who is requesting it so they can send it back.

4) Packages can be sent in a variety of ways, some of which are faster than others. The one most people are familiar with is HTTP .

5) This way, the server processes your packets and sends them back using the ping command , which tests the connection between the client and the server.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is ping monitoring?
#FastTips

1) Without getting into complex ping monitoring, it refers to the way our devices access the Internet.

2) Basically, when you want to go online, your device (computer, tablet, phone, etc.), known as a client, communicates with another device for information.

3) To make a request for information, your device sends a request (known as a packet) to the server that stores the information. To access a packet, the server needs to know who is requesting it so they can send it back.

4) Packages can be sent in a variety of ways, some of which are faster than others. The one most people are familiar with is HTTP .

5) This way, the server processes your packets and sends them back using the ping command , which tests the connection between the client and the server.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is WSL for? What are the limitations of WSL2 (Windows Subsystem for Linux)

1) we are not actually installing Kali Linux
in fact we don't install Linux at all

2) The Windows Subsystem for Linux is NOT a virtual machine
and is NOT real Linux. If you understand what Wine is (which is also not an emulator), then WSL2 is also a Wine in reverse. WSL2 is simply trying to serve as a Linux kernel to the best of its ability for GNU applications, without being a true Linux kernel.

πŸ¦‘What does this mean from a practical point of view?

1) This means that we get a very similar situation with Wine, which tries to perform Windows functions (again, to the best of its ability) - something will work fine, something will work with errors, and something will not work at all. ...

2) In WSL2, 100% will not work (in the coming years, and maybe never at all)

absolutely all wireless attacks (Wi-Fi, Bluetooth)

3) Hashcat and other programs using video cards to perform computations (brute force)

4) low-level access to USB devices (for example, to make an image of a disk / flash drive for forensic research)
background server applications

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘BEST OFFERS & TRIALS NOW, IN ANTIVIRUS APPS FOR WINDOWS 2020 :


https://www.bitdefender.co.uk/media/html/consumer/new/100-vip-special-opt/?pid=vip_special_offer&cid=aff|c|ir&clickid=WqN2mZX1mxyOWzVwUx0Mo3EAUkiX3mRneUFAUA0&irgwc=1&MPid=221109&cid=aff%7Cc%7CIR

https://uk.norton.com/ps/4up_norton360_nav_ns_nd_np_Reading_tw_nb.html

https://www.avira.com/en/campaigns/acq/avpro/Techradar/av-pro-uk?x-c-channel=partnerize&x-a-medium=1100l10026&utm_source=partnerize&utm_medium=affiliate&utm_content=1100l52030&utm_term=futurepublishing&x-clickref=1011lbhuuLcX

https://www.trendmicro.com/en_gb/forHome/products/antivirus-plus.html?irclickid=QAe2DuSk8xyOUQF0M-0V7wD0UkiX3mTueUFAUA0&irgwc=1

https://www.kaspersky.co.uk/antivirus?sid=itproportal-gb-8824742738814738000&AID=12584495&PID=100134076&campaign=tcid_cj_12584495_100134076_cdb7fa2df43811ea83bd00790a180511_x5&CJ_CID=3486349&CJ_PID=100134076&CJ_CID_NAME=Future+Publishing+Ltd&utm_source=CJ&utm_medium=affiliate&CJEVENT=cdb7fa2df43811ea83bd00790a180511


https://www.amazon.com/s?tag=georiot-us-default-20&k=G+Data+Antivirus&ascsubtag=itproportal-row-7913326345896524000-20

https://www.webroot.com/gb/en/home?sc=70161000000TRru&rc=8200

https://www.eset.com/us/home/antivirus/?sid=hawk-custom-tracking&ref=AFC-CJ&attr=100134076&pub=11553473&shop=itproportal-row-6973904843495994000&utm_source=100134076&utm_medium=affiliate&utm_content=11553473&cjevent=0be11851f43911ea83bd00790a180511

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE COMMUNITY
malicious.link post snagging-creds-from-locked-machine.pdf
401.9 KB
First o, this is dead simple and shouldn’t work, but it does. Also, there is no possible way that I’m the rst one that has identied this, but here it is (trust me, I tested it so many ways to conrm it because I couldn’t believe it was true) TL;DR USB Ethernet + DHCP + Responder == Creds ... #Full
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Top Execution logging and tracing tools :
(easy install)

* [Wireshark](https://www.wireshark.org/) - A free and open-source packet analyzer

* [tcpdump](http://www.tcpdump.org/) - A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture

* [mitmproxy](https://github.com/mitmproxy/mitmproxy) - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface

* [Charles Proxy](https://charlesproxy.com) - A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic

* [usbmon](https://www.kernel.org/doc/Documentation/usb/usbmon.txt) - USB capture for Linux.

* [USBPcap](https://github.com/desowin/usbpcap) - USB capture for Windows.

* [dynStruct](https://github.com/ampotos/dynStruct) - structures recovery via dynamic instrumentation.

* [drltrace](https://github.com/mxmssh/drltrace) - shared library calls tracing.

enjoy:)
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘DANGEROUS HACKING 2020

F E A T U R E S :

Cross Platform Support
Command and file auto-completion
Antivirus detection
Able to turn off/on display monitors
Hide/unhide files and directories
View/edit the hosts file
View all the systems environment variables
Keylogger with options to view status, start, stop and dump the logs onto your host system
View the location and other information of the target machine
Execute custom python scripts which return whatever you print to screen
Screenshots
Virtual machine detection
Download/Upload files to and from the target system
Attempt to dump the systems password hashes
Payloads' properties are "disguised" as other known programs
Display a user/password dialog box to obtain user password
Dump passwords saved via Chrome
Clear the System, Security, and Application logs
Enable/Disable services such as RDP,UAC, and Windows Defender
Edit the accessed, created, and modified properties of files
Create a custom popup box
View connected webcam and take snapshots
View past connected wifi connections along with their passwords
View information about drives connected
View summary of registry values such as DEP
Mac OSX Specific
Display a user/password dialog box to obtain user password
Change the login text at the user's login screen
Webcam snapshots
Mac OSX/Linux Specific
SSH from the target machine into another host
Run sudo commands
Attempt to bruteforce the user's password using the passwords list found in Tools/
Webcam snapshots? (untested on Linux)

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/nathanlopez/Stitch.git

2) cd Stitch

3) # for Windows
pip install -r win_requirements.txt

# for Mac OSX
pip install -r osx_requirements.txt

# for Linux
pip install -r lnx_requirements.txt

4) python main.py

U S E F O R L E A R N
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
6 Days Lab 1.1 Vulnhub.pdf
2.4 MB
full + pictures