Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ 8K Projection Perfected: #Samsungโs Premiere 8K Sets New Standards
https://undercodenews.com/8k-projection-perfected-samsungs-premiere-8k-sets-new-standards/
@Undercode_News
https://undercodenews.com/8k-projection-perfected-samsungs-premiere-8k-sets-new-standards/
@Undercode_News
UNDERCODE NEWS
8K Projection Perfected: Samsungโs Premiere 8K Sets New Standards - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ๐๐ข๐ง๐๐จ๐ฐ๐ฌ ๐๐๐ซ๐ฏ๐๐ซ ๐๐๐๐ ๐๐๐ญ๐ข๐ฏ๐ ๐๐ข๐ซ๐๐๐ญ๐จ๐ซ๐ฒ ๐๐๐ฐ ๐
๐๐๐ญ๐ฎ๐ซ๐๐ฌ
Windows Server 2025 introduces several noteworthy enhancements, particularly in security, functionality, and Active Directory improvements:
๐ฅ๐๐๐๐ ๐๐ก๐๐ข๐ง ๐๐ข๐ง๐๐ข๐ง๐ ๐๐ฎ๐๐ข๐ญ ๐๐ฎ๐ฉ๐ฉ๐จ๐ซ๐ญ:
Administrators can now audit devices that fail or do not support LDAP channel binding. This is vital for environments transitioning to more secure channel binding configurations.
๐ฅ ๐๐๐ญ๐ข๐ฏ๐ ๐๐ข๐ซ๐๐๐ญ๐จ๐ซ๐ฒ ๐๐ง๐ก๐๐ง๐๐๐ฆ๐๐ง๐ญ๐ฌ:
โผ๏ธ New forest and domain functional levels (DomainLevel 10 and ForestLevel 10) are introduced, enabling features like a 32K database page size.
โผ๏ธ Improved algorithms for SID-to-name lookups and domain controller discovery, using Kerberos authentication rather than legacy Netlogon channels.
โผ๏ธ Secure management of sensitive attributes by requiring encrypted connections for operations involving these attributes.
๐ฅ ๐๐๐ซ๐๐๐ซ๐จ๐ฌ ๐๐ง๐ ๐๐ซ๐ฒ๐ฉ๐ญ๐จ๐ ๐ซ๐๐ฉ๐ก๐ข๐ ๐๐ ๐ข๐ฅ๐ข๐ญ๐ฒ:
โผ๏ธ Improved Kerberos support with PKINIT for enhanced cryptographic flexibility.
โผ๏ธ Active Directory now generates random default computer account passwords to bolster security, restricting manual assignment of predictable passwords.
๐ฅ ๐๐๐ญ๐ข๐ซ๐๐ ๐๐๐ ๐๐๐ฒ ๐ ๐๐๐ญ๐ฎ๐ซ๐๐ฌ:
โผ๏ธ Deprecation of WINS and mailslots, streamlining domain controller discovery methods and focusing on DNS-based technologies.
๐ฅ ๐๐๐๐ข๐ญ๐ข๐จ๐ง๐๐ฅ ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ ๐๐๐ญ๐ฎ๐ซ๐๐ฌ:
โผ๏ธEnhanced security for computer account password defaults and policies to prevent weak configurations.
โผ๏ธAdjustments in Group Policy settings to improve control over default password configurations.
These updates are designed to meet modern ๐ฐ๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฎ๐ป๐ฑ ๐ผ๐ฝ๐ฒ๐ฟ๐ฎ๐๐ถ๐ผ๐ป๐ฎ๐น ๐ฑ๐ฒ๐บ๐ฎ๐ป๐ฑ๐ while maintaining backward compatibility where feasible. For more details, you can explore the official documentation here:
๐๐ข๐ง๐ค ๐: https://lnkd.in/g8a6xwbE
๐๐ข๐ง๐ค ๐: https://lnkd.in/gN-UKCf8
Ref: G M Ahmad Faruk
@undercodecommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Windows Server 2025 introduces several noteworthy enhancements, particularly in security, functionality, and Active Directory improvements:
๐ฅ๐๐๐๐ ๐๐ก๐๐ข๐ง ๐๐ข๐ง๐๐ข๐ง๐ ๐๐ฎ๐๐ข๐ญ ๐๐ฎ๐ฉ๐ฉ๐จ๐ซ๐ญ:
Administrators can now audit devices that fail or do not support LDAP channel binding. This is vital for environments transitioning to more secure channel binding configurations.
