UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A simple way for others to prompt for an empty number when they call your phone :


> When you don't want to be annoyed by others and are embarrassed to turn off the phone, it is a good idea to let others call your phone to prompt an empty number. Here is a way to make your mobile phone become an empty number at any time. It is very simple~~ Friends in need can make a note...
γ€€γ€€
> Enter **21*999999# in the standby mode and press the dial button~ OK ! ~ done
γ€€γ€€
> in this state, someone hit you over the phone number is empty and you will not receive phone
γ€€γ€€
> preliminary judging most phones can
γ€€γ€€
> Note: Since there is no test for all models, we can not guarantee success rate
γ€€γ€€
> in this state, even if to remind shutdown Power also will not cancel
γ€€
> the code number to cancel the empty state is the same as above ## 21 # enter the
γ€€γ€€
> last remind remember to finish off state so as not to cause delay in releasing the empty No.
γ€€γ€€
> this principle probably use call forwarding to achieve, but do not answer incoming calls There is no charge if you pass, so this method will not waste your phone bill...

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to Enable SSH on Ubuntu :

1) Process for Enabling SSH
You can successfully enable and run the SSH protocol on your server by undergoing these four primary steps. These steps can assist you in effectively utilizing the network protocol of SSH on ubuntu 20.04.

Step 1 is the installation of SSH

Step 2 is enabling SHH

Step 3 is checking the status

Step 4 is connecting with firewall port

2) Installation of SSH
For installing, just run two additional commands for updating and up-gradation and then run the third sudo command to install the SSH on your server finally. The commands are as follows;

$ sudo apt update


$ sudo apt upgrade


$ sudo apt install openssh-server

3) You can also use install shh instead of openssh in the command as both will allow you to download the open package of SHH protocol. Type your password and continue the installation.

4) Enabling SSH
Now simply enable the network protocol in your operating system with the help of the following command;

$ sudo systemctl enable --now ssh

5) That’s all, and you have enabled the protocol for encrypted network on your system successfully.

Check Status

6) Now simply check the status of your protocol. Checking status also involves the command for stopping, reloading, and restarting the protocol. Use the following controls if you want to check the status.

$ systemctl status ssh.service

7) You can modify the status checking if you replace the status with other commands encompassing the reload, restart, and stop commands.

8) Connect with Firewall Port
It’s recommended connecting the server with port 22 if your firewall is active, also ensure that you are logged in the server of the protocol with the root user.

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

> > SHELLS FOR BEGINERS :

πŸ¦‘What is Shellcode?

1) We know that shellcode has little to do with scripting for shells, so why the name? The relation with the shell is that shellcode was typically used specifically to open or 'pop' a shell – that is, an instance of a command line interpreter – so an attacker might use the shell as a means of manipulating the machine. Imagine that you could make a user enter an obviously harmless string into a legal program on their device that would magically open the computer to a reverse shell?

2) That's the last reward for pwning. Spawning a new process that will send a shell often requires very little javascript, so popping shells is a very lightweight, effective means of attack.

3) In order to achieve it, you’d need to find an exploitable program and fashion some malicious input string – the shellcode – containing small chunks of executable code to force the program into popping a shell. This is possible because for most programs, in order to be useful, they need the ability to receive input: to read strings and other data supplied by the user or piped in from another program.

4) Shellcode exploits this requirement by containing instructions telling the program to do something it otherwise wouldn’t or shouldn’t. Of course, almost no program is going to easily misinterpret data as code without a bit of persuasion, and the primary name of the game when it comes to persuading programs to engage in this kind of undefined behavior is another hacking conversation favorite: the buffer overflow.

πŸ¦‘Controlling Code Execution

1) When we create a buffer overflow, the aim is to write a sufficiently large amount of data into the program’s memory so that two things happen. First, we fill up the allocated buffer, and second we supply enough extra data so that we overwrite the address that will be executed next with our own code.

2) This isn’t simple, but it might sound harder to do than it actually is. Because of the nature of how program memory is mapped out, when any function is called, there’s always a pointer held in memory to the address of the next function that should be executed after the currently executing one; this pointer is known as the Instruction Pointer, sometimes referred to as EIP (32 bit) or RIP (64 bit).

3) By reverse engineering a particular program and with a lot of fuzzing and experimenting, we can determine both whether a given program contains any functions that are vulnerable to a buffer overflow and, if so, the address of the Instruction Pointer when that vulnerable function has finished calling.

