Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🤖 The #AI Godmother: Fei-Fei Li on Generative #AI and the Future of Robotics
https://undercodenews.com/the-ai-godmother-fei-fei-li-on-generative-ai-and-the-future-of-robotics/
@Undercode_News
https://undercodenews.com/the-ai-godmother-fei-fei-li-on-generative-ai-and-the-future-of-robotics/
@Undercode_News
UNDERCODE NEWS
The AI Godmother: Fei-Fei Li on Generative AI and the Future of Robotics - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: DirBuster - Directory and File Bruteforcing
DirBuster is a multi-threaded Java application used to brute-force directories and files on web servers. It's typically used to find hidden resources that might expose vulnerabilities in web applications.
---
### Basic Usage Command:
Explanation:
-
-
-
---
### Example: Specifying a Custom HTTP Port
Explanation:
-
---
### Example: Brute Forcing with Multiple Threads
Explanation:
-
---
### Example: Saving Results to a File
Explanation:
-
---
### Example: Using a Proxy
Explanation:
-
---
### Important Notes:
1. DirBuster is a powerful tool for penetration testers looking to discover hidden files and directories on a target.
2. Always ensure you have proper authorization to scan the target server, as unauthorized brute-forcing is illegal and unethical.
DirBuster is a multi-threaded Java application used to brute-force directories and files on web servers. It's typically used to find hidden resources that might expose vulnerabilities in web applications.
---
### Basic Usage Command:
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt
Explanation:
-
java -jar dirbuster.jar: Runs the DirBuster Java application.-
-u http://example.com: Specifies the target URL to scan.-
-l /path/to/wordlist.txt: Specifies the path to the wordlist containing potential directory and file names.---
### Example: Specifying a Custom HTTP Port
java -jar dirbuster.jar -u http://example.com:8080 -l /path/to/wordlist.txt
Explanation:
-
http://example.com:8080: Scans a target on a specific port (8080 in this case), useful if the web server is running on a non-standard port.---
### Example: Brute Forcing with Multiple Threads
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt -t 50
Explanation:
-
-t 50: Specifies 50 concurrent threads to speed up the brute-forcing process.---
### Example: Saving Results to a File
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt -o /path/to/output.txt
Explanation:
-
-o /path/to/output.txt: Saves the scan results to the specified output file (output.txt).---
### Example: Using a Proxy
java -jar dirbuster.jar -u http://example.com -l /path/to/wordlist.txt -p 127.0.0.1:8080
Explanation:
-
-p 127.0.0.1:8080: Routes traffic through a proxy server (useful for anonymizing the scan or debugging).---
### Important Notes:
1. DirBuster is a powerful tool for penetration testers looking to discover hidden files and directories on a target.
2. Always ensure you have proper authorization to scan the target server, as unauthorized brute-forcing is illegal and unethical.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Wfuzz - Web Application Fuzzing Tool
Wfuzz is a web application vulnerability scanner used to perform fuzzing attacks. It is commonly used for brute-forcing web applications to find hidden directories, files, and parameters that could be vulnerable to attacks like SQL injection or file inclusion.
---
### Basic Usage Command:
Explanation:
-
-
-
-
---
### Example: Fuzzing Multiple Parameters
Explanation:
-
---
### Example: Fuzzing HTTP Headers
Explanation:
-
---
### Example: Using a Proxy for Traffic
Explanation:
-
---
### Example: Brute Force Directories
Explanation:
-
---
### Example: Fuzzing with Recursive Mode
Explanation:
-
---
### Important Notes:
1. Wfuzz is highly effective for brute-forcing hidden parameters and files in web applications.
2. Always obtain explicit permission to perform fuzzing and penetration tests, as unauthorized scanning can be illegal.
Wfuzz is a web application vulnerability scanner used to perform fuzzing attacks. It is commonly used for brute-forcing web applications to find hidden directories, files, and parameters that could be vulnerable to attacks like SQL injection or file inclusion.
---
### Basic Usage Command:
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/FUZZ
Explanation:
-
wfuzz: Runs the Wfuzz tool.-
-c: Enables colorized output for easier reading of results.-
-z file,/path/to/wordlist.txt: Specifies a wordlist for fuzzing.-
-u http://example.com/FUZZ: The target URL where FUZZ is the placeholder for words in the wordlist to be tested.---
### Example: Fuzzing Multiple Parameters
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/page.php?id=FUZZ&user=admin
Explanation:
-
id=FUZZ&user=admin: Fuzzes the id parameter while keeping the user parameter fixed.---
### Example: Fuzzing HTTP Headers
wfuzz -c -z file,/path/to/wordlist.txt -H "X-Secret: FUZZ" http://example.com
Explanation:
-
-H "X-Secret: FUZZ": Fuzzes a custom HTTP header (X-Secret) by injecting different words from the wordlist.---
### Example: Using a Proxy for Traffic
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/FUZZ --proxy http://127.0.0.1:8080
Explanation:
-
--proxy http://127.0.0.1:8080: Routes the fuzzing traffic through a proxy for anonymity or to capture the traffic.---
### Example: Brute Force Directories
wfuzz -c -z dir,/path/to/dirlist.txt -u http://example.com/FUZZ
Explanation:
-
-z dir,/path/to/dirlist.txt: Fuzzes directory names from the specified wordlist to discover hidden directories on the server.---
### Example: Fuzzing with Recursive Mode
wfuzz -c -z file,/path/to/wordlist.txt -u http://example.com/FUZZ -r
Explanation:
-
-r: Enables recursive fuzzing, where Wfuzz continues fuzzing on discovered directories or files.---
