Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ
๐ญ. ๐๐ผ๐ฐ๐๐ ๐ผ๐ป ๐๐ฒ๐ฝ๐๐ต ๐ผ๐๐ฒ๐ฟ ๐๐ฟ๐ฒ๐ฎ๐ฑ๐๐ต:
- Don't solve 500 coding problems aimlessly. Master around 100 core problems deeply instead.
- 40 Problems on Array, Strings, LinkedList, Stack & Queue, Binary search, Trees, Graph, Sorting and Searching: https://lnkd.in/djnaPkeD
- 40 Problems on Dynamic Programming (DP), Backtracking, Hashing, Heap, Tries, and Greedy Algorithms: https://lnkd.in/dF3h-Khk
๐ฎ. ๐๐ฟ๐ฒ๐ฎ๐๐ฒ ๐ฎ ๐น๐ถ๐๐ ๐ผ๐ณ ๐ธ๐ฒ๐ ๐พ๐๐ฒ๐๐๐ถ๐ผ๐ป๐:
- Use resources like "Strivers A2Z DSA Sheet" by Raj Vikramaditya to curate around 100 core problems.
- https://lnkd.in/dQMGy9zF (Strivers)
๐ฏ. ๐ ๐ฎ๐๐๐ฒ๐ฟ ๐ฒ๐ฎ๐ฐ๐ต ๐ฑ๐ฎ๐๐ฎ ๐๐๐ฟ๐๐ฐ๐๐๐ฟ๐ฒ:
- Understand and implement them by hand. Know how they work internally to ace interview questions.
- Fundamentals, Intermediate, Advance DSA topics: https://lnkd.in/d4ws9xfr
๐ฐ. ๐ฃ๐ฟ๐ฎ๐ฐ๐๐ถ๐ฐ๐ฒ ๐๐ถ๐๐ต ๐ฆ๐ฝ๐ฎ๐ฐ๐ฒ๐ฑ ๐ฅ๐ฒ๐ฝ๐ฒ๐๐ถ๐๐ถ๐ผ๐ป:
- Revisit problems after 3 days, a week, and 15 days. Break down solutions instead of rote memorization.
- 3:7:15 Rule for DSA: https://lnkd.in/dW6a8wcg
๐ฑ. ๐๐ฑ๐ฒ๐ป๐๐ถ๐ณ๐ ๐ฟ๐ฒ๐๐๐ฎ๐ฏ๐น๐ฒ ๐๐ฒ๐ฐ๐ต๐ป๐ถ๐พ๐๐ฒ๐ ๐ฎ๐ป๐ฑ ๐ฐ๐ผ๐ฑ๐ฒ ๐ฏ๐น๐ผ๐ฐ๐ธ๐:
- Isolate common patterns like Binary Search or Depth First Search for focused practice.
- 20 DSA patterns: https://lnkd.in/d9GCezMm
- 14 problem solving patterns: https://lnkd.in/daysVFSz
- DSA questions patterns: https://lnkd.in/d3rRHTfE
๐ฒ. ๐๐ ๐ฝ๐ฎ๐ป๐ฑ ๐ถ๐ป๐๐ผ ๐๐ฟ๐ฒ๐ฎ๐ฑ๐๐ต:
- Once you've mastered core problems and techniques, tackle a wider range of questions. Keep it realistic and relevant to interview scenarios.
- 16 Important algorithms problems: https://lnkd.in/dfjm8ked
- Tips to solve any DSA question by understanding patterns: https://lnkd.in/d9GVyfBY
Additional tips
Practice on paper: Practice whiteboard interviews to improve your planning and coding skills without relying on an IDE. Itโs a practical way to get ready for real interviews.
Ref: Rajat Gajbhiye
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
DSA is so easy when you follow these 6 steps:
๐ญ. ๐๐ผ๐ฐ๐๐ ๐ผ๐ป ๐๐ฒ๐ฝ๐๐ต ๐ผ๐๐ฒ๐ฟ ๐๐ฟ๐ฒ๐ฎ๐ฑ๐๐ต:
- Don't solve 500 coding problems aimlessly. Master around 100 core problems deeply instead.
