UNDERCODE COMMUNITY
2.73K subscribers
1.24K photos
31 videos
2.65K files
84.2K links
🦑 Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


Youtube.com/Undercode
by Undercode.help
Download Telegram
Forwarded from UNDERCODE TESTING
🦑[𝐅𝐑𝐄𝐄 𝐑𝐄𝐒𝐎𝐔𝐑𝐂𝐄𝐒 - 𝐀𝐂𝐓𝐈𝐕𝐄 𝐃𝐈𝐑𝐄𝐂𝐓𝐎𝐑𝐘 𝐏𝐄𝐍𝐓𝐄𝐒𝐓]

Whether you are preparing for a certification or need to sharpen your skills for your pentests.

🤓Here is a list of resources 🤓:

𝐍𝐞𝐞𝐝 𝐭𝐨 𝐩𝐫𝐚𝐜𝐭𝐢𝐜𝐞?
👉Set up and AD home lab with this blog post from spookysec:
https://lnkd.in/d-Dt7PBA

👉You also have a script here to set up a Vulnerable AD lab by WazeHell
https://lnkd.in/dyZS6WWr

👉 Check out the dedicated section on Active Directory of PenTips
https://lnkd.in/dhTP_eyt

👉Here is a collection of various common attack scenarios on Microsoft Azure Active Directory by Cloud-Architekt:
https://lnkd.in/dnFfRRMM

👉Julien Provenzano ☁️ shared a great document full of resources here:
https://lnkd.in/d-skx-R3

👉Finally here is an Active Directory Exploitation Cheat Sheet by Integration-IT
https://lnkd.in/dBijrUjT

Resources Credit : Gabrielle
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE TESTING
security_SOC_2025.pdf
647.9 KB
🦑 SOC Architectures & Frameworks: Key to Cybersecurity! 🚨
As cyber threats grow, choosing the right Security Operations Center (SOC) and framework is crucial. Here’s a quick guide:
SOC Architectures:
Centralized SOC: One location, best for large organizations.
Decentralized SOC: Multiple locations, ideal for global companies.
Virtual SOC: Cloud-based, cost-effective for SMBs.
Hybrid SOC: Combines all models, offering flexibility.
Popular Frameworks:
NIST CSF: Risk-based, customizable.
MITRE ATT&CK: Helps improve threat detection.
ISO 27001: Compliance-focused, globally recognized.
CIS Controls: Simple, prioritized security controls.
Key Considerations: Budget, company size, risk level, and compliance needs. Make the right choice to protect your organization!

Ref: in pdf
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE TESTING
medium_com_aitichoumustapha_lab_15_practical_malware_analysis_discover.pdf
3.6 MB
𝐋𝐀𝐁 15 𝐏𝐫𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐌𝐚𝐥𝐰𝐚𝐫𝐞 𝐀𝐧𝐚𝐥𝐲𝐬𝐢𝐬: 𝐃𝐢𝐬𝐜𝐨𝐯𝐞𝐫 𝐀𝐧𝐭𝐢-𝐃𝐢𝐬𝐚𝐬𝐬𝐞𝐦𝐛𝐥𝐲 𝐓𝐞𝐜𝐡𝐧𝐢𝐪𝐮𝐞𝐬
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Webshell Testing for Defenders 💡

Having automated tools to spin up web servers isn’t just convenient—it’s a game-changer for defenders. Here's why:

🔍 Detection Opportunities:
Use these servers to validate analytic coverage for:

🗂 File modifications (webshell uploads)
⚙️ Process executions (commands from shells)
🎯 Suspicious behaviors triggered by shells

💻 How to Use:

1️⃣ Deploy your favorite tools (Sysmon, EDR, XDR, etc.)
2️⃣ Grab a webshell of choice, upload it, and start testing!
3️⃣Observe logs, alerts, and behaviors to identify gaps in your coverage.

🔥 Tools for Testing:

➡️ Apache Builder: https://github.com/MHaggis/notes/tree/master/utilities/ApachePHPBuild
➡️ IIS Builder: https://github.com/MHaggis/notes/tree/master/utilities/IISBuilder

Ref: Michael H.Michael H.
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Zero Trust Security: The Future of Cyber Defense 🔒

In today’s rapidly evolving digital landscape, protecting organizational assets requires a fundamental shift in how we approach security. Zero Trust Security has emerged as a game-changing framework designed to minimize risks and protect against sophisticated cyber threats.

Here’s a quick Zero Trust Security Cheatsheet to break it down:

📌 What is Zero Trust?
It’s a security model based on the principle of "Never Trust, Always Verify." Every user, device, and application must continuously prove their identity and intent, regardless of whether they are inside or outside the network.

📌 Key Pillars of Zero Trust:

1️⃣ Authentication Types:
🔻 Single-Factor Authentication (SFA): Basic, but less secure.
🔻 Multi-Factor Authentication (MFA): A core requirement for enhanced security.

2️⃣ Verticals Leveraging Zero Trust:
🔻 Banking & Financial Services
🔻 Government & Defense
🔻 IT & Healthcare
🔻 Retail, E-commerce, and more.

3️⃣ Top Technologies and Applications:
🔻 Technologies: Microsegmentation, Zero Trust Network Access (ZTNA), MFA, Secure Access Service Edge (SASE).
🔻 Applications: AI-powered analytics, Identity & Access Management (IAM), Endpoint Security, and Network Access Control (NAC).

4️⃣ Core Security Areas:
🔻 Application Security: Safeguarding web apps and APIs with tools like WAF and runtime protection.
🔻 Cloud Security: Using CASB, CIAM, and CDLP to monitor cloud environments.
🔻 IoT Security: Securing IoT devices with firewalls and device management.
🔻 Data Security: Preventing breaches with DLP, encryption, and data masking.
🔻 Network Security: Employing IDS, IPS, and segmentation to protect networks.

Ref: Fadi Kazdar
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