Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🛡️ #Digital Certificates: A Shorter Lifeline, A Stronger Defense
https://undercodenews.com/digital-certificates-a-shorter-lifeline-a-stronger-defense/
@Undercode_News
https://undercodenews.com/digital-certificates-a-shorter-lifeline-a-stronger-defense/
@Undercode_News
UNDERCODE NEWS
Digital Certificates: A Shorter Lifeline, A Stronger Defense - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Acunetix - Web Application Security Scanner
Acunetix is an automated web application security scanner used to find vulnerabilities in web applications, including SQL injections, cross-site scripting (XSS), and other vulnerabilities.
---
### Basic Usage Command:
Explanation:
-
-
---
### Example: Scan with Authentication
Explanation:
-
-
---
### Example: Scan Specific URLs
Explanation:
-
---
### Example: Output to a Report
Explanation:
-
---
### Example: Running an Automated Scheduled Scan
Explanation:
-
---
### Important Notes:
1. Acunetix is a commercial tool widely used for comprehensive web security testing.
2. Always have explicit authorization to scan and test web applications. Unauthorized scanning may lead to legal consequences.
Acunetix is an automated web application security scanner used to find vulnerabilities in web applications, including SQL injections, cross-site scripting (XSS), and other vulnerabilities.
---
### Basic Usage Command:
acunetix start --target=http://example.com
Explanation:
-
acunetix start: Starts the Acunetix scan.-
--target=http://example.com: Specifies the target URL to scan for vulnerabilities.---
### Example: Scan with Authentication
acunetix start --target=http://example.com --auth-user=admin --auth-pass=password123
Explanation:
-
--auth-user=admin: Provides the username for basic authentication.-
--auth-pass=password123: Provides the password for basic authentication.---
### Example: Scan Specific URLs
acunetix start --target=http://example.com --scan-url="http://example.com/admin"
Explanation:
-
--scan-url="http://example.com/admin": Specifies a specific URL to scan within the target domain.---
### Example: Output to a Report
acunetix start --target=http://example.com --report-file=scan_report.pdf
Explanation:
-
--report-file=scan_report.pdf: Saves the scan results to a PDF report.---
### Example: Running an Automated Scheduled Scan
acunetix schedule --target=http://example.com --time="03:00"
Explanation:
-
--time="03:00": Schedules the scan to run at a specific time (3:00 AM).---
### Important Notes:
1. Acunetix is a commercial tool widely used for comprehensive web security testing.
2. Always have explicit authorization to scan and test web applications. Unauthorized scanning may lead to legal consequences.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Unacademy's Potential Acquisition: A Major Shift in the Edtech Landscape
https://undercodenews.com/unacademys-potential-acquisition-a-major-shift-in-the-edtech-landscape/
@Undercode_News
https://undercodenews.com/unacademys-potential-acquisition-a-major-shift-in-the-edtech-landscape/
@Undercode_News
UNDERCODE NEWS
Unacademy's Potential Acquisition: A Major Shift in the Edtech Landscape - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: XSSer - Cross-Site Scripting (XSS) Attack Tool
XSSer is an automated tool used to detect and exploit Cross-Site Scripting (XSS) vulnerabilities in web applications. It helps identify places where attackers can inject malicious scripts into web pages viewed by other users.
---
### Basic Usage Command:
Explanation:
-
-
---
### Example: Using XSSer with a Payload List
Explanation:
-
---
### Example: Scanning Multiple URLs for XSS
Explanation:
-
---
### Example: Running XSSer in Brute-Force Mode
Explanation:
-
---
### Example: Using Proxy for Traffic Capture
Explanation:
-
---
### Important Notes:
1. XSSer is designed for ethical hacking and penetration testing.
2. Always ensure you have explicit permission to perform security testing, as unauthorized exploitation of XSS vulnerabilities is illegal.
XSSer is an automated tool used to detect and exploit Cross-Site Scripting (XSS) vulnerabilities in web applications. It helps identify places where attackers can inject malicious scripts into web pages viewed by other users.
---
### Basic Usage Command:
xsser -u http://example.com/page?id=1
Explanation:
-
xsser: Runs the XSSer tool.-
-u http://example.com/page?id=1: Specifies the target URL where XSS vulnerabilities are to be tested (in this case, the id parameter).---
### Example: Using XSSer with a Payload List
xsser -u http://example.com/page?id=1 -p /path/to/payloads.txt
Explanation:
-
-p /path/to/payloads.txt: Specifies the path to a file containing different XSS payloads to test.---
### Example: Scanning Multiple URLs for XSS
xsser -u http://example.com/page?id=1 -u http://example.com/page?id=2
Explanation:
-
-u http://example.com/page?id=2: Allows specifying multiple URLs to test for XSS vulnerabilities.---
### Example: Running XSSer in Brute-Force Mode
xsser -u http://example.com/page?id=1 --brute
Explanation:
-
--brute: Enables brute-force scanning mode, testing various parameters and payload combinations for XSS vulnerabilities.---
### Example: Using Proxy for Traffic Capture
xsser -u http://example.com/page?id=1 --proxy="http://127.0.0.1:8080"
Explanation:
-
--proxy="http://127.0.0.1:8080": Routes traffic through a proxy (useful for capturing requests and responses or evading detection).---
