UNDERCODE TESTING
310 subscribers
311 photos
24 videos
173 files
29.5K links
🦑 World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

Services: Undercode.help/services

youtube.com/undercode

@Undercode_Testing
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
Types Of Sensitive Information.pdf.pdf
835.6 KB
Forwarded from Exploiting Crew (Pr1vAt3)
VAPT INTERVIEW QUESTIONS .pdf
1.6 MB
Forwarded from Exploiting Crew (Pr1vAt3)
VAPT Interview Questions and Answers.pdf
1.4 MB
Forwarded from Exploiting Crew (Pr1vAt3)
Web Application Penetration Testing.pdf
16.1 MB
Forwarded from Exploiting Crew (Pr1vAt3)
Web Security Testing Guide.pdf
3.4 MB
Forwarded from Exploiting Crew (Pr1vAt3)
WIFI ATTACK COMMANDS.pdf
142.6 KB
Forwarded from Exploiting Crew (Pr1vAt3)
Wifi hacking.pdf
1.9 MB
Forwarded from Exploiting Crew (Pr1vAt3)
WiFi Penetration Testing Cheat Sheet.pdf
694.5 KB
Forwarded from Exploiting Crew (Pr1vAt3)
WiFi Penetration Testing Guide.pdf
132.3 KB
Forwarded from Exploiting Crew (Pr1vAt3)
windows Privilege Escalation.pdf
346.6 KB
Forwarded from Exploiting Crew (Pr1vAt3)
XSS Cheat Sheet.pdf
667.3 KB
Forwarded from Exploiting Crew (Pr1vAt3)
2. Create Custom Modules:
- Write your own Xposed modules to hook specific functions in Android apps.
- For example, create a module that logs when a user inputs sensitive data like a password or PIN.

---

### Step 6: Reporting Findings

- Log Results: Document all hooks and modifications made during the testing process. This can help in creating a detailed report on vulnerabilities such as insecure data handling, poor encryption, or API flaws.
- Create Exploits: Automate exploit generation using custom modules for repeated tests on similar vulnerabilities.

---

### Ethical Considerations
- Always ensure you have explicit permission to test any app.
- Use Xposed responsibly for ethical hacking and security research only.

---

Let me know if you'd like more details on specific Xposed modules or techniques!
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Xposed Framework, a powerful tool for Android customization and hacking. Xposed allows you to modify system and app behavior without modifying APKs, making it a great tool for penetration testers and security researchers.

---

## Xposed Framework Hacking Tutorial

Xposed Framework is a tool for Android devices that allows you to modify system-level behavior and individual apps at runtime. It provides hooks that enable you to change app behavior, bypass protections, or test for vulnerabilities.

### Prerequisites
1. Rooted Android Device:
To use Xposed, your device needs to be rooted. Tools like Magisk or SuperSU can be used for rooting.

2. Install Xposed Framework:
- Download the Xposed Installer APK from [Xposed's official site](https://repo.xposed.info/).
- Install the APK on your rooted Android device.

3. Install Xposed Modules:
Modules are what allow Xposed to hook into apps and change their behavior.
- Popular modules for security testing include:
- App Settings (to modify app permissions and behavior).
- XPrivacyLua (for manipulating app permissions).
- Substrate (for advanced hooking capabilities).

---

### Step 1: Basic Setup

1. Enable Xposed Framework:
Once installed, open the Xposed Installer app. Enable the framework and reboot your device.

2. Install Modules:
After enabling the framework, go to the "Download" section in the Xposed Installer, search for modules like XPrivacyLua (for privacy manipulation) or App Settings (to change app settings), and install them.

---

### Step 2: Analyzing an App

1. Hooking into an App:
- Open the Xposed Installer and go to the Modules tab.
- Enable the App Settings or XPrivacyLua module, and configure the hooks to manipulate or bypass app behavior.

2. Modify App Permissions:
- Use XPrivacyLua to deny apps specific permissions like camera, location, SMS, or contacts.
- For example, you can stop apps from sending sensitive data over the network.