๐ฅ ๐๐๐ญ๐ข๐ฏ๐ ๐๐ข๐ซ๐๐๐ญ๐จ๐ซ๐ฒ ๐๐ง๐ก๐๐ง๐๐๐ฆ๐๐ง๐ญ๐ฌ:
โผ๏ธ New forest and domain functional levels (DomainLevel 10 and ForestLevel 10) are introduced, enabling features like a 32K database page size.
โผ๏ธ Improved algorithms for SID-to-name lookups and domain controller discovery, using Kerberos authentication rather than legacy Netlogon channels.
โผ๏ธ Secure management of sensitive attributes by requiring encrypted connections for operations involving these attributes.
๐ฅ ๐๐๐ซ๐๐๐ซ๐จ๐ฌ ๐๐ง๐ ๐๐ซ๐ฒ๐ฉ๐ญ๐จ๐ ๐ซ๐๐ฉ๐ก๐ข๐ ๐๐ ๐ข๐ฅ๐ข๐ญ๐ฒ:
โผ๏ธ Improved Kerberos support with PKINIT for enhanced cryptographic flexibility.
โผ๏ธ Active Directory now generates random default computer account passwords to bolster security, restricting manual assignment of predictable passwords.
๐ฅ ๐๐๐ญ๐ข๐ซ๐๐ ๐๐๐ ๐๐๐ฒ ๐ ๐๐๐ญ๐ฎ๐ซ๐๐ฌ:
โผ๏ธ Deprecation of WINS and mailslots, streamlining domain controller discovery methods and focusing on DNS-based technologies.
๐ฅ ๐๐๐๐ข๐ญ๐ข๐จ๐ง๐๐ฅ ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ ๐๐๐ญ๐ฎ๐ซ๐๐ฌ:
โผ๏ธEnhanced security for computer account password defaults and policies to prevent weak configurations.
โผ๏ธAdjustments in Group Policy settings to improve control over default password configurations.
These updates are designed to meet modern ๐ฐ๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฎ๐ป๐ฑ ๐ผ๐ฝ๐ฒ๐ฟ๐ฎ๐๐ถ๐ผ๐ป๐ฎ๐น ๐ฑ๐ฒ๐บ๐ฎ๐ป๐ฑ๐ while maintaining backward compatibility where feasible. For more details, you can explore the official documentation here:
๐๐ข๐ง๐ค ๐: https://lnkd.in/g8a6xwbE
๐๐ข๐ง๐ค ๐: https://lnkd.in/gN-UKCf8
Ref: G M Ahmad Faruk
@undercodecommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆU-Turn NAT: A Simple Concept with Diagrams ๐ด๐ข๐ต
Two days ago, I shared the concepts of Source NAT (S-NAT) and Destination NAT (D-NAT). A great question came up: What is U-Turn NAT, and how does it differ?
I realized that explaining U-Turn NAT With Source & Destination NAT provides a better understanding of how these NAT types work together. Letโs dive in!
Why is it called U-Turn NAT ?
U-Turn NAT is used when internal users need to access an internal server using its public IP address. The traffic makes a "U-turn" at the firewall as it flows out and then returns to the same internal network.
1. Source NAT (S-NAT)
๐ด Purpose: Mainly for internal users accessing the internet.
๐ด How it works: NAT changes the (Source IP) in the original packet.
