UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.3K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑 BIOS-level rootkit attack, also known as a persistent BIOS attack, is an exploit in which the BIOS is flashed (updated) with malicious code. A BIOS rootkit is programming that enables remote administration.

The BIOS (basic input/output system) is firmware that resides in memory and runs while a computer boots up. Because the BIOS is stored in memory rather than on the hard disk drive, a BIOS rootkit can survive conventional attempts to get rid of malware, including reformatting or replacing the hard drive.

Originally, the BIOS firmware was hard-coded and read-only. Now, however, manufacturers generally use an erasable format, such as flash memory so that the BIOS can be easily updated remotely. The use of an erasable format that can be updated over the Internet makes updates easier but also leaves the BIOS vulnerable to online attack.

A BIOS attack does not require any vulnerability on the target system -- once an attacker gains administrative-level privileges, he can flash the BIOS over the Internet with malware-laden firmware. On ars technica, Joel Hruska describes one BIOS rootkit attack:

The aforementioned attack consists of dumping the new BIOS into flashrom (a BIOS read/write/modify utility), making the necessary changes, adjusting all of the checksums to ensure the hacked BIOS will verify as authentic… and flashing. Voila! One evil BIOS.
Some researchers fear that a BIOS rootkit poses a special threat for cloud computing environments, in which multiple virtual machines (VM) exist on a single physical system.

Methods of preventing BIOS rootkit attacks include:

Implementing digital signature technology to prevent unauthorized access
Making the BIOS non-writeable
Burning a hardware cryptographic key into the BIOS at manufacture that can be used to verify that the code has not been altered.
If an unauthorized BIOS-level rootkit is detected, the only way to get rid of it is to physically remove and replace the memory where the BIOS resides.

▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑 𝐈𝐎𝐓 𝐀𝐍𝐃 𝐇𝐀𝐑𝐃𝐖𝐀𝐑𝐄 𝐏𝐄𝐍𝐓𝐄𝐒𝐓 - 𝐔𝐏𝐃𝐀𝐓𝐄𝐃

#IoT and embedded devices are often used in critical infrastructure, such as healthcare devices or industrial control systems, which makes the security of these devices even more crucial.
💡𝑸𝒖𝒊𝒄𝒌 𝒓𝒆𝒎𝒊𝒏𝒅𝒆𝒓
Hardware refers to the physical components of a computer system or electronic device, while IoT refers to the network of connected devices that can communicate with each other over the internet.
While there is overlap between these concepts, they refer to different aspects of computer and electronic systems.

👉 𝐇𝐨𝐰 𝐭𝐨 𝐛𝐞𝐠𝐢𝐧?
🌟 A Red Team Guide for a Hardware Penetration Test by Adam Toscher
Part 1: https://lnkd.in/eRUtq6Ne
Part 2: https://lnkd.in/ezjwNuP6