### Important Notes:
1. XSSer is designed for ethical hacking and penetration testing.
2. Always ensure you have explicit permission to perform security testing, as unauthorized exploitation of XSS vulnerabilities is illegal.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #Apple's M5 iPad Pro: A 2025 Powerhouse
https://undercodenews.com/apples-m5-ipad-pro-a-2025-powerhouse/
@Undercode_News
https://undercodenews.com/apples-m5-ipad-pro-a-2025-powerhouse/
@Undercode_News
UNDERCODE NEWS
Apple's M5 iPad Pro: A 2025 Powerhouse - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🔋 The M4 iPad Pro: A Powerful Companion, but Not a Perfect Replacement
https://undercodenews.com/the-m4-ipad-pro-a-powerful-companion-but-not-a-perfect-replacement/
@Undercode_News
https://undercodenews.com/the-m4-ipad-pro-a-powerful-companion-but-not-a-perfect-replacement/
@Undercode_News
UNDERCODE NEWS
The M4 iPad Pro: A Powerful Companion, but Not a Perfect Replacement - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Sublist3r - Subdomain Enumeration Tool
Sublist3r is a fast subdomain enumeration tool designed to gather subdomains of a target domain. It utilizes various search engines and other methods to discover hidden subdomains, which can be crucial for security testing.
---
### Basic Usage Command:
Explanation:
-
-
---
### Example: Saving Results to a File
Explanation:
-
---
### Example: Using Multiple Engines for Enumeration
Explanation:
-
---
### Example: Limit Number of Results
Explanation:
-
---
### Example: Displaying Verbose Output
Explanation:
-
---
### Important Notes:
1. Sublist3r is commonly used for reconnaissance during penetration testing and bug bounty programs.
2. Always ensure you have explicit authorization before performing subdomain enumeration on a domain. Unauthorized scanning can lead to legal issues.
Sublist3r is a fast subdomain enumeration tool designed to gather subdomains of a target domain. It utilizes various search engines and other methods to discover hidden subdomains, which can be crucial for security testing.
---
### Basic Usage Command:
sublist3r -d example.com
Explanation:
-
sublist3r: Runs the Sublist3r tool.-
-d example.com: Specifies the target domain (example.com) to search for subdomains.---
### Example: Saving Results to a File
sublist3r -d example.com -o subdomains.txt
Explanation:
-
-o subdomains.txt: Saves the found subdomains into a text file (subdomains.txt).---
### Example: Using Multiple Engines for Enumeration
sublist3r -d example.com -b
Explanation:
-
-b: Uses brute-force techniques and other search engines to enumerate more subdomains.---
### Example: Limit Number of Results
sublist3r -d example.com -t 50
Explanation:
-
-t 50: Limits the number of threads to 50 for enumeration. This can be adjusted based on the speed and load requirements.---
### Example: Displaying Verbose Output
sublist3r -d example.com -v
Explanation:
-
-v: Enables verbose mode, showing detailed output for each subdomain found.---
### Important Notes:
1. Sublist3r is commonly used for reconnaissance during penetration testing and bug bounty programs.
2. Always ensure you have explicit authorization before performing subdomain enumeration on a domain. Unauthorized scanning can lead to legal issues.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #AI Chip Rush: A New Gold Rush?