3. Bypass SSL Pinning:
- If an app uses SSL pinning to prevent certificate manipulation, use Xposed SSL Unpinning modules.
- These modules hook into the SSL connection code and allow interception of SSL traffic.

---

### Step 3: Exploiting Vulnerabilities

1. Test for Hardcoded Credentials:
- You can use App Settings to modify app behavior dynamically and check if apps have hardcoded credentials or perform insecure operations.
- Modify app functions at runtime to bypass authentication and access restricted parts of the app.

2. Bypass Root Detection:
- Many apps detect whether they are running on a rooted device and block access if they find out. You can use RootCloak or similar modules to bypass this check.

3. Monitor Network Traffic:
- Use Burp Suite in conjunction with Xposed to inspect and modify network traffic.
- Set up a proxy on your device, intercept requests, and look for vulnerabilities like insecure data transmission or exposed API keys.

---

### Step 4: Advanced Hooking

1. Hook System Methods:
Xposed allows you to hook into system functions. For example:
   XposedBridge.hookAllMethods(Class.forName("android.app.Activity"), "onPause", new XC_MethodHook() {
@Override
protected void beforeHookedMethod(MethodHookParam param) throws Throwable {
Log.d("Xposed", "Activity is pausing: " + param.method.getName());
}
});


This example hooks into the onPause method of all activities to log when any activity is paused. You can customize hooks for specific methods based on your analysis.

2. Manipulate the UI:
Modify the app’s UI behavior, such as bypassing confirmation dialogs or manipulating elements, by hooking UI-related methods.

---

### Step 5: Testing and Debugging

1. Use Xposed for Debugging:
- Monitor method calls and function behavior in real time using logging or a custom debug module.
- Example: Intercept a method that retrieves sensitive information and log it to the console for further analysis.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Gobuster - Directory and File Brute Forcing

Gobuster is a tool used for brute forcing directories and files on web servers, often used to discover hidden resources and files that could be vulnerable.

---

### Basic Usage Command:
gobuster dir -u http://example.com -w /path/to/wordlist.txt


Explanation:
- gobuster: Runs the Gobuster tool.
- dir: Specifies the mode to brute-force directories and files.
- -u http://example.com: The target URL to scan.
- -w /path/to/wordlist.txt: Specifies the path to a wordlist that contains potential directory and file names.

---

### Example: Brute Force with Status Code Filtering
gobuster dir -u http://example.com -w /path/to/wordlist.txt -s "200,301"


Explanation:
- -s "200,301": Filters results to only show directories and files that return HTTP status codes 200 (OK) and 301 (Moved Permanently), indicating valid paths.

---

### Example: Brute Force Subdomains
gobuster dns -d example.com -w /path/to/subdomains.txt


Explanation:
- dns: Specifies the mode to brute-force subdomains.
- -d example.com: The domain to search for subdomains.
- -w /path/to/subdomains.txt: Path to a wordlist containing possible subdomains.

---

### Example: Using Custom User-Agent
gobuster dir -u http://example.com -w /path/to/wordlist.txt -H "User-Agent: CustomAgent"


Explanation:
- -H "User-Agent: CustomAgent": Specifies a custom user-agent to avoid detection or bypass certain filters.

---

### Example: Using Multiple Threads
gobuster dir -u http://example.com -w /path/to/wordlist.txt -t 50


Explanation:
- -t 50: Sets the number of concurrent threads to 50, speeding up the brute-forcing process.

---

### Important Notes:
1. Gobuster is mainly used in penetration testing and security research.
2. Always obtain permission before using Gobuster for brute-forcing directories, files, or subdomains. Unauthorized testing can result in legal consequences.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Acunetix - Web Application Security Scanner

Acunetix is an automated web application security scanner used to find vulnerabilities in web applications, including SQL injections, cross-site scripting (XSS), and other vulnerabilities.