- 40 Problems on Array, Strings, LinkedList, Stack & Queue, Binary search, Trees, Graph, Sorting and Searching: https://lnkd.in/djnaPkeD
- 40 Problems on Dynamic Programming (DP), Backtracking, Hashing, Heap, Tries, and Greedy Algorithms: https://lnkd.in/dF3h-Khk
๐ฎ. ๐๐ฟ๐ฒ๐ฎ๐๐ฒ ๐ฎ ๐น๐ถ๐๐ ๐ผ๐ณ ๐ธ๐ฒ๐ ๐พ๐๐ฒ๐๐๐ถ๐ผ๐ป๐:
- Use resources like "Strivers A2Z DSA Sheet" by Raj Vikramaditya to curate around 100 core problems.
- https://lnkd.in/dQMGy9zF (Strivers)
๐ฏ. ๐ ๐ฎ๐๐๐ฒ๐ฟ ๐ฒ๐ฎ๐ฐ๐ต ๐ฑ๐ฎ๐๐ฎ ๐๐๐ฟ๐๐ฐ๐๐๐ฟ๐ฒ:
- Understand and implement them by hand. Know how they work internally to ace interview questions.
- Fundamentals, Intermediate, Advance DSA topics: https://lnkd.in/d4ws9xfr
๐ฐ. ๐ฃ๐ฟ๐ฎ๐ฐ๐๐ถ๐ฐ๐ฒ ๐๐ถ๐๐ต ๐ฆ๐ฝ๐ฎ๐ฐ๐ฒ๐ฑ ๐ฅ๐ฒ๐ฝ๐ฒ๐๐ถ๐๐ถ๐ผ๐ป:
- Revisit problems after 3 days, a week, and 15 days. Break down solutions instead of rote memorization.
- 3:7:15 Rule for DSA: https://lnkd.in/dW6a8wcg
๐ฑ. ๐๐ฑ๐ฒ๐ป๐๐ถ๐ณ๐ ๐ฟ๐ฒ๐๐๐ฎ๐ฏ๐น๐ฒ ๐๐ฒ๐ฐ๐ต๐ป๐ถ๐พ๐๐ฒ๐ ๐ฎ๐ป๐ฑ ๐ฐ๐ผ๐ฑ๐ฒ ๐ฏ๐น๐ผ๐ฐ๐ธ๐:
- Isolate common patterns like Binary Search or Depth First Search for focused practice.
- 20 DSA patterns: https://lnkd.in/d9GCezMm
- 14 problem solving patterns: https://lnkd.in/daysVFSz
- DSA questions patterns: https://lnkd.in/d3rRHTfE
๐ฒ. ๐๐ ๐ฝ๐ฎ๐ป๐ฑ ๐ถ๐ป๐๐ผ ๐๐ฟ๐ฒ๐ฎ๐ฑ๐๐ต:
- Once you've mastered core problems and techniques, tackle a wider range of questions. Keep it realistic and relevant to interview scenarios.
- 16 Important algorithms problems: https://lnkd.in/dfjm8ked
- Tips to solve any DSA question by understanding patterns: https://lnkd.in/d9GVyfBY
Additional tips
Practice on paper: Practice whiteboard interviews to improve your planning and coding skills without relying on an IDE. Itโs a practical way to get ready for real interviews.
Ref: Rajat Gajbhiye
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Linkedin
How to ace your interview with DSA questions | Rajat Gajbhiye posted on the topic | LinkedIn
DSA on SUNDAY!