https://undercodenews.com/ai-chip-rush-a-new-gold-rush/
@Undercode_News
https://undercodenews.com/ai-chip-rush-a-new-gold-rush/
@Undercode_News
UNDERCODE NEWS
AI Chip Rush: A New Gold Rush? - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #Spotify Wrapped is Almost Here: Get Ready for Your Year-End Music Recap
https://undercodenews.com/spotify-wrapped-is-almost-here-get-ready-for-your-year-end-music-recap/
@Undercode_News
https://undercodenews.com/spotify-wrapped-is-almost-here-get-ready-for-your-year-end-music-recap/
@Undercode_News
UNDERCODE NEWS
Spotify Wrapped is Almost Here: Get Ready for Your Year-End Music Recap - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Microsoft's Stubborn Stance on #Windows 11's TPM Requirement
https://undercodenews.com/microsofts-stubborn-stance-on-windows-11s-tpm-requirement/
@Undercode_News
https://undercodenews.com/microsofts-stubborn-stance-on-windows-11s-tpm-requirement/
@Undercode_News
UNDERCODE NEWS
Microsoft's Stubborn Stance on Windows 11's TPM Requirement - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ A New Language Translation: Lara, the #AI Breakthrough
https://undercodenews.com/a-new-language-translation-lara-the-ai-breakthrough/
@Undercode_News
https://undercodenews.com/a-new-language-translation-lara-the-ai-breakthrough/
@Undercode_News
UNDERCODE NEWS
A New Language Translation: Lara, the AI Breakthrough - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
A Legal Battle: Musk vs #OpenAI
https://undercodenews.com/a-legal-battle-musk-vs-openai/
@Undercode_News
https://undercodenews.com/a-legal-battle-musk-vs-openai/
@Undercode_News
UNDERCODE NEWS
A Legal Battle: Musk vs OpenAI - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #AI-Powered Filmmaking: A New Creativity
https://undercodenews.com/ai-powered-filmmaking-a-new-creativity/
@Undercode_News
https://undercodenews.com/ai-powered-filmmaking-a-new-creativity/
@Undercode_News
UNDERCODE NEWS
AI-Powered Filmmaking: A New Creativity - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📊 #OpenAI's Data Practices: A Closer Look
https://undercodenews.com/openais-data-practices-a-closer-look/
@Undercode_News
https://undercodenews.com/openais-data-practices-a-closer-look/
@Undercode_News
UNDERCODE NEWS
OpenAI's Data Practices: A Closer Look - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 China's Persistent Threat: Salt Typhoon and the Breach of US Telecom Networks
https://undercodenews.com/chinas-persistent-threat-salt-typhoon-and-the-breach-of-us-telecom-networks/
@Undercode_News
https://undercodenews.com/chinas-persistent-threat-salt-typhoon-and-the-breach-of-us-telecom-networks/
@Undercode_News
UNDERCODE NEWS
China's Persistent Threat: Salt Typhoon and the Breach of US Telecom Networks - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Intel Weighs Drastic Measures Amidst Struggling Business
https://undercodenews.com/intel-weighs-drastic-measures-amidst-struggling-business/
@Undercode_News
https://undercodenews.com/intel-weighs-drastic-measures-amidst-struggling-business/
@Undercode_News
UNDERCODE NEWS
Intel Weighs Drastic Measures Amidst Struggling Business - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🤖 The #AI Godmother: Fei-Fei Li on Generative #AI and the Future of Robotics
https://undercodenews.com/the-ai-godmother-fei-fei-li-on-generative-ai-and-the-future-of-robotics/
@Undercode_News
https://undercodenews.com/the-ai-godmother-fei-fei-li-on-generative-ai-and-the-future-of-robotics/
@Undercode_News
UNDERCODE NEWS
The AI Godmother: Fei-Fei Li on Generative AI and the Future of Robotics - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: DirBuster - Directory and File Bruteforcing
DirBuster is a multi-threaded Java application used to brute-force directories and files on web servers. It's typically used to find hidden resources that might expose vulnerabilities in web applications.
---
### Basic Usage Command:
Explanation:
-
-
-
---
### Example: Specifying a Custom HTTP Port
Explanation:
-
---
### Example: Brute Forcing with Multiple Threads
Explanation:
-
---
### Example: Saving Results to a File
Explanation:
-
---
### Example: Using a Proxy
Explanation:
-
---
### Important Notes:
1. DirBuster is a powerful tool for penetration testers looking to discover hidden files and directories on a target.
2. Always ensure you have proper authorization to scan the target server, as unauthorized brute-forcing is illegal and unethical.
DirBuster is a multi-threaded Java application used to brute-force directories and files on web servers. It's typically used to find hidden resources that might expose vulnerabilities in web applications.
---
### Basic Usage Command:
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt
Explanation:
-
java -jar dirbuster.jar: Runs the DirBuster Java application.-
-u http://example.com: Specifies the target URL to scan.-
-l /path/to/wordlist.txt: Specifies the path to the wordlist containing potential directory and file names.---
### Example: Specifying a Custom HTTP Port
java -jar dirbuster.jar -u http://example.com:8080 -l /path/to/wordlist.txt
Explanation:
-
http://example.com:8080: Scans a target on a specific port (8080 in this case), useful if the web server is running on a non-standard port.---
### Example: Brute Forcing with Multiple Threads
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt -t 50
Explanation:
-
-t 50: Specifies 50 concurrent threads to speed up the brute-forcing process.---
### Example: Saving Results to a File
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt -o /path/to/output.txt
Explanation:
-
-o /path/to/output.txt: Saves the scan results to the specified output file (output.txt).---
### Example: Using a Proxy
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt -p 127.0.0.1:8080
Explanation:
-
-p 127.0.0.1:8080: Routes traffic through a proxy server (useful for anonymizing the scan or debugging).---
### Important Notes:
1. DirBuster is a powerful tool for penetration testers looking to discover hidden files and directories on a target.
2. Always ensure you have proper authorization to scan the target server, as unauthorized brute-forcing is illegal and unethical.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Wfuzz - Web Application Fuzzing Tool
Wfuzz is a web application vulnerability scanner used to perform fuzzing attacks. It is commonly used for brute-forcing web applications to find hidden directories, files, and parameters that could be vulnerable to attacks like SQL injection or file inclusion.
