UNDERCODE TESTING
312 subscribers
311 photos
24 videos
173 files
29.6K links
๐Ÿฆ‘ World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

โœจ Services: Undercode.help/services

โœจyoutube.com/undercode

@Undercode_Testing
Download Telegram
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘Automated Wifi Hacking:

Wifite is a Python script designed for wireless network auditing, simplifying the use of wireless-auditing tools by automating their execution. It consolidates multiple attack methods to retrieve wireless passwords efficiently.

---

Features
- Attack Methods:
- WPS:
- Offline Pixie-Dust attack
- Online Brute-Force PIN attack
- WPA:
- Handshake Capture + offline cracking
- PMKID Hash Capture + offline cracking
- WEP:
- Fragmentation, chop-chop, aireplay, and other known attacks
- Automation:
- Select targets, and Wifite will handle the attack process automatically.
- 5GHz Support:
- Limited to compatible wireless cards (-5 switch).
- Cracked Password Storage:
- Saves results in the current directory with metadata.
- De-authentication Control:
- Disable deauths using --no-deauths.

---

Supported Operating Systems
- Designed for Kali Linux (latest version).
- Also supports ParrotSec.
- Other distributions may require manual updates of tools and wireless drivers.

---

Requirements
1. Wireless Card:
- Must support Monitor Mode and packet injection.
2. Essential Tools:
- Python (compatible with Python 2 & 3)
- Networking utilities:
- iwconfig, ifconfig
- Aircrack-ng Suite:
- airmon-ng, aircrack-ng, aireplay-ng, airodump-ng, packetforge-ng
3. Recommended Tools:
- tshark, reaver, bully, coWPAtty, pyrit, hashcat, hcxdumptool, hcxpcaptool

---

Installation
1. Clone the repository:

git clone https://github.com/derv82/wifite2.git
cd wifite2

2. Run Wifite directly:

sudo ./Wifite.py

3. Install Wifite system-wide:

sudo python setup.py install

- Installed to /usr/sbin/wifite.

4. Uninstallation:
Record and delete installed files:

sudo python setup.py install --record files.txt \
&& cat files.txt | xargs sudo rm \
&& rm -f files.txt

---

Usage
Run Wifite with default settings:
sudo ./Wifite.py
Optional arguments for specific attacks:
- PMKID capture:

--pmkid

- WPS Pixie-Dust attack:

--wps-only --pixie

- WPA handshake cracking:

--no-wps

- Disable deauth:

--no-deauths

---

Advanced Features
- Hidden SSID decloaking.
- Validation of handshakes with tools like pyrit, cowpatty, and aircrack-ng.
- WEP attack customization (e.g., replay, chopchop).
- Cracked passwords stored in the current directory with access point details.

Wifite simplifies wireless security assessments, making it an essential tool for pen testers using supported Linux distributions.

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘Why Hardware Tools Are Essential in 2024 For WIFI hacking ?

1โƒฃincreased Security Standards:
Newer Wi-Fi standards like WPA3 implement enhanced encryption (e.g., SAE or Simultaneous Authentication of Equals) that resist traditional brute-force or offline cracking attacks.
WEP and WPA1 are now nearly obsolete, reducing opportunities for basic software-based attacks

2โƒฃLimitations of Built-In Laptop Wireless Cards:
Many laptop wireless cards lack support for Monitor Mode or packet injection, which are critical for capturing and injecting data during attacks.
Integrated cards are typically low-power, making them less effective for long-range or interference-prone environments.

3โƒฃSpecialized Tools for Specific Tasks:
Capturing PMKIDs, deauthing access points, and brute-forcing PINs now require higher performance and specialized chipsets found in dedicated hardware tools.

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘Essential Hardware for Wireless Auditing Wireless Network Adapters:

1โƒฃUSB-based adapters like the Alfa AWUS036ACH or Panda PAU09 support Monitor Mode and packet injection.

ใ€‹Dual-band adapters (2.4GHz/5GHz) are necessary for modern Wi-Fi networks.

2โƒฃPortable Hacking Devices:

WiFi Pineapple:
A compact and powerful device for Wi-Fi auditing, man-in-the-middle attacks, and advanced monitoring.

ใ€‹Raspberry Pi with Wireless Adapter:
A cost-effective, portable platform for running tools like Wifite, Aircrack-ng, and Reaver.

ใ€‹HackRF One:
For advanced signal analysis, including software-defined radio (SDR) attacks

3โƒฃLong-Range Antennas:

High-gain antennas enhance the range and reliability of packet captures and injection.

4โƒฃ Battery-Powered Attack Platforms:

Devices like the Flipper Zero can execute simple wireless attacks without requiring a laptop.