We're back againโก
Here are 40 most asked DSA questions to ace your next interview -
๐๐ฟ๐ฟ๐ฎ๐๐ ๐ฎ๐ป๐ฑ ๐ฆ๐๐ฟ๐ถ๐ป๐ด๐:
1. Find the maximum sum subarray.
2. Find all substrings that are palindromes.
3. Implement the "two sum" problem.
4. Implement Kadane'sโฆ
We're back againโก
Here are 40 most asked DSA questions to ace your next interview -
๐๐ฟ๐ฟ๐ฎ๐๐ ๐ฎ๐ป๐ฑ ๐ฆ๐๐ฟ๐ถ๐ป๐ด๐:
1. Find the maximum sum subarray.
2. Find all substrings that are palindromes.
3. Implement the "two sum" problem.
4. Implement Kadane'sโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ A Greener Search: #Firefox Partners with Ecosia
https://undercodenews.com/a-greener-search-firefox-partners-with-ecosia/
@Undercode_News
https://undercodenews.com/a-greener-search-firefox-partners-with-ecosia/
@Undercode_News
UNDERCODE NEWS
A Greener Search: Firefox Partners with Ecosia - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Nvidia's RTX 5060: A Controversial 8GB VRAM Rumor
https://undercodenews.com/nvidias-rtx-5060-a-controversial-8gb-vram-rumor/
@Undercode_News
https://undercodenews.com/nvidias-rtx-5060-a-controversial-8gb-vram-rumor/
@Undercode_News
UNDERCODE NEWS
Nvidia's RTX 5060: A Controversial 8GB VRAM Rumor - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ๐ Mastering DNS & DHCP Penetration Testing: Protect Your Networkโs Core!
DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) are foundational to network operations. However, their vulnerabilities can make them prime targets for cyberattacks. Understanding how to test and secure these protocols is a critical skill for any cybersecurity professional.
Common DNS Vulnerabilities & Attacks:
1๏ธโฃ DNS Spoofing/Poisoning: Alters DNS responses to redirect users to malicious websites.
2๏ธโฃ DNS Tunneling: Exfiltrates data or establishes backdoors via DNS queries.
3๏ธโฃ Cache Poisoning: Manipulates DNS cache entries to disrupt or redirect traffic.
4๏ธโฃ Zone Transfer Exploitation: Misuses misconfigured servers to access sensitive DNS records.
Common DHCP Vulnerabilities & Attacks:
1๏ธโฃ DHCP Starvation Attack: Exhausts IP leases, causing network disruptions.
2๏ธโฃ Rogue DHCP Server Attack: Deploys unauthorized DHCP servers to provide malicious configurations.
3๏ธโฃ Man-in-the-Middle (MITM) Attacks: Exploits DHCP to intercept sensitive data.
4๏ธโฃ IP Address Spoofing: Mimics authorized devices to gain network access.
Steps to Perform DNS & DHCP Penetration Testing:
1๏ธโฃ Reconnaissance:
โข Use tools like Dig, DNSRecon, and Fierce to identify DNS configurations.
โข Scan for active DHCP servers using DHCPig or Yersinia.
2๏ธโฃ Vulnerability Analysis:
โข Check for weak configurations in DNS records (e.g., open zone transfers).
โข Identify rogue DHCP servers or insufficient IP allocations.
3๏ธโฃ Exploitation:
โข Simulate DNS Spoofing or Cache Poisoning to test resilience.
โข Perform DHCP Starvation or Rogue Server attacks in a controlled environment.
4๏ธโฃ Remediation:
โข Harden DNS configurations (disable unused services, restrict zone transfers).
โข Enable DHCP snooping and IP source guard to prevent rogue DHCP servers.
Pro Tip for Defenders:
โข Implement DNSSEC (Domain Name System Security Extensions) to validate DNS responses.
โข Regularly monitor and test DHCP and DNS servers for vulnerabilities.
๐ Remember: Always test ethically with proper authorization!
๐ DNS and DHCP are the backbone of every network. Securing them not only prevents breaches but ensures smooth operations for businesses.
DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) are foundational to network operations. However, their vulnerabilities can make them prime targets for cyberattacks. Understanding how to test and secure these protocols is a critical skill for any cybersecurity professional.
Common DNS Vulnerabilities & Attacks:
1๏ธโฃ DNS Spoofing/Poisoning: Alters DNS responses to redirect users to malicious websites.
2๏ธโฃ DNS Tunneling: Exfiltrates data or establishes backdoors via DNS queries.