---

### Basic Usage Command:
acunetix start --target=http://example.com


Explanation:
- acunetix start: Starts the Acunetix scan.
- --target=http://example.com: Specifies the target URL to scan for vulnerabilities.

---

### Example: Scan with Authentication
acunetix start --target=http://example.com --auth-user=admin --auth-pass=password123


Explanation:
- --auth-user=admin: Provides the username for basic authentication.
- --auth-pass=password123: Provides the password for basic authentication.

---

### Example: Scan Specific URLs
acunetix start --target=http://example.com --scan-url="http://example.com/admin"


Explanation:
- --scan-url="http://example.com/admin": Specifies a specific URL to scan within the target domain.

---

### Example: Output to a Report
acunetix start --target=http://example.com --report-file=scan_report.pdf


Explanation:
- --report-file=scan_report.pdf: Saves the scan results to a PDF report.

---

### Example: Running an Automated Scheduled Scan
acunetix schedule --target=http://example.com --time="03:00"


Explanation:
- --time="03:00": Schedules the scan to run at a specific time (3:00 AM).

---

### Important Notes:
1. Acunetix is a commercial tool widely used for comprehensive web security testing.
2. Always have explicit authorization to scan and test web applications. Unauthorized scanning may lead to legal consequences.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: XSSer - Cross-Site Scripting (XSS) Attack Tool

XSSer is an automated tool used to detect and exploit Cross-Site Scripting (XSS) vulnerabilities in web applications. It helps identify places where attackers can inject malicious scripts into web pages viewed by other users.

---

### Basic Usage Command:
xsser -u http://example.com/page?id=1


Explanation:
- xsser: Runs the XSSer tool.
- -u http://example.com/page?id=1: Specifies the target URL where XSS vulnerabilities are to be tested (in this case, the id parameter).

---

### Example: Using XSSer with a Payload List
xsser -u http://example.com/page?id=1 -p /path/to/payloads.txt


Explanation:
- -p /path/to/payloads.txt: Specifies the path to a file containing different XSS payloads to test.

---

### Example: Scanning Multiple URLs for XSS
xsser -u http://example.com/page?id=1 -u http://example.com/page?id=2


Explanation:
- -u http://example.com/page?id=2: Allows specifying multiple URLs to test for XSS vulnerabilities.

---

### Example: Running XSSer in Brute-Force Mode
xsser -u http://example.com/page?id=1 --brute


Explanation:
- --brute: Enables brute-force scanning mode, testing various parameters and payload combinations for XSS vulnerabilities.

---

### Example: Using Proxy for Traffic Capture
xsser -u http://example.com/page?id=1 --proxy="http://127.0.0.1:8080"


Explanation:
- --proxy="http://127.0.0.1:8080": Routes traffic through a proxy (useful for capturing requests and responses or evading detection).

---

### Important Notes:
1. XSSer is designed for ethical hacking and penetration testing.
2. Always ensure you have explicit permission to perform security testing, as unauthorized exploitation of XSS vulnerabilities is illegal.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Sublist3r - Subdomain Enumeration Tool

Sublist3r is a fast subdomain enumeration tool designed to gather subdomains of a target domain. It utilizes various search engines and other methods to discover hidden subdomains, which can be crucial for security testing.

---

### Basic Usage Command:
sublist3r -d example.com


Explanation:
- sublist3r: Runs the Sublist3r tool.
- -d example.com: Specifies the target domain (example.com) to search for subdomains.

---

### Example: Saving Results to a File
sublist3r -d example.com -o subdomains.txt


Explanation:
- -o subdomains.txt: Saves the found subdomains into a text file (subdomains.txt).

---

### Example: Using Multiple Engines for Enumeration
sublist3r -d example.com -b


Explanation:
- -b: Uses brute-force techniques and other search engines to enumerate more subdomains.

---

### Example: Limit Number of Results
sublist3r -d example.com -t 50


Explanation:
- -t 50: Limits the number of threads to 50 for enumeration. This can be adjusted based on the speed and load requirements.