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐…๐‘๐„๐„ ๐‘๐„๐’๐Ž๐”๐‘๐‚๐„๐’ - ๐‹๐ˆ๐๐”๐—

To acquire the basics of pentesting, it is crucial to understand what an operating system is.
As an open-source, community-developed operating system, Linux plays an essential role here.
As well as being a powerful tool for system administrators, Linux is also a powerful tool for pentesters.

In this list, you'll find various resources designed to help you understand and start with Linux.

๐Ÿ‘‰๐—ช๐—›๐—”๐—ง ๐—œ๐—ฆ ๐—Ÿ๐—œ๐—ก๐—จ๐—ซ?
๐ŸŒŸWhat is Linux on TechTarget
https://lnkd.in/eAm2rHXj

๐ŸŒŸWhat is Linux on Linux.com
https://lnkd.in/eTwMHeCM

๐Ÿ‘‰๐—Ÿ๐—œ๐—ก๐—จ๐—ซ ๐—™๐—ข๐—ฅ ๐—•๐—˜๐—š๐—œ๐—ก๐—ก๐—˜๐—ฅ๐—ฆ
๐ŸŒŸLinux journey by Cindy Quach
https://linuxjourney.com/

๐ŸŒŸYour linux guide by LinuxOpSys
https://linuxopsys.com/

๐ŸŒŸCrash Course for Beginners by freeCodeCamp
https://lnkd.in/eF9P79U4

๐ŸŒŸLinux Full Course for Beginners by FreeCodeCamp
https://lnkd.in/eGhw9Qy3

๐ŸŒŸHow Linux Works by Gwyneth Peรฑa-Siguenza
https://lnkd.in/eDZt4CKA

๐ŸŒŸNDG Linux Unhatched by Netacad
https://lnkd.in/ebmPF9ev

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐—•๐—”๐—ฆ๐—› ๐—ฆ๐—–๐—ฅ๐—œ๐—ฃ๐—ง๐—œ๐—ก๐—š
๐ŸŒŸWhat is Bash by opensource
https://lnkd.in/eVYjUxvD

๐ŸŒŸBash for Beginners by Microsoft Developer
https://lnkd.in/eA7E9wTt

๐ŸŒŸBash Scripting Full Course by linuxhint
https://lnkd.in/eFTJe3Dm

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐—›๐—”๐—–๐—ž๐—œ๐—ก๐—š ๐—ช๐—œ๐—ง๐—› ๐—Ÿ๐—œ๐—ก๐—จ๐—ซ:

๐ŸŒŸUseful Commands and tools for pentest on Linux by C.S. by G.B.
https://lnkd.in/eUS5hi8w

๐ŸŒŸLinux for hackers by Chuck Keith aka NetworkChuck
https://lnkd.in/er4MJht9
๐ŸŒŸLearn Linux on Hackthebox (blog post)
https://lnkd.in/eXcX2fng

๐ŸŒŸTop Kali Linux Tools for hacking by ITโ€™s Foss
https://lnkd.in/eDKjut6n

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘How to run OpenAI's CLI (Python-based Tool)

OpenAI also offers a CLI tool called openai, which you can install via pip and use to interact with their models directly from the command line. This is more structured than using curl and can be easily integrated into scripts.

Install the OpenAI CLI:
pip install openai


Usage:
After installing the openai package, you can use the openai command-line tool directly.

openai api completions.create -m text-davinci-003 -p "What is the capital of France?" --max-tokens 50


- -m specifies the model (text-davinci-003 in this case).


โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘dark web links
A list of helpful links I found for the dark web


note: Some of the content here can lead you to some illegal websites. so the use of those links is on you!

The list:
Hidden wikis/ sites with links:
Darkweblink.com

http://dwltorbltw3tdjskxn23j2mwz2f4q25j4ninl5bdvttiy4xb6cqzikid.onion/
OnionLinks

http://s4k4ceiapwwgcm3mkb6e4diqecpo7kvdnfr5gg7sph7jjppqkvwwqtyd.onion
The Original Hidden Wiki

http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion/wiki/index.php/Main_Page
The Hidden Wiki

http://paavlaytlfsqyvkg3yqj7hflfg5jw2jdg2fgkza5ruf6lplwseeqtvyd.onion/
Another Hidden Wiki

http://2jwcnprqbugvyi6ok2h2h7u26qc6j5wxm7feh3znlh2qu3h6hjld4kyd.onion/
UnderDir

http://underdiriled6lvdfgiw4e5urfofuslnz7ewictzf76h4qb73fxbsxad.onion
TheDeepDarkNet

http://torlisthsxo7h65pd2po7kevpzkk4wwf3czylz3izcmsx4jzwabbopyd.onion/
DeepLink Onion Directory

http://deeeepv4bfndyatwkdzeciebqcwwlvgqa6mofdtsvwpon4elfut7lfqd.onion/
Pug's Ultimate Guide To The Dark Web

