UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.2K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE TESTING
Forwarded from UNDERCODE TESTING
πŸ¦‘You've probably heard of JWT - Json Web Tokens.
It is a format designed to securely transfer information between two parties, so it is mainly used to authenticate and transmit information in an encrypted way by using different algorithms when it consists of three parts (Header, Payload, and Signature).

I recently visited a website that manages couriers since I myself am waiting for delivery. He is vulnerable, he is not secure, he is "weak." A weakness that I was able to locate was expressed in the fact that the server stores information about couriers (scheduling) for that courier in JWT format. The information inside is by "x" (identifier) and "y" (shipping). There is no defense mechanism in place, which leads to security weakness and damage to credibility.

It turns out (unfortunately) that anyone can edit the payload content (change a shipping ID to data belonging to another user), and without verifying the signature, the server will receive the edited token as valid, which leads to data tampering, exposing details, and also Rxss because it turns out that there is no filtering on user input.

What's more, it's not normal!
The problem with the JWT header is that it contains information such as id and num, for example, while it does not store information about the encryption type (alg) and the type of token (typ) at all. Using a header to store such data is a security weakness because the header is both unsigned and can be easily modified.

Platforms like Portswigger have modules that focus on attacks on jwt that can also be used to learn about secure development
JWT (Algorithm confusion, Header Injections, etc.)

Ref: Adam Kahlon
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE TESTING
πŸ¦‘AWS Cloud #tips : The Backbone of Modern Technology!🌟

πŸ”Ž What is AWS (Amazon Web Services)?
AWS is the world’s most comprehensive and widely adopted cloud platform, offering 200+ fully featured services across compute, storage, databases, networking, AI, IoT, and more. Trusted by millions, AWS enables businesses of all sizes to innovate faster and scale effortlessly.

🌟 Why AWS Stands Out:

1️⃣ Global Infrastructure:
β€’ Operates across 31 geographic regions and 99 Availability Zones, ensuring low latency, reliability, and scalability.
β€’ Plans for 15 more regions are underway, making AWS one of the largest global networks.

2️⃣ Cost Optimization:
β€’ AWS follows a pay-as-you-go model, meaning you only pay for what you use.
β€’ Tools like AWS Cost Explorer and Savings Plans help optimize your cloud spend.

3️⃣ Unmatched Security:
β€’ Industry-leading security protocols, compliance with over 140 global standards, and data encryption ensure peace of mind.
β€’ AWS also provides IAM (Identity and Access Management) for granular security control.

4️⃣ Innovation-Driven:
β€’ AWS offers cutting-edge tools for AI/ML (SageMaker), Big Data (EMR), and Serverless Computing (Lambda).
β€’ Pioneering advancements in Edge Computing with services like AWS Outposts and Wavelength.

5️⃣ Ease of Use for Developers:
β€’ A user-friendly console, SDKs, APIs, and CLI make building and managing applications seamless.
β€’ Offers templates via CloudFormation for infrastructure automation.

πŸ’» Most Popular AWS Services
β€’ EC2: Scalable compute power for running applications.
β€’ S3: Highly durable object storage for backups, data lakes, and archives.
β€’ RDS & DynamoDB: Managed relational and NoSQL databases.
β€’ CloudFront: Fast and secure content delivery network.
β€’ Lambda: Event-driven serverless computing without infrastructure management.

πŸ“š AWS Certification Pathway

AWS certifications validate your skills and open doors to career opportunities. Popular certifications include:
β€’ AWS Certified Solutions Architect (Associate)
β€’ AWS Certified Cloud Practitioner
β€’ AWS Certified DevOps Engineer

πŸš€ Who Uses AWS?
β€’ Startups: Accelerate development with low upfront costs.
β€’ Enterprises: Achieve agility and scale globally.
β€’ Developers & IT Professionals: Innovate and build cutting-edge solutions.

🌟 Getting Started:
β€’ Try AWS Free Tier to explore its services risk-free.
β€’ Explore AWS tutorials, documentation, and online courses to boost your skills.

Ref: Mahesh GirheMahesh Girhe
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
1734278140921.pdf
15.6 MB
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘Protect Your Inbox Like a Pro! πŸ”’

Your email is a goldmine for cybercriminals, containing personal, professional, and financial information. But fear notβ€”here’s how to safeguard it effectively:

πŸ›‘οΈ Top Email Security Tips:

1️⃣ Enable Multi-Factor Authentication (MFA): A strong password isn’t enough. MFA adds an extra layer of security.
2️⃣ Beware of Phishing Emails: Don’t click on suspicious links or attachments. Verify the sender before taking action.
3️⃣ Use Strong Passwords: Avoid predictable passwords like β€œpassword123.” Use a combination of upper/lowercase letters, numbers, and symbols.
4️⃣ Encrypt Your Emails: Protect sensitive information by using email encryption tools.
5️⃣ Keep Software Updated: Ensure your email client and antivirus software are always up-to-date.
6️⃣ Educate Yourself and Your Team: Awareness is your first line of defense. Share best practices with colleagues.

🚨 Common Email Security Threats:

πŸ”Έ Phishing: Fake emails designed to steal your information.
πŸ”Έ Spoofing: Attackers pretending to be trusted contacts.
πŸ”Έ Ransomware: Malicious attachments locking you out of your data.
πŸ”Έ BEC (Business Email Compromise): Fraudulent emails targeting businesses.

πŸ” Remember: A secure inbox equals a secure life. Take action now to protect your data and privacy!

Ref: Mahech Girhe
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
πŸ“Š Shein's Indian Comeback: Conditional on Data Localization and Reliance Partnership

https://undercodenews.com/sheins-indian-comeback-conditional-on-data-localization-and-reliance-partnership/

@Undercode_News
Forwarded from UNDERCODE TESTING
πŸ¦‘Detection of teams convoC2 Mainly used by Red Teamers recent days.

Basically it causes out bound requests to C2 Server, exfiltrates command outputs from Adaptive Cards images URLs and inserting data into hidden span tags in Microsoft teams conservations.
The fact that the victim only sends http queries to Microsoft servers and the antivirus doesn't examine MS teams log files and in absence of direct connection between the victim and attacker in this case its very difficult to detect.

Here is the custom KQL to Detect.

CloudAppEvents
| where Timestamp > ago(1h)
| where Application contains "Microsoft Teams"
| where ActionType contains "AppInstalled"
| where parse_json(RawEventData)["AddOnName"] == 'Workflows'

Ref: Kintali Sai Dinesh
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)