4) Knowing the offset – the memory address – of the Instruction Pointer at that point in code means we can determine precisely how much extra data we need to overflow the buffer and insert our own code at the address of the Instruction Pointer. When we do that, the program will try to execute the code at the address we’ve written to the RIP register. If that code is junk, like in the example above, the program will crash, but if it isn’t – if it’s a valid address, things start to get more interesting.

source: wiki
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Learn CSS - The Complete Guide 2020 (incl. Flexbox, Grid & Sass)

https://drive.google.com/drive/folders/1z3L0qQPJS8MPTO1SblQcL66-2_Q6H8cY
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘MOST POPULAR CREDIT CARD MANAGER, TRUSTED APPS 2020 :

https://play.google.com/store/apps/details?id=net.thesimplest.creditcardmanager&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_net.thesimplest.creditcardmanager_us_others_16004994711195

https://play.google.com/store/apps/details?id=com.petalcard.petal&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.petalcard.petal_us_others_16004994753521

https://apps.apple.com/us/app/id1400353064?mt=8

https://apps.apple.com/us/app/id1428580080?mt=8

https://play.google.com/store/apps/details?id=com.ollocard.mobileapp&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.ollocard.mobileapp_us_others_16004994851710

https://apps.apple.com/us/app/id1427782837?mt=8

https://play.google.com/store/apps/details?id=com.creditonebank.mobile&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.creditonebank.mobile_us_others_16004994894729

https://apps.apple.com/us/app/id1128712763?mt=8

https://play.google.com/store/apps/details?id=com.firstpremier.mypremiercreditcard.app&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.firstpremier.mypremiercreditcard.app_us_others_16004994945189

https://apps.apple.com/us/app/id1476775662?mt=8

https://play.google.com/store/apps/details?id=com.discoverfinancial.mobile&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.discoverfinancial.mobile_us_others_16004994982236

https://apps.apple.com/us/app/id338010821?mt=8

https://play.google.com/store/apps/details?id=com.onlineceo.creditcardverifier&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.onlineceo.creditcardverifier_us_others_16004995052540

https://play.google.com/store/apps/details?id=com.debit_credit_card.creditcardmanager&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.debit_credit_card.creditcardmanager_us_others_16004995069099

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Pro Tips By undercode :
> Crontab Syntax and Statements


Crontab (cron table) is a text file that defines the schedule of cron jobs. Crontab files can be created, viewed, modified, and deleted using the crontab command.

Each line in the user's crontab contains six fields separated by a space, followed by the command to run:

* * * * * command (s)
^ ^ ^ ^ ^
| | | | | allowed values
| | | | | -------
| | | | ----- Day of week (0 - 7) (Sunday = 0 or 7)
| | | ------- Month (1 - 12)
| | --------- Day of month (1 - 31)
| ----------- Hour (0 - 23)
------------- Minute (0 - 59)

πŸ¦‘The first five fields (time and date) also accept the following operators:

1) The asterisk operator means all valid values. If you have an asterisk in the Minute field, it means the task will run every minute.

2) The hyphen operator allows you to specify a range of values. If you set 1-5 in the Day of week field, the task will run every weekday (Monday through Friday). The range is inclusive, which means the first and last values ​​are included in the range.

3) The comma operator allows you to define a list of values ​​to repeat. For example, if you have 1, 3, 5 in the Hour field, the task will run at 1, 3, and 5 AM. The list can contain individual values ​​and ranges 1-5, 7, 8, 10-15

4-5) The forward slash operator lets you specify pitch values ​​that can be used in combination with ranges. For example, if you specified 1-10 / 2 in the Minute field, this means that the action will be performed every two minutes in the range 1 to 10, as if you specified 1, 3, 5, 7, 9. Instead of a range of values, you can also use the asterisk operator. You can use "* / 20" to specify a task to run every 20 minutes.

πŸ¦‘The syntax for system-wide crontabs is slightly different from custom crontabs. It contains an additional required user field that specifies which user will run the cron job.

* * * * * <username> command (s)


1) To edit the crontab file or create one if it does not exist, use the crontab -e command.


2) Run cron job every 5 minutes
There are two ways to run a cron job every five minutes.

The first option is to use the comma operator to create a list of minutes:

0,5,10,15,20,25,30,35,40,45,50,55 * * * * command


The above line is syntactically correct and will work fine. However, entering the entire list can be tedious and error prone.