http://jgwe5cjqdbyvudjqskaajbfibfewew4pndx52dye7ug3mt3jimmktkid.onion/
Tor Links

http://torlinksge6enmcyyuxjpjkoouw4oorgdgeo7ftnq3zodj7g2zxi3kyd.onion/
Searching engine
Deep Search

http://search7tdrcvri22rieiwgi5g46qnwsesvnubqav2xakhezv4hjzkkad.onion/
Torch

http://xmh57jrknzkhv6y3ls3ubitzfqnkrwxhopf5aygthi7d6rplyvk3noyd.onion
Tor66

http://tor66sewebgixwhcqfnp5inzp5x5uohhdy3kvtnyfxc2e5mxiuh34iid.onion/
Ahmia

http://juhanurmihxlp77nkq76byazcldy2hlmovfu2epvl5ankdibsot4csyd.onion/
chat rooms
Ableonion

notbumpz34bgbz4yfdigxvd6vzwtxc3zpt5imukgl6bvip2nikdmdaad.onion
Black Hat Chat

http://blkhatjxlrvc5aevqzz5t6kxldayog6jlx5h7glnu44euzongl4fh5ad.onion

Source
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Cybersecurity Projects Ideas: From Beginners to Experts ๐Ÿ”

Are you looking to kickstart your career in cybersecurity or take it to the next level? Whether you're a beginner or an experienced professional, hands-on projects are the ultimate way to enhance your skills. ๐ŸŒŸ

๐ŸŸข Beginner-Level Projects
These are ideal for building foundational skills:
1๏ธโƒฃ Honeypot Setup
2๏ธโƒฃ Password Cracker
3๏ธโƒฃ Packet Sniffer
4๏ธโƒฃ Keylogger
5๏ธโƒฃ Forensic Analysis
6๏ธโƒฃ Home Lab Setup
7๏ธโƒฃ Basic Cryptography
8๏ธโƒฃ Phishing Campaign
9๏ธโƒฃ Wi-Fi Security Analysis
๐Ÿ”Ÿ Network Vulnerability Scanning

๐ŸŸก Intermediate-Level Projects
Challenge yourself with these impactful projects:
1๏ธโƒฃ1๏ธโƒฃ Firewall Rules
1๏ธโƒฃ2๏ธโƒฃ 2FA System
1๏ธโƒฃ3๏ธโƒฃ Secure Web App
1๏ธโƒฃ4๏ธโƒฃ Snort IDS
1๏ธโƒฃ5๏ธโƒฃ DNS Spoofer
1๏ธโƒฃ6๏ธโƒฃ Malware Reverse Engineering
1๏ธโƒฃ7๏ธโƒฃ TLS Mutual Authentication
1๏ธโƒฃ8๏ธโƒฃ Zero-Day Exploit Research

๐Ÿ”ด Advanced-Level Projects
For seasoned professionals seeking mastery:
2๏ธโƒฃ6๏ธโƒฃ Malware Analysis Sandbox
2๏ธโƒฃ7๏ธโƒฃ Full Disk Encryption
2๏ธโƒฃ8๏ธโƒฃ IDS/IPS with ML
2๏ธโƒฃ9๏ธโƒฃ Secure Cryptocurrency Wallet
3๏ธโƒฃ0๏ธโƒฃ Threat Detection Using AI
3๏ธโƒฃ1๏ธโƒฃ Firmware Reverse Engineering
3๏ธโƒฃ2๏ธโƒฃ ICS Security
3๏ธโƒฃ3๏ธโƒฃ Nation-State Malware Analysis
3๏ธโƒฃ4๏ธโƒฃ Advanced Firewalls

Source: Linkedin
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘What Types of Attacks Does SIEM Detect?

1๏ธโƒฃUnauthorized Access
While unauthorized access isnโ€™t a specific type of attack, it is typically indicative that one may be in progress. An external attacker may use something like brute force attack to attempt to crack a userโ€™s password, but a SIEM solution can detect repeated access attempts. Once detected, a SIEM can escalate this information to a security analyst in real time, enabling them to investigate the event and lock the account if there arenโ€™t already built-in parameters limiting the number of login attempts.

2๏ธโƒฃInsider Attacks
There are two types of insider attackers: malicious and accidental. A malicious insider is either an unhappy or opportunistic employee that uses the access they have to steal or sabotage sensitive data. It may also be a former employee who has not yet had their credentials deleted. A SIEM can monitor employee behavior and flag any activity that is unexpected for that particular user or access level. For example, if an ex-employeeโ€™s account suddenly became active or if an employee is accessing files or databases they donโ€™t need in order to do their job, these events would immediately be escalated to a security analyst.