3๏ธโฃ Cache Poisoning: Manipulates DNS cache entries to disrupt or redirect traffic.
4๏ธโฃ Zone Transfer Exploitation: Misuses misconfigured servers to access sensitive DNS records.
Common DHCP Vulnerabilities & Attacks:
1๏ธโฃ DHCP Starvation Attack: Exhausts IP leases, causing network disruptions.
2๏ธโฃ Rogue DHCP Server Attack: Deploys unauthorized DHCP servers to provide malicious configurations.
3๏ธโฃ Man-in-the-Middle (MITM) Attacks: Exploits DHCP to intercept sensitive data.
4๏ธโฃ IP Address Spoofing: Mimics authorized devices to gain network access.
Steps to Perform DNS & DHCP Penetration Testing:
1๏ธโฃ Reconnaissance:
โข Use tools like Dig, DNSRecon, and Fierce to identify DNS configurations.
โข Scan for active DHCP servers using DHCPig or Yersinia.
2๏ธโฃ Vulnerability Analysis:
โข Check for weak configurations in DNS records (e.g., open zone transfers).
โข Identify rogue DHCP servers or insufficient IP allocations.
3๏ธโฃ Exploitation:
โข Simulate DNS Spoofing or Cache Poisoning to test resilience.
โข Perform DHCP Starvation or Rogue Server attacks in a controlled environment.
4๏ธโฃ Remediation:
โข Harden DNS configurations (disable unused services, restrict zone transfers).
โข Enable DHCP snooping and IP source guard to prevent rogue DHCP servers.
Pro Tip for Defenders:
โข Implement DNSSEC (Domain Name System Security Extensions) to validate DNS responses.
โข Regularly monitor and test DHCP and DNS servers for vulnerabilities.
๐ Remember: Always test ethically with proper authorization!
๐ DNS and DHCP are the backbone of every network. Securing them not only prevents breaches but ensures smooth operations for businesses.
Forwarded from Exploiting Crew (Pr1vAt3)
DNS&DHCP_HACK.pdf
2.1 MB
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ #Windows 11 Gets a Much-Needed Webcam Upgrade
https://undercodenews.com/windows-11-gets-a-much-needed-webcam-upgrade/
@Undercode_News
https://undercodenews.com/windows-11-gets-a-much-needed-webcam-upgrade/
@Undercode_News
UNDERCODE NEWS
Windows 11 Gets a Much-Needed Webcam Upgrade - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ A Transatlantic Dream: Musk's Vision for a New York-London Tunnel
https://undercodenews.com/a-transatlantic-dream-musks-vision-for-a-new-york-london-tunnel/
@Undercode_News
https://undercodenews.com/a-transatlantic-dream-musks-vision-for-a-new-york-london-tunnel/
@Undercode_News
UNDERCODE NEWS
A Transatlantic Dream: Musk's Vision for a New York-London Tunnel - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆCookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication:
>> How Does it work?
Big-Papa utilizes malicious javascript code injection...and then makes a GET Request(with cookies) to the Python Web server running on the attacker machine
Note That you need to be man in the middle in order to inject the malicious javascript Code and then steal cookies of the website that the victim is currently visting
For testing purposes copy the Javascript code from the bgp.js file without the script tags and execute in the console of the browser
You can use Bettercap in-order to become man-in-the-middle using bettercap or use arp spoof and then run Big-Papa to inject Javascript
>> For HTTPS?
Big-Papa will work Perfectly against HTTP websites but For HTTPS you can use sslstrip to Downgrade it to HTTP and then utilize Big-Papa
*SSLstrip --> https://github.com/moxie0/sslstrip.git
Still some websites use HTTP and thus their data including Passwords can be read in Clear text but we need to steal cookies in some cases in order to Bypass 2-Factor-Authentication
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
>> How Does it work?