The second option to specify a job that will run every 5 minutes of the hour is to use the step statement:

* / 5 * * * * command


* / 5 means create a list of all minutes and run a job for every fifth value from the list.


@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Network security Tips:

is essentially the information security on the network. In a broad sense, all relevant technologies and theories related to the confidentiality, integrity, availability, authenticity, and controllability of information on the network are the research fields of network security. Ensuring the information security of the network system is the goal of network security. Information security includes two aspects: the security of information storage and the security of information transmission. Information storage security refers to the security of information in a static storage state, such as whether it will be used without authorization, etc. The transmission security of information refers to the safety of information in the dynamic transmission process. In order to ensure the security of network information transmission, there are the following issues:

(1) The monitoring of information on the network

(2) The impersonation of the user's identity

(3) The tampering of information on the network

(4) The denial of the information sent

(5) The retransmission of the information


@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
How-To_ Find IDOR.pdf
1.8 MB
How-To_ Find IDOR (Insecure Direct Object Reference) Vulnerabilities for large bounty rewards
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 bypasses DPI (Deep Packet Inspection) systems found in many ISPs (Internet Service Providers) which block access to certain websites.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/SadeghHayeri/GreenTunnel.git

2) cd GreenTunnel

3) $ npm i -g green-tunnel
or using snap (edge version):

4) sudo snap install --edge green-tunnel --devmode`

5) Docker
$ docker run -p 8000:8000 sadeghhayeri/green-tunnel
envs

PORT
HTTPS-ONLY
VERBOSE
SILENT
DNS_TYPE
DNS_SERVER
usage:

6) $ docker run -e 'PORT=1000' -p 8000:1000 sadeghhayeri/green-tunnel

7) On Raspberry Pi
$ docker run -p 8000:8000 sadeghhayeri/green-tunnel:arm

8) If you want to make container keep running when reboot:

$ docker run -d --restart unless-stopped -p 8000:8000 sadeghhayeri/green-tunnel:arm
Please make sure port 8000 is not blocked on Raspberry Pi firewall. (sudo ufw allow 8000 comment Green-Tunnel)

9) To use it on your other device, set http proxy to <Raspberry Pi IP Address>:<PORT>. (PORT = 8000)

enable/disable proxy on windows

HTTPHandler

add CLI arguments

catch all exceptions

add preferences menu

fix close button


@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Create android games videos tutorials :

English - Arabic

https://drive.google.com/drive/folders/0B6RiB8cVZQhmTDZvN0JadGtScGs
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Go Simple Mail is a simple and efficient package to send emails. It is well tested and documented.

Go Simple Mail can only send emails using an SMTP server. But the API is flexible and it is easy to implement other methods for sending emails using a local Postfix, an API, etc.


F E A T U R E S :

Multiple Attachments with path
Multiple Attachments in base64
Multiple Recipients
Priority
Reply to
Set other sender
Set other from
Embedded images
HTML and text templates
Automatic encoding of special characters
SSL and TLS
Unencrypted connection (not recommended)
Sending multiple emails with the same SMTP connection (Keep Alive or Persistent Connection)
Timeout for connect to a SMTP Server
Timeout for send an email
Return Path
Alternative Email Body
CC and BCC
Add Custom Headers in Message
Send NOOP, RESET, QUIT and CLOSE to SMTP client
PLAIN, LOGIN and CRAM-MD5 Authentication (since v2.3.0)
Custom TLS Configuration (since v2.5.0)

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/xhit/go-simple-mail.git

2) cd go-simple-mail

3) type Email ΒΆ

> type Email struct {
Charset string
Encoding encoding
Error error
SMTPServer *smtpClient
// contains filtered or unexported fields
}


> Email represents an email message.

func NewMSG ΒΆ
func NewMSG() *Email
NewMSG creates a new email. It uses UTF-8 by default. All charsets: http://webcheatsheet.com/HTML/character_sets_list.php

func (*Email) AddAddresses
func (email *Email) AddAddresses(header string, addresses ...string) *Email

> AddAddresses allows you to add addresses to the specified address header.

func (*Email) AddAlternative
func (email *Email) AddAlternative(contentType contentType, body string) *Email


πŸ¦‘more info
https://pkg.go.dev/github.com/xhit/go-simple-mail/v2

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
India's digital payment app Paytm was removed by Google
#international
_
Forwarded from UNDERCODE NEWS
WhatsApp, Signal and Telegram failed miserably banal security test
#Vulnerabilities
_