---

### Example: Displaying Verbose Output
sublist3r -d example.com -v


Explanation:
- -v: Enables verbose mode, showing detailed output for each subdomain found.

---

### Important Notes:
1. Sublist3r is commonly used for reconnaissance during penetration testing and bug bounty programs.
2. Always ensure you have explicit authorization before performing subdomain enumeration on a domain. Unauthorized scanning can lead to legal issues.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: DirBuster - Directory and File Bruteforcing

DirBuster is a multi-threaded Java application used to brute-force directories and files on web servers. It's typically used to find hidden resources that might expose vulnerabilities in web applications.

---

### Basic Usage Command:
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt


Explanation:
- java -jar dirbuster.jar: Runs the DirBuster Java application.
- -u http://example.com: Specifies the target URL to scan.
- -l /path/to/wordlist.txt: Specifies the path to the wordlist containing potential directory and file names.

---

### Example: Specifying a Custom HTTP Port
java -jar dirbuster.jar -u http://example.com:8080 -l /path/to/wordlist.txt


Explanation:
- http://example.com:8080: Scans a target on a specific port (8080 in this case), useful if the web server is running on a non-standard port.

---

### Example: Brute Forcing with Multiple Threads
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt -t 50


Explanation:
- -t 50: Specifies 50 concurrent threads to speed up the brute-forcing process.

---

### Example: Saving Results to a File
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt -o /path/to/output.txt


Explanation:
- -o /path/to/output.txt: Saves the scan results to the specified output file (output.txt).

---

### Example: Using a Proxy
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt -p 127.0.0.1:8080


Explanation:
- -p 127.0.0.1:8080: Routes traffic through a proxy server (useful for anonymizing the scan or debugging).

---

### Important Notes:
1. DirBuster is a powerful tool for penetration testers looking to discover hidden files and directories on a target.
2. Always ensure you have proper authorization to scan the target server, as unauthorized brute-forcing is illegal and unethical.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Wfuzz - Web Application Fuzzing Tool

Wfuzz is a web application vulnerability scanner used to perform fuzzing attacks. It is commonly used for brute-forcing web applications to find hidden directories, files, and parameters that could be vulnerable to attacks like SQL injection or file inclusion.

---

### Basic Usage Command:
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/FUZZ


Explanation:
- wfuzz: Runs the Wfuzz tool.
- -c: Enables colorized output for easier reading of results.
- -z file,/path/to/wordlist.txt: Specifies a wordlist for fuzzing.
- -u http://example.com/FUZZ: The target URL where FUZZ is the placeholder for words in the wordlist to be tested.

---

### Example: Fuzzing Multiple Parameters
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/page.php?id=FUZZ&user=admin


Explanation:
- id=FUZZ&user=admin: Fuzzes the id parameter while keeping the user parameter fixed.

---

### Example: Fuzzing HTTP Headers
wfuzz -c -z file,/path/to/wordlist.txt -H "X-Secret: FUZZ" http://example.com


Explanation:
- -H "X-Secret: FUZZ": Fuzzes a custom HTTP header (X-Secret) by injecting different words from the wordlist.

---

### Example: Using a Proxy for Traffic
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/FUZZ --proxy http://127.0.0.1:8080


Explanation:
- --proxy http://127.0.0.1:8080: Routes the fuzzing traffic through a proxy for anonymity or to capture the traffic.

---

### Example: Brute Force Directories
wfuzz -c -z dir,/path/to/dirlist.txt -u http://example.com/FUZZ


Explanation:
- -z dir,/path/to/dirlist.txt: Fuzzes directory names from the specified wordlist to discover hidden directories on the server.

---

### Example: Fuzzing with Recursive Mode
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/FUZZ -r


Explanation:
- -r: Enables recursive fuzzing, where Wfuzz continues fuzzing on discovered directories or files.

---

### Important Notes:
1. Wfuzz is highly effective for brute-forcing hidden parameters and files in web applications.
2. Always obtain explicit permission to perform fuzzing and penetration tests, as unauthorized scanning can be illegal.