UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.8K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

FREE HACKING challenge based hackathons that can be hosted in-person or virtually via Microsoft Teams.

Attendees work in squads of 3 to 5 people to solve a series of technical challenges for a given technology or solution scenario. Challenges describe high-level tasks and goals to be accomplished. Challenges are not step-by-step labs.

What The Hack is designed to be a collaborative learning experience. Attendees "learn from" and "share with" each other. Without step-by-step instructions given for the challenges, attendees have to "figure it out" together as a team. This results in greater knowledge retention for the attendees.

The attendee squads are not alone in solving the challenges. Coaches work with each squad to provide guidance for, but not answers to, the challenges. The coaches may also provide lectures and demos to introduce the challenges, as well as review challenge solutions throughout the event.

Β» 1) STARTING THE HOST :

https://github.com/microsoft/WhatTheHack/blob/master/000-HowToHack/WTH-HowToHostAHack.md

Β» 2) HACK :
https://github.com/microsoft/WhatTheHack/blob/master/000-HowToHack/WTH-HowToAuthorAHack.md

INCLUDING :

Intro To Kubernetes
Advanced Kubernetes
Azure Arc Enabled Kubernetes
Azure Arc enabled servers
Infrastructure As Code: ARM & DSC
Infrastructure As Code: Terraform
Infrastructure As Code: Ansible
Azure Front Door
Azure Governance
MasteringLinux
Mastering Linux
SAP Automation
Application Development
Rock, Paper, Scissors, Boom!
App Modernization
Microservices In Azure
Serverless
Migrating Applications To The Cloud
IdentityForApps
MasteringLinux
FHIR Powered Healthcare
Operations
Azure Monitoring
Azure DevOps
Open Source DevOps
MasteringLinux
Data & AI
BI 2 AI
ThisOldDataWarehouse
Databricks/Intro to ML
Intro To Azure AI
Driving Miss Data

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Exposure to Intel 11 core coreless display F series: only i9-11900KF is absent.
#Technologies
Forwarded from UNDERCODE NEWS
Iranian hackers say: We hacked into the subsidiary of IAI.
#CyberAttacks
Forwarded from UNDERCODE NEWS
New Vmware Vulnerability could allow an attacker to block your host.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Windows 10X will come with the newly built Windows File Explorer.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ENJOY WITH NEW CTF FREE :

DEF CON >> https://legitbs.net/

* CSAW CTF >> https://ctf.isis.poly.edu/

* hack.lu CTF >> http://hack.lu/

* Pliad CTF >> http://www.plaidctf.com/

* RuCTFe >> http://ructf.org/e/

* Ghost in the Shellcode >> http://ghostintheshellcode.com/

* PHD CTF >> http://www.phdays.com/

* SECUINSIDE CTF >> http://secuinside.com/

* Codegate CTF >> http://ctf.codegate.org/html/Main.html?lang=eng

* Boston Key Party CTF >> http://bostonkeyparty.net/

* ZeroDays CTF >> https://zerodays.ie/

* Insomni’hack >> https://insomnihack.ch/

* Pico CTF >> https://picoctf.com/

* prompt >> 1 to win >> http://prompt.ml/ - XSS Challenges

* HackTheBox >> https://www.hackthebox.eu/

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
β€œMade in India”.The iPhone 12 is expected to be available within two months
#International
Forwarded from UNDERCODE NEWS
The first anonymously stored patient information is based on the Next Generation Medical Infrastructure Rule, NTT Records, etc.
#Technologies
Forwarded from UNDERCODE NEWS
Microsoft will make its own processors.
#Technologies
Forwarded from UNDERCODE NEWS
Samsung Galaxy A22 5G exposure to price and time to market.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WHY REVERSE ENGINEERING ?
#Basic

> To disassemble a program, someone doing reverse engineering on software can use several tools. One instrument is a hexadecimal dumper that prints or shows a program's binary numbers in hexadecimal format (which is easier to read than a binary format).

> The reverse engineer will classify some parts of a program and see how they operate by understanding the bit patterns that represent the processor instructions as well as the instruction lengths. The disassembler is another popular method. The disassembler reads the binary code and then reveals the text form of each executable command.

> A disassembler can not say the difference between an executable instruction and the program's code, so a debugger is used to keep the disassembler from disassembling the program's data parts. A cracker may use these techniques to change code to gain access to a computer system or inflict other harm.

> Reverse engineering of electronics means pulling a system apart to see if it functions. For example, if a maker of processors needs to see how the processor of a competitor operates, they might buy the processor of a competitor, disassemble it, and then make a processor close to it. In certain nations, however, this method is unconstitutional. In general, reverse engineering of hardware involves a great deal of experience and is very costly.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Surface Pro 7: 250 € discount for the famous 2 in 1.
#Technologies
Forwarded from UNDERCODE NEWS
Jack Ma offered China a stake in finance giant Annette to appease the administration.
#International