UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE TESTING
๐Ÿฆ‘All Free: Useful payloads and bypass for Web Application Security and Pentest/CTF:

https://github.com/swisskyrepo/PayloadsAllTheThings
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โšก๏ธ Bolstering Federal Cloud Security: CISA Issues New Directive for Agencies

https://undercodenews.com/bolstering-federal-cloud-security-cisa-issues-new-directive-for-agencies/

@Undercode_News
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Network Protocols: The Unsung Heroes of Communication

Think of networking protocols as the secret language that devices use to talk to each other on a network. They're essential for everything from browsing the web (DNS, TCP/IP, HTTPS) to sending emails (SMTP) and having real-time chats (WebSocket).

Here's a quick rundown of some key protocols:

DNS: Turns website names into computer addresses (IP addresses).
TCP/IP: The power couple of the internet. TCP chops data into packets and ensures reliable delivery, while IP addresses and routes them.
HTTPS: Secures your web browsing with encryption.
SMTP: Delivers your emails efficiently.
WebSocket: Enables real-time chat and data exchange.
DHCP: Assigns IP addresses to devices on a network automatically.
UDP: Prioritizes speed for streaming, gaming, and voice calls.

Understanding these protocols gives you a deeper appreciation for how the digital world works.

Ref: Rocky Bhatia
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE TESTING
๐Ÿฆ‘Hack Together: The Microsoft Fabric Global AI Hack

Official Repo:
https://github.com/microsoft/Hack-Together-Fabric-AI
Forwarded from UNDERCODE TESTING
๐Ÿฆ‘๐๐ž๐ญ๐ฐ๐จ๐ซ๐ค ๐€๐ญ๐ญ๐š๐œ๐ค๐ฌ ๐„๐ฑ๐ฉ๐ฅ๐š๐ข๐ง๐ž๐
๐Ÿ”น ๐Œ๐ˆ๐“๐Œ (๐Œ๐š๐ง-๐ข๐ง-๐ญ๐ก๐ž-๐Œ๐ข๐๐๐ฅ๐ž) ๐€๐ญ๐ญ๐š๐œ๐ค: Interception of communication between two parties by a third party, potentially altering messages (e.g., an attacker intercepts messages between Alice and Bob).

๐Ÿ”น๐‘๐จ๐จ๐ญ๐ค๐ข๐ญ๐ฌ: Malicious software that provides privileged access to a computer while hiding the attacker's presence (e.g., an attacker installs a rootkit on a server to avoid detection).

๐Ÿ”น ๐๐จ๐ญ๐ง๐ž๐ญ๐ฌ: Networks of compromised devices controlled by a central entity, used for malicious activities like DDoS attacks (e.g., thousands of infected computers flood a website).

๐Ÿ”น๐ˆ๐ ๐’๐ฉ๐จ๐จ๐Ÿ๐ข๐ง๐ : Sending packets with a fake source IP address to impersonate another device or mask traffic origin (e.g., an attacker tricks a server into thinking a request is from a trusted source).

๐Ÿ”น ๐ƒ๐ƒ๐จ๐’ (๐ƒ๐ข๐ฌ๐ญ๐ซ๐ข๐›๐ฎ๐ญ๐ž๐ ๐ƒ๐ž๐ง๐ข๐š๐ฅ ๐จ๐Ÿ ๐’๐ž๐ซ๐ฏ๐ข๐œ๐ž): Overwhelming a server with traffic from multiple sources, making it unavailable to legitimate users (e.g., using a botnet to crash a website).

๐Ÿ”น๐ƒ๐๐’ ๐’๐ฉ๐จ๐จ๐Ÿ๐ข๐ง๐ : Providing false DNS responses to redirect victims to malicious sites, often to steal information (e.g., redirecting users to a fake bank website).

Ref: Praveen Singh
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE TESTING
Forwarded from UNDERCODE TESTING
๐Ÿฆ‘You've probably heard of JWT - Json Web Tokens.
It is a format designed to securely transfer information between two parties, so it is mainly used to authenticate and transmit information in an encrypted way by using different algorithms when it consists of three parts (Header, Payload, and Signature).

I recently visited a website that manages couriers since I myself am waiting for delivery. He is vulnerable, he is not secure, he is "weak." A weakness that I was able to locate was expressed in the fact that the server stores information about couriers (scheduling) for that courier in JWT format. The information inside is by "x" (identifier) and "y" (shipping). There is no defense mechanism in place, which leads to security weakness and damage to credibility.

It turns out (unfortunately) that anyone can edit the payload content (change a shipping ID to data belonging to another user), and without verifying the signature, the server will receive the edited token as valid, which leads to data tampering, exposing details, and also Rxss because it turns out that there is no filtering on user input.

What's more, it's not normal!
The problem with the JWT header is that it contains information such as id and num, for example, while it does not store information about the encryption type (alg) and the type of token (typ) at all. Using a header to store such data is a security weakness because the header is both unsigned and can be easily modified.

Platforms like Portswigger have modules that focus on attacks on jwt that can also be used to learn about secure development
JWT (Algorithm confusion, Header Injections, etc.)

Ref: Adam Kahlon
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–