UNDERCODE COMMUNITY
2.71K subscribers
1.24K photos
31 videos
2.65K files
83.1K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
The infamous Emotet botnet destroys diplomatic collaboration.
#Malwares
Forwarded from UNDERCODE NEWS
West Rock packaging giant shuts down due to ransomware.
#CyberAttacks #Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Using Chaos Engineering tools to test the reliability and availability of systems in production :
Chaos Engineering advantages:
Monitor lost income by detecting critical issues
Reducing the number of system or application failures
Better user experience with fewer disruptions and high service availability
This will help you learn about the system and gain confidence.
How confident are you in the reliability of your sales?

Let's find out with the following popular chaos testing tools.

Chaos mesh
Chaos Mesh is a chaos test management solution that introduces bugs at every level of the Kubernetes system.

This includes pods, networking, system I / O, and kernel.

Chaos Mesh can automatically kill Kubernetes pods by simulating latency.

It can disrupt communication between pods and simulate read / write errors.

He can plan the rules for experiments and determine their scope.

These experiments are specified using YAML files.

Chaos Mesh has a toolbar for viewing experiment analytics.

It runs on top of Kubernetes and supports most of the cloud platform.

It is an open source project that was recently adopted as a CNCF sandbox project.

You can add Chaos Mesh to your DevOps workflow to build resilient applications using chaos engineering principles.

Chaos Mesh Features:
Easily deployed to Kubernetes clusters without changing the deployment logic
No unique dependencies required for deployment
Defines chaos objects using CustomResourceDefinitions (CRD)
Provides a dashboard for keeping track of all experiments


Β» https://github.com/chaos-mesh/chaos-mesh
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Appearance of HPE Apollo 6500 Gen10 Plus System.
#Technologies
Forwarded from UNDERCODE NEWS
To boost production capacity Intel spends an extra US$475 million in the Vietnam plant.
#Technologies
Data Structures Concepts & Singly Linked List Implementation free course 4.4 rating !

You will learn :

Understand the concept of linked list


Implementation of Linked operations using C programming language


Basics of data structures


Visualize how different data structures work


>https://www.udemy.com/course/data-structures-in-c/
Forwarded from UNDERCODE NEWS
Biden ordered the procurement of cars that use carbon-free power for renewable energy.
#Technologies
Forwarded from UNDERCODE NEWS
WhatsApp adds biometric verification for desktop customer login.
#Updates
Forwarded from UNDERCODE NEWS
Desktop version of Firefox browser will no longer continue to build PWA-like website-specific browsing functionality.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ” How to check the expiration date of a TLS / SSL certificate from the command line :

To check the expiration date of the SSL certificate, we are going to use the OpenSSL command line client.

The OpenSSL client provides a wealth of data including expiration dates, expiration dates, who issued the TLS / SSL certificate, and more.

Check the expiration date of the SSL or TLS certificate
Open the Terminal app and then run the following command:

$ openssl s_client -servername {SERVER_NAME} -connect {SERVER_NAME}:{PORT} | openssl x509 -noout -dates
$ echo | openssl s_client -servername {SERVER_NAME} -connect {SERVER_NAME}:{PORT} | openssl x509 -noout -dates

Let's find out the expiration date for www.undercode.help - enter:
DOM = "www.undercode.help"
PORT = "443"
openssl s_client -servername $ DOM -connect $ DOM : $ PORT \
| openssl x509 -noout -dates
Examples of output with dates and other information:
depth = 2 O = Digital Signature Trust Co., CN = DST Root CA X3
verify return: 1
depth = 1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
verify return: 1
depth = 0 CN = www.undercode.help
verify return: 1
notBefore = Sep 29 23:10:07 2020 GMT
notAfter = Dec 28 23:10:07 2020 GMT
Add the echo command so you don't have to press CTRL + C.
For example:
DOM = "undercode.help"
PORT = "443"
## note echo added ##
echo | openssl s_client -servername $ DOM -connect $ DOM : $ PORT \
| openssl x509 -noout -dates
Understanding openssl command options
s_client: The s_client command implements a generic SSL / TLS client that connects to a remote host using SSL / TLS.
-servername $ DOM: Set the Server Name Indication (TLS SNI) extension in the ClientHello message to the specified value.
-connect $ DOM: $ PORT: specifies the host ($ DOM) and additional port ($ PORT) to connect.
x509: Runs the Certificate Display and Signature utility.
-noout: Prevents the output of the encoded version of the certificate.
-dates: Prints the start and expiration date of the TLS or SSL certificate.
Find the expiration date of an SSL certificate from a PEM encoded certificate file
The syntax is as follows: ask the certificate file when the TLS / SSL certificate expires.

$ openssl x509 -enddate -noout -in {/path/to/my/my.pem}
$ openssl x509 -enddate -noout -in /etc/nginx/ssl/undercode.help.fullchain.cer.ecc
$ openssl x509 -enddate -noout -in /etc/nginx/ssl/undercode.help.fullchain.cer

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The U.S. Telecom network will be protected against "distrusted suppliers" The Biden Administration.
#international
Forwarded from UNDERCODE NEWS
MSI has just launched a GeForce RTX 3060 Ti Aero graphics card.
#Technologies
Forwarded from UNDERCODE NEWS
Microsoft Defender has blocked 30 billion email threats.
#Malwares
Forwarded from UNDERCODE NEWS
Sberbank decide to take ownership of Russia's famous online store.
#International
Forwarded from DailyCVE
πŸ”΅Backblaze trust management issue vulnerability:

(DC: 272-2021)
(Exploit code-inside)

https://dailycve.com/backblaze-trust-management-issue-vulnerability