---
### Basic Usage Command:
Explanation:
-
-
-
-
---
### Example: Fuzzing Multiple Parameters
Explanation:
-
---
### Example: Fuzzing HTTP Headers
Explanation:
-
---
### Example: Using a Proxy for Traffic
Explanation:
-
---
### Example: Brute Force Directories
Explanation:
-
---
### Example: Fuzzing with Recursive Mode
Explanation:
-
---
### Important Notes:
1. Wfuzz is highly effective for brute-forcing hidden parameters and files in web applications.
2. Always obtain explicit permission to perform fuzzing and penetration tests, as unauthorized scanning can be illegal.
Wfuzz is a web application vulnerability scanner used to perform fuzzing attacks. It is commonly used for brute-forcing web applications to find hidden directories, files, and parameters that could be vulnerable to attacks like SQL injection or file inclusion.
---
### Basic Usage Command:
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/FUZZ
Explanation:
-
wfuzz: Runs the Wfuzz tool.-
-c: Enables colorized output for easier reading of results.-
-z file,/path/to/wordlist.txt: Specifies a wordlist for fuzzing.-
-u http://example.com/FUZZ: The target URL where FUZZ is the placeholder for words in the wordlist to be tested.---
### Example: Fuzzing Multiple Parameters
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/page.php?id=FUZZ&user=admin
Explanation:
-
id=FUZZ&user=admin: Fuzzes the id parameter while keeping the user parameter fixed.---
### Example: Fuzzing HTTP Headers
wfuzz -c -z file,/path/to/wordlist.txt -H "X-Secret: FUZZ" http://example.com
Explanation:
-
-H "X-Secret: FUZZ": Fuzzes a custom HTTP header (X-Secret) by injecting different words from the wordlist.---
### Example: Using a Proxy for Traffic
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/FUZZ --proxy http://127.0.0.1:8080
Explanation:
-
--proxy http://127.0.0.1:8080: Routes the fuzzing traffic through a proxy for anonymity or to capture the traffic.---
### Example: Brute Force Directories
wfuzz -c -z dir,/path/to/dirlist.txt -u http://example.com/FUZZ
Explanation:
-
-z dir,/path/to/dirlist.txt: Fuzzes directory names from the specified wordlist to discover hidden directories on the server.---
### Example: Fuzzing with Recursive Mode
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/FUZZ -r
Explanation:
-
-r: Enables recursive fuzzing, where Wfuzz continues fuzzing on discovered directories or files.---
### Important Notes:
1. Wfuzz is highly effective for brute-forcing hidden parameters and files in web applications.
2. Always obtain explicit permission to perform fuzzing and penetration tests, as unauthorized scanning can be illegal.
Forwarded from DailyCVE
🔴 #GitHub CLI Vulnerability: Path Traversal via Malicious Workflow Artifact (#CVE-TBD) (Critical)
https://dailycve.com/github-cli-vulnerability-path-traversal-via-malicious-workflow-artifact-cve-tbd-critical/
@daily_cve
https://dailycve.com/github-cli-vulnerability-path-traversal-via-malicious-workflow-artifact-cve-tbd-critical/
@daily_cve
DailyCVE
GitHub CLI Vulnerability: Path Traversal via Malicious Workflow Artifact (CVE-TBD) (Critical) - DailyCVE
2024-12-04 Platform: GitHub CLI Version: Prior to 2.63.1 Vulnerability: Path Traversal Severity: Critical Date: November 2024 (estimated) What Undercode Says: […]
Forwarded from DailyCVE
🔴 CyberPanel, Command Injection Vulnerability, #CVE-2024-51378 (Critical)
https://dailycve.com/cyberpanel-command-injection-vulnerability-cve-2024-51378-critical/
@daily_cve
https://dailycve.com/cyberpanel-command-injection-vulnerability-cve-2024-51378-critical/
@daily_cve
DailyCVE
CyberPanel, Command Injection Vulnerability, CVE-2024-51378 (Critical) - DailyCVE
2024-12-04 : A critical vulnerability (CVE-2024-51378) was discovered in CyberPanel versions before 1c0c6cb. This vulnerability allows remote attackers to bypass […]