🌟Hardware Hacking Curiosity by 👺 Adrien Lasalle
https://lnkd.in/eeDp-iq6

🌟 IoT Security 101 by V33RU
https://lnkd.in/eZ2QGhdJ

🌟 Awesome Hardware Hacking and IoT by Joas A Santos
https://lnkd.in/eyXnbKBv

🌟 IoT Village youtube channel
https://lnkd.in/eHEuww7w

🌟 UART Hardware Hacking Cheat Sheet by Marcel Rick-Cen
https://lnkd.in/edpyHG2B

🌟IoT Pentesting guide by Aditya Gupta and Attify
https://lnkd.in/ekBmcSNd

🌟 IoT Security Resources for beginner by Nayana Dhanesh
https://lnkd.in/eAmTvWnj

🌟 Firmware analysis on HackTricks
https://lnkd.in/eUvMqtAZ

👉 𝐅𝐞𝐞𝐥𝐢𝐧𝐠 𝐫𝐞𝐚𝐝𝐲 𝐭𝐨 𝐭𝐫𝐚𝐢𝐧?
🌟 Open Security Training
https://p.ost2.fyi/

🌟 Hackaday courses
https://lnkd.in/e3yhaZTB

🌟 Intro to IoT pentest on TryHackMe
https://lnkd.in/ewjUM-Tc

👉 𝐒𝐨𝐦𝐞 𝐢𝐧𝐭𝐞𝐫𝐞𝐬𝐭𝐢𝐧𝐠 𝐫𝐞𝐚𝐝𝐬
🌟 IOT Security Foundation
https://lnkd.in/ecGudjgn

🌟 Awesome IoT Hacks by nebgnahz
https://lnkd.in/eQk4UBrt

🌟 Hands on Internet of things hacking by Payatu
https://lnkd.in/eqEEJriu

👉 𝐓𝐎𝐎𝐋𝐒 𝐀𝐍𝐃 𝐑𝐄𝐒𝐎𝐔𝐑𝐂𝐄𝐒
🌟 Scared by eshard - side-channel analysis framework
https://lnkd.in/eZhb_we3

🌟NewAE Technology Inc.’s Github repo
https://lnkd.in/eiuZDCfb

🌟Ledger Donjon’s repo by Ledger Security research team
https://lnkd.in/eEhA4FMh

🌟IoT-PT an OS for IoT pentest by v33ru
https://lnkd.in/evuB7X_Z

👉 𝐖𝐡𝐚𝐭 𝐚𝐛𝐨𝐮𝐭 𝐭𝐡𝐞 𝐬𝐭𝐚𝐧𝐝𝐚𝐫𝐝𝐬?
🌟 The OWASP® Foundation IoT Project:
https://lnkd.in/ev7TrRf9

🌟 NIST Cybersecurity for IOT Program
https://lnkd.in/eq8k8BwG

🌟 Hardware Security Module NIST
https://lnkd.in/eXcGvAwV

▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE TESTING
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑 Support & Share: t.me/undercodecommunity

This is the hub for Ethical Hackers and tech enthusiasts:

》Topics We Cover:

1️⃣ CVE News & Databases

2️⃣ Hacker & Tech News

3️⃣ Cybersecurity, Hacking, and Secret Methods

🌟 Our Mission:
Share your knowledge, collaborate, and grow together in a community designed for innovation and learning.

🔗 Join now: bit.ly/joinundercode

@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE TESTING
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑Popular Exploit development library:

》Pwntools (https://github.com/Gallopsled/pwntools) is a popular CTF (Capture The Flag) framework and exploit development library written in Python. It provides tools and features that streamline the process of writing, testing, and executing exploits, especially for binary exploitation challenges.

Key Features:

- Automated Exploit Scripts**: Easily interact with remote or local binaries.

- ROP (Return Oriented Programming): Simplifies creating ROP chains.

- Tubes: Abstraction for handling sockets, SSH, or processes.
- Assembler/Disassembler: Integrates tools like Capstone and Keystone.

- Debugging Utilities: Interfaces with GDB for dynamic analysis.

- Custom Shellcodes: Generate shellcode tailored to your needs.

Requirements:
Pwntools is compatible with Python 3 and can be installed via pip:

pip install pwntools
Example Usage:
Here’s a basic example of using Pwntools to exploit a binary:
from pwn import *

# Connect to the remote service
conn = remote('example.com', 1337)

# Send payload
payload = b'A' * 64 + b'\xdeadbeef'
conn.sendline(payload)

# Interact with the shell
conn.interactive()
Check out the repository for detailed documentation and examples.

▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑C++ scanner that retrieves tuples from a PostgreSQL database and scans them for malware:

Here’s a simple C++ scanner that connects to a PostgreSQL database to retrieve tuples and checks them for malware. In this example, I'll assume the tuples are strings that need to be compared against a predefined list of known malware signatures.

- Security: This example does not implement secure credential handling (such as using a .pgpass file) and lacks measures to protect against SQL injection.

- Malware Detection: The method for detecting malware here is quite basic. In a real application, you would want to employ more advanced techniques, potentially involving hash checks against a comprehensive database of malware signatures.

- Error Handling: It’s important to include proper error handling for code intended for production use.

- Dependencies: Make sure you have the libpqxx library installed, which provides the C++ API for PostgreSQL.

Ref: Maximilian Feldthusen
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