2. Destination NAT (D-NAT)
๐ข Purpose: Used for servers accessed from the internet.
๐ข How it works: NAT changes the (Destination IP) in the Original packet, replacing the public IP with the serverโs private IP in Translated packet.
3. U-Turn NAT (U-NAT)
๐ต Purpose: For internal users accessing internal servers using their public IP address.
๐ต How it works: NAT modifies both the (Source IP and Destination IP) in the packet when the same public IP is used for external and internal access:
Understanding these NAT types together helps clarify their distinct roles and how they work in different scenarios.
Ref:Dahri A
@undercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Two days ago, I shared the concepts of Source NAT (S-NAT) and Destination NAT (D-NAT). A great question came up: What is U-Turn NAT, and how does it differ?
I realized that explaining U-Turn NAT With Source & Destination NAT provides a better understanding of how these NAT types work together. Letโs dive in!
Why is it called U-Turn NAT ?
U-Turn NAT is used when internal users need to access an internal server using its public IP address. The traffic makes a "U-turn" at the firewall as it flows out and then returns to the same internal network.
1. Source NAT (S-NAT)
๐ด Purpose: Mainly for internal users accessing the internet.
๐ด How it works: NAT changes the (Source IP) in the original packet.
2. Destination NAT (D-NAT)
๐ข Purpose: Used for servers accessed from the internet.
๐ข How it works: NAT changes the (Destination IP) in the Original packet, replacing the public IP with the serverโs private IP in Translated packet.
3. U-Turn NAT (U-NAT)
๐ต Purpose: For internal users accessing internal servers using their public IP address.
๐ต How it works: NAT modifies both the (Source IP and Destination IP) in the packet when the same public IP is used for external and internal access:
Understanding these NAT types together helps clarify their distinct roles and how they work in different scenarios.
Ref:Dahri A
@undercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE TESTING
bypass_ai_detections.pdf
3 MB
UNDERCODE TESTING
bypass_ai_detections.pdf
Using this method, there is no need to rewrite the article in humanised AI.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ Takedown of Rydox Marketplace: Major Blow to #Cybercrime Underworld
https://undercodenews.com/takedown-of-rydox-marketplace-major-blow-to-cybercrime-underworld/
@Undercode_News
https://undercodenews.com/takedown-of-rydox-marketplace-major-blow-to-cybercrime-underworld/
@Undercode_News
UNDERCODE NEWS
Takedown of Rydox Marketplace: Major Blow to Cybercrime Underworld - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฅ๏ธ #Apple to Launch Custom Wi-Fi and Bluetooth Chip for Home Devices
https://undercodenews.com/apple-to-launch-custom-wi-fi-and-bluetooth-chip-for-home-devices/
@Undercode_News
https://undercodenews.com/apple-to-launch-custom-wi-fi-and-bluetooth-chip-for-home-devices/
@Undercode_News
UNDERCODE NEWS
Apple to Launch Custom Wi-Fi and Bluetooth Chip for Home Devices - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Samsung's #Galaxy S25 Series: An All-Snapdragon Affair
https://undercodenews.com/samsungs-galaxy-s25-series-an-all-snapdragon-affair/
@Undercode_News
https://undercodenews.com/samsungs-galaxy-s25-series-an-all-snapdragon-affair/
@Undercode_News
UNDERCODE NEWS
Samsung's Galaxy S25 Series: An All-Snapdragon Affair - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Amazon's #AI Ambitions: Bezos's Continued Influence and Alexa's Evolution
https://undercodenews.com/amazons-ai-ambitions-bezoss-continued-influence-and-alexas-evolution/
@Undercode_News
https://undercodenews.com/amazons-ai-ambitions-bezoss-continued-influence-and-alexas-evolution/
@Undercode_News
UNDERCODE NEWS
Amazon's AI Ambitions: Bezos's Continued Influence and Alexa's Evolution - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ New Stealthy #Linux Rootkit: PUMAKIT Discovered