3๏ธโƒฃAccidental insider attacks are those who unintentionally help an external bad actor to pivot during an attack. For example, if an employee misconfigured a firewall, this would leave an organization more vulnerable to a breach. Since security configurations are so vital, a SIEM can create an event any time a change is made, escalating it to a security analyst to ensure that it was intentional and correctly implemented.

4๏ธโƒฃMalware Infection
Malware is a broad term that generally includes any type of software that is created to disable or damage computer systems, like viruses, ransomware, worms, trojans, etc. While security logs may send out alerts that could indicate a breach, it could also just as easily be a false alarm. SIEM solutions use event correlation to better determine true infections and potential origin points of attack.

5๏ธโƒฃDenial of Service Attacks
A denial-of-service (DoS) attack disrupts the standard operation of a system or device, like a network server. This attack floods the target with traffic, which blockades normal traffic and forces it to deny access. Such attacks typically result in a slowdown of service or a total crash. A SIEM would be able to flag such an abnormal event from web traffic logs, prioritizing the event and sending it to an analyst for further investigation.

6๏ธโƒฃHijacking
Hijacking is when an attacker seizes control of systems, networks, or applications. For example, session hijacking can take place when a threat actor intercepts session tokens to gain access to a user account. SIEM solutions monitor user behavior and can detect suspicious activity, like a user accessing systems they donโ€™t typically use or having more than one active session. Additionally, any changes to root access are logged, so if a threat actor attempted to escalate privileges, a SIEM can escalate this information to the security team.

7๏ธโƒฃAdvanced Persistent Threats
Advanced Persistent Threats (APTs) are incredibly sophisticated attackers who use a high degree of stealth over a prolonged duration of time in order to compromise and retain access to a system. Because these attacks are so stealthy, they may not trigger alerts in certain parts of the system, or the alerts they do cause are dismissed as benign. Having event correlation in a SIEM solution helps demonstrate a pattern of abnormal behavior, flagging it as a true concern that security analysts should look into.
Forwarded from Exploiting Crew (Pr1vAt3)
8๏ธโƒฃWeb Application Attacks
There are a variety of strategies for attacks on web applications. For example, SQL injection attacks manipulate queries by injecting unauthorized, malicious SQL statements. Typically SQL injections are used to find and read, change, or delete sensitive information they wouldnโ€™t otherwise have access to. SIEM solutions can monitor activity from web applications, and can flag any abnormal activity, and use event correlation to see if any other changes took place during this event.

9๏ธโƒฃPhishing
Phishing uses deceptive emails or other means of communication to get malware past the perimeter or access credentials. These emails often contain malicious links or attachments embedded in emails. Once an attacker has legitimate credentials, they can seemingly login to a system without issue and attempt to escalate their privileges to gain root access and full control of the system. However, SIEM solutions are able to monitor employee behavior. For example, a SIEM could track authentication activities. While an attackerโ€™s credentials may be legitimate, their location or login time may be different. Any unusual authentication attempts would create an event in real time, enabling an analyst to lock out the user pending investigation.

๐Ÿ”ŸCentralizing Your Security with SIEM
Ultimately, SIEM solutions do more than just monitor your environment for these attacks. They centralize and normalize data streams, streamlining the investigation process for security analysts. By escalating only events that have been prioritized as truly risky, analysts donโ€™t have to waste time looking into benign threats and can reduce dwell times and the risk of damage to the organization.

Source
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿฆ‘LINUX FILE SYSTEM

Time to test your hashtag#Linux skills: What does /๐ฎ๐ฌ๐ซ mean?

The Linux file system used to resemble an unorganized town where individuals constructed their houses wherever they pleased. However, in 1994, the Filesystem Hierarchy Standard (FHS) was introduced to bring order to the Linux file system.

By implementing a standard like the FHS, software can ensure a consistent layout across various Linux distributions. Nonetheless, not all Linux distributions strictly adhere to this standard. They often incorporate their own unique elements or cater to specific requirements.

To become proficient in this standard, you can begin by exploring. Utilize commands such as "cd" for navigation and "ls" for listing directory contents. Imagine the file system as a tree, starting from the root (/). With time, it will become second nature to you, transforming you into a skilled Linux administrator.

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿฆ‘8 Popular Network Protocols
๐Ÿฆ‘Top CPUs for cracking in 2024:

1. AMD Ryzen 9 7950X3D โ€“ Best for gaming with 3D V-Cache technology.

2. Intel Core i9-14900K โ€“ High performance for multitasking and gaming.

3. AMD Ryzen 7 7800X3D โ€“ Great balance between performance and price.

4. Intel Core i7-14700K โ€“ A top choice for budget-conscious users.

5. AMD Ryzen 9 7900X โ€“ Excellent for content creation and heavy workloads.

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘ Tesla car Hacking and control it remotely + installisation:

https://github.com/teslamotors/vehicle-command
๐Ÿฆ‘BIOS Mods for free:

https://www.bios-mods.com/