Big-Papa utilizes malicious javascript code injection...and then makes a GET Request(with cookies) to the Python Web server running on the attacker machine
Note That you need to be man in the middle in order to inject the malicious javascript Code and then steal cookies of the website that the victim is currently visting
For testing purposes copy the Javascript code from the bgp.js file without the script tags and execute in the console of the browser
You can use Bettercap in-order to become man-in-the-middle using bettercap or use arp spoof and then run Big-Papa to inject Javascript
>> For HTTPS?
Big-Papa will work Perfectly against HTTP websites but For HTTPS you can use sslstrip to Downgrade it to HTTP and then utilize Big-Papa
*SSLstrip --> https://github.com/moxie0/sslstrip.git
Still some websites use HTTP and thus their data including Passwords can be read in Clear text but we need to steal cookies in some cases in order to Bypass 2-Factor-Authentication
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
1๏ธโฃ git clone https://github.com/vrikodar/Big-Papa.git
2๏ธโฃcd Big-Papa
3๏ธโฃchmod +x install.sh
4๏ธโฃ ./install.sh
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - moxie0/sslstrip: A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.
A tool for exploiting Moxie Marlinspike's SSL "stripping" attack. - moxie0/sslstrip
๐Do you think quantum computers will spell the end of Tor anonymity?
Anonymous Quiz
100%
Yes, it's inevitable
0%
No, Tor will adapt
0%
Not sure / Need more info
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐จ Why Breaches Happen: Uncovering the Hidden Vulnerabilities
https://undercodenews.com/why-breaches-happen-uncovering-the-hidden-vulnerabilities/
@Undercode_News
https://undercodenews.com/why-breaches-happen-uncovering-the-hidden-vulnerabilities/
@Undercode_News
UNDERCODE NEWS
Why Breaches Happen: Uncovering the Hidden Vulnerabilities - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ก๏ธ Shield Your Etsy Shop: A Guide to Outsmarting Scammers
https://undercodenews.com/shield-your-etsy-shop-a-guide-to-outsmarting-scammers/
@Undercode_News
https://undercodenews.com/shield-your-etsy-shop-a-guide-to-outsmarting-scammers/
@Undercode_News
UNDERCODE NEWS
Shield Your Etsy Shop: A Guide to Outsmarting Scammers - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
A Glimpse into the Future: Innovation, Challenges, and #AI
https://undercodenews.com/a-glimpse-into-the-future-innovation-challenges-and-ai/
@Undercode_News
https://undercodenews.com/a-glimpse-into-the-future-innovation-challenges-and-ai/
@Undercode_News
UNDERCODE NEWS
A Glimpse into the Future: Innovation, Challenges, and AI - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ The Wall Street Journal Launches a New Brand Campaign
https://undercodenews.com/the-wall-street-journal-launches-a-new-brand-campaign/
@Undercode_News
https://undercodenews.com/the-wall-street-journal-launches-a-new-brand-campaign/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Climate Change and the Urgent Need for Action
https://undercodenews.com/climate-change-and-the-urgent-need-for-action/
@Undercode_News
https://undercodenews.com/climate-change-and-the-urgent-need-for-action/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐จ A New Stealthy Threat: Borealis Stealer
https://undercodenews.com/a-new-stealthy-threat-borealis-stealer/
@Undercode_News
https://undercodenews.com/a-new-stealthy-threat-borealis-stealer/
@Undercode_News
UNDERCODE NEWS
A New Stealthy Threat: Borealis Stealer - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ #WhatsApp for #iOS 242580: A New Era for Photo and Video Albums
https://undercodenews.com/whatsapp-for-ios-242580-a-new-era-for-photo-and-video-albums/
@Undercode_News
https://undercodenews.com/whatsapp-for-ios-242580-a-new-era-for-photo-and-video-albums/
@Undercode_News
UNDERCODE NEWS
WhatsApp for iOS 242580: A New Era for Photo and Video Albums - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Threads Surges: Daily Active Users Exceed 100 Million
https://undercodenews.com/threads-surges-daily-active-users-exceed-100-million/
@Undercode_News
https://undercodenews.com/threads-surges-daily-active-users-exceed-100-million/
@Undercode_News
UNDERCODE NEWS
Threads Surges: Daily Active Users Exceed 100 Million - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