https://undercodenews.com/new-stealthy-linux-rootkit-pumakit-discovered/
@Undercode_News
https://undercodenews.com/new-stealthy-linux-rootkit-pumakit-discovered/
@Undercode_News
UNDERCODE NEWS
New Stealthy Linux Rootkit: PUMAKIT Discovered - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
How to Get Free Spins and Coins in Coin Master
https://undercodenews.com/how-to-get-free-spins-and-coins-in-coin-master/
@Undercode_News
https://undercodenews.com/how-to-get-free-spins-and-coins-in-coin-master/
@Undercode_News
UNDERCODE NEWS
How to Get Free Spins and Coins in Coin Master - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ค #Tesla's Optimus Takes Its First Stumbles: A Humorous Glimpse into the Future of Robotics
https://undercodenews.com/teslas-optimus-takes-its-first-stumbles-a-humorous-glimpse-into-the-future-of-robotics/
@Undercode_News
https://undercodenews.com/teslas-optimus-takes-its-first-stumbles-a-humorous-glimpse-into-the-future-of-robotics/
@Undercode_News
UNDERCODE NEWS
Tesla's Optimus Takes Its First Stumbles: A Humorous Glimpse into the Future of Robotics - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ #Digital Imprisonment: Hyderabad Family Loses Crores in Elaborate Online Scam
https://undercodenews.com/digital-imprisonment-hyderabad-family-loses-crores-in-elaborate-online-scam/
@Undercode_News
https://undercodenews.com/digital-imprisonment-hyderabad-family-loses-crores-in-elaborate-online-scam/
@Undercode_News
UNDERCODE NEWS
Digital Imprisonment: Hyderabad Family Loses Crores in Elaborate Online Scam - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Nvidia Gears Up for CES 2025: RTX 5000 Series on the Horizon
https://undercodenews.com/nvidia-gears-up-for-ces-2025-rtx-5000-series-on-the-horizon/
@Undercode_News
https://undercodenews.com/nvidia-gears-up-for-ces-2025-rtx-5000-series-on-the-horizon/
@Undercode_News
UNDERCODE NEWS
Nvidia Gears Up for CES 2025: RTX 5000 Series on the Horizon - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐งฉ ONDC Takes Center Stage: Protean eGov's Innovative Integration with Prasar Bharati's Waves
https://undercodenews.com/ondc-takes-center-stage-protean-egovs-innovative-integration-with-prasar-bharatis-waves/
@Undercode_News
https://undercodenews.com/ondc-takes-center-stage-protean-egovs-innovative-integration-with-prasar-bharatis-waves/
@Undercode_News
UNDERCODE NEWS
ONDC Takes Center Stage: Protean eGov's Innovative Integration with Prasar Bharati's Waves - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE TESTING
๐ฆElliptic Curve Cryptography (ECC) Encryption and decryption.:
Process of Implementation
I implemented ECC in a way that could be useful for malware development by encrypting shellcode with a public key and then decrypting it using both the corresponding private key and an additional component called the R Point. This approach adds an extra layer of security, ensuring that only those with the correct private key and R Point can decrypt and execute the shellcode.
Note: Please go through the main function where i explained function features.
I generate random public and private keys then,
I have converted Keys into bytes for ease of handling, then reconstruct these keys for use in encryption and decryption. The encryption process involves using the public key to encrypt the shellcode and generate an R Point, which is serialized into bytes. To decrypt, you need this R Point along with the private key, which together allow the shellcode to be recovered and executed. However, my method of executing the shellcode is basic and could potentially be detected by security software, so more sophisticated execution methods would be necessary for real-world scenarios.
This Proof of Concept shows how ECC can be adapted for stealthy malware operations by leveraging its inherent security properties.
Small Snippet to encrypt and decrypt Messages
Write the Encrypt and decrypt function
>> Write the main function for operation
Process of Implementation
I implemented ECC in a way that could be useful for malware development by encrypting shellcode with a public key and then decrypting it using both the corresponding private key and an additional component called the R Point. This approach adds an extra layer of security, ensuring that only those with the correct private key and R Point can decrypt and execute the shellcode.
Note: Please go through the main function where i explained function features.
I generate random public and private keys then,
I have converted Keys into bytes for ease of handling, then reconstruct these keys for use in encryption and decryption. The encryption process involves using the public key to encrypt the shellcode and generate an R Point, which is serialized into bytes. To decrypt, you need this R Point along with the private key, which together allow the shellcode to be recovered and executed. However, my method of executing the shellcode is basic and could potentially be detected by security software, so more sophisticated execution methods would be necessary for real-world scenarios.
This Proof of Concept shows how ECC can be adapted for stealthy malware operations by leveraging its inherent security properties.
Small Snippet to encrypt and decrypt Messages
Write the Encrypt and decrypt function
// #![allow(deprecated)]
pub use k256::{elliptic_curve::{sec1::FromEncodedPoint, AffinePoint, Field}, EncodedPoint, ProjectivePoint, Scalar, Secp256k1};
pub use sha2::{Digest, Sha256};
pub use rand::rngs::OsRng;
pub use k256::elliptic_curve::group::GroupEncoding;
pub use k256::ecdsa::VerifyingKey;
fn encode_shellcode(
shellcode: &[u8],
public_key: &AffinePoint<Secp256k1>,
) -> (EncodedPoint, Vec<u8>) {
let mut rng = OsRng;
// generate the ephemeral keypair
let k = Scalar::random(&mut rng);
let r = (ProjectivePoint::generator() * k).to_affine();
// compute shared secret
let shared_secret = *public_key * k;
let shared_secret_bytes = shared_secret.to_bytes();
// derive encryption key from shared secret
let mut hasher = Sha256::new();
hasher.update(shared_secret_bytes);
let encryption_key = hasher.finalize();
// Encrypt shellcode
let encrypted_shellcode: Vec<u8> = shellcode
.iter()
.zip(encryption_key.iter().cycle())
.map(|(&byte, &key)| byte ^ key)
.collect();
(EncodedPoint::from(&r), encrypted_shellcode)
}
fn decode_shellcode(
encrypted_shellcode: &[u8],
r: &EncodedPoint,
private_key: &Scalar,
) -> Vec<u8> {
// Compute shared secret
let r_point = ProjectivePoint::from_encoded_point(r).expect("Invalid R point");
let shared_secret = r_point * private_key;
let shared_secret_bytes = shared_secret.to_bytes();
// derive decryption key from shared secret
let mut hasher = Sha256::new();
hasher.update(shared_secret_bytes);
let decryption_key = hasher.finalize();
// Decrypt shellcode
encrypted_shellcode
.iter()
.zip(decryption_key.iter().cycle())
.map(|(&byte, &key)| byte ^ key)
.collect()
}
>> Write the main function for operation
Forwarded from UNDERCODE TESTING
GitHub
GitHub - MitchellX/deepfake-models: List some popular DeepFake models e.g. DeepFake, FaceSwap-MarekKowal, IPGAN, FaceShifter, FaceSwapโฆ
List some popular DeepFake models e.g. DeepFake, FaceSwap-MarekKowal, IPGAN, FaceShifter, FaceSwap-Nirkin, FSGAN, SimSwap, CihaNet, etc. - MitchellX/deepfake-models
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โ๏ธ Meta Motivo: A Leap Towards More Realistic #Virtual Avatars
https://undercodenews.com/meta-motivo-a-leap-towards-more-realistic-virtual-avatars/
@Undercode_News
https://undercodenews.com/meta-motivo-a-leap-towards-more-realistic-virtual-avatars/
@Undercode_News
UNDERCODE NEWS
Meta Motivo: A Leap Towards More Realistic Virtual Avatars - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