### Important Notes:
1. Wfuzz is highly effective for brute-forcing hidden parameters and files in web applications.
2. Always obtain explicit permission to perform fuzzing and penetration tests, as unauthorized scanning can be illegal.
Forwarded from DailyCVE
🔴 #GitHub CLI Vulnerability: Path Traversal via Malicious Workflow Artifact (#CVE-TBD) (Critical)
https://dailycve.com/github-cli-vulnerability-path-traversal-via-malicious-workflow-artifact-cve-tbd-critical/
@daily_cve
https://dailycve.com/github-cli-vulnerability-path-traversal-via-malicious-workflow-artifact-cve-tbd-critical/
@daily_cve
DailyCVE
GitHub CLI Vulnerability: Path Traversal via Malicious Workflow Artifact (CVE-TBD) (Critical) - DailyCVE
2024-12-04 Platform: GitHub CLI Version: Prior to 2.63.1 Vulnerability: Path Traversal Severity: Critical Date: November 2024 (estimated) What Undercode Says: […]
Forwarded from DailyCVE
🔴 CyberPanel, Command Injection Vulnerability, #CVE-2024-51378 (Critical)
https://dailycve.com/cyberpanel-command-injection-vulnerability-cve-2024-51378-critical/
@daily_cve
https://dailycve.com/cyberpanel-command-injection-vulnerability-cve-2024-51378-critical/
@daily_cve
DailyCVE
CyberPanel, Command Injection Vulnerability, CVE-2024-51378 (Critical) - DailyCVE
2024-12-04 : A critical vulnerability (CVE-2024-51378) was discovered in CyberPanel versions before 1c0c6cb. This vulnerability allows remote attackers to bypass […]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🔋 Xreal One Series: Affordable AR Glasses with Spatial Computing Power
https://undercodenews.com/xreal-one-series-affordable-ar-glasses-with-spatial-computing-power/
@Undercode_News
https://undercodenews.com/xreal-one-series-affordable-ar-glasses-with-spatial-computing-power/
@Undercode_News
UNDERCODE NEWS
Xreal One Series: Affordable AR Glasses with Spatial Computing Power - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Gradiente's #iPhone Claim: A Battle for Trademark Rights
https://undercodenews.com/gradientes-iphone-claim-a-battle-for-trademark-rights/
@Undercode_News
https://undercodenews.com/gradientes-iphone-claim-a-battle-for-trademark-rights/
@Undercode_News
UNDERCODE NEWS
Gradiente's iPhone Claim: A Battle for Trademark Rights - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🛡️ Navigating the Evolving Cybersecurity Landscape: A Complex Regulatory Terrain
https://undercodenews.com/navigating-the-evolving-cybersecurity-landscape-a-complex-regulatory-terrain/
@Undercode_News
https://undercodenews.com/navigating-the-evolving-cybersecurity-landscape-a-complex-regulatory-terrain/
@Undercode_News
UNDERCODE NEWS
Navigating the Evolving Cybersecurity Landscape: A Complex Regulatory Terrain - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 A Hidden Threat: #Spyware's Widespread Prevalence
https://undercodenews.com/a-hidden-threat-spywares-widespread-prevalence/
@Undercode_News
https://undercodenews.com/a-hidden-threat-spywares-widespread-prevalence/
@Undercode_News
UNDERCODE NEWS
A Hidden Threat: Spyware's Widespread Prevalence - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #Amazon's #AI Ambitions: A New Innovation
https://undercodenews.com/amazons-ai-ambitions-a-new-innovation/
@Undercode_News
https://undercodenews.com/amazons-ai-ambitions-a-new-innovation/
@Undercode_News
UNDERCODE NEWS
Amazon's AI Ambitions: A New Innovation - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚠️ A New Shield Against #Digital Spies: #Pegasus Detection App
https://undercodenews.com/a-new-shield-against-digital-spies-pegasus-detection-app/
@Undercode_News
https://undercodenews.com/a-new-shield-against-digital-spies-pegasus-detection-app/
@Undercode_News
UNDERCODE NEWS
A New Shield Against Digital Spies: Pegasus Detection App - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
X Hires Media Strategy Head Amidst Turbulent Times
https://undercodenews.com/x-hires-media-strategy-head-amidst-turbulent-times/
@Undercode_News
https://undercodenews.com/x-hires-media-strategy-head-amidst-turbulent-times/
@Undercode_News
UNDERCODE NEWS
X Hires Media Strategy Head Amidst Turbulent Times - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 China's Persistent Cyber Threat: Salt Typhoon's Ongoing Intrusion
https://undercodenews.com/chinas-persistent-cyber-threat-salt-typhoons-ongoing-intrusion/
@Undercode_News
https://undercodenews.com/chinas-persistent-cyber-threat-salt-typhoons-ongoing-intrusion/
@Undercode_News
UNDERCODE NEWS
China's Persistent Cyber Threat: Salt Typhoon's Ongoing Intrusion - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
The Rise of #AI Advertising: A Double-Edged Sword
https://undercodenews.com/the-rise-of-ai-advertising-a-double-edged-sword/
@Undercode_News
https://undercodenews.com/the-rise-of-ai-advertising-a-double-edged-sword/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ Methane GPT: A New Tool to Combat Climate Change
https://undercodenews.com/methane-gpt-a-new-tool-to-combat-climate-change/
@Undercode_News
https://undercodenews.com/methane-gpt-a-new-tool-to-combat-climate-change/
@Undercode_News
UNDERCODE NEWS
Methane GPT: A New Tool to Combat Climate Change - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 #AI Deepfakes: A Non-Threat to Elections
https://undercodenews.com/ai-deepfakes-a-non-threat-to-elections/
@Undercode_News
https://undercodenews.com/ai-deepfakes-a-non-threat-to-elections/
@Undercode_News
UNDERCODE NEWS
AI Deepfakes: A Non-Threat to Elections - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#AI's Next Frontier: Turning 2D Images into 3D Worlds
https://undercodenews.com/ais-next-frontier-turning-2d-images-into-3d-worlds/
@Undercode_News
https://undercodenews.com/ais-next-frontier-turning-2d-images-into-3d-worlds/
@Undercode_News
UNDERCODE NEWS
AI's Next Frontier: Turning 2D Images into 3D Worlds - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🔐 Hackers Shift Tactics: From #Ransomware to Disruption
https://undercodenews.com/hackers-shift-tactics-from-ransomware-to-disruption/
@Undercode_News
https://undercodenews.com/hackers-shift-tactics-from-ransomware-to-disruption/
@Undercode_News
UNDERCODE NEWS
Hackers Shift Tactics: From Ransomware to Disruption - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: OWASP ZAP - Zed Attack Proxy
OWASP ZAP (Zed Attack Proxy) is an open-source web application security scanner. It is used to identify vulnerabilities in web applications through automated scanning and manual testing. ZAP helps detect issues like SQL injection, cross-site scripting (XSS), and more.
---
### Basic Usage Command:
1. Start OWASP ZAP by running the following command (after installing it):
Explanation:
-
---
### Example: Automated Scan Using ZAP's API
Explanation:
-
-
---
### Example: Start ZAP in Headless Mode for Automation
Explanation:
-
-
-
---
### Example: Scan with Specific Context
Explanation:
-
-
-
---
### Important Notes:
1. OWASP ZAP is highly customizable and can be extended with a variety of plugins to enhance its functionality.
2. It's great for both beginners and experienced penetration testers, thanks to its automated scanning and manual testing features.
3. Ensure you have authorization to test the application before running ZAP on a target website.
OWASP ZAP (Zed Attack Proxy) is an open-source web application security scanner. It is used to identify vulnerabilities in web applications through automated scanning and manual testing. ZAP helps detect issues like SQL injection, cross-site scripting (XSS), and more.
---
### Basic Usage Command:
1. Start OWASP ZAP by running the following command (after installing it):
zap.sh
Explanation:
-
zap.sh: Launches the OWASP ZAP application from the command line.---
### Example: Automated Scan Using ZAP's API
zap-cli quick-scan -u http://example.com
Explanation:
-
zap-cli quick-scan: Initiates a quick scan of the web application.-
-u http://example.com: Specifies the target URL to be scanned.---
### Example: Start ZAP in Headless Mode for Automation
zap.sh -daemon -port 8080 -host 127.0.0.1
Explanation:
-
-daemon: Starts ZAP in headless (non-GUI) mode, which is suitable for automation.-
-port 8080: Sets the port for the ZAP proxy to listen on (default is 8080).-
-host 127.0.0.1: Sets the host address to localhost.---
### Example: Scan with Specific Context
zap-cli spider -c -u http://example.com
Explanation:
-
spider: Crawls the target website to discover pages.-
-c: Continues crawling from any previously discovered URLs.-
-u http://example.com: The URL to start the crawl from.---
### Important Notes:
1. OWASP ZAP is highly customizable and can be extended with a variety of plugins to enhance its functionality.
2. It's great for both beginners and experienced penetration testers, thanks to its automated scanning and manual testing features.
3. Ensure you have authorization to test the application before running ZAP on a target website.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Nate Bargatze: Your Hilarious Co-Pilot on Waze
https://undercodenews.com/nate-bargatze-your-hilarious-co-pilot-on-waze/
@Undercode_News
https://undercodenews.com/nate-bargatze-your-hilarious-co-pilot-on-waze/
@Undercode_News
UNDERCODE NEWS
Nate Bargatze: Your Hilarious Co-Pilot on Waze - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…