UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE TESTING
๐Ÿฆ‘Highest Rank AI .gif Generator : (Trial)

https://picsart.com/ai-gif-generator/
Forwarded from UNDERCODE TESTING
๐Ÿฆ‘All Free: Useful payloads and bypass for Web Application Security and Pentest/CTF:

https://github.com/swisskyrepo/PayloadsAllTheThings
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โšก๏ธ Bolstering Federal Cloud Security: CISA Issues New Directive for Agencies

https://undercodenews.com/bolstering-federal-cloud-security-cisa-issues-new-directive-for-agencies/

@Undercode_News
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Network Protocols: The Unsung Heroes of Communication

Think of networking protocols as the secret language that devices use to talk to each other on a network. They're essential for everything from browsing the web (DNS, TCP/IP, HTTPS) to sending emails (SMTP) and having real-time chats (WebSocket).

Here's a quick rundown of some key protocols:

DNS: Turns website names into computer addresses (IP addresses).
TCP/IP: The power couple of the internet. TCP chops data into packets and ensures reliable delivery, while IP addresses and routes them.
HTTPS: Secures your web browsing with encryption.
SMTP: Delivers your emails efficiently.
WebSocket: Enables real-time chat and data exchange.
DHCP: Assigns IP addresses to devices on a network automatically.
UDP: Prioritizes speed for streaming, gaming, and voice calls.

Understanding these protocols gives you a deeper appreciation for how the digital world works.

Ref: Rocky Bhatia
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE TESTING
๐Ÿฆ‘Hack Together: The Microsoft Fabric Global AI Hack

Official Repo:
https://github.com/microsoft/Hack-Together-Fabric-AI
Forwarded from UNDERCODE TESTING
๐Ÿฆ‘๐๐ž๐ญ๐ฐ๐จ๐ซ๐ค ๐€๐ญ๐ญ๐š๐œ๐ค๐ฌ ๐„๐ฑ๐ฉ๐ฅ๐š๐ข๐ง๐ž๐
๐Ÿ”น ๐Œ๐ˆ๐“๐Œ (๐Œ๐š๐ง-๐ข๐ง-๐ญ๐ก๐ž-๐Œ๐ข๐๐๐ฅ๐ž) ๐€๐ญ๐ญ๐š๐œ๐ค: Interception of communication between two parties by a third party, potentially altering messages (e.g., an attacker intercepts messages between Alice and Bob).

๐Ÿ”น๐‘๐จ๐จ๐ญ๐ค๐ข๐ญ๐ฌ: Malicious software that provides privileged access to a computer while hiding the attacker's presence (e.g., an attacker installs a rootkit on a server to avoid detection).

๐Ÿ”น ๐๐จ๐ญ๐ง๐ž๐ญ๐ฌ: Networks of compromised devices controlled by a central entity, used for malicious activities like DDoS attacks (e.g., thousands of infected computers flood a website).

๐Ÿ”น๐ˆ๐ ๐’๐ฉ๐จ๐จ๐Ÿ๐ข๐ง๐ : Sending packets with a fake source IP address to impersonate another device or mask traffic origin (e.g., an attacker tricks a server into thinking a request is from a trusted source).

๐Ÿ”น ๐ƒ๐ƒ๐จ๐’ (๐ƒ๐ข๐ฌ๐ญ๐ซ๐ข๐›๐ฎ๐ญ๐ž๐ ๐ƒ๐ž๐ง๐ข๐š๐ฅ ๐จ๐Ÿ ๐’๐ž๐ซ๐ฏ๐ข๐œ๐ž): Overwhelming a server with traffic from multiple sources, making it unavailable to legitimate users (e.g., using a botnet to crash a website).

๐Ÿ”น๐ƒ๐๐’ ๐’๐ฉ๐จ๐จ๐Ÿ๐ข๐ง๐ : Providing false DNS responses to redirect victims to malicious sites, often to steal information (e.g., redirecting users to a fake bank website).

Ref: Praveen Singh
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE TESTING