UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Intel is being sold out piece by piece. The company's important business goes to the Chinese

#international
πŸ¦‘Now it's free--Learn Amazon Web Services (AWS): The complete introduction

Sign
up to Amazon Web Services (AWS)

Navigate around the AWS console

Use the command line interface to control AWS

Build a simple AWS serverless system

Build Windows and Linux servers

Create a Wordpress website in 5 minutes!

Be familiar with every service in AWS today

https://www.udemy.com/course/learn-amazon-web-services-the-complete-introduction/
Forwarded from UNDERCODE NEWS
Company is seeking to slow down the pre-installation of Russian gadget apps.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ§ How to properly protect sysctl on Linux from spoofing and Syn flooding

1) The sysctl system also helps prevent attacks such as SYN floods and IP spoofing.

It also logs some types of suspect packets - spoofed packets, source routed packets, and forwarded packets.

2) You can change kernel parameters at run time using the sysctl command, or you can make changes to the system configuration file to make these changes more permanent.

3) I want to show you how you can protect sysctl by quickly editing the config file.

This configuration will be as follows:
Disable IP forwarding
Disable packet forwarding
Disable accepting ICMP redirects
Enable protection against incorrect error messages
What you need:

4) Linux
User with sudo privileges
Note: I will be demonstrating an example on Ubuntu Server 18.04, but the process is the same for most Linux distributions.
How to edit sysctl config file
Log into your Linux server or desktop and open a terminal window.

5) In the terminal, enter the command:
sudo nano /etc/sysctl.conf
First required parameter:
# net.ipv4.ip_forward = 1
change to:

net.ipv4.ip_forward = 0
Next line:

# net.ipv4.conf.all.send_redirects = 0
change to:

net.ipv4.conf.all.send_redirects = 0
Find the line:

# net.ipv4.conf.all.accept_redirects = 0
change to:

net.ipv4.conf.all.accept_redirects = 0
Add the following line below that:

net.ipv4.conf.default.accept_redirects = 0
Finally, add the following lines to the end of the file:

net.ipv4.icmp_ignore_bogus_error_responses = 1
net.ipv4.tcp_syncookies = 1
net.ipv4.tcp_max_syn_backlog = 2048
net.ipv4.tcp_synack_retries = 3
net.ipv4.netfilter.ip_conntrack_tcp_timeout_syn_recv = 45

6) The above settings do the following:

Includes protection against incorrect error messages
Enable SYN cookies to prevent the server from dropping connections when the SYN queue is full
Increase SYS queue size to 2048
W akryvayut state SYN_RECV compound pre
Decrease SYN_RECV timeout value to help mitigate SYN flood attack

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Bitcoin stands at 17,000 USD/coin, continuing to hit a new high since January 2018.
#Updates
Forwarded from UNDERCODE NEWS
Hackers bombing famous adult content sites, Mulsmoke campaign.
#CyberAttacks
Forwarded from UNDERCODE NEWS
Among β€œ1,500 information security vulnerabilities in October”… the lowest in the year.
#Analytiques #Vulnerabilities
Forwarded from UNDERCODE NEWS
Apple and Lenovo tech maker fell victim to ransomware.
#Malwares
Forwarded from UNDERCODE NEWS
'ModPipe', a modular backdoor aimed at POS software, was discovered.
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TYPES OF FIREWALLS :

1) Firewall Types:
Firewall Package Filtering:
This firewall form tracks TCP packet headers at the level of TCP, and searches for source address, target address, source port, destination port, and protocol. They authorize or disallow packets in compliance with written laws, depending on these information.

Any 80 Allow – this rule tells the firewall to permit any packet from any source to port 80 from any source.

2) Firewall Circuit Level:

The session levels are operated and the links are filtered. They are searching for trustworthy connections and filter dependent on trusted connections right before the packets are transferred.

3) Firewalls application:

Alternatively they are called the Proxy firewall; operate on the server layer, filtering packets of the application level. There are various rules for filtering the data at the proxy. Web servers normally accessed by internet users can be positioned as proxy servers outside the internal network and all connections to the proxy can therefore be directed; the internal network can then be shielded from external links.


4) Firewall state-of-the-art:

This is the firewalls mix. It functions on the Network Layer, filters transport speeds, connections at the session level and applications data. This has a state table with separate links status and a law table. It has a state table. It also tracks the number of sequences to deter related attacks.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
GPU will be the savior of vRAN or Softbank's speculation.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Tips to Improve your Application Security :

1)Be concerned about securing your API


The Application Programming Interface, or API can be said, is an important part of backend development, supporting applications to communicate with each other.

But since they are obvious, they can be a security issue.

2) Don't forget about Back-end security
A significant number of internal APIs suggest that it is unlikely that an application that is reported to have access will be able to communicate with it.

Internal servers must have security systems installed to protect against malicious attacks.

Therefore, you must ensure that all APIs are authenticated based on the mobile platform, as transport processes and API authentication can differ from platform to platform.

3) Use tokens
A token is "a small hardware device controlled by a way to authorize a login to a system account."

In today's world of applications, developers use tokens to handle user sessions more efficiently.

4) High-level authentication
As discussed above, many security breaches are due to weak authentication.
Hence, it becomes more and more important to use stronger authentication.
Authentication often refers to passwords.
As an application developer, your job is to support your users with passwords.
For example, you can design your application so that it only accepts strong alphanumeric passwords that can be recovered every three months.
Two-factor authentication is also a great idea for securing a mobile app.
If your application allows two-factor authentication, the user will previously be required to enter a code delivered to his or her texts or email upon login.
If we talk more about modern authentication methods, then it includes biometric data such as retinal scans. and fingerprints.

5) Run the best encryption tools and techniques
The number one challenge for stronger encryption is choosing key management.
Store your keys in secure containers.
Never host them locally on the server.

6) Testing the program


It is shocking that many developers do not validate their code.

This is a necessary part of developing quality code.

This is why only part of the app security process is focused on building a great mobile app.

To get a secure application, the team must regularly evaluate the code and analyze the security loopholes that can arise from a data breach.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Review of "LIFEBOOK UH-X / E3", a 13.3-inch notebook PC weighing only 634g.
#